{"id":41,"date":"2018-09-17T16:17:42","date_gmt":"2018-09-17T16:17:42","guid":{"rendered":"https:\/\/josephnaghdi.com\/?page_id=41"},"modified":"2018-09-17T16:48:54","modified_gmt":"2018-09-17T16:48:54","slug":"computer-forensics-tools-part-three","status":"publish","type":"page","link":"https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-three\/","title":{"rendered":"Computer Forensics Tools Part III"},"content":{"rendered":"<h1>Computer Forensics Tools &#8211; Part III<\/h1>\n<h2><b>Mobile devices<\/b><\/h2>\n<ul>\n<li><a href=\"http:\/\/ipbackupanalyzer.com\/\">iPBA2<\/a><\/li>\n<li><i>Mario\u00a0Piccinelli,\u00a0<\/i>Explore iOS backups.<\/li>\n<li><a href=\"http:\/\/sourceforge.net\/projects\/iphoneanalyzer\/\">iPhone Analyzer<\/a><\/li>\n<li><i>Leo Crawford, Mat Proud,\u00a0<\/i>Explore the internal file structure of Pad, iPod and iPhones.<\/li>\n<li><a href=\"http:\/\/www.csitech.co.uk\/ivmeta-iphone-metadata\/\">ivMeta<\/a><\/li>\n<li><i>Robin Wood,\u00a0<\/i>Extracts phone model and software version and created date and GPS data from iPhone videos.<\/li>\n<li><a href=\"http:\/\/lastsimdetails.blogspot.co.uk\/p\/downloads.html\">Last SIM Details<\/a><\/li>\n<li><i>Dan Roe,\u00a0<\/i>Parses physical flash dumps and Nokia PM records to find details of previously inserted SIM cards..<\/li>\n<li><a href=\"http:\/\/www.cclgroupltd.com\/Buy-Software\/rubus-ipd-de-constructor-utility.html\">Rubus<\/a><\/li>\n<li><i>CCL Forensics,\u00a0<\/i>Deconstructs Blackberry .ipd\u00a0backup files.<\/li>\n<li><a href=\"http:\/\/www.signalsec.com\/saft\/\">SAFT<\/a><\/li>\n<li><i>SignalSEC\u00a0Corp,\u00a0<\/i>Obtain SMS Messages, call logs and contacts from Android devices.<\/li>\n<li><b>Data analysis suites<\/b><\/li>\n<li><a href=\"http:\/\/www.sleuthkit.org\/autopsy\/\">Autopsy<\/a><\/li>\n<li><i>Brian Carrier,\u00a0<\/i>Graphical interface to the command line digital investigation analysis tools in The Sleuth Kit (see below).<\/li>\n<li><a href=\"http:\/\/www.digital-forensic.org\/\">Digital Forensics Framework<\/a><\/li>\n<li><i>ArxSys,\u00a0<\/i>Analyses volumes, file systems, user and applications data, extracting metadata, deleted and hidden items.<\/li>\n<li><a href=\"https:\/\/github.com\/appliedsec\/forensicscanner\">Forensic Scanner<\/a><\/li>\n<li><i>Harlan\u00a0Carvey,\u00a0<\/i>Automates \u2018repetitive tasks of data collection\u2019. Fuller description here.<\/li>\n<li><a href=\"http:\/\/www.sleuthkit.org\/sleuthkit\/\">The Sleuth Kit<\/a><\/li>\n<li><i>Brian Carrier,\u00a0<\/i>Collection of UNIX-based command line file and volume system forensic analysis tools.<\/li>\n<li><a href=\"http:\/\/www.volatilityfoundation.org\/\">Volatility Framework<\/a><\/li>\n<li><i>Volatile Systems,\u00a0<\/i>Collection of tools for the extraction of artefacts from RAM.<\/li>\n<li><b>File viewers<\/b><\/li>\n<li><a href=\"http:\/\/www.systoolsgroup.com\/bkf-viewer.html\">BKF Viewer<\/a><\/li>\n<li><i>SysTools,\u00a0<\/i>View (not save or export from) contents of BKF backup files.<\/li>\n<li><a href=\"http:\/\/www.systoolsgroup.com\/lotus-dxl-viewer.html\">DXL Viewer<\/a><\/li>\n<li><i>SysTools,\u00a0<\/i>View (not save or export)\u00a0Loutus\u00a0Notes DXL file emails and attachments.