Week 49 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Roey Arato announced that full file system extractions via the Checkra1n jailbreak will be incorporated into UFED4PC/Touch2/PA (don’t know which, all?). This is great for those […]

Week 48 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Vladimir Katalov at Elcomsoft describes the checkra1n jailbreak and the process and results of acquisition using their toolkit. iOS Device Acquisition with checkra1n Jailbreak On the […]

Week 47 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Alexis Brignoni at ‘Initialization Vectors’ provides an overview of the Realm database storage type Realm database storage primer for digital forensic examiners There were a couple […]

Week 46 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Belkasoft have posted an article on examining LNK files and their potential as an attack vector for malicious actors Forensic Analysis Of LNK Files With Belkasoft […]

Week 45 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS There’s a post on the attackd0gz blog walking through a packet capture examination to identify data exfil over wifi WiFi Forensics for Data Leakage David Milnes […]

Week 44 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Alexis Brignoni at ‘Initialization Vectors’ examines the database on Android that stores app/widget/folder icons and positioning, as well as sharing a script to take the hard […]

Week 43 – 2019

Busy busy so links only this week! Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Arsenal Recon BitLocker for DFIR – Part I The Office Document Cache and Introducing ODC Recon – Part I […]

Week 42 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Marco Fontani at Amped demonstrates using Authenticate to detect a forgery First Things First: Learn How a Proper Visual Inspection Can Guide Your Image Authentication on […]

Week 41 – 2019

Lodrina and I were both busy this week so links only. I’m teaching this week in Singapore, so we’ll see how I go for next weeks post! As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Heather Mahalik at Cellebrite A First Look at iOS 13 – Here are […]

Week 40 – 2019

No Lodrina this week, so links only in the Threat Hunting and Malware Analysis sections this week. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Geri at ‘4n6 Ninja’ has started a blog and shares her research on iOS snapshots, and worked with Alexis Brignoni at ‘Initialization Vectors’ to […]