Week 38 – 2024

Chris Ray at Cyber TriageDFIR Breakdown: Impacket Remote Execution Activity – Smbexec ForensafeInvestigating Android Nike Run Club Johan BerggrenOpenRelik Lina Lau at XintraUnderstanding Tokens in Entra ID: A Comprehensive Guide Magnet Forensics A look into iOS 18’s changes 7 essential artifacts for macOS forensics Marco Fontani at Amped10 Ways to Detect Deepfakes Created by Text-to-image […]

Week 37 – 2024

Atola TechnologySynology RAID Reassembly and Image Acquisition David Spreadborough at AmpedGetting Started with Video Formats and Conversion Cyber 5WNetwork Forensics With Wireshark Mike Wilkinson at Cyber TriageDFIR Next Steps: What To Do After You Find A Suspicious Use Of Remote Monitoring & Management Tools Danny ZendejasLets Defend Write-up David Cowen at the ‘Hacking Exposed Computer […]

Week 36 – 2024

0xdf hacks stuffHTB Sherlock: Noxious Andrea Fortuna Forensic acquisition of ChromeOS devices The hidden risks of Cherry-Picking in Incident Response and Digital Forensics Belkasoft How to Investigate Telegram Crime without Arresting the Company’s CEO iOS Telegram Forensics. Part I: Acquisition and Database Analysis Brian MaloneyCracking OneDrive’s Personal Vault Justin Seitz at Bullsh*t HuntingThe Evidence Carnival: […]

Week 35 – 2024

CCL GroupLocal Storage and Session Storage in Mozilla Firefox (Part 1) DFIR ReviewLocation, Location, Location Dr. Tristan Jenkinson at ‘The eDiscovery Channel’eDiscovery Risks – Sending Documents for Disclosure via Email ForensafeInvestigating Android Tinder Emilia Chau, Marin Gheorge, and Muhammad Jawad at Jumpsec LabsBuilding Forensic Expertise: A Two-Part Guide to Investigating a Malicious USB Device (Part […]

Week 34 – 2024

0xdf hacks stuffHTB Sherlock: Reaper CellebritePerforming Collection from Mobile Devices in an MDM Environment Cyber TriageDFIR Next Steps: What To Do After You Find a Suspicious Use Of curl.exe Digital Forensics Myanmar eCDFP (Module-6) (Window Forensics) (Part – 7) eCDFP (Module-6) (Window Forensics) (Part – 8) eCDFP (Module-6) (Window Forensics) (Part – 9) ForensafeInvestigating Android […]

Week 33 – 2024

Andrea FortunaDigital Detectives vs. Android 14: overcoming new forensic challenges Digital Forensics MyanmareCDFP (Module-6) (Window Forensics) (Part – 6) ForensafeInvestigating Android Here WeGo Kevin StokesPlaso Super Timelines and CloudTrails Oxygen ForensicsmacOS Extraction of System Artifacts with Oxygen Forensic® KeyScout Kokab Rasool at Paraben CorporationMemory Forensics Tools Overview Rajendra Prasanth SFile System tunnelling John Brown at […]

Week 32 – 2024

Adam MesserCloud Digital Forensics and Incident Response — AWS IAM Privilege Escalation Leads to EC2… Craig Ball at ‘Ball in your Court’AI Prompt to Improve Keyword Search Mike Wilkinson at Cyber TriageDFIR Next Steps: What To Do After You Find a Suspicious Use Of certutil.exe Decrypting a DefenseOlympics Surveillance, Subway Weapons Detection System, Geofence Search Decision, Privacy […]

Week 31 – 2024

Digital Forensics MyanmareCDFP (Module-6) (Window Forensics) (Part – 5 ) Dr. Neal Krawetz at ‘The Hacker Factor Blog’Reversing Samsung Metadata ForensafeInvestigating Android Firefox Justin De Luna at ‘The DFIR Spot’RDP Bitmap Cache – Piece(s) of the Puzzle Kevin StokesPlaso Super Timelines in Splunk Magnet ForensicsSee the story of your geolocation data with Magnet Review’s Worldmap […]

Week 30 – 2024

Chris Ray at Cyber TriageDFIR Breakdown: Using Certutil To Download Attack Tools 0xdf hacks stuff HTB Sherlock: Tracer HTB Sherlock: Campfire-2 Baris Dincer Forensic Investigation Operations — Complex Linux Forensics Analysis Forensic Investigation Operations — Windows Base III BelkasoftAndroid System Artifacts: Forensic Analysis of Application Usage Digital Forensics Myanmar Digital Forensics with Myanmar Language PDF (View Or Download) eCDFP […]

Week 29 – 2024

Adam MesserCloud Digital Forensics and Incident Response — EC2 Compromise Leads to S3 Bucket Exfiltration Baris Dincer Forensic Investigation Operations — Windows Base I Forensic Investigation Operations — Windows Base II BelkasoftChallenges in Digital Forensics: The Case of the Trump Rally Shooter’s Phone Digital Forensics Myanmar eCDFP (Module-6) (Window Forensics) (Part – 2 ) eCDFP (Module-6) (Window Forensics) (Part – 3 […]