The document discusses the use of interactive artifacts to track attacker actions during forensic investigations, highlighting methods to define interactive logon sessions and the significance of various forensic artifacts. It includes a case study detailing a financially motivated attack (Fin9) that exploited business processes, alongside examples of log entries and user activity evidence. The presentation emphasizes the analysis of user profiles, registry keys, and remote desktop events, ultimately aiming to demonstrate how multiple evidence sources can unveil intricate stories in cyber investigations.
Related topics: