Mobile Phone Forensics: Illegally selling CDRs
These guys were selling access to 2 of the 3 telco networks in Australia. They used linkedin to target mainly private investigators. They could access 3 year old itemised billing statements, which...
View ArticleMobile Phone Forensics: recovery image quest
@gehlen: whatever, it's your call, I was one of the very few people who actually knows what you were asking for and also might be able to help you, but since you are such a smart ass, I won't spend my...
View ArticleMobile Phone Forensics: iPad and iPhone in 'Activate' mode after factory reset
If the case is important I doubt that a picture like that would be taken in consideration. Try the Apple service, you got nothing to loose and you could end up with an official paper from them stating...
View ArticleMobile Phone Forensics: recovery image quest
Even if it is true, I do not care about me. There are people who know there are important things in this world more than selfish.(see JaredDM) Dont make a shadow over me I Wouldnt want anything else......
View ArticleGeneral Discussion: Encrypted Mac image missing Recovery HDD and Un-mountable
Hello all I'm a digital forensics analyst and am experienced in mainly Windows platforms and mobile devices. Today I have a problem on a Mac image which I'm hoping to pick your brain on. Our firm...
View ArticleMobile Phone Forensics: Illegally selling CDRs
badgerau wrote: These guys were selling access to 2 of the 3 telco networks in Australia. They used linkedin to target mainly private investigators. They could access 3 year old itemised billing...
View ArticleMobile Phone Forensics: S7 Edge secure startup
Thank you for all your input and suggestions Im currently finishing the 8 digit pin dictionary as i type. Moving on to 9 digit dictionary soon. Oh the joys I'll keep you informed of my progress. OR The...
View ArticleMobile Phone Forensics: Whatsapp ChatSearchV3 sqlite database
I would suggest its the search function within WhatsApp. On Android if you open your conversation view, at the top is a Magnifying Glass (search function). Typing words in there brings up messages...
View ArticleMobile Phone Forensics: S7 Edge secure startup
shahartal wrote: No, this will never work on a Secure Startup phone (given it was properly identified as one). Secure Startup means it is actually encrypted with the user passcode, therefore there is...
View ArticleGeneral Discussion: OSX Recovery of Deleted User / Time Machine Backup
cs1337 wrote: We also have a time machine backup from the system we can attempt to restore but i'm not sure if this is just going to give us user generated files and not necessarily any type of...
View ArticleGeneral Discussion: Encrypted Mac image missing Recovery HDD and Un-mountable
My clues would be that you got a corrupt image or the problem is around FileVault2 and AFPS.
View ArticleMobile Phone Forensics: Whatsapp ChatSearchV3 sqlite database
I totally agree with you. The main stream software concentrates on the actual databases where for want of a better term the data sits re messaging. They do not look at all databases relating to an...
View ArticleGeneral Discussion: Encrypted Mac image missing Recovery HDD and Un-mountable
between axiom (fv2 hfs) and blacklight (fv apfs) you should be covered. But either way you need the password
View ArticleGeneral Discussion: Password-Protected Windows 10
JimC wrote: Thank you @Jaclaz for the helpful summary of the different methods. Methods (1) and (2) both provide a system-level command-prompt at the login screen. This can be used to reset an account...
View ArticleMobile Phone Forensics: Whatsapp ChatSearchV3 sqlite database
Hi Paul Fantastic. We've been scratching our collective brain cell to figure it out. Very much appreciated. Kind regards Paul
View ArticleMobile Phone Forensics: S7 Edge secure startup
You are free to take my words or not Yes, some cases can be decrypted offline, but *not* on phones where the encryption key is derived from a hardware key and the user passcode (= Secure Startup)....
View ArticleDigital Forensics Job Vacancies: Experienced Digital Forensicator in Atlanta...
The Lead Forensics Analyst is a leadership position that will focus on maturing and managing forensic processes, procedures, and workflows. The Lead Forensics Analyst will be in charge of introducing...
View ArticleGeneral Discussion: Zacinlo adware/malware
Here: https://labs.bitdefender.com/2018/06/six-years-and-counting-inside-the-complex-zacinlo-ad-fraud-operation/...
View ArticleGeneral Discussion: Interesting Supreme Court decision
CARPENTER v. UNITED STATES https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf Quote:: Accordingly, when the Government tracks the location of a cell phone it achieves near perfect...
View ArticleMobile Phone Forensics: iOS Bruteforce
It is not a joke, just the story doesn't reveal everything
View Article