elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Last modified Size
Parent Directory -
1) Welcome to Practical Windows Forensics (PWF)/ 2023-10-16 14:54 -
2) Lab Requirements/ 2023-10-16 14:54 -
3) Setting up your forensic workstation/ 2023-10-16 14:54 -
4) Prepare your target system/ 2023-10-16 14:54 -
5) Data collection process/ 2023-10-16 14:54 -
6) Examination of the forensic data/ 2023-10-16 14:54 -
7.0) Disk analysis introduction/ 2023-10-16 14:54 -
7.1) Windows registry analysis/ 2023-10-16 14:55 -
7.2) User behavior analysis/ 2023-10-16 14:55 -
7.3) Overview of disk structures, partitions and file systems/ 2023-10-16 14:55 -
7.4) Analysis of the Master File Table (MFT)/ 2023-10-16 14:55 -
7.5) Finding evidence of deleted files with USN Journal analysis/ 2023-10-16 14:55 -
7.6) Analyzing evidence of program execution on Windows systems/ 2023-10-16 14:55 -
7.7) Finding evidence of persistence mechanisms/ 2023-10-16 14:55 -
7.8) Uncover malicious activity with Windows event log analysis/ 2023-10-16 14:56 -
8) Windows memory forensic analysis/ 2023-10-16 14:56 -
9) Kitchen-Sink analysis with Super Timelines/ 2023-10-16 14:56 -
10) Reporting/ 2023-10-16 14:54 -
11) Final/ 2023-10-16 14:54 -
_README.txt 2023-10-18 13:41 187