I am retiring this social media account. Find me as @hal_pomeranz@infosec.exchange

Orlando, FL
Joined November 2008
Replying to @MarkD755
Omaha has a surprisingly robust financial sector with lots of IT
1
1
Replying to @johullrich
STEAKS not SNAKES, because #Omaha
1
Hal Pomeranz retweeted
Have you ever wondered how best to do a reverse image search? Or if Google really is your best option for tracking down the object of a photo? Check out @bellingcat ’s guide to using reverse image search for Investigations. bellingcat.com/resources/how…
3
74
3
232
Replying to @beemrFAN
Yes, that is my plan.
2
1
For the morning #DFIR crowd—I will be debuting a two-day Linux Forensics class at Kernelcon, Mar 25-26 in Omaha. Hope to see you all there! kernelcon.org/agenda#trainin…
2
8
2
18
Replying to @Carlos_Perez
Right there with you, brother. I am hoping lowering bandwidth costs and affordable VR gear will revolutionize training and cons.
1
I'm looking to move to Alabama for my children. Please contact me via DM if the following skills can assist your organization: - Incident Response - SEIM Engineering - Data/Log Analysis - Threat Intel/Hunt - Policy & Process - Training - Attacker TTP Discovery - Cyber Consulting
22
114
4
135
Happy to announce that I will be debuting a brand new two-day Linux Forensics course at Kernelcon in Omaha. See you March 25-26! kernelcon.org/agenda#trainin… #DFIR
15
2
25
Hal Pomeranz retweeted
Released MemLabs today. It is a repository which contains a set of labs which help students, security researchers and people new to forensics to learn memory forensics from the very basics. Check it out at github.com/stuxnet999/MemLab… #DFIR #memoryforensics #cybersecurity #ctf
Introducing MemLabs - Educational, CTF-styled labs for individuals interested in Memory Forensics, is now released. Link: github.com/stuxnet999/MemLab… Author: @_abhiramkumar #ctf #dfir #memoryforensics #infosec #cybersecurity
3
69
5
168
Replying to @fancy_4n6
Journaling? Get some of it out by writing it down?
1
Hal Pomeranz retweeted
Excellent introduction to the implementation of Windows Event Logs and why they can be missing critical information. Michael Cohen includes an open source Velociraptor parser as a solution. buff.ly/2OcvvqP buff.ly/37rDist
1
70
2
174
Hal Pomeranz retweeted
The reality is geopolitically tense times make us all uncomfortable. And we should seek to be proactive and do more, but our infrastructure community has built some of the safest and most reliable infrastructure on the planet. Do more, fear less
2
12
1
81
Hal Pomeranz retweeted
Critical @citrix Vulnerability announced - An attacker could now supply a script like “../usr/bin/bash” to execute additional commands. This command injection vulnerability does take advantage of directory traversal. Learn more on the blog: sans.org/u/YEk
4
5
Hal Pomeranz retweeted
If I have any friends in Washington state that see this woman please let us know. She has been missing since New Year’s Eve. Please call the detective in the listing or/message me. Thank you. facebook.com/story.php?story…
1
Hal Pomeranz retweeted
Take a look!! we tackled 30 browsers to see if they had a privacy mode and whether it was private. Methodology describe so you can see exactly what we did and found! #DFIR #digitalforensics #forensics #research #openaccess #FSIR
"A forensic examination of web browser privacy-modes." This work documents the examination of 30 web browsers to determine the presence of a ‘private mode’, and where available, the ‘privateness’ of said mode. bit.ly/36d2sdv
1
19
2
29
Replying to @bettersafetynet
— Scheduling/distribution — Unified UI/“single pane of glass”
1
Replying to @bettersafetynet
Enterprise patch management
1
1
Hal Pomeranz retweeted
Excellent historical overview of iOS forensics and a roadmap for taking advantage of Checkm8 and Checkra1n for a new "golden age" for iOS forensics. Thanks @mattiaep! >> buff.ly/2RjQFoS
12
17