解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 35 – 2023 - MISCELLANEOUS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

MISCELLANEOUS

ADF Solutions

Posted by ADF Solutions on August 25, 2023 Find me on: Facebook LinkedIn Twitter Tweet Cell phones are used for communication, entertainment, and even as essential tools for work. With the widespread usage of smartphones, law enforcement, and digital forensics professionals have recognized the significance of capturing digital evidence from these devices. By taking screenshots, investigators can secure valuable information present on the device, ensuring it is not lost or altered. Mobile Device ...

Belkasoft

Loading... Company About News Customers Partners Contact Us Contacts +1 (650) 272-03-84 (USA and Canada) 702 San Conrado Terrace, Unit 1Sunnyvale CA 94085, USA support@belkasoft.com sales@belkasoft.com Subscribe to the newsletter Be the first to receive product updates and company news. Name * Error! Required field E-mail * Error! Required field Subscribe © 2002-2023 Belkasoft® Terms of use Privacy policy Public offer

Introduction Hashset analysis is a big time-saver in both criminal and cybersecurity investigations. Whether you want to find illicit images without browsing through them or quickly detect known malicious files—this intelligent tool can help you handle the job. While publicly available hashset databases like National Software Reference Library (NSRL) and ProjectVic help streamline your searches, creating your own hashset databases can aid in cross-checking multiple cases and sharing your experie...

Patterson Cake at Black Hills Information Security

Patterson Cake // Wrangling the M365 UAL with SOF-ELK on EC2 In PART 1 of “Wrangling the M365 UAL,” we talked about the value of the Unified Audit Log (UAL), some of the challenges associated with acquisition, parsing, and querying of the UAL data, and strategies for overcoming those challenges using PowerShell and SOF-ELK, focusing on how to properly format our exported data for easy ingestion into SOF-ELK, running as a locally-installed virtual machine. In this post, we’ll look at spinning up ...

Ariel Watson at Cellebrite

Delivr.to

delivr.to·Follow9 min read·5 days ago--ListenShareHave you squeezed everything you can out of your Microsoft email stack? Is everything dialed in to maximise its effectiveness? Follow this guide to find out.Optionally pair this guide with delivr.to to see the fruits of your labor in real-time and blast malware out of your inbox 🔫Want to know what files you can block from the get-go to massively reduce your attack surface? Skip straight there to find out!The labTo give it that new car smell, we’l...

Oleg Afonin at Elcomsoft

August 22nd, 2023 by Oleg AfoninCategory: «General» Have you ever tried to unlock a password but couldn’t succeed? This happens when the password is really strong and designed to be hard to break quickly. In this article, we’ll explain why this can be a tough challenge and what you can do about it. I’ve been running a password recovery attack for a while now, and the attack appears stalled. What should I do? If the attack is taking a long time without success, this means that the data is protect...

Forensic Focus

Kaido Järvemets

Visualizing Mindmaps with Markmap in Visual Studio Code Kaido Järvemets August 23, 2023 IntroductionOne of the challenges when working with large sets of data or complex processes is visually representing them in an easy-to-understand format. Mindmaps can help! If you’re a Visual Studio Code (VSCode) user, then you’re in for a treat. With the Markmap extension for VSCode, you can visualize mindmaps effortlessly. In this blog, we’ll explore how to get started with the Markmap extension and even d...

Magnet Forensics

We’re excited to share the news that Magnet Forensics has acquired Griffeye! Griffeye is recognized by law enforcement agencies worldwide for its powerful digital investigation suite, Griffeye Analyze, which has proven exceptionally helpful for investigators working on child exploitation cases. At its core, the suite offers advanced image and video analysis capabilities, including image categorization, video playback, and facial recognition. With Griffeye now becoming a part of Magnet Forensics,...

Dan Wire, Neil Karan, Jennifer S. Burnside, Jill C. Tyson, Matthew Ford, Marmara El Masri, and Howard Israel at Mandiant

Blog SEC Cybersecurity Disclosure Regulations: 7 Essential Steps to Prepare Your Whole Organization for a Cyber IncidentDan Wire, Neil Karan, Jennifer S. Burnside, Jill C. Tyson, Matthew Ford, Marmara El Masri, Howard Israel Aug 23, 20237 min read | Last updated: Aug 25, 2023 Security EffectivenessOn July 26, 2023, the U.S. Securities & Exchange Commission (SEC) adopted a new rule (“rule” or “regulations”) enhancing disclosure requirements regarding cybersecurity readiness and incident reporting...

Maxim Suhanov

CVE-2023-4273: a vulnerability in the Linux exFAT driver August 23, 2023August 24, 2023 ~ msuhanov According to the exFAT file system specification, the maximum length of a file name is 255 characters (UTF-16LE): The FileName field shall contain a Unicode string, which is a portion of the file name. In the order File Name directory entries exist in a File directory entry set, FileName fields concatenate to form the file name for the File directory entry set. Given the length of the FileName fiel...

Timur Engin at Microsoft’s ‘Security, Compliance, and Identity’ Blog

MISP

  • go to homepage Toggle Navigation Home Features Data Models Data Models MISP core format MISP taxonomies MISP Galaxy MISP Objects Default feeds Documentation Documentation Documentation OpenAPI Tools Support Contributing Research projects Legal License Legal and policy GDPR ISO/IEC 27010:2015 NISD Communities Download Events Upcoming events Past events Webinars Hackathon MISP Summit News Contact Reaching us Contact Us Press inquiries Professional Services Commercial Support Security Matters Who...

MSAB

/ Updates / MSAB offers computer forensics through Detego, find product sheet here The dynamic partnership between MSAB and Detego Global provides a comprehensive digital forensics solution that covers mobile devices and computers to simplify your investigations and helps to make the world a safer place. Download product sheet Written by: MSAB25 August, 2023 Share this page: Related Updates 24 August, 2023 Now out – XRY 10.6.1 Release: Support for iOS 17 beta, wider device range, and multiple ap...

Konstantinos Pantazis at NVISO Labs

Konstantinos Pantazis Adversary Emulation, Purple Team August 25, 2023August 24, 2023 11 Minutes Target Audience The target audience for this blog post is individuals who have a basic understanding of cybersecurity concepts and terminology and looking to expand their knowledge on adversary emulation. This post delves into the details of adversary emulation with the Caldera framework exploring the benefits it offers. By catering to a beginner to intermediate audience, the blog post aims to strike...

Jason Downey at Red Siege Information Security

Salvation DATA

Knowledge 2023-08-24 Content Introduction Types of Crimes Solved Through Cyber Forensics Techniques and Tools Used in Cyber Forensics Benefits of Cyber Forensics Ethical Considerations Conclusion Content Introduction Types of Crimes Solved Through Cyber Forensics Techniques and Tools Used in Cyber Forensics Benefits of Cyber Forensics Ethical Considerations Conclusion Introduction Cyber forensics, often known as digital forensics, is an essential subfield of forensic science concerned with the a...