Interview with Paulo Henrique Pereira
Paulo Henrique Pereira is a CyberSec Professional and Digits3c Founder working on malware analysis. Digits3c is his small intel company …
A Technical Analysis of Brazilian Electronic Voting Machines
For several years, there has been technical discussion about the electronic voting machines system, but when we talk about the system, it is not about the operating system used but about the technical process adopted.
Unusual Emails: Investigating
For this article, we will be performing an OSINT investigation on an email that was sent to see what information we can find by verifying parts of the email’s content. This is a scenario based on real email investigations. As with any investigation, I do recommend exercising precaution (use a VM, sock puppet accounts, VPN, etc.). In terms of this article, you can assume that the previously mentioned precautions are already being exercised.
Browser Forensics (W57)
The course is aimed at allowing investigators to know the inner workings of the most used and well-known browsers from a digital forensics perspective. Nowadays, everything is done using the web. Most applications are web-based, which led to the importance of browser forensics for any digital forensic case. The interesting thing about browser forensics is the amount of information that you can extract and draw for a case.
The Challenges of Collecting Evidence
Mobile devices such as smartphones have operating systems such as Android and iOS that allow for the installation of third-party applications that operate with restrictions of the operating system such as application isolation and other memory demands. This paper will explore the challenges of working with different operating systems while collecting evidence, and explain chipping off, live and postmortem mobile forensic analyses.Â
HOW TO INVESTIGATE FILES WITH FTK IMAGER
by Mark Stam The Master File Table or MFT can be considered one of the most important files in …
Finding Advanced Malware Using Volatility
FINDING ADVANCED MALWARE USING VOLATILITY by Monnappa Ka What you should know Basic understanding of malware Knowledge of operating system …
Installing Autopsy 4.6.0 on linux | by Christian Kisutsa
Installing Autopsy 4.6.0 on linux by Christian Kisutsa Autopsy is a digital forensics tool that needs no introduction. It has …
Windows Registry extraction with FTK Imager [FREE COURSE CONTENT]
There are several ways to perform an extraction from the Windows Registry, let’s see some of the most useful. This …
Forensic Investigation of Storage Media
Tools and Procedures for Forensic Investigation of Storage Media Deivison Franco, Cleber Soares, Daniel Müller, and Joas Santos Digital data and …
Setting up a report template for OSINT investigations [COURSE MODULE 0]
In this short little video our instructor Josh presents his template for OSINT investigations. You can see what sections are …
Introduction to Mobile Forensics
Lesson one Tutorial 1. Introduction to Mobile Forensics of the online course "Advanced Smartphone Forensics" Check here >> Mobile Forensics …
Setting up Security Onion at home | By Z3R0th
Setting up Security Onion at home First off, what exactly is Security Onion and why do I care about this? …
ELA Photo Forensics
By: Pierluigi Paganini from Infosec Institute Error Level Analysis is a forensic method to identify portions of an image with …
Interview with Paulo Henrique Pereira
Paulo Henrique Pereira is a CyberSec Professional and Digits3c Founder working on malware analysis. Digits3c is his small intel company …
A Technical Analysis of Brazilian Electronic Voting Machines
For several years, there has been technical discussion about the electronic voting machines system, but when we talk about the system, it is not about the operating system used but about the technical process adopted.
Unusual Emails: Investigating
For this article, we will be performing an OSINT investigation on an email that was sent to see what information we can find by verifying parts of the email’s content. This is a scenario based on real email investigations. As with any investigation, I do recommend exercising precaution (use a VM, sock puppet accounts, VPN, etc.). In terms of this article, you can assume that the previously mentioned precautions are already being exercised.
The Challenges of Collecting Evidence
Mobile devices such as smartphones have operating systems such as Android and iOS that allow for the installation of third-party applications that operate with restrictions of the operating system such as application isolation and other memory demands. This paper will explore the challenges of working with different operating systems while collecting evidence, and explain chipping off, live and postmortem mobile forensic analyses.Â

Browser Forensics (W57)
The course is aimed at allowing investigators to know the inner workings of the most used and well-known browsers from a digital forensics perspective. Nowadays, everything is done using the web. Most applications are web-based, which led to the importance of browser forensics for any digital forensic case. The interesting thing about browser forensics is the amount of information that you can extract and draw for a case.
Cloud Forensics (W56)
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each location being a data center. The nature of cloud computing – particularly cloud service provider management and distribution over multiple locations – makes forensic investigations difficult and seemingly impossible. Data centers alone can be a separate forensic discipline. This course merges cloud technology with sound forensic processes and principles to effectively conduct cloud forensic investigations using Amazon Web Services as a case study example.
Windows Forensics (W55)
At the end of the training, the participants will be able to reach the level of knowledge to examine devices with Windows operating systems for the purpose of detecting suspicious activity. The course will focus on Windows 10 Operating System, but we know that there are a lot of common things with server operating systems. So Windows Server systems also could be our evidence source. The course’s material will also apply to Windows 11, as there are no changes compared to Windows 10 when looking from a forensics perspective.Â
Natural Language Processing for OSINT & Threat Analysis (W54)
In this course, we apply Natural Language Processing to cyber threat analysis and OSINT, to assess and analyze data gained …
