April 20, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home How To (page 3)

How To

How To

Forensic Review with Notepad++

In this post Hoyt Harness writes about how to add Plugin Manager to Notepad++ and make it very extensible and useful for digital forensics.

Read More
How To

Extracting Data from a Samsung Device Using Advanced MTP

In this post Christopher Vance is writing about using advanced MTP to extract data from a Samsung mobile device. This method will allow you to create a quick image of the /media/ directory located in the /data/ or /userdata/ partition on a device for Samsung devices that have not received either the SMR-OCT-2017 or SMR-NOV-2017 security update (the exact update in …

Read More
How To

VMWare Incident Response: A Process

In the post the authors describe VMWare incident response process based on the following steps: 1. Contact with consultee 2. Acquisition of Evidence 3. Disk Forensics 4. Memory Forensics 5. Reverse Engineering of Collected Evidence 6. Timelining 7. Recommendations

Read More
How To

Windows RDP-Related Event Logs: Identification, Tracking, and Investigation

Jonathon Poling has published a very useful post about forensicating RDP-related event logs. You will learn a lot about the following event IDs: 1149, 4624, 4625, 21, 22, 24, 25, 39, 40, 4778, 4779, 23, 4634, 4647 and 9009. You can find the post here.

Read More
How To

Windows Console Command History: Valuable Evidence for Live Response Investigation

Tom Sela has posted an updated version of his paper originally published in the March 2017 edition of eForensics Magazine. This article discusses two artifacts identified by the author as being significantly helpful when solving incidents: command prompt history and console output.

Read More
How To

iOS Imaging on the Cheap! – Part Deux! (for iOS 10 & 11)

Sarah Edwards has published the second part of her “iOS Imaging on the Cheap” series. This time the post includes the jailbreaks for iOS 10.3.3 using Meridian and iOS 11 using LiberiOS. You can read the tutorial here.

Read More
How To

Mounting an APFS image in Linux

Here is another post by Another Forensics Blog (Mari Degrazia) about mounting Apple File System (APFS). This time you will learn about how to mount an APFS image in Linux.

Read More
How To

How to Mount Mac APFS Images in Windows

In the first post of the new year Mari Degrazia is writing about mounting APFS images in Windows. The thing is, Paragon has a free (preview) driver to mount APFS volumes in Windows! So with conjunction with our favourite Arsenal Image Mounter you can easily mount and browse APFS images with your Windows workstation.

Read More
How To

Amazon Alexa Forensic Walkthrough Guide

Jessica Hyde (Magnet Forensics) and Brian Moran (BriMorLabs) have presented a document summarizing the URLs to query from Amazon to return some of the Amazon Echosystem data. You can find the results of their research here.

Read More
How To

Android Forensics with ADB

This post by TM4n6 covers the use of the Android Debug Bridge (ADB) command-line tool on Linux. It focuses on the extraction of forensically relevant data from mobile devices packaged with the Android Operating System developed by Google.

Read More
Page 3 of 1112345 10...Last

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account