Android Forensics Study of Password and Pattern Lock Protection
Let’s see what Pattern Lock is, how to access, determine or even get rid of it? We’ll also speak about Password Lock Protection and find out what it has in common with Pattern Lock. And finally we’ll...
View ArticleiPhone Tracking – from a forensic point of view
- Introduction - iPhoneTracking is sexy!!! Every mobile forensic suite, at least the ones dealing with iPhones, are providing it proudly. iPhoneTracking also has been a hot topic in the media all...
View ArticleForensic Toolkit v3 Tips and Tricks ― Not on a Budget
A couple of weeks ago, Brian Glass posted a very helpful comment, Forensic Toolkit v3 Tips and Tricks — on a Budget. His comment focused on how to “get close to SSD performance on the cheap” and he...
View ArticleReview: Proof Finder by Nuix
Reviewed by Jonathan Krause of Forensic Control Well, this is an interesting proposition. Early last December Nuix, the respected producers of eDiscovery software, released an intriguing, and as far as...
View ArticleFirefox Cache Format and Extraction
Introduction In the forensic lab where I work, we frequently investigate malware-infected workstations. As our user population started shifting from Internet Explorer to Firefox, we observed that one...
View ArticleAccessData FTK 4.0: initial impressions
Introduction In this post, I will provide some initial impressions and findings. I do not endeavor to write a white paper, or to employ an industry standard, scientific methodology to evaluating the...
View ArticleOvercoming Potential Legal Challenges to the Authentication of Social Media...
By John Patzakis1 Summary: Social media evidence is highly relevant to most legal disputes and broadly discoverable, but challenges lie in evidentiary authentication without best practices technology...
View Article689 Published Cases Involving Social Media Evidence (with full case listing)
The torrent of social media evidence continues to grow. In November 2011 we, at X1 Discovery, searched online legal databases of state and federal court decisions across the United States to identify...
View ArticleKey Twitter and Facebook Metadata Fields Forensic Investigators Need to be...
Authentication of social media evidence can present significant challenges when you collect by screen shots, printouts or raw html feeds from an archive tool. This is just one reason why social media...
View ArticleMobile Phone Forensic Challenges
Introduction A great number of the mobile phones used worldwide every second require special knowledge and skills from forensic experts. More often it is not enough to be an experienced expert in...
View ArticleIntroduction to Penetration Testing – Part 2 – The Discovery Phase – Passive...
Beschreibung, Quelle Quelle: selbst fotografiert, 01/2006 Fotograf: Späth Chr. Lizenzstatus: license (Photo credit: Wikipedia) PenTest, like forensics, is almost as much an art as it is a science – you...
View ArticleIntroduction to Penetration Testing – Part 3a – Active Reconnaissance
wi-fi garbage (Photo credit: Yuba College Public Space Apologies in advance, this is a bit of a connective blog entry – this is a big topic, and it needs some scene setting, basic understanding and...
View ArticleCollecting and Processing Bloomberg Data
A few years ago, Bloomberg data may have been relatively unusual, however today we see Bloomberg chat and email data being collected quite frequently. Not a surprise really considering some of the...
View ArticleWindows 8: Important Considerations for Computer Forensics and Electronic...
Introduction Documents identified by computer forensic investigations in civil litigation typically require review and analysis by attorneys to determine if the uncovered evidence could support causes...
View ArticleBad Sector Recovery
Bad Sector Recovery Hard drives are built in a way so that they never return unreliable data. This means that if a hard drive cannot guarantee 100 percent accuracy of the data requested, it will simply...
View ArticleKS – an open source bash script for indexing data
KS – an open source bash script for indexing data ABSTRACT: This is a keywords searching tool working on the allocated, unallocated data and the slackspace, using an indexer software and a database...
View ArticleDetecting Forged (Altered) Images
Are digital images submitted as court evidence genuine or have the pictures been altered or modified? We developed a range of algorithms performing automated authenticity analysis of JPEG images, and...
View ArticleAutopsy 3: Windows-based, Easy to Use, and Free
If you are like many digital investigators, you’ve heard about the Autopsy™ digital forensics tool and associate it with a course that used Linux to analyze a device. Or, maybe you associate it with a...
View ArticleCyber Security Challenge in Scotland
Towards the end of August, I was part of the team who were offered to help out and participate at an exciting event held at Glasgow Caledonian University. The event ran over five days with each day...
View ArticleForGe – Computer Forensic Test Image Generator
Introduction Creating test material for computer forensic teaching or tool testing purposes has been a known problem. I encountered the issue in my studies of Computer Forensics at the University of...
View Article
More Pages to Explore .....