解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 25 – 2023 - MISCELLANEOUS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

MISCELLANEOUS

Elcomsoft

June 13th, 2023 by Vladimir KatalovCategory: «General», «Mobile» The market of digital forensic tools is a tight one, just like any other niche market. The number of vendors is limited, especially when catering such specific needs as unlocking suspects’ handheld devices or breaking encryption. However, amidst the promises of cutting-edge technology and groundbreaking solutions, there are certain limitations that forensic vendors often don’t like to disclose to their customers. These limitations ...

June 14th, 2023 by Vladimir KatalovCategory: «General», «Mobile» Year after year, the field of digital forensics and incident response (DFIR) presents us with new challenges. Various vendors from around the world are tirelessly striving to simplify and enhance the work of experts in this field, but there are some things you probably do not know about (or simply never paid attention to) that we discussed in the first part of these series. Today we’ll discuss some real cases to shed light onto som...

June 16th, 2023 by Oleg AfoninCategory: «General» In the digital age, where information is a precious commodity and evidence is increasingly stored in virtual realms, the importance of preserving digital evidence has become a must in modern investigative practices. However, the criticality of proper handling is often overlooked, potentially jeopardizing access to crucial data during an investigation. In this article, we will once again highlight the importance of meticulous preservation techniqu...

Forensic Focus

Christa Miller at Forensic Horizons

Christa Miller·FollowPublished inForensic Horizons·5 min read·Jun 17--ListenSharePhoto by Europeana on UnsplashHow do jurors really weigh digital evidence? Previously, I wrote about how complicated it can be to present digital evidence to factfinders, along with some of the factors that make it complicated.Jurors’ perspectives were missing from these as well as my original paper, not least because many jurisdictions frown on jurors discussing deliberations even after trial.Then, not long ago, a ...

Magnet Forensics

This post is authored by Christopher Cone, a Forensic Consultant at Magnet with 20 years of law enforcement experience. Recently, I have seen user questions about hardware choices as it relates to performance with Magnet AXIOM or Magnet AXIOM Cyber. When it comes down to it, we all want our cases processed faster! This was a regular topic of discussion during my time on the Training team at Magnet Forensics. In my experience—not just with Magnet AXIOM, but all computer software that I have used—...

GrayKey extractions are an amazing tool for digital investigators and examiners, since getting a full file system image is crucial. For years, most forensic examinations of iOS devices were limited to data only available in an iTunes backup and only if you had the user’s passcode—with Android acquisitions not being much easier. However, in recent years examiners working in mobile investigations have had additional tools in their DFIR tool bag. Grayshift, maker of GrayKey, have given organization...

Mirror review

Salvation DATA

Knowledge 2023-06-13 Content A Brief Introduction of Forensic Data Recovery Process of Forensic Data Recovery Tools and Techniques Used in Forensic Data Recovery Applications of Forensic Data Recovery Data Recovery Services Near Me Content A Brief Introduction of Forensic Data Recovery Process of Forensic Data Recovery Tools and Techniques Used in Forensic Data Recovery Applications of Forensic Data Recovery Data Recovery Services Near Me A Brief Introduction of Forensic Data Recovery The capaci...

SANS

Wessel Hissink

Introduction/Preface Welcome again to my blog. You probably got here because of my repository WesSec/VelociDeploy-o-Matic (github.com) :)) or a link on my socials. This blog will describe the process of the code written and the thought process behind it. If you just want the instructions to get the project up and running, check out the GitHub page here. Incident response is a fast-moving world. Back in the day you would physically go to the customer, and rip out the network cables to mitigate. P...