Posts Tagged ‘digital forensics software’

Most Recent
 
Read More
2018-05-17

Cloud Forensics: How to acquire a web based email account

The next typical task of Cloud Forensics is the acquisition of a web based email account such as a Gmail account, an Yahoo account, a Hotmail account, etc. Of course, you can use Cloud Extractor (Oxygen) or Cloud Analyzer (Cellebrite). However, these tools are chargeable and not always available for an examiner. This article will tell you how to acquire a Gmail account with Thunderbird.

76
 
Read More
2018-05-10

Analyzing Instant Messengers with Belkasoft

Nowadays, the basic exchange of information is carried out through Instant Messengers by using social networks. Some social networks have their own mobile apps which functionality can be compared with that of IM Messengers.

193
 
Read More
2018-04-29

AXIOM V2: MEMORY FORENSICS

AXIOM is our one of the best tools. A few days ago Magnet Forensics has released AXIOM V2. Now AXIOM contains many features. We were especially delighted that the functional Volatility appeared in a new version of AXIOM. Volatility is the best tool for memory forensics. The combination of AXIOM and Volatility is clearly an excellent idea. And of course we immediately started testing this functionality.

395
 
Read More
2018-04-22

Cloud Forensics: How to acquire a Facebook account

Today we will tell about how to acquire a Facebook account. Of course, you can use commercial tools such as: Cloud Analyzer (Cellebrite), Cloud Extractor (Oxygen Forensics), E3 Platform (Paraben Corporation), etc. However, this can be done manually and in this article will show how to do this step-by-step.

486
Latest Headlines
 
Read More
486
 
Read More
965
 
Read More
56

Trending Topics
digital forensics
computer forensics
mobile forensics
Articles
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Chip-off Technique in Mobile Forensics
 
4
Extracting WhatsApp database and the cipher key from a non-rooted Android device
 
5
Extracting data from SmartSwitch backups