±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 35965
New Yesterday: 0 Visitors: 159

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Latest Forum Posts

 
 Topics   Replies   Author   Views   Last Post 
  "Phone Activation Time" and "Last Known Use&quo... 1 nsumer 260   Sat Sep 14, 2019 12:12 pm 
xaries
  Recovery of video fragments 0 harold 205   Fri Sep 13, 2019 6:13 pm 
harold
  How to extract data from mini phones like Zanco 5 Thomas 1476   Fri Sep 13, 2019 6:11 pm 
lacsap65
  Signal Messaging App 0 renfantino 195   Fri Sep 13, 2019 5:30 pm 
renfantino
  Sumsung SM-G920P Galaxy S6 Lte locked pattern 6 ali_attouti 2280   Fri Sep 13, 2019 1:30 pm 
Ug44

What's Happening In Forensics - Sep 13, 2019

Friday, September 13, 2019 (16:10:40)
Josh Hickman discusses the challenges of extracting data from the Wickr messaging app.

Andrea Fortuna talks about browser fingerprinting.

Adam Harrison shares his unofficial write-up of the Defcon DFIR CTF.

Criminals have managed to use artificial intelligence to replicate the voice of a CEO and steal hundreds of thousands of dollars from an energy company.

SalvationDATA share a case study showing the capabilities of their VIP 2.0 tool.

Amped talk to Blaine Davison from the Norman, OK PD about the challenges of digital forensic investigation and how he uses their tools.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (845 reads)

How To Acquire Data From A Mac Using MacQuisition

Friday, September 13, 2019 (12:08:13)
Depending on the digital forensic imaging tool you have available, creating a forensic image of a Mac computer can be either an anxiety-creating situation, or as easy as “1-2-3-START”. There are several things you must identify ahead of attempting a full disk image of the system. Below are some things to consider:

1. Type of Mac computer: Identify the serial number / model number; identify if the Mac is installed with a T2 security chip. Are SecureBoot settings enabled to prevent booting from external media?
2. What file system (HFS+ vs APFS) is currently running on the source Mac?
3. Is FileVault2 enabled on the source Mac? Do you have the password or Recovery Key available?
4. Do you need a logical or physical acquisition of the Mac?
5. Has the owner of the Mac enabled a firmware password on the system?
6. Is the Mac installed with a fusion drive?
7. Do you need a RAM image?

Having the answers to the above questions is imperative.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (542 reads)

Chrome Nuts And Bolts: ChromeOS / Chromebook Forensics

Thursday, September 12, 2019 (16:03:54)
Jessica Hyde discusses her research on Google Chrome at DFRWS EU 2019.

Jessica: Hey, everyone. Good morning. So we’re going to be talking about forensics of Chromebooks, as Hans just mentioned. Just a little bit about me, I work as Director of Forensics at Magnet Forensics, and I also teach mobile device forensics at George Mason University. (That is a really old picture of me, like twenty years ago.) And I also did all this work with our CTO, Jad Saliba, so we did this research together.

So what are we going to be talking about today? We’re going to be talking a little about what [a] Chromebook operating system is, why we care about it, what issues we have in the analysis of Chromebook forensics, what we learned in this, what we can recover, a lot about how it compares to data you may be able to get via other methods, and what the differences are. And then we’ll wrap it up.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (467 reads)

Register For Webinar: Griffeye Brain In Analyze DI Pro

Wednesday, September 11, 2019 (17:12:25)
Join us for this highly anticipated webinar and learn about Griffeye’s new and advanced AI technology: Griffeye Brain.

When dealing with masses of previously unseen images and videos, investigators are often forced to work in the dark without really knowing where to start and what details and visual attributes to look for. As a result, information is often found too late, or not at all.

Griffeye Brain aims to reverse that trend. By applying Artificial Intelligence to investigative workflows, users can now get an indication of where to start digging and which data is relevant to the case.

Using Griffeye Brain, you can automatically detect and classify various objects in large image sets as well as identify and flag images that depict child sexual abuse content to tell whether a file is pertinent to your investigation or not. Not only does this decrease the time it takes to locate possible victims and suspects, but it also reduces redundancy and thus exposure to the material.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1144 reads)

What's Happening In Forensics - Sep 10, 2019

Tuesday, September 10, 2019 (12:19:02)
Craig Ball talks about how career changes can bring about personal existential doubts.

Oxygen Forensics show how to use KeyScout, a utility which uncovers and extracts user data and passwords.

Harlan Carvey provides a brief history of DFIR time and talks about the ransomware economy.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (659 reads)

How To Create Compelling Image Authentication Reports With Amped Authenticate

Tuesday, September 10, 2019 (11:25:03)
How many times have you said or heard: “I’ll believe it when I see it”? This expression reveals our eyes’ dramatic convincing power: when you see something, you tend to believe it’s true much more easily than when you hear or read about it. In the digital age, for most people, this convincing power seamlessly extended to pictures they see on their computer or smartphone. Unfortunately, we all know how easy it is to forge images nowadays, to the point that seeing is no longer believing.

Fake images can play a crucial role in so many aspects of our life: politics, information, health, insurance, reputation, social media identity, terrorism. Virtually all aspects of our existence are somehow related to images.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (688 reads)

Register For Techno Security TX And Get 30% Off Registration Fee

Monday, September 09, 2019 (12:12:30)
Techno Security TX will be held in San Antonio from the 30th September to the 2nd of October 2019.

There will be four tracks running throughout the conference: digital forensics, investigation, information security, and audit/risk management. Find out more and register at technosecurity.us/tx

Forensic Focus readers can enjoy 30% off the usual ticket price by using the code FFOCUS19 at the checkout.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (658 reads)

Webinar: Field Forensics For The Front Line

Monday, September 09, 2019 (10:32:54)
A new webinar, Field Forensics For The Front Line, is available to view here.

Join the forum discussion here.
View the webinar on YouTube here.
Read a full transcript of the webinar here.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (553 reads)

What's Happening In Forensics - Sep 06, 2019

Friday, September 06, 2019 (11:04:32)
Vladimir Katalov shares some tips for iOS acquisition on Windows.

SalvationDATA share a DVR forensics case study.

Oleg Afonin discusses iOS 12.4 file system extraction.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (758 reads)

Nuix Increases Its Investigations Focus And Investment

Thursday, September 05, 2019 (16:21:40)

Nuix (www.nuix.com) today announced it has expanded the capabilities for investigative teams to quickly cull through data and collaborate to uncover hidden insights and relationships in connected data within the Nuix lab solution for digital investigations.

The Nuix lab solution gives investigators unrivaled capabilities to work efficiently on cases of any size, from a single device to terabyte-sized investigations, at speed. Nuix Investigate (formerly Nuix Web Review & Analytics), one of the core technologies of the Nuix lab, enables investigators to establish a case position sooner and identify the most influential suspects. Its new graphical analytical interface shows who is talking to whom, what about, and how often—across many communication channels.