P

Prof. K - Digital Forensics

21 Followers
    Dumping Wi-Fi Credentials Using netsh
    4:30
    Email Header Analysis
    16:50
    Using Shellbags to View Hidden or Deleted Folders
    5:42
    Extracting Thumbnail Images From a Suspects Machine
    4:56
    Memory Forensics Using the Volatility Framework
    18:46
    Gathering Windows System Information Using Live-Forensicator
    5:17
    Install Ghidra on CSI Linux
    7:05
    Introduction to Using Ghidra
    14:15
    Creating a Virtual Install of CSI Linux v.2023
    9:45
Rumble logo