Christa: In digital forensics, knowing how to write code allows you to create your own forensic tools, test other people’s tools and contribute to the community overall. But among all the learning choices from books to training courses, sometimes you … Read more
The Open Source Digital Forensics Conference (OSDFCon) kicked off its second decade virtually and, thanks to sponsorships, free of charge. Usually hosted each October in Washington, D.C., OSDFCon this year drew 12,000 people from around the globe: a massive increase … Read more
by Josué Ferreira
From a judicial perspective, the integrity of volatile storage devices has always been a reason for great concern and therefore, it is important for a method to forensically acquire data from Solid State Drives (SSD) to … Read more
by Nanni Bassetti
Sometimes during a computer forensic investigation, we need to virtualize our image disk, because it could be useful for checking or finding something of interest.
If we need to virtualize a disk image file, we can:
KS – an open source bash script for indexing data
ABSTRACT: This is a keywords searching tool working on the allocated, unallocated data and the slackspace, using an indexer software and a database storage .
Often during a computer forensics … Read more
By Ondrej Krehel
Chief information security officer at Identity Theft 911
First published December 2005
Mike Harrington, CFCE EnCE
Innovative Digital Forensic Solutions, L.L.C.
Mark Lachniet, CISA CISSP
Table of Contents
3.Locating Exchange .dbx/.pst Files
3.2 Locating files in the filesystem
3.2.1 Deleted Files… Read more