解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 27 – 2023 - MISCELLANEOUS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。 一部の記事は Google Bard を使い要約しています。4n6 は こちら からご確認いただけます。

MISCELLANEOUS

Andrew Gorham at ADF Solutions

Posted by Andrew Gorham on June 30, 2023 Tweet Mobile devices often contain crucial evidence related to criminal activities. Mobile forensics helps extract and analyze data from smartphones, tablets, and other mobile devices to uncover evidence that can be used in criminal investigations. This includes text messages, call logs, photos, videos, location information, social media activity, and more. This information may identify individuals involved in illegal activities, track their communication...

dabeersboys

Skip to content Toggle navigation Sign up Product Actions Automate any workflow Packages Host and manage packages Security Find and fix vulnerabilities Codespaces Instant dev environments Copilot Write better code with AI Code review Manage code changes Issues Plan and track work Discussions Collaborate outside of code Explore All features Documentation GitHub Skills Blog Solutions For Enterprise Teams Startups Education By Solution CI/CD & Automation DevOps DevSecOps Case Studies Customer Stori...

Forensic Focus

Christa Miller at Forensic Horizons

Christa Miller·FollowPublished inForensic Horizons·6 min read·1 day ago--ShareLikelihood ratios help expert witnesses testify to the credibility of DNA and other forensic evidence. Is it appropriate for digital evidence too?Photo by Naser Tamimi on UnsplashMy previous post described a trial from the point of view of a juror. That piece focused mainly on digital evidence and the juror’s perceptions of it, including where it was less clear than the prosecutor…----FollowWritten by Christa Miller101...

The Sleuth Sheet

SOC Puppet Creation GuideVEEXH·FollowPublished inThe Sleuth Sheet·7 min read·Jun 25--ListenShareART By VEEXHVerus Nullus, Omnis LicitusWelcome to my guide, but before I begin, I must state, “Please use this guide responsibly and respectfully.”A SOC puppet account is a kind of fake online persona that someone creates to deceive others or obtain information. The person behind the SOC puppet account may have different motives for doing so, such as promoting or defending a certain cause, influencing...

Xavier Mertens at /dev/random

June 25, 2023 Security, Wrap-Up Leave a comment A quick wrap-up of the last edition of BSides Athens that occurred yesterday, Saturday 24th. I really like this event for multiple reasons. First, the atmosphere, I’ve plenty of Greek friends and I like this country… and food! This was already the 8th edition and full in person! They reached an audience of 350 people coming from many countries! This was a two-tracks event with regular talks in track 1 and workshop/demos in the track 2. I stayed in ...