My ASCII Characters

Metadata

Role: PhD Candidate in Digital Forensics
GPG: here
Fingerprint: 303DEB131EAA569D677B14E739247B5A31B58DCE
Twitter: @jesperatsu
Email: jesperbe dsv su se

Useful Tools

Penetration testing and forensic tools

  • oclHashCat
  • exiftool
  • PhotoRec
  • Volatilty
  • JDGui
  • OllyDBG
  • Immunity debugger
  • IDA Pro
  • WinDBG
  • LordPE
  • RegShot
  • The Sleuth Kit
  • SysInternals suite
  • BlackArch's Tools List
  • Kali Linux's Tools List
  • More forensic tools on our Wiki: forensicswiki.cs2lab.dsv.su.se
  • Desktop Tools

  • swaywm
  • vim-cli
  • alacritty
  • sakura
  • tmux
  • lxc
  • mutt
  • offlineimap
  • weechat
  • ecryptfs
  • calcurse
  • More privacy tools on privacytools.io
  • More code on my Github page
  • More forensic tools on our Wiki: forensicswiki.cs2lab.dsv.su.se
  • Unix Based/Like Operating Systems

  • Arch Linux for desktop use
  • FreeBSD for stable server usage
  • Ubuntu for experimental server usage
  • Kali for penetration testing etc.
  • REMNux for malware analysis
  • BlackArch for penetration testing (a lot more tools included by default than Kali)
  • Docker Images

    These are very useful for experimenting and playing around with new stuff.

  • Alpine Linux
  • Neo4j DB
  • Solr DB
  • Golang
  • Python
  • Bookshelf

  • Digital Forensics and Investigations, E. Casey
  • Computer Forensics Cybercriminals, Laws and Evidence, M-H. Maras
  • Digital Forensics, Digital Evidence in Criminal Investigation, A. M. Marshall
  • File System Forensic Analysis, B. Carrier
  • Windows Forensic Analysis Toolkit, H. Carvey
  • Windows Registry Analysis, H. Carvey
  • Forensic Discovery, D. Farmer & W. Venema
  • What makes it page?, E. Martignetti
  • Malware Analyst's Cookbook, M. Ligh, S. Adair, B. Hartstein & Mathew Richard
  • The Art of Memory Forensics, M. Ligh, A. Case, J. Levy & A. Walters
  • Practical Malware Analysis, M. Sikorski & A. Honig
  • Wireshark Network Analysis, L. Chappell
  • Computer Security, D. Gollman
  • Introduction to Computer Security, M. Bishop
  • Cryptography and Network Security, W. Stallings
  • Applied Cryptography, B. Schneier
  • Research Projects

    I have been involved in the following projects and sub-projects on behalf of the CS2Lab at DSV:

  • DFET - Digital Forensics Evaluation and Training
  • Cyberakademien - The Swedish Cyber Academy (the successor to the DFET project)
  • SITE4SEFO - Simulation and Training Environment for Security and Forensics
  • Non-research Projects

    I have been involed in the following non-research related projects:

  • Sec-10 - The DSV Ethical Hacking Club (sadly lamented)
  • IT Security Twitter Profiles

    You can find more on my Twitter account: @jesperatsu

    IT Security

  • @mikko
  • @bruceschneier
  • @securityaffairs
  • @Snowden
  • @foxit
  • @Cyb3rOps
  • @blackarchlinux
  • @todayininfosec
  • @welivesecurity
  • @teamcymru
  • @i0n1c
  • @InfosecEditor
  • @interpool_cyber
  • @sophos_news
  • @gcluley
  • @malwaremustdie
  • @darkreading
  • @shodanhq
  • @nullsecuritynet
  • @kurtseifried
  • @AnonyOps
  • @NullMode_
  • @virusbtn
  • @xme
  • @malwarebytes
  • @malwareologist
  • @ESET
  • @markrussinovich
  • @e_kaspersky
  • @kevinmitnick
  • Digital Forensics

  • @msab_xry
  • @parabencorp
  • @cellebrite_UFED
  • @oxygenforensics
  • @AccessDataGroup
  • @ForensicFocus
  • @CyberExaminer
  • @lseltzer
  • @KatanaForensics
  • @magnetforensics
  • @attrc
  • @carrier4n6
  • DuckDuckGo Debian