Find out answers for the most interesting questions from our last webinar “Forensics & Prevention in the New Reality”
The advantage of great forensics investigators is a deep understanding of how technology really works. This helps to be always up-to-date with the fast-paced cybersecurity world. There are things you can discover on your own, and there are things you can ask us and we are happy to answer them.
To a computer forensics expert like Paula Januszkiewicz, Windows Prefetch files are a virtual treasure trove that can reveal not only what has happened on an operating system but when it took place. In this brief tutorial, Paula shares the tool and method needed to unlock the contents of these digital artifacts.
Cybersecurity professionals know that they could be called on at any time to recover a user secret. For example, if an employee’s profile is corrupted or user secrets have to be decrypted offline (e.g. during analysis of the forensic image of the operating system).
Find out about some tools capable of decrypting secrets protected using DPAPI and get an outline of how to use them.