Week 24 – 2024

0xdf hacks stuffHTB Sherlock: Noted Atola TechnologyFile Carving and Sector-Level Analysis Campaign and public sector information securitySysmon-Help an investigator out! Craig Ball at ‘Ball in your Court’Garden Variety: Byte Fed. v. Lux Vending Cyber 5WWindows Event Logs Analysis Dhiren Bhardwaj at Digital Forensic Forest Investigating a Data Exfiltration Scenario Transforming Python scripts into .exe – […]

Week 23 – 2024

Zach Stanford, Yogesh Khatri, and Phill Moore at CyberCXForensic Applications of Microsoft Recall 0xdf hacks stuffHTB Sherlock: Constellation Adan AlvarezAutomating Incident Response in AWS: Blocking a Compromised Identity Center User Alex TeixeiraData Science & Exploratory Data Analysis: the Panda versus the Pony! Brett ShaversThe Multiverse of a DFIR Case Bret at Cyber GladiusIncident Response Plan: […]

Week 22 – 2024

0xdf hacks stuffHTB Sherlock: Nubilum-1 Amged WagehDriveFS Sleuth — Recovery Made Possible! Chris Ray at Cyber TriageDFIR Breakdown: Kerberoasting Dark Data DiscoveryThe 10 Common Data Carving Approaches ForensafeInvestigating Android Waze Forensic Science International: Digital InvestigationVolume 49 HaircutfishTryHackMe Room — Logstash: Data Processing Unit Kevin Beaumont at DoublePulsarRecall: Stealing everything you’ve ever typed or viewed on your own Windows PC […]

Week 21 – 2024

0xdf hacks stuffHTB Sherlock: Bumblebee Alexis Brignoni at ‘Initialization Vectors’Full File System extractions in Zip – MAC times Marco Fontani at AmpedDetecting AI-generated Images Obtained with Text-to-image Models in Amped Authenticate BelkasoftAndroid System Artifacts: Forensic Analysis of Device Information and Usage Cyber 5W “Email Forensics” Cyber TriageCollecting Linux DFIR Artifacts with UAC Dr. Neal Krawetz at […]

Week 20 – 2024

0xdf hacks stuffHTB Sherlock: Logjammer CTF导航Forensike, or Forensics for bad guys ForensafeInvestigating iOS Threema Scott Koenig at ‘The Forensic Scooter’iLEAPP Parsers & Photos.sqlite Queries Lee Kirkpatrick, Paul Jacobs, Sai Lakshmi Ghanasyam, Antoni Fertner, and Andy French at SophosExtracting data from encrypted virtual disks: six methods VolexityDetecting Compromise of CVE-2024-3400 on Palo Alto Networks GlobalProtect Devices […]

Week 19 – 2024

Atola TechnologyUncovering AFF4: File Format Essentials And Imaging Bret at Cyber GladiusIncident Response Plan: Windows Data Collection Brian Carrier at Cyber TriageAdaptive vs Static File Collections for DFIR Deagler’s 4n6 Blog Hexordia Weekly CTF Challenge 2024 – Week 3 Writeup Hexordia Weekly CTF Challenge 2024 – Week 4 Writeup Decrypting a DefenseConnected Cars, FCC Fines, […]

Week 18 – 2024

Alexander TasseSherlock — “Unit42” Justin Seitz at Bullsh*t HuntingFront Porch Digital Forensics Digital DanielaInvestigating an Apache Log in the Linux Command Line Dr. Tristan Jenkinson at ‘The eDiscovery Channel’Hexordia CTF – Week 3 Elcomsoft The Implications of Resetting the Screen Lock Passcode in iOS Forensics Elcomsoft Forensic Acquisition System (EFAS) Eric CapuanoPrefetch Analysis Lab ForensafeInvestigating Apple Known […]

Week 17 – 2024

Deagler’s 4n6 BlogHexordia Weekly CTF Challenge 2024 – Week 2 Writeup DS4N6 [BLOG] Cybersecurity & ChatGPT – Multi-part Blog Post Series, by Mario Pérez [BLOG] Cybersecurity & ChatGPT – Part 1 – A Gentle Introduction, by Mario Pérez [BLOG] Cybersecurity & ChatGPT – Part 2 – Generative AI for Blue Teams, by Mario Pérez [BLOG] […]

Week 16 – 2024

Bruno Fischer [EN] android app analysis kleinanzeigen.de (com.ebay.kleinanzeigen) [DE] Android App Analyse kleinanzeigen.de (com.ebay.kleinanzeigen) Amr Ashraf at Cyber 5WHard disk structure and analysis Deagler’s 4n6 BlogHexordia Weekly CTF Challenge 2024 – Week 1 Writeup Dr. Tristan Jenkinson at ‘The eDiscovery Channel’ Hexordia CTF – Week 1 Hexordia CTF – Week 2 Oleg Afonin at ElcomsoftAll […]

Week 15 – 2024

AtolaRAID With Parity: Reassembly and Image Acquisition Alexis Brignoni at ‘Initialization Vectors’ New VLEAPP parser New parser for Uber app geo-locatios in iOS using iLEAPP BelkasoftBelkasoft CTF 6: Write-up Compass SecurityBehind The Scenes Of Ransomware Attacks Craig Ball at ‘Ball in your Court’Cloud Attachments: Versions and Purview ForensafeInvestigating Android Digital Wellbeing Joshua Hickman at ‘The […]