April 23, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Science (page 2)

Science

Science

Digital Forensic Approaches for Amazon Alexa Ecosystem

Internet of Things devices such as the Amazon Echo are undoubtedly great sources of potential digital evidence due to their ubiquitous use and their always on mode of operation, constituting a human life black box. The Amazon Echo in particular plays a centric role for the cloud based intelligent virtual assistant Alexa developed by Amazon Lab126. The Alexa enabled wireless …

Read More
Science

Decoding the Hexadecimal Representation of a PostgreSQL Database Table

Joseph Balazs, Dr. Marcus Rogers, Dr. John Springer and Dr. Dawn Laux conducted a research on decoding the hexademical representation of a PostgreSQL database tables. Simple testing was done on a table to insert, update, and delete records. A hex interpreter was used to analyze the differences between the records at the file system layer. You can find a poster with …

Read More
Science

Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter and Telegram as Case Studies

Development of mobile web-centric OS such as Firefox OS has created new challenges and opportunities for digital investigators. Network traffic forensics plays an important role in cybercrime investigation to detect subject(s) and object(s) of the crime. The authors detect and analyze residual network traffic artefacts of Firefox OS in relation to two popular social networking applications (Facebook and Twitter) and …

Read More
Science

Darknet Forensics

Deep web content cannot be indexed by search engine such as Google, Yahoo and Bing and darknet is lies within the deep web. Dark web has been intentionally hidden and it is not accessible through standard browser. Deep web can be accessed by anyone who has The Onion Router (TOR) browser. TOR is a virtual and encrypted tunnel which allows …

Read More
Science

Nilay Mistry’s Research Papers

Nilay Mistry has shared his research papers for publication. If you want to publish your research or articles at Cyber Forensicator – contact us via Telegram group.  

Read More
Science

Mac OS X Forensics

Market share of the Apple computers are continuously increasing day by day and Apple provides an OS X as a default operating system in their computers. The time has already arrived when digital forensic examiner needs sound and efficient digital forensic techniques for Mac OS X to collect evidences related cybercrime. The information source for artifacts may be application such …

Read More
Science

IT Security Incident Response: Current State, Emerging Problems, and New Approaches

The field Incident Response within the IT Security is the overall process of handling an incident which occurs within a computer network or system. It involves the detection, analysis, remediation, and containment of an attack. This capabilities are necessary in order to adequately respond to attacks against systems and be able to limit the associated risk involved in such a …

Read More
Science

Portable Dynamic Malware Analysis with an Improved Scalability and Automatisation

A malware is deployed ubiquitously to steal safety or liability-critical information and damage the compromised systems. In this paper, the authors present a portable, scalable and transparent system for dynamic analysis of malware targeting Windows OS. The portability feature is enabled by introducing a driver capable of collecting the behavioural activities of analysed samples in low kernel level and detection …

Read More
Science

Real-Time Forensics Through Endpoint Visibility

In the course of the last years, there has been an established forensic process in place known by every investigator and researcher. This traditional process is regarded to produce valid evidence when it comes to court trials and, more importantly, it specifies on a very precise level how to acquire a suspects machine and handle the data within. However, when …

Read More
Science

SPaRe: Efficient SQLite Recovery Using Database Schema Patterns

In recent times, the Internet of Things (IoT) has rapidly emerged as one of the most influential information and communication technologies (ICT). The various constituents of the IoT together offer novel technological opportunities by facilitating the so-called “hyper-connected world.” The fundamental tasks that need to be performed to provide such a function involve the transceiving, storing, and analyzing of digital …

Read More
Page 2 of 612345 ...Last

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account