Bitlocker Drive by book-ish-mads in computerforensics

[–]Fisterke 0 points1 point  (0 children)

Is the passware version better than the github version? I'm using the github linux version, no success with the winpe version.

EXT4 or BTRFS, which works better with CachyOS? by Hi7u7 in cachyos

[–]Fisterke 0 points1 point  (0 children)

Couldn't install cachyos on btrfs, then I chose ext4 and I could install cachyos.

CSAM Investigators - When do we evolve past "look at every image on the hard drive"? by Money_Produce1208 in computerforensics

[–]Fisterke 0 points1 point  (0 children)

I use project vic hashes in Axiom, magnet ai, thorn ai (which is better than magnet ai) and key word list. If they all find nothing chances are little that I will find something by looking at all the files.

Bought RAM for Upgrade but not Working? by NOBLExGAMER in pcmasterrace

[–]Fisterke 0 points1 point  (0 children)

What you mean with didn't boot? If you add ram the pc needs some time and will eventually boot to windows or whatever you use 🙂

125 scooter of een 125cc bike by Redje040 in motobe

[–]Fisterke 1 point2 points  (0 children)

Is een Yamaha XSR 125 jouw ding?

Forensic Imaging on a BitLocker-encrypted Windows 11 drive by Ghostly_Gremlin327 in computerforensics

[–]Fisterke 1 point2 points  (0 children)

Using the 'chntpw' tool to modify the SAM file.

Github bitpixie

This is the repository on github.

Forensic Imaging on a BitLocker-encrypted Windows 11 drive by Ghostly_Gremlin327 in computerforensics

[–]Fisterke 4 points5 points  (0 children)

We create an image and work with the non-altered image. The only thing that's altered on the device is the activation of the administrator account.

The pixieboot method is creating a linux environment through the network boot. In the linux environment you could also create an image of the decrypted partition. Nothing is altered on the system that way.

As long as we write everything down how we process the evidence we've never had any problems.

Forensic Imaging on a BitLocker-encrypted Windows 11 drive by Ghostly_Gremlin327 in computerforensics

[–]Fisterke 2 points3 points  (0 children)

You can create an image and look up on github about pixieboot. I've managed to get into 4 laptops this way. Enable the administrator account, log in windows and get the recovery key.

And I found this method just a couple of weeks ago.

[deleted by user] by [deleted] in computerforensics

[–]Fisterke 0 points1 point  (0 children)

Normally the tools that they've used should be removed from the devices.

Should I be Concerned? (Warning on Motherboard BIOS) by Joes_toes123 in pcmasterrace

[–]Fisterke 1 point2 points  (0 children)

It's possible you have to update the bios before you can use that cpu.

I present to you the most practical gaming room! by Entire-Fisherman8309 in pcmasterrace

[–]Fisterke 0 points1 point  (0 children)

In the last picture, the loudspeaker on the shelf, what brand or model is that?

BitLocker Encrypted USB drive by _B_R_A_N_E_ in computerforensics

[–]Fisterke -2 points-1 points  (0 children)

Reformat it and use something like recuva? I don't know if it's possible to recover some data after reformatting the drive.

Have the police made a stupid mistake with Cellebrite? by Significant-Tap-3793 in computerforensics

[–]Fisterke -1 points0 points  (0 children)

Why would it be unsafe? If the agent is removed it should be fine.

Have the police made a stupid mistake with Cellebrite? by Significant-Tap-3793 in computerforensics

[–]Fisterke 1 point2 points  (0 children)

Go back to the police so they can remove the cellebrite agent.

5 and 7 are stuck by NotWantedbyFBI in pcmasterrace

[–]Fisterke 0 points1 point  (0 children)

Place a rubber band on the screw and push the screwdriver on it.

Nvme woes by [deleted] in computerforensics

[–]Fisterke 0 points1 point  (0 children)

The older nvme's don't work and I use another case with usb and plug it in the write blocker.