Latest Headlines
 
Read More
486
 
Read More
965
 
Read More
56

Trending Topics
digital forensics
computer forensics
mobile forensics
Articles
DFIR
digital forensics software
Android forensics
windows forensics
incident response
The News
Most Recent
 
Read More
2018-05-17

Cloud Forensics: How to acquire a web based email account

The next typical task of Cloud Forensics is the acquisition of a web based email account such as a Gmail account, an Yahoo account, a Hotmail account, etc. Of course, you can use Cloud Extractor (Oxygen) or Cloud Analyzer (Cellebrite). However, these tools are chargeable and not always available for an examiner. This article will tell you how to acquire a Gmail account with Thunderbird.

76
 
Read More
2018-05-10

Analyzing Instant Messengers with Belkasoft

Nowadays, the basic exchange of information is carried out through Instant Messengers by using social networks. Some social networks have their own mobile apps which functionality can be compared with that of IM Messengers.

193
 
Read More
2018-04-29

AXIOM V2: MEMORY FORENSICS

AXIOM is our one of the best tools. A few days ago Magnet Forensics has released AXIOM V2. Now AXIOM contains many features. We were especially delighted that the functional Volatility appeared in a new version of AXIOM. Volatility is the best tool for memory forensics. The combination of AXIOM and Volatility is clearly an excellent idea. And of course we immediately started testing this functionality.

395
 
Read More
2018-04-22

Cloud Forensics: How to acquire a Facebook account

Today we will tell about how to acquire a Facebook account. Of course, you can use commercial tools such as: Cloud Analyzer (Cellebrite), Cloud Extractor (Oxygen Forensics), E3 Platform (Paraben Corporation), etc. However, this can be done manually and in this article will show how to do this step-by-step.

486
 
Read More
2018-04-16

Creating a digital forensic laboratory: Tips and Tricks

Creating a digital forensic laboratory is a responsible step. The effectiveness of the laboratory depends on what software, hardware and equipment will be purchased.

DFC specialists took part in the creation and upgrade of several digital forensic laboratories owned by state organizations and private entities and today they will share their tips and tricks.

965
 
Read More
2018-04-05

How to update MacOS by Terminal

A typical user does not need to use the command line in OS X, since most of his functions cover what is implemented in the system’s graphical interface. Another thing is when you need some hidden features that are not available from the GUI. There is a wide range of commands that you can use instead of your graphic counterparts. Sometimes they provide additional functions that are usually not available.

41
 
Read More
2018-04-02

Bypassing AppLocker with PowerShell Scripts

Several years ago, Microsoft announced a new tool – AppLocker, which, according to the developers, was designed to increase the level of security when working in Windows. Unfortunately, the way was uncovered, in which you can run any application in the system bypassing AppLocker and without administrator rights.

74
Load More
End of the line!
Top Stories
 
 
Right Now
 
bstrings 1.0 released
News
 
Bypassing AppLocker with PowerShell Scripts
 
JTAGing as a way for extracting passwords
 
Inside iCloud Drive
 
Detect Password Spraying With Logs Analysis
More
Articles
 
Cloud Forensics: How to acquire a web based email account
 
Analyzing Instant Messengers with Belkasoft
 
AXIOM V2: MEMORY FORENSICS
 
Cloud Forensics: How to acquire a Facebook account
More
Books
 
Advanced Threat Analytics Playbook
 
Intelligence – Driven Incident Response
 
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
 
Second Edition of Learning iOS Forensics is Announced
More
How to
 
How to update MacOS by Terminal
 
How to install Splunk Enterprise
 
How to Develop an Incident Response Plan
 
How to create a list of all the files inside a macOS directory
More
Software
 
ReversingLabs plugin for Autopsy
 
How to use sandboxes without technical skills
 
VMRay Analyzer
 
Detecting malware with yara scripts
More

Popular Now
 
 
 
 
 
The Latest
 
Read More
76
Editor's Picks
 
 
 
 
Go To
SORT
 
Cloud Forensics: How to acquire a web based email account