Week 18 – 2018

FORENSIC ANALYSIS Matt at ‘Bit of Hex’ takes a look at the memory artefacts left behind by “a user running Tor Browser Bundle (TBB) on an external USB drive to access webmail, and a Tor hidden service.” Memory Forensics &Tor Igor and Oleg at Cyber Forensicator examine the artefacts created by the “pCloud desktop application […]

This Month In 4n6 – April – 2018

A monthly wrap-up of the DFIR news for April 2018. Thank you to those Patreon donors for the last month. I decided to go with the value-for-value model rather than advertising. Alternatively, it would be great if you could leave an iTunes review. If you are a Patreon donor the show notes can be found here Please consider voting […]

Week 17 – 2018

There were a few more requests for votes for Forensic 4Cast Awards. Belkasoft – Phone Forensic Software, and Computer Forensic Software of the Year AboutDFIR – Digital Forensic Investigator, and Digital Forensic Resource of the Year Magnet Forensics – Digital Forensic Organization, Phone Forensic Software, and Computer Forensic Software of the Year FORENSIC ANALYSIS Hideaki […]

Week 16 – 2018

Campaigning for the 4Cast Awards is in full swing; I think I got three emails about it last week! The link to vote is here. FORENSIC ANALYSIS Oleg Skulkin and Igor Mikhaylov at Cyber Forensicator take a look at the artefacts created by a couple of desktop apps for cloud storage providers. Cloud Forensics: Analyzing […]

Week 15 – 2018

Lee Whitfield at Forensic 4Cast has opened up voting for the 2018 Forensic 4Cast awards, held at the SANS DFIR Summit in Austin, Texas. Thanks to everyone that nominated ‘This Week in 4n6’ for blog of the year. Voting ends May 25th, so I’ll post this up a couple times before then to remind people […]

Week 14 – 2018

FORENSIC ANALYSIS Hideaki Ihara at the Port 139 blog posted a couple of times this week First, he takes a look at the Property store data block of a LNK file. Hideaki indicates that this data is not parsed in Plaso. LNK と Property Store Next, he looks at some of the timestamps stored in […]

This Month In 4n6 – March – 2018

A monthly wrap-up of the DFIR news for March 2018. Thank you to those Patreon donors for the last month. I decided to go with the value-for-value model rather than advertising. If you get a little bit of value from the show, then I appreciate those that decide to give a little back. Alternatively, it would be great if […]

Week 13 – 2018

Last chance to nominate this site for the 2018 Forensic 4Cast Awards. If you have already, it’s very much appreciated. FORENSIC ANALYSIS Oleg Skulkin and Igor Mikhaylov at Cyber Forensicator tested how various actions affect the 8 timestamps on an NTFS volume on a Win10 host. This test shows that there are minor differences compared to […]

Week 12 – 2018

If you like my work and would like to nominate me for a 4Cast Award for Blog of the year that would be greatly appreciated. Nominations close at the end of this month. FORENSIC ANALYSIS Hideaki Ihara at the Port 139 blog takes a look at the “the Shell item structure of the LNK file.” […]

Week 11 – 2018

FORENSIC ANALYSIS Hideaki Ihara at the Port 139 blog takes a look at the ‘Access Bits’ in a Windows 10 registry hive. RegistryとAccess bits Sebastian Neef at 0day Work shares his findings from pulling apart the .DS_Store file format. Parsing the .DS_Store file format Marco Fontani at Amped Software shows “what Griffeye Analyze DI Pro […]