解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 7 – 2023 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

ArcPoint Forensics

YouTube video

YouTube video

Black Hills Information Security

YouTube video

YouTube video

YouTube video

Hal Denton // Have you ever been given an encrypted hard drive to perform forensic analysis on? What could go wrong? Probably the first thought rolling through your mind is wondering if the decryption key was included with the drive. If so, you are spot on in questioning that, as the analysis would be pretty much undoable without the decryption key. What if you have the decryption key but your forensic software doesn’t prompt you for the challenge/response to decrypt the drive? What do you do ne...

moth // Recently, BHIS penetration tester Dale Hobbs was on an Internal Network Penetration Test and came across an RPC-based arbitrary command execution vulnerability in his vulnerability scan results. Nessus Plugin ID 59642 I had mentioned in passing that I was working on learning more about remote procedure calls, and Dale invited me to take a look at this vulnerability with him, an invitation that I happily accepted. Quick disclaimer before the party starts: All credit to the initial disclos...

Breaking Badness

c3rb3ru5d3d53c

YouTube video

YouTube video

Cellebrite

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

Cisco’s Talos

Talos Takes 128: Year in Review - Ransomeware and Commodity Loaders Edition By Madison Burns Friday, February 10, 2023 13:02 2022YiR Year In Review We're back with the final year in review focused episode. This time the focus is on the ever broadening ransomware landscape and the commodity malware loaders that often support it. I'll be joined by one of the researchers from the year in review report, Aliza Johnson to talk about what we saw on the ransomware landscape over the last year as well as...

Cloud Security Podcast by Google

EP 107 How Google Secures It's Google Cloud Usage at Massive Scale Guest: Karan Dwivedi, Security Engineering Manager, Enterprise Infrastructure Protection @ Google Cloud 28:50 Subscribe at Google Podcasts.Subscribe at Spotify.Subscribe at Apple Podcasts. Topics covered: Google’s use of Google Cloud is a massive cloud environment with wildly diverse use cases. Could you share, for our listeners, a few examples of the different kinds of things we’re running in GCP?Given that we’re doing these wil...

Cyber Secrets

YouTube video

Didier Stevens

YouTube video

Digital Forensic Survival Podcast

Down the Security Rabbithole Podcast

DtSR Episode 537 - Sergio Talks Threat Intelligence DtSR Episode 537 - Sergio Talks Threat IntelligenceFeb 7, 2023TL;DR: I'm extremely excited to present to you, dear listeners and friends, a wonderful conversation with Sergio Caltagirone, who is quite the authority on 'threat intelligence' - where others talk tools and limited knowledge, Sergio literally was there at the birth of the cyber dawn of the threat intelligence operations we know (or don't know) today. Sergio has been at an agency, at...

InfoSec_Bret

YouTube video

James Spiteri at ‘Oh My Malware!’

YouTube video

Magnet Forensics

The increasing number of cyber regulations around the world can not only be difficult to navigate—they can have a direct impact to your business. If you’re not prepared, your organization could face huge financial penalties. That means it’s become more important than ever to rapidly investigate cyber incidents within the short time frames allowed by enacted legislation. In this webinar, we’ll discuss some of the most relevant cyber regulations facing financial services worldwide, what critical i...

OALabs

YouTube video

RickCenOT

YouTube video

SANS Cloud Security

YouTube video

SANS Cyber Defense

YouTube video

SANS Institute

YouTube video

The Defender’s Advantage Podcast