Windows registry Transaction Logs in forensic analysis
During forensic anaysis, Windows registry data can be useful to discover malicious activity and to determine if and what data may have been stolen from a network.
Continue…During forensic anaysis, Windows registry data can be useful to discover malicious activity and to determine if and what data may have been stolen from a network.
Continue…The malware analyst Karsten Hahn recently published a very interesting video about the analysis of a sample of the well-known malware Ursnif.
Continue…I mean no offense to real piano players but, despite I am a guitarist, I always loved the sound of piano.
Continue…The recent controversies related to new WhatsApp‘s Privacy Policy have lead many users to start looking for new alternatives.
Continue…Recently I’ve already written about Cobalt Strike detection during forensics analysis. However, some followers asked my if it was possibile to perform this activities using Volatility, in order to integrate them in existing analysis workflows.
Continue…I think that music composition is very calming, then, during my Christmas holidays, I tried to relax as much as I could.
Continue…Today I want to briefly take up a topic already addressed in a previous post: analysis of Windows 10 memory dumps using Volatility 2.
Continue…Sometimes, during an incident analysis, you may need to replicate behaviours of a specific host, perhaps already acquired with a forensic method.
Continue…During a forensic analysis on mobile devices, especially when you are not able to perform a full memory acquisition, a network traffic analysis could be useful in order to identify suspicious activities.
Continue…Today I’d like to share a brief list of useful tools I use for OSX analysis.
Continue…