Tag Archive

HowTo

[How to] GPG and Signing Data

1 minute read

GNU Privacy Guard (GPG) uses public and private keys to secure communications (public-key cryptography). Many people use it to encrypt their email or other d...

[How To] Forensic Acquisition in Linux - DCFLDD

less than 1 minute read

This video shows how to use DCFLDD to acquire a disk image from a suspect device in the Linux command line. DCFLDD is an expanded version of ‘dd’ that suppor...

[How-To] Installing thc Hydra in Ubuntu

1 minute read

The steps below are how to easily install thc Hydra in Ubuntu with the majority of required libraries for common tasks. Hydra is a pretty well-known remote a...

[How To] Installing LIBEWF in Ubuntu Trusty

less than 1 minute read

Installing LIBEWF is normally straightforward. Usually the most difficult part is remembering which packages are required for the dependencies. When running ...

[How To] Easy Install TexStudio on Ubuntu

less than 1 minute read

I mess around with the internals of my operating systems a lot. This means that every few months I need to re-install my operating system, which, lately, is ...

Installing Cinnamon 2.0 on Linux Mint 14

1 minute read

With only a few weeks (hopefully) until Linux Mint 16 is released, I have been installing different software that I may want to start using. With all my data...

Using XARGS to speed up batch processing

1 minute read

[Edit 24/7/2013] Be careful when using xargs to spawn multiple processes that write to the same file. I’ve been using it with md5sum and pipin...

[How to] Install pHash on Ubuntu

less than 1 minute read

pHash is an open source software library released under the GPLv3 license that implements several perceptual hashing algorithms, and provides a C-like API to...

Another SDHASH Test with Picture Files

less than 1 minute read

After the last SDHASH test showed that fuzzy hashing on multiple sizes of the same picture files did not appear to work well. I decided to try...

Installing Log2Timeline on Ubuntu 12.04

less than 1 minute read

The maintainers of log2timeline have yet to set up a repository for Ubuntu Precise (12.04). Here are the required packages needed to get most of the function...

ZFS and NFS for Forensic Storage Servers

3 minute read

We’ve been looking at different storage solutions to act as storage servers for forensic images, and some extracted data. Essentially we have a server with e...

Installing OCFA 2.3.X with FIVES

2 minute read

In this single we will be installing OCFA 2.3.0 rc4 on Debian Squeeze (6)I will be following the documentation from: http://sourceforge.net/apps/trac/ocfa/wi...

Building FIVES Porndetect Image and Video

1 minute read

Installation of FIVES Porndetect was relatively painless on Debian Squeeze (Lenny is a bit of a pain).First get the F_PORNDETECT.doc from the FIVES portal. T...

Converting Parallels Disks to Raw on OS X

1 minute read

Update: See the forensic focus article: http://articles.forensicfocus.com/2012/07/05/parallels-hard-drive-image-converting-for-analysis/Update: I have had pr...

Video Preview from Command Line with ffmpeg

less than 1 minute read

Earlier I singleed about creating an animated preview gif from a given video. When using that method with a file list, ffmpeg would treat the file name as a ...

CarvFS on Mac OSx

1 minute read

A while ago I briefly used CarvFS on a linux system for testing. It was nice. Zero-storage carving can come in handy, especially when you are dealing with li...

SIMILE Timeplot graphing hours minutes seconds

less than 1 minute read

All of the examples for SIMILE Timeplot are in YYYY/MM/DD format. I was wanting to plot data down to the minute/second. Looking around I found that the date ...

RE: Read-Only Loopback to Physical Disk

2 minute read

A reader sent a very informative email in reply to this single about Read-Only Loopback Devices.http://www.denisfrati.it/pdf/Linux_for_computer_forensic_inve...

How to detect when OCFA is done processing

1 minute read

As emailed to be by Jochen:I think it is possible to detect completion of the process, even if it is not that simple, due to the distributed nature of OCFA. ...

REAPER SVN Access

less than 1 minute read

Instructions for using SVN to get the newest version of the REAPER Project:These instructions are for SVN from a Linux command line, and specifically Debian....

Read-Only Loopback to Physical Disk

1 minute read

I have been testing file carving to try to preview the contents of a drive before imaging. File carving takes a long, long time. A faster solution (I think) ...

PostgreSql Problems on Debian

less than 1 minute read

In Debian 5 when installing PostgreSQL - if /var/singlegresql/8.3/main is not created, and the conf files are not available - use the following command:pg_cr...

Even more Random links: psql

less than 1 minute read

PSQL on Machttp://www.entropy.ch/software/macosx/singlegresql/Enable psql remote access over tcp/iphttp://www.cyberciti.biz/tips/singlegres-allow-remote-acce...

Creating and Modifying a User in PSQL

less than 1 minute read

When installing OcfaArch on Debain 5, the installer failed to create the ‘ocfa’ user in singlegresql (psql). The error I get is “Warning: no local database f...

OCFA Installation - Creating the Hash Sets

1 minute read

Maybe I am just a novice, but I had a hard time figuring out the inputs for the creation of the hash database for the OCFA digest module. This step can be fo...

pt.2 OCFA Installation - Prep and Building

6 minute read

Now that we have a working Debian install, we can get it ready for OCFA.Again this is s supplement to the ‘HOWTO-INSTALL-debian-etch.txt’ foun...

pt.1 OCFA Installation - Introduction/OS

3 minute read

The installation document for the Open Computer Forensic Architecture was mostly accurate. However, I ran into some issues. Posts labeled OCFAInstall are sup...

Back to top ↑

dfir

Getting started in Digital Forensics

5 minute read

A lot of people have asked how to get started with digital forensics. It’s great that so many people from so many different places are interested. There are ...

Changing Domain to DFIR.Science

less than 1 minute read

CybercrimeTech started as a dfir notes blog during my Masters at University College Dublin. I wasn’t sure what it would turn into, and thought the name was g...

Password Cracking Test Data

less than 1 minute read

Here are some files to test your password cracking skills. All of them can be done in less than a few hours with CPU-based cracking. You can download the fil...

Using Autopsy 4 to export file metadata

less than 1 minute read

Autopsy 4 is a very powerful digital forensic investigation tool. Today, we are going to extract file and meta-data from a disk image (mobile phone) to use i...

Imaging Android with ADB, Root, Netcat and DD

3 minute read

Today we are going to acquire an android smartphone (Samsung Note II) using Android Debug Bridge (ADB), netcat and dd. The system I am using is Ubuntu linux....

Warning to Forensic Investigators: USB KILLER

less than 1 minute read

This single is informational for digital forensic investigators and first responders. Be aware of the ‘USB Killer’. Very basically, it’s a USB device that co...

