< All Computer Hacking and Forensics Notes

cwolfe | Computer and Hacking Forensics | Module 10 – Recovering and Deleting Files

By: cwolfe | Related Course: Computer Hacking and Forensics | Published: October 9, 2017 | Modified: November 5, 2017
Join Cybrary

NotepadDDR professional

shows that when deleting files that only the point of record is removed. provides an opportunity work with it before purchasing. 

NotepadFile Scavenger Lab

works well for finding out if someone is covering their tracks. doesn’t work well for finding old data on a file formatted several times. 

NotepadHandyRecovery Lab

Have to select disk first and then it will go down to the file. 

works quickly. Good for a quick check of drives. 

NotepadNecleus Kernel Lab

Works with Linux. This pulls the basic info on the drive such as head, capacity. 

It will look for a specific linux drive. 

Notepadrecovering and deleting files

recovering and deleting files:

– what level? 

is it a file, partition or drive? 

disk part and internals are for deleted partitions. 

MFT (master file table) is a map of all files on the computer. 

-recovery tools

Restorer 2000, BADcopy Pro, PCInspector, ISO buster file recover, etc. 

NotepadTestdisk Lab

*done in Kali Linux. *

Linux utility for recovering last partitions from HDD and/or make non-booting disks bootable. can repair file system errors.

CMD to install testdisk

TXT = testdisk.log will contain your info



Notepadtotal recall lab

can pick what to scan and review. file & partition recovery. 

500 megs is about 10 minutes of scanning. 

can drill down to review what’s in the drive



Have to pay for the tool in order to get your files back after finding them. 

< All Computer Hacking and Forensics Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?