Best of Computer Forensics Tutorials

Mobile Forensics Investigation using Cellebrite UFED

3 Ways to Mount a RAW Image in Windows

Wifi Forensic Investigation using Wifihistoryview

Forensic Investigation of Any Mobile Phone with MOBILedit Forensic

Android Mobile Device Forensics with Mobile Phone Examiner Plus

How to Retrieve Saved Password from RAW Evidence Image

How to Create a Forensic Image of Andorid Phone using Magnet Acquire

Forensics Investigation of Android Phone using Andriller

Logical Forensics of an Android Device using AFLogical

SANTOKU Linux- Overview of Mobile Forensics Operating System

How to Recover Deleted File from RAW Image using FTK Imager and Recover My File

Forensics Analysis of Pagefile and hibersys File in Physical Memory

Step by Step Tutorial of FTK Imager (Beginners Guide )

4 ways Capture Memory for Analysis (Memory Forensics)

Forensic Investigation of RAW Image using Forensics Explorer (Part 1)

Forensic Investigation Tutorial Using DEFT

Forensics Investigon of RAW Images using Belkasoft Evidence Center

How to Clone Drive for Forensics Purpose

Forensics Investigation of Deleted Files in a Drive

Comparison of two Files for forensics investigation by Compare IT

Live Forensics Case Investigation using Autopsy

How to Install Digital Forensics Framework in System

How to Mount RAW Image and ISO Image as a Drive using OSF Mount

Forensics Investigation of Facebook, Skype, and Browsers in RAW Image using IEF (Internet Evidence Finder)

How to Create Drive Image for Forensic Purpose using Forensic Replicator

Outlook Forensics Investigation using E-Mail Examiner

How to Preserve Forensics Image file Timestamp

How to identify any Suspicious changes to files or directory (Disk Drive Signature)

Forensics Investigation of Evidence RAW Image using OS Forensics Tool

How to Create and Convert RAW Image in Encase and AFF Format using Forensics Imager

How to Mount Forensics image as a Drive using P2 eXplorer Pro

How to Convert Encase, FTK, DD, RAW, VMWare and other image file as Windows Drive

How to gather Forensics Investigation Evidence using ProDiscover Basic

How to study Forensics Evidence of PC using P2 Commander (Part 2)

How to Collect Forensics Evidence of PC using P2 Commander (Part 1)

How to Create Forensics Image of PC using R-Drive Image

Forensic Investigation of victim pc using Autopsy

Forensic Investigation of any Twitter account

How to Perform Forensic Investigation on YouTube

How to perform Forensic Investigation on user Linkedin Account

Forensic Investigation of any FaceBook Profile

How to create copy of Suspects Evidence Using (FTK Imager)

How to find the usage of files in Remote victim PC (Remote PC Forensics)

How to Collect Telephonic Evidence in Victim PC

How to Collect Email Evidence in Victim PC (Email Forensics)

Forensics Analysis of Social Media Sites like Facebook, Twitter, LinkedIn

Forensics Investigation of Remote PC (Part 2)

Forensics Investigation of Remote PC (Part 1)

Volatility – An advanced memory forensics framework

DumpIt – RAM Capture Tool

How to View Last Activity of Your PC

How to view Date & Time of any Captured JPEG Image

Antivirus Forensics Tools

BFT (Browser Forensic Tool )

How to View System Reboot Date and Time

Hacking Computer forensics Exposed

List of Computer Forensics Tools (Part 1)

Find Last Connected USB on your system (USB Forensics

 

Best of Post Exploitation Exploits & Tricks

Hack Legal Notice Caption of Remote PC

How to Delete Firewall Log in Remote PC using Metasploit

How to Enable and Monitor Firewall Log in Windows PC

Run OS Command against Multiple Session in Metasploit

Hack Admin Access of Remote Windows 10 PC using TpmInit UACBypass

Firewall Penetration Testing in Remote Windows PC (Part 3)

Firewall Penetration Testing in Remote Windows PC (Part 2)

Firewall Penetration Testing in Remote Windows PC (Part 1)

Capture VNC Session of Remote Windows PC by Payloads Injection

How to Create unlimited Folder in Remote Victim PC using Metasploit

How to Access Unauthorized on Remote PC using Metasploit

How to Gather Information of Antivirus in Remote Victim PC using Metasploit

How to Hack Windows Wallpaper of Remote PC

How to Hack Saved sessions in Putty using Metasploit

Windows 7 Sticky Key Hack Attack using Metasploit

How to Gather WIFI Password in Remote Windows PC

Hack Browsers, Chat, Databases, Mails, Wifi Password in Remote Windows or Linux PC

Hack Remote Windows PC using Windows Client Copy Image Win32k Exploit

Hack the Password in Plain text of Remote Windows PC

Hack Saved Password in Windows and Linux PC using LaZagne Project

How to find the usage of files in Remote victim PC (Remote PC Forensics)

How to Delete ALL Files in Remote Windows PC

Website Security Certificate Attack on Remote Windows PC

Best of Remote Windows PC Hacking Tricks (Part 1)

Hack ALL Security Features in Remote Windows 7 PC

How to Shutdown, Restart, Logoff, and Hibernate Remote Windows PC

Hack WIFI Setting of Remote Windows PC

How to Change ALL Files Extension in Remote PC (Confuse File Extensions Attack)

