Cookie Consent by Free Privacy Policy Generator Digital Forensics – ShimCache Artifacts
Paypal Spenden für Projekt | Google Playstore Download Button für Team IT Security

Theme Auswahl



➠ Digital Forensics – ShimCache Artifacts

Following our last article about the Prefetch artifacts we will now move into the Windows Registry. When conducting incident response and digital forensics on Windows operating systems one of the sources of evidence that is normally part of every investigation is the Windows Registry.  The Windows Registry is an important component of the OS and […]...


➦ Reverse Engineering ☆ countuponsecurity.com

➠ Komplette Nachricht lesen


Zur Startseite

Kommentiere zu Digital Forensics – ShimCache Artifacts











➤ Ähnliche Beiträge für 'Digital Forensics – ShimCache Artifacts'

The State of Windows Digital Analysis

vom 576.59 Punkte
Something that I've seen and been concerned about for some time now is the state of digital analysis, particularly when it comes to Windows systems. From open reporting to corporate blog posts and webinars, it's been pretty clear that there are gaps an

ProtectMyTooling - Multi-Packer Wrapper Letting Us Daisy-Chain Various Packers, Obfuscators And Other Red Team Oriented Weaponry

vom 420.45 Punkte
Script that wraps around multitude of packers, protectors, obfuscators, shellcode loaders, encoders, generators to produce complex protected Red Team implants. Your perfect companion in Malware Development CI/CD pipeline, helping watermark your artifact

Malcolm - A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For Full Packet Capture Artifacts (PCAP Files) And Zeek Logs

vom 405.68 Punkte
Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind: Easy to use – Malcolm accepts network traffic data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be

Program Execution

vom 394.68 Punkte
By now, I hope you've had a chance to read and consider the posts I've written discussing the need for  validation of findings (third one here). Part of the reason for this series was a pervasive over-reliance on single artifacts as a source of findings

Pay-per-GB pricing and more Azure Artifacts updates

vom 304.26 Punkte
Azure Artifacts is the one place for all of the packages, binaries, tools, and scripts your software team needs. It’s part of Azure DevOps, a suite of tools that helps teams plan, build, and ship software. For Microsoft Build 2019, we’re excited to announc

On Validation

vom 270.73 Punkte
I've struggled with the concept of "validation" for some time; not the concept in general, but as it applies specifically to SOC and DFIR analysis. I've got a background that includes technical troubleshooting, so "validation" of findings, or the idea of

Basics of Digital Forensics

vom 260.84 Punkte
Forensics is the work of investigating the evidence and establishing the facts of interest that links to an incident. In this article we just discuss something about Digital Forensics. Here we try to give an introduction to digital forensics as we be

Top 10 Digital Forensics Software Experts Use

vom 249.65 Punkte
Forensics is becoming very important in today’s digital age where many crimes are committed using digital technology, having an understanding of forensics it’s a ... The post Top 10 Digital Forensics Software Experts Use appeared first on HackersOnlineClub.

High-Performance Computing (HPC) And Artificial Intelligence (AI)

vom 245.11 Punkte
What is High-Performance Computing (HPC)? A desktop or a laptop with a 3 GHz processor can perform about 3 billion (10^9)calculations per second. Although this is much faster than what a human can do, it pales in comparison to High-Performance computing solutio

Reference: TaoSecurity News

vom 216.1 Punkte
I started speaking publicly about digital security in 2000. I used to provide this information on my Web site, but since I don't keep that page up-to-date anymore, I decided to publish it here.2017 Mr. Bejtlich led a podcast titled Threat Hunting

Towards ML Engineering: A Brief History Of TensorFlow Extended (TFX)

vom 202.84 Punkte
Posted by Konstantinos (Gus) Katsiapis on behalf of the TFX TeamTable of ContentsAbstractWhere We Are Coming FromLessons From Our 10+ Year Journey Of ML Platform EvolutionWhere We Are GoingA Joint JourneyAbstractSoftware Engineering, as a discipline, has matured over the past 5+ decades. The mod

5 hot digital transformation trends — and 2 going cold

vom 199.59 Punkte
Digital transformation has always been a continuous journey, one that should become an organizational core competency, with the introduction of digital services an ongoing imperative to evolve the business and stave off disruption. While this may re