April 19, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home White Papers (page 2)

White Papers

White Papers

Android Acquisition Methods from Root to Recovery

New white paper from Magnet Forensics is already available online. Reading “Android Acquisition Methods from Root to Recovery” you will learn: The difference between live (rooting) and dead exploits Why some traditional forms of password bypass, such as bootloaders, don’t work as well anymore Different types of custom recovery flashing What to document as you go through your processes Get …

Read More
White Papers

Demystifying Android Marshmallow Forensic Analysis

Magnet Forensics has published a fresh white paper: “Demystifying Android Marshmallow Forensic Analysis”. Reading the paper you will learn: Why Marshmallow’s built-in encryption isn’t necessarily the end of the forensic line How to bypass new and different levels of data obfuscation Where – and more importantly, how – to find the right data partition How adoptable storage changes your forensic …

Read More
White Papers

Ten Ways to Prepare for Incident Response

McAfee has published a white paper by Jim Olmstead, Senior Consultant, Incident Response and Forensic Practice Foundstone® Services, entitled Ten Ways to Prepare for Incident Response. Words by the author: “As a senior consultant on the Foundstone Services incident response and forensic team, I regularly respond to a wide range of security incidents at client sites. I have assisted clients with the containment …

Read More
Page 2 of 212

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account