Digital Forensic Survival Podcast
Technology
SSH is a protocol used to secure remote access to systems, making it a cornerstone in safeguarding sensitive information and ensuring secure communications. In this podcast, we will delve into the basics of SSH, its key concepts and other useful elements important for context when investigating for notable SSH activity.
DFSP # 414 - CRON Forensics
DFSP # 413 - Ransomware Initial Response
DFSP # 412 - Conhost Forensics
DFSP # 411 - NTLM Credential Validation
DFSP # 410 - Linux Temp Directories
DFSP # 409 - Regsvcs and Regasm Abuse
DFSP # 408 - Nesting
DFSP # 407 - More About Lateral Movement and Kerberos
DFSP # 406 - All the BIN Directories
DFSP # 405 - Werfault Attacks
DFSP # 404 - Certutil Attacks
DFSP # 403 - Lateral Movement Kerberos Auth Events
DFSP # 402 - Linux Root Directory Files for DFIR
DFSP # 401 - INF Fetch Execute
DFSP # 400 - CMSTP
DFSP # 399 - Lateral Movement Failed Logon Events
DFSP # 398 - OODA & JOHARI
DFSP # 397 - Linux Home Directory Files for DFIR
DFSP # 396 - URL Leak
DFSP # 395 - Lateral Movement and Admin Logons
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast