Software kernels: Unraveling digital forensics intricacies

In this article we will cover the basics of what a software kernel is, the application of software kernels in the context of digital forensic examinations, and we’ll shed some light on how kernels contribute to the acquisition and analysis of data during a forensic investigation.

Griffeye Joins Magnet Forensics

We’re excited to share the news that Magnet Forensics has acquired Griffeye!

Griffeye is recognized by law enforcement agencies worldwide for its powerful digital investigation suite, Griffeye Analyze, which has proven exceptionally helpful for investigators working on child exploitation cases.

How To Get the Most Out of Your Magnet GRAYKEY Extractions

GrayKey extractions are an amazing tool for digital investigators and examiners, since getting a full file system image is crucial. For years, most forensic examinations of iOS devices were limited to data only available in an iTunes backup and only if you had the user’s passcode—with Android acquisitions not being much easier.

SRUM: Forensic Analysis of Windows System Resource Utilization Monitor

SRUM, or System Resource Utilization Monitor, is a feature of modern Windows systems (Win8+), intended to track the application usage, network utilization and system energy state. SRUM, as with most operating system features, wasn’t designed for the forensicator, but that doesn’t mean we can’t use it to support our investigations.

Loading Cellebrite Images into Magnet AXIOM

Cellebrite images are quite popular, as the tool supports many different devices and extraction types. Because of this, you may get several different image types depending on the device and the type of extraction done. Often, I will get questions on how to load Cellebrite images into Magnet AXIOM and while it’s quite easy, it’s not always straightforward.