"Computação Forense"
Follow
19.5K views | +4 today
 

From around the web

"Computação Forense"
Tecnologia e Computação Forense - Computer Forensics
Curated by João Carvalho
Your new post is loading...
Your new post is loading...
Scooped by João Carvalho
Scoop.it!

Queira o Sr. Perito explicar a análise de evidências digitais com software OSForensic - Parte 02

Queira o Sr. Perito explicar a análise de evidências digitais com software OSForensic - Parte 02 | "Computação Forense" | Scoop.it
Conforme referido anteriormente (clique aqui para a Parte 01), o objetivo do presente trabalho é familiarizar os agentes da lei e demais interessados com a utilização do programa OSForensics na inv...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

A Comparative Study of Email Forensic Tools

A Comparative Study of Email Forensic Tools | "Computação Forense" | Scoop.it
This paper examines a set of common features to compare and contrast five popular open source email forensic tools. The study finds that all email forensic tools are not similar, offer diverse types of facility. By combining analysis tools, it may be possible to gain detailed information in the area of email forensic.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Queira o Sr. Perito tratar sobre arquivos de registro do Windows - Parte 02

Queira o Sr. Perito tratar sobre arquivos de registro do Windows - Parte 02 | "Computação Forense" | Scoop.it
No post anterior (clique aqui) mostramos a localização das hives e a estrutura do Registro assim como citamos o software Windows Registry Recovery da Mitec [1]. Nesse post de hoje vamos retomar alg...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Digital Forensics Today Blog: Parsing Windows ShellBags Using the ShellBags Parser EnScript

Digital Forensics Today Blog: Parsing Windows ShellBags Using the ShellBags Parser EnScript | "Computação Forense" | Scoop.it
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

iOS Application Security Part 39 - Sensitive information in memory - InfoSec Institute

iOS Application Security Part 39 - Sensitive information in memory - InfoSec Institute | "Computação Forense" | Scoop.it
In this article, we will look at analyzing the memory contents of an iOS application. iOS applications may store sensitive information like passwords, sess
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Understanding Web Caching - InfoSec Institute

Understanding Web Caching - InfoSec Institute | "Computação Forense" | Scoop.it
Quite often we see Web pages that include images and other files loading faster than we expect. If you are wondering how that happens, Web caching could be
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

A New Type Of Malicious Document: XML

A New Type Of Malicious Document: XML | "Computação Forense" | Scoop.it
Since last week we see XML documents being spammed: they are actually Microsoft Word documents with VBA Macros. I wrote an ISC Diary entry (I'm a SANS ISC Handler now) detailing the internals of th...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

EnCase 7.1 and FTK 5.5 Tool Evaluation Part 2 - Computer & Digital Forensics Blog

EnCase 7.1 and FTK 5.5 Tool Evaluation Part 2 - Computer & Digital Forensics Blog | "Computação Forense" | Scoop.it
This week for EnCase we go over new and updated features such as: capabilities of EnCase Portable, the Report Template Wizard, Encrypted drives, and how EnCase has expanded its reach to Apple’s OS X.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

XRY Tutorials Introduction - Computer & Digital Forensics Blog

XRY Tutorials Introduction - Computer & Digital Forensics Blog | "Computação Forense" | Scoop.it
By working closely with XRY Logical as well as XRY Physical, we aim to create complete video tutorials explaining how to use both versions with three different smartphone operating systems.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

How to series on programming libtsk with python Part 1, 2 and 3

http://hackingexposedcomputerforensicsblog.blogspot.com/2015/02/automating-dfir-how-to-series-on_21.html
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Queira o Sr. Perito explicar a análise de evidências digitais com software OSForensic – Parte 03

Queira o Sr. Perito explicar a análise de evidências digitais com software OSForensic – Parte 03 | "Computação Forense" | Scoop.it
Continuando a sequência de artigos sobre a utilização do programa OSForensics, abordaremos o recurso Search Index que realiza uma busca de palavras especificadas pelo usuário utilizando para tanto ...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

80 Twitter Tools for Almost Everything

80 Twitter Tools for Almost Everything | "Computação Forense" | Scoop.it
Twitter is chaos, but in the midst of this beautiful mess is a ton of data that if you can understand,
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Queira o Sr. Perito tratar sobre arquivos de registro do Windows - Parte 01

Queira o Sr. Perito tratar sobre arquivos de registro do Windows - Parte 01 | "Computação Forense" | Scoop.it
O Registro é um banco de dados que contém todas as configurações de hardware, software, drivers de forma hierárquica, necessárias ao funcionamento do sistema operacional e dos aplicativos instalado...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

How to log in to administrator account on any Windows PC Image Tutorial

How to log in to administrator account on any Windows PC Image Tutorial | "Computação Forense" | Scoop.it
Are you locked out of your own Windows PC because you cant remember the Administrator password, fear not Imgur user PeregrineX has posted a step-by-step tutorial showing how to log in to an administrative account on any Windows computer.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Sanderson Forensics - Investigating Skype cloud based media_cache/image sharing with the Forensic Browser for SQLite

Sanderson Forensics - Investigating Skype cloud based media_cache/image sharing with the Forensic Browser for SQLite | "Computação Forense" | Scoop.it
Skype recently introduced cloud based operation and started moving away from peer-to-peer messaging with a view, to paraphrase Skype, of improving the service that we receive.

Without going into the pros and cons of this, from a forensic point of view it is irrelevant anyway, the move has had the effect of introducing a new set of artefacts and in particular a new location for stored/cached image files (pictures).

More information here: https://support.skype.com/en/faq/FA12381/what-is-the-cloud
This article deals with the SQLite tables that reference to these pictures, the locations of the pictures themselves and how to join the relevant tables, decode the data held in certain blob fields and create a report showing who sent what to whom including the pictorial evidence where possible.

At the end of the article I will have shown how the different tables fit together and will provide a Browser extension that will create the necessary tables and import the
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Email Forgery Analysis in Computer Forensics

Email Forgery Analysis in Computer Forensics | "Computação Forense" | Scoop.it
Email conversation index and other metadata can be used by a computer forensics expert during email forgery analysis to shed light on fraudulent emails.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Windows 10 Forensics - Project Introduction

Windows 10 Forensics - Project Introduction | "Computação Forense" | Scoop.it
Our goal for this Windows 10 Forensics project is to analyze artifacts in Windows 10, and compare artifact locations between Windows 8.1 and Windows 10. After the comparison is finished, specific attention will be taken to OneDrive data, Windows Phone data, and the newer Office applications on Windows 10.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Hacking Exposed Computer Forensics Blog: Automating DFIR - How to series on programming libtsk with python Part 3

more...
No comment yet.