One of the biggest challenges in Forensic Video Analysis (FVA), is the … Read more
Hi, I’m Kevin Kyono. I’m a technical sales engineer with MSAB, and this is XRY and XAMN in 5. In addition to extracting data from devices, XRY has the ability to import your returns from search warrants and other legal … Read more
Setting Up a Microsoft Azure Instance for Running Magnet AXIOM Cyber
Your company has a Microsoft Azure environment, and your forensics lab uses Magnet AXIOM Cyber. The next step is to combine the two by running AXIOM Cyber in Azure! … Read more
Hi, this is Amanda Mangan with Oxygen Forensics. In this video, we’re going to go over Oxygen Forensics’ Call Data Expert.
The first thing we’ll discuss is, what exactly is a CDR? A CDR is a call data record, and … Read more
Hello and welcome everybody to this video about Quin-C. Today we will be talking about a widget called Simple Review.
Simple Review is a widget which has been designed for examiners whose everyday job is to run the index searches … Read more
by Blake Sawyer, Amped Software
For Law Enforcement across the world, one of the biggest hindrances to actionable evidence comes from CCTV. There are sites devoted to providing codecs, of which there are hundreds, and IT departments that spend most … Read more
Beginning with version 19, Griffeye Analyze DI Pro and Core will start using the new Griffeye Intelligence Database, or GID, to replace the legacy intelligence manager.
In this video, we’re going to discuss the changes that the GID brings to … Read more
Did you know that Passware Kit can create a snapshot of a password recovery process at any time and resume it on a different computer?
Running a password recovery attack, especially for multiple files or drives, might be a long … Read more
Decrypting BitLocker volumes or images is challenging due to the various encryption options offered by BitLocker that require different information for decryption.
This article explains BitLocker protectors and talks about the best ways to get the data decrypted, even for … Read more
Hey everyone, Trey Amick from Magnet Forensics here. Today we’re talking about Mac USB investigations, and what happens when we’ve been alerted that a USB has been inserted into an end point.
Different organisations handle USB policies differently. Some have … Read more
At MSAB, we’re always looking to improve our software and make every product more user-friendly, intuitive, and valuable; and to help save you time.
We’ve recently improved the way that XAMN displays and counts artifacts. Let’s take a look at … Read more
Let’s talk about the exciting new LACE Carver integration with Analyze DI Pro.
Once you have the proper license, you can head over to your Downloads page on MyGriffeye.com and go to the LACE Carver download.
Once the app package … Read more
So before we go to export our files from BlackLight to S21, what we will normally do is we will run the hashes against our case. In this case what we’ve done is we’ve already run these hashes against BlackLight, … Read more