"Computação Forense"
33.4K views | +8 today
 
"Computação Forense"
Tecnologia e Computação Forense - Computer Forensics
Curated by João Carvalho
Your new post is loading...
Your new post is loading...
Scooped by João Carvalho
Scoop.it!

Digital Forensics – Artifacts of interactive sessions

Digital Forensics – Artifacts of interactive sessions | "Computação Forense" | Scoop.it
In this article I would like to go over some of the digital forensic artifacts that are likely to be useful on your quest to find answers to investigative questions. Specially, when conducting digital forensics and incident response on security incidents that you know the attacker performed its actions while logged in interactively into a…
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Hack into Windows OS (UtilMan.exe) :: Easy2Boot

Hack into Windows OS (UtilMan.exe) :: Easy2Boot | "Computação Forense" | Scoop.it
Log in to any unencrypted Windows OS using the UtilMan\SetHC sticky keys trick!
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

CAINE Live USB/DVD - computer forensics digital forensics

CAINE Live USB/DVD - computer forensics digital forensics | "Computação Forense" | Scoop.it
CAINE 9.0 "Quantum" is out!
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Tracking Bitcoin Transactions on the Blockchain - SANS DFIR Summit 2017 - YouTube

more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

(7) History of the success of FAW - Forensics Acquisition of Websites | LinkedIn

(7) History of the success of FAW - Forensics Acquisition of Websites | LinkedIn | "Computação Forense" | Scoop.it
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Imm2Virtual: A Windows GUI To Virtualize Directly From Disk Image File

Imm2Virtual: A Windows GUI To Virtualize Directly From Disk Image File | "Computação Forense" | Scoop.it
This is a Windows 64 bit GUI for a procedure to virtualize your EWF(E01), DD(Raw), AFF disk image file without converting it, directly with VirtualBox. It is forensically proof.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Intro to Linux Forensics

Intro to Linux Forensics | "Computação Forense" | Scoop.it
This article is a quick exercise and a small introduction to the world of Linux forensics.  Below, I perform a series of steps in order to analyze a disk that was obtained from a compromised system that was running a Red Hat operating system. I start by recognizing the file system, mounting the different partitions, creating…
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

How to image a Mac with Live Linux bootable USB

How to image a Mac with Live Linux bootable USB | "Computação Forense" | Scoop.it
One thing I've learned when it's comes to imaging Macs is it's good to have options. When encountering Macs, its seems like there i
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

aprender a fazer web scraping

aprender a fazer web scraping | "Computação Forense" | Scoop.it

Este é mais um longo artigo aqui no blog, rico em conteúdo e muito bom para quem está começando e quer aprender a fazer scraping. Utilizando Python, neste artigo veremos conceitos básicos, porém eficazes que permitirá a você realizar scraping em qualquer lugar da internet!
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

MacQuisition 2017 From BlackBag Technologies

MacQuisition 2017 From BlackBag Technologies | "Computação Forense" | Scoop.it
David Flynn reviews BlackBag's MacQuisition product and demonstrates its highlights.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Virtualization of a raw image of an Apple OS X system

Virtualization of a raw image of an Apple OS X system | "Computação Forense" | Scoop.it
Years ago Jimmy Weg wrote an awesome blog post on how to create a VMware virtual machine from a raw image file. This is my follow-up o
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Linux Distributions for forensics investigation: my own list

Linux Distributions for forensics investigation: my own list | "Computação Forense" | Scoop.it
During a digital forensics analysis, a lot of different tools can be used, and it could be useful use a dedicated linux distribution with all tools already installed and configured. CAINE offers a…
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

100+ Hacking Tools To be Pro Hacker - Free Download

100+ Hacking Tools To be Pro Hacker - Free Download | "Computação Forense" | Scoop.it
Password Cracker Software A password cracker software, which is often referred to as a password recovery tool, can be used to crack or recover the password either by removing the original password, after bypassing the data encryption or by an outright discovery of the password. In the process of password cracking, a very common methodology…
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

How to convert Windows installations to virtual machine images

How to convert Windows installations to virtual machine images | "Computação Forense" | Scoop.it
Find out how to convert a live Windows installation to a virtual machine image; the guide covers Hyper-V, VirtualBox and VMware virtual disk images.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Windows Drive Acquisition

Windows Drive Acquisition | "Computação Forense" | Scoop.it
by Oleg Skulkin & Scar de Courcier Before you can begin analysing evidence from a source, it first of all needs to be imaged. This describes a forensic process in which an exact copy of a drive…
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Email Header Analysis - Received Email is Genuine or Spoofed

Email Header Analysis - Received Email is Genuine or Spoofed | "Computação Forense" | Scoop.it
Email is a business critical asset.Altering email header to make the message appear to come from somewhere other than the actual source
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Command Line FTK Imager

FTK Imager has been around for years but it wasn't until recently that AccessData released a break out version for use on the Command Lin
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

New tool that shows encrypted data stored inside the Registry of Windows

New tool that shows encrypted data stored inside the Registry of Windows | "Computação Forense" | Scoop.it
EncryptedRegView is a new tool for Windows that scans the Registry of your current running system or the Registry of external hard drive you choose and searches for data encrypted with DPAPI (Data Protection API). When it finds encrypted data in the Registry, it tries to decrypt it and displays the decrypted data in the [...]
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Using Computer Forensics to Investigate Employee Data Theft

Using Computer Forensics to Investigate Employee Data Theft | "Computação Forense" | Scoop.it
Using Computer Forensics to Investigate Employee Data Theft
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

USB Forensics Tracker

USB Forensics Tracker | "Computação Forense" | Scoop.it
USB Forensic Tracker (USBFT) is a comprehensive forensic tool that extracts USB device connection artefacts from a range of locations within the live system. The extracted information from each location is displayed within its own table view.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Virtualization of a raw image of an Apple OS X system

Virtualization of a raw image of an Apple OS X system | "Computação Forense" | Scoop.it
Years ago Jimmy Weg wrote an awesome blog post on how to create a VMware virtual machine from a raw image file. This is my follow-up o
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

PowerForensics - Windows LNK Analysis - SandmaxPrime

PowerForensics - Windows LNK Analysis - SandmaxPrime | "Computação Forense" | Scoop.it
LNK files (Shortcuts) are binary files that contain information and point to files or folders. Using PowerForensics, we can investigate them
more...
No comment yet.