The following scenario demonstrates a potentially confusing situation you might face as an investigator. Knowing extensively the NFTS internals will help you to reach at valid conclusions.
Assume that you have located a deleted...
The following scenario demonstrates a potentially confusing situation you might face as an investigator. Knowing extensively the NFTS internals will help you to reach at valid conclusions.
Assume that you have located a deleted...
Designing a password policy for applications facing the internet has always been a hot issue. Basically, the decision to enforce a set of rules, revolves around how much you trust your users or how much freedom you are willing to concede, when...
Assume you use a forensic software that has recovered file system metadata of a deleted jpeg file from a FAT32 formatted volume with a cluster size of 2.048 bytes. The forensic software displays that the recovered file has starting cluster...
To save readers' precious time I would like to emphasize the fact that that this guide applies in raids containing an NTFS formatted volume.
Firstly, keep in mind that this guide serves as a proof of concept, hopefully it will prove...
Below you will find questions that test your knowledge on this subject. I wrote them while I read material mainly from books in file systems and Windows Forensics.
The questions are not meant to be exhaustive and they might even...
For the examiners who wish to locate malware in EnCase 6 based on virus signature, I have downloaded the latest VirusTotal database and compiled to an EnCase 6 Hash Set. Note that hashes are MD5 you need to hash your files first. ...
Since March 2012, I work as a digital forensics examiner, I examine cases such as copyright infringements (aka web scraping), data breaches, hacking (defacing, malware to steal bitcoins, cryptomalware, malware to steal sensitive data e.g....
This site was completely revamped since 2017 using the following technologies:
© 2012 - 2023 Armen Arsakian updated atThursday 07 November 2019Contact: contact at arsakian.com