To a computer forensics expert like Paula Januszkiewicz, Windows Prefetch files are a virtual treasure trove that can reveal not only what has happened on an operating system but when it took place. In this brief tutorial, Paula shares the tool and method needed to unlock the contents of these digital artifacts.Read more
Corrupted log files create a serious issue for administrators and digital forensic experts who need to view their contents. In this tutorial by cybersecurity expert Paula Januszkiewicz, you’ll learn how to recover corrupted EVTX log files and how to access logs that are processed in the memory and make them readable.Read more
Cybersecurity professionals know that they could be called on at any time to recover a user secret. For example, if an employee’s profile is corrupted or user secrets have to be decrypted offline (e.g. during analysis of the forensic image of the operating system).
Find out about some tools capable of decrypting secrets protected using DPAPI and get an outline of how to use them.Read more