解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 28 – 2023 - FORENSIC ANALYSIS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。 一部の記事は Google Bard を使い要約しています。4n6 は こちら からご確認いただけます。

FORENSIC ANALYSIS

David Spreadborough at Amped

David Spreadborough July 4, 2023 Welcome back to our series on CCTV Acquisition where in this post we will be looking at remote acquisition using a mobile device. We briefly looked at this in a previous post where we examined the challenges of CCTV and video evidence that are submitted to the police by the public. Contents 1 Mobiles and Tablets 2 Network Access 3 Understanding an App 4 Identifying Recorded Video 5 Downloading Video 6 Exporting the Files 7 Export 8 Missing Files 9 Comparing Data ...

Felix Guyard at ForensicXlab

July 5, 2023 6-minute read Memory Forensics DFIR • Steam • LinuxWindowsMac • Video Games Abstract Link to heading Video games have become an integral part of our culture, providing entertainment and social opportunities. Unfortunately, criminals have also begun to take advantage of modern video games and their ever-growing capabilities to conduct illegal activities. Organized crime, hate spread, and pedophilia have been documented occurring within games, opening up the potential to a world...

Forensafe

07/07/2023 Friday Yandex Mail is an email service provider which provides its mailing services for free and it has been developed by a Russian company. This email service comes with a built-in translator as well as an antivirus protector and a spam blocker. It also provides its users with 5 GB of free cloud storage on its disk. Yandex Mail is considered to be one of the three largest email service providers in Runet. Digital Forensics Value of Android Yandex Mail Nowadays, email can be considere...

Jim Cole at CameraForensics

The importance of closing the knowledge gap between software and law enforcement29 June, 2023By Jim Cole from Onemi-Global SolutionsHaving recently retired from 35 years of government/law enforcement experience, I have spent a considerable amount of my efforts at the intersection of software development and law enforcement, and I am acutely aware of the knowledge gap that exists between these two worlds.  This gap can have serious consequences, particularly when it comes to cases involving chi...

Ken Pryor at ‘No Pryor Knowledge’

I've been working hard on forensic and malware related courses lately and having a lot of fun with it. I had almost forgotten how cool it was working on and learning this material. I thought I'd give a little update on my activities, so here it is. Take your No-Doz, this may be the longest post I've ever done.Forensic and Malware CoursesIn my last post, I mentioned that I was working on the Practical Malware Analysis and Triage (PMAT) class over at the TCM Academy. I finished the course recently...

Lorena Carthy-Wilmot

Uses24HourClock: falseRandom Dent·Follow2 min read·2 days ago--ListenShareThis is a forensics-focused “blog”. So my findings are through those lenses. Again, this is just me putting things on paper in case it helps anyone else out there.I’m doing some checks on a iPhone 13 Pro and while running the good ol’ ideviceinfo command (after trusting the device since it is password protected), I found an interesting line near the bottom:Uses24HourClock: falseI know this phone uses a 24-hour setting, so ...