Digital Forensic Survival Podcast

Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.

http://digitalforensicsurvivalpodcast.libsyn.com/podcast

Eine durchschnittliche Folge dieses Podcasts dauert 17m. Bisher sind 451 Folge(n) erschienen. Dies ist ein wöchentlich erscheinender Podcast.

Gesamtlänge aller Episoden: 5 days 23 hours 33 minutes

subscribe
share






DFSP # 426 - SSH Forensics: Log Analysis


This week I'm wrapping up my series on SSH forensics with a discussion on SSH log triage. Logs are usually what an analyst will start with, so this episode is important. There are a few different log types, and there is a pitfall with one of them,...


share








   22m
 
 

DFSP # 425 - SSH Forensics: Host-Based Artifacts


In the last episode on this topic, I covered SSH from a investigation point of view. I explained SSH and the artifacts that typically come up when your investigating. In this episode, we're getting into the triage methodology. This includes the...


share








   30m
 
 

DFSP # 424 - SSH Forensics: Understanding Secure Shell


SSH is a protocol used to secure remote access to systems, making it a cornerstone in safeguarding sensitive information and ensuring secure communications. In this podcast, we will delve into the basics of SSH, its key concepts and other useful...


share








   23m
 
 

DFSP # 423 - Guiding Lights: Cyber Investigations Investigation Lifecycle


This week I'm discussing a fundamental aspect of cybersecurity: incident response preparation. Effective incident response is paramount, and preparation is the key to success. This preparation includes comprehensive documentation, training, having the...


share








   30m
 
 

DFSP # 422 - EVTX Express: Cracking into Windows Logs Like a Pro


Today I'm talking Windows forensics, focusing on Windows event logs. These logs are very valuable for fast triage, often readily available in your organization's SIEM. But have you ever wondered about the processes enabling this quick access? Not only...


share








 March 19, 2024  21m
 
 

DFSP # 421 - Memory Lane: Fileless Linux Attacks Unraveled


In this podcast episode, we talk about Linux's `memfd` – a virtual file system allowing the creation of anonymous memory areas for shared memory or temporary data storage. Threat actors exploit `memfd` for fileless malware attacks, as its memory...


share








 March 12, 2024  25m
 
 

DFSP # 420 - Failing, Stopping and Crashing


This week we explore into the world of Windows service event codes and their role in forensic investigations. Windows services are background processes crucial for system functionality, running independently of user interaction- making them ideal....


share








 March 5, 2024  22m
 
 

DFSP # 419 - What the Flux


This week, we're delving into the realm of fast flux, a cunning technique employed by attackers to cloak their true, malicious domains. Its effectiveness is the reason behind its widespread use, making it crucial for analysts to grasp its nuances and...


share








 February 27, 2024  27m
 
 

DFSP # 418 - Core Insights: Navigating MFT in Forensics


In this week's exploration, I'm delving into the intricate realm of the Master File Table (MFT), a pivotal forensic artifact in Windows investigations. The MFT provides a valuable gateway to decode evidence across various scenarios. Join me in this...


share








 February 20, 2024  22m
 
 

DFSP # 417 - Unlocking Linux Secrets


This week I delve into the intriguing domain of Linux malware triage. The Linux platform presents forensic analysts with a unique opportunity to excel in performing malware triage effortlessly. The beauty of it lies in the fact that you don't require...


share








 February 13, 2024  32m