PodGrabber.com
PodGrabber Logo/Mascot - Blue Gorilla with Red Headphones

Digital Forensic Survival Podcast - Archive

Generated 2025-11-03 04:00:09

← Back to PodGrabber Archives

DFSP # 499 Linux top 10

Podcast image

Published: 09/09/2025 14:10:00

DFSP # 499 Linux top 10 Episode Details

DFSP # 498 Windows top 10

Podcast image

Published: 09/02/2025 14:08:00

DFSP # 498 Windows top 10 Episode Details

DFSP # 497 ticket to ride

Podcast image

Published: 08/26/2025 14:05:00

DFSP # 497 ticket to ride Episode Details

DFSP # 496 Signed, Sealed, Exploited

Podcast image

Published: 08/19/2025 14:03:00

DFSP # 496 Signed, Sealed, Exploited Episode Details

DFSP # 495 Corrupted from within

Podcast image

Published: 08/12/2025 14:01:00

DFSP # 495 Corrupted from within Episode Details

DFSP # 494 the request is out there

Podcast image

Published: 08/05/2025 14:00:00

DFSP # 494 the request is out there Episode Details

DFSP # 493 Stop, Share, and Listen

Podcast image

Published: 07/29/2025 13:59:00

DFSP # 493 Stop, Share, and Listen Episode Details

DFSP # 492 A Bit of TCP

Podcast image

Published: 07/22/2025 13:57:00

DFSP # 492 A Bit of TCP Episode Details

DFSP # 491 INF-ltration: The Subtle Art of “Fetch and Execute”

Podcast image

Published: 07/15/2025 13:56:00

DFSP # 491 INF-ltration: The Subtle Art of “Fetch and Execute” Episode Details

DFSP # 490 Unveiling the USN Journal

Podcast image

Published: 07/08/2025 13:55:00

DFSP # 490 Unveiling the USN Journal Episode Details

DFSP # 489 Hidden Gateways

Podcast image

Published: 07/01/2025 13:54:00

DFSP # 489 Hidden Gateways Episode Details

DFSP # 488 SSH & Red Herrings

Podcast image

Published: 06/24/2025 07:50:00

DFSP # 488 SSH & Red Herrings Episode Details

DFSP # 487 Unmasking Malicious Activity with 4688

Podcast image

Published: 06/17/2025 07:49:00

DFSP # 487 Unmasking Malicious Activity with 4688 Episode Details

DFSP # 486 Squid Games

Podcast image

Published: 06/10/2025 07:48:00

DFSP # 486 Squid Games Episode Details

DFSP # 485 Certifiably Suspicious

Podcast image

Published: 06/03/2025 07:45:00

DFSP # 485 Certifiably Suspicious Episode Details

DFSP # 485 BAM! Packing Punch

Podcast image

Published: 05/27/2025 09:47:00

DFSP # 485 BAM! Packing Punch Episode Details

This week, I delve into the Windows BAM artifact, unraveling its forensic significance and exploring how it can unlock critical insights in digital investigations.

DFSP # 483 Cooking up Forensics with Chef

Podcast image

Published: 05/20/2025 09:44:00

DFSP # 483 Cooking up Forensics with Chef Episode Details

In this week’s episode, I delve into strategies for integrating CHEF into your security investigations, unlocking new avenues for proactive defense and effective incident response.

DFSP # 482 Unlocking Clues from Bash and Hidden Keys

Podcast image

Published: 05/13/2025 09:42:00

DFSP # 482 Unlocking Clues from Bash and Hidden Keys Episode Details

This week, we’re pulling back the curtain on SSH from a digital forensics perspective.

DFSP # 481 Triage outside the Core

Podcast image

Published: 05/06/2025 09:39:00

DFSP # 481 Triage outside the Core Episode Details

In this week’s episode, I dive into rapid triage techniques for non-core Windows executables to uncover signs of malicious activity.

DFSP # 480 Hidden risks of nested groups

Podcast image

Published: 04/29/2025 05:12:00

DFSP # 480 Hidden risks of nested groups Episode Details

This week, I’m talking about nested groups in Windows Active Directory and the security risks they pose. Active Directory allows administrators to attach one group to another—often called nesting. While nesting can simplify account administration and permission management, it can also create real opportunities for attackers if...

DFSP # 479 Scan, Score, Secure

Podcast image

Published: 04/22/2025 05:10:00

DFSP # 479 Scan, Score, Secure Episode Details

One of the essential skill sets for a DFIR analyst is the ability to understand the impact of vulnerabilities quickly. In many IR scenarios, you may find a newly discovered vulnerability or receive a scan that flags multiple potential weaknesses. To stay efficient, you must...

DFSP # 478 SRUM

Podcast image

Published: 04/15/2025 05:09:00

DFSP # 478 SRUM Episode Details

This week, we’re exploring the System Resource Usage Monitor (SRUM) – a powerful source of forensic data within Windows operating systems. First introduced...

DFSP # 477 SSH Triage

Podcast image

Published: 04/08/2025 05:06:00

DFSP # 477 SSH Triage Episode Details

In this episode, our focus is on understanding how attackers achieve lateral movement and persistence through Secure Shell (SSH)—and more importantly, how to spot the forensic traces...

