David Bombal

#517: Have you been hacked? Advanced detection method

Oct 6, 2025
OTW, a digital forensics practitioner and author behind OccupyTheWeb, shares expertise on detecting hacks using OSQuery, a powerful tool that turns system data into a queryable database. He discusses real-world cases involving harassment and business disputes to illustrate key signs of compromise, including suspicious processes and registry entries. Listeners learn how to identify fileless malware and the limitations of traditional antivirus systems. OTW provides practical SQL-style commands to help users investigate potential breaches effectively.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Turn Your Host Into A Database

  • OSQuery turns an endpoint into a queryable database of system state for detection and forensics.
  • Facebook released it cross-platform, letting users inspect Windows, macOS, and Linux hosts locally.
ANECDOTE

Hacking As Personal Or Business Warfare

  • OTW described cases where people hire hackers in divorce or business disputes to harass targets.
  • One case involved a husband taking over his wife's devices and smart home, showing real-world personal attacks.
INSIGHT

Two Essentials Of A Compromise

  • Effective compromises need both a service on the host and a network connection for remote control.
  • So detection should focus on services, connections, and persistence mechanisms like registry or scheduled tasks.
Get the Snipd Podcast app to discover more snips from this episode
Get the app