<\/li>\n<li><a href=\"http:\/\/www.systoolsgroup.com\/e01-viewer.html\">E01 Viewer<\/a><\/li>\n<li><i>SysTools,\u00a0<\/i>View (not save or export from) E01 files &amp; view messages within EDB, PST &amp; OST files.<\/li>\n<li><a href=\"http:\/\/www.systoolsgroup.com\/mdf-viewer.html\">MDF Viewer<\/a><\/li>\n<li><i>SysTools,\u00a0<\/i>View (not save or export) MS SQL MDF files.<\/li>\n<li><a href=\"http:\/\/www.systoolsgroup.com\/msg-viewer.html\">MSG Viewer<\/a><\/li>\n<li><i>SysTools,\u00a0<\/i>View (not save or export) MSG file emails and attachments.<\/li>\n<li><a href=\"http:\/\/www.systoolsgroup.com\/olm-viewer.html\">OLM Viewer<\/a><\/li>\n<li><i>SysTools,\u00a0<\/i>View (not save or export) OLM file emails and attachments.<\/li>\n<li><b>Internet analysis<\/b><\/li>\n<li><a href=\"http:\/\/www.foxtonforensics.com\/browser-history-capturer\/\">Browser History Capturer<\/a><\/li>\n<li><i>Foxton Software,\u00a0<\/i>Captures history from Firefox, Chrome, Internet Explorer and Edge web browsers running on Windows computers.<\/li>\n<li><a href=\"http:\/\/www.foxtonforensics.com\/browser-history-viewer\/\">Browser History Viewer<\/a><\/li>\n<li><i>Foxton Software,\u00a0<\/i>Extract, view and analyse internet history from Firefox, Chrome, Internet Explorer and Edge web browsers.<\/li>\n<li><a href=\"https:\/\/code.google.com\/p\/ccl-ssns\/\">Chrome Session Parser<\/a><\/li>\n<li><i>CCL Forensics,\u00a0<\/i>Python module for performing off-line parsing of Chrome session files (\u201cCurrent Session\u201d, \u201cLast Session\u201d, \u201cCurrent Tabs\u201d, \u201cLast Tabs\u201d).<\/li>\n<li><a href=\"http:\/\/www.nirsoft.net\/utils\/chrome_cache_view.html\">ChromeCacheView<\/a><\/li>\n<li><i>Nirsoft,\u00a0<\/i>Reads the cache folder of Google Chrome Web browser, and displays the list of all files currently stored in the cache.<\/li>\n<li><a href=\"http:\/\/www.mikesforensictools.co.uk\/MFTCookie.html\">Cookie Cutter<\/a><\/li>\n<li><i>Mike\u2019s Forensic Tools,\u00a0<\/i>Extracts embedded data held within Google Analytics cookies. Shows search terms used as well as dates of and the number of visits.<\/li>\n<li><a href=\"http:\/\/www.dumpzilla.org\/\">Dumpzilla<\/a><\/li>\n<li><i>Busindre,\u00a0<\/i>Runs in Python 3.x, extracting forensic information from Firefox,\u00a0Iceweasel\u00a0and\u00a0Seamonkey\u00a0browsers. See manual for more information.<\/li>\n<li><a href=\"http:\/\/forensic.belkasoft.com\/en\/facebook_profile_saver\">Facebook Profile Saver<\/a><\/li>\n<li><i>Belkasoft,\u00a0<\/i>Captures information publicly available in Facebook profiles.<\/li>\n<li><a href=\"http:\/\/www.nirsoft.net\/utils\/iecookies.html\">IECookiesView<\/a><\/li>\n<li><i>Nirsoft,\u00a0<\/i>Extracts various details of Internet Explorer cookies.<\/li>\n<li><a href=\"http:\/\/www.nirsoft.net\/utils\/internet_explorer_password.html\">IEPassView<\/a><\/li>\n<li><i>Nirsoft,\u00a0<\/i>Extract stored passwords from Internet Explorer versions 4 to 8.<\/li>\n<li><a href=\"http:\/\/www.nirsoft.net\/utils\/mozilla_cache_viewer.html\">MozillaCacheView<\/a><\/li>\n<li><i>Nirsoft,\u00a0<\/i>Reads the cache folder of Firefox\/Mozilla\/Netscape Web browsers.<\/li>\n<li><a href=\"http:\/\/www.nirsoft.net\/utils\/mzcv.html\">MozillaCookieView<\/a><\/li>\n<li><i>Nirsoft,\u00a0<\/i>Parses the cookie folder of Firefox\/Mozilla\/Netscape Web browsers.