DFSP # 476 Service Host

Podcast image

Published: 04/01/2025 05:04:00

DFSP # 476 Service Host Episode Details

In this episode, we’ll take a focused look at how to triage one of the most commonly targeted Windows processes: svchost.exe. While the methods in this series generally apply to all Windows core processes, svchost is an especially important case because attackers...

DFSP # 475 - Set the tone

Podcast image

Published: 03/25/2025 09:16:00

DFSP # 475 - Set the tone Episode Details

Ransomware attacks move quickly, making your initial response crucial in minimizing impact. This episode outlines critical first steps, from isolating infected machines to gathering key information and initiating containment. Whether you’re a SOC analyst, incident responder, or the first to notice an attack, this framework is designed to help you regain control. Follow these guidelines to effectively mitigate the damage from the very start.

DFSP # 474 - Meta Paradise

Podcast image

Published: 03/18/2025 09:15:00

DFSP # 474 - Meta Paradise Episode Details

Today’s episode explores Apple Spotlight and its extended metadata—a powerful yet often overlooked forensic tool in the Mac ecosystem. Spotlight plays a critical role in uncovering digital evidence on macOS. Both experienced forensic analysts and newcomers will find its capabilities essential. Let’s dive into the details.

DFSP # 473 - Why all the BINs

Podcast image

Published: 03/11/2025 09:12:00

DFSP # 473 - Why all the BINs Episode Details

BIN directories (short for binary) store command binaries like CD, PWD, LS, Vi, and CAT. Every platform has multiple BIN directories: two in the root directory and two in each user directory. This episode explains the types of files in these directories and the purpose of each BIN directory. I will also clarify which directories are typically used by users versus those used by the root user.

DFSP # 472 - Windows Usual Suspects

Podcast image

Published: 03/04/2025 08:09:00

DFSP # 472 - Windows Usual Suspects Episode Details

Modern Windows systems use a tightly coordinated sequence of core processes to establish secure system and user environments. DFIR investigators and incident responders must understand the interrelationships between processes such as Idle, SMSS, CSRSS, WININIT, and WINLOGON. Recognizing expected behaviors and anomalies in these steps is crucial for detecting potential system compromises. This episode demystifies the Windows 10/11 process flow and provides context for effective triage and analysis.

DFSP # 471 Mac Persistence

Podcast image

Published: 02/25/2025 05:39:00

DFSP # 471 Mac Persistence Episode Details

Today we’re talking all about MacOS AutoRun locations and how to spot persistence mechanisms. We’ll explore the ins and outs of property list files, launch daemons, system integrity protections, and the recent changes in macOS that can impact your forensic examinations...

DFSP # 470 The Windows Taskhosts

Podcast image

Published: 02/18/2025 05:37:00

DFSP # 470 The Windows Taskhosts Episode Details

This week I'm talking about the three task hosts. These are Windows core files, and they share not only similar names, but similar functionality. Because of this, there is the potential for confusion, which may allow an attacker to leverage these similarities and mask they are malware. My goal in this episode is to demystify the three different task hosts, and provide the necessary insight for proper triage if any of these files come up during your investigations.

DFSP # 469 Network Blocked Activity

Podcast image

Published: 02/11/2025 05:34:00

DFSP # 469 Network Blocked Activity Episode Details

Today’s episode is all about Windows event logs that record blocked network connections. Blocked network events are interesting because they might signal that an attacker’s secondary or tertiary toolset isn’t working as intended. That’s good news from a security standpoint...

DFSP # 468 Data Brokers & Ransomware

Podcast image

Published: 02/04/2025 05:31:00

DFSP # 468 Data Brokers & Ransomware Episode Details

Today I cover an evolving threat in the cybersecurity world: data brokers. From a computer forensics standpoint, this threats pose unique challenges. While breaches capture headlines, data brokers play a major (and sometimes overlooked) role in fueling cybercrime. In this session, we will explore how these threats operate, why they are dangerous, and how computer forensics professionals can combat them.

DFSP # 467 CVSS in Action

Podcast image

Published: 01/28/2025 09:38:00

DFSP # 467 CVSS in Action Episode Details

The Common Vulnerability Scoring System (CVSS) is a powerful tool for assessing the severity and impact of security vulnerabilities. In digital forensics and incident response, CVSS scores can provide critical context to prioritize investigations and focus on the most significant risks. This episode I will explore how leveraging CVSS scoring enhances vulnerability assessments during incident response, enabling teams to make data-driven decisions.

DFSP # 466 Malware Triage for File Types

Podcast image

Published: 01/21/2025 09:36:00

DFSP # 466 Malware Triage for File Types Episode Details

Understanding the behavior and characteristics of common file types used in attacks, such as executables, scripts, and document files, is essential for effective analysis. In this episode, we will explore practical approaches to triage malware, focusing on key indicators and techniques for prioritizing investigations.

DFSP # 465 Network Permit Events

Podcast image

Published: 01/14/2025 09:32:00

DFSP # 465 Network Permit Events Episode Details

Windows permit events, often overlooked, offer valuable details about allowed network connections that can reveal patterns of malicious activity. In this episode, we will dive into how analyzing these events can enhance network triage, enabling security teams to detect, scope, and respond to threats more effectively.

