Week 29 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Marco Neumann has started a blog, ‘Be-binary 4n6’, and documents his research into the Skype application The first post shows the differences between the desktop and […]

Week 28 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Marco Fontani at Amped demonstrates how to use Authenticate to examine photos downloaded from social media Sharing the Smoking Gun: Did You Know Amped Authenticate’s Camera […]

Week 27 – 2019

Last chance to enter your votes for the 2019 Forensic 4Cast Awards, held at the SANS DFIR Summit in Austin, Texas. Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Andrea Fortuna at ‘So Long, […]

Week 26 – 2019

Teaching in Canberra this coming week so my sections may be links only, we’ll see how I go. Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Bryan Ambrose at Data Digitally demonstrates a process […]

Week 25 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Brian Moran at BriMor Labs shares the process that he uses “to rearrange and correlate RDP Bitmap Cache data in Photoshop” Phinally Using Photoshop to Phacilitate […]

Week 24 – 2019

As always, Thanks to those who give a little back for their support! Links only for the Malware and Threat Hunting sections this week FORENSIC ANALYSIS DFIR Investigator of the Year candidate, Alexis Brignoni at ‘Initialization Vectors’ posted a couple of times this week He looks at the data stored by Samsung’s predictive text surrounding […]

Week 23 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Alexis Brignoni at ‘Initialization Vectors’ examines chats from the Badoo Android app after identifying them with Magnet’s App Simulator Finding Badoo chats in Android using SQL […]

Week 22 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS Alexis Brignoni at ‘Initialization Vectors’ examines the SystemPanel2 Android app which “keeps timestamped system wide app usage statistics” Android SystemPanel2 – App usage tracking Dark Defender […]

Week 21 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! FORENSIC ANALYSIS On 4n6files the author documents the process of obtaining a full file system image from an iOS 12 device. Previous posts on iOS file system have […]

Week 20 – 2019

Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections. As always, Thanks to those who give a little back for their support! Lee Whitifeld has opened the voting for the Forensic 4Cast Awards, and I very much appreciate being nominated for DFIR Resource, Show, and Social Media person of the […]