HstEx® is able to extract browser records directly from source forensic files enabling the recovery of evidence, not only from unallocated clusters, but also from cluster slack, memory dumps, paging files and system restore points amongst others. It is an extremely powerful tool in your forensic tool-box.
From a forensic perspective, it is important that HstEx® is used in combination with NetAnalysis®.
Search this documentation
Recently Updated Pages
- apple
- binary
- blade-v1-14
- browser
- cache
- carve
- carving
- change-log
- chrome
- chromium
- column
- configuration
- cookies
- data
- database
- dataset
- dd
- decoding
- deleted
- demo
- documentation
- dongle
- dr
- e01
- encase
- encoding
- error
- evaluation
- export
- faq
- featured
- filter
- firefox
- forensic
- guide
- help
- history
- hstex
- ie
- image
- install
- intelli-carve
- internet-explorer
- jet
- kb-blog
- kb80005
- kb80007
- layout
- licence
- limitations
- lkf
- manual
- meta
- microsoft
- mozilla
- netanalysis
- netanalysis-v2-11
- new
- news
- opera
- options
- os
- problem
- problem-solving
- quick-start
- recovery
- release
- release-notes
- reporting
- restrictions
- safari
- search
- sector
- security
- segment
- setup
- solution
- solutions
- sqlite
- support
- supported
- technical
- tif
- time
- timezone
- training
- tutorial
- tutorials
- tz
- upgrade
- uri
- url
- usb
- utc
- virtual
- vmware
- windows
- workspace