Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Michael and Digital Forensic Survival Podcast. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Michael and Digital Forensic Survival Podcast or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

DFSP # 471 Mac Persistence

17:43
 
Share
 

Manage episode 468399321 series 166409
Content provided by Michael and Digital Forensic Survival Podcast. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Michael and Digital Forensic Survival Podcast or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Today we’re talking all about MacOS AutoRun locations and how to spot persistence mechanisms. We’ll explore the ins and outs of property list files, launch daemons, system integrity protections, and the recent changes in macOS that can impact your forensic examinations...

  continue reading

486 episodes

Artwork

DFSP # 471 Mac Persistence

Digital Forensic Survival Podcast

179 subscribers

published

iconShare
 
Manage episode 468399321 series 166409
Content provided by Michael and Digital Forensic Survival Podcast. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Michael and Digital Forensic Survival Podcast or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Today we’re talking all about MacOS AutoRun locations and how to spot persistence mechanisms. We’ll explore the ins and outs of property list files, launch daemons, system integrity protections, and the recent changes in macOS that can impact your forensic examinations...

  continue reading

486 episodes

All episodes

×
 
D
Digital Forensic Survival Podcast
Digital Forensic Survival Podcast podcast artworkDigital Forensic Survival Podcast podcast artwork
 
This week, I’m talking about nested groups in Windows Active Directory and the security risks they pose. Active Directory allows administrators to attach one group to another—often called nesting . While nesting can simplify account administration and permission management, it can also create real opportunities for attackers if...…
 
D
Digital Forensic Survival Podcast
Digital Forensic Survival Podcast podcast artworkDigital Forensic Survival Podcast podcast artwork
 
One of the essential skill sets for a DFIR analyst is the ability to understand the impact of vulnerabilities quickly. In many IR scenarios, you may find a newly discovered vulnerability or receive a scan that flags multiple potential weaknesses. To stay efficient, you must...
 
D
Digital Forensic Survival Podcast
Digital Forensic Survival Podcast podcast artworkDigital Forensic Survival Podcast podcast artwork
 
This week, we’re exploring the System Resource Usage Monitor (SRUM) – a powerful source of forensic data within Windows operating systems. First introduced...
 
D
Digital Forensic Survival Podcast
Digital Forensic Survival Podcast podcast artworkDigital Forensic Survival Podcast podcast artwork
 
In this episode, our focus is on understanding how attackers achieve lateral movement and persistence through Secure Shell (SSH)—and more importantly, how to spot the forensic traces...
 
D
Digital Forensic Survival Podcast
Digital Forensic Survival Podcast podcast artworkDigital Forensic Survival Podcast podcast artwork
 
In this episode, we’ll take a focused look at how to triage one of the most commonly targeted Windows processes: svchost.exe. While the methods in this series generally apply to all Windows core processes, svchost is an especially important case because attackers...
 
D
Digital Forensic Survival Podcast
Digital Forensic Survival Podcast podcast artworkDigital Forensic Survival Podcast podcast artwork
 
Ransomware attacks move quickly, making your initial response crucial in minimizing impact. This episode outlines critical first steps, from isolating infected machines to gathering key information and initiating containment. Whether you’re a SOC analyst, incident responder, or the first to notice an attack, this framework is designed to help you regain control. Follow these guidelines to effectively mitigate the damage from the very start.…
 
D
Digital Forensic Survival Podcast
Digital Forensic Survival Podcast podcast artworkDigital Forensic Survival Podcast podcast artwork
 
Today’s episode explores Apple Spotlight and its extended metadata—a powerful yet often overlooked forensic tool in the Mac ecosystem. Spotlight plays a critical role in uncovering digital evidence on macOS. Both experienced forensic analysts and newcomers will find its capabilities essential. Let’s dive into the details.…
 
D
Digital Forensic Survival Podcast
Digital Forensic Survival Podcast podcast artworkDigital Forensic Survival Podcast podcast artwork
 
BIN directories (short for binary) store command binaries like CD, PWD, LS, Vi, and CAT. Every platform has multiple BIN directories: two in the root directory and two in each user directory. This episode explains the types of files in these directories and the purpose of each BIN directory. I will also clarify which directories are typically used by users versus those used by the root user.…
 
D
Digital Forensic Survival Podcast
Digital Forensic Survival Podcast podcast artworkDigital Forensic Survival Podcast podcast artwork
 
Modern Windows systems use a tightly coordinated sequence of core processes to establish secure system and user environments. DFIR investigators and incident responders must understand the interrelationships between processes such as Idle, SMSS, CSRSS, WININIT, and WINLOGON. Recognizing expected behaviors and anomalies in these steps is crucial for detecting potential system compromises. This episode demystifies the Windows 10/11 process flow and provides context for effective triage and analysis.…
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play