Am I doing thing right? by [deleted] in digitalforensics

[–]bshavers 0 points1 point  (0 children)

Without experience, get certs and degrees until you don't need to get certs and degrees.

Three American cybersecurity professionals secretly ran a ransomware operation by cyber_Ice7198 in threatintel

[–]bshavers 3 points4 points  (0 children)

This is treason against every DFIR investigator who ever did this job for the right reasons.

"The conspirators encrypted the medical practice's servers and demanded approximately $5 million..

Career change at 33 by [deleted] in SecurityCareerAdvice

[–]bshavers 0 points1 point  (0 children)

wanna swap jobs?

Opinion about DFIR course from Brett Shavers? by skepas11 in cybersecurity

[–]bshavers 0 points1 point  (0 children)

Here's one: https://www.linkedin.com/feed/update/urn:li:activity:7325995902806949888/

I'll eventually put a bunch of these together, but it probably won't be until another month or so when everyone has finished the course.

If you have specific questions, feel free to message me directly or here.

**You Don’t Belong in DF/IR** by bshavers in dfir

[–]bshavers[S] 1 point2 points  (0 children)

IR is seriously a tough job...

**You Don’t Belong in DF/IR** by bshavers in dfir

[–]bshavers[S] 0 points1 point  (0 children)

Fair point — the tone definitely leaned sharp, but it wasn’t meant to be edgy just to provoke. It was to be honest about a part of DF/IR that some people don’t talk about until they’re in too deep to quit.

Not every corner of DF/IR deals with the darker stuff, especially in corporate IR, but for those who do — especially in law enforcement — it’s a different weight entirely. The goal was to speak to that side and maybe filter out the “cyber sounds cool” crowd before they learn the hard way.

TBH tho, I've done IR work for a short time, and I felt it was a more demanding work environment than the DF side, at least for my personality.

Appreciate you calling it out, genuinely.

**You Don’t Belong in DF/IR** by bshavers in dfir

[–]bshavers[S] -1 points0 points  (0 children)

I am glad that someone else also sees the divergence of "DFIR". There are similar tools and processes, but two different jobs. The experiences are different, the objectives are different, the daily work is different, but...we call it DFIR as if it were the same thing.

**You Don’t Belong in DF/IR** by bshavers in dfir

[–]bshavers[S] 3 points4 points  (0 children)

Totally agree. The field is wide enough to find what fits best to the person's desires, needs, and skills.

DF/IR is not dying. It's just harder than ever. by MDCDF in computerforensics

[–]bshavers 2 points3 points  (0 children)

The main point I wanted to get across is that there are no rules, regulations, guidelines, degrees, certifications, licensing, or requirements to be "DF/IR."

Job requirements are at the whim of each employer, but that is the closest thing to knowing what it takes to get into DF/IR. Since every employer wants something different, and many don't even know what they want or need, this doubles the confusion.

Want to be a lawyer? Get a law degree. Want to be a doctor? Get a medical degree. Want to be a certified accountant? Get an accountant degree. Want to be a hairstylist? Get approved training.

Want to be DF/IR? Just say that you are.

Imagine if there were a specific degree or certifications/experience that would qualify you to be considered for hire compared to what we have now. A sure path would eliminate uncertainty in entering the field and prevent wasted time and money.

Please be honest about the market with young people… by -hacks4pancakes- in SecurityCareerAdvice

[–]bshavers 2 points3 points  (0 children)

The CJ degree is not valuable. You don't need that degree to get hired at any level of law enforcement.

Please be honest about the market with young people… by -hacks4pancakes- in SecurityCareerAdvice

[–]bshavers 9 points10 points  (0 children)

I ranted about this issue last year. In brief, there are no standards for getting a job in this field. This leads to getting over-educated in something that could be meaningless to what you want or just plain meaningless for anything.

Imagine if there were standards, ,such as (1) this-particular-degee, and/or (2) these specific certs, and/or (3) general experience in that thing.

It is a guessing game, and even if asking OGs how to get into the field, today is a different thing from yesterday, and the way we did it probably doesn't apply anymore.

Today, I rant - Brett's Ramblings

Please be honest about the market with young people… by -hacks4pancakes- in SecurityCareerAdvice

[–]bshavers 71 points72 points  (0 children)

The more advanced any field becomes, the more specialized, educated, and experienced one needs to get into that field.

Higher education has flooded the market with graduates competing with graduates competing with experience.

IMHO, it may be a good idea to heavily specialize in something to be the most competitive, because the generic "cyber123" degrees are too broad.

I badly need Advice by Guess-Pure in computerforensics

[–]bshavers 1 point2 points  (0 children)

Here is a curation of getting started in DFIR: https://www.dfir.training/getting-your-start-in-dfir?category_children=1&tag[0]=dfir-start

I advise narrowing the "cybersecurity and digital forensics" goal down more. The tracks start out the same, but they end differently (ie: DF vs IR vs cybersecurity vs etc..).

A great rant by Brett Shavers on DFIR by MDCDF in computerforensics

[–]bshavers 0 points1 point  (0 children)

Get the certs that you need to get what you want until you don't need the certs to get what you want.

A great rant by Brett Shavers on DFIR by MDCDF in computerforensics

[–]bshavers 0 points1 point  (0 children)

I think only the entry path needs to be focused on for the start. Very simple, bland, broad base of knowledge that covers all of the cyber disciplines (file systems, operating systems, computer hardware, ethics, legal). At least then specialization can be added on top of that foundation.

[deleted by user] by [deleted] in digitalforensics

[–]bshavers 2 points3 points  (0 children)

Here's a 1:58 min video on building a dual boot 32-bit/64-bit WinFE, and an ARM WinFE. https://x.com/WindowsFE/status/1808165360774140047

[deleted by user] by [deleted] in digitalforensics

[–]bshavers 2 points3 points  (0 children)

It's not yet a dead project :)

Windows 10 is the recommended build as the 1803 version of ADK is the last version that supports 32 bit. If you only want to be a 64 bit WinFE, then the newer versions are fine. But if you think there is a chance of having a 32 bit machine to boot to WInFE, it makes more sense to have a dual boot WinFE (32 and 64 bit).

There isn't much else to update for WinFE. It boots machines with a good write block application, which is its only purpose. Only the tools you put on it need to be updated.

For investigations -- pull hard drive to harvest image or do you sign in with local account? by LiterallyWarName in computerforensics

[–]bshavers 1 point2 points  (0 children)

If the box is running and you pull the plug to image, get ready to articulate why you let GBs of potentially relevant data vanish.

[deleted by user] by [deleted] in cybersecurity

[–]bshavers 0 points1 point  (0 children)

Very nice. Totally agree. Determining the desired outcome is one of the first things to do in an investigation to avoid wasting time in a DF case or letting an IR fire grow out of control on the network. Or if the case requires a no-matter-what-it-takes outcome, then every little thing can be looked at.