Digital Forensics and Incident Response
Another DFIR book has been announced by Packt Publishing. It’s “Digital Forensics and Incident Response” b…
Another DFIR book has been announced by Packt Publishing. It’s “Digital Forensics and Incident Response” b…
Eyal Neemany has published a post on how to use PowerShell to expose command line shells history. He notes that the biggest …
One of our favorite forensicators – David Cowen, – has published a very interesting post in Hacking Exposed Comp…
SANS Instructor and Former FBI Agent Eric Zimmerman has provided several open source command line tools free to the DFIR Com…
Increased use of cloud storage services have become a necessity alternative that complements the main storage media in every…
Here is a paper by Aron Warren from SANS Institute Reading Room site about Tor browser artifacts in Windows 10. The Tor netw…
In this article, we are going to take a close look at the fundamentally new sources of digital evidences that are typical fo…
BlackBag Training Team has published a fresh post. This time they are speaking about Windows Volume Shadow Copies. You will …
Dan Pullega has published a useful “forensics quickie” in his blog. In the post he shows how to access and copy …
Harlan Carvey, the author of best selling Windows Forensic Analysis series, has published a post in his blog about tools he …
Login