mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

583
comptes actifs

#DFIR

0 message0 participant0 message aujourd’hui
Beercow :python: :verified:<p>Updated OneDrive Evolution. You can now compare two versions of OneDrive and see what has changed. <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a></p><p><a href="https://malwaremaloney.blogspot.com/p/onedrive-evolution.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malwaremaloney.blogspot.com/p/</span><span class="invisible">onedrive-evolution.html</span></a></p>
JRT<p>On a recent engagement a USB <a href="https://infosec.exchange/tags/keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keylogger</span></a> was found. My colleague Cass and I analyzed the key logger to find leads towards the threat actor. We have written down what we learned on our side quest:</p><p><a href="https://research.hisolutions.com/2025/07/a-tale-of-practical-keylogger-forensics/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">research.hisolutions.com/2025/</span><span class="invisible">07/a-tale-of-practical-keylogger-forensics/</span></a><br><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/Forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Forensics</span></a></p>
volatility<p>The 13th annual <span class="h-card" translate="no"><a href="https://infosec.exchange/@volatility" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>volatility</span></a></span> <a href="https://infosec.exchange/tags/PluginContest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PluginContest</span></a> is now OPEN! This is a meaningful way to contribute to open source forensics &amp; gain community-wide visibility for your work. And, as always, winners get cash prizes!</p><p>Submission Deadline: 31 December 2025</p><p>You can find full details in our latest blog post: <a href="https://volatilityfoundation.org/the-13th-annual-volatility-plugin-contest-is-open/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">volatilityfoundation.org/the-1</span><span class="invisible">3th-annual-volatility-plugin-contest-is-open/</span></a></p><p><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/memoryforensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>memoryforensics</span></a></p>
Alexis Brignoni :python: :donor:<p>You got me...</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a></p>
volatility<p>REMINDER: The Call for Speakers for <a href="https://infosec.exchange/tags/FTSCon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FTSCon</span></a> is open! The deadline is July 23.</p><p>See the full details in our blog post: <a href="https://volatilityfoundation.org/announcing-ftscon-2025-in-person-malware-and-memory-forensics-training/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">volatilityfoundation.org/annou</span><span class="invisible">ncing-ftscon-2025-in-person-malware-and-memory-forensics-training/</span></a></p><p><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a></p>
LMG Security<p>Hundreds of Brother printer models are affected by a critical, unpatchable vulnerability (CVE-2024-51978) that allows attackers to generate the default admin password using the device’s serial number—information that’s easily discoverable via other flaws.</p><p>748 total models across Brother, Fujifilm, Ricoh, Toshiba, and Konica Minolta are impacted, with millions of devices at risk globally.</p><p>Attackers can:<br>• Gain unauthenticated admin access<br>• Pivot to full remote code execution<br>• Exfiltrate credentials for LDAP, FTP, and more<br>• Move laterally through your network</p><p>Brother says the vulnerability cannot be fixed in firmware and requires a change in manufacturing. For now, mitigation = change the default admin password immediately.</p><p>Our pentest team regularly highlights printer security as a critical path to system compromise—and today’s news is another example that underscores this risk. This is your reminder: Printers are not “set-and-forget” devices. Treat them like any other endpoint—monitor, patch, and lock them down.</p><p>Need help testing your network for exploitable print devices? Contact us and our pentest team can help!</p><p>Read the Dark Reading article for more details on the Brother Printers vulnerability: <a href="https://www.darkreading.com/endpoint-security/millions-brother-printers-critical-unpatchable-bug" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/endpoint-secur</span><span class="invisible">ity/millions-brother-printers-critical-unpatchable-bug</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/PenetrationTesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenetrationTesting</span></a> <a href="https://infosec.exchange/tags/Pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentest</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/PrinterSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrinterSecurity</span></a> <a href="https://infosec.exchange/tags/BrotherPrinters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BrotherPrinters</span></a> <a href="https://infosec.exchange/tags/CVE202451978" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202451978</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITSecurity</span></a> <a href="https://infosec.exchange/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroTrust</span></a> <a href="https://infosec.exchange/tags/PatchNow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PatchNow</span></a> <a href="https://infosec.exchange/tags/Pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentest</span></a></p>
