Syndicated Blog

SANS Digital Forensics and Incident Response Blog
SANS Digital Forensic Investigations and Incident Response Blog
"Investigating WMI Attacks"

“Investigating WMI Attacks”

|
  WMI as an attack vector is not new. It has been used to aid attacks within Microsoft networks since its invention. However, it has been increasingly weaponized in recent years, largely ...
Getting Started with the SIFT Workstation Webcast with Rob Lee

“Investigate and fight cyberattacks with SIFT Workstation”

|
  Digital forensics and incident response (DFIR) has hit a tipping point. No longer just for law enforcement solving cybercrimes, DFIR tools and practices are a necessary component of any organization's cybersecurity ...
"Gamble? Not with your future"

“Gamble? Not with your future”

|
  By Lee Whitfield Honestly, I've never been big into gambling. The closest I've come is buying a lottery ticket when I was 18. While I understand the excitement, the science, and ...
"Go Big with Bootcamp for Advanced Memory Forensics and Threat Detection"

“Go Big with Bootcamp for Advanced Memory Forensics and Threat Detection”

|
  Sometimes, to tackle tough challenges or overcome particularly obstinate obstacles, you've got to go big. No run-of-the-mill efforts or ordinary endeavors will do. It's time for determined, extraordinary work. It's time ...
"DFIR Summit 2019 Call for Presentations (CFP) Now Open"

“DFIR Summit 2019 Call for Presentations (CFP) Now Open”

|
    The 2019 DFIR Summit CFP is now open through 5 pm CST on Monday, March 4th. The 12th annual SANS Digital Forensics & Incident Response (DFIR) Summit is the most ...
Smartphone Forensics Investigations: Using HashCat to Crack an Encrypted iTunes Backup

“SANS FOR585 Q&A: Smartphone Forensics – Questions answered”

|
    Learning doesn't stop when you leave the SANS classroom. Instructors Domenica "Lee" Crognale, Heather Mahalik and Terrance Maguire answer some of the most common questions from FOR585 Smartphone Forensics course ...
"The new version of SOF-ELK is here. Download, turn on, and get going on forensics analysis."

“The new version of SOF-ELK is here. Download, turn on, and get going on forensics analysis.”

|
  We are excited to announce the release of an all-new version of the free SOF-ELK®, or Security Operation and Forensics ELK virtual machine. Now based on the new version of the ...
Shortcuts for Understanding Malicious Scripts

“Shortcuts for Understanding Malicious Scripts”

|
You are being exposed to malicious scripts in one form or another every day, whether it be in email, malicious documents, or malicious websites. Many malicious scripts at first glance appear to ...
"Tune in: How to build an Android application testing toolbox"

“Tune in: How to build an Android application testing toolbox”

|
Mobile devices hold a trove a data that could be crucial to criminal cases, and they also can play a key role in accident reconstructions, IP theft investigations and more. It's not ...
"How to build an Android application testing toolbox"

“How to build an Android application testing toolbox”

|
Mobile devices hold a trove a data that could be crucial to criminal cases, and they also can play a key role in accident reconstructions, IP theft investigations and more. It's not ...
Loading...