Digital Forensic Survival Podcast
Technology
In the last episode on this topic, I covered SSH from a investigation point of view. I explained SSH and the artifacts that typically come up when your investigating. In this episode, we're getting into the triage methodology. This includes the artifacts targeted for a fast, but yet effective triage for notable SSH activity on a given host.
DFSP # 428 - It’s all about that XML
DFSP # 427 - MOF Balls
DFSP # 426 - SSH Forensics: Log Analysis
DFSP # 424 - SSH Forensics: Understanding Secure Shell
DFSP # 423 - Guiding Lights: Cyber Investigations Investigation Lifecycle
DFSP # 422 - EVTX Express: Cracking into Windows Logs Like a Pro
DFSP # 421 - Memory Lane: Fileless Linux Attacks Unraveled
DFSP # 420 - Failing, Stopping and Crashing
DFSP # 419 - What the Flux
DFSP # 418 - Core Insights: Navigating MFT in Forensics
DFSP # 417 - Unlocking Linux Secrets
DFSP # 416 - Persistence Mechanisms on Windows
DFSP # 415 - Dealing with Third-Party Incidents
DFSP # 414 - CRON Forensics
DFSP # 413 - Ransomware Initial Response
DFSP # 412 - Conhost Forensics
DFSP # 411 - NTLM Credential Validation
DFSP # 410 - Linux Temp Directories
DFSP # 409 - Regsvcs and Regasm Abuse
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
Black Wolf Feed (Chapo Premium Feed Bootleg)
Bannon`s War Room