사물인터넷(IoT) 디지털 수사 관련 전액장학금 지원 석/박사 직위 공모

less than 1 minute read

한림대학교 국제학부의 정보법과학전공에서는 현재 석사, 박사, 그리고 박사후과정생을 대상으로 정규직 연구원을 모집하고 있습니다. 해당 직위는 사물인터넷(IoT) 디지털 포렌식 수사에 관련된 연구를 담당하므로, 다음과 같은 자격을 요합니다. <ul><li>프로그래...

[How To] Forensic Acquisition in Linux - DCFLDD

less than 1 minute read

This video shows how to use DCFLDD to acquire a disk image from a suspect device in the Linux command line. DCFLDD is an expanded version of ‘dd’ that suppor...

[CFP] CLOUDFOR extended submission deadline

2 minute read

<pre wrap=”>CLOUDFOR 2016: Workshop on Cloud ForensicsIn conjunction with the 9th IEEE/ACM International Conference on Utility and Cloud Computing (UCC...

No Starch Press Hacking and Security books deal

less than 1 minute read

Humble Bundle and No Starch Press are offering a charity deal on hacking and security books. For 15$ or more you can get 13 books! Check out the deal here: h...

ICDF2C Revised Draft Program Released

less than 1 minute read

7th International Conference on Digital Forensics and Cyber Crime (ICDF2C) updated program is now available here: http://bit.ly/1LsJpvM<div class="separat...

Child Exploitation Forensic Tool: NuDetective

2 minute read

I met some Brazilian Law Enforcement at the 2014 World Forensic Festival. They were talking about Child Online Exploitation in Brazil, and a tool they develo...

[CFP] ICDF2C 2015

4 minute read

Call for papers for the 7th International Conference on Digital Forensics and Cyber Crime (ICDF2C) Conferece Dates: October 6 - 8, 2015 Location: Seoul, Sou...

[How To] Installing LIBEWF in Ubuntu Trusty

less than 1 minute read

Installing LIBEWF is normally straightforward. Usually the most difficult part is remembering which packages are required for the dependencies. When running ...

Indicators of Anti-Forensics

1 minute read

Project: Indicators of Anti-Forensics (IoAF)Purpose: Digital forensic triage for anti-forensic activitiesStatus: ActiveLicense: GNU GPLv3Developer(s): KITRI’...

Convert EnCase hash sets to md5sum

1 minute read

I managed to get a hold of a list of known-bad hashes to use in an experiment. The hashes, however, were in EnCase “.hash” format.<div></div><...

Back to top ↑

Digital Forensics

Warning to Forensic Investigators: USB KILLER

less than 1 minute read

This single is informational for digital forensic investigators and first responders. Be aware of the ‘USB Killer’. Very basically, it’s a USB device that co...

[How To] Forensic Acquisition in Linux - DCFLDD

less than 1 minute read

This video shows how to use DCFLDD to acquire a disk image from a suspect device in the Linux command line. DCFLDD is an expanded version of ‘dd’ that suppor...

Open Source Tools Accepted in Court

1 minute read

Reply to an email I received:<div class="separator" style="clear: both; text-align: center;"></div><div><div><div><div>Is...

Finding private IP addresses in Email Headers

1 minute read

In some cases it may be necessary or helpful to find the private IP of a suspect. This can be difficult, especially since NAT is common in most networks. How...

Child Exploitation Forensic Tool: NuDetective

2 minute read

I met some Brazilian Law Enforcement at the 2014 World Forensic Festival. They were talking about Child Online Exploitation in Brazil, and a tool they develo...

[CFP] ICDF2C 2015

4 minute read

Call for papers for the 7th International Conference on Digital Forensics and Cyber Crime (ICDF2C) Conferece Dates: October 6 - 8, 2015 Location: Seoul, Sou...

[How To] Installing LIBEWF in Ubuntu Trusty

less than 1 minute read

Installing LIBEWF is normally straightforward. Usually the most difficult part is remembering which packages are required for the dependencies. When running ...

Indicators of Anti-Forensics

1 minute read

Project: Indicators of Anti-Forensics (IoAF)Purpose: Digital forensic triage for anti-forensic activitiesStatus: ActiveLicense: GNU GPLv3Developer(s): KITRI’...

Convert EnCase hash sets to md5sum

1 minute read

I managed to get a hold of a list of known-bad hashes to use in an experiment. The hashes, however, were in EnCase “.hash” format.<div></div><...

Back to top ↑

infosec

Getting started in Digital Forensics

5 minute read

A lot of people have asked how to get started with digital forensics. It’s great that so many people from so many different places are interested. There are ...

Password Cracking Test Data

less than 1 minute read

Here are some files to test your password cracking skills. All of them can be done in less than a few hours with CPU-based cracking. You can download the fil...

Horrible messaging is bad for national security

5 minute read

For over a year, anyone with a mobile phone in Korea has had to put up with spam text messages from Korea’s Ministry of Public Safety and Security (국민안전처). I...

Using Autopsy 4 to export file metadata

less than 1 minute read

Autopsy 4 is a very powerful digital forensic investigation tool. Today, we are going to extract file and meta-data from a disk image (mobile phone) to use i...

Imaging Android with ADB, Root, Netcat and DD

3 minute read

Today we are going to acquire an android smartphone (Samsung Note II) using Android Debug Bridge (ADB), netcat and dd. The system I am using is Ubuntu linux....

Back to top ↑

Discussion

[How to] GPG and Signing Data

1 minute read

GNU Privacy Guard (GPG) uses public and private keys to secure communications (public-key cryptography). Many people use it to encrypt their email or other d...

Warning to Forensic Investigators: USB KILLER

less than 1 minute read

This single is informational for digital forensic investigators and first responders. Be aware of the ‘USB Killer’. Very basically, it’s a USB device that co...

Open Source Tools Accepted in Court

1 minute read

Reply to an email I received:<div class="separator" style="clear: both; text-align: center;"></div><div><div><div><div>Is...

Ashley Madison Data and Ethical Use

3 minute read

On August 19th, the Impact Team released data of millions of alleged Ashley Madison users. Ashley Madison is a type of social networking website that promote...

What is your password?

less than 1 minute read

Jimmy Kimmel, a U.S. talk show host, commented on U.S. cyber security after the 2014 Sony attacks. To humorously demonstrate the problem, they employed a bit...

Cybersecurity and Challenges to Democracy

3 minute read

South Korea’s democracy can only be described as… developing. In the late 1970s, after the assassination of Military Dictator Park Chung-hee (who Koreans oft...

What is Cybersecurity?

1 minute read

Last week, a number of Korean organizations fell victim to cyber attacks. This has prompted discussions about cybersecurity in Korea, and while following ...

