"Computação Forense"
Follow
20.1K views | +10 today
 

From around the web

"Computação Forense"
Tecnologia e Computação Forense - Computer Forensics
Curated by João Carvalho
Your new post is loading...
Your new post is loading...
Scooped by João Carvalho
Scoop.it!

Acquiring Windows PCs

Acquiring Windows PCs | "Computação Forense" | Scoop.it
The obvious path to acquire a Windows PC has always been “pull the plug, take the disk out, connect to an imaging device and collect evidence." Sound familiar? Well, in today’s connected world things do not work quite like that. In this article, we will have a look at measure the investigator has to take before taking the disk out, even before pulling the plug.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Computer Forensics, Malware Analysis & Digital Investigations: EnCase v7 EnScript to create LEF based on condition

Computer Forensics, Malware Analysis & Digital Investigations: EnCase v7 EnScript to create LEF based on condition | "Computação Forense" | Scoop.it
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Data Sanitization: Part 1

Data Sanitization: Part 1 | "Computação Forense" | Scoop.it
From a forensic perspective, the Recycle Bin can be a “gold mine” for gathering probative evidence which can be extremely valuable for investigative purposes. There are many forensic tools available that are designed to recover deleted files from the Recycle Bin. Depending upon the length of time a file has been deleted, forensic tools can recover the entire file or parts of the file (if it was partially overwritten).
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Queira o Sr. Perito explicar a análise de evidências digitais com software OSForensic - Parte 02

Queira o Sr. Perito explicar a análise de evidências digitais com software OSForensic - Parte 02 | "Computação Forense" | Scoop.it
Conforme referido anteriormente (clique aqui para a Parte 01), o objetivo do presente trabalho é familiarizar os agentes da lei e demais interessados com a utilização do programa OSForensics na inv...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

A Comparative Study of Email Forensic Tools

A Comparative Study of Email Forensic Tools | "Computação Forense" | Scoop.it
This paper examines a set of common features to compare and contrast five popular open source email forensic tools. The study finds that all email forensic tools are not similar, offer diverse types of facility. By combining analysis tools, it may be possible to gain detailed information in the area of email forensic.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Queira o Sr. Perito tratar sobre arquivos de registro do Windows - Parte 02

Queira o Sr. Perito tratar sobre arquivos de registro do Windows - Parte 02 | "Computação Forense" | Scoop.it
No post anterior (clique aqui) mostramos a localização das hives e a estrutura do Registro assim como citamos o software Windows Registry Recovery da Mitec [1]. Nesse post de hoje vamos retomar alg...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Digital Forensics Today Blog: Parsing Windows ShellBags Using the ShellBags Parser EnScript

Digital Forensics Today Blog: Parsing Windows ShellBags Using the ShellBags Parser EnScript | "Computação Forense" | Scoop.it
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

iOS Application Security Part 39 - Sensitive information in memory - InfoSec Institute

iOS Application Security Part 39 - Sensitive information in memory - InfoSec Institute | "Computação Forense" | Scoop.it
In this article, we will look at analyzing the memory contents of an iOS application. iOS applications may store sensitive information like passwords, sess
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Understanding Web Caching - InfoSec Institute

Understanding Web Caching - InfoSec Institute | "Computação Forense" | Scoop.it
Quite often we see Web pages that include images and other files loading faster than we expect. If you are wondering how that happens, Web caching could be
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

10 Apps to Create a Bootable USB for Windows

10 Apps to Create a Bootable USB for Windows | "Computação Forense" | Scoop.it
Generally when you install Windows, you either use the set up directly or use a DVD (burn the ISO) to boot and then install. But one of the simpler means of installing Windows on multiple PC is using a bootable USB drive. Since USB drive is available in all desktops and laptops unlike DVD drives,…
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets

Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets | "Computação Forense" | Scoop.it
In this article, we will have a look at how Windows-based portable electronic devices are different from traditional laptops and desktops, review new security measures and energy saving modes presented by Windows tablets, and discuss hardware, methods and tools we can use to acquire the content of their RAM and persistent storage.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Legal Issues with Cloud Forensics

Legal Issues with Cloud Forensics | "Computação Forense" | Scoop.it
Unfortunately, many companies have entered the cloud without first checking the weather. Cloud services have skyrocketed primarily because they’re cheaper and more convenient than the alternative. What happens if the cloud gets stormy, you suffer a breach, and you find yourself in the position of having to conduct digital forensics? What now?
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Digital Forensics Today Blog: EnCase and Python – Automating Windows Phone 8 Analysis

Digital Forensics Today Blog: EnCase and Python – Automating Windows Phone 8 Analysis | "Computação Forense" | Scoop.it
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Hard Disk Firmware Hacking (Part 1) | MalwareTech

Hard Disk Firmware Hacking (Part 1) | MalwareTech | "Computação Forense" | Scoop.it
Interfacing hard disk controller via JTAG and dumping firmware from flash.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Queira o Sr. Perito explicar a análise de evidências digitais com software OSForensic – Parte 03

Queira o Sr. Perito explicar a análise de evidências digitais com software OSForensic – Parte 03 | "Computação Forense" | Scoop.it
Continuando a sequência de artigos sobre a utilização do programa OSForensics, abordaremos o recurso Search Index que realiza uma busca de palavras especificadas pelo usuário utilizando para tanto ...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

80 Twitter Tools for Almost Everything

80 Twitter Tools for Almost Everything | "Computação Forense" | Scoop.it
Twitter is chaos, but in the midst of this beautiful mess is a ton of data that if you can understand,
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Queira o Sr. Perito tratar sobre arquivos de registro do Windows - Parte 01

Queira o Sr. Perito tratar sobre arquivos de registro do Windows - Parte 01 | "Computação Forense" | Scoop.it
O Registro é um banco de dados que contém todas as configurações de hardware, software, drivers de forma hierárquica, necessárias ao funcionamento do sistema operacional e dos aplicativos instalado...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

How to log in to administrator account on any Windows PC Image Tutorial

How to log in to administrator account on any Windows PC Image Tutorial | "Computação Forense" | Scoop.it
Are you locked out of your own Windows PC because you cant remember the Administrator password, fear not Imgur user PeregrineX has posted a step-by-step tutorial showing how to log in to an administrative account on any Windows computer.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Sanderson Forensics - Investigating Skype cloud based media_cache/image sharing with the Forensic Browser for SQLite

Sanderson Forensics - Investigating Skype cloud based media_cache/image sharing with the Forensic Browser for SQLite | "Computação Forense" | Scoop.it
Skype recently introduced cloud based operation and started moving away from peer-to-peer messaging with a view, to paraphrase Skype, of improving the service that we receive.

Without going into the pros and cons of this, from a forensic point of view it is irrelevant anyway, the move has had the effect of introducing a new set of artefacts and in particular a new location for stored/cached image files (pictures).

More information here: https://support.skype.com/en/faq/FA12381/what-is-the-cloud
This article deals with the SQLite tables that reference to these pictures, the locations of the pictures themselves and how to join the relevant tables, decode the data held in certain blob fields and create a report showing who sent what to whom including the pictorial evidence where possible.

At the end of the article I will have shown how the different tables fit together and will provide a Browser extension that will create the necessary tables and import the
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Email Forgery Analysis in Computer Forensics

Email Forgery Analysis in Computer Forensics | "Computação Forense" | Scoop.it
Email conversation index and other metadata can be used by a computer forensics expert during email forgery analysis to shed light on fraudulent emails.
more...
No comment yet.