Tips & Tricks // Analyzing Linux Artifacts
You never know where your investigation may take you; and you need to be prepared to investigate evidence wherever it may be, including Linux.
You never know where your investigation may take you; and you need to be prepared to investigate evidence wherever it may be, including Linux.
The Magnet Training Team wants to give those of you that nominated us in the DFIR Degree Program or Training Class of the Year category in this year’s Forensic 4:cast awards, our most heartfelt gratitude.
Collecting data from Instagram via the Cloud directly in Magnet AXIOM and Magnet AXIOM Cyber can provide investigators with the most recent posts associated with a hashtag or user activity within public facing information. Acquiring data via the Cloud Module is particularly valuable because the information is collected immediately, whereas warrant returns, for example, provide … Continued
With Apple’s Safari application typically taking the #2 browser spot worldwide across both computer and mobile platforms, examiners need to understand the how’s and the whys of Safari’s operation on both macOS and iOS. Is the information missing from the device because the user took an action? Or because of a default system preference? What preferences were set, anyway? This talk will address how to find the latest Safari’s preference data for per-website controls, global application preferences, and even how to potentially track information from Safari’s Private Browsing.
Introducing our newest member of the Training Team, Simon Coles. Simon joins from a background in UK law enforcement. He loves being a Trainer and sharing his knowledge with those around him. Read on below! Want to learn more about what courses are offered? Visit our Training & Certification page for more information. MF: Tell us about … Continued
For the second year in a row, we had a great Magnet May with our jam-packed Magnet Virtual Summit. Catch up on some #MVS2021 highlights.
With AXIOM Cyber 5.1, you can acquire from as many data sources as possible including social media, email attachments, Chromebooks, and more.
CUPS often logs information into the system that can provide valuable data on what was printed, by who, and to what printer.