CHFI Course

Anti-Forensics Techniques that Minimize Footprint

Anti-Forensics Techniques that Minimize Footprint

This article is based on Footprint and their Anti-Forensics Techniques like Memory injection and Syscall Proxying, Userland Execve Technique, Syscall proxying, Exploiting Forensics Tools Bugs,Detecting Forensic Tool Activities Memory injection and Syscall Proxying In the buffer over–flow exploit attack, the attackers use buffer overflows as entry to a remote system in order to inject and run code in the address space of a running program, thereby successfully altering the victim program’s behavior. Then, the attacker …

Anti-Forensics Techniques that Minimize Footprint Read More »

Declarant-Unavailable

Declarant Unavailable

Declarant Unavailable in this article explain principle for declarant unavailable and rules 1002,1003 and 1004. Following are the principles for Hearsay Exceptions; if Declarant is Unavailable 1. Definition of unavailability: Unavailability as a witness” includes situations during which the declarant: is exempted by ruling of the court on the bottom of privilege from testifying concerning the topic matter of the declarant’s statement; or persists in refusing to testify concerning the topic matter of the declarant’s …

Declarant Unavailable Read More »

Importance-of-Computer-Forensics-Process

Importance of Computer Forensics Process

Importance of Computer Forensics Process in this article explain computer forensic process and three computer forensic investigation phases . The rapid increase in cybercrimes, ranging from theft of intellectual property to cyber terrorism along with litigations involving large organizations, has made computer forensics necessary. The process has also led to the development of various laws and standards that define cybercrimes, digital evidence, search and seizure, methodology, evidence recovery, and investigation process. The staggering financial losses …

Importance of Computer Forensics Process Read More »