解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 38 – 2023 - PRESENTATIONS/PODCASTS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

PRESENTATIONS/PODCASTS

0day in {REA_TEAM}

(1) [Case study] Decrypt strings using Dumpulator (1) [QuickNote.En] CobaltStrike SMB Beacon Analysis (1) [QuickNote] Analysis of malware suspected to be an APT attack targeting Vietnam (1) [QuickNote] Analysis of Pandora ransomware (1) [QuickNote] Another nice PlugX sample (1) [QuickNote] CobaltStrike SMB Beacon Analysis (1) [QuickNote] Decrypting the C2 configuration of Warzone RAT (1) [QuickNote] Emotet epoch4 & epoch5 tactics (1) [QuickNote] Examining Formbook Campaign via Phishing Emails (1...

Ali Hadi

YouTube video

YouTube video

Black Hat

YouTube video

Black Hills Information Security

YouTube video

Brought to you by Antisyphon Training — //www.antisyphontraining.com Wrangling the M365 UAL with SOF-ELK and CSV Data (Part 3 of 3) Back to top Black Hills Information Security 890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447) © 2008-2023 About Us | BHIS Tribe of Companies | Privacy Policy | Contact Links Search the site

YouTube video

Breaking Badness

Cellebrite

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

Cyber Social Hub

YouTube video

YouTube video

DEFCON

YouTube video

Desi at Hardly Adequate

YouTube video

Digital Forensic Survival Podcast

Dr Josh Stroschein

YouTube video

YouTube video

YouTube video

Dr. Meisam Eslahi at ‘Nothing Cyber’

YouTube video

Huntress

YouTube video

YouTube video

John Hammond

YouTube video

YouTube video

LetsDefend

YouTube video

Magnet Forensics

Most cloud investigations focus around host or endpoint data but there is a wealth of additional information available to an investigation if responders know where to look. The first logical place is CloudTrail logs but if an organization uses AWS Config, it contains a wealth of information that can compliment an investigation that is often overlooked. In this talk, we’ll show how you can pull data from AWS Config and use it in your next incident. After viewing this webinar, you can download a c...

MSAB

YouTube video

Paraben Corporation

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

YouTube video

Red Canary

Security Weekly

YouTube video

Sofia Marin

YouTube video

The Cyber Mentor

YouTube video

The Digital Forensics Files Podcast

The Digital Forensics Files PodcastSep 13, 2023Share00:0021:60Cole Popkin, Digital Forensics AnalystCole Popkin, of Popkin Consultations, is an enthusiastic digital forensics analyst who graduated from Davenport University with a Bachelor's Degree in Digital Forensics. He has worked with the Michigan State Police and the US Department of Homeland Security. Cole and Tyler Hatch, of DFI Forensics, discuss training, cases and the tools of the trade on this episode of the Digital Forensics Files Pod...

Rapid7

YouTube video