Digital Forensic Survival Podcast

Digital Forensic Survival Podcast

  • 18 minutes 20 seconds
    DFSP # 430 - Targeting Tasks

    Windows Scheduled Tasks are often used by attackers to establish persistence. As an analyst, you want to be aware of the different windows event codes that record these details. These artifacts come up in just about every windows compromise assessment, consider them core triage skills. There are several events, all of which I will go over in this episode. I will break them down from a DFIR point of view and give you the triage methodology...

    14 May 2024, 10:04 am
  • 22 minutes 12 seconds
    DFSP # 429 - Career Moves

    This week I talk about career moves for the DFIR professional. The skill set is valuable, but it must be combined with the right additional technical skills to maximize future job opportunities. Of course, there is one skill set that stands out above the rest...

    7 May 2024, 9:59 am
  • 27 minutes 32 seconds
    DFSP # 428 - It’s all about that XML

    When you're triaging a Windows system for evidence of compromise, it's ideal if your plan is focused on some quick wins upfront. There are certain artifacts that offer this opportunity, and Windows Events for New Scheduled Tasks are one of them. Sometimes overlooked, at least in part, because the good stuff contained within the XML portion of the log. This week I'm covering the artifact from a DFIR point of view, I'll go over all the elements of the log entry that are of interest for investigations, and I'll provide a triage methodology that you can employ to find evidence quickly.

    30 April 2024, 12:06 pm
  • 31 minutes 47 seconds
    DFSP # 427 - MOF Balls

    Windows management instrumentation, also known as WMI, is an App on Windows that allows a user to query all sorts of things about a system. Being native to Windows, it is an attractive target for a attackers to leverage. This week I'll break down the artifact from a DFIR point of a few and talk about how to detect its misuse.

    23 April 2024, 12:02 pm
  • 22 minutes 4 seconds
    DFSP # 426 - SSH Forensics: Log Analysis

    This week I'm wrapping up my series on SSH forensics with a discussion on SSH log triage. Logs are usually what an analyst will start with, so this episode is important. There are a few different log types, and there is a pitfall with one of them, which is something you must be aware of to avoid making inaccurate conclusions. I'll provide the artifact breakdown, triage methodology, and more.

    16 April 2024, 11:58 am
  • 30 minutes 54 seconds
    DFSP # 425 - SSH Forensics: Host-Based Artifacts

    In the last episode on this topic, I covered SSH from a investigation point of view. I explained SSH and the artifacts that typically come up when your investigating. In this episode, we're getting into the triage methodology. This includes the artifacts targeted for a fast, but yet effective triage for notable SSH activity on a given host.

    9 April 2024, 11:54 am
  • 23 minutes 12 seconds
    DFSP # 424 - SSH Forensics: Understanding Secure Shell

    SSH is a protocol used to secure remote access to systems, making it a cornerstone in safeguarding sensitive information and ensuring secure communications. In this podcast, we will delve into the basics of SSH, its key concepts and other useful elements important for context when investigating for notable SSH activity.

    2 April 2024, 11:48 am
  • 30 minutes 51 seconds
    DFSP # 423 - Guiding Lights: Cyber Investigations Investigation Lifecycle

    This week I'm discussing a fundamental aspect of cybersecurity: incident response preparation. Effective incident response is paramount, and preparation is the key to success. This preparation includes comprehensive documentation, training, having the right tools and resources in place, and developing incident response plans and playbooks. It also involves ensuring clear communication protocols and conducting regular training and testing. 

    I'll explore preparation from the perspective of the investigation life cycle, where success is the reward for preparation. Join me as I uncover the importance of preparation in incident response and how it lays the foundation for success in investigations.

    26 March 2024, 5:00 am
  • 21 minutes 7 seconds
    DFSP # 422 - EVTX Express: Cracking into Windows Logs Like a Pro

    Today I'm talking Windows forensics, focusing on Windows event logs. These logs are very valuable for fast triage, often readily available in your organization's SIEM. But have you ever wondered about the processes enabling this quick access? Not only are the logs automatically collected and fed into the appliance, but they are also formatted and normalized for easy data searchability. This is crucial, as the logs are originally in a complex format challenging to natively interpret. Now, picture a scenario where event logs are inaccessible through a security appliance—enter this week's topic: EVTX analysis options. Don't be caught unprepared.

    19 March 2024, 5:54 am
  • 25 minutes 42 seconds
    DFSP # 421 - Memory Lane: Fileless Linux Attacks Unraveled

    In this podcast episode, we talk about Linux's `memfd` – a virtual file system allowing the creation of anonymous memory areas for shared memory or temporary data storage. Threat actors exploit `memfd` for fileless malware attacks, as its memory areas exist only in RAM, evading traditional file-based detection methods. Join me as I `memfd` as a forensic artifact, its implications in DFIR, and strategies for detecting its abuse.

    12 March 2024, 5:49 am
  • 22 minutes 30 seconds
    DFSP # 420 - Failing, Stopping and Crashing

    This week we explore into the world of Windows service event codes and their role in forensic investigations. Windows services are background processes crucial for system functionality, running independently of user interaction- making them ideal. Target were exploitation. Join me to explore the intricate details of Windows services and their significance in digital forensics.

    5 March 2024, 5:34 am
  • More Episodes? Get the App
© MoonFM 2024. All rights reserved.