Let's Talk Advanced Drone Forensics with V2 Forensics
Drones are everywhere! How do you process one to extract data for your investigation? Join Kevin and Jansen as they discuss the latest advances in drone technology and how to make sense of it all!
26
views
How AI Can Help In Your Digital Forensic Investigation
There is so much mystery and distrust around AI in investigations. Join Kevin as he talks to the crew from Detego about the best ways to us AI in your digital forensic investigation.
8
views
Challenges with on-scene investigations live at Techno Security in Pasadena
Investigators face a ton of challenges when attempting to conduct on-scene investigations. Let’s talk with Rich Frawley of ADF and learn how to overcome some of those.
10
views
Digital Forensics & Incident Response at Techno Security Conference
Let’s talk with Craig Guymon of B!nalyze about bridging the gap in digital forensics and incident response live from Techno Security Conference in Pasadena, CA
6
views
DFIR Investigative Mindset with Brett Shavers
We are live from Pasadena, CA at Techno Security talking with Brett Shavers about his Keynote talk “DFIR Investigative Mindset”.
5
views
Tech Hunt: Unleashing Digital Investigation Tools & Training
Ever wonder where to find the best deals on all your digital investigation software, hardware and training? Join us as we talk to Bill Teel of TEEL Tech. Find out how he got started in the crazy world of digital forensic investigations and why sourcing all your tools & training in one place make budget sense!
9
views
Things to consider when buying a new Digital Investigation Computer
In this episode, we're gonna talk about the top things you should keep in mind when buying a computer for digital investigations. You may be surprised about this one! Oh... it must be CPU or RAM right? Tune in to the hubcast to find out. Kevin will be speaking to Manny Kressel of Bitmindz.com to help answer those questions.
https://bitmindz.com
QXHGQXE69YWXCPGX
4
views
How Cyber Security skills can help your Digital Forensic Investigation with Brian Carrier
Hey there! Have you ever wondered how cybersecurity skills can help in a digital forensic investigation? Well, this hubcast with Brian Carrier will dive into this topic.
The hubcast will talk about how having a strong understanding of cybersecurity can give you an advantage when investigating digital crimes. For example, if you know how hackers typically gain access to systems, you can use that knowledge to better understand how a breach occurred and what data may have been compromised.
Additionally, being familiar with different types of malware and viruses can help you identify any malicious software on a device or network. And knowing how to secure networks and devices can prevent future attacks from happening.
Overall, the hubcast will emphasize the importance of having a well-rounded skillset when it comes to digital forensics. So, if you're interested in pursuing a career in this field, it's definitely worth considering adding some cybersecurity training to your repertoire.
Hope this helps!
9
views
Reasons You Should Attend a Digital Investigation Conference #dfir #investigation
Upcoming Conferences:
PFIC - August 1-4, all virtual, signup at https://pfic-conference.com/
Techno West in Pasadena - September 11-13, register at https://www.technosecurity.us/west
HTCIA is Sept. 19-21 in Phoenix, https://www.htcia.org/2023-international-conference-and-expo/
NW Regional ICAC is Oct. 2-6 in Redmond, WA, - https://www.nwregionalicac.com/
OSMOSIScon is Oct. 15-17 in New Orleans, https://osmosiscon.com/
8
views
Let's talk Digital Forensic Training with Jessica Hyde
Let's talk Digital Forensic Training with Jessica Hyde
7
views
What New at Magnet Forensics with Kim Brandley
What New at Magnet Forensics with Kim Brandley
6
views
What is new at Techno Security & Digital Forensic Conference
Join Kevin as he talks to Jennifer of the Techno Security & Digital Forensics Conference. We are going to discuss the brand new location in Wilmington, NC and all the new innovations in digital investigations.
6
views
Let's fix an iPhone that won't boot for a forensic recovery
Let's fix an iPhone that won't boot for a forensic recovery
4
views
We are talking OSINT with Jessica Stutzman at Techno Security Conference
We are talking OSINT with Jessica Stutzman at Techno Security Conference
152
views
This Is Why You Need MSAB in Your DFIR Lab
Join Kevin and Adam Firman as they talk about the issues faced by mobile device examiners and the solutions MSAB brings to their cases.
1
view
How To Repair Mobile Devices: A skill every digital & mobile forensic examiner should know!
Have you ever tried to acquire data from a device that didn't boot up? Had a broken screen? Or the USB port was bad? Join Kevin and Bill Aycock as they take your questions about the importance of knowing how to repair the hardware in digital investigations and mobile forensics.
