How to identify any Suspicious changes to files or directory (Disk Drive...
By OSForensicsCreating a signature generates a snapshot of the directory structure of the drive at the point of creation. This information includes data about a file's directory path, file size and...
View ArticleHow to Preserve Forensics Image file Timestamp
Forensicopy is designed to copy evidence files from one location to another while maintaining the original timestamps (MAC Times). It also creates a hash of all the files before and after the copy...
View ArticleOutlook Forensics Investigation using E-Mail Examiner
Forensically examine hundreds of email formats including Outlook (PST and OST), Thunderbird, Outlook Express, Windows mail, and more. Paraben's Email Examiner is one of the most comprehensive...
View ArticleHow to Create Drive Image for Forensic Purpose using Forensic Replicator
Forensic Replicator is a bit-stream forensic image creation tool. Forensic Replicator is a Windows based tool that creates bit-by-bit raw DD images of hard drives and related media. You can also create...
View ArticleForensics Investigation of Facebook, Skype, and Browsers in RAW Image using...
Internet Evidence Finder is designed to find Internet-related data or files on a hard drive as part of a digital forensics investigation. In this regard, the purpose of this application really...
View ArticleHow to Mount RAW Image and ISO Image as a Drive using OSF Mount
OSFMount allows you to mount local disk image files (bit-for-bit copies of a disk partition) in Windows with a drive letter. You can then analyze the disk image file with PassMark OSForensics™ by using...
View ArticleHow to Install Digital Forensics Framework in System
DFF (Digital Forensics Framework) is a free and Open Source computer forensics software built on top of a dedicated Application Programming Interface (API).It can be used both by professional and...
View ArticleLive Case Investigation using Autopsy
First Download autopsy from here and install in your pc.Click ‘Create a New Case’ option.A new page will open. Enter the details in ‘Case Name’ and ‘Base Directory’ and choose the location to save the...
View ArticleFree Download Hakin9 Magazine 2005 To 2013 Full Collection
Hakin9 is a Polish online publication on IT Security. The magazine also features some articles in English, German and French. A limited number of free articles are available on their web site. The full...
View ArticleComparison of two Files for forensics investigation by Compare IT
Compare It! displays 2 files side by side, with colored differences sections to simplify analyzing. You can move changes between files with single mouse click or keystroke, and of course you have...
View ArticleExtract the metadata Information of Any website using Foca
FOCA (Fingerprinting Organizations with Collected Archives) is a tool used mainly to find metadata and hidden information in the documents its scans. These documents may be on web pages, and can be...
View ArticleThe Hacker Playbook 2 Practical Guide To Penetration Testing
DownloadPassword: www.hackingarticles.in
View ArticleForensics Investigation of Deleted Files in a Drive
First of all download the OSForensics from here.Select Create Signature Option. Click on Config .Now browse the desired Directory from Directory list management, in my case I am selecting Desktop....
View ArticleHack Remote Windows PC using Adobe Flash Player ShaderJob Buffer Overflow
This module exploits a buffer overflow vulnerability related to the ShaderJob workings on Adobe Flash Player. The vulnerability happens when trying to apply a Shader setting up the same Bitmap object...
View ArticleHow to Clone Drive for Forensics Purpose
DriveClone is a hard disk (HDD) & solid state drive (SSD) cloning and migration software. DriveClone is a time & money saver for server migration, raid upgrading, and system cloningDriveClone...
View ArticleHack Saved Password in Windows and Linux PC using LaZagne Project
The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom...
View ArticleHack the Password in Plain text of Remote Windows PC
First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC)Once you had a remote shell with Metasploit all now use the Bypass UAC module, set the session number and exploit it use...
View Article