When trying to figure out what happened on a machine during a specific time-frame, a sorted file listing is quite useful. There are several ways of going about it when creating one, and as requested, here’s the way I do…
When trying to figure out what happened on a machine during a specific time-frame, a sorted file listing is quite useful. There are several ways of going about it when creating one, and as requested, here’s the way I do…
Yesterday I held a presentation on forensics and incident response at the TrueSec Security Summit. One of the major challenges when responding to a breach is figuring out exactly what an attacker has done on a machine. Did they dump…
My colleagues and I are inviting you to a conference day full of practical and eye-opening sessions aiming to make you develop more secure code. For the second year, TrueSec invites you to a dedicated security day at Øredev. Our security experts…
Background and acknowledgement This full disclosure is based on my discovery of a privilege escalation vulnerability in Apple OS X called rootpipe. Read my full disclosure on rootpipe here for some background info. Big thanks to Patrick Wardle who inspired…
Unless you are well-versed in the world of IT-security you might not know what Pawn Storm refers to, or you might think it is a chess tactic. Pawn Storm is an espionage operation started by an unknown group of individuals…