As always, thanks to those who give a little back for their support!
FORENSIC ANALYSIS
- Alexander Jäger
Garmin .Fit file Forensics - Andrea Fortuna at ‘So Long, and Thanks for All the Fish’
iOS Forensic: full disk acquisition using checkra1n jailbreak - Heather Mahalik at Cellebrite
Keyword Searching in Cellebrite BlackLight Content Search - Cheeky4n6Monkey
iOS14 Maps History BLOB Script - Giuseppe Scalzi at Compass Security
The “Volatility Triage App” for Splunk - Danny Henderson Jr
SANS Community CTF November — Network Challenge Write-Up - Darkdefender
Can you check if my computer’s been hacked? - Elcomsoft
- Halkyn Security
DFIR on a Shoestring – Incident response for less - James Smith at DFIR Madness
Mounting Case001 E01 Files - Magnet Forensics Weekly CTF
- Passware
Extracting Passwords from the Acquired Windows Registry - Amy Nguyen at Sumuri
Big Sur, Big Changes - The DFIR Report
PYSA/Mespinoza Ransomware
THREAT INTELLIGENCE/HUNTING
- 360 Netlab
DNSMon: 用DNS数据进行威胁发现 - Adam at Hexacorn
Re-sauce, Part 3 - Andrea Fortuna at ‘So Long, and Thanks for All the Fish’
How to detect Cobalt Strike activities in memory forensics - Andrew Skatoff at ‘DFIR TNT’
Detecting Ransomware Precursors - Ben Bornholm at HoldMyBeer
Integrating Vault secrets into Jupyter Notebooks for Incident Response and Threat Hunting - Liviu Arsene and Radu Tudorica at Bitdefender Labs
TrickBot is Dead. Long Live TrickBot! - Borja Merino at BlackArrow
Hindering Threat Hunting, a tale of evasion in a restricted environment - Brad Duncan at Malware Traffic Analysis
- Yihao Lim at Fire Eye Threat Research
Election Cyber Threats in the Asia-Pacific Region - John Hammond at Huntress Labs
Tried and True Hacker Technique: DOS Obfuscation - Chris Crowley and Josiah Smith at InQuest
SOC-Class: Use Case Development - Nicolas Bareil at ‘Just Another Geek’
Decoding C2 Traffic in Python, or HOWTO eat 🍿 during an IR engagement? - Dominic Chell at MDSec
A Fresh Outlook on Mail Based Persistence - Menasec
How to Design Detection Logic – Part 1 - Mike at “CyberSec & Ramen”
Dual Lingo: Japanese and English Titled LNK Files Targeting Businesses - Suleyman Ozarslan at Picus Security
The Most Used MITRE ATT&CK Technique: T1055 Process Injection - Luis Francisco Monge at Security Art Work
Threat hunting (VIII): cazando sin salir de casa. Creación de procesos (II) - Telsy
The double extortion technique: the Campari case - Emiliano Martinez at VirusTotal
Using similarity to expand context and map out threat campaigns
UPCOMING EVENTS
- AceLab
A Video of the ACE Lab Webinar on Data Recovery for Beginners and Start-ups - Andrea Lazzarotto
ONIF Digital Forensics Webinar 2020 — 03/12/2020 - Basis Technology
- Elan at DFIR Diva
DFIR Related Events for Beginners – December, 2020 - AccessData
Register For Webinar: What the Tech? Using AD Enterprise For Volatile Memory Analysis And Live System Searching - Sherry Torres and Eric Oldenburg at Griffeye
Webinar: A powerful approach for discovering video evidence - Magnet Forensics
- December 1 10:00AM CET: On-Scene Triage with Magnet OUTRIDER 2.0
- December 2 11:00AM AEDT/December 4 10:00AM GMT: Simplify Your Investigations: Investigating and Containing Cyber Attacks with OSINT and AXIOM
- December 2 11:00AM ET: Performing Linux Forensic Analysis & Why You Should Care
- December 3 11:00AM ET: Tips and Tricks // Processing Memory Images
- MSAB
XAMN Investigates: Part One - ADF
Best 2021 Law Enforcement Conferences in North America | United States - SANS
Good News: SANS Virtual Summits Will Be FREE for the Community in 2021 - Studio d’Informatica Forense
ONIF Digital Forensics Webinar 2020 - X1
Effective Social Media Collection in a Dynamic Environment
PRESENTATIONS/PODCASTS
- Cache Up with Jessica Hyde
Magnet Forensics Presents: Cache Up – Ep.26 – Lynita Hinsch - Kevin Ripa at SANS
- OSDFCon
- Effectively Using RegRipper 3.0, Harlan Carvey, OSDFCon 2020
- Go for Launch: Getting Started with Practical APOLLO Analysis, Sarah Edwards, OSDFCon 2020
- Detection and Tracking of Forged Digital Images on Social Media using Forensically, OSDFCon 2020
- Autopsy’s Year in Review, Brian Carrier, OSDFCon 2020
