±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 36231
New Yesterday: 0 Visitors: 223

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Search found 133 matches

Re: Whatsapp db decrypting failure although key file is obta

Post Posted: Nov 04, 19 09:55

if you have key you acquired physical image of the phone maybe key has changed reinstall big update or etc recover key artifact from physical image
nightworker
Topic: Whatsapp db decrypting failure although key file is obtained
Replies: 4
Views: 1635
 

Re: Foreign Language image

Post Posted: Oct 16, 19 07:13

use unicode view you can see everything
nightworker
Topic: Foreign Language image
Replies: 3
Views: 1206
 

Re: X-Ways export list deleted files with orig name

Post Posted: Oct 16, 19 07:12

you should recover $I files and copy spesific bytes each of them to export full list.
but if you want more raw recovery doesnt contain file path
nightworker
Topic: X-Ways export list deleted files with orig name
Replies: 1
Views: 611
 

Re: HackTale: Computer Forensics Investigation Game

Post Posted: Jul 24, 19 10:51

i like it good job
nightworker
Topic: HackTale: Computer Forensics Investigation Game
Replies: 4
Views: 3761
 

Re: Gmail Forensics

Post Posted: Mar 27, 19 08:11

Gmail only shows mail server ip adresses. If case in usa go court and fbi or give money any lawyer office for trial
nightworker
Topic: Gmail Forensics
Replies: 8
Views: 2857
 

Re: Investigating .lnk files using Python

Post Posted: Mar 21, 19 13:21

buy axıom dont waste time and dont discover america again
nightworker
Topic: Investigating .lnk files using Python
Replies: 6
Views: 2004
 

Re: Active Directory Activity Analiysis

Post Posted: Feb 22, 19 08:51

[quote="Bunnysniper"]The only thing you can find there is the security log to see when the user logged in. That`s it. You need the device that was used by the suspect for your analysis.

regards,
R ...
nightworker
Topic: Active Directory Activity Analiysis
Replies: 4
Views: 1666
 
Page 1 of 19
Page 1, 2, 3 ... 17, 18, 19  Next