DFSP # 464 Risk Assessments for DFIR

Podcast image

Published: 01/07/2025 09:27:00

DFSP # 464 Risk Assessments for DFIR Episode Details

Security risk assessments can be a tool for guiding and prioritizing incident response investigations. By evaluating the potential impact and likelihood of various threats, these assessments provide a structured framework to identify and mitigate risks effectively. This episode will explore how integrating security risk assessments into incident response workflows enhances response strategies.

DFSP # 463 Prefetch

Podcast image

Published: 12/31/2024 06:19:00

DFSP # 463 Prefetch Episode Details

This week, we’re focusing on the Windows Prefetch artifact—a cornerstone in Windows forensics, especially for user endpoint investigations. In this episode, I’ll break down the Prefetch artifact from an investigative perspective, covering how to effectively leverage its evidence in forensic analysis. I’ll also highlight any recent changes to the artifact that may impact its value, ensuring you’re aware of everything you need to know for your investigations.

DFSP # 462 Malware Triage Part 1

Podcast image

Published: 12/24/2024 06:16:00

DFSP # 462 Malware Triage Part 1 Episode Details

This week, we’re exploring malware triage techniques. Unlike full binary analysis, malware triage is often seen as an essential skill that every digital forensic and incident response professional should master. In this episode, I’ll walk you through the core elements of malware triage, helping you understand the various skills needed to meet industry expectations. By the end, any analyst should feel confident in examining a binary and applying these techniques to uncover potential malicious content.

DFSP # 461 PSEXEC

Podcast image

Published: 12/17/2024 06:13:00

DFSP # 461 PSEXEC Episode Details

This week, we’re diving into how to triage for PSEXEC evidence. PSEXEC leaves traces on both the source and target systems, making it essential to identify artifacts on each to determine whether a system was used as an attacker’s tool or was the target of an attack. While PSEXEC has somewhat fallen out of favor due to increased use of PowerShell for similar activities, it remains a commonly abused utility among attackers. In this episode, we’ll break down the key artifacts and methodologies for effective triage.

DFSP # 460 Executing Linux

Podcast image

Published: 12/10/2024 06:10:00

DFSP # 460 Executing Linux Episode Details

Understanding how to search for executables is a critical skill in computer forensics. There are major differences in how executables are handled between Windows and Linux systems, so techniques that work on Windows won’t always translate effectively to Linux. In this episode, I’ll break down some triage techniques to help you quickly identify suspicious executables on Linux systems.

DFSP # 459 listening ports

Podcast image

Published: 12/03/2024 06:07:00

DFSP # 459 listening ports Episode Details

Welcome to today’s episode! We’re diving into network triage, focusing specifically on listening ports. While we often look for active connections, identifying suspicious services listening on a port can be equally crucial in your investigation. It’s essential to gather this information for both current, real-time data and historical analysis, providing a more complete view of network activity.

DFSP # 458 Shellbags and PCA

Podcast image

Published: 11/26/2024 03:46:00

DFSP # 458 Shellbags and PCA Episode Details

In this episode, we’ll dive into two essential forensic artifacts in Windows: shellbags and the Program Compatibility Assistant (PCA). Shell bags provide valuable evidence of file and folder access, offering insights into user activity and file navigation. We’ll also explore PCA, which can reveal important information about file execution history. Together, these artifacts play a crucial role in uncovering key forensic details during investigations.

DFSP # 457 WSL

Podcast image

Published: 11/19/2024 03:44:00

DFSP # 457 WSL Episode Details

The Linux subsystem for Windows, create both opportunity and challenges for forensic analysts. It makes Windows an excellent platform for multi platform forensic analysis tasks, allowing it to take advantage of the many Linux tools available. The challenges are foreseeable, you have Linux artifacts, now commingled on a Windows platform, which makes forensic analysis that much more difficult when examining such a system as evidence. This week I'm going to break down the Linux subsystems for forensic investigators

DFSP # 456 network triage primer

Podcast image

Published: 11/12/2024 03:41:00

DFSP # 456 network triage primer Episode Details

In this episode, we’ll explore the fundamentals of network triage, focusing on the key aspects of network traffic that are central to many investigations. Additionally, we’ll discuss some of the essential tools you can use to analyze and manage network data effectively.

DFSP # 455 Security Control Circumvention

Podcast image

Published: 11/05/2024 03:37:00

DFSP # 455 Security Control Circumvention Episode Details

Today, we’re going to explore how to handle a critical security event: Unauthorized Modification of Information. This type of event occurs when a user alters information in a system—whether it’s an application, database, website, server, or configuration files—without prior authorization. These modifications can range from impersonation and unauthorized system updates to more sophisticated techniques such as SQL injections, privilege escalations, and configuration file tampering.

DFSP # 454 MFA Bypass Attacks

Podcast image

Published: 10/29/2024 05:09:00

DFSP # 454 MFA Bypass Attacks Episode Details

This week I talk about the attack methods being used to bypass MFA. We'll learn about real-world cases where MFA was circumvented, and discover best practices to strengthen defenses against these types of attacks...

