• Memory forensics is forensic analysis of a computer's memory dump. Its primary application is investigation of advanced computer attacks which are stealthy...
    7 KB (723 words) - 03:34, 5 August 2024
  • mainly focused on computer forensics, although in recent years similar tools have evolved for the field of mobile device forensics. This list includes notable...
    10 KB (662 words) - 18:52, 26 August 2024
  • Thumbnail for Digital forensics
    devices and computer crime. The term "digital forensics" was originally used as a synonym for computer forensics but has expanded to cover investigation of...
    56 KB (6,006 words) - 08:11, 11 November 2024
  • development of physical memory forensics, now considered standard practice in computer forensics in law enforcement. He saw the physical memory as a complex snapshot...
    13 KB (1,421 words) - 15:39, 30 September 2022
  • Volatility is an open-source memory forensics framework for incident response and malware analysis. It is written in Python and supports Microsoft Windows...
    4 KB (480 words) - 00:52, 7 March 2023
  • Thumbnail for Computer forensics
    Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital...
    22 KB (2,409 words) - 21:12, 15 October 2024
  • Thumbnail for Matt Suiche
    researcher for Netherlands Forensic Institute in The Hague. He then founded MoonSols, a company specializing in memory forensics and incident response. Suiche...
    13 KB (1,086 words) - 18:25, 5 October 2024
  • Volatile memory, memory that lasts only while the power is on (and thus would be lost after a restart) Volatility (memory forensics), an open source memory forensics...
    2 KB (289 words) - 07:07, 31 May 2024
  • Thumbnail for IoT forensics
    IoT Forensics or IoT Forensic Science, a branch of digital forensics, that deals with the use of any digital forensics processes and procedures relating...
    22 KB (2,638 words) - 04:56, 9 August 2024
  • Thumbnail for Mobile device forensics
    Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions...
    41 KB (5,249 words) - 20:11, 18 November 2024
  • Anti–computer forensics or counter-forensics are techniques used to obstruct forensic analysis. Anti-forensics has only recently been recognized as a legitimate...
    24 KB (2,932 words) - 11:36, 18 May 2024
  • Digital Forensics Framework (DFF) is a discontinued computer forensics open-source software package. It is used by professionals and non-experts to collect...
    10 KB (826 words) - 03:26, 31 July 2024
  • took it. Some other methods of carrying out these include: Disk and memory forensics DoS attacks Frameworks such as: Metasploit Network Security Reverse...
    17 KB (1,784 words) - 22:13, 31 October 2024
  • Cold boot attack Pin control attack Freddie Witherden (2010-09-07). "Memory Forensics Over the IEEE 1394 Interface" (PDF). Retrieved 2024-05-22. Piegdon...
    11 KB (1,296 words) - 19:48, 7 November 2024
  • Thumbnail for Ibrahim Baggili
    mobile device forensics and security, application forensics, drone forensics and memory forensics. Baggili has won several awards. 2024: Named Roy Richardson...
    17 KB (1,565 words) - 15:29, 27 August 2024
  • Thumbnail for Network forensics
    Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information...
    10 KB (1,218 words) - 04:33, 4 March 2024
  • Gary Wells, who are both known for their research on eyewitness memory. Academic forensic psychologists teach, research, train, and supervise students,...
    69 KB (8,107 words) - 05:19, 11 November 2024
  • Thumbnail for Forensic anthropology
    anthropometry Bioarchaeology Forensic pathology Forensic dentistry Forensic science, also known as "forensics" Forensic facial reconstruction List of...
    65 KB (6,581 words) - 09:18, 11 November 2024
  • WindowsSCOPE (category Computer forensics)
    WindowsSCOPE is a memory forensics and reverse engineering product for Windows used for acquiring and analyzing volatile memory. One of its uses is in...
    3 KB (223 words) - 10:16, 6 June 2023
  • state's forensic process - access to crime scenes, resources, and the power to set the rules of evidence - the agency employs 'counter-forensics', the process...
    27 KB (2,558 words) - 22:54, 19 November 2024
  • Thumbnail for Flash memory
    Flash memory is an electronic non-volatile computer memory storage medium that can be electrically erased and reprogrammed. The two main types of flash...
    188 KB (17,273 words) - 09:54, 10 November 2024
  • hypnosis may be considered inadmissible. Forensic hypnosis has been considered for several uses including: hypnotic memory enhancement, evaluating a defendant's...
    16 KB (2,351 words) - 07:22, 2 November 2024
  • Thumbnail for Forensic linguistics
    Forensic linguistics, legal linguistics, or language and the law is the application of linguistic knowledge, methods, and insights to the forensic context...
    66 KB (8,873 words) - 21:24, 11 November 2024
  • courtroom setting, it also includes topics such as autobiographical memory, memory distortion, eyewitness identification, narrative construction, personality...
    22 KB (2,527 words) - 19:14, 25 September 2024
  • Thumbnail for Itzik Kotler
    Walters (28 July 2014). The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory (1 ed.). Wiley. ISBN 978-1118825099...
    13 KB (953 words) - 19:17, 15 November 2024
  • Thumbnail for CAINE Linux
    CAINE Linux (category Digital forensics software)
    foster digital forensics and incidence response (DFIR), with several related tools pre-installed. CAINE is a professional open source forensic platform that...
    7 KB (795 words) - 22:35, 21 July 2023
  • http://jessekornblum.com/presentations/dodcc11-2.pdf jessekornblum. Windows Memory Forensics,. KYRUS Technology, (2006). Retrieved 5/14/2014 Blackhat.com Jessekornblum...
    7 KB (881 words) - 02:29, 17 March 2022
  • attack is used in the discipline of digital forensics to forensically preserve data contained within memory as criminal evidence. For example, when it...
    38 KB (4,246 words) - 11:43, 3 November 2024
  • (proprietary) Linux malware can also be detected (and analyzed) using memory forensics tools, such as: Forcepoint (proprietary) Volatility (free and open...
    57 KB (4,822 words) - 00:44, 14 November 2024
  • 2016-12-02. Lee, Kyeongsik; Koo, Hyungjoon (2012-07-01). "Keychain Analysis with Mac OS X Memory Forensics" (PDF). forensic.n0fate.com. Retrieved 2016-12-02....
    5 KB (584 words) - 15:51, 15 November 2024