Thoughts on Capturing Memory on a Live MachineWhen performing an acquisition of a live machine, an examiner has the opportunity obtain information relating to the current state of the...
Procedures/Protocols Within a Digital Forensics LabSOP: The responsibility of a digital forensics lab is to take in requests to scientifically analyze pieces of digital media and in turn...
IR Policies When Considering CIAOrganizations of any significant size that provides some kind of service inevitably handles sensitive information. When considering a...
StegocryptoPy: Hide It in Plain Sight 2.0I improved on my steganographic tool I wrote previously to include AES encryption and tested files produced by the new tool. No surprise,...
Hide It in Plain SightPart of a malware analysis I wrote on included a payload hidden in a Graphics Interchange Format (GIF) file. A reverse shell backdoor...
Implications of Full Volume EncryptionFull Volume Encryption (FVE) is the process of encrypting a partition on a physical drive. This approach to encryption is slightly...
Hunting for File SignaturesIn attempting to learn Python, I’ve been trying to find any reason to implement the language into any project I could think of. I thought...