Extract Sensitive Information from Drives Using Bulk Extractor - Digital Forensics 🔎

preview_player
Показать описание
In today's digital forensic tutorial we're going to learn how we can find sensitive data from digital evidence files using bulk-extractor.

Bulk Extractor is a rich-featured tool that can extract useful information like Credit Card Numbers, Domain Names, IP Addresses, Emails, Phone Numbers and URLs from evidence Hard-drives or files found during Forensics Investigation.

Please subscribe! ❤️

🎵 Track Info:
[Mr. Robot]

😊 Get in touch with TSB:

#TheShadowBrokers
Рекомендации по теме
Комментарии
Автор

small and all to the point, thank you for helping

bobinsarma
Автор

Thank you, I just Subscribed, keep up the great work.

brandonproductions
Автор

Oh! that's J.B. Glad I found you out of the shadow, .What's up?

lynchjudy
Автор

hello! thank you for the wonderful video. do you have any idea what language (c++, python, java) bulk extractor was coded in? thanks again!

nominalpup
Автор

How do you run bulk extractor on a machine that is unresponsive/compromised? Do you have to dump the memory another way first?

haydene
Автор

how can i produce the voice from the video? please XD

bulmavegeta
Автор

I downloaded the file as you did and wrote the same command, but kali said "cannot open: No such file or directory (code: -1)

hoangbopp