In writing Investigating Windows Systems, published in 2018, I made use of publicly available images found on the Internet. Some were images posted as examples of techniques, others were posted by professors running courses, and some were from CTFs. If you have read the book, you’ll know that for each of the images, I either used or made a more “real world” scenario, something that aligned much more closely to my experiences over two and a half decades of DF/IR work, a good bit of which was consulting. During that time, and at several different companies, we’d have an “IR hotline” folks could call, and request computer incident response…this is something many firms continue to do. Those firms also very often had “intake forms”, documents an analyst would fill out with pertinent information from a caller or customer, which very often included investigative goals.
Over at […]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article:
