Posts Tagged ‘computer forensics’

Most Recent
 
Read More
2018-06-07

Forensic analysis of instant messenger desktop applications

The most popular Instant Messengers are Telegram, WhatsApp, Viber. These instant messengers have both mobile applications and desktop applications. Today we will look at the types of data an examiner can detect when researching desktop applications of Telegram, WhatsApp, Viber.

121
 
Read More
2018-05-17

Cloud Forensics: How to acquire a web based email account

The next typical task of Cloud Forensics is the acquisition of a web based email account such as a Gmail account, an Yahoo account, a Hotmail account, etc. Of course, you can use Cloud Extractor (Oxygen) or Cloud Analyzer (Cellebrite). However, these tools are chargeable and not always available for an examiner. This article will tell you how to acquire a Gmail account with Thunderbird.

170
 
Read More
2018-05-10

Analyzing Instant Messengers with Belkasoft

Nowadays, the basic exchange of information is carried out through Instant Messengers by using social networks. Some social networks have their own mobile apps which functionality can be compared with that of IM Messengers.

284
 
Read More
2018-04-29

AXIOM V2: MEMORY FORENSICS

AXIOM is our one of the best tools. A few days ago Magnet Forensics has released AXIOM V2. Now AXIOM contains many features. We were especially delighted that the functional Volatility appeared in a new version of AXIOM. Volatility is the best tool for memory forensics. The combination of AXIOM and Volatility is clearly an excellent idea. And of course we immediately started testing this functionality.

470
Latest Headlines
 
Read More
586
 
Read More
1146
 
Read More
66

Trending Topics
digital forensics
computer forensics
mobile forensics
Articles
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Chip-off Technique in Mobile Forensics
 
4
Extracting data from SmartSwitch backups
 
5
Extracting WhatsApp database and the cipher key from a non-rooted Android device