ECU/Infotainment forensic tools
Is there any toolkit(Windows or GNU/Linux) which can forensic ECU / Infotainment’s data?
I have found Berla iVe Toolkit, but looking for more stuff.
Collaborate Disseminate
Is there any toolkit(Windows or GNU/Linux) which can forensic ECU / Infotainment’s data?
I have found Berla iVe Toolkit, but looking for more stuff.
I was wondering if it’s reasonable and forensically correct to use Clonezilla for the image of an attacked machine.
Since some of the commercial products are very expensive I’m turning to open source solutions.
Provided that:
is an offlin… Continue reading Clonezilla for forensic disk image
Over the years, archeologists have unearthed the remains of members of the infamous Franklin expedition, although it hasn’t been possible to confirm the individuals’ identities. Thanks to DNA analysis, however, scientists have now done so for the first… Continue reading DNA provides first-ever confirmed ID of Franklin expedition sailor
In an unrooted Android tablet, is there any way to restore web browser history searches that have been cleared?
It is Chrome web browser, and it’s not linked to a Google account. Android version 6.0
I try to find some indicators of compromise through the PEframe tool. Firstly, by using the volatility tool, I found out that there is a DLL file that is malicious. I checked it with the help of Virus Total. Therefore, I want to find out m… Continue reading Using PEframe tool to find indicators of compromise
The history of NetWitness reflects the continuous evolution of threats and bad actors. Begun as a government intelligence research project, NetWitness has earned a reputation as the most powerful detection and forensics platform in the industry.
The po… Continue reading NetWitness ? A Brief History of an Iconic Threat Detection & Response Platform
As computing systems become increasingly bigger and more complex, forensics have become an increasingly important part of how organizations can better secure them. As the recent Solar Winds breach has shown, it’s not always just a matter of being able to identify data loss, or prevent hackers from coming in in the first place. In […] Continue reading Cado Security locks in $10M for its cloud-native digital forensics platform
I have a memorydump file in .bit format:
8MB of Flash memory.
It was used in Ethernet connection module.
The device was attacked.
I need to extract this information from it:
What is in the memorydump.bit and how is it is laid out?
Which… Continue reading How to do Forensic analysis of the system image from .bin file? [closed]
I have an old computer that is no longer working and I want to donate it or perhaps throw it in the trash. However, I don’t want people to potentially get my banking account data, usernames/passwords I have entered on the computer, softwar… Continue reading How to donate a computer without jeopardizing personal information?
I’m trying to query all group members for a specific user in OSquery. But as result, I just got one group and all group does not show.
For example, I create a user named "test" and a member of "administrators" and "… Continue reading problem in OSquery result