Posts

How to get a bitlocker password?

Image
The easiest way to find your bitlocker password is by using Command Prompt. 1. Type cmd on your windows and run as Administrator 2. C:\Windows\system32>manage-bde -protectors -get c: BitLocker Drive Encryption: Configuration Tool version 10.0.19041 Copyright (C) 2013 Microsoft Corporation. All rights reserved. Volume C: [System] All Key Protectors  Numerical Password:       ID: {06AE1787-XXXXXXXXXXXXXXX}       Password:         715869-275543-0555554-2DDD4-AAAAA-BBBBB-YYYYY-XXXX Now you can find the bitlocker password. The command below is to find bitlocker password for Drive D C:\Windows\system32>manage-bde -protectors -get d:

Overview SQL Server Management Studio (SSMS)

Image
SQL Server Management Studio (SSMS)  Definisi SSMS  SQL Server Management Studio adalah aplikasi perangkat lunak yang digunakan untuk mengonfigurasi, mengelola, dan mengimplementasikan semua komponen dalam Microsoft SQL Server.  SSMS menyediakan pilihan client dan server dalam satu paket sehingga menudahkan untuk pengoperasiannya. Salah satu kelebihan penggunaan SSMS ini adalah kita bisa melakukan pengolahan data dengan jumlah record maksimal 10 juta untuk satu database (kalau excell hanya mampu menampung sekitar 1 juta record untuk satu file). Selain itu aplikasi ini juga gratis dan bisa digunakan untuk mengimport data dari beberapa tipe file misalnya file excell untuk kemudian dianalisis di SSMS. Namun sebelum mengoperasikan SSMS, terlebih dahulu kita harus menginstal SQL Server.  Dalam ms_sql_server_tutorial dijelaskan:  SQL Server works in client-server architecture; hence, it supports two types of components: (a) Workstation and (b) Serv...

Panduan Mengakuisisi Data Jaringan dan Email

Image
Panduan Akuisisi Data Network dan Email  Panduan ini memberikan panduan tahapan mengakuisisi data yang berpotensi menjadi bukti elektronik yang tersimpan dalam Jaringan dan Email. Berbeda dengan media penyimpanan berbetuk fisik, perlu tambahan prosedur yang harus dilakukan untuk mengakusisi data yang tersimpan di Jaringan dan Email yaitu:  Perlunya hardware atau software untuk bisa terhubung dengan Jaringan dan bisa merekam aktivitas Jaringan dalam periode tertentu;  Perlunya username dan kata sandi yang diperlukan untuk terhubung dengan Email yang menjadi target akuisisi.  Tujuan pelaksanaan akuisisi data network adalah untuk mendapatkan data yang berpotensi menjadi bukti elektronik yang dikirimkan oleh client kepada server dan data yang dikirimkan server kepada client. Sedangkan tujuan akuisisi data cloud adalah untuk mengunduh data yang berpotensi menjadi bukti elektronik yang tersimpan di dalam tempat penyimpanan Email yang telah dibuat oleh pi...

Mobile Forensic Data Acquisition Methods

Image
Mobile Forensic Data Acquisition Methods When conducting data acquisition method on mobile phone, consider 5 data acquisition method that might be helpful for the result of investigation: Cellular data acquisition SIM file system acquisition Logical acquisition Physical acquisition File system acquisition Otherwise, Mobile storage and evidence locations can be located on several location including: Internal memory (RAM, ROM or flash memory (NAND/NOR) is used to store mobile phone’s OS, applications and data) SIM Card (Stores personal information, address books, messages, and service-related information) External memory (Stores personal information such as audio, video, images, etc) Extraction methods on mobile phone consist of several methods depend on the type and brand of the phone: Apple & Blackberry :- Vendor of OS and hardware. Symbian & Android & Windows :- Different vendors for OS and hardware ( Proprietary OS).  Consider these steps whe...

Overview Ios Mobile Forensic

Image
IOS Overview  Easy to use interface Security is a core part of the iOS design Developed to support specifically designed hardware for customers Example the advantages of iOS are: User can view flash messages or notifications without unlocking the phone Quick access to camera Warnings of the activity and ability to turn off certain features with ease are integrated Mobile Device SIM card Memory internal external SD card Mobile Phones (Classical phones, Features phones, Smart phones, Novelty phones) Other devices (GPS devices, Mobile modems, Media, Tablets) Interfaces (Cables :- fast, secure, Bluetooth :- handset ID may be visible to others) ACPO (Association of Chief Police Officers), summary for mobile forensic: No law enforcement agencies or their agents should change data on a mobile phone, which is relied upon in court. Person accessing the mobile phone should be competent and qualified to give evidence and explain the relevance and implications o...

Volatility of Digital Evidence

Image
Digital evidence is more volatile than tangible information because digital data can be altered or destroyed more easily than tangible information. And because digital evidence can be easily altered or destroyed, the integrity of digital evidence must be preserved. Data that has been altered or destroyed are considered violations of data integrity. What is more, the alteration or destruction of digital evidence is typically irreversible. So, once the integrity of digital evidence has been violated, it usually cannot be restored. Additionally, the failure to preserve the integrity of digital evidence could result in evidence being deemed inadmissible in a legal proceeding, or, even if admitted, it might not be given much weight because evidence of questionable authenticity does not provide reliable proof. Digital evidence that is destroyed when litigation is expected, or in progress, might give rise to claims of spoliation of evidence, which, if proven, could lead to mo...

Investigation Procedures

Image
When conducting fraud examinations, fraud examiners should adhere to the fraud theory approach. The fraud theory approach is an investigative tool designed to help fraud examiners organize and direct examinations, based on the information available at the time. According to the fraud theory approach, when conducting investigations into allegations or signs of fraud, the fraud examiner should: Analyze the available data. Create a hypothesis.  Test the hypothesis.  Refine and amend the hypothesis.  Act on Predication Fraud examinations must adhere to the law; therefore, fraud examiners should not conduct or continue fraud examinations without proper predication. Predication is the totality of circumstances that would lead a reasonable, professionally trained, and prudent individual to believe a fraud has occurred, is occurring, or will occur. In other words, predication is the basis upon which a fraud examination, and each step taken during the examination, is commen...