Have you ever wondered how best to do a reverse image search? Or if Google really is your best option for tracking down the object of a photo? Check out @bellingcat ’s guide to using reverse image search for Investigations. bellingcat.com/resources/how…
For the morning #DFIR crowd—I will be debuting a two-day Linux Forensics class at Kernelcon, Mar 25-26 in Omaha. Hope to see you all there! kernelcon.org/agenda#trainin…
I'm looking to move to Alabama for my children. Please contact me via DM if the following skills can assist your organization:
- Incident Response
- SEIM Engineering
- Data/Log Analysis
- Threat Intel/Hunt
- Policy & Process
- Training
- Attacker TTP Discovery
- Cyber Consulting
Happy to announce that I will be debuting a brand new two-day Linux Forensics course at Kernelcon in Omaha. See you March 25-26! kernelcon.org/agenda#trainin…#DFIR
Released MemLabs today. It is a repository which contains a set of labs which help students, security researchers and people new to forensics to learn memory forensics from the very basics.
Check it out at github.com/stuxnet999/MemLab…#DFIR#memoryforensics#cybersecurity#ctf
Excellent introduction to the implementation of Windows Event Logs and why they can be missing critical information. Michael Cohen includes an open source Velociraptor parser as a solution. buff.ly/2OcvvqPbuff.ly/37rDist
The reality is geopolitically tense times make us all uncomfortable. And we should seek to be proactive and do more, but our infrastructure community has built some of the safest and most reliable infrastructure on the planet. Do more, fear less
Critical @citrix Vulnerability announced - An attacker could now supply a script like “../usr/bin/bash” to execute additional commands. This command injection vulnerability does take advantage of directory traversal.
Learn more on the blog: sans.org/u/YEk
If I have any friends in Washington state that see this woman please let us know. She has been missing since New Year’s Eve. Please call the detective in the listing or/message me. Thank you. facebook.com/story.php?story…
"A forensic examination of web browser privacy-modes." This work documents the examination of 30 web browsers to determine the presence of a ‘private mode’, and where available, the ‘privateness’ of said mode. bit.ly/36d2sdv
Excellent historical overview of iOS forensics and a roadmap for taking advantage of Checkm8 and Checkra1n for a new "golden age" for iOS forensics. Thanks @mattiaep! >> buff.ly/2RjQFoS