Guild icon
Digital Forensics
DFIR Channels / general-discussion-and-questions
Use this channel for general DFIR discussion or to ask a DFIR related question that is too generalized for other channels.
Avatar
Andrew Rathbun 1/23/2019 2:29 PM
Channel added based on the poll in #announcements. Let's give this a trial and see how it turns out. Fire away!
👊 1
Avatar
anyone got any ideas for university studies or projects i could do in my 3rd year ? (just thinking ahead)
Avatar
dfir related?
6:17 PM
Laika BOSS: Object Scanning System. Contribute to lmco/laikaboss development by creating an account on GitHub.
6:17 PM
there's already some code on the github
Avatar
Not sure how useful it will be for anyone but there is currently a free SQL Masterclass by Udemy going on hot uk deals. Seems more based for business analytics on postgresql. If you're interested here's the link: https://www.hotukdeals.com/deals/learn-sql-course-free-sql-masterclass-sql-for-data-analytic-udemy-3169505 (edited)
All Credits to Cartman_SP who is the original founderSQL course covering important topics of Business Intelligence for SQL Database ( PostgreSQL ) from Beginner
Avatar
randomaccess 1/24/2019 1:08 AM
@RABIDFOX what's your coding background?
1:08 AM
And what are you interested in?
1:08 AM
(I ask the coding one first because I have a coding project ha)
Avatar
@randomaccess i dont know much just some basic java and SQL
Avatar
randomaccess 1/24/2019 1:22 AM
Hmm ok
1:22 AM
And what kind of projects do people usually do?
Avatar
all sorts really im not sure i have a project fair on monday where we will talk about it a bit more
1:24 AM
but things like examining a specific program for artifacts such as skype for example would be something
Avatar
randomaccess 1/24/2019 1:25 AM
Great! There's plenty of room for that kind of project without coding
1:26 AM
I mean pick a few apps off the various stores and pull them apart
1:26 AM
Hotel apps might be an interesting one. See what they store in clear text. But may be difficult without staying at all the chains
👍🏻 1
👍 1
Avatar
We've had a few cases where we have had to do some digging into various hotel apps (booking.com etc). A general study on them would be useful for us as well
Avatar
randomaccess 1/24/2019 1:52 AM
@K23 people should post this stuff on aboutdfir! Even if it's a passing "I really should look into this" Because someone may be looking for something or may have already done it
👌 1
Avatar
Just submitted it, cheers
Avatar
Since Sanderson Forensics is on hold at this moment for bereavement leave, what are you guys using for SQL forensics, ?
Avatar
Andrew Rathbun 1/24/2019 3:39 PM
Any word on when he comes back, if at all?
Avatar
Bulldawg6391 1/24/2019 3:39 PM
I've been trying to figure that out. Our licenses are still working, but if he disappears forever I don't know what we'll switch to.
Avatar
looking back, i should have gotten a multi year licence.
Avatar
literally just some sqlite db viewer 😂
Avatar
@Sudo how about handling deleted rows / wal files.. i know the free stuff doesn't look at that
Avatar
probably not no
6:31 AM
I never said we were up to speed on sql forensics 😅
Avatar
Did you try the PA SQL Wizard?
Avatar
Good point Ron. I know it does a good job for deleted records
💯 1
Avatar
Anyone have good white papers on cloud forensics? My employer wants me to get up to speed and I’m looking for credible resources
Avatar
ThurgoodJenkins 1/25/2019 4:06 PM
What are you looking for in particular? Best practices or particular scenarios.
Avatar
Working with AWS and deleted containers and more or less the ins and outs of the process. I guess the basics or how to apply traditional forensics to the cloud. I have many years of experience with non cloud related forensics.
Avatar
I've spent the last 2 years figuring out dfir for the cloud - it has been an incremental approach.
5:48 PM
EC2 instances - that's traditional forensics (except for the ephemeral stuff).
5:48 PM
the rest of the services - we log the heck out of things and splunk it.
5:49 PM
the forensics at that point becomes turning the minutiae of the logs in to macro events (50k foot level).
5:49 PM
e.g. what does it look like when someone turns an S3 bucket public - and then turns it off
5:50 PM
adds IAM roles, accounts, creates instances from stacks and all that.
5:51 PM
check acloudguru - official AWS training (free too) use a free account and start playing. If you haven't used AWS yet, then everythign at this point is at the concept level. Need to get used to the terminology
Avatar
I appreciate your response and will check out the acloudguru material. Thanks 👍
Avatar
Forensic Browser is my go to SQLite tool, but my second choice would typically be Oxygen Forensic Detectives SQLite viewer (which can be run standalone). Doesn't do as good a job of deduplicating fragmented records but it's the best alternative I've seen
4:18 AM
Ribbon from CCL Forensics has a SQLite viewer which I think does a decent job with deleted records, but it's been a while since I've tried that particular feature
Avatar
Anyone actively use timeline presentation tools? Any real world experience? Not for dfir anakysis but for presentation to suits
Avatar
I have four phones 2 Iphones and 2 Samsung devices sealed. They were shipped to a person who is involved in a scam. Apparently for him reshipping items he might win 2.8 million who new.... Well wondering if I can track the items back to where they were purchased with the IMEI. anyone ever done this?
Avatar
Novice level python user looking for help on some grad school project questions. Need help with explanation behind the code used and not just told the answer. Anyone willing to help?
Avatar
ThurgoodJenkins 1/29/2019 1:11 PM
do you have an example of the questions you will be asking
Avatar
Create a list with 5 team names (strings). Create a separate list to hold game scores. Use a loop to prompt the user to enter a score for each team. Add the score they enter to the game score list. After the data entry is complete, print the highest and lowest game scored. Seems like I can understand all of the commands separately when in a lecture, but have a hard time comprehending how to combine them while completing labs.
Avatar
ThurgoodJenkins 1/29/2019 1:13 PM
so for this portion
1:13 PM
Create a list with 5 team names (strings). Create a separate list to hold game scores. Use a loop to prompt the user to enter a score for each team. Add the score they enter to the game score list. After the data entry is complete, print the highest and lowest game scored.
1:13 PM
are you looking for a Systems Design answer, a list of the functions and steps that would be created (think a flow chart)
1:14 PM
sometimes writing the answer in Pseudo code format helps with these tasks
Avatar
Yes I am looking for a “how to” almost. I’m appreciative of any help offered but also have 0 background knowledge and just downloaded python onto my computer yesterday. I have notes from an intro lecture on how to do a simple loop for counting up or down. And I know how to prompt someone to enter a value. But I have no idea how to put all of this knowledge together to write this specific command.
Avatar
ThurgoodJenkins 1/29/2019 1:21 PM
@echo i will take a look at some old class notes and pass along anything useful
Avatar
Thank you. A list of commands and the steps would be extremely helpful. I have no idea what I am doing or how to approach these types of questions.
Avatar
ThurgoodJenkins 1/29/2019 1:22 PM
The questions are pretty basic, they are just testing knowledge of syntax and its functionality
1:23 PM
it will come easier as you start practicing the subject matter
1:25 PM
here is a good site to just learn about lists in python, it covers recursingthrough a list (the loop question) http://effbot.org/zone/python-list.htm#overview
Avatar
I understand the level of basic these are, that is why I said novice user seeking help. I have 0 familiarity of anything involving programming. 0 knowledge of the language. I was just hoping for a push or hint to help me get started on this specific problem so that I may submit this lab question on time. Thank you for the link.
Avatar
@echo theres an app in the google store which can teach you some basics of python
Avatar
Looking into dongle server or virtual usb dongle server. I have seen the SEH products but I am curious if anyone has used the virtual here windows usb server ?
10:02 AM
in there labs
10:03 AM
I am not sure if it would be worth purchasing hardware for 2k for the 16 port dongle server rack or looking into virtual dongle rack
Avatar
We have been using VirtualHere now for a couple months. So far it's worked flawlessly. The server is running on a Synology NAS, but there are many ways to do it.
Avatar
do you know of any reason that one would need a dongle server rack over something virtual
10:26 AM
I am trying to see the pros and cons
10:26 AM
I was just going to launch the hardware on my evidence server and buy some hubs and test it out
10:26 AM
but not really sure
Avatar
Does the VirtualHere now work with Cellebrite if you RDP into the machine ?
Avatar
I am not looking for offsite stuff
10:29 AM
just internal
10:30 AM
but I think that is a pro for the dongle server rack mount
Avatar
I'm not aware of any benefits to the hardware server. There may be some, but it was such a price difference that once I saw how slick VirtualHere is, I stopped looking at the hardware. I paid $50 for the software plus another $100 for a nice USB hub, versus $1850 for the hardware version.
10:31 AM
I keep ours on a local network so I haven't tried off-site. No problems with Cellebrite locally. I would expect it to work though.
Avatar
Andrew Rathbun 1/30/2019 10:31 AM
Is the $50 a one time cost? Or recurring? Either way it's nominal
Avatar
I think its yearly
10:31 AM
but 50 bucks a year
Avatar
Andrew Rathbun 1/30/2019 10:32 AM
That's nothing. Don't go to McDonald's once per month for a year and that pays for itself
Avatar
Andrew Rathbun 1/30/2019 10:32 AM
That's how I justify purchases in my brain sometimes 😎
Avatar
i know my way around the area by the restaurants
Avatar
I was under the impression it is one time. I just looked at the website and it's not really clear.
Avatar
I believe VirtualHere is a one time purchase. I have been using it in my lab for a few months and love it. Works perfectly.
Avatar
Bulldawg6391 1/30/2019 10:54 AM
We've tested and are about to install in the data center a Digi AnywhereUSB device. We have a couple virtual servers running forensic software, and physical servers are being phased out. Our use case may be a bit different, but my experience has been this device works well. We have the 14 port model, which can split out USB ports to up to 14 different computers. Not a cheap option, BTW. About $1,500
Avatar
randomaccess 1/30/2019 2:42 PM
We had issues with virtual here for some reason. But I think it was the config stuff. I'm not sure. The seh utn servers are fantastic. Super simple to setup. Just expensive
2:42 PM
But by gd I never have to go find who has a dongle stuck under their desk in the back of a machine
2:43 PM
Looking into a method of tracking dongle usage ATM actually. Found some software I'll need to get a license for. Otherwise have to write it :(
Avatar
Can anyone point me to a white paper or research regarding the difference in artifacts between physical hard drive and a snapshot from AWS Cloud?
Avatar
can't piont to a paper, but
6:18 PM
a snapshot can't be interacted with forensically - what you do is create a volume from a snapshot which you can then treat as a physical disk.
Avatar
randomaccess 1/31/2019 8:08 PM
Has anyone seen exif data for a camera photograph that has Data originated/date digitised being the same And then another field called timestamp. That's a similar date, but in a different date format. I think it was a Pentax camera from the early 2000s
8:08 PM
But by similar date I mean same day, but the time is different
Avatar
In a Facebook extraction ( extracted with token from a mobile ) I find some locations in the bookmark section. Anyone have any experience with what kind of locations this is ( actual places the user has been or locations saved by the user without being there )
Avatar
@EFU003, as normal, it depends. If you think about FB, you can tag a location of a post or a picture without actually being there. So i'd be hesitant saying that the device / person was actually there. Similar to Instagram (edited)
Avatar
A couple of days ago there was a discussion on VirtualHere/Dongle servers ( @San4n6 @Joe Schmoe @Andrew Rathbun ). There was a brief mention of accessing these remotely. Does VirtualHere behave well via a VPN? Our potential use case would be that our trainers could connect to a VPN that we run and then use the dongles over that. I'm aware that VirtualHere offers a paid for VPN service, so I assume it's simple enough to manage directly (and freely!) (edited)
Avatar
I managed VPN on my own.
7:46 AM
Using OpenVPN
Avatar
Great, thanks! At $49 it seems like such good value, just wanted to make sure everyone will be able to use it
Avatar
Sounds like a good solution, with split tunneling onyour VPNclient should make field work much easier
Avatar
burakozkosem 2/4/2019 5:47 AM
does anyone know the most current pricing for Belkasoft evidence center single user with dongle? I wrote them an email but haven't heard back
Avatar
Morning all, do we have any UK LE that have broached cloud forensics yet? I am looking to gather advice on the legal side.
Avatar
Andrew Rathbun 2/5/2019 6:13 AM
@Law Enforcement [UK]
Avatar
@Rom yeah we have
6:36 AM
we're a little bit outside of the UK realm, but still follow it pretty much
6:36 AM
so far, from other forces I've spoken to, plus our own internal musings, it's very much up in the air
6:37 AM
the current thoughts around it are basically just, try it on until someone says otherwise
Avatar
@Rom The Information Commissioner (the ones who review if LE are behaving with this type of thing) published a report to say that accessing a cloud would be intercept, but can lawfully be done with a property interference warrant. It sort of fits the legislation-ish... This is a chief constable authority for crime matters. However not sure how this has changed with the new IP Act.
10:41 AM
@Rom Some police forces just do it as a matter of course, others are more wary.
Avatar
Does anyone have experience or knowledge of the Origin Fields from metadata of an IMG file ?
3:43 PM
3:44 PM
I've never seen it populated before
3:44 PM
The program name has the first 3 characters of the mobile device model #.
3:47 PM
Question the ADA asked is it possible to ever tell where a picture came from ? My experience is I've only seen make and model of a device and never the serial number
Avatar
@Jay528 I've never seen the serial number of a camera in any image metadata.
Avatar
randomaccess 2/6/2019 12:35 AM
I've seen the serial number once actually. Photographs were taken between 2000-2004. Can't recall the camera model though
12:35 AM
But never on mobile phone cameras
Avatar
got it
5:16 AM
thanks
Avatar
wibblypigftw 2/6/2019 8:59 AM
@Rom we use S20 PACE which seems to be tailor made for cloud data. As long as you're doing it from the premises you're lawfully on and you're aware of unlawful interception of communications, it seems safe.
9:00 AM
Re camera serials - it's common on DSLRs and a handful of others. Some Fuji compacts used to have it on. Never seen it on a phone.
Avatar
thanks
Avatar
@wibblypigftw what about when your at the office starting from an extracted token?
Avatar
wibblypigftw 2/6/2019 9:17 AM
Nope, that's out of scope because you're not at scene. So you'd need the owner's consent - that's under RIPA anyway, there are probably provisions in the IPA but I don't know them yet 😶. To my thinking anyway you'd be committing an offence under the Computer Misuse Act by going into it without a warrant
Avatar
I have a defense expert who will be testifying that they can match the photo to the make/model and exact device
Avatar
@Jay528 do you know if they're basing it on something like this? https://www.mobiledit.com/camera-ballistics/
Overview of Camera Ballistics product features and functions.
Avatar
No idea which metadata field they are using
9:45 AM
i am leaning towards the windows date created
9:45 AM
and not the EXIF
9:46 AM
They're saying the officer couldnt have taken the photos because he was not there
Avatar
randomaccess 2/6/2019 1:09 PM
@OllieD played with that a bit. Works well
Avatar
Yeah I've seen it demoed using a DSLR, not seen it with a mobile device (which is my focus)
1:20 PM
Good results on those too? I've seen that they have it listed as a use case but didn't know if the average camera sensor is detailed enough for that kind of analysis
Avatar
kmacdonald1565 2/6/2019 1:35 PM
Did anyone ever find out if the $50 for virtualhere is a recurring fee?
1:36 PM
website says "Very competitive per unit cost (no monthly fees or update fees!)"
1:36 PM
so i am guessing its not....
1:36 PM
just was wondering from people's experience (edited)
Avatar
MrMacca (Allan Mc) 2/6/2019 2:08 PM
not 100% certain on this, but I think it's restricted to 1 machine
2:09 PM
So once it gets activated, it has to be on that device, if you need to put on another machine, you need another licence. but again, I'm not 100% on this 😛
Avatar
Joe Schmoe 2/6/2019 7:00 PM
It is tied to one machine.
Avatar
randomaccess 2/6/2019 8:52 PM
@OllieD did some comparisons between pictures on a phone, pictures taken with that phone,and then took photos and it accurately identified which ones were taken on that camera
👍 1
Avatar
4n6_Guy(Kevin Salhoff) 2/7/2019 3:09 AM
If I recall correctly, I read awhile back that there was a way to determine with a high degree of certainty which camera took a photo of you had the camera in question or a known photo from that camera. The method compared the specific jpg compression standard used by the camera. The compression was impacted by imperfects in the camera sensor that would allow someone to make a "fingerprint" of the camera. When I initially read it I believe it was just in the concept phase but maybe that's what they are doing.
Avatar
@4n6_Guy(Kevin Salhoff) That's exactly what the Camera Ballistics product appears to do: build a fingerprint based on sensor imperfections
👍 1
Avatar
I think the program griffeye can do that.
Avatar
There have been papers on the topic going back to at least 2006: https://ieeexplore.ieee.org/document/1634362
👍 1
Avatar
Adam Cervellone 2/8/2019 9:50 AM
Does any one have a template for a subpoena, search warrant or some sort of legal process to send to IMO or services like LiveMe or Up live to get video content back?
9:54 AM
Please send me a PM if you do.
Avatar
FYI @everyone , if you've previously been an EFT dongle user, please reset your password! I've just found a data dump that appears to include a lot of users details with passwords in plaintext. I'm going to ping a copy over to Troy Hunt to update HaveIBeenPwned but wanted to give you all some advanced warning!
👍 8
9:02 AM
And apologies for tagging everyone but some quick grepping includes the email addresses of several people I know
Avatar
thanks I am changing mine now.
Avatar
Andrew Rathbun 2/11/2019 9:04 AM
Thanks for the heads up @OllieD. I'd say that's worth the everyone mention
💯 2
Avatar
Any idea how old that dump is? I do remember that EFT reset my password 2-3 months ago
Avatar
November 18 is the date I've got here on the file, so that would fit (edited)
9:06 AM
The dump contains user registration dates and the last date is 2018-10-12
9:07 AM
About 18,500 users
Avatar
Damn, got my dongle delivered 11.10.2018
Avatar
Forensic@tor 2/11/2019 2:55 PM
What case management software solutions are being used in your work area?
Avatar
We are using Lima Forensic Case Management . Made by IntaForensics
👌 1
Avatar
Adam Cervellone 2/11/2019 3:06 PM
We are getting started with Atlas from Magnet Forensics.
Avatar
Andrew Rathbun 2/11/2019 3:45 PM
@Adam Cervellone how is it? We use an Excel spreadsheet
Avatar
Adam Cervellone 2/11/2019 3:47 PM
We are still in the very early stages but once we work out some kinks I think it will be good. I am hoping by end of next week we can start using it for evidence intake.
Avatar
Dr. Kaan Gündüz 2/11/2019 11:35 PM
@Forensic@tor We wrote our own, using filemaker (edited)
Avatar
question: why is it so hard for forensic tool developers to get reporting right 😂
Avatar
We also use a self developed solution, shared with the regular forensics
Avatar
you know that humans, non-techy humans at that, have to be able to know what the hell is going on right
Avatar
Adam Cervellone 2/12/2019 1:55 AM
I couldn't agree more @Sudo ! I've had evidence reviews recently where I saw the flaws in some of the tool reports from a non-techy perspective and it drove me nuts!
Avatar
I think it's just death by information a lot of the time
2:15 AM
it includes stuff like the offset for the data, or the raw html of an email
2:16 AM
most people aren't going to even know what all that means, so trying to find the actual evidence in a generated report is like minesweeping
👆 1
Avatar
Adam Cervellone 2/12/2019 2:19 AM
Agreed. I find that oftentimes the tables in the reports are the hardest to deal with, especially for evidence like SMS and chat conversations. I would like to see some sort of an option (if it doesn't exist already) to have a "conversation view" in a report
2:26 AM
been saying that for ages
2:26 AM
I'd just like it to be modular you know, let me choose what to include in terms of output
2:26 AM
and for chat or conversations, an export in a chat view type format
2:26 AM
I think XRY are furthest ahead on that last front
Avatar
I suppose it depends on what you’re using the report for.
Avatar
Bulldawg6391 2/12/2019 6:51 AM
@Forensic@tor We are also using Lima from IntaForensics. It's been very good for us for the last 6 years. (edited)
Avatar
court mostly
7:00 AM
but also interviews and meetings etc
Avatar
Yeah so. For court and whatnot, and this is one guys opinion mind you, I write a very verbose report. I use tool reports only as addendums. And rarely an actual tool report, but rather things i am highlighting that bring me to / support a conclusion or opinion. Yes it takes longer. But it has been far more effective in my experience.
Avatar
Oh yeah no doubt
7:03 AM
I do exactly that too
7:03 AM
I write custom reports for the most part
7:03 AM
Much better imo
Avatar
So. The tool report is really meh for me. Although I do agree they all pretty much suck.
Avatar
But sometimes you do just need the quick, overview report of the data you've tagged and what have you
7:03 AM
like for file times or something you know
Avatar
I don’t disagree. And that’s what they are good for, IMO.
Avatar
or something like, we're going into interview and want the emails to put to them
7:04 AM
and yeah, that's what I use em for
7:04 AM
but still, I just feel like it could be better presented for non dfir people you know
7:04 AM
I'm just popping off that's all 😅
7:05 AM
usually it's no big deal cuz like you say I write a report and can add in exactly what I want
7:05 AM
but sometimes...
Avatar
Oh. I get it. I’ve had an hour plus call this morning where I’ve all but turned the business on it’s head. So. I’m a little salty myself 😂
😇 1
7:06 AM
I totally get what it's like being a developer too so, I don't wanna be too mean 😂
Avatar
Yeah those guys generally do good work. Reports are almost an afterthought it seems. I always liked FTKs reports for their purpose.
Avatar
yeah they do
7:07 AM
I mean I personally appreciate having that information
7:08 AM
but I know that the guys I hand it to don't as much haha
7:08 AM
that's why we work with the reader type files these days too, cuz then it's super easy for them to look through and tag stuff
Avatar
Right. It’s the non tech people who could care less. Fine balancing act between report I can use, and a report they understand lol
Avatar
which can then go onto a written report
7:09 AM
yeah, I wanna give them enough to get the point through, but not so much they're like, "offsets? what's that"
Avatar
Yeah im a huge proponent of the reader type reports. Here’s “everything” go nuts and get back with me and we will figure out the final reports
Avatar
basically yeah
7:09 AM
that's the best way to go
7:09 AM
it's worked really well for us so far
Avatar
Either way, my ass will be typing. A lot. 😂😂
Avatar
plus we have them do it in our viewing area so we're always close to give more info
7:10 AM
haha yup
Avatar
Andrew Rathbun 2/12/2019 7:10 AM
I like giving them a 27,000 page PDF to sift through 😃
😂 2
Avatar
I'm glad I type fast 😅
7:10 AM
haha
Avatar
Rath ur killing me 😂 that’s one way to get them out of ur hair 😂😂
Avatar
Andrew Rathbun 2/12/2019 7:11 AM
Ctrl+f is your friend
💯 1
Avatar
another force did give one of our guys a like, 4GB PDF on a DVD once
7:11 AM
it didn't go down super well lol
Avatar
Lol it doesn’t really help them
Avatar
Andrew Rathbun 2/12/2019 7:11 AM
Oh god the read speed on a DVD for a PDF that big, oh the agony
Avatar
it was great
7:13 AM
plus it was on a machine with 2GB of RAM and like a celeron
Avatar
Jesus
Avatar
I love a good DVD
Avatar
With all of your internal reporti g do u often have to inckude timelines (for whatever data it is) and if so how do you all present tjose timelines?
Avatar
Anyone have any ideas on how to break a password set on an excel spreadsheet?
Avatar
We made our own case management system using C#, python and SQL server database but we have stopped further development until we know whether they push all police forces towards black rainbow. (edited)
12:06 PM
I was on leave when they did a demo for us but the team liked it and the managers liked the pretty stats and graphs....
😑 1
Avatar
@Ghosted can passware crack the excel password?
Avatar
Deleted User 2/12/2019 10:13 PM
@Ghosted , @sholmes advice is ok. Try pass ware https://www.passware.com/excel/
Avatar
@Ghosted you can use hashcat to crack the password on an excel file. https://hashcat.net/forum/thread-6678.html
Avatar
If only the sheet is password protected (and not the workbook, ie. asks for password when opening) removing it is a 1 second job with some VBA
Avatar
Thanks guys
Avatar
Hello people. Who will assign me to the right group? The Mods?
Avatar
Andrew Rathbun 2/13/2019 5:02 AM
@Tilt I just took care of you and a bunch of others.
👍 1
Avatar
all those new friends
Avatar
paintrainjr 2/13/2019 11:52 AM
anyone know a good .dat video file converter or player?
Avatar
Andrew Rathbun 2/13/2019 11:57 AM
How to open VCD Video DAT files for free with File Viewer Lite.
11:57 AM
Have you tried this yet?
Avatar
paintrainjr 2/13/2019 11:58 AM
Yes i did.... thanks though. It failed every time i tried to load the files i have.
Avatar
virtualdub is a nice tool for converting, supports many video containers.
👍 1
Avatar
anyone have any idea why X-ways wouldn't show files we know are existing?
12:32 AM
one workstation running the same image gets different results
Avatar
also big news, Cellebrite 7.19 has chat reports!!
Avatar
@Sudo - are all filters turn off?
Avatar
turns out the volume professor snapeshot wasn't complete for some reason
2:07 AM
just ran it again after it clicked when a colleague of mine further described the issue
Avatar
also anyone know if I can add further stuff to a griffeye case
Avatar
@Sudo - hit the arrow under new and select add to case
Avatar
Anyone have ATM skimmer extraction experience? I’ve done of these before by removing the chip using hot air and connecting to a SOIC clip and attempted to read it. Appeared to be encoded? Or some type of non human readable data. Seeing if anyone has had success with getting human readable data from this type of skimmer. Thanks in advance!
11:37 AM
This is a Skimmer plus camera to capture the pin pad as identified by CFIR at Deutsche Bank . In Germany magstripe is not used but it is used in other countries. As the Head of Cyber Security at HSBC Germany pointed out "Let’s not forget that magstripe is still used in a lot of countries over the globe. Regarding Germany the bad guys take the data from the skimmer placed in (German) ATMs and use it in other countries. If you take a German card and use it a day later in the Netherlands it might not get marked as suspicious... Furthermore they sell the data." (edited)
Avatar
@Jonny so I added the additional xml files to the case, but it just hangs on 0% and never process any
Avatar
@Sudo - it should work as long as the xml files are not corrupted. What version are you using?
2:20 AM
it must be corrupt
Avatar
@Sudo - try the extraction again
2:43 AM
well, that's done
2:43 AM
but it isn't looking good
2:43 AM
it just hangs on importing files into case
2:44 AM
0% and speed less than 1 files
Avatar
the joys of IT 😂
Avatar
my guess is it's "looking" for files that don't exist or something
Avatar
double checked in x-ways and everything's fine, it exports fine, all the files are present
2:57 AM
but for whatever reason it just, doesn't import
Avatar
Did you try importing it into a new case to see if it works?
Avatar
yeah it works when importing into a new case
Avatar
has anyone got a mundane and utterly irrelevant emlx file they can share with me for testing?
Avatar
@Sudo - was the original case done in 18.4? We’re still using 18.1 as we were having problems with versions above it
Avatar
@Sudo - there are error logs in \ProgramData\Griffeye Technologies\Griffeye Analyze\Error which might give you a clue about what is causing the issue
Avatar
@Jobbins I would image the chip contents, then put the chip back into place and capture the I2C/SPI/Microwire/whatever traffic goes to it, with a logic analyzer like one of the Saleae ones for example, and "skim" cards with known contents in order to reverse engineer the storage format and encoding
Avatar
@Kr thank you for the advice! I will do some research into that and try it out! I’ll let you and the rest of the group know my results!
👍 1
Avatar
I have 2 Garmin GPS devices, is it possible to extract the contents ? There is a SD slot but no SD card
Avatar
I will attempt generic Garmin from UFED4PC
Avatar
Deleted User 2/16/2019 12:07 AM
@Jay528 : Garmin Navis have a hidden menu. There you could activate mass storage and then you can dump it e. g. with Access Data FTK Imager.
12:08 AM
Do you know this?
Avatar
mikewilliams5306 2/16/2019 9:14 PM
anyone aware of a resource (powerpoint, website) that gives advice on identifying skimmers via bluetooth?
Avatar
@mikewilliams5306 Half way through this article they discuss a app called Skimmer Scanner if you haven’t heard it. They do a good job describing exactly how the app works. https://learn.sparkfun.com/tutorials/gas-pump-skimmers/all
Avatar
Deleted User 2/17/2019 10:36 AM
is it possible to let my calculator sayLOL instead of "CASIO" when it boots up?
Avatar
@Deleted User You should be able to get the .BMP with fxRemote, edit it and put it back
Avatar
Deleted User 2/18/2019 1:19 AM
How would i be able to edit the chip on board? (edited)
Avatar
.bmp is an image file, not a chip
1:30 AM
Extract the image using fxremote if your calculator is supported. Edit the image file with ps or gimp. Put it back in the calculator.
Avatar
Deleted User 2/18/2019 2:20 AM
Not supported :(
2:20 AM
It's a casio fx-92B
Avatar
Then I don't know, sorry
Avatar
Deleted User 2/18/2019 3:42 AM
Ok
3:42 AM
Still thanks tho
Avatar
anyone have any experience with SSH on Android
Avatar
Only for server management - using an SSH client to a server, not SSHing into an android device
Avatar
yeah SSH from android
5:22 AM
over to linux
5:22 AM
I'm trying out Juice SSH
5:22 AM
but it doesn't seem to cope super well when the terminal window changes
5:22 AM
it just hangs there
5:22 AM
i.e. when you run a command that will open its own window/tab or however it functions
Avatar
Let me just check what app I use, it's been a while
5:34 AM
An example is if I run cgps
5:35 AM
on my laptop it'll open the page and show me the details, and then of course ctrl-c to exit and return to the main terminal window
5:35 AM
but on Juice SSH (or android) it won't load that cgps page
Avatar
ConnectBot was the one I played with but tbh i didn't really do anything heavy with that, just general updates, a bit of nano editing but not a lot else. You could give that a try and see if it's any better
5:38 AM
Terminus is meant to be very good but some features are locked behind a paywall
Avatar
yeah I love the old paywall
5:42 AM
it's fine, I would pay
5:42 AM
but it's a monthly fee
5:42 AM
ain't got time for that
5:42 AM
I'll try connectbot
5:42 AM
it's based on putty I think
Avatar
Believe so yes
Avatar
I use putty at home so
5:42 AM
works fine usually
5:43 AM
it's just this, "separate window" thing
5:43 AM
that I need to work
5:43 AM
I dunno what to even call it, it's not really a new window
Avatar
I used to use putty but since terminal (OSX) and powershell now accept ssh natively I've just been using them
Avatar
yeah I use my mac terminal primarily
Avatar
Yeah I know what you mean, it's loading another application within the session
Avatar
but for out and about on the down low
5:43 AM
I could do with using a phone
5:44 AM
JuiceSSH does work, it just won't load the app window
5:44 AM
well, it does load it
5:44 AM
but I don't see it
5:44 AM
so I can't close it either
5:44 AM
so it just hangs
5:44 AM
even though it's probably not actually hanging
Avatar
I'm stuck in the office until at least 1700 today and haven't setup VPN fully for my homelab yet so won't be able to do any testing for a while haha
Avatar
Ah don't worry, was just curioso
Avatar
Does it do the same thing with apps like nano? just out of interest
Avatar
not sure, I'll give it a try
5:49 AM
when I get a chance as well 😂
Avatar
I do have a little macbook that I can use outdoors anyway
5:50 AM
so it's not a huge deal
5:50 AM
if it doesn't work properly
Avatar
well, kismet works fine from Juice
7:16 AM
so, good enough
7:17 AM
it's just the cgps that won't
Avatar
looking to get a new USB writeblocker or possibly a combo with multiple connections, aside from Tableau and Wiebtech are there any others to consider? Needs to be stanalone/portable and not fixed in a drive bay
Avatar
Dr.Who-IACIS 2/19/2019 10:24 AM
@bizzlyg Not that this is a physical piece of hardware but have you considered Sumari Paladin?
Avatar
randomaccess 2/19/2019 2:35 PM
@bizzlyg there's one produced by salvation data and another I've just found out about made by deepspar. I don't know anything about either of them though
Avatar
todd.shipley 2/19/2019 3:30 PM
Check out Atola
Avatar
randomaccess 2/19/2019 7:59 PM
Does atola produce a USB write blocker? @todd.shipley
7:59 PM
I thought it was just data recovery re insight and Taskforce
Avatar
todd.shipley 2/19/2019 11:13 PM
Writeblocking is built into their products
Avatar
Thanks guys, I'll take a look
Avatar
randomaccess 2/20/2019 2:26 AM
@todd.shipley sure... But price And neither are portable currently. Apparently the taskforce will be updated soon to be more portable
Avatar
@Dr.Who-IACIS Paladin looks pretty cool as an additional extra
Avatar
Paladin works well as a boot usb for acquiring physicals
2:53 AM
And it's free, so what's not to like
Avatar
yup, I have used CAINE in the past, Paladin looks similiar but maybe a bit more polished
Avatar
Paladin is very easy to operate due to it's integration of the various tools into one program. But you've got individual programs available to run manually if you need to do something a bit different
2:56 AM
You just have to be really careful what you select as a destination drive, because it won't warn you before mounting the drive as r/w :S
👍 5
Avatar
Paladins are pretty good for people who want to chop and change their playstyle, but they have a lack of mobility so they probably aren't great for beginners (edited)
Avatar
Does anyone have experience on Xbox One, I cloned the drive to another drive and plugged it in. The Xbox powers on however will not display on the screen. I currently have the case open, is there a sensor on the case, where it needs to be closed before it will fully work?
Avatar
Hey, kinda off topic, I am doing a presentation for a probation and parole class for DF evidence handling, real basic and maybe a little bit of what can be obtained. Anyone have anything like this they already made?
Avatar
shanster187 2/20/2019 9:12 AM
Hello, I'm new to this channel and to the DF world. I want to get into DF as a career but I have a problem with looking at body parts and all the biology/anatomy area. I don't have a strong stomach so my question is, is there a division where you don't have to be in that area and focus on non-body parts. What's is the technical term? What division/unit would you call that?
Avatar
Anything DF/eDiscovery to do with finance/banking etc should be a safe bet! (I would hope)
😱 1
9:13 AM
e.g. if you're investigating fraud/tax evasion, you'd hope there won't be any bodies cropping up!
9:14 AM
I'm sure there will be plenty of people on here who work within that kind of area and never have to deal with the gory bits
Avatar
@Jobbins - when I’ve examined Xbox One consoles, I’ve always reassembled the device fully with a cloned drive. For the cloned drive, I had to use X-Ways to copy the E01 image as the Xbox wouldn’t boot using a cloned drive made by other tools
Avatar
shanster187 2/20/2019 9:18 AM
Aww yes, that sounds a lot better. My stomach and eyes would be pleased lol. So what type of companies would I look into that would have that?
Avatar
In the UK HMRC is probably a good shout @shanster187
9:26 AM
Just seen from your intro that you are US based so that's probably not helpful sorry!
Avatar
shanster187 2/20/2019 9:31 AM
Hahaha no worries. I can still do research and get a better idea at least. Appreciate the help!
Avatar
Anyone has experience with imo messenger subpoena or can share an official way to contact the company that produce this app? Thanks.
Avatar
forensicmike @Magnet 2/20/2019 1:30 PM
@OllieD I dont know, the thought of investigating exclusively financial crimes has a pretty negative effect on my stomach 🤣
😩 1
😂 3
Avatar
@shanster187 the big 4/5 consultancies will do lots of ED/financial work eg Deloitte, KPMG etc
Avatar
Just remember, if it's personal computers you're dealing with, it's sort of unavoidable
7:34 AM
pure like, company devices though, you'd probably be OK (mostly)
Avatar
I am assuming by body parts he meant like gory stuff, if its litterally body parts ie porn then yes unless its purely corporate then its unavoidable and even then I expect pops up in corporate too
7:36 AM
I would suggest DF is not a wise career choice if 0 body parts of any kind can be tolerated
Avatar
ah gory stuff
7:37 AM
that's a little different
7:37 AM
I mean I don't particularly like that sort of thing, I see it rarely and it's annoying but it's not often thankfully
Avatar
I'd assumed they meant gory stuff when they mentioned body parts, not nudity
Avatar
if it's purely any body related stuff then yeah df is probably not the one cuz it's everywhere haha
Avatar
I am only guessing, thats what came to my mind when I read the initial post
Avatar
yeah that makes more sense
7:38 AM
I just assumed since body parts don't really show up much, so I took it to mean like, body parts like various...orifices etc
Avatar
and yeah same, I don't like overly gory stuff, never had to see it much
Avatar
unless there's loads of people photograping like, spare arms lying around or something
😂 3
Avatar
He should do incident response forensics
Avatar
and we just don't see it in our little island
Avatar
shanster187 2/21/2019 7:42 AM
Hey thank you for all the input,Let me clarify on what i mean, ie: homicide and child pornography. Anything along those lines that deemed gruesome./gory. Also, what does ED mean?
Avatar
eDiscovery
Avatar
so normal porn is OK?
🤔 1
7:43 AM
you'll be fine then
Avatar
@shanster187 I would concentrate on ED, Incident Response or something for a corporate/financial entity. Any kind of LE work I doubt you will avoid one or both of child images/murder stuff
Avatar
still go a fincrime route though if you can, less exposure 😂
7:44 AM
yeah Law Enforcement you won't avoid it
Avatar
shanster187 2/21/2019 7:45 AM
does LE have a incident response or finance side or is it strictly homicide?
Avatar
As mentioned previously, an organisation like HMRC (HM Revenue & Customs) are government/LE but focus on the financial stuff
👍 1
Avatar
shanster187 2/21/2019 7:48 AM
got it, thank you all for your insight and advice. I will look into those type of corporate as I am trying to land an internship in the DF area.
7:48 AM
Will be making a lot of phone calls.
Avatar
ThatLukeGuy 2/21/2019 8:19 AM
Elcomsoft iOS Forensic Toolkit 5.0 is a major update adding support for physical acquisition of Apple devices running iOS 12. The tool extracts the content of the file system and decrypts passwords and authentication credentials stored in the iOS keychain.
8:20 AM
Am I late to the party on this one?
Avatar
They're basing it on a public exploit
8:21 AM
I believe they're using this https://github.com/GeoSn0w/GeoFilza
Filza iOS 12 with r/w only to /var! Contribute to GeoSn0w/GeoFilza development by creating an account on GitHub.
8:21 AM
Hence the same 12.1.2 limit
8:21 AM
(or the exploit that makes that project possible)
Avatar
ThatLukeGuy 2/21/2019 8:23 AM
I figured as much. I was wondering how long it would even be applicable. Apple damn near forced me to update to 12.1.4. I figure I will see less phone running < 12.1.4 (edited)
Avatar
Yeah, they've already stopped signing IPSW files for 12.1.2 and earlier
Avatar
ThatLukeGuy 2/21/2019 8:24 AM
Is your icon a hint as to your private sector work?
Avatar
Click my name to get more than a hint 😃
Avatar
ThatLukeGuy 2/21/2019 8:27 AM
All I see is private sector. No company affiliation. Dont use discord much anyway so I am not farmiliar. Havent seen that logo before but it looks like a key that is in a grayscale. Which would mean you have much more firsthand knowledge with theses things.
Avatar
Oh right, no, not GrayShift if that's what you mean
Avatar
@ThatLukeGuy you can click on anyone's name (on desktop/web) or long press (on mobile) to see what roles they are assigned. @OllieD works for @Control-F which is a UK-based forensic training company. He's been a great recruiter for this server, as an aside, and for that I'm very appreciative 👍
👍 2
Avatar
good job @OllieD !
Avatar
anyone know anything about cellsite analysis?
Avatar
I do know they are doing an overhaul on the software and its supposed to be alot better with a new release soon
Avatar
is there any certifications for the analysis of the mobile/computer devices, excluding the extraction portion?
Avatar
Andrew Rathbun 2/25/2019 12:31 PM
SANS FOR585, GASF certification
Avatar
Thank you @Andrew Rathbun . I'll check those out
Avatar
Andrew Rathbun 2/25/2019 12:32 PM
That would be for mobile. There's also a Windows Forensic Analysis course that would cover computers. Mac course too
Avatar
also, IACIS has good courses for LE
12:32 PM
they might be open to public too
12:32 PM
I think they are
12:32 PM
IACIS 2019 ORLANDO TRAINING CONFERENCE REGISTRATION NOW OPEN! Overview IACIS has been providing computer Forensic Training for over 27 years. IACIS
12:33 PM
best bang for your buck I think, SANS are really good as well but costly
Avatar
Thank you all!
Avatar
Isfce is a good process, as is iacis, I'm currently in the iacis mobile device examiner cert process and it's been very rewarding
Avatar
what's some popular forensic wiping software you guys have come across?
Avatar
Andrew Rathbun 2/26/2019 9:08 AM
@RABIDFOX some use EnCase. I use Eraser for my personal stuff. It's pretty customizable and most importantly free
Avatar
im planning on doing a project around them so im trying to gather a large list of the most popular ones
Avatar
Andrew Rathbun 2/26/2019 9:09 AM
Formatting through windows while unchecking Quick Format should probably be another one for your list, if you're doing comparison
Avatar
oh yeah
9:10 AM
and eraser one im already looking at its pretty hardcore
Avatar
Andrew Rathbun 2/26/2019 9:11 AM
See if linux has a tool to wipe (maybe Disks?) so you have something from Linux
9:12 AM
Here are several free data destruction software programs, sometimes called disk wipe software or hard drive eraser software. Last updated February, 2019.
Avatar
aaah perfect
9:12 AM
i can maybe get funding from uni so i might be able to get paid ones as well
Avatar
Andrew Rathbun 2/26/2019 9:13 AM
Data Sanitization Methods: DoD 5220.22-M, AFSSI-5020, AR 380-19, RCMP TSSIT OPS-II, HMG IS5, VSITR, GOST R 50739-95, Gutmann, Schneier, Random Data As far as advanced options go, Eraser wins the data destruction competition hands down. With Eraser, you can schedule data destruction with all the precision you'd expect with any scheduling tool. Not sure if you're comparing wiping methods or not but Eraser has a ton of them
9:14 AM
Your university might have EnCase already? It's just Tools, Wipe Drive, and follow the prompts from there
Avatar
yeah they have most the main forensic tools
Avatar
Andrew Rathbun 2/26/2019 9:14 AM
And frankly, I just did all that without needing a dongle. You'd just need the EnCase exe
Avatar
one of the things eraser does is it allows you to add random files to replace everything with if i remember correctly
9:16 AM
it came up in one of my projects on my file systems module
9:18 AM
data not files
Avatar
@RABIDFOX We boot to Paladin (https://sumuri.com/product/paladin-64-bit-version-7/), on a Windows based computer from a thumb drive, and use it to wipe everything we use in the our lab (thumb drives, pocket drives, bare drives). It's Linux based and works great for wiping. It's free to download and includes quite a few other helpful forensic tools.
PALADIN is a modified “live” Linux distribution based on Ubuntu that simplifies various forensics tasks in a forensically sound manner via the PALADIN Toolbox. PALADIN is a complete solution for triage, imaging, examination and reporting. PALADIN is available for FREE. Ho...
💯 4
Avatar
Andrew Rathbun 2/26/2019 9:31 AM
Good to know, doesn't surprise me Paladin has a feature like that but that's not how I do it. That's the beauty of all this information sharing. I learn something new all the time from you guys. Plus, all of this info is searchable for those in the future to benefit from. Thanks for the info @Yap
😀 2
Avatar
Anyone have experience with email header analysis ? Looking for some guidance to compare one email to another
Avatar
If using Linux, you can use dd or dcfldd to wipe disks. There is also shred...
11:18 AM
Forensic examination of a manipulated email in Gmail to determine how it differs from the original. Both server metadata and email header are utilized.
Avatar
got a thumb drive with paladin on it i think
Avatar
thanks, i will take a look
1:14 PM
i reviewed the metaspike link earlier
Avatar
Andrew Rathbun 2/26/2019 1:15 PM
@RABIDFOX just curious, what did you use to make the flash drive bootable? I've been using Rufus portable a lot lately and that's been serving me very well
1:16 PM
I've had issues recently getting Paladin to be bootable so that's why I asked. Or at least those are the warnings that are shown when I try to image Paladin to a flash drive
Avatar
LinuxLive USB Creator is a free and open-source software to easily create Live USB
1:17 PM
i use this create my bootable thumb drive
1:18 PM
YUMI (Your Universal Multiboot Installer), is the successor to our MultibootISOs. It can be used to create a Multiboot Bootable …
1:18 PM
this for multiboot
Avatar
i cant remember i got it when i was trying to convert an EO1 to VMDK which was unsucessful until i used that imm2 virtual
Avatar
randomaccess 2/26/2019 1:32 PM
@RABIDFOX hecfblog had a post of wiping tools last year around August Dave has also done a lot of posts on using journal analysis to identify when and what was wiped, at least by name
1:33 PM
Also, something you could script is to create a series of VHDs, create files, wipe them with various utilities etc The good thing about making that is that anyone else can then use it to validate your findings
Avatar
yeah i was thinking about doing something along those lines that way its easier to replicate the data im using
Avatar
Beno 🇬🇧 2/26/2019 1:47 PM
So I run a LEA digital forensic unit UK, with the amount of devices seized and extracted and drives imaged and software such as cellebrite, magnet & griffeye to name a few and the mountains of GB produced what do you all use currently for reviewing and disclosure purposes
Avatar
Andrew Rathbun 2/26/2019 2:00 PM
@Beno 🇬🇧 at my old shop (LE) we stored mobile device images on a NAS. We stored computer images on HDD's and stored in our evidence room. What do you do currently?
Avatar
Beno 🇬🇧 2/26/2019 2:05 PM
All our material is on a secure network - storage isn’t a problem review and disclosure for criminal investigation is the issue
Avatar
We have a blank statement at the bottom of all our emails and SFRs regarding unused material not produced on disc, stating it's available for viewing on request from our viewing room. Officers can book in, defence / barristers can also view this material at our site but that's a lot more rare. Basically as long as you outline what you have extracted and put on disc, and more importantly what bits you have not done then you're on pretty good footing and there shouldn't be an issue there and we haven't hit a problem so far. @Beno 🇬🇧 (edited)
Avatar
@Beno 🇬🇧 In my last place we had this issue in regards to large/complex fraud cases. We had to change our processes as several barristers stated that is was no longer sufficient to just put a line somewhere (statement, MG form or whatever) saying theres a load of unused on exhibit ABC and come and look at it if you want. Under CPIA there is a responsibility to some extent on the prosecution to search the material properly for disclosure and for locating evidence, this also needs to take into account defence statements and reasonable keyword lists from the defence. In order to make this process feasible (due to the amount of digital data these days) we used an ediscovery/legal review approach where keyword response items where tagged using custom fields, eg evidenc, unused non sensitive, unused sensitive, reviewer name, description field etc. The workflow we used allowed data to be batched up and split between however many investigators were needed to get it done quickly - eg there are 20,000 responsive files to view, 1 person doing that takes months but 10 people doing 2000 each only takes a week or 2. The tool was web based so they dont need to visit a special room or use a special machine.
👍 1
12:27 AM
I will say though, it required a lot of investment in both time training people and money for hardware/software. It also required breaking away a little from the air gapped network idea, but we didn't have IIOC to worry about (at least, we didnt do IIOC specific investigations). For LEA its more tricky due to budget issues, worries about data leakage and cases often being 90% IIOC based
12:29 AM
Since we put this in, we never had any more questions about disclosure, we even had several positive remarks on how thorough it was from judges. In the cases we had they always went after the processes and not the evidence as such and this removed one area of attack immediately
Avatar
Yeah IIoC is the biggest thing preventing us from doing that right now, that and priority issues due to backlog, ISO and everything else. I can see us going down that road at some point, but right now we need to get over the hurdle of providing content on disc and getting a networked solution in place... which has been in the works for several years but is getting nowhere fast. Sounds like you have a very nice and mature process going on there @bizzlyg (Or had at your last place!).
👍 1
Avatar
sorry my typos btw, still adjusting to German keyboard 😂
Avatar
Gotta love the qwertz!
Avatar
@K23 yeah it took a while to get it running properly and efficiently. I can put you touch with someone if you ever decided to see how it could work at your place in future, just for a look at how it works etc
12:33 AM
Also the setup we used could def be tweaked and different products used instead of the one we went with
Avatar
That sounds like discussions that will need to be taken above my paygrade unfortunately. But if I get asked for an opinion on it I'll message you for the contact details and will try and put the idea in managements head...
Avatar
sure no problem
👍 1
12:36 AM
we helped out a few forces with fraud cases and did the DF work for them as the HTCU backlog was too big and full with more urgent/IIOC type stuff. I was always open to showing people the setup and discussing the good and bad bits openly. I am sure my successor wouldn't mind, for LEA especially
Avatar
Thanks, resources like that can be invaluable to pushing these things forward and making everyones lives easier
👍 1
Avatar
Beno 🇬🇧 2/27/2019 1:27 AM
Morning @K23 @bizzlyg we do have a networked solution currently. Being DIU I agree review disclosure is not our issue, ISO17025 is a major pain. BUT we have a responsibility to provide a review platform that allows the OIC to easily review, retain, reveal record evidence, unused, sensitive relevant material. I think the college or the home office need to grasp this issue
👍 1
Avatar
@Beno 🇬🇧 yeah thats what we implemented so our investigators could deal with disclosure of digital data properly. I can explain what we had set up if you want, just drop me a PM
Avatar
Hey everyone. In UK Law we have some sex offenders with orders that prevent them deleting internet history. I have a case where it has been believed some internet history from Edge was deleted as there is a gap in history of about a few weeks. I've had a look in Axiom and at the WebCache.dat and all the history is there - anyone got any advice?? I have no idea whether someone has deleted the history or if it could have happened some other way...the history is all there in the database :/
Avatar
@Rossko, what is the browser used?
Avatar
@Rossko I am a bit confused, you say it is believed the history was deleted but on examination its not deleted? I am clearly missing some other part of the story... where did the original belief come from? I assume its not just that it was never deleted and the belief was wrong, otherwise you wouldnt be asking the question 😉
6:42 AM
@mitchlang looks like Edge
Avatar
Hi, it's Edge yes. If you look on the browser itself there is a gap in recorded history, 1 record for example is april, then next is june, so one month missing. However if i look at WebCache.dat I can see search history during May
Avatar
ah ok gotcha, so there was a live check on the machine?
Avatar
I have virtualised it
👍 1
6:45 AM
it was seized on this basis however
Avatar
was just about to ask about virtualising
Avatar
I'm running BrowsingHistoryView on the VM and just trying to figure it out by manually deleting history and seeing what changes
Avatar
yeah I have not done much with Edge, best plan is test it out
Avatar
@Rossko you able to serve process of MSFT for that history?
6:47 AM
I've never done MSFT myself, but have had outstanding success with Google.
Avatar
You can sometimes assume deletion if you can see the unique index Ids created for the database table. If they jump from 100 to 150 then that's usually a good indication that something has been deleted as they auto increment. However, I have no idea what type of DB Edge uses!
👍 2
Avatar
good idea, I'll look into that one
6:49 AM
also, MSFT..?
Avatar
its probably an ESE database, being MS and all
Avatar
Microsoft
6:55 AM
I would have to confirm, but Google obviously retains all the history from chrome, Microsoft I am assuming does something similar.
6:57 AM
I would agree with @ducksprey if you could not get the complete history via court order.
Avatar
Was there any volume shadow copy available to be looked at ?
Avatar
Hmm not sure I'd be able to get MS involved as it's not a highly important job
7:04 AM
I've got to head off, thanks for your help though guys I'll keep you posted!
Avatar
What happens when you use InPrivate Browsing? Does that omit records from the history but still leave them in the DB? I have not tested this at all, just thinking out loud
Avatar
I had some training from Rob Attoe awhile back and InPrivate was taught to me....there is a flag set to 8 within some container tables stored at AppData\Local\Packages\Microsoft.MicrosoftEdge_####\AC\MicrosoftEdge\User\Default\Recovery\Active.
Avatar
good to know!
Avatar
I still need to analyse that one though 😄
7:08 AM
anyways I've got to head off I'll catch you guys about if you're about tomorrow. thanks again.
👍 1
Avatar
these entries in May , do they look any different in the DB than the others?
Avatar
randomaccess 2/28/2019 12:06 PM
A few things. Axiom will distinguish between parsed and carved records Browser history view to my knowledge won't be carving and will work on the database on a mounted image. Manually viewing the database (container 4) should show you the history as it is and you can use nirsofts ese database viewer to examine it, decode the dates etc
Avatar
Thanks. Yes now that I look at it, in Axiom the dates in May are coming from "File Offset 123434536" and so on, and not from any containers. The ones showing up in the actual browser are the ones that are still in containers. So it looks like the history has been deleted, however not overwritten yet.
2:22 AM
I'm assuming no but is there any way to know what action removed these entries from the containers..?
2:23 AM
And thanks Randomaccess - I'm now manually reviewing things in nir sofers ese database and yes it's only showing the live data which is still showing within Edge.
2:28 AM
One other thing of interest. There are a ton of entries for login.live,com www.bing.com secure passport.aspx - is that perhaps user activity being to microsoft or something...?
2:28 AM
being sent*
Avatar
Not sure where to put this exactly but a colleague stumbled across this recently https://gchq.github.io/CyberChef/ -could be quite handy!
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
👍 1
😄 1
4:02 AM
@Andrew Rathbun - maybe one for the resources list?
4:04 AM
nevermind just seen its already there 😂
Avatar
any NCA lads here
Avatar
Good Morning Y'all
✌ 1
Avatar
I've made about 50 photo's of a chat conversation. Do you guys know a tool which can import the photo's and for example uniquely number them so I use that to reference in my report?
Avatar
griffeye
Avatar
Never used it before. I'll have a look. tyvm
Avatar
You can import into Physical Analyzer
6:05 AM
Or just Hash the photos and rename them as the hash number
Avatar
np. It should be free for Law enforcement I believe
Avatar
Griffeye is free to only folks who work CP cases
6:05 AM
At least that is what I used it for about 2 years ago
Avatar
I think LE in general
Avatar
yeah LE in general, just sign up for an account
Avatar
All hail @Jay528 why didn't I come up with that myself.... 🤔
Avatar
Thanks, i learned it from this chat channel
Avatar
Griffeye is currently free for LE but it's a cut down version compared to how it was in the past. They have paid versions that include more features now. I think they got sold recently and is trying to make money back.
Avatar
Working a computer tampering case. User/intruder ran a powershell script which collected data from the pc’s on the network to include; serial number, computer name, model, manufacture, monitor name, monitor serial number, monitor manufacturer year. What good can that data do for someone?
Avatar
Hack into other machines connected to the network
12:28 PM
Or it might be microsoft seeing if you are pirating any software
Avatar
That is what I would think of the user trying to do
12:46 PM
See which other machines they can hack
Avatar
Yes, sounds like they are mapping your network
Avatar
it's an interesting choice of data to record
1:04 PM
I'd expect more interest in performance attributes of the systems than monitor serial numbers
Avatar
I didnt know it was possible to get the monitor s/n
Avatar
Joe Schmoe 3/1/2019 4:54 PM
Anyone come up with their own unique (cheap) Faraday cage? We have a small box now. It was fine for putting a phone in airplane mode but it's really difficult to process a phone. More and more phones can't be placed in airplane mode when locked.
Avatar
Arson cans worked well from my testing. Though you can't process, but you can get somewhere where signals are weak, like a basement
Avatar
randomaccess 3/1/2019 5:27 PM
@Joe Schmoe probably worth investing in a Faraday box and then some Faraday bags without windows.
5:27 PM
Esp if you're working with evidence...
Avatar
Joe Schmoe 3/1/2019 5:34 PM
@randomaccess We have the box. I just don't find it very useful anymore. More space would be helpful. Building a cage might be a little too much though.
Avatar
randomaccess 3/1/2019 5:34 PM
Oh right. Missed that sentence
5:35 PM
Ya. Cages are big investments
5:36 PM
I've never used the box to process a phone. Why is it harder? Isn't it just a matter of plugging in and then hitting dump?
Avatar
Joe Schmoe 3/1/2019 5:41 PM
It might be just mine, but more often than not the phone isn't recognized through the box. The window is small and hard to see through. Not to mention the gloves creep me out. They are hard to clean. 😀
👆 1
Avatar
randomaccess 3/1/2019 7:04 PM
Well you're meant to wear gloves inside the gloves so you don't have to worry about cleaning or tearing them
7:04 PM
Yeah the screen isn't great. Looking online it doesn't look like much movement has been made on improving the boxes either. Maybe the patent holder is dragging their heals
7:11 PM
I guess a workaround would be to get a bag that has a cable output in it And a bag that has a window And then use the box as an transition space. Cheaper than building a Faraday cage but much more fidly
Avatar
Forensic@tor 3/2/2019 4:35 AM
I use the Faraday box to disable all access to the outside world and then process it. Not much that's going to connect to with Wi-Fi Bluetooth and everything else turned off. In addition I remove the SIM card. I do all processing outside the box.
Avatar
NapsterForensics 3/2/2019 5:31 AM
Hi, Need a help, does whatsapp creates a backup db.crypt12 everyday even if we put the phone in flight mode?
5:33 AM
As I know, phone needs an internet connection to create a backup everyday at 2:00 am. Or am I wrong?
Avatar
NapsterForensics 3/2/2019 5:47 AM
I am wrong, Whatsapp creates backup everyday, even if the phone is in flight mode.
5:52 AM
However, I am using a pixel phone, it doesn't create databases for the 4-5 days. Why is that, I have enough storage space left on my phone. I don't understand how the backup thing works now. I will dig more and share if I found any valid reason.
Avatar
Was the phone powered on at 2am on each of those missing days? If the phone is switched off, it just skips that backup
5:56 AM
You're correct that a local backup doesn't require internet connectivity. If the phone is on cellular data, it will wait until wifi is connected to produce an online backup (by default)
Avatar
NapsterForensics 3/2/2019 6:02 AM
My phone wasn't off. Running all the time.
6:03 AM
First screenshot from WhatsApp Business db and second one is from the WhatsApp Db. Both these apps are running on the same phone. (edited)
Avatar
Joe Schmoe 3/2/2019 8:51 AM
@Forensic@tor. I ran in to a problem with WiFi. The phone connected to the Xfinity network and started updating when the box was opened for another phone. I'm going to see if I can have that network turned off.
Avatar
Forensic@tor 3/2/2019 8:55 AM
That is why I turn off everything in the box first. You will have to replace your router with a non Comcast box to turn that off. It is a separate broadcast from their box and no user settings available to turn it off. (edited)
Avatar
That's the point of the box but it's not possible on many newer phones without the passcode. They can't even be powered off. Anything these companies can do to make our lives just a little more difficult.
12:22 PM
I hate Comcast.
Avatar
Forensic@tor 3/2/2019 12:34 PM
I have yet to meet a phone I can't power off. Usually have to force into recovery and select power off from there. (edited)
Avatar
Joe Schmoe 3/2/2019 1:08 PM
I actually didn't think of that. It's a good idea. Generally I don't try because you are risking triggering secure startup. Not enabling airplane more annoying. Most of the time pulling the SIM will be good enough. It only takes one problem to cause a huge headache.
Avatar
Ya we do not turn phones off anymore due to secure startup and AFU mode.
Avatar
What type of analysis can be done to see if an email was spoof ?
1:05 PM
I took 6 samples of an email from the sender to recipient and compared the # of hops and it was about the same throughout the year until sender changed ISP
1:05 PM
All emails from sender that year was the same IP address
🤔 1
Avatar
headers?
👍 1
Avatar
Phishing scams are always bad news, and in light of the Google Drive scam that made the rounds again last week, we thought we’d tell the story of some spam that was delivered into my
1:38 AM
Here we give an example of what a phishing email looks like, and the necessary steps to take when analyzing and dealing with phishing attempt.
1:38 AM
There's some research on the topic, not typically forensic but might help get you started @Jay528 (edited)
1:39 AM
Don’t think that it’s just your banking details that are important: after all, if someone gains control over your account login they not only know the information contained in that account, but the odds are that same login information may be used on various other accounts...
Avatar
thanks
5:20 AM
i was looking at headers
5:20 AM
just not sure what type of forensic analysis can be done other than tracing
Avatar
Anyone know of the steps to search the dark web for CP on a mobile device ? I have a case where the defendant told my c/w that he searched for CP and my underage defendant search himself on his personal phone as well. Due to the nature of the case, I dont want to ask the underage the process. My defendant's phone is a Samsung S9 and I only have a file system/logical collection. Wondering if it is worth it to get a physical from CAS.
3:15 PM
Any artifacts or applications that might be of use ?
Avatar
Joe Schmoe 3/4/2019 5:11 PM
I would think it would start with Orbot or a similar app that uses Tor. If that's the case I don't think CAS will help with search history, but maybe some torrent files out something. @Jay528 (edited)
5:12 PM
Unless maybe it's a poorly coded.
Avatar
Andrew Rathbun 3/4/2019 8:43 PM
Maybe some of the @NW3C folks can chime in since they teach a dark web course
Avatar
We’ve had mixed results with forensic artifacts related to DW investigations. PM me so we can discuss specifics and get you pointed in the right direction.
Avatar
Question regarding cloud storage vs maintaining a server for approximately 400 people 2-3 tb per person. Looking for ideas and suggestions right now to provide staff with. I am thinking of QNAP server with expansions that will allow up to 1200 TB of data (does not have to be raided) which someone would have to maintaine within the agency. This can be encrypted and secured IDS/IPS/Firewall etc with its own line which will allow storage for the offiers and also allow them to create shareable links to provide AGs etc with the data. I know there is also cloud storage however some of these phone dumps are getting up to 100GB and that might cost more than the 100k ish for the sever..
Avatar
Sounds like a lot of storage! How are you protecting it/backing it up?
👆 1
4:48 AM
when I say protecting I mean from data loss due to hardware failure, as I see you already mentioned intrustion detection/prevention systems
Avatar
well we have a server with all digital evidence that we maintaine already
4:52 AM
this is mostly for storage for the officers with teh ability to create shareable links to transfer data securely as well
4:53 AM
if something crashes we have a backup
4:54 AM
but you have a good point regarding backup/hardware failure etc
4:54 AM
1200 raided would cost double lol
4:55 AM
I am providing them with that option as well
4:56 AM
the issue is sharing a 100gb phone dump accross the state
4:56 AM
besides driving or emailing a thumbdrive
👍 1
Avatar
At my last place we used StorNext from Quantum https://www.quantum.com/en/solutions/ but from what you said I think it might be overkill and not quite fit
Quantum technology and services help customers capture, create and share digital content, with the fastest performance for high-resolution video, images, and industrial IoT.
5:01 AM
since you already have something for the evidence
5:04 AM
I guess the advantage of cloud is you dont need to worry about backup, maintenance or time spent looking after physical hardware when it goes wrong
Avatar
Andrew Rathbun 3/5/2019 5:15 AM
@San4n6 in regards to secure file transfers, I know my agency currently uses kiteworks by Accellion
5:16 AM
Throwing something on an unencrypted flash drive and putting it in someone's computer is a cardinal sin. Kiteworks effectively replaces that
5:16 AM
That being said, that may be an option to look into?
Avatar
I agree 😃
Avatar
we used this for transferring stuff https://www.egress.com/
5:34 AM
worked alright generally
Avatar
I have a qnap set up that we run in the lab for encrypted file transfer that works well but we need more storage for offiers in general
Avatar
sorry I meant sharing rather than transferring
Avatar
I understood
5:54 AM
thanks for the tips guys
5:54 AM
I am writting this up and they are not going to like the costs lol
Avatar
Doesn't AWS provide gov't solutions for cloud storage ?
5:57 AM
Much easier to upload/download imo
Avatar
@Jay528 Yes, AWS does offer the GovCloud which is CJIS complaint. But it would be about $2000 a month just for 50tb of storage and that is not including transfers. @San4n6 I would say physical hardware on premiss is going to be a lot cheaper. Still expensive but cheaper in the long run.
Avatar
o damn
Avatar
Regular AWS is still FedRamp medium and extremely secure but it does not have the CJIS certificate
Avatar
Would that be cheaper ?\
Avatar
I was looking into AWS prior to purchasing our server.
6:28 AM
Yes it is, consumer AWS is $0.023 per GB a month for the first 50TB and GovCloud is $0.039
6:29 AM
Detailed information on Free, Storage, Requests and GovCloud pricing options for all classes of S3 cloud storage
Avatar
gokolorie1 3/6/2019 5:38 AM
Hello all, I am a post graduate student in digital forensics and computer security, I'm considering an area for my dissertation. Your kind suggestion and advise is appreciated please. Either mobile phone or computer forensics. You can e-mail me on my private on gokolorie1@derby.ac.uk Thank you
Avatar
Instagram allows users of the platform to download their own data report. If you haven't tried it, this is how to do it.
5:44 AM
Not sure if we can pin this kinda stuff
5:44 AM
thanks @K23
👍 1
Andrew Rathbun 3/6/2019 5:54 AM
Avatar
Update your Google Chrome browser immediately to patch a new high-severity zero-day RCE vulnerability (CVE-2019-5786) that hackers are actively exploiting in the wild
8:56 AM
Google's Project Zero researchers find a potentially powerful privilege-escalation trick in how Macs manage memory.
Avatar
buggy cow. Always wonder who comes up with the names for these!
2:20 AM
so named for Copy On Write
2:20 AM
COW
Avatar
That makes more sense
2:26 AM
Shows I needed to read the article in a bit more depth and not just skim it 😆
Avatar
haha, yeah interesting naming ideas. Seems this one, whilst theoretically serious, isn't so easy to exploit - at least from what I understand reading the article
Avatar
yeah doesn't seem easy
2:31 AM
it's probably a, very specific set of circumstances in a lab environment with no outside pressures or complexities
2:32 AM
still serious but probably not likely to come across our desks 🐄
Avatar
That's what quite a few of these tend to be like to be honest. Like Spectre, that was never seen in the wild but was potentially very serious, especially for those using cloud services like AWS etc
2:34 AM
probably not on the scale of like, wannacry
Avatar
Not quite
Avatar
cool names though
2:42 AM
if I ever find a bug I'll be sure to name it something cool
Avatar
Think it's a requirement for bug finding. That and making a snazzy logo for it
2:45 AM
2:46 AM
😂 2
Avatar
All that's left is to actually find a bug 🤔
👍 1
2:59 AM
Unfortunately I think there are a lot of people a lot smarter than me who may find them first
2:59 AM
😂
Avatar
Same here. I'd love to do that kind of research, but would need to up my coding knowledge and find the time... Unless you're being employed by someone to find them, or get lucky with some of the grants companies provide for finding bugs in their software it's a hard thing to justify time wise
Avatar
pretty much!
3:16 AM
I'm just getting into cyber now so unfortunately I have to learn
3:16 AM
javascript
3:16 AM
😭
3:16 AM
(javascript isn't that bad I just have a dislike for it)
Avatar
Yeah javascritpt, PHP and Python are the ones I'll be going for. Ruby is apparantly worth looking into as well. Also want to do a bit of playing around with docker etc for devops. All homelab projects!
Avatar
PHP is the main part of these phishing kits for sure
3:22 AM
I've not tried docker but I've heard good things (never had much of a use case?)
3:22 AM
but I guess now apache with PHP etc could be one...
Avatar
Yeah it's more infrastructure stuff. Containers as an equiv to VMS. Tends to be used a lot in software development but can also be used for infrastructure, especially if you are looking from a devop perspective - so automating infrastructure
Avatar
yeah basically
Avatar
Deleted User 3/7/2019 8:07 AM
Docker is great, makes it easy to distribute prerolled environments to other people as well (edited)
Avatar
@Sudo javascript makes the world run lol; embrace the suffer
Avatar
I've got an .eo1 of a purism laptop which has an encrypted container inside, I haven't dealt with one of these encrypted linux machines before. Anyone here have experience with one?
Avatar
what exactly is encrypted? the partition? a directory? a file?
12:37 AM
Since you're talking about purism laptop (which is running PureOS), I would guess the partition
Avatar
Also, PureOS is based on Debian, so my guess would be that the encryption is LUKS
Avatar
sounds like LVM probably
8:48 AM
LUKS as Karamba says
8:48 AM
I believe you can mount it with a tool (though you'd need a password)
8:49 AM
also question: are there a lot of TOR exit nodes in Nigeria?
12:27 PM
Historical search (based on IP) https://metrics.torproject.org/exonerator.html
Avatar
anyone have like a document or something that lists all the email headers and their meaning?
3:08 AM
nevermind just found one haha
Avatar
Is there a “code” I can use on a locked iPhone to reveal the phone number. The SIM is not ‘talking’ to my cellebrite.
Avatar
Emergency number
11:59 AM
But not working in airplane mode 😅
Avatar
@tankboy855 Out of curiosity, did you try putting the SIM in the slot for full size SIMs? For some reason the nano SIM slot keeps failing on our adapters.
Avatar
@Joe Schmoe OMFG! You win the Internet! Worked!!! Thanks! You saved so many subpoenas!
💯 2
Avatar
@Joe Schmoe email CB support - they'll send you replacements
Avatar
@tankboy855 Glad to hear it!
12:45 PM
@Jay528 I'll have to do that. It seems to be common. The old adapter from our Touch did that. I have two that are about 6-8 months old and they both have that problem already. (edited)
Avatar
ask for replacement cables as well, i ask for 100 and 210
12:46 PM
wear and tear
Avatar
any guys here from Coventry? Gimme a shout if so!
Avatar
Just confirming; no way to restore iPhone to factory settings without Apple ID and PW? Have one on forfeiture but it’s useless unless I can reset it...
Avatar
Email Law Enforcement Assistance at apple, they should be able to help you reset the phone. Is that what you mean ?
Avatar
It's possible to restore it to factory but you won't be able to activate and use it unless find my iphone was turned off or you know those data
Avatar
@tankboy855 i sent you a DM
Avatar
Quick question. Does android have a .db file specifically for DCIM content from the device's camera? If so, what is the typical .db file name?
Avatar
got a stupid question here ive got two wifi configurations and they both have the same MAC address does this mean its from the same IP so its in the same building or does it mean something different?
Avatar
taking a guess... same router with 2.4 and 5 gz
👆 4
👍 3
Avatar
yeah ones talk talk the others for an inn so im guessing ones for pub users and theres obviously a second one for those paying for lodging
Avatar
The newer routers are also able to create a guest SSID
Avatar
yeah ones a guest account
3:48 PM
thanks anyway jay
Avatar
np, i didnt do much
Avatar
Extracting BitLocker keys sealed with a TPM by sniffing the LPC bus
6:09 PM
someone posted this on the IACIS list
Avatar
Sorry a bit oot
6:32 PM
What is the advantage for company have own threat hunting team compare with outsource to threat hunting services ?
Avatar
Our threat based intelligence group is specific to our environment. What makes APT such a threat is that it is customized to your own environment. The initial drop, C2 and so on may be common amongst campaigns, but the recon and specific methods of targetting are unique to our environment, and thus we need to fine tune our approach to defense.
6:57 PM
This of course requires in-house expertise and does not come cheap - 3rd party intel solutions are cheaper initially of course until you want to throw some resources at the finer details of attacks specific to your own environment.
Avatar
My name is Megan Needham, I am a PhD researcher and part time lecturer at Staffordshire University. At Staffordshire University, we are conducting research on behalf of the Transforming Forensics Digital project, to establish the impact that digital forensics analysis has on improving criminal justice outcomes. After an extensive literature search, no literature has been found within this area. Therefore, the research team are inviting you to voluntarily and anonymously contribute to this project by providing information about your knowledge of research in this area. It is a short survey which will only take 5-10 minutes of your time. If you would like to participate, please can you complete the Qualtrics survey via the following link. http://staffordshire.eu.qualtrics.com/jfe/form/SV_6nEFrjJHadbfhEV We appreciate your participation.
👍 2
Avatar
Andrew Rathbun 3/18/2019 5:52 AM
Done.
5:54 AM
I'm always willing to do a survey for academic research. I was in your shoes once (not as high of an academic level) so I know how tough it is to get responses. Every response counts!
Avatar
Thank you, really appreciate it!
Avatar
Anyone know anything about blackbag? We had it one time and I do not have any training or knowledge about this product. Let me know thanks.
Avatar
What was the term in which iOS devices run deletion ? Is it Garbage collection ?
Avatar
Andrew Rathbun 3/18/2019 7:30 AM
@Jay528 Garbage Collection and Wear Leveling are a flash memory thing, to my understanding. General concepts not specific to iOS
Avatar
Got it
7:31 AM
thanks
Avatar
Andrew Rathbun 3/18/2019 7:31 AM
@spoon1997 Macquisition is considered one of the better OSX acquisition tools. I've also heard Blacklight is good for iOS and OS X images
7:31 AM
Those are both products by @deleted-role
Avatar
@Andrew Rathbun thanks man
Avatar
Andrew Rathbun 3/18/2019 7:36 AM
Wear leveling Magnetic storage media has an indefinite working life because the platter coating does not wear and the read/write heads never contact the media. As storage techniques emerged, there was no problem writing and over-writing the same places on magnetic media when data changed frequently. These so-called "hot spots" had no real impact on magnetic disk reliability. However, flash memory cells have a finite working life and can fail after several thousand program/erase (P/E) cycles. This poses a problem for SSDs because allowing some write-intensive applications to erase and rewrite the same series of memory blocks -- while other memory blocks remain relatively untouched -- cause flash memory cell failures far sooner. The technique of wear leveling spreads out new P/E cycles across the entire space of the flash chip. Wear leveling doesn't make flash chips any more reliable but spreading the usage can help avoid storage hot spots that might cause failures much sooner. Garbage collection Flash memory is organized into blocks comprised of a series of pages. Data can be written to pages anytime as long as the page is unwritten or erased. However, flash memory cannot erase individual pages within a block; the entire block must be erased before the pages within the block are freed for re-use. This means that changed data winds up being written to subsequent pages within the same block. To free the old pages and preserve the updated pages, the current pages are first copied to another available block, while the old or unneeded pages -- the "garbage data pages" -- are discarded. So the newly written block winds up holding just the current pages and the prior block can be erased and freed for re-use. The SSD garbage collection process in flash memory is almost always implemented in concert with wear leveling.
👌 1
7:36 AM
Just so we all have a fresh reminder of the difference in the two
7:36 AM
Since this is all perishable knowledge
Avatar
much appreciated @Andrew Rathbun
Avatar
Not necessarily relevant here, but Garbage Collection is also a term used by some programming languages/systems. In the context of, for example, a Java program, Garbage Collection would affect the longevity of objects related to that program in memory
7:45 AM
Not necessarily relevant here, but Garbage Collection is also a term used by some programming languages/systems. In the context of, for example, a Java program, Garbage Collection would affect the longevity of objects related to that program in memory
7:46 AM
@Andrew Rathbun 's explanation of the two concepts is probably more relevant in forensics than the internal workings of an individual program!
Avatar
Andrew Rathbun 3/18/2019 7:55 AM
https://searchvmware.techtarget.com/tip/How-are-SSD-garbage-collection-wear-leveling-and-TRIM-different is the source for the explanation, I will not take credit! Just my Google Fu!
👌 1
Avatar
Anyone have a recent pinterest search warrant template?
Avatar
@Andrew Rathbun great information on Flash translation layer activities; when i teach the block on that I usually get many orbs of glass staring back at me! but it's the new standard in forensics, from mobiles; laptops, etc SSD NAND based media is the go to. and just when we get a grasp on those two concepts, we get to throw in things like wear leveling and ATA Trim from the OS; which seems quite pervasive in APFS and Mojave
Avatar
anyone recommend specific hardware requirements to run various software such as cellebrite, encase?
Avatar
@Krisaytha thank you
Avatar
Whether you're new to the industry or a seasoned pro, you'll find content here to learn something new in the fields of cyber security, digital forensics, ediscovery, and risk management.
8:59 AM
these of course being the recommended; in the world of processing data; it never hurts to have more available; as it will allow more efficient use of your most important resource... time. Also one of the biggest hurdles I've faced is having to build a machine which will continue to perform for 5 years in some cases; requiring it to be over engineered in the beginning only to fall legacy towards the end of the life cycle
Avatar
Andrew Rathbun 3/19/2019 6:29 AM
Does anyone out there happen to have a repository of sanitized federal SW's and Preservation Letters handy for some of the bigger companies? PM if you do and are willing to share
Avatar
Adam Cervellone 3/19/2019 12:27 PM
How do you write block a network connected external drive? The only ports it has are for a power adapter and ethernet.
Avatar
Does changing the registry key work ?
12:30 PM
I heard the TD3 is able to write block the network connected drives.
12:30 PM
I've never used it
Avatar
Adam Cervellone 3/19/2019 12:32 PM
Which registry key do I need to change?
12:32 PM
Would Paladin or another forensic linux bootable block it by default?
Avatar
Andrew Rathbun 3/19/2019 12:33 PM
Kali Linux has a forensic mode which blocks writes (edited)
12:33 PM
Wasn't someone mentioning how Paladin has a format option and therefore isn't read only?
12:33 PM
Might've been another linux distro
Avatar
In the corporate world, a lot of time is spent on locking down computers to minimize the risk of confidential information leaving the company....
12:34 PM
are you live imaging ?
12:34 PM
or unplug the external drive?
Avatar
Adam Cervellone 3/19/2019 12:36 PM
The drive is seized evidence so it is currently unplugged from power and network.
Avatar
It is probably raided
12:40 PM
No USB port
Avatar
Adam Cervellone 3/19/2019 12:44 PM
Nope. During the on scene work, the computer it was connected to was password locked, The suspect lawyered up immediately and didn't give us a working passcode.
12:45 PM
So i never got to preview what was on the drive while it was connected and running.
Avatar
@Adam Cervellone Is it not possible to take it apart and image the standard drive(s) using normal methods? (edited)
👍 1
Avatar
@Andrew Rathbun Paladin can mount drives as r/w but all drives (other than the bootable media) will be unmounted by default. You can then explicity mount as r/o through Disk Manager or Paladin will automatically do it for you if you select the drive as the source for an extraction
👍 1
Avatar
Anybody using @Magnet Forensics Automate or Review?
Avatar
Can anyone assist me: I'm using ffprobe to output video/audio files as XML, and want to then display the output as a sortable spreadsheet (just as Excel will import it as an 'xml table') without using Excel. Any ideas/insight?
Avatar
Python script? Python can ingest xml and output excel spreadsheet files
Avatar
Andrew Rathbun 3/21/2019 5:14 AM
Are there any other vendors that should be invited here? I think we have most of them invited at one point or another. I obviously can't force any vendor to join and be active but I can at least try. It's been probably since last summer since I did a substantial vendor recruiting push. If there are any, let me know and I'll reach out
5:15 AM
I just reached out to Berla again for the first time in probably 9 months or so
Avatar
Andrew Rathbun 3/21/2019 5:26 AM
I'll try AccessData folks, too
Avatar
Is anyone from Elcomsoft represented here?
Avatar
Andrew Rathbun 3/21/2019 5:27 AM
Don't think so
5:27 AM
Passware has one or two people here, don't know the last time they've logged in though
5:28 AM
Same with EnCase, but who knows what that company is up to nowadays since being bought out by OpenText
5:31 AM
I reached out to AccessData via email
Avatar
ADF Solutions ?
Avatar
Andrew Rathbun 3/21/2019 6:06 AM
Never heard of, what do they do?
Avatar
ADF Solutions has a Triage program used to scan devices for low hanging fruit.
6:11 AM
Similar to OS Triage
Avatar
Similar but different. It's very good for child porn case. Can use hash set and different options for acquisition
6:15 AM
and analyzes
6:16 AM
Also good for keyword search
Avatar
If anyone has used the new OS Triage can you pm me thanks..
Avatar
@Andrew Rathbun You can contact Elcomsoft. They also contribute a lot in /r/smartphoneforensics on reddit
Avatar
I agree that ADF would be good to have here. We use their triaging software and have found it to be very good
Avatar
Andrew Rathbun 3/21/2019 8:13 AM
@Goovscoov I know I've reached out to them before but apparently no luck
💯 1
8:13 AM
I will send out invites to ADF and Elcomsoft
Avatar
Andrew Rathbun 3/21/2019 8:20 AM
Sent
👌 1
Avatar
Hey all
9:39 AM
Do any of you know if Microsoft Groove has logs or forensics
Avatar
Adam Cervellone 3/21/2019 1:41 PM
@bizzlyg That is something I've contemplated but we have run into issues where the drive data is encrypted or otherwise inaccessible when not connected to the controller board of the enclosure.
Avatar
@Andrew Rathbun I've got a solid contact at ADF I'll give him a call tomorrow and see if they want to hop in
👌 1
6:40 PM
Lol well then I keep reading after a NIST meeting all day and see you e already reached out 😂
Avatar
@Andrew Rathbun I can try to dig up my contact from the FBI who was heading up the dev of OSTriage after Support stopped for it.
Avatar
Andrew Rathbun 3/21/2019 6:47 PM
Hey guys reach out to any and everyone. I don't care if efforts are duplicated. Let's make a solid attempt to get them in here. Can't force them but we can give it an honest effort.
Avatar
I'm about to email Rob Attoe from Spyder Forensics, I'll ask if he wants in too.
Avatar
Forensic@tor 3/22/2019 4:10 AM
I invited FinalData to the party. They did me a solid, giving me a full 30 day demo of Final Mobile. (edited)
Avatar
Andrew Rathbun 3/22/2019 4:38 AM
@Rossko @Forensic@tor Thank you for taking the initiative 👍
Avatar
@Andrew Rathbun do we have anyone from Arsenal on here? I couldn't find anyone; I'll reach out and see if anyone wants to join
Avatar
Andrew Rathbun 3/22/2019 6:08 AM
@Krisaytha not to my knowledge, feel free to run with it
Avatar
already ran 😂
👍 2
Avatar
Deleted User 3/22/2019 8:34 AM
Just curious, does anyone here participate in any device/OS beta programs to get early warning of changes that we might all face? For example, the Apple Beta program
Avatar
@Deleted User I'm in a few; but we'll need to move this to Direct messages
Avatar
Andrew Rathbun 3/22/2019 10:31 AM
Thanks for joining @Arsenal
👍 1
Avatar
Anybody have a recent Facebook preservation request example in which they needed FB to not notify the user as well as the subsequent warrant for user and account info with the same restrictions? This case involves guns so I don’t want FB to inadvertently blow my cover and have suspects destroy evidence. If anyone has their template or copy of the warrant, I would be extremely grateful. If you wish to be so helpful, you can email me at christopher.crayne@state.mn.us Thank you very much!
Avatar
Andrew Rathbun 3/22/2019 12:30 PM
@IamGroot! don't you not need any paper for Facebook preservation letters? I thought it was all done through their online portal
12:31 PM
In my previous job, we had non-disclosure orders as standard language with any legal process
Avatar
@Andrew Rathbun Yes, I’m in complete agreement on the non-paper preservation piece, but didn’t know if that had changed recently. Based on the non-disclosure piece for a subsequent warrant, looking to see if someone had a current template or copy of a recent Facebook warrant that included the non-disclosure language, amongst other things.
Avatar
Andrew Rathbun 3/22/2019 12:41 PM
Yeah hold on, let me check
12:42 PM
IT IS THE ORDER OF THIS COURT that Microsoft SHALL NOT DISCLOSE to the subscriber of the IP addresses listed above of the receipt of this search warrant and/or the disclosure of the requested information, as such disclosure may hinder the ongoing investigation.
12:43 PM
That was the standard boilerplate language used on 100% of my search warrants to every provider
12:44 PM
Change Microsoft to Facebook and you're golden
12:45 PM
Rinse and repeat for future legal process to other providers
Avatar
the hashcat gui is really useful
Avatar
@Andrew Rathbun thank you for info. I really do appreciate it. I have Friday brain fry.
Avatar
Andrew Rathbun 3/22/2019 1:12 PM
No worries, that's the beauty of this server. We all can't be on top of everything in this field. Hope the language serves you well!
1:12 PM
Naturally, check with your local prosecutor/DA/whatever you call it in your area to make sure that lingo will fly. It worked fine in our jurisdiction
Avatar
Andrew Rathbun 3/22/2019 1:37 PM
Does anyone know how to get ahold of customer support for EnCase besides doing a ticket through OpenText? This has been a huge headache for me. My dongles are way out of date and need to be updated. I can't seem to get anyone to respond.
Avatar
@Andrew Rathbun I did but it took few hour before they send me an email
Avatar
Andrew Rathbun 3/22/2019 1:54 PM
I've been wrestling with them all week. Which email address did you use?
Avatar
I've navigated the new OpenText maze several times. Submit a ticket through their support website and once you get that email, you're dealing with a direct human. Phone number and everything. And don't let the ticket resolve until everything has been answered
1:55 PM
I get responses within a few hours, and then it's you and a human
Avatar
Andrew Rathbun 3/22/2019 1:55 PM
I do have a ticket going but I think the representative is toying with me lol. We've been back and forth in emails and I've explained the issues multiple times in multiple ways but nothing is budging. I throw my digits at her to call me but I've not received a call yet. It's like pulling teeth
Avatar
for sales you'll be dealing with opentext, but if it gets technical you'll get some familiar nanmes from tech supports answering and they rock (former guidance0
Avatar
Andrew Rathbun 3/22/2019 1:56 PM
OpenText maze is accurate. That site was not implemented with EnCase users in mind at all
Avatar
yeah
1:57 PM
once you do get your dongles in the system it works quite well. I've built three SAFEs since the transition, and beyond the initial new cut license email it's all self-service.
1:57 PM
learning x-ways from scratch was easy by comparison hah
😆 1
Avatar
Andrew Rathbun 3/22/2019 1:59 PM
I still am very curious what the future holds for EnCase. The closest regional training office for Guidance closed within the last 1.5 years or so. EnCase is rarely updated anymore. IDK, writing seems to be on the wall
Avatar
yep - opentext has a reputation for milking maintenance contracts. our 3 year SMS comes due next year and will be interesting to see what nonsense they pull.
Avatar
Andrew Rathbun 3/22/2019 2:00 PM
All I know is I have 4 EnCase dongles and none of them work because the license files are way out of date. Would be really nice to get this figured out so I can work 😃
Avatar
Matt shannon is receptive to suggestions with f-response, I've tested it several times, but unfortunately for our use case, ~150k encase enterprise licenses they are not quite there yet.
2:02 PM
you trying to do some decryption?
Avatar
Andrew Rathbun 3/22/2019 2:02 PM
Nah nothing special. Just want to process some evidence and whatnot
Avatar
Looking for some varying opinions. My agency is looking at getting new forensic workstations for mobile and computer exams. They were looking at the Forensic Dedicated workstations such as FREDS or Sumuri or Forensic Computer. It appears that could build a custom computer through some companies that aren’t dedicated forensics for similar price possibly better specs. What is everyone’s thoughts custom or forensic designed?
2:23 PM
@Forensic@tor do you use Cellebrite on it? Any issues with drivers and such?
Avatar
I build my own - I get as much CPU, RAM and SSD I can get per budget costr
2:24 PM
but I run Windows 10
2:24 PM
all tools work, including Blacklight
2:24 PM
for OSX
Avatar
@Sir No1 that is what I was thinking, custom building it as it would be better specs for budget.
Avatar
HP Z2xx, Z4xx or Z6xx are the models we use. I have a Z620 as my primary and solid
2:25 PM
what's your $s budget per workstation?
Avatar
I’ll have to look into those model numbers
2:25 PM
Haven’t gotten official budget but I believe around 5k (edited)
Avatar
$2k-$3k is the z2xx range, and then +$2k from the 4xx and 6xx
Avatar
Forensic@tor 3/22/2019 2:26 PM
MacPro gives you access to the MacOS for apple based investigations (edited)
Avatar
ooh can buy a lot of workstation if you have $5-$7k per unit
Avatar
Yeah I’d say about 5k per unit
Avatar
ncie, go to HP and spec out a Z6xx workstation or Z4xx.
2:27 PM
it's fun to spec them out
Avatar
Yep! I enjoy it, thank you for the recommendation.
Avatar
Andrew Rathbun 3/22/2019 2:27 PM
We have HP Workstations too
Avatar
Is there a big difference between Z6 or Z4 just base specs?
Avatar
fortunately nothing uses GPUs yet so spend that surplus on a nice 38" curved 😉
👍 1
2:28 PM
upper limits of memory, but mostly it's on how many drives you want to throw at it.
Avatar
Perfect! Time to go play on the builder!
Avatar
cool, see ya in an hour hah
Avatar
Andrew Rathbun 3/22/2019 2:30 PM
We use MacBook Pro's for on scene work too (edited)
Avatar
Speaking about hw specs for jobs like this. What would be a better option? An older workstation with older Xeons 8/16 or dual 6/12 threads or the most current regular i7 but with higher clock speed? (edited)
2:40 PM
Decent spec'd HP or Dell workstation with Xeons based on sandy or ivy bridge, with 64GB of RAM are quite reasonably priced, refurbished ofc (edited)
Avatar
randomaccess 3/22/2019 3:45 PM
Don't bother getting dual xeons. Our tools don't utilise them properly
3:45 PM
Ram is your main priority. As well at nvme and raid for speed and high storage
3:46 PM
I have 128gb ram, 1tb nvme, and 4tb raid. Works pretty well :)
Avatar
Ok, but still, older, slower, single Xeon 6/12 threads or rather some modrrn one with 8 threads but with higher clock and turbo. How big of a difference can there be, assuming you have enough ram and decent storage solution, nvme, raid etc
3:59 PM
IPC difference itself is 30-40% percent or more but how this translate to tasks like this. I feel like generating a report takes the most time. (edited)
Avatar
@Jobbins I’ve got a Sumuri Talino machine that I received from a training. That same facility now uses Freds. I’ve also built my own with ASUS motherboard, 64GB RIPJAW RAM, Intel i7, Windows 10, 1-500GB SSD for Windows, 1-500GB SSD for FTK postgres, 1 TB SSD for miscellaneous, 4 deck 8 TB HDD RAID 10, RAID card, MSI GTX 1070 graphics, forensic multimedia card reader, UPC, Blu-Ray w/r, etc., hot swap drives, workstation case, and more. Cost me about $5500 total with parts coming from NewEgg, Amazon, & Micro Center. Same setup from Digital Intelligence or Sumuri would cost well over 10k.
Avatar
@IamGroot! When possible could you give detailed list of components used to build your machine? The price is interesting.
Avatar
@FabianoQ Sure. When I’m back at work tomorrow, I’ll dig out the spec list for the machine. You want me to email it to ya or list it here?
👌 1
Avatar
Please list !
Avatar
@IamGroot! I think also others in the list may be interested, expecially if you confirm that the rig you built is stable and gave you no problems with the usual forensic softwares. Thanks.
Avatar
@IamGroot! I would be interested in this as well
Avatar
Any CDR gurus it there? I'm trying to figure out the difference between SMSC and SMSMSC in TMobile records. The latter has tower information so I want to make sure it's accurate.
Avatar
Andrew Rathbun 3/25/2019 6:30 AM
Have you reached out to T-Mobile's LE number and asked for clarification? Or did they provide a guide for their records?
Avatar
I haven't yet. I just mapped the records. Typically T-Mobile is voice only for location information but I noticed some of the text messages have the tower info. (edited)
Avatar
Does anyone have a power bank/charger for apple devices ? You would take out the battery and plug it directly into the phone ?
Avatar
@FabianoQ rig is stable and I use FTK on it with little to no issues other than occasional operator error. Also have Cellebrite PA on it and the Talino. Busy Monday. I will try and post specs tomorrow morning prior to executing multi-location warrants.
Avatar
I am building a new forensic machine and was wondering what graphics card you all would recommend?
Avatar
Andrew Rathbun 3/26/2019 6:00 AM
Do you do lots of password cracking? What's your budget?
Avatar
Not at the moment but I would like to have the hardware if needed. I would say $1500-$2000 for the GPU (edited)
6:07 AM
Judging from those benchmarking results, it's probably most cost efficient to get a couple either 1080's/1080TI's rather than one 2080
6:09 AM
However, be wary of supply shortages and inflated prices. I bought my 1080TI back in late 2017 for $799.99
6:09 AM
You shouldn't pay more than that. Check NewEgg, Amazon, anywhere
Avatar
Here is the build sheet with current links. There is more updated and powerful hardware out there. This is what I used to build my tower about 1.5 years ago. Works great with no issues. Let me know if you have any questions.
👌 1
6:23 AM
@goalguy @FabianoQ @scott h @Jobbins posted the build sheet. Since you would be saving so much money, I would recommend spending more to get 128GB RAM. I upgraded my own RAM in the Talino and it is fast. Cellebrite still crashes occasionally, but that’s a Cellebrite issue. (edited)
👍 1
Avatar
@IamGroot! awesome!! I appreciate that!!!
Avatar
Thanks @IamGroot!
Avatar
Thanks @IamGroot!
7:27 AM
This is the hardware I was referring to apple devices
Avatar
Forensic@tor 3/26/2019 7:30 AM
@Jay528 I use this...it is great. No need to remove the battery. https://www.dhgate.com/product/all-in-one-professional-phone-current-test/421264229.html (edited)
repair cell phone, cell phone repair las vegas and cell phone repair shops are on sale! Do not miss the special opportunity, just show the type of chances you can take. kaomianjin gives the super all in one professional phone current test dedicated power cable battery chargin...
👍 1
Avatar
it is cheap enough to purchase out of pocket but bank account is closed
Avatar
That could save me a lot of time swapping batteries out... Nice one
Avatar
Forensic@tor 3/26/2019 7:35 AM
@Jay528 Your bank or theirs? If theirs...just google that model...can find it all over the place.
Avatar
personal bank
7:35 AM
lol
7:35 AM
ill see if its on amazon
7:36 AM
much easier for my agency to purchase
Avatar
Forensic@tor 3/26/2019 7:36 AM
Several models exist so make sure to get the one that powers up to iPhone X
Avatar
Where do you connect the power to ?
Avatar
Forensic@tor 3/26/2019 7:38 AM
@K23 I found it after I caused a battery explosion trying to remove one. Barely nicked it.
Avatar
Sorry, not familiar with this kinda stuff
7:38 AM
this one for iphone X
7:40 AM
@Jay528 That one works, but more expensive than the one I linked above. Your specifically mentions the XR and XS phones....so maybe a better buy. (edited)
Avatar
Just spoke with my boss and it might be better to buy the battery because of the unlocking time
Avatar
Forensic@tor 3/26/2019 7:48 AM
@Jay528 Are you needing a solution to maintain power while attempting password bypass? Or to facilitate data extraction? (edited)
Avatar
Both, this would work on a consent search where we know the password
Avatar
Forensic@tor 3/26/2019 7:50 AM
I use that device when the battery is not functional and need to maintain power for extraction.
Avatar
My plan is to buy 2 batteries for all the iphones that came out
Avatar
Forensic@tor 3/26/2019 7:51 AM
I use a divided power hub for long term power needs, such as bypass when it may take some time to complete. For this purpose we use this: https://www.amazon.com/10-Port-Charging-Station-Storage-U280-010-ST/dp/B017KXQOJA/ref=asc_df_B017KXQOJA/?tag=hyprod-20&linkCode=df0&hvadid=309818716690&hvpos=1o2&hvnetw=g&hvrand=16936796593124463194&hvpone=&hvptwo=&hvqmt=&hvdev=c&hvdvcmdl=&hvlocint=&hvlocphy=9011541&hvtargid=pla-492857851909&psc=1. It allows us to label the device and put them between the dividers. (edited)
Amazon.com: TRIPP LITE 10-Port USB Charging Station Dock with Storage Slots for Tablet iPhone iPad & Laptops (U280-010-ST): Computers & Accessories
7:54 AM
i have 6 of these
Avatar
What does everyone use to verify files when they move form usb or external HDD to storage server?
Avatar
Teracopy is good
👆 3
Avatar
Paid program is SafeCopy
10:20 AM
TeraCopy or Robocopy
Avatar
another vote for teracopy here ✋ 🙂
Avatar
Thanks. Teracopy looks decent.
Avatar
Hey All, I work for a sheriff's department and we are moving our two man forensic team to a bigger area in the hopes that we will get some more help soon. We have a limited build out/furniture budget. Is there anything that you guys have done in your labs that has made an improvement in your work/workflow? Any suggestions for desks? chairs etc.....
1:50 PM
Thanks in advance for any opinions.
Avatar
Andrew Rathbun 3/26/2019 1:51 PM
@ds275 I would highly recommend adjustable height desks. Great for your posture and overall wellbeing. There are anywhere from cheap to expensive ways to do it. You can get creative but I would wholeheartedly recommend them. I type this message to you standing up 😃
Avatar
Any brands you like?
Avatar
Andrew Rathbun 3/26/2019 2:02 PM
@ds275 https://www.reddit.com/r/StandingDesks/ would be your best bet for researching brands. I have a pretty expensive brand (Uplift) at home so I wouldn't recommend it for the budget conscious. You could always find adjustable height legs somewhere and install them to any tabletop you can find. Or you can buy something from VariDesk or Uplift or any of the other brands. I know any office furniture company will have adjustable height solutions available. However, the DIY route/not going through an office furniture company might be cheaper. (edited)
Avatar
RubberDucky 3/26/2019 2:37 PM
Hi, thanks for the invite. I’m most interested in learning firmware forensics.
2:44 PM
I do not see a channel specifically on firmware, which alternative is most suitable ?
Avatar
Andrew Rathbun 3/26/2019 2:44 PM
Currently there is none. This is probably the best channel since it's a general channel (edited)
Avatar
RubberDucky 3/26/2019 2:51 PM
cool cool, are you familar with that subject rathbuna?
Avatar
Andrew Rathbun 3/26/2019 2:51 PM
Not at all, unfortunately
2:51 PM
I just work here 😃
Avatar
RubberDucky 3/26/2019 2:54 PM
work here?
Avatar
Andrew Rathbun 3/26/2019 2:55 PM
NVM. Was a joke
😂 2
Avatar
@RubberDucky any particular devices or firmware project your interested in?
Avatar
RubberDucky 3/26/2019 3:37 PM
I'm beginner looking to learn @Krisaytha
3:38 PM
the extraction of data off a firmware, compare to the original firmware, perhaps RE, etc
Avatar
@RubberDucky always ready to help, but I'm having trouble figuring out what your looking to learn. Do you have anything or device you would like to work on, a mobile device and the firmware of a specific component on the device, or working with an embedded system such as a Google home or similar
Avatar
RubberDucky 3/26/2019 3:49 PM
I need to acquire the skills to be able to work on devices in general
3:50 PM
I expect it to be a long journey, aka no shortcuts
Avatar
Andrew Rathbun 3/26/2019 3:50 PM
@RubberDucky any reason why you're narrowing down on firmware forensics as a beginner? Frankly I've not heard much talk about that from even industry experts. Unless I'm misunderstanding what you're talking about
Avatar
RubberDucky 3/26/2019 3:52 PM
perhaps I'm not a beginner 😛 jk I have a ton to learn still in many others aspects of forensics, however I would like to enhance my teams capabilities
3:55 PM
currently I have found resources in hardware hacking channels
3:56 PM
they teach the extraction, exploitation and modification of firmware, which is basically want I need, but I figure I'd ask here too
Avatar
@RubberDucky not meaning to sounds too pointed, but to help clarify... What are you meaning when you state firmware?
Avatar
RubberDucky 3/26/2019 5:15 PM
No problem, I’m new anyways
5:16 PM
I mean like the data in a chip on a circuit board that controls stuff. Like the bios, or something. @Krisaytha
Avatar
@RubberDucky are you looking for an emphasis in mobile or computer forensics. All the above?
5:19 PM
That is a very specific area of expertise for either field.
5:20 PM
What is your background?
Avatar
Anyone try this for report writing and building templates??? https://github.com/SerpicoProject/Serpico
SimplE RePort wrIting and COllaboration tool. Contribute to SerpicoProject/Serpico development by creating an account on GitHub.
Avatar
RubberDucky 3/26/2019 5:48 PM
@sholmes I don’t understand
Avatar
Andrew Rathbun 3/26/2019 5:49 PM
I think the feeling is mutual
Avatar
RubberDucky 3/26/2019 5:49 PM
Lol
5:51 PM
Extract data from a smart light blub, or controller for a HD, or the bios of a mother board
Avatar
Andrew Rathbun 3/26/2019 5:52 PM
IoT forensics, then?
Avatar
RubberDucky 3/26/2019 5:52 PM
Sure good enough
Avatar
@Andrew Rathbun sounds good iOT forensics and other associated embedded systems it is! @RubberDucky specializing in this type of acquisition and analysis is often at the higher end of the spectrum as it comes to skill set and prerequisite knowledge ; my advice if your wanting to focus on this avenue, is to check into things likehttps://azeria-labs.com the information for arm architecture is spot on, and is the prevalent architecture for iOT, mobile, embedded systems etc. your desire to jump in is great, but know it's something which may require tons, and I do mean tons of hardwork, also bear in mind, BIOS is a pretty far stretch from say a smart light bulb; focus on the cores, ARM architecture, linux for embedded systems, and see how things shake out. But rest assured this group will be here ready to support and help as long as hardwork is evident!
Avatar
RubberDucky 3/26/2019 6:16 PM
Thank you very much @Krisaytha ! I have been reading that site a lot, good to know it’s highly recommended
Avatar
Hello! I am having a little trouble with the usage of Magnet Axiom, i am trying to take the files in my evidence and create a hashlist from these that i can later re-use in later cases. I am having trouble finding any resources on the matter, or if the functionality is even available. Any insight on the matter would be greatly appreciated.
4:07 AM
@Magnet Forensics
Avatar
Andy Thorpe 3/27/2019 4:16 AM
@Cygonaut Axiom Process can accept hash files that are structured one hash per line in a. Txt file. You would need to export all the hashes you wish to include and then create a simple text file of these, one per line. Then you would be able to add this file into Axiom Process.
4:19 AM
Best way would be to export to a CSV, the. Delete all other columns apart from MD5 Or SHA1 (can't have both) and then hit save. Axiom will actually accept the CSV but you will need to enter *. * in the open file dialog to get it to show up.
Avatar
Thank you! I will give it a try
Avatar
What do you guys use as your forensic case management ?
Avatar
ours is bespoke currently
4:46 AM
but I hear a lot of people like black rainbow
4:46 AM
and some others use lima
Avatar
MrMacca (Allan Mc) 3/28/2019 4:52 AM
We use Lima, but hopefully moving to black Rainbow soon
Avatar
randomaccess 3/28/2019 5:17 AM
Other alternatives are magnet review and teeltech xbit
Avatar
Andrew Rathbun 3/28/2019 5:21 AM
Xbit is pretty cool. Check out a demo.
Avatar
Anyone heard of the term "auto vacuum" on an iOS device ?
5:25 AM
SQLite VACUUM - Learn SQLite in simple and easy steps starting from basic to advanced concepts with examples including database programming clauses command functions administration queries and usage along with PHP, PERL, C, C++, JAVA, Python, SQLite concepts, Overview, Instal...
Avatar
is that like trim for databases (edited)
Avatar
SQLite databases can employ a variety of vacuum functions; many databases, including the sms.db employ it
Avatar
Does anyone have another tool for sqlite databases as Sanderson is on bereavement ?
Avatar
ios 12 sms.db
5:44 AM
@Jay528 if you have cellebrite PA, the SQL wizard function is quite nice, if you have oxygen forensics detective
5:44 AM
it too is quite nice
Avatar
@Jay528 ☝
5:45 AM
pa is pretty slick
Avatar
Sanderson does wondering recovery
5:45 AM
wonders ^
5:45 AM
This was a database found on a laptop for ichat messages
Avatar
pa sql wizard has many of the bells and whistles including the ability to write visual queries; spend some time in it, you won't be disappointed
5:46 AM
same structure, iOS macOS, your all good
Avatar
got it, thanks
Avatar
https://www.magnetforensics.com/blog/find-more-evidence-that-matters-with-magnet-axiom-3-0/ some pretty cool new features/additions. Excited to try out that timeline
Magnet AXIOM 3.0 will let you recover digital evidence from more sources than ever before, a powerful and intuitive new Timeline view, and much more.
Avatar
I have an ADA's Apple iPhone that is randomly calling people, opening apps, face timing people. The phone is not jail broken
9:32 AM
She thinks she got hacked
9:32 AM
Anyone experience this ?
Avatar
Is it doing this wen only plugged into a charger or all the time @Jay528 ?
Avatar
all the time
Avatar
That is strange. Is it like phantom touches or do the actions seem like a person is controlling it?
Avatar
they think someone is controlling it. I took out sim and it isnt on wifi
Avatar
Still happening when isolated?
Avatar
On another note, a few months back we were discussing Virtual Here and if it would allow @Cellebrite to work when connecting using RDP. I can now confirm that it DOES NOT WORK when RDPing to my forensic machine. (edited)
9:55 AM
it is weird
Avatar
My first guess would be moisture but if it is too deliberate of actions that doesn't support that claim.
Avatar
thanks.
Avatar
RandyRanderson 3/28/2019 11:33 AM
@goalguy cellebrite is horrible for remoting. We use Axiom or Oxygen for those reasons when we need to be outside of the lab env. Also cellebrite won’t give you a soft license either for fear “you’ll abuse it outside of the one person who is to be IDed as the primary user”. Frankly their customer service is very subpar
11:34 AM
@Jay528 can you confirm what type of iPhone it is? Model #?
Avatar
i just gave it back and theyre going to the apple store
11:47 AM
I think it is a Att Apple 8 Plus
Avatar
I have seen an iPhone do similar things. The issue was resolved with a restart. This phone would change functions so fast that it did not seem "human" controlled. But it would open random apps and change/close windows on its own. I do not remember it making calls.
Avatar
Did you let the phone die off ?
1:21 PM
Apple was probably hacking the customer
Avatar
Simple restart. Haven't heard yet if the problem has returned after a day or two.
Avatar
Had a similar. The phone was curved.
1:39 PM
It was not really flat
Avatar
natalied4784 3/28/2019 2:43 PM
Has anyone dealt with chatting apps: signal and telegram? If so, what tools did you use to view the data?
Avatar
PA parses them. For Android you need a physical and iOS a full FS.
2:44 PM
I can’t recall if signal is getting decoded at this point .. going off memory
Avatar
Not for nothing. If someone has remote control of an iPhone, they’re sitting on or have acquired a million dollar exploit. IJS
👍 1
Avatar
Pegasus SPyware FTW 😛
Avatar
Agreed
2:51 PM
😃
Avatar
natalied4784 3/28/2019 2:54 PM
Can you bring a computer image into PA to parse? The signal and telegram chats are from a Mac computer. We know the password
Avatar
No it doesn’t do computer images in that a sense for artifact decoding
Avatar
Check to see if IEF/Axiom will parse it
👆 1
Avatar
You can also use Cloud Analyzer to pull the cloud based Telegram one
Avatar
RubberDucky 3/28/2019 3:33 PM
@ds275 is the touchscreen broken, hence randomly simulating user input ? Just a wild guess
Avatar
So what’s an average day like working in digital forensics?
Avatar
@Tyføøn Today we had to dismantle an iphone in order to dry the inside components because the suspect throwed her phone in the 🚽 (and 💩 on it ) while the officers were trying to kick open her front door. Typical LE day where you think you have seen it all, but you haven't. (edited)
😂 6
Avatar
Forensic@tor 3/28/2019 5:53 PM
@Kramnias. I have actually seen something similar to that.
Avatar
RubberDucky 3/28/2019 6:28 PM
@Kramnias ahhh who pulled it out?!
6:28 PM
toughest job, ever
Avatar
The rookie 😃
Avatar
RubberDucky 3/28/2019 6:58 PM
Lol
Avatar
franksvensson 3/28/2019 11:48 PM
@CLB-Paul @natalied4784 PA doesnt decode Signal (iOS FS) but Telegram is decoded... I really need to extract some data from Signal.sqlite (iOS), if you find something please let me know.
Avatar
@Cellebrite Hello i have an Question to UFED4PC Version 7.16.0.93 and Android Applikation downgrade. In the Release Notes March 2019 there say, there where a new one. My UFED-PC isn´t online to the internet. After installing UFED4PC, a window is popping up and suggarate there is a new version to install for "Android backup APK downgrade" and a have to load and install it. On the Cellebrite Download WebSite only i found "APK Downgrade Pack (Aug 2017)". Must i install this old version now?
Avatar
Yes, this is the relevant apk pack
Avatar
@CLB - RoyA Thanks. But is this methode safe to new WhatsApp and Facebook Messenger Version?
Avatar
Yes. I'll DM you for further info
Avatar
@Cellebrite What are the apps that the APK Downgrade method can extract? I tried looking for a list on the Cellebrite website and could not find it.
Avatar
@gt530 (edited)
Avatar
Thanks!!
Avatar
anyone use xenserver / xencenter
Avatar
I've dabbled. Used Esxi / Hyper-V / Proxmox a lot more
Avatar
I need the fixup iso 😭
6:51 AM
or I guess, I'll see if I can run one port on internet and one not
Avatar
I could probably try nab that for you tonight, looks like it's included with the main installer so should be somewhere on the file system
Avatar
yeah I woulda thought so
6:52 AM
but I guess not
Avatar
I'd just install it in a VM and have a play in the filesystem
6:52 AM
Avatar
but I don't think it comes with xcp-ng
6:53 AM
xcp do provide a compilable iso, but the makefile is broken
Avatar
What version of xenserver? I think you could get the older version for free with limitations, but could potentially grap the fixup iso from there but it may be out of date
6:54 AM
I'll just re-install from scratch I guess
6:54 AM
I had a pre-setup hashtopolis server
6:54 AM
but it won't import the vmdk
Avatar
That one had a free version I believe
6:55 AM
Oh bummer
6:55 AM
Why not use ESXi free for it? Assuming it's just to host the vmdk
Avatar
ESXi locks you out of a lot on the free
6:56 AM
so I didn't feel like it
Avatar
True it does, but depends when you are using it for
6:56 AM
Fair enough haha
Avatar
we were going to use hyper-v but it was too painful
Avatar
Hyper-V standalone is pretty decent. No feature lock-out and that's entirely free
6:56 AM
Ahh. What walls you hit?
Avatar
not compatible with the server
6:57 AM
or at least, it refused to install
Avatar
I'm currently playing with it in my lab enviroment. It's fun without a domain for sure but runs on pretty much anything
6:57 AM
Oh
Avatar
it's not a player / standalone thing
6:57 AM
it's a full server
Avatar
that I'm doing
Avatar
You can get hyper-v standalone server for free
6:57 AM
Suprised that didn't work. Basically runs a very light version of server core
Avatar
oh I mean there's licenses for them available
6:58 AM
but essentially, the server refused the install
6:58 AM
and at that point I said, I don't even want hyper-v
6:58 AM
so I gave up
Avatar
Fair enough
Avatar
I could have got it working I'm sure
6:58 AM
but I just don't really want hyper-v anyway haha
Avatar
Haha, I'm just using it at home as I know it's widely used in the industry but it was a bit of a nightmare to get going without a domain - getting it managed via server manager. But now it's there it's actually not too bad. Proxmox and xcp-ng are on the list for a later stage
7:01 AM
I dunno I just don't like the idea of hyper-v 😂
7:06 AM
I'm just gonna start from scratch
7:06 AM
such is life
Avatar
Haha because it's microsoft?
7:09 AM
Just think of it as more learning! It's good to start from scratch sometimes 😆
7:18 AM
or is it
😆 1
Avatar
Probably not, but otherwise it's just sad and frustrating
Avatar
Hah yeah
7:32 AM
I had a nightmare of a weekend
7:32 AM
with VMWare
Avatar
Andrew Rathbun 4/1/2019 11:32 AM
Does anyone have an old Dropbox LE Guide on hand? I can't seem to find a current one. Seems like a lot of providers stopped making guides for LE
Avatar
Andrew Rathbun 4/1/2019 2:42 PM
Update: I requested a guide through Search.org - https://www.search.org/resources/isp-list/, at the bottom of the page and got an email with all guides within a couple hours
Avatar
RandyRanderson 4/1/2019 5:05 PM
Just general info — but I found a site that has full Reddit Dumps if anyone is in need of that info.
5:06 PM
They’re about 13GB compressed and they do it basically once a month and have archives
Avatar
Forensic@tor 4/1/2019 5:32 PM
@RandyRanderson Post it
5:36 PM
It’s in a my presentation on Weds at Magnets Summit
Avatar
Has anyone upgraded their GK internal HDD ? Can you DM the make/model of the SSD you bought
Avatar
When a defense expert is allowed to view a copy of an image from a mobile phone but he doesnt' have Cellebrite what file format would you provide him the data in? In this case I have a logical file and physical extraction.
12:16 PM
Im thinking giving him the physical bin files is sufficient correct me if I am wrong
Avatar
@Ghosted did you provide prosecution with a ufed reader or similar?
1:06 PM
If so, the same should be provided to the defense, if not now, they'll request it during discovery anyway, best bet is to be transparent and verbose
Avatar
Forensic@tor 4/2/2019 1:06 PM
I would give it to him in the format you have it (all images). If he is an expert he can read it. (edited)
Avatar
@Ghosted We typically provide prosecution and defense with a UFED Reader and PDF version of the relevant extracted data.
👆 2
Avatar
@Yap I do the same and have the raw extraction ready to disclose if requested
😃 1
👌 1
Avatar
As a nice gesture we provide UFED Reader
Avatar
Forensic@tor 4/2/2019 1:13 PM
I believe his question is centered around the raw extraction not the end user deliverables. I would just provide the raw extraction in the format that I obtained them in. It is the defense "expert's" problem on how to parse it. If truly an expert he/she has the necessary tools to parse it out.
Avatar
I took the OP as I have conducted acquisition and analysis using Cellebrite, how should I proceed in initial discovery or subsequent discovery to a defense analyst As such not only should the acquisition in it's native state be disclosed , but also product associated with it, which had already been provided to the prosecution
Avatar
Forensic@tor 4/2/2019 1:28 PM
@Krisaytha As he said "defense expert" wanted to view the "images", I assume he was past the initial discovery. (edited)
Avatar
@Krisaytha Your correct. I am trying to see what people are letting them use.
Avatar
@Forensic@tor and @Ghosted in my neck of the woods providing a physical image to a defense expert is a pretty rare event. If we're ordered to turn over a physical image so that defense can conduct a separate exam, we would provide a hashed copy of the image to the prosecutor to release to defense. If it's a CP case, the defense must conduct their exam within a secure space provided police department (i.e. we won't release evidence into the wild).
👌 1
Avatar
This is a CP case and I was planning on providing the physical image on a thumb drive for them to use in our secure space and they are not to take any copy or part of the extraction.
Avatar
Right on, providing initial acquisition is always been my way state and federally, just to save time later down the road, CP cases were a different beast of course
1:36 PM
Infact CP cases @Yap hits it on the head if CP is involved in too would. Proxy through the prosecution
1:36 PM
I too
Avatar
So is just giving them the physical extraction ok or do I need the logicl and file system to go with it too? Thanks for all the guidance.
Avatar
If you're LE, I would check with the prosecutor for guidance and release everything to defense through them. We always release evidence to defense through the lead prosecutor. But, generally, you would probably give them all of your end products.
Avatar
I can't release the CP to them. They have already been given the extraction - the CP. The defense expert wants to view the raw image is what I was told. The expert said he may need the information in raw form.
Avatar
Forensic@tor 4/2/2019 1:42 PM
@Ghosted See my edited post above.
Avatar
Yeah - CP is different. I would make sure you're on the same page with the prosecutor (as to what should be released) and then make it available in a secure environment at the PD. Obviously, the exam occurs in the secure environment and nothing leaves when it's concluded.
1:44 PM
@Forensic@tor is spot on above.
Avatar
Yes that was my plan I have a secure room for them to utilize and I was going to put the evidence on a drive for them to use and that drive will stay after they are done. I just wasn't sure it I put logical file and physical on the drive or just the physical. From what I'm hearing I will put all of them along with the reader program.
Avatar
Does anyone use the FRED L forensic laptop? Looking for feedback! Thanks.
Avatar
FRED has a laptop? We use to use their tool. Now we only use it for legacy systems we cant use our new tools on
6:58 PM
thx! i can only give feedback on the fred tool itself and encase
Avatar
One thing I always wonder, why do forensics tool reports have to be so horrible to look at
Avatar
Andrew Rathbun 4/3/2019 4:52 AM
Great question!
Avatar
I just did a PDF export on Cellebrite and it's horrific 😂
💯 3
4:53 AM
can't make heads or tails of it
Avatar
I think I might have posted previously that I'm a big fan of the reports that FIVE from @Amped Software generates, in that they include references to the research that backs up the video enhancement methods. Doesn't solve any layout/navigation issues, but makes the report far better in my opinion
Avatar
Hey @Law Enforcement [UK], I've got a question. So I'm looking to develop a cloud storage forensics tool that'll harvest the credentials, or with provided passwords, or the password from an OSINT source, from the PC and then login to the cloud storage providers, e.g. Dropbox, OneDrive, Google Drive, etc.. it'll then download the artefacts from all of these services that've been uploaded. Is this legal for investigations in the UK? Does it break ACPO in any way? Cheers.
Avatar
MrMacca (Allan Mc) 4/3/2019 7:17 AM
@Lloyd Whoever used itwould need to get RIPA - https://www.legislation.gov.uk/ukpga/2000/23/contents
An Act to make provision for and about the interception of communications, the acquisition and disclosure of data relating to communications, the carrying out of surveillance, the use of covert human intelligence sources and the acquisition of the means by which electronic da...
Avatar
Hey @Lloyd . We currently teach these kinds of processes on some of our training. To the best of my understanding, doing so is legal with the correct authorities
7:18 AM
What @MrMacca (Allan Mc) said. Different forces are justifying cloud extractions in slightly different ways, but that's more of an internal/force legal decision atm
Avatar
I think getting the authority can be difficult to justify though? Unless is a very serious case/very high profile
Avatar
I'd say that whilst you might be violating ACPO 1 (almost certainly changing logs on the cloud side), demonstrating competency, keeping audit logs and keeping OIC informed (so principles 2, 3 and 4) make it acceptable in my eyes. The cloud is such a powerful source of evidence that it's essential to have the skills to interact with it safely if the correct conditions are met
7:21 AM
@bizzlyg Can potentially do it based on consent of account owner
Avatar
good point
Avatar
I think cloud extractions are unavoidable
Avatar
cyberc3nturion 4/3/2019 7:44 AM
Anyone know of CTFs for DFIR?
Avatar
ACPO leaves a bit of room for justification so, as long as you have the authority
Avatar
Thanks for all the input! Yeah, I think I'm going to develop a product which ties all of them together and attempts to harvest credentials for the services too.
7:45 AM
I was speaking to a few people from a force in the UK who said it's a real issue
7:45 AM
Or make it open source, not decided yet
Avatar
it's mostly just because things are stuck a bit with the rigidity of original ACPO intent
7:45 AM
but I mean, if you have a HP stream with 1TB in the cloud
7:46 AM
what can you do but cloud extract it
Avatar
True, I wasn't sure about logging into services though
7:46 AM
I thought that was the iffy part
7:46 AM
With a set of credentials
Avatar
depends I think
7:47 AM
like, tokens are very accessible
7:47 AM
we would usually go for voluntary first, i.e. the person who owns the account
Avatar
@cyberc3nturion check out #MUS2019 on twitter the CTFs should be released soon
👌🏽 1
Avatar
but afterward as long as the OIC or whatever accepts the requirement and stuff
7:48 AM
but yeah, it's unavoidable, otherwise you would just have nada
Avatar
I dont think the issue is with ACPO at all imo, its simply down to whether or not you have legal jursidiction to get the data. If the person consents, all good, if they don't then you need some kind of authorisation, like RIPA, and depeneding on what you want to do (eg if classed as interception) it might be tricky to get that. It doesn't matter that cloud extractions are needed or that OIC wants it, it ultimately comes down to the legality as its that which will get potentially questioned by defence
👍 2
8:14 AM
From what I understand its simpler to get this authorisation in Austria, even routine, but unless its changed recently in the UK, it seemed much more restricted there
8:14 AM
Just using Austria as an example from my perspective
Avatar
I agree, apologies if I made it sound like I considered ACPO to be the obstacle, I was just addressing the question regarding ACPO from @Lloyd It does indeed seem to be the legal aspect that's the obstacle here
Avatar
@OllieD Yes sorry, I was also more directing that at the original question 👍
👍 1
Avatar
RubberDucky 4/3/2019 9:37 AM
@cyberc3nturion did u find any?
Avatar
cyberc3nturion 4/3/2019 9:40 AM
@RubberDucky no
Avatar
I have a consent search to assist witness to grab specific icloud email. The user has a copy of the email on his mac. What method have you used ?
Avatar
Andrew Rathbun 4/3/2019 7:30 PM
@Jay528 anything against him just forwarding the emails to your work account? That was always good enough for me.
Avatar
Jumping on the cloud discussion, we have fairly strict guidelines on cloud extractions, in which we either need a DSA and one sided consent, or an equipment interference notice + a DSA if one sided consent is not given. Both of those need to be signed off by someone fairly high up and are not the easiest things to get hold of. However this area is constantly changing and the best advice is to get the OIC to consult the force CAB on a case by case basis
👍 2
Avatar
martino_amped 4/4/2019 12:21 AM
@OllieD Thanks for the feedback about the report. Could you please elaborate more on "Doesn't solve any layout/navigation issues, but makes the report far better in my opinion". Just wanted to understand what layout issues you are referring to. Thanks!
Avatar
@martino_amped Hi, I was not clear with my earlier message. I was not criticising layout (as that was the point raised about all forensic tool reports in the earlier question), I was just complimenting the transparency/referencing of the reports. I am not a FIVE user, but have attended workshops that have used it. I'm a big fan of the transparency element, but I appreciate that there's a far greater wealth of academic material on video/image enhancement than on mobile forensics!
Avatar
Pretendigator 4/4/2019 1:19 AM
Griffeye question: Does anyone know of a shortcut for creating bookmarks? If not, has anyone made a script that will create a batch of bookmarks?
👌 1
Avatar
Hello good morning . Does anyone have a document comparing the functionalities of msab toolset to that of cellebrite
Avatar
With versions changing and updating so frequently I imagine that would be a hard document to maintain @Santetla. We have both in house though so feel free to DM me some specific questions and I'll help where I can
Avatar
Andrew Rathbun 4/4/2019 4:07 AM
@Santetla are you looking to purchase one of those or do you already have one and are looking to compare to the other?
Avatar
Hello @Andrew Rathbun .we currently use XRY and looking to purchase cellebrite. I have to justify the purchase and so want to compare features
Avatar
Andrew Rathbun 4/4/2019 4:16 AM
XRY's strength is in the older/burner phones. They touted that during their sales pitch/training a couple years ago. It all depends on what your jurisdiction sees in terms of phones.
👍 1
Avatar
@Andrew Rathbun sometimes they are too lazy to forward 50+ emails
Avatar
martino_amped 4/4/2019 5:46 AM
@OllieD thanks for the clarification. Sure, there’s way more “stable” paperwork in the imaging science domain.
Avatar
Anyone use quick hash ?
6:35 AM
I download the free version and I wanted to create a HTML report for my results of file only
6:35 AM
Is it possible to do it on a free version ?
Avatar
@Jay528 I have a variant of a script Lee Reiber publishes in his book which takes a given directory and hashes each file within it; listing size, location, sha1 md5 and outputs to CSV; would this help?
Avatar
yes, thanks
Avatar
Awesome, if others are interested I can share; it's about 95% lee reibers work, from his book but ive sprinkled in a little compatibility etc
Avatar
Paternal instinct met police training as an off-duty NYPD sergeant chased down and held for fellow cops a creep who allegedly had just grabbed his teenage daughter’s butt as they walked down a Broo…
7:07 AM
I need to download this video with audio
7:07 AM
I was able to download the video with a chrome extension but not the audio
Avatar
disregard
7:16 AM
online converter ftw
7:16 AM
Convert video files or videos from YouTube, Vimeo, Dailymotion to many formats in HD quality. No software required, easy to use and totally free!
Avatar
Pretendigator 4/4/2019 7:31 AM
Anyone running griffeye 18.4? Could you confirm a bug that our office is having: exporting pictures appears to be appending file names with '_2'... New feature?
Avatar
Just had a weird thing happen. Using PA I was reviewing an email account within a full file system iPhone dump. Trying to figure out a person's facebook identifiers I clicked on one of the Notification emails whcih stated they had 2 messages and 7 notification. If opened the persons facebook account and messages. No examiner interaction beyond click the link for 2 messages within the email found in PA. Anyone else ever have this happen to them?
9:34 AM
It not only gave me their messages, but their profile page access..............
Avatar
So is there a difference between digital forensics and cyber forensics?
Avatar
Cyber sounds very buzzwordy. That word is more associciated with the investigation of computer enabled crime but not neccesarily the actual digital forensic side of things (At least this is the case in our force with our cyber team) .
👆 1
Avatar
Ah ok, a better word would probably just be computer. Cyber now sounds to security related. Thanks for the response! (edited)
Avatar
To be honest my use of the word computer there was wrong. It's more like digitally enabled crime, i.e any crime that would take place using a phone / computer / networked device (e.g. computer misuse) as opposed to a crime that would take place physically (e.g burglary), but evidence can be provided to support it via digital forensics. Agreed, cyber appears to be a lot more security related
Avatar
Anybody have any good suggestions for digital report management systems which work well with the digital forensics field?
Avatar
w3aryb0arpig#6666 4/6/2019 12:54 PM
@Jameson if you are talking about case management systems, Lima by Intaforensics seems to be one of the main ones being used nowadays
Avatar
Thanks I'll give it look
Avatar
Pathfinder 4/6/2019 5:31 PM
Has anyone dealt with a laptop that has had both the RAM and HDD stolen and still been able to perform any sort of forensics on the box?
5:31 PM
😬🤨
5:32 PM
I have a box just like this
5:33 PM
If so, please DM. Thx
Avatar
Andrew Rathbun 4/6/2019 5:38 PM
@Pathfinder what could possibly store any information of forensic value if both of those components are missing? Happy to be corrected but it sounds like there's nothing of value to be found there
Avatar
Pathfinder 4/6/2019 5:41 PM
I have no idea. I said the same thing. But I am going to make some sort of effort and I am not sure where to start.
Avatar
@Jameson also Atlas built by two police officers and bought and upgraded by Magnet Forensics
Avatar
Pathfinder 4/6/2019 5:45 PM
Magnet is great stuff
5:45 PM
I use it and tons of other stuff
Avatar
Thanks
Avatar
Pathfinder 4/6/2019 5:46 PM
Intella, FTK, EnCase, Eric Zimmerman's stuff
5:46 PM
BlackBagtech is great too
Avatar
Yes but was answering a question about case management specifically by @Jameson
5:47 PM
All good stuff in the community
Avatar
Pathfinder 4/6/2019 5:47 PM
Oh I know. I was commenting how our office likes it
5:47 PM
We use Magnet quite a bit
Avatar
You guys have Atlas?
5:47 PM
Cool appreciate the shoot out
Avatar
Pathfinder 4/6/2019 5:54 PM
I don't recall...i know we have case management tools..i swear i have seen Atlas in our cloud
Avatar
Pathfinder 4/6/2019 5:55 PM
We save different software for diff things
5:55 PM
May is Cellebrite training update.
Avatar
case management via sharepoint... its as terrible as it sounds...
Avatar
Forensic@tor 4/6/2019 6:32 PM
@Hells Right there with you.
Avatar
Andrew Rathbun 4/6/2019 6:34 PM
We use SharePoint too but not for case management. We have something equally as ancient but I don't hate it... Yet lol
Avatar
I was looking into using a home brewed solution too but I don't want to create something I have to leave to someone else to manage eventually..I would rather have a product with proper support (edited)
Avatar
@Jameson You might want to try this.... https://github.com/SerpicoProject/Serpico
SimplE RePort wrIting and COllaboration tool. Contribute to SerpicoProject/Serpico development by creating an account on GitHub.
👍 1
Avatar
CLB-TheGeckster 4/8/2019 3:37 AM
@Jameson I've been using Atlas for about 8 months now with good results. I particularly like that it has an online case request form for my detectives which gets me the pertinent information and the legal authority without having to ask
Avatar
Morning Everybody! Has anybody had any success getting any info off of a Roku? Not sure on the exact model yet but just wanted to see if it was worth trying to extract.
6:28 AM
Abstract   The Roku XS 2 is digital media streaming devices made by Roku Incorporation. The Roku is a relatively new device. The first generation of Roku was introduced on May 20th, 2008 (Roku…
Avatar
Thanks @Andrew Rathbun Looks like extracting data would be ISP or Chip-Off and even after that wouldn't be able to really decode and analyze the data. Seems not a whole lot of data is even stored on the device other then channel info.
👍 1
Avatar
I am working on next years budget and I am looking for some survey-type information: Are your main forensic machines PC's or Macs? Is your main forensic machine home built or commercial built (Sumuri/Digital Intelligence, etc...)? How much RAM do you have in your main machine? Thanks in advance for the info.
Avatar
RubberDucky 4/8/2019 2:33 PM
Lol
2:34 PM
128MB? Haha
Avatar
Forensic@tor 4/8/2019 2:52 PM
@RubberDucky oops...it was a commodore pc (edited)
Avatar
PCs, commercial (currently Sumuri), 128gb.
Avatar
Andrew Rathbun 4/8/2019 3:05 PM
PCs for work in the lab, MacBook Pro bootcamp'd for being mobile. HP Z840's for our workstation. 128GB.
Avatar
+1 for the bootcamped mac pro as well
Avatar
randomaccess 4/8/2019 3:29 PM
@Forensic@tor how much that set you back?
Avatar
randomaccess 4/8/2019 3:41 PM
Why did you go the maxed out Mac Pro instead of just using the laptop when you needed it?
3:41 PM
I looked at it a while back but couldn't rationalise the cost compared to a similar windows machine
Avatar
Forensic@tor 4/8/2019 3:42 PM
The Mac allows us to do Mac forensics natively. We use the laptop for mobile work.
Avatar
@franksvensson @natalied4784 Regarding your messages about Signal, perhaps drop @TROUNCE a DM. He has previously written a Signal bruteforcer
Avatar
franksvensson 4/9/2019 1:08 AM
@OllieD thanks!
Avatar
@Jamey any idea about what Atlas runs on top of an axiom license?
11:03 AM
Or could you give me a ballpark rather.
Avatar
No idea brother $$$ wise but can get you some direct number to inquire instead of going through the exchange.
Avatar
Beefhelmet 4/9/2019 1:19 PM
@Jamey sounds good. I just put in a request for a demo still waiting to hear back but I'm not in any rush
Avatar
Cool let me know if I can get it expedited for your.
Avatar
anyone know much about email
4:06 AM
hoping to understand why you would get <image0.jpg> (or any image name) in place of the actual embedded image
Avatar
Andrew Rathbun 4/10/2019 5:23 AM
Might be a dumb question so I apologize ahead of time. Can you not use a Cellebrite dongle through a VPN? I'm having issues currently trying to remote into my workstation and having my workstation recognize the dongle.
Avatar
Andrew Rathbun 4/10/2019 5:30 AM
To clarify, the dongle is physically plugged into my workstation that I'm remoting in to. It's not showing the expiration date of the dongle or what the dongle is licensed for on Show License Details. But, when I take that same dongle and put it in my laptop or another desktop and bring up PA, it'll show in Show License Details everything and allow me to parse dumps
Avatar
@Sudo I think the default naming is imageX when a filename is not present
Avatar
also, more important
5:36 AM
how do I convert base64 back
5:36 AM
i.e. to an image
Avatar
I've never got it to work with remote desktop let alone via VPN @Andrew Rathbun.
Avatar
Andrew Rathbun 4/10/2019 5:40 AM
@K23 I wonder if that's by design? @Cellebrite
Avatar
This is on their knowledgebase: "Issue UFED Dongle license (for all Cellebrite's PC applications, i.e. PA, UFED 4PC etc.) is not recognized if user connects via RDP (Remote Desktop Protocol). Cause By default, a license in a sentinel dongle (HASP) is not recognized if connected via RDP from a remote machine. Solution Dongles have to connect to a local PC​."
Avatar
Andrew Rathbun 4/10/2019 5:42 AM
Bah, that's unfortunate. I'll have to work around that then. Thanks for the info!
Avatar
On another thread "*Dongles cannot run under terminal (RDP/Remote desktop is disabled)"
5:42 AM
so looks like it's disabled by design
Avatar
Andrew Rathbun 4/10/2019 5:43 AM
I'm sure it's a measure to ensure multiple users aren't mooching off the same license or something to that effect. I get it, but it's inconvenient. It's all good though!
👍 1
Avatar
Interestingly VNC apparantly works
Avatar
wrote a script for the b64 (edited)
6:03 AM
probably nothing
6:04 AM
are all emails encoded in b64?
Avatar
not all, but attachments, images, and often the message body
Avatar
cool, so it's definitely not just an image
6:04 AM
can be all sorts
Avatar
if looking at .eml files
Avatar
yeah I am
6:04 AM
there's refs to images in the emails
Avatar
there's a good python tool for dumping objects
Avatar
<image.jpg>
6:04 AM
<filename.jpg>
6:04 AM
etc
6:05 AM
but there are no images
Avatar
didier steven's emldump.py
6:05 AM
ah
Avatar
and I know in my personal email, I encoded my logo as b64
6:05 AM
for my signature
6:05 AM
so I wondered, are they just buried
6:05 AM
but probably not
Avatar
usually it'll be a multipart email and you'd see the image as a b64 encoded segment
Avatar
there is a b64 encoded element yes
6:06 AM
after a
6:06 AM
MIME TYPE
Avatar
usually right above the b64 segment will be metadata describing the content
6:06 AM
are you working from a .eml file, a .msg file or something else?
Avatar
ah yeah
6:07 AM
content type text/html
6:07 AM
so I suppose it's not
Avatar
there will usually be multiple segments like that
Avatar
I wonder where the images went then
Avatar
quick and dirty conversion is echo 'copy/pasted b64' | base64 --decode > file.filetype
Avatar
yeah the script does it
Avatar
if you convert the html segment, maybe there are hints there?
Avatar
what do I copy out the b64 in
6:08 AM
hex?
6:08 AM
utf?
6:08 AM
seems more like the actual characterset not the hex
Avatar
ascii/utf
6:09 AM
ascii I believe
6:10 AM
if it's a .eml file I typically just cat it, then copy paste. if it's a .msg file I convert to eml
6:12 AM
I think where you're seeing <image.jpg> it's because it's the plaintext version of the e-mail- so it wouldn't have embedded images but would just leave the name of the image. The HTML version is probably doing an <img src="http://somewebsite/image.jpg" />
Avatar
gotchas
6:27 AM
thanks for the inpoot
6:28 AM
I don't see any refs to images really
6:28 AM
just the tags <filename.jpg> etc
Avatar
ah ok, I'm not sure then. Maybe image parts not saved to save space?
Avatar
maskedroyalwindadept 4/10/2019 11:05 AM
What are the different titles for someone working in digital forensics
Avatar
There are too many, my title is Senior Digital Forensic Analyst. My city title is "Executive Assistant"
Avatar
Andrew Rathbun 4/10/2019 11:11 AM
Mine currently is Forensic Computer Examiner
Avatar
maskedroyalwindadept 4/10/2019 11:40 AM
Ah ok
Avatar
Incident Response Analyst/Operator
Avatar
maskedroyalwindadept 4/10/2019 11:43 AM
Also i am newbie to this field
Avatar
Data Security Analyst (more on the IR side)
Avatar
maskedroyalwindadept 4/10/2019 11:43 AM
As in i am studying for the comptia a+ 901
11:44 AM
But i want to make this a future career when i graduate high school
Avatar
try to find internships
11:48 AM
or if you are confident... tell them you perform digital forensics everyday... i didnt study or prepare for this position
Avatar
maskedroyalwindadept 4/10/2019 11:53 AM
Oh i see
Avatar
Andrew Rathbun 4/10/2019 11:57 AM
@maskedroyalwindadept try your hand at the Magnet CTF
Avatar
maskedroyalwindadept 4/10/2019 11:58 AM
Oh what's that
Avatar
@maskedroyalwindadept let me know when your ready for an internship, I just got my intern for this summer from this list!
12:29 PM
High-tech crime specialist is the title, prior ot was computer crime specialist
Avatar
Hey all, I came across this Discord server after a little general DFIR googling and I've got some questions that I'd appreciate some input on if you could help me out! So, my Agency is new to this and we've always outsourced our DFIR needs to other agencies, etc. However, my administration has decided that they'd like to start doing things in-house. I was approached as the person to start looking into the field and essentially create a report for 1. "what equipment we'd need to get this going" and 2. "what we might need in the future to build on what we've established." Our primary focus has mostly been analyzing cellphones for incriminating data (I'm sure there's a billion things you can do in the field) but that's essentially where we're starting because it's 95% of what we've needed so far. I thought it was probably a good jumping off point to start with.
1:52 PM
^ so I'd love to hear what your thoughts are/point me in a general direction? Thanks!
Avatar
Andrew Rathbun 4/10/2019 3:37 PM
@DEEBO I would say one of the things they need to understand and be able to promise is a steady training budget. It's one thing to buy licenses to forensic software. It's another (and almost equally expensive) thing to know what your software is doing. Make sure they know they need to send you to training a couple to a few times each year and that it won't be free. Most good training costs anywhere from $750-$1000 USD per day of training.
👍 1
Avatar
@Andrew Rathbun Yeah, that was the big thing I made sure to tell them. It's not cheap, and it will have recurring costs. I've been assured that we'll have 30-35k to work with (to begin with) and we'll go from there as equipment/training is needed. I got a load of great info from @deepdive4n6 !
Avatar
deepdive4n6 4/10/2019 3:55 PM
We do conference + a training each year at our agency for each of us. Sometimes you can get three out of them. Bosses know that I'll be cranky if they ever stop funding at least that much. Our two examiners have 10+ years of experience each, so it's less about the basic courses at this point and more about maintenance / specialization.
👍 1
Avatar
Andrew Rathbun 4/10/2019 6:14 PM
@DEEBO I think many of us would agree Cellebrite is an essential tool. I would highly recommend UFED 4PC over the Touch or anything like that. That way, you can throw 4PC on as many laptops (for field work) or desktops (for lab work) as you want and just play musical dongles as needed. A Touch unit adds an extra step in the extraction process in that you'd have to transfer it to an external media and then transfer the dump to your final storage medium (a NAS/server, for many). With 4PC you can just dump straight to your NAS or what have you.
👍 1
Avatar
@DEEBO I would suggest a strong forensics PC, a NAS with more space than you think you need and Cellebrite software to start with phones.
6:15 PM
Make friends with the Secret Service in your area. It would be a good start to get training at NCFI. It's free and includes a lot of equipment and software.
💯 1
👍 1
Avatar
Andrew Rathbun 4/10/2019 6:17 PM
@DEEBO If you want a good second tool for mobile that doubles (and primarily functions) for computers, AXIOM is a no brainer. Between those two, you at least have computers and phones covered on a limited budget. This would get you by the first year until reduced maintenance costs come into play (initial purchases are always more expensive than yearly renewals). Then after a year of experience you could learn more about other tools and see what gaps you have in your toolbox.
👍 1
6:19 PM
You'll want to get Cellebrite certified, CCO/CCPA and CCME while you're at it, it's not that much more work. If you do Magnet, see about fulfilling the requirements for MCFE.
6:19 PM
Magnet also offers a training passport, which is an awesome deal. For the price of essentially two classes, you can attend an unlimited amount of classes within a year's time.
6:20 PM
this message brought to you by Magnet Forensics
6:20 PM
jk
Avatar
Andrew Rathbun 4/10/2019 6:21 PM
I was waiting for you to see that 😃
Avatar
I love the love on this server
👍 1
Avatar
Andrew Rathbun 4/10/2019 6:23 PM
EnCase used to offer the same deal and FTK I believe still offers the same deal. Not sure of any other vendors that offer passports
6:25 PM
I would also suggest some vendor neutral training in your second or third year (SANS, TeelTech, etc) to learn about free tools, different tools, etc. SANS is like $1200 per day but is industry standard with marketable certifications. TeelTech offers great outside the box training that you'll want a foundation built first before you tackle it (flasher boxes, chip-off, ISP, etc)
6:26 PM
SANS FOR585 will be the mobile class you'll want to consider down the road. If you're totally green to digital forensics, going to this class in your first or second year would be a waste of money. You'd be way in over your head. Learn the basics of your tools, get certified in your tools and go from there.
👍 2
6:26 PM
This message brought to you by my stream of consciousness
Avatar
@Andrew Rathbun. Ha ha. That's about 10 years of training for most budgets.
Avatar
Andrew Rathbun 4/10/2019 6:26 PM
Hope that helps @DEEBO
👍 1
6:28 PM
He's got 30-35k to work with. That's a pretty good amount. I guess it all depends on how many examiners that's training and outfitting with dongles. If it's just him, that's awesome.
Avatar
Definitely a good start. Equipment will suck up a chunk. I agree about the Magnet annual pass. It's the best bang for the buck.
Avatar
Andrew Rathbun 4/10/2019 6:31 PM
@Joe Schmoe All depends on what budget you're used to. My last and current employer were blessed in that regard. I'm just offering advice from a perfect world scenario in my personal experience. It may be wise when getting initial quotes from vendors for him to plan out the next 2-3 years of renewal quotes to see the drop off from the initial cost.
Avatar
@Andrew Rathbun. It's all good stuff. I just chuckled because I pictured some admin heads exploding.
Avatar
Andrew Rathbun 4/10/2019 6:33 PM
I'm sure they will be humbled by how expensive this field is. Surprises me they'd want to start up their own shop but it's good for @DEEBO
👍 1
Avatar
maskedroyalwindadept 4/10/2019 7:28 PM
@Krisaytha i dmed you check it out i am interested
Avatar
Wow, I missed out on a great opportunity with all these replies! Thank you all! @Andrew Rathbun @Joe Schmoe @Jamey ! @Andrew Rathbun Yes, I was leaning more towards the 4PC and I had no idea you can load it on multiple devices like that! I had just assumed one license = one device. However, I guess it comes more into play with the dongles like you said. Huge benefit there though as I can just as easily be in the field as I can be in the office. With that, I will definitely be going to those Cellebrite schools when my admin offically decides to go with Cellebrite. I probably won't mess around with PC/Mac's just yet and will add things like AXIOM and such in the future. I definitely need to look into this Magnet training passport. I had not heard of that until now... I am pretty dang green when it comes to digital forensics though so I'm doing my best to take it slow and not get into too much, too quickly. My experience basically boils down to watching some people download phones for me and me sifting through the data for what I need. But yeah, so far it's just going to be me as I am the one obtaining most of the digital evidence for my agency (phones). I'm sure we'll end up getting a boatload more when we start doing these things in house and I'll have two other part-time individuals helping out. (me doing mostly narcotics work, and the other two doing general detective work related items). We've been fortunate enough to get a decent chunk of seizure money through some of our cases so my admin wants to funnel it back into what we're doing (yay us!).
👍 1
10:48 PM
@Joe Schmoe , Yes I spoke to @deepdive4n6 and was given some great forensic PC advice that I'm sure we'll go with. As far as space, I work for a County Sheriff's Office and we use a lot of server storage space so I'm sure our IT dept can help us out storing all of this stuff (bc right now I just have a giant safe full of external hd's). Yeah, I actually already went down that road and wasn't able to come up with any luck with the secret service school down in AL... I was super stoaked (as was my admin) when I came across a free training/equipment but then I wasn't able to really get my foot in the door sadly.
10:50 PM
but my Admin wanted me to do a "thorough investigation" into all the different companies that have skin in the game, and come up with what will work best for us, have the least ability to become an obsolete paperweight, and will get us that best results. ...which is quite the tall order in the tech business.
Avatar
NapsterForensics 4/11/2019 2:04 AM
Hello @Magnet Forensics , does Magnet cloud tool acquire YouTube videos? (edited)
Avatar
Forensic@tor 4/11/2019 2:59 AM
@DEEBO. I agree with everyone else. In the meantime, I would start by going to www.nw3c.org and take all the free online courses. It will give you some foundation.
👆 1
3:01 AM
@DEEBO You need a secret service field office to sponsor your classes at the Alabama NCFI training facility.
Avatar
@Mitok Yeah I actually feel pretty good because I had found NW3C a while back and have slowly been working my way through their free online stuff! Lol And yeah I hit a dead end on the SS school. I was just politely told "no" lol. By that I mean they said how competitive it is to get a spot and that they fill the classes from feds first, then state police, large metro agencies, other people, anyone else, and then local LEO last and that "I'd be better off doing it on my own." Which is fine, I get it. It's a heck of a deal if you can get in. I'd love to go. Just probably not going to happen.
Avatar
@DEEBO i would also suggest to spend money where it is needed. Are you mostly dead box forensics or mobile or video/audio
5:01 AM
Different type of investigations with different tools
Avatar
@Mitok I'm gonna start with cellphones primarily and work from there as needed / when I get further into it.
Avatar
Andrew Rathbun 4/11/2019 5:23 AM
@DEEBO @Forensic@tor yes @NW3C's free online and in-person training should be a priority because the price is right. Also, check out #dfir-resources as there are some other free self-learning opportunities through Texas AM, for instance, that you can use to a) pad the resume and b) start building the foundation of knowledge for free immediately
5:23 AM
And now I see you've already been working through the online courses so good on you. I should probably finish reading my unreads before responding
Avatar
I'm asusming those free online training courses at @NW3C are only free for the US? not UK LE?
Avatar
Andrew Rathbun 4/11/2019 5:32 AM
@K23 I would try making an account at https://www.nw3c.org/online-training and seeing if it allows you
NW3C offers online training courses geared toward state and local law enforcement.
Avatar
+1 for NW3C. I would really try to go to some of their live classes before any others. They keep changing the names of the classes so I don't know what they are called now. They are foundational classes that will help you get a better understanding when you go to Cellebrite.
5:35 AM
Looks like the Digital Forensic Fast Track has all the classes is you can get it. If there are none in your area, your department might be able to host it.
Avatar
Andrew Rathbun 4/11/2019 5:36 AM
That's pretty cool, that must be a new thing. I frequented their course list a lot in the past and never saw the fast track series.
Avatar
I’m currently in the fast track course. For the beginner will be great
5:37 AM
I’m just taking it just for record and for desktop and iOS
Avatar
@Andrew Rathbun My department is hosting the Fast Track series in a couple months. I've been to some of the (old) classes but there is a couple I haven't done yet.
5:39 AM
I didn't know that's what they call it until now.
Avatar
@K23 you are correct our funding comes from the US DOJ; however DM me and we'll see if we can get some fee's waived for you
Avatar
@DEEBO you can also place AXIOM on multiple machines and just move your dongle and it also does not only mobile devices but computer media as well.
👍 1
7:40 AM
Hello @NapsterForensics here are the current cloud sources AXIOM collects from
👍 1
Avatar
@Jamey - do you know if it is apple icloud data with or without apple itunes backup ?
Avatar
@Jay528
7:47 AM
iCloud backup, iCloud Drives Files, iCloud Photos, and iCloud mail.
Avatar
Thank you !
7:47 AM
So i'll need the icloud module
Avatar
But I believe the entire industry is having issues with cloud backup since 12.0 so let me check on that version issues.
7:49 AM
if it's 11.2 and higher and MFA is NOT enabled, we can get it anything higher than 11.2 while MFA is enabled, no one can
7:50 AM
had to check with @cScottVance as I thought it was 12.0
7:51 AM
He is my mobile guru
Avatar
Thanks, much appreciated
Avatar
RubberDucky 4/11/2019 8:10 AM
Are roles super important here?
Avatar
Andrew Rathbun 4/11/2019 8:11 AM
@RubberDucky roles just get you access to the channels and properly label you so everyone knows what you do (private sector vs LE vs student vs vendor, etc)
Avatar
RubberDucky 4/11/2019 8:12 AM
Different roles have access to different channels? @Andrew Rathbun
Avatar
Andrew Rathbun 4/11/2019 8:12 AM
Negative, once you're assigned a role you have access to all the channels
Avatar
RubberDucky 4/11/2019 8:12 AM
Oh, so no need to switch I guess. Thanks!
Avatar
Andrew Rathbun 4/11/2019 8:12 AM
Well, if you got employed, feel free to let me know
8:13 AM
If anything changes and you want your role to be accurately reflected of your current work situation, let me know and I'll make the change (edited)
8:13 AM
I've had multiple DFIR Students PM me and say they got a job in the Private Sector, so I just switch them
Avatar
RubberDucky 4/11/2019 8:17 AM
Thanks but there is no real need imo.
Avatar
Andrew Rathbun 4/11/2019 8:17 AM
I can only lead a horse to water, can't force them to drink!
Avatar
Looking for a bag to carry all my equipment. Any suggestions? Looking for either oversized backpack or roller bag. Fit 2 laptops, writeblockers, couple hard drives , notepads, etc. anyone have a good brand or one they really like? I like pelican but was thinking something little less bulky.
Avatar
Andrew Rathbun 4/11/2019 9:00 AM
@Jobbins https://www.511tactical.com/rush-72-backpack.html is what I carry my 2 laptops in every day. It's massive as it's made for camping for 72 hours but it's a great backpack. I have a couple MOLLE attachments on it as well for my water bottle, dongles, handcuffs, etc (edited)
RUSH72™ Backpack
9:03 AM
Rush24 might be a good option, too. It's a 24 hour pack and thus is smaller. It's probably more fitting for what you're looking for and the same attachments can be thrown on the 24 or any other backpack with MOLLE capabilities
9:06 AM
There are also plenty of other options out there, too. Don't just have to go with 5.11 but I will say MOLLE is awesome as it makes your backpack customizable to your liking
9:06 AM
MOLLE can be found on many other brands too, just include that in your search query, if you want
9:10 AM
Also, these are good for securing your various keys onto your bag. Would recommend this for anyone with any bag that has MOLLE - https://smile.amazon.com/gp/product/B004GABHOS/ref=oh_aui_search_asin_title?ie=UTF8&psc=1
Avatar
@Andrew Rathbun awesome! Thank you, I appreciate it! That is a nice setup
Avatar
@Jobbins @Andrew Rathbun This is exactly the bag I use as my go bag. You will not be disappointed
💯 1
Avatar
Andrew Rathbun 4/11/2019 9:14 AM
5.11 is pretty common for LE and military folks with good reason. Quality products (edited)
9:15 AM
And naturally, you have to buy a nametape to put on your bag because that's the tacticool thing to do 😃
9:16 AM
👌 6
Avatar
This is my Magnet Backpack but that is the reason for velcro
9:22 AM
💯 8
👌 2
👍 4
9:23 AM
It proves that no matter the distance or LE organization we are all wired the same
Avatar
Nice! I have no shame when it comes to gear organization, lol. It's almost a hobby at this point.
Avatar
As you can see even my Magnet Bag has Molly on it.
Avatar
Yo, does anyone have a good warrant template for apple iCloud information?
Avatar
does that rush 72 backpack meet carryon requirements for common airlines?
11:34 AM
seems like it should be fine
Avatar
Andrew Rathbun 4/11/2019 11:35 AM
Yeah I've brought it multiple times on planes
Avatar
That’s a good thought didn’t think about that
Avatar
Has anyone done a reverse location search through Google?
Avatar
Andrew Rathbun 4/11/2019 2:28 PM
@mitchlang for that I would just mirror a Google search warrant and change verbiage to fit Apple's ecosystem
Avatar
Aw man I want a tacticool backpack
2:56 AM
with a nametag ofc
3:01 AM
haha there's a Scottish thin blue line patch
Avatar
Axiom can decode Googly Chrome passwords if given the password right?
4:57 AM
do you need to re-do the analysis phase
Avatar
@Sudo Yes - if you provide the users Windows password, we can get their login password and their saved credit card information. This needs to be configured during the search setup phase (in the artifact selection screen, there's an 'OPTIONS' link under the Chrome icon)
👍 1
Avatar
Yeah I thought so
5:30 AM
No probs, just have to run it through again I guess
Avatar
Does anyone know if there's some decryption available for GandCrab 5.2? So far there's nothing publicly available but someone insisted there's something "super duper top secret" around. Maybe someone hacked into the NSA's super-computer and cracked the whole key!!! 😂
Avatar
no clues
Avatar
Tag archive for GandCrab.
👍 1
Avatar
Hey all, what is the current approximate cost of CAS at the moment?
Avatar
Reach out to your local sales rep
Avatar
Hi all, I’m in the private sector, and am working on some DFIR scripts for an AWS environment. I’m also reading through Practical Forensic Imaging with Linux (Bruce Nikkei, 2016) Most of the cloud based python scripts I’ve come across are created AdHoc and differ widely in their complexity. From the broader DFIR community are there any guidelines you all could share regarding securing cloud evidence? Thanks!
Avatar
RandyRanderson 4/12/2019 7:52 PM
it is going to depend heavily on the env. For AWS, I've just used Cyber Ducky or AWS PS modules for when it has been owned by us
Avatar
Thanks , I’ll take a looks at those.
Avatar
know any good free alternatives to blancco?
Avatar
PlastikPistol 4/13/2019 9:46 PM
@Joe Schmoe I’ve sent one off but haven’t received a response yet.
Avatar
Anyone know why my comp is trying to reach out to this Cellebrite site automatically? The software is off and I didn't accept the monitoring that popped up with last update.
Avatar
randomaccess 4/14/2019 2:54 PM
I think it reaching out is also the cause of the bug where it holds saying "please wait for background updates to finish"
Avatar
Dr. Kaan Gündüz 4/15/2019 1:34 AM
are they affiliated with facebook?
Avatar
Hello all, have a nice week. Any advice metadata tool for AutoCAD files. Need information of the file when created?
Avatar
try exiftool
Avatar
Thank @San4n6 will try
Avatar
exiftool not supported 😕
Avatar
Davesdailypicks 4/15/2019 12:00 PM
@Andrew Rathbun you helped me my last grey key question. The key accessed the phone but it’s not giving me a passcode. Any ideas on how to access the passcode?
Avatar
@Sudo when you set it to reprocess since you have already done everything else just add the same evidence again and turn everything else off and then under the Web Related artifact category choose the Options under chrome and enter the Windows password. Because none of the other indexing or artifact stuff is being processed then it will be quick
12:07 PM
Avatar
Andrew Rathbun 4/15/2019 12:22 PM
@Davesdailypicks I don't have access to GK anymore. I was working off memory. I'd recommend checking with their support or if someone here can help you through it that'd work too
Avatar
Yuri Gubanov (Belkasoft) 4/15/2019 9:58 PM
Dear colleagues! Belkasoft is happy to inform about the v.9.5 of Belkasoft Evidence Center (BEC) is now released and available for download. As was announced earlier, this release includes the following new large-scale functions: remote acquisition, incident investigations, cross-case search, TWRP dumps mounting and analysis, full file system copy of jailbroken iOS devices, detection of arrows and crosses on photos, Telegram X decryption, support for multi-partition APFS, massive update of the multi-user Team Edition version. Besides, we have added Bitlocker detection and decryption of Bitlocker and McAfee Endpoint Security with a known password. If you do not have a valid license, you can try the new version at https://belkasoft.com/trial. Sign up for a webinar on the new version at https://belkasoft.com/webinar
👍 3
Avatar
thanks for the info @Jamey
Avatar
Deleted User 4/16/2019 8:27 AM
Hey guys, I am attending the study Digital Forensics and I just started. This week we are having our Raspberry PI's hacked by teachers. The teachers leave evidence and we have to decode the files/messages and provide the solution. We found a PDF file on our PI and the only thing we found in it was the author which was encrypted in BASE64. We haven't been able to figure out ANYTHING else and are kind of clueless of what to do now. We tried decrypting the BASE64, but that didn't go anywhere(or we just can't figure out how). If anyone could maybe take a look and give us some tips that would be very much appreciated.
8:27 AM
33.11 KB
Avatar
if you look at the hash of that pdf in virustotal there are clues for you
Avatar
Background I'd like to think that security awareness has gotten to the point where the average end user thinks twice before opening an 'exe' file sent to them as an email attachment. I like to think that. I really do....
8:59 AM
I would also learn and understand what sandboxing is and understand hybrid analysis if you want to see what the pdf is doing..
9:00 AM
another link to learn 😃
Avatar
Deleted User 4/16/2019 9:08 AM
Thanks, i'll go ahead and check it out.
Avatar
@Deleted User Also it's important to not confuse encryption, hashing and encoding: Base64 is not something you "decrypt", it's something you simply decode 😉
Avatar
anyone have experience with Encase EDR? We have encase 8 right now and are about to start installing their endpoint product
Avatar
Deleted User 4/16/2019 8:44 PM
@@Kr yeah, we're completely new to this, hence why I might have made a mistale. Thanks for telling me. (edited)
😉 1
Avatar
Chris (Satu) 4/17/2019 5:31 AM
Anyone of you who had to deal with "Mcafee File and Removable Media Protection" and knows about any kind of tool that could support in decrypting the files? We received an external harddrive, where this was used to encrypt the files and it came along with a wizard, but the wizard regularly crashed when trying to access the encrypted files... I'd like to test out other ways of accessing the files if there are any. Thank you!
Avatar
talking about the .bup file?
Avatar
@here My agency is attempting to identify any possable suspects for a prosititution ring based out of my area. During a search warrent execution a clover credit/ debit card machine was collected for evidence. I have now been tasked with determining if any data remains stored on this device. Does anyone have any suggestions?
Avatar
How are you all getting tokens for cloud extraction? Is there a favourite method yet? Thanks!
6:46 AM
From computers that is
Avatar
UFED CA released a program which can get tokens from both PCs and Macs, haven't tested it though so not sure how well it works @King Pepsi
Avatar
Ahh wonderful, I’ll look into it!
Avatar
Cloud login collector is what it's called, you can grab it from their download portal
Avatar
Ahh I see it, cheers!
Avatar
Andrew Rathbun 4/17/2019 7:41 AM
From @heatherDFIR on her FOR585 Alumni Group
7:41 AM
Hey everyone, I recently did a marketing call with Oxygen to tell them where I think they are doing well and where issues lie. They are looking for some scenarios where Oxygen was helpful in opioid cases. I don't work cases like these, so offered to ask around. They do not need specifics and are nice enough. If you would consider talking with them - let me know. See the details below. Also, they are now recognized as a US based company. Could you reach out to your google group of alumni to see if any would be interested in sharing their stories with us? We would love to speak with them. In particular, if any of them have stories about their use of Oxygen Forensics products to combat the opioid crisis or fight drug crimes that they would be comfortable sharing publicly that would be great. Also, please find below a few sentences for customers that may have questions about whether Oxygen Forensics’ is an American company: Oxygen Forensics is a U.S. company based and headquartered in Alexandria, Virginia. In order to work with federal departments, companies must be certified by the U.S. Government under the Commercial and Government Entity Program and the National Institute of Standards and Technology, which Oxygen Forensics went through to help U.S. government agencies including the IRS, US Army, USSS, FBI, US Department of Defense, US Department of Justice, and the US Department of Homeland Security with their digital forensics needs. The company has also passed a rigorous training and vetting process through the FBI and was certified to be used as a tool by the computer analysis and response team (CART).
Avatar
Hi everyone, I had someone reach out to me asking about conducting computer/cell phone forensics on a laptop issued by there agency that is connected to their Domain and Active Directory. They tried to argue against it saying they needed to be completely isolated. There response was once you connect your profile is cached and then you can be air gapped. Does anyone have any resources or documentation that could back this up? Or what are everyone’s thoughts? Thanks!
Avatar
You can do whatever you want @Jobbins just document it
8:40 AM
Best practices dictate you should have an isolated device (when possable) and capture volitile infromation / decrypted data first.
8:41 AM
But if you have a uncooperative victim or whatever just document it in the report that you utilized encase or whatever to remotely connect to the device and captured an image while it was on
Avatar
Sorry, I should’ve reworded that. They want the examiner to use the agency owned device to conduct forensic on. Like as a forensic laptop. That has all there forensic software to conduct exams
Avatar
@Jobbins PD sysadmin here
9:45 AM
i have any machine that is going to touch a device from the outside world 1.) not joined to our domain and 2.) on a separate VLAN that can’t touch the rest of our network
9:46 AM
i want anything that’s being used to image as isolated as possible
9:47 AM
not to say it wouldn’t work on a domain joined machine, because of course it would, but its poor security practice
9:47 AM
to answer your question yes, you could sign in while connected to the domain and then unplug
9:47 AM
then used that cached domain credential to get into the computer....
9:48 AM
so there would be an airgap, but what’s the point if the machine is assumedly going to touch the LAN again in the future anyway?
9:49 AM
and if it’s not going to touch the LAN again, why does it need to be joined to the domain?
9:50 AM
IMO the best approach is to treat any machine that is going to use to image stuff from the outside as a potential risk and isolate as much as possible
9:50 AM
aka non domain joined, but that’s just how we do it at my department
💯 3
Avatar
Oxygen forensics has also just on-boarded Keith Lockhart to head their training team, I am in no doubt that with his training background and Lee Reibers Mobile knowledge we will see some new things from that camp soon
Avatar
@suckit thank you, I agree with you 110%
Avatar
anytime man
Avatar
I'm drawing a blank....does anybody know of a piece of software written by an LE guy that converts epoch time? (edited)
Avatar
Anyone know the current status of MPE+? Just saw a SMS renewal come across my desk. I’m leaning towards “no” given the number of cell phone forensics tools we have.
2:30 PM
@Jameson DCode from Digital Detective?
👆 2
Avatar
That's it..thank you. My brain was not working today
Avatar
Does anyone use MPE+?
2:31 PM
we have it too, but I have never used it
Avatar
@sholmes We haven’t for a very long time, but we’ve been paying for it.
Avatar
Us too
Avatar
MPE+ has not been updated in a long time but it is now part of the FTK suite of tools so something to work with if no other tools are working. I have used it on a Google phone and got good results but on iPhones and most Android phones it lacks functionality
Avatar
randomaccess 4/17/2019 9:46 PM
Not sure why people would be paying for a tool that isn't updated? Unless I'm missing the AD updates, them and guidance are slowly updating their tools every 3-6 months. Way too slow to keep up with today's mobile stuff
👆 1
Avatar
MPE a sinking ship, don't think AD are actively pursuing mobile forensics anymore, they are more interested in integrating the ingestion of extractions from other mobile forensic tools to then display the results in FTK. Of all the mobile forensic tools out there, MPE imo isn't one to be paying for still, unless they bundle it in for free with your other licence renewals - happend in my previous job but then we had licences for almost all of their other products 😂
Avatar
RandyRanderson 4/18/2019 1:46 PM
If you’re not using Cellebrite or XRY (older and knock offs), treading a thin line IMO. Even Oxygen is suspect with extractions. Which is a bummer bc their pricing model is a lot better than Cellebrite
Avatar
Andrew Rathbun 4/18/2019 1:47 PM
I've not had the most success with Oxygen or XRY extractions, personally. Cellebrite has always been the best far and away. Oxygen is a great analysis tool though as it can ingest Cellebrite dumps.
👍 1
Avatar
@DMG Warrant to Clover. They will give you everything.
Avatar
@dfeyen that’s what I told the investigator the Lt however wants me to pioneer new forensic methods apparently since he doesn’t want them to do that for some reason
Avatar
@DMG ha-ha. Well, tell him to buy you a practice device to test it out first. I’ve seen a handful of inquiries over the past few years like yours but most end up taking the legal process route.
Avatar
StormXploit 4/20/2019 4:30 AM
Hey ! Someone here have write ups of last year dfir challenge ?
4:30 AM
by brett shavers
Avatar
randomaccess 4/20/2019 6:23 AM
@StormXploit which challenge? I don't recall Brett writing up any challenges, just doing his case studies through patreon
Avatar
StormXploit 4/20/2019 6:26 AM
idk, like the one with the forensics on Alexa (Amazon bluetooth speaker) or the NAS forensics challenge @randomaccess
Avatar
randomaccess 4/20/2019 6:31 AM
Not sure. Don't think either were Brett But you can go to thisweekin4n6.com and there's 52 weekly posts for 2018 for you to skim :) you'll probably find it there
Avatar
StormXploit 4/20/2019 7:13 AM
thanks 😉
Avatar
Andrew Rathbun 4/21/2019 9:36 AM
So, you want to start a brand new, right-out-of-the-box, digital forensics lab in your police department? Want some tips? If you (1) work for a large-sized department, you probably already have a digital forensic lab staffed with full-tim...
💯 5
9:36 AM
Pretty good write up for those earlier asking how to start up a lab
Avatar
Andrew Rathbun 4/22/2019 8:21 AM
Wow, that's a pretty nice setup @Forensic@tor thanks for sharing
Avatar
Forensic@tor 4/22/2019 8:42 AM
@Andrew Rathbun Thanks...I got a similar one from a class and tweaked it.
Avatar
Andrew Rathbun 4/22/2019 9:25 AM
@Forensic@tor send it my way. I love peer reviewing
Avatar
Forensic@tor 4/22/2019 9:26 AM
@Andrew Rathbun I attached it to the message.
Avatar
Andrew Rathbun 4/22/2019 9:27 AM
My bad. Got a word document for track changes?
Avatar
Forensic@tor 4/22/2019 9:30 AM
@Andrew Rathbun I created it with Publisher and surprisingly I can't save it in word format.
9:32 AM
@Andrew Rathbun I converted via Acrobat. Not sure if the formatting held up. Sent it to you.
Avatar
Andrew Rathbun 4/22/2019 9:36 AM
Ok I'll get to it when I'm not driving
Avatar
@Forensic@tor wow. This is nice! I just looked over quick but seems awesome and very informative. I can give it a closer read, shortly!
Avatar
Forensic@tor 4/22/2019 12:55 PM
@Jobbins Thanks. @Andrew Rathbun gave me some feedback...so I have made some grammatical changes and such.
Avatar
Deleted User 4/23/2019 1:03 AM
@Forensic@tor I've downloaded it thanks. We are currently presebting Ufed reader training to our detectives
Avatar
anyone know how I can re-analyze a Nuix extraction to index all the text
1:51 AM
from an email extraction, so I don't have "raw source" data as such (anymore since it was cloud)
Avatar
Forensic@tor 4/23/2019 6:37 AM
@Jobbins @Deleted User Let me know if you have any feedback
Avatar
Deleted User 4/23/2019 8:15 AM
@Forensic@tor will do!
Avatar
natalied4784 4/23/2019 1:13 PM
I have a boost mobile hotspot device. Is there any information I could extract from this? I’m trying to connect it to a suspect but it’s the only device located.
Avatar
@natalied4784 I would think if you could get an extraction from it, you could get what devices had previous connections to the device.
Avatar
@Forensic@tor I didn’t see anything that needs change or added. Thought it all flowed really well and highlighted the key points and explained how to do lots of functions. Screenshots were great! Think it’s great! Thanks for sharing!
Avatar
forensicmike @Magnet 4/23/2019 4:19 PM
@Forensic@tor My only criticism is your time zone map doesn't show the Provinces in Canada! * shakes fist * but no great job sir, passing it along internally (edited)
Avatar
@Oxygen Forensics what is up with the customer page? I can't download updates. According to https://www.isitdownrightnow.com/customer.oxygen-forensic.com.html the site has been down for a week.
Customer down? Check whether Customer.oxygen-forensic.com server is down right now or having outage problems for everyone or just for you.
Avatar
Just got off the phone with Tech support and they confirmed the site has been down for a period of time and they are trying to resolve the issue. However, they were able to give me the updates I needed through other download mehods. Thanks @Oxygen Forensics (edited)
Avatar
What do folks use for case management and record keeping purposes? I have been using spreadsheets but am looking for better ideas.
Avatar
Andrew Rathbun 4/24/2019 6:34 AM
@Beefhelmet there was a lot of discussion recently on this. Try the search and see if that gives you some ideas in addition to others chiming in.
Avatar
We use a fairly dated IT support ticketing system for our examinations, (along side a police system), which while it does the job is running EOL soon. Will be fun when we change that out considering how embeded it is into our ISO 17025 SOPs right now (edited)
Avatar
I've twice requested a demo of ATLAS from magnet but haven't gotten a response
Avatar
As others have mentioned previously Black Rainbow is probably what we will move onto
Avatar
Is there any script or product that verifies secondary evidence (images) automatically or semiautomatically? It's easy to verify an image from 6 months ago, but multiply by # of cases and it gets pretty nuts.
Avatar
@Beefhelmet I used to use Lima, works pretty well - https://www.intaforensics.com/lima/
Avatar
natalied4784 4/24/2019 8:36 AM
@sholmes thanks I will let you know if I can get an extraction.
Avatar
randomaccess 4/24/2019 8:04 PM
@pmow can you explain your scenario a bit more?
Avatar
For analysis, exports, etc. I put a copy of every ingested image into a couple of ZFS arrays. Those are replicated to two other boxes and they're hashed and auto-healed.
8:40 PM
But garbage in, garbage out. I know that what I put in will continue to be the same hash, since the filesystem does block level bit-wise hashing on read and write. That isn't the issue. The issue is that there isn't a log of this, and the risk of a file being loaded incorrectly, which would just replicate the "bad hash" files. Which admittedly, is pretty unlikely.
8:41 PM
Arrays because speed, the advent of networking and all of those benefits, and well I still keep a copy offline
8:43 PM
But eventually, I'll migrate that copy to a second offline drive, and there's a cost involved in connecting it, attaching each image, verifying, and checking it off a "to do list". As you can imagine, after even just 5 years of doing this at 2 images a month, you'd have 120 images to maintain (and their copies). Wouldn't it be nice if an app would verify forensic images, like backup software does?
8:45 PM
@randomaccess before you say it, yes I know you can just script something like ftkimager cli, I sort of wish I'd have taken my scripts with me from my last job
Avatar
randomaccess 4/24/2019 8:51 PM
Scripting would be the cheap way but I think magnet automate would do what you're after too
Avatar
magnet automate eh? okay I'll check it out, thanks!
Avatar
encase hashes the image too
Avatar
randomaccess 4/25/2019 3:47 AM
@pmow but for cost, probably worth just scripting
Avatar
Anyone tried out the Magnet App Simulator?
Avatar
Hey dudes, how can I get the eMule/ed2k hash of all the files within a particular directory, outputted to a text file or something??
5:44 AM
I can do it one by one with Hash Calc but I'm losing the will to live.
Avatar
If you're comfortable with Java @Rossko , my recommendation would be to adapt the code from https://sourceforge.net/projects/jmule/ and just separate out the hashing functionality (edited)
Download JMule for free. JMule - Java eDonkey2000 p2p file sharing client. More info on http://jmule.org
7:21 AM
Ignore all my previous advice, just found https://www.slavasoft.com/fsum/index.htm from the same authors of HashCalc
7:22 AM
Command line tool, easy to call, would be easy to automate
Avatar
ah cool, cheers i'll check it out
Avatar
I think hasmyfiles from Nirsoft can do that too (gui and free program)
Avatar
@FabianoQ no, it just hashes
Avatar
Afternoon - does anyone have or know of a source for general/generic digital forensic statistics? By that mean a (global if possible) view of digital device proliferation, number of devices dealt with by police forces annually, stuff like that? Like an overview of the current state of play in the field (estimated)
Avatar
What's the name of the faraday box with the moon-man gloves and see through window? I brain farted it and I want to request one.
Avatar
4n6_Guy(Kevin Salhoff) 4/29/2019 10:12 AM
Ramsey box?
👆 1
👍 1
Avatar
yes - thanks!
Avatar
Andrew Rathbun 4/29/2019 10:15 AM
They're awesome, more expensive than a faraday box or bag but also a lot more effective.
👍 1
10:17 AM
The report “Global Digital Forensics Market 2018-2025” provides, wherever applicable and relevant, technical data and sheds useful light on expected commercial uses and current R&D status. This report will help the viewer in Better Decision Making. Dallas, United States ...
10:17 AM
Additionally, maybe someone from one of the vendors has some statistics they can share?
Avatar
Adam Cervellone 4/29/2019 10:19 AM
Good afternoon all, I've got a E01 hash question. I've imaged the same drive with XWF 19.8 in 2048 MB chunks and in FTK Imager 4.2.0.13 with 1500 MB chunks. Should the hashes of the two images be the same?
Avatar
Depends what your source is and how you're hashing I suppose
Avatar
@Andrew Rathbun Cheers I'll take a look when I'm back in the office tomorrow
Avatar
@Adam Cervellone - I haven't tested what you're asking about so I'm doing that now. My assumption is that the imaged media hasn't changed between acquisitions (no TRIM etc)
10:24 AM
I also assume you're hashing the e01 in a tool that knows how to hash an e01?
10:25 AM
my expectation is that they should hash out the same, but I will find out soon
Avatar
william beaux 4/29/2019 10:26 AM
a hash of the e01 file itself will yield a different hash because e01 files contain extra metadata. a hash of the image contained in the e01 should match the original media, regardless of it was written to disk.
👍 1
10:27 AM
*regardless of how it was written to disk
Avatar
Adam Cervellone 4/29/2019 10:29 AM
The evidence is a 320GB HDD from a damaged netbook. I am currently using Imager to verify the drive connected via my wiebetech forensic ultradock. Hopefully it matches one set of hashes.
10:30 AM
I was using XWF and Imager to run verification after the image creation. Those should be hashing the image contained within the E01 file, correct?
Avatar
My short test matches, assuming you're not hitting bad blocks etc I would expect them to match
Avatar
Adam Cervellone 4/29/2019 10:39 AM
I will document the results of the drive hashing and use which ever image file it is consistent with. I had already processed the original image from X-Ways in Griffeye before I found out something may be wrong with the image so I may not be able to use the original griffeye processing results now.
Avatar
I am starting a new group. It's going to be called OEUAA (pronouced OH-EE-Wa). It's the Organization to End the Use of All Acronyms. Let me know if you are interested in joining. I am working on the web-site now.
💯 3
😃 1
Avatar
@ds275 but I work for an acronym 😂
Avatar
A lack of funding and poor high-level leadership has led to a crisis in the forensic services.
Avatar
didn't mention my jurisdiction 😎
😄 2
Avatar
A joint review of the provision of forensic science to the criminal justice system in England and Wales and accompanying implementation plan.
Avatar
wibblypigftw 5/1/2019 1:35 AM
@Adam Cervellone if the source disk is damaged then different forensic tools fill the gaps with a different filler, which will cause a different hash on the image.
Avatar
I think this point is the most stand out one which will have the biggest impact for us:
1:54 AM
From April 2019 the Criminal Procedure Rules will change so that commissioning parties havea duty (if serving an expert’s report) to disclose anything which might reasonably undermine the reliability of an expert’s opinion or detract from their impartiality. The defence do not have to disclose a report if they do not want to use it. The Criminal Procedure Rules provide that experts must give details of their qualifications, relevant experience and accreditation and the associated Criminal Practice Direction requires that experts confirm they have acted in in accordance with the code of practice or conduct for experts of their discipline, and that they identify the code in question. For forensic scientists that will be the Regulator’s Code of Conduct. Where laboratories are not accredited the Forensic Science Regulator’s guidance recommends that any evidential submission should include such information as the court may need to decide whether the expert’s opinion is sufficiently reliable to be admissible as evidence. From 1 April 2019, experts will also have to make a declaration to those commissioning them if they have been subject to criticism by a relevant body. It is for the Crown Prosecution Service (CPS) to decide whether to include the evidence in the prosecution case and for the Court to decide whether it is admissible.
Avatar
Adam Cervellone 5/1/2019 6:42 AM
That would make sense. I hashed the disk again over the weekend and that came back as different than either one of my two images. The images are still good as their hashes have not changed.
Avatar
Any @Law Enforcement [UK] heard of EVIDENCE2e-CODEX/CASE? Particularly interested if anyone in a management/governance role has encountered these projects and is aware of any input being given from the UK (edited)
Avatar
Andrew Rathbun 5/1/2019 11:55 AM
Got an AXIOM question, maybe I'm overlooking something. Can you make a Portable Case that has just, say, Documents and Media, or whatever categories I want to choose?
11:56 AM
Because I don't want the technologically illiterate case agent to have to sift through all the other categories of stuff. Only Documents and Media are relevant. Nothing else (edited)
Avatar
Adam Cervellone 5/1/2019 11:59 AM
If you filter for Documents and Media from the Artifacts dropdown in the filter bar you can do a portable case and use the Items in current view setting
Avatar
Andrew Rathbun 5/1/2019 12:00 PM
Ahhh yes, that sounds familiar. I could've sworn I did this in the past! Thanks @Adam Cervellone
12:01 PM
I think it'd make more sense to just Create Portable Case and be able to choose categories from there but I also see the customizability of doing it that way, too.
12:05 PM
Now one more question, I generated a full Portable Case earlier with all evidence. Now that I know how to narrow it all down, the option to create a Portable Case is now greyed out. Any idea how to undo that?
Avatar
Adam Cervellone 5/1/2019 12:11 PM
Not off the top of my head but I can test it out in a little bit! I've got relatively small axiom case up right now with only one cell phone in it.
Avatar
Andrew Rathbun 5/1/2019 12:12 PM
If not, @Jamey might have an idea
Avatar
anyone here work in the Tampa, FL area?
Avatar
Forensic@tor 5/1/2019 12:59 PM
@mazummo I am at IACIS and the officer next to me is from near Tampa. Does that count.
Avatar
anyone know anything about Page file ".url" hex data
Avatar
Adam Cervellone 5/2/2019 6:25 AM
@Andrew Rathbun I'm currently testing out portable cases in Axiom. I did one of all my tagged items and one of everything in the case in that order and I don't seem to be having an issue with the portable case option being grayed out!
