Blog

How to Unlock Windows Systems with a Bootable Flash Drive


Accessing a locked system is always a challenge. While you might be tempted to pull the plug and image the disk, you could miss a lot of valuable evidence if you do. Full-disk encryption, EFS-encrypted files and folders and everything protected with DPAPI (including the passwords ...




What can possibly go wrong with that iPhone? I’ll have a look (oh, it’s locked!), then switch it off, eject the SIM card and pass it on to the expert. Well, you’ve just made three of the five most common mistakes making subsequent unlock and extraction attempts significantly ...



Device Handling and Evidence Processing Analysis



-Ritik Singh

This protocol contains several rules which covers all the steps needed to comply with for completing all the process which is described below.

  • Collection.
  • Acquisition/imaging.
  • Analysis
  • Reporting.

Collection:-

As moving towards the collection of evidence from resources such as storage drive, ha...



Critical National Information Infrastructure (CNII)

Critical National Information Infrastructure (CNII)


(The views are of the author and all issues related to the contents be addressed directly to the Author)

Introduction

Critical National Information Infrastructure (CN...


Categories