Forensics
1.6K views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Juan Carlos Ruiloba from "Computação Forense"
Scoop.it!

Creating a digital forensic laboratory: Tips and Tricks | Digital Forensics | Computer Forensics | Blog

Creating a digital forensic laboratory: Tips and Tricks | Digital Forensics | Computer Forensics | Blog | Forensics | Scoop.it

Via João Carvalho
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from "Computação Forense"
Scoop.it!

Ask The Expert: APFS Encryption

Ask The Expert: APFS Encryption | Forensics | Scoop.it
Here are our top five frequently asked questions about APFS encryption answered by Dr. Joe Sylve, one of our BlackBag forensic experts.

Via João Carvalho
more...
No comment yet.
Scooped by Juan Carlos Ruiloba
Scoop.it!

Installing SIFT Workstation under Windows Subsystem for Linux

Installing SIFT Workstation under Windows Subsystem for Linux | Forensics | Scoop.it
SIFT In a recent post I alluded to the fact that I had successfully installed SIFT Workstation under Windows Subsystem for Linux (WSL).
more...
No comment yet.
Scooped by Juan Carlos Ruiloba
Scoop.it!

Windows Registry Analysis-Tracking Every activity

Windows Registry Analysis-Tracking Every activity | Forensics | Scoop.it
Windows Registry Analysis-Tracking Every activity, Windows registry, SOC, IDS, IPS, Hacking news, Cybersecurity updates, Forensic Analysis
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

FORENSICS FRAMEWORKS/MODELS

FORENSICS FRAMEWORKS/MODELS | Forensics | Scoop.it
First thanks to all respected readers. Trying to amalgamate almost models framework of forensics by this article. Welcoming your views and comments. Well, Forensics “The application of scientific knowledge to legal problems“ So, What is Forensics (4n6) : Answer The aim of this article is to establish a clear guideline of what steps should be…

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

Explained: #digital #forensics

Explained: #digital #forensics | Forensics | Scoop.it
Digital forensics is different from cyber-security as it deals with the problem when it’s too late for precautions. It's the science of figuring out what happened just before and after a breach.

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

RAM Forensic Analysis

RAM Forensic Analysis | Forensics | Scoop.it
by Eliézer Pereira 1 Goal The purpose of this article is show how to perform a RAM memory forensic analysis, presenting some examples of information that can be retrieved and analyzed to help identify indications of security incidents as well as fraud and other illegal practices through information systems. 2 Good Practices and Techniques for Computer…

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Scooped by Juan Carlos Ruiloba
Scoop.it!

Let the benchmarks hit the floor: Autopsy vs Encase vs FTK vs X-Ways (in depth testing)

Let the benchmarks hit the floor: Autopsy vs Encase vs FTK vs X-Ways (in depth testing) | Forensics | Scoop.it
Update 09-12-2016 I did some additional testing using bigger data and raw vs E01 for a few things. These results are on the spreadshee
more...
No comment yet.
Scooped by Juan Carlos Ruiloba
Scoop.it!

12 Best Operating Systems For Ethical Hacking And Penetration Testing | 2017 Edition

12 Best Operating Systems For Ethical Hacking And Penetration Testing | 2017 Edition | Forensics | Scoop.it
Here is the list of 12 best and free hacking operating system along with their download links. All of these are based on Linux Kernel and free to use. 
more...
No comment yet.
Scooped by Juan Carlos Ruiloba
Scoop.it!

Recovering BitLocker Keys on Windows 8.1 and 10

Recovering BitLocker Keys on Windows 8.1 and 10 | Forensics | Scoop.it
A brief touch on how the changes to BitLocker after Windows 7 affect master key recovery and where to look when recovering keys. This article is not intended to be an in-depth look at the inner workings of BitLocker, but is instead focussed on retrieval of the Full Volume Encryption Key (FVEK
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from "Computação Forense"
Scoop.it!

Forensic disk acquisition over the network –

Forensic disk acquisition over the network – | Forensics | Scoop.it
In some occasions you need to acquire an image of a computer using a boot disk and network connectivity. Usually, this approach is made with a Linux boot disk on the machine under analysis, and another computer used as imaging collection platform, connected via a network hub or through a crossover cable. The reasons this…

Via João Carvalho
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from "Computação Forense"
Scoop.it!

