Info

Digital Forensic Survival Podcast

Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
RSS Feed
Digital Forensic Survival Podcast
2024
March
February
January


2023
December
November
October
September
August
July
June
May
April
March
February
January


2022
December
November
October
September
August
July
June
May
April
March
February
January


2021
December
November
October
September
August
July
June
May
April
March
February
January


2020
December
November
October
September
August
July
June
May
April
March
February
January


2019
December
November
October
September
August
July
June
May
April
March
February
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April
March
February


All Episodes
Archives
Now displaying: 2018
Dec 27, 2018

This week I talk about OWASP's Number 3 vulnerability category from their top 10 list, sensitive data exposure. I explore the issue from a DFIR point of view.

Dec 18, 2018

This week I talk about tips for building a threat hunting program.

Dec 11, 2018

This week I break down webshells for threat hunting and incident response triage.

Dec 4, 2018

This week I talk about contacting Mimikatz through windows event log.

Nov 27, 2018

This week I talk about PDF analysis tools to check for malicious indictors in PDFs.

Nov 20, 2018

This week I talk about OWASP and why you should be paying attention.

Nov 13, 2018

Tips from the DFIR Trenches

Nov 6, 2018

This week I breakdown CRON for the uninitiated.

Oct 30, 2018

This week I talk about investigation strategies for logon events.

Oct 23, 2018

This week I talk about PCAP hunting strategies.

Oct 16, 2018

This week I interview Craig Rowland of Sandfly Security about crypto-mining attacks on Linux systems.

Learn more about Sandfly at https://www.sandflysecurity.com

Oct 9, 2018

This week I talk about OWASP and why you should be paying attention.

Oct 2, 2018

This week I talk about the attack methodology known as Fast Flux.

Sep 25, 2018

This week I talk about details about what to look at in Scheduled Task records for forensic triage.

Sep 18, 2018

This week I talk about details about what to look at in Scheduled Task records for forensic triage.

Sep 11, 2018

This week I talk OfficeMalScanner, a malware scanner for Microsoft document

Sep 4, 2018

This week I talk Ultimate windows security

Aug 28, 2018

This week I talk about methodologies to investigate root cause during incident response investigations.

Aug 21, 2018

This week I talk about PIDS in their uses and computer forensic investigations.

Aug 14, 2018

This week I talk about scoping network connections as part of incident response triage

Aug 7, 2018

This week I talk more excel fu tips

Jul 31, 2018

This week I talk the difference between common text processing utilities used in forensic analysis

Jul 24, 2018

This week I talk about DNS and forensics

Jul 17, 2018

This week I talk about the value of Grep as a forensic skillset

Jul 10, 2018

This week I talk about distributed password cracking with Hashtopolis for Hashcat

1 2 3 Next »