Tuesday, November 12, 2024

Forensics Tools

Best SIEM Tools List For SOC Team – 2024

The Best SIEM tools for you will depend on your specific requirements, budget, and organizational needs. There are several popular and highly regarded SIEM (Security Information and Event Management)...

Live Forensic Techniques To Detect Ransomware Infection On Linux Machines

Ransomware, initially a Windows threat, now targets Linux systems, endangering IoT ecosystems.Linux ransomware employs diverse encryption methods, evading traditional forensics. Still developing, it shows...

p0f – Passive Traffic Analysis OS Fingerprinting and Forensics Tool

P0f is an OS Fingerprinting and Forensics Tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind...

PcapXray – GUI Network Forensics Tool To Analysis a Packet Capture Offline

Network Forensics Tool is often used by security professionals to test the vulnerabilities in the network. With this kali Linux tutorial, we introduce a...

Live Cyber Forensics Analysis with Computer Volatile Memory

The field of computer Forensics analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted in an electronic or magnetic form...

Tracking Photo’s Geo-location to See Where the Photo Was Taken – A Forensic Analysis

This article is about collecting metadata from photographs. Metadata is information that is created for every file's format. Examples of metadata: file created date and...

How to Analyse a PCAP file WITH XPLICO – Network Forensic Analysis Tool

Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering,...

Binwalk – Analyzing Embedded Files and Executable Code with Firmware Images

Binwalk is a device for looking at a given binary image for embedded documents, Analyzing embedded files and executable code. Specifically, it's far designed...

Creating and Analyzing a Malicious PDF File with PDF-Parser Tool

This tool will parse a PDF document to distinguish the central components utilized as a part of the analyzed file. It won't render a...

USB Forensics – Reconstruction of Digital Evidence from USB Drive

Digital Forensics analysis of USB forensics includes preservation, collection, Validation, Identification, Analysis, Interpretation, Documentation, and Presentation of digital evidence derived from digital sources for the...

Most Important Computer Forensics Tools for 2023

Computer Forensics tools are more often used by security industries to test the vulnerabilities in networks and applications by collecting the evidence to find...