Computer Forensics Tools | Kroll Artifact Parser and Extractor | TryHackMe KAPE
Вставка
- Опубліковано 4 жов 2024
- In this video walk-through, we covered KAPE as a computer forensics tool to extract forensics artifacts and process them for forensics investigation. We also provided the answers for TryHackMe KAPE room.
**********
Receive Cyber Security Field, Certifications Notes and Special Training Videos
/ @motasemhamdan
*********
Writeup
motasem-notes....
TryHackMe Jr Security Analyst Intro
tryhackme.com/...
*******
Google Profile
maps.app.goo.g...
LinkedIn
[1]: / motasem-hamdan-7673289b
[2]: / motasem-eldad-ha-bb424...
Instagram
/ motasem.hamdan.official
Twitter
/ manmotasem
Facebook
/ motasemhamdantty
Love your videos! I have a lot of trouble of comprehending only written information, and you explain things to simply and straight to the point :)
Thank you sooo much my friend, if was not you i will keep in this room all week! The VM was so slow here!
Your video helped me under stand much more then the class I am in. I was missing the EZviewer for more metadata. Thank you sir.
thank you for this! cheers!
Thanks bro for the video....appreciated it man...
please upload for windows forensics 2. I would appreciate it.
I did all your steps exactly as you did them in the video, but have different output in my files, was there some different steps you did not show in the video?
select the EZPARSER and you should have more info in the output
Please make jvm reverse engineering room explanation walk-through
Hi Motasem...When I select the folder while mentioning the target source folder, it does not populate the tkape files
Can we use this tool to find malwares , and how
my output file has different files than yours.