Mobile Phone Forensics: Starting Research Center for Mobile Phone Forensics
Thanks Dizi, I am now member of this group. Regards
View ArticleForensic Software: PRTK - Markov Characters
Basically it is a rule based methodology to guess the passwords. Very simplistic example would be a "l33t" speak translator that takes it beyond just character substitution, and uses word, concept and...
View ArticleGeneral Discussion: RAID hashes
jhup wrote: As Adam said, in my experience a RAID 1 is not byte-by-byte identical. It cannot be, specially if it is a hardware RAID, in my reconstructing experience. ... From the digital forensics...
View ArticleMobile Phone Forensics: Secure wipe and iphone forensics
One of my friends was talking to me today about an Iphone 4 they had worked on recently. They couldn't find any of the text messages they wanted to recover yet they had reason to believe the phone had...
View ArticleGeneral Discussion: Retreiving information from a paper print
Hello everyone. This is my first visit to this forum and it is a long shot, but it's the best place I could think of that maybe I could find an answer to my question. I have a friend that received a...
View ArticleGeneral Discussion: Retreiving information from a paper print
scooterlord wrote: I am positive I have seen a documentary in the past explaining how sensitive information can be retrieved from a paper print, like the printers make, model, serial number - I don't...
View ArticleForensic Software: Encase Imager--new and free product...
EnCase Forensic version 7.06 has been released EnCase Forensic Imager EnCase Forensic Imager is a new product that allows you to create EnCase evidence files or EnCase logical evidence files. It is...
View ArticleMobile Phone Forensics: Secure wipe and iphone forensics
I wasnt aware that the database purged it self thats really interesting... I believe they used access data's MPE+ to examine the phone but the case is still active so he cant tell me alot of details....
View ArticleForensic Software: Anti-virus recommendations for forensic workstations
Personally Viper or Avast Pro never had issues with either of these pieces of software always offer top notch services.
View ArticleClassifieds: Cellebrite UFED Touch Ultimate (Rugged Version) for Sale
Hi Bithead, Yup this is my first post, but it is me that is selling the unit, not a friend. The recession is taking a bite and I am trying to liquidate some assets. I am willing to bring this device to...
View ArticleGeneral Discussion: Source / Destination of Spyware
Hey guys, I have a hard drive containing keyloggers detected by Gargoyle Forensic Pro. Can somebody, if possible, give details on how to go about finding the source? Also, it is suspected that the logs...
View ArticleGeneral Discussion: Forensics on WhatsApp
The images that are sent and received using the APP "Whatsapp" have thier EXIF details stripped off. Is there a way where we can analyze the photos and know stuff like when it was taken and where and...
View ArticleGeneral Discussion: Retrieving the web pages containing links to a web site
liguoroa wrote: Dear All, I need to retrieve an exhaustive list of the web pages that contains a link to the site"www.yyyy.it" and the string xxxx. Actually I performed the google search "link:yyyy.it...
View ArticleGeneral Discussion: Source / Destination of Spyware
DigitalAgent wrote: I have a hard drive containing keyloggers detected by Gargoyle Forensic Pro. Can somebody, if possible, give details on how to go about finding the source? If by "source", you mean...
View ArticleClassifieds: Voom Hard Copy II for sale
Hard Copy II by Voom Technologies. Comes in a custom fitted, foam lined, Storm Case, iM2100. The case has some scrapes, but actually looks better than the photograph. Kit has the Hard Copy II unit, a...
View ArticleForensic Software: Private Browsing Forensic Analysis Project Help
Jad would be another person to speak to. He's the creator of ief by magnet forensics. Also, a question I wanted to research but haven't found time is to try determine the last time someone used private...
View ArticleMobile Phone Forensics: Oxygen Forensics
Yes, you can find traces if deleted data in Android devices: 1. Information on deleted SMS messages is stored in the mmssms.db file that can be found in the File Browser section and opened with SQLite...
View ArticleGeneral Discussion: recovering windows(email)password from external hard disk
In addition to Jaclaz answer, If you are the owner of facebook and yahoo you can easily retreive your passwords going through the normal process, being it sent to your alternative email, sms or...
View ArticleGeneral Discussion: Forensics on WhatsApp
CopyRight wrote: Thanks Folks.. Yeah we do have the device and there aren't any original photos on the device itself. EXIF details are stripped off for higher uploading speeds or protecting privacy,...
View Article