Showing posts with label SANS. Show all posts
Showing posts with label SANS. Show all posts

Sunday, June 14, 2009

SANS Forensics and Incident Response Summit 2009

For those of you that have not heard about the upcoming SANS Forensics and Incident Response Summit in Washington D.C. in July, you should really try and attend. I had originally planned on attending and was kindly asked by Rob Lee to participate in the forensic tool panel discussions, but unfortunately my schedule is now preventing me from attending.

This year's summit looks even better than the last one in Las Vegas, which was great. The speaker lineup looks awesome and I am sure it will prove to be very interesting. If you are anywhere near Washington D.C. July 6th-9th, or can get there, I highly recommend you try and go. If you do, take notes for me.. ;)

You can read more about the agenda here:
https://blogs.sans.org/computer-forensics/2009/04/07/agenda-released-forensics-and-incident-response-summit-2009/

Monday, October 20, 2008

SANS Forensic & Incident Response Summit in Las Vegas

SANS held a Forensic & Incident Response Summit last week (Oct 13-14) in Las Vegas. It was really nice to go and put so many names and people that I have communicated with in the past via email, with a face. It was a pretty interesting crowd that attended and some very informative presentations.

I did a presentation at the end of the first day to talk about some basic simple forensic & incident response tools and methods that seem to work well for me. I have posted the PDF of my presentation here.

For those of you that have not tried out the F-RESPONSE tool, you are really missing something quite useful. The founder of F-Response, Matthew Shannon, who was at the summit, announced on day one of the summit that version 2 of the F-RESPONSE tool was being released and it now supports access to physical memory on a remote machine. This means that using the F-RESPONSE tool you can image any and all physical disks on a remote machine, as well as the physical RAM on that machine, all while the machine is running!! You can read more about their latest verison here.

Aaron Walters also presented on how Volatility can utilize the F-Response tool with a new spin-off of Volatility that he created called "Voltage". A very cool tool to analyze the memory dump and show you what was going on at the time of the memory capture. The really cool thing is that Voltage can look at the memory live, in real time using the F-RESPONSE tool, meaning that you can look at it now and then refresh the page 2 minutes later and what you are seeing is the live reresentation of the memory contents 2 minutes later, not a captured image of it. As Aaron likes to say, he can actually watch the clock tick on the remote machine in memory!! VERY COOL!!! You can read about Volatility here.

Computer Forensics, Malware Analysis & Digital Investigations

Random Articles