From 2c8874420a56834c54078f62f377f73b4b8013d7 Mon Sep 17 00:00:00 2001 From: stephensottosanti <63934523+stephensottosanti@users.noreply.github.com> Date: Sun, 7 Mar 2021 23:06:31 -0600 Subject: [PATCH] Update README.md --- Skills/File_Analysis/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Skills/File_Analysis/README.md b/Skills/File_Analysis/README.md index 5b002b2..522603c 100644 --- a/Skills/File_Analysis/README.md +++ b/Skills/File_Analysis/README.md @@ -8,7 +8,7 @@ One of the more common activities in digital forensics is the recovery of delete Below is a screenshot of the output of the Sleuth Kit file listing tool (fls) which shows two files that have been “deleted” by the user but are still recoverable. The ability to recover and save what was previously thought to be deleted files can be very valuable in an investigation.

-FileAnalysis +FileAnalysis

Specifically, when looking at the analysis of files, an investigator needs to start with the file header. File headers are information about a file that the computer stores so that it knows what type of file it is. Typically, file headers are stored in the first 4 or 5 bytes of a file. By using the hexdump tool, the hexadecimal version of a file can be viewed. Hexdump is available on most Linux distributions and there are many Windows interfaces to Hexdump (ex. https://sourceforge.net/projects/hexdump/).