Wilson Mendes OfficialNew Edition

Cryptography and the Frontier of Privacy

This article seeks to provide an in-depth exploration of the applications of cryptography in the context of cybersecurity. We'll cover a variety of complex and essential topics, including symmetric and asymmetric key cryptography, encryption algorithms, authentication protocols, digital signatures, and key management. In addition, we will examine practical use cases where encryption plays a critical role in mitigating cyberthreats, such as man-in-the-middle attacks, data tampering, and identity theft, and the contradictions with GDPR and LGPD regulations that have angered governments and law enforcement.

Sep 01,2023

36 min read

Israel Torres OfficialNew Edition

Forensic Fun with Cryptographic DataFrames using Python

This is a journey into clever and interesting ways to apply cryptographic DataFrames 1 for forensic/anti-forensic purposes using Python3. You'll learn to work with cryptographic DataFrames for interesting ulterior motives using Python3.

Sep 01,2023

20 min read

eForensicsmag Team OfficialNew Edition

Interview with Chirath De Alwis

I would like to identify myself as a person who loves doing research in the cybersecurity domain and also loves sharing my knowledge and research findings with the community for the betterment of the community. 

Sep 01,2023

7 min read

Hans Henseler OfficialNew Edition

Unraveling Digital Mysteries: How AI Copilots can Revolutionize Digital Forensic Investigations

Instead of merely focusing on the limitations or potential pitfalls of Large Language Models (LLMs), we ought to explore their promise. Retrieval-Augmented Generation (RAG) is one such promising frontier. By coupling real-time data retrieval with the robust capabilities of generative models, RAG offers a compelling case for the next evolutionary step in digital forensics. This article emphasizes not just the challenges, but also the transformative potential of AI for forensic experts and investigative detectives alike.

Sep 01,2023

6 min read

File Carving – What It Is and How to Get Started

File carving is a skill any forensic examiner will likely find themselves in need of at some point in their career, whether to recover deleted or damaged files, analyse data within an unallocated area of a storage device or work with fragmented data, understanding this technique is an almost certainty. This article aims to introduce the subject of file carving to forensic examiners, look at the difference between file carving and file recovery, demonstrate basic methods to carve files within a Windows and Linux environment and discuss some of the more advanced elements of file and data carving.

Feb 29,2024

31 min read

Enhance Visibility and Detection on Linux with Sysmon

Linux-based systems are the host operating system for cloud hosts, application servers, and a wide variety of internet of things (IoT) devices. Like any other operating system, it is susceptible to attacks. Sysmon for Linux is one of the famous Sysinternals tools available on Linux, improving host-based visibility and making detection and response to threats more efficient.

Feb 29,2024

8 min read

Adam Karim Official

Password Cracking by Police’s Digital Forensics Lab.

On September 15, a man was found shot dead; he was found at a popular swimming spot in Liljeholmen in Stockholm. The suspected murder weapon was found in a grove of trees not far from the murder scene. The coroner determined that the victim was murdered on September 13 between 4:00 PM and 6:00 PM.

Feb 29,2024

9 min read

Deleted Chat Case Study

Cybersecurity as a domain is proving to be a lifesaver in various professional and personal aspects today. Cybersecurity offers a range of preventive measures that undeniably protect firms and individuals. However, in many such instances, cybersecurity companies enabled troubleshooting cybercrime cases.

Feb 29,2024

7 min read

DFIR in AWS (W63)

This course provides a crucial skill set in securing AWS environments. In today's digital landscape, understanding digital forensics, incident response, and automation in AWS is essential for safeguarding data and infrastructure. This course offers hands-on experience, making it an invaluable asset for those eager to enhance their cybersecurity expertise and stay ahead in the dynamic field of cloud security.

Jan 26,2024

12 min read

Deepfake Audio: A Comprehensive Study in Digital Forensics Course Online (W62)

This course is aimed at presenting an elementary yet comprehensive picture of the field of digital audio forensics, with the implied hope that it will afford the participant useful theoretical and practical knowledge of the field and its various aspects.

Aug 01,2023

79 min read

Micro-drone Warfare: Cybersecurity Implications and Countermeasures (W61)

"Micro-drone Warfare: Cybersecurity Implications and Countermeasures" is an advanced course designed for digital forensics professionals seeking to understand the cybersecurity challenges posed by the increasing use of micro-drones in modern warfare. The course provides an in-depth exploration of micro-drone technologies, their role in cyber threats, and the countermeasures necessary to mitigate these threats. Learners will delve into the various types and capabilities of micro-drones, their communication and networking technologies, and the associated cybersecurity vulnerabilities. The course covers risk assessment and threat modeling for micro-drone systems, analysis of real-world micro-drone warfare scenarios, and the development of defense strategies against potential cyber attacks. Additionally, the course addresses the legal and policy frameworks governing micro-drone warfare cybersecurity, including ethical considerations, privacy implications, and international regulations. The course is led by Rhonda Johnson, a seasoned educator and Ph.D. student specializing in Cybersecurity. Prior knowledge of computer networks, cybersecurity principles, operating systems, basic electronics, and wireless communication is recommended. The course employs tools such as Drone Simulators and Drone Performance Evaluation Tools for practical learning.

Jun 26,2023

17 min read

Kunal Dutt Course

Data Integrity And Evidence Handling in Digital Forensics - Course Online (W60)

The course is intended for individuals from the IT industry as well as those outside of it who have some knowledge of cybersecurity. Basic concepts of cybersecurity are required. During the course, participants will acquire skills related to: Understanding digital forensics, including its scope, relevance in investigations, and legal and ethical considerations. Concepts of data integrity and its significance in digital forensics. They will learn about various threats to data integrity and techniques for ensuring its preservation throughout the forensic process. Principles of evidence handling, including chain of custody, documentation, and the importance of maintaining the integrity of evidence. Legal and ethical considerations related to digital evidence handling. This includes understanding privacy and confidentiality considerations and the role of expert witness testimony in courtroom presentations. Data acquisition techniques for different types of digital devices. They will learn about disk imaging, integrity verification, and the use of hash functions in maintaining data integrity. Techniques for analyzing and examining digital evidence, including file system analysis, data recovery, reconstruction techniques, and metadata analysis. The course also includes practical application of various tools and technologies used in digital forensics, such as Autopsy, The Sleuth Kit (TSK), Volatility, Plaso, Wireshark, Bulk Extractor, OSForensics, and Autopsy Browser. At the end of the course, a final exam is planned consisting of multiple-choice questions on the concepts and fundamentals arising from the course outcomes, along with practical tasks.

Jun 12,2023

14 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023