Chapin BryceinPythonic Forensics1 minute CanariesVisibility is everything in cyber security. Let’s increase the visibility of suspicious activity in your environment in 1 minute.2 min read·Oct 15, 2022----
Chapin BryceinPythonic Forensics3 ways I improved my Python code last yearUsing SonarLint, pre-commit, and type hinting3 min read·Jan 7, 2022----
Chapin BryceTwo-minute InfoSec — Shell TimestampsA new series with a goal on sharing quick wins that can assist organizational security, forensic investigations, incident response and …2 min read·Mar 5, 2020----
Chapin BryceinPythonic Forensics3-Step RDP Honeypot: Step 3 | Build the BotIn this mini-series, we have setup our honeypot, extracted valuable features from our PCAP data, and now we operationalize this intel.8 min read·Feb 15, 2020----
Chapin BryceinPythonic Forensics3-Step RDP Honeypot: Step 2 | Operationalize PCAPsWith our RDP Honeypot PCAP data captured, let’s analyze it. We will leverage Moloch to assist us with extracting valuable PCAP features.5 min read·Feb 15, 2020----
Chapin BryceinPythonic Forensics3-Step RDP Honeypot: Step 1 | Honeypot SetupStep 1 in our process is creating our Honeypot service and start capturing the request data. This brief post dives into building the most…7 min read·Feb 15, 2020----
Chapin BryceinPythonic Forensics3-Step RDP Honeypot: Step 0 | IntroductionEasily set up your own RDP Honeypot, capture bots scanning for vulnerable systems, and operationalize the data to help the InfoSec…2 min read·Feb 15, 2020----
Chapin BryceinPythonic ForensicsBuild your own RDP HoneypotThis is a short post, largely inspired by alt3kx on creating your own RDP Honeypot4 min read·Nov 20, 2019----
Chapin BryceinPythonic ForensicsLooking Back at AWS IPsAWS is becoming more and more prevalent in DFIR casework. In addition to requests for acquiring data from services such as S3 and EC2, it…2 min read·Jan 21, 2019----
Chapin BryceinPythonic ForensicsFuzzy Hashing and CTPHToday we have another short post, focused on two different approaches used for similarity analysis (aka Fuzzy hashing). While we know that…9 min read·Nov 4, 2018----