解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 52+1 – 2023 - FORENSIC ANALYSIS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

FORENSIC ANALYSIS

Ahmed Belhadjadji

Oleg Afonin at Elcomsoft

December 27th, 2023 by Oleg AfoninCategory: «General» This guide covers the correct installation procedure for Elcomsoft low-level extraction agent, an integral part of iOS Forensic Toolkit that helps extracting the file system and keychain from supported iOS devices. This instruction manual provides a step-by-step guide for setting up a device and installing the extraction agent. We’ve included suggestions from troubleshooting scenarios and recommendations we derived during testing. Introductio...

Forensafe

29/12/2023 Friday Instagram application, owned by Meta Platforms (formerly Facebook), is a widely used social media platform that provides various forms of communication. Instagram allows users to exchange diverse types of content, including text, videos, contact information, and audio messages. It provides a versatile platform for sharing and engaging with others. This application is accessible across multiple operating systems such as Windows, macOS, Linux, Android, and iOS, enabling users to ...

Lionel Notari

iOS Unified Logs - Making a callDernière mise à jour : il y a 2 joursIn previous articles, we explored certain iOS unified logs related to the unlock process as well as the WhatsApp application. In this current article, I aim to share the Unified Logs that you can analyze when a user makes a call with their iPhone. Indeed, if the user calls a chosen contact from the Phone application or by using Siri, for example, the generated Unified Logs will be significantly different, providing valuable cla...

Mattia Epifani at Zena Forensics

By Mattia Epifani - December 27, 2023 A common question during a forensic investigation of a digital device is: "Has the user ever used the XYZ application?".As always when answering this question, it is important to create and follow a solid process.In this blog post, I want to share a possible process that everyone should customize based on their needs and roles.The ability to answer the question depends on the acquisition that was obtained from the device. In this blog post, I will address th...

Salvation DATA

Knowledge 2023-12-27 Content Overview Understanding MDF File Structure Importance of Decoding MDF Files Tools for Decoding MDF Files Step-by-Step Guide for Decoding and Recovering MDF Files Conclusion Content Overview Understanding MDF File Structure Importance of Decoding MDF Files Tools for Decoding MDF Files Step-by-Step Guide for Decoding and Recovering MDF Files Conclusion Overview MDF files, an acronym for Measurement Data Format, are a primary component in the realm of SQL Server database...

Knowledge 2023-12-28 Content Overview 3 Common RAID types and Their Features Case Study Cautions Content Overview 3 Common RAID types and Their Features Case Study Cautions Overview In the past, people often use one or two hard disk to storage media file from the DVR. But now, more and more scenes have the camera to record the video files, meanwhile, these cameras can also help police to trace the criminal suspects or check some details that showed in some cases. So there should exist more than ...

Sarah Hayes at Hexordia

Dec 23 Written By Sarah Hayes Unlocking or rooting an Android device can offer significant advantages in a variety of testing scenarios, ranging from gaining access to system files and facilitating app development and debugging to assessing custom ROMs, conducting automation testing, and evaluating network and performance functionalities. Additionally, these processes are instrumental in research and development efforts and contribute to tool validation and comparisons. Unlocking or rooting an A...