Cyber Security posts

The Twitch streamer who wastes tech support scammers’ time
 -  Tech support scams – which attempt to extort money from vulerable people by exploiting their lack of technical knowledge – are difficult to stop, but I recently discovered a Twitch streamer working to raise awareness of the threat. A few years ago, one of my family members fell victim to...
Python tools for Windows forensics: Mozilla Firefox browsing history
 -  After extracting data from Google Chrome last month, next on our journey into the eye-opening world of Windows forensics it’s time to retrieve the user’s Firefox history to see which websites they’ve been visiting in Mozilla’s browser. What is the Firefox history and how does it help our investigation? I’m...
Investigating external network connections with netstat and OSINT
 -  When investigating a potentially compromised Windows computer, as well as looking at logs, files, and processes, it’s important to check its current network connections. Here’s how to retrieve that data with netstat and make sense of it. Gathering data with netstat First, open a Command Prompt window and use netstat...
Python tools for Windows forensics: Microsoft Office recent files
 -  Adding to our growing Python forensics tool for Windows, let’s take a look a any Microsoft Office documents the user has recently opened and when they were first and last opened, and add all of this information to our timeline. What are Office files and how do they help our...
Python tools for Windows forensics: Extracting a user’s Google Chrome history
 -  Web browsing data can tell an analyst a lot about what happened on a system before they got their hands on it. Here’s how to extract the history of the most popular browser – Google Chrome – with a new Python module for our forensics tool. What is the Chrome...
Python tools for Windows forensics: Windows Security event log
 -  This month’s new module for the MCAS Windows Forensic Gatherer queries the Windows Security event log to gather information on the user’s logon and logoff activities, helping us to determine exactly when they were using the system. What is the Windows Security event log and how does it help our...
Python tools for Windows forensics: Deleted files in the Recycle Bin
 -  In a previous post I began building a Python tool that gathers Windows forensic artefacts and parses them into a timeline. In that post I wrote a function that gathers Windows Prefetch application data – this time, let’s take a look at the Recycle Bin. What is the Recycle Bin...
Cyber skills gap: Raising awareness of cyber security opportunities
 -  We’re making progress in training the next generation of cyber security professionals, but for young people to take that training and learn the right skills in the first place they need to be aware of the opportunities available to them in the industry. I was asked to attend a SANS Cyber...
Python tools for Windows forensics: Parsing Prefetch program data
 -  Bit by bit, I’m going to build a Python tool to scrape a Windows system disk image for common forensic artefacts and build a CSV timeline from the evidence gathered. In this first post, I’ll parse and add the data stored in Windows Prefetch files. On my recent SANS course...
Review – Threat Modeling: Designing for Security by Adam Shostack
 -  As I mentioned in my recent post about what I learnt in my first year as a cyber security consultant, I always keep an ebook handy on my phone so I can learn something new on long train journeys. Most recently, this has been Threat Modeling: Designing for Security. While my...

Thinking about

Website v2.0
I've given my website its first major update since 2020, keeping the same general aesthetic but placing a greater focus on content. Now to come up with some blog post ideas...

Interests

  • Cyber security
  • Tech
  • Python
  • PowerShell
  • JavaScript
  • F1
  • Reading
  • Writing
  • Psychology
  • Philosophy
  • Exercise
  • Running
  • Gaming
  • Football
  • Music
  • Guitar