Digital forensics

Code Access Security (CAS)

Abstract Security is an essential part of .NET applications and should be taken into consideration from the grass root level. Security is all about protecti

Anti-Forensics 2

For part one, click here[pkadzone zone="main_top"] 1. - Analysis Prevention and Memory Resident Execution The second part of this document examines those t

Paraben’s iRecovery Stick Review

Paraben's iRecovery Stick is a USB flash drive designed to recover deleted data from Apple iOS devices like the iPhone, iPad and iPod touch. The product allo

Anti-forensics - Part 1

This document is a general summary on the most widely used techniques currently to hide or to make unrecoverable digital tracks of a crime in magnetic me

Android: WhatsApp chat forensic analysis

We all love messaging and using IMs on our smartphones to stay in touch with our friends and family. We use various mobile apps like WhatsApp to IM without h

Command line for Windows malware and forensics

Abstract: WMIC has completed more than a decade of existence without having the limelight in terms of its features, though windows command line geeks hav

Forensic Artifact: Malware Analysis in Windows 8

Windows is the most used operating system worldwide. I have met a lot of IT guys in my country and also other computer elites. My discovery was that 90 perc

Virtual Honeypots

At the beginning of this series of tutorials, I would like to note one thing: All the activities that we usually take to increase the security of information

Hexed – Working effectively in the hex editor

I love my hex editor! I mean I really do. As reverse engineers and binary explorers, the hex editor is arguably the most used tool for human binary reconnais

Using Sandboxes For Hostile Program Analysis

Sandboxes Introduction[pkadzone zone="main_top"] If you're reading this article, you have probably heard of a sandbox before. But, in case you haven't, I'll