Gather Cookies and History of Mozilla Firefox in Remote Windows, Linux or MAC PC

Hack Save Password in Mozilla Firefox in Remote Windows, Linux or MAC PC

How to Find ALL Excel, Office, PDF, and Images in Remote PC

How to Gather MUICache Entries in Remote Windows PC

Gather WLAN Information and Geolocation of Remote Windows, Linux or MAC PC

Hack Remote Windows PC using Windows NT User Message Call Win32k Kernel Pool Overflow (Schlamperei)

Set New Password of Victim PC Remotely

How to Gather Skype Logs, Firefox History and Chrome history of Remote Victim PC

Bypass UAC Protection of Remote Windows PC in Memory Injection

Hack Internet Explorer in Remote PC set your desired Home page

How to Delete Passwords/Cookies/History/Temp Internet File of Internet Explorer in Remote Victim PC

Forensics Investigation of Remote PC (Part 2)

How to Lock Drive of Remote Windows Victim PC

Shrink the Partition of Remote Victim PC

Forensics Investigation of Remote PC (Part 1)

Remotely Scan Malware/Virus in Victim PC with Metasploit

How to Broadcast YouTube Video in Remote Windows System

Hack Remote PC with Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation

Get Admin Privilege of Remote Victim PC using Windows SYSTEM Escalation via KiTrap0D

Recover Deleted Data from Remote Victim PC

How to Encrypt Drive of Remote Victim PC

How to Gather Recent Files Dump of Remote PC

Windows Manage User Level Persistent Payload Installer

Hack netNTLM Credential using Microsoft Word UNC Path Injector

How to Lock/Unlock Folder in Remote Victim PC using Metasploit

How to get the Admin Access of Remote PC using Windows Kernel Intel x64 SYSRET Vulnerability Exploit

How to Hide File in Remote Victim PC

Hack Remote Windows Password using Keylogger in Meterpreter

How to Enable Remote Desktop in Victim PC using Metasploit

How to Hack Hosts File of Remote Windows 7 PC (Host File Injection)

How to Delete Local User Account of Remote PC using Metasploit

How to Get Password Hint of Remote Victim PC

Windows Gather Directory Permissions Enumeration

How to Gather Installed Application in Victim PC

How to Gather USB Drive History of Victim PC

How to Gather Wireless Current Connection Info of Remote PC

How to Disconnect Wireless Connection of Remote PC

How to Find All Connected Wireless Network in Remote PC

How to Gather Windows Product Key of Remote victim PC

How to Gather Microsoft Outlook Saved Password in Remote PC

How to Hack Save Password in FileZilla of Remote PC

How to Detect Install OS in Victim Virtual BOX

How to Bypass Windows Escalate UAC Protection

Hack UAC settings in windows 7 using Metasploit

How to Find OS of Remote PC (OS Footprinting)

How to Hide Drives of Remote PC using Metaspolit

How to Create hidden user in Remote PC

How to use Keylogger in Meterpreter

How to change password of Remote PC in LAN

 

Best of Social Engineering Toolkit Attack

Denial of Service Attack on Network PC using SET Toolkit

Hack Gmail and Facebook of Remote PC using DNS Spoofing and SET Toolkit

Hack Remote PC using HTA Attack in SET Toolkit

Multi Pyinjector Shell Code Injection

Browser Autopwn Attack

Web Jacking Method

Create a Payload and Listener Attack

Infectious Media Generator Attack

Tab Napping Attack Method

Powershell Attack Vector Method

RATTE (Remote Administration Tool) Attack Method

PyInjector Shellcode Injection Attack 

Best of VLC Media Player Tricks (Part 2)

How to Play Multiple Video in VLC

Open the VLC media player.

Go to the Tool Tab present in the menu bar of the media player, and then select Preferences.

Open the Interface Settings then select Allow only one instance from Instances and then save.

Now you can enqueue any number of items in the playlist and keep playing the current item.The items will be played in the regular succession without gap as stored in the playlist.

How to Add Your Images and Text in VLC

Open the VLC Media Player

Select Effects and Filters from the Tool Tab present in the menu bar of the Media Player. 

Now go to Video effects > Overlay,

(a) Select Add logo to add the desired image in the VLC Media Player, Browse the image from (. . .) and adjust its transparency level and position on the screen.

(b) Select Add text; enter the text you want to provide and also its position. 

We can see the image and text entered in the selected position while playing the video.

How to Rotate Video using VLC

Open the VLC Media Player

Go to the Menu Bar; select Tools > Effects and Filters.

Now go to Video Effects > Geometry, select Transform and Rotate and adjust the Angle of Rotation.

Now we will get the rotated video as per the angle of rotation similar to the given below.

How to Extract Audio Track from DVD

Play the DVD in the VLC Media Player.

Now the DVD will start playing in the VLC Media Player. Suppose we have to extract the audio track of Jaws 3, this particular movie is positioned at 3

Go to the Menu Bar; select Media > Convert/Save

Open the Disc option, enter the title number i.e the number at which that particular video is located, then select Convert/Save

Browse the Destination file, change the Profile Settings i.e Audio-MP3 and then select Start.

It will start extracting the Audio Track of that particular video.

AUTHOR-This article is written by NUPUR KUMARI who is perusing Bachelor’s degree in Information Technology from Bhopal. She has the interest in Web Security.

Related Posts Plugin for WordPress, Blogger...