Info

Digital Forensic Survival Podcast

Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
RSS Feed
Digital Forensic Survival Podcast
2024
March
February
January


2023
December
November
October
September
August
July
June
May
April
March
February
January


2022
December
November
October
September
August
July
June
May
April
March
February
January


2021
December
November
October
September
August
July
June
May
April
March
February
January


2020
December
November
October
September
August
July
June
May
April
March
February
January


2019
December
November
October
September
August
July
June
May
April
March
February
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August
July
June
May
April
March
February


All Episodes
Archives
Now displaying: Page 11
Jun 4, 2019

This week I talk about Intel's emerging technology called Optane end it anticipated affects on DFIR investigations.

May 28, 2019

This week I talk about OWASP's Number 8 vulnerability category from their top 10 list, insecure deserialization.

May 21, 2019

This week I talk about the crypto attack landscape.

May 14, 2019

DFIR are professionals often worry if advances in artificial intelligence and automation are going to put them out of work. This week I address the issue and give my projection, based on expert sources, of what the future of forensics will look like.

May 7, 2019

I recently passed my certified ethical hacker certification test. This week I thought I would talk about why I chose the certification.

Apr 30, 2019

This week I talk about OWASP's Number 7 vulnerability category from their top 10 list, cross site scripting.

Apr 23, 2019

This week I talk about SVCHOST. This Windows core process is one of the most targeted artifacts that comes up again and again during investigations.

Apr 16, 2019

This week I go over how to approach windows core processes from the standpoint of fast triage methodology. Since these processes are found on all window systems it makes sense to develop and investigative approach that focuses on quickly reviewing each process for anomalies.

Apr 9, 2019

This week I talk about the investigative value of creating a mobile compromise assessment strategy.

Apr 2, 2019

This week I share my thoughts on DFIR job interviews. How to prepare. Things to consider. Pitfalls to avoid.

Mar 26, 2019

This week I talk about OWASP's Number 6 vulnerability category from their top 10 list, Security Misconfiguration. I explore the issue from a DFIR point of view.

Mar 19, 2019

This week I talk about all the fun you can have ethically hacking with SET

Mar 12, 2019

Serpico makes report writing suck less! Check it out.

Mar 5, 2019

This week I talk more about Linux triage methods.

Feb 26, 2019

This week I talk about OWASP's Number 5 vulnerability category from their top 10 list, Broken Access Control. I explore the issue from a DFIR point of view.

Feb 19, 2019

This week I discuss some techniques for comparing files and folders for DFIR investigations.

Feb 12, 2019

This week I share my thoughts on assessing DFIR career path progression.

Feb 5, 2019

This week I talk about the forensic value of YARA.

Jan 29, 2019

This week I talk about OWASP's Number 4 vulnerability category from their top 10 list, XXE attacks. I explore the issue from a DFIR point of view.

Jan 22, 2019

This week I talk about the Google Hacking Database.

Jan 15, 2019

This week I talk about CEWL, a freely available tool for crawling websites to produce unique wordlists (think password attacks!)

Jan 8, 2019

This week I talk about my new Github page and the autoweb script.

Jan 3, 2019

This week I talk about Applocker Bypass from a DFIR point of view.

Dec 27, 2018

This week I talk about OWASP's Number 3 vulnerability category from their top 10 list, sensitive data exposure. I explore the issue from a DFIR point of view.

Dec 18, 2018

This week I talk about tips for building a threat hunting program.

1 « Previous 8 9 10 11 12 13 14 Next » 17