Search
Digital Forensics
Digital forensics is rapidly growing field of information security. The hacker needs to understand what evidence can be recovered and the security engineer needs to know how to find it.
1 min read
Hackers-Arise Announces a New Training Program: Digital Forensics and Incident Response (DFIR)!
Many of our aspiring cyberwarriors have been asking for a separate digital forensics and incident response (DFIR) training program and we...
8,673 views
6 min read
Digital Forensics, Part 8: Live Analysis with sysinternals
Welcome back, my aspiring forensic investigators! In this tutorial, we will use another tool that can be used in for live system...
17,078 views
4 min read
Digital Forensics: Hackers-Arise Uncovers Mastermind of Global Scam!
As you know, Hackers-Arise offers a service we call Digital Forensic Investigator for Hire. Most of our cases fit into the following...
8,115 views
5 min read
Digital Forensics, Part 2: Live Memory Acquisition and Analysis
In some cases, the forensic investigator will need to grab an image of the live memory. Remember, RAM is volatile and once the system is...
22,296 views
7 min read
Digital Forensics, Part 5: Analyzing the Windows Registry for Evidence
Although nearly all Microsoft Windows users are aware that their system has a registry, few understand what it does, and even fewer...
48,410 views
3 min read
Digital Forensics, Part 11: Recovering Stored Passwords from the Browser
Welcome back, my aspiring cyber warriors! When conducting a forensic investigation on a suspect's computer, the first step, of course, is...
5,202 views
5 min read
Metasploit Basics, Part 23: Remote Windows Forensics with Metasploit
Welcome back, my Metasploit Cyber Warriors! Although Metasploit is an "exploitation framework" primarily used for hacking and...
3,538 views
3 min read
Digital Forensics, Part 10: Mobile Forensics (Android)
Over the past decade or so, the growth of the mobile market has been the fastest growing segment of the IT industry. We now have portable...
4,269 views
3 min read
Digital Forensics, Part 9: Extracting EXIF Data from Graphics Files
In many cases when a computer, phone, or mobile device is seized for evidence, the system will have graphic images that might be used as...
10,947 views
4 min read
Digital Forensics, Part 7: Browser Forensics
This is the seventh installment in my Digital Forensics series. To read the first 6, please click here. Often, the web browser that a...
6,856 views
3 min read
Digital Forensics, Part 6: Analyzing Windows Pre-fetch Files for Evidence
This is the sixth tutorial in my Digital Forensics series. If you would like to read the previous 5, go the Forenics tab at the top of...
5,629 views
2 min read
Digital Forensics, Part 4: Finding Key Evidence in the Forensic Image
In the previous articles in this series, we captured an forensic image of the suspect's hard drive, we captured a forensic image of the...
8,754 views
3 min read
Digital Forensics, Part 3: Recovering Deleted Files
In the first two parts of this series, we captured a forensically sound image of the hard drive or other storage device and an image of...
37,821 views
5 min read
Digital Forensics, Part 1: Capturing a Forensically Sound Image
Digital forensics is rapidly growing field of information security. The hacker needs to understand what evidence can be recovered and the...
16,496 views