Demystifying Mac Investigations: Mac vs. Windows Artifacts Comparison
Forensic Examiners today are faced with supporting an ever-growing range of evidence and investigation types.
Forensic Examiners today are faced with supporting an ever-growing range of evidence and investigation types.
You can load custom keywords, regular expressions, or NCMEC report data in Magnet OUTRIDER.
So, you wanna do mac forensics, but your department won’t buy the mac forensics tools?
Looking for a lead? Where do I start? I’d think about the Rebuilt Desktop artifact in AXIOM. In this Tips & Tricks webinar, we will explore how to display an approximation of the users desktop in both Windows and Mac systems within AXIOM. This not only saves you time in having to virtualize the users system yourself but also gives a great place to start an investigation! Join Larry McClain of the Magnet Training Team for a discussion of this artifact and what it can mean for your investigations.
The built-in Workflow Checklist helps you combine all Griffeye tools and capabilities in a logical workflow to ensure a thorough analysis of a case. In this webinar, we will hands-on demonstrate how this feature can efficiently be utilized in a case.
Malicious documents in the form of email attachments have and continue to wreak havoc on individual users, the private business sector as well as local and federal government. According to Verizon’s 2018 Data Breach report, 32% of all data breaches derived from phishing attacks. Avanan email security reports that 1 in 25 branded emails is … Continued
Join us for a Tips & Tricks webinar hosted by Dallas Jordan where he’ll demonstrate how you can troubleshoot some potential roadblocks you may come across with Remote Acquire. We will show you how you can use AXIOM logs to help troubleshoot some issues that users have run into in the past when trying to deploy our agent for remote collections on both Windows and Macs including strategies to resolve any of these potential issues.
Android 디바이스에서 사용 가능한 애플리케이션이 수백만 개에 이르러 단순히 어떤 도구만으로는 모든 애플리케이션을 파싱하고 지원할 수 없게 되었습니다. 따라서 디바이스에 애플리케이션이 저장되는 방식과 중요한 데이터를 찾을 수 있는 위치를 이해하는 것이 매우 중요해졌습니다. Android 애플리케이션의 기본을 이해하고 대부분의 애플리케이션 데이터가 저장되는 SQLite 데이터베이스 파일에 대해 살펴보겠습니다. 동적 앱 찾기 및 내장 SQLite 뷰어와 같은 Magnet … Continued
Did you know that you can process memory images in Magnet AXIOM? In this Tips & Tricks session, learn how to bring in a memory image and select the proper profiles in AXIOM. See how to parse both memory specific artifacts and other artifacts like windows event logs and internet related artifacts. Join Tarah Melton, Forensic Consultant, as she shows you how to ingest memory into your cases alongside your other evidence to get the most out of your cases.
Why do we need to learn Linux Forensics? Well, nowadays when you look at the number of tools available on different penetration testing systems running Linux, you should stop and ask yourself a basic question “are these tools and systems always going to be used for ethical purposes?” The answer is definitely, NO! Another reason … Continued