Sans — For508 Index
| Exam Question Trigger | Artifact / Path | Tool / Command | Red Flag / Page | | :--- | :--- | :--- | :--- | | "Find process hollowing in memory dump" | N/A - Volatility | vol -f mem.dmp windows.malfind | Checks VadFlags.Protection = PAGE_EXECUTE_READWRITE (B5-p87) | | "Last time USB was plugged in" | SYSTEM hive: CurrentControlSet\Enum\USBSTOR | RegRipper or RECmd | Look for FriendlyName and LastInsertion time (B2-p112) | | "Bypass of Autoruns via WMI" | WMI Persistence -> ActiveScriptEventConsumer | wmic or AutorunsSC | Look for CommandLineTemplate containing powershell (B6-p45) |
Look up: Process Injection -> See: Book 5, Page 87 (Malfind) / Page 102 (Hollowing). Sans For508 Index
Look up: First Execution -> See: Book 2, Page 44 (Amcache) / Page 56 (Shimcache). | Exam Question Trigger | Artifact / Path
To ace the practical, build an on a single laminated sheet of paper. If you are pursuing the GIAC Certified Forensic
If you are pursuing the GIAC Certified Forensic Analyst (GCFA) certification, you have likely heard the whispered legend of the SANS FOR508 Index . To the uninitiated, it is a mere table of contents. To the veteran, it is a surgically precise weapon—the difference between a panicked, Ctrl+F-fueled scramble and a calm, collected walkthrough of one of the most challenging incident response exams in the industry.
Notice how this index answers the question immediately. You don't read it; you glance at it. The SANS FOR508 Index is not a crutch; it is the manifestation of your understanding of digital forensics and incident response (DFIR). By building a strategic, layered, and concise index, you force yourself to learn the nuance of process injection, timeline jitter, and registry artifacts.
Your final SANS FOR508 Index should fit on 4 pages maximum . Double-sided, 10-point font, landscape orientation.