pouet.chapril.org est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Chapril https://www.chapril.org est un projet de l'April https://www.april.org

Administré par :

Statistiques du serveur :

1,1K
comptes actifs

#dfir

14 messages9 participants2 messages aujourd’hui
13reak :fedora:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@chrissanders88" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>chrissanders88</span></a></span> </p><p>Getting the volatile data first with velociraptor Windows.System.DLLs.<br>(Maybe the dll is still loaded)</p><p>Then of course, getting the dll from the file system. Maybe dumping it in a sandbox /checking the hash on virus total.</p><p>Otherwise evidence of execution. I think e.g. AppCompatCache also lists dlls.</p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/velociraptor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>velociraptor</span></a></p>
Chris Sanders 🔎 🧠<p>Investigation Scenario 🔎</p><p>The process explorer.exe spawned rundll32.exe on a system on your network.</p><p>What do you look for to investigate whether an incident occurred?</p><p>Assume you have access to whatever digital evidence source you need.</p><p><a href="https://infosec.exchange/tags/InvestigationPath" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InvestigationPath</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOC</span></a></p>
Alexis Brignoni :python: :donor:<p>Sadly some actually do 😬</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileForensics</span></a></p>
The DFIR Report<p>Passionate about Digital Forensics and Incident Response? Want to share your expertise with the security community while collaborating with talented analysts worldwide?</p><p>We're looking for volunteer analysts to join the team! We dive deep into real-world threats and publish monthly public reports detailing threat actor TTPs and how they achieve their goals.</p><p>As part of the team, you will:</p><p>➡️Analyze intrusion data and contribute to impactful DFIR reports.<br>➡️Help shape how we share findings 📄🎨<br>➡️Collaborate with and learn from amazing analysts across the globe.<br>➡️Access our internal group to ask questions, share insights, and improve processes. 🧠<br>➡️ Have the unique opportunity to present our collective findings at security conferences and talks! 🎤</p><p>Ready to join the team? Follow the process ➡️ <a href="https://github.com/The-DFIR-Report/DFIR-Artifacts" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/The-DFIR-Report/DFI</span><span class="invisible">R-Artifacts</span></a></p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a></p>
Resilience Theatre @38C3<p>RaspberryPi Zero2w serves whole world and terrain from 256 GB MicroSD card. Pictured white box contains RPi and creates wifi access point. Phone attached to AP and browser allows you to browse full world map. No need for Internet connectivity or SIM card in you phone. Perfect tool for preparedness and denied area planning.<br><a href="https://youtube.com/shorts/TAY2yY8TAoY?si=Xg8AUInWEFspJsMe" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtube.com/shorts/TAY2yY8TAoY</span><span class="invisible">?si=Xg8AUInWEFspJsMe</span></a></p><p><a href="https://infosec.exchange/tags/edgemap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>edgemap</span></a> <a href="https://infosec.exchange/tags/prepping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>prepping</span></a> <a href="https://infosec.exchange/tags/redetam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redetam</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/deniedarea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deniedarea</span></a> <a href="https://infosec.exchange/tags/opsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opsec</span></a> <a href="https://infosec.exchange/tags/offline" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offline</span></a></p>
Alexis Brignoni :python: :donor:<p>"Good work is done with dignity, and there is no dignity in rushing." </p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/Mobile" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mobile</span></a> Forensics</p>
brettshavers<p>We are all screw-ups in DF/IR (at some point or many points in our career!). <a href="https://www.linkedin.com/pulse/mistake-error-misconduct-brett-shavers-kfbvf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/pulse/mistake-err</span><span class="invisible">or-misconduct-brett-shavers-kfbvf</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a></p>
Terryn :unverified:<p>Why Learning Through Books is Key in Cybersecurity</p><p>📚 Types of Books<br>☯️ The Tao of Books<br>🏫 Other Sources of Information</p><p><a href="https://chocolatecoat4n6.com/2025/04/09/why-learning-through-books-is-key-in-cybersecurity/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">chocolatecoat4n6.com/2025/04/0</span><span class="invisible">9/why-learning-through-books-is-key-in-cybersecurity/</span></a></p><p><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/books" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>books</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Alexis Brignoni :python: :donor:<p>LevelDB is one of the most underrated and under utilized data sources. </p><p>Excellent article by Alex Caithness from CCL Solutions Group on LevelDB and its importance: <a href="https://www.cclsolutionsgroup.com/post/hang-on-thats-not-sqlite-chrome-electron-and-leveldb" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cclsolutionsgroup.com/post/han</span><span class="invisible">g-on-thats-not-sqlite-chrome-electron-and-leveldb</span></a></p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileForensics</span></a></p>
