archives

How-Tos

This category contains 27 posts

How To Save Time With XAMN’s Dynamic Artifact Count Feature

At MSAB, we’re always looking to improve our software and make every product more user-friendly, intuitive, and valuable; and to help save you time. We’ve recently improved the way that XAMN displays and counts artifacts. Let’s take a look at the new functionality. We’ve opened this case in XAMN, and from the start we can … Continue reading

How To Integrate LACE Carver With Griffeye Analyze DI Pro

Let’s talk about the exciting new LACE Carver integration with Analyze DI Pro. Once you have the proper license, you can head over to your Downloads page on MyGriffeye.com and go to the LACE Carver download. Once the app package has been downloaded, we can go back to Griffeye and install it under Settings –> … Continue reading

How To Use AXIOM In Malware Investigations: Part II

Hey everyone, Tara Nelson here with Magnet Forensics. Today I’m going to give a little insight into how AXIOM can help with some of your day-to-day investigations. In this video we’re going to talk a little bit about malware investigations. There is a Part I to this segment, in which I focus on reviewing memory … Continue reading

How To Boot Scan A Microsoft Surface Pro

Hi, I’m Rich Frawley, and I’m the Digital Forensic Specialist with ADF Solutions. Today we’re going to conduct a boot scan of a Microsoft Surface Pro with BitLocker activated. At this point you have decided on a search profile, or search profiles, to use and prepared your collection key. When conducting a boot scan, Digital … Continue reading

How To Use AXIOM In Malware Investigations: Part I

Hey everyone, Tara Nelson here with Magnet Forensics. Today I’m going to give a little bit of insight into how AXIOM can help with some of your day-to-day investigations. In part one of the segment we’re going to talk a little bit about malware investigations, in particular reviewing memory as part of AXIOM. Regardless of … Continue reading

How To Export Media Files From BlackLight Into Semantics21

So before we go to export our files from BlackLight to S21, what we will normally do is we will run the hashes against our case. In this case what we’ve done is we’ve already run these hashes against BlackLight, and as you can see, S21 has been run and it’s showing complete. These are … Continue reading

How To Use Amped DVRConv To Quickly Convert And Make Playable Proprietary CCTV Video

by Blake Sawyer, Amped Software When I worked for the police department, I was constantly pulled in a lot of different directions. To keep a good turnaround time for the nearly 200 requests we had each month, I was constantly looking for tools to automate or ease the load. Amped FIVE was a great resource … Continue reading

How To Collect And Share Digital Evidence Files With Prosecutors

In this short How To video, digital forensic specialist Rich Frawley will show you how to collect and share digital evidence files with prosecutors and third parties using ADF Software. This video is ideal for learning how to share evidence with prosecutors for review. If you are tasked with the collecting specific files or collecting … Continue reading

How To Boot Scan A Mac With APFS And FileVault 2

Hi, I’m Rich Frawley and I’m the Digital Forensic Specialist with ADF Solutions. Today we are going to conduct a boot scan of a MacBook Air that has APFS and FileVault 2 enabled. At this point you have decided on a search profile or profiles to use and and prepared your collection key. When conducting … Continue reading

Crime Scene Investigation of GPS Data in Unmanned Aerial Vehicles (UAVs)

by Chirath De Alwis The invention of the Unmanned Aerial Vehicle (UAV), also known as the drone, has the potential to address some crucial issues in society. Commercial aerial surveillance, oil/gas/mineral exploration, and disaster relief are some of them [1]. Considering the increasingly popular use of drones, it is evident that there is potential for … Continue reading

How To Integrate AD Enterprise And The CyberSponse Platform Using The AccessData API

AccessData is the first forensics company to offer a full-featured API that can integrate across the entire forensics and e-discovery portfolio, dramatically speeding up investigations and reducing the risk and expense of passing data between platforms. AccessData recently teamed up with CyberSponse, a leader in automated incident response playbooks, to demonstrate how the API would … Continue reading

How To Use Text Analytics With Rosoka Integration

Hi, I’m Rich Frawley and I’m the Digital Forensic Specialist with ADF Solutions. Today we are going to explore the text analytics capabilities built into ADF’s digital forensic software with the integration of Rosoka.  Rosoka brings the power of automated energy extraction and language identification with gisting directly into ADF through a tightly integrated user … Continue reading

How To Acquire Data From A Mac Using MacQuisition

Written by: Justin Matsuhara, Solutions Engineer, BlackBag Technologies Stephanie Thompson, Solutions Engineer, BlackBag Technologies Depending on the digital forensic imaging tool you have available, creating a forensic image of a Mac computer can be either an anxiety-creating situation, or as easy as “1-2-3-START”.  There are several things you must identify ahead of attempting a full … Continue reading

How To Create Compelling Image Authentication Reports With Amped Authenticate’s New Projects Feature

How many times have you said or heard: “I’ll believe it when I see it”? This expression reveals our eyes’ dramatic convincing power: when you see something, you tend to believe it’s true much more easily than when you hear or read about it. In the digital age, for most people, this convincing power seamlessly … Continue reading

How To Acquire Video Data With MD-VIDEO From HancomGMD

Due to the rapidly growing need for securing safe environments around the world, digital surveillance systems have become ubiquitous. A significant number of new surveillance systems are installed each year, and the importance of acquiring actionable data from these systems is growing across the globe.  According to a recent statistic, the amount of surveillance video … Continue reading

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,271 other followers