Jan 23 · 4 min read · The Scenario: Picture a forensic investigation in progress. The suspect's phone is seized. The device is unlocked. WhatsApp is open. But the screen is blank. No messages. No call logs. No photos. Just an empty chat window with an unknown number. Inve...
Join discussion
Jan 23 · 4 min read · Scenario: Zamislite policijsku akciju u toku. Telefon osumnjičenog je zaplenjen. Uređaj je otključan. WhatsApp je otvoren. Ali ekran je prazan. Nema poruka. Nema poziva. Nema fotografija. Samo prazan chat sa nepoznatim brojem. Istražitelji znaju da s...
Join discussion
Nov 3, 2025 · 4 min read · Task 1: Introduction Storyline Jasmine owns a famous New York coffee shop Coffely which is famous city-wide for its unique taste. Only Jasmine keeps the original copy of the recipe, and she only keeps it on her work laptop. Last week, James from the ...
Join discussion
Feb 18, 2024 · 3 min read · The introduction about the tool and it's features was covered in a previous post, if you want to read about it, please click here : "FTK Imager". 1. Create Disk Image along with Hash Report Generation First click on ‘File’, then ‘Create Disk Image’....
Join discussion
Feb 9, 2024 · 3 min read · Introduction FTK Imager, an important tool in digital forensics developed by AccessData, operates similar to a meticulously preserved time capsule for the digital space. It stands out for its comprehensive approach to capture and preserve the state o...
Join discussion
Dec 9, 2023 · 18 min read · Get ready to dive into the mysterious depths of the internet's enigma, where Google Dorks reign supreme. Beyond the familiar search bar, a world of untold possibilities awaits discovery. Picture having the power to unearth hidden gems, reveal sensiti...
Join discussion
Sep 9, 2023 · 6 min read · The first major thing you’ll learn about Digital Forensics/Incident response is LOGS LOGS LOGS. Without them, you can't explain what generated the alert or what occurred on the device(downloads, unsolicited changes, etc.)At the Enterprise level, it's...
Join discussion
Aug 16, 2023 · 3 min read · Hello and Welcome to D4NSIX! Created this blog to help inform average Janes & Joes (and educate up-and-coming cyber professionals) on the world of CYBER. Long story short I have been indoctrinated into the cyber realm, helping understand the hackers ...
Join discussion
Jun 6, 2023 · 3 min read · Introduction: ADS (Alternate Data Streams) in NTFS Windows is a fascinating and lesser-known feature that provides a hidden dimension to file storage. In this blog post, we will embark on a journey to understand ADS, its significance, and the possibi...
Join discussion