Week 24 – 2023

David Spreadborough at AmpedCCTV Device Removal and Replacement BelkasoftAutomation with Belkasoft: Orchestrating Belkasoft X and Griffeye DI Pro Forensic Science International: Digital InvestigationVolume 45, June 2023 Mark Spencer at Arsenal ReconForensic Analysis of the NetWire Stack Jacob Torrey at Thinkst ThoughtsMeet “ZipPy”, a fast AI LLM text detector MoveIT Attack Graph Response to CISA Advisory […]

Week 23 – 2023

Ariel Szarf and Or Aspir at MitigaMitiga Security Advisory: Lack of Forensic Visibility with the Basic License in Google Drive ForensafeInvestigating qBittorrent MailxaminerOLK File Forensics – Examine OLK14 File and Export Evidence Plainbit(IR-CASE) 신용카드 결제 피싱 페이지 스크립트 삽입 사고 Arslan Sabir at System WeaknessWindows RDP Event Logs: Identification, Tracking and Investigation Part-1 Adam GossPython […]

Week 22 – 2023

David Spreadborough at AmpedClosed-Box CCTV Acquisition Using Network Access Cado Security Is Cloud Forensics just Log Analysis? Kind Of. Updates to Legion: A Cloud Credential Harvester and SMTP Hijacker Cyber TriageInbound Logon Artifact Deep Dive Series Data Forensics DD File Forensics and Analysis Using an Automated Software E01 Forensic Analysis Using a Tried & Tested […]

Week 21 – 2023

Lee Whitfield has announced the finalists for this years Forensic 4cast awards. Thanks for everyone that nominated this site for Resource of the Year.Forensic 4:cast Awards 2023 – Voting is now open! ThinkDFIRCPY JMP Brian Maloney at Malware MaloneyOneDrive Evolution ForensafeInvestigating Remote Desktop Connection Event Logs ForensicXlab📦 Volatility3 Windows Plugin : KeePass Invictus Incident ResponseImporting […]

Week 20 – 2023

Hexordia What’s brewing with IPAs – Working with IPA files for Forensic Examiners Cloud Storage & Digital Forensic Evidence David Spreadborough at AmpedClosed-Box CCTV Acquisition Using Storage Media Emre Caglar Hosgor at BelkasoftIncident Response with Belkasoft by Emre Caglar Hosgor, SOC Analyst—Specially for Belkasoft Blake Regancheckm8 to SSH Chuan-lun (Johnson) ChouFinding messages in Anonymous Chat […]

Week 19 – 2023

Chris Doman at Cado SecurityDFIR with KAPE and Cado Community Edition Darren LimForensic Analysis of Jami for Android, a Peer-to-Peer Messaging Application Decrypting a DefenseAI & Photography, NYC Council Hearing, Geofence Warrants, Search Warrant Returns, & More Michael Hamm at Digital CorporaCIRCL Forensics Exercises Haider at HK_Dig4nsicsiOS Shortcuts InfoSec Write-upsBlackEnergy Memory Forensic Ananlysis Invictus Incident […]

Week 18 – 2023

David Spreadborough at AmpedNavigating a CCTV Device and Reviewing Video BlackMambaBlackEnergy Memory Forensic Ananlysis ForensafeInvestigating Adobe Acrobat Reader HaircutfishTryHackMe Wireshark: The Basics — Task 1 Introduction & Task 2 Tool Overview Ian DBoggle-bytes in a Basic Data Partition Entry Markus Tuominen and Mehmet Mert Surmeli at WithSecureUnleashing the Power of Shimcache with Chainsaw N00b_H@ck3rCyberDefenders: AzurePot Phalgun Kulkarni and […]

Week 17 – 2023

Chris Doman at Cado SecurityThe Cado Platform Full Export for Forensic Data Lakes Digital Forensics MyanmarCHIP OFF ( Mobile FORENSIC) Domiziana FotiLetsDefend- SOC142 — Multiple HTTP 500 Response Oleg Afonin at ElcomsoftAnalyzing iPhone PINs Forensic Science International: Digital InvestigationVolume 44 JamfThreat advisory: Mobile spyware continues to evolve Mattia Epifani at Zena ForensicsiOS Forensics References: a curated list […]

Week 16 – 2023

Ahmed BelhadjadjiWindows Forensics: Event Logs Analysis David Spreadborough at AmpedPublic Submissions of CCTV and Video Evidence Elcomsoft Perfect Acquisition Part 4: The Practical Part Automating DFU Mode with Raspberry Pi Pico Automating Scrolling Screenshots with Raspberry Pi Pico Eric CapuanoCapturing & Parsing Forensic Triage Acquisitions for Investigation Timelining ForensafeInvestigating pCloud Invictus Incident ResponseRansomware in the […]

Week 15 – 2023

Andrew MalecIdentification, acquisition, and examination of iSCSI LUNs and VMFS datastores Monica Harris at CellebriteKey Takeaways and Highlights from Legalweek 2023 Chris at AskCleesImporting NSRL V3 hashsets into legacy tools Derek EiriGetting SMART(er) with Information Elcomsoft HomePod Forensics III: Analyzing the Keychain and File System Perfect Acquisition Part 3: Perfect HFS Acquisition ForensafeInvestigating Android Wi-Fi […]