解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 18 – 2024 - FORENSIC ANALYSIS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

FORENSIC ANALYSIS

Alexander Tasse

Justin Seitz at Bullsh*t Hunting

www.bullshithunting.comCopy linkFacebookEmailNoteOtherFront Porch Digital ForensicsTrap beats, open loops and Dirty Daves spell trouble for our forensicators.Justin SeitzMay 01, 20245Share this postFront Porch Digital Forensicswww.bullshithunting.comCopy linkFacebookEmailNoteOtherShareOn the front porch of the rented house, I pressed my feet against the rail. They felt the rumble of an approaching trap beat before I could hear it. I closed the final pages of Chris Fabricant’s excellent “Junk Sci...

Digital Daniela

0 Comments Read Now Hello All!I did this TryHackMe room where I used the command line in Linux to analyze an apache log file. Here is a writeup of what I did. Use cut on the apache.log file to return only the URLs. What is the flag that is returned in one of the unique entries?I used the below command to find the answer. The flag, which is the answer is highlighted in yellow. The number 7 is used to extract URLs. I then used the sort option with the -n parameter to sort the URLs . The -n paramet...

Dr. Tristan Jenkinson at ‘The eDiscovery Channel’

Hexordia CTF - Week 2 Zodiac Killer - Z340 Cipher Cracked After 50 Years Nothing’s DKIMpossible - Manually Verifying DKIM, a CTF Solution, and Implications Hexordia CTF – Week 1 Archives Select Month May 2024 (1) April 2024 (2) February 2024 (3) January 2024 (4) October 2023 (1) September 2023 (1) August 2023 (2) May 2023 (1) February 2023 (1) January 2023 (2) July 2022 (1) February 2022 (1) August 2021 (1) April 2021 (3) February 2021 (2) December 2020 (3) November 2020 (1) September 2020 (1) A...

Elcomsoft

All You Wanted To Know About iOS BackupsResource Management in Distributed Password AttacksBootloader-Level Extraction for Apple HardwareNavigating NVIDIA's Super 40-Series GPU Update: A Guide for IT ProfessionalsWhen Extraction Meets Analysis: Cellebrite Physical AnalyzerForensically Sound Cold System AnalysisA Comprehensive Guide to Essential Tools for Elcomsoft iOS Forensic ToolkitiOS Forensic Toolkit 8 Lands on WindowsMore... Events Official site About us Home Categories GeneralElcomsoft New...

The Implications of Resetting the Screen Lock Passcode in iOS ForensicsAll You Wanted To Know About iOS BackupsResource Management in Distributed Password AttacksBootloader-Level Extraction for Apple HardwareNavigating NVIDIA's Super 40-Series GPU Update: A Guide for IT ProfessionalsWhen Extraction Meets Analysis: Cellebrite Physical AnalyzerForensically Sound Cold System AnalysisA Comprehensive Guide to Essential Tools for Elcomsoft iOS Forensic ToolkitiOS Forensic Toolkit 8 Lands on WindowsMor...

Eric Capuano

blog.ecapuano.comCopy linkFacebookEmailNoteOtherPrefetch Analysis LabAnalyze evidence of execution artifacts from a data breach investigation.Eric CapuanoApr 29, 202415Share this postPrefetch Analysis Labblog.ecapuano.comCopy linkFacebookEmailNoteOtherShareWhat is Prefetch?In the world of digital forensics, Windows Prefetch files are a goldmine of information for investigators looking to understand program execution behavior. Prefetch files, automatically generated by Windows, are designed to sp...

Forensafe

03/05/2024 Friday Connecting to Wi-Fi networks on your Apple device such as iPhone, allows you to save that network's information for future use. This feature is very useful for frequently used networks in certain locations, like your home, workplace, or gym. By saving these networks, you avoid the hassle of repeatedly entering passwords, ensuring effortless and automatic connection. However, managing these saved networks, including deletion, is entirely in your hands, by default, this informati...

Huntress

LOLBin to INC RansomwareByDownload YourFirst nameLast NameEmailTitleStay up to date with HuntressPrivacy PolicyThank you! Your submission has been received!Oops! Something went wrong while submitting the form.HomeBlogLOLBin to INC RansomwareMay 1, 2024LOLBin to INC RansomwareBy: Harlan Carvey|Contributors:ShareBackgroundHuntress analysts have previously observed INC ransomware being deployed, and recently observed this specific ransomware variant being deployed in a customer environment. The ran...

Lorena Carthy-Wilmot

Marco Neumann at ‘Be-binary 4n6’

Hi everyone :-)It's now a few years ago that I've written my last post here. But now, finally, I decided to restart my work and sharing here.Today I want to share my knowledge or better analysis results on the app K-9 Mail for Android.It's a nice, open source, multi-account mail program - developed by Mozilla - so the Android version of Thunderbird . In the last few years I had a few cases, where this app was used as mail app on Android devices.Android-Version: Android 13App-Version: 6.802Used t...

Microsoft Security

Skip to main contentMicrosoftMicrosoft 365TeamsCopilotWindowsSurfaceXboxDealsSmall BusinessSupportMoreAll MicrosoftOfficeWindowsSurfaceXboxDealsSupportSoftwareWindows AppsOneDriveOutlookSkypeOneNoteMicrosoft TeamsMicrosoft EdgePCs & Devices ComputersShop XboxAccessoriesVR & mixed realityPhonesEntertainmentXbox Game Pass UltimateXbox Live GoldXbox gamesPC gamesWindows digital gamesMovies & TVBusinessMicrosoft AzureMicrosoft Dynamics 365Microsoft 365Microsoft IndustryData platformMicrosoft Adverti...

Salim Salimov

The DFIR Report