December 12, 2019

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Articles (page 4)

Articles

Articles

The Hitchhiker’s Guide to USB Forensics

If you are a digital forensic examiner, you must know, that clients very often ask to find out, which sensitive files were copied to USB thumb drives by disgruntled employees before they left the company. There are a lot of articles and guides on USB forensics on the Web, but most of them dealing with the flash drives and not the computer …

Read More
Articles

Basic Dynamic Analysis of a Malicious VBScript

For a long time one of the most common sources of ransomware and other malware have been spear phishing emails. Such emails are targeted towards a specific person or organization, and are used by attackers to steal data or install malicious software. If you are doing digital forensics, you must know that such attacks are quite common even in 2017. …

Read More
Articles

How to Find Passwords for Encrypted iTunes Backups

Nowadays more and more people use encryption to protect the backups of their iPhone, iPad, or iPod touch in iTunes. That’s why this is one of typical problems of modern digital forensics. As you know, iTunes backups can be found in the following locations: Mac OS X: /Users/(username)/Library/Application Support/MobileSync/Backup/ Windows 7, 8 or 10: \Users\(username)\AppData\Roaming\Apple Computer\MobileSync\Backup\ Of course, if the backup you found …

Read More
Articles

Windows 10 Forensics

In this article, we are going to take a close look at the fundamentally new sources of digital evidences that are typical for the new version of the Windows 10 operating system, such as Notification center, new browser Microsoft Edge and digital personal assistant Cortana. Also, we will study some of the sources that were in the previous versions of …

Read More
Articles

Forensic Analysis of SQLite Databases

SQLite is a popular database format that is used in programs of both mobiles devices and personal computers. Most of the popular browsers such as Google Chrome, Mozilla Firefox and Yandex Browser, and a great number of messengers, for example WhatsApp, Viber, WeChat etc. keep their data in this format. This fact makes such databases a valuable source of digital …

Read More
Articles

Principles of Android Malware Detection

In this article, we are dealing with the main principles of the detection and analysis of the Android operating system malware, considering that this operating system is widely used in the smartphones and tablets. The main tools that are used by the experts for Android applications analysis are described. Introduction; General characterization of the Android malware; Android malware detection; Anti-forensic …

Read More
Articles

Android Acquisition and Analysis with Belkasoft Evidence Center

As you may already know, one of the most recent updates of Belkasoft Evidence Center is BelkaImager or Belkasoft Acquisition Tool.

Read More
Articles

Modern Windows Hibernation File Analysis

Joe Sylve has announced his new article together with Vico Marziale and Golden Richard III entitled “Modern Windows Hibernation File Analysis”. 

Read More
Articles

Parsing Most Recently Used (MRU) plist files with MacMRU-Parser

Our digital forensics lab receives Mac computers for examination more and more often. There are some powerfull forensic suites for OS X analysis, but also there are a lot of very useful open source tools and scripts. One of such scripts is MacMRU-Parser.

Read More
Articles

Deleted Shadow Copies

Have you ever dug for deleted shadow copies during your Windows forensic examination?

Read More
Page 4 of 512345

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Magnet User Summit CTF: Intrusion

July 1, 2018

Timeline

  • October 27, 2019

    50 Shades of Ransomware

  • October 14, 2019

    Tools up: the best software and hardware tools for computer forensics

  • October 9, 2019

    Following the RTM

  • July 21, 2019

    Using MITRE ATT&CK for Forensics: Image File Execution Options Injection (T1183)

  • July 13, 2019

    Using MITRE ATT&CK for Forensics: WMI Event Subscription (T1084)

CyberForensicator.com © Copyright 2016-2019, All Rights Reserved

Login

Welcome!Log into your account