F-Response Blog
RegRipper and F-Response
13.06.2024
This one is personal to me. I've known Harlan Carvey, creator of RegRipper, a long time. We met over a decade ago when he so graciously picked me up at the airport and introduced me to a friend of his getting ready to do big things in the physical memory space (cough Read the full post
Do you EDR?
20.05.2024
Since 2020, EDR (Endpoint Detection and Response) tools and platforms have become all the rage. Endpoint detection and response, also known as endpoint threat detection and response (ETDR), is a cybersecurity technology that continually monitors an "endpoint" (e.g. mobile phone, laptop, …
Read the full postAn Interview with Jason Hale of USB Detective
06.05.2014
A few days ago we profiled USB Detective, a fascinating desktop application for USB device artifact forensics.

Since that time, we reached to Jason Hale of USB Detective to get a …
Read the full postF-Response and USB Detective
29.04.2024
It should come as no surprise that we love finding new and interesting analysis tools. Finding investigative software that works well over F-Response is a passion of ours.
Recently, a customer reached out and asked us if USB Detective worked over an …
Read the full postSometimes you can't deploy...
25.03.2024
When it works, F-Response's built in deployment mechanisms are nothing short of magical. You put in some credentials, and we take care of the rest. We connect to the remote machine, negotiate the right protocol, and get the software where it needs to be. But when it doesn't work... Well, there's …
Read the full post