Week 33 – 2023

ADF SolutionsHow to Scan a Mobile Device with Mobile Device Investigator BelkasoftHow to Analyze KnowledgeC.db with Belkasoft X CloudbrothersOther Entra ID / Azure AD SignIn errors ForensafeInvestigating Android Aqua Mail Justin De Luna at ‘The DFIR Spot’A LNK To The Past: Utilizing LNK Files For Your Investigations Lorena Carthy-WilmotVipps App — Forensics Lucid Truth TechnologiesForensic analysts can […]

Week 32 – 2023

David Spreadborough at AmpedThe Creation of Master and Working Copies after CCTV Acquisition Andrew Skatoff at ‘DFIR TNT’RMM – Xeox: Client Side Evidence AT&T CybersecurityRAM dump: Understanding its ­­­importance and the process CellebriteUnveiling the Modern Approach to Digital Investigations through Remote Collection of Androids and Workplace Apps Derek EiriDisk Toggling, Validating WinFE Geraldine Blay and […]

Week 31 – 2023

Amr Ashraf EventLog Analysis EDR Log Investigation Troy Wojewoda at Black Hills Information SecurityWelcome to Shark Week: A Guide for Getting Started with Wireshark and TShark Cado SecurityDecoding the NIST Cloud Computing Forensics Reference Architecture Oleg Afonin at ElcomsoftApple iCloud Acquisition: A Lifeline for Forensic Experts ForensafeInvestigating Android Twitter Salvation DATAWhat is DVR and How […]

Week 30 – 2023

Amped Acquisition from a Cloud-based Service Provider How to Use the Macroblocks Filter in Amped FIVE BelkasoftIns and Outs of Hashing and Hashset Analysis in Belkasoft X Manuel Winkel at DeydaChecklist for NetScaler (Citrix ADC) CVE-2023-3519 Elcomsoft iOS Forensic Toolkit Tips & Tricks iOS Device Acquisition: Installing the Extraction Agent Howard Oakley at ‘The Eclectic […]

Week 29 – 2023

Andrew Skatoff at ‘DFIR TNT’RMM – ScreenConnect: Client-Side Evidence Cado Security Macbooks and the Cloud Chain of Custody in the Cloud Cyber TriageLogon Session vs Local Session vs Cyber Triage Sessions. Oh My! Decrypting a DefenseMobile Surveillance, Body-worn Camera Audit Logs, Facial Rec. Source Code, & Threads Data Oleg Afonin at Elcomsoft Pushing the Boundaries: […]

Week 28 – 2023

David Spreadborough at AmpedRemote Acquisition Using a Mobile Device Felix Guyard at ForensicXlab🔦 Video Games Forensics : Steam ForensafeInvestigating Android Yandex Mail Jim Cole at CameraForensicsThe importance of closing the knowledge gap between software and law enforcement Ken Pryor at ‘No Pryor Knowledge’Forensics/Malware Courses and Tools Lorena Carthy-WilmotUses24HourClock: false Adam GossPython Threat Hunting Tools: Part […]

Week 27 – 2023

Marco Fontani at AmpedIntroducing Amped Engine: Our New Product to Integrate Video Conversion Everywhere Oleg Afonin at ElcomsoftLow-level Extraction for iOS 16 with iPhone 14/14 Pro Support Magnet ForensicsHow to Investigate Infostealer Malware  Salvation DATAWestern Digital USB Hard Disk Data Recovery Tips — Step by Step Megan Roddie at SANSGoogle Workspace Log Extraction Bill Stearns […]

Week 26 – 2023

David Spreadborough at AmpedOpen-Box Acquisition Using the Internal Hard Disk Drive Kushalveer Singh Bachchas at AT&T CybersecurityDigital dumpster diving: Exploring the intricacies of recycle bin forensics blueteam0psdet-eng-samples ElcomsoftOpen-Sourcing Raspberry Pi Software for Firewall Functionality: Secure Sideloading of Extraction Agent ForensafeInvestigating Default Web Browser on Windows Kevin Pagano at Stark 4N6NahamCon CTF 2023 – Forensics Paritosh […]

Week 25 – 2023

BelkasoftKnowledgeC Database Forensics with Belkasoft X Blake ReganMount Up CloudyforensicsGoogle Cloud Forensics and Incident Response Dr. Neal Krawetz at ‘The Hacker Factor Blog’Indictment Documents Haider at HK_Dig4nsicsForensic Analysis of Windows Subsystem for Android (WSA) Maxime Chouquet at LexfoCVE-2023-27997 – Forensics short notice for XORtigate Md. Abdullah Al MamunEmail Incident Response NCC GroupNew Sources of Microsoft […]

Week 24 – 2023

David Spreadborough at AmpedCCTV Device Removal and Replacement BelkasoftAutomation with Belkasoft: Orchestrating Belkasoft X and Griffeye DI Pro Forensic Science International: Digital InvestigationVolume 45, June 2023 Mark Spencer at Arsenal ReconForensic Analysis of the NetWire Stack Jacob Torrey at Thinkst ThoughtsMeet “ZipPy”, a fast AI LLM text detector MoveIT Attack Graph Response to CISA Advisory […]