Digital Forensics

894

Solutions

2

Articles & Videos

1K

Contributors

Digital forensics encompasses the recovery and investigation of material found in digital devices, often in relation to computer crime. Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before criminal or civil (as part of the electronic discovery process) courts. The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved; computer forensics, network forensics, forensic data analysis and mobile device forensics. The typical forensic process encompasses the seizure, forensic imaging (acquisition) and analysis of digital media and the production of a report into collected evidence.

Related Topics

  1. Security
  2. OS Security
  3. Encryption
  4. Vulnerabilities
  5. Storage
  6. Windows XP
  7. Disaster Recovery
  8. Anti-Virus Apps
  9. Windows 7
  10. Software-Other
Refine results

We need to do some RAM dumps from a Mac. Is there a functioning free tool out there?

We found a tool called Rekall. However, the documentation is limited. We are not UNIX / Python experts and we …

443 views
Free Tool: Port Scanner
Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Let's say there's malware running on the Mac in OS 10.9. This malware launches whenever the computer is booted and/or connected to the Internet. Will upgrading the operating system to 10.11 have any …

451 views

Ok... I need some help clarifying details in an email header. Some one I know has been fished/whaled (which ever it is). I want to know how it was done.
A genuine email was sent from …

467 views

Given the scenario of a simple text file on file server share and a user opens the file on the remote share from their desktop and someone was to capture the SMB traffic and look at the pcap file, …

479 views

We need to prove if a user has accessed a corporate business system from a specific machine. the audit trails in the system itself frustratingly do not log user access/record access, I am unsure at …

572 views

Hi ,

I have a client whose pc i am suspecting might be compromised. About a month ago her Amazon account was hacked and i found the fake username in the cache of Internet Explorer on her pc. The pc…

17263 views

are there any tools on windows, which for any user activity show which files/registry info on the system is being updated as a result of the user activity. I am sure there used to be something whereby…

2116 views

are there any specialist tools to analyse print spool files, i.e. shd and spl.

And does anyone know what kind of information they will contain, i.e. is it purely metadata such as user, print …

3166 views

are there any forensics tools that can take a replica copy of how a website looked at a particular point in time, e.g. users facebook profile. How can you actually prove that is how the website looked…

4149 views

Do windows 7 and above devices give any clues on what documents a user sent to a printer, and if so where on the file system or registry would this evidence reside?

3146 views
Free Tool: IP Lookup
Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

the artist name is
http://www.proantic.com/en/display.php?mode=obj&id=188866
mentioned..

the artist mentioned is rolier

is it possible to find the exact artist and history of other works and …

5152 views

a user has accessed one of potentially 5 peoples calendars (it was a team meeting with several attendee's), and forwarded a meeting request on to a 3rd party. I can see from the tracking logs that …

2138 views

aside from c:\users\username\appdata\roaming\microsoft\windows\recent and c:\users\username\appdata\roaming\microsoft\office\recent

are there any others folders on a windows 7 machine that would …

2199 views

Hi,


I am victim of UK based company named as "Coinscrypt Ltd" having website : https://coinscrypt.net. I have invested there 3 Bitcoins (i.e. costs INR. 1,78,000 approx.) on dated June 19, 2016. …

7312 views

Hey guys,

I need the capability to remote wipe a laptop and also see where it is. What software can do this?

1160 views

From what I understand, anything on WikiPedia is public domain, and therefore available for the taking. True?

Also, does WikiPedia have another site where images can be gotten?

What other sites …

7143 views

HI, we all know that Microsoft uses the Index.DAT file as a database for Internet caching (specifically for IE), but I was wondering what are the equivalent to the Index.DAT file in the other major …

6152 views

Hi, I'd like to know if any of you have a list of the different file paths where Microsoft stores the Index.DAT Internet Explorer cache file?

I know that different versions of the Windows O/S …

5141 views

Hi, we all know that the Microsoft Internet Explorer cache file begins with "Client UrlCache MMF Ver 5.x", so that got me to thinking...how many versions of the cache file are there, and what versions…

6163 views
Free Tool: Path Explorer
Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

If you use logs from a windows server (i.e. windows logs, IIS logs) for an investigation as evidence, and you image the drive on the server where the logs are located using something like FTP Imager -…

7200 views

Hi, I have a  forensic image of a hard drive that was created using the DD command line program (also know as GNU DD). The DD program, which is commonly used in Linux and Unix, basically creates a raw…

6429 views

What would be a forensically sound acquisition of a users mailbox from an exchange server 2010? we wouldn't have capacity to image the entire mailbox database server - nor should we be doing, if only …

3180 views

Hello Experts,

I have a Seagate 750GB SATA HDD that I need to recover data from. The HDD powers up fine and when connected to my computer via SATA to USB Converter Windows will list the Drive …

30208 views

We are configuring both the Examiner and SAFE server. The SAFE server does not require alot of resources, but I believe the Examiner does. I am trying to size the Examiner server and leave room for …

2192 views

Hi

How i can know if image has hidden file system ?

is there any command in linux can show that?

8564 views
Show more content
201506-LO-Top-001

Digital Forensics

894

Solutions

2

Articles & Videos

1K

Contributors

Digital forensics encompasses the recovery and investigation of material found in digital devices, often in relation to computer crime. Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before criminal or civil (as part of the electronic discovery process) courts. The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved; computer forensics, network forensics, forensic data analysis and mobile device forensics. The typical forensic process encompasses the seizure, forensic imaging (acquisition) and analysis of digital media and the production of a report into collected evidence.

Related Topics

  1. Security
  2. OS Security
  3. Encryption
  4. Vulnerabilities
  5. Storage
  6. Windows XP
Top Experts In
Digital Forensics
<
Monthly
>