Refrences from Hack, Track & Snack
Refrences from Hack, Track & Snack
Refrences from Hack, Track & Snack

Because One Book Isn’t Enough!

Hack, Track & Snack

About The Project

Books:

  1. Casey, E. (2011). Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Academic Press.

  2. Nelson, B., Phillips, A., & Steuart, C. (2018). Guide to Computer Forensics and Investigations. Cengage Learning.

  3. Ligh, M., Case, A., Levy, J., & Walters, A. (2014). The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. Wiley.

  4. Sikorski, M., & Honig, A. (2012). Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press.

  5. Sammons, J. (2015). The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. Syngress.

  6. Soltani, R. (2023). Mastering Mobile Forensics. Packt Publishing.

  7. Easttom, C. (2018). Computer Security Fundamentals. Pearson IT Certification.


Research Papers & Reports:

  1. National Institute of Standards and Technology (NIST). (2006). Guide to Integrating Forensic Techniques into Incident Response (SP 800-86). https://csrc.nist.gov/publications/detail/sp/800-86/final

  2. Scientific Working Group on Digital Evidence (SWGDE). (2023). Best Practices for Digital Forensics. https://www.swgde.org

  3. Garfinkel, S. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7, S64-S73.

  4. Europol. (2022). Internet Organised Crime Threat Assessment (IOCTA). https://www.europol.europa.eu

  5. US-CERT. (2018). Incident Handling Guidelines. Cybersecurity and Infrastructure Security Agency (CISA).


Web Resources:

  1. National Institute of Standards and Technology (NIST) - https://www.nist.gov

  2. SANS Digital Forensics & Incident Response (DFIR) - https://www.sans.org/digital-forensics/

  3. Forensics Wiki - https://forensicswiki.org

  4. DFIR Training - https://www.dfir.training

  5. The Tor Project (Dark Web Investigations) - https://www.torproject.org

  6. VirusTotal (Malware Analysis) - https://www.virustotal.com

  7. Hybrid Analysis - https://www.hybrid-analysis.com

  8. MITRE ATT&CK Framework - https://attack.mitre.org


πŸ“š Books & Research Papers

  • Computer Forensics: Cybercriminals, Laws, and Evidence - Marjie T. Britz

  • Incident Response & Computer Forensics - Kevin Mandia, Chris Prosise

  • The Web Application Hacker’s Handbook - Dafydd Stuttard, Marcus Pinto

  • Hacking: The Art of Exploitation - Jon Erickson

  • Digital Evidence and Computer Crime - Eoghan Casey

  • Practical Malware Analysis - Michael Sikorski, Andrew Honig

  • Social Engineering: The Science of Human Hacking - Christopher Hadnagy

  • The Basics of Digital Forensics - John Sammons

  • Cybersecurity Essentials - Charles J. Brooks

  • Forensic Examination of Digital Evidence: A Guide for Law Enforcement - US Department of Justice

  • Mobile Forensics: Advanced Investigative Strategies - Oleg Skulkin


🌐 Websites & Online Resources


πŸŽ“ Online Courses & Certifications

  • Certified Ethical Hacker (CEH) - EC-Council

  • GIAC Certified Forensic Examiner (GCFE) - SANS Institute

  • Cybersecurity & Digital Forensics Courses - Coursera, Udemy, Pluralsight

  • Google IT Support & Cybersecurity Professional Certificates - Google / Coursera

  • IBM Cybersecurity Analyst Professional Certificate - IBM / Coursera

  • DFIR and Incident Response Courses - SANS, Magnet Forensics, Autopsy Training


πŸ” Forensic Investigation Tools

  • Autopsy - GUI-based digital forensics tool

  • FTK (Forensic Toolkit) - By AccessData, for comprehensive digital forensics

  • Magnet AXIOM - Advanced forensic software

  • EnCase Forensic - Digital evidence analysis tool

  • X-Ways Forensics - Lightweight, powerful forensic tool

  • Oxygen Forensic Suite - Mobile forensic tool

  • UFED (Cellebrite) - Mobile forensic extraction tool

  • MOBILedit Forensic - Mobile forensic tool

  • Paraben E3 - Digital investigation platform


πŸ’½ Hard Disk & File Recovery

  • TestDisk & PhotoRec - Open-source recovery tool

  • R-Studio - Data recovery forensics tool

  • Recuva - Simple file recovery

  • FTK Imager - Disk imaging & evidence preservation

  • Magnet AXIOM - Data recovery


πŸ“± Mobile Forensics & Analysis

  • Cellebrite UFED - Mobile device extraction

  • Elcomsoft Phone Breaker - Password recovery for mobile devices

  • Oxygen Forensic Detective - Mobile forensics suite

  • ADB (Android Debug Bridge) - Android forensic investigations


πŸ”¬ Memory & RAM Forensics

  • Volatility Framework - Memory forensics & malware analysis

  • Rekall - Advanced memory forensic framework

  • Belkasoft Ram Capturer - Memory Capture


πŸ“‘ Network Analysis & Traffic Capture

  • Wireshark - Network packet analysis

  • tcpdump - Command-line packet analyzer

  • NetworkMiner - Network forensic analysis


πŸ” Password Recovery & Cracking

  • John the Ripper - Password cracking tool

  • Hashcat - GPU-accelerated password recovery

  • Cain & Abel - Legacy password recovery tool

  • Ophcrack - Windows password cracker


πŸ“§ Email & Internet Forensics

  • MailXaminer - Email investigation software

  • Forensic Email Collector - Email metadata extraction

  • Thunderbird Email Forensics - Open-source email analysis


πŸ›‘ Malware Analysis & Reverse Engineering

  • IDA Pro - Interactive Disassembler for reverse engineering

  • Ghidra - NSA’s open-source reverse engineering tool

  • x64dbg - Debugger for analyzing malware behavior

  • Cuckoo Sandbox - Automated malware analysis


πŸš” Incident Response & Threat Hunting

  • Velociraptor - Digital forensics & threat hunting tool

  • TheHive - Open-source incident response platform

  • MISP (Malware Information Sharing Platform) - Threat intelligence sharing


πŸ–₯️ Operating Systems & Distros for Forensics

  • Kali Linux (Kali Purple) - Pentesting & forensic distro

  • SIFT Workstation

  • Parrot Security OS - Lightweight alternative to Kali

  • CAINE (Computer Aided Investigative Environment) - Forensic-focused Linux distro


πŸ“‘ Metadata & Document Analysis

  • ExifTool - Extract metadata from images & documents

  • PDF Stream Dumper - Analyze malicious PDFs

  • OfficeMalScanner - Scan Microsoft Office documents for malware


πŸ“· Image & Video Forensics

  • Amped FIVE - Video forensics tool

  • Forensic Image Analysis (FIAT) - Image forensics framework

  • GIMP / Photoshop Forensics Plugins - Image analysis techniques


πŸ“„ More Learning & Community Resources

  • DFIR Discord Communities & Forums

  • Reddit r/Netsec & r/ComputerForensics

  • LinkedIn Groups on Digital Forensics & Incident Response

  • YouTube Channels (SANS DFIR, LiveOverflow, NetworkChuck)

Achievements

Buy the Book

Β© 2025 Vaidik Patidar | You scrolled all the way down? Get a life.

unsplash.com/@reddfrancisco