-
Been Hacked? Cyber Harassed? Cyber Bullied? Bitcoin Stolen? Hire a Hacker!
#hireahacker#hackers4hire#dfir#cybersecurity http://bit.ly/2qbJz83 pic.twitter.com/LDuPBDPgLV
-
New cool
#DFIR tool from@MagnetForensics, and it's free too :) https://www.dfir.training/tools/forensic-utilities/imaging/1356-magnet-process-capture …pic.twitter.com/fPqs7LtPFN
-
More plugins pushed to Github today: http://windowsir.blogspot.com/2018/06/updates_29.html …
#DFIR -
I just used
@MagnetForensics AXIOM to view the SRUM artifacts and show that a BitTorrent client app read over 100GB and wrote over 50GB to disk over a two month period. Thanks to@HECFBlog CTF that helped me realize how useful this artifact can be.#DFIR -
New Blog: Finding Failed Logon Attempts With Log2Timeline While You’re Searching For Your FTK Dongle.
#DFIR https://www.dfir.co.za/2018/06/29/finding-failed-logon-attempts-with-log2timeline-while-youre-searching-for-your-ftk-dongle/ … -
Our latest free tool, Magnet Process Capture is now available! Find out more about the tool, which allows you to capture memory from individual running processes in this blog from our Founder & CTO,
@JadAtMagnet: http://ow.ly/LkbK30kJrNe#DFIR pic.twitter.com/gtmyaOCvTq
-
Reverse Engineering Malware, Part 1: Getting Started Reversing
#reversing#malware#reverseengineering#dfir http://bit.ly/2m3neEQ pic.twitter.com/IAt0HOJwMD
-
Check out all the training we're having for
#AugustaCyberWeek 2018@LaNMaSteR53#PWAPT Class@chrissanders88 Practical Packet Analysis class and@securityonion 4-Day Basic Course#AugustaGA#python#packetAnalysis#NSM#BlueTeam#DFIR#ThreatHunting http://bsidesaugusta.org/training/ pic.twitter.com/SSJOkEh5FG
-
Digital Forensics, Part 9: Extracting EXIF Data from Graphic Files
#dfir#digitalforensics#cybersecurity#infosec http://bit.ly/2s6X9Zy pic.twitter.com/jGZsz7oJMB
-
Just released a new version of WHIDS with plenty of new cool features. If you have some interest in
#ThreatHunting,#DFIR or#SOC, it might be interesting to you!pic.twitter.com/jSjVNkXDe7
-
Base64 and Base32 are very popular for encoding data in a domain name label for DNS C2. Although Base64 is often modified to exclude suspicious characters, if you see '+', '/' , '>', '=', etc., be sure to check it out.
#DFIR pic.twitter.com/Btk0AIZ9kg
-
Hug your DFIR friends today. They’ve seen more scarring porn than most people should.
#blueteamers#dfir -
Keep your work space up to date with the LATEST tools like the NEW
#WindowsForensics Poster! Always FREE to the community! http://digital-forensics.sans.org/u/EOT#DFIR pic.twitter.com/E3LmkHFXrU
-
AXIOM saves the day! Boom!
#DFIR#try_us_out_on_a_mobile_case!pic.twitter.com/a3bf4ORljc
-
Extracting files from SMB is an often overlooked feature of Wireshark. Very handy for investigating lateral movement from PCAP.
#DFIR#dailypcappic.twitter.com/F6Y2wNI4Oy
-
[PDF] Guidance document provided by the Australian Cyber Security Centre on hardening workstations running on Microsoft Windows 10 version 1709.
https://www.asd.gov.au/publications/protect/Hardening_Win10.pdf …
#BlueTeam#DFIR pic.twitter.com/txPKMeeSrg
-
This
#BroCon17 video shows why@Bro_IDS is the ultimate blue team tool. In fact, Bro data is soo good and useful, it makes the red team work harder and forces them to change tactics. http://bit.ly/2IurmZp#cybersecurity#DFIR#infosecpic.twitter.com/CNzk37L6aV
-
Digital Forensics, Part 7: Live Analysis with sysinternals
#sysinternals#dfir#digitalforensics#cybersecurity#infosec http://bit.ly/2pPKYyY pic.twitter.com/DUtlbRtudb
Het laden lijkt wat langer te duren.
Twitter is mogelijk overbelast of ondervindt een tijdelijke onderbreking. Probeer het opnieuw of bekijk de Twitter-status voor meer informatie.