digital4rensics.com
BeaCon | The Digital4rensics BlogThe Digital4rensics Blog
http://www.digital4rensics.com/blog/tag/beacon
BeaCon The Digital4rensics BlogThe Digital4rensics Blog. Thoughts from a fledgling forensicator. BeaCon Preso on Malformity. April 21, 2013. I had the pleasure of speaking at BeaCon yesterday in Boston, MA. Thanks to MassHackers and everyone else that helped put the event on! BeaCon Preso on Malformity. How To: Installing Malformity. A Fistful of Dongles. Journey Into Incident Response. Random Thoughts of Forensics. 2016 - The Digital4rensics Blog. Designed on rtPanel WordPress Theme Framework.
digital4rensics.com
Malformity Labs | The Digital4rensics BlogThe Digital4rensics Blog
http://www.digital4rensics.com/blog/tag/malformity-labs
Malformity Labs The Digital4rensics BlogThe Digital4rensics Blog. Thoughts from a fledgling forensicator. December 1, 2013. The second major announcement is that I’ve got a side job in the form of a small business, and that’s really what has been taking most of my time in the recent months. After speaking with a few people, and given my interest and previous work with maltego, I decided […]. BeaCon Preso on Malformity. How To: Installing Malformity. A Fistful of Dongles. Journey Into Incident Response.
digital4rensics.com
OSINT | The Digital4rensics BlogThe Digital4rensics Blog
http://www.digital4rensics.com/blog/tag/osint
OSINT The Digital4rensics BlogThe Digital4rensics Blog. Thoughts from a fledgling forensicator. May 19, 2013. I had the pleasure of attending my first Bsides event yesterday and it went great! Is privacy based on observability, or is it the lack of identifiability? That is, if you can still observe someone, do they still enjoy privacy so long as you can’t identify them? When you frame this in a digital context, it raises a good point. […]. BeaCon Preso on Malformity. April 21, 2013. A Fistful of Dongles.
digital4rensics.com
Attribution | The Digital4rensics BlogThe Digital4rensics Blog
http://www.digital4rensics.com/blog/tag/attribution
Attribution The Digital4rensics BlogThe Digital4rensics Blog. Thoughts from a fledgling forensicator. March 19, 2013. I still believe that the answer, in most […]. BeaCon Preso on Malformity. How To: Installing Malformity. A Fistful of Dongles. Journey Into Incident Response. Random Thoughts of Forensics. 2016 - The Digital4rensics Blog. Designed on rtPanel WordPress Theme Framework.
digital4rensics.com
Threat Intel | The Digital4rensics BlogThe Digital4rensics Blog
http://www.digital4rensics.com/blog/category/threat-intel
Threat Intel The Digital4rensics BlogThe Digital4rensics Blog. Thoughts from a fledgling forensicator. March 19, 2013. I still believe that the answer, in most […]. Brief OSINT review for CVE-2012-1535 Attacks. August 19, 2012. July 28, 2012. Adding Flame to the Fire. May 29, 2012. Why start using the capability now? AICPAorg Phishing: Round 2. March 8, 2012. Welcome to the AICPA. Page=89cd1f8b9fb67fbc, which if successful, serves up the payload from hxxp:/ themeparkoupons.net/w.php? F=6231f&e=[1-4]...
digital4rensics.com
Understanding Your Adversary | The Digital4rensics BlogThe Digital4rensics Blog
http://www.digital4rensics.com/blog/2013/03/understanding-your-adversary
Understanding Your Adversary The Digital4rensics BlogThe Digital4rensics Blog. Thoughts from a fledgling forensicator. March 19, 2013. Over the past year, perhaps more, there has been an increasing amount of discussion about whether or not organizations need to “know” their adversary. The topic roared up upon the publication of Mandiant’s Intel Report. What data are they going after (or prevent others from reaching)? How will they attempt to reach their goal? This is really no different than any other bu...
windowsir.blogspot.com
Windows Incident Response: Books
http://windowsir.blogspot.com/p/books.html
The Windows Incident Response Blog is dedicated to the myriad information surrounding and inherent to the topics of IR and digital analysis of Windows systems. This blog provides information in support of my books; "Windows Forensic Analysis" (1st thru 4th editions), "Windows Registry Forensics", as well as the book I co-authored with Cory Altheide, "Digital Forensics with Open Source Tools". Windows Forensics and Incident Recovery. Windows Forensic Analysis ( 1/e. Perl Scripting for Windows Security.
marksforensicblog.wordpress.com
MEMORY ANALYSIS TOOLS | My Stupid Forensic Blog
https://marksforensicblog.wordpress.com/2011/11/29/memory-analysis-tools
My Stupid Forensic Blog. Various Digital/Network Forensic Information. A Little Background Info and A Little Legal Jargon. November 29, 2011. Win32dd-This is the easiest of the command line tools and probably one of the most used “open source” tools out there. The basic syntax is as follows:. That’s it, all you need to do is provide the name of the output file and where you want it saved. The following tools are the ones that I have used in the past and I realize there are probably more out there. This i...
romanperez.com
Resources
http://www.romanperez.com/resources.html
Federal Rules of Evidence. Resources of the trade. More important than knowing everything is knowing where to find the answers. Books, KB, Articles, Etc. A PRACTICAL GUIDE TO COMPUTER FORENSICS INVESTIGATIONS. Creating a Virtual Machine of a write-blocked drive using Linux Ubuntu 12.10. Digital Forensics Certification Board.
SOCIAL ENGAGEMENT