From Security Weekly Wiki
Jump to navigationJump to search

Announcements & Shameless Plugs

PaulDotCom Security Weekly - Episode 268 for Thursday December 1st, 2011.

Guest Interview: Scott Moulton

6:00 PM EDT

Scott Moulton is known both for his trademark 'Forensic Unit' hat and his uncanny knack for finding new data recovery techniques the other experts don't want you to know. Scott is owner of My Hard Drive Died.com and fills his days recovering data from all kinds of storage devices, testifying in court, and teaching others to do data recovery.

  1. Tell us about cell phone provider retention periods. Are you surprised by Wired's findings?
  2. Give us ten things we didnt know about our hard drives

Guest Tech Segment: Chris Pogue


Chris is a Senior Security Consultant for the Trustwave SpiderLabs, a Former US Army Signal Corps Warrant Officer and Member of the United States Secret Service Miami Electronic Crimes Task Force, and is Author of “Unix and Linux Forensic Analysis” by Syngress. Chris is on to give us an overview of his forensic methodology known as Sniper Forensics, whose users include both the FBI and the United States Secret Service.

Pogue Head.jpg

Author of the blog, “The Digital Standard"

  1. Why do you consider digital forensics tougher than other forensics fields?
  2. What's "Shotgun Forensics" and "Sniper Forensics"?
  3. What are the Guiding Principles for Sniper Forensics?
  4. Bring us thru Timeline Analysis - what it is and why its important.
  5. How have attackers changed with respect to memory dumping and other operations?
  6. Tell us what 3 things all malware must do.
  7. What are some good tips for malware that's packed or obfuscated?
  8. Nick indicated there were some interesting cases you were working on. Please share!