Search
Digital Forensics
Digital forensics is rapidly growing field of information security. The hacker needs to understand what evidence can be recovered and the security engineer needs to know how to find it.

Malware Analysis: Process Injection in the REMCOS RAT
Process injection is one of those stealthy techniques malware loves to use to stay under the radar. By injecting malicious code into...
6 min read
654 views

Hackers-Arise Announces a New Training Program: Digital Forensics and Incident Response (DFIR)!
Many of our aspiring cyberwarriors have been asking for a separate digital forensics and incident response (DFIR) training program and we...
1 min read
8,803 views

Digital Forensics, Part 8: Live Analysis with sysinternals
Welcome back, my aspiring forensic investigators! In this tutorial, we will use another tool that can be used in for live system...
6 min read
17,398 views

Digital Forensics: Hackers-Arise Uncovers Mastermind of Global Scam!
As you know, Hackers-Arise offers a service we call Digital Forensic Investigator for Hire. Most of our cases fit into the following...
4 min read
8,288 views


Digital Forensics, Part 2: Live Memory Acquisition and Analysis
In some cases, the forensic investigator will need to grab an image of the live memory. Remember, RAM is volatile and once the system is...
5 min read
22,744 views


Digital Forensics, Part 5: Analyzing the Windows Registry for Evidence
Although nearly all Microsoft Windows users are aware that their system has a registry, few understand what it does, and even fewer...
7 min read
49,373 views


Digital Forensics, Part 11: Recovering Stored Passwords from the Browser
Welcome back, my aspiring cyber warriors! When conducting a forensic investigation on a suspect's computer, the first step, of course, is...
3 min read
5,331 views


Metasploit Basics, Part 23: Remote Windows Forensics with Metasploit
Welcome back, my Metasploit Cyber Warriors! Although Metasploit is an "exploitation framework" primarily used for hacking and...
5 min read
3,593 views


Digital Forensics, Part 10: Mobile Forensics (Android)
Over the past decade or so, the growth of the mobile market has been the fastest growing segment of the IT industry. We now have portable...
3 min read
4,414 views

Reverse Engineering Malware, Part 3: IDA Pro Introduction
Welcome back to my Reverse Engineering Malware course! This course is designed for those of you who want to ascend to the pinnacle of...
6 min read
9 views


Digital Forensics, Part 9: Extracting EXIF Data from Graphics Files
In many cases when a computer, phone, or mobile device is seized for evidence, the system will have graphic images that might be used as...
3 min read
11,090 views


Digital Forensics, Part 7: Browser Forensics
This is the seventh installment in my Digital Forensics series. To read the first 6, please click here. Often, the web browser that a...
4 min read
6,925 views


Digital Forensics, Part 6: Analyzing Windows Pre-fetch Files for Evidence
This is the sixth tutorial in my Digital Forensics series. If you would like to read the previous 5, go the Forenics tab at the top of...
3 min read
5,727 views

Digital Forensics, Part 4: Finding Key Evidence in the Forensic Image
In the previous articles in this series, we captured an forensic image of the suspect's hard drive, we captured a forensic image of the...
2 min read
8,829 views

Digital Forensics, Part 3: Recovering Deleted Files
In the first two parts of this series, we captured a forensically sound image of the hard drive or other storage device and an image of...
3 min read
38,278 views


Digital Forensics, Part 1: Capturing a Forensically Sound Image
Digital forensics is rapidly growing field of information security. The hacker needs to understand what evidence can be recovered and the...
5 min read
16,771 views