SANS Digital Forensics and Incident Response Blog: Category - Computer Forensics

Reverse Engineering Malware - FOR610 - in Phoenix, AZ

In February, Hal Pomeranz will be in Phoenix to teach FOR610: Reverse Engineering Malware. This advanced course at the SANS Institute has been incredibly valuable to investigators worldwide trying to fight the Advanced Persistent Threat (APT). The course runs from Monday, February 13, 2012 to Friday, February 17, 2012. "This was a great course that … Continue reading Reverse Engineering Malware - FOR610 - in Phoenix, AZ


New Incident Response and Digital Forensic Techniques - Countering the Advanced Persistent Threat

Over the past two years, we have seen a dramatic increase in sophisticated attacks against organizations. Cyber-attacks originating from China named the Advanced Persistent Threat (APT) have proved difficult to suppress. Financial attacks from Eastern Europe and Russia obtain credit card, and financial data resulting in millions of dollars stolen. Commercial and Federal IT Security … Continue reading New Incident Response and Digital Forensic Techniques - Countering the Advanced Persistent Threat


Digital Forensics: UID and GID distributions

On Unix and Linux systems each file has a user id and a group id, uid and gid respectively, showing the file's owner and group. On most *nix systems files in system directories are uid and gid root, which is represented by the numeric uid and gid value of 0, see the sample listing below: … Continue reading Digital Forensics: UID and GID distributions


Digital Forensic SIFTing: String Searching and File Carving using srch_strings_wrap

The latest version of the SANS Investigative Forensic Toolkit (SIFT 2.12) contains a few scripts I wrote, and Rob asked me to write a post for the blog going over their functionality. The scripts add on to the functionality provided by The Sleuth Kit's srch_strings to provide additional information on string matches and automatically carve … Continue reading Digital Forensic SIFTing: String Searching and File Carving using srch_strings_wrap


Digital Forensics Case Leads: Forensicsball, Forensic security analysis of Google Wallet, Sprint Disables CIQ

Innovations in timeline forensics, a forensic security analysis of the Google Wallet, and Sprint disables the CarrierIQ "root kit" top this edition of Digital Case Leads. In the 2011 Hollywood blockbuster Moneyball, Brad Pitt plays the part of the real-life Billy Bean, the manager of the Oakland A's baseball team. In the film, Brad Pitt's … Continue reading Digital Forensics Case Leads: Forensicsball, Forensic security analysis of Google Wallet, Sprint Disables CIQ