Whitepapers

Belkasoft whitepapers

Whitepaper: Tracking Potentially Malicious Files with Evidence of Execution Using Belkasoft Evidence Center

In this whitepaper, which is a continuation of our Incident Response series, we will examine the common forensic artifacts that point to code execution on Windows systems. We will cover other operating systems in subsequent articles. Windows is the most widely used operating system and also suffers the most attacks, so it was only logical that we started first with Microsoft’s OS.

Read whitepaper

Read more

Whitepaper: Hunting for Initial Infection Vector with Belkasoft Evidence Center

“How was the network initially compromised?”—This is the question investigators and incident responders hear every time they come to do their job. In fact, these days, most cyberattacks—advanced targeted and otherwise—start from a simple phishing email with a weaponized attachment or web link. In this whitepaper, we will examine the most common initial infection vectors and show how Belkasoft Evidence Center helps incident responders and forensic analysts to find the needed evidence.

Read whitepaper

Read more

Whitepaper: WhatsApp Forensics on Smartphones

WhatsApp is a popular chat app, which provides free cross-platform messaging and VoIP services to its users. In this article, we intend to examine WhatsApp from a forensic standpoint as an application found on Android and iOS devices. We will briefly review the data extraction process involving this app and the artifacts associated with it.

Read whitepaper

Read more

Whitepaper: Six Naïve Methods of Concealing Digital Evidence, and How to Deal with Them

Cybercrimes grow exponentially every year. Cybercriminals—ranging from regular lawbreakers to experienced hackers—are all too eager to conceal digital evidence of their crimes to avoid prosecution. Even the average computer user is aware of techniques for hiding traces of digital activity. In this whitepaper, we will examine six of the most common (and possibly naïve) tricks that criminals use to hide evidence and slow down investigations

Read whitepaper

Read more