April 23, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Tag Archives: incident response (page 10)

Tag Archives: incident response

White Papers

Anatomy of an Attack: CARBANAK

Jack Wesley Riley has published a white paper with an overview of tools and techniques used by CARBANAK. According to the pa…

How To

Unofficial Guide to Mimikatz & Command Reference

Mimikatz is a common tool used by APT in modern cyber attacks to harvest admin’s and user’s login credentials. I…

Books

Hands-on Incident Response and Digital Forensics

Incident response and digital forensics require a balancing act to get right, but both are essential when an information sec…

Videos

Incident Response in the Cloud

Moving from on-premises deployments to the cloud can offer incredible benefits to many organizations, including a plethora o…

Books

Hunt Evil: Your Practical Guide to Threat Hunting

This eBook will guide you through how to assess and improve your threat hunting capabilities, how to prioritize what to hunt…

Videos

Open-Source DFIR Made Easy: The Setup

A common challenge in the digital forensics and incident response (DFIR) community has been creating a DFIR toolkit that is …

How To

Memory Acquisition and Virtual Secure Mode

Jason Hale has published a post about the impact of VBS on memory acqusition. With Windows 10 and Server 2016, Microsoft add…

Videos

An Academic’s View to Incident Response

Here is a talk by Martin Schmiedecker from SHA2017 on incident response: SHA2017 is a non profit outdoor Hacker camp/confere…

How To

An Introduction to VolUtility

Basil Alawi S.Taher has posted a nice overview of how to start using VolUtility – a web frontend for Volatility f…

Videos

Windows IR made easier and faster – Find the head of the snake using AutoRuns, Large Registry Keys, Logs, IP/WhoIs and Netflow

Windows systems are still king of the desktop and server operating systems, thus the #1 target of hackers, malware, ransomwa…

Page 10 of 11First...7891011

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account