Mobile Phone Forensics: S7 Edge secure startup
Well, you should look for a signed eng. boot which disables the PIN for your device and flash it. If CAS failed opening it, that is the next thing I'd do
View ArticleMobile Phone Forensics: Whatsapp Logfiles gone?
We were sometimes using the Whatsapp log files for investigations, I noted however that as version 2.18.61 these files are no longer present on IOS 11+ These log files used to be under...
View ArticleClassifieds: Tableau TK35es-R2 eSATA Forensic Bridge Kit
Includes four different host computer connection options - eSATA, FireWire 800, FireWire 400, and USB The eSATA host computer connection offers maximum data transfer speeds Compatible - SATA 1 or SATA...
View ArticleEducation and Training: Techno Security 2018 presentations
Does anybody know if there is a place where we could download the presentations / slides from the Techno Security conference ? Unfortunately, I could not attend this year, but I would still be...
View ArticleClassifieds: Xways dongle
I would like to buy dongle for Xways. If you have old one, dont need it or something else , feel free to send me information about version and price by PM. Thanks
View ArticleMobile Phone Forensics: Android Security Internals - Still Useful?
Definitely worth reading!
View ArticleDigital Forensics Job Vacancies: IT Security Officer at Coutts Private Bank,...
Post readvertised, closing date 17/7/18 See https://jobs.rbs.com/jobs/2528899-security-and-cyber-risk-analyst
View ArticleGeneral Discussion: OSX Recovery of Deleted User / Time Machine Backup
We currently have a raw image of an OSX Laptop running High Sierra. We are attempting to recover information of a previous user on the laptop. Unfortunately the user was deleted from the Apple control...
View ArticleDigital Forensics Job Vacancies: Security & Cyber Risk Analyst at Coutts...
This may be of interest to members of this forum who are looking for a role in IT security outside of the digital forensics/ediscovery field. Security & Cyber Risk Analyst in Bristol You'll be...
View ArticleGeneral Discussion: OSX Recovery of Deleted User / Time Machine Backup
UnallocatedClusters wrote: What forensic tools do you have at your disposal? we have Recon and we also have encase (most up to date ) Encase doesn't seem to work in opening the image even though it...
View ArticleGeneral Discussion: OSX Recovery of Deleted User / Time Machine Backup
I recommend acquiring a test license of BlackBag (please confirm that tool is APFS compliant). I own OSForensics, Forensic Explorer and Internet Evidence Finder which might be APFS compliant (I have...
View ArticleGeneral Discussion: OSX Recovery of Deleted User / Time Machine Backup
Thank you for the help. I will try what you mentioned.
View ArticleMobile Phone Forensics: recovery image quest
Hi All; i need Huawei P Smart FIG-LX1 8.0.0.139 (C432) recovery image for bootloader bypass recovery method. Thanks in advance.
View ArticleMobile Phone Forensics: iPad and iPhone in 'Activate' mode after factory reset
Curious if anyone has a method for downloading iPhones or iPads when they are in the 'activate' stage after a factory reset (showing the hello screen and you have to choose language, location etc)...
View ArticleMobile Phone Forensics: PoC Exploit Samsung Android Phones
Thomass30 wrote: I got Samsung Samsung Galaxy J7 2016 (J710FN) with broken screen. The phone is working but I cant see anything. I use this MTPwn exploit and it worked. It listed me phone's files and...
View ArticleMobile Phone Forensics: Illegally selling CDRs
Interesting twist in this case. CDRs (call detail records) illegally sold not by a staff member in a network operator or a service agent, but via police officers........
View ArticleGeneral Discussion: Validation and decision making
Hi, I think the latest one looks very good. I wouldn't have been able to start with a blank page and capture all that information in a flow chart in the first place. Capturing decision making in a flow...
View ArticleGeneral Discussion: appropriate term for abuse material
Hi, I worked on child protection cases for about 12 years. Senior police officers in the UK made it clear the preferred term for us to use was always 'child abuse images', 'child abuse material' or...
View ArticleMobile Phone Forensics: PoC Exploit Samsung Android Phones
shahartal wrote: Well, many people doubted when we (Cellebrite) said we could unlock iPhones with iOS 9, and then 10, and then 11... <img src="images/smiles/icon_wink.gif" alt="Wink" title="Wink"...
View ArticleMobile Phone Forensics: iPad and iPhone in 'Activate' mode after factory reset
When factory reset happens, the previously used encryption keys are also deleted, so it it pretty impossible to gather useful (decrypted) data from the chip. There are theories about the wear levels...
View Article