Avatar
Andrew Rathbun 5/2/2019 6:26 AM
@Adam Cervellone thank you for looking into it! I think I figured it out. I think when you have the Portable Case open while you have Examine open, you can't generate a Portable Case while it's already open
6:26 AM
I closed it and that option wasn't greyed out anymore so I think that must've been it
6:27 AM
Because I had generated a Portable Case with all artifacts and had that open already. I wanted to generate another Portable Case with just Documents/Emails and I apparently wasn't able to do that while another Portable Case was open. At least that's my theory and I'm sticking to it since it seemed to work out that way
Avatar
@Andrew Rathbun @Adam Cervellone looks like by my mere absence you figured it out. If you have any more questions feel free.
💯 3
Avatar
@Jamey - Thanks for your quote. "No APFS support for IEF". Agency approved the purchase
💯 1
Avatar
@Jay528 great to hear you are upgrading to AXIOM. Let me know if you have any questions.
Avatar
This is more of a LE question but has anybody been able to get "port" info from Facebook regarding IP address they provide through Subpoena or SW. DM me if you have thanks
Avatar
President signed an awesome cybersecurity executive order today! Here it is if you havnt seen it yet https://www.whitehouse.gov/presidential-actions/executive-order-americas-cybersecurity-workforce/
By the authority vested in me as President by the Constitution and the laws of the United States of America, and to better ensure continued American economic prosperity and national security, it is hereby ordered as follows: Section 1.  Policy.  (a)  America’s cybersecur...
Avatar
Andrew Rathbun 5/2/2019 6:31 PM
@Hells very interesting! Will be interesting to see how this plays out
Avatar
yea, much needed
Avatar
seems like a lot of places are starting to kick it into high gear
Avatar
Anyone using Eric Zimmerman's recmd tool? the cmd line version of registry explorer?
Avatar
randomaccess 5/3/2019 4:06 PM
A little bit
4:06 PM
@karch4n6 you have an issue?
Avatar
do you know any tricks to get "hh:mm:ss" output? All I can get is "hh:mm" and seconds are always :00... tried some --dt options but all my output is the same...
Avatar
randomaccess 5/3/2019 4:12 PM
I'm sure there's a way. I'll have to check when I get to a computer Otherwise @EricZimmerman might know ;)
Avatar
Thanks, I pinged Eric. Was just hoping I was missing something. Have a good weekend!
Avatar
randomaccess 5/3/2019 5:29 PM
@karch4n6 looks like there's a bug that he'll fix next week
Avatar
@randomaccess he wrote me back this am - handled already...he's a machine!
Avatar
@Everybody anyone work for FDLE in Tampa?
Avatar
Andrew Rathbun 5/6/2019 6:17 AM
@mazummo you might want to ping @Law Enforcement [USA] instead
Avatar
Connie Bell runs the digital forensic lab in Tampa.
Avatar
What is the best way to clone a hard drive? Image and then restore forensic image to the non-evidence disk?
10:32 AM
if so is one software best to use?
Avatar
Dr.Who-IACIS 5/6/2019 10:42 AM
@sholmes I believe FTK imager will do that.
Avatar
Yeah I was going to image it with FTK imager. I wasn't sure if imager would actually copy the image to a drive, but I know FTK will. I was just seeing what others were doing and if there was a best/better way of doing things.
10:44 AM
Thanks @Dr.Who-IACIS
Avatar
perryk_2772 5/6/2019 10:48 AM
@sholmes If you can get your Linux geek on, Guymager is part of several linux DF distro's. Will do the cloning for you.
Avatar
@perryk_2772 Thanks. I like that idea as well. We do use Kali for extractions. We could use that as well.
11:06 AM
Just thinking out loud here, but Is there an advantage to imaging first and then loading the image to a drive vs direct cloning?
11:06 AM
If you image, you can always reload and go
11:07 AM
vs touching evidence each time you reimage
Avatar
perryk_2772 5/6/2019 11:07 AM
depends on what you are ultimately wanting
Avatar
true
11:07 AM
PS4
11:07 AM
PS4 review
Avatar
perryk_2772 5/6/2019 11:07 AM
evidence device?
Avatar
perryk_2772 5/6/2019 11:09 AM
HD is encrypted...so the clone is for analysis. hmmmm. policy decision. The clone will give you an md5 hash
11:09 AM
if you image, now you have that
11:10 AM
which you can blow out at anytime to any HD
Avatar
I was leaning towards image and blow out
11:11 AM
so if it gets called into question and we need to retest, etc. then we have don't have to keep a cloned drive as evidence
Avatar
perryk_2772 5/6/2019 11:11 AM
that is the 'proper' process, unless storage of image files is an issue
Avatar
isn't it always an issue. LOL
Avatar
perryk_2772 5/6/2019 11:12 AM
or this device is not really that much of a concern and its more of a preview
Avatar
right
11:12 AM
we are doing one right now that is really just a preview. no suspected issues with the drive.
11:13 AM
however, I just received one where they suspect issues, so before I get to that case, I am prepping mentally.
11:13 AM
I think image and load to drive for testing.
11:13 AM
Thanks for walking me through that one.
Avatar
I believe we have used the Tableau Imager to make clones in the past
2:00 PM
Faster???
Avatar
We do have one of those, but I usually try to avoid it at all costs. 😃
2:02 PM
I haven't ever found it to be faster, but I have never really performed a time test on the same drive with it and a different write blocker.
Avatar
randomaccess 5/6/2019 2:04 PM
Thinking out loud, For game consoles its probably good to use a tool that lets you image and clone at the same time
Avatar
@randomaccess such as? and why?
2:06 PM
That is why I posted the question earlier, to find best solutions.
Avatar
randomaccess 5/6/2019 2:06 PM
Depends on your overall process
2:07 PM
If your lab is imaging anyways, then using tools that do both at once is an obv time saver
2:07 PM
Paladin will let you image to two places at once. But I'm not sure if it will clone
2:07 PM
The drive recovery tools by atola allow it, but expensive
2:08 PM
Otherwise theres things like the Voom shadow copy that allow you to interact with the original drive without changing it. But that brings us back to "do you image everything"
Avatar
we do image as much as we can
Avatar
randomaccess 5/6/2019 2:09 PM
For the last Xbox 360 I did, we imaged with data recovery tool (damaged drive), ran axiom over it, cloned it, and then used a stream recording tool to video the screen with the cloned drive inserted
Avatar
I do like the image and clone at the same time, but not at the price of atola. 😂
2:10 PM
I find Axiom usually does a pretty good job on the xbox family.
2:10 PM
we usually just image and then analyze those.
2:11 PM
Do you get much from them from the live access through a clone that you don't get through the analysis of the image of the drive? Obviously you had a damaged drive, so that changes the scenario potentially.
Avatar
randomaccess 5/6/2019 3:40 PM
Xbone and PS4 are encrypted so haven't had luck there. But even then, you can quickly take photos of what the player saw which was always good evidence
Avatar
randomaccess 5/7/2019 12:46 AM
Does anyone have a preferred method of iCloud acquisition?
12:46 AM
For the most complete data
Avatar
@randomaccess - alot of the tools dont work anymore because of the 2FA, for icloud data, I downloaded icloud for windows and synced all files and then created a logical image of the captured files
5:56 AM
documented the process
Avatar
SageFedora 5/7/2019 2:39 PM
@sholmes if you use Kali already for things, it has Guymager already in the Forensics folder.
👍 2
Avatar
randomaccess 5/7/2019 2:40 PM
@Jay528 ElcomSoft advertised that they dodeal with 2fa
Avatar
SageFedora 5/7/2019 2:41 PM
I prefer making an image as opposed to cloning, because then you don't need to think about drive sizes, so long as target => source. I have FTK Imager and Tableau Imager in my kit as well. Biggest performance limitations are always on the bus - USB 3, 3.1, Thunderbolt, spinning rust vs. SSD, etc.
2:42 PM
A key thing is to also ensure you're using a hardware write-blocker of course.
2:43 PM
Checksum all the things, and then original goes in an evidence bag, chain of custody, etc. etc.
2:43 PM
Oh, and photographs.
Avatar
Thanks @SageFedora I think we are on the same page. I think the best bet would be the image, based upon the need to preserve the original image for potential future issues. Once imaged, I can copy it out to a drive for reviewing.
Avatar
SageFedora 5/7/2019 2:47 PM
Yep, and then you can make copies of copies, if you really want. My view is to ensure I'm not screwed 2-3 years from now if I'm in court testifying ...
💯 1
Avatar
@randomaccess i have some friends in the private sector that said it didnt work after the new updates from apple
Avatar
randomaccess 5/8/2019 5:46 AM
@Jay528 yep. General consensus is 11.2 with 2FA caused issues
Avatar
chipmunk6416 5/8/2019 8:24 PM
Do you guys know any great blogs or articles about beginner for computer forensic terminologies or concepts?
Avatar
Andrew Rathbun 5/8/2019 8:26 PM
@chipmunk6416 in summary, what are you familiar with, if anything, and what do you hope to get more familiar with?
8:27 PM
Texas AM has free online training that may be useful for a beginner. Check #dfir-resources for the link
Avatar
chipmunk6416 5/8/2019 8:28 PM
Sure! I am sort of all over the places. What I know is basic fundamental information about how to use volatility and concepts of COC process. However, those are all done by researching and googling. I learned a lot of terminologies such as like Disk partition, different type of spaces, swap files, offset, hash... etc, but like to rebrush those terminologies as well.
8:28 PM
Thank you for the guide.
8:30 PM
I am currently looking at multiple forums from forensicfocus to learn more about forensic tools such as Encase by Access Data, Oxygen Forensic, Cellebrite, Axiom, Volatility, sleuth kit, etc.
Avatar
Andrew Rathbun 5/8/2019 8:32 PM
A blog about computer and digital forensics and techniques, hacking exposed dfir incident response file systems journaling
8:33 PM
EnCase is by OpenText, formerly Guidance Software. AccessData has FTK (edited)
8:34 PM
Google FTK imager and download it for free
8:34 PM
Image some flash drives around your desk and throw them into tools like Autopsy or the free trial of Axiom I linked
8:35 PM
Poke around and ask questions as you see fit
Avatar
chipmunk6416 5/8/2019 8:44 PM
This is amazing. Thank you for the detail information. I was wrong about Encase as well. (memoed haha) Thank you so much for providing information and this is wonderful!!
Avatar
compinspector 5/9/2019 5:46 AM
Can anyone recommend a tool for SQLite forensics? Has anyone used the forensic version of this tool? https://www.sqliteviewer.org/ . I have used regular SQLite browsers to import / analyze the db, wal, journal files but those are open source and unsure how good it is. Got Sanderson's book - just need to find time to dig into it. Thanks!
Sqlite Forensics Explorer provides great features for forensics investigation of Sqlite database and capable to read, preview universal data from Sqlite files.
Avatar
When you are doing extractions in your lab, are you extracting directly to an internal drive? ext HD? or NAS/Server?
Avatar
Andrew Rathbun 5/9/2019 12:52 PM
@ds275 I do both internal and external, depending on which way the wind is blowing. Ideally, straight to evidence HDD first then make a working copy from there. Either way, I make sure a best evidence copy is made for the evidence HDD and then a working copy is put on either my internal drive or NAS (edited)
Avatar
chrisforensic 5/9/2019 8:41 PM
general question - msab horizon .... i have some aquired mobiles (with ufed4pc) from a group of persons (illegal immigrants) and another group, which where caught on same day on another location.... i want to analyze their connection between eachother and between the 2 groups with msab horizon (don´t have ufed analytics) i know i can import .ufdr-files from PA to horizon and tried, but sometimes there is an errormessage on import, so.... someone knows which are the minimal requirements of an ufdr to import to horizon? is it enough to have an .ufdr mit contacts, calls, sms and phoneinfo for a fast import with no errors? thanks for helpful answers 😉 (edited)
Avatar
Andrew Rathbun 5/9/2019 8:42 PM
@MSAB
Avatar
chrisforensic 5/9/2019 8:42 PM
good morning @Andrew Rathbun 😉
🍻 1
Avatar
Andrew Rathbun 5/9/2019 8:43 PM
it's 2342 hours here!
8:43 PM
Almost midnight!
Avatar
chrisforensic 5/9/2019 8:43 PM
oh, i forgot... here in austria it´s 05:43 😂
Avatar
Andrew Rathbun 5/9/2019 8:44 PM
I'll be back on at the end of your workday 👍
😁 1
Avatar
Good morning @chrisforensic , you’re an early one! Guessing the error is version is too new or unsupported (I don’t remember the exact wording off the top of my head)? Unfortunately we have seen that with the more recent versions but not 100% sure why. Our development team are investigating, there’s something causing some .ufdr files to not import, question is what! I’ll let you know if there’s any update!
9:32 PM
XAMN 4.2?
Avatar
chrisforensic 5/10/2019 12:19 AM
hi @Erumaro thanks for your answer... five .ufdr files i imported to XAMN 4.2 and exported to .xry just three where supported? files where made with same version of PA 7.17 ? just don´t understand why 😅 (edited)
Avatar
I agree that does sound odd if it was the same version which leads me to believe there is something inside the file that XAMN does not handle. I will pass this along to our dev team!
👌 4
Avatar
Has anyone downloaded the Sleuth Kit from here: http://www.sleuthkit.org/sleuthkit/download.php I cant seem to get this to work. Im running Windows 10 64-bit
The Sleuth Kit is a C library and collection of open source command line tools for the forensic analysis of NTFS, FAT, EXT2FS, and FFS file systems
Avatar
Hey Everyone. Does anyone here in Law Enforcement have a list of questions already made up to provide to the Investigators at a search warrant? These questions are for the suspect to prove ownership of the device in question. Attain all social networking credentials, Usernames and passwords etc. This is in the event that I can't attend the search warrant myself. This is what I've come up with so far. Just don't want to recreate the wheel if I can help it.
3:28 PM
To prove ownership of the device. 1. Who owns this computer / laptop? When did you buy it? Who is your internet service provider? Spark / Vodafone etc. 2. Is there any encryption on this computer? 3. What is the password to the computer? 4. Is there anything on this computer that you’d like to tell us about before we start our search? 5. Is there anyone else that uses this computer? If so who? 6. Is there more than 1 username? 7. Who is your internet service provider? Spark ? Vodafone? Other? 8. Before we search the computer… Is there anything you’d like to tell us about that’s on the computer? 9. Do you use torrents to download files? Utorrent, bit torrent? Others? 10. If so / What kind of material and where is it stored? Downloads folder? / My documents folder? External Hard drives? Memory Stick? On the cloud? Drop Box, Google Drive, One Drive or any other cloud storage or file sharing service. 11. What social networking apps are you using? Facebook? Yes / No Instagram? Yes / No Twitter? Yes / No Telegram Yes/No What’s app Yes / no 12. Are there any other’s that I haven’t mentioned? 13. What are the usernames and passwords to these accounts?
Avatar
email accounts?
Avatar
Cool. Thanks.
Avatar
Andrew Rathbun 5/13/2019 6:57 AM
@Magnet Forensics just doing some general server housekeeping, I typically try to match the color of a vendor's role with the dominant color in their logo. Do you want to keep this random color I assigned a long time ago or do you want something more blue? Or option C - something else? Let me know any strong feelings one way or another.
Avatar
@Andrew Rathbun no strong opinions here. Amusingly our first M logo was more purple than blue
Avatar
Andrew Rathbun 5/13/2019 6:59 AM
If you have a picture you can share, that'd be cool to see
Avatar
@Andrew Rathbun I am kind of used to it now...
Avatar
Andrew Rathbun 5/13/2019 7:34 AM
@Jamey if that ever changes or if @Jad has strong feelings one way or another I can adjust. Figured I would poll you guys to get input. Just let me know!
Avatar
thanks
Avatar
Looking for a recommendation for a stationary magnifying glass, preferably on a swivel
Avatar
Dr.Who-IACIS 5/13/2019 9:17 AM
@mitchlang
9:17 AM
@mitchlang how about a lamp instead.
👆 1
💯 1
Avatar
That is what i'm looking for for sure. I just did the Kyocera E4610 EDL and was really squinting. it was crazy tiny shorting points.
Avatar
Andrew Rathbun 5/13/2019 9:23 AM
https://www.tagarno.com/tagarno-digital-microscope was what I had at my old shop. Expensive but it was awesome
Get digital camera microscopes with USB to display live high resolution images and video on a screen in up to 590x magnification and capture images
Avatar
Dr.Who-IACIS 5/13/2019 9:24 AM
@mitchlang I also have head worn magnifier. Bausch & Lomb Magna Visor with Lens Set from Amazon.
Avatar
Andrew Rathbun 5/13/2019 9:24 AM
I had that hooked up to my Windows laptop and used the Windows camera app to see on screen what I was doing.
Avatar
That is a great idea as well
12:55 PM
I submitted a request for a desk mounted unit this morning. I can see this being a re-occurring issue and a much needed tool.
Avatar
Unoriginal_name 5/14/2019 6:25 AM
I have a investigator from a cold case unit that brought in call detail records from a 2002 homicide. The CDRs reference cell towers that were used to make the calls. However, the cell tower location was not included only the number that referenced a tower. Does anyone have any way to learn which cell tower it was from 2002. Also- the cell company (AT&T)does not keep records going back that far and cannot tell us which towers were used.
Avatar
kmacdonald1565 5/14/2019 6:30 AM
eh, tough spot. i would try the feds to see if they have any input. or check with all possible departments that would have jurisdiction for that time frame and location to see if anyone did cell tower work for a case +/- a year or two...if anyone has a case that happened to take place in the vacinity...they may have some record you could use as reference. if what i am saying makes sense (edited)
Avatar
Unoriginal_name 5/14/2019 6:33 AM
That’s exactly what we are hoping for. Or someone that had a master DB. It was shortly after 9/11 so I’m sure the info is out there somewhere
Avatar
kmacdonald1565 5/14/2019 6:34 AM
yeah, its really a crapshoot...you dont have any real reliable option.
6:35 AM
i would hit up local/municpal departments all the way up through the federal agencies and hope to get lucky.
6:35 AM
did you try cell hawk?
6:36 AM
long shot cause i doubt the company is that old but may be they might be able to help
Avatar
Dr.Who-IACIS 5/14/2019 6:52 AM
@Unoriginal_name can you post a few lines of the CDR?
Avatar
Unoriginal_name 5/14/2019 8:27 AM
@Dr.Who-IACIS I’ll see if it is okay with the investigator.
Avatar
Hi! I'm starting to study the core of volatility but I don't understand how the VType size is calculated. Let say I have this VType: 'process' : [26, { 'pid' : [0, ['int' ]], 'parent_pid': [4, ['int']], 'name' : [8 , ['array', 10, ['char']]], 'command_line' : [18 , ['pointer', ['char']]], 'ptv' : [22, ['pointer', ['void']]], }] why the size of process is 26? (edited)
Avatar
Hello! Im looking to write up some reports for practice when i have the spare time, and im just wondering if the ones employed in the DFIR area have any report-outlines thar they are allowed to share. Mostly leaning towards evidence reports in digital forensics, just so i have an idea of the structure and what needs to be included in a professional report
Avatar
Does anyone know a vendor board level repair for Samsung Note 8 ? I had a phone with an inflated battery
Avatar
Andrew Rathbun 5/15/2019 10:40 AM
@Cygonaut At my previous gig, we just did a Word document with various headings and subheadings for each piece of evidence in the case. They would include a summary of how the evidence came into my possession, how I prepared the evidence for extraction, how I extracted it, the summary of contents extracted (think like Extraction Summary page on UFED PA) and then my findings summarized meaning whatever artifacts I located that were relating to the case. My summary report would be provided along with the million page reports generated by the forensic suite. Often my summary report was the go-to for the low hanging fruit evidence but naturally the million page reports were ultimately used to go over everything on the device. Hope that helps, let me know if you have any other questions
Avatar
Anyone use FEX here? I have a really dumb question.... I normally use XWAYS and can create reports easy az... I'm using FEX as one of my primary tools now. I've booked marked a ton of evidnce and want to create a report in HTML or PDF... I just can't find an option in the bookmarks to create a report from there... I have a reports option but and can extract to PDF from there however there's nothing that I bookmarked in the report. Any clues please? 😄 Thanks in advance
Avatar
Andrew Rathbun 5/15/2019 4:44 PM
@Gumpoo @GetData might be able to help. I tried FEX for a few weeks and really liked it. Wish I still had access to it.
Avatar
@Andrew Rathbun Thanks bro. yeah I'm loving FEX over XWAYS. I use Xways to validate my findings 😄 Thanks for your input.
4:46 PM
Belkasoft got back in touch with me with regards to Telegram.
4:47 PM
Hi Maria, Thanks for your email. I’m currently trying to get further information with regards to the telegram app. I’ve had a number of cases now where I can prove possession of an objectionable video (Mosque shooting, Christchurch NZ) There is a telegram app folder on the desktop with a number of other incriminating videos contained within it. I need to be able to prove that the user ‘distributed’ ie: Shared these videos using the Telegram application. Can Belkasoft Evidence Centre provide any other information That UFED or AXIOM can? look forward to hearing from you
4:47 PM
Dear Duane, Sorry for delay with the answer. Is it Telegram Desktop for Windows? As far as we know, it stores info on downloaded files but not on file transfers (that is on uploaded files). Also it doesn't keep communications locally. We will try to find something more tomorrow, but most probably we have nothing to help. Best regards, Anton. Belkasoft
Avatar
@Gumpoo The reporting in FEX is terrible to start. You need to build a template first.
Avatar
@Joe Schmoe Really? Bummer.. Ok. Will go back to Xways for now.
6:38 PM
Thanks for letting me know
Avatar
@Gumpoo I still like the program but the reporting is frustrating. It has some built in templates you can start with but it's not like PA or Axiom where you can just check some boxes and good to go.
👌🏽 1
Avatar
FEX is a really IMO once you get used to it and like stated create a template its pretty good. The template making can be tedious but once you figure it out its all godo
👌🏽 1
Avatar
Joe 🍿🍺 5/16/2019 4:00 AM
Anyone knows how to easily parse Google's file for synchronization, Sync_log.log? I need to find out when Google Drive was synchronized. If it was done automatically or if a user actually did it.
Avatar
@Joe 🍿🍺 free online parser here: https://toolbox.googleapps.com/apps/loggershark/ (filter for "info" events) Also does plaso: https://github.com/log2timeline/plaso (edited)
Super timeline all the things. Contribute to log2timeline/plaso development by creating an account on GitHub.
Avatar
Joe 🍿🍺 5/16/2019 5:43 AM
Thanks 😃
Avatar
hi, i am usually only dealing with windows devices and smartphones, but got this time a macbook image, which is file vault 2 encrypted. is there a way to perform an unencrypted re-aquisition of the image with blacklight to have a non-encrypted copy? I am not really familiar with blacklight and its kinda urgent (edited)
Avatar
@Gumpoo @Joe Schmoe FEX Explorer reports are generated within the report module based off of items bookmarked. The reports are template based and attending one of our classes you receive a GetData Training template. Sample templates are also included in the software by clicking on the new button of the report module. Feel free to send me PM to discuss and I can assist individually.
👍 3
Avatar
@.yuzumi. do you have knowledge of the pwd ?
Avatar
Andrew Rathbun 5/16/2019 12:39 PM
Got a question relating to @Magnet Forensics AXIOM. Let's say I deliver a Portable Case to an Agent and it's riddled with the worst malware, spyware, viruses, etc. I have suspicions that the Portable Case is an enclosed container, for lack of a better word, and the contents of the drive(s) that I provided as a Portable Case won't be a threat to the technologically illiterate people that may be on the receiving end of it. Am I correct in assuming that?
Avatar
cScottVance 5/16/2019 12:41 PM
@Andrew Rathbun the portable case would include any documents and media you selected within the included attachments database.
Avatar
Andrew Rathbun 5/16/2019 12:43 PM
I get that, but it appears the attachments database is in a proprietary format that's read by the Portable Case. Does said malware simply existing in the attachments database pose as a threat to the Agent receiving the Portable Case? Or would said malware need to be exported from the Portable Case and onto the machine before it can pose as a threat?
12:45 PM
Why I'm ultimately asking is because I need to be able to provide proof there's no malware/viruses on these Portable Cases I hand over. If I can say nothing poses as a threat in the case unless manually exported/Save Artifact To... is initiated, that's just all I'm trying to understand
12:47 PM
However, I see that I could just export all, say, Documents and Emails, to a folder on my case drive and just run a scan from there and include a screenshot of the results along with the Portable Case. So that's an option to consider, too
Avatar
that's a concern our group has as well, we're primarily in cybersecurity IR
1:36 PM
since we'd primarily be marking the malware for reporting in the first place
Avatar
@Karamba I have the recovery key, but not the password.
Avatar
@.yuzumi. BlackBags MacQuisition have the abilty to decrypt it if you have the recovery key or pwd, seems to be the case with BlackLight aswell according to this blogpost https://www.blackbagtech.com/blog/2018/04/02/ask-expert-apfs-encryption/ I haven't tried it myself
Here are our top five frequently asked questions about APFS encryption answered by Dr. Joe Sylve, one of our BlackBag forensic experts.
Avatar
@Oscar thank you for your reply. yep, I can open the image with the recovery key, however, other tools like EnCase only accept a "password" instead of the recovery key while in blacklight u can use both password or recovery key, so I was wondering if i can create a decrypted image out of the encrypted one using blacklight. similar to re-acquiring bitlocker images with EnCase. reason for this is, our team uses homebrew enscripts to pre-process data to push it then into nuix and they would like to continue using EnCase.
Avatar
@.yuzumi. I think that - if I understand your end-goal correctly - you need to retake a logical image (edited)
Avatar
Anyone here use JEB as an Android Decompiler? Thoughts or feedback?
Avatar
Its the best one on the market but a bit expensive
Avatar
Yeah, looks cheaper than IDA Pro + relevant decompilers initially, but at least IDA keeps functioning after a year if the subscription lapses
1:10 AM
Do you think it's better than IDA Pro + Decompiler for Android? (edited)
Avatar
It's different
1:12 AM
There is no dex/java decompiler in ida pro
1:12 AM
And i didn't used jeb for native décompilation so no opinion on that
Avatar
Ah my bad, I misunderstood. Forgot that the IDA support is for native ARM binaries
😉 1
1:13 AM
That makes sense then, thank you 😃
1:13 AM
I've just been making doing with jadx so far
Avatar
It's like using objdump vs idapro+hexrays 😛
Avatar
Wow, that big a difference? I'm going to need to scrape together some budget then haha
Avatar
Jeb is robust, have a lot cool things like xref/symbol renaming,... And a nice API that is very nice when you want to deobfuscate something
👍 1
1:18 AM
Last time i tried jadx it was damn slow also... Maybe it has changed
1:19 AM
Also you pay for a quick support service (like idapro+hexrays)
Avatar
I would have loved to have had symbol renaming on my most recent project. Yes, it was fairly slow (whilst still consuming a good amount of RAM)
Avatar
Anyone free to log into their blackbagtech account ? I am unable to log into the website.
Avatar
Andrew Rathbun 5/17/2019 5:31 AM
Yeah what do you need?
Avatar
I want my license key to update to macquisition but it is stuck at the log in screen
Avatar
Andrew Rathbun 5/17/2019 5:32 AM
Just logged in fine with Chrome
5:32 AM
What browser are you using?
Avatar
Chrome and IE
Avatar
Andrew Rathbun 5/17/2019 5:33 AM
Try Firefox? I have to use that for Cellebrite as Chrome never lets me download anything
Avatar
might be my account
Avatar
Andrew Rathbun 5/17/2019 5:42 AM
@Jay528 support@blackbagtech.com
Avatar
Thank you !
Avatar
@OllieD if you need what JEB does...like need it lol; it is worth it (just my 2 cents)
Avatar
Great, thank you 😃 I've played around with the demo this morning after @sh4ka 's recommendation and I have been impressed so far. A few methods in my target apk are not decompiled by jadx and stepping through the disassembled bytecode has previously been very time consuming. JEB appears to handle them correctly (although refuses to show me the decompiled results for a few of them because of demo restrictions). Being able to debug an APK from the same environment is nice too
👍 1
Avatar
I was on the fence about it for awhile, but after getting a test drive of the full version; and the amount of time I was spending in the work, it was a good decision
👍 1
Avatar
Is this JEB ?
Avatar
seems about right
6:34 AM
Avatar
⛧ Lucia ⛧ 5/17/2019 10:09 AM
does someone maybe have an .iso image of fccu linux 12.1 😅 ?
Avatar
may I ask why you need that specifically?
Avatar
⛧ Lucia ⛧ 5/17/2019 10:11 AM
because it's the latest version ^^
10:11 AM
well, late in that kinda sense
Avatar
why the fccu distri? there are a lot of other more stable and up-to-date
Avatar
⛧ Lucia ⛧ 5/17/2019 10:12 AM
yeah, but just for testing
10:13 AM
it's fun
10:14 AM
and the only one I could find is 9.0
Avatar
I could check this next week back at the office; in either way it's deprecated for about 10 years I think, you should really move on to something up-to-date
Avatar
⛧ Lucia ⛧ 5/17/2019 10:50 AM
thank you ^^ as said, just out of pure interest
Avatar
Hey All, im having some issues in Ubuntu command line. Can anyone help out?
Avatar
@mazummo any details ?
Avatar
Microsoft Adds Live Response Capabilities to Defender ATP https://www.securityweek.com/microsoft-adds-live-response-capabilities-defender-atp
Microsoft has added live response capabilities in Microsoft Defender ATP to help security teams more easily investigate incidents on remote machines.
1:26 PM
big news!
Avatar
Mattia Epifani 5/21/2019 11:55 PM
Hi all! We (me, Heather Mahalik and Adrian Leong) publishes today a paper on our research on “Using Apple Bug Reporting for forensic purposes”. It is a paper plus a set of scripts. You can find it here https://www.for585.com/sysdiagnose We wait for any kind of feedback!
Tresorit uses end-to-end encryption to keep file exchange secure and private. Access the received content via this link.
Avatar
NapsterForensics 5/22/2019 3:47 AM
Does Axiom support AFF4 image format?
Avatar
randomaccess 5/23/2019 1:44 AM
@NapsterForensics no but you can mount an aff4 image with either evimetrys file system bridge or the latest version of Arsenal image mounter
👍 1
Avatar
NapsterForensics 5/23/2019 2:42 AM
I check it out @randomaccess thanks.
Avatar
Anyone have the SEH dongle server ?
10:54 AM
The myUTN-80 Dongleserver lets you manage your USB dongles over the network.
10:54 AM
Got a question
Avatar
Andrew Rathbun 5/23/2019 10:57 AM
Man those things looks awesome but I totally can't justify one
10:59 AM
there is a cheaper alternative that people are using
10:59 AM
Not looking to spend my own $ on a Rasperry Pi
Avatar
@Jay528. I love VirtualHere. So far it has worked flawlessly. I have it running on a Synology NAS.
Avatar
How many ports is on the NAS ?
11:56 AM
Would you be able to use a USB 10 port hub and connect it to the NAS ?
Avatar
@Jay528 we have a couple of them.
Avatar
@randomaccess hey- do u know if the free version of arsenal image mounter will work with aff4 ?
Avatar
randomaccess 5/23/2019 3:08 PM
@Jay528 yes
3:08 PM
Don't get it from github
3:08 PM
Sign up to their mailing list and you should get a download link
3:09 PM
Overall the process for getting the free version is unnecessarily difficult if you have multiple computers @Arsenal Recon
Avatar
How about APFS ?
3:11 PM
I created an AFF4 with MacQ on a newer macbook
Avatar
Major new version of AIM, and new website, on the way soon. Currently at Microsoft (CTIN) so I will be expediting these things next week.
💯 2
Avatar
randomaccess 5/23/2019 3:11 PM
Great!
3:12 PM
@Jay528 a few questions arise from that. An aff4 ingesting tool is only going to get you part of the way
3:12 PM
Is the image encrypted?
3:12 PM
Do you have a tool that can read apfs
Avatar
No, it isnt encrypted
3:13 PM
I wanted to process in axiom
3:13 PM
As the APFS Container on the T2 system is acquired, MacQuisition interfaces with the T2 chip to decrypt the T2-protected data creating a decrypted physical image. In order to create the physical image, MacQuisition creates an image using the open standard Advanced Forensic File Format (AFF4) image format. AFF4, supported by a number of popular forensic tools including BlackLight, provides modern compression algorithms and the flexibility required to efficiently image data in a non-linear or sparse way.
3:13 PM
I wanted to mount the AFF4 and process with axiom
Avatar
randomaccess 5/23/2019 3:14 PM
Right
3:14 PM
Try AIM. It may work
Avatar
randomaccess 5/23/2019 3:15 PM
Otherwise evimetry using the file system bridge should display the contents of the image as a .raw file which you can process with axiom I'm not 100% sure the file system bridge comes with the community version of evimetry though
3:15 PM
What version of AIM do you have?
Avatar
v2.6.40
Avatar
randomaccess 5/23/2019 3:18 PM
Hmm I think that's the earliest version. It might not work with whatever macquisition is doing
3:19 PM
I have done it before though with an aff4 image converted from e01
3:20 PM
By earliest I mean current. I need more sleep
3:21 PM
If you want to make it really convoluted you can get blacklight and then export to LEF and load that into axiom. Lots of effort and expense tho
3:23 PM
Also you should probably tag @Magnet Forensics @cScottVance @Jamey to help They may have a work around
Avatar
cool thanks, have a good night
Avatar
I can send you latest internal build when I’m done at MS. Email mspencer@ArsenalExperts.com. We have been using the AFF4 w/o problems in our latest internal builds. (We has intended to launch over a month ago, but... software.)
3:27 PM
Has=had
Avatar
thanks !
Avatar
@Jay528 There is a 20 Port USB hub attached. No issues with it at all.
Avatar
How to use Windows Sandbox in the Windows 10 May 2019 Update: https://www.windowscentral.com/how-use-windows-sandbox-windows-10-may-2019-update
In this guide, we'll show you the steps to enable and get started using the new Windows Sandbox experience to run untrusted apps without affecting your device on the Windows 10 May 2019 Update.
👍 3
Avatar
Sandbox looks interesting. I know some anti-virus products had a similar option a while back. Personally I tend to just throw untrusted stuff into a secure VM but this might be a viable alternative if it's done right (edited)
Avatar
Too bad some stuff detects VM and refuses to work
👍 2
4:00 AM
I have to test this at home, 1903 installed fine somehow and i have a candindate app to try
Avatar
@Joe Schmoe - I'd like to remote desktop into a working machine to create cellebrite reports. Dongle is not recognized. Any issues ?
Avatar
Andrew Rathbun 5/24/2019 5:39 AM
EnCase and Cellebrite and likely a few others aren't recognized over RDP. I've heard TeamViewer is a workaround but I haven't tested that myself
5:39 AM
Axiom and FTK dongles work over RDP. Source: doing that as I speak
Avatar
You mean your locally connected dongle doens't work on remote machine over RDP or if you connect to a remote machine that has dongle connected, it won't work?
6:13 AM
It should make no difference what kind of software you're using if dongle is connected to remote pc. Otherise some soft of usb sharding/redirecting would be required but i don't think RDP or TeamViewer does that
Avatar
Anyone whose used the type script command; how did you write it up? Currently the output looks very messy Thanks!
Avatar
Apologies for the lack of clarity. I mean script for Ubuntu etc
Avatar
Andrew Rathbun 5/24/2019 8:09 AM
@Arcain if I RDP from home to my office into a workstation that has a Cellebrite or EnCase dongle plugged into it, it will not recognize the dongle and therefore the software will act as unlicensed aka inoperable.
Avatar
@Andrew Rathbun that's odd security protection. After all you're just accessing your own remote workstation.
Avatar
Andrew Rathbun 5/24/2019 9:06 AM
@Arcain couldn't agree more. Frustrating, to say the least. So now I can only use Cellebrite or EnCase on computers physically in front of me. I travel often in my job so that makes it tough because I'd like to be able to do all my processing remotely on a beefy workstation rather than a 4 year old MacBook Pro
Avatar
I guess i won't test Windows Sandbox. It doesn't work for some reason... says it can't find a specified file type error.
9:29 AM
So that's about it being useful for me
9:33 AM
Seems to be an issue related with using a localized version of Windows, an error reported 3 months ago... good job MS 😉
Avatar
@Andrew Rathbun You can get around this for EnCase v6 & 7, not sure about 8. Do you have the batch file to use RDP with EnCase? I think David Nides may have built it?
Avatar
Andrew Rathbun 5/24/2019 9:50 AM
Nope I don't. Frankly, I try not to use EnCase so that wouldn't be of much use to me but it would be good to have just in case I'm in a pinch. Got a link? I have dongles for 6/7/8 so I can always test on 8
Avatar
Ok. I will email it to you.
Avatar
Andrew Rathbun 5/24/2019 9:53 AM
Will PM you my email
Avatar
Anyone have a good terroist keywork list?
Avatar
kmacdonald1565 5/24/2019 1:14 PM
now that is one hell of a request
Avatar
Forensic@tor 5/24/2019 1:15 PM
I didn't know there were good terrorists. 😂
Avatar
Andrew Rathbun 5/24/2019 1:15 PM
It's all relative, I guess
1:17 PM
. (edited)
1:17 PM
ty ty ty
1:19 PM
Avatar
Dr. Kaan Gündüz 5/25/2019 3:17 AM
#define terrorist
Avatar
I put one together and must have been questionably intoxicated when I posted. Was looking for something with weapons, bomb making material, high risk venues etc
Avatar
Dr. Kaan Gündüz 5/25/2019 4:04 AM
Reminded me anarchist’s cookbook
4:04 AM
If that is still available online
Avatar
im sure you could still find it if you looked
Avatar
Yes, I've just had a quick look, and found a PDF online. On a side note, there's youtube vids apparently where guys rent out a warehouse to try some of the stuff contained in the book.
Avatar
Regarding the remote software licencing VNC works very well as you get your current desktop. We use it to access some headless workstations for axiom processing, but as it's only sharing your desktop 'screen' everything works.
Avatar
Deleted User 5/27/2019 8:48 PM
What backpack do you carry for on-scene previewing?
Avatar
MrMacca (Allan Mc) 5/28/2019 4:32 AM
Not a forensic question as such, more of a Microsoft Word question, so hoping this is the right section to ask, as well as there being a Microsoft Word Guru present :p. We have a report that is generated and then we import the photos to the document. The issue is that the alignment is completely out of place. 1 - Is there a way to make every image within a word document resize so that it fits a certain dimension? 2 - Is there a way to detect an image, and then create blank space until the next page after it? Otherwise we will have to continue manually editing 500+ pages 😛
Avatar
Andrew Rathbun 5/28/2019 4:51 AM
@MrMacca (Allan Mc) https://www.datanumen.com/blogs/2-methods-quickly-resize-pictures-word-document/ might be helpful? Looks like you set a setting and then can easily repeat it with F4 for each picture. Might require manually scrolling but it might make it hurt less
Avatar
I think you can do it with a macro as well, I seem to remember using one a long time ago for something similar to this but I am afraid I didn't write it and no longer have it!
Avatar
Andrew Rathbun 5/28/2019 5:00 AM
In a blank document, I insert images (screenshots - all are of same size and same format) from a folder. I want to resize the images to a desired size. All now I am doing is selecting one image by ...
👍 1
Avatar
MrMacca (Allan Mc) 5/28/2019 5:46 AM
@Andrew Rathbun Yeah I tested it, seems to resize fine. Now I need to find one that will create a new page with the text that follows the image.
Avatar
@MrMacca (Allan Mc) Here's someone talking about the find and replace and what to look for after an image https://word.tips.net/T009624_Placing_Many_Graphics_in_a_Document.html
Word documents can contain more than just text. You can even create documents that contain almost no text at all. This would be the case if you have a document in which you want to insert a large number of graphics. This tip explains how you can easily do the insertion and ma...
Avatar
MrMacca (Allan Mc) 5/28/2019 6:13 AM
@JaiRoc Looks promising, the replace function works, just need to find out what's the command to place it on a new page, rather than a paragraph. Cheers for that.
6:14 AM
trying ^m
6:15 AM
Yeah that works 😄
Avatar
Awesome!
Avatar
MrMacca (Allan Mc) 5/28/2019 6:15 AM
So within Word, Press CTRL H to bring up the find and replace Find what = ^g Replace with = ^&^m
6:16 AM
now for a proper test it works
Avatar
We use a macro that replaces the images in our contraband reports with place holder images for creating our sanitized reports. I will see if I can get it to you.
Avatar
MrMacca (Allan Mc) 5/28/2019 8:03 AM
At the moment, we have a file that generates the word document, then imports all of the photos. Those photos then need to be aligned and resized so ideally they can fit onto 1 page, unless they are a full page image. And then the next exhibit entry should appear on a fresh new page, rinse repeat. It's a tedious job atm formatting it and so on for the report, so i'm trying to find a nice easy 2 minute solution. @RAM Thanks, It could come in useful.
Avatar
Adam Cervellone 5/28/2019 10:57 AM
Do any agencies/companies present here use a mobile forensics lab such as a van with tables and power outlets to do on-scene forensics?
Avatar
Andrew Rathbun 5/28/2019 10:59 AM
I just have a large Pelican case full of equipment that I bring on scene and I just set up shop in a room and utilize the local table and power outlets.
Avatar
We have a van that we use for on scene forensics. Nothing special. Very low budgets.
11:02 AM
But it works
Avatar
Adam Cervellone 5/28/2019 11:04 AM
I am asking because we just got two new ones to replace our old ones that were unsafe at any speed. They are fully outfitted but we need a chair to use at the pull down desk we have mounted to the wall. The stock fixed height chairs we used last week on-scene were a bit short for me and I am about 5'6"
Avatar
Andrew Rathbun 5/28/2019 11:05 AM
Would definitely like to see pics of your setup, if you're willing and able
Avatar
We use folding chairs so I don't think I can advise on a specific chair to use. 🙁
Avatar
@ds275 chair comfort is important!
11:06 AM
as is height, at 5' 8" i don't like t leave my legs dangling
👍 1
Avatar
Last time I closed the door on our Forensic van half of the rocker panel fell off so I believe we are in need of a new one as well.
😂 3
Avatar
Adam Cervellone 5/28/2019 11:14 AM
I'll check with my supervisor to see if i can send a picture or two of the van. Our old ones had bad breaks, carbon monoxide issues, and had problems starting up so the new ones a huge blessing!
Avatar
we just applied for one. Hopefully they approve it. 😃
💯 1
Avatar
Morning from Georgia. I am mostly a Mobile guy currently but was posed at the file that would provide details if a user will be prompted with a password to login into Windows 7 OS. Thank you in Advance
Avatar
you want to know if the setting is on for the user to have to login with a password?
Avatar
anyone recommend any open-source wifi finders?
6:23 AM
for connections found on a phone
Avatar
https://wigle.net/ @mazummo this what you're looking for?
Maps and database of 802.11 wireless networks, with statistics, submitted by wardrivers, netstumblers, and net huggers.
Avatar
@0x3db Thanks. I have attempted Wigle; however, I don't think it works well with x.25 format
Avatar
Yes if the setting is on
Avatar
These "i know your password" emails are getting hilarious xD
Avatar
Am giving a presentation next week to our first responders with regards to best practice with CCTV, Navman GPS type systems, Is there any guide anywhere that you peeps know of? Just don't want to miss anything if I can help it. 😄 thanks in advance. (edited)
Avatar
Anyone know if eBay maintains original photos with metadata?
Avatar
@Joe Schmoe serve the paper and let us know 😃
Avatar
@Krisaytha. Well you're no help. 😀
💯 1
6:43 AM
I was hoping that eBay was a little slow to the metadata stripping party but no such luck.
Avatar
Does anyone know if Axiom is able to process apple prodcution data?
10:47 AM
I cant use PA because I RDP into the machine and license doesnt work
Avatar
I'm told that eBay does keep the original images for a limited time. Not sure how long. I'll give an update when I get the search warrant results.
Avatar
Folks that have passware plugin for axiom. Is it a one time purchase of the passware software? I get that there are a year of upgraded included in the initial but if I decide not to reup I still have access to the software?
5:49 AM
Further, I don't run into a need for it often but once in a while I get a complicated case involving encryption...what's the success like on decrypting something like APFS?
Avatar
Does anyone have an up to date matrix of software/hardware capabilities with respect to mobile devcies and compatibility? For example, in order to examine an iPhoneX, you need tool X, Y or Z.; in order to analyze a Samsung S9, you need tool X, etc. OR alternatively, a matrix that lists tools and provides what their capabilities are. My group needs to explain to managment what our specific capabilities are (or more specifically what our limits are). While I can certainly explain it verbally, I'm wondering if there's such a matrix out there already for presentation or reference purposes.
Avatar
Andrew Rathbun 5/31/2019 8:21 AM
@5cary I will keep looking but best I can find is https://docs.google.com/spreadsheets/d/1EeDjYdZM0ByKgnJgc7Go6ihV8IuqEw8tm9H93O3_3xQ/edit from the MDFA Google Group. Looks like this is more a case for Cellebrite UFED
Form Responses 1 Timestamp,Phone Manufacturer,Phone Model,Extraction Method,Difficulty,Processor,Memory Type,BGA Chip Part Number,BGA Package Type,Notes 2/23/2017 13:24:31,Alcatel,2017B,Chip Off,Easy,QSC6155,eMMC,JW616,BGA137NP,FCC ID RAD506. Have had same model with other ...
8:22 AM
What tools do you currently have? What types of cases are you mostly working?
Avatar
@Andrew Rathbun : That's a very useful spreadsheet. Thanks. We have Cellebrite tools (UFED Touch 2 and PA), and are equipped for basic JTAG and chip off. No ISP/Flasherbox or GrayKey. So I'm trying to communicate to managment what we cannot do (I guess that's a better approach here).
Avatar
Andrew Rathbun 5/31/2019 8:32 AM
@5cary off the bat, I would highly recommend 4PC over the Touch. You can throw 4PC on a hundred laptops and just pass the dongle(s) around the unit
8:32 AM
Going from the first Touch a few years at my previous agency was a great decision for the unit
Avatar
Yeah seconding the touch being the dumbest thing. NCFI is still giving out touch 2 rather than 4PC
9:11 AM
It's just a pain and adds a step in the process for me
9:11 AM
because I have to either write straight from the device to my PC or to removable storage
9:12 AM
the connection to PC doesn't utilize 3.0 so it's gross.
9:12 AM
and it takes up desk space.
9:13 AM
I get their reasoning to have something mobile...but you could do that same with a laptop with 4pc
9:13 AM
so no...I don't get the reasoning
9:14 AM
I highly recc GrayKey if you can get the budget for it. Yeah it can bypass the need to brute a passcode in certain circumstances and can bruteforce (but very slowly) where it shines is in this full extractions on paired devices
9:14 AM
KnowledgeC is where all your smoking guns are if you get lucky enough to get it.
9:15 AM
and you only get that with that level of extraction. ...no other tool out can get you that. That's the selling point of Graykey...not the passcode bypass IMO.
Avatar
Good info @Beefhelmet . I'm on board with the 4PC, but right now we have what we have. I'm just a knuckle dragger. We've pushed for GrayKey for a couple of years now...no dice.
Avatar
I got mine funded by having our multi jurisdiction NARC unit pay for it
9:23 AM
"hey think of all them dealerz phones we can hax"
9:23 AM
They pay for it in one forfeiture...
9:24 AM
Since then I've touted as such an asset to the rest of the counties major crimes investigations the chiefs/sheriffs re-upped it with no questions asked
9:24 AM
Just gotta get creative :3
Avatar
Well, I'm at a 3 letter .gov, and we use iphones on our enterprise - still no dice.
Avatar
Same boat. We just have a county wide drug unit that the DA's office runs. I just asked nicely for a new gray box instead of them blowing it on another "undercover" blacked out charger...
9:31 AM
with the promise to handle any DFIR needs they might have
Avatar
for you incident response folks, how do you generally organize your loadout? I don't have a dedicated preview vehicle and won't be getting one. Currently, I have a checklist and I pack a backpack plus a cellebrite and a TD2U briefcase. Was curious if there's a sub $300-400 padded case option like a pelican that you folks use
9:52 AM
or if you HAVE the padded case option and feel it's not all it's cracked up to be that'd be good to know also. The backpack solution is just disorganized and I spend a lot of time packing/repacking
Avatar
Andrew Rathbun 5/31/2019 9:53 AM
@whee30 I just switched from this old, beat up Pelican case
9:53 AM
To this Pelican Air case, which is longer and not as wide and is a lot lighter.
9:54 AM
I was worried about losing the storage on the inside of the lid in the first picture but I was actually able to fit everything perfectly in the Pelican Air case
9:54 AM
I also bring a backpack carrying my laptop and any snacks, dongles, paperwork, etc, but that's about it
Avatar
I had been looking at cases large enough to hold the laptop also, I suppose if I carry the laptop separately my options are greater
Avatar
Andrew Rathbun 5/31/2019 9:55 AM
I carry a Rush 24 backpack so it's way overkill. I could get away with a lot smaller backpack but I like having the MOLLE attachment for my water bottle, an attachment where all my dongles are stored, etc
9:55 AM
Plus I'm tacticool that way
Avatar
molle and velcro patches help the downloads go faster
Avatar
Andrew Rathbun 5/31/2019 9:55 AM
It's science
Avatar
I see you use pelican, did you check out other brands or just go with the known name? It's the only brand I know to consider
Avatar
Andrew Rathbun 5/31/2019 9:57 AM
It's what I was given. The Air is a lot more manageable in terms of weight than the Pelican case in the first picture. Another thing to consider for my situation is I ship this kit all over the country for operations if need be. I pretty much need a Pelican case. I haven't shipped the Air yet so I don't know how that will hold up compared to the beastly previous one
9:58 AM
Buy 1615 Air Case Available with trekpak divider system, padded dividers, no foam, foam. Up to 40% lighter protective waterproof cases. Interior: 29.6
👍 1
10:02 AM
I also work for a 3 letter .gov so it's more about what's given to me than what I shopped for. That being said though, I can't say I'd consider anything else because they really are solid
Avatar
@Andrew Rathbun US gets that carpet whole sale, our office has the same
💯 2
Avatar
Seconded the carpet
10:15 AM
Also what in the hell are you taking out? I bring a laptop and a TD2 kit and maaaybe a cellebrite.
10:16 AM
I'd rather just take phones back to the office
10:16 AM
oh and a wallet of a gajillion flashdrives
Avatar
Andrew Rathbun 5/31/2019 10:17 AM
4 TD2us, all corresponding cables and power cables, every cable you can think of for SAS, SATA, etc, drive docks, lots of HDD's as you can see on the bottom right, thunderbolt dock
10:18 AM
various writeblockers
10:18 AM
This is geared for me being out of state and responding
10:18 AM
not having an office down the road
Avatar
he takes all the thingz, all of them
Avatar
@Beefhelmet Just came back from NCFI and they gave out 4PC dongle. I don't know when they switched. I like 4PC much better than the Touch.
Avatar
Ginger Bouncer 6/2/2019 11:25 AM
yo i have a new keyboard ibstalled instead of the default
11:26 AM
ive made my new one the default but when rebooting its the default keyboard thst shows when i type in my passcode. whh is that and can i change it, its android 9 and a huawei
Avatar
NapsterForensics 6/2/2019 8:03 PM
@Magnet Forensics I have this error on few memory dumps. Do I need to recapture it or any work around available for this error?
Avatar
@NapsterForensics If you have the means, a recapture is probably ideal. Alternatively, if you happen to know the image profile information, if you back out of that screen and choose the second radio button of 'I want to select the image profile myself', and provide the details it should work
👍 1
Avatar
NapsterForensics 6/3/2019 7:02 AM
Noted, Thanks @Moody
Avatar
@CLB_joshhickman1 - Hi Josh, I have been reading some of your blog today (great job, very interesting articles) and came across the part about the Android 9 image you populated with test data. It could be im just being stupid but in the associated download link I cannot see the sda.7z file, only the Andriod 9 tar - is there another link to get the bin file? Thanks! (edited)
Avatar
MrMacca (Allan Mc) 6/4/2019 5:45 AM
Hey, does anyone have a method of creating custom bad sectors on a brand new hard drive, that can then be used for testing acquisition software accuracy?
Avatar
Andrew Rathbun 6/4/2019 6:00 AM
@MrMacca (Allan Mc) honestly, https://groups.google.com/forum/?hl=en#!forum/datarecoverycertification might be the right place to ask. It's all data recovery experts in there
Google Groups allows you to create and participate in online forums and email-based groups with a rich experience for community conversations.
6:00 AM
I did some Googling but found nothing definitive. Saw some very old posts talking about a MAKEBAD command you can send to mark sectors bad without making them bad
6:00 AM
Not sure how much of that is still valid in 2019
Avatar
@MrMacca (Allan Mc) I might be able to get hold of something that does it, in Linux. We did this in my last job for ISO 17025 which I have no doubt is why you are asking the question 😂
6:01 AM
But I dont have the commands to hand and can't remember them, however I will see if I can reach out to someone
Avatar
MrMacca (Allan Mc) 6/4/2019 6:02 AM
@bizzlyg You are correct. Cheers @Andrew Rathbun
Avatar
CLB_joshhickman1 6/4/2019 6:04 AM
@bizzlyg Since the image was moved to Digital Corpora, the format has changed slightly. The android_9_tar.gz should contain everything. But, you reminded me that I should modify the blog post accordingly. 😃
Avatar
@CLB_joshhickman1 cheers, however its only 4gb ish which from reading your notes is way too small?
6:05 AM
I opened up that tar, can see a logical extraction in there but no bin
Avatar
Andrew Rathbun 6/4/2019 6:05 AM
I still have the sda.bin sitting around on my NAS at home if anyone wants it
Avatar
CLB_joshhickman1 6/4/2019 6:05 AM
No, that's the right size. They REALLY compressed it.
Avatar
Andrew Rathbun 6/4/2019 6:05 AM
@bizzlyg I'm seeing the same thing
6:05 AM
no .bin
Avatar
CLB_joshhickman1 6/4/2019 6:05 AM
Really? Hmm...
Avatar
someone has stolen the bin! 😉
Avatar
Andrew Rathbun 6/4/2019 6:06 AM
Avatar
If you have a way of sharing it @Andrew Rathbun that would be great
Avatar
Andrew Rathbun 6/4/2019 6:07 AM
I'm a digital hoarder so you can always count on me for stuff like this lol
Avatar
haha
Avatar
Andrew Rathbun 6/4/2019 6:08 AM
It'll take a bit to compress and upload but I can do it unless @CLB_joshhickman1 has a mirror readily available
6:08 AM
I can host it on the shared Google Drive, too
Avatar
No worries, no rush at all I just wanted to try it through our software, as a test
Avatar
CLB_joshhickman1 6/4/2019 6:11 AM
Well, the .bin had all of the available partitions from the phone. The issue was the /data partition was encrypted (I couldn't get a single .bin file with everything).
6:12 AM
Even though the phone was rooted.
6:13 AM
Apologies for that. Let me contact the host and see if I can get it corrected.
Avatar
No problem, actually wasn't sure if I was being a muppet and just not seeing the obvious somewhere
Avatar
CLB_joshhickman1 6/4/2019 6:16 AM
@Andrew Rathbun I have a compressed sda.bin file (64 G down to 11 G), but I'm working off of a slow wireless connection today (construction workers cut our fiber line yesterday - still not fixed).
6:16 AM
It'll be later this afternoon/evening before I could upload it.
Avatar
Andrew Rathbun 6/4/2019 6:16 AM
@CLB_joshhickman1 I'll see what this gets down to. If it's not 11GB, then we can just wait until later this afternoon for your 11GB copy. I'm happy to host on the shared drive if you need a place to host. Open offer, no obligation (edited)
Avatar
@Andrew Rathbun @CLB_joshhickman1 - really no rush at my end, I am happy to wait
Avatar
Andrew Rathbun 6/4/2019 6:43 AM
10.8GB, will upload now
👍 1
Avatar
Thanks @Andrew Rathbun
Avatar
CLB_joshhickman1 6/4/2019 6:54 AM
Thank, @Andrew Rathbun
Avatar
Anyone mess with astra linux at all?
Avatar
Cheers @Andrew Rathbun
Avatar
Anyone have experience in submitting search warrants to google?
Avatar
Andrew Rathbun 6/5/2019 7:57 AM
@mazummo Yep, what's up?
Avatar
@Andrew Rathbun do they require judge-ordered?
8:06 AM
additionally, you have contact info for LE? It doesn't appear they have a portal
8:07 AM
Preservation requests don't require a judge/magistrate
8:07 AM
That's the link to the portal. They'll send you a login URL. You'll probably have to establish an account if you don't have one already
8:08 AM
Search warrants obviously will need a judge/magistrate to sign off on the legal process
Avatar
This helps. Thank you!
Avatar
Andrew Rathbun 6/5/2019 8:09 AM
Let me know if you need anything else. That should get you started
Avatar
Beefhelmet 6/5/2019 9:07 AM
How do you guys handle a back log with warrants pending? Like SW supposed to be served within 10 days but generally the data is as it exists at the time the warrant was sought. I've always thought of it like lab testing.
Avatar
Andrew Rathbun 6/5/2019 9:10 AM
I'd say just do the preservation letter within the 10 days and serve the search warrant within the 90 day preservation period and the rest is out of your hands
Avatar
Beefhelmet 6/5/2019 9:13 AM
I mean with regards to phones
9:13 AM
So patrol gets a SW on a device that was seized during an arrest. Im usually getting to it within the timeframe when I can but sometimes it might take me two weeks
9:14 AM
the SW applies for the seizure and the search of the device...so technically the device was seized and is just pending "testing"
9:14 AM
as long as you aren't getting data that occurrs beyond the 10 day window which shouldnt be happening because the phone is isolated.
9:17 AM
beyond that matter I'm usually not finished "executing" searches on computers for weeks even.
Avatar
There is case law stating that if the evidence was submitted to a lab within the date and time within the 4-corners of the search warrant your good to go even though there is a back log.
9:24 AM
I will have to try to find it for you
9:25 AM
Is it an issue of being "sent to lab" if I just let it stay in evidence control until I'm up to pull it. We still in the same building or is there a distinction. Surely there isnt
9:25 AM
Basically I consider the time of execution as the time that I receive the warrant and request for processing
Avatar
you can look at it that way
9:25 AM
it doesnt matter if the lab is in the same buildin g
9:26 AM
building as long as it was submitted within the time frame your good to go
9:26 AM
the extraction process and date really is irelavent
9:26 AM
sometimes it takes months
9:26 AM
to research an exploit and or get data sometimes
Avatar
Beefhelmet 6/5/2019 9:26 AM
Right
Avatar
I would speak with your AGS
9:27 AM
make sure you guys are on the same page
9:27 AM
since they have to defend that aspect
Avatar
Beefhelmet 6/5/2019 9:27 AM
Right I've had this discussion with them before and trying to figure out how to better relay it to them
Avatar
I will get the case law ours use
9:27 AM
you might have to remind me
9:27 AM
ADD and busy gets in the way
Avatar
Beefhelmet 6/5/2019 9:27 AM
#remindmein10days
9:27 AM
😛
9:28 AM
United States v. Mutschelkaus, 564 F. Supp. 2d 1072, 1077 (D.N.D. 2008)
9:30 AM
The Government contends that Rule 41(e)(2)(A) of the Federal Rules of Criminal Procedure only requires that the search warrant be executed within ten days and does not require the subsequent examination of the items seized to take place within ten days.See Docket No. 28.
Avatar
In this case, the computer and electronic storage media were seized within the ten (10) day time limit established in the search warrant and the forensic analysis took place within the sixty (60) days granted by the magistrate judge. As set forth above, the Federal Rules of Criminal Procedure do not require that the forensic analysis of computers and other electronic equipment take place within a specific time limit. Any subsequent search only needs to be conducted within a reasonable time. The Court finds that the forensic analysis conducted on the computer and electronic storage media by February 12, 2008, was done so within a reasonable amount of time after the execution of the search warrant and, therefore, the evidence shall not be suppressed.
9:33 AM
2nd line
9:33 AM
I did reach out the AGs as well
9:34 AM
In United States v. Hernandez, 183 F. Supp. 2d 468, 480 (D.P.R. 2002) original case
9:34 AM
for that paragraph
Avatar
thanks for that by the way
Avatar
Looking to buy video format conversion software for my department. Any suggestions?
Avatar
InputAce ?
Avatar
Input Ace and DVR Examiner
Avatar
Another case management system question incoming... I've heard of all the common systems that most people use, Atlas, BlackRainbow, Lima, Spreadsheets etc. I'd like to know if anyone has looked into Jira from Atlassian, their main business is to cater for software development teams but they have expanded to include business management and IT service 'ticketing' which I would think could be adapted for a digital forensics workflow.
Avatar
We haven't used Jira but we currently use infra which is an outdated IT ticketing system, and as it wasn't really designed with digital forensics in mind it has been a bit of a nightmare adjusting / getting fields to fit with our workflow, and it does not intergate well with our current forensic tools at all. Jira might be different, but I'd imagine you'd need quite a lot of customisation which could get costly (edited)
Avatar
Deleted User 6/6/2019 7:07 AM
I evaluated Jira as an internal R&D planning board, configuring it to not be completely focused on software dev was very time consuming. I agree with @K23 that I think you'd end up investing a lot of time and effort to adapt it properly
Avatar
Dr. Kaan Gündüz 6/6/2019 7:09 AM
i use humhub, not designed for a project management software but you can make it look that way. fancier 😃
7:10 AM
HumHub is a free social network software and framework built to give you the tools to make teamwork easy and successful.
Avatar
I've been messing around on the trial and that seems to be the case, I need to a lot of customisation to be able to adapt it properly which is a shame as the general idea of assigning tasks/sub-tasks and a set workflow is quite good
Avatar
@Beefhelmet check this case law United States v. Cleveland, 907 F 3rd 430 : https://www.leagle.com/decision/infco20181019392
OPINION JOHN K. BUSH Circuit Judge. A jury convicted Defendant Appellant Dockery Cleveland of conspiring and attempting to possess...20181019392
Avatar
I am planning on creating a small presentation for our detectives here that will be using the AXIOM portable case files to conduct further investigations. Is there any basic training material out there in PDF format or powerpoint that can easily explain all the artefacts etc etc... Thanks in advance. 😄
Avatar
randomaccess 6/7/2019 1:34 AM
@Gumpoo axiom has an artefact reference guide in the help
Avatar
going to be running a project on smart watches that im obtaining out of my own pocket any suggestions on where to start looking for information on them and is there any brands that people think are popular?
Avatar
Andrew Rathbun 6/7/2019 4:28 AM
Definitely Apple Watch
4:29 AM
and then in terms of Android, there are many options. I'm guessing a Samsung Gear model, probably a Fossil model, not sure what else
4:30 AM
https://fccid.io/BCG-A1891 will have FCC info on those devices. That link is for the Apple Watch, in particular
FCC ID application submitted by Apple Inc. for Apple Watch for FCC ID BCG-A1891 ( BCG -A1891 ) User Manual, Frequency, Reports, Images and more.
Avatar
Morning Everyone! what is the average response time from Snap Inc. (Snapchat) when serving them with a preservation request?
Avatar
Andrew Rathbun 6/7/2019 4:55 AM
Usually within a week. They used to be much quicker a couple years ago (edited)
Avatar
How does that work when you are trying to preserve something that they claim to only keep for 48 hours?
Avatar
Andrew Rathbun 6/7/2019 5:56 AM
In my experience, I've gotten the last 90 days of snaps every time I did a search warrant through them at my previous gig
5:56 AM
My MO has always been to do a preservation letter to them immediately and it's always worked out fine for me
Avatar
Any of you super organized types keep a benchnotes journal?
Avatar
Andrew Rathbun 6/10/2019 10:05 AM
@Beefhelmet am a super organized type. Do you mean like running notes on cases I work?
Avatar
@Andrew Rathbun I've started keeping kind of a bench notes journal...like a lab journal of sorts. I'm fully aware it is discoverable etc. and it's part of the reason I'm keeping it. Just a composition book that I date from the start of its use and until I fill it which I'll then just file it away.
10:37 AM
I use it more or less as my day planner but for example I'll list every case I have tasks for that morning and then pull them for evidence. and then for each item I just notate case number what phone it was and what method I used to extract etc. in shorthand
10:38 AM
especially if I have to go outside standard forensic practice ie. had to live boot it @ hrs because <reason>
10:38 AM
or ya know attempted to put the device into a download state but missed the prompt and it booted.
10:39 AM
but 99% of the exams are just one liners in the log
10:39 AM
just wanted to get some opinions on it...or see if others do somethign simlar
Avatar
Andrew Rathbun 6/10/2019 10:51 AM
I didn't do anything like that at my previous gig but I adopted the use of OneNote at my new job and I quite like it. I do a running list of what I've done when so when I have those everyday moments where I can't remember what I ate for breakfast let alone something from 2 months ago, I have my stream of consciousness description of what I did that day on OneNote. Simple rule of thumb to never put anything in there that I wouldn't want to read in front of a jury.
10:55 AM
My agency is heavily invested in the Microsoft ecosystem (OneDrive, Office 365, OneNote, Outlook, OneNote, etc) so everything "just works" and it works well with my workflow. It's just a cool program overall. Like Word but with a lot more flexibility and tabbing as well as being able to share notebooks and whatnot. I'm sure there are worthy alternatives - https://alternativeto.net/software/microsoft-onenote/
Popular Alternatives to Microsoft OneNote for Windows, Mac, Android, iPhone, Web and more. Explore 25+ apps like Microsoft OneNote, all suggested and ranked by the AlternativeTo user community.
Avatar
I've started dabbling in one note lately. Someone distrubuted a case report example of one done in one note in a class I took a while back and I rather like how it works. I don't fully understand all of the program's capabilities though and really need to sit down and tinker with it. Generally I keep a running spreadsheet on google drive of my exams but I feel like writing things down in a notebook feels more purposeful and deliberate.
Avatar
Andrew Rathbun 6/10/2019 2:23 PM
@Beefhelmet I currently have tabs titled "2019 Active Cases", "2019 Inactive Cases", and "Admin" which have pretty much covered everything I've needed to document so far. Admin mostly for taking notes on the administrative nuances of this new job. Within those tabs, I have pages for each case with my running notes. I can also create subpages as needed to better categorize beyond the pages. It's a neat setup and I think it'll work well for me in the long run.
Avatar
careful with one note
4:34 PM
we had years worth of info in a onenote because it was networked, every new day was a new page in there. it definitely died on us haha.
Avatar
Igor Mikhaylov 6/11/2019 5:39 AM
Does anybody know a source about how to use FTK Imager in computer forensics?
Avatar
@Igor Mikhaylov are you trying to complete a task or just looking to obtain a manual for reference?
Avatar
Igor Mikhaylov 6/11/2019 7:57 AM
I remember I've read a good article about how to use FTK Imager in computer forensics. It was a ages before. Now I can not find the article. 😦
Avatar
I have a bunch of INTEL Compute Sticks that I need to image. Just racking my brains on how to do this...? I'm thinking this possiblility unless someone can advise me otherwise... INTEL Compute sticks have a micro SD slot and a USB port.. So...Not in this order.. Boot PALADIN from a Micro SD Card. Add a USB Hub to add a keyboard and mouse so I can see what I'm doing. The Chipsets are soldered so can't remove them. Plug into a monitor or tv with HDMI.... Should work right? Anyone else had this scenario? Thanks in advance. 😄
Avatar
Andrew Rathbun 6/11/2019 2:08 PM
@Gumpoo that sounds very logical to me. Good thinking outside the box
2:09 PM
USB Hub for destination drive too 👍
Avatar
Yes destination drive!! Missed that one.. Thanks for that. Will give that a go. Cheers @Andrew Rathbun
💯 1
Avatar
How Does AI Contribute To Digital Forensics? - Forbes https://apple.news/AS47mhuxTQJOvwl6DTWh3eA
How does AI contribute to digital forensics? This question was originally answered on Quora by Lee Reiber.
Avatar
Anyone up?
Avatar
Andrew Rathbun 6/12/2019 4:06 AM
@whee30 just ask away
Avatar
Need some assistance please if possible. I'm having to write a formal written statement with regards to my involvement in a case involving a dude possessed 'objection material' on his phone. The being charged with possession is fine but The 'crown' want to know why we couldn't charge with 'distribution'. Within facebook messenger there is a conversation where the guy has sent a video named let's say VID_20191306_MP4 or very similar naming convention. This is in relation to the mosque shootings video's that were sent around. The conversation prior to this file being sent and after reveal that this is a copy of the mosque shootings however the video cannot be viewed / doesn't play nor does the file name give it away and make it obvious. Flight mode was turned on immediately when it was seized by Police.
2:49 PM
Conversations and the manifesto pdf cached to the handset but no video. Does anyone know if this is common practice for Facebook Messenger?
2:50 PM
Also no thumbnail of the vid cached
Avatar
Does anyone know of a way to tag or export watch list hits in physical analyser? I want to highlight a number of keyword hits but it would take too long double clicking on each on then tagging. I can't find a way to do it in bulk, any ideas?
Avatar
forensicmike @Magnet 6/12/2019 3:53 PM
@Gumpoo Not sure what OS you're talking, but I've encountered the unplayable attachments thing for FB Messenger for some time now. I've been recommending alternatives such as cloud acquisition or screen video capture to obtain them if they're relevant to a case.
Avatar
Thanks @forensicmike @Magnet . It's an iPhone 6. It would have been a different story had I been at the search warrant. Before flight mode is activated I could have been looking through his phone onsite
3:55 PM
The crown.. want to know why and I need to provide an answer that they can understand.
Avatar
forensicmike @Magnet 6/12/2019 3:58 PM
But yeah the thumbnail-less attachments thing is definitely common, even for full filesystem iOS extractions. "Because Facebook wants to make our lives difficult" might be a solid summation a layman can understand.
4:01 PM
Seriously though, short of doing the research on your own I wouldn't be drawing any hard conclusions. Maybe an expert opinion that apps constantly change, often becoming more complex (and thus more difficult to decode), that the forensic tools are under constant development to improve said decoding, and so on. (edited)
4:02 PM
You could also try running the extraction through a couple of different tools to confirm that indeed, parsing Messenger attachments in 2019 is hard.
Avatar
Thanks @forensicmike @Magnet I also ran it through AXIOM. Still same result. Good advice. Cheers
Avatar
Where do you guys buy test phones? I found my model phone, LG M257 harmony on eBay, and our procurement department is having a fit over purchasing through eBay. Any other solutions?
Avatar
Andrew Rathbun 6/13/2019 12:34 PM
@sholmes I've always advocated getting phones from a local lost and found. Build up a supply over time for free. Get with a local library, police department, or any other community center to see if you can be implemented into their lost and found policy
12:34 PM
At my previous job, my front desk could turn over phones to either the women's shelter or us after 90 days. (edited)
Avatar
Yeah that is a good idea, but wouldn't help in this case as I need this actual model for testing.
12:35 PM
We are actually looking at modifying our disposal rules to allow us to keep devices to use as test devices.
Avatar
Andrew Rathbun 6/13/2019 12:35 PM
That's a great idea
12:36 PM
Could always just dispose them and fish them out of the trash 😎
Avatar
Andrew Rathbun 6/13/2019 12:36 PM
Can't say you didn't dispose of it
12:36 PM
What happens after that happens
Avatar
I was getting some through a local halfway house as well. They would seize them from guys who couldn't have them or had them inside the residence. They destroy them after so long, and would give us them for testing.
Avatar
Andrew Rathbun 6/13/2019 12:37 PM
That's great. I'm sure there's lots of untapped resources like that in everyone's respective community
Avatar
for sure
Avatar
Andrew Rathbun 6/13/2019 12:38 PM
If they're having issues with eBay, maybe see if you can just buy it new somewhere? If they don't like that then say eBay is the only other option
Avatar
I am trying exactly that right now. My google fu says the phone isn't available anywhere else except ebay. LG M257 Harmony. Feel free to prove me wrong. LOL
12:59 PM
no seriously if someone else can find it in the US through a non-ebay vendor, I would be appreciative and never so happy to be wrong. 😃
Avatar
i found it other places, but ebay was cheapest. try your local craigslist and facebook marketplace
Avatar
eBay is our main destination. Used to use CeX, still do occasionally when we need to check whether a device is running a specific OS/firmware version (the dirty looks I get when I start putting their Samsung phones into recovery/download mode...)
Avatar
quick question
3:20 AM
for everyone
3:20 AM
master copies of your, things, whatever it may be
3:21 AM
phone extraction, E01s, Axiom cases and so on
3:21 AM
retained digitally on your storage yes?
3:45 AM
I am sensing there is more to this question 😉
Avatar
Andrew Rathbun 6/14/2019 4:07 AM
@Sudo images of devices get thrown on a HDD as a best evidence copy. Working copies go on my NAS. Portable cases or UFED reader reports or any other generated reports are provided to the case agent but not maintained by me. They can be generated at a later date with the best evidence copy if need be. They could be, I suppose, since there's always room for them on the best evidence HDD but I just don't.
4:08 AM
Axiom cases don't get saved or anything. Pretty much anything that can be generated from the best evidence copy isn't kept
Avatar
cool, ty
4:11 AM
you're both US LE right (edited)
4:11 AM
or US?
Avatar
Andrew Rathbun 6/14/2019 4:11 AM
Yep
4:11 AM
@bizzlyg I think is UK though
Avatar
there is indeed more
4:12 AM
but not any more question
Avatar
I am from the UK but in Austria now
Avatar
just motive behind it
Avatar
but worked in the UK
Avatar
I just want to get a little idea of a few jurisdictions views on the matter (and find they likely are all the same)
4:13 AM
but Rath say your E01 file
Avatar
here we keep stuff on network storage and tape backup, before in my old job we had a ridiculoulsy sophisticated SAN which did all kinds of clever things
Avatar
that's stored on your storage as the "master"
4:13 AM
i.e. copies for working are made from that
4:13 AM
makes sense, we have storage and tape too
Avatar
ah I see where you are going with this
Avatar
all I wanna know is, is people's server storage their "master" storage location
4:14 AM
so rather than being in a bag, it's hashed up on the server as the "master"
Avatar
To be honest, we had multiple copies but we didnt specifically designate one as the Master
Avatar
no I know
Avatar
Andrew Rathbun 6/14/2019 4:14 AM
Server storage is our working copy. Master copy is just sitting dormant on a HDD wrapped up in an anti-static bag
Avatar
but, as a hypothetical
4:14 AM
this isn't usually an issue
Avatar
I guess if I think about my old place, we had working copy on the spinning disk storage and the master was on tape
4:15 AM
if you define it like that, but we didn't specify working and master copies
4:15 AM
if that makes sense
Avatar
yeah makes sense
4:19 AM
regardliss of storage location as such
4:19 AM
you can have a "digital" master
4:19 AM
that's all I mean
Avatar
yeah dont see why not
Avatar
you're not like, doing the E01 then putting it on a single disk and bagging it
4:19 AM
in an exhibit bag
Avatar
as long as its stored in the proper way with some redundancy
Avatar
you're storing it digitally with redundancy etc etc
Avatar
yep thats what we did
Avatar
yeah well we have two servers raided then mirrored + tapes
Avatar
never went down the road of physically sepeating a master copy out and locking it away
4:20 AM
I know places that do, but we never had any issues. We went through ISO 17025 without it being a problem too
Avatar
yeah, I don't mean it reaaaallly like that, not convoluted anyway
4:20 AM
more just
4:20 AM
imaged exhibit hard disk to the server
4:21 AM
verified data integrity
4:21 AM
it now stays there
4:21 AM
I copy it down to my workstation to process
4:21 AM
should anyone ever need that E01, I can provide it and they can verify its integrity
Avatar
I dont a problem with that, we didnt even copy stuff localling, ran it all over the network
4:22 AM
locally
Avatar
same with CCTV, video file gets hashed and copies can be given and anyone can hash their copy to see it's the same file
Avatar
yeah
Avatar
yeahhhh, when you have a 1TB E01 though haha
Avatar
haha
Avatar
we don't have 10gig
4:22 AM
not yet 😉
Avatar
fair enough, we had 16gb fiber
Avatar
yeah it costs a bit
Avatar
we have trunking into our servers so we do each get the full beans
4:22 AM
but our links in are only a gig
Avatar
still good
Avatar
server can handle multiple gig connections though so
4:23 AM
there's (rarely, never really) any reduced speed
4:23 AM
in an ideal environment obviously, if there are like 10,000 filesystem entries to write that's a different story
Avatar
yeah but as long as it does the job you need, no point going crazy with new infrastructure
Avatar
we probably will add 10gig cards
4:24 AM
they're pretty cheap now
4:24 AM
but our workflow is fine really
4:24 AM
anyway, cool, I just wanted to get some second opinions on "masters"
4:25 AM
and if retaining it digitally like that is reasonable (and realistically more efficient and secure)
Avatar
yeah we had no issues essentially having masters stored on some kind of networked storage/tape library
4:27 AM
we did also backup reports, statements and E01s to a further tape and send off site but not because of a master copy philosophy but just for disaster recovery purposes
4:28 AM
cool, thanks for the infos
👍 2
Avatar
I hve noticed a few questions about Hancom mobile forensic products over the last few months, we have tried it in the past and I am just taking another look at their stuff again. Has anyone else had chance to try it and compare it with other toolkits? Specifically the RED and NEXT products - I'm just interested in hearing other peoples opinions, if there are any, to see if they match up with my initial thoughts
4:50 AM
RED is a PA equivalent and NEXT is the 4PC equivalent
Avatar
never heard of it, just had a look
4:54 AM
seems very XRY-esque
4:56 AM
I can't imagine it would perform any different to other tools
Avatar
Yeah I don't think it has much exposure in the EU/US market, yet anyway
5:03 AM
My initial thoughts are the software is fairly intuitive and looks professional, I do seem to have some descrepencies from the same devices though between PA and RED, after respective decoding/processing. I was kind of expecting that to some extent and its that I was wondering if anyone else had experienced. I am guessing almost nobody here is using it though
Avatar
nope not here
6:48 AM
honestly I wouldn't really be inclined to, we get so little off phones these days that it wouldn't make a difference
6:48 AM
won't be long before we just become photographers
Avatar
That would be a big prob for mobile forensic companies 😂
Avatar
they could start selling fancy "forensic" cameras or something!
👍 1
Avatar
Gotta call it a tactical camera
Avatar
the Android Tactical Camera
Avatar
Apple Tactical Camera sold separately
Avatar
I'd say that one should be Apple Facebook Messenger Tactical Camera
7:02 AM
Apple Facebook Messenger Tactical Camera Depending on Which Version is Installed
Avatar
Could easily double the price of the Apple variant just because it has Apple in the name
7:18 AM
still can't believe the price of that monitor stand, although granted these would not be official Apple products 😂
Avatar
forensicmike @Magnet 6/14/2019 8:20 AM
if Apple made forensic software...... "Meet Apple Dongle Holder. This product will transform digital forensics. For the first time, the dongle will not need to dangle. Starting at US$599"
😂 4
Avatar
Andrew Rathbun 6/14/2019 8:28 AM
They're out to lunch with their pricing schemes but hey, it sells for whatever reason!
Avatar
forensicmike @Magnet 6/14/2019 8:32 AM
💯 1
🤑 2
😂 3
🔥 1
💸 1
Avatar
anyone have experience with adobe creative cloud search warrants? I'm working a case involving psd files and the metadata suggests it was created with CC 2015. Wondering if they track MD5 etc. to see what account created the file. Not sure if the storage is cloud based or just the application function.
Avatar
I have an email out to their LE contact, will update when/if they respond
Avatar
Anyone got any advice on how you would approach a job where the suspect is saying they have been hacked and thats why x y z illegal content is on their machine?
1:56 AM
Like is there a set procedure of things that can be done to help prove/disprove it
Avatar
First I'd get them to define what they mean by hacked as that's a pretty broad term. If it's an email account that was compromised you might see evidence of security emails stating someone had logged in from a new location (Gmail) for instance, and try to find other references to the account. If they are just stating that the computer itself was hacked then running malware scans is a good place to start. These ones are always tedious, I had a case recently where they were claiming an iPad was remotely accessed and remote controlled to get the illegal material on there. Can be really difficult to disprove it without tripping over yourself in the statement and opening a few holes, I was lucky in the fact that they stated it was remotely jailbroken when there was no evidence that the device had been jailbroken at all for that one.
👌 2
Avatar
I would start with a timeline if in fact the computer might have been compromised. However if an email was compromised like the above said get the logs from said email provider which can prove or disprove this maybe. If the suspect was using a vpn to change locations that could cause an issue too. Alot of variables in this type of invest. However a good timeline can be very useful if you dont get lost in all the data..
👍 3
Avatar
Another good thing to consider in addition to the above, again along the same lines as a timeline, I am assuming you have some incriminating material on the machine (IIOC?), you can build a timeline of all activity around the timestamps of such material and see what else was happening. For example long ago when I worked for LE we had a job where web browsing activity and IIOC creation was right before and after accessing online banking, online shopping etc using their own account. Sure they can still say that was also hacked, but it starts to get less and less probable, also its more likely the hacker would harvest the creds and use them elsewhere, not on the actual machine that was targeted. Basically try to build up as much personalisation as possible to the suspect/owner
👍 3
Avatar
Hello! Please I am working on Drone Data Analysis. I have requested for Dataset from NIST but got no reply, is anyone able to help?
Avatar
Asumming you requested access through here? https://www.cfreds.nist.gov/drone-images.html While we do have test data for this we cannot share it unfortunately as there is still some personal information contained within, e.g. the test sites and staff conducting the tests.
Avatar
@K23 Yes please, through that link
Avatar
I've just requested access through my force account, I'll let you know if I hear anything back, and if I do I'll query access for you.
Avatar
@K23 thank you so very much
Avatar
@Rossko check for IOCs and standard persistence locations
👌 1
Avatar
Thanks for everyones suggestions. Things to look into :).
Avatar
Has any LE out there written a Search Warrant for a VOIP recently? Looking for a "to wit" to review so we are not missing anything.
8:43 AM
DM please
Avatar
Update to my creative cloud question last week in case it helps anyone else out, I received a response from Adobe that they do not have the ability to search stored files for a specific hash value.
👌 1
Avatar
Andrew Rathbun 6/17/2019 12:06 PM
@whee30 thanks for circling back
Avatar
Can anyone confirm testing forensic tools such as axiom or PA on xeon processors as opposed to I7 or I9? CPU is running on 2% and takes hours to process some of the heavy dumps. My only conclusion is that its software related but would like hardware recommendations or anything that can speed up the processes..
Avatar
@awnexus - we use Xeon processors with both Axiom and PA. Axiom runs well utilising 16 cores (Magnet rep told me that anything over this is a waste of time). PA responds better to a higher clock speed, especially when generating reports. For best of both worlds we went for workstations with 2x Xeon 6128 with 6 physical cores running at 3.6ghz. I do know UFED is going to be revamped soon and will take advantage of more cores
Avatar
randomaccess 6/17/2019 3:55 PM
Does anyone have picasa installed on Android or windows arnd can take a screenshot and send it to me? I'm trying to figure out whether someone used Android or windows and I'm coming up with nothing
Avatar
randomaccess 6/17/2019 5:58 PM
Ya. It's more that if I get multiple people taking screenshots and sending them to me I might be able to then ask them how they did it I haven't been able to figure it out when installing Picasa on win10. It doesn't seem to have a screenshot feature or it doesn't remove exif data
Avatar
Dr. Kaan Gündüz 6/18/2019 3:09 AM
Hi all, do you people that have to see CP material, get proper psych support? I mean it is really disturbing and would most likely have negative effects on one's mental health.
Avatar
4n6_Guy(Kevin Salhoff) 6/18/2019 4:10 AM
Our agency doesn't do anything more than a token effort to support us. We have had many members transfer out of the unit because of the effects of exposure to CP and I had a close friend forced into a disability retirement because of it. They send us to a mandated employee assistance program about once every other year. The program is good and makes recommendations on how to best handle the work. Our agency however disregards any suggestions made by the training. They do not appear to care if they destroy our mental health, they'll just replace us once we're used up.
4:11 AM
It's frustrating
Avatar
randomaccess 6/18/2019 5:24 AM
@Dr. Kaan Gündüz when I was in LE we had conversations with a psych every 3 months. Allowed you to talk to someone if you wanted. We also talked internally if there was ever something particularly troubling. But we also took a lot of steps to avoid exposure. So no one in the lab would actually spend the time categorising material. That would go to the case officer. Helps spread the load
5:27 AM
@Andrew Rathbun disregard. I figured it out. If someone forwards an email a few times and you pull the photo that was originally an attachment google or a server along the way may mess with the file. Always request the person exports the email in question and provides that.
Avatar
I've been in a year - no one has really talked w me about it. Most cases are fine, a few have bothered me. As an agency we have psych support available in general, I will just have to seek it out. There is no proactive psych appt. imposed.
Avatar
Dr. Kaan Gündüz 6/18/2019 12:02 PM
i think it is like exposure to radiation. one should not look at that sort of material too frequently.
Avatar
A lot of LEOs will be afraid to say anything about it because of the "stigma" about seeking counseling. Then there's the agencies that will take away creds if you seek counseling for depression or something like that. It's important to be with an agency that has you back when dealing with those kind of cases.
Avatar
CLB_joshhickman1 6/18/2019 12:26 PM
We have a policy for our Section that requires mandatory annual health evaluations for all Section members; this is done by a licensed psychologist. The policy also allows for additional visits for Section members if they voice the need or if I (as Section head) make a determination that it is needed. The policy also covers spouses in the event that the spouse needs assistance with helping the Section member cope. We also have a certified therapy working K-9 on staff.
12:28 PM
Additionally, we rotate case-types so that examiners are not bombarded with CP cases back-to-back. We also make a point to go out to dinner at least once every other month after hours to decompress.
👍🏻 6
👍 2
Avatar
Dr. Kaan Gündüz 6/18/2019 12:36 PM
are you hiring 😃
Avatar
CLB_joshhickman1 6/18/2019 12:43 PM
Not at the moment. I hope to be later this year as we are a bit short-staffed.
12:48 PM
@JaiRoc is right: it is important to have agency buy-in on a mental health program. And just like anything else you ask for from management, numbers/facts/figures usually help. Forensic Focus published a good article a few months ago that discusses DFIR burnout, and it references several other articles discussing the same issue. If you're looking at implementing something at your organization, I'd start there. It doesn't address CP, per se, but CP exposure certainly contributes to burnout.
12:48 PM
by Christa Miller, Forensic Focus Quite a lot has been written over recent weeks about burnout. Not only DFIR-specific posts, first from Richard Bejtlich and then, in follow-up from Eric Huber and …
👍 1
Avatar
Dr. Kaan Gündüz 6/18/2019 12:56 PM
today in a CP case, i came across a document called "pedofile's handbook"
12:58 PM
a pedofile, who claims to be a psychologist, wrote about all aspects of CP. how to find a target, how to do sexual intercourse etc.
12:58 PM
it was like reading satanic bible
Avatar
4n6_Guy(Kevin Salhoff) 6/18/2019 1:00 PM
@Dr. Kaan Gündüz oh God I've come across that too. It was deeply disturbing. Though according to a federal judge that wasn't an indication that the defendant was interested in looking for victims
Avatar
Dr. Kaan Gündüz 6/18/2019 1:00 PM
suspicious judge there
1:00 PM
i read many articles and books about CP
1:01 PM
but hey were all from the perspective of non-pedofiles
1:01 PM
medical professionals, forensic examiners etc.
1:01 PM
that document was written by a pedo, to other pedos.
1:02 PM
without any regrets and shame
1:02 PM
i saw thousands of CP images, but this was particularly disturbing
1:03 PM
the weird thing is the author sold his book on amazon
Avatar
4n6_Guy(Kevin Salhoff) 6/18/2019 1:03 PM
I think it's easier to see the images and brush them off a bit than it is to read the how to. The how to gets stuck in your head as this is actually how these monsters operate
Avatar
Dr. Kaan Gündüz 6/18/2019 1:06 PM
it is completely different
1:06 PM
from what the medical pros wrote
Avatar
4n6_Guy(Kevin Salhoff) 6/18/2019 1:17 PM
@whee30 I would recommend this to you and your agency. They can provide training to teach you the negative effects that long term exposure can cause as well as some basic strategies to help limit and reduce the effects. https://www.shiftwellness.net/
👌 3
1:20 PM
@CLB_joshhickman1 sounds like you and your agency are doing a great job to help your members' mental health. We tried to enact some of those ideas too but our higher ups have ignored them all together.
Avatar
CLB_joshhickman1 6/18/2019 1:28 PM
@whee30 thanks. We do alright. And +1 for Shift. Our ICAC commander has them come through once a year. (edited)
Avatar
I found the audio from the videos most disturbing. As mentioned by @4n6_Guy(Kevin Salhoff) images you brush off, but the videos with audio... that stuff you cant forget
Avatar
4n6_Guy(Kevin Salhoff) 6/18/2019 5:51 PM
Oh yeah I don't even have speakers connected toy analysis machine. I'll even listen to audiobooks/music when going through pics/videos to further distance my brain from the content.
👏 4
Avatar
Good Morning. Just got a case where the suspect walked into a 7-11 gave the clerk $500 in cash and asked to have it added to his Green Dot card. He handed the Clerk the cash and the card. When the clek placed the card into the reader the system locked up and crashed. The suspect then asked for his money back and left the location. When the system came back online it showed that the transaction had gone through . This happened at two 7-11 locations in my city same suspect discription. Has anyone else heard of this? If so do you know how they are doing it. I'm guessing they might have shorted out the pads on the chip and maybe this made the POS crash but this is just a guess and if so how is the money still getting on the card? Thanks for the help.
Avatar
7-11 stated this is a know issue apprently insearting a card into the POS system while the clerk is entering a transaction forces the system lock up and crash. when the system goes back online it completes the transaction just FYI.
Avatar
@Dr. Kaan Gündüz have a MD5 for that pedo handbook?
Avatar
@Hells I just got the entire website on a case. The guy downloaded the handbook website from TOR.
7:40 PM
From a TOR site.
Avatar
gotcha. if someone gets a hash id love to get the hash so I can search for it on our networks
Avatar
Dr. Kaan Gündüz 6/20/2019 12:43 AM
@Hells i will send it when i am at the office
Avatar
Anyone dealt with Google Desktop before? I have some files with plain text data in them but not sure what if any tools exist that can parse the data into a nice table or something.
Avatar
Good morning. Has anyone here had any experience with an email server/client application called FirstClass? My partner has a case involving a newspaper (victim) that uses it and we are trying to find a way to extract all data from a single user. The newspaper is very small and has no IT staff to assist. Any help would be appreciated.
Avatar
Dr. Kaan Gündüz 6/20/2019 9:52 AM
@Hells 1362137f777a9311e97d48ce71832216
9:52 AM
7zip file for that handbook
Avatar
thx. have one for the extracted handbook as well?
Avatar
Can anyone explain your opinions on law enforcement digital forensics vs corporate side digital forensics? (edited)
Avatar
Andrew Rathbun 6/20/2019 6:28 PM
@Tyføøn in what regard? In general, you're more susceptible to CP investigations in LE vs private sector. I can't speak for private sector as I have no experience but if you have any LE specific questions, myself and many others would be happy to answer.
Avatar
4n6_Guy(Kevin Salhoff) 6/20/2019 6:39 PM
@Tyføøn although it's basically the same process the two are very different thought processes. LE cases tend to be much more focused on putting the bad guy/gal behind the computer. For instance in a CP case the big question is always is there CP on the device and was my suspect the person who knowingly put it on there. There is a much higher burden of proof beyond a reasonable doubt for the public sector than private sector. Private sector seems to be more interested with a "did this act probably happen" so they can take appropriate action; terminate an employee, sue a competitor, etc. (Please take into account that I have much more experience in LE than I do in the private sector)
💯 1
Avatar
I was just curious about a general description of both, or pros and cons (edited)
Avatar
Andrew Rathbun 6/20/2019 8:25 PM
@Tyføøn private sector pays better. It's easier to go to private sector from LE than the other way around. Getting experience in LE can prove to be very beneficial for future employment opportunities.
Avatar
Just recently began talking to a guy who works for Consumer Energy and he started out in LE and made his way to the corporate side. I didn’t know what the Corporate side was like so he was explaining to me his experiences and pros and cons of LE and corporate side. I was just kinda curious about what other professionals opinions were. (edited)
Avatar
Andrew Rathbun 6/20/2019 8:36 PM
@Tyføøn are you MI based?
8:37 PM
NVM. We've already chatted about this via PM when you joined 😎
Avatar
Dr. Kaan Gündüz 6/21/2019 4:03 AM
@Hells it is a bunch of web pages, zipped together, not a PDF/DOC etc. file
4:06 AM
i'll PM
Avatar
no worries then @Dr. Kaan Gündüz
Avatar
Dr. Kaan Gündüz 6/21/2019 4:26 AM
Avatar
randomaccess 6/21/2019 6:01 AM
does anyone from MSAB here know why a bunhc of posts go up on the blog as protected first, and then sometimes just disappear liek this one https://www.msab.com/2019/06/19/xry-8-0-xamn-4-3-and-xec-director-5-1/
👍 1
Avatar
It’s probably our marketing team preparing for the grand launch of XRY 8.0 and the rest 😃 We hope to be able to have it out within the next couple of weeks! (edited)
Avatar
randomaccess 6/21/2019 11:24 PM
@Erumaro eh id say 80% go up as protected first. Some of them disappear. Some get unprotected.
Avatar
I will check with our marketing team in Monday, thanks!
Avatar
@Rossko I saw your post from Monday asking about advice when someone says they got hacked and you are trying to prove/disprove it. It depends on how and what material you are looking. If lets say a user is going to site they should not be and abusing the Acceptable Use Policy. You can look into the information the analytic cookies left behind. Within those cookies you can normally achieve the first time a user went to the website, last time the user went to the website and the count on how many times said user went to the website. This cookie also has a lifetime of two and some up to 10 years on the end point. (This is if the cookies have not been wiped or he/she has not used incognito mode). So if you can not only deduce the amount of times he has gone with the actual number within the analytic cookie, but you can also determine if these actions have been going on for a longer amount of time. If you are looking for illegal files on the endpoint then the best way to perform forensics is pivoting off some sort of timestamp. Start pivoting off the timestamps on the file itself and try to look for artifacts around that time. Like website history, again if incognito mode was used then you are going to have to start looking at network data stored on the proxies/firewalls/netflow to help determine what happened around that time. You can also check if an exe ran using .pf data and or shimcache data to potentially ID malware. If he/she potentially sneakernet a USB to the computer start looking for the modification timestamps within the USBSTOR registry. You can also get the make/model/ and I believe serial number of the USB used. That is just a couple of tactics to identify if someone is lying about it or not. Do not forget the integrity of evidence though, since stuff like this has the potential to go to LE.
Avatar
Andrew Rathbun 6/25/2019 4:41 AM
Just curious, has anyone implemented Windows Sandbox into their forensic workflow at all? For those not in the know, it's basically a Windows VM that comes ready to use with one of the newest W10 updates.
Avatar
Our Windows 10 image is so out of date it will be a while before we can even test it, yet alone stick it in our workflow 😆
Avatar
Andrew Rathbun 6/25/2019 5:07 AM
Is that due to ISO #####?
5:08 AM
I forget the string of numbers
5:08 AM
17025 or something
Avatar
Partly, in this case it's just due to very slow IT updates, as we do not manage our own IT. We have our own network, but a small (and quite stretched) part of force IT manages it, so our updates and fixes in general are pretty slow. (edited)
Avatar
17025, the dreaded numbers
👍 1
Avatar
The version we are running is pretty stable so I can't say I'm unhappy with it, but our updates are slow for sure. Being an air-gapped network that's not the biggest issue on the world, but I do wish our updates were a bit quicker
5:09 AM
Think the only thing connected to the internet is the WSUS server
Avatar
@Andrew Rathbun I came on here today to ask the same question. I have the latest W10 on my research laptop and have been playing about with windows sandbox. Anyone found any blog posts on recovering artifacts from it?
Avatar
Jack of Trades 6/26/2019 7:39 AM
Yes hello good morning. Is this the best chat to ask about eDiscovery products? I'm about to start looking into a new option and I was hoping for recommendations to look into so I have some ideas once all the requirements are established.
Avatar
Andrew Rathbun 6/26/2019 8:15 AM
@Jack of Trades what do you currently use? Nuix is the new hotness at my agency
Avatar
Jack of Trades 6/26/2019 8:19 AM
I keep hearing this, anything in particular special about it?
Avatar
Nuix is is the in tool at the moment for LE big data. Speak to your NUIX rep, it's expensive and takes a while to get your head around it, but you'll get there. It's take n me 2yrs to get to grips with it properly.
8:21 AM
It can handle / parse all types of data, search, export, produce production sets. A d much more, look online for into, or YouTube for demos.
Avatar
Jack of Trades 6/26/2019 8:29 AM
Alright, I'll def take a look.
Avatar
kmacdonald1565 6/26/2019 8:40 AM
depending on what you are trying to accomplish, evidence.com is another option. we use it for distribution of any kind of digital evidence...mostly body camera video, but really anything including DF reports and surveillance video is the hope to add to it one day. We are just in the beginning stages of implementing this so i cannot help with parsing of data. I just know its fairly simple to use.
8:40 AM
i should also note that i am not sure if they do work for private sector, but im guessing like most companies, money is money
Avatar
I'm trying to locate a stolen item that is pinging off a Bluetooth signal, has anyone worked with bluetooth sniffing with a directional antenna and what equpiment they have used ? Idealy I was thinking a USB WiFI modem that had bluetooth built in to use it for both types of sniffing and locating.
Avatar
this may not be the most helpful since I've not done directional locating, but i've definitely used signal strength to triangulate stuff ive lost personally by just repeatedly moving and measuring the strength of the signal with my phone. Works pretty well with BLE devices, but it really only puts you in the same room as it, i was locating wireless earbuds and it got me down to the right part of the right room in my house, but after you get close enough it really stops working as well
Avatar
ctrlShiftEscape 6/27/2019 12:44 AM
@Andrew Rathbun Windows sandbox is cool but you have to sacrifice VMware if you are using it and for most of the people that is not acceptable...Also, since there is no option to restart the machine it makes it less usable in general. I would been nice to have it along with other VM products just to check some stuff for malicious activity and similar stuff. Regarding investigation of it, it seams that it creates a hidden ~10GB BitLocker partition on your system - would not expect to find much unless someone found a way to decrypt it....still under research
👍 2
Avatar
any of you nice folks use a dongle server?
Avatar
hi i need help for cross compiling android 9.0 API28 anyone can help me ?
Avatar
@Sudo I use VirtualHere and highly recommend it. We've had a few discussions about it if you search that name. In short it's really cheap ($50) and runs on just about anything.
Avatar
ohh cool, I'll look into it (edited)
6:33 AM
what did you use for all the USB ports
6:33 AM
just a hub
Avatar
Yup. A large hub attached to a Synology NAS.
6:41 AM
I've had it for about a year and so far it has worked flawlessly.
Avatar
cool, thanks for the info
Avatar
I second VirtualHere @Sudo . Have been using it for some time now with no issues at all. They have a client for every OS
Avatar
and it's just real cheap
6:52 AM
is that a recurring fee or a one of purchase
Avatar
one off !
Avatar
Yep, VirtualHere is great, We have been using it with about 20 dongles for a few months now. No problems and everyone likes it (which is rare!). It a one off purchase
Avatar
awesome
7:47 AM
is it viable to run from a VM?
7:48 AM
because that would give me good excuse to up our hypervisor capability
Avatar
@chick3nman thanks for the info, where you using a blutooth app to locate signal strength ? The same room would be close enough for me.
Avatar
@Sudo I don't see why not. I will test it on one of my VMs and let you know. I have it running on my host with no issues
Avatar
@DCSO Yes, there are a few Bluetooth and BluetoothLE scanners that will just show all the devices in the area and their signal strengths on the android app store
10:40 AM
because it periodically updates
10:40 AM
as you move around, you can watch the strength on your target device fluctuate up and down as you get closer/farther
👍 1
Avatar
@goalguy thanks, just would be good to know if I can do it through a VM and pass through the hubs and things
7:24 AM
then I can use it as an excuse to upgrade or get a new server for a hypervisor, rather than drop thousands on just a dongle server you know
Avatar
As long as the VM can see the hub I don't see any issue with it. I would say go ahead and say it will work and upgrade your hypervisor and worst case scenario you just use the host. It is a very lightweight program.
Avatar
seems there's a couple tricky bits with xenserver USB passthrough but, seems that there's also ways round it
7:28 AM
do you know if virtualhere has a trial sort of version so you can test it?
Avatar
kmacdonald1565 6/28/2019 7:31 AM
one license at a time i believe is free
7:32 AM
technically, 1 usb device at a time works
7:32 AM
doesnt have to be a license dongle
Avatar
cool beans
7:32 AM
I can test it then at least
Avatar
kmacdonald1565 6/28/2019 7:32 AM
that was as of like 5 months ago i believe
Avatar
should be pretty cheap to test as well so that's good
7:32 AM
just need a hub and stuff
Avatar
kmacdonald1565 6/28/2019 7:33 AM
IIRC someone here used it on a raspberry pi if you dont want throw it on your server environment.
Avatar
probably doesn't need much grunt
7:39 AM
and yeah I saw it can run on a pi, so that's cool
Avatar
kmacdonald1565 6/28/2019 7:42 AM
might help someone else if they search and find this conversation
Avatar
I'll report back eventually once I figure out what I'm gonna run it on
Avatar
kmacdonald1565 6/28/2019 7:44 AM
👍
Avatar
@Sudo I've set up some Pis running virtualhere. If you go down that route and need pointers feel free to reach out.
Avatar
Anyone have experience in a private matter to investigate stolen iphones ? I had someone reach out with the serial number of the iphones and it was activated by the person who stole the phones. Is there anyway the phone can be tracked by private investigators (non sworn LE)
11:12 AM
Please DM if you have experience on the proper way to find the devices
Avatar
anyone know the best way to practice imaging harddrives and attempting to restore whats on them?
Avatar
Patrick.Beaver 7/1/2019 5:12 PM
@John I will send you a message.
Avatar
Anybody have the tech support phone number for @Cellebrite ? Have a dongle/license issue.
Avatar
yep -- sec
11:35 AM
@goalguy SUPPORT North America: +1-800-609-9912
Avatar
Thank you
Avatar
CLB-Arnon Tirosh 7/2/2019 11:40 AM
+443308089051
Avatar
@Sudo +1 for VirtualHere. We have it running off of a Windows Server and it works very well. Cheapish 12 port USB port of Amazon does the trick. Being able to rename/hide specific dongles from the server is useful too
Avatar
In a previous conversation regarding mental health support for DFIR professionals (particularly in the context of indecent image investigations), @4n6_Guy(Kevin Salhoff) recommended Shift Wellness as a source of mental health training. Is anyone from @Law Enforcement [UK] aware of a UK/European equivalent?
Avatar
We do have mental health support put in place at our force, posters in our lab/office. https://mhfaengland.org/
Avatar
We've just been told to refer our self to OHU if we feel it's getting too much. Bit crap really considering the workload we carry and the content.
Avatar
TheLargePortion 7/3/2019 9:13 AM
We used to get 6 monthly 'checkup chats' but now it's self-referral to OHU.
Avatar
Tommy Cockles 7/3/2019 9:16 AM
Ollie. In UK LE it's changed a lot in recent years. It's gone from larger offices where you only see your screens and annual meetings with trained professionals. Now it is analysts packed into a room where you see everyone else's monitors and untrained OH require examiners to complete a questionnaire via a portal. I get the impression these are bought in and marked by a computer syste. I don't work with CP anymore but did work on more than 400 CP cases. I don't think the support on offer now is enough.
👍 2
Avatar
Thanks guys for the insight. Doesn't sound like those are particularly robust solutions 😦 Interesting to hear that it hasn't always been that way @Tommy Cockles
9:18 AM
@Pacman Do they come in and provide training? And is it done in the specific context of indecent images, or just general mental health?
Avatar
They don't actually - it's just posters on walls for our info.
9:38 AM
We do have OH which we have to see every 6 months, can also see them on self referral.
Avatar
Yep every 6months or self referral.
Avatar
6 months or referral here too
Avatar
Ok, thank you :)
10:23 AM
So no-one aware of something comparable to Shift Wellness in the UK? (edited)
Avatar
What is it, it looks like mindfulness training?
10:26 AM
I know a lot of folks over here have self-referred and ended up going through mindfulness sessions
10:26 AM
nothing mandatory
Avatar
I think the whole mental health awareness or training isn't that particularly great - just a chat every 6 months. Self referral very rare since people don't come forward. I don't know if it's true but there's a police force in UK recruiting volunteers to spend something like 4 days a month to grade IIOC - no pay, don't think OH/self referral applies. :\
👍 1
Avatar
@Pacman West Midlands Police recruiting volunteers to do some DF work, with exposure to IIOC, it's been well publicised in the news, criticising the whole thing. (edited)
Avatar
I don't know the inside story and I didn't want to call out the force lol - I don't like believing things in the news.
Avatar
Sometimes reporters do tell the truth https://wmp.referrals.selectminds.com/jobs/digitial-forensics-team-volunteer-565 Although it doesn't mention the viewing of IIOC as part of the role in this link. (edited)
Are you interested in technology and how computers work, or even how CCTV evidence is recovered and collated? Well then you are just the person we...
Avatar
wibblypigftw 7/3/2019 3:07 PM
Years ago we used to see an external trauma counsellor every quarter, who we all got to know well and built up trust with. It wasn’t mandatory but everyone went. She was let go with the first round of cuts (seen off by a DI who did pretty much nothing else of note in his 12 months with us) and was replaced with an unqualified OHU staff member who’d take us through a tick list of whether we were drinking too much, having dark thoughts etc.
Avatar
deepdive4n6 7/3/2019 3:23 PM
@OllieD We're the largest muni agency in our state... we did the SHIFT Wellness bit and it didn't go over well. Then we participated in a pilot ICAC program, that basically involves having a psychologist come in and meet regularly with your unit, and track responses over time. That's now morphed into regular group meetings roughly every month or so and the shrink we hired is also available for one on one visits. Everyone has met with him individually and as a group, and the unit had a hand in interviewing/choosing who the psychologist would be. Everyone is strongly encouraged to attend, but you could opt out if you wanted to. There were a whole bunch of initial struggles that I think should be expected whenever you're getting LE people together to talk about their feelings. No one wanted to talk, for MONTHS. People only barely talk now, and it's mostly about superficial stuff - like handling ordinary work/family stress. Most of the work done in the group sessions is educational and similar to a Psych 101 lecture. Our shrink has a great personality that's a good fit for the group, but his preparation and org skills could use a bit of work... I dropped the group meetings and I have my own counselor that I see quarterly. I much prefer that - I can tell the boss that I'm participating in the spirit of our wellness program, and he uses it as an example that several of us are more comfortable speaking with someone one on one, and he's supportive of that choice. Same time commitment on my part, but I get more out of it.
💯 2
Avatar
12 month questionaire which might get you an appointment with Occ Health here. If you don't do the questionaire then you cannot just book an appointment which is crap as the questionaires really are not fit for purpose. Support from that perspective really isn't good enough.
Avatar
Deleted User 7/4/2019 12:33 AM
@OllieD we rarely encounter IIOC - perhaps 5% of the evidence has a token picture on, and very few of those are 'collectors'. We tend to find bestiality to be far more common now. Easily 30% of the jobs have this material present.
Avatar
Thank you all for your input! Kev was asked by a customer if we knew what kind of provisions other forces had in place and Discord is the perfect place to find that out!
12:59 AM
@Deleted User Wow, wouldn't really have expected that kind of balance!
Avatar
Deleted User 7/4/2019 1:17 AM
@OllieD I know - it tends to be shared within WhatsApp groups under the facade of 'just a bunch of mates sending each other shocking pics' except the volume depicts a different story
🤢 1
Avatar
Has anyone had any issues running XRY or UFED products on AMD systems over Intel systems?
Avatar
Not an exciting topic but how does everyone go about with archiving their case data? Copy it onto a hard drive, chuck it into a safe/locked cabinet/shelf and fill in a spreadsheet?
Avatar
We have a case management system which retains details on the cases itself, the data generally gets archived onto tape though after 6 weeks of sitting on the server. Not sure on all the nitty gritty details but we do use commvault
Avatar
Davesdailypicks 7/4/2019 12:14 PM
Has anyone had any luck tracking down a swatter? I have reached out to multiple spoofing companies and no luck so far
Avatar
@Davesdailypicks I wish I had a better answer but maybe you can reach out to police departments that caught one according to news
Avatar
Davesdailypicks 7/4/2019 1:41 PM
Thanks! Im trying but just in case we run into dead ends I thought this was worth a shot.
👍 1
Avatar
@Davesdailypicks -- when I was with Ottawa we had a couple of Swatting files. Most information came from the FBI CyberCrime Centre in Pennsylvania. Not sure who you work for, but definitely a good resource to tap into.
Avatar
Davesdailypicks 7/4/2019 8:25 PM
Ouststanding! Thanks!
Avatar
@Davesdailypicks mind you one of the files, it was so easy to prove as numpty recorded everything on skype and it was saved on his PC.
Avatar
I’m sure it has a lot to do with location but how many hours a day is average in digital forensics?
Avatar
Andrew Rathbun 7/5/2019 9:36 AM
@Tyføøn do you mean how many hours a day do I do digital forensics? For me, it's my full-time job. But that doesn't mean every second I'm in front of a piece of forensic software or imaging devices. There's a lot of paperwork and, for me, preparation for search warrants that take away from facetime with forensic software. Hopefully that answers your question? Feel free to follow-up with any more you have
Avatar
I guess I meant per week, like I work 8 hours a day Monday-Friday and 40 hours a week
Avatar
Andrew Rathbun 7/5/2019 9:53 AM
Same here
9:54 AM
If you're working in LE there can be odd hours if you ever need to respond to a high priority incident that involves digital evidence, but if you're more on the backend of things, nothing is an emergency and you just go about it 40 hours a week at a time
Avatar
Ah ok cool, wasn’t sure if the hours were fixed or random
9:55 AM
Thanks for clearing things up
Avatar
Davesdailypicks 7/5/2019 12:47 PM
Hey yall I have a samsung galaxy j2, is my only opinion to do a boot loader?
Avatar
I am working on a terrorism case in which the defendant used a PS3/PS4 to chat and browse the internet
5:07 PM
Is there any artifacts that might be useful from duplicating the drive ?
5:08 PM
How would I get the user account information ?
Avatar
Andrew Rathbun 7/5/2019 5:08 PM
@Jay528 any chance you can do a SW to Sony for any online communications and browser history attached to that account? (edited)
Avatar
Where do i go about getting that information ? clone the drive and boot up the playstation ?
Avatar
Andrew Rathbun 7/5/2019 5:10 PM
do you have the actual Playstation?
Avatar
just got the PDF file with link you posted way back about ps
5:10 PM
I have possession of the playstation
Avatar
Andrew Rathbun 7/5/2019 5:10 PM
I don't think you can remote wipe a playstation
5:10 PM
so you could just boot it up and see what the username is
5:11 PM
email attached to the account
5:11 PM
serve a preservation letter
Avatar
ok cool. thanks
Avatar
Andrew Rathbun 7/5/2019 5:11 PM
That's probably what I would do. Of course, document what you do
5:11 PM
Can't remember what that PDF document said about PS forensics but hopefully there will be something about browser history
Avatar
oops
5:14 PM
wrong chat
Avatar
Andrew Rathbun 7/5/2019 5:15 PM
👌
Avatar
Just got my book to study for the security+ certification, any other good certs I should strive for?
Avatar
@Jay528 i just finished a case with a ps4. I booted it up, offline, It was password protected and I managed to figure out the password from analyzing the passwords from two different phone extractions. After logging in I found that browsing history and bookmarks was available offline, so I documented it with a camera. Settings and account stuff is also available offline.
👌🏻 1
1:06 PM
Password = 4 digit pincode 😁
Avatar
@Tyføøn depends on what you want to do in cyber and if work is paying for them 🤣
Avatar
Ah ok that’s easy enough lol
Avatar
i and others can give you the certs in a certain direction, but whats the direction? if incident response and forensics, S+ is a good start. SANS GCIH and the GCFA are the main ones after that if work is paying, DCITA has good certs too. stay away from ec-council.
Avatar
Just general ones that can get you a job in digital forensics. (edited)
Avatar
MrMacca (Allan Mc) 7/8/2019 1:53 AM
Morning people, What software would you recommend for wiping a hard drive so that it is forensically wiped? At the moment we use the WIPE feature of the TX1 Tableau write blocker, but we are wanting a fall back option if and when that fails. Thanks in advance.
Avatar
Encase? might be a bit slow though
Avatar
MrMacca (Allan Mc) 7/8/2019 1:58 AM
Yeah, that's what we are thinking about it. Also debating Mac OSX Disc Utility option. There's DBAN but seems silly to spend more money when we potentially have other tools already that can do the same job.
Avatar
Have you looked at hardware solutions?
Avatar
Yeah, I have not used the newest encase versions but 6 let you wipe stuff even without a dongle
Avatar
Oh right, you want to use existing tools
Avatar
MrMacca (Allan Mc) 7/8/2019 2:00 AM
Can use anything Ollie if needed
Avatar
Does MacQuisition let you wipe an attached drive?
Avatar
We have the single slot model
2:00 AM
Easy to use and standalone. Can even hook up a receipt printer to generate a log if necessary
Avatar
looks pretty sweet @OllieD
Avatar
MrMacca (Allan Mc) 7/8/2019 2:02 AM
Cheers for that
Avatar
There are other similar systems that can do 24 drives at once, but you're looking at a good chunk of change and a lot of them will only erase with null bytes (don't know if that's sufficient or not) (edited)
Avatar
MrMacca (Allan Mc) 7/8/2019 2:05 AM
TBH we don't wipe that many, but it's good to have additional fall backs. I'll make a note of that one. Thanks again
Avatar
No problem
2:08 AM
We have this unit, which only supports one drive but you can select different erasing profile and keeps a reviewable log: https://www.amazon.co.uk/StarTech-com-Standalone-Eraser-Dock-Drives/dp/B011NLY9FQ
Avatar
MrMacca (Allan Mc) 7/8/2019 2:13 AM
@OllieD Definatley cheaper than getting another TX1 😛
2:14 AM
Thinking maybe > TX1, that Single slot unit and then a Software solution for any external Hard drives.
Avatar
question for everyone
2:31 AM
say you have an officer who does a kiosk extraction
2:31 AM
they tag relevant items, but for some reason, they can't export them
2:31 AM
they ask you to help and export them for them
2:31 AM
who exhibits that export
Avatar
good one
2:33 AM
Did they just not know how to export it or did you do something special/unusual to get it to work?
Avatar
no they just couldn't because the kiosk is temperamental
2:36 AM
so they asked one of us (not me) to export those tags to a disc
2:37 AM
and we're deciding whether our guy who created the DVD of the tags from the export is exhibiting the export, or the officer who did the master extraction and tagged the items
Avatar
I assume they normally exhibit it themselves? If all your guy/gal did was essentially press export I would suggest the officer has done the actual extraction and also decided which parts to tag so they can exhibit it?
👍 1
Avatar
personally I think the work went into the tagging, and us just exporting those tags for them from the master is their exhibit (edited)
2:39 AM
yeah that's what I would say as well but there's disagreement
2:39 AM
so I just wanted to get other opinions
Avatar
Yeah can see its a bit of a tricky one
Avatar
it's whether creating that physical DVD itself is the exhibit
2:40 AM
or the tags themselves
Avatar
I imagine the officer would rather your people exhibit it so they dont need to worry about testifying about it 😂
Avatar
yeah, I just think it would potentially cause trouble right?
2:40 AM
like you get called to court and the court says, you exhibited this export, why did you tag these items
2:40 AM
you'd say, well I didn't, officer 123 did
Avatar
I think so, as your guy would be like "I just exported it and didnt select stuff" and then they would need the officer in anyway to talk about what he did and why
Avatar
and they'd say so where's his statement
2:41 AM
I mean maybe the officer will do or have done a statement
2:41 AM
but yeah
2:41 AM
so sure, it's probably doable, but I feel like you're introducing yourself into the chain without need to
Avatar
maybe one of the current LE people have a plan, here comes @K23 😂
Avatar
yeah I spoke to him lol
Avatar
just seen him typing away
Avatar
we agreed the same too
Avatar
You've already had my feedback on this one in PM. Personally I think if as a technician all you are doing is pressing export, on an exhibit someone else examined, and someone else reviewed and tagged then it should be kept as their exhibit. Otherwise it's just potentially confusing other officers / wasting court time as they might infer that you've had a greater role to play, instead of just hitting a button. (edited)
👌 2
2:43 AM
😆 Yep we were on the same page
Avatar
yeah that's essentially what I assumed
2:44 AM
but I mean, I do understand why it could be done that way
2:44 AM
it's just the question of where that exhibiting comes from
2:45 AM
the physical creation or the, work that went in prior to creation
2:45 AM
like if someone arranged something and then you took a photo, the photo would be yours
2:45 AM
but I feel like with digital it's different
Avatar
Andrew Rathbun 7/8/2019 4:16 AM
@MrMacca (Allan Mc) Eraser is a free option that has many wipe options ranging from first 16 bytes being overwritten to being wiped 30 times over. https://eraser.heidi.ie/ is the link
Avatar
+1 for Eraser as a software based solution
👍 2
Avatar
MrMacca (Allan Mc) 7/8/2019 6:40 AM
Going to do some testing and speed comparisons, thanks alot
👍 1
Avatar
I use eraser and active kill disk
Avatar
Andrew Rathbun 7/8/2019 6:48 AM
@Dam looked into Active Kill Disk. That Erase Certificate feature is pretty neat
Avatar
@Andrew Rathbun yes but only with the paid version. The free version doesn't have a nice certificate
Avatar
Andrew Rathbun 7/8/2019 6:58 AM
Bah of course!
Avatar
Anyone perform extractions on an apple tv ?
Avatar
thanks
Avatar
@Dam I also like those certificates! The startech eraser I linked earlier can print an erase confirmation on receipt paper but the certificate is nice for anything 'customer' facing
Avatar
Even the free version of active kill disk is nice.
Avatar
MrMacca (Allan Mc) 7/9/2019 3:04 AM
Really liking the look of Active Kill Disk, especially the report. Also like the fact you can have concurrent erases going.
Avatar
Andrew Rathbun 7/9/2019 4:03 AM
Yeah that is nice. Eraser is just one at a time but you can queue up as many as you want and set and forget it
Avatar
MrMacca (Allan Mc) 7/9/2019 4:13 AM
The reporting feature of Kill Diskis nice for ISO 17025, so I think we are going to look into purchasing the Ultimate version.
👍 1
Avatar
anyone know how to stop X-Ways wanting to "activate the viewer" all the time?
6:17 AM
seems to do this constantly
Avatar
It needs the viewer to parse/display some files, have you downloaded the viewer and mplayer components?
Avatar
yeah I have
6:18 AM
I've always had it
6:19 AM
sometimes it works, sometimes it doesn't
6:19 AM
it'll say please activate the viewer component, so I use it, then it forgets and says activate it
Avatar
Never had that issue, I just copy it to the same folder as the X-Ways install, then tick the box in options -> viewer programs and put a full stop in the “use separate viewer component”
Avatar
yeah, mine is constantly (when I search for example) saying please activate the viewer
6:23 AM
so I check the use separate viewer, point it to it
6:23 AM
hit OK, then it just asks me to activate it again
Avatar
The only thing I would try is to remove it completely and install it again
Avatar
yeah, bout all I can do really
6:29 AM
just seems to always happen eventually but, oh well
6:29 AM
I'll just start fresh
Avatar
Adam Cervellone 7/9/2019 11:51 AM
@Jamey , I sent you a PM regarding some computer hardware suggestions for our lab! We did purchase the SSDs we spoke about previously and they are performing well.
Avatar
Has anyone done search warrants to Blink or is familiar with the file name format? If so, can you contact me offline please
Avatar
@Adam Cervellone https://siliconforensics.com/ is your answer and I also put that in the PM
Default Description
Avatar
Adam Cervellone 7/9/2019 1:10 PM
Thank you! I will take them into consideration if we have to get bids from multiple vendors
Avatar
RubberDucky 7/9/2019 4:52 PM
What do ppl look for in entry level DFIR candidates? We are hiring and We would like a general idea or even sample interview questions if ppl have any to help.
Avatar
anyone know what the client.db-wal file is
3:24 AM
seems to be an Apple database for connected clients or such
3:25 AM
nevermind, it's part of the iCloud Photo Library
Avatar
Hi , please I will appreciate any research material on Discord Instant Messenger . Thank you You can send to my e-mail address <okolorieu@yahoo.co.uk>.
Avatar
Andrew Rathbun 7/10/2019 4:28 AM
@gokolorie1 search this server for a PDF to Discord forensics
👍 1
4:28 AM
it's been linked multiple times
Avatar
@Andrew Rathbun thank you very much, very helpful
Avatar
Andrew Rathbun 7/10/2019 6:10 AM
@Law Enforcement [USA] besides Google, Comcast, Facebook/Instagram, what other LE portals exist that require user registration/login?
6:10 AM
I'm trying to compile a list for my coworkers so we can all get our logins established
Avatar
Sprint
Avatar
I think ebay paypal but not sure you need a login
Avatar
ebaypal?
Avatar
Verizon
Avatar
Andrew Rathbun 7/10/2019 6:11 AM
https://lers.corp.ebay.com/ yep you're right @Dam
Avatar
kmacdonald1565 7/10/2019 6:11 AM
i remember seeig that verizon had one or one was coming but dont know hot to get it
Avatar
Apple I think do
Avatar
Phineas Bunce 7/10/2019 6:12 AM
Microsoft
Avatar
Verizon is complicated and they provide the agency with a portal manager who then hands out logins
Avatar
Andrew Rathbun 7/10/2019 6:12 AM
@Sudo re: Apple Government and law enforcement personnel submitting a legal request to Apple should transmit it directly from their official government or law enforcement email address to mailbox: lawenforcement@apple.com.
6:12 AM
@mbryan897 you're right, I remember that from my previous job. What a pain in the ass
6:13 AM
Avatar
Phineas Bunce 7/10/2019 6:14 AM
Apple is LE friendly like getting your hand caught in a rat trap
Avatar
kmacdonald1565 7/10/2019 6:14 AM
i think hand is too pleasant of an analogy
Avatar
For Verizon: email vsat-lea-accounts-admin@verizon.com and they will get you set up with their eLERT system (edited)
👌 2
Avatar
Phineas Bunce 7/10/2019 6:15 AM
True very true
Avatar
Jimmy Sackss 7/10/2019 6:16 AM
Hey everyone, I am working on creating a policy/ protocol document for my PD. We are trying to start an official Digital forensic lab. If anyone could share what your agency has, please private message me- I’ll send my work email over for any validation of my credentials
Avatar
Unoriginal_name 7/10/2019 6:16 AM
Charter communications/ Time warner
Avatar
Cox cable as well
6:17 AM
Unless that’s now charter
Avatar
Andrew Rathbun 7/10/2019 6:17 AM
@Jimmy Sackss are you starting from scratch or do you have anything to work off of?
6:18 AM
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-86.pdf is very wordy but might be a good reference for terminology or definitions in your final policy
Avatar
Jimmy Sackss 7/10/2019 6:19 AM
@Andrew Rathbun I will be starting from scratch. I am on the USSS electronic/ financial crimes TF. So I’ll eventually be going to NCFI for bcert.
Avatar
mutantblack 7/10/2019 6:20 AM
NCFI BCERT and MDE classes provide some useful sample documentation to reference to.
Avatar
Jimmy Sackss 7/10/2019 6:20 AM
My goal is to establish a full time position and functional lab.
Avatar
kmacdonald1565 7/10/2019 6:21 AM
what state you in?
Avatar
Jimmy Sackss 7/10/2019 6:21 AM
@mutantblack Yeah I know. Unfortunately, I’m needing to work on policy and whatnot now while waiting
6:21 AM
Kentucky
Avatar
anyone in here with Orange County FLA? Can you PM me? (edited)
Avatar
Andrew Rathbun 7/10/2019 6:24 AM
@Jimmy Sackss maybe someone who has already been there can provide some documentation, if they're allowed. Also, not sure if @IACIS Staff would be able to help. Also, @NW3C might be able to help via https://www.nw3c.org/technical-assistance-request. They have a model policy for cryptocurrency on their website. Maybe if you contact them they have model policies for a lab? Worth asking
Avatar
Jimmy Sackss 7/10/2019 6:27 AM
Thanks @Andrew Rathbun I’ve explored and “exhausted” those options already. While reading through messages on here, figured I would ask in the general chat. I’m also on the ICAC TF and have requested through the listserv. I only got a hand full of responses. Unfortunately, you find there can be a grave difference between different states and departments policy needs.
Avatar
Andrew Rathbun 7/10/2019 6:29 AM
The only other thing I can suggest is if you create a Google Doc and draft up a very rough draft, you're welcome to post it here and we can critique it either in the document or in here together. I know how daunting it can be to have to go from zero to something actionable like that so don't do it alone, if you can avoid it
6:30 AM
I don't have access to my previous agency's policy otherwise I'd supply it. However, I do know if I looked at something on my screen and saw what it was missing, what it has, what it doesn't have, etc, I'd be a lot more help that way
6:31 AM
One idea would be to start with bullet points on things you want to hit in the policy i.e. handling of CP evidence, chain of custody, all that fun stuff. Flesh it out as much as you can and, I'll speak for myself, but I'd be happy to take a crack at it
6:31 AM
I'm sure others would too
6:31 AM
I love doing editing of resumes, forensic guides, policies, etc. I did/do that all the time so happy to offer my services
Avatar
Jimmy Sackss 7/10/2019 6:37 AM
Ok thanks
Avatar
ahh OK, I just know my colleague did Apple and had to go through some channel but if they don't need a login that's cool
Avatar
@bizzlyg Yes MacQuisition will let you wipe an attached drive, but has safety measures in place to avoid the mistake of the systems drive and you will have to mount it read/write before you can start the action, sorry for late reply was at the beach
👍 2
Avatar
Thought it was possible somehow, thanks @vipnola
Avatar
@Jimmy Sackss https://www.swgde.org They have an amazing set of policies papers , document and report templates and forensics best practices documents. (Just my personnal opinion as I am not in the USA.. but I find their papers well done. They also have a lot of references in their paper you can reference too. )
digital forensics best practices standard operating procedures
👌 1
4:42 PM
You can filter their papers by field (forensics, videos, imaging etc. ) It can be a great starting point if you start from scratch (edited)
Avatar
Jimmy Sackss 7/10/2019 5:00 PM
Thanks
8:07 PM
(a few hours maybe?)
Avatar
Andrew Rathbun 7/11/2019 5:30 AM
Does anyone else find sometimes that Axiom takes forever to load thumbnails in Thumbnail View? I have 2.6 million records in this case from a TB of data between 7 evidence items. I often have to close Axiom and reopen it for it to be more responsive for a limited period of time
Avatar
forensicsnewbie 7/11/2019 5:44 AM
Anyone have any luck bypassing a SM-G892A with secure startup enabled? Or know if might be supported in the near future. Cellebrite is telling CAS should be able to handle it.
Avatar
kmacdonald1565 7/11/2019 6:01 AM
so, my office just got a NCMEC tip of CSAM uploaded 7 years ago...with no current records or logs (edited)
6:01 AM
hurrah
Avatar
Andrew Rathbun 7/11/2019 6:08 AM
This channel has been changed from general-dfir-questions to #general-discussion-and-questions
👍 4
6:09 AM
@kmacdonald1565 your post finally made me make the change since this idea has been in my head for a long time. Your post was totally fine in content and this was the best channel for it, but it always bugged me that the channel was labeled questions despite general discussion occurring here. Now things are a bit more cleaner and makes more sense. Hope everyone agrees
6:13 AM
I try not to make change for no reason so hopefully this was an improvement. Feel free to react below
👍 10
👎 1
Avatar
MrMacca (Allan Mc) 7/12/2019 3:27 AM
Can anyone recommend a program that can essentially create a file similar to an SFV, but doesn't do any sort of hashing. I'm wanting a program that can be ran on a folder, it lists all the files that are within the folder and can also check whether they still exist or not. The issue with an SFV is it can take a good few hours to generate on some folders, and this is something I'm trying to avoid. Ultimately i'm after a self contained file exist check that is fast. Anything anyone can recommend or is the SFV the best route?
3:28 AM
So in the future, I run this file and it checks that everything is still present, after a restore or a copy
3:29 AM
One alternative could bv generating a CSV file with the folder contents, and then in the future doing the same, and then comparing the New and Old CSV.
Avatar
@MrMacca (Allan Mc) You want to know if a file appeared/disappeared, not if it got modified?
Avatar
MrMacca (Allan Mc) 7/12/2019 3:45 AM
Yeah just whether it exists or not
3:46 AM
Working on a method now using NotePad ++ to do the comparison of 2 files generated, which works, but i'd love to have the ability to just double click a file and then that does the checks, exactly like an SFV but faster
Avatar
@MrMacca (Allan Mc) If so then simply diff <( find /path/to/before -type f | cut -d / -f 5- | sort ) <( find /path/after | cut -d / -f 4- | sort ) where 5 and 4 are the number of columns to ignore from the file paths
Avatar
MrMacca (Allan Mc) 7/12/2019 4:00 AM
Thanks @Kr I'll give it a whirl
Avatar
I added "-type f" to find only (regular) files but actually you can "-or -type d" to add directories, or remove options altogether in order to get all file system entries under the chosen path
Avatar
Does anyone have the user manual for a TX1 duplicator ?
7:34 AM
I'm having issues going to the website
Avatar
@Jay528 I'll PM you with a link
Avatar
thanks
Avatar
Does anyone recommend any other servers to join?
Avatar
Andrew Rathbun 7/12/2019 7:11 PM
@Tyføøn check #dfir-resources for some others
Avatar
Has the red pill blue pill server been abandoned? I can’t gain access to the rest of the server
Avatar
Andrew Rathbun 7/13/2019 3:05 PM
No clue, honestly
Avatar
Lol, I tried joining July 4 and the same thing is happening.
3:07 PM
I can only access the #welcome channel but I did advance to level 1 lol (edited)
Avatar
Andrew Rathbun 7/13/2019 3:11 PM
Yeah no idea, that server isn't very active. I actually just removed it from #dfir-resources
Avatar
we can have our own pills here!
2:09 AM
with black jack
2:09 AM
and hashcat
Avatar
I've been roped into some kind of "demonstrative" display of the dangers of open wifi
4:12 AM
I had a couple of ideas, basically they want to demonstrate what "could happen" if you connect to Free WiFi Totally Legit
4:13 AM
I don't think there's much on the table though in real terms, not with TLS and things, plus each "website" having their own app now
4:14 AM
what would you guys do (my only real idea was DNS redirects or some partial sniffing but not a lot there I don't think)
4:14 AM
or a captive portal of sorts that could operate a couple different ways
Avatar
what would we do? offensively or defensively?
Avatar
Have there been any developments in acquiring data from a Sandisk Secure Access vault v3.02?
Avatar
offensive
7:47 AM
basically
Avatar
Does anybody have some good keyword lists you can share. I have a pretty good CP list but I am looking for others. things like slang words for drugs, weapons, etc...
Avatar
Andrew Rathbun 7/15/2019 10:14 AM
@goalguy PM incoming
Avatar
Do you guys use RegEx with your keyword lists?
Avatar
Andrew Rathbun 7/15/2019 10:57 AM
@Muad'dib there is a CP Regex list in #dfir-shared-drive, in case you don't have that yet
Avatar
We have several IIOC regex lists but I tend to find them not necessary if you just use known material names
Avatar
if anyone has played around with captive portals with hostapd and apache DM me, need some advice
Avatar
Andrew Rathbun 7/16/2019 11:06 AM
Does anyone have any idea if the TD2u formatting options can be changed? Not seeing how to change it from formatting the destination HDD from ExFat into...anything else
Avatar
@Andrew Rathbun Looks like exFat is the only option supported for formatting.
Avatar
Andrew Rathbun 7/16/2019 11:34 AM
Good to know. Thank you @JaiRoc
Avatar
Trying to get a physical on a samsung T727T1 via decrypting - I get the error Critical CMDLINE include invalid parameter
12:00 PM
Does it mean it isnt supported for extraction ? @Cellebrite
Avatar
If 'CRITICAL' is mentioned (instead of WARNING:), the physical extraction will fail due to a patched Firmware.
12:11 PM
Anyone know how to get out of it ?
Avatar
@Jay528 did you try the recovery tool
Avatar
it didnt work. On the phone with support
12:26 PM
thanks Paul
Avatar
alright 😃
Avatar
a call to support and its all good
12:32 PM
had to restart the device and put it into d/l mode again
Avatar
glad you got it sorted out
Avatar
Still waiting on the OnePlus 😃
Avatar
Patience 😃
👌 1
Avatar
Anyone in here a ROBOCOPY genius?
Avatar
Andrew Rathbun 7/17/2019 12:07 PM
@nbh2493 did TeraCopy not do the trick?
Avatar
I am having an issue
12:12 PM
🤣 1
12:13 PM
I want to know how to exclude this from a mounted AD1 to a path on my network....
12:14 PM
that same string of App Data shows again further down the page with the same number of folders
Avatar
RubberDucky 7/17/2019 5:35 PM
Has anyone here tested and came to conclusions whether virtualized machines are faster or slower than running axiom or x ways processing on an actual machine ? Aka performance of popular forensic tools on a host vs guest machine ? I’m guessing with virtualized servers having more CPUs / RAM performance than a typical tower, performance might favour them, if the software takes advantage of the extra resources... any help would be appreciated, thanks
Avatar
Andrew Rathbun 7/17/2019 7:06 PM
Total shot in the dark, but does anyone know if there's a way to obtain a serial number for an iPhone from Apple or somewhere else if all one has is the phone number? No known Apple ID or serial number. Needed for the purpose of a search warrant. Not sure if you can subpoena Apple for a device's serial number if you only have the phone number of the device. If anyone has any thoughts it would be appreciated!
Avatar
@Andrew Rathbun I don’t see why not since I’m sure they have all that stuff logged. Now playing devils advocate, some ISP wouldn’t let us serve them a SW with MAC address only since they couldn’t “search” their systems based on that. And they needed IP address. (edited)
7:40 PM
100% of shots you don’t take don’t go in. #99 Wayne Gretzky
💯 3
👍 3
Avatar
@Andrew Rathbun can you serve apple with the number and get info that way?
Avatar
Andrew Rathbun 7/17/2019 7:42 PM
That's my take on it as well @CLB-Paul
7:42 PM
Asking for a coworker
Avatar
I’m all about pushing the limits on that stuff. You never know unless you try
Avatar
Andrew Rathbun 7/17/2019 7:43 PM
@sholmes my response was what you suggested. Throw mud at a wall and see if it sticks
7:43 PM
@CLB-Paul me too. Worst they can say is no
Avatar
And you’re in the same spot as before 🤷‍♂️
💯 2
Avatar
Andrew Rathbun 7/17/2019 7:43 PM
And it's just paperwork. It never hurt anybody to do a little extra. The pen is mightier than the sword
7:44 PM
Thanks guys. You all have a great night
Avatar
@CLB-Paul MAC address of the modem connecting to the ISP (with e.g. PPPoE) or MAC address of a device in the subscriber's LAN?
Avatar
I have an Alba 1.8" ACF18 with what I believe is a spreadtrum chipset/OS. I've not had any luck in obtaining a physical or logical extraction of this device as this model isn't supported on both UFED or XRY. Any suggestions?
Avatar
@Kr mac of the modem
👍 1
Avatar
@nbh2493 did u get help on robocopy ?
Avatar
dunno if anyone else can assist me
5:30 AM
I've got the captive portal going, works on old androids, iphones etc
5:30 AM
but newer androids don't seem to auto detect the portal so don't prompt for sign in
5:30 AM
and I'm not really sure why
Avatar
@Pacman have you tried the generic spreadtrum profiles in XRY. I've had success with some phones with no support using that.
5:58 AM
Only issue is finding the 'magic button' to make it dump
Avatar
I have Joe - none of the buttons seem to trigger the dump
Avatar
kmacdonald1565 7/18/2019 6:13 AM
@Andrew Rathbun might be able to obtain the serial number with just a subpoena
Avatar
heatherDFIR 7/18/2019 6:29 AM
All just a heads up that I took a position with Cellebrite. If you have specific concerns, issues or questions let me know and I can try to help before you have to hit support.
💯 9
Avatar
Andrew Rathbun 7/18/2019 6:30 AM
@heatherDFIR I'll add you to the Cellebrite role now
Avatar
heatherDFIR 7/18/2019 6:30 AM
I am still SANS too
6:30 AM
So keep that in mind. 😃
Avatar
Andrew Rathbun 7/18/2019 6:31 AM
You're both now!
👌 1
Avatar
4n6_Guy(Kevin Salhoff) 7/18/2019 6:37 AM
Congratulations!
Avatar
heatherDFIR 7/18/2019 6:38 AM
Thanks! I am excited to dive into more research, fix things, explain things, blog and do webinars. 😃 Def. a change from Gov Contracting work
Avatar
Congrats @heatherDFIR . What a great addition to the @Cellebrite team.
☺ 1
cellebrite 2
Avatar
@heatherDFIR - need another law enforcement discounted SANS Mobile course
Avatar
heatherDFIR 7/18/2019 7:08 AM
@Jay528 email me. hmahalik@gmail.com and I will put you in touch with who can help. I need the course, location and make sure your signature shows LE.
Avatar
I took mobile forensics in 2017. I remember an in person course for the LE pricing which was great
7:13 AM
I took mine online
Avatar
Is there a command in adb to get the specific unique identifier for certain apps?
Avatar
Do you mean the package name?
7:32 AM
'adb shell pm list packages' to get all of the installed packages
👌 1
Avatar
I mean the application ID. Apart from the general android-id every app gets its own unique id.
Avatar
Andrew Rathbun 7/18/2019 10:08 AM
To circle back on my Apple question from last night, it appears you can use a subject's name and phone number in a subpoena to Apple and they will then provide all the devices, dates devices were purchased, serial numbers of said devices, etc in an Excel spreadsheet. It will be found in their production in the spreadsheet under the GCRM TAB sheet. Also, it appears a full name of the subject and their physical address works in lieu or their phone number.
🍏 5
Avatar
Has anyone encountered a File Path too long while using NUIX Evidence Mover?
12:51 PM
or with TeraCopy?
Avatar
I use teracopy and no issues with long file path
12:52 PM
just use treesize pro to compare the files
12:52 PM
or robocopy with the listing command
Avatar
jay--- ever had an issue moving files with TeraCopy with a known .DB error associated with Symantec?
Avatar
never experience it but that seems to be your issue
1:05 PM
hate to say this..
1:05 PM
either use /XF *.db or manually export by folders via FTK
Avatar
yeah, that was the next course of action... exporting out per suggestion....
Avatar
@nbh2493 What file system are you writing to? File path length is usually a limitation of file systems 🙂
Avatar
So noone has a clue if there is a adb command to get the specific android id for example the facebook messenger app, since it's after android 8 or something differs from the units android-id.
Avatar
@Arlakossan You mean something like "com.facebook.orca-UjytdIiAHnXSKmwB_gwJrA=="?
1:44 AM
To clarify a bit, the application id is com.facebook.orca, as it always has been. However, since Android 8, the actual folder that it's installed to now has that extra random bit of data
1:47 AM
Assuming that you want to get that the id including that random bit, you can run adb shell pm list packages -f
1:47 AM
Which will include something like package:/data/app/com.facebook.orca-UjytdIiAHnXSKmwB_gwJrA==/base.apk=com.facebook.orca
1:49 AM
If I've misunderstood what you're looking for, I apologise in advance! But hopefully that's helpful to you
Avatar
Anybody else notice that @Cellebrite pulled PA 7.21? The latest on my.cellebrite is now 7.20
Avatar
@CLB-Paul has mentioned in #mobile-forensic-decoding that it has been pulled whilst a bug is resolved and that it will be back up soon
Avatar
Thanks @OllieD I guess it would help if I looked in all of the channels
Avatar
No problem!
Avatar
Anyone have IP address look up
10:52 AM
I also have this for IP address report
Avatar
Free online network tools, including traceroute, nslookup, dig, whois, ping, and our own Domain Dossier and Email Dossier. Works with IPv6. Some source code included.
Avatar
Gary.Hunt.Q 7/19/2019 2:06 PM
Has anyone received a "Instagram Business Record" document from a subpoena request at Instagram? I'm working with one and curious if it is the original document, or if the previous group printed it to PDF and omitted certain information.
Avatar
Hi guys, a quick question. I might be kind of an oddball as I started out in mobile forensics a few years ago and did not much with regular computers. Now I want to develop more in that field and my question is which kind of literature you recommend to get the basics? I'm talking about a book like Shon Harris' CISSP that is a very good guide for network security from the basics to specifics, but I need that for forensics.
Avatar
randomaccess 7/22/2019 6:49 PM
I read through a lot of Harlan's books to get my basic understanding of the artefacts on a windows system. But if you've got the money the FOR500 class teaches you everything
Avatar
File system forensic analysis by Brian Carrier might also help
Avatar
Lost a good guy. If you need help, reach out. There's no shame in seeking someone to talk to. https://www.policeone.com/health-fitness/articles/482821006-Suicide-prevention-resources-for-first-responders/
From police officers to firefighters, studies show that suicide continues to outpace other causes of death for first responders
Andrew Rathbun 7/22/2019 7:07 PM
Avatar
Anyone familiar with trying to locat the sender using an Anonymous Remiler program? From: Anonymous Remailer (austria) <mixmaster@remailer.privacy.at>
Avatar
This may be the wrong place to ask this, my apologies in advance, I recently picked up a Samsung Galaxy S8 version SM-G950W Its a Canadian phone currently locked to Koodo (I think?). I was hoping there would be a way to root this phone, or better yet flash it with TWRP or something. I've scoured google and xda for a root, but every attempt so far has failed. This phone may be un-rootable, but I thought I would ask anyways. Thanks :]
Avatar
Deleted User 7/23/2019 11:13 AM
hi
Avatar
hrllo
11:13 AM
hello
Avatar
Is anyone familiar with QQ.COM being set up on iphones ?
Avatar
Can anyone fill me in on how @Cellebrite "Auto Detect" pulls the correct profile with addtional methods but if I manually enter the model number it does'nt show up as a suggestion. Its like a hidden menu or "easter egg" of profiles
1:19 PM
S2720PP for example
Avatar
kmacdonald1565 7/23/2019 1:19 PM
That actually happened to a co-worker of mine. But for us, it was almost like the profile was semi-generic and it filled in the blank with the model name
Avatar
@kmacdonald1565 correct, the icon for the profile is generic. Just don't understand how i can't manually input that model and have it popup, why does it have to be auto detected.
1:22 PM
For example somone calls and says we have this phone can you get into it ? I input the model and its not supported but Auto Detect pulls a list of suppored methods.
Avatar
kmacdonald1565 7/23/2019 1:26 PM
oh i am agreeing, if that wasnt clear. we found it peculiar as well
Avatar
Hi all, the reason for this feature works only when using auto detect is due to the fact that we validate the connected device properties against our DB. Therefore we can see for example if the device OS version meets the requirements and others. This way on the fly we can adjust and suggest other methods
Avatar
Hi all, just a quick question. Is there any way of identifying the last time an iPhone was factory reset? It's just come up on a job and no one's quite sure. I assumed it was impossible, but two of the guys think they heard of it. (edited)
Avatar
@KeenoRen Try looking for an '.obliterated' file (0bytes) within the file system if its available - this time and date should be a good indicator of a wipe
☝ 1
Avatar
Awesome, thank you. I'll take a look.
Avatar
do u have an extraction ?
5:33 AM
look at the databases and it should be the same as the obliterated file date/time
Avatar
@Magnet Forensics Can someone give me clarification as to how Magnet Wordlist Generator orders its output wordlists? Is it searching the case in specific locations and ordering its output strings accordingly, or is it just outputting everything and anything in no particular order? i.e., are the first 100 words more likely to be relevant than the last 100?
Avatar
RubberDucky 7/24/2019 11:33 AM
@Magnet Forensics do you guys sell network licences ? aka licences that aren't tied to a single dongle? Thanks
Avatar
Has anybody served a search warrant to Slack before?
Avatar
tupp3rwar3z 7/24/2019 1:25 PM
sup all
1:25 PM
anyone know what these mean in a group chat?
Avatar
@tupp3rwar3z Not in front of computer.. and maybe cellebrite could give a better answer.. but i think i saw that it was "read" or "delivered" or something like that. Can't remember if i saw it when you mouseover the icon or export in excel and see all columns names ...
1:34 PM
It catched my attention this week as some messages had the icons and other one didn't
Avatar
tupp3rwar3z 7/24/2019 1:34 PM
yeah same, just curious why theres no substance
1:35 PM
I thought it would be read/delivered too, but wouldn't that appear on every message then?
1:35 PM
its only on a few
Avatar
Its a type of flag.. could verify tomorrow.
1:36 PM
The Excel export has a lot more columns.. or check the source database ... im sure someone will answer us quickly .. lol
Avatar
tupp3rwar3z 7/24/2019 1:39 PM
haha yeah ill do a little more digging just figured I'd fire it off in here first
1:39 PM
thanks @Kramnias
Avatar
And why those messages are empty is a great question haha .. Maybe virtual analyser could help.
Avatar
I always assumed it was the opposite and it meant that those messages had not been read, hence the closed envelope (edited)
Avatar
MrMacca (Allan Mc) 7/25/2019 5:14 AM
Has anyone seen this type of USB device before?
Avatar
looks like a SD card adapter
Avatar
MrMacca (Allan Mc) 7/25/2019 5:15 AM
I removed the MicroSD card inside, and it contains images of a young girl and indecent images.
5:16 AM
but we can't find any information relating to the device.
Avatar
any side pictures ?
Avatar
MrMacca (Allan Mc) 7/25/2019 5:16 AM
Of the girl?
Avatar
the usb device
5:17 AM
definitely dont be sharing those materials here
Avatar
MrMacca (Allan Mc) 7/25/2019 5:17 AM
Yeah that's not going to happen.
5:18 AM
Yeah got some of the sides
5:18 AM
Does seem to be a Camera and Mic hole
5:19 AM
could be a hidden cam
5:19 AM
did any of the content appear to be ?
Avatar
MrMacca (Allan Mc) 7/25/2019 5:21 AM
5:22 AM
Yeah definitely hidden in my opinion
Avatar
MrMacca (Allan Mc) 7/25/2019 5:23 AM
Yeah that looks more along the lines. It's been reported anyhow as we don't deal with such material.
Avatar
Forensic@tor 7/25/2019 5:24 AM
Mini Dv U9 Usb Flash Drive U Disk Hd Hidden Camera Motion Detection 1280x960 , Find Complete Details about Mini Dv U9 Usb Flash Drive U Disk Hd Hidden Camera Motion Detection 1280x960,Mini Usb Camera U9,Hd Mini Dv U9,Mini U-disk Digital Video Camera from Video Camera Supplier...
Avatar
MrMacca (Allan Mc) 7/25/2019 5:24 AM
That's the one. Nice one
Avatar
Forensic@tor 7/25/2019 5:25 AM
@MrMacca (Allan Mc) for purposes of documentation if needed. I GTS with the terms "usb flash drive camera" and viewed the images.
Avatar
MrMacca (Allan Mc) 7/25/2019 5:26 AM
Thanks @Forensic@tor
Avatar
I have an external hard drive that contains android backup. I used the generic android profile and I couldnt get anything other than pictures/videos. The file extension is EBK
5:43 AM
Anyone have experience decoding these files ?
5:44 AM
Avatar
Andrew Rathbun 7/25/2019 5:53 AM
Good teamwork on that one too guys
Avatar
Andrew Rathbun 7/25/2019 9:15 AM
Just checked the release notes of AXIOM 3.4, good on @Magnet Forensics for including the officer wellness features, that's really cool. Thankfully I don't do CP related stuff anymore but I'm still looking forward to checking out that feature.
Avatar
forensicmike @Magnet 7/25/2019 9:21 AM
Agreed. Great message from Jad as well on the subject of officer wellness https://www.youtube.com/watch?v=2u83Jbr3qYg
Avatar
pathsofglory 7/25/2019 10:06 AM
Hi all, I have an ex01 image of a drive encrypted by mcafee’s end point encryption software, full disk. I tried to process it in Magnet, which prompts for the decryption key, but it fails.
10:07 AM
Ive confirmed that the decryption key is valid with another tool, but I prefer to do this exam in Magnet Axiom
10:08 AM
Please @ me with replies
Avatar
I received the location history in CSV file back from Google. It has the times in UTC and lat/long info. Does anyone have an easy way to batch convert all the UTC times to PST and batch convert the lat/long to physical addresses?
Avatar
deepdive4n6 7/25/2019 11:42 AM
I'll msg ya...
11:45 AM
@renfantino Excel conversion for UTC to PST is easy enough, then reverse geocoding service like: https://www.geocod.io/upload/ to convert the Lat/Long to address.
Batch or bulk geocode a csv, tsv, or Excel spreadsheet of US and Canadian addresses, cities, or zip codes into latitude/longitude and reverse geocode latitude/longitude into addresses
Avatar
Forensic@tor 7/25/2019 1:51 PM
Had a depo today. I was explaining file deletions by comparing it to a book. I told the attorney that deleting a file was like removing the table of contents enrtry. He stared at me all glossy-eye and said, "I get it, it like footprints in the sand and someone comes along and brushes away part of them". After my long awkward pause, I respond with, "no sir, you don't get it at all!"
😆 4
Avatar
On a personal level I have a S8 Samsung that says moisture detected and keeps beeping when i try to charge it. (yep it’s my device) It has not had moisture in it and this has been going on 5 days. I can't only wireless charge it. Its driving my bananas !!! today I placed the USB C port under my inspection camera, used 99% alcohol, polished it up with a tooth brush and it still popping up the USB moisture detection. I'm at a loss
2:37 PM
I've also cleared the USB cache in the app
2:37 PM
Anyone deal with this ?
Avatar
deepdive4n6 7/25/2019 2:44 PM
I've had luck when that happens switching to a different cable. Very annoying.
Avatar
@deepdive4n6 thanks, i've tried 4-5 different cables, only way try and get it to charge with a cable is to restart with the cable in and it will trick it and charge for awhile until i unplug and plug it back in and it will do the same thing over and over. UGH !!
Avatar
Hit it! Only mostly kidding...I've fixed two of my phones with that solution. One had a bootloop thanks to crud stuck in the crack around the power button. Second was a zenfone 3 where the camera stopped focusing. Sharp smack and it'd start focusing again. Till the next time, anyways. Known problem lol...
🥁 1
Avatar
forensicmike @Magnet 7/25/2019 3:19 PM
can vouch for percussive maintenance, sometimes it just works
💯 1
Avatar
@DCSO I have had that 🤬 problem on my S8+. Now i never let it drop to 0%, and wireless charge it if it happens. I had the moisture problem and also the blinking charge indicator problem were if you unplug the charger while the cable was still connected to the phone the USB setting would enter a loop. USB also tough for some reason that the wall charger I plugged was a device to be charge by my phone.. resulting in severe overheating. Solution for me was : go to setting / applications/ (3 dots) / show system applications/ then look for USBsetting. Go inside storage , then delete cache or delete data. I haven't had any problems for months with charging. Wishing you good luck.
4:44 PM
There is a lot of videos on Samsung s8 moisture problems with all kind of solutions. Maybe the solution I used worked or they push a software update that fixed it, but I assume you are up to date with your software so I guess they haven't fix it.
👍 1
Avatar
anyone know how I can re-apply an E01 to a drive
12:10 AM
to make a copy of the original in a sense
Avatar
nevermind, it's under the "file" and "restore" menu of xways
12:24 AM
little bit hidden
Avatar
well that didn't work
Avatar
Mount the e01 and DD?
2:56 AM
@Sudo
Avatar
I guess that's what I'll have to do
2:56 AM
what a faff
Avatar
There is a way to do it in xwf
2:57 AM
I'm sure there is just don't remember right now and not at my desk
3:04 AM
this isn't normal...
3:06 AM
I open the NTFS basic data, C:
3:06 AM
and I see [orphan[, [root] and [unallocated space]
3:07 AM
is that just what FTK does? can't say I've ever used it for examinations
3:08 AM
yeah OK I guess this is just what FTK does, how bizarre
Avatar
how bizarre, how bizarre
3:45 AM
@Sudo Don't know about FTK but with xmount under Linux you get a .dd emulation from EWF files, so with that you could dd your E01 back to a disk. But I agree, it's making me crazy, every time I look around, it's in my face
Avatar
yeahhhhh
3:52 AM
just annoying
3:52 AM
should be simple
3:52 AM
probably gonna write my own dam software for it 😂
Avatar
X-ways did do it
4:35 AM
on about the 3th try
Avatar
Does anyone know how to convert from AFF4 to E01 ?
5:35 AM
processed AFF4 image using Axiom and mounted it via arsenal
5:35 AM
It can not locate the source
Avatar
@Kramnias thanks for the advice i'll double check it again, still on day 6 of moisture indication !!! i'm due for a new phone but would of liked to sell this one with out this issue. Yes I'm uptodate to the point i searched for updates that where forced last night and it pushed a minor security update. No go
Avatar
MrMacca (Allan Mc) 7/26/2019 8:05 AM
@Sudo I think to make a clone of an E01 to an actual Drive, you goto TOOLS > Disk Tools ? CLone DIsk (or CTRL and D) Then you click the blue icon to choose the E01, and then you click the DIsk icon of Destination and choose the drive you want to clone to.
Avatar
it's under "file"
10:46 AM
oddly!
Avatar
@Jay528 throw it in x-ways and make a new image (e01) of it
Avatar
Leaving my agency in 2 weeks, had to return my xways dongle
Avatar
you can try the same, but on a linux then
Avatar
Thank you
Avatar
Question for everyone still on here. We’ve a case right now and the detective just obtained a mobile device. It belonged to one of a potential witness. The detective stated that the witness let the suspect borrow the phone and believing use before and during the crime. The detective wanted to get the phone dump at the original state. Then he wants to connect it to the WiFi. He believed the suspect use social media app to communicate and it would see if all the chat messages can load into that device. The detective wanted to get a phone dump after the connection of WiFi. Should I even attempt the original state or even thinking about after WiFi. Is there and legal way to prove the suspect use the phone?
Avatar
4n6_Guy(Kevin Salhoff) 7/26/2019 8:03 PM
Wouldn't it just be easier to get a search warrant for the messages? So much of your evidence would be stomped on if you connect that phone to the WiFi. I would strongly recommend not connecting the phone to the WiFi. You could also run into title 3 issues depending on the communications that were sent to the phone while connected.
Avatar
MD5/VFC_Aaron D 7/27/2019 1:50 PM
If you get a dump of the device you should have the cloud tokens and from there you could use a cloud analyzer tool to access all the messages? I know in the UK at the moment it’s a bit of a grey area and the forces tend to go through special operations to see if they can do it. It’s a safer way than breaking forensic code and connecting a device to a network.
Avatar
Thanks
Avatar
Jack of Trades 7/30/2019 5:19 AM
Does anyone know how you might restore a windows defender quarantine file in order to do analysis off the original pc? We pulled it from an infected computer and think that it's legit, but want to ensure it is and see if we can figure out why it got snatched up.
Avatar
anyone know about the mail transfer protocol LMTP
5:24 AM
local mail transfer prot
5:25 AM
not sure on that Jack, I'd imagine there might be some sort of storage location for quarantined files ?
Avatar
CyberViking 7/30/2019 5:41 AM
Hey important question does anyone here have a contact email address for "CEOP" Child Exploitation and Online Protection command in the UK
Avatar
Jack of Trades 7/30/2019 5:44 AM
@Sudo I know where they go, yes. However I presume a quarantined file will go back to whatever folder it came from, but if I put it on a new install of windows and create the folder, I'm not sure if it'll go back or not. I'll let you know if it doesn't work I guess :)
Avatar
I'd imagine it would Jack yeah
5:55 AM
I'd say if it were to go back it'd depend on how it sees the path
5:56 AM
if it just requires the path to be the same, or if it takes more into account like the SID and what have you
Avatar
why dont u boot the forensic image (if there is one) and click restore on the record
Avatar
Jack of Trades 7/30/2019 5:58 AM
@Jay528 shoot that's a good idea
5:58 AM
We'll have to take one, but yes we can
Avatar
Where should I send the 2.99 consulting fee to ?
6:08 AM
😋
Avatar
Anyone Familiar with TIB collections?
Avatar
Anyone familiar with Arconis?
Avatar
What's up regarding Acronis ?
11:19 AM
you need to collect or restore ?
11:20 AM
purchase the software and click restore
11:20 AM
bam
11:20 AM
work is done
Avatar
i have some Files that were collected by Acronis, I have the containers but no clue on how to blow them out so they can be ingested with a program we run on my end
11:21 AM
it is not like blowing out through Xways or Encase
Avatar
you'll need to purchase the software
Avatar
I assume you cant restore using trial version?
Avatar
that's how i did it previously
11:22 AM
i would buy it and charge the client
11:22 AM
if it doesnt work, its coming out of your year end bonus
11:22 AM
😃
11:23 AM
thanks
Avatar
@nbh2493 you don't need to buy. The free version should allow you to mount the backups (right click,on the file, select acronis, mount)
Avatar
has anyone ever reconstructed a RAID of Apple drives (from around 2004)
3:24 AM
seems like it's just RAID 1 (edited)
3:25 AM
but doesn't seem to detect a filesystem, so that's cool
Avatar
@Sudo try R-Studio
Avatar
is it free or?
Avatar
Trial - but if that shows that it can work, its not expensive https://www.r-studio.com (edited)
R-TT offers disk recovery software and hard drive data recovery tools. Network and RAID support.
Avatar
cool, thanks
3:49 AM
I've just carved for stuff at the mo, seems to have worked
3:49 AM
but it does seem a bit strange
Avatar
strange how?
Avatar
well it's mostly identical on each drive
3:51 AM
but then also isn't
3:52 AM
I jump to an arbitrary sector and the data is the same
3:52 AM
but one drive imaged at 6GB compressed, one at 8
Avatar
Could be Raid-10 or something similar
Avatar
it's probably some sort of Apple fusion raid drive thing
Avatar
Does this look like the source of the drives by any chance? https://en.wikipedia.org/wiki/Xserve_RAID
Xserve RAID is a mass-storage device that was offered by Apple Inc. Xserve RAID held up to 14 hot-swappable Ultra-ATA hard drives, and had a capacity of 10.5 TB when filled with 750 GB modules. Xserve RAID supported RAID levels of 0, 0+1, 1, 3 and 5 in hardware, hybrid RAID l...
Avatar
no they came out of an old mac tower
Avatar
I have an iPhone 5 which I am trying to examine. I powered on this device and found a welcome message "Hello". At first I thought it might have been the first time this device has been turned on since an iOS udated however I can't seem to progress further without connecting the device to Wi-Fi. Can anyone tell me what's the difference between a wiped device or a simple updated device?
Avatar
Hello indicates the device has been reset as that is the setup procedure for an idevice
Avatar
Well this also happens when an iPhone has been udated.
1:50 AM
updated*
1:51 AM
So not necessarily wiped - however in this situation I think it has been wiped.
Avatar
Deleted User 8/1/2019 3:38 AM
If the select language promt comes after the hello, then it is a wiped device
Avatar
Ah - well after hello I was prompted to connect to WiFi which I can't skip.
Avatar
Morning Everyone! What free tools are you guys using to wipe and sanitize SSD drives?
Avatar
Morning @goalguy - You can do it on EnCase if you use that? (edited)
5:55 AM
Anyone got a good keyword list for drug terms?
Avatar
I've got an old DEA one that someone shared a while back? Not sure how applicable it is to the UK market
Avatar
@3X3 Don't have EnCase unfortunately.
5:58 AM
@OllieD I would be interested in that list
Avatar
I have a rather skeleton one that I tend to use, however, it's worth a look through your one if you'd be willing to send @OllieD 😃
Avatar
Have a gander at this
👍 1
Avatar
kmacdonald1565 8/1/2019 5:59 AM
Hello everyone, i am helping out someone regarding a probation search. they came across these blue key looking devices. i am guessing a hardware lock of some sort, but have no idea. Has anyone ever seen this?
5:59 AM
5:59 AM
isolated on one "key"
5:59 AM
my tineye and google image searches failed me
Avatar
They look like authentication keys, I think the likes of Facebook allow you to use them to login now too. Let me try to find the one I'm thinking of just as a similar reference.
6:03 AM
(Just an educated guess)
Avatar
They don't look like Yubikey or Titan designs to me
Avatar
I'd agree, was just looking for a similar sort of concept.
Avatar
kmacdonald1565 8/1/2019 6:04 AM
they have too many pins, looks more proprietary
👍 1
Avatar
Could it possibly be something associated with AT&T?
Avatar
kmacdonald1565 8/1/2019 6:05 AM
i am not directly connected to the case, but i saw that ID...and suppose it is a possibility (edited)
6:07 AM
someone says its a door key, and their apartment uses similar ones (different color but looks the same)
Avatar
That'd make more sense than my initial guess, since it's on a set of car and misc keys 😛
Avatar
Andrew Rathbun 8/1/2019 6:28 AM
@goalguy Eraser is a good free tool
Avatar
totally looks like a usb key for sure
Avatar
Anyone able to parse and extract information form office FSD cache files? I’ve tried the scripts on https://github.com/rickvg/office-cachefiles but it creates invalid docx files.
Avatar
Does anyone have any equipment setup thoughts on this, I am wanting to have a network air-gapped forensic computer but I need to be able to transfer data files to a networked server. A couple thoughts I had was having a second network computer close by that is connected with a crossover ethernet for transferring the files to the 2nd computer's RAID which is shared on the network. Second thought, was some sort of NAS attached to the forensic by USB and then it is networked.
11:56 AM
I dunno, anyone have any ideas? What is everyone else's setup for transferring data to a network storage. (I am really trying to limit putting onto a USB drive or something and swapping between computers, lazy i guess😅
Avatar
Any particular reason you want it to be air-gapped?
Avatar
IT restrictions and group policies mainly, I need to retain full control. And if i connect it I am forced to follow that.
Avatar
Makes sense. Not sure if this is an option for you but I (with the approval and help of IT) created a separate domain for my forensic workstations and servers. Still connected to our main network and have a trust set up with our main domain but I control all policies and access.
12:03 PM
If that is not possible then I think the NAS idea could work
Avatar
Hmm yeah, that might not be a bad idea long term. One problem is we have a very convoluted IT system here and I fear that would be a major undertaking to get that all figured out and approved.
Avatar
That is the biggest draw back. I am very lucky that my IT team is small and right outside my office. It also helps that I was a part of that team before taking over the forensics.
Avatar
Saylorman001 8/1/2019 5:03 PM
Making a Databse with Access and SQL for laboratory management., Dont wont to post it directly, but if you feel this is something you may have a use for to assist in case management, please send me a PM. 😃 thanks
👌 1
👍 1
Avatar
4n6_Guy(Kevin Salhoff) 8/1/2019 5:10 PM
@Saylorman001 if you haven't finished developing it yet, I built something similar for our lab but found that having a MySQL backend instead of Access was much better. It seems to handle multiple connections better. This may have been due to my programming. It's been managing our cases for the better part of 8-10 years now.
👌 1
Avatar
Would be awesome if one or both of you could share👍🏼
Avatar
Andrew Rathbun 8/1/2019 5:48 PM
@Saylorman001 #programming_reverse-engineering is probably your best bet
Avatar
Saylorman001 8/1/2019 5:48 PM
copy
Avatar
Saylorman001 8/1/2019 8:46 PM
I did a sql backend, just used Access for its cosmetics appeal to the novice users as a front end. happy to discuss in PM, just didnt want to to take up page space with a bunch of examples 😃
Avatar
@.karate. We found that tool did not work properly on anything but very simple documents. We parsed all the FSDs manually on one of our ongoing cases. It was worth the effort as the original documents were not only gone but deltas to the documents when they still existed were important. Please PM and let us know about the urgency, as we might automate what we did and release a surgical tool for only this purpose.
👍 3
Avatar
@Arsenal Awesome. I’ll send a pm 💎
Avatar
@Saylorman001 & @4n6_Guy(Kevin Salhoff) I would be interested if you guys are willing to share 😃
Avatar
Totally random, but for the forensic guys that use a cellphone to take pictures of serial numbers /sim cards etc. I use an app by Falcon in Motion LLC called Mag Light. You can zoom in on objects and add light etc and it works much better than a regular iPhone camera.
12:47 PM
‎"Why we like it: It’s incredibly handy! There will always be a time where the menu writing is too small or the room is just too dark – this magnifying app will be just what you need." - appsmitten.com "This free app comes in handy when you find yourself in a dimly l...
Avatar
Andrew Rathbun 8/5/2019 8:01 AM
FYI, Tableau Firmware Update 7.29 just released with a new firmware release for the TD2u. First update since November 2017. https://tableau.guidancesoftware.com/index.php?pageid=firmware&releaseID=0&view=overview for more information
😆 2
Avatar
Deleted User 8/5/2019 4:20 PM
My computer is pretty old and really doesnt do well with running a VM. What would you guys suggest for building a PC that can handle DFIR labs,etc. (edited)
Avatar
Andrew Rathbun 8/5/2019 4:21 PM
@Deleted User gaming PC build is a good start with some minor modifications. A gaming PC with a writeblocker is basically a forensic workstation
4:22 PM
Google Talino workstations and toy around with customizing one of those. Those are the highest end and ridiculously priced but they are badass machines
4:23 PM
HP Z840 is what I have. Google that too and see what the optional specs are
Avatar
Deleted User 8/5/2019 4:45 PM
It will definately be an investment to get my own work station. I'd like to learn a bit more before I get it.
Avatar
Andrew Rathbun 8/5/2019 4:48 PM
PCPartPicker is what you'll want to use to spec out a build. Feel free to build one on there and share it here
4:49 PM
Also check out r/computerforensics for any build threads. Or forensic focus
Avatar
Deleted User 8/5/2019 4:52 PM
I have one specifically for gaming that I am building right now. It is in the $800 range. To be honest I dont have enough experience to know what I need. I have been interested in cybersecurity for awhile but only just recently took a plunge into digital forensics. M community college class's start next year but before I get to that I want to gain some experience first. I also have been really close with my county's sheriff and he is starting up an operation to catch child predators. Hopfully I can somehow gain some insight as to how I can help with that.
Avatar
Andrew Rathbun 8/5/2019 4:53 PM
See if you can job shadow someone in your county or state who does digital forensics for LE and see what build they have
4:53 PM
I'd recommend seeing what others have via forums or in real life before splurging. It will cost a lot more than $800 for anything respectable.
Avatar
Deleted User 8/5/2019 4:55 PM
Do you have any recommendations on which agency's have such programs etc. I am in Northern Illinois.
Avatar
Andrew Rathbun 8/5/2019 5:21 PM
@Deleted User hmm I'm in Michigan so I'm not sure. Check with any University PD's or just ask your sheriff which agencies have labs. Most don't because training and equipment is so expensive so there likely won't be many choices
5:21 PM
Are you by Northwestern?
Avatar
Deleted User 8/5/2019 5:29 PM
Not really. Im just outside of chicago in the suburban areas.
Avatar
@Deleted User Mostly make sure the VM is not running from a mechanical drive, and if your gaming build and DFIR one are two separate machines, I would strongly recommend high core count for the latter: an AMD Ryzen or ThreadRipper for example will be slower per core so that's not ideal for gaming, but you get so many more cores for the same price and that makes a huge difference for virtualization and other DFIR workloads
Avatar
Deleted User 8/6/2019 2:17 AM
hold on let me show you my gaming build
2:18 AM
i want something cheap but good so
Avatar
@Deleted User And if you think you might get into password cracking later, make sure you get a case capable of very high airflow
2:20 AM
@Deleted User For gaming I think that CPU is too slow and its 8 cores won't be all used
2:21 AM
Better to go with a faster (as in 4.5GHz for example) 4C Intel one, in the case of gaming
Avatar
Deleted User 8/6/2019 2:22 AM
well i'd have to find a new board so if you got any CPU and MOBO suggestions let me know
Avatar
Definitely upgrade from the 1700 CPU. Based on pcpartpicker pricing, you can get a 2700 or a 2700x for less. If you can stretch to a 3700x, you'll see a huge improvement relative to the 1700
2:27 AM
But as @Kr pointed out, a higher speed 4C model may fit better
2:27 AM
Depends on predominant use case
Avatar
Deleted User 8/6/2019 2:29 AM
This is just for a gaming rig for me I am not even thinking about a forensic workstation because I dont know anything about DFIR yet to even begin.
Avatar
I think the 3700X is a good balance between single core and multicore performance
2:30 AM
But even the 2700x will be a good step up from the 1700
👍 2
Avatar
Around the $280 price of the CPU you chose, according to PCPartPicker there are: i7-8700 at $295 i7-6700K at $275 K means can be overclocked
Avatar
Another option if your budget is stretched would be to get a used workstation and upgrade that. That's what I've done with my homelab for learning DFIR / networking, i've got an old but still decent Dell PowerEdge server for a few hundred with a Octo core and 32 gigs of ram. If you're going new though I'd defo go the AMD route. On the used market there are decent workstations available, or servers if you fancied playing with a level 1 hypervisor and keeping this separate from your main desktop. (edited)
Avatar
Missed that you wanted this to be a gaming rig too, my options aren't going to be great for that but would suit DFIR / VM Labs on the cheap. as they come with plenty of cores and ram, clock speed isn't the greatest though. If you are thinking about used servers look at towers as they generally run a lot quieter and use less power than some of their rack counter parts. It's a great way of getting some experience with enterprise equipment but depends entirely on your usecase. A half decent used workstation would probably suit both roles, but again will not complete with something newer on games.
2:45 AM
Model:Precision Tower 5810. This workstation is fully tested and working and includes a fresh installation of Windows 10 Professional. RAM:32GB DDR4 @ 2133Mhz. 1TB 3.5’’ Hard Drive. The unit in the pictures is what you will be receiving.
Avatar
Andrew Rathbun 8/6/2019 6:05 AM
@Deleted User https://www.forensicfocus.com/Forums/viewforum/f=4/ I'm sure has a thread on DFIR builds
Forums Digital Forensics, Computer Forensic Training, eDiscovery
6:06 AM
And yep, there's a sticky. Check it out
Avatar
MrMacca (Allan Mc) 8/6/2019 6:20 AM
Afternoon, does anyone know of a tool that I can throw an E01 of a Mac , and it will pull out information quickjly relating to install date, Operating system version and so on?
Avatar
Install bootcamp 😃
6:24 AM
Blacklight
6:24 AM
Recon should work as well but ive never triedi t
Avatar
MrMacca (Allan Mc) 8/6/2019 6:25 AM
I have blacklight, but either i'm being a numpty or looking in the wrong place.
Avatar
not sure if there is a registry viewer for mac
6:27 AM
just export out the registry and check the record for install date
Avatar
@MrMacca (Allan Mc) there are plists which hold some of this info, eg OS, user account info etc. I actually thought Blacklight showed this somewhere but I don't have a copy to check now
Avatar
o shoot, misread
6:35 AM
i thought viewing e01 of a mac
6:35 AM
my bad
6:35 AM
e01 on a mac
6:35 AM
brain freeze
Avatar
Otherwise you can manually check the plists, systemversion.plist, com.apple.loginwindow.plist - this is going back a few versions in mac OS though so not sure if something has changed, depending on what OS version you have
6:36 AM
@Jay528 its an E01 of a mac, I think!
Avatar
MrMacca (Allan Mc) 8/6/2019 6:37 AM
Yeah it is an E01 of a Mac 😄
6:38 AM
Ive got the E01 loading into blacv light now so once that has finished I'll take a deeper look
Avatar
triage it by selecting on what you want
Avatar
suggestions on free software to open and view emails from DBX containers?
7:35 AM
seems AXIOM does not parse them
Avatar
how about a reliable and affordable software ?
7:36 AM
Aid4Mail
7:36 AM
It has helped me convert and collect webmail via imap
7:36 AM
used it for 14 years
7:37 AM
or as long as i remember
Avatar
I will check it out, thanks!
Avatar
@MrMacca (Allan Mc) you can absolutely throw it into BL to get that info. to save time make sure you deselect everything. Another option is depending on the filesystem you can mount it with your tool of preference and look at the plist which contains that info
Avatar
Andrew Rathbun 8/6/2019 9:36 AM
This review looks at the Q2 2019 and lifetime hard drive failure rates of the data drive models currently in operation in our data centers.
👍 5
Avatar
Andrew Rathbun 8/6/2019 9:44 AM
I love how transparent they are with these HDD stats over the past few years. Really cool to watch play out
👍 2
Avatar
Yeah backblaze are great for that
Avatar
transparency? preposterous
Avatar
@Jay528 Aid4Mail worked out well, thanks 👍
💯 2
Avatar
glad to hear !
10:30 AM
i hope they give me a referral fee
😂 2
👍 2
Avatar
kmacdonald1565 8/8/2019 8:40 AM
@forensicmike @Magnet that is a good one...gotta love when people dont care
👌 1
Avatar
Forensic@tor 8/8/2019 11:05 AM
Gizmodo: Report: Apple Has Activated Software Locks on iPhone Batteries to Discourage Third-Party Repairs. https://gizmodo.com/report-apple-has-activated-software-locks-on-iphone-ba-1837053225
Apple has activated a “dormant software lock” that effectively kneecaps third-party replacement batteries on some newer models of iPhone, according to a report from iFixit on Wednesday, by disabling access to battery health data unless the replacement has been installed b...
Avatar
deepdive4n6 8/8/2019 11:10 AM
FFS, Apple.
Avatar
Andrew Rathbun 8/8/2019 11:11 AM
They know what's best!
Avatar
deepdive4n6 8/8/2019 11:12 AM
Yet you can replace the brakes on your 6,000lb SUV with no one looking over your shoulder... (edited)
Avatar
Yet. I wrote a short paper on how John Deere is preventing farmers from fixing their own tractors by locking down diagnostic information. There is a tractor hacking initiative (https://tractorhacking.github.io/) seeking to help farmers take back their...tractors.
👍 1
Avatar
Andrew Rathbun 8/8/2019 12:24 PM
Wow, who would've thought. How silly
Avatar
Imagine if a John Deere tractor is involved with an accident and police are unable to get information out of it without having to wait for a John Deere tech.
Avatar
deepdive4n6 8/8/2019 12:27 PM
Yeah, that whole John Deere one is stupid. Farmers aren't buying tractors anymore; they're buying a licensing agreement for the right to use John Deere's product.
Avatar
MD5/VFC_Aaron D 8/9/2019 12:29 AM
Hey, I was wondering if anyone can help. I'm using Z3X Easy JTAG to read a UFS chip, I read one fine this morning and a regular eMMC chip earlier this afternoon and it was working all fine. But now I am getting the error: Can't open link, Code: -507, Reason: UIC: Link initialization fail We've had loads of trouble previously with East JTAG, for some reason it doesn't like to initialize for us. We have no issue with UFi box or other similar tools but since out Dedi Prog developed issues we've had to go to using Easy JTAG. Also, is there away of using Easy JTAG offline? Our box will only detect by the software as long as there is an internet connection
Avatar
right to repair really needs to get through already...
1:46 AM
getting ridiculous now
Avatar
Would right to repair apply to leased/rented products though? Because as @deepdive4n6 pointed out with the John Deere example, farmers don't actually own the tractor itself. Extreme example, but I could see other device manufacturers looking to employ similar tactics
Avatar
I'd say that probably the only real reason that the tractors aren't owned by the farmer is equally the fault of lack of right to repair and this "as a service" culture
2:40 AM
two pieces of the same puzzle, you know?
2:40 AM
like the games I buy on Steam, I effectively have a "license" to play them, but do I physically own them
2:41 AM
even more so now as developers go for this "as a service" with recurring pay-to-play fees and so on, when in the past you bought a physical disc that you can do anything with
Avatar
Andrew Rathbun 8/9/2019 4:09 AM
@MD5/VFC_Aaron D may want to try #jtag-isp-chip-off-flasherbox
Avatar
MD5/VFC_Aaron D 8/9/2019 4:17 AM
I have but haven’t got a reply yet 😂
Avatar
When you examine a PS4 can you locate a Unique ID that I could use to say the PlayStation was the device that made a threat on social media. From search warrants I have a UUID and I am trying to find that specific device.
Avatar
oof, sounds a bit of a stretch maybe
2:13 AM
I've never known a console to give up much useful info
2:13 AM
where's the UUID from
Avatar
Andrew Rathbun 8/12/2019 6:11 AM
Happy Monday all
Avatar
At least it's Tuesday now
Avatar
Andrew Rathbun 8/13/2019 10:06 AM
Starting to image 41 devices (desktops, laptops, phones etc). Let the fun begin!
Avatar
Due by the end of the day.
😂 1
Avatar
Andrew Rathbun 8/13/2019 10:37 AM
Hahaha RIP me
Avatar
@Andrew Rathbun got those devices done yet? LOL (edited)
😂 5
Avatar
Isn't it govt work?
1:15 PM
Take your time
💯 1
Avatar
Forensic@tor 8/13/2019 2:10 PM
@Andrew Rathbun. No sweat ...2-3 more coming in tomorrow.
Avatar
@MSAB hi MSAB folks, is there plans to expand Proton to other apps?
Avatar
Absolutely! We are working on trying to get Photon to work for more apps than WhatsApp and there are some exciting things which will be coming in the next release iirc 😃 Should be a month away tops, currently not in the office so unable to confirm but keep your eyes on the release notes!
👍 3
Avatar
yeah I meant Photon 😄
12:17 AM
cool, I like it so was just curious
Avatar
MrMacca (Allan Mc) 8/14/2019 5:16 AM
Can anyone recommend a good Plist viewer for windows, which can take in a EncryptedRoot.plist.wipekey and allow me to extract the Hex of the PassphraseWrappedKEKStruct?