DFSP # 453 Windows Startup Locations

Podcast image

Published: 10/22/2024 05:07:00

DFSP # 453 Windows Startup Locations Episode Details

In today’s episode, we’ll focus on startup folders, which are perhaps the easiest to triage among all persistence mechanisms. But before diving in, let’s recap the journey so far to underscore the importance of a comprehensive approach rather than a one-off tactic. Each triage area we've covered plays a crucial role in identifying and stopping attacks...

DFSP # 452 AI and DFIR

Podcast image

Published: 10/15/2024 05:04:00

DFSP # 452 AI and DFIR Episode Details

In 2024, AI has not only revolutionized how we defend against cyber threats but also how those threats are being carried out. We'll explore how AI is enabling faster, more efficient security incident responses, with real-world examples of its application in automated threat detection and response, advanced forensics, and more. But with every technological leap forward, there's a dark side and attackers are harnessing AI to orchestrate sophisticated attacks...

DFSP # 451 SQL Triage

Podcast image

Published: 10/08/2024 05:02:00

DFSP # 451 SQL Triage Episode Details

SQL injection poses significant risks by enabling attackers to access sensitive metadata, execute dynamic SQL commands, and alter system parameters. These actions can lead to unauthorized data access and system disruptions, especially if attackers gain elevated privileges. This week I'm talking about SQL attack patterns from a triage point of view to help you detect such activity when doing log analysis...

DFSP # 450 Secure coding and DFIR

Podcast image

Published: 10/01/2024 04:53:00

DFSP # 450 Secure coding and DFIR Episode Details

I decided to talk this week about the Importance of Secure Coding Knowledge for Security Incident Response Investigations. Knowing secure coding principles helps identify the root causes of vulnerabilities and recognize attack patterns. It facilitates effective communication and collaboration with developers, ensuring accurate incident reports and actionable recommendations. Secure coding knowledge enhances forensic analysis by aiding in code reviews and log analysis to detect anomalies. It also allows responders to suggest mitigation strategies and improve the security posture of applications. Ultimately, this knowledge leads...

DFSP # 449 Zero-Day or Hero-Day

Podcast image

Published: 09/24/2024 04:42:00

DFSP # 449 Zero-Day or Hero-Day Episode Details

This week, we're covering zero-day vulnerability response from a Digital Forensics and Incident Response professional's perspective. In our roles, we often get involved in various tasks that require a security mindset, and one critical task is responding to zero-day vulnerabilities. To provide a real-world context, we'll integrate the recently disclosed zero-day exploit "Copy2Pwn" (CVE-2024-38213) and discuss the specific forensic artifacts and methods used to achieve the objectives of a DFIR response.

DFSP # 448 WebShell Forensics

Podcast image

Published: 09/17/2024 04:27:00

DFSP # 448 WebShell Forensics Episode Details

Welcome to this week’s session, where we’ll delve into web shell forensics—an ever-critical topic in incident response investigations and threat-hunting strategies. Today, I’ll provide a breakdown that includes the latest developments, detailed triage techniques, and practical examples of what to look for during your investigations:

DFSP # 447 Linux Root Kits

Podcast image

Published: 09/10/2024 04:24:00

DFSP # 447 Linux Root Kits Episode Details

Rootkits are hard to detect because they employ advanced stealth techniques to hide their presence. They can conceal processes, files, and network activities by altering system calls and kernel data structures. The deep system knowledge and specialized tools required for low-level analysis make rootkit detection complex and resource-intensive. Limited visibility of standard security tools further complicates the identification of rootkits. However, This week I'm going to talk about how to identify root kits on a Linux systems using only the command line.

DFSP # 446 Registry by EVTX

Podcast image

Published: 09/03/2024 04:15:00

DFSP # 446 Registry by EVTX Episode Details

In previous episodes, we covered techniques for examining the Windows Registry, a critical component in identifying persistence mechanisms. We'll explore the registry but shift our focus to registry modification events as reported by Windows event logs

DFSP # 445 Bash Triage

Podcast image

Published: 08/27/2024 04:05:00

DFSP # 445 Bash Triage Episode Details

Bash history's forensic value lies in its ability to answer diverse investigative questions, making it a cornerstone artifact for Linux systems. It aids in triaging lateral movement, identifying reconnaissance activities, and detecting attempts at establishing persistence. This underscores the importance of structuring triage tasks around specific investigative questions, facilitating focused analysis amidst potentially extensive Bash history records...

DFSP # 444 A little assistance

Podcast image

Published: 08/20/2024 04:03:00

DFSP # 444 A little assistance Episode Details

The UserAssist key is a Windows Registry artifact that logs details about user activity, such as recently accessed programs and files. It encodes information on the frequency and last access time of items launched via Windows Explorer. This helps investigators understand user behavior and timeline of actions on a system, providing evidence of program execution and file access...

DFSP # 443 - Standard Actions

Podcast image

Published: 08/13/2024 03:53:00

DFSP # 443 - Standard Actions Episode Details

Every incident response outfit should have a set of guidelines for their team which outlines the standard actions or common considerations for security investigations. In this episode, I highlight some of the key points for security teams with a special focus on initial actions which typically set the tone for success during the subsequent investigation.

