Enfuse 2019 – Recap

by Mattia Epifani The Enfuse Conference, organized by OpenText, took place from the 11th-14th of November 2019 at the Venetian Conference Center in Las Vegas. More than 1,000 attendees from 40 countries were present, coming from different fields like digital

Bruteforcing Linux Full Disk Encryption (LUKS) With Hashcat

by Patrick Bell This walk-through will show you how to Bruteforce LUK volumes using hashcat, how you can mount a LUK partition, and how we can image it once it’s decrypted. Scenario: You’ve got a Macbook in. MacOS has been

Forensic Software in Child Protection Cases

According to recently released statistics from ICAC, an agency whose aim is to make the internet safer for children, only 2% of reported child protection cases are investigated in the United States each year. Often the media seize every opportunity

EnCase file copying and Windows Short File Names

First published May 2010 By Lee Hui Jing, EnCe Edited by Sarah Khadijah Taylor ABSTRACT A couple of months ago, one of my clients, an Investigating Officer from a Law Enforcement Agency, had requested me to extract some of the

Computer forensics software, an introduction

First published September 2004 by Jamie Morris, Forensic Focus In common with many other professions, the field of computer forensic investigation makes use of tools to allow practitioners to carry out their tasks effectively and efficiently. This article describes some