Keith: Hey, welcome. This is Keith Lockhart from Oxygen Forensic Training. How’s it going? So listen, here’s a video on some MediaTek extraction, but more specifically when you have a device that’s encrypted (file based encrypted) where the user … Read more
how-to
When Did It Happen? Dealing With Timestamps in Amped FIVE
By David Spreadborough – Forensic Video Analyst at Amped Software
There are several common components within a CCTV Video file. This article from Amped Software is going to dive into the data that links the image to the time when … Read more
Examining Vehicle Data With Magnet AXIOM
Hi, this is Kim Bradley with Magnet Forensics. Today, we’ll be learning how to process vehicle data by using an exported extraction from Berla’s iVe software.
First, to get the extraction you’ll need to export using iVe. You can do … Read more
How to Automatically Tag Your Assets During an Investigation
How many Web Servers, Mail Servers, Domain Controllers, and other critical assets do you have on your network or the network you have been asked to investigate? More often than not, nobody can answer this question quickly and this slows … Read more
APK Downgrade in Oxygen Forensic Detective
Hey everybody. This is Josh Smith with the Oxygen Forensics training team. And today I’m going to show you a new extraction method: the Android APK Downgrade method. The Android ADB backup is, like I said, a very common method, … Read more