Week 18 – 2023

David Spreadborough at AmpedNavigating a CCTV Device and Reviewing Video BlackMambaBlackEnergy Memory Forensic Ananlysis ForensafeInvestigating Adobe Acrobat Reader HaircutfishTryHackMe Wireshark: The Basics — Task 1 Introduction & Task 2 Tool Overview Ian DBoggle-bytes in a Basic Data Partition Entry Markus Tuominen and Mehmet Mert Surmeli at WithSecureUnleashing the Power of Shimcache with Chainsaw N00b_H@ck3rCyberDefenders: AzurePot Phalgun Kulkarni and […]

Week 17 – 2023

Chris Doman at Cado SecurityThe Cado Platform Full Export for Forensic Data Lakes Digital Forensics MyanmarCHIP OFF ( Mobile FORENSIC) Domiziana FotiLetsDefend- SOC142 — Multiple HTTP 500 Response Oleg Afonin at ElcomsoftAnalyzing iPhone PINs Forensic Science International: Digital InvestigationVolume 44 JamfThreat advisory: Mobile spyware continues to evolve Mattia Epifani at Zena ForensicsiOS Forensics References: a curated list […]

Week 16 – 2023

Ahmed BelhadjadjiWindows Forensics: Event Logs Analysis David Spreadborough at AmpedPublic Submissions of CCTV and Video Evidence Elcomsoft Perfect Acquisition Part 4: The Practical Part Automating DFU Mode with Raspberry Pi Pico Automating Scrolling Screenshots with Raspberry Pi Pico Eric CapuanoCapturing & Parsing Forensic Triage Acquisitions for Investigation Timelining ForensafeInvestigating pCloud Invictus Incident ResponseRansomware in the […]

Week 15 – 2023

Andrew MalecIdentification, acquisition, and examination of iSCSI LUNs and VMFS datastores Monica Harris at CellebriteKey Takeaways and Highlights from Legalweek 2023 Chris at AskCleesImporting NSRL V3 hashsets into legacy tools Derek EiriGetting SMART(er) with Information Elcomsoft HomePod Forensics III: Analyzing the Keychain and File System Perfect Acquisition Part 3: Perfect HFS Acquisition ForensafeInvestigating Android Wi-Fi […]

Week 14 – 2023

Ahmed BelhadjadjiWindows Forensics: Examine Windows Files and Metadata David Spreadborough at Amped CCTV Recovery How to Use the Validation Tool in Amped FIVE Andrew Skatoff at ‘DFIR TNT’GoToForensics AvananThe Replier Attack Al Carchrie at Cado SecurityIPC YOU: How the Cado Platform Reveals Attacker Command Outputs  Dr. Ali Hadi at ‘Binary Zone’ Challenge #7 – SysInternals […]