Week 26 – 2023

David Spreadborough at AmpedOpen-Box Acquisition Using the Internal Hard Disk Drive Kushalveer Singh Bachchas at AT&T CybersecurityDigital dumpster diving: Exploring the intricacies of recycle bin forensics blueteam0psdet-eng-samples ElcomsoftOpen-Sourcing Raspberry Pi Software for Firewall Functionality: Secure Sideloading of Extraction Agent ForensafeInvestigating Default Web Browser on Windows Kevin Pagano at Stark 4N6NahamCon CTF 2023 – Forensics Paritosh […]

Week 25 – 2023

BelkasoftKnowledgeC Database Forensics with Belkasoft X Blake ReganMount Up CloudyforensicsGoogle Cloud Forensics and Incident Response Dr. Neal Krawetz at ‘The Hacker Factor Blog’Indictment Documents Haider at HK_Dig4nsicsForensic Analysis of Windows Subsystem for Android (WSA) Maxime Chouquet at LexfoCVE-2023-27997 – Forensics short notice for XORtigate Md. Abdullah Al MamunEmail Incident Response NCC GroupNew Sources of Microsoft […]

Week 24 – 2023

David Spreadborough at AmpedCCTV Device Removal and Replacement BelkasoftAutomation with Belkasoft: Orchestrating Belkasoft X and Griffeye DI Pro Forensic Science International: Digital InvestigationVolume 45, June 2023 Mark Spencer at Arsenal ReconForensic Analysis of the NetWire Stack Jacob Torrey at Thinkst ThoughtsMeet “ZipPy”, a fast AI LLM text detector MoveIT Attack Graph Response to CISA Advisory […]

Week 23 – 2023

Ariel Szarf and Or Aspir at MitigaMitiga Security Advisory: Lack of Forensic Visibility with the Basic License in Google Drive ForensafeInvestigating qBittorrent MailxaminerOLK File Forensics – Examine OLK14 File and Export Evidence Plainbit(IR-CASE) 신용카드 결제 피싱 페이지 스크립트 삽입 사고 Arslan Sabir at System WeaknessWindows RDP Event Logs: Identification, Tracking and Investigation Part-1 Adam GossPython […]

Week 22 – 2023

David Spreadborough at AmpedClosed-Box CCTV Acquisition Using Network Access Cado Security Is Cloud Forensics just Log Analysis? Kind Of. Updates to Legion: A Cloud Credential Harvester and SMTP Hijacker Cyber TriageInbound Logon Artifact Deep Dive Series Data Forensics DD File Forensics and Analysis Using an Automated Software E01 Forensic Analysis Using a Tried & Tested […]

Week 21 – 2023

Lee Whitfield has announced the finalists for this years Forensic 4cast awards. Thanks for everyone that nominated this site for Resource of the Year.Forensic 4:cast Awards 2023 – Voting is now open! ThinkDFIRCPY JMP Brian Maloney at Malware MaloneyOneDrive Evolution ForensafeInvestigating Remote Desktop Connection Event Logs ForensicXlab📦 Volatility3 Windows Plugin : KeePass Invictus Incident ResponseImporting […]

Week 20 – 2023

Hexordia What’s brewing with IPAs – Working with IPA files for Forensic Examiners Cloud Storage & Digital Forensic Evidence David Spreadborough at AmpedClosed-Box CCTV Acquisition Using Storage Media Emre Caglar Hosgor at BelkasoftIncident Response with Belkasoft by Emre Caglar Hosgor, SOC Analyst—Specially for Belkasoft Blake Regancheckm8 to SSH Chuan-lun (Johnson) ChouFinding messages in Anonymous Chat […]

Week 19 – 2023

Chris Doman at Cado SecurityDFIR with KAPE and Cado Community Edition Darren LimForensic Analysis of Jami for Android, a Peer-to-Peer Messaging Application Decrypting a DefenseAI & Photography, NYC Council Hearing, Geofence Warrants, Search Warrant Returns, & More Michael Hamm at Digital CorporaCIRCL Forensics Exercises Haider at HK_Dig4nsicsiOS Shortcuts InfoSec Write-upsBlackEnergy Memory Forensic Ananlysis Invictus Incident […]

Week 18 – 2023

David Spreadborough at AmpedNavigating a CCTV Device and Reviewing Video BlackMambaBlackEnergy Memory Forensic Ananlysis ForensafeInvestigating Adobe Acrobat Reader HaircutfishTryHackMe Wireshark: The Basics — Task 1 Introduction & Task 2 Tool Overview Ian DBoggle-bytes in a Basic Data Partition Entry Markus Tuominen and Mehmet Mert Surmeli at WithSecureUnleashing the Power of Shimcache with Chainsaw N00b_H@ck3rCyberDefenders: AzurePot Phalgun Kulkarni and […]

Week 17 – 2023

Chris Doman at Cado SecurityThe Cado Platform Full Export for Forensic Data Lakes Digital Forensics MyanmarCHIP OFF ( Mobile FORENSIC) Domiziana FotiLetsDefend- SOC142 — Multiple HTTP 500 Response Oleg Afonin at ElcomsoftAnalyzing iPhone PINs Forensic Science International: Digital InvestigationVolume 44 JamfThreat advisory: Mobile spyware continues to evolve Mattia Epifani at Zena ForensicsiOS Forensics References: a curated list […]