Digital Forensic Survival Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Duración: 159:06:57
  • Mas informaciones

Informações:

Sinopsis

Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.

Episodios

  • DFSP # 494 the request is out there

    05/08/2025 Duración: 17min
  • DFSP # 493 Stop, Share, and Listen

    29/07/2025 Duración: 17min
  • DFSP # 492 A Bit of TCP

    22/07/2025 Duración: 20min
  • DFSP # 491 INF-ltration: The Subtle Art of “Fetch and Execute”

    15/07/2025 Duración: 13min
  • DFSP # 490 Unveiling the USN Journal

    08/07/2025 Duración: 12min
  • DFSP # 489 Hidden Gateways

    01/07/2025 Duración: 14min
  • DFSP # 488 SSH & Red Herrings

    24/06/2025 Duración: 16min
  • DFSP # 487 Unmasking Malicious Activity with 4688

    17/06/2025 Duración: 13min
  • DFSP # 486 Squid Games

    10/06/2025 Duración: 19min
  • DFSP # 485 Certifiably Suspicious

    03/06/2025 Duración: 14min
  • DFSP # 485 BAM! Packing Punch

    27/05/2025 Duración: 10min

    This week, I delve into the Windows BAM artifact, unraveling its forensic significance and exploring how it can unlock critical insights in digital investigations.

  • DFSP # 483 Cooking up Forensics with Chef

    20/05/2025 Duración: 14min

    In this week’s episode, I delve into strategies for integrating CHEF into your security investigations, unlocking new avenues for proactive defense and effective incident response.

  • DFSP # 482 Unlocking Clues from Bash and Hidden Keys

    13/05/2025 Duración: 20min

    This week, we’re pulling back the curtain on SSH from a digital forensics perspective.

  • DFSP # 481 Triage outside the Core

    06/05/2025 Duración: 20min

    In this week’s episode, I dive into rapid triage techniques for non-core Windows executables to uncover signs of malicious activity.

  • DFSP # 480 Hidden risks of nested groups

    29/04/2025 Duración: 13min

    This week, I’m talking about nested groups in Windows Active Directory and the security risks they pose. Active Directory allows administrators to attach one group to another—often called nesting. While nesting can simplify account administration and permission management, it can also create real opportunities for attackers if...

  • DFSP # 479 Scan, Score, Secure

    22/04/2025 Duración: 15min

    One of the essential skill sets for a DFIR analyst is the ability to understand the impact of vulnerabilities quickly. In many IR scenarios, you may find a newly discovered vulnerability or receive a scan that flags multiple potential weaknesses. To stay efficient, you must...

  • DFSP # 478 SRUM

    15/04/2025 Duración: 15min

    This week, we’re exploring the System Resource Usage Monitor (SRUM) – a powerful source of forensic data within Windows operating systems. First introduced...

  • DFSP # 477 SSH Triage

    08/04/2025 Duración: 18min

    In this episode, our focus is on understanding how attackers achieve lateral movement and persistence through Secure Shell (SSH)—and more importantly, how to spot the forensic traces...

  • DFSP # 476 Service Host

    01/04/2025 Duración: 22min

    In this episode, we’ll take a focused look at how to triage one of the most commonly targeted Windows processes: svchost.exe. While the methods in this series generally apply to all Windows core processes, svchost is an especially important case because attackers...

  • DFSP # 475 - Set the tone

    25/03/2025 Duración: 20min

    Ransomware attacks move quickly, making your initial response crucial in minimizing impact. This episode outlines critical first steps, from isolating infected machines to gathering key information and initiating containment. Whether you’re a SOC analyst, incident responder, or the first to notice an attack, this framework is designed to help you regain control. Follow these guidelines to effectively mitigate the damage from the very start.

página 1 de 25