Our website may use cookies to improve and personalize your experience and to display advertisements (if any). Our website may also include cookies from third parties like Google Adsense or Google Analytics. By using the website, you consent to the use of cookies. We’ve updated our Privacy Policy. Please click on the button to check our Privacy Policy.

AboutDFIR.com – The Definitive Compendium Project
Digital Forensics & Incident Response


wdt_ID Author Publisher Title Link Tags/Keywords Year
1 Brian Baskin Brian Baskin Malware Analysis Link Malware Analysis 2013
4 Wayne Piekarski Wayne Piekarski Google Android Internet of Things platform Link Google, Android, IoT 2016
3 Adrian Colyer Adrian Colyer When CSI meets public wifi: Inferring your mobile phone password via wifi signals Link Hunt, Mobile, WiFi, Password 2016
5 Jeremiah Grossman Jeremiah Grossman Jeremiah Grossman Link Slide Presentations Various
9 Nicholas Popovich Optiv MSSQL Agent Jobs for Command Execution Link Hunt 2016
11 Basil Alawi S.Taher SANS Windows Events log for IR/Forensics ,Part 1 Link Hunt 2016
13 Jack Crook Jack Crook Hunting Lateral Movement Link Hunt, Lateral Movement 2016
14 Jack Crook Jack Crook The Hunting Cycle and Measuring Success Link Hunt, Metrics 2016
15 Jack Crook Jack Crook My Thoughts on Threat Hunting Link Hunt 2016
16 fl0x2208 That Security Threat Hunting and Pyramid of Pain Link Hunt 2016