Forensics
97 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Juan Carlos Ruiloba from "Computação Forense"
Scoop.it!

DFIR Infographics - StumbleUpon

Awesome Infographics from DFIR 

Via João Carvalho
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from "Computação Forense"
Scoop.it!

Recovering BitLocker Keys on Windows 8.1 and 10

Recovering BitLocker Keys on Windows 8.1 and 10 | Forensics | Scoop.it
A brief touch on how the changes to BitLocker after Windows 7 affect master key recovery and where to look when recovering keys. This article is not intended to be an in-depth look at the inner workings of BitLocker, but is instead focussed on retrieval of the Full Volume Encryption Key (FVEK

Via João Carvalho
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

Using OS X FSEvents to Discover Deleted Malicious Artifacts

Using OS X FSEvents to Discover Deleted Malicious Artifacts | Forensics | Scoop.it
File System Events (FSEvents) in OS X 10.7+ introduced the capability to monitor changes to a directory. FSevents are logged by the file system events daemon (fseventsd) process; the daemon writes these events to a log file located in the root of each volume in a folder named “.fseventsd”, which acts as a staging or…

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from "Computação Forense"
Scoop.it!

Free Computer Forensics Weapons

Free Computer Forensics Weapons | Forensics | Scoop.it
Free Computer Forensic Tools & ToolkitsList of over 130 free tools is provided as a free resource for all. It’s updated several times a year. I'm provide no support or warranties for the listed software and it is the user’s responsibility to verify licensing agreements. Inclusion on the list does not equate to a recommendation. Using forensic software does not, on its own, make the user a forensic analyst. Evidence is more likely to be admissible if it is produced by a professional computer fore

Via João Carvalho
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

How Exploit Kit Operators are Misusing Diffie-Hellman Key Exchange

How Exploit Kit Operators are Misusing Diffie-Hellman Key Exchange | Forensics | Scoop.it
Exploit kits are now misusing the Diffie-Hellman key exchange protocol to try and hide their network traffic from researchers.

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

Osxcollector :A forensic evidence collection & analysis toolkit for OSX

Osxcollector : A forensic evidence collection & analysis toolkit for OSX

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

All Your Biases Belong To Us Breaking RC4 in WPA-TKIP and TLS.pdf


Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from "Computação Forense"
Scoop.it!

Malware Researcher’s Handbook: Introduction - InfoSec Institute

Malware Researcher’s Handbook: Introduction - InfoSec Institute | Forensics | Scoop.it
All the Stuff  You Know Before Starting Research Malware research contains a lot of information like reverse engineering, exploit-kit, exploit analysis, bo

Via João Carvalho
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from "Computação Forense"
Scoop.it!

Segu-Info: Análisis forense en sistemas Mac OS X

Segu-Info: Análisis forense en sistemas Mac OS X | Forensics | Scoop.it

Via João Carvalho
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from "Computação Forense"
Scoop.it!

Toma de evidencias de servicios de Internet

Toma de evidencias de servicios de Internet | Forensics | Scoop.it
Instituto Nacional de Ciberseguridad INCIBE

Via João Carvalho
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

Top 20 ** Free Digital Forensic Investigation Tools for SysAdmins*

Top 20 ** Free Digital Forensic Investigation Tools for SysAdmins* | Forensics | Scoop.it
Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn a new skill, these suites and utilities will help you conduct memory forensic analysis, hard drive forensic analysis, forensic image exploration, forensic imaging and mobile forensics.

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from "Computação Forense"
Scoop.it!

Browser Anti Forensics

Browser Anti Forensics | Forensics | Scoop.it
This write-up is just to demonstrate that how one’s browser history can go off track misleading the examiner. An investigator can identify it by noticing the odd in history, sample given in Figure ...

Via João Carvalho
more...
No comment yet.
Scooped by Juan Carlos Ruiloba
Scoop.it!

