Artwork

Content provided by Michael and Digital Forensic Survival Podcast. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Michael and Digital Forensic Survival Podcast or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

DFSP # 430 - Targeting Tasks

18:20
 
Share
 

Manage episode 418195129 series 2391247
Content provided by Michael and Digital Forensic Survival Podcast. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Michael and Digital Forensic Survival Podcast or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Windows Scheduled Tasks are often used by attackers to establish persistence. As an analyst, you want to be aware of the different windows event codes that record these details. These artifacts come up in just about every windows compromise assessment, consider them core triage skills. There are several events, all of which I will go over in this episode. I will break them down from a DFIR point of view and give you the triage methodology...

  continue reading

444 episodes

Artwork
iconShare
 
Manage episode 418195129 series 2391247
Content provided by Michael and Digital Forensic Survival Podcast. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Michael and Digital Forensic Survival Podcast or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Windows Scheduled Tasks are often used by attackers to establish persistence. As an analyst, you want to be aware of the different windows event codes that record these details. These artifacts come up in just about every windows compromise assessment, consider them core triage skills. There are several events, all of which I will go over in this episode. I will break them down from a DFIR point of view and give you the triage methodology...

  continue reading

444 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide