April 19, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Tag Archives: Richard Davis (page 2)

Tag Archives: Richard Davis

Videos

Recycle Bin Forensics

As a continuation of Richard Davis’ “Introduction to Windows Forensics” series, this video introduces Recy…

Videos

Shellbag Forensics

As a continuation of the “Introduction to Windows Forensics” series, this video by Richard Davis introduces Shel…

Videos

LNK Files and Jump Lists

Richard Davis continues his “Introduction to Windows Forensics” series. This video introduces the ubiquitou…

Videos

CCleaner v5.33 Malware (Supply Chain Attack)

Richard Davis has posted a fresh video discussing the CCleaner malware incident reported by Cisco’s Talos Intelligence …

Videos

Windows NTFS Index Attributes ($I30 Files)

This new video by Richard Davis from “Introduction to Windows Forensics” series covers the basic information you need to kno…

Videos

Windows Memory Analysis

As a continuation of the “Introduction to Memory Forensics” video, Richard Davis will show you how to use Volatility to anal…

Videos

Windows MACB Timestamps (NTFS Forensics)

As a continuation of the “Introduction to Windows Forensics” series by Richard Davis, this video introduces the …

Videos

Windows SRUM Forensics

Richard Davis continues his “Introduction to Windows Forensics” series with a video about the System Resource Ut…

Videos

Introduction to Hashcat

Richard Davis has published a video introduction to Hashcat, a cross-platform CPU and GPU password “recovery” tool. He will …

Videos

Introduction to Windows Forensics

Richard Davis has published another interesting video – an introduction to basic Windows forensics. He covers such top…

Page 2 of 212

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account