What We Do Series: Find Egress in PCAP Files
What We Do When Waiting for Windows to Boot… Welcome to the new series-based blog that provides our consultants something to do when powering up lab and analysis systems running *certain versions of...
View ArticleWhat We Do Series: Organizing FTP Logs
Begin Blog: 10:54am EST I cannot remember the last time I actually reviewed FTP logs…. The layout of the ISS FTP log format (W3C) is well documented, but that was not the issue today. We are reviewing...
View ArticleWhat We Do Series: Decide How to Backup Our Data
Begin Blog: 13:20 EST; Shutting down Windows 7 Professional Edition The reason for today’s restart is that I was attempting to backup data to one of our network drives when I discovered that I could...
View ArticleWhat We Do Series: Data Classification & Response
Begin Blog: 2:44pm EST, Shutting down Windows Server 2008, R2 I was asked today, “How can Data Classification help?”; hmm, this is such a broad question so I decided to approach how this program can...
View ArticleWhat We Do Series: Build Our Alternative Linux Box
Welcome to the new series-based blog that provides our consultants something to do when powering up lab and analysis systems running *certain versions of operating systems. These are quick-hitting...
View ArticleWhat We Do Series: Identifying Malicious Processes
Begin Blog: 1:44pm EST, Shutting down Windows 7 Professional Edition Step with me into Bizarro World for a moment, because we are going to pretend that for some reason you have a physical memory image...
View ArticleWhat We Do Series: Getting Started with FTK Imager
Begin blog: 16:10 EST, Restarting Windows Server 2012 For whatever reason, I used to always manage to click the wrong option when I was asked to do something in FTK Imager at my college internship....
View ArticleIt is Time to Stop Crossing the Line; A Risk Perspective
Time after time users are getting bit by not implementing a simple, but elusive concept; egress filtering and segmentation. With all the recent news about new variants of the Backoff POS malware, what...
View Article
More Pages to Explore .....