Digital Forensic Survival Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Duración: 159:21:00
  • Mas informaciones

Informações:

Sinopsis

Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.

Episodios

  • DFSP # 014 - Shimcache

    23/05/2016 Duración: 18min

    In this episode I talk Shimcache, otherwise known as the Application Compatibility Cache. This registry key has existed since Windows XP and tracks executable on a system, making it a great source of digital evidence for both disk forensics and incident response cases. In addition, there are freely available tools that will parse the data. It is not a difficult artifact to understand. Once an analyst spends the time learning how to pull, parse and interpret the data it is easily incorporated into an investigation and aligns well with other Windows artifacts.  

  • DFSP # 013 - Windows 10 Artifacts

    16/05/2016 Duración: 24min

    In this episode I cover something I have been intending to do for some time: a Windows 10 artifacts overview. Here, I explore some key artifacts changes and what has stayed the same. Once I got into it I found there was a lot to talk about so, to start, I will discuss the topics from a high level. In future episodes I will dig in deeper to each artifact.

  • DFSP # 012 - Just-Metadata

    09/05/2016 Duración: 14min

    This episode I talk Just-Metadata, a freely available tool that gathers data about IP addresses from publicly available resources. Check out Truncer's website to learn more. I put together my quick start notes (below) for anyone interested in getting set up. This tool is very powerful and useful for Incident Response investigations, especially since you can batch upload IP addresses and quickly get useful details.

  • DFSP # 011 - PALADIN

    02/05/2016 Duración: 24min

    This episode I talk about PALADIN from SUMURI. PALADIN is a modified “live” Linux distribution based on Ubuntu that simplifies various forensics tasks in a forensically sound manner via the PALADIN Toolbox and used by thousands of digital forensic examiners from Law Enforcement, Military, Federal, State and Corporate agencies.

  • DFSP # 010 - Investigation Survival Tips

    25/04/2016 Duración: 25min

    This episode covers Investigation Survival Tips.... for the new guy. Newer examiners are often thrown into a world where it is there mission to find "everything." Not on that, they are usually given inadequate investigative support to accomplish their assigned goals. I have seen this happen often so I thought I would spend an episode giving some advice on how to steer the conversation to keep expectation realistic and in-check.

  • DFSP #009 - Linux for Computer Forensics

    18/04/2016 Duración: 16min

    In this episode I cover using Linux as a forensic platform... for the new guy. I find many examiners are very Windows-centric. There is nothing wrong with that as most tools and evidence is Windows based. However, Linux comes in handy from time to time and knowing some basic commands is always helpful.

  • DFSP # 008 - Virtual Machines & Computer Forensics

    11/04/2016 Duración: 22min

    In this episode I talk all about virtual machines; the reasons you should be using them (more), prebuilt ones that are freely available and loaded with digital forensic tools and a free virtual machine application that has the same functionality you need as the pay tools.

  • DFSP #007 - File Use & Knowledge Wrap Up

    04/04/2016 Duración: 29min

    In this episode we wrap up the File Use & Knowledge artifacts discussed previously and talk about how they connect to help strengthen a case.

  • DFSP #006 - Resolving Attached USBs

    28/03/2016 Duración: 20min

    Have you ever been asked to find out what the "F" drive is? Have you ever needed to prove a USB drive was attached to a target system? Collecting and presenting this information is a core skill all computer forensic analysts need know. This episode breaks down the process of collecting and interpreting the data necessary to make the connection between USB device and Windows systems.

  • DFSP #003 - What the Shellbag!

    21/03/2016 Duración: 28min

    In this episode we examine how to use Windows Shellbag records to help prove file use and knowledge. Shellbag records are created by certain user activity and can be used to show where a user has navigated to on a computer system and when they did so. Very powerful evidence!

  • DFSP #004 - Windows Prefetch

    14/03/2016 Duración: 18min

    Windows Prefetch data is a great source of evidence to help determine file use and knowledge of applications running on the system.

  • DFSP #003 - Windows Explorer Evidence

    17/02/2016 Duración: 16min

    Oftentimes you will be asked to find information on a target system that shows if a user accessed certain files, the last time they did and/ or how often they did. Being able to put a picture together that answers these questions can be critical and make or break the case.

  • DFSP #002 - Windows Link Files

    15/02/2016 Duración: 25min

    Windows LINK files are a great source of information when your aim is proving file use and knowledge during a computer forensic investigation. Knowing how to interpret these files will break reliance on automated tools and give you the versatility to quickly examine - interpret - and gain investigative insight.  

  • DFSP #001: Premiere Episode

    14/02/2016 Duración: 14min

    Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.

página 25 de 25