General Discussion: Tracking Facebook or other Social Media Posts
I will tell you at the end of the day it requires you to put the person behind the chair and behind the computer. Sometimes data can be old and stale and it simply requires good interview techniques to...
View ArticleMobile Phone Forensics: Using DD to image smartphones
Maybe this thread can grow if the discussion can continue identifying different processes etc and find alternatives to see if they help build away forward. As an alternative to ODIN, Heimdall -...
View ArticleForensic Software: EnScript - Registry - EnCase 7
Glad to help. Let me know if I can answer any more questions.
View ArticleDigital Forensics Job Vacancies: West Midlands Police - Digital Forensic Officer
Position: Digital Forensic Officer – Digital Forensics Team. Salary: £26,658 - £32,547 LPU/Dept: Forensic Services Location: Ridgepoint House Post Ref: 101/14 Applications are invited from motivated...
View ArticleForensic Software: different evidence found in FTK and Autopsy
Welcome to the real world. Tools are just tools and it is fairly common for different tools to produce different results. Ultimately you want to understand how to view a disk with a Hex editor to...
View ArticleGeneral Discussion: How to image Fusion Drive from iMac?
Are there any instructions on how to go about imaging a Fusion drive in an iMac? Is there a reason I cannot find the "User" directory and other common directories (Documents, Downloads, etc.)? Is there...
View ArticleDigital Forensics Job Vacancies: Metropolitan Police Digital Forensics...
Higher Digital Forensics Specialist - Band M The Metropolitan Police Service is undergoing a major change programme which includes a significant change in the way we deliver digital forensics services....
View ArticleGeneral Discussion: Link a Micro SD card with Spotlight-V100 to a specific Mac.
/Users/username/Library/Preferences/com.apple.sidebarlists.plist did not contain any evidence to link the files. However, using the Memory card volume label in conjunction with 'fseventsd' and...
View ArticleGeneral Discussion: Virtualize Windows 2012 Server Question
olifer wrote: ... the guest OS is running Windows 2012 Server which appears to be unsupported by VFC and am looking for an alternative solution to get it running. "appears" means that it is not among...
View ArticleForensic Software: Download full web page
httrack is the best product I know of. The only other product I would use is Adobe Professional, but that can be a pain.
View ArticleMobile Phone Forensics: Physical Acquisition of an Android Mobile Phone
Can you run the apps from an inserted MicroSD? In the US there is no such thing as "certified" tool per se. There are tools that certain courts accept (or reject), and there are some scientific and...
View ArticleMobile Phone Forensics: iOS7 Frequent Locations
I have only recently learned of the "Frequent Locations" setting on iPhones. After checking my personal phone, it would be of great value to gather this information. I have never seen any of the...
View ArticleGeneral Discussion: Corsair Flash Padlock 2 USB Flash Drive
Any ideas on how to access a Corsair Flash Padlock 2 USB Flash Drive, which is password protected? Research shows it is protected with 256-bit AES hardware encryption. Thanks in advance, Ray
View ArticleMobile Phone Forensics: Using DD to image smartphones
Theoretically I can watch boot through an on-chip debugger (OCD), and when the boot section we are interested in is requested force the code, or something. I can already mess up (cheat in games too...
View ArticleEducation and Training: Unscrambling text for an assignment
Can you point the a complete file, as the high characters cannot be viewed/used. What is class is this for? What is the container of the item? Is it a log, plain written message, word document, a...
View ArticleGeneral Discussion: Corsair Flash Padlock 2 USB Flash Drive
The password/hash is outside of the encrypted data area.
View ArticleMobile Phone Forensics: using adb to extract android
Let me expand, stress and still ask : How can ADB & DD, and ADB & DD alone, "pull an entire physical image"? I would love to learn it.
View ArticleGeneral Discussion: Facebook Forensics and Laws For Case Build
Jumping in this as well.. What exactly are they defrauding you of ? What exactly is the harassment ? Is this person pretending to be someone else ? If so that is criminal impersonation. But the victim...
View ArticleDigital Forensics Job Vacancies: Digital Investigations Team Leader - London...
Evening everyone. We are looking to recruit a Digital Investigations Team Leader to our London based team. You can find full details of the vacancy here:...
View Article