mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#dfir

7 Beiträge6 Beteiligte0 Beiträge heute
Fortgeführter Thread

Playbooks don't replace or restrict analysts; however, they can help them perform more thorough investigations. Creating and using them also serves as an excellent learning tool. I hope this standard and its adoption will help folks along that path. #SOC #DFIR

Announcing the DFIR Labs Digital Forensics Challenge - Enterprise Edition! This isn't another textbook simulation. We're giving your team exclusive access to a brand-new, unreleased case from a real incident.

🗓️ When: August 30, 2025 (14:00 – 18:00 UTC)
🛠️ Choose your SIEM: Azure Log Analytics, Elastic, or Splunk.
🕵️ Your Squad: Form a team of 2-3 analysts.
🏆 The Glory: Solve the case, claim bragging rights, and win prizes for the top team!

Spaces are limited. Assemble your elite team and register now to secure your spot!

Register Here: dfirlabs.thedfirreport.com/dfi

dfirlabs.thedfirreport.comDFIR Labs - Digital Forensics Challenge - Enterprise Edition

DEU:

Ich hatte gestern ein Gespräch mit nem Mitstudenten der mit mir zusammen vor 1,5 Jahren den B.Eng. IT-Forensik gemacht hat.

Ausgebildeter Anwendungsentwickler (FI AE), Arbeitet schon ewig für ne riesige Bank. Dann das Studium auf Eigenregie weil Interesse. Hat einen der besten Abschlüsse des Jahrgangs gemacht.

Er wandte sich an mich, weil der PC (Win 10, ca. 10 Jahre alt) eines Nachbarn nicht mehr bootet.

Er is aus allen Wolken gefallen als ich meinte, er soll die HDD ausbauen, USB Dock und dann die Daten runterziehen.

"Dann sind die passwortgeschützten User ja total egal!!!"

Dann bin ich aus allen Wolken gefallen, dass er davon Null Ahnung hatte. Nach 8 Semestern IT Forensik Studium +FIAE.

Deswegen sind bei unseren Jobausschreibungen auch immer alle Studenten rausgefallen. Meist hat n FISI die Stelle gestochen und wurde dann intern forensisch ausgebildet

Wenn man nicht mal ne GraKa oder RAM ein-/ausbauen kann hilft oft das ganze Studium nix. In die IT Forensik Studienprogramme gehört mehr Praxis rein. Grundlagen!

ENG:

Yesterday I had a conversation with a fellow student who did the IT-Forensics B.Eng. together with me.

Trained application developer, working for a huge bank for years. Studied on his own initiative because he was interested. Got one of the best degrees of the year.

He contacted me because a neighbor's PC (Win 10, approx. 10 years old) no longer booted.

He was completely flabbergasted when I told him to remove the HDD, USB dock and then access the data.

“Then the password-protected users won't matter at all!!!”

This flabbergasted me. He had no idea. An IT Forensics B.Eng. does know nothing. After 8 semesters.

That's why all the students always dropped out at our recruitment tests and usually an experienced IT technician got the job and was then trained internally in IT forensics

If you can't even install/remove a graphics card or RAM your degree means nothing.

Many university programs (in IT forensics) lack the basics. This has to change.

Friday fun Linux DFIR challenge!

I'm processing a bunch of data with the following shell code:

for file in *.zip; do
targetdir=$(echo $file | sed 's,-C.*,,')
echo ===== $targetdir
mkdir -p working
cd working
unzip -qq ../$file
tar zxf uploads/file/*.tar.gz
mv '[root]/var/lib/jenkins/logs/slaves' ../../dirs/$targetdir
cd ..
rm -rf working
done

What does this code do?

Can you identify the tool(s) that produced the input files I'm working with?

How would you improve this code?

Hope everybody has a great weekend!

#Linux#DFIR#Shell

My previous intro post was a few years old, so behold, new intro post:

Mike. Live in the Seattle area having grown up in the UK as a full blown British. Have a wife (incredible), child (boy), and three dogs (golden retriver/cream retriver/fuck knows).

I work in information security, something I have done for about 20 years. By day I run corporate security, enterprise IT and various other bits and pieces for an EV charging startup. I am big into EV's and currently drive one that is not a Tesla. I want an electric motorbike, so if anyone has a spare one please send it.

I also have a company of my own, Secure Being (securebeing.com), which does pen testing and digital forensic work - it's my way of staying super hands on while still doing the management bits on the career path.

