MENU

Posts Tagged ‘windows 10 forensics’

Most Recent
 
Read More
2017-11-11

RunPE Overview

Most hackers use remote access Trojans (RATs) and they almost always use the RunPE method. This method generates a legitimate process executable (PE) file, so this is often the default browser or Microsoft system process, and replaces it with malicious code directly in memory. This allows the computer to process malicious code as a legitimate process. As soon as this happens, your antivirus program does not know that your browser is effectively turned into a virus by default.

168
 
Read More
2017-11-10

Evading Autoruns

Martin Brinkman wrote an article that talks about a program for Windows to analyze all the different files, programs and other elements. It is a tool that includes many nice features, but it’s not a security tool.

 

162
 
Read More
2017-11-09

Data Recovery System Overview

DRS (Data Recovery System) is a real-time data recovery tool that helps you recover data from both good and damaged media. Included in the DRS:

 

225
 
Read More
2017-11-06

Log Files Analysis

Log Files are so useful, you’ll be so damn excited that you have them. Because these are files in which certain user actions or programs are logged on the server.

1914
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.