Basic Forensic Methodology
Last updated
Last updated
Learn & practice AWS Hacking: Learn & practice GCP Hacking:
This isn't necessary the first step to perform once you have the image. But you can use this malware analysis techniques independently if you have a file, a file-system image, memory image, pcap... so it's good to keep these actions in mind:
if you are given a forensic image of a device you can start analyzing the partitions, file-system used and recovering potentially interesting files (even deleted ones). Learn how in:
Depending on the used OSs and even platform different interesting artifacts should be searched:
If you have very suspicious file, then depending on the file-type and software that created it several tricks may be useful. Read the following page to learn some interesting tricks:
I want to do a special mention to the page:
Keep in mind the possible use of anti-forensic techniques:
Learn & practice AWS Hacking: Learn & practice GCP Hacking:
Check the !
Join the 💬 or the or follow us on Twitter 🐦 .
Share hacking tricks by submitting PRs to the and github repos.