Week 17 – 2022

Jessica Hyde at Magnet ForensicsAndroid Motion Photos in Magnet AXIOM Aditya PratapWindows Triaging with Powershell — Part 1: Parsing Event Logs Blake’s R&DExtracting Cobalt Strike from Windows Error Reporting Cyber Social HubUnderstanding Tox Chat Dr. Neal Krawetz at ‘The Hacker Factor Blog’Where’s My Stuff? Jess Garcia at DS4N6[BLOG]  ODSC East 2022 – “Data Science for Digital Forensics […]

Week 16 – 2022

Cado SecurityInvestigating AWS ECS with Cado Response Chris Vance at ‘D20 Forensics’[Air]Tag You’re It! DFIR Review Ain’t That a Kik in the Head: Kik Messenger iOS Analysis Case Study: Forensic Analysis of TikTok on iOS Oleg Afonin at ElcomsoftDecrypting Password-Protected DOC and XLS Files in Minutes ForensafeInvestigating Foxit Reader Erik Schamper at NCC GroupA brief […]

Week 15 – 2022

Joshua James at DFIRScience Getting started in DFIR: Conferences and Workshops Oculus Quest 2 First Impressions and Research Notes DiabloHornFirewall analysis: A portable graph based approach Didier Stevens.ISO Files With Office Maldocs & Protected View in Office 2019 and 2021 Oleg Afonin at ElcomsoftUnlock WordPerfect and Lotus Documents with Advanced Office Password Recovery Brian Bahtiarian, […]

Week 14 – 2022

Christopher Romano and Vaishnav Murthy at CrowdStrikeCloudy with a Chance of Unclear Mailbox Sync: CrowdStrike Services Identifies Logging Inconsistencies in Microsoft 365 Krzysztof Gajewski at CyberDefNerdWhy do the battery use and the battery level matter during the investigation? Oleg Afonin at ElcomsoftWindows 11 TPM Protection, Passwordless Sign-In and What You Can Do About Them ForensafeInvestigating […]