Week 42 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Marco Fontani at Amped demonstrates using Authenticate to detect a forgery First Things First: Learn How a Proper Visual Inspection Can Guide Your Image Authentication on […]

Week 41 – 2019

Lodrina and I were both busy this week so links only. I’m teaching this week in Singapore, so we’ll see how I go for next weeks post! As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Heather Mahalik at Cellebrite A First Look at iOS 13 – Here are […]

Week 40 – 2019

No Lodrina this week, so links only in the Threat Hunting and Malware Analysis sections this week. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Geri at ‘4n6 Ninja’ has started a blog and shares her research on iOS snapshots, and worked with Alexis Brignoni at ‘Initialization Vectors’ to […]

Week 39 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Marco Fontani at Amped shares a fantastic featured in Authenticate where they’ve included samples as well as the associated analysis. Learning by Examples: You Have a […]

Week 38 – 2019

Lots of travelling between Lodrina and I this week so links only.  As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Alexis Brignoni at ‘Initialization Vectors’ Vendor binaries and data stores:  io-prefetcher.db Arman Gungor at Metaspike Dates in Hiding—Uncovering Timestamps in Forensic Email Examination Craig Ball at ‘Ball in […]

Week 37 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS There were some writeups of the Defcon DFIR challenge by Adam Harrison and Antonio Sanz 2019 Unofficial Defcon DFIR CTF Writeup – DFA Crypto Challenge 2019 […]

Week 36 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Chris Vance at ‘D20 Forensics’ uncovers what iOS leaves behind once an app has been deleted iOS – Tracking Traces of Deleted Applications DiabloHorn shares some […]