From iPhone to Access Point
Introduction A wireless Access Point (AP) is a device that allows wireless devices to connect to internet using Wi-Fi. With the remarkable increase in number of wireless devices the number of APs has...
View ArticleDoes Deviant Pornography Use Follow A Guttman-Like Progression?
by Kathryn C. Seigfried-Spellar (a), Marcus K. Rogers (b) (a) The University of Alabama, Tuscaloosa, AL 35487, USA (b) Purdue University, West Lafayette, IN 47907, USA Abstract This study investigated...
View ArticleCyber Security Challenge in Scotland
Towards the end of August, I was part of the team who were offered to help out and participate at an exciting event held at Glasgow Caledonian University. The event ran over five days with each day...
View ArticleStreamlining Digital Forensics through Google Glass Eyes
The world of digital forensics involves the use of a very diverse array of tools, some highly specialized and technical and others pretty simple, as we all know, and these tools are constantly evolving...
View ArticleForGe – Computer Forensic Test Image Generator
Introduction Creating test material for computer forensic teaching or tool testing purposes has been a known problem. I encountered the issue in my studies of Computer Forensics at the University of...
View ArticleForensic Software in Child Protection Cases
According to recently released statistics from ICAC, an agency whose aim is to make the internet safer for children, only 2% of reported child protection cases are investigated in the United States...
View ArticleAnalysis Of iOS Notes App
As part of my third year studying Digital Security,Forensics & Ethical Hacking at GCU, I took part in a group research project to study the artifacts created when using the notes app on an iPad...
View ArticleBitcoin Forensics – A Journey into the Dark Web
There has been a lot of buzz around Tor, Bitcoin, and the so-called “dark web” (or “deep web”) since the FBI shut down the underground website “Silk Road” on Oct 1st. As many of you already know, Tor...
View ArticleOS X Mavericks Metadata
Apple recently released the newest version of their desktop operating system, Mac OS X Mavericks. As a free update to all supported Apple desktops and laptops, a wide adoption rate was expected, and...
View ArticleBitcoin Forensics Part II: The Secret Web Strikes Back
In last week’s post, we talked about Bitcoin, Tor and some of the hidden websites only accessible via Tor, such as Silk Road, which was shut down by the FBI on October 1st. Well, just over a month...
View ArticleUnderstanding Rootkits: Using Memory Dump Analysis for Rootkit Detection
Dmitry Korolev, Yuri Gubanov, Oleg Afonin research@belkasoft.com © Belkasoft Research, 2013 Every rootkit employs a wide range of masquerading techniques to prevent its detection. Anti-virus and...
View ArticleWindows 8 File History Analysis
1. What is File History File History is a new backup service introduced in Windows 8. By default this feature is off and to turn it on, user has to select a backup location – either a network drive or...
View ArticleExtracting Evidence from Destroyed Skype Logs and Cleared SQLite Databases
Summary This article describes common approaches used for the recovery of cleared Skype histories and deleted chat logs, and discusses methods and techniques for recovering evidence from cleared and...
View ArticleMan In The Middle Attack: Forensics
Yes, that’s right! Mr. Upset did not post ‘I am hating my new job’ as it appears in Figure 2, instead he wrote ‘I am loving my new job’. Then how did it happen and who did it? This article aims at...
View ArticleWhatsApp – discovering timestamps of deleted messages
ABSTRACT: This is a procedure for discovering where are the timestamps and how to read them of the deleted messages into WhatsApp database. I did a little reverse engineering, using the hexadecimal...
View ArticleForensic analysis of the ESE database in Internet Explorer 10
———————————————————— Due to me not being able to reformat our thesis in a good way I strongly suggest you look at the whole paper in PDF format here:...
View ArticleOperation Endeavour: The Tip of the Iceberg?
In mid January 2014, reports began emerging of a cybersex ring that had recently been under investigation in the Philippines. Crime agencies across the UK, USA, Australia and the Philippines themselves...
View ArticleWebmail Forensics – Digging deeper into Browsers and Mobile Applications
Almost everyone who uses the Internet has a web-based email account. Many people have two or more, so the likelihood of a forensic investigator coming across a case involving webmail communication is...
View ArticleSafer Internet Day
Yesterday, the 11th of February 2014, was the eleventh annual ‘Safer Internet Day’, a time when the general public, and particularly those who care for children and other vulnerable people, can learn...
View ArticleSamsung Galaxy Android 4.3 Jelly Bean acquisition using Joint Test Action...
There have been some issues during data acquisitions with Samsung Galaxy having the Android 4.3, Jelly Bean as the operating system even if using the recommended steps for Logical File Dump, File...
View Article