<\/li>\n<li><a href=\"http:\/\/www.nirsoft.net\/utils\/mozilla_history_view.html\">MozillaHistoryView<\/a><\/li>\n<li><i>Nirsoft,\u00a0<\/i>Reads the history.dat of Firefox\/Mozilla\/Netscape Web browsers, and displays the list of all visited Web page.<\/li>\n<li><a href=\"http:\/\/www.nirsoft.net\/utils\/my_last_search.html\">MyLastSearch<\/a><\/li>\n<li><i>Nirsoft,\u00a0<\/i>Extracts search queries made with popular search engines (Google, Yahoo and MSN) and social networking sites (Twitter, Facebook,\u00a0MySpace).<\/li>\n<li><a href=\"http:\/\/www.nirsoft.net\/utils\/passwordfox.html\">PasswordFox<\/a><\/li>\n<li><i>Nirsoft,\u00a0<\/i>Extracts the user names and passwords stored by Mozilla Firefox Web browser.<\/li>\n<li><a href=\"http:\/\/www.nirsoft.net\/utils\/opera_cache_view.html\">OperaCacheView<\/a><\/li>\n<li><i>Nirsoft,\u00a0<\/i>Reads the cache folder of Opera Web browser, and displays the list of all files currently stored in the cache.<\/li>\n<li><a href=\"http:\/\/www.nirsoft.net\/utils\/opera_password_recovery.html\">OperaPassView<\/a><\/li>\n<li><i>Nirsoft,\u00a0<\/i>Decrypts the content of the Opera Web browser password file, wand.dat<\/li>\n<li><a href=\"http:\/\/www.mandiant.com\/resources\/download\/web-historian\">Web Historian<\/a><\/li>\n<li><i>Mandiant,\u00a0<\/i>Reviews list of URLs stored in the history files of the most commonly used browsers.<\/li>\n<li><a href=\"http:\/\/info.magnetforensics.com\/web-page-saver\">Web Page Saver<\/a><\/li>\n<li><i>Magnet Forensics,\u00a0<\/i>Takes list of URLs saving scrolling captures of each page. Produces HTML report file containing the saved pages.<\/li>\n<li><b>Registry analysis<\/b><\/li>\n<li><a href=\"http:\/\/binaryforay.blogspot.co.uk\/p\/software.html\">AppCompatCache Parser<\/a><\/li>\n<li><i>Eric Zimmerman,\u00a0<\/i>Dumps list of\u00a0shimcache\u00a0entries showing which executables were run and their modification dates.\u202f<a href=\"http:\/\/binaryforay.blogspot.co.uk\/2015\/05\/introducing-appcompatcacheparser.html\">Further details<\/a>.<\/li>\n<li><a href=\"http:\/\/www.woanware.co.uk\/forensics\/forensicuserinfo.html\">ForensicUserInfo<\/a><\/li>\n<li><i>Woanware,\u00a0<\/i>Extracts user information from the SAM, SOFTWARE and SYSTEM hives files and decrypts the LM\/NT hashes from the SAM file.<\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/sysinternals\/bb896645.aspx\">Process Monitor<\/a><\/li>\n<li><i>Microsoft,\u00a0<\/i>Examine Windows processes and registry threads in real time.<\/li>\n<li><a href=\"http:\/\/binaryforay.blogspot.co.uk\/p\/software.html\">RECmd<\/a><\/li>\n<li><i>Eric Zimmerman,\u00a0<\/i>Command line access to offline Registry hives. Supports simple &amp; regular expression searches as well as searching by last write timestamp.\u202f<a href=\"http:\/\/binaryforay.blogspot.co.uk\/2015\/05\/introducing-recmd.html\">Further details.<\/a><\/li>\n<li><a href=\"http:\/\/www.digitalforensicssolutions.com\/registrydecoder\/\">Registry Decoder<\/a><\/li>\n<li><i>US National Institute of Justice, Digital Forensics Solutions<\/i><\/li>\n<li>For the acquisition, analysis, and reporting of registry contents.