Disk Forensics P9

Oktober 1, 2020 Cybercop 0

After learning howto create a disk image (acquire disk image), we need to know how to mount this files and use it for further analysis. […]

Disk Forensics P8

Oktober 1, 2020 Cybercop 0

All good things are three, or maybe four? After learning how to acquire a disk Image with dd, dcfldd and ewfacquire there is another way […]

Disk Forensics P7

September 30, 2020 Cybercop 0

Image acquisition involves making a copy (or several copies) of the seized hard disk which can be then used to forensics analysis. This allows the […]

Disk Forensics P6

September 29, 2020 Cybercop 0

This is an alternative approach for dd to create a disk image file for further forensic analysis. dcfldd is a modified version of GNU originally […]

Disk Forensics P5

September 29, 2020 Cybercop 0

Image acquisition involves making a copy (or several copies) of the seized hard disk which can be then used to forensics analysis. This allows the […]

Disk Forensics P4

September 20, 2020 Cybercop 0

Disk forensics techniques are used to acquire the disk image, process this image to find artifacts of interest including deleted ones. In this lab, a […]

Disk Forensics P3

September 7, 2020 Cybercop 0

Disk forensics techniques are used to acquire the disk image, process this image to find artifacts of interest including deleted ones. In this lab, a […]

Disk Forensics P2

August 31, 2020 Cybercop 0

Disk forensics techniques are used to acquire the disk image, process this image to find artifacts of interest including deleted ones. In this lab, a […]

Disk Forensics P1

August 27, 2020 Cybercop 0

Disk forensics techniques are used to acquire the disk image, process this image to find artifacts of interest including deleted ones. In this lab, a […]

Analyzing Router Firmware P5

August 26, 2020 Cybercop 0

You receive a Dlink_firmware. Somewhere inside this binary there are telnet credentials stored. Your task is to analyze the file and find the credentials… This […]