Table Of Content:
Chapter 1.
1.1. Computer Forensics: Database Forensics – GREP
1.2. Computer Forensics: Web & Network Forensics
1.2.1 Web & Network Forensics: Google Search Operators
1.2.2 Web & Network Forensics: Skype Email Resolver
1.2.3 Web & Network Forensics: Facebook Hidden Email & Phone Resolver
1.2.4 Web & Network Forensics: IP Location Analysis & Resolver
1.2.5 Web & Network Forensics: People Search Directories
1.2.6 Web & Network Forensics: SSN Lookup (USA/UK)
1.2.7 Web & Network Forensics: WhoIs LookUp (Whoisology)
1.2.8 Web & Network Forensics: Reverse Image
1.2.9 Web & Network Forensics: HackedData Search Engine
Chapter 2.
2.1 AntiComputer Forensics: Deindexation
2.1.1 2.1.12: Ego’s Private Methods
2.2 AntiComputer Forensics: Trail Obfuscation
2.2.1 Trail Obfuscation: Timestomp
2.2.2 Trail Obfuscation: Transmogrify
2.2.3 Trail Obfuscation: Data Poisoning
2.3 AntiComputer Forensics: Data Hiding
2.3.1 Data Hiding: Encryption
2.3.2 Data Hiding: Steganography
2.3.3 Data Hiding: Other Forms of Data Hiding (Slacker)
2.4 AntiComputer Forensics: Artifact Wiping
2.4.1 Artifact Wiping: Disk Cleaning Utilities
2.4.2 Artifact Wiping: File Wiping Utilities
2.4.3 Artifact Wiping: Disk Degaussing | Destruction Techniques
https://anonfiles.com/YdfbkeBdn0/The_Doxing_Bible_pdf
Enjoy