You can reach Bill at CyberSocialHub.com or https://verifilab.com/
2
views
Cewl password cracking list builder in Kali Linux
In this hubcast, we will learn how to create wordlists using Cewl. Cewl is a powerful wordlist generator that can target a URL and create a list based on your target's interests. Let's get cracking and build a few wordlists to use in tools like John the Ripper or Hashcat. We are going to use Kali Linux.
By the end of this video, you'll have everything you need to start building wordlists like a pro to use in your OSINT or digital forensic investigation!
Here are some of the commands I demo'd , but you can "Google" it too :)
cewl --help
cewl https://cybersocialhub.com
This puts your results in a wordlist. Whatever you want to name it
cewl https://cybersocialhub.com -w hubcast.txt
This will pull a minimum of 7 characters. It will pull greater values too
cewl https://cybersocialhub.com -m 7
This will pull emails from a site. the "n" does not build a list and the e is for email
cewl https://cybersocialhub.com -n -e
This is verbose mode if you get bored viewing nothing. Results DO NOT go to your list.
cewl https://cybersocialhub.com -v
If you need to pull a list that includes numbers attached to words
cewl https://www.starwars.com --with-numbers
How deep in a site do you want to go with link? This controls the depth to max of 3
cewl https://www.starwars.com -d 3
38
views
Mobile Mysteries: The Shifting World of Filesystems
Live from IACIS join Mario Merendon, Chair for Mobile Device Forensics for IACIS and Kevin DeLong as they discuss keeping up with changes in mobile examinations.
1
view
What is a tactical PFL?
Do you conduct digital forensics in the field? You don’t want to miss this episode.
1
view
Live From IACIS In Orlando
We are live at the annual IACIS Training event in Orlando Florida. There are over 700 people taking courses over the next two weeks. Cyber Social Hub is giving away challenge coins and will be having raffles as well as talking to a few digital investigators about the latest trends in the digital investigation industry.
1
view
Mastering OSINT: Obtain Top Intelligence from People & Companies
Producing insightful, actionable intelligence is no easy feat. But there are ways to improve intelligence building at individual and organizational levels. For individuals, continuing education is key. Finding opportunities to keep OSINT skills sharp, boost productivity and understand new tools, risks and trends will make you a better analyst. For organizations, examining the policies and structures of departments responsible for intelligence building can shed light on where processes are broken or hierarchies are misaligned. In this podcast, we'll discuss how individual and organizational practices can yield better intelligence.
Adam Huenke brings 15+ years as an all-source and open-source intelligence analyst. He received formal training as an all-source intelligence analyst in the United States Marines Corps, serving nine years at various levels, from Battalion to HQ US Special Operations Command. After his service, Adam transitioned his intelligence experience to a cyber focus, working as a cyberthreat intelligence analyst, including in the financial sector at Huntington National Bank. Since 2021, Adam has been the OSINT training lead at Authentic8, where he shares best practices, tips, techniques, and OSINT tradecraft with military and government entities and the commercial sector.
He holds a Bachelor’s Degree in Cybersecurity from American Military University and an Associate’s Degree in Digital Forensics from St. Petersburg College. He’s an Infragard (Central Ohio Members Alliance Chapter) member and an advisory board member of Transformative Leadership in Disruptive Times at Cal State East Bay. Adam is a regular blogger, writing posts to bring awareness and spark conversation in the cyber and intelligence community, and a frequent guest on the NeedleStack podcast for professional online researchers.
You can trial Silo for Research free for 7 days at https://authentic8.com/cybersocialhub
Music License: MQ9XUKSI3UO6R4ZJ
260
views
Google Dorking Resources for OSINT
Everyone knows using Google to search the internet is very powerful. Join us on this week's show as Kevin shows you some more free resources to focus your search using Google Dorking, or as we older investigators call it, advanced Internet searches :)
Google Dork
intitle: This will ask google to show pages that have the term in their html title.
inurl: Searches for specified term in the URL. For example: inurl:starwars
filetype: Searched for certain file type. Example: filetype:pdf will search for all the pdf files in the websites.
ext: It works similar to filetype. Example: ext:pdf finds pdf extension files.
intext: or allintext: This will search content of the page. This works somewhat like plain google search
site: This limits the search to a specific site only. Example: site:cybersocialhub.com python will limit search of the term python to only cybersocialhub.com
SITES
https://dorksearch.com/
http://advangle.com/
https://www.exploit-db.com/google-hacking-database
https://dorkgenius.com/
Music License: QD6FXZKFO5T9OUZK
42
views
Remote Cloud Collection with Paraben E3
When working with cloud data immediate access to the information for collection can make all the difference. With the unique Remote Cloud Collection tool inside the E3 Forensic Platform, you can have the field and lab work in conjunction to get consent and capture the valuable data found in popular social media, conversation, and cloud storage Apps.
Learn more: https://paraben.com/e3-remote-imaging/
3
views