April 23, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Tag Archives: cyber forensics (page 5)

Tag Archives: cyber forensics

Science

Forensic analysis of multiple device BTRFS configurations using The Sleuth Kit

The analysis of file systems is a fundamental step in every forensic investigation. Long-known file systems such as FAT, NTF…

Science

Memory forensics and the Windows Subsystem for Linux

The Windows Subsystem for Linux (WSL) was first included in the Anniversary Update of Microsoft’s Windows 10 operating…

Presentations

Breaking Full Disk Encryption

Full Disk Encryption (FDE) may be rather useful as a defense mechanism against potential theft of a computer system. However…

Tips & Tricks

How to Put a Qualcomm Phone into EDL Mode

In this post Magnet Forensics talks about Emergency Download (EDL). This is a Qualcomm feature that can be used fo…

News

Join our Telegram DFIR group!

Guys, we have created a Telegram group, where we will do our best to answer all your questions. We will be very happy if you…

News

Eric Zimmerman Updated Most of His Tools

Eric Zimmerman has updated most of his tools: WxTCmd, Hasher, Timeline Explorer, ShellBags Explorer, AppCompa…

News

Windows 10 October 2018 Update Brings Clipboard History Feature

Windows 10 October 2018 Update will bring us a new valuable source of DFIR artifacts – Clipboard History. Now use…

Tips & Tricks

Using SQL Server 2016 Temporal Tables for Data Forensics and Auditing

Temporal Tables are a new feature of SQL Server 2016. Join Pragmatic Works to learn what they are and how they track da…

Videos

Payload Distribution Format

As a continuation of the “Introduction to Malware Analysis” series, this video walks through an analysis of a po…

Presentations

Automating Analysis with Multi-Model Avocados

In every case you work on, someone is asking you to get answers faster but without introducing more human error. Depending o…

Page 5 of 49First...34567 102030...Last

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account