Smartphone Forensics Investigations: An Overview of Third Party App Examination
There are millions of applications that can be used on a smartphone. This mini webcast with Terrance Maguire outlines an app…
There are millions of applications that can be used on a smartphone. This mini webcast with Terrance Maguire outlines an app…
Most people know the Shadow Brokers leaked (supposedly) stolen NSA cyber tools, which lead to some of the most significant c…
SANS has updated Advanced Smartphone Forensics poster. You’ll learn how to deal with SQLite databases, ADB and li…
SANS has updated their Hunt Evil poster. It includes information about typical Windows processes, evidence of remote access …
Guys, we have created a Telegram group, where we will do our best to answer all your questions. We will be very happy if you…
You have used all of the utilities in your expensive forensic suite, and other programs to carve files from unallocated file…
Many analysts rely on Windows Event Logs to help gain context of attacker activity on a system, with log entries serving as …
Many analysts rely on Windows Event Logs to help gain context of attacker activity on a system, with log entries serving as …
Yesterday, two new vulnerabilities (Meltdown and Spectre) were introduced that are in the architecture of processors in near…
Memory Forensics Cheat Sheet by SANS DFIR has been updated. The authors added new plugins like hollowfind and dumpregis…
Login