Alexis Brignoni :python: :donor:<p>How to install and run <a href="https://infosec.exchange/tags/iLEAPP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iLEAPP</span></a> on your computer or using the Atrio MK II from Arcpoint Forensics.</p><p><a href="https://www.arcpointforensics.com/news-1/ileapp" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">arcpointforensics.com/news-1/i</span><span class="invisible">leapp</span></a></p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileForensics</span></a></p>
Chris Sanders 🔎 🧠<p>Investigation Scenario 🔎</p><p>A user reports that all the files in their documents/desktop folders are gone after returning to the office on Monday. They swear they didn’t delete them.</p><p>What do you look for to investigate whether an incident occurred?</p><p><a href="https://infosec.exchange/tags/InvestigationPath" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InvestigationPath</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOC</span></a></p>
Alexis Brignoni :python: :donor:<p>🏦 From the meme vault</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileForensics</span></a></p>
Jessica Hyde<p>Check out our first episode of the <a href="https://infosec.exchange/tags/TruthInData" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TruthInData</span></a> podcast! Our topic this week: Evidence Gone: The Perils of Delayed Mobile Acquisition </p><p><a href="https://youtu.be/vb0G-uLvwMM?si=C6JDr9UI046J5R__" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtu.be/vb0G-uLvwMM?si=C6JDr9</span><span class="invisible">UI046J5R__</span></a></p><p>With Debbie Garner &amp; Kim Bradley <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a></p>
The DFIR Report<p>“In this specific case, thanks to the capabilities of Sysmon, and particularly Event ID 22, we can easily gain insight into the subdomains that were used. For this case we observed TXT records being utilized for C2 communication rather than MX records. This can be identified by the "type: 16" in the Sysmon logs seen above. </p><p>Below is a sample list that, while not exhaustive, provides a clear example of the traffic patterns:”</p><p>The above is from a recent Private Threat Brief: "A MadMXShell Encore"</p><p> Services: <a href="https://thedfirreport.com/services/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">thedfirreport.com/services/</span><span class="invisible"></span></a></p><p> Contact Us: <a href="https://thedfirreport.com/contact/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">thedfirreport.com/contact/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeam</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a></p>
Jessica Hyde<p>So excited to collab with Debbie Garner and Kim Bradley on the <a href="https://infosec.exchange/tags/TruthInData" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TruthInData</span></a> podcast to bring a weekly deep dive into a different digital forensic topic each week! Subscribe to the Hexordia YouTube channel and never miss the conversation. <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://youtube.com/@hexordia" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtube.com/@hexordia</span><span class="invisible"></span></a></p>
Alexis Brignoni :python: :donor:<p>Current <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> extraction order of volatility to mitigate log wiping by <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> tools:</p><p>0) Extract iOS Sysdiagnose/Unified logs from the device.<br>1) Conduct a full file system extraction.</p><p><a href="https://infosec.exchange/tags/VendorsNeedToAdress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VendorsNeedToAdress</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileForensics</span></a></p>
cyb_detective<p>DIGITAL FORENSICS GUIDE</p><p>Long and detailed guide for beginners:</p><p>- Digital Forensics Tools, Libraries, and Frameworks</p><p>- Virtualization</p><p>- File systems</p><p>- Security Tools and Frameworks</p><p>- Networking</p><p><a href="https://github.com/mikeroyal/Digital-Forensics-Guide" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mikeroyal/Digital-F</span><span class="invisible">orensics-Guide</span></a></p><p>Contributor x.com/MikeR256 </p><p><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a></p>
Alexis Brignoni :python: :donor:<p>0) IYKYK<br>1) The order of volatility is important and changes with time.<br>2) Preservation is foundational.</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a></p>
Alexis Brignoni :python: :donor:<p>The buttons have to be pressed but that is just the start, not the end.</p><p>Trust no tool. Thinking is a non optional requirement.</p><p>Great read: <a href="https://www.dutchosintguy.com/post/the-slow-collapse-of-critical-thinking-in-osint-due-to-ai" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">dutchosintguy.com/post/the-slo</span><span class="invisible">w-collapse-of-critical-thinking-in-osint-due-to-ai</span></a></p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a></p>
Alexis Brignoni :python: :donor:<p>It's all about how you articulate the situation.</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileForensics</span></a></p>