- Open Source Mobile Forensics using Python, Alexis Brignoni, OSDFCon 2020
- Putting Together the RDPiece, Brian Moran, OSDFCon 2020
- Linux Forensics for IoT: Hello World, Joseph Mccormack, Austin Grupposo, OSDFCon 2020
- Investigating Windows Subsystem for Linux (WSL) Endpoints, Asif Matadar, OSDFCon 2020
- Using Past Data to Determine Relevance in Autopsy, Brian Carrier, OSDFCon 2020
- Lightning Talks 2020
- Breaking Badness podcast
68. Let’s Doc Turkey - Cellebrite
- Detections Podcast
- DFIR.Science
- Digital Forensic Survival Podcast
DFSP # 249 – Linux Fileless Attacks - Life has no CTRL ALT DEL with Heather Mahalik
DFIR Legal Hot Topics - Magnet Forensics
- MSAB
Guide to the Categories Filter In XAMN - SANS
- Sumuri
MALWARE
- 360 Netlab
Blackrota, a heavily obfuscated backdoor written in Go - Arch Cloud Labs
Tracking Cryptocurrency Miners in The Homelab - Matthew Fulmer at Deep Instinct
Ryuk Ransomware: The Deviance is in the Variance - Check Point Research
- Chuong Dong
RegretLocker - Lior Rochberger at Cybereason
Cybereason vs. Egregor Ransomware - Vladimir Unterfingher at Heimdal Security
Ryuk Ransomware – Untangling a Convoluted Malware Narrative - Igor Skochinsky at Hex Rays
Igor’s tip of the week #17: Cross-references 2 - Kelsey Clark at Hurricane Labs
Solving Garbage with Radare2 - Marco Ramilli
Threat Actor: Unkown - Proofpoint
TA416 Goes to Ground and Returns with a Golang PlugX Malware Loader - Robert Giczewski
- Ryan Cornateanu
Genetic Analysis of CryptoWall Ransomware - SANS Internet Storm Center
- Sebdraven
Actor behind Operation LagTime targets Russia - Jim Walter at SentinelLabs
Egregor RaaS Continues the Chaos with Cobalt Strike and Rclone - Talon
[S2W LAB] Analysis of Clop Ransomware suspiciously related to the Recent Incident (English) - Trend Micro
MISCELLANEOUS
- Autopsy
#OSDFCon 2020, One for the Record Books - Blaze’s Security Blog
Blue Team Puzzle - Craig Ball at ‘Ball in your Court’
C’mon! Bates Numbering Native Production is Easy! - Digital Corpora
- Santosh Khadsare
Common ADB commands - Forensic Focus
- Vitaliy Mokosiy, CTO, Atola
- Global Perspectives From Women In Digital Forensics
- HTCIA International Conference And Expo 2020 – Recap
- Research Roundup: Finding New Cultural And Technical Opportunities
- Interactive Webinar And A Chance To Win Prizes From MSAB
- Digital Intelligence Produces Crucial Clues To Trace Cryptocurrencies
- Hacking Articles
- Howard Oakley at ‘The Eclectic Light Company’
- iNPUT-ACE
Police Training: 3 Important Courses for Video-Centric Investigations - Intel 471
Here’s what happens after a business gets hit with ransomware - Jaco at ‘The Swanepoel Method’
Everything You Wish Your Parents Told You About Emotet - Kevin Pagano at Stark 4N6
Getting GASF’ed with GIAC - MuSecTech
AChoirX – Why? Part I - Nik Alleyne at ‘Security Nik’
Troubleshooting HTTPS – SSH Connectivity to IBM QRadar with TShark - Oxygen Forensics
Wire app extraction - Richard Frawley at ADF
Mobile Preview: Fast Mobile Phone Forensic Triage | Digital Forensics - Ryan Campbell at ‘Security Soup’
Weekly News Roundup — November 22 to November 28 - Semantics21
S21 Auto-Categoriser for LASERi-X - TheHive Project
TheHive Project’s chat has a new home - Andy Gill at ZeroSec
Learning The [Defence] Ropes 101 – Splunk Setup & Config
SOFTWARE UPDATES
- Adam at Hexacorn
Updated appid_calc.pl & dexray.pl - ANSSI DFIR-ORC
v10.1.0-rc2 - Berla
- Emre Tinaztepe at Binalyze
Meet TimelineIR - Cellebrite
Now Available Cellebrite Physical Analyzer and Cellebrite UFED Cloud 7.40 - Didier Stevens
Update: disitool.py Version 0.4 - DME Forensics
DVR Examiner 2.9.3 is now available! - Elcomsoft
Elcomsoft System Recovery update: a Swiss army knife in desktop forensics - Eric Zimmerman
ChangeLog - ExifTool
ExifTool 12.11 - Costas K
Windows 10 Live Information viewer - Magdy Moustafa
CapaExplorer - Microsoft
Sysinternals - Philippe Lagadec
oletools_dll v0.0.1-alpha - Xways
X-Ways Forensics 20.1 Beta 2b - OSForensics
V8.0 build 1003 25th November 2020
And that’s all for the week! If you think I’ve missed something, or want me to cover something specifically hit me up through the contact page or on the social pipes!