Powered by RND
PodcastsTecnologíaDigital Forensic Survival Podcast
Escucha Digital Forensic Survival Podcast en la aplicación
Escucha Digital Forensic Survival Podcast en la aplicación
(898)(249 730)
Favoritos
Despertador
Sleep timer

Digital Forensic Survival Podcast

Podcast Digital Forensic Survival Podcast
Digital Forensic Survival Podcast
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
Ver más

Episodios disponibles

5 de 457
  • DFSP # 458 Shellbags and PCA
    In this episode, we’ll dive into two essential forensic artifacts in Windows: shellbags and the Program Compatibility Assistant (PCA). Shell bags provide valuable evidence of file and folder access, offering insights into user activity and file navigation. We’ll also explore PCA, which can reveal important information about file execution history. Together, these artifacts play a crucial role in uncovering key forensic details during investigations.
    --------  
    18:11
  • DFSP # 457 WSL
    The Linux subsystem for Windows, create both opportunity and challenges for forensic analysts. It makes Windows an excellent platform for multi platform forensic analysis tasks, allowing it to take advantage of the many Linux tools available. The challenges are foreseeable, you have Linux artifacts, now commingled on a Windows platform, which makes forensic analysis that much more difficult when examining such a system as evidence. This week I'm going to break down the Linux subsystems for forensic investigators
    --------  
    25:52
  • DFSP # 456 network triage primer
    In this episode, we’ll explore the fundamentals of network triage, focusing on the key aspects of network traffic that are central to many investigations. Additionally, we’ll discuss some of the essential tools you can use to analyze and manage network data effectively.
    --------  
    32:05
  • DFSP # 455 Security Control Circumvention
    Today, we’re going to explore how to handle a critical security event: Unauthorized Modification of Information. This type of event occurs when a user alters information in a system—whether it’s an application, database, website, server, or configuration files—without prior authorization. These modifications can range from impersonation and unauthorized system updates to more sophisticated techniques such as SQL injections, privilege escalations, and configuration file tampering.
    --------  
    33:29
  • DFSP # 454 MFA Bypass Attacks
    This week I talk about the attack methods being used to bypass MFA. We'll learn about real-world cases where MFA was circumvented, and discover best practices to strengthen defenses against these types of attacks...
    --------  
    15:30

Más podcasts de Tecnología

Acerca de Digital Forensic Survival Podcast

Sitio web del podcast

Escucha Digital Forensic Survival Podcast, Platzi Podcast y muchos más podcasts de todo el mundo con la aplicación de radio.net

Descarga la app gratuita: radio.net

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app
Radio
Aplicaciones
Redes sociales
v6.29.0 | © 2007-2024 radio.de GmbH
Generated: 12/4/2024 - 2:32:23 AM