Computer Hacker And Forensic Investigator Training

ZIPRAR-Password-Recovery-Tool-Advanced-Archive-Password-Recovery

ZIP/RAR Password Recovery Tool: Advanced Archive Password Recovery

ZIP/RAR Password Recovery Tool:  Advanced Archive Password Recovery tool recovers protection passwords or unlocks encrypted ZIP and RAR archives created with all versions of popular archivers. The tool recovers passwords for plain and self-extracting archives created with PkZip, WinZip, RAR, and WinRAR automatically or with your assistance. Features: Supports all versions of ZIP/PKZip/WinZip, RAR/WinRAR, ARJ/WinARJ, and ACE/WinACE (1.x) Supports strong AES encryption found in WinRAR and the new versions of WinZip Exploits all known vulnerabilities …

ZIP/RAR Password Recovery Tool: Advanced Archive Password Recovery Read More »

Application-Password-Cracking-Tools

Application Password Cracking Tools

Application Password Cracking Tools in this article explained different types of application tools which are using in password cracking. The application including PDF, Word, Excel, PowerPoint presentation etc. 1. Passware Kit Forensic Source: http://www.lostpassword.com This complete electronic evidence discovery solution reports all password-protected items on a computer and gains access to these items using the fastest decryption and password recovery algorithms. Features: Recovers passwords for 200+ file types and decrypts hard disks providing an all-in-one …

Application Password Cracking Tools Read More »

System-Software-Password-Cracking

System Software Password Cracking

System software password cracking refers to the process of cracking the OS and all other utilities that enable a computer to function. The system creates passwords for the software to avoid access to system files and other secured information used during the booting of the system. Following are the ways by which one can access the system: Bypassing the BIOS password Using tools to reset the admin password 1. Bypassing BIOS Passwords Basic Input Output …

System Software Password Cracking Read More »

Password-Cracking-Techniques

Password Cracking Techniques

Password Cracking Techniques in this article explain different types of password cracking techniques and tools. There are three popular techniques for password cracking: Method 1: Dictionary Attacks In a dictionary attack, a dictionary file is loaded into the cracking application that runs against user accounts. A dictionary is a text file that contains a number of dictionary words or predetermined character combinations. The program uses every word present in the dictionary to find the password. …

Password Cracking Techniques Read More »

Understand-Anti-forensics-and-their-goals

Understand Anti-forensics and their goals

Understand Anti-forensics and their goals, also referred to as counter forensics, may be a set of techniques that attackers or perpetrators use so as to avert or sidetrack the forensic investigation process or attempt to make it much harder. These techniques negatively impact the number and quality of evidence from a criminal offense scene, thereby making the forensic investigation process difficult. Therefore, the investigator may need to conduct a few more additional steps so as …

Understand Anti-forensics and their goals Read More »

Understand-Acquiring-RAID-Disks

Understand Acquiring RAID Disks

Understand Acquiring RAID Disks may be challenging for forensics examiners due to the RAID system design, configuration, and size. The greatest concern is the size of the RAID system, as many systems are growing into many terabytes of data. Copying small RAID systems to one large disk is possible with the availability of larger disks. Investigators should use a proprietary format acquisition with compression to store more data in small storage capacities. Acquiring RAID Disks …

Understand Acquiring RAID Disks Read More »

Understanding-Data-Acquisition

Understanding Data Acquisition

Understanding Data Acquisition in this the forensic data acquisition is a process of imaging or collecting information from various media in accordance with certain standards for analyzing its forensic value. With the progress of technology, the process of data acquisition has become more accurate, simple, and versatile. It uses many types of equipment , starting from small sensors to classy computers. Data acquisition is that the process of sampling signals that measure world physical conditions …

Understanding Data Acquisition Read More »

File-System-Analysis-Using-Autopsy

File System Analysis Using Autopsy

File System Analysis Using Autopsy is a digital forensics platform and graphical interface to The Sleuth Kite and other digital forensics tools. Law enforcement, military, and corporate examiners use it to investigate what happened on a computer. You can even use it to recover photos from your camera’s memory card. Autopsy is an end-to-end platform with modules that come with it out of the box and others that are available from third-parties. Some of the …

File System Analysis Using Autopsy Read More »

Overview-of-File-System-Analysis

Overview of File System Analysis

Overview of File System Analysis in this article explain American Standard Code for Information Interchange (ASCII) and unicode diffrent computer languages which can be used in file system and also explain which of file system cannot be analysis and Hex View of Popular Image File formats. Understanding ASCII, Unicode, and Offset 1. American Standard Code for Information Interchange (ASCII) Developed from telegraph codes, ASCII is a character encoding standard used in digital devices such as …

Overview of File System Analysis Read More »

Overview-of-Mac-OS-X-File-Systems

Overview of Mac OS X File Systems

Overview of Mac OS X File Systems in this article Apple’s Mac OS X uses a different approach in storing the data, when compared to the Windows and Linux. This section will make investigators aware of the file systems that different versions of Mac operating systems use. Mac OS X File Systems 1. Hierarchical File System (HFS) Apple had developed the Hierarchical File System (HFS) in September 1985 to support the MAC OS in its …

Overview of Mac OS X File Systems Read More »