├── README.md
├── Lecture-23 Cyber Forensics - Data Extration.txt
├── Lecture-18 Cyber Forensics - Identification or Analysis of Encryptions.txt
├── Lecture-8 Digital Forensics - Write Blocking.txt
├── Lecture-4-5 System-Password-Cracking.txt
├── Lecture-12 Windows Registry Forensics - Wireless Evidence.txt
├── Lecture-6 Part 2 Linux-Digital-Evidence-To-Create-Image-File.txt
├── Lecture-1 Part 2 Cyber Forensics - Cyber Laws.txt
├── Lecture-1 Part 1 Introduction of Cyber Forensics.txt
├── Lecture-6 Part 1 Windows Digital Forensics - Disk Imaging.txt
├── Lecture-22 Cyber Forensics - Information-Gathering-Image-File.txt
├── Lecture-17 Cyber Forensics - Encryption Analysis.txt
├── Lecture-9 Cyber Forensics - File System.txt
├── Lecture-20 Email Investigation.txt
├── Lecture-15 Cyber Forensics - Firewall Handling.txt
├── Lecture-13 Cyber Forensics - Denial Of Service Investigation.txt
├── Lecture-3 Computer Forensics - Investigation Technique.txt
└── Lecture-2 Computer Forensics - Investigation Methods.txt
/README.md:
--------------------------------------------------------------------------------
1 | # CHFI
2 | CHFI - Cyber Forensics Full Course Content
3 |
--------------------------------------------------------------------------------
/Lecture-23 Cyber Forensics - Data Extration.txt:
--------------------------------------------------------------------------------
1 |
2 |
3 | Foremost Forensic tool-----
4 |
5 | apt install foremost
6 | insert the pendrive in to the system
7 | fdisk -l -----------to check the pendrive
8 | copy the disk name
9 | foremost -h
10 | foremost -t jpg,png -v -i -o