A Springboard To Digital Forensics Research In 2021

The end of 2020 could not come fast enough for most of us, and yet, as the year wound down, some things — such as the digital forensics research recapped in this article — were worth slowing down for. This

Are You Looking To Get #DFIRfit In 2021?

Few digital forensics practitioners would dispute that their job is largely sedentary: there’s a lot of sitting, be it in labs, vehicles (including aircraft), meeting rooms, and conference lecture rooms, among others. That only became more true in 2020, when

Writing DFIR Reports: A Primer

“How do I write a good DFIR report?” – Literally Everyone at some point You wouldn’t believe how many times that question gets asked out of me here at Marshall University (and sometimes in the DFIR community). Year after year I’ve

How To Extract Text From Files Using OCR In Magnet AXIOM

Tara: Hey everyone, Tara Melton here, and I’m going to be showing you a new and exciting feature introduced in AXIOM 4.8. Now you can extract text from certain files using optical character recognition, or OCR, technology. AXIOM will extract

How To Investigate The Source Camera Of Digital Videos

Unique features that allow for identification are considered a real blessing in investigations. First, there was fingerprint analysis, then DNA analysis brought a real revolution, raising the contribution of scientific analysis to investigations at unprecedented levels. The field of digital

How To Timeline Login Information From Windows Event Logs

Justin: Alright. So, hello. And this is a recorded video, so just kind of, welcome, whenever you’re watching this. I’m Justin Tolman, I am the Director of Training for AccessData, and today, for the next little bit, we’ll be talking

How To Efficiently Decrypt TrueCrypt/VeraCrypt Encryption Using Passware

VeraCrypt and the former TrueCrypt are two of the most challenging types of encryption to bypass with regard to their popularity as full disk encryption software. Unlike Bitlocker encryption, TrueCrypt/VeraCrypt may encrypt their containers and volumes with multiple encryption keys (cascade

MSAB: Top 10 Updates Of 2020

The top 10 most valuable updates of 2020, from MSAB: 32,931 supported profilesIncluding iOS 14, Samsung A & J series, Huawei Mediatech devices and LG Qualcomm devicesCheckm8 exploit is now integrated in XRYNew connected device screen capture capability in XRY

How To Use Nuix Promote To Discover

Welcome everyone. My name is Jenna Czaplicki, and today I’m going to walk you through a feature called ‘Promote to Discover.’ Promote to Discover is a feature available in both Nuix Workstation and Nuix Investigate, but today we will focus

How To Use The Categories Filter In XAMN

Welcome to this quick how-to guide explaining how to work with the Categories filter within XAMN. Categories filter is a powerful tool that is built into the heart of XAMN to help you quickly identify artifacts of a specific type