πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Forensics

Focus Area: 🚨 Incident Response
54
Total Entries
46
Contributors

Top Contributors

Ankur Tyagi(8) Monnappa K A(3) Sagar Bhure(3) Sudheendra Bhat(3) Aashish Kunte(2)

All Entries (54 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2024-08-29Tool demoHitbsecconf eBPFShield Source Code Sagar Bhure#ids#incident-management#network-monitoring+1
2024-04-18Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhure#blueteam#machine-learning#security-analytics+3
2023-10-13TalkHackfest Exploring RAM Forensic Analysis for Effective Digital Investigations Video Sneha Banerjee#forensics#memory-forensics#digital-forensics+2
2023-09-24PanelNullcon ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT Shomiron Das Gupta, Yogi Kapur, Manish Tiwari#incident-management#incident-detection#forensics+3
2023-08-09Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security. Source Code Sagar Bhure#kernel#machine-learning#forensics+4
2023-08-07TalkC0c0n Cellibrite Premium Mobile Forensic tool iPhone analysis Vaibhav Kumar#mobile-forensics#reverse-engineering#forensics+2
2022-09-24TalkC0c0n Cryptocurrency Forensics Bhushan Gulabrao Borase#forensics#digital-forensics#cryptocurrency+1
2021-11-13TalkC0c0n Case Study - Cyber Heist in a Bank and Recovery of Systems and Money Prashant Choudhary#incident-management#forensics#security-assessment
2021-11-13TalkC0c0n Emerging trends in cyber crimes : Investigation tools & techniques Triveni Singh#incident-management#digital-forensics#forensics+3
2021-11-10Tool demoBlackhat Wireshark Forensics Toolkit Source Code Rishikesh Bhide#forensics#network-forensics#data-protection
2020-09-18TalkC0c0n All about IOT Forensics Hima Bindu Vejella#forensics#iot-device-management#iot-pentesting+4
2019-12-04Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Source Code Kshitij Kumar, Jai Musunuri#macos#secure-coding#forensics+1
2019-10-12TalkTexascybersummit TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Presentation Source Code Sudheendra Bhat#incident-management#threat-hunting#ioc+3
2019-08-08Tool demoDefcon PcapXray Source Code Srinivas Piskala Ganesh Babu#forensics#wireshark#blueteam
2019-08-07Tool demoBlackhat RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan, Kunal Aggarwal#virtual-machine#blueteam#forensics+2
2019-03-28TalkBlackhat Investigating Malware Using Memory Forensics - A Practical Approach Presentation Video Monnappa K A#forensics#blueteam#malware-detection+1
2019-03-01PanelNullcon Breached? – Here is how I responded! Video Muslim Koser, Mrudul Uchil, Sachin Burman, Venkata Satish Guttula, Vijay K Verma#incident-management#digital-forensics#forensics+1
2018-10-05TalkC0c0n Using Fault Injection for Forensics Yashin Mehaboobe#forensics#digital-forensics#security-testing+2
2018-09-06TalkGrrcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Presentation Whitepaper Source Code Video Ankur Tyagi#blueteam#security-assessment#forensics
2018-08-11Tool demoDefcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Source Code Ankur Tyagi#blueteam#security-assessment#forensics
2018-08-09Tool demoBlackhat rastrea2r (reloaded!): Collecting & Hunting for IOCs with Gusto and Style Presentation Source Code Sudheendra Bhat, Ismael Valenzuela#incident-management#rest-api#forensics
2018-08-08Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Source Code Kshitij Kumar, Jai Musunuri#macos#secure-coding#forensics+1
2018-08-08Tool demoBlackhat RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan#virtual-machine#blueteam#forensics+2
2018-03-03PanelNullcon Forensic Challenges and Road Ahead Video Manu Zacharia, Brijesh Singh, Sanjay Bahl, Vladimir Katalov#data-leak#data-protection#forensics+4
2017-03-31TalkBlackhat WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION Presentation Whitepaper Video Monnappa K A#code-injection#red-teaming#malware-research+4
