Ed.D.
Founder Applied Network Defense and Rural Tech Fund
Former Mandiant, InGuardians, DoD
Author: Intrusion Detection Honeypots, Practical Packet Analysis, Applied NSM
You know an attacker accessed several customer support workstations in the past month based on discovery of a consistent persistence mechanism. You suspect wider access, but auth logs only go back 24h. How can you determine where else the attacker went?
#InvestigationPath
You know an attacker accessed several customer support workstations in the past month based on discovery of a consistent persistence mechanism. You suspect wider access, but auth logs only go back 24h. How can you determine where else the attacker went?
#InvestigationPath
While reviewing group membership on a Windows domain, you discover that the account of a former IT employee is still active. They left the company nearly a year ago.
What do you look for to investigate whether an incident occurred?
#InvestigationPath #DFIR #SOC
While reviewing group membership on a Windows domain, you discover that the account of a former IT employee is still active. They left the company nearly a year ago.
What do you look for to investigate whether an incident occurred?
#InvestigationPath #DFIR #SOC
While reviewing asset scanning reports, you’ve discovered a Mint Linux system that does not appear on any change request.
What do you look for to investigate the origin of the system and whether malicious activity occurred?
#InvestigationPath #DFIR #SOC
While reviewing asset scanning reports, you’ve discovered a Mint Linux system that does not appear on any change request.
What do you look for to investigate the origin of the system and whether malicious activity occurred?
#InvestigationPath #DFIR #SOC
I hope you'll consider the meaningful work we're doing with the Rural Technology Fund.
Even if not, I hope you'll connect with a cause that matters to you and helps folks.
I hope you'll consider the meaningful work we're doing with the Rural Technology Fund.
Even if not, I hope you'll connect with a cause that matters to you and helps folks.
A bird had built a nest in my smoke stack... A bird. A. BIRD.
(The bird was not present during this event)
A bird had built a nest in my smoke stack... A bird. A. BIRD.
(The bird was not present during this event)
"... [Viewing] abstract art elicited greater interindividual variability in activity within higher-order, associative brain areas" compared to representational art. 🎨🧠
"... [Viewing] abstract art elicited greater interindividual variability in activity within higher-order, associative brain areas" compared to representational art. 🎨🧠
chrissanders.org/2025/12/my-...
What are some of your favorite books you encountered in 2025?
chrissanders.org/2025/12/my-...
What are some of your favorite books you encountered in 2025?
While reviewing web logs on a Linux Apache server, you discover inbound requests for PHP pages. However, the server is not reported to host PHP content.
What do you look for to investigate whether an incident occurred?
#InvestigationPath #DFIR #SOC
While reviewing web logs on a Linux Apache server, you discover inbound requests for PHP pages. However, the server is not reported to host PHP content.
What do you look for to investigate whether an incident occurred?
#InvestigationPath #DFIR #SOC
Ask yourself... do you think that you're the first and only person they've approached?
Ask yourself... do you think that you're the first and only person they've approached?
Even if we think we're actively engaged, the mind wanders more with time.
Even if we think we're actively engaged, the mind wanders more with time.
The research doesn't distract from the work; it *is the work*.
Bonus? You get to carry that attack knowledge to future hunts and investigations.
The research doesn't distract from the work; it *is the work*.
Bonus? You get to carry that attack knowledge to future hunts and investigations.
A Windows system executed dsa.msc for the first time.
What do you look for to investigate whether an incident occurred AND its scope?
#InvestigationPath #DFIR #SOC
A Windows system executed dsa.msc for the first time.
What do you look for to investigate whether an incident occurred AND its scope?
#InvestigationPath #DFIR #SOC
Every one of my courses is 25% off until midnight 🚀✨
It's the only sitewide sale we do all year, and the cheapest you'll see these courses.
This discount is for all y'all, so use the code ALLYALL at checkout.
View my courses here: networkdefense.io/
Every one of my courses is 25% off until midnight 🚀✨
It's the only sitewide sale we do all year, and the cheapest you'll see these courses.
This discount is for all y'all, so use the code ALLYALL at checkout.
View my courses here: networkdefense.io/
You've found a new entry in ShimCache on Windows 10: C:\Users\Public\svchost32.exe with a last modified timestamp predating system boot.
What do you look for to investigate whether an incident occurred?
#InvestigationPath #DFIR #SOC
You've found a new entry in ShimCache on Windows 10: C:\Users\Public\svchost32.exe with a last modified timestamp predating system boot.
What do you look for to investigate whether an incident occurred?
#InvestigationPath #DFIR #SOC