Digital Forensics And Malware Analysis

Introduction

Related Work

Trojan

Windows Forensics

  • It helps to recover, analyze, and preserve computer and related materials in such a manner that it helps the investigation agency to present them as evidence in a court of law.
  • It helps to postulate the motive behind the crime and the identity of the main culprit.
  • Designing procedures at a suspected crime scene which helps you to ensure that the digital evidence obtained is not corrupted.
  • Data acquisition and duplication: Recovering deleted files and deleted partitions from digital media to extract the evidence and validate them.
  • Helps you to identify the evidence quickly, and also allows you to estimate the potential impact of the malicious activity on the victim
  • Producing a computer forensic report which offers a complete report on the investigation process.
  • Preserving the evidence by following the chain of custody.

Malware Forensics

Chapter 6

Analysis

Conclusion

References

--

--

--

Cyber Security Researcher https://twitter.com/Computeus7

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Firefox Browser Settings, Configuration, and Add-Ons/Extensions for Privacy, Security, and OSINT…

Security Token Market Report: March 2022

eJPT review

{UPDATE} Noi Thu Hack Free Resources Generator

Secret Codes That Unlock Hidden Features on Your Phone

Cybersecurity attacks surge as Ukraine-Russia war rages on. Here’s how to protect yourself

Your LastPass(word) ever at Harvard?

How NSM Tokens Work in NOSIM RAN?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ahmet PAYASLIOĞLU

Ahmet PAYASLIOĞLU

Cyber Security Researcher https://twitter.com/Computeus7

More from Medium

CVE — 2020–1472 Zerologon Vulnerability Exploitation & Remediation

Echoes of Log4Shell

The Weekly Threat 2–15–2022

SOC143 — Password Stealer Detected (Letsdefend.io) step-by-step analysis