Loading ...
Sorry, an error occurred while loading the content.

Messages List

9703

(no subject)

130. Floor show Jimmy Weg Sent from my Verizon Wireless 4G LTE DROID - So blame the phone for the typos!
Weg, Jimmy
9:04 PM
#9703
 
9702

30 Minutes till the start of the Webcast - Reverse Engineering Mac M

Webcast Link: http://dfir.to/3-23-15-WC-T Reverse Engineering Mac Malware presented by Sarah Edwards Monday, March 23 at 7:00 PM EST (23:00:00 UTC) Dynamic
Rob Lee
Mar 23
#9702
 
9701

Re: My presentation on the need for proactive threat hunting is now

If you're considering Cb, why not also consider MS's Sysmon? Using that, and syslog to shuttle the records off of the system to a central location, would be
keydet89
Mar 23
#9701
 
9700

Re: My presentation on the need for proactive threat hunting is now

A tool that I've used to great success is Kansa by David Hull.
James
Mar 22
#9700
 
9699

Re: My presentation on the need for proactive threat hunting is now

Agreed, Harlan. We have done much the same with Python and powershell scripts, but now use Splunk's universal forwarder to execute these collections of
Irrational Pi
Mar 21
#9699
 
9698

Re: My presentation on the need for proactive threat hunting is now

Years ago...prior to 2002...I did proactive hunting within the organization where I worked. I started with a Perl script that would reach out into the domain
keydet89
Mar 21
#9698
 
9697

DFIR Webcast - 3 PM Mon 3/16 - Smartphone Security is Getting Strong

Monday, Mar 16, 2015  @ 3 PM ET  http://dfir.to/Smartphone-Webcast-Mar-16 Overview As smartphones become more secure, what has hanged for us forensically?
Rob Lee
Mar 15
#9697
 
9696

The 2015 BSides New Orleans speaker lineup is out!

We are very excited to announce that the lineup for BSidesNOLA 2015 is out! The day will start with a keynote presentation from Chris Rohlf of Yahoo. It will
Andrew Case
Mar 12
#9696
 
9695

Re: My presentation on the need for proactive threat hunting is now

and I both thoroughly enjoyed it and passed it to our more conventional DFIR guys you never cease to amaze ;) tyvm Robin Jackson Security+, CISSP, ITIL (406)
Robin Jackson
Mar 11
#9695
 
9694

Re: My presentation on the need for proactive threat hunting is now

There are plenty of us doing proactive hunting :) There is just limited access to the data to let you do this, except through constant network monitoring or
Brian Baskin
Mar 11
#9694
 
9693

Re: My presentation on the need for proactive threat hunting is now

Hi Andrew, Thanks a lot for sharing. I really enjoyed that talk! ... I sincerely like the idea but I have not seen anyone actually doing this. However, I
Stefan Kelm
Mar 11
#9693
 
9692

My presentation on the need for proactive threat hunting is now onli

This talk was meant to highlight the need for threat hunting in organizations and the issues that will arise if it is not done:
Andrew Case
Mar 9
#9692
 
9691

Re: Open IR/Forensics Position in Downtown Chicago

Hi, I am interested in applying for the IR / Forensic position.  Can you provide me details on the job description and such. Thanks, Lakshmi N On Wednesday,
lakshmi narayanan rajamani
Mar 4
#9691
 
9690

Open IR/Forensics Position in Downtown Chicago

Open IR/Forensics Position in Downtown Chicago: Still looking for an experienced IR and forensics person for a large enterprise near Millennium Park. This
rwuiuc
Mar 4
#9690
 
9689

Fwd: Job Opportunity: Binary Intelligence - Digital Forensic Examine

All: We have an opportunity for a digital forensic examiner/trainer. Our cases include some traditional computer forensic work but the majority of our
Jim Swauger
Mar 2
#9689
This message has attachments
  • PDF
    174 KB
    BinaryIntel_Position_Description.pdf
View First Topic Go to View Last Topic
Loading 1 - 15 of total 9,703 messages