Forensics Tools Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/category/forensics-tools/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Tue, 03 Sep 2024 07:58:43 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png Forensics Tools Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/category/forensics-tools/ 32 32 Best SIEM Tools List For SOC Team – 2024 https://gbhackers.com/best-siem-tools/ https://gbhackers.com/best-siem-tools/#respond Mon, 06 May 2024 14:10:47 +0000 https://gbhackers.com/?p=52478 The Best SIEM tools for you will depend on your specific requirements, budget, and organizational needs. There are several popular and highly regarded SIEM (Security Information and Event Management) tools available in the market What is SIEM? A security information and event management (SIEM) system is the foundation of security processes in the modern security […]

The post Best SIEM Tools List For SOC Team – 2024 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Best SIEM Tools List For SOC Team – 2024 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/best-siem-tools/feed/ 0
Live Forensic Techniques To Detect Ransomware Infection On Linux Machines https://gbhackers.com/linux-ransomware-detection-live-forensics/ https://gbhackers.com/linux-ransomware-detection-live-forensics/#respond Tue, 02 Apr 2024 08:14:45 +0000 https://gbhackers.com/?p=86698 Ransomware, initially a Windows threat, now targets Linux systems, endangering IoT ecosystems. Linux ransomware employs diverse encryption methods, evading traditional forensics.  Still developing, it shows potential for Windows-level impact. Early awareness allows for assessing IoT security implications. The following cybersecurity analysts from Edinburgh Napier University recently unveiled live forensic techniques to detect ransomware infection on […]

The post Live Forensic Techniques To Detect Ransomware Infection On Linux Machines appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Live Forensic Techniques To Detect Ransomware Infection On Linux Machines appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/linux-ransomware-detection-live-forensics/feed/ 0
p0f – Passive Traffic Analysis OS Fingerprinting and Forensics Tool https://gbhackers.com/os-fingerprinting-forensics-tool/ https://gbhackers.com/os-fingerprinting-forensics-tool/#respond Sun, 09 Jul 2023 09:39:00 +0000 https://gbhackers.com/?p=4176 P0f is an OS Fingerprinting and Forensics Tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way. Version 3 is a complete rewrite of the original codebase, incorporating a significant number […]

The post p0f – Passive Traffic Analysis OS Fingerprinting and Forensics Tool appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post p0f – Passive Traffic Analysis OS Fingerprinting and Forensics Tool appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/os-fingerprinting-forensics-tool/feed/ 0
PcapXray – GUI Network Forensics Tool To Analysis a Packet Capture Offline https://gbhackers.com/pcapxray-network-forensics-tool/ https://gbhackers.com/pcapxray-network-forensics-tool/#respond Tue, 04 Jul 2023 19:16:00 +0000 https://gbhackers.com/?p=17298 Network Forensics Tool is often used by security professionals to test the vulnerabilities in the network. With this kali Linux tutorial, we introduce a Comprehensive tool PcapXray to analyze the pcap file. The tool plots hosts in the network, network traffic, highlight important traffic and Tor traffic as well as potentially malicious traffic. The tool […]

The post PcapXray – GUI Network Forensics Tool To Analysis a Packet Capture Offline appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post PcapXray – GUI Network Forensics Tool To Analysis a Packet Capture Offline appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/pcapxray-network-forensics-tool/feed/ 0
Live Cyber Forensics Analysis with Computer Volatile Memory https://gbhackers.com/live-forensics-analysis-with-computer-volatile-memory/ https://gbhackers.com/live-forensics-analysis-with-computer-volatile-memory/#respond Sat, 01 Jul 2023 06:23:13 +0000 https://gbhackers.com/?p=9033 The field of computer Forensics analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted in an electronic or magnetic form (that is, digital evidence). Forensics Analysis – Volatile Data: How to Collect Volatile Data: Acquisition of live Volatile Memory: Run the tool as an administrator and start the capture. Dump File […]

