Finding Evil in 30 Minutes or Less Part 2 – Amcache, Shimcache and the Srum DB
In Part 1 of this series, we looked at collecting volatile data from a machine and analyzing running…
Infosec Training
coming soon
In Part 1 of this series, we looked at collecting volatile data from a machine and analyzing running…
In parts 1 and 2 of this series we examined the artifacts from live system by looking at the process…
One of the other methods attackers are using to establish persistence is through Windows Management …
When you are doing an IR it is crucial that you find answer fast. You often have the client asking f…
The first time I responded to a breach solo was just a few months after starting my career as a DFIR…
One of the major differences between working corporate security vs consulting is the interaction wit…
I’ve been working in IT since 1999. I started out on Windows 3.1 machines running Token Ring n…
Follow me on social and never miss a post from this blog. Only original content and minimalist views, shared daily on social.