Alexis Brignoni :python: :donor:<p>Yup. Go figure. 😂 </p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a></p>
Mike Sheward<p>My previous intro post was a few years old, so behold, new intro post:</p><p>Mike. Live in the Seattle area having grown up in the UK as a full blown British. Have a wife (incredible), child (boy), and three dogs (golden retriver/cream retriver/fuck knows).</p><p>I work in information security, something I have done for about 20 years. By day I run corporate security, enterprise IT and various other bits and pieces for an EV charging startup. I am big into EV's and currently drive one that is not a Tesla. I want an electric motorbike, so if anyone has a spare one please send it.</p><p>I also have a company of my own, Secure Being (<a href="https://securebeing.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">securebeing.com</span><span class="invisible"></span></a>), which does pen testing and digital forensic work - it's my way of staying super hands on while still doing the management bits on the career path.</p><p>I have written books about information security things. Five of them. Two are non-fiction textbooks, and three are fiction based on real world <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> things. Check out <a href="https://infosecdiaries.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">infosecdiaries.com</span><span class="invisible"></span></a> and your local bookstore to find them, just search for my name. I have been trying to write more stuff, but always seem to find myself distracted by other things, such as work. linktr.ee/secureowl has some mini stories I've written.</p><p>I love radio and everything RF. I have lots of antennas and various scanners and radios on my desk. I love intercepting and decoding things, like digital radio protocols.</p><p>I am a big aviation nerd. I always wanted to be a commercial pilot. I gained my private pilots license in the UK at 17, all self funded by my employment at the local Safeway/Morrisons store. I did the sim test and commercial assessments, but for some reason, at 18, I was unable to find the £100k needed to complete the commercial training, so I did computers. But do not worry, because those computers and love of aviation and radio/RF combined, and I run a project called ACARS Drama. <a href="https://acarsdrama.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">acarsdrama.com</span><span class="invisible"></span></a> has all the details.</p><p>I play guitar and am a big guitar/audio nerd as well. I record music under the moniker Operation: Anxiety, <a href="https://operationanxiety.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">operationanxiety.com</span><span class="invisible"></span></a> - the music is on all the normal places. </p><p>Finally, I am a massive fan of motorsport. I believe I have watched every F1 race for the last 30 years, maybe 25. I also follow F2, FE, Indycar and MotoGP closely. I average around 18 hours of Le Mans 24 hour racing watching per year.</p><p>So there you have it. If you are looking for a thought leader on the topics mentioned above, you've come to the wrong place - because this is where I shitpost, and shitposting is cheap therapy.</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/acars" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>acars</span></a> <a href="https://infosec.exchange/tags/vdlm2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vdlm2</span></a> <a href="https://infosec.exchange/tags/sdr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sdr</span></a> <a href="https://infosec.exchange/tags/rf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rf</span></a> <a href="https://infosec.exchange/tags/f1" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>f1</span></a> <a href="https://infosec.exchange/tags/seattle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>seattle</span></a> <a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a></p>
Chris Sanders 🔎 🧠<p>The path to a meaningful future for your SOC won't be led by people who don't understand how investigations work building products that are based around poorly prompting AI to tell you how to perform them. <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOC</span></a></p>