5:16 AM
I've decrypted the EncryptedRoot.plist.wipekey
Avatar
Thought the group might be interested in this : What is Paged Out!? Paged Out! is a new experimental (one article == one page) free magazine about programming (especially programming tricks!), hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics.
Avatar
love the cover
🇸 4
🇦 4
🇲 4
🇪 4
😌 4
5:52 AM
seems cool, thanks DF
Avatar
Does anyone know if it is possible to do Phrase searching or word searching for someone using Cellebrite Reader?
Avatar
@Sudo : most welcome
Avatar
@nbh2493 you can use the all project search. Deep searching stay within PA
Avatar
Does anyone have any suggestions on how to trace a BT MAC address back to a specific vehicle? I’m working an auto theft ring, and one of the suspect’s phones was examined and those results showed a prior Bluetooth connection to a UConnect system, which is a Sirus XM service on Chrysler products, which are some of the preferred vehicles for this group to steal. I have the Bluetooth MAC, but I have struck out so far with Chrysler, UConnect, and Panasonic. Does anyone have any ideas about how I can trace the Bluetooth MAC to a particular infotainment system in a particular vehicle?
4:57 PM
I'm not sure if you will get enough info to help but I would start there.
Avatar
Thank you. I have called Panasonic (the manufacturer) but they don’t seem to know who can give me the info I need, which would be the serial number of the head unit. Then maybe I could get Chrysler to tell me the VIN of the car into which that head unit was installed. At least, that’s the idea.
Avatar
Andrew Rathbun 8/15/2019 6:34 PM
@VolSarge might not be a bad idea to shoot an email over to the folks at Berla. Maybe someone might have knowledge of something you've not thought of
6:37 PM
Also, maybe a search warrant to Chrysler? When you say you struck out with them, did they straight up tell you if you served legal process for what you're looking for that they would be unable to provide it? I did that all the time as a detective. I cold called companies and point blank asked if I draft paper for XYZ, will you be able to provide what I want? One time I got the info without a warrant lol. Former cop on the other side of the phone 👌
Avatar
They straight up told me that they had no idea where to get the information I wanted, or even who to put me in contact with that might be able to get me that information.
Avatar
Andrew Rathbun 8/15/2019 6:48 PM
Might not be a bad idea to try again and hope to get someone else who can leave no stone unturned and get back to you when they know for sure and can sell it to you that that info doesn't exist
Avatar
@Andrew Rathbun Will do. Thank you.
Avatar
Andrew Rathbun 8/15/2019 6:49 PM
If it's that important to your case then I'd want some proof of due diligence on their part but that's just me.
6:50 PM
And I always documented very well if a company was unable to provide me with what I hoped to acquire
💯 1
6:50 PM
CYA and all that
6:52 PM
But we also had the expectation to investigate until the wheels fall off and explore every possible lead even for something as petty as stolen laundry. So that's just what I'm used to
6:54 PM
Where I worked before we were always trying to make sure 5 years from now our reports weren't getting picked over by the media for holes much like what is happening right now in the media at that very same place so it was just what we did. Your mileage may vary
Avatar
Same here. This is a multi state, multi million dollar auto theft ring. Got to get it right the first time.
Avatar
Forensic@tor 8/15/2019 9:30 PM
@VolSarge I would ask to speak with their LE liason unit or legal compliance department. Usually more apt to know what you need.
👌 2
Avatar
@VolSarge Maybe worth to ask mobile OS vendors if by any chance they collect info about Bluetooth connections (e.g. Google SensorVault) in order to find the rightful users of that Chrysler?
Avatar
@pathsofglory did you find a solution for your mcafee's encryption drive with axiom ? we have the same problem here.
Avatar
@Kr Good idea, but there aren’t any rightful users. The cars are all new and taken off the lot.
😕 1
Avatar
pathsofglory 8/16/2019 4:27 AM
@Dam I did not unfortunately. We had to proceed with a logical image
4:29 AM
Using enCase I did get a physical acquisition of the logical drive on the hdd, which allowed limited carving (edited)
Avatar
Andrew Rathbun 8/16/2019 4:38 AM
@Deleted User if you don't get an answer here, hit up Brett Shavers on Twitter or Eric Zimmerman on Twitter and they will likely help
Avatar
@pathsofglory we just tried with axiom 3.4 and it works.
Avatar
pathsofglory 8/16/2019 5:02 AM
You got a decrypted physical acquisition as an e01 from Axiom?
Avatar
Well we did an acquisition with xways and tried to put the password in axiom but it says that the password is wrong. With axiom 3.4 it was working
5:45 AM
Anyone got any idea what these are?
5:45 AM
Avatar
DC/DC converter🤔
Avatar
kmacdonald1565 8/16/2019 5:55 AM
i am going a cheap tens machine
5:55 AM
muscle stimulator
5:55 AM
they usually have a audio jack though
5:56 AM
the pads have a similar snap connection to the bottom of whats on this device (edited)
5:57 AM
total guess by the way
Avatar
Guys, much obliged... confirmed as a muscle stimulator by my own recently electrocuted forearm. 😂👍
😂 6
⛈ 4
Avatar
kmacdonald1565 8/16/2019 6:35 AM
lol
Avatar
kmacdonald1565 8/16/2019 6:44 AM
just a heads up, i couldnt find anything that small on the usual shopping sources
6:44 AM
@ChangoMunk
Avatar
Anyone know of any free programs/apps/other to analyze Call Detail Records (CDR)? I am trying to help do a couple frequency reports about how many times this number called etc.
2:16 PM
I am pretty sure you can do similar things with pivot tables in excel just wasn't sure if there was something someone already made that is setup for that type of thing
Avatar
Andrew Rathbun 8/16/2019 2:17 PM
Have you tried Perphound by NW3C?
Avatar
🤦 Thank you, I remembered there was something. But when i searched NW3C I couldn't find any tools. Trying to download now, hopefully it is what I need.
Avatar
forensicmike @Magnet 8/17/2019 6:16 AM
6:16 AM
SD cards—everybody’s got a few, but nobody thinks much about them. That’s a testament to how well they work. But performance always matters, and microSD Express promises to make microSD cards much faster.
Avatar
@forensicmike @Magnet congrats on the new Magnet tag 🙂
Avatar
Andrew Rathbun 8/17/2019 7:23 AM
@forensicmike @Magnet yes congratulations! 😄
Avatar
Dr. Kaan Gündüz 8/17/2019 12:38 PM
@Andrew Rathbun Is Perphound for US law enforcement only?
Avatar
Andrew Rathbun 8/17/2019 12:39 PM
@Dr. Kaan Gündüz I believe so but might wanna check with @NW3C
Avatar
Dr. Kaan Gündüz 8/17/2019 12:51 PM
it's not me, they blocked the whole country, so it is ok, not personal 🙂 (never got the email) (edited)
Avatar
@Dr. Kaan Gündüz send me your email in dm and I can send a copy of perhound over
Avatar
CyberViking 8/18/2019 12:59 PM
hey iv been doing some security research and came across a Critical level vulnerability in a US law enforcement system trough passive means, Does anyone know where I could go trough to report this disclosure to them?? im in UK area so not ust to to the US based Cyber Sec connections... any ideas
Avatar
Andrew Rathbun 8/18/2019 1:03 PM
US-CERT provides secure means for constituents and partners to report incidents, phishing attempts, malware, and vulnerabilities. If you would like to submit a report, please select the appropriate method from below: Incident Reporting Form for reporting incidents to US-CERT...
1:03 PM
Try that?
Avatar
CyberViking 8/18/2019 1:06 PM
yeah il give them ago wasnt sure since its Law enforcement and not a .gov domain
1:06 PM
thanks
Avatar
You could also email or call the agency
👆 2
Avatar
CyberViking 8/18/2019 4:22 PM
Yeah I am going to give CERT a call, a unnamed individual gave me a poc at the office so going to go that way with it, thanks for the tips all 🙂
Avatar
@ChangoMunk mini roombas
Avatar
Andrew Rathbun 8/19/2019 6:54 AM
Happy Monday all
Avatar
It is Monday... not sure about happy lol
Avatar
Andrew Rathbun 8/19/2019 7:33 AM
Happy is a relative term lol
👍 1
Avatar
forensicmike @Magnet 8/19/2019 8:31 AM
@CLB-Paul @Andrew Rathbun Thanks guys. just getting setup here!
💯 2
Avatar
Survivable Monday, everyone
Avatar
Andrew Rathbun 8/20/2019 10:45 AM
Has anyone who uses TD2u units ever have it where you image a device and then check your destination HDD and the image is nonexistent and the HDD can't be recognized?
10:46 AM
I've been having that a lot lately and I think it's a faulty TD2u. I just imaged 4 devices onto a HDD (hindsight being 20/20 I should've checked each image after I did them) and the HDD won't recognize so the 4 images are nonexistent. Thankfully, it's 4 240GB SSDs so it's not the end of the world. Maybe 90 minutes of imaging total. But just curious if anyone else has experienced this. Latest firmware (June 2019)
10:47 AM
Mind you, formatting was done with the TD2u unit itself
10:49 AM
I can't prove it's a faulty TD2u right now, but I hope to when I have time hopefully later this week to reenact what I did today and see if I can duplicate the issue
Avatar
Good to have a catch-up chat with my old friend Vinny Parmar . Vinny holds the position Higher Digital Forensics personnel responsible as th...
Avatar
sooooooo we have a 30k page pdf search warrant return from facebook. No bookmarks or hyperlinks that I can find. Is there an easy button to break these up somewhere? Or just Ctrl+F until the end of days?
3:27 PM
I searched and saw a reference to NDCAC dot social, I've requested access but nada yet
Avatar
Andrew Rathbun 8/20/2019 3:56 PM
Wow, that's crazy. I thought they provided a bunch of HTML pages of someone's profile and messages, etc
Avatar
@Andrew Rathbun I believe you can ask for it or download it that way, this person didn't do that and I believe the download links have since expired. Anyhow, dot social works.
👌 1
Avatar
pretty soon we're all gonna be the photographing stuff unit, or the "sorry can't get into it" unit
👆 1
Avatar
Anyone try this yet: https://tsurugi-linux.org/
Welcome to TSURUGI Linux world the new DFIR open source distribution to perform your digital forensics analysis and for educational pourposes
Avatar
Based on ubuntu 16LTS, so a bit dated. Like SIFT Workstation. I'll have a download
Avatar
Adam Cervellone 8/21/2019 5:22 AM
Good morning all! Has anyone had issues with @Magnet Forensics AXIOM displaying SQLite databases and plist files from iOS devices?
Avatar
forensicmike @Magnet 8/21/2019 5:24 AM
DM'ed
Avatar
Is the image you're working with an encrypted backup?
Avatar
Adam Cervellone 8/21/2019 5:26 AM
Yes, from Physical Analyzer. Still not prompting for the password but I have been adding the 1234 password from Cellebrite into the passwords section of Process
Avatar
Not really a forensic question ... In appropriate situations LE can have a carrier locate a phone. However recently it came to our attention that carriers can not ping iphones. Has anyone served paper on Apple to successfully to compensate for this?
Avatar
@DMG What carrier claimed they can't ping an iPhone?
Avatar
so far T-mobile / Verizon
7:22 AM
and its not that they cant ping the phone ... accuracy is >1000 yards of varience
7:26 AM
According to the Techs when accessing the 911 system the location is reported accurately to the systems however when it doesnt involve a 911 call ping results are reported with the minimum accuracy
Avatar
I've experienced this outwith work, whereby a phone was stolen from a family member, and mobile providers can't get an absolutely accurate location from an iPhone. I always thought it was due to the phone changing which mobile data mast it connects to as you're moving around. (edit: I was pretty vague there, that's kind of what I was getting at, the fact of moving around and not being able to locate due to changing data masts, therefore not having 3 in a cell to triangulate the location.) (edited)
Avatar
Cell phone carriers don't have access to the GPS on the phone. They use trilateration from cell towers to find the location. The phone type shouldn't matter.
7:32 AM
My guess is that they don't have at least three towers.
7:32 AM
At least that's my understanding.
Avatar
My Sgt. was at a presentation yesterday at which the techs from these companys are saying apple has tech in there phone which precludes them from obtaining accuracy <1000 meters (he corrected me from my statement about yards above) (edited)
7:35 AM
They are saying they dont have the same issue with samsung phones etc
Avatar
@DMG That's new to me. I'm curious as to why that would be the case. There is no issue getting the tower information with iPhones. Maybe something measuring the distance to the tower.
Avatar
he just added they said "Apple is required to comply with E-911, but they arent under any obligations to allow anyone else to ping them"
7:46 AM
They dont allow the carriers access to accurate pings due to "privacy" (edited)
Avatar
@DMG That's the case for every phone so that's why I'm confused. The phone type shouldn't matter. Things change constantly though so who knows.
Avatar
@Joe Schmoe I don’t know just passing along info I heard and looking for a solution to a problem
Avatar
deepdive4n6 8/21/2019 8:48 AM
Do we have anyone from Griffeye in here?
Avatar
Joe 🍿🍺 8/21/2019 9:29 AM
A Win7 computer shows that Chrome has been logged into a specific Gmail account on several occasions different days. However, the computer’s owner were away on some of the days and the computer was at home. It could be the computer was left powered and still logged on and the person was using Gmail on another device, then it synced to the computer because it was logged in. Or, the computer was powered off but when it is later booted up and logged in, previous logins to the Gmail account were synced to, maybe if the browser itself were logged in to same Google account. I am not sure about the second option though. Any other ideas? Dont count in remote access to the computer, not an option here :) Anyway, it’s hard to be sure about what creates timestamps when sync of devices might be involved..
Avatar
Mr. Eddie Vedder from Accounting 8/21/2019 10:03 AM
Anyone know how to either load more than 1 million rows into Excel or a program to remove dupes from a text document. Doing some work on stripping the NSRL hash set for UFED. I've used NSRL Stripper to export only MD5's. I then attempted to load into Excel to use remove duplicates feature but got the 1 million rows limit. EDIT: @chrisforensic pointed me towards EmEditor. It will do what I need. (edited)
Avatar
Joe 🍿🍺 8/21/2019 10:25 AM
Was thinking Notepad++ or UltraEdit, good you solved it.
Avatar
Mr. Eddie Vedder from Accounting 8/21/2019 10:33 AM
I never thought to see if Notepad++ would remove dupes. It always crashed when loading the full NSRL set. EMEditor will work for other stuff I've got. FEX won't ingest the NSRL hash set as it is. I'd have to strip out MD5's or SHA1's and add some ##comments## at the top. I previously been using trial version of 010 Editor since Notepad++ would crash loading even the stripped sets. (edited)
Avatar
I'm trying to interpret some safari browsing history and I'm stuck with one of the URL components. It's a bing image search record from an iOS backup. I can follow the links and find images consistent with the nature of the case however when I try to replicate the mechanics of the search "kittens meowing" in this case, my URL results are different. Specifically, my suspect history does NOT contain a mediaurl="*.jpg" tag inside the URL. Every method I've tried, computer, iPhone, private and not private include the mediaurl tag.
11:59 AM
My hypothesis is that an image search was conducted and displayed images were "clicked on" to be viewed, however my tests yield different URL results than my suspect evidence. It is worth noting that I am testing in august of 2019 and my suspect history is from 2018... so it's entirely possible it has just updated since. Is there a place I can go to test legacy versions of safari?
11:59 AM
Or I suppose safari wouldnt be the culprit if the engine has changed, bing would.
Avatar
randomaccess 8/22/2019 12:23 AM
@whee30 it could be a combo of both. I did some research on Google searches and some of the stuff in that no longer applies because either google or the browsers updated and the parameters or activity is now different
12:24 AM
But I think finding legacy versions of iOS software may be tricky to identify.
Avatar
Deleted User 8/22/2019 5:31 AM
@Mr. Eddie Vedder from Accounting I would try https://www.emeditor.com/ - have been useful for me when open huge databases when others crashes 🙂
Avatar
Andrew Rathbun 8/22/2019 5:48 AM
@Magnet Forensics has there ever been discussion about adding a Pause button to AXIOM Process? Often times, I'm throwing 5-10TB at a case at a time and it'd be nice to have a pause button in case I needed to do something else quick on my workstation for another case. I very often have cases processing for 48+ hours so that's a long time to go without using my workstation for another case. Just an idea!
✅ 3
Avatar
forensicsnewbie 8/22/2019 5:50 AM
Anyone use SiForce faraday bags made by silicon forensics? They seem reasonably priced with power banks included. Or any other suggestions for buying bulk bags and power?
Avatar
forensicmike @Magnet 8/22/2019 6:15 AM
@Andrew Rathbun Interesting idea... Sounds like it has been talked about in the past - also in the context of being able to resume from a crash/failure, but not recently.
Avatar
Andrew Rathbun 8/22/2019 6:16 AM
It may not be useful for everyone but in my case I throw a ton of evidence all at once at it and it takes quite a while to process while using all 32 threads I can spare
Avatar
Andy Thorpe 8/22/2019 8:09 AM
Hey @Andrew Rathbun there is a feature request in for this already, if you want to drop an email into Support@magnetforensics.com I can add your details to the list and let you know when this gets added to a future release!
Avatar
Andrew Rathbun 8/22/2019 8:10 AM
@Andy Thorpe doing so now, thanks
Avatar
Andy Thorpe 8/22/2019 8:11 AM
👌
Avatar
Andrew Rathbun 8/22/2019 8:12 AM
Sent
Avatar
Andrew Rathbun 8/22/2019 9:35 AM
Google's Android branding is evolving, in hopes of feeling more accessible to a global audience.
9:36 AM
Looks like Google couldn't think of a Q dessert and is now calling Android by numbers like iOS
Avatar
Here is md5 list that you can import into cellebrite to knock off some of the newer app data pngs for ios and android devices. Essentially what I have been doing is going into cellebrite and then unchecking all the images, once they are all unchecked I then go down into the hash sets and click on this one. Once this is done loading up with all the known files in the hashset click checked to make sure they are all checked. Once this is done you will then have to go back into your main image tab and click sort by unchecked which will eliminate all the known checked hashes.
💯 4
10:03 AM
Avatar
CyberViking 8/22/2019 10:12 AM
hey anyone here ever use this brand or model in the field https://www.plantronics.com/hk/en/product/voyager-legend my company is having a few of us look at items for surveillance work for wondering if there any good ??
Unsurpassed audio and comfort, voice commands, smart sensors, and incoming caller announce.
Avatar
Andrew Rathbun 8/22/2019 10:22 AM
@CyberViking https://www.reddit.com/r/sales/comments/62fijq/how_to_pick_the_right_headset/ has some comments about that headset, ctrl+f "legend" for the comments. Sounds like high praise
29 votes and 54 comments so far on Reddit
Avatar
CyberViking 8/22/2019 10:50 AM
yeah not grate reviews there, pitty they seem really low vis and have a solid gov rating in the US, taught they would be good for investigations
Avatar
@CyberViking What about something like Apple Airpods?
Avatar
CyberViking 8/22/2019 12:52 PM
thats what i said, but the manager we have seems to have a hard on for this brand (edited)
Avatar
Andrew Rathbun 8/22/2019 3:07 PM
Welcome to all those from NCFI in Alabama, thanks for joining!
Avatar
Deleted User 8/22/2019 7:44 PM
well
7:45 PM
I had a meeting with my sheriff today about things and I brought up my interest in digital forensics and now I am going to be working with the detectives who handle child exploitation.
Avatar
I am not sure which channel my question should be in, whether if it's this channel or DFIR, but I'll fire away. We have a faraday box and we're trying to come up with a process of validating and verifying that it works at it should be. What's the best process?
11:52 PM
Should we find a phone, install a faraday box tester application and run it, then place it in faraday box to show that it is working as it should be? Wouldn't we also have to validate that software we found from app store?
Avatar
@Pacman I would expect that UKAS will ask if the tester App you choose has been validated or not yes (edited)
Avatar
That is what I thought too - I was told an application called Mission darkness was recommended by Control F. @OllieD are you able to provide an input or ideas as to how we can validate this app?
Avatar
Excellent question! Put it in a known working Faraday box and make sure it records that it's been isolated (and hope that UKAS don't notice the cyclic dependancy? 😂 )
1:47 AM
In all seriousness, that's not a question I've really considered previously. I'd reach out to Mission Darkness themselves to ask them what validation they've done on their own app, which could give you a headstart. You could also see if you can identify a second validation app/tool that you can compare against
1:48 AM
Full disclosure: I was pleased with how the Mission Darkness app functioned from my brief testing, as it correctly identified that our Ramsey box worked and some older Faraday bags did not. I have not thoroughly tested or validated the app myself. Proceed with caution before incorporating an app like that into your validation processes for ISO purposes!
👍 1
Avatar
Thanks for your input - I have a slightly better idea on what we can do now!
Avatar
Andrew Rathbun 8/23/2019 6:37 AM
Does anyone else use Kiteworks for secure file transfer?
6:38 AM
Just curious if there's a known file limit. I've done <10GB files multiple times but I tried a 30GB file last night twice and the session timed out before the upload could complete. Not a huge deal but just curious if anyone else knew the answer. I won't lose sleep either way
Avatar
deepdive4n6 8/23/2019 2:17 PM
Anyone have a reasonable way to view HEIC images on Windows 10?
Avatar
deepdive4n6 8/23/2019 2:37 PM
Windows store HEIF plugin - doesn't work. Copytrans... sure, but looking for something a bit more "official" and without licensing issues since ultimate end-user is Defense/Prosecutor.
Avatar
@deepdive4n6 in the windows store check out HEIC Image Viewer Support Converter. It's free to view images, pay if you want to covert
2:55 PM
Irfanview is supposed to work too if you have the plugins installed but can never get it to show all images. Errors on a lot of them.
Avatar
deepdive4n6 8/23/2019 2:55 PM
HEIC Image Viewer Support Converter... as opposed to HEIF Image Extensions, roger.
2:56 PM
I will try that, thanks.
Avatar
randomaccess 8/23/2019 7:17 PM
@deepdive4n6 I converted them with image majik successfully. Even preserves exif now
Avatar
The Mission Darkness is not a bad idea. From an iso17025 perspective I would have thought the 'repeatability' of test requirements would be difficult to achieve. It would require samples of every faraday cage, case and bag out there and assessment the full range of different makes and models and that includes devices with internal and external aerials, clamp-shell mobiles, OS/versions and so on. Not suggesting checking the baby or bathwater out on this one, but [1] examiner's cannot load app on to suspect target device, [2] any SOP pertaining the apps usage relevant to a specific make/model and OS of mobile and so on that were subjected to repeatable testing would need to be specified for each single mobile and that could take along time. For instance have a look at Wikipedia and all the Android versions - https://en.wikipedia.org/wiki/Android_version_history
The version history of the Android mobile operating system began with the public release of the Android beta on November 5, 2007. The first commercial version, Android 1.0, was released on September 23, 2008. Android is continually developed by Google and the Open Handset All...
Avatar
Does anybody know any freeware software for imaging drives?
Avatar
FTK Imager
6:43 AM
AccessData provides digital forensics software solutions for law enforcement and government agencies, including the Forensic Toolkit (FTK) Product.
Avatar
Ah, I wasn't sure if it was part of the FTK suite
Avatar
Guymager through Linux
👆 1
6:44 AM
no it is a separate download.
Avatar
Ah, FTK would work great, I didn't know it was freeware. Thanks
Avatar
I think you give Accessdata your email and they send you a link to download it.
6:44 AM
FTK isn't free, just the imager
Avatar
Yeah, that's what I meant
Avatar
That link should take you right to the download link
Avatar
Andrew Rathbun 8/25/2019 6:47 AM
Magnet Acquire is another one
magnetforensics_alt 1
7:51 AM
4.2.1 is the latest version, FYI
7:51 AM
for FTK Imager
Avatar
I forgot all about Acquire.
Avatar
Does anyone know whether the FitBit application contains much useful data? GPS, SMS etc?
Avatar
Can anyone tell me why after a restart the os won’t get past this screen now.
8:11 AM
@Legis have you tried rebooting into safe mode and seeing if you get the same issue?
Avatar
Right now I’m running a memory diagnostic from the bios. I have not tried rebooting in safe mode tho. I have reset cmos ram and hdd because after first it wouldn’t even let me in the bios. @Andrew Rathbun
Avatar
Andrew Rathbun 8/26/2019 8:34 AM
@Rossko Hasher by Eric Zimmerman can hash out all files and output the hashes into Excel rather than doing it one by one via HashCalc
Avatar
What is everyone using for mbox viewers? Anyone got a top one they recommend?
Avatar
@Jobbins FTK 7 should do the trick 😂
Avatar
Andrew Rathbun 8/26/2019 10:36 AM
Download Windows MBox Viewer for free. Windows eml and mbox viewer. Windows Mbox Viewer. Gain access to mbox archives or single eml messages.
Avatar
Andrew Rathbun 8/26/2019 10:52 AM
I used to use that all the time when dealing with mbox files from Google SW productions
Avatar
Hi, quick question for you. I have a HP Elite Book with a M2 128GB memory. When I use my write bloker, I cannot see the drive. (I tried other connector but didn't work) I turn on the laptop.and this is what I see
5:32 PM
any advice?
Avatar
Andrew Rathbun 8/26/2019 5:59 PM
That appears to be like secure startup for HP laptops. Interesting
Avatar
Had drive boot password
6:26 PM
PC-3000 could possibly remove it
Avatar
yep, It's weird that I cannot see the M2 memory on my PC. Ill try on a mac or with linux tomorrow.
Avatar
I had a similar thing with an HDD and had to remove it to image it
Avatar
pc 3000 ... humm ... we have this at work
Avatar
If that is what it is, then the password is in the firmware is keeping it from loading until password is entered.
6:28 PM
I think
6:28 PM
I took the class on PC-3000, but was a C- student at best
6:28 PM
Lol
Avatar
Well I remove the M2 memory but I cannot read it. I tried a lot of connector and 2 different PC.
6:29 PM
lol
6:29 PM
Pc3000 is not easy ...
Avatar
I had one a long time ago which needed a proprietary connector, but that screen says it is probably password protected.
6:31 PM
If you have service with Ace for PC-3000 they will help. Just send a ticket in and they can even teamview your pc.
Avatar
This PC is from a big firm in Canada. So it's mostly encrypted!
6:32 PM
Thanks
Avatar
Ahhhh
6:47 PM
Good luck
Avatar
Are you connecting it to your computer via an adapter... in that case it might be the wrong adapter, had a similar problem with a HP laptop where my M.2 adapter didnt support NVMe
Avatar
I used a Tableau adaptor. In fact I try the 3 adaptor that I have.
Avatar
MrMacca (Allan Mc) 8/27/2019 3:47 AM
@merantos on the latest firmware too?
Avatar
anybody have a method for reconditioning batteries (laptop, phone, etc.)? We get dead batteries in devices all the time. I was wondering if it would be worth it to try and recondition them occasionally to get the device to work. Any thoughts
Avatar
Anyone have any experience in understanding filename format for picture content from Verizon?
9:23 AM
Here is the filename: 017EECDB4DA90000B4300002-attachment-1-MFDC6964.jpg
9:23 AM
Also this one: 0A7BAA4868720000EB400002-attachment-1-2016042995021154.jpg
9:24 AM
FYI all the meta is stripped from the file.
Avatar
Forensic@tor 8/27/2019 9:46 AM
@mitchlang I can take a picture and send it to from my Verizon acct if necessary.
Avatar
Yeah, if you can get this same naming format that would be an excellent test.
Avatar
Forensic@tor 8/27/2019 9:47 AM
Was it a text or email?
Avatar
Specifically i am looking at decoding the 2016042995021154 part of the message as the year I am looking at an event in 2016
9:47 AM
txt
Avatar
Forensic@tor 8/27/2019 9:50 AM
@mitchlang I sent you a DM
9:54 AM
9:54 AM
Avatar
@jw The FitBit app can contain location history, as well as records of the activities a user was performing... So I wold say it does have useful data 🙂
Avatar
Is it possible to get a physical extraction from any of the FitBit wearables?
Avatar
anyone gotten a phys off of a Samsnug J3, if so, what method?
4:45 AM
@Sudo
4:46 AM
it was a J320fn
4:46 AM
But I think that 4PC will do that model now
4:47 AM
J320FN is what it is
4:47 AM
with a "Spreadtrum SC9830"
4:47 AM
CPU
4:48 AM
you flashed TWRP?
4:49 AM
with odin
Avatar
@stephenie
4:54 AM
4:56 AM
I have read the very good article. It is worth noting for law enforcement, particularly when investigating, is that device seizure require identification of the feature provided by the phone.
4:56 AM
Anonymity at first instance can be hard to trace when feature phones have this feature enabled
4:58 AM
4:58 AM
Flash messages are Class 0 message neither predefined to be stored on handset or SIM.
4:59 AM
Consequently, the message (subject to any restriction on phone) can be seen and read even where handset is password enabled.
5:01 AM
Equally, handset that can be connected to laptop with SMS API software can control content sent OTA/VOIP.
Avatar
@Colman Hello ! You mentioned an article, could you share it? Thank!
Avatar
@Jobbins Regarding Mbox viewers so far autopsy forensics freeware has been the best for us. It index the Mbox so you can seach it and its really slick. Can't beat free !! https://www.sleuthkit.org/autopsy/
Autopsy is an open source graphical interface to The Sleuth Kit and other digital forensics tools.
Avatar
What's the standalone json -> CSV program you guys using?
Avatar
@Colman that your own collection of phones there...... lol
😂 2
👍 1
Avatar
If a computer gets infected by malware what’s the best thing to do? I’ve heard nuking it and rebuilding might not be the best option but it’s the safest
Avatar
Best thing to do is follow whatever policy is in place by your organization at work and use your judgement on your own stuff. @Tyføøn
Avatar
Thank you!
Avatar
@Cellebrite is there any reason that Cellebrite Reader won't work on machines with internet? It seems to not work as it asks for "activation"
Avatar
Forensic@tor 8/30/2019 5:48 AM
@Sudo Just have them say no or they can create a free account.
Avatar
heatherDFIR 8/30/2019 6:05 AM
I always just say no and it works fine. No need to activate.
Avatar
yeah, seems to be an issue with that specific reader
6:07 AM
but could only get the issue to replicate on internet enabled machines
6:08 AM
worked around it by giving them a standalone reader
Avatar
anyone have any experience with console ports
7:50 AM
specifically the VGA style one to RJ45 (the system has the VGA style out, not the cisco style RJ45 to VGA style)
Avatar
Does anyone have a waiver form they could share for possibly destructive cell phone extractions?
Avatar
any reason why i can't format a 64GB thumb drive to FAT32 using "Format /FS:FAT32 D:"?
Avatar
All set. Thank you @CLB_joshhickman1
Avatar
@ds275 windows set a limit to 32gb for fat32 partitions.
Avatar
How far back can a physical extraction find?
Avatar
Andrew Rathbun 8/30/2019 3:53 PM
@Tyføøn it'll give you everything on the device
Avatar
It’s not just for deleted items?
Avatar
Andrew Rathbun 8/30/2019 3:58 PM
@Tyføøn it'll get you everything on the device and in some instances allow you to virtualize the device in PA
Avatar
What about a logical extraction? (edited)
Avatar
Andrew Rathbun 8/30/2019 6:29 PM
@Tyføøn hopefully that answered your questions
Avatar
@Andrew Rathbun yes it did thanks again
👌 1
Avatar
How do u keep up with your projects or make schedule to study ethical hacking skills? Idk where to start.
Avatar
You have to have a plan, and the discipline to stick to the plan.
Avatar
Andrew Rathbun 8/31/2019 6:31 AM
No one plans to fail. They fail to plan!
6:31 AM
That and the 7 P's. Proper prior planning prevents piss poor performance.
🅿 3
🕖 2
Avatar
What encryption software are people running in their labs?
Avatar
Andrew Rathbun 8/31/2019 7:21 AM
We use Veracrypt to encrypt partitions on our MacBook Pro's where we store our evidence. We're not allowed to take evidence home with us that's stored in the clear. We also use Aegis Padlock Drives for external HDD's that are encrypted.
7:21 AM
Hopefully that's what you're asking about @I_Am_NoOne and not like Passware, Hashcat, and other encryption defeating software
Avatar
@Andrew Rathbun that's exactly what I was talking about. I've looked at VeraCrypt but just wanted other opinions. Do you ever have problems or find it limits you at all?
Avatar
Andrew Rathbun 8/31/2019 7:26 AM
Not that I've noticed. My only limit is the MacBook I inherited, I wish the encrypted partition was a few 100gb bigger and the OS unencrypted partition was a lot smaller lol
7:26 AM
I am honestly not sure if I'm able to expand the partition on the backend but frankly I should look into it because lately I'm doing lots of evidence shuffling to make room
Avatar
@Andrew Rathbun sounds fun, cheers for tips.
Avatar
Andrew Rathbun 8/31/2019 7:29 AM
Good luck!
Avatar
@Andrew Rathbun VeraCrypt on a MBP partition? Mind if I ask why you chose that over FileVault?
Avatar
Andrew Rathbun 8/31/2019 9:03 AM
Sorry, boot camp W10
9:04 AM
Should've specified that earlier
Avatar
Ahhhh that makes sense
Avatar
Anyone got any advice on how best to package up a phone that's been in salt water for a few days while it gets transported to a lab?
Avatar
@I_Am_NoOne We also use veracrypt right now but are thinking about moving to bitlocker at some point as that's where the rest of our force is heading. Can't see it changing any time soon though
11:52 PM
Can't comment on transport @Aneesh96 but sticking it in an ultrasonic bath is probably the best idea. Can't say it's an area of expertise of mine though. I'll check with our guy who did the training when he's in
Avatar
Is anyone aware of an expert witness whose area of expertise is impact damage? We have several devices damaged or broken and the investigators were wondering if there is someone who could demonstrate or report their opinion on how they were damaged. Its a long shot I know but you never know!!
Avatar
@K23 I hear keeping it in salt water while in transport so it doesn't mix with air is the best thing to do. Is this similar to what your guy says?
Avatar
Leave it in the fluid that it's in, otherwise the minerals dry around the components, so yeah you're spot on the money there. Then into an ultrasonic bath @Aneesh96 is what I was just informed! (edited)
Avatar
Yeah we advocate keeping it in whatever its in where possible, can't honestly say I have ever had to deal with something like that though (edited)
3:57 AM
Assume its still a pretty rare occurance?
3:58 AM
@K23 whats the significance of the ultrasonic bath?
Avatar
From what i've been told it's to dry out the components / clean out the crap that's on the device so that it can be examined and powered on safely. Think our process is take it out the container that the phone arrives, so in this case out of the salt water and put it into the ultrasonic bath to give it a good clean before taking it out and continuing with the examination. We did a test on an iPhone in fairly liquid that was left powered on in the bowl until it stopped responding, stuck it in the bath and after a session in there it started working fine. Really not an expert in that area though and it's not something we see often (edited)
Avatar
Awesome, good to know
Avatar
@K23 great, thanks for your advice!
Avatar
There's an article on "Forensic analysis of water damaged mobile devices" in the proceedings of DFRWS 2019 USA. We received our printed copy this morning
6:43 AM
@Aneesh96 and @Zhaan, this may be of interest in relation to liquid and impact damaged devices respectively: https://www.dfrws.org/sites/default/files/session-files/pres_damaged_device_forensics.pdf.pdf
6:44 AM
It's just the slides that accompanied a very interesting talk, but could be worth reaching out to VTO Labs, particularly in the impact damage case. Unaware of anyone else conducting research on this
Avatar
@OllieD I shall chase them up and see where it gets me, thanks!
Avatar
@OllieD thanks for sending the presentation across!
Avatar
No problem 🙂
Avatar
Is there a way to set default interface language in Cellebrite Reader? (edited)
Avatar
ThatLukeGuy 9/2/2019 6:08 PM
Sooo.... I messed up and closed a text file that had a randomly generated password in it. I was depending on my password manager to grab it but apparently it did not. Doing a ram capture now to try and recover it. It was the password to a protonmail account I control. Anyone have any ideas? laptop has not been power cycled.
Avatar
@ThatLukeGuy Did you use standard notepad from Windows or Notepad++ perhaps? I'll assume you didn't save the txt file at some point?
Avatar
This might be a noob question but I would really appreciate any help. I have installed Tails on my usb but it showed up this error. How can I fix it?
3:37 AM
Avatar
Apparently an issue caused by the graphics driver, I suggest you install proprietary drivers and disable nouveau's ones: https://askubuntu.com/questions/897627/ubuntu-showing-sched-error-20-on-boot (edited)
I am seeing the below message during boot, preventing my system from running: 19 printk messages dropped [200.119021] nouveau <missing> fifo: sched_error 20[<missing>] How can I...
👍 1
Avatar
ThatLukeGuy 9/3/2019 4:04 AM
@Sockmoth Did not save file. Normal notepad.
Avatar
Thanks for the help! @//
Avatar
Andrew Rathbun 9/3/2019 6:15 AM
Hope everyone in the US has a good holiday weekend! Back to the grind
💯 1
Avatar
just got back also 🙂 schools back, and summer's done 😄
Avatar
Ready to break September’s back and make it humble.
Avatar
Do I risk tampering with HDDs if I simply plug them onto an external HDD reader, and do I need to take any precautions beforehand? (edited)
Avatar
Write blocker?
Avatar
I read a bit about them earlier, but I have no clue how they work yet
6:38 AM
The kernel patch and userspace tools to enable Linux software write blocking - msuhanov/Linux-write-blocker
Let’s say we're using some flavor of Linux and we mount a partition using following command: sudo mount -o ro /dev/sdc1 /mnt The partition is supposed to be read-only so that the OS and user cannot
6:38 AM
Found this
Avatar
Andrew Rathbun 9/3/2019 6:38 AM
If you're dealing with evidence or something that could come back to bite you in the ass for lax procedures, you should use a writeblocker, as @K23 said
Avatar
Alright, I'll dig deeper and try it out then
Avatar
Andrew Rathbun 9/3/2019 6:39 AM
You can use a software writeblocker or hardware writeblocker, whatever you want, but don't assume it works. Trust but verify that it works.
6:39 AM
If a software writeblocker works and is validated, then go ahead and use that
👍 1
6:39 AM
If you have questions on how to test, feel free to ask
Avatar
Sure thing, thanks for the information
Avatar
That last point is key. Verify it works on something unimportant first, especially software ones prior to use in case something isn't properly enabled
💯 2
Avatar
Andrew Rathbun 9/3/2019 6:40 AM
Basically, enable your software writeblocker and try to create a txt document, drag files on there, etc, then unplug and plug back in and see if those files exist on preferably a spare USB drive or something
👍 1
6:40 AM
Then if it works on a throwaway USB, go ahead and use it on your evidence drive or whatever you're working with
Avatar
Got it, thanks
Avatar
Andrew Rathbun 9/3/2019 6:41 AM
If those files persist, find another software writeblocker or another softwriteblocking method! Rinse and repeat until profit
Avatar
MrMacca (Allan Mc) 9/3/2019 7:38 AM
Got a question relating to Data Storage and Backups. What are people using to backup large amounts of Data? We are currently using Acronis, but it just doesn't seem to be performing as good as we were expecting. Do people backup to tapes anymore?
Avatar
Andrew Rathbun 9/3/2019 7:51 AM
@MrMacca (Allan Mc) if you search the server for tape backup, there was some discussion last year about tape backups. That could point out some users who have experience with it
Avatar
MrMacca (Allan Mc) 9/3/2019 7:56 AM
@Andrew Rathbun thanks, I'll have a search. We used to use Yosemite backup, which apart from corrupting itself due to Bit Defender seemed to work well. But we lsot confidence in it. And now they no longer support it, so we opted for Acronis, which at the time seemed to offer everything we wanted.
Avatar
Joe Schmoe 9/3/2019 8:52 AM
@MrMacca (Allan Mc) We use a large Synology NAS for storage and a second one as a backup.
Avatar
Looking to pick up a current mac for mac investigations. We use blacklight for acquisitions etc. Blacklight recommends some serious specs for their computers. min. spec to optimum spec is 2.7 i7 - 3.1 xeon e5 16 RAM - 32 RAM looking at specs I could do a macbook pro at 2.4 i9 and 32 RAM for $3400 vs a iMac pro w 3.2 xeon w and 32 RAM for $5000. Does anyone here use a MBPro with blacklight? Any performance issues? The cheaper cost plus the desk real estate saved makes me want the MBPro but I don't want to waste money and buy something that wont practically work for what I need.
Avatar
@whee30 I frequently use a 2018 15" MBP for investigations. For the most part, BlackLight works - I do find it struggles if you have a case with many devices - I had a case recently with 5 or 6 hard drive images and BL really struggled (opening & closing the cases took a looooong time - so much so that I would be on the phone with the client and I couldn't bring the case up for reference)
👌 1
7:26 PM
My solution for that problem is just to break it up into multiple cases, which isn't so bad
7:27 PM
I will say, I find Mobilyze to be much less optimized than BlackLight - where BlackLight might have some gains from beefier hardware, I think Mobilyze would perform the same
Avatar
Anyone had a look at the INTERPOL guidelines on Digital Forensics labs? The document is dated May 2019 but I've only just been made aware of it. Particularly interested in feedback from lab managers or anyone working within a lab in @Law Enforcement [UK]
Avatar
I'll have a gander cheers Ollie
Avatar
No problem! A quick skim read doesn't seem to propose anything radical, but perhaps useful to have something publicly circulated
Avatar
Question for CaseNotes users...I am having an issue with my CaseNotes where only the first entry is showing. Also if I load a CaseNote file with number of entries completed from another machine it will again only show the first entry. Any ideas? (edited)
Avatar
@ApC I had the same issue with CaseNotes. It would display a small selection of my notes, and if I reloaded the same case, the notes displayed would be different. I ended up extracting my notes manually from the DB, and haven't had a chance to go back and look at it.
Avatar
Statement on the High Court judgement on the use of live facial recognition technology by South Wales Police (posted today by the UK Information Commissioner's Office) https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/09/statement-high-court-judgement-frt-south-wales-police/
An ICO spokesperson said: "We will be reviewing the judgment carefully. We welcome the court’s finding that the police use of Live Facial Recognition (LFR) systems involves the processing of sensitive personal data of members of the public, requiring compliance with the Dat...
Avatar
@Expat4n6 I have recently reformatted my machine and it only briefly sorted the issue. back to square one again now!
Avatar
@OllieD I have read INTERPOL guidelines on Digital Forensics Labs and it's ok; it attempts though to be the master of principles to follow with no real detail. (edited)
Avatar
@ApC I installed on second machine, and used same notes DB files. It worked for a while as well, then the same issue happened.
Avatar
@Colman Yes, quite a high level document
Avatar
@OllieD Agreed. Fair play though for having a go to prepare guidelines..
Avatar
Deleted User 9/4/2019 6:06 AM
@OllieD I've already approached the FSR about this. They are bringing it to the attention of the NPCC for consideration.
Avatar
@Deleted User Ah ok, interesting! I wonder how they will receive it
Avatar
Deleted User 9/5/2019 5:24 AM
@OllieD watch this space!
👍 1
Avatar
RubberDucky 9/5/2019 7:59 AM
our team has some budget to rebuild our lab, does anyone have any recommendations on optimal cpu cores/threads/speeds, disk, ram that would not cause one to bottleneck the rest too much running the popular forensics tools like xways,axiom, plaso, etc? thanks.
Avatar
Deleted User 9/5/2019 8:07 AM
Some tools have different specs - EnCase V6 and lower would handle one CPU core overclocked, and multi-core/hyper-threads tend not to affect the processing time. Others, like Nuix would happily devour as many cores as you can throw at it, and pretty much all the RAM too
8:09 AM
In short though, over-speccing is totally the thing to do, as future proofing is always helpful. Some tools may not be designed for multi-cores, whilst others will. Budget plays a big part of this - as does any lab procedures on assessing hardware suitability (if you have any standards in place)
8:11 AM
For reference, our current builds (soon to be phased out) are i7 5630K (overclocked), 128GB RAM, 1080Ti graphics, SSD primary OS and primary software, and a storage magnetic HDD (4TB+)
8:12 AM
We will be moving to i9, 128GB RAM/192GB RAM, 2080ti, PCIE-SSD OS and Software drives, magnetic storage HDD
8:16 AM
$6k Canadian? I think we are looking towards pushing the envelope and going for i9 9900X if we can. They are £1kGBP per unit (less VAT)
8:16 AM
maybe some haggle room in there too, but we wouldn't get much change from £750-775 I'd imagine
Avatar
RubberDucky 9/5/2019 8:17 AM
I assume usd, ? That was just for the CPU alone
8:18 AM
So we really need to figure out what is best before buying dozens of machines
Avatar
Deleted User 9/5/2019 8:20 AM
You have to consider with the latest intel CPUs the cooling. A lot of the new CPUs have issues with the thermal compound present between the heatspreader and the CPU PCB. In short, they overheat very easily.
Avatar
RubberDucky 9/5/2019 8:20 AM
Ok thanks
Avatar
Deleted User 9/5/2019 8:20 AM
Air conditioned lab, and all-in-one water coolers should suffice
Avatar
RubberDucky 9/5/2019 8:21 AM
Isn't the thermal compound the same in air vs water? Or u mean aftermarket cooling
Avatar
Deleted User 9/5/2019 8:22 AM
the issue is the actual CPU itself - as an end-user you view the CPU as one complete component, but if you heat and prise the silver heatspreader/lid off the CPU die, you will find more thermal paste there - that is the one that is substandard
Avatar
RubberDucky 9/5/2019 8:23 AM
Thanks
Avatar
Deleted User 9/5/2019 8:23 AM
some CPUs are OK, some are very poor, and some are amazing. It is very changeable
8:23 AM
all in the same batch!
Avatar
RubberDucky 9/5/2019 8:27 AM
Thanks
Avatar
Two more social networking sites for mobile apps.
8:28 AM
A Revolutionary anti-censorship decentralized publishing and social platform. Based on the blockchain technology, it runs on a set of computers around the world, not controlled by any single entity. Self-policed by users with good reputation where nobody records your keystrok...
Mastodon is an open source decentralized social network - by the people for the people. Join the federation and take back control of your social media!
Avatar
RubberDucky 9/5/2019 8:28 AM
I forget the model that was proposed but its probably xeon
Avatar
@RubberDucky We have a smattering of different dual Xeon processors in our boxes, mostly Xeon E5-2690 v4's, but also a few Xeon Gold's (6137 iirc). They all have comfortably handled everything we've thrown aat them.
Avatar
RubberDucky 9/5/2019 8:33 AM
Thanks @dfa_adam what other specs are they ?
Avatar
128gb ecc RAM (can't recall speeds), SSD RAIDs (varied sizes), nvme OS drive, nvme or standard ssd data drive, and depending on the generation, a 980/1080/2080 GPU. Started ordering them with dual GPUs for downtime work as hashtopolis agents.
Avatar
RubberDucky 9/5/2019 8:43 AM
Thanks
Avatar
This site contain's cracked and modded android application and games, Android Tips and Tricks etc.
Avatar
Anyone had success recovering data from a TomTom 4fc54a? Store name is a TomTom Start 50.
Avatar
@0x3db If it has a microUSB, i think only with chip off. If it has a mini USB, u can use FTK. Best regards
Avatar
@Karlsson thanks for the heads up 👍 microUSB I'm afraid. At this point I think I'll just document what's visible on the device whilst in a fday box
Avatar
Leaders in Sat Nav Forensics for TomTom, Garmin and Navman
10:59 AM
I always use it for tomtom and it works perfectly
👍 1
10:59 AM
Non destructive
Avatar
anyone got a physical from a samsung a6?
Avatar
Andrew Rathbun 9/6/2019 5:57 PM
have a great weekend all!
🤣 2
Avatar
Anyone have any issue with any forensic software install on windows 10 machine
Avatar
Tried Caine on vm for the first time. Very good user interface. They hve short explanation of wht each tools do in the menu. Useful for beginners.
Avatar
Andrew Rathbun 9/7/2019 5:35 AM
@spoon1997 which software are you having issues with?
5:36 AM
@ned7778 I've not used CAINE yet but I frequent Kali and Paladin. Guymager is one of my favorite imaging programs which is found in Kali and maybe CAINE as well. There is someone who works on @CAINE here, too.
Avatar
@Andrew Rathbun I’m just asking. Cause I’m about getting new workstation with windows 10. Just want to know if anyone have any issue with windows 10 and their forensic software
Avatar
Andrew Rathbun 9/7/2019 5:47 AM
I've been using W10 for almost 4 years (in this line of work) now and I've not had any compatibility issues at all. (edited)
Avatar
Thanks. All I have are windows 7
Avatar
Andrew Rathbun 9/7/2019 5:48 AM
Worst case scenario, you can always just put together a W7 VM
Avatar
forensicmike @Magnet 9/7/2019 6:23 AM
Once in a blue moon I found that having a trusty laptop running Win7 came in handy when it came to USB connectivity for acquisitions
👍 2
Avatar
Andrew Rathbun 9/7/2019 6:28 AM
Now that you mention it, I've had a few rare occasions where Linux saw an external device whereas W10 was giving me fits about it. Just furthers the narrative of having multiple tools to do your job
Avatar
@Sudo Samsung Active ? I believe they where locked to AT&T that made it a pain to aquire because they did'nt want people to buy them and move them to Verizon, T-Mobile etc..
Avatar
@Cellebrite so I was thinking and drinking and it occurred to me what would be an awesome idea would be to have processes in UFED PA. Example. I set a job decoding over night and once it's finished it will export images to location X, videos to location Y and then create a report in location Z. Just a random, mildly tipsy thought.
👍 3
😂 1
Avatar
Andrew Rathbun 9/9/2019 2:20 PM
Isn't that like what Magnet Automate is except for Magnet products, obviously?
👌 1
Avatar
heatherDFIR 9/9/2019 3:20 PM
@Majeeko Let's chat more about this idea. Or email me heather@cellebrite.com
Avatar
MF-cbryant 9/9/2019 5:17 PM
@Andrew Rathbun not just Magnet products, you can use other tools, scripts or utilities in workflows as well. (edited)
Avatar
Andrew Rathbun 9/9/2019 5:48 PM
@MF-cbryant good to know. Had no idea. Thanks for the info
Avatar
Magnet Automate does a similar thing with multiple tools, Nimbus by Black Rainbow also has automation functions. Interesting that Magnet have locked Axiom down so it only works with Automate. Understandable in this competitive market. Not everyone can afford such tools or have small labs that don't warrant them. @heatherDFIR , I'll drop you a DM when I get into the office, like I said it was a random idea I had whilst chatting on the phone page and I didn't really flesh it out before I posted. Rum will do that to a man. 😁
Avatar
Can anyone help me? ... I have a HP Notebook with a chip on the board. When booting the laptop up I'm presented with "Something happened and your PIN isn't available. Click to set up your PIN again". When clicking to set the pin up again, it prompts you to enter the email address password associated with the account, this should then send you a code via email to enter into the laptop (it doesn't) I've tried PC Unlocker to bypass the windows log in screen, that doesn't work either. Any other solutions?
Avatar
MrMacca (Allan Mc) 9/10/2019 1:46 AM
@jw is it a Local account or a Windows Live account? Does PC Unlocker give yout he option to change the password? or does it just reset it?
1:52 AM
Does it also not give you the option to change from Pin login to say the windows user account?
Avatar
It's a local account and it won't even boot into the USB to load PCUnlocker
Avatar
MrMacca (Allan Mc) 9/10/2019 1:52 AM
The E01 image you have, is that decrypted? can you see the oeprating system files?
Avatar
I'm not imaging the device, it's from a family member to fix but I'm having trouble getting past the log in screen
1:54 AM
It gives me no other option other than to enter the code they have sent via email (which doesn't exist weirdly)
Avatar
MrMacca (Allan Mc) 9/10/2019 1:55 AM
Yeah that does sound weird
1:56 AM
Any way of doing a system restore to a previous time period?
1:56 AM
incase a windows update has caused the issue
Avatar
if the disk isn't encrypted, I would go the old fashioned way of replacing sticky keys exe with cmd and either resetting password with net user or creating new account to get in
Avatar
Bear in mind the laptop is only 4 weeks old so can still be taken back to the store. Just thought there may be another way I haven't thought of
1:59 AM
I can get into the BIOS and I've tried PC Unlocker from there but no luck. I can't access anything past the windows splash screen asking me to create a new pin which can't be done as I can't get the pin to verify via email
2:01 AM
2:02 AM
Btw, the email is definitely correct as it doesn't let you get to this stage if you enter the wrong email
Avatar
MrMacca (Allan Mc) 9/10/2019 3:25 AM
What happens when you click the option in the bottom left of the screen you have a photo of?
3:25 AM
regfarding an alternative method
Avatar
Deleted User 9/10/2019 5:16 AM
Anyone knows a simple way to make a bootable virtual image from an image?
5:17 AM
to make it bootable in vmware or virtualbox etc
Avatar
Disk2vhd from Sysinternals
Avatar
Deleted User 9/10/2019 5:19 AM
Thanks 🙂
Avatar
@Deleted User Paladin can also do it.
Avatar
Deleted User 9/10/2019 5:46 AM
👍
Avatar
Anyone have any experience using suricata? Im supposed to configure the IDS so tht it will block certain malicious syntax from executing. Any tips?
Avatar
@Law Enforcement [UK] if anyone has any resources around the copying of discs and digital data and the evidential chain, I could use some help, having an issue with people not understanding hash values and how that demonstrates data integrity
1:04 AM
particularly that you wouldn't exhibit a copy as your own
Avatar
@Sudo We generally make one encrypted master disc / USB and reference that in our SFR. If the officers or CPS want to make copies for their own use there is nothing we can really do about it. If they ask for a second because they have lost it there is a load of forms and questions and they generally find it pretty sharpish. I don't have any resources on it though.
Avatar
but say if you stored digital data, on your server, or wherever
1:26 AM
that digital data will have an exhibit ref
1:26 AM
you wouldn't make a new exhibit ref for a copy of that data to disc
Avatar
It could just be considered a working copy of the same exhbit.
Avatar
yeah that's what I think too
1:32 AM
if anyone has documentation to that effect, would be good, but otherwise thanks for the insight anwyay
Avatar
Pretendigator 9/11/2019 1:33 AM
No documentation available but we operate the same way.
Avatar
working copy of same exhibit?
Avatar
Deleted User 9/11/2019 1:39 AM
For legal purposes we issue a Master (which will be sealed - intention being it is opened in court before the Jury); we also issue at least 1 Working copy (although many disclosure officers request upwards of 4 additional Working copies) which is left unsealed. The data remains the same across both.
1:39 AM
We produce these in a statement, alongside the report/detailed statement.
Avatar
in this scenario, cctv footage has been obtained via USB and uploaded to the storage server, hashed and exhibited
1:42 AM
so a master digital copy
1:43 AM
would you exhibit the disc working copy that's burned for interview / court or whatever
1:43 AM
as a new exhibit
Avatar
Deleted User 9/11/2019 1:43 AM
technically the USB was the master copy I'd argue
1:43 AM
the original is the DVR
Avatar
I would say it's just the vessel for the footage, and the footage is the exhibit
1:43 AM
but this is the discussion we're having
Avatar
Deleted User 9/11/2019 1:44 AM
if the footage can be demonstrated to be the same as when originally seized, not a problem
Avatar
yeah so it's hashed on the USB stick, and hashed on the server, and compared
1:45 AM
a statement is produced as well by the seizing officer
1:45 AM
to say, I seized this footage on this USB and blah blah
Avatar
Deleted User 9/11/2019 1:45 AM
I'd say it is a non-issue. Plus, only a defense team with The Joker at the helm would try to intimate that you had manufactured footage
Avatar
yeah, we're not up against that, more the fear of I guess
1:46 AM
I'm mostly trying to get a picture of how people view digital data and its integrity, and the exhibiting of digital data
1:46 AM
though I think every other place will probably not be using DVDs for storage 😅
Avatar
Deleted User 9/11/2019 1:47 AM
We used to issue evidence on DVDs!
Avatar
We do as above, then on one of our disclosure forms packaged with the sfr, we include that further data is held regarding the exhibits but not attached to the SFR, then it would down for defence to request further disclosure
Avatar
Deleted User 9/11/2019 1:47 AM
we use SANs now
Avatar
futuristic eh
1:47 AM
it's been a nightmare here really
1:47 AM
stuck in 1995
Avatar
Deleted User 9/11/2019 1:47 AM
the biggest issue with us lot, is we overthink things 🙂
Avatar
I'm glad to see that's not a local problem 😇
Avatar
Were still pushing out evidence on DVD's!
Avatar
james when you say as above, you hash it etc and provide "working copy"
1:48 AM
or you exhibit these copies of, cctv, whatever, as "new" exhibits
Avatar
Deleted User 9/11/2019 1:49 AM
as long as the lead forensic officer for the case has the tenacity and conviction to state that the data has not changed and the hash is sufficient proof to meet the test, then you're all good
Avatar
you would think so, but not in the current predicament
1:49 AM
the forensic process, digital practices and so on are being ignored at this time
Avatar
Deleted User 9/11/2019 1:49 AM
not doing 17020?
Avatar
hence why I'm trying to see if there are other places that have "policies" around this
1:50 AM
nope, not currently
Avatar
Deleted User 9/11/2019 1:50 AM
nor us, yet...
Avatar
it'll only happen to us when very specific things happen
1:50 AM
but I don't see it occurring for a while so
Avatar
Deleted User 9/11/2019 1:51 AM
it's an inevitability; we go out on around 12-15 warrants per annum, and they are usually big warrants
Avatar
I'm sure it'll come eventually
1:51 AM
for now it's ride the wave til it does
Avatar
Deleted User 9/11/2019 1:52 AM
in this instance, for a second set of eyes, contact Dave Thorne from Demux Forensics
1:52 AM
he is a DVR/CCTV god
1:52 AM
usually he offers a bit of advice for free
Avatar
will give it a shot, thanks
Avatar
Deleted User 9/11/2019 1:54 AM
my only parting question would be, what would you/your colleagues do differently to avoid this status quo?
1:54 AM
If nothing, then you've likely not done anything wrong
Avatar
honestly, nothing
1:54 AM
we've been doing it the way we do it for years
1:55 AM
it's only kicked off now
Avatar
Deleted User 9/11/2019 1:55 AM
by 'kicked off' what do you mean?
1:55 AM
CPS?
Avatar
yeah, I'll DM
1:59 AM
for anyone else, it's basically the distinction between digital and physical that is the issue and the lack of understanding
Avatar
has anyone ever tried to visualize or graph or "report" a Google takeout json or xml?
Avatar
Josh Brunty 9/11/2019 12:28 PM
If anyone in here from @Cellebrite can contact me offline @ josh.brunty@marshall.edu I’d appreciate it. I’m running into an issue with our purchasing dept. with some language that is in one of the Cellebrite agreements and it’s holding up one of our license purchases. Thanks! (edited)
Avatar
Two years and a ton of government red tape later... I am finally moving forward and I'm currently taking @Cellebrite CMFF course online. I'm so glad my agency finally decided to take a step into the digital forensics arena!
💯 4
💪 1
Avatar
@Sudo can you explain a bit more on what you're trying to do with the Google takeout piece?
Avatar
Does anyone know how to get past the new iOS 12 screen time restrictions code?
Avatar
@Josh Brunty did you get a reply from someone ?
👍 1
Avatar
@MF-cbryant just visualize somehow, turn it into graphing with number of times visited etc
12:03 AM
I'm sure I can figure it out
Avatar
@Sudo are you looking at location history? (edited)
Avatar
web history
12:32 AM
I'm sure I can just script something to bodge a graph out of how many times a unique URL appears
Avatar
@Jack Hmmmm, I’m suspicious this is my 12 yr old son on Discord trying to bypass my settings on his iPhone 🙂
Avatar
@DCSO I have an android 🤔😂
9:16 AM
Also I'm a university student lfmao
👍 1
Avatar
@Jack its a good question though, I have'nt seen it posted before.
Avatar
I know how to get past the other ones. But iOS 12 is awful
Avatar
@Jack as in other meaning below iOS 12 ?
9:37 AM
But that's just because of the restrictions code is easier, like after that they put It in the screen time code
Avatar
Note to Cellebrite Employee's: Your "Quick Scan" for carving images from unallocated space is not "Quick". Quick means that after I hit the button, turn around to do something else in my lab, then turn back around and it's done?? Then I would say, "Wow, that was quick". I turned around 600 times and it still carving. Don't get me wrong, the function is awesome, we just need to rename the function. How about "Kinda faster" scan? Just an idea. (edited)
😂 5
Avatar
Andrew Rathbun 9/12/2019 11:47 AM
Has anyone ever removed evidence from AXIOM Examine's dashboard? I'm removing a 1GB image file and it's taking going on 10 minutes. Just curious if anyone else has had this same experience. I have a couple more I need to do but at this rate I might consider other options
Avatar
Andrew Rathbun 9/12/2019 12:26 PM
Also, I imaged a 256MB USB Flash Drive the other day. What's the smallest storage medium anyone has imaged lately?
Avatar
^^ <128MB
Avatar
What are the professional responsibilities of someone in digital forensics?
Avatar
Andrew Rathbun 9/12/2019 1:34 PM
@Tyføøn identification, acquisition, and analysis of evidence. Maintain and document chain of custody. Paperwork. Training. More paperwork.
Avatar
Thanks!
Avatar
Don't forget general skullduggery.
Avatar
What about ethical and social responsibilities? I’m taking an internship class and the paper I have to do (expectations assignment) wants to know these questions based on what professional role you hope to obtain (edited)
Avatar
Andrew Rathbun 9/12/2019 1:42 PM
I figured this was homework! I was about to say lol
Avatar
Lol I figured I’d ask professionals rather than looking it up online
Avatar
Andrew Rathbun 9/12/2019 1:43 PM
ethically speaking i would say presenting evidence as it was found on scene and being able to provide proof that evidence was not altered from when it was found, acquired, and analyzed
1:43 PM
also, not excluding exculpatory evidence is important
1:43 PM
you can google that term 🙂
Avatar
That’s fine, I’m not looking for anyone to do this paper for me. Minimal descriptions are more than enough
Avatar
Please ignore any of my comments if you are doing homework, Iv'e been working since 5:00 am this morning.
Avatar
Andrew Rathbun 9/12/2019 1:45 PM
social responsibilities? well those who work in LE have a huge impact on society by getting murderers, rapists, pedos off the street
Avatar
I just am looking for an idea what to say in the paper. Yeah that’s a huge impact definitely
1:53 PM
Thanks for the replies, it’s very much appreciated
Avatar
Andrew Rathbun 9/12/2019 1:53 PM
Good luck and if you need a peer review, feel free to send it my way
👌 1
Avatar
@Andrew Rathbun if you have multiple evidence items to remove from the same case you can do them in one shot from the Process menu. It will be a bunch faster than doing each individually.
3:55 PM
If you're having troubles DM me and I'd be happy to help
Avatar
Andrew Rathbun 9/12/2019 4:07 PM
@MF-cbryant I'm talking in Examine when everything is already processed. I had to remove them so I could do it over again due to a crash AXIOM experienced. So I just wanted to start over because I wasn't sure if it crashed in the middle of one of them or not.
Avatar
RubberDucky 9/12/2019 6:17 PM
A question for forensic folks, do you guys have certain tools and their versions your team approves for usage, and when new versions are released you test the new versions and get them approved before being used on cases? Please ping @ me if you are replying to me, thanks!
Avatar
@Expat4n6 mainly web history and search history
Avatar
@Andrew Rathbun I have experienced the same issue. After 23h of axiom trying to remove the evidence file, I finally gave up and I haven't had the time to explore any solutions to the problem yet
Avatar
Anyone know if there is a way to wipe iPhone and iPad without pin
Avatar
Mr. Eddie Vedder from Accounting 9/13/2019 8:34 AM
DFU and restore. It will activation lock the device though
Avatar
@Mr. Eddie Vedder from Accounting I can’t pass the locked screen
8:40 AM
if you are just trying to wipe a device that has contraband or something like that DFU mode and plug into computer. iTunes will prompt device is in DFU and needs to be restored before working. iTunes will grab the newest iOS for that device and install and wipe device. The phone will start at Hello screen and while going through setup should say (edited)
8:44 AM
I do this at my agency when we have a phone to return to teen after they've completed the "sexting" classes. I tell them they've got x amount of time to get my icloud password so I can remove account and wipe phone or I DFU it and you're on your own figuring out the rest but either way I've satisfied my requirements to destroy the contraband. (edited)
Avatar
What's the sdabin9pie on the shared drive?
Avatar
Andrew Rathbun 9/13/2019 2:39 PM
In continuing the series of created Android images, I’d like to announce an Android Pie (9.0) image is now available for download.   Unfortunately, I had to retire the LG Nexus 5X (it topped …
🤙 1
Avatar
Oh thanks
Avatar
Are there any differences in responsibilities between someone working in law enforcement for cybercrime vs. someone working in the private sector?
Avatar
Andrew Rathbun 9/13/2019 4:38 PM
@Tyføøn preservation letters and search warrants are commonplace in LE whereas private sector folks don't have authority to do either. LE deals with criminal matters that rely on proving X happened beyond a reasonable doubt whereas private sector folks probably deal with more civil matters or policy violations. CP is an LE only matter, too. (edited)
4:39 PM
LE has to deal with prosectors, judges, the courts, etc. That's a whole animal in itself.
4:40 PM
Private sector folks can speak more to what they're dealing with since I don't have that experience
Avatar
@Andrew Rathbun thanks!
Avatar
Andrew Rathbun 9/13/2019 4:51 PM
@Tyføøn Meant to say CP, not CO. Corrected now. (edited)
Avatar
Wondering how people treat this scenario. Stolen digital device in my case a tablet. Tablet is utilized while it was stolen by suspect. Owner grants consent to search. Is a search warrant needed to search the device for the use of the suspect during the time he had the device or does he/she have no expectation of privacy in that material as it was not their device to begin with.
Avatar
Andrew Rathbun 9/15/2019 3:59 AM
When in doubt, get a SW so you're covered. Leaves no door open for an issue to be brought up in court later. Removes the seed of doubt from the equation.
Avatar
Yeah I agree but few in my department don’t feel the suspect can have any expectation in the device as it isn’t his
Avatar
Andrew Rathbun 9/15/2019 4:45 AM
@Ghosted if there's evidence of a crime on the device you'd be better suited to have a SW for it to CYA
4:46 AM
But I only speak to what my Prosecutor's Office would want as well as my admin. Every department and jurisdiction is different. A little bit of paperwork to CYA and make sure the case is administratively pure is worth it IMO
Avatar
Yeah I agree
Avatar
@Ghosted. That wouldn't be an issue at all in my state. It's a stolen device. He has zero expectation of privacy.
👌 1
7:44 AM
It's a little more tricky if it's a device owned by a business and he is allowed to use it.
Avatar
Watched a video preview of the new iOS 13 coming out, says there is a new feature that will allow Bluetooth connections for location purposes even when in airplane mode. The goal apparently is to track stolen devices even in airplane mode so that they can be recovered. I’m wondering if this new hidden Bluetooth tracking mode would also allow a remote wipe?
8:27 AM
The service is supposedly crowd sourced like those tile trackers. Every cop with an iPhone would then be a vector for deletion for their evidence if that’s a thing... will be interesting to see
Avatar
Apple in iOS 13 and iPadOS merged the Find My Friends and the Find My iPhone apps into one app that's just called "Find My," because,...
9:35 AM
Looks like it does wipe as well
Avatar
@whee30 where did you read that also wiping is possible? Didn't find any info on this. Just found locating is possible if Bluetooth is on. But will definitely test it asap
Avatar
kmacdonald1565 9/16/2019 8:22 AM
does the sprint L-Site still work? i am setting up my account (always used fax before) and i am having trouble getting into the l-site. i installed the certificate and all correctly but i am having trouble getting in, it just says page cannot be displayed. i figured i would ask here before reaching out to sprint and looking like an ass
8:25 AM
lolol never mind...it just doesnt work in IE...have to set up everything in IE with compatibility settings and all that BS but as soon as I moved to chrome it worked
Avatar
@kalinko from the linked article: "There's an option to mark a device as lost, which locks the lost device, disables Apple Pay, and allows contact information to be put right on the lock screen, and as a last resort, there's a tool for deleting all of your data."
9:09 AM
I missed the spot in the article where it said turning off bluetooth in addition to airplane mode prevented the tracking... at least it's not permanently on in the background!
Avatar
@whee30 Thx for your answer. It seems it was too early in the morning yesterday to read such an article 😉
Avatar
Deleted User 9/16/2019 11:06 PM
Anyone who knows any good crawler/spider that can search for an specific bitcoin adress in darkweb/deepweb that maybe is posted on an market or a forum etc?
Avatar
Does anyone have any idea when Cellebrite 8 is coming out?
Avatar
Does anyone have a Law enforcement guide for Twitch.Tv?
Avatar
Andrew Rathbun 9/17/2019 4:20 AM
@Nemesis I've never seen one before so not sure if one exists
Avatar
Anyone use the Cellebrite Textalyzer never heard of it until our traffic guys came in and asked about it
Avatar
@Nemesis Twitch is a subsidiary of Amazon. Might be able to go through their LE contacts.
👌 2
Avatar
hey @SPVQct3207 what are you actually looking for a break down of the complete URL for a requested page?
6:03 AM
my mind is not working correct today so...
Avatar
Is there a free hard drive wipe any of you recommend to use?
Avatar
Andrew Rathbun 9/17/2019 6:13 AM
@Tyføøn download Eraser
💯 3
Avatar
umm dban, hdparm, dd, actaully ccleaner does a good job too
Avatar
I use dban as a bootable tool, Eraser for everything else
6:15 AM
Well, I use a hardware solution now, but those are my software choices
Avatar
🔨 Hardware solution?
Avatar
kmacdonald1565 9/17/2019 6:17 AM
tableau i am assuming @Erumaro (edited)
Avatar
I think the tx1 can wipe
6:17 AM
along with some others
Avatar
A hammer would be a lot more creative, and fun!
💯 2
Avatar
kmacdonald1565 9/17/2019 6:19 AM
nice
Avatar
or nice cobalt drill bit
Avatar
Mr. Eddie Vedder from Accounting 9/17/2019 6:33 AM
I've set up a raspberry pi in my office for Virtualhere and figured I'd also throw Pihole on it to block some ads. This got me thinking about iOS remote wipes. Would it be possible to block whatever service is sending the request to wipe the device? (While its connected to office wifi) https://documentation.meraki.com/zGeneral_Administration/Other_Topics/Blocking_or_rate_limiting_iOS_updates i found some documentation on blocking the updates but does anyone know if blocking remote wipe is possible
Avatar
@Mr. Eddie Vedder from Accounting Absolutely, I've done this to provide a WiFi network for jailbreaking iOS devices without triggering Find my iPhone
Avatar
Mr. Eddie Vedder from Accounting 9/17/2019 7:18 AM
@OllieD Can you share what you block to prevent the wipe?
Avatar
I take the opposite approach! Block everything and whitelist the specific domains required
7:19 AM
Got a WiFi network connected as part of a VLAN to a Draytek router which makes it easy to allow specific domains on the fly (edited)
7:20 AM
Identifying the domains to whitelist may require some traffic sniffing (depending on what you're trying to allow), but that's a far safer approach than trying to keep on top of whatever domains Apple are using (in my opinion)
Avatar
Mr. Eddie Vedder from Accounting 9/17/2019 7:26 AM
That makes sense. I was going to try running some test one of my work phones and see what i could figure out. I do like your idea of just blocking all that may prevent other data from being altered on the device if I'm just going after one specific app. I'll mess around some more and let you know how it goes.
Avatar
My concern regarding allowing everything except specific domains is that if Apple update the domains being used (via an iOS update for example), I could either miss one or just fall behind and I wouldn't know until it was too late. Whereas if an app starts using a different domain which I miss from my whitelist, it will become evident when the app just stops working (edited)
7:29 AM
But good luck with it 🙂
Avatar
Andrew Rathbun 9/18/2019 5:04 AM
Has anyone ever had success with recovering data from a segmented E01 image? Basically, I have 40 or so 2GB segmented files for an E01. Long story short, the HDD they were initially imaged to deteriorated and was riddled with bad sectors. I should have .E01-.E40 but I'm missing 3 or 4 of those segments now due to being deemed as corrupted. Same with another E01 but with like 7 or 8 segments. Naturally, one of these images is very important to the case. Just curious if anyone has any insight on if anything can be obtained from what I do have despite not being a complete E01.
5:08 AM
Here's a visual
Avatar
Does anyone know the difference between method 1 and method 2 sd card physical extraction in ufed4pc? @Cellebrite ?
Avatar
MrMacca (Allan Mc) 9/18/2019 5:39 AM
@Andrew Rathbun I'm not 100% certain but if you rename the existing e01 files so they are now make up a complete collection, that should open them up just without the missing parts.
5:40 AM
So if for example yuou have 10 E01, but numbers 7 and 8 are missing, then you would rename 9 to 7 and 10 to 8
5:40 AM
I've never tried this however, just going on something i heard a while back
Avatar
kmacdonald1565 9/18/2019 5:41 AM
@Andrew Rathbun full guess here but what happens if you put in an empy file for one of the missing files. so if your misisng e07 just generating a blank e07 file as a filler. if what ^ said doesnt work
Avatar
Andrew Rathbun 9/18/2019 5:46 AM
Hmmm I am not sure. I will try both of those theories though
5:46 AM
Thanks for the ideas
5:47 AM
I'll try renaming them from 1-whatever and then I'll try maybe either copying one E0X files and just renaming it to complete the puzzle and if that doesn't work I will try a blank E01 file
5:47 AM
Thankfully, I really only need documents off them so even if I can get something it's better than nothing
Avatar
MrMacca (Allan Mc) 9/18/2019 5:51 AM
From that picture I would rename e09 to e07 and so on
Avatar
Andrew Rathbun 9/18/2019 5:51 AM
Thankfully, that picture is the one that isn't important
5:51 AM
Here's the one that is, standby
Avatar
MrMacca (Allan Mc) 9/18/2019 5:51 AM
"shows picture of 200 e01 files"
Avatar
Andrew Rathbun 9/18/2019 5:52 AM
5:52 AM
it's a little longer but thankfully not 200 haha
5:52 AM
missing E02, E11, and who knows if anything past E40
Avatar
MrMacca (Allan Mc) 9/18/2019 5:52 AM
What does the log file say?
Avatar
Andrew Rathbun 9/18/2019 5:53 AM
The backstory on this was I imaged this to what happened to be a 1TB WD HDD manufactured in 2011
5:53 AM
Between the time I verified the image was good on scene and all parts were in tact and when I got to the office to transfer it to my NAS, things got corrupted or bad sectors went wack
5:53 AM
I went to transfer the E0X files to my NAS and it failed on like 4 of them via TeraCopy
5:53 AM
said they just couldn't transfer over, for whatever reason
5:54 AM
Logfile will show a full, complete image, which it was at one point
5:54 AM
What I have copied over and are showing you here is all I was able to copy from the original destination drive
Avatar
MrMacca (Allan Mc) 9/18/2019 5:54 AM
Yeah I had one, and it was the final e01 that just wouldnt complete. And the image was of a drive that took about 3 days to image due to issues and bad sectors.
Avatar
Andrew Rathbun 9/18/2019 5:54 AM
and the missing parts just couldn't be copied over at all
5:55 AM
Yeah I tried imaging this 2011 drive and it had thousands of bad sectors on the TD2u. It's not an unrecognized file system but in Hex you can see ExFAT in the 12th physical sector, but that's all the further I've gotten at this point
Avatar
MrMacca (Allan Mc) 9/18/2019 5:55 AM
Well fingers crossed it shows up something
5:55 AM
maybe do a small batch test file, before renaming everything and it doesnt work
Avatar
Andrew Rathbun 9/18/2019 5:56 AM
Moral of the story, destination drives on scene should be manufactured within the past couple years lol
5:56 AM
right now i'm making a few copies of the corrupt image files so I can run the above experiments on them. Working copies of an incomplete working copy
5:57 AM
Appreciate the ideas, I'll report back sometime later today. This copy is going to take a bit
Avatar
MrMacca (Allan Mc) 9/18/2019 5:57 AM
No worries, Ive got a 2 hour meeting now
Avatar
Andrew Rathbun 9/18/2019 5:58 AM
Have fun with that!
Avatar
Andrew Rathbun 9/18/2019 6:32 AM
OpenText just emailed out a customer survey. This would be a chance for anyone to bring up concerns about the lack of attention given to EnCase, if anyone cares
👀 1
Avatar
Andrew Rathbun 9/18/2019 7:12 AM
@MrMacca (Allan Mc) @kmacdonald1565 this is the outcome of using blank E01 files to fill in the missing segments
Avatar
kmacdonald1565 9/18/2019 7:12 AM
ah weak
Avatar
Andrew Rathbun 9/18/2019 7:16 AM
same result 😦
7:16 AM
Not surprised but they were great ideas that I hadn't thought of before. Appreciate the input
Avatar
MrMacca (Allan Mc) 9/18/2019 8:11 AM
Try it in X-ways
8:13 AM
Gonna do a test on my machine, see if I can get it to work
Avatar
X-Ways can recreate a missing Exx image
8:19 AM
Avatar
Andrew Rathbun 9/18/2019 8:20 AM
Good to know, I will have to get ahold of an X-Ways dongle then
Avatar
...under the condition that you have the descriptive text file, created when imaging with x-ways
8:20 AM
because you need to fill in the correct amount of chunks
Avatar
Andrew Rathbun 9/18/2019 8:20 AM
Ahh damn
8:21 AM
I won't have that then
Avatar
ah ok
Avatar
Andrew Rathbun 9/18/2019 8:21 AM
It was imaged with a TD2u
Avatar
you can reproduce them also, but it's little bit more hardcore, and I don't have the documentation with me
8:23 AM
will look it up later, keep your eye on this channel 😉
Avatar
Andrew Rathbun 9/18/2019 8:23 AM
Thank you @Karamba
8:23 AM
I can probably get an X-Ways dongle one way or another. I don't have one issued to me but some coworkers do.
Avatar
the solution is that - in order to calculate the missing chunks - you need to trick x-ways
8:25 AM
he will give you the error - with amount of missing chunks, so that you can make a dummy one
8:25 AM
i'll keep you informed
Avatar
MrMacca (Allan Mc) 9/18/2019 8:28 AM
I've done a test and added it to X-ways, it throws out alot of errors, but it is showing some of the contents. I'll try to extract something and see if it gives partial data
8:29 AM
this is just by adding the renamed E01
8:31 AM
@Andrew Rathbun Yeah X-ways might get you what you need, I didn't recreate any of the missing chunks, just renamed the file extensions so they are all in sequence with no gaps. Then I did a test export of the Config folder and it worked.
Avatar
Andrew Rathbun 9/18/2019 8:32 AM
@MrMacca (Allan Mc) that's great news, very encouraging. I appreciate you trying that out! I will work on getting a dongle in my hands. I know my partner has an X-Ways Imager dongle so I will get ahold of that but that's only half of a win. I will work on an X-Ways Forensic dongle.
Avatar
Andrew Rathbun 9/18/2019 9:21 AM
I got ahold of X-Ways a lot quicker than I expected. It was able to parse out the unimportant partition of that image but it got a lot further than any other tools so I have to give it credit. I'm missing .E02 so I think that is really critical to not being able to show the partition I need. I will keep chipping away but thanks for the leads
9:26 AM
Also, the other image looks like it was able to parse most of the data partition so that's great news! BUT, of course, that's the significantly less important computer to the case. But I'm a lot further than I was so I really appreciate the help @Karamba @MrMacca (Allan Mc) @kmacdonald1565. This is a perfect example of why this community is valuable and thriving
Avatar
MrMacca (Allan Mc) 9/18/2019 12:07 PM
Excellent news @Andrew Rathbun
Avatar
@Andrew Rathbun I looked up the documentation; there is only a workaround in x-ways if it is one missing segment or multiple contiguous missing segments (edited)
1:18 PM
in the case of multiple non-contiguous segments (which is your case, I believe), the only way is working with the descriptive text (edited)
1:20 PM
I see in the screenshot that there is a log-file; any interesting in that file ?
Avatar
Andrew Rathbun 9/18/2019 1:30 PM
It's just a TD2u log file. Not sure if you're familiar or not. I will post some of it tomorrow to see if any would be relevant
1:30 PM
@Karamba
Avatar
Slightly silly hypothetical question:
12:26 AM
If you recover login details you're not allowed to use them without a warrant
12:26 AM
And likewise with session cookies or whatever
12:26 AM
But could you use an API endpoint to refresh the session token until you get a warrant?
12:26 AM
Actually I guess by that point you could just ask the service provider
Avatar
Andrew Rathbun 9/19/2019 9:36 AM
@Seagull it's always best, in my opinion, to just get the information from the service provider through a warrant. I've never used any cloud analyzer software from any of the vendors so someone else could chime in on that. Typically what I do with the production form the service provider is make an .AD1 out of it with FTK Imager and use that as my best evidence copy. That will go on a HDD and placed into evidence. Then I have a working copy that I use for my analysis.
Avatar
Yeah that makes sense, thanks
10:01 AM
Not a professional so it was just a silly idea
Avatar
Andrew Rathbun 9/19/2019 10:02 AM
No worries, glad to help
Avatar
Andrew Rathbun 9/19/2019 11:17 AM
@Karamba here's pretty much the only partially useful info in the TD2u log
11:17 AM
Capacity in Bytes: 250,059,350,016 (250.0 GB) Block Size: 512 bytes Block Count: 488,397,168
11:18 AM
File Size in Bytes: 2,000,000,000 (2.0 GB) Files written: 39 Total errors: 0
11:18 AM
I have 36 files, so 3 are missing on this one
11:18 AM
Just circling back on this. Not expecting this to help me get over the hurdle but just wanted to pass it on
Avatar
ow, no luck there...
Avatar
Andrew Rathbun 9/19/2019 11:19 AM
I figured. Oh well :/
11:20 AM
Appreciate the insight
11:24 AM
I think for the other unimportant image though I will be able to get documents off there so that's significantly further than I was before
Avatar
for500 done!
💯 2
11:43 AM
Such a relief
Avatar
Andrew Rathbun 9/19/2019 12:19 PM
Did anyone else notice with 4PC 7.23 it's no longer a single executable? It's very much like AXIOM where there's 3 files with 2 of them being .bin and one executable
Avatar
i think there is a 2g max for the exe file or somthing like that.. i think i remember reading they reached the 2gb max
👌 1
Avatar
anyone having issues with media player classic and x-ways
4:10 AM
command switches seem to be unrecognized
Avatar
iOS 13 = No more magnifying glass = Devastating news for a Friday 😩
Avatar
Forensicator 9/20/2019 9:32 AM
ty @Cellebrite just bypassed (removed) a complex code on j737t1 galaxy j7 that was sitting on my desk that we desperately needed. for a high profile case. Used the latest UFED 4 PC (7.23.0.10) 😊 (edited)
💯 4
cellebrite 10
Avatar
dang this place is cool
Avatar
Forensic@tor 9/20/2019 10:31 AM
@Cellebrite and @Forensicator Now if they can just add full unlocking support for Alcatel 5041C devices
👍 1
Avatar
that family of MediaTek support would be great
Avatar
STORY TIME! Sooo, I went to pick up the new iPhone today as a surprise gift for my SO. And it dawned on me I don’t know when she last did an iCloud backup. Not wanting to tip her off and ruin the surprise I ask the Apple employee if there is a way from their side to know when her phone was last backed up. He goes “Sure!” “Let me just make her a reservation at the Genius Bar, then it will tell us when she last backed up...” I said hold on I don’t want her to know, will making this reservation send her an email? No he says as long as you don’t hit confirm it won’t notify the user. I have to tell you guys the information they had was awesome if you have a case and you want to know what devices and when they last backed up to iCloud in preparation of sending legal process to Apple, get yourself a friend that works there FWIW...
Avatar
CLB-Arnon Tirosh 9/20/2019 11:31 AM
Regarding the EXE file size.... The 2 GB limit refers to a physical memory barrier for a process running on a 32-bit operating system, which can only use a maximum of 2 GB of memory.[1] The problem mainly affects 32-bit versions of operating systems like Microsoft Windows and Linux,
Avatar
Unoriginal_name 9/20/2019 11:59 AM
@Zhaan I still have magnifying glass after updating to iOS 13
Avatar
I don’t!
12:00 PM
They can’t trust me with it!
Andrew Rathbun 9/20/2019 12:04 PM
Avatar
Andrew Rathbun 9/20/2019 12:04 PM
@NerdCop cool story, thanks for sharing! I know we had a good relationship with our local Apple store and whenever we had stolen iPhones that were recovered, we were able to give them the serial number and they were able to notify the victim for us to reunite them with their recovered device
12:05 PM
I think they said they weren't technically allowed to do that but were doing it as a favor to help
12:06 PM
@CLB-Arnon Tirosh thanks for the insight!
Avatar
@CLB-Paul reviewed the forum for a LG-K550 with chip MSM8937, and did not see a clear answer so wanted to post again. Attempting to gain an extraction from this device, I placed the phone in EDL mode using the test ports but the extraction quits after step one, any one else have any luck regarding this device? I see @Draugrs had this same issue last year, not sure of it was ever resolved. ...Additionally the interesting thing with this particular device is that it's unlocked, however i'm unable to access developer options via tapping the build number? its running android 6.0.1 and the security patch is 5/1/2016, any assistance, thoughts or ideas is appreciated.
Avatar
@jenks31 so if it quits at step one, it means that there is no firehose (communication programmer) to the device. Many are device specific.
2:55 PM
With it being unlocked, did you try Smart ADB?
2:56 PM
Its been out for a while, and even thoguh it was out with 6.0 there is a chance that it is no encrypted. I do not know, so maybe LAF (LG Recovery) could be an option.
2:56 PM
I am not sure, and did not try these, just spit balling ideas off the top of my head.
Avatar
Forensic@tor 9/20/2019 3:04 PM
@CLB-Paul He won't be able to use smart ADB as the developer mode is locked -- no debug mode.
3:05 PM
@jenks31had a similar situation the other day and a older model. I tapped a different option seven times to unlock developer. I don't remember what it was but it wasn't build.
Avatar
@Forensic@tor ok thank you, i'll try to tap different ones. Unfortuanlte as @Forensic@tor stated all of the extraction methods are not working currently due to not being able to get dev options to work I'll try LG recovery as well see if that works
Avatar
@jenks31 MDM perhaps ??
Avatar
@CLB-Paul I didn’t see one on there, I’ll take another look though when I get back in the lab. Good thought.
Avatar
You might not easily see it as a user. Where did it come from. The device
Avatar
danmiami0001 9/23/2019 5:13 AM
Anyone have an LE contact at Facebook? Preferably a phone number and name for a Florida based LEO. Thanks!
Avatar
Adam Cervellone 9/23/2019 8:35 AM
Could someone from @Project VIC DM me please? I have a couple of questions about their data set and seeing conflicting information in different tools used the ProjectVic json files.
Avatar
kmacdonald1565 9/23/2019 12:27 PM
does anyone have a resource for comparing cars visually. trying to find a hit and run vehicle involved in an auto v. ped. video kinda sucks because its dark out, not too much can be done by the way of enhancement. ill post stills in a minute with what i could do...i thought about trying to code a website that can do this as a service (similar to identifont) that basically plays 20 questions with , but dont have the time. it would be nice if there already is a resource to say view all rear ends of vehicles, or all profiles, or all tail lights or something.
12:27 PM
12:27 PM
12:27 PM
12:27 PM
12:27 PM
12:31 PM
so far what i got is gray sedan, tails and headlights wrap towards side. license plate on trunk even with tail lights, or pretty close. tail lights have two bulbs, possibly bigger reflector in towards license plate. trunk/licens plate area is angled similar to how civics have their trunk area, not sure how else to describe it...can see it best in second pic here i think. 10 spoke wheels (or 5 split spoke depending on how you look at it). video makes it look like HID or LED headlights, probably projector based.
12:32 PM
i used to be so good at IDing cars when i was on patrol...that skill has dropped off severely
Avatar
crowdsourcing?
12:38 PM
if you just need to find a matching model/make
12:38 PM
looks like a bmw to my eyes
12:40 PM
12:41 PM
not familiar with US makes though
12:46 PM
headlights are quite possibly different
Avatar
Any LEO's have any tips or tricks up their sleeves for a Snap Chat extortion case ? I have a case where the suspect is threating to send out pictures of a minor that he has obtained and I would like to narrow down there location with a search warrant and any other means. DM me and if something works I’ll post it.
Avatar
Andrew Rathbun 9/23/2019 1:03 PM
@DCSO have you served legal process to Snap before?
1:03 PM
I'd recommend sending out a preservation letter ASAP. I don't recall getting location information from Snap, but you should get the last 90 days of snaps and the entire history of messages for the account, last I knew
👍 2
Avatar
kmacdonald1565 9/23/2019 1:06 PM
@DCSO i cannot promis it wil help, but i have used the snapmap feature to track runaway kids before...if you have a dumb enough suspect it might help.
Avatar
@kmacdonald1565 I did just check to see if there location was on and they were not sharing it. I"ve served Snap Chat before but I'm thinking of doing an account take over and sending a tracking IP assoicated to link now vs waiting months for the warrant return to comeback ?
Avatar
kmacdonald1565 9/23/2019 1:26 PM
that is a very tough spot...personally that is something i would run up my chain and consult a prosecutor about but to me the exigency exists for it.
Avatar
Andrew Rathbun 9/23/2019 1:27 PM
Snapchat used to do 2-3 hour turnarounds on search warrants for me back in early 2017 when I was serving a ton of SW's and preservation letters to them, but I think they've gotten a lot busier since then and it's been slower
Avatar
kmacdonald1565 9/23/2019 1:31 PM
in 2017 or 2018 they more or less screwed my department...had a missing/runaway JV. only using snapchat. would borrow a stranger's phone sign in, send a snap, sign out and keep going. They wouldnt send us more than 2 updates a day (roughtly 8-10 hours apart. needless to say, we were way behind the 8 ball. Intel had her in a major city an hour and a half away with nothing, no food, money, or other clothing in the hottest week of the summer. they more or less didnt care.
1:31 PM
they really have never been good to us
Avatar
Andrew Rathbun 9/23/2019 2:02 PM
That sucks! Hopefully everything turned out all right with the juvie
Avatar
kmacdonald1565 9/23/2019 2:04 PM
yeah, old fashioned police work found her...ended up charging a few people if you catch my drift.
👌 5
Avatar
is there any way to retrieve recently deleted messages (whole conversation) from Telegram?
Avatar
Has anybody used ADF Solutions Mobile Device Investigator? We are looking for a mobile triage solution and this came highly recommended but wanted to get some more opinions on it. https://www.adfsolutions.com/mobile-device-investigator (edited)
ADF Mobile Device Investigator (MDI) for iOS and Android smartphones and tablets is the best mobile forensic tool for field investigations
Avatar
Does anybody know of any apps that will encrypt text messages?
Avatar
forensicmike @Magnet 9/24/2019 9:00 AM
@Tyføøn Can you be more specific? Are you trying to encrypt some text for testing? Or do you mean an app that encrypts messages before putting them into a local database?
Avatar
Just for texting Ex- healthcare or medical information (edited)
Avatar
cyberchef is good just for playing around
9:01 AM
oh
Avatar
forensicmike @Magnet 9/24/2019 9:03 AM
An app like Wickr claims they do not possess the keys to decrypt your messages on their end, and they definitely encrypt them at rest on the device.
Avatar
Okay, thanks I’ll check it out
Avatar
forensicmike @Magnet 9/24/2019 9:03 AM
+1 to cyberchef though even though it was for a different question 😄
💯 1
Avatar
Signal.
9:43 AM
(For text encryption).
👆 1
Avatar
Semantics 21 (Tom) 9/24/2019 9:53 AM
@goalguy Have you tried Mobilyze by BlackBag? https://www.blackbagtech.com/mobilyze.html
BlackBag's Mobilyze is the premier software for analyzing information on Apple iPhone and Android devices.
Avatar
I have not @Semantics 21 (Tom)
Avatar
does anyone know where Android app backups actually go
6:24 AM
I would've assumed GDrive
6:30 AM
hmm OK, devs of this particular app are saying it's only using Google to auth, not to store
6:30 AM
so that answers that
Avatar
@goalguy what kind of results are you looking to get from mobile triage? We might have something (new) that can help, happy to explain it via PM if you are interested
Avatar
Does anyone have a generic computer search warrant template they can shoot over to me quick? I can PM you my work email
Avatar
Andrew Rathbun 9/25/2019 8:26 AM
@Jobbins shoot me a PM as a reminder and I can email you one later this week when I get back home. I'm out of town for work now
Avatar
Does anyone have a contact with Microsoft by chance?
Avatar
@kmacdonald1565 maybe i'm late but I think your car in the picture is a subaru legacy
3:38 PM
Avatar
kmacdonald1565 9/25/2019 3:38 PM
thanks for the suggestion!
3:38 PM
never too late
Avatar
yeah front headlights look more promising
Avatar
anyone ever had an issue with X-ways where partly through imaging the device becomes unavailable
6:19 AM
seems to be USB devices so maybe it's my tableau
Avatar
Igor Mikhaylov 9/26/2019 7:42 AM
Hi all, Here is my new article: Tools up: the best software and hardware tools for computer forensics https://www.group-ib.com/blog/digital_forensics_tools
The review of the best software and hardware solutions for computer forensics.
👌 1
Avatar
@Legis did you get your microsoft contact ? You can check search.org they have a couple contacts.
Avatar
I did not yet @DCSO
8:11 AM
I will check
Avatar
That will not work @DCSO thank you though!!
Avatar
Forensicator1005 9/26/2019 7:02 PM
@Sudo yep. Tableau UltraBay3d on my FRED has caused problems in the past for me.
Avatar
MikeWhiskey 9/27/2019 7:10 AM
@kmacdonald1565 about the car pictures, maybe it's a Mk3 Ford Focus Sedan. The second last picture could show some design lines at the doors, that are pretty similar, also the frontlights are similar pulled back above the fender. I am not quite sure about the taillights, they don't match excactly, but this could be due the poor image quality or base model/aftermarket taillights.
7:10 AM
nearly same angle
Avatar
kmacdonald1565 9/27/2019 7:15 AM
@MikeWhiskey thank you!
Avatar
I think it was a duff cable, I managed to image it in the end
7:23 AM
I also changed my drive sleep settings, as it might've been that
7:23 AM
odd though cuz, it's in use so I dunno why it would sleep
Avatar
Are there any average education and work experience requirements to work in digital forensics?
Avatar
RubberDucky 9/28/2019 12:32 PM
Generally some IT knowledge helps. @Tyføøn Depends if u r going for beginner or senior or whatever, the more senior the more needed ofc Some teams might be willing to train you up That's my experience
Avatar
Andrew Rathbun 9/28/2019 12:42 PM
@Tyføøn if you're going the LE route, sometimes all it takes is being informally designated the midnight shift IT person. That's what happened to me since I was the techiest person by far on the shift. Word gets around and I got slotted to become a detective doing digital forensics (as well as other general casework). It just snowballed from there. Right place, right time, right department, right budget, etc. I was very fortunate to have that opportunity as it changed the trajectory of my career (edited)
12:43 PM
My coworker was a sysadmin in a previous life and now he's doing digital forensics.
12:44 PM
Knowing what I know now, I wish I had a stronger background in networking as that can only benefit and give you more options moving forward.
Avatar
@Andrew Rathbun My exact route also.
💯 3
Avatar
Andrew Rathbun 9/28/2019 3:43 PM
I'm sure many others, as well
Avatar
Yup! I’m fresh into my detective role but that’s my path as well.
👌 1
🤞 1
Avatar
Vulnerability in WIB simcard-browser that causes serious harm to hundreds of millions of telecom subscribers worldwide in 2015, and the vulnerability has not ever been published yet. By sending a malicious SMS to victim phone number, attacker can abuse the vulnerabilities in the WIB sim browser to remotely take control of the victim mobile phone to perform harmful actions such as: send sms, make phone call, get victim’s location, launch other browsers (e.g WAP browser), get victim’s IMEI, etc. https://ginnoslab.org/2019/09/21/wibattack-vulnerability-in-wib-sim-browser-can-let-attackers-globally-take-control-of-hundreds-of-millions-of-the-victim-mobile-phones-worldwide-to-make-a-phone-call-send-sms-to-any-phone-numbers/
Avatar
Can anyone send me a link of what a security policy is supposed to look like, what it’s supposed to include, etc. (edited)
Avatar
CodewordPorcupine 9/29/2019 9:29 PM
Are there better and worse OS's for DFIR? And is there such a thing as a free OS that's good for DFIR? (edited)
Avatar
SANS have a SIFT image for both windows and Linux
Avatar
@Tyføøn You're going to need to be a lot more specfic than that. A security policy for what exactly?
12:19 AM
@CodewordPorcupine most commercial DFI software tends to run exclusively on Windows, but there are various open source options available and some software specifically made for MacOS. Choose your forensic product first, then work out what OS it runs best on. And remember you're likely going to be using multiple bits of software here so think about compatibility. SIFT suite is a great free and open-source start.
Avatar
Yeah I'd say if you're building a machine you'd definitely want to at least be able to run Windows
12:29 AM
But obviously if your workstation OS is an image it's much more flexible
Avatar
@K23 forget about it. I found what I needed
Avatar
Andrew Rathbun 9/30/2019 9:26 AM
I was just handed a 12TB padlock drive. This is the largest HDD I've ever had in my hands. 10.9TB usable which sucks but it is what it is
😬 1
Avatar
@Andrew Rathbun my largest is 8tb so far. Having to clear room out just to image a drive is a PITA, not to mention processing it.
Avatar
Andrew Rathbun 9/30/2019 9:30 AM
Oh absolutely. I can imagine. Thankfully this already has evidence on it and it's nothing I have to image. Maybe make a logical image of the 5TB of contents or so at a later date. Pretty crazy though. Their website shows 16TB as the highest option available for a cool $1040 USD (edited)
Avatar
If anyone has had experiences with SkyECC devices, please dm me.
Avatar
So just taking a shot out there with this one. We have some MAC addresses of devices from a router log. We have identified about 4 devices of interest. They are all android devices including LG, Coolpad, and Samsung. Is there anyway to identify a device with just a MAC address? Of course the goal is to potentially get an IMEI or even identify the provider. I’ve never had to do this before. I’ve identified devices before by their MAC address with a Shadow, but that’s it. Anyone have any experience with this?
Avatar
Anyone know which company that owns fr.bbsecure.com? Its a MDM-service company, cant find any info at the web
Avatar
https://markmonitor.com/ according to whois
MarkMonitor helps establish and defend some of the world's largest brands online
3:59 AM
Avatar
Cheers, i got something called BlackBerry UK Limited but it has to be wrong since its and iphone..
Avatar
Doesn't look like you're far off
4:02 AM
Blackberry do provide an MDM which works on iOS
4:06 AM
Think that's your winner
4:11 AM
Seems like every company is providing an endpoint management solution these days. Feels like it's the current big trend
Avatar
@Arlakossan what a coincidence....Exactly what skyECC seems to use (my comment just above yours...)
6:10 AM
And they run blackberry uem it on iphones, blackberries, and pixels
Avatar
@dfa_adam have you gotten somewhere? I want the token for the iOS device to open it
Avatar
I recall somone talking about Life 360 and having more info in the DB than whats viewable manually. Anybody recall this ? I've searched an can't seem to find it. We have a device thats from an accident and its past the 3 days that it offers for the free version. I"m wondering if its still stored on the device. This is an Android OS device.
Avatar
Hey guys, anyone happen to have a WinFE USB image by any chance? This is so complicated to make it seem😫
Avatar
Andrew Rathbun 10/1/2019 12:32 PM
Just realized the Sanderson Forensics website has been revamped by @TeelTech - https://sqliteforensictoolkit.com/ looks like there is a Google Group now, too
Avatar
Anyone on here conduct investigations on cryptocurrency mining
Avatar
Unoriginal_name 10/1/2019 3:05 PM
We are looking at placing some game cameras in the woods to locate a serial arsonist. We have been ordered to find a way to track the game camera in case it gets taken. I’ve been researching ways and have seen crowdsourced tiles that use BT to track but I am leaning towards GPS. Does anyone have any recommendations on small GPS or maybe enlighten me in another way to track it.
Avatar
Sympathizee 10/1/2019 6:58 PM
Uhm, is there any way we can get a discord localstorage file on windows? Or did they removed it?
Avatar
@Unoriginal_name we just bought game cameras that weren’t too expensive and hid them carefully. Anything traceable via gps is going to get expensive quickly and burn a lot of battery as well. The typical car gps tracker requires many hundreds of dollars for subscription service etc. a tile is an okay idea but you’re relying on other tile users to be nearby, the tile to function (mine never did when I needed them to) and for the thief to not notice the big white tracking device attached to the camera. Honestly, the best bet is to buy some cameras with the understanding that you might lose some. In the last five years I have lost none while using no tracking devices etc.
Avatar
Android ID's, are they consistent within a device. If my Android ID is 1234, then I wipe my phone start again is the ID the same or is a different one generated. If not known I'll do some testing.
Avatar
Any help will be most grateful. Huawei P20. I have files relating to - Media/internal storage/ .photoshare Does anyone have any suggestions what the .photoshare location is? I am unable to identify on the file manager
Avatar
would've thought it was just files relating to that application
4:56 AM
orphaned from the previously installed app maybe
Avatar
@Unoriginal_name Depend how many you plan on installing but you could use a raspberry pi with GPS+GSM module or just take some old phone, connect them to a big powerbank and hide them in the camera.
Avatar
@Sympathizee pretty sure what does exist for Discord stuff is in appdata
6:33 AM
I've looked before and I don't think the forensic value is there
6:35 AM
some cached images tho
Avatar
kmacdonald1565 10/2/2019 6:57 AM
@Unoriginal_name cost and placement are really the deciding factors. Many narcotics units use covert cameras of all type and GPS trackers. I am sorry for the longish post but here are a couple of options and background if you arent familiar (not brand specific sorry, but can find out and PM you in like 5 hours) If you are looking for in a wooded (remote) area, hunting/bait cameras are an option. Pro: low cost, decent picture quality depending on model, pretty good battery life, camouflaged and hard...Con: not highest quality, dead stick when battery dies until you can recharge, you forget where you put it,...its gone, no GPS at low $, no remote viewing, limited recording (SD card size/quality) If you are looking for in an urban area, pole cameras are an option. These are covert boxes directly connected to power lines and put in place by utility companies. Pro: great picture quality, power not a concern unless utility suffers an outage, some have GPS capability but moderately tough to steal anyway, pretty well camouflaged, can be set up to record to HDD (we had recordings for several weeks using one), remote viewing. Con: moderately expensive, difficult to install/takes time to get right, requires 4g connection for remote viewing (we use cradlepoint routers), can be finicky with connection issues, requires utility poles (some areas don’t have any) and that can cause a less than optimal camera position/angle.
6:57 AM
Homebrew solution: Raspberry Pi: use a Pi and a webcam or Network cameras. There are tons of tutorials on this. This can be done super cheap. If sourced well, it can be done with spare/salvaged parts for probably $50 or so. If it runs on a pi zero w, they cost like $10 or $15. If you need a 3b or 4, they are like $35 to $70. My estimate of 50 is based on a $35 3b. You can add GPS and GSM module for a pretty small fee. Pro: super cheap- potentially lowest cost option, customizability. Con: setup time and configuration, need to build own casing, depending on components video quality concerns, powering the devices, can potentially throw it on a UPS or something GPS Trackers: generally have good battery, if your using it other listed above, you are likely going to run out of battery on the camera or system before the tracker anyway. You might not be able to do a swap as easily though. These do get expensive with tracking plans, but I am not privy to specific costs.
Avatar
Forensic@tor 10/2/2019 10:42 AM
Does anyone have a contact with the US Army that may know something about MDMs and US Gov't issued cell phones?
Avatar
Andrew Rathbun 10/2/2019 11:23 AM
@Forensic@tor shot in the dark but https://dodcio.defense.gov/Cyber-Workforce/Contact.aspx might be a good last ditch effort
Avatar
Forensic@tor 10/2/2019 11:44 AM
@Andrew Rathbun Thanks but they were of no help. I finally found a guy. It took an act of congress, but finally found him.
Avatar
Andrew Rathbun 10/2/2019 11:45 AM
@Forensic@tor glad to hear it all worked out 👍
Avatar
Forensic@tor 10/2/2019 11:48 AM
@Andrew Rathbun Partially. They could have remotely reset the PIN for me, but the phone was terminated due to inactivity. Just have to wait for the brute-force to complete.
Avatar
@Forensic@tor
Avatar
anyone using cloud storage for evidence.... for disaster recovery/bc file sharing etc.. ?
6:28 AM
I need to come up with some solutions and would like some insight if anyone is doing so
6:28 AM
We currently are using tape backups
Avatar
Dr. Kaan Gündüz 10/3/2019 6:28 AM
oh dear
6:28 AM
😦
6:28 AM
backing up 80TB
6:29 AM
now and its super fun
6:29 AM
upload and download transfer speed to cloud I think might be an issue
Avatar
Dr. Kaan Gündüz 10/3/2019 6:29 AM
and security
Avatar
ya that too
6:29 AM
but if we encrypt it on our end ..
Avatar
Dr. Kaan Gündüz 10/3/2019 6:29 AM
they call it data aging in that industry
6:30 AM
fast storage-> backup storage->slower storage->tape backup etc.
Avatar
what is the norm currently
6:30 AM
off site backup ?
Avatar
Dr. Kaan Gündüz 10/3/2019 6:30 AM
i think it's better
Avatar
we do not. We are using a 100TB storage server with tapes.
Avatar
Dr. Kaan Gündüz 10/3/2019 6:31 AM
you can have 2 datacenters
6:31 AM
in different locations
Avatar
ya but then manpower etc
Avatar
Dr. Kaan Gündüz 10/3/2019 6:31 AM
with fiber
Avatar
my agency will not do that
Avatar
hoping to mirror to another server in another location in the near future
Avatar
Dr. Kaan Gündüz 10/3/2019 6:31 AM
most of nas solutions have automated replication options
6:32 AM
that datacenter could be in the same building
Avatar
ok so if your backing up lets say 70TB a year of case files you would need a PB to last approx 10 years?
Avatar
Dr. Kaan Gündüz 10/3/2019 6:33 AM
buying 1 pb now isn't the best idea
6:33 AM
because prices go down every year or so
6:33 AM
if you have 100Tb/year
Avatar
Andrew Rathbun 10/3/2019 6:33 AM
No reason to buy 10 years of space right now when you can incrementally buy since storage space is going to get cheaper year over year
6:34 AM
3 years from now buying 1 PB in 2019 will look like a dumb decision, maybe even sooner
Avatar
Dr. Kaan Gündüz 10/3/2019 6:34 AM
you can buy an expandable solution
Avatar
Andrew Rathbun 10/3/2019 6:34 AM
Buy maybe 1 year ahead of time, at most? That sounds a lot more reasonable
6:34 AM
Bingo
Avatar
Dr. Kaan Gündüz 10/3/2019 6:34 AM
like build a nas cluster with 3 nodes
Avatar
Andrew Rathbun 10/3/2019 6:34 AM
Yes
Avatar
Dr. Kaan Gündüz 10/3/2019 6:34 AM
and add new nodes as data grows
Avatar
Andrew Rathbun 10/3/2019 6:35 AM
All depends on how quick your procurement process is will also play a factor in to how far ahead to purchase storage space for
Avatar
Dr. Kaan Gündüz 10/3/2019 6:35 AM
(that could be a folk song)
💯 1
6:36 AM
most nas devices are not build for big file transfers
6:36 AM
by big i mean 1 tb single image file
6:36 AM
they use ssd's for cache
6:36 AM
so if you transfer lots of smaller files, that cache can be useful
6:37 AM
but huge files don't benefit from that cache
6:37 AM
deduplication is a cool feature
6:37 AM
if you don't encrypt your images of course
6:39 AM
6:39 AM
6:40 AM
this chart changes from time to time
6:40 AM
the top right quadrant are the cadillacs
Avatar
ya we have some HPE stuff currently
Avatar
Dr. Kaan Gündüz 10/3/2019 6:42 AM
most HPE products are scalable
Avatar
Moved over from decoding as this thread is better suited: Just out of interest, how do people handle redaction of data for defence / disclosure purposes? I have a case where a victims phone has been examined, emails are being provided but some email address etc contained within the conversations themselves need to be redacted which is obviously something that cannot easily be done through UFED - you can just choose which emails to include, which ones to exclude. Current solution for this is to export them as a PDF with full body contained within the report, and have the officer go through and manually redact data by hand on a printed copy / through acrobat which is far from ideal. Would be interested to know how other forces / teams handle these kinds of requests
Avatar
Its an annoying issue to have for sure - we used a document review/ediscovery tool for this in my old job, but it still requires people manually redacting stuff before it gets produced as pdf/TIFF. This was OK as they just did it as they went along whilst looking for relevant data but it's not gonna work for you I don't think
6:50 AM
and its not worth buying it just for that
Avatar
On the thread above regarding storage and backup we have two data centres, one which replicates to the other. From that point stuff is manually archived to slower storage, after it's been there a set period of time it gets put onto tape backup. If we run low on space they currently just buy more tapes, but I can see it being a problem for us in the near future as our extractions are getting a lot larger (My unit is literally just phones, but we have another unit using the same system with different drive pools for computers etc). Can't see us moving to the cloud any time soon, but there may be big changes if we become more intergrated with the force network to allow officers to view our products a bit easier, as right now it's two separate networks. But a lot of what ifs / things to consider there.
Avatar
Also when I said manually redacting, I mean within the tool, not printing stuff and scanning it back in or something
Avatar
Andrew Rathbun 10/3/2019 6:52 AM
We are running into issues with this as well. I know @heatherDFIR was polling people in the community regarding this issue. Last I knew, this is on Cellebrite's radar so I'm sure a solution will be forthcoming eventually
Avatar
@bizzlyg Good to know, that's likely going to be a more useful tool for our disclosure officers than something we can implement on our end. It's the age old question though, as the kind of redactions that are needed would involve altering the data as some of the things that need to be redacted are say within messages and message threads. Not as simple as just unticking a box. @Andrew Rathbun good to know it's on Cellebrite's radar, this will be a problem that affects all tools I imagine.
Avatar
Dr. Kaan Gündüz 10/3/2019 6:53 AM
nuix is your friend
Avatar
Andrew Rathbun 10/3/2019 6:54 AM
Nuix is also prohibitively expensive for local LE. It's more geared towards eDiscovery shops
Avatar
Yeah you can get more cost effective solutions than NUIX
6:55 AM
would be the worlds most expensive redaction tool if you bought it just for that
👆 2
Avatar
Dr. Kaan Gündüz 10/3/2019 6:55 AM
ok, nuix is not your friend 🙂
Avatar
Nuix / equiv could be an option, just depends where exactly it would sit in our organisation as it's going to be something more useful for disclosure officers. But in many cases there are normal officers acting as disclosure, so the scope for that is pretty huge. Not to forget the training etc. This is just one case that has brought this to mind, but I can really see it being an issue on a lot of others but it just hasn't been raised to us yet
Avatar
Andrew Rathbun 10/3/2019 6:57 AM
Attorney/client privileged communications on devices, mostly phones, is becoming a huge issue in my shop. It's dragging everything out and having us to tap into external teams to review the data and redact the privileged communications, etc. It's just a massive pain but it's the nature of the beast
👍 2
Avatar
We did civil edisco jobs for the health dept and they had this issue constantly, which is why we invested in an edisco tool so they could use web front end, review stuff and use inbuilt redaction tools as they go. Then at the end only the redacted version is produced along with whatever else they selected as being relevant/evidence. We didn't seem to have the issue as often with the criminal stuff and when it did come up I think they just did it manually with acrobat, def not the best solution though (edited)
7:00 AM
Cellebrite have introduced image redaction now so maybe they can expand on that and allow parts of documents/emails to be redacted etc. Can't see it being a huge challenge for them (edited)
Avatar
Yeah as if it's done that way it can be clearly marked up as to what's been redacted, while maintaining integrity of the evidence. However, from my perspective it's not just going to be product from cellebrite that we will hit this issue. Sounds like it would be better for us to invest in something that could be compatible with the outputs of a lot more forensic tools (Not saying that inclusion in UFED wouldn't be useful, because of course it would!)
Avatar
Yeah for sure
Avatar
I can see this being a much bigger issue when the ICO starts to crack down on things a lot more from a GDPR perspective. It's definitely a big issue, the limelight just has not been shined on it yet over here. When it does we will be in for some fun times
Avatar
Also in terms of data storage/backup infrastructure mentioned earlier - my old place have this https://www.quantum.com/en/products/file-system/ - you can link sites together, auto sync to cloud, tape etc
With its high-performance file system and policy-driven data management software, StorNext combines protection, flexibility and efficiency into an enterprise-grade system engineered for today and tomorrow.
7:05 AM
Expensive though
Avatar
https://www.commvault.com/ is what we use currently for archiving to slow storage, then tape. First step is on demand, think second step is automated. Works pretty well
Commvault offers industry-leading solutions that enable your organization to protect and use its data.
7:06 AM
No idea on pricing as unfortunately that kind of infrastructure is outside my remit, as much as I have a passion for a bit of sysadmin
Avatar
Question for everyone - Currently we operate with standalone forensic workstations. We have a large refresh coming due next year, so we are considering reallocating the budget and moving to a thin client/forensic server model. Does anyone have recent experience with the pros and cons of each system? Obviously we have to factor in how we will sort out licenses, service agreement and consequences of downtime, upgrade plans, etc...But we think it'll be more cost effective and efficient overall.
7:07 AM
Also, StorNext works well. For the most part.
Avatar
Network transfer speed would be my biggest concern there. Followed by the fact that UFED doesn't work over RDP (But other remote options are available). But cannot speak from practice as that's not how our system works
Avatar
Andrew Rathbun 10/3/2019 7:12 AM
UFED's dongle not working over RDP is really unfortunate since I do a lot of my analysis remotely. My workaround is just to use UFED on my laptop but I don't benefit from the power my workstation offers. At least the job gets done 🤷
7:13 AM
EnCase is in the same boat, too. FTK and Magnet dongles work over RDP thankfully
7:13 AM
X-Ways does too
Avatar
We already have 10g pipes set up. Wouldn't mind upgrading to fiber for future proofing, but not sure the budget would be there. Good to know about UFED....I wasn't aware of that.
7:15 AM
Is it just the dongle that doesn't work remotely? I was expecting problems perhaps with 4pc acquisitions...
Avatar
Andrew Rathbun 10/3/2019 7:17 AM
Yeah it will act like you don't have a dongle plugged in even though you do
7:17 AM
So this would apply to 4PC (which, I'd never use remotely because you have to be near the evidence to use 4PC, of course) and UFED PA
7:17 AM
I'm sure other Cellebrite products too but those are the only ones I use
Avatar
Can you plug the ufed dongles direct into the server, assign them to a vm, and just log into the vm - as opposed to plugging into the thin client? Or does that also pose issues?
Avatar
@dfa_adam did you try StorNext out? I never came across anyone else using it when I was there, what are your thoughts on it?
Avatar
Andrew Rathbun 10/3/2019 7:22 AM
I am not sure @dfa_adam. I use RDP through VMWare Horizon where I'm at and all I know is that doesn't work for us. Maybe someone else will know. I don't have the flexibility to try your proposed scenario though
Avatar
@bizzlyg We have StorNext. I don't really have experience with other systems, but it's good. Setup is a bit finicky on each machine, and no clue how painful the backend sysadmin portion is, but once it's up it's pretty smooth. We do occasionally run into problems, but it has only been an issue with the StorNext (vs IT changing a network setting improperly) once or twice. We upgraded to an SSD cache recently, and that makes a difference for sure.
7:26 AM
@Andrew Rathbun Okay...we will have to do some testing. Don't have much time to push this through, so a major issue like that will need a plan before we pull the trigger
Avatar
cool, the backend is a bit of a ballache at first but their support is v good generally if it goes wrong. We had to look after it as well as use it, but like you said it generally performed pretty well. We did have a few major meltdowns at first but that turned out to be an issue with the initial setup
7:27 AM
If you have it already it might be worth exploring the off-site sync to cloud, if you have the bandwidth and are allowed to put the data there. Takes the headache out of dealing with tapes etc
Avatar
Andrew Rathbun 10/3/2019 7:27 AM
@dfa_adam best of luck, hope you can figure something out. I know a lot of people here use VirtualHere as a result of prior discussions in this server and that's been met with universal acclaim. Just, with RDP, I don't know if it would work still. Might be worth using the search for VirtualHere and PMing some people who have implemented that setup. (edited)
Avatar
@bizzlyg Yes, every time they work on it, it's pretty unstable for a bit. Seems to be very sensitive to precise configuration settings. Fortunately, IT handles all the backup to tapes, etc., so it's no headache for me! Although accessing older stuff can be a real drag waiting for the tape to get spooled up....
Avatar
yeah agreed, if you need to get older stuff there is that waiting period. The way it works for some things is also better suited for media organisations than DF. I guess to get round that you could change the tapes to a diff storage type but obv expensive (edited)
Avatar
@Andrew Rathbun Thanks for the pointer - I'll look into virtualhere. Might help. Low cost.
Avatar
Dr. Kaan Gündüz 10/3/2019 8:12 AM
Vmware horizon or citrix xenapp are the way to go
8:12 AM
Server 2016 for backend
8:12 AM
Inside esxi
8:13 AM
Vmware takes care of bandwidth
8:13 AM
They all use RDS licensed from MS
8:14 AM
But you can use realvnc for a simpler setup
8:14 AM
Use raspberry pis for main workstations 😀
😆 1
Avatar
Just need them to release a pi with 10G networking 😄
Avatar
Dr. Kaan Gündüz 10/3/2019 8:39 AM
Not really 🙂
8:40 AM
For remote desktop, 1g is more than enough
Avatar
If you're extracting from the thin client to the server surely that might cause some issues? All processing will be done on the server so no bottle neck there which would be good
8:43 AM
Unless you had some dedicated machines set aside for imaging, then rest of the analysis and processing can be done via remote desktop / equiv. That could work nicely
Avatar
Dr. Kaan Gündüz 10/3/2019 8:43 AM
You just defined our lab
👍 1
8:44 AM
We use dittodx for imaging
8:44 AM
To nas share
Avatar
How do you deal with phone extractions in that environment? Manual examinations etc too? Take it that all gets done from the imaging machines?
Avatar
Dr. Kaan Gündüz 10/3/2019 8:45 AM
Not all
8:45 AM
Let’s say most
8:45 AM
Mini pcs for cellebrite
8:46 AM
And z840s for manual stuff
8:46 AM
But virtualization is solid
Avatar
Interesting. The z840s for manuals sounds like overkill haha but I'm assuming they have other uses. Definitely, can see the industry going that way. (edited)
Avatar
Dr. Kaan Gündüz 10/3/2019 8:48 AM
You will see dockerized forensic software
8:48 AM
And swarms
8:48 AM
That is the near future
8:49 AM
FAAS
Avatar
K8s style deal. Think we are a long way off of that. That's the thing with containers, they are the future but are not always useful / applicable for every environment. Fun to see the progress though
Avatar
Dr. Kaan Gündüz 10/3/2019 8:50 AM
Fun it is
Avatar
@Andrew Rathbun but ufed not working over RDP you mean sharing your locally connected dongle, or dongle being connected on host and it doesn't work once you connect to the host over RDP?
Avatar
Dr. Kaan Gündüz 10/3/2019 9:04 AM
The latter
👆 2
Avatar
NoMachine would be worth a try then. Performance and quality is decent.
Avatar
Andrew Rathbun 10/4/2019 3:29 AM
TGIF everyone
Avatar
Dr. Kaan Gündüz 10/4/2019 3:35 AM
friday is the day all problems emerge out of nowhere
3:35 AM
FF
Avatar
Andrew Rathbun 10/4/2019 3:57 AM
at 4pm
💯 2
Avatar
Andrew Rathbun 10/4/2019 5:10 AM
BlackBag is increasing their prices starting 1/1/2020 by an average of 18%
5:12 AM
SMS for existing licenses: BlackLight - $995 USD MacQuisition - $640 USD Mobilyze - $775 USD New licenses: BlackLight - $2995 USD MacQuisition (120gb) - $1270 USD MacQuisition (1tb) - $1620 USD Mobilyze - $775 USD Softblock - $520 USD
Avatar
blimey, big jump for Blacklight
5:15 AM
and MacQ - how is that 18%? those prices have doubled/tripled 😂
Avatar
Andrew Rathbun 10/4/2019 5:16 AM
At least the SMS is reasonable 🤷
Avatar
sorry I am being an idiot
5:17 AM
I didnt read that right, I was comparing them both ie first existing and the 2nd list new prices !
Avatar
Andrew Rathbun 10/4/2019 5:17 AM
Hahaha woops!
5:17 AM
a
5:17 AM
It's friday..
Avatar
Andrew Rathbun 10/4/2019 5:18 AM
MacQ is a great tool though. All those SMS prices are very reasonable, too. Sub-$1k USD.
5:18 AM
It's the best mac imaging tool, imo
Avatar
Andrew Rathbun 10/4/2019 5:18 AM
BlackLight is the only one that stings the first year.
Avatar
Yeah, also a good tool
Avatar
Andrew Rathbun 10/4/2019 6:25 AM
As an aside, by my math we are 3 members away from 2000!
6:25 AM
I'm only counting members assigned to a role, not the 35 sitting in New Members right now
👍 7
🎆 2
Avatar
Dr. Kaan Gündüz 10/4/2019 12:02 PM
how is this possible?
12:03 PM
36K+ computer forensic experts? I wonder if there are that many in the world.
Avatar
Andrew Rathbun 10/4/2019 12:03 PM
They've been around a lot longer than us. Lots of people probably have retired, switched jobs, forgot about it, etc
12:04 PM
I count for 2 of those. I had an account for my previous employer and now I have one that's my same username here which I'll ride out the rest of my career
Avatar
Dr. Kaan Gündüz 10/4/2019 12:04 PM
Well, i deleted my account.
Avatar
Andrew Rathbun 10/4/2019 12:04 PM
Also, we're at 1999 members so I'm just waiting for one more person to get assigned a role...
Avatar
Dr. Kaan Gündüz 10/4/2019 12:04 PM
ah the wait...
Avatar
I posted on there a few times when I first started. I haven't been back except when all else fails
Avatar
Andrew Rathbun 10/4/2019 12:05 PM
I go on there every couple weeks just to poke in and see what's what
Avatar
Dr. Kaan Gündüz 10/4/2019 12:06 PM
no need, i can summarize what happens
Avatar
Andrew Rathbun 10/4/2019 12:06 PM
I'm glad it exists because some people don't like listservs or don't like real-time chats like this or IRC. Something for everyone and everyone can choose which flavor they like
Avatar
Dr. Kaan Gündüz 10/4/2019 12:06 PM
step 1. you ask a question
12:06 PM
step 2. someone mocks you
👍 1
Avatar
@Dr. Kaan Gündüz I am glad you said that.
12:06 PM
I feel like there were some very condescending answers on there
Avatar
Andrew Rathbun 10/4/2019 12:07 PM
Step 2 has always been my favorite part about this server and the people in it. Because step 2 doesn't exist here and it won't be tolerated.
👌 2
💯 1
Avatar
Agree @Andrew Rathbun
Avatar
Dr. Kaan Gündüz 10/4/2019 12:07 PM
thank you all for this server
Avatar
Discord=the brain child of a few people chatting on IRC about forensics......well mostly crypto at the end if I remember right. LOL
Avatar
Andrew Rathbun 10/4/2019 12:10 PM
This place has to be comfortable for the least experienced, most intimidated examiner. There are no stupid questions! We're all trying to put away bad people or just to further our investigations regardless of the nature of the case.
👍 1
12:10 PM
@sholmes yep crypto was a big part of the last leg of it haha!
Avatar
crypto and dreams
💯 1
Avatar
@Andrew Rathbun Are there balloons, cake and drinks for the 2,000 member ? I’m tempted to deactivate and come back at the 2,000 member. I like cake ! (edited)
🍰 2
🇨 2
🇦 2
🇰 2
🇪 2
🇸 2
Avatar
Dr. Kaan Gündüz 10/4/2019 12:15 PM
😍 1
Avatar
kmacdonald1565 10/4/2019 12:17 PM
Avatar
Dr. Kaan Gündüz 10/4/2019 12:18 PM
greenest avenger
Avatar
Did I just hear @Andrew Rathbun is buying dranks to celebrate #2000
💯 1
Avatar
Yeah pretty sure @Andrew Rathbun committed to that in our super secret mod chat!
💯 2
Avatar
Andrew Rathbun 10/4/2019 12:23 PM
🍻 for all
🍹 3
🍻 6
🍺 3
Avatar
Dr. Kaan Gündüz 10/4/2019 12:24 PM
and all for 🍻
Avatar
Looking for a method to tell if an iPhone was wiped. I don't have the .obliterated file, but there isn't squat on the phone even though the bad guy says there should be.
2:39 PM
and I have a Full File System extraction of the iPhone.
Avatar
Andrew Rathbun 10/4/2019 2:53 PM
@sholmes check any dates on the system apps or when contacts were created. Think of the first things you do when you reset your phone
👍 1
Avatar
That worked to tell when things started on this device. Thanks.
👌 1
3:04 PM
Now to work through what he did to have such a "clean" phone.
Avatar
@sholmes check health dB. It tracks updated etc. Worth a look there
Avatar
Thanks @CLB-Paul I checked that as well. Everything seems to have started on the same day. Now I just need to figure out if he actually used this phone the way he claims he did.
Avatar
Andrew Rathbun 10/6/2019 12:37 PM
Home Secretary Priti Patel last night (Thursday 3 October) signed an historic agreement that will enable British law enforcement agencies to directly demand electronic data relating to terrorists, child sexual abusers and other serious criminals from US tech firms.
👍 3
Avatar
That will be extremely useful
Avatar
Andrew Rathbun 10/7/2019 4:32 AM
LE UK will have to keep us appraised if it actually makes a difference and when it actually happens
👍 1
Avatar
awesome!
Avatar
Looking for insight on what y'all think I should be looking for on an iPhone. Did research this weekend and came up empty. Bad guy claims to have used the phone to view porn the night before, but when the phone was seized the history was clear. I have the full file system from the phone and it is processed through Axiom. No internet history relevant to porn or images found on the phone. There are also no text messages, only a couple hundred phone calls in the logs, and a few contacts. No obvious super secret apps. No files showing the phone was reset, and files on the phone indicate he most likely activated the phone at Verizon in January.
6:23 AM
So is there anything I should be checking for activities bad guy claimed to have done on the phone. Word searches have come up empty for standard porn words.
6:23 AM
And GO!!!
Avatar
forensicmike @Magnet 10/7/2019 6:46 AM
@sholmes Depending on the app used, KnowledgeC has the 'Now Playing' log type that I have seen to show the actual names of videos (even advertisements are distinguished) and how long they were on the screen for.
👍 1
6:47 AM
Even if it wasn't logged as Now Playing, let's say it was some kind of specialty app with its own player, you should be able to use App in Focus to help corroborate or refute what he is telling you.
Avatar
@sholmes might want to see if they were using a gmail account to obtain that info from google. They could have internet history also look into icloud subpoena as well. What browser were they using or application to view said porn?
7:16 AM
Knowledge C like @forensicmike @Magnet suggested is good also running apollo script on it might produce some artifacts as well.
7:17 AM
you can pull out all sql.db and then grep through them as well with some keywords. I do have some python scripts to pull all sql db and plists out of an iOS dump if you want.
Avatar
Thanks guys. I knew the group would have some good suggestions. @San4n6 DM sent
Avatar
Semantics 21 (Tom) 10/7/2019 7:49 AM
@sholmes if you have a copy of BlackLight , the Apollo scripts are now built into our program. Process using the Comprehensive option and try content searching for indicative words. Failing that, can you carry out a Apple data request? https://www.blackbagtech.com/blog/2018/05/31/apple-icloud-production-service/
Based on news reports some may assume Apple doesn't respond to search warrants, but BlackBag has successfully worked with Apple iCloud production sets.
Avatar
Thanks @Semantics 21 (Tom) we do have BlackLight. I will see what it finds as well. Thanks
7:59 AM
@forensicmike @Magnet can a user clear their KnowledgeC Now Playing section.
8:00 AM
Using your information above, I can see where he used Safari for one hour the night before the phone was seized. This could be consistent with his story. KnowldegeC Media History ends earlier in the night. Like 4 hours earlier. So I was wondering if he could have cleared that too (edited)
Avatar
forensicmike @Magnet 10/7/2019 8:01 AM
Not heard or seen evidence of any such thing. I would expect if it was somehow possible (besides factory resetting) to purge knowledgec it'd be all or nothing
Avatar
that is what I thought too
Avatar
forensicmike @Magnet 10/7/2019 8:01 AM
But bear in mind there is a distinct possibility if he is using some other app to view porn that it wouldn't show up under nowplaying.
Avatar
true.
8:02 AM
good reminder
8:02 AM
I am trying to use his admission as a guide, but not lock myself into the belief he is an honest individual. 🙂
Avatar
Forensicator1005 10/7/2019 7:46 PM
@sholmes perhaps viewing it in private mode and closing tabs when done?
Avatar
Thanks @Forensicator1005 it is possible I guess. Weirdly I found lots of internet activity through knowledgeC database. However, I never found data showing he watched videos. He was using about 100mbs of data in an hour a few times, but that just shows data usage and not where he was visiting through safari.
7:49 PM
@forensicmike @Magnet did a lot of work helping me today. He showed that if you used private viewing it would still be in knowledgeC
magnetforensics_alt 1
7:50 PM
So I think at this point we showed he used the phone for internet access, but couldn’t show what.
7:50 PM
Not even cached images of anything
Avatar
Forensicator1005 10/7/2019 7:51 PM
@sholmes what about if he used the hotspot feature on the phone and was connected to it with another device and that device was being used to,view it instead of the one you have?
Avatar
I am definitely leaning towards he possibly has other devices.
Avatar
Good morning everyone. I might have a somewhat stupid question... I got a case recently involving Bitcoin transactions. My culprits seem to have used MtGox to sell their BTC. As MtGox was hacked 6 years ago, I was wondering if anyone knows where to find the old MtGox database? The one you can find using regular search engines seems to be incomplete, as the real one should be around 200GB.
Avatar
Semantics 21 (Tom) 10/8/2019 12:04 AM
#computer-forensics BlackBag Technologies has just released a new Buyback program which reduces a copy of BlackLight to £1125 (LE) & £1600 (Corp) More info can be seen here: https://offers.blackbagtech.com/buyback2019?utm_campaign=Buy%20Back%20Program%202019&utm_source=hs_email&utm_medium=email&utm_content=77674666&_hsenc=p2ANqtz--wvYO7x91uPugKpVESC4s4A_Kkmh4vQvgq-Gy09zogW7rsA0nIVp6X2zSzU_P-vIuWi6ARmDTV0Q02O005SK3wNzd8hA&_hsmi=77674666 (edited)
Are you tired of your forensic tools underperforming? Make the switch to BlackLight and save for a limited time.
BlackBag 1
Avatar
@Cellebrite or anyone else. Is there anyway to generate a report from PA where the attached images are not resized? I got a chatt with over 700 messages that include attachments and our prosecutor want the image viewable with the text...
Avatar
"....a process which prevents law enforcement from using forensics tools against your phone...." https://arkadiyt.com/2019/10/07/pair-locking-your-iphone-with-configurator-2/
Learn how to pair lock your iPhone to break law enforcement forensics tools and protect your data.
Avatar
RubberDucky 10/8/2019 5:18 AM
Thanks! Very interesting @Colman
👍 1
Avatar
@.karate. were you able to unpack newer Huawei firmware files, those .APP? I'm trying to revive LDN-L21 and can't get it fully flashed. There's always on error on system partition. I was able to write system.img fully via EDL mode, but it's mismatched and it boots into diagnostics mode instead. Old unpacker for Huawei doesn't work on those APP files, 7zip sees the file but can't extract system.img fully. I doubt firmware file is corrupted as it's the same on multipile ones
Avatar
@Arcain i think you need to convert it into a ext4 image if you flash it via EDL.
7:48 AM
If i remember correct i used simg2img before flashing it
7:49 AM
if you run "file" on the system.img, what is the response? Or if you try to mount it. I dont think you can 🙂
7:54 AM
Maybe i was a bit quick on the response. If i understand correct, you cant even extract the system.img from update.app ? Or can you extract it, and it then fails? In my case above i assumed you could extract system.im. Then run simg2img on it, and then flash it
Avatar
It was never required to convert those files if you extract them out a firmware files, for any brand really. EDL isn't any different that flashing in fastboot or erecovery, it doesn't convert them in the fly. I have a board firmware from AL10 version and partially flashed it with files from there. I get a logo, OS is booting and then black screen and it goes into 9006 mode.
7:56 AM
I can't fully extract system.img from .app file, with 7zip i get unexepected data end
7:57 AM
when flashing with dc-phoenix each time i see "Extracting partition SYSTEM... Erasing SYSTEM partition Partition SYSTEM erased Writing SYSTEM partition sending sparse file 534712284 bytes Waiting for answer... send sparse file ERROR SYSTEM partition UPDATE :FAIL Bogus chunk size for chunk type Raw"
7:58 AM
older .APP files required special app to extract them but this software no longer works on this firmware
Avatar
@Arcain splitupdate.pl ?
8:04 AM
./splitupdate UPDATE.APP 00000000 ERECOVERY_KERNEL 44.69MB 2019.02.21 15.14.22 00000000 ERECOVERY_RAMDIS 28.97MB 2019.02.21 15.14.23 00000000 ERECOVERY_VENDOR 2.62MB 2019.02.21 15.14.23 00000000 SYSTEM 2.51GB 2019.02.21 15.14.23
8:04 AM
Running on LDN-L21 8.0.0.155(C185CUSTC185D1)
Avatar
I was using this before HuaweiUpdateExtractor_0.9.9.5
Avatar
What firmware are you trying to extract?
Avatar
London-L21B 8.0.0.100(C432CUSTC432D1)_Firmware_Android 8.0.0_EMUI 8.0.0_05015DWV
Avatar
I sent the script to you in a dm
Avatar
Yes, thank you
Avatar
Has anyone conducted any tests with the find my iphone and remote wipes with the new capbailities of iOS 13 communicating with devices that are off? From what I been reading and want to test can someone remote wipe with this new feature?
apple1 2
Avatar
@San4n6 this is news to me do you have a link to the article ?
Avatar
chrisforensic 10/8/2019 12:48 PM
@Arcain @.karate. just for info.... UMT Qfire can extract update.app without errors....
Avatar
I don't have this one but script provided by @.karate. did the job as well.
Avatar
chrisforensic 10/8/2019 12:51 PM
Oh, good.... maybe i can get the script too? @.karate. thanks (edited)
Avatar
Improve split_updata.pl for Huawei phones. Contribute to marcominetti/split_updata.pl development by creating an account on GitHub.
👌 1
Avatar
A mac maniac that works in the lab was talking about it today. So I will get that info from him
Avatar
If you've ever used the Find My iPhone and Find My Friends apps in iOS 12 and below, you may be surprised to hear that those apps have joined forces in iOS 13. Now, instead of two separate apps, they're combined into one convenient package. But what does that mean for you and...
2:00 PM
New to iOS 13 is "Offline Finding," one of the best new features in the Find My app. In previous versions of iOS, if your device had no internet connection or a thief turned off cellular data and Wi-Fi, it would prevent you from tracking it since it has no way to send its location. With the new "Enable Offline Finding" switch on, your iPhone will also use its Bluetooth signal to report the device's location to any nearby Apple devices using end-to-end encryption. So if a thief turns off cellular data and Wi-Fi but leaves Bluetooth on, or more likely, if you forget your iPhone somewhere and there's no mobile reception or hotspot to connect to, Bluetooth can still save the day.
Avatar
@San4n6 Thanks for sharing. They say the offline phone emmits location by bluetooth to other devices... have you found the answer or any indications on remote wipe using bluetooth with other devices coming into contact ?
Avatar
no I have not had time to test this
5:05 PM
I am assuming its only a location using bluetooth but someone said something different so I just raised the question
5:05 PM
hopefully i can test it
Avatar
And that question has major impacts 😱 (edited)
Avatar
@San4n6 @Kramnias I'm currently testing this out. Setup a clean iPhone with 13.1.1 and enabled Offline Finding. Phone was then put in flight mode with bluetooth still enabled. Then logged in to iCloud in a browser and chose erase device. Also tried the Locate device option. None of this has worked - the phone did not wipe and no notifications has come up so far. The phone is surrounded by "live" iOS devices with bluetooth enabled, also running iOS13. Not sure if I missed something or if this feature hasn't been rolled out in my country or if some other explanation is at play here.
3:41 AM
Perhaps the wipe request has to be sent from an actual iOS device and not just from webbrowser on a Windows PC? I don't know. I don't have access to a second iOS test device right now.
Avatar
I have wiped via iCloud so you set it up correctly. I will try to do some testing here but I do not think its country specific but that could be a thing. Thanks for testing this out since you should be able to locate it at least per Apple.
Avatar
Andrew Rathbun 10/9/2019 7:06 AM
Oxygen Forensics Detective 12.0 just released. Sounds like a new UI and everything
Avatar
Anyone have problems submitting search warrant through the Facebook LE portal? I just keep getting the error "There was a problem creating the case. Please try again". Of course there is no number or email listed to contact them.
Avatar
Andrew Rathbun 10/9/2019 10:09 AM
Reposting from Steve Whalen of @SUMURI on the IACIS listserv: Hey Everyone, Just some quick advice. If you are using a Mac for forensics do not update to Catalina (10.15) just yet (my opinion only). There are a lot of changes in this build and if you follow the news there are a lot of issues to be addressed. Also, if you have 32-bit applications they will not work. Stick with last version of 10.14 until Apple works out the bugs. Best wishes! Steve (edited)
Avatar
UnholyHeresy 10/9/2019 11:08 AM
Hello guys thanks for the add, i will be lurking for a bit. Im particulary interested on learning about cyber-threat intelligence, so maybe i will do some questions in the future. Also being a lawyer i can help with legal questions, so if that would be of any help please let me know.
Avatar
Deleted User 10/10/2019 12:58 AM
@BETBAMS: The new offline location with iOS devices only works if you access it from a second iOS device that belongs to you. Since the location is encrypted only your devices can decrypt the location data that is distributed via Bluetooth. So you can
12:59 AM
@BETBAMS: So you can't use the icloud.com website. Also, as far as I know, this Bluetooth communication is only one-way, meaning the device cannot receive a wipe command via Bluetooth.
💯 4
12:59 AM
It just broadcasts its location into the world, hoping for some other iOS device to pick it up
Avatar
anyone else have an issue with UFED Cloud Analyzer not generating UFDRs
Avatar
It's always painful to do a UFDR with UFED cloud. It takes long time and then you have to import to PA to recreate an other UFDR with the complete extraction of the cloud and the phone.
Avatar
@Deleted User Thanks for clearing that up. I guess I need to find me a second test-iPhone. I wonder what my boss thinks about that... 😄 (edited)
Avatar
Adam Cervellone 10/10/2019 7:16 AM
Does anyone happen to know what kind of connector this is? I am pretty sure the top slot is for a microSD card.
7:22 AM
there's a link to the 156mb PNG file below
7:22 AM
not having any luck yet, but passing the link along in case you forgot about this picture
Avatar
Adam Cervellone 10/10/2019 7:31 AM
Thanks! That device is a covert camera disguised as an AC adaptor so I am trying to figure out how to see the data. No SD card was in it so it could be empty.
Avatar
Andrew Rathbun 10/10/2019 7:32 AM
@Adam Cervellone I've used one of those before and they are awesome. Data will be stored on the SD card. That's probably a female end for a proprietary power cable
7:32 AM
Looks like it's trying to be USB-C but it's rectangular
7:33 AM
Those covert cameras have a .txt file on them where you can modify the date/time and a couple other minor settings. They're really cool. Used them in a few fraud cases for stuff like people stealing from money from a cash register, etc
Avatar
Adam Cervellone 10/10/2019 7:38 AM
This one was in near a toilet in a funeral home😆 I also have an iMac in this case too for some reason. I guess the thought is that videos might be on the business's iMac
Avatar
Andrew Rathbun 10/10/2019 7:38 AM
@Adam Cervellone a reasonable assumption. Hopefully that ends up being the case
Avatar
UnholyHeresy 10/10/2019 10:03 AM
Quick question. How often are these covert camera devices used with criminal intent ? And are these cases with a higher degree of sophistication insofar as the technical capabilities of the perpetrator ? (edited)
Avatar
Andrew Rathbun 10/10/2019 10:19 AM
For those particular covert cameras that are AC Adapters, I think it's probably more acting on their twisted urges than being technical. My grandma could set up one of these successfully. Just insert a microSD card, plug it in, and you're off. They are just very convincing because it looks exactly like an everyday AC Adapter. In terms of how often? I'm sure there are more out there than we're aware of. That's the whole point of them, right? 🙂
Avatar
UnholyHeresy 10/10/2019 11:45 AM
oh i meant if there any cases which they have been deployed to deliver a sophisticated attack (edited)
11:49 AM
i was thinking more of higher crime not the type that involves a creeper that wants to put this on a bathroom, but more like utilized for exfiltrating sensitive information type of deal
11:50 AM
but that also answers part of my question much appreciated @Andrew Rathbun
👌 1
Avatar
Forensic@tor 10/11/2019 8:43 AM
Let it run. It took hours today for my report to gen on 17GB. It will finish.
Avatar
kmacdonald1565 10/11/2019 9:10 AM
long, not overly technical question incoming (sorry): so our big conference room has an old shitty ~60 inch TV in it (no hdmi; more or less broken audio; etc). i have been making the case to get a new one for a few years and recently some bosses were up set that certain things werent working...go figure... The room is used for conferneces, union meetings, case discussions, surveillance operations during some bigger cases, etc. Room is 22' x 28' x 9' with the TV currently and likely to continue to be along the 22' wall. The maximum width for a TV is approximately 85 inches on that wall due to whiteboards which i know they will likely want to keep. Some space at the other end of the room is also lost because it is a pseudo break room with kitchen equipment. my questions to all of you would be do i push for a bigger TV (80 inch) with sound bar (based on audio complaints in the past) or a projector with a larger screen (~120 inch, maybe more; because some details and documents viewed are small) and opt for say some good speakers or sound system of some sort? also, do you have any recommendations on what product to buy or stay away from. we are looking for something solid with standard connections. I am pushing to move away from VGA but want it as an option incase it is needed....but again not manditory. not looking to start some big debate but want to know which you think is more valuable for the money. TV will be generally better viewed when lights are on but it is significantly smaller. I think the TV is the easier route, not that i am installing, but probably will weigh on the decision makers. I also feel like the TV will "just work" with a single HDMI connection where as the projector with separate audio might be an issue for..ahem..some of our seasoned staff. I think i know my vote but dont want to bias anyone here because i am looking at all options.
Avatar
Andrew Rathbun 10/11/2019 9:24 AM
For a room that size I'd say the TV with sound bar is probably the more reasonable bet. If it were bigger, the projector would be a better choice.
9:25 AM
TV would be lower maintenance for the seasoned staff, too. Lol I like the way you put that
9:26 AM
Get one of those massive ones that slap you in the face when you walk into Costco lol
Avatar
Forensic@tor 10/11/2019 9:29 AM
I would say the TV route as well. Cost will be slightly lower than a quality projector with sound system.
Avatar
new mac terminal in zsh why not 🐠
Avatar
Dr. Kaan Gündüz 10/11/2019 4:39 PM
forensic explorer 5 is relased. pretty cool.
Avatar
Andrew Rathbun 10/11/2019 4:41 PM
Release notes?
4:41 PM
I used it a couple times and really liked what I saw
4:45 PM
new version of fexcli is also out there
4:45 PM
Forensic Explorer Command Line (CLI) is tool for processing large volumes of electronic data in e-discovery.
4:47 PM
Avatar
Andrew Rathbun 10/11/2019 4:49 PM
Nice. I always loved that window on the bottom right. Really underrated tool
Avatar
Dr. Kaan Gündüz 10/11/2019 4:50 PM
now it can use 3rd party tools in fex gui
Avatar
Andrew Rathbun 10/11/2019 4:58 PM
That is pretty sick
4:58 PM
Nice work @GetData
Avatar
Looking for a crimes against children detective in Arizona please DM
Avatar
francoblanco 10/13/2019 10:28 PM
Does anyone have experience with recent Android-smartphone where the internal wifi-adapter can be put in monitor mode (useful for wifi-sniffing) ?
Avatar
Can be done if its rooted, right?
10:31 PM
also @Andrew Rathbun that reddit post was a good laugh
👌 1
Avatar
francoblanco 10/13/2019 10:40 PM
It's not because it's rooted it can be put in monitor mode. The chipset has to support it as well. The problem is that a lot of smartphones use a SoC with integrated WiFi that can NOT be put in monitor mode.
Avatar
Oh I didn't know that. I assumed most would just support it.
Avatar
francoblanco 10/13/2019 10:46 PM
No, only a minority support it.It could be a useful tool instead of using a laptop, Raspberry Pi, ...
Avatar
Kali has a mobile based distro don't they
Avatar
francoblanco 10/14/2019 12:50 AM
yes, nethunter ... but if the hardware doesn't support it ...
Avatar
Question about mobile device extractions. How are you cataloging all of the folders and files. Here is my situation, my workstation is in another physical location. I transfer these files back to my agency and upload them to a server under the case folder and the evidence item number. It feels like there has to be a better way to maintain these and link them to the cases, is there?
Avatar
Andrew Rathbun 10/14/2019 8:41 AM
So your setup is Case#\Evidence#\Contents? If so, that's what I've always done, too
8:42 AM
We also have datasheets associated with each phone/computer image that has a lot more details about the dump
Avatar
Yeah, that is exactly right. Yeah I have my excel as well, originally to keep track of when I finsihed it and if I could go back and get more. @Andrew Rathbun what are your headers on your spreadsheet you are tracking?
Avatar
Andrew Rathbun 10/14/2019 8:49 AM
I don't use a spreadsheet. We have fillable PDF forms for each device we image where we can specify details about the dump. We also have another form (federal gov't lol) where we summarize all the images for a specific case/operation which gives a high level look at everything dumped. Lots of duplication of effort but it is what it is
Avatar
Gotcha! TY
Avatar
Andrew Rathbun 10/14/2019 8:52 AM
I do also keep a spreadsheet on the side that keeps track of the stats the bosses ask about a few times a year (duplication of effort but it helps in the long run), like amount of data analyzed, how many devices, etc
Avatar
For sure. Yeah, that is my go to for pivot tables / quick graphs when I am creating a proposal. Presenting visualized data is pretty powerful when I am going to ask for something.
Avatar
I have a software question for you folks... My office currently has an active license for Blacklight and Axiom. My FTK just expired but I haven't actually used it except to blow an e01 back onto a drive in the last six months. Am I missing something huge with FTK? It has always seemed to be more complicated and less forgiving than Axiom. I don't think Axiom is perfect but it's pretty good from what I've seen.
9:28 AM
I have been considering spending that FTK money elsewhere
9:30 AM
mostly i was thinking about OSForensics from a demo I saw recently. I've had forensic explorer in the past but only used it to live boot acquisitions so that has since lapsed as well
Avatar
Forensic@tor 10/14/2019 9:45 AM
I have used most of the traditional software and they all have the pluses and minuses. I am most familiar with FTK. I am transitioning to XWays, as soon as I can get some training on it. It is lightweight and powerful. I will keep my FTK and Axiom licenses as they are good tools.
Avatar
Andrew Rathbun 10/14/2019 9:50 AM
@whee30 if you had FTK money to spend, what would you buy instead?
Avatar
I want xways but have no formal training on it other than NW3C stuff around six years ago. I feel like verifying data in the hex would be way easier in xways than axiom. I like some of the features of OS Forensics but have never actually used it.
Avatar
Andrew Rathbun 10/14/2019 9:52 AM
X-Ways is like 20mb. That's insane lol
Avatar
the FTK renewal would cover either one but not both
Avatar
Andrew Rathbun 10/14/2019 9:52 AM
I'd suggest checking out ForEx too. Get a demo
Avatar
never heard of forex, i'll go look. I also liked semantics21 but I don't JUST do CAC investigations and that tool seems to be specifically geared toward it
Avatar
Andrew Rathbun 10/14/2019 9:55 AM
ForEx is made by @GetData. Get a demo and see if it'll fit your needs instead of FTK. They have a cool live boot feature too. This message is not sponsored by them lol but it's an overlooked tool
9:56 AM
Price should be more wallet friendly too
Avatar
oh forensic explorer - I had it but i didn't "get along" with it
9:57 AM
for some reason I couldn't get into it. I liked the live boot feature a lot and thats all I would use it for
9:57 AM
My license on that lapsed two weeks ago
9:57 AM
I can still use the old version as long as I don't update, AFAIK
Avatar
Dr. Kaan Gündüz 10/14/2019 11:45 AM
@whee30 we have been using FEX for 3 years, you can buy 5 licenses from @GetData for the price of 1 ftk license. pretty fast and has many features. i'd check out v5. (edited)
💯 1
Avatar
Galaxy Note 8 question, i have a N950U that is locked and lock pick would not work. I see that the N950F has a physical decrypted bootloader but the prompt says to go to recovery mode wipe the clear partition and and proceed. If it fails to boot to use the Exynos recovery.
12:58 PM
My question is it appears both phones are using qualcomm snapdragon chips. If i use the N950F profile on the N950U clearing the partition will i wipe the phone ?
1:00 PM
1:00 PM
Never mind appears another website is saying the N950F does use the Exynos chip not the Snapdragon like phone scoop says it did.
Avatar
Deleted User 10/15/2019 3:25 AM
[UK] with ACPO being effectively moved to NPCC, does anyone know if they ever revised the DF Guidelines?
Avatar
maybe someone can help me out.... I am trying to generate an export list using Xways. I have found all deleted files and I am ready to generate the report. I noticed that Xways, prior to export, recreated original names of deleted files, so I thought, great info. However, once I exported the data to the report, the original names were not included in the exported report. Anyone dealt with this before? Is it a simple setting that I am over looking? Any help would be appreciated.
Avatar
Anyone going to be at OSDFCon tomorrow?
Avatar
Andrew Rathbun 10/15/2019 1:46 PM
@JaiRoc I think @San4n6
Avatar
Semantics 21 (Tom) 10/15/2019 1:54 PM
@whee30 are you aware that BlackBagTech has a buyback offer running at the moment, you can exchange your FTK or Axiom/EnCase license into another BlackLight at a discounted price. https://offers.blackbagtech.com/buyback2019?utm_campaign=Buy%20Back%20Program%202019&utm_source=hs_email&utm_medium=email&utm_content=77674666&_hsenc=p2ANqtz-_hr2rAgU0ZmodW0awlWPm1o3ijrP6eaeWifWdtZtSJPSrFxhEW-AG534kv40oQGFpojJRRVIoYPpHK52IE1vvi2x8taw&_hsmi=77674666
Are you tired of your forensic tools underperforming? Make the switch to BlackLight and save for a limited time.
Avatar
@Semantics 21 (Tom) Thanks - but I'm a one man department and I already have it
Avatar
Semantics 21 (Tom) 10/15/2019 3:31 PM
@whee30 no problems, Xways and BlackLight is a great combo
Avatar
MrMacca (Allan Mc) 10/16/2019 5:53 AM
Does anyone have a good guide to follow, that will explain how to recreate an unknown Raid configuration?
Avatar
UnholyHeresy 10/16/2019 8:19 AM
Hello i have a quick question, i was exploring the filesystem permissions for a chinese made phone, why would the camera have access to the android.fingerprint_manager ?
Avatar
Andrew Rathbun 10/16/2019 8:20 AM
Maybe because the camera is tied in with biometric authentication (face)?
Avatar
UnholyHeresy 10/16/2019 8:23 AM
hm, this device doesnt have that authentication method
Avatar
@UnholyHeresy I read through most of it, basically defense complained about grabbing surface level pdf screenshots of a facebook account and said that prosecution can't rely on it because it doesn't collect every item in their original forms... despite later obtaining a copy of the items from facebook?
10:15 AM
looks like all the evidence was upheld unless I'm reading it wrong
Avatar
UnholyHeresy 10/16/2019 10:27 AM
@whee30 Indeed, also to be note that when transferring said files the format of the files could have changed thus potentially altering the properties of the evidence due to improper handling, the defense also recurred to an "expert" on the digital forensic analysis that validated the improper handling claiming that for evidentiary purposes software such as X1, Inspector Hunchly, Webcase could have been implemented and given the capability of hashing the file the evidence could have been better preserved (since you can ensure nothing change by comparing hashes)
10:29 AM
the part where they argument that Awesome Screenshot is greyware and thus seemingly not a reliable tool to obtain said evidence really catches my attention, this means that defense can opt to attack and discredit tools if they aren't from reliable source
Avatar
UnholyHeresy 10/16/2019 10:37 AM
Assesing evidence loss due to unacceptable negligence Canadian law: "The police cannot be expected to preserve everything that comes into their hands on the off-chance that it will be relevant in the future. In addition, even the loss of relevant evidence will not result in a breach of the duty to disclose if the conduct of the police is reasonable. But as the relevance of the evidence increases, so does the degree of care for its preservation that is expected of the police."
10:38 AM
I did not expect Canadian jurisprudence to be this fascinating to be honest, but if i get my hands on something similar i would like to share with the server if it is ok
Avatar
anyone in the NYC area? any good conferences going on in the area these days upcoming?
Avatar
Anyone deal with ADT for obtaining video footage? Can not locate contact info. Their app is “Pulse”
Avatar
Andrew Rathbun 10/16/2019 11:08 AM
ADT Security Services Online Service: ADT Security Services Online Service Address: 3190 S. Vaughn Way. Aurora, CO 80014 Phone Number: 888-238-2727 Note(s): ADT onlyaccepts subpoena by mail. Last Updated: May 2019
11:08 AM
@dmac
Avatar
The only way to contact them is by mail?!
Avatar
Andrew Rathbun 10/16/2019 11:09 AM
I would call them at that number listed above
11:09 AM
and go from there but sounds like for legal process it's by mail only. I'm sure a human on that line can confirm
11:09 AM
Search.org is typically kept up to date by their userbase
11:09 AM
I know I always send updated info to them when I get it
Avatar
Awesome, thanks!
Avatar
Andrew Rathbun 10/16/2019 11:10 AM
@pop_scotch might be worth asking in #training-education-employment since that's where most of that conversation occurs so it doesn't get lost in the shuffle
1:03 AM
Volatility 3.0 released on GitHub
1:08 AM
Public beta, I should say
Avatar
Anyone good with Hopper v4 I need a way to get Str list to a text file. I am sure this might be a limitation of the free version
7:33 AM
So might go to ghidra to do so
Avatar
disregard got it with Ghidra
Avatar
GraemeHorsman 10/19/2019 5:09 AM
What are people’s thoughts on ISO17020 and it’s impact on DF?
Avatar
I got a heads up that I have a gps tracker waiting for me at work when I come back. Anyone work on one in the past? The advert for the item claims no data is held locally. I’ll dump the sim of course and I would assume serve a warrant to the company. Anyone know how to work one of these devices? https://get.spytec.com/gl300-buy-now/?campaignid=2061031431&adgroupid=81774494811&keyword=&matchtype=&device=m&network=u&targetid=pla-784875518581&gclid=EAIaIQobChMI3q_f-I2q5QIVYRitBh2vCAboEAQYAyABEgKdu_D_BwE
Avatar
divemonkey. 10/20/2019 3:09 AM
@whee30 this tracker is quite popular and has the ability to send UDP tracking data to a server so it has some sort of OS. I have never taken one apart but I have used them before
💯 1
3:10 AM
You can command them over SMS or IP
3:10 AM
You can program them so there is NV storage
Avatar
LE Question: How are your departments storing evidence files that are bigger than will fit on a blu-ray disc? We have been in the past keeping evidence on a per case basis but this is getting costly to buy a 64GB or 128GB USB for every case that won't fit on a blu-ray.
Avatar
Andrew Rathbun 10/21/2019 7:42 AM
@ds275 do you segment your image files?
Avatar
no, but that has come up as an option.
Avatar
Andrew Rathbun 10/21/2019 7:43 AM
That may be your solution then. do 2GB segments on your image files and then bundle the blu-ray discs together and label them appropriately. So disk 1 has E01-E10 on it. Disk 2 has E11-E20 on it, etc
7:44 AM
Just an idea I pulled out of nowhere. Never done that but it makes sense to me
Avatar
With the newer technology of cell phones, even our Cellebrite reports are up over 40GB's.
Avatar
Andrew Rathbun 10/21/2019 7:45 AM
Do you have to store your generated reports on a blu-ray? Or can you just store the images and generate the reports any time in the future? Maybe that's an opportunity to change from storing reports. Unless the generation of the reports at the time of the analysis with the version used is important to you
7:46 AM
For instance, I never store my generated reports because they can be generated again in the future, if needed.
7:46 AM
But every shop is different and there's nothing wrong with either method
Avatar
That's why I am asking around. We are re-evaluating our whole system now. Trying to find out what other LE agencies are doing.
7:47 AM
I was wondering if anyone is using an 8TB NAS or something similar to archive evidence files from different cases?
Avatar
Andrew Rathbun 10/21/2019 7:47 AM
My previous agency did not segment image files. Looking back on it, it probably would've been better to as it gives more flexibility for issues like what you're bringing up. Also, if you're transferring a 100GB image file from point A to B, at my old shop, if that file transfer fails halfway through, I have to start all over. At my current shop where we do 2GB segments, I still have 50% of it done and I can resume it after I reinitiate the file transfer
7:48 AM
I have a 24TB NAS right now to store working copies of images
7:48 AM
We store all evidence copies of images on HDD's until the cases are adjudicated
7:48 AM
Then they get wiped multiple times and thrown back in the pile to be used again
Avatar
We store working copies but we are required to put copies of images in to property control on a per case basis.
Avatar
Andrew Rathbun 10/21/2019 7:51 AM
When I acquire the initial image, it goes on an HDD which is the best evidence copy (original evidence). I then make a copy of that segmented E01 onto my 24TB NAS which I do my analysis off of. We have a massive supply of 2TB WD Black HDD's for evidence purposes and working copies, if need be. We just store everything on HDD's so they can be entered into evidence and evidence transactions for those particular evidence images can be completed as necessary
Avatar
We did 650 units last year so you can see why it could get costly.
Avatar
Andrew Rathbun 10/21/2019 7:53 AM
units meaning cases?
Avatar
no, individual items
Avatar
Andrew Rathbun 10/21/2019 7:53 AM
Oh gotcha
7:54 AM
I try to cram as many evidence items on an HDD as possible, within reason, and just ensure the evidence label on the HDD accurately reflects which images reside on the drive
7:54 AM
otherwise I'd be using 30-50 HDD's per case lol
Avatar
I just did an iPhone with 220GB's of data, not sure where that one is going just yet.
Avatar
Andrew Rathbun 10/21/2019 7:56 AM
Depending on your datasets, maybe it's more economical to purchase many of these? https://www.amazon.com/Black-Performance-Desktop-Hard-Drive/dp/B008968L6M?th=1
7:56 AM
55 bucks for 500GB
7:57 AM
If you can consolidate evidence images it may end up being more economical, but just spitballing here
Avatar
I second the segment image files, makes life much easier. I use a 24TB NAS for current work, and archive to HDD until retention period is over.
Avatar
What would cause our small business server from handing out the wrong ip addresses?
Avatar
What are you all doing for large PC hard drives with ~1 TB or more? Are you still storing full images? argeted collection?
9:01 AM
*Targeted
Avatar
I would say you can use something like kape to extract specific items for the exam.. However you should have an image saved somewhere until case is complete/adjudicated
9:06 AM
We have enough storage so I just create images
9:06 AM
last case I had 20 TB of crap to go through
Avatar
Andrew Rathbun 10/21/2019 9:07 AM
@tracedf if I'm on site and I have to image 20 of them before I can go home, definitely make logical images of the ones I can and only take physicals of what I can't get away with not doing a logical on (i.e. having to rebuild databases or wanting to virtualize later on)
Avatar
Dr. Kaan Gündüz 10/21/2019 10:46 AM
a nas with deduplication would be cheaper as long as you don't encrypt yor images (edited)
Avatar
I have a redundant 600TB SAN array where I store our working cases. I'm working on pushing archival cases to AWS gov glacier
1:33 PM
encrypted of course
1:34 PM
I think a large network storage drive is great for working cases but archival is the troublesome part. Storing on USB flash drives is a nightmare and extremely costly. I'm still looking for the best answer to the problem myself
Avatar
Where should I link a server that I highly recommend joining?
Avatar
@Tyføøn hit one of the mods to have them check it out and add to the resources
Avatar
Yep just did that @Krisaytha he’s sharing it in dfir resources
Avatar
Andrew Rathbun 10/21/2019 2:51 PM
Go ahead and post it here @Tyføøn
2:51 PM
I posted it in #dfir-resources
Avatar
Looking for help on an extraction of a Galaxy J7 Crown (SM-S76VL). I have done an ADB partial extraction with Magnet AXIOM with no problem, but I seem to be having issues with Cellebrite UFED Touch 2. I attempt to start the extraction and the Touch 2 reads the device, showing the preview of the device. When the Touch 2 begins to start the extraction I receive an error stating the Touch 2 can not connect to the device. "Extra info read failed". I have tried a generic Android profile, Generic Samsung, and other J7 profiles and the same issue occurs. I am using the same cables I used for the AXIOM extraction, so I know it is not a cable issue. Anyone ran into this issue and have a solution?
Avatar
@ppd-det i don’t have a solution for that specific error. But you could backup app-data with adb from outside Ufed and then import the backup ( adb backup -all -shared -system -keyvalue -f backup.adb ). The bad part about that is that you’re gonna miss out all the data their agent gets.
Avatar
Deleted User 10/23/2019 1:57 AM
the "extra info read failed" just means that UFED could not establish a ADB connection with the device in order to install the client app
Avatar
in Axiom, I have it saying "some information about this item cannot be displayed" and to LOCATE SOURCE
2:03 AM
anyone know what the source file might be
2:04 AM
I did move it to network storage
2:04 AM
so I'm sure it's lost its internal paths or something
Avatar
yeah could be that you had a short disconnect
2:04 AM
so you want to locate whatever raw data file was decoded
Avatar
just curious if it means the E01, or maybe the attachments file within the case
2:04 AM
ahh
Avatar
should be the e01
Avatar
yeah the evidence information there at the bottom says exhibit.e01
2:05 AM
so that'll be it then
2:05 AM
ah, nevermind, there's a hidden little dropdown that tells you the source file 😂
Avatar
so I found it, easy peasy when you're not half asleep
2:06 AM
ty for the assistance
Avatar
anyone know how to get Nuix to reliably process E01s
Avatar
every other tool handles it fine, it's just Nuix decides to process them as files themselves, instead of realizing they're image files
Avatar
think maybe I get it, it's temperamental and will only accept E01s made by specific software
Avatar
nevermind, it won't even take an X-ways produced E01
Avatar
@Sudo When you add evidence, try Add Folders, and select the folder which contains the E01 (if you haven't tried already!)
Avatar
Davesdailypicks 10/23/2019 8:12 AM
Does anyone know if Cellebrite Premium supports LG zone 4 model number LM-X210VPP? It's in a secure startup and regular cellebrite can not bypass the lock.
Avatar
yeah tried that 😅
Avatar
found out the problem
12:41 AM
apparently workers should have a minimum of 4GB assigned to them
12:42 AM
(though Nuix default is 1GB so, how it's the minimum I don't know)
Avatar
@Sudo ahhh glad you sorted it. Even on NUIX workstation, we have to bump the memory up as the default is far too low
1:24 AM
I already did bump up the application memory
1:24 AM
which I think was 1GB too
1:25 AM
but evidently the workers also need their memory allowance upped too
Avatar
I have an iPhone that connected to a device via USB connection. It appears to have generated a unique number consisting of 24 characters (numbers and letters). I believe this is generated by the iPhone and not the vehicle when it's connected by USB. Anyone know what this is (USB Serial number?) and any value without the actual device?
6:12 AM
Not looked at it in the context of vehicles, but UDIDs are found on computers that have connected to iDevices
6:15 AM
If that is what you're seeing, a UDID can be submitted to Apple who can then provide more details about the device
Avatar
@OllieD Familiar with UDID being (40) characters, but this is only 24. Told this is generated by the iPhone. Other iPhones connected generated their own unique number.
6:26 AM
@OllieD ....actually I believe the new UDID is 24 characters??
Avatar
As of September 2018, new iDevices generate a 24 character code
6:26 AM
Exactly
6:27 AM
Normally it's displayed with a hyphen (making it 25), but if you can see 4 leading 0s, its probably a new format UDID
Avatar
Yep, thank you!
Avatar
As it null pads the chip ID
6:27 AM
no problem
6:27 AM
🙂
Avatar
A new malware is targeting Discord users by modifying the Windows Discord client so that it is transformed into a backdoor and an information-stealing Trojan.
8:06 AM
There is malware targeting Discord
Avatar
What would cause the os not reading a dvd drive. The drive has power and you can hear the disk trying to be read but the computer will not read the actual drive.
Avatar
Hey guys, Cellebrite is conducting its annual Industry Trend Survey. The survey asks about the challenges you and your agency face and what is important to you in your investigations. I would welcome you taking the time to complete our survey. The survey will take ~10 minutes to complete. Please click here: http://bit.ly/CellebriteIndustryTrendSurvey With more than 2,700 respondents last year, this survey has quickly become an essential resource for providing insights into the use of digital data in investigations and your input is essential. Once our survey results are compiled, we will be sharing those results with all respondents. Thank you, Shahar
Take this survey powered by surveymonkey.com. Create your own surveys for free.
cellebrite 4
Avatar
Hello everyone! I am going to do be doing some training for another agency next week and was wanting to get them hands on with @Cellebrite Reader. Does anybody have a good UFDR that they use for training or could be used for training?
Avatar
@goalguy That's a really good question! I'd be interested in that. I wonder if @Cellebrite peeps have one?
Avatar
See I’ve always generated my.own test data
Avatar
@Cellebrite support said they did not.
Avatar
deepdive4n6 10/24/2019 4:54 PM
@goalguy Could always just push them towards the UFDR training on the Cellebrite Learning site. It's free and takes it off your plate. 😉
4:56 PM
@goalguy or just find a department phone and dump it. I'd recommend using a phone that was issued to someone with Sergeant stripes or higher, to avoid disclosing any actual case work. 😉
😂 1
Avatar
@goalguy, what you define as a good UFDR? UFDR with many different models? UFDR with lots of apps?
Avatar
@deepdive4n6 the UFDR training from Cellebrite will be their follow up training. @alona Mainly looking for one that has a good amount of data to show all the different items that were parsed.
👍 1
Avatar
that discord thing is interesting, my personal discord has been acting odd lately
3:20 AM
not that I recall doing anything that would result in it, checking though when I get home!
Avatar
Hi. I have something like 2000 Facebook IDs that i need to associate to vanity names...anyone knows of a method/product/script/... that can do that in bulk???
Avatar
Anybody have issues with @Cellebrite PA 7.24.0 crashing when creating a UFED Full Reader of a Apple iPhone full filesytem ? Twice in a row my computer black screens and freezes and I have to manually restart. It creates a Tmp file that says "donotzip" its about 20 gb in size and obviously did not complete. Both the extraction and PA are on the same SSD as Cellebrite recommends.
Avatar
kmacdonald1565 10/25/2019 12:49 PM
@DCSO i just had one that was 280 ish gb and it was fine. took forever, but was fine. extraction on internal ssd (or m.2 to be more precise) and report generated directly to an external drive.
Avatar
@kmacdonald1565 , I have Cellebrite installed on a SSD and the extraction on the same drive. Thats what they recommended recently but i'm open to something else. Right now i'm uninstalling Cellebrite and trying to do a clean install vs an update ?
Avatar
kmacdonald1565 10/25/2019 12:59 PM
honestly couldnt tell you...if i can, i almost always opt for a second PC to try it on but thats just me. i was just saying that i had an unusually large (for my dept) GK full file system that worked. computer is one of our beefier ones, but nothing outlandish at all
12:59 PM
a clean install is always worth the effort as long as you dont mind setting it back up
Avatar
I wonder how many have downloaded this app and used it? "Privacy Friendly PIN Mnenomic is an Android application which can provide strategies to memorize a 4-digit PIN. Therefore it determines whether the PIN forms a T9-word, underlies a mathematical rule or forms a date or year." https://github.com/SecUSo/privacy-friendly-pin-mnemonic
This Android Application provides strategies to remember 4-digit-PINs - SecUSo/privacy-friendly-pin-mnemonic
Avatar
Andrew Rathbun 10/28/2019 5:56 AM
Happy Monday all
Avatar
kmacdonald1565 10/28/2019 6:31 AM
if you say so
6:32 AM
😝
6:35 AM
my happy monday begins about 5 pm
🍻 3
🥃 4
Avatar
hey - quick question that I feel like I should know the answer to. I am trying to restore an e01 to a drive to be released to defense for reasons. The drive provided by defense is a 4TB external, the suspect acquisition is from a 4TB internal. I'm guessing there's a slight difference in capacity because FTK says my destination is too small to hold the source, despite advertised capacities being the same. The suspect drive has open space, of course, so the actual data minus unallocated should fit easy peasy. How should I proceed?
11:40 AM
the difference is around 2kb
Avatar
Forensic@tor 10/28/2019 11:52 AM
I would provide them the e01 file. Their expert or now needed expert will work from that. Easy to show the files were not altered as well.
👌 1
Avatar
its not for examination, it's just work files. Was thinking about mounting and doing a logical acquisition, not sure if there was a faster way.
Avatar
So it's just work product? If it's going to a defense expert, just leave it as an e01. If it's going to a lawyer for review, mount it and export everything. If unallocated space doesn't matter, that should be fine I would think
👌 1
Avatar
yeah - its going to defendant to run their business in the meantime per the prosecutor
Avatar
Oh, I gotcha. Depends if they need it to boot or not. The above should be fine if they don't need it to boot (since it's an external, I'm guessing they just want the files).
Avatar
yeah - I already finished the OS drive, this is just the big data drive. I'm making the image now, was just asking in case there was a faster way to deal with nearly 4tb of data!
12:09 PM
thanks for your help
Avatar
Workstation specs question. What is everyone thought about i7 vs Dual Xeon? My agency is looking into getting us new workstations and I am wondering what specs are people using.
Avatar
You using them for phones, computers or both? Phone extraction / decoding software right now works a lot better with higher single thread performance, and isn't massively multithreaded. That might change but right now IPC is more important than cores on phones. With computers its a bit different
Avatar
Both. Computers and cell phones.
Avatar
I think its also misleading in some ways to only think about the processor. Certainly for most forensic software applications now (excluding X ways to some extent) you also need a decent amount of RAM and probably most importantly decent fast storage and depending on the type of applications you want to use, seperate storage arrays for storing different kinds of data (eg one for database, different one for temp data, another for evidence files etc)
6:05 AM
You can have an intel i5000 and its going to be crap if you have 8 GB of RAM and a couple of Seagate 7200 spinning disks (edited)
6:05 AM
also same goes with network speeds, if you are reading and writing across to network storage systems
Avatar
I understand. We will get about 64 or 128gb of RAM with multiple bays. No network for us. Just curious about pro and cons of different types of processors.
Avatar
Yeah fair enough 😃
6:12 AM
I think definitely decent storage makes a big difference
6:12 AM
Often that or the network which becomes a bottleneck during processing
Avatar
We try to make sure to have enough storage on different drives to avoid the bottleneck.
👍 1
Avatar
I'd be inclined to put more money into storage rather than to upgrade to dual-Xeon vs an i7.
Avatar
Dr. Kaan Gündüz 10/29/2019 10:57 AM
@gt530 i7
👍 1
11:01 AM
we have both, i7 is better than xeon in terms of forensic software
11:01 AM
unless you plan to use nuix
Avatar
Just in case you missed it - The annual Industry #TrendSurvey is now open! We want to learn more about what’s important to your #digitalinvestigations and the challenges you and your agency face. The survey will take ~10 minutes to complete. Please click here to complete: http://bit.ly/CellebriteSurvey
Take this survey powered by surveymonkey.com. Create your own surveys for free.
Avatar
@Cellebrite where's the best place to contact for services like CAS?
Avatar
Andrew Rathbun 10/30/2019 5:59 AM
Regarding the recent forensic workstation build question, an email from Cellebrite today had the following: Did you know that Cellebrite has it’s very own – Digital Forensic Workstation? Black Tower with 12 Bays with exclusive top mounted docking station with high speed top mounted imager with: • Power Supply: 1300/1350 Watt Modular • Chipset: Intel® C621 chipset • Processor: Intel® Dual Xeon Silver 4208, 8-cores/16 Threads, 2.1 GHz/3.2 GHz Turbo Speed, 11 MB Cache with liquid cooling • Integrated LAN: Intel® Dual Gigabit LAN Controller • Video: GeForce GTX 1650 PCI-E 4GB GDDR5 memory• Sound: 8 Channel (7.1) High Definition Audio Codec with optical S/PDIF • OS Drive: 512GB M.2 NVMe SSD for Operating System • Temp Drive: 512GB M.2 NVMe SSD for Temp Files • Data Drive: 4TB 7200 RPM Enterprise Class HDD for Data, Mounted in 3.5" Hotswap Tray • High Quality Whisper Quiet Fans throughout the unit • 1 x 2.5" Hot Swap Bay with 4 Removable Trays for 2.5" SSD/HDD • Windows 10 Pro • Tableau write blocker • Cellebrite Extraction Bay • 16X BD-R/BD-RE/DVD±RW/CD±RW Blu-ray Burner Dual-Layer Combo Drive • Standard 104 Keyboard and Optical Mouse • Integrated LAN: Intel® Dual Gigabit LAN Controller • Forensic Card Reader - Read Only (SD and MicroSD Cards) • 5 Year Warranty
👍 3
Avatar
@Law Enforcement [UK] does anyone have documentation around CPS and the handling of indecent image jobs, particularly surrounding police not being tasked to pick out files to return
7:55 AM
nevermind, found it, easy to find dunno why he said it wasn't 😂
Avatar
@Andrew Rathbun I emailed Cellebrite back asking for a quote but I havent heard anything yet.
Avatar
Greg when did you reach out?
Avatar
I emailed yesterday.
10:51 AM
Yesterday, I got told to get quotes for new workstations by the end of the month.
Avatar
Andrew Rathbun 10/30/2019 10:52 AM
@gt530 did you contact @SUMURI for a quote on a Talino?
Avatar
One of my coworkers did get a quote from Sumuri.
Avatar
Andrew Rathbun 10/30/2019 11:34 AM
is a full-service IT consulting agency based in Lowestoft, . We apply unique technology solutions to your small or medium-sized business.
11:34 AM
New website recently created. I saw Steve Whelan posted it in one of the DFIR listservs. Will be interesting to watch the site evolve
Avatar
Hi Everyone. Hope you are all well. I need a little bit of guidance with Axiom... We had a sudden death a few weeks back. We think he played alot of games online and used his computer heavily. The investigator has asked whether we can easily determine USER usage vs Normal Computer Functions within the logs. He had his computer running constantly for months. No shutdowns. No hybernation or even sleep. This is to assist the coroner to determine approx time of death. His body wasn't located for 3-4 weeks after his death so autopsy wasn't able to be performed to determine cause of death.
Avatar
Andrew Rathbun 10/30/2019 12:28 PM
@Gumpoo how about browser activity? See when that stops
Avatar
Yep. We've looked at that. This guy was a big gamer that uses steemit. The investigator wants to get an idea of his gaming habits.
Avatar
Andrew Rathbun 10/30/2019 12:32 PM
He probably has a Steam account. That should potentially show when he was last logged on but I suspect he probably left it open and thus that might not be helpful. Just spitballing here
12:33 PM
Also, if he's a big gamer, he probably has Origin, Epic Games, Blizzard, etc. Community profiles for those distribution platforms might have last active timestamp somewhere
👍🏻 1
Avatar
maybe Win10 Activity Timeline is of use?
👌🏻 1
Avatar
Andrew Rathbun 10/30/2019 12:37 PM
NTUSER.DAT\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\RecentApps should show which apps were most recently open. Hopefully there are some timestamped artifacts of interest there
👍🏻 1
Avatar
@gt530 I just spoke to @danmiami0001 about this, it is going through out Training Dept, I'll make sure they get ahold of you
👍🏻 2
Avatar
Thanks Team. Really appreciate it... I love it how Digital Forensics is just never ever ending learning!! lol 😄
12:50 PM
Yeah he used Steam heavily and seems to be running in the background pretty much constantly
Avatar
@Gumpoo If he plays games then I can imagine lots of games might potentially have logs that would allow you to tell when they last were active
4:29 PM
like online games will typically kick you after a certain amount of inactivity
4:29 PM
Seems like you'd have plenty of other options though
Avatar
maybe screen saver/lock screen event logs?
4:55 PM
screensaver invoked, Event ID 4802 screensaver dismissed Event ID 4803 console locked: Event ID 4800 console unlocked: Event ID 4801
4:56 PM
@Gumpoo
Avatar
@Cellebrite You held a webinar yesterday on EDL, is it possible if we can have a copy of this webinar to watch? Updated - See below. (edited)
12:09 AM
We had someone at office ready to watch at 4pm (London) - unfortunately she saw the last 3 minutes of webinar! I guess you guys forgot that we had our clock turned back 1 hour recently! lol (edited)
Avatar
@pacman Maybe Cellebrite can post the Link of the Webinar for all people here? This can interrest many people here 🙂
Avatar
Has anyone ever collected/preserved a Pinterest account? It doesn't look like they have an option to do a data export without emailing them and waiting 30 days. Axiom and Cellebrite Cloud don't seem to support it either.
