Week 29 – 2022

Heather Mahalik at CellebriteFinal CTF 2022 Round Up Scott Koenig at DFIR ReviewiOS Location Services and System Services are they ON or OFF Digital Forensics Myanmar eCDFP Module (5) File System Analysis (Part-9)  (NTFS File System Analysis) eCDFP Module (5) File System Analysis (Part-10)  (NTFS File System Analysis) Forensafe Investigating Windows Terminal Investigating Mapped NEtwork […]

Week 28 – 2022

Mark Spencer at Arsenal ReconMaximum Exploitation of Windows Registry Hive Bins Cellebrite Part 2: CTF 2022 Write Up – Heisenberg’s Android Part 3: CTF 2022 Write Up – Marsha’s iOS Device Part 4: CTF 2022 Write Up – Beth’s iOS Device Krzysztof Gajewski at CyberDefNerdStripped off ADS (Zone.Identifier) for files downloaded in the incognito/private mode. […]

This Month In 4n6 – June – 2022

A monthly wrap-up of the DFIR news for June 2022. Thank you to those Patreon donors for the last month. This project takes a lot of time, so it’s very much appreciated that people see enough value in it to contribute back 🙂 If you are a Patreon donor the show notes will be found here. Special […]

Week 27 – 2022

The voting for the 2022 Forensic 4Cast Awards has been opened. Thank you everyone that nominated this website, please make sure to cast your votes below!2022 Forensic 4:cast Awards – Voting is now OPEN BlackholdVolcado de memoria con LiME y análisis con Volatility Blake’s R&DA Begginers All Inclusive Guide to ETW DaddycocoamanDumping RSA Certificates with […]

Week 26 – 2022

Patrick Bennett at CrowdStrikeThe Call Is Coming from Inside the House: CrowdStrike Identifies Novel Exploit in VOIP Appliance Cyber Social HubHow To Use ExifTool To Look At Metadata Digital Forensics Myanmar eCDFP Module (5) File System Analysis (Part-6)  (NTFS File System Analysis) OSINT Critical Thinking For Social Media Elcomsoft checkm8 Extraction: the iPads, iPods, and […]

Week 25 – 2022

Lee Whitfield has opened the nominations for the Forensic 4cast awards for another week; get your last minute nominations in now!Forensic 4:cast Awards – Update Didier StevensDiscovering A Forensic Artifact Digital Forensics Myanmar How the Federal Government Buys Our Cell Phone Location Data By  BENNETT CYPHERS  (Myanmar Translation) Solid State Drive (SSD) Structure & Forensics […]

Week 24 – 2022

Asger SCreating Standalone Artifact Collector Belkasoft How to use Advanced Filters with Belkasoft X The importance of fully charged devices in your digital forensic investigation Digital Forensics Myanmar eCDFP Module (5) File System Analysis (Part-5) #DVR_NVR_Forensics Oleg Afonin at ElcomsoftFilling the Gaps: iOS 14 Full File System Extracted ForensafeInvestigating Windows LogFile Ian Whiffin at DoubleBlakiOS16iMessage […]

Week 23 – 2022

4DiscoveryCase Study: The Executive Stealing Company Data Cado SecurityTales From the Honeypot: WatchDog Evolves With a New Multi-Stage Cryptojacking Attack Dr. Brian Carrier at Cyber TriageCyber Triage Lite – Identifying OS Configuration Luca Ebach at cyber.wtfWindows Registry Analysis – Today’s Episode: Tasks Krzysztof Gajewski at CyberDefNerdHow long was the malicious PowerShell script active on the […]

Week 22 – 2022

Asger SDeadhost Investigation and Super Timeline Block MagnatesRikkei Finance Hack: Explained Cassie Doemel at AboutDFIRApp Timeline Provider – SRUM Database Chris at AskCleesDecrypting Mega Preferences (Part 2) Dr. Brian Carrier at Cyber TriageCyber Triage Lite – Identifying Malware Digital Forensics Myanmar Imaging Unlocated Space  & Install FTK Imager On USB What Is Call Details Record […]

Week 21 – 2022

Ahmed AliCouch to 5K Runner: A Mobile Forensics Investigation BelkasoftWhere in the world was John McAfee and An0nymous? A tell-tale sign from EXIF data Matt Muir at Cado SecurityLinux Attack Techniques: Dynamic Linker Hijacking with LD Preload Christopher KyriacouForensic Investigation of the Grubhub iOS App Joshua I. James at DFIRScience Tableau External Write Blocker Setup […]