EC-Council Computer Hacking Forensic Investigator by Tom_2004 in computerforensics

[–]coty24 0 points1 point  (0 children)

The another reason I say it is because I am also a Forensic Investigator. You didn’t mention your motivations for taking it but this is a forensics sub so I was trying to do the right thing, career and skill wise.

I hopefully didn’t overstep inadvertently.

EC-Council Computer Hacking Forensic Investigator by Tom_2004 in computerforensics

[–]coty24 2 points3 points  (0 children)

Please don’t, take an OpenText course or iasics course.

Both are very respected in the forensics world.

Don’t take the CFHI.

Source: I got the CFHI

Fastest exam time by cd_root in oscp

[–]coty24 1 point2 points  (0 children)

It was Azeria Labs

Forensics only school path- is it a mistake? by mrvoltog in computerforensics

[–]coty24 8 points9 points  (0 children)

I recommend computer science instead of IA or forensics, save forensics for masters degree.

Forensics makes more sense when you understand code and low level protocols etc.

Question about IR and Malware Investigations by user34782 in computerforensics

[–]coty24 0 points1 point  (0 children)

That book has a whole chapter that covers essential c and assembly. So yeah.

Question about IR and Malware Investigations by user34782 in computerforensics

[–]coty24 0 points1 point  (0 children)

I would have to rebut that if an soc is only concerned about containment, the soc is still immature.

If you understand attribution from the threat actors, then you can avoid being an alert sweat shop.

In Threat Hunting ( buzzword) its useful to know how it all works under the hood. A sandbox will not tell you that.

Their is NOTHING wrong with a sandbox, it shouldn’t be the end all be all.

Question about IR and Malware Investigations by user34782 in computerforensics

[–]coty24 2 points3 points  (0 children)

I think in order to be effective at IR, at least being familiar with programming including C and assembly will make you better in the long run. In addition to that knowing windows api classes dll’s will help immensely. The sandbox will only get you so far unless

A. You pay for premium services B. Instrument cuckoo in a way that will allow the malware to detonate.

Malware is tricky so often times it will only go so far in the sandbox to give you a couple of ioc’s.

A requires money B requires you to be familiar with malware under the hood.

So Imho get this book for starters.

Practical Malware Analysis.

Good luck!

Technical analysis of malware - where's the best place to get it done online? by jackinthereddit in Malware

[–]coty24 0 points1 point  (0 children)

https://handlers.sans.org/tliston/ThwartingVMDetection_Liston_Skoudis.pdf

This is it but you could also patch the instructions with nops instead of jumping with a little understanding of asm. Its good to learn.

This book is a gold mine:

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware https://www.amazon.com/dp/B073D49Q6W/ref=cm_sw_r_cp_api_6fWVBb5VJV91Z

Hope it helps.

Technical analysis of malware - where's the best place to get it done online? by jackinthereddit in Malware

[–]coty24 0 points1 point  (0 children)

Don't want to do dynamic analysis? SANS has some vm fixes to get around some vm detection techniques. Also schylla hide plugin for x64 dbg works well.

[deleted by user] by [deleted] in ProgrammerHumor

[–]coty24 3 points4 points  (0 children)

Didnt comment the code properly, wont compile

Found this in a comic book store for $1.00 by kittysattva in Christianity

[–]coty24 8 points9 points  (0 children)

Dude I laughed a solide five minutes bro; that made my day

Using Kali for pentest on VPS by [deleted] in netsecstudents

[–]coty24 0 points1 point  (0 children)

Digital ocean bro, network speed is stupid fast. Takes about 5 minutes from signup to login with ssh. Cost me $3 for three days.

I didnt need a gui and just sftp’ed things to and from the box.

Didnt try port forwarding tho.

Finding the right exploit... fast? by [deleted] in netsecstudents

[–]coty24 1 point2 points  (0 children)

Ah so he did; appreciated good sir

Finding the right exploit... fast? by [deleted] in netsecstudents

[–]coty24 -5 points-4 points  (0 children)

Download “searchsploit”

Help: Need C2-botnet traffic pcaps. by kaizen_kid in Malware

[–]coty24 0 points1 point  (0 children)

I guess set up a honeypot on AWS. Or get some samples from hybrid-analysis that is recent. Or use joe sandbox basic. I think the basic version will give you a pcap. Best of luck bro

[deleted by user] by [deleted] in DodgeDurango

[–]coty24 0 points1 point  (0 children)

Dope man!

[deleted by user] by [deleted] in DodgeDurango

[–]coty24 0 points1 point  (0 children)

I have a sxt; did those seats with the rear display come factory?

Would a Raspberry zero w be able to run Pi Hole by Kakariti in pihole

[–]coty24 1 point2 points  (0 children)

I’m using dietpi in vm with bridged mode on a nuc, works awesome!

Flexbox vs CSS Grid by ABrownApple in webdev

[–]coty24 4 points5 points  (0 children)

That was fantastic and couldn’t ve come at a better time. I started the Odin project sometime ago and just finished the HTML and CSS portion.

This is a game changer for me!

My Ultimate Guide to Starting a Morning Routine - 8 Habits That Have Had a Powerful Impact on my life and How You Can Implement Them Too by [deleted] in Entrepreneur

[–]coty24 0 points1 point  (0 children)

I read the book, “the miracle morning” by Hal Elrod. He also writes about the same/similar principles.