The post Live Cyber Forensics Analysis with Computer Volatile Memory appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Live Cyber Forensics Analysis with Computer Volatile Memory appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/live-forensics-analysis-with-computer-volatile-memory/feed/ 0
Tracking Photo’s Geo-location to See Where the Photo Was Taken – A Forensic Analysis https://gbhackers.com/tracking-a-photos-geolocation-with-gps-exif-data/ https://gbhackers.com/tracking-a-photos-geolocation-with-gps-exif-data/#respond Sun, 25 Jun 2023 13:23:00 +0000 https://gbhackers.com/?p=9207 This article is about collecting metadata from photographs. Metadata is information that is created for every file’s format. Examples of metadata: file created date and time, Tracking Photos, last edited, etc. In this article, we will take a picture from iPhone and analyze that Image to collect various metadata for collected evidence. Before starting your forensic investigation for […]

The post Tracking Photo’s Geo-location to See Where the Photo Was Taken – A Forensic Analysis appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Tracking Photo’s Geo-location to See Where the Photo Was Taken – A Forensic Analysis appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/tracking-a-photos-geolocation-with-gps-exif-data/feed/ 0
How to Analyse a PCAP file WITH XPLICO – Network Forensic Analysis Tool https://gbhackers.com/xplico-network-forensics-analysis-tool/ https://gbhackers.com/xplico-network-forensics-analysis-tool/#respond Sun, 25 Jun 2023 04:40:00 +0000 https://gbhackers.com/?p=13202 Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Unlike other areas of digital forensics, network investigations deal with volatile and dynamic information. Network traffic is transmitted and then lost, so network forensics is often […]

The post How to Analyse a PCAP file WITH XPLICO – Network Forensic Analysis Tool appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post How to Analyse a PCAP file WITH XPLICO – Network Forensic Analysis Tool appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/xplico-network-forensics-analysis-tool/feed/ 0
Binwalk – Analyzing Embedded Files and Executable Code with Firmware Images https://gbhackers.com/analyzing-embedded-files-and-executable-code-with-frimware-images-binwalk/ https://gbhackers.com/analyzing-embedded-files-and-executable-code-with-frimware-images-binwalk/#respond Sun, 25 Jun 2023 00:45:00 +0000 https://gbhackers.com/?p=4301 Binwalk is a device for looking at a given binary image for embedded documents, Analyzing embedded files and executable code. Specifically, it’s far designed for figuring out files and code embedded inner of firmware images. Binwalk uses the libmagic library, so it is compatible with magic signatures created for the Unix file utility. Binwalk additionally […]

The post Binwalk – Analyzing Embedded Files and Executable Code with Firmware Images appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Binwalk – Analyzing Embedded Files and Executable Code with Firmware Images appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/analyzing-embedded-files-and-executable-code-with-frimware-images-binwalk/feed/ 0
Creating and Analyzing a Malicious PDF File with PDF-Parser Tool https://gbhackers.com/creating-and-analyzing-a-malicious-pdf-file-with-pdf-parser-tool/ https://gbhackers.com/creating-and-analyzing-a-malicious-pdf-file-with-pdf-parser-tool/#comments Tue, 20 Jun 2023 11:44:00 +0000 https://gbhackers.com/?p=4114 This tool will parse a PDF document to distinguish the central components utilized as a part of the analyzed file. It won’t render a PDF archive. Features included: You can Take the best Certified Cyber Threat Intelligence Analyst online course to learn and analyze more related cyber threats. Analyzing a Malicious PDF File We have […]

The post Creating and Analyzing a Malicious PDF File with PDF-Parser Tool appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Creating and Analyzing a Malicious PDF File with PDF-Parser Tool appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/creating-and-analyzing-a-malicious-pdf-file-with-pdf-parser-tool/feed/ 1
USB Forensics – Reconstruction of Digital Evidence from USB Drive https://gbhackers.com/usb-forensics/ https://gbhackers.com/usb-forensics/#comments Mon, 05 Jun 2023 05:27:00 +0000 https://gbhackers.com/?p=11272 Digital Forensics analysis of USB forensics includes preservation, collection, Validation, Identification, Analysis, Interpretation, Documentation, and Presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal. Disk Imaging – USB Forensics:- Also Read   Pdgmail Forensic Tool to Analysis Process Memory Dump FTK Imager:- […]

The post USB Forensics – Reconstruction of Digital Evidence from USB Drive appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post USB Forensics – Reconstruction of Digital Evidence from USB Drive appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/usb-forensics/feed/ 1