Quantcast
Channel: Magnet Forensics
Browsing all 1190 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

IEF: Now Recovering Business Applications & OS Artifacts

Get More Digital Evidence with One Search This is the first blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. With the...

View Article


Image may be NSFW.
Clik here to view.

How to Analyze USB Device History in Windows

This is the second blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. Whether you’re a corporate examiner working an...

View Article


Image may be NSFW.
Clik here to view.

Forensic Analysis of LNK files

This is the third blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are LNK Files? LNK files are a relatively...

View Article

Image may be NSFW.
Clik here to view.

Forensic Analysis of Prefetch files in Windows

This is the fourth blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are Prefetch Files? Prefetch files are great...

View Article

Image may be NSFW.
Clik here to view.

Forensic Analysis of Windows Shellbags

This is the fifth and final blog post in a series about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are Shellbags? While shellbags have been...

View Article


Image may be NSFW.
Clik here to view.

Criminal Investigation of a DDos Attack

Learn how digital evidence played a vital role in a real-life Distributed Denial of Service attack. Darren Sabourin, Principal at Resolute InfoSec Inc, and Jad Saliba explain how Internet evidence was...

View Article

Image may be NSFW.
Clik here to view.

The New World of Mobile Investigations: Finding Important Evidence in...

This is the first blog post in a series of five about recovering third-party mobile chat applications for your digital forensics investigations. Over the last few years, we have seen a massive shift in...

View Article

Image may be NSFW.
Clik here to view.

Recovering Kik Messenger Forensic Artifacts

This is the second blog post in a series of five about recovering third-party mobile chat applications for your digital forensics investigations. With over 150 million users worldwide, Kik Messenger...

View Article


Image may be NSFW.
Clik here to view.

Recovering WhatsApp Forensic Artifacts

This is the third blog post in a series of five about recovering third-party mobile chat applications for your digital forensics investigations. Another popular mobile chat application is WhatsApp....

View Article


Image may be NSFW.
Clik here to view.

Recovering BlackBerry Messenger Forensic Artifacts

This is the fourth blog post in a series of five about recovering third-party mobile chat applications for your digital forensics investigations. BlackBerry Messenger (BBM) was the original mobile...

View Article

Image may be NSFW.
Clik here to view.

Using Dynamic App Finder to Recover More Mobile Artifacts

This is the final blog post in a series of five about recovering third-party mobile chat applications for your digital forensics investigations. Data recovered from mobile chat apps is critical to many...

View Article

Image may be NSFW.
Clik here to view.

Improving Your Mobile Forensics Workflow

This is the first blog post in a series of three about using IEF and Cellebrite to get more mobile evidence for your digital forensics investigations. Finding and analyzing evidence found on mobile...

View Article

Image may be NSFW.
Clik here to view.

How To Use IEF and Cellebrite to Find More Evidence On Android Devices

This is the second blog post in a series of three about using IEF and Cellebrite to get more mobile evidence for your digital forensics investigations. In my first blog post in this series, I discussed...

View Article


Image may be NSFW.
Clik here to view.

How To Use IEF and Cellebrite to Find More Evidence On iOS Devices

This is the third blog post in a series of three about using IEF and Cellebrite to get more mobile evidence for your digital forensics investigations. In my previous blog post in this series, I...

View Article

Image may be NSFW.
Clik here to view.

Speeding Up the Investigation of Employee Policy Violations

If you’re a forensics professional working in a corporate environment, investigating employee policy violations like time theft or inappropriate use of the Internet tend to be a part of your everyday...

View Article


Image may be NSFW.
Clik here to view.

Investigating Mobile Dating Applications in the Tinder Age

This is the second blog post in a series of six about the new features included in IEF v6.5 Investigations involving mobile devices have greatly increased over the past few years. In a recent blog...

View Article

Image may be NSFW.
Clik here to view.

Recovering Live System Artifacts with IEF

This is the third blog post in a series of six about the new features included in IEF v6.5 The collection of volatile data has become an essential component of a forensic examiner’s processes. While...

View Article


Image may be NSFW.
Clik here to view.

Improved Analysis Features in IEF v6.5

This is the fourth blog post in a series of six about the new features included in IEF v6.5 With the release of IEF v6.5, we’ve added a number of key features to help you analyze evidence more...

View Article

Image may be NSFW.
Clik here to view.

Adding Tags & Comments to Bookmarks in IEF Report Viewer

This is the fifth blog post in a series of six about the new features included in IEF v6.5 In the fouth blog post in this series, I highlighted all of the new analysis features included in IEF v6.5....

View Article

Image may be NSFW.
Clik here to view.

Recovering Evidence from F2FS File Systems with IEF

This is the sixth and final blog post in a about the new features included in IEF v6.5 In Internet Evidence Finder (IEF) v6.5 we are now offering support for the F2FS file system.  The F2FS...

View Article
Browsing all 1190 articles
Browse latest View live