Week 46 – 2023

Cado Security Investigating AWS EC2 Compromise CTF by Cado Security Scaling Log Forensics in the Cloud with cloudgrep CyberJunnkiePre5 Forensics (CyberHackathon 23 Online Qualifiers) Digital DanielaUsing Zeek Signatures! Shanna Daly at Fancy Forensics Leveraging SRUM for Incident Response Hunting webshells ForensafeSolving Cellebrite’s September 2023 CTF (Abe’s iPhone device) Using ArtiFast Gaurav GogiaWSL2 Forensics: Detection, Analysis […]

Week 45 – 2023

Emi Polito at AmpedMeasure Heights from Surveillance Video John Hyla at Blue Crew ForensicsConnecting Discord Attachments to Threads & SDWebImage Library Cado SecurityA New Perspective on Resource-Level Cloud Forensics CellebriteData extraction cheatsheet Cyber Social HubMediaTek: A Short Story Digital DanielaMemory Forensics Thesis! Doug Metz at Baker Street Forensics Huntress Capture the Flag – A CTF […]

Week 44 – 2023

Emi Polito at AmpedUnroll a 360 Camera Forensafe Solving Cellebrite’s September 2023 CTF (Felix’s iPhone device) Using ArtiFast Investigating Android Installed Applications Salvation DATAHow to Recover Deleted Partition on Hard Disk? Taz Wake Linux Incident Response – using lsof to check network connections Linux Live Incident Response – the ps command Linux incident response – understanding […]

Week 43 – 2023

Emi Polito at AmpedDeblur a License Plate in an Image BelkasoftTelegram Forensics: Getting Started Digital DanielaInvestigating Suspicous Emails! Jerry Chang Sony IR Internship Capstone – Cyber Attack Simulation & Forensics (Forensics) Sony IR Internship Capstone – Cyber Attack Simulation & Forensics (Attack Simulation) Joshua Hickman at ‘The Binary Hick’Finding Phones With Google Maps Part 1 […]

Week 42 – 2023

Amped Enhance a Backlit Scene How To Reveal AI-generated Images by Checking Shadows and Reflections in Amped Authenticate Digital DanielaExamining Traffic with NetworkMiner! Justin De Luna at ‘The DFIR Spot’Artifacts of Execution: Prefetch – Part One Kevin Pagano at Stark 4N6 Cellebrite CTF 2023 – Abe Cellebrite CTF 2023 – Felix Magnet Forensics How to […]

Week 41 – 2023

Emi Polito at AmpedRemove Periodic Noise from an Image Amr AshrafLinux Forensics In Depth DFRWSUnraveling Digital Mysteries: How AI Copilots can Revolutionize Digital Forensic Investigations* Digital DanielaInvestigating Network Traffic With Snort! ForensafeInvestigating Android Downloads Howard Oakley at ‘The Eclectic Light Company’Sonoma’s log gets briefer and more secretive InfoSec Write-ups Timeline Creation for Forensics Analysis Creating […]

Week 40 – 2023

Emi Polito at AmpedVideo Deinterlacing BelkasoftDecoding Windows Registry Artifacts with Belkasoft X: UserAssist Chris Brown at CorelightUsing Corelight to Identify Ransomware Blast Radius | Corelight ForensafeInvestigating Android Facebook Messenger HackTheBoxDetecting PsExec lateral movements: 4 artifacts to sniff out intruders Kathryn Hedley at KhyrenzAutomated USB artefact parsing from the Registry Mattia Epifani at Zena ForensicsiOS 15 […]

Week 39 – 2023

Alexander TasseBlue Team Labs — “Suspicious USB Stick” Emi Polito at AmpedSuper Resolution from Different Perspectives Angry-Bender’s blog houseA SIEM On the Cheap – Using Sqlite for Data Analysis BelkasoftiCloud Advanced Data Protection: Implications for Forensic Extraction Brian MaloneyOneDriveExplorer ODL Parsing Issues Matt Muir at Cado SecurityCado Security Labs Researchers Witness a 600X Increase in P2Pinfect Traffic […]

Week 38 – 2023

Adam at HexacornAnalysing NSRL data set for fun and because… curious, Part 3 Alexander TasseBlue Team Labs — “Employee of the Year” Emi Polito at AmpedCorrect the Perspective of a License Plate BelkasoftiOS System Artifacts: Revealing Hidden Clues Oleg Afonin at ElcomsoftiOS Forensic Toolkit: Troubleshooting Low-Level Extraction Agent ForensafeInvestigating Android Accounts Haircutfish Wireshark: Packet Operations — Task 3 Statistics […]

Week 37 – 2023

Emi Polito at AmpedIntegrate Multiple Frames to Improve Visibility Andrew Skatoff at ‘DFIR TNT’RMM – Level.io: Forensic Artifacts and Evidence BelkasoftiOS WhatsApp Forensics with Belkasoft X Patterson Cake at Black Hills Information SecurityWrangling the M365 UAL with SOF-ELK and CSV Data (Part 3 of 3) Brian MaloneyWhat’s New in OneDriveExplorer DCSO CyTecMicrosoft Edge Forensics: Screenshot […]