Player FM - Internet Radio Done Right
179 subscribers
Checked 5d ago
Added nine years ago
Content provided by Michael and Digital Forensic Survival Podcast. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Michael and Digital Forensic Survival Podcast or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED
<
<div class="span index">1</div> <span><a class="" data-remote="true" data-type="html" href="/series/action-academy-replace-the-job-you-hate-with-a-life-you-love">Action Academy | Replace The Job You Hate With A Life You Love</a></span>


Ready to replace your 6-figure salary with real freedom? This is the podcast for high earners who feel stuck in jobs they’ve outgrown. If you’re asking, “How do I actually replace $10K–$20K/month so I can quit and never look back?” — welcome home. At Action Academy, we teach you how to buy small businesses and commercial real estate to create cash flow that actually replaces your job. Monday through Friday, you’ll learn from 7–9 figure entrepreneurs, real estate moguls, and acquisition pros who’ve done it — and show you how to do it too. Hosted by Brian Luebben (@brianluebben), who quit his 6-figure sales role in 2022 to build a global business while traveling the world. If you're a high-income earner ready to become a high-impact entrepreneur, this show is your playbook. Subscribe now and start your path to freedom — or keep pretending your job will get better someday....
Digital Forensic Survival Podcast
Mark all (un)played …
Manage series 166409
Content provided by Michael and Digital Forensic Survival Podcast. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Michael and Digital Forensic Survival Podcast or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
479 episodes
Mark all (un)played …
Manage series 166409
Content provided by Michael and Digital Forensic Survival Podcast. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Michael and Digital Forensic Survival Podcast or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
479 episodes
All episodes
×D
Digital Forensic Survival Podcast


One of the essential skill sets for a DFIR analyst is the ability to understand the impact of vulnerabilities quickly. In many IR scenarios, you may find a newly discovered vulnerability or receive a scan that flags multiple potential weaknesses. To stay efficient, you must...
D
Digital Forensic Survival Podcast


This week, we’re exploring the System Resource Usage Monitor (SRUM) – a powerful source of forensic data within Windows operating systems. First introduced...
D
Digital Forensic Survival Podcast


In this episode, our focus is on understanding how attackers achieve lateral movement and persistence through Secure Shell (SSH)—and more importantly, how to spot the forensic traces...
D
Digital Forensic Survival Podcast


In this episode, we’ll take a focused look at how to triage one of the most commonly targeted Windows processes: svchost.exe. While the methods in this series generally apply to all Windows core processes, svchost is an especially important case because attackers...
D
Digital Forensic Survival Podcast


Ransomware attacks move quickly, making your initial response crucial in minimizing impact. This episode outlines critical first steps, from isolating infected machines to gathering key information and initiating containment. Whether you’re a SOC analyst, incident responder, or the first to notice an attack, this framework is designed to help you regain control. Follow these guidelines to effectively mitigate the damage from the very start.…
D
Digital Forensic Survival Podcast


Today’s episode explores Apple Spotlight and its extended metadata—a powerful yet often overlooked forensic tool in the Mac ecosystem. Spotlight plays a critical role in uncovering digital evidence on macOS. Both experienced forensic analysts and newcomers will find its capabilities essential. Let’s dive into the details.…
D
Digital Forensic Survival Podcast


BIN directories (short for binary) store command binaries like CD, PWD, LS, Vi, and CAT. Every platform has multiple BIN directories: two in the root directory and two in each user directory. This episode explains the types of files in these directories and the purpose of each BIN directory. I will also clarify which directories are typically used by users versus those used by the root user.…
D
Digital Forensic Survival Podcast


Modern Windows systems use a tightly coordinated sequence of core processes to establish secure system and user environments. DFIR investigators and incident responders must understand the interrelationships between processes such as Idle, SMSS, CSRSS, WININIT, and WINLOGON. Recognizing expected behaviors and anomalies in these steps is crucial for detecting potential system compromises. This episode demystifies the Windows 10/11 process flow and provides context for effective triage and analysis.…
D
Digital Forensic Survival Podcast


Today we’re talking all about MacOS AutoRun locations and how to spot persistence mechanisms. We’ll explore the ins and outs of property list files, launch daemons, system integrity protections, and the recent changes in macOS that can impact your forensic examinations...
D
Digital Forensic Survival Podcast


This week I'm talking about the three task hosts. These are Windows core files, and they share not only similar names, but similar functionality. Because of this, there is the potential for confusion, which may allow an attacker to leverage these similarities and mask they are malware. My goal in this episode is to demystify the three different task hosts, and provide the necessary insight for proper triage if any of these files come up during your investigations.…
D
Digital Forensic Survival Podcast


Today’s episode is all about Windows event logs that record blocked network connections. Blocked network events are interesting because they might signal that an attacker’s secondary or tertiary toolset isn’t working as intended. That’s good news from a security standpoint...
D
Digital Forensic Survival Podcast


Today I cover an evolving threat in the cybersecurity world: data brokers. From a computer forensics standpoint, this threats pose unique challenges. While breaches capture headlines, data brokers play a major (and sometimes overlooked) role in fueling cybercrime. In this session, we will explore how these threats operate, why they are dangerous, and how computer forensics professionals can combat them.…
D
Digital Forensic Survival Podcast


The Common Vulnerability Scoring System (CVSS) is a powerful tool for assessing the severity and impact of security vulnerabilities. In digital forensics and incident response, CVSS scores can provide critical context to prioritize investigations and focus on the most significant risks. This episode I will explore how leveraging CVSS scoring enhances vulnerability assessments during incident response, enabling teams to make data-driven decisions.…
D
Digital Forensic Survival Podcast


Understanding the behavior and characteristics of common file types used in attacks, such as executables, scripts, and document files, is essential for effective analysis. In this episode, we will explore practical approaches to triage malware, focusing on key indicators and techniques for prioritizing investigations.…
D
Digital Forensic Survival Podcast


Windows permit events, often overlooked, offer valuable details about allowed network connections that can reveal patterns of malicious activity. In this episode, we will dive into how analyzing these events can enhance network triage, enabling security teams to detect, scope, and respond to threats more effectively.…
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.