Digital Forensic Survival Podcast
Technology
This week, we're delving into the realm of fast flux, a cunning technique employed by attackers to cloak their true, malicious domains. Its effectiveness is the reason behind its widespread use, making it crucial for analysts to grasp its nuances and avoid chasing elusive ghosts during investigations. Stay tuned as I unravel the intricacies of fast flux, providing insights into what it entails and offering valuable tips on how to effectively detect it. All this and more coming your way!
DFSP # 428 - It’s all about that XML
DFSP # 427 - MOF Balls
DFSP # 426 - SSH Forensics: Log Analysis
DFSP # 425 - SSH Forensics: Host-Based Artifacts
DFSP # 424 - SSH Forensics: Understanding Secure Shell
DFSP # 423 - Guiding Lights: Cyber Investigations Investigation Lifecycle
DFSP # 422 - EVTX Express: Cracking into Windows Logs Like a Pro
DFSP # 421 - Memory Lane: Fileless Linux Attacks Unraveled
DFSP # 420 - Failing, Stopping and Crashing
DFSP # 418 - Core Insights: Navigating MFT in Forensics
DFSP # 417 - Unlocking Linux Secrets
DFSP # 416 - Persistence Mechanisms on Windows
DFSP # 415 - Dealing with Third-Party Incidents
DFSP # 414 - CRON Forensics
DFSP # 413 - Ransomware Initial Response
DFSP # 412 - Conhost Forensics
DFSP # 411 - NTLM Credential Validation
DFSP # 410 - Linux Temp Directories
DFSP # 409 - Regsvcs and Regasm Abuse
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
Black Wolf Feed (Chapo Premium Feed Bootleg)
Bannon`s War Room