
Digital Forensic Survival Podcast
Technology Podcasts
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
Location:
United States
Genres:
Technology Podcasts
Description:
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
Language:
English
Email:
dfirpodcast@gmail.com
Episodes
DFSP # 499 Linux top 10
9/9/2025
Duration:00:25:05
DFSP # 498 Windows top 10
9/2/2025
Duration:00:19:27
DFSP # 497 ticket to ride
8/26/2025
Duration:00:15:44
DFSP # 496 Signed, Sealed, Exploited
8/19/2025
Duration:00:12:35
DFSP # 495 Corrupted from within
8/12/2025
Duration:00:14:03
DFSP # 494 the request is out there
8/5/2025
Duration:00:17:48
DFSP # 493 Stop, Share, and Listen
7/29/2025
Duration:00:17:21
DFSP # 492 A Bit of TCP
7/22/2025
Duration:00:20:37
DFSP # 490 Unveiling the USN Journal
7/8/2025
Duration:00:12:13
DFSP # 489 Hidden Gateways
7/1/2025
Duration:00:14:41
DFSP # 488 SSH & Red Herrings
6/24/2025
Duration:00:16:53
DFSP # 487 Unmasking Malicious Activity with 4688
6/17/2025
Duration:00:13:51
DFSP # 486 Squid Games
6/10/2025
Duration:00:19:35
DFSP # 485 Certifiably Suspicious
6/3/2025
Duration:00:14:00
DFSP # 485 BAM! Packing Punch
5/27/2025
This week, I delve into the Windows BAM artifact, unraveling its forensic significance and exploring how it can unlock critical insights in digital investigations.
Duration:00:10:58
DFSP # 483 Cooking up Forensics with Chef
5/20/2025
In this week’s episode, I delve into strategies for integrating CHEF into your security investigations, unlocking new avenues for proactive defense and effective incident response.
Duration:00:14:36
DFSP # 482 Unlocking Clues from Bash and Hidden Keys
5/13/2025
This week, we’re pulling back the curtain on SSH from a digital forensics perspective.
Duration:00:20:41
DFSP # 481 Triage outside the Core
5/6/2025
In this week’s episode, I dive into rapid triage techniques for non-core Windows executables to uncover signs of malicious activity.
Duration:00:20:08
DFSP # 480 Hidden risks of nested groups
4/29/2025
This week, I’m talking about nested groups in Windows Active Directory and the security risks they pose. Active Directory allows administrators to attach one group to another—often called nesting. While nesting can simplify account administration and permission management, it can also create real opportunities for attackers if...
Duration:00:13:59