Herschel Menezeshmenezes.hashnode.dev·Feb 18, 2024How to Use FTK Imager: A Step-by-Step GuideThe introduction about the tool and it's features was covered in a previous post, if you want to read about it, please click here : "FTK Imager". 1. Create Disk Image along with Hash Report Generation First click on ‘File’, then ‘Create Disk Image’....Discuss·150 readsFTK-Imager
Herschel Menezeshmenezes.hashnode.dev·Feb 9, 2024FTK ImagerIntroduction FTK Imager, an important tool in digital forensics developed by AccessData, operates similar to a meticulously preserved time capsule for the digital space. It stands out for its comprehensive approach to capture and preserve the state o...Discuss·909 readsWeMakeDevs
SAMEER TRIPATHIsamtripathi.hashnode.dev·Dec 9, 2023Decrypting the Web: The T0P Enigmatic 200 Google Dorks Commands UnveiledGet ready to dive into the mysterious depths of the internet's enigma, where Google Dorks reign supreme. Beyond the familiar search bar, a world of untold possibilities awaits discovery. Picture having the power to unearth hidden gems, reveal sensiti...Discuss·4 likes·245 readsWeb Vulnerabilities
K Willd4nsix.com·Sep 9, 2023Unveiling the Inner Analyst: Navigating the Cognitive LabyrinthThe first major thing you’ll learn about Digital Forensics/Incident response is LOGS LOGS LOGS. Without them, you can't explain what generated the alert or what occurred on the device(downloads, unsolicited changes, etc.)At the Enterprise level, it's...Discussdigitalforensics
K Willd4nsix.com·Aug 16, 2023Welcome to D4NSIXHello and Welcome to D4NSIX! Created this blog to help inform average Janes & Joes (and educate up-and-coming cyber professionals) on the world of CYBER. Long story short I have been indoctrinated into the cyber realm, helping understand the hackers ...Discuss·1 like·174 readsforensics
h3x0rh3x0r.hashnode.dev·Jun 6, 2023Uncovering the Hidden: Exploring ADS in NTFS WindowsIntroduction: ADS (Alternate Data Streams) in NTFS Windows is a fascinating and lesser-known feature that provides a hidden dimension to file storage. In this blog post, we will embark on a journey to understand ADS, its significance, and the possibi...Discuss·1 like·38 readsWindowsads
Matthew Turnermatteturner.hashnode.dev·Feb 23, 2023Compiling AFF4-CPP-Lite for Ubuntu 22.0.4What is AFF4 The Advanced Forensics File format 4 was originally designed and published in “Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow” M.I. Cohen, Simson...Discuss·122 readsdigitalforensics
Ahmed Ebrahimebrahim.hashnode.dev·Sep 3, 2022The Classic M57 Case: Document ExfiltrationOne of my all-time favourite characters "Jimmy McGill" once said : That applies to cyber security as well, you're not usually having security measures on your top priority list when setting up your business, but once you get hit, you'd wish you'd h...Discuss·314 reads#digitalforensic
Azizur Rahmanhexintheshell.hashnode.dev·Sep 14, 2020Digital Forensics Learning ResourcesI found it difficult to find resources on YouTube for digital forensics as majority of tutorials seemed to be geared towards beginners or didn’t go into enough detail. YouTube is great for popular subjects such as programming, networks and web develo...Discuss·36 readsResourcesdigitalforensics
Azizur Rahmanhexintheshell.hashnode.dev·Sep 14, 2020Digital Forensics Youtube ChannelsBefore I started my first year at University, I went looking for some YouTube channels to help with my studies and give me an idea of what to expect when studying Digital Forensics. 13Cubed 13Cubed is based on technical skills within Digital Forens...Discuss·26 readsResourcesdigitalforensics