General Discussion: Jonathan Zdziarski : Waterboard
Gotta love how this guy was part of the "community" and helped out with all kinds of things, and then got all LE happy to not help others except them.
View ArticleGeneral Discussion: IIS log analysis
kbleich wrote: ... and have numerous entries for Googlebot, such as the one shown below: 2013-06-07 22:28:06 ***.***.***.*** GET / yjd=152-Redacted-Redacted-Redacted 80 - 66.249.73.232...
View ArticleGeneral Discussion: Please recommend some famous forums about computer forensic
this is the best forum!
View ArticleGeneral Discussion: Network Question
Hi, Can you explain exactly what you are trying to do, and what software are you trying to license? I'm guessing that your xp machines are running FTK and NLS is running on the W7 machine. Do they need...
View ArticleForensic Software: Enscript bookmark folder class in V7 alternatives
It works. I'm off and running-Thanks Lance!
View ArticleGeneral Discussion: [ask] network mapping.
jtingkir wrote: Is there any method of doing a scan of all the network, all of the subnets. Not really. In any network, there could easily be firewalls or other network-separating devices that simply...
View ArticleWebinars: Internet Evidence Finder (IEF) Advanced Edition v6.1
asalgado wrote: Great webinar! I think the new functionality will be extremely useful. Will this version be able to parse out archived iChat files? I have been trying to find an application that will...
View ArticleDigital Forensics Job Vacancies: New Grad - New England Area - Looking for work
Hello everyone, I'm new here but I am a recent college grad with a CIS degree with a focus on Computer Forensics. I have been going around applying in the area with little luck (other than temp sales...
View ArticleGeneral Discussion: VHDx files
Has anyone been able to analyze the new VHDx images used by Windows 8/Server 2012 using a Windows 7 computer? EnCase, FTK, X-Ways cannot analyze it. Mount Image Pro cannot mount it. From what I've read...
View ArticleGeneral Discussion: [ask] network mapping.
Greetings, again, and sorry for the disappearence. @jtingkir: Actually, while making sure you have the cooperation of the "IT guy" (admin, network engineer etc.) SHOULD always be one of your primary...
View ArticleEmployment and Career Issues: New Grad - New England Area - Looking for work
Moved to correct forum.
View ArticleGeneral Discussion: VHDx files
PM_SQ wrote: From what I've read so far, I have 2 solutions: - Convert the VHDx image to VHD. - Using Windows 8 Disk Manager, mount the VHDx file (read-only) then image the content of the mounted VHDx...
View ArticleDigital Forensics Job Vacancies: COMPUTER FORENSIC CONTRACT, 12 months, South...
Our client, a global consultancy firm is seeking to hire a computer forensic specialist to work on a 12 month fixed term contract. You will work on a variety of investigations across the public and...
View ArticleForensic Software: Log2Timeline Europe
Hi, I have been trying to use log2timeline to extract out data from a forensic image. A number of the modules have issues with the DDMMYY format as the expect the MMDDYY format and complains about the...
View ArticleForensic Software: Recovering H.264 video files with Defraser 1.3.0 for free ?
Zul22 wrote: @Jaclaz: Sorry, I should have written "a formerly open source project". The authors of NFI Defraser do not describe their project as being open source ; it's just that I could find the...
View ArticleGeneral Discussion: Chrome history_index files - Any SQLite Viewer for fts3+icu?
Thank you very much for the response. At least they promise this specific support. I'll try that. But iam also happy with any open source software/libraries
View ArticleMobile Phone Forensics: Faraday bags
TuckerHST wrote: jaclaz wrote: Maybe not "only", but rather "also" Maybe. The reviewers didn't seem to be LE. I'm still curious. Well, it was only to point out how you don't really need to be a member...
View ArticleMobile Phone Forensics: .aud files wechat and whatsapp
Hi everybody! This is my first post. Few months ago with few other guys, I started writing open source tools to extract and analyse mobile forensics artefacts for the linux distribution DEFT. When...
View ArticleMobile Phone Forensics: Faraday bags
Mis-spelling/deforming people's names being the new frontier of fun? One could also add a nice picture and print the thingies as playcards .... NO, wait: http://en.wikipedia.org/wiki/Garbage_Pail_Kids...
View Article