Magnet User Summit CTF: Intrusion
So, we decided to finish our write-up today. The forth part – the most interesting part. Intrusion! Again, no more AXI…
So, we decided to finish our write-up today. The forth part – the most interesting part. Intrusion! Again, no more AXI…
Hope you are having a great Sunday, and we are continuing our write-up. No more AXIOM, by the way! You wanted open source to…
We are continuing our write-up. The second part will walk you through the solution of the second set of CTF problems –…
As a continuation of the “Introduction to Windows Forensics” series, this episode takes a comprehensive look at …
SANS Institute has published the presentations from DFIR Summit & Training 2018. You can find all of them here. …
Windows Phones are not frequent guests of our digital forensic lab, especially now, as Microsoft stopped developing the plat…
Eric Zimmerman presented a tool for parsing ActivitiesCache.db, which contains Windows 10 Timeline data. You can learn …
Alex Caithness has published a post in CCL Group blog overviewing the newest Windows 10 feature – the Timeline. All Ti…
We continue our unforgetable journey to the world of cloud forensics. This time we are going to forensicate pCloud desktop a…
It seems we really enjoy forensicating desktop apps for cloud services. Last week we started from really secure cloud servic…
Login