Gesamtlänge aller Episoden: 6 days 55 minutes
This week I go over some Network Forensic artifacts and what they offer to an investigation.
This week I review two freely available forensic tools from Foxton Forensics
This week I talk about OLEDump, a malware analysis tool for investigating suspicious macros in MS Office documents
This week I talk about Cutter, a static malware analysis tool by Radare
This week I go over an easy way to get set-up to start using crypto-currency to testing \ validation \ and self-training purposes
This week I interview an industry expert about mobile device JTAG and ISP forensics.
This week I talk about the userassist artifact for file use and knowledge investigations.
This week I talk about resolving USB usage back to specific systems and user accounts.