25 Aug, 2021

How To: Rapid Evidence Gathering and Pest Detection with Binalyze AIR

This Video Has Been Made To Show How It Is Possible To Gather "Speed" And "Comprehensive Evidence" In Forensic Informatics and Incident Response Processes. The Scenario In Which The Victim's Computer Infected A Malware Is Considered.

00:00:00 How To: Rapid Evidence Collection and Pest Detection with Binalyze AIR
00:00:16 This malware to be downloaded has been produced as a zero day for testing purposes.
00:00:24 Downloading test file…
00:00:40 Running downloaded file…
00:00:44 Redirected to CyberArts website after run…
00:00:48 Starting “full” evidence collection with Binalyze AIR…
00:01:15 The run test file created a folder and a file with TXT extension.
00:01:34 Evidence collection continues…
00:01:46 In 6 minutes 28 seconds, “all” evidence was collected, including the RAM image…
00:01:50 Generating evidence report file…
00:01:58 Unsigned files are discovered in running processes…
00:02:21 Initial discovery of malicious file is underway...
00:02:50 Downloaded files list…
00:03:02 Internet browser history…
00:03:13 Lessons Learned In This Video, "All" Evidence, Including Ram Image, Was Gathered on a Malware Infected Computer in Less Than Ten (10) Minutes, Thanks to Binalyze AIR Tool. With a single tool, the work of dozens of tools and multiple analysts can be collected from all remote points with a single click. In addition, time savings of up to 70% are possible in the Analysis and Reporting Phase.

KVKK, ISO 27001, Bilgi ve İletişim Güvenliği Rehberi, ISO 27701, Bilgi Güvenliği, Siber Güvenlik ve Bilgi Teknolojileri konularında destek ve teklif almak için lütfen

About Content:
Share on Social Media:
Facebook
Twitter
LinkedIn
Telegram