1. Andriller Tool Use Case |
21. OSForensics Tool Use Case |
2. Blurity Tool Use Case |
22. Procmon Tool Use Case |
3. Browser history examiner Tool Use Case |
23. Process Explorer Tool Use Case |
4. Bulk Extractor Tool Use Case |
24. Recuva Tool Use Case |
5. Disk wipe Tool Use Case |
25. Redline Tool Use Case |
6. Exiftool Tool Use Case |
26. Rufus Tool Use Case |
7. File Matadata Tool Use Case |
27. Splunk Tool Use Case |
8. Hash Calc Tool Use Case |
28. Sys Analyzer Tool Use Case |
9. Hash My file Tool Use Case |
29. TCP view Tool Use Case |
10. Helix Tool Use Case |
30. Tor Tool Use Case |
11. Hex editor Neo Tool Use Case |
31. Unknown_File_Hunter Tool Use Case |
12. HxD Tool Use Case |
32. USB Device View Tool Use Case |
13. Jpeg Snoop Tool Use Case |
33. Veracrypt Tool Use Case |
14. Kernel for Exchange Server Tool Use Case |
34. Volatility Tool Use Case |
15. Log parsar Tool Use Case |
35. WFA Tool Use Case |
16. Magnet RAM Capture Tool Use Case |
36. Win Audit Tool Use Case |
17. Maltego Carbon Set Up Tool Use Case |
37. Win IP Config Tool Use Case |
18. Malwarebytes Tool Use Case |
38. WIRESHARK Tool Use Case |
19. Manage Engine Desktop Tool Use Case |
|
20. Network Miner Tool Use Case |
40. MD5 Summer Tool Use Case |
Access the Virtual Cyber Lab