DFSP # 442 - Database Response

Podcast image

Published: 08/06/2024 03:46:00

DFSP # 442 - Database Response Episode Details

Understanding the different types of databases is important for security incident response investigations, as databases are often targeted by attackers seeking sensitive information. Each database type—relational, NoSQL, in-memory, and cloud-based—has unique structures, query languages, and security mechanisms. Familiarity with these variations enables investigators to effectively...

DFSP # 441 - CIS Benchmarks

Podcast image

Published: 07/30/2024 05:19:00

DFSP # 441 - CIS Benchmarks Episode Details

CIS (Center for Internet Security) Benchmarks provide a comprehensive set of best practices for securing IT systems and data, which are vital for security response investigations. These benchmarks, developed through a consensus-driven process by cybersecurity experts, offer detailed guidelines for configuring operating systems, applications, and network devices to enhance their security posture. In the context of security response investigations, adhering to CIS Benchmarks helps ensure that systems are resilient against common threats and vulnerabilities. By implementing these benchmarks, organizations can better detect, respond to, and recover from security incidents, thereby minimizing

DFSP # 440 - ABCs of BECs

Podcast image

Published: 07/23/2024 05:16:00

DFSP # 440 - ABCs of BECs Episode Details

Business Email Compromise (BEC) forensics involves the meticulous investigation of cyberattacks where attackers infiltrate email systems to manipulate business communications for financial gain. These attacks often entail phishing, social engineering, and credential theft to impersonate trusted entities within or outside an organization. Forensic analysis of BEC incidents focuses on tracing the attacker's entry point, examining email headers, metadata, and logs to uncover the methods used for unauthorized access. It also involves identifying compromised accounts, understanding the scope of the attack, and preserving evidence for legal proceedings. Effective BEC forensics is crucial

DFSP # 439 - Remoting Windows

Podcast image

Published: 07/16/2024 05:13:00

DFSP # 439 - Remoting Windows Episode Details

Remote Desktop Protocol (RDP) is a crucial artifact in digital forensics due to its extensive use for remote system access. Analyzing RDP activities can uncover vital information about unauthorized access, insider threats, and attacker lateral movement within a network. Forensic examination of RDP logs enables investigators to trace an attacker's steps, identify compromised accounts, and assess the breach's extent. For instance, RDP forensics can detect brute force attacks on login credentials, track the use of stolen credentials, and monitor suspicious reconnection attempts to previously established sessions.

DFSP # 438 - Old Nix

Podcast image

Published: 07/09/2024 05:10:00

DFSP # 438 - Old Nix Episode Details

This week, I will be discussing the Linux operating system from a DFIR perspective. It is highly recommended for every examiner to become proficient in Linux, especially with the increasing prevalence of cloud-based infrastructures in enterprise environments. As these platforms become the norm, you can expect to encounter Linux systems frequently during your investigations.

DFSP # 437 - Windows Autoruns

Podcast image

Published: 07/02/2024 05:04:00

DFSP # 437 - Windows Autoruns Episode Details

In Windows forensics, understanding the intricacies of autorun functionalities and the Windows Registry is essential for effective incident response and investigation. Autorun mechanisms, which allow programs to execute automatically when the system starts or specific actions are performed, can be exploited by malicious actors to persist on a system. The Windows Registry, a hierarchical database that stores low-level settings for the operating system and applications, plays a crucial role in tracking these autorun entries. Forensic analysis of the Windows Registry can reveal information about auto-starting applications, system configurations, and user activities,

DFSP # 436 - Ja-Who?

Podcast image

Published: 06/25/2024 04:09:00

DFSP # 436 - Ja-Who? Episode Details

The JOHARI methodology simply provides a structure for something that you're probably already doing. However, with the structure comes a standard, which is the benefit to any security team. The team should be speaking the same language, especially in fast moving, dynamic situations. Going into a situation and asking for the "known – knowns” and “Blindspots" should register with every team member without any question about their definitions...

DFSP # 435 - Good Ol’ Powershell

Podcast image

Published: 06/18/2024 04:07:00

DFSP # 435 - Good Ol’ Powershell Episode Details

Threat actors often exploit PowerShell in cyber attacks due to its capabilities and integration with Windows operating systems. Microsoft has cited powershell as one of the most commonly used tools in the attack chain. It also comes up in phishing campaigns and other attacks that include infecting URL links. The challenge lies in the fact that it is a commonly used administration tool. As an analyst, you can expect to have lots of powershell scripts and commands come up during your investigations. Your job is to be able to differentiate between

DFSP # 434 - The Reg

Podcast image

Published: 06/11/2024 04:05:00

DFSP # 434 - The Reg Episode Details

The Windows registry is a hierarchical database that stores configuration settings and options on Microsoft Windows operating systems. It contains settings for low-level operating system components as well as for applications running on the platform. In order to make use of any of this information, you must understand the registry from a DFIR point of view, and that's exactly what I'm doing in this episode...

DFSP # 433 - SU DOs and DONTS

Podcast image

Published: 06/04/2024 04:01:00

DFSP # 433 - SU DOs and DONTS Episode Details

On a Linux or Mac system, there can be user accounts that have the ability of privilege escalation. Knowing how to triage, for this has a twofold benefit: (1) you obviously want to know which account may elevate to route privileges. If you're doing account triage, these are the ones you should prioritize. The other benefit (2) is to identify any account that can escalate. This fact alone ...

