HOME
PARTNERS
CONTACT
Computer Science and Engineering
Introduction
Objective
List of experiments
Target Audience
Course Alignment
Feedback
Introduction
Objective
List of experiments
Target Audience
Course Alignment
Feedback
Computer Forensics Lab
File signatures and use them for File carving
Memory Forensics: Password Hashes & Cached Files
Exploring the Master File Table (MFT)
LSB Data Hiding & Recovery
Distortion Techniques in Steganography
Forensic Techniques for Email Analysis
TOR Browser Detection
Network Attack Analysis with Wireshark