解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 30 – 2023 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。 一部の記事は Google Bard を使い要約しています。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

Black Hills Information Security

YouTube video

YouTube video

Shenetworks’ Guide to Landing Your First Tech Job Back to top Black Hills Information Security 890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447) © 2008-2023 About Us | BHIS Tribe of Companies | Privacy Policy | Contact Links Search the site

Breaking Badness

Cellebrite

YouTube video

cloudyforensics

EKS Forensics & Incident ResponseForensic Labs·Follow3 min read·5 days ago--ListenShareWe’ve continued our series on Cloud Forensics and Incident Response training with this video tutorial on AWS EKS:How do you respond to a compromised EKS Container or Node?If you’ve identified a potentially compromised container in EKS, there are two potential ways forward:If the container is running on an underlying EC2, then refer to the suggested steps above for immediate actions.If the container is running ...

Cyber Social Hub

YouTube video

YouTube video

Digital Forensic Survival Podcast

Hacker Valley Blue

YouTube video

InfoSec_Bret

YouTube video

John Hammond

YouTube video

YouTube video

YouTube video

John Hubbard at ‘The Blueprint podcast

Karsten Hahn at Malware Analysis For Hedgehogs

YouTube video

Magnet Forensics

YouTube video

YouTube video

YouTube video

YouTube video

With the continued development of augmented and virtual reality, investigators in law enforcement and the private sector are starting to encounter crimes happening in the “Metaverse”. What methods can we use to extract data from Oculus devices and what challenges can we expect? This talk will dive into methods to get after the data from VR devices. We will discuss logical acquisitions, all the way to chip-off of an Oculus. Live demos with Oculus/Meta devices using Magnet AXIOM will be used durin...

All too often during an investigation, it comes to light that adversaries are leveraging existing remote access tools for initial access and lateral movement. This trend is continuously on the rise and tends to go unnoticed due to the lack of available logging or not understanding what the available logs provide. This talk will not only address the aforementioned, but I also will be sharing custom tools that have proved to be beneficial in analysis against some of the most sophisticated actors. ...

Mostafa Yahia

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

MSAB

YouTube video

SANS

YouTube video

YouTube video

SANS Cloud Security

YouTube video

YouTube video

The Cyber Mentor

YouTube video

The Defender’s Advantage Podcast