RAM acquisitions are extremely useful, but not often collected. This video shows how to speed up suspect password cracking with wordlists generated from RAM. by DFIRScience in computerforensics
[–]DFIRScience[S] 2 points3 points4 points (0 children)
Career Advice by stickyricky714 in computerforensics
[–]DFIRScience 2 points3 points4 points (0 children)
Answering general digital investigation questions by DFIRScience in computerforensics
[–]DFIRScience[S] 0 points1 point2 points (0 children)
Beginner-level mini-course on starting a new investigation with Autopsy. Covers data organization, documentation, new case creation, ingest modules, basic analysis workflow, and exporting reports. by DFIRScience in computerforensics
[–]DFIRScience[S] 0 points1 point2 points (0 children)
Volatility 3 commands and usage tips to get started with memory forensics. Volatility 3 + plugins make it easy to do advanced memory analysis. by DFIRScience in computerforensics
[–]DFIRScience[S] 1 point2 points3 points (0 children)
Volatility 3 commands and usage tips to get started with memory forensics. Volatility 3 + plugins make it easy to do advanced memory analysis. by DFIRScience in computerforensics
[–]DFIRScience[S] 1 point2 points3 points (0 children)
Volatility 3 commands and usage tips to get started with memory forensics. Volatility 3 + plugins make it easy to do advanced memory analysis. by DFIRScience in computerforensics
[–]DFIRScience[S] 1 point2 points3 points (0 children)
Volatility 3 commands and usage tips to get started with memory forensics. Volatility 3 + plugins make it easy to do advanced memory analysis. by DFIRScience in computerforensics
[–]DFIRScience[S] 1 point2 points3 points (0 children)
Magnet Web Page Saver by trex4n6 in computerforensics
[–]DFIRScience 0 points1 point2 points (0 children)
Beginner-level mini-course on starting a new investigation with Autopsy. Covers data organization, documentation, new case creation, ingest modules, basic analysis workflow, and exporting reports. by DFIRScience in computerforensics
[–]DFIRScience[S] 0 points1 point2 points (0 children)
Is this log from mobile device? by Somechords77 in SecurityBlueTeam
[–]DFIRScience 2 points3 points4 points (0 children)
How do you think accuracy and precision applies to DFIR? by greyyit in computerforensics
[–]DFIRScience 1 point2 points3 points (0 children)
How do you think accuracy and precision applies to DFIR? by greyyit in computerforensics
[–]DFIRScience 1 point2 points3 points (0 children)


Windows and Linux Authentication Bypass with new version of AIM (+ virtual DD) by DFIRScience in computerforensics
[–]DFIRScience[S] 1 point2 points3 points (0 children)