File | |
---|---|
eForensics_StarterKit_4_2024_PREVIEW.pdf |
Dear Readers,
Digital forensics is a vital component of forensic science, involving the retrieval and examination of digital device material to investigate cybersecurity incidents and computer crimes. In this magazine, you will find inspiration and learn more about the tasks of a computer forensic investigator.
Have you been considering a career in digital forensics but haven't yet discovered the best knowledge source? Or maybe you want to pick up some new investigative methods? You don't need to search any further if you said "yes" to either of these questions. Our talented writers have created excellent tutorials to guide you through particular tasks and clarify how to use the appropriate tools.
Don't wait any longer and get this special StarterKit right away! View our Table of Contents for additional details on each item. We've given you a brief overview of each. We sincerely appreciate your patience. Not only that, but we thank our readers and all the writers, editors, and proofreaders that contributed to this project!
Enjoy reading!
Ewa & eForensics Team
TABLE OF CONTENTS
LEAKSEARCH
JEFF MINAKATA
In this article, we will use LeakSearch to leverage the COMB (Combination of and Many Breaches) data breach database. The COMB breach contains over 3.2 billion email and password combinations, making it a massive database to leverage. Since we are working with breached accounts, I advise that you check with your local laws before installing and giving LeakSearch a try. With that said, COMB is a publicly available database, and we will be working with it from a penetration testing/OSINTsecurity awareness view.
KAMERKA
KATE LIBBY
Kamerka is a tool that leverages open-source intelligence (OSINT) to provide a powerful means of mapping data assets and identifying interesting data points and potential security threats. This essay explores the installation, execution, functionality, applications, and significance of Kamerka in the context of digital forensics. Key features of Kamerka include interactive maps, integration data via API’s, and being open source. The interactive maps can visually represent data and threats, helping investigators include the geographical distribution of that data. Kamerka provides comprehensive insights by integrating data through API’s gathered from multiple sources like Shodan, Twitter, Binary Edge, and Flickr. Being open source, Kamerka allows users to customize and extend its capabilities to meet specific needs. This article describes how to install and run Kamerka in the cloud so it can be accessed from anywhere. This installation is a walkthrough of Kamerka features, and I will provide you with a path to installing and running Kamerka successfully.
A PRACTICAL GUIDANCE AND TOOLS FOR DIGITAL FORENSICS INVESTIGATIONS
THARAKA SINGHARAGE
In the modern world, digital crime has become an increasingly prevalent topic. Social engineering, phishing, ransomware, and malware attacks are major concerns for corporate data security worldwide. However, the digital forensics investigation process plays a vital role in gathering and analyzing data that can be used in criminal cases or legal proceedings. To conduct a comprehensive forensic investigation, it’s essential to understand successful digital forensic models and tools. In this article, I’ll explore the history of digital forensics and some open-source tools available for investigations, highlighting their capabilities to provide practical guidance for more effective and comprehensive investigations.
THREE TOOLS I USE FOR FORENSIC INVESTIGATIONS AND OSINT
ALAMEEN KARIM MERALI
My beginnings in Digital Forensics were mostly inspired by a figure known as “D4RKR4BB1T47.” This figure motivated me to delve deeper into the Blue Teaming realm. At that time, I was primarily involved in the Red Teaming realm, but in 2017, a teacher of mine from the military-inspired me further. He introduced me to different tools, including Passware Kit Forensics. He is also one of the main hackers responsible for hacking the US White House during President Obama's time.
A LARGE LANGUAGE MODEL IN DIGITAL FORENSICS: INTRODUCING BELKAGPT
YURI GUBANOV
Large language models (LLMs) are one of today’s most buzzing artificial intelligence (AI) technologies, and they are making waves in many industries. Trained in diverse text sources, from scientific works and programming code to blog posts and forum discussions, they effectively grasp and reproduce the various ways we communicate information. Even though their capabilities are still far from embracing all the tasks human intelligence can handle, they have a significant advantage—they can do them much faster. In digital forensics and cyber incident response, where most data is stored in text format, LLMs have great potential for enhancing and accelerating evidence discovery. With this idea in mind, Belkasoft engineers created BelkaGPT, the first offline AI assistant built into a digital forensics tool. In this article, we will cover all you need to know about BelkaGPT and show examples of its usage.
FORENSIC IMAGE ACQUISITION USING PALADIN
PAULO PEREIRA, DFIR, PHD
The Paladin Forensic Suite is a Linux platform that brings together free tools for digital forensic analysis. On page 4 of the Quick Start Guide, you will find the precise definition of this platform: “PALADIN is a bootable forensic Linux distribution based on Ubuntu and is developed and provided as a courtesy by SUMURI. The boot process has been modified to assure that the internal or external media of computers and devices are not modified or mounted. PALADIN is available as ISO file which can be used to make a bootable DVD or USB. Once booted, the user will find a host of precompiled open-source forensic tools that can be used to perform various tasks.” Paladin Forensic is based on Ubuntu: “PALADIN Forensic is a modified “live” Linux distribution based on Ubuntu that simplifies various forensics tasks in a forensically sound manner via the PALADIN Toolbox.”
GETTING STARTED IN CYBER SECURITY FORENSICS WITH AI AND CHATGPT
ISRAEL TORRES
Cyber security forensics, or digital forensics, is a crucial field within cyber security, focusing on the identification, preservation, analysis, and presentation of digital evidence. With the advent of pragmatically applied AI and tools like ChatGPT, embarking on this journey has become more accessible, if not demanding, than ever. This article delves into how AI and ChatGPT can facilitate your learning in cyber security forensics, the importance of understanding foundational concepts, and the benefits of leveraging modern resources for continuous upskilling.
FROM SCI-FI TO CRIME-SOLVING: HOW AI IS TRANSFORMING DIGITAL FORENSICS FOR LAW ENFORCEMENT
HARSH BEHL, VICE PRESIDENT OF PRODUCT MANAGEMENT, DFIR AT EXTERRO
Imagine a world where detectives have access to a high-tech assistant that can sift through mountains of digital data in seconds, uncover hidden evidence with pinpoint accuracy, and even predict where crimes might happen next. This isn’t the plot of a futuristic sci-fi movie—it’s the reality being created by AI in digital forensics today. AI is revolutionizing how law enforcement agencies handle the ever-growing volume and complexity of digital evidence, making investigations faster, more accurate, and more efficient. Let’s dive into the fascinating world of AI in digital forensics and explore how it’s transforming the landscape of criminal investigations.
PROBLEM SOLVING DURING DIGITAL FORENSIC INVESTIGATIONS
EXTERRO TEAM
One of the most dangerous misconceptions among newer digital forensic investigators, examiners, and analysts is treating digital forensics like maths, assuming each case, artifact, and problem follows a set pattern of actions leading to a definitive result. While this is often a risk even for experienced investigators, most investigators will miss important investigation and factual information on occasion. However, investigators who chronically suffer from this misconception will quickly find themselves in search of a new calling. Among the many critical skills in digital forensics, flexibility and problem-solving are crucial.
INTERVIEW WITH GABRIEL CARVALHAES
EFORENSICS TEAM
Cyber Security professional has been working in the field since 2021. I focused on SOC workflow and Incident Response procedures while deploying and managing EDR and SIEM solutions for several clients.
>>If you want to buy this magazine, click here <<
>>If you are a subscriber, download your magazine here<<
>>If you want to see PREVIEW and read free article, download your Preview here<<
File | |
---|---|
eForensics_StarterKit_4_2024_PREVIEW.pdf |