General Discussion: Syskey password on startup
I am failing to understand what the problem is (final goal). Re-accessing data on a system where a third party (maliciously and without user knowing it) has setup Syskey encryption of the SAM?...
View ArticleForensic Hardware: Forensic laptop suggestion
I use laptops from Malibal.com. eSata, USB 3, Full Keyboard, back lit, You can customize from there.
View ArticleMobile Phone Forensics: Most comprehensive mobile forensic tool?
Most comprehensive tool Cellebrite/XRY very close contenders, both have pros and cons, different levels of skills needed to get into both. Training wise in the UK I cannot recommend Kevin Mansel of...
View ArticleGeneral Discussion: Chromebook forensics
I have a similar problem right now. First Chromebook that has gotten to us happens to be a series 3 Samsung Chromebook. According to ifixit step 8 here:...
View ArticleMobile Phone Forensics: Help: University Project + Soft root Samsung Galaxy S3
Thank you very much for the information and I am having a look at Andriller. I am looking forward generous help for finding out a way to root the Samsung Galaxy S3 in a way that it preserve forensic...
View ArticleGeneral Discussion: Password for a Domain user
Is the domain account that EnCase is picking up from the same OS installation? Could EnCase be showing a previously existing account (deleted), check the dates associated with that account and it's...
View ArticleDigital Forensics Job Vacancies: Digital Forensic Examiners - Welwyn Garden City
Hertfordshire Constabulary HTCU are seeking to recruit a number of examiners to existing and projected positions in the HTCU. Applicants should visit the recruitment website at...
View ArticleMobile Phone Forensics: Malware digitale forensic
I echo jaclaz comments... why do you need a UFED? Yes, there is a Malware scan feature which will identify 'infected' files/apps against a database of known malware signatures and provide some...
View ArticleForensic Hardware: Forensic laptop suggestion
ScotchBroth wrote: I use laptops from Malibal.com. eSata, USB 3, Full Keyboard, back lit, You can customize from there.Hmmm... Looking at their specs and design, I'd bet a couple of dollars they are...
View ArticleMobile Phone Forensics: Most comprehensive mobile forensic tool?
Adam10541 wrote: I completely agree that the vendor neutral training is both effective and essential, but sadly very expensive and with so many people offering training it becomes difficult to make...
View ArticleGeneral Discussion: Chromebook forensics
I understand installing applications to a running machine is generally not preferred due to the changes that might/will occur, but Chromebooks seem to be falling into a similar category as smartphones...
View ArticleForensic Hardware: Compressed Imaging Machine??
cmort wrote: However, I may receive almost 300 HDs and will need to turn them around quicker than what it will take using Symantec Ghost with the source and target drives connected via USB on my...
View ArticleMobile Phone Forensics: Hash validity
SHA1 (160 bit) probability that two files will be similar: one in a quindecillion chance.
View ArticleMobile Phone Forensics: Boostmobile ZTE N860
I have a locked Boostmobile ZTE N860. I have an unable to unlock or access the phone with Cellebrite or Susteen. Any suggestions?
View ArticleGeneral Discussion: Evernote database files
FWIW the script runs in Python 2.7. I've wrapped it in a GUI for ease of use. The script is written to be expandable. Modification instructions included. Again this script runs in Python 2.7 Link...
View ArticleGeneral Discussion: Sample IIS logs for academic purposes
Hi I am looking into some research of web server logs which show attacks. Are there any websites anyone knows which keeps real IIS logs which students can use for academic purposes? I was hoping to...
View ArticleMobile Phone Forensics: Hash validity
AlexC wrote: For the right type of data, the probability of a collision in MD5 is 100% NO. <img src="images/smiles/icon_cry.gif" alt="Crying or Very sad" title="Crying or Very sad" /> That isNOT...
View ArticleMobile Phone Forensics: Most comprehensive mobile forensic tool?
All, You have all been a wealth of knowledge and support here. Thank you all so very much for taking the time to respond and provide your experience and insight into mobile forensics. All of your...
View ArticleGeneral Discussion: Chromebook forensics
chrism wrote: Would be good to get hold of one of these and see how easy it is to access the small SSD that is inside them, and if any data is stored locally. There are a number of net articles on how...
View Article