Forensic Software: Old tzworks software versions
Bunnysniper wrote: Do you know other free, forensic sound tools which could analyze a MFT file from an image or extracted by FTK Imager? A GUI would be nice, but is not a requirement. I know of several...
View ArticleMobile Phone Forensics: Recovering iphone 4S - HELP PLEASE
It is impossible, now. I am sorry. P.S. If you have a backup (iTunes or iCloud), you can recover data from the backup.
View ArticleForensic Hardware: Forensic :) mouse recommendation
I like a heavy mouse with a very high sensitivity. I prefer gaming mice for the added features and on the fly mouse acceleration. I also make use of the control button ont he mouse for things like fast...
View ArticleGeneral Discussion: i have been trying to get information from this below
i have search the search engine(Google) but could not not get any vital information. i am doing my internship program with Comsats institute of information and technology and i have to give a report...
View ArticleMobile Phone Forensics: com.atebits.tweetie.compose.attachements
Looking for some input. Exhibit is an iPad A1455. Got a large quantity of IIOC stored in: private/var/mobile/Applications/com.atebits.Tweetie2/Documents/com.atebits.tweetie.compose.atttachements....
View ArticleEducation and Training: I need solution to this
omajiman wrote: Hello Dear! I am current undergoing a post graduate course in information security, in a very short period i will start my thesis in the area of network forensics. Please i need advise...
View ArticleGeneral Discussion: IIS Configuration
the system is a windows server 2003 SP2, so i'm assuming it's IIS6
View ArticleDigital Forensics Job Vacancies: eDiscovery PM, London £50000-£60000, London
My client, a global consulting firm is looking for an eDiscovery Project Manager to join their expanding London team. The role : • Establish and document clear project requirements supporting the...
View ArticleGeneral Discussion: Windows 7 Recycle Bin
I am examining the files in the Recycle bin on a Windows 7 system. When looking at a $I file, and in plain text is say Moved to recycle bin: 09/01/2014 02:12:35, is this time UTC or local time?
View ArticleGeneral Discussion: Ftk File duplication
kbertens wrote: Have a look at https://ad-pdf.s3.amazonaws.com/FPD-techdoc%20Importing%20or%20Adding%20Hash%20Sets%20to%20FTK.pdf The usage of hashsets into FTK. Its an old article and depends on the...
View ArticleForensic Software: Social media collections tool
Does anyone out there have any suggestions for defensible social media collections other than X1 Social Discovery? Trying to find a tool that is reasonably priced but great for collecting Facebook and...
View ArticleGeneral Discussion: Windows 7 Recycle Bin
twjolson wrote: ...you must be smarter than your tool... Nice. Well said.
View ArticleMobile Phone Forensics: Missing smartphone files
I am trying to acquire an iphone 4s with iOS version7.1.2 using Encase v7.08.1, but am getting the error "Required Smartphone files are missing. Please reinstall". The iphone has iTunes installed and I...
View ArticleDigital Forensics Job Vacancies: urgent! e-Discovery Associate role £35-48K,...
This vacancy is with one of the UK's most sought after employers. Essential Skills • Good working knowledge of Perl, Python, JavaScript or similar languages useful for the manipulation of data • Good...
View ArticleMobile Phone Forensics: Missing smartphone files
Itunes needs to be installed on the computer you are running Encase from.
View ArticleForensic Software: Social media collections tool
Try the tools from Afentis, they're reasonably priced and easy to use. They offer tools for the major sites. Check here for FB: Afentis Facebook Tool Ben
View ArticleGeneral Discussion: Even more SetMace
Added support for shadow copy timestamp modification, among other things. Now, also being a PoC for showing how to modify data within a Shadow Copy.
View ArticleGeneral Discussion: i have been trying to get information from this below
Hello Dears! I really appreciate all your comments toward my recently placed post. However my goal is to gather evident about identity theft attack in my network. I was ask to get this evident using...
View ArticleGeneral Discussion: vulnerability Scan on website
forensic1zn wrote: We managed to trace it back to a specific computer. Computer was imaged, includeing RAM dump. Ram appears clear with no malware running in memory. How long between the observation...
View Article