Forensics for beginners

28 May 2024 3 minutes Author: Lady Liberty

To study this science, we suggest paying attention to several repositories that collect tools, books, manuals and other useful material. You will find all this in today’s article.

They chased

Any science tends to share smaller topics. Let’s guess what classifications forensics is divided into.

  1. Computer forensics – This includes everything related to the search for hacking artifacts on a local computer. Analysis of RAM, hard disk, registry, operating system logs, etc.;

  2. Network forensics — As the name suggests, this is related to research in the field of network stacks – for example, data dump and analysis of network traffic, detection of interesting things such as rat, Reverse shells, backdoor tunnels, etc.;

  3. Forensic data analysis – Intended for analysis of files, data structures, binary sequences left after an attack or used during an intrusion.

  4. Mobile device forensics – deals with everything related to the specifics of data extraction from Android and iOS.

  5. Hardware forensic – Checking of equipment and technical equipment. This direction is the least popular and the most difficult. This includes analyzing low-level data (Microcontroller, Firmware or BIOS), checking certain device functions, such as the frequency range of the Wi-Fi transmitter or the internals of the skimmer installed in the ATM.

To study this science, we suggest paying attention to several repositories that collect tools, books, manuals and other useful material.

Adversary Emulation

Repositories with tools for emulating the actions of attackers, which allow testing the organization’s defense mechanisms.

CLICK HERE

Memory Analysis Tools

RAM analysis tools used to detect malicious code and other suspicious activity.

CLICK HERE

Incident Management

Repositories containing tools and techniques for managing security incidents, including detection, response, and reporting.

CLICK HERE

Communities

Communities and forums where experts share knowledge, experience and news in the field of forensics.

CLICK HERE

All-In-One Tools

Tools that combine various functions for complex forensic investigations.

CLICK HERE

Books

A collection of books that cover various aspects of forensics, from basics to specialized areas.

CLICK HERE

Timeline Tools

Tools for creating timelines of events that help visualize and analyze the development of incidents.

CLICK HERE

Disk Image Creation Tools

Disk imaging tools used for data storage and analysis.

CLICK HERE

Evidence Collection

Tools and techniques for gathering evidence from various sources such as computers, mobile devices and networks.

CLICK HERE

Videos

Videos covering lectures, webinars and demonstrations on various aspects of forensics.

CLICK HERE

Knowledge Bases

Knowledge bases on various aspects of forensics, including articles, studies and white papers.

CLICK HERE

Linux Distributions

Specialized Linux distributions designed for forensic investigations.

CLICK HERE

Other Tools

Tools that do not fall into other categories, but are useful for conducting forensic investigations.

CLICK HERE

Playbooks

Guides and action scripts that describe steps for responding to different types of security incidents.

CLICK HERE

Scanner Tools

Tools for scanning systems and networks for vulnerabilities and suspicious activity.

CLICK HERE

Log Analysis Tools

Log analysis tools. Help detect suspicious activity.

CLICK HERE

Windows Collection

Tools and techniques for gathering evidence from Windows systems.

CLICK HERE

OSX Evidence Collection

Tools and techniques for gathering evidence from macOS systems.

CLICK HERE

Other related articles
Found an error?
If you find an error, take a screenshot and send it to the bot.