Social Media and Intelligence Gathering

6 minute read

As seen on DigitalFIREOnline social media has changed the way many people, businesses and even governments interact with each other. Because of Twitter’s pop...

Future Crimes Ted Talk

less than 1 minute read

[Update] See Bruce Schneier’s responseOur friends at FutureCrimes.com recently had a good Ted talk about technology, crime and a potential way to fight crime...

Predictive Policing and Online Crime

1 minute read

FutureCrimes.com just passed on the single Sci-fi policing: predicting crime before it occurs. Crime modeling used by the LAPD appears to have contributed t...

Back to top ↑

Research

사물인터넷(IoT) 디지털 수사 관련 전액장학금 지원 석/박사 직위 공모

less than 1 minute read

한림대학교 국제학부의 정보법과학전공에서는 현재 석사, 박사, 그리고 박사후과정생을 대상으로 정규직 연구원을 모집하고 있습니다. 해당 직위는 사물인터넷(IoT) 디지털 포렌식 수사에 관련된 연구를 담당하므로, 다음과 같은 자격을 요합니다. <ul><li>프로그래...

No Starch Press Hacking and Security books deal

less than 1 minute read

Humble Bundle and No Starch Press are offering a charity deal on hacking and security books. For 15$ or more you can get 13 books! Check out the deal here: h...

Finding private IP addresses in Email Headers

1 minute read

In some cases it may be necessary or helpful to find the private IP of a suspect. This can be difficult, especially since NAT is common in most networks. How...

Ashley Madison Data and Ethical Use

3 minute read

On August 19th, the Impact Team released data of millions of alleged Ashley Madison users. Ashley Madison is a type of social networking website that promote...

Survey About Crime Investigation Priority

less than 1 minute read

<div class="MsoNormal">This Crime Investigation Priority survey is being conducted by a researcher at University College Dublin. The purpose is to dire...

Back to top ↑

Infosec

[How to] GPG and Signing Data

1 minute read

GNU Privacy Guard (GPG) uses public and private keys to secure communications (public-key cryptography). Many people use it to encrypt their email or other d...

사물인터넷(IoT) 디지털 수사 관련 전액장학금 지원 석/박사 직위 공모

less than 1 minute read

한림대학교 국제학부의 정보법과학전공에서는 현재 석사, 박사, 그리고 박사후과정생을 대상으로 정규직 연구원을 모집하고 있습니다. 해당 직위는 사물인터넷(IoT) 디지털 포렌식 수사에 관련된 연구를 담당하므로, 다음과 같은 자격을 요합니다. <ul><li>프로그래...

[CFP] CLOUDFOR extended submission deadline

2 minute read

<pre wrap=”>CLOUDFOR 2016: Workshop on Cloud ForensicsIn conjunction with the 9th IEEE/ACM International Conference on Utility and Cloud Computing (UCC...

Facebook Capture the Flag Platform Now Available

less than 1 minute read

Facebook’s hacking education platform and capture the flag is now available. See their release single here. Their goal is to educate about different types of...

Honeypot Fun

1 minute read

At the Legal Informatics and Forensic Science Institute, we are preparing to do some research on IoT smart homes. Part of that is setting up a slightly-less-...

No Starch Press Hacking and Security books deal

less than 1 minute read

Humble Bundle and No Starch Press are offering a charity deal on hacking and security books. For 15$ or more you can get 13 books! Check out the deal here: h...

ICDF2C Revised Draft Program Released

less than 1 minute read

7th International Conference on Digital Forensics and Cyber Crime (ICDF2C) updated program is now available here: http://bit.ly/1LsJpvM<div class="separat...

Ashley Madison Data and Ethical Use

3 minute read

On August 19th, the Impact Team released data of millions of alleged Ashley Madison users. Ashley Madison is a type of social networking website that promote...

Back to top ↑

Conferences 2012

InfoSecurity Russia 2012

less than 1 minute read

Last week, Pavel and I gave an invited talk at InfoSecurity Russia 2012. From Digital FIRE:<blockquote class="tr_bq">Our talk explored the issues of di...

LawTech Europe Congress 2012

less than 1 minute read

LawTech Europe Congress 201212 November, 2012Prague, Czech Republic“Over the past few years there have been huge advances in Electronic Evidence support and ...

CFP: IRISSCERT Cyber Crime Conference

less than 1 minute read

The IRISSCERT Cyber Crime Conference will be held November 22, 2012 in Dublin, Ireland. More information can be found here.They are currently running a call ...

ICTTF - Cyber Threat Summit 2012

less than 1 minute read

The ICTTF Cyber Threat Summit will be held in Dublin on September 20-21, 2012. Have a look at this years agenda. You can get a 10% registratio...

ICDF2C 2012

less than 1 minute read

The 4th International Conference on Digital Forensics and Cyber Crime (ICDF2C), hosted at Purdue University, will be held from October 24-26, 2012.Website: h...

DFRWS 2009 - Montreal

less than 1 minute read

Our group in the Centre for Cybercrime Investigation gave a presentation at the Digital Forensic Workshop 2009. The submitted paper can be found here. Also a...

Back to top ↑

CFP 2015

[CFP] DFRWS EU 2016

3 minute read

The DFRWS EU 2016 conference will be held in Lausanne, Switzerland from March 30th to April 1st, 2016.<div class="separator" style="clear: both; text-alig...

[CFP] ICDF2C Submission Deadline Extended

less than 1 minute read

Hello everyone! The ICDF2C Call for Papers has been extended to April 13, 2015. Hurry an submit! See you in Seoul!http://d-forensics.org/2015/show/cf-papers

[CFP] ICDF2C Submissions Due 30 March

less than 1 minute read

Just a reminder that submissions for ICDF2C are due on the 30th of March, 2015 (next week).<div class="separator" style="clear: both; text-align: center;"...

[CFP] SADFE-2015

6 minute read

Call for Papers SADFE-2015Tenth International Conference on Systematic Approaches to Digital Forensics Engineering September 30 – October 2, 2015, Malaga, S...

2015 デジタル・フォレンジックとサイバー犯罪に係る国際会議・韓国デジタル・フォレンジック学会年次大会 論文募集

less than 1 minute read

2015 デジタル・フォレンジックとサイバー犯罪に係る国際会議・韓国デジタル・フォレンジック学会年次大会 論文募集 Please note: all submissions and presentations must be in English. デジタル・フォレンジックとサイバー犯罪に係る国際会議(The I...

ICDF2C, KDFS 2015 论文征文公告

less than 1 minute read

ICDF2C, KDFS 2015 论文征文公告 Please note: all submissions and presentations must be in English. 国际数字取证、网络犯罪会议(ICDF2C)是旨在促进数字取证及网络犯罪侦查的发展,推动全世界的优秀研究人员、实务人员、教...

