Digital forensics April 21, 2020 Rahni Sumler Web Traffic Analysis In 2018 DayTrek Corp, a broadband and data communications company in the UK discovered a cross-site request-exploit on their routers. Attackers would hack...
Digital forensics April 14, 2020 Dimitar Kostadinov Network forensics overview Most attacks move through the network before hitting the target and they leave some trace. According to Locard’s exchange principle, “every contact leaves...
Digital forensics August 29, 2019 Alec Waters Eyesight to the Blind – SSL Decryption for Network Monitoring [Updated 2019] SSL and network monitoring aren't the most compatible of partners – even with the most sophisticated detection infrastructure in the world, you'll not derive...
Digital forensics August 21, 2019 Dejan Lukan Gentoo Hardening: Part 4: PaX, RBAC and ClamAV [Updated 2019] Grsecurity and Xorg If we enable the "Disable privileged I/O" feature in the hardened kernel and reboot, we can't start X server. That's because Xorg uses privileged...
Digital forensics July 6, 2019 Claudio Dodt Computer forensics: FTK forensic toolkit overview [updated 2019] In your career as a computer forensics professional, you will often find that your efficiency boils down to which tool you are using for your investigations....
Digital forensics July 6, 2019 Dimitar Kostadinov The mobile forensics process: steps and types The term “mobile devices” encompasses a wide array of gadgets ranging from mobile phones, smartphones, tablets, and GPS units to wearables and PDAs. What...
Digital forensics July 6, 2019 Infosec Free & open source computer forensics tools According to Juniper Research, cybercrime losses to businesses will surpass $2 trillion by the year 2019. With data breaches occurring all around the world...
Digital forensics July 6, 2019 Ravi Das (writer/revisions editor) An Introduction to Computer Forensics One of the biggest threats facing businesses and corporations today is that of Cyber-attacks and threats. If these are large enough in scale and magnitude,...
Digital forensics July 6, 2019 Fakhar Imam Common mobile forensics tools and techniques Data acquisition is the process of gathering information from mobile devices and their associated media. This process reduces the chances of data loss due to...
Digital forensics July 6, 2019 Lester Obbayi Computer forensics: Chain of custody [updated 2019] In this article, we will learn what the chain of custody entails in digital forensics and how it is maintained. We’ll also look at the chain of custody process...