Posts Tagged ‘windows forensics’

Most Recent
 
Read More
2018-04-16

Creating a digital forensic laboratory: Tips and Tricks

Creating a digital forensic laboratory is a responsible step. The effectiveness of the laboratory depends on what software, hardware and equipment will be purchased.

DFC specialists took part in the creation and upgrade of several digital forensic laboratories owned by state organizations and private entities and today they will share their tips and tricks.

487
 
Read More
2018-04-02

Bypassing AppLocker with PowerShell Scripts

Several years ago, Microsoft announced a new tool – AppLocker, which, according to the developers, was designed to increase the level of security when working in Windows. Unfortunately, the way was uncovered, in which you can run any application in the system bypassing AppLocker and without administrator rights.

56
 
Read More
2018-03-31

Detect Password Spraying With Logs Analysis

In recent years, the press has widely covered high-profile cases related to threats and incidents caused by malicious software. Attackers have become more inventive.

 

56
 
Read More
2018-03-29

Analysis of Email Attachment Timestamps

Arman Gungor is a certified computer forensic examiner (CCE) and an e-Discovery expert with more than 21 years of experience in computer technology and technology. He is appointed as a neutral expert on computer expertise, as well as a neutral consultant on electronic discovery. In this blog, he talked about analyzing the timestamp for sending e-mail in Outlook.

72
Latest Headlines
 
Read More
110
 
Read More
487
 
Read More
32

Trending Topics
digital forensics
computer forensics
mobile forensics
Articles
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Chip-off Technique in Mobile Forensics
 
4
Extracting WhatsApp database and the cipher key from a non-rooted Android device
 
5
Extracting data from SmartSwitch backups