General Discussion: Dell Drive Lock Acquisition??
Is this the ATA password lock or something else? jaclaz
View ArticleGeneral Discussion: Forensic readiness
athulin wrote: Adampski wrote: "Forensic readiness is complementary to, and an enhancement of, many existing information security activities.". I think I disagree with that -- I'd say that FR is to at...
View ArticleGeneral Discussion: FTK Imager stalling --
It is most likely that a bad or failing area of the disk has been reached. The next stage depends on how important the data is. If important the drive should be sent to a specialist repairer who may...
View ArticleGeneral Discussion: Imaging a PowerBook G4
Target disk mode is probably your best bet. I have not tried it on a G4 Mac, but the functionality probably hasn't changed much. Here's the Apple knowledge base article about it:...
View ArticleMobile Phone Forensics: last ProgramActivities Android
hi folks, i need help. i work on an Samsung Galaxy S4, I9505 and extract from /data/data/com.samsung.android.providers.context/databases/ContextDB.db the table app_usage. i think i see there the last...
View ArticleGeneral Discussion: RAM memory imaging through FireWire attack
To be clear, the firewire attack is actually DMA attack, as the same as the "firewire attack" can be used through PCMCIA or Thunderbolt connection.
View ArticleGeneral Discussion: Mavericks logon password
This may not be the best method but you can usually reset passwords for users. http://coolestguidesontheplanet.com/reset-forgotten-admin-password-osx-10-8-mountain-lion/ I've used this a couple of...
View ArticleMobile Phone Forensics: Windows Phone Forensics
Hi, I am developing a tool that will perform full physical acquisition of Windows Phone7/8,but none of the methods for Android or Windows Mobile (WinCE 6.5 and earlier) seems to be working. The users...
View ArticleGeneral Discussion: Mavericks logon password
I used Joel's suggestion to reset the password to something known. Having done so I've hashed the drive and did a before and after compare. Only 4 files changed including the user's plist file. This...
View ArticleGeneral Discussion: Current Tool Testing and Validation
All I am curious to know what general methods are being used by those in the field for testing and validating the tools used for examinations. For example, do you perform it yourself? Do you...
View ArticleEducation and Training: Phishing Project
Hi all, I'm looking to do some research on Phishing for my final year project at university. Quite a bit of research has already been done in this area and I'm struggling to come up with something...
View ArticleGeneral Discussion: Using shred Linux command with an offset ?
binarybod wrote: I use the pv tool to give me some feedback thus: Code:: dd if=/dev/zero ibs=4096 | pv -s {size in bytes} | dd of={target} obs=4096 Experimenting with different block sizes helps with...
View ArticleGeneral Discussion: is there any free file carving tool
A few free file carving utilities are Photorec, Scalpel, and Foremost.
View ArticleGeneral Discussion: localizing a mounted HD
Major updates to Arsenal Image Mounter are now live on GitHub... a list of updates can be found here: https://github.com/ArsenalRecon/Arsenal-Image-Mounter/blob/master/News.txt For example, an issue...
View ArticleMobile Phone Forensics: HELP! iPhone 5 - iOS 7
I have used all software mentioned, plus more and one thing that we should always remember is no software is perfect and all can produce different results. People will have their favorites and own...
View ArticleEducation and Training: Steganography project for university
Have you looked at Stegdetect?
View ArticleServices Required: Car DVR footage for traffic collision case
Blocker wrote: With the poor quality video, but with more frames similarly enhanced, could the image of the vehicle approaching from the right be shown to be consistent with a 2009 (orange) Jeep...
View ArticleDigital Forensics Job Vacancies: Digital Forensic Analyst (CONTRACT) role,...
Hello, BeecherMadden is a specialist information and cyber security recruitment firm based in London. We currently have a need for a 3-6 month contractor to support a large (global) private sector...
View ArticleGeneral Discussion: Identifying the Major challenges of DF Investigations
jhup wrote: and to be be picky, the question of the survey does not match the "question" of the thread."Which is the MOST IMPORTANT FACTOR in a Digital Forensic Model?" is not equivalent to "...
View Article