Here is a nice overview of EC2 instances volume and memory acquisition process, plus some info on how to disable an access key and isolate a compromised host.
-
Find out what happened during a ransomware attack on computer
Introduction The encryption pandemic has swept the world. No commercial companies or gover… -
PC3000 Portable III in Digital Forensics
Introduction Sooner or later, most forensics experts have to deal with damaged hard drives…
Load More Related Articles
-
Step by Step Guide to iOS Jailbreaking and Physical Acquisition
Oleg Afonin from Elcomsoft has posted a step by step guide on how to perform jailbreaking … -
Creating a File System Image of iOS12
Apple’s iOS 12 is the latest iteration in their mobile device software. With each it… -
Parsing Carved EVTX Records Using EvtxECmd
Teru Yamazaki has posted about how to extract Windows Event Log files from allocated space…
Load More In How To
Kali Cheatsheet | Cloud Solutions Architect
December 21, 2020 at 12:21 pm
[…] https://cyberforensicator.com/2018/03/28/how-to-perform-aws-cloud-forensics/ […]
Identifying entry points on AWS | Cloud Solutions Architect
December 28, 2020 at 11:08 pm
[…] https://cyberforensicator.com/2018/03/28/how-to-perform-aws-cloud-forensics/ […]
Identifying entry points on AWS - DETECTX
February 3, 2021 at 2:03 pm
[…] https://cyberforensicator.com/2018/03/28/how-to-perform-aws-cloud-forensics/ […]