Investigating Data Hiding and Covert Communication
The book will focus on incident response methods and techniques when faced with the unprecedented challenge that data hiding…
The book will focus on incident response methods and techniques when faced with the unprecedented challenge that data hiding…
Mike Cary has written a PowerShell script that automates the use of Eric Zimmerman’s cmd line tools (https://eric…
Diffy is a digital forensics and incident response (DFIR) tool developed by Netflix’s Security Intelligence and Respon…
After yesterday’s webcast Matt Bromiley released his Office365 Log Analysis Framework or OLAF to the public. You …
Microsoft’s PowerShell is a command-line shell and scripting language that is installed by default on Windows machines…
This presentation will share some of the techniques and lessons learned in real-world Hadoop implementation at Johns Hopkins…
LiMEaide is a python application designed to remotely dump RAM of a Linux client and create a volatility profile for later a…
We are continuing our write-up. The second part will walk you through the solution of the second set of CTF problems –…
Yesterday Troy Schnack and Kevin Pagano suggested on Twitter that it would be good to write how I solved Magnet User Su…
Business email compromises (BECs) are a big problem across a multitude of industries. Just last week, the FBI participated i…
Login