Digital Forensics And Malware Analysis

Introduction

Related Work

Trojan

Windows Forensics

  • It helps to recover, analyze, and preserve computer and related materials in such a manner that it helps the investigation agency to present them as evidence in a court of law.
  • It helps to postulate the motive behind the crime and the identity of the main culprit.
  • Designing procedures at a suspected crime scene which helps you to ensure that the digital evidence obtained is not corrupted.
  • Data acquisition and duplication: Recovering deleted files and deleted partitions from digital media to extract the evidence and validate them.
  • Helps you to identify the evidence quickly, and also allows you to estimate the potential impact of the malicious activity on the victim
  • Producing a computer forensic report which offers a complete report on the investigation process.
  • Preserving the evidence by following the chain of custody.

Malware Forensics

Chapter 6

Analysis

Conclusion

References

Cyber Security Researcher https://twitter.com/Computeus7

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

LAPS for preventing credential theft in a Windows domain

#Cybersecurity > How do you secure your computer physically?

Chain computer

Watch Out for People Trying to Steal Your Credentials

{UPDATE} Living Legends Hack Free Resources Generator

How I’m learning about Information Security

Platform for Regulatory Compliance & Ethical Marketing

Similarities and Differences: FedRAMP, FISMA, and CMMC

Introducing — Meaty Promotion Program

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ahmet PAYASLIOĞLU

Ahmet PAYASLIOĞLU

Cyber Security Researcher https://twitter.com/Computeus7

More from Medium

SIEM Lab Tutorial in Azure Sentinel

The Most Prevalent Ransomware TTP — MITRE ATT&CK T1486 Data Encrypted for Impact

Alina POS Malware Analysis

Paths And Filesystem Accessors