Blog: SANS Digital Forensics and Incident Response Blog

Blog: SANS Digital Forensics and Incident Response Blog

SANS #DFIR Polo Shirt - Online Ordering

Now available for online ordering - the SANS DFIR Polo. Up until recently this shirt was only handed out at special events like DFIRCON or the DFIRSUMMIT, but now you can get your very own shirt via the SANS Store. Click here to order one now ->http://dfir.to/DFIRPOLO

Faster SIFT 3.0 Download and Install #DFIR #SIFT3

Having trouble downloading new SIFT 3.0? We are experiencing heavy traffic currently. Try bootstrap install option.


  • Download and install.http://releases.ubuntu.com/12.04/ubuntu-12.04.4-desktop-amd64.iso

  • Open terminal

  • Type:wget --quiet -O - https://raw.github.com/sans-dfir/sift-bootstrap/master/bootstrap.sh | sudo sh -s -- -i -s -y

  • There will be a couple of times it will ask you a few questions. Easy to answer.

  • Takes about 20 minutes to install from bootstrap.



This is the same version that was installed in the VM and will probably be quicker for you to setup.


Finally, this shows off our new packaging manager -- when new releases come out -- when ...

SANS SIFT 3.0 Virtual Machine Released

SANS Investigate Forensic Toolkit (SIFT) Workstation Version 3.0




An international team of forensics experts, led by SANS Faculty Fellow Rob Lee, created the SANS Investigative Forensic Toolkit ...

DFIR Summit Specials -- Till End of March! #dfir #dfirsummit

Remember starting March 17 2014, use these codes:



  • + Summit Only Promotion — Summit for $495. Register with code -> SUMMIT

  • + Class & Summit Promotion — Summit for $195 with a class. Register with code -> COURSE


Stay connected via twitter, using hashtag #DFIRsummit, to hear announcements and discussions surrounding the Summit.

Register Now! -http://dfir.to/DFIRSummit14

Stream-based Memory Analysis Case Study

Based on FOR526 Memory Forensics In Depth content

I recently worked an investigation that involved anomalous network traffic occurring inside a customer's network between a handful of workstations and the internal DNS server. I was given memory images collected by the customer from two of the offending systems. Following the memory analysis methodology we teach in FOR526, I was able to "rule out"* malicious code running on these systems. In addition to doing memory structure-based analysis, I parsed the image with a stream-based data carving tool, Bulk Extractor. This impressive free open-source

...