Commercial Computer Forensics Tools

By InfoSec Resources

Contrary to popular belief, the domain of digital forensics is far from being monolithic. From the outside looking in, it might appear that computer forensics lacks versatility in terms of use cases. But just as computers have evolved over the years, both in terms of hardware and software, so has the landscape of retrieving valuable information from them through sound forensic techniques. Constant innovation in computing leads to better methods of encryption, concealment and manipulation of data. This consequently leads to the development of more powerful tools that can match the contemporary demands of digital forensics. Today, the tools for addressing various digital forensics use cases can be divided into multiple categories, whether we’re looking at differing systems or the range of forensic functions. In this article, we will look at these categories and discuss some of the most popular digital forensics tools available to us.
» Read more

Module 5: Forensic Recovery – InfoSec Resources

By Dalasta Darren

Forensic Data Recovery using Open Source Linux. Forensically image a drive and recover the data by mounting the image and then using software and tools (we cover RecoverJPEG, Foremost and Scalpel). Download course files through the download link on the right side of this page and others below.
» Read more

The SANS Survey of Digital Forensics and Incident Response

by Paul Henry, Jacob Williams, and Benjamin Wright

More than 450 participants completed the SANS 2013 Digital Forensics Survey, conducted online during April and May 2013. A primary goal of this survey was to identify the nontraditional areas where digital forensics techniques are used.In the survey 54% of respondents indicated their digital forensics capabilities are reasonably effective.
» Read more

SANS Investigate Forensics Toolkit—Forensics Martial Arts Part 1

By Aditya Balapure

The SANS Investigate Forensic Toolkit (SIFT) is an interesting tool created by the SANS Forensic Team and is available publicly and freely for the whole community. It comes with a set of preconfigured tools to perform computer forensic digital investigations. This is based on Ubuntu and has a long list of tools for present forensic needs. We will have a walkthrough of some of the very famous tools used in forensic investigations. It supports evidence formats such as raw format (.dd), encase image file format (E01), and advanced forensics format (AFF).
» Read more

Forensic Analyst Salary

By InfoSec Resources

If you like to solve puzzles, you might be interested in a forensic analyst career. There is a need for forensic analysts for several aspects of law enforcement, but there is a growing need for forensic analysts in the IT field. A forensic analyst in IT can help law enforcement identify and trace malware and present evidence to the courts.
» Read more

Wireless Forensics: Tapping the Air – Part Two

by Raul Siles

In part one of this series, we discussed the technical challenges for wireless traffic acquisition and provided design requirements and best practices for wireless forensics tools. In this second article, we take it a step further and focus on the technical challenges for wireless traffic analysis. Additionally, advanced anti-forensic techniques that could thwart a forensic investigation are analyzed. Finally, apart from the technical details, as a forensic write-up, the article covers some legal aspects about wireless forensics for both the U.S. and Europe.
» Read more

Introduction to IT Security & Computer Forensics – InfoSec Resources

By Dalasta Darren

This introductory course covers IT Security and goes more in-depth into Computer Forensics. There are 12 modules to cover the categories of Anonymity on the Internet, Darknets Tor Hidden Services, Anti-forensics with USB Rubber Ducky, Forensic Imaging, Forensic Recovery, Forensics with Autopsy, Network Analysis, Hacking Android, Armitage 101, Memory Analysis with Volatility, Network Analysis, and Forensics with DFF.

» Read more

Forensic Techniques

By Pentesting Experts

The main goal of the forensic investigation is to handle a large amount of data, gather as much evidence as possible, and uncover all the hidden and untraced data. In the field of digital forensic various techniques are considered to extract the maximum amount of information and gather as much evidence. Below is the list…
» Read more

Integrating Forensic Investigation Methodology into eDiscovery

By Colin Chisholm

The intent of this paper is twofold; to provide a primer on the eDiscovery process for forensic analysts and to provide guidance on the application of forensic investigative methodology to said process. Even though security practitioners such as forensic analysts operate in the legal vertical, they necessarily view and approach eDiscovery from a different perspective than legal professionals. This paper proposes that both parties can benefit when they integrate their processes; forensic tools and techniques have been used in the collection, analysis and presentation of evidence in the legal system for years. The history, and precedent, of applying forensic science to the legal process can be leveraged into the eDiscovery process. This paper will also detail how the scope and work for a forensic investigator during the eDiscovery process differs from a typical forensic investigation.
» Read more

Digital Forensic Analysis of Amazon Linux EC2 Instances

by Kenneth G. Hartman

Companies continue to shift business-critical workloads to cloud services such as Amazon Web Services Elastic Cloud Computing (EC2). With demand for skilled security engineers at an all-time high, many organizations do not have the capability to do an adequate forensic analysis to determine the root cause of an intrusion or to identify indicators of compromise. To help organizations improve their incident response capability, this paper presents specific tactics for the forensic analysis of Amazon Linux that align with the SANS “Finding Malware – Step by Step” process for Microsoft Windows.
» Read more

1 2 3 4