478 Avsnitt

  1. DFSP # 419 - What the Flux

    Publicerades: 2024-02-27
  2. DFSP # 418 - Core Insights: Navigating MFT in Forensics

    Publicerades: 2024-02-20
  3. DFSP # 417 - Unlocking Linux Secrets

    Publicerades: 2024-02-13
  4. DFSP # 416 - Persistence Mechanisms on Windows

    Publicerades: 2024-02-06
  5. DFSP # 415 - Dealing with Third-Party Incidents

    Publicerades: 2024-01-30
  6. DFSP # 414 - CRON Forensics

    Publicerades: 2024-01-23
  7. DFSP # 413 - Ransomware Initial Response

    Publicerades: 2024-01-16
  8. DFSP # 412 - Conhost Forensics

    Publicerades: 2024-01-09
  9. DFSP # 411 - NTLM Credential Validation

    Publicerades: 2024-01-02
  10. DFSP # 410 - Linux Temp Directories

    Publicerades: 2023-12-26
  11. DFSP # 409 - Regsvcs and Regasm Abuse

    Publicerades: 2023-12-19
  12. DFSP # 408 - Nesting

    Publicerades: 2023-12-12
  13. DFSP # 407 - More About Lateral Movement and Kerberos

    Publicerades: 2023-12-05
  14. DFSP # 406 - All the BIN Directories

    Publicerades: 2023-11-28
  15. DFSP # 405 - Werfault Attacks

    Publicerades: 2023-11-21
  16. DFSP # 404 - Certutil Attacks

    Publicerades: 2023-11-14
  17. DFSP # 403 - Lateral Movement Kerberos Auth Events

    Publicerades: 2023-11-07
  18. DFSP # 402 - Linux Root Directory Files for DFIR

    Publicerades: 2023-10-31
  19. DFSP # 401 - INF Fetch Execute

    Publicerades: 2023-10-24
  20. DFSP # 400 - CMSTP

    Publicerades: 2023-10-17

4 / 24

Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.

Visit the podcast's native language site