"Computação Forense"
Follow
21.4K views | +10 today
 
"Computação Forense"
Tecnologia e Computação Forense - Computer Forensics
Curated by João Carvalho
Your new post is loading...
Your new post is loading...
Scooped by João Carvalho
Scoop.it!

SQLite Forensics - A Free Training Series, Part I

SQLite Forensics - A Free Training Series, Part I | "Computação Forense" | Scoop.it
Learn the basics of SQLite forensics in Wild PCS Mobile Forensics multi part free training series. We'll discuss SQLite databases and how to examine them.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Malicious Documents - PDF Analysis in 5 steps

Malicious Documents - PDF Analysis in 5 steps | "Computação Forense" | Scoop.it
Mass mailing or targeted campaigns that use common files to host or exploit code have been and are a very popular vector of attack. In other words, a malicious PDF or MS Office document received vi...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Backup Files from a Non Booting Windows to LAN or FTP Using a Live CD • Raymond.CC

Backup Files from a Non Booting Windows to LAN or FTP Using a Live CD • Raymond.CC | "Computação Forense" | Scoop.it
It is possible to retrieve the data from your computer when you are unable to get into Windows at all due to a severe virus infection or file corruption. Here is how to rescue the files by transferring them to another computer via LAN, FTP, online cloud services, and USB drive.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Computer Crime Investigation Using Forensic Tools and Technology - InfoSec Institute

Computer Crime Investigation Using Forensic Tools and Technology - InfoSec Institute | "Computação Forense" | Scoop.it
As more and more users go mobile and utilize interconnected devices, computers are often at the center of incidents and investigations. Evidence for discus
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets

Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets | "Computação Forense" | Scoop.it
Oleg Afonin, Danil Nikolaev, Yuri Gubanov © Belkasoft Research 2015 While Windows desktops and laptops are relatively easy to acquire, the same cannot be said about portable Windows devices such as...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

10 Apps to Create a Bootable USB for Windows

10 Apps to Create a Bootable USB for Windows | "Computação Forense" | Scoop.it
Generally when you install Windows, you either use the set up directly or use a DVD (burn the ISO) to boot and then install. But one of the simpler means of installing Windows on multiple PC is using a bootable USB drive. Since USB drive is available in all desktops and laptops unlike DVD drives,…
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets

Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets | "Computação Forense" | Scoop.it
In this article, we will have a look at how Windows-based portable electronic devices are different from traditional laptops and desktops, review new security measures and energy saving modes presented by Windows tablets, and discuss hardware, methods and tools we can use to acquire the content of their RAM and persistent storage.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Extracting Dyre Configuration From A Process Dump

Extracting Dyre Configuration From A Process Dump | "Computação Forense" | Scoop.it
There are a couple of scripts and programs available on the Internet to extract the configuration of the Dyre banking malware from a memory dump. What I'm showing here is a method using a generic r...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

The Future of Mobile Forensics

The Future of Mobile Forensics | "Computação Forense" | Scoop.it
The golden age of mobile forensics is over. There is no longer an easy way to get through the passcode in new iOS devices. Chip-off acquisition is dead due to full-disk encryption, while physical acquisition is dead since 64-bit devices and versions of iOS 8 that cannot be jailbroken. Blackberries were highly resistant to chip-off acquisition from the beginning, and Android is getting there quickly. 
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Malware Researcher’s Handbook: Introduction - InfoSec Institute

Malware Researcher’s Handbook: Introduction - InfoSec Institute | "Computação Forense" | Scoop.it
All the Stuff  You Know Before Starting Research Malware research contains a lot of information like reverse engineering, exploit-kit, exploit analysis, bo
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Descubre si te están robando el WiFi en dos pasos y cómo evitarlo

Descubre si te están robando el WiFi en dos pasos y cómo evitarlo | "Computação Forense" | Scoop.it
Para disfrutar de nuestra red a máxima velocidad hay que reforzar su seguridad
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Unallocated Space: T'ain't What You Do (It's the Way That You Do It)

Unallocated Space: T'ain't What You Do (It's the Way That You Do It) | "Computação Forense" | Scoop.it
To most digital investigators, unallocated space is the “black hole” of a disk image where we send our forensic tools to search for potential evidential items. Unfortunately, the current method of dealing with unallocated space doesn’t realize its full potential.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Cheeky4n6Monkey - Learning About Digital Forensics: Extracting Pictures from MS Office (2007)

Cheeky4n6Monkey - Learning About Digital Forensics: Extracting Pictures from MS Office (2007) | "Computação Forense" | Scoop.it
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Queira o Sr. Perito tratar sobre atividade recente com o software OSForensics

Queira o Sr. Perito tratar sobre atividade recente com o software OSForensics | "Computação Forense" | Scoop.it
Abordaremos neste artigo a utilização do módulo de Atividade Recente do OSForensics que verifica o sistema e apresenta uma lista de informações sobre atividades recentes do sistema operacional, tai...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

CyberSecurity Institute - The Tools Proven In Court Question

CyberSecurity Institute - The Tools Proven In Court Question | "Computação Forense" | Scoop.it
CyberSecurity Institute provides leading edge security services and computer forensics training performed by information security professionals.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Acquiring Windows PCs

Acquiring Windows PCs | "Computação Forense" | Scoop.it
The obvious path to acquire a Windows PC has always been “pull the plug, take the disk out, connect to an imaging device and collect evidence." Sound familiar? Well, in today’s connected world things do not work quite like that. In this article, we will have a look at measure the investigator has to take before taking the disk out, even before pulling the plug.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Computer Forensics, Malware Analysis & Digital Investigations: EnCase v7 EnScript to create LEF based on condition

Computer Forensics, Malware Analysis & Digital Investigations: EnCase v7 EnScript to create LEF based on condition | "Computação Forense" | Scoop.it
more...
No comment yet.