DFSP # 432 - Control Bits

Podcast image

Published: 05/28/2024 04:10:00

DFSP # 432 - Control Bits Episode Details

TCP control bits are part of the TCP header and are used to manage the connection between two devices. These control bits are single-bit flags that indicate various aspects of the TCP connection and are important for understanding and analyzing network traffic...

DFSP # 431 - Finding Needles

Podcast image

Published: 05/21/2024 04:06:00

DFSP # 431 - Finding Needles Episode Details

The time it takes from an initial escalation to the initial discovery of compromise is a key metric. Teams strive to do this as quickly as possible, but there are a number of challenges. You do not know what you're going to be handed, but you're pretty much guaranteed It's going to be a unique set of circumstances that require some type of customized or mostly customized response. So how do you accomplish this? Most analyst rely on a set of tried and true various techniques that can be used at

DFSP # 430 - Targeting Tasks

Podcast image

Published: 05/14/2024 04:04:00

DFSP # 430 - Targeting Tasks Episode Details

Windows Scheduled Tasks are often used by attackers to establish persistence. As an analyst, you want to be aware of the different windows event codes that record these details. These artifacts come up in just about every windows compromise assessment, consider them core triage skills. There are several events, all of which I will go over in this episode. I will break them down from a DFIR point of view and give you the triage methodology...

DFSP # 429 - Career Moves

Podcast image

Published: 05/07/2024 03:59:00

DFSP # 429 - Career Moves Episode Details

This week I talk about career moves for the DFIR professional. The skill set is valuable, but it must be combined with the right additional technical skills to maximize future job opportunities. Of course, there is one skill set that stands out above the rest...

DFSP # 428 - It’s all about that XML

Podcast image

Published: 04/30/2024 06:06:00

DFSP # 428 - It’s all about that XML Episode Details

When you're triaging a Windows system for evidence of compromise, it's ideal if your plan is focused on some quick wins upfront. There are certain artifacts that offer this opportunity, and Windows Events for New Scheduled Tasks are one of them. Sometimes overlooked, at least in part, because the good stuff contained within the XML portion of the log. This week I'm covering the artifact from a DFIR point of view, I'll go over all the elements of the log entry that are of interest for investigations, and I'll provide a

DFSP # 427 - MOF Balls

Podcast image

Published: 04/23/2024 06:02:00

DFSP # 427 - MOF Balls Episode Details

Windows management instrumentation, also known as WMI, is an App on Windows that allows a user to query all sorts of things about a system. Being native to Windows, it is an attractive target for a attackers to leverage. This week I'll break down the artifact from a DFIR point of a few and talk about how to detect its misuse.

DFSP # 426 - SSH Forensics: Log Analysis

Podcast image

Published: 04/16/2024 05:58:00

DFSP # 426 - SSH Forensics: Log Analysis Episode Details

This week I'm wrapping up my series on SSH forensics with a discussion on SSH log triage. Logs are usually what an analyst will start with, so this episode is important. There are a few different log types, and there is a pitfall with one of them, which is something you must be aware of to avoid making inaccurate conclusions. I'll provide the artifact breakdown, triage methodology, and more.

DFSP # 425 - SSH Forensics: Host-Based Artifacts

Podcast image

Published: 04/09/2024 05:54:00

DFSP # 425 - SSH Forensics: Host-Based Artifacts Episode Details

In the last episode on this topic, I covered SSH from a investigation point of view. I explained SSH and the artifacts that typically come up when your investigating. In this episode, we're getting into the triage methodology. This includes the artifacts targeted for a fast, but yet effective triage for notable SSH activity on a given host.

DFSP # 424 - SSH Forensics: Understanding Secure Shell

Podcast image

Published: 04/02/2024 05:48:00

DFSP # 424 - SSH Forensics: Understanding Secure Shell Episode Details

SSH is a protocol used to secure remote access to systems, making it a cornerstone in safeguarding sensitive information and ensuring secure communications. In this podcast, we will delve into the basics of SSH, its key concepts and other useful elements important for context when investigating for notable SSH activity.

DFSP # 423 - Guiding Lights: Cyber Investigations Investigation Lifecycle

Podcast image

Published: 03/25/2024 23:00:00

DFSP # 423 - Guiding Lights: Cyber Investigations Investigation Lifecycle Episode Details

This week I'm discussing a fundamental aspect of cybersecurity: incident response preparation. Effective incident response is paramount, and preparation is the key to success. This preparation includes comprehensive documentation, training, having the right tools and resources in place, and developing incident response plans and playbooks. It also involves ensuring clear communication protocols and conducting regular training and testing. I'll explore preparation from the perspective of the investigation life cycle, where success is the reward for preparation. Join me as I uncover the importance of preparation in incident response and how it

DFSP # 422 - EVTX Express: Cracking into Windows Logs Like a Pro

Podcast image

Published: 03/18/2024 23:54:00

DFSP # 422 - EVTX Express: Cracking into Windows Logs Like a Pro Episode Details

Today I'm talking Windows forensics, focusing on Windows event logs. These logs are very valuable for fast triage, often readily available in your organization's SIEM. But have you ever wondered about the processes enabling this quick access? Not only are the logs automatically collected and fed into the appliance, but they are also formatted and normalized for easy data searchability. This is crucial, as the logs are originally in a complex format challenging to natively interpret. Now, picture a scenario where event logs are inaccessible through a security appliance—enter this week's