<\/li>\n<li><a href=\"http:\/\/binaryforay.blogspot.co.uk\/p\/software.html\">Registry Explorer<\/a><\/li>\n<li><i>Eric Zimmerman<\/i><\/li>\n<li>Offline Registry viewer. Provides deleted artefact recovery, value slack support, and robust searching.\u202f<a href=\"http:\/\/binaryforay.blogspot.co.uk\/2015\/03\/registry-explorer-0020-released.html\">Further details.<\/a><\/li>\n<li><a href=\"http:\/\/regripper.wordpress.com\/\">RegRipper<\/a><\/li>\n<li><i>Harlan\u00a0Carvey<\/i><\/li>\n<li>Registry data extraction and correlation tool.<\/li>\n<li><a href=\"http:\/\/sourceforge.net\/projects\/regshot\/files\/\">Regshot<\/a><\/li>\n<li><i>Regshot<\/i><\/li>\n<li>Takes snapshots of the registry allowing comparisons e.g., show registry changes after installing software.<\/li>\n<li><a href=\"http:\/\/binaryforay.blogspot.co.uk\/p\/software.html\">ShellBags Explorer<\/a><\/li>\n<li><i>Eric Zimmerman<\/i><\/li>\n<li>Presents visual representation of what a user\u2019s directory structure looked like. Additionally exposes various timestamps (e.g., first explored, last explored for a given folder.\u202f<a href=\"http:\/\/binaryforay.blogspot.co.uk\/2015\/05\/shellbags-explorer-061-released.html\">Further details.<\/a><\/li>\n<li><a href=\"http:\/\/www.woanware.co.uk\/forensics\/usbdeviceforensics.html\">USB Device Forensics<\/a><\/li>\n<li><i>Woanware<\/i><\/li>\n<li>Details previously attached USB devices on exported registry hives.<\/li>\n<li><a href=\"http:\/\/www.4discovery.com\/our-tools\/\">USB Historian<\/a><\/li>\n<li><i>4Discovery<\/i><\/li>\n<li>Displays 20+ attributes relating to USB device use on Windows systems.<\/li>\n<li><a href=\"http:\/\/www.nirsoft.net\/utils\/usb_devices_view.html\">USBDeview<\/a><\/li>\n<li><i>Nirsoft<\/i><\/li>\n<li>Details previously attached USB devices.<\/li>\n<li><a href=\"http:\/\/www.4discovery.com\/our-tools\/\">User Assist Analysis<\/a><\/li>\n<li><i>4Discovery<\/i><\/li>\n<li>Extracts SID, User Names, Indexes, Application Names, Run Counts, Session, and Last Run Time Attributes from\u00a0UserAssist\u00a0keys.<\/li>\n<li><a href=\"http:\/\/www.nirsoft.net\/utils\/passwordfox.html\">PasswordFox<\/a><\/li>\n<li><i>Nirsoft<\/i><\/li>\n<li>Extracts the user names and passwords stored by Mozilla Firefox Web browser.<\/li>\n<li><a href=\"http:\/\/blog.didierstevens.com\/programs\/userassist\/\">UserAssist<\/a><\/li>\n<li><i>Didier Stevens<\/i><\/li>\n<li>Displays list of programs run, with run count and last run date and time.<\/li>\n<li><a href=\"http:\/\/www.mitec.cz\/wrr.html\">Windows Registry Recovery<\/a><\/li>\n<li><i>MiTec<\/i><\/li>\n<li>Extracts configuration settings and other information from the Registry.<\/li>\n<li><b>Application analysis<\/b><\/li>\n<li><a href=\"http:\/\/info.magnetforensics.com\/dropbox-decryptor\">Dropbox Decryptor<\/a><\/li>\n<li><i>Magnet Forensics<\/i><\/li>\n<li>Decrypts the Dropbox\u00a0filecache.dbx\u00a0file which stores information about files that have been synced to the cloud using Dropbox.<\/li>\n<li><a href=\"http:\/\/info.magnetforensics.com\/google-maps-tile-investigator\">Google Maps Tile Investigator<\/a><\/li>\n<li><i>Magnet Forensics<\/i><\/li>\n<li>Takes\u00a0x,y,z\u00a0coordinates found in a tile filename and downloads surrounding tiles providing more context.