"Computação Forense"
Follow
21.0K views | +19 today
 
Scooped by João Carvalho
onto "Computação Forense"
Scoop.it!

Windows 8 Forensics: Reset and Refresh Artifacts

Windows 8 Forensics: Reset and Refresh Artifacts | "Computação Forense" | Scoop.it

The following information is primarily from a paper that I wrote detailing the Windows 8 Reset and Refresh functions. 

more...
No comment yet.

From around the web

"Computação Forense"
Tecnologia e Computação Forense - Computer Forensics
Curated by João Carvalho
Your new post is loading...
Your new post is loading...
Scooped by João Carvalho
Scoop.it!

The Future of Mobile Forensics

The Future of Mobile Forensics | "Computação Forense" | Scoop.it
The golden age of mobile forensics is over. There is no longer an easy way to get through the passcode in new iOS devices. Chip-off acquisition is dead due to full-disk encryption, while physical acquisition is dead since 64-bit devices and versions of iOS 8 that cannot be jailbroken. Blackberries were highly resistant to chip-off acquisition from the beginning, and Android is getting there quickly. 
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Malware Researcher’s Handbook: Introduction - InfoSec Institute

Malware Researcher’s Handbook: Introduction - InfoSec Institute | "Computação Forense" | Scoop.it
All the Stuff  You Know Before Starting Research Malware research contains a lot of information like reverse engineering, exploit-kit, exploit analysis, bo
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Descubre si te están robando el WiFi en dos pasos y cómo evitarlo

Descubre si te están robando el WiFi en dos pasos y cómo evitarlo | "Computação Forense" | Scoop.it
Para disfrutar de nuestra red a máxima velocidad hay que reforzar su seguridad
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Unallocated Space: T'ain't What You Do (It's the Way That You Do It)

Unallocated Space: T'ain't What You Do (It's the Way That You Do It) | "Computação Forense" | Scoop.it
To most digital investigators, unallocated space is the “black hole” of a disk image where we send our forensic tools to search for potential evidential items. Unfortunately, the current method of dealing with unallocated space doesn’t realize its full potential.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Cheeky4n6Monkey - Learning About Digital Forensics: Extracting Pictures from MS Office (2007)

Cheeky4n6Monkey - Learning About Digital Forensics: Extracting Pictures from MS Office (2007) | "Computação Forense" | Scoop.it
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Queira o Sr. Perito tratar sobre atividade recente com o software OSForensics

Queira o Sr. Perito tratar sobre atividade recente com o software OSForensics | "Computação Forense" | Scoop.it
Abordaremos neste artigo a utilização do módulo de Atividade Recente do OSForensics que verifica o sistema e apresenta uma lista de informações sobre atividades recentes do sistema operacional, tai...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

CyberSecurity Institute - The Tools Proven In Court Question

CyberSecurity Institute - The Tools Proven In Court Question | "Computação Forense" | Scoop.it
CyberSecurity Institute provides leading edge security services and computer forensics training performed by information security professionals.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Acquiring Windows PCs

Acquiring Windows PCs | "Computação Forense" | Scoop.it
The obvious path to acquire a Windows PC has always been “pull the plug, take the disk out, connect to an imaging device and collect evidence." Sound familiar? Well, in today’s connected world things do not work quite like that. In this article, we will have a look at measure the investigator has to take before taking the disk out, even before pulling the plug.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Computer Forensics, Malware Analysis & Digital Investigations: EnCase v7 EnScript to create LEF based on condition

Computer Forensics, Malware Analysis & Digital Investigations: EnCase v7 EnScript to create LEF based on condition | "Computação Forense" | Scoop.it
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Data Sanitization: Part 1

Data Sanitization: Part 1 | "Computação Forense" | Scoop.it
From a forensic perspective, the Recycle Bin can be a “gold mine” for gathering probative evidence which can be extremely valuable for investigative purposes. There are many forensic tools available that are designed to recover deleted files from the Recycle Bin. Depending upon the length of time a file has been deleted, forensic tools can recover the entire file or parts of the file (if it was partially overwritten).
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Malicious Documents - PDF Analysis in 5 steps

Malicious Documents - PDF Analysis in 5 steps | "Computação Forense" | Scoop.it
Mass mailing or targeted campaigns that use common files to host or exploit code have been and are a very popular vector of attack. In other words, a malicious PDF or MS Office document received vi...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Backup Files from a Non Booting Windows to LAN or FTP Using a Live CD • Raymond.CC

Backup Files from a Non Booting Windows to LAN or FTP Using a Live CD • Raymond.CC | "Computação Forense" | Scoop.it
It is possible to retrieve the data from your computer when you are unable to get into Windows at all due to a severe virus infection or file corruption. Here is how to rescue the files by transferring them to another computer via LAN, FTP, online cloud services, and USB drive.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Computer Crime Investigation Using Forensic Tools and Technology - InfoSec Institute

Computer Crime Investigation Using Forensic Tools and Technology - InfoSec Institute | "Computação Forense" | Scoop.it
As more and more users go mobile and utilize interconnected devices, computers are often at the center of incidents and investigations. Evidence for discus
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets

Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets | "Computação Forense" | Scoop.it
Oleg Afonin, Danil Nikolaev, Yuri Gubanov © Belkasoft Research 2015 While Windows desktops and laptops are relatively easy to acquire, the same cannot be said about portable Windows devices such as...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

10 Apps to Create a Bootable USB for Windows

10 Apps to Create a Bootable USB for Windows | "Computação Forense" | Scoop.it
Generally when you install Windows, you either use the set up directly or use a DVD (burn the ISO) to boot and then install. But one of the simpler means of installing Windows on multiple PC is using a bootable USB drive. Since USB drive is available in all desktops and laptops unlike DVD drives,…
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets

Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets | "Computação Forense" | Scoop.it
In this article, we will have a look at how Windows-based portable electronic devices are different from traditional laptops and desktops, review new security measures and energy saving modes presented by Windows tablets, and discuss hardware, methods and tools we can use to acquire the content of their RAM and persistent storage.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Legal Issues with Cloud Forensics

Legal Issues with Cloud Forensics | "Computação Forense" | Scoop.it
Unfortunately, many companies have entered the cloud without first checking the weather. Cloud services have skyrocketed primarily because they’re cheaper and more convenient than the alternative. What happens if the cloud gets stormy, you suffer a breach, and you find yourself in the position of having to conduct digital forensics? What now?
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Digital Forensics Today Blog: EnCase and Python – Automating Windows Phone 8 Analysis

Digital Forensics Today Blog: EnCase and Python – Automating Windows Phone 8 Analysis | "Computação Forense" | Scoop.it
more...
No comment yet.