localization
This commit is contained in:
@@ -20,7 +20,7 @@ tools:
|
||||
icon: 📦
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- mobile-forensics
|
||||
- cloud-forensics
|
||||
@@ -49,7 +49,7 @@ tools:
|
||||
Formatunterstützung.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- network-forensics
|
||||
phases:
|
||||
@@ -88,7 +88,7 @@ tools:
|
||||
Kollaborations-Lösungen am Markt.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- network-forensics
|
||||
phases:
|
||||
@@ -125,7 +125,7 @@ tools:
|
||||
SIEMs, Firewalls und andere Sicherheitssysteme.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- network-forensics
|
||||
- cloud-forensics
|
||||
@@ -159,7 +159,7 @@ tools:
|
||||
mehreren Analysten und Millionen von Zeitstempeln.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- network-forensics
|
||||
- cloud-forensics
|
||||
phases:
|
||||
@@ -235,7 +235,7 @@ tools:
|
||||
für Behörden und Großunternehmen interessant.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- mobile-forensics
|
||||
- cloud-forensics
|
||||
phases:
|
||||
@@ -271,7 +271,7 @@ tools:
|
||||
Visualisierung verständlich. Mit Preisen im sechsstelligen Bereich und
|
||||
ethischen Bedenken bezüglich der Käuferauswahl nicht unumstritten.
|
||||
domains:
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- mobile-forensics
|
||||
phases:
|
||||
- data-collection
|
||||
@@ -374,7 +374,7 @@ tools:
|
||||
unübertroffen.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- network-forensics
|
||||
- cloud-forensics
|
||||
phases:
|
||||
@@ -410,7 +410,7 @@ tools:
|
||||
für CTF-Challenges und tägliche Forensik-Aufgaben gleichermaßen.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- network-forensics
|
||||
phases:
|
||||
@@ -445,7 +445,7 @@ tools:
|
||||
Effizienzgewinne bei großen Infrastrukturen sind enorm.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- fraud-investigation
|
||||
- network-forensics
|
||||
@@ -487,7 +487,7 @@ tools:
|
||||
Untersuchungen.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- fraud-investigation
|
||||
phases:
|
||||
@@ -525,7 +525,7 @@ tools:
|
||||
Monitoring Operations.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- network-forensics
|
||||
- cloud-forensics
|
||||
phases:
|
||||
@@ -560,7 +560,7 @@ tools:
|
||||
schnelle Übersichten, an Grenzen bei verschlüsseltem Traffic.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- network-forensics
|
||||
phases:
|
||||
@@ -596,7 +596,7 @@ tools:
|
||||
Dokumenten-Untersuchungen.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- fraud-investigation
|
||||
- mobile-forensics
|
||||
phases:
|
||||
@@ -633,7 +633,7 @@ tools:
|
||||
ersten Wahl für Behörden. Lizenzkosten im sechsstelligen Bereich
|
||||
limitieren den Zugang auf Großorganisationen.
|
||||
domains:
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- fraud-investigation
|
||||
phases:
|
||||
- analysis
|
||||
@@ -666,7 +666,7 @@ tools:
|
||||
Organisations-Strukturen. Die Community Edition limitiert auf einen
|
||||
Benutzer - für Teams ist die kommerzielle Version nötig.
|
||||
domains:
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- fraud-investigation
|
||||
- network-forensics
|
||||
@@ -706,7 +706,7 @@ tools:
|
||||
ermöglicht automatisierte Analysen großer Datensätze. Unverzichtbar wenn
|
||||
Fahrzeuge, Drohnen oder mobile Geräte mit Standortdaten involviert sind.
