📘
CAS Cybersecurity
Ctrlk
  • Start
  • Reconnaissance
  • Docker basics and Images
  • Scanning and Enumeration
  • Vulnerability Scanning and Analysis
  • Exploitation
  • Man in the Middle
  • Windows Hacking
  • Web Application Security
  • CTF and Crypto Exercises
  • Threat Intelligence
  • Forensic Exercises
    • Disk Forensics
      • The Sleuth Kit Intro
      • Filecarving with Foremost
      • Filecarving with scalpel
      • Bulk extractor
      • Disk acquisition with dd
      • Disk acquisition with dcfldd
      • Disk acquisition with ewftools
      • Disk acquisition with FTK Imager
      • Mount disk image (raw)
      • Unknown USB Stick
      • USB Stick Filecarving
      • Autopsy Exercise
    • Windows Forensics
    • Memory Forensics
    • Image Forensics
    • Browser Forensics
    • Mail Header Analysis
    • Timestomping Exercise
    • Network Forensics
  • Malware Analysis
  • Android Malware
  • Forensic Readiness
  • Live Response
Powered by GitBook
On this page

Was this helpful?

  1. Forensic Exercises

Disk Forensics

Exercises

  • The Sleuth Kit Intro

  • Filecarving with foremost

  • Filecarving with scalpel

  • Bulk extractor

  • Disk acquisition with dd

  • Disk acquisition with dcfldd

  • Disk acqusition with ewftools

  • Mount disk image (raw)

  • Unknown USB Stick

  • USB Stick Filecarving

  • Autopsy Exercise

PreviousForensic ExercisesNextThe Sleuth Kit Intro

Last updated 3 years ago

Was this helpful?