Archiv des Autors: #DF

Forensic Artifact Database

Forensic Artifact Database



Artifacts | Forensic Artifacts
Author Name. Pasquale Stirparo, @pstirparo. Submission Title. Mac OS X User Preference Settings. Artifact Description. Num. 1 is the directory containing user preference settings for applications and utilities. Num. 3 is the plists containing the names of volumes mounted on the desktop that have …

Check this out on Google+

Direct access:

Direct access: live.sysinternals.com



– /
live.sysinternals.com – /. Friday, May 30, 2008 3:55 PM 668 About_This_Site.txt. Wednesday, June 29, 2016 9:46 PM 773288 accesschk.exe. Wednesday, June 29, 2016 9:46 PM 403120 accesschk64.exe. Wednesday, November 1, 2006 1:06 PM 174968 AccessEnum.exe. Thursday, July 12, 2007 5:26 …

Check this out on Google+

OLDIES BUT GOLDIES: USB Device Research in 6 Parts

OLDIES BUT GOLDIES: USB Device Research in 6 Parts



USB Devices – HeX-OR Forensics
From the previous tests conducted, it has become apparent that for USB devices attached to a system, the transport protocol used by the device plays a role in the types of artifacts generated. This can also include the content and… Continue Reading → · Research, Windows Analysis, Data Exfiltration, …

Check this out on Google+

Untitled



wtsxDev/reverse-engineering
reverse-engineering – List of awesome reverse engineering resources

Check this out on Google+

Dump of organized knowledge on DFIR



marcurdy/dfir-toolset
dfir-toolset – Dump of organized knowledge on DFIR

Check this out on Google+

Untitled



Cyborg Linux – World’s Most Advanced Penetration Testing Distro

Check this out on Google+

System Resource Utilization Monitor by SANS

System Resource Utilization Monitor by SANS



System Resource Utilization Monitor – SANS Internet Storm Center
SANS Internet Storm Center – A global cooperative cyber threat / internet security monitor and alert system. Featuring daily handler diaries with summarizing and analyzing new threats to networks and internet security events.

Check this out on Google+

Chip-off Technique in Mobile Forensics

Chip-off Technique in Mobile Forensics



Chip-off Technique in Mobile Forensics
Nowadays digital forensic labs have a few ways of extracting data from mobile devices.

Check this out on Google+

2016 Forensic 4:cast Awards – Vote now!




Forensic 4:cast Awards | Forensic 4cast

Items by Category. 4:mag · Experiences · Methodologies & Best Practices · News · Podcast Episodes · Reviews · Technical Articles · Uncategorized. Items by Month. March 2016 · January 2016 · November 2015 · July 2015 · May 2015 · April 2015 · January 2015 · September 2014 · June 2014 · May 2014 …

Check this out on Google+

Bitlocker – Whats new in windows 10

Bitlocker – Whats new in windows 10



BitLocker: What’s New in Windows 10 November Update, And How To Break It
BitLocker is a popular full-disk encryption scheme employed in all versions of Windows (but not in every edition) since Windows Vista. BitLocker is used to protect stationary and removable volumes …

Check this out on Google+