Новости компьютерной криминалистики
How to mount Mac APFS images in Windows
Mounting an APFS image in Linux
Volatility plugin to extract BitLocker Full Volume Encryption Keys
A List of Incident Response sources
- Aaron at DigitalResidue provides a primer on virtual memory and explains a few Volatility plugins
damn blogger.com
Mobile Forensic Process: Steps and Types
Safari Plugin Forensics – com.apple.Safari.plist
Practical Exercise – Image Carving
- ClearSky Research Team have released their Cyber Intelligence Summary Report for 2017.
Cyber Intelligence 2017 Summary Report
Automating the detection of Mimikatz with ELK
Working With Sysmon Configurations Like a Pro Through Better Tooling
Setting your Threat Hunting Calendar for 2018
Statistical Methods for Analyzing Event Time-Series Data in Digital Forensics
Malware Analysis – Unpack and Decompile Python-to-Exe Malware
Lab Setup – Setting up Python, Pip and Uncompyle6
New Python-Based Crypto-Miner Botnet Flying Under the Radar
How keyloggers works: a simple example of keyboard hooking using Python
Magnet Forensics in 2017 – A Look Back by the Numbers
iCloud Drive can strip (meta)data from your documents