Hello guest, if you read this it means you are not registered. Click here to register in a few simple steps, you will enjoy all features of our Forum.
Rules have been updated! Here

Tags
Author: ARMOUR - Replies: 0 - Views: 2957
Andriller - Android Forensic Tools v2.6.4.0
Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats.

Features
  • Automated data extraction
Author: MaskedUser - Replies: 1 - Views: 4243
Reborn of Backtrack5 Kali Debian Based Linux OS for Info Sec/Forensic Pros
Latest 2019.3 Released on 2nd September 2019 .

Kali Linux 2019.3 Release
September 2, 2019
g0tmi1k
Kali Linux Releases
[align=justify]We are pleased to announce that our third release of 2019, Kali Linux 2019.3, is available immediately for download. This release brings our kernel up to version 5.2.9, and includes various new features across the board with NetHunter, ARM and packages (plus the normal bugs fixes and updates).[/
Author: MaskedUser - Replies: 0 - Views: 3098
Importance of RAM State in Digital Forensic Analysis
Digital forensic experts understand the importance of remembering to perform a RAM Capture on- Crime Scene Investigation so as to not leave valuable evidence behind. Capturing volatile data in a computer's memory dump enables investigators and examiners to do a full memory analysis and access data including:
browsing history
encryption keys
chat messages
clipboard contents
run-time system activity
open network connections (often these artifacts are only found in R
Author: MaskedUser - Replies: 0 - Views: 3359
Digital Forensic Step by Step Process
In comparison to other forensic sciences, the field of computer forensics is relatively young. Unfortunately, many people do not understand what the term computer forensics means and what techniques are involved. In particular, there is a lack of clarity regarding the distinction between data extraction and data analysis. There is also confusion about how these two operations fit into the forensic process. The Cybercrime Lab in the Computer Crime and Intellectual Property Section (CCIPS) has dev