archives

how to

This tag is associated with 23 posts

How To Use Quin-C’s Simple Review Widget

Hello and welcome everybody to this video about Quin-C. Today we will be talking about a widget called Simple Review. Simple Review is a widget which has been designed for examiners whose everyday job is to run the index searches or keyword searches; perform tagging, bookmarking, viewing, labelling and exporting data. So if you are … Continue reading

How To Easily And Accurately Play CCTV And Other Proprietary Video With Amped Replay

by Blake Sawyer, Amped Software For Law Enforcement across the world, one of the biggest hindrances to actionable evidence comes from CCTV. There are sites devoted to providing codecs, of which there are hundreds, and IT departments that spend most of their time managing the many players from each DVR manufacturer. In my old casework, … Continue reading

How To Conduct A Live Forensic Scan Of A Windows Computer

Learn how to conduct a Windows live scan with ADF Solutions Digital Evidence Investigator.  Two USB ports are required to complete a scan, one for the Collection Key and one for the Authentication Key, once the scan has started the Authentication Key can be removed. A USB hub may be used in cases where the target … Continue reading

How To Use The Griffeye Intelligence Database

Beginning with version 19, Griffeye Analyze DI Pro and Core will start using the new Griffeye Intelligence Database, or GID, to replace the legacy intelligence manager. In this video, we’re going to discuss the changes that the GID brings to the Analyze DI interface, and how to use the Griffeye Intelligence Database system within your … Continue reading

How To Transfer A Password Recovery Process To A Different Computer Using Passware

Did you know that Passware Kit can create a snapshot of a password recovery process at any time and resume it on a different computer? Running a password recovery attack, especially for multiple files or drives, might be a long process that requires a lot of hardware resources. In some cases, it might be necessary … Continue reading

How To Decrypt BitLocker Volumes With Passware

Decrypting BitLocker volumes or images is challenging due to the various encryption options offered by BitLocker that require different information for decryption. This article explains BitLocker protectors and talks about the best ways to get the data decrypted, even for computers that are turned off. BitLocker Encryption Options Protectors that can be used to encrypt … Continue reading

How To Use Magnet AXIOM In Mac USB Investigations

Hey everyone, Trey Amick from Magnet Forensics here. Today we’re talking about Mac USB investigations, and what happens when we’ve been alerted that a USB has been inserted into an end point. Different organisations handle USB policies differently. Some have alerting mechanisms in place for when USBs are detected, while others may encrypt the drive … Continue reading

How To Save Time With XAMN’s Dynamic Artifact Count Feature

At MSAB, we’re always looking to improve our software and make every product more user-friendly, intuitive, and valuable; and to help save you time. We’ve recently improved the way that XAMN displays and counts artifacts. Let’s take a look at the new functionality. We’ve opened this case in XAMN, and from the start we can … Continue reading

How To Integrate LACE Carver With Griffeye Analyze DI Pro

Let’s talk about the exciting new LACE Carver integration with Analyze DI Pro. Once you have the proper license, you can head over to your Downloads page on MyGriffeye.com and go to the LACE Carver download. Once the app package has been downloaded, we can go back to Griffeye and install it under Settings –> … Continue reading

How To Export Media Files From BlackLight Into Semantics21

So before we go to export our files from BlackLight to S21, what we will normally do is we will run the hashes against our case. In this case what we’ve done is we’ve already run these hashes against BlackLight, and as you can see, S21 has been run and it’s showing complete. These are … Continue reading

How To Use Amped DVRConv To Quickly Convert And Make Playable Proprietary CCTV Video

by Blake Sawyer, Amped Software When I worked for the police department, I was constantly pulled in a lot of different directions. To keep a good turnaround time for the nearly 200 requests we had each month, I was constantly looking for tools to automate or ease the load. Amped FIVE was a great resource … Continue reading

How To Boot Scan A Mac With APFS And FileVault 2

Hi, I’m Rich Frawley and I’m the Digital Forensic Specialist with ADF Solutions. Today we are going to conduct a boot scan of a MacBook Air that has APFS and FileVault 2 enabled. At this point you have decided on a search profile or profiles to use and and prepared your collection key. When conducting … Continue reading

How To Acquire Data From A Mac Using MacQuisition

Written by: Justin Matsuhara, Solutions Engineer, BlackBag Technologies Stephanie Thompson, Solutions Engineer, BlackBag Technologies Depending on the digital forensic imaging tool you have available, creating a forensic image of a Mac computer can be either an anxiety-creating situation, or as easy as “1-2-3-START”.  There are several things you must identify ahead of attempting a full … Continue reading

How To Acquire Video Data With MD-VIDEO From HancomGMD

Due to the rapidly growing need for securing safe environments around the world, digital surveillance systems have become ubiquitous. A significant number of new surveillance systems are installed each year, and the importance of acquiring actionable data from these systems is growing across the globe.  According to a recent statistic, the amount of surveillance video … Continue reading

How To Acquire Mobile Data With MD-NEXT From HancomGMD

by Michelle Oh, HancomGMD  With an ever-increasing range of features and dramatically increased storage capacity, digital devices have become essential to our daily life. Their ability to store vast amounts of data means that these devices have proliferated and are now found in every household. They therefore prove to be a source of crucial information that … Continue reading

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,276 other followers