Avatar
Kind of a weird question but I'm away from my resources on this atm, can you see hard drive model in volume information in windows
12:15 PM
i.e. if you had seized a computer with the hard drives removed after being shut down what could you determine about those drives
Avatar
Andrew Rathbun 10/31/2019 12:16 PM
https://winaero.com/blog/find-hard-disk-serial-number-windows-10/ would be my response to your first question
A serial number is a unique number assigned to the hardware by its OEM. You can find your Hard Disk Serial Number in Windows 10 using the built-in tools.
Avatar
Ah I know I can see that information but is that from Windows querying the device?
12:16 PM
For example speccy shows this but it seems like it might well be coming from the drive rather than registry or similar
12:17 PM
Avatar
Andrew Rathbun 10/31/2019 12:17 PM
Love Speccy, btw, cool program
👍 1
Avatar
Incidentally there was an eric zimmerman or similar cli tool that showed volume information
12:17 PM
and i can't remember what it was called
Avatar
Andrew Rathbun 10/31/2019 12:18 PM
HKLM\SYSTEM\ MountedDevices
12:18 PM
in Registry
12:18 PM
Probably Registry Explorer you're thinking of
Avatar
doesn't seem to have a very detailed bookmark
Avatar
Andrew Rathbun 10/31/2019 12:26 PM
Alternative to the standard Device Manager of Windows, which displays all devices and their properties in a flat table.
12:26 PM
try this
12:26 PM
find a drive then open in RegEdit
12:26 PM
via right click
Avatar
Does give the model name, which is helpful
12:31 PM
this is actually because I'm considering doing a project for alternative methods of doing stuff like this
12:31 PM
for school
12:33 PM
basically you want to know if a busted drive has been inserted into the computer: you have the disk but can't use shellbags or UID or whatever to ID because it's broken
12:33 PM
so using stuff like size available which may vary between iterations of the same product
Avatar
For my Texas DFIR peeps out there: we're looking at moving to a cloud solution (Azure) to archive our case data from a local server-based process. During discussions, it has come up that some of our data contains illicit images/videos. We already encrypt our case data (AES256 via zip store) with a password being randomly generated and lengthy. However, there is concern that we still cannot legally transfer those images across the internet regardless of their encryption. I know that we cannot be the first agency to explore this option so I'm reaching out to find others that have already plowed this field and have the answer as to the legality in the form of hard documentation (ie. an AG's opinion or case law or something legally firm). We've been told that, until we get a firm legal standing, we cannot move forward with any off-site storage plans that involve the cloud. Thanks in advance.
Avatar
Anyone know if Discord app or Roblox stores anything of value? Chat logs, friends, servers visited ect
Avatar
From my limited testing a few months ago Discord was server side only but I'd love to be proven wrong! Didn't dig into it too far back then though
Avatar
I though as much. Thanks
Avatar
Robox is an interesting one
Avatar
Many thanks to @Cellebrite, I really enjoyed the Summit. The evening was filled with plenty of fun and games. I particularly enjoyed the customer panel. It was a great idea.
😂 1
cellebrite 4
Avatar
Andrew Rathbun 11/3/2019 1:05 AM
Three audience members, three different smartphones, twenty minutes and just one result: all fingerprint security can now be compromised, Chinese hackers claim.
Avatar
Anyone from @Cellebrite around for a quick CAS question via DM?
Avatar
Gwaihir Scout 11/4/2019 8:51 AM
Which is the best channel for a question about converting dash cam files to regular videos?
Avatar
Andrew Rathbun 11/4/2019 8:54 AM
@Gwaihir Scout #multimedia-forensics or here, really. Either one works
Avatar
Gwaihir Scout 11/4/2019 8:55 AM
Thanks
Avatar
Andrew Rathbun 11/4/2019 8:56 AM
General is a catch all but I know some subject matter experts may only monitor certain channels
Avatar
Gwaihir Scout 11/4/2019 9:02 AM
Ok. I asked the question down there, but if anyone here knows how to convert Panasonic Arbitrator AV3 files to normal videos, please let me know.
Avatar
danmiami0001 11/4/2019 10:57 AM
Even though it helped solve 2.5 million criminal cases this year, Israeli Tech Company Cellebrite is still mostly known as the 'iPhone cracker'. Co-CEO Yossi Carmil talks with YNET about extracting information from digital watches and drones, AI in service of the police, and ...
👍 2
Avatar
If I have a phone number, is there anyway I can find out the subscriber and the provider
Avatar
Andrew Rathbun 11/4/2019 12:18 PM
@spoon1997 http://www.fonefinder.net/ for provider
Telephone search engine that returns the city, state, and country of any phone number in the world.
12:18 PM
You might want to see about any resources posted in #osint for the subscriber. There may be something there, perhaps.
12:18 PM
I always used to run the phone numbers through Facebook and I used to get hits all the time but I'm not sure if that has changed or not
Avatar
@Andrew Rathbun @spoon1997 If you are a LEO you can sign up with Zetx and use there free service. https://phonelookup.zetx.com/
Start your CDR Mapping investigation with ZetX Free Phone Look Up and access current provider information and search warrants.
Avatar
Thanks
Avatar
S7- running what i believe is Android 8 G935V , looking at the list i see one person that was able to get it locked but not showing the method. We have tried Lock Pick and disable lock etc, bootloader with no luck
Avatar
@DCSO EFT-PRO has support for it. Depending on what version of firmware it’s running. SM-G935V_U8_8.0.0 SM-G935V_U9_8.0.0 SM-G935V_U10_UA_8.0.0 Boot into recovery and check what firmware you have. In most cases they flash an eng-root. So you could also check online if you find one.
💯 2
Avatar
@.karate. Good to know, of the tools we don't have. Something worth investing in ?
1:41 PM
I believe its running Android 8 via Sammobile.com they don't have the exact firmware but its simular to all the version 8's
Avatar
wibblypigftw 11/5/2019 3:04 AM
Has anyone done the AX250 AXIOM Advanced Computer Forensics training? I used IEF for years and Axiom a bit, wondering if I could use it to learn Axiom better as well as what's on the course
Avatar
I think one of my colleagues did some Axiom training @wibblypigftw
4:21 AM
he said it was good
4:22 AM
it definitely covered the tool itself, whether it was the Advanced one or not I'm not sure
Avatar
wibblypigftw 11/5/2019 6:28 AM
thanks @Sudo
Avatar
Anyone know if Cellebrite licenses work for old software after expiring? Still working on renewal and cutting it close. Might be a few days overlap. Curious if I am out of a tool or just don't update for a few days?
11:53 AM
@wibblypigftw my partner did their classes and couldn't speak highly enough about their vlive program. It was good stuff.
Avatar
Andrew Rathbun 11/5/2019 11:54 AM
@wibblypigftw I'm on the training passport now. I'll be taking it in the next couple months. I've done 2 classes and have 5 more on the docket before end of January. If you can swing it, get the training pass and just knock out all the courses.
11:59 AM
Looks like I'm taking AX250 in mid-late December
Avatar
wibblypigftw 11/5/2019 3:28 PM
@Palazar82 I'm interested in the vlive stuff - I enjoy the networking at a live course but it's a lot of extra expense and hassle. Glad to hear it's worth doing. @Andrew Rathbun it's a good deal isn't it? Hopefully I'll be able to sell it at work. Are you doing live or vlive?
Avatar
@chiefcham care to elaborate on your exp with the V-Live and if you took AX250.
Avatar
Andrew Rathbun 11/5/2019 3:47 PM
@wibblypigftw virtual
Avatar
deepdive4n6 11/5/2019 4:08 PM
@Palazar82 If your Cellebrite license expires, you'll still be able to use the software. Just can't update if the updated version was released after the expiration date.
Avatar
Thank you, I thought that but wasn't positive.
Avatar
I’ve done the virtual at your own pace AX250, couldn’t recommend it enough if you dont have time or budget to go in person class. Great hands on activities and videos were great with reinforcement assignments at end of each chapter. I liked that it went over their tool but did general forensic knowledge as well as explaining different artifacts and switches and things to look for and where to find normally overlooked artifacts.
Avatar
wibblypigftw 11/5/2019 10:22 PM
That sounds great, I'll see how the request goes
Avatar
Morning everyone. I'm curious if anyone had any dealings with iOS log entries, in particular with CommCenter/com.apple.datausage.telephony and voiced/com.apple.datausage.accessibility. Both entries were found in DataUsage.sqlite on iOS 12.4 with data shown as sent and received. I'm currently dealing with fatal collision case where those entries were made by the handset's OS and I can't explain if they relate purely to OS automatic processes or are user initiated. Thanks. Any suggestions much appreciated.
Avatar
Andrew Rathbun 11/6/2019 3:40 AM
Does anyone have LE contact information for Slack? Basically everything I'd need for a preservation letter
3:44 AM
Search.org ISP List has nothing. Will be looking to add that information once I acquire it. I also sent Slack an email so hopefully they respond in a timely manner
Avatar
Andrew Rathbun 11/6/2019 7:00 AM
I contacted Slack and they got back to me. For future reference, refer to Search.org's ISP List. I sent them an email with the information I gathered so it will be there sometime in the next day or two
👍 1
Avatar
Anybody here use @Cellebrite Analytics and willing to help me out with what I would think is a simple task?
Avatar
geekwithgun 11/6/2019 10:31 AM
anyone have luck with an alcatel 4044V?
Avatar
@geekwithgun Those should have the 8909 which means they can get physicals with UFED through non-decrypting qualcomm EDL. Some you can hold vol + & - while connecting usb. Others you may have to force EDL with emmc faults. Being that they run KaiOS though only FinalMobile has some scripts to parse the data.
11:16 AM
@geekwithgun and i think the new v12 of Oxygen supports KaiOS too
Avatar
CLB-Arnon Tirosh 11/6/2019 11:30 AM
@goalguyI have forwarded your request to the CLB US team, in any case you can also email support@cellebrite.com and that will open a case for you!
Avatar
@goalguy what you trying to do
Avatar
I have always found that what someone describes as a "simple" task, rarely is.
💯 3
👍 3
😂 1
Avatar
Hashset question, is there any known 'good' up-to date hashset lists for Android/iOS devices, that mainly filters out system files/known emojis etc.... that people use once an extractions opened using, for example ufed PA?.. I know PA has its build in hashset.db, just interested into seeing how people manage running their own/or collected hashsets?
Avatar
No idea how good it is on Android/iOS device (I don't personally use it), but you could check out https://www.nist.gov/software-quality-group/national-software-reference-library-nsrl
Welcome to the National Software Reference Library (NSRL) Project Web Site. This project is supported by the U.S...
👍 1
Avatar
Andrew Rathbun 11/7/2019 4:11 AM
I was going to suggest the same thing. I use it but I haven't really dove into what exactly is filtered out. I use the Modern, iOS, Android, and Legacy sets found here: https://www.nist.gov/itl/ssd/software-quality-group/nsrl-download/current-rds-hash-sets
RDS Version 2.66 - September 2019 ISO 9660 images of RDS CDs If you have a fast Internet connection, you may download...
🙌 1
Avatar
Does anyone know some good dfir resources for cryptocurrency? I have an assignment about Digital Forensics and Cryptocurrency
Avatar
Andrew Rathbun 11/7/2019 5:56 AM
@Svelte you may want to get with the @NW3C peeps such as @Eric | fraudsterglossary.com or @Adv4n6
Avatar
Alright, thanks!
6:02 AM
@Svelte and if my two compadres aren't responsive im here too
Avatar
What ya need?
6:03 AM
Send me a PM
Avatar
Adam Cervellone 11/7/2019 6:56 AM
Does anyone know if the Paul Sanderson timestamp conversion software is still available? I can't seem to find it in our lab's software collection and its not available online from what I've seen
Avatar
Jason Roslewicz 11/7/2019 10:32 AM
You might reach out to TEEL Technologies Canada or America. I believe they handle that now. https://teeltechcanada.com/?s=sanderson
Avatar
@Adam Cervellone @TeelTech @TeelTech Canada
Avatar
ctrlShiftEscape 11/7/2019 11:16 AM
https://investigatingcryptocurrencies.com/ This book has everything one should know on the subject...goes pretty deep into the tech and explains everything very well
👍 2
Avatar
@Adam Cervellone I sent you a DM
Avatar
Hey there, short user question related to Magnet AXIOM. Currently buildung my first Custom Artifact. Just wanted to know: Is there a way in AXIOM, after I already processed the Image, that I can just run one specific Custom Artifact against the Image to get the additional data? Something like additional processing on the already processed images? I only know the option to add new evidence and then select the same image again.
Avatar
randomaccess 11/8/2019 3:51 AM
@kalinko that's the way to do it
3:52 AM
But definitely send the request through so the ticket to merge identical items gets another +1 :)
Avatar
@randomaccess Thx. I will do this
Avatar
Igor Mikhaylov 11/8/2019 7:59 AM
WhatsApp in Plain Sight: Where and How You Can Collect Forensic Artifacts (An article on WhatsApp forensics and what data can be obtained from a device during forensic analysis) https://www.group-ib.com/blog/whatsapp_forensic_artifacts
An article on WhatsApp forensics and what data can be obtained from a device during forensic analysis
👍 3
Avatar
chrisforensic 11/8/2019 11:36 AM
very detailed informations 💯
Avatar
yaniv.schiff 11/8/2019 2:17 PM
I'm trying to use Sarah Edward's Apollo script for iOS analysis and am getting this error message: Traceback (most recent call last): File "S:\Apollo\APOLLO-master\apollo.py", line 259, in <module> parse_module_definition(mod_info) File "S:\Apollo\APOLLO-master\apollo.py", line 56, in parse_module_definition parser.read(mod_def) File "C:\Python37\lib\configparser.py", line 696, in read self._read(fp, filename) File "C:\Python37\lib\configparser.py", line 1079, in _read raise MissingSectionHeaderError(fpname, lineno, line) configparser.MissingSectionHeaderError: File contains no section headers. file: 'S:\Apollo\APOLLO-master\modules\simplekml-1.3.1.tar\dist\simplekml-1.3.1\README.txt', line: 1 'Simplekml is a python package which enables you to generate KML with as little effort as possible.\n'
2:17 PM
anyone know what i'm doing wrong
Avatar
what python version are you running
4:49 PM
did you pip install Simplekml ?
4:49 PM
there are some dependencies with that script you need to download
4:49 PM
you will see them with #include
4:49 PM
grrr
4:49 PM
import
4:50 PM
so you will see packages like import Simplekml import <insertPackageHere>
4:51 PM
you will have to pip install them on your local machine..
Avatar
I have created a small utility to provide software write blocking on a Windows machine. It is lightweight and easily reversible, but avoids having to make manual registry changes yourself. If anyone would like a copy of it send me an email: admin@volatile-data.com
👍 11
Avatar
Pretendigator 11/11/2019 12:45 AM
Is there anyone in contact with the people from BlueBear LACE? I've been attempting to debug something with them however since Friday all of my emails to their addresses are coming back as undeliverable. I'd like to know if it's us or them that is having issues!
Griffeye1 1
Avatar
Would a question about routers be best in Network forensics? :-)
Avatar
Andrew Rathbun 11/12/2019 11:51 AM
I would say so, yes 👍
Avatar
Cheers :-)
Avatar
Morning folks, can anyone recommend software to write protect USB sticks going from computer to computer?
Avatar
what do you mean by that? are you looking for a generic software write blocker?
2:35 AM
if you want to protect the stick itself regardless what software is installed on a computer that the stick is plugged into, your best choice might be those hardware-encrypted sticks that don't mount until you launch the decryption utility and enter the password
Avatar
@eSko ok thanks, had seen those items too, cost would be the issue wth that
Avatar
We use these - kingston datatraveler vault privacy 3. Not super cheap, but they’ll serve the purpose
Avatar
Dr. Kaan Gündüz 11/13/2019 3:21 AM
Ways to enable and disable write-protection for a USB flash drive, including a write-protect switch, file properties and flash drive security.
Avatar
@Cellebrite anyone around for a quick CAS compatibility question?
Avatar
@K23 DM me
Avatar
Have done cheers
Avatar
Thanks @Dr. Kaan Gündüz
Avatar
Dr. Kaan Gündüz 11/13/2019 11:17 AM
nema problema
Avatar
I thought I would post this as its something ive been working on and the exact issue has popped up in another recent thread by GumStick. I have long thought that despite ACPO not existing anymore we constantly will refer back to the 4 governing principles
Avatar
Odd question, so getting a dump from another agency and they used lantern (extraction done in Mar of 19) I was under the impression lantern went off and died. Is that not the case?
Avatar
Andrew Rathbun 11/14/2019 9:10 AM
Hi Guys, Does anybody know if Katana Forensics, vendor of the Lantern forensic software is still operational? I was trying to extend a license but their website appears down. Saludos, Lex
Avatar
Yeah that is what I saw too, so maybe the other agency used an old version or something. Anyone know if magent or Cellebrite will read one of those pulls?
Avatar
Andrew Rathbun 11/14/2019 9:11 AM
If it's a .bin then PA should be able to parse it just fine
Avatar
iPhone extraction not expecting a .bin but who knows. Never messed with lantern.
9:14 AM
Should be fun I am curious what lantern having been dead and no updates for awhile did on a phone running the current iOS for it's time back in March of 19. From my googlefu ability looks like Lantern died before iOS 12 really. This phone appears it would have been running iOS 12.
9:14 AM
How it did*
Avatar
Andrew Rathbun 11/14/2019 9:14 AM
Yikes. I'm guessing the phone is no longer in the government's custody?
Avatar
Correct other agency returned the device kept extraction as hest evidence.
9:15 AM
Device has since been reset...
Avatar
Andrew Rathbun 11/14/2019 9:15 AM
Naturally
9:16 AM
Well please report back what the files look like from a Lantern dump. That'll be interesting to see what you can do with it. Hopefully there's something to manually examine, at the very least. If it's just logical files and whatnot, PA or AXOIM should be able to ingest it just fine. Fingers crossed for you!
Avatar
Oh will do, should be a fun learning experience.
Avatar
randomaccess 11/14/2019 1:17 PM
Aka why using a proprietary format is very irritating
👆 1
Avatar
MikeWhiskey 11/15/2019 2:56 AM
hi there, does anybody here know of a website where you can search cell phones by their SoC? I have a burned phone & only the Motorola XC55000 Chip is identifiable (any other source to identify the possible cell phone would also be highly appreciated)
3:02 AM
I am pretty sure it's a simple cellphone, definitely no smartphone. It also has a weird "keyboard" layout, top row 3 buttons, 2nd row one button on the leftside and one on the rightside, between them a D-pad, than probably the normal numbers 1-3, 4-6, 7-9, # 0 * and on the bottom row another key in the middle. I hope this is the right channel to ask 🙈
Avatar
MrMacca (Allan Mc) 11/15/2019 5:21 AM
@MikeWhiskey Can you provide a photograph of the keyboard?
Avatar
MikeWhiskey 11/15/2019 5:29 AM
I managed to identify it. It's a Car Telephone from Audi, built into their 2003 A8
😲 1
Avatar
MikeWhiskey 11/15/2019 5:36 AM
but for the curious heads 😄
5:36 AM
5:36 AM
thats the phone in better shape 😉
SPOILER
Image attachment
Avatar
Andrew Rathbun 11/15/2019 5:36 AM
Whoa!
5:38 AM
How did you go about identify the device with only the chip number? Google Fu?
Avatar
Damn, excellent spot
Avatar
MikeWhiskey 11/15/2019 5:39 AM
it was found inside a car and later it came to my mind, cars around that time still had builtin phones. My google search about just the chip didn't lead me to anything
👏 3
Avatar
Andrew Rathbun 11/15/2019 5:40 AM
Fascinating, thanks for sharing that!
Avatar
MikeWhiskey 11/15/2019 5:40 AM
you're welcome
Avatar
ThatLukeGuy 11/15/2019 6:47 AM
I have been tasked with creating training for my fellow detectives and patrol in preserving digital evidence. Talking real basic stuff like airplane mode, faraday bag, etc. Instead of trying to reinvent the wheel, I would assume someone here has a good template or powerpoint. If someone does, would they mind sharing? Thanks guys.
Avatar
Andrew Rathbun 11/15/2019 6:49 AM
I feel like this question has been asked multiple times before but I am not sure if anything has been provided by anyone in public for a layman's guide on this stuff. I could be wrong though. I know there's been conversation to work on a collaborative document which would be a great community project. I'd personally be happy to help facilitate that if the need arises. A sort of universal template that one could implement their own department's logo
6:49 AM
That's been in the back of my mind for a very long time so if the need is there we can certainly work on something
Avatar
ThatLukeGuy 11/15/2019 7:09 AM
I am looking at around a one or two hour training block. If no such presentation has been made, I will definitely be making one in the next few weeks. Obviously I'll share for both critique and peer review.
Avatar
Andrew Rathbun 11/15/2019 7:14 AM
Feel free to send it my way if you need a second set of eyes 👍
Avatar
I offer my eyes as well. 🙂
Avatar
@@ThatLukeGuy Yeah making a ppt has been on my to-do list for a while but I've I just haven't started yet. I think I have some printed "best handling practices" sheets from a state Police lab somewhere though. A well thought ppt would be very useful for me come annual training though.
Avatar
Andrew Rathbun 11/15/2019 9:08 AM
Google Slides would be the best way to collaborate on something like that
9:08 AM
Like I said, something universal to where anyone could download it and insert their agency logo
👍 1
Avatar
Forensic@tor 11/15/2019 9:21 AM
SANS Digital Forensics and Incident Response Blog blog pertaining to Best Practices In Digital Evidence Collection
👍 1
Avatar
PlastikPistol 11/15/2019 4:50 PM
Also interested. I feel like I came across something on NDCAC a while back that was along the lines of being pretty basic..
Avatar
Anyone know how to stop Chrome on Android from 'leaping' back to the top when viewing History? A real pain in the backside when running Photon on it. I have been lucky enough on some cases to find that Chrome doesnt always do it but 90% of the time it is. (edited)
Avatar
Wikipedia (WikiTribune) launches WT:Social a news service to rival with Facebook and Twitter - https://wt.social/
News focused social network
1:26 PM
"The dozens of flaws across 29 Android smartphone makers show just how insecure the devices can be, even brand-new." (https:// www. wired .com/story/ 146-bugs-preinstalled-android-phones/) See https://www.kryptowire.com/android-firmware-2019/
Avatar
Samsung A6 - it's gone and bricked itself from trying to disable user lock
3:46 AM
would normally be the Cellebrite Exynos recovery to recover from that right?
3:46 AM
doesn't seem to be working
Avatar
@Sudo SM-A600FN? I had the same issue a while back. It took me a couple of tries with the Exynos recovery but in the end it worked again.
Avatar
cool, ta
Avatar
Samsung A10 locked with 4 digit PIN. Any solutions?
Avatar
I might be missing the simplest option here but Is there a way to rename evidence names in encase evidence view. I've acquired using magnet acquire but bringing it into encase it just shows up as "description" unless of course I acquire using encase then I can make it whatever I like but that would be double handling
Avatar
"By storing all information in an external location the KB addresses the scalability issue so relevant to binary analysis and reverse engineering. " https://discuss.ocaml.org/t/ann-bap-2-0-release/4719
The Carnegie Mellon University Binary Analysis Platform (CMU BAP) is a suite of utilities and libraries that enables analysis of programs in their machine representation. BAP is written in OCaml, relies on dynamically loaded plugins for extensibility, and is widely used for s...
Avatar
Dr. Kaan Gündüz 11/19/2019 1:04 AM
To the fellow ISO17025 sufferers: do you guys have a validation test source for data recovery? there are tests for computer and mobile forensics but for data recovery or multimedia forensics i couldn't find any.
1:05 AM
like these
Avatar
Any good tools for parsing Facebook Messenger conversations that the user have downloaded from FB? (in json format)
Avatar
@Sudo I've had a situation where XRYs exynos recovery worked for me when UFEDs didn't. Might be worth a shot if UFED didn't fix it after a few tries
Avatar
it worked on attempt 5
Avatar
just a general question - we have a huawei honor 8x where we can't extract whatsoever. Hi-Suite enabled, Stay awake and USB Debugging enabled, however USB debugging keeps disabling immediately as soon as we try to extract.
7:01 AM
Logical or filesystem won't start
7:02 AM
How do we deal with these devices?
Avatar
PlastikPistol 11/19/2019 7:07 AM
@.karate. are you LEO?
Avatar
@PlastikPistol yes.
Avatar
Is it possible to find out when a user deleted the email on a exchange server ?
6:08 AM
I have the exchange audit logs but it doesnt show the a user deletion
Avatar
PlastikPistol 11/20/2019 9:50 AM
Not sure if this is the appropriate place.. but, ironically, I’m look for some search warrant language for discord. Any LEOs have one they’ve used that they’d share before I try to create one from scratch?
Avatar
Andrew Rathbun 11/20/2019 9:51 AM
@PlastikPistol I don't have a template but I'd be happy to help you craft the language
Avatar
PlastikPistol 11/20/2019 9:54 AM
That’d be awesome. I have a copy of their law enforcement guide. Figured I’d go through and try to pull the info from there. It’s a third party cyber tip from NCMEC that suggests a guy was bragging about having several underage girlfriends and the images that normally go along with that. I figure surely discord will have some kind of logs that will help me associate the messages to his account and hopefully the address that I have for him.
Avatar
Andrew Rathbun 11/20/2019 9:55 AM
Do you have any personal identifying information on this guy? It'd be great if you had the username and the discriminator, ie the #1234 after his name
9:55 AM
On Discord, technically 9999 people can have the same username (not server nickname)
9:55 AM
Because they are differentiated by their discriminator
9:56 AM
And since usernames can change at any point in time, it would probably behoove you to nail down a timestamp of when he used whatever username you hopefully have on him
9:56 AM
So your language would be something like Any and all content for the username suspect#1234 from X date to Y date including but not limited to: insert what we'll come up with together here in bullet point fashion
9:57 AM
I created a shared document appropriately titled for this discussion. It's easier to throw it up on there so here's the link.
10:02 AM
Do you also have a server ID or channel ID or message ID for the alleged communications?
10:02 AM
Because those would be helpful as well
Avatar
PlastikPistol 11/20/2019 10:03 AM
I don't have his username but I have the email address associated with his account
Avatar
Andrew Rathbun 11/20/2019 10:03 AM
perfect
Avatar
PlastikPistol 11/20/2019 10:03 AM
looking through the stuff for IDs
Avatar
Andrew Rathbun 11/20/2019 10:04 AM
Your language should then be something to the effect of Any and all content relating to the any Discord account(s) associated with the registered email address suspect@gmail.com from X date to Y date UTC including but not limited to: (edited)
Avatar
PlastikPistol 11/20/2019 10:04 AM
Oh i lied.. I do have it with discriminator
10:04 AM
dude you're johnny on the spot!
Avatar
Andrew Rathbun 11/20/2019 10:04 AM
edited my post, because I've had success before with asking for all account(s) related to a phone number, etc
10:05 AM
did that with SnapChat once and found out the suspect had a second snapchat account!
10:05 AM
whereas if I had just asked for the username, i would've only got what I asked for
Avatar
PlastikPistol 11/20/2019 10:05 AM
I'm actually in the process of one of those right now too.. I might add that to mine
Avatar
Andrew Rathbun 11/20/2019 10:05 AM
You really should
10:05 AM
it might pay off sometime
Avatar
PlastikPistol 11/20/2019 10:06 AM
this whole case makes me leery.. I live in a pretty rural part of Missouri.. most of the area is really behind the times
10:07 AM
There's a kid that lives a couple jurisdictions away that is Mr.L33T and is all over social media always bragging about the cool hacks he does.. blah blah
10:08 AM
I've caught him on a couple different occasions reporting "screenshots" to local news media. He finds a target then screenshots their facebook, instagram.. whatever and alters it to make it look like something nefarious.
10:08 AM
He's the only person in this area I've ever ran in to that uses protonmail.. this tip came from kind a similar protonmail address
10:09 AM
he's pretty good at hiding behind tor and cleaning up after himself.. i'll give him that at least
Avatar
Andrew Rathbun 11/20/2019 10:09 AM
Interesting! Well hopefully Discord can help make a strong case against this guy
10:09 AM
Did you serve a preservation letter yet?
Avatar
PlastikPistol 11/20/2019 10:09 AM
typing it now
Avatar
Andrew Rathbun 11/20/2019 10:10 AM
Awesome, you can use these bullet points for your preservation letter, too, if you so desire
Avatar
PlastikPistol 11/20/2019 10:10 AM
I'm gonna steal that language from your google doc.. I appreciate the swift response
Avatar
Andrew Rathbun 11/20/2019 10:10 AM
I keep changing it so check back before you send it
10:10 AM
You can watch me edit it live
Avatar
PlastikPistol 11/20/2019 10:10 AM
that would have taken me quite a bit longer
Avatar
Andrew Rathbun 11/20/2019 10:10 AM
you'll see when I'm done because there won't be any more edits
Avatar
PlastikPistol 11/20/2019 10:11 AM
ok.. I appreciate it.. thanks for the snapchat tip too
Avatar
Andrew Rathbun 11/20/2019 10:11 AM
Good luck man, I'll keep chipping away and thinking about all the possible stuff one could obtain from Discord since I use it so much
💯 1
10:12 AM
generating pres letters and search warrant language was always fun to me
Avatar
PlastikPistol 11/20/2019 10:21 AM
Thanks man.. I'm a search warrant fan too.. I'm just a little too overloaded right now
Avatar
Andrew Rathbun 11/20/2019 10:21 AM
I know the feeling. Happy to help!
10:22 AM
Some of the bullet points might be kinda out in left field but they could lead to something bigger, for all you know
10:22 AM
like if he's part of some CP server, then I'd want to know what roles they're assigning their members because it would be amazing if like (creator, distributor, etc)
10:22 AM
longshot but just letting you know my thought process
10:23 AM
As an admin here in this server, just trying to think what an illicit server would have that LE might care about for their case
10:23 AM
reactions to posts, etc to show a pattern of behavior towards certain illicit content
10:23 AM
You just never know!
Avatar
PlastikPistol 11/20/2019 10:25 AM
That all makes a lot of sense! I’m relatively new to discord... unrelated but I also downloaded TikTok for the first time.. oh my
Avatar
Andrew Rathbun 11/20/2019 10:26 AM
I'm glad I'm married and boring, lol. So much debauchery in these apps these days lol
Avatar
Andrew Rathbun 11/20/2019 10:38 AM
@PlastikPistol think I'm done. Can't think of anything else
Avatar
PlastikPistol 11/20/2019 10:40 AM
sweet. I’ll grab it. Thanks again!
Avatar
Andrew Rathbun 11/20/2019 11:52 AM
@MrMacca (Allan Mc) @kmacdonald1565 just to circle back on our conversation from a couple months ago, https://discordapp.com/channels/427876741990711298/537760691302563843/623851924315176960 for reference, apparently Atola was able to recover everything on the trouble HDD so all my image segments will be returned to me on a new, shiny HDD
💯 4
11:52 AM
@Karamba too
Avatar
According to court released documents a student has been arrested attempting to build a custom Gentoo Linux distro for Ansar (ISIS supporters) and allegedly created a Python script to automate saving ISIS multimedia from official social media channels. This allowed other members to share by reposting the material on their own accounts and help spread the terrorist group’s propaganda. https://www.justice.gov/opa/press-release/file/1218561/download
Avatar
@Cellebrite anyone have issues with PA taking HOURS 3+ to parse or go through a text now database from a FS iOS 12.4.1 XR. 7.24 & 7.25 both and this has been restarted a few times. Still same result.
Avatar
turn on the PA log and see if there are any errors
Avatar
Nothing around it’s current process and only a key failed to locate in relation to Instagram
Avatar
Have you tried restarting the computer ?
12:01 PM
I've had experience where it took overnight to parse
12:01 PM
How large is the extraction ?
Avatar
57gb yep one start
Avatar
@Jay528 I got a FS of a similar device last weekend. 7.25 took over an hour to go through Safari data so it showed in the logs. I'd just leave it run overnight and see how it goes.
Avatar
@Jay528 @J Harder @Dfdan @Cellebrite PA has been really slow for me on all iPhone extractions. I had to let a couple AFU extractions run for over 24 hours.
Avatar
@Magnet Forensics looking for a source for axiom 2.6, can anyone help me out?
Avatar
Andy Thorpe 11/22/2019 8:58 AM
@whee30 sure thing, drop an email to Support@magnetforensics.com and we will send you a link to it for you.
👌 1
Avatar
@goalguy clear on that. Thanks
Avatar
@goalguy , are you referring to a GK extraction?
Avatar
@Jay528 yes
Avatar
Ah. I don’t have access no more. I’m in the private sector
8:42 PM
I’ll be glad to beta test for the private sector
8:42 PM
😂
Avatar
w3aryb0arpig#6666 11/25/2019 10:07 AM
Don’t suppose anybody has a template policy around managing staff welfare who are exposed to IIOC /CAM / CP as part of their role that they can share? Thanks in advance (edited)
Avatar
I apologize if this belongs in off-topic. One of our microsoldering students doing civilian data recovery asked me a question that I thought folks in here may be the right group to ask. He was hired to recover data from a user’s phone. The data included ISIS propaganda, specifically an issue of the Dabiq pdf magazine. Is this something that he should report (where?) or is this mind yo beeswax. Advice?
Avatar
Andrew Rathbun 11/25/2019 10:51 AM
@Jessa surely there must be an anonymous way to report what he found?
Avatar
Forensic@tor 11/25/2019 10:55 AM
I would say the FBI would likely have a hotline or website set up for that.
💯 1
Avatar
The public can report violations of U.S. federal law or suspected terrorism or criminal activity to the FBI online or via telephone or mail.
💯 1
10:58 AM
I would say that could be a good place to start, or contact local law enforcement.
Avatar
Thanks guys! I’ll pass it along
Avatar
Andrew Rathbun 11/26/2019 7:07 PM
In the spirit of a previous conversation linked here: https://discordapp.com/channels/427876741990711298/537760691302563843/646769451672535040 what other providers would you or your agency benefit from? I'm going to work on creating a language repository of sorts that can be used for preservation letters, search warrants, etc, and i'll host it all on AboutDFIR since that'll be a better venue for it than a server channel. So, besides Discord which has already been completed, PM me or @ me here of which ones and I will keep a running tally and chip away at them as time allows
Avatar
I think verbiage that results in google giving accurate results since they have so many services... I had a case where I asked for drive contents, emails, user info etc and got user info emails and no files. I had artifacts on a phone suggesting photo transfer but no google results to match. It has nagged at me that I probably just didn’t name the appropriate “service” like google photos.
Avatar
Andrew Rathbun 11/26/2019 7:31 PM
Yeah services like Google will take some trial and error for sure
7:32 PM
I have examples that have worked for me in the past but admittedly I didn't need even 10% of the services they offer
Avatar
Anyone know if it's possible to sniff/intercept and see communication between two devices that uses RJ11 cable between them?
Avatar
if anyone is particularly good with access points (and the things driving them) and web servers etc, ping me a DM I could use some advice 🙂
Avatar
Might be worth posting the question in #network-forensics as well
Avatar
thanks, did so, it's probably a biiiit outside of your normal dfir remit so, we will see!
Avatar
Does anyone use any tool for screen recording (video) Android mobile devices that's easy to use and works totally offline? I've had a look over previous posts but can't see anything obvious. We're currently trialling Vysor but it requires a Google sign in. Although it still works once this is done and then the laptop disconnected from internet it means we can't use it on isolated forensic network. It also downloads an app to the phone which probably isn't ideal! Has Photon expanded to general video use? Ideally after something like that but me moving the screen 🤔
Avatar
Display and control your Android device. Contribute to Genymobile/scrcpy development by creating an account on GitHub.
👌 2
9:20 AM
One of my favourite free tools
Avatar
Andrew Rathbun 11/27/2019 9:20 AM
If anyone listening has any prized search warrant language for a device, provider, etc that they are willing to share, please send it my way via a PM
Avatar
Andrew Rathbun 11/27/2019 9:41 AM
In another follow-up to a previous conversation (https://discordapp.com/channels/427876741990711298/537760691302563843/649083878832734219), I've begun working on the search warrant/preservation letter template language repository. See below: https://aboutdfir.com/research/preservation-letter-search-warrant-language/discord/ (edited)
9:42 AM
More to come
Avatar
I have a stack of ipads lying around my office. Is there a way to get Apple to remove the icloud lock from them if they are "lawfully seized" devices. Most of them are disposals from evidence in cases that have been adjudicated and that haven't been picked up. Or is there a way to "break" the icloud lock with any of our tools.
Avatar
I seen some iCloud bypasses using checkrains boot rom exploit I think
7:20 PM
I think that’s for older devices though @Beefhelmet - not many free iCloud bypasses going around for new iPhones
7:23 PM
I am curious - what happens with all this tech that gets seized? Does it go up for auction or is it destroyed?
Avatar
Andrew Rathbun 11/27/2019 7:24 PM
Sometimes it goes back to the owner once a case is adjudicated (i.e. suspect was found innocent/guilty and all court proceedings are over with). Sometimes the devices can be converted to training devices if not claimed after X amount of days (refer to internal department policy, if one exists). Or they get destroyed. Pretty much the only 3 options I can think of. Or donated to a shelter after they've been forensically wiped.
🙂 1
Avatar
Nice - thanks for the answer @Andrew Rathbun !
Avatar
Andrew Rathbun 11/27/2019 7:28 PM
It'll be different from agency to agency though. All depends on their internal policy and procedure. That dictates everything
Avatar
Makes sense - I am curious how much extra money could be raised for the departments if they did online auctions of forensically wiped devices
Avatar
Andrew Rathbun 11/27/2019 7:31 PM
Probably too much of a liability, tbh. All it would take is one screwup of some PII getting out and the program would be cancelled immediately. Probably not worth the risk but a good idea though
Avatar
Ohhh that is a good point - makes sense / in other news for everyone in America happy turkey day! I’m heading off to enjoy some festive dinners ! Take it easy @Andrew Rathbun 🙂
Avatar
Andrew Rathbun 11/27/2019 7:33 PM
Take care! And Happy Turkey day to you too and everyone else
Avatar
Yeah we dont auction devices that contain or potentially contain personal information. What @Andrew Rathbun said we generally destroy them if they arent able to be auctioned or donated. I get all cellphones and computer hardware and generally keep them for parts to repair case work if needed or use them for testing. I've got about 4 filling cabinets of cellphones now that maybe one day before I retire I'll organize. Until then its dig around until I find what I need for the part I want. Used to be good to keep a stock of devices to probe ISP points if needed but that's kind of gone the way of the dodo as well. For me is mainly keeping iphones/pads to swap screens if needed or a usb port or battery here and there. (edited)
Avatar
I'm trying to intercept a connection a Xiaomi IOT Doorbell is making to a HTTPS server. I changed the local dns to resolve to my own IP. Anyone has any idea how to fake the doorbell to accept my own webserver or a python webserver with fake HTTPS or something?
Avatar
@cygnusx you got any more information on the webserver, certs or anything?
4:43 AM
and it could have the certificate saved locally, to maybe thats why a different cert is not working... not sure
Avatar
I suppose you'd need to see what request and response are being traded
4:47 AM
I take it you've already tried with a self signed
4:49 AM
if it's using a trusted CA it would probably be pretty unlikely to be able to spoof it
Avatar
Been having a quick look at some of the android lock screen apps you can get on your phone. Some of them are incredibly dodgy, this one claims that if you forget your password that you can contact the company and they will email it to you, meaning it's stored in plaintext on their server. Might be useful in an investigation one day... "How can I unlock my device if I forgot the password? 1. By security answer Tap the security question icon on the lock screen and enter your security answer to unlock; 2. By security email Check your registered email and find out the email we have sent to you with the password you set; 3. Email us Please send us email at cs_locker@pin-genie.com with your registered email address so that we can send to you in case you don’t find the password in your email. " https://play.google.com/store/apps/details?id=com.pingenie.screenlocker&hl=en_US
The most secure lock screen and Applock on Google Play. With App Lock🔒, nobody can check your photos, videos, messages and apps. The patented PIN pad is the ultimate in privacy and will keep anyone from seeing your PIN, even if they watch you input it! 👀🙅Go ahead use...
😂 4
Avatar
the most secure lock screen on Google Play
😆 3
Avatar
Jason Roslewicz 11/29/2019 7:08 AM
In response to Darkrage, you are right we will always ask you if you use software with non-signed USB drivers when you have issues as described above and so will Cellebrite. We work closely with them on issues like those and they will appear anywhere that Windows, hardware with multiple USB options and Software co-exist. We will always get the drivers sorted out and the workstation running Cellebrite again whether it’s a TALINO or any other laptop/workstation. Any one with continued issues feel free to reach out to me directly jason@sumuri.com.
Avatar
PlastikPistol 11/30/2019 11:42 PM
@Andrew Rathbun Is Colin Fagen in here? He has a hell of a pdf full of search warrants and contact info. I could reach out to him to see if he’s ok with me submitting it?
Avatar
Andrew Rathbun 12/1/2019 3:19 AM
@PlastikPistol is he the one who makes the technology resource guide for LE?
Avatar
PlastikPistol 12/1/2019 3:19 AM
Yes
Avatar
Andrew Rathbun 12/1/2019 3:44 AM
I have that guide laying around. I'll have to poke into that as well. I might reach out to him as well. It's been a while since I've looked at the guide so I'll refresh myself on it. Thanks for reminding me about the guide. I'll add it to AboutDFIR
Avatar
i'm really interested as to if anyone has done any research on artefacts generated by discord, and discord-forensics
5:06 PM
if anyone knows any papers, bits of research or anything at all, please let me know, thanks!
Avatar
Andrew Rathbun 12/1/2019 5:06 PM
@bailey search this server for a publication posted previously
Avatar
okay, i'll do that, thanks
Avatar
Andrew Rathbun 12/1/2019 5:07 PM
@bailey also check AboutDFIR for a blog post or two under the tools and artifacts section
Avatar
i'll check it out, thanks very much!
Avatar
Andrew Rathbun 12/2/2019 10:00 AM
https://aboutdfir.com/resources/preservation-letter-search-warrant-templates/snapchat/ Just published my Snapchat SW language template on AboutDFIR (edited)
Serving Preservation Letters/Search Warrants As stated on this section’s home page, for every digital investigation where a Preservation Letter or Search Warrant is involved, Search.org’s ISP List should be your number one stop regarding proper steps to serve your legal p...
👌 2
Avatar
@Andrew Rathbun Using this right now, great timing!
Avatar
Andrew Rathbun 12/2/2019 10:23 AM
@whee30 great to hear, I welcome any feedback!
Avatar
Andrew Rathbun 12/2/2019 10:33 AM
@whee30 any other requests you need, too, I can add them to my list
10:33 AM
and if you have any improvements or suggestions for that format, let me know
10:33 AM
I have Discord and Facebook on there as well
10:33 AM
just looking to go down the list that develops itself as time goes on
Avatar
great resource. I had my warrant drawn up already but I'm adding some features I had forgotten about from your list. Seems pretty comprehensive so far
10:38 AM
I'm just trying to sculpt one request right now, asking for user info from three diff. accounts in one bullet point and then asking for: "Any other Snapchat usernames which share the phone numbers and/or email addresses for the previously solicited Snapchat user accounts for the time period of 09/01/2019 to present."
10:38 AM
I dont have PC for unknown account content but it could give me a lead based on the phones I've dumped. Does that verbiage make sense?
Avatar
Andrew Rathbun 12/2/2019 10:39 AM
so that verbiage, to me, sounds like you are just asking for the name of the user accounts that you don't know about that may or may not exist
10:39 AM
which, that would be good to know and as you said you don't have PC for the unknown accounts, if they even exist
Avatar
seems kind of clumsy, trying to make it sound better.
10:40 AM
i have three known accounts, trying to figure out what other user accounts they're using
10:40 AM
then if i find relevant chats in the phones im dumping i can draft another warrant
Avatar
Andrew Rathbun 12/2/2019 10:41 AM
You could request something like: Basic account information (username, registered email address, registered phone number, account creation date) for any Snapchat accounts which share the registered phone number and/or registered email address for the above Snapchat user accounts for the time period of 09/01/2019 to present (edited)
👌 1
10:42 AM
i think that might better fit what you're going for?
Avatar
yeah - that's a bit smoother.
Avatar
Andrew Rathbun 12/2/2019 10:43 AM
post edited
10:43 AM
changed to singular instead of plural (addresses and numbers)
10:44 AM
i also added that verbiage as a bullet point on the Snapchat page
Avatar
kmacdonald1565 12/2/2019 12:20 PM
when i write subpoenas i word it saying "alternate" or "associated" so alternate usernames, alternate addressess, other associated accounts, etc. which ever word fits better. can probably do the same thing with warrants. just a bit of grammatical judo to make it sound a little better. it helps it seem related to what you are looking for
👌 1
Avatar
Andrew Rathbun 12/2/2019 12:30 PM
@kmacdonald1565 thanks for the insight! I typically used the same language for both. Pretty much copy paste. Just different documents and formats of said documents
Avatar
Rickytickybobbywobbin 12/3/2019 1:06 AM
Is there any tool to decode php files ?
Avatar
Andrew Rathbun 12/3/2019 2:31 AM
@whee30 and anyone else, any feedback or changes needed to this page would be appreciated - https://aboutdfir.com/resources/preservation-letter-search-warrant-templates/
This section is a work in progress. This part of the site will contain template boilerplate language to include on various forms of legal process. It is highly advised to check with your local prosecutor and mind your local laws when serving legal process. These templates are...
Avatar
kmacdonald1565 12/3/2019 5:56 AM
@Rickytickybobbywobbin so, like most answers in this world, it depends but i dont know of any tools to "decode" the php files, but you should be able to look at the file in a text editor. Long story short, PHP is a serverside language that runs on top of HTML. PHP will have a set of commands on the server that build the webpage and the user typically never sees. so if you are looking at a .php webpage you are really only getting a small part of the picture, and that is largely HTML code you are looking at. if you have the source PHP, then you can look into how it works more.
6:00 AM
so, i suppose what are you looking at is the question?
6:00 AM
also cool name
Avatar
anyone have any idea what "Method 1 and Method 2 cannot be used because the device was not unlocked with a code after it was reset"
6:24 AM
means
Avatar
Deleted User 12/3/2019 7:27 AM
@Sudo Are you doing extraction of phone? I think it is bc the phone reboots during extraction and u need to enter code after reboot
Avatar
I was yeah, solved it by updating UFED
7:43 AM
it hadn't rebooted or anything which is why it was odd
Avatar
Good afternoon all ... Does anybody have a safe boot loader to flash past a locked Samsung J7 (SM-J260T1) to get a Logical or F/S ?
Avatar
Andrew Rathbun 12/3/2019 5:16 PM
https://www.androidcentral.com/you-can-now-chat-google-photos-app Potential new platform to share illicit images? I'm sure it's been used before but now that chat is being implemented that could bring it to a whole different level. Worth noting for purpose of serving legal process
Google's pushed a new update to its photo gallery app that lets you chat with friends about the photos you've shared.
Avatar
Android A1 MAX tv box, anyone created a forensic image of one? (edited)
Avatar
Hi all, Has anyone come across the Apple SIM card? We have one which will not extract with any of our tools. Not come across one in an exhibit before?
Avatar
kmacdonald1565 12/4/2019 6:09 AM
xry 8.2 was released (edited)
XRY 3
Avatar
kmacdonald1565 12/4/2019 6:52 AM
Amped Five and Convert have new versions too
Amped1 2
Avatar
PlastikPistol 12/4/2019 7:09 AM
@Sudo your iPhone is running a newer OS than your UFED supports. Is there an update for UFED available?
7:09 AM
Disregard.. I scrolled down... whoops
7:15 AM
Anyone from Magnet in here? Specifically dealing with ATLAS?
Avatar
Andrew Rathbun 12/4/2019 7:17 AM
@Magnet Forensics
Avatar
forensicmike @Magnet 12/4/2019 7:18 AM
DM'ed
Avatar
PlastikPistol 12/4/2019 7:20 AM
Thank you!
Avatar
yup I updated!
Avatar
spamspamspamandeggs 12/4/2019 11:18 AM
Hello all, I am looking to find someone who might be using virutalhere USB Dongle server in their environment to share out codemeter devices. Send me a PM if you might be able to help out
Avatar
Andrew Rathbun 12/4/2019 11:25 AM
@spamspamspamandeggs search the server for discussions in the past about this same subject. I know there's been at least 3. Start there for some immediate help
Avatar
kmacdonald1565 12/4/2019 12:42 PM
@spamspamspamandeggs its pretty straight forward, i dont use it professionally, but do personally. server is on raspberry pi running raspbian and connecting to it with windows 10 machines
Avatar
UnholyHeresy 12/4/2019 12:55 PM
Hello everyone im looking to do a solid course on Criminal Intelligence analysis. Does anyone by chance have recommendations ?
Avatar
Is anyone aware of a hash database, perhaps similar to NSRL, that contains MD5 hashes of published MP3s?
Avatar
Andrew Rathbun 12/5/2019 2:21 AM
@Zhaan as an MP3 hoarder and curator, I have to wonder if there would be any value to such a database? I say that because if if you take Artist - Song Title.mp3 from Amazon and then grab the same song from a P2P service, they likely will have different hashes due to IDv3 tags likely being different. I curate my IDv3 tags for my music collection so the hashes of my MP3 files are constantly changing as I update embedded album art, lyrics are added, tags are modified etc. So basically, what would be considered the de facto hash for a given song? I think there's just too many variables and that it likely doesn't exist. (edited)
2:22 AM
It's no different than taking an image and changing one pixel in the image to generate a new hash. Main difference being people very commonly modify tags on audio files but people don't really change one pixel on an image (edited)
2:25 AM
Amazon embeds their own song signatures into the tags off music you buy from them. I'm sure Apple does the same. Bandcamp files do as well so all those will have different hashes despite being the same song
Avatar
@Andrew Rathbun Thanks, I know what you mean but thought if I don't ask I'll never know! With mobile devices streaming and storing so much content these days, audio/video slows down investigators and increases export sizes. I have been adding audio to my local db as I go but when I was confronted by 19,000 audio tracks this morning, I felt it was time to ask! Yes, you could argue if its in an iTunes path is it likely to be evidential and why not simply ignore it but the little OCD demon in my head says 'yeah but what if', so I find myself checking anything I add to my DB.
👌 1
Avatar
Andrew Rathbun 12/5/2019 2:34 AM
To further this, think of all the bitrates of audio files. FLAC all the way down to like 32kbps. In between those two is like 50 different possibilities for audio quality for the same song. Which means each one will have different hashes. Arguably V0 and 320 sound nearly identical to the human ear but one is a constant bitrate while the other is variable. But they will have different hashes for obvious reasons. I think it would take audio signature analysis on the front end cross referencing with a massive known database to eliminate your 19k files but that would take forever to deal with for any tool. I think we are probably just stuck with it for now and probably the foreseeable future (edited)
👌 1
2:37 AM
https://youtu.be/aTQS25w8kZo would be an example of this. Each quality version would have a different hash. This is where audio signature analysis would likely be the solution
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
Avatar
Anyone got a Logitech MX Ergo? (edited)
Avatar
ThatLukeGuy 12/5/2019 5:54 AM
So I have been using Oxygen for years now and have traditionally really enjoyed it. It and Axiom are the two tools I have in my office and if I need cellebrite I simply need drive to my neighbor agency. Having said that I have a few thoughts for anyone who uses Oxygen primarily (I know you guys are out there).... It has been a LONG time since I have been able to get a physical on ANY phone. I think the last one I obtained was on a pre 7.0 android a few years ago. Is anyone else having a similar experience? Most of my extractions have been OxyAgent and leave much to be desired. I think of Messenger data (which every criminal in the history of time uses).
5:55 AM
I certainly do not want to disparage any software company. Their customer support has been awesome and have recieved help quickly from the engineers on issues. Just wanted to see if anyone else is running into the same issues. More and more I am having to run the devices to the cellebrite next door....
Avatar
Has anyone here done pentests on card terminals(EFT devices)? E.g. trying to find sensitive information such as the card number etc
Avatar
HERREVAD databases now extends to use in OSINT cases - Update3 - HERREVAD Databases Geo Location Artefacts https://trewmte.blogspot.com/2019/12/update3-herrevad-databases-geo-location.html
This is the continuing/on-going research and discovery into HERREVAD Databases Geo Location Artefacts. Back in 2017 little was known about...
Avatar
Has anyone been able to use the UFED Screen Shot method with an iPhone 13.* IOS ? Says to disable iTunes Backup Encryption but i'm thinking its just not going to work. I would rather use this vs taking pictures. (edited)
Avatar
NapsterForensics 12/5/2019 7:02 PM
@ThatLukeGuy I agree Oxygen doesn't support physical acquisition these days, especially after Android 6.0.
Avatar
@DCSO Worked fine for one of my exhibits, try running the disable itunes backup encryption through the tools menu, that's worked for me in the past.
Avatar
@Akko Good to know, I was'nt aware of that feature in UFED 4 PC etc. Would it delete any saved passwords or tokens that would be encrypted ?
Avatar
@DCSO It attempts to remove the UFED default encryption password 12345 which is used when an extraction is performed - its just something worth trying it doesn't lose user generated encryption tokens (that I'm aware of)
👍 1
Avatar
Back in 2012 I wrote about the introduction of a new form factor for SIM Cards (4FF). The outline and a potted history of SIM Card form fact...
Avatar
Andrew Rathbun 12/6/2019 11:28 AM
Why is it on so many search warrants and police reports I see "I-Pad" or "Ipad" written instead of the proper spelling. I can't be the only one that goes nuts over this
Avatar
Hi, I don't know how it works in the USA, but in France, the cops just don't care about that it's "not their job". So it's pretty usual to have misspelling or even inaccurate information (edited)
11:31 AM
And in general, as everybody knows that what's written on the box might be wrong, they just don't care
Avatar
Andrew Rathbun 12/6/2019 11:31 AM
That's a frustrating mentality but I get it. I worked with many of those types. Hilarious because most of the offenders own those iDevices but don't know how to properly spell them in a professional work product
Avatar
If it was only a spelling issue it would be great x)
11:33 AM
In France, if the brand of the phone is written, you're lucky
11:34 AM
Not speaking about the model, which we discover when we receive the phone
Avatar
PlastikPistol 12/6/2019 12:58 PM
Ya know how in different parts of the country people call things by different names? Here I call a soda a soda.. friends up north call it pop.. family in California call it Coke, whether it's actually coke or not. Here, everything is an iPhone (Iphone.) Or I'll get a request for a black ATT phone, or Verizon phone.. The timeframe questions.. how long will it take? Why does it take so long.. why could you get information from this phone but not the one the other day? There is a lot of frustration from places I never would have expected when I got started.
Avatar
Maybe with search warrants and police reports have the product ID already stated and the person completing the warrant/report just ticks the box so to speak. I remember one police force who would reject paperwork and return it to the person if s/he had not used correct coloured pen for the relevant section of paperwork - pedantic maybe, but if the person didn't improve their standard they would get a bollocking from the Inspector. With computerised forms it is very easy for a template warrant/report to include placing 'X' in the box against the most common product names on the market.
Avatar
US based: Ten questions about the phone evidence -
5:20 AM
Cell phone evidence is fragile. Most cell phone companies keep the records for a limited time, and evidence in a cell phone’s memory can be deleted intentionally by the user or unintentionally by normal processes of the operating system. We need to identify potential eviden...
5:26 AM
Cell Phone Record File Types
5:26 AM
This post covers the types of files the carriers use to send their records and how to open them in Excel. The typical file types the phone companies use are as follows: .xlsx Microsoft Excel 2007 and later .xls Microsoft Excel 97 to 2003 .csv Comma Separated Values .txt Plain...
5:31 AM
@Andrew Rathbun - does this article tell you something you didn't know?
5:31 AM
Once the judge signs the warrant, or we have a subpoena ready, we need to get it to the carrier. We will need to prepare the packet to send to the carrier’s company and decide on the method of delivery. All the carriers will receive the records by fax or mail, but some have...
5:33 AM
@Andrew Rathbun And pdf templates are here: (edited)
Avatar
Andrew Rathbun 12/7/2019 5:35 AM
I'll take a look at those later. Thank you sir. Might be helpful in some regard hopefully
👌 1
Avatar
does anyone know what the name is for those SMS code messages
3:15 AM
you know the ones from very short numbers i.e. 621093
Avatar
CLB_joshhickman1 12/9/2019 3:56 AM
@Sudo Verification codes?
Avatar
yeah like 2FA
3:57 AM
but the numbers they come from
3:57 AM
it sends you a verification code from a number like 621093
3:57 AM
as opposed to a full number
Avatar
Andrew Rathbun 12/9/2019 3:58 AM
I think they're called authorization codes or verification codes
3:58 AM
not sure there is a formal name for them
3:58 AM
SMS based 2FA authentication codes?
Avatar
yeah, I would take that to be the 2FA code itself, not the number it came from
4:07 AM
maybe they don't have a name
4:07 AM
I'll just go with something like SMS authentication provider
Avatar
Andrew Rathbun 12/9/2019 4:07 AM
oh I see what you're asking now
4:08 AM
SMS authentication provider seems like a reasonable term
Avatar
yeah, it's not always a number
4:09 AM
WhatsApp, Amazon, they come through as "WhatsApp" or "Amazon"
4:09 AM
even though you don't have them saved as a contact
4:10 AM
I just wondered if it had a specific name, like you have phone number, this is [whatever] number
Avatar
Andrew Rathbun 12/9/2019 4:10 AM
SMS Authentication Dispatch Provider is another possible term
Avatar
yeah, it's not a big deal, I was just writing it down in my update and thought, oh, what's that even called
Avatar
Andrew Rathbun 12/9/2019 4:11 AM
SMS Dispatch Modem is another term I saw floating around too
Avatar
CLB_joshhickman1 12/9/2019 4:13 AM
SMS generator, but anyone can grab those online.
Avatar
Amazon calls it "SNS", simple notification service
4:13 AM
ah!
4:13 AM
SMS short code
4:14 AM
Short codes, or short numbers, are short digit sequences, significantly shorter than telephone numbers, that are used to address messages in the Multimedia Messaging System (MMS) and short message service (SMS) systems of mobile network operators. In addition to messaging, th...
4:14 AM
makes sense, they're shorter than normal numbers lol
Avatar
Andrew Rathbun 12/9/2019 4:19 AM
Ahh now I see what you mean. Yeah the 5 or 6 digit number that's the sender's "address", so to speak. Didn't know it was called that. Learn something new every day!
4:19 AM
Same with like how you can text a tip to the police by sending it to 12345, for example
Avatar
yeah that's what I was after
4:29 AM
figures it would literally be "short code"
4:29 AM
I thought it would have some elaborate technical name
Avatar
is there a linux distro that doesn't have an awful file picker
7:04 AM
or is it all the terrible gnu one
7:05 AM
(I know it's a meme at this point)
Avatar
i'm a monday, anybody recall how to power of a LG with pincode to power off ? We have tried the typical hold volume,power,home button(located on rear)
Avatar
Forensic@tor 12/9/2019 10:17 AM
@DCSO Get it in to recovery mode and choose power down option. Hold volume down and power until it starts to reboot. Then immediately conduct key combos for recovery mode
Avatar
Hi, I’ve got an encrophone - bq Aquaris X2, it’s newer than anything we’ve had before. Does anyone know how to access the encrypted operating system? I’ve tried all the different button combinations
Avatar
forensicmike @Magnet 12/10/2019 5:43 AM
There are 3 possible ways to boot to secure startup. Two are default on and can be disabled. A third can be user specified with a pattern of directional swipes on the touchpad. (edited)
5:44 AM
The two defaults include 1) pressing "short short long" on the power button, and 2) by accessing a slider switch on the settings menu for "privacy mode" (or something similar - been a minute for me)
5:45 AM
Keep in mind the secure startup, once you get to it, will be a minimum length of 15 characters for a passcode, and can be setup to wipe after failed attempts or even wipe in response to a decoy passcode being entered.
5:47 AM
If you get past that, there is still the screen lock to consider. If you get past that, the USB port only permits charging operations, never data transfer. ADB type acquisitions won't work. Also note the only apps you can use on the encrochat flavor of Android are encrochat apps, which have strictly enforced limited lifespan messages and additional security measures. It's not possible to send regular SMS or make regular calls using these phones.
5:47 AM
@tinycar94
5:48 AM
I've gotten into 1 ever, and that was because the owner was kind enough to leave both passwords on a sticky note next to it.
Avatar
ctrlShiftEscape 12/10/2019 9:06 AM
@spamspamspamandeggs anyone have a workaround for using virtualhere over RDP? So far it works only if the remote machine has a VM running and everything inside 😣
Avatar
Any UK folks have a current and up to date drugs search list they could send through DM?
Avatar
@tinycar94 Normally when you boot into the Encro-partition on an X2, you need to do the short short long press on the power button like @forensicmike @Magnet mentioned. You need to do this when the phone is already booted up in "normal" mode aka. the empty vanilla Android partition. At least that's what we saw with most of the phones we get in.
Avatar
Andrew Rathbun 12/11/2019 5:25 AM
@3X3 @Law Enforcement [UK]
Avatar
I only got a kind of meh-ish one I think I made
5:47 AM
but I might have one I can email you
Avatar
ThatLukeGuy 12/11/2019 6:22 AM
Interesting problem. I just got a box of old phones that were lost and have defaulted to my agency due to time lapse. Most of these will simply become test phones. I do have a newer iPad in the box as well that I might be able to use for various investigative purposes. This is NOT an evidence device, simply a device to be used by my agency.
6:23 AM
The device was PIN locked with an unknown PIN. I attempted factory reset and ran into an activation lock requiring Apple ID login to remove\
6:23 AM
obviously I do not know the apple ID.
6:24 AM
I elieve it is running iOS 11.X. Anyone have any ideas or is this thing a brick? I have very little experience with jailbreaks myself.
Avatar
@ThatLukeGuy Maybe wiping it via iTunes and DFU mode will reset it? Maybe also be aware that the IMEI will become active on the network again if you succeed and start using it. For this reason we can't use perfectly good devices from lost and found as test devices, but that may just be the laws in my country.
Avatar
Anyone familiar with the ins and outs of bypassing biometrics? Specifically looking primarily at fingerprint sensors, but also faceID. I have been tasked with this, and I'm looking for up-to-date information
Avatar
@ThatLukeGuy I believe you will have to contact Apple and have them remove the activation lock. I have heard of people having success with this by showing them paperwork that proves you (your agency) legally own the device.
Avatar
CloudCuckooLand 12/11/2019 1:30 PM
@ThatLukeGuy If it is a WiFi model, you can desolder the NAND chip and change the Serial Number (may as well upgrade the storage at this point too right??) to remove the iCloud lock.
Avatar
heatherDFIR 12/12/2019 6:57 AM
Does anyone out there like Catalina? I want to smash my mac. 😦 Anytime I try something new (remote session, webex, etc.) it lets me down.
Avatar
ThatLukeGuy 12/12/2019 7:00 AM
@CloudCuckooLand This is what I may end up doing here. Thanks for the advice!
Avatar
Trying to figure out under what circumstances iOS will generate a KTX vs a PNG under (for example) applications>com.apple.mobilesafari>library>safari>thumbnails ? The pngs are basically screenshots of a website and based on what I’m reading they are generated when the app goes to the background. I can’t view the ktx files natively but I’m trying to figure out why both file types are stored in this folder and when one is used over the other.
Avatar
It seems that the PNGs I’m seeing are likely residual from a previous iOS and the newer iOS only produces ktx. I’ll leave it up for the next confused soul to find!
😂 1
Avatar
@heatherDFIR the one redeeming quality is sidecar, much smoother than DUET for using my iPad as a 2nd monitor, but alas... That's it as I sit on a throne of things busted by Catalina
Avatar
anyone had any experience with PDF malware
Avatar
forensicmike @Magnet 12/13/2019 5:21 AM
@whee30 You're correct, ktx replaced png at some point, maybe iOS 11?
5:21 AM
But its conceivable there might be some holdovers.
Avatar
or if you're like me and keep those tabs open from ios 11 - ios 13 🙂
😆 1
Avatar
Do we have some "verified" sections for LEA members?
Avatar
Andrew Rathbun 12/14/2019 8:46 AM
Nope
8:46 AM
As in LE only channels?
Avatar
Yeah, or at least verified in terms of "trustworthy" meaning from companies or public sector.
Avatar
Andrew Rathbun 12/14/2019 8:49 AM
No one gains access to the server without verifying themselves.
Avatar
🤨 Really? I never showed my color though
Avatar
Andrew Rathbun 12/14/2019 8:50 AM
And there will never be LE only channels on this server. The private sector folks and vendors would be excluded from that and frankly they are too valuable to everyone else to be segregated. The minute we start segregating people by giving certain roles special access to certain channels is the beginning of the end of this server, IMO. This gets asked of me a lot of the cons outweigh the pros tenfold.
8:50 AM
Verification process didn't begin until like 1200 members in
8:51 AM
it's a relatively new thing in the life of the server. we never thought we would be this big so we had to adjust fire once we reached a certain point in membership numbers
Avatar
Ah ok, so basically after reaching a critical number you guys started vetting us. But the "old" ones (the elder of the internet - for those who get the joke) could still be unchecked though.
Avatar
Andrew Rathbun 12/14/2019 8:53 AM
LE personnel shouldn't post differently in an LE only channel vs posting here in a general channel. Discord hosts the data you post and you should never post anything you don't want the media to publish. This is social media 101 for any LE personnel and this server is no different. So that pretty much takes the benefit of having an LE only channel away. It's not like LE will be posting suspect names and addresses of victims in that channel. I just don't see what benefit it would serve. And it would alienate a large, important group(s) that call this server home, too
💯 6
8:53 AM
We're much stronger of a community together than divided
8:53 AM
Yes that's correct @bit_reader
8:54 AM
And there are ways to go about reverifying everyone but we've not had that discussion yet. No real reason to at this point. If it ever becomes an issue that needs to be discussed, we will for sure. We're in this for the long haul. But we nip issues in the bud pretty swiftly so we've never had anything we've had to elevate to that level of discussion yet
Avatar
Sure, I'm not that stupid to post some ID material. ;) My point is more that if the baddies start to hang out here we'll run into serious trouble sooner than later because TTP will leak to some certain extent.
Avatar
Andrew Rathbun 12/14/2019 8:56 AM
No bad actors can gain access to all the channels you know and love without interacting with the mods
8:56 AM
this has been the case for the past 1000 members or so
Avatar
Andrew Rathbun 12/14/2019 9:17 AM
https://aboutdfir.com/resources/tool-testing/ new page added to AboutDFIR. Links to forensic testing images. If anyone is aware of more out there, please let me know
Avatar
Andrew Rathbun 12/14/2019 2:59 PM
Continuing from the earlier discussion, if anyone has any concerns or questions, you're always welcome to PM me or ask here in this channel. Any of the mod staff. Whatever suggestion, question, problem, etc, just bring it up. No such thing as a stupid question except the one that goes unasked.
👌 2
Avatar
Dr. Kaan Gündüz 12/16/2019 12:30 AM
i have a stupid question 🙂
12:31 AM
how do you validate a mobile device imaging method in ISO17025?
Avatar
anyone had experience with email forensics, I've got some super bizarre stuff to try and work out what's gone on here
Avatar
Andrew Rathbun 12/16/2019 4:42 AM
What do you have going on?
Avatar
just a whole mess of odd things
4:43 AM
someone has been phished, basically, in some manner
4:43 AM
I thought it was one party, but now I'm not sure at all
4:44 AM
basically, party 1 have received a bill from party 2 but it wasn't really from party 2
4:44 AM
party 1 have lost the money it seems
4:44 AM
the real party 2 at one point says to party 1 you use freeola.co.uk/webmail which doesn't work with outlook sometimes
4:45 AM
party 1 doesn't use freeola, but party 2 does
4:45 AM
embedded through the email though, and I'm guessing from party 1, are images for freeola.co.uk
4:46 AM
and other href /webmail/compose?to
4:46 AM
then in the headers, ,there's a return path of a totally different email, party 3
Avatar
Andrew Rathbun 12/16/2019 4:52 AM
Not an expert in this by any means, but are there any anomalies with the SPF, DKIM, etc?
Avatar
SPF? DKIM?
4:56 AM
the "reply to" header on this email is for a name.name-company.co.uk@dr.com
4:56 AM
so that's clearly not legit lol
Avatar
Andrew Rathbun 12/16/2019 4:57 AM
SPF is sender policy framework which validates the IP address with the originating domain and DKIM verifies the message has not been changed via digital signature
4:58 AM
copy the email header into a text editor and do some Ctrl F for SPF and DKIM
4:58 AM
see if there's any PASS or + or anything like that that indicates something positive (+ can mean pass)
4:58 AM
if there are positive indicators like that you can generally trust the read of the header content, however, since you already suspect this is fishy, you're probably not going to have positive indicators.
Avatar
no DKIM or SPF info
Avatar
Andrew Rathbun 12/16/2019 4:59 AM
Like I said, not an expert, but I did take a SANS course 4 months ago that briefly mentioned these concepts (equivalent of staying at a Holiday Inn Express last night)
Avatar
just normal headers
Avatar
Andrew Rathbun 12/16/2019 5:00 AM
by Chirath De Alwis Due to the rapid spread of internet use all over the world, email has become a primary communication medium for many official activities. Not only companies, but also members of…
5:00 AM
SPF and DKIM and DMARC are some things along with phishing, forensics, etc you should include in Google search queries
5:00 AM
and see if you can find anything that helps
Avatar
gotchas
5:01 AM
none of these sample emails have any of that in
Avatar
Andrew Rathbun 12/16/2019 5:01 AM
Well that is likely a clue that something is fishy
5:01 AM
but gives you something to run on
5:01 AM
I'm basically just trying to figure out who was compromised
5:02 AM
but it seems like the person sending the emails with the dodgy return path and reply to
Avatar
Andrew Rathbun 12/16/2019 5:03 AM
Full information and examples to help you understand the information contained in an e-mail header.
5:03 AM
ctrl f SPF
5:03 AM
see how there's the pass indicated there?
Avatar
yeah I see it
5:04 AM
not present in any of these though
Avatar
Andrew Rathbun 12/16/2019 5:04 AM
if you're not seeing that i would say that's a red flag, but at least you can see what you should be seeing and clearly aren't
Avatar
unless they're not using any kind of security
Avatar
Andrew Rathbun 12/16/2019 5:06 AM
I bet the people at https://www.metaspike.com/ would be good to reach out for this. Since they have that Forensic Email Collector software. I'm sure they're well versed
5:06 AM
@Metaspike but I don't think they frequent here
5:07 AM
https://articles.forensicfocus.com/tag/email-forensics/ Some other articles potentially of interest
5:09 AM
I originally thought someone else had been the source but
5:09 AM
based on this, it definitely seems like they're the ones who have been hit
5:09 AM
it threw me because party 2 using freeola said "oh you use freeola" to party 1, which smarked to me "ah they've been phished via their webmail"
5:10 AM
but evidently not
Avatar
also one email from party 2 the from is mail.google.com/webmail/compose?to=them and the to is again mail.google.com/etc/etc
5:21 AM
there's so much going on here
Avatar
Davesdailypicks 12/16/2019 6:58 AM
Has anyone worked with Ring Camera's? I'm working a case where someone remotely logged into someone's camera. Does anyone know if Ring saves IP login logs?
Avatar
@Davesdailypicks My Ring camera doesn't show any logs for remote login. However, the app does show who has shared access to the doorbell. Obviously this isn't information from an extraction of the doorbell, just what I see on my iPad's applciation
Avatar
Are Ring DB hooked up through the wifi? Would the router log show the access to the network?
Avatar
Andrew Rathbun 12/17/2019 4:02 PM
Yes they are WiFi.
Avatar
Arman Gungor 12/17/2019 9:54 PM
We would be happy to help if we can, @Sudo. We have a few quick write ups on our blog on email authentication techniques, which might give you some ideas.
💯 2
9:58 PM
As @Andrew Rathbun mentioned, DKIM verification is very helpful. If you don't have DKIM signatures, I would check other sample messages among the same parties from the same time period to see if that's typically the case, or if there is something unique going on with the messages you are investigating.
💯 2
Avatar
Andrew Rathbun 12/17/2019 10:06 PM
@Davesdailypicks might be worth emailing their LE contact and ask them if they record IP logs and their retention policies
10:07 PM
subpoenas@ring.com
10:07 PM
These guidelines are intended for use by law enforcement when seeking information from Ring LLC or its subsidiaries (“Ring”). All requests should be submitted to subpoenas@ring.com. If your request...
Avatar
@Arman Gungor thanks, I'll get them to send me over more emails to check
Avatar
Just learned from an army buddy of mine who gave me a heads up about this fraud. "Police say someone had their bank accounts emptied after they paid a taxi driver with a debit card. They had wanted to pay with their credit card, but taxi asked for another method because he didn’t want to pay the 4% visa fee. Police advise that whenever you are asked to use a debit card instead of credit card for whatever reason, enter the wrong PIN. If it is a counterfeit machine it will pretend to process the payment and produce a receipt. Whereas an authentic machine will reject the PIN and request a “try again” message. Help spread the word, as the police state this type of fraud is becoming increasingly prevalent."
Avatar
And once you put the wrong pin in and the driver tthanks you for taking a ride, make sure to document everything about cab/driver because you just caught a bad guy.
💯 2
Avatar
https://twitter.com/chaignc/status/1207354323329527808 I leave this here in case someone has motivation to explore this "new linux memory artefact" (edited)
8 months ago I left a tips that sudo leaves artefact in memory if an attackers tries to use sudo because token attempts are stored in tmpfs. Did someone wrote a @volatility plugin? @_bcoles ported it to metasploit but what about #DFIR https://t.co/MGaeGLYzrQ
Avatar
Andrew Rathbun 12/18/2019 10:35 AM
Really random question on behalf of a coworker, does anyone know of or have any documentation on how iMessages are transmitted? As in, they're trying to see if iMessages hit out of state servers to help a wire fraud case. I personally think it would be more than reasonable to say an iMessage, when sent even to the person sitting next to you, that servers out of state are used in the transaction. However, I can't prove that nor do I have any documentation supporting that claim. Anyone have any $.02 they can throw into the pot?
Avatar
@Andrew Rathbun depending on the physical address of the servers yeah. Apple collects metadata on the conversations on iMessage. I understand they are end-to-end encrypted.
3:25 PM
Apple logs your iMessage contacts and IP addresses among other metadata and could share it with law enforcement authorities, if compelled.
👌 1
3:27 PM
If that is the case couldn't someone just tracert the ip address for the Apple imessage service? (wouldn't know how to do it without an IP address on an iOS). (edited)
Avatar
So I’m thinking of switching out the Touch2 for 4PC ... any drawbacks or other consider?
Avatar
Andrew Rathbun 12/18/2019 4:41 PM
@Lflores did the same thing at my previous lab. Couldn't recommend it enough. 4PC can be installed on any amount of laptops you have in your lab. Obviously requires the dongle to work
Avatar
deepdive4n6 12/18/2019 4:47 PM
@Lflores Another vote for 4PC. We did that swap several years ago and I can't think of any drawbacks whatsoever. We take 4PC on a laptop (with other forensic software) into the field all the time; it's not as streamlined as the Touch2 solution is, but it is a lot more versatile.
Avatar
Andrew Rathbun 12/18/2019 4:58 PM
@mitchlang thank you. I'll look into this more tomorrow
👌 1
Avatar
Forensic@tor 12/18/2019 6:27 PM
@Lflores My only issue with 4PC is a potential for driver conflicts. I have had many that don't occur on the Touch2. Every time you plug in a device windows wants a driver. I do run windows via boot camp on a Mac and they may cause some of it. (edited)
Avatar
Thanks for the replies! I'm Gonna pull the trigger and switch!
Avatar
@Andrew Rathbun National Police Chiefs’ Council (NPCC) - NPCC FINAL CONSENT v1.2.pdf https://www.npcc.police.uk/documents/NPCC%20FINAL%20CONSENT%20v1.2.pdf
Avatar
https://www.fox-it.com/nl/actueel/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/ Fox-IT published a whitepaper about APT20, a Chinese espionage group that went silent for a while. Fox-IT observed this threat actor live during a incident response case. Definitely worth a read (edited)
👍🏻 4
Avatar
Has anyone been able to recover a stolen Xbox One via logging into the victim's account; or any other way?
Avatar
Learn how to receive and interpret activity reports of your child's device use, including web browsing, apps and games usage, and screen time.
1:46 PM
assuming it's signed in still
Avatar
ThatLukeGuy 12/19/2019 2:54 PM
I asked a couple weeks ago about an activation lock bypass and if one actually existed. The consensus was that it did not exist. Just found one that ACTUALLY works. Run it on three separate test phones. I did brick an ipad though.... didnt wait long enough for a command to execute and home button no longer functions rendering it effectivley useless.
2:55 PM
Three iPhones later though and I can say it works
Avatar
@ThatLukeGuy I guess stealing iPhones just got profitable again? I wonder if they can be successfully set up w a new iCloud and connected to a provider... I don’t see why not. Will be interesting to see!
Avatar
ThatLukeGuy 12/19/2019 4:45 PM
@whee30 I will test this tommorrow
Avatar
Haha little late in the game. Its just a Bypass, no service and low functionality. Enables JTAG debugging which is the best part
Avatar
@whee30 device is still not activated so no gsm network, no access to app store, own icloud, screenshots etc. So far nobody cracked apple activation. It is possible to copy valid activation data as well as apple account from another, fully working device but this has its limit as well so i wouldn't say it's profitable again 😉
💯 1
Avatar
Hello, thx all I came here few days about about sudo memory artefact left in memory, we now have a defined methodology to retrieve them, the question now is was this already documented? 🙂 https://twitter.com/chaignc/status/1208036686153895942?s=20
Perfect bro 🤠 New #DFIR Artefact? tsdump can recover attempt from sudo files stored in tmpfs. See bellow for the methology: https://t.co/3lihZbCkae Bellow the source code: https://t.co/K5EfgIdld9 Thx @attrc and @indieami <= creator of sudo #Forensic #SOC #CERT #Yara ...
Avatar
Anyone have any issue update their windows 7 to windows 10 with all the forensic software on it
Avatar
deepdive4n6 12/20/2019 8:40 AM
@spoon1997 I did an in-place upgrade on one of mine; no serious issues. Don't forget to set EnableLinkedConnections registry value if you use network drives.
Avatar
Question about a Square Reader , is there any data on it or is it a passthrough data like im thinking ?
Avatar
Bob.I - DFO Ottawa-IACIS 12/20/2019 11:05 AM
Does anyone have a link for KAPE? The Google links are not working
Avatar
Andrew Rathbun 12/20/2019 11:06 AM
Kroll Artifact Parser and Extractor (KAPE) is an efficient and highly configurable triage program that will target essentially any device or storage location, find forensically useful artifacts, and parse them within a few minutes.
11:06 AM
you have to fill out a form
Avatar
@deepdive4n6 thanks
Avatar
Devin_the_Dude 12/20/2019 12:03 PM
Has anyone had anyone tried pulling logs off either a Xerox Workcenter 7830i or a Brother ADS2000 (desktop scanner)?
Avatar
TFPO Kernal Exploit for A12-A13 Out Now!
Avatar
I'd say just try the web interface, but I guess you did that
Avatar
Not sure if it's been posted yet, but andriller has been made open source: https://github.com/den4uk/andriller
Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. - den4uk/andriller
👌 4
Avatar
Nice! Good utility!
Avatar
Anyone from @Magnet Forensics able to quickly help me?
Avatar
Yep, what's up
magnetforensics_alt 2
Avatar
Merry Christmas everyone
🎅 17
Avatar
I got a case involving a FireStick using the Kodi app to allegedly show porn to a minor. Anybody know what artifacts that made be there? So far, I found add-ons for adult streaming sites. I was hoping to find possible search history.
Avatar
@gt530 I usually run the extraction through Axiom.
7:41 AM
You might be able to go through the Kodi databases to find the search terms. I haven't ever tried that before. (edited)
7:42 AM
What type of extraction did you get? What did you use?
Avatar
I ran through IEF (We havent upgraded to Axiom yet). I mainly been looking at the extraction through X-Ways. I used ISP for the extract, which I think you did the pinouts for. Thanks BTW.
Avatar
LOL glad they worked.
7:45 AM
I don't use x-ways, but can you get to the databases with it?
Avatar
I did use a couple of search terms but they seem to hit on the add-ons as they used a hyperlink to a video on the the streaming site as a test. Yea, I can x-ways to look at the databases. I also looked at them through Cellebrite.
7:46 AM
The pinouts worked great. super easy.
Avatar
Let me see if I can find one of our evidence dumps which had kodi on it. I think we just did a 4k which had kodi.
Avatar
Thanks
Avatar
@gt530 the last firestick didn't have kodi like I thought. It had references to it, but it wasn't installed. I will need to dig around a bit more.
Avatar
ok. I been looking through the databases. only finding TV shows and movies. I wonder if it depends on the add-ons if the search history get saved.
Avatar
can you search the hex for search terms?
10:32 AM
that might tell you if they are actually saved in a db
Avatar
good call. I will try that
Avatar
Looking for ideas on how someone might have faked geofilters on snapchat. I have a FFS dump from an iPhone. I have a Snapchat image showing the geolocation filter for the Orlando Florida airport (MCO). He has home area geolocation filters later in the day. Seems like he might have flown home. However, analysis of any of the data (location and other types of data) from the day before it appears it is all for his home area. Bad guy says he faked the tag. (Seems reasonable to lie if you don't wan to get in trouble for traveling.) I have found where someone can use the apps itools or phantom to fake a gps location. Neither of these are on the phone. Any ideas how to prove it is faked?
Avatar
@sholmes look up what apps are / were on the phone. Apps like Fake GPS and alike
Avatar
@Dfdan I did try that. I searched the entire extraction, as well as the Installed Applications section, for GPS, Fake, as well as a few specific app names. All negative results.
12:56 PM
manual inspection of the phone revealed no apps of concern.
1:02 PM
Just figured it out. Found in a conversation where he has someone else logging in as him and snapping for him.
👊 3
Avatar
@sholmes good stuff.
Avatar
I have spent hours checking apps and long/lats for different pieces of evidence and nothing was adding up. So I just went back to working the rest of the case and BAM! "login and post on my snap."
1:05 PM
sometimes it is too easy and people aren't lying. 🙂
💯 1
Avatar
kmacdonald1565 12/26/2019 1:06 PM
everyone is a liar until proven otherwise
💯 1
1:06 PM
</cynicism>
Avatar
I miss LE work
Avatar
Does anyone know what is the purpose of the file path com.snapchat.android\files\file_manager\snap_first_frame? Android phone btw
Avatar
Hey, not sure if this is the right place to ask, but is anyone aware of CVE-2019-19781 being exploited yet?
Avatar
Any snapchat experts on today? 😂
Avatar
Andrew Rathbun 12/27/2019 4:32 AM
@Pacman not so much with the app itself but with search warrant stuff I am
Avatar
Andrew Rathbun 12/27/2019 5:04 AM
Also probably doesn't help it's the holidays and most people are burning time, likely
Avatar
Yep I figured it's a difficult time to ask questions lol
Avatar
kmacdonald1565 12/27/2019 5:33 AM
i am somewhat familiar with the app and sw stuff, what do you have? not sure if i would be an "expert" but i know a little bit
Avatar
Got two illegal pictures found in file path com.snapchat.android\files\file_manager\snap_first_frame. Device is an android, and I'm trying to work out what the file path is for.
5:40 AM
My best guess is its a thumbnail picture for a video.
Avatar
Andrew Rathbun 12/27/2019 5:44 AM
@Pacman I've had success with emailing Snapchat directly through their LE email listed on Search.org and asked them technical questions like this. I'd recommend doing that as a last ditch effort
Avatar
Yeah that's the plan. First POC is here, no luck then I'll try snapchat Monday
6:58 AM
How responsive are they?
Avatar
Andrew Rathbun 12/27/2019 7:05 AM
@Pacman they've always been pretty responsive for me. Usually within 24-48 hours. Few years ago they were within the hour for email responses. 2-3 hours for SW returns. However, I think their business has increased dramatically since then 🙂
7:05 AM
I think 2 hours 13 minutes was the quickest response I got from them on a SW. Average was about 2 and a half hours
Avatar
kmacdonald1565 12/27/2019 7:27 AM
that makes sense to me @Pacman so for the story portion, it will show you a single frame from the video as a preview to it, i imagine it needs a place to store it until its viewed...i cant tell you for sure for that path, as i havent ran into that....i can tell you i have had bad luck with using snapchat in an exigent situation. we had missing kid, that we found out was using snapchat on stranger's phones. She was almost 2 hours away in a major city...snapchat would only update us 2x a day, every message was 5 or 6 hours old information and location. made it a pain to find her.
Avatar
Andrew Rathbun 12/27/2019 9:42 AM
Serving Preservation Letters/Search Warrants As stated on this section’s home page, for every digital investigation where a Preservation Letter or Search Warrant is involved, Search.org’s ISP List should be your number one stop regarding proper steps to serve your legal p...
👏🏼 1
👌 2
9:42 AM
Any and all feedback is welcome
Avatar
Andrew Rathbun 12/27/2019 10:30 AM
Search Warrant Language Template (Mobile Device) The person, place, or thing to be searched is described as and is located at: The following device(s): Apple iPhone 6S Plus Color: Silver Model: A1687 FCC ID: BCG-E2944A IC: 579C-E2944A Serial: 1234567890 IMEI: 1234QWER5678TYUI...
10:30 AM
another one, would really appreciate some feedback on the Desktop SW language
10:31 AM
If anyone has a better template, please pass along 🙂
4:01 PM
Remotely Compromising an iPhone over iMessage
Avatar
@San4n6 I read articles like that and feel like a tiny little child in this field. The people who figure this stuff out are wizards.
💯 8
Avatar
Andrew Rathbun 12/30/2019 5:47 AM
Welcome @Vitaliy Mokosiy from @Atola Technology
5:48 AM
Atola saved my butt on a case recently so thank you very much for your work
👍 1
Avatar
Vitaliy Mokosiy 12/30/2019 6:33 AM
@Andrew Rathbun Welcome @Vitaliy Mokosiy from @Atola Technology Atola saved my butt on a case recently so thank you very much for your work It is always a pure pleasure to hear such things! I do hope to learn more from community feedback to help my team developing our hardware imagers in a proper direction (edited)
Avatar
forensicmike @Magnet 12/30/2019 10:40 AM
@whee30 DFIR is a field with so many highly specialized sub-disciplines, and yet due to the dynamic nature of digital forensics, many practitioners are expected to know at least a little about almost everything. I think this dynamism can also be used to our advantage however.. each new file can be seen as a potential opportunity to learn just a little more than we knew before on a particular specialty. This philosophy gets us out of the dreaded "forensic hamster wheel" where all we ever do is push a few buttons, generate a report, and move on to the next case without actually learning or benefiting as an examiner. The holy grail though I think is sharing what you learned (inasmuch as you are able) with a community like this one. (edited)
💯 8
nate7 1
Avatar
Has anyone extracted any usefull data from a Playstation 4 hard drive? Thanks
Avatar
@ds275 I would love to find this answer. If you find something, let me know. We usually clone the drive and then manually examine the cloned drive through the PS4.
12:52 PM
Looking for free software to play mp4 videos. Specifically one I can go frame by frame and possibly zoom in on guns. Great videos of the guns, but can't stop the video long enough to see if a serial number is legible. VLC wouldn't play the mp4s on my workstation. #multimedia-forensics (edited)
Avatar
Andrew Rathbun 12/30/2019 12:53 PM
@sholmes might be worth asking in #dvr-multimedia-surveillance or #multimedia-forensics
12:53 PM
I know some of the relevant vendors only monitor those channels
💯 1
Avatar
randomaccess 12/31/2019 1:43 AM
@forensicmike @Magnet +200 for sharing
👍 2
Avatar
Andrew Rathbun 12/31/2019 3:21 AM
Great responses already on that survey, thanks everyone
Avatar
Andrew Rathbun 12/31/2019 4:46 AM
https://forensicswiki.xyz/page/Main_Page Forensics Wiki is apparently back up
Avatar
Embarrassed to ask this but Digital Forensics is a perishable skill.. seeking advice on best way to open and blowout a .CTR? it has been a long long time..
8:36 AM
Xways is the preferred choice but just drawing a blank
8:37 AM
LOL disregard, I got it... LOL.... Starting the new year off with a bang LOL
Avatar
Andrew Rathbun 12/31/2019 8:37 AM
Mind posting the solution @nbh2493? for the purpose of the search
8:38 AM
No such thing as a stupid question either. We all experience brainfarts, too
Avatar
mount it in XW, do a Recursive View on the home folder root, select all files, then right-click to get the "recover/export" option
Avatar
Andrew Rathbun 1/2/2020 4:07 AM
Does anyone know of a free RSS feed aggregator for a Twitter hashtag, namely #DFIR? I'm testing out a #DFIR on Twitter feed in #twitter-dfir-feed but I'm on a 14 day trial and really don't want to pay 20 bucks a month after that
4:07 AM
I just want to push hashtag results via a RSS feed. Not seeing any free options
4:07 AM
Any help would be appreciated!
Avatar
Dr. Kaan Gündüz 1/2/2020 4:18 AM
@Andrew Rathbun how about finding sponsors 🙂
Avatar
there must be a bot that can do it
4:21 AM
an open saucy one
Avatar
Andrew Rathbun 1/2/2020 4:22 AM
well, we used Discord.RSS for our other feeds, but Twitter removed native RSS feed generation back in 2013 apparently
4:22 AM
so now third party services are all you can use to generate a RSS feed for a hashtag, apparently
4:22 AM
the free version of Discord.RSS has 5 slots, of which we use 4 right now
4:23 AM
#DFIR on Twitter would be 5 and frankly the last probable one we'd ever need for this server so it'd be a perfect fit (edited)
Avatar
but twitter don't do RSS basically
Avatar
Andrew Rathbun 1/2/2020 4:24 AM
#twitter-dfir-feed looks to be working right now just fine but I don't want to pay 20 bucks for that 14 days from now lol
Avatar
https://github.com/atomheartother/QTweet there's stuff like this but it's not RSS
A qt Discord bot who cross-posts from Twitter to Discord - atomheartother/QTweet
4:24 AM
not sure if it does hashtags, it doesn't say explicitly
4:27 AM
https://github.com/Astalaseven/twitter-rss there's stuff like this too
Rss-generator for Twitter. Contribute to Astalaseven/twitter-rss development by creating an account on GitHub.
4:27 AM
but that supposes you have the hardware
Avatar
Andrew Rathbun 1/2/2020 4:28 AM
Hmmm, like I said, I have 14 days to figure this out so we'll see what else people come up with. It's a nice to have feature based on feedback from the survey so I want to make it work but I don't want anyone to have to pay for it
4:29 AM
if people really wanted to pay, I'd rather they help us get the vanity URL via Discord Server Boosts lol
Avatar
yeah ya don't gotta pay
4:29 AM
I've never used RSS but that's what I found just googlin around
4:29 AM
whether it's actually helpful 😂
4:30 AM
what's the vanity URL
Avatar
Andrew Rathbun 1/2/2020 4:30 AM
if we get 30 boosts (we have 7 currently, I think), then we qualify for a vanity invite URL, i.e. I'd make it discord.gg/digitalforensics
4:30 AM
then we all work off the same sheet of music
4:30 AM
it'd be pretty awesome to have that but it's very not free lol
Avatar
gotcha
4:34 AM
I've never used Nitro or I'd boost it for ya
4:34 AM
though the allure of spicy gifmojies is high for sure
Avatar
Andrew Rathbun 1/2/2020 5:26 AM
Not sure why there's so many duplicate tweets but we will continue to monitor and see how it is. Feel free to mute it if it annoys you. That's the point of having separate feed channels, anyways. That whole category can be collapsed, too. If anyone has any questions, just let me know
Avatar
Got an iPhone 7 A1778, keeps rebooting, doesnt get passed the Apple logo before rebooting. It does respond to a hard shutdown (who doesnt!) but when you try and boot it in DFU/iTunes mode, it carries on rebooting. Any ideas? (edited)
Avatar
divemonkey. 1/2/2020 5:56 AM
Sounds like either a hardware fault or a software corruption of sorts. The latter would be fixed by DFU and re-flash which I assume wouldnt help. Maybe a quick teardown to check there isnt a HW fault. Is using Checkrain out of the question, this might allow you to debug the issue? (edited)
Avatar
huh, I never heard of checkrain before, is it valuable for forensics?
Avatar
CloudCuckooLand 1/2/2020 6:02 AM
@Zhaan Open the iPhone up, disconnect the front camera flex, see if that helps. One of the more common issues that causes bootloops (of many). You will need the tri-wing driver for the insides (edited)
Avatar
@CloudCuckooLand thanks
Avatar
divemonkey. 1/2/2020 6:04 AM
@Sudo Its a non-persistent JB but I dont think anyone has done the sort of analysis that would be required for you to use it in a "legal" way
Avatar
by "legal" do you mean ISO compliant or?
Avatar
divemonkey. 1/2/2020 6:04 AM
basically
6:05 AM
as with these things the concern would be whether someone could use the Trojan Defence (edited)
Avatar
gotcha
6:05 AM
I assume that it does enough to make that a possibility
Avatar
divemonkey. 1/2/2020 6:06 AM
indeed
Avatar
I wonder if this is what that thing does
6:06 AM
or close to it
Avatar
divemonkey. 1/2/2020 6:07 AM
We use it to assess apps and the OS from a security standpoint
Avatar
is it an "app" you have to load onto the device?
6:08 AM
only because the QnA says open the app
Avatar
divemonkey. 1/2/2020 6:08 AM
yes but it also exploits the boot process so you can sideload the app
Avatar
gotcha
6:08 AM
that makes more sense
Avatar
divemonkey. 1/2/2020 6:09 AM
checkm8 and checkra1n same same but different
Avatar
so can it bypass locks or circumvent anything?
Avatar
divemonkey. 1/2/2020 6:09 AM
TBH I kind gloss over those details for the shiny shiny
Avatar
it's cool, just trying to get an idea of it
6:09 AM
I'm sure I could work it out from the documentation
6:10 AM
answered my own question
Avatar
divemonkey. 1/2/2020 6:10 AM
bypass locks.....no those are still held in the secure element. There is nothing to stop you from access the non-encrypted data though
Avatar
You don't have to open the checkra1n app to get your root ssh access
Avatar
love root ssh access
Avatar
You have to open it to then install Cydia (which is downloaded over the web, so requires internet connectivity)
Avatar
makes sense
6:13 AM
sounds interesting
6:19 AM
are there any applications then for DFIR or is it more just, jailbreaky bit of fun
Avatar
thanks
Avatar
There are five parts to the blog post currently. It can effectively get you anything that would be accessible in other forms of BFU extraction (does not bypass passcode, but can bypass USB restricted mode)
Avatar
what if you had the code?
6:21 AM
I suppose that code is only useful when combined with the OS though
Avatar
Then it could get you a full filesystem
6:22 AM
Not sure I understand what you mean about the combination. You can jailbreak the device without knowing the code, then unlock the device and use any of the forensic tools that have support for checkra1n to perform an extraction
Avatar
I meant like thinking say I can have someone's Google password but without accessing Google I can't use it
6:22 AM
like the salt/hash to spit out
6:22 AM
if that makes sense
6:23 AM
like I can't just throw a code at encrypted data, it needs to work with that code to decrypt it via whatever method
Avatar
Ah right, yes, the device itself has to be unlocked. Can't be decrypted after the fact, due to the usage of Secure Enclave
Avatar
cool, gotcha
Avatar
Andrew Rathbun 1/2/2020 8:12 AM
Definition for Firehose Programmers added to https://aboutdfir.com/education/forensic-terms/ based on feedback from the survey
This page is meant to serve as a forensic terminology reference guide for the community on potential definitions, both layman and technical, as well as analogies and potential courtroom explanations for juries.  This website and its writers claim no responsibility for incorr...
💯 1
8:14 AM
If there are any more terms that need to go on there, let me know guys
Avatar
if you are encountering T2 Macs and know the username and pw: https://github.com/slo-sleuth/slo-sleuth.github.io/blob/master/Apple/APFS%20Imaging.md
Data Discoveries. Contribute to slo-sleuth/slo-sleuth.github.io development by creating an account on GitHub.
Avatar
oh and why not try the tools that are supposed to work? we did - those tools failed. lastest version of macquistion 2019R1.2 failed regardless of how it was deployed, based on the instructions provided by BlackBag - and yes we exhausted all manner of trying to acquire it using macquistion; Recon Imager stuck at v 4.0 (latest i think is perhaps v 6) , and expired so we couldn't update it. so v4.0 failed as well..
10:44 AM
and this on two different unrelated T2 devices that came into lab over a 2 week period
Avatar
Andrew Rathbun 1/2/2020 10:53 AM
What does everyone use to validate their write blockers? As in, is there a program that will create some sort of report for write blocking validation and imaging? I have to validate all my hardware for our annual validation festivities so just wondering if there is a best practice out there besides just creating my own image and copying out FTK Imager reports and manually validating that I can't write through the write blocker.
Avatar
Best way I could think of was make an image from a known and verified write blocker. Then image device over with new equipment, and compare hashes....
👍 1
11:09 AM
Use small drives and it goes quickly.
Avatar
perryk_2772 1/2/2020 11:23 AM
In the Recommended forensic hardware thread in the Hardware forum I recently wrote the following about a hardware write blocker I'd just co...
👍 1
Avatar
this checkra1n is wild
👍 5
Avatar
Deleted User 1/2/2020 8:13 PM
I've used (quarterly, including today) Wiebetech's writeblocking utility. Does the job with an automated sectorwise report
👍 1
Avatar
Andrew Rathbun 1/2/2020 11:58 PM
Thanks guys. I remember that utility. I'll try it again. I have to verify a bunch of TD2u units so just looking for the most efficient and best practice
Avatar
Posted this in extraction: A colleague of mine found this website https://forum.xda-developers.com/android/development/amazing-temp-root-mediatek-armv8-t3922213 where he was able to soft root a test device, however he's had unsuccessful attempt to image the phone. Netcat doesn't work and using mount command with SD card attached doesn't look right.
-all-the-things.jpg Software root method for MediaTek MT67xx, MT816x, and MT817x! So it's no big secret that not too long ago, I found a way to achieve te…
2:29 AM
Has anyone seen this post?
Avatar
Andrew Rathbun 1/3/2020 2:42 AM
@Deleted User what writeblocker do you use this on? I have TD2u's I need to test and might as well test my Tableau writeblocker that's attached to my workstation
Avatar
Deleted User 1/3/2020 8:34 AM
I use em on all my bridges, card readers.. not on an independent unit like a TD2u.. I'd probably just attach a small USB and image with it, try/verify with a bridge/wiebetech validator, and reimage with TD2u to show no changes. I'm happy to hear what others do for it though
👌 1
Avatar
Hi all! As a DF student I feel that I can have some pretty basic questions I was wondering if this would be the right channel to ask in. (If it isn't just delete the post 🙂 ). Anyway, I am currently working on an assessment were we have an image of a FAT16 usbdrive, all the files fall into the times around november 2019 where there is one that has a Modified time set to 2022 and A and C date in 2019. Have tried to find answers online with no luck. So do you have any tips as to what it might mean? Thanks 🙂
Avatar
Andrew Rathbun 1/3/2020 8:54 AM
@AdriKL manually changing the system time then modifying the file (edited)
8:54 AM
Should be an easy scenario to recreate and test for yourself
Avatar
@Andrew Rathbun haha thats true 😅 Thanks for the answer 😄
💯 1
Avatar
Andrew Rathbun 1/3/2020 8:58 AM
No problem. Glad you felt comfortable enough to ask your question! Let us know if there's any more you have
👍 1
Avatar
Ok, found another question. On the image we have been given all the access times have the "correct dates" but all the times are set to 00:00:00. I cant seem to be able to reproduce it or find any useful info online :/ any tips would be greatly appriciated 😄
Avatar
Andrew Rathbun 1/3/2020 9:26 AM
@AdriKL Maybe the timestamps in the file have been modified at the hex level? I was going to say maybe the MFT had been modified but it's a FAT system. I'm way more familiar with NTFS than I am FAT. My suggestion, and it may be wrong, is to look at the file in hex and see where the timestamps are located and see if they've been zeroed out. Just a guess
Avatar
Ahh FAT doesn't seem to store the access time only the date in the root directory 😮 Then I learned something new today as well 😄 But thanks for the help regardless @Andrew Rathbun
Avatar
Hello all. anyone in a LE lab in NY, who is addressing e-discovery requests? I’m interested in how others are addressing e-discovery production. Also, if there is anyone in a lab who regularly deals with e-discovery production... please let me know. Thank you all.
Avatar
Andrew Rathbun 1/4/2020 4:16 AM
@luis511_ what's your question regarding eDiscovery? I deal with it a bit where I'm at.
Avatar
Hey.... do you have a set process for managing requests, identifying, compiling and distributing content to meet e discovery requirements?
4:20 AM
Regarding cases involving cell phones, what do you release for an e discovery request? Source data - extraction? UFED reader with all check boxes ticked?
Avatar
Andrew Rathbun 1/4/2020 4:21 AM
My workflow is we get the request from the defense that they want eDiscovery copies of all the evidence imaged. They provide a padlock drive. I throw all images on there and my hands are washed clean of it. On the prosecution side, it's just churning out documents and emails and anything else in particular relating to the case. We provide the EO1's and phone images. Defense can get their own expert to make them into something readable
Avatar
The cell phone question is an example... but it’s along the lines of what I’m after
Avatar
Andrew Rathbun 1/4/2020 4:22 AM
I also keep track of which copies of which devices were given when to who for which client.
Avatar
So for a phone case where you used celebrite to extract, you’re giving a copy of the iPhone.tar file Cellebrite creates?
Avatar
Andrew Rathbun 1/4/2020 4:23 AM
Yep whatever is output by UFED 4PC is what they get. No generated reports.
4:23 AM
They can generate their own with their own expert
Avatar
Ok...
4:24 AM
Don’t mind the dots. My brain is just thinking
👌 1
4:26 AM
Are you accepting requests for e discovery production via email? As the starting point to track the request? Or is it just verbal, and you document the request in your case notes
Avatar
Andrew Rathbun 1/4/2020 4:29 AM
Our workflow is the defense usually emails the prosecutor (AUSA) and then they email the case agent and CC me so I'm aware of it. Case agent has to submit a formal request via an agency specific form to have me fulfill the eDiscovery request. Once I get it and my boss and his/her boss approve it, I fulfill it. Defense has to provide a padlock drive though. Or a regular drive which I will then encrypt with bitlocker.
4:31 AM
Then I have some paperwork that I add to the electronic case file when I fulfill it
4:32 AM
I usually attach the initial request to the report of my activity via Combine Files in Adobe and then digitally sign it and upload to the ECF
Avatar
Perfect!
Avatar
Andrew Rathbun 1/4/2020 4:36 AM
Let me know if you have any other questions. Hope that helped. I'm taking a nap now since my kid felt like waking up at 0430 was a great idea.
Avatar
I understand it’s the easiest way to reach the dark web but does anyone here support the Tor browser? And/or use it for personal use? (edited)
Avatar
Andrew Rathbun 1/5/2020 2:02 PM
@Tyføøn I've only really used it just to poke around on the dark web for familiarity's sake. It's too slow for a daily driver. I use ProtonVPN as well for my VPN needs
Avatar
Deleted User 1/5/2020 7:38 PM
For anyone interested in a Windows explorer alternative: Directory Opus is having a sale: It's all 40% off! :) To take advantage of this sale, use the coupon code NEWYEAR2020 before January 27th, 2019.
7:39 PM
Been using it for a bit now, and if you're a heavy user in moving files and OCD in organization, take a gander
Avatar
Arman Gungor 1/5/2020 8:30 PM
@Deleted User Thanks for the heads up! Some of you might be familiar with DOpus from Amiga in the early 90s. Highly recommended on a DFIR workstation!
Avatar
Andrew Rathbun 1/5/2020 10:49 PM
My bad, just noticed this was posted here too. I just posted it on #off-duty. Oh well, more exposure! Use it daily and will never go back. (edited)
Avatar
Andrew Rathbun 1/5/2020 11:14 PM
@luis511_ another idea to track what you produced to the defense would be to generate a Snap2HTML file for the final production and keep that for your records. If you're not familiar, download it and try it on like your C drive to see what I'm talking about. You'll likely fall in love with it if you haven't already
Avatar
create fancy dir listings
Avatar
anyone ever use Nuix, seems like it's not that popular
Avatar
Andrew Rathbun 1/6/2020 4:05 AM
@Sudo I did in FOR500 and my agency has been implementing it very slowly over the past few years. Seems like we're finally turning a corner and will be implementing it into our workflow soon. They had us do a training pass and I've done 3/4ths of the classes so far. I've heard NUIX is prohibitively expensive so that may be why it doesn't seem as popular but I've also heard it's very popular. All depends on who you ask and what they do, I suppose
Avatar
I constantly have problems with it
4:07 AM
two separate cases both corrupted today
4:07 AM
or at least it's saying the data is corrupted
Avatar
Andrew Rathbun 1/6/2020 4:07 AM
It seems like a very powerful tool but it seems very overengineered for what we need it for. It's a pretty complicated tool, NUIX Workstation is. Powerful though once you get a grasp on it
4:08 AM
I haven't installed it on my machine(s) yet so I can't be of much help right now. Ask me in 6 months and it might be a different story
Avatar
yeah it doesn't feel very well designed at all
4:08 AM
all the pathing and stuff for evidence etc is really bad
4:08 AM
any other tool you can freely move or provide a sub-report of in some form
4:08 AM
but not Nuix
Avatar
Andrew Rathbun 1/6/2020 4:09 AM
There's gotta be a way, you'd think. Maybe it's just not readily apparent. I'm sure there's an overcomplicated path you have to take to get there
Avatar
I'm not sure how these cases corrupted but I'm guessing it was from moving it
Avatar
Andrew Rathbun 1/6/2020 4:09 AM
Do you need a contact for one of their trainers to ask a question? I do have the email of one of my instructors. You might know him since he's in your neck of the woods
Avatar
I have asked their tech support before and they basically said "iunno"
4:09 AM
might be useful yeah
4:10 AM
I just want to know if the data is actually corrupted or if it's just missing paths
Avatar
Andrew Rathbun 1/6/2020 4:10 AM
Sent you a PM with his email
Avatar
@Sudo We use Nuix in our lab, when moving cases during ingestion process you must edit the stored evidence XML file to point at the evidence container whether it be forensic image or mobile extraction. We use dedicated servers for Nuix ingestion which we copy the forensic images onto before starting the process off - may help, we rarely get corrupted errors.
Avatar
yeah I have done that in the past
5:51 AM
but the XML doesn't actually have any info around the stores location
5:51 AM
it was an email extraction, it just says "email@email.com" and some additional data
Avatar
I'll be providing a small course on DF investigations to a police academy, anyone have any good youtube videos to help get some ideas of evidence, big data, or legality that is simple yet informative. I've got this one on the data google collects https://www.youtube.com/watch?v=0s8ZG6HuLrU
Avatar
Here is a video I saw online:
2:15 PM
It might be tough to find one to provide a clear overview for a recruit class. Besides that most wont really care since they are getting there @ss kicked in the academy and will just want to make it through.. (edited)
2:16 PM
That is what I found while teaching new recruits.. I think its best to provide evidence collection towards the end near graduation since its more laxed at that point in the training.
Avatar
@Magnet Forensics Is there a way to create a report which includes items tagged inside of the File System view? It won't let me create a report from this view, and when I select Artifacts, I can't see my bookmarks in the Create Report section.
3:57 PM
Disregard. Select all Bookmarked files in the File System view and right click and Save to Artifact. Go to Artifact section and BOOOM! They are now in the Artifacts side and can be placed ever so nicely into a report. Thought I'd share in case someone else has this issue.
Avatar
MF-cbryant 1/6/2020 3:59 PM
Yep, or you can select tagged items from the items to include section and it will automatically also include tagged stuff from the filesystem explorer.
3:59 PM
The way you put above will be a little better in the short term though.
Avatar
Tagged items was grayed out on my options
3:59 PM
on the Artifacts side
4:00 PM
and obviously not an option on the FS side
Avatar
MF-cbryant 1/6/2020 4:00 PM
That said we are actively working on syncing tags between the filesystem and artifacts, so things more automagically get pulled across for reporting.
4:00 PM
That's odd. I'll have a look at that.
Avatar
That would be nice if it would pull FS tags into the Artifact tags when creating a report.
4:02 PM
Thanks @MF-cbryant. I appreciate you helping me out.
Avatar
MF-cbryant 1/6/2020 4:23 PM
@sholmes Np!
Avatar
anyone ever heard of the Win10 Xbox app being compromised?
3:33 AM
specifically to "hack" someone
Avatar
I have to analyze memory of Linux (centos v7) but facing issue in setting profile in volatility kindly if anyone can guide me or any suggestion Thank you
Avatar
did you use lIME to pull the memory?
6:57 AM
I am assuming you ran imageinfo and attempted kdbgscan? Did nothing come back?
6:57 AM
do you know what kernel version?
Avatar
Jack of Trades 1/7/2020 7:11 AM
Good morning fellow nerds
7:11 AM
Might be doing 508 this year. Much hype
Avatar
I just went through the new one its a good course
7:12 AM
well revamped version
7:12 AM
you will enjoy
Avatar
Jack of Trades 1/7/2020 7:12 AM
Sweet!
7:12 AM
Probably in June.
7:13 AM
Switching topics, you have any knowledge regarding SMB null binding?
Avatar
you trying to harden/secure this or looking for it ?
Avatar
Jack of Trades 1/7/2020 7:17 AM
Harden mostly, but I also know very little about it
7:17 AM
I see people connecting to IPC$ all the time for shares, is this expected?
7:18 AM
I mean it seems to be since it happens every time a user logs on anywhere
7:19 AM
its a pipe to the computer essentially with login/pwd for host/client or admin stuff
7:20 AM
unless configured wrong
7:20 AM
then could be an issue
7:20 AM
null should not be used since its allowing access with no password/login
7:20 AM
I am not an expert but this I know
7:21 AM
Enumeration is a very essential phase of Penetration testing, because when a pentester established an active connection with the victim, then he tries to retrieve as much as possible information of victim’s machine, which could be useful to exploit further. In this article,...
7:21 AM
if you want to look for misconfiguration but get permissions before doing any pentesting lol
7:22 AM
Contents Vital information on this issue Scanning For and Finding Vulnerabilities in NULL Session Available (SMB) Penetration Testing (Pentest) for this Vulnerability Security updates on Vulnerabilities in NULL Session Available (SMB) Disclosures related to Vulnerabilities in...
Avatar
Jack of Trades 1/7/2020 7:22 AM
Of course
7:22 AM
Thanks a lot :)
Avatar
yup yup
Avatar
Jack of Trades 1/7/2020 7:22 AM
Im allowed some authority to act, so I did a connection using net use since it already happens anyway
7:23 AM
But yes, thanks for the direction
Avatar
@Sudo to your question of the Xbox app, I've heard of accounts being compromised, but the local app being actively exploited I have not
Avatar
Donflamenco 1/7/2020 2:28 PM
I want to determine who is the subscriber for a phone number. What is the best method to go about doing this? Is the standard procedure to just subpoena all the carriers for subscriber information on that number and include the timeframe? Or is there a database that is reliable out there for law enforcement or otherwise that will provide me with the carrier? (edited)
Avatar
Joe Schmoe 1/7/2020 4:45 PM
@Donflamenco The Cellhawk website can sometimes give you the subscriber name. I’d guess about a third of the time. I would use it as a guide only though.
Avatar
@Krisaytha me either, thought I'd ask, though honestly everything this person has come up with is amazing
Avatar
@Donflamenco best way for PS is to check a public database. If it is criminal or access to subpoenas use a carrier lookup and send paperwork.
Avatar
Howdy, @Andrew Rathbun Posted in #announcements a number of months back some Faraday cases I started to distribute as other options were super expensive for our agency. Just a quick update, I offer a sample case and just passed 100+ free cases since I started doing this last year. If you are curious, check out this LEO owned and operated site https://www.mtdfe.com/. Click <- side "W9 & Sample Case Request" and I will ship one out for free for your team to test out. Thanks! (edited)
Digital Forensic Evidence (DFE) provides Modern Digital Forensic Solutions for Law Enforcement and DFIR to protect digital evidence from outside tampering.
Andrew Rathbun 1/8/2020 12:35 PM
Avatar
@mitchlang + 1 for MTDFE.com
👍 2
Avatar
chrisforensic 1/8/2020 5:49 PM
thanks @mitchlang ... requested one 😉 but not sure i get one, because i am from LE Austria 🇦🇹 (edited)
Avatar
I saw it come through. I'll see what I can do anyway! 👍
🤝 1
Avatar
anyone good with PHP
Avatar
kmacdonald1565 1/9/2020 7:13 AM
can anyone tell me the touch 2 and PA current versions? trying to figure out if i still have access to download updates, coworker has the devices on his account. i see the touch2 is no longer is allowing me to download updates but looking figure out if i need one too
7:13 AM
TIA
Avatar
7.27
Avatar
kmacdonald1565 1/9/2020 7:14 AM
for both?
Avatar
Anyone watch cellebrite 7.28 presentation yesterday?
7:26 AM
If I remember correctly it supports iPhone 7 to X only? Not 5 to X
Avatar
checkm8 is supported from 4s to X. Not sure what coverage 7.28 will give (did they mention it in the webinar? I must have missed that bit!)
Avatar
@kmacdonald1565 Are you in the NEW CB portal or the old one?
Avatar
chrisforensic 1/9/2020 7:35 AM
info from webinar...
7:36 AM
but info from beta - This method supports iOS 12.3 up to latest 13.3, on A7-A11 powered devices (iPhone 5S – X, iPad Mini 2/3/Air) - so just lets wait for the release 🙂
Avatar
kmacdonald1565 1/9/2020 7:37 AM
@RBegs2637 new one. old one tells me to go to new one
Avatar
Thanks
Avatar
Can I ask a general question about case notes software.. What do people use/like? We use casenotes professional.. It's free by First Response.. It's good but not a full case management system. Are there any other that people recommend that don't require a full multi system integration
Avatar
We would love to shift to a full multi-system intergration case management product but do not have the opportunity right now. We currently use a mix of Niche RMS, a IT service desk ticketing product on the police network, and just use word / Onenote on the forensic network. Soon it will just be all RMS until something else comes along. It works, but it's clunky. Might be worth looking into the transforming forensics project if that ends up really taking off this year, they are doing work in that area on a national level @monkpete
3:00 AM
Feel free to drop a message if you want more details on Transforming Forensics, it relates a lot to this: https://www.fcn.police.uk/
Avatar
Thank you will have a look.. We don't have the it infrastructure for something substantial but we may have to do something soon..
👍 1
Avatar
we have a bespoke one personally
5:41 AM
don't know if it's a full thing to anyone, it's pretty good
5:42 AM
we used to use that case notes pro actually, back in the day
5:43 AM
you definitely want something more substantial if you can, the one we use has built in exhibit movements, its own OEL, dates times, blockchain for secure notes etc
🤩 3
Avatar
Does anyone have the law enforcement contact at Wickr? We need to send a preservation request.
Avatar
@JSyber Msg sent.
Avatar
Andrew Rathbun 1/10/2020 6:52 AM
@JSyber did you try Search.org?
Avatar
I just sent him a paste of the search.org info
Avatar
Andrew Rathbun 1/10/2020 6:52 AM
This section is a work in progress. This part of the site will contain template boilerplate language to include on various forms of legal process. It is highly advised to check with your local prosecutor and mind your local laws when serving legal process. These templates are...
Avatar
Andrew Rathbun 1/10/2020 6:52 AM
Got it thank you
6:53 AM
I posted that AboutDFIR link as it has my take on situations like this. Always open to feedback
Avatar
can wickr be preserved?
Avatar
Andrew Rathbun 1/10/2020 7:50 AM
@Sudo never used it before but if they host the content on their servers then the answer should be yes.
Avatar
Andrew Rathbun 1/10/2020 11:03 AM
welcome all new members from Bob Elder's Google Group!
💯 4
👍 8
Avatar
DFIR analyst might be interested by this little quizz => https://twitter.com/chaignc/status/1216036489446019073?s=20
Hello Twitter. Which of the bellow folders contains most 64bit Dynamic-link library?
Avatar
https://twitter.com/chaignc/status/1216682122603266049?s=20 <= A DFIR analyst friend is looking for a job 🙂
He is french, but he is a good #DFIR analyst! Twitter RT and give him a job! https://t.co/Yd4zOFepJD
Avatar
Anyone any idea why Encase 8 won't parse a file system but Encase 6 manages just fine?
Avatar
I just got a GeoFence return back from Google, and have narrowed down a device IDs, but I'm not sure of what information is collected and stored by Google in reference to the device IDs. Does anyone have experience with what I should request in my subpoenas to help identify the IDs?
Avatar
@Rhaun I can help you with that.
Avatar
@Law Enforcement [USA] - how many of you started in IT and switched to criminal justice/digital forensics?
Avatar
Entrepreneurial Studies and an MBA, I don’t know what happened
😆 4
Avatar
I started in IT about 20 years ago. 13 of those years were spent doing IT for local LE and that eventually lead to becoming the DFE for the same LE agency.
Avatar
@John so how did you make the jump into this field?
Avatar
Started in LE and looking to swap to IT someday. Wouldn't recommend the opposite, personally.
Avatar
I switched from being a incident responder/malware analyst to law enforcement. Got tired of only seeing one side of the picture.
Avatar
Marine Electronic Repair > LE > Crim Just BA/MA > (Sworn) DF Investigator > MA DF
Avatar
@FieryFxx why wouldn't you recommend going from IT?
8:04 AM
I'm actually considering that jump, is why I'm curious.
Avatar
Because in my world of DF, it's primarily child victim material. Definite "no thanks" for a career full of it.
Avatar
I started in IT and moved to LE
Avatar
Andrew Rathbun 1/13/2020 8:05 AM
@leeflet I'll throw in a response. Child Porn. Nowhere else will you have to swim deep in that stuff than in LE. You may come across it in other sectors but then you hand it off to someone else in LE.
Avatar
I went from IT to LE
Avatar
I am in the same boat IT to LE
Avatar
I went IT to LE
Avatar
CP is terrible and is 70%+ of my work as well but that being said it is not 100% of the work and depending on the office you can be removed from that sort of work. Also, I personally find closing those cases are more satisfying then the standard hacking or drug induced death case.
👍 4
🤬 1
Avatar
That's a good call-out. How often is that material involved in cases you work? From the LEOs I know personally (some town USA), that's virtually unheard of.
Avatar
JonasWanobi 1/13/2020 8:07 AM
I got my degrees in Criminal Justice and Computer Science while working as a firefighter and then came over to LE.
Avatar
Unless it's some high school kid sexting a SO and the SO shares with his buddies.
Avatar
I'm on our ICAC so CP is a big part of my job, but I get a variety at our small agency. (edited)
Avatar
@leeflet Most small agencies wont have any sort of digital forensic unit. If you have a digitial forensic unit it will likely be funded by a taskfoce membership ICAC is the most common taskforce for an agency to be part of.
Avatar
@leeflet and others add in. Very little guarantee (unless you apply for one of these DF Positions, which are usually civilian) you will end up doing DF work. Most agencies start as line officers and then it is a matter of what is open or needed.
Avatar
Yeah, agreed with @DMG Probably close to 70% and they're satisfying but we don't rotate out so if the case you get happens to be CP, it's all CP.
Avatar
Started as an infantry idiot, then crossed over to LEO/DFE
Avatar
Andrew Rathbun 1/13/2020 8:10 AM
some agencies have civilian examiners (i.e. Michigan State Police) but they also service the entire state. I've personally not heard of in my state civilian examiners at a local PD. Those are always people pulled from the road into a detective spot doing DF work
Avatar
@mitchlang "Most agencies start as line officers..." <-- Does this mean starting as patrol cop and then "climbing the ladder" to DF?
Avatar
Andrew Rathbun 1/13/2020 8:10 AM
@Palazar82 hey me too, 0311 USMC
👍 1
8:12 AM
@leeflet yes it means you have to go through training as a patrol officer, often 4-6 months or so. Very stressful, especially for a rookie cop. Then, you usually have to wait at least your first year of probation and then whatever other requirements for any DF spots, if they're even offered. Often times, seniority might get in your way for highly coveted spots but it all depends on the PD. At my PD, seniority didn't factor into anything so young officers got lots of looks at coveted spots
Avatar
@leeflet I think each person is different. My main job is a General Investigator, which means I do property-homicides but not super specialized cases like ICAC or Sex Assaults (usually). I made the job when I got to it and when you solve a handful of cases with cellphones and carrier information you then become the "cellphone" guy.
8:14 AM
@Andrew Rathbun Oorah
🇺🇸 1
Avatar
Reiterating what everyone else has said... Each agency is different. I got hired on to do digital forensics and skipped doing patrol. Neighboring agencies typically have to do patrol work first.
Avatar
@leeflet always wanted to work for a law enforcement agency but wasn’t sure how to go about getting my foot in the door. I applied to an Internship program while in grad school, was accepted and was originally meant to work something much different. But do to industry needs I found myself assisting with cyber crime. Was offered a job in forensics shortly after.
Avatar
@Andrew Rathbun - I think that's the part that makes me hesitate (being a patrol officer). I don't want to BE a cop, I want to HELP a cop.
Avatar
@leeflet then be a civilian examiner, or agent for an office
Avatar
Andrew Rathbun 1/13/2020 8:17 AM
@leeflet you will have to find an agency that has civilian examiners, then. Like I said, in my state the stage agency has a bunch of them because they service the entire state's department that don't have that capability in house. Where I worked before, we basically took care of most of the PDs within the tri-county area. It's different everywhere though. We had a fortunate budget.
Avatar
Andrew Rathbun 1/13/2020 8:19 AM
@leeflet another option is to go federal. The job class you'd want to look for is 2210 (Information Technology Manager). You won't be helping street level cops but you'll be assisting in more white collar crimes or larger scale crimes depending on the agency. For instance, if you worked for IRS OIG, you'd be combatting tax fraud and all that stuff. If you're HHS OIG, you'd be combatting healthcare fraud. If you're FBI, you're probably doing terrorism type cases. DOL OIG is probably labor fraud? You get the point. There's tons of federal opportunities to do niche work depending on the agency you choose.
👍 2
Avatar
@Andrew Rathbun If you end up FBI or HSI he could be back in the CP cases
Avatar
I didn't think of the Federal level. Thanks for that!
Avatar
Andrew Rathbun 1/13/2020 8:20 AM
Beautiful thing about LE is you have a lot of choices at different levels. You can also start at one level and transition to another eventually once you get some experience and decide what you like and don't like
8:20 AM
@DMG yes that is very true. Good point.
Avatar
@DMG COPY--CP is terrible and is 70%+ of my work as well but that being said it is not 100% of the work and depending on the office you can be removed from that sort of work. Also, I personally find closing those cases are more satisfying then the standard hacking or drug induced death case. All I do is CP cases. That's all I see anymore. Going on 5 years and it certainly fucks your head! (edited)
Avatar
Andrew Rathbun 1/13/2020 8:21 AM
Either way, LE experience is hard to replicate elsewhere when you're working homicides, CP, extortions, and all the other ugly, underbelly happenings that go on in this world. They will fall into your lap and you'll get that exposure. Everything you do afterwards will seem boring
Avatar
I'm currently in LE and learning the world of computer forensics as a detective. It's intimidating for sure. I'm looking for any resources to stay current and to continue to learn and rehearse what I have learned. Any suggestions or resources would be great!
Avatar
@adam2817 you need to hit a shift wellness class my good sir
Avatar
@DMG I have met with those folks at the conference last year. Good folks
Avatar
Andrew Rathbun 1/13/2020 8:23 AM
@Sota166 hanging around here and other forums is a great start. Knowing who and where to ask for questions that come up is a big step. Actually asking them is another. Hopefully the water is warm enough here for you to feel comfortable asking your questions. Always happy to help
Avatar
@Sota166 - this was my first question on here and I got quite the response! 😄
8:25 AM
Thanks all who responded! You've given me plenty to think about.
Avatar
@adam2817 They will put on a course about dealing with the issues associated with the stress from those cases. They came and presented for the power that be at our agency and as a result we now can rotate out of those cases / get a break
Avatar
kmacdonald1565 1/13/2020 8:25 AM
@leeflet cops are very opinionated
😆 3
Avatar
Andrew Rathbun 1/13/2020 8:25 AM
@Sota166 it all depends on the type of cases you're working right now and what your current workflow is. Are you doing deep dive stuff? Registry forensics? Other? Let us know and we can help guide you
8:25 AM
Cops are also very strong willed in their opinions lol
8:25 AM
Very stubborn 😄
Avatar
@DMG that's great. I know I can use it. 1.4m people and I'm the only guy!
Avatar
@Andrew Rathbun anything that my department needs. I've only imaged one laptop so far. My workflow could be anything from Fraud to CP. my training so far is BCERT and will hopefully go to MDE within the year. Tools I mostly use are Axiom and a Tableau to image.
Avatar
@Andrew Rathbun no we're not! (Sarcasm)
8:34 AM
@Andrew Rathbun no we're not! (Sarcasm)
😂 1
Avatar
Andrew Rathbun 1/13/2020 9:00 AM
@Sota166 any other training on the horizon? Best advice I can give you is if you get stumped on something or aren't sure, just ask here
Avatar
@Andrew Rathbun nothing other than potentially MDE. I will for sure. I'm sure I will need help, this is all new to me.
Avatar
@Andrew Rathbun and you ended up at my favorite college lol. I am still in the Army just now CID as a DFE yay no more ruckmarches lol.
💯 1
Avatar
Does anyone know off the top of their heads how long Google/Alphabet retains email a user has deleted from their Gmail?
11:19 AM
Assuming no preservation order or anything has been issued yet
Avatar
30 days
11:49 AM
according to their site
Avatar
I actually went from LE to IT (so the other way around) and am much happier, but that’s just me. Speaking of which, @Andrew Rathbun can you update my roll to private sector.
Avatar
Andrew Rathbun 1/13/2020 12:28 PM
@VBHendo done and thank you for letting me know and congratulations!
👍 1
Avatar
@Psychre link? thats an additional 30days after it is unrecoverable from the trash? if so, perfect. what i was hoping to hear
Avatar
When you delete a message, it stays in your Trash for 30 days. After that time, it will be permanently deleted from your account and can't be recovered. Choose your delete settings Learn how to c
Avatar
yeah this is public. i'm talking about a subpoena to their legal dept
Avatar
Oh sorry.
Avatar
how long is the data in their database before being purged. typically subpoenas include deleted messages. i just don't know how long
Avatar
Understood. I was thinking public.
Avatar
Has anybody attended "Mobile Device Examiner" at NCFI?
Avatar
Deleted User 1/13/2020 6:48 PM
I did last year @LawDawg
Avatar
Andrew Rathbun 1/14/2020 2:11 AM
Oh wow
Avatar
Well that's interesting
Avatar
Interesting to see where that goes......
Avatar
Hopefully BlackBag Certs carry over.
Avatar
Will CAS decrypt locked macs?
👍 1
Avatar
with fileVault 2 😁 (edited)
😂 4
Avatar
For those who reached out for a Faraday case, i'll be sending them out Friday, so you can expect them sometime early next week prolly. Its free so first class.
👌 5
Avatar
@LawDawg I did in 2018
Avatar
I just got word I got in the class yesterday.
Avatar
Grats. NCFI is fun. Or at least it was. I heard they had some cracking down last year.
Avatar
Too many people enjoying it?
Avatar
Lol something like that. Some classes got out of hand in the after hours activities dept.
😂 1
7:05 PM
Or so I heard.
Avatar
It's of no consequence to me. I am the ultimate in boring.
💯 1
Avatar
Anyone else have issue with the new Cellebrite download portal? I can't create an account and apparently "the site administrator has been alerted".
Avatar
I had the same thing happen to me when I cross over to the new portal. I called, and customer support did something on the back end to solve the issue.
Avatar
Ugh, talk to a real person? The horror..... 🙂
😂 7
Avatar
Dr. Kaan Gündüz 1/16/2020 4:59 AM
Cellebrite bought Blackbag (Mac+Win+Mobile), Axiom had those capabilities (M+W+Mo) as well. Forensic companies are getting bigger, consuming smaller fish. (edited)
5:00 AM
What's next? Encase buying Oxygen and Elcomsoft?
5:02 AM
Nuix + MSAB + ?
Avatar
Opentext acquires Autopsy; $500/mo for use, backdated to the day it was downloaded.
😂 6
Avatar
Dr. Kaan Gündüz 1/16/2020 5:06 AM
Axiom is letting IEF go. They all are going to end up being modular software providers.
Avatar
I had the same issue with the Celleb Portal... I guess I'll have to speak to a real person as well !
Avatar
Dr. Kaan Gündüz 1/16/2020 5:15 AM
I reset my password, then it worked.
Avatar
A couple of weeks ago, someone posted a video/guide on how to bypss/remove activation lock on a factory resetted iphone. I can't find it within the search feature so does anyone know or can point me to the right direction? (edited)
Avatar
This is only possible because Checkra1n enables localssh, meaning that you can ssh into the device over usb. This is a tutorial for terminal on...
👍 1
Avatar
Thanks - it's not a very detailed guide but I'll give it go now.
Avatar
It's all you need really, boot with checkra1n, ssh into it, rename setup.app and do the uicache and backboard thing
Avatar
That's clever, reminds me of the old ways of bypassing a password via TWRP through renaming
Avatar
Yes, but you just bypass the setup, phone is still not activated and thea means no signal, no app store etc
6:47 AM
There are ways to restore working app store, as well as copy activation from another, properly activated iphone
Avatar
forensicmike @Magnet 1/16/2020 8:07 AM
@K23 reminds me of deleting the sticky keys exe and replacing it with a copy of cmd.exe 🙂
👍 1
Avatar
Well, at least it seems that the previous leaks about @Grayshift from within the DFIR community have gone away considering there are absolutely no references to BFU, AFU, or any other differences in the two cases. But it sure makes for frustrating headlines across the tech world: https://www.forbes.com/sites/thomasbrewster/2020/01/15/the-fbi-got-data-from-a-locked-iphone-11-pro-max--so-why-is-it-demanding-apple-unlock-older-phones/#16a9ac1c5e65 https://www.macrumors.com/2020/01/16/fbi-used-graykey-to-unlock-iphone-11-pro/
New questions have been raised about the FBI's latest request that Apple break its iPhone encryption, after Forbes uncovered a search warrant...
As the FBI claims it can’t access older versions of the Pensacola shooting suspect’s iPhones, a case in Ohio shows that the feds have access to hacking tools that can get data from the latest Apple device.
Avatar
@Majeeko Hi i have an expérience to share with roblox ?
Avatar
@rico Okay, cool. Whats going on?
Avatar
@Majeeko In a case where the victim is a young girl, the attacker sent messages via this game. Were you able to identify a db that contains messages? Or a friend list?
1:59 AM
I admit that I did not know this game. So I look in manual ...
Avatar
From what i remember i didn't find a DB in my case. All the chats were done in game so it was all server side. Ive not had any time to conduct research on the app to see if it has the capability to send and receive messages in a more standard fashion that is stored on the handset. The game has multiple platforms, App, Browser based, console coming soon. I was looking at an IOS version i think so i could not get physical acquisition to fully explore.
Avatar
Thank you for the information. For my part it is a huawei (emui 3, old android). Actually I do not see the db I am looking for ... I will try a carving with keyword (for better target)
Avatar
I think its going to be all server based in game chat for the most part. My son plays it and he is able to chat with his friends outside of a game but this may be all server side too. I wish i had time to conduct research on stuff like this.
Avatar
I am obliged to find luckily or unfortunately 😉
2:14 AM
I will keep you posted
2:14 AM
But precisely I think the same as you
Avatar
Hi all, I have a question regarding dropbox tokens. Could anyone tell me if the token contains the unique account ID, and if so can it be recovered?
Avatar
@Cellebrite Whats the process to request certain features in UFED, PA or Reader?
Avatar
forensicmike @Magnet 1/17/2020 5:58 AM
@Majeeko @rico Going to take a quick look at Roblox on iOS to see if I can track down any data created on friend add or chat received.
Avatar
forensicmike @Magnet 1/17/2020 6:08 AM
6:09 AM
I'm seeing messages as JSON in \data\lbirary\caches\com.roblox.robloxmobile\cache.db in the table cfurl_cache_receiver_data
6:10 AM
{ "metadata": { "notificationId": "e1cc77c5-a137-4964-80c6-81513fb8183c", "type": "ChatNewMessage", "detail": { "ConversationId": 4314035427, "ConversationType": "OneToOneConversation", "ConversationTitle": "magnetmike7890", "SenderUserId": 1415652282, "SenderUserName": "magnetmike7890", "MessageId": "f2a391a4-a6cc-4777-9534-3c9c638e7797", "MessageType": "PlainText", "MessageContent": "Hi there", "IsRead": false, "EventDate": "\/Date(1579269758114)\/", "Category": "ChatNewMessage_4314035427" }, "fallbackDelivered": false }, "statusMessage": null }
6:10 AM
Along with a lot of other events, like the app telling me that my desired username is already taken etc.
Avatar
Is this from a full file system with GK or a standard iTunes backup?
Avatar
forensicmike @Magnet 1/17/2020 6:12 AM
I'm not certain if you'd get this in an itunes backup but its possible. I'm working on a rooted phone so I'm just pulling from the app sandbox directly.
6:15 AM
Its good that there is some data there for us to find at least. Roblox is a very popular game.
Avatar
forensicmike @Magnet 1/17/2020 6:15 AM
will likely look different on android btw 🙂
Avatar
No doubt.
Avatar
forensicmike @Magnet 1/17/2020 6:15 AM
Yeah, this could be a good candidate for a custom artifact on AXIOM
Avatar
That would be awsome.
Avatar
I saw someone raise the question of whether we are going to start unlocking and extracting locked Macs and to that I can currently share one short answer: why not? 😉
cellebrite 8
BlackBag 6
👍 1
Avatar
@jifa still on track for release first quarter 2020 ?
😂 1
Avatar
Have a nice weekend Twitter. When is the DllMain function of a dll called?
Avatar
Suggestions needed::::: I need to capture an ENTIRE web site and it is Massive... Any suggestions would be greatly appreciated.
Avatar
A collega says: httrack @nbh2493
Avatar
tried that.... kept getting an error.. robot.txt error?
Avatar
HTTrack is an easy-to-use website mirror utility. It allows you to download a World Wide website from the Internet to a local directory,building recursively all structures, getting html, images, and other files from the server to your computer. Links are rebuiltrelatively so ...
Avatar
CLB-dan.techcrime 1/17/2020 1:33 PM
@Majeeko Please make a laundry list of all your feature requests, fixes, and wishes for our products and email to support@cellebrite.com -- we crave such critical feedback and recognize that there is always room for improvement
1:34 PM
Our hard working researchers also love to hear about cases and stories where our solutions truly made a difference -- feel free to DM me news stories, court rulings and anything else and I will share discretely internally with the right teams
Avatar
@forensicmike @Magnet @Majeeko Good evening (in my country) I finished late and I (unfortunately) focused on the essentials! However I targeted the file on my Android : Data/com.Roblox.client/shared_prefs 😉 So I researched strings with carving (I still could because it was a physical without encryption) and found that it was not the right phone. The little girl was using a 2nd account on another phone ... But as soon as I have time I do a little research on Android 😀
Avatar
@nbh2493 Did it work?
Avatar
Does the company not store this information?
Avatar
@nbh2493 hunchly does a great job at capturing websites.
👆 1
Avatar
@Law Enforcement [Canada] Is there anybody from Toronto in the server?
Avatar
Found who I'm looking for. Thanks!
Avatar
Brett Shavers 1/19/2020 3:14 PM
WinFE 10 is now available. Download the framework free at https://www.winfe.net. Instructions for the build are also on the site. The new WinFE also runs in ARM, which is really neat.
👌 2
💯 1
Andrew Rathbun pinned a message to this channel. 1/19/2020 6:58 PM
Avatar
danmiami0001 1/20/2020 9:29 AM
Anyone doing private work in the Las Vegas area? Individual believes their email and perhaps devices are being hacked - wants an assessment and remediation. Please DM me so I can send them a short list of possible resources.
Avatar
anyone had trouble with the new Cellebrite portal?
Avatar
What kind of trouble? We set ourselves up on the new portal yesterday and it's been OK so far
Avatar
ah, does it need new details
1:29 AM
as in you need to sign up for it again, rather than your existing portal account was transposed
1:29 AM
oh, nevermind, "your request cannot be processed at this time"
Avatar
yeah doesn't seem to be working, you managed it fine Ollie?
Avatar
Yes, if you had an account on the previous portal, you need to 'Reset Password' on the new portal
1:49 AM
That will send you a link to set up a password on the new one
Avatar
yeah that doesn't work
1:50 AM
just throws an error
1:50 AM
I've put in a support ticket
Avatar
Weird. Worked fine for us (once I put in the correct email address :P)
Avatar
hah yeah, I definitely did since the pw reset email is in the inbox
1:50 AM
when I do it, it says "guest user is not active" then sends me the same pw reset email
Avatar
Oh ok, weird that it's got that far
Avatar
so I do it again, and it says the same thing and sends another pw reset email
Avatar
Does the same thing for me. I've given up and just do all my updates through physical analyzer.
Avatar
I would if I had internet
7:12 AM
what was the change for? worked fine before 😄
Avatar
@LawDawg if you contact CB support they can set a pass for you and it works
Avatar
@Cellebrite , Blu-Ray question for everyone here, we push out our forensic cases on blu-rays 25, 50, 100gb and in the past we have had no issues. Recently we have had issues with bigger cases where the discs are failing to burn or failing to verify. I thought it was maybe the media version of the discs but they have been the same ones we have been using for years. It seems to be stuck on Cellebrite UFED readers exe which is the payload of data and also the Cellebrite Reader version of a 400 MB tags only case. ITs happening on 4 out of our 6 computers so it's not an isolated issue. I'm pulling my hair out and what little i have left ! Some thoughts are it might be the windows version the forensics boxes are on but i'm not leaning that way otherwise i thought it would be a world wide issue.
Avatar
We were having the same issues. Now we make everything and ad1 image file. Stopped having any issues.
10:00 AM
The reason we use ad1 is most everyone knows what an eo1 file is. FTK imager is one of the few tools if not the only one that will created an ad1. Works flawlessly except the end recipient has to have FTK imager installed as well.
Avatar
@dcozmo Thanks for your feed back, did you add FTK Imager Lite to the disc so it can be run without being installed ?
Avatar
@DCSO I just add the full version. Our employees ran into issues with running FTK imager on a Win10 computer at our agency because of administrative issues. Our IT dept found a tool the allowed them to install it, I dont know the name of it off the top of my head. PM if you need me to find out the name of the software they used.
Avatar
Apologies if this has already been posted, but I thought it was an interesting read: https://www.fastcompany.com/90453437/inside-the-10-million-cyber-lab-trying-to-break-apples-iphone
The Trump administration wants Apple to create a backdoor into the iPhone. District Attorney Cy Vance Jr. has spent millions trying to find other ways in.
Avatar
Funny, I just read it this morning and was going to share here as well. Nice quick read and great that they have the budget to build out such a good facility 👍 (edited)
Avatar
Anyone recomend some freeware that can rebuild video headers? I know @bkerler has one but i cant find my copy.
Avatar
anyone used volatility? does it require dd images or will it work fine with the mem extension
Avatar
pathsofglory 1/22/2020 7:45 AM
General question about encase: for a file that is marked deleted and shows in the evidence tab, EnCase gives columns for “Date last accessed” and “date last written” where is EnCase parsing that data from? I would assume there is a time stamp in the file header or footer’s HEX, if someone knows where it is and could point me to it in a hex view it would be appreciated @here
Avatar
pathsofglory 1/22/2020 7:55 AM
My other theory is that it is being pulled from the File Allocation Table
Avatar
pathsofglory 1/22/2020 8:44 AM
The file is an MPEG-2 from a Sony camcorder btw
Avatar
Not sure if you guys have seen, but they published FTI's full report on Bezos iPhone: https://www.documentcloud.org/documents/6668313-FTI-Report-into-Jeff-Bezos-Phone-Hack.html#document/p1
Source document contributed to DocumentCloud by Joseph Cox (Joseph Cox, Independent Journalist).
💯 3
Avatar
Apple canceled its plans to enable encryption for device backups on iCloud, after the FBI complained that it would affect its investigations.
Avatar
@pathsofglory they are coming from the directory entries in a FAT system. Under the directory table tab this also discusses deleted file attributes. https://en.m.wikipedia.org/wiki/Design_of_the_FAT_file_system
A FAT file system is a specific type of computer file system architecture and a family of industry-standard file systems utilizing it. The FAT file system is a legacy file system which is simple and robust. It offers good performance even in very light-weight implementations,...
Avatar
anyone had any experience with OneDrive on a windows box?
4:33 AM
as in how the folder structure works?
Avatar
@Cellebrite if a device came back from CAS where would the password for the extraction be?
Avatar
@Sudo it's not necessary there is one. Depending on the case, you may get a physical without the passcode.
Avatar
this one seems to have one
3:05 AM
a 7zip container with a password
3:07 AM
12345 got 'em
😆 6
3:08 AM
we've emailed anyway to find out
Avatar
The password for the 7zip is normally provided on the Cellebrite Portal - once you've confirmed on there you've received the exhibit back from CAS, you click a button and it reveals the password
Avatar
cool thanks
Avatar
Spaazmatick 1/24/2020 1:41 PM
I've searched the chat and a couple groups, with no luck. Have an Alcatel a502DL with a pattern lock. Trying to get anything off the device with no luck. Has anyone had any luck with this device?
Avatar
CLB-TheGeckster 1/24/2020 2:52 PM
@Spaazmatick It looks like Cellebrite's Advanced Services lab would be able to assist you with that phone . You could try lockpick but I'm guessing the security patch is newer than what lockpick can bypass.
Avatar
Spaazmatick 1/25/2020 8:24 AM
@CLB-TheGeckster Thank you. I'll give that a shot
Avatar
Andrew Rathbun 1/25/2020 12:30 PM
Google announced new fees this month for law enforcement authorities looking to access data on its users. The fees are intended to "offset the costs" associated with producing the information, a Google spokesman said.
12:30 PM
Anyone get charged yet?
Avatar
That’s not gonna help
Avatar
Andrew Rathbun 1/25/2020 12:56 PM
Subpoena: $45 Order: $150 Search warrant: $245 PRTT (Pen register or trap and trace) order: $60 Wiretap order: $60
12:56 PM
No charge for CSAM or emergency requests
Avatar
CLB-TheGeckster 1/25/2020 2:47 PM
It was only a matter of time. Especially once word started getting out about their geofence capabilities
Avatar
We get Google warrants on the regular. We've already got the bills.
Avatar
chrisforensic 1/25/2020 8:43 PM
hello out there 😉 concerning known files hashsets.... which are you using? i use RDS Hash Sets from NIST.... who uses another one? do you have a special hashset for known files especially for .jpg, .png from android - ios - systems and most of the common used apps? just wanna filter out as much as possible known graphic files from aquisition with PA (to give an .ufdr - as small as possible - to our investigators)... (edited)
Avatar
I Have some of my own (got some from cellebrite teacher) and added mine. I But its a good idea asking here, because i imagine someone has a up to date list... (we all can use) @chrisforensic could be an idea adding lists we all keep separate. (edited)
Avatar
Bezos's hacked phone examination report. For use in evidence (depends whether iso17025 relevant for criminal evidence submission)? https://assets.documentcloud.org/documents/6668313/FTI-Report-into-Jeff-Bezos-Phone-Hack.pdf
Avatar
I think the FBI is assisting in the investigation now. Let’s hope the job is better
💯 1
👌 1
Avatar
CloudCuckooLand 1/27/2020 12:39 AM
@Jay528 Can't say too much on here about others work - but I was more than a little surprised by the quality. I can't imagine it was cheap. The biggest shock was that the phone of the world's richest tech billionaire wasn't monitored for every byte of data in and out! (edited)
👌 1
Avatar
I like the part where the guy messages him saying "it's not true that we did it"
3:03 AM
I was listening in to your phone and heard that you think we did it, it wasn't I swear
🤣 1
Avatar
@chrisforensic I would also be interested if you or anyone else comes across a bespoke/more complete set than is available from NIST 😃
Avatar
@Cellebrite Any Cellebrite folk on? Your support portal is playing up and causing me to repeat myself like a foolish old man (no comments please!) (edited)
Avatar
@Zhaan - @Cellebrite
👍 1
Avatar
@Zhaan is this to set up an account? I had a ton of issues and just had to ask support to set up the account in the end
Avatar
@Sudo no, had an account for a while but for some reason today, everytime I tried to view stuff it would report an error and not appear to add anything to existing tickets. But if you viewed the ticket from the recent view, every comment was there. Only been happening today...
Avatar
CLB - DavidK 1/27/2020 8:38 AM
@Zhaan I'm lookin into this
Avatar
@CLB - DavidK Excellent!
Avatar
danmiami0001 1/28/2020 5:29 AM
Anyone doing private work in the Miami area, please DM me
Avatar
ThatLukeGuy 1/29/2020 12:47 PM
@Magnet Forensics cant seem to find the documentation for the new Axiom update. I saw that it had Checkra1n support. Does the update negate the need to install cydia? looking at you @forensicmike @Magnet
Avatar
forensicmike @Magnet 1/29/2020 12:48 PM
@ThatLukeGuy Yes it does
12:48 PM
should work without cydia now 🙂
Avatar
ThatLukeGuy 1/29/2020 12:48 PM
My man.
Avatar
forensicmike @Magnet 1/29/2020 12:48 PM
please let me know if any issues that way
Avatar
ThatLukeGuy 1/29/2020 12:49 PM
And just to be clear, I need to checkra1n it on my mac and then move over to Axiom?
12:49 PM
Pretty stoked on this BTW
Avatar
forensicmike @Magnet 1/29/2020 12:50 PM
correct. Unless you wanna try one of the macOS emulation methods but haven't attempted that myself.
Avatar
ThatLukeGuy 1/29/2020 12:51 PM
Ive got the mac on my desk ready to go. Also patiently waiting for Checkra1n linux so my kali rasberry pi can be my portable jailbreak box.
Avatar
forensicmike @Magnet 1/29/2020 12:51 PM
👍 have fun 🙂
Avatar
ThatLukeGuy 1/29/2020 12:51 PM
Thanks! 🙂
Avatar
MrParanoid42 1/29/2020 12:53 PM
Hey random question for the group. I'm looking into different case management solutions for my lab. Tired of using an excel.. there's thousands of them out there. Dont know where to start and looking for suggestions.
Avatar
Andrew Rathbun 1/29/2020 12:54 PM
@MrParanoid42 xBit by TeelTech is a good one. Saw the demo for it before TeelTech bought it. I know Magnet has a solution.
Avatar
forensicmike @Magnet 1/29/2020 12:54 PM
Organize, Track and Report on Case Evidence.
Avatar
MrParanoid42 1/29/2020 12:55 PM
actually been looking at ATLAS... seeing you type in chat is what made me drop my question in here lol
Avatar
forensicmike @Magnet 1/29/2020 12:55 PM
Do believe they have free trials available for it too.
Avatar
MrParanoid42 1/29/2020 12:55 PM
forgot you guys were here
Avatar
forensicmike @Magnet 1/29/2020 12:55 PM
Yeah, we're not allowed to sleep. Ever. 😫
🤣 5
Avatar
MrParanoid42 1/29/2020 12:55 PM
Can you answer questions about it in here? I dont want to break any channel rules lol
Avatar
forensicmike @Magnet 1/29/2020 12:56 PM
may as well shoot me a DM and I'll answer everything I can for ya!
Avatar
ThatLukeGuy 1/29/2020 12:58 PM
Oh man... that's a beautiful sight.
👍 4
Avatar
MrParanoid42 1/29/2020 1:01 PM
@Andrew Rathbun Thanks! Going to check it out.
Avatar
Andrew Rathbun 1/29/2020 1:07 PM
@ThatLukeGuy what a time to be alive
☘️ 2
Avatar
Hi all. Has anyone out there incorporated iPads into their lab’s evidence photography workflow? Meaning, using iPads instead of DSLR cameras and the like. I’m curious if anyone has, and whether any particular photo management app is being used. Thanks!
Avatar
I have a question, i have a FreeNAS system here which i like to copy to investigate. How can i get the data of the device? It has 4 disks in it with a ZFS filesystem (as a pool). Can i dd it in some kind?
Avatar
@luis511_ we use IPEVO 4k cameras and the associated IPEVO software for exhibit bag, exhibit, SIM and app content on phones. (edited)
💯 1
Avatar
I can recommend the 4k camera as well. We've used a variety of IPEVO cameras over the years, but the 4K model combined with the provided software makes for a pretty comfortable user experience
Avatar
@cygnusx I have used Encase to recreate RAID systems before. Image the disks, then add them all to Encase and recreate it, sounds so simples! (edited)
Avatar
@Zhaan does that also work for ZFS Pools? It's not a generic raid array with a 'normal' filesystem.
Avatar
@cygnusx Dont know, I rebuilt a number of Synology and QNAP arrays with it but I needed to get the stripe right. It will depend on whether Encase supports that file system I guess, I dont use Encase anymore so havent access to its supported list but I vaguely remember it supporting it.
Avatar
in lansing MI
Avatar
@Jamey sorry to hear that
6:19 AM
😉
Avatar
Andrew Rathbun 1/30/2020 6:22 AM
@Jamey you're in Lansing?
Avatar
should we go take him for drinks?
💯 3
👌 1
Avatar
@Cellebrite Just wanted to share this, ESET didnt't like the 7.29 install of this particular file.
Avatar
CLB-dan.techcrime 1/30/2020 7:03 AM
@A39YCSOAZ We use Themida to encrypt and pack and hide our magic... I guess viruses like to hide their evil with the same methods
🎩 1
Avatar
Got it, thanks!
Avatar
Looking to use KAPE to extract specific data from several drives and create a VHD with the extracted data. I wanted to take the VHDs into Autopsy and process just the extracted data in an attempt to triage just specific files. Autopsy does not see a filesystem when I load the VHDs into them however Autopsy says it will ingest VHD files. Mounting the VHDs also did not work. FTK imager sees the VHDs just fine... Has anyone done this or experanced the different results. (edited)
Avatar
If you not able to mount the vhds something went wrong.
8:27 AM
what was the command you used ? and is it a custom script or the original?
Avatar
its the original scripts... the vhds open just fine in FTK imager
Avatar
@JMK don't trust BS articles 😜
🤣 7
9:28 AM
As a general statement, Android encryption is inferior to iOS. Recently, some Androids have improved significantly and pose a hard challenge, but overall I'd say Apple does a better job. We are unproportionally invested in solving iOS, so you get to see more solutions for it 🙂
android2 1
Avatar
@@jifa LOL don't worry, it's also Reddit so another reason not to trust it 😆 just amused me to see Cellebrite's name in it
Avatar
Forensicator 1/30/2020 10:49 AM
is anyone willing to share their notes with me with the tools obtained from the Teel Tech flasher box and bootloader training. My class was cancelled; however, I got all the tools that include furious gold, nck dongle, xtc clip, octoplus etc. and I want to tinker with them. I'll send you my email address if you DM me, ty
Avatar
so you showed up they provided tools and no power points or instruction ?
Avatar
Has anyone done any work with SDR? I'm starting to think that wider RF spectrum survey might be really useful. It also has lots of opportunities with signal replication/scanning/decoding etc.
Avatar
Andrew Rathbun 1/30/2020 11:35 AM
@Forensicator I got you
👍 1
Avatar
what a guy
Avatar
Deleted User 1/30/2020 2:00 PM
Is the encryption superior in Android? No. Is it harder to bypass the security on an Android device? I'd say as an ecosystem, yes Androids are harder to get into. The industry tackled Apple and with the right tools (and no use of password instead of passcode) eventually you will get into an iOS device. On the Android side, it's hit or miss...we've been stumped by some $45 dollar Alcatel devices
android3 2
Avatar
Superior, inferior, what about FBE? Isn't it essentially same principle as Apple, but just easier to bruteforce with the right access to the device? (edited)
Avatar
Deleted User 1/30/2020 2:32 PM
both utilize AES256 so that's fair to say they are essentially the same principal
Avatar
@Andrew Rathbun I am in Lansing are you guys here?
Avatar
@Jamey yeah @Andrew Rathbun and I are both Lansing area
4:36 PM
where you at and how long you gonna be here?
Avatar
Sat morning
Avatar
@Deleted User We have the advantage with Android of being able to study the AOSP codebase in detail, but the disadvantage of the market being so fragmented, with so much proprietary crap being done my manufacturers on top of AOSP (although obviously the fragmentation means that techniques can have a decent longevity for some devices). Apple is obviously good at keeping things under wraps, but there's relatively little variation to focus on so it's justifiable to spent however much to develop solutions like GrayKey, CAS/Premium etc. Could you justify the same effort/expenditure for a range of Alcatel burners? Probably not 🤣
Avatar
Anyone have experience with getting axiom portable to run on a server using UNC paths bat script doesn't work and mapping a network drive is not a option as recieving end will not be able to do it. Any ideas?
Avatar
Deleted User 1/31/2020 1:21 AM
@OllieD you raise some fair points! But to your last point, I could absolutely justify the effort/expenditure on Alcatel burners...I've have a murder case and multiple large narcotics cases that revolved around Alcatel burners running the latest versions of Android that no provider supports
Avatar
That's fair enough, Alcatels are obviously popular as burner phones and of course some effort is justifiable to support them. But would I expect anyone to use the same kind of effort and expenditure on a range of Alcatels compared to a range of iPhones or Samsung? Probably not
1:23 AM
But depends on what kinds of devices cause you the biggest problems of course
Avatar
Deleted User 1/31/2020 1:30 AM
Haha you're definitely correct...but just means I need to start the company that concentrates on Alcatel because our guys are getting arrested, released and buying a new one in the span of 8 hours
💯 2
Avatar
@Dam sadly can't change the registry either :/
Avatar
I don't see other option.... sorry
Avatar
Dr. Kaan Gündüz 1/31/2020 2:08 AM
@RP there is a possible way. the command mklink /D can mount a network share under any folder you like (edited)
2:09 AM
syntax: (as admin) mklink /D c:\RP \\networkshare\folder (edited)
2:10 AM
maybe you can fool the software that it's under c drive
2:14 AM
but you mentioned the remote user will not able to mount the share, so you want them to just execute the portable case executable?
Avatar
Are there in forensic papers on Amazon fire sticks?
Avatar
Andrew Rathbun 1/31/2020 5:59 AM
I have a good story to share 😆. Defense counsel requests discovery copies of all forensic images (.EO1) so I fulfill the request. I get an email a few days later saying "could you please let us know which software the developer uses to access the files. We were able to login to the hard drive but need the name of the software used to open the files. We could not open any other file." Mind you he's referring to a padlock drive with hardware encryption. So I respond that someone with training, experience, and forensic software needs to analyze the files since the everyday person can't read E01 files natively. He responds back "we are still having trouble accessing the files. The information is encrypted and the padlock does not have an execution file. We contacted the Apricorn Technical Support and they told us to talk to whoever put the files on the drive and see what they did originally. I could also return the drive to you to reload the files." Me: (sigh) 😂 let's try this again...
😂 7
👨‍🔬 1
😆 1
Avatar
Andrew Rathbun 1/31/2020 6:07 AM
Should I just tell him to download Autopsy? It's free... Lol
6:07 AM
It's like 5TB of EO1 files too
Avatar
kmacdonald1565 1/31/2020 6:07 AM
autopsy, pro discover, os forensics. all free...all well above their heads
Avatar
@Andrew Rathbun I've recommended FTK Imager in the past, gives them that granular level
Avatar
Andrew Rathbun 1/31/2020 6:09 AM
@Zhaan I'll probably tell them to download that. That's a good idea.
Avatar
@Andrew Rathbun they'll be overjoyed! 2027 trial?
Avatar
@Andrew Rathbun thats always a laugh: 5tb of e01s.. would be more fun if they asked to hand it over in dvd format 😁
Avatar
Disk span the lot, always a winner winner chicken dinner
Avatar
Andrew Rathbun 1/31/2020 6:12 AM
This is a 2014 case so I think 2020 is the 2027 for this case haha
Avatar
You want to stop messing around on forums mate and get your self sorted out, iron a shirt, etc.
💯 1
Avatar
forensicmike @Magnet 1/31/2020 6:34 AM
@Andrew Rathbun you should recommend HxD
6:35 AM
that one can open anything !
😆 6
Avatar
Andrew Rathbun 1/31/2020 6:41 AM
You're not wrong!
Avatar
forensicmike @Magnet 1/31/2020 6:42 AM
Once had an investigator who argued that we were obligated to disclose "EVERYTHING", and did not understand that the absolute best we can do is still always going to be a view of the acquired content. Until I had an idea: I offered to print out the raw hex of the image to PDF for him to send away to the court unit. (edited)
🤣 7
6:44 AM
Turn to page 478,123,968, beginning at row 01FE6BD0. Please read the hex values out loud for the record.
Avatar
Does anyone have/use a resource associated with case law in the USA regarding Digital Forensics and evidence?
Avatar
Andrew Rathbun 1/31/2020 9:36 AM
Does anyone have/use a resource associated with case law in the USA regarding Digital Forensics and evidence?
@f0r3n5ix_ hmmm good question, I might have to add a section on AboutDFIR about that. I'll add it to my to-do list
Avatar
@f0r3n5ix_ check this out The Law of Cybercrimes and Their Investigations one of my college professors wrote it... it's pretty good (edited)
Avatar
Andrew Rathbun 1/31/2020 10:22 AM
@f0r3n5ix_ check this out The Law of Cybercrimes and Their Investigations one of my college professors wrote it... it's pretty good
@Justin good looking out, thanks for the tip!
👍 1
10:27 AM
@f0r3n5ix_ as well so you're aware
Avatar
Anyone familar with .nmf files Audio. (KeyBank)
Avatar
Andrew Rathbun 1/31/2020 11:00 AM
@jqhpd #multimedia-forensics might be a good place to ask
Avatar
Thank you!
Avatar
Andrew Rathbun 1/31/2020 12:26 PM
JEDEC has announced the UFS 3.1 open standard for flash storage chips. It brings improvements in speed and power efficiency by including new features.
Avatar
Deleted User 1/31/2020 2:35 PM
Anybody utilizing open source software for forensic case tracking? Looking for something to track from intake to analysis completion...mainly mobile phones so hopefully something for reporting number of successes, failures and types of devices...figure I can build something myself, but if there is something most of the way there it would be nice
Avatar
Deleted User 1/31/2020 4:08 PM
I'm on year 4 of color-coded spreadsheets.
4:09 PM
Something more robust for case tracking would be nice, but I think I'd fall back into the easy route
Avatar
What is used to do mobile forensics? Hardware, software, devices, etc. (edited)
Avatar
I have an inquiry about a current case we are working. We have obtained the suspects Google Account information and have subsequently served Google with a warrant for their data. The return has shown the suspect has since deleted their location data for the time period we needed, which is what we were most interested in reviewing. My question, if we were to serve Google with a geo-fence warrant, would the return possibly show the suspect being inside the geo-location? Or, would the suspect deleting their location data remove the data involved in geo-fence warrants? Any insight would be appreciated!
Avatar
Deleted User 2/1/2020 2:14 AM
@Tyføøn Hardware can vary and depends on the software you are using...software wise Cellebrite, MSAB (XRY), Oxygen, and Axiom are the big names you'll see...devices care to explain what you mean?
Avatar
Thanks for the response @Deleted User when it comes to devices I was thinking a forensic combodock for example
Avatar
Andrew Rathbun 2/1/2020 3:40 AM
@Tyføøn hardware can range from flasher boxes to standalone units that mirror the extraction experience on your forensics machine, i.e. UFED Touch 2, XRY Kiosk, to name a few. GreyKey is also a hardware unit. But you can use any hardware with a 64-bit Windows environment to install any of the aforementioned software.
Avatar
just_deduce_it 2/1/2020 5:42 AM
@Tyføøn usually the biggest differentiator between hardware and software solutions is the location of collection. For collections that need to be taken in the field hardware devices like the UFED Touch May be more appropriate for their portability. If it’s going to be collected in a lab/office I prefer the software solutions as you can flow directly into the analysis software post acquisition.
Avatar
Thanks for the responses!
👍 1
Avatar
God I hate HPE iLO and ROM config
Avatar
iLO sux
Avatar
Trying to build out an eDiscovery lab to practice learning Encase.
7:32 PM
Using two HPE DL380 Gen 7 servers with CentOS 7 and KVM.
Avatar
Gen 7 are the r710 equiv right?
12:18 PM
Dell 11th gen I guess
Avatar
Right
2:23 PM
Gen 8 are coming down now but don't have access to ilo license and updates anymore. Since Dell's updates are free, I'll buy Dell next time.
Avatar
@Deleted User for open source, check out Kirjuri (I think that’s the name). I used it for a bit before switching over to Magnet (ATLAS).
👍 1
Avatar
Hi all, I'm working as a Law enforcement officer in India, presently mobile call detail record analysing software we are using are very rudimentary which make there usefulness dependent on operator's skills and experience. Just want to explore use of AI / ML in analysis part to automatically understand and display few patterns based on already fed Algorithm on the basis of earlier experience of skilled operators. If in your agency / unit you are using smart solution or AI based product, pls share details so that we can utilize it for crime detection and prevention. Thanks & regards.
Avatar
So I've moved police force and cannot find the links to two mobile forensic Google groups - can anyone post the links here please?
Avatar
Not sure exactly which you mean, but there's this one: https://groups.google.com/forum/#!forum/mobile-device-forensics-and-analysis
Google Groups allows you to create and participate in online forums and email-based groups with a rich experience for community conversations.
5:53 AM
Here we are:
5:53 AM
Google Groups allows you to create and participate in online forums and email-based groups with a rich experience for community conversations.
👍 1
Avatar
Thanks :)
Avatar
Np, good luck in the new role!
Avatar
Thanks - just sent membership request to physical and raw group, and mobile forensic analysis group
Avatar
Andrew Rathbun 2/3/2020 6:21 AM
@Pacman congrats on the move! Sworn or civilian?
Avatar
Omg. First day on the job supporting Encase and on my desk is a bunch of Tableau hardware forenics tools!
6:29 AM
👍 1
6:29 AM
Avatar
@Pacman congrats on the move! Sworn or civilian?
@Andrew Rathbun The vast majority of DF staff in UK LE are civilian. Varies from force to force, but that's the general trend
👍 1
Avatar
Deleted User 2/3/2020 6:56 AM
I have a question. What's the best way to keep the integrity of immerged phone (sea or river water). Some talks about distilled water and other alcool solution. Any suggestion?
Avatar
As @OllieD already confirmed - I am a civilian :)
💯 3
Avatar
Has anyone had any history or luck with Pokémon Go location history? DM me with any information. Thank you.
Avatar
@chsandeep are you looking for something that will help with things like link analysis, and timeline analysis, when the data consists of call details records?
Avatar
@luis511_ thanks for response. Presently softwares we are using provide call frequency details, maximum location, daily morning and night location etc. All these details are very basic. I want to know if there is any AI based CDR analysis system which examine details based on predefined algorithm for many conventional crime. On top of that it point or highlight any discripency in details which could lead investigation further. Thanks.
Avatar
@Jay528 The latest book if this one - Practical Mobile Forensics - Third Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms (2018)
Avatar
@Deleted User on removing it from the sea keep it in seawater, this will stop corrosion until it gets to you. On reaching your lab get the phone down to its PCB and use ultra sonic bath to clean the components. Place phone in a drying oven for a good day or two to get all the residual moisture out. This is where it varies on your capability, depending on the phone chip off the emmc and processor and place it onto a donor board then rebuild the phone. Prior to doing this buy 2 test phones and carry out testing on the whole process. (edited)
👍 1
Avatar
Deleted User 2/3/2020 11:57 PM
Thanks for this informations @Dfdan .
Avatar
elizavetabelkasoft 2/4/2020 5:18 AM
@chsandeep Hello. Belkasoft uses a bit of AI for detecting various things on photos and video, such as pornography, guns, arrows and crosses. Let me know if you need a trial)
Avatar
Tableau are cool
Avatar
Hello. I've been lurking for a bit but I was wondering what hard drives you guys use/recommend for drive imaging. I am a civilian in US LE. We've been using WD Black drives (1TB/2TB/4TB), but I'm curious what others use? Thanks!
Avatar
Andrew Rathbun 2/4/2020 5:06 PM
@Carlos we use the same. I have about 120+ WD Black 2TB drives sitting in the office right now
5:07 PM
WD2003FZEX is the model. I have it memorized by now 😂
Avatar
We use toshiba usb
Avatar
Used apricorn and WD at both of my previous gigs
Avatar
Tableau are cool
@Sudo
Avatar
@Cellebrite Does Cellebrite have any tutorials / videos on how to use UFED Reader that are investigator friendly?
Avatar
we've got all those Bableaus as well
👍 1
12:07 AM
TX1 is handy
Avatar
Does it normally ship inside an Iron art installation? 🤔 😉
Avatar
Andrew Rathbun 2/5/2020 12:18 AM
@Turb0Yoda Apricorn here too. Makes me want one for personal use but they're expensive
Avatar
Yeah they're too damn expensive
Avatar
I'd like to know if there are videos like what @pexi86 has asked for. @Cellebrite do you have such thing, or does anyone know of one online?
Avatar
does the TX1 ship in an art installation?
Avatar
Barefoot office! We have several tx1s, they had some serious issues when first released, but they've got it together now - I like them.
Avatar
@Sudo that was might attempt at a joke, but it's isnt' a good one 😂 I guess he has it all on some kind of elaborate glass topped coffee table
Avatar
I was looking for our TX1 box to see what it looked like...
😂 1
6:41 AM
thought maybe I can sell it at an upmarket auction
Avatar
@Joe Schmoe big thumbs up! 👍 🙂
Avatar
Joe Schmoe 2/5/2020 8:46 AM
@pexi86 I emailed this out to the other detectives a while ago. I don’t think any watched it.
Avatar
Well in my case the detective asked for a tutorial video, so I'm expecting at least one viewer😅
Avatar
Joe Schmoe 2/5/2020 9:04 AM
Several of mine had asked for training. Haha.
Avatar
Thanks @Joe Schmoe
Avatar
Deleted User 2/5/2020 11:02 AM
Pretty sure Cellebrite has a reader course...I know a lot of our guys don't like agency training
Avatar
cyberGoatPsyOps 2/5/2020 2:02 PM
Hello all, new here, private sector consultant in the DFIR space, prior DoD for 12 years doing DFIR and last 4 years threat intel. Anyways, was wondering if there is a correct channel to post about a DFIR meetup?
Avatar
Andrew Rathbun 2/5/2020 2:11 PM
@cyberGoatPsyOps I would say probably #training-education-employment would be the best. Or Off Duty. If it's just a meetup, then off duty. If it's a conference, then the training channel.
👍 1
Avatar
I just did a SIM extraction on two different SIM cards from two different cellphones in the same case that has the same phone number listed for it. Has anyone had this ? Both the cards have different ICCID and IMSI numbers. One indicated its SPN as BOOST and the other its blank.
4:17 PM
Scratching my head
4:18 PM
🤨
Avatar
David Smalley 2/5/2020 4:27 PM
Both cell phones were active?
Avatar
individual ported the number over when they switched cell service?
Avatar
David Smalley 2/5/2020 4:52 PM
ICCIDs are unique to the card. IMSI is unique to the subscriber, which makes sense because you’ve mentioned more than one network. Looks like they ported the number over.
4:54 PM
This is just based on my LE experience of course.
Avatar
Does it normally ship inside an Iron art installation? 🤔 😉
@bizzlyg haha no I support Encase so the company got them for me.
Avatar
Deleted User 2/6/2020 1:30 AM
@Cellebrite We recently acquire Bitdefender antivirus, but we have a big problem with 4PC, when we start extraction "Advanced threat defense" kill the process. Have you ever heard about that? Have you got and process to configur this module? We try different combinaison and nothing solve the problem.
Avatar
has anyone ever tried to analyze the data on a playstation 4? any idea which software can handle it's filesystem?
Avatar
@Zoidberg we use a VOOM shadow 3 its a writeblocker cache system which lets you browse the system without writes to the harddrive. It plugs into the Game console and the drive plugs into the VOOM. Not ideal but great for a manual examination
Avatar
@8198-IZ54 we were thinking about cloning the drive and starting the PS4 with the clone if manual inspection turns out to be the only option
Avatar
As good👍
Avatar
Remember seeing someone post a tool/website here (might have been on twitter) which displays the most recent versions of forensic software, does anyone know the name/have a link?
Avatar
Script that checks for available updates for the most commonly used Digital Forensics tools - jankais3r/Forensic-Version-Checker
👍 6
2:55 AM
Produced by @eSko
Avatar
Hi any digital forensic convention in asia this year?
Avatar
Deleted User 2/6/2020 4:51 AM
@Deleted User from my past experience with AV software you have to whitelist 4PC or add as exclusion in the software or managing policy depending on how you manage it. If this will not fix it I am sure Bitdefender support is happy to help you with that
Avatar
Deleted User 2/6/2020 5:01 AM
I try to whitelist all executable from bitdefender without succes. Yes I'll contact us. (edited)
Avatar
@David Smalley Not sure if the phones were active or not as they where water logged at the time. I wasn't sure if the phone number is actively updated in the SIM if they phone is ported or not or if it would show the old ph number assigned to the SIM and the updating is done through the network. Thanks for the feedback.
Avatar
Hi guyz, is the Tar file extension used for Android backup using custom Recovery like twrp can be read in the Physical Analyzer? Thanks in advance.
9:47 AM
Can it be decoded in the physical analyzer?
Avatar
Andrew Rathbun 2/6/2020 9:50 AM
@iCreaxor have you tried ingesting it into PA using the Open (Advanced) option in File and then throwing an Android Backup chain at it?
Avatar
Not yet, going to try that. I was just curious because there are some devices which have Custom Android OS installed.
Avatar
Deleted User 2/6/2020 10:32 AM
@iCreaxor I believe PA will decode that for you without issue
Avatar
Okay thanks for the info
Avatar
Anybody have any contact numbers for McDonald's corporate? Have a detective freind who needs to contact them to get video from a corporate owned store.
Avatar
Andrew Rathbun 2/6/2020 10:50 AM
@LawDawg I just answered you on IACIS 😂
Avatar
uuh nice, exactly what I was looking for 🙂 👍
Avatar
I have often found when reviewing Chrome history, the little beaut decides to jump back up to the top after a period of time or how far I've got. I have fiddled with a few Chrome settings to try and stop that from happening but with no success. Does anyone have a fix or tweak for that to stop it jumping back up? I use Photon Manual for large amounts of history on browsers but faced with this problem, it doesnt work to well and as you can appreciate it creates an infinite loop!
Avatar
well, it's better to copy your History db from profile folder to another folder and query using sqlite
Avatar
@chim my bad, I meant when the phone is being reviewed manually because the web history hasnt been extracted.
Avatar
ah you mean on mobile then it's harder
Avatar
@chim yeah, tell me about it
Avatar
if you want to get the full History db as the desktop version above you need to root your android phones
1:33 AM
if you can not or on IOS login to a google user then use google takeout
Avatar
@Zhaan we see the same issue frequently when doing manual examinations of Chrome. One of the things I found which helps is to search for keywords in chrome and it doesn't seem to keep jumping back to the top. So I would search for "search?q" to find search terms, etc.
Avatar
@sholmes nice one, I will give it a go.
Avatar
Are there any free password cracking tools?
Avatar
Does anyone know where to look in a FFS iOS extraction for what contacts/numbers a user has blocked using iOS (not in an app)? (edited)
Avatar
@Tyføøn Check out https://hashcat.net/hashcat/. You might also want to direct password cracking questions to #password-encryption-cracking
World's fastest and most advanced password recovery utility
👍 2
Avatar
millycent45 2/7/2020 8:49 AM
Anyone know of any good hash file checkers? I’ve used VirusTotal but i want doublecheck. It’s a PE file
Avatar
Does anyone know if @Magnet Forensics Axiom parses/carves sqlite freelists and write ahead logs?
Avatar
@millycent45 VT is going to be your best bet for hashes, hybrid analysis is another good choice... There are really quite a few but if those two don't have the hash, chances are the others will not either
Avatar
@FunkeDope yes - you'll get parsed and some carved results from WAL files, but would expect only carved results from freelists
👍 2
10:11 AM
some artifacts are a little broader in their carving scope than others, so hard to make a generic statement across all
Avatar
I'm drawing a blank - how do I generate a cellebrite report with information ABOUT images/videos but NOT include the actual files? I tried the redact all attachments option and I can't tell what, if anything it does. I want to be able to produce the report with metadata, hashes etc etc but not have explicit images in the report.
10:22 AM
im leaning towards just producing an HTML report and deleting the files manually, leaving broken links.
Avatar
Disregard - figured it out. In the appropriate data file pane, select images/videos etc you wish to redact, then Action menu, Redact.
Avatar
kmacdonald1565 2/7/2020 10:34 AM
I'm drawing a blank - how do I generate a cellebrite report with information ABOUT images/videos but NOT include the actual files? I tried the redact all attachments option and I can't tell what, if anything it does. I want to be able to produce the report with metadata, hashes etc etc but not have explicit images in the report.
@whee30 you can actually do that with pdf too. the pdf is only usually a couple hundred MB. you delete the associated file folder you can still open pdf
10:35 AM
but i believe when generating report...the next screen after adding case information is how you uncheck include files
Avatar
@kmacdonald1565 I tried it probably 5 different times, none of the report options appeared to make a difference... unchecking images worked but then no image info either. The redact action works perfectly, replaced the media with a big red "REDACTED" thumbnail but kept all info intact.
Avatar
kmacdonald1565 2/7/2020 10:37 AM
oh, okay neat. never used that
10:38 AM
back before we used reader, i would type up my reports and i would just use the pdf without the file folder. pdf opened super quick, didnt affect any of the other info i needed for my report
Avatar
Deleted User 2/7/2020 12:40 PM
any recommendations for software to view Facebook/Instagram subpoena returns (pdf)? I remember seeing a tool that would display it as if you were logged into the profile
Avatar
I used oxigen detective
Avatar
Andrew Rathbun 2/7/2020 2:17 PM
Have a great weekend everyone
Avatar
Any suggestions on a good all in one tool kit for computers, phones, tablets to access the drives?
Avatar
Andrew Rathbun 2/7/2020 11:39 PM
AccessData provides digital forensics software solutions for law enforcement and government agencies, including the Forensic Toolkit (FTK) Product.
11:40 PM
Support for two new file systems and faster image creation
Avatar
Supports APFS 👏
Avatar
Andrew Rathbun 2/8/2020 6:28 AM
First update in 11 months
6:29 AM
Glad it's still a live project. I use it all the time
💯 1
Avatar
damn
9:21 AM
gonna miss 4.2.0 😦 smokeweed (edited)
Avatar
Andrew Rathbun 2/8/2020 9:49 AM
@AccessDataGroup FTK Imager 4.3 vs @XWaysSoftware X-Ways 19.9 SR-3 imaging a 1 TB NVME: Default settings used for both programs (segment size, etc) FTK Imager Time: 51 m 15 s Validate: ~1 h 10 m (~11 GB/min) X-Ways Time: 26 m 56 s Validate: ~ 35 m (~28 GB/min) #DFIR
Avatar
That... Is a bigger difference than I expected
💯 1
Avatar
Ordered my Pelican 1650 case today for my Tableau James Bond gadgets.
Avatar
Learn the process, techniques and tools for performing a digital forensics investigation to obtain data related to computer crimes.
4:01 PM
In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. You will also be guided through forensic procedures and review and analyze forensics reports.
4:02 PM
Free 8 week self paced course
Avatar
Andrew Rathbun 2/8/2020 4:50 PM
@vanquish would be good to post in #training-education-employment
👍 1
Avatar
Trashboat667 2/9/2020 5:09 PM
I have a UFDR that is too big for the biggest flash drive they buy us (64GB). I did the split UFDR feature and I have it split up so I can use more than one drive. What is the best way to load these files into one project that is easy enough for another officer to do with minimal steps? Is there an official way to do it? (edited)
Avatar
@Trashboat667 buy bigger USB's that's easier for workflow
Avatar
Hi guys! Please tell me the methods of obtaining a screen lock if the owner does not call it, I can not find the article. Thanks!
Avatar
@Dfdan @Trashboat667 I agree with Dfdan, from past experience, the least disruptive way is to get bigger boats (USB sticks). We have found depending on the age of the workstation and your LE security protocols and policies will impact how quickly the data can be rebuilt and how effectively.
Avatar
@BorgSl Android or iOS? On both, it depends on OS version. What device/OS is it?
Avatar
any smartphone with a lock how to find out a lock if the owner does not want to talk, different tricks to get a password
1:55 AM
someone gave a link to an article in the summer in a discord I can not find
Avatar
Just had a customer ask if we could point them towards an expert witness on the topic of GPS/location data reliability. Unfortunately the person we would have recommended passed away a couple of months ago. Anyone aware of someone who has an established record as an expert witness for GPS/location data? And ideally they would be UK based as well
3:54 AM
@Law Enforcement [UK]
Avatar
@OllieD I was just about to suggest someone then I realised it's the same person you already knew. What a shame, I remember watching a presentation at F3 which was super interesting
Avatar
Yes, saw him present on the reliability of mapping applications a couple of years ago, excellent case study on a motorcycle in an RTC. Very knowledgeable guy
Avatar
Yeah really knowledgable, was an eye opener how far off the wrong interpretation could get you
👍 1
Avatar
Trashboat667 2/10/2020 4:38 AM
@Dfdan that would be ideal but here we are. I really want to know how the split UFD feature works. I appreciate the input.