Did You Know? ... or ... What Is Normal? | Forensicaliente - because digital forensics is 'hot'

Did You Know? ... or ... What Is Normal? | Forensicaliente - because digital forensics is 'hot' | Forensics | Scoop.it
Juan Carlos Ruiloba's insight:

Forensicaliente: because digital forensics is 'hot' | #forensics #security

more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Forensics
Scoop.it!

Recovering BitLocker Keys on Windows 8.1 and 10

Recovering BitLocker Keys on Windows 8.1 and 10 | Forensics | Scoop.it
A brief touch on how the changes to BitLocker after Windows 7 affect master key recovery and where to look when recovering keys. This article is not intended to be an in-depth look at the inner workings of BitLocker, but is instead focussed on retrieval of the Full Volume Encryption Key (FVEK

Via João Carvalho, Juan Carlos Ruiloba
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

Live Memory Forensics on Android with Volatility

Live Memory Forensics on Android with Volatility | Forensics | Scoop.it
Live Memory Forensics on Android with Volatility Diploma Thesis submitted: January 2013 by: Holger Macht student ID number: 21300176 Department of Computer Science Friedrich-Alexander University Erlangen-Nuremberg

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

Forensic Analysis on iOS Devices .pdf / SANS Institute.


Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

I am HDRoot! ( Bootkit )* Securelist

I am HDRoot! ( Bootkit )* Securelist | Forensics | Scoop.it
Famous Chinese-speaking cybercriminal APT actor Winnti has been observed targeting pharmaceutical businesses. New threat, which Kaspersky Lab has called

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

Win32/Gamarue:The Andromeda/Gamarue botnet is on the rise again.

Win32/Gamarue:The Andromeda/Gamarue botnet is on the rise again. | Forensics | Scoop.it

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

Hunting and Decrypting Communications of Gh0st RAT in Memory / Malware Forensics Research Blog.


Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from "Computação Forense"
Scoop.it!

Digital Forensics Stream: Adobe Reader's Not-So-cRecentFiles

Digital Forensics Stream: Adobe Reader's Not-So-cRecentFiles | Forensics | Scoop.it

Via João Carvalho
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from "Computação Forense"
Scoop.it!

The Future of Mobile Forensics

The Future of Mobile Forensics | Forensics | Scoop.it
The golden age of mobile forensics is over. There is no longer an easy way to get through the passcode in new iOS devices. Chip-off acquisition is dead due to full-disk encryption, while physical acquisition is dead since 64-bit devices and versions of iOS 8 that cannot be jailbroken. Blackberries were highly resistant to chip-off acquisition from the beginning, and Android is getting there quickly. 

Via João Carvalho
more...
No comment yet.
Scooped by Juan Carlos Ruiloba
Scoop.it!

1p – Computer Forensics and EDiscovery, Are They the Same Thing? – Exploding Ads

1p – Computer Forensics and EDiscovery, Are They the Same Thing? – Exploding Ads | Forensics | Scoop.it
https://www.elvidence.com.au/computer-forensics-vs-ediscovery/ https://news.ycombinator.com/item?id=8714766
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

Bypassing Windows User Account Control (UAC) and ways of mitigation

Bypassing Windows User Account Control (UAC) and ways of mitigation | Forensics | Scoop.it

Securing machines from abuse and compromise in a corporate environment has always been an ongoing process. Providing admin rights to users has always been abused as users have ended up installing unapproved software, change configurations, etc.


Via Danen Raas, Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Scooped by Juan Carlos Ruiloba
Scoop.it!

iRET – iOS Reverse Engineering Toolkit | SecTechno

iRET – iOS Reverse Engineering Toolkit | SecTechno | Forensics | Scoop.it
iRET is an open source tool that you can use to analyze and evaluate iOS applications. The toolkit includes the following features: Binary Analysis where
Juan Carlos Ruiloba's insight:

SecTechno: iRET – iOS Reverse Engineering Toolkit 

more...
No comment yet.