<\/li>\n<li><a href=\"http:\/\/www.sandersonforensics.com\/forum\/list.php?category\/46-Free-Software\">KaZAlyser<\/a><\/li>\n<li><i>Sanderson Forensics<\/i><\/li>\n<li>Extracts various data from the\u00a0KaZaA\u00a0application.<\/li>\n<li><a href=\"http:\/\/www.nirsoft.net\/utils\/live_messenger_contacts.html\">LiveContactsView<\/a><\/li>\n<li><i>Nirsoft<\/i><\/li>\n<li>View and export Windows Live Messenger contact details.<\/li>\n<li><a href=\"http:\/\/www.nirsoft.net\/utils\/skype_log_view.html\">SkypeLogView<\/a><\/li>\n<li><i>Nirsoft<\/i><\/li>\n<li>View Skype calls and chats.<\/li>\n<li><b>For Reference<\/b><\/li>\n<li><a href=\"http:\/\/mt-naka.com\/hotswap\/index_enu.htm\">HotSwap<\/a><\/li>\n<li><i>Kazuyuki Nakayama<\/i><\/li>\n<li>Safely remove SATA disks similar to the \u201cSafely Remove Hardware\u201d icon in the notification area.<\/li>\n<li><a href=\"http:\/\/code.google.com\/p\/iphonebackupbrowser\/\">iPhone Backup Browser<\/a><\/li>\n<li><i>Rene\u00a0Devichi<\/i><\/li>\n<li>View unencrypted backups of iPad, iPod and iPhones.<\/li>\n<li><a href=\"http:\/\/www.nirsoft.net\/utils\/iehv.html\">IEHistoryView<\/a><\/li>\n<li><i>Nirsoft<\/i><\/li>\n<li>Extracts recently visited Internet Explorer URLs.<\/li>\n<li><a href=\"http:\/\/www.sei.cmu.edu\/digitalintelligence\/tools\/liveview\/index.cfm\">LiveView<\/a><\/li>\n<li><i>CERT<\/i><\/li>\n<li>Allows examiner to boot dd images in VMware.<\/li>\n<li><a href=\"http:\/\/blog.digital-forensics.it\/2012\/05\/whatsapp-forensics.html\">WhatsApp Forensics<\/a><\/li>\n<li><i>Zena Forensics<\/i><\/li>\n<li>Extract\u00a0WhatApp\u00a0messages from iOS and Android backups.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-four\/\"><em><strong>COMPUTER FORENSICS TOOLS PART IV &#8211;<span style=\"color: #ff0000;\">CONTINUED<\/span><\/strong><\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Computer Forensics Tools &#8211; Part III Mobile devices iPBA2 Mario\u00a0Piccinelli,\u00a0Explore iOS backups. iPhone Analyzer Leo Crawford, Mat Proud,\u00a0Explore the internal file structure of Pad, iPod <a class=\"mh-excerpt-more\" href=\"https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-three\/\" title=\"Computer Forensics Tools Part III\"><span>Read More<\/span><\/a><\/p>\n<\/div>","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-41","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Computer Forensics Tools Part III - Computer Forensics Expert<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-three\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Forensics Tools Part III - Computer Forensics Expert\" \/>\n<meta property=\"og:description\" content=\"Computer Forensics Tools &#8211; Part III Mobile devices iPBA2 Mario\u00a0Piccinelli,\u00a0Explore iOS backups. iPhone Analyzer Leo Crawford, Mat Proud,\u00a0Explore the internal file structure of Pad, iPod Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-three\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Forensics Expert\" \/>\n<meta property=\"article:modified_time\" content=\"2018-09-17T16:48:54+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-three\/\",\"url\":\"https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-three\/\",\"name\":\"Computer Forensics Tools Part III - Computer Forensics Expert\",\"isPartOf\":{\"@id\":\"https:\/\/josephnaghdi.com\/#website\"},\"datePublished\":\"2018-09-17T16:17:42+00:00\",\"dateModified\":\"2018-09-17T16:48:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-three\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-three\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-three\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/josephnaghdi.