THE Book of Digital Forensics…

Last year we published the Digital Forensics book, after a long and exciting, but challenging, period of work. Together with a team of security and forensics professionals we joined forces to create this “complete” book of Digital Forensics. I had the pleasure to write about the forensics process, based on past digital forensics research and practice as a technical analyst. The book aim to provide practitioners of computer science, information security and law enforcements with a fundamental understanding of digital forensics.

Please see our latest blog post for the first chapter of the book here. The book can be found at Wiley or you can buy it straight from Amazon.

NIST Cyber Security Framework 1.1

A new version of CSF is out with a few changes [NIST and csoonline]:

  • better correlation of cybersecurity risk management metrics to organizational objectives
  • supply chain cyber risk
  • vulnerability disclosures
  • refined authentication, identification and authorisation
  • Internet of Things (IoT) in addition to critical infrastructure
  • self-assessing cyber security
  • removed Federal Alignment

Secunia PSI is dead

They say it will be discontinued in April. It’s rather sad, liked the initiative and how it made it simple to the ordinary IT user to update apps. Look for SUMo (Software Update Monitor), uCheck and more here for a replacement.

PSnmap

Portscanning done “silently” using powershell does not require administrative privileges, thus being a tool where nmap (or similar tools) is no option (due to time and/or authorisation constraints).

The PSnmap tool utilise Powershell capabilities in its module for port scanning.

Install-Module -Name PSnmap -Scope CurrentUser
  • Check if module is installed
Get-Module -ListAvailable
  • Set Execution Policy
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser
  • Import module
Import-Module -Name PSnmap
  • Run scans, e.g.:
PSnmap -Cn 192.168.1.1 -ThrottleLimit 5 -Timeout 5 -PortConnectTimeoutMs 5 -Verbose > test.txt

To scan more stealth, adjust throttle limit (HIDS may detect resource intensive processes), and timeout values. See full list here.