解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 08 – 2024 - FORENSIC ANALYSIS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

FORENSIC ANALYSIS

Forensafe

23/02/2024 Friday WhatsApp is a cross-platform application owned by Facebook. The platform supports sending and receiving text and voice messages, photos, documents, videos, and locations. Android WhatsApp provides all these features along with voice and video calls for one-to-one chats and group chats. Digital Forensics Value of Android WhatsApp Since its early beginnings and till today, WhatsApp remains the market leader and one of the top-ranking messaging applications globally. According to ...

Lionel Notari

iOS Unified Logs - WiFi and AirPlane ModeDernière mise à jour : il y a 3 joursIn the dynamic realm of iOS functionality, the Control Center emerges as a pivotal interface, offering users seamless access to critical device settings and utilities. Among its array of features, Wifi and Airplane Mode stand out as fundamental components, pivotal for managing connectivity and device operation.However, the Control Center is not the sole avenue for managing these functions; Wifi and Airplane Mode can al...

Stephan Berger

21 Feb 2024 Table of Contents Background Reconnaissance Deletion of Buckets You call it recovery - I call it scam Summary Background A customer contacted us reporting that an attacker had deleted several AWS S3 buckets (before allegedly downloading the data). Subsequently, the attacker left a ransom note (depicted below, sensitive information has been redacted). In this blog, we examine a recovery binary left behind by the attackers after deleting the buckets and show that the binary is nothing ...

Teri Radichel

The Sleuth Sheet

Tyler Hudak at TrustedSec

February 22, 2024 MailItemsAccessed Woes: M365 Investigation Challenges Written by Tyler Hudak Office 365 Security Assessment Incident Response & Forensics Email compromises within Microsoft 365 are too common these days. The TrustedSec Incident Response team receives a lot of calls to investigate M365 email breaches, and one (1) of the most common investigation goals is to determine what the attacker accessed within the victim’s email. Unfortunately, this is not an easy thing to do, and it’s im...