archives

Digital Forensics

This tag is associated with 147 posts

Four Critical Success Factors In Mobile Forensics

by Mike Dickinson, Deputy Executive Officer at MSAB The purpose of this paper is to encourage mobile forensic practitioners to consider a wider number of critical factors surrounding their choice and use of mobile forensic tools. Specifically, the quality of decoding, training of users and ultimately the preservation of digital as evidence in court proceedings. … Continue reading

How To Acquire Data From A Mac Using MacQuisition

Depending on the digital forensic imaging tool you have available, creating a forensic image of a Mac computer can be either an anxiety-creating situation, or as easy as “1-2-3-START”.  There are several things you must identify ahead of attempting a full disk image of the system. Below are some things to consider: Type of Mac … Continue reading

How To Create Compelling Image Authentication Reports With Amped Authenticate’s New Projects Feature

How many times have you said or heard: “I’ll believe it when I see it”? This expression reveals our eyes’ dramatic convincing power: when you see something, you tend to believe it’s true much more easily than when you hear or read about it. In the digital age, for most people, this convincing power seamlessly … Continue reading

SANS DFIR Summit 2019 – Recap

by Christa Miller, Forensic Focus Held in Austin, Texas each summer, the SANS Digital Forensics and Incident Response (DFIR) Summit is known for offering in-depth but accessible digital forensic research — and for its laid-back, fun atmosphere. This year’s summit, which ran from Thursday, July 25 through Friday, July 26, delivered a balanced menu of tool-oriented … Continue reading

How To Acquire Video Data With MD-VIDEO From HancomGMD

Due to the rapidly growing need for securing safe environments around the world, digital surveillance systems have become ubiquitous. A significant number of new surveillance systems are installed each year, and the importance of acquiring actionable data from these systems is growing across the globe.  According to a recent statistic, the amount of surveillance video … Continue reading

Walkthrough: How VFC 5 Can Exploit Windows Live ID (Inc PIN)

What is Virtual Forensic Computing? Virtual computing transforms investigation of the digital crime scene. Having access to the ‘digital scene of crime’ can offer huge benefits to an investigator. Whether investigating fraud, murder, child abuse or something else, seeing the computer through the eyes of the suspect can be invaluable. Building a virtual machine (VM) … Continue reading

How To Use Connection Graphs By Belkasoft For Complex Cases With Multiple Individuals Involved

A proper connection graph is a must if you need to investigate a complex case with numerous individuals using different communication media. In law enforcement, it may be a drug-related case with several dealers and a network of buyers, or a ring of sexual predators. The corporate sector might need graphs to investigate a circle … Continue reading

How To Acquire Mobile Data With MD-NEXT From HancomGMD

by Michelle Oh, HancomGMD  With an ever-increasing range of features and dramatically increased storage capacity, digital devices have become essential to our daily life. Their ability to store vast amounts of data means that these devices have proliferated and are now found in every household. They therefore prove to be a source of crucial information that … Continue reading

Career Paths In Digital Forensics: Practical Applications

by Christa Miller, Forensic Focus  Whether you’re a college or university student trying to plot out your career, an experienced worker figuring out next steps, or a mentor seeking to help either one of them, you may be seeking to answer the question: what can I do in digital forensics? The digital forensics profession has … Continue reading

How To Perform Remote Acquisition Of Digital Devices With Belkasoft Evidence Center

Remote acquisition of digital devices is a useful option for modern-day organizations, both commercial and government. The main reasons for this are as follows:  As entities grow, their IT environments tend to become more complex, distributed, and dispersed.  Cost-efficiency may not allow organizations to hire trained IT security employees for all the locations.  Ongoing business … Continue reading

Employee Turnover And Computer Forensic Analysis Best Practices

by Larry Lieb Organizations historically have struggled with addressing terminated employees’ important evidence sources such as company-issued laptops, oftentimes materially affecting the organization’s ability to deal effectively with disputes that arise after an employee leaves the company. This article will provide a documented, transparent, and repeatable process with actual tools to identify and correctly preserve … Continue reading

How To Launch 18 Simultaneous Wiping Sessions And Reach 18TB/h Overall Speed With Atola TaskForce

Thanks to its ability to perform 18 simultaneous imaging sessions, TaskForce is the most capable evidence acquisition in the forensics market. Atola’s team of engineers have equipped the device with a server-grade motherboard and CPU, thus allowing TaskForce to multitask at the unprecedented speed of 18 TB/h or even more.  TaskForce has a user-friendly, task-oriented … Continue reading

Unreal Steganography: Using A VR Application As A Steganography Carrier

by Stuart Wilson This report focuses on the use of virtual reality as a potential steganography carrier file to avoid detection of forensic analysis applications commonly used within law enforcement. The goal is to show how a virtual reality game/environment can be made with little training, what file types can be stored within it and … Continue reading

Finding And Interpreting Windows Firewall Rules

by Joakim Kävrestad Determining with whom and in what way a computer has communicated can be important and interesting in several types of examinations. Communications can be an important part of analyzing if and how a computer has been remote controlled or with whom the computer has shared information. It can also be a good … Continue reading

Techno Security & Digital Forensics 2019 – San Antonio Sept 30 – Oct 2

From the 30th of September to the 2nd of October 2019, Forensic Focus will be attending the Techno Security & Digital Forensics Conference in San Antonio, TX, USA. If there are any topics you’d particularly like us to cover, or any speakers you think we should interview, please let us know in the comments. Below … Continue reading

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,248 other followers