MENU

Posts Tagged ‘Digital Forensics’

Most Recent
 
Read More
2017-11-11

RunPE Overview

Most hackers use remote access Trojans (RATs) and they almost always use the RunPE method. This method generates a legitimate process executable (PE) file, so this is often the default browser or Microsoft system process, and replaces it with malicious code directly in memory. This allows the computer to process malicious code as a legitimate process. As soon as this happens, your antivirus program does not know that your browser is effectively turned into a virus by default.

169
 
Read More
2017-11-10

Evading Autoruns

Martin Brinkman wrote an article that talks about a program for Windows to analyze all the different files, programs and other elements. It is a tool that includes many nice features, but it’s not a security tool.

 

162
 
Read More
2017-11-09

Data Recovery System Overview

DRS (Data Recovery System) is a real-time data recovery tool that helps you recover data from both good and damaged media. Included in the DRS:

 

225
 
Read More
2017-11-08

Bypassing iOS 11 Encrypted Backups

Sometimes there are situations when you need to extract data from your phone to save valuable messages. Unfortunately, unlocking and retrieving data from smartphones can be difficult.

 

577
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.