Chris Sanders

Enumerating Metadata

In this article I’m going to discuss the importance of metadata as it relates to reconnaissance. I’ll cover what it is, how it’s stored, and how attackers can extract it to find out more about you or your network.

mission-critical encryption

Extracting USB Artifacts from Windows 7

This article will discuss some of the artifacts that a USB storage device leaves on a system when it has been plugged in, how to gather and interpret those artifacts, and how to ultimately determine if a USB device may have been involved in malicious activity on a Windows computer.

Scroll to Top