2016-08-19TalkC0c0n SSD Forensics : A Nightmare for Forensic Investigators Santosh Khadsare#forensics#memory-forensics#incident-management+2
2016-08-06Tool demoDefcon Visual Network and File Forensics using Rudra Source Code Video Ankur Tyagi#blueteam#reconnaissance#forensics
2016-08-04Tool demoBlackhat rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Source Code Sudheendra Bhat#incident-management#threat-hunting#ioc+1
2016-08-03Tool demoBlackhat Visual Network and File Forensics Using Rudra Source Code Ankur Tyagi#blueteam#forensics#network-forensics+2
2016-04-01Tool demoBlackhat Rudra: The Destroyer of Evil Source Code Ankur Tyagi#blueteam#reconnaissance#forensics
2015-11-13Tool demoBlackhat Rudra - The Destroyer of Evil Source Code Ankur Tyagi#blueteam#reconnaissance#forensics
2015-08-09TalkDefcon 802.11 Monitoring with PCAP2XML/SQLite Video Vivek Ramachandran#network-forensics#packet-analysis#network-monitoring+3
2015-08-08TalkDefcon Chigula β€” a framework for Wi-Fi Intrusion Detection and Forensics Video Vivek Ramachandran#wifi#intrusion-detection#forensics+1
2015-08-08Tool demoDefcon Rudra Source Code Ankur Tyagi#blueteam#reconnaissance#forensics
2015-08-05Tool demoBlackhat Rudra - The Destroyer of Evil Source Code Ankur Tyagi#blueteam#reconnaissance#forensics
2015-02-06TalkNullcon Hunting and Decrypting Ghost communications using Memory Forensics Presentation Monnappa K A#forensics#blueteam#memory-forensics+2
2013-11-07TalkGroundzerosummit Understanding the anatomy of advanced targeted attacks – The Trend Micro approach Tarun Gupta#forensics#malware-research#attack-surface
2013-09-13TalkGrrcon Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution Prajwal Panchmahalkar#security-assessment#forensics#digital-forensics+1
2012-09-29TalkNullcon Next-gen Forensics K K Mookhey#forensics#digital-forensics#incident-management+2
2012-09-26TalkNullcon Forensics Timeline Analysis Video Aashish Kunte#forensics#blueteam#digital-forensics+3
2012-08-03TalkC0c0n I haz you and pwn your maal Presentation Harsimran Singh Walia#android#reverse-engineering#forensics
2011-12-04TalkClubhack Android Forensics Presentation Manish Chasta#android#forensics#android-security+4
2011-10-07TalkC0c0n Digital Evidence Sushanth Samudrala#forensics#digital-forensics#incident-management+2
2010-12-04TalkClubhack Windows Memory Forensic Analysis Presentation Aashish Kunte#windows#forensics#memory-forensics+3
2010-08-01TalkC0c0n Concept, Methodology and Challenges in Computer Forensics Sebastian Edassery#forensics#digital-forensics#incident-management+2
2010-08-01TalkC0c0n Dangers and dynamic Malware analysis Chandrasekar#forensics#dynamic-analysis#malware-detection+4
2009-12-05TalkClubhack Advance Computer Forensic concepts (windows) Presentation Kush Wadhwa#forensics#windows#data-protection
2009-12-05TalkClubhack Incident Handling and Log Analysis for Web Based Incidents Presentation Manindra Kishore#incident-management#forensics#application-pentesting+2
2009-11-17TalkSecuritybyte Behind the scenes at the MSRC Presentation Suresh Venkateswaran, Dave Midturi#incident-management#forensics#memory-forensics+1
2009-08-06TalkC0c0n Cyber Forensics Krishna Sastry Pendyal#forensics#digital-forensics#data-leak+4
2007-12-09TalkClubhack Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How? Presentation Chetan Gupta#forensics#windows#data-loss-prevention+4
2007-08-02TalkBlackhat Smoke ’em Out! Presentation Whitepaper Rohyt Belani#forensics#incident-management#digital-forensics+4
2006-08-02TalkBlackhat Web Application Incident Response & Forensics: A Whole New Ball Game! Presentation Whitepaper Rohyt Belani, Chuck Willis#application-pentesting#code-review#incident-management+3
2004-04-21TalkCansecwest Cisco PSIRT TCP/BGP Sharad Ahlawat#incident-management#forensics#network-forensics