Thursday, November 7 2024
issue20

Recovering User Passwords from Memory

Haider M. al-Khateeb takes a look at the tools and techniques to recover user credentials from Windows memory dumps.

Investigating Steganography in Audio Streams

Brian Cusack and James Lu Yao investigate the tool selection that is crucial to detecting hidden content in audio streams.

Forensic Droplets & Puddles

Michelle Govan investigates the exchanging of data between devices using the hydrological cycle.

The Convergence of IT Security & Physical Access Control

Harm Radstaak looks at using a Single Credential to Secure Access to IT and Physical Resources.

Action Items for Protecting Data Across Systems

Maor Goldberg looks at how to establish and monitor administrator permissions and get control of organisational data, providing tables as possible checklists.

Programming The Wetware

Keith Scott suggests how certain aspects of human psychology and behaviour may offer ways to influence a user’s actions in the information realm.

Cyber Security Attributes for Critical Infrastructure Systems

Hugh Boyes looks at how Information Assurance professionals rely on the Confidentiality, Integrity and Availability triad to define security requirements.

Adding ZFS Events to a Super-Timeline

Dylan Leigh and Dr. Hao Shi present an extension to Plaso, which can add ZFS events to a timeline and show how to generate a super-timeline from a ZFS pool.

Introducing the Cyber Scheme

Brian Moore provides some background to the newly launched Cyber Scheme.

Plus all the regular features......

Read Now

Discover more from Digital Forensics Magazine

Subscribe now to keep reading and get access to the full archive.

Continue reading