Avatar
@Cellebrite or anyone else who knows - I am trying to export hashes from video/image files in PA 7.29. In the data pane, I am selecting the items to export, Export menu / Excel (only hash values). This produces a 7kb excel doc with an md5 column that is not populated with any data. If I export just straight to excel with all info present, it functions but then I have to scrape out the columns I want. It's not the end of the world but it's frustrating me. Does this look like a bug or am I doing something wrong here?
Avatar
just tried it, worked fine
7:28 AM
what version
Avatar
CloudCuckooLand 2/10/2020 7:33 AM
@OllieD Yes, RIP Professor Last. Very interesting guy, very sad loss.
Avatar
@Sudo 7.29.0.152
Avatar
Andrew Rathbun 2/10/2020 8:45 AM
is a full-service IT consulting agency based in Lowestoft, . We apply unique technology solutions to your small or medium-sized business.
Avatar
JonasWanobi 2/10/2020 10:39 AM
I just submitted that to MetroTech to be disseminated throughout the state. Thanks.
👍 2
Avatar
Andrew Rathbun 2/10/2020 12:41 PM
Welcome @Brian Carrier
Avatar
Anyone from @Cellebrite able to assist with my login issue on cellebrite portal website?
Avatar
No forensic tools seem to support btrfs filesystem so I have mounted the volume under linux. Now I need to extract the files and continue my analysis in XWF. As far as I can tell both tar and zip only gives me the modified timestamp, and nothing else. Any way to export the files, but still preserve all the linux timestamps? I'm thinking maybe SquashFS will do the trick? (edited)
Avatar
CLB - DavidK 2/11/2020 6:03 AM
@Pacman What is the issue?
Avatar
Can anyone recommend any good ISO forensics artifacts that I can use for Encase and create the. Eo1 files?
Avatar
Hi all, I'm working for a french CERT (in internship). I would like to set up a digital forensic lab (there is nothing on the DFIR yet) and I am wondering which solution should I use because I have low budget on it. In a first case, I wanted to set up a Windows workstation for use good free software like Autopsy or Belkasoft (software I use in college) and put a Linux VM for all of the others tools. But if someone wants to analyze an infected disk on the Windows OS, it could corrupt the workstation. So, should I prefer set up a Proxmox virtual environment and install a Windows OS and a Linux as a VM ? What is the best use for set up a low cost DFIR lab ? (edited)
Avatar
Andrew Rathbun 2/11/2020 8:04 AM
@mtth you could use Eric Zimmerman's tools to analyze registry artifacts - https://ericzimmerman.github.io/#!index.md
8:05 AM
They are free^
8:06 AM
If you need guidance on EZ's registry analysis tools, look no further than this YouTube playlist - https://www.youtube.com/watch?v=VYROU-ZwZX8&list=PLlv3b9B16ZadqDQH0lTRO4kqn2P1g9Mve
8:07 AM
That answers at least part of your question. I'll let someone else more knowledgeable than I chime in on the other parts, but generally if you're dealing with something you don't want to infect your own system, analyze it in a VM
8:08 AM
FTK Imager is free, also. That and Autopsy are all you should need for FOSS analysis and acquisition, respectively.
Avatar
Andrew Rathbun 2/11/2020 8:33 AM
FTK isn't open source but it's free, close enough
Avatar
@mtth why would analyzing an infected disk image corrupt the workstation?
9:07 AM
@vanquish I'm not clear as to what you're asking...
9:12 AM
@mtth When choosing free software to install and use in your lab, be sure to keep the licenses in mind, as there are times when you may run into issues if you're not careful.
Avatar
Brian Carrier 2/11/2020 9:15 AM
@mtth there is a free version of Cyber Triage (the "Lite" version) that allows you to collect and view artifacts. Doesn't do the analytics though. https://www.cybertriage.com/features/versions/
Cyber Triage is available in three versions: Lite, Standard, and Team. Review the feature list on this page to see which is right for you.
👍 2
Avatar
kmacdonald1565 2/11/2020 9:22 AM
anyone use Cyber Triage before?
Avatar
@vanquish I'm not clear as to what you're asking...
@keydet89 nevermind my support team has a training E01 file I can use. I also found one from digital evidence.
Avatar
Brett Shavers 2/11/2020 9:29 AM
I have 10 licenses of Latent Wireless to giveaway to one LE agency (local, state, federal, or military). It is like 'wardriving for cops' to find stolen/targeted WiFi devices. Free to enter, free to win. Just need an email and name for entry. https://www.dfir.training/dfir-training-blog/latent-wireless-review
Around the time when I was released from FTO and in my own patrol car, my agency started using LoJack. At first, LoJack sounded like a great idea. The way it works is that if someone’s LoJack-enabled car was stolen, police cars outfitted with LoJack det
Avatar
Booo :( (edited)
Avatar
Does anybody have a template for subpoena request to obtain device info and network (port) data for 3rd party chat apps such as TextNow, TextMe, etc?
Avatar
Brian Carrier 2/11/2020 10:21 AM
@kmacdonald1565 As a newbie to here, I'm not sure which Cyber Triage users are here. But, law enforcement has become a significant part of the user base. It's part of the NCFI training program and is in use in local, state, and federal organizations. It supports disk images, which makes it useful for LE. You can download a free eval from the site and I can send you a longer key if you need it. After the eval period, it turns into the free "Lite" version. (edited)
Avatar
tupp3rwar3z 2/11/2020 10:28 AM
sup @woody38 ?
Avatar
Sup @tupp3rwar3z
Avatar
tupp3rwar3z 2/11/2020 10:34 AM
yo @Jay528 ! long time man
10:34 AM
whats new?
Avatar
Can I ask for a courtesy card ?
10:34 AM
Lolz
10:34 AM
Nothing much
10:35 AM
Are you near Newport mall?
10:35 AM
We can grab some Chick-fil-A
10:35 AM
Or some spicy chicken sandwich from Popeyes
10:40 AM
I’m back at the agency waiting to go testify in court
10:40 AM
Waited about 5 hours
Avatar
tupp3rwar3z 2/11/2020 10:41 AM
haha your company must love that
10:41 AM
you visiting @woody38 ?
Avatar
No, he is going to lock me up
10:49 AM
😂
😂 1
Avatar
@mtth Since you’re working out of the CERT I’m guessing you’re probably quite interested in doing a lot of malware forensics and incident investigation. Proxmox is ok to work with but I personally find it less intuitive than something like vSphere or Virtual Box. For a free virtual lab I can recommend setting up two VM’s, that is, a base Windows box using FireEye’s Flare-VM script and then REmnux as your Linux box. You can add FTK Imager and Autopsy easily onto the Windows box. If you’re a bit unsure about setting up a safe lab environment there are plenty of resources out there if you google around. https://remnux.org https://github.com/fireeye/flare-vm
Contribute to fireeye/flare-vm development by creating an account on GitHub.
REMnux is a free Linux toolkit for assisting malware analysts with reverse-engineering malicious software.
Avatar
Has anyone ever done enumeration scripts into JSON format?
Avatar
Thanks guys @Brian Carrier @Andrew Rathbun @keydet89 @foomur
👍 1
Avatar
Could any @Law Enforcement [UK] members send me a DM if your LE has purchased Cellebrite Premium please?
Avatar
@MSAB Do you guys have a youtube video or an embeded video for XAMN reader? I'm looking for something similar to cellebrite's UFED reader video (https://embed.vidyard.com/watch/6vdCE29XwkTLHV1JbXtziU) but for XAMN. (edited)
Avatar
@Pacman We do not have any video as far as I can recall right now but there's a bit of a guide if you open XAMN and click Help>Get Started. In there there's a quick introduction to the XAMN called Open XAMN and make a basic analysis
Avatar
Thanks
Avatar
Deleted User 2/12/2020 6:41 AM
@Erumaro when is XAMN Reader going to be the default when exporting from the Kiosk? We've been told for months now that XRY Reader was going away and yet we are still are getting it on exports
Avatar
@Deleted User The XAMN Viewer is already the default with new Kiosk deliveries as of a few months back but as the Kiosk is mainly decided by your organizations workflow the workflow needs to be adapted to use the new XAMN application for view and export. Hope that makes sense! (edited)
Avatar
Deleted User 2/12/2020 6:45 AM
@Erumaro ah ok, I'll review our workflow, thanks!!
Avatar
If you log in on the MSAB Customer Portal you can find the Kiosk Admin Guide in the documents section which will contain some further information on how the workflow can be edited 🙂
👍 1
Avatar
Thumb drive question, looking to chip off USB drive that is not responding correctly, we have a tl866ii plus usb universal programmer, is this the correct programmer to read the chip ? This would be my first USB drive but I've done many cellphone chip offs. Looking for advice.
Avatar
Andrew Rathbun 2/12/2020 9:53 AM
@DCSO use the search for previous post by me when I've had issues with flash drives. I often sacrifice the male end off of flash drive and then soldered it to the one I need to get the information off of. I've been two for two in that so far. Is that what you're looking to do? (edited)
Avatar
@Andrew Rathbun Thanks for the info, the one we have when you plug it in it will see the serial number of the drive under linux but nothing else and it will pop under the device manager but no data etc. I"m thinking its maybe a bad controller ? Or it could be the memory too i guess
Avatar
Andrew Rathbun 2/12/2020 11:08 AM
Yeah not sure. What I did was for "hey, this thumb drive doesn't work anymore, can you fix it?" so I tried that and it worked. Beyond that, not sure the cause but I just know the effect.
Avatar
@Andrew Rathbun Ha ! I like it, its a start i'll give it a shot, not time to find a donor USB connection.
Avatar
Andrew Rathbun 2/12/2020 11:46 AM
@Andrew Rathbun Ha ! I like it, its a start i'll give it a shot, not time to find a donor USB connection.
@DCSO let me know one way or another. Either way, it shouldn't be worse than what condition it's already in 🤷‍♂️
👍 1
Avatar
Does anybody know if EngBoot versions of Samsung like the S7's can be flashed to encrypted devices ? We have a SM-930VL that we are looking to get a physical from and have the passcode but not sure if will work if the user has selected encryption. I"ve flash several years ago when this was a more popular phone but I don't recall them being encrypted.
Avatar
eng-boot or eng-root?
1:04 PM
Matching eng-root won't trigger anything and will give you insecure adb with root access no problem. G930 - all of them, should be encrypted from factory.
Avatar
@Arcain I'm not sure of the difference i've always referenced to it as being a eng-boot but i'm thinking its the same thing. Thanks for confirming
Avatar
From my experience, you need eng-root file. eng-boot files are often extracted from combination firmware, they shouldn't do any harm either, but they do not contain insecure adb (you need to pair it) and are not rooted.
👍 1
Avatar
How do you setup a Cellebrite touch? Just got a used one in the mail to mess with
Avatar
Andrew Rathbun 2/12/2020 1:58 PM
@Tyføøn does it have a valid license?
1:58 PM
It won't work otherwise
Avatar
No so I can’t buy one?
Avatar
Andrew Rathbun 2/12/2020 1:59 PM
The software won't with without a valid license. You basically have a paperweight without a valid license
1:59 PM
You can buy a license but it'll cost thousands
Avatar
Dang that sucks
Avatar
Andrew Rathbun 2/12/2020 2:01 PM
Welcome to Capitali$m! They have a product that does a good job and they have every right to charge for it. Same with all of the other vendors.
2:01 PM
Hopefully you didn't pay too much for it
Avatar
I got it for under $100
Avatar
Andrew Rathbun 2/12/2020 2:02 PM
Yeah that's fine and all but you need a valid license to use the UFED software.
Avatar
Right, gotcha
Avatar
Andrew Rathbun 2/12/2020 2:03 PM
Best of luck to you. Hope your University can use the touch somehow so it's not all for naught
👍 1
Avatar
Mr. Eddie Vedder from Accounting 2/12/2020 3:39 PM
https://medium.com/@grufwub/btw-my-cellebrite-runs-arch-66f672a2f858 you could install kali or another OS and have a the power of the power of “internals of a woefully underpowered netbook circa 2007”
Bad Arch memes aside… Installing Linux on the Cellebrite Touch was a bit more challenging than I anticipated, though likely down to user…
👍 4
3:40 PM
Looks like you can run Doom on it as well.
💯 8
⚔️ 2
😆 5
Avatar
kmacdonald1565 2/12/2020 4:40 PM
i would try to do logicals with it, see what happens...logicals give a HTML report with extractions
Avatar
chrisforensic 2/12/2020 10:39 PM
The #unc0ver jailbreak for A12-A13 will be released in the next 24 hours if no new major bugs are found. If you want to support the development of the #unc0ver jailbreak, you can find the PayPal and Patreon links on https://t.co/FtG9c9kNtg. You can also follow @unc0verTeam ...
Retweets
2003
Likes
8098
Avatar
I'd like to get Paladin or deft going on a touch
Avatar
Dr. Kaan Gündüz 2/13/2020 1:49 AM
Hi all
1:50 AM
Does anybody here use "Adult Porn Hashsets" to use as a white-list?
1:51 AM
In CP investigations, it should be useful to exclude non-CP porn.
Avatar
yeah, but I think that it's built into our processing tool rather than an external list
Avatar
Can a user access thumbcache.db files? If so, how difficult is it? I have a couple hundred images all in thumbcache.db. thanks for any help/advice!
Avatar
you can but you generally need something like thumbcache viewer
2:57 AM
it's not natively viewable, but very easy if you do a quick google search
2:59 AM
usually I wouldn't suggest the user had access to them unless there's good reason, but it is usually straightforward to draw inference of files that did exist in the filesystem and were "seen" (i.e. to be a thumbnail they need to be seen in the folder)
2:59 AM
someone can correct me though if I'm off piste
Avatar
kmacdonald1565 2/13/2020 5:59 AM
@Dr. Kaan Gündüz if you get an answer privately let me know!
Avatar
whats up man?? @tupp3rwar3z
Avatar
Does anyone have a compilation of whitelist hash sets for known images they use with PA? I’m interested to see if I can compile a full hash set to weed out most of the system images.
Avatar
"Carbonite: an Opentext company."
7:12 AM
Not sure what to think about that
7:17 AM
"Webroot: an Opentext company."
Avatar
Dr. Kaan Gündüz 2/13/2020 11:12 AM
@kmacdonald1565 sure thing
Avatar
Does anybody here use "Adult Porn Hashsets" to use as a white-list?
@Dr. Kaan Gündüz I do. I compile my own hashes as I categorize and add them to the hash database. I don't neccessarily use them as a white list. Legal porn could actually be exculpatory evidence. If I examine something and it has 10,000 images of legal porn and only one image of CP, it is not beyond the realm of probability that it may have been an accidental download.
Avatar
Deleted User 2/13/2020 12:32 PM
@LawDawg on the flip side if suspect tends to search for young looking porn actors/actresses that could be indicative of taste
Avatar
@Cellebrite has anyone noticed that the device locations is not populating on a map for UFED reader version ? I have a Detective that called saying they use to get the pictures and video mapped to location on a map and now it doesn't. I've pulled up from UFED reader version 7.29 and there is no map options in the settings and it is also not mapping the locations with GPS Lat and Longs
Avatar
Dr. Kaan Gündüz 2/13/2020 1:44 PM
@LawDawg thanks mate
1:45 PM
i also learned that i could extract clamav's database (main.cvd) to use as a hashset for malware
Avatar
I don't know if this conforms with the rules of the group, sonpardon me if it doesn't. I just feel this worth a share. I found this from Twitter. A user put in an FOIA request to the NSA for their Python training materials and got back a 400-page printout of their COMP 3321 training course. So, he scanned and OCR'd it. Here is a link to the PDF (warning: 118 MB) https://nsa.sfo2.digitaloceanspaces.com/comp3321.pdf You can find the post on twitter below: https://twitter.com/chris_swenson/status/1225836060938125313?s=08 Once again, my apologies if this doesn't sit right.
@aramaK Also, sorry for the typos. I did not do a once over before posting.
Free Python course materials! I put in a FOIA request to the NSA for their Python training materials and got back a 400-page printout of their COMP 3321 training course. So, I scanned and OCR'd it. Here is a PDF (warning: 118 MB) https://t.co/i1Fxe6G4MJ
Retweets
2379
Likes
6247
👍 5
👏 2
Avatar
I like Python!
Avatar
ThatLukeGuy 2/14/2020 1:45 PM
Oxygen email says they got big news next week. Anyone got any guesses or insight?
Avatar
Andrew Rathbun 2/14/2020 3:11 PM
My guess is a partnership with some other company but no clue who
Avatar
TooManyShots 2/14/2020 6:08 PM
if , say we had a new manager who had no idea what he was about, what is the best way to enlighten them, or is it a lost cause?
6:09 PM
if you try to enlighten them and they get the glazed eye effect effect, have you lost it already?
Avatar
Andrew Rathbun 2/14/2020 6:18 PM
@TooManyShots maybe make his eyes glaze over enough to where they waive the white flag and just defer to your expertise for everything and just rubber stamp what he needs to as a manager
Avatar
My detective friends are always accusing me of trying to "baffle them with bull***". It works.
👍 1
Avatar
Andrew Rathbun 2/15/2020 10:58 AM
Continuing the series from last year, I am making publicly available an image of an Android 10 device, which was created using a rooted Pixel 3. For those who may not know, there have been some maj…
👏 1
10:58 AM
Thanks @CLB_joshhickman1
10:58 AM
Below are links to sites that host forensic images of computers, phones, and various other storage media that can be used for tool validation purposes. As always, if you know of a link that’s missing here, please submit it using this link! When it comes to mounting forensic im...
Avatar
North Richland Hills police have a new tool to capture and scan crime scenes to better assist investigators. FARO is a 3D scanning device that allows investigators to capture, measure, and analyze scenes in a real-time format. The piece of technology can capture a scene, in it...
Avatar
Andrew Rathbun 2/15/2020 1:33 PM
We had that at my first LE agency and it was used for all crime scenes (rapes, accidents with injuries/fatalities, etc) and it was pretty awesome
1:33 PM
I never used it but I've seen the work it produced and it's definitely impressive. Not perfect, but a great way to relive the scene on the backend
Avatar
@NonUSLawEnforcement what's your experience of request for information to FB ? Which channels did you have to go through?
Avatar
https://www.humblebundle.com/books/cybersecurity-2020-wiley-books #computer-forensics #malware-analysis maybe something for you?
Secure yourself a new bundle of cybersecurity ebooks!
👍 3
Avatar
Quibble - the custom Windows bootloader. Contribute to maharmstone/quibble development by creating an account on GitHub.
9:13 PM
butwhy
Avatar
This platform could be massive for Android devs. Could be useful for us as well with testing apps if we can access the back end / database files easily Edit: https://ubuntu.com/blog/anbox-cloud-disrupts-mobile-user-experience (edited)
Using Anbox Cloud, telecommunication providers can create disruptive mobile user experiences for their 4G, LTE and 5G mobile network customers. […]
9:43 AM
Also could make our life a lot more difficult as data for apps will be stored more cloud based. Will be interesting to see the uptake
Avatar
Looks like an end-user oriented version of https://www.genymotion.com/cloud/
Enjoy Android online, in any browser, from any device. Collaboration and automation are part of the show! APK & virtual device sharing, CI support and many more features!
11:05 AM
Will be very interesting if platforms like that take off
👍 1
android3 1
Avatar
Could upset the phone market a bit, as higher specs are not needed so much has a decent LTE / 5G connection. Will definitely be interesting all around
Avatar
Andrew Rathbun 2/18/2020 11:56 AM
Welcome the folks from @Search.org
👍 3
Search 2
Avatar
@Andrew Rathbun @Search.org Excellent resource! I use them frequently!
💯 1
👍 2
Search 1
Avatar
Andrew Rathbun 2/18/2020 12:06 PM
Yep they're great. Happy to have them here
Avatar
Got to say I've never heard of them across the pond, will be checking them out! They mainly states based?
Avatar
We're happy to be here! It's a great community that is going and hopefully we can add to the conversations! We have a lot of free resources available on our website - www.search.org
💯 1
👍 1
Search 3
Avatar
Andrew Rathbun 2/18/2020 12:08 PM
@K23 basically the ISP list they have is the go to search warrant/preservation letter resource
12:08 PM
This section is a work in progress. This part of the site will contain template boilerplate language to include on various forms of legal process. It is highly advised to check with your local prosecutor and mind your local laws when serving legal process. These templates are ...
12:09 PM
So I don't know how relevant they are for you across the pond except for maybe an MLAT?
12:10 PM
They do have some free training and webinars and whatnot. I'm sure that's universal regardless of locale
👍 1
Avatar
I'll definitely have a gander. Always fantastic to have more resources! Welcome :)
👍 2
Avatar
@Cellebrite Hey guys, does CAS have support for the Huawei P20 Pro (CLT-L29)? Thank you!
Avatar
CLB - DavidK 2/19/2020 1:35 AM
@KeenoRen You can extract this device with Premium
Avatar
@KeenoRen dm me. Will let you know
Avatar
Guess we don't have a Discord section for memory forensics or I'm blind.
9:20 AM
Messing around with Encase and Winen.
Avatar
JeezyCreezy 2/19/2020 9:28 AM
Any UK (or wider) LE have any suggestions for a case management solution that doesn’t cost an arm and a leg?
Avatar
Andrew Rathbun 2/19/2020 9:34 AM
@vanquish good suggestion 👍
👍 1
Avatar
cyberGoatPsyOps 2/19/2020 11:15 AM
Hello all, i'm currently task on building out forensic storage solution, paid or home brewed, and was wondering about resources available. I come from the DoD LE space, but honestly, seems a little over the top for the private sector. I have online resources from CERT teams and NiST guidance. Thanks in advance!
Avatar
@cyberGoatPsyOps how large ?
Avatar
cyberGoatPsyOps 2/19/2020 12:49 PM
To give you a scale, we do about 12-15 cases a month, but money could be a factor if it gets outrageous. I'm thinking 10-16 TB
Avatar
So what about tape backups etc for redundancy / Business continuity / Disaster Recovery
12:53 PM
Reason I ask is Cloud Storage is a good solution
12:54 PM
or onsite and offsite server
12:54 PM
or
12:54 PM
just a couple raided Lacies or something small
12:55 PM
alot of solutions just not sure budget etc. 12-15 cases can easily surpass 16TB and how long do you keep your cases etc
Avatar
cyberGoatPsyOps 2/19/2020 1:32 PM
True, but we aren't doing full disk images on every case, we do IR for most cases, then we do traditional dead box forensics a lot less
1:33 PM
hence why I said 12-16 TB would be a good estimate
1:35 PM
and yes, I know there is a lot of solutions out there, myself coming from DoD LE forensic shop, I know that all to well. I was looking for additional resources for a DFIR shop in the private sector that does mostly IR and a lot less traditional deadbox forensics
1:36 PM
But still need to plan for dispositions and cross-examinations
1:37 PM
Apologize if I wasn't clear in my initial post
1:38 PM
Also, with 16TB, I would think I would leave slots open for expansions if we go on-prem
Avatar
Andrew Rathbun 2/19/2020 5:20 PM
Oxygen email says they got big news next week. Anyone got any guesses or insight?
@ThatLukeGuy https://www.forensicfocus.com/News/article/sid=3859/
Avatar
Anyoen know the LEO price for sanderson forensic toolkit? Looking to see if its affordable for my agency.
Avatar
Andrew Rathbun 2/19/2020 5:28 PM
@Ghosted I don't but TeelTech is usually very responsive via email
Avatar
Thanks. I have the book and wante to work through it. Probably easier to use Sanderson Forensic Tookit than another sql program
Avatar
@Andrew Rathbun Wonder how different this will be in practice to the BSSID database you can sync through PA. Main issue we have with it evidential wise is that it's all crowdsourced data, so locations may be slightly off or cannot be fully relied on. Some cases this will not matter so much but if you need to be really precise then it can cause problems
1:46 AM
"Additional functionality includes allowing investigators to extract a full file system (iOS) and valuable keychain information from Apple devices without knowing the password. This is done using Oxygen Forensic Detective’s unparalleled ability to quickly parse and decode the vast amounts of data necessary to ensure the viability of such an extraction." - That's going to be useful for those without access to some other advanced processes. Will be interesting to see what devices / iOS versions are supported (edited)
1:51 AM
Ahh. Reading the actual release notes, the above is a bit misleading. That only works if the device is unlocked already and jailbroken so no magic bullet there: https://oxygen-forensic.com/uploads/press_kit/OFDv122ReleaseNotes.pdf
Avatar
@Cellebrite Does CAS have support for HTC 10 (Model 2PS6400) with secure boot enabled? (edited)
Avatar
Deleted User 2/20/2020 6:49 AM
Why would they word it like that when they can't actually do it? Without knowing the password has, but one meaning in this sphere
Avatar
Andrew Rathbun 2/20/2020 7:16 AM
Thanks. I have the book and wante to work through it. Probably easier to use Sanderson Forensic Tookit than another sql program
@Ghosted https://www.teeltech.com/home/contact-us/ will have the email you need
👍 1
Avatar
@K23 @ThatLukeGuy @Andrew Rathbun How is this any different from the free wifi Bssid sniffing app that has been around for years ? https://play.google.com/store/apps/details?id=net.wigle.wigleandroid
Open source network observation, positioning, and display client from the world's largest queryable database of wireless networks. Can be used for site-survey, security analysis, and competition with your friends. Collect networks for personal research or upload to https://wig...
👍 2
8:21 AM
you could easily put old Android phones in squads and harvest the locations when it connects to the agencies wifi
8:22 AM
locations that are important to an investigation can be driven by and re-located, mapped and verified.
Avatar
Agreed, that was sort of my point - it doesn't exactly seem groundbreaking. Wouldn't surprise me if the data from free apps like that is included in these datasets @DCSO
Avatar
Deleted User 2/21/2020 12:02 AM
Anyone who knows a good .JSON script that converts the files to .csv or .html?
Avatar
@Deleted User json is never been fun to play with. pprint in python helps align it and beautify it some, but a quick way is use an editor with syntax highlights and roll
Avatar
thanks pprint
Avatar
cyberGoatPsyOps 2/21/2020 6:45 AM
There are few on github that covert Json2Csv
6:45 AM
Actually, I think that is what the tool is called "json2csv"
Avatar
good name
Avatar
cyberGoatPsyOps 2/21/2020 7:07 AM
command line tool to convert json to csv. Contribute to jehiah/json2csv development by creating an account on GitHub.
Avatar
Anyone know of a pre made Windows file system for forenics training? If not thinking about making a Github and come up with all kinds of simulated forensics data for using forensics tools.
11:17 AM
I think that's the right link, my fingers are too fat on my mobile! Various images in the tools section I think 🙂
Avatar
Andrew Rathbun 2/21/2020 11:18 AM
Below are links to sites that host forensic images of computers, phones, and various other storage media that can be used for tool validation purposes. As always, if you know of a link that’s missing here, please submit it using this link! When it comes to mounting forensic im...
11:18 AM
Tons of images there
11:20 AM
Anyone know of a pre made Windows file system for forenics training? If not thinking about making a Github and come up with all kinds of simulated forensics data for using forensics tools.
@vanquish if you do this I will make sure it is added when you're done with it. I would highly recommend following @CLB_joshhickman1's method of documenting what was done on the images as seen in the Android 6-10 images he created. I know the 10 image has great documentation. Would be a good template
👍 1
👆 1
Avatar
@Andrew Rathbun knew it was there somewhere 😂
Avatar
Andrew Rathbun 2/21/2020 11:40 AM
@Andrew Rathbun knew it was there somewhere 😂
@JMK really appreciate your efforts. Thanks for checking there!
👍 1
Avatar
kmacdonald1565 2/21/2020 1:22 PM
@Andrew Rathbun thank you! i might need to borrow these
1:23 PM
only suggestion i MIGHT add would be a file size column to the page...but not fully necessary at this point
Avatar
Andrew Rathbun 2/21/2020 1:23 PM
@kmacdonald1565 that's fair but also some of those links are to full repositories so it would be hard to populate the cell in that column for that particular entry
Avatar
kmacdonald1565 2/21/2020 1:23 PM
i am beginning to see that as i browse more
Avatar
Andrew Rathbun 2/21/2020 1:24 PM
But for the Android images absolutely that makes sense
1:24 PM
Just don't know if it's worth adding if those are the only ones in that entire table
Avatar
kmacdonald1565 2/21/2020 1:24 PM
gotcha
Avatar
Andrew Rathbun 2/21/2020 1:25 PM
I think it's a pretty good collection of test images. I had no idea that many were laying around until they were all compiled together (edited)
👍 1
Avatar
I like doing workshops with the digital corpora ones
Avatar
In regard to https://discordapp.com/channels/427876741990711298/427894356805156873/680137328983146500 and the opening of the 2020 Forensic 4:cast Awards - Nominations, I think I'm going to have to vote this Discord resource as DFIR Resource of the Year for 2020. It has grown considerably in size over the last year or so, and for me personally has been invaluable in helping keep people safe, serving the community and basically helping me do my job better due to it being a global resource with lots of contributors who are willing to help each other. I'd love to see it get the recognition it deserves. Just have to figure out a name to put in the relevant field !! Any suggestions better than this one would be greatly appreciated !!
💯 8
3:38 AM
Avatar
Andrew Rathbun 2/22/2020 3:43 AM
@Stevie_C thank you so much for doing that, we appreciate it! I'm not planning on doing a campaign trail or anything like that. I'd rather the people decide themselves over me pushing people to vote. I think I'll make a few mentions and reminders over the next few months at most to remind people to cast votes, not just for us, but in general. Thank you again for the high endorsement and I appreciate your post very much.
3:43 AM
I would say Digital Forensics Discord Server should be what you put in there
3:45 AM
Also, just a reminder for everyone, any recognition is appreciated and completely extracurricular. This server and AboutDFIR are purely passion projects. No ad revenue. No sponsorships. Nothing like that. Just spare time combined with a passion.
3:48 AM
Also, just a statistic, we entered 2019 with just under 850 members and we ended 2019 with around 2150 or so, by my best estimate.
😄 1
💯 1
Avatar
Has anyone else been having problems with @Magnet Forensics Axiom generating HTML reports. I recently started to have this problem and they suggested I just make reports in PDF which doesn't solve the problem. They also stated "We believe it has to do with how an internal dictionary value that unfortunately, we are processing correctly." I was hoping 3.10 would fix it but it did not.
Avatar
@bmarvin. we had an issue in 3.9, but now 3.10 is out that has been corrected. Update and you should be good now.
Avatar
hey @Andrew Rathbun can you add a channel for Cloud Forensics?
Avatar
Andrew Rathbun 2/23/2020 1:21 PM
hey @Andrew Rathbun can you add a channel for Cloud Forensics?
@tzviday thanks for the suggestion, I'll discuss it with the Mods before implementing. We have more channels currently than I'd like so we'll see what we come up with
(edited)
1:28 PM
In the meantime, vote up or down the idea of a Cloud Forensics channel
👍 14
👎 2
Avatar
Check out the update to Epoch timestamp decoder/encoder:
2:43 PM
New update to Epoch (and Blog Post) includes several new timestamps and a Date Seeking Tool (Experimental) to search binary files for dates within a given range. :) #DFIR
👍 2
Avatar
Deleted User 2/24/2020 5:50 AM
SMS-Migrator - iOS log file, any idea what this is for please?
Avatar
Hello all of the DFIR Discord group. I am looking for help in collecting a timestamp corpora/examplar data set so that the developer of the Epoch tool (https://www.doubleblak.com/blogPosts.php?id=7) can test. What I specifically need is the encoded version and the decoded value. Is anyone aware of such a corpora existing?
Avatar
has anyone had any experience with ingesting UFDR files into Nuix?
7:46 AM
or exporting EML files from a UFDR and how to retain their original date/time?
Avatar
Dr. Kaan Gündüz 2/24/2020 11:27 AM
ufdr is basically a zip file containing an xml and the rest of the files
Avatar
Andrew Rathbun 2/24/2020 2:07 PM
@DF51 Shaf not aware but I'll keep an eye out. Anything against just generating random timestamps from an epoch generator and using that?
Avatar
PurpleRanger207 2/25/2020 5:57 AM
Looking to some comparison for CDR analysis. Price point for start up and annually is a huge factor. So far I have: Oxygen Ztex Geotime Hawk analytic The Cell Detective Any main ones I forgot?
Avatar
@PurpleRanger207 @Cellebrite Analytics
Avatar
Deleted User 2/25/2020 6:21 AM
I am examinating a Sony C5305 and have some questions regarding some files located in "/data/data/com.google.android.gms/files/AppDataSearch/main/cur/" the files are: ds.urifps.n, ds.urifps.x, ds.urifps.s, idx.lexicon.n and idx.index. Those files have been modified at a certain time, and I want to know if the timestamp changed becouse the user have been active on the phone or if it was some auto process/update. Does someone know what kind of files those are?
Avatar
Deleted User 2/25/2020 6:53 AM
@PurpleRanger207 since you're law enforcement check out CAST...free from the FBI
Avatar
chrisforensic 2/25/2020 7:24 AM
hello out there, just a little hint concerning opening generated .ufdr with UFED-Reader without prompt to change the language for UFED-Reader... and without restarting UFED-Reader ! 1) put a textfile into the folder of the .ufdr file, name it "selectedlanguage" 2) open it and write your language inside (for me it´s "German") 3) writeprotect it (because UFED-Reader will kill it if you don´t) you can copy this file in every folder with .ufdr you give to your analysts etc., then Reader always starts in the selected language ;)
👍 3
7:24 AM
👍 1
Avatar
Weird question, not sure where to post. Got some Call Data Records which appear to show incoming SMS messages from continental Europe to the uk. Whenever a message is received from the Euro number another message from a UK number is received within 1 second. Too many to be coincidence. Wracking my brain as to what could explain this. Dual-SIM? SMS forwarding to some sort of distribution group? Messaging app? Too quick and uniform to be manual process and wrong way round to be just a group chat. Anyone have any experience or possible explanation? Have no info on what phones are involved, just have billing data.
Avatar
Possible SMS spoofing?
Avatar
I did wonder if it was a spoof number but some kind of delivery report was happening.
Avatar
Looking to see if anyone has run into a device similar to this ? I'm guessing it has to do with some type of fraud at a point of sale or identity theft. Any ideas would be appreciated.
2:42 PM
Avatar
never seen one, but can you read numbers on the pcb which might indicate something about the device?
Avatar
3D printed or pre-built?
1:43 AM
looks interesting
1:43 AM
ah no, that's been injection moulded, it has the witness marks there
Avatar
MrMacca (Allan Mc) 2/26/2020 3:11 AM
is there a gap near where your thumb is that a card can be inserted?
Avatar
ctrlShiftEscape 2/26/2020 5:42 AM
Looking to some comparison for CDR analysis. Price point for start up and annually is a huge factor. So far I have: Oxygen Ztex Geotime Hawk analytic The Cell Detective Any main ones I forgot?
@PurpleRanger207 https://securcube.net/
Avatar
@ctrlShiftEscape Plus 1 for Ztex, we use them and I beleive they are priced pretty well compared to the rest. I've heard Cell Hawk is good but your paying a pretty price.
Avatar
Has anyone used an advertiser ID to get any useful information from Apple (or anyone else)? Through legal process, I was given the advertiser ID associated with a suspects TextNow account. I know the suspect is an iPhone user, but I do not have the suspects iPhone, nor do I know the suspects iCloud account or any real email address tied to Apple. The iPhone also is used as a WIFI-only phone with no cell service. My ultimate goal is to identify and be able to serve Apple a warrant for the users iCloud backup. (edited)
Avatar
ThatLukeGuy 2/26/2020 8:45 AM
@dfeyen I was coming here to ask this exact question. I've got a google(android) Id from Pinger and was wondering what useful information I can get.
Avatar
@ThatLukeGuy Ha. Hey Luke. I'll share what I get. Someone forwarded my email on the ICAC listserv to the guys at Fogdata, so hopefully I'll get a reply soon.
Avatar
iPhone IMEI Checker to check if iPhone is locked or blacklisted with IMEI iPhone Check. Find out full iPhone Network, SIM Lock & Blacklist Status by IMEI!
Avatar
Anyone use susteen data pilot?
Avatar
@Jay528 I have utilized the DP10. They are great for their intended use.
Avatar
Do they provide a list of supported devices ?
10:06 AM
Website is generic
Avatar
@Jay528 they have an internal databases within the device, but I don’t think that’s what you’re looking for. I would reach out and they will provide a list.
Avatar
Thank you
10:20 AM
Not liking it so far
Avatar
Hi all! Does anyone have any advice on what to do after dealing with sensitive/strong media one deals with on daily basis? How do you go on to recover? We are all humans, so obviously some evidence can disturb us deeply. I would love to hear some tips/advice. Pm if that works better for you. Thank you in advance for the taking the time to answer!
Avatar
Andrew Rathbun 2/26/2020 10:59 AM
@trillian You have to learn to compartmentalize when you're looking at the nasty stuff. It also helped me personally when I thought this is what needed to be done in order for these sick people to be put away. The end goal was my main focus and I did my best to limit my exposure to it only when necessary for the purpose of report writing. Also I made sure I was open with my wife about what I saw without going into graphic detail but enough for her to understand I saw some bad stuff and to keep me in check.
Avatar
@trillian +1 for what @Andrew Rathbun said. I have taken the stance that I never have the audio on unless I have reason to believe that there is some evidentiary value in listening (for a suspects voice, language, mention of a victims name, etc.) I think Axiom has some new settings to help reduce exposure of images as well...haven't explored them. Our DA's office usually only wants us to give them 10 images (1 count per image). I describe the most representative images and then make a note of how many more undescribed images exist in general so that I don't have to look at them all in detail unless the defense wants to put up a stink, then I'll go back and describe an additional 10 more. In my state, 1 image = 3 years mandatory minimum in custody, so they add up quickly.
Avatar
@trillian SHIFT wellness is geared toward the Internet Crimes Against Children community (not sure if you are specifically talking about CSAM or not), but they have some great online resources you can access from their website - www.shiftwellness.net.
👍 4
Avatar
kmacdonald1565 2/26/2020 2:12 PM
@trillian For me, i make sure that i keep the exposure limited. sometimes it does get to you but talk it out with somebody, find a confidant whomever that might be. the biggest motivator is arresting the bad guy for having it at the end of the day. I also try to keep my associations separate. I will have no pictures of family on my desk or anything like that...i even try to make sure that if i have music on, it varies genre so i don't subconsciously associate those images with music i like. most of the time, i wont even have music playing though. anyone that deals with it have to remember that there are others going through the same stuff. reach out to someone if you need to or have an outlet of some sort. my lunch break i work out almost every day...I will run a few miles, lift weights, do some calisthenics, hit a punching bag (which is awesome) depending on how i am feeling that day or what i have time for.
Avatar
Hi all! Does anyone have any advice on what to do after dealing with sensitive/strong media one deals with on daily basis? How do you go on to recover? We are all humans, so obviously some evidence can disturb us deeply. I would love to hear some tips/advice. Pm if that works better for you. Thank you in advance for the taking the time to answer!
@trillian check out Project Vic. It will hash the pictures and avoids you looking at them.
Avatar
Trashboat667 2/26/2020 3:20 PM
Anybody know how or if it’s possible to download the content of a user’s Tiktok account that would capture the content of the messages on consent? I’m not talking about a phone extraction I mean just logging into the account on consent and downloading the profile much like downloading the contents of a Facebook profile on consent.
Avatar
Andrew Rathbun 2/26/2020 3:59 PM
@Trashboat667 with apps changing all the time, probably the best bet would be to make an account yourself and see if that's the case. That way you know for sure and have validated it yourself. Hopefully someone knows though.
Avatar
chrisforensic 2/27/2020 12:33 AM
@Cellebrite ... can you give info, please? setup of PA 7.30.0.288 has more than 3 GB... and there is a database which will be installed (over 1 GB)... what is this database for? (edited)
❓ 2
12:33 AM
Avatar
@chrisforensic answer in bound shortly
👍 2
🙂 1
Avatar
Anyone got a recommendations for standalone map software that can use KML files?
3:09 AM
Google Earth
3:09 AM
specifically, Google Earth Pro for desktop - https://www.google.com/earth/versions/
Avatar
@Andrew Rathbun tidy. Will give it a go. I did Google it and saw about 40 billion answers and then thought 'ask the forensic folk, theyll know some funky software'.
Avatar
Andrew Rathbun 2/27/2020 3:12 AM
Google Earth Pro became free within the last couple of years FYI. Should do exactly what you need with those files
Avatar
Just been playing, needs a web connect to get the maps
Avatar
Andrew Rathbun 2/27/2020 3:28 AM
Another suggestion for a good place to ask if you get no bites here would be r/software. Every thread on there is people asking "hey I need ABC, what software exists that can satisfy my needs?"
Avatar
Ok, good shout, thanks.
Avatar
Andrew Rathbun 2/27/2020 3:29 AM
Also, AlternativeTo is a good site. Go there and search for Google Earth
3:29 AM
Popular Alternatives to Google Earth for Web, Windows, iPhone, iPad, Android and more. Explore 25+ apps like Google Earth, all suggested and ranked by the AlternativeTo user community.
Avatar
Thank you all for the great information!it has definitely help me create a little “go to” for dealing with this stuff. It means a lot to me to know I have this kind of support and help from this community!
👍 2
Avatar
Posted from decoding channel:-
Avatar
@Pacman are you taking into account time zone? That would be my first thought to check
Avatar
Will check that tomorrow but.. it still doesn't answer how the phone was wiped. There was no way of connecting to the device as it was completely isolated i.e. SIM removed etc. When examining the device first, I didn't see any setup screens - just looked like a normal phone albeit no data
Avatar
I remember reading a while back about find my iphone working via bluetooth like the tile trackers do (even with airplane mode on). I never got a good answer if you can wipe a phone via the passive bluetooth as well.
Avatar
Anyone have a good template for consent to take over electronic account(s)?
Avatar
Andrew Rathbun 2/27/2020 4:12 PM
@whee30 I have some templates made on AboutDFIR that may help. https://aboutdfir.com/resources/preservation-letter-search-warrant-templates/
This section is a work in progress. This part of the site will contain template boilerplate language to include on various forms of legal process. It is highly advised to check with your local prosecutor and mind your local laws when serving legal process. These templates are ...
4:12 PM
they are located in the drop down menu one submenu further than that but that's the landing page
4:12 PM
if this is not what you're looking for, maybe we can collaborate on something that is and can be on there for future benefit
Avatar
ok - I have a case coming in that I will need a consent to take over the account... I don't see it on that page but I will come up with something soon I'm sure. will DM if I get something good.
Avatar
Andrew Rathbun 2/27/2020 4:20 PM
which account is it? i have templates for Discord, Facebook, etc
Avatar
why does FTK sucks to install
Avatar
Dr.Who-IACIS 2/27/2020 4:54 PM
It's, well......FTK
Avatar
gahhhh
Avatar
Dr.Who-IACIS 2/27/2020 4:56 PM
@Turb0Yoda I quit using FTK after losing cases to the database repeatedly and upgrading sucked. I'm now using Belkasoft Ultimate, FEX and WinHex.
Avatar
yeh at work I stick to axiom and xways/encase if I need it
4:56 PM
but for class i'm stuck with ftk for this lab
4:57 PM
getting permission errors on a fresh windows install ._.
Avatar
Dr.Who-IACIS 2/27/2020 4:58 PM
@Turb0Yoda That sucks. I like the way X-Ways / WinHex displays the actual offset locations. I like IEF/Axiom and we quit using EnCase years ago.
Avatar
yeah, I used encase at my last internship for mainly e-disco... it worked. Got to experience axiom at my last internship/now job ad oh boy
Avatar
Dr.Who-IACIS 2/27/2020 5:00 PM
@Turb0Yoda I got FEX and WinHex from IACIS when I went through in 2017. I'm a coach for the process now but both have expired. They still use FEX which is okay but WinHex rocks that certification.
Avatar
Mmm
Avatar
Dr.Who-IACIS 2/27/2020 5:03 PM
@Turb0Yoda Windows 10? Got to install everything as admin.
Avatar
Yes
5:03 PM
Might have been the issue
Avatar
Dr.Who-IACIS 2/27/2020 5:04 PM
@Turb0Yoda Windows 10 is locked down so to speak. You have to install and then go into the programs and make them run as admin.
Avatar
I just left to grab food will attack later
Avatar
Dr.Who-IACIS 2/27/2020 5:08 PM
👍 Been a long time since I was on.
Avatar
Andrew Rathbun 2/27/2020 6:11 PM
@Turb0Yoda are you no longer a student?
Avatar
Nah, I'm still a student
Avatar
Andrew Rathbun 2/27/2020 6:11 PM
I can update your role to reflect your life situation if need be
Avatar
Hence class
Avatar
Andrew Rathbun 2/27/2020 6:11 PM
Ah okay. Let me know when that changes
Avatar
Yepyep
6:12 PM
Won't be full-time until August
6:12 PM
Taking a break
Avatar
Andrew Rathbun 2/27/2020 6:13 PM
I tested out Fex once and I really liked it. Seemed like EnCase minus the bad plus lots of quality of life improvements that other suites had going on (edited)
Avatar
Trashboat667 2/27/2020 6:40 PM
@iWindmill#5461 did you figure this out? I’m intrigued. I was also thinking the Bluetooth thing that @whee30#1537 talked about. My understanding of the new FindMy Bluetooth function is that it functions just like any other connection so yes I think you can wipe a phone remotely even if it is in airplane mode. https://www.macrumors.com/guide/find-my/
Apple in iOS 13 and iPadOS merged the Find My Friends and the Find My iPhone apps into one app that's just called "Find My," because,...
6:42 PM
@Andrew Rathbun I feel very confident you CANNOT download a TikTok profile like you can a Facebook or Google Takeout. Thanks for the reply.
💯 1
Avatar
Andrew Rathbun 2/27/2020 6:42 PM
@Trashboat667 good work looking into it and posting your findings. I'm sure someone else will benefit from it via the search feature 👍
Avatar
Trashboat667 2/27/2020 8:03 PM
@Pacman welp I tried. You can’t. It sends the command but sits there until the phone is out of airplane mode. At least in my very rudimentary test.
💯 1
Avatar
That's what I though @Trashboat667 -it is mind boggling.
10:18 PM
I can't come to a plausible explanation (edited)
Avatar
@Pacman Dates and times aside, if the IIOC was uploaded to evidence.com it must have had an internet connection surely? You say the SIM was removed but was WiFi switched off?
Avatar
@Cellebrite ... can you give info, please? setup of PA 7.30.0.288 has more than 3 GB... and there is a database which will be installed (over 1 GB)... what is this database for?
@Cellebrite Got the answer on this question already? EDIT: Got answered in dm.
(edited)
Avatar
It’s part of the installation files. I don’t have specifics on it but don’t delete 🙂
Avatar
My guess is that its full of App store and Play Store data. The new installed applications listing now gives descriptions from the stores for some apps. e.g. the KIK messenger app includes the blurb from the store.
Avatar
Reposting here as this may be a better channel: For those that are generating sysdiagnostic logs on an iPhone and syncing the phone to a Mac; a folder is created in ~/Library/Logs/CrashReporter/MobileDevice/iPhone name. Has anyone noticed that after an undetermined amount of time, files that were synced from a phone have 'disappeared'? I had noticed that I'm missing content from some older synced phones, but wasn't entirely sure what was happening. Today I actually saw files disappear from the folders as I opened them. Is there some archival, rotation, deletion process that is happening to items in the CrashReporter folder? Is there a way to retrieve these missing files? Running Mojave 10.14.6
Avatar
@Pacman did you figure this out? I’m intrigued. I was also thinking the Bluetooth thing that @whee30 talked about. My understanding of the new FindMy Bluetooth function is that it functions just like any other connection so yes I think you can wipe a phone remotely even if it is in airplane mode. https://www.macrumors.com/guide/find-
@Trashboat667 Hm this is something we must test, because this causes my current workaround (flightmode, turn off wifi) not to suffice. EDIT: Our expert in lab just told me you cant wipe an iPhone by bluetooth. Havnt tested it myself, but i believe his skills.
(edited)
Avatar
@florus couldnt get a definite answer cos the wipe timestamp has royally screwed the timeline. I just told oic that I don't know what happened.
2:55 AM
anyone an idea what telecom provider this is? Im EU based, but could come from anywhere in the world.
Avatar
Dr. Kaan Gündüz 2/29/2020 5:24 AM
google reverse image search says it's Cosmote
5:25 AM
cosmoto.gr
Avatar
Hm could have done that myself of course, but thanks doe looking calimelo!
Avatar
Dr. Kaan Gündüz 2/29/2020 7:01 AM
no worries
Avatar
does anyone have a sample / test UFDR for educational purposes?
2:07 AM
@Cellebrite is such a thing available perhaps?
Avatar
Andrew Rathbun 3/2/2020 4:50 AM
I added Google, Twitter and Microsoft SW template language to AboutDFIR today. FYI for future reference
👌 1
Avatar
Deleted User 3/2/2020 7:57 AM
any tips for finding what provider a phone number belongs to? Did fonefinder, but it wasn't correct (think the number might have been ported) so sent the investigator to https://lawenforcement.numberportability.com/services/ivr/ , but haven't used it myself before
Avatar
@Deleted User phonelookup.zetx.com is free for Law Enforcement and if the number is ported, supposedly Zetx gets the ported carrier within 2 minutes of porting.
👍 1
Avatar
Deleted User 3/2/2020 8:48 AM
@laurenw excellent thanks for that!
Avatar
@Cellebrite anyone available that might be able to answer a licensing question?
Avatar
kmacdonald1565 3/2/2020 9:41 AM
@Deleted User my department has cellhawk and whooster available to us (in nj). sometimes get actual phone/account owner out of it
👍 1
Avatar
Does anyone know offhand if various android device settings are housed in a specific place? like info.plist or similar for iOS
9:56 AM
im specifically trying to find screen timeout settings
Avatar
Deleted User 3/2/2020 10:04 AM
@kmacdonald1565 thanks! I realized when someone PM'd me about Wooster that I met with a rep of theirs a couple years back, but forgot all about it....might be something to research
10:04 AM
@kmacdonald1565 are you generally happy with Wooster?
Avatar
kmacdonald1565 3/2/2020 10:06 AM
yeah,
10:06 AM
has a decent success rate
10:06 AM
problem is it goes on only one phone (2 in our department for 2 licenses)
10:06 AM
i have a cellhawk login
10:07 AM
i dont have the whooster phone, so i use cellhawk more often.
10:07 AM
generally whooster gives a little more info
Avatar
Deleted User 3/2/2020 10:07 AM
gotcha, price wise, is it expensive?
Avatar
kmacdonald1565 3/2/2020 10:07 AM
100 or 120 / year
10:08 AM
cell hawk i think is more because this is a side feature of a cell tower mapping
Avatar
Deleted User 3/2/2020 10:08 AM
wow that's it? Not bad at all
Avatar
kmacdonald1565 3/2/2020 10:08 AM
no not bad at all
10:08 AM
several cops in my area just buy it them selves
Avatar
Deleted User 3/2/2020 10:12 AM
given the currently NJ environment I'd probably wouldn't venture that way (for my agency that is)
Avatar
@Magnet Forensics - other than the artifact reference pdf, is there more documentation on where the data for "Activity Manager History" is derived? I have a Galaxy S10 with this artifact present in a "quick image" through Axiom, I want to use the info in my case but I'd like to know where it's coming from if possible. From what I can gather through the log.txt, the record is being created by "dumping system service 'activity'" and outputting that to "activity.txt", is there additional reading I could do on this? My googling isn't turning much up right now.
Avatar
forensicmike @Magnet 3/2/2020 10:52 AM
DM'ed
👍 1
Avatar
@Deleted User what do you need help with?
Avatar
Deleted User 3/2/2020 11:52 AM
@CLB-Paul I saw talk about a beta of 7.30 and was wondering where one would get it
Avatar
I did some testing with Signal messenger data on a test iphone and did a full advanced logical (checkm8) with ufed touch 2 but still can't seem to access the signal chat data using the latest UFED PA 7.30.228. What am I missing?
2:02 PM
I got the keychain and everything
2:02 PM
Latest signal app version on ios
Avatar
Anyone have any issue of uninstall or reinstall iTunes on the forensics machine for Cellebrite PA
Avatar
Does anyone have a list of questions for an attorney for laying the foundation for Cellebrite extractions in court? I have https://smarterforensics.com/wp-content/uploads/2014/06/Explaining-Cellebrite-UFED-Data-Extraction-Processes-final.pdf, which is great.
Avatar
Second question: is this the directory for all DCIM deleted pictures? Android->data->com.android.gallery3d->files->.trashcan (edited)
3:00 PM
Disregard, specifically for Gallery viewer. But yes it will go into .trashcan when deleted. (edited)
Avatar
there's a million possibilities for deleted and all are fun
Avatar
@Deleted User most counties in NJ have a wiretap/pen register system or rely on another county for them. They have those systems (number portability) built in, finding out who to call or email may be the easiest way and free for you.
Avatar
@Magnet Forensics Is it possible to speak to someone re temporary licenses?
Avatar
cScottVance 3/3/2020 5:19 AM
@Pacman Dming you.
Avatar
@JonasWanobi UFED's MTK Live mode is based on this vuln I believe: https://discordapp.com/channels/427876741990711298/427877097768222740/624184747496570891
6:14 AM
So I would assume not good news for that mode
Avatar
JonasWanobi 3/3/2020 6:14 AM
@OllieD That's what I thought.
Avatar
Can someone compare FTK to X-Ways for me? I'm due to renew FTK but the product has gone stale for me - nothing really new for years, the interface is nasty. I do love the indexing and search functions so for the cost of renewal alone it might be worth it, but X-Ways seems to be popular among some LEO examiners I trust. I have dabbled in it and find that it will take me a while to reach fu level, but can the functions of X-Ways satisfy the index and search features of FTK?
Avatar
@jeffwold there is a steep learning curve to X-Ways but one you get it, it will absolutely do everything you need it to do with indexing and searching. It's a very powerful deep dive tool one you learn it.
👍 2
Avatar
ThatLukeGuy 3/3/2020 10:08 AM
Looking for some techniques to find identifying details from a prepaid verizon telephone number. Thoughts?
Avatar
as in all you have is a phone number?
Avatar
ThatLukeGuy 3/3/2020 10:15 AM
Yes, prepaid from verizon. I also have an Android ID. Launched a subpoena off to Google for that info.
10:16 AM
rather, launched one to google with that ID to find the subscriber. Fingers crossed on that one.
Avatar
the android ID likely has device information attached as well... other than legal process to verizon for what subscriber/device is currently using the number I'm not aware of any way to ID device information
10:18 AM
simply based on a phone number
Avatar
ThatLukeGuy 3/3/2020 10:20 AM
Yeah, I figured. Verizon said they had no records for the prepaid account however TextNow was able to provide the Device ID. Hence the subpoena to Google.
Avatar
If it was Verizon, they should be able to provide you the IMEI, use IMEI.info to get your make/model.
10:56 AM
SW came back neg. though?
Avatar
Does anyone have any plans in place for any decontamination of devices in the event of major bug outbreaks? Any antibacterial wipes Phone UV baths Etc.... Thoughts?
Avatar
Go to the Winchester.... We have anti-bact gel, wipes etc but I can't see it being that effective. There's policies in place for a deep clean of the building and a 48 hour shutdown if it does hit us, and if an exhibit is known to be from a contaminated source then it would just follow our usual biohazard procedure which involves it being sent out to the wet forensics labs for cleaning prior, then glove, apron & mask up and use a dirty desk when it arrives at the unit (edited)
🤣 4
🍻 5
Avatar
^ Go to the Winchester and wait for it all to blow over.
👍 2
🍻 6
7:05 AM
On a serious note - as I understand viruses can stay on an object up to 9 days. So if you're working on cases that are older than maybe 20 days, you should be okay. Otherwise, gloves and masks, anti-bacterial wipes to wipe down the area etc.
7:07 AM
Having said that, you should remember I am not an expert at viruses/bacteria and this is an information that was given to me via word of mouth.
Avatar
Any Hancom users got 5 minutes to spare?
Avatar
Hello all EnCase product suite end users. I would like to get your product feedback so that I can pass it to my Encase engineer contacts. When comparing products on the market, what does Encase not provide? Any negative comments are great. I need to wake the engineers up and let them know the truth. Feel free to DM me for my Opentext em3.
Avatar
Team.. I have an urgent request for assistance in imaging a mac book that just has USB C connection. Any advice greatly appreciated. 😄
Avatar
@Gumpoo We just imaged one using MacQuisition and the Cellebrite OTG USB C cable
Avatar
I have a question about lawyers and testifying. An examiner called me to pick my brain about a situation he has. He had a laptop which through an attempt to preview the data through a hardware write blocker turned out to be encrypted. He went ahead and imaged the drive through a Falcon Forensic Imager and analyzed the E01 image with @Magnet Forensics Axiom software. The Falcon Imager hashed the HDD prior to and following the imaging process. The examiner DOD wiped the evidence storage hard drive disk with a 7 pass wipe prior to imaging the bad guy hard drive. This is visible in the Falcon Imager log. CP is found in the unallocated section of the E01 image. *Defense now argues everything is bad. They request logs showing validation practices for all tools. The logs don't exist. They requested competency records showing examiner's competency testing for past 5 years. Examiner does training frequently, and has certifications from the Federal Law Enforcement Training Center for all their forensic courses. Defense argues bad practices has put the CP onto the suspects unallocated partition. Examiner asked for responses to these issues.
11:24 AM
I asked if these images were ever located in any other exam. He stated the falcon has been used in excess of 15 cases prior to this exam and these images were never found in the other cases.
11:25 AM
The E01 hash matches the original hash of the drive showing from the time the drive was originally hashed to the image creation, it was not altered.
11:26 AM
I suggested he contact the creators of the Falcon Imager and see if they documentation showing the validity of their tool.
11:26 AM
I suggested showing ongoing training practices for competency.
11:27 AM
Then I thought.......let the Discordians chime in....... AND GO!!!
Avatar
kmacdonald1565 3/4/2020 11:58 AM
On a serious note - as I understand viruses can stay on an object up to 9 days. So if you're working on cases that are older than maybe 20 days, you should be okay. Otherwise, gloves and masks, anti-bacterial wipes to wipe down the area etc.
@Pacman It depends on the virus. some can last longer too...looked into it previously. I feel like it is one of the hepatitises that it can survive a while...might need to be in damp environments though
12:04 PM
@sholmes i feel like even with the wiping and all that stuff, the hash matching is huge...if the attorney is saying a bad wipe caused the CP to be on the image from a previous case, the simple solution is to test write blockers (and show they have always worked if possible) and re-test the HDD from the exam. CP should still be there. now if the attorney was arguing the write blockers failed, that might be a different story. To me it just kind of sounds like a hailmary on that attorney's part.
Avatar
@kmacdonald1565 thanks I agree with retesting too. I suggested that as a means to show the machine is working currently. Hash match I thought should be huge as well. I do think it is a hailmary, which is why they are doing everything and anything to attach the examiners credibility as well as his tools. Hopefully Falcon folks can direct him to a resource which shows their tools validity, coupled with testing after the fact to show those images are not being transferred to any cases after this case, nor were they transferred to any case before this case, would help. The Prosecuting attorney should be able to rebutt with questions like this to show validity to the jury.
12:12 PM
I think they will argue without pretests, there is no way to show the write blockers worked.
Avatar
If you do the job correctly, your results are repeatable, reproducible, and defendable.
💯 1
Avatar
kmacdonald1565 3/4/2020 12:14 PM
@sholmes perhaps contact feds or local RCFL. they sometimes have stuff to show validation.
Avatar
I am not sure he has the evidence any longer. I think it was taken by the FBI for further investigation to try and crack the encryption.
Avatar
kmacdonald1565 3/4/2020 12:14 PM
ah
Avatar
Maybe they have an E01 which has hash
Avatar
Failure to use proper chain of custody? Since the original media should have been put away?
Avatar
COC is clean
12:15 PM
what do you mean put away? @vanquish
Avatar
Hopefully the Feds are working from an image
Avatar
Yes hopefully the FBI did (edited)
Avatar
I wouldn't be surprised to find data in unallocated space of an encrypted drive. Bit Locker asks if you want to encrypt just the allocated space...
Avatar
kmacdonald1565 3/4/2020 12:18 PM
the pretest hash is a bit of a crapshoot...yeah its nice because it shows that the software didn't change anything.... but the tool (write blocker) validation is more important. Showing that it cannot be changed is a more solid IMO. without the testing of the write blocker, the pre-test doesnt mean anything...and if the write blocker works, the pretest kind of doesnt matter at that point either.
12:18 PM
which i know doesnt help much
Avatar
@punacmc I was surpised when the examiner said they had unallocated. I didn't dig into that further. (edited)
12:19 PM
@kmacdonald1565 that is what I thought, but really wanted to see what everyone else thought as well. See if anyone has had this challenge before.
12:20 PM
@vanquish the examiner imaged the drive and only worked from his image, so I think that is what you were talking about. Which is why I say COC should be clean
12:22 PM
I don't have a falcon, but it is an imaging unit. Does anyone have one and if so how do you test them? I use tableau devices on a pc, so testing is pretty straight forward.
Avatar
I think I'm going to test out encrypting a drive, after using it and deleting some data. I'll use bitlocker to only encrypt the allocated data and see what I find...
Avatar
if you do, let us know what you find.
Avatar
Yea I was saying acquire the drive, but the original one in an evidence locker or safe. Then if any question, the judge can delay.
Avatar
I've got just the drive to try...
Avatar
@vanquish that makes sense. In this case the first examiner did image and secure the evidence. His examination was conducted only on his forensic image. Thanks for clarifying
Avatar
Oh OK sorry didn't read it correctly
Avatar
no worries. I could have left that out.
12:27 PM
I appreciate everyone's input. This has been helpful.
Avatar
Can someone shed some light on the Cellebrite "AppGenie" , I've seen it mentioned here and there in forms but have no clue what it does or information about it. @Cellebrite
Avatar
You can select specific apps and have the program check decoding, look for messages, locations, time stamps etc. (edited)
👍 1
Avatar
heatherDFIR 3/4/2020 1:15 PM
For App Genie - I should have a TipTues coming out on it in the next week or so! It is a research utility to dig further into apps that may contain the stuff @CLB-Paul mentioned. It can be run from the Tools menu or from App Insights. When run, it creates a new Genie model on the left tree that includes a category for location, chats, etc. It's pretty cool.
👍 3
Avatar
acoustic regard 3/4/2020 2:19 PM
hi, im trying to decrypt an encrypted file infected with jigsaw ransomware(it uses AES-CBC and I have the key and iv) anyone can help?
Avatar
forensicmike @Magnet 3/4/2020 2:22 PM
i can take a look @acoustic regard sending you a dm
Avatar
@DCSO really Nice feature, decoded some tiktok messages for me the last week 😊
👍 1
Avatar
@Cellebrite @Magnet Forensics @MSAB are there any plans on including the ability to concatenate the .exo video files? (Facebook Messenger)
Avatar
@Pacman It has been requested before but we have yet to investigate .exo files. I will updates our development team that this is still being requested!
Avatar
MrMacca (Allan Mc) 3/5/2020 5:06 AM
Does anyone know the average price of the ATOLA Taskforce?
Avatar
@Pacman checking for you
Avatar
Thank you @Erumaro and @Jamey
Avatar
Corellium announced the beta release of "Android for the iPhone" aka Project Sandcastle. What kind of forensic applications should we expect to see from this?
👀 2
Avatar
Looks interesting. I starred the Github.
Avatar
I'm fishing a test device out of storage as we speak 😄
7:06 AM
Got the chance to use Corellium back in December, excellent piece of kit
Avatar
I know right! It's really cool what they can do already.
7:13 AM
Especially at a larger scale. I'm surprised they haven't launched a digital academy yet. With what they can do they could be the first to have on-demand mobile forensics training.
Avatar
When it comes to iOS forensics, I agree that it would be interesting as the basis of a training platform
👍 1
Avatar
They could mock up what TryHackMe does, with "rooms" you enter to spin up various iPhones and a list of tasks to do on them.
Avatar
𝕸𝖆𝖘𝖙𝖊𝖗 𝕻𝖆𝖎𝖓 𝕭𝕸𝕱 3/5/2020 1:14 PM
I need some assistance:
  • FTK Disk Imager
  • $MFT Analyzation
  • LCN/VCN Mapping
I am trying to figure out, how to follow LCN/VCNs for non-resident data. Does anyone have a good reference source, because the YT videos I have found and watched, are not explaining how they move from one sector to the next using the line of bytes.
Avatar
Joe Schmoe 3/5/2020 4:35 PM
Run lists keep track of the clusters in a fragmented file. Breaking down what each number in the run list does is too complicated to type in a phone, but the concept is that the first run list gives you your starting point and how long the cluster run is. The second run list gives you your next block of clusters, but it is relative to the starting cluster. For example if your starting cluster is 100 and your next cluster block is 140, the LCN for your second cluster group is 239 (100+240-1). If there is a third run list, the starting cluster is relative to the second.
4:36 PM
Hopefully I explained that right.
Avatar
I’m in search of a replacement battery for a Nintendo Switch Lite. I did a breakdown today of the system and replaced the right joystick, but the battery was rendered useless in the process. I can’t find anywhere online that sells the OEM Nintendo battery. I’m hoping someone can point me in the direction of a comparable/compatible option. The repair was for my friend’s son and I don’t want to let the little guy down. Any help is appreciated. Specs are “HDH-003 battery for Nintendo Switch Lite (HDH-001) - 3570mAh / 3.8V / 13.6WH / Li-Ion” (edited)
Avatar
I wonder if a store like batteries plus could manufacture one
Avatar
CLB-arjotyo 3/6/2020 2:22 AM
@f0r3n5ix_ I see them on Amazon's Japan website. PM me if you need some assistance.
Avatar
@f0r3n5ix_ See if you can get a damaged switch for spares or repairs on Ebay?
Avatar
The 18650 battery is a 3.7V li-ion battery and is anywhere betwen 3200 - 5000 mAh battery and will work for short term fix not sure how it would look though. the mAh will not matter as it is just how much storage the battery will hold not output to the device so you could order any. Hope this helps.
8:56 AM
@f0r3n5ix_
8:57 AM
Shop our wide selection of GENUINE 18650 Batteries from LG, Samsung, Sony, Murata, Molicel, Panasonic, Nitecore, Sanyo, MXJO, Imren and more. We offer the lowest pricing and widest selection of genuine lithium ion rechargeable 18650 cells.
8:57 AM
You can find all over Amazon and locally I am sure
9:01 AM
here is your conversion table to see which version of the battery you need. https://convert-formula.com/ah-wh
Convert Amp hour to Watt hour (Ah to Wh)
9:07 AM
13.6WH is equal to the 3570 mAh so this appears to be your winner https://www.18650batterystore.com/product-p/lg-mj1-18650-batteries.htm
Shop our store now for the LG MJ1 18650 Battery and more. We offer the widest selection of 18650 batteries. With a 10A discharge, the LG MJ1 is a Li-ion battery with strong current and stable performance. This newer model 18650 battery comes with 3500mAh capacity that will k...
Avatar
kmacdonald1565 3/6/2020 9:44 AM
if purchasing 18650s or any Li-Ion batteries, i recommend getting known ones/not cheaping out. if they are bad batteries they can be dangerous, ie those stupid hoverboard things that keep catching fire.
Avatar
good call
10:12 AM
These are recommended and are known good.
10:18 AM
I just opened my flashlight and this is what I have used for years
Avatar
if purchasing 18650s or any Li-Ion batteries, i recommend getting known ones/not cheaping out. if they are bad batteries they can be dangerous, ie those stupid hoverboard things that keep catching fire.
@kmacdonald1565 or vapes blowing up in people’s face
🚭 1
☁️ 1
😤 1
Avatar
very out of field question but does anyone have QRadar experience? Having issues hooking up a qflow colelctor to a console
Avatar
ix_V1ns_xi 3/7/2020 3:43 AM
Hey guys, I’m new to this group and wanted to first thank you for all the interesting topics you discuss. I have a question: in your opinion what are the most useful DF certifications to get in order to continue specializing in the field? I’m newly graduated and would like to continue working in this direction while I’m looking for a job.
Avatar
Andrew Rathbun 3/7/2020 4:37 AM
@ix_V1ns_xi it all depends on what you're looking to do but SANS likely has something for every possible answer you could give. However, SANS is extremely costly. We're talking $7K USD per course not counting any certification attempts.
4:38 AM
If you're looking into like pentesting, hacking, etc, there's plenty enough resources out there to get experience cheaply or free
Avatar
ix_V1ns_xi 3/7/2020 4:42 AM
Thanks @Andrew Rathbun I was thinking about the EnCase cert. I wonder if it’s worth
Avatar
Andrew Rathbun 3/7/2020 4:43 AM
Ehh, EnCase has lost relevancy in recent years due to the OpenText acquisition and lack of updates. I think you'd still learn a lot from doing the EnCE but I feel a lot of shops, both LE and private, are slowly moving away from EnCase unless they stage a comeback
4:43 AM
However, the EnCE will still likely get you past HR when applying places, so there's that
4:44 AM
Also, I'd recommend doing the CompTIA certs if you're looking for cheap-ish certs to help bolster your resume in the meantime
4:44 AM
Udemy courses go on sale all the time that can walk you through how to pass the exam. You shouldn't pay more than 10-12 bucks for a Udemy course unless it's a super specialized course
Avatar
ix_V1ns_xi 3/7/2020 4:50 AM
Ok thanks for the insight! I just would like to find one certifications that it’s most applicable across the board and not too specific. Almost a must have if you want to work in the field, that’s why I though of EnCe cert. I appreciate your thoughts on it. And yes I looked at CompTIA cert and thought about getting it since it’s relatively cheap and as you said it boosts your resume
Avatar
Andrew Rathbun 3/7/2020 4:50 AM
A+, Network+, and Security+, the trifecta
4:50 AM
should be a good base, from what I've read on Reddit
4:53 AM
and if you're going to pursue CompTIA certs, definitely follow r/comptia
4:54 AM
even though every thread is the same (i.e. hey I passed X cert, here's how I did it, or hey how do I pass X cert?)
4:54 AM
still a worthwhile follow at least until you get those certs behind you
Avatar
ix_V1ns_xi 3/7/2020 5:00 AM
Thanks!
Avatar
Have you seen or thought about the CCE cert from ISFCE? That’s a good one
👍 1
4:11 PM
Got some new stuff and old stuff for my Pelican Digital Forensics loudout. 10 port Industrial USB 3.0 Power Hub, USB C DVD Brunner, blank DvDs, USB flash card reader, USB 2.5 in enclosere, anti static bags, old Note 2nd and Note 4 I had laying around, and old 2.5 in drives.
4:12 PM
Inside the Pelican is the Tableau write blockers.
4:17 PM
Ok thanks for the insight! I just would like to find one certifications that it’s most applicable across the board and not too specific. Almost a must have if you want to work in the field, that’s why I though of EnCe cert. I appreciate your thoughts on it. And yes I looked at CompTIA cert and thought about getting it since it’s relatively cheap and as you said it boosts your resume
@ix_V1ns_xi unless you gain employment who would pay for the EnCE then its not open to the general public. I just started going through the classes and working towards the EnCE. I would suggest starting to read "File System Forensics" book you can find on Amazon. Check out podcasts like Digital Forensics Survival for example.
👍 1
Avatar
Andrew Rathbun 3/7/2020 4:18 PM
Also, subscribe to This Week in 4n6 or just pay attention to #this-week-in-4n6 and read the posts every week. New one should come out tonight, USA time
👍 1
Avatar
ix_V1ns_xi 3/7/2020 6:07 PM
Thanks @Everybody who gave me feedback! I actually have an interview coming up next Friday for a digital forensics analyst job and I’m pretty excited!
👍 2
Avatar
Udemy courses
During an interview I had, I was told they encouraged employees to purchase those courses and even offered stipends for them. I found that really amazing and hope to see more companies taking that approach.
Avatar
ix_V1ns_xi 3/7/2020 6:09 PM
I’m curious to know what the most common technical questions to a job in the field come up during an interview. If any of you would like to share I’d appreciate so I could better prepare.
Avatar
@ix_V1ns_xi DM I can set up a mock tech interview with my team this week for you
💯 1
Avatar
People actually pay for uDemy courses? Lol kidding
Avatar
Andrew Rathbun 3/8/2020 1:22 AM
Stipends? For Udemy courses? That implies that they're paying full price for them. Never pay full price for a Udemy course lol
Avatar
I was hoping they just meant the $12 ones
9:42 AM
It isn't really bad at first but if you keep getting courses it can add up
9:42 AM
Just like with my book list
9:44 AM
Free courses
Avatar
Andrew Rathbun 3/8/2020 9:44 AM
@DFIRDiva
Avatar
Didn't know she was in here.
9:45 AM
She is on my LinkedIn
Avatar
FTK = For The King
10:50 AM
I tried streaming FTK(lab for this class) and it's completely fubar'd haha
Avatar
I just added a couple more to that list 🙂
👍 1
Avatar
Andrew Rathbun 3/8/2020 1:09 PM
@DFIRDiva FYI for Splunk Fundamentals Pt 1, https://workplus.splunk.com/veterans
1:09 PM
for Veterans only, Part 1 and 2 free
1:09 PM
I took Part 1 through this program 👍
Avatar
@Andrew Rathbun Awesome, thanks! I'll add that now.
Avatar
Andrew Rathbun 3/8/2020 1:10 PM
Also, I just sent you a LinkedIn connect
Avatar
@Andrew Rathbun Thanks 🙂
Avatar
I should add, if you're university is part of the splunk4good program, you also get Part 1 and 2 free
2:14 PM
part 1 was always free
2:15 PM
I just did this for our uni a week ago
2:15 PM
I can connect someone with our SLED/Higher Ed rep but I think they'd just point you to the online form they have :/
2:16 PM
(I know being in uni is prolly a small subset of this group but might be helpful to someone)
Avatar
@Turb0Yoda Good info! Thanks!
mochaThumbsUp 1
Avatar
I thought Elastic Stack is the cool thing kids use now? Not Spunk.
Avatar
Idk about ELK, but I can say... I thought QRadar was bad to work with? LogR is worse
3:02 PM
ELK has it's place
Avatar
@Turb0Yoda rboYoda Imagine you worked in ArcSight support for 3 years like I did.
Avatar
Oh
4:04 PM
I'm sorry
Avatar
Lol
Avatar
Dr. Kaan Gündüz 3/9/2020 1:29 AM
Though I wouldn't call myself a dd expert, I have had my fair share of occasions to yield the might that is dd. From my first job after college using KNOPPIX and dd to rescue NFL game footage from dying HDDs on behalf of NFL video coordinators, to using dd...
👍 1
Avatar
anything to reset a windows 10 (i believe local) password on a hard drive (doesnt have to be forensically sound)
Avatar
Does the copying / renaming stickykeys to cmd still work in Windows 10? That was my normal method back in the day via a recovery disc
Avatar
anything to reset a windows 10 (i believe local) password on a hard drive (doesnt have to be forensically sound)
@RP which password? The login password or BitLocker key? Lots of Offensive Security ways to get the key when you have physical access.
Avatar
I think hirens was spiritually replaced by... Medicat?
7:40 AM
[ATTACH] ✔ Project is still active. ✔ This project is absolutely free to use; I do not charge anything for MediCat USB. ✔ The full MediCat USB aims...
👍 1
7:41 AM
(and in between there was falcon four)
Avatar
Just wondering, what resources tools do you all use when (possibly) dealing with (mobile) stalkerware? I havnt really dealth with of yet but saw this presentation on TED this week (https://www.ted.com/talks/eva_galperin_what_you_need_to_know_about_stalkerware?language=en) and wanted to learn / be prepared... (edited)
"Full access to a person's phone is the next best thing to full access to a person's mind," says cybersecurity expert Eva Galperin. In an urgent talk, she describes the emerging danger of stalkerware -- software designed to spy on someone by gaining access to their devices wit...
Avatar
forensicmike @Magnet 3/9/2020 3:55 PM
https://ivrodriguez.com/analyzing-ios-stalkerware-apps/ and other posts by Ivan are fantastic.
Stalkerware (a.k.a. Spouseware) applications are invasive applications that an individual installs on a target's device (usually their partner) to spy on them, snooping in as much data as they can. They aim to collect phone calls history, private messages, location data, brows...
Avatar
So i am going on interview on soc analyst level 1. I am fresh grad. Quiet nervous because its my gonna be my 1st job in security. Any tips?
6:15 PM
Reference a previous conversation about cyber security case law. This might be helpful
Avatar
@Andrew Rathbun thanks! Seems to be geared toward network. Keep me in mind if you run into US Supreme Court cases regarding mobile device extractions. I’m trying to put something together.
Avatar
@ned7778 From what I've heard from hiring managers, be sure to ask questions. I get so nervous during interviews that my mind will go blank, so I research the company and bring questions that I previously wrote down. Also, if you have a home lab, bring that up during the interview.
👍 1
Avatar
So i am going on interview on soc analyst level 1. I am fresh grad. Quiet nervous because its my gonna be my 1st job in security. Any tips?
@ned7778 I would study this pdf 200 Cybersecurty questions https://drive.google.com/file/d/1gyXcyIE239REKiB1bIXIhBk_vghIsIm3/view?usp=drivesdk
👌 1
Avatar
https://ivrodriguez.com/analyzing-ios-stalkerware-apps/ and other posts by Ivan are fantastic.
@forensicmike @Magnet thanks Mike
Stalkerware (a.k.a. Spouseware) applications are invasive applications that an individual installs on a target's device (usually their partner) to spy on them, snooping in as much data as they can. They aim to collect phone calls history, private messages, location data, brows...
👍 1
Avatar
Jack of Trades 3/10/2020 8:46 AM
Anyone here familiar with Authz logon process?
Avatar
Does anyone know any Windows VM fully customized VM to do windows forensics training?
Avatar
What are you after? A VM with forensic tools that you can do analysis with, or a VM setup with test data etc that you can image and forensically examine? @r3nzsec
Avatar
A VM with forensic tools that you can do analysis with @K23
Avatar
Can find a load of options for linux but nothing that's windows. Unless you wanted to build your own enviroment using something like WindowsFE, although that's meant a lot more as a live CD to boot on a suspects machine than to be installed / used within a VM
💯 1
Avatar
DFRWS EU 2020 postponed due to COVID-19 😢
Avatar
Think a lot are going to go that way unfortunately for anything involving large crowds. I'm just hoping Sarecens vs Quins at Tottenham doesn't get postponed like the 6 nations games...
👍 1
Avatar
Seems like ICDDF will still go ahead next week though, so fingers crossed
👍 2
Avatar
@Magnet Forensics Is it possible to get a link for the AXIOM ICDDF materials for next week please? I've requested access to the Google Drive share, but can't do it from my work address as it's not linked to Google
Avatar
DeeFIR 🇦🇺 3/11/2020 4:25 AM
Does anyone know any Windows VM fully customized VM to do windows forensics training?
@r3nzsec Commando VM from FireEye would be a start
👍 1
💯 1
Avatar
FYI.....
Avatar
Configuration files for the SOF-ELK VM, used in SANS FOR572 - philhagen/sof-elk
5:08 AM
SOF-ELK® is a “big data analytics” platform focused on the typical needs of computer forensic investigators/analysts and information security operations personnel.
Avatar
@Colman Looks interesting. Been playing a bit with nethunter but the GUI is a pain, maybe this will solve that
👍 1
Avatar
@Qdos you should be good now correct?
Avatar
@Jamey All sorted - have got the link to the lab files. Thanks very much!
Avatar
I am looking for some ideas for a forensic workstation. I would like to disable all internet access on the bare hardware, but have internet access in Vmware. I also need to access internal file shares and internal network resources from the host/bare hardware. Anyone offer some suggestions on firewall settings, etc. I know this is not as good as an air gapped box, but I'm trying to mitigate my exposure.
Avatar
@Mig as far as bare hardware, do you want to just disable internet access? is it ok if it accesses your LAN? possibly stupid question
Avatar
DeeFIR 🇦🇺 3/11/2020 7:07 PM
I think you're better off putting a firewall on the border of your VM environment to restrict egress traffic but to permit internal LAN traffic.. what resources do you have access to? is this a VM cluster?
Avatar
that's the real first question. vmware esxi? workstation?
7:18 PM
i assumed workstation
Avatar
I'd be tempted to stick another NIC in. Have one NIC for bare / LAN and another NIC with internet connection that is physically shared to the VM, so the host doesn't have access to it. Sure you can do that with one NIC via software but personally for something like this i'd want better separation. As others have said though a firewall will be a necessity here, either in a VM or a physical device. Depends what level of separation you want.
Avatar
Dr. Kaan Gündüz 3/12/2020 1:27 AM
I'd consider using a proxy server for internet
Avatar
@Mig as far as bare hardware, do you want to just disable internet access? is it ok if it accesses your LAN? possibly stupid question
@suckit yes, it would be ok for the host to access LAN resources, nothing for the internet.
1:53 AM
VMware would be on a workstation and the host would run forensic tools. VMware would be used for internet access for research, email etc. the idea would be to add a layer of protection for the host.
Avatar
Honestly if the only reason you need the VM is for research I'd strongly consider getting a separate laptop for that kind of thing. The risk of cross contamination from the net if your firewall etc is not set up correctly is pretty high, but I guess that all depends on your departments policies for these types of things. We have three computers effectively in our unit: Our police terminal, Our Forensic workstation which is on an "air-gapped" network, so no internet there, and research laptops on a separate network
Avatar
Andrew Rathbun 3/12/2020 6:04 AM
They've been pushing out a lot of updates to that lately, that's good!
👀 1
Avatar
Is anyone having major issues with @Cellebrite PAS files not opening correctly? We have had at least five cases lately which are not opening PAS files. One case had 4 phones in one PA session and we were told not to do that any longer. We have not moved the folders to new locations and then opened them. We have begun naming our PAS files different names after every save (ie. Save1.pas, Save2.pas, etc). Trying to load any of the saved PAS files for the case gives the same error which states "This session file was saved from another dump." At this point we have lost major work on numerous cases and I am wondering if it is something on our end or if others are seeing this issue. The version of PA is 7.29.0.152. We will be updating to the newest now that this last one failed.
👍 1
Avatar
CLB - DavidK 3/12/2020 6:53 AM
@sholmes Please let me know how it goes after the update
Avatar
@CLB - DavidK I sure will.
6:57 AM
All the changes listed were based upon suggestions from the calls to tech support.
Avatar
FYI @Law Enforcement [UK]: ICDDF has been cancelled
😷 3
Avatar
Beno 🇬🇧 3/12/2020 6:59 AM
I was hoping for a corona party
😆 6
Avatar
Ah shame, I was just about to sort the PO
Avatar
Have the non refundable hotels booked! May just go for a jolly in Heathrow anyway
🤔 1
Avatar
Control-F CON 2020? 😅
Avatar
Just bring Kev's CC and we'll be fine
😆 2
Avatar
Sounds like they're aiming to reschedule later in the year. Hopefully this will all have blown over by then, I owe a few people beer (and am owed a few myself!!!)
Avatar
Waiting to see if EnFuse conference is cancelled. Or maybe it already was.
Avatar
kmacdonald1565 3/12/2020 7:08 AM
honestly, kind of surprised that more trainings havent been canceled yet. my county canceled all out of non-essential work related travel (conferences, seminars, etc.). we are waiting on clarification to see if trainings and/or law enforcement are under that ruling.
Avatar
it's all good fun isn't it
Avatar
kmacdonald1565 3/12/2020 7:17 AM
it really hasnt affected me yet. i still always wash my hands and all. lol. im still going on vacation. its not to be taken lightly, but i feel like its well blown out of proportion.
7:18 AM
the news has been saying we should be seeking social isolation to prevent the spread....i have been preparing for that my whole life
😄 4
👍 1
Avatar
I'm supposed to be going on holiday to Vietnam in a few weeks. They've stopped visa waivers and processing new visas. Waiting to see if ours get revoked. From hearing others stories it sounds like if someone has it on the plane, then there's a high chance everyone on the plane will be put into isolation for 14 days which would definitely ruin the holiday. Still, that's second week of April and we are still a way off that. A lot will change between now and then
😢 1
Avatar
@OllieD ICDDF?
7:21 AM
Check it out when it's rescheduled, awesome event to go to
Avatar
Gotcha fanks
Avatar
chrisforensic 3/12/2020 7:22 AM
@kmacdonald1565 yes, DIC in Vienna/Austria was cancelled too 😩 https://www.digitalinvestigationsconference.ch/vienna/
Digital Investigations Conference
Avatar
The awards ceremony on the website is a small part of it. It's a closed LE event (+ vendors of course), so reach out when it's rescheduled for details
7:27 AM
I'm supposed to be going on holiday to Vietnam in a few weeks. They've stopped visa waivers and processing new visas. Waiting to see if ours get revoked. From hearing others stories it sounds like if someone has it on the plane, then there's a high chance everyone on the plane will be put into isolation for 14 days which would definitely ruin the holiday. Still, that's second week of April and we are still a way off that. A lot will change between now and then
@K23 A mate of mine is quarantined in Vietnam as we speak as a passenger on his flight tested positive
Avatar
#sans-dfir have just cancelled courses in London, UK next week. FOR498 course. I assume other courses too. (edited)
Avatar
@K23 A mate of mine is quarantined in Vietnam as we speak as a passenger on his flight tested positive
@OllieD That's a bummer. Hope they manage to get out / get on with what they were doing soon as. Apparently someone just heard on the radio that flights to Vietnam are being cancelled right now. Haven't had confirmation from my airline yet
7:43 AM
can't it just blow over already
Avatar
@CLB - DavidK After the update we still got the same issue with PAS not able to be opened by PA.
Avatar
I'm just hoping my Magnet course is still happening🤞
Avatar
Are new uninitialized disks typically zeroed out if viewed in a hex editor? I have a drive that is showing random data but was found sealed in a faraday bag. I manually confirmed that there isn't a boot record at the head of the disk. I am pretty sure it's factory new, but maybe I should try carving it ?
Avatar
@CLB - DavidK After the update we still got the same issue with PAS not able to be opened by PA.
@sholmes Got hit by that too annoyingly. I understand why it happens, as the different versions decode a slightly different amount of data which I'm assuming causes it to error. It's just incredibly frustrating. I ended up having to roll back to 7.29 on several cases and have 7.30 in a VM where needed
Avatar
@K23 we didn't change versions in the middle of the case. This was just a reboot and reload of the case after reboot.
7:52 AM
We updated PA after the pas failed again.
7:52 AM
as a last ditch effort before cussing a lot and rebookmarking a few hours worth of crap
Avatar
@K23 we didn't change versions in the middle of the case. This was just a reboot and reload of the case after reboot.
@sholmes Gotcha, just re-read your first message. I got hit with that as well on 7.29, multiple times in our office. Had officers come in to review data and had to re-do work. This was on PA and UFED Reader
7:53 AM
Ticket was raised with Cellebrite, no solution was found. Think one of the .PAS files ended up being around 300mb which clearly wasn't right, that was on a Google Takeout file job. Wasted about 8 hours of officer time
Avatar
dang that sucks
7:54 AM
ours wasn't with reader, just PA.
7:54 AM
But we did open tickets
Avatar
@DigiFi I don't think brand new disks come zeroe'd
7:54 AM
unless they actively use that low level format pattern
Avatar
That one was reader, but we've had same issue with PA.
Avatar
I'd say carve it anyway, it might've just wiped the boot sectors or sommink
Avatar
Got into the habit now of generating a fresh UFDR every time someone finishes reviewing. Massively time consuming but at least it saves the tags / bookmarks etc (edited)
Avatar
Thanks Cap'N
Avatar
@Stevie_C is well versed in this issue too I believe @sholmes. No solutions though as far as I'm aware
Avatar
Thanks @K23 I thought I remembered seeing he had an issue as well. I did a quick search and didn't see anything quickly so thought I would post.
👍 1
Avatar
what brand is the drive
Avatar
I'm just hoping my Magnet course is still happening🤞
@Muad'dib is yours next week AX250 ?
Avatar
Week after
Avatar
@Muad'dib yeah that's what I meant the week after, not next week.
Avatar
Then yep
Avatar
@Law Enforcement [UK] Hey all, what matrix are you currently using for accepting / rejecting phone examination requests?
Avatar
Does anyone have a cheat sheet for the use of checkm8 ? Which models work and at what iOS ? If so can you PM me please.
Avatar
checkm8 supports devices between the A5 and A11 chips (inclusive)
Avatar
@OllieD so regardless of the iOS its more of a hardware exploit ?
Avatar
checkm8 is hardware based, yes. checkra1n has some iOS constraints due to minor changes, but no iOS change will be able to patch out the exploit permanently. Wouldn't be surprised if 4PC also encounters some failures with new iOS releases as they come out, but same principle applies in terms of it not being patchable
10:02 AM
If you're looking for what specific combination of model and iOS does 4PC support, I'm afraid I don't know
👍 1
Avatar
First death in Georgia just now. A 67 year old man who got the virus on March 3rd.
Avatar
Does anyone have a cheat sheet for the use of checkm8 ? Which models work and at what iOS ? If so can you PM me please.
@DCSO I've just used the cellebrite blog post for rough guidelines. https://www.cellebrite.com/en/blog/a-practical-guide-to-checkm8/
It’s been almost three and half months since independent researcher axi0mX has made public the groundbreaking “checkm8” exploit. Our recent blog, “iOS Breakthrough Enables Lawful Access for Full File System Extraction”, provided an introduction to the basics. In this blog, we’...
👍 2
Avatar
@wizrd08 This is perfect, just what i needed for a quick visual.
11:49 AM
Avatar
Anyone know where I can get sample Linux RAW images?
7:57 PM
Dont have my Mac and my work PC wont allow VMware
Avatar
DeeFIR 🇦🇺 3/12/2020 8:14 PM
For disks, or memdumps?
Avatar
Andrew Rathbun 3/12/2020 8:22 PM
@5cary might have an idea
Avatar
@DeeFIR 🇦🇺 Raw Linux file system using DD for example
8:29 PM
My poor MacBook Pro is in the shop because the battery started to bulge out.
Avatar
DeeFIR 🇦🇺 3/12/2020 8:32 PM
Ah yep. I don't have any Linux samples unfortunately. I could make one for you and scp to you if you'd like
Avatar
Naw thats ok. Thanks though.
8:33 PM
Trying to reproduce a Linux raw image acquisition
8:33 PM
Says he used "The Amazon Linux AMI is a supported and maintained Linux image provided by Amazon Web Services for use on Amazon Elastic Compute Cloud (Amazon EC2). It is designed to provide a stable, secure, and high performance execution environment for applications running on Amazon EC2. It supports the latest EC2 instance type features and includes packages that enable easy integration with AWS. Amazon Web Services provides ongoing security and maintenance updates to all instances running the Amazon Linux AMI."
8:34 PM
The raw image shows the EXT4 file system correctly in FTK Imager but not EnCase Endpoint Investigator
8:35 PM
So not sure if Amazon is doing something different when the image is extracted from their cloud platform
Avatar
DeeFIR 🇦🇺 3/12/2020 8:35 PM
what version of EnCase? I don't personally use it.. does it support EXT4?
8:36 PM
Could you try mounting the image in FTK and reading it with EnCase?
Avatar
EI 8.11 yes EXT4 is supported
Avatar
DeeFIR 🇦🇺 3/12/2020 8:37 PM
Strange
Avatar
Here is the FTK screenshot of the raw image
8:37 PM
8:37 PM
Which you can see the root file system
Avatar
DeeFIR 🇦🇺 3/12/2020 8:37 PM
How does EI display it?
8:40 PM
Im just assuming is a bug in EI since FTK Imager can read it fine
8:40 PM
I might try EI 7.X tomorrow
Avatar
DeeFIR 🇦🇺 3/12/2020 8:43 PM
I'm not sure tbh, I've only used EnCase with VMDK/NTFS and that was ~1 year ago.. sorry I can't be of more help
Avatar
No problem thanks
8:44 PM
--disk-image-format (string) The disk image format.Possible values: VMDK RAW VHD
8:44 PM
Guess thats how the guy exported it. So I assume Amazon magic behind the scenese
8:44 PM
*scenes
Avatar
@DeeFIR 🇦🇺 Forgot about the CFReDS project. I get DD images from the "Data Leakage" sample https://www.cfreds.nist.gov/data_leakage_case/data-leakage-case.html
Avatar
DeeFIR 🇦🇺 3/12/2020 9:39 PM
@DeeFIR 🇦🇺 Forgot about the CFReDS project. I get DD images from the "Data Leakage" sample https://www.cfreds.nist.gov/data_leakage_case/data-leakage-case.html
@vanquish Ah nice. Thanks!
👍 1
Avatar
@DeeFIR 🇦🇺 Disk View for the Data Leakage Case works just fine in EI 8.11
9:53 PM
Avatar
DeeFIR 🇦🇺 3/12/2020 9:53 PM
That's NTFS though
Avatar
Oh yea duh getting later better go to bed lol
Avatar
DeeFIR 🇦🇺 3/12/2020 9:56 PM
Haha. Yeah it's 3.25PM here, been a long day.. I'd like a beer and a nap
9:56 PM
🍺
Avatar
@vanquish There are a couple of Linux dd images at LinuxLEO.com (Able2 and Able3 are ext2/4 dd images) Look under supplemental files in the left column. (edited)
Avatar
@5cary Great thanks!
Avatar
@5cary @DeeFIR 🇦🇺 This LinuxLeo RAW image with EX4 works just fine.
👍 1
Avatar
@vanquish 👍
Avatar
Andrew Rathbun 3/13/2020 10:25 AM
If anyone uses CyberChef for anything, just know that updates are constantly being pushed to it. So if you use an offline copy of it, be sure to update it every now and then - https://github.com/gchq/CyberChef
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis - gchq/CyberChef
👍 5
Avatar
I dont see a spot for this but does anyone have a link to best practices for acquiring / seizing a Google Home / iot devices?
Avatar
Anybody used "DataPilot 10" who can share their experience or opinion of it?
Avatar
Deleted User 3/16/2020 3:11 AM
CAINE Computer Aided INvestigative Environment Live CD/DVD, computer forensics, digital forensics
3:11 AM
guys nice ubuntu based distro for forensics
Avatar
Use the search box before sharing resources please, a lot of this stuff will have been shared before
3:12 AM
Also, there's a #computer-forensics channel where that would be a better fit anyway
Avatar
Deleted User 3/16/2020 3:16 AM
#search-box
3:17 AM
hmm?
3:17 AM
oh u mean that one
3:17 AM
aight
Avatar
I rather have something posted twice, i missed this one @Deleted User
Avatar
Deleted User 3/16/2020 6:28 AM
Guys I found this awesome channel on telegram which shares threat intel, IOC, threat hunting and blue team related stuff! check it out! https://t.me/blueteamzone
Blue team zone Semi-automated news, IOCs, malware from various feeds. Tips and techniques for blue teamers. Mainly focused on threat intelligence, malware analysis, incident response, python and Digital forensics https://t.me/blueteamzone @blueteamzone
Avatar
A general question - each devices store timestamps in certain formats (unix epoch, Big Endian, Little Endian, MAC etc), is there a way of identifying what timestamp the device is using? Or is there a rule of thumb when it comes to certain devices/applications?
Avatar
@vanquish whats security blue team?
Avatar
@florus Its Blue Team vs Red Team SOC stuff
9:04 AM
FYI if anyone tries to acquire SSD's using EnCase with FastBloc write blocker, you will need to use this encloure to work with FastBloc to get the SSD to show up as write blocked. https://www.amazon.com/Sabrent-Tool-free-Enclosure-Optimized-EC-UASP/dp/B00OJ3UJ2S/ref=sr_1_1?keywords=Sabrent+2.5-Inch+SATA+to+USB+3.0+Tool-free+External+Hard+Drive+Enclosure&qid=1584374550&s=electronics&sr=1-1
9:04 AM
FYI if anyone tries to acquire SSD's using EnCase with FastBloc write blocker, you will need to use this encloure to work with FastBloc to get the SSD to show up as write blocked. Sabrent 2.5-Inch SATA to USB 3.0 Tool-Free External Hard Drive Enclosure [Optimized for SSD, Support UASP SATA IIIhttps://www.amazon.com/Sabrent-Tool-free-Enclosure-Optimized-EC-UASP/dp/B00OJ3UJ2S/ref=sr_1_1?keywords=Sabrent+2.5-Inch+SATA+to+USB+3.0+Tool-free+External+Hard+Drive+Enclosure&qid=1584374550&s=electronics&sr=1-1
@vanquish
Avatar
GadgetryTech 3/16/2020 11:26 AM
Hi guys, I put in a purchase request for the Digital Intelligience Ultra Bay 4 Portable (https://digitalintelligence.com/store/products/ultra-bay-4-portable?taxon_id=22#) to start my first forensics case on a Dell NVME SSD. Do you think if I use FTK I should be good to go or are there any gotchas I should know about? I usually work in incident response but we had our first forensics issue and wanted to keep it in house so the tagged me for the job.
Avatar
@GadgetryTech Which product of FTK? The free one or the full version?
Avatar
GadgetryTech 3/16/2020 11:51 AM
Starting with free. Really just trying to clone the original nvme onto a different drive so I can do file analysis on the copy.
11:54 AM
Chapter 5
Avatar
GadgetryTech 3/16/2020 11:56 AM
Raw is recommended correct? We bought a drive just for the duplication effort so the capacity isn't an issue
11:57 AM
You can move the Raw image to another device and mount it in Linux.
11:57 AM
Otherwise pay money for the vendor tools
Avatar
GadgetryTech 3/16/2020 11:58 AM
Ok cool. Thank you. I'm all for purchasing premium products if need be. Getting my company to sign off on it is another argument. Because this is our first data forensics issue they are starting small. Hopefully this opens the door to new opportunities though.
Avatar
Depends on how fast you need the analysis and reports?
12:00 PM
Hacking, data loss, CP, IR?
12:00 PM
Otherwise you get to spend lots of time looking through the file system
12:01 PM
I work in EnCase software support, so I cant say buy EnCase. But lots of other vendors out there to consider.
Avatar
GadgetryTech 3/16/2020 12:01 PM
Right now it's more of a question mark if the person was working multiple companies for monetary reasons or if foreign travel history/citizenship has additional roles here.
Avatar
Ok so thats a good start to dig into Outlook PST files and text files
12:02 PM
Free tools for parsing PST files im sure
Avatar
GadgetryTech 3/16/2020 12:03 PM
I have a dump of the pst already due to our cloud infrastructure. Nothing questionable there. Looking more for local history outside of our vpn/cloud environments
12:03 PM
I went through every message since date of hire. Employee was with company for only a few months and didn't really engage with anyone much so luckily it only took a day haha
👍 1
Avatar
First thing that legal and courts will want to know, is it forensically sound? Aka, did you use a write blocker and put the drive somewhere secure?
Avatar
GadgetryTech 3/16/2020 12:05 PM
We are buying the $1700 write blocker I provided a link for above for the NVME clone. I haven't removed it from the laptop yet. Waiting for the hardware to show up but beginning to document/prepare my analysis
Avatar
Right just saying
12:06 PM
Sounds like fun on the user side.
Avatar
GadgetryTech 3/16/2020 12:07 PM
Ah gotcha. Yeah that part I was area of. We know of general requirements but haven't had to do one internally before. If I could share how many crazy things I found on this person through OSINT I would. It's been a very interesting effort to say the least.
Avatar
Yes everyone thinks they are safe on the Internet
Avatar
GadgetryTech 3/16/2020 12:09 PM
It's comical
12:09 PM
All you need is one little link and it spawns from there. Web/cyber activity is what our team is good at so at least we have that down. Just need to cover my bases for local data collection and we'll be good to go.
12:09 PM
Anyway, thanks for the tips.
👍 1
Avatar
I wish OpenText would quit cancelling training classes. Makes me depressed.
12:12 PM
But I guess its the bat/snake virus
Avatar
Pretendigator 3/17/2020 3:48 AM
Are their any scripts or a setting in griffeye I can use to search for similarity of a portion of an image? I.e it would be helpful for me to pull out every image that has the 'omegle' logo in the corner however the standard similarity search in griffeye is too broad
Avatar
@Pretendigator You will need pro license for that. Unless you can import a cut out section of the logo import and right click similarity search on that. I have the same quiery with a job coming up.
Avatar
Pretendigator 3/17/2020 4:57 AM
smashing idea @Dfdan I forgot you can import external images, ill give it a go now and let you know if its worth doing
5:00 AM
it seems to just find similar colours, ran it with a search just using the omegle.com logo and then had it as the logo in the bottom right of a big black square (edited)
Avatar
@Pretendigator have you got the original images or just distributed ones. Any metadata you can filter on. e.g edited with Photoshop (edited)
Avatar
Pretendigator 3/17/2020 5:38 AM
almost all of the images are from chrome cache etc, so far i've been identifying them by filtering on the web pages they've come from but this method is only going to help me find the omegle images for urls that have already been identified and we may miss a few etc. (the fact images are from omegle is relevant to the case, hence why trying to collect all of them)
Avatar
Does anyone have documentation on how cellebrite’s malware scanner works?
Avatar
Dumb question - Samsung J2 running Android 8.1 Can't find IMEI - what are the possible locations where the device's IMEI is stored?
9:58 AM
Found it in EFS partition within file 'SVC'!
Avatar
I'm trying to navigate iCloud photo syncing... is there a good guide somewhere to show me what situations produce what results? I'm dealing with a mix of jpg, heic and png, some of which is present in both DCIM as well as CPL. Trying to figure out why some photos have metadata while others do not, why one format vs the other... trying not to take it at face value and make sure I'm interpreting it correctly. I'm setting up some test devices but I'm not really sure what scenarios to run it through.
Avatar
Exporting images from PA, import into Griffeye and then it reports corrupt xml. Seen this a while ago but can’t remember for the life of me what I did to fix it! Tried it on a different machine, tried moving the physical Bin file but no joy.
Avatar
It doesn’t happen to videos and if I export using the Project Vic export everything comes out fine but of course the dates and times are 01/01/0001
Avatar
Does anyone have a script that can decode Microsoft Outlook emails from com.microsoft.outlook/files/olmac/? A single file appears to be an email and there's over 4k files stored in this folder. EDIT: Moved this to #mobile-forensic-decoding (edited)
Avatar
Anyone know why Griffeye would be making an Archive folder within the root of the Griffeye case folder, then displaying it within the actual case?
Avatar
deepdive4n6 3/18/2020 12:40 PM
@3X3 If you have process archives selected, Griffeye will expand them in an Archive folder in the Case folder, then import into Griffeye.
12:41 PM
@3X3 In mine (19.4) the displayed path in Griffeye is where the archive is stored on disk.
👌 1
👍 1
Avatar
So I’ve got CSI Linux set up and the internet works even when I didn’t login to any internet in my area. Does anyone know why that is? (edited)
Avatar
@deepdive4n6 Thank- you! - I've told my colleague 😎
Avatar
@Tyføøn The VM is probably bridging its network connection to go through your host machine's connection. SO if your host computer is connected to the Internet, so too will your VM
👍 2
Avatar
Uggg I need to find good book on digital forensics in the cloud.
Avatar
Curiosity question - During this time is everyone just working form home? remoting in? VPN? Do you have more time to take virtual training? Don't want to use this venue as an advert, but just want to make sure everyone that is looking for training is able to find some virtually.
Avatar
We actually just bought online vendor specific training/certification testing for three of our examiners. This will give them something to do if we go in full lockdown. We do not remote in to work on cases, so prior to them approving some online training we grabbed a bag of test phones and starting prepping them to take home and start validating software and testing as a means to still work from home. I also suggested doing free online trainings and webinars if we are forever to telecommute.
7:01 PM
I also plan on testing a laser etcher to see how it can be used to perform chipoff or to clean microsd cards.
Avatar
remoteprocess 3/19/2020 11:10 PM
anyone know of a good cyber threat intel discord server that is controlling access like this one?
Avatar
Curiosity question - During this time is everyone just working form home? remoting in? VPN? Do you have more time to take virtual training? Don't want to use this venue as an advert, but just want to make sure everyone that is looking for training is able to find some virtually.
@Jamey Yes. Please do share couple of suggestions for Digital Forensics courses in virtual mode.
Avatar
@venkat we use @Magnet Forensics annual training pass which allows you to take their classes in person, as well as virtually or self paced online. If you do two classes it pays for itself. We love the training and platform. Especially during tight budgets and now with the lockdown.
magnetforensics_alt 5
Avatar
I'm putting together some free training now for you to attend to show you capabilities just watch here and I will post for sure. I just feel like we don't have time to waste as examiners and if we can help fill some of this time with training to make everyone more efficient not only in their tool, but in forensic topics as a whole and then we we do "return to normality", we will be more efficient and focused on the results. Thanks for the shout out @sholmes
👍 10
magnetforensics 1
6:39 AM
time is always of the essence. Too many bad guys not enough time!!!
👍 1
Avatar
Can anyone willing please DM me and share their search warrant template/exmaple that their agency uses for a Google user account? Our agency's template is a few years old, and I want to make sure we update it to include the correct verbiage to ensure are getting everything from Google.
Avatar
Andrew Rathbun 3/20/2020 10:26 AM
Legal Disclaimer The information listed below is purely informational in nature and not meant to be a substitute for legal advice. One should consult with their respective jurisdiction’s district attorney, prosecutor, judge, etc prior to using this language for any legal proce...
10:26 AM
here's some language I put together for SW's and Preservation Letters
Avatar
@Andrew Rathbun- thank you I did see this before posting the message. I was just hoping for a recent example that goes into more detail
Avatar
Andrew Rathbun 3/20/2020 10:36 AM
what services by Google are you specifically targeting?
Avatar
@renfantino coming your way
10:38 AM
in a DM
Avatar
What schools are you guys going to pursuing a degree in infosec or digital forensics? Also what is the title of your degree? I ask because previously it was common to see information systems security with different concentrations as the degree title but now a lot of schools just have the blanket "cybersecurity" as the new degree name.
Avatar
I did digital forensic investigation at the university of derby (UK). Helped me land a job in LE doing digital forensics, can't say the degree was the best though. Basically no coverage of mobile device, my prior background in IT support / Networking helped a lot. Most DFI stuff will be taught properly when you've started as each organisation likes to do thing a bit different and from my experience it's been very different in practice to what I was actually taught at University. So not having a lot of prior knowledge isn't necessarily a bad thing, but of course that depends on the company hiring. You've just got to show that you're willing to learn, have a very good attention to detail and can get your head around technical problems, adapting to overcome those hurdles with solutions instead of just going in with the attitude of "Well what I normally tried didn't work, now I'm stumped". Realised I didn't exactly help you there with your question. Basically what I'm saying is the name of the degree doesn't necessarily matter, as long as it's in the area of Computer Science you should be good to go! (edited)
👍 1
Avatar
@Cellebrite Not urgent at all - is there any way to edit interface themes once exported? If not is there one available that's a fully dark theme with dark windows where the content is shown and white text within that?
Avatar
Andrew Rathbun 3/23/2020 3:00 AM
@elem3nt no degree in anything tech for me
👍 1
Avatar
@elem3nt As K23 said, it's not necessarily about securing a DF degree. I come from a Computer Science background, definitely more about having an investigative mindset, being able to problem solve and having the want to learn new things everyday whether it be new devices coming in, new techniques etc. (edited)
👍 1
Avatar
elizavetabelkasoft 3/23/2020 9:38 AM
Hello, everybody. We want to share with you Brett Shaver's of DFIR Tools & Training review of full file system iOS acquisition with Belkasoft Evidence Center using checkm8 exploit. https://www.dfir.training/resources/blog-menu/dfir-training-blog/belkasoft-and-checkm8
When I first started examining smartphones (in a galaxy far, far away), there wasn’t much to it. For criminal investigations, it was more of the phone call logs and cell tower dumps that were important since not that much data was on the phones. Most ph
Avatar
I appreciate the knowledge. Always good to hear the path others have taken.
Avatar
Does anyone have the Legal or LE contact information for Telegram?
Avatar
Andrew Rathbun 3/24/2020 1:31 AM
@JSyber did you try Search.org?
1:31 AM
This section is a work in progress. This part of the site will contain template boilerplate language to include on various forms of legal process. It is highly advised to check with your local prosecutor and mind your local laws when serving legal process. These templates are ...
Avatar
@JSyber we don't have Telegram listed on the ISP List but here is their privacy policy telegram.org/privacy In it they say this: "8.3. Law Enforcement Authorities If Telegram receives a court order that confirms you're a terror suspect, we may disclose your IP address and phone number to the relevant authorities. So far, this has never happened. When it does, we will include it in a semiannual transparency report published at: https://t.me/transparency." I doubt you will get much assistance or compliance from them based on that. They do have an email though at abuse@telegram.org (edited)
Avatar
Thank you Laurenw!
Avatar
I have custom named directories inside of a .thumbnails directory on an android phone. User data/root/media/0/DCIM/.thumbnails/named folder
9:07 AM
Is there any system explanation for this? I can’t think of one
9:08 AM
As in, NOT user created. Trying to source a test android to try to make a directory there currently.
Avatar
Yes, you can create a folder there if you have a file browser that shows hidden files/folders
9:10 AM
At least, I was able to just now with my unrooted Huawei
💯 1
Avatar
I have a fresh android, messing around with it now. I see the .thumbnails is created automagically when photos are taken etc. thanks.
Avatar
@ProjectVIC - anyone available to help with a hubstream issue?
10:06 AM
I can't oh there's network forensics in the chat lol
Avatar
Yes that is happening right now!
Avatar
Disregard RE hubstream. I was having an issue where the application had been disabled by an administrator... except I never did any such thing. I ended up having to edit the prompting behavior for the clickonce trust prompt in my registry. For anyone else having a similar issue, this is the guide I followed. Worked like a charm.
10:21 AM
I'm sure it was a "feature" from a recent update that broke it.
Avatar
https://www.magnetforensics.com/blog/explore-magnet-forensics-training-from-home-with-virtual-instructor-led-and-online-self-paced-options/ In the Blog post mentioned here go down halfway until you see "Free AXIOM Interactive Training and click the link it is on April 1st from 1000 -1400 CDT
With customers’ and instructors’ health our priority, we have transitioned Classroom Instructor-Led sessions to Virtual Instructor-Led & Online Self-Paced.
1:52 PM
We really want to make sure we are here where we can be for everyone. Thanks all.
👍 1
Avatar
@heatherDFIR @Oscar @chiefcham @sholmes @K23 @Pretendigator @Natay @florus @DFIRDiva @๒ﻝѻɼก
👍 4
2:29 PM
@8kapileup
2:29 PM
@venkat
Avatar
@Jamey appreciate that! Will pass on to the rest of the team in NZ 🙏
Avatar
@Jamey Thank you!
Avatar
Anyone run across this application yet? https://apps.apple.com/us/app/crew-messaging-and-scheduling/id962124015 Working a case in regards to a Paramedic breaking into people houses for prescription medication. Apparently the application has a chat function and there is a belief that he is not the only suspect. Using PA 7.31 and the App Genie does not even want to acknowledge the application and there is not much in the database for information. just curious if anyone brought this up somewhere? @Cellebrite
‎Crew simplifies team communication. Managers and employees can create group messages, schedule shifts and assign tasks. Join for free. Use Crew to keep everyone on the same page with messaging, scheduling, file sharing, tasks and recognition in one place. Tens of thousands o...
Avatar
Pretendigator 3/24/2020 2:36 PM
@Jamey if this is an April fools... Thank you, looking forward to it
😂 1
Avatar
Funny no it is for real my friend
2:37 PM
that would be an epic April Fools day joke though
👍 1
Avatar
Pretendigator 3/24/2020 2:37 PM
Just had to be on April 1st ey!
Avatar
Well you know I hate Mondays...
2:39 PM
I think you ill like we do the training and then you download a case file and go work an exercise and then (Don't let this cat our of the bag) we are having a drawing for some SWAG for those who return on Friday with a completed case exercise and participate in the Q&A which you will get a link from when you attend the training.
Avatar
Pretendigator 3/24/2020 2:41 PM
@Jamey a lot of us will likely be working from home, is there a 'trial' version of axiom being made available for participants? (edited)
Avatar
of course
2:46 PM
would not ever give you a task without the ability to solve it...
👍 1
2:47 PM
😉
Avatar
CLB-TheGeckster 3/24/2020 3:56 PM
Anyone run across this application yet? https://apps.apple.com/us/app/crew-messaging-and-scheduling/id962124015 Working a case in regards to a Paramedic breaking into people houses for prescription medication. Apparently the application has a chat function and there is a belief that he is not the only suspect. Using PA 7.31 and the App Genie does not even want to acknowledge the application and there is not much in the database for information. just curious if anyone brought this up somewhere? @Cellebrite
@Bclark Good evening, I just downloaded this app, played with it for a bit, and dumped my phone. Really weird to say the least. That said, the chat data is all in a database named "crewData.Sqlite". The application name is group.inc.speramus.ios.crew. Everything is spread out in there, so you'll have to do quite a bit of table joining to really figure out who all is involved in a particular conversation. The conversations themselves are in the "Messages" table. And the content of those messages are in the data column in that table...stored in plist format. No clue why the app developer chose to do it that way. That should get you started in the right direction, but feel free to reach out if you have any other questions - I'll do my best to assist.
👍 2
3:58 PM
ok looking at it more I guess it's probably json format...it's just the way PA displays it is similar to how we display plists
Avatar
@CLB-TheGeckster still a little new to Jason formats and such. Is there reading material you can point me to to understand it a little better and do you think there is potential in recovering data from that application?
Avatar
@CLB-TheGeckster and still very, very, untrained in rearranging/recreating a database like that with tables and such. Need to have mrs. Megan make more youtube videos with detailed step by step how do so funky things like that...just a suggestion...and if they have been created...point me there please.
Avatar
CLB-TheGeckster 3/24/2020 5:27 PM
> @Bclark - I'll PM you
Avatar
WizardGoblin 3/24/2020 6:08 PM
Anyone happen to know if it’s possible to view older inbox and forwarding rules (which have been deleted) if I have global admin creds? Office 365
Avatar
DeeFIR 🇦🇺 3/24/2020 6:55 PM
@WizardGoblin how long have they been deleted?
Avatar
DeeFIR 🇦🇺 3/24/2020 7:02 PM
log into your security & compliance portal. Go back to the date when it occurred and see if artefacts exist. If it does, pull it all with powershell for greater verbosity
Avatar
@Bclark Regarding the App Genie, by default it's only enabled for apps that are identified in the communications categories. If your app is, for some reason, identified as a different category, you can enable App Genie for all categories in the PA Settings.
👍 1
Avatar
heatherDFIR 3/25/2020 8:40 AM
Starting Monday we (Cellebrite) will be hosting a DAILY LIVE webinar for you to escape isolation and collaborate! "Life Does Not Have a Ctrl+Alt+Del" will be the theme. Interactive, guest speakers, mini CTFs, etc. Link coming soon. I will be your host! We want to have fun. More details soon!
🤙🏽 7
Avatar
Is there a way to know on a locked Samsung whether it is FDE or FBE?
Avatar
what is the model ?
Avatar
An S9
Avatar
Anyone ever deal with Strong VPN and legal process?
9:40 AM
headquartered in Dallas TX, not sure what, if anything you could get from a VPN service with a warrant
Avatar
stock S9 is always FDE, can't be FBE @Aneesh96 (edited)
👍 1
Avatar
@sh4ka ahh ok, great thanks. For general interest, is there a way to know for Andorid if it is FDE or FBE if we dont know the password? (edited)
Avatar
Android OS that the device shipped will help in some cases. Android 10+ makes FBE compulsory for new devices
Avatar
CLB-TheGeckster 3/25/2020 9:54 AM
FBE devices don't have secure startup - you'll only see that on FDE phones. FBE acts more like an iphone, so when it is freshly booted, you won't have access to things like biometrics, camera, etc, until it's been unlocked once (BFU v. AFU, basically)
Avatar
Andrew Rathbun 3/25/2020 11:14 AM
We are about 10ish verified members away from 3000 with tomorrow being the 2 year anniversary of the server!
🤙 3
👍 4
🎂 1
Avatar
Mr. Eddie Vedder from Accounting 3/25/2020 12:07 PM
😄 3
12:07 PM
I sent out 2 invites earlier
Avatar
WOW that is really good and a testament to the way the server is being moderated y you guys as well as the users.
👍 2
Avatar
Our Premium and CAS solution provides support for #Android devices in many states. Make sure you understand the difference so you have the best chance at extracting the most data. Watch @HeatherMahalik show you how to. #TipTuesday https://t.co/INP7vM8Yws
👍 2
3:58 PM
Take a look at @heatherDFIR explanation of FBE v FDE. Can help you identify the devices.
Avatar
@CLB-Paul thanks for this. Never thought about the camera being available or the background side of it. Much appreciated!
Avatar
But keep in mind that if a device is Hot it will look different. If booting it up from cold state thats where the clear differences are.
cellebrite 3
4:03 PM
The shift we are seeing that many vendors are moving towards FBE.
Avatar
Andrew Rathbun 3/26/2020 6:23 AM
We are about 10ish verified members away from 3000 with tomorrow being the 2 year anniversary of the server!
@Andrew Rathbun we're about 5ish away from 3k verified
Avatar
For those working in NUIX and XRY keep your eyes on the upcoming XRY/XAMN release which will streamline the process and make it a lot easier to work with! For more information see https://events.nuix.com/webinars/nuix-and-msab-integration-transferring-mobile-data-has-never-been-easier (edited)
👍 1
Avatar
Had a paper sent out to AT&T regarding a mobile IP address... their response is that they don't maintain IP logs and have no idea who the account user is. Since when? Is there a magic phrase that needs to be uttered now?
😆 1
Avatar
That has been AT&T response for some time now and they don't care to change it, even if you have a IPV6. So if your a criminal get your self an AT&T line. @whee30
Avatar
@DCSO thanks. That’s really disappointing. I guess I’ve been pretty lucky to have Verizon a lot.
Avatar
Just saw the announcement on the 4:cast Awards. Thanks for getting the spelling and formatting correct and for not emailing me incessantly asking how you can win 😉
💯 1
Avatar
Trashboat667 3/27/2020 7:39 AM
Trying to do a MTK physical on a Stylo 4 boost. The USB config keeps switching back to charging only from MTP after I change it to MTP. The android version is 8.1.0 and the security patch is 2/1/2020. Thoughts? (edited)
Avatar
Trashboat667 3/27/2020 8:02 AM
Tried doing a decrypting boot loader with the MT6750 profile and no dice.
Avatar
Jack of Trades 3/27/2020 4:17 PM
Yes, hello
4:18 PM
Is this a good chat to talk about steganography? I'm working on a challenge and I'm stuck.
Avatar
Andrew Rathbun 3/27/2020 6:44 PM
@Jack of Trades #challenges-and-ctfs
Avatar
Andrew Rathbun 3/28/2020 6:34 AM
We have a #covid-19-threats channel that'll be around for the duration of the global pandemic
Avatar
Digitalferret 3/28/2020 11:33 AM
thanks. found it, moved.
Avatar
MrParanoid42 3/30/2020 12:55 AM
Do we have a channel set up to discuss policies? I don't see one but I feel that would be kind of a legit thing to have? Many of us deal with policies, would be neat to have a spot dedicated to those kinds of questions and info.
👍 1
Avatar
Andrew Rathbun 3/30/2020 3:43 AM
@MrParanoid42 this channel would suffice for that. All depends on demand for a channel like that. This server is community driven so I'll leave it up to your peers to drive that change
Avatar
RandyRanderson 3/30/2020 6:52 PM
@MrParanoid42 , great thought! I've been having to deal with BYOD stuff for the last couple years. Been very painful from a legal Hold perspective
Avatar
MrParanoid42 3/30/2020 6:53 PM
@RandyRanderson yeah I recently had to deal with GDPR restrictions and that was a whole new territory for me
Avatar
RandyRanderson 3/30/2020 6:54 PM
Been dealing with that myself -- well at least advising on some things
6:54 PM
EMEA loves to make it next to f'ing impossible to work with them from a cyber security standpoint lol
Avatar
MrParanoid42 3/30/2020 7:00 PM
Seriously. It was a huge issue for us. The DPO was saying we needed to be physically located to acquire the data. The GDPR lawyer said it could be done virtually and stored in a aws instance located in the EU... just a big cluster fck
Avatar
RandyRanderson 3/30/2020 8:13 PM
Yup -- same issues we are facing
8:14 PM
Our DPO lost their mind when they found out we were ingesting logs, like Proxy Logs and network share information for our Cloud Storage resource. Apparently that is all a no-no. So, no clue how they think we are going to be able to do any type of IR if something happens in those countries
Avatar
MrParanoid42 3/30/2020 9:43 PM
our DPO finally come to agreeing to letting us do it if we used jump boxes so the data never physically left the EU.
Avatar
return2zero 3/31/2020 5:50 AM
What tool/software do you folks use for generating job numbers, client info, staff assigned to the matter, job status etc? I've seen others in the private sector use everything from a spreadsheet to a simple access database.
Avatar
Like a case management system? This has been brought up a few times, if you search Case Management you will get some hits @return2zero https://discordapp.com/channels/427876741990711298/537760691302563843/586117076872069130
Avatar
Trashboat667 3/31/2020 12:21 PM
@sholmes the iPhone that was locked with a pin code and had a welcome screen had been reset. Still don’t understand why there would be a passcode after a reset. Only possibly I can think of is the passcode was added after the reset.
Avatar
I need to find a good Anti-Apple Inc Discord channel.
Avatar
@Trashboat667 dang that sucks
Avatar
I have a cellebrite download in a segmented .z01 format... how do I verify the sha256 in an application OTHER than PA? FTK imager isn’t detecting the segmented nature like it would with an e01, hasher of course only verifies single files... cellebrite says it verifies of course but I want to independently verify that.
Avatar
MrMacca (Allan Mc) 4/1/2020 1:47 AM
Remote desktop on windows 10 keeps freezing after maybe 2-5 minutes of usage. Does anyone know what might be causing this or a potential solution? Remote working is unusable at the moment as a result
Avatar
Anyone from @Cellebrite online?
Avatar
CLB-dan.techcrime 4/1/2020 4:31 AM
@Zhaan morning!
Avatar
@CLB-dan.techcrime good morning! Thanks Dan, but I think I have someone on the line from your gang already, cheers pal.
Avatar
CLB-dan.techcrime 4/1/2020 4:32 AM
Peace, be safe...
Avatar
Anyone have a plist viewer for Windows they like? I was going to use Xcode but I don't have a MAC and didn't want to spend the time building a VM just for that.
Avatar
Deleted User 4/1/2020 6:00 AM
Is a restarted Huawei/samsung FBE device always in COLD state before first unlock? Or is it possible to disable "secure boot" so it boots directly to HOT state? Does the phone change state from HOT to COLD state if its inactive for X amount of hours?
Avatar
Anyone happen to work for @SentinelOne having an issue with an agent and wont allow box to reconnect.
6:04 AM
disregard figured it out
Avatar
update on my segmented zip hashing problem, 7zip will detect the z01 as a segmented file and will reconstruct it but the resulting hash is different. Clearly @Cellebrite has some in-house method of reconstructing the files to hash them and I just don't know how to reproduce the process. I typically document an acquisition hash through PA at the outset of an examination and then re-hash the file(s) in an independent program at the end of the examination to show no changes. Of course PA will tell me the file is still verified but I like to spread that burden across tools in case PA's in-house hashing function ever starts to throw false positives.
Avatar
@Ghosted honestly Notepad++ has been fine for me for .plist files
💯 1
👍 1
Avatar
with a segmented e01, FTK imager works, with most dar/tar/whatever singular files I use hasher... PA output a .zip as well as a series of .z01, .z02 etc and the .ufdx only references the .zip for the SHA256
Avatar
kmacdonald1565 4/1/2020 6:28 PM
@MrMacca (Allan Mc) sorry for the late reply. I have resorted to using teamviewer for the time being for my office computer, to get files i need on to another computer. if this is an option for you, it works well for me
Avatar
@Deleted User it should always start cold. However - in some new Samsungs we noticed an option to disable “Strong Protection”, which might make phones start hot. This protection is obviously on by default. Once a phone is hot, it doesn’t change back to cold unless it was rebooted.
cellebrite 1
Avatar
MrMacca (Allan Mc) 4/2/2020 2:03 AM
@kmacdonald1565 I think I've found an alternative myself now. A program called mRemoteNG. Connects via RDP and never disconnects and is much faster for some reason. Been using it all day with no problems what so ever. https://mremoteng.org/download
The next generation of mRemote, open source, tabbed, multi-protocol, remote connections manager.
2:04 AM
if you try it, select connections and then enable Password protect. And then also go into the Tools > Options and then security, and enable encryption
Avatar
GraemeHorsman 4/2/2020 2:11 AM
Hi everyone, bit of a random question but how often do people encounter cases where there is legacy tech or software involved which may not longer be around or where they have to make special purchases. Essentially, how often do you encounter older stuff needing to be investigated (OSs, devices etc) ? I’m trying to establish if this is a common thing (edited)
Avatar
MrMacca (Allan Mc) 4/2/2020 2:13 AM
Colleagues of mine have found it often when embroidery machines are being investigated, or a bespoke format that contains the copyright infringement graphic files. A lot of the time a virtual machine of the image can help to view the system.
Avatar
Colleagues of mine have found it often when embroidery machines are being investigated, or a bespoke format that contains the copyright infringement graphic files. A lot of the time a virtual machine of the image can help to view the system.
@MrMacca (Allan Mc) I have never heard of a forensic investigation of an embroidery machine! Makes a lot of sense though, I've seen 3D printers being analysed to recover the history of what they've printed
Avatar
Deleted User 4/2/2020 7:28 AM
@Deleted User it should always start cold. However - in some new Samsungs we noticed an option to disable “Strong Protection”, which might make phones start hot. This protection is obviously on by default. Once a phone is hot, it doesn’t change back to cold unless it was rebooted.
@jifa Thanks for info!
Avatar
WFH question to all DF examiners. Boss is wanting me to work from home now, sending me home with workstation and drives containing imaged evidence. He’s expecting me to continue analyzing evidence that contains CP. This is giving me 100 red flags. What are your opinions? This is all new and there are no protocols, as far as I know, for this type of situation. I feel like the right defense attorney could tear this situation apart.
Avatar
@purplepox That's a negative. Offer instead to RDP into your workstation. Still not ideal for that type of work, but much better than having that stuff in your house.
👍 3
Avatar
william beaux 4/2/2020 1:03 PM
All - question about phone records, particularly Sprint. I received a return for CDRs which has columns for originating number, called number, and dialed number. We have phone records from both suspects that show them contacting each other; however, there is another number present in the Sprint record. We assumed the suspects were using an app to spoof their number and the spoofed number was showing in the records, but that is not the case. The number that shows up has the same first six digits (321-517-xxxx) but the last four numbers are randomized. This third number shows up throughout the Sprint records but it never repeats - always a different last four. It even shows as part of a call record when the suspect was contacted from a PD number. Sprint indicated that the number was coming from theobile device itself, but the extraction show no such apps with that functionality. To further complicate, the iPhone was extracted using 4PC and PA, so it was not a GK extraction. Any ideas why this mystery third number appears in Sprint phone records? I believe Sprint uses these numbers internally to route calls, but Sprint advised it's coming from the mobilemdevice itself, which is not true if the number still shows in the call record when the call originates from our PD. Anyone encountered this or can provide input?
Avatar
Facebook Messenger already works on practically any platform you can imagine. The company is now adding native Windows and macOS apps.
5:53 PM
More artifacts to note
Avatar
WFH question to all DF examiners. Boss is wanting me to work from home now, sending me home with workstation and drives containing imaged evidence. He’s expecting me to continue analyzing evidence that contains CP. This is giving me 100 red flags. What are your opinions? This is all new and there are no protocols, as far as I know, for this type of situation. I feel like the right defense attorney could tear this situation apart.
@purplepox HA! No. Absolutely not. I would never even take E01s with CP on it out of the office, much less to my home that I share with my wife and son. Tell your boss he's on crack and then slap him so he remembers.
🙌 2
Avatar
WFH question to all DF examiners. Boss is wanting me to work from home now, sending me home with workstation and drives containing imaged evidence. He’s expecting me to continue analyzing evidence that contains CP. This is giving me 100 red flags. What are your opinions? This is all new and there are no protocols, as far as I know, for this type of situation. I feel like the right defense attorney could tear this situation apart.
@purplepox I wouldn't worry about the defense aspect of this. This is just a huge workplace/mental health issue that your agency definitely doesn't want to open up, on top of the issue of collateral damage with others in the home, exposed to CP material.
👍 2
Avatar
return2zero 4/3/2020 3:32 AM
Like a case management system? This has been brought up a few times, if you search Case Management you will get some hits @return2zero https://discordapp.com/channels/427876741990711298/537760691302563843/586117076872069130
@K23 Thank you, appreciate it!
Avatar
@Expat4n6 @LawDawg @JaiRoc thanks for the suggestions and opinions! It helped me bring all these issues to his attention.
👍 3
Avatar
Andrew Rathbun 4/3/2020 6:11 AM
Always a fan of the collaboration that goes on here. Keep it up everyone 👍
Avatar
Hi all. Can anyone comment on Oxygen capabilities and development, over the past year or so? Had a trial a while back, and encountered a few issues. Didn’t move forward with purchasing. I’d like to revisit the tool, so looking for some feedback. PMs please.
Avatar
@purplepox - What I have been doing is triaging which cases I currently have in my queue into CP/non-CP. I’ve brought the non stack home and will work on those. My county has slowed a lot of processes down so I’m not worried at this point about getting behind - everyone is lagging right now. If they need a CP case done, I’ll go into the office which is a ghost town right now anyhow so there’s no risk of exposure.
👍 2
Avatar
anyone on for a linux question?
Avatar
Andrew Rathbun 4/3/2020 4:53 PM
@5cary is @LinuxLEO 🙂
4:53 PM
Make sure to check out his site to see if his guide answers your question
Avatar
where is his site
4:57 PM
For future reference, it's not a lot but it's something I put together here: https://aboutdfir.com/toolsandartifacts/linux/
Notable reference site: Linux LEO, The Law Enforcement and Forensic Examiner’s Introduction to Linux. Please note, the guide has just received its first update in over a year. Updates should be coming more regularly, according to the guide’s author. Stay tuned for more to come...
Avatar
Andrew Rathbun 4/3/2020 5:10 PM
Always looking for new resources to add here so if you ever come across any, please let me know
👍 2
Avatar
SarahEdwards updated her Apollo Script for Mac and iOS devices along with Windows and Android. https://github.com/mac4n6/APOLLO
Apple Pattern of Life Lazy Output'er. Contribute to mac4n6/APOLLO development by creating an account on GitHub.
Avatar
@Ghosted : Drop me a pm if you have a question I can help with (or just ask here). Full disclosure: I'm better with "using linux" questions rather than "examining linux". I do few linux exams, but I use linux every day to do exams (the LinuxLEO guide RathbunA linked is about linux as a platform rather than a target). From what I've seen on this server there are plenty of people that can answer linux questions though, so you're bound to get an answer. (edited)
💯 1
Avatar
Andrew Rathbun 4/4/2020 4:26 PM
https://twitter.com/Cellebrite_UFED/status/1246069469237084160?s=20 FYI all, I'll be on Monday's episode of this so if you want to heckle me or just represent the server, feel free to join!
This week's "Life Does Not Have a Ctrl+Alt+Del" comes to a close with @HeatherMahalik, Senior Director of Digital Intelligence, and guest, Sarah Edwards: #Blackbag and #Cellebrite unite. What does the new face of #DFIR look like? Join the chat to learn https://t.co/J7wuu7vgyz...
🤘 7
Avatar
chrisforensic 4/4/2020 9:11 PM
good morning from austria @Oxygen Forensics ... one question... is it possible to get a full trial of your latest oxygen forensic detective on the short way? i´m working in LE sector on mobile forensics... greets chris
Avatar
Does RMF belong in DF and why or why not? I've heard yes and no. (edited)
Avatar
Experimental for iPhone-5s to iPhone-x. This beta version of Checkra1n popped up. A version 10 was produced apparently but taken down, possibly was too buggy. https://checkra.in/releases/0.9-beta
Important information
Avatar
@Colman one thing to note here, i think they patched it couple versions back and it no longer disables usb restrictions. I had trouble on both Mac and Linux version to run the exploit on a phone with passcode (without entering the passcode on the phone before). Exploit runs, phone boots to iOS but then it can't connect back with the phone. I checked their github bugtracker and found someone ask about disabled iPhones behave like this, got reply that it's not a bug and intentional change.
Avatar
@Arcain Good feedback, thanks.
Avatar
chrisforensic 4/5/2020 7:39 AM
good morning from austria @Oxygen Forensics ... one question... is it possible to get a full trial of your latest oxygen forensic detective on the short way? i´m working in LE sector on mobile forensics... greets chris
@chrisforensic nobody here to help from @Oxygen Forensics ?
(edited)
Avatar
Andrew Rathbun 4/5/2020 7:41 AM
I don't think they monitor here unfortunately
7:42 AM
Shoot them an email. They are typically responsive that way
Avatar
chrisforensic 4/5/2020 7:43 AM
Shoot them an email. They are typically responsive that way
@Andrew Rathbun sent an email to oxy support yesterday... no response until now
Avatar
Andrew Rathbun 4/5/2020 7:43 AM
Wait for a business day. They're likely not in the office
Avatar
chrisforensic 4/5/2020 7:43 AM
have to wait, i think 😉
7:44 AM
hope all right with you @Andrew Rathbun and you are healthy
Avatar
Andrew Rathbun 4/5/2020 7:44 AM
hope all right with you @Andrew Rathbun and you are healthy
@chrisforensic thank you and you as well. Best to you and yours. Good luck with your issue
👍 1
Avatar
Just curious if anyone knows what type of security AXIOM is using for their Cyber agents? What prevents malware or anything else from grabbing the domain creds used to deploy and run the agent.
Avatar
Andrew Rathbun 4/6/2020 5:45 AM
https://twitter.com/Cellebrite_UFED/status/1246069469237084160?s=20 FYI all, I'll be on Monday's episode of this so if you want to heckle me or just represent the server, feel free to join!
@Andrew Rathbun I got moved to Wednesday, you'll all have to wait to heckle me
This week's "Life Does Not Have a Ctrl+Alt+Del" comes to a close with @HeatherMahalik, Senior Director of Digital Intelligence, and guest, Sarah Edwards: #Blackbag and #Cellebrite unite. What does the new face of #DFIR look like? Join the chat to learn https://t.co/J7wuu7vgyz...
Avatar
Andrew Rathbun 4/6/2020 6:16 AM
but you should still tune in since @jifa is today's distinguished guest
Avatar
ltrain1029 4/6/2020 6:23 AM
What will you be talking about @Andrew Rathbun
Avatar
Andrew Rathbun 4/6/2020 6:29 AM
@ltrain1029 I'll be doing a guided tour through the Discord Server for prospective new members as well as talking about the history of the server, how it came to be, some cool stats, etc. Also will be giving a guided tour through all the changes that have occurred at AboutDFIR since I came aboard as well as soliciting feedback for what is missing to make the site better and more useful for everyone. And anything else that people want to talk about in the time allotted. (edited)
👍 4
Avatar
CLB-TheGeckster 4/6/2020 6:32 AM
but you should still tune in since @jifa is today's distinguished guest
And to follow up on this - for those who aren't aware, Shahar is the VP of Cellebrite's Security Research Labs - so this is not one you'll want to miss out on. (Not saying you should miss Andrew's either, lol)
Avatar
ltrain1029 4/6/2020 6:32 AM
Sweet!
Avatar
Are there any Webinars or Live Chats this Tuesday - Friday?
Avatar
Andrew Rathbun 4/6/2020 10:12 AM
The one linked above will be MWF every week
Avatar
@f0r3n5ix_ Control-F Webinar Although Control-F's classroom might be temporarily closed, we're working hard to deliver content that our customers and the wider community can access. Kevin Mansell (Managing Director of Control-F) will be hosting a Zoom webinar next Thursday 9th April at 2pm BST / 9am ET entitled: "Understanding Android Location Services & Adoptable Storage" which we hope will allow attendees to examine Android devices safely and more thoroughly. Simply follow the link below to register: https://us04web.zoom.us/webinar/register/1015858253139/WN_h710TN66QAO0HPGHbgLbAw Hope you can join us! (edited)
In this webinar, Control-F Managing Director Kevin Mansell will discuss two topics of importance to mobile forensic examiners: Location Services and Adoptable Storage (both on Android devices). Flight mode is routinely used by mobile forensic examiners to isolate the mobile d...
Avatar
@OllieD I’m registered. Thanks!
Avatar
No problem!
Avatar
@OpenText Anyone available for a quick query?
Avatar
In Axiom, and maybe @Magnet Forensics can help, if I want to decrypt chrome but the account has no password, how can I enter that information to decode?
👍 1
Avatar
@Sudo In what OS, windows / Android / iOS / OSx ?
Avatar
Windows
4:09 AM
Theres an option to provide passwords to decrypt the password database
4:09 AM
But if there is no password for the account I'm not sure how you enter that
Avatar
@Sudo so you are looking to get passwords out of chrome stored passwords. Have you tried using your image to boot into a VM, login to the user account, launch Chrome and "see what you get" VFC or arsenal image mounter can take the pain away and automate the virtualization ofnl the eo1 or use a sans Linux VM and mount and VM in there. Once vm'd you can drag in nirsoft password tools to pull out passwords Tonto text file. (edited)
Avatar
@Dfdan thanks Dan. What tools are you using to boot it as a VM? I've done it before but it didnt work very well
5:40 AM
Cant remember how I did it, I think I pointed a Vbox HDD at the mounted E01
5:40 AM
It was quite janky
5:41 AM
Ah, VFC or arsenal image
Avatar
@Sudo also worth trying Passware, not to VM but to pull out possible passwords. (edited)
Avatar
Any paid products I wouldn't be able to turn round quickly enough
5:44 AM
But yeah launching it is probably the best way, just a bit finicky from experience
Avatar
just_deduce_it 4/7/2020 6:47 AM
https://twitter.com/Cellebrite_UFED/status/1246069469237084160?s=20 FYI all, I'll be on Monday's episode of this so if you want to heckle me or just represent the server, feel free to join!
@Andrew Rathbun unfortunately had to drop early for another call before you came one. I'll look for the recording. Thanks for all you do to foster this community.
This week's "Life Does Not Have a Ctrl+Alt+Del" comes to a close with @HeatherMahalik, Senior Director of Digital Intelligence, and guest, Sarah Edwards: #Blackbag and #Cellebrite unite. What does the new face of #DFIR look like? Join the chat to learn https://t.co/J7wuu7vgyz...
Avatar
@just_deduce_it He got moved to the Wednesday episode, so you didn't miss him!
👍 2
Avatar
Deleted User 4/7/2020 6:55 AM
Would anybody be able to provide me a copy of Magnet Acquire? Tried to get through the Website but didn't work. Cheers! 🙂
Avatar
What would be the best channel for a mobile forensic ANALYSIS question? I have an iPhone full file system extraction with multiple identified ICCID and IMSI numbers, and was looking for some advice on attribution. Wondering if there is any way to determine which ICCID/IMSI is related to anything evidentiary that I discover. I have both @Cellebrite Physical Analyzer and @Magnet Forensics AXIOM
Avatar
#mobile-forensic-decoding I guess @D\\uke10 :)
👍 2
Avatar
@D\\uke10 I'll dm you
Avatar
Andrew Rathbun 4/8/2020 5:30 AM
@Deleted User maybe shoot them an email if it's not working. I've heard from many people a similar experience where they never get a download link. Very frustrating!
5:31 AM
I wish they would do like they do with AXIOM and IEF and just have a public facing download link but then again I get the desire to track utilization of the tool.
5:31 AM
AccessData does the same with FTK Imager so I get it
Avatar
@Deleted User I had to email support after the website method didn't work twice 😕
Avatar
Got there with the Chrome stuff, Axiom you can do "" for a blank password and Arsenal Recon was 👍 for verifying as a booted VM
7:15 AM
Turns out most of the passwords were never saved hence why they didnt show
👍 1
Avatar
@Sudo so if I understand it correctly, you typed two double quotes "" without space in the password field ?
7:23 AM
Though may change to automatic attempts of blanks in a newer release
Avatar
heatherDFIR 4/8/2020 8:07 AM
Today on "Life Has No Ctrl+Alt+Del" we have your own @Andrew Rathbun of the amazing Discord channel so many of us rely upon. Join us for a chat! https://bit.ly/3bDmBf6 #DFIRatHome
We, like you, are now socially isolated and let’s face it, it is not much fun. So, we wanted to create a special daily get together where we could just have some great conversation and forget about the aggravation of being stuck at home. Every day from 12:30PM to 1PM EST we ...
💯 5
🕵️‍♂️ 2
Avatar
anyone know much about sh scripts? can't figure out why this won't work
Avatar
I got it 😄
Avatar
As I sit here gazing at my desktop in Covid Lockdown, I have found my mind starting to do strange things ..... One thing is that I appear to be constantly drawn to the poor UFED Phone Detective icon that just looks so out of place ............... All forgotten about ..... Lonely........ Isolated ............ @Cellebrite Perhaps to cheer it up how about a nice new icon just like all the others. Perhaps a little square box like the others with the initials PD (Like the rest of it's family - 4PC, PA, R, CA, IN)
Avatar
Valid point ... 🙂
Avatar
I've just submitted a official ticket 😃
Avatar
Gotta love retro!
Avatar
It's bad when someone mentions Retro and the first thing that comes to mind is retrovirus !!
Avatar
@Stevie_C far to sympathetic!
Avatar
@Zhaan I think I'm losing it !!
Avatar
digiforensic 4/8/2020 12:23 PM
Don't forget Copy Right 😂
👍 3
Avatar
chrisforensic 4/8/2020 1:05 PM
good evening @Oxygen Forensics ... wrote mail to general support for trial.... support gave me email for another support-contact... i contacted this per mail.... no answer since days... hmmm.... silence
😕 1
Avatar
@chrisforensic New here. Can can you PM me or email tim@oxygen-forensic.com? I will handle personally. My apologies. Thanks.
Avatar
chrisforensic 4/8/2020 1:27 PM
@CyberTim thanks for fast reply
Avatar
@chrisforensic We have Oxygen. I used it recently for several DJI drones that I had in. Oxygen was fantastic with them. If you have a chance give it a rattle with a drone extraction. The maps and graphs all worked perfectly. It’s my go to tool for UAVs now! (edited)
1:32 PM
Showed GPS Altitude, Barometric altitude, Ground Speed, height in side by side live time graphs when playing route. Very, very well laid out
👍 2
Avatar
I’m trying to get some casework done from home, to that end I’ve brought a few Cellebrite iPhone dumps. The two phones were not Checkm8 eligible so logical/advanced logical is what happened. Loading the advanced logical shows no errors in the trace window as expected, but the logical shows a series of “Bad Time Format” with no further explanation. My assumption is that since the logical is a collection of folders with files inside, that I duplicated the case file incorrectly to my take home laptop. Now I believe that I’ve changed the created times. Assuming I’m correct, how should I move a logical case? Is it as simple as zipping the folder prior to moving?
Avatar
Whilst at home I'm trying to put together some training / procedure videos. I use ShareX which is fantastic for screen grabs and screen video capture, however I have a few videos now where I would like to start at normal speed, speed up a section, and return to normal speed later. I've seen a good few videos do this (I think I saw one of Scott Lorenz's EDL videos do this where he speeded up the video whilst it was dumping). Anyone know or recommend good software to do this ?
Avatar
I use Sony Vegas for video editing, but that's massively overkill just for speeding up a small portion of video (although very simple with Sony Vegas).
2:22 AM
There's some free software like VSDC, Lightworks and Shocut for video editing, not sure if they provide that functionality, although I'd assume most video editing software will allow for splitting footage and speeding up that segment. (edited)
Avatar
Many thanks. I’ll check them out 👍
Avatar
Andrew Rathbun 4/9/2020 5:09 AM
@Stevie_C if you wanna know what Scott Lorenz uses, I can reach out or give you his email, just let me know
Avatar
Yeah, please, that would be fantastic!!
Avatar
Andrew Rathbun 4/9/2020 5:20 AM
I sent him an email, will circle back when I know
Avatar
Many thanks 👍
Avatar
Andrew Rathbun 4/9/2020 6:18 AM
@Stevie_C
6:18 AM
I used Adobe Premier Pro for all of my video editing. It has features where you can speed up segments of video. However, what I did with most of my videos is just cut out dead space. For example, lets say the executing phase of an EDL extraction takes 3 minutes before the bin dump starts. I don’t want viewers to waste time viewing 3 minutes of the executing screen, which doesn’t change, or move or show a progress bar. I record the entire 3 minute process. Then when I edit the video I show a few seconds of the video where the “executing” phase begins, then I cut out most of the video and leave just a few seconds before the bin dump begins and when the bin dump starts. So a 3 minute process now takes 10 seconds on my finished video. So I am just cutting out the dead space in between two events, not speeding up the video. It much easier to do that than speeding up video. Speeding up video or time lapse is more appropriate to use if you want to show movement of a progress bar or something being visually accomplished but just speed up. But for just something that doesn’t do anything but show a stagnant screen for a prolonged period of time, just cut out the dead space. (edited)
Avatar
@Andrew Rathbun Yeah, I’ve software to cut and edit but I’m particularly after the speed up / time lapse scenario for a couple of particular things which my software won’t do.
Avatar
@Andrew Rathbun Yeah, I’ve software to cut and edit but I’m particularly after the speed up / time lapse scenario for a couple of particular things which my software won’t do.
@Stevie_C If you can get your hands on a copy of Sony Vegas. It's as simple as clicking where you want to start the speed up, press 'S' to split the clip, then go to where you want it to end, press 'S' to split the clip, then press CTRL and click the end of the clip and drag toward the start to speed up the clip, then realign in timeline 😛 I love Sony Vegas, haha.
Avatar
Digitalferret 4/9/2020 6:27 AM
Camtasia is worth a look. less Film Studio effects and more utility, inc speed alterations
🙌 1
Avatar
We actually have Camtasia in the office along with Snagit. Didn’t realise it could do it. Will check that out with all the other suggestions 👍 Thank you all
Avatar
OBS (Open Broadcaster Software) is free and open source software for video recording and live streaming. Stream to Twitch, YouTube and many other providers or record your own videos with high quality H264 / AAC encoding.
Avatar
Does OBS do on the fly recording manipulation in terms of like timelapsing etc? Tends to be my go to for recording desktop and streaming.
Avatar
tbh not really sure
6:36 AM
for editing open source as well
6:37 AM
but on the fly I have not dug that deep into streaming/video editing with obs
Avatar
Still a very sturdy piece of software eitherway. Always spot on for me.
Avatar
Any LE had experience yet with dealing with Apple Watch data in court? We had a significant DV stabbing where the suspect was wearing an Apple Watch. When we examined his iphone we saw his heart rate/blood pressure/energy spike during the attack. We are now circling around court and the prosecutor is thinking about a Daubert/Frye hearing and how to introduce the evidence. Anyone out there dealt with this yet? For example have you checked to see if Apple will testify about the accuracy of the technology or have you had to as the examiner and have you done any testing etc.?
Avatar
Is there a specific thread dedicated to rooting/adb debugging on android devices?
Avatar
Andrew Rathbun 4/9/2020 9:51 AM
@Bclark #mobile-forensic-extractions or #jtag-isp-chip-off-flasherbox will be the best places for that
Avatar
thanks @Andrew Rathbun
Avatar
@Magnet Forensics Does anyone have a full list of filetypes/artifacts supported by Axiom? Even better if that list includes the extensions and file signatures. I can't find a list... I was looking to proactively build up the custom file signatures list, but I also don't want duplicate functionality and have files parsed out multiple times in the case in multiple artifact categories.
Avatar
If you have Axiom installed. Go to Help/Documentation/Artifact reference.
Avatar
Ah, that helps - but is there a reference to the actual signatures? Some files have different signature versions. Also, regarding .amr files - is there a reason they are supported for carving, but not parsing? Seem to be the only file in that category. I'm working from home today, so don't have access to Axiom at the moment.
Avatar
@OpenText Anyone available for a quick query?
@3X3 Sorry for the late reply. Been busy.
Avatar
This all stemmed from a colleague's case where the amr files were not being parsed out initially, when found through a file-system browse, they turned out to be critical evidence. Wanted to add them in (which seems to have worked), and figured while I was at it, might as well see what else I can add in.
Avatar
Has anyone worked a swatting case with COD Modern Warfare Mobile?
Avatar
chrisforensic 4/10/2020 1:53 AM
hello @MSAB try to install latest XRY 9.0 ... but installs and then uninstalls in one run ? (edited)
1:54 AM
install first time on another new laptop... latest windows 10 x64 (edited)
Avatar
@chrisforensic Hmm, strange! Usually that would happen in case you are upgrading and there are issues with the prior install. Can you go to %temp% and look for the latest MSI.log file? would usually be about 3 MB for the main XRY install, please DM me that one and I'll have a look! (edited)
👍 1
Avatar
@3X3 Many thanks !! Checked out the Sony Vegas but £755 for licence was a bit out of my price range for all I wanted. Checked out a few others but your VSDC was perfect. So much so that I've bought it - £20 but online coupon code got it at £11.60 for the Pro version !!! Bargain - first video converted. Now onto the second. It was so easy to use and I didn't even read the instructions !! Put 2 check marks in the middle, click on it, set speed on middle section, then export !! Simples 😀 👍
Avatar
Forensicator 4/10/2020 2:33 PM
anyone else having PA crashing when importing an extraction either via UFED or GK and/or creating a report. My colleague is having the same issue. I am running 7.32.0.16. I've tried 4-5 times and I think that is more of a reason to say stop working and go enjoy the Easter weekend.
Avatar
Hello All, Any recommendations for a good video tutorial or online training on File Systems
Avatar
Andrew Rathbun 4/11/2020 12:45 AM
@venkat 13Cubed has great tutorial videos. Not sure if he covers every file system at this time but check him out on YouTube
👍 1
Avatar
@Andrew Rathbun Thanks so much. Will go through it
👍 1
Avatar
Digitalferret 4/11/2020 4:09 AM
'me too' thanks @3X3 that VSDC must be one of the best kept secrets i've never found. 👍
Avatar
@Cellebrite it seems that your certiticate on https://cf-media.cellebrite.com/ expired. Can't download release notes pdf for 7.32
Avatar
DefendingChamp 4/12/2020 7:25 PM
I gotta finish up my Cellebrite certifications 😦
7:25 PM
Just finished up the free autopsy today
Avatar
casualpixels 4/13/2020 5:14 AM
@Stevie_C little late to the video editor conversation however, if you are looking for a full featured product like Adobe Premiere Pro or Sony Vegas Pro at ZERO cost....try DaVinci Resolve. This is a free product and has all the capabilities of Premiere and Vegas paid versions. I use it all the time for my personal/professional video editing and its fantastic! 😀
Avatar
Digitalferret 4/13/2020 9:34 AM
DR flaky af for me. seems very system intolerant. what system spec have you @casualpixels , if you don't mind the ask?
Avatar
@Cellebrite - anyone around for a quick question? Not sure it requires a ticket
Avatar
CLB-dan.techcrime 4/13/2020 12:03 PM
@whee30 first!
Avatar
Sure go ahead 👍
Avatar
casualpixels 4/13/2020 12:35 PM
@Digitalferret Running it on Intel i7-9700K, 64 GB ram, 8 GB video card, 512 M.2 (basic specs) (edited)
👍🏻 1
Avatar
Anyone using an SSD to run a VM with Parallels? I'm having a USB issue.
Avatar
Dr. Kaan Gündüz 4/14/2020 6:46 AM
what seems to be the problem?
Avatar
So I have my VM running on my SSD, which is great.....problem is...the VM isn't recognizing any USB drives that I plug in. I've got a help ticket in with Parallels but wanted to see if anyone has ever had the same issue.
Avatar
Dr. Kaan Gündüz 4/14/2020 7:01 AM
you can manually add usb devices in parallels' vm settings, afaik
7:01 AM
most of the time you need to install parallels tools as well
7:02 AM
maybe something is interfering with usb redirection,
7:02 AM
another virtualization software, rdp, citrix, vmware?
Avatar
elizavetabelkasoft 4/14/2020 2:15 PM
@DefendingChamp try Belkasoft Evidence Center) https://belkasoft.com/trial It's a good chance to compare
Avatar
Hey Team! I'm wanting to compile a list of artifacts related to different crypto wallets. is anyone able to piont me in the direction of some tutorials related to diff tools and/or methodolgy to investigate artifacts from a new application?
8:40 PM
I'm looking at utilising Win10 and VBox and have Axiom/XWays at my disposal...
Avatar
Does anyone have a manual for Encase 7.14? For this lab I have to show all my results in Encase and I'm used too/have all my results in axiom. Would much rather parse internet history with some feature I don't know of then manually list every damn index.dat entry relevant
😢 1
8:48 PM
professor barred use of anything not EnCase
8:54 PM
if anyones wondering, said professor won't provide a manual
Avatar
digiforensic 4/14/2020 11:28 PM
Can someone list me 4-5 secure Android phones? Secure means none of known techniques can break it.
Avatar
@digiforensic Any of the secure encro Aquaris BQs 🙂
Avatar
Andrew Rathbun 4/15/2020 3:10 AM
@Turb0Yoda @OpenText
BlackBag 1
3:10 AM
@digiforensic your answer today could be invalid tomorrow. Everything gets broken eventually
3:11 AM
Pixels seem to be tougher than most others to "break"
👍 3
Avatar
JonasWanobi 4/15/2020 9:18 AM
And they are probably about to get even harder as Google moves to incorporate its own "Whitechapel" chips into their pixel devices.
Avatar
AzuleOnyx🛡 4/15/2020 9:29 AM
Well, they did break Magisk and stopped getting around SafetyNet ... which sucks for custom ROMs
Avatar
@Magnet Forensics Is anyone aware if Magnet is able to provide a sole source letter for purchasing purposes of Axiom? This will be a first time purchase. I'm getting push back from procurement and have been told I need a letter stating Magnet Forensics is the sole manufacturer and vendor for the software.
magnetforensics_alt 1
Avatar
JonasWanobi 4/15/2020 10:51 AM
@digiforensic The Pixel 3 uses a (separate) Titan M Security chip in coordination with the CPU to encrypt and store , similar to Apple's T2 Secure enclave in iPhones. Now, Samsung is getting it's own security chip known as the Secure Element debuting in its S20. Those 3 devices, in my opinion, are probably the most secure.
Avatar
digiforensic 4/15/2020 10:54 AM
@digiforensic The Pixel 3 uses a (separate) Titan M Security chip in coordination with the CPU to encrypt and store , similar to Apple's T2 Secure enclave in iPhones. Now, Samsung is getting it's own security chip known as the Secure Element debuting in its S20. Those 3 devices, in my opinion, are probably the most secure.
@JonasWanobi Thank you 🙂
Avatar
forensicmike @Magnet 4/15/2020 11:13 AM
@Scilombard DM'ing
Avatar
Hello :) First i wanted to thank everyone in this commounity, i learned much here 🙂 I hope this is the right place for posting my Question, if not im sorry 🙂 I wanted to write a report about Digital Forensics. For this i thougt about a chaptor „Myths and Mistakes“. For example i wanted to say, that no matter what, if you plug a hard drive in (even with a Writeblocker), there will be data changed. Its a mistake to think that Forensic analysts dont change any data. Of course the data on the drive wont be changed, but the intern meta infos will be changed. Or if someone uses encryption e.g Veracrypt and has a good password, we cant get the data... Do you have some other ideas? I also wanted to make a chapter „what ist DF?“ - a „short“ introduction in the topic, what do you think needs to be in there? Thanks in advance 🙂
Avatar
Does anyone have a manual for Encase 7.14? For this lab I have to show all my results in Encase and I'm used too/have all my results in axiom. Would much rather parse internet history with some feature I don't know of then manually list every damn index.dat entry relevant
@Turb0Yoda send me a DM
👍 1
Avatar
Copy
Avatar
Andrew Rathbun 4/15/2020 11:21 AM
Hello :) First i wanted to thank everyone in this commounity, i learned much here 🙂 I hope this is the right place for posting my Question, if not im sorry 🙂 I wanted to write a report about Digital Forensics. For this i thougt about a chaptor „Myths and Mistakes“. For example i wanted to say, that no matter what, if you plug a hard drive in (even with a Writeblocker), there will be data changed. Its a mistake to think that Forensic analysts dont change any data. Of course the data on the drive wont be changed, but the intern meta infos will be changed. Or if someone uses encryption e.g Veracrypt and has a good password, we cant get the data... Do you have some other ideas? I also wanted to make a chapter „what ist DF?“ - a „short“ introduction in the topic, what do you think needs to be in there? Thanks in advance 🙂
@guyizda you could talk about the myth of deleted data on a computer being gone forever.
👍 1
Avatar
@forensicmike @Magnet @Scilombard Obtaining info on sole source letter now. Can you please ping me your email so i can send it to you.
Avatar
@guyizda you could talk about the myth of deleted data on a computer being gone forever.
@Andrew Rathbun thats also a good idea, thanks 😄
Avatar
CryptoHackz 4/15/2020 9:46 PM
Just like how there are guides for OSCP detail write up like noob to hero... I’m trying to find something similar for GCIH like what are the things I need to know before spending 8k for the study materials and exam. Is there such a thing exist for GIAC certs?
Avatar
Andrew Rathbun 4/15/2020 10:06 PM
@CryptoHackz here's something I put together that has links to other blog posts for GIAC certification preparation
10:06 PM
SANS GIAC Certifications are highly sought after because of the technical expertise required for completing them successfully. They are not to be taken lightly and are held in high regard due to them not being a “gimme” for the test taker. If you do not prepare, your score wil...
👍 1
10:11 PM
I would strongly recommend checking Reddit too. Particularly r/computerforensics and r/cybersecurity
👍 1
Avatar
Andrew Rathbun 4/15/2020 10:24 PM
I also think you can preview the first hour of that course which may cover what you want to know
Avatar
DefendingChamp 4/15/2020 11:14 PM
did anyone take the CCPA course lately? Is 2 weeks enough to finish it?
Avatar
@DefendingChamp yes
Avatar
hey peeps
5:54 AM
does anyone's force or institution have any posters around cybercrime and covid?
5:54 AM
like, stay safe etc
5:55 AM
what to look out for
Avatar
Andrew Rathbun 4/16/2020 5:56 AM
Coronavirus disease 2019 (COVID-19) is a virus (more specifically, a coronavirus) identified as the cause of an outbreak of respiratory illness first detected in Wuhan, China.
Avatar
cool, thanks
Avatar
Andrew Rathbun 4/16/2020 5:57 AM
I missed the cybercrime part of your question
5:57 AM
that might miss that part of it
Avatar
I'm gonna design my own anyway
5:57 AM
but just want to get a feel
5:57 AM
I think I will be going with one similar to the SANS securely work from home document
5:58 AM
that's what I was after, just design ideas
5:59 AM
something that pops a bit and isn't just ignored
Avatar
AzuleOnyx🛡 4/16/2020 8:57 AM
Hmm, I have the fundamentals course for AWS ... shoot why not look at Azure too 😉
Avatar
DefendingChamp 4/16/2020 11:02 AM
lol you guys got too much time haha!
Avatar
chrisforensic 4/16/2020 11:09 AM
hello @Oxygen Forensics ... somebody here to make short support via DM ? reason: problem with german language on latest oxy 12.3 ... here a sample...
11:10 AM
settings ?
🧐 1
Avatar
DefendingChamp 4/16/2020 11:12 AM
sorry wish i could help i'm not too familiar with oxy
Avatar
chrisforensic 4/16/2020 11:13 AM
info: english language settings no problem, but german
Avatar
anyone here work for the NCSC in the UK
Avatar
What's the question? I don't speak German but may be able to help. Otherwise shoot an email to support@oxygen-forensic.eu
Avatar
chrisforensic 4/16/2020 11:16 AM
the problem is, that if you select the german language in settings and restart it, the description of many parts are not correct...
11:17 AM
here the same in english language, correct text
🧐 1
Avatar
Requires a German Language Pack. They would be best to support that.
Avatar
chrisforensic 4/16/2020 11:17 AM
IMEI in german shows "extraction with", IOS version in german shows "backup from" etc. with switched to english language all correct (edited)
11:19 AM
german language file exists...
Avatar
CryptoHackz 4/16/2020 1:38 PM
@Andrew Rathbun thank you for sharing your information with me.
Avatar
Andrew Rathbun 4/16/2020 1:39 PM
@CryptoHackz hopefully it helps or points you in the right direction. If not, please circle back
Avatar
CryptoHackz 4/16/2020 1:44 PM
@Andrew Rathbun will do... I just don’t any to spend 8k on a certification without doing research to a particular cert is doable or if it’s going to go over my head
Avatar
Andrew Rathbun 4/16/2020 1:46 PM
If you don't find your answer on Reddit, by all means, make a thread on there asking all the questions you have about GCIH
1:46 PM
There are plenty of people, not including myself, who have taken that cert and would be more than happy to answer. Also, there's the SANS DFIR email listserv you could add yourself to where you could ask your question there, too
Avatar
CryptoHackz 4/16/2020 1:47 PM
Will do... I think I already did. Is GCIH a good starting point?
Avatar
Andrew Rathbun 4/16/2020 1:47 PM
Well, I don't know what you know or what training you've had or what you do. So without that information, it's hard for me to answer
Avatar
CryptoHackz 4/16/2020 1:47 PM
Is GCIH mandatory requirement to take any of its other cert?
Avatar
Andrew Rathbun 4/16/2020 1:47 PM
Someone like @RandyRanderson might be a good one to ask, too
1:48 PM
@CryptoHackz I don't believe there are any prerequisite courses for any SANS courses
1:48 PM
Outside of like the GSE capstone certification
Avatar
CryptoHackz 4/16/2020 1:49 PM
Oh okay. Because I’m in SOC and Cyber work environment and GCIH and GCIA always comes up and standard certification.
1:50 PM
So I thought that’s the starting pork for SANS GIAC certs
Avatar
Andrew Rathbun 4/16/2020 1:51 PM
Nah it only depends on what you actually do in your current job. Check the syllabus for the classes attached to those certs and see if they check the boxes for what you do. For what I do, GCFE and GCFA are the meat and potatoes of what we do. GCIH would probably be thrown in there as well. But that's just for me and my role right now. Your needs may vary
Avatar
CryptoHackz 4/16/2020 1:54 PM
Understood. Thanks for the feedback. I’ll check it out for sure.
Avatar
turned out pretty well!
2:11 PM
if any UK based LE's have something similar though I'd still be interested to see it
2:11 PM
(a cyber crime awareness type doc for the public)
Avatar
RandyRanderson 4/16/2020 3:41 PM
Is GCIH mandatory requirement to take any of its other cert?
@CryptoHackz no SANs class requires another cert in order to take it. The only class that actually has a prereq is SEC760.
3:41 PM
GCIH is part of GSE. Which if you’re gonna get 5+ certs, or could, makes it where you just need to renew that cert and it renews all of them
3:42 PM
Far as SEC504. Having a good Linux and Windows command line understanding, you’ll be fine. There are commands you’ll learn that if you know ahead of time will make it easier. But the class is meant to teach you that.
👍 1
Avatar
Andrew Rathbun 4/16/2020 4:04 PM
@CLB_joshhickman1 just posted iOS 13 images! https://thebinaryhick.blog/2020/04/16/ios-13-images-images-now-available/ (edited)
Since everyone is at home a little more these days, myself included, I thought I would create two iOS 13 images, both of which are now available for download.  The images were created using an…
👍 1
👀 1
Avatar
awesome, just downloaded them!
Avatar
@Law Enforcement [UK] Interested in people's opinions on what terminology is or should be used within UK LE: IIOC or CSAM? Both are an improvement over the acronym CP in my opinion.
Avatar
IIOC
👍 1
3:02 AM
I think almost anything is an improvement over CP
👍 1
Avatar
p4tr1ck w 21 4/17/2020 3:02 AM
IIOC
👍 1
Avatar
@Law Enforcement [UK] Interested in people's opinions on what terminology is or should be used within UK LE: IIOC or CSAM? Both are an improvement over the acronym CP in my opinion.
@OllieD I am a nationally accredited grading trainer and CSAM is the preferred all encompassing term. However IIOC is perfectly valid as it is the wording in the legislation.
👍 2
Avatar
JeezyCreezy 4/17/2020 3:05 AM
Nationally accredited grader here...we previously used IIOC but CSAM is now the preferred terminology 🙂
👍 1
Avatar
IIOC /CSAM is good with me. CP is the term mainly used by the US, which I cannot abide.
👍 1
Avatar
Yes, I've rarely heard the term CP being used in the UK, which I'm pleased about. Thanks all for your input, particularly @busted4n6 and @JeezyCreezy. I've seen a couple of organisations campaigning against the use of the term CP on LinkedIn and it sparked my interest in what the perspective or party line is within LE.
Avatar
Just double checked my training notes... csam and child abuse images are used throughout.
Avatar
I've seen the term IIOC being used almost exclusively, although personally I prefer the term CSAM. CP is an abhorrent term in my opinion and I've only actually ever seen offenders using it in search terms etc.
Avatar
However the nationally accredited training is still a little ‘new’ and although most forces have had train the trainer from CAID, not all have rolled it out
Avatar
The connotations of CP are horrible, particularly the fact that offenders use the term, as @Andyroid pointed out. I've always felt like IIOC is a bit too weakly worded, CSAM feels much more appropriate in terms of making it clear that that material is completely unacceptable and is not somehow a victimless crime
Avatar
So many may not actually be aware of the term. However to quote some of the training notes “in 2008, the World Congress III against the Sexual Exploitation of Children and Adolescents stared in their formally adopted pact that “Increasing the term ‘child abuse images’ is being used to refer to the sexual exploitation of children and adolescents in pornography”
3:15 AM
... This is to reflect the seriousness of the phenomenon and to emphasise that pornographic images of children are in fact records of a crime being committed”
👍 1
3:17 AM
I’d also point out that when we do warrants and tell families we’re here for indecent images of children, they don’t always ‘click’. The term ‘indecent’ is not really common. But if you say child sexual abuse images they get it pretty quickly
Avatar
gr3enran6er 4/17/2020 4:22 AM
Suggestions on how to share large files efficiently. Maybe via p2p. Or anything that we can pause then resume download
4:24 AM
Ive research some good file transfer tool/site. Filepizza and onionshare. Im just not sure which one has the capability to pause and resume
Avatar
How large are we talking? Mega is pretty good at suspending/resuming downloads
Avatar
gr3enran6er 4/17/2020 4:25 AM
Maybe 10gb
Avatar
Then I'd consider Mega, I've sent 30GB files to customers relatively successfully with that
Avatar
gr3enran6er 4/17/2020 4:28 AM
Okay thank you. Will check on this
Avatar
Non-evidential files of course
Avatar
gr3enran6er 4/17/2020 4:29 AM
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 50GB now
Avatar
That's the one
Avatar
gr3enran6er 4/17/2020 4:30 AM
Okay, if ever we want it to be more secure. Do you have other suggestions?
Avatar
Mega is pretty secure anyway, but if it was something sensitive or evidential I'd be considering going old school and putting the files within a veracrypt container on read-only DVDs or possible a portable HDD and sending it as a recorded delivery
Avatar
gr3enran6er 4/17/2020 4:34 AM
Okay I understand. Its not really that confidential. We are just sharing OVAs for IR activities
Avatar
@busted4n6 we went over to the term ‘CAM’ a while ago. (edited)
Avatar
Question for the masses. I have an offline website that was provided to me in a ZIP file. As I have limited experience with X1 and it was determined that (after consulting an "expert" X1 was not the choice to collect from a non live website. I have Page Vault as well however the zip file is causing issues. What I am asking is, now that I have downloaded the zip files to my forensic laptop, what would be the forensically sound way to create a producible product like PDF or something that can be ingested into Vennio or possibly Relativity?
Avatar
@Andrew Rathbun How many images should there be? The first link on the blog is dead. But the second Drive link worked and had two images. iOS 13.3 and 13.4.
Since everyone is at home a little more these days, myself included, I thought I would create two iOS 13 images, both of which are now available for download.  The images were created using an…
Avatar
Andrew Rathbun 4/17/2020 6:47 AM
There should be two images
6:47 AM
I'm sure they'll be rehosted
Avatar
OK I got these two
Avatar
CLB_joshhickman1 4/17/2020 6:53 AM
It’s possible Microsoft booted it; it has been getting hit pretty hard since yesterday afternoon. I created a new link, updated the post, and tested the link. It is working now. (edited)
👍 3
6:53 AM
And yes, there are two images: one for 13.3.1 and 13.4.1. Each zip file you see there contains components for the respective iOS version.
Avatar
Even though my company OpenText partners with Paraben for EnCase Mobile Investigator, still good to look at the file system.
Avatar
AzuleOnyx🛡 4/17/2020 8:01 AM
Question for the masses. I have an offline website that was provided to me in a ZIP file. As I have limited experience with X1 and it was determined that (after consulting an "expert" X1 was not the choice to collect from a non live website. I have Page Vault as well however the zip file is causing issues. What I am asking is, now that I have downloaded the zip files to my forensic laptop, what would be the forensically sound way to create a producible product like PDF or something that can be ingested into Vennio or possibly Relativity?
@nbh2493 What is the goal? Are you just trying to make a report or something else?
Avatar
make a producible report.. I am assuming they want it to render just as the website does however, it is not a live environment.
Avatar
Matt - Monolith Forensics 4/17/2020 12:58 PM
@nbh2493 Does the zip file contain the raw website source code? Can you describe what files/types are in the Zip file? I'm curious to know, because websites have a front end (browser) and a backend (Server) that both comprise a site and page.
👍 1
Avatar
AzuleOnyx🛡 4/17/2020 8:09 PM
There are a few options such as in Magnet Axiom that will render a page (though, not great). However, I'd agree with @Matt - Monolith Forensics . We'll need the source file list or web site type to figure if it's even possible to do that.
Avatar
Is there no emoji for encase haha
5:10 PM
this must be rectified...
5:11 PM
Guidance
5:11 PM
😄
5:11 PM
(I'm just trying to not do this damn report due tuesday) (edited)
💯 1
5:12 PM
wait I'm dumb I saw it after I downloaded the new one
Avatar
Anyone have any tips for stego on a Photoshop file
9:21 PM
There's supposedly CSAM in these files but I can't get much more help out of previous students
Avatar
Anyone have any reading material for alternate data streams?
Avatar
AzuleOnyx🛡 4/19/2020 8:14 PM
@tac_dfir I haven't seen any direct reading materials on ADS. There fairly easy to understand (See: https://davidhamann.de/2019/02/23/hidden-in-plain-sight-alternate-data-streams/) What makes them interesting is the kind of information you can store. Microsoft uses to mark which Zone a file originated from.
8:15 PM
If I remember correctly, Apple started using them for extra data for music files.
8:15 PM
I can't seem to find the ref for that though. lol
Avatar
I’ve got the little experience just from sans and some reading into them but mainly trying to see if anyone has anything more in depth or experience with them being used out in the wild.
Avatar
AzuleOnyx🛡 4/19/2020 8:16 PM
hmm... not sure. I mean they are honestly really easy to spot.
8:16 PM
Though, you could use to hide notes and stuff in when you are doing recon on a system.
8:16 PM
Most forensic tools can parse them.
8:18 PM
What have you seen with them in the wild?
Avatar
I haven’t yet, a colleague is trying to work a script to track them across a domain but wasn’t sure if there was a simple way to do it
Avatar
AzuleOnyx🛡 4/19/2020 8:52 PM
Ahh. You would need to scan every file for them.
8:57 PM
Umm, have an idea but needs to wait till I get sleep.. lol
Avatar
@Law Enforcement [UK] Interested in people's opinions on what terminology is or should be used within UK LE: IIOC or CSAM? Both are an improvement over the acronym CP in my opinion.
@OllieD Just to throw a spanner in the work, after our national grading training we were told to refer to it as CAM in all documentation going forward! Love the consistency
Avatar
@OllieD Just to throw a spanner in the work, after our national grading training we were told to refer to it as CAM in all documentation going forward! Love the consistency
@K23 Having looked at the training notes CAM is the term used but CSAM is specifically mentioned as acceptable
👍 2
Avatar
@OllieD We use the term IIOC here, although are looking to switch to writing CSEAM. Under no circumstances would we call it CP. (edited)
👍 1
Avatar
@OllieD Still IIOC here as well however however we've seen people using CSE and CSEM as well !!
Avatar
Andrew Rathbun 4/20/2020 4:44 AM
All, I'm working on a blog post to help guide new prospective members how to successfully join the server, if you're a fan of this server and want to help proof read this blog post, please PM me and I'll send you a Google Docs link. I ask that you provide comments on what needs to be improved, is hard to understand, and what can be made better with what you know of the server, etc. Thank you in advance to anyone who takes me up on this. I hope to post it either tomorrow or Wednesday at the latest.
👍 2
Avatar
Hooray, consistency! Thanks @K23, @busted4n6, @3X3 and @Stevie_C
💯 2
🍉 2
Avatar
Looking for suggestions on how to share my local USB ports while remoting into another computer to do a scan of the target computer. Looking to use software similar to IEFTriage/OSTriage/etc on remote target systems. Free is in my price range, but if that isn't an option, I would be interested in purchasing software to allow me to have this ability.
Avatar
Would https://www.virtualhere.com/home be suitable? (edited)
👍 1
Avatar
@sholmes What about Teamviewer?
Avatar
@goalguy Teamviewer works fine to access the system, but It won't launch the software on the target system even though you can see the drive.
7:23 AM
Unless I am doing something wrong
7:25 AM
Yeah @OllieD that is is what I am looking for. That is cheaper than USB Network Gate.
💯 1
Avatar
AzuleOnyx🛡 4/20/2020 10:14 AM
@Magnet Forensics virtual summit registration is opened: https://www.magnetvirtualsummit.com/
Magnet Virtual Summit 2020 is a two-day conference that provides an opportunity for industry thought leaders, our customers and partners, to come together and learn about the latest in digital forensics.
👍 2
Avatar
@OllieD Thanks for that software lead. Tried it out in the lab and seems like it is going to do the trick. I will test it out on a few other systems first, but I think it is going to work well.
👍 1
Avatar
Good to hear
Avatar
I might have spoke too soon. Can it work across different networks?
Avatar
With some port forwarding, yes
2:26 PM
Or you can use their EasyFind feature which is subscription based
2:26 PM
Or join the external device to a VPN
Avatar
Has anyone here tried programming their own network capturing software? I really want to try for my A-level project but I would love some pointers.
Avatar
@bailey I would start googling depending on the language your going to use. Python has alot of modules that can make this fairly easy.. Maybe start here https://m.youtube.com/watch?v=WGJC5vT5YJo Not sure of your programming skillz etc..
Avatar
I should have clarified about my programming skills, I would preferably like to write in Java, and I've googled around and found a few different libraries and a java wrapper for WinCap
2:57 PM
I will definitely check this python video out though, any material I can get will really help
2:57 PM
thanks
Avatar
Does anybody have a speedsheet of what devices the newer UFED 4PC device adapter 3.1 version has increased transfer speeds ? @Cellebrite . We have an older adapter and I'm wondering if its worth upgrading.
Avatar
Does anybody have a copy of the LE guide for Mega (Mega.nz). I have requested it several times through Search.org with no response.
9:40 PM
@Search.org
Avatar
@Cellebrite I had to abort an iPhone checkm8 extraction due to poor connection, however the handset is stuck on apple logo (with checkm8 logo too) - how do I exit this?
Avatar
CLB - DavidK 4/21/2020 12:47 AM
@Pacman Hard reset (Volume down and power button) didn't help? (edited)
Avatar
Exit cellebrite mode failed - home button was dodgy but just managed to reboot the device.
12:51 AM
Thanks @CLB - DavidK and @CLB-AndyM
Avatar
Thanks @RathbunA
Avatar
anyone in the UK have a place they buy Samsung phone parts from for repairs?
Avatar
@Sudo ebay, Cex, Amazon. Usually just buy the phone and take out parts needed. Depends what you need, but fonefunshop may stock the parts you are after (edited)
Avatar
Anyone have a good contact in S Florida (West Palm Beach) that wants a financial crimes case in excess of 150k that is on a silver platter?
Avatar
SomeCallMeTim 4/21/2020 10:51 AM
Does anyone know the best way to import a .csv file that contains messages and other data into an easy to view report, like UFED Reader? I have a TextNow search warrant return and the investigator would like to be able to review the data easier. I appreciate it
Avatar
AzuleOnyx🛡 4/21/2020 10:56 AM
Hmm, probably some kind of html output you could then make into a pdf? ... What kind of information needs to be in the report? CSV can be ready even into Excel for a quick/dirty way to do that..lol
Avatar
@SomeCallMeTim If you have an XRY license you could use the CDR import in XAMN Horizon to import it into a .xry file. Not sure what sort of data might be contained in the TextNow report but you might be able to adapt it but the data properties may be limited for this data set. You have a free XAMN Horizon license added on your XRY Logical license. Worth a shot at least! (edited)
🙂 1
Avatar
SomeCallMeTim 4/21/2020 11:29 AM
It's easy to read in Excel, the investigator just wants to be able to sort through the data and bookmark what is relevant. Similar to searching a normal PA report. I do not have XRY, but I did try Oxygen's CDR import which did not show the messages.
Avatar
AzuleOnyx🛡 4/21/2020 11:32 AM
Ahh
11:33 AM
Yeah, you'll need more then excel or a static doc for that
Avatar
Does anyone know when the SANS DFIR Netwars signup is going to occur? I am speaking about the community free one that is this week.
