It has been a little over three weeks since we announced Exterro had acquired AccessData. In that time, our teams have been extremely busy with product planning and laying out an exciting path forward!
It is our intention to share … Read more
It has been a little over three weeks since we announced Exterro had acquired AccessData. In that time, our teams have been extremely busy with product planning and laying out an exciting path forward!
It is our intention to share … Read more
by Chirath De Alwis
Forensic Toolkit or FTK is a computer forensics software product made by AccessData. This is a Windows based commercial product. For forensic investigations, the same development team has created a free version of the commercial product … Read more
by Patrick Bell
This walk-through will show you how to Bruteforce LUK volumes using hashcat, how you can mount a LUK partition, and how we can image it once it’s decrypted.
Scenario: You’ve got a Macbook in. MacOS has been … Read more
First published October 2009
by Access Data
www.accessdata.com
Historically, criminal or corporate investigations involving computer equipment began by immediately disconnecting any compromised machines from the network, powering them down, and securing them in a proper environment where they would