Week 13 – 2024

Cyber 5WWindows Memory Forensics ForensafeInvestigating Apple Data Usage R Tec CybersecurityAbschlussbericht Security Incident Salvation DATAA Step-to-Step Guide for Data Extraction from Wechat Scott Koenig at ‘The Forensic Scooter’PhotoData – Photos.sqlite and Syndication Photo Library – Photos.sqlite Query Updates Nathanael Ndong at Last Blog ArticleVMware ESXi Forensic with Velociraptor Aaron Goldstein at Todyl Understanding Living-off-the-Land binaries and scripts (LOLBAS) […]

Week 12 – 2024

DFIR101 Magnet Forensics Virtual CTF 2024 – Cipher Challenges Magnet Forensics Virtual CTF 2024 – Android Challenges Forensafe Magnet Virtual Summit 2024 CTF (Cipher) Solving Magnet Virtual Summit 2024 CTF (iOS) Solving Magnet Virtual Summit 2024 CTF (Android) John Reeman at Cyooda SecurityHow To: Email Phishing, malicious payload analysis walkthrough Kairos (Hestia) Tay THM: Memory […]

Week 11 – 2024

BelkasoftAndroid WhatsApp Forensics. Part II: Analysis Cyber 5WNTFS Artifacts Analysis Dr. Brian Carrier at Cyber TriageDFIR Next Steps: What to do after you find a suspicious Windows Network Logon Session Doug Metz at Baker Street ForensicsMAGNET Virtual Summit 2024 Capture the Flag David Stenhouse at DS ForensicsMicrosoft Office Alerts (“OAlerts”) Elcomsoftcheckm8: Advancements in iOS 16 […]

Week 10 – 2024

Cado SecuritySpinning YARN – A New Linux Malware Campaign Targets Docker, Apache Hadoop, Redis and Confluence Django Faiola at ‘Appunti di Informatica Forense’ iOS Burner – Cache.db iOS Burner Forensic Science International: Digital InvestigationVolume 48 Invictus Incident ResponseThe mystery of the EnrichedOffice365AuditLogs solved Nik Alleyne at ‘Security Nik’**TOTAL RECALL 2024** – Memory Forensics Self-Paced Learning/Challenge/CTF […]

Week 09 – 2024

Jessica Hyde at HexordiaMobile Forensic Images and Acquisition Priorities BelkasoftAndroid WhatsApp Forensics. Part I: Acquisition Cyber 5WChromium based browsers Investigation Cyber TriageWindows Scheduled Tasks for DFIR Investigations Hendrik Eckardt at cyber.wtfRecovering data from broken appliance VMDKs Dark Data DiscoveryData Carving vs File Carving vs Disk Carving Doug Metz at Magnet ForensicsComae Memory and Network Analysis: […]