![Chris Sanders π π§ Profile](https://pbs.twimg.com/profile_images/1530919195734679552/vrV3VOMi_x96.jpg)
Chris Sanders π π§
@chrissanders88
Followers
33K
Following
16K
Statuses
15K
Ed.D. | Founder @networkdefense @RuralTechFund | Former @Mandiant, DoD | Author: Intrusion Detection Honeypots, Practical Packet Analysis, Applied NSM
Mayfield KY β‘οΈ Gainesville GA
Joined July 2008
RT @chrissanders88: It's a bit tangential to what I do here, but I've been making some short-form video content focused on Meteorite educatβ¦
0
1
0
Iβve always thought these SSH tunneling techniques were confusing to follow at times, but Dan does a tremendous job simplifying the idea. Lots of practical demos. A must understand for attackers and defenders, both.
In our newest Skills Vault lesson, Dan Marr demonstrates network traversal and lateral movement techniques with SSH tunneling and then walks through evidence artifacts left by these actions.
0
0
8
Investigation Scenario π You discovered a suspicious PDF on a userβs workstation and found this sandbox report referencing it: What do you look for to investigate whether the system was infected and its extent? #InvestigationPath #DFIR #SOC
1
13
59
Investigation Scenario π You receive an alert that a Linux system is experiencing consistently high CPU usage. Running crontab -l for the related user, you see the pictured entry... However, when you check again, the crontab entry is gone. The file listed in the cron job is not currently available at that URL. What do you look for to investigate whether an incident occurred? #InvestigationPath #DFIR #SOC
1
4
26
These malware analysis lessons are a great way to learn how the folks doing this work every day think through their analysis process and understand how malware behaves.
In our latest Analyst Skills Vault lesson, @ForensicITGuy breaks down how to analyze and decode the Meduza stealer malware's network communication traffic.
0
1
13
RT @RuralTechFund: Check out the awesome video put together for our project in Los Lunas, NM! "Thank you so much to the Rural Technology Fβ¦
0
2
0
Investigation Scenario π While threat hunting, youβve discovered a host receiving HTTPS traffic on port TCP/53. What do you look for to investigate whether an incident occurred? #InvestigationPath #DFIR #SOC
3
3
22
Not many better ways to ring in the New Year! One of these days I'm gonna talk them into letting me run the grill for a couple of hours. #WaffleHome
1
0
10