April 23, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Presentations (page 2)

Presentations

Presentations

Badly behaving scripts

As browser and operating system security have been improving, there has been a rise in conventional malware attacks relying instead on social-engineering based attacks. These socially-engineered attacks often rely on emails containing script-based malware loaders such as JavaScript, Visual Basic Script, or HTA files. When run, these scripts will be hosted with a Windows script execution engine and usually proceeds …

Read More
Presentations

Comae Stardust – New Features

Matt Suiche has recorded a presentation on the new features of Comae Stardust, such as process memory dump support, YARA scans, human-readable reports and publishing snapshots:

Read More
Presentations

Smartphone Forensics: Why Building a Toolbox Matters

In the world of forensics, mobile device investigations could be the most complicated of all. Ever changing technology guarantees that when it comes to you and your forensic tools, there is no such a thing as a monogamous relationship. There are a plethora of mobile forensics tools available to make your job easier, but do they? What happens when the …

Read More
Presentations

MalDozer: Automatic Framework for Android Malware Chasing Using Deep Learning

ElMouatez Billah Karbab discusses his work at DFRWS EU 2018:

Read More
Presentations

Mac_apt –The Smarter and Faster Approach to macOS Processing

macOS forensics has not seen the kind of attention Windows gets. Few tools and documentation exist to specifically address macOS artifact processing needs, so the mac_apt – macOS Artifact Processing Tool, a Python, open-source, cross-platform, plugin-based framework with support for Apple File System and High Sierra was created. You’ll see how mac_apt can process complex artifacts and drastically cut down …

Read More
Presentations

Efficiently Summarizing Web Browsing Activity

Reviewing web browsing activity is relevant in a wide variety of DFIR cases. With many users having multiple devices that may need to be analyzed, we need better ways to get answers quickly. This presentation will show how a synopsis of browsing activity can be a starting point before a deep-dive investigation and can help investigators decide whether a device …

Read More
Presentations

Forensic Challenges due to Encryption Mechanisms

Mobile devices investigation is a challenging field for forensic analysts, especially due to the increasing amount of data encryption mechanisms. The talk will give a brief overview on how to conduct a forensic investigation and examine the different approaches of physical and logical data acquisition methods. Furthermore, encryption mechanisms and countermeasures used on mobile devices are discussed on a high-level …

Read More
Presentations

Windows Forensics: Event Trace Logs

Looking for a “new” Windows artifact that is currently being underutilized and contains a wealth of information? Event Tracing for Windows (ETW) and Event Trace Logs (ETL) may be your answer. There’s nothing new about them, yet they can provide a wealth of information. Event Tracing for Windows was introduced in Windows 2000 and is still going strong in current …

Read More
Presentations

A Planned Methodology for Forensically Sound IR in Office 365

A planned methodology for developing and implementing a forensically sound incident response plan in Microsoft’s Office 365 cloud environment must be thoroughly researched and re-evaluated over time as the system evolves, new features are introduced, and older capabilities are deprecated. This presentation will walk through the numerous forensic, incident response, and evidentiary aspects of Office 365. The presentation is based …

Read More
Presentations

Messaging App Forensics with Autopsy

Here’s Brian Carrier’s presentation from Open Source Digital Forensics Conference (OSDFCon) 2018. In the presentation he walks attendees through new Autopsy features around messaging, email, and chats. You can download it here.  

Read More
Page 2 of 41234

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account