archives

accessdata

This tag is associated with 5 posts

How To Use Quin-C’s Simple Review Widget

Hello and welcome everybody to this video about Quin-C. Today we will be talking about a widget called Simple Review. Simple Review is a widget which has been designed for examiners whose everyday job is to run the index searches or keyword searches; perform tagging, bookmarking, viewing, labelling and exporting data. So if you are … Continue reading

Walkthrough: Quin-C Social Analyzer Widget From AccessData

Hello. This is Sven from the technical team here at AccessData. This video will feature the Social Analyzer widget. So let’s get started. Go to Quin-C and open the grid, just to see how many items we have in our case. To use Quin-C with the Social Analyzer widget, we need to filter the emails. … Continue reading

How To Integrate AD Enterprise And The CyberSponse Platform Using The AccessData API

AccessData is the first forensics company to offer a full-featured API that can integrate across the entire forensics and e-discovery portfolio, dramatically speeding up investigations and reducing the risk and expense of passing data between platforms. AccessData recently teamed up with CyberSponse, a leader in automated incident response playbooks, to demonstrate how the API would … Continue reading

Evidence Acquisition Using Accessdata FTK Imager

by Chirath De Alwis Forensic Toolkit or FTK is a computer forensics software product made by AccessData. This is a Windows based commercial product. For forensic investigations, the same development team has created a free version of the commercial product with fewer functionalities. This FTK Imager tool is capable of both acquiring and analyzing computer forensic … Continue reading

Bruteforcing Linux Full Disk Encryption (LUKS) With Hashcat

by Patrick Bell This walk-through will show you how to Bruteforce LUK volumes using hashcat, how you can mount a LUK partition, and how we can image it once it’s decrypted. Scenario: You’ve got a Macbook in. MacOS has been removed and Debian 9.0 has been installed. The suspect is using LUKS (Linux Unified Key … Continue reading

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,276 other followers