The following pages and posts are tagged with:
Title | Type | Excerpt |
---|---|---|
Online Tools to Check a Websites' Reputation | Page | A task requires you to check the reputation of an IP address, domain name and/or URL. |
Forensic Handling of Data on a PC | Page | The Helpline has come into possession of a personal computer with digital evidence |
Android Devices Data Acquisition Procedure | Page | The Helpline has come into possession of a Android device that could be infected or can be use as digital evidence. |
Mobile Data Acquisition Report Guidelines | Page | The Helpline has acquired data from an Android device that could be infected or can be used a digital evidence, and needs to issue a report on the forensic a... |
Data Acquisition Using Android Debug Bridge (ADB) | Page | The Helpline has come into possession of an Android device that could be infected or can be used as digital evidence. |
Forensic Analysis of Videos and Images | Page | Video and images files are sometimes delivered to the Helpline with a request to get information about these files (date of creation, to determine if it coul... |
Host-Based Live Forensics on Windows | Page | The Helpline needs to perform live forensics on a Windows machine using built-in tools. |
Host-Based Live Forensics on Linux/Unix | Page | The Helpline needs to perform live forensics on a Linux/Unix machine using built-in tools. |
MS Office Files static analysis | Page | How to analyze MS Office Files to find signs of malicious behavior. |
PCAP File Analysis with Wireshark to investigate Malware infection | Page | A device shows weird behavior or the user believes they opened a malicious file. The device is a smart phone, making forensics more difficult. |
Static Analysis of APK files | Page | A client received a link to install a suspicious APK. A strange app has shown up on an Android device. |
Tech Platforms Intervention in Legal Cases | Page | A beneficiary requests intervention in pushing platforms to answer requests from law enforcement. |