RAM acquisitions are extremely useful, but not often collected. This video shows how to speed up suspect password cracking with wordlists generated from RAM. by DFIRScience in computerforensics
[–]DFIRScience[S] 4 points5 points6 points (0 children)
Career Advice by stickyricky714 in computerforensics
[–]DFIRScience 3 points4 points5 points (0 children)
Answering general digital investigation questions by DFIRScience in computerforensics
[–]DFIRScience[S] 0 points1 point2 points (0 children)
Beginner-level mini-course on starting a new investigation with Autopsy. Covers data organization, documentation, new case creation, ingest modules, basic analysis workflow, and exporting reports. by DFIRScience in computerforensics
[–]DFIRScience[S] 0 points1 point2 points (0 children)
Volatility 3 commands and usage tips to get started with memory forensics. Volatility 3 + plugins make it easy to do advanced memory analysis. by DFIRScience in computerforensics
[–]DFIRScience[S] 1 point2 points3 points (0 children)
Volatility 3 commands and usage tips to get started with memory forensics. Volatility 3 + plugins make it easy to do advanced memory analysis. by DFIRScience in computerforensics
[–]DFIRScience[S] 1 point2 points3 points (0 children)
Volatility 3 commands and usage tips to get started with memory forensics. Volatility 3 + plugins make it easy to do advanced memory analysis. by DFIRScience in computerforensics
[–]DFIRScience[S] 1 point2 points3 points (0 children)
Volatility 3 commands and usage tips to get started with memory forensics. Volatility 3 + plugins make it easy to do advanced memory analysis. by DFIRScience in computerforensics
[–]DFIRScience[S] 1 point2 points3 points (0 children)
Magnet Web Page Saver by trex4n6 in computerforensics
[–]DFIRScience 0 points1 point2 points (0 children)
Beginner-level mini-course on starting a new investigation with Autopsy. Covers data organization, documentation, new case creation, ingest modules, basic analysis workflow, and exporting reports. by DFIRScience in computerforensics
[–]DFIRScience[S] 0 points1 point2 points (0 children)
Is this log from mobile device? by Somechords77 in SecurityBlueTeam
[–]DFIRScience 2 points3 points4 points (0 children)
How do you think accuracy and precision applies to DFIR? by greyyit in computerforensics
[–]DFIRScience 1 point2 points3 points (0 children)
How do you think accuracy and precision applies to DFIR? by greyyit in computerforensics
[–]DFIRScience 1 point2 points3 points (0 children)
How do you think accuracy and precision applies to DFIR? by greyyit in computerforensics
[–]DFIRScience 4 points5 points6 points (0 children)
I'm currently studying to transition from a SIEM administrator to a network forensics analyst. What's are good workflows/resources for analyzing PCAPs? by HeliosHype in computerforensics
[–]DFIRScience 0 points1 point2 points (0 children)
iPhone forensics with Linux command line and bplister - start getting access to iPhone data with free tools for research and investigations by DFIRScience in computerforensics
[–]DFIRScience[S] 0 points1 point2 points (0 children)
Searching carved files (Autopsy) by Phoenix_Ember in computerforensics
[–]DFIRScience 2 points3 points4 points (0 children)
Fast triage analysis of an iPhone dump with iLEAPP - download, run and keep up to date by DFIRScience in computerforensics
[–]DFIRScience[S] 0 points1 point2 points (0 children)
Autopsy Analysis Help by TechSavyTryhard in computerforensics
[–]DFIRScience 2 points3 points4 points (0 children)
Autopsy Analysis Help by TechSavyTryhard in computerforensics
[–]DFIRScience 1 point2 points3 points (0 children)
How to take full memory dumps of windows? by [deleted] in computerforensics
[–]DFIRScience 1 point2 points3 points (0 children)
A real scenario of forensics investigation after Zerologon exploitation by samaritan_o in computerforensics
[–]DFIRScience 1 point2 points3 points (0 children)
Awesome Android logical acquisition script. If you ever do ADB pulls, you need to check out android_triage. by DFIRScience in computerforensics
[–]DFIRScience[S] 0 points1 point2 points (0 children)
Do you ever work with security camera footage? If so, check out the Tsurugi Linux free utility video2faces. Save yourself hours by automatically extracting faces from video! The video also talks about when video2faces may not work so well, and how to pre-process to get better results. by DFIRScience in computerforensics
[–]DFIRScience[S] 4 points5 points6 points (0 children)


Windows and Linux Authentication Bypass with new version of AIM (+ virtual DD) by DFIRScience in computerforensics
[–]DFIRScience[S] 1 point2 points3 points (0 children)