April 23, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Tag Archives: incident response (page 5)

Tag Archives: incident response

Books

Investigating Data Hiding and Covert Communication

The book will focus on incident response methods and techniques when faced with the unprecedented challenge that data hiding…

Software

POSH-Triage

Mike Cary has written a PowerShell script that automates the use of Eric Zimmerman’s cmd line tools (https://eric…

Software

Diffy: A Triage Tool for Cloud-Centric Incident Response

Diffy is a digital forensics and incident response (DFIR) tool developed by Netflix’s Security Intelligence and Respon…

Software

Office365 Log Analysis Framework

After yesterday’s webcast Matt Bromiley released his Office365 Log Analysis Framework or OLAF to the public. You …

Science

Detecting Malicious PowerShell Commands using Deep Neural Networks

Microsoft’s PowerShell is a command-line shell and scripting language that is installed by default on Windows machines…

Videos

Security Event Logging and Monitoring Techniques for Incident Response in Hadoop

This presentation will share some of the techniques and lessons learned in real-world Hadoop implementation at Johns Hopkins…

Software

LiMEaide: Dump Linux Memory Remotely

LiMEaide is a python application designed to remotely dump RAM of a Linux client and create a volatility profile for later a…

Articles

Magnet User Summit CTF: Misc

We are continuing our write-up. The second part will walk you through the solution of the second set of CTF problems –…

Articles

Magnet User Summit CTF: Anti-Forensics

Yesterday Troy Schnack and Kevin Pagano suggested on Twitter that it would be good to write how I solved Magnet User Su…

News

Using the Office 365 Activities API to Investigate Business Email Compromises

Business email compromises (BECs) are a big problem across a multitude of industries. Just last week, the FBI participated i…

Page 5 of 11First...34567 10...Last

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account