"PathWell: Password Topology Histogram Wear-Leveling
" at BSides Asheville 2014
. Watch the presentation
"Experiences in Enterprise Searching: Tips, Techniques, and Pitfalls
" at the Techno Forensics Digital Investigations Conference 2010
in Gaithersburg, Maryland.
"Shrinking the IDS Haystack
" at the IntrusionWorld
conference in Baltimore, MD.
"Burying Your Head in the SandNet
" at the Computer Forensics Show
conference in Washington, DC.
"The Forensic Katana - Digital File Carving" at the CEIC
conference in Las Vegas. There were two versions, a basic and an advanced session. Download the basic class slides
, or the advanced class slides
"Home-grown Crypto (aka Taking a Shiv to a Gun Fight)
" at the ShmooCon
conference in Washington D.C. Click here
to watch a video of the presentation.
"Introduction to Botnets
at the Ohio Information Security Conference (OISC 07).
DFRWS 2006 File Carving Challenge Submission Paper
- Summarizes the results of our efforts to solve the Digital Forensic Research Workshop (DFRWS) 2006 File Carving Challenge. In short, our team took 1st place (here's our press release
). Details regarding this challenge may be found here
- dfrws_challenge_2006.final.2006-07-17.tgz - Original submission tar ball.
- dfrws_challenge_2006.final.2006-08-22.tgz - Updated tar ball that includes several corrections (e.g., wording changes, error/omission fixes, etc.
MD5 Prehash Analysis - This paper examines the advantages of prehashing for data streams (e.g., session IDs) that can be broken into two consecutive sub-streams where the first sub-stream is fixed or relatively fixed (i.e., easily inferred/guessed) and the second sub-stream is unpredictable (random) or hard to guess/infer (pseudo-random). While the observations and findings of this study were limited to the MD5 algorithm, it is likely that they would apply to all hashing techniques in general.
System Baselining - A Forensic Perspective - This paper defines baselining terminology, explains the mechanics of baselining, compares and contrasts different baselining techniques, and describes FTimes -- a system baselining and evidence collection tool. The paper also explores some of the criteria that evidence collection tools and techniques must satisfy if they are going to support prosecutions. In closing, it presents a pair of war stories that are typical of the times.
WebJob Breakeven Analysis - Installing and Configuring a Solaris Package - This paper describes the labor cost associated with using a WebJob framework to deploy and configure a Solaris package on several hundred systems. In short, the payoff is pretty amazing. Furthermore, the efficiencies and economy of scale that this approach delivers can be translated to almost any other type of administrative and/or repetitive task that can be scripted.