
To study this science, we suggest paying attention to several repositories that collect tools, books, manuals and other useful material. You will find all this in today’s article.
Any science tends to share smaller topics. Let’s guess what classifications forensics is divided into.
Computer forensics – This includes everything related to the search for hacking artifacts on a local computer. Analysis of RAM, hard disk, registry, operating system logs, etc.;
Network forensics — As the name suggests, this is related to research in the field of network stacks – for example, data dump and analysis of network traffic, detection of interesting things such as rat, Reverse shells, backdoor tunnels, etc.;
Forensic data analysis – Intended for analysis of files, data structures, binary sequences left after an attack or used during an intrusion.
Mobile device forensics – deals with everything related to the specifics of data extraction from Android and iOS.
Hardware forensic – Checking of equipment and technical equipment. This direction is the least popular and the most difficult. This includes analyzing low-level data (Microcontroller, Firmware or BIOS), checking certain device functions, such as the frequency range of the Wi-Fi transmitter or the internals of the skimmer installed in the ATM.
To study this science, we suggest paying attention to several repositories that collect tools, books, manuals and other useful material.
Repositories with tools for emulating the actions of attackers, which allow testing the organization’s defense mechanisms.
RAM analysis tools used to detect malicious code and other suspicious activity.
Repositories containing tools and techniques for managing security incidents, including detection, response, and reporting.
Communities and forums where experts share knowledge, experience and news in the field of forensics.
Tools that combine various functions for complex forensic investigations.
A collection of books that cover various aspects of forensics, from basics to specialized areas.
Tools for creating timelines of events that help visualize and analyze the development of incidents.
Tools and techniques for gathering evidence from various sources such as computers, mobile devices and networks.
Videos covering lectures, webinars and demonstrations on various aspects of forensics.
Knowledge bases on various aspects of forensics, including articles, studies and white papers.
Specialized Linux distributions designed for forensic investigations.
Tools that do not fall into other categories, but are useful for conducting forensic investigations.
Guides and action scripts that describe steps for responding to different types of security incidents.
Tools for scanning systems and networks for vulnerabilities and suspicious activity.