How to boot an Encase (E01) image using VirtualBox
Sometimes, during an incident analysis, you may need to replicate behaviours of a specific host, perhaps already acquired with a forensic method.
Continue…Sometimes, during an incident analysis, you may need to replicate behaviours of a specific host, perhaps already acquired with a forensic method.
Continue…During a forensic analysis on mobile devices, especially when you are not able to perform a full memory acquisition, a network traffic analysis could be useful in order to identify suspicious activities.
Continue…Today I’d like to share a brief list of useful tools I use for OSX analysis.
Continue…In order to expand the address space that is effectively usable by a process and to expand the amount of dynamic RAM, modern operating systems use the method known as swapping.
Continue…“Technology is just a tool. In terms of getting the kids working together and motivating them, the teacher is the most important” – Bill Gates
Continue…Several year ago (at least 15), I’ve been involved in a exciting project: the development of a video game. Not as developer, but as musician!
Continue…A simple step-to-step tutorial for iOS full acquisition.
Continue…A brief update on Cobalt Strike detection in forensics analysis, with a couple of new resources.
Continue…Some privacy concerns about Apple Silicon and MacOs Big Sur.
Continue…