MENU

Posts Tagged ‘Incident Response’

Most Recent
 
Read More
2018-02-03

Carving utmp records

This article laconically describes cutting utmp records for intrusion analysis. These files are not text files, but sometimes the files have empty data. That’s why an attacker can delete these files if he has administrative privileges.

121
 
Read More
2018-02-02

OS Forensics

Ankit Gupta has shared third part of the article ‘Digital Forensics Investigation through OS Forensics’.

The article tell us:

How to dp raw analysis of a drive or a forensic image. How to investigate a Windows registry. How to analyze a File system. How to extract passwords from different sources.

 

More.

125
 
Read More
2018-02-02

Secure Token and FileVault

Apple introduced Secure Token. Secure Token is a new and undocumented account attribute that you now need to add to the user account. The Secure Token attribute is automatically added to the first account to log in to the loginwindow of the operating system on a specific Mac.

205
 
Read More
2018-01-31

How to load Cellebrite images into AXIOM

AXIOM is a top forensic tool of Magnet Forensics. An article ‘Loading Cellebrite Images into Magnet AXIOM’  is shared  in the Magnet blog .

730
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.