Digital Forensics Round-Up, April 02 2025

A round-up of this week’s digital forensics news and views:


Forensic Timeliner – A timeline creation tool built in PowerShell

Forensic Timeliner is a new open-source PowerShell tool designed to streamline timeline creation in digital forensics. Built for investigators working with KAPE, EZTools, and Chainsaw+Sigma outputs, it normalizes data from multiple sources into a unified timeline format. The tool offers interactive or scripted execution, efficient batch processing, and export options to CSV, JSON, and XLSX. Analysts can prefilter MFT and event log data, categorize web history by activity type, and use a built-in macro to color-code artifacts. Forensic Timeliner helps quickly correlate user activity and artifacts, making host-based analysis faster and more structured.

Read More (GitHub)


3rd BETA release of SRUM-DUMP v3

The third BETA release of SRUM-DUMP v3 brings enhanced capabilities for forensic analysts and incident responders, offering deep analysis of Windows SRUM (System Resource Usage Monitor) data to uncover application and process activity over the past 30 days. This version introduces a user-friendly wizard, keyword tagging to flag suspicious processes, and output in both Excel and CSV formats. SRUM-DUMP extracts data from the SRUDB.DAT file and optionally enriches findings using the SOFTWARE registry hive. Designed for streamlined triage and reporting, the updated tool empowers analysts to quickly identify anomalous activity across Windows systems.

Read More (GitHub)


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.

Unsubscribe any time. We respect your privacy - read our privacy policy.



Cell Site Analysis for Geolocation SFR

The National SFR Board has officially approved the use of the Streamlined Forensic Reporting (SFR) process for cell site analysis in geolocation cases, following agreement by the cell site expert working group in January 2025. This evidential use of the SFR process is intended to support opinions on device geolocation, and is not applicable to non-evidential scenarios such as missing person investigations. To ensure proper implementation, detailed guidance documents, templates, technical notes, and training videos have been made available, alongside a formal adoption plan to support practitioners adopting this process.

Read More (Forensic Capability Network)


DeepFace UI – simplifying facial verification for OSINT investigations

DeepFace UI is a newly developed open-source web application that adds a user-friendly interface to the powerful DeepFace facial recognition library, streamlining OSINT investigations and identity verification. Built to eliminate the hassle of account creation required by many free services, it enables investigators to drag and drop images for instant face detection, extraction, and analysis. DeepFace UI automates key steps in facial verification workflows, making it easier to compare faces and assess attributes directly within the browser.

Read More (GitHub)


DFRWS: PaSSw0rdVib3s!: AI-assisted password recognition for digital forensic investigations

New research introduces a machine learning-based approach to help digital forensic investigators identify cleartext passwords within data extracted from unlocked devices—an increasingly vital tactic when facing encrypted devices like secure phones. The study evaluates five models, including PassGPT, DistilBERT, and XGBoost variants, ranking their effectiveness at distinguishing passwords from non-passwords. It finds that PassGPT offers the highest accuracy, while DistilBERT strikes a strong balance between speed and performance. The research emphasizes the importance of diverse training data—combining leaked passwords with real-world text sources like chat logs and web crawls—and demonstrates that modern NLP techniques can significantly enhance forensic password discovery efforts in practical, real-world scenarios.

Read More (Science Direct)


Decrypting Locked Apple Notes on iOS 16.x: A Complete Forensic Workflow (SQLite, CyberChef, Python) Featuring Hashcat

This detailed forensic walkthrough demonstrates how an investigator decrypted a locked Apple Note on an iOS 16.7.10 device using a combination of open-source tools and methodical database analysis. The process involved extracting key encryption parameters from the NoteStore.sqlite database, cracking the note’s password with Hashcat, deriving cryptographic keys with Python and CyberChef, and ultimately decrypting and decompressing the AES-encrypted protobuf data to recover the note’s plaintext content. The investigation highlights how password hints and structured workflows can unlock critical evidence—while noting that changes introduced in iOS 17 and 18 require new investigative strategies.

Read More (James Eichbaum, LinkedIn)


The Hidden Toll Of Digital Forensics: A Serving Digital Investigator’s Story

Following the publication of an article on the personal toll of digital forensics, a serving investigator came forward to share a deeply personal account of the psychological damage caused by years of exposure to disturbing case materials. Their story highlights the hidden burden carried by digital forensic investigators, who often face graphic content daily with little to no proactive mental health support. The investigator recounts vivid flashbacks, sleep disturbances, and emotional trauma triggered by work-related exposure, exacerbated by outdated mental health tools and stigma within the profession. Their call for systemic change urges leadership to acknowledge the cost of justice on those behind the screens and to take meaningful action before more investigators are lost to burnout and despair.

Read More (Forensic Focus)


DFDS ’25: Proceedings of the Digital Forensics Doctoral Symposium

The 2025 Digital Forensics Doctoral Symposium (DFDS ’25), held in Brno, Czech Republic, showcases a diverse range of open-access research advancing the field of digital forensics. Topics include AI-generated code testing frameworks, synthetic data for entity extraction, robustness of similarity digest schemes, forensic communication analysis, ICS side-channel monitoring, SMB fingerprinting, GenAI image tampering detection, automation classification in forensics, knowledge graph frameworks, and timestamp tampering strategies. With contributions from early-career researchers and experts, the symposium reflects cutting-edge innovation in forensic analysis, automation, and adversarial resilience.

Read More (ACM Digital Library)


How AI is ‘saving the Mona Lisa’: A paradigm shift in digital forensics

A groundbreaking project from the German Research Center for Artificial Intelligence (DFKI), Carve-DL, is revolutionizing digital forensics through AI-powered file reconstruction. Leveraging advanced deep learning models like Swin Transformer V2 and ResNet, Carve-DL can recover highly fragmented or deleted files with high precision—something traditional forensic methods struggle to achieve. The system includes models for file classification, fragment verification, clustering, and reordering, achieving up to 95% reconstruction accuracy. While the fictional “Mona Lisa theft” illustrates its use, Carve-DL shows real promise for police work, cybersecurity, industrial data recovery, and digital preservation. The project concludes in October 2025, with researchers optimistic about its impact on forensic science and beyond.

Read More (Tech Xplore)


DFRWS: Preserving meaning of evidence from evolving systems

This paper argues that digital forensic science must expand its concept of preservation beyond simply protecting trace data to include the timely collection of reference data, which provides essential context and meaning. In evolving systems—like modern distributed applications and cloud services—reference data may change or become inaccessible, increasing uncertainty in forensic interpretations despite properly preserved evidence. The authors propose an extended definition of preservation, highlight the risks of delayed or missing reference material, and call for structured processes and tools to manage these risks. They recommend research into automated tools, shared artefact repositories, taxonomies for uncertainty assessment, and decision-making frameworks to prioritize reference data gathering in forensic workflows.

Read More (Science Direct)



Leave a Comment