[CFP] DFRWS US 2015

1 minute read

Just a quick reminder that the DFRWS US 2015 is coming up soon!From DFRWS.org:DFRWS 2015 will be held on  August 9-13, 2015 at the Hyatt Regency Philadelphia...

[CFP] ICDF2C 2015

4 minute read

Call for papers for the 7th International Conference on Digital Forensics and Cyber Crime (ICDF2C) Conferece Dates: October 6 - 8, 2015 Location: Seoul, Sou...

DFRWS 2015 EU - Call for Forensic Challenge

1 minute read

Digital Forensic Research Workshop 2015 EU is currently calling for Forensic Challenge proposals.See the CFCDeadline: January 31st, 2015The DFRWS Conference ...

Back to top ↑

Conferences 2015

[CFP] ICDF2C Submission Deadline Extended

less than 1 minute read

Hello everyone! The ICDF2C Call for Papers has been extended to April 13, 2015. Hurry an submit! See you in Seoul!http://d-forensics.org/2015/show/cf-papers

[CFP] ICDF2C Submissions Due 30 March

less than 1 minute read

Just a reminder that submissions for ICDF2C are due on the 30th of March, 2015 (next week).<div class="separator" style="clear: both; text-align: center;"...

[CFP] SADFE-2015

6 minute read

Call for Papers SADFE-2015Tenth International Conference on Systematic Approaches to Digital Forensics Engineering September 30 – October 2, 2015, Malaga, S...

2015 デジタル・フォレンジックとサイバー犯罪に係る国際会議・韓国デジタル・フォレンジック学会年次大会 論文募集

less than 1 minute read

2015 デジタル・フォレンジックとサイバー犯罪に係る国際会議・韓国デジタル・フォレンジック学会年次大会 論文募集 Please note: all submissions and presentations must be in English. デジタル・フォレンジックとサイバー犯罪に係る国際会議(The I...

ICDF2C, KDFS 2015 论文征文公告

less than 1 minute read

ICDF2C, KDFS 2015 论文征文公告 Please note: all submissions and presentations must be in English. 国际数字取证、网络犯罪会议(ICDF2C)是旨在促进数字取证及网络犯罪侦查的发展,推动全世界的优秀研究人员、实务人员、教...

[CFP] DFRWS US 2015

1 minute read

Just a quick reminder that the DFRWS US 2015 is coming up soon!From DFRWS.org:DFRWS 2015 will be held on  August 9-13, 2015 at the Hyatt Regency Philadelphia...

[CFP] ICDF2C 2015

4 minute read

Call for papers for the 7th International Conference on Digital Forensics and Cyber Crime (ICDF2C) Conferece Dates: October 6 - 8, 2015 Location: Seoul, Sou...

DFRWS 2015 EU - Call for Forensic Challenge

1 minute read

Digital Forensic Research Workshop 2015 EU is currently calling for Forensic Challenge proposals.See the CFCDeadline: January 31st, 2015The DFRWS Conference ...

Back to top ↑

Education

Getting started in Digital Forensics

5 minute read

A lot of people have asked how to get started with digital forensics. It’s great that so many people from so many different places are interested. There are ...

Facebook Capture the Flag Platform Now Available

less than 1 minute read

Facebook’s hacking education platform and capture the flag is now available. See their release single here. Their goal is to educate about different types of...

Cybersecurity Tips for Business Travelers

2 minute read

I recently received an email from someone claiming to be from CNN, wanting to do a segment on cyber security for business travelers. They asked for some bul...

Online Child Exploitation Awareness Project

1 minute read

With the KITRI Best of the Best Information security program, we have been developing tools for Law Enforcement to use in the automatic detection of Child E...

What is Cybersecurity?

1 minute read

Last week, a number of Korean organizations fell victim to cyber attacks. This has prompted discussions about cybersecurity in Korea, and while following ...

Digital Forensics Summer School

less than 1 minute read

The UCD Centre for Cybersecurity and Cybercrime Investigation will be hosting a Digital Forensic Summer School for two weeks at the end of August 2012. ...

Back to top ↑

Conferences 2013

[CFP] ICDF2C 2013 Note of Change of Date

less than 1 minute read

Please note, the dates for the ICDF2C 2013 have slightly changed.Fifth International Conference on Digital Forensics and Cyber Crime - ICDF2C 201325-27 Septe...

Conference: SANS DFIR Summit 2013

1 minute read

SANS DFIR Summit 2013 - Call For Speakers - Now Open<div class="summary" style="border: 0px; font-family: Arial, Helvetica, 'Nimbus Sans L', sans-serif; f...

Back to top ↑

REAPERPreview

REAPER Preview

less than 1 minute read

Project: Rapid Evidence Acquisition Project for Event Reconstruction (REAPER) Preview<div class="p1">Purpose: A forensic boot CD that quickly and autom...

Debian Live X Only

less than 1 minute read

Looking for a lighter way to run REAPER Preview, we are looking into an X only kiosk-type implementation, al la:http://jadoba.net/kiosks/firefox/Also looking...

Profile Based Digital Forensic Preview

2 minute read

The newest build of REAPER Preview (officially Alpha 2) includes quite a few changes, but one that I am especially excited about is Profile Based Preivew. Fi...

REAPER Preview Alpha 2 changelog

less than 1 minute read

Gearing up for the official Alpha 2 release of REAPER Preview here is the change log and feature list:Back-end:<ul><li>REAPER Preview no longer l...

REAPER Preview POC Mentioned

less than 1 minute read

The REAPER Preview Proof of Concept was mentioned on nukeitdotorg!Also an updated version of REAPERlive that can be imaged directly to any USB hard drive (wi...

REAPER SVN Access

less than 1 minute read

Instructions for using SVN to get the newest version of the REAPER Project:These instructions are for SVN from a Linux command line, and specifically Debian....

REAPER Preview Setup and Configuration

3 minute read

(Command line instructions)6 Nov. 2010REAPERlive Preview:Extracting a working directoryOnce you have downloaded the REAPERlivePreview build pa...

REAPERlive Preview POC Released

less than 1 minute read

REAPERlive Preview has been released as a proof of concept. The ISO is available for download at sorceforge. Currently only images are displayed, but lists o...

REAPER Preview

1 minute read

Throughout the time I have been developing REAPER, many people in more developed countries have expressed a need for a type of forensic preview ability. Mayb...

REAPER Logo

less than 1 minute read

Logo design by Laura Small and Joshua James.Digital artwork by Laura Small.The REAPER logo by Joshua James is licensed under a Creative Commons Attribution-...

