Whitepaper: Why Belkasoft should be your tool of choice for Mobile Forensics

In this whitepaper we will describe the mobile forensics support that Belkasoft offers, and why Belkasoft products should be your tools of choice for working with mobile devices, whether in a digital forensic investigation or an incident response case.

Read whitepaper

Whitepaper: Six Steps to Successful Mobile Validation

Six Steps to Successful Mobile Validation is a paper created by mobile forensics experts who joined forces to share key steps for mobile validation.

Read whitepaper

Whitepaper: Uncovering Lateral Movement with Belkasoft Evidence Center X

In this whitepaper, which is a continuation of Belkasoft's Digital Incident Response series, we will review the most common technique adversaries use for lateral movement and show you how Belkasoft Evidence Center X (Belkasoft X) helps incident responders in uncovering them.

Read whitepaper

Whitepaper: Uncovering Cyber Threat Actors’ Persistence Mechanisms with Belkasoft

In this whitepaper, which is a continuation of Belkasoft’s Digital Incident Response series, we will examine the persistence mechanisms—in terms of programs, files, and keys—that are widely used in cyberattacks targeted at Windows devices.

Read whitepaper

Whitepaper: Tracking Potentially Malicious Files with Evidence of Execution Using Belkasoft

In this whitepaper, which is a continuation of our Incident Response series, we will examine the common forensic artifacts that point to code execution on Windows systems. We will cover other operating systems in subsequent articles. Windows is the most widely used operating system and also suffers the most attacks, so it was only logical that we started first with Microsoft’s OS.

Read whitepaper

Whitepaper: Hunting for Initial Infection Vector with Belkasoft

“How was the network initially compromised?”—This is the question investigators and incident responders hear every time they come to do their job. In fact, these days, most cyberattacks—advanced targeted and otherwise—start from a simple phishing email with a weaponized attachment or web link. In this whitepaper, we will examine the most common initial infection vectors and show how Belkasoft Evidence Center X helps incident responders and forensic analysts to find the needed evidence.

Read whitepaper

Whitepaper: WhatsApp Forensics on Smartphones

WhatsApp is a popular chat app, which provides free cross-platform messaging and VoIP services to its users. In this article, we intend to examine WhatsApp from a forensic standpoint as an application found on Android and iOS devices. We will briefly review the data extraction process involving this app and the artifacts associated with it.

Read whitepaper

Whitepaper: Six Naïve Methods of Concealing Digital Evidence, and How to Deal with Them

Cybercrimes grow exponentially every year. Cybercriminals—ranging from regular lawbreakers to experienced hackers—are all too eager to conceal digital evidence of their crimes to avoid prosecution. Even the average computer user is aware of techniques for hiding traces of digital activity. In this whitepaper, we will examine six of the most common (and possibly naïve) tricks that criminals use to hide evidence and slow down investigations

Read whitepaper