loader from loading.io

DFSP # 442 - Database Response

Digital Forensic Survival Podcast

Release Date: 08/06/2024

DFSP # 457 WSL show art DFSP # 457 WSL

Digital Forensic Survival Podcast

The Linux subsystem for Windows, create both opportunity and challenges for forensic analysts. It makes Windows an excellent platform for multi platform forensic analysis tasks, allowing it to take advantage of the many Linux tools available. The challenges are foreseeable, you have Linux artifacts, now commingled on a Windows platform, which makes forensic analysis that much more difficult when examining such a system as evidence. This week I'm going to break down the Linux subsystems for forensic investigators

info_outline
DFSP # 456 network triage primer show art DFSP # 456 network triage primer

Digital Forensic Survival Podcast

In this episode, we’ll explore the fundamentals of network triage, focusing on the key aspects of network traffic that are central to many investigations. Additionally, we’ll discuss some of the essential tools you can use to analyze and manage network data effectively.

info_outline
DFSP # 455 Security Control Circumvention show art DFSP # 455 Security Control Circumvention

Digital Forensic Survival Podcast

Today, we’re going to explore how to handle a critical security event: Unauthorized Modification of Information. This type of event occurs when a user alters information in a system—whether it’s an application, database, website, server, or configuration files—without prior authorization. These modifications can range from impersonation and unauthorized system updates to more sophisticated techniques such as SQL injections, privilege escalations, and configuration file tampering.

info_outline
DFSP # 454 MFA Bypass Attacks show art DFSP # 454 MFA Bypass Attacks

Digital Forensic Survival Podcast

This week I talk about the attack methods being used to bypass MFA. We'll learn about real-world cases where MFA was circumvented, and discover best practices to strengthen defenses against these types of attacks...

info_outline
DFSP # 453 Windows Startup Locations show art DFSP # 453 Windows Startup Locations

Digital Forensic Survival Podcast

In today’s episode, we’ll focus on startup folders, which are perhaps the easiest to triage among all persistence mechanisms. But before diving in, let’s recap the journey so far to underscore the importance of a comprehensive approach rather than a one-off tactic. Each triage area we've covered plays a crucial role in identifying and stopping attacks...

info_outline
DFSP # 452 AI and DFIR show art DFSP # 452 AI and DFIR

Digital Forensic Survival Podcast

In 2024, AI has not only revolutionized how we defend against cyber threats but also how those threats are being carried out. We'll explore how AI is enabling faster, more efficient security incident responses, with real-world examples of its application in automated threat detection and response, advanced forensics, and more. But with every technological leap forward, there's a dark side and attackers are harnessing AI to orchestrate sophisticated attacks...

info_outline
DFSP # 451 SQL Triage show art DFSP # 451 SQL Triage

Digital Forensic Survival Podcast

SQL injection poses significant risks by enabling attackers to access sensitive metadata, execute dynamic SQL commands, and alter system parameters. These actions can lead to unauthorized data access and system disruptions, especially if attackers gain elevated privileges. This week I'm talking about SQL attack patterns from a triage point of view to help you detect such activity when doing log analysis...

info_outline
DFSP # 450 Secure coding and DFIR show art DFSP # 450 Secure coding and DFIR

Digital Forensic Survival Podcast

I decided to talk this week about the Importance of Secure Coding Knowledge for Security Incident Response Investigations. Knowing secure coding principles helps identify the root causes of vulnerabilities and recognize attack patterns. It facilitates effective communication and collaboration with developers, ensuring accurate incident reports and actionable recommendations. Secure coding knowledge enhances forensic analysis by aiding in code reviews and log analysis to detect anomalies. It also allows responders to suggest mitigation strategies and improve the security posture of...

info_outline
DFSP # 449 Zero-Day or Hero-Day show art DFSP # 449 Zero-Day or Hero-Day

Digital Forensic Survival Podcast

This week, we're covering zero-day vulnerability response from a Digital Forensics and Incident Response professional's perspective. In our roles, we often get involved in various tasks that require a security mindset, and one critical task is responding to zero-day vulnerabilities. To provide a real-world context, we'll integrate the recently disclosed zero-day exploit "Copy2Pwn" (CVE-2024-38213) and discuss the specific forensic artifacts and methods used to achieve the objectives of a DFIR response.

info_outline
DFSP # 448 WebShell Forensics show art DFSP # 448 WebShell Forensics

Digital Forensic Survival Podcast

Welcome to this week’s session, where we’ll delve into web shell forensics—an ever-critical topic in incident response investigations and threat-hunting strategies. Today, I’ll provide a breakdown that includes the latest developments, detailed triage techniques, and practical examples of what to look for during your investigations:

info_outline
 
More Episodes

Understanding the different types of databases is important for security incident response investigations, as databases are often targeted by attackers seeking sensitive information. Each database type—relational, NoSQL, in-memory, and cloud-based—has unique structures, query languages, and security mechanisms. Familiarity with these variations enables investigators to effectively...