1. A corporate exfiltration case was investigated involving a private document being posted online. The document originated from Jean's computer and was sent to Alison.
2. Key details were extracted from the forensic analysis of Jean's computer including identifying Outlook email backups, registry files, and metadata of files.
3. The analysis determined that Jean was misled by a phishing email impersonating Alison and attached the document, allowing it to be posted online by the external hacker who stole Alison's email credentials.
My presentation at Software Free Day 2017 - 16 September 2017, organized by Vietnam Free and Open Source Software Association.
http://sfd2017.vfossa.vn
10. Nhi畛m v畛 c畛a i畛u tra vi棚n
Qu畉n l箪 v khai th叩c d畛 li畛u tr棚n h畛 th畛ng m叩y 岳鱈稼鞄,
hi畛u bi畉t khai th叩c c叩c ph動董ng ph叩p l動u tr畛 th担ng
tin tr棚n m叩y 岳鱈稼鞄 v thi畉t b畛 s畛.
Ph但n t鱈ch c叩c d畛 li畛u t狸m 動畛c tr棚n h畛 th畛ng m叩y
岳鱈稼鞄 畛 t狸m ra c叩c th担ng tin chi ti畉t li棚n quan nh動 l
ngu畛n g畛c, n畛i dung;
叩nh gi叩 c叩c th担ng tin t狸m 動畛c v t畉p h畛p thnh
b畉ng ch畛ng s畛.
動a b畉ng ch畛ng s畛 tr動畛c t嘆a v b畉o v畛 c叩c b畉ng
ch畛ng s畛 坦.
11. Th畉 no l b畉ng ch畛ng s畛
B畉ng ch畛ng s畛 ch畛 bao g畛m chu畛i c叩c bit
B畉ng ch畛ng s畛 l h畛u h畉n trong c畉 kh担ng gian v
th畛i gian
B畉ng ch畛ng s畛 l ch畛ng c畛 d畉u v畉t.
B畉ng ch畛ng s畛 th狸 ti畛m 畉n trong t畛 nhi棚n.
畛 ph畛c t畉p c畛a 岳鱈稼鞄 to叩n lm gi畛i h畉n vi畛c ph但n
t鱈ch Ph叩p ch畛ng s畛.
Lu畉n thuy畉t c董 b畉n c畛a Ph叩p ch畛ng s畛 l C叩i g狸
ch動a r探 rng, nh畉t qu叩n th狸 kh担ng ph畉i l th畉t.
(What is inconsistent is not true)
11B叩o c叩o m担n Ph叩p ch畛ng s畛
12. N董i c坦 th畛 t狸m b畉ng ch畛ng s畛
Trong c叩c t畉p tin ghi l畛ch s畛 truy c畉p internet
Trong c叩c t畉p tin Cach sinh ra khi truy c畉p internet
T畉i c叩c v湛ng 挑a ch動a c畉p ph叩t ho畉c file slack
L動u tr畛 c叩c t畉p tin, th動 m畛c, t棚n t畉p tin
Th担ng tin ngy l動u tr畛 t畉p tin
畉n/nh炭ng trong ph畉n m畛m
Trong c叩c t畉p tin chia s畉
Trong c叩c e-mail