How to collect only valid evidence during forensic investigation and incident response processes instead of creating images of system memory

The cybersecurity community understands as cyber forensics the procedures and methodological techniques to identify, collect, preserve, extract, interpret, document and present the evidence of an investigation on a computer system, so that these reports can demonstrate or rule out malicious activity on the affected systems. Specialists say that this research plays a fundamental role in […]

How to perform digital forensics of malicious PDF files? Easily checking if a PDF document has malware or backdoors

The PDF format has become one of the most popular ways to view files, as this format is compatible with all kinds of technological devices, including desktop computers, laptops, electronic tablets and smartphones. Because of this universal presence, threat actors began using these documents to deliver malware and easily deploy other attack variants. This time, […]

How to do digital forensics of a hacked network with TCPDUMP

Digital forensics is one of the most important elements of ethical hacking, as it allows researchers to learn as much as possible about a network affected by cybercriminals. This requires tools capable of performing various specific tasks, including the analysis of network packets. On this occasion, experts from the International Institute of Cyber Security (IICS) […]

The police forensic department doesn’t wants to share how they hacked into secure encrypted phone networks to the court

A couple of months ago the French authorities detailed the operation of Operation Venetic, with which they managed to compromise the security of an account in the EncroChat encrypted messaging application, allowing law enforcement agencies across Europe to collect the evidence needed to make more than 1500 arrests. After this incident, court hearings on this […]

How to easily check if DOC, RTF, XLS, PPT, PPTX or PDF file has a malware without antivirus like a digital forensics expert

In most cyberattack variants threat actors use legitimate-looking documents loaded with malware, which is why researchers often say it all starts with a Word file, Power Point presentation, Excel spreadsheet, or even a book downloaded from a free PDF file website. This time, digital forensics experts from the International Institute of Cyber Security (IICS) will […]

CAINE 11 – GNU/Linux Live Distribution For Digital Forensics Project, Windows Side Forensics And Incident Response

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project. Currently, the project manager is Nanni Bassetti (Bari – Italy). CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE […]

Digital forensics tools for Windows 10 Forensics and incident response

Windows is the most common operating system. There are many organizations who prefer windows OS. Windows is also most targeted operating system by hackers, as per ethical hacking researcher of international institute of cyber security. We will show a method through which you can check all the details or view an history of windows operating […]

PlainSight – Open Source Digital Forensics

PlainSight is a versatile computer forensics environment that allows inexperienced forensic practitioners perform common tasks using powerful open source tools. There are many features included with this framework such as Internet Histories by using Pasco to recover Internet Explorer histories, Mork to recover FireFox/Netscape histories and RegRipper to view typed URLs. With this framework you […]

Redline – Digital Forensics and Incident Response Framework

Redline provides host investigative capabilities to users to find signs of malicious activity through memory and file analysis and the development of a threat assessment profile. With Redline, you can: Thoroughly audit and collect all running processes and drivers from memory, file-system metadata, registry data, event logs, network information, services, tasks and web history. Analyze […]

UK’s Biggest Forensic Services Provider Paid Huge Ransom After Their Systems Lock Down by Sophisticated Ransomware

The UK based one of the most prominent forensic firm Eurofins Scientific suffering cyber attack with ransomware and, they paid to ransom to cybercriminals. Eurofins Scientific work with the police department to solve tens of thousands of criminal cases each year across the U.K. Eurofins computer network hit with a sophisticated ransomware attack which forces […]

The biggest forensics company pays ransom after cyberattack

According to website security audit specialists, Eurofins, the leading provider firm of forensic analysis had to pay a ransom after a group of malicious hackers attacked them, which in fact paralyzed all its operations. The British firm, which hoards nearly half of this market in Europe, was the victim of a “highly sophisticated ransomware attack” […]

Know the Role of Data Forensics

Sometimes known as computer forensics, data forensics refers to the process of investigating digital data or programs in order to find out how it was created and what it is for. Having said that, data forensics itself is a very broad term, since it covers everything from identifying, preserving, recovering, analyzing, and presenting digital data.  […]

Most Important Computer Forensics Tools for Hackers and Security Professionals

Computer Forensics tools are more often used by security industries to test the vulnerabilities in network and applications by collecting the evidence to find an indicator of compromise and take an appropriate mitigation Steps. Here you can find the Comprehensive Computer Forensics tools list that covers Performing Forensics analysis and respond to the incidents in all […]

Deft X – Digital Evidence & Forensics Toolkit

Born from an idea of Stefano Fratepietro, DEFT (acronym for Digital Evidence & Forensics Toolkit) is a distribution made for Digital Forensics and Incident Response, with the purpose of running live on systems without tampering or corrupting devices (hard disks, pendrives, etc…) connected to the PC/Mac where the boot process takes place. The DEFT system […]

Top Open Source Windows Forensics Tools

We are living in digital age where everything is digital. Day by day more people are using internet. Some uses internet for business some for fun and there are tons of reasons that why I am using internet ? As online users are increasing, online privacy is also creating an issue. Many individuals like black […]