Investigation Scenario π
You've discovered a host with multiple instances of Chrome running the --hidden option.
What do you look for to investigate whether an incident occurred?
Security Analyst, Author, and Instructor, Ed.D.
Studying the intersection of security investigation doctrine, cognitive psychology, and education.
Founder of Applied Network Defense and Rural Tech Fund
Books:
π― Intrusion Detection Honeypots
π¦ Practical Packet Analysis
π Applied Network Security Monitoring
Former: Mandiant, InGuardians, Dept of Defense, Roadside Fruit Vendor.
A question well stated is a problem half-solved. #InvestigationTheory
https://chrissanders.org/links/
| Blog | https://chrissanders.org/ |
| Training Courses | http://networkdefense.co/courses/ |
| https://twitter.com/chrissanders88 | |
| Books | https://chrissanders.org/publications |
| More Links | https://chrissanders.org/links/ |
Investigation Scenario π
You've discovered a host with multiple instances of Chrome running the --hidden option.
What do you look for to investigate whether an incident occurred?
Investigation Scenario π
Browser history for an HR user shows repeated visits to chat.openai[.]com, followed by creation of C:\Users\chris\AppData\Local\Temp\cleanup[.]ps1. The file is not available, and the hash shows no matches in OSINT resources.
What do you look for to investigate whether an incident occurred?
Investigation Scenario π
A host on your network executed the command βnetsh wlan show profileβ for the first time.
What do you look for to investigate whether an incident occurred?
Investigation Scenario π
Your SIEM flags an OAuth consent grant to βAdobe Secure Shareβ from a user's M365 account at 07:13 AM. The audit log shows consent to files.readwrite.all.
What do you look for to investigate whether an incident occurred?

Thank you for your interest in bringing "Milo and the Midnight Meteorite" to your classroom, library, or school! Please fill out the form below to request copies of the book be donated to you to utilize with your students. We will be in touch with you about your request. *Subject to availability. Filling out a book request does not guarantee that your request will be fulfilled.
Investigation Scenario π
You receive a SIEM alert about this file:
C:\Users\bose\Downloads\report.doc
The file copied itself to %TEMP% and the original copy was deleted.
What do you look for to investigate whether an incident occurred?