DIGITAL FORENSICS:Websites and Webinars
THE list of DFIR related websites AnD WEBINARS.
Crime Scene Do NOT CROSS |
Websites
- DFIR Training
- Forensic Focus
- This Week in 4n6
- AboutDFIR
- ThinkDFIR
- Cyber Forensicator
- Hacking Exposed Computer Forensics Blog
- Digital Forensic Survival Podcast
- Group-IB Blog
- Applied Incident Response
- Black Hills Information Security
- eForensics Magazine
- Didier Stevens Blog
- MalwareTech
- Malware Analysis
- Secjuice
- HackerSploit
- DoubleBlak
- Malware Must Die!
- 0xevilc0de.com
- z3roTrust on Medium
- The Binary Hick
- MalwareUnicorn
- Reverse Engineering Stack Exchange
- Forensics Wiki
- Peerlyst (They also have a mobile app)
Webinars/Webcasts
- Intrusion Analysis for SOC Analysts
- Introduction to Malware Analysis
- Cyber CSI: Learn How to Forensically Examine Phishing Emails
- Securing Your Future in DFIR
- 4-cheat-sheets-for-malware-analysisaz4n6.blogspot.com/p/downloads.html?m=0analyzing-malicious-documentsbinaryforay.blogspot.com/bleepingcomputer.com/news/security/sndbox-an-ai-powered-malware-analysis-site-is-launched/
- Bellingcat’s Online Investigation Toolkit
- businessnewsdaily.com/10893-free-computer-forensics-training-resources.html
- businessnewsdaily.com/10755-best-digital-forensics-certifications.html
- Black Toppers
- CTF Tidbits: Part 1 — Steganography
- cqureacademy.com/blog/forensics/what-to-do-after-hack-5-unusual-places-where-you-can-find-evidence?fbclid=IwAR0kS13lvFKaXmt1f2vXj6ToPVBvkxf900JuH8oN3OLpUiC7LOiLwL_RRTk
- computersecuritystudent.com/cgi-bin/CSS/process_request_v3.pl?HID=310ac205e9fd07c189cdc417fb336a74&TYPE=MAIN
- cgsecurity.org/wiki/File_Formats_Recovered_By_PhotoRec
- ctfs.github.io/resources/?source=post_page-----3dfbaf4a33bf----------------------
- carving-pe-files-with-pecheck-py
- dfrws.org
- DFIR.Science
- Dailyforensics
- digitalcorpora.org/archives/category/disk-images
- DIGITAL FORENSICS – ARTIFACTS OF INTERACTIVE SESSIONS
- Digital Forensics: Overview and its Relationship to Cybersecurity
- digital-forensics.sans.org/blog/2011/12/07/digital-forensic-sifting-super-timeline-analysis-and-creation
- Digital Forensics and Incident Response
- Email Forensics
- ectf-2014-forensics-500-ectf-hacked-writeup
- forensic-analysis-of-windows-10-compressed-memory-using-volatility
- finding-advanced-malware-using-volatility
- FORENSIC CHALLENGES
- forensics
- forensicgazette.com/search?q=forensic&gi=b68cac18c816
- Finding Metasploit’s Meterpreter Traces With Memory Forensics
- github.com/mac4n6/Presentations
hexacorn
Hack the box - Reminiscent
- hatsoffsecurity.com/2014/05/20/registry-key-last-write-time/
- hackingarticles.in/digital-forensics-investigation-os-forensics-part-2/
- learn.itmasters.edu.au/
- Learning Computer Forensics Tutorial | FTK
- http://index-of.co.uk/
- invoke-ir.com/search/label/Prefetch
- Incident Responders are on the front lines of intrusion investigations. Eric Zimmerman's Tools (EZ Tools)
- MFT
- master-mft-parsers-reviewed
- Malware Analysis Techniques — Basic Static Analysis
- Magnet User Summit DFIR CTF 2019-Basic Desktop
- Magnet Forensics CTF with Plaso, Timesketch, and Colab
- medium.com/@sroberts/introduction-to-dfir-d35d5de4c180
- medium.com/@FourOctets/ctf-tidbits-part-1-steganography-ea76cc526b40
- medium.com/hackstreetboys/hsb-presents-otterctf-2018-memory-forensics-write-up-c3b9e372c36c
- nextron-systems.com/loki/
- ntfs-log-tracker
- peerlyst.com/posts/how-to-become-a-cyber-forensics-expert-abhinav-singh?trk=profile_page_overview_panel_posts
- RDP Event Log DFIR
- sno.phy.queensu.ca/~phil/exiftool/
- secjuice.com/tag/osint/
- sleuthkit.org/sleuthkit/download.php
- trailofbits.github.io/ctf/forensics/
- technorelate.com/category/forensics-investigation/
- theevilbit.blogspot.com/search/label/forensics
- twitter.com/weare4n6
- Volume Shadow Copies in forensic analysis
- volatility-labs.blogspot.com/2012/09/movp-34-recovering-tagclipdata-whats-in.html
- xwaysclips.co.uk/
- best-of-computer-forensics-tutorials
- ertifications-training/
- Forensics Tools by Windows Artefact
- NetworkForensics
- Malware Analysis — Dynamic Analysis : Cuckoo Sandbox
- What to do after hack – 5 unusual places where you can find evidence
- Windows Forensics – Extract Evidence From Windows System
- Thailand CTF 2018 write up ข้อ My password collection (forensic)
- https://zeltser.com/malicious-software
hexacorn
Hack the box - Reminiscent
Free DFIR Training
- AccessData Certified Investigator (Only the cert is free, not the training)
- Cellebrite Reader Training
- Linux Forensics Training by Hal Pomeranz
- Free Course Content from eForensics Magazine
- Free Short Course: Digital Forensics
- Digital Forensics Course by OpenLearn
- Digital Forensics Basics (TEEX)
- Computer Forensics (edX)
- Digital Forensics Training Materials from CIRCL
- Introduction to Memory Forensics by 13Cubed (YouTube)
- Introduction to Windows Forensics by 13Cubed (YouTube)
- Mobilyze Tool Training by BlackBag Tech
- Free Forensics Training from HTCIA (Dark Web, Cloud, IoT)
Bookmark