Strengthen Your Cases with Webpage Data in Magnet AXIOM 4.4
AXIOM 4.4 introduces support for results captured with the MAGNET Web Page Saver, the ability to choose the evidence summaries included in exports and more.
AXIOM 4.4 introduces support for results captured with the MAGNET Web Page Saver, the ability to choose the evidence summaries included in exports and more.
The goal of timestomping is to edit the timestamps being displayed and reported to the end user and incident responders in an attempt to make it seem as though the file doesn’t fall into the timeline of other detected malicious activity.
As investigators, part of our job includes providing an accurate account on the evidence recovered from the incident under investigation. Including details down to the look and feel of how a device is setup and how a user interacted with it goes a long way in providing the context needed for our casework. In the … Continued
Jessica Hyde shares some updates to Magnet Web Page Saver (WPS), our free stand-alone tool that allows you to save web pages.
Starting with AXIOM 4.4, you can bring your WPS results into AXIOM as a new source and have artifacts parsed from the results.
Hi! Jessica Hyde here to share with you about how to take URLs of interest from Magnet AXIOM for capture with MAGNET Web Page Saver (WPS). MAGNET Web Page Saver is a free stand-alone tool that allows you to navigate to web pages and save the results. You can learn more about MAGNET Web Page … Continued
Jessica Hyde shares a bit about creating Export Templates in Magnet AXIOM.
Several new great exporting features have been added to Magnet AXIOM to help you better control how your exports are generated, communicate important details on your findings, and customize your reports based on the needs of the case and your stakeholders.
When scanning evidence in Magnet AXIOM, most of the time the default artifact selection and options cover a wide range of case types. However there are times when applying additional options for a particular artifact could unlock a wealth of information otherwise thought unavailable. For example, knowing the user’s Windows password isn’t usually necessary to … Continued