解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 10 – 2023 - MISCELLANEOUS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

MISCELLANEOUS

Jessica Hyde at Hexordia

Growing in Digital Forensics - Practical Mentorship and Resources Feb 27 Written By Jessica Hyde As part of the presentation I was honored to deliver at the Magnet Virtual Summit this year, I was able to provide my thoughts on mentorship as it pertains to DFIR, a practical process that I utilize in formal mentorship sessions, and resources. Remember you can be a mentor and mentee at every stage in your journey. Download Presentation Value of MentorshipMentorship is valuable in a variety of ways....

SANS

DFIR Origin Stories - Kevin Ripa SANS DFIR DFIR Origin Stories - Kevin Ripa Never thought a career in IT would be one for you? Think again. That’s what happened to Kevin Ripa. February 27, 2023 From One Defense to AnotherNever thought a career in IT would be one for you? Think again. That’s what happened to Kevin Ripa. Kevin stumbled upon cyber forensics by chance. He had a military background, serving in the Canadian Armed Forces, and then started a private security company to provide physi...

Belkasoft

You have decided to buy Belkasoft X—great decision! We are sure this tool will take an important place in your investigative toolset. Now, you must choose among four different editions of the product to make the best use of your budget by purchasing the most suitable and affordable edition for your DFIR team. In this article, we will advise you on how to make the most informed decision. Available Editions The available editions include: X Mobile and X Computer, X Forensic, and X Corporate. X Mob...

Company About News Customers Partners Contact Us Contacts +1 (650) 272-03-84 (USA and Canada) 702 San Conrado Terrace, Unit 1Sunnyvale CA 94085, USA support@belkasoft.com sales@belkasoft.com Subscribe to the newsletter Be the first to receive product updates and company news. Name * Error! Required field E-mail * Error! Required field Subscribe Sending request, please wait ... © 2002-2023 Belkasoft® Terms of use Privacy policy Public offer

CybeReady

Derek Eiri

Forensic Hard Drive Data Recovery with Scott Moulton Derek Eiri data recovery, digital forensics, training 2023-02-272023-02-27 As I was writing the post about write blockers, I discovered I had considerably more to learn about storage media; especially after reading Todd G. Shipley and Bryan Door’s whitepaper, and watching Scott Moulton’s presentations given at Schmoocon 2014 and Skydog Con 2015. Listening to a few hours of Moulton’s Forensic Hard Drive Data Recovery Class recorded in 2020 reve...

Domiziana Foti

Unpacking the Power of Intelligence-Driven Incident Response: Lessons from Scott J. Roberts & R. Brown’s BookWhat is the book about?This book explains why and how developing an intelligence-driven incident response strategy. With a focus on proactive methods for identifying and mitigating possible risks before they may cause harm, the book covers a variety of issues including threat intelligence, incident detection, and response preparation.What is Intelligence-Driven Incident Response?It is a p...

Oleg Afonin at Elcomsoft

March 1st, 2023 by Oleg AfoninCategory: «General» In the previous article we discussed the different methods available for gaining access to encrypted information, placing password recovery attacks at the bottom of the list. Password recovery attacks are one of the methods used to gain access to encrypted information. In this article we’ll discuss the process of building a password recovery queue. Learn how to choose the appropriate workflow for the attack, the first prioritizing files with weak...

March 3rd, 2023 by Oleg AfoninCategory: «General» Dictionary attacks are among the most effective ones because they rely on the human nature. It is human nature to select passwords that are easily memoizable, like their pet names, dates of birth, football teams or whatever. BBC counted 171,146 words in the English dictionary, while a typical native speaker (of any language) knows 15,000 to 20,000 word families (lemmas, or root words and inflections). Whatever the attack speed is, it will not tak...

Eric Ooi

If you're looking for professional services on this topic or interested in other cybersecurity consulting services, please reach out to me via my Contact page to discuss further.This guide details how to deploy Elastic Agent on macOS using Intune. For macOS, please use my companion guide.Using Elastic Agent with Elastic SIEM is a great way to secure and monitor your environment. Not only does it provide full endpoint security capabilities, it’s great for analyzing your Zeek logs, and monitoring ...

If you're looking for professional services on this topic or interested in other cybersecurity consulting services, please reach out to me via my Contact page to discuss further.This guide details how to deploy Elastic Agent on macOS using Intune. For Windows, please use my companion guide.Using Elastic Agent with Elastic SIEM is a great way to secure and monitor your environment. Not only does it provide full endpoint security capabilities, it’s great for analyzing your Zeek logs, and monitorin...

Forensic Focus

Ravishanka Silva at InfoSec Write-ups

Unleashing the Power of Purple Team: Why Collaborative Security Strategies are the Future of CybersecurityIn the world of cybersecurity, organizations need to have a solid strategy in place to protect their assets from potential threats. The most common way to approach this is through the use of teams that work together to ensure that security measures are up to par. The three most prominent teams in this space are the red team, blue team, and purple team. Each team plays a crucial role in ensur...

Keith McCammon

3 minute read For some time now, I’ve been considering a hypothesis that the future of cybersecurity is some form of vertically integrated set of products, services, and insurance. This won’t represent emerging or niche cybersecurity products and services, but will bring actuarial rigor to identification and measurement of the outcomes that cybersecurity vendors claim to provide, and so it will represent the subset of offerings that provide consistent, provable value (i.e., things that reliably ...

Kevin Pagano at Stark 4N6

Posted by Kevin Pagano March 01, 2023 Get link Facebook Twitter Pinterest Email Other Apps Shortlink: startme.stark4n6.comIf people have suggestions for additions please feel free to shoot me a message on Twitter (@KevinPagano3) or Mastodon.I rebranded the Network Tools to now include Cloud tools. With cloud becoming more and more relevant I thought it was time to try and add some scripts and other things I've found to it.Mobile ToolsAndroid Forensics References - RealityNetNetwork / Cloud Tools...

Koen Van Impe

Posted on February 27, 2023 in linux Tweet Leave a reply MISP database Introduction In most MISP instances the database (MySQL or MariaDB) is on a local network, either directly on the machine or on a local DB-cluster. As a lot of organisations are moving towards a “full cloud” environment, this also means that they want to start making use of the database features offered by their cloud providers. Microsoft offers Azure Database for MySQL and in this post I list the (limited) steps required to ...

Magnet Forensics

MF: Tell us about your life before becoming a Trainer. SS: Before joining Magnet Forensics as a Trainer, I served in law enforcement for more than 31 years. I wrapped up my career in Los Angeles with the FBI, where I was a Digital Forensic Examiner assigned to the Orange County RCFL (Regional Computer Forensics Laboratory), handling criminal and intelligence cases. I joined the FBI after retiring as a police officer with the Albuquerque Police Department, where I began as a patrol officer and wo...

That’s a wrap on an amazing Magnet Virtual Summit 2023! Thank you to everyone who joined us over the course of nearly two weeks. We truly believe that together we have truly presented the virtual DFIR event of the year. If you’ve missed any of the presentations from Magnet Virtual Summit 2023, most are available to watch on demand now! Head over to our recording library and watch as many as you like for free. Interested in learning even more about DFIR trends and Magnet Forensics’ approaches to ...

Jasper Rowe at OpenText

ReliaQuest