New Open-Source Tool Spotlight
Velociraptor is an advanced DFIR (Digital Forensics and Incident Response) tool. It focuses on endpoint monitoring, hunting, and data collection using flexible artifact-based queries. Its scripting language, VQL, allows custom queries tailored for specific investigations. #DigitalForensics #CyberSecurity
Project link on #GitHub
https://github.com/Velocidex/velociraptor
#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity
— P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking
Digital Forensic by Nilakshi Jain, 2019
This book is for those who desire to learn more about investigating and fighting digital crimes. It covers latest challenges faced in digital forensic like email forensic, mobile forensic and cloud forensic. It also sequentially explains disk forensic, network forensic, memory forensic, mobile forensic and cloud forensic.
If you can't explain how it works, what will you do when it doesn't work?
@hacks4pancakes (@dragosinc) will join us on March 19 for our Foundations of DFIR panel!
While that's a few weeks away, you can check out Lesley's blog post on The Shifting Landscape of OT Incident Response which illustrates the importance of specialized incident response and digital forensics in maintaining the security and integrity of OT systems.
Find it here: https://www.dragos.com/blog/the-shifting-landscape-of-ot-incident-response/
If you want to catch Lesley along with panelists @danonsecurity, David Bianco, and Sarah Sabotka for unique insights on bolstering your DFIR foundations, save your spot here: https://www.domaintools.com/webinar-getting-back-to-the-foundations-of-dfir/?utm_source=Mastodon&utm_medium=Social&utm_campaign=DFIR-To-You
Time for a break from asking you fill in our little survey about reliability of computer evidence ( https://forms.gle/ZiXtaE8LoCAY4Vbo6 ).
We've been commissioned to do some work on "judicial malware" - the deployment of something that looks like malware in order to retrieve evidence. What are the questions we should be asking? (and what are your answers?)
It's Monday and if you have a view on how reliable computer evidence is, please tell @DEVCE_CIC here : https://forms.gle/kyr1xUW11TLHwCyU9 or email survey@devce.org #DFIR #DigitalForensics #DigitalEvidence #Law #Academia
If you have a view on how reliable computer evidence is, please tell us here : https://forms.gle/kyr1xUW11TLHwCyU9 or email survey@devce.org #DFIR #DigitalForensics #DigitalEvidence #Law #Academia
We are aware that there are some members of the digital evidence community who may be wary of, unwilling to, or unable to give evidence to the Parliamentary Inquiry into Computer Evidence (https://www.gov.uk/government/news/use-of-computer-evidence-in-court-to-be-interrogated ). To ensure that their views & experiences can be properly represented, we are running a short survey ro capture essential information that we will submit to the Inquiry on behalf of respondents. All information will be anonymised and only used or reproduced with the consent of the contributors.
The survey has been prepared by Angus Marshall with support from Prof. Sarah Morris and Simon Biles, for whose support we are very grateful.
Please do complete the form at https://forms.gle/BwmDytnHT3z8pmCDA . It should only take 10-20 minutes. Or if you prefer to email us: survey@devce.org
Salut les archivistes numériques ! On est en train de vous préparer une petite fiche sur les fichiers système pour booster vos connaissances en #digitalForensics, histoire que vous ignoriez ces fichiers très ennuyeux en connaissance de cause, ou que vous en tiriez le meilleur parti.
Practical Digital Forensics: A Guide for Windows and Linux Users by Akashdeep Bhardwaj & Pradeep Singh & Ajay Prasad, 2024
A comprehensive resource for novice and experienced digital forensics investigators. This guide offers detailed step-by-step instructions, case studies, and real-world examples to help readers conduct investigations on both Windows and Linux operating systems.
@bookstodon
#books
#nonfiction
#DigitalForensics
#Linux
#Windows
Serbian government used Cellebrite to unlock phones, install spyware https://www.helpnetsecurity.com/2024/12/16/serbian-government-used-cellebrite-to-unlock-phones-install-spyware/ #AmnestyInternational #digitalforensics #lawenforcement #Cellebrite #Don'tmiss #Hotstuff #Qualcomm #Android #privacy #spyware #Google #0-day #News
iLEAPP 2.0 just released!!
New report folder structure.
LAVA (LEAPPs Artifacts Viewer Analyzer) data structures added.
Presenting LAVA (beta version) at the Cyber Social Hub online conference next month.
Binaries will be released soon.
Videos on how to make artifacts LAVA compliant will be coming soon.
Thanks to Johann POLEWCZYK, James Habben, Heather Charpentier, John Hyla, Bruno Constanzo, and Kevin Pagano for their work. You are amazing!!!
Advancements in Cybercrime Investigation and Digital Forensics by A. Harisha & Amarnath Mishra & Chandra Singh, 2024
This new volume offers a comprehensive study of the advances that have been made in cybercrime investigations and digital forensics, highlighting the most up-to-date tools that help to mitigate cyber-attacks and to extract digital evidence for forensic investigations to recover lost, purposefully deleted, or damaged files.
In a few minutes: Thomas Chopitea will be presenting "DFIQ - Codifying digital forensic intelligence" at #hacklu2024 @hack_lu #DFIR #DigitalForensics #DFIQ
Generative AI and Digital Forensics by Ravindra Das, 2025
In today’s world, cybersecurity attacks and security breaches are becoming the norm. Unfortunately, we are not immune to it, and any individual or entity is at dire risk. The best and only thing that we can do is to mitigate the risks as much as possible so that they do not happen at all.
@bookstodon
#books
#nonfiction
#cybersecurity
#DigitalForensics
#AI
I published a new blog post - Improve Your Forensic Analyses with hashlookup
For several decades, forensic analyses in cybersecurity have relied on known software hash sources. These sources are not numerous. Most investigators and security researchers use sources like the National Software Reference Library (NSRL) and its Reference Data Set (RDS) to distinguish known files from unknown ones. For several years at CIRCL, it became evident that we were finding it increasingly difficult to sort files using hash databases like NSRL during investigations on compromised systems....
https://www.foo.be/2024/09/Improve_Your_Forensic_Analyses_with_hashlookup
#dfir #forensics #digitalforensics #infosec #opensource #hashlookup #incident #incidentresponse
The article was originally published in French two years ago, it's now translated and updated with some recent changes in hashlookup.
Thanks to @gallypette for the insightful collaboration on the project.