|
||||
domains:
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- fraud-investigation
|
||||
- mobile-forensics
|
||||
phases:
|
||||
@@ -742,7 +742,7 @@ tools:
|
||||
vom Raspberry Pi für kleine Teams bis zur High-Availability-Installation.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- fraud-investigation
|
||||
- network-forensics
|
||||
@@ -847,7 +847,7 @@ tools:
|
||||
überall einsetzbar.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- fraud-investigation
|
||||
- network-forensics
|
||||
@@ -906,7 +906,7 @@ tools:
|
||||
bedacht werden.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- fraud-investigation
|
||||
- network-forensics
|
||||
@@ -948,7 +948,7 @@ tools:
|
||||
für kleine Teams. Ideal für Organisationen, die Blockchain-Analysen ohne
|
||||
US-Cloud-Abhängigkeit benötigen.
|
||||
domains:
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- fraud-investigation
|
||||
phases:
|
||||
- analysis
|
||||
@@ -981,7 +981,7 @@ tools:
|
||||
angestaubt in der Oberfläche, aber bewährt in tausenden Gerichtsverfahren.
|
||||
Freeware, aber nicht open source.
|
||||
domains:
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- incident-response
|
||||
phases:
|
||||
- data-collection
|
||||
@@ -1014,7 +1014,7 @@ tools:
|
||||
solide Technik unter der Haube hinweg.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
phases:
|
||||
- data-collection
|
||||
platforms:
|
||||
@@ -1046,7 +1046,7 @@ tools:
|
||||
Updates bei neuen macOS-Versionen.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
phases:
|
||||
- data-collection
|
||||
platforms:
|
||||
@@ -1077,7 +1077,7 @@ tools:
|
||||
LEAPP-Familie, ständig aktualisiert für neue Android-Versionen.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- mobile-forensics
|
||||
phases:
|
||||
- examination
|
||||
@@ -1113,7 +1113,7 @@ tools:
|
||||
iOS-Änderungen und neuen Artefakten.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- mobile-forensics
|
||||
phases:
|
||||
- examination
|
||||
@@ -1147,7 +1147,7 @@ tools:
|
||||
unverzichtbar bei Unfallrekonstruktionen und Kriminalfällen. Die
|
||||
Unterstützung für verschiedene Hersteller wächst mit der Community.
|
||||
domains:
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- ics-forensics
|
||||
phases:
|
||||
- examination
|
||||
@@ -1181,7 +1181,7 @@ tools:
|
||||
Tool-Sammlung auf dem neuesten Stand.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- fraud-investigation
|
||||
- network-forensics
|
||||
@@ -1217,7 +1217,7 @@ tools:
|
||||
Zuverlässigkeit für Forensik-Puristen.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
phases:
|
||||
- data-collection
|
||||
platforms:
|
||||
@@ -1249,7 +1249,7 @@ tools:
|
||||
langer Imaging-Vorgänge rettet Nerven und Zeit.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
phases:
|
||||
- data-collection
|
||||
platforms:
|
||||
@@ -1281,7 +1281,7 @@ tools:
|
||||
Austausch mit kommerziellen Tools.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
phases:
|
||||
- data-collection
|
||||
platforms:
|
||||
@@ -1313,7 +1313,7 @@ tools:
|
||||
TestDisk repariert zusätzlich beschädigte Partitionen.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- fraud-investigation
|
||||
phases:
|
||||
- examination
|
||||
@@ -1379,7 +1379,7 @@ tools:
|
||||
Forensik-Suite. Freeware, aber nicht open source.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
phases:
|
||||
- examination
|
||||
platforms:
|
||||
@@ -1410,7 +1410,7 @@ tools:
|
||||
einem System vorhanden waren. Die einfache GUI macht es auch für weniger
|
||||
technische Ermittler zugänglich.
