Week 39 – 2024

Adan AlvarezGaining AWS Persistence by Updating a SAML Identity Provider Alexandre DulaunoyImprove Your Forensic Analyses with hashlookup Alex Caithness at CCL SolutionsWhen is an app not an app? Investigating WebAPKs on Android Andreas Arnold at Compass SecurityEmail, Email on the Wall, Who Sent You, After All? Django Faiola at ‘Appunti di Informatica Forense’iOS Burner – […]

Week 38 – 2024

Chris Ray at Cyber TriageDFIR Breakdown: Impacket Remote Execution Activity – Smbexec ForensafeInvestigating Android Nike Run Club Johan BerggrenOpenRelik Lina Lau at XintraUnderstanding Tokens in Entra ID: A Comprehensive Guide Magnet Forensics A look into iOS 18’s changes 7 essential artifacts for macOS forensics Marco Fontani at Amped10 Ways to Detect Deepfakes Created by Text-to-image […]

Week 37 – 2024

Atola TechnologySynology RAID Reassembly and Image Acquisition David Spreadborough at AmpedGetting Started with Video Formats and Conversion Cyber 5WNetwork Forensics With Wireshark Mike Wilkinson at Cyber TriageDFIR Next Steps: What To Do After You Find A Suspicious Use Of Remote Monitoring & Management Tools Danny ZendejasLets Defend Write-up David Cowen at the ‘Hacking Exposed Computer […]

Week 36 – 2024

0xdf hacks stuffHTB Sherlock: Noxious Andrea Fortuna Forensic acquisition of ChromeOS devices The hidden risks of Cherry-Picking in Incident Response and Digital Forensics Belkasoft How to Investigate Telegram Crime without Arresting the Company’s CEO iOS Telegram Forensics. Part I: Acquisition and Database Analysis Brian MaloneyCracking OneDrive’s Personal Vault Justin Seitz at Bullsh*t HuntingThe Evidence Carnival: […]

Week 35 – 2024

CCL GroupLocal Storage and Session Storage in Mozilla Firefox (Part 1) DFIR ReviewLocation, Location, Location Dr. Tristan Jenkinson at ‘The eDiscovery Channel’eDiscovery Risks – Sending Documents for Disclosure via Email ForensafeInvestigating Android Tinder Emilia Chau, Marin Gheorge, and Muhammad Jawad at Jumpsec LabsBuilding Forensic Expertise: A Two-Part Guide to Investigating a Malicious USB Device (Part […]