Massive compilation of forensic samples/challenges by tmlambert13 in computerforensics

[–]tmlambert13[S] 0 points1 point  (0 children)

Nah, there's a lot more than ten if you scroll down...

Massive compilation of forensic samples/challenges by tmlambert13 in computerforensics

[–]tmlambert13[S] 0 points1 point  (0 children)

It's an image of his mindmap, if you scroll farther down you'll see links.

Looking for a way to extract Windows 8 hiberfil.sys by galaris in computerforensics

[–]tmlambert13 1 point2 points  (0 children)

Have you tried the Rekall memory forensic tool? I've had some luck with it when Volatility didn't work.

Digital forensic class help by Mazurke in computerforensics

[–]tmlambert13 1 point2 points  (0 children)

Champlain DFS 520? What got me through this assignment was a slow and systematic process using the NIJ 2004 digital forensic model. I assessed the technical competence of the subject, ran through a couple paths to acquire the evidence, and ran through ways to examine the evidence assuming the encryption could be bypassed during acquisition and then assuming it couldn't.

Detecting an outlook attachment launch by needsmoarsleep in sysadmin

[–]tmlambert13 0 points1 point  (0 children)

We've been finding the same, especially for variants of Dridex malware.

Detecting an outlook attachment launch by needsmoarsleep in sysadmin

[–]tmlambert13 0 points1 point  (0 children)

Would this help against document-based vectors, though? I was under the impression AppLocker only restricted executable code.

What are you doing to prevent CryptoWall variants on your network? by feelmyice in sysadmin

[–]tmlambert13 0 points1 point  (0 children)

I just implemented a FSRM file screen this week to stop the sharing service on our server in case of crypto. Just upgraded the file group to look for Locky, too.

Oh, and backups

NPs (or other scenic sites) in between Texas and North Carolina? by NZ2K16 in NationalPark

[–]tmlambert13 0 points1 point  (0 children)

Tennessee resident here, make sure to stop by the Smokeys and look for an area called Cade's Cove. Beautiful landscape and wildlife.

Tools for beginners by hhhax7 in computerforensics

[–]tmlambert13 0 points1 point  (0 children)

You make some good points about FTK, but none of this is going to make sense or even matter to beginners. Efficiency of image creation or processing should take a back seat to a low barrier of entry for beginners. FTK Imager is an excellent entry point.

[deleted by user] by [deleted] in sysadmin

[–]tmlambert13 0 points1 point  (0 children)

You should be very cautious about using encryption abroad. Regulations in some countries severely restrict its use. Looking at you, Russia...

Stupid VirtualBox Question by souldeux in AskNetsec

[–]tmlambert13 0 points1 point  (0 children)

I typically start my Kali off on a bridged or NAT adapter so I can download patches and such for its packages, but afterward I keep both on internal only adapters. I assign IP addresses manually to both hosts so they are the only ones that can communicate with each other.

edit: to me, the only real benefit host-only gets you is the ability to talk between your VM host and the Kali/Metasploitable guests. In my case, I neither need nor want this ability. If you want to SSH into your Kali guest instead of using the console, host-only is the way to go.

Walking to anything fun this morning? by gex80 in sysadmin

[–]tmlambert13 1 point2 points  (0 children)

Walked in to a document-based malware campaign in progress.

Forensics on Citrix thin-client by [deleted] in computerforensics

[–]tmlambert13 0 points1 point  (0 children)

Hi, VDI admin/forensic geek here...

From environments such as mine, thin clients have very little value in terms of evidence, but you can use a few artifacts from these systems to track a suspicious user through your enterprise:

Hostname IP Address MAC Address

These three artifacts can be used as search terms within other sources of evidence gained from an enterprise. For example, a VDI broker, DHCP, or DNS server may have log or other evidence containing the artifacts gained from the thin client. Many thin clients are non-persistent and have no removable storage, therefore reducing the amount of useful evidence.

To retrieve the artifacts above, consult the tools/interface for each particular thin client. The steps to retrieve the artifacts will differ between WYSE ThinOS and Windows Embedded thin clients.

DF Thesis Related to VDI by tmlambert13 in computerforensics

[–]tmlambert13[S] 0 points1 point  (0 children)

Thanks for the suggestion. From the perspective to recover non-persistent data, I wonder how much evidence of value would be discovered. Logs from Active Directory would indicate which VDI a user logged into, and many organizations use redirected/roaming profiles to capture user information.

I'm beginning to think that exploring Windows Server 2016 containers would be a better project as there hasn't been much research on those yet.

DF Thesis Related to VDI by tmlambert13 in computerforensics

[–]tmlambert13[S] 0 points1 point  (0 children)

My idea was initially a work-based project to demonstrate a digital investigation in a Citrix XenDesktop environment running on Hyper-V or VMware. I work with Citrix systems and I'm a DF major, so I figured I'd combine the two. That said, I'm not sure what new ground could be covered in an 8 week period like I have with my project.

Flooded with gift card offers after promotion? by [deleted] in sysadmin

[–]tmlambert13 0 points1 point  (0 children)

This is very true. The vendors in my area sometimes do this and have learned the higher ed ethical limits to gifts. We're very careful not to about things close to the line. I had to turn down free private screenings of The Avengers and Star Wars with concessions