DFSP # 421 - Memory Lane: Fileless Linux Attacks Unraveled

Podcast image

Published: 03/11/2024 23:49:00

DFSP # 421 - Memory Lane: Fileless Linux Attacks Unraveled Episode Details

In this podcast episode, we talk about Linux's `memfd` – a virtual file system allowing the creation of anonymous memory areas for shared memory or temporary data storage. Threat actors exploit `memfd` for fileless malware attacks, as its memory areas exist only in RAM, evading traditional file-based detection methods. Join me as I `memfd` as a forensic artifact, its implications in DFIR, and strategies for detecting its abuse.

DFSP # 420 - Failing, Stopping and Crashing

Podcast image

Published: 03/04/2024 22:34:00

DFSP # 420 - Failing, Stopping and Crashing Episode Details

This week we explore into the world of Windows service event codes and their role in forensic investigations. Windows services are background processes crucial for system functionality, running independently of user interaction- making them ideal. Target were exploitation. Join me to explore the intricate details of Windows services and their significance in digital forensics.

DFSP # 419 - What the Flux

Podcast image

Published: 02/26/2024 22:47:00

DFSP # 419 - What the Flux Episode Details

This week, we're delving into the realm of fast flux, a cunning technique employed by attackers to cloak their true, malicious domains. Its effectiveness is the reason behind its widespread use, making it crucial for analysts to grasp its nuances and avoid chasing elusive ghosts during investigations. Stay tuned as I unravel the intricacies of fast flux, providing insights into what it entails and offering valuable tips on how to effectively detect it. All this and more coming your way!

DFSP # 418 - Core Insights: Navigating MFT in Forensics

Podcast image

Published: 02/19/2024 22:38:00

DFSP # 418 - Core Insights: Navigating MFT in Forensics Episode Details

In this week's exploration, I'm delving into the intricate realm of the Master File Table (MFT), a pivotal forensic artifact in Windows investigations. The MFT provides a valuable gateway to decode evidence across various scenarios. Join me in this episode as we unravel the forensic basics, explore diverse use cases, and discover a range of tools that empower you to unlock the full potential of this invaluable artifact.

DFSP # 417 - Unlocking Linux Secrets

Podcast image

Published: 02/12/2024 22:32:00

DFSP # 417 - Unlocking Linux Secrets Episode Details

This week I delve into the intriguing domain of Linux malware triage. The Linux platform presents forensic analysts with a unique opportunity to excel in performing malware triage effortlessly. The beauty of it lies in the fact that you don't require any specialized tools; all you need is a solid grasp of a few commands and the ability to decipher their output. With these skills in your arsenal, any analyst can swiftly and efficiently navigate through the process of malware triage. Stay tuned for more insights on this in the upcoming

DFSP # 416 - Persistence Mechanisms on Windows

Podcast image

Published: 02/05/2024 22:29:00

DFSP # 416 - Persistence Mechanisms on Windows Episode Details

This week I’m going to talk about New Service Installation details recorded in Windows event logs. These have a number of advantages for your triage methodology and I will have all the details coming up.

DFSP # 415 - Dealing with Third-Party Incidents

Podcast image

Published: 01/29/2024 22:39:00

DFSP # 415 - Dealing with Third-Party Incidents Episode Details

Organizations leverage third-party services more and more for business advantages. For the security professional, this means the organizational data you're charged with protecting is under the control of a third-party in some way shape or form. In this episode, I cover third-party risk landscape for security professionals with a special focus on identifying scope and responsibility.

DFSP # 414 - CRON Forensics

Podcast image

Published: 01/22/2024 22:37:00

DFSP # 414 - CRON Forensics Episode Details

Cron become important and Linux forensics when you’re talking about persistence. Think scheduled tasks if you want a Windows equivalent. The artifact is not that difficult to analyze once you understand the elements to focus on and it is typically readily available. It’s something that you can check out a live system, gather with a collection script, and more and more security appliances are designed to access the artifact as well. I’ll...

DFSP # 413 - Ransomware Initial Response

Podcast image

Published: 01/15/2024 22:35:00

DFSP # 413 - Ransomware Initial Response Episode Details

Ransomware cases can be particularly challenging, especially during the initial response. They tend to be fast-paced and require the responder to simultaneously prioritize a number of tasks. Each of these tasks can have critical impact upon the outcome of the response and subsequent investigation. In this episode I am going to cover some immediate response actions. The goal here is to provide a framework that will allow responders to get off on the right foot…

DFSP # 412 - Conhost Forensics

Podcast image

Published: 01/08/2024 22:34:00

DFSP # 412 - Conhost Forensics Episode Details

Conhost, or the Console Application Host, often comes up during investigations. Understanding what it is, the evidence may contain and how to extract that information becomes important...

