解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 29 – 2023 - MISCELLANEOUS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。 一部の記事は Google Bard を使い要約しています。4n6 は こちら からご確認いただけます。

MISCELLANEOUS

Brittany Roberts at ADF Solutions

Posted by Brittany Roberts on July 12, 2023 Find me on: LinkedIn Tweet When it comes to digital forensic investigations, efficient and targeted searches are crucial for uncovering relevant evidence. ADF Solutions offers powerful software solutions that can greatly enhance your search capabilities. In this blog post, we will explore seven effective ways to conduct targeted searches using ADF software. These techniques will help you streamline your investigations and maximize the efficiency of you...

Black Cell

EVENTS SOLUTIONS FUSION CENTER INTEGRATION OFFENSIVE SECURITY COMPLIANCE CLOUD SECURITY ICS/OT SECURITY MITRE GAP ASSESSMENT ABOUT US KNOWLEDGE CENTER WHITEPAPERS ICS SECURITY FEED BLOG CAREERS CONTACT US Select Page In the face of a cyber incident, a swift and effective response is crucial to mitigating damages and restoring security. Here are essential steps to take when responding to a cyber incident: Activate Your Incident Response Plan: Immediately initiate your pre-established incident res...

Cassie Doemel at AboutDFIR

AboutDFIR Site Content Update – 07/15/2023 By Cassie DoemelOn July 15, 2023July 14, 2023 Tools & Artifacts – Windows – new entries added – qBittorrent, Recycle Bin, and Steam Tools & Artifacts – Android – new entry added – Yandex Mail Tools & Artifacts – File Systems – new entry added – $MFT Annual Industry Reports – proofpoint, Verizon, & Orange Cyberdefense Forensicators of DFIR – Fabian Mendoza Jobs – old entries cleaned up, new entries added – Optiv, UST, BetterUp, Stripe, TJX Companies, Rap...

Jonathan Munshaw at Cisco’s Talos

By Jonathan Munshaw Monday, July 10, 2023 08:07 Researcher Spotlight Gergana Karadzhova-Dangela is used to being with users during some of their toughest moments.Today, she spends much of her time responding to active cybersecurity incidents with Cisco Talos Incident Response, helping customers work through active attacks, many of which put personal data or sensitive information at risk.And while admittedly less high stakes, her first job in IT at Mount Holyoke College in a small town in Massach...

Derek Eiri

Derek Eiri digital forensics, Notes 2023-07-09 While it has been some time since I last wrote, I’ve kept myself occupied! Here are a handful of selected highlights from my last couple of months. Forensic 4:cast Awards Nomination As a newcomer, it’s awesome so many of you help nominate me for Forensic 4:cast Awards’ DFIR Newcomer of the Year. I look forward to finally meeting many of you in person at the SANS DFIR Summit in Austin, TX! It’ll be my first large DFIR event! HTCIA Silicon Valley Chap...

Forensic Focus

Inginformatico

Compilation of web page links that show lists of incident response playbooks [ENG]inginformatico·Follow2 min read·4 days ago--ListenSharePlaybooks[Spanish version]The playbooks complement the Cybersecurity Incident Management Plan or Incident Response Plan, since they define the lines of action to mitigate the different types of critical threats to the business. The objective of the playbooks is to offer instructions, guides and recommendations to solve each type of cybersecurity incident. The p...

Magnet Forensics

In this installment of our series, we will cover key software settings within Magnet AXIOM and AXIOM Cyber that will ensure you are getting the most from your hardware investment—following up on part one in this series, in which we focused on hardware options to boost your case processing performance. Additionally, we’ll cover some frequent issues that arise during case processing that can have a significant impact on the overall performance or your system. Program Settings The idea of dividing ...

Organizations leveraging VeraKey for their consent-based mobile device extractions are provided access to full file system acquisitions of both iOS and Android devices. These full file system images contain additional data points that would otherwise not be available with only logical extractions. With the integration of these tools, connecting Magnet AXIOM Cyber to VeraKey directly can streamline your acquisition and analysis workflow. By launching AXIOM Process, and then connecting to your Ver...

Revo4n6

Revo 4n6Revo 4n6Revo 4n6Revo 4n6Revo 4n6Revo 4n6Revo 4n6Revo 4n6HomeBlog postsDocsAbout & ContactMoreHomeBlog postsDocsAbout & ContactHomeBlog postsDocsAbout & Contact Digital forensics unveiled - blog & news Copyright © 2023 Revo4n6 - All Rights Reserved. This website uses cookies.We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.Accept

Salvation DATA

Knowledge 2023-07-11 Content Intro Top 5 Digital Forensics Corps in 2023 Trends and Innovations in Digital Forensics in 2023 Conclusion Content Intro Top 5 Digital Forensics Corps in 2023 Trends and Innovations in Digital Forensics in 2023 Conclusion Intro Securing our digital spaces and looking into digital wrongdoings are more important than ever in the fast changing digital ecosystem. Here is where the science of digital forensics and digital forensic corp come into play. Is digital forensics...

Securityinbits

1 day ago.NET, AMSI, AsyncRAT, CyberChef, CyberChef Recipe, RATQuick background: I was working on an initial .NET file that drops AsyncRAT. It contains following code to evade AMSI. I found this sample from OALABS Twitch stream. SHA256 43cc6ed0dcd1fa220283f7bbfa79aaf6342fdb5e73cdabdde67debb7e2ffc945 We will use CyberChef tool to decode the integer array into hexadecimal and pad it with extra 0s if needed. Then, we can disassemble the code using an online tool or the built-in CyberChef Disassembl...

Steven F at SpecterOps

Steven F·FollowPublished inPosts By SpecterOps Team Members·9 min read·4 days ago--ListenShareWindows offers tons of useful tools that administrators can leverage to perform their daily jobs. A lot of times, those tools are looked at from an offensive standpoint and use cases for them are discovered. Earlier this year I read a message from a co-worker Lee Christensen (@tifkin_) about Service Performance DLLs and upon further review, it seemed like there was potential for new opportunities to com...

Sumuri