Quantcast
Channel: Software – Forensic Focus – Articles
Browsing all 42 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Android Forensics Study of Password and Pattern Lock Protection

Let’s see what Pattern Lock is, how to access, determine or even get rid of it? We’ll also speak about Password Lock Protection and find out what it has in common with Pattern Lock. And finally we’ll...

View Article



Image may be NSFW.
Clik here to view.

iPhone Tracking – from a forensic point of view

- Introduction - iPhoneTracking is sexy!!! Every mobile forensic suite, at least the ones dealing with iPhones, are providing it proudly. iPhoneTracking also has been a hot topic in the media all...

View Article

Image may be NSFW.
Clik here to view.

Forensic Toolkit v3 Tips and Tricks ― Not on a Budget

A couple of weeks ago, Brian Glass posted a very helpful comment, Forensic Toolkit v3 Tips and Tricks — on a Budget.  His comment focused on how to “get close to SSD performance on the cheap” and he...

View Article

Image may be NSFW.
Clik here to view.

Review: Proof Finder by Nuix

Reviewed by Jonathan Krause of Forensic Control Well, this is an interesting proposition. Early last December Nuix, the respected producers of eDiscovery software, released an intriguing, and as far as...

View Article

Image may be NSFW.
Clik here to view.

Firefox Cache Format and Extraction

Introduction In the forensic lab where I work, we frequently investigate malware-infected workstations.  As our user population started shifting from Internet Explorer to Firefox, we observed that one...

View Article


Image may be NSFW.
Clik here to view.

AccessData FTK 4.0: initial impressions

Introduction In this post, I will provide some initial impressions and findings.  I do not  endeavor to write a white paper, or to employ an industry standard, scientific methodology to evaluating the...

View Article

Image may be NSFW.
Clik here to view.

Overcoming Potential Legal Challenges to the Authentication of Social Media...

By John Patzakis1 Summary: Social media evidence is highly relevant to most legal disputes and broadly discoverable, but challenges lie in evidentiary authentication without best practices technology...

View Article

Image may be NSFW.
Clik here to view.

689 Published Cases Involving Social Media Evidence (with full case listing)

The torrent of social media evidence continues to grow. In November 2011 we, at X1 Discovery, searched online legal databases of state and federal court decisions across the United States to identify...

View Article


Image may be NSFW.
Clik here to view.

Key Twitter and Facebook Metadata Fields Forensic Investigators Need to be...

Authentication of social media evidence can present significant challenges when you collect by screen shots, printouts or raw html feeds from an archive tool. This is just one reason why social media...

View Article


Image may be NSFW.
Clik here to view.

Mobile Phone Forensic Challenges

Introduction A great number of the mobile phones used worldwide every second require special knowledge and skills from forensic experts.  More often it is not enough to be an experienced expert in...

View Article

Image may be NSFW.
Clik here to view.

Introduction to Penetration Testing – Part 2 – The Discovery Phase – Passive...

Beschreibung, Quelle Quelle: selbst fotografiert, 01/2006 Fotograf: Späth Chr. Lizenzstatus: license (Photo credit: Wikipedia) PenTest, like forensics, is almost as much an art as it is a science – you...

View Article

Image may be NSFW.
Clik here to view.

Introduction to Penetration Testing – Part 3a – Active Reconnaissance

wi-fi garbage (Photo credit: Yuba College Public Space Apologies in advance, this is a bit of a connective blog entry – this is a big topic, and it needs some scene setting, basic understanding and...

View Article

Image may be NSFW.
Clik here to view.

Collecting and Processing Bloomberg Data

A few years ago, Bloomberg data may have been relatively unusual, however today we see Bloomberg chat and email data being collected quite frequently. Not a surprise really considering some of the...

View Article


Image may be NSFW.
Clik here to view.

Windows 8: Important Considerations for Computer Forensics and Electronic...

Introduction Documents identified by computer forensic investigations in civil litigation typically require review and analysis by attorneys to determine if the uncovered evidence could support causes...

View Article

Image may be NSFW.
Clik here to view.

Bad Sector Recovery

Bad Sector Recovery Hard drives are built in a way so that they never return unreliable data. This means that if a hard drive cannot guarantee 100 percent accuracy of the data requested, it will simply...

View Article


Image may be NSFW.
Clik here to view.

KS – an open source bash script for indexing data

KS – an open source bash script for indexing data ABSTRACT:  This is a keywords searching tool working on the allocated, unallocated data and the slackspace, using an indexer software and a database...

View Article

Image may be NSFW.
Clik here to view.

Detecting Forged (Altered) Images

Are digital images submitted as court evidence genuine or have the pictures been altered or modified? We developed a range of algorithms performing automated authenticity analysis of JPEG images, and...

View Article


Image may be NSFW.
Clik here to view.

Autopsy 3: Windows-based, Easy to Use, and Free

If you are like many digital investigators, you’ve heard about the Autopsy™ digital forensics tool and associate it with a course that used Linux to analyze a device.  Or, maybe you associate it with a...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security Challenge in Scotland

Towards the end of August, I was part of the team who were offered to help out and participate at an exciting event held at Glasgow Caledonian University. The event ran over five days with each day...

View Article

Image may be NSFW.
Clik here to view.

ForGe – Computer Forensic Test Image Generator

Introduction Creating test material for computer forensic teaching or tool testing purposes has been a known problem. I encountered the issue in my studies of Computer Forensics at the University of...

View Article
Browsing all 42 articles
Browse latest View live




Latest Images