DFSP # 411 - NTLM Credential Validation

Podcast image

Published: 01/01/2024 22:32:00

DFSP # 411 - NTLM Credential Validation Episode Details

This week I'm talking about detecting evidence of lateral movement on Window systems using NTLM credential validation events. Much like the episode I did on Kerberos, NTLM events offer the same advantage of being concentrated on domain controllers, which allows you, as the analyst, leverage a great resource for user account analysis. I will have the background, artifact breakdown, and triage strategy coming up right after this…..

DFSP # 410 - Linux Temp Directories

Podcast image

Published: 12/25/2023 22:05:00

DFSP # 410 - Linux Temp Directories Episode Details

Temporary directories play a significant role in computer forensic investigations as they can potentially contain valuable digital evidence. When conducting a computer forensic investigation, these temporary directories can provide insights into user activities, application usage, and potentially malicious behavior...

DFSP # 409 - Regsvcs and Regasm Abuse

Podcast image

Published: 12/18/2023 22:03:00

DFSP # 409 - Regsvcs and Regasm Abuse Episode Details

This week I’m talking about Regsvcs /Regasm exploitation, which is a Windows tactic attackers use to evade defense mechanisms and execute code. Specifically, this technique can be used to bypass process whitelisting and digital certificate validation. I'll break down some interpretation methods that may be used to identify such exploitation....

DFSP # 408 - Nesting

Podcast image

Published: 12/11/2023 22:02:00

DFSP # 408 - Nesting Episode Details

This week I’m talking about Nested Groups and the risk they pose for security. Built-in to the functionality of Active Directory is the ability to attach a group to another group. While this has advantages for account administration across an organization, it also offers attackers opportunity if certain precautions are not taken. This week I’ll break down Nested Groups in DFIR terms, talk about how attackers take advantage of it and what analysts need to know for investigations.

DFSP # 407 - More About Lateral Movement and Kerberos

Podcast image

Published: 12/04/2023 22:00:00

DFSP # 407 - More About Lateral Movement and Kerberos Episode Details

This week it's more about lateral movement and kerberos events.

DFSP # 406 - All the BIN Directories

Podcast image

Published: 11/27/2023 21:02:00

DFSP # 406 - All the BIN Directories Episode Details

In a typical Linux "bin" directory, you can find various types of executable files and scripts that are used to perform different tasks. The confusing part is that there are a number of different BIN directories throughout the file system. What is the purpose and difference between these BIN directories? What do you need to know about them for forensic investigations? The answers to those questions and more are coming up...

DFSP # 405 - Werfault Attacks

Podcast image

Published: 11/20/2023 21:02:00

DFSP # 405 - Werfault Attacks Episode Details

Werfault is in interesting artifact in that there is not a lot of documentation on it but yet it may affect an investigation in different ways. Its appearance in logs sometimes adds a bit of confusion to an investigation because it could mean different things. Add to that a layer of apparent obscurity as to exactly how to interpret the information makes it even more difficult for newer examiners. I took on the question...

DFSP # 404 - Certutil Attacks

Podcast image

Published: 11/13/2023 21:01:00

DFSP # 404 - Certutil Attacks Episode Details

Certutil, a powerful command-line utility, possesses the potential for misuse by malicious actors to establish illicit network connections. Therefore, it is crucial to familiarize oneself with its legitimate applications and recognize common indicators of misuse. In this episode, we will delve into the utility of Certutil and identify effective methods to promptly detect and address potential abuses. Stay tuned as we explore these topics in depth...

DFSP # 403 - Lateral Movement Kerberos Auth Events

Podcast image

Published: 11/06/2023 21:01:00

DFSP # 403 - Lateral Movement Kerberos Auth Events Episode Details

This week I'm going to cover an important Windows event that provides valuable information about authentication attempts and potential security breaches. The event may be used to identify compromised accounts, identify brute, force, attacks, or password spraying attacks. It may also be used to detect attack or probing activities. The artifact breakdown and triage methodology is coming up….

DFSP # 402 - Linux Root Directory Files for DFIR

Podcast image

Published: 10/30/2023 22:05:00

DFSP # 402 - Linux Root Directory Files for DFIR Episode Details

In Linux and Unix-based operating systems, the "root" account is the superuser or administrator account with the highest level of privileges. It has complete control over the system and can perform any action, including modifying system files, installing software, and managing user accounts. The root account is sometimes referred to as the "root user" or simply “root"....

DFSP # 401 - INF Fetch Execute

Podcast image

Published: 10/23/2023 22:03:00

DFSP # 401 - INF Fetch Execute Episode Details

This week we are taking a bit of a deep dive into an advanced attack technique to accomplish remote execution called “fetch and execute.” While there are different methods to accomplish the sort of thing what I am going to be focusing on is exploitation using a common Windows executable and installation file. Think of this as one of the touted “living off the land” attack techniques. It has value for compromise assessment methods as well as for threat hunting strategies...

DFSP # 400 - CMSTP

Podcast image

Published: 10/16/2023 22:01:00

DFSP # 400 - CMSTP Episode Details

This week I am going to focus on a specific remote execution technique that you may see in the wild. Remote execution is important for incident response investigations but also for file use and knowledge investigations, particularly those that conducted due diligence exams for evidence of malware. I have covered remote execution in the past from different angles and I have done so because it is one of the red flags that an analyst should be looking for. In order to be effective in recognizing either an actual malicious execution or