forensic tools and techniques

CISSP Digital Forensics Tools, Techniques, and Procedures Bk1D7T1St4

The organization needs to designate investigators and analysts with the proper training, expertise, and tools to perform digital forensics. These can be internal employees or contractors, external vendors, or a combination of both. These decisions should take into consideration response time, data classification, and sensitivity. The digital forensics team should be made up of people with diverse skillsets, including knowledge of networking principles and protocols, a wide range of security products, and network-based threats and …

CISSP Digital Forensics Tools, Techniques, and Procedures Bk1D7T1St4 Read More »

Anti-Forensics Techniques that Minimize Footprint

Anti-Forensics Techniques that Minimize Footprint

This article is based on Footprint and their Anti-Forensics Techniques like Memory injection and Syscall Proxying, Userland Execve Technique, Syscall proxying, Exploiting Forensics Tools Bugs,Detecting Forensic Tool Activities Memory injection and Syscall Proxying In the buffer over–flow exploit attack, the attackers use buffer overflows as entry to a remote system in order to inject and run code in the address space of a running program, thereby successfully altering the victim program’s behavior. Then, the attacker …

Anti-Forensics Techniques that Minimize Footprint Read More »