podcast's link to fyyd.de
podcast's link to fyyd.de (short)
redirect to podcast's page (short)
Embed code for the latest episode (iframe)
This week I talk utilizing the ExploitDB for DFIR investigations. Searchsploit is a command line search tool for Exploit-DB that allows you the power to perform detailed off-line searches through your locally checked-out copy of the repository....
episode's link to fyyd.de
episode's link to fyyd.de (short)
redirect to episode's page (short)
Embed code (iframe)
This week is the last part of the Persistence-Fast-Triage mini-series. The final installation covers Windows startup locations.
This week I talk about the IR Investigation Lifecycle, or, the elements included within the incident handling process to ensure a complete investigation.
This week I talk about the use of RUNDLL32 to exploit information files (.INF) to "fetch and execute" malware.
This week is part 3 of examining the Windows Registry for evidence of persistence and the focus is on Windows Registry Modification Event Records.
This week I talk about detecting time stomping on Windows and Linux systems.
This week I talk about examining the Windows Registry for evidence of persistence.
This week I interview JASON ROSLEWICZ of SUMURI about the hardware that drives your forensics system.
This week is part 3 of the Mobile Attack series.