CHFI

Understand-the-Importance-of-Network-Forensics

Understand the Importance of Network Forensics

Understand the Importance of Network Forensics in this this article Network Forensics is the implementation of sniffing, recording, acquisition, and analysis of network traffic and event logs to investigate a network security incident. Capturing network traffic over a network is simple in theory, but relatively complex in practice due to many inherent reasons such as the large amount of data flow and complex nature of Internet protocols. Recording network traffic involves a lot of resources. …

Understand the Importance of Network Forensics Read More »

Mac-Forensics

Mac Forensics

Mac Forensics in this article Mac is short for the Macintosh operating systems developed by Apple to support its line of devices and series of personal computers, Mac is one of the most adopted systems across the globe and is also facing increase in number of attacks annually. The investigators must have knowledge of Mac, its process, policies, functions and internal storage patters used by the operating system to be able to perform forensics. This …

Mac Forensics Read More »

Linux-Forensics

Linux Forensics

Linux forensics refers to performing forensic investigation on a Linux operated device. To do so, the investigators should have a good understanding on the techniques required to conduct live analysis; to collect volatile and non-volatile data, along with knowledge of various shell commands and the information they can retrieve. The investigators should also be aware of the Linux log files, their storage and location in the directory, as they are the most important sources of information …

Linux Forensics Read More »

Cache-and-Cookies-and-History-Recorded-in-Web-Browser

Understand Cache,Cookies and History Recorded in Web Browser

This article explain Understand Cache, Cookies as well as History Recorded in Web Browser in forensic investigation. their is different type of tools for analysis also. Windows Forensics Methodology Operating systems use applications called browsers to attach with internet and permit users to access the external servers and cloud data. The browsers save data on the system within the sort of cache, cookies, and history. Investigators can gather this information and analyze it to seek …

Understand Cache,Cookies and History Recorded in Web Browser Read More »

Inside-the-Registry

Inside the Registry

A Windows Registry contains potential information which is of evidential value and can support the forensic analysts in exploring the different aspects of forensic investigation. A forensic analysis in general is performed with a specific agenda in mind. In the forensic investigator’s perspective, it is essential to know the type and significance of information to look for, and also where to find it. Forensic investigations which involve a windows platform vigorously require a careful assessment …

Inside the Registry Read More »

Understanding-EProcess-Structure

Understanding EProcess Structure

Understanding EProcess Structure in Each process on the Windows operating system is associated with an executive process or Eprocess block. It is the basic data structure that stores various attributes of the process and the pointer to the other attributes and data structures related to the process. The investigator can read this data structure. The data structure is essentially a sequence of bytes, with each sequence having a particular meaning. The size and even the …

Understanding EProcess Structure Read More »

Memory-Dump

What is Memory Dump?

MemoryDump or crash dump is a storage space, where the system stores a memory backup, in case of a system failure. The system also creates a memorydump when it does not have enough memory for system operation. This backup enables users to examine the cause of the system crash and helps to know about any errors in the applications or in the operating system. In Windows systems it is also known as the blue screen …

What is Memory Dump? Read More »