Новости компьютерной криминалистики

How to mount Mac APFS images in Windows

Mounting an APFS image in Linux

Volatility plugin to extract BitLocker Full Volume Encryption Keys

Database Reverse Engineering

ADRecon Overview

A List of Incident Response sources

  • Aaron at DigitalResidue provides a primer on virtual memory and explains a few Volatility plugins
    damn blogger.com

Mobile Forensic Process: Steps and Types

Safari Plugin Forensics – com.apple.Safari.plist

Practical Exercise – Image Carving

Automating the detection of Mimikatz with ELK

Working With Sysmon Configurations Like a Pro Through Better Tooling

Setting your Threat Hunting Calendar for 2018

Threat Hunting with Bro

Statistical Methods for Analyzing Event Time-Series Data in Digital Forensics

Malware Analysis – Unpack and Decompile Python-to-Exe Malware

Lab Setup – Setting up Python, Pip and Uncompyle6

New Python-Based Crypto-Miner Botnet Flying Under the Radar

Threat Profile: RokRAT

How keyloggers works: a simple example of keyboard hooking using Python

Triton: What You Need to Know

Building a Lab Pt.2 Software

Legal Email Collection

Magnet Forensics in 2017 – A Look Back by the Numbers

iCloud Drive can strip (meta)data from your documents