Week 04 – 2022

Appalachian4n6AirTags within iOS File Systems BelkasoftWhere did this chat come from? The ‘Origin path’ concept in Belkasoft X Blake’s R&DMachine Learning and ETW Cado SecurityTechnical Indicators of Ukrainian Website Defacements James Lovato at CrowdStrikeMind the MPLog: Leveraging Microsoft Protection Logging for Forensic Investigations Krzysztof Gajewski at CyberDefNerdCan Windows Update fool you during the investigation? Digital […]

Week 03 – 2022

Bart Butler at ProtonMailA breakdown of a DKIM replay attack James Merritt at CCL SolutionsRelativity Processing vs. Nuix Workstation Roman Ferdigg at CertitudeRansomware Actor May Have Leaked Their Previous Victims Craig Ball at ‘Ball in your Court’Electronic Evidence Workbook 2022 Paul Pratley and Mark Goudie at CrowdStrikeCrowdStrike Services Offers Incident Response Tracker for the DFIR […]

Week 02 – 2022

David Cowen at the ‘Hacking Exposed Computer Forensics’ blogDaily Blog #703: Looking back at AWS EBS Direct Block access API ThinkDFIRI can see and hear you seeing and hearing me! Alex Caithness at CCL SolutionsAndroid ABX – Binary XML Cheeky4n6Monkey and Michael LacombeMike & the Monkey Dumpster Dive Into Samsung Gallery3d App Trash Doug Metz […]

Week 01 – 2022

DFIR ReviewValidation of X-Ways Forensics Evidence File Containers Kibaffo33At the roundabout, take the second exit… Daniela Elmi Best of Digital Forensics Cheatsheet Security Logs Dr. Neal Krawetz at ‘The Hacker Factor Blog’Sharing Research Elcomsoft Breaking BestCrypt Volume Encryption 5 Digital Evidence in Encrypted Backups Forensafe Investigating Task Scheduler Investigating Remote Desktop Connection MRU Hal Pomeranz […]