解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 16 – 2024 - FORENSIC ANALYSIS

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

FORENSIC ANALYSIS

Bruno Fischer

Dieser Blog-Post ist auch in Deutsch verfügbar. Inspired by the various CTFs (Capture the Flag) and the podcast "Digital Forensics Now" by Heather Charpentier and Alexis "Brigs" Brignoni, I decided to investigate an app on an Android device. I wanted to analyze an app that I use regularly. The choice fell on the classifieds portal "kleinanzeigen.de", formerly "eBay Kleinanzeigen", which is popular in Germany. The app is mainly used in Germany as a local trading platform. A website is also offere...

This Blog is also in english avilable.Inspiriert durch die verschiedenen CTF (Capture the Flag) sowie durch den Podcast "Digital Forensics Now" von Heather Charpentier und Alexis "Brigs" Brignoni habe ich mir vorgenommen, eine App auf einem Android-Gerät zu untersuchen. Hierbei wollte ich eine App analysieren, die ich regelmäßig nutze. Dabei ist die Wahl auf das in Deutschland populäre Kleinanzeigen Portal "kleinanzeigen.de", ehemals "eBay Kleinanzeigen", gefallen. Hauptsächlich wird die App in ...

Amr Ashraf at Cyber 5W

Cyber 5W in Disk-Forensics Introduction Hard disks are the containers that hold our evidence files “from the investigator’s perspective”, understanding them is mandatory for every forensic analyst as they can provide valuable information within the investigation. As the investigator is required to handle the case with caution to preserve the data, he must understand how this data is stored and how it’s handled by the hard disk itself, this will make him understand the consequences of any action ...

Deagler’s 4n6 Blog

Hexordia Weekly CTF Challenge 2024 - Week 1 Writeup Get link Facebook Twitter Pinterest Email Other Apps April 15, 2024 Recently, Hexordia has started a new weekly CTF challenge and I have signed up to join the challenge. The following is my writeup for the week 1 challenges:iOS - Crewmates are Sus (15 marks)What is Chad's user ID for the multiplayer social game?The terms "Crewmates" and "Sus" used in the question name suggests to the popular multiplayer social game "Among Us"From iLEAPP "Applic...

Dr. Tristan Jenkinson at ‘The eDiscovery Channel’

Shaking the Cobwebs CTF Part One - Audio Analysis COPA v Wright - An Animated End to Craig Wright's Satoshi Claims?? Nothing’s DKIMpossible - Manually Verifying DKIM, a CTF Solution, and Implications Including the Electronic – A History of Electronic Disclosure (Part Three) Foundations of a New Direction – A History of Electronic Disclosure (Part Four) Zodiac Killer - Z340 Cipher Cracked After 50 Years Shaking the Cobwebs CTF Part Two - Morse Code and More COPA v Wright - The Identity Question T...

Hexordia CTF – Week 2 Tristan Jenkinson CTF April 20, 2024 4 Minutes By Dr Tristan Jenkinson Introduction Last week was week 2 of the Hexordia CTF. It was apparently “Android Week” with three challenges all focussed on the data from the Google Pixel. All three challenges were also linked to ChatGPT. Thankfully this was a better week for me, following a bad week one where unfortunately I just didn’t get any time to spend with the challenges. Let’s dive in. Total Freedom (Android) The word “gist” ...

Oleg Afonin at Elcomsoft

April 17th, 2024 by Oleg AfoninCategory: «General» iOS backup passwords are a frequent topic in our blog. We published numerous articles about these passwords, and we do realize it might be hard for a reader to get a clear picture from these scattered articles. This one publication is to rule them all. We’ll talk about what these passwords are, how they affect things, how to recover them, whether they can be reset, and whether you should bother. We’ll summarize years of research and provide spec...

Forensafe

19/04/2024 Friday Apple Notes is a note-taking application developed by Apple. The application is available in different Apple Operation Systems such as iOS, macOS, and iPadOS. Apple Note allows users to create short notes and it provides syncing of notes throughout different devices. Digital Forensics Value of Apple Notes Apple Notes artifacts can have a significant value in investigations when Apple devices are involved. The artifact can be very useful since it contains notes that had been wri...

Joshua Hickman at ‘The Binary Hick’

Binary Hick Android, Mobile 2024-04-162024-04-19 8 Minutes On the road. Since I was already in the mood, I thought I would keep picking on Samsung. I have had the pleasure of assisting a few people with this question over the past year, and I thought a blog post was in order for the wider community. My colleague Heather Barnhart has a peer reviewed post about Bluetooth connections on Android phones and how they can be used to determine if a driver may have been potentially distracted during an i...

Justin De Luna at ‘The DFIR Spot’

We’ve all heard of O365 (Office 365) or M365 (Microsoft 365) (depending on the name of this product this week), but how many of us responders know how to investigate a Google Workspace incident? If you’re an MSSP, vendor, or even working your own Incident Response (IR), you may find yourself running into more and more Google Workspace environments. Whether it’s investigating a suspected malicious email or a compromised user, do you know what logs exist? Are you familiar with the capabilities of ...

Aurora4n6

top of pageThis site was designed with the .com website builder. Create your website today.Start NowAURORA4N6HomeBlogInstagramMoreUse tab to navigate through the menu items.All PostsSearchlaurora4n6Apr 105 min readWhat's the Buz: Forensic Analysis of Buz for iOSUpdated: Apr 11A couple of weeks ago I was reading an article which mentioned the use of "walkie talkie" type apps. I was not aware these apps existed (enough with the old lady stuff 😂). So I went on the Apple App store and found two popu...