Dump password of application pool user from IIS >= 6.0
IIS Application pools are used to separate sets of IIS worker processes that share the same configuration and application boundaries. […]
IIS Application pools are used to separate sets of IIS worker processes that share the same configuration and application boundaries. […]
by Chetan Gupta, NII Consulting Many a times as an investigator, I have to deal with the issue of carving […]
by Chetan Gupta, NII Consulting Well, last week was abuzz with activity when we had to recover data from a […]
By Kush Wadhwa, NII Consulting Have you ever thought of hiding data in such a manner that it cannot be […]
by Bhushan Shah, NII Consulting Mrs Carol L. Stimmel has taken upon her to start a Computer Forensic Volunteer Project […]
by Bhushan Shah, NII Consulting The index.dat is a file which contains the list of the websites that one has […]
By Chetan Gupta, NII Consulting In accordance with NII’s mantra of innovation and research, we have developed our own tool […]
NII Consulting’s Chetan Gupta (GCFA) has published an article at ForensicFocus on the Alternate Data Streams in NTFS, and how […]
By Bhushan Shah, NII Consulting Windows passwords are stored in the registry (encrypted) in the form of a hash. LMHash […]
By Chetan Gupta, NII Consulting In my previous article on Userassist, I had mentioned how UserAssist records user access of […]