解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 36 – 2023 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

Alexis Brignoni

YouTube video

Black Hills Information Security

Brought to you by Antisyphon Training — //www.antisyphontraining.com Wrangling the M365 UAL with SOF-ELK on EC2 (Part 2 of 3) Talkin’ About Infosec News – 8/28/2023 Back to top Black Hills Information Security 890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447) © 2008-2023 About Us | BHIS Tribe of Companies | Privacy Policy | Contact Links Search the site

Brought to you by Antisyphon Training — //www.antisyphontraining.com Talkin’ About Infosec News – 8/21/2023 Follow Us Looking For Something? Browse by category Select Category Alyssa Snow (1) Ashley Van Hoesen (1) Author (400) Backdoors & Breaches (7) Beau Bullock (31) Ben Burkhart (1) Blue Team (86) Blue Team Tools (37) Brian Fehrman (16) Brian King (19) C2 (28) Cameron Cartier (1) Carrie Roberts (4) Chris Traynor (1) CJ Cox (7) Corey Ham (3) Craig Vincent (1) Dale Hobbs (3) Daniel Pizarro (1) ...

Breaking Badness

Cellebrite

YouTube video

cloudyforensics

Google Compute Engine Forensics & Incident ResponseForensic Labs·Follow5 days ago--ListenShareContinuing our series of videos on forenics in the cloud, today we’re talking about forensics and incident response in Google Compute Engine — the virtual machine offering from Google Cloud.Open Source Acquisition//github.com/google/cloud-forensics-utilsAcquiring GCP Compute Engine with CadoAcquiring with Cado//docs.cadosecurity.com/cado-response/discovery-import/import/gcp/engine-instanceGCP ForensicsG...

Cyborg Security

DEFCON

YouTube video

Digital Forensic Survival Podcast

Gerald Auger at Simply Cyber

YouTube video

Huntress

YouTube video

InfoSec_Bret

YouTube video

John Dwyer

YouTube video

John Hammond

YouTube video

LaurieWired

YouTube video

LetsDefend

YouTube video

Magnet Forensics

YouTube video

In Part 1 of this two-part Mobile Unpacked series, we explored the storage structures of the most popular file browser/storage applications in iOS and Android. In this part, we’ll dive deeper using these applications as our starting point to figure out how files got to where they ended up. This presentation will discuss file movement, modifications, deletion, attribution, and where you can go to track all of this information in the operating systems for iOS and Android to see exactly how far dow...

MSAB

YouTube video

Richard Davis at 13Cubed

YouTube video

SANS

YouTube video

SANS Cloud Security

YouTube video

YouTube video

YouTube video

YouTube video