Week 43 – 2023

Emi Polito at AmpedDeblur a License Plate in an Image BelkasoftTelegram Forensics: Getting Started Digital DanielaInvestigating Suspicous Emails! Jerry Chang Sony IR Internship Capstone – Cyber Attack Simulation & Forensics (Forensics) Sony IR Internship Capstone – Cyber Attack Simulation & Forensics (Attack Simulation) Joshua Hickman at ‘The Binary Hick’Finding Phones With Google Maps Part 1 […]

Week 42 – 2023

Amped Enhance a Backlit Scene How To Reveal AI-generated Images by Checking Shadows and Reflections in Amped Authenticate Digital DanielaExamining Traffic with NetworkMiner! Justin De Luna at ‘The DFIR Spot’Artifacts of Execution: Prefetch – Part One Kevin Pagano at Stark 4N6 Cellebrite CTF 2023 – Abe Cellebrite CTF 2023 – Felix Magnet Forensics How to […]

Week 41 – 2023

Emi Polito at AmpedRemove Periodic Noise from an Image Amr AshrafLinux Forensics In Depth DFRWSUnraveling Digital Mysteries: How AI Copilots can Revolutionize Digital Forensic Investigations* Digital DanielaInvestigating Network Traffic With Snort! ForensafeInvestigating Android Downloads Howard Oakley at ‘The Eclectic Light Company’Sonoma’s log gets briefer and more secretive InfoSec Write-ups Timeline Creation for Forensics Analysis Creating […]

Week 40 – 2023

Emi Polito at AmpedVideo Deinterlacing BelkasoftDecoding Windows Registry Artifacts with Belkasoft X: UserAssist Chris Brown at CorelightUsing Corelight to Identify Ransomware Blast Radius | Corelight ForensafeInvestigating Android Facebook Messenger HackTheBoxDetecting PsExec lateral movements: 4 artifacts to sniff out intruders Kathryn Hedley at KhyrenzAutomated USB artefact parsing from the Registry Mattia Epifani at Zena ForensicsiOS 15 […]

Week 39 – 2023

Alexander TasseBlue Team Labs — “Suspicious USB Stick” Emi Polito at AmpedSuper Resolution from Different Perspectives Angry-Bender’s blog houseA SIEM On the Cheap – Using Sqlite for Data Analysis BelkasoftiCloud Advanced Data Protection: Implications for Forensic Extraction Brian MaloneyOneDriveExplorer ODL Parsing Issues Matt Muir at Cado SecurityCado Security Labs Researchers Witness a 600X Increase in P2Pinfect Traffic […]

Week 38 – 2023

Adam at HexacornAnalysing NSRL data set for fun and because… curious, Part 3 Alexander TasseBlue Team Labs — “Employee of the Year” Emi Polito at AmpedCorrect the Perspective of a License Plate BelkasoftiOS System Artifacts: Revealing Hidden Clues Oleg Afonin at ElcomsoftiOS Forensic Toolkit: Troubleshooting Low-Level Extraction Agent ForensafeInvestigating Android Accounts Haircutfish Wireshark: Packet Operations — Task 3 Statistics […]

Week 37 – 2023

Emi Polito at AmpedIntegrate Multiple Frames to Improve Visibility Andrew Skatoff at ‘DFIR TNT’RMM – Level.io: Forensic Artifacts and Evidence BelkasoftiOS WhatsApp Forensics with Belkasoft X Patterson Cake at Black Hills Information SecurityWrangling the M365 UAL with SOF-ELK and CSV Data (Part 3 of 3) Brian MaloneyWhat’s New in OneDriveExplorer DCSO CyTecMicrosoft Edge Forensics: Screenshot […]

Week 36 – 2023

Emi Polito at AmpedDeblur a Moving Car Joseph Moronwi at Digital InvestigatorLinux Web Server Forensics: Dr. Ali Hadi’s Web Server Case ForensafeInvestigating iOS Telegram Nik Alleyne at ‘Security Nik’ Packet Crafting – Tearing down a connection with TCP Reset Solving the CTF challenge – Network Forensics (packet and log analysis), USB Disk Forensics, Database Forensics, […]

Week 35 – 2023

Abhiram KumarDeep Dive Into Windows Diagnostic Data & Telemetry (EventTranscript.db) – PART 2 Ahmed Kamal ElmagrabyWindows Registry Analysis Cheat Sheet David Spreadborough at AmpedCCTV Acquisition Series Summary Andrew Skatoff at Andrew Skatoff at ‘DFIR TNT’RMM – Action1: Client Side Evidence Cado Security Why is CIRA all the Hype for Cloud Incident Response? Analyzing AWS Nitro […]

Week 34 – 2023

Abhiram KumarDeep Dive Into Windows Diagnostic Data & Telemetry (EventTranscript.db) – PART 1 David Spreadborough at AmpedViewing CCTV after Acquisition Bhargav Rathod at DFRWSDFRWS 2023 Challenge ForensafeInvestigating Android Skype Harlan Carvey at HuntressGone Phishing: An Analysis of a Targeted User Attack Joshua Hickman at ‘The Binary Hick’Android & AirTags (Part II) Justin De Luna at […]