Walkthrough: What’s New In XAMN v4.4
Hello and welcome to this video about what’s new in XAMN 4.4. I’m going to take you through ten new improvements, as you can see listed here in the latest release of the XAMN application. Let’s get...
View ArticleCost-Effective Tools For Small Mobile Forensic Labs
by Alex Moeller As the costs associated with running a mobile devices forensic laboratory can be considered to be high, this article is aimed at providing alternative options for small organisations or...
View ArticleHow To Export Media Files From BlackLight Into Semantics21
So before we go to export our files from BlackLight to S21, what we will normally do is we will run the hashes against our case. In this case what we’ve done is we’ve already run these hashes against...
View ArticleHow To Use AXIOM In Malware Investigations: Part I
Hey everyone, Tara Nelson here with Magnet Forensics. Today I’m going to give a little bit of insight into how AXIOM can help with some of your day-to-day investigations. In part one of the segment...
View ArticleWhat Changes Do We Need To See In eDiscovery? Part VI
by Harold Burt-Gerrans Welcome to Part 6, the last in this series. In case you’re joining late, the previous parts are available as follows: Standards Standards and De-Duplication Levels New Approach...
View ArticleHow To Boot Scan A Microsoft Surface Pro
Hi, I’m Rich Frawley, and I’m the Digital Forensic Specialist with ADF Solutions. Today we’re going to conduct a boot scan of a Microsoft Surface Pro with BitLocker activated. At this point you have...
View ArticleHow To Use AXIOM In Malware Investigations: Part II
Hey everyone, Tara Nelson here with Magnet Forensics. Today I’m going to give a little insight into how AXIOM can help with some of your day-to-day investigations. In this video we’re going to talk a...
View ArticleHow To Integrate LACE Carver With Griffeye Analyze DI Pro
Let’s talk about the exciting new LACE Carver integration with Analyze DI Pro. Once you have the proper license, you can head over to your Downloads page on MyGriffeye.com and go to the LACE Carver...
View ArticleHow To Save Time With XAMN’s Dynamic Artifact Count Feature
At MSAB, we’re always looking to improve our software and make every product more user-friendly, intuitive, and valuable; and to help save you time. We’ve recently improved the way that XAMN displays...
View ArticleThree Reasons Why Call Detail Records Analysis Is Not “Junk Science”
by Patrick Siewert, Principal Consultant, Pro Digital Forensic Consulting Since introducing our private sector clients to the impact that cellular call detail records (CDR) analysis & mapping can...
View ArticleHow To Use Griffeye Brain – Artificial Intelligence
The Griffeye Brain in Analyze DI Pro version 19.2 brings the power of machine learning and artificial intelligence to help you quickly locate and identify child sex abuse material within your...
View ArticleWalkthrough: XRY Photon Manual
XRY Photon is a solution designed for recovering smartphone app data that’s inaccessible through normal extraction techniques. Now the power of XRY Photon has been expanded to cover hundreds of...
View ArticleCan Your Investigation Interpret Emoji?
by Christa Miller, Forensic Focus Emoji are everywhere — including in your evidence. Used across private-messaging apps and email, social media, and even in passwords and account names, emoji are...
View ArticleHow To Use Magnet AXIOM In Mac USB Investigations
Hey everyone, Trey Amick from Magnet Forensics here. Today we’re talking about Mac USB investigations, and what happens when we’ve been alerted that a USB has been inserted into an end point....
View ArticleHow To Decrypt BitLocker Volumes With Passware
Decrypting BitLocker volumes or images is challenging due to the various encryption options offered by BitLocker that require different information for decryption. This article explains BitLocker...
View ArticleHunting For Attackers’ Tactics And Techniques With Prefetch Files
by Oleg Skulkin Windows Prefetch files were introduced in Windows XP, and since that time they have helped digital forensics analysts and incident responders to find evidence of execution. These files...
View ArticleHow To Transfer A Password Recovery Process To A Different Computer Using...
Did you know that Passware Kit can create a snapshot of a password recovery process at any time and resume it on a different computer? Running a password recovery attack, especially for multiple files...
View ArticleHow To Use The Griffeye Intelligence Database
Beginning with version 19, Griffeye Analyze DI Pro and Core will start using the new Griffeye Intelligence Database, or GID, to replace the legacy intelligence manager. In this video, we’re going to...
View ArticleHow To Conduct A Live Forensic Scan Of A Windows Computer
Learn how to conduct a Windows live scan with ADF Solutions Digital Evidence Investigator. Two USB ports are required to complete a scan, one for the Collection Key and one for the Authentication...
View ArticleWalkthrough: Quin-C Social Analyzer Widget From AccessData
Hello. This is Sven from the technical team here at AccessData. This video will feature the Social Analyzer widget. So let’s get started. Go to Quin-C and open the grid, just to see how many items we...
View Article