Evidence Acquisition and Analysis from Live Exchange
A great amount of legal and forensics discussion is involved when there is an investigation procedure that involves the seizing of crucial evidence from Live Exchange server. Whenever there is such an...
View ArticleFT Cyber Security Summit Europe – London 22nd September
On the 22nd of September 2015, Forensic Focus will be attending the FT Cyber Security Summit in London. If there are any topics you’d specifically like us to cover, or any speakers you think we should...
View ArticleProject Spartan Forensics
by James Gratchoff & Guido Kroon, University of Amsterdam Project Spartan is the codename of the new Microsoft Edge browser and successor to its previous, Internet Explorer. This research paper...
View ArticleNAS Forensics Explained
by Oleg Afonin, Danil Nikolaev & Yuri Gubanov © Belkasoft Research 2015 Network Attached Storage (NAS) have a long track history of corporate deployments. Their scaled-down versions (ranging from...
View ArticleStandard Processes in Windows 10
by Robin Brocks On the 29th of June, Microsoft announced the release of Windows 10, so it is time to have a deeper look at this new Operating System from the perspective of an Incident Responder. To...
View ArticleBYOD Forensics – Bring Your Own Device Or Breach Your Own Data?
The concept of BYOD is not new; the oldest example would be carrying personal USB thumb drives to work. Since then technology has grown, and so has the BYOD trend. Statistics indicate that the medium...
View ArticleElectronic Voiceprints: The Crime Solving Power of Biometric Forensics
By Jared Stern Fingerprinting has been used for years to determine the individuality of a person. But, newer technology allows investigators to capture a person’s voice, a so-called “voiceprint.”...
View ArticleLinux Timestamps, Oh boy!
Timestamps are critical for analysts; they usually deal with different filesystems and understanding how the file timestamps work on each is crucial to what they do. If you do an online search for...
View ArticleCountering Anti-Forensic Efforts – Part 1
by Oleg Afonin, Danil Nikolaev & Yuri Gubanov © Belkasoft Research 2015 Computer forensic techniques allow investigators to collect evidence from various digital devices. Tools and techniques exist...
View ArticleWindows 8 Touch Keyboard Forensics
Microsoft released Windows 8 in 2012. With this new version, Microsoft made a fundamental shift in Windows 8 as compare to older versions of Windows. It does not only target netbooks, laptops and...
View ArticleCountering Anti-Forensic Efforts – Part 2
by Oleg Afonin, Danil Nikolaev, Yuri Gubanov © Belkasoft Research 2015 In the first part of this paper we talked about the most common – and also some of the simplest – ways suspects can try to cover...
View ArticleSADFE 2015 – Malaga 30th September – 2nd October
From the 30th of September until the 2nd of October 2015, Forensic Focus will be attending the 10th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE) in Malaga,...
View ArticleFT Cyber Security Summit 2015 – Recap
This article is a recap of some of the main highlights from the FT Cyber Security Summit, which took place in London on Tuesday the 22nd of September 2015. Conference Highlights The day began with a...
View ArticleMicrosoft Edge Browser Forensics – Exploring Project Spartan
Formerly known as Internet Explorer and then as Project Spartan, Microsoft Edge Browser has evolved a lot. From the User Interface to the technology it’s built upon, the browser has completely changed...
View ArticleSQLite Database Deleted Records Carving & Forensics
SQLite is a compact database engine highly integrated with embedded devices and locally used applications in various Operating Systems. Recent years have seen extensive usage of portable devices like...
View ArticleSADFE 2015 – Recap
This article is a recap of some of the main highlights from the Systematic Approaches to Digital Forensics Engineering conference, held in Malaga from the 30th of September to the 2nd of October 2015....
View ArticleInvestigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers...
Abstract The primary goal of this paper is to raise awareness regarding legal loopholes and enabling technologies, which facilitate acts of cyber crime. In perusing these avenues of inquiry, the author...
View ArticleThe Future of Mobile Forensics: November 2015 Follow-Up
by Oleg Afonin, Danil Nikolaev, Yuri Gubanov Mobile forensics is a moving target. In our recent article, “The Future of Mobile Forensics”, we described acquisition techniques that used to be...
View ArticleForensic Analysis Of Third Party Applications: Instagram
by Nor Zarina Binti Zainal Abidin Abstract Forensic analysis of mobile phones’ third party applications is a new area that needs to be explored. There are a lot of third party applications available in...
View ArticleVirtual Hard Disk Image Format – A Forensic Overview
by Anil Kumar Types of Virtual Hard Disk Image Format The hard disk of a VM is implemented as the files, which live on their native file systems of the host machine. MS Virtual PC & MS Virtual...
View Article