Twitter for #DFIR Professionals
Jessica Hyde talks about using Twitter for digital forensics and incident response and shares why it can be useful for those in the field.
Jessica Hyde talks about using Twitter for digital forensics and incident response and shares why it can be useful for those in the field.
Looking for a lead? Where do I start? I’d think about the Rebuilt Desktop artifact in AXIOM. In this Tips & Tricks webinar, we will explore how to display an approximation of the users desktop in both Windows and Mac systems within AXIOM. This not only saves you time in having to virtualize the users system yourself but also gives a great place to start an investigation! Join Larry McClain of the Magnet Training Team for a discussion of this artifact and what it can mean for your investigations.
The processing and parsing of artifacts from Telegram, WeChat, KakaoTalk, and Line are all supported in AXIOM, so we’re taking a look at these chat applications, specifically for Android devices.
This session will discuss how Magnet AXIOM’s integration of core plugins from the popular tool, Volatility, makes deep memory analysis more accessible to forensic examiners.
Join us for a weeklong series of corporate presentations from industry experts with live Q&A from February 22-26, 2021 that will help keep you on the pulse of the latest trends in corporate digital forensics.
In this Tips & Tricks webinar, join us to discuss remote collection from endpoints on prem or over the Internet. In this session we’ll walk through Agent creation, deployment, and connection to acquire data from remote endpoints within your environment. We’ll also run AXIOM Cyber from the cloud and collect data from an off network remote endpoints over the Internet. The AXIOM Cyber agent provides immediate access to and the ability to acquire data from Windows and Mac endpoints (whether they are geographically distant or in the same room). Lynita Hinsch, Solutions Consultant, will discuss all encompassing aspects of the remote agent and best practices for remote collection.
We discuss how to make AXIOM Cyber’s remote acquisition agent persist even after an endpoint restart.
Introducing our newest member of the Training Team, Justin Almanza. Justin comes to us from a law enforcement and public education background. He loves being a Trainer because it is the perfect combination of his passions and experiences. Read on below! Want to learn more about what courses are offered? Visit our Training & Certification page for … Continued