Info

Digital Forensic Survival Podcast

Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
RSS Feed
Digital Forensic Survival Podcast
2019
August
July
June
May
April
March
February
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April
March
February


All Episodes
Archives
Now displaying: Page 1
Aug 20, 2019

This week I talk about using WMI to create processes remotely.

Aug 13, 2019

This week I talk about Density Scout, an open source tool for malware triage.

Aug 6, 2019

This week I cover a resource you can use to develop windows remote execution triage methodology and threat hunting.

Jul 30, 2019

This week I talk about the Windows credential guard process.

Jul 23, 2019

This week I talk about OWASP's Number 10 vulnerability category from their top 10 list, insufficient logging and monitoring.

Jul 16, 2019

This week I talk about the most frequently seen attacker recon commands.

Jul 9, 2019

This week I talk about a popular Windows utility attackers often exploit.

Jul 2, 2019

This week I talk about incident response in container deployments.

Jun 25, 2019

This week I talk about OWASP's Number 9 vulnerability category from their top 10 list, components with known vulnerabilities.

Jun 18, 2019

This week I talk about the challenges of working with VMEM files for memory forensics.

Jun 11, 2019

This week I talk about the DFIR changes on the horizon with cloud technology.

Jun 4, 2019

This week I talk about Intel's emerging technology called Optane end it anticipated affects on DFIR investigations.

May 28, 2019

This week I talk about OWASP's Number 8 vulnerability category from their top 10 list, insecure deserialization.

May 21, 2019

This week I talk about the crypto attack landscape.

May 14, 2019

DFIR are professionals often worry if advances in artificial intelligence and automation are going to put them out of work. This week I address the issue and give my projection, based on expert sources, of what the future of forensics will look like.

May 7, 2019

I recently passed my certified ethical hacker certification test. This week I thought I would talk about why I chose the certification.

Apr 30, 2019

This week I talk about OWASP's Number 7 vulnerability category from their top 10 list, cross site scripting.

Apr 23, 2019

This week I talk about SVCHOST. This Windows core process is one of the most targeted artifacts that comes up again and again during investigations.

Apr 16, 2019

This week I go over how to approach windows core processes from the standpoint of fast triage methodology. Since these processes are found on all window systems it makes sense to develop and investigative approach that focuses on quickly reviewing each process for anomalies.

Apr 9, 2019

This week I talk about the investigative value of creating a mobile compromise assessment strategy.

Apr 2, 2019

This week I share my thoughts on DFIR job interviews. How to prepare. Things to consider. Pitfalls to avoid.

Mar 26, 2019

This week I talk about OWASP's Number 6 vulnerability category from their top 10 list, Security Misconfiguration. I explore the issue from a DFIR point of view.

Mar 19, 2019

This week I talk about all the fun you can have ethically hacking with SET

Mar 12, 2019

Serpico makes report writing suck less! Check it out.

Mar 5, 2019

This week I talk more about Linux triage methods.

1 2 3 4 5 6 7 Next » 8