4n6 Week 33 – 2024 - MISCELLANEOUS
本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。
MISCELLANEOUS
Forensic Focus
John Hollenberger at Fortinet
By John Hollenberger | August 13, 2024 Let’s face it: Cyberthreats aren’t going anywhere. As technology continues to evolve and grow, so will the tactics and techniques used by threat actors. A recent report from Statista estimates the global cost of cybercrime to reach $15.63 trillion by 2029. To combat this, one of the most important things organizations can do is be prepared. According to the National Institute of Standards and Technology (NIST), the incident response life cycle can be broken...
Magnet Forensics
Are you looking to go deeper on a wide range of enterprise-style investigations? If you’re a user of Magnet Verakey, we’ve got the perfect course for you: Magnet Verakey Examinations (VK200)! VK200 will give you the skills and training necessary to improve your mobile device investigations by detailing the use of Magnet Verakey’s mobile device extraction capabilities combined with Magnet Axiom Cyber’s mobile analysis capabilities to help you improve your mobile device investigations. Modules wil...
MISP
- go to homepage Toggle Navigation Home Features Data Models Data Models MISP core format MISP taxonomies MISP Galaxy MISP Objects Default feeds Documentation Documentation Documentation OpenAPI Tools Support Contributing Research projects Research topics Legal License Legal and policy GDPR ISO/IEC 27010:2015 NISD Communities Download Events Upcoming events Past events Webinars Hackathon MISP Summit News Contact Reaching us Contact Us Press inquiries Professional Services Commercial Support Secu...
MWLab
SMB Decryption - TryHackMe 2024-08-14 #ctf #network #wireshark #crypto Recent TryHackMe room called “Block” inspired me to create this write-up. The task is to decrypt SMB3-encrypted communication. It turned out that sometimes we only need the captured network traffic to fulfill this task, while otherwise we need some additional info, such as user’s password or its NTLM hash. In this blog post, I would like to summarize three different approaches with practical hands-on exercises based on TryHac...
Kyrie Hale at OpenText
Remy Kullberg at Panther Labs
Remy Kullberg Aug 15, 2024 11 min read In any security program, the fundamental goals are the same: increase the scale, predictability, and reliability of the program while maintaining security controls. But as your organization and security needs mature, investing limited resources in the right place can prove as challenging as setting a risk threshold. In this blog, you’ll take a closer look at developing a dedicated detection engineering (DE) function within your security program. You’ll unde...
Salvation DATA
Knowledge 2024-08-15 Digital Forensics and Incident Response (DFIR) is an important part of defense that includes finding cyber dangers, looking into them, and taking steps to stop them. It is very important for keeping private data safe and making sure that IT systems work properly.Due to limited funds and resources, small companies often have trouble putting in place effective DFIR options. Professional tools can be very expensive and you may need to have a lot of special skills to use them. T...
Suzie at Metadata Forensics
Rookie Reflections: A Green Examiner’s Forensic Journey Into Cellebrite “The Journey of a thousand miles begins with one step” -Lao Tzu I came to Metadata Forensics from a local Police department in Georgia, and while I thoroughly enjoyed the “figure it out” education I accrued there. I was excited to start adding the letters to the end of my signature block that proves I know what I know. So, my first step of this thousand-mile journey would be Cellebrite’s Self-Paced Certified Operator “CCO” c...