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Forensics Tools Part III\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/josephnaghdi.com\/#website\",\"url\":\"https:\/\/josephnaghdi.com\/\",\"name\":\"Computer Forensics Expert\",\"description\":\"Digital Forensics Investigatory Tools\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/josephnaghdi.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computer Forensics Tools Part III - Computer Forensics Expert","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-three\/","og_locale":"en_US","og_type":"article","og_title":"Computer Forensics Tools Part III - Computer Forensics Expert","og_description":"Computer Forensics Tools &#8211; Part III Mobile devices iPBA2 Mario\u00a0Piccinelli,\u00a0Explore iOS backups. iPhone Analyzer Leo Crawford, Mat Proud,\u00a0Explore the internal file structure of Pad, iPod Read More","og_url":"https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-three\/","og_site_name":"Computer Forensics Expert","article_modified_time":"2018-09-17T16:48:54+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-three\/","url":"https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-three\/","name":"Computer Forensics Tools Part III - Computer Forensics Expert","isPartOf":{"@id":"https:\/\/josephnaghdi.com\/#website"},"datePublished":"2018-09-17T16:17:42+00:00","dateModified":"2018-09-17T16:48:54+00:00","breadcrumb":{"@id":"https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-three\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-three\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/josephnaghdi.com\/index.php\/computer-forensics-tools-part-three\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/josephnaghdi.com\/"},{"@type":"ListItem","position":2,"name":"Computer Forensics Tools Part III"}]},{"@type":"WebSite","@id":"https:\/\/josephnaghdi.com\/#website","url":"https:\/\/josephnaghdi.com\/","name":"Computer Forensics Expert","description":"Digital Forensics Investigatory Tools","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/josephnaghdi.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/josephnaghdi.com\/index.php\/wp-json\/wp\/v2\/pages\/41","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/josephnaghdi.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/josephnaghdi.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/josephnaghdi.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/josephnaghdi.com\/index.php\/wp-json\/wp\/v2\/comments?post=41"}],"version-history":[{"count":5,"href":"https:\/\/josephnaghdi.com\/index.php\/wp-json\/wp\/v2\/pages\/41\/revisions"}],"predecessor-version":[{"id":57,"href":"https:\/\/josephnaghdi.com\/index.php\/wp-json\/wp\/v2\/pages\/41\/revisions\/57"}],"wp:attachment":[{"href":"https:\/\/josephnaghdi.com\/index.php\/wp-json\/wp\/v2\/media?parent=41"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}