April 20, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home How To (page 10)

How To

How To

Forensic Analysis of the Recovery of Wickr’s Ephemeral Data on Android Platforms

This paper documents anti-forensics techniques of a secure messaging application named “Wickr” on the Android platforms. Advertised as an application that focuses on security, Wickr provides many anti-forensics features, such as ephemeral messaging and end-to-end encryption. This paper analyses Wickr in detail using experimental research methods. The results revealed how Wickr’s file deletion consisted of distinct stages beginning with a …

Read More
How To

Exploring Cloud Incidents

In this article the authors give an overview of the current status of the forensic analysis techniques and processes of cloud incidents.

Read More
How To

Facebook Forensics for Windows 10

In this article forensic artefacts of Windows 10 Facebook App are extracted from SQLite databases and their forensic importance is discussed.

Read More
How To

Memory Forensics of Linux and Mac Systems

Here is Andrew Case’ presentation on memory forensics of Linux and Mac systems from Enfuse 2016.

Read More
How To

Practical OS X Malware Detection and Analysis

Here is Patrick Wardle’s presentation from RSA Conference USA 2016 on practical OS X malware detection and analysis.

Read More
How To

The DFIR Hierarchy of Needs & Critical Security Controls

We suggest starting 2017 from improving your organisation’s digital forensics and incident response (DFIR) capabilities with Matt Swann‘s Incident Response Hierarchy of Needs. Reading this article by Russ McRee you will learn about all phases of the hierarchy: inventory, telemetry, detection, triage, threats, behaviors, hunt, track, act.

Read More
How To

Volatility on Ubuntu on Windows 10

Joshua Trombley has published a useful tutorial in his OpenSec Labs blog on how to install Volatility on Ubuntu on Windows 10.

Read More
How To

Volume Shadow Copies Forensics

Matt Bromiley has published a very useful post on forensic analysis of Volume Shadow Copies.

Read More
How To

Detect Known Malware from Memory Images with Impfuzzy for Volatility

Impfuzzy for Volatility is a tool created by JPCERT/CC, which can be used for extracting known malware from memory images.

Read More
How To

Identifying Malware from a Memory Capture

If you are interested in memory forensics, and especially in identifying malware in memory dumps, this post by Adam Bridge may be very interesting for you.

Read More
Page 10 of 11First...7891011

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account