Magnet AXIOM Is Now Available

New investigation platform provides robust acquisition, examination, and sharing tools

Today Magnet Forensics, a global leader in the development of digital forensic software, launched Magnet AXIOM, a complete digital forensics platform that builds on the processing power of Magnet IEF by adding acquisition capabilities, new in-depth analysis tools, and enhanced reporting.

Magnet AXIOM Resource List

Website: magnetaxiom.com
Webinars: magnetforensics.com/webinars
Getting Started: magnetforensics.com/gettingstarted
Free trial: magnetforensics.com/try-magnet-axiom-free-30-days
Magnet Forensics Blog: magnetforensics.com/blog

Get The Latest DFIR News!

Top DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

IEF enabled recovery of data from smartphone and computer artifacts, and from places other tools wouldn’t think to look. AXIOM is about more than finding evidence. AXIOM allows you to explore the evidence in greater depth while simplifying analysis by intuitively linking facts and data in a way that helps you to draw insightful conclusions. With AXIOM your examinations will be better and more thorough – you will uncover facts quickly, validate your findings with ease, and share the meaning of your results clearly.“The most important thing we do at Magnet Forensics is to empower digital forensics examiners to uncover the truth. With more data, more devices, and more cases on their shoulders, we know that examiners need solutions that simplify process, connect data, and find ways to move quickly through the case,” said Jad Saliba, Magnet Forensics Founder and CTO. “Magnet AXIOM is a single tool that brings smartphone and computer data together and allows examiners to work every stage of the case with all the data at their fingertips.”

(For the “behind-the-scenes” story on how Magnet AXIOM came to be, read Jad’s blog post.)

Do more with Magnet AXIOM

Find More Evidence: AXIOM’s Evidence Analyzer builds on IEF’s ability to parse and carve for hundreds of artifact types and data, even in unallocated spaces.

Dive Deeper Into The Data: With AXIOM, you can access file systems, registry hives, and drill down into artifact data. Source Linking traces artifact evidence back to source data in seconds.

Work Smarter: AXIOM’s Process automates all the acquisition and processing tasks required to prepare evidence for analysis, freeing your time for deeper analysis.

A Simpler Way: Digital forensics is complex. AXIOM boasts a new easy-to-use interface that moves you through your investigations, helping you find evidence more intuitively.

Work the Whole Case: With AXIOM you can consolidate the evidence from all the computers, smartphones and tablets related to an investigation into a single case.

Availability and Pricing

Magnet AXIOM is now available. For more information on Magnet AXIOM’s features and capabilities visit the product page. Pricing is based on a license and support fee model. More information is available at magnetforensics.com/pricing.

Join Magnet Forensics at its Magnet User Summit Series 2016 for hands-on training and technical sessions about AXIOM. More information and registration for the Las Vegas, Myrtle Beach, and Dallas events is available at magnetusersummit.com.

For an in-depth overview of Magnet AXIOM, check out the Magnet Forensics webinars.

Leave a Comment

Latest Videos

Quantifying Data Volatility for IoT Forensics With Examples From Contiki OS

Forensic Focus 22nd June 2022 5:00 am

File timestamps are used by forensics practitioners as a fundamental artifact. For example, the creation of user files can show traces of user activity, while system files, like configuration and log files, typically reveal when a program was run. 

Despite timestamps being ubiquitous, the understanding of their exact meaning is mostly overlooked in favor of fully-automated, correlation-based approaches. Existing work for practitioners aims at understanding Windows and is not directly applicable to Unix-like systems. 

In this paper, we review how each layer of the software stack (kernel, file system, libraries, application) influences MACB timestamps on Unix systems such as Linux, OpenBSD, FreeBSD and macOS.

We examine how POSIX specifies the timestamp behavior and propose a framework for automatically profiling OS kernels, user mode libraries and applications, including compliance checks against POSIX.

Our implementation covers four different operating systems, the GIO and Qt library, as well as several user mode applications and is released as open-source.

Based on 187 compliance tests and automated profiling covering common file operations, we found multiple unexpected and non-compliant behaviors, both on common operations and in edge cases.

Furthermore, we provide tables summarizing timestamp behavior aimed to be used by practitioners as a quick-reference.

Learn more: https://dfrws.org/presentation/a-systematic-approach-to-understanding-macb-timestamps-on-unixlike-systems/

File timestamps are used by forensics practitioners as a fundamental artifact. For example, the creation of user files can show traces of user activity, while system files, like configuration and log files, typically reveal when a program was run.

Despite timestamps being ubiquitous, the understanding of their exact meaning is mostly overlooked in favor of fully-automated, correlation-based approaches. Existing work for practitioners aims at understanding Windows and is not directly applicable to Unix-like systems.

In this paper, we review how each layer of the software stack (kernel, file system, libraries, application) influences MACB timestamps on Unix systems such as Linux, OpenBSD, FreeBSD and macOS.

We examine how POSIX specifies the timestamp behavior and propose a framework for automatically profiling OS kernels, user mode libraries and applications, including compliance checks against POSIX.

Our implementation covers four different operating systems, the GIO and Qt library, as well as several user mode applications and is released as open-source.

Based on 187 compliance tests and automated profiling covering common file operations, we found multiple unexpected and non-compliant behaviors, both on common operations and in edge cases.

Furthermore, we provide tables summarizing timestamp behavior aimed to be used by practitioners as a quick-reference.

Learn more: https://dfrws.org/presentation/a-systematic-approach-to-understanding-macb-timestamps-on-unixlike-systems/

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_i0zd7HtluzY

A Systematic Approach to Understanding MACB Timestamps on Unixlike Systems

Forensic Focus 21st June 2022 5:00 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles

Share to...