General Discussion: i have been trying to get information from this below
Ok just to give you some thoughts where to find evidence: - school server with student records; make a memorydump and forensic image of the server - firewall and IDS, save your logfiles - where are...
View ArticleForensic Software: ThumbJPGSegment.data index parser for iPhoto cached thumbs
In order to improve performance, photos added to the iTunes library are also stored - in form of small thumbnails for quick caching - in the file named "ThumbJPGSegment.data" and maybe also in...
View ArticleMobile Phone Forensics: Missing smartphone files
Thank you very much Badgerau, I installed iTunes and it worked. Another issue is that the iphone has 15GB of memory but Encase only acquired 4.2GB. Do you know the reason for this? Thanks again.
View ArticleMobile Phone Forensics: manually deleted images
its like one you deleted the image it automatically zeroize the free space. has any one encountered some thing like this ?
View ArticleDigital Forensics Job Vacancies: Computer Forensics and eDiscovery Analysts -...
We are looking for a talented computing (science, forensics, or anything else computing) graduate to join an innovative e-Discovery and Computer Forensics practice at our Manchester Deansgate office of...
View ArticleDigital Forensics Job Vacancies: Digital Forensic Solutions Pre-Sales...
Do you work with Digital Forensic Technology or have a background of Digital Forensics with military or law enforcement agencies/ a pre-sales consultancy role in digital forensics? Do you like meeting...
View ArticleGeneral Discussion: MAC unlock techniques (hardware or software)
Having previously used Inception with good results, I'm now hitting the problem that on recent versions of OS X, locked machines disable DMA. Can anyone suggest methods for gaining access to a powered...
View ArticleDigital Forensics Job Vacancies: Consultant | Technology - ESI Processing -...
Consultant | Technology - ESI Processing - London ABOUT THE FIRM: FTI Consulting is a global business advisory firm dedicated to helping organisations protect and enhance enterprise value in an...
View ArticleMobile Phone Forensics: Missing smartphone files
Hi, You probably did a _logical_ extraction of the iPhone 4S. A physical extraction results in a size (of the extraction) that is close to the _memory capacity_ of the device. A logical extraction...
View ArticleMobile Phone Forensics: Oxygen/Passware bundle
Passwords for iTunes and Android backups and images are recovered using Dictionary, Brute-force and other attacks. Acceleration is possible with NVIDIA and AMD GPU cards, as well as distributed...
View ArticleGeneral Discussion: MS Outlook 2010 Anomaly
I ran across a particularly odd situation in the past couple of weeks and have been unable to find any similar instances on these forums or on the greater internet. Admittedly, that could be due to my...
View ArticleEducation and Training: I need solution to this
omajiman wrote: Meanwhile, i have studied the different kind of DDOS attacks and the security measures to avert this attacks/threat. Not bad for 5 days. You will need to ask to the good pcap/wireshark...
View ArticleForensic Software: [Tool] Autopsy 3.1 Released - Parallel Pipelines and Android
After some testing with Autopsy 3.1.0 I'm back on 3.0.10. I had some freezes, refresh problems in Views. E.g. after selecting Thumbnails in Images I can't see the content in Videos. But 3.1.0 ist fast,...
View ArticleGeneral Discussion: Win7 Time Changes
Cults14 wrote: There is no evidence of the datetime.cpl having been accessed so I'm wondering how one can explain these types of events? Or perhaps there is, in...
View ArticleForensic Software: [Tool] Autopsy 3.1 Released - Parallel Pipelines and Android
Did you adjust the number of pipelines by any chance? We suggest 2 less than the theoretical maximum for your hardware (this is the default). Otherwise, the UI can have difficulty accessing resources...
View ArticleGeneral Discussion: Stored Google search history (appdata)
research1 wrote: I'm looking at Google search history in roaming/appdata/Google/LocalSearchHistry. Without doing any testing myself, does anyone know in what order each searched keyword is stored in...
View ArticleGeneral Discussion: Unidentified crypto tool - TQ_cryptosys
Can you 1) Right click on the executable and have a look at the properties. Have a look at the "Details tab" for any meta data strings left by the developer and also have a any digital signatures. 2)...
View ArticleGeneral Discussion: Chrome extension
If you have access to the machine, netstat -ano will list all connections along with the PID. Find the one you are interested in and note the PID. Then open up chrome task manager, which will show you...
View ArticleGeneral Discussion: How to use USB drive on VM (Oracle) Backtrack 5 r3
anespa wrote: No sir , Please advise where I can intstall and How ? (sorry I am absolute newbee) Thanks, Anes You need to install the Extension Pack in Virtual Box if you want USB support in your VM....
View Article