Cyber Forensics Laboratory Vol. 2

$33.00


Get the access to all our courses via Subscription

Subscribe

Category:

Download
File
Preview eForensics Magazine 2022 08 Cyber Forensics Laboratory Vol. 2.pdf

 

Dear Readers,

The time of vacation is behind us and this means the need to return to work. To help you in this duty, we have prepared the second installment of Cyber ​​Forensics Laboratory. Our latest magazine contains information on how to organize and prepare your forensics laboratory, what tools to choose for specific analyses, and how to use these tools. Our wonderful Authors have prepared a wide range of texts, including practical tool tutorials, tips, and comparisons of specific technological solutions.

In the magazine you will find, among others:

  • how to use OSINTGRAM to discover what is hiding behind the back door of Instagram,
  • how to ensure the security of Linux,
  • how to easily prepare a forensic laboratory in your home,
  • how to use CrowdStrike Falcon, which has been an easy-to-implement New Generation Antivirus, SaaS solution that serves endpoints and servers for the main platforms on the market: Linux, Windows, and MAC,
  • how to process computer and mobile sources with Axiom Process, discuss the processing options Axiom provides as well as cover some of the more important features relevant to a forensic examination offered with Axiom Examine.

Interested? Do not wait any longer and reach for this treasury of practical and tool knowledge.

Check out our Table of Contents below for more information about each article (we included short leads for you). 

We hope that you enjoy reading this issue! As always, huge thanks to all the authors, reviewers, to our amazing proofreaders, and of course you, our readers, for staying with us! :)

Regards,

Michalina Szpyrka

and the eForensics Magazine Editorial Team 


Download free magazine preview


TABLE OF CONTENTS


Creating A Forensics Lab

by Atlas Stark 

Nothing is quite as satisfying as getting your hands dirty and working with some hardware, especially when it pertains to setting up your very own DIY digital forensics lab. Imagine being able to perform high level digital forensics on a variety of devices and file systems just like the professionals you read about in blog posts or white papers. Setting up the lab environment is more straightforward than you might think.

The CrowdStrike Falcon Platform - A Brief Analysis And Review

by Rene Hemerly Jasmim and Deivison Pinheiro Franco

The search for effective antivirus tools is constant for businesses and common users. In our current scenario, NGAV (Next Generation Antivirus) antiviruses are becoming popular. To that end, this article brings a quick approach to CrowdStrike Falcon, which has been an easy-to-implement New Generation Antivirus, SaaS solution that serves endpoints and servers for the main platforms on the market: Linux, Windows and MAC. Centralized asset management is offered on the Falcon CrowdStrike platform.

Malware Investigation And Forensics

by Prerit Pathak

With the advent of cybercrime, malware creation has also increased. Malware, basically malicious binaries or executables, are programmed to harm a victim by performing malicious activities such as exfiltrating sensitive data, using system resources to mine cryptocurrencies, etc.

Can The Linux Platform Change Your Security?

by Longinus Timochrnco

Today we will talk about the very important topic "Linux Security", but trust me, we can fight and be united with planning, education and responsibility, we will definitely be a step forward towards digital crime. Life is made of choice, and we determine how long we want to live with it. 

Magnet Forensics, Magnet Axiom - A First Look

by Richard Harding

This article aims to introduce readers to Magnet Axiom, how to process computer and mobile sources with Axiom Process, discuss the processing options Axiom provides as well as cover some of the more important features relevant to a forensic examination offered with Axiom Examine.

How Easily Police IT Forensics Can Recover Microsoft Office From Unallocated Space Using AccessData's FTK Imager

by Adam Karim

At lunchtime on Friday, two masked men broke into a jewelry shop in the centre of Skärholmen. The men pointed guns at the employees and shouted, "If you don't hand over money, we will hurt you.” The staff showed the cash drawer, which was empty, and explained that they no longer handle any cash in the jewelry shop. The men then smashed the glass with the help of a hammer and took with them a variety of expensive items from the jewelry shop.

Nmap

by Kharim H. Mchatta

Nmap is a command line tool that is used for scanning networks for open ports and its associated  services. This is a very powerful tool that is used by cybersecurity professionals for gathering  information about the target. There is different information which can be obtained by running  nmap which includes getting information on the ports that are open, what services are these ports  running, what version of the services is run and finally if the service is vulnerable or not. 

Always On, Always Connected: How Automating Forensic Workflows Can Improve

by Simon Whitburn

Digital forensics has come a long way but despite a great many discussions around automating key processes over the past decade, it remains a largely manual process that requires data to be extracted or supplied to numerous third-party systems. This burdens digital forensic teams and investigators with repetitive tasks and as the data mountain grows and the variety of devices and formats multiply, so too do data backlogs and processing queues. It’s a situation further exacerbated by a growing shortage of skilled DFIR and DF investigators and unless we begin to address the problem, it will almost certainly threaten the integrity of the process. 

Basic And Essential Requirements For Building A Computer Forensics Lab

by Deivison Franco, Daniel Müller, Cleber Soares and Joas Santos

The Internet and other computer resources have also become a means for criminal activities. Regardless of the types of crimes investigated, law enforcement officers seize a large quantity of equipment and media from crime scene containing evidence for investigation. After a forensic examination of the evidence, a forensic report is issued by computer forensic examiners. To recovery and analyze the evidence seized with higher accuracy, a well-structured computer forensic lab is essential. In this article, we present the basic elements of a standard computer forensic lab as well as the tools associated with it, not only in terms of functionalities and aims but also in terms of hardware and software. For the software part, we present commercial and free solutions.

Instagram: There Is Someone Behind The Door

by Wilson Mendes

With the power of decentralized and distributed information, the data, containing rich and intimate information of the citizen, is increasingly accessible. Social networks provide pentabytes of data from thousands of people around the world. Any public information produced from these networks becomes available and can be collected, explored and manipulated to an appropriate audience for the purpose of meeting specific ideals.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023