Digital forensics February 1, 2021 Srinivas Email forensics: desktop-based clients Emails are the most commonly used technology for exchanging messages between people/business using electronic media. With every technology, there comes a risk.This...
Digital forensics January 29, 2021 Dejan Lukan What is a Honey Pot? [updated 2021] Honeypots are special programs that are written for one purpose: to be exploited. Honeypots emulate the appearance of a vulnerability so that attackers, viruses...
Digital forensics January 26, 2021 Srinivas Email forensics: Web-based clients This article discusses how to perform forensic investigations of Web-based email clients. While many organizations use Desktop based email clients for their...
Digital forensics January 26, 2021 Srinivas Email Analysis In this article, we will explore the fundamentals concepts associated with email that will help us to perform email analysis. We will begin by understanding...
Digital forensics January 25, 2021 Srinivas Investigating Wireless attacks In the earlier articles, we discussed the fundamentals of Wireless networks covering the common types of wireless devices, terminology used, WLAN Security types,...
Digital forensics January 25, 2021 Srinivas Wireless Networking Fundamentals for Forensics With the evolution of Internet of Things (IoT) devices, there are countless wireless devices around us these days. Many people carry small sized Wireless networks...
Digital forensics January 19, 2021 Srinivas Protocol Analysis Protocol analysis is examination of one or more fields within a protocol’s data structure during a network investigation. Understanding the bits and pieces...
Digital forensics January 19, 2021 Srinivas Wireless Analysis In this article, we will discuss how to perform Wireless Analysis specifically on Wi-Fi networks. We will perform active packet capturing by using an external...
Digital forensics January 18, 2021 Srinivas Log Analysis Log analysis counts for a lot in an investigation and this article provides a gentle introduction to log analysis. Log Analysis is exactly what it sounds like...
Digital forensics January 18, 2021 Srinivas Network Security Tools (and their role in forensic investigations) The effectiveness of Network Forensics is closely related to the Network Security tools used in an organization. This article provides an overview of some commonly...