Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
Digital Forensic Survival Podcast public [search 0]
Best Digital Forensic Survival Podcast podcasts we could find (updated July 2020)
Best Digital Forensic Survival Podcast podcasts we could find
Updated July 2020
Updated July 2020
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
This week is part 2 of the Mobile Attack series.
This week I interview Steve Whalen of SUMURI and we talk about effective ways to report forensic findings.
This week I talk about examining Windows systems for evidence of persistence.
This week I talk about a triage methodology for examining user activity.
This week I talk about mobile device compromise.
This week I talk about examining Conhost data for evidence of execution.
This week I interview Steve Whalen of SUMURI about Apple metadata.
This week I talk about a triage methodology for examining suspicious user accounts.
This week I talk about mobile device operating system and file system security, focusing specifically on applications.
This week I interview MSAB instructor Chris Currier about mobile forensics for new examiners.
This week I talk about persistence, malware analysis and identifying system owners.
This week I talk about SOF-ELK to take your timelines to a new level
This week I talk about CFF Explorer.
This week I talk with MSAB about DHASH, learn what it is and its use in DFIR investigations
This week I cover triaging CMSTP for remote execution
This week I explain why you need CyberChef in your toolbox
This week I talk DFIR triage for Microsoft Trusted Dev Utilities
This week I review resources aimed at teaching you Python
This week I interview Steve Whalen from SUMURI about the current Mac Forensic landscape
This week I talk about Pivot Tables and their value for DFIR investigations
This week I talk about common autorun locations to check during Mac exams
This week I talk about a fast triage methodology to detect persistence on Windows systems
This week I talk about tools available on the SIFT workstation... that you may not know or even there!
This week I talk breakdown certutil exploitation; what it is and methods to detect malicious usage
This week I talk about using layered drivers as an artifact to identify persistence