Mike Sheward<p>Mini Digital Forensic Diaries story: got sent to a university in London to investigate a case where a student, who bragged of hacker prowess openly, was suspected of introducing malware to a machine and stealing a lecturers password. </p><p>“We don’t know how, but we know they logged into the account, and sent emails - and this is the only machine the lecturer uses,” came the brief.</p><p>Imaged the machine suspected of being targeted.</p><p>While giving the lecturer their laptop back post imaging I observed, via projector, the lecturer entering in their password to the username field on the login screen.</p><p>“Whoops, I’m always doing that - at least this time it wasn’t in front of the students,” they said.</p><p>Sure enough, there was no evidence of anything untoward on the laptop, but I had a good theory as to what may have occurred. </p><p>Check out more, less mini, stories like this at <a href="https://infosecdiaries.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">infosecdiaries.com</span><span class="invisible"></span></a>.</p><p><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Andrea Lazzarotto<p>A very nice blog post by Derek Eiri about the inner workings of <a href="https://mastodon.social/tags/Fuji" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fuji</span></a> for <a href="https://mastodon.social/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> forensic acquisition. Tool validation is very important in <a href="https://mastodon.social/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a>.</p><p><a href="https://mastodon.social/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://mastodon.social/tags/AppleForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppleForensics</span></a> <a href="https://mastodon.social/tags/MacForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MacForensics</span></a></p><p><a href="https://mreerie.com/2025/05/12/exploring-macos-native-commands-andrea-lazzarotto-fuji/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mreerie.com/2025/05/12/explori</span><span class="invisible">ng-macos-native-commands-andrea-lazzarotto-fuji/</span></a></p>
Pass the SALT Conference<p>After <a href="https://infosec.exchange/tags/HW" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HW</span></a>, let's dive into our <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a>/TI session🥰:</p><p>- <span class="h-card" translate="no"><a href="https://infosec.exchange/@tomchop" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tomchop</span></a></span> will introduce you <a href="https://infosec.exchange/tags/OpenRelik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenRelik</span></a> a new collaborative IR invest portal 🚀</p><p>- <span class="h-card" translate="no"><a href="https://infosec.exchange/@udgover" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>udgover</span></a></span> &amp; Matt Muir will introduce us to their e2e malwares process workflow using FLOSS ✊ </p><p>- and we'll be able to learn &amp; practice <a href="https://infosec.exchange/tags/MISP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MISP</span></a> as analysts with <span class="h-card" translate="no"><a href="https://infosec.exchange/@C00kie_two" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>C00kie_two</span></a></span> &amp; <span class="h-card" translate="no"><a href="https://infosec.exchange/@wr" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>wr</span></a></span> during their dedicated workshop 🛠️</p><p>🎟️GO &amp; book your (free) seat: <a href="https://pretix.eu/passthesalt/2025/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pretix.eu/passthesalt/2025/</span><span class="invisible"></span></a> <br>📔program: <a href="https://cfp.pass-the-salt.org/pts2025/schedule/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cfp.pass-the-salt.org/pts2025/</span><span class="invisible">schedule/</span></a> <br>📅July 1 to 3, 2025 <br>📍Lille, FR</p><p>Relays appreciated 🙏</p>
Alexis Brignoni :python: :donor:<p>🆕 New blog post on Apple Unified Logs (iOS) and how to query them effectively.<br>🪵 Learn how to generate a .logarchive using a macOS device, third-party tools, or straight from files in a full file system extraction.<br>🪵 Use a macOS device to convert the .logarchive into a JSON file for use outside of a macOS environment.<br>🪵 Process the JSON file with iLEAPP in order to query the data using SQLite.</p><p>If you are not looking at unified logs you are missing incredibly valuable evidence in your cases. </p><p>Thanks to the following researchers for their invaluable contributions:<br>🙏 Lionel Notari<br>🙏 Tim Korver<br>🙏 Johann POLEWCZYK<br>🙏 Heather Charpentier</p><p>Read the blog post here:</p><p><a href="https://abrignoni.blogspot.com/2025/05/extraction-processing-querying-apple.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">abrignoni.blogspot.com/2025/05</span><span class="invisible">/extraction-processing-querying-apple.html</span></a></p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/UnifiedLogs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UnifiedLogs</span></a> <a href="https://infosec.exchange/tags/AppleForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppleForensics</span></a> <a href="https://infosec.exchange/tags/iOSForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOSForensics</span></a> <a href="https://infosec.exchange/tags/iLEAPP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iLEAPP</span></a><br><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a></p>
