Digital Forensic Survival Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Duración: 159:21:00
  • Mas informaciones

Informações:

Sinopsis

Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.

Episodios

  • DFSP # 315 - ARTHIR

    01/03/2022 Duración: 12min

    This we can talk about Arthir, an open source platform for windows incident response and threat hunting.

  • DFSP # 314 - Future of Cyber Security

    22/02/2022 Duración: 44min

    This week Max Lamothe-Brassard talks about the future of cyber security.

  • DFSP # 313 - Shimcache and Amcache

    15/02/2022 Duración: 18min

    This week is a back to basic episode featuring Shimcache and Amcache. Learn what they are, why they are important to many investigations and the pitfalls to avoid.

  • DFSP # 312 - Cloud Network Security Services

    08/02/2022 Duración: 15min

    This week is about Cloud Network Security Services.

  • DFSP # 311 - Data Spoliation Fast Triage

    01/02/2022 Duración: 13min

    This week we continue with the Windows fast triage series and talk about data spoliation detection.

  • DFSP # 310 - Cloud Network Segmentation

    25/01/2022 Duración: 13min

    This week is about cloud network segmentation. Network segmentation has security advantages, and that’s regardless of whether or not security is the intention. There are some big differences between traditional on-prem network segmentation and cloud infrastructure segmentation. As a DFIR practitioner, knowing the difference is vital for your incident response preparedness. This week I will break it down from a DFIR point of view and provide some necessary insight that will help you better structure your investigations involving cloud assets.

  • DFSP # 309 - Insider Threats

    18/01/2022 Duración: 21min

    This week I cover insider threat, which is sort of a gray area between traditional investigations and DFIR investigations. 

  • DFSP # 308 - Cloud Access Controls

    11/01/2022 Duración: 16min

    This week I’m talking about identity access controls commonly encountered in cloud environments. These come up during DFIR investigations and high-level awareness, at the least, is necessary for analysts in order to be effective during investigations. These are the things that may be part of root cause, part of the attack escalation, or part of mitigation will remediation. This week all cover the basics to help with your incident response preparedness.

  • DFSP # 307 - Career Strategy Checkup

    04/01/2022 Duración: 30min

    This week is my advice for conducting a career critique as well as to plan for the future - or at least for 2022. I do this episode every year at this time with the intention of helping newer analysts maximize their efforts to achieve the desired career goals in both the short term and long term.

  • DFSP # 306 - Lateral MM Fast Triage 5

    28/12/2021 Duración: 11min

    This week we continue with the Windows fast triage series and talk about lateral movement evidence that may be found in DC records.

  • DFSP # 305 - CSA Cloud Threats 8

    21/12/2021 Duración: 10min

    This week is a continuation of the threats to cloud computing miniseries. We are stepping through the top 11 threats to cloud computing as identified by the Cloud Security alliance. When you are protecting cloud assets or investigating breaches of cloud assets, there is a lot to keep in mind. You must remember the standard security infrastructure, the new cloud infrastructure as well as any changes to the standard infrastructure that could be affected for your investigation. The top 11 threats to cloud computing help identify where you, as an analyst, should prioritize your time both as a starting point and how you use your limited time for continuing education.

  • DFSP # 304 - Detecting File Poisoning on Linux

    14/12/2021 Duración: 14min

    This week I review a great method to detect file poisoning on Linux using all native commands.

  • DFSP # 303 - Mac Artifacts with SUMURI

    07/12/2021 Duración: 35min

    This week SUMURI's Steve Whalen (a.k.a. 'MacBoy') talks Mac artifacts

  • DFSP # 302 - Lateral MM Fast Triage 4

    30/11/2021 Duración: 15min

    This week we continue with the Windows fast triage series and talk about lateral movement evidence that may be found in logon event records.

  • DFSP # 301 - OSDFCON 2021

    23/11/2021 Duración: 22min

    This week Brian Carrier of Basis Technology joins me to talk about OSDFCon. The DFIR community relies on open source tools and the conference is a great way to get exposure to new tools and to learn how to use them. There's a great lineup this year with something for everyone. Registration is free for everyone.

  • DFSP # 300 - Case Study Ocean Lotus

    16/11/2021 Duración: 20min

    This week is a case study where we look at an actual attack strategy and compared it against standard triage methods to see how well they hold up. In this episode I break down some attack methods attributed to APT32, also known as Ocean Lotus, and we’ll see how standard triage techniques hold up against the attack chain. 

  • DFSP # 299 - Malicious Powershell with Blumira

    09/11/2021 Duración: 20min

    Amanda Berlin of Blumira speaks on malicious Powershell attacks and defense techniques.

  • DFSP # 298 - Mac Forensics with SUMURI

    02/11/2021 Duración: 32min

    This week SUMURI's Steve Whalen (a.k.a. 'MacBoy') talks Mac forensics.

  • DFSP # 297 - Nested Groups

    26/10/2021 Duración: 10min

    This week I’m talking about Nested Groups and the risk they pose for security. Built-in to the functionality of Active Directory is the ability to attach a group to another group. While this has advantages for account administration across an organization, it also offers attackers opportunity if certain precautions are not taken. This week I’ll break down Nested Groups in DFIR terms, talk about how attackers take advantage of it and what analysts need to know for investigations.

  • DFSP # 296 - Case Study Turla-Comrat

    19/10/2021 Duración: 19min

    This week is a case study where we look at an actual attack strategy and compared it against standard triage methods to see how well they hold up. The Turla group using ComRat malware is our case example, let’s see if standard triage techniques can save the day.

página 10 de 25