I have written books about information security things. Five of them. Two are non-fiction textbooks, and three are fiction based on real world #infosec things. Check out infosecdiaries.com and your local bookstore to find them, just search for my name. I have been trying to write more stuff, but always seem to find myself distracted by other things, such as work. linktr.ee/secureowl has some mini stories I've written.

I love radio and everything RF. I have lots of antennas and various scanners and radios on my desk. I love intercepting and decoding things, like digital radio protocols.

I am a big aviation nerd. I always wanted to be a commercial pilot. I gained my private pilots license in the UK at 17, all self funded by my employment at the local Safeway/Morrisons store. I did the sim test and commercial assessments, but for some reason, at 18, I was unable to find the £100k needed to complete the commercial training, so I did computers. But do not worry, because those computers and love of aviation and radio/RF combined, and I run a project called ACARS Drama. acarsdrama.com has all the details.

I play guitar and am a big guitar/audio nerd as well. I record music under the moniker Operation: Anxiety, operationanxiety.com - the music is on all the normal places.

Finally, I am a massive fan of motorsport. I believe I have watched every F1 race for the last 30 years, maybe 25. I also follow F2, FE, Indycar and MotoGP closely. I average around 18 hours of Le Mans 24 hour racing watching per year.

So there you have it. If you are looking for a thought leader on the topics mentioned above, you've come to the wrong place - because this is where I shitpost, and shitposting is cheap therapy.

Secure BeingInformation Security Consultants | Secure Being | United StatesHome of information security consultants, Secure Being LLC
#dfir#pentesting#acars

New release: FlowIntel 1.6.0 — an open-source case management tool — now with extended support for importing MISP events as cases, a timeline view for attributes, a new templating system for notes, and many other new features!

🔗 github.com/flowintel/flowintel
🔗 github.com/flowintel/flowintel

@misp @circl

#opensource #threatintel #threatintel #dfir #cti #misp #flowintel

Thanks to @davcru for the continuous work on the project and all the new contributors.

Linux systems unable to reach out to internet behind pfsense while Windows work fine.

I am trying to set up my #homelab for #forensics and I have encountered a very weird issue. I am running an internal pfsense #firewall for my environment. On this firewall there are 3 interfaces: WAN and two Isolated Labs.

On the "WAN" interface, both #linux and windows systems are able to access the internet without any problems.

But on the other two lans - named Infrastructure and Lab - the Linux systems are not able to connect to the internet after booting, while the systems are able to communicate with each other. In order to get them working I need to go the respective interface and make any change there and save the page, practically refreshing the settings on the interface. After this all currently online linux systems on that interface are working as expected and connectivity is restored. As you can imagine this is a huge pain, especially when I am testing things and I need to turn on various systems at different times. If i put the systems on the WAN interface they face no issue at all, so what could be the solution here for fixing connectivity for linux systems on the other interfaces?

edit: it issue is both on pfsense 2.7.2 and 2.8.0

@homelab
@pfSense

#dfir#proxmox#pfsense

Ein weiteres Tool, das ich nutze, ist #NetworkMiner

Es ist ein leistungsstarkes Open-Source-Tool für #NetworkForensics, das mir die Extraktion von Artefakten wie Dateien, Bildern, E-Mails und Passwörtern aus PCAP-Dateien ermöglicht. NetworkMiner kann auch live Netzwerkverkehr erfassen und detaillierte Informationen über jede IP-Adresse aggregieren, was für passive Asset-Discovery und Übersichten über kommunizierende Geräte nützlich ist.

Seit 2007 hat sich NetworkMiner zu einem beliebten Tool für Incident-Response-Teams und Strafverfolgungsbehörden entwickelt und wird weltweit eingesetzt.

Für mich ein unverzichtbares Werkzeug, um Netzwerkdaten effizient und präzise zu analysieren.

😀 ✌🏼

"The remote endpoints it attempted to contact included several TryCloudflare domains as well as direct IP addresses.

The logic would rotate through the various servers until an online host was found. The malware in this case took 15 minutes to establish a successful connection to an online endpoint at hxxp://bristol-weed-martin-know[.]trycloudflare[.]com/init1234."

➡️ The above is from a recent Private Threat Brief: "Interlock-Linked Threat Actor Gains Access via Fake Teams ClickFix Lure"

➡️➡️Interested in receiving reports like this one? Contact us for a demo or pricing - thedfirreport.com/contact/