Sinopsis
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
Episodios
-
DFSP # 014 - Shimcache
23/05/2016 Duración: 18minIn this episode I talk Shimcache, otherwise known as the Application Compatibility Cache. This registry key has existed since Windows XP and tracks executable on a system, making it a great source of digital evidence for both disk forensics and incident response cases. In addition, there are freely available tools that will parse the data. It is not a difficult artifact to understand. Once an analyst spends the time learning how to pull, parse and interpret the data it is easily incorporated into an investigation and aligns well with other Windows artifacts.
-
DFSP # 013 - Windows 10 Artifacts
16/05/2016 Duración: 24minIn this episode I cover something I have been intending to do for some time: a Windows 10 artifacts overview. Here, I explore some key artifacts changes and what has stayed the same. Once I got into it I found there was a lot to talk about so, to start, I will discuss the topics from a high level. In future episodes I will dig in deeper to each artifact.
-
DFSP # 012 - Just-Metadata
09/05/2016 Duración: 14minThis episode I talk Just-Metadata, a freely available tool that gathers data about IP addresses from publicly available resources. Check out Truncer's website to learn more. I put together my quick start notes (below) for anyone interested in getting set up. This tool is very powerful and useful for Incident Response investigations, especially since you can batch upload IP addresses and quickly get useful details.
-
DFSP # 011 - PALADIN
02/05/2016 Duración: 24minThis episode I talk about PALADIN from SUMURI. PALADIN is a modified “live” Linux distribution based on Ubuntu that simplifies various forensics tasks in a forensically sound manner via the PALADIN Toolbox and used by thousands of digital forensic examiners from Law Enforcement, Military, Federal, State and Corporate agencies.
-
DFSP # 010 - Investigation Survival Tips
25/04/2016 Duración: 25minThis episode covers Investigation Survival Tips.... for the new guy. Newer examiners are often thrown into a world where it is there mission to find "everything." Not on that, they are usually given inadequate investigative support to accomplish their assigned goals. I have seen this happen often so I thought I would spend an episode giving some advice on how to steer the conversation to keep expectation realistic and in-check.
-
DFSP #009 - Linux for Computer Forensics
18/04/2016 Duración: 16minIn this episode I cover using Linux as a forensic platform... for the new guy. I find many examiners are very Windows-centric. There is nothing wrong with that as most tools and evidence is Windows based. However, Linux comes in handy from time to time and knowing some basic commands is always helpful.
-
DFSP # 008 - Virtual Machines & Computer Forensics
11/04/2016 Duración: 22minIn this episode I talk all about virtual machines; the reasons you should be using them (more), prebuilt ones that are freely available and loaded with digital forensic tools and a free virtual machine application that has the same functionality you need as the pay tools.
-
DFSP #007 - File Use & Knowledge Wrap Up
04/04/2016 Duración: 29minIn this episode we wrap up the File Use & Knowledge artifacts discussed previously and talk about how they connect to help strengthen a case.
-
DFSP #006 - Resolving Attached USBs
28/03/2016 Duración: 20minHave you ever been asked to find out what the "F" drive is? Have you ever needed to prove a USB drive was attached to a target system? Collecting and presenting this information is a core skill all computer forensic analysts need know. This episode breaks down the process of collecting and interpreting the data necessary to make the connection between USB device and Windows systems.
-
DFSP #003 - What the Shellbag!
21/03/2016 Duración: 28minIn this episode we examine how to use Windows Shellbag records to help prove file use and knowledge. Shellbag records are created by certain user activity and can be used to show where a user has navigated to on a computer system and when they did so. Very powerful evidence!
-
DFSP #004 - Windows Prefetch
14/03/2016 Duración: 18minWindows Prefetch data is a great source of evidence to help determine file use and knowledge of applications running on the system.
-
DFSP #003 - Windows Explorer Evidence
17/02/2016 Duración: 16minOftentimes you will be asked to find information on a target system that shows if a user accessed certain files, the last time they did and/ or how often they did. Being able to put a picture together that answers these questions can be critical and make or break the case.
-
DFSP #002 - Windows Link Files
15/02/2016 Duración: 25minWindows LINK files are a great source of information when your aim is proving file use and knowledge during a computer forensic investigation. Knowing how to interpret these files will break reliance on automated tools and give you the versatility to quickly examine - interpret - and gain investigative insight.
-
DFSP #001: Premiere Episode
14/02/2016 Duración: 14minListen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.