An Eye on Forensics
The continuing journey as a Computer Forensic Analyst.
Tuesday, February 5, 2013
The End Game: Part 1
›
Last weekI posted about some of the reconnaissance tools that attackers are using against E-Commerce sites, then about what some of the evid...
4 comments:
Saturday, February 2, 2013
New Year, New Look, New Post: How did they find me? Part 2.
›
Last post we went through some of the free utilities available to attackers for reconnaissance purposes. The utilities I talked about in th...
2 comments:
Friday, May 25, 2012
How did they find me?
›
I wanted to learn more about E-commerce and the type of breaches that take place so I volunteered to take the bulk of the E-comm cases for m...
1 comment:
Sunday, February 12, 2012
Pulling timelines from unsupported filesystems.
›
The conference season is closing in and workload is finally easing up enough to put together a couple of blog posts. This one has been in dr...
Saturday, October 15, 2011
MAC(b) Daddy at SecTor
›
I'm proud to announce that I was invited to deliver I'm your MAC(b) Daddy at SecTor 2011 as well as take part in a full day of train...
1 comment:
Tuesday, August 16, 2011
I'm your MAC(b) Daddy at DEFCON 19
›
It's hard for me to believe that I haven't updated this blog sine March 26th. The last 5 months may have been the...
4 comments:
Saturday, March 26, 2011
Windows Registry Forensics-Review
›
I read Harlan Carvey's "Windows Registry Forensics" on a flight to Florida last week so I thought I'd write up a little re...
2 comments:
‹
›
Home
View web version