How to use “The Sleuth Kit” and “Autopsy” | Part 2 by Animesh Shaw - tools, google, tool

How to use “The Sleuth Kit” and “Autopsy” | Part 2 by Animesh Shaw - tools, google, tool | Forensics | Scoop.it
tools, google, tool - Quick OverviewIn the section we will learn about the following topics:Creating a Sample Case for 4n6 Study.Learning How to Use FTK Imager.

Via João Carvalho
more...
No comment yet.
Scooped by Juan Carlos Ruiloba
Scoop.it!

Installing SIFT Workstation under Windows Subsystem for Linux

Installing SIFT Workstation under Windows Subsystem for Linux | Forensics | Scoop.it
SIFT In a recent post I alluded to the fact that I had successfully installed SIFT Workstation under Windows Subsystem for Linux (WSL).
more...
No comment yet.
Scooped by Juan Carlos Ruiloba
Scoop.it!

How to mount Mac APFS images in Windows

How to mount Mac APFS images in Windows | Forensics | Scoop.it
APFS is the new file system for Mac OS, and so far, many forensic suites are playing catch up as far as support goes. As such, workaround
more...
No comment yet.
Scooped by Juan Carlos Ruiloba
Scoop.it!

Digital Forensics – Artifacts of interactive sessions

Digital Forensics – Artifacts of interactive sessions | Forensics | Scoop.it
In this article I would like to go over some of the digital forensic artifacts that are likely to be useful on your quest to find answers to investigative questions. Specially, when conducting digital forensics and incident response on security incidents that you know the attacker performed its actions while logged in interactively into a…
more...
Scooped by Juan Carlos Ruiloba
Scoop.it!

Intro to Linux Forensics

Intro to Linux Forensics | Forensics | Scoop.it
This article is a quick exercise and a small introduction to the world of Linux forensics.  Below, I perform a series of steps in order to analyze a disk that was obtained from a compromised system that was running a Red Hat operating system. I start by recognizing the file system, mounting the different partitions, creating…
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

Digital Forensics, Part 5: Analyzing the Windows Registry for Evidence | hackers-arise

Although nearly all Microsoft Windows users are aware that their system has a registry, few understand what it does, and even fewer understand how to manipulat

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

RAM Forensic Analysis

RAM Forensic Analysis | Forensics | Scoop.it
by Eliézer Pereira 1 Goal The purpose of this article is show how to perform a RAM memory forensic analysis, presenting some examples of information that can be retrieved and analyzed to help identify indications of security incidents as well as fraud and other illegal practices through information systems. 2 Good Practices and Techniques for Computer…

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

PPEE: A Professional PE File Explorer! - PenTestIT

PPEE: A Professional PE File Explorer! - PenTestIT | Forensics | Scoop.it
PPEE is a free PE file Explorer for reverse engineers, malware researchers and those who want to statically inspect PE files.

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Scooped by Juan Carlos Ruiloba
Scoop.it!

Some useful forensics tools for your forensics investigation

Some useful forensics tools for your forensics investigation | Forensics | Scoop.it
tools, forensics and incident response, forensics - So you're called onsite to a forensics engagement. What do you bring?
Your forensics media:
Well prepped m
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Cyber Security & Digital Forensics
Scoop.it!

Windows, Now with built in anti forensics!

Windows, Now with built in anti forensics! | Forensics | Scoop.it
A blog about computer and digital forensics and techniques, hacking exposed dfir incident response file systems journaling

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Juan Carlos Ruiloba from Forensics
Scoop.it!

Recovering BitLocker Keys on Windows 8.1 and 10

Recovering BitLocker Keys on Windows 8.1 and 10 | Forensics | Scoop.it
A brief touch on how the changes to BitLocker after Windows 7 affect master key recovery and where to look when recovering keys. This article is not intended to be an in-depth look at the inner workings of BitLocker, but is instead focussed on retrieval of the Full Volume Encryption Key (FVEK
more...
No comment yet.