Week 31 – 2023

Amr Ashraf EventLog Analysis EDR Log Investigation Troy Wojewoda at Black Hills Information SecurityWelcome to Shark Week: A Guide for Getting Started with Wireshark and TShark Cado SecurityDecoding the NIST Cloud Computing Forensics Reference Architecture Oleg Afonin at ElcomsoftApple iCloud Acquisition: A Lifeline for Forensic Experts ForensafeInvestigating Android Twitter Salvation DATAWhat is DVR and How […]

Week 30 – 2023

Amped Acquisition from a Cloud-based Service Provider How to Use the Macroblocks Filter in Amped FIVE BelkasoftIns and Outs of Hashing and Hashset Analysis in Belkasoft X Manuel Winkel at DeydaChecklist for NetScaler (Citrix ADC) CVE-2023-3519 Elcomsoft iOS Forensic Toolkit Tips & Tricks iOS Device Acquisition: Installing the Extraction Agent Howard Oakley at ‘The Eclectic […]

Week 29 – 2023

Andrew Skatoff at ‘DFIR TNT’RMM – ScreenConnect: Client-Side Evidence Cado Security Macbooks and the Cloud Chain of Custody in the Cloud Cyber TriageLogon Session vs Local Session vs Cyber Triage Sessions. Oh My! Decrypting a DefenseMobile Surveillance, Body-worn Camera Audit Logs, Facial Rec. Source Code, & Threads Data Oleg Afonin at Elcomsoft Pushing the Boundaries: […]

Week 28 – 2023

David Spreadborough at AmpedRemote Acquisition Using a Mobile Device Felix Guyard at ForensicXlab🔦 Video Games Forensics : Steam ForensafeInvestigating Android Yandex Mail Jim Cole at CameraForensicsThe importance of closing the knowledge gap between software and law enforcement Ken Pryor at ‘No Pryor Knowledge’Forensics/Malware Courses and Tools Lorena Carthy-WilmotUses24HourClock: false Adam GossPython Threat Hunting Tools: Part […]

Week 27 – 2023

Marco Fontani at AmpedIntroducing Amped Engine: Our New Product to Integrate Video Conversion Everywhere Oleg Afonin at ElcomsoftLow-level Extraction for iOS 16 with iPhone 14/14 Pro Support Magnet ForensicsHow to Investigate Infostealer Malware  Salvation DATAWestern Digital USB Hard Disk Data Recovery Tips — Step by Step Megan Roddie at SANSGoogle Workspace Log Extraction Bill Stearns […]

Week 26 – 2023

David Spreadborough at AmpedOpen-Box Acquisition Using the Internal Hard Disk Drive Kushalveer Singh Bachchas at AT&T CybersecurityDigital dumpster diving: Exploring the intricacies of recycle bin forensics blueteam0psdet-eng-samples ElcomsoftOpen-Sourcing Raspberry Pi Software for Firewall Functionality: Secure Sideloading of Extraction Agent ForensafeInvestigating Default Web Browser on Windows Kevin Pagano at Stark 4N6NahamCon CTF 2023 – Forensics Paritosh […]

Week 25 – 2023

BelkasoftKnowledgeC Database Forensics with Belkasoft X Blake ReganMount Up CloudyforensicsGoogle Cloud Forensics and Incident Response Dr. Neal Krawetz at ‘The Hacker Factor Blog’Indictment Documents Haider at HK_Dig4nsicsForensic Analysis of Windows Subsystem for Android (WSA) Maxime Chouquet at LexfoCVE-2023-27997 – Forensics short notice for XORtigate Md. Abdullah Al MamunEmail Incident Response NCC GroupNew Sources of Microsoft […]

Week 24 – 2023

David Spreadborough at AmpedCCTV Device Removal and Replacement BelkasoftAutomation with Belkasoft: Orchestrating Belkasoft X and Griffeye DI Pro Forensic Science International: Digital InvestigationVolume 45, June 2023 Mark Spencer at Arsenal ReconForensic Analysis of the NetWire Stack Jacob Torrey at Thinkst ThoughtsMeet “ZipPy”, a fast AI LLM text detector MoveIT Attack Graph Response to CISA Advisory […]

Week 23 – 2023

Ariel Szarf and Or Aspir at MitigaMitiga Security Advisory: Lack of Forensic Visibility with the Basic License in Google Drive ForensafeInvestigating qBittorrent MailxaminerOLK File Forensics – Examine OLK14 File and Export Evidence Plainbit(IR-CASE) 신용카드 결제 피싱 페이지 스크립트 삽입 사고 Arslan Sabir at System WeaknessWindows RDP Event Logs: Identification, Tracking and Investigation Part-1 Adam GossPython […]

Week 22 – 2023

David Spreadborough at AmpedClosed-Box CCTV Acquisition Using Network Access Cado Security Is Cloud Forensics just Log Analysis? Kind Of. Updates to Legion: A Cloud Credential Harvester and SMTP Hijacker Cyber TriageInbound Logon Artifact Deep Dive Series Data Forensics DD File Forensics and Analysis Using an Automated Software E01 Forensic Analysis Using a Tried & Tested […]