Understanding $DATA attribute

Created: Thursday, 20 September 2018

The following scenario demonstrates a potentially confusing situation you might face as an investigator. Knowing extensively the NFTS internals will help you to reach at valid conclusions.

Assume that you have located a deleted...

Recovering a deleted file from FAT32

Created: Saturday, 25 August 2018

Assume you use a forensic software that has recovered file system metadata of a deleted jpeg file from a FAT32 formatted volume with a cluster size of 2.048 bytes. The forensic software displays that the recovered file has starting cluster...

Reconstructing a RAID 5 that holds an NTFS volume without knowing its configuration.

Created: Tuesday, 03 July 2018

To save readers' precious time I would like to emphasize the fact that that this guide applies in raids containing an NTFS formatted volume.

Firstly, keep in mind that this guide serves as a proof of concept, hopefully it will prove...

VirusTotal EnCase6 Hash Set

Created: Monday, 15 December 2014

For the examiners who wish to locate malware in EnCase 6 based on virus signature, I have downloaded the latest VirusTotal database and compiled to an EnCase 6 Hash Set. Note that hashes are MD5 you need to hash your files first. ...

Built with...

Created: Saturday, 05 January 2013

In the latest Update (April 2023), this site was migrated to GAE standard environment using python3.10 rutime. All back end libraries have been updated as well. Client code stills uses backbone and jquery, but it is planned to move to more...

© 2012 - 2023 Armen Arsakian updated atWednesday 27 March 2024Contact: contact at arsakian.com

-2462 . 4409:v0.85