Week 26 – 2017

Aaaaaaaaand we’re back ๐Ÿ˜€ I am considering going back and fixing up the last two posts, but that depends on both a) interest by readers and b) my time FORENSIC ANALYSIS There were a couple of posts by the guys at Amped Software David Spreadborough shows how to use Amped Five to collaborate in a […]

Week 25 – 2017

Another week of links only; hoping to return to scheduled programming next week but depends on how I go with the travel/jet lag. Spent the last few days with some awesome people at the SAN DFIR Summit; learnt a lot, met a lot of people, and overall had a great time. Unfortunately didn’t win the […]

Week 24 – 2017

Taking a break this week (and probably next week too) so no summaries, just links ๐Ÿ™‚ FORENSIC ANALYSIS Amped Software Understanding how online services change images Articles Turning the Investigations Dial Toward Practice Over Theory Atola Technology Creating a logical image of a source drive Between Two DFIRns CyberChef: Example DFIR Use Cases Compass Security […]

Week 23 – 2017

FORENSIC ANALYSIS The guys at Cyber Forensicator had a couple of posts this week They shared a paper by Baljit Singh, Dmitry Evtyushkin, Jesse Elwell, Ryan Riley, and Iliano Cervesato titled “On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters” from the 2017 ACM on Asia Conference on Computer and Communications Security. On the […]

Week 22 – 2017

Voting has closed for the 4Cast award, thanks for the votes! Iโ€™ll be attending the DFIR Summit where the awards are given out this year. Hopefully, the next time I post about this it will be a picture of the prize! FORENSIC ANALYSIS Albert Barsocchini and Sam Maccherola at AccessData list three challenges when extracting […]

Week 21 – 2017

If youโ€™d like to vote this site for the Forensic 4cast blog of the year, that would be greatly appreciated ๐Ÿ™‚ Only a few more days to go till voting closes too. 2017 Forensic 4:cast Awards โ€“ Voting FORENSIC ANALYSIS Luis Rocha at Count Upon Security talks about the USNJrnl artefact on NTFS, and how […]

Week 20 – 2017

If youโ€™d like to vote this site for the Forensic 4cast blog of the year, that would be greatly appreciated ๐Ÿ™‚ 2017 Forensic 4:cast Awards โ€“ Voting FORENSIC ANALYSIS The guys at Cyber Forensicator shared a couple of articles this week They shared a paper by Abdulalem Ali, Shukor Abd Razar, Siti Hajar Othman, Arafat […]

Week 19 – 2017

If youโ€™d like to vote this site for the Forensic 4cast blog of the year, that would be greatly appreciated ๐Ÿ™‚ 2017 Forensic 4:cast Awards โ€“ Voting FORENSIC ANALYSIS The guys at Cyber Forensicator have shared the news that Joseph Muniz and Aamir Lakhani book, titled โ€œInvestigating the Cyber Breach: The Digital Forensics Guide for […]

Week 18 – 2017

If youโ€™d like to vote this site for the Forensic 4cast blog of the year, that would be greatly appreciated ๐Ÿ™‚ 2017 Forensic 4:cast Awards โ€“ Voting UPCOMING WEBINARS In self-promotion news (yes, I moved this section to the top of the site this week ;)), I will be presenting a SANS webcast on Thursday […]

Week 17 – 2017

If youโ€™d like to vote this site for the Forensic 4cast blog of the year, that would be greatly appreciated ๐Ÿ™‚ 2017 Forensic 4:cast Awards โ€“ Voting FORENSIC ANALYSIS As an update to a post by Mari, there’s been a bit of talk about a newly located registry subkey that indicates the actual install date […]