Back to top ↑

Linux

Back to top ↑

Conferences 2014

[CFP] ICDF2C 2014 Submissions Due

less than 1 minute read

Just a quick reminder that submissions for the 6th International Conference on Digital Forensics & Cyber Crime are due THIS FRIDAY (May 16, 2014). See su...

[CFP] World Forensic Festival 2014

less than 1 minute read

World Forensic Festival, Oct. 12 - 18, 2014 in Seoul, South Korea.Abstract submission due: May 31, 2014Program site: http://wff2014korea.org/<img alt=”Wor...

[CFP] ICDF2C 2014

less than 1 minute read

Don’t forget about the 6th International Conference on Digital Forensics & Cyber Crime, September 18–20, 2014 in New Haven, Connecticut, United States.Th...

[CFP] DFRWS EU 2014

less than 1 minute read

From http://dfrws.org/2014eu/cfp.shtmlThe DFRWS-EU Conference that will be held in Amsterdam on the 7-9 May 2014.Important DatesSubmission deadline: December...

Back to top ↑

REAPER

REAPER Preview

less than 1 minute read

Project: Rapid Evidence Acquisition Project for Event Reconstruction (REAPER) Preview<div class="p1">Purpose: A forensic boot CD that quickly and autom...

REAPERlive Change Log - 7 Jan 2010

less than 1 minute read

Change Log - 7 Jan 2010REAPERliveMajor Revision-Remove need for 2 drives.-Temp remove OCFA processing. -Add Ability to partition REAPERlive storage drive aut...

REAPERlive Major Revision in Progress

1 minute read

REAPERlive is being revamped. An effort to clean up and standardize a lot of the code is going on. This first part of the project will allow REAPERlive to:1)...

REAPER SVN Access

less than 1 minute read

Instructions for using SVN to get the newest version of the REAPER Project:These instructions are for SVN from a Linux command line, and specifically Debian....

REAPER Preview

1 minute read

Throughout the time I have been developing REAPER, many people in more developed countries have expressed a need for a type of forensic preview ability. Mayb...

REAPER Logo

less than 1 minute read

Logo design by Laura Small and Joshua James.Digital artwork by Laura Small.The REAPER logo by Joshua James is licensed under a Creative Commons Attribution-...

Back to top ↑

Encryption

[How to] GPG and Signing Data

1 minute read

GNU Privacy Guard (GPG) uses public and private keys to secure communications (public-key cryptography). Many people use it to encrypt their email or other d...

Seoul Tech Society Crypto Event

less than 1 minute read

On June 24th, Seoul Tech Society held an ‘introduction to cryptography’ event. First, Artem Lenskiy gave an overview of how symmetric and asymmetric encrypti...

GPG Key Signing Party in Seoul 2015/06/24

less than 1 minute read

Seoul Tech Society is having an introduction to Public Key Infrastructure (PKI) Wednesday, June 24th at D.CAMP in Seoul. We will give an introduction to PKI...

Back to top ↑

Memory Forensics

Goldfish

less than 1 minute read

Project: Goldfish<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue...

FireWire DMA Attacks for Memory Acquisition

less than 1 minute read

Firewire exploits that can be used to dump, or even alter a target machine’s RAM.http://www.hermann-uwe.de/blog/physical-memory-attacks-via-firewire-dma-part...

Back to top ↑

CFP 2016

[CFP] CLOUDFOR extended submission deadline

2 minute read

<pre wrap=”>CLOUDFOR 2016: Workshop on Cloud ForensicsIn conjunction with the 9th IEEE/ACM International Conference on Utility and Cloud Computing (UCC...

[CFP] ICDF2C Submission date extended!

4 minute read

ICDF2C 2016 in New York has extended its call for papers until April 25th! Call for papers for the 8th International Conference on Digital Forensics and Cyb...

[CFP] Call for Papers ICDF2C 2016

1 minute read

8th International Conference on Digital Forensics and Cyber Crime<div class="separator" style="clear: both; text-align: center;"></div>Location: ...

Back to top ↑

Projects

Indicators of Anti-Forensics

1 minute read

Project: Indicators of Anti-Forensics (IoAF)Purpose: Digital forensic triage for anti-forensic activitiesStatus: ActiveLicense: GNU GPLv3Developer(s): KITRI’...

Project ATOM

less than 1 minute read

Project: ATOM<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue', H...

Automated Network Triage (ANT) / Profiler

less than 1 minute read

Project: Automated Network Triage (ANT) / Profiler<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', Hel...

Goldfish

less than 1 minute read

Project: Goldfish<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue...

REAPER Preview

less than 1 minute read

Project: Rapid Evidence Acquisition Project for Event Reconstruction (REAPER) Preview<div class="p1">Purpose: A forensic boot CD that quickly and autom...

Back to top ↑

CFP 2013

[CFP] DFRWS EU 2014

less than 1 minute read

From http://dfrws.org/2014eu/cfp.shtmlThe DFRWS-EU Conference that will be held in Amsterdam on the 7-9 May 2014.Important DatesSubmission deadline: December...

[CFP] ICDF2C 2013 Note of Change of Date

less than 1 minute read

Please note, the dates for the ICDF2C 2013 have slightly changed.Fifth International Conference on Digital Forensics and Cyber Crime - ICDF2C 201325-27 Septe...

Back to top ↑

CFP 2012

CFP: Africomm 2012

2 minute read

<div class="p1">Call for Papers</div><div class="p1">——————–</div><div class="p1">Fourth International IEEE EAI Conference on e...

CFP: IRISSCERT Cyber Crime Conference

less than 1 minute read

The IRISSCERT Cyber Crime Conference will be held November 22, 2012 in Dublin, Ireland. More information can be found here.They are currently running a call ...

ICDF2C 2012

less than 1 minute read

The 4th International Conference on Digital Forensics and Cyber Crime (ICDF2C), hosted at Purdue University, will be held from October 24-26, 2012.Website: h...

Back to top ↑

Hashing

Convert EnCase hash sets to md5sum

1 minute read

I managed to get a hold of a list of known-bad hashes to use in an experiment. The hashes, however, were in EnCase “.hash” format.<div></div><...

Using XARGS to speed up batch processing

1 minute read

[Edit 24/7/2013] Be careful when using xargs to spawn multiple processes that write to the same file. I’ve been using it with md5sum and pipin...

Back to top ↑

anti-forensics

Indicators of Anti-Forensics

1 minute read

Project: Indicators of Anti-Forensics (IoAF)Purpose: Digital forensic triage for anti-forensic activitiesStatus: ActiveLicense: GNU GPLv3Developer(s): KITRI’...

