Sanchi PatelOf course, MFT isn’t that important.If you also think that MFT isn’t that important for a forensic investigation then probably give this one a read!2d ago
ZeusCybersecinInfoSec Write-ups5 Ways I Can Find Your Deleted Files as An Ethical Hacker!Computer Forensics for File RecoveryMay 125
Vijay GuptaHow Do Digital Forensics Experts Recover Data from Compromised Systems?Introduction4d ago4d ago
Cindy (Shunxian) OuTryHackMe: Windows Forensics 1 — Detailed Write-UpWindows is one of the most widely used operating systems, so it’s likely that a significant portion of digital evidence in cybercrime…Nov 1, 2023Nov 1, 2023
Azar NarimanData Recovery #3: RAM Capture and Examination (Windows)Hi, in this article, I will explain how to recover files and data from one of the most important and volatile parts of a computer—RAM…Aug 10Aug 10
Sanchi PatelOf course, MFT isn’t that important.If you also think that MFT isn’t that important for a forensic investigation then probably give this one a read!2d ago
ZeusCybersecinInfoSec Write-ups5 Ways I Can Find Your Deleted Files as An Ethical Hacker!Computer Forensics for File RecoveryMay 125
Cindy (Shunxian) OuTryHackMe: Windows Forensics 1 — Detailed Write-UpWindows is one of the most widely used operating systems, so it’s likely that a significant portion of digital evidence in cybercrime…Nov 1, 2023
Azar NarimanData Recovery #3: RAM Capture and Examination (Windows)Hi, in this article, I will explain how to recover files and data from one of the most important and volatile parts of a computer—RAM…Aug 10
PenoughUnderstanding Digital Forensics: A Beginner’s GuideIn today’s digital age, cybercrimes and data breaches have become an unfortunate reality. As a result, the field of digital forensics has…Aug 11
Sanchi PatelWindows Registry : Forensic evidence from Shellbags — Part 2There are various folders that a user views when they interact with the OS and the file system. Shellbags are registry entries created…Jul 221
WisemonkeysMd5 Collisions And The Impact On Computer ForensicsAbstract:The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to…Jun 28, 2023