Tips & Tricks // Customizing Magnet AXIOM for Your Investigations
When your case involves unsupported applications or custom file types, what do you do? You can actually create your own artifacts and add new file types to AXIOM!
When your case involves unsupported applications or custom file types, what do you do? You can actually create your own artifacts and add new file types to AXIOM!
With budgets stretched thin, every tool in your toolkit needs to help streamline the investigative workflow.
We’re very excited to share some of the great new features in Magnet REVIEW 4.0—helping digital forensic examiners bring their investigators and the evidence they need together by enabling secure agency-wide collaboration anytime and from anywhere! With the ever-increasing volumes and complexity of data involved in the typical digital investigation today, delivering a truly modernized … Continued
Today’s criminal investigations often rely on digital evidence residing on mobile devices. During investigations, it’s the mobile forensics investigator’s responsibility to extract and collect that digital evidence. There’s no one “right path” to becoming a mobile forensics investigator.
Investigators often have difficulty reviewing the data from warrant returns because of the various container formats and content provided. AXIOM can process warrant returns from several providers (e.g. Facebook, Google) and parse artifacts for examination, and in this session, Kim Bradley and Steve Gemperle will share some tips and tricks to get the most out of your warrant returns.
It’s hard enough for examiners to keep up with latest in digital evidence–and they see it day in and day out. What about your investigators? When they’re working a case, time (both theirs and yours) is of the essence, so whatever you can do to get them the evidence they need–quickly and easily–will help everyone in the end.
The June 2022 Magnet Forensics CTF was another exciting competition, and we’re happy to announce the winners!
To combat a Child Sexual Abuse Material (CSAM) case, an agency turned to Magnet GRAYKEY to process multiple smartphones. This case study details the events of their investigation and how GRAYKEY helped bring justice to the victims. Note: Due to the sensitivity of this case, and to respect the victims, this case study is anonymous.
When analyzing malware and exploits (or troubleshooting issues), you’ll find it in memory—even if it can’t be found on disk. Memory will give you a look at the exact state of a device at a specific time; this is why memory analysis, or memory forensics, is important to DFIR (Digital Forensics and Incident Response).
Insider threats, whether due to malicious action, inadvertent breaches, or negligence, put your company at risk of potentially significant financial and reputational consequences.