How to perform digital forensics of malicious PDF files? Easily checking if a PDF document has malware or backdoors

The PDF format has become one of the most popular ways to view files, as this format is compatible with all kinds of technological devices, including desktop computers, laptops, electronic tablets and smartphones. Because of this universal presence, threat actors began using these documents to deliver malware and easily deploy other attack variants. This time, […]

How to do digital forensics of a hacked network with TCPDUMP

Digital forensics is one of the most important elements of ethical hacking, as it allows researchers to learn as much as possible about a network affected by cybercriminals. This requires tools capable of performing various specific tasks, including the analysis of network packets. On this occasion, experts from the International Institute of Cyber Security (IICS) […]

How to easily check if DOC, RTF, XLS, PPT, PPTX or PDF file has a malware without antivirus like a digital forensics expert

In most cyberattack variants threat actors use legitimate-looking documents loaded with malware, which is why researchers often say it all starts with a Word file, Power Point presentation, Excel spreadsheet, or even a book downloaded from a free PDF file website. This time, digital forensics experts from the International Institute of Cyber Security (IICS) will […]

CAINE 11 – GNU/Linux Live Distribution For Digital Forensics Project, Windows Side Forensics And Incident Response

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project. Currently, the project manager is Nanni Bassetti (Bari – Italy). CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE […]

Digital forensics tools for Windows 10 Forensics and incident response

Windows is the most common operating system. There are many organizations who prefer windows OS. Windows is also most targeted operating system by hackers, as per ethical hacking researcher of international institute of cyber security. We will show a method through which you can check all the details or view an history of windows operating […]

PlainSight – Open Source Digital Forensics

PlainSight is a versatile computer forensics environment that allows inexperienced forensic practitioners perform common tasks using powerful open source tools. There are many features included with this framework such as Internet Histories by using Pasco to recover Internet Explorer histories, Mork to recover FireFox/Netscape histories and RegRipper to view typed URLs. With this framework you […]

Redline – Digital Forensics and Incident Response Framework

Redline provides host investigative capabilities to users to find signs of malicious activity through memory and file analysis and the development of a threat assessment profile. With Redline, you can: Thoroughly audit and collect all running processes and drivers from memory, file-system metadata, registry data, event logs, network information, services, tasks and web history. Analyze […]

The biggest forensics company pays ransom after cyberattack

According to website security audit specialists, Eurofins, the leading provider firm of forensic analysis had to pay a ransom after a group of malicious hackers attacked them, which in fact paralyzed all its operations. The British firm, which hoards nearly half of this market in Europe, was the victim of a “highly sophisticated ransomware attack” […]

Know the Role of Data Forensics

Sometimes known as computer forensics, data forensics refers to the process of investigating digital data or programs in order to find out how it was created and what it is for. Having said that, data forensics itself is a very broad term, since it covers everything from identifying, preserving, recovering, analyzing, and presenting digital data.  […]

Most Important Computer Forensics Tools for Hackers and Security Professionals

Computer Forensics tools are more often used by security industries to test the vulnerabilities in network and applications by collecting the evidence to find an indicator of compromise and take an appropriate mitigation Steps. Here you can find the Comprehensive Computer Forensics tools list that covers Performing Forensics analysis and respond to the incidents in all […]

Deft X – Digital Evidence & Forensics Toolkit

Born from an idea of Stefano Fratepietro, DEFT (acronym for Digital Evidence & Forensics Toolkit) is a distribution made for Digital Forensics and Incident Response, with the purpose of running live on systems without tampering or corrupting devices (hard disks, pendrives, etc…) connected to the PC/Mac where the boot process takes place. The DEFT system […]

Top Open Source Windows Forensics Tools

We are living in digital age where everything is digital. Day by day more people are using internet. Some uses internet for business some for fun and there are tons of reasons that why I am using internet ? As online users are increasing, online privacy is also creating an issue. Many individuals like black […]

Volatility Workbench – A GUI For Volatility Memory Forensics

Volatility Workbench is a graphical user interface (GUI) for the Volatility tool. Volatility is a command line memory analysis and forensics tool for extracting artifacts from memory dumps. Volatility Workbench is free, open source and runs in Windows.   It provides a number of advantages over the command line version including: No need of remembering […]

Hacking Exposed Computer Forensics,2nd edition

Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own risks. DMCA take down cannot be possible as we are not republishing the books/infringement of code, but we are just hosting the links […]

CAINE 10.0 – GNU/Linux Live Distribution For Digital Forensics Project, Windows Side Forensics And Incident Response

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project. Currently, the project manager is Nanni Bassetti (Bari – Italy). CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE […]

How to become an expert in digital forensics

A review of the interesting work of the experts in digital forensics What exactly does a professional in digital forensics do? In general, experts in digital forensics are computer detectives that collect and analyze evidences of computers, networks and any other type of device with data storage capacities. In their role as Sherlock Holmes, the digital forensics experts will investigate the footprints of the […]

Hindsight – Internet History Forensics For Google Chrome/Chromium

Hindsight is a free tool for analyzing web artifacts. It started with the browsing history of the Google Chrome web browser and has expanded to support other Chromium-based applications (with more to come!). Hindsight can parse a number of different types of web artifacts, including URLs, download history, cache records, bookmarks, autofill records, saved passwords, […]