解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 09 – 2024 - MISCELLANEOUS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

MISCELLANEOUS

Marco Fontani at Amped

Marco Fontani February 28, 2024 Reading time: 10 min DeepPlate is our new AI-based license plate reading service for investigative use. It currently supports 8 countries and is freely accessible for users with a valid Amped FIVE SMS plan through the Amped Support Portal. Dear Amped friends, we’re super excited to share some great news! Starting today, we’re launching DeepPlate, an online system for AI-powered reading of severely degraded license plates (for investigative purposes only). Keep rea...

Brian Yonek

Report this article Brian Yonek Brian Yonek Published Feb 23, 2024 + Follow In the realm of cybersecurity, being prepared is not just a recommendation; it's a necessity. With the ever-evolving landscape of cyber threats, organizations must have a robust plan in place to effectively respond to incidents when they occur. This is where the Incident Response Lifecycle comes into play, providing a structured approach to handling security breaches. In this blog post, we'll delve into the first phase o...

Dr. Tristan Jenkinson at ‘The eDiscovery Channel’

COPA v Wright – An Animated End to Craig Wright’s Satoshi Claims?? Tristan Jenkinson Uncategorized February 27, 2024February 27, 2024 8 Minutes By Dr Tristan Jenkinson Introduction For those who know me and have seen my previous posts on Craig Wright, it will probably come as no surprise that I have been following the COPA v Wright case pretty closely. While I have sadly been too busy to watch the live stream, I have been following along with the live tweets to keep up to date with the proceedin...

Elan at DFIR Diva

Posted on February 29, 2024 by DFIR Diva Free and Affordable Training News 0 The following contains newly released Digital Forensics, Incident Response, Malware Analysis and OSINT training and books from February, as well as upcoming live online training for March. Like the Free & Affordable Training Site, everything in this blog post is under $1,000. Note: Purchases made through affiliate/partner links and/or using personalized discount codes is one of the things I rely on to be able to keep th...

Marvin Ngoma at Elastic

How Elastic Security is used in Locked Shields; one of the worlds largest cyber defense exercises.ByMarvin Ngoma29 February 2024Table of contentsShare on TwitterShare on LinkedInShare on FacebookShare by emailPrintThis blog is part 2 of a previous blog, which introduced Locked Shields. It gives a brief overview of how Elastic® is typically set up during Locked Shields. There is also a focus on the meticulously executed comprehensive series of attack simulations on systems housing critical infras...

Fabian Mendoza at AboutDFIR

AboutDFIR Site Content Update – 03/01/2024 By Fabian MendozaOn March 1, 2024February 27, 2024 Jobs – old entries cleaned up, new entries added – JetBlue, Kaseya, Palo Alto Networks Unit 42, Rapid7, Secureworks, Soteria, Sygnia Tools & Artifacts – Android – new entry added – WhatsApp – Investigating Android WhatsApp Tools & Artifacts – AWS – new entry added – AWS Incident Response – AWS Ransomware Tools & Artifacts – Microsoft 365 – new entry added – MailItemsAccessed – MailItemsAccessed Woes: M3...

Forensic Focus

Hex Rays

Posted on: 26 Feb 2024 By: Geoffrey Czokow Categories: News Tags: A handful of our users have already requested information regarding the Qt 5.15.2 build, that is shipped with IDA 8.4. The Qt sources used by IDA are: based on Qt 5.15.2, to which the KDE Qt5 patch collection has been added, plus a few custom patches/fixes Rebuilding Qt from source In order to obtain compatible libs, the simplest way forward is to download the full archive – it contains the original 5.15.2 source + KDE patches + H...

Kevin Pagano at Stark 4N6

Posted by Kevin Pagano March 01, 2024 Get link Facebook Twitter Pinterest Email Other Apps Shortlink: startme.stark4n6.comQR Code:If people have suggestions for additions please feel free to shoot me a message on the app formerly known as Twitter (@KevinPagano3) or Mastodon.Blog FeedStories by Shlomi BoutnaruCipher & Decoding ToolsSteganography - 0xRick's BlogMemory / RAM ToolsVolatility BinariesOSINT ToolsJimpl - Online EXIF data viewerSANS PostersFOR528 - Ransomware and Cyber ExtortionYouTube ...

Magnet Forensics

As with many things, seeing is believing. To help add important context to your reports and testimony in court, we have introduced Animated Maps in Magnet AXIOM and AXIOM Cyber. With Animated Maps, you can now show the movements of subjects based on the geolocation information from device data, combining location and timestamp data to show the path a device owner takes for a given time frame. The ability to easily animate map routes mitigates time-consuming and labor-intensive manual processes r...

From its inception, Magnet OUTRIDER was designed to be a lightweight triage tool focused on ICAC investigations, emphasizing identifying files and applications of interest – across a broad set of evidence sources – and providing actionable results quickly. As devices have grown in storage capacity, searching the hashes of all available media can be time-consuming. Our new patent pending MAG24 hashing and matching format provides a faster option for triaging media using VICS and CAID hash lists. ...

With the depth, variety, and volume of evidence in modern cases, developing engaging reports that effectively tell the story of the case for stakeholders, including those that aren’t technical, is a persistent challenge. Magnet Exhibit Builder provides a fast and intuitive new option to elevate your digital forensic reports, combining forensic data from AXIOM case files and all other external data sources using versatile word processing tools to quickly build comprehensive reports for a range of...

Matt Linton

SANS

Alison Kim A Visual Summary of SANS OSINT Summit 2024 Check out these graphic recordings created in real-time throughout the event for SANS OSINT Summit 2024 February 27, 2024 On Feb 29-Mar 1, attendees joined us in Arlington, VAÂ or tuned in Live Online for the SANS Open-Source Intelligence (OSINT) Summit!We invited Ashton Rodenhiser of Mind's Eye Creative to create graphic recordings of our Summit presentations. If you missed a talk or are looking to view the Summit through a visual lens, take...

A Tale of the Three ishings: Part 02 – What is Smishing? Lance Spitzner A Tale of the Three ishings: Part 02 – What is Smishing? Smishing is one of the primary attack methods used today simply because it works. March 1, 2024 For the past twenty years, we in the security industry have focused on how to use technology to secure technology, and we are getting pretty good at it. Unfortunately, organizations have often ignored the human factor in cybersecurity. As a result, cyber attackers have...

Security Onion

We've been offering our Security Onion documentation in book form on Amazon for a few years and it's now been updated for the recently released Security Onion 2.4.50!Thanks to Richard Bejtlich for writing the inspiring foreword!Proceeds go to the Rural Technology Fund!This edition has been updated for Security Onion 2.4.50 and includes a 20% discount code for our on-demand training and certification!This book covers the following Security Onion topics:First Time UsersGetting StartedSecurity Onio...

Teri Radichel

David González Cuautle at WeLiveSecurity

Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor David González Cuautle 29 Feb 2024 • , 7 min. read Do you ever play computer games such as Halo or Gears of War? If so, you’ve definitely noticed a game mode called Capture the Flag that pits two teams against each other – one that is in charge of protecting the flag from adversaries who attempt to steal it. This type of exercise is also used by organizations to ga...