Magnet User Summit CTF: Misc
We are continuing our write-up. The second part will walk you through the solution of the second set of CTF problems –…
We are continuing our write-up. The second part will walk you through the solution of the second set of CTF problems –…
Yesterday Troy Schnack and Kevin Pagano suggested on Twitter that it would be good to write how I solved Magnet User Su…
Heather Mahalik has posted about a list of recommendations on iOS and Android-based smartphones forensic acquisition. If you…
As you may know, David Cowen runs Sunday Funday Challenges, and one of the most recent was Zone.Identifier challenge. I have…
afro can parse APFS images. It not only extracts the latest data but also older versions of the files. Learn more about the …
Epochalypse utility by Pasquale Stirparo has been updated. Now it supports APFS timestamps. You can download this Pytho…
Cloud computing is this decade’s major computing advancement. Many business enterprise remain reluctant to move their …
Business email compromises (BECs) are a big problem across a multitude of industries. Just last week, the FBI participated i…
As a continuation of the “Introduction to Windows Forensics” series, this episode takes a comprehensive look at …
In an age where data breaches and malware infections are quickly becoming the norm, we must prepare for Digital Forensics an…
Login