Back to top ↑

CFP 2014

[CFP] ICDF2C 2014 Submissions Due

less than 1 minute read

Just a quick reminder that submissions for the 6th International Conference on Digital Forensics & Cyber Crime are due THIS FRIDAY (May 16, 2014). See su...

[CFP] World Forensic Festival 2014

less than 1 minute read

World Forensic Festival, Oct. 12 - 18, 2014 in Seoul, South Korea.Abstract submission due: May 31, 2014Program site: http://wff2014korea.org/<img alt=”Wor...

[CFP] ICDF2C 2014

less than 1 minute read

Don’t forget about the 6th International Conference on Digital Forensics & Cyber Crime, September 18–20, 2014 in New Haven, Connecticut, United States.Th...

Back to top ↑

DFRWS

[CFP] DFRWS EU 2016

3 minute read

The DFRWS EU 2016 conference will be held in Lausanne, Switzerland from March 30th to April 1st, 2016.<div class="separator" style="clear: both; text-alig...

Back to top ↑

Password Cracking

[How-To] Installing thc Hydra in Ubuntu

1 minute read

The steps below are how to easily install thc Hydra in Ubuntu with the majority of required libraries for common tasks. Hydra is a pretty well-known remote a...

PRNewsWire Quotes CybercrimeTech

less than 1 minute read

PRNewsWire, when writing about Passware’s new LUKS GPU-assisted brute force cracker, referenced our work on LUKS password cracking with John the Ripper.<d...

Back to top ↑

Forensic Acquisition

[How To] Forensic Acquisition in Linux - DCFLDD

less than 1 minute read

This video shows how to use DCFLDD to acquire a disk image from a suspect device in the Linux command line. DCFLDD is an expanded version of ‘dd’ that suppor...

Back to top ↑

Threats

[How-To] Installing thc Hydra in Ubuntu

1 minute read

The steps below are how to easily install thc Hydra in Ubuntu with the majority of required libraries for common tasks. Hydra is a pretty well-known remote a...

Back to top ↑

Survey

Survey About Crime Investigation Priority

less than 1 minute read

<div class="MsoNormal">This Crime Investigation Priority survey is being conducted by a researcher at University College Dublin. The purpose is to dire...

Back to top ↑

Law

Cybersecurity and Challenges to Democracy

3 minute read

South Korea’s democracy can only be described as… developing. In the late 1970s, after the assassination of Military Dictator Park Chung-hee (who Koreans oft...

Back to top ↑

ICDF2C

[CFP] Call for Papers ICDF2C 2016

1 minute read

8th International Conference on Digital Forensics and Cyber Crime<div class="separator" style="clear: both; text-align: center;"></div>Location: ...

ICDF2C Revised Draft Program Released

less than 1 minute read

7th International Conference on Digital Forensics and Cyber Crime (ICDF2C) updated program is now available here: http://bit.ly/1LsJpvM<div class="separat...

A Proposal for Cyber Peacekeeping (CPK)

1 minute read

After a year of collaborative effort we submitted a paper about Cyber Peacekeeping (CPK) to ICDF2C 2015 (http://d-forensics.org/) and have just learned about...

Back to top ↑

Digital Crime

Back to top ↑

Crime

Predictive Policing and Online Crime

1 minute read

FutureCrimes.com just passed on the single Sci-fi policing: predicting crime before it occurs. Crime modeling used by the LAPD appears to have contributed t...

Back to top ↑

Fuzzy Hashing

Another SDHASH Test with Picture Files

less than 1 minute read

After the last SDHASH test showed that fuzzy hashing on multiple sizes of the same picture files did not appear to work well. I decided to try...

Back to top ↑

Intelligence

[How to] GPG and Signing Data

1 minute read

GNU Privacy Guard (GPG) uses public and private keys to secure communications (public-key cryptography). Many people use it to encrypt their email or other d...

Cybersecurity and Challenges to Democracy

3 minute read

South Korea’s democracy can only be described as… developing. In the late 1970s, after the assassination of Military Dictator Park Chung-hee (who Koreans oft...

Social Media and Intelligence Gathering

6 minute read

As seen on DigitalFIREOnline social media has changed the way many people, businesses and even governments interact with each other. Because of Twitter’s pop...

Back to top ↑

Webinar

Back to top ↑

Thanks!

PRNewsWire Quotes CybercrimeTech

less than 1 minute read

PRNewsWire, when writing about Passware’s new LUKS GPU-assisted brute force cracker, referenced our work on LUKS password cracking with John the Ripper.<d...

Convert EnCase hash sets to md5sum

1 minute read

I managed to get a hold of a list of known-bad hashes to use in an experiment. The hashes, however, were in EnCase “.hash” format.<div></div><...

CybercrimeTech Interviewed!: Baby Got Bactria

less than 1 minute read

Since the single went up in the middle of travelling for conferences and Police training, I didn’t get a chance to thank the very interesting history blog Ba...

Back to top ↑

JDFSL

Back to top ↑

Cybersecurity

A Proposal for Cyber Peacekeeping (CPK)

1 minute read

After a year of collaborative effort we submitted a paper about Cyber Peacekeeping (CPK) to ICDF2C 2015 (http://d-forensics.org/) and have just learned about...

Cybersecurity Tips for Business Travelers

2 minute read

I recently received an email from someone claiming to be from CNN, wanting to do a segment on cyber security for business travelers. They asked for some bul...

Back to top ↑

GPG

[How to] GPG and Signing Data

1 minute read

GNU Privacy Guard (GPG) uses public and private keys to secure communications (public-key cryptography). Many people use it to encrypt their email or other d...

GPG Key Signing Party in Seoul 2015/06/24

less than 1 minute read

Seoul Tech Society is having an introduction to Public Key Infrastructure (PKI) Wednesday, June 24th at D.CAMP in Seoul. We will give an introduction to PKI...

Back to top ↑

Conferences 2016

[CFP] ICDF2C Submission date extended!

4 minute read

ICDF2C 2016 in New York has extended its call for papers until April 25th! Call for papers for the 8th International Conference on Digital Forensics and Cyb...

[CFP] DFRWS EU 2016

3 minute read

The DFRWS EU 2016 conference will be held in Lausanne, Switzerland from March 30th to April 1st, 2016.<div class="separator" style="clear: both; text-alig...

Back to top ↑

CFP

Back to top ↑

research

Back to top ↑

Goldfish

Goldfish

less than 1 minute read

Project: Goldfish<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue...

FireWire DMA Attacks for Memory Acquisition

less than 1 minute read

Firewire exploits that can be used to dump, or even alter a target machine’s RAM.http://www.hermann-uwe.de/blog/physical-memory-attacks-via-firewire-dma-part...

