Quantcast
Channel: Forensic Focus – Articles
Browsing all 350 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

From iPhone to Access Point

Introduction A wireless Access Point (AP) is a device that allows wireless devices to connect to internet using Wi-Fi. With the remarkable increase in number of wireless devices the number of APs has...

View Article


Image may be NSFW.
Clik here to view.

Does Deviant Pornography Use Follow A Guttman-Like Progression?

by Kathryn C. Seigfried-Spellar (a), Marcus K. Rogers (b) (a) The University of Alabama, Tuscaloosa, AL 35487, USA (b) Purdue University, West Lafayette, IN 47907, USA Abstract This study investigated...

View Article


Image may be NSFW.
Clik here to view.

Cyber Security Challenge in Scotland

Towards the end of August, I was part of the team who were offered to help out and participate at an exciting event held at Glasgow Caledonian University. The event ran over five days with each day...

View Article

Image may be NSFW.
Clik here to view.

Streamlining Digital Forensics through Google Glass Eyes

The world of digital forensics involves the use of a very diverse array of tools, some highly specialized and technical and others pretty simple, as we all know, and these tools are constantly evolving...

View Article

Image may be NSFW.
Clik here to view.

ForGe – Computer Forensic Test Image Generator

Introduction Creating test material for computer forensic teaching or tool testing purposes has been a known problem. I encountered the issue in my studies of Computer Forensics at the University of...

View Article


Image may be NSFW.
Clik here to view.

Forensic Software in Child Protection Cases

According to recently released statistics from ICAC, an agency whose aim is to make the internet safer for children, only 2% of reported child protection cases are investigated in the United States...

View Article

Image may be NSFW.
Clik here to view.

Analysis Of iOS Notes App

As part of my third year studying Digital Security,Forensics & Ethical Hacking at GCU, I took part in a group research project to study the artifacts created when using the notes app on an iPad...

View Article

Image may be NSFW.
Clik here to view.

Bitcoin Forensics – A Journey into the Dark Web

There has been a lot of buzz around Tor, Bitcoin, and the so-called “dark web” (or “deep web”) since the FBI shut down the underground website “Silk Road” on Oct 1st. As many of you already know, Tor...

View Article


Image may be NSFW.
Clik here to view.

OS X Mavericks Metadata

Apple recently released the newest version of their desktop operating system, Mac OS X Mavericks.  As a free update to all supported Apple desktops and laptops, a wide adoption rate was expected, and...

View Article


Image may be NSFW.
Clik here to view.

Bitcoin Forensics Part II: The Secret Web Strikes Back

In last week’s post, we talked about Bitcoin, Tor and some of the hidden websites only accessible via Tor, such as Silk Road, which was shut down by the FBI on October 1st. Well, just over a month...

View Article

Image may be NSFW.
Clik here to view.

Understanding Rootkits: Using Memory Dump Analysis for Rootkit Detection

Dmitry Korolev, Yuri Gubanov, Oleg Afonin research@belkasoft.com © Belkasoft Research, 2013 Every rootkit employs a wide range of masquerading techniques to prevent its detection. Anti-virus and...

View Article

Image may be NSFW.
Clik here to view.

Windows 8 File History Analysis

1. What is File History File History is a new backup service introduced in Windows 8. By default this feature is off and to turn it on, user has to select a backup location – either a network drive or...

View Article

Image may be NSFW.
Clik here to view.

Extracting Evidence from Destroyed Skype Logs and Cleared SQLite Databases

Summary This article describes common approaches used for the recovery of cleared Skype histories and deleted chat logs, and discusses methods and techniques for recovering evidence from cleared and...

View Article


Image may be NSFW.
Clik here to view.

Man In The Middle Attack: Forensics

Yes, that’s right! Mr. Upset did not post ‘I am hating my new job’ as it appears in Figure 2, instead he wrote ‘I am loving my new job’. Then how did it happen and who did it? This article aims at...

View Article

Image may be NSFW.
Clik here to view.

WhatsApp – discovering timestamps of deleted messages

ABSTRACT:  This is a procedure for discovering where are the timestamps and how to read them of the deleted messages into WhatsApp database. I did a little reverse engineering, using the hexadecimal...

View Article


Image may be NSFW.
Clik here to view.

Forensic analysis of the ESE database in Internet Explorer 10

———————————————————— Due to me not being able to reformat our thesis in a good way I strongly suggest you look at the whole paper in PDF format here:...

View Article

Image may be NSFW.
Clik here to view.

Operation Endeavour: The Tip of the Iceberg?

In mid January 2014, reports began emerging of a cybersex ring that had recently been under investigation in the Philippines. Crime agencies across the UK, USA, Australia and the Philippines themselves...

View Article


Image may be NSFW.
Clik here to view.

Webmail Forensics – Digging deeper into Browsers and Mobile Applications

Almost everyone who uses the Internet has a web-based email account. Many people have two or more, so the likelihood of a forensic investigator coming across a case involving webmail communication is...

View Article

Image may be NSFW.
Clik here to view.

Safer Internet Day

Yesterday, the 11th of February 2014, was the eleventh annual ‘Safer Internet Day’, a time when the general public, and particularly those who care for children and other vulnerable people, can learn...

View Article

Image may be NSFW.
Clik here to view.

Samsung Galaxy Android 4.3 Jelly Bean acquisition using Joint Test Action...

There have been some issues during data acquisitions with Samsung Galaxy having the Android 4.3, Jelly Bean as the operating system even if using the recommended steps for Logical File Dump, File...

View Article
Browsing all 350 articles
Browse latest View live