Channel Avatar

DFIRScience @UCOSFVxvpr3OPiaJSwHWN8BQ@youtube.com

None subscribers - no pronouns set

Welcome to DFIRScience (DFIR.Science). This channel is devot


48:32
Starting with Velociraptor Incident Response
34:38
Digital Forensics and the Military - Interview with Andrew Lister
09:00
Forensics: What data can you find in RAM?
06:05
Windows and Linux Authentication Bypass with AIM
07:39
What is Random Access Memory?
12:58
Fast password cracking - Hashcat wordlists from RAM
05:26
Linux LVM Ext4 Support in Windows with Arsenal Image Mounter
12:24
Mounting Linux Logical Volumes in Forensic Disk Images
42:00
Linux Forensics with Linux - CTF Walkthrough
15:39
Tableau External Write Blocker Setup and Forensic Imaging Walkthrough
18:58
Starting in Digital Forensics: Conferences and Presentations
05:33
What's in the box? Atola Insight & DiskSense II
04:30
What's in the box? Tableau Forensic Imager TX1!
09:28
What's in the box? Digital Intelligence UltraBlock Kit!
32:00
Introduction to Memory Forensics with Volatility 3
33:54
Data Artifacts, Analysis Results and Reporting in Autopsy 4.19+
38:59
Starting a New Digital Forensic Investigation Case in Autopsy 4.19+
14:02
Digital Forensic Scientist Reacts: Criminal Minds S01E01 - Extreme Aggressor
34:49
Intro to Windows Forensics: Windows Registry Artifacts - TryHackMe Walkthrough
07:19
Software supply chain and vulnerability assessment with syft and grype
05:06
Log4j vulnerability, supply chain attacks and SBOMs
06:49
Bitcoin forensics - visualizing blockchain transactions with Maltego
12:16
Bitcoin investigation and wallet seizure
08:02
Cryptocurrency Investigation - Blockchain basics
06:15
iPhone forensics with Linux command line and bplister
04:50
Fast Software Prototyping - Python iLEAPP module example
03:46
Fast iPhone forensic analysis with iLEAPP
04:57
Robinhood Leaks 7 Million User Records - what's next?
16:48
Artifacts missing? Write an ALEAPP module!
03:21
Fast Android forensic triage with ALEAPP
10:14
Android logical acquisition and triage with android_triage
06:30
Automatically extract faces from video - Tsurugi Linux - video2faces
07:23
Find and sort files by extension in the Linux command line
13:06
Using video2ocr / Tesseract-OCR to extract text from video
09:00
Physical Image and Partition Mounting in Tsurugi Linux
19:28
Amazon AWS EC2 Forensic Memory Acquisition - LiME
16:16
Getting Started with Bento Digital Forensics Toolkit
07:08
What is an AD1 file? FTK Imager Tutorial
08:50
Is ProtonMail Broken?
12:35
Use GitHub to get started in the DFIR community
34:52
DFS101: 13.2 Keeping up to date with digital forensics
05:15
DFS101: 13.1 Research and the future of cybercrime investigation
19:16
DFS101: 12.2 Current State of International Cooperation
19:26
DFS101: 12.1 International Nature of Cybercrime
15:34
DFS101: 11.2 Mobile Device Acquisition
21:50
DFS101: 11.1 Mobile Device Investigations
21:24
Python Programming 009 - Dictionaries
13:48
DFS101: 10.5 Digital Forensic RAM Analysis - Volatility
13:14
DFS101: 10.4 Digital Forensic Memory Analysis - strings, grep, and photorec
11:59
DFS101: 10.3 Forensic Memory Acquisition in Linux - LiME
10:06
DFS101: 10.2 Forensic Memory Acquisition in Windows - FTK Imager
18:15
DFS101: 10.1 RAM Acquisition and Analysis
11:21
DFS101: 9.3 Social Engineering
15:07
DFS101: 9.2 Malware
17:19
DFS101: 9.1 Types of hacking
49:24
Python Programming 008 - Starting Projects
11:49
DFS101: 8.5 How to add a hash database to Autopsy 4
17:44
DFS101: 8.4 How to use hfind from the command line
38:49
DFS101: 8.3 Processing and analysis of a disk image with Autopsy 4 default modules
30:44
DFS101: 8.2 How to start a new case in Autopsy 4