Avatar
AzuleOnyx🛡 4/21/2020 1:43 PM
the sunday before the event
1:44 PM
its not the DFIR one
1:44 PM
It is the ICS one
1:44 PM
But Sunday before the event? ok great thanks
Avatar
AzuleOnyx🛡 4/21/2020 1:44 PM
probably ... seems all the free ones are that way
1:45 PM
at least from what was sad in the last one but .. @SANS Forensics Institute might have a better answer
Avatar
RandyRanderson 4/21/2020 3:36 PM
Went out yesterday
3:36 PM
Starts on the 23rd I believe. Check your sans portal
👍 1
Avatar
Is anyone in here an expert witness? If so, what area? (edited)
Avatar
Andrew Rathbun 4/21/2020 7:02 PM
@Tyføøn an expert is someone who knows more than the average person about a subject. We are all expert witnesses to varying degrees. If anyone has worked in LE and had to testify in court, they're an expert witness for the prosecution. I know a lot of us have done that in former or current roles. What are you looking for?
Avatar
Nothing in particular, I’m taking a fraud class and the teacher brought it up today and it caught my interest (edited)
👍 1
Avatar
Unoriginal_name 4/21/2020 7:05 PM
@Andrew Rathbun @Tyføøn some courts will certify you as an expert vs someone who witnessed an event or was a third party. An expert, in some courts, has to be proven to be more knowledgeable. For example, you can be an expert in domestic violence, use of force or even digital forensics. There is no end to it. But, it is a process.
Avatar
How do you get certified?
7:06 PM
I’m guessing years of experience?
Avatar
Unoriginal_name 4/21/2020 7:07 PM
Depends on jurisdiction. But, in most cases, the attorneys can argue your “expertise”. It could stem from work experience, degrees, or certifications.
Avatar
Andrew Rathbun 4/21/2020 7:09 PM
To add to that, awards too. If you do something and get nationally recognized, you best believe that helps your credibility as an expert witness
Avatar
Wow, that’s really cool. Isn’t it true you can even get paid to testify and it can pay very well? (edited)
Avatar
Unoriginal_name 4/21/2020 7:11 PM
Yes, but mostly only for the defense. Sometimes, the prosecution will, but more likely for the defense
Avatar
Andrew Rathbun 4/21/2020 7:13 PM
Prosecution is working with taxpayer dollars. Defense is working with whatever the budget is of the defendant. That can be deep or shallow. Deep pockets naturally will pay whatever they can to try to prove their innocence. That's where you're probably hearing about it being a lucrative gig
Avatar
Ah okay that makes sense
Avatar
Andrew Rathbun 4/21/2020 7:14 PM
Often times people do expert witness stuff after they retire or leave a LE career. Experience gained in LE is invaluable
Avatar
Unoriginal_name 4/21/2020 7:14 PM
I second what @Andrew Rathbun is saying. More likely to get rich working for the defense.
👌 2
Avatar
Andrew Rathbun 4/21/2020 7:15 PM
I bet that's the case most jurisdictions. Just nature of the beast
7:17 PM
Prosecution will pony up in rare cases if they think the return on investment is there for the taxpayers. Likely on really bad cases like homicides or other horrible crimes. They wouldn't ever do it for some comparatively petty crime like larceny
7:18 PM
But often they'll just err on the side of keeping their resources in house and working with what they have internally
Avatar
RandyRanderson 4/21/2020 8:06 PM
@Tyføøn quite a few times. Federally in the US it is very vague and the line to qualify is merely that you have more expertise than the lay is going to have. Where you get into trouble is if you're playing the pseudoscience type crap. Where they'll try to get ya is during cross to discredit. Once you get that mark, I've been told it becomes a bit harder to get it again. I was called back for one case on prosecution side -- I wanted to do it for free but they wouldn't let me. That was a nice paycheck for random computer stuff I didn't need lol.
Avatar
Most of my testifying has been in civil cases. I’d also disagree that LE experience is invaluable. Like anything else, there’s good and bad just like if you come from military or civilian backgrounds.
8:13 PM
I carry a lot more emotional baggage from doing LE work that I desperately wish I could have done without.
Avatar
Andrew Rathbun 4/22/2020 3:03 AM
Most of my testifying has been in civil cases. I’d also disagree that LE experience is invaluable. Like anything else, there’s good and bad just like if you come from military or civilian backgrounds.
@driflee yep totally fair point. Thanks for your input
Avatar
Thanks for your input everyone! (edited)
Avatar
Looking for suggestions on combining a large number of split ZIP files. Have over 450 1gb zip chunks. Usually I'd use command prompt, but there are too many to type out, so perhaps a way to script it. I'm looking for tips online for this but nothing seems to work. Any one know a good way to do this in windows, or know of software that might be able to combine split ZIP files into a single ZIP?
Avatar
AzuleOnyx🛡 4/22/2020 5:02 AM
@fraser how are they named?
Avatar
Is it split ZIP files of the same file?
5:04 AM
for example an .iso file
Avatar
files are file.z01, filez02......file.z450, then finally file.zip
5:06 AM
its a split zip of many files in a single archive
Avatar
Does highlighting them all and doing extract here not combine them all to one file, then you could rezip?
Avatar
Well, its many files within lots of folders, I could do that but I find its taking along time to unpack, then I'm encountering some file pathing issues having to acknowledge it, so its taking longer than I was hoping to. Also the folder timestamps get changed this way. Was hoping to keep the files intact in the archive if possible.
Avatar
AzuleOnyx🛡 4/22/2020 5:12 AM
you can try to fix the zip with zip -ff or you could try and unsplit it using zip -s 0 file.zip --out unsplit_file.zip
5:13 AM
then try and decompress it
Avatar
ok, i'll try and see if I can use that command.. thats a linux command right? Right now working in windows, but I'll look into getting a linux vm on it or something.
Avatar
AzuleOnyx🛡 4/22/2020 5:18 AM
Ooo ... Windows .. 😉
5:18 AM
I wonder if 7z can also do that
5:18 AM
well, you can just setup a VM attach it to the folder and just do it from the folder
5:19 AM
no need to copy it to the VM directly
Avatar
yeah, i think that will work. just reading up on the zip command and it may work.
Avatar
AzuleOnyx🛡 4/22/2020 5:20 AM
Windows WSL might be able to as well
5:20 AM
I am not sure if it replicates that command
Avatar
@fraser 7zip.org will solve that problem
👍 2
Avatar
okay i'll revisit 7zip. I don't think i was using it properly. Right now trying to work it with ubuntu for windows and zip, also have winrar maybe doing what I need to do. Using the repair function, its repacking the archive into a new single zip file, although not sure if the final zip file is going to be good.
Avatar
AzuleOnyx🛡 4/22/2020 6:03 AM
if there are not any serious issues it should be fine.
Avatar
so i was doing it wrong in 7zip.. see the right way to do it. also combining with 7zip on a different machine to see what the end results look like compared to winrar. thanks.
👍 2
Avatar
Hi, anyone have experience with Magnet's Custom Artifact Exchange? I am having trouble getting into their Custom Artifact Documentation.
Avatar
@SDB I just had the same problem
7:55 AM
I logged in to the @Magnet Forensics Custom Artifact Exchange and the link for the documentation on the right gave me the error "support.magnetforensics.com refused to connect."
Avatar
Let me check and see if our links are down.....Hang tight
👍 1
8:00 AM
@SDB you looking for something specific?
8:01 AM
@sholmes @SDB the documentation section is currently down but they are aware of it and are working on it.
Avatar
Thanks @DougEstes for looking into it so quickly.
Avatar
@DougEstes thank you!!
Avatar
No problem, anytime. @sholmes @SDB
Avatar
and @sholmes
👍 1
Avatar
@SDB @sholmes Do either of you need a document regarding a specific custom artifact? I may have access to the PDF version of it if we have one.
Avatar
No sir. I was just checking for @SDB to confirm there was an issue.
Avatar
Oh ok, Good looking out. I have a Sharepoint access with some PDF's regarding the Custom Artifact Exchange if you needed it.
👍 1
Avatar
@DougEstes I want to write a custom artifact for a db that I am working with. Does the site that is down have docs that would help me get started?
Avatar
@SDB I may have a go by I can send you. Let me see what I can come up with
Avatar
@DougEstes Awesome. Thank you!
Avatar
@SDB Threw some stuff together for you to review. If you need more, let me know, I have to pull it out of our class manual for AX300 Mobile Class.
Avatar
@DougEstes I really appreciate it. Is AX300 the Advanced class?
Avatar
Yes it is Advance Mobile,
Avatar
I got approved for a couple classes this year, that being one of them . Can't wait.
Avatar
@SDB Good deal, I teach that one a lot so maybe I will see you in there.
Avatar
kladblokje_88 4/22/2020 10:20 AM
Hey guys, I am searching for a tool that can analyze raw images of XBOX 360's (FATX/XTAF). Tried tools like FATXplorer and 360Explorer, even tried mounting it and using some command line magic but no luck. Anyone able to give me a heads-up or at least a clue of where I can find a capable tool, toolset or procedure to work with analyzing this outdated system?
Avatar
@kladblokje_88 IEF and Axiom parse the XBOX 360 fairly well. I have used it numerous times. (edited)
10:25 AM
It treats it like a windows system.
Avatar
digiforensic 4/22/2020 10:26 AM
Can someone list me 3-4 sony's new and more secure models? (Secure: There is no known method to break it, and the phone has some security features like auto-wipe after entering multiple wrong passwords.)
Avatar
kladblokje_88 4/22/2020 10:28 AM
Really @sholmes what procedure do you use for loading in images in Axiom, just spent 2hrs on creating a case in magnet and loading up the evidence?
10:31 AM
Without being able to extract any usefull evidence really
Avatar
What are you looking for in the case? Does Axiom not find anything?
10:57 AM
We remove and image the hard drive through a write blocker using FTK Imager or similar imaging tool. Axiom could image the drive for you.
10:57 AM
I then load the E01 image into axiom as a Windows image.
Avatar
kladblokje_88 4/22/2020 10:58 AM
actually just found something in AXIOM, I have not slept enough and forgot to turn of anti-virus (edited)
Avatar
Depending on the case, I have found artifacts in Web Related, Pictures, Chat, and Video
10:58 AM
ah....yeah disable that A/V crap. LOL
Avatar
kladblokje_88 4/22/2020 10:59 AM
same, last scan only found 2 artifacts on a 250GB system
10:59 AM
Windows Defender m8
10:59 AM
Worst virus of all (edited)
Avatar
not sure what you consider useful, but I would have expected much more than 2 artifacts.
Avatar
kladblokje_88 4/22/2020 10:59 AM
Yeah same
10:59 AM
Now found around 10k artifacts on 2% of the scan
💯 1
👍 1
Avatar
What did you use to image the 250GB HDD?
11:00 AM
LMAO
11:00 AM
there you go
Avatar
kladblokje_88 4/22/2020 11:00 AM
It was imaged for me by the project organizer, I got an E01
Avatar
Got ya
Avatar
kladblokje_88 4/22/2020 11:02 AM
Huhm am now thinking about a secondary tool for verification
11:02 AM
any recommendations?
Avatar
Now if someone could figure out how to decrypte and image the PS family and newer XBOX family drives (edited)
Avatar
kladblokje_88 4/22/2020 11:03 AM
Raw images are quiet ez I guess
Avatar
Yeah you can image them all day. Decrypting the images is the bitch on the new ones.
Avatar
kladblokje_88 4/22/2020 11:03 AM
aha
Avatar
Secondary verification would depend on what artifacts you are trying to find.
11:04 AM
on your 360
11:04 AM
FTK would work
11:04 AM
Griffeye might work for image verification
Avatar
kladblokje_88 4/22/2020 11:05 AM
I am trying to not only find resemblances but also some differences between the artifacts. Trying to get a broad view of the contents of the image
Avatar
what tools do you have at your disposal?
Avatar
kladblokje_88 4/22/2020 11:05 AM
Lets see
11:06 AM
AXIOM (Proces and examine), AccesData FTK, Belkasoft EC, Blackbag BlackLight, some mobile tools and basicly everything you can get for free
Avatar
I would try FTK and BlackLight
11:07 AM
I am not sure how much is carved in Axiom vs parsed. (edited)
Avatar
kladblokje_88 4/22/2020 11:07 AM
Carved more than parsed thats for sure
11:08 AM
the reoccuring theme with axiom
Avatar
But Axiom would be able to tell you exactly where it found it so you could then utilize the other tools to validate your findings
11:08 AM
images definitely carved.
Avatar
kladblokje_88 4/22/2020 11:08 AM
Thats actually a very good hint
11:08 AM
thanks man
11:08 AM
Imma give FTK and BlackLight a try
Avatar
kladblokje_88 4/22/2020 11:16 AM
BlackLight is a no go
11:16 AM
FTK and belkasoft are on my to try list
Avatar
cool. Let me know what you find.
Avatar
kladblokje_88 4/22/2020 11:40 AM
Okido
11:41 AM
Belkasoft also gives 10k+ artifacts on a partial scan of the image, I'll fully load in the evidence tommorow since its 20:41 right here
11:41 AM
Now testing FTK\
Avatar
kladblokje_88 4/22/2020 12:24 PM
@sholmes FTK to the rescue
👍 1
Avatar
Nice
Avatar
so I know, and signed up for the free @Autopsy training MAY 15th- unfortunately I have finals up until that day- does anyone know if I can access the stuff afterwards still? (edited)
Avatar
@kladblokje_88 I had an xbox360 case recently. It’s worth doing some keyword searching in EnCase; I was looking for internet history. I found entries in both an XML format and then a binary file where each entry was separated by DEADBEEFs. Was able to verify findings for AXIOM this way. The bit I really struggled with was proving when images had been downloaded
1:11 PM
As a lot of the temporary internet cached images did not appear in ‘logical’ files we could find with fatxplorer
Avatar
kmacdonald1565 4/22/2020 1:22 PM
@Turb0Yoda i believe so. last time this was up for free i jumped on it and still havent completed it (earlier this year or very end of last year).
Avatar
Ty
1:22 PM
@Tkk
Avatar
kmacdonald1565 4/22/2020 1:23 PM
oh i should add that my login still works, just checked
Avatar
awesome! Thank you
Avatar
kladblokje_88 4/22/2020 2:04 PM
thanks @busted4n6
Avatar
anyone familiar with @Magnet Forensics Axiom producing an "agent_mmssms.db" during an Android quick image? Trying to find documentation on how it's building this database. Specifically trying to figure out where the "ID" column is being pulled from. It appears to be the primary key but I can't find anything to support that assumption. Basically I'm trying to show a gap in the primary keys that correlates with known missing text messages but without being able to see the original database I'm making a lot of assumptions.
Avatar
forensicmike @Magnet 4/22/2020 3:00 PM
ill look into that for you @whee30
👍 1
Avatar
@forensicmike @Magnet Thank you. I Googled, searched here and searched the Magnet site. I see in the logs that the agent finishes running on the device and then this is one of the files pulled down so I know it's not a mirror copy of the actual database but that's about as far as I'm getting.
Avatar
The RCFL has rules for defense experts in analysis of data in their lab. Anyone have a copy of those rules?
Avatar
DefendingChamp 4/22/2020 7:04 PM
Does anyone know why I'd be on the Cellebrite's blacklist or get flagged on the PBL List?
7:04 PM
I was in the middle of my CCPA class and now I can't go on that website anymore
Avatar
@DefendingChamp Happened to me. Just call them as it was because i was using two different computers at the same time but one had a vpn so it looks like two people were on.
Avatar
DefendingChamp 4/22/2020 7:46 PM
are they open 24/7? I can't even get their number because their website doesn't work for me
Avatar
@DefendingChamp Send me your username and password and i will build a ticket. KIDDING.... (800) 609-9912
Avatar
DefendingChamp 4/22/2020 7:48 PM
thanks
7:50 PM
damn it's closed right now
7:50 PM
good thing I got the textbook
7:51 PM
I wasn't even using it on two computers
Avatar
Hello guys ! I'm a college student and am about to finish my bachelors degree in cybersecurity with a focus on Network forensics. I've got a+ net+ security+ and CCNA. What kind of salary would be reasonable in the NYC area for a fresh college graduate with no IT experience ?
Avatar
I would say the answer is (as you will learn in this field ;)) "it depends"
💯 1
6:14 AM
Are you going to be working in a one man shop where you are doing IR, Forensics, and Architect work? Or are you going to be one of several analysts doing forensics? Private or LE or Consulting? There's a lot of variables
👍 1
Avatar
AzuleOnyx🛡 4/23/2020 6:44 AM
@DefendingChamp Send me your username and password and i will build a ticket. KIDDING.... (800) 609-9912
@4N64LIFE lmao
Avatar
Hey does anyone know of a graphing tool that would let me make a chart like virus total where you can navigate through different assets?
5:19 PM
Closets thing I've found is maltegi
5:19 PM
Maltego
Avatar
AzuleOnyx🛡 4/23/2020 6:20 PM
I think that's the main one ... what are you looking for is a link analysis tool which can manage assets
6:21 PM
If the assets are network/computer based, then most network fault isolation tools could be used ... but if it network, endpoints, files, phones, etc ... then you'll need a real tool
Avatar
does anyone know what the hourly rate for a sysadmin is in the US?
Avatar
@hilt86 might be better asking that in #training-education-employment
Avatar
Hi All, I have a phone and I have no idea what it is. It has no markings on the outside apart from the word carbon written on small letters at the bottom of the phone. I have seen online there is a carbon 1 mk 11 but it isn't this. Can't find an imei number. It has a thin horizontal white line on the screen when it is booting up. It also has a Dutch KPN SIM. Has anyone ever seen this before?
Avatar
JeezyCreezy 4/24/2020 8:44 AM
@dfmiket any info on the SIM tray?
Avatar
@JeezyCreezy nope, nothing. Device is also locked with secure startup
Avatar
anyone have any experience in tracking spoofed phone calls back to the source?
Avatar
deepdive4n6 4/24/2020 4:14 PM
@Bclark Yup. Hope you like writing warrants. ; ) Message sent in PM. (edited)
Avatar
DefendingChamp 4/24/2020 11:00 PM
Due to covid-19 let's say theoretically, we have customer/client come in with a phone to get an extraction in room A with a computer. I want to do an extraction in ..say...room B, I know there's usb over network techs out there. I'm curious if anyone has experimented and see if they are able to do extractions without physically plugging the phone in their local computer. Is it possible?
Avatar
JeezyCreezy 4/25/2020 1:01 AM
@dfmiket Crikey! May be worth speaking with the folks over at Cellebrite if you haven’t already. Good luck!
Avatar
Skewy - anti eavesdropping - Tool to prevent eavesdropping and ultrasonic access of your smart phone. https://github.com/skewyapp/skewy1-0
Tool to prevent eavesdropping and ultrasonic access of your smart phone. - skewyapp/skewy1-0
Avatar
@hilt86 might be better asking that in #training-education-employment
@OllieD thanks
Avatar
Can we have an ICS/OT channel?
Avatar
Andrew Rathbun 4/26/2020 5:09 PM
@november spell that out for me. Those acronyms probably mean something completely different to me than they mean to you
5:10 PM
To me that's incident command system and overtime. But that's just the former cop in me talking
Avatar
Industrial Control Systems (like SCADA) /Operation Technology ( in ships, factories, etc) (edited)
👍 1
Avatar
AzuleOnyx🛡 4/26/2020 5:14 PM
I had to do an IR event for the military on SCADA. This was before I was studying IR. The only training was one 8 hr computer based training.
5:15 PM
Let's say that I felt way out of my league and I had zero knowledge of what I was doing (outside of navigating the end systems which were just Linux boxes posing as SCADE control units).
Avatar
Andrew Rathbun 4/26/2020 5:16 PM
@november considering how niche of a topic that is and the overall desire to not have 50+ channels like some other servers, is there any way that discussion can just fall under #incident-response?
Avatar
Actually it can be done in vehicles and drones as well... (edited)
Avatar
Andrew Rathbun 4/26/2020 5:17 PM
We do have #vehicle-forensics and #drones that are begging for activity
👂 2
Avatar
Yeah fair point. Otherwise we may end up with channels like Smart TV-fridge forensics 😄 (edited)
Avatar
Andrew Rathbun 4/26/2020 5:20 PM
That's exactly what I'm trying to avoid. I'm closer to removing a couple channels than adding a couple channels so I'll always be looking for ways to consolidate suggestions into existing channels. I will field all requests from the community but really we're pretty fat on channels and it has to be a pretty popular request to add another channel at this time
👍 2
Avatar
AzuleOnyx🛡 4/26/2020 5:21 PM
Yeah fair point. Otherwise we may end up with channels like Smart TV-fridge forensics 😄
@november As long as we are running away from the attacking fridges ... could be fun really
Avatar
I m sure we will live to see the day, where a fridge will be infected with a ransomware and you ll have to pay just to eat something in the middle of the night (edited)
Avatar
AzuleOnyx🛡 4/26/2020 5:24 PM
lol
5:25 PM
All I think of is the Netflix movie 'NextGen' (edited)
Avatar
It could be a black mirror episode
Avatar
AzuleOnyx🛡 4/26/2020 5:27 PM
Yeah
Avatar
If we see it on Simpsons, then it will probably happen in the next 7-10 years
Avatar
AzuleOnyx🛡 4/26/2020 5:34 PM
oh god
5:34 PM
lol
Avatar
AzuleOnyx🛡 4/26/2020 5:57 PM
.#DISCSANS #ICS #CTF Challenge Registration opens tomorrow! First come, first serve, Limited seats! But you have to register to compete! https://t.co/XKpFUs6Goc @DragosInc & @SANSInstitute's first ICS Virtual Conference starts May 1st and it's free!
👍 1
5:57 PM
Sigh, I am already doing something else 😦
Avatar
Has anyone ever did any EnCase EnScript development before?
Avatar
Is anyone familiar with the purpose of the “CryptNetUrlCache” folder (on Windows server 2012 R2) I have a WScript file in that that pulled ransomware to the machine but I’m not sure how the file was put in that folder in the first place I have a feeling that it’s related to IIS being installed as it’s in the SystemProfile Appdata (edited)
Avatar
AzuleOnyx🛡 4/27/2020 6:50 PM
Have you checked in Windows event logs? Maybe ID 4656 or 4663 might help.
Avatar
Thanks! I’ll have a look, did you have an idea of which Event log is best to check? (Ie, application, security etc)
Avatar
AzuleOnyx🛡 4/27/2020 6:56 PM
Security
6:57 PM
If you use Zimmerman's EvtxCmd tool you can search all of them for the ID numbers
Avatar
Great, will give that a go.
👍 1
Avatar
No results for those event ID’s unfortunately
Avatar
AzuleOnyx🛡 4/27/2020 7:19 PM
😦
7:22 PM
Umm, I wonder if they are just not logged. If you are using default logs, it might be harder to figure it out.
7:23 PM
I am not too familiar with IIS maybe you can find something in the logs/events for it. Of course, malware can always alter them unless they are sent to a SIEM.
Avatar
Yep, part of an IR matter I have on. I can see that the file was used to pull down a VBS and then execute the ransomware. Just working to ascertain how that got there to begin with. Thanks for your assistance in any case @AzuleOnyx🛡!
👍 1
Avatar
AzuleOnyx🛡 4/27/2020 7:51 PM
I would check what is being logged. Also, you could check network logs as well.
Avatar
Unfortunately it was running in AWS and they don’t have any logging enabled.
Avatar
AzuleOnyx🛡 4/27/2020 9:24 PM
Oops. Cloudwatch ... 😞
Avatar
The list of recommendations is quite long 🙂
Avatar
AzuleOnyx🛡 4/28/2020 5:12 AM
haha
Avatar
@Dorsidhion Attackers can hide and execute scripts from almost anywhere on the file system, depending in part on their level of permissions. No doubt you know this already. To answer your question, though; the CryptNetUrlCache directory is used to cache content associated with SSL/TLS connections. The more interesting point is the account, SystemProfile.
6:42 AM
@Dorsidhion Maybe someone from Magnet can weigh in with more precise details. However, I would be more interested in the profile, and how/why that profile was used.
Avatar
Is it possible to determine if an android device has secure startup enabled within recovery log?
Avatar
i don't think it is possible @Pacman
Avatar
Thanks
Avatar
Russell Abel - Bastrop County SO 4/28/2020 2:38 PM
Can I please get someone from Cellebrite call me ASAP? (512) 549-5081. My IT Department is refusing to clear Cellebrite extractions and readers. I need someone who can talk to the IT director and tell him that the files safe because he won't believe me.
2:39 PM
@clb_Ronen
2:42 PM
@heatherDFIR
Avatar
Russell Abel - Bastrop County SO 4/28/2020 2:56 PM
or my cell phone (512) 229-5763
Avatar
Wow cool there are law enforcement in this server haha. (edited)
7:39 PM
Im a college student for computer forensics.
Avatar
Had a former LE forensic person apply for an open job with my company. Here is what I have to say. You may be a great examiner and even a great expert, but if you don't know how to treat others your career will be very short when you step outside of law enforcement. Over the years i have met and made friends with many forensic experts that work for le and work for private companies and defense firms. There is never an us v them and that attitude is not good in any field that is suppose to represent a science. There is no exclusivity over a science and as true professionals in any field of science there are going to be those who disagree with your opinions. Opinions need to be tested and challenged otherwise they are no good. If someone disagrees with your methods, science or results it doesn't mean you get but hurt and have an attitude. When vetting a forensic expert outside of LE we don't look at rank or training classes, we call former defense firms who had to them in a deposition, former colleagues who worked with them, instructors at school and other defense experts who wrote opinions different than theirs. When you step out of LE and want to work for private law firms there is a huge amount of respect that has to be given to the rule of law and justice and you must be able to back everything you do with science. To be honest most LE have it pretty easy because a lot of the reports do not get challenged and defendants can barely pay for their attorneys let alone a defense expert. But when you step into working for defense lawyers it is game on. You have to have skills like you have never seen before because everything will be challenged and you cannot afford to be wrong because trial after trial you will be challenged. This examiner that just applied failed in all respects by treating others who opposed his views with disrespect. Not a good candidate. (edited)
👍 6
💯 1
Avatar
I really do feel OSINT is so important though.
7:45 PM
That and criminal profiling transitioning into computer enviornment.
Avatar
@Russell Abel - Bastrop County SO just seeing this message now. Did you get this sorted out ?
Avatar
Anyone here uses Helix of FireEye?
Avatar
Andrew Rathbun 4/29/2020 3:17 AM
Large text from above
@4N64LIFE You catch more flies with honey than vinegar. This applies to all professions 👍
(edited)
Avatar
Digitalferret 4/29/2020 5:06 AM
@4N64LIFE agree totally. hire for attitude, most else can be trained
Avatar
Andrew Rathbun 4/29/2020 5:07 AM
The one catchy saying I heard once and has stuck for me for years: hire for character, train for competence.
Avatar
Digitalferret 4/29/2020 5:08 AM
yup, that's about it
Avatar
Does anyone here have experience in drafting subpoenas to get subscriber data on an IP address
Avatar
Andrew Rathbun 4/29/2020 5:10 AM
@Issa pretty much anyone in LE in an investigative role should have some experience with this. What's your specific question?
Avatar
Is it an effective means in your opinion? How valuable as an investigative tool can it be if the user uses fictious email and a masking tool for there IP address like a proxy.
5:11 AM
Espicially how rampant and cheap masking your IP address can be nowadays.
5:11 AM
And many providers dont verify a subscriber
Avatar
Andrew Rathbun 4/29/2020 5:12 AM
First of all, I wrote a guide I used when I was LE here so you may find it valuable as a student: https://aboutdfir.com/resources/preservation-letter-search-warrant-templates/ you can see some of the templates I put together and get a general idea for how search warrants are put together, at least in my experience.
Avatar
fictitious*
Avatar
Andrew Rathbun 4/29/2020 5:12 AM
You can edit posts in Discord, FYI 😛
😆 1
Avatar
Oh my bad
Avatar
Andrew Rathbun 4/29/2020 5:13 AM
All good! Just FYI
5:13 AM
If there was ever an IP address located during an investigation, 100% of the time we served the subpoena. However, if the IP address was run through ARIN and it came back to somewhere outside of the US, then we didn't bother.
5:14 AM
Usually, if we hit one of those masked IP's, and if we have no other investigative leads, we closed the case due to lack of investigative leads (edited)
Avatar
I felt I knew that, I don't expect of course local or state officials to deal with outside nation states
5:14 AM
I don't even know if they'll cooperate without state department (edited)
Avatar
Andrew Rathbun 4/29/2020 5:15 AM
I felt I knew that, I don't expect of course local or state officials to deal with outside nation states
@Issa fact of the matter is they don't have to submit to your search warrant if they're out of your jurisdiction. I was told once to submit one to WeChat which is based out of Hong Kong, IIRC, and guess what? I never heard back from them lol
5:15 AM
but I was able to add a line to my report that I tried, and that's all that mattered to my agency at the time 🤷‍♂️
Avatar
Lol I forgot to edit 😂
Avatar
Anyone on here from Scotland Yard?
Avatar
I feel the FBI would be more likely to step in there.
5:17 AM
IDK though I'm just a student so I dont know the inner works of bureaucracy for police agencies
Avatar
Andrew Rathbun 4/29/2020 5:17 AM
FBI typically won't take cases unless they hit a certain threshold of financial loss or other very large threshold.
Avatar
I'm trying to do Computer Science and focus with Forensics displicine. I like the legal field (civil investigations) and I love investigating and figuring out cases.
Avatar
Andrew Rathbun 4/29/2020 5:23 AM
I think you'll learn a lot here as you see working professionals conversate with each other. I wish you the best of luck in your studies!
Avatar
Russell Abel - Bastrop County SO 4/29/2020 5:29 AM
@CLB-Paul No, I haven’t.
Avatar
CALL FOR HELP - International kidnapping case. Father wins custody. Mother - Programmer, worked for firms worldwide, dual citizenship, converts 330k to crypto, takes cash, has family take cash to London and travels with her to London. FBI slow to respond thinking mom will come home, court orders phones to be examined by my firm. Found pictures of child in London with extended family and cash in suit case pictures etc. Private contractred Surveillance teams sat on home of relatives in London for 3 days. 9 months - FBI finally tags passport with a take child into custody, but says they have no control over Scotland Yard and that SY is working on it (1 year) and child is still missing. Anyone have a good contact at Scotland Yard to see if they have done anything on this matter. FYI - NCMEC after taking report said that they will only help the FBI and won't update the father and he needs to call the FBI. The FBI says SY has the case and it is out of their jurisdiction. Not here to talk about a broken system, just need a contact to discuss the matter. (edited)
Avatar
Andrew Rathbun 4/29/2020 6:44 AM
@Law Enforcement [UK]
Avatar
hope someone can help you
Avatar
JeezyCreezy 4/29/2020 8:38 AM
Any X-Ways Forensics gurus around? Having trouble reopening a case in the program, receiving the following message: “This file has an unsupported format. Please try with a different version of X-Ways Forensics.” Tried in the latest version (19.9), the version I created the case with (19.8) and the previous version (19.7) with no luck.
Avatar
what is the extension of your evidence file?
Avatar
JeezyCreezy 4/29/2020 9:41 AM
@november .xfc
Avatar
xfc is pretty standard on all of them
11:11 AM
is it possible it became corrupt
Avatar
Any contacts in Seattle area that does mobile forensics in the private field?
Avatar
Does anyone know what Q-Type is?
Avatar
Digitalferret 4/29/2020 4:02 PM
@Tyføøn maybe throw it up on virustotal for a hash match?
👍 1
Avatar
Digitalferret 4/29/2020 4:17 PM
only other thing i've seen is https://www.quick-type.com/speedtyping/screenshots.html - free trial is labelled trialversion.exe so can't say if paid for would be quicktype or q-type. (Edit: installed program file is quicktype.exe) (edited)
speed typing increase your typing speed with Quick Type. Typing faster with quick type speed typing software.
Avatar
@JaiRoc I have worked with Allison Goodman in the past: https://ediscoveryinc.com/our%20team/allison-goodman/
Allison Goodman is the President of eDiscovery Inc., a consulting firm that provides digital forensics, vehicle forensics and electronic discovery consulting to lawfirms, corporate counsel and governmental entities nationwide. Prior to founding eDiscovery Inc. in 2006, Ms. Goo...
👍 1
Avatar
anyone good with regex
Avatar
Digitalferret 4/30/2020 6:13 AM
define "good" 🙂 maybe post what you are after? If i said Yes, and it was beyond my understanding, I'd be compelled to leave server in a state of shame
😆 1
Avatar
good as in could help me with a regex query
6:53 AM
don't worry it'll be better than mine 😄
😁 1
Avatar
I'm not good at regex, but my go to for figuring out how I want to do them is https://regexr.com/
RegExr is an online tool to learn, build, & test Regular Expressions (RegEx / RegExp).
6:54 AM
@Sudo
Avatar
Does anyone have any experience with getting into a locked TREZOR model T crypto wallet?
Avatar
@tippenring thanks
7:02 AM
as it turns out, my regex is correct
7:02 AM
but Python isn't reading it as intended
Avatar
@Sudo Keep in mind there are a few different types that are interpreted differently. You have Perl, basic, extended, and probably others. Not sure which one Python uses myself.
7:06 AM
well, it works as intended in a standalone python script
7:06 AM
but when I run the exact same line inside my full program, it doesn't
Avatar
oopsie, I had it returning false when it should have returned true
7:17 AM
problem solved
👍🏻 1
Avatar
chrisforensic 4/30/2020 9:20 AM
... and now to something completely different :) @Cellebrite is it possible to order anywhere a T-shirt with your logo ? saw heather with one on twitter 🙂
Avatar
@chrisforensic not yet but trying to figure out how we can do it
Avatar
chrisforensic 4/30/2020 9:22 AM
@chrisforensic not yet but trying to figure out how we can do it
@CLB-Paul thanks paul !
Avatar
Andrew Rathbun 4/30/2020 9:23 AM
That would be awesome. I've bought stuff from the Magnet and SANS merch stores a couple times. I'd love to do the same for the other vendors. Stickers and various shirts!
Avatar
heatherDFIR 4/30/2020 9:24 AM
... and now to something completely different :) @Cellebrite is it possible to order anywhere a T-shirt with your logo ? saw heather with one on twitter 🙂
@chrisforensic You know - I have been asking for this. I think we need a store for our stickers and shirts that is non-profit. Working on that now!
cellebrite 12
💯 6
Avatar
Any Uk law enforcement on today?
Avatar
Andrew Rathbun 4/30/2020 1:46 PM
It's almost 2200 their time so might not get as many right now compared to in the morning our time
Avatar
Any contacts in Seattle area that does mobile forensics in the private field?
@JaiRoc Stroz Friedberg (now AON) is top company. .
👍 1
Avatar
This is a special post because I fully based on another researcher, s1guza’s 0day. All of this story began from the following tweet: Siguza told us that his 0day was patched in the iOS 13.5 beta3. So this is actually a sandbox escape 0day for the newest, non-beta iOS version (...
👀 1
5:38 PM
sms stealing zero day
5:38 PM
🤔
Avatar
btw do you guys know if the upcoming event connect2020(from carbon black) presentations would be uploaded?
Avatar
Anyone ever examine a PSP (PlayStation Portable)? anything good to be had on it or the memory card? Don't want to look at it if i don't have to
Avatar
AzuleOnyx🛡 5/1/2020 6:42 AM
Anyone ever examine a PSP (PlayStation Portable)? anything good to be had on it or the memory card? Don't want to look at it if i don't have to
@Majeeko I guess depends on what case you are working on. It would be mostly saved games and maybe usage data. It could be used to show someone was doing something else. If I recall, there were no cameras or chat features on the PSP.
6:43 AM
Oh, though, someone could have hid data on it. Maybe they even used homebrew to load custom software.
Avatar
@AzuleOnyx🛡 , Thanks for the reply, I managed to find a research paper on it. Looks like the mem card could hold images, videos ans web history so looks like im going to be imaging th memory card and see what i can see.
👍 3
6:45 AM
paper attached for any curious minds.
👌 2
Avatar
AzuleOnyx🛡 5/1/2020 6:53 AM
I figured someone got bored to look at it.
6:53 AM
I missing the PSP 😦
6:55 AM
I know about images/videos. You can basically write anything to it. It's not like the Nintendo Switch or some phones where it 'adopts' the storage and you can't really move the SD card around.
6:55 AM
GL!
Avatar
Andrew Rathbun 5/1/2020 4:21 PM
@vanquish it's good to see these being more actively maintained
Avatar
Yes I agree.
Avatar
Anyone ever witnessed a prosecutor take the position that Graykey images cannot be released to the defense? (edited)
Avatar
DFIR_Trooper 5/2/2020 12:20 PM
Anyone ever witnessed a prosecutor take the position that Graykey images cannot be released to the defense?
@4N64LIFE Haven't had that experience in 9th Circuit Fed, or SoCal local.
Avatar
Has anyone every examined a Samsung Smart TV? I am interested in log files of attached/connected devices. (edited)
Avatar
Deleted User 5/3/2020 11:58 PM
https://www.exploit-db.com/docs/18244 Active Directory Offline Hash Dump and Forensic Analysis
Avatar
@Majeeko yes, I have some research from late 2018 if you want it?
Avatar
@jbell6357 that would be good, thanks.
Avatar
was there anyone who was good with python again?
1:55 AM
not sure how to do something (classes)
Avatar
@goofycom I did a chipoff on an LG SmartTV. We were able to recovery internet history and a few other artifacts. If I can find the extraction I will be happy to go over it again.
Avatar
@goofycom I just pulled the test chip out and I am reimaging it again. Let me know if you need me to check anything specific. I know it isn't your model, but maybe it can give you some guidance.
Avatar
Maltego fans, any idea why a virus total transform shows less subdomains then website?
8:52 AM
Public api key.
Avatar
Does anyone have experience serving legal process to square Inc? I have sent a warrant over several months ago.. I have a reference number but radio silence from them since. I have asked for updates twice...
Avatar
Andrew Rathbun 5/4/2020 12:14 PM
@whee30 are they US based?
Avatar
@Andrew Rathbun it is based out of San Fran I believe
Avatar
Andrew Rathbun 5/4/2020 12:19 PM
Weird, they should be responsive then. Then again, I've had to wait 3-4 months for Google to get me what I need so maybe they are just that slow?
👍 1
Avatar
Dorsidhion 5/4/2020 9:30 PM
Anyone have any experience parsing fortinet logs and could be me to a resource that can take me through the process?
Avatar
@Dorsidhion how much data is it? You can install security onion and use elasticsearch? Or use Splunk if it’s less than 5gb a day?
Avatar
Dorsidhion 5/5/2020 4:11 AM
It’s circa 8GB in total. Historical export. I’ll have a look at security onion and elastic search, thanks!
Avatar
following problem: A file is marked as being deleted without a tracked time-deletion date. However, timestamps such as File Accessed, Entry Modified etc. point e. g. to the 30.12.2019. Is it safe to assume that the deletion must have happened at or later than the 30.12.2019 as the file was accessed/created/modified/changes in the mft entry occured or are there other operations that might have triggered the timestamp changes apart from user actions after the file deletion?
Avatar
Digitalferret 5/5/2020 8:59 AM
just my 2c, but never "safe to assume" anything.
9:01 AM
Avatar
Matt - Monolith Forensics 5/5/2020 12:12 PM
@.yuzumi. Did you check the USNjrnl to see if there are records from 30-12-2019? Also, I would look for user artifacts related to the file (Lnk, Shellbags, etc) to show a known last existence time I wouldn't use language like "assume", but you can use other evidence to provide support for a possible time range of deletion (edited)
👍🏻 1
Avatar
@Magnet Forensics i need access to the may5 for the two groups. have q about the chromebook and the timeline
Avatar
@Dr. Simba maybe hit your questions here if the channels are now locked
Avatar
chip off layout for the chrome and since the data were encrypted what method was used to decrypt
12:15 PM
since chip off is needed and having a chip reader is a must, do u use rusolt @Magnet Forensics
Avatar
@Dr. Simba - We did not decrypt the data from the chip-off extraction. There are encrypted portions (Partition1) and unencrypted partitions labeled ROOT. The user data is not there. The analysis of unencrypted content was done via logical decrypted extractions. As for the chipoff, yes a chip reader is a must. There are a variety. I don't know which one was being used by the folks that read the chip that day. Personally, I am a fan of Dataman.
Avatar
@b1n2h3x i need to connect with the team please. I attended the session today and had few q
12:26 PM
hi for the apfs and bitlocker any work around ?
Avatar
Digitalferret 5/5/2020 1:07 PM
@Matt - Monolith Forensics yep, totally. holistic and supporting evidence etc. fuller picture
Avatar
@Andrew Rathbun hopefully they’re just slow and not uncooperative. No notes about it in search.org. I have a confirmation number from around three months ago and I’ve asked for updates several times with no results. It’s square inc who manages cash app among others
1:38 PM
They’re a huge point of sale company now, I was hopeful that we could get good results from them
Avatar
Andrew Rathbun 5/5/2020 3:11 PM
FYI I was just provided a few GoBy's for Google accounts and Chromebook contents. They're linked here - https://aboutdfir.com/resources/preservation-letter-search-warrant-templates/google/
Legal Disclaimer The information listed below is purely informational in nature and not meant to be a substitute for legal advice. One should consult with their respective jurisdiction’s district attorney, prosecutor, judge, etc prior to using this language for any legal proce...
Avatar
Posture King 5/5/2020 3:12 PM
anybody with expertese in network forensics think they would be able to help me complete a practice exam question? topic is related to packet captures/beacon frame analysis
Avatar
Andrew Rathbun 5/5/2020 3:39 PM
@Posture King try in #network-forensics
Avatar
DefendingChamp 5/5/2020 9:26 PM
Is there anyone from Cellebrite here?
9:27 PM
I'm going through my CCPA training, and the images don't match the videos in the course nor the book to the tee. the results are different slightly
9:27 PM
I'm wondering if that's going to be an issue during my test?
Avatar
Andrew Rathbun 5/5/2020 11:43 PM
@danmiami0001
Avatar
Sir Penguin McCrane 5/6/2020 4:37 AM
Is anybody aware of any Digital forensic proficiency testing services they would recommend. With Forensic Access stopping i need to find a new one.
Avatar
@Sir Penguin McCrane are you looking for computers or phones? we had to use CTS this year but their tests don't actually cover what we're accredited for. For phones they send you a extraction file and get you to root around in databases to answer questions about the resulting data, whereas we are only accredited for getting the extraction completed in the first place. Would be interested in any other responses to this as I think the market is a little dry!
Avatar
Sir Penguin McCrane 5/6/2020 4:51 AM
Looking for both. Either a provider who can supply both or two providers one for each. Yes I've tried doing some research but its not been fruitful. There's non in the UK and very limited suppliers of this service out there
Avatar
We were advised by our quality management team to just do the same test again the following year, regardless of its usefulness, as UKAS just want the tick in the box to say it's been done. I'm not a fan - stuck between a rock and hard place!
Avatar
We hit that issue with CTS as well, that it doesn't cover what we are accredited for but our qual team said keep it up anyway. To mitigate it we've also got ILC and have been doing internal blind tests which UKAS seemed pretty keen on with our last assessment
5:05 AM
There's definitely a gap in the market for decent proficency tests. None so far have actually offered extraction of data from a handset. We tinkered with the idea of ISPing an image of a handset onto multiple devices so that the data matched up but haven't had the time to hit that properly
Avatar
Can anyone assist?
Avatar
@Pacman Security policy on the PC? Our bunch have to use standalone machines for similar issues (edited)
Avatar
NapsterForensics 5/6/2020 6:03 AM
Did anyone receive a certificate of attendance from the Magnet for the Magnet summit 2020? I saw someone posted it on LinkedIn.
Avatar
I got one. It was in a "Thank you for attending Magnet Virtual Summit" email. (edited)
👍 4
Avatar
By Michael H. Keller
New legislation would try to curb the illegal imagery with record levels of funding for law enforcement. The bill, coming in response to a Times investigation, also calls for a new oversight position in the White House.
7:17 AM
Get ready to buy some new tools!!!
Avatar
Can anyone assist?
@Pacman is theis data in a DVD? try adding the set to a folder on a USB device or hard drive.
Avatar
ThatLukeGuy 5/6/2020 8:08 AM
No necessarily forensics related per se.... anyone have any success subpoenaing records from Venmo? Case where a debit card was stolen and used to Venmo money to the suspects. Transaction log from bank of the victim shows no identifying information of the suspect or Venmo account. Venmo's portal for legal service does not seem to have a category for such incidents....
Avatar
@Andrew Rathbun @sholmes regarding square inc not responding - speak of the devil it came in today. Three months and change turnaround.
👍 3
Avatar
Andrew Rathbun 5/6/2020 9:50 AM
Sometimes you just gotta talk about it 🙂
Avatar
Anybody have experience with getting access to CSAM hash sets. I have reached out to Project Vic twice and gotten no response. Not sure if they are closed down for time being or if I need to go another route. Any assistance would be appreciated.
Avatar
@dd4n6DET56 Do you have access to ICACCOPS (https://www.icaccops.com/users/login.aspx?ReturnUrl=%2Fusers) ?
Avatar
dd4n6DET56 5/6/2020 2:11 PM
@goalguy I do not. Do I have to be associated with ICAC to get access?
Avatar
@dd4n6DET56 I am not 100% sure about that. However, I do know the license and everything is handled through ICACCOPS. I believe as long as your are associated with a PD you can apply for access. (edited)
Avatar
dd4n6DET56 5/6/2020 2:16 PM
@goalguy I am not directly associated with the ICAC task force, but get the referrals for my department. I applied and it says that it will verify my credentials with the ICAC Commander for the area. Guess we will see what happens. Appreciate the assistance.
Avatar
DefendingChamp 5/6/2020 4:11 PM
how are you guys handling phones nowdays? using gloves or constantly washing your hands
Avatar
bytesdigger 5/6/2020 4:50 PM
😆 1
4:50 PM
Like that
4:51 PM
Seriously tho, gloves and hands washing. I was already doing this before covid!
Avatar
Andrew Rathbun 5/6/2020 6:54 PM
We are pleased to announce the release of DCode™ v5, our free timestamp conversion utility. Now with 60 different timestamp conversions and date/time encoding. #DigitalForensicAnalysis #DFR https://t.co/IJdqJWvinA
👍 5
6:56 PM
how are you guys handling phones nowdays? using gloves or constantly washing your hands
@DefendingChamp when I'd get bloody phones or other.... Bodily fluids on them, I'd just roll with gloves. I'd do the same thing today if my hands were on evidence phones with any regularity.
👍 1
Avatar
AzuleOnyx🛡 5/6/2020 6:59 PM
@Andrew Rathbun I read: "When I get the bloody phone .. " ... I was a bit angry at your phones. 😛
😂 1
Avatar
2 pairs of gloves as standard in our office even before the pandemic broke.
Avatar
Dr. Kaan Gündüz 5/7/2020 2:36 AM
put all mobile devices in a bus and let there be light!
Avatar
Anyone use Griffeye DI Pro with built in LACE carver?
Avatar
@dd4n6DET56 you should have no problems being approved by your ICAC Task Force Commander. Just explain to him you do digital forensics and just need access to the ProjectVic hashes when he emails you. My BCERT instructor had all of us do this in class when we attended.
Avatar
Hey all, I was wondering if anyone can recommend me offline translation tools for forensic investigations that have held up in court.
Avatar
dd4n6DET56 5/7/2020 5:29 AM
@dfir_rick I reached out to a contact at our ICAC task force and gave them a heads up So hopefully it will work out. Appreciate the insight.
Avatar
@dd4n6DET56 No problem!
Avatar
Anyone use Griffeye DI Pro with built in LACE carver?
@3X3 We use it as a secondary image carving tool after AXIOM
Avatar
Will DM you Aaron, thanks!
Avatar
ed.greybeard 5/7/2020 11:14 AM
@Magnet Forensics I sadly missed the talks today due to lockdown shenangians, will they be uploaded anywhere?
Avatar
There will be a summary at the end of the week with all of the sessions which are allowed to be recorded. Some sessions due to content will not be available as recordings, although most will.
👍 2
Avatar
ed.greybeard 5/7/2020 11:17 AM
@b1n2h3x that's really excellent news, thank you
Avatar
Is anyone from @griffeye on here?
Avatar
@b1n2h3x Is there a trick to the spelling of the band. I think I have spent more time typing it in variations than the I should. hahahaha.
Avatar
@Ghosted Please see the mvs2020-hunt room
Avatar
Andrew Rathbun 5/7/2020 11:44 AM
#deleted-channel
Avatar
Anyone else really enjoying the Magnet Virtual Summit? - It's something that I wouldn't be able to attend if it was a live event at a venue (due to being quite the distance away), and the talks and activities have been interesting so far magnetforensics_alt (edited)
💯 2
magnetforensics 1
magnetforensics_alt 1
👍 2
Avatar
Andrew Rathbun 5/8/2020 4:33 AM
@3X3 the summit has been a lot of work for me leading up to and during the events but I think it's awesome. I hope the server being integrated has been of added value to everyone.
4:33 AM
Honestly it's turning out better than I expected it to be which is a really positive development.
👍 5
Avatar
The work everyone involved has put in is definitely appreciated. 🙂
😃 1
Avatar
Andrew Rathbun 5/8/2020 4:35 AM
Yep I've seen a lot of behind the scenes from the Magnet people and they are BUSY. Kudos to them
😄 3
Avatar
mickeyftnt 5/8/2020 4:41 AM
I've enjoyed it. Learned some new things along the way and new ways of doing things (e.g. the Android App Artifacts talk, Android App Reversing Engineering for Examiners)
magnetforensics_alt 4
Avatar
mickeyftnt 5/8/2020 6:31 AM
Not too sure where this should go... but, does anyone know if it's possible to set up an Office 365 lab for study/research purpose? For example, to study if enabling setting A is necessary for security, how the setting affects forensics/IR, etc. Seems like we would need to purchase a subscription? Not something that we can create offline for our own research purpose? (edited)
Avatar
Deleted User 5/8/2020 8:21 AM
@Cellebrite Emojis of WhatsApp chats do not appear in the pdf-report. Is this a licencing or a technical problem?
Avatar
chrisforensic 5/8/2020 8:37 AM
@Deleted User select font "segoe ui emoji" in pdf-export-settings in PA 😉 (edited)
Avatar
Andrew Rathbun 5/8/2020 3:02 PM
@mickeyftnt do they offer a trial?
Avatar
DefendingChamp 5/8/2020 8:47 PM
I'm going through the Cellebrite training and one of the questions ask me how many known files exist on the image. The solution shows me the image has 640, but the image that I got shows a different number. Does this change as the known images db updates? so the # changes?
8:49 PM
Or is it the image the training reference is different than the one I downloaded?
Avatar
@DefendingChamp you should definitely file a ticket with training/support @Cellebrite three examiners from my office are doing theirs as well and had some conflicting results during their practicals. They filed tickets.
Avatar
DefendingChamp 5/8/2020 9:00 PM
will do.
9:00 PM
it's extremely confusing when i know what i'm doing but i'm afraid a setting somewhere can adjust the numbers
Avatar
I can understand that. I know one of them filed a ticket a few days ago and we still haven’t heard a resolution yet. He had three questions that he was positive on, but they were marked wrong. Hopefully they can show him how he was wrong or fix the exam answers.
Avatar
DefendingChamp 5/8/2020 9:12 PM
yeah I believe the images on the website are modified
9:13 PM
in the training videos it shows a different number lol
9:13 PM
i'm going to update my programs to see as well, the image duplication on this version is broken
9:14 PM
it doesn't pick it up but i clearly see the duplicated images
9:17 PM
my guess is known files is determined by a live database that adjusts with time. so that adjusts and throws off the lab's numbers.
Avatar
Was that number about an offset for where to find a file or file header? They said they found the slides and video to be off of their data for the starting offset
9:23 PM
You could be right about versions changing outcome numbers.
Avatar
DefendingChamp 5/8/2020 9:23 PM
no mines is about known images on the activities
9:24 PM
so i just have to assume it's going to affect my score as well
9:24 PM
if i take the exam and the images don't match
9:26 PM
waiting 4 more min to see if the latest version fixes the issue for me
Avatar
Don’t be shy to reach out. Those support inquiries go right to our training group. @DefendingChamp (edited)
Avatar
DefendingChamp 5/8/2020 9:59 PM
thank you!
Avatar
DefendingChamp 5/8/2020 10:14 PM
ok i've updated to the latest version of PA, duplication still doesn't get picked up
10:14 PM
will put in a support ticket
Avatar
DefendingChamp 5/8/2020 10:58 PM
going to do a fresh install to see as well
Avatar
@mickeyftnt do they offer a trial?
@Andrew Rathbun I couldn't find
Avatar
Andrew Rathbun 5/9/2020 2:04 AM
I can understand that. I know one of them filed a ticket a few days ago and we still haven’t heard a resolution yet. He had three questions that he was positive on, but they were marked wrong. Hopefully they can show him how he was wrong or fix the exam answers. @sholmes I had a similar experience, too. I don't think I was given any points when I brought them up but hopefully things have changed
Avatar
kladblokje_88 5/9/2020 7:34 AM
Hey everyone I have a question about image formats. I have made an image which is divided in a series of image parts (E01, E02, E03 etc etc). I want to analyze the entire image, but the problem is that if I merge all the image parts I end up with 500GB of data to process in the tools I am using. I've seen some people selecting just the first image part in a tool such as Magnet Axiom, the tool recognizes 500GB of File system but I don't know sure if it also counts in the entire contents of the other image parts as well. Does anyone know the answer for this question or know a workaround for my laziness of creating a 500GB raw image?
Avatar
Did you try libewf?
7:40 AM
But I dont get your question entirely. What's the point in merging all e01's together?
Avatar
kladblokje_88 5/9/2020 7:41 AM
Did not try LibEWF, thanks for the tip tho. I got the answer already. I imaged an entire hard drive in the enCase format E0*
Avatar
The heat is killing me, I am a bit slow witted 😂
7:42 AM
Yeah that part I understand, and you want to analyse the image right?
Avatar
kladblokje_88 5/9/2020 7:42 AM
I segmented it, and now trying to analyze it without the need of merging the segments
7:42 AM
yes
7:42 AM
Ja weet je, je kan ook nederlands praten als je wil
7:42 AM
XD
Avatar
Andrew Rathbun 5/9/2020 7:42 AM
Segmented images are nice because if you are transferring the image from one drive to another, which I did a lot in my previous job, if it fails at, say, 30%, with a segmented image you're still 30% done and can resume from there. If you have one 500gb image and it fails, you gotta start all over!
Avatar
kladblokje_88 5/9/2020 7:43 AM
indeed
Avatar
All forensic software should handle the segmentation correctly afaik, there is no need to merge them in 1
👆 2
7:43 AM
Ja kan ook
Avatar
kladblokje_88 5/9/2020 7:43 AM
that was the same thing I was thinking about when I was choosing an image format
7:43 AM
great, then I have my answer verified
7:44 AM
Thanks alot!!
Avatar
But there are many options to read a e01 to quick scan. I mainly use ftk because it's stupidly simple
7:44 AM
Yeah no problem
Avatar
kladblokje_88 5/9/2020 7:44 AM
hahahah same
7:44 AM
I like FTK due to the relatively low use of resources
Avatar
Yeah, exporting items is easier aswell
Avatar
kladblokje_88 5/9/2020 7:46 AM
Indeed, the software formed a little meme in my class due to the weird UI
Avatar
Lol, can imagine that
Avatar
kladblokje_88 5/9/2020 7:46 AM
I still dont understand what QuickPicks is all about
Avatar
Oh I only use FTK Imager, I really don't like the full FTK software
7:49 AM
Mainly use AXIOM for analysis, it's more a preference thingy I guess
Avatar
kladblokje_88 5/9/2020 7:51 AM
i am used to using multiple tools really. Sticking to one toolkit or tool doesnt do it for me. One tool find 10000 artifacts the other one 1000 where the one who finds 1000 artifacts is more reliable. I am just measuring every situation on its one at this point, resulting in choosing the right tools for the job
👍 2
Avatar
Yes, that definitely
Avatar
kladblokje_88 5/9/2020 7:51 AM
maar cool om te horen dat je uit NL komt
Avatar
Haha zeker
Avatar
kladblokje_88 5/9/2020 7:52 AM
Hoe vind je het werk bij de overheid?
Avatar
Ja super tof, elke dag weer iets nieuws dus je verveelt je nooit 😋
Avatar
kladblokje_88 5/9/2020 7:53 AM
nice man
Avatar
Andrew Rathbun 5/9/2020 7:53 AM
keep it english guys 🙂
Avatar
kladblokje_88 5/9/2020 7:53 AM
sorry sorry
Avatar
Yush, thought there was an international channel but can't find it
Avatar
Andrew Rathbun 5/9/2020 7:54 AM
I'm Dutch as well and totally appreciate the Dutch language, but for the sake of the entire server, keep the non-English to DM 🙂
Avatar
kladblokje_88 5/9/2020 7:54 AM
alrighty
7:54 AM
Well i'll start processing this chunk of data so my laptop is going into full overdrive xDD
7:54 AM
the best of luck!!
Avatar
Lol good luck
Avatar
kladblokje_88 5/9/2020 7:55 AM
thanks!!
Avatar
Andrew Rathbun 5/9/2020 7:55 AM
Yush, thought there was an international channel but can't find it
@B that has never been requested before and I'm not sure how popular it would be. It would be difficult to moderate due to all the different languages and there's no way we couldn't NOT moderate it because we don't know what's being said if we can't understand the language. Hope that makes sense!
Avatar
Yeah totally makes sense! Must have read that on another disc channel then (edited)
Avatar
DefendingChamp 5/9/2020 11:12 AM
yup, i'm on my second activity for my cellebrite course and the phone image provided does not match the training materials lol
11:12 AM
submitted a ticket already, has anyone else experience this?
Avatar
Hey, everybody. I work for SOC as a security analyst, but lately I have been attracted to DFIR and I may even want to work in that direction, but it is one thing to do CTF and another to do real work. And I am curious, what does your work look like? Pros, cons?
Avatar
forensicmike @Magnet 5/9/2020 1:29 PM
@Axalfarux "It depends". Sorry, I know that's a common DFIR answer, but it's true. I think what industry you do the DFIR work in can have an impact on things for sure. Also - the personality of the practitioner - what kind of things you find fun. (Consider for a lot of people, crawling through hex looking for clues isn't exactly a good time.)
1:29 PM
It can be some combination of thrilling, challenging, overwhelming, frustrating, tedious, confusing, rewarding, mind numbing, even mind-imploding. Sometimes simultaneously. I really think it depends on your mindset. If you set out to do the bare minimum... run a few searches and check some checkboxes in one forensic tool without asking any questions about why it's there, then you probably aren't going to get as much out of the career. ( doesn't mean you can't do it ) (edited)
1:30 PM
I do think CTFs are a great way of testing out some of these questions though. Just be aware that not all cases are going to be as profound / eye-opening / novel as the experience of a CTF will likely be. (edited)
Avatar
Thanks for answer! My level is a beginner in DFIR, so one more question, what would you advise from courses (preferably free) to enter into DFIR? I know only 13cubed on youtube.
Avatar
Andrew Rathbun 5/9/2020 3:42 PM
Not many free things out there, but maybe your best bet is to toy around with #challenges-and-ctfs to gain some experience that way? There are walkthroughs out there to walk you through the stuff you can't figure out on your own. Just a thought
❤️ 1
Avatar
I’ve a general question about handling information. How do you save/store all your information that you find across the internet (websites, videos, tutorials, twitter, discord, eBooks, ...) I actually use Evernote and Notes on my iPhone. Sometimes i use my own wordpress site. But the truth is that there is so much information and often i‘m just asking google. I don‘t know it would be wasting time to save alle the information... Sorry for my english skills (i can understand but not speak or write very well).
1:07 AM
I‘ve tried Joplin to import my Evernotes but not all information was imported.
1:09 AM
Joplin maybe a good solution if you are in the situation that you have no internet available.
Avatar
Digitalferret 5/10/2020 2:00 AM
@reax first off, your English is excellent, no worries there. if it's any use, I've made hundreds if not thousands of bookmarks and re-visited very few. Similarly with other notes, pdf's, diagrams, images etc. only to be returned to if in direct need of direct reference. The benefit, it would seem, to making ones own notes is that it etches the process a little deeper as you actually make them. that's not the same as a screengrab, clicking a bookmark and so on. it's the actual practice of doing the job, along with the notes: learning by doing.
2:02 AM
also, I find, that once taken, the reference is static. this may be ok with something like breadmaking, where little has changed over entire decades. with technical work though, things change quickly, by comparison. bookmarks and notes become out of date as technology and methodology move along
2:03 AM
the other downside, maybe, is that it becomes a job in itself. this can drain energy from the main task in hand: doing.
💯 2
2:05 AM
tips: maybe add a range of search engines, not just google (marketing bubble) and also embed yourself in communities such as this. take note of any requests for help, and maybe take them as a tutorial for yourself. document things as you go as an aide memoire.
2:08 AM
find something that really "grabs you", "floats your boat", "turns your cogs". once you find that, it's no longer a job, it becomes an enjoyable hobby with its own reward system, as you challenge yourself over and over again.
2:10 AM
massively more so, than watching Quests or Missions fly by, acquiring Gold or Isk, or the latest and greatest space ship or set of armour. I hope you find your passion 🙂
Avatar
@Digitalferret thanx! I‘m doing digital forensics since 2004. I‘m experienced in mobile forensics (ufed/xry), malware forensics, ethical hacking, data recovery (pc3000), raids, tapes, video recovery... have many certificates. my greatest problem is that i do not have the ability to find that one in which i can go deeper. maybe mobile forensics would be the most interesting thing. the images are not so big like in computer forensics. 😄 python programming would be nice (i can program (it’s more copy & paste) but if i can‘t do it every day, i‘m loosing „the flow“). Another nice thing should be to support Autopsy because it‘s free available. Tools like APOLLO could be used with it. All the energy that we invest in making difference tools should be concentrated into making plugins for free software.
Avatar
the other downside, maybe, is that it becomes a job in itself. this can drain energy from the main task in hand: doing.
@[3.14-] Blackrose Kolodny#7511 i do fully agree with this
Avatar
All_About_FRNZX 5/10/2020 5:30 AM
I was wondering if anyone aware of a website where I can purchase some cheap test phones from??
Avatar
Andrew Rathbun 5/10/2020 5:32 AM
@All_About_FRNZX have you looked into eBay?
5:33 AM
Also, I've mentioned this a few times before, but another option is to partner with your local library, campus police department, etc, somewhere very public that has a lost and found. Get integrated into their lost and found policy where after 90 days they can turn over any unclaimed phones to you and you can convert them into training phones
5:33 AM
I worked at a campus police department and every month I was brought half a plastic grocery bag full of phones
5:34 AM
I built up a test phone inventory pretty quick that way
Avatar
All_About_FRNZX 5/10/2020 5:40 AM
@Andrew Rathbun that’s a great idea 😀, I will try to get in contact with public entities close by to check on their lost and found policies. Thank you so much.
Avatar
Andrew Rathbun 5/10/2020 5:40 AM
At the time, I only took in Android devices because there wasn't much I could do with iPhones so those just went to the domestic violence shelters. I wouldn't be surprised if some of them do the same but see about tapping into at least part of their lost and found phone stream. It should be a nice, passive way to get some phones
Avatar
Digitalferret 5/10/2020 9:25 AM
@reax i understood "go deeper", same issue here, seem to get to a glass ceiling, and move sideways. it is, i agree, easy to lose Flow, by maybe doing to many "other things". perhaps concentrating on a favourite area like Opensource? i dunno. same sort of thing here though, started c1994 attempting to recover my own final year project, a victim of Fast Saves on MS Office. all the usual kit now, PC-3000, Deepspar etc. need to find a favourite, and still maintain a challenge.
Avatar
@reax I am a new user to Joplin for my varied research and I note your comment about Evernotes importation. I haven't found that problem yet. I find Joplin to be useful for the various .extns it imports and useful notes can be accessed on various devices. When working in teams it does speed up disseminating (whether teams clustered or at separate locations) research notes to keep teams up to date. I particularly liked distro E2EE "Joplin supports end-to-end encryption (E2EE) on all the applications. E2EE is a system where only the owner of the notes, notebooks, tags or resources can read them. It prevents potential eavesdroppers - including telecom providers, internet providers, and even the developers of Joplin from being able to access the data. Please see the End-To-End Encryption Tutorial for more information about this feature and how to enable it." (edited)
Avatar
Hi, what kind of software do you use for image / video analytics (including OCR capabilities)? CLB analytics or something else?
Avatar
Hello everyone!! I hope you are having a good confinement ... I wanted to ask you if you know pinout for trying to make an ISP of a LG K4 2017 (X230AR), I do not know if the board will be the same as the DS, F ... the phone does not turn on or even do anything when connecting it to the PC
Avatar
DefendingChamp 5/10/2020 11:10 PM
how are you guys handling signing chain of custody? Usually we print papers with signatures but with covid is there an alternative?
11:13 PM
looking up paperless chain of custody, but seems like most of it ties into a case management system 😦
Avatar
Andrew Rathbun 5/11/2020 1:08 AM
@AlbertoBM may want to ask in #jtag-isp-chip-off-flasherbox
Avatar
@DefendingChamp we ask them to bring their own pen 😂
🤣 2
😆 1
Avatar
I was called out to a homicide to attempt to dump the victims phone. My question is even though she had been dead for 6 hours, cannot you not use the victims finger to unlock an Iphone 8plus? We also attempted to greykey it back at the lab and were also unsuccessful.
Avatar
AzuleOnyx🛡 5/11/2020 5:06 AM
Umm, I've heard of kids using their parents fingers while sleeping to purchase stuff. I don't see why that wouldn't work.
5:07 AM
I couldn't find anything on the Apple support site they were doing some kind of "proof of life" check on the sensor.
Avatar
yeah I was wondering if the finger being not 98.6 made its use ineffective
Avatar
AzuleOnyx🛡 5/11/2020 5:08 AM
I mean when sleeping the body temp drops slightly ... so idk.
5:09 AM
Maybe there was something wrong with the fingers or they were using something else. Some people use their toes. lol
Avatar
I was asking some of the homicide guys, they said that when you die your body obviously stops producing oil and that your finger will dry out, perhaps her fingers were to dry to use to unlock the phone?
Avatar
AzuleOnyx🛡 5/11/2020 5:26 AM
Umm, I don't recall myself having that issue. Though, my wife had the issue from drying out her hands when she washed them too much.
5:26 AM
So, that could be possible.
Avatar
Hi All, I have an Nokia 105 (RM-1133) and I was looking to write the physical image acquired from it to another Nokia 105. Does anyone know if this is a straight forward process. Was also looking to do the same for some Alcatel feature phones. This is all for validating our forensic software so we can conduct multiple validation tests without having to populate multiple phones. Thanks!
Avatar
I was asking some of the homicide guys, they said that when you die your body obviously stops producing oil and that your finger will dry out, perhaps her fingers were to dry to use to unlock the phone?
@TomParis it's not unthinkable that drying out of the finger could distort the fingerprint so much that the iPhone will not recognize it. keep in mind while you try to use fingerprints: you have 5 attempts at the most (as you don't know how many unsuccessful unlocking attempts the iPhone as registered before you even got it) and you have a limited timeframe where you can try to use biometrics.
👍 1
Avatar
casualpixels 5/11/2020 6:11 AM
@TomParis I have several times in the past used the finger of a deceased victim to unlock a phone. Once at scene within a 3-8 hours of passing and a few times at the morgue 12-36 hours after passing. @Zoidberg is correct though with the attempts (find out the persons dominant hand try it first) and a time frame for the biometrics.
👍 3
👆 2
Avatar
Hi All, I have an Nokia 105 (RM-1133) and I was looking to write the physical image acquired from it to another Nokia 105. Does anyone know if this is a straight forward process. Was also looking to do the same for some Alcatel feature phones. This is all for validating our forensic software so we can conduct multiple validation tests without having to populate multiple phones. Thanks!
@dfmiket We've done similar with android devices that are not encrypted - You can ISP them across. Can't say i've tried it on a feature phone but I imagine if you can find the pin-outs then it's probably a viable option
Avatar
@K23 ahh ok nice. We have some unencrypted Samsung's that I was just planning to flash TWRP and flash the user data partitions across. For iphones I was going to just do an apple backup but not sure how much app data this has. Do you know?
Avatar
TWRP is slightly messier but would likely work. You've just got to make sure the system partitions are identical version wise otherwise you may hit some problems. iPhones don't always have all the app data within the backup itself but it can be downloaded when the applications are re-installed. Depending on what apps you're using it can work quite nicely - You likely won't have every bit of user data go across but you will have a decent amount. We used that for our GK testing with various different models. Feel free to DM if you want the details on that (edited)
Avatar
thank you for the responses that makes sense now
Avatar
AzuleOnyx🛡 5/11/2020 7:34 AM
@Zoidberg @casualpixels That's good information about it. Thanks!
Avatar
Hi. I have two hash sets in json format that I need to run in Autopsy. However, it appears json is not supported for the hash ingest module. Any recommendations on how to convert these or other actions to take so I can run them?
Avatar
AzuleOnyx🛡 5/11/2020 9:14 AM
not sure if there is any automatic way, but Python or JavaScript can convert it. Just need one hash per line in a text file to import it.
Avatar
@AzuleOnyx🛡 Thanks. I'll give one of them a try.
Avatar
AzuleOnyx🛡 5/11/2020 9:26 AM
If you get stuck, DM me 😄
Avatar
Will do!
Avatar
NapsterForensics 5/11/2020 9:44 AM
@Magnet Forensics I have updated my event preferences last week for the #mvs2020 in my profile, but I haven't received the webinar links as per updated preference. I am receiving the webinar link only for the events which I added during the registration.
Avatar
@NapsterForensics sending a DM
Avatar
@Magnet Forensics Currently I’m not seeing a link for a session that I have added to my event preference that is scheduled today 12 (edited)
9:52 AM
The Real time investigation webinar session.
9:55 AM
@Magnet Forensics Anyone there?
Avatar
MF-Katie McMichael 5/11/2020 9:57 AM
@Magnet Forensics Currently I’m not seeing a link for a session that I have added to my event preference that is scheduled today 12
@Juvii Hello! Can you please send a note to our inbox: magnetvirtualsummit@magnetforensics.com we can help you resolve this there!
Avatar
@MF-Katie McMichael noted I just sent it.
10:08 AM
Any luck
Avatar
@MF-Katie McMichael did you get the note I sent?
10:09 AM
@patjan not as yet
Avatar
Does iPhone encrypt third party app data on file basis, like the photos copied by Google Photos?
Avatar
@casualpixels Does this work will all fingerprint sensors? I can see how it would work with an 'optical' or 'ultrasonic' sensor like those embedded within phone screens, but what about fingerprint sensors that measure voltage differentials across fingerprint ridges? I was under the impression that this quickly stops working on corpses
Avatar
casualpixels 5/12/2020 6:07 AM
@OllieD In the past it worked with older versions of iPhones (8 and below). The only requests I have done were for iPhones. I haven't had to do one of these requests in quite some time so I am not 100% sure on how the newer embedded biometric sensors would respond and react. I have also had the the process fail. I couldn't tell you if the failure point was due to wrong prints, poor skin quality, actual lack of biometric scan in the device or voltage differentials. It's one of those things you try, cross your fingers 😂, and hope it works.
Avatar
OK, thanks 🙂
Avatar
Hi. I have two hash sets in json format that I need to run in Autopsy. However, it appears json is not supported for the hash ingest module. Any recommendations on how to convert these or other actions to take so I can run them?
@SDB you might want to use jq to extract the hash values from the json files. In case you need some examples: https://thoughtbot.com/blog/jq-is-sed-for-json
Slice and dice your JSON with jq.
Avatar
Hi, I was able to get Autopsy's LE module which let me ingest the json files. However, I learned a lot about json files and converting them. I will add the info you sent to my resources. Thanks for sending!
👍🏻 1
Avatar
Glad to know that it works fine now. 🙂
Avatar
Quick shameless plug and looking for feedback. Hey all I started a Faraday case/bag project in Montana for low cost Faraday options. I just altered the design and added double faraday cloth. There are large single cases 9.5"x 5" for XL phones and their big ass cases. There are also some large tablet cases. Feedback is ALWAYS welcome as I change the design off the feedback and phone calls from users. Basic case is 8.75 but there is a link on the left to request a sample case for free, I will cover the shipping as well. Its at https://www.MTDFE.com (Montana Digital Forensic Evidence).
Montana Digital Forensic Evidence (MTDFE) provides low cost modern digital forensic Faraday cases to isolate mobile devices from radio signals.
👍 4
Avatar
Anyone know of a sample forensic in VMDK format?
Avatar
Andrew Rathbun 5/12/2020 10:30 AM
@vanquish like a sample forensic image? You could easily make one of your own system with KAPE. Just enable the Targets and wrap it up in VMDK and you could use that to analyze or test with
10:30 AM
happy to create a GIF if needed 🙂
Avatar
Thanks, just wanted to see if there was something already out there. Trying to test VMDK files in EnCase EI.
Avatar
chrisforensic 5/12/2020 10:42 AM
@mitchlang thanks 😉 got an email some days ago and ordered a sample case... hope it will arive soon in austria (if you ship to austria 🙂) (edited)
Avatar
@chrisforensic Let me check on shipping. I sent one to Canada and it was not too bad.
11:04 AM
Literally from Montana to San Diego to go to Vancouver.
Avatar
Has anybody been successful in slinging a subpoena or search warrant to Google based on a Bluetooth ID ? I"m sure they are harvesting this info but not sure if they will give it out. DM me thx.
Avatar
Anyone have a tool they're using to batch look up IP address locations?
12:38 PM
I'm using maxmind currently, wasnt sure if there was a batch tool for google earth or something that leveraged the same API
Avatar
@mitchlang - I have one of your cases in the running for my dept., I only have the small one currently however my intent would be to order large sizes. A competitor bag that I have uses the roll-type enclosure, which just doesn't seem as secure as the fold over flap. I really don't care for the rollover, are you planning on offering a larger bag with the flap? If not is there a reason for that?
Avatar
@whee30 IPNetInfo with delay
👍 1
Avatar
UPP39UFZGPB4UJE8 5/12/2020 2:32 PM
Is there dark mode in AXIOM? Couldn't find it.
Avatar
@whee30 I prefer the fold over clasps, the new ones are about 40% larger. I could make the larger cases fold over if that is what people like. I have about 170 of the large bags and 180 of the windowed cases at the moment.
2:49 PM
I want to get a laptop case that will fit a 17" laptop next. I have a basic design I want to use.
2:50 PM
One of the largest concerns was making cases big enough for batteries to fit in also to keep the gizmos pwrd on.
Avatar
Is there dark mode in AXIOM? Couldn't find it.
@UPP39UFZGPB4UJE8 not today, but will pass the feedback along. It's definitely been asked before.
Avatar
@mitchlang the size is definitely a concern. I've purchased batteries and cords for my patrol folks, that small size just can't do the job for us, it barely fits today's battleship sized phones. I'll DM you tomorrow with the bags ive been considering - i think yours are in the top 2 but that roll closure may be a problem.
9:36 PM
@DEVNULL I'll check that one out. I ended up using https://app.ipapi.co/bulk/ today, 20 at a time. Worked for my purpose doing 100 or so IPs pretty easily.
Bulk IP address location lookup - A tool to convert a batch of IP addresses to location (city, country, continent, latitude, longitude, timezone, currency, language, asn, organization, country calling code etc.) in one click.
Avatar
I found a bunch of differences between the ipapi link I shared and IPNetInfo... maxmind seems to agree more with ipapi, I wonder what is the most accurate way to obtain approximate locations? For example, I have discrepancies of Colorado vs Florida, Washington vs Arizona, New Jersey vs. Arizona etc.
9:50 PM
IPNetInfo says it sources direct from ARIN etc, Maxmind doesn't say from where but it mentions roughly 80% accuracy down to the state on their FAQ page. Probably ARIN is the better source here, right? edit: ARIN shows you who owns the IP, Maxmind attempts to correlate the IP to the end-user's location through various other sources. In the end I wouldn't rely 100% on a maxmind or ipapi result but they may get you looking in the right direction. ARIN will tell you who to subpoena for the correct answer. (edited)
Avatar
Can someone from @OpenText please ping me for an EnCase question I have
Avatar
Can someone from @OpenText please ping me for an EnCase question I have
@dfir_zach Sure
Avatar
chrisforensic 5/13/2020 11:12 AM
good evening @Magnet Forensics .... downloaded your new Custom Artifact Generator from your downloadpage... and Eset detected a trojan? (edited)
11:12 AM
11:13 AM
maybe just a false positive ?
11:14 AM
Avatar
JonasWanobi 5/13/2020 12:43 PM
@chrisforensic All of Magnet's files get picked up as malware. I created mass chaos in my IT department the first day I tried to create a portable case. LOL They have to create exceptions for the files in your AV software. (edited)
👍🏻 1
😆 2
Avatar
@Unoriginal_name we are contacting ESET to have MCAG whitelisted so you wont deal with this in the future. Unknown how long it will take for the to incorporate into their AZV though. In the meantime I suggest you go into the AV program and add an exception for the file. Also, you may wish to have your IT whitelist the file until that time.
Avatar
So what do you say about Cellebrite PA 7.33? (I really hate it ...) 😁 (edited)
Avatar
@Wolfman @Cellebrite Hated it at first but I have to admit it's grown on me. Once they bring back a dialog / pop out box for the Extraction Summaries like the way you pop out Analysed Data section I'll be happy. Really miss the project tree format of the Extraction Summaries !! (edited)
2:12 AM
@Law Enforcement [UK] @Andrew Rathbun Right. That's me happy today with getting this done https://forensic4cast.com/forensic-4cast-awards/2020-forensic-4cast-awards/ - closing date is tomorrow !! Lets make this happen 🤞
👍 8
Avatar
Andrew Rathbun 5/14/2020 2:37 AM
@Law Enforcement [UK] @Andrew Rathbun Right. That's me happy today with getting this done https://forensic4cast.com/forensic-4cast-awards/2020-forensic-4cast-awards/ - closing date is tomorrow !! Lets make this happen 🤞
@Stevie_C thank you kind sir. A vote for the server is a vote for yourself. Hopefully we make the top 3 and end up on the final ballot!
(edited)
Avatar
@Andrew Rathbun I'm expecting it to win full stop 😎
🙏 5
💯 3
Avatar
How many of you look check implants to the Chrome Browser when examining checking history etc... https://github.com/mandatoryprogrammer/CursedChrome
Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims. - mandatoryprogrammer/CursedChrome
👀 1
Avatar
@Stevie_C thank you kind sir. A vote for the server is a vote for yourself. Hopefully we make the top 3 and end up on the final ballot!
@Andrew Rathbun When are the awards announced?
🤞 1
Avatar
Andrew Rathbun 5/14/2020 7:42 AM
@Andrew Rathbun When are the awards announced?
@vanquish not sure when the final voting ballot will come out but I think this year with everything being virtual they will be open right up until the SANS DFIR Summit in July of this year.
👍 1
Avatar
Anyone else that is LE that was vetted and not approved by GS for attending the Making MAGaK: Using GrayKey and AXIOM Together to Maximize ... just curious?
Avatar
@DF51 Shaf Yes. Maybe it's because GrayKey isn't available in your region?
Avatar
I guess no discussions on Making MAGaK: GrayKey and Axiom?
Avatar
Andrew Rathbun 5/14/2020 9:54 AM
I guess no discussions on Making MAGaK: GrayKey and Axiom?
@Brian12 LE only so no
Avatar
Greetings all! Anyone else overwhelmed? Trying to stay updated in digital forensics, reading Twitter, blogposts and what not. Only 24hours in a day and family needing attention. Any tips on how to cope? How many hours do you spend on learning/digging deeper å week?
Avatar
Andrew Rathbun 5/14/2020 12:02 PM
Greetings all! Anyone else overwhelmed? Trying to stay updated in digital forensics, reading Twitter, blogposts and what not. Only 24hours in a day and family needing attention. Any tips on how to cope? How many hours do you spend on learning/digging deeper å week?
@azkurken that means you're doing it right
12:02 PM
@azkurken stuff like RSS feeds help the news come to me. I check mine when I'm trying to get tired every night in bed. I put together a starter pack here to get you up and running - https://aboutdfir.com/resources/aboutdfir-rss-starter-pack/
Introducing the AboutDFIR RSS Starter Pack! Basically, this is a curated list of blogs, DFIR vendor websites, and other cyber security related websites categorized for your convenience. A simple import into your Feedly account and you’re up and running! This is the first itera...
12:03 PM
hanging around communities like this is very helpful but can be overwhelming, too. Try not to feel like you need to know it all
12:03 PM
It's better to know WHERE to look than to KNOW everything, because you will never know anything, so become well versed in where the experts are at and feel comfortable asking questions and in turn help others when you feel comfortable to do so
12:03 PM
that's how the community thrives and we all get better
12:04 PM
also, please subscribe to This Week in 4n6 - https://thisweekin4n6.com/ but you could also just hang here and monitor #this-week-in-4n6 because those posts are pushed here automagically
This Week in 4n6 is your weekly Digital Forensics and Incident Response news site.
12:04 PM
That's the point of the DFIR Newsfeed category is to make all of your lives easier by letting the news come to you rather than having to seek it out
12:04 PM
If there are any improvements we can make to make it better, let us know
Avatar
Amazingly well put. Was thinking about RSS the other day. Will check it out! Thank you for the links and your inspiring words
Avatar
Andrew Rathbun 5/14/2020 12:06 PM
I've talked to mentors I very much look up to and they feel the exact same way you do. Imposter syndrome is something we all feel and struggle with. Just know we're all imperfect and only capable of so much in 24 hours between everything else going on in our lives, the world, family, etc.
12:06 PM
You're in the right place. Definitely get into RSS, I know a couple others who that starter pack/RSS in general has really helped out
Avatar
As The Beatles very aptly said “Oh, I get by with a little help from my friends” 😀. I’m not very clever but I have a lot of clever friends !!
👍 4
💯 4
Avatar
@Magnet Forensics I’ve been testing the Mac agent out today and was wondering why memory acquisition nor physical image options are available?
Avatar
We started by adding logical collection capability and will add memory collection capability as soon as possible.
5:42 PM
@dfir_zach What do you think of the Mac agent collection so far?
Avatar
@cguymon so far I’m enjoying it, however still getting very slow speeds while acquiring data OTN.
Avatar
We have IIOC found within Dropbox on one of the devices here, however defendant is claiming he didn't know anything about IIOC or dropbox. We have found 1 single PDF file (paycheck of some sort) with the defendant's name in dropbox. We are having difficulty determining whether if this PDF file was uploaded from the handset or not. Also, does anyone know what does the filepath Root/data/com.dropbox.android/global/sharedlinks/thumbs/sh/ or /s/ mean? Are the files stored within these locations shared by the handset or shared files he accessed?
Avatar
@Pacman It looks like a shared link opened in Dropbox without an associated user account (...com.dropbox..). Can you see any images titled something like '1024x768_bestfit.jpg'? (edited)
Avatar
The global.db should give you some indication of original folder name, file name, visibility and local accessed time (to name a few). The artefacts within the global database are typically shared links the user has accessed. Files the user has shared using a Dropbox account are typically in a different database under a folder linked to the user ID such as com.dropbox.android\files\u100105013. (edited)
Avatar
No userID found, dropbox was found logged out @Rom
5:10 AM
Lots of bestfit files though
Avatar
Yeah, you don't need to be logged in to use the Dropbox application unfortunately. Typically the bestfit.jpg artefacts are not automatically generated. A user must open a shared link, view a folder contents, such as a list of images (as thumbnails) and select an image to view. I was unable to ascertain the owner of the files from the global.db and all my digging though research papers appear to suggest that its not possible with what's in that database.
Avatar
Okay, so we found a PDF with his name, this PDF looks like an invoice or a paycheck of some sort - how could this have ended up buried within these IIOC files?
5:21 AM
It's in global/external
Avatar
NapsterForensics 5/15/2020 6:34 AM
I was reticent to write this blog post because it leaves a lot of questions unanswered, questions that we should be able to answer. It's about a data breach with almost 90GB of personal information in it across tens of millions of records - including mine. Here's what I know:
Avatar
Has anybody ever done forensics on World of Warcraft? I have a case coming in where the person used WOW in the commission of their crime. A search of this server for WOW was not productive. Warcraft only found information about playing the game. Online Google-Fu has not been successful. Just looking to start reading stuff before I get into the case. I have never played the game, so that isn't helping. 🙂
Avatar
Andrew Rathbun 5/15/2020 10:30 AM
@sholmes maybe check Search.org for Blizzard's LE contact info?
Avatar
Thanks. I was afraid they would just tell me how to server papers and not how to extract data from their game. But worth a shot.
Avatar
DFIR_Trooper 5/15/2020 10:51 AM
Suggest you install the game in a clean VM and use tracking software to document where all the data goes. Then take a Snapshot. Now play the game preferably using the same function you think subject used and you want dat about--do this right away in the game; then take another snapshot....now examine for your known data...
Avatar
Good call @DFIR_Trooper
10:52 AM
I know he used two different devices- mobile and pc
Avatar
Digitalferret 5/15/2020 10:52 AM
@sholmes unless the player has installed an addon for his own personal use, and as far as I'm aware, there is no chatlog retained client side. However, most all data is recorded server side to facilitate with player requests for help.
10:52 AM
and According to a document leaked regarding Blizzards legal procedures dated from late 2009: Blizzard will honor requests by law enforcement to preserve information in accordance with 18 U.S.C. § 2703(f). In response to such requests, Blizzard will preserve the specific information identified in the request for 90 days, and for an additional single 90 day period if the law enforcement entity requests the original period be extended. Reference: Blizzard Law Enforcement Guide to Requests for Information
Avatar
Great way to start testing though
10:53 AM
@Digitalferret that is great to know
10:53 AM
thanks
Avatar
Digitalferret 5/15/2020 10:53 AM
if he has mobile, maybe check for an instant messenger app, or Blizzard, rather than WoW.
10:54 AM
much like how OS vendors try to unify accounts across multiple devices, Blizzard had a number of different games which if you use youre Blizzard ID you could hook up with friends
10:55 AM
look for an ID with a hash in the name like jimsmith#4805
Avatar
Digitalferret 5/15/2020 10:57 AM
oh, and Blizz, altho say 90 days, i'm pretty sure they keep everything... forever 😉
Avatar
PricklyPete 5/15/2020 2:03 PM
hope everyone has a great weekend!
🍻 6
Avatar
For testing purposes I powered up an old iPhone 6 Plus. Updated to 12.4.6 and reset it. Then loaded up linux and jail broke the phone with checkra1n. But for the life of me I cannot get a FFS acquisition. Using Magnet Axiom Process and Acquire it just hangs. Meat dumped a little but there wasn’t much to parse. The iLEAPP report was basically empty.
Avatar
Wondering if anyone has attempted a manual jailbreak/ffs on an iPhone 6 Plus?
Avatar
Hello everyone, Does anybody have idea of how to crack a file whose actual format is not the one which is meant to be? The file is a .txt but the size of the file is 105 MB which is actually not. So are there any ways to deal with these kinds of file extensions and to crack the hidden actual content?
Avatar
what do you see when you open the file with an hex-viewer? are there headers? readable content? are you sure that there is encryption involved? do you have other signs (artefacts) that point to the use of encryption?
Avatar
When I opened the file its a binary dump I guess, as there no readable content. I hope there is no encryption, But I guess of Steganography techniques used?
Avatar
do you expect steganography? is the case a crime case, or a CTF, or a student-challenge ... ? what is the profile of the owner of the file ?
Avatar
its a student challenge
7:37 AM
ü ¢Ã?ÚÏb™Î YM½‹>˜†×þÁû мÄ10ŸWÈ Qã—‡pa2µOÿë5p9 à‰”’¢J ']£ ‡°ƒÌyšüË 0E['o}Ý$÷2®ÙⲪçŽÚ™e %ŸVòUè÷1v¾ÂR!e¿½d–Çw•«%ߺSí㮾ÙLjù„{Š>ÒoNÿÿÛËý+>6c¹£*4õH”æÕ‹w;1®ù§Õäýñô‡¦K„fscwz)Þt°.Gýy5ð±®w¯Å}®òßõ1O¼ª”€D‡D±mç)˜ªµßñ\;²66$'Ž/à?sUôU(ÊKÄ­ð’Ìl¯–Ë“îöô ”Í>›³4ÛlÙ8zí$ð°iÓßn Ýwzõ§Ç½vÙЈYðœwꢙæí4¾Á84bäÞ 5d”ã%)u¬hf?¤m¡Áçäbh´@íº–ÿMóµ¼J܆0¼ó²dú—îÎ#Èõúá¾Ëòîñ ~93…
7:38 AM
Its something of the above kind
Avatar
Veracrypt container ? Need to see the HEX
Avatar
Actually the file is preety big of 105 MB which is saved as .txt but it is not its in readable format.
Avatar
@Apoorva What does the file header say?
Avatar
Wait let me share the file link.
8:43 AM
Upload files and make them available for your friends. Think of it as Pastebin for files. Registration is not required. Large files are supported.
Avatar
Digitalferret 5/16/2020 9:14 AM
@Apoorva what explicitly have you been given in terms of information and requirement? "crack" is a pretty large ballpark
👍 1
Avatar
We need to find the hidden content actually the file .txt which is over here is not actually a .txt file we need to find out what it is actually? (edited)
Avatar
Digitalferret 5/16/2020 9:18 AM
so "find the hidden content" + "identify the file type" - has anything been said in the way of giving you a clue, like what you are expecting to find?
9:19 AM
what the homework title is , what course you are on etc?
9:21 AM
just looking at your ID label in here "DFIR Professor", are you the student trying to crack this or the professor setting it?
🕵️ 1
9:21 AM
apologies for directness, not being intentionally rude
Avatar
okay No worries I'm student trying it out to find both "the hidden content" + "identify the file type"
Avatar
Digitalferret 5/16/2020 10:14 AM
@Apoorva any other info given to you at all? the way you mention "crack" implies it's a file that's been altered/encrypted in some way?
10:15 AM
in general, there are utilities online, and via software programs, command line utilities etc that will try and check what the real file is via the file signature / magic numbers / header info.
Avatar
@Digitalferret Exactly I tried via file signatures as well, but was not fruitful. No clue as such just mentioned the file size is too big we need to find why? (edited)
Avatar
Digitalferret 5/16/2020 10:18 AM
depends where you tried. there are lists of file header info. i'm assuming the lecturer wants you to actually do a bit of detective work rather than just sending it to a web site. for instance, i've tried to prune the first so many bytes to check that : no result. parsed the file trhough data recovery programs to check for structure / content... and so forth. (edited)
10:19 AM
damn, my typing
10:20 AM
thats why I'm asking for any other clues that were given. as per Karambas line of question, file owner profile, is it a crime case, file system / memory dump, encrypted file, container etc
10:21 AM
if you have just been given a file and told "crack this", best of luck 🙂
10:21 AM
btw, what course are you on?
10:22 AM
or
10:22 AM
could you post the actual assignment question?
Avatar
I tried many before sharing this to the forum started from hex, File format changer, Few Online exploration. I was able to solve 2 challenges, but this kept revolving around. I was learning Steganography tricks. The tutor hasn't mentioned any thing as such let me confirm any hints if its shared to me. Will keep you updated 👍 Thanks a lot for few suggestions where I can put forth the request to the tutor.
Avatar
Digitalferret 5/16/2020 11:29 AM
he sounds a hard taskmaster 🙂 best of luck
Avatar
Thank you 👍
Avatar
TooManyShots 5/16/2020 12:26 PM
For ISO 17025 force are trying to identify what is an acceptable amount of bad sectors during imaging so that we would not have to re-image the device. One person opined the equivalent of 10MB as this could equate to 3 image files. As disks as getting bigger, 10MB becomes nothing. So what do other people use as their bad sector tolerance?
Avatar
Andrew Rathbun 5/16/2020 12:41 PM
If you have that many bad sectors, and the plan is to image again, won't you just run into the same problem if not worse over time? It's not like those sectors get better with age, is my understanding. You're right though, 10mb is nothing these days. What year did that person opine that number? Lol
Avatar
TooManyShots 5/16/2020 12:43 PM
It was about 2 years ago. We were thinking do we go for a percentage, or different tiers for the size of disk. Even 1% of 16TB is 160GB. Tiers seems to be best, but even then how to define it? Gut feeling and noisy heads isn't enough.
Avatar
Digitalferret 5/16/2020 12:58 PM
as per @Andrew Rathbun comment, disks deteriorate the more you access them. that's why it's important to use hardware to control disk reads as software solutions tend to hammer the disk, rather than skip appropriate blocks. it may be a solution to have the image mark bad sectors with a known data pattern. as such you might be able to confirm that the bad sectors were located in empty space
12:58 PM
and therefore don't compromise the integrity of evidence
12:59 PM
this is ofc with spinning disks, not solid state
Avatar
hellodarryl 5/16/2020 6:55 PM
So, I'm working along in autocad, which is new, and while I'm working I get an osx notification that sh wants "Accessibility" access. LoL wot ? So I locate in finder, and sure nuff it's /bin/sh . MAY possibly have been something triggered in aotucad, like something I did needs to run a script (honestly, no idea, first day using it) but wondering if that rings a bell with anyone.
Avatar
Dr. Kaan Gündüz 5/17/2020 2:39 AM
Autocad may use scripting on project files, catalina is very strict on access. You can give it permission in SP-Accassibility if you trust the application.
2:41 AM
2:42 AM
Maybe an internal function for cloud access?
Avatar
hellodarryl 5/17/2020 11:37 AM
Hey @Dr. Kaan Gündüz yeah, my assumption was it wanted to so something shell based, but I hadn't triggered anything very file-ish oriented. Just figured I'd check in here since there's so much ti floating around here.
Avatar
@Apoorva have you tried using Binwalk on the file, to see if there are hidden files in the given file?
Avatar
@workaman okay I haven't tried it will check it out Thanks for the suggestion 👍 Tried with VeraCrypt and was able to get it, was stuck with the password but later on it was found to be the tutors name 😆
Avatar
@Apoorva 👍
Avatar
Digitalferret 5/18/2020 12:30 AM
@Apoorva that's great work, see how important it is to use any and all info / clues you can bring to the table about not just the file itself : [15:33] Karamba: <snip> what is the profile of the owner of the file ? (the lecturer) . well done for perseverance. 👍🏻
Avatar
@Digitalferret That's true 👍
Avatar
I hope someone can help: When recovering the APK location of an app over ADB, I usually use some variant of adb shell pm list packages -f which works well, but ends up with other stuff in the output (preceding package: and suffixed with something like =com.whatsapp). I swear I saw someone post an ADB one liner that returned just the APK filepath e.g. /data/app/com.whatsapp-randombase64==/base.apk
8:04 AM
Anyone know the syntax? This was NOT using grep
Avatar
not sure to understand. adb shell pm path com.whatsapp ? :p
Avatar
Hahaha, that's the one 😂
🙈 1
8:22 AM
I knew the community here wouldn't fail me, thanks @sh4ka
👍 1
Avatar
JonasWanobi 5/18/2020 8:43 AM
Federal investigators say the Saudi military trainee who killed three service members during a shooting at the Pensacola Naval Air Station had been in contact with al Qaeda.
Avatar
@JonasWanobi yes would be curious to hear if greykey is how they finally got into the phone. Also would be curious if they were able to get into the phone he put a bullet through
Guidance 1
Avatar
Any Tinder gurus here? Working a case where two folks matched, bad things happened, suspect account was deleted. Apparently when suspect deletes the account the chats are pulled from both devices? Victim phone is lacking the relevant chats and I haven't found anything in the databases yet to suggest a possible username etc. Wondering where to go from here, not sure how I would phrase a warrant to Tinder or even what I would ask for at this point since I have no suspect username.
Avatar
F0r3ns1c4t0r 5/18/2020 10:48 AM
Hello.. Sorry if I could be posting this in the wrong section, I attended the Live Webinar called: 'Cloud Forensics for Law Enforcement: A Search Warrant is Great but Not Always Needed for Cloud Data' and they mentioned that material will be provided after the presentation but I have not received anything or do we receive the material through e-mail please?
Avatar
JonasWanobi 5/18/2020 10:51 AM
@TomParis It is worth noting that there have been recent updates in forensic software that coincide with this news. 🤐
Avatar
@JonasWanobi Indeed
Avatar
RE: Tinder question - chats are still missing however I was able to locate the stored user information via a screenshot the victim fortunately took. It seems the historical users (unknown if you have to match or just swipe) are still stored under the tinder2.sqlite "ZUSER" table. There are several BLOBs in this table that store the bio, schools, work etc etc so if you know what their answers were you can walk it in to the unique user ID stored in that table under "ZUSERID". I have no idea if Tinder will still have a record of this user post-account-deletion but it's more than I had an hour ago. It's also worth noting that the user ID photo is referenced in the database and is still live on their server.
Avatar
what format are people generally reporting in for court etc these days?
2:19 AM
do you find you have to clean them up at all?
Avatar
@Sudo What do you mean by clean them up?
Avatar
as in after exporting them going in to change the layout etc
6:19 AM
for example on a Cellebrite reporting removing all the "source file" info
Avatar
I've been fine to just choose the content I need then attach it to my actual report.
6:19 AM
Haven't needed to edit anything thus far.
Avatar
Andrew Rathbun 5/19/2020 7:03 AM
We take a look at the Q1 2020 and lifetime performance of 129,764 hard drives used in the Backblaze data centers.
Avatar
Love a good backblaze blog
Avatar
Andrew Rathbun 5/19/2020 11:08 AM
Cellebrite changing product names a bit
cellebrite 2
11:08 AM
A name can mean many things. It can be a word or phrase that provides a unique designation of a person or thing. A name can also be a word or symbol that defines an entity. We know the names that define your roles—First Responder, Forensic Examiner, Investigator, Analyst, Pros...
Avatar
@Andrew Rathbun 😀 😀 😀
12:24 PM
Made the top 3. Now to get voting !!! 😀
💯 8
Avatar
Andrew Rathbun 5/19/2020 12:24 PM
Vote early, vote often!
12:25 PM
Avatar
Thought of that but they had this caveat " You may only submit one set of votes. Any additional voting will discounted. " Ha ha
12:29 PM
That's me done ........ One final push folks ...
Avatar
Andrew Rathbun 5/19/2020 12:29 PM
Appreciate your support as always @Stevie_C
Avatar
@Andrew Rathbun It's those beers in the Caribbean you promised me 😉
🍻 4
Avatar
Vote early, vote often!
@Andrew Rathbun I see you are quoting the Illinois voting motto. We love to vote so much, even our dead vote twice.
😂 2
😆 1
Avatar
Quick question of your experience with CAS. What is the average turn around time for the subscription service per phone?
Avatar
@Cellebrite Yesterday I tried to carry out Android Generic Exynos FBE extraction on a Samsung Galaxy S10, it started a full file system extraction and I left it. I found that it appears to have errored and it asked me to put the phone into download mode. Entered download mode, selected Continue - and it came up with an error message with an option to abort or retry. Retry doesn't do anything so I had to abort. Samsung S10 is now stuck in a boot loop CMD Parameter modified. Unable to enter recovery mode, but can enter download mode. I have tried Samsung Exynos Recovery and I keep getting "Communication Error (Cannot initialize connection)". What do I do>
11:19 PM
?
Avatar
MalcolmPowder 5/19/2020 11:59 PM
Cellebrite changing product names a bit
@Andrew Rathbun Bit disappointing that they didn't keep a consistent naming convention and go with 'Cellebrite UFEDer' and 'Cellebrite UFED Clouder'.
Avatar
Quick question of your experience with CAS. What is the average turn around time for the subscription service per phone?
@mitchlang My personal experience with CAS has been horrrendous. A case that could have taken 1 day or less ended up taking six months. Would have taken longer if I wasnt persistent
12:08 AM
And annoying
Avatar
Made the top 3. Now to get voting !!! 😀
@Stevie_C Vote cast 👍
👍 1
Avatar
@Pacman i'll dm you
Avatar
heatherDFIR 5/20/2020 9:47 AM
https://www.cellebrite.com/en/life-has-no-ctrlaltdelete/ is live. get the old talks here with screenshares, when recorded. Otherwise you get the audio. 🙂 Not all sessions are loaded yet but will be soon.
💯 2
Avatar
For some reason I'm not receiving the emailed presentations that I registered for. Is there someone I can talk to about this in here?
Andrew Rathbun pinned a message to this channel. 5/20/2020 11:05 AM
Avatar
Wrote up a blog on using jupyter and hachoir to do file carving in unknown binaries, may be of interest to some --> https://blog.jeffbryner.com/2020/05/20/forensics-with-old-friends.html
Old Friends When you do infosec for a while you gather a collection of ‘old friends’; tools you rely on over the years to help you get your job done. Some are simple like dd, or xxd. Some are complex (vsCode?) but it’s fun to revisit some old friends in new context to see how ...
🤙🏽 1
👍 1
Avatar
Any state or local LE investigators using @Magnet Forensics Axiom Cloud add-on or @Cellebrite Cloud Analyzer for anything but parsing warrant returns or consent searches? Our state Attorney General issued a memo in 2017, essentially prohibiting us from using these products in conjunction with a search warrant to access suspect data held in the cloud. He said "they are working on a legal solution" but nothing so far.
Avatar
Anyone a nimbus guru here?
Avatar
Hi, can anyone help me with exploring the sms.db. of my own iphone in sqlite?
Avatar
Any state or local LE investigators using @Magnet Forensics Axiom Cloud add-on or @Cellebrite Cloud Analyzer for anything but parsing warrant returns or consent searches? Our state Attorney General issued a memo in 2017, essentially prohibiting us from using these products in conjunction with a search warrant to access suspect data held in the cloud. He said "they are working on a legal solution" but nothing so far.
@dfeyen Are you in VA???
7:32 AM
This is why consents are such a beautiful thing. I am retired LE and now obviously with Magnet Forensics and I just completed a talk at the MAgnet Virtual Summit on the 18th which detailed what you can get back form a "takeout" or a consent download and this would bypass any warrant needed.
Avatar
Have a locked LG L322DL. Anyone have luck withi this/.
Avatar
@RBegs2637 UFED Qualcom Profile Snapdgragon 425 MSM8917 should support Lock bypass
Avatar
@8198-IZ54 Thanks, jsut having no luck getting this Tracphone off, no matter what combo button, only to option to reset
Avatar
Is there a way to tell if a microSD card from a phone is encrypted? I have a 16GB microSD card that imaged as a 255 MB and shows only hex "55 55".
Avatar
@gt530 55 55 and smaller size points to controller issues and not encryption
👍 1
Avatar
Thanks
Avatar
Dr. Kaan Gündüz 5/21/2020 12:00 PM
@Andrew Rathbun very detailed, i wonder if there's going to be any more products reviewed. neutral review is something the community needed. i think we need a scoring system too.
Avatar
Andrew Rathbun 5/21/2020 12:01 PM
There are other reviews on that site. He seems to post about once a quarter or so. Sign up for the newsletter to get notified
Avatar
Does anybody know what the state DISCONNECTED/BLOCKED means in the Whatsapp log files?
Avatar
Is there any way of telling on an android whether location services were turned off for a certain period of time? I have a physical extraction from the device but I'm unsure where to start looking for that kind of information.
Avatar
Anyone know of any suppliers of adapter bundles? Looking to get a bundle preferably with warranty and good quality for SSDs for example M.2, Apple SSDs, U.2 etc, PCIe SSD etc... - Looked at the Tableau TKDA7-5-PC bundle but it's too pricey when you add the T7U price ontop of buying the bundle since we'd be needing multiple. Anyone got any knowledge of good adapter bundles, preferably supplier in the UK or close by so there's no hammering for import or shipping etc? Thanks in advance!
2:51 AM
(Warranty isn't absolutely critical but just aslong as the bundle of adapters are tried and tested good quality)
Avatar
Any state or local LE investigators using @Magnet Forensics Axiom Cloud add-on or @Cellebrite Cloud Analyzer for anything but parsing warrant returns or consent searches? Our state Attorney General issued a memo in 2017, essentially prohibiting us from using these products in conjunction with a search warrant to access suspect data held in the cloud. He said "they are working on a legal solution" but nothing so far.
@dfeyen What state are you in? I may be able to put you in touch with a prosecutor source who has worked on this issue at the AG level. DM me?
Avatar
Andrew Rathbun 5/22/2020 5:03 AM
21 more assigned members until we officially hit 4000!
👍 6
Avatar
does anyone know who I can dm to get a trial license?
Avatar
Andrew Rathbun 5/22/2020 5:35 AM
does anyone know who I can dm to get a trial license?
@xiaoburner of what software?
Avatar
oops my bad, magnet axiom
Avatar
taking super long, in the middle of a ctf haha
5:36 AM
🤣
Avatar
@xiaoburner sent you a DM
Avatar
just_deduce_it 5/22/2020 10:12 AM
Any recommendations for a NAS for evidence - situation is home/remote office ? Ideally with ability to archive off by year to cold storage.
Avatar
cyberPanther 5/22/2020 10:13 AM
Is there Foresnsic lunch today
Avatar
Matt - Monolith Forensics 5/22/2020 10:20 AM
@just_deduce_it I've had really good experience with the Synology NAS product line - it has backup solutions that can probably be setup to fit your archiving needs.
👍 2
Avatar
GraemeHorsman 5/22/2020 11:16 AM
sorry for my added spam, I've just moved this into general from Education with permissionHi everyone, I am currently running a study into the standardisation of language used in digital forensic statements/reports. If you can, I would appreciate your input on the following survey:- https://docs.google.com/forms/d/e/1FAIpQLSdjiSfvqGhIiBmKP5AcTL0ogxa7ZBqtWzay11Q4ihtmDss5Jw/viewform Thank you
Information for participants:- This study focuses on how digital forensic (DF) practitioners define areas of their investigatory work in their written reports. You should only respond to this study if you are either currently, or have been a digital forensic practitioner, or ...
Avatar
Whats everybody's thoughts on update an evidence iPhone to at least 12.4 to support checkm8? I would use a computer to update the phone instead of connecting it to wifi/LTE
Avatar
Andrew Rathbun 5/22/2020 11:36 AM
@goalguy as long as you can defend it in court then I don't see a problem. You could test it out on a test device and go from version whatever to 12.4 and compare dumps to confirm the update doesn't modify data (we know it doesn't but, you know, attorneys).
👍 1
Avatar
I like it @Andrew Rathbun Now to get a test device... whenever I get back in the office
Avatar
Andrew Rathbun 5/22/2020 11:39 AM
That's probably the only way I'd feel comfortable doing it is having that test example and the corresponding dumps validated and sitting in my evidence folder for that case so 2 years from now when the case goes to federal court, in your case, you have what you need to defend your actions from 2 years prior 🙂
Avatar
Very good point sir!
Avatar
Andrew Rathbun 5/22/2020 11:46 AM
And document everything you did so you don't have to reverse engineer your actions 2 years down the road when the mobile game is likely a lot different!
11:46 AM
Good luck bro
Avatar
advice needed... forensics on stolen devices using available resources like imei to track activities on the stolen device. pls advice?
Avatar
@IsaCrypt would have to make a police report and hope the Detectives have time and resources to write warrants for the phone. Sadley unless its connected to a larger crime it probably won't be handled that way. For example Google charges $250 for a search warrant. I don't see a department taking a $250 bath for a cellphone that was stolen. my 2 cents
Avatar
thank you for your response @DCSO ... i am from africa, here in my location there are known individuals that are able to monitor device activities such as outgoing calls and location using imei, they do this at a charge barely $20 and when they are able to retrieve tangible evidence the victims are called to report to the police to take the case up by providing them the evidence. but i am not sure if they have access to telecom providers database of customers.
Avatar
@IsaCrypt Wow that's a lot different here 🙂 I'm guessing for another $20 based on that they would have the call logs 😆
Avatar
Andrew Rathbun 5/22/2020 2:27 PM
Sneak peek at DFIR Resource of the Year voting thus far.
Avatar
CloudCuckooLand 5/23/2020 5:04 AM
I like it @Andrew Rathbun something about updating iPhone for Checkm8
@goalguy Just done it on a iP7, worked fine. Beware you can only update to currently signed versions, iirc 13.4.1, a beta and 13.5. If/when this changes you may not be able to update to a version currently supported by UFED's Checkm8.
(edited)
👍 1
Avatar
Does anyone have experience with portable field desktops like this? Looking for recommendations
😳 5
Avatar
Andrew Rathbun 5/23/2020 10:34 AM
Wow, that is really cool! Can only imagine the cost...
Avatar
Couple grand but I need a portable desktop with 6 screens
Avatar
Anyone a nimbus guru here?
@TheNetCat I’ll not say guru but what do you need help with?
Avatar
Anyone know of any suppliers of adapter bundles? Looking to get a bundle preferably with warranty and good quality for SSDs for example M.2, Apple SSDs, U.2 etc, PCIe SSD etc... - Looked at the Tableau TKDA7-5-PC bundle but it's too pricey when you add the T7U price ontop of buying the bundle since we'd be needing multiple. Anyone got any knowledge of good adapter bundles, preferably supplier in the UK or close by so there's no hammering for import or shipping etc? Thanks in advance!
@3X3 Bump, anyone? 🙂
Avatar
Hello all. Not sure which would be the best channel to post in, so we'll just go with general for now. I was wondering if anyone has some literature to point me to that explains the creation of cookies on a mobile browser (specifically Google Chrome in this instance)? I have a case I am conducting analysis on where the phone shows cookies being created moments before a vehicle crash. So I want to be able to explain how, why and when those cookies would have been created, as it seems to me that they would be a very big part of the causation of this crash.
Avatar
Deleted User 5/25/2020 3:31 PM
H/T @_RyanBenson 19 papers from the 12th CyCon: how cyberspace & cyber conflict will evolve in the 2020s, covering technical, strategic, & legal topics. https://ccdcoe.org/library/publications/12th-international-conference-on-cyber-conflict-20-20-vision-the-next-decade-proceedings-2020/
CCDCOE
Avatar
@3X3 - we just bought the tableau stuff through digital intelligence... only needed one so we just bit the bullet. FWIW they work great.
👍 1
Avatar
Any recommendations for a NAS for evidence - situation is home/remote office ? Ideally with ability to archive off by year to cold storage.
@just_deduce_it hello I'm very late but I also highly reccomend Synology if you want something that just works™️ and is easy to use
👍 1
12:40 AM
If you want to roll your own NAS openmediavault w/ ZFS might be an option...
12:41 AM
But for evidence.. would prolly do syn
Avatar
Can anybody recommend a glossary/definitions that they use when writing reports for investigators?
Avatar
@3X3 - we just bought the tableau stuff through digital intelligence... only needed one so we just bit the bullet. FWIW they work great.
@whee30 Thanks for the vouch!
Avatar
@Pseudonym we keep our own that we made, always adding to it
Avatar
We've been doing the same but wanting to compare our definitions to others
5:24 AM
Get with this guy
Avatar
it's not much but I can give you a copy of ours if you ping me an email
Avatar
Essentially to make sure we're not being misleading!
Avatar
Andrew Rathbun 5/26/2020 5:25 AM
post your definitions in there and maybe he can provide his list to you guys
Avatar
get with the plannnn
Avatar
Andrew Rathbun 5/26/2020 5:25 AM
Also, there's a limited set of forensic terms here - https://aboutdfir.com/education/forensic-terms/ but I'm sure in ISO land you guys have your own standards you have to follow
This page is meant to serve as a forensic terminology reference guide for the community on potential definitions, both layman and technical, as well as analogies and potential courtroom explanations for juries.  This website and its writers claim no responsibility for incorrec...
Avatar
Thanks, I'll fill in the form and see if he can get back
Avatar
ISO? what's ISO 😄
😂 1
Avatar
Andrew Rathbun 5/26/2020 5:26 AM
In Search Of, last i knew 🙂
Avatar
same here haha
5:26 AM
it hasn't got to us, yet
Avatar
Andrew Rathbun 5/26/2020 5:26 AM
@GraemeHorsman tagging you for visibility
Avatar
@Andrew Rathbun
Also, there's a limited set of forensic terms here - https://aboutdfir.com/education/forensic-terms/ but I'm sure in ISO land you guys have your own standards you have to follow
That's perfect!
This page is meant to serve as a forensic terminology reference guide for the community on potential definitions, both layman and technical, as well as analogies and potential courtroom explanations for juries.  This website and its writers claim no responsibility for incorrec...
Avatar
Andrew Rathbun 5/26/2020 5:27 AM
@Pseudonym if there are some missing or some wrong or option C, please let me know
5:28 AM
i'm looking to be more aggressive in updating the site in the coming months so I'm hungry for any suggestions
Avatar
We provide a definition of the artefact type
5:29 AM
For example a WhatsApp message, we define what whatsapp is, it's features and it's limitations. It's aimed at the lowest common denominator when someone views our reports.
Avatar
that's pretty much all it needs, just really basic (and with comparisons to common things they might know)
Avatar
@Pseudonym if there are some missing or some wrong or option C, please let me know
@Andrew Rathbun I'll take a proper look at it, like I said though, I think our department is defining different things, such as the particular artefacts for use on a report. Not sure if this is the best or common way around it or not for us
👍 1
Avatar
@Pseudonym check out ASTM E2916 Standard Terminology for Digital and Multimedia Evidence Examination https://www.astm.org/Standards/E2916.htm
E2916-19e1 Standard Terminology for Digital and Multimedia Evidence Examination digital evidence~ multimedia evidence~
Avatar
anyone from @OpenText please DM me have an issue with an email that was sent by your company.
Avatar
@Pseudonym check out ASTM E2916 Standard Terminology for Digital and Multimedia Evidence Examination https://www.astm.org/Standards/E2916.htm
@Brandon E thanks Brandon, Ive saved the link, I don't suppose you know what the product actually looks like? Only because if find it hard to justify buying it without seeing what it looks like or what it contains (even an example)
E2916-19e1 Standard Terminology for Digital and Multimedia Evidence Examination digital evidence~ multimedia evidence~
Avatar
anyone from @OpenText please DM me have an issue with an email that was sent by your company.
@San4n6 not anymore. Covid got me laid off.
7:19 AM
Maybe @Andrew Rathbun can fix that.
Avatar
@Pseudonym you may be able to get free access to all ASTM standards through NIST OSAC, it doesn’t look like it is limited to US only. If that doesn’t work let me know. Sorry, should have included this before. https://www.nist.gov/topics/organization-scientific-area-committees-forensic-science/access-standards
ADA - American Dental Association
7:23 AM
@Pseudonym to be clear all committee E30 forensics science standards.
Avatar
@vanquish I fixed your role
👍 1
Avatar
chrisforensic 5/26/2020 11:51 AM
@MSAB COOOL... today i got invitation for webinar for new version 9.0.2. ... when will this update be downloadable? (edited)
11:51 AM
Avatar
LG L322DL that I can not get to power off due to passcode and no button combos getting into recovery mode. All I can get into is factory reset and IMEI info. Suggetions??
Avatar
@chrisforensic This is expected to release very soon....
XRY 1
1:04 PM
You could however join me on a Webinar on XAMN if you wanted any tips and to pester me about upcoming release details ....... https://attendee.gotowebinar.com/register/6134682653218695438
Avatar
chrisforensic 5/26/2020 1:08 PM
thanks, registration webinar done 😉
XRY 2
Avatar
@chrisforensic You never know, we may teach you something new 😁 Because if I released details about 9.0.2 here you do realise that head office would be after me! (edited)
Avatar
LG L322DL that I can not get to power off due to passcode and no button combos getting into recovery mode. All I can get into is factory reset and IMEI info. Suggetions??
@RBegs2637 LG devices doesn't provide access to recovery mode, at least without unlocked bootloader.
Avatar
Can anyone from the @Magnet Forensics sales team shoot me a message! Thanks!
Avatar
DeeFIR 🇦🇺 5/26/2020 7:49 PM
Question for those who charge for email acquisition/analysis; how have you structured your pricing model? Per 'project', per hour, mailbox size? Just after a bit of guidance if anyone can provide some.
Avatar
@Jobbins I can connect you with the right person. Will send DM.
Avatar
Hi everyone. Just started to work as IR. I don't know if this the right channel to ask. Would just like to ask for any tips advice on /training/course/book to take to level up my skills. Thank you in advance
Avatar
DeeFIR 🇦🇺 5/26/2020 9:59 PM
Hi everyone. Just started to work as IR. I don't know if this the right channel to ask. Would just like to ask for any tips advice on /training/course/book to take to level up my skills. Thank you in advance
@Dracula Windows/Linux/network? What kind of environment?
Avatar
Hi. How can I get access to UFED beta version ?
Avatar
@skipper you can contact ido.kalderon@cellebrite.com by email and ask for the beta
Avatar
JonasWanobi 5/27/2020 5:19 AM
Samsung has unveiled a new security solution for mobile devices that includes an SE chip and enhanced security software
Avatar
@DeeFIR 🇦🇺 I think I should start on Windows. I also read this blog. https://medium.com/@sroberts/introduction-to-dfir-d35d5de4c180 Seems that I should start to learn or master the log analysis first as it is the most thing to do in Incident response.
One of my favorite things is talking to students and people new to the security field. It feels like yesterday I was wandering around the…
6:08 AM
Windows environment using Red canary/Carbon black.
Avatar
Josh Brunty 5/27/2020 2:53 PM
@Pseudonym http://lexicon.forensicosac.org is a great resource that aggregates ASTM/SWGDE terms identified by members of the NIST OSAC. This lexicon will continue to grow as we add new standards from SWGDE/ASTM/etc. (edited)
Avatar
@Andrew Rathbun is there a bot for role updates or are you still handling all that?
Avatar
DeeFIR 🇦🇺 5/27/2020 5:21 PM
@DeeFIR 🇦🇺 I think I should start on Windows. I also read this blog. Seems that I should start to learn or master the log analysis first as it is the most thing to do in Incident response.
@Dracula I find it's good to start in an area where you'll be able to apply learned skills. I may have missed it but you haven't said what role you're in - only that you're in IR.. that could be anywhere from a Level 1 SOC Analyst to an incident/breach responder. A SOC analyst may focus more on realtime network data assessment/triage, whereas incident/breach responder may be more aligned with 'traditional' DF like logs, disk images, etc. Are you using an EDR in your environment?
Avatar
Andrew Rathbun 5/27/2020 5:22 PM
@Turb0Yoda mods handle it. What's up?
Avatar
graduated
5:23 PM
werking
5:24 PM
well
5:24 PM
working in a month or two
Avatar
Andrew Rathbun 5/27/2020 6:19 PM
@Turb0Yoda congratulations!!
6:19 PM
I can change you
6:19 PM
Private sector? Other?
Avatar
Thank you
6:42 PM
Private sector
Avatar
GEEKSwithGUNS 5/27/2020 8:26 PM
@Dracula Agree with @DeeFIR 🇦🇺 it really depends on where you are first injecting into the process. You're likely to start at different pivot points in a SOC, in-house IR team, or with an external or law enforcement team. I normally see people take one of two approaches -- systemic (start with hardware, software, networking knowledge, then build on file system forensics, memory forensics, and one discipline at a time). Alternatively, I'm a fan of grabbing the nearest killchain chart and starting to think about where you can detect badness in your own environment -- then customizing your learning around that. For example, if you work in a SOC you might start with recon, do some research into scanning and enumeration techniques and OSINT, and start going "I want to learn X because my organization uses (insert whizbangtool) and I think I would be able to see that coming in (dataset) -- this way you naturally start to gravitate towards the subjects you want to start taking a deeper dive. This latter method is quite a bit more work on the frontend to stay organized, but IMO it pays off in dividends because you're close to the data for your organization and taking control of what you are learning and when rather than just marching through a syllabus. Just my .02 cents.
Avatar
Hi, I wondered if anyone could share a good terrorist/extremism keyword list?
Avatar
@Dracula I find it's good to start in an area where you'll be able to apply learned skills. I may have missed it but you haven't said what role you're in - only that you're in IR.. that could be anywhere from a Level 1 SOC Analyst to an incident/breach responder. A SOC analyst may focus more on realtime network data assessment/triage, whereas incident/breach responder may be more aligned with 'traditional' DF like logs, disk images, etc. Are you using an EDR in your environment?
@DeeFIR 🇦🇺 yeah. We are using EDR, red canary/carbon black. Basically what I'm doing is just if there is no alert from EDR or SIEM, I do threat hunting. And yeah! I think that's what I'm doing, a traditional DF, as we wait for the alerts on EDR and investigate why this modload occurs, filemod action deleted. For example, if software is updating, you can see several filemod action of first written, created file and deleted the old file. However, I'm not that confident on my investigation that's why I'm looking for some tips/advice. Heheh
5:45 AM
@Dracula Agree with @DeeFIR 🇦🇺 it really depends on where you are first injecting into the process. You're likely to start at different pivot points in a SOC, in-house IR team, or with an external or law enforcement team. I normally see people take one of two approaches -- systemic (start with hardware, software, networking knowledge, then build on file system forensics, memory forensics, and one discipline at a time). Alternatively, I'm a fan of grabbing the nearest killchain chart and starting to think about where you can detect badness in your own environment -- then customizing your learning around that. For example, if you work in a SOC you might start with recon, do some research into scanning and enumeration techniques and OSINT, and start going "I want to learn X because my organization uses (insert whizbangtool) and I think I would be able to see that coming in (dataset) -- this way you naturally start to gravitate towards the subjects you want to start taking a deeper dive. This latter method is quite a bit more work on the frontend to stay organized, but IMO it pays off in dividends because you're close to the data for your organization and taking control of what you are learning and when rather than just marching through a syllabus. Just my .02 cents.
@GEEKSwithGUNS Thank you for the advice man! I find this great. How come I didn't think of this. 😅 This is great, grab the nearest kill chain which is for me is to study every use cases first, and understand deeply.
Avatar
DeeFIR 🇦🇺 5/28/2020 6:06 AM
Great advice @GEEKSwithGUNS One of the things I recommend to new people is to do the same thing - grab the kill chain, think of ways you'd attack it and ways you'd defend it & collect evidentiary product.
👌 1
Avatar
GEEKSwithGUNS 5/28/2020 6:15 AM
Gotcha. Try using the MITRE attack matrix as a starting point.... https://attack.mitre.org/ . If you dissect the kill chain and look for particular TTPS.... you'll naturally learn the indicators/artifacts these leave behind
👌 1
Avatar
I'm really looking forward to this group. In the future I want to work on Law enforcement. 😅 Thanks everyone!
6:16 AM
Gotcha. Try using the MITRE attack matrix as a starting point.... https://attack.mitre.org/ . If you dissect the kill chain and look for particular TTPS.... you'll naturally learn the indicators/artifacts these leave behind
@GEEKSwithGUNS I was using this for a while, however I'm not confident on how to use this properly.
6:16 AM
I'm also looking a book for this or where to start
Avatar
DeeFIR 🇦🇺 5/28/2020 6:18 AM
Law enforcement or an intelligence agency? Specifically in DF or IR also?
Avatar
GEEKSwithGUNS 5/28/2020 6:22 AM
So... f you are starting most of your work at threat hunting.... I'd say start by looking for lateral movement, exfiltration, or persistence in the MITRE framework. Each of the links in that category is a fleshed-out introduction to that tactic/technique and contains a DETECTION section. That (and the references) should give you an idea of how you could detect such an attack in your own data.... the process of figuring out how to find it and understand it will push you in a good learning direction.
6:22 AM
It also contains MITIGATONS to stop that threat... so good to know if your organization has those mitigations in place first -- as this will inform whether this tactic or technique is worth digging further in your own environment. Really just gives you a place to start.
Avatar
Um like on police position first, then army? I think that's law enforcement? Then FBI or homeland security?
6:24 AM
Specifically in IR I think, as it is now what I'm doing and I think just need to level up my skills on that.
Avatar
GEEKSwithGUNS 5/28/2020 6:29 AM
Haha well you listed a lot of different career paths there. I'm sure if you start becoming proficient in areas you'll find the ones you gravitate towards.
Avatar
So... f you are starting most of your work at threat hunting.... I'd say start by looking for lateral movement, exfiltration, or persistence in the MITRE framework. Each of the links in that category is a fleshed-out introduction to that tactic/technique and contains a DETECTION section. That (and the references) should give you an idea of how you could detect such an attack in your own data.... the process of figuring out how to find it and understand it will push you in a good learning direction.
@GEEKSwithGUNS thanks man! You really know how to handle a beginner. Are you a teacher or something? Hehe will surely dig on this as this what really pointing the direction I think for me to level up my skills be confident.
6:31 AM
Haha well you listed a lot of different career paths there. I'm sure if you start becoming proficient in areas you'll find the ones you gravitate towards.
@GEEKSwithGUNS hahaha yeah. Really confuse on my career as working in IT security has a huge opportunity
Avatar
GEEKSwithGUNS 5/28/2020 6:32 AM
haha no sweat. We all started the journey somewhere.
Avatar
DeeFIR 🇦🇺 5/28/2020 6:33 AM
I keep typing responses and then deleting them because they're so broad and vague 🤦‍♂️
😂 1
Avatar
GEEKSwithGUNS 5/28/2020 6:33 AM
#AlltheForensics
Avatar
DeeFIR 🇦🇺 5/28/2020 6:33 AM
@Dracula I started off in a technical role, then joined LE for ~8-9 years, then joined a digital forensics team, hit my glass ceiling/got bored, moved jurisdictions, learnt the law again, built a new DF section, now I've moved home and I'm in IR
6:34 AM
I think you have to identify what actually interests you
6:34 AM
tbh, I'm sick of recruiters/uni/educators sprouting 'cyber' at every opportunity. It's the new buzzword, and everyone jumps on board because they think they'll rake in the cash. People want to do DF/IR and don't understand how a computer works, or how a network functions.
👍 2
6:35 AM
If you have a genuine interest in a particular field, explore that field and satisfy your interest. Keep learning new things, expand your horizons, try new roles. There's nothing to lose
❤️ 1
Avatar
GEEKSwithGUNS 5/28/2020 6:37 AM
Agreed. I'll caveat my MITRE/Killchain advice with... if you read the MITRE explanation for something and don't understand it... stop and find answers until you do 🙂
👌 1
Avatar
@Dracula I started off in a technical role, then joined LE for ~8-9 years, then joined a digital forensics team, hit my glass ceiling/got bored, moved jurisdictions, learnt the law again, built a new DF section, now I've moved home and I'm in IR
@DeeFIR 🇦🇺 just wow man. Can't imagine the experiences you got on this. Hope my future for this career is rainbow as yours. 😔😔
Avatar
DeeFIR 🇦🇺 5/28/2020 6:42 AM
If you don't mind me asking, how old are you?
6:43 AM
(or an age range)
Avatar
If you have a genuine interest in a particular field, explore that field and satisfy your interest. Keep learning new things, expand your horizons, try new roles. There's nothing to lose
@DeeFIR 🇦🇺 this is true. Thanks for the word Sir!
6:44 AM
If you don't mind me asking, how old are you?
@DeeFIR 🇦🇺 sure. I'm 25. Sorry for being sound childish. I was about to type this too on my previous message.
Avatar
DeeFIR 🇦🇺 5/28/2020 6:45 AM
Nope, not at all! Just helps other people gain a bit of perspective.
Avatar
Hi, I wondered if anyone could share a good terrorist/extremism keyword list?
@bang We have a hash list but not a keyword list. Eager to know if anyone else does though as that sounds interesting to have.
Avatar
Nope, not at all! Just helps other people gain a bit of perspective.
@DeeFIR 🇦🇺 Thank you Sir!
Avatar
DeeFIR 🇦🇺 5/28/2020 6:52 AM
@bang We have a hash list but not a keyword list. Eager to know if anyone else does though as that sounds interesting to have.
@Rob https://webcache.googleusercontent.com/search?q=cache:0dc-g1QYW0IJ:https://epic.org/foia/epic-v-dhs-media-monitoring/Analyst-Desktop-Binder-REDACTED.pdf+&cd=1&hl=en&ct=clnk&gl=au&client=firefox-b-d
6:52 AM
If you are thinking about tweeting about clouds, pork, exercise or even Mexico, think again. Doing so may result in a closer look by the U.S. Department of Homeland Security. In a story appearing earlier today on the U.K's Daily Mail website, it was reported that the DHS ha...
Avatar
Cheers, I'll take a look. In the meantime if anyone has a more EU/UK based one that'd be grand
Avatar
Brill, I will have a look
6:59 AM
I have emailed the CT data exploitation center (NDES) for a list. If they can share to law enforcement I will let people know
Avatar
Not sure where best to post this, a complete newbie to what I'm trying to do - I'm trying to decompile an android app but am struggling to even get JADX running on a windows 10 machine - it keeps throwing up the error "Could not create Java virtual environment, a fatal exception has occurred, program will exit". I've read that this might be something to do with how much memory Java is allowed to used on the computer and I've tried to follow guides on how to change my maximum heap size but nothing seems to be happening. Any advice is greatly appreciated!
Avatar
GEEKSwithGUNS 5/28/2020 7:19 AM
Hm, haven't done this before but maybe consider using something like bluestacks and extractor from google store to try and get it off natively? You should be able to pull that file out of bluestacks into your analysis machine.
Avatar
does bluestacks do the same sort of thing as android studio? I tried android studio and quickly realised I didn't know how to use it 😆
Avatar
GEEKSwithGUNS 5/28/2020 7:25 AM
haha it's basically just a PC-based android emulator.... so it'll run everything you can do on a phone in android natively and move files across to your computer from the "phone"
7:26 AM
Good for testing stuff without bricking a phone or making it look like you're on a mobile device
7:27 AM
Not sure it'll work for your use case and not sure how to fix your Java issue... but perhaps worth a shot as a plan B.
Avatar
definitely, thank you so much for your help. I figured there's no other way to figure out how to do this than to try and fail, read a lot, try and fail again and then plead for help haha!
👍 1
Avatar
GEEKSwithGUNS 5/28/2020 7:43 AM
Pretty much the solution to any forensic/programming challenge 😛
Avatar
Pretendigator 5/28/2020 8:37 AM
Windows phone forensics: (chipped off/physical dump) Located CAM/CP in a temp folder location> Users\DefApps\APPDATA\GROVELER\Temp the folder is filled with files with naming convention 'ART$###.jpg' other folders in the GROVELER folder are: FrameworkTemp INetCache INetCookies INetHistory Local LocalLow PlatformData Roaming if theres anyone that has dealt with something similar please DM me to discuss! Thanks
8:37 AM
or any ideas as to what GROVELER is, google tells me its a surfboard brand 😂
9:18 AM
"If the service locates duplicate copies of files, one instance of the duplicate file is stored in a central folder, and the duplicates are replaced with a link (a reparse point) to the central copy to improve disk usage."
9:18 AM
Not something I've personally encountered and that's written in the context of a Windows server, but might help somewhat @Pretendigator
Avatar
Pretendigator 5/28/2020 9:23 AM
Gives me a rough idea, I guess they've incorporated it into their phones to help with storage/having duplicated data?
9:23 AM
Thank you @OllieD
Avatar
is anyone else having issues downloading KAPE?
10:18 AM
im dumb
10:18 AM
turning off ublock origin and braves thing fixed it lol
Avatar
Andrew Rathbun 5/28/2020 11:17 AM
@Turb0Yoda first time using? if you have questions, feel free to ask
Avatar
kinda, I touched it... 2-3 years ago lol
11:19 AM
resetting up my homelab..
Avatar
Andrew Rathbun 5/28/2020 11:20 AM
It came out in early 2019, I believe
11:20 AM
Hence why it's on this year's Forensic 4:cast Awards ballot
11:21 AM
2020 Awards cover 2019 in its entirety
Avatar
can anyone give any insight on what the "AadRecoveryPasswordDelete" and "ClientRecoveryPasswordRotation" folders are in the System Volume Information folders? i assume some sort of of system folder, but i cant find any information on them
Avatar
Active Directory DSRM artifacts maybe ?
6:13 AM
ADRM
6:15 AM
Without providing what type of OS, environment, etc it will be hard to determine
6:15 AM
but I am leaning towards AD stuff but <shrug>
Avatar
Gusy do you know is there any way to recover deleted messages from 3 months ago from hotmail.com ? (edited)
Avatar
During an examination of parsed search history from a machine running windows 10 I've noticed a decent amount of the search history appears to be correct but then have a few hundred searches that all the reflect the same date and time all coming from the same webcacheV01.DAT. Browser used was Edge and search engine was Bing. Has anyone else seen this? I'm trying to figure out if it's normal, some type of corruption, or other scenario.
2:39 PM
@Luci you might have to check hotmails retention policy for deleted items. If it's 90 days or longer the only options might be subpoena or seeing if there is a local sync of the data to a device.
Avatar
@P3r1n - so you’re seeing duplicate results? What software? I know when looking at axiom you’ll see that in artifact view because it’s picking up the records from different spots in the database... web visit vs web history etc
Avatar
@whee30 Using Axiom, but while there are some duplicate records these are not. These show different searches being run in Bing but are all reflecting the same date and time stamp down to the minute. There are roughly 1500 unique searches that, based on the data, look like they were run nearly simultaneously. But in this same DAT I also have previous searches which look just fine and the date and time seem reasonable.
7:56 AM
I'm starting to think it's a corruption in the DAT but just wanted to make sure there wasn't some known Bing or Edge gotcha that I wasn't aware of. I appreciate you taking time to try and help @whee30
Avatar
UAC v1.1.0 released! UAC (Unix-like Artifacts Collector) is a open source command line shell script that makes use of built-in tools to automate the collection of system artifacts. Supported systems: AIX, BSD, Linux, macOS and Solaris. What's new?
  • Now you can use your own validated tools (binary files) during artifacts collection.
  • Date Range option can be used to limit the amount of data collected by logs, misc_files and user_accounts collectors.
  • New AIX, BSD, Linux, macOS and Solaris collectors.
  • New Sleuthkit fls tool extension.
  • Bug fixes and performance improvements. Please see the CHANGELOG.md file for more details. UAC is available to download at https://github.com/tclahr/uac
UAC is a command line shell script that makes use of built-in tools to automate the collection of Unix-like systems artifacts. The script respects the order of volatility and artifacts that are cha...
👍 2
Avatar
Hi guys. Anyone who already read this Digital Forensics and Incident Response - Second Edition by Gerard Johansen? Is it good for beginners?
Avatar
Yeah, from what I remember is it alright. I think it was a required reading for a class. Depends on what realm of DF.
Avatar
bad.brains 6/1/2020 9:03 AM
Hi all, I'm a student in the Scholarship for Service program currently working on a summer project on behalf of Davenport University, MI. We're looking to compile different avenues of possible future mentoring opportunities for students also in the scholarship program at Davenport University and Grand Rapids Community College, and having been a lurker here for some months, this was one of the first places I figured would be good to ask around in. Is anyone aware of local (to Michigan) groups or individuals who might be willing to take on mentees for cybersecurity or possibly just general IT advice?
Avatar
@bad.brains My university had a Scholarship for Service program as well. Our strategy for building our mentorship connections was to create partnerships with companies by researching DF problems relevant to them. This led to many students working on real-world cases. (edited)
Avatar
bad.brains 6/1/2020 4:39 PM
Thanks very much! I'll see if we can work out something similar for our group! 😄
Avatar
I’d reach out to local startups too. They often lack the resources to handle cyber incidents. Would be an interesting project to have students build open-source tools to assist their security teams.
6:48 PM
I think everything my university made has been closed-source (and for good reason lol)
Avatar
thank you @P3r1n
Avatar
Automatically changes without network connectivity
5:19 AM
Took a test iPhone, removed SIM and put in flightmode. Set time manually to 12:57am 29th March. Phone went straight from 12:59AM to 02:00 e.g. GMT to BST
5:20 AM
iPhone 8 running iOS 13.3
Avatar
@Cellebrite Is there any possibility for Cellebrite Premium to change, or freeze, the iPhone's time and date during unlocking process?
Avatar
Ill send you dm (edited)
Avatar
Edited to make the question simpler. If you need backstory, DM me. Is it possible for an iPhone to not change time and date (1 hour ahead) without any connection to the network? (29th March) Phone was seized on 28th March, first turn on without SIM card on 1st April.
@Pacman is this confirmed? would like to hear more specifics on this.
Avatar
bad.brains 6/2/2020 7:17 AM
@quack thanks again Zach, just saw your follow up!
Avatar
While I'm still lurking, does anyone recommend any particular forensics books?
Avatar
Andrew Rathbun 6/2/2020 11:03 AM
@bad.brains https://aboutdfir.com/reading/books/ has a bunch listed and it's nice and pretty
11:04 AM
All depends on what you want to learn/what you want to do. There's TONS of books out there covering various subjects
11:04 AM
and there are some mandatory books for everyone in general, as well as mandatory books for specific subdisciplines (edited)
Avatar
Thanks so much!
Avatar
@tclahr thanks alot! I was looking out for command-line tool, in particular with date range option! (edited)
Avatar
you are welcome. Just let me know if you have any additiional suggestions for the tool
👍 1
Avatar
return2zero 6/2/2020 5:21 PM
Hi all, I have an Office 365 query re licensing. The allegation is an ex-employee with Global Admin access was trying to trash the tenancy. Auditing was not enabled. Microsoft states that when a license is removed from a user account, that user's data is held in the tenancy for 30 days. When a licence is reapplied to the user account within the 30 days you can access the data and mailbox again. After 30 days, the user's data (except for documents stored on SharePoint Online) is deleted permanently from Microsoft 365 and can't be recovered. The user accounts are not deleted, they were active and unlicensed. The mailbox storage reports (attached) shows that when licenses were reapplied to user accounts almost 2.5 months later (by me), the mailboxes re-connected, all content. Any thoughts on what is going on here?
5:21 PM
Avatar
DeeFIR 🇦🇺 6/2/2020 10:25 PM
@return2zero are they still single user mailboxes and not shared mailboxes?
10:26 PM
and is litigation hold set on them?
Avatar
return2zero 6/2/2020 11:47 PM
@return2zero are they still single user mailboxes and not shared mailboxes?
@DeeFIR 🇦🇺 Yeah single user mailboxes, not shared. Default retention policy in place and no litigation holds.
Avatar
Does anyone have an Disk I/O X-Tension for X-Ways that when adding encrypted E01 files it provides a lovely popup box (Similar to that of EnCase / Blacklight) where you get the option to enter the user password so we can examine within X-Ways? Such examples include Bitlocker + APFS.
Avatar
rugby_tech_geek 6/4/2020 12:14 AM
Good morning all, I am hoping you can help. We are trying to write up a business case for a new server. Our QM has cited FSR codes as something to consider pre purchase. They are concerned about offsite storage. I am wondering what other UK LE have done to overcome the offsite storage issue to achieve the FSR codes. Have others linked their data to another server onsite or have they gone remote? Any advice would be greatly appreciated.
Avatar
what is the worry about off-site storage exactly? Fear of a 3rd party accessing the data? The data being out of your control?
12:58 AM
To add context to my question, my previous role in the UK involved us storing data on tape off-site and we were accredited with both 17025 and FSR codes
12:58 AM
well, during my time not yet with FSR but I know they are now
Avatar
rugby_tech_geek 6/4/2020 1:47 AM
What were you backing up? Images files and case files or just image files? Were you manually transferring the tapes offsite or did you have a pipe from your unit to the remote location? How often were you backing up?
Avatar
Maybe a bit off-topic question, but what camera solutions do you guys use for documenting phones? I'm talking about recording the screen of MDM-phones and similar scenarios, where we can't extract data from devices. We have an Ipevo camera that came with our Cellebrite kit, but the video quality is pretty bad. I'm thinking maybe the 4k version will do the job? https://store.ipevo.com/IPEVO-V4K-Ultra-High-Definition-USB-Document-Camera_p_14.html
3:16 AM
Any experience with this or suggestions of other solutions are welcomed 🙂
Avatar
Andrew Rathbun 6/4/2020 3:29 AM
Search the server for "Tagarno" and that's the microscope that I used when documenting Chip-Off, etc. It's pricey but it's awesome. Jump to some of those posts about Tagarno and there should be others talking about other, cheaper solutions, too. I know I've brought up Tagarno a few times in the past.
👍 2
Avatar
@Pacman @OllieD The iphone keeps time in UTC. It uses a db for timezones changes (tzdata) to apply them to the actual time displayed. This doesn't need network connectivity (you only need network for updating tzdata once in a while). The same process happens in many other *NIX/BSD like systems.
Avatar
Is anyone here using AWS Glacier for archival storage? My IT guy is coming in to pitch it to me with a rep or something but cloud storage in general doesn't sound like a great idea for me. I do work with CSAM and I would rather use tape backups for my storage requirement level
9:28 AM
We don't have the requirements or budget to justify NAS arrays in two locations but a stack of tapes is easy.
Avatar
@whee30 I would be interested in this as well. I would assume that it would need to be at-least AWS GovCloud
Avatar
I'm not comfortable with the idea of cloud, but I'm also at least generally aware of how encryption works so I know in my head that it's likely secure as long as the keys are managed appropriately. The next question comes down to cost, at an advertised 0.013/GB for the first 50TB, the monthly cost is 650. If I want to spend 3k on an LTO6 drive and a pile of tapes, I will have broken even in five months.
10:20 AM
Tapes will require more effort on my end but I'm a one-man shop in a small market... If I'm getting balked at renewing software each year, then 7,800/yr in cloud storage fees are going to kill them.
Avatar
The only advantage I see is the cloud is off site. If you have a fire then your tapes are gone... But not sure that justifies the cost.
Avatar
anyone here well versed in blockchain forensics?
Avatar
@whee30 Glacier helps with surges like when you arrest a large ring of organized crime, to free up some local space by pushes old cases to Glacier, until Procurement can get more drives/tapes
Avatar
So it looks like I was reading pricing wrong. Depending on location of storage, the actual storage cost could be as low as 0.004/GB, coming out to $200/mo. Retrieval cost is between 0.02-0.09/GB depending on the speed of delivery/destination and upload costs seem to be free. So it would take a little over a year to break even with a one time purchase, not counting the man-hours to manage and troubleshoot any onsite issues.
12:21 PM
assuming 50TB stored, again. There is the added benefit of being bale to purge individual cases/files which would otherwise require the restructuring of existing tapes
12:21 PM
I'm still not sold - going to do some more homework but it seems more viable than it did this morning.
Avatar
@whee30 I may be a little bias, but i was also against cloud storage. Seeing behind the curtains of AWS though I'd be much more comfortable with it should I get back into the government field. I don't work in sales I promise 🤣
Avatar
he works in sales get him
🤣 4
Avatar
@BETBAMS after a bit of trial and error with different apps we use Vysor for screen recording android, iMovie for iPhones. If audio is required for Android we use Vysor fed through to OBS Studio so we get screen and audio e.g. voice WhatsApp messages etc. Vysor will also work over WiFi closed network too if laptop and phone are on same network which is handy if USB port isn't playing ball Also to consider is XRY Photon 🙂 (edited)
Avatar
@Cellebrite can you please DM, I am looking for a quote.
Avatar
Andrew Rathbun 6/4/2020 6:45 PM
@dfir_rick have you tried reaching out to sales via their website? That's the preferred method
Avatar
inbound
Avatar
Have not, my deputy chief was just asking.
Avatar
I'll get the sales guy to reach out 🙂
Avatar
Perfect! Thanks again Paul
Avatar
youre welcome
Avatar
@JMK Thanks, we also use Vysor and Quicktime for Android/iOS. But what I'm talking about is an actual camera filming the screens of tje phones that we can't extract data from. MDM-phones such as BQ with Encro chat and the likes. 🙂
12:24 AM
The Vysor/OBS combo sounds interesting though. Can you elaborate a bit on that?
Avatar
Ah sorry I see, for that we just have a SLR camera set up on a copy stand to save our backs 😆
Avatar
@BETBAMS we set up Vysor as normal but couldn't get it to do audio which is what we really needed it for. So.. set up Vysor like normal so it displays the phone screen, then connect audio cable from headphone socket on phone into microphone socket on laptop. Start up OBS, then select the Vysor window to record. Press record in OBS start your exam on the phone, playing any audio etc and it's then in your video. we also have it so we can type in the exhibit ref so that shows in the recording above the Vysor window. If you're doing it over closed network if USB is dodgy then it picks up the audio from the room so you have to make sure you're somewhere quiet! It's a bit convoluted but we tried scrcpy and a couple of others and this was the best way we could find for audio capture. We do also have Eclipse software which we can use for manual photography, can't remember the exact manufacturers but can dig out when at work if you need. That's linked to a camera but only does stills I think but in the end it's quicker to use SLR camera and just click away.
Avatar
Deleted User 6/5/2020 12:47 AM
Maybe a bit off-topic question, but what camera solutions do you guys use for documenting phones? I'm talking about recording the screen of MDM-phones and similar scenarios, where we can't extract data from devices. We have an Ipevo camera that came with our Cellebrite kit, but the video quality is pretty bad. I'm thinking maybe the 4k version will do the job? https://store.ipevo.com/IPEVO-V4K-Ultra-High-Definition-USB-Document-Camera_p_14.html
@BETBAMS I just got this exact camera yesterday and my first impression is pretty good. I downloaded the software IPEVO Visualizer from their homepage and it works pretty well for taking good quality images and videos.
Avatar
@JMK and @Deleted User Thank you both!
👍 1
Avatar
What were you backing up? Images files and case files or just image files? Were you manually transferring the tapes offsite or did you have a pipe from your unit to the remote location? How often were you backing up?
@rugby_tech_geek Image files and reports/statements. We had an automatic enterprise NAS system which auto backs up 2 copies of new data to 2 or more tapes. The 2nd copy is periodically removed and sent off-site manually (someone came to collect a locked pele case with them in)
1:13 AM
we used AD LAB so backing up case files isn't so straightforward with the setup we had
1:14 AM
Also worth noting, the system we had can do the auto copying to a remote site without tapes, but we did not have a connection with sufficient bandwidth to make that viable
Avatar
In terms of frequency, from memory I think image file locations were checked every 30 mins for changes/new files. Off-site collections happened on an ad hoc basis as and when needed on a per case basis
Avatar
@Deleted User I use IPEVO, I've been very happy with it.
Avatar
Deleted User 6/5/2020 12:05 PM
Anyone in Medical Device Forensics
Avatar
Anyone know how long google voice subscriber information is preserved? If google were subpoenaed how long do they store information?
Avatar
I would imagine if the account is active the info is stored... they'll take your phone number away for being inactive but they never shut my account off after a long dormant period
2:36 PM
Does anyone have experience with Google providing access to a gmail account for a deceased subject? Investigating an unattended death, I have the email and password but the device is currently inaccessible. I can't obviously log on from a new device without 2 factor auth. I know Google can provide access to family but I'm skeptical they would cooperate with me. I hesitate to ask them lest they deactivate the account upon my request
Avatar
after further research it wasnt a google voice
2:56 PM
it was a pinger.com account
2:57 PM
any. way thank you @whee30
Avatar
Is it possible to extract GPS data from a android Samsung galaxy J6+ mobile, when the location has been turned off?
Avatar
Morning all, anyone able to direct me to any free/open source forensic SQLlite tools for Linux ? Thanks in advance. (edited)
Avatar
Can anybody recommend a reliable machine to remove back covers from cellphones?
Avatar
@theAtropos4n6 will this show deleted entries etc?
Avatar
theAtropos4n6 6/7/2020 7:09 AM
@Artea I misread what you wrote and thought you asked for Sqlite viewer software. You could use any software with carving capabilities such us autopsy.
Avatar
@Artea you can take a look at this tool and informations in there: https://github.com/aramosf/recoversqlite
recover deleted information from sqlite files. Contribute to aramosf/recoversqlite development by creating an account on GitHub.
👍 2
Avatar
I was thinking of installing a linux distro an ssd. I know there are tons out there but has anyone attempted forensics or DFIR through openSUSE, arch or fedora? I know Ubuntu has plenty of options, especially with options like SIFT but that is a live distro. any opinions?
Avatar
@kairos if you want to do forensics on linux distro, make sure you give SIFT or https://tsurugi-linux.org/ a chance
Avatar
I have sift but AFAIK it is a live distro and not meant to be installed.
Avatar
I can recommend TSURUGI. Normally, I'm not fan of these out-of-the-box often bloated distributions, but I really like Tsurugi. It's very well maintained and the tools work out of the box. If I recall correctly, it can be run as live-portable boot (w/o installation).
Avatar
you can install SIFT
Avatar
Thanks for the recommendation. Maybe I am not specifying properly, Im looking to install to a disk and run as a daily with analyzing capabilities
12:11 AM
checking that site @Karamba
12:12 AM
still on 16.04 I see
12:15 AM
As of 4/17/20 it seems 20.04 is the next base they are looking to support
Avatar
yes @kairos i recommend tsurugi too
Avatar
MrMacca (Allan Mc) 6/8/2020 4:42 AM
Got a weird issue and unsure whether it is UFED PA or Nuix that is causing the issue. Did a GK extraction of an Iphone, Hashes all match. Added it to Ufed PA and generated a report. When this UFDR report is loaded into Nuix 7.68, I get a Poisoned file warning.
4:43 AM
Tried older versions of UFED PA, same thing, a poisoned file. So I'm starting to think that somewhere down the line, some of the files are being removed from the UFDR, and then once they are being loaded into nuix, nuix is looking for the files that no longer exist.
4:44 AM
Has anyone had any issues ingesting a UFDR into Nuix due to it being a poisoned file? I have recreated the UFDR report numerous times, all with different options and always the same issue.
4:45 AM
Colleagues have also tried and the result is the same. Is it possible the original GK extraction is the cause?
Avatar
yes @kairos i recommend tsurugi too
@JF as a live vm or full install you have tried
Avatar
Hey I got a question for law enforcement folks. Someone in my town is going around egging property and knocking mailboxes. We think we know who it is but due to timing and the the surrounding drama...i actually heard and saw the car briefly but didn't see them egg my car.
9:58 AM
Typo. I think I know who did it but don't have much evidence.
9:58 AM
They posted something on snapchat but no one was able to record it in time. It also didn't include any crimes.
9:59 AM
I'm guessing the police won't take action given my info isn't enough to go after someone?
Avatar
Andrew Rathbun 6/8/2020 10:08 AM
@funk if there was no evidence of a crime on their SnapChat, then there's no legal justification for LE to establish probable cause for a SW for his SnapChat account, which would get at least the last 90 days of snaps, chats, etc, last I knew
Avatar
@Andrew Rathbun yeah but location data would place them at crime scene e
10:09 AM
And assuming they took videos
Avatar
Andrew Rathbun 6/8/2020 10:09 AM
I always say report even the small stuff because if this is the first in a string of 10 incidents to come, at least it's reported and it'll establish a series of behavior and it'll be just another charge if he's about to go on a spree
👍🏻 1
Avatar
I'm standing on loose ground for my argument
10:10 AM
Yeah we called the police. I just don't want my new car damaged or worse my sister hurt over some high school bs cause some hood rat can't get laid
Avatar
Andrew Rathbun 6/8/2020 10:10 AM
yeah if there's property damage, there's no reason not to report it. CYA at that point and insurance will want a police report number
10:11 AM
Try to get a license plate if you see the car next time
10:11 AM
Keep it handy for next time this person offends
Avatar
I am looking for information on parsing ".om.dropbox.attributes" and "com.dropbox.attrs" files. I understand that they are alternate data streams created by DropBox when the filesystem does not fully support extended metadata. Does anyone know what information gets placed in the alternate data streams and is there a guide to parsing this data (so I can write a tool) or a tool that already exists? Thanks (edited)
Avatar
Does anyone have a GPS expert in the UK in their contact books?
Avatar
@kairos with the two version livecd for imaging or in VM for image analysis
Avatar
@Jamey Sorry, it's taken me awhile to check back here.....No, I'm not in VA, but WI. And yes, consent is beautiful, but I'm looking more towards closing that gap with a warrant in hand. Unfortunately, the responses I've gotten back from this and other platforms seems to indicate that the legal hurdles, at least for us state/local LE, have not yet been overcome.
Avatar
Being prior LE I will tell you something you already know. here will always be legal hurdles, but let me wish you the best on traversing the hurdles to successfully gain access. Let us know if we can be of any assistance.
10:45 AM
@dfeyen
Avatar
Does anyone have a GPS expert in the UK in their contact books?
@Zhaan Think this was asked before after Dr Last passed away, not sure anyone stood out then
3:44 PM
My best answer would be Noel Lowdon of Harper Shaw Investigations. He worked with Dr Last previously and specialises in vehicle forensics
3:45 PM
In fact he posted this yesterday (edited)
Avatar
@OllieD thank you.
Avatar
Has anyone worked with trackimo gps devices? Is there any software or specialized cables to dump the contents like coban gps?
Avatar
@Michael K. maybe not the answer you're looking for but I had good luck on my last cell-based GPS tracker by writing a paper to the company for account info and all of the logs. Since the device reports to a server it might still all be stored there. It worked for me so I never tried to crack it open beyond dumping the SIM.
Avatar
Couldn't find a good place for this, so thought I'd try here! Out of interest, has anyone got any good ideas for keeping staff...sane during COVID?? We have some measures in such as gaming at dinner time over LAN, but they all used to go for dinners together and have a good chat, now it's all been cut - Interested if anyone is doing anything in the interim? We've considered:
  • Board games on LAN (Struggling to find good sources for this)
  • Zoom quizzes
  • Pin the tail on the apprentice (Not sure this will pass HR..)
  • Poker over LAN (No gambling ofc, fake chips) Any input would be valued!! 👍
(edited)
Avatar
cyberPanther 6/10/2020 12:17 PM
i ran a super timeline and the output is a 3.5GB csv file. Please what tool can i use to view and search through this for an investigation?
Avatar
why not just leaving records close to the pivot date/time you are interested in?
Avatar
Is it possible to request subscriber information from Facebook regarding a (possibly) deleted user? I have a messenger-conversation but when trying to find one of the users it shows up as the page is no longer available
Avatar
theAtropos4n6 6/11/2020 12:18 AM
Is it possible to request subscriber information from Facebook regarding a (possibly) deleted user? I have a messenger-conversation but when trying to find one of the users it shows up as the page is no longer available
@Cygonaut You can subpoena Facebook to provide you the user data or at least keep the user data until you get the proper warrant. By default, when a user deletes his account, Facebook prompts him that information will take up to a month to be completely deleted from theis servers. As far as I remember.
Avatar
Unfortunately the case is quite old, so the account is probably long gone. might be worth a shot anyways
Avatar
Thanks
2:46 AM
@Cygonaut You can subpoena Facebook to provide you the user data or at least keep the user data until you get the proper warrant. By default, when a user deletes his account, Facebook prompts him that information will take up to a month to be completely deleted from theis servers. As far as I remember.
@theAtropos4n6 Can you do that though if he's not in USA? does it work cross country boundaries?
2:46 AM
Unfortunately the case is quite old, so the account is probably long gone. might be worth a shot anyways
@Cygonaut what information are you trying to get from facebook - is there not an OSINt way to couple that user with some other types of information you need
2:48 AM
or maybe a circumspect way of attaining the information
Avatar
theAtropos4n6 6/11/2020 3:08 AM
@Cygonaut what information are you trying to get from facebook - is there not an OSINt way to couple that user with some other types of information you need
@Petrovski Depends the case but yes, it works even if out of USA.
Avatar
alright, TIL thanks!
👍 1
Avatar
@Petrovski Our OSINT people got back with that the facebook account it was associated with is no longer available. thats all i have heard about it, mostly wondering if anyone has had any success despite this being the fact
Avatar
Alright, I dont know about the cross-border thing. Thanks for the response 🙂
6:16 AM
sorry cant be more helpful
Avatar
Terminator_Bone 6/11/2020 7:19 AM
Hi, how can u see if someone using a VPN ip adres?? Is this possible to see or recognize??
Avatar
@Terminator_Bone If you fancy paying there's a list here. Not sure if there are better free services available - Normally I just dig and look for VPN apps / profiles on devices: https://udger.com/resources/ip-list/anonymizing_vpn_service
Detection of IP addresses by public proxies, VPN services, fake crawlers and more
👍 1
7:23 AM
Here's a free list, hasn't been updated for 3 months though: https://github.com/ejrv/VPNs/blob/master/vpn-ipv4.txt
List of datacenter & VPN IP addresses. Contribute to ejrv/VPNs development by creating an account on GitHub.
👍 1
Avatar
LordWhistleBottom 6/11/2020 8:23 AM
is anyone available to troubleshoot an issue i've run into with cellebrite?
Avatar
LordWhistleBottom 6/11/2020 8:47 AM
I think I got it, cellebrite version was too old for the iOS version
Avatar
Anyone from @Cellebrite available for a chat about the tool with no name?
Avatar
chrisforensic 6/12/2020 5:26 AM
tool with no name ???
Avatar
the famous cellebrite's voldemort project
😆 2
🤫 2
Avatar
Andrew Rathbun 6/12/2020 11:20 AM
Contribute to EricZimmerman/SQLECmd development by creating an account on GitHub.
💯 1
Avatar
Hi folks. Any person from NW3C available for a quick chat?
Avatar
Andrew Rathbun 6/13/2020 6:44 PM
@NW3C
Avatar
Sure.
7:13 PM
Just now saw this message. Send me a PM If you still need assistance.
Avatar
Being a Investigator, Compare and demonstrate that what the different information of File that can be collected through FAT32 File System, NTFS File System and EXT4 File . Use any freeware tools to demonstrate your explanations.
10:41 PM
can someone help me with this.any help will be accepted
Avatar
Andrew Rathbun 6/14/2020 3:13 AM
@antobanto download Active Disk Editor. Make your own FAT32, NTFS, and EXT4 partitions or look for some on AboutDFIR's Tool Testing page. Then look at file metadata for a file for each of them. Also, procure a copy of File System Forensic Analysis by Brian Carrier. That should help as well
3:13 AM
NTFS you're going to want to look for all the different attributes that are stored.
3:14 AM
I don't know much about EXT4 and I've forgotten a lot about FAT but there's plenty of documentation out there. MSDN might even have documentation on most, if not, all of those file systems.
3:14 AM
I think it was FAT recently that had all its documentation published within the last year? I could be remembering that wrong
3:14 AM
but that's about all I'll give you since this smells like a homework question. Plenty of leads to go off of
Avatar
thanks for the leads. Now i can start researching on my own.thanks for all the info @Andrew Rathbun
Avatar
Andrew Rathbun 6/14/2020 3:18 AM
And really, wikipedia is not supposed to be "cited" but it's pretty much always a great start to any homework/research project - https://en.wikipedia.org/wiki/Design_of_the_FAT_file_system
A FAT file system is a specific type of computer file system architecture and a family of industry-standard file systems utilizing it. The FAT file system is a legacy file system which is simple and robust. It offers good performance even in very light-weight implementations, ...
3:19 AM
Okay I'm done now lol
Avatar
Thanks. Just sent you a PM.
Just now saw this message. Send me a PM If you still need assistance.
@Adv4n6
5:51 AM
Thanks
@NW3C
@Andrew Rathbun
Avatar
🖖💀Big-Brother💀🖖 6/14/2020 3:41 PM
in anyone here familiar with the dude on Instagram who's torturing and killing animals?
Avatar
Andrew Rathbun 6/14/2020 3:45 PM
@🖖💀Big-Brother💀🖖 sounds like a horrible person. Besides reporting to https://www.fbi.gov/tips, anyone know of any other internet police this dude can be reported to?
3:46 PM
Sounds like he should be removed from Instagram, too. Copy down his username somewhere and report to a police department, maybe? Issue will be jurisdiction. But if there's evidence of a crime, Facebook's LE portal is super easy to use for a preservation letter as well as a follow up search warrant
Avatar
🖖💀Big-Brother💀🖖 6/14/2020 4:11 PM
he removed his account for around 10 hours
4:11 PM
and over a dozen people reported him. (edited)
4:11 PM
thanks ill try that
4:12 PM
also i feel like i should mention that we (the dont fuck with cats discord server) have over 54 pictures and videos
4:13 PM
face and tattoos included
Avatar
Andrew Rathbun 6/14/2020 4:13 PM
Sounds like that'd be good evidence to provide to whoever is investigating. No clue which PD would take jurisdiction over that. Has he been doxed yet? Anyone know where he lives?
Avatar
🖖💀Big-Brother💀🖖 6/14/2020 4:15 PM
he hasn't been doxed as far as i know
4:16 PM
and we suspect that he placed a ad on Craigslist (asking for pregnant cats) that (with other evidence) suggests that he lives in Boise Idaho or in a neighbor state
4:17 PM
but we don't know for certain
Avatar
Andrew Rathbun 6/14/2020 4:17 PM
Wow, that's messed up. I'm a huge animal lover and that disgusts me.
4:17 PM
Might be worth reporting to Idaho State Police to see if they can look into it then
4:18 PM
If you have any procedural questions on how to deal with LE, just ask away here. Tomorrow is a business day so hopefully some active LE personnel will happen to be in that area and can provide more guidance.
Avatar
🖖💀Big-Brother💀🖖 6/14/2020 4:19 PM
crap
Avatar
Andrew Rathbun 6/14/2020 4:20 PM
You can report a crime 24/7/365, it's just narrowing down the proper jurisdiction is going to be key
4:20 PM
That's why I asked about him being doxed
Avatar
🖖💀Big-Brother💀🖖 6/14/2020 4:21 PM
so someone attempted to contact him and he responded with "i know where you came from (her actual discord username instead of her fake account)
4:21 PM
i see
4:22 PM
how do i go about contacting Facebook le portal?
4:22 PM
like is there anything specific i need to do
Avatar
Andrew Rathbun 6/14/2020 4:22 PM
how do i go about contacting Facebook le portal?
@🖖💀Big-Brother💀🖖 that's the job for the agency this gets reported to
4:22 PM
like is there anything specific i need to do
@🖖💀Big-Brother💀🖖 You need to gather as much information as possible. Timestamps of the alleged incidents. Screenshots. Usernames, etc
4:23 PM
to preserve the contents of his Instagram account, thankfully all they need is his Instagram username and a police report number.
4:23 PM
Search warrant will require probable cause which hopefully will be established with the other evidence you guys have
4:24 PM
then from there, it's just figuring out which police agency has jurisdiction and hopefully they know how to run with digital investigations like this
Avatar
🖖💀Big-Brother💀🖖 6/14/2020 4:25 PM
i see
4:25 PM
ill get started putting things together
4:25 PM
also thank you so much for your help.
4:26 PM
your a lifesaver in more ways than one
Avatar
Andrew Rathbun 6/14/2020 4:26 PM
Please circle back if you have any more procedural LE questions. Plenty of people here to help, especially with something like this
4:26 PM
People like this....yeah, I'll leave my comments to your imagination 🙂
Avatar
🖖💀Big-Brother💀🖖 6/14/2020 4:27 PM
thank you and i absolutely
4:27 PM
will
Avatar
Andrew Rathbun 6/14/2020 4:28 PM
And if somehow it gets figured out he lives in Anytown USA, the Anytown Police Department is going to be the number you want to Google and file a police report with. If not, and you have a hunch it's Idaho, I'd argue reaching out to their state police and filing a report may not be the worst idea in the world. I think the narrowing down of which specific Craigslist region it was posted in would be your guide for that (edited)
4:30 PM
Hopefully they would start the investigation and if in their investigative travels they learn where actually lives and they need to pass it off to that respective jurisdiction, then I would like to think they'd do that so the investigation could continue within the appropriate jurisdiction
Avatar
Tsukiyama_Shuu 6/14/2020 5:09 PM
Hi guys I am new to this discord and fairly new to mobile forensics in general I am currently enrolled in an Msc Network Security Programme at Heriot Watt University and for my thesis doing a comparative analysis of mobile forensics toolkits. For my thesis I have chosen 4 softwares i.e. Cellebrite UFED, Magnet Axiom Forensics, Paraben's E3 and Oxygen forensics detective. Do let me know if you have any feedback to give that will help me a lot and also tell me which channel should I direct my questions on as I don't want to disturb everyone :)
Avatar
Andrew Rathbun 6/14/2020 5:30 PM
@Tsukiyama_Shuu thanks for your message and welcome. What in particular are you wanting to know? Do you just want feedback on your completed thesis? If so, #training-education-employment is your best bet
5:31 PM
I think for the purpose of your thesis that would probably be the best channel anyways.
Avatar
Tsukiyama_Shuu 6/14/2020 6:01 PM
@Andrew Rathbun thank you for your message my thesis is not yet complete I have to still complete it and what in particular I wanted to know was what do you usually look out for when doing comparative analysis between two or more forensics softwares. Like maybe Time, Cost of data extraction, is the data extracted encrypted by default or not? Suff like that. I will post on the #training-education-employment channel thanks for the info.
Avatar
Andrew Rathbun 6/14/2020 6:02 PM
@Andrew Rathbun thank you for your message my thesis is not yet complete I have to still complete it and what in particular I wanted to know was what do you usually look out for when doing comparative analysis between two or more forensics softwares. Like maybe Time, Cost of data extraction, is the data extracted encrypted by default or not? Suff like that. I will post on the #training-education-employment channel thanks for the info.
@Tsukiyama_Shuu do you have access to all of those software suites? If so, run Josh Hickman's images through them each and do your own comparative analysis
Avatar
Tsukiyama_Shuu 6/14/2020 6:06 PM
@Andrew Rathbun yes sir I do have access to the softwares. Also Thank you for the Information I didn't know about the Josh Hickman images until now that might help me in a great way 😁👍
Avatar
Andrew Rathbun 6/14/2020 6:07 PM
Check out his documentation on there. Compare results of the suites. Feel free to post your thesis here when it's done. I'll be happy to host it on AboutDFIR when you're done with it, too. Just let me know
Avatar
Tsukiyama_Shuu 6/14/2020 6:08 PM
@Andrew Rathbun alright sir I will once again thanks 👍
Avatar
Deleted User 6/15/2020 1:15 AM
hello
Avatar
Hello everyone! I'm an IT student in Hellenic Mediteranean University. I recently joined a cyber security research lab in my university in order to learn and slowly start building a name for myself so that when I finish my studies (aproximately 1 year) I could maybe get a scholarship (for a postgratuate) in a University in Europe or even the US (although i doubt it). The subject I have been given to study is Forensics in IoT with the purpose of developing a tool and making a publication. I have read publications about the subject and I understand the challenges that the industry faces when it comes to IoT devices but I'm having trouble thinking of tool to develop that helps with the process. If anyone has any suggestion or could point me out where should I focus my research to it would be really helpful.
Avatar
Andrew Rathbun 6/15/2020 2:58 AM
@b1n2h3x is working on a book about IoT 4n6. She would be a good one to ask
Avatar
@Andrew Rathbun Thanks a lot! I will try to contact her.
Avatar
It started, they have seized the #Encrochat servers
😮 3
🧻 2
Avatar
Exciting stuff!
Avatar
Hello, I am trying to reconstruct a corrupted bmp file. I am trying to use a hex editor (hex workshop) and I am getting mxed results.
11:40 AM
I know the file signature needs to be 42 4D in the first offset but after that i am lost
Avatar
kmacdonald1565 6/15/2020 12:03 PM
@jifa thats interesting
Avatar
hey all , i know its been discussed a few times. but looking for updates thoughts on Laptops for forensics/IR. What do you use/specs/etc.
Avatar
@CLB-shahar nice
Avatar
@Jobbins my company supplies us with either a Dell or Mac, similarly specced with an i7, 16GB of RAM, and 512GB of SSD storage iirc. Most of us go MacOS. But we all, for 90% of things, run everything on other infrastructure. Some of us will run vms from time to time on the fly hence the beefy(relative I suppose) specs on the laptop
Avatar
elizavetabelkasoft 6/16/2020 3:38 AM
Hi. Belkasoft published an informative article—WhatsApp Forensics on Computers (Windows PCs and Macs)—on site. Learn how to examine WhatsApp artifacts to find timestamps, pics sent in chats, and many useful items. Read the article at https://bit.ly/2YDuWuq
💯 2
Avatar
Has everybody seen a significant increase in the time it takes for search warrants to be returned by Google and Facebook the last several months ? Drives me bonkers that Google doesn't have a portal to message them they never respond to emails.
Avatar
Andrew Rathbun 6/16/2020 11:37 AM
Posting for more visibility
11:37 AM
BREAKING NEWS! DFIR SUMMIT 2020 (July 16/17) is now virtual & (wait for it) --> FREE --> IT IS FREE!!! SIGN UP NOW TO GET A RESERVED SLOT! https://t.co/47T76spGUR #justreleased #DFIR #DFIRSUMMIT #FreeDFIRSummit #digitalforensics #infosec
👏🏻 3
👍 4
💯 1
Avatar
Free* is the best price :D
Avatar
anyone know how long tmobile preserves sms records?
9:08 PM
regarding a subpeona
Avatar
For any @Cellebrite a quick question please Can the tools run on a MAC (edited)
Avatar
@stephenie no windows based software
Avatar
bluesmoke564 6/17/2020 4:43 AM
anyone know how long tmobile preserves sms records?
@Mas0n T-Mobile maintains transactional records for 2 years. Message content isn't retained at all to my knowledge.
Avatar
Thanks @CLB-AndyM
Avatar
Deleted User 6/17/2020 6:51 AM
When using LockPick(samsung s5), can I somehow see the password or does lockpick just remove it? Have another phone from the suspect and both phones are using 4-digits
Avatar
When using LockPick(samsung s5), can I somehow see the password or does lockpick just remove it? Have another phone from the suspect and both phones are using 4-digits
@Deleted User See if the password.key file is still recoverable after the LockPick process - I think that file shouldn't be removed
(edited)
Avatar
@Deleted User what OS does the device have.
Avatar
Has anyone come across anything about Zoom forensics? Curious with a lot of people using it what has been documented so far
Avatar
kmacdonald1565 6/17/2020 10:04 AM
@abefroman i cant tell specifics because i didn't handle the case but my understanding is that you can get some stuff back from zoom with legal paperwork...thats one of those apps where i am not sure how much we will get back from the individual computers themselves. Our cases were "zoom bombings" involving uninvited guests dropping in and being super racist so we were looking for user id's and stuff like that but our victims recorded enough information themselves.
👍 1
Avatar
CLB-dan.techcrime 6/17/2020 10:40 AM
@Deleted User LockPick blindly removes it and it is not recoverable
Avatar
AccessInvestigations 6/17/2020 12:33 PM
There is a paper that is coming out soon by University of New Haven dealing with Zoom, it details some of the information that zoom stores on the local machine, such as user Id, contacts, meetings, etc.
👍 2
Avatar
@abefroman The latest version of Axiom has some artifact support for Zoom for Windows, iOS and Android
👍 1
Avatar
Breaking news! Bob Elder just posted in PRMFG ... Retirement of Ron Serber - Cellebrite announced
5:19 PM
@RonSerber Apart from the shock of this news may I take this opportunity to thank you for all you have done for us and wish you a long and happy retirement!!
💯 7
Avatar
Deleted User 6/17/2020 7:09 PM
@bluesmoke564 let me get this straight. T-Mobile does not save messages at all? Seems like a national security issue
Avatar
Andrew Rathbun 6/17/2020 7:14 PM
Congrats @RonSerber enjoy your retirement!
👍 4
cellebrite 2
Avatar
@Deleted User It's normal for service providers not to save or record message contents. They can be used to provide billing information which helps match up records and accounts as @bluesmoke564 stated.
Avatar
Deleted User 6/18/2020 1:14 AM
@OllieD @CLB-Paul @CLB-dan.techcrime Thanks for help. I did the physical extraction(lock bypass) and the pin was displayed under extraction summary. And this code also worked for the other phone 😄
💯 2
Avatar
Fantastic 🙂 It's always satisfying when I hear that people have been able to get into brand new super secure phones by cracking/recovering the same PIN from an old phone tucked at the back of a drawer haha
Avatar
Has anyone heard of Encrochat service being hacked in the last week or so? Saw a Dutch language article claiming all Encrochat Carbon phone users have been advised by broadcast message to ditch the phones as servers compromised. Wondered if it was true or click bait.. 🙂
Avatar
@jifa posted a link to a tweet about this a couple of days ago: https://discordapp.com/channels/427876741990711298/537760691302563843/722152010991927437
4:14 AM
So seems like it might be true!
Avatar
Has anyone heard of Encrochat service being hacked in the last week or so? Saw a Dutch language article claiming all Encrochat Carbon phone users have been advised by broadcast message to ditch the phones as servers compromised. Wondered if it was true or click bait.. 🙂
@Marigz310 Look it up yourself, twitter and search engines.
Avatar
Thanks, saw the twitter post already but the same image (from Dutch article and twitter post) has been shared, even by rival encrypted phone resellers on their blogs. Just wondered if it was genuine as it’s just one single image being repeatedly posted. Thanks again for the info. 👍
Avatar
just had a conversation with a Detective , may be hearsay "some individuals have been arrested due to the server hack and possible exposed data"
Avatar
anyone have any tips on doing your first investigation? I dont know yet what will be thrown at me but just nervous for when the work comes -- as if i will forget everything.
Avatar
Digitalferret 6/18/2020 7:07 AM
@kairos in a company?
Avatar
yes during my internship
Avatar
Digitalferret 6/18/2020 7:08 AM
lean into any help you can get. they will likely have their own methodology and should give adequate support
7:09 AM
might help to write steps down, as you go, as you can then self check
7:10 AM
but don't try and predict and pre-learn. it's such a wide base all you're gonna do is wind yourself up, which often leads to mis-steps
Avatar
Thanks. I will keep this in mind.
Avatar
Digitalferret 6/18/2020 7:11 AM
at the outset, all mountains look huge if you take it all in at once. like most ultra athletes successful strategy though, only work towards your next chunk of whatever. small steps.
7:12 AM
and, best wishes, the reward you get is often proportional to the effort put in 🙂 (edited)
Avatar
Thank you, again.
Avatar
@kairos Take notes, lots of notes of processes and such. Documentation is key and will make a great reference material when you do have to go and do it on your own.
Avatar
Andrew Rathbun 6/18/2020 8:06 AM
Use OneNote and take copious notes. OneNote is the best thing to happen to my personal and professional life
Avatar
I've been forcing myself to take more notes with regular school work @Jobbins; @Andrew Rathbun I recently just swapped from CherryTree to OneNote. CherryTree just gets bogged down the larger the file.
8:24 AM
Thank you both
Avatar
@Law Enforcement [UK] This is going to cause some headaches. Was scanning through a copy of the paper earlier today, while there's some valid points in there the practical implications are going to be a nightmare: https://www.theguardian.com/uk-news/2020/jun/18/police-in-england-and-wales-taking-excessive-personal-data-from-mobile-phones (edited)
Information commissioner says victims and witnesses in England and Wales could be put off reporting crimes
9:43 AM
The Information Commissioner’s Office (ICO) has released an investigation report into the use of mobile phone extraction (MPE) by police forces when conducting criminal investigations in England and Wales. When concerns arose about the potential for excessive processing of p...
Avatar
I was thinking about this earlier. The obligation has got to be with the software developers to allow a subset of target data to be parsed and presented
Avatar
It's a bit of both. Storage is also another problem which has not been addressed. Transforming Forensics / FCN mentioned it but implementations across the different forces will be interesting
9:46 AM
Vendors are getting better at providing targeted extractions which is great, but the whole thing is a minefield. Has been since the disclosure forms were brought in, as often what we are authorised to provide is less than what is extracted. So we've got a situation where we only provide data in accordance to the form, but actually are retaining more data than that, due to extraction methods and the inevitable defence statements... It's a mess all over which will be interesting to see how its addressed. But it does need addressing
9:48 AM
Also I don't think the person who wrote up the report has a decent understanding of how mobile forensics work, how the data is actually stored on the device and and how it is actually extracted. Not starting on the fact that a lot of this data is already being captured and stored by the app developers
9:48 AM
Need to have a really good read of it which Ill probably do at the weekend, it's a big old report!
Avatar
I'm inclined to believe quite a bit of media bias from the Guardian
Avatar
I'm inclined to believe quite a bit of media bias from the Guardian
@Rob Of course thats a factor too - My above statements were referring to the ICO report itself, not the Guardian article
(edited)
Avatar
But yes, without targeted extractions there isn't much we can do
9:51 AM
Aside from be careful and cover ourselves as best.
Avatar
Targeted extractions, rules defined by CPS as to what cases actually need the more in-depth extractions, understanding by officers that a "Full Download" is not proportionate, and decent realistic storage and archiving methods that are practical, and can actually stick to the data protection laws
9:52 AM
Its a bigger problem than just targeted extractions can fix
9:55 AM
'Recommendation 10:The technology used by police forces in extracting datashould be updated and future procurements should take account ofprivacy by design principles to ensure it supports the forces in complying with their legal obligations.' - This is going to be the key recommendation that Vendors will need to pay attention to (edited)
👍 1
Avatar
@K23 I actually agree with this. If I witnessed an armed robbery and videoed it on my phone, I personally wouldn't want some downloading my entire phone just to get that one video. We're actively looking at solutions for this, one being @Cellebrite Responder (formerly InField) on a laptop and @Magnet Forensics Outrider to deal with type of thing. We had tested UFED on Android and it was perfect for this scenario until it was pulled from production by Cellebrite !! (edited)
👍 1
Avatar
@Stevie_C have you seen frontliner?
Avatar
Yeah. No good for us.
9:57 AM
Doesn't do what I need it to do such as screen capture
Avatar
Gotcha
Avatar
@CLB-Paul I've heavily beta testing Responder at the moment for this purpose
👍 1
9:59 AM
@CLB-Paul I need the Quick Copy and Screen Capture features of UoA and Responder which Frontliner can't support because it doesn't use cables which Screen Capture requires (edited)
Avatar
Ill dm u
Avatar
Damn 'n' key on my keyboard still playing up !!