Back to top ↑

Cybercrime Technologies

About Cybercrime Technologies

less than 1 minute read

Welcome to Cybercrime Technologies. This blog is devoted to research and development in the area of Cybercrime and Digital Forensic Investigations. It will b...

Cybercrime Technologies Philosophy

1 minute read

Cybercrime Technologies was founded on the principal that the level of competent, quality digital investigations should not be based on the budget of the pra...

Back to top ↑

Categorization

Back to top ↑

Malware

Back to top ↑

Live Data Forensics

Back to top ↑

Cloud Computing

InfoSecurity Russia 2012

less than 1 minute read

Last week, Pavel and I gave an invited talk at InfoSecurity Russia 2012. From Digital FIRE:<blockquote class="tr_bq">Our talk explored the issues of di...

Back to top ↑

International Communication

Cybersecurity and Challenges to Democracy

3 minute read

South Korea’s democracy can only be described as… developing. In the late 1970s, after the assassination of Military Dictator Park Chung-hee (who Koreans oft...

Future Crimes Ted Talk

less than 1 minute read

[Update] See Bruce Schneier’s responseOur friends at FutureCrimes.com recently had a good Ted talk about technology, crime and a potential way to fight crime...

Back to top ↑

Storage

ZFS and NFS for Forensic Storage Servers

3 minute read

We’ve been looking at different storage solutions to act as storage servers for forensic images, and some extracted data. Essentially we have a server with e...

Back to top ↑

Digital Forensic and Forensic Sciences

Back to top ↑

Standards

Back to top ↑

Human Exploitation

Child Exploitation Forensic Tool: NuDetective

2 minute read

I met some Brazilian Law Enforcement at the 2014 World Forensic Festival. They were talking about Child Online Exploitation in Brazil, and a tool they develo...

Online Child Exploitation Awareness Project

1 minute read

With the KITRI Best of the Best Information security program, we have been developing tools for Law Enforcement to use in the automatic detection of Child E...

Back to top ↑

Cybercrime

Cybersecurity Tips for Business Travelers

2 minute read

I recently received an email from someone claiming to be from CNN, wanting to do a segment on cyber security for business travelers. They asked for some bul...

Back to top ↑

Meetup

Seoul Tech Society Crypto Event

less than 1 minute read

On June 24th, Seoul Tech Society held an ‘introduction to cryptography’ event. First, Artem Lenskiy gave an overview of how symmetric and asymmetric encrypti...

GPG Key Signing Party in Seoul 2015/06/24

less than 1 minute read

Seoul Tech Society is having an introduction to Public Key Infrastructure (PKI) Wednesday, June 24th at D.CAMP in Seoul. We will give an introduction to PKI...

Back to top ↑

SeoulTechSoc

Seoul Tech Society Crypto Event

less than 1 minute read

On June 24th, Seoul Tech Society held an ‘introduction to cryptography’ event. First, Artem Lenskiy gave an overview of how symmetric and asymmetric encrypti...

Back to top ↑

cyberlaw

사물인터넷(IoT) 디지털 수사 관련 전액장학금 지원 석/박사 직위 공모

less than 1 minute read

한림대학교 국제학부의 정보법과학전공에서는 현재 석사, 박사, 그리고 박사후과정생을 대상으로 정규직 연구원을 모집하고 있습니다. 해당 직위는 사물인터넷(IoT) 디지털 포렌식 수사에 관련된 연구를 담당하므로, 다음과 같은 자격을 요합니다. <ul><li>프로그래...

Back to top ↑

Data Recovery

Back to top ↑

ransomware

Back to top ↑

Digital Investigation

Back to top ↑

digital forensics

Back to top ↑

Autopsy

Using Autopsy 4 to export file metadata

less than 1 minute read

Autopsy 4 is a very powerful digital forensic investigation tool. Today, we are going to extract file and meta-data from a disk image (mobile phone) to use i...

Back to top ↑

public awareness

Horrible messaging is bad for national security

5 minute read

For over a year, anyone with a mobile phone in Korea has had to put up with spam text messages from Korea’s Ministry of Public Safety and Security (국민안전처). I...

Back to top ↑

National Security

Horrible messaging is bad for national security

5 minute read

For over a year, anyone with a mobile phone in Korea has had to put up with spam text messages from Korea’s Ministry of Public Safety and Security (국민안전처). I...

Back to top ↑

conferences 2018

Back to top ↑

privacy policy

DFIR.Science Privacy Policy

3 minute read

Privacy is very important to us, and while some information is collected so we can attempt to improve you experience, we want to you know your privacy option...

Back to top ↑

OS X

Goldfish

less than 1 minute read

Project: Goldfish<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue...

Back to top ↑

ANT

Automated Network Triage (ANT) / Profiler

less than 1 minute read

Project: Automated Network Triage (ANT) / Profiler<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', Hel...

Back to top ↑

I18N/L10N

Project ATOM

less than 1 minute read

Project: ATOM<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue', H...

Back to top ↑

ATOM

Project ATOM

less than 1 minute read

Project: ATOM<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue', H...

Back to top ↑

Policing

Predictive Policing and Online Crime

1 minute read

FutureCrimes.com just passed on the single Sci-fi policing: predicting crime before it occurs. Crime modeling used by the LAPD appears to have contributed t...

Back to top ↑

Critical Systems

Back to top ↑

Formal Methods

Back to top ↑

Social Media

Social Media and Intelligence Gathering

6 minute read

As seen on DigitalFIREOnline social media has changed the way many people, businesses and even governments interact with each other. Because of Twitter’s pop...

Back to top ↑

Perceptual hashing

[How to] Install pHash on Ubuntu

less than 1 minute read

pHash is an open source software library released under the GPLv3 license that implements several perceptual hashing algorithms, and provides a C-like API to...

Back to top ↑

Computer Vision

Back to top ↑

BigData

Back to top ↑

Forensic Challenge 2014

Back to top ↑

News

Back to top ↑

Social Engineering

What is your password?

less than 1 minute read

Jimmy Kimmel, a U.S. talk show host, commented on U.S. cyber security after the 2014 Sony attacks. To humorously demonstrate the problem, they employed a bit...

Back to top ↑

Authentication

Back to top ↑

javascript

Back to top ↑

Cyber Warfare

A Proposal for Cyber Peacekeeping (CPK)

1 minute read

After a year of collaborative effort we submitted a paper about Cyber Peacekeeping (CPK) to ICDF2C 2015 (http://d-forensics.org/) and have just learned about...

Back to top ↑

Cyber Conflict

A Proposal for Cyber Peacekeeping (CPK)

1 minute read

After a year of collaborative effort we submitted a paper about Cyber Peacekeeping (CPK) to ICDF2C 2015 (http://d-forensics.org/) and have just learned about...

