Search
Digital Forensics
Digital forensics is rapidly growing field of information security. The hacker needs to understand what evidence can be recovered and the security engineer needs to know how to find it.

6 min read
Malware Analysis: Process Injection in the REMCOS RAT
Process injection is one of those stealthy techniques malware loves to use to stay under the radar. By injecting malicious code into...
401 views

1 min read
Hackers-Arise Announces a New Training Program: Digital Forensics and Incident Response (DFIR)!
Many of our aspiring cyberwarriors have been asking for a separate digital forensics and incident response (DFIR) training program and we...
8,755 views

6 min read
Digital Forensics, Part 8: Live Analysis with sysinternals
Welcome back, my aspiring forensic investigators! In this tutorial, we will use another tool that can be used in for live system...
17,241 views

4 min read
Digital Forensics: Hackers-Arise Uncovers Mastermind of Global Scam!
As you know, Hackers-Arise offers a service we call Digital Forensic Investigator for Hire. Most of our cases fit into the following...
8,224 views


5 min read
Digital Forensics, Part 2: Live Memory Acquisition and Analysis
In some cases, the forensic investigator will need to grab an image of the live memory. Remember, RAM is volatile and once the system is...
22,486 views


7 min read
Digital Forensics, Part 5: Analyzing the Windows Registry for Evidence
Although nearly all Microsoft Windows users are aware that their system has a registry, few understand what it does, and even fewer...
48,929 views


3 min read
Digital Forensics, Part 11: Recovering Stored Passwords from the Browser
Welcome back, my aspiring cyber warriors! When conducting a forensic investigation on a suspect's computer, the first step, of course, is...
5,264 views


5 min read
Metasploit Basics, Part 23: Remote Windows Forensics with Metasploit
Welcome back, my Metasploit Cyber Warriors! Although Metasploit is an "exploitation framework" primarily used for hacking and...
3,563 views


3 min read
Digital Forensics, Part 10: Mobile Forensics (Android)
Over the past decade or so, the growth of the mobile market has been the fastest growing segment of the IT industry. We now have portable...
4,362 views


3 min read
Digital Forensics, Part 9: Extracting EXIF Data from Graphics Files
In many cases when a computer, phone, or mobile device is seized for evidence, the system will have graphic images that might be used as...
11,037 views


4 min read
Digital Forensics, Part 7: Browser Forensics
This is the seventh installment in my Digital Forensics series. To read the first 6, please click here. Often, the web browser that a...
6,882 views


3 min read
Digital Forensics, Part 6: Analyzing Windows Pre-fetch Files for Evidence
This is the sixth tutorial in my Digital Forensics series. If you would like to read the previous 5, go the Forenics tab at the top of...
5,689 views

2 min read
Digital Forensics, Part 4: Finding Key Evidence in the Forensic Image
In the previous articles in this series, we captured an forensic image of the suspect's hard drive, we captured a forensic image of the...
8,799 views

3 min read
Digital Forensics, Part 3: Recovering Deleted Files
In the first two parts of this series, we captured a forensically sound image of the hard drive or other storage device and an image of...
38,056 views


5 min read
Digital Forensics, Part 1: Capturing a Forensically Sound Image
Digital forensics is rapidly growing field of information security. The hacker needs to understand what evidence can be recovered and the...
16,673 views