SANS Digital Forensics and Incident Response Blog: Category - Computer Forensics

Network Forensics (FOR558) in Arlington, VA

Now that the holidays are over, it's time to re-focus on challenges ahead. That includes training to help you to successfully tackle those tasks ahead in the new year. It's an ideal time to join Phil Hagen in Arlington, VA for FOR558: Network Forensics. This course has been in high demand, and now you'll be … Continue reading Network Forensics (FOR558) in Arlington, VA


Digital Forensics Case Leads: Hacking into the New Year, and a Virus Causes a Man to Get a New Trial

Happy New Year from the Case Leads team! In this first Case Leads of the year several organizations have been hacked, a man gets a new trial because of a computer virus and Windows 8 will have a reset button. Several tools have been updated and introduced and some good reads along with a little … Continue reading Digital Forensics Case Leads: Hacking into the New Year, and a Virus Causes a Man to Get a New Trial


Reverse Engineering Malware - FOR610 - in Phoenix, AZ

In February, Hal Pomeranz will be in Phoenix to teach FOR610: Reverse Engineering Malware. This advanced course at the SANS Institute has been incredibly valuable to investigators worldwide trying to fight the Advanced Persistent Threat (APT). The course runs from Monday, February 13, 2012 to Friday, February 17, 2012. "This was a great course that … Continue reading Reverse Engineering Malware - FOR610 - in Phoenix, AZ


New Incident Response and Digital Forensic Techniques - Countering the Advanced Persistent Threat

Over the past two years, we have seen a dramatic increase in sophisticated attacks against organizations. Cyber-attacks originating from China named the Advanced Persistent Threat (APT) have proved difficult to suppress. Financial attacks from Eastern Europe and Russia obtain credit card, and financial data resulting in millions of dollars stolen. Commercial and Federal IT Security … Continue reading New Incident Response and Digital Forensic Techniques - Countering the Advanced Persistent Threat


Digital Forensics: UID and GID distributions

On Unix and Linux systems each file has a user id and a group id, uid and gid respectively, showing the file's owner and group. On most *nix systems files in system directories are uid and gid root, which is represented by the numeric uid and gid value of 0, see the sample listing below: … Continue reading Digital Forensics: UID and GID distributions