Malware Analysis With Several Free NirSoft Tools
Nice blog post about the NirSoft tools:
http://blog.zeltser.com/post/9610150595/processactivitymonitor-and-regfromapp
Nice blog post about the NirSoft tools:
http://blog.zeltser.com/post/9610150595/processactivitymonitor-and-regfromapp
Nice read:
http://ptresearch.blogspot.com/2011/08/http-parameter-contamination-more.html
Nice cheat sheet:
John The Ripper Hash Formats
http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats
Nice post about timelining for Windows images:
http://computer-forensics.sans.org/blog/2011/08/01/ultimate-windows-timelining
Here’s a Google spreadsheet (by Javier Bassi) with a list of Infosec talks on the web:
https://spreadsheets.google.com/spreadsheet/ccc?key=0At1wE3TY3jzTdHpNZHg4T2p4elY3RHpTT25aSDlTT0E&hl=en_US
Great presentation (PDF) about IPv6 and IPv6 security implications:
http://www.hackingipv6networks.com/past-trainings/hip2011-hacking-ipv6-networks.pdf?attredirects=0&d=1
Nice PDF provided by SANS (including links to further information and tools for incident response):
http://www.sans.org/reading_room/whitepapers/incident/responding-zero-day-threats_33709