MENU

Posts Tagged ‘Cybersecurity’

Most Recent
 
Read More
2018-03-28

Obfuscation and Detection Techniques

Attackers are constantly improving and therefore are looking for new attacks, using evasion techniques to maintain the effectiveness of old vectors in the ever-changing protective landscape. Many of these threat participants use the obfuscation framework for common scripting languages, such as JavaScript and PowerShell, to prevent signature-based detection of conventional offensive tradecraft written in these languages. Some hidden intruders have translated their tradecraft into languages ​​that do not support this additional visibility.

397
 
Read More
2018-03-26

How to detect proxies and network traffic with Volatility

There are several options for how to solve the effect of an opaque proxy server on network connections. This blog is obsessed with how you can solve this problem by volatility and lines.

386
 
Read More
2018-03-24

Forensic Acquisition Mac Computers

Kevin J. Ripa presents instructions for extracting Live Acquisition from a working Mac computer. Kevin tested it on Mountain Lion, Mavericks, Yosemite and El Captain. Testing was not on every OS Apple, but it should work on any Mac based on Intel.

881
 
Read More
2018-03-22

MacOS Unified log

Apple is the market leader. It has brought one of the most fundamental changes since the first public beta of Mac OS X in September 2016. This article provides an overview of the unified registration system in the Sierra and the High Sierra.

474
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.