|
||||
domains:
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- fraud-investigation
|
||||
phases:
|
||||
- examination
|
||||
@@ -1443,7 +1443,7 @@ tools:
|
||||
manueller Registry-Analyse und findet oft übersehene Artefakte.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
phases:
|
||||
- examination
|
||||
@@ -1575,7 +1575,7 @@ tools:
|
||||
Tool-Sammlung aktuell.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- network-forensics
|
||||
- mobile-forensics
|
||||
@@ -1609,7 +1609,7 @@ tools:
|
||||
Live-System-Umgebung ermöglicht.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- mobile-forensics
|
||||
skillLevel: intermediate
|
||||
@@ -1639,7 +1639,7 @@ tools:
|
||||
Neuinstallation.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- network-forensics
|
||||
skillLevel: intermediate
|
||||
@@ -1670,7 +1670,7 @@ tools:
|
||||
Ansicht. Ständige Updates für neue Windows-Versionen und Cloud-Artefakte.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
phases:
|
||||
- examination
|
||||
- analysis
|
||||
@@ -1770,7 +1770,7 @@ tools:
|
||||
ab, Profis schwören darauf. Deutlich günstiger als US-Konkurrenz bei
|
||||
vergleichbarer Funktionalität.
|
||||
domains:
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- incident-response
|
||||
phases:
|
||||
- examination
|
||||
@@ -1801,7 +1801,7 @@ tools:
|
||||
Automatisierung. Die Zertifizierung (EnCE) ist in vielen Behörden
|
||||
Einstellungsvoraussetzung.
|
||||
domains:
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- incident-response
|
||||
phases:
|
||||
- data-collection
|
||||
@@ -1835,7 +1835,7 @@ tools:
|
||||
gleichzeitig. Für High-Volume-Labs die Investition wert, für
|
||||
Gelegenheitsnutzer Overkill.
|
||||
domains:
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- incident-response
|
||||
phases:
|
||||
- data-collection
|
||||
@@ -1894,7 +1894,7 @@ tools:
|
||||
Netzwerkverbindungen und Verschlüsselungsschlüssel.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
phases:
|
||||
- data-collection
|
||||
@@ -1928,7 +1928,7 @@ tools:
|
||||
Unternehmensumgebungen mit gemischten Betriebssystem-Landschaften.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
phases:
|
||||
- data-collection
|
||||
@@ -1964,7 +1964,7 @@ tools:
|
||||
erstellt durchsuchbare Ausgabeformate für effiziente Analyse.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
phases:
|
||||
- data-collection
|
||||
@@ -2060,7 +2060,7 @@ tools:
|
||||
SHA, and digital signature validation.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- cloud-forensics
|
||||
phases:
|
||||
@@ -2084,8 +2084,8 @@ tools:
|
||||
domains:
|
||||
- id: incident-response
|
||||
name: Incident Response & Breach-Untersuchung
|
||||
- id: law-enforcement
|
||||
name: Strafverfolgung & Kriminalermittlung
|
||||
- id: static-investigations
|
||||
name: Datenträgerforensik & Ermittlungen
|
||||
- id: malware-analysis
|
||||
name: Malware-Analyse & Reverse Engineering
|
||||
- id: fraud-investigation
|
||||
|
||||
@@ -12,7 +12,7 @@
|
||||
Unternehmensumgebungen mit gemischten Betriebssystem-Landschaften.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
phases:
|
||||
- data-collection
|
||||
@@ -48,7 +48,7 @@
|
||||
erstellt durchsuchbare Ausgabeformate für effiziente Analyse.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
phases:
|
||||
- data-collection
|
||||
@@ -144,7 +144,7 @@
|
||||
SHA, and digital signature validation.
|
||||
domains:
|
||||
- incident-response
|
||||
- law-enforcement
|
||||
- static-investigations
|
||||
- malware-analysis
|
||||
- cloud-forensics
|
||||
phases:
|
||||
@@ -168,8 +168,8 @@
|
||||
domains:
|
||||
- id: incident-response
|
||||
name: Incident Response & Breach-Untersuchung
|
||||
- id: law-enforcement
|
||||
name: Strafverfolgung & Kriminalermittlung
|
||||
- id: static-investigations
|
||||
name: Datenträgerforensik & Ermittlungen
|
||||
- id: malware-analysis
|
||||
name: Malware-Analyse & Reverse Engineering
|
||||
- id: fraud-investigation
|
||||
|
||||
Reference in New Issue
Block a user