Belkasoft whitepapers
Whitepaper: Why Belkasoft should be your tool of choice for Mobile Forensics
|
In this whitepaper we will describe the mobile forensics support that Belkasoft
offers, and why Belkasoft products should be your tools of choice for
working with mobile devices, whether in a digital forensic investigation or
an incident response case.
Read whitepaper
|
Read more
Whitepaper: Six Steps to Successful Mobile Validation
|
Six Steps to Successful Mobile Validation is a paper created by mobile forensics experts who joined forces to share key steps for mobile validation.
Read whitepaper
|
Read more
Whitepaper: Uncovering Lateral Movement with Belkasoft Evidence Center X
|
In this whitepaper, which is a continuation of Belkasoft's Digital Incident Response series, we will review the most common
technique adversaries use for lateral movement and show you how Belkasoft Evidence Center X (Belkasoft X) helps incident responders in uncovering them.
Read whitepaper
|
Read more
Whitepaper: Uncovering Cyber Threat Actors’ Persistence Mechanisms with Belkasoft
|
In this whitepaper, which is a continuation of Belkasoft’s Digital Incident
Response series, we will examine the persistence mechanisms—in terms of
programs, files, and keys—that are widely used in cyberattacks targeted at
Windows devices.
Read whitepaper
|
Read more
Whitepaper: Tracking Potentially Malicious Files with Evidence of Execution Using Belkasoft
|
In this whitepaper, which is a continuation of our Incident Response series, we
will examine the common forensic artifacts that point to code execution on
Windows systems. We will cover other operating systems in subsequent
articles. Windows is the most widely used operating system and also suffers
the most attacks, so it was only logical that we started first with Microsoft’s
OS.
Read whitepaper
|
Read more
Whitepaper: Hunting for Initial Infection Vector with Belkasoft
|
“How was the network initially compromised?”—This is the question investigators and incident responders hear every time they come to do their job.
In fact, these days, most cyberattacks—advanced targeted and otherwise—start from a simple phishing email with a weaponized attachment or web link.
In this whitepaper, we will examine the most common initial infection vectors and show how Belkasoft Evidence Center X helps incident responders and forensic analysts to find the needed evidence.
Read whitepaper
|
Read more
Whitepaper: WhatsApp Forensics on Smartphones
|
WhatsApp is a popular chat app, which provides free cross-platform messaging and VoIP services to its users.
In this article, we intend to examine WhatsApp from a forensic standpoint as an application found on Android and iOS devices.
We will briefly review the data extraction process involving this app and the artifacts associated with it.
Read whitepaper
|
Read more
Whitepaper: Six Naïve Methods of Concealing Digital Evidence, and How to Deal with Them
|
Cybercrimes grow exponentially every year. Cybercriminals—ranging from regular lawbreakers to experienced hackers—are all too eager to conceal digital evidence of their crimes to avoid prosecution.
Even the average computer user is aware of techniques for hiding traces of digital activity.
In this whitepaper, we will examine six of the most common (and possibly naïve) tricks that criminals use to hide evidence and slow down investigations
Read whitepaper
|
Read more