elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
1) Welcome to Practical Windows Forensics (PWF)/ -
2) Lab Requirements/ -
3) Setting up your forensic workstation/ -
4) Prepare your target system/ -
5) Data collection process/ -
6) Examination of the forensic data/ -
7.0) Disk analysis introduction/ -
7.1) Windows registry analysis/ -
7.2) User behavior analysis/ -
7.3) Overview of disk structures, partitions and file systems/ -
7.4) Analysis of the Master File Table (MFT)/ -
7.5) Finding evidence of deleted files with USN Journal analysis/ -
7.6) Analyzing evidence of program execution on Windows systems/ -
7.7) Finding evidence of persistence mechanisms/ -
7.8) Uncover malicious activity with Windows event log analysis/ -
8) Windows memory forensic analysis/ -
9) Kitchen-Sink analysis with Super Timelines/ -
10) Reporting/ -
11) Final/ -
_README.txt 187