Back to top ↑

Cyber Safety

A Proposal for Cyber Peacekeeping (CPK)

1 minute read

After a year of collaborative effort we submitted a paper about Cyber Peacekeeping (CPK) to ICDF2C 2015 (http://d-forensics.org/) and have just learned about...

Back to top ↑

PKI

GPG Key Signing Party in Seoul 2015/06/24

less than 1 minute read

Seoul Tech Society is having an introduction to Public Key Infrastructure (PKI) Wednesday, June 24th at D.CAMP in Seoul. We will give an introduction to PKI...

Back to top ↑

Cryptography

Seoul Tech Society Crypto Event

less than 1 minute read

On June 24th, Seoul Tech Society held an ‘introduction to cryptography’ event. First, Artem Lenskiy gave an overview of how symmetric and asymmetric encrypti...

Back to top ↑

python

Back to top ↑

Investigation

Finding private IP addresses in Email Headers

1 minute read

In some cases it may be necessary or helpful to find the private IP of a suspect. This can be difficult, especially since NAT is common in most networks. How...

Back to top ↑

Conference 2016

[CFP] Call for Papers ICDF2C 2016

1 minute read

8th International Conference on Digital Forensics and Cyber Crime<div class="separator" style="clear: both; text-align: center;"></div>Location: ...

Back to top ↑

LIFS

Back to top ↑

honeypot

Honeypot Fun

1 minute read

At the Legal Informatics and Forensic Science Institute, we are preparing to do some research on IoT smart homes. Part of that is setting up a slightly-less-...

Back to top ↑

CTF

Facebook Capture the Flag Platform Now Available

less than 1 minute read

Facebook’s hacking education platform and capture the flag is now available. See their release single here. Their goal is to educate about different types of...

Back to top ↑

Network Forensics

Back to top ↑

dfi

Back to top ↑

jekyll

Switching to Jekyll

1 minute read

I’ve been on Blogger since 2008. It is very easy to use. Since 2008, nothing has really changed about it, save for an exciting -slight- editor UI change a fe...

Back to top ↑

blogging

Switching to Jekyll

1 minute read

I’ve been on Blogger since 2008. It is very easy to use. Since 2008, nothing has really changed about it, save for an exciting -slight- editor UI change a fe...

Back to top ↑

Autopsy 4

Back to top ↑

The Sleuth Kit

Back to top ↑

How to

Back to top ↑

Conferences

Back to top ↑

Conferences 2017

Back to top ↑

Optical character recognition

Back to top ↑

OCR

Back to top ↑

howto

Imaging Android with ADB, Root, Netcat and DD

3 minute read

Today we are going to acquire an android smartphone (Samsung Note II) using Android Debug Bridge (ADB), netcat and dd. The system I am using is Ubuntu linux....

Back to top ↑

mobile acquisition

Imaging Android with ADB, Root, Netcat and DD

3 minute read

Today we are going to acquire an android smartphone (Samsung Note II) using Android Debug Bridge (ADB), netcat and dd. The system I am using is Ubuntu linux....

Back to top ↑

android

Imaging Android with ADB, Root, Netcat and DD

3 minute read

Today we are going to acquire an android smartphone (Samsung Note II) using Android Debug Bridge (ADB), netcat and dd. The system I am using is Ubuntu linux....

Back to top ↑

linux

Imaging Android with ADB, Root, Netcat and DD

3 minute read

Today we are going to acquire an android smartphone (Samsung Note II) using Android Debug Bridge (ADB), netcat and dd. The system I am using is Ubuntu linux....

Back to top ↑

Metadata

Using Autopsy 4 to export file metadata

less than 1 minute read

Autopsy 4 is a very powerful digital forensic investigation tool. Today, we are going to extract file and meta-data from a disk image (mobile phone) to use i...

Back to top ↑

Bodyfile

Using Autopsy 4 to export file metadata

less than 1 minute read

Autopsy 4 is a very powerful digital forensic investigation tool. Today, we are going to extract file and meta-data from a disk image (mobile phone) to use i...

Back to top ↑

timeline

Using Autopsy 4 to export file metadata

less than 1 minute read

Autopsy 4 is a very powerful digital forensic investigation tool. Today, we are going to extract file and meta-data from a disk image (mobile phone) to use i...

Back to top ↑

editorial

Back to top ↑

Public security

Back to top ↑

Awareness

Back to top ↑

WannaCry

Back to top ↑

Ransomware

Back to top ↑

Opinion

Back to top ↑

National security

Back to top ↑

cybersecurity

Back to top ↑

South Korea

Back to top ↑

Planning

Back to top ↑

Volatility

Back to top ↑

How To

Back to top ↑

Memory analysis

Back to top ↑

LiME

Back to top ↑

emergency messaging

Horrible messaging is bad for national security

5 minute read

For over a year, anyone with a mobile phone in Korea has had to put up with spam text messages from Korea’s Ministry of Public Safety and Security (국민안전처). I...

Back to top ↑

emergency response

Horrible messaging is bad for national security

5 minute read

For over a year, anyone with a mobile phone in Korea has had to put up with spam text messages from Korea’s Ministry of Public Safety and Security (국민안전처). I...

Back to top ↑

incident response

Horrible messaging is bad for national security

5 minute read

For over a year, anyone with a mobile phone in Korea has had to put up with spam text messages from Korea’s Ministry of Public Safety and Security (국민안전처). I...

Back to top ↑

SMS spam

Horrible messaging is bad for national security

5 minute read

For over a year, anyone with a mobile phone in Korea has had to put up with spam text messages from Korea’s Ministry of Public Safety and Security (국민안전처). I...

Back to top ↑

SMS alerts

Horrible messaging is bad for national security

5 minute read

For over a year, anyone with a mobile phone in Korea has had to put up with spam text messages from Korea’s Ministry of Public Safety and Security (국민안전처). I...

Back to top ↑

Don't do this

Horrible messaging is bad for national security

5 minute read

For over a year, anyone with a mobile phone in Korea has had to put up with spam text messages from Korea’s Ministry of Public Safety and Security (국민안전처). I...

Back to top ↑

ssdeep

Back to top ↑

fuzzy hashing

Back to top ↑

File formats

Back to top ↑

hacking

Back to top ↑

commentary

Back to top ↑

Disk Acquisition

Back to top ↑

Windows

Back to top ↑

Sleuthkit

Back to top ↑

disk imaging

Back to top ↑

file system

Back to top ↑

optimization

Back to top ↑

zeltser

Back to top ↑

knowledge

Back to top ↑

how to

Back to top ↑

online course

Back to top ↑

digital forensic science

Back to top ↑

automation

Back to top ↑

telegram

Back to top ↑

bot

Back to top ↑