Sinopsis
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
Episodios
-
DFSP # 175 - OWASP: Components with Known Vulnerabilities
25/06/2019 Duración: 10minThis week I talk about OWASP's Number 9 vulnerability category from their top 10 list, components with known vulnerabilities.
-
DFSP # 174 - The VMEM Experience
18/06/2019 Duración: 10minThis week I talk about the challenges of working with VMEM files for memory forensics.
-
DFSP # 173 - Cloud Incident Response
11/06/2019 Duración: 15minThis week I talk about the DFIR changes on the horizon with cloud technology.
-
DFSP # 172 - High Optane
04/06/2019 Duración: 11minThis week I talk about Intel's emerging technology called Optane end it anticipated affects on DFIR investigations.
-
DFSP # 171 - OWASP: Breakfast Cereal
28/05/2019 Duración: 13minThis week I talk about OWASP's Number 8 vulnerability category from their top 10 list, insecure deserialization.
-
DFSP # 170 - The Crypto-Landscape
21/05/2019 Duración: 19minThis week I talk about the crypto attack landscape.
-
DFSP # 169 - Will The Future Kill DFIR?
14/05/2019 Duración: 24minDFIR are professionals often worry if advances in artificial intelligence and automation are going to put them out of work. This week I address the issue and give my projection, based on expert sources, of what the future of forensics will look like.
-
DFSP # 168 - Is CEH Still Relevant?
07/05/2019 Duración: 15minI recently passed my certified ethical hacker certification test. This week I thought I would talk about why I chose the certification.
-
DFSP # 167 - OWASP: XSS
30/04/2019 Duración: 16minThis week I talk about OWASP's Number 7 vulnerability category from their top 10 list, cross site scripting.
-
DFSP # 166 - SVCHOST Abuse
23/04/2019 Duración: 13minThis week I talk about SVCHOST. This Windows core process is one of the most targeted artifacts that comes up again and again during investigations.
-
DFSP # 165 - Windows Core Processes
16/04/2019 Duración: 15minThis week I go over how to approach windows core processes from the standpoint of fast triage methodology. Since these processes are found on all window systems it makes sense to develop and investigative approach that focuses on quickly reviewing each process for anomalies.
-
DFSP # 164 - Mobile Device Compromise Assessment
09/04/2019 Duración: 19minThis week I talk about the investigative value of creating a mobile compromise assessment strategy.
-
DFSP # 163 - DFIR Job Interviews
02/04/2019 Duración: 21minThis week I share my thoughts on DFIR job interviews. How to prepare. Things to consider. Pitfalls to avoid.
-
DFSP # 162 - OWASP: Security Misconfigurations
26/03/2019 Duración: 16minThis week I talk about OWASP's Number 6 vulnerability category from their top 10 list, Security Misconfiguration. I explore the issue from a DFIR point of view.
-
DFSP # 161 - Social Engineering Toolkit
19/03/2019 Duración: 17minThis week I talk about all the fun you can have ethically hacking with SET
-
DFSP # 160 - Serpico
12/03/2019 Duración: 19minSerpico makes report writing suck less! Check it out.
-
DFSP # 159 - Linux Triage
05/03/2019 Duración: 23minThis week I talk more about Linux triage methods.
-
DFSP # 158 - OWASP: Broken Access Control
26/02/2019 Duración: 13minThis week I talk about OWASP's Number 5 vulnerability category from their top 10 list, Broken Access Control. I explore the issue from a DFIR point of view.
-
DFSP # 157 - File Comparison Strategies
19/02/2019 Duración: 19minThis week I discuss some techniques for comparing files and folders for DFIR investigations.
-
DFSP # 156 - B2B: Career Maintenance
12/02/2019 Duración: 28minThis week I share my thoughts on assessing DFIR career path progression.