Questions tagged [computer-forensics]

Examining digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information.

Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information.

Read more at the Wikipedia article Computer forensics.

205 questions
45
votes
14 answers

Find Programming Language Used

Whats the easiest way to find out what programming language an application was written in? I would like to know if its vb or c++ or delphi or .net etc from the program exe file.
veagles
  • 505
  • 1
  • 5
  • 8
37
votes
6 answers

Mounting VMDK disk image

I have a single vmware disk image file with vmdk extension I am trying to mount this and explore all of the partitions (including hidden ones). I've tried to follow several guides, such as :…
Without Me It Just Aweso
  • 4,593
  • 10
  • 35
  • 53
19
votes
8 answers

How Can I Find Out *HOW* My Site Was Hacked? How Do I Find Site Vulnerabilities?

One of my custom developed ASP.NET sites was hacked today: "Hacked By Swan (Please Stop Wars !.. )" It is using ASP.NET and SQL Server 2005 and IIS 6.0 and Windows 2003 server. I am not using Ajax and I think I am using stored procedures everywhere…
Imageree
  • 4,683
  • 5
  • 26
  • 35
18
votes
9 answers

Text editor capable of viewing invisibles?

A recent problem* left me wondering whether there is a text editor out there that lets you see every single character of the file, even if they are invisible? Specifically, I'm not looking for hex editing capabilities, I am interested in a text…
Timo
  • 4,246
  • 6
  • 29
  • 42
13
votes
3 answers

Windows Spanned Disks (LDM) restoration with Linux?

Is it possible to read Windows 2008 LDM partitions in Linux? We have five 512GB LUNS exported through ISCSI to a dead Windows 2008 and this box doesn't want them anymore. Windows believes they are now raw devices... So I'd like to read the…
Thomas
  • 3,119
  • 2
  • 16
  • 22
9
votes
2 answers

Determine which computer a git commit came from

Lately I've been exploring the vast and terrible world of intellectual property law and people seem to think that if you create something(software) on your time, with your equipment, it typically belongs to you. I know there are many exclusions to…
James
  • 4,927
  • 3
  • 22
  • 27
7
votes
1 answer

Finding a modified image - image forensics

I have a couple of standard ways of detecting a modified image such as Luminance gradient Copy move detection Metadata Extraction Histogram analysis ELA(Error level analysis) Quantization matrix analysis Thumbnail analysis are there any other…
5
votes
5 answers

Extracting jpegs from a disk dump

I've got a 16GB memory card off someone that won't load properly (asks to be reformatted). I'm trying to get jpegs off it. I've run dd to dump the contents to a file, which worked splendidly. The file won't mount and be read, so the contents are…
Rich Bradshaw
  • 71,795
  • 44
  • 182
  • 241
5
votes
1 answer

Can I modify cache file of browsers? Why is it so hard to find any resources about cache modification?

this question is for study purpose, although I think it is a sensitive topic? My question was really simple. "How can I modify, instead of just extracting cache from Firefox?" BUT as I did search on this topic exhaustively, more questions…
K.Mole
  • 193
  • 2
  • 11
5
votes
3 answers

Malicious PHP files detected by Host

I don't know if this is the right place to ask this question, if it isn't please let me know. I recently got a project to move a website from one host (don't know which) to a new one (hostgator). I did that, and within one day got a mail from…
Whip
  • 1,891
  • 22
  • 43
5
votes
1 answer

Search strings in a large MEMORY.DMP file

How can I search a string in a large MEMORY.DMP file generated by Windows BSOD (Windows 8.1 64 bit)? On 32-bit Windows, the command s -a 0 ffffffff "my pattern" seems to work. But for 64-bit windows, s -a 0 ffffffff`ffffffff "my pattern" takes…
murali
  • 59
  • 1
  • 4
5
votes
3 answers

Use DD to write specific file recursively

I have a hard drive that I want to overwrite, not with null bytes, but with a message. 48 69 64 64 65 6e 20 = "Hidden " Here's my command thus far: echo "Hidden " > /myfile dd if=/myfile of=/dev/sdb bs=1M Note: I have also tried an assorment of…
Goodies
  • 4,439
  • 3
  • 31
  • 57
4
votes
1 answer

How can I get timestamps on previously connected USB devices?

I'm trying to get an old PowerShell script to show the times of previously connected USB devices. After having read a few forensics blogs like this, I found this script from this blog. (Script by Jason Walker.) Unfortunately it doesn't show any…
not2qubit
  • 14,531
  • 8
  • 95
  • 135
4
votes
1 answer

Internet Explorer AutoComplete Form Data

I am looking to load, display and have the user remove stored AutoComplete data from Internet Explorer using c#. I am looking specifically for form data and not stored credentials. Not sure if IE version matters, but I do believe Windows version…
Remy
  • 232
  • 3
  • 11
3
votes
1 answer

How to extract content between tags in html using grep command

I want to write a grep command which will extract content between h1 tags irrespective of class and other attributes I tried grep -o '>.*' Email.txt But gave only three elements
Eswar Saladi
  • 117
  • 8
1
2 3
13 14