March 03, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Presentations

Presentations

Presentations

Launching APOLLO: Creating a Simple Tool for Advanced Forensic Analysis

Last week Sarah Edwards attended MacDevOpsYVR in Vancouver, Canada, and had a talk about her simple tool for advanced forensic analysis – APOLLO or Apple Pattern of Life Lazy Output’er. The presentation is available here.

Read More
Presentations

A Brief History of Attribution Mistakes

This presentation will examine the analytic mistakes the infosec community has made over the past ten years when attributing nation-state cyber attacks. The authors will contrast successful and failed attempts at attribution to identify the root causes of failures. The talk will cover basic logical fallacies (eg, mirror imaging and cherry picking) and briefly explain pivoting pitfalls when observing TTPs …

Read More
Presentations

Windows Store & Apps Analysis

Here are research, tools and scripts presented at Magnet User Summit 2019 by Yogesh Khatri and Jack Farley.

Read More
Presentations

Digital Forensics and Incident Response in G Suite

This talk uses a real-life case scenario to prepare attendees for responding to security incidents affecting G Suite users. It’s the norm now to hear companies discussing “moving to the cloud”. Before long your data center servers are going to be antiquated technology. Though the transition to the cloud marks an exciting time in Information Technology, digital forensic investigators and …

Read More
Presentations

Damaged Device Forensics

Steve Watson discusses his research at DFRWS US 2018:

Read More
Presentations

Lean Hunting

(Threat) Hunting has been around long enough that most agree it should be part of any comprehensive information security program. In any cat and mouse game, tooling will never catch all evil. We need to apply creativity, analytical thinking, and keep humans in the loop. The challenge, of course, is that human hours are scarce and expensive. Most organizations cannot …

Read More
Presentations

Adding APFS Support to The Sleuthkit Framework

Joe Sylve discusses his work at DFRWS USA 2018:

Read More
Presentations

Threat Hunting Using Live Box Forensics

In a threat landscape characterized by targeted attacks, fileless malware, and other advanced hacking techniques, the days of relying solely on traditional “dead box” forensics for investigations are… well, dead. Live forensics, a practice considered a dangerous and dark art just a decade ago, has now become the de facto standard. However, many Computer Security Incident Response Teams still struggle …

Read More
Presentations

Uncovering and Visualizing Malicious Infrastructure

How much information about a threat can you find using a single IP address, domain name, or indicator of compromise (IOC)? What additional threats can you identify when looking at attacker and victim infrastructure? To discover and analyze the infrastructure behind large-scale malware activity, Josh Pyorre and Andrea Scarfo will look at known indicators from popular botnets spreading such threats …

Read More
Presentations

Cyber Threat Intelligence Summit & Training 2019: Presentations

Presentations from Cyber Threat Intelligence Summit & Training 2019 are already available at SANS website. You can access them here.

Read More
Page 1 of 41234

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

  • May 24, 2020

    Utilities go for launch!

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account