Mindblown: a blog about DFIR.
-
Forensic image formats
Forensic image formats are used for preserving digital evidence during digital forensic investigations. These formats ensure that the original data is maintained in a reliable and unaltered state, allowing investigators to analyze the evidence without affecting its integrity.
-
JIPOE
Joint Intelligence Preparation of the Operational Environment (JIPOE) is a methodology utilized by military and intelligence organizations to analyze and comprehend the operational environment, including its application in the cybersecurity context through the Threat Intelligence Model.
-
NirSoft 4n6 tools P2
NirSoft tools are a collection of small and useful freeware utilities developed by Nir Sofer. These utilities cover various areas, including password recovery, system utilities, network tools, and web browser tools.
-
NirSoft 4n6 tools P1
NirSoft tools are a collection of small and useful freeware utilities developed by Nir Sofer. These utilities cover various areas, including password recovery, system utilities, network tools, and web browser tools.
-
Linux 4n6 tools P1
Linux forensics tools are a collection of utilities and software designed to assist digital forensic investigators in collecting, analyzing, and preserving digital evidence on Linux-based systems.
-
OWASP SAMM
OWASP SAMM, or the Software Assurance Maturity Model, is an open framework designed to help organizations formulate and implement a software security strategy tailored to their specific risks. This model allows organizations to evaluate their existing software security practices and integrate a strategy for software security into their existing Software Development Lifecycle (SDLC). The primary…
-
Security Development Lifecycle (SDL)
The Security Development Lifecycle (SDL) is a software development process that incorporates security practices and principles into every stage of the software development lifecycle to ensure that applications are designed, developed, and tested with security in mind. The goal of SDL is to reduce the number and severity of vulnerabilities in software, improve software quality,…
-
DoD Methodology for DevSecOps
The DoD Methodology for DevSecOps is an approach adopted by the U.S. Department of Defense (DoD) to integrate security into every aspect of the software development lifecycle, breaking down silos and unifying software development, deployment, security, and operations. The DoD Enterprise DevSecOps Strategy Guide provides an executive summary of DevSecOps, establishing a set of strategic…
-
Application Security Verification Standard ASVS
The Application Security Verification Standard (ASVS) is a project by OWASP that provides a framework of security requirements and controls for designing, developing, and testing modern web applications and services. ASVS serves as a basis for testing web application technical security controls and offers developers a list of requirements for secure development. It is a…
-
Digital Forensics Services: What You Need to Know
What is Digital Forensics? Digital forensics collects and analyzes data from a computer or other digital device. Digital forensic examiners use their expertise to determine whether evidence has been tampered with or altered and, if so, by whom. They also try to determine what happened on that computer or device at a particular time to…