Week 39 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Marco Fontani at Amped shares a fantastic featured in Authenticate where they’ve included samples as well as the associated analysis. Learning by Examples: You Have a […]

Week 38 – 2019

Lots of travelling between Lodrina and I this week so links only.  As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Alexis Brignoni at ‘Initialization Vectors’ Vendor binaries and data stores:  io-prefetcher.db Arman Gungor at Metaspike Dates in Hiding—Uncovering Timestamps in Forensic Email Examination Craig Ball at ‘Ball in […]

Week 37 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS There were some writeups of the Defcon DFIR challenge by Adam Harrison and Antonio Sanz 2019 Unofficial Defcon DFIR CTF Writeup – DFA Crypto Challenge 2019 […]

Week 36 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Chris Vance at ‘D20 Forensics’ uncovers what iOS leaves behind once an app has been deleted iOS – Tracking Traces of Deleted Applications DiabloHorn shares some […]

Week 35 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Chris Vance at ‘D20 Forensics’ explores the location data stored by the Tile app on Android Android – Locating Location Data: The Tile App Todd Reid […]

Week 34 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Chris Vance at ‘D20 Forensics’ shares his research into the way that iOS 12 records notifications (per application, in an nskeyedarchive plist). Based off this research, […]

Week 33 – 2019

Links only this week for the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Andrea Fortuna at ‘So Long, and Thanks for All the Fish’ shares some free tools for acquiring data from an OS X system. I would recommend using this […]

Week 32 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. Especially considering she was at Hacker Summer Camp this past week! As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Alexis Brignoni at ‘Initialization Vectors’ has released a new script, ARTEMIS (Android Review Timeline Events […]

Week 31 – 2019

Links only this week for the Threat Hunting and Malware Analysis sections this week. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Andrea Fortuna at ‘So Long, and Thanks for All the Fish’ demonstrates how to analyse Win10 memory Forensic analysis of Windows 10 compressed memory using Volatility […]

Week 30 – 2019

Thanks to everyone for their votes in the 4Cast Awards; getting nominated for one is a big deal because it shows that the community values our efforts every week. Very grateful to also win one 🙂 Special thanks to Lee Whitfield for all of his hard work every year. No Lodrina this week as she […]