Volexity :verified:<p>Congratulations to all of the Volatility contributors - this was no small feat! We are proud to be a sustaining sponsor of this important open-source project that remains the world’s most widely used memory forensics platform. <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> </p><p><a href="https://infosec.exchange/@volatility/114518094757806134" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@volatility/1</span><span class="invisible">14518094757806134</span></a></p>
LMG Security<p>AI-powered features are the new attack surface! Check out our new blog in which LMG Security’s Senior Penetration Tester Emily Gosney <span class="h-card" translate="no"><a href="https://infosec.exchange/@baybedoll" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>baybedoll</span></a></span> shares real-world strategies for testing AI-driven web apps against the latest prompt injection threats.</p><p>From content smuggling to prompt splitting, attackers are using natural language to manipulate AI systems. Learn the top techniques—and why your web app pen test must include prompt injection testing to defend against today’s AI-driven threats.</p><p>Read now: <a href="https://www.lmgsecurity.com/are-your-ai-backed-web-apps-secure-why-prompt-injection-testing-belongs-in-every-web-app-pen-test/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/are-your-ai-ba</span><span class="invisible">cked-web-apps-secure-why-prompt-injection-testing-belongs-in-every-web-app-pen-test/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/PromptInjection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PromptInjection</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/WebAppSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebAppSecurity</span></a> <a href="https://infosec.exchange/tags/PenetrationTesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenetrationTesting</span></a> <a href="https://infosec.exchange/tags/LLMvulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLMvulnerabilities</span></a> <a href="https://infosec.exchange/tags/Pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentest</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITsecurity</span></a></p>
r1cksec<p>Map visualization and firewall for AWS activity, inspired by Little Snitch for macOS🕵️‍♂️</p><p><a href="https://github.com/ccbrown/cloud-snitch" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/ccbrown/cloud-snitch</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a></p>
cyb_detective<p>Digital Forensics StartMe Page by Dillon Bowe</p><p>- SANS posters &amp; cheatsheets<br>- Blog feed<br>- YouTube feed<br>- Memory tools<br>- Network tools<br>- Malware tools<br>- getting started guides</p><p>and more. </p><p><a href="https://start.me/p/1kRlPp/forensics" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">start.me/p/1kRlPp/forensics</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a></p>
Natasha 👸<p>Sidder og kigger på en image af en T68i fra digital corpera. Jeg har lavet lidt python til at trække billeder ud men det fungere ikke helt. Nogle der ligger inde med filsystem formatet for sådan en telefon?</p><p>Eng: I am looking at an image of the storage in a T68i from digital corpera. I have written some simple python to extract pictures. But do anyone know about the storage layout of such phone?</p><p><a href="https://helvede.net/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://helvede.net/tags/4n6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4n6</span></a> <a href="https://helvede.net/tags/mobile" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobile</span></a></p>
Volexity :verified:<p>New on the <span class="h-card" translate="no"><a href="https://infosec.exchange/@volexity" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>volexity</span></a></span> Blog: Multiple Russian threat actors are leveraging Signal, WhatsApp, and a compromised Ukrainian government email address to impersonate EU officials. This latest round of phishing attacks abuses first-party Microsoft Entra apps and OAuth to compromise targets.</p><p><a href="https://www.volexity.com/blog/2025/04/22/phishing-for-codes-russian-threat-actors-target-microsoft-365-oauth-workflows" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">volexity.com/blog/2025/04/22/p</span><span class="invisible">hishing-for-codes-russian-threat-actors-target-microsoft-365-oauth-workflows</span></a></p><p><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
Chris Sanders 🔎 🧠<p>Investigation Scenario 🔎</p><p>You have detected unauthorized modification to /etc/libaudit.conf on a Linux server. </p><p>What do you look for to investigate whether an incident occurred and its impact? What could an attacker have done here?</p><p><a href="https://infosec.exchange/tags/InvestigationPath" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InvestigationPath</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOC</span></a></p>