"Computação Forense"
32.6K views | +10 today
 
"Computação Forense"
Tecnologia e Computação Forense - Computer Forensics
Curated by João Carvalho
Your new post is loading...
Your new post is loading...
Scooped by João Carvalho
Scoop.it!

Intro to Linux Forensics

Intro to Linux Forensics | "Computação Forense" | Scoop.it
This article is a quick exercise and a small introduction to the world of Linux forensics.  Below, I perform a series of steps in order to analyze a disk that was obtained from a compromised system that was running a Red Hat operating system. I start by recognizing the file system, mounting the different partitions, creating…
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

How to image a Mac with Live Linux bootable USB

How to image a Mac with Live Linux bootable USB | "Computação Forense" | Scoop.it
One thing I've learned when it's comes to imaging Macs is it's good to have options. When encountering Macs, its seems like there i
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

aprender a fazer web scraping

aprender a fazer web scraping | "Computação Forense" | Scoop.it

Este é mais um longo artigo aqui no blog, rico em conteúdo e muito bom para quem está começando e quer aprender a fazer scraping. Utilizando Python, neste artigo veremos conceitos básicos, porém eficazes que permitirá a você realizar scraping em qualquer lugar da internet!
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

MacQuisition 2017 From BlackBag Technologies

MacQuisition 2017 From BlackBag Technologies | "Computação Forense" | Scoop.it
David Flynn reviews BlackBag's MacQuisition product and demonstrates its highlights.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Virtualization of a raw image of an Apple OS X system

Virtualization of a raw image of an Apple OS X system | "Computação Forense" | Scoop.it
Years ago Jimmy Weg wrote an awesome blog post on how to create a VMware virtual machine from a raw image file. This is my follow-up o
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Linux Distributions for forensics investigation: my own list

Linux Distributions for forensics investigation: my own list | "Computação Forense" | Scoop.it
During a digital forensics analysis, a lot of different tools can be used, and it could be useful use a dedicated linux distribution with all tools already installed and configured. CAINE offers a…
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Digital Forensics, Part 5: Analyzing the Windows Registry for Evidence | hackers-arise

Although nearly all Microsoft Windows users are aware that their system has a registry, few understand what it does, and even fewer understand how to manipulat
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Week 28 – 2017

Week 28 – 2017 | "Computação Forense" | Scoop.it
FORENSIC ANALYSIS Arsenal Consulting have shared details "about a forged digital forensics report we received during the Odatv trial in Turkey. The report is particularly interesting to us because the report was on our letterhead, with my signature, but we had nothing to do with it or the “case” it related to." Forged Digital Forensics…
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Electronic Evidence where to find in Files

Electronic Evidence where to find in Files | "Computação Forense" | Scoop.it
Electronic Evidence where to find in files  Windows Searches — For years, one challenge in digital investigative analysis has bee
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Marco Pontello's Home - Software - TrID

using the switch -ae will instruct TrID to add the guessed extensions to the filenames. This come handy, for example, when working with files recovered by data rescue softwares.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

New tool that shows encrypted data stored inside the Registry of Windows

New tool that shows encrypted data stored inside the Registry of Windows | "Computação Forense" | Scoop.it
EncryptedRegView is a new tool for Windows that scans the Registry of your current running system or the Registry of external hard drive you choose and searches for data encrypted with DPAPI (Data Protection API). When it finds encrypted data in the Registry, it tries to decrypt it and displays the decrypted data in the [...]
more...
prgnewshawaii's curator insight, September 17, 1:00 AM

A potentially useful tool for website developers. 

Russell Roberts

Hawaii Intelligence Digest.

Scooped by João Carvalho
Scoop.it!

Using Computer Forensics to Investigate Employee Data Theft

Using Computer Forensics to Investigate Employee Data Theft | "Computação Forense" | Scoop.it
Using Computer Forensics to Investigate Employee Data Theft
more...
prgnewshawaii's curator insight, September 14, 5:43 PM

A look at how "computer forensics" investigates employee data theft. You may find this a useful security management tool.

Russell Roberts

Hawaii Intelligence Digest

Scooped by João Carvalho
Scoop.it!

USB Forensics Tracker

USB Forensics Tracker | "Computação Forense" | Scoop.it
USB Forensic Tracker (USBFT) is a comprehensive forensic tool that extracts USB device connection artefacts from a range of locations within the live system. The extracted information from each location is displayed within its own table view.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Virtualization of a raw image of an Apple OS X system

Virtualization of a raw image of an Apple OS X system | "Computação Forense" | Scoop.it
Years ago Jimmy Weg wrote an awesome blog post on how to create a VMware virtual machine from a raw image file. This is my follow-up o
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

PowerForensics - Windows LNK Analysis - SandmaxPrime

PowerForensics - Windows LNK Analysis - SandmaxPrime | "Computação Forense" | Scoop.it
LNK files (Shortcuts) are binary files that contain information and point to files or folders. Using PowerForensics, we can investigate them
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Email Header Analysis - Received Email is Genuine or Spoofed

Email Header Analysis - Received Email is Genuine or Spoofed | "Computação Forense" | Scoop.it
Email is a business critical asset.Altering email header to make the message appear to come…
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Reset Windows Passwords with Kali Linux - Cybrary

Reset Windows Passwords with Kali Linux - Cybrary | "Computação Forense" | Scoop.it
Reset Your Windows Password Using Kali Linux Hello Cybrary members. Here I am again to talk about Passwords for Windows 7 or any version of Windows. Sometimes, we forget our password, or we want to reset the Windows password for a friend, officemate or anyone’s laptop in
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

FORENSICS AS CAREER

FORENSICS AS CAREER | "Computação Forense" | Scoop.it
Without a doubt, technology is advancing at an increasingly rapid pace. Its all about today's Digital Security and increasing Cyber-Crime information. If you want to play a role in fighting these cyber crimes, then you'll want to know how to become a digital forensic examiner. Sharp knowledge and Computer soundness may lead you ahead and…
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Beginner's Guide to the Forensics Lifestyle

Getting started in the Digital Forensics or Incident Response world can be over whelming. Here's a place to start when it comes to learning forensics.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Building a Laboratory for Digital Forensics

Building a Laboratory for Digital Forensics | "Computação Forense" | Scoop.it
A logger was once asked, “What would you do if you had five minutes to chop down a tree?” In response, the logger said, “I would spend the first two and a half minutes sharpening my axe.” The central point of this adage is that even with limited time and resources, tasks become more effectual…
more...
No comment yet.