解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 7 – 2023 - FORENSIC ANALYSIS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

FORENSIC ANALYSIS

Aditya Pratap

Skip to main content LinkedIn Aditya Pratap Expand search Jobs People Learning Dismiss Dismiss Dismiss Dismiss Dismiss Join now Sign in Aditya Pratap’s Post Aditya Pratap Certified Hacking Forensic Investigator (CHFI) || Passware Certified Examiner || M.Sc. Digital Forensics and Information Security || National Forensic Sciences University 2d Report this post Report Report Back Submit Apple Forensics is a comprehensive guide that covers the latest techniques and tools for extracting and analysin...

Amanda Berlin at Blumira

Cado Security and Invictus Incident Response

Digital Forensics Myanmar

eCDFP Module (5) File System Analysis (Part-12) (NTFS File System Analysis) Get link Facebook Twitter Pinterest Email Other Apps February 07, 2023 File Carving File Content တွေက ဖျက်ထားပေမဲ့ သူ့နေရာကို အခြား File တစ်ခုက Over Written မဖြစ်ခင်အထိရှိနေပါတယ်။File တွေကသူ့ရဲ့ Original File Structure အတိုင်းမဖြစ်ရင် ဖွင်လို့ရမှာ မဟုတ်ပါဘူး။ PDF ဆို PDF Word File ဆို Word File ဆိုပြီး သူတို့ရဲ့ File Structure တွေရှိပါတယ်။ Data Recovery Software တွေက ဖျက်လိုက်တဲ့ File ရဲ့ File System Structure (File Tabl...

eCDFP Module (5) File System Analysis (Part-13) (NTFS File System Analysis) (End) Get link Facebook Twitter Pinterest Email Other Apps February 08, 2023 Sleuth Kit® (TSK) က Disk Analysis နဲ့ File Recovery အတွက် ၂၀၀၈ ခုနှစ်ကတည်းက ပြုလုပ်ထားတဲ့ Open Source CLI Tools တစ်ခုဖြစ်ပါတယ်။ Sleuth Kit® (TSK) ကို C and Perl နဲ့ရေးသားထားပြီး The Coroner's Toolkit (TCT) ကနေ Code အချို့ထပ်ပြီးပေါင်းထည့်ထားပါတယ်။ နောက်ပြီး ကိုယ်တိုင်ရေးသားထားတဲ့ Tools တွေပါထပ်ပြီး ပေါင်းထည့်လို့ရပါတယ်။ Sleuth Kit® (TSK) ကိုအောက...

John G. Asmussen at Everything DFIR…

Everything DFIR... Tuesday, February 7, 2023 Case_Notes.py - A simple “how to” guide… When I first started doing computer and mobile forensics, I used to keep a handwritten log of my case notes and forensic findings. A short time later, I switched to using text editors like Notepad and Notepad++ to keep my notes in a digital format. The basic concept of these notes was and still is considered to be my “work product” and was never my final report that was given to the client. That is still someth...

Forensafe

Investigating Window BoxDrive 10/02/2023 Friday Box Drive is a cloud-based file management app that provides users with direct access to their Box account files from their desktop computers. With Box Drive, users can preview, edit, and collaborate on their cloud-based files in real-time, as if they were stored on their local computers. This tool is equipped with features such as version history and commenting, making it an effective tool for teams collaboration. Digital Forensics Value of BoxDri...

InfoSec Write-ups

PCAP file & Windows event logs investigationKringleCon 2022 - Register Today!KringleCon is a virtual conference for security-minded people and hackers from around the world, hosted by Santa and…2022.kringlecon.comLet’s dive straight into these suspicious file investigation challenge and answer their questions.Wireshark Practice ChallengeA suspicious pcap file was provided to investigate a malicious network traffic. For anyone who doesn’t have wireshark can use this free online pcap file analyzer...

Joseph Naghdi at Computer Forensics Lab

Computer Forensics Insights Digital forensics helping solicitors in defending their clients Joseph Naghdi 08/02/2023 No CommentsHow can digital forensics help solicitors in defending their client?Digital forensics can play an important role in helping solicitors defend their clients by providing crucial evidence in a legal case. Here are some ways in which digital forensics can help solicitors:Gathering EvidenceDigital forensics can help solicitors gather electronic evidence that may support the...

Computer Forensics Insights Role of digital forensics in litigation Joseph Naghdi 08/02/2023 No CommentsWhat role does digital forensics play in our business and private lives?Digital forensics is the scientific process of identifying, collecting, analysing, and preserving electronic data. It involves the examination of digital devices, such as computers, smartphones, and other storage media, for the purpose of finding and recovering data that can be used as evidence in a criminal investigation ...

Megan O’Neil, Kyle Dickinson, and Karthik Ram at AWS Security

by Megan O'Neil, Kyle Dickinson, and Karthik Ram | on 06 FEB 2023 | in Intermediate (200), Security, Identity, & Compliance, Technical How-to | Permalink | Comments | Share Ransomware events have significantly increased over the past several years and captured worldwide attention. Traditional ransomware events affect mostly infrastructure resources like servers, databases, and connected file systems. However, there are also non-traditional events that you may not be as familiar with, such as ran...

Megan Roddie at SANS

Megan Roddie AWS Cloud Log Extraction In this blog post, we discussed the acquisition of AWS CloudTrails logs stored in S3 buckets. February 10, 2023 As an analyst or incident responder operating in a cloud environment, you are going to frequently be performing log analysis to uncover and investigate malicious activity. The challenge is that there are so many different cloud vendors and software-as-a-service (SaaS) providers and each one has several methods of extracting logs. It’s important t...

Raj Upadhyay

Raj UpadhyayFollowFeb 11·4 min readDFIR : Zero To Hero Series : Case-0To help folks (🕵️) who are just starting their journey in DFIR field we are starting one “DFIR Zero To Hero Series” in which we will provide an Investigation scenario. Additionally we will also provide a write-up for the Investigation scenario where we will share our approach.Case-0 : Remote Access Tool Investigation Part-1Case Background:New employee recently joined the company as a Web Developer. Company suspect that newly j...

System Weakness

We all hear often about companies that have been hacked and that damages have been reported as a result of the attacks, like document leaks, unavailability of services, compromised credentials and so on. But many times, everything begins with phishing. Let’s see what’s the whole thing with this attack!● What is phishing?Well, phishing is a type of cyber security attack. More precisely, a social engineering attack. There are various ways in which this comes up: emails, phone calls, sms and so on....

The DFIR Report

Uzair Afzal

Get link Facebook Twitter Pinterest Email Other Apps February 11, 2023 Phishing is the technique of fraudulent attempt by the attacker to obtain sensitive and confidential information i.e. Credentials, PII information, credit card, bank details. It can also be targeted attack to focus on the specific organization of individual. The attacker often tailors an email to speak directory to targeted user. There are many types of phishing as follow. I wouldn't explain the types. You can read Here. In t...