😆 1
Avatar
We are also testing frontiner but have hit similar issues. It will help for a lot of cases, but there's plenty of others which it won't be as viable for. This needs to be a system wide law-enforcement to CPS change to address correctly
Avatar
Not sure how you do a targeted extraction when you can't be sure what apps have been used and whether the tools can extract and decode them. Victim devices need to be examined for disclosable content. The whole point from the defence is to ensure there is not material which undermines the prosecution.
👍 2
Avatar
I know some projects at a national level that are really going to be hindered by not having seized media in its entirety to be 'scraped'
Avatar
FCN / TF I'm guessing @TheNetCat
Avatar
Yeah and the rest
Avatar
@Stevie_C While it doesn’t solve the problems for all files, I recently wrote this for Forensic Focus detailing a new approach to analyzing video. Among other things, it may help in obtaining singular (or multiple) video files in an easier, less intrusive way. I hope to have more info very soon about it but would be interested to hear your thoughts. https://www.forensicfocus.com/articles/digital-video-source-authentication-groundbreaking-insights-into-digital-video-evidence/
Video evidence is prolific in modern criminal investigations, and cell-phone video is one of the most prevalent ways video is captured. While these silent witnesses can provide excellent investigative leads or paint a picture for a jury at trial, they do present unique challen...
Avatar
deepdive4n6 6/18/2020 5:45 PM
@lewiss @Stevie_C When dealing with a victim's device, remember that in the US they always have a right to limit the scope of their consent. If they only consented to you obtaining a video of a specific event, and your tools support that, it should survive a defense challenge. If it is in their camera roll, I generally just use MTP (works on iOS and Android). If it's inside of an app, it is obvs a bit more difficult, but a lot of times you can still save it out to the camera roll. There have been a few times when I needed to obtain a complete extraction and the victim had been specific about limiting consent - sometimes I've deleted the extraction, sometimes I've retained it. Regardless, I would like our courts to clarify whether or not we have an obligation to preserve or discover complete extractions when there is a conflict with what the search authority allows. I suppose I'm content with the understanding that the defense should have the same difficulties with using information outside the scope of the search authority that we would.
Avatar
Magnet SHIELD empowers officers and investigators to collect evidence at the scene of the crime and immediately produce a standardized report for Crown prosecutors Waterloo, Ontario, October 2, 2019 — Magnet Forensics, the global leader in digital investigation software, is pr...
Avatar
@Brandon E That's a fascinating article and I can think of numerous cases over the years that this would have been very beneficial for, including one over the last few months that I was involved in. I'll be keeping a keen eye on this 😀
Avatar
@deepdive4n6 the issue that @lewiss alludes to is around disclosure rules in the UK. What if you have an alleged victim and an alleged suspect, the suspect is accused of XYZ but there is evidence on the victims phone to disprove this. The defence are entitled to see this (for good reasons, the suspect may be innocent in this case) and the prosecution obligated to check and provide it (if found). If the victim simply denies access to their phone, a fair trial/prosecution isn't possible. As @K23 said, often due to how data is stored and the way data is captured, limited extraction here is likely not possible or appropriate. This is how, in my opinion, a fair legal system should operate, proper disclosure from both sides is essential to this. I think however, if someone is a witness, like @Stevie_C mentioned, and they have simply recorded an event taking place, targeted extraction of one video or whatever is appropriate.
12:33 AM
@K23 This looks like it could be a nightmare for UK police!
Avatar
Don't I know it 😆 Needs addressing though, at a national and force wide level. I know not all forces took on the Victim consent forms pushed out by the NPCC as they had issues which need addressing, but something like that is still required. Just need a better understanding across the board with these kinds of issues.
Avatar
@bizzlyg I agree the victims phones may hold data but the defence are not entitled to obtain the full extraction what if there are procedures in placed for example its a harassment, threats to kill or a restraining order out on the suspect. The defence should only be allowed the bits required and it's up to us good guys to ensure the correct data is passed onto them
Avatar
@deepdive4n6 @bizzlyg Yeah, I've seen this very issue. We have 3 clear categories. Suspect, Victim, Witness. There was a case with suspect and victim. Victim made serious allegations against suspect. Suspects phone was seized and examined thoroughly. No sign of evidence against them however that doesn't mean it wasn't there at some stage and could have been deleted / destroyed. Victims phone was examined as they had originally produced "screenshots" of messages to the investigating officer as "proof". To cut a long story short, the victims device was found to have had a fake messaging App on it and the victim had been composing messages themselves between themselves and the suspects name and then screen capturing the "messages". Although this is rare and an extreme case, it is always something I have to consider. Had we not done that the suspect could have ended up in court going through a full trial. In this case the suspect was fully exonerated at the early stages and the victim when this was put to them admitted what they had done.
👍 1
Avatar
@stephenie Yeah, I was more referencing the need for a thorough exam by the prosecution to allow them to fulful their obligations and be able to find the info which should be shared with the defence
👍 2
Avatar
Agree there 🙂
Avatar
However, is it not still the case that the defence are entitled to carry out their own exam? Therefore handing the exhibit to them?
12:48 AM
I have not been involved in this kind of thing for a while so could have changed, happy to be corrected 😄
Avatar
Depending on the case our policy is that the defence are either entitled to the raw extracted data or a defence exam. However we haven't actually hit that problem yet since the new consent forms came into practice within our force last year. When we do hit that it will be interesting to see how it's resolved by CPS, the consent form spoc and our SMT.
Avatar
We've always said no for the reasons I said above. They get a snippet of the extraction (edited)
12:51 AM
But in saying that the last time I did that was just after the new 'rulings' came in
Avatar
Tricky times! I think its an interesting topic though, I just hope some of the decision makers/CPS are better informed than when I had to deal with them 😂
Avatar
Can safely say no. Hahaha
👍 1
🤦‍♂️ 1
Avatar
@bizzlyg It is a trust thing as well. If I take a witness's phone and disappear with it and then come back and return it to them, I'm sure they're wondering "what has he been up to with my phone?" With a witness and the targeted extraction of something specific like an image or video, I personally sit down with them and allow them to watch exactly what I am doing with their phone. I've even had them operate the phone for me. The very first thing I do is ask them to activate flight mode for me to explain that I didn't want any data to arrive on their device post consent in case there was something personal they hadn't anticipated that they might not want me to see. Then it's "Can you show me the image/video/whatever please". "OK I would like to extract that." They can see me extract that and what is copied to my laptop. Then ideally I want to to capture device info and Date and Time settings etc. I explain to them why I need this and ask them if they are happy for me to take a screen capture of the relevant settings. If they agree, I do it in front of them and show them what exactly I have captured. I am happy I have got what I need and they are happy as they can see exactly what I've been doing. Of course accompanied by a quick statement at the outset giving me permission to do this. (edited)
👍 2
Avatar
@Stevie_C sounds like a great approach
Avatar
At the end of the day my job is to do the best I can professionally so I can be objective and simply present facts /findings to the court, irrelevant as to whether the device belongs to a suspect, victim or witness. I have an obligation to the suspect to ensure what I do enables them the right to a fair trial. Likewise for a victim I have a duty to assist in helping deliver justice for crimes to their conclusion. For a witness who is willing to assist, to only get what I need from them and not overstep boundaries and excessive intrusiveness while collecting evidence.
💯 3
1:29 AM
@Jamey I'll have a look at that. I was looking at Outrider Mobile for this sort of thing and I did get a trial key for it, but due to operational commitments, I didn't get around to using and testing it on the new version of Outrider
magnetforensics_alt 1
Avatar
There is also the issue of possibly missing evidence (which could help victims or suspects) if the consent is very specific but the evidence resides in an area not extracted or covered by the consent. There could be relevant data on the device in an area not even considered by those drafting the consent and therefore excluded by the extraction. This whole thing is a cross between a can of worms and a minefield! No easy answers for anyone. 🙁
Avatar
Anybody about @Cellebrite for a quick DM ?
Avatar
CLB-dan.techcrime 6/19/2020 7:26 AM
I'm on it!
Avatar
deepdive4n6 6/19/2020 9:20 AM
@Stevie_C @bizzlyg @stephenie @K23 @Marigz310 Really appreciate all of the various perspectives on this. Especially Marigz310's summary that there are no easy answers, and Stevie's reminder that our job, ultimately, is to do the best we can to support both parties.
👍 1
Avatar
Hi guys quick question I'm trying to create a disk image of a virtual machine (VDI) to E01 format ready for analysis does anybody have any suggestion on how I can go about doing that?
Avatar
Unoriginal_name 6/19/2020 3:19 PM
@Moderators I just wanted to send a quick note to all of the moderators for creating and maintaining this server. You guys/gals have no idea how much you have helped me and fellow DFIR colleagues in numerous ways. Thank you for your time and assistance that you have donated to the cause. Just know that we can never repay you but we surely appreciate you!
💯 5
🇹 1
🇭 1
ℹ️ 1
🇸 1
⤴️ 1
Avatar
Daval Gregory 6/19/2020 4:48 PM
Heyy All - good evening. Hope everyone is doing well. I know this might be a broad question, but "What are some new or current Digital Trends in 2020" ?💯 apple2
4:49 PM
Dockers Forensics is one,
Avatar
I have a Samsung galaxy A20 android version 9 with Samsung Knox security. The individual encrypted (whole device encryption) their phone a nd SIM card with a 4 digit pin. And then did a factory reset, is it possible to extract data from the device?
7:40 PM
As I know this erasure will shred the encryption key and create a new one, rendering all data unreadable. Just wondering if there is a tool or exploit which can recover/extract the data on the device
7:40 PM
Not having any luck with cellebrite
Avatar
@Cyber Forensicator
8:12 PM
@Cellebrite
Avatar
CLB-dan.techcrime 6/19/2020 8:17 PM
@blkho these Galaxy A Series (2019) devices are all File-Based Encrypted (FBE) out of the box... the 4-digit PIN that he or she created is used to encrypt the keys for all of the files (and folders). The factory reset is quite thorough in that it rapidly deletes all of the keys. Unfortunately you are out of luck and the data is not recoverable. Brute forcing the AES encrypted data is impossible. (edited)
Avatar
@CLB-dan.techcrime Yeah that is what I thought and came to conclude. It seems any evidence he had on there is now null n void and useless to us forensic investigators, the individual was already doing the factory reset as LEO came into the suspects home, and they were unable to cancel the factory reset. I am curious how the FBI who hired a Israeli firm to get into the San Bernadino shooters phone, was it a 0day exploit?
Avatar
I know it's a different OS apple.
9:02 PM
I know it was cellebrite, but curious as to what the actual exploit was.
9:09 PM
@Cellebrite site is a bit misleading with this statement: File-Based Encrypted (FBE) Android full file system extraction (Samsung Galaxy S10, Note 10, and all A Series (2019))
9:10 PM
As the above case shows
Avatar
Wasn't that a 5C?
Avatar
@CLB-Paul Yeah the San Bernardino case was.
9:16 PM
@blkho these Galaxy A Series (2019) devices are all File-Based Encrypted (FBE) out of the box... the 4-digit PIN that he or she created is used to encrypt the keys for all of the files (and folders). The factory reset is quite thorough in that it rapidly deletes all of the keys. Unfortunately you are out of luck and the data is not recoverable. Brute forcing the AES encrypted data is impossible.
@CLB-dan.techcrime I am referring to this being a bit misleading though
Avatar
No its not
Avatar
CLB-dan.techcrime 6/19/2020 9:16 PM
What is misleading? These capabilities exist... we can perform a full file system extraction of your factory reset device but there will be no user data decoded
Avatar
@Cellebrite site is a bit misleading with this statement: File-Based Encrypted (FBE) Android full file system extraction (Samsung Galaxy S10, Note 10, and all A Series (2019))
@blkho Sorry not to confuse but this
9:17 PM
Yeah but it is useless for LEO
9:17 PM
For court proceedings
9:18 PM
To get evidence
Avatar
CLB-dan.techcrime 6/19/2020 9:18 PM
I know it was cellebrite, but curious as to what the actual exploit was.
@blkho how can you be sure it was Cellebrite?
Avatar
We can't some say they hired hackers
9:18 PM
But that's just what the media states
Avatar
Ok..
9:19 PM
Stop for a sec..
Avatar
@blkho let's not go down this route
9:21 PM
There's asking how to get into an A20
Avatar
We, Cellebrite, have been helping LE since 2007. We're here to help the community, the forensic community to get to the truth. To give tools to LE andothers to convict the guilty, find the real truth as any other vendor here. You are making assumptions about who , what was involved. Technolgy has change significantly over the years. As Dan mention, FBE is very difficult to deal with.
Avatar
Ok no problem
Avatar
And then there's speculating about a famous case
Avatar
Feel free to join the webinar that I am hosing on the 29th to talk about encyprtion.. its in the Training / education chan. Where we will talk about FBE/FDE.
cellebrite 5
Avatar
Hi guys quick question I'm trying to create a disk image of a virtual machine (VDI) to E01 format ready for analysis does anybody have any suggestion on how I can go about doing that?
@Tref did you get an answe to this? VDI is a disk image.. most tools will crack them open and parse through them as if they were any other container file. If not, extract them from your evidence source, and add to FTK imager. You can then re-image as an e01.
3:10 AM
To be honest there are a load of thing you can do with them... It depends on case circumstances and target outcome
Avatar
notoriousPing 6/20/2020 7:08 AM
Thanks for the role =D
Avatar
thanks also
Avatar
@TheNetCat In the end I realised 7-Zip will open a VDI file and files can be extracted that way
Avatar
Andrew Rathbun 6/20/2020 7:42 PM
Facebook0Tweet0LinkedIn0 What is a e01 file? The e01 (Encase Image File Format) file is a forensics disk image file that keeps backup of various types of acquired digital evidence. It was originally developed by EnCase® Forensic, a forensics software application. Then other co...
7:42 PM
Oxygen Forensics is doing E01 import now. Interesting!
Avatar
Interesting to see what it concentrates on @Andrew Rathbun
Avatar
I feel like a lot of mobile tools are starting to support so they can injest images of SD cards or other items
Avatar
Hey @Cellebrite - my UFEDR report creation is failing everytime I try to make one... Any ideas what could be causing that? Report seems to generate, but it's a 20th of the size it should be, and no images present
Avatar
Does it show the green generation success message?
1:15 AM
Also pointing out the obvious here, but I've done similar on a Monday morning... Make sure all artifacts are selected within the relevant sections. Also make sure file path isn't too long and causing report not to generate correctly.
Avatar
Yeah all artefacts .. checked I hadn't untucked images in a previous round! Images present in report... But are greyed out with no content
1:18 AM
Also red error message shows in the bottom right instead of the standard green one. Fades too fast to click on! It's just an iPhone X checkm8 download. Nothing fancy in the report
Avatar
Are you saving to a lengthy file path?
Avatar
Will try desktop now. Why would it get 10 mins in before erorring out?
Avatar
My guess is that after that length of time, or 'X' length of time in any case, it generates some folders which tip it over the character limit to the file path and then it errors out. (if that's your error anyway, it may not be but worth a shot 😛 )
Avatar
Bah still failed.
Avatar
Not so good! - If I think of anything else I'll post below. Cellebrite will swoop in this afternoon I'm sure, haha. (edited)
Avatar
having a chat in office - does anyone have any particular opinions on forensics kiosks? which do you use if so?
6:43 AM
and if you do use them, why did you go for the ones you did
Avatar
Andrew Rathbun 6/22/2020 7:31 AM
having a chat in office - does anyone have any particular opinions on forensics kiosks? which do you use if so?
@Sudo we got the XRY one at my LE job and no one used it. Line officers weren't savvy enough and there also weren't enough applications for it. Us examiners preferred to use the full suite itself. It was a pain to maintain because software updates all the time and it's just another machine that got limited use that you had to maintain. Then, when officers used it, they would still call you at home and ask you questions on how to use it despite having gone through the training. It's nothing against XRY or anything, I just think the idea of the kiosk for US was a square peg in a round hole.
Avatar
Hello... I'm interested in being able to collect AND export "live logs" from an iPhone. Ideally, I'd like to capture about 15 minutes worth of data, but MOST importantly, I need to be able to export that data in a non-proprietary format (csv, json, log, etc). Apple Configurator allows "live" unified logs to be exported t in a .log format which is perfect, but it only exports 2 minutes worth of data even if the phone was connected for longer. Does anyone know of a way to either: 1) increase the two minute limit in Configurator to allow one to save a live capture of 15 minutes or 2) another way (other than Configurator) to collect and export about 15 minutes worth of 'live' unified logs? Thanks
Avatar
@jd1345 Susteen has the DataPilot device which when hooked up to a iphone allows you to export data for a specified time range. https://datapilot.com When you say logs though, this will do things on the logical level like messages, photos within that time frame, etc.
Avatar
@abefroman - thank you for sending. I'll take a look - but I don't think that is collecting the type of logs I'm looking for. I want to be able to live capture the unified logs which contain every process that is running on the phone at any given moment - I'm not interested in the data at rest on the phone.
Avatar
Yeah I didn't think this was quite what you were looking for but figured I'd pass it along in case someone else could use it
👍 1
Avatar
@Andrew Rathbun thanks for the info (I find the same)
Avatar
When recovering location data on an iphone 7 is there any way to confirm the accuracy of the lat/long ?
Avatar
I always just open a map and punch in the numbers to see and make an assumption
12:21 AM
that doesn't help I'm sure 😄
Avatar
exported it as a kml and put it on google maps it looks good, but someone is disputing the location accuracy
Avatar
what's their justification
12:28 AM
is it location data from EXIF or just the phone itself
12:29 AM
I've only used location data evidentially a couple times, but both times they have been accurate
12:29 AM
probably to within about 5m
Avatar
that is good to know, not exif data.
Avatar
anyone from @Cellebrite online who can assist me with a query about the tool that cannot be named please?
Avatar
CLB - DavidK 6/23/2020 1:47 AM
@Zhaan Yes
1:47 AM
DM me
Avatar
@phil_d0257 If the data is from significant locations i think there is an accuracy in meters that can be parsed by AXIOM
Avatar
anyone else having issues with UFED 7.34 hanging and just generally not working
Avatar
@Sudo I had issues withe AppGenie not running at all. Restarting everything now to see if that will help.
Avatar
it takes about 5-10mins to move between sections
Avatar
Before I go digging anyone have any links for blueleaks? please dm me if you do
6:52 AM
for the actual leaked data not the news
Avatar
Morning! Got a bit of a puzzle here. Cricket Icon running a 1.5 GHz MediaTek MT6739. Unable to access dev options due to some Google Admin block (Parental lock for a Juvi's phone). Attempted MTK no luck so far. Is there work around for the admin lock?
7:00 AM
Not a huge deal, sure we can get the parent to disable it but curious. First time I have run into this.
8:10 AM
^^ a well done video on the recent Western Digital lawsuit along with a ton of hard drive internals knowledge
Avatar
@Zhaan sir, it's Cellebrite Premium, we can name it out loud and proud 😎
Avatar
@jifa not when you’ve signed an NDA it ain’t!
😆 11
8:12 AM
I shall call it Trevor
Avatar
I shall call it Cellebrite Premium 😏
Avatar
@Zhaan I started openly calling it Premium when the advertising started !! https://www.cellebrite.com/en/ufed-premium/
Avatar
@Stevie_C I aint going against a NDA and you wont change me, I aint doing time! (edited)
😆 5
9:04 AM
@Zhaan
Avatar
@DCSO 👍 nuff said
Avatar
danmiami0001 6/23/2020 9:27 AM
and if you do use them, why did you go for the ones you did
@Sudo Where are you located? I believe it depends on how you roll out the program, the number of users, etc. I have personally been involved in successful rollouts of our cellebrite kiosks in a couple of statewide installations. Typically, our solutions engineers assist in the installs and we offer an optional 1-day training available specifically for this product for end-users. Let me know if you have other questions.
Avatar
I need a licensed PI for a nice work in California if anyone is interested
Avatar
@danmiami0001 thanks for the info
Avatar
@Cellebrite can anyone give me a support email contact, having some major issues with the latest releases of PA and PC
Avatar
@Sudo support@cellebrite.com
Avatar
I reinstalled, seems better now
5:18 AM
or, it was lol
Avatar
kmacdonald1565 6/24/2020 7:04 AM
@andrew_case actually very good video. not subbed to LTT, but dont hate them either, even though he (they) are a bit over the top at times i will watch occasionally. thanks for the post
Avatar
Trying to execute Lockpick on an LG G7 Thin Q. Cable 500 > 508. Getting the message "Unable to load library." What does this mean?
7:57 AM
7:58 AM
Just going to do an ol' restart and see if that gets it sorted out.
Avatar
Andrew Rathbun 6/24/2020 9:55 AM
What is everyone using to download youtube videos into something you can play locally? My previous sources don't exist anymore
Avatar
@Andrew Rathbun My go-to is youtube-dl for YouTube, Twitter, Facebook, and Instagram. Download from youtube-dl.org. It's a command line program but very easy to use. Let me know if you need help getting it set up if you decide to give it a shot.
👌 4
💯 2
Avatar
Andrew Rathbun 6/24/2020 10:06 AM
@Andrew Rathbun My go-to is youtube-dl for YouTube, Twitter, Facebook, and Instagram. Download from youtube-dl.org. It's a command line program but very easy to use. Let me know if you need help getting it set up if you decide to give it a shot.
@laurenw Thank you, was asking for a friend but will pass on to him. I appreciate it 🙂
👍 2
Avatar
chrisforensic 6/24/2020 10:45 AM
@Andrew Rathbun i always take jdownloader.... easy... copy link... paste link and download 🙂
👍 3
10:45 AM
Avatar
Andrew Rathbun 6/24/2020 10:47 AM
That's great @chrisforensic I've passed both methods on to him
10:47 AM
And good to know for my knowledge, as well
👍 1
11:03 AM
🤣 2
Avatar
So I got legal process back from snapchat, the emojis show up as a series of odd characters. is there a place I can walk these back to the original emoji?
3:09 PM
💰 🥳 for example
Avatar
@quack awesome, thank you!
Avatar
Deleted User 6/25/2020 1:23 AM
Im trying to figure out if .mp4 files have been sent or recieved from a Huawei p30 pro. The files are stored in Media/Internal shared storage/Telegram/Telegram Video/filename.mp4 Does anyone know if telegram saves sent/converted videos in this folder? Or is it just recieved files?
1:24 AM
I cant find the filenames in the Telegram database.
Avatar
I think it's just all media
2:11 AM
all received media, if it works like WhatsApp
2:13 AM
though I suppose if you took the image / video from within Telegram it would probably show up there
Avatar
Anyone from @Cellebrite available for a quick question (not a technical question, or anything regarding software)
Avatar
@mitchlang known issue, 7.34.1.23 released which should fix it
Avatar
@3X3 👋
Avatar
itismagic86 6/25/2020 10:58 AM
@Deleted User Best bet is to run it on a test device and see where they get saved for each instance.
Avatar
Anyone else seeing these? https://www.skyecc.com/ We've seen a number in recent days, probably linked to the encros being dumped. Ours had the KPN SIMs in and were on but an AFU GK extraction only gave BFU information - no user data 😦
SKY ECC is the most secure messaging app in the world thanks to our proprietary encryption, brute-force protection, and private network.
Avatar
Yup, we've got them a few times. Same result. @dahla might be a resource for you.
👍 1
Avatar
anyone from @Cellebrite lingering and available to message?
Avatar
@Rob they do linger don’t they! 😆
Avatar
@Rob It's always helpful if you could tell us the theme within the question so that the right person will answer.
Avatar
CCPA course related
1:59 AM
Just a quickie question to help figure what something means.
Avatar
I did CCPA
4:46 AM
you having fun?
Avatar
my issue with PA 7.34 hanging for 10mins per click seems to be because I don't have internet to my workstation
5:51 AM
would there be any reason it needs to query externally on every action?
Avatar
@Sudo Do you have (and need) DNS or a default gateway configured on your workstation? If the app gets an immediate failure instead of timeouts to internet queries, that might speed things up. Just a thought.
Avatar
we do yeah, and I figured that's why it would be, though why it would need to query for every click I'm not sure
5:55 AM
at least I know how to work around it even if it's nonsensical
5:56 AM
I've just blocked the executable on the local firewall
Avatar
That sounds like a great solution.
Avatar
any good software to decrypt SecureDoc image file done via dd ?
3:09 PM
we do have a password used by employee to decrypt it, but we only have dd image
Avatar
DeeFIR 🇦🇺 6/28/2020 8:46 PM
we do have a password used by employee to decrypt it, but we only have dd image
@harderman can you restore it to a disk (whether virtual or physical) and boot into the recovery environment?
Avatar
Does anyone know if a user makes a 999/911/ emergency call from a locked phone, does the entry get added to the calllog.db? It may seem an odd question but we have a missing entry! And it wasnt made on wifi and I have checked the calllog.db and it aint there. Extraction was from a Sony running Android 10 using Trevor. (edited)
Avatar
I can see a few old posts regarding this and one colleague mentions it may be to protect users of domestic violence but no evidence was found to back that up (not that I can see)
Avatar
I know from personal experience of downloading a few phones that I have seen 999 show up on several occasions...
Avatar
Does anyone know if a user makes a 999/911/ emergency call from a locked phone, does the entry get added to the calllog.db? It may seem an odd question but we have a missing entry! And it wasnt made on wifi and I have checked the calllog.db and it aint there. Extraction was from a Sony running Android 10 using Trevor.
@Zhaan I've never found a solid 100% official answer to this question. I'm absolutely certain that in my case the device was used to call emergency services based on the CDR and statements from the owner. However the call didn't show up in the phone or extraction.
Avatar
@Sockmoth Thanks for the info, I think for the time being there isnt much I can do, if it aint on the phone, it aint on the phone. (edited)
Avatar
@DeeFIR 🇦🇺 as we have DD image, we can write it to physical disk
5:36 AM
we need to have it encrypted
5:36 AM
so all forensic tools can browse for deleted files
Avatar
What kind of firewall does everyone use for their network? My agency finally realizes the need for me to have a firewall for my UC network now that some tried to breach it. I'm leaning towards a hardware firewall so I don't have any issues with compatibility. Any thoughts?
Avatar
If you don't mind tinkering I'd strongly recommend pfsense @LawDawg. Very customisable and lock-downable. Completely free and works virtualised with HA or on dedicated hardware. But it depends on how much effort you want to put into managing it as it may require tinkering with (Which you really should be doing anyway with firewalls!). Support contracts are available, and you can get it on supported hardware direct from the vendor was well.
Avatar
I'll check it out, thanks.
Avatar
Proven value with over 1 million installations worldwide.
pfSense is a free and open source firewall and router that also features unified threat management, load balancing, multi WAN, and more
Avatar
anyone else updated griffeye before? I'm getting a "null" error thrown
Avatar
about firewall, pfsense or opnsense
6:40 AM
opnsense is pfsense fork
Avatar
I'd second pfsense
6:41 AM
(or opn if you like)
Avatar
if you intend to install it on some hardware device, pfsense requires AES-NI
Avatar
it doesn't require it I don't think, just preferable for VPNs etc
Avatar
IIRC opnsense doesnt have this requirement, so you can install it on older/AES-disabled device
6:43 AM
ah now I see, they wanted to include some cryptographic stuff which requires it
6:43 AM
so yeah, both are nice to use
Avatar
If you're running it on hardware released in the last 5 years it should have AES-NI. For a forensic network I'd want it running on some up to date hardware haha
Avatar
yeah true 😄
Avatar
Haven't played that much with Opnsense but have heard decent things about it. Love pfsense though, use it at home in my lab and at work for our restricted / wifi testing networks. Useful for really limiting device connectivity if you are having to bring a device live for whatever reason. Edit: but then again you'd be able to do that also with any decent firewall (edited)
😄 2
Avatar
well, and do you have some experience with HDD disks?
6:50 AM
SMART monitoring, to be exact
6:51 AM
i have some urgent question from our client about power-on hours
6:51 AM
power-on hours raw value (130) is less than evidences of data copying process
6:52 AM
like monitoring software shows some user was copying files for about 200 hours
Avatar
I have some limited personal experience with them, not work related so others on here can probably advise better. SSD numbers for power on can be incredibly unreliable depending on firmware
Avatar
while SMART values from the disk show power-on hours is equal to 130
6:53 AM
disk is USB external one T_T
6:53 AM
i just wonder if it is possible to be firmware bug?
Avatar
wouldn't count on USB media to be super reliable with SMART
Avatar
@harderman @K23 Could I install pfsense on a computer I'm not using and having it act as a hardware firewall insteaad of installing it on all my hosts? I took network security last year on college, so I'm familiar it. The class sucked though. Didn't get much out of it.
7:00 AM
All my books are at the house or else I'd be digging thru them now.
Avatar
sure LawDawg
7:00 AM
you can put it on basically anything
Avatar
Ok. I'll have to dig my books out and figure out how to do that again
Avatar
I run it on an i3 desktop for one of my clients
Avatar
Let me ask you this, how does it physcially work? Is the computer between the modem and router?
Avatar
pfsense will become the router
7:01 AM
but I suppose you could hand further off to a router sure
Avatar
how does the computer become the router?
7:01 AM
ahh
7:01 AM
software
Avatar
Whereas i haven't run it on hardware but have it running well within a VM on ESXi (That's an old i7 machine) and on Hyper-V in my lab at home which is an old E5. Yeah you could do Modem > Firewall > Router in an L3 style but I just do it through pfsense
Avatar
pfsense routes and the modem will do the connection outward
Avatar
it runs as an OS on the system
7:02 AM
if you're running it on metal
Avatar
pf has all the stuff you'd need, DHCP, DNS, and all the fun stuff
7:02 AM
it's just freebsd under the hood
7:02 AM
so it'll run on anything linux will run on, basically
Avatar
so I can ditch my crappy consumer router. But, I need wifi for some of our UC laptops. Would I just run an access point for wifi?
Avatar
I run ubiquiti stuff from it yeah
7:03 AM
K23 too lol
Avatar
Ditto. Have two unifi APs running off it at home, and one here in the office
7:03 AM
Cloud controller running virtualised
Avatar
you'd still need the ubiq cloud controller (which I run off a raspi)
7:03 AM
but yeah, it's all easy enough
Avatar
cloud controller? you're exceeding my current knowledge
Avatar
Yeah. And worth doing separate VLANs for WiFi and normal LAN to separate out traffic. Nice thing about Unifi is they support mutliple vlans
Avatar
just a management portal for your access points
👍 1
7:04 AM
like your router home page
Avatar
since each AP doesn't have its own page, if you get mees
Avatar
so pfsense can do vlans?
7:04 AM
on its own
Avatar
it's super easy when you see it
7:04 AM
yeah it can
7:05 AM
K23 can tell you more about that, I don't run any (I just have a 4 port card in my ones)
Avatar
awesome. I can't do vlans with our current router. I wanted to after taking networking and seeing the value of seperating traffic
7:05 AM
or our switch
Avatar
if your old PC has a PCI slot you can put in a 4-port or howevermanyport NIC as well
7:06 AM
if you want different LAN LANs
Avatar
I would rather run a switch and run the vlans with the switch
7:06 AM
or on the weitch
Avatar
you'd probably need at least a couple ports, one for WLAN and one for LAN
Avatar
It's incredibly useful. Means we can have one Wifi SSID for general internet research, and a super restricted one for throwing live devices onto whenever we need to (Which is incredibly rare). Worth having a managed switch if you are playing about with it, and as @Sudo said having a 4NIC card works well
Avatar
though maybe you can VLAN that, who knows!
Avatar
You can have the VLANs on the switch or pfsense, up to you. If you have it on pfsense ACL rules can all be managed in once place, but it's more load on that link. If you are running on the switch just remember to implement the ACL rules there
Avatar
So, pfsense can create and manage the vlans. Which means if they won't spend the money on a managed switch, I can still have vlans
7:08 AM
one for wired and one for wifi
Avatar
Exactly. Still worth having a Layer2 managed switch though as the switch will still need to know the VLANs exist, it just won't need to route them. If it's layer3 then it can route them as well.
Avatar
you'd need separate switches for WLAN and LAN though I think right
Avatar
Some unmanaged switches are not VLAN aware which could cause you issues
Avatar
if they were shared it'd need to be managed to tag the relevant port
Avatar
You don't need separate switches @Sudo
Avatar
if you try to have VLANs on an unmanaged switch, you're gonna have a bad time
👍 1
Avatar
layer two being MAC?
7:10 AM
I can't remebr
7:10 AM
wait, IP
7:10 AM
layer 1 is physical
7:10 AM
correct?
Avatar
yeah but if you have WLAN and LAN VLANs going into an unmanaged switch would they not get mixed up?
7:10 AM
that's what I always thought
Avatar
Close enough @LawDawg
Avatar
it's just not going to work
Avatar
Yeah @Sudo If it's unmanaged it's going to be hell haha
Avatar
lool yea that's what I meant
7:11 AM
separate if they were unmanaged
Avatar
ok, so if i run vlans thru pfsense, and I can't get a managed switch, I would need seperate unmanaged switches for each vlan?
Avatar
if you can't get a managed switch, don't bother trying to set up vlans
7:12 AM
🙂
Avatar
ok. but, it i'm not spending money on a hardware firewall, that money could be spent on a managed switch
7:13 AM
i'm starting to remember using pfsense on one of those virtual labs for school
Avatar
@LawDawg You're correct. You CAN do it with multiple unmanaged switches, but it will be a bit painful. It is much better to get a managed switch there if possible. Playing about with it in a virtual lab is probably a good idea before you deploy the thing. I often test configurations first that way too
Avatar
I don't have access to that virtual lab anymore, it was for class last fall
Avatar
You got Vmware workstation or virtualbox?
Avatar
and it was an online class, so it sucked
7:14 AM
yes
Avatar
Then you can set up your own virtual lab
7:14 AM
Welcome to homelabbing 😄
Avatar
I'll dm you
Avatar
well actually
7:32 AM
the WD inside the USB drive is branded as some other known name
7:33 AM
I just wonder if the RAW_VALUES are given in hex (which would be more logical for the case) or decimal (nonsense, power-on hours are less than copy times sum)
Avatar
Seems each vendor does it differently there. Some provide it in decimal, some in hex
Avatar
Have a case where subject was wearing an Apple earbud. An Apple earbud charger was found in a bag of concern. Is there anyway to forensically tie Apple earbuds to the earbud charger? (Serial Numbers, etc.?) Fingerprinting is not an option this time to tie the subject to the earbud case. Hoping we can tie more things together once we dig into the case, but spitballing ideas since the case just got checked in.
Avatar
DNA? Swab both the earbud and case. Submit to lab?
Avatar
Thanks @pcsdcell I should have said biological forensics is not a viable option on this case, and not just listed fingerprints.
Avatar
@Colman i want to pick up my older message about Joplin. At your picture i can only see a few notes. I have over 500. I‘ve downloaded Evernote for Windows, downloaded all my Notes and exported as .enex. After that i‘ve tried to import my notes into Joplin, but it hangs. It don‘t work with Markdown either with HTML. If i try to import just a few Notes, it works. But then i have notes they where not imported completely.
Avatar
Deleted User 6/29/2020 10:01 PM
I have some questions about potential routes of action to take in regards to cybercrimes against someone from the U.S. who is residing in Wales if anyone can help me with that Local law enforcement has been very unhelpful So figured some UK LE peeps could help me out Not sure what the best channel for this is, sorry about that
Avatar
@Deleted User https://www.actionfraud.police.uk/ Action Fraud is a good place to start normally for fraud / cyber crime, they then dish it out to relevant force/region/national depending on level
National Fraud & Cyber Crime Reporting Centre
Avatar
Deleted User 6/30/2020 1:29 AM
Thank you for this resource! What if it has to do with something more sinister like blackmail or harassment? Is there a similar organization that will take those complains as well?
Avatar
Do you know if your subject lives north or south Wales? @Deleted User (edited)
1:44 AM
Actually I think if the blackmail and harassment are facilitated by "Cyber" you can still report into Action Fraud, they will forward on as appropriate, so it may end up with N or S Wales Police (or region) but it should get fed into the Cyber department @Deleted User (edited)
Avatar
Deleted User 6/30/2020 1:44 AM
I can certainly find out if they are N or S
1:44 AM
If that is important
Avatar
Only if you were reporting direct to local force
Avatar
Deleted User 6/30/2020 1:45 AM
But if you believe the best course of action would be to go through Action Fraud then that’s the course of action I’ll take
1:45 AM
Thank you for the help @JMK !
👍 1
Avatar
No problems, the worse they'll say is it's not cyber enough or not in their remit etc (without knowing more) and they should point you in the right direction 🙂
👍🏻 1
Avatar
I believe the answer is no, but wanted to use my life line & call a friend. Advertising ID on an iOS device. Apple can not (or won’t?) provide any info for subscriber/device (IMEI etc.). Correct?
Avatar
Good morning all
3:54 AM
What are people using for their evidence logging and resource tracking?
3:55 AM
excel spreadsheets and a good dollop of interns?
Avatar
@JustNit There are quite a few case management systems around now, I used Lima in the past and I have heard good things about Nimbus from Blackrainbow, but never used it myself - https://www.intaforensics.com/lima/ http://www.blackrainbow.com/
WHY BLACK RAINBOW? We are experts in technologies, workflows, protocols and processes across the fields of investigation, intelligence & cyber security. We optimise your organisation's intelligence effectiveness. Bespoke Solutions Consultancy WHAT CAN WE DO FOR YO...
4:59 AM
on another note, any LE people here that regularly use project VIC/CAID as part of their investigations?
Avatar
@bizzlyg awesome thank you
👍 1
Avatar
cyberPanther 7/1/2020 7:01 AM
@Everybody Does anyone have experience with Github logs collection/extractions /Forensics ?
Avatar
Deleted User 7/1/2020 12:57 PM
Mostly InfoSec but still some Forensic oppurtunities here
Avatar
elizavetabelkasoft 7/1/2020 3:13 PM
Hi everyone. Belkasoft has good news for you. Due to USB Restricted Mode in iOS, investigators have a limited timeframe for data extraction. Once an hour goes by since the last unlock—if you do not know the device passcode, things get difficult. New Belkasoft’s ability to get past USB Restricted Mode comes to the rescue! Support devices—iPhone 5s to iPhone X. Supported iOS versions—12.3 to 13.5.1. BFU extraction for those devices! Learn more at https://bit.ly/2Zx2A5i
👍 2
Avatar
DangerDodgingPossum 7/1/2020 3:56 PM
Anyone have recommendations for a multi USB 3.0 hub? I have had two crap out on me while trying to do extractions
Avatar
on another note, any LE people here that regularly use project VIC/CAID as part of their investigations?
@bizzlyg I use VIC/CAID on every CSE case via Griffeye, why?
Avatar
on another note, any LE people here that regularly use project VIC/CAID as part of their investigations?
@bizzlyg I have VIC hashset loaded in every tool and run it on every case
Avatar
@PeteB @808_4n6 Thanks, I had some questions around the workflow when you import and export the json files, I think I have the info now but I will fire you a PM 🙂
Avatar
Many of the targets are said to have considered themselves "untouchable", posing as respectable, wealthy tycoons.
👏 8
Avatar
any ELK or logstash expert in the group? 🙂
Avatar
@DangerDodgingPossum I’ve never had a bad experience with anker... I typically look to them first for hubs/batteries/cables
👍 2
💯 1
Avatar
https://twitter.com/hackerfantastic/status/1279133091089481729?s=09 this could be fun. They state Cellebrite isn't affected
Did you know that if you store XSS payloads in your mobile phone contacts and then use a forensics tool to image the device one can run payloads on the forensic tool via its reporting features? 😂 0wn3d.
Retweets
254
Likes
961
Avatar
I mean, the chances of running into this in the wild... I was wondering when it would happen though!
Avatar
Oh yeah it's incredibly slim, just interesting to know it's possible. Imagine this will be something that affects kiosks more than anything else
Avatar
@K23 I'm just amazed at seeing CellDek !!! Haven't used that in years !! I thought that bit the dust a long time ago. Ours is sitting in a store gathering dust !! They're museum pieces for us !!
🤣 2
Avatar
Can't say we have any sitting around here
Avatar
elizavetabelkasoft 7/5/2020 10:47 PM
A locked iPhone acquisition just got easier with Belkasoft! Join a webinar on bypassing iPhone's USB restricted mode with Belkasoft Evidence Center. Now BEC can disable USB restricted mode, which typically impedes data extraction tasks when the passcode is not known. In our next webinar, you will learn: ✅ How iOS USB restricted mode works and why it impedes investigations and research ✅ How to use Belkasoft Evidence Center to deal with it during an investigation ✅ The iOS acquisition methods that work even when an iOS device is in BFU ✅ What other features in Belkasoft are used to investigate iOS devices ✅ Finally, we will walk you through a demo to demonstrate BEC's capabilities on the topic. The webinar will take place on July 7, 2020. Sign up at https://bit.ly/3gvv8my (edited)
👍 1
Avatar
Anyone ever had dealings with INetCache in regards to the reliability of the timestamps?
Avatar
@Rob I dealt with it recently, though in my case the user had hidden files there
5:47 AM
the timestamps though were as reliable as any other timestamp
Avatar
As I thought cheers.
Avatar
pfSense on a Netgate. Any network security guys I can dm about setting this up on my UC network?
Avatar
Anyone got a sec for a Splunk API question?
Avatar
@skuzzie sure thing
1:16 PM
feel free to DM me\
1:16 PM
but maye better to ask here in case others have same question
Avatar
We're currently undergoing our UKAS surveillance visit and it has been hinted that there is an alternate provider to FPTS for computer proficiency testing .. I have scoured high and low and cannot for the life of me find who this might be ... is anyone more clued up than I am? edit: UK btw, but even if it's an international company it might be feasible. (edited)
Avatar
@Seladour not sure if this is good enough but googling brings up http://www.isfce.com/proficiency.htm
7:13 AM
I did the forensic access test back in 2018, wasn't great but was the only thing in the UK at the time. Wonder why they packed it in, seems like relatively easy money.... (edited)
Avatar
thank you for that, i'll pass it on to our technical lead and see what they think. Yeah we used FPTS as well for the last few years - the best of a pretty non-existent bunch.
Avatar
The one I did was based on Linux but I think they started shipping windows based tests shortly after (edited)
Avatar
Anyone local to Raleigh, NC (USA) that could help with recovering access to a Medisoft system? (Owner passed away, family is looking to recover)
Avatar
Igor Mikhaylov 7/7/2020 10:18 AM
Digital forensics specialist's bookshelf: Top 11 books on digital forensics, incident response, and malware analysis https://www.group-ib.com/blog/bookshelf
👍 1
Andrew Rathbun pinned a message to this channel. 7/7/2020 10:21 AM
Avatar
chrisforensic 7/7/2020 10:21 PM
goood morning from austria to @Cellebrite ... just a question... is 4PC 7.34.1 from 24.06.2020 the latest release available? (edited)
10:21 PM
Avatar
yes @chrisforensic
12:35 AM
and good morning from France to you ;)
👍 1
Avatar
elizavetabelkasoft 7/8/2020 1:23 PM
Attend a webinar on Incident Investigations with Belkasoft. When conducting incident response, you have to examine such malware trails as persistence artifacts (how malware survives reboot or process killing from Task Manager), evidence of execution (how and when it was executed), review changes in default file association, scheduled tasks, remote connections, startup tasks, browser extensions, and so on. Find out what a successful investigation entails in our webinar. In general, in this webinar, you will learn ✅ What is the cyber kill chain and how Belkasoft utilizes it ✅ Where the artifacts worth examining are located on BEC's interface ✅ How to use Timeline Viewer, File System Explorer, and other BEC viewers more effectively ✅ Why WMI connections are so important in Incident Response The webinar will hold on July 14, 2020. Please sign up at https://bit.ly/3iHjdEc
Avatar
@elizavetabelkasoft please keep the above adverts to the #training-education-employment channel, thanks
Avatar
Dr. Kaan Gündüz 7/9/2020 4:02 AM
A command line data processing engine used for computer forensics and electronic discovery. Expandable from single instance to an enterprise level virtual environment spawning multiple simultaneous processing instances.
4:02 AM
FEX-CLI is out there.
Avatar
I'm doing forensics on a Linux system and generated a log2timeline CSV file. However, the file size is 600+mb and I can't view full contents of the file when I open on ms excel. Are there programs that can view large CSV files that are suitable for timeline analysis?
Avatar
Loading it into a mysql database might be a more managable bet. Workbench has functionality for this or you can script it: https://www.mysqltutorial.org/import-csv-file-mysql-table/
This tutorial shows you how to use LOAD DATA INFILE statement to import CSV file into MySQL table.
Avatar
Thanks! Will give it a shot.
Avatar
kmacdonald1565 7/9/2020 12:31 PM
so random task that is somewhat forensic related so I wanted to ask here. Is there any place on a computer that houses copies of docx files that were on a flash drive? long story short, have a buddy who lost that very important flash drive. I know if documents were on the computer, we have a couple of options but since it was on a flash drive i wasnt sure if anyone had any ideas.
Avatar
disney3131 7/9/2020 2:18 PM
I have an Apple Return that is 30 .tar files. Apparently that can't be parsed in cellebrite right now. What other tools do people use?
Avatar
so random task that is somewhat forensic related so I wanted to ask here. Is there any place on a computer that houses copies of docx files that were on a flash drive? long story short, have a buddy who lost that very important flash drive. I know if documents were on the computer, we have a couple of options but since it was on a flash drive i wasnt sure if anyone had any ideas.
@kmacdonald1565 - Image the drive and run a content search to see if a duplicate document exists.
Avatar
kmacdonald1565 7/9/2020 5:17 PM
Yeah, was hoping for a quick and dirty solution but ill offer that if i have to
Avatar
Let an intern do it for practice
6:27 PM
🙂
Avatar
Daval Gregory 7/9/2020 7:07 PM
Heyy All - does anyone know if there is a hashing tool in the SIFT workstation for checking an image file integrity ?
7:08 PM
so maybe something like hashsum <IMAGE FILE NAME>
Avatar
DFIRScience 7/9/2020 7:19 PM
What time of image? E01/RAW/AFF?
7:26 PM
EWF (E01) - ewfverify image.E01 RAW - hashdeep image.RAW AFF - affverify image.AFF
7:26 PM
pretty sure all are installed in SIFT
👍 3
Avatar
Anyone currently use a triage tool that they would recommend? Looking for a variety. (edited)
Avatar
@Law Enforcement [UK] someone got an email-adress of moonfruit.comwhere I can send a legal request to? my Google-fu is letting me down, and their Helpdesk is giving me a really hard time
Avatar
@3X3 we use ADF DEI. It's not routine but when we need to triage, so it's out of scope with regards to ISO. Can do it live or dead box.
Avatar
Thanks JMK! - We've had a look at that one. Looking to see if there's any out there that maybe we've not seen yet and would like to give a spin aswell.
Avatar
@3X3 We currently use ADF DEI too, our officers have it for both live or dead machines. I’ve heard good things about Magnet Forensics Outrider tool so might be worth having a look
Avatar
Thanks AP95!
2:06 AM
@Cellebrite Anyone online for a quick question regarding Cellebrite Kiosks?
Avatar
@Cellebrite Anyone online for a quick question regarding Cellebrite Kiosks?
@3X3 Yeah happy for dm if preferred
😎 1
Avatar
@CLB-AndyM Sent a DM, cheers!
Avatar
I should probably mention the tools we've looked at in terms of triage tools incase anyone knows of any others; We've looked at ADF, Outrider by Magnet and KAPE. Are there any others out there? 🙂
Avatar
@Cellebrite Currently trying to get the android emulator working, its responding with Hyper-v issue despite me disabling hyper-v already. Anyone know any quick fixes?
Avatar
Forensic@tor 7/10/2020 6:32 AM
@sky you must have VMware installed. I don't believe the most current is supported so install version 14.
Avatar
will do, thanks
Avatar
Hey has anyone setup elk stack in a windows environment?
Avatar
@kmacdonald1565 If it’s enable, Office will auto save documents. Search for .asd files. My results have been hit or miss. Saved me once though.
Avatar
kmacdonald1565 7/10/2020 10:07 AM
👍
10:07 AM
thanks, passed it along
Avatar
@funk by that do ya mean on windows?
Avatar
@sudo I meant elk on windows server
1:16 PM
I had some issues earlier but resolved them
1:17 PM
Thanks for responding :)
Avatar
Empire 3.3 is released! A few of the newest features:
  • ATT&CK Techniques linked in Starkiller
  • More places to customize Obfuscation/AMSI Bypasses
  • Keyword Obfuscation throughout Empire
  • New Module: Invoke-Rubeus
#RedTeam #Infosec https://t.co/CYD971pjYj
Retweets
169
Likes
324
Avatar
@funk If your looking for further ELK support Elastic does have a support channel but millage will vary.
Avatar
I should probably mention the tools we've looked at in terms of triage tools incase anyone knows of any others; We've looked at ADF, Outrider by Magnet and KAPE. Are there any others out there? 🙂
@3X3 Just checking again whether anyone knows of or has used any other triage tools other than those above?
Avatar
Anyone know if UFED4PC has a setting that will automatically open a successful extraction on finish?
Avatar
Could use MacQuisition as a triage tool if you wanted @3X3
1:11 AM
But dunno how good that would be
1:11 AM
We only use ADF
👍 1
Avatar
Thanks Rob, appreciate the input!
👍 1
Avatar
Hi, I’m doing some reverse engineering work on WeChat at the moment. I am wondering if anyone has an account they can verify mine with? Thanks
Avatar
randomaccess 7/13/2020 3:25 AM
@3X3 Velociraptor can be used to build a collection binary.
Avatar
Hey, thanks for accepting me here
3:29 AM
Amazing the variety of people in here wow
Avatar
Anyone from @Magnet Forensics able to send me or point me to the latest IEF Artifact Reference Guide
Avatar
Perfect @Nava2
👍 1
Avatar
Hey guys, what is everyone using for Known File Hash Sets, NSRL, HashSets.com, others, etc...?
Avatar
Andrew Rathbun 7/13/2020 10:14 AM
We use HashSets.com
Avatar
How do you like it @Andrew Rathbun ? Worth the $25 a month?
Avatar
Andrew Rathbun 7/13/2020 10:15 AM
I haven't used them a ton, but I think you can pay once and get access to them and then cancel
10:16 AM
I have them set up with X-Ways and frankly I haven't gone out of my way to verify how much they've removed
Avatar
Thanks @Andrew Rathbun Can anybody else confirm that you can pay once and get access to them and cancel?
Avatar
Andrew Rathbun 7/13/2020 10:20 AM
Our Hash Sets were designed to complement the National Software Reference Library (NSRL)
Avatar
DangerDodgingPossum 7/13/2020 8:32 PM
@whee30 Thanks, ended up going with that, works like a charm
Avatar
Nullable Truth 7/14/2020 5:26 AM
Nice to see you @Loz
Avatar
return2zero 7/14/2020 5:32 AM
Curious to know what other people are using in their labs to access USB dongles from their various analysis machines. We're looking at USB over ethernet, 1 server with 10+ USBs plugged in (Cellebrite, AXIOM, X-Ways etc). It is a check-in and check-out system.
Avatar
@return2zero you could check https://www.virtualhere.com/home
👍 2
Avatar
Andrew Rathbun 7/14/2020 6:43 AM
Use the search bar and search for VirtualHere. This has been discussed probably 5+ times now so there's lots of good discussion to spin yourself up on
6:44 AM
Not that this can't be discussed again, but there's lots of comments from people who many not be as active anymore
6:44 AM
all good points of view to consider
👍 2
Avatar
@return2zero +1 for VirtualHere.
Avatar
kmacdonald1565 7/14/2020 6:46 AM
i have used virtual here successfully, but only for one license. have used it for storage and all too. fairly easy to use, and reliable. had it running on a $35 raspberry pi connecting iwth windows machines.
Avatar
return2zero 7/14/2020 7:01 AM
Thanks everyone re: VirtualHere, Australian made too, even better!
Avatar
Do you want to become a ninja for Microsoft Defender ATP? We can help you get there! We collected content for two roles: “Security Operations (SecOps)” and “Security Administrator (SecAdmin)”. The content is structured into three different knowledge levels, with multiple modul...
9:04 AM
not sure if that was posted before
Avatar
Forensicator 7/14/2020 2:48 PM
Anyone from Idaho on this channel? Looking into relocating and wanted to start looking at the lay of the land and digital forensics opportunities! Ty
Avatar
theAtropos4n6 7/14/2020 3:43 PM
Hey everyone. I am given a project to present at non-dfir- aware audience, the benefits from DFIR. I have decided to provide results from a drone examination (flights data etc) and a smartwatch examination (heart rate, health data etc). I am looking for recommendations in which artifacts to include (more "fancy" are preferred) from each examination and also any resources for this type of examination. Thank you folks.
Avatar
Andrew Rathbun 7/14/2020 4:22 PM
re: the health data, I think @heatherDFIR has a good presentation about how health care data can help provide value to homicide investigations (think accelerated heart rate, dragging a body, etc)
4:23 PM
@theAtropos4n6 one of my favorite things to show the new officers at my previous LE gig was to demonstrate hash values in action. Ask them their favorite hobby or whatever (i.e. sports team), google image search the photo of that team's logo, then throw it HashCalc, show them the gibberish hash and explain what a hash is
4:23 PM
then tell them you're going to modify one single pixel of this image and watch how the hash value changes.
4:23 PM
their mind is blown and its a very visual explanation that provides a nice "ah hah!" moment for them
4:24 PM
explain how we hash evidence before acquisition, during acquisition, and post acquisition, if they all match, then we can prove we didn't modify the evidence, etc
4:24 PM
or do it with a Word document, add a single period and show them how much the hash changes. The best way to do that is to hash it in HashCalc, then while that value is still showing you modify the file, save it, then hit calculate again so they are staring at the hash value as it changes 100%
4:29 PM
Another thing I'd do is give them a quick tour of the Dark Web that they hear about in all those Experian commercials. They were always like "oooooo I wanna see that", so I'd show them the Hidden Wiki and show them how easy it was to do illicit things. Not sure your audience but my audience was cops so they needed to know the realities of it all. If it's a more G-rated audience, then scratch that idea
4:30 PM
But I will say this, of the probably 10 officers I did the hash value demo of, and most, if not, all of the officers being technologically illiterate, all were able to recite a week later what a hash value was when I saw them next. I'd pop quiz them and catch them off guard and every time they were able to remember that. 6 months later I'd ask them the same question and they'd say yeah I kinda remember but I couldn't explain it lol so I'd consider that a success
👍 2
Avatar
theAtropos4n6 7/14/2020 9:51 PM
re: the health data, I think @heatherDFIR has a good presentation about how health care data can help provide value to homicide investigations (think accelerated heart rate, dragging a body, etc)
@Andrew Rathbun Thank you very much for the detailed answer. Unfortunately, my audience will be oridnary non-technical people, no LE or Computer Science background. These ideas however, are excellent for newcomers in my working position. Explaining hash without an example, is really difficult, especially when using the math behind it. So, the idea of an image or a word document sounds great. I could use a reference to the dark web at some certain point. I have seen both the video and read the pdf presentation of @heatherDFIR and @Sarah for the health data. It left me with a really big satisfaction smile in my face. Especially, the dragging body behind the scenes. Haha. This was exactly what I had in mind when writing the previous message. Anyways, thanks again. I will try do some magic with the ingredients I have in my position (a drone, a smartwatch, a little wild imagination and a bit of luck)
Avatar
I just used health data in a death case a month ago. Great resource when you have it for sure.
Avatar
theAtropos4n6 7/15/2020 1:03 AM
I just used health data in a death case a month ago. Great resource when you have it for sure.
@whee30 Could you please share some general insights you gained from such a resource? Which artifact helped you crack the case? e.g. dropped heart rate when death occured helped narrowing timeframe of incident etc. Thank you
Avatar
DeeFIR 🇦🇺 7/15/2020 2:39 AM
@theAtropos4n6 I had a case a while ago where I used health data (specifically fitness/movement information - only steps) coupled with a timeline of events to support a hypothesis that someone had driven, stopped, walked around the car, and then drove off again (edited)
Avatar
theAtropos4n6 7/15/2020 3:58 AM
@DeeFIR 🇦🇺 Thank you. Yeah it is kinda awesome what you can get from health data.
Avatar
CryptoHackz 7/15/2020 8:56 AM
@hereQuestions about the DFIR Summit 2020... I've never attended any kind of event like this... which part is free and which part do I have to pay for (for ex. SANS classes)... and also is there a CPE credit for this event as well? (edited)
Avatar
@theAtropos4n6 I used heart rate trends and then the absence of heart rate to determine a likely time of death in an unattended death case.... lack of data can be just as helpful sometimes. No heart rate spiking, no running around or anything that might be associated with a struggle or assault. Obviously it isn't everything but it helps to paint the bigger picture. What
💯 1
9:26 AM
whats interesting also is that different tools parse the data differently. Physical Analyzer defined more artifacts than Axiom did in my case
💯 1
Avatar
Andrew Rathbun 7/15/2020 10:03 AM
Questions about the DFIR Summit 2020... I've never attended any kind of event like this... which part is free and which part do I have to pay for (for ex. SANS classes)... and also is there a CPE credit for this event as well? @CryptoHackz all the talks will be free. Anything next week is not free. Your free ticket is for all events Thursday and Friday (edited)
🤔 1
Avatar
There was a ping
10:03 AM
For the SANS oh ur responding to someone
Avatar
Andrew Rathbun 7/15/2020 10:04 AM
Yeah sorry for ping, it was a here ping from a quote. I should probably limit those commands lol
Avatar
Andrew Rathbun 7/15/2020 10:04 AM
thankfully they've not been abused yet so it's never risen to be a problem
10:04 AM
hopefully that answers your question @CryptoHackz
Avatar
@Andrew Rathbun I expect better from you 😛
😆 1
😂 3
Avatar
Andrew Rathbun 7/15/2020 10:05 AM
Also, there is a Discord server specifically for the Summit so there'll be a new one to join starting tomorrow 1 hour before it all begins
Avatar
Jack of Trades 7/15/2020 10:27 AM
Sure, I believe that
10:27 AM
Oh weird, I was scrolled back. Disregard
Avatar
CryptoHackz 7/15/2020 10:40 AM
thanks for the info... would you know if there's any CEU connected to this event? (edited)
Avatar
Andrew Rathbun 7/15/2020 10:40 AM
I'm assuming there will be. You get 1 CE credit for each webcast you attend with SANS
Avatar
CryptoHackz 7/15/2020 10:42 AM
1 CE... wow so generous
Avatar
Andrew Rathbun 7/15/2020 10:42 AM
continuing education credit, right? Is there some threshold you have to hit? I've never paid attention to them, frankly (edited)
Avatar
CryptoHackz 7/15/2020 10:43 AM
yes
Avatar
Andrew Rathbun 7/15/2020 10:43 AM
webcasts are an hour so frankly I think 1 CE is being generous but I don't have a horse in that race
Avatar
CryptoHackz 7/15/2020 10:43 AM
well mine is due in Nov.
10:44 AM
its for my SSCP cert my CompTIA ones are due in 2021
Avatar
Andrew Rathbun 7/15/2020 10:44 AM
Well go binge SANS webcasts and get your CE that way. You'll get a certificate and all that, I believe. Don't quote me on it. But they are free
Avatar
CryptoHackz 7/15/2020 10:45 AM
for the webcast?
10:46 AM
I'm working from home... so hopefully I can listen to the webcast while doing my work
Avatar
Andrew Rathbun 7/15/2020 10:46 AM
That's how the rest of us are going to do it!
10:46 AM
just have it on in the background
Avatar
CryptoHackz 7/15/2020 10:47 AM
👍
Avatar
Looking for insight on imaging or copying a "Microsoft Access database" from a offsite location in the field. I'm thinking this would be more of a cloud server vs physically on there machine ? Does Microsoft have access to these databases if we served them a search warrant ? (edited)
Avatar
forensicmike @Magnet 7/15/2020 12:50 PM
@DCSO Access databases are 100% file based. The closest thing to cloud you could get would be if they lived on a UNC/network share (or possibly Sharepoint?) but again, at the end of the day it's still an entirely file based db. So should be straightforward to obtain a copy if you have access to the target.
Avatar
@forensicmike @Magnet Perfect thanks for the info
Avatar
CryptoHackz 7/15/2020 1:32 PM
questions... how does a person sign up for aerospace village events in DEFCONsafemode?
Avatar
theAtropos4n6 7/15/2020 3:08 PM
@whee30 thank you very much for the insights.
Avatar
DamienAttoe 7/15/2020 7:53 PM
Wasn't sure where to put this but on one of my recent Forensic Fridays with Spyder Forensics webinars a participant asked about the impact of Secure_Delete in recovery of data from a SQLite database. The whole concept of Secure_Delete in SQLite is very interesting and relevant (iOS SMS.db uses it for example). Does this destroy our hopes of recovering deleted records? The answer being not always. After realizing there was not much out there on secure_delete from a forensic perspective (well that i could find), I wrote a quick paper on how it works and how not all hope is lost. Hope you find useful! If you have any feedback feel free to DM
👍 8
Avatar
Wasn't sure where to post this one... but here goes: Sometimes gaining access to a device is of more important than maintaining the forensic process... bypassing the password for a local user is not too taxing BUT has anybody come across/have experience in gain access to an account that users a microsoft account? I'm LE so happy to take conversation offline is prefered. Please let me know
6:51 AM
I see @rathbuna#0679 here... who else
Avatar
I"m watching on YouTube
6:55 AM
Is there a similar YouTube stream for Track 2 when it starts?
Avatar
yeah
Avatar
I got beat
Avatar
https://sansorg.egnyte.com/dl/9IWafDNlnn/ - the agenda too so you know what is going on
Avatar
Looking for recommendations (Elgato?) for a cheap device (No Susteen Data Pilot) that a patrolman can use to capture screen recordings from cell phones. Such as a text conversation where device is not taken for an exam etc...
Avatar
Mr. Eddie Vedder from Accounting 7/16/2020 8:35 AM
I use a Hauppauge PVR in the lab for capturing gaming consoles and some phones. I purchased a usb to HDMI i can use for the phones but android it wants me to install an app for screen sharing. I usually just use scrcpy at that point (edited)
Avatar
Abhiram Kumar 7/16/2020 10:34 AM
Hey everyone. Abhiram here. I am currently doing my bachelors in computer science engineering, India. I have been learning and doing forensics for the last 3 years. I'll be graduating in 2021. If my university agrees, I also have the possibility to complete my studies my december 2020 (There is a fast track option). I'm currently looking for a job and also open for internships. Does anyone here know of any possible internships/jobs that might be open. I am willing to share my resume via email. Please let me know. Thank you.
Avatar
Mistercatapulte 7/16/2020 10:59 AM
Hi guys
10:59 AM
Antoine know a software to compare 2 voices ?
Avatar
moscou_mule 7/16/2020 11:10 AM
RFI for the group, I am looking for software which can capture web page content (e.g. instagram page/posts) in a forensically sound manner. Right now I am simply taking screenshots which is time consuming and likely not forensically sound. Plus if a subject were to delete content before we had served a warrant or preservation request that evidence could be lost. Thank you.
Avatar
So Lee Whitfields talk on DFIR Track 2 has struck a cord, does anyone have any UK resources for DFIR volunteering?
Avatar
@moscou_mule Try https://www.hunch.ly
👆 1
👍 1
Avatar
moscou_mule 7/16/2020 1:33 PM
@dfa_adam thanks!
Avatar
@moscou_mule you could try the Magnet Webpage Saver as well. It’s a free tool, so you can see if it fits your needs.
👍 1
Avatar
moscou_mule 7/16/2020 2:29 PM
free is always good in government
Avatar
When documenting software version that you use on a long term examination, do you document starting AND ending version? Just most recent? I’m wrapping up a case that spanned a year+ due to reasons, considering just documenting most recent version used to parse the data. The .e01 already has info about the acquiring software
Avatar
@moscou_mule The following may also be worth considering, especially if you need automatic scrolling, comment expansion etc.:
👍 1
Avatar
Deleted User 7/17/2020 5:11 AM
I have a Samsung phone, probably S6. The phone is broken. Is there a way to get the IMEI number? There is nothing on the backside or on the SIM-card tray.
Avatar
calamari-san#9633 7/17/2020 7:01 AM
Magnet Axiom Examine doesn't support Chinese/Japanese on chats in conversation view? Am I doing something wrong?
Avatar
izzardthewizard 7/17/2020 7:02 AM
dad jokes are bad jokes
7:02 AM
short shorts??
Avatar
calamari-san#9633 7/17/2020 7:09 AM
(if anyone from @Magnet Forensics is able to help, I need to generate conversation reports, happy to DM with more info)
Avatar
NICE!
Avatar
Resource of the year. Nice!
👍 3
Avatar
Congratulations @Andrew Rathbun!
Avatar
@Andrew Rathbun congrats bro!
Avatar
theAtropos4n6 7/17/2020 1:35 PM
Congratsss @Andrew Rathbun!!!! And the rest of the team @sholmes @OllieD great job!! (edited)
👍 2
Avatar
@Andrew Rathbun Congrats! Great job!
Avatar
@Andrew Rathbun 💯💯💯
Avatar
kmacdonald1565 7/17/2020 1:36 PM
Avatar
Andrew Rathbun 7/17/2020 1:40 PM
Congratulations to YOU all. The @Moderators and I just facilitate this whole thing lol. You guys make it great!
💯 8
👍 8
🥳 5
Avatar
heatherDFIR 7/17/2020 1:59 PM
Amazing win @Andrew Rathbun
🍻 3
Avatar
JED15EN71NEL 7/17/2020 2:00 PM
Where is our #wtf-is-lance channel?
2:00 PM
Need somewhere for T-shirt designs and orders
2:00 PM
And stickers
2:07 PM
So curious the process that SANS went through to choose Discord? Our company is still working through the Skype vs Slack vs Teams vs ???
Avatar
Andrew Rathbun 7/17/2020 2:10 PM
We go with Mattermost since it's self-hosted
Avatar
Teams is the worst.
Avatar
JED15EN71NEL 7/17/2020 2:11 PM
Teams is the worst.
@sarah I don't disagree but it's also the hardest to push aside since it gets bundled and is now in GCC High
Avatar
Andrew Rathbun 7/17/2020 2:13 PM
MVS2020 was hosted on Discord and was a huge success. I think that might've influenced it, personally.
Avatar
We go with Mattermost since it's self-hosted
@Andrew Rathbun same for us, it finally killed slack, jabber and IRC. Kinda a middle ground between the unix guys and ITIL-manager 😛
Avatar
agree we have the same issue where i work, at least teams is 'more secure' then out many other unmanaged chat apps that have popped up, Teams has the worst interface though and how it updates / notifies you is just teri-bad. I prefer Slack the best. but anything is better then jabber.....
👍 3
Avatar
JED15EN71NEL 7/17/2020 2:49 PM
2:49 PM
Made a meme in honor of today. Thanks for a great first DFIR summit!
👍 3
🤣 1
Avatar
@sarah when we got Teams online I looked around for the notification settings and it is just horrible lol
Avatar
yep its 1million notifications or complete silence
2:52 PM
and it insists on doing notification + chat preview, like lol no stahp it
Avatar
JED15EN71NEL 7/17/2020 2:53 PM
yep its 1million notifications or complete silence
@sarah this is one of the many things I hate about Teams.
👍 1
Avatar
The worst ever was when I was at MS and they tried to get us to move to and evangelize Yammer
Avatar
We've done Yammer, we've done Jabber, we've done Teams, and Slack, and Skype (for business and personal both!). Now we've ended-up with Teams as the "official" platform and Engineering using Slack in the shadows. 🙂
Avatar
I laugh that marketing is pretty much solely using Skype For Business and engineering is using Zoom and Slack. Some folks are using Teams but I don't log onto it unless forced to. Marketing will have to pick a new platform soon since SfB is eoling.
Avatar
@MauravdL Honestly, as it rightfully should.
Avatar
SKYPE was pretty good - before MS bought it. After that it got almost no investment and competitors continued to improve (edited)
Avatar
@MauravdL You just blew my mind. MS owns Slack?
Avatar
argh - no
4:46 PM
Skype
4:46 PM
(too damned tired and now incoherent)
4:47 PM
fixed it
4:47 PM
can't take me anywhere today
Avatar
Okay. Yes. And agreed! (about Skype, that is.)
Avatar
Part of me thinks that the MS Teams code is just Skype in disguise lol
Avatar
LOL - IIRC no - but you never know for sure. 🙂
Avatar
PricklyPete 7/17/2020 6:43 PM
I think MS Teams is just sharepoint underneath
😆 1
6:43 PM
unfortunately haha
Avatar
^can definitely confirm that
Avatar
Aww I had such high hopes that the rebrand chain is still going.
Avatar
Can confirm the Sharepoint underneath as well
Avatar
Abhiram Kumar 7/18/2020 3:57 AM
Anyone, where can I find the recordings of the DFIR summit talks?
Avatar
They took down the youtube links, said recordings would be published probably on Monday IIRC.
Avatar
Abhiram Kumar 7/18/2020 3:59 AM
Oh I see. They even took down the discord server right?
Avatar
Yeah, 9pm ET yesterday. 😦
Avatar
Abhiram Kumar 7/18/2020 4:00 AM
Yeah... :/
Avatar
Andrew Rathbun 7/18/2020 4:49 AM
SANS has a pretty far reach. I'm surprised they don't have a Discord or something similar but maybe the showing from the Summit will result in something like that eventually.
Avatar
Andrew Rathbun 7/18/2020 5:01 AM
I just published my KAPE guide. If anyone has heard about KAPE but never used this free tool before, check it out and let me know what you think! Any questions you have, fire away in #computer-forensics (edited)
💯 3
😍 2
👍 3
Avatar
With people coming over from the SANS DFIR Summit Discord, I wonder if we need a “Dad jokes” channel here 🤣🤣🤣
6:15 AM
Oh, and congratulations. Well deserved win.
👍 3
😆 1
Avatar
In terms of SANS and Discord. We feel it makes sense for the larger events as we can have good features for little to no charge. We use Slack internally and for classes as it is seen as more “professional” than Discord, which is seen as more of a “gamer” solution even though the base features are a lot better.
Avatar
Andrew Rathbun 7/18/2020 6:43 AM
In terms of SANS and Discord. We feel it makes sense for the larger events as we can have good features for little to no charge. We use Slack internally and for classes as it is seen as more “professional” than Discord, which is seen as more of a “gamer” solution even though the base features are a lot better.
@driflee Discord recently came to a realization that people besides gamers use it for non-gaming purposes. Took them long enough 😂 either way I obviously think Discord is a great platform for real time collaboration. Only thing it needs is threading which hopefully comes eventually. If it could get Mattermost's threading I think it'd be my ideal chat platform
6:44 AM
Also, thanks for all the work you put into the awards every year 👍
Avatar
Thanks. I agree. I’ve been flying the Discord banner for a while inside SANS. We’ll be using it for the Cyber-Camp too
👍 3
Avatar
JED15EN71NEL 7/18/2020 8:11 AM
Is there a channel for discussing data backup solutions? Interested to know what (if any) NAS solutions are being used? Are they part of your toolkit (such as FTK, Encase) or are they standalone devices such as Synology, QNAP, Drobo?
Avatar
Andrew Rathbun 7/18/2020 8:11 AM
This is as good a channel as any, thanks for asking @JED15EN71NEL
8:12 AM
When I was in LE, we had a localized QNAP that replicated every night at 2000 hours to another QNAP located within the evidence room which was on the other side of the building.
👍 1
Avatar
JED15EN71NEL 7/18/2020 8:13 AM
When I was in LE, we had a localized QNAP that replicated every night at 2000 hours to another QNAP located within the evidence room which was on the other side of the building.
@Andrew Rathbun Exactly the kind of advice I'm looking for. Would love to hear more setup ideas from others.
Avatar
Andrew Rathbun 7/18/2020 8:14 AM
We also only stored phone dumps on the QNAP and used Cellebrite, XRY, etc against those dumps. Any computer image dumps we just made working copies from the evidence drives
Avatar
JED15EN71NEL 7/18/2020 8:17 AM
Back when I worked with Department of Corrections, I assisted their Internal Affairs team with their FTK setup. They were using a single machine. I set them up on an FTK cluster. The compute and data machines were housed in the data center and had a physically closed network (isolated switch/ethernet) back to the evidence room where the primary machine sat. Cluster was less than intuitive to setup and had a serious lack of documentation but it worked. It apparently made cases go faster too thanks to the extra compute and threads.
Avatar
Hello 👋
Avatar
JED15EN71NEL 7/18/2020 9:05 AM
@Compute Welcome!
Avatar
Hello am also new. (edited)
Avatar
JED15EN71NEL 7/18/2020 3:17 PM
Hi @Smorgan I’m new here too
Avatar
Andrew Rathbun 7/18/2020 3:17 PM
Hopefully you all will get a good idea of the server's cadence come Monday when everyone is back in the office
3:18 PM
you all joined at a bad time i.e. 1700 on a Friday lol
😆 1
Avatar
Lol
Avatar
Skype for business: 💩 it is basically just the old microsoft Lync stuff (I think that was the name) with a new skin.. that's all pure MS code and it shows <I'm allowed, spent nearly 4 years inside that beast>) There's nothing skype there, just rebranded after they bought skype... Skype (sans the 'for business') still has (AFAIK) core code crafted by skype before MS acquired them.
😆 2
1:59 AM
I too would love to see Sans have a full time DIscord.. perhaps the recent summit has let that genie out of the bottle, lets hope it won't go back in.
Avatar
the macos skype for business client is the worst, will start typing a message to recipient a, then all of a sudden it's going to recipient b
Avatar
Andrew Rathbun 7/19/2020 1:45 PM
It's not a bug, it's a feature 😉
Avatar
We've had good luck with MS teams excluding the horrendous notification system it has.
Avatar
plus you can paste code in Discord nicely 🙂
9:38 AM
def foobar(): print("woo!") (edited)
Avatar
Jean Costello 7/20/2020 9:42 AM
Are we going to add an IoT-forensics channel under the DFIR Channels anytime soon?
Avatar
Andrew Rathbun 7/20/2020 9:46 AM
@Jean Costello the community drives this server. Does anyone else want this?
💯 5
Avatar
Does anybody have an efficient way to wipe HDDs? We go through a lot of HDDs here and need to do a full wipe after each usage. Currently, we just have a computer that boots into Grub2 where we select Paladin, then wipe and verify. I've been messing around with DBAN and another tool called DriveSlaw but both of them wipe the internal NVMe drive on the desktop (containing all our other bootable OSes) which is not ideal. I've see some super expensive stuff on the market but I'd rather "homebrew" a solution that is more budget friendly.
Avatar
Andrew Rathbun 7/20/2020 12:47 PM
@Cole anything against just using Eraser against those HDDs? You can schedule one after another as long as they're plugged in. May be worthwhile to get a few SATA to USB cables (with dedicated power supply) and throw your HDDs on those cables, schedule the wiping with Eraser and let it run over the weekend.
12:47 PM
or if you have hard drive docks, you can wipe them that way
12:48 PM
@Cole anything against just using Eraser against those HDDs? You can schedule one after another as long as they're plugged in. May be worthwhile to get a few SATA to USB cables (with dedicated power supply) and throw your HDDs on those cables, schedule the wiping with Eraser and let it run over the weekend.
@Andrew Rathbun https://www.amazon.com/UGREEN-Cable-Adapter-Converter-Support/dp/B00MYU0EAU/ref=sr_1_13?dchild=1&keywords=sata+to+usb&qid=1595274499&s=electronics&sr=1-13
Avatar
@Magnet Forensics In a portable axiom case where artifacts have been tagged, is there a specific file(s) that we can copy out and into a separate copy of that portable case so we don't have to wait to copy the entire portable case? Similar to a UFED .pas file.
Avatar
@Abhiram Kumar unless you saw already, the streams are now up at https://www.sans.org/account/summits/6139 (blue buttons on the right side to play the videos)!
Avatar
Abhiram Kumar 7/20/2020 1:35 PM
Yes @ahnberg. A friend of mine pointed out that the talks were available in the portal. Thanks for your help 🙂
Avatar
@dfa_adam No sir, it is building the SQL database Since the SQL database is our Case file no file to copy...
Avatar
Darn, ok, thanks. Time to start the 3 hour copy...
Avatar
d3m0sth3n3s 7/20/2020 2:00 PM
No SCADA/ICS DFIR channel?
Avatar
Andrew Rathbun 7/20/2020 2:01 PM
No SCADA/ICS DFIR channel?
@d3m0sth3n3s No clue what SCADA is. ICS = Incident Command System? Acronyms aren't universal!
Avatar
@Cole anything against just using Eraser against those HDDs? You can schedule one after another as long as they're plugged in. May be worthwhile to get a few SATA to USB cables (with dedicated power supply) and throw your HDDs on those cables, schedule the wiping with Eraser and let it run over the weekend.
@Andrew Rathbun I'm playing with Eraser now. Thanks!
Avatar
Andrew Rathbun 7/20/2020 2:04 PM
@Andrew Rathbun I'm playing with Eraser now. Thanks!
@Cole If you have any questions, feel free to ask. It could be more intuitive but you'll pick up on it quick.
Avatar
d3m0sth3n3s 7/20/2020 3:14 PM
@d3m0sth3n3s No clue what SCADA is. ICS = Incident Command System? Acronyms aren't universal!
@Andrew Rathbun sorry!! SCADA=supervisory control and data acquisition, used in ICS (industrial control systems) for distributed control. So like PLCs (programmable logic controllers) like the ones compromised with Stuxnet, SIS (safety instrumentation systems) like the ones compromised with TRISIS... the systems that control a lot of critical infrastructure. There’s not much forensics knowledge for this subfield but it’s important!
Avatar
Andrew Rathbun 7/20/2020 3:16 PM
This server is community driven. If there's a demand for something to cover that then so be it. I think IoT will be implemented eventually per feedback. All depends on what people want
👍 1
Avatar
kmacdonald1565 7/20/2020 3:27 PM
i generally agree with an IoT channel but it seems so very niche. not that is a bad or exclusionary thing, but scope seems a tad narrow. But that could be my ignorance on the subject. i suppose it depends on what information is available out there and i imagine that overall it will be a growing market
Avatar
d3m0sth3n3s 7/20/2020 4:22 PM
That’s fine! Just saw the vehicle forensics and wondered. Thanks! Excited to be here.
Avatar
@d3m0sth3n3s No clue what SCADA is. ICS = Incident Command System? Acronyms aren't universal!
@Andrew Rathbun Good point. In this case, I'm guessing they mean Industrial Control Systems (SCADA = Supervisory Control And Data Acquisition). Definitely a growing need for forensic research, tools, capabilities in this arena.
Avatar
One of my old workplaces used Skype for Business and it was constantly going offline and online and offline again it was awful! Lync didn't suffer as much downtime as Skype for Business did.
@KttyMagic My last encounter with Skype4Biz was trying to get it to integrate with a IP based telephone system and switch. Was able to get it to work but was just kludgy over all. It's amazing MS is able to continue selling it when it's basically legacy software and everyone that knows the innards intimately has moved on to other things.
Avatar
Types of places that use SCADA controls: Power plants and power grid, fresh & waste water treatment plants, chemical and processing plants, refineries, pipelines, etc. When hackers attack infrastructure, going after the SCADA system is a big attack surface that they won't neglect. The SCADA controls are what Stuxnet targeted when it was sent at the Iranian nuke fuel enrichment program, attacking their centrifuges.
👍 2
Avatar
https://attack.mitre.org/techniques/T1218/010/ mentions ESET as a mitigation, but ESET is EOL since 2019. Any new possible mitigations for this?
4:23 AM
so maybe it is not an issue on Win10 anymore?
4:23 AM
and the mitigation is to upgrade to latest Win10?
Avatar
OWC Aura Pro X2 SSD: Anyone know of an enclosure that can allows this SSD to be recognized? https://eshop.macsales.com/shop/ssd/owc/aura-pro-x2
Gives you 16x more storage (up to 2TB) and up to double the speed of the original drive so you can keep your Mac running optimally for years.
Avatar
Does anyone know of any windows 10 computer artifacts other than the user agent to prove that a link was opened by outlook 2016 in a preview mode?
Avatar
@DF51 Shaf Is the SSD from a Mac ?
Avatar
@B thank you!! I will look into it. For some strange reason OWC does not have enclosures that will read their own OWC SSD sticks! Nor are they aware of any third party enclosures that are compatible.
👍 1
Avatar
@DF51 Shaf Is the SSD from a Mac ?
@DCSO Yes and No. It is not the original Apple SSD which came with the laptop. It is aftermarket third party SSD produced by OWC which is used to upgrade storage in the Mac by replacing the original and placing the original in an enclosure that OWC can provide at an extra cost. Why they don't have an enclosure that can be used with their own OWC SSD's is surprising.
Avatar
OWC Aura Pro X2 SSD: Anyone know of an enclosure that can allows this SSD to be recognized? https://eshop.macsales.com/shop/ssd/owc/aura-pro-x2
@DF51 Shaf That is an M.2 PCIe SSD. You can use the adapter in the link below with an PCIe write blocker or a TD3. https://digitalintelligence.com/store/products/a1640?taxon_id=37
Gives you 16x more storage (up to 2TB) and up to double the speed of the original drive so you can keep your Mac running optimally for years.
👍 1
Avatar
does anyone know if you can do a reverse lookup via CAID?
12:26 AM
i.e. can I search for a match if I have a hash value
Avatar
MrMacca (Allan Mc) 7/22/2020 3:18 AM
Has anyone used any Audio to text software they would recommend? Would have to be an offline service. I've got a few voice recordings that I want to test converting to text.
Avatar
theAtropos4n6 7/22/2020 10:09 AM
Are recordings of SANS DFIR Summit available for downloading? I am facing a huge problem when trying to move forward/backward at the online recordings. I am getting an error message saying "A network error caused the media download to fail part-way." Does anyone face the same problem?
Avatar
@Cellebrite Hi, stupid question: With current version of P.A. installer there is no need for a separate cloud analyzer installer anymore?
Avatar
CLB-drorimon 7/22/2020 11:59 AM
No need, it's one version to rule them all.
💍 1
Avatar
@CLB-drorimon Ok, thanks. I love The Lord of the Rings 😆 (edited)
Avatar
i.e. can I search for a match if I have a hash value
@Sudo yes, if you have a hash then you can search it on caid.
9:24 PM
You'd need to speak to your local caid spoc who should have access to the service.
Avatar
haven't got one of those
12:10 AM
but we figured out how to look it up
Avatar
@Magnet Forensics any Magnet people about?
Avatar
Has anyone used any Audio to text software they would recommend? Would have to be an offline service. I've got a few voice recordings that I want to test converting to text.
@MrMacca (Allan Mc) I know a company that can offer this, but no idea what it costs
2:31 AM
I can PM you details if you cannot find some other (free perhaps) method
Avatar
MrMacca (Allan Mc) 7/23/2020 2:58 AM
Sure thing @bizzlyg ill take a look.
Avatar
33ed36bc1641c62bb997cef51ba06b5049c7d4c1
Likes
364
🙄 1
Avatar
@Sudo sure thing, shoot me a DM
Avatar
what's ol axi0mX done now
Avatar
No idea. Very curious tbh.
Avatar
lots of people sayin SEP
Avatar
Andrew Rathbun 7/23/2020 6:30 AM
SEP?
Avatar
secure enclave
Avatar
Andrew Rathbun 7/23/2020 6:30 AM
I am not keeping up on this at all so tldr
6:30 AM
ahh cool
Avatar
so like, protected key store stuff
6:31 AM
unlock, encryption, secure boot
Avatar
🕵🏻cyber4n6pi 7/23/2020 6:49 AM
Has anyone used any Audio to text software they would recommend? Would have to be an offline service. I've got a few voice recordings that I want to test converting to text.
@MrMacca (Allan Mc) The only one I've used is Dragon. We used it to take (witness) statements. It worked offline (we'd typically be in someone's house) and it did a pretty good job of getting everything correct. It was also easy to stop & start when we needed to talk but not have the s/w listen.
Avatar
yeah Dragon seemed ok
7:18 AM
used it in the past
Avatar
MrMacca (Allan Mc) 7/23/2020 7:19 AM
So I could point a few files to it and it would generate a text file for each?
Avatar
think so yeah
7:21 AM
if they're a compatible file type
Avatar
what's ol axi0mX done now
@Sudo Yeah, an interesting little tease. Also seen suggestions that it's related to firmware signing for iOS
Avatar
.wav, .mp3, .wma, .dss, .ds2, and .m4a
Avatar
But who knows at this stage. Something to watch out for
7:22 AM
@OllieD yeah the SEP people are saying
7:22 AM
mite b cool
👍 1
7:22 AM
keeping an eye on it 😄
Avatar
Big if true
7:23 AM
I can't remember if I read about who he was, if anyone at all
7:23 AM
all I know is he's apparently dancing on the edge of a volcano
😆 1
Avatar
any network admins on here?
11:37 AM
what up?
Avatar
dm, this may be long
Avatar
Dr. Kaan Gündüz 7/23/2020 11:37 AM
it's the firewall 🙂
Avatar
kmacdonald1565 7/23/2020 11:38 AM
change your password and reboot 3 times (just kidding, good luck)
Avatar
Andrew Rathbun 7/23/2020 11:39 AM
Don't forget to hop on one foot while farting the alphabet
😆 2
Avatar
Dr. Kaan Gündüz 7/23/2020 11:39 AM
farting the alphabet 🙂
11:40 AM
maybe the vowels
Avatar
i've tried all that!
Avatar
But who knows at this stage. Something to watch out for
@OllieD yes, this is an exciting one. More information to be dropped tomorrow. ☺
💯 1
Avatar
Magnet Forensics has started an Idea Lab. We are currently seeking users to test early stage products and provide feedback on product concepts. If you are interested, please sign up here: magnetidealab.com
👍 3
Avatar
Is anyone else getting spammed from SANS DFIR Summit related vendors today? I've gotten 2 in the last hour.
Avatar
Andrew Rathbun 7/23/2020 3:31 PM
I've only gotten one so far
Avatar
2 on my side. One of them hit the spam filter 😄
3:50 PM
The opt-out link in one of the emails didn't work correctly so I had to dig it out of the email and manually unsubscribe from the vendor's portal.
Avatar
2 so far...
Avatar
Anybody found details on Pangu's Mosec 2020 Presentation .😃
4:21 AM
Here it is. (edited)
Avatar
ELI5?
Avatar
I'm thinking it could mean that the Checkra1n / Checkm8 exploit/s could be configured to allow bruteforce of pin without issue of wiping the device. The last line of the image I posted suggest it maybe possible to try the lock screen password without restriction. My thoughts only though. There are far more genius's out there than I will ever be (🙂 ). (edited)
Avatar
@8198-IZ54 I don't think checkra1n will ever allow bruteforce. We are looking into the materials now, this is great research from the Pangu team that they currently see applicable for A8-A10, exploit research will follow, however any development over it will not be trivial. Has very good potential for restoring checkra1n functionality despite the new iOS 14 limitation I mentioned a couple a weeks ago, up to A10 at least. (edited)
Avatar
Is there anyway to create a report in @Cellebrite PA where it is in chat bubble format like the conversation view?
Avatar
codysartor#700 7/24/2020 11:28 AM
You can view it in the chat bubbles, select the ones that are relevant, and export them to a PDF. Does that help?
Avatar
Hello guys! Ive never talked here. But i wanna start. I finally have something to talk about.
3:47 PM
Im starting preparation for CHFI tonight.
3:47 PM
Is anyone interested to study with me?
3:47 PM
Or atleast are you guys interested if i post stuff about whatever i learn?
3:48 PM
PS. I work as a threat analyst sorting through emails for clients.
3:49 PM
Is there any channel i can post about the stuff im learning? Like a "what am i doing today" channel?
Avatar
Andrew Rathbun 7/24/2020 6:01 PM
@zeppy any training talk can go here: #training-education-employment
🆒 2
Avatar
@zeppy any training talk can go here: #training-education-employment
@Andrew Rathbun thanks
Avatar
CLB - DavidK 7/26/2020 4:30 AM
@goalguy in the general report window just make sure to check the "Include conversation bubbles" box.
Avatar
morning. has anyone played around with the new Windows Terminal? if so, do you find it better or more usable?
Avatar
Andrew Rathbun 7/27/2020 6:47 AM
I've played around with it but frankly I don't use the cmd line enough day in and day out to have much of an opinion beyond the tabbing feature being awesome and the color coding of tabs a nice feature
6:47 AM
I think it's awesome you can have PS, CMD, and Azure (not that I have use for that right now) all in the same window
Avatar
thats true. tabs are great, but yeah haven't found much else out of it. at least yeat
Avatar
forensicmike @Magnet 7/27/2020 1:40 PM
@muzictek @Andrew Rathbun It's very easy to add your own tab types btw. This has been the most useful thing yet for me
👍 1
1:40 PM
1:43 PM
To add, just go to Settings (opens settings.json in an editor) and add in an entry with "commandline" instead of source.
👍 2
Avatar
Anyone got a preferred site for cellphone parts? Need a data port for a Nexus 7 tablet. (I typically do ebay, is there something better?)
Avatar
Not affiliated, used them in the past, very reliable https://www.fonefunshop.com/
FoneFunShop At FoneFunShop you will find everything to help you unlock, flash, debrand and service mobile phones. We also supply the latest mobile phone accessories, phone parts, and repair tools too. As well as our mobile phone unlocking, flashing and repair services, we offe...
💯 2
Avatar
Nice, thanks!
Avatar
To add, just go to Settings (opens settings.json in an editor) and add in an entry with "commandline" instead of source.
@forensicmike @Magnet nice, I knew about the multiple tabs thing but didn't realise you could add your own ssh tabs
👌 1
Avatar
MalcolmPowder 7/28/2020 4:07 AM
Does anyone have any experience with setting Apple computers up for secure environments? Permanently disabling Bluetooth / wi-fi etc?
Avatar
What are ppl using to manage their dongles expiring? With multiple examiners with multiple dongles which expire at various times it seems like there is always one falling through the cracks for renewal. Wondering how other people have tackled this.
Avatar
Does anybody know if it's still possible to get access to the original (i.e. on-prem) PhotoDNA? Microsoft's web is all about their cloud offering.
Avatar
Andrew Rathbun 7/28/2020 5:08 AM
What are ppl using to manage their dongles expiring? With multiple examiners with multiple dongles which expire at various times it seems like there is always one falling through the cracks for renewal. Wondering how other people have tackled this.
@bmac4n6 It will take time but what we tried to do was modify our license renewals so after a cycle or two they'd all expire within the same month
5:09 AM
so we'd look at all expiration dates and try and figure out the least amount of dongles to modify the renewal date. So when we'd go to extend our license, we'd ask for a few extra months tacked on to get it to expire onto our target month where we wanted most, if not, all dongles to expire on
5:09 AM
That way, when it came time to renew one, it was time to renew all
5:09 AM
keeps it simple
Avatar
There is a free tool i've heard about for processing and reviewing snapchat records. Anyone know what I'm talking about?
Avatar
chrisforensic 7/28/2020 9:39 AM
thanks @Oxygen Forensics for new version 12.6 🙂 with some coooool features 👍 (edited)
👍 4
Avatar
Thanks @chrisforensic
Avatar
@MalcolmPowder you should be fine if you just disable all sharing, networking and bluetooth options from system preferences
Avatar
any big XCP-NG fans in the house
Avatar
@bmac4n6 It will take time but what we tried to do was modify our license renewals so after a cycle or two they'd all expire within the same month
To expand on @Andrew Rathbun point. We asked each vendor to give quotes for each dongle so they would all expire the month prior to the end of our fiscal year. This means ended up putting all of our dongles onto the same expiration date
Avatar
iPhone question. Not really and extraction or decode question so im putting it here. i have a 6s, its powered on with the Hola, hello screen indicating thats its been reset but when i press home its asking for a 6 digit PIN. I've never seen this before, anyone know why this is?
Avatar
The new PA icon looks like a phone is being run through a shredder
😂 5
Avatar
AzuleOnyx🛡 7/29/2020 10:12 AM
So, anyone have that project where they forgot, or missed, documenting part of solving a problem for an artifact? lol. Sigh....
10:13 AM
any big XCP-NG fans in the house
@Sudo I have been using Proxmox lately.
Avatar
Just in case anyone wants to see this Discord Server’s victory at the 4:cast Awards, here’s a link. https://forensic4cast.com/2020/07/forensic-4cast-awards-2020-video/
💯 7
Andrew Rathbun pinned a message to this channel. 7/29/2020 4:30 PM
Avatar
@mitchlang NDCAC has a free program on their site called DotSocial that can parse search warrants from many social media companies. It’s not the most user friendly for non techies but it has some good features. (edited)
👍 1
6:19 PM
I wrote a Python script for SnapChat search warrants and made it an executable. I came across a bug today that I need to figure out.
Avatar
MalcolmPowder 7/30/2020 8:47 AM
@MalcolmPowder you should be fine if you just disable all sharing, networking and bluetooth options from system preferences
@John The issue is more around preventing the user from just re-enabling them. I've seen things about editing agents and daemons with LaunchControl but wasn't confident tweaking them with the instructions Google was providing.
8:48 AM
iPhone question. Not really and extraction or decode question so im putting it here. i have a 6s, its powered on with the Hola, hello screen indicating thats its been reset but when i press home its asking for a 6 digit PIN. I've never seen this before, anyone know why this is?
@Majeeko Could it be that 'Find My...' wasn't disabled before the device was reset?
Avatar
@MalcolmPowder Thanks, that was the general concencus in the office, somthing along those lines. Its was deemed NFA anyway.
Avatar
@Majeeko I've just asked around our office. We've had approx 4 or 5 similar devices. We found that it was a device that had received a significat iOS update and needed confirmations on some settings.
Avatar
@8198-IZ54 Thanks. Ive never come across it before.
Avatar
I think its a very specific set of circumstances, for it to get into that state. Out of thousands of iOS devices weve only seen it a handful of times.
👍 2
Avatar
It was found with a load of other 6s handsets that ave all been wiped but this was the only one with a passcde
Avatar
MalcolmPowder 7/31/2020 2:22 AM
I've tried factory resetting my iPhone 6S this morning: it begins the process and then just reboots to the normal login screen, with nothing having been deleted!
Avatar
It was found with a load of other 6s handsets that ave all been wiped but this was the only one with a passcde
@Majeeko This is something we've seen a few times as well actually, and we also believe it is due to a significant iOS update. These phones have not been Sky ECC ones, and this isn't just limited to a 6S.
Avatar
Interesting
Avatar
Th ephone was a low priority handset, so it just got put back in stores, probably wont end up examining it. looks like the suspect bought old phone and stripped them don for some reason.
Avatar
Cellebrite, what have you done to the program icons? Get the old ones back please.
🤣 3
Avatar
Andrew Rathbun 7/31/2020 5:50 AM
pics? I don't do mobile stuff anymore
Avatar
@Majeeko just to add yes we've seen quite a few like this. Not necessarily a Sky ECC iPhone (a possible tell with those is no "CE" marking on the back). Sometimes there's been full user data on entering the provided PIN 🙂 👍
👍 1
Avatar
@Andrew Rathbun First one is UFED 4PC and second one is PA
👍 1
Avatar
Andrew Rathbun 7/31/2020 1:34 PM
Kinda looks like a power button on the left and the right kinda looks like the Android robot with his leg detached from his body?
🤣 2
Avatar
Posture King 8/2/2020 11:00 AM
anybody sure how to mount a virtual machine to encase so that i can conduct file analysis?
11:04 AM
would i just create a new case, then add the vmk file using 'add evidence'?
Avatar
think so yeah
5:42 AM
I'm sure I've imported vmdk's into forensics tools before
Avatar
@Posture King Yeah, you should be able to just drag it in, or add it as evidence. (edited)
6:00 AM
Currently having my own EnCase issue... For some reason the add evidence window has gone huge and therefore the next, cancel and back buttons are all off the bottom off the screen. Think I've tried everything I can think of. It's almost like another screen is zoomed in or something making the box huge, arghhhh!
👍 1
6:06 AM
Not just add evidence window it seems... alot of the pop up windows are massive and cannot be interacted with properly because of it.
6:10 AM
Figured it out incase anyone ever has this issue:- If you open an evidence item, go to a picture, open it in picture tab at the bottom and CTRL zoom out, then reload EnCase. It's back to normal... Very strange 😆 (edited)
👍 1
😆 1
Avatar
Posture King 8/3/2020 6:53 AM
I figured it out mate, thankyou for your response though man
👍 1
Avatar
chrisforensic 8/3/2020 10:03 AM
11 days vacation are over 😦 ... back at work tomorrow.... maybe i can install new version 7.36 4PC/PA tomorrow and start with new power?? 🙂 @Cellebrite
Avatar
@chrisforensic as long as you're ok with beta, sure 😉
Avatar
chrisforensic 8/3/2020 10:10 AM
@Arcain 🙂 betas are allready installed 😉
Avatar
ChrisF (Lux) 8/4/2020 3:30 AM
Hey all, I'm currently dealing with a job where we've found indecent images exclusively in the com.sec.android.gallery3d\cache on a Samsung SM-G920f. Is anyone able to point me in the direction of any documentation detailing how exactly the caching works with the android gallery app? I can't seem to locate anything myself and was hoping to avoid having to run my own tests. Many thanks!
Avatar
theAtropos4n6 8/4/2020 3:36 AM
Hey all, I'm currently dealing with a job where we've found indecent images exclusively in the com.sec.android.gallery3d\cache on a Samsung SM-G920f. Is anyone able to point me in the direction of any documentation detailing how exactly the caching works with the android gallery app? I can't seem to locate anything myself and was hoping to avoid having to run my own tests. Many thanks!
@ChrisF (Lux) Hope that maybe useful. https://athenaforensics.co.uk/com-sec-android-gallery3d-mobile-phone-forensics/
The Importance of the com.sec.android.gallery3d File in Mobile Phone Forensic Examinations | Computer & Mobile Phone Experts | Criminal, Family & Corporate
Avatar
There isn't really anything of substance in that article
Avatar
theAtropos4n6 8/4/2020 3:49 AM
There isn't really anything of substance in that article
@OllieD Yeap, you are right. How about this one? http://cheeky4n6monkey.blogspot.com/2016/07/a-timestamp-seeking-monkey-dives-into.html
Are you sure?! Those waters look pretty turdy ... UPDATE 4AUG2016: Added video thumbnail imgcache findings and modified version of scri...
Avatar
JonasWanobi 8/4/2020 5:53 AM
iPhone question...
@Majeeko I have been seeing this with updated phones. The phone will wipe all data except for the owner security information, which is needed to unlock and return the device to an entirely vanilla state. This is to prevent theft and reuse, I'd imagine.
(edited)
Avatar
Has anyone tried installing Physical Analyzer recently, and experienced a blue screen of death? Occurred on Windows 10 x64 Pro for one of our guys in the lab, after a fresh Windows install and windows updates.
Avatar
For anyone who attended some of the webinars during the Summit in May, do you know if there is a way to get a copy of the certificates for attendance for those webinars? I know they emailed links to them, but I can't manage to find some of the emails.
Avatar
Andrew Rathbun 8/4/2020 9:35 AM
@Deleted User might be able to answer that
Avatar
Does anyone utilize html in their forensic reports? I have been tweeking my reporting trying to find the best way to present the data while still holding to a format.
Avatar
so people really still use encase?
Avatar
Beardy_Dude 8/5/2020 1:49 AM
so people really still use encase?
@Sudo if need be, only EnCase 6 😅
Avatar
Wondering if someone can recommend any disk cloning software for Win10, that can clone disk to disk or dd-image to disk?
Avatar
Andrew Rathbun 8/5/2020 4:17 AM
@Sudo if need be, only EnCase 6 😅
@Beardy_Dude how old is EnCase 6 at this point? When did that come out?
4:17 AM
And does it struggle in any areas considering how quickly things change?
Avatar
@dotmatrix FTK maybe?
4:19 AM
or clonezilla
Avatar
Beardy_Dude 8/5/2020 4:24 AM
@Beardy_Dude how old is EnCase 6 at this point? When did that come out?
@Andrew Rathbun a looong time ago 😂 I use it more of an "advanced" ftk imager, when I wanna look at something real quick
Avatar
Andrew Rathbun 8/5/2020 4:26 AM
Wondering if someone can recommend any disk cloning software for Win10, that can clone disk to disk or dd-image to disk?
@dotmatrix I use Clonezilla for making images of my system prior to reformatting, etc
Avatar
@Sudo @Andrew Rathbun Thanks, I'll look into it. 🙂
Avatar
yeah looking, clonezilla is probably your best bet
4:27 AM
for straight clones for useful things, FTK is more forensics
4:27 AM
there's also Veeam free edition if you have to do it live
Avatar
Does anyone utilize html in their forensic reports? I have been tweeking my reporting trying to find the best way to present the data while still holding to a format.
@Ghosted yes, that and excel usually. I find html more easy on the eyes and navigation easier personally
8:42 AM
That's for computers.
Avatar
Does anyone utilize html in their forensic reports? I have been tweeking my reporting trying to find the best way to present the data while still holding to a format.
@Ghosted yep we give officers HTML and Excel. Sometimes PDF as well if they ask nicely 😉
Avatar
@Magnet Forensics I'm trying to update to the latest version of magnet. Getting a returned "1603" error
12:18 PM
Do you know how I can fix ?
Avatar
forensicmike @Magnet 8/6/2020 12:21 PM
sending DM
Avatar
Thanks @forensicmike @Magnet
Avatar
Just a general question to ponder. Has anyone been able to create an adb backup within the device then extract it via WiFi or Bluetooth? I've use Bluetooth (because the USB port doesn't transfer data) with Celebrite and got a lot but it would be cool to be able to build the zip on the phone then transfer it even if only to a clean microsd
Avatar
@Neon adb backup is a feature of ADB itself as far as i remember. You can use adb wirelessly, but currently it requires you to initiate the connection using cable (i think it changes with Android 11 now). (edited)
Avatar
You're right
1:33 PM
I wonder if there was a way to execute adb backup on the device though. Maybe not but that would be helpful as Bluetooth doesn't get everything. I may try it with my work phone to see if the wifi method will let you get an adb backup
Avatar
There's com.android.backupconfirm/.BackupRestoreConfirmation intent that's being run when you use "adb backup" command but it can't be started manually
Avatar
Hmm interesting. Thanks for that. This phone has driven me nuts. I wouldn't mind making an apk if we could make it do what we need to it to. I'll have to look into it.
1:46 PM
Looks like the privileges are different vs a shell on the computer
Avatar
There's actually an app on the device that doesn't what adb backup do so you can tinker with that. I've no idea if it'll actually save stuff on the phone (or sd), but give it a try. It's "bu"
Avatar
I'm sure root would solve that problem but that's not ideal
1:48 PM
Hmm. "Bu", that's an apk or is a library for the Android SDK?
Avatar
that's binary
Avatar
Oh cool
Avatar
run "bu --help" in terminal on the phone
Avatar
Cool thanks.
Avatar
Doesn't seem to do anything on my device
Avatar
I'm sure Celebrite would have done this already but I like a challenge
Avatar
What's your initial issue and the phone itself? Doesn't do data transfer, reverts back to charging only? (edited)
Avatar
It will only charge ,no data.
Avatar
Have you checked in developer settings if there's something like "allow adb while charging" - this is available in Huawei phones for example (edited)
Avatar
Yeah, it's wiggly
1:53 PM
I should order some ports to replace them, but this case isn't that big of deal. Ugh Micro USB. USB c is so much better
Avatar
Wouldn't say it's better. It's just as defective and often rips off the board with pads
Avatar
"bu backup -all" works, but it throws output to the terminal itself. If you try to redirect it to a file with "> backup.ab", the backup window now longer shows up
Avatar
Maybe it was changed, or pathed in later Android versions. I read that this used to work "bu 1 backup -apk app.package.name > /sdcard/backup.ab"
Avatar
I'm sure most of you have already seen the news here, but: https://www.tomshardware.com/news/massive-20gb-intel-data-breach-floods-the-internet-mentions-backdoors If the backdoors are legit I wonder if this will lead to more exploits on intel systems. Not really my area of expertise so can't really comment. The fact that a lot of the zip files were password protected with intel123 is concerning but does often happen in the wild. According to the statement this all came from a file share designed for intels partners which was under NDA.
Anonymous hacker promises more to come soon, too
😂 1
Avatar
any SQL wizards around?
1:30 AM
could use a hand understanding some stuff if so
Avatar
any SQL wizards around?
@Sudo I know some SQL. I spent alot of time with SQL server and MySQL - currently dabbling with postgres
Avatar
I think I actually figured it out in the end
4:39 AM
though I might bug you if I get stuck again !
Avatar
oh nice!
Avatar
DO-HostileIntent 8/7/2020 6:33 AM
Hello friends. I'm taking my first GIAC exam "remotely proctored" this Tuesday. Is there anything in particular I should keep in mind when it comes to setup? My Internet is pretty solid and I've got a place in the house where nobody will be buggin', but I'd appreciate a heads-up on anything out of the ordinary you encountered. Thank you.
Avatar
Andrew Rathbun 8/7/2020 6:35 AM
@DO-HostileIntent https://dfirdiva.com/gcfe-exam is a new blog post by @DFIRDiva that explains a bit what that's like
👍🏻 1
Avatar
DO-HostileIntent 8/7/2020 6:50 AM
@DO-HostileIntent https://dfirdiva.com/gcfe-exam is a new blog post by @DFIRDiva that explains a bit what that's like
@Andrew Rathbun Thank you. I appreciate your assistance.
Avatar
anyone from @Cellebrite still around to talk about a samsung FBE issue I'm having?
Avatar
hey fraser
12:46 PM
give me a call on my cell
Avatar
chrisforensic 8/8/2020 4:29 AM
hello all... just a fast question... is here anybody who has a compiled version of "Andriller" V3.4.0 ? https://github.com/den4uk/andriller/releases (edited)
4:31 AM
as python is not my language 😉 help would be nice 🙂
Avatar
what would the best msc for digital forensics be? I am considering champlain, but interested for others opinions as well
9:11 AM
UCD Dublin MSc Forensic Computing & Cybercrime Investigation
Avatar
Andrew Rathbun 8/8/2020 9:29 AM
@november Champlain is very highly regarded. You could also consider SANS or a local college. Suppose it depends on your location/appetite for taking on more expensive tuition
Avatar
@Beardy_Dude problem is it is a law enforcement only programme :(
Avatar
Anyone here that can gift me in charity PREMIUM access to cbt nuggets, alphaprep learning resources such as practice questions and access to virtual labs for CCNA and MCSA pls contact me as i wish to learn new skills but no financial support.
1:23 AM
advice!
1:24 AM
advice me pls completed module on udemy as premium access is affordable
Avatar
Hello guys. Any suggestions where to study Splunk enterprise security for free? Hehe done with their free fundamentals 1
Avatar
Andrew Rathbun 8/9/2020 4:26 AM
@DFIRDelbs I would say #off-duty would be preferred for this
4:26 AM
@IsaCrypt @Dracula #training-education-employment is probably the more appropriate place for these questions for future reference
Avatar
Copy. Thank you!
Avatar
I have just started testing to see how old mobile software and apps work in Win7, Win8.1 and Win10 to see if there is any value left in them. I ran N-Monitor test this morning and firstly it does function. Needs COM Port or USB Virtual COM Port to work.
4:40 AM
I know its old school but still fun.
Avatar
@Andrew Rathbun no probs. Thanks
Avatar
Anyone from OpenText here?
Avatar
Andrew Rathbun 8/9/2020 12:42 PM
@OpenText
12:43 PM
There are 5 members here but not sure how active they are
Avatar
https://arstechnica.com/information-technology/2020/08/snapdragon-chip-flaws-put-1-billion-android-phones-at-risk-of-data-theft/ - This might cause me to have to upgrade device depending on the details.. LG unfortunately are very lacking in security updates
There’s no word on when Google and phone makers will incorporate fix from Qualcomm.
Avatar
what would the best msc for digital forensics be? I am considering champlain, but interested for others opinions as well
@november I'm currently in the grad program at Champlain, so far so good on the first class
Avatar
@stark4n6 how much in depth do you think the courses go? Also do future modules cover any ics related topics?
Avatar
Hi! Is anyone in this community from Hungary? Or knows Hungarian law well? Thanks!
Avatar
Andrew Rathbun 8/10/2020 6:31 AM
We don't have anyone labeled Hungary LE in this server yet
Avatar
Yeah that is a shame, I did have a look to see whether anyone was listed there first. Basically, I found a post on the dark web, and the post talks about lots of very serious crimes this person wants to commit. I ended up tracing it back to the person's real identity and he happens to be in Hungary. So I just want to know whether something could be done based on those posts, or whether nothing would happen until direct evidence of the crimes being committed is there first etc. And if something can be done, who would be best to contact in Hungary who knows about dark web investigations.
Avatar
If you have fallen victim to cybercrime, click on one of the links below to be redirected to the reporting website of your country. Reporting mechanisms vary from one country to another. In Member States which do not have a dedicated online option in place, you are advised to ...
Avatar
kmacdonald1565 8/10/2020 6:54 AM
6:54 AM
what this server is trying to do (successfully, hopefully!) (edited)
💯 2
Avatar
Thanks @JMK , I did go through this and tried to get a location closest to his address, I was just worried that if I sent all of it to just a local police station there, that they may not have an understand of cyber investigations and the dark web so may not know what to do with it etc. I did try emailing anyway, but didn't get a response, I may try to email again just asking if they will take tips of this nature there.
Avatar
@stark4n6 how much in depth do you think the courses go? Also do future modules cover any ics related topics?
@november I'm only on the first class in the program and it's fairly basic, they go over how to use FTK Imager, Volatility, RegRipper but also focus on crafting methodologies for incident response
Avatar
forensicatrix 8/10/2020 8:37 AM
@november I finished that program a few months ago. Most of the core classes are (predictably) general-the introductory course and the operating system analysis ones in particular-but you do get some interesting tidbits here and there. The specialized courses go into a respectable amount of detail along with practicals, especially the electives-I highly recommend doing malware and encryption if you’re leaning towards the technical side of things. No ICS that I’ve heard of yet, but there is a module in operating systems that covers novel technologies so it might be briefly mentioned there. If you have any more questions, feel free to give me a shoutout or DM.
Avatar
Anyone of you who encountered the error "cannot connect to database" when trying to open a Nuix case and knows if there is any way to fix it? Usually not working with Nuix but someone messed up with a harddrive so I recovered the Nuix cases (~100). Tried to open a significant part of it and thats what I get for those cases that weren't overwritten. my colleague told me that he was encountering that message also sometimes after copying cases with robust copy methods and told me that nuix cases are super fragile.
Avatar
Hi all, i want to know if it's possible to find the date of creation of a video posted in whatsapp!
Avatar
Pretendigator 8/11/2020 4:39 AM
no exif info? @Madawass
Avatar
@osint are you in the US? You can report to your local FBI office and they should gather the evidence and transfer the crime to the appropriate team in Hungary
Avatar
@Madawass The availability of creation and modified date/time of WhatsApp videos depends on whether the video was captured within the app or was attached from the device’s gallery. Where it gets complicated is determining if the video was created within the app or not, especially when just looking at only the video file itself. To make a long story longer, it can be done and a tool named Medex is launching later this year to give new insights like these into video. There is a NW3C webinar next week that will provide additional info, given the time constraints it will not be a deep dive into time/date stamps but feel free to PM for more details. https://www.nw3c.org/webinars
NW3C offers a number of webinars on various law enforcement-related topics.
Avatar
Thank you @Brandon E
5:19 AM
@Pretendigator no exif info
Avatar
Andrew Rathbun 8/11/2020 8:41 AM
Introductions channel is gone but this just happened
8:41 AM
RathbunA just boosted the server 5 times! Digital Forensics has achieved Level 2! Today at 11:38 AM
8:41 AM
15 more boosts to go 🙂
Avatar
Digital Iota 8/11/2020 8:54 AM
Has anyone ever bypassed a WD My Passport password.
Avatar
@Cellebrite LG Stylo 6 with secure startup. CAS supported??
Avatar
Well RIP
1:39 PM
Someone did not take the security essentials course....
Avatar
Explains the spam I've been receiving ever since the summit ended...
Avatar
thats bad
Avatar
Anyone have or know where I can find the complete list of tools included in the SIFT workstation? The complete list does not appear to be on the sans sift homepage
Avatar
Hello, hope everyone is doing OK. I have a question around a file system extraction from an iPhone 5s with iOS 12.3. I found an artefact in the file system called DoNotDisturb.bundle. This is in relation to location data. Can anyone give me a brief explanation to what this means? It appears sporadically along a short time line. Within an hour. Thanks in advance
Avatar
CrashingStatic 8/12/2020 10:52 AM
@dfir_zach It looks like the SIFT documentation project has been completely replaced :( Try this: open a terminal and type apt list --installed this'll give you a list of all packages installed on the system. pip freeze should give you everything installed via python
10:53 AM
Is there a way to Enter-PSSession for a powershell started by a different process? Like if I have wmic start a powershell instance in the background on a remote computer and it attaches APIs to certain threads, is there a way for me to then remote into that exact powershell session to detach the APIs? If I start a new session, I can't interact with the APIs I've attached (as far as I can tell). (edited)
Avatar
Andrew Rathbun 8/12/2020 10:53 AM
@Ade S it may be better to ask in #mobile-forensic-decoding
Avatar
@Ade S it may be better to ask in #mobile-forensic-decoding
@Andrew Rathbun Thank you, I'll try that.
Avatar
Andrew Rathbun 8/12/2020 10:55 AM
It makes more sense for organization of the server and, frankly, some people only monitor specific channels and mute the rest, so you could be missing out on a crowd that could help
👍 1
Avatar
Nullable Truth 8/13/2020 12:50 AM
this is a test to see how Discord parses this message containing a user ID in a specific format. @Unknown
12:53 AM
and with my user ID (123926861418987521) @Nullable Truth
12:54 AM
huh clever
12:55 AM
So if an ID is used within the Discord client, and that ID is found within the current server it will automatically replace the text with a clickable link which is also shown in the JSON cache.
12:56 AM
but if the ID, even if it's of a valid user of Discord, is not in the current server, then the link is only colour formatted as a link.
Avatar
Morning all, could anyone let me know if the @Cellebrite and MSAB tools take advantage of a machines GPU? (edited)
Avatar
@Artea XRY can utilize the nVidia CUDA solution to enhance the speed of the image recognition decoder, outside of that we do not have any other GPU support currently
Avatar
I thought you added GPU support to Android lock code cracking? Not that that's very applicable these days anyway!
Avatar
@OllieD if you're able to extract all the keys it can still be usefull. On the other hand, scrypt doesn't scale well on GPU
👍 1
Avatar
Hi all. Does anyone have any experience with Digital Intelligence’s Viper FRED laptop? Looking for feedback on satisfaction, use cases, and build specs. DMs would be greatly appreciated.
Avatar
heatherDFIR 8/14/2020 6:53 AM
I have some openings for speakers on Life Has No Ctrl+Alt+Del. If you have an idea of a topic, a speaker or a case you want to share - let me know. Also, going to offer fundamental topics to cover things that most "assume" everyone knows. 🙂
👍 4
Andrew Rathbun pinned a message to this channel. 8/14/2020 7:02 AM
Avatar
Is anyone aware of some good remote dfir jobs available now. I'm a police officer looking to move into the private sector and wanting to work remotely
Avatar
CyberDEI our mission: to foster a safe and inclusive community for all individuals interested in cybersecurity and to create systematic changes in the way diversity and inclusion are approached in the industry.
👍 1
Avatar
cyberPanther 8/14/2020 9:59 AM
Hey, Is Forensic Lunch happening today with David Cowen?
Avatar
Andrew Rathbun 8/14/2020 10:16 AM
@cyberPanther yes it's live now
10:16 AM
#forensic-lunch just pushed the video
Avatar
Hello
Avatar
General CPU processing question. Has anyone had much issue with using PC's with AMD chips to process or for virtualization vs Intel chips? Looking to upgrade my home system and thought I remember back in the day older AMD processors had issue with VMs or running multithread tools like common forensic software.
Avatar
@muzictek personally I only run intel CPUs for my home PC I use i7/i9 setups unlocked for overclocking if neccessary and for my servers I run xeons.... Ive always found intel to perform better for virtualization and computational tasks..
9:53 AM
theres probably a video or forum out there debating the differences.. I just dont know those differences
Avatar
I've run into issues with Vmware Workstation running slow on my AMD desktop. The virtual machines lag and run slow making them unusable. I threw this over to the Vmware forums and it appears to be an issue with Ryzen processors sadly. (edited)
Avatar
@Smorgan yeah, that was my concern , too. For the most part I don't object to AMD, but was concerned about virtualization
Avatar
@Smorgan isn't that just VMWare related? I've seen plenty of Ryzen CPUs running VMs on KVM with no such issues.
10:01 AM
On top of that, Microsoft is sometimes enabling hyper-v on Windows machines that makes VMWare to just run poorly. Even the recent version that supports hyper-v as hypervisor isn't great. Some VMs i tested ran ok, while others (like virtualized MacOS) had huge performance problems with even moving windows inside, on Intel (2nd gen so quite old at this point) (edited)
Avatar
Does anybody have any insight or experience on using a VDI for a forensic lab? The examiners here all have multiple desktop towers and I was just thinking "What if?" we were to combine all the hardware and virtualize our forensic workstations. I love messing with type 1 hypervisors in my home lab.
Avatar
@Smorgan isn't that just VMWare related? I've seen plenty of Ryzen CPUs running VMs on KVM with no such issues.
@Arcain That is correct this is only Vmware related.
Avatar
@Smorgan any chance it's with VMWare on Windows with Hyper-V enabled? For example Hyper-V was installed and enabled automatically with Windows Sandbox (obviously, as it uses hyper-v). 1903 also enabled this for some users because of virtualization based security (i had this "problem" after update), https://techcommunity.microsoft.com/t5/virtualization/virtualization-based-security-enabled-by-default/ba-p/890167 (edited)
Virtualization-based Security (VBS) uses hardware virtualization features to create and isolate a secure region of memory from the normal operating system. Windows can use this "virtual secure mode" (VSM) to host a number of security solutions, providing them with greatly incr...
👍 1
Avatar
@Arcain I'll take a look here in a bit
Avatar
@Cole I’ve tried it a few times and never got it working well enough. Last time I tried a stand alone hypervisor but had issues with the graphics card. I love the idea though. Please let me know if you get a good setup.
Avatar
@Joe Schmoe I read a lot about issues with GPUs (specifically consumer ones). We all got brand new workstations so I doubt it would happen anytime soon. Maybe by the time we're ready to upgrade I can justify the solution and point to existing examples. I'll definitely play with it at home albeit at a much smaller scale.
Avatar
Hi, I have a file system extraction of a Samsung galaxy A10 which I have decoded in UFED PA. There are deleted contacts which are shown as duplicate entries in UFED, however I can't seem to figure out why they are shown as duplicates. Had anyone seen something similar to this, or have any explanation why this might be the case?
Avatar
I am a member of the CASE Community where we are building a public ontology for digital investigation. We are looking for a LEO to interview who has experience examining smart devices which may be the cause of auto accidents. If you have this experience and would support a 30 minute interview please send me an email to clhall@mitre.org https://caseontology.org @caseontology
Open Source Community for the Cyber-investigation Anaylsis Standard Expression (CASE) Ontology.
Avatar
@Law Enforcement [UK] @Government [UK] We are looking at getting new scene vans this financial year. Would anyone be willing to share internal photos of their van layouts. We are looking at Merc Vito / ford transit size vans. Storage racking along with work area. Please PM me. Thanks (edited)
Avatar
Bedfordshire Police have launched a new Cyber Van which will allow them to test electronic devices at the scene of crimes.
6:20 AM
There's a very brief look into Beds' DMI van
6:20 AM
They've brought it to conferences before so they're clearly proud of it - might be worth reaching out to them for info
Avatar
@Dfdan DM @ApC, he may be able to assist. He has a lovely ice cream van complete with green sleeves and such like.
😆 1
6:23 AM
I know some forces have used old Sprinter Neighbourhood Policing vans, stacks of space, genny in the back, room for 2 forensic machines, 5g mifi dongles, etc. (edited)
Avatar
We have sprinter DF vans, these smaller vans will be onmi purpose CSI / DF work vehicles. (edited)
Avatar
Smaller? Go Winnebago!
Avatar
🐊Ricky_GFJC 8/18/2020 6:30 AM
SIM card questions. Should you extract an Android phone received in a powered on unlocked state with the SIM in the phone or SIM out of Phone? Will it change the message status from unread to read? Can the phone possibly lock if you remove the SIM? Is turning Airplane mode on and Wifi/GPS off enough to isolate, while leaving SIM in the phone? Seems like the more I learn, the less I know.
Avatar
We’re getting a ‘cyber’/POLIT van. It’ll be a van with space to put stuff in we seize.
Avatar
Like a mobile property store? 🤣
😂 1
Avatar
I mean we’ll probably have lots of old property bags and used blue gloves in there so maybe
Avatar
@Zhaan speaks the truth! Its more of a neighbourhood policing van than a mr whippy mobile though!
Avatar
I still can't understand the desire to have a van 😄
6:42 AM
I'd rather be out of a house than in it for hours
Avatar
You ain’t seen @ApC van, disco ball, velvet chairs....
6:50 AM
Two words - blue oyster (Police Academy reference) (edited)
😆 1
Avatar
You ain’t seen @ApC van, disco ball, velvet chairs....
@Zhaan You forgot the rust
Avatar
Solid, trustworthy hash generator? For example- you have an Amcache entry with SHA-1, but don't have file and need to produce MD5 or SHA256 for blocking?
Avatar
Andrew Rathbun 8/18/2020 7:30 AM
Solid, trustworthy hash generator? For example- you have an Amcache entry with SHA-1, but don't have file and need to produce MD5 or SHA256 for blocking?
@melsoko I don't think you can effectively decode one hash algorithm and convert into another. The hash is based off the content of the file itself. https://community.spiceworks.com/topic/2211850-sha256-to-sha1-without-contents-of-a-file has some more answers
I have a file's sha256 hash, is there anyway I could convert the sha256 hash to base64 hash?? ** I do not have the contents of a file, I simply want to obtain the base64 hash of...
👍 1
7:30 AM
I do like the VirusTotal option. Try plugging the SHA-1 into VT and seeing if its a known file that has a known MD-5/SHA-256 (edited)
Avatar
It's not in VT, it's a Lockbit ransomware exe - threat hunting team did try that- no dice
Avatar
I’m looking into purchasing furious gold... if I buy the dongle from Teel Tech, do I still need the box or is there a separate download for the interface? (edited)
Avatar
Anybody have any hints on a GoPro Mico SD that went corrupt while a MacOs transferring files off ? its a 400 GB Sandisk
Avatar
@Lflores Been awhile since i've used furious gold but you purchase the dongle which should have a software license for several different "packs" for different phones. At one point you could not have all the packs on the dongle at one time and had to upload and delete them as you needed them.
Avatar
@DCSO that sounds like a nightmare!
Avatar
Sorry, just catching up on here. Regarding VMware and Hyper-V, you can run both simultaeously if running Win10 2004 and VMware Workstation 15.5+. There are caveats though. If running any Hyper-V process (sandbox, WSL 2, etc) your VM will only run in user mode. If your VMs have nested virtualization, you'll need to completely disable Hyper-V.
Avatar
@DCSO box, or dongle, it's still the same. No way to fit all activations at the same time. You can have the 4 or 5 most used, at least i seem to have it setup for me (edited)
1:52 PM
Problem starts once your support expires. There's like another year i think, and then you can swap activations only on "happy days" (Wednesday usually)
1:53 PM
@driflee yes, you can but i found performance being all over the place. I seem to be able run my anciend Windows 7 VM just fine, GUI, USB and so on, but Windows XP and MacOS VMs have huge performance problems even running just the GUI. Just installed 15.5.6 and still acts the same.
Avatar
@Lflores Just curious what you will use it for. I have a few flasherboxes but they are collecting dust.
Avatar
@Joe Schmoe I wanted to see how it was for unlocking LG phones.
Avatar
Anyone know what the latest version of Blacklight is?
Avatar
10.1 I believe it says on their website
👍 1
Avatar
Anyone know what the latest version of Blacklight is?
@3X3 v2020.1 is the one I'm using atm
👍 1
Avatar
@3X3 v2020.1 is the one I'm using atm
@Rob Thanks - Thought there would be a release from 2020 @abefroman Thanks
(edited)
Avatar
I'm not familiar with the difference between 10.1 and 2020.1
2:57 AM
But both are what's listed on the available downloads. (edited)
Avatar
@OllieD Thanks for that @OllieD we have seen this and have similar large vans. Just after ideas of smaller everyday use vehicles layouts.
Bedfordshire Police have launched a new Cyber Van which will allow them to test electronic devices at the scene of crimes.
Avatar
@Dfdan to be honest we should all be getting a juggernaut like Knight Rider, stop this messing around with silly little vans! Get more kit in it....(see what I did there?)
😆 2
Avatar
@Dfdan to be honest we should all be getting a juggernaut like Knight Rider, stop this messing around with silly little vans! Get more kit in it....(see what I did there?)
@Zhaan Add a portable Trevor too!? 😆
Avatar
@3X3 thats the spirit, lets get together and smash Dragon's Den...
3:33 AM
Dont know how we would get the lorry in the lift though
Avatar
@Zhaan Van probably get stolen where you are
Avatar
When Deborah sees us backing up the lorry into the room
🤣 3
3:35 AM
@Dfdan easy tiger, I'll have you know all their tattoos are spelt right and they love the hovercraft
Avatar
did someone say cyber trucks?
💯 2
Avatar
@gts BUY IT!!
3:36 AM
I went in it last year 😂
Avatar
did someone say cyber trucks?
@gts just like ours
Avatar
@gts and you came out? I would refuse to leave!
👍 1
Avatar
they wouldn't let me drive
Avatar
@ApC dont do it, dont compare your cyber truck....
3:38 AM
@gts by the time you rock up in that beauty, hard drives are in the river and memory cards are somewhere dark and smelly.
Avatar
yeah but you'd look cool af
👍 1
3:39 AM
stick some blue lights on it too....
Avatar
and a transformer bumper sticker
Avatar
Andrew Rathbun 8/19/2020 5:16 AM
I just published a new GIF-heavy guide for Eric Zimmerman's Timeline Explorer
5:16 AM
Table of Contents Page 1 – Introduction, Screenshots Page 2 – Why Use Timeline Explorer? Page 3 – Conclusion, Timeline Explorer-Related Blog Posts/Videos, Change Log Introduction Timeline Explorer is a free, feature-rich Excel replacement that’s catered specifically for digita...
👍🏻 1
Avatar
Eznehlunatik 8/19/2020 7:52 AM
Hello :). I have a question. Is it possible on linux to recover a file that has been overwritten in Ram or something?
Avatar
Hey has anyone heard of cribl? It sounds like it's trying to be a replacement for logstash
Avatar
🕵🏻cyber4n6pi 8/19/2020 1:49 PM
A Dutch security researcher has stumbled across nine data leak incidents involving medical records belonging to cca 200,000 patients, and possibly many more – all due to developer blunders on GitHub repositories. Jelle Ursem, an ethical hacker from the Netherlands... #dataleak...
1:49 PM
The funniest part is the reaction of some of the businesses...🙄
Avatar
AccessInvestigations 8/19/2020 6:26 PM
Good evening. I am a penn state student in my 6th semester that is needing an internship with a cybersecurity or digital forensics company to complete my degree in Cybersecurity and Risk Analysis. I am a 20+ law enforcment veteran and 20+ as a licensed PI. Does anyone have the need for such an intern? I dont need to be paid i need the hours and the honor to learn from someone more experienced in the field. I live in a rural area in Texas, thus remote would be best for me. Anyone have the need or could use an intern? GPA 3.73 overall. If so please PM me.
Avatar
Anyone here familiar with the new 0365 edisco interface? having issues with trying to get exports
Avatar
@Turb0Yoda has it changed? I know we use Security & Compliance > Ediscovery fairly often but not sure what version we have
Avatar
Just having issues pulling crap, even AXIOM is giving me issues
11:01 AM
Trying to Do a test run on our environment before talking with the client because they are, ofc, hesitant on giving us admin lol
Avatar
It's been 2 years since I touched this portal and it seems to have changed about 50 times in between
Avatar
I guess really depends on the configuration, I know our corporate one is a mess haha
Avatar
We have been seeing a lot of issues with O365 exports over the last few months. In several cases we contacted microsoft who also had issues with the exports. If the exports are large; trying breaking them up by limiting by date.
Avatar
randomaccess 8/21/2020 4:44 PM
Yeah we had issues with doing content searches in the last few weeks. Things taking a long time that shouldn't
4:45 PM
Not really sure of a way around it though. If MS doesn't want to improve the speed
Avatar
Microsoft doesn't even use they're own products for ediscovery most the time, they directly told us that 😂
Avatar
I’m looking for contact information /emergence procedure regarding Omegle.com. (Servers Child abuse case) Can anybody help?
Avatar
Andrew Rathbun 8/22/2020 5:33 AM
@mr.rookay have you checked Search.org?
👍 1
5:33 AM
This section is a work in progress. This part of the site will contain template boilerplate language to include on various forms of legal process. It is highly advised to check with your local prosecutor and mind your local laws when serving legal process. These templates are ...
Avatar
Hi! Quick question, by any chance anyone has had problems trying to download KAPE from the official site with Kroll? I've tried a few times but the page stays loading after I submit my info. I was wondering if someone else has experienced this or is there any other way to download KAPE? Thanks in advance for any info on this!
Avatar
Andrew Rathbun 8/22/2020 10:40 AM
Hi! Quick question, by any chance anyone has had problems trying to download KAPE from the official site with Kroll? I've tried a few times but the page stays loading after I submit my info. I was wondering if someone else has experienced this or is there any other way to download KAPE? Thanks in advance for any info on this!
@0x03 check your email for the download link
10:40 AM
if you have any further issues, let me know or email kape@kroll.com
Avatar
@Andrew Rathbun Sorry forgot to mention that it doesn't even send me a link to my email. I was just wondering if anyone else had this issue. Thanks for your reply! I will email them about it.
👍 1
Avatar
AkioTheMonster 8/22/2020 11:28 AM
@0x03 I got it down no problem
Avatar
@AkioTheMonster thanks for the input! I've even tried two different computers and it just stays going in circles right after I submit my info. Definitely it's an isolated issue.
Avatar
Andrew Rathbun 8/22/2020 12:23 PM
@AkioTheMonster thanks for the input! I've even tried two different computers and it just stays going in circles right after I submit my info. Definitely it's an isolated issue.
@0x03 do you have any browser extensions like ScriptBlock, UBlock, etc running? If so, try incognito window on the page with the form
Avatar
AkioTheMonster 8/22/2020 12:24 PM
@0x03 ahhh I see.... and if @Andrew Rathbun suggestion does not work, can send you a zip of the download
Avatar
@Andrew Rathbun I have pihole and that was it! I tried it from a VM and I was able to download it without any issues at all. @AkioTheMonster thank you so much for offering! I appreciate it. Thank you guys!
👍 2
Avatar
Andrew Rathbun 8/22/2020 12:28 PM
@0x03 awesome, if you have any questions about KAPE, don't hesitate to ask
Avatar
AkioTheMonster 8/22/2020 12:29 PM
@Andrew Rathbun I probably will hehe just getting into DFIR and just reading and learning about the tools and methods 🙂
Avatar
Andrew Rathbun 8/22/2020 12:30 PM
Good evening. I am a penn state student in my 6th semester that is needing an internship with a cybersecurity or digital forensics company to complete my degree in Cybersecurity and Risk Analysis. I am a 20+ law enforcment veteran and 20+ as a licensed PI. Does anyone have the need for such an intern? I dont need to be paid i need the hours and the honor to learn from someone more experienced in the field. I live in a rural area in Texas, thus remote would be best for me. Anyone have the need or could use an intern? GPA 3.73 overall. If so please PM me.
@AccessInvestigations Might want to ask in #training-education-employment. Also, do you have LinkedIn? If so, it's worth asking on there if anyone is looking and others can share your post. Same with Twitter.
Avatar
Cyb3rSn0rlax 8/22/2020 12:33 PM
Hello dear dfir community. For my first post here i wanna know what are your "go to"s windows events when you're asked to investigate a machine with default policy and retention periods/sizes? Mine are terminallocalsessions for remote access and systems logs like service installed 7045 (cobaltstrike). I am looking for tips and tricks in similar cases
Avatar
Andrew Rathbun 8/22/2020 12:34 PM
@Andrew Rathbun I probably will hehe just getting into DFIR and just reading and learning about the tools and methods 🙂
@AkioTheMonster I put together this guide recently. Maybe it'll help get you started - https://aboutdfir.com/toolsandartifacts/windows/ez-tools/kape/ Page 5 will have links to other videos, resources, blog posts, etc, relating to KAPE
Avatar
@Andrew Rathbun awesome, thanks! I've gone through the guide you put together in aboutdfir which is pretty good!
Avatar
AkioTheMonster 8/22/2020 12:36 PM
@Andrew Rathbun That is brilliant! Thanks so much!!! much appreciated 🙂 Will check it out immediately. In Norway, and from Norway, so happy to connect with locals here too 🙂
Avatar
Andrew Rathbun 8/22/2020 12:36 PM
Hello dear dfir community. For my first post here i wanna know what are your "go to"s windows events when you're asked to investigate a machine with default policy and retention periods/sizes? Mine are terminallocalsessions for remote access and systems logs like service installed 7045 (cobaltstrike). I am looking for tips and tricks in similar cases
@Cyb3rSn0rlax Whenever I examine an endpoint, I usually take the EVTXECmd output and do a pivot table to see all the earliest events for every event log. Obviously I don't care about all of them but I include that first event timestamp of the relevant/important event logs on my timeline for context of how far back those logs go.
👍 2
12:36 PM
That way it's one step to view earliest log entry for every log there is on that system.
👍 2
12:38 PM
so this is effectively what it looks like but this is just for that endpoint, mind you
💯 1
Avatar
Cyb3rSn0rlax 8/22/2020 12:39 PM
@Andrew Rathbun thank you for your response. Do you have preferable events to look for when the endpoint policy erased the relevant event. Because obviously some of them gives more context than others. I haven't test it yet but heard OAuth logs give context about documents phishing attempts.
Avatar
Andrew Rathbun 8/22/2020 12:40 PM
1102 is a log clear event
12:40 PM
if I understand what you're asking correctly
Avatar
Cyb3rSn0rlax 8/22/2020 12:41 PM
Yeah but not always triggered by a user.
👍 1
12:41 PM
Im not talking about anti-forensics
12:42 PM
Just when you're in a situation where events aren't there in general
12:42 PM
Some Attackers prefer rdp because it is high likely open
12:43 PM
But you won't find logon type 10 in security events because of retention
12:43 PM
So yoj might find something in the Terminal local sessions
12:43 PM
That kind of stuff
12:45 PM
I understand that dfir is all about digging
12:45 PM
But i would like some tips and tricks
12:45 PM
To help in such situations
Avatar
Does anyone have a schematic of a Samsung S9 G960F they would be willing to share?
Avatar
@Aneesh96
Avatar
@Arcain thanks!
Avatar
acoustic regard 8/24/2020 4:42 AM
anyone here worked with kuiper VM before, after runing the bash script it stops here
Avatar
Can you now navigate to that URL?
5:45 AM
Substitute localhost with machines actual IP or hostname I guess
Avatar
acoustic regard 8/24/2020 5:48 AM
i tried that, got nothing
5:48 AM
i can ping the ip so if its working i should access it
Avatar
Hi, currently working towards ISO 17025 accreditation on mobile devices. Are people creating their own data for the test devices(which devices are you using) or is there anywhere to download it? Thanks
Avatar
@phil_d0257 At my previous place we put our own data on our test devices and that was not an issue. We were told that the devices had to be a good sample set of what we were often getting submitted.
Avatar
@phil_d0257 yeah as Artea said we seed the phones ourselves with data. We have a couple of iPhones (newest an 8), Samsungs and a few Nokia burner types too.
Avatar
Pretendigator 8/25/2020 3:01 AM
@Law Enforcement [UK] is there anyone willing to share their windows mobile process with us? It's such a rare sight to see one in the wild but they turn up occasionally and I'm not happy with what we currently do...
Avatar
Is that to throw it through a shredder?
😂 6
🤣 1
3:02 AM
I very much agree with that process
Avatar
Pretendigator 8/25/2020 3:02 AM
I would go for the microwave 'we needed a Faraday immediately but it was accidentally turned on!'
Avatar
Usually used PA but I think axiom has good support for parsing Windows mobile artefacts if you've got one
Avatar
What OS version is it do you know?
Avatar
A few of them you can get EDL physicals from if you find the test points
Avatar
Been a long time since we've done much with Windows Mobiles, but Axiom was our recommendation too
Avatar
Pretendigator 8/25/2020 3:03 AM
Axiom for the extraction or more for parsing data from ISP/chipoff?
Avatar
Parsing
Avatar
Copy media form it, then manually examine unless you’re isp/chip off
Avatar
Pretendigator 8/25/2020 3:03 AM
Rgr
3:05 AM
For those going ISP/chipoff, are you carrying out a manual review prior to potentially losing everything?
Avatar
For an unlocked device, I'd advise a manual and logical where possible before conducting a chip off
👍 1
Avatar
@Pretendigator manual review first to establish what data is on the phone before deciding if its worthy of ISP or Chip Off. Locked phones going for advanced work will always depend on the severity of offence and how much evidence they already have
👍 1
3:14 AM
Funnily enough I had a request for advanced work on a Lumia yesterday. We haven't seen one in a couple of years.
😂 1
Avatar
Pretendigator 8/25/2020 3:18 AM
Thank you all for the responses, it sounds like we are doing similar things
Avatar
Funnily enough I had a request for advanced work on a Lumia yesterday. We haven't seen one in a couple of years.
@ApC Come visit us at the office, we've got dozens left over!
Avatar
CloudCuckooLand 8/25/2020 3:27 AM
Watch out for the later OS versions being encrypted. If you have a password and the phone isn't controlled by an MDM you can switch off the encryption in settings. Some use eMMC controller encryption (and decrypt instantly) others have to be left to decrypt themselves (wait an hour before doing ISP/EDL dump)
Avatar
does anyone know what (if any) the differentiation between the Apple media folders are? i.e. 100APPLE, 101APPLE
4:11 AM
so it's just sequential I guess, 1000 images per folder apparently?
Avatar
@Magnet Forensics, Hi, is there any way I can exclude the Keyword searches from the PDF report from Axiom? I only want one type of artifact in my report, and the keywords are not relevant for those.
Avatar
doesn't seem consistent though with this phone, so guess no
Avatar
so it's just sequential I guess, 1000 images per folder apparently?
@Sudo Broadly, but we've seen missing folders from that sequence before
4:12 AM
photos.sqlite is your goto source of info about what lives where
4:15 AM
it's not hugely important but curious, it seems just kind of arbitrary
Avatar
@OllieD do you know much about the hex of iPhone images
4:23 AM
from past experience when you look at strings for screenshotted images, they have the adobe exif, photoshop in the hex
4:24 AM
there's some others I have here that look like screenshots but don't have that, they do have a big string of hex (32 32 32 32 32 32) on each though
Avatar
I haven't looked in depth at what exif info is/isn't present between photos and screenshots
4:25 AM
I know that screenshots should be png
Avatar
cool, thank
Avatar
But I'm afraid it's not something I've really looked into beyond that
Avatar
no probs
4:26 AM
I'm fairly confident on it
4:26 AM
just if you had done any more diving 😄
Avatar
I'd be looking at photos.sqlite to try and find any possible attribution info
Avatar
@Magnet Forensics, Hi, is there any way I can exclude the Keyword searches from the PDF report from Axiom? I only want one type of artifact in my report, and the keywords are not relevant for those.
@dotmatrix yes, that’s coming in our next release.
👍 1
Avatar
@ApC Come visit us at the office, we've got dozens left over!
@OllieD I think another visit to the office is needed soon (when allowed). I will take a look at the courses. 😆 Just to see a Lumia
Avatar
@dotmatrix yes, that’s coming in our next release.
@MF-cbryant Any word on how soon we can expect that? 🙂
Avatar
@OllieD I think another visit to the office is needed soon (when allowed). I will take a look at the courses. 😆 Just to see a Lumia
@ApC Get yourself on Mobile Device Repair if you haven't already, it'll be right up your street if you enjoyed chip-off/emmc when you did those!
Avatar
I am looking into using AWS for some offsite backup of old case data. I would like to encrypt the data that I will be sending to AWS. What does everybody use/recommend for file/folder level encryption?
Avatar
I am looking into using AWS for some offsite backup of old case data. I would like to encrypt the data that I will be sending to AWS. What does everybody use/recommend for file/folder level encryption?
@goalguy Is this to protect the data during transit? Or for it to be encrypted at rest in AWS as well?
8:50 AM
Or both?
Avatar
@OllieD both
Avatar
Andrew Rathbun 8/25/2020 9:30 AM
@BLu3f0<x> thank you for the boosts! 10 more to go for 30
💯 1
9:33 AM
Thank you @chrisforensic and @JonasWanobi
👍 2
Avatar
@dotmatrix came out yesterday actually! Turns out I’m behind the curve now haha You can configure it in the report wizard and save that through in templates
Avatar
@MF-cbryant Awesome, thanks! 🙂
👍 1
Avatar
Any @Cellebrite about for a quick DM, I promise it's a real easy one !!
Avatar
anyone attempted analysis of the stopcovid app to notify if exposed? I was curious what the data stored on the phone looks like, even though its supposed to be randomized data not identifiable to anyone. Would be curious what others saw on their own device, and the possibility to gain atleast some metadata from the app to help answer things like device usage, possible location data etc. Seems the interesting bits I'm seeing from my android device are contained in a keys.zip file for each day, which contains a binary file with protobuf data in it. Only having the one device though with data, its tough to get an idea what this could possibly mean. Just wondering if anyone has done any work on this app yet? Google does have some documentation about the app on their developer website.
Avatar
Andrew Rathbun 8/26/2020 10:15 AM
thank you @Atom for the server boost!
Avatar
@fraser I did take look at our local covid app with my rooted phone and it doesn't seem to have any kind of database itself.. I think some parts of the information is stored in the gms app but didn't dig much deeper into it (edited)
Avatar
@B interesting. I wonder if there are different types of apps out there depending on the area. Within the app folder itself, did you see daily ZIP files made?
Avatar
Nope, did not check for it tbh only checked for databases with sqlite browser (edited)
12:58 PM
Should be different type of apps all making use of that exposure api
Avatar
No problem @Andrew Rathbun just passing it on. Someone boosted mine so I had an extra to move somewhere and this server I think has unique value.
💯 3
1:41 PM
I'll continue to do so if I have extra boats laying around.
Avatar
Andrew Rathbun 8/26/2020 1:43 PM
Well thank you. We have 9 more to go until we reach level 30. Would love to get that vanity URL
Avatar
Quick suggestion. I was looking for # general and this is under the DFIR category. Although not exactly administrative i think it would be more accessible and intuitive under adminstrative category or just at the top. Just a suhgestion. I'm waiting to have time to go through the DFIR channels and learn a ton... That didn't help with this, as a lot o channels are highlighted still for me and categories still show unread channels even if collapsed.. Also I agree Vanity URL helps but how did a persistent invite link workvia DFIR websute (how I joined). I assume it's an embedded widget? ( @Andrew Rathbun )
Avatar
Andrew Rathbun 8/26/2020 2:58 PM
You can make permanent invite links very easily. Just set them to not expire
2:58 PM
Adminstrative is meant to be read only for members
👍 1
Avatar
That makes sense. Thanks for explanation.
Avatar
Not sure if this issue has been covered before but we are revisiting the possibility to remotely VPN into our forensic computers for times that we are on lock down (Covid19) has anybody tackled this idea lately ? I'm not super pumped about putting our boxes on the network but understand times has changed. Things that concern me are ongoing criminal cases, cases that contain CP that could be hacked or leaked. DM if you wish, thank you in advance.
Avatar
kmacdonald1565 8/27/2020 8:13 AM
we didnt do it. we have a separate network for our forensic stuff, but we still didnt vpn to it. just did one worker in at a time sort of thing, you know when feasible. we were still assigned to come in every once and a while. then we went to half days 2 shifts. then we are going to back full time next week.
8:14 AM
I occasionally used teamviewer for my office computer (different computer). not forensic ones.
Avatar
@kmacdonald1565 Teamviewer would be nice to use again not totally on board with our forensic boxes. Something more corporate might be Cisco Anyconnect where a verification token would be needed to connect to it.
Avatar
kmacdonald1565 8/27/2020 8:21 AM
yeah, i looked into a homebrew type solution at one point, but really we didnt need it so i didnt pursue it. hell, it can be done using openvpn or wireguard and a raspberry pi if you needed to. just that verification token is probably not an easy option for a cheap solution. I can tell you we have about no chance of getting a corporate solution for the forensic machines.....MAYBE for the office moving forward, but not for the forensic network...just no money in the budget
Avatar
Would anyone have experience with regards to how to deal with Apple to gain access to a deceased persons iCloud account? Have a matter at the moment in which I’ve got a MacBook and iPad and family members would like me to try to recover images etc from the devices, not having a huge amount of luck (only trying the MacBook initially), have images with Macquistion but the image is still encrypted (it’s a 2016 MacBook Pro, from my research might have a T1 chip) with APFS. My next considered option was gain access to iCloud account and identify if there is any iCloud backups available and then use elcomsoft or similar to collect. Would appreciate any advice/guidance if anyone has dealt with similar
Avatar
You could always try to find the password through some archive like dehashed. Otherwise Apple almost certainly has a set process for this. Might be opt-in for the deceased but it has to exist.
👍 1
6:42 AM
This article explains how to request access to a customer's accounts and devices after they have passed away.
Avatar
kmacdonald1565 8/28/2020 8:52 AM
Anyone have a good forensic card reader they can recommend and more importantly where to buy it? I think mine took a dump (its old anyway), had to hold an SD card in place...I saw the digital intelligence one and the EX-S3C. Probably end up with the DI but was looking for general input.
Avatar
I’ve got a few of the DI readers, not a fan of the stiff stow-away style cable but otherwise it works just fine.
10:52 AM
👍 1
Avatar
@whee30 Are these writeblocked?
Avatar
There is a switch to do both
12:08 PM
If you zoom in it’s at the far right side. Tiny switch
Avatar
I’ve got a few of the DI readers, not a fan of the stiff stow-away style cable but otherwise it works just fine.
@whee30 we have those too. Works great and yeah I agree with the cable. And the ro/rw switch is kinda hard to switch to the desired position
Avatar
Andrew Rathbun 8/29/2020 11:01 AM
@igrindstaff thank you so much for the double boost!
👍 1
Avatar
igrindstaff 8/29/2020 11:03 AM
@igrindstaff thank you so much for the double boost!
@Andrew Rathbun No Problem. Love this community and what it stands for.
Avatar
Andrew Rathbun 8/29/2020 11:07 AM
I just paid a prorated amount for 7 boosts to get us to 30. The next billing cycle is end of October. Currently, I'm paying for 14 boosts right now. That's like $500+ USD that I'll be charged in a few months when it expires. I would really appreciate if some of those could be replaced by others as they're able to do so!
11:07 AM
However, one thing to note, is that recently I applied for Discord Partnership so hopefully we are accepted into that which would then allow us to keep https://discord.gg/digitalforensics beyond October!
Invite to join a server
Avatar
Andrew Rathbun 8/30/2020 1:07 PM
@Alex Harmon thank you for the boost!
Avatar
Alex Harmon 8/30/2020 1:40 PM
My pleasure. This has been a great server so far and I'm looking forward to spending a lot more time here.
💯 1
Avatar
Andrew Rathbun 8/30/2020 1:52 PM
This server is nothing without the community so pat yourselves on the back
Avatar
Anyone know of a tool or method for reflecting a DoS attack back at a particular IP? Just...theoretically
5:07 PM
The IP of a system DoSing an Internet-facing server at $Dayjob
5:08 PM
This is just theoretical.. No bad guys' servers will be harmed by responding. I just wonder if there is a tool or script or method.
5:14 PM
Or depending on the type of attack traffic, maybe a tarpit if that would work. Any good tarpit tools?
Avatar
DeeFIR 🇦🇺 8/31/2020 1:17 AM
@neonforest are you trying to mitigate against the attack/drop the traffic without responding, or are you actually trying to return the attack? I'm sure you're aware of how amplification attacks work, but be careful if you're returning fire against potential victims
Avatar
Anyone know what app this is? From Apple.
Avatar
Andrew Rathbun 8/31/2020 3:08 PM
BothLive is a high-quality international live and video chat platform. Help you communicate with the world and provide you with live video of exotic features. Every user can become a social butterfly, share their life together, and let the world bloom before your eyes. 【Main ...
3:08 PM
3:09 PM
The key to getting this result was reverse Google image searching only the "bo" part of the logo. If there was any whitespace like with the curved edges, I wasn't getting any hits. So note to self for future reverse Google image searching efforts
👍 1
3:09 PM
‎BothLive is an international live broadcasting platform, where more interesting and interesting live broadcasting can be found. Help you communicate with the world and provide you with live video of exotic features. Every user can become a social butterfly, share their life t...
Avatar
Thanks man!
👍 1
Avatar
I ❤️ @Arsenal Recon . I just got my budget in to buy the software last week and I've used it a ton already. I was sold on the super easy ability to VM an aquisition... now to learn what else it does
👍 1
Avatar
@whee30 That's great to hear! Check out our last few Insights articles (https://ArsenalRecon.com/insights/) related to Arsenal Image Mounter for ideas on things to try.
Avatar
I just paid a prorated amount for 7 boosts to get us to 30. The next billing cycle is end of October. Currently, I'm paying for 14 boosts right now. That's like $500+ USD that I'll be charged in a few months when it expires. I would really appreciate if some of those could be replaced by others as they're able to do so!
@Andrew Rathbun you should create a donation page. 😉 this place has helped many in the past. Including me ...
💯 4
Avatar
Hello! I am a DF Student first year, I chose the Smartphone forensics topic to wrigte an article about, I hav already found a good bit of articles but I am still missing some about the general challenges about Smartphone forensics, most of them that I have found is about mobile devices in general like tablets and smartwatches and cloud forensics. If any of you have tips to articles that I could read to understand the topic better I would love it ! You can send it to me in Private if you want, I understand you guys are bussy so only if you have time :)!
Avatar
Andrew Rathbun 9/1/2020 3:42 AM
@Bomba https://aboutdfir.com/toolsandartifacts/android/ and https://aboutdfir.com/toolsandartifacts/ios/ are compilations of blog posts for iOS and Android, respectively. I'm sure there's something you can work with somewhere in here
3:43 AM
thank you @Bread Michaels for the server boost!
Avatar
@Andrew Rathbun Thank you ! I really appriciate it !
Avatar
Andrew Rathbun 9/1/2020 3:53 AM
@Andrew Rathbun you should create a donation page. 😉 this place has helped many in the past. Including me ...
@CLB-Paul I'll consider this. I'm waiting word on if we are selected by Discord to be a partner server. If that doesn't pan out, I'll consider donations since I get a 30% discount on server boosts whereas someone contributing a server boost on their own wouldn't have that discount until they've already purchased. We will see!
Avatar
I’m pretty new to Discord, what do you mean boost?
Avatar
Ty, will look into this (edited)
8:56 AM
Okay give me an hour or so to boost
Avatar
DefendingChamp 9/1/2020 9:13 AM
@kmacdonald1565 I'm previous a sysadmin. Try to use a system that forces you to use MFA
9:16 AM
Just make sure it doesn't use RDP protocol. Cellebrite does not work with RDP. lol
Avatar
kmacdonald1565 9/1/2020 9:17 AM
@DefendingChamp i am missing something, i forget what you might be replying to lol
9:17 AM
oh the vpn/rdp sort of stuff
9:18 AM
2fa would be mandatory one would think. @DCSO was the one asking
Avatar
DefendingChamp 9/1/2020 9:19 AM
ops! I mentioned the wrong person lol
Avatar
@DefendingChamp @kmacdonald1565 @Cellebrite thanks for the input, I thought Cellebrite recently turned RDP back on for Covid working remotely ? That would be half our work load 🙂
Avatar
@DCSO its possible, but specail provisions need to be activated in the licencing model. If you need this feature, you can reach out to our support team 🙂 (edited)
👍 2
Avatar
DefendingChamp 9/1/2020 10:28 AM
0@DCSO Yeah I don't think it's on be default lol
Avatar
Andrew Rathbun 9/1/2020 10:50 AM
Okay give me an hour or so to boost
@lmfml Thank you for the boost!
🤘 1
Avatar
S9 with a Knox secure folder, we have the swipe to get into it. Looking for thoughts on how to transfer it out other than manually ? Qualcomm Live work ? @Cellebrite (edited)
Avatar
@Andrew Rathbun - Regarding "boosts", the topped out level is 30 to keep all the perks right? And boosts are a monthly bill not a one-time fee? So to maintain the server at full "perks" it costs roughly $150/month? Any benefit to having over the 30?
Avatar
Andrew Rathbun 9/1/2020 12:49 PM
@Andrew Rathbun - Regarding "boosts", the topped out level is 30 to keep all the perks right? And boosts are a monthly bill not a one-time fee? So to maintain the server at full "perks" it costs roughly $150/month? Any benefit to having over the 30?
@whee30 No benefit over 30 at this time. Frankly, as more boosts are coming in, I am canceling one by one one of my 14 active boosts until that number gets to a more financially reasonable level lol
12:49 PM
To have boosts to give yourself as a user there are perks for paying for those boosts/perks, so some people want those added perks in Discord
12:50 PM
So if someone does pay for the extra Discord perks of Discord Nitro, if they allocate those two boosts to this server then that's pretty awesome of them 👍
12:50 PM
Like I said though, I am hoping we are accepted as a Discord partner and we will have the Level 3 perks permanently but that's entirely up to Discord to decide. Fingers crossed
12:51 PM
I won't know the answer to that until I know 🤷‍♂️
Avatar
@Andrew Rathbun is there any way we can advocate for the permanent Level 3 as users ?
Avatar
Andrew Rathbun 9/1/2020 12:58 PM
@Andrew Rathbun is there any way we can advocate for the permanent Level 3 as users ?
@DCSO I have no clue, honestly. I submitted the application and hopefully they deem the server good enough for the cause. If we don't get accepted, not end of the world, we'll just have to maintain Level 3 on our own
👍 1
12:59 PM
But I'm not going to really consider one path over another until we know about the disposition of the Discord Partnership application
Avatar
pathsofglory 9/1/2020 3:32 PM
Has anyone ever had an issue where an M2 NVME drive isn’t detected as a source by any forensic tools?
3:32 PM
It’s almost certainly encrypted, but I’ve imaged plenty of encrypted drives in the past with these tools: a TX1 and Logicube Falcon in this instance
Avatar
Hi everyone. I have an e-mail that was located on a Windows 10 computer in the User\AppData\local\Comms\Volatile directory. The email has a .tmp extension. Does anyone have any documentation / knowledge of how the e-mail would be there. I suspect it's a temp e-mail thats been cached before being sent.
Avatar
Andrew Rathbun 9/1/2020 4:05 PM
It’s almost certainly encrypted, but I’ve imaged plenty of encrypted drives in the past with these tools: a TX1 and Logicube Falcon in this instance
@pathsofglory do you have the correct adapter? There's different keys for M.2 devices.
4:07 PM
Hi everyone. I have an e-mail that was located on a Windows 10 computer in the User\AppData\local\Comms\Volatile directory. The email has a .tmp extension. Does anyone have any documentation / knowledge of how the e-mail would be there. I suspect it's a temp e-mail thats been cached before being sent.
@prod2005 what's the nature of the case? I've seen malicious .tmp files as a result of malware making it's way on to a system via email phishing
Avatar
@prod2005 what's the nature of the case? I've seen malicious .tmp files as a result of malware making it's way on to a system via email phishing
@Andrew Rathbun Nothing malicious suspected about the case (not malware phisihing etc) . The content of the e-mail is relevant as being sent. just wondering how it ended up where it did.
Avatar
Andrew Rathbun 9/1/2020 4:18 PM
Any idea what email client was used, if any? Is that email you have encrypted?
4:19 PM
The unravelling of forensic artefacts created by the Windows 10 Mail application.
👍 1
4:19 PM
Maybe Windows mail app?
Avatar
The email is not encrypted and the client was the windows 10 app. Thanks for the link. Looking now but no mention of the volatile directory
Avatar
pathsofglory 9/1/2020 4:27 PM
It was the correct interface but I found the issue. It has to be adapted through a sata adapter to be read, as that is the only bus on the drive.
4:28 PM
It’s m.2 but it is NOT PCIe, I’ve seen them for sale but had not ran into one in the wild
Avatar
SPVQct3207 9/1/2020 5:31 PM
@pathsofglory I have the same problem today with a lenovo p52s. the M2 NVME drive isn’t detected event withTableau PCIe Adapter Bundle (TKDA7-3PC-BNDL) plug in my Talino. What kind of Tableau did you use or another writeblock ? I also boot with Paladin Sumuri in forensic mode, detected M2 but only show 0 byte (but it's a 512 Go)... (edited)
Avatar
pathsofglory 9/1/2020 6:08 PM
You can’t use a PCIe based adapter, you have to use an M.2 to SATA adapter
6:09 PM
6:09 PM
@SPVQct3207
6:10 PM
The SSD in my case wasn’t able to address PCIe so I had to find a SATA based work around
Avatar
SPVQct3207 9/1/2020 6:18 PM
@pathsofglory ok thanks!
Avatar
I've had cases where that adapter didn't work but this one did (https://shop.avatu.co.uk/shop-by-brand/tableau-products/tableau-tkda7-5-pc-bundle) - Assuming you have Tableau as an option.
1:42 AM
Since the above can't be used on its own
Avatar
SPVQct3207 9/2/2020 8:41 AM
@Rob thanks but i have the tkda7-3-pc bundle and doesnt work. I will look to the smal adapter from amazon even if IT depart doesnt like to buy to amazon...;)
👍 1
Avatar
Has anyone used the latest version of Elcomsoft to collection iCloud backup ?Does it work ?
Avatar
Andrew Rathbun 9/2/2020 9:24 AM
FYI I created an AboutDFIR page on LinkedIn where posts, pages, etc will be pushed to as well as Twitter and here, for those who want to connect on LinkedIn - https://www.linkedin.com/company/aboutdfir
👍 6
Avatar
Can I ask you a quick phone recovery question? What’s the best method in pulling a phone out of saltwater for data recovery? Do we keep it in a bag of salt water do I put in freshwater? Or do we just pull it out and dry it off. It’s on a homicide and it’s been in the ocean for about a week
1:22 PM
It’s on a homicide of a pregnant female and the divers are
1:22 PM
Currently in the water
Avatar
Andrew Rathbun 9/2/2020 1:24 PM
Oof, I can't imagine salt water is kind to the internals of a cell phone. What kind of phone is it?
1:30 PM
@Cellebrite for visibility
Avatar
We chatted in DM about this. I’ll let other experts in this weigh in on it.
👍 1
Avatar
@pcsdcell I would suggest you reach out to VTO Labs https://www.vtolabs.com/ they have done extensive research with water damaged devices and data recovery. If it is urgent I can DM you someone’s cell #.
Up-to-date news, information and videos from VTO Labs. VTO Labs is a technology practice focused on cybersecurity, digital forensics and litigation support.
👍 1
Avatar
@pcsdcell I would suggest you reach out to VTO Labs https://www.vtolabs.com/ they have done extensive research with water damaged devices and data recovery. If it is urgent I can DM you someone’s cell #.
@Brandon E Yes a DM would be great we have divers in the water right now. I’m having them pull it in a tube with the original seawater
Up-to-date news, information and videos from VTO Labs. VTO Labs is a technology practice focused on cybersecurity, digital forensics and litigation support.
Avatar
@Brandon E Yes a DM would be great we have divers in the water right now. I’m having them pull it in a tube with the original seawater
@pcsdcell Thank you to everyone who reached out to me I got a hold of a couple of different companies that are going to help us out if it turns out to be the victims phone.
Avatar
can someone explain port fowarding to me like im five?
4:40 PM
lol
Avatar
@aesfb Basically port forwarding is like putting a foward on your mail correspondance. Instead of the mail (data packets) going to your old address (intended ip/port) it's instead redirected by the post office (a program on a host or a hardware like a router/proxy/firewall) to your new address (redirected ip/port). Lol hope this helps. https://whatismyipaddress.com/port-forwarding This link further expands on that and provides an example that is very simplified in order to grasp what port forwarding does and how it works! (edited)
Port forwarding is the process of intercepting traffic bound for a certain IP/port combination and redirecting to a different IP and/or port.
Avatar
can someone explain port fowarding to me like im five?
@aesfb For future reference, I actually find /r/explainlikeimfive a useful resource! No shame in wanting to start with a simple explanation: https://www.reddit.com/r/explainlikeimfive/comments/2onddo/eli5_what_exactly_does_port_forwarding_do/
Avatar
I can explain it to you like I'm 5
😂 4
Avatar
@Sudo Ooo goody, pictures!
Avatar
Andrew Rathbun 9/3/2020 7:04 AM
Thanks for the boost @0x03!
Avatar
Thanks for the boost @0x03!
@Andrew Rathbun Yes, of course! I'm relatively new to the community and so far, is great what has been stablished here! Anything to help sustain it! Happy to see a place where we all come together and help each other out and socialize as well. And also, thanks again for the aboutDFIR sticker that I will get soon in the mail 😀
💯 1
Avatar
Andrew Rathbun 9/3/2020 9:42 AM
@Andrew Rathbun Yes, of course! I'm relatively new to the community and so far, is great what has been stablished here! Anything to help sustain it! Happy to see a place where we all come together and help each other out and socialize as well. And also, thanks again for the aboutDFIR sticker that I will get soon in the mail 😀
@0x03 if you are MT then it will go out in the mail today 👍
Avatar
@Andrew Rathbun awesome!! 😄
Avatar
Morning all, one of our computer analysts has run a keyword search list and has hits for "SDPA". This is at the start of a few IIOC movies etc. Could anyone shed some light on what this stands for?
Avatar
I'd be interested in the outcome of this @Artea - and whatever else you have on your keyword list too
Avatar
Morning all, one of our computer analysts has run a keyword search list and has hits for "SDPA". This is at the start of a few IIOC movies etc. Could anyone shed some light on what this stands for?
@Artea As a file signature?
Avatar
Likewise, not something I've come across and I have quite a hefty keyword list
Avatar
@OllieD just in the title of the file.
👍 1
Avatar
I'll ask our POLIT team for you
👍 1
Avatar
@Rob cheers. Ours didn't know anything about it.
Avatar
Does anyone have any experience of analysing artefacts relating to the use of QTox? If so a DM would be greatly appreciated.
Avatar
@jrmcg. https://bebinary4n6.blogspot.com/2019/10/analysis-of-qtox-for-linux-and-windows.html (Never anaylsed it myself but try that.) (edited)
This is my blog about topics in the field of digital forensics.
Avatar
Andrew Rathbun 9/4/2020 6:46 AM
Thank you for the boost @Artea
Avatar
Thank you for the boost @Artea
@Andrew Rathbun More than welcome
6:52 AM
Update with the SDPA question from earlier, i have been told it relates to Spain and means 'sexo de pre-adolescente' @gts @OllieD @Rob
👍 4
Avatar
thanks @Artea
👍 1
Avatar
Thanks for the update!
👍 1
Avatar
if anyone has a hitlist of keywords they search for for that kind of material could they dm me (or i can give a pnn address)? i do on site triage of devices before DFU get them, so anything like that would be super useful to know (edited)
6:55 AM
I don't get the benefit of running through stuff in slow time, so anything to speed work up... 😄
Avatar
What usb external drives are you all using for transferring images, storing images, etc. Looking to purchase a few that are reliable, have at least 2tb space, have fast read/write speeds, and provide encryption. Mainly looking for spinning disks rather than SSD because of price. Thanks!
Avatar
I don't use anything special, just get Seagate Expansion Drives or Western Digital slim externals
7:02 AM
I would urge you to stick with WD or Seagate only because they've been around for awhile and have a good track record. If you buy some off brand drives from Amazon, there may not be quality drives in the enclosure
Avatar
Andrew Rathbun 9/4/2020 7:05 AM
if anyone has a hitlist of keywords they search for for that kind of material could they dm me (or i can give a pnn address)? i do on site triage of devices before DFU get them, so anything like that would be super useful to know
@gts https://www.dfir.training/dfir-resources/search-results?order=featured&dir=29&criteria=16&query=all&usematch=1&matchall=jr_keywordsearchlists&filter=1951&jr_keywordsearchlists=porn here's a list
👍 2
Avatar
@gts here's a list
@Andrew Rathbun excellent, thanks
7:07 AM
nice, literally within the first 20 records on there is a hit I got on a computer last week (edited)
Avatar
Andrew Rathbun 9/4/2020 7:07 AM
People are sick, but glad to hear the list is useful
Avatar
the filename piqued my interest in some of his recent history but I've not traced down the actual video yet, so to see that in the list confirms my suspicion
Avatar
@gts If you need any help with filenames etc. You have my email now so feel free to use me.
Avatar
Interestingly that earlier SDPA term is included on that keyword list, which is good
Avatar
theAtropos4n6 9/4/2020 8:39 AM
Hello everyone. Was thinking to start a humble blog. Nothing special. A couple of guides, research topics and tips for some forensics tools. But I am thinking a lot of the rule 3 of the server. Apart from GrayKey do we know which other tools are strict with NDA about their capabilities. The last think I want would be to get in trouble. Just trying to contribute a little bit. For example, does Axiom, X-WAYS, FTK, Cellebrite, Oxygen or any other share the same policy?
Avatar
As a very broad rule of thumb, I'd suggest that the stuff that vendors don't like having discussed tends to be LE only and you'd have signed an explicit NDA
Avatar
forensicmike @Magnet 9/4/2020 8:51 AM
@theAtropos4n6 (Speaking as an independent blogger) Absolute safest bet would be to reach out to whichever vendor before making your post public. (Speaking as a Magnet person) No NDA-like restrictions on our products. If you'd like someone from Magnet to proofread something, I'd be happy to do that for you.
👍 4
Avatar
Andrew Rathbun 9/4/2020 8:54 AM
@theAtropos4n6 whenever it gets up and running, let me know and we can make sure it hits AboutDFIR and @randomaccess's #this-week-in-4n6
😉 1
Avatar
randomaccess 9/4/2020 8:55 AM
It's already up
😝 1
8:55 AM
:P
Avatar
forensicmike @Magnet 9/4/2020 8:56 AM
lol
8:56 AM
😛 1
Avatar
randomaccess 9/4/2020 8:56 AM
I don't think there are any tools with NDAs that aren't the one that work like GK
Avatar
forensicmike @Magnet 9/4/2020 8:56 AM
^^^ candid shot of phill working on #this-week-in-4n6
Avatar
theAtropos4n6 9/4/2020 8:59 AM
@forensicmike @Magnet Yeah, that would probably be the safest way around it. That would be awesome. Thank you. Of course, Axiom has you guys uploading such a great content but why not some more tips. Yeap it is up, but I haven't posted anything relevant with any tool's capabilities. Thanks for ruining the surprise @randomaccess .haha. Also, thank you for the motivation to start it.Thank you @Andrew Rathbun . Feels a lot better to have you by myside (imposter syndrome is almost gone now)
Avatar
randomaccess 9/4/2020 9:01 AM
Lol. thank WordPress for emailing me :P
😎 1
Avatar
infosec_cat 9/4/2020 9:10 AM
Hi everyone! I am new to this but I hope I get along with everyone 😊 I am currently studying Mile2's digital forensics examiner course, I just want to know what are your thoughts about it. And also if the exam is hard 😅 (edited)
9:13 AM
Hi everyone! I am new to this but I hope I get along with everyone 😊 I am currently studying Mile2's digital forensics examiner course, I just want to know what are your thoughts about it. And also if the exam is hard 😅
@infosec_cat I would also like to know if there are any videos/tools you might suggest in performing forensics aside from the pre-installed tools on kali linux. Thanks
(edited)
Avatar
randomaccess 9/4/2020 9:14 AM
i dont know what tools are installed on Kali, but i would probably guess most DFIR folks dont use Kali for forensics
9:14 AM
Mostly point people to the 13Cubed videos, and Digital Forensic Survival Podcast
Avatar
Andrew Rathbun 9/4/2020 9:15 AM
Only thing I've ever used Kali for in forensics was guymager
💯 1
👍 1
Avatar
infosec_cat 9/4/2020 9:17 AM
i dont know what tools are installed on Kali, but i would probably guess most DFIR folks dont use Kali for forensics
@randomaccess I see. I have done research on tools used by DFIR folks and mostly they are referring to autopsy as one of the good tools installed on kali, though I don't know if it has any difference if you download it from their official website
9:18 AM
Mostly point people to the 13Cubed videos, and Digital Forensic Survival Podcast
@randomaccess I will look into this. Thanks for the big help 😁
9:19 AM
Only thing I've ever used Kali for in forensics was guymager
@Andrew Rathbun Haven't tried it, but thank you for this. I appreciate the suggestion
Avatar
Andrew Rathbun 9/4/2020 9:19 AM
@randomaccess I see. I have done research on tools used by DFIR folks and mostly they are referring to autopsy as one of the good tools installed on kali, though I don't know if it has any difference if you download it from their official website
@infosec_cat Autopsy can be installed on Windows, too FYI
Avatar
infosec_cat 9/4/2020 9:23 AM
@infosec_cat Autopsy can be installed on Windows, too FYI
@Andrew Rathbun that's good to know, I am not that much of an expert in Linux distros 🤣Btw, is the Mile2 CDFE exam hard? I have tried the exam simulator but most questions are not really tackled on the course (I guess I need to do more readings)
Avatar
Andrew Rathbun 9/4/2020 9:25 AM
@Andrew Rathbun that's good to know, I am not that much of an expert in Linux distros 🤣Btw, is the Mile2 CDFE exam hard? I have tried the exam simulator but most questions are not really tackled on the course (I guess I need to do more readings)
@infosec_cat I've never personally heard of Mile2 but maybe someone in #training-education-employment has?
Avatar
infosec_cat 9/4/2020 9:28 AM
@infosec_cat I've never personally heard of Mile2 but maybe someone in #training-education-employment has?
@Andrew Rathbun Sure! I appreciate all your suggestions. I'll check out the channel
Avatar
@Rob amazing thank you!
👍 1
Avatar
There is an alternative to Kali Linux for DFIR and that's SANS SIFT Workstation which has some good tools. Just load it up in a VM... https://digital-forensics.sans.org/community/downloads (edited)
Download the SANS SIFT Kit: a free VMware Appliance pre-configured with all the necessary tools to perform a detailed digital forensic examination.
Avatar
theAtropos4n6 9/5/2020 8:53 AM
Also, @infosec_cat FYI as far as linux are concerned, there are CAINE and TSURUGI distros as well.
Avatar
infosec_cat 9/5/2020 9:04 PM
Also, @infosec_cat FYI as far as linux are concerned, there are CAINE and TSURUGI distros as well.
@theAtropos4n6 I will look into it. Thanks!
Avatar
chrisforensic 9/6/2020 2:11 AM
congrats @CLB_iwhiffin for joining @Cellebrite as part of the R&D-team 👍 (edited)
💯 9
Avatar
CLB_iwhiffin 9/6/2020 6:13 AM
Thanks Chris!
Avatar
Sign up now and get an annual subscription for our premium Magazine for Free as a thank-you! (worth $129)
Avatar
Does anyone know much about stingrays or if there is even much information out there on them to begin with?
9:11 PM
I had to write a small paper on them and I honestly didn’t find much information at all
Avatar
DeeFIR 🇦🇺 9/9/2020 12:15 AM
Stingray is the brand, IMSI catcher is the technology.
Avatar
theAtropos4n6 9/9/2020 12:50 AM
@Tess To put it simply, the technology behind this works like a MITM attack. Cell phones by default try to find the antenna with the strongest signal (higher dB) and connect to them. A rogue antenna probes to nearby devices that it can serve calls for them. To achieve this, it increases its signal power in order to surpass the local carriers' antennas. All the devices send among other information, their IMSI (just as @DeeFIR 🇦🇺 said above) and can now be served by this antenna. The antenna however as being a rogue one, cannot serve as the rightful carrier's antenna, so it redirect traffic to the legit antennas, working as a MITM. The trick here is that this Rogue antenna, tries to downgrade the protocol of the call it serves to GSM (2G) (speaking of how these worked a couple of years back, not sure about their capabilities nowadays) OR tries to intercept the cyrpto keys of a higher protocol call during their transfer. This way, it can decrypt the packets of the call and eventually intercept the content of the call itself. I hope you get the idea of how this works. Of course, commercial products offer far more capabilities than what I mentioned, but the basic idea is that. Do not try to search for a particular product, as their exact capabalities are as they should, properly hidden from public sight. What you can do, is try to search for terms like "MITM on cellurar network" "rogue antennas" "security challenges on the SS7 or cellurar network". Hope these help you.
pepelove 4
Avatar
chrisforensic 9/9/2020 5:02 AM
true words.... exactly how it is 👍 greets from sunny austria to all of you ! (edited)
Avatar
by stuffies does he mean stuffed animals
6:38 AM
if so, I agree, my army of 20 pusheen plushes keeps me sane (let alone the other 10s of plushos I have)
Avatar
@theAtropos4n6 Thank you so much this helps a lot!
👍 3
Avatar
Not sure if this is the right channel to post this, but wasn't quite sure where to post. One of my friends started receiving texts with what appear to be a standard sextortion case. Person was sending texts through a few of those free texting sites with pictures of her, asking for money in order to prevent them from leaking., even joined her discord. She's obviously freaked out. Based on what I've gathered, sounds like a compromised iCloud account combined with OSINT. I suggested she do the common things: don't contact the person back, contact authorities, save messages, check online to see if her accounts are compromised, change passwords, make social media private, change number, etc. I was just wondering if I'm missing something else or if there are other recommendations i can give her to reduce some of her anxiety.
👍 1
Avatar
Looks good man. I would just change passwords on all accounts and implement 2 factor auth where necessary. Document everything to ensure nothing is missing and then carry on. I would also check to see if there is enough OSINT to put together PII data (identity theft). (edited)
👍 1
Avatar
ThatLukeGuy 9/10/2020 8:25 AM
Anyone aware of a reverse phone lookup service with an API? Trying to get my python script to do the work for me.
Avatar
Deleted User 9/10/2020 8:27 AM
@ThatLukeGuy I believe numverify has an API component, might just be for validation though, not sure how detailed it gets with reverse lookups but might be worth looking into
Avatar
@ThatLukeGuy You could try Pipl
Avatar
Twilio also has what you're looking for: https://www.twilio.com/lookup
Validate number format and look up provider & device type to reach verified users via voice & text. Free to use.
Avatar
chrisforensic 9/10/2020 9:42 PM
good morning from austria to @Cellebrite ... just wanna ask something concerning FB-messenger-attachments... I've mentioned it here a couple of times ... Would it be possible to build in an option that enables attachments from messenger-conversations to be downloaded (if still available/active online) ? This feature would be really important for some investigations... At the moment i have a file about a bulgarian girl-dealer, who made his contacts and negotiations through messenger...
👍 1
9:48 PM
He recruits girls for jobs in bars and cafes in europe countries, but they are violently turned into illegal prostitution 😒
😫 1
Avatar
MrMacca (Allan Mc) 9/11/2020 1:15 AM
Morning, has anyone had issues with Timeline explorer not loading in the CSV that has been output by KAPE and the MiniTimeline options? I keep getting the error 'invalid member name'. Tried to find the reason it's doing this but can't find a solution.
Avatar
Does anyone know if com.jrdcom.android.gallery3d is just the Alcatel version of com.android.gallery3d? I can't find the package name anywhere online...
Avatar
Looks like it
2:03 AM
Jrdcom is listed as one of the devs on the Alcatel Mobile sourceforge repos etc
Avatar
Ahh - thank you so much! Would you agree then if I have images in a jrdcom imgcache that it is likely the original images have been in the device gallery at some point?
Avatar
If it behaves like the stock gallery3d, yes
2:06 AM
However, being in the gallery =/= taken by the user
2:06 AM
Other images (perhaps received via messaging apps) can have thumbnails generated from them in that folder, depending on where the saved picture was originally
2:07 AM
So be careful with what conclusions you draw
Avatar
alright, thank you. I feel like my statements always have so many phrases like "it is indicative of" or "it is likely that" 😆
😂 1
Avatar
That's often the way!
Avatar
indicative of a proclivity towards an intent to do the thing
😂 2
👍 1
Avatar
What are people's opinions on having very detailed notes with generic reports, or having more generic notes with more detailed reports? I've always been on the report is more important train, but apparently an assessor disagreed and basically told us our reports were too detailed and the notes were garbage. My note sheets could be better, but I've always considered my case folder an extension of my note sheet and just copy / paste values from log files into the report and felt like writing them down in a second place on the note sheet was redundant and usually only include specific actions taken.
Avatar
Reports should be simple where possible. Just the right amount of input without sounding like a load of waffle. As for notes, our notes are probably minimal.
Avatar
DeeFIR 🇦🇺 9/12/2020 6:13 PM
Reports should be simple enough to be understood by your target audience, and notes should be sufficient to explain more granular technical details
Avatar
What is the footer in a wireshark capture?
8:11 PM
I'm supposed to calculate the length of the footer of a ethernet header
Avatar
Good morning all! I just built a new desktop and it should get here in a few weeks. That will leave me with my laptop as an extra machine. I was thinking that since I’ll be running Win10 on my desktop as that is my OS of choice right now, that maybe I should re-image my laptop to Debian Linux and really try to get used to a linux machine. My linux experience is contained to the Kali VM I run using VMware workstation which I will be on my desktop. I’m already going to be transferring everything off my laptop anyways, why not reimage and play around with Linux further than just the CTFs and stuff I already do. Good idea?
5:09 AM
It was either that or just take any or all things to take up resources off of it and make it a 100% purely vm running machine.
Avatar
Andrew Rathbun 9/13/2020 6:22 AM
@lmfml why not just use VMWare or Virtual Box to run a Linux VM or three? If you have access to VMware Workstation Pro through your school, try to get your hands on that. It's an awesome piece of software to manage multiple VM's at once
Avatar
My lab setup is through workstation 15 pro in which I have Kali, metasploitable, and a win xp box. I’m just not sure what to do with my laptop now. It still pretty powerful, don’t know what to do with it to take actual advantage of it still
Avatar
Deleted User 9/13/2020 8:05 AM
@lmfml When I built my desktop I switched over to Parrot OS as my daily driver and I absolutely love it. Plenty of DFIR and InfoSec tools to explore but plenty of adaptability and features to constitute a good daily driver
Avatar
@Deleted User hmm I’ll look into that!
8:44 AM
Only thing with making it my daily driver is I already bought the win10 license 🙃
Avatar
@Law Enforcement [UK] has anyone ever received data from Twitter before? If so please DM me.
4:56 AM
for whom that can spare some time
Avatar
Hi All, does anyone have a decent set of generic watchlists/keyword lists for drugs/organised crime, terrorism, smuggling/trafficking etc use cases which they would be willing to share? (edited)
Avatar
lovely, thanks @OllieD
👍 1
Avatar
Anybody have any recommendations for live response tools that are free?
Avatar
Not sure, @Andrew Rathbun might have a better idea as I've seen him share that link before
6:51 AM
I'm just anticipating completely forgetting about them.
6:52 AM
So might as well set a calendar reminder.
Avatar
Anybody have any recommendations for live response tools that are free?
@mazmike Magnet Forensics has a few good ones. Edd, ram dump, web scrapes etc
Avatar
Andrew Rathbun 9/14/2020 7:08 AM
@OllieD Out of interest, how often are those updated.
@Rob no clue, honestly. I don't run that site but worth asking Brett Shavers about it!
Avatar
heatherDFIR 9/14/2020 8:13 AM
@mazmike Magnet Forensics has a few good ones. Edd, ram dump, web scrapes etc
@florus While it's not free for all (very low cost though) KAPE can do this and it's being presented on my lunch show today. https://www.cellebrite.com/en/series/ctrl-alt-del/
Avatar
@heatherDFIR Thanks for the tip. Registered. Not receiving any invites though.. Edit: probably because im 1 hour late 😂 (edited)
😂 1
Avatar
Andrew Rathbun 9/14/2020 11:59 AM
@florus if you are LE then you can use KAPE for free. If you have any questions, let me know. I made a guide for it here and the last page has a lot of other links/blog posts/videos on how to use it: https://aboutdfir.com/toolsandartifacts/windows/kape/
👍 2
Avatar
heatherDFIR 9/14/2020 6:10 PM
@heatherDFIR Thanks for the tip. Registered. Not receiving any invites though.. Edit: probably because im 1 hour late 😂
@florus They are recorded!
Avatar
Just trying to gauge the ratios here on dealing with memory cards in mobile devices.
2:05 AM
How does your company/force deal with them, Removed from device, image and turn device on without it (image device without MC inserted) (edited)
2:05 AM
Or Remove, Image, re-insert back in to device and power on? (Image device with MC in) (edited)
Avatar
Remove, image, re-insert is what we teach
2:07 AM
You've got an image of the physical memory card in the device so have your point in time reference
2:07 AM
Powering on without it can cause some apps to misbehave
2:07 AM
If they were installed with an SD card present and are storing data there, powering on without the SD card can cause them to start reinitialising files in the device's shared storage
Avatar
The private company i came from (accredited) would remove and not power on device with it in, but force i have just joined (not accredited), image and re-insert.
2:08 AM
Very strange getting use to putting them back in devices... lol
Avatar
Accreditation doesn't necessarily mean correct, it can just mean consistent and justified
👍 2
2:09 AM
But I can imagine it's quite weird adjusting to different SoPs!
Avatar
Oh i know that means nothing, just trying to show it wasnt a crummy little company running out of a garage... 🙂
Avatar
Ah ok, gotcha! Apologies if my comment seemed snarky or derisive, not my intention
Avatar
No, just making it known i wasnt trying to say that the private comany was right and we are doing it wrong here 🙂
👍 1
Avatar
facelessg00n 9/15/2020 2:52 AM
@Artea remove and image of its in relation to deleted media. Then re-insert and extract the device. Testing various combinations of in and out, and or combining them I found there was way more app data obtained with the SD in the device. (edited)
👍 4
Avatar
Waiting for dumper
4:25 AM
Anyone had this come up on xry?
Avatar
@King Pepsi What dumper are we talking about here? 🙂 Can you DM me the log please?
Avatar
Just trying to gauge the ratios here on dealing with memory cards in mobile devices.
@Artea Remove and image the memory card using a Cellebrite card reader w/ FTK Imager (if we can see a file system within FTK) and then cellotape the memory card on the back of the handset once done.
5:12 AM
On rare occasions do we image with the card still in
👍 1
Avatar
Does android and/or iOS retain information on how many times a file has been accessed? Officer asking if it's possible to let them know how many times a video has been viewed on the handset. Unfortunately no handset information atm so could be android or iOS.
Avatar
Depends per app
7:00 AM
Might have to locate the associated db and have a play with it to see what you can find out.
7:00 AM
From memory VLC for Mobile on iOS records times played
Avatar
ScottKjr3347 9/15/2020 9:17 AM
Does android and/or iOS retain information on how many times a file has been accessed? Officer asking if it's possible to let them know how many times a video has been viewed on the handset. Unfortunately no handset information atm so could be android or iOS.
@Artea iOS Photos.sqlite has this information.
👍 1
Avatar
iOS 14 will release tomorrow. Has anyone done any work with the beta versions?
Avatar
This is an interesting feature that could impact investigations: Approximate Location For apps that need your location to function, such as those that provide the weather, you can now choose to share an approximate location rather than your precise location. That allows you to get the info you need, but it keeps the app from knowing exactly where you are.
12:20 PM
Wi-Fi and Bluetooth When connected to a Wi-Fi network, there's an option to "Use Private Address" to prevent network operators from tracking your iPhone. The setting can be found in the Settings app under Wi-Fi when selecting the Wi-Fi network you're connected to. Apple also provides a warning when connecting to a Wi-Fi network that doesn't use the Private Address feature.
12:20 PM
iOS 14 is Apple's next operating system for iPhones. Provided to developers in June at WWDC iOS 14 release expected in September
Avatar
Andrew Rathbun 9/15/2020 12:21 PM
RIP @CLB_joshhickman1 making all these new images for new Android and iOS versions all at once
12:21 PM
Two new major OS's within a week of each other
😆 1
Avatar
CLB_joshhickman1 9/15/2020 1:01 PM
No sweat. 🤣 Patience is the trick...might take me a little time.
💯 3
Avatar
@Artea iOS Photos.sqlite has this information.
@ScottKjr3347 I'm not too sure if this will work, but worth a little test. If you export media from iOS device and transfer to a Mac, in terminal you can run command mdls >filepath< and this may give you the extended metadata attributes of the file.
(edited)
👍 1
Avatar
Trashboat667 9/15/2020 5:06 PM
Correct me if am wrong, but if an image file is located at: DarArchive/root/private/var/mobile/Media/PhotoData/Mutations/PhotoData/CPLAssets/group81/EFC24684-7E37-4282-823B-C8F2268C0628/Adjustments/FullSizeRender.jpg That is an indicator the image came from iCloud photos? This is where I am getting this information: https://www.forensicfocus.com/forums/mobile-forensics/iphone-image-location/ Thank you!
Hello,Currently im dealing with a iPhone iOS 9.3.2 case where i found four (4) identical image in different location. Can someone explain what is the ...
Avatar
what is everyone using for RSS aggregation these days?
9:04 PM
not sure if I want to go with a paid product or set something up on a pi
Avatar
facelessg00n 9/15/2020 11:16 PM
@rayeh Outlook on the work computer 😬 can’t install other stuff on that one.
Avatar
Two broad questions, but hoping someone has an answer. 1. Is there an open database of digital devices/storage media devices? 2. Does law enforcement (in any jurisdiction) has such database? I've done my research, but I don't seem to find anything related to a proper database, just lists of few devices here and there.
Avatar
@rayeh I use Feedly - the free version works well enough for all my DFIR feeds!
Avatar
Two broad questions, but hoping someone has an answer. 1. Is there an open database of digital devices/storage media devices? 2. Does law enforcement (in any jurisdiction) has such database? I've done my research, but I don't seem to find anything related to a proper database, just lists of few devices here and there.
@trillian What do you want the database to cover? Just basics of the devices? Or info about extraction capabilities etc?
1:05 AM
If the former, https://www.gsmarena.com/, http://phonedb.net/ and similar sites are useful
PhoneDB - The Phone Database. Formerly PDAdb. All The Latest and Older Smartphones, Phablets, Tablets, Smart Watches & PDAs In One Place. Detailed Tech Specs, Comparison, In-Depth Parametric Search, Software Updates, Hi-Res Photos the latest specs additions
1:05 AM
If the latter, most mobile forensics tools have some kind of compatibility list or document
1:06 AM
I know that doesn't help on the non-mobile side, but might be a starting point
Avatar
Thank you, @OllieD!
👍 1
Avatar
following on from the rss feed question... what does everyone subscribe to?
Avatar
Andrew Rathbun 9/16/2020 2:44 AM
following on from the rss feed question... what does everyone subscribe to?
@gts https://aboutdfir.com/introducing-the-aboutdfir-rss-starter-pack/ My answer is here 😎
Greetings! I am excited to share something that has been in the back of my mind for a while now. Introducing the AboutDFIR RSS Starter Pack! Basically, this is a curated list of blogs, DFIR vendor websites, and other cyber security related websites categorized for your conveni...
👌 2
4:56 AM
If anyone wants to Follow these pages on LinkedIn, feel free!
Avatar
done - and I now see you sneaking on my linkedin 😄
Eyes 1
Avatar
@Artea iOS Photos.sqlite has this information.
@ScottKjr3347 That may well depend on how the user viewed the file, ie within an App or within iOS DCIM.
Avatar
ScottKjr3347 9/16/2020 8:48 AM
@ScottKjr3347 That may well depend on how the user viewed the file, ie within an App or within iOS DCIM.
@WhyMe? I agree, it depends...
Avatar
@Artea remove and image of its in relation to deleted media. Then re-insert and extract the device. Testing various combinations of in and out, and or combining them I found there was way more app data obtained with the SD in the device.
@facelessg00n
If they were installed with an SD card present and are storing data there, powering on without the SD card can cause them to start reinitialising files in the device's shared storage
@OllieD We would image physically. Then you have complied with such things as ACPO Principals. Then reimage within the handset using 'its' control accesss setting to open secure data.If the SD Card was encrypted such as adoptive storage and only viewable within the handset, you would not consider inserting and imaging within the handset? Or, maybe content in specific apps is only viewab;le with logiaclly opening the device and its storage . I/We secure the physical image, and then use the features within the device/applications to ensure encrypted data is viewable.
💯 1
👍 3
Avatar
anyone here part of a POLIT or regularly do CSAM?
3:30 AM
if so give me a DM
Avatar
So, my work finally upgraded my forensics machine to Windows 10. In doing so, I no longer have Word or Excel. I remember having the same problem at home and I figured out how to have word and excel on my machine locally. But, I cannot remember how to do that. Does anybody have any idea?
Avatar
sounds weird, should have just stayed if it was an in place upgrade
6:19 AM
otherwise just re-install
Avatar
I reverted back to 7 for now
Avatar
Anyone know what this device is? Was on the ceiling of a garage and has what looks like a camera lens but there aren't any markings on it for brand or Make
Avatar
Nvm. Reverse image searched it and it's a blink Amazon camera.
Avatar
@Jack Frost Forsure a Blink camera with a skin on it
👍 1
1:47 PM
@Jack Frost These are often used for Amazon Garage delivery service
👍 1
Avatar
So is it under a customer account or does amazon control it? I've got some guys working a run-over style homicide and having the time the vehicle left the garage would be fantastic
Avatar
@Jack Frost they are customer controlled.
Avatar
Awesome we sent off a preservation request
Avatar
does anyone have a fancy JSON parser (python based) that can pull out chat data and put it in a nice format
Avatar
theAtropos4n6 9/18/2020 1:55 AM
@Sudo a colleague of mine has made one for Instagram "Copy of your Data". More particularly, for a the messages.json file. In case you are interested.
Avatar
@theAtropos4n6 sure if you don't mind
Avatar
theAtropos4n6 9/18/2020 4:58 AM
@Sudo He has no problem sharing! Check your DM
Avatar
We have a number of old flasher boxes that the software is installed on XP and vista machines. Has anyone looked at or managed to run these OS's via a VM and manage to get the softwares/hardwares to run though them? Looking at installing a VM on a windows 10 laptop, creating a XP and vista VM for the once a year we may need to use all this stuff as currently we have 2/3 old towers running these and of course, they take up a chunk of space.
Avatar
We have run some in VMs before
6:15 AM
More success with VMware than VirtualBox for USB pass through etc
6:15 AM
Makes it easy to roll them back after running some of the slightly more sketchy tools
Avatar
VBox is very temperamental with USB pass through
6:30 AM
VMWare player is good but the freebie has no snapshot function (though you can just copy the files off somewhere else)
6:31 AM
or I think Hyper-V is a thing now in Windows 10 pro and above maybe, which probably has more features anyway
Avatar
Do you think what i have put above is possible then?
Avatar
CrashingStatic 9/18/2020 7:48 AM
The attack by Chinese spies reached almost 30 U.S. companies by compromising America's technology supply chain.
Avatar
theAtropos4n6 9/18/2020 8:06 AM
@Rob A how can we sign up for accessing forensics Fridays webinars in training academy? Can we do that without having a training before or is it mandatory?
Avatar
CrashingStatic 9/18/2020 10:47 AM
Pretty technical deep-dive on why the claims shouldn't be possible https://www.servethehome.com/investigating-implausible-bloomberg-supermicro-stories/
We thoroughly evaluate the claims made by Bloomberg in their Supermicro China tampering stories and found them likely impossible or implausible at best. We take stock of sources and discuss the next steps calling for formal SEC and shareholder investigations of Bloomberg.
Avatar
NapsterForensics 9/19/2020 11:10 PM
Figured it out incase anyone ever has this issue:- If you open an evidence item, go to a picture, open it in picture tab at the bottom and CTRL zoom out, then reload EnCase. It's back to normal... Very strange 😆
@3X3 I had this freaking problem for the last two days and I was checking the encase guide, searching on google and thought of creating a ticket to troubleshoot this issue with opentext. Guess what, somebody had the same issue like me and you had given the solution here. Thanks mate you saved my time!!
👍 1
Avatar
@3X3 I had this freaking problem for the last two days and I was checking the encase guide, searching on google and thought of creating a ticket to troubleshoot this issue with opentext. Guess what, somebody had the same issue like me and you had given the solution here. Thanks mate you saved my time!!
@NapsterForensics No problem at all - I too spent a long time trying to troubleshoot before first posting in here, then figured it out after a while and thought it'd be worthwhile for anyone else who stumbles across the problem. 🙂
👍 1
6:05 PM
Interested to see how this plays out
Avatar
is that like a US ISO variant
Avatar
has anyone done the Axiom PDNA sign up?
6:24 AM
did it take long to come through?
6:25 AM
@Magnet Forensics forgot you guys were here 😄
Avatar
forgot you guys were here 😄
@Sudo All the cool kids are here
Avatar
Looks like the ISO 17025 US version. Lets hop they can implement it better than the did here in the UK.
😆 3
Avatar
Would anyone be able to let me know how they deal with attaching handsets with eSIMs to tools like GrayKey if the handset is PIN locked and flight mode not enabled?
Avatar
FinForensics 9/23/2020 4:52 AM
Any recommendations for some sort of Google Translate type implementation for an air-gapped network? Or some sort of dictionary translation service?
Avatar
Would anyone be able to let me know how they deal with attaching handsets with eSIMs to tools like GrayKey if the handset is PIN locked and flight mode not enabled?
@Artea Stuck the device into Faraday bag / box with GK. We have done that in the past. Ramsey box with ethernet port out to desktop. Isolated the phone from network and enabled everything to work as per normal
Avatar
@Dfdan We have a Ramsey box but no ethernet port on it.
5:37 AM
So cant put the GK box in there. It not a beautiful solution but wasn't sure if daisy chaining cables to the USB port would work.
5:38 AM
Also then comes the question about Android Phones
Avatar
Operate, Charge, and Extract Information on Devices while Shielded from RF Signals The Mission Darkness™ BlockBox Touch Multiport is the most versatile, light-weight analysis enclosure in the BlockBox forensics series. The product consists of a spacious faraday...
👍 1
Avatar
So cant put the GK box in there. It not a beautiful solution but wasn't sure if daisy chaining cables to the USB port would work.
@Artea A colleague has used an adapter put to usb to do the same, was a bit Frankenstein but it also worked https://media.tenor.com/images/4a68c796f84c1547728b8000973d87fb/tenor.gif
Avatar
@OllieD Will send this to the higher-ups for approval when i see them next 🙂
Operate, Charge, and Extract Information on Devices while Shielded from RF Signals The Mission Darkness™ BlockBox Touch Multiport is the most versatile, light-weight analysis enclosure in the BlockBox forensics series. The product consists of a spacious faraday...
👍 1
Avatar
They're not as easy to use given the single glove thing, but definitely a good compromise
👍 1
Avatar
@Artea A colleague has used an adapter put to usb to do the same, was a bit Frankenstein but it also worked https://media.tenor.com/images/4a68c796f84c1547728b8000973d87fb/tenor.gif
@Dfdan Wasn't sure if all the extra cables would stop these processes working.
Avatar
We've got about half a dozen of the variant that have no connectors at all for use in the classroom and they've worked reasonably well (edited)
Avatar
Cool, its things like this that the force here dont seems to be looking at yet
Avatar
do you work for my force? 😂
😂 1
😆 1
Avatar
Random question, so the Google machine has slightly let me down. I found no shortages of places I can go to look to verify an IMEI to the type of device. But what I am looking for is a database, CSV, whatever with all of the TAC so I could go ok what is the TAC for Samsung S10E open up DB and see the potential TAC. I work remotely from the offices I support. They send me their IMEI all the time and say hey this is for a Samsung can you support me. Usually I enter the IMEI and it fails cause they fat fingered a digit. What I want is to he able to say it should start with blah
Avatar
do you work for my force? 😂
@gts I assumed they are all the same pretty much 🙂
Avatar
unless you're in a rocu.. 😄
Avatar
can anyone identify this currency?
8:12 AM
I GTSd it without any quick answers
8:15 AM
Thanks to @laurenw who gave the me the answer of Congo
👍 1
Avatar
Andrew Rathbun 9/23/2020 8:25 AM
good work, team!
Avatar
Yeah she used the ol'yandex instead of Googles. Great reminder to use Yandex when Google fails.
👍 2
Avatar
I GTSd it without any quick answers
@sholmes 👀 😄
10:37 AM
sorry to disappoint
💯 2
🤣 3
10:38 AM
Now that is funny!
Avatar
Can anyone advise what a typical forensics report looks like? What do you provide customers? Any examples?
Avatar
@Sudo let me know if you haven’t gotten a response on PDNA and I’ll follow up.
Avatar
CellPhoneDude 9/23/2020 7:52 PM
Hi I'm a newb here but I'm wondering what the preferred method for collecting forensic images from the latest 2020's MacBook's. My initial thought was to Target disk mode the machines in question and use ftk imager to make the images. It's not quite as cut and dry but I guess I'm just looking for "industry standard best practices" for pulling data off these newer USB-C machine MacBook's (edited)
Avatar
Hi I'm a newb here but I'm wondering what the preferred method for collecting forensic images from the latest 2020's MacBook's. My initial thought was to Target disk mode the machines in question and use ftk imager to make the images. It's not quite as cut and dry but I guess I'm just looking for "industry standard best practices" for pulling data off these newer USB-C machine MacBook's
@CellPhoneDude MacQuistion is the go to tool for imaging macs for us.
👍 3
👆 2
Avatar
CellPhoneDude 9/23/2020 10:05 PM
Is there an open source method or alternative?
Avatar
Not sure sorry. Looks like the target mode method might be your only other option potentially if you can't find a better tool.
Avatar
Hey everyone, new member here. Is there anyone out there who could help me shed some light on Ghost ECC phones? Please DM me if possible, thanks!
Avatar
Hey, everyone. I'll apologize in advance that I'm brand new to this. I am currently taking a general Cyber Security Diploma in College. I'm currently in 3/6 semesters but our Forensics and Incident response classes aren't until semester 5. My goal is to find a job in Canadian Law Enforcement. I just am wondering where to start to get my foot in the door. Our class is based off "A practical guide to digital forensics investigations by Darren R. Hayes". Are their certifications in this field or just becoming familiar with tools, if just tools. Whats one I could start with? Sorry again.
Avatar
@Strider Morning and welcome here! There are certifications related to DFIR. However, some can be quite expensive if you have to pay for them out of pocket. Being familiar with tools and how the tools work can be useful. There are open source tools that you can use to get understandings of Operating Systems and such. Also, there are alot of test images that can be used to learn from.
Avatar
JonasWanobi 9/24/2020 8:03 AM
I made a pdf with the DoD KSATs for Cyber Defense Digital Forensic Analyst taken from https://public.cyber.mil/dcwf-work-role/cyber-defense-forensics-analyst/
Avatar
Thank you!
👍🏻 1
Avatar
JonasWanobi 9/24/2020 8:05 AM
Yeah, you know, sometimes it's just handy to have the pdf file for stuff like that.
Avatar
Andrew Rathbun 9/24/2020 8:06 AM
Hey, everyone. I'll apologize in advance that I'm brand new to this. I am currently taking a general Cyber Security Diploma in College. I'm currently in 3/6 semesters but our Forensics and Incident response classes aren't until semester 5. My goal is to find a job in Canadian Law Enforcement. I just am wondering where to start to get my foot in the door. Our class is based off "A practical guide to digital forensics investigations by Darren R. Hayes". Are their certifications in this field or just becoming familiar with tools, if just tools. Whats one I could start with? Sorry again.
@Strider there's lots of free tools you can start out with. Eric Zimmerman's, Autopsy, etc. Start by watching 13Cubed videos and see the tools he uses. If you have questions or need guidance, just ask here. Plenty of people to help
8:07 AM
Also, I put this together for people like you - https://aboutdfir.com/a-general-overview-of-dfir-resources/
💯 3
👍 1
Avatar
lol. i have that site on my bookmarks already.
👍 1
Avatar
Would anyone be able to let me know how they deal with attaching handsets with eSIMs to tools like GrayKey if the handset is PIN locked and flight mode not enabled?
@Artea Not sure we've had an esim phone but we've attached them not in airplane mode and it can put it in airplane mode for us when connected. Not sure if this is ideal for you tho!
Avatar
@JMK Not in an ideal world. I have a couple of ideas on getting this sorted now. Just putting it to the higher ups.
👍 2
Avatar
Jacob Lawendy 9/25/2020 1:39 AM
'm currently doing a Digital Forensics assignment about social media security, and part of it involves interviewing an industry professional . I was wondering if someone could answer my questions I have ,
1:41 AM
these are my questions 1.What tool do you utilize to collect data from social media sites? 2.What makes some social media sites more susceptible to privacy invasion than others? 3.What are some social security issues you face while working? 4.What kind of data is collected? 5.What would you recommend as sound business practice for the use of social media? 6. What would you recommend as sound business practice for enforcing company phone security?
Avatar
wibblypigftw 9/25/2020 3:49 AM
Has anyone got a good CT (Islamist UK-focused) keyword list they could share with non-LE? I've looked at the DHS Binder one and it's a bit weak
Avatar
Andrew Rathbun 9/25/2020 4:10 AM
these are my questions 1.What tool do you utilize to collect data from social media sites? 2.What makes some social media sites more susceptible to privacy invasion than others? 3.What are some social security issues you face while working? 4.What kind of data is collected? 5.What would you recommend as sound business practice for the use of social media? 6. What would you recommend as sound business practice for enforcing company phone security?
@Jacob Lawendy try asking in #osint
👍 1
4:11 AM
And if no luck there, try #training-education-employment
Avatar
Anyone ever find chat logs for Microsoft Teams stored locally on a Windows device?
Avatar
Muchas Gracias!
Avatar
Ginger Bouncer 9/25/2020 6:31 AM
Hashcat on kali isn’t recognising my gpu (nvidia gtx 1650) what can I do? (edited)
Avatar
Andrew Rathbun 9/25/2020 6:48 AM
Hashcat on kali isn’t recognising my gpu (nvidia gtx 1650) what can I do?
@Ginger Bouncer #password-encryption-cracking
6:48 AM
Developers of hashcat lurk there
6:49 AM
asking outside of that channel won't yield much results as I think they only monitor that channel
Avatar
Ginger Bouncer 9/25/2020 7:12 AM
Ty
Avatar
CryptoHackz 9/27/2020 12:34 AM
Hey everyone... just wanted to know if anyone would know if someone has taken Security Blue Team - Blue Team Level 1 Certificaiton and if you really get your money's woth for the close to $700 USD price tag? Thanks
Avatar
Andrew Rathbun 9/27/2020 2:53 AM
Hey everyone... just wanted to know if anyone would know if someone has taken Security Blue Team - Blue Team Level 1 Certificaiton and if you really get your money's woth for the close to $700 USD price tag? Thanks
@CryptoHackz #training-education-employment is a better place to ask
Avatar
CryptoHackz 9/27/2020 3:16 AM
@Andrew Rathbun sorry about that... I’ll post my question over there...
Avatar
Dr. Kaan Gündüz 9/28/2020 3:05 AM
hi all
3:05 AM
how much do you charge for your investigations?
3:05 AM
i googled and found that it's between 1000-1500$ per 1Tb of disk size
3:06 AM
for some private firms
3:06 AM
is that reasonable?
Avatar
Computer Misuse Act (UK Law) S1 covers unauthorised access and i have a good idea about the broader part of this legislation. However I have a scenario whereby a computer may have been left open, or may have required someone to access it (No Password required). They have then scrolled through company emails belonging to this user (Intruder is also member of the Company) - opened some and taken photographs of them. This has been done on numerous emails. Is the offence under section 1 complete (I have established that the access to the email account is unauthorised by the intruder even though they are a member of the same organisation). TIA 🙂 👍 (edited)
Avatar
Andrew Rathbun 9/28/2020 7:54 AM
@Artea thank you for the boost!
Avatar
Anybody work with Microsoft Access regarding a fraud case or personally ? I have a case where a business that is using it and I'm trying to ascertain how to forensically obtain the database and see if there will be a user history in there if someone changes numbers in it etc. (edited)
Avatar
forensicatrix 9/28/2020 10:39 AM
@DCSO I develop Access databases on a pretty regular basis, although I've never examined one forensically so take what I say with a grain of salt. As far as I can tell, Access doesn't have any automatic user history tracking turned on, but it's possible (probable, if it's professionally made) that the developers built in a quasi-tracking method into their tables. I'd have to take a look at the database itself. For acquisition, you'll need to get .accdb and .accde files. Be careful about checking if the database has been split-there is a way to store the actual records in a separate file (usually termed the back end) from a file containing all the forms that the user can see (usually termed the front end). The most crucial file will be the back end .accdb(s)-it holds all the data and is usually found in a location that is accessible to all front end users (something like a network drive)-but if you're interested in seeing what a user would be able to do, I would grab a copy of the front end too (there's usually a copy on each user's computer, and these can either be .accdb or .accde files). You can tell if the database has been split by opening a copy and viewing the navigation pane (file -> options -> current database -> check display navigation pane -> reopen database). If there's a blue arrow next to the tables and there are other objects (e.g. forms, queries, reports, etc.), it has been split. The most recent location of the back end can be found at external data -> linked table manager. If there are no other objects, you've probably found your back end file. Depending on how far back you're going, I would also look for additional back end .accdb files that contain older records that have been archived. If there isn't a blue arrow (and are other objects), then the tables are stored within the .accdb file itself and you can just take that one and be on your way. Hopefully that helped-feel free to ping me if there are any more questions! (edited)
Avatar
@forensicatrix great info thanks for the details
Avatar
Any UFED4PC users that want to answer a DM?
Avatar
@RBegs2637 go for it, I’ll see if I can help
Avatar
Stupid question. Have always used touch/touch 2. Agency just switched to 4PC. Any reason to use the UFED4PC adapter?
6:38 PM
First device on 4PC was iPhone 7 chk8 extraction without adapter
Avatar
Does anyone have any ideas for an Axiom case that crashes when running key word searches? It’s fine to browse everything else, only crashes when I run a key word search
Avatar
Working with someone long distance on an odd situation. They have an external HDD that doesn’t show up at all on their workstation through a write blocker, known good drives show up fine. Disk manager apparently doesn’t populate an entry at all, even though the drive spins up. So nothing at all when plugged into windows. I had them boot into paladin which immediately recognized the drive as having one NTFS partition with plenty of live data on it, folders and files. Can mount (RO) and access files etc. Beyond having them acquire a dd through paladin, what are some scenarios that could result in an NTFS drive not appearing at all on a windows system? I was planning on requesting the boot sector/mbr in case something is wonky there but without being there it’s tough to know exactly what might be up.
9:30 PM
I should add, it’s more than one HDD. There are apparently a few which display the same behavior from the same case. My thought is that some intentional alteration was made either manually or via software to cause this situation.
Avatar
@whee30 stupid question - definitely not the write blocker or computer? Tried it on different workstations / blockers?
Avatar
Working with someone long distance on an odd situation. They have an external HDD that doesn’t show up at all on their workstation through a write blocker, known good drives show up fine. Disk manager apparently doesn’t populate an entry at all, even though the drive spins up. So nothing at all when plugged into windows. I had them boot into paladin which immediately recognized the drive as having one NTFS partition with plenty of live data on it, folders and files. Can mount (RO) and access files etc. Beyond having them acquire a dd through paladin, what are some scenarios that could result in an NTFS drive not appearing at all on a windows system? I was planning on requesting the boot sector/mbr in case something is wonky there but without being there it’s tough to know exactly what might be up.
It can be a 4Kn drive which is exposed as having 512-byte sectors by a write blocker (thus, partitions are misaligned). Or a non-removable drive exposed as removable by a write blocker (thus, a partition table is unexpected by old versions of Windows). Or a drive formatted in Linux but never mounted as read-write in Windows (but the error should be: "the drive is read-only" or something similar, so the drive letter should be visible with nothing under that drive letter showing up).
Avatar
Andrew Rathbun 9/29/2020 3:22 AM
Stupid question. Have always used touch/touch 2. Agency just switched to 4PC. Any reason to use the UFED4PC adapter?
@RBegs2637 try #mobile-forensic-extractions
Avatar
@RBegs2637 some of the extractions will require you to use the UFED4PC adapter, it will bark at you when it wants it.
Avatar
Andrew Rathbun 9/29/2020 11:21 AM
For those in LE - https://warrantbuilder.com/
Clever Law Enforcement Solutions
11:21 AM
Just came across this
Avatar
@JMK small agency - they have one tableau write blocker that seems to work fine up until now. Also - just the one computer. The hard drives are retail externals, western digital etc. no drive letters, no entry in disk manager through windows. Not sure, they’re getting the data through paladin in the end. Never seen this issue before so it’s hard to know exactly what’s up without sitting in front of it. Waiting on some more info it was just bugging me last night.
11:28 AM
@Mr. F. no drive letters, no disk management entries, no errors like read only... just nothing. I’ll get the disk info to see what it is.
Avatar
@whee30 is it a SAS drive?
1:19 PM
If you're using a tableau bridge, then are you connecting it to the right part
Avatar
Is it okay if a write up a long text? Its a story
Avatar
@Andronidas The moderators and I saw the story when you were in #role-assignment, you don't need to repost it. If there's something specific you need info for or assistance with then ask away, but the backstory is not required (edited)
Avatar
roger that, will post more specific questions later
👍 1
Avatar
Anyone knows how to use SAS data mining?
Avatar
DeepDiveForensics 9/30/2020 8:59 AM
Is there any traces left after extraction in mobile in case of switched off or switched on condition?
Avatar
@DeepDiveForensics Could you be more specific on what you mean?
Avatar
DeepDiveForensics 9/30/2020 10:22 AM
@Andronidas In case of edl extraction or adb extraction any footprint left inside the phone.
Avatar
Ah, sorry, out of my skill scope
10:23 AM
cannot comment
Avatar
Does anyone have a solution for android collection during social distancing where it has to be done remotely ? I was thinking about sending out a laptop with cellebrite and controlling the laptop remotely. Does anyone have another solution ? I am interested in text (SMS/MMS) messages only. No interested in 3rd party chat apps.
3:40 PM
Just joined and wanted to say g'day
Avatar
@Andrew Rathbun not just Magnet products, you can use other tools, scripts or utilities in workflows as well.
@MF-cbryant Hi the magnet automate and atlas is an installation tool or is a service that magnet provide?
(edited)
Avatar
Tools you install.
Avatar
Anyone had a play with some of the more high end AMD rigs for digital forensics? At some point we will be getting to our hardware upgrade cycle, so just wanted to check what people's experience has been. There's some very high end Threadripper / Epyc workstations out there which I imagine can churn through decodes pretty quick!
4:25 AM
Also on that note would be good to hear people's experience with working on virtual desktops. I've heard a few forces have their forensic hardware now on decent servers for a lot of the processing, then using thin clients (or well less powerful workstations) to connect in. Would be good to hear what the experience has been with these setups
Avatar
Also on that note would be good to hear people's experience with working on virtual desktops. I've heard a few forces have their forensic hardware now on decent servers for a lot of the processing, then using thin clients (or well less powerful workstations) to connect in. Would be good to hear what the experience has been with these setups
@K23 Kev and I had a conference call with a force a while ago, with their lab manager and one of their IT engineers who was responsible for their VMware setup, I'll DM you their details if they're happy to chat about it
Avatar
Yes please
Avatar
But the reason it worked well for them is that their force IT were onboard with it and saw the benefits of supporting the DFU with special infrastructure whilst allowing the DFU to retain a bunch of autonomy
5:01 AM
And I know that the level of cooperation required for that is not something every DFU would be in a place to achieve
Avatar
Yeah. Our relationship with IT these days is pretty strained unfortunately, but we are getting there
Avatar
I have a very blurred image that has sensible information for my case
9:07 AM
i tried sharpening it but no luck
9:08 AM
its a 240p photo with TEXT, that text is the important info
9:08 AM
What other things could i try to do?
9:08 AM
Maybe some debluring and sharpening AI algorithm?
9:10 AM
oh theres a multimedia forensics channel, sorry (edited)
Avatar
anyone dealt with an iOS 14 device yet?
10:15 AM
any notable differences you've found?
10:17 AM
side note: our IT are so abysmal it's a running joke and I thank the spaghetti monster daily that I run our network
Avatar
@Andronidas make a copy and you can play with the a PNG in adobe photo editor or Pain.net to clarify the photo with different levels/curves
Avatar
anyone dealt with an iOS 14 device yet?
@Sudo apparently might have our first soon this week or next coming our way
10:27 AM
So exciting times
Avatar
mind letting me know how it goes?
10:27 AM
my colleague had one today and struggled to get anything at all so I'm curious
Avatar
Ye will do
Avatar
University - we are getting to buy a new forensic workstation. Ask for one or two? We have four DFIR folks. Considering sizing and options, build or pre-built. RAM currently at 32GB, new 64 or 128GB? Processors. Dual Xeon 10 cores or? Drives? Kind of wanting to keep it simple and ask for FRED DX Workstation with 1 RAID. Basically, looking for reasonable asks for a decent workstation or two so that we can have in lab and also use it remotely when needed since right now most are work from home.
11:55 AM
Currently have build your own Dell Towers, five years old.
Avatar
what software are you expecting to run?
12:48 PM
we have two machines that are set up pretty similar, dual xeon e5-2620s, fast OS ssd, an 8TB drive, and ~500GB SSD, with ~94GB of ram
Avatar
xways, ftk-imager, arsenal, vm of SIFT (others).
Avatar
and a few lighter linux machines per analyst
12:48 PM
we're university/academic medical center
12:48 PM
we use similar software
12:48 PM
plaso rips on those machines vs our lighter ones
12:49 PM
if I had to do it again I'd do bigger SSDs
Avatar
Xeon's are kinda meh tho
Avatar
@dfir_raven https://sumuri.com/hardware/forensic-workstations/ my two cents if you are replacing every 5-6 years
The SUMURI TALINO KA Forensic Workstations is built on the most reliable and stable platform designed by Certified Forensic Computer Examiners.
Avatar
No application actually utilises them
12:49 PM
We swapped from Xeon's to i9's
Avatar
vendor agreements make things difficult
Avatar
we've thought about that as well on the Xeon's to i9's
Avatar
We use x4 6TB Seagate HDDs (i'd personally probably prefer WD but heyho), x2 1TB Samsung Evo SSDs and i9 (edited)
12:50 PM
Asus something motherboard
Avatar
we have more leeway in added parts vs the core product
12:51 PM
we also have large qnaps attached for tickets that require it
12:51 PM
but they aren't used as often
Avatar
checking out the Sumuri site
Avatar
we've thought about that as well on the Xeon's to i9's
@dfir_raven We more or less looked at what each application uses core wise / compared the output of Xeon vs i9 and felt that i9 was far superior
Avatar
we have a workstation for each analyst, however, there is talk of getting one bigger (or two) and sharing. So, needing to be able to work two small cases at once on rare occasion. Thus my thinking still should go with two (medium 🙂 )
Avatar
You'd need good networking for that
12:58 PM
And kinda sounds like a bad idea to me
12:58 PM
To share a PC
Avatar
I too agree on the bad idea. (edited)
Avatar
we share 2 machines for running some tasks in docker containers/VMs (the configuration mentioned above)
1:03 PM
it works well for us, but we're primarily interacting with them over ssh
1:04 PM
they're otherwise intended for on-site situations, we have them at two separate campus locations where we might need to physically examine systems
Avatar
we will be remote typically while interacting with the post acquisition work.
Avatar
infosec_cat 10/1/2020 8:08 PM
Hi everyone, is anyone familiar with conducting forensics to web browsers? Especially with a Mac Laptop? Thank you in advance for the help
Avatar
Hi! Have you encountered a .GBP file? Seems to be some kind of password protected backup
Avatar
0 5
Avatar
Can someone recommend a IPhone application in the Apple store that will record a phone call in both directions (receiver and caller) to the file system of the phone?
Avatar
@florus I'm pretty sure Apple limits microphone access during a call with apps as a security feature. You would have to setup a googlevoice if you are using it as a UC line to record.
Avatar
Join us for Hacker Halted at Home Oct. 19-23 free of charge and get rewards for signing up your friends!
Avatar
is iOS a constant pain in the ass or im just not faimliar with it enough
👍 1
6:50 PM
does the pain ever go away
Avatar
Trashboat667 10/2/2020 7:27 PM
@dfeyen curious if Fog Data was helpful with your advertiser ID from several months ago?
Avatar
Andrew Rathbun 10/2/2020 11:48 PM
does the pain ever go away
@Andronidas Apple knows what's best for you
Avatar
Andrew Rathbun 10/3/2020 9:39 AM
Thank you for the boost @B!
parrot 4
Avatar
is there any software that can help a forensics analyst to look at the phone data and find out who was the person sending the threats or inappropriate statements. Because the person i am trying to help i tell them to just report it to the local authorities but i wish i knew of a software or program that i can be able to find out who is trying to pish them so i can submit something to the authorities but they do nothing in the first place?
Avatar
AzuleOnyx🛡 10/4/2020 1:37 AM
Hmm, that's more of an OSINT thing. If you have a number, name, handle, or other information, you'll need to look around to match it. LE might get some IP information if they time/date information to match against the messages or could contact the carrier/message app company for more informaiton.
Avatar
@Drakesbane i agree with Azule, find the most information you can about those messages and the emissor, and then apply some OSINT to find out who he is
8:05 AM
i can PM you some good OSINT resources if you want
Avatar
Unoriginal_name 10/4/2020 12:16 PM
So, I’ve got a good problem that I need some help with. I received a $1000 grant that has to be used for digital forensics equipment. This was a surprise so I don’t have anything in mind. I’m reaching out to see if anyone has any good suggestions for me. Maybe something that isn’t necessary but makes the job easier/better to do.
Avatar
@Unoriginal_name cant help you, but i would be interested in the response of the more experienced ones, if you get the answer, please tag me on it or pm it to me please
Avatar
@Unoriginal_name for 1000 bucks, I'd suggest maybe a pro edition gardonix w/adapters? Nice functionality for a reasonable price. Top it off with fast usb keys and cables. Can never have enough.
Avatar
@Unoriginal_name not sure what you already have but a good write blocker, some external SSDs for handing out case files to investigators, a new test device or two?
Avatar
Unoriginal_name 10/4/2020 5:57 PM
I’m pretty much set up with what would be needed. This is sort of a bonus 😉. I was thinking some more portable SSDs to help image on scene faster for some ICAC cases that I get. But, I was just seeing if there is something new/improved that i am missing.
Avatar
Unoriginal_name 10/4/2020 6:04 PM
That’s about the only time I image on scene
Avatar
ScottKjr3347 10/4/2020 8:14 PM
I’m pretty much set up with what would be needed. This is sort of a bonus 😉. I was thinking some more portable SSDs to help image on scene faster for some ICAC cases that I get. But, I was just seeing if there is something new/improved that i am missing.
@Unoriginal_name yep 2tb nvme M.2 with enclosure.
Avatar
Hello, any good resources on cryptocurrency forensics?
8:27 PM
Currently reading "Investigating Cryptocurrencies Understanding, Extracting, and Analyzing Blockchain Evidence"
8:27 PM
very good read, i recommend it
Avatar
Oh sorry theres a virtual currency channel
Avatar
chrisforensic 10/4/2020 9:42 PM
@Cellebrite concerning new beta PA 7.38.0.46 ... it´s not possible to export quickly just the "native messages" (former SMS/MMS section) if i need only basic informations in excel like contacts, calls, sms, mms etc. ofcourse, i can deselect the others, and keep only native messages, i know ... (edited)
9:42 PM
9:42 PM
9:45 PM
9:46 PM
would it be possible, to insert a choice to select only the "native messages" from chats in exportwindow ? (edited)
Avatar
chrisforensic 10/4/2020 10:37 PM
and an option to view them from oldest to newest (not chatview) would be nice... as we had before 🙂 (edited)
Avatar
chrisforensic 10/4/2020 10:47 PM
10:48 PM
hmmm.... and the contacts summary shows the source as "chat" .... but this are contacts that have sent/received SMS ... so "SMS" should be shown as source .... (edited)
Avatar
chrisforensic 10/4/2020 11:01 PM
our analyst saw this excel sheet... he asked me "where are the SMS ?" (edited)
Avatar
@chrisforensic You should probably never take any cellebrite report about sms/mms/chats as 100% gospel truth if the thing you are looking at is not those specific reports...this has been around a long time. Things don't match 100% across all of the reports for...reasons only cellebrite knows. Apologies to the clb team but it's true
Avatar
chrisforensic 10/4/2020 11:24 PM
@Sha1_4n6 i know, cross-check the results is always a good thing....
Avatar
Leider
Avatar
can any @Magnet Forensics people give me a DM, strange goings on with CAID database
1:27 AM
wondering if I could get an opinion
Avatar
@Cellebrite Anyone about for a very quick CAS ability question?
Avatar
CLB - DavidK 10/5/2020 4:28 AM
@K23 Yes, DM me
Avatar
Already sorted, thanks @CLB - DavidK
Avatar
@Sudo no problem.
5:04 AM
Sent DM
Avatar
Does anyone know about Android URL like this "android://i0QbiEy9R4iptbME_Gv16N_Q7hC1S5NE"? Is this Base64 what comes next?
Avatar
heatherDFIR 10/5/2020 9:32 AM
For Life Has No Ctrl+Alt+Del use the password 4n6
👍 1
Andrew Rathbun pinned a message to this channel. 10/5/2020 10:52 AM
Avatar
So I have a question for all the forensic types: what is your go to when you have to convince infrastructure\architect types to log what you need them log vs "why don't you use this?" or "Why do you need that?"
Avatar
apply this
6:42 PM
😅 1
6:43 PM
bad sysadmin, bad
6:50 PM
I'd also like to know the answer
6:51 PM
or, No YoU CaN'T InStAlL aN AgEnT oN AlL oF tHe MaChInEs
Avatar
So today, I asked if we could add TWO event ids to our security.evtx logging standard. I got "why do you need that? Can't you use splunk? Cant you look at the output of agent X?" NO, I can't. Why do you care about WHY? Because HR wants it and they ask me for it? its like 1.5 KB per log event. JUST DO IT
🤬 2
7:05 PM
My boss' boss went nuts
Avatar
GreyMane_Odinson 10/5/2020 7:39 PM
So I have a question for all the forensic types: what is your go to when you have to convince infrastructure\architect types to log what you need them log vs "why don't you use this?" or "Why do you need that?"
@Patrick A good infrastructure architect will take security considerations into account too. Did they not give your team a seat at the planning table? That's a pretty big oversight for an architect, especially given the current security atmosphere. Can you give a bit more information about your situation? What is the security culture at your org? Is the architect en employee or consultant? Who drives the IT projects, the director or a steering committee?
(edited)
Avatar
@Patrick A good infrastructure architect will take security considerations into account too. Did they not give your team a seat at the planning table? That's a pretty big oversight for an architect, especially given the current security atmosphere. Can you give a bit more information about your situation? What is the security culture at your org? Is the architect en employee or consultant? Who drives the IT projects, the director of a steering committee?
@GreyMane_Odinson All great questions. As a DFIR/Forensics guy I had no input because the infosec architect at the time didn't involve us in anything. So...I am coming at this from behind the 8ball. Part of the issue, at this point, is the switch to WFH. HR keeps coming to us and asking for "proof" of hands on keyboard/timecard fraud. As it stand now, only so much I can give them
Avatar
GreyMane_Odinson 10/5/2020 7:43 PM
So today, I asked if we could add TWO event ids to our security.evtx logging standard. I got "why do you need that? Can't you use splunk? Cant you look at the output of agent X?" NO, I can't. Why do you care about WHY? Because HR wants it and they ask me for it? its like 1.5 KB per log event. JUST DO IT
@Patrick I hadn't seen this last message before I replied. Show them how much money it costs to just do it vs. how much money it costs for you and them to go round and round on it.
7:44 PM
@GreyMane_Odinson All great questions. As a DFIR/Forensics guy I had no input because the infosec architect at the time didn't involve us in anything. So...I am coming at this from behind the 8ball. Part of the issue, at this point, is the switch to WFH. HR keeps coming to us and asking for "proof" of hands on keyboard/timecard fraud. As it stand now, only so much I can give them
@Patrick That seems super reasonable and about the cheapest way to tackle that issue...
Avatar
@Patrick I hadn't seen this last message before I replied. Show them how much money it costs to just do it vs. how much money it costs for you and them to go round and round on it.
@GreyMane_Odinson Oh believe me, I brought up "You willing to pay Splunk agent costs? for EVERY SINGLE endpoint? okay..."
🤣 1
7:45 PM
I'm just super frustrated at this point. As my boss' boss said "who are they to ask about why??"
👏 1
Avatar
GreyMane_Odinson 10/5/2020 7:46 PM
@GreyMane_Odinson Oh believe me, I brought up "You willing to pay Splunk agent costs? for EVERY SINGLE endpoint? okay..."
@Patrick I guess that is my goto for business types and a good way to get the heavy hitters on your side. Bring up cost and risk and especially draw attention to feet dragging and the costs and risk it causes.
Avatar
@Patrick I guess that is my goto for business types and a good way to get the heavy hitters on your side. Bring up cost and risk and especially draw attention to feet dragging and the costs and risk it causes.
@GreyMane_Odinson I gave them 10 days to "look into it" and come up with something. I am bringing my boss's boss and HR to the meeting
👏 1
Avatar
GreyMane_Odinson 10/5/2020 7:48 PM
@GreyMane_Odinson I gave them 10 days to "look into it" and come up with something. I am bringing my boss's boss and HR to the meeting
@Patrick Sounds like it'll get settled wither way. It sucks when ppl try to put obstacles in the way of progress and getting tasks done.
👍 1
Avatar
my work life...infrastructure saying "why can't forensics do/use what we tell them to?"
👍 1
Avatar
GreyMane_Odinson 10/5/2020 7:53 PM
my work life...infrastructure saying "why can't forensics do/use what we tell them to?"
@Patrick I'm not sure what architecture they're focusing on but adding a few Event IDs is MUCH less a hit on performance than installing an additional subsystem to do literally the same thing. Is it bad to ask the heckler why he/she is so dim? 😅
😆 1
Avatar
@Patrick I'm not sure what architecture they're focusing on but adding a few Event IDs is MUCH less a hit on performance than installing an additional subsystem to do literally the same thing. Is it bad to ask the heckler why he/she is so dim? 😅
@GreyMane_Odinson i wish i knew. I mean...each event id is about 1.5 KB at MOST. I don't care if I have to push that enterprise wide. Its not that big an impact!
Avatar
Sysadmin pride issues?
💥 1
Avatar
GreyMane_Odinson 10/5/2020 7:55 PM
@GreyMane_Odinson i wish i knew. I mean...each event id is about 1.5 KB at MOST. I don't care if I have to push that enterprise wide. Its not that big an impact!
@Patrick Exactly my thought. I just don't get the rub they're having with it. Maybe it's pyschological.
7:56 PM
Sysadmin pride issues?
@Andronidas Bingo, I think.
👍 1
Avatar
Yea we have that problem in the sysadmin culture
Avatar
Yea we have that problem in the sysadmin culture
@Andronidas You've nailed it. And part of it is the..."terror" of the end users complaining about performance. I mean...its not like I am asking for another agent being pushed down. But...they are worried about tickets complaining about slowness
Avatar
As a junior sysadmin i can vouch for the pridefulness of the role, because i suffer it too, sometimes its kinda hard taking constructive criticism, even more on the security side of things
Avatar
GreyMane_Odinson 10/5/2020 8:01 PM
@Andronidas You've nailed it. And part of it is the..."terror" of the end users complaining about performance. I mean...its not like I am asking for another agent being pushed down. But...they are worried about tickets complaining about slowness
@Patrick It'll cost you a bit of time (you can cost that out for them too) but you can measure the performance hit.
Avatar
Totally agree, possible risk and damage talk is the talk that attracts the big fishes attention
👍 1
Avatar
GreyMane_Odinson 10/5/2020 8:04 PM
As a junior sysadmin i can vouch for the pridefulness of the role, because i suffer it too, sometimes its kinda hard taking constructive criticism, even more on the security side of things
@Andronidas I used to be that way. I was a sysadmin from 1996 to 2012. Going to a place that does leadership training for everyone in the company and with an amazing team atmosphere showed me the light and power of accomplishment when everyone has the same goal and treats everyone with respect. It has to be ok to make mistakes as long as they are viewed as a learning path and not a failure.
8:06 PM
@Andronidas I used to be that way. I was a sysadmin from 1996 to 2012. Going to a place that does leadership training for everyone in the company and with an amazing team atmosphere showed me the light and power of accomplishment when everyone has the same goal and treats everyone with respect. It has to be ok to make mistakes as long as they are viewed as a learning path and not a failure.
@GreyMane_Odinson But that culture has to come from the very top down. Otherwise it fails.
Avatar
oh it sounds like it was a great time working on that team. Im currently working alone, i hope i can help build such an atmosphere in future teams i may partake
Avatar
Anyone have an Idea how to extract a Huawei GT Smart watch?
3:12 AM
Is itt possible?
Avatar
@Arlakossan Extract an image from it?
4:13 AM
See if that helps
4:13 AM
Might be slightly different OS
Avatar
Andrew Rathbun 10/6/2020 5:37 AM
#mobile-forensic-extractions
5:38 AM
Not that this can't be discussed here, it would just make a lot more sense to discuss it there ^
Avatar
Can someone explain why PA would show two IMEI’s on a full file system extraction of an iPhone 11? Neither match the IMEI under the digital SIM in settings.
Avatar
Is there an easier way of downgrading XRY?
6:36 AM
It's not a case of just double clicking the setup.exe of the older version and it'll overwrite the newer version?
6:37 AM
Rather than uninstalling everything?
Avatar
@Pacman Any specific reason? No, uninstalling, restart and then running the installation again is the best way to make sure you get it all right.
Avatar
Just carrying out some tests, nothing biggie.
6:39 AM
Validation and all
6:41 AM
I wonder if there could be a feature? Where if we install a newer version, the older version can be kept in a seperate folder? So when opening in XRY, it will automatically open the latest version - and if you want to open an older version, you can go in settings and select one of the older version that's installed on your computer and press OK, it would close down the latest version and open up the selected version?
6:42 AM
I hope that made sense, didn't proof read that lol
Avatar
Have not heard of that before, interesting thought but I don't think that is something we will be able to implement any time soon due to how interlocked the XRY setup is. I'll see if I can pass it along however!
Avatar
Squirrl-0x00 10/6/2020 7:05 AM
Hello, I am doing a PhD thesis in Lausanne, Switzerland on "Uncertainties in digital forensic and communication with law practitioners". As part of my research, I am conducting a survey towards digital forensic science practitioners who have already had to communicate with legal practitioners. It is completely anonymous and addresses the communication and use of digital traces during a legal process. No case specific data is requested. The survey takes between 10-15min to be completed. The more participation I can get and the more diverse it is, the more I will be able to describe the reality of our work. I would be grateful if this community could take the time to help ! Here's a link directly towards the survey : https://esc-app.unil.ch/limesurvey/index.php/839663?lang=en And here toward a website with more details (and the results of this research in the future): https://esc-app.unil.ch/blogs/dfcom/ Thanks !
👍 1
Avatar
Pro Digital Forensic Consulting just published a new blog: Key #DFIR Influencers in 2020. Check it out here: https://prodigital4n6.com/2020-key-influencers-in-dfir/
One of the things I enjoy most about the field of digital forensics is that it’s a community of people who all generally have one set of goals in mind:  Find the truth, get to the facts, uncover the evidence…
Avatar
hi folks do we have channel for "API Forensic" ?
Avatar
hi folks do we have channel for "API Forensic" ?
@AvianDo Would #cloud-forensics suit?
Avatar
Out of curiosity does anyone here have a statement template explaining imagines within filepath gallery3d/cache/ and what the images are and how they got there? I've done a statement, but I'd like to see if it can be improved based on other people's feedback
Avatar
@AvianDo Would #cloud-forensics suit?
@OllieD thanks, but i dont think so !
Avatar
Can you expand on what type of APIs you're thinking of?
Avatar
something involve to "postman" tool or relevant to it
Avatar
I would still say #cloud-forensics then. Whilst the discussions there are often around the cloud capabilities of forensic tools, there are people building their own cloud acquisition tools etc. All of that requires a knowledge of APIs. I use Postman myself when poking at cloud services, so it's probably the most relevant place for it to go (edited)
👍 2
2:47 AM
The @Moderators always welcome suggestions of new channels, but we don't want to create too many that are so niche that they never get used
Avatar
any students here?
Avatar
A few hundred 🙂
Avatar
Trashboat667 10/7/2020 10:53 AM
I got an iCloud production back from Apple after sending them a search warrant. There are 10 backups. 7 of them specify what device they came from when parsed with physical analyzer. The other 3 do not. How can I tell what device they came from? The possible devices are a Mac, two iPhones, and an iPad. Also, how do I tell what device uploaded a certain file to the iCloud? The three unknown device backups are the only ones that have the contraband files in them. The other 7 are phones and iPads backups. Makes me think the 3 unknown are the Mac??
Avatar
Does it not give you the device name of the backup
11:33 AM
As in what the owner called it
Avatar
Deleted User 10/7/2020 11:42 AM
Anyone here have any experience with Tsurugi Linux and prefer it to using Kali on lab machines?
Avatar
Trashboat667 10/7/2020 12:33 PM
@Rob it says what device for 7 of them but not for 3 of them. The 7 it does it just says iPhone 6a or iPad 6th gen or something like that. I am also looking at the PA parsed versions.
Avatar
Does anyone know of any benchmarking resources specifically for various computer set ups (e.g. cpu. gpu, memory, ssd) with fixed images and forensic software programs? I've seen different software programs with fixed images compared on the same hardware but haven't seen much of the opposite. I'm mostly interested in seeing the fastest processing speeds and determine which components are better to spend the extra money on. (edited)
Avatar
What books do you all recommend about Investigation in general, detective work, general forensics?
10:04 AM
Investigation Theory books lets say, for putting it into few words
10:06 AM
Tag if answer please
Avatar
Andrew Rathbun 10/8/2020 11:11 AM
@Andronidas https://aboutdfir.com/top_books/by @RandyRanderson
✊ 1
Avatar
Thank you
Avatar
I dont know in what channel to post this, but im building a Yagi antenna with a scope on it for wireless assesments
10:23 AM
Anybody built something similar, or knows about scopes, could tell me what magnification should i use for having a good view on the places (a warehouse lets say) at a distance of 800meters?
10:24 AM
1000 or 800mts its the worst case scenario, not really gonna use it consistently at those distances, but im basing myself on the worst scenario possible
Avatar
Looking to take FOR585 next month. Wondering if most people purchase the GCFA cert attempt with the class purchase or wait later.
Avatar
Andrew Rathbun 10/9/2020 11:43 AM
Looking to take FOR585 next month. Wondering if most people purchase the GCFA cert attempt with the class purchase or wait later.
@Ghosted If you wait later it'll be like $2k vs like half the price
11:43 AM
If you're going to do the cert, order it with the class
11:43 AM
Also, GASF if what you meant, right?
11:43 AM
FOR508 is the GCFA 😄
Avatar
Yes your right Rath GASF and Thanks will do.
11:45 AM
You have to take the test 7 days after the class?
Avatar
Andrew Rathbun 10/9/2020 11:45 AM
You have 4 months to take the test
11:45 AM
You can't attempt to take the test until 7 days after your class ends
11:45 AM
so the first week post-class, just study and index
11:46 AM
unless you have a life and other obligations, then take the test sometime within the first 4 months after the class
11:46 AM
pre-kid, I took the GASF as soon as I could. Post-kid, I really appreciate the 4 month window 😆
11:46 AM
i talk about this here, too
Avatar
Kind of speciffic but hoping someone is out there with an answer. I've got one of the bad batch DigitalIntelligence FREDS from the 2018ish NCFI becert classes. Short version is I get occaisional BSOD when transferring large files around on the RAID. I heard there was a drive fix for it or something but I've updated everything and can't seem to figure it out. Anyone know what I'm talking about?
11:59 AM
hasn't been much of an issue until recently now that I'm doing a pretty large data migration onto some long term storage
12:00 PM
It throws me a watchdog_violation. I can provide dumps if necessary
Avatar
@Beefhelmet I have one as well 18-03 or 05 or something. My raid controller died altogether. I was told the specific batch of controllers had a heat management issue and I was shipped an updated version. I went through DI directly, not Areca. I lost some work but the turnaround was fast and the customer service from DI was great. Good luck!
Avatar
Hey all, wondering if anyone can suggest some good side projects to work on to better familiarize myself with the latest TTPs
Avatar
Hi!! I heard there was digital forensic competitions
7:33 PM
where can i find them>
7:33 PM
?
Avatar
ScottKjr3347 10/11/2020 1:57 AM
Hi!! I heard there was digital forensic competitions
@Dany Here is one for @Cellebrite https://www.cellebrite.com/en/series/beg-dfir/ Tuesday, October 20 | 11:30 AM EDT / 8:30 AM PDT This Week’s Topic: Introducing the 1st Cellebrite CTF – What to Expect, How to Prepare, How to be Successful! Here is one for @Magnet Forensics https://www.magnetforensics.com/blog/magnet-weekly-ctf-challenge/
We’ll be kicking off the Magnet Weekly CTF Challenge for anyone in the community who would like to participate on Oct 5! Find out how to take part.
Avatar
Andrew Rathbun 10/11/2020 3:04 AM
Hi!! I heard there was digital forensic competitions
@Dany #challenges-and-ctfs
Avatar
Hey all, wondering if anyone can suggest some good side projects to work on to better familiarize myself with the latest TTPs
@Bl0ssom In order to stay informed about the latest TTPs it is a good idea to study recent security breaches. This information is not always public and therefore you will need have access to closed sharing groups to learn about those incidents. If you don't have that level of access you can study what's publicly available. There is a lot of great research out there about APT campaigns that provides good insight into the tradecraft used by attackers. Start by building a good RSS reading list. Another great way to learn about the latest TTPs is to closely follow offsec research because those techniques almost always get adapted by threat actors. A great side project that will help you to better familiarize yourself with the lastest TTPs is to analyze interesting samples (malware, attack tools) from public submission platforms like VirusTotal. It's like inspecting the murder weapon during a crime scene investigation. Also make sure to check out the APT section on vx-underground where you can find a lot of interesting samples to analyze: https://vx-underground.org/apts.html
👍 1
Avatar
Morning All, i have a MicroSD memory card (128gb) that i am having troubles imaging. I have changed memory card readers, wires, forensic machines etc. My machine, XRY errors out pretty much straight away and FTK states that "The specified network resourse or device is no longer available (55)". I have tried FTK on another machine (i left it running over the weekend) and after 68 hours, it had imaged 2%. I can see the data in windows explorer and FTK imager no problems. Any ideas how to get an image from this (edited)
Avatar
@Artea Try ddrescue (Linux / Mac). Try both running it with normal flags and then reverse.
👍 1
Avatar
@Artea What error was XRY showing? I know we have seen some cards giving an error if it does not show properly in Windows but if you can browse it XRY should be able to detect it! Weird!
Avatar
@Erumaro Whilst acquiring XRY states that physical extraction is incomplete. During the 'FLASHDUMP' the log shows "Failed reading ......" The memory card is then disconnected and acquisition finishes
Avatar
@Artea Happy to have a look at the log if you could DM it to me to see if we can figure out why it was failing!
👍 1
Avatar
@Cellebrite SSL Cert expired on download page for PA 7.38 ?
😞 1
Avatar
DeeFIR 🇦🇺 10/12/2020 3:25 AM
cdn6.cellebrite.org expired on 10/11/2020.
3:25 AM
Yep
Avatar
Morning everyone, I'm a forensics student and we' ve been given an image from a SanDisk Cruzer. The image has 150 files in Unallocated Space that total up to 1.5GB. I suspect an encrypted/hidden volume, but I can't seem to find anything Magnet EDD does not detect anything and I think the SanDisk SecureAccess might be concealing the data, yet I can't run that software unless it's on a SanDisk thumb drive. Also, inside the unallocated space files, the hex is a repeating "55 AA" for about 1024 bytes, and then switches to "A5 A5" for another 1024 bytes, and then goes back to "55 AA". Anyone have any dealings with this sort of thing?
Avatar
For example, this is what the head of the first file looks like: 0x00000000: AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 .U.U.U.U.U.U.U.U 0x00000010: AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 .U.U.U.U.U.U.U.U 0x00000020: AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 .U.U.U.U.U.U.U.U 0x00000030: AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 .U.U.U.U.U.U.U.U 0x00000040: AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 .U.U.U.U.U.U.U.U 0x00000050: AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 .U.U.U.U.U.U.U.U 0x00000060: AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 AA 55 .U.U.U.U.U.U.U.U
Avatar
@Artea +1 for ddrescue. I use it regularly. For example, an 64GB microSD card that would not image correctly with any other tool - ddrescue recovered all except 33MB of bad blocks. The .bin file can be ingested normally into the tool of your choice
Avatar
Has anyone been able to decrypt threema4.db from an android device? i found an old github script but it has not been updated for the newer versions of threema.
Avatar
I have an IP log from a business website. The suspect has to log in using credentials. His IP address always comes back to T-Mobile, but the last three (IPV4) change. Any ideas why the IP address changes frequently?
Avatar
Anyone spot any DIFR deals on Primeday?
Avatar
@Joe Schmoe the IP Addresses are most likely Natting IP Addresses, which are commonly used by cellular service providers to temporarily assign to their customers for data usage when the cellular device is not connected to a wireless Internet (Wi-Fi) source. It is not uncommon for a completely different Natting IP Address to be assigned during any subsequent data connections by the cellular service provider. Hope this is helpful
Avatar
@robmsp2677 very helpful. Thank you. If the phone is connected to WiFi, I assumed it would show the IP of the router.
Avatar
Correct
Avatar
@Joe Schmoe Just fyi, I recently served Sprint with a search warrant requesting subscriber info on Natting IP addresses assigned to Sprint and they could not provide me with any information because Sprint does not keep logs of Natting IPs. I would imagine that T-Mobile would be the same way, but if you do serve them and have success I would be interested to know that it worked.
Avatar
I am currently examining a GPS tracker and would like some assistance - which channel should I post my question?
Avatar
I am currently examining a GPS tracker and would like some assistance - which channel should I post my question?
@Pacman A physical one? Like the ones in the car? Or a software in a smartphone(for example)?
Avatar
A physical one
8:25 AM
GL300W to be exaxct
8:26 AM
Manufacturer link to device: http://www.queclink.com/GL3000W
Avatar
I think there's no channel that exactly matches that scenario, i would post it here
Avatar
There is a USB connection on the tracker - unsure if there's a software that allows me to see the data on the device
Avatar
Can you plug it on a computer? If yes and you did it, what happens when you connect it?
Avatar
Haven't tried that yet - figured I'd see if anyone can assist before I try anything!
Avatar
I do not know of any software that aggressively scans for storage units to access them, besides the very usual ones like EaseUS Partition Manager, Acronis, etc.
8:33 AM
Those devices usually speak a lot trough the network, i would recommend leaving it unplugged, in a faraday cage if possible and wait 'till someone with more experience on external devices like GPS's can help you.
8:33 AM
You might find valuable resources&info in the #iot-forensics channel
8:33 AM
Not exactly categorically right to your case, but related scenarios indeed.
Avatar
A SIM card has been removed and exctracted - the device is currently turned off and will stay in that state until I've done my research.
8:37 AM
It appears the data is uploaded to a server of you choice and you can access and view the data with a software
Avatar
@FullTang Good to know. Thank you. I’m going to try to reach out to them first and see what they say.
👍 1
Avatar
Looks like the mini USB connection is used for charging and config @Pacman - specifying upload server etc
8:44 AM
This is based on the manual for a GL300 - config only, no mention of retrieving cached data from the device itself
8:45 AM
Can't find any info if there are any storage memory either
8:45 AM
Can't find any info if there are any storage memory either
@Pacman It mentions that it will cache data until network connection can be restored, so there's got to be something, but who knows how small or transient the storage is
Avatar
@Pacman I've had success with GL300 and GL300A. Inside there is some sort of Winbond SPI memory. I contacted the memory chip in-circuit and was able to get a dump. But be careful mine worked with 1.8V Levels. So no dump via Raspi and flashrom. Inside the dumps you will find coordinates. It's fairly simply so I extracted them to a KML file afterwards. (edited)
Avatar
How did you figure out that it was a Winbond SPI memory?
Avatar
You have to open the device and remove the shields from the PCB. Then you can see what's written on the chip. You should be able to find a datasheet on the internet. (edited)
Avatar
Okay, did you reverse the pinouts?
Avatar
No I found a datasheet on the internet. If you got the right one there is a pinout, usually on the first or last few pages. Regarding the shields, I don't know if you've done this before. Naturally you first have to disconnect the battery because you are going to work with heat and power the chip to dump it's content. Speaking of, you are going to need a hot-air station and in the best case a tool to preheat the PCB from beneath to get e good ground temperature (this reduces the delta in temperature you will have to do with hot-air which leads to less tensions on the PCB). Then you are going to heat up the shield with the hot-air station until you are able to remove it. Be careful not to damage any SMD resistors etc. when pulling slightly on the shield. Once it's done let the PCB cool down and take a look at the chip. You will find a description on it. If there is a logo you can compare it with this site: https://www.elnec.com/en/support/ic-logos/ This should help you find a suitable datasheet. Be aware that there is always a RISC of destroying the device which could result in a definitive loss of the data working with heat, physical force... ! If you find a datasheet there will be a marker on the pinout and you will see a dot in the corner of the memory chip. Now you should know the pin layout. I think it's fair to mention that I did this work at the beginning of my career and was lucky enough to have some test devices to practice which I needed because I destroyed the first ones because of lack of knowledge and practice. If you've done this before it's no rocketscience and I'm quite positive you will succeed. If anyone finds a mistake in the process or has additional information please let me know cause i'm not perfect neither. Remember to check the components in your device cause as I mentioned I just used GL300 and GL300A! Finally you should get the memory size from the datasheet. Just pay attention to mbit vs mbyte. Just remembering my rookie mistakes. (edited)
IC Logos of devices supported by Elnec programmers. Logos of IC manufacturers.
Avatar
Anyone spot any DIFR deals on Primeday?
@akula109 Digital Incident Forensic Response? 😆
😋 1
Avatar
Does anyone know how MicroSD cards are named from the factory? I don't have any that haven't been formatted, and trying to see if my hunch is correct.
12:13 PM
BTW if you have a fresh from the factory MicroSD card and can check the default name, that would be appreciated. 🙂
Avatar
@akula109 Digital Incident Forensic Response? 😆
@fancybear That too
12:49 PM
Does anyone know how MicroSD cards are named from the factory? I don't have any that haven't been formatted, and trying to see if my hunch is correct.
@sholmes Is there a brand you are curious about. I have a no name 128GB still in the package that I can provide feedback on.
Avatar
@akula109 not really. I have some external devices listed in a case that I am trying to figure out if the names of the devices is how the factory named them, or does the phone name them this way. I don't have a test device, by my phone doesn't name the card this way. So curious.
Avatar
@Pacman if it has a SIM card then it has cell service. I have had great luck in the past with spytec gps trackers by serving a warrant to the issuing company. I ended up with user info, payment info, regular interval gps info along with battery life etc etc (see when it’s charging up to 100 for potential suspect location) I never tried pulling info off of the device itself because I was able to get everything I needed from the company. If you end up grabbing info from the device, please do a write up on it! Good luck!
10:16 PM
Fwiw the spytec looked pretty similar to yours. I assumed the usb was a charging port, not a data port (though I’m sure it could be)
Avatar
I have images of interest which are located in the cache/webview/default/http cache folder for the LifeHacks application. (com.fireshooters.lifetips) The cookies database on the evidence phone contains URLs for sites consistent with images located. I downloaded the application onto a wiped test phone (not the same model phone or OS. Not sure on version of application either, but figured this is still a starting point). Wasn't able to find a way to use the application to browse the internet. Dumped and analyzed the application and found none of the images or cookies which were found on the evidence phone. Is it possible a web browser was using LifeHacks' web resources right after it was installed? I am trying to figure out how the images/cookies were associated with the LifeHacks program.
Avatar
This life tips app is a free and easy-to-use application contains tons of life tips in different categories such as technology tricks, health and drinks, money savers, etc. With these life tips you can learn a lot of knowledge and tricks to make your life easier and happier. Y...
8:43 AM
maybe pulling content from the other sites?
8:43 AM
like instead of hosting there own images the pull it from someone else
Avatar
chrisforensic 10/14/2020 8:49 AM
good evening @Cellebrite ... just a short question concerning the HASHSET-MANAGER If you update an existing hash database with another hashlist (txt file - MD5), are duplicate hash values filtered out, or is the new list simply appended ❓ (edited)
8:50 AM
Avatar
@akula109 Intersting. I tested the application and all the "life hack tips" are more like slides in a slideshow. It almost appears as if a browser was using LifeHacks web "backend." I wonder if lifehacks pilfers data? Might be worth testing in the near future.
Avatar
@sholmes I wonder if theres a difference with activity like going to the lifehacks website using a browser and then clicking the open in app popup like I get with reddit all the time. Just spitballing.
👍 1
Avatar
I will check that out
1:43 PM
thanks
Avatar
Mr-Protocol 10/14/2020 8:53 PM
@sholmes may want to ban Yuii#7564 spam bot saying "you wont crypto currency sign up at this site, blah blah"
8:53 PM
DM'd me, this is the only mutual server
Avatar
PricklyPete 10/14/2020 8:53 PM
also got another one from this server just now - user ID = ChupetaNegra#3599
Avatar
Can confirm. Also got one from Radical-Mero#7531 (<@!766146274210086932>). (edited)
Avatar
@sholmes I just got one from user I’d 670833922598502422 that only shares this server with me
Avatar
Can send screenshots if needed
Avatar
ditto, Stolwijk#9812 (ID 681050959018983455) messaged me (edited)
Avatar
Mr-Protocol 10/14/2020 8:55 PM
yeah same type of message I got
Avatar
Eternal Night 10/14/2020 8:57 PM
oh cool i'm not he only person who got one of those
Avatar
679606664151826434 - thom_niel sent it to me.
Avatar
Since it seems there are a lot of users in the spambot ring, you can report the user that messaged you to Discord Trust and Safety here: https://dis.gd/report
Avatar
Eternal Night 10/14/2020 8:57 PM
i got one from a guy Merry Oshi #9802
Avatar
Thanks PsynFyr... I'll do that now.
👍 1
8:58 PM
blobthumbsup
Avatar
hey, this dude is spamming darnell03#0246 (edited)
Avatar
Eternal Night 10/14/2020 8:58 PM
same here!
Avatar
hey @sholmes need to ban future213#2291 sent me some crypto giveaway
8:59 PM
Avatar
I shoulda got the ID but I blocked already
Avatar
Same here:
9:10 PM
twich true_toxicToday at 8:56 PM
Avatar
chrisforensic 10/14/2020 9:55 PM
good evening @Cellebrite ... just a short question concerning the HASHSET-MANAGER If you update an existing hash database with another hashlist (txt file - MD5), are duplicate hash values filtered out, or is the new list simply appended ❓
hmmm... does anyone here know the answer ?
(edited)
Avatar
Another cryto giveaway scam
Avatar
Same here:
1:23 AM
1:24 AM
ID: ~ Minkie ~ #7699
1:26 AM
They sure picked an interesting Discord server to target with this stuff
Avatar
@Moderators the user Oliverpool#8384 seems to be sending spam messages to members.
1:32 AM
Avatar
What if it is the moderators
1:32 AM
😮
Avatar
Just reading up, apparently you're already aware!
1:32 AM
What if it is the moderators
@Rob Then we're all doomed
1:33 AM
Great way to see how a server full of techy peeps react
Avatar
Could grab links and start digging
1:33 AM
Might be some btc credentials to pinch!
Avatar
Great way to see how a server full of techy peeps react
@Rob especially a server full of techy, law enforcement, peeps 😉 😂
Avatar
I mean i mean, btc credentials to return to their rightful owners 🙄
🧐 1
Avatar
What if it is the moderators
@Rob got to keep the lights on somehow
1:43 AM
But in all seriousness, thank you to everyone who's flagged up these spammers. We'll remove and block them as quickly as we can
Avatar
Andrew Rathbun 10/15/2020 3:39 AM
Thanks for the swift reporting on that, everyone. We had this happen a few weeks ago. 20-30 random accounts joined at the exact same time, and then people started getting spammed. Same thing apparently happened last night at 2357 EST. I just kicked 25ish "people" from the server.
👍 5
Avatar
Andrew Rathbun 10/15/2020 5:08 AM
There were mutual servers until I kicked them. All someone needs to message someone is a mutual server, so they likely join servers with lots of people and then vomit their spam on lots of people. They likely had a mutual server in common with you for a short period of time until I kicked them
Avatar
I have a question regarding a SANS course I am in right now, is this the place to ask?
Avatar
#training-education-employment perhaps? depends on the question 😄
Avatar
I have a separate location for temporary files when using axiom. Is it ok to delete these temporary files if they start growing too big?
10:13 AM
I use a 256 gb 970 evo plus for temporary axiom files
Avatar
Hiya all. In my college course I've been given an E01 file to analyze, but I can't seem to open it with Autopsy (on Ubuntu). When loading it says it can't determine the file system. One suggestion on the net said to open it as unallocated, which worked, but I can't run any injest modules as the image isn't actually 'opened'. I read also that I had to install Autopsy with libewf, but I'm not sure mine did that. Is there any way to verify or modify the Autopsy installation to allow E01 files to be opened?
Avatar
Hiya all. In my college course I've been given an E01 file to analyze, but I can't seem to open it with Autopsy (on Ubuntu). When loading it says it can't determine the file system. One suggestion on the net said to open it as unallocated, which worked, but I can't run any injest modules as the image isn't actually 'opened'. I read also that I had to install Autopsy with libewf, but I'm not sure mine did that. Is there any way to verify or modify the Autopsy installation to allow E01 files to be opened?
@mrhobbits as a quick check. Use FTK imager to take a quick peak at it. Check if its all ok
10:45 AM
And quite possibly read any accompanying txt info to get a sense of what happened in the imaging process
Avatar
@Rob Yep, FTK loads it just fine and i can see the file sets. FTK shows that its actually a 1TB drive that was imaged with about 20GB of actual data.
Avatar
somnolentus 10/15/2020 8:02 PM
@Moderators looks like @Deleted User is sending out spam messages regarding bitcoin.
8:02 PM
8:06 PM
same message from
Avatar
Deleted User 10/15/2020 8:06 PM
I thought it was a welcome bot for the server, threw me off for a second
Avatar
We gettin’ botted
8:08 PM
8:08 PM
10/10 server choice
Avatar
somnolentus 10/15/2020 8:09 PM
I wonder if they are getting discord oauth and using that to message people only reason i could think of so many accounts getting compromised
Avatar
I came here just cause of the bots
Avatar
Are any of them verified members
Avatar
somnolentus 10/15/2020 8:10 PM
Isn't the user list hidden until you are verified
Avatar
Just to add to the pile
Avatar
somnolentus 10/15/2020 8:11 PM
oof zero mods online
Avatar
option 2: email namecheap
Avatar
@Moderators I got the spam too from 'GodGamer'
Avatar
Just banned all of the above. Keep letting us know who is sending spam
👏 5
Avatar
Anyone currently working under ISO 17025 in UK LE? Could you drop me a message, just have a small query. 😄
Avatar
Andrew Rathbun 10/16/2020 3:57 AM
oof zero mods online
@somnolentus time zones 🙂
Avatar
@Cellebrite - I have a colleague who was imaging a Huawei P30 Pro running Android 10 during the File System process, it rebooted and it is now in a boot loop. Is there a way to get it out ? He tried using exit android recovery mode with cable # 170 and it is not working. Any help ?
Avatar
Just banned all of the above. Keep letting us know who is sending spam
@OllieD I really wanted to win the small lotto
🤣 1
Avatar
@Cellebrite - When exiting the reboot loop, are you supposed to be in download mode or recovery mode ?
Avatar
@Jay528 maybe try asking in the #mobile-forensic-extractions channel?
Avatar
I’ll give it a try
Avatar
@Jay528 depending on what model, you can use the recovery tool built into the UFED to fix the reboot loop.
Avatar
I tried it and it is having issues. Error is "communication failed"
Avatar
what kind of phone?
Avatar
The phone is a huawei Mate 30 pro
Avatar
I'm out....no experience with that one. LOL sorry
9:46 AM
XRY did help us with an iphone recovery not to long ago, maybe they have something for the Huawei
Avatar
thanks, I think the option is to update the firmware w/o erasing user partition
Avatar
Mr. Eddie Vedder from Accounting 10/16/2020 10:52 AM
Any Macquisition users available to help with a quick issue?
Avatar
@deleted-role I have a dongle that expired last year. I believe I have access to 2019 R2. Is the a direct download link ?
Avatar
who here works in DFIR? Im a college student that wants to pursue a career in DFIR.
5:34 PM
I'd like to speak with someone about this so I get a better idea of the field. Either ping or DM me! 🙂
Avatar
Andrew Rathbun 10/17/2020 5:34 PM
@Dany we can chat in #training-education-employment
Avatar
awesome
5:35 PM
thanks!
Avatar
Hey, I've been given a dd image and told that it's a bitlocker image
4:46 PM
But it doesn't have the correct file header
4:46 PM
It just says that it has an invalid partition table
Avatar
did they image just the volume (instead of entire drive)? (edited)
Avatar
Deleted User 10/18/2020 11:46 PM
Does turned off Huawei phones boot if a alarm is set? or does the alarm just start without "booting" the phone? Hope u understand my question 😄 im just thinking if I need to remove the simcard if I have a turned off Huawei waiting for investigation
Avatar
they don't boot up if its off / you have an alarm (edited)
11:52 PM
But you should always remove the SIM either way.
👍 1
Avatar
Does anyone know how to put an android vdi through cellebrite/xry? Not had much luck getting the file system out
Avatar
@Rob @Deleted User We've had huawei's previously where when you turn them off if there's an alarm set you have to tick a box to stop it turning back on again for the alarm. Can't remember the wording but we have had them switch themselves back on before (edited)
Avatar
Deleted User 10/19/2020 5:52 AM
@K23 Thanks for info. This phone(p10) I just recieved randomly booted while it was laying on my desk, and then the alarm started. I was turned off when I recived it so I dont know if that box was ticked
Avatar
Heh who'd have known 😄
5:55 AM
I have a mate 20 pro that I'll test this
Avatar
Deleted User 10/19/2020 5:56 AM
@Rob Thanks!
5:56 AM
If you have an alarm set
5:56 AM
And go to turn it off
5:56 AM
There's a tickbox
5:57 AM
If unticked it will stay off
5:57 AM
If ticked the phone will power on
5:58 AM
5:59 AM
Swear I've had this phone for 2 years now and keep finding new things about it
👍 1
Avatar
Deleted User 10/19/2020 6:06 AM
Yeah 😄 Ive seen this box on Huawei, Honor and Oneplus. But what I was thinking about was, does the phone do a normal boot at the time of the alarm. Or does the alarms just sound and then the phone is turned of again?
Avatar
Boots up less than a minute before the alarm
6:08 AM
Alarm occurs whilst the device / userdata is locked as per usual
6:09 AM
Doesn't appear to turn off automatically
👍 1
Avatar
But either way, the phone is switched on and will be able to send / receive data. From our experience the phones do not switch themselves off
6:14 AM
@Rob was that box ticked by default when you clicked the power button? Or did you have to tick it
Avatar
Deleted User 10/19/2020 6:17 AM
@Rob @K23 Thanks!
Avatar
Anyone hade issues installing UFED Virtual Analyzer 7.32? Always fails on "An issue related to VMWARE.." @Cellebrite ?
Avatar
Dr.Who-IACIS 10/19/2020 6:20 AM
@.karate. I had install issues relating to Microsoft Visual C versions. Cellebrite told me to uninstall a bunch of them and reinstall Virtual Analyzer. I did that and then the rest of my forensic tools stopped working. I had to totally forget about Virtual Analyzer and reinstall all of my other tools.
Avatar
Forensic@tor 10/19/2020 6:20 AM
@.karate. you have to use vmware 14
Avatar
@Dr.Who-IACIS ouch! @Forensic@tor Thanks, ill try that!
Avatar
Is running cellebrite in a VM environment common? I like that idea but I've never considered doing it. Is there a reason? Separation of evidence?
Avatar
@Rob was that box ticked by default when you clicked the power button? Or did you have to tick it
@K23 Ticked by default
Avatar
Dr.Who-IACIS 10/19/2020 6:34 AM
@Neon I believe defense attorneys try the 'cross contamination' of cases issue at times. Running in a virtual gives you the opportunity to use and delete the VM when you are done with it. Many forensic machines are Macs and running a VM is the only way to do forensics aside from boot camp. I did that for a long time but boot camp is just easier, especially when the device you are working on doesn't want to connect or stay connected to the VM.
Avatar
Not sure if there is some confusion here with Virtual Analyzer and using Cellebrite tools in a VM? (edited)
Avatar
@bizzlyg your probably right. But the idea of a VM for evidence seems like a good one. How common is it?
Avatar
Dr.Who-IACIS 10/19/2020 6:40 AM
@bizzlyg Yeah lets split that up. Virtual Analyzer uses a VM and AndyOS (android emulator) to help you visualize data from a device you are examining. Running Cellebrite Physical and 4PC in a virtual machine would give you the ability to use and delete after examination, therefore each exam you have a pristine machine.
👍 2
Avatar
I'm still relatively new to this. I've never virtualized an extraction. Would that be like dumping a a database into the file system then opening the application?
Avatar
@Neon I did this using Parallels when I used a mac as @Dr.Who-IACIS explains, but I am not sure how common it is in general
Avatar
Dr.Who-IACIS 10/19/2020 6:44 AM
@bizzlyg @Neon I don't believe defense attorneys are after forensic machine 'cross contamination' any more. The real issue is knowing the where, how and whys of your case data. If they can't destroy your report, they will try to destroy you on the stand. This is why you need to know where and how that data you located got there and how to completely explain it to a jury.
Avatar
Yeah most likely - when I worked in the UK it was common for them to attack processes - evidence continuity and handling, proper disclosure procedures, data security, imaging methodology and so on but no doubt things have evolved since then
Avatar
Dr.Who-IACIS 10/19/2020 6:49 AM
@bizzlyg Yep. Once they realize your report is solid, hash values are consistent and the process can be repeated in their lab with the same results, that is hard to refute. This is why I tell people to be precise in their forensic reports, all the way down to the sector and cluster (computer forensics). You can't argue with specific locations and explanations.
👍 3
Avatar
Anyone from @Magnet Forensics around to assist with a portal issue?
Avatar
Yeah most likely - when I worked in the UK it was common for them to attack processes - evidence continuity and handling, proper disclosure procedures, data security, imaging methodology and so on but no doubt things have evolved since then
@bizzlyg Got to say that's one of the big benefits of the 17025 faff. As soon as they start down that line you can just state you're accredited, if they have an issue with the process then they need to take it up with UKAS. Complete non-starter
👍 1
Avatar
@K23 yeah I can imagine it has helped at least with this 😄
Avatar
Hello! In company where i am working currently i have UFED 4PC, with unknown for me history. Software has expired license - but it isn't a problem at least for now. Currently i want to test HW and SW and understand it abilities. I think i was able to successfully read images from some phones it is very good sign. However when i tried to parse image i occurred following problem. I installed software from pendrive that i found in bag. It unzipped correctly but there still is some problem. I checked and this file in in folder from path. Anyone knows how to bypass this problem? (edited)
Avatar
Disable the contacts plugin
7:34 AM
The one that cross checks
7:34 AM
Or just reinstall PA
Avatar
Or just reinstall PA
@B I already tried this but doesn't help. Will try to disable plugin
Avatar
UFED Virtual Analyzer 7.32 still not working. Tried with VMplayer 14,15 and 16. Seems to be some kind of trouble with the included VIX config.
Avatar
@stark4n6 DMing
Avatar
somnolentus 10/19/2020 9:45 AM
A few months ago, I discovered a remote code execution issue in the Discord desktop application and I reported it via their Bug Bounty Prog...
Avatar
@stark4n6 Your portal issues should be good now. We had a portal issue as a whole not just you that has now been rectified.
Avatar
@Jamey thanks!
Avatar
Anytime. let me know if it is not squared away.
Avatar
DefendingChamp 10/19/2020 1:23 PM
Does Microsoft or any vendors that have any security/DF certs aside from Cisco, Axiom and Cellebrite that I may have overlooked?
1:24 PM
Looking to do some studying and certifying some new stuff. Not sure what's out there that doesn't cost an arm and leg like the SANs training
Avatar
Andrew Rathbun 10/19/2020 2:36 PM
@DefendingChamp #training-education-employment
Avatar
Follow up on my post on "UFED Virtual Analyzer 7.32 still not working". I got it to work. What i did was to install VMWare player 14.1.8 ( That specific version works ). I then installed Virtual Analyzer, but when the installation process started to check for VMware version i quickly made a copy of the Andy folder that was located in "C:\Program files\Andy". Reason for this is that whatever i did, the installation always failed on this step and removed the Andy files. I also tried to edit vixwrapper ( see below ) but it didnt help. I then manually copied the Andy folder ( the one i copied from the installation ) back to "C:\Program files\Andy". Last step was to edit the file "c:\Program Files (x86)\VMware\WMware IX\vixwrapper-config.txt". I replaced the value "14.0.0" with the version of VMware installed "14.1.8". I was then able to start Virtual Analyzer from inside PA.
👍 2
Avatar
A Snapchat video extracted from a Samsung Galaxy A51 was found to be relevant to investigation, and will be relied on in court. The question was is it possible to say the snapchat video was recording using Samsung Galaxy A51? (As opposed to having received the video from someone else)
11:56 PM
Filepath is: /data/media/0/Snapchat/Snapchat-1861604616.mp4
11:57 PM
I mean, I would've said the fact that it is stored on the handset within folder 'Snapchat' answers itself, as any received videos via snapchat are automatically deleted?
Avatar
CloudCuckooLand 10/20/2020 3:22 AM
Can someone with iCloud knowledge help? I understand that iCloud backups often only record the changes, with that in mind: If I untick a data type in my iCloud backup options in settings (such as Calendar) then prompt a manual backup, will that delete the saved calendar data from the backup being updated? Or will it be left in place, just not checked/synced?
Avatar
@Pacman Pictures in the Snapchat folder can be pictures saved from a chat
Avatar
@Pacman the filename looks like a time stamp, I would check the activity from the device relative to that time (as well as the modified/created time of the file itself) to see if you can get some context
Avatar
well, maybe not. not coming up with anything reasonable in dcode.. i doubt the string is random though, it has to mean something
Avatar
Could be an account ID
Avatar
Anyone know any good Linux antivirus?
Avatar
Anyone know any good Linux antivirus?
@ned7778 Never used it but many people recommend Clamav
3:29 PM
i personally used one nameless manual AV from Sophos, worked pretty good
Avatar
@AndroBit ah yes i know sophos. I tried to request trial but it keeps saying i already have trial in my pc and it has send me the email verification with a license when it hasnt. Probably will try again soon. (edited)
Avatar
Mr. Eddie Vedder from Accounting 10/21/2020 5:05 AM
Anyone have the installer for Axiom 3.11.0.19007? I need to process a device with that specific version. @Magnet Forensics
Avatar
@Mr. Eddie Vedder from Accounting I can help you out. Sending you an email
Avatar
Does anyone know how does Microsoft Vista store the "Notes" widget and the location ? I searched for the known locations and did not find any database or text file.
Avatar
Andrew Rathbun 10/21/2020 7:15 AM
@Jay528 are they the same as sticky notes in W10? I made a KAPE target for those
7:15 AM
I could always spin up a W8 VM and find out myself
7:15 AM
Err vista I mean
Avatar
you got a few mins to DM ?
Avatar
Andrew Rathbun 10/21/2020 7:15 AM
Sorry I read it as Vista but interpreted it as 8 in my mind
7:16 AM
It's early
7:16 AM
Sure
Avatar
Has anyone ever heard of a warrant to snapchat where Snapchat would give updates for all activity (snaps, messages, locations, etc) on a suspect account to a LE email address approximately every fifteen minutes? I heard it claimed during an investigation last week. It's not something I've ever heard of them doing, but I imagine it's something they theoretically could do with the right legal authorization (edited)
Avatar
Andrew Rathbun 10/21/2020 10:52 AM
Has anyone ever heard of a warrant to snapchat where Snapchat would give updates for all activity (snaps, messages, locations, etc) on a suspect account to a LE email address approximately every fifteen minutes? I heard it claimed during an investigation last week. Jt's not something I've ever heard of them doing, but I imagine it's something they theoretically could do with the right legal authorization
@Solec sounds like an emergency situation would warrant that
Avatar
Thanks, going to imagine the typical gang shooting probably wouldn't be justified from their end to support it
Avatar
Andrew Rathbun 10/21/2020 10:56 AM
Thanks, going to imagine the typical gang shooting probably wouldn't be justified from their end to support it
@Solec That would be a safe bet, in my opinion 🙂
10:56 AM
I think a threat to life and limb would have to be active and ongoing
10:57 AM
with proper articulation for the Snapchat app's involvement and why 15 minute updates would be instrumental in saving said life and limb
Avatar
"There's a shooter on the LOOSE!" (who's been on the loose for a while now with no credible threats to the public 😉 )
😆 1
Avatar
"By far the best thing to do for spoofing your IDs and the best privacy line of defense in general for android is editing the build.prop file, there are many things you can do in build.prop including disabling location....." I should say ##8255## didn't work on my android but who knows.. https://www.reddit.com/r/privacy/comments/bo0ixj/spoof_your_your_fucking_ids_android_root/
Avatar
Anyone familiar with Symantec smtpprevent logs ?
2:24 PM
Trying to understand what the value disposition=Pass vs disposition=Modify
Avatar
Has anyone done any testing with Samsung FDE and FBE (CE and DE) with regards to activity and network connection prior to being unlocked? I have an extraction that leads me to believe the handset was "started" at 13:25, however I have a BSSID value and "missed call" SMS delivered timestamps showing 13:08 (13:25 main timestamp).
Avatar
@claireh check out /data/log/sdp_log for login activity. In /data/log/wifi/iwc/iwc_dump.txt you can find info on Wifi etc. Under /data/log/batterystats you will find logentries that will show activity and intents etc etc on the phone.
1:38 AM
Then you can check out the db's that reside in CE / DE area and validate the sms to see the state of device when received.
👍 1
Avatar
@.karate. managed to use ALEAPP which translated batterystats nicely and showed EXACTLY what I needed. Thank you very much for your guidance
👍 2
♥️ 1
Avatar
forensicmike @Magnet 10/22/2020 5:46 AM
@Brigs 👆 👏 🥳
android2 5
Avatar
Hello everyone, so I know that digital forensic usually takes the spotlight as far as what cybersecurity skills are needed in law enforcement but out of curiosity, what other fields of cybersecurity are also needed?
Avatar
Does anyone know if it's possible to find any device information that would be able to be subpoena'd to a provider to identify a device's cellphone number from a receipt for a prepaid iPhone from Walmart? There's a couple numbers on here that don't appear to be an imsi / imei / iccid. It looks like it may contain a 40 character Apple device UDID (listed as "UNIQUE NUM"), however if I recall I issued a subpoena to Apple for a UDID several years ago and they told me they couldn't provide accounts associated via UDID. There's two specific lists for "phone card activated#" followed by 18 digit and 14 digit numbers, a "POP#" 24 digit number, and a "voided serial #" 19 digit number I'm not sure represent. I can DM a sanitized copy of the receipt for reference if needed.
Avatar
I guess one way to check would be to look at a former Apple return and see if any of those numbers are represented in the subscriber info portion... I don’t have direct experience with that sans phone number.
Avatar
Hello, I am a I.T. Security Student. I actually achieved my C.E.H. certification a few days ago, and I am running a Kali VM so I can do labs online in order to practice and better my foundations. I am also taking Data Forensics courses and I was wondering if there was a set of tools you guys would recommend so I can use them not only when I go into my line of work, but also get an idea for how they work and familiarize myself with them ahead of time. I will be busy a lot of the day tomorrow, but my DMs are always open. I am off to bed, if you guys have any ideas for me. I appreciate all types of feedback as I am new and just have an itch to learn and better myself. Thank you for your time.
Avatar
Hi all, wondering if anyone found a work around for this issue? I'm trying to export data from O365 ediscovery but it hangs on "Preparing Data..." Same day I've successfully exported a smaller file set and a larger one. This one is 15.86gb of data. I've tried multiple browsers, multiple computers, restarting exports, re-running searches, asked a coworker to try with their log in, tried exporting with different settings options and tried from Content Search and from eDiscovery Hold. But I can't get past Preparing Data... On this export. I've also just tried letting it sit for 12+ hours but it didn't budge. Any thoughts or if someone has seen this and solved it?
Avatar
Try even a smaller data set
11:19 AM
might be a corrupted record giving you problems
Avatar
I tried going further into the folder structure but am getting the same issue
11:53 AM
I got down to about 7gb
11:53 AM
Before it stopped recognizing the SharePoint link
11:54 AM
Trying different sp path so hoping for progress ;_;
Avatar
I did get access to the SP today but just downloading straight as worst case doesn't even work. It won't download the whole set or folders themselves. When I try to include a folder it invalidates the zip. But going through folder by folder is a lot of time eaten up and not really forensically sound.
Avatar
Our solution was to go back to the core directory so now we're exporting 43gb of data and we'll whittle down whatever that gives us.
Avatar
Hi all, I'm looking for a storage solution for my company, basically a simple setup for about 50TB of data. I wanted to check, if it's possible to get a 4/5 HDD bay enclosure and use Windows storage spaces to configure them as a raid configuration for redundancy? One thing I'm not too sure, will Windows see the HDD bay as a single volume or multiple 4/5 volumes when initially installed in a HDD bay? Is such a configuration known as JBOD? My understanding of JBOD is that it combines all HDD as a single volume.
Avatar
@duiod I do not know about Windows solutions but one important question that would serve the people that know Windows is: Do you intend to scale in the future? Will you add more HDD's in the future?
Avatar
@duiod I have used synology 8 bay nas diskstation. 10tb disks with 3 disk redundancy giving me 54tb of storage. Easy to setup and easy to use. I highly recommend Synology Nas boxes
👀 1
👍 1
Avatar
@Andronidas thanks for highlighting. The setup should be scalable, probably will go for larger bay setup though it might not be used atm.
8:39 AM
@Dfdan thanks for the reccomendation. Will check out their products.
Avatar
https://www.scmagazine.com/home/security-news/ransomware-groups-are-going-corporate/?web_view=true Lol, if you want to click on the link it’s talking about how some ransomware groups not have things like “24/7 Customer Support” to help with payment processing. Amongst other more corporate type functions
As ransomware attacks have quickly morphed over the past few years into a billion-dollar business, the groups behind them are increasingly adopting the practices and tactics of the corporate businesses they target.
👍 1
Avatar
I have an iPhone 6s running iOS 12.1. I would like to update to iOS 13 and not to iOS 14. I've not been able to using an unsigned ipsw file in iTunes (as expected). The update keeps failing. Any recommendations?
Avatar
@uochaos you can't do that unless someone saved SHSH files when iOS13 was still being signed. Currently, only iOS 14 and 14.0.1 is signed and you can only update to those versions
Avatar
Thanks for confirming that. @Arcain
Avatar
Cellebrite Physical Analyzer Dramatically reduce the amount of time needed to review images with the new Image Classification engine in Cellebrite Physical Analyzer 7.39.  The new Image Classification capability can flag suspicious images and find photos of a person or an obje...
👏 1
cellebrite 1
Avatar
for USA LE folks - can a 18 USC 2705(b) delayed notice order be written into a search warrant or do they need to be separate documents? I don't have experience with it and I'm needing to apply for one.
Avatar
@whee30 Ours "State Warrant" is written into it. Several options are on it and it must meet one of the options and the judge must sign off. (edited)
👍 1
Avatar
@whee30 Our State warrant for records have a included non-disclosure order on almost all of our warrants to ISPs. We simply articulate in the affidavit in standard boilerplate language that the investigation is ongoing, its easy to destroy digital evidence, and our investigation can take 3 or 6 months longer. This also gets us a order to seal the record so the media doesn't get ahold of our affidavits before an arrest is made.
👍 1
Avatar
any @Cellebrite folks around to answer a quick question about checkm8
Avatar
CLB - DavidK 10/29/2020 5:48 AM
@Sudo Yes, Feel free to DM me
Avatar
@Law Enforcement [UK] ISO question - anyone testing faraday bags and boxes? If anyone is doing this amazing bit of work then drop me a DM please 🙂
😫 1
Avatar
I've slid into said DM's.
Avatar
Look at all this interest
7:36 AM
I am flattered
Avatar
Just bought 2 boxes for our unit
Avatar
@ApC I'm coming too ........
Avatar
Still testing and writing the ISO docs I believe
Avatar
Only because they think they'll get a free UPS from you if they answer quickly
7:39 AM
You wont be flattered by the amount fo work you will have to do!
Avatar
@Zhaan better than any interest that youve had my friend!
Avatar
Nothing changes 😢
Avatar
Already established with a few mins of messages
Avatar
A reliable source tells me Faraday is so 80's, Aldi tin foil is the way ahead, remember where you heard it first (edited)
Avatar
@Stevie_C Speaking of, we've still got a transit ready to pick something up... 😄
Avatar
@Stevie_C yeah!
7:43 AM
@Stevie_C nice little retirement present, make a great shed
Avatar
@K23 @Zhaan I'm surprised you haven't been over yet to dismantle and steal our old Faraday Suite. Last I heard it was still sitting intact in our old building !!
Avatar
@Stevie_C along with the La-Z-Boy, smoking jacket and slippers
Avatar
I still use the Mission Darkness app for day to day testing of our Faraday Kit. That and my own phone !!
7:46 AM
@Zhaan 224 days and counting ....................
👍 2
Avatar
@Stevie_C what a leaving do, I cant wait...
Avatar
Depends on Covid. You're not the first from across the river to say they would come !! Don't think they want to say goodbye to me, more like they just want an excuse for a trip away and beers in Belfast !! Or maybe they do want to come to make sure I go !!
👍 1
Avatar
I am up for a party 🙂
Avatar
Any recommendations on a plist viewer for windows?
Avatar
@whee30 we use plist explorer. It's fine. Ringing endorsement 😂
Avatar
Oxygen has a build in plist viewer
Avatar
ScottKjr3347 10/29/2020 5:22 PM
Any recommendations on a plist viewer for windows?
@whee30 Mushy Plist viewer. Also check out @CLB_iwhiffin blog about plists gave me great insight https://doubleblak.com/blogPosts.php?id=3
Avatar
Plist Editor Pro (I used free one) works pretty good too
Avatar
Andrew Rathbun 10/30/2020 3:18 AM
Plist Editor Pro (I used free one) works pretty good too
@stark4n6 Mac only?
👍 1
Avatar
@stark4n6 Mac only?
@Andrew Rathbun nope use it on Windows
5:48 AM
I failed to realize that is a super generic name, I use iCopyBots https://www.icopybot.com/plist-editor.htm
Windows software for reading and edit Mac plist file.
Avatar
Andrew Rathbun 10/30/2020 5:49 AM
https://www.fatcatsoftware.com/plisteditpro/ This is what I found when I was searching for it lol, thanks for the link
PlistEdit Pro is the most advanced property list and JSON editor written for OS X. Avoid syntax errors, find and replace, full undo, keyboard navigation, scripting support, and much more.
🙃 1
Avatar
@Moderators What does the party emoji under server stats indicate?
Avatar
Andrew Rathbun 10/30/2020 9:04 AM
@Moderators What does the party emoji under server stats indicate?
@Cole days until server anniversary/birthday
CBPotatoWobble 3
Avatar
Thats what I thought but thank you!
Avatar
Andrew Rathbun 11/1/2020 7:56 AM
Thank you @Deleted User for the boost!
👍 1
Avatar
Does anyone know of any good papers related to Microsoft SQL server DBMS, in terms of digital forensic artefacts or any security issue. Thanks
Avatar
Andrew Rathbun 11/2/2020 4:44 AM
Thank you for the boost @ShadowTruth!
Avatar
ShadowTruth 11/2/2020 4:45 AM
No problem @Andrew Rathbun 🙂
Avatar
Andrew Rathbun 11/2/2020 4:46 AM
23 more hours until we lose level 3 perks (edited)
Avatar
JeezyCreezy 11/2/2020 5:22 AM
@Magnet Forensics are you able to provide any documentation relating to possible performance benefits of leveraging GPU processing? Our virtual workstations aren’t currently specced with a ‘discrete’ GPU so I’m hoping to put forward a case to management if we stand to gain significant performance increases.
Avatar
The benefits will really only be seen if you’re using Magnet.AI re: GPU. I can DM though and try to advise on biggest bang for buck.
Avatar
Anyone know if OpenText keep a version history and release date record publicly available?
Avatar
@Government [US]
7:43 AM
That didn't work...
7:44 AM
Anyone from the U.S able to answer a couple of questions on your legislation for me?
7:44 AM
Or even a point in the right direction?
Avatar
@Government [USA]
🇺🇸 2
Avatar
Andrew Rathbun 11/3/2020 8:03 AM
Feel free to ask away
Avatar
@Pseudonym ask away. I’m fairly certain I can send you in the right direction if I don’t know the specific answer.
Avatar
I'm writing a paper on investigations using TOR and looking at the Silk Road/Ulbricht case and also the Silk Road 2.0 use of a NIT. Both required U.S law enforcement to be able seize and analyse the server, or seize and maintain control of it.
8:06 AM
If those servers were located abroad, would there have been a mechanism for them to still do that, or, would it no longer have been possible?
8:08 AM
About as much as I can find at the moment is a Council of Europe/UN treaty for cyber crime co-operation, but then I assume it would be the host nation would conduct seizure as part of interpol
Avatar
Yeah I would think there would have to be some sort of treaty that would set forth the process for such a seizure. Also, my assumption would be that the host nation’s police force would be responsible for the seizure. Also, something to look into would be whether the host nation’s police would be acting as “agents” of U.S. law enforcement i.e. that they are acting at the direction of some U.S. agency. (See https://www.law.cornell.edu/wex/agency) The local or host law enforcement agency would then return the server to the U.S. agency for analysis. I hope this helps since it is just me making an educated guess at the process (I work on a state level and have very little to do with international or federal processes and statutes).
Avatar
Perfect, thanks for that.
8:44 AM
I'll take a look there, from what I can see the U.S has agreed to the Council of Europes Convention on Cybercrime, I think that may be an avenue to look at as well
Avatar
I would imagine the scenario would be vastly different entirely depending on country, The Mutual Legal Assistance Treaties should dictate what types of crimes and what sort of assistance would be available
Avatar
forensicatrix 11/3/2020 11:13 AM
@Pseudonym I'm not sure if this would fully apply in your case, but the Cloud Act might be something to look into. It basically allows federal law enforcement to compel US service providers to turn over their server contents under the authority of US search warrants regardless of the physical location of said servers. However, it is a fairly new law and rather contested since US data protection laws are significantly laxer than some others (e.g. EU GDPR) and many countries also claim jurisdiction over any data physically stored within their borders, so complying with the Cloud Act could result in a service provider being in violation of the server's host nation privacy laws. It also only applies to servers administered by US providers and wouldn't allow for control, just a data dump that could be analyzed later. Certainly not a catch-all solution, but could be a possibility for the right set of circumstances.
Avatar
Doesn't apply to this, but definitely interesting, I think the UK are implementing it under IPA laws, delayed due to a bat sneezing on some bloke.
11:21 AM
Could be a very tasty subject for an MSc dissertation!
Avatar
forensicatrix 11/3/2020 11:50 AM
^did two of those. It's someone else's turn x)
Avatar
Deleted User 11/4/2020 2:13 AM
I wanna do a Malware scan in UFED PA. Where can I download Malware database?
2:15 AM
or is a Malware database already integrated in PA?
Avatar
Tools -> Scan -> update
💯 1
Avatar
Deleted User 11/4/2020 2:27 AM
Thanks!
Avatar
Nice banner
Avatar
Hey guys, I am looking at getting a nice pelican case (or something similar) for my @Cellebrite UFED Touch to make it a little easer to transport. What does everyone use other then the case it came in?
Avatar
Hey guys, I am looking at getting a nice pelican case (or something similar) for my @Cellebrite UFED Touch to make it a little easer to transport. What does everyone use other then the case it came in?
@goalguy we use a banker's box...
8:41 AM
It definitely doesn't look sexy but theres no latches to undo in tight spaces. We've used pelican cases too but honestly the cardboard box is the most convenient 😂 (edited)
Avatar
Thanks for the idea @Cole We have some Banker's Boxes laying around so I like the cost 😀
Avatar
Yeah also free!
Avatar
Harbor Frieght has knock off pelican cases
Avatar
Hello ! I just want to take a few minutes here in this community to thanks @Cellebrite Ottawa, @CLB-dan.techcrime and @CLB-Paul. Story : Saturday night there was a suspect in medieval clothing killer 2 and injured 5 in sword attack. In the morning of Sunday I received an email from them to offer us help with cell phones if needed. Our tech crime unit immediately felt their support to help us solve this heinous crime. Gestures like that show you're mission at Cellebrite : Safer World ! Once again thanks you guys! 😉
💯 12
cellebrite 9
👍 4
🇨🇦 2
CBPepeSaberDance 2
Avatar
Andrew Rathbun 11/4/2020 5:46 PM
Awesome collaboration! Thank you for sharing the story!
👍 1
Avatar
Wow! Awesome work boys
Avatar
Right on! Awesome to see you forensic companies and LE working together like that
Avatar
CLB-dan.techcrime 11/4/2020 8:25 PM
We're both former law enforcement... hard to resist chasing an ambulance 😊
💯 4
Avatar
Merci Steph, we're here to help 🙂 (edited)
👍 1
Avatar
@Magnet Forensics Is there a link available for the webinar which took place during the Magnet Virtual Summit 2020 for Chromebook analysis. This went over current research and methodology. Was a good watch, and looking to send it on to a colleague. 🙂
magnetforensics_alt 4
Avatar
Andrew Rathbun 11/5/2020 4:11 AM
We're both former law enforcement... hard to resist chasing an ambulance 😊
@CLB-dan.techcrime I can totally relate. I don't think that you ever lose that once you leave LE
💯 2
Avatar
@3X3 Absolutely! That was me, so feel free to reach out if you have any questions. Here is the video https://www.magnetforensics.com/resources/taking-a-byte-of-chromebook-analysis-mvs-may-5/
A new challenge of forensics is upon us as Chromebooks become more and more popular. One of the challenges is understanding the difference obtained from different types of acquisitions as well as the cloud. Due to this challenge, a group of 30 forensic examiners came together ...
magnetforensics_alt 1
👍 1
6:10 AM
From an acquisition of Chromebooks - please check out this post on DFIRReview https://dfir.pubpub.org/pub/inkjsqrh/release/1
magnetforensics_alt 2
👍 2
Avatar
Forensic@tor 11/5/2020 7:25 AM
I have been asked an interesting question, so I have come to the braintrust. Does anyone know of a program or process that can capture FB Live Video automatically? We have been having a run on criminals going live and committing crimes, but immediately delete the video after it ends. I have investigators who monitor several individuals, but have to sleep sometimes. They are looking for something that can detect when an account goes live and captures the video stream. Anyone?
Avatar
I have been asked an interesting question, so I have come to the braintrust. Does anyone know of a program or process that can capture FB Live Video automatically? We have been having a run on criminals going live and committing crimes, but immediately delete the video after it ends. I have investigators who monitor several individuals, but have to sleep sometimes. They are looking for something that can detect when an account goes live and captures the video stream. Anyone?
@Forensic@tor Havent heard of programs that specifically do that, but from a developer perspective that does not seem complicated to do, let me ask some friends that might have experience developing for Facebook
Avatar
@Forensic@tor
I have been asked an interesting question, so I have come to the braintrust. Does anyone know of a program or process that can capture FB Live Video automatically? We have been having a run on criminals going live and committing crimes, but immediately delete the video after it ends. I have investigators who monitor several individuals, but have to sleep sometimes. They are looking for something that can detect when an account goes live and captures the video stream. Anyone?
@Forensic@tor Havent heard of programs that specifically do that, but from a developer perspective that does not seem complicated to do, let me ask some friends that might have experience developing for Facebook
@Andronidas I would agree with this. Are the Facebook profiles in question public?
Avatar
Forensic@tor 11/5/2020 7:53 AM
some will be others won't
Avatar
some will be others won't
@Forensic@tor I wold imagine that will make it a little more difficult. Is a warrant/subpoena an option to Facebook? I would imagine even if the user deletes the video Facebook would still have it on their servers and divulge that on a court order.
Avatar
Forensic@tor 11/5/2020 7:56 AM
Of course, the problem is we don't know about the live video if we are asleep, so hard to go get something you don't know about.
7:57 AM
I suggested to serve preservation requests on the accounts in question. I would hope that FB would retain the completed video and if discovered, they can serve legal processes.
Avatar
I suggested to serve preservation requests on the accounts in question. I would hope that FB would retain the completed video and if discovered, they can serve legal processes.
@Forensic@tor That was my thought exactly
Avatar
Digital watermarks ("yellow dots") of printers are only included in prints but not in scans, right?
Avatar
anyone ever come across "scrambled" messages before
2:30 AM
scrambled in both the parsing and in the original sqlite
Avatar
CLB-drorimon 11/6/2020 3:49 AM
@Sudo if you refer to WhatsApp messages decoded from v5f db by PA, this is a search index db, which stores the text of the messages in a way efficient for text search, that keep all words but don't preserve the order.
4:08 AM
we came to that conclusion too
Avatar
@Cellebrite I need to get ahold of someone today to purchase another license. The grant is about to expire. Our sales rep isn't answering the phone today. Can you please have someone contact me ASAP. Thanks
Avatar
CLB-dan.techcrime 11/6/2020 8:23 AM
I'm on it! The sales rep is off today but his manager is going to reach out... (edited)
Avatar
Hello, I don't really know where to ask this question, but I'm trying to find information on mobile data retention in Nevada, by law enforcement and communications companies
9:40 AM
Let's say for example, someone calls a person in Nevada, is any information registered, and for how long is it available to LE?
Avatar
Andrew Rathbun 11/6/2020 9:42 AM
@// it depends on the carrier. They all have different retention periods
Avatar
Is there a way to find these periods by carrier, or maybe just an estimated average?
9:44 AM
Nevermind, I was searching for "mobile data retention Nevada", hoping it would be generalized there, but I'm finding more information when searching for mobile carriers (edited)
9:44 AM
Thanks for the information
9:45 AM
Found this if anyone's interested
Avatar
Andrew Rathbun 11/6/2020 9:53 AM
August 2010 FYI
9:53 AM
I bet that's changed about 40 times since then
9:54 AM
but that'll give you an idea of the variance between carriers and what to expect, at least
Avatar
Yeah, I couldn't find more recent sadly, doesn't seem to be public information
Avatar
Does anyone know html? I have a basic understanding, but I'm trying to learn if I can determine when a change has been made to an element of a page.
Avatar
Deleted User 11/6/2020 3:14 PM
you cant tell that from the source itself maybe see if your guy used some sort of source code management like git? pretty uncommon for a dev not to use
3:15 PM
if your html files are in some sort of project like a visual studio one, they can maintain logs on historical changes
Avatar
sometimes the httpd will mention when the file was last modified, but dynamic page content etc... messes with that (as would any other change)
Avatar
Anyone have an idiots guide on creating and using GRIFFEYE cases. I have some investigators who want to use and before I knock a guide up, thought I'd ask here. I'm UK LE.
Avatar
We have one
6:25 AM
I can send it to you Monday if you want
Avatar
@Rob yes please. I'll PM you in a bit
👍 2
Avatar
does anyone know how I can tell if tunneling traffic is legitimate in wireshark? Teredo over IPv6 tunneling is being used.
Avatar
I need to get a hold of a moderator
2:58 PM
@Andrew Rathbun ?
Avatar
Andrew Rathbun 11/7/2020 4:27 PM
@returnip pm me
4:27 PM
You can always @Moderators
Avatar
pro tip- use cat photos when your professor asks you to create a test evidence disk. At the end of every successful imaging, you get rewarded with cat photos
💯 2
Avatar
cats in wigs
5:21 PM
similar payoff, just more amusing
Avatar
Hello 👋 we want to build our own forensic server for Axiom and Encase processing. I’m searching for example configurations, maybe someone could help me out 🙂
Avatar
DeeFIR 🇦🇺 11/9/2020 2:58 AM
@Jaran DM incoming.
Avatar
Random question, but anyone have any spare power supplies? Ideally 1200w
Avatar
wibblypigftw 11/9/2020 5:23 AM
Anyone know how to force Encase (8.10) to see a Checkpoint encrypted image and prompt for credentials? It did it first time but I didn't have the recovery file to hand, and now it just opens the image and shows me 2 'unallocated' partitions. Tried creating a new case, re-adding the image etc but it's just not playing
Avatar
Deleted the evidence cache file? (edited)
5:30 AM
Then remove them from the case and readd
Avatar
wibblypigftw 11/9/2020 5:33 AM
I'll try that now, thanks
Avatar
wibblypigftw 11/9/2020 5:41 AM
That worked - much appreciated. I very seldom use Encase these days and I'm just not familiar with the current tweaks and hacks it needs. I only really use it for decrypting Checkpoint stuff and reimaging, everything after that is done elsewhere.
Avatar
wibblypigftw 11/9/2020 6:15 AM
Weird...it asked for the user/pass and recovery file, had a think and now i
6:16 AM
it's just showing me the same 'unallocated' partitions. Tried reopening the case - any suggestions?
Avatar
No idea there, not used to checkpoint
👍 1
Avatar
MrMacca (Allan Mc) 11/10/2020 3:10 AM
NUIX users? Does anyone know if we are on version 8.8 and version 9 is released, do they need to be migrated? or will it work the same?
Avatar
Dr. Kaan Gündüz 11/10/2020 3:14 AM
hi, the Latest stable release is 8.8.5.356
3:14 AM
on the website
3:15 AM
when we upgraded from 7 to 8 we had to upgrade our cases as well
3:15 AM
it took 3 weeks
Avatar
MrMacca (Allan Mc) 11/10/2020 3:16 AM
They mentioned that from a specific version of Nuix 8.* that migration was no longer needed, but they haven't made any comments whether this is the same when jumping to the soon to be released 9 version. So just wondered if someone else had asked them and had an answer
Avatar
Dr. Kaan Gündüz 11/10/2020 3:16 AM
you can ignore me then 🙂
Avatar
MrMacca (Allan Mc) 11/10/2020 3:16 AM
so from 7 to 8 = migration required. then onwards hoping it has changed. we've contacted them but had no response yet
3:16 AM
Thanks for replying though @Dr. Kaan Gündüz 😄
3:17 AM
I'll try and contact them again
3:17 AM
as like you said, migration takes weeks if not months
Avatar
Dr. Kaan Gündüz 11/10/2020 3:17 AM
nuix has been using an old version of elasticsearch
3:17 AM
and after a long time, they upgraded to meet a recent version
3:18 AM
in order to keep the database structure, you had to upgrade your cases
Avatar
MrMacca (Allan Mc) 11/10/2020 3:18 AM
So it sounds likely the migration is required again moving from 8 to 9.
3:18 AM
thanks, interesting to know that
Avatar
Dr. Kaan Gündüz 11/10/2020 3:18 AM
but since elasticsearch is still at v7.9.3
3:18 AM
i don't think that would be necessary
3:19 AM
6->7 was a big deal
3:19 AM
7.x->7.y i don't know
Avatar
MrMacca (Allan Mc) 11/10/2020 3:19 AM
yeah that one took us 3 months in some cases
3:19 AM
was awful 😄
Avatar
Dr. Kaan Gündüz 11/10/2020 3:19 AM
i hear you mate
Avatar
Should I be using hash lists to sort/remove system images when analyzing photos in Physical Analyzer?
Avatar
We do (edited)
2:05 PM
Lets us redact known ignorable files
Avatar
@Rob Where would I get those hash lists? (edited)
Avatar
Andrew Rathbun 11/10/2020 4:46 PM
@Rob Where would I get those hash lists?
@FullTang either from NIST (NSRL) or you can pay for a subscription to hashsets.com and use those
👍 1
4:48 PM
You will point AXIOM to these during the Process process (lol) and it will take a long time to iterate through all the hashes so know it'll delay the Process process (lol again) quite a bit, but it should be a one time thing once they are added.
Avatar
Hey all!
5:53 PM
so I made a blog a few weeks back about my journey in DFIR along with a few of the things Im learning in my forensic classes. I posted a blog about basic uses Wireshark for network forensics
5:53 PM
Hello Everyone! This week I want to talk about how we can use Wireshark for forensic purposes. I'm currently taking a class called Network Analysis that talks about this very subject! In this blog...
Avatar
Good job blogging about it!
Avatar
@Rob Where would I get those hash lists?
@FullTang Sorry fell asleep, we have a copy of our CAID database hooked up to most of our forensic tools. Quickly helps identify positive exhibts / gets rid of the trash files.
👍 1
Avatar
Nullable Truth 11/11/2020 4:04 AM
@Magnet Forensics Hi, I'm currently in a WFH position and need to gain access to Magnet Acquire. May some one help me get a copy of it through the official portal.
Avatar
@Nullable Truth if for whatever reason you can’t access the portal reach out to our support team and they can likely hook you up.
Avatar
@Andrew Rathbun @Rob Thanks for the info!
Avatar
Deleted User 11/11/2020 6:29 AM
What files should I check on Samsung devices to find out when it was wiped? (galaxy s7 and galaxy s9)
Avatar
heatherDFIR 11/11/2020 6:45 AM
check out the for585.com/poster.
👍 1
Avatar
Nullable Truth 11/11/2020 7:00 AM
Thanks @MF-cbryant
Avatar
Andrew Rathbun 11/11/2020 7:09 AM
FYI all, this server and other DFIR community resources were highlighted in a Forensic Focus article that was published today: https://www.forensicfocus.com/articles/knowledge-sharing-and-transfer-in-digital-forensics/
Sharing is at the heart of any community, and no less so in digital forensics and incident response. Sharing helps ... Read moreKnowledge Sharing And Transfer In Digital Forensics
👏 6
CBPoggies 1
💯 1
👍 1
Avatar
What resources are people in the US generally using to track back voip numbers to specific providers? I generally used fonefinder but they didn't have the number listed that the scammer used. I generally take these with a grain of salt when people send out itunes giftcards, but someone physically drove to the residence to pick up the "ransom" money
👀 1
Avatar
spicy_caveman 11/11/2020 12:37 PM
Oh wow they drove to the house to pick up the money? You may entertain a Google Reverse Location service to tag that device to follow where it originates from to find the hub. For my OSINT resources tracking VOIP owners I have had nearly no luck. I use https://freecarrierlookup.com/index.php /// After identifying if it is Bandwidth or what have you. I have been able to communicate with Bandwidth to see what "Shell" company has rented the VOIP block numbers. The issue I have always ran into, is that the company is the front of the fraud network and connecting the Bandwidth dots to the company via Google emails, or whatever data is available is always inaccurate. Traditional methods that I have gotten for Overseas Fraud Centers has always been able to locate via Google. But US based fraudsters, have a better chance of getting a home address connecting a dot or two into TLO when you get something good. (edited)
Get Telephone Carrier Data
Avatar
Thanks, much appreciated. It did come back to Bandwidth, I'll forward that on to the case officer. Def going to keep that in my back pocket. Its kind of funny, the scammers tried getting more money after police were involved, but the victim told them no and that they were scammers and not to call back. Would have been nice to set up a buy.
👍 1
Avatar
spicy_caveman 11/11/2020 1:11 PM
your case officer can reach out to me here if he needs a few ideas or strategy. I would suggest doing a GRL search warrant for that 30 minute window of devices around that residence. Then piggyback another search warrant to amplify and identify the device IDs from Google to link to an actual account/ Gmail/ etc. That will give you the ability to track down IP login history and with TLO you have a solid positively identified suspect.
👍 1
Avatar
Makes sense. The only problem I can think of is the victim said she spoke with a man on the phone and a woman showed up for the money. Not sure if the area is rural enough for the GRL to not pick up a ton of other devices if the accomplice wasn't with her. I do like the suggestion though and will pass it on, thanks again!
Avatar
spicy_caveman 11/11/2020 1:22 PM
@Solec sounds like dope related smurfs for fraud. They will use a meth chick that has no idea what's going on other than to pick up stuff and bring it to the guy with dope. Highly likely she has a device you can get sniffed out by Google and her device is a gold mind if you can get your hands on it.
Avatar
Thats what I've been thinking too, what's your typical turn around time been for GRL warrants from google?
😆 1
Avatar
spicy_caveman 11/11/2020 1:25 PM
Months and months.
Avatar
kind of what I figured lol... I know my agency's sent a bunch in the past but I haven't been directly involved with those returns
Avatar
spicy_caveman 11/11/2020 1:26 PM
DM me that phone number they used. I will run a few searches to see if anything pings
Avatar
Anyone know what the cost increase of UFED is going to be?
💎 1
Avatar
randomaccess 11/13/2020 12:43 AM
😆 2
12:43 AM
But also no
Avatar
Morning all, Im just wondering what Phone based forensic tools people think are must haves in the office (And a quick reason as to why?) Our main tools are UFED and XRY but am looking in to asking for other tools to be looked at too to expand our capabilities. Thanks in advance
Avatar
@Artea I would 100% say @Hancom MD-NEXT + MD-RED
💯 1
Avatar
I've heard about Handcom
Avatar
@Artea I would 100% say @Hancom MD-NEXT + MD-RED
@Aero Any ideas on the price of these ?
Avatar
But what does Hancom offer
4:27 AM
That UFED / XRY doesn't
4:27 AM
As a rough idea at least.
Avatar
I've heard about Handcom
@Rob Iv seen them mentioned a fair few times on here too.
4:29 AM
Just wondering if we can expand our capabilities within the office (Or if its worth it) with some other tools being available
Avatar
Blue Lights Digital are the UK suppliers of Hancom Software.
4:40 AM
@Artea I can give you details of the software and its capabilities.
👍 1
Avatar
@Artea I can give you details of the software and its capabilities.
@8198-IZ54 Would be great
Avatar
Deleted User 11/13/2020 11:41 AM
😂 10
👏 2
💯 1
Avatar
Guys anyone have the ebook copy of A Practical Guide to Computer Forensics Investigations by Darren R. Hayes
Avatar
Andrew Rathbun 11/15/2020 3:43 AM
@Kick let's not encourage the sharing of copyrighted material here. Would recommend acquiring it through legitimate means 👍
Avatar
@Andrew Rathbun i understood sir btw i couldnt afford for that book
Avatar
Andrew Rathbun 11/15/2020 3:44 AM
@Tempus thanks for the boost!
Avatar
my uni didnt got access to the pearson publications otherwise i could get books myself
Avatar
Andrew Rathbun 11/15/2020 3:44 AM
@Kick I totally understand and respect that. If you have questions you can always ask and people here can chime in.
Avatar
Thanks !
Avatar
Andrew Rathbun 11/15/2020 3:45 AM
Can your University library request the book from other universities?
Avatar
Andrew Rathbun 11/15/2020 3:45 AM
I know that was an option for me back when I was in college.
3:46 AM
Another option is your local library, see if they can request a copy from another branch. There's lots of options to explore
Avatar
Thanks !
3:46 AM
i will look the options
Avatar
@Aero Any ideas on the price of these ?
@Artea @Deleted User
Avatar
@wojotk_1 drop @8198-IZ54 a message, he should be able to grab you that info 😁
Avatar
@Magnet Forensics Any tips for keyword searches in Axiom? Seems to crash the entire case when I do a keyword search, even when drilled into a section like Operating System Events. Error message: WARN CaseQuerier.TryQuery() System.Data.SQLite.SQLiteException (0x80004005): SQL logic error or missing database unknown error
5:37 AM
The error goes on with more detail, just didn't want to post a wall here.
Avatar
randomaccess 11/16/2020 5:53 AM
@kyto probably best to reach out to support as you'll likely need to send them more details, error logs etc
Avatar
What version are you on?
Avatar
@MF-cbryant 4.6.0.21968
6:06 AM
It's possible that this case was originally created in an earlier version prior to an update I did a few weeks ago.
Avatar
nanoshiver. 11/16/2020 7:32 AM
Hello all, I'm looking into the capability of collecting and preserving legally-admissible online evidence, such as external websites or social media sites. I was wondering if anyone has information on which tools or techniques they would recommend? My first thought was cURL but I'm not sure if that would be legally-admissible. Any thoughts or recommendations would be appreciated. Thank you.
Avatar
Andrew Rathbun 11/16/2020 7:33 AM
Hello all, I'm looking into the capability of collecting and preserving legally-admissible online evidence, such as external websites or social media sites. I was wondering if anyone has information on which tools or techniques they would recommend? My first thought was cURL but I'm not sure if that would be legally-admissible. Any thoughts or recommendations would be appreciated. Thank you.
@nanoshiver. Have you tried Hunchly?
Avatar
nanoshiver. 11/16/2020 7:35 AM
I've never heard of it. It looks like some kind of agent deployed to endpoints?
7:36 AM
@NW3C recommends Hunchly, last I knew, for preserving social media sites
👍 1
Avatar
nanoshiver. 11/16/2020 7:37 AM
Thank you. It might be a bit expensive for my company but I can look further into it.
Avatar
Andrew Rathbun 11/16/2020 7:38 AM
I think Hunchly is pretty reasonably priced. Worth checking out the trial, at the very least
Avatar
nanoshiver. 11/16/2020 7:40 AM
Like all companies, they'll be looking for a free solution, but I wonder about the value of capturing a site hours or days after a system has visited the site. Hunchly seems to capture in real time
Avatar
I need to buy a few external SSDs/USBs from 512gb-1TB in capacity. Use case is handing out investigative copies of cases to detectives, drives will be wiped and reused afterwards. Small agency so I don’t need a million of these, probably like 4 or 5 will do. Looking to go flash vs platter just for speed, a lot of these new drives seem to be SMR and I just had to return one for being super slow and failing (toshiba canvio series). Since Black Friday is coming up, any best bets to look for?
Avatar
@nanoshiver. I liked hunchly, as I remember it would auto expand comments etc for Instagram. If you’re going to need to do this more than once it’s def. worth looking for an automated solution.
8:47 AM
All that being said, I didn’t buy hunchly- I just don’t need it for my specific role.
Avatar
@nanoshiver. - You can try Magnet Forensics Web Saver as well. It is free. It is for if non-credentialed websites for the automated acquisition side. https://www.magnetforensics.com/resources/web-page-saver/
👍 3
👀 1
Avatar
@b1n2h3x I hadn’t even heard about this... love all the free tools I’ve used from magnet so far
magnetforensics_alt 2
Avatar
nanoshiver. 11/16/2020 8:55 AM
thank you @whee30 and @b1n2h3x !
Avatar
Andrew Rathbun 11/16/2020 10:21 AM
I need to buy a few external SSDs/USBs from 512gb-1TB in capacity. Use case is handing out investigative copies of cases to detectives, drives will be wiped and reused afterwards. Small agency so I don’t need a million of these, probably like 4 or 5 will do. Looking to go flash vs platter just for speed, a lot of these new drives seem to be SMR and I just had to return one for being super slow and failing (toshiba canvio series). Since Black Friday is coming up, any best bets to look for?
@whee30 r/datahoarder is a good spot to hang to see good deals for high capacity HDD's FYI
👍 1
Avatar
Samsung SSDs are what we use on occasion
👍 1
11:03 AM
The T3 or T5 ones.
11:06 AM
@nanoshiver. - You can try Magnet Forensics Web Saver as well. It is free. It is for if non-credentialed websites for the automated acquisition side. https://www.magnetforensics.com/resources/web-page-saver/
@b1n2h3x heh, this actually seems pretty helpful. Might use that in conjunction with OSIRT
Web Page Saver (WPS): What does it do? MAGNET Web Page Saver (v3.3 released September 17th, 2020) is a perfect tool for capturing how web pages look at a specific point in time. This is especially useful in situations where the web pages need to be displayed in an environment ...
👍 2
Avatar
@Rob I have two of the T5s from my time crunch purchase. I like them a lot I just wasn’t sure if there was an even better deal out there... right now I’m looking at San disk, adata and Samsung drives which are all priced similarly. @Andrew Rathbun funny you should mention datahoarders- I was searching there this morning for advice!
Avatar
Andrew Rathbun 11/16/2020 12:33 PM
I check in there every night while I'm laying in bed trying to get tired. Lots of great conversation there. They definitely look at things a unique way compared to others haha
Avatar
Do you know if there exist a public report or a case study of a digital forensic triage regarding a network compromize?
Avatar
heeyhey, does anyone of you have experience with FireEye Endpoint Security (HX) and insights in the DD image creation using it? dont have access to it, but would like to get some insights / got some questions prior a client visit
Avatar
DeeFIR 🇦🇺 11/16/2020 3:53 PM
heeyhey, does anyone of you have experience with FireEye Endpoint Security (HX) and insights in the DD image creation using it? dont have access to it, but would like to get some insights / got some questions prior a client visit
@.yuzumi. Yes. I used to deploy it and managed thousands of endpoints in a SOC previously. What specifically do you want to know?
Avatar
Hey all, a quick one for: how do ransomware negiotiation companies determine whether or not the threat actor/threat actor group is in some sanctions list? Just out of curiosity, into how the negotiation side of things work, 🙂
Avatar
Andrew Rathbun 11/17/2020 4:47 AM
Probably has something to do with Cyber Threat Intelligence, which I am not super familiar with, but it's amazing how much information is put together about these groups and the attribution of their actions, tools used, etc
4:47 AM
I can't keep it all straight but it fascinates me. Not enough to get into it myself but I appreciate those who do it and share the knowledge.
4:47 AM
Feels like that's an endless game of cat and mouse
4:48 AM
Which, I guess most things in DFIR are, right? lol
👍 1
Avatar
haha yeah. I think there is a whole big world of Cyber Threat Intel out there, and i only know the 0.001% that consists of AlienVault OTX, and other platforms for IoC lookups. (i dont even think this is proper CTI)
5:34 AM
Anyone in the Cyber Threat Intelligence space on here for some insight of your war stories? 🙂
Avatar
JonasWanobi 11/17/2020 5:36 AM
@NW3C recommends Hunchly, last I knew, for preserving social media sites
@Andrew Rathbun I can confirm. NW3C still teaches the use of Hunch.ly
Avatar
Yes, hunchly is a good tool to have in your toolbox. I should note: the NW3C neither endorses, nor denounces, commercial or other products. We expose our students to a wide range of commercial and open source products/tools that are relevant to the course material and concepts being presented.
Avatar
RubberDucky 11/17/2020 7:39 AM
Hello, is anyone aware of any automated tools that will check the artifacts listed on the SANS "find evil" poster? I am thinking of creating one but if its already done then, even better
Avatar
🐊Ricky_GFJC 11/17/2020 7:47 AM
Has any one had this file Cellebrite show up as malware: cellebrite_ufed_iman.exe. The file path is Program Files > Cellebrite Mobile Synchronization > AnalyticsEngines. I am running UFED 4PC 7.38.0.12 and PA 7.39.1.2
Avatar
Im looking to build a new workstation for DFIR, I was thinking of going Threadripper, but i wanted to get some feed back from someone that has used one longish term and let me know if there are any pitfalls
Avatar
@RubberDucky thats a Great idea btw!
Avatar
Andrew Rathbun 11/17/2020 11:10 AM
Im looking to build a new workstation for DFIR, I was thinking of going Threadripper, but i wanted to get some feed back from someone that has used one longish term and let me know if there are any pitfalls
@Fizzlebeef if you can afford it you'll likely not regret having it. I'm looking at one for my next build as well
11:11 AM
Hello, is anyone aware of any automated tools that will check the artifacts listed on the SANS "find evil" poster? I am thinking of creating one but if its already done then, even better
@RubberDucky check KAPE targets and modules. Lots of those are made for 500 and 508
Avatar
spicy_caveman 11/17/2020 11:17 AM
Question for the masses- Has/ Does anyone use Penlink services like PLX?
Avatar
@Andrew Rathbun have you heard of any issues with them? I cant find any good info. I know alot of stuff is geared towards intel and dont want to spend 3k and have issues every second day
Avatar
Andrew Rathbun 11/17/2020 11:28 AM
The only person I know who has one is Eric Zimmerman and he swears by it. He's also doing lots of development and ninja things the average examiner doesn't necessarily do but anything you throw at it it'll be more than able to handle it. You may not need the 3970X or 3990X but one of the more affordable options may more than suffice. All depends on your budget
11:29 AM
If I could build a workstation that I'm running Forensic suites on everyday, I'd probably have the 3970X as my first choice. Lots of cores and threads plus my employer paying for it
Avatar
Ok, if Zimmerman is happy with them thats all i need to know, im looking at the 3960X at the moment.
11:31 AM
going to make sure to do 3200mhz quad channel ram as well, i have seen a few builds that skimp on this and its just going to choke the cpu
👍 1
Avatar
Andrew Rathbun 11/17/2020 11:32 AM
3960X is 24 cores vs 32 for 3970X. Still a great CPU that'll serve you very well
11:32 AM
Way more than I've ever had in a workstation myself lol
11:33 AM
Linus tech tips has great videos on all of these Threadripper CPUs. I've been watching them a lot lately
11:33 AM
They're pretty good at showing their performance for various tasks
Avatar
Gamers Nexus is also good, gamer may be in the name but they do some deep dives on CPUS and such
11:35 AM
Thanks for the info!
Avatar
Andrew Rathbun 11/17/2020 11:35 AM
I'm by no means the authority, just someone who has been window shopping as of recent. Best of luck!
11:36 AM
Question for the masses- Has/ Does anyone use Penlink services like PLX?
@spicy_caveman @Law Enforcement [USA]
Avatar
yep we have PLX
Avatar
spicy_caveman 11/17/2020 12:04 PM
@suckit what's the pros and cons of it? We run wooster and TLO and have intel outlets to Lexis. Is it a tool worth bothering with?
Avatar
elizavetabelkasoft 11/17/2020 12:51 PM
Belkasoft X day has arrived! We are happy to announce the launch of Belkasoft Evidence Center X! With this upgraded product, you get to simplify your workflow while enhancing productivity. Belkasoft team implemented thousands of customer requests and simplified the interface. The result is a modern and easy-to-use product. Besides improving usability, several enhancements for acquisition and analysis were implemented. Compared to similar tools on the market, Belkasoft X offers the most for its price, being 2-3 times less expensive. More about Belkasoft X at https://bit.ly/3kFPbR4 Go through the long list of new features and improvements at https://bit.ly/3kBsQEl (edited)
👍 2
Avatar
Has anyone used the Tableau TX1 to encrypt their destination drives? I can't seem to remount it again on the TX1. I can unlock the drive but it does not mount the NTFS filesystem. I can mount it through Veracrypt in Windows so I know it's not corrupt. My best guess is that because the NTFS partition starts at sector zero the TX1 is having issues mounting (I used the TX1 to originally format the drive too).
Avatar
RubberDucky 11/17/2020 3:05 PM
Thxs @Andrew Rathbun My understanding and use of KAPE so far is it collects and parses data. Then the investigator runs their analysis tools on the output of KAPE. I was not aware that KAPE does analysis too, even simple analysis like highlighting some artifacts of interest
Avatar
Andrew Rathbun 11/17/2020 4:42 PM
@RubberDucky Targets collect files and Modules parse that data to create output of some sort, depending on the module. EZ Tools come with KAPE and work out of the box. Analyze whatever CSV output in Timeline Explorer and you got all you need to get going
4:43 PM
Couple guides I put together that lays it all out
👍 1
💯 2
Avatar
DeeFIR 🇦🇺 11/17/2020 6:36 PM
@elizavetabelkasoft do you have any indications of price? Happy to receive a DM instead of going through the sales pipeline
Avatar
RubberDucky 11/18/2020 4:51 AM
Thanks @Andrew Rathbun I will take a look
Avatar
Avatar
RubberDucky
Thanks @Andrew Rathbun I will take a look
Andrew Rathbun 11/18/2020 4:57 AM
Let me know if you have any questions, happy to help
Avatar
Anyone have an issue with cellebrite just randomly not working anymore? I started my exam back in August. My system has had no connectivity to anything since then. Randomly in October PA started acting up. But if I un-installed it and re-installed the same version it worked fine. Well as of this week the program will not run at all. The file I'm opening hash is the same so it hasn't changed and it opens fine on two other machines. I'm going to finish the exam probably in a different box but just curious if anyone has any ideas or has seen this before. Thank you for your help and time. Feel free to DM.
Avatar
@spicy_caveman I use a competitor of PLX , i'm not a fan of Penlink's price its three times the amount of similar tools like Zetx . Also they have been pushing to give upper admin at LEO's offices a demo and will NOT give the price before the demo even when asked several times. I think they know there price plan is a bit much and are worried most LEO's will say no thanks. Just my 2 cents 😆
Avatar
spicy_caveman 11/18/2020 7:28 AM
Cool. They called me with an elevator pitch and I have a conference call with them next week. I'll shut it down
Avatar
@spicy_caveman see what they have to say, there biggest item is they can ingest search warrant returns but we use Cellebrite and Axiom for that already. Maybe i'm missing something but i'm not a fan of " i can't get you the price yet until you hear our presentation" sounds like a VACATION TIME SHARE pitch 🙂
Avatar
spicy_caveman 11/18/2020 8:21 AM
Lol. Or a defense attorney
👍 1
Avatar
SyphrusFenix 11/18/2020 9:44 AM
Hey everyone, I had a question. Im trying to see if I can create and FTK report that has hashlists for all programs as well as created dates and time, etc. I can of course export a hash list from ftk based on an image, and get a file readout that includes file creation times and modified times from creating an image of a drive. Those are two different reports so im wondering what would be the best way to get them in one report for readability? I cant combine them in excel as they dont have similar columns. Any thoughts?
Avatar
Andrew Rathbun 11/18/2020 10:03 AM
Quick poll, please use the emoticons to vote accordingly. Thoughts on merging #dvr-multimedia-surveillance, #multimedia-forensics and #surveillance together? We have a lot of channels already and those are closely enough related to where it may be more efficient to combine these channels.
👍 23
👎 1
Avatar
Andrew Rathbun 11/18/2020 10:18 AM
Thank you for the boost @b1n2h3x!
🙂 2
10:18 AM
We can now use https://discord.gg/digitalforensics as an invite link
Invite to join a server
fuckyes 1
💪 1
Avatar
Any encase users here? I Have a bunch of EX files that were generated by an examiner from a different org. I am interested in knowing if the start and finish times of the acquisition are stored in the EX files? I was able to located the image hash values in the image files but not the start of and end of acquisition. I have the examiners notes but id like to know if there is anything that is autogenerated and stored along with the file.
Avatar
is there a way to write out an ecryptfs volume as a block image? i have opened one using ecryptfs-recover-private and have it mounted but it doesn't appear to have a block device i can slurp with dd or similar
3:39 PM
i am unfamiliar with ecryptfs
3:42 PM
heh, search suggests i am SOL
3:43 PM
i appreciate the assistance 👍
Avatar
General question about Kape - does anyone know what time zone the logs are collected/parsed in?
Avatar
RubberDucky 11/18/2020 5:08 PM
@Andrew Rathbun I didn't find what I was looking for so decided to create my own
Avatar
Avatar
Dorsidhion
General question about Kape - does anyone know what time zone the logs are collected/parsed in?
Andrew Rathbun 11/18/2020 5:22 PM
UTC
Avatar
Avatar
RubberDucky
@Andrew Rathbun I didn't find what I was looking for so decided to create my own
Andrew Rathbun 11/18/2020 5:22 PM
can you elaborate? Create your own....?
Avatar
Thanks! @Andrew Rathbun
Avatar
@Magnet Forensics Have you done any research, or do you have any guidance on the use of AXIOM in a virtual environment? Please DM if so! 🙂
Avatar
five.happiness 11/19/2020 3:41 AM
Can anyone recommend an (open source) tool that can help me generate a forensics timeline?
Avatar
DeeFIR 🇦🇺 11/19/2020 4:07 AM
Can anyone recommend an (open source) tool that can help me generate a forensics timeline?
@five.happiness log2timeline/Plaso
(edited)
Avatar
Patrick.Beaver 11/19/2020 4:13 AM
@JeezyCreezy I will send you a DM
Avatar
Does anyone have a contact at NVIDIA where I can ask a legal question? The mail as mentioned here https://www.nvidia.com/en-us/about-nvidia/privacy-policy/ does not answer 🧐 (edited)
Avatar
JeezyCreezy 11/19/2020 7:22 AM
Thanks @Patrick.Beaver
Avatar
Avatar
Karamba
Does anyone have a contact at NVIDIA where I can ask a legal question? The mail as mentioned here https://www.nvidia.com/en-us/about-nvidia/privacy-policy/ does not answer 🧐 (edited)
spicy_caveman 11/19/2020 1:34 PM
did you try privacy@nvidia.com; Also there is the GeForce forums: https://www.nvidia.com/en-us/geforce/forums/discover/ (edited)
Join the GeForce community. Browse categories, post your questions, or just chat with other members.
Avatar
Trashboat667 11/19/2020 3:24 PM
LG 125DL Classic Flip. Is this phone possible? It’s a flip phone and I can’t figure out how to get into debug or if it’s even possible
Avatar
Deleted User 11/19/2020 3:43 PM
Dang. FireEye acquired Respond for $186M
Avatar
RubberDucky 11/19/2020 4:29 PM
@Andrew Rathbun just decided to start automating SANS poster "Find Evil" so its a bit easier for me to do my job. Like a filter to reduce the noise and highlight relevant artifacts so I can be more efficient. Just Basically automatic data reduction.
Avatar
Andrew Rathbun 11/19/2020 4:29 PM
@RubberDucky which tools are you using? how are you doing it? curious if you could elaborate
Avatar
Does anyone know if you can use an IMEI number to find a KIK user account by subpoena? I have a suspect and his IMEI but want to tie it to the KIK account.
Avatar
RubberDucky 11/19/2020 4:54 PM
@Andrew Rathbun I'm just writing a program Search all event logs for event ID x,y,z, or custom strings, and merge into 1. Then do the same for registry and other known evidence artifacts and highlight known bad/suspicious stuff. Nothing fancy imo. Something like this might exist but couldn't find it so I'll make my own
👍 1
Avatar
Andrew Rathbun 11/19/2020 5:16 PM
@RubberDucky make a GitHub if you've not already and share with the world
Avatar
Avatar
Ghosted
Does anyone know if you can use an IMEI number to find a KIK user account by subpoena? I have a suspect and his IMEI but want to tie it to the KIK account.
I have worked a couple Kik cases (one recently) where I got a search warrant return from them, but the IMEI number was not listed in the return. Kik is really good about providing info that they maintain (first name, last name, unverified email address, account registration info (including model number of device used to register the account, IP address and date of registration [even years after registration], 'Kik assigned' Android ID) and several months worth of IP addresses used by the account. They also keep logs of what accounts talk to each other, but they don't keep message content. That is what I have seen from them anyway, so I would be doubtful that you could get a specific account based off of an IMEI because they don't keep the IMEI.
🧐 1
👍 1
Avatar
Hie guys I am new to the forensics world.. i encountered a case involving a twitter account, trying to unmask the owner of the account and the IP address of the owner.... any advice guyz
Avatar
Avatar
pidopride
Hie guys I am new to the forensics world.. i encountered a case involving a twitter account, trying to unmask the owner of the account and the IP address of the owner.... any advice guyz
spicy_caveman 11/20/2020 5:53 AM
Subpoena Twitter for customer profile information and ip logs. Cross reference the ip logs to Maxmind and then subpoena the isp for customer profile that was using the ip.
👆 2
Avatar
Avatar
spicy_caveman
Subpoena Twitter for customer profile information and ip logs. Cross reference the ip logs to Maxmind and then subpoena the isp for customer profile that was using the ip.
Andrew Rathbun 11/20/2020 5:54 AM
great suggestion but it appears they're not LE so that may be difficult
Avatar
Avatar
Andrew Rathbun
great suggestion but it appears they're not LE so that may be difficult
spicy_caveman 11/20/2020 5:55 AM
ah well. Zimmerman has a tool for it!
Avatar
Avatar
DeeFIR 🇦🇺
Can anyone recommend an (open source) tool that can help me generate a forensics timeline?
@five.happiness log2timeline/Plaso
(edited)
computerclues 11/20/2020 10:23 AM
I just used psteal.exe as part of the plaso/log2timeline download. Oh, so very beautiful! The original timeline is huge, but I then grep for dates > ./(timeline.csv) to make it more manageable. Worked great!
👍 1
10:24 AM
A few weeks ago, I watched a webinar in which (I think a retired DEA agent) built and debugged regex patterns for Colombian phone numbers. He also used an online regex validator. I cannot find my notes, don't recall the vendor that sponsored the webinar, and cannot seem to find anything online. Did anyone watch that presentation who could provide a lead to the vendor or recording, please?
Avatar
How do most people in here handle providing voluminous digital discovery to defense counsel, say over 500GB of digital results. Do you eat the cost and give them an external drive, charge them for an external drive, or have them provide you with one? I guess clouds an option too, we use it for smaller things but apparently every attorney in the area uses dial-up and complains when it takes more than 2 minutes to download. This is more directed to the public sector
Avatar
When dealing with defence, they will provide us with a HDD for us to place data onto
11:41 AM
We don't provide them with it
Avatar
Avatar
Solec
How do most people in here handle providing voluminous digital discovery to defense counsel, say over 500GB of digital results. Do you eat the cost and give them an external drive, charge them for an external drive, or have them provide you with one? I guess clouds an option too, we use it for smaller things but apparently every attorney in the area uses dial-up and complains when it takes more than 2 minutes to download. This is more directed to the public sector
computerclues 11/20/2020 11:50 AM
Typically the opposing party will provide collection media for discovery.
Avatar
i think I need a new office policy 😉
Avatar
Obyss (NoobinTraining) 11/20/2020 7:26 PM
We also have the defense provide NIB media, which we then 0-wipe with certificate before giving them copy of the evidence files only
Avatar
Avatar
Solec
How do most people in here handle providing voluminous digital discovery to defense counsel, say over 500GB of digital results. Do you eat the cost and give them an external drive, charge them for an external drive, or have them provide you with one? I guess clouds an option too, we use it for smaller things but apparently every attorney in the area uses dial-up and complains when it takes more than 2 minutes to download. This is more directed to the public sector
spicy_caveman 11/20/2020 7:56 PM
So in my experience with observing prosecution proving discovery- they data is open for the defense to come view whenever they want. If they want to get a large amount of data to take with them then they shall bring the HD to do so.
7:58 PM
It should not be up to your office to consume the cost of 1tb or whatever hard drives per case. They want it then bring your own equipment to store it with the caveat that if it wasn't hashed 00 sterile then that should be noted on transfer
Avatar
Avatar
Andrew Rathbun
Quick poll, please use the emoticons to vote accordingly. Thoughts on merging #dvr-multimedia-surveillance, #multimedia-forensics and #surveillance together? We have a lot of channels already and those are closely enough related to where it may be more efficient to combine these channels.
Andrew Rathbun 11/21/2020 5:00 AM
#dvr-multimedia-surveillance
Avatar
@Law Enforcement [UK] Anyone know of any overt monitoring software for CSAE offenders devices ? I've been asked the question if such a product exists.
Avatar
@Dfdan Funny enough, We just received an email about that on Thursday or something. (edited)
11:16 AM
So I'll check my email tomorrow and try and figure what the software is called
👍 1
Avatar
Smoothwall's web filter and digital monitoring solutions help Police clients review and control digital activity for employees and offenders.
👍 1
Avatar
@Dfdan We’ve started rolling one out but I can’t remember the name, will check Monday
👍 1
Avatar
@Dfdan the issue wasn’t so much the software but more about who was going to run and administer it as it went forward.
👍 1
Avatar
Anyone remember these SIM cloners ?
👍 2
Avatar
Avatar
Solec
How do most people in here handle providing voluminous digital discovery to defense counsel, say over 500GB of digital results. Do you eat the cost and give them an external drive, charge them for an external drive, or have them provide you with one? I guess clouds an option too, we use it for smaller things but apparently every attorney in the area uses dial-up and complains when it takes more than 2 minutes to download. This is more directed to the public sector
Have you considered providing an on site viewing facility? Permit them to view the acquired and processed evidence on a viewing machine you control?
Avatar
@jrmcg. yeah, we do have a room set aside for it we use time to time for sensitive cases. I think it comes down to these prosecutors keep expecting us to give results for other cases. We had been utilizing an encrypted cloud based solution but files got too large and apparently unzipping a file is more complex than graduating law school (edited)
🤣 1
Avatar
Avatar
Solec
@jrmcg. yeah, we do have a room set aside for it we use time to time for sensitive cases. I think it comes down to these prosecutors keep expecting us to give results for other cases. We had been utilizing an encrypted cloud based solution but files got too large and apparently unzipping a file is more complex than graduating law school (edited)
I guess it depends on agreements and processes where you work. We would usually provide an evidence disk along with our forensic reports to the prosecution team which would be disclosable to defence agents. The defence from time to time will commission a defence forensics examiner (usually self employed) to attend our unit and cross examine our acquisitions / work. We would not normally be expected to provide a full copy of our acquisitions to the defence but they would be welcome to examine on premises and if they deemed anything to be exculpatory or disclosable then we would look to provide that as required.
Avatar
Avatar
Dfdan
@Law Enforcement [UK] Anyone know of any overt monitoring software for CSAE offenders devices ? I've been asked the question if such a product exists.
ScottKjr3347 11/22/2020 9:09 PM
This is in the US but we use a company called Remote Com for our sex offenders on Parole and Probation. http://www.remote-com.com/
RemoteCOM: The choice for computer, smartphone and tablet monitoring for your pre-trial, probation and parole needs.
Avatar
citizencain 11/23/2020 5:25 AM
Has anyone experienced any issues parsing Apple Mail in iOS 14.1 and above? Tried Cellebrite and Axiom but they appear to parse everything except the body of the email. I know the headers are plain text, so no issues there.
Avatar
Anyone hot on RegEx? In Notepad++ where i have a wordlist for password cracking and im trying to remove any line that has a word with 3 ot less letters. My RegEx -Fu is non existant and Google has failed me without me learning RegEx from scratch (which i should do)
Avatar
@Majeeko if you use the windows-subsytem-Linux-thing, you can use 'awk' awk 'length >=4' WORDLIST.txt > NEW_WORDLIST.txt
Avatar
@Karamba Im not familiar with that Windows subsystem. Im trying to use the find / replace box in Notepad ++
Avatar
@GetData Is someone available for a problem opening FEX?
Avatar
@Majeeko Time to install the windows-subsystem then ! 😉 You'll probably want to use sortand uniq also I am no regex-ninja, but this should do the trick in Notepad++ ^.{1,3}$
Avatar
Thanks, ill give it a try
Avatar
@Karamba That worked, thanks. Using that and one to remove any line with a non ascii character and anything ober 15 charcter ive got my word list down from over 2 million to 1.
😂 1
Avatar
cyberc3nturion 11/23/2020 12:04 PM
Hello has anyone here installed remnux as an add-on to SIFT workstation? I'm trying to accomplish this task but it's not working.
Avatar
Anyone working in the SOC produce/triage alerts based solely on malicious proxy categorization? I would like to know your thoughts on this. I am part of a testing phase and I am noticing the proxy are classifying sites as malicious but when we perform the basic analysis (URL scan, URL void etc.) they tend to not show any signs of malicious activity
Avatar
DeeFIR 🇦🇺 11/23/2020 7:08 PM
What platform are you using to categorise the URL and what it is actually using as a metric to determine whether it's malicious or not?
Avatar
Avatar
cyberc3nturion
Hello has anyone here installed remnux as an add-on to SIFT workstation? I'm trying to accomplish this task but it's not working.
What’s the error you got? I had it last working with remnux —version=1.3.1.4 and SIFT 1.9.2.
Avatar
Is anyone available from @Cellebrite to drop me a DM regarding an urgent Responder and Commander issue please?
Avatar
CLB - DavidK 11/24/2020 12:40 AM
@ApC Sure
Avatar
RarelySophisticated 11/24/2020 10:29 AM
For all the Law Enforcement people in the room, I work for the prosecutor's office, and we just received a grant for our electronics lab to assist city and county with an influx of phone extractions for cases. We are drafting our Standard Operating Procedure and were wanting to know if any other departments out there had an SOP that they would be willing to share as we draft ours. If so, please PM me. Thanks in advance.
Avatar
@RarelySophisticated try looking in #policies-and-procedures
Avatar
Avatar
Jobbins
@RarelySophisticated try looking in #policies-and-procedures
RarelySophisticated 11/24/2020 12:58 PM
Thank you
Avatar
im having some issues with Paragon Hfs+ for windows, anyone in here use this softwarE?
Avatar
Avatar
DeeFIR 🇦🇺
What platform are you using to categorise the URL and what it is actually using as a metric to determine whether it's malicious or not?
Bluecoat. I believe the categories are based off both the vendor itself as well as community (edited)
Avatar
SyphrusFenix 11/24/2020 4:46 PM
@Law Enforcement [USA] Theoretically, if a cyber stalking case spans several states, who has jurisdiction? For instance, a guy texts messages a girl in another state and threatens her to fulfill the elements of the crime in the state she's in, she moves to another state, and is put in fear and threatened, once again fulfilling the element of the crime in that state, which state would have jurisdiction? Or would they all be able to press charges? Thanks for any info!
Avatar
Avatar
SyphrusFenix
@Law Enforcement [USA] Theoretically, if a cyber stalking case spans several states, who has jurisdiction? For instance, a guy texts messages a girl in another state and threatens her to fulfill the elements of the crime in the state she's in, she moves to another state, and is put in fear and threatened, once again fulfilling the element of the crime in that state, which state would have jurisdiction? Or would they all be able to press charges? Thanks for any info!
I’d say the victims current state and the suspects state have jurisdiction or the feds. The middle state wouldn’t care much IMO (edited)
Avatar
Avatar
SyphrusFenix
@Law Enforcement [USA] Theoretically, if a cyber stalking case spans several states, who has jurisdiction? For instance, a guy texts messages a girl in another state and threatens her to fulfill the elements of the crime in the state she's in, she moves to another state, and is put in fear and threatened, once again fulfilling the element of the crime in that state, which state would have jurisdiction? Or would they all be able to press charges? Thanks for any info!
I believe simply hitting a server from out of state would hit a federal nexus even if the two were in the same.
Avatar
Avatar
SyphrusFenix
@Law Enforcement [USA] Theoretically, if a cyber stalking case spans several states, who has jurisdiction? For instance, a guy texts messages a girl in another state and threatens her to fulfill the elements of the crime in the state she's in, she moves to another state, and is put in fear and threatened, once again fulfilling the element of the crime in that state, which state would have jurisdiction? Or would they all be able to press charges? Thanks for any info!
spicy_caveman 11/24/2020 4:48 PM
If its going over multiple jurisdictions FBI may be a good choice depending on type of offense.
Avatar
If the stalker is in my state that's jurisdiction, if the victim's state's code calls it a violation is could also be charged there -- if interstate commerce is involved (always is with Internet cases since everything is made overseas and packets will cross state lines), either federal district could have a prosecution too brought by locals or feds
Avatar
Avatar
karver
If the stalker is in my state that's jurisdiction, if the victim's state's code calls it a violation is could also be charged there -- if interstate commerce is involved (always is with Internet cases since everything is made overseas and packets will cross state lines), either federal district could have a prosecution too brought by locals or feds
But good luck getting a fed interested in this unless it’s an important person
👆 5
Avatar
Avatar
DMG
But good luck getting a fed interested in this unless it’s an important person
spicy_caveman 11/24/2020 4:51 PM
Facts
4:51 PM
Also an attorney General cid could help
Avatar
SyphrusFenix 11/24/2020 4:51 PM
So basically different cases can be drawn any state that it violates that specific law, and across state lines pending FBI interest.
Avatar
Avatar
SyphrusFenix
So basically different cases can be drawn any state that it violates that specific law, and across state lines pending FBI interest.
Potentially yes. But if a victim has moved out of state the case becomes more difficult to continue in that middle state
Avatar
the code itself will matter -- might not be a crime in both states or there might be restrictions
Avatar
Avatar
SyphrusFenix
So basically different cases can be drawn any state that it violates that specific law, and across state lines pending FBI interest.
spicy_caveman 11/24/2020 4:52 PM
Yes theoretically. It ultimately comes down to the prosecutor that wants to run it. Then look at enhancements for the multi state fiasco
Avatar
I’m not disputing that a crime has been committed just a caseload issue and the fact that they no longer a resident of the state
Avatar
yeah, might be a tough sell on a misdemeanour
Avatar
Avatar
SyphrusFenix
So basically different cases can be drawn any state that it violates that specific law, and across state lines pending FBI interest.
spicy_caveman 11/24/2020 4:53 PM
Any chance its Texas?
4:54 PM
I could tap a Ranger possibly to get traction
Avatar
SyphrusFenix 11/24/2020 4:54 PM
@spicy_caveman No, this is theoretical haha.
4:55 PM
Just getting a handle on jurisdiction and cyber crimes.
Avatar
Avatar
SyphrusFenix
@spicy_caveman No, this is theoretical haha.
Oh in that case you can have HSI FBI or the secrets service if we are living in fantasy land
🤓 2
Avatar
SyphrusFenix 11/24/2020 4:55 PM
@DMG I'll put that in my notes haha
Avatar
Almost everything can be charged federally -- your interstate commerce tie-in is easy -- the catch is that your local AUSA is prosecuting drug traffickers, human traffickers, gun smugglers, organised criminals, etc. so a harassment case might be a tough sell unless it's heavy (edited)
👍 1
Avatar
Avatar
SyphrusFenix
@spicy_caveman No, this is theoretical haha.
spicy_caveman 11/24/2020 4:57 PM
For felony cases. If the threat is serious and can be argued up by a prosecutor. A full extradition warrant would come down. If the offense is substantially similar in other states then it is possible to have those charges collaborated as multiple counts of the same offense. It would involve multiple state prosecutors waiving venue in lieu of a district court prosecuting all of the same/similar offenses if a legal precedent was available to do so.
👍 1
Avatar
Avatar
SyphrusFenix
@DMG I'll put that in my notes haha
 I stand by my original statement you’ll likely only get a charge in the suspects current state and the victims current state however you might entice a federal agency into picking up the case but this will almost never happens they want the million dollar cross state drug busts and huge sex trafficking rings to take to federal court
👆 5
👍 4
Avatar
SyphrusFenix 11/24/2020 4:58 PM
All great info, thanks everyone!
Avatar
Avatar
SyphrusFenix
All great info, thanks everyone!
spicy_caveman 11/24/2020 4:58 PM
See you got us all hot and bothered for a paper youre working on lol
Avatar
Avatar
SyphrusFenix
All great info, thanks everyone!
No problem.
Avatar
SyphrusFenix 11/24/2020 4:59 PM
@spicy_caveman Just keeping your wits sharp haha
Avatar
spicy_caveman 11/24/2020 4:59 PM
I was getting my work phone out to text rangers and a da
Avatar
SyphrusFenix 11/24/2020 5:00 PM
@spicy_caveman Haha well I'll definitely keep you in mind then if I am involved in this case in the future.
Avatar
Avatar
spicy_caveman
I was getting my work phone out to text rangers and a da
When I saw he was private sector I slowed that roll right down 😂😂😂 at first I thought he was a local needing help
Avatar
spicy_caveman 11/24/2020 5:01 PM
Lol me too
Avatar
Avatar
karver
Almost everything can be charged federally -- your interstate commerce tie-in is easy -- the catch is that your local AUSA is prosecuting drug traffickers, human traffickers, gun smugglers, organised criminals, etc. so a harassment case might be a tough sell unless it's heavy (edited)
Spot on!
Avatar
We had a super weird harassment case where the feds were involved and kept asking for updates on him like he was a terrorist watch list, we swore up and down that victim must have been well connected
Avatar
TheHive Project an Discord Back in April 2020, we discovered an issue in our GitHub repository opening the discussion about moving our chat and creating a discord server for community discussions. …
Avatar
Do you have any suggestions about note-taking applications to use in Digital Forensics cases to collect the evidences before putting them on the final report?
Avatar
I highly suggest using Microsoft OneNote (although i advocate for opensource but this app is just perfect for my needs) or Joplin https://joplinapp.org/
Avatar
spicy_caveman 11/25/2020 11:38 AM
is there anyone from Autopsy here?
Avatar
Andrew Rathbun 11/26/2020 3:34 AM
@spicy_caveman @Brian Carrier @Autopsy
Avatar
Brian Carrier 11/26/2020 4:56 AM
Hi @spicy_caveman Did you have a question? Thanks for the tag @Andrew Rathbun .
👍 1
🧐 1
Avatar
Avatar
mikyrov
Do you have any suggestions about note-taking applications to use in Digital Forensics cases to collect the evidences before putting them on the final report?
Nullable Truth 11/26/2020 5:09 AM
I have to agree with @november, OneNote is such a brilliant note taking tool to use. It has some pitfalls/annoyances, but it works brilliantly compared to the competition. Shame there isn't an open source replacement, especially considering Microsoft are pushing the OneNote for Desktop (Windows App) which lacks many features the OneNote 2016 version has.,
Avatar
Avatar
Nullable Truth
I have to agree with @november, OneNote is such a brilliant note taking tool to use. It has some pitfalls/annoyances, but it works brilliantly compared to the competition. Shame there isn't an open source replacement, especially considering Microsoft are pushing the OneNote for Desktop (Windows App) which lacks many features the OneNote 2016 version has.,
Andrew Rathbun 11/26/2020 5:09 AM
+1 for OneNote
Avatar
Nullable Truth 11/26/2020 5:11 AM
An added bonus is the collaboration part of OneNote. You can have the notes on a shared folder, and two parties are able to view/modify the file in (almost) real time.
Avatar
I asked this is in OSINT, but I’ll try here as well. When using Canary Tokens, is there a way to change the fact that, when the QR code is scanned, the url actually reads “canary tokens”? It seems very counterintuitive. Especially when they go to the trouble to hide and embed the link within the word doc option.
Avatar
ArbitraryAlex 11/26/2020 2:28 PM
Hey my brother wanted me to ask if it's possible to recover a partition that has been accidentally overwritten using testdisk. We are trying to recover a drive. Thank you.
Avatar
@SyphrusFenix I have a current case involving a gps tracker that crossed from another state into mine. Case is awaiting trial in my state for an out of state suspect who was never in my state.
Avatar
Just got this in a PM. Surely stuff like this doesn't belong on this server?
3:10 AM
@Mistercatapulte
3:10 AM
Sorry if posting in the wrong channel
Avatar
randomaccess 11/27/2020 3:10 AM
Same but from a different user
Avatar
Mistercatapulte 11/27/2020 3:12 AM
I ll ban them!!!
👍 2
Avatar
ArbitraryAlex 11/27/2020 3:40 PM
Completely unrelated to the topic of this discord but how do you have the server stats? Just curious.
Avatar
Andrew Rathbun 11/27/2020 4:19 PM
@ArbitraryAlex up on top of the channel list you mean? Statbot, premium features
Avatar
ArbitraryAlex 11/27/2020 4:21 PM
Yeah. And thanks :). (edited)
4:24 PM
My brother is gonna join. He wants to ask questions because we are trying to recover a drive. I've never had to recover drives before.
Avatar
approximoknife 11/27/2020 6:59 PM
Hello. I broke AA's hard drive
Avatar
Andrew Rathbun 11/27/2020 7:01 PM
@ArbitraryAlex @approximoknife #data-recovery
Avatar
ArbitraryAlex 11/27/2020 7:01 PM
Oh thanks :)
Avatar
Andrew Rathbun 11/28/2020 9:35 AM
Microsoft is reportedly creating a subsystem, similar to the Windows Subsystem for Linux, that allows Android applications to run on Windows 10.
👍 5
CBPepeSaberDance 1
Avatar
Does anyone know if Apple can provide subscriber information based off an iPhone MAC Address? I have a bunch from an infotainment system but don't have corresponding devices for at least one which I know is a suspects
Avatar
I haven't asked them specifically, but I bet they know the MAC for every device they've made, one way or another. Have you tried hitting up the major carriers (Verizon/AT&T/TMO) to see if they've got it logged?
Avatar
Anyone ever gotten historical DNS records from ATT? Would this allow an investigator to see websites visited within a narrow window of time for a particular IP/customer account?
Avatar
@Praetor I haven't but will forward it to the case officer, it might be worth trying that route as well. Not sure if its a problem since its a bluetooth mac address as opposed to a wifi one. From what I saw on Apples LEO guide, it looks like they'd do IMEI to MAC but they didn't state they'd do the opposite.
Avatar
Avatar
Solec
@Praetor I haven't but will forward it to the case officer, it might be worth trying that route as well. Not sure if its a problem since its a bluetooth mac address as opposed to a wifi one. From what I saw on Apples LEO guide, it looks like they'd do IMEI to MAC but they didn't state they'd do the opposite.
That makes for a fun wrinkle that I didn't think about. I would think Apple should still be able to do that, but the carrier would be less likely to have it. Good luck!
Avatar
dabeersboys 12/1/2020 11:56 AM
Does anyone know if SnapChat captures the IP address of users?
Avatar
Avatar
char|i3
Anyone ever gotten historical DNS records from ATT? Would this allow an investigator to see websites visited within a narrow window of time for a particular IP/customer account?
dabeersboys 12/1/2020 12:15 PM
we were provided IPv6 records on a CDR for a particular date and time. I guess it would matter how historical you are looking at.
Avatar
@dabeersboys according to their privacy policy, yes. https://www.snap.com/en-US/privacy/privacy-policy
Snap Inc. is a camera company. Our products empower people to express themselves, live in the moment, learn about the world, and have fun together.
👍 1
12:50 PM
Device Information. We collect information from and about the devices you use. For example, we collect: information about your wireless and mobile network connections, such as mobile phone number, service provider, IP address, and signal strength.
Avatar
dabeersboys 12/1/2020 12:52 PM
Thanks! I appreciate it!
poggers 1
Avatar
Hey guys. I'm new here. I have an interview for a Junior Digital Forensics role for my local Law Enforcement Agency and was hoping to get some tips. I think its a competency based interview.
Avatar
Andrew Rathbun 12/2/2020 6:35 AM
@lew #training-education-employment
Avatar
Awesome, thanks!
Avatar
Andrew Rathbun 12/2/2020 5:43 PM
@Law Enforcement [USA] does anyone have a good Microsoft search warrant template? Asking for the IACIS listserv re: the homicide of a 3 year old
Avatar
I’ll start looking
Avatar
Avatar
Andrew Rathbun
@Law Enforcement [USA] does anyone have a good Microsoft search warrant template? Asking for the IACIS listserv re: the homicide of a 3 year old
spicy_caveman 12/2/2020 5:45 PM
I do at work bro. I can get one to you tomorrow morning. Unless you need me to run to the office now
Avatar
Avatar
Andrew Rathbun
@Law Enforcement [USA] does anyone have a good Microsoft search warrant template? Asking for the IACIS listserv re: the homicide of a 3 year old
spicy_caveman 12/2/2020 5:45 PM
If you can just burn the preservation requests to Microsoft with the NDA you're good until the AM
Avatar
Avatar
spicy_caveman
I do at work bro. I can get one to you tomorrow morning. Unless you need me to run to the office now
Andrew Rathbun 12/2/2020 5:46 PM
Tomorrow morning will work. I'll pass on to the person inquiring whenever you can provide it.
Avatar
Avatar
Andrew Rathbun
Tomorrow morning will work. I'll pass on to the person inquiring whenever you can provide it.
spicy_caveman 12/2/2020 5:46 PM
I'll pm my email
5:46 PM
Do you have the law enforcement protocols for Microsoft?
Avatar
You need for the one drive?
Avatar
spicy_caveman 12/2/2020 5:47 PM
They have a specific outlet. I think they run a leo portal
Avatar
Correct, I believe it is
Avatar
Avatar
Galt1
You need for the one drive?
Andrew Rathbun 12/2/2020 5:49 PM
I think it's going to be more for Xbox related stuff but that's just me venturing a guess based on the initial info provided.
5:50 PM
Personally, I'd ask for the kitchen sink lol
Avatar
Avatar
Andrew Rathbun
@Law Enforcement [USA] does anyone have a good Microsoft search warrant template? Asking for the IACIS listserv re: the homicide of a 3 year old
Have you looked at what the Law Enforcement Technology Investigations Resource Guide by Colin Fagan has?
Avatar
Avatar
criley4640
Have you looked at what the Law Enforcement Technology Investigations Resource Guide by Colin Fagan has?
Andrew Rathbun 12/2/2020 6:05 PM
I've not looked at that in a while. I have an older copy though. Worth passing that along to the requestor
Avatar
Avatar
Andrew Rathbun
I've not looked at that in a while. I have an older copy though. Worth passing that along to the requestor
Definitely need the latest. It’s now hosted at Hawk Analytics and requires a log in.
Avatar
Avatar
criley4640
Definitely need the latest. It’s now hosted at Hawk Analytics and requires a log in.
Andrew Rathbun 12/2/2020 6:07 PM
Oh interesting. Times have certainly changed haha
Avatar
Avatar
criley4640
Definitely need the latest. It’s now hosted at Hawk Analytics and requires a log in.
spicy_caveman 12/2/2020 6:09 PM
I love me some hawk
6:11 PM
Preservation! Put suspect name and all data you got with emails or whatever. Request to preserve ALL Microsoft account services and applications. WITH NON DISCLOSURE ORDER
💯 3
Avatar
Avatar
spicy_caveman
Preservation! Put suspect name and all data you got with emails or whatever. Request to preserve ALL Microsoft account services and applications. WITH NON DISCLOSURE ORDER
Andrew Rathbun 12/2/2020 6:13 PM
I passed it along 👍
6:14 PM
I'm not a cop anymore but I can't shy away from things like this. It's just not in me to do nothing to help. That never leaves you even if you leave the profession
Avatar
Here is the link to the Microsoft LE Portal. https://leportal.microsoft.com/dashboard
👍 2
8:37 PM
And here is Microsoft's Quick Reference Guide for LE.
👍 3
8:38 PM
@Andrew Rathbun
👍 1
Avatar
JonasWanobi 12/3/2020 6:32 AM
I can't find it anywhere in here, but if he did post it then this is just a repost. @stark4n6 created a handy Start.me for Forensics. https://start.me/p/q6mw4Q/forensics
💯 4
Avatar
In 600 Windows events, what does the field HostID refer to? An example can be seen at http://www.eventid.net/display-eventid-600-source-PowerShell-eventno-8434-phase-1.htm (edited)
Event ID: 600 Source: PowerShell
Avatar
Andrew Rathbun 12/3/2020 8:32 AM
Such an awesome community we have here. That cannot be overstated. Thanks to everyone for making this community what it is. You're all an asset to the community but also to each other 👍 (edited)
👍 8
Avatar
Hey everyone! I just made a new blog post. My website is about documenting my journey into DFIR and I hope to contribute to the DFIR community. I made a new post reflecting on this semester and overcoming impostor syndrome. Please read if you'd like! https://digitella.weebly.com/blog/reflecting-on-this-semester-overcoming-impostor-syndrome-and-my-passion-for-dfir
Hello all! This semester is finally coming to an end, and this has been my favorite semester so far class wise because of the classes I took. Most of my classes were forensics related and were...
👍🏻 2
👍 2
8:57 AM
@Andrew Rathbun
8:57 AM
let me know if I have to add the RSS
Avatar
Andrew Rathbun 12/3/2020 8:58 AM
@randomaccess can add to his post next week
Avatar
Andrew Rathbun 12/3/2020 10:28 AM
We are excited to announce that AccessData has been acquired by Exterro, the global leader of legal governance, risk, compliance and e-discovery solutions. Read all about the vision in today's press release. https://t.co/errcXk0vT9 #ediscovery #DFIR #forensics #exterro
🤔 1
👍 1
Avatar
curious how that will shake out.
Avatar
Is it good to say who?
11:24 AM
😂
❓ 1
👍 1
11:25 AM
Access Data I know, but whose the other peeps 🧐
Avatar
Dr. Kaan Gündüz 12/3/2020 12:16 PM
sold for 100M$
apple3 1
12:16 PM
cheaper than encase
Avatar
Avatar
Andrew Rathbun
Personally, I'd ask for the kitchen sink lol
If its Xbox related, I have a couple templates
Avatar
hiddenchameleon 12/4/2020 10:00 AM
This is a bit on the outside of DFIR, but hopefully someone has some ideas that will work. My sister unit (eDiscovery) is exclusively a Windows shop. They have recently been getting more and more APFS formatted drives and images that they cannot do anything with. Does anyone have a good Windows tool that can be used to extract the data out of APFS without having me do it on a Mac?
Avatar
Avatar
hiddenchameleon
This is a bit on the outside of DFIR, but hopefully someone has some ideas that will work. My sister unit (eDiscovery) is exclusively a Windows shop. They have recently been getting more and more APFS formatted drives and images that they cannot do anything with. Does anyone have a good Windows tool that can be used to extract the data out of APFS without having me do it on a Mac?
We use BlackLight (primarily) for this purpose... why aren’t your coworkers? The reason I ask is that if most of their disk images containing APFS were obtained by MacQuisition (as ours are) then it’s a logical choice.
Avatar
All politics aside, I'm very curious to see the forensics report on the Dominion voting machines from Georgia.
👀 1
Avatar
We get a lot of inquiries about people using Arsenal Image Mounter for this purpose, but the workflow usually ends up with BlackLight (and possibly other tools) anyway.
Avatar
😎 Awesome lists about all kinds of interesting topics - sindresorhus/awesome
Avatar
The United States and Australia have signed a first-ever bilateral agreement that allows the U.S. Cyber Command (USCYBERCOM) and the Information Warfare Division (IWD) of the Australian Defense Force to jointly develop and share a virtual cyber training platform.
❤️ 2
Avatar
WSJ Article about the bullshit that "entry-level" requirements in the industry
3:07 AM
👍 1
Avatar
Andrew Rathbun 12/5/2020 5:39 AM
EDR and Forensics tools can be very expensive. Here we look at some cheap, or free, DFIR alternatives you absolutely should consider.
💯 1
Avatar
randomaccess 12/5/2020 12:39 PM
The only issue I had with that article is it ignores the cost of training. You can save a boat load in licensing if someone pays for training (or with their time and some books/testing).
Avatar
ScottKjr3347 12/5/2020 2:12 PM
I am beginning to evaluate tools software that will be used by Parole and Probation investigators to acquired device data and generate reports in-lieu of submitting them to a forensic examiner. The investigators will have very limited training prior to using this tool. I would like to hear the pros and cons from anyone who has used the below mentioned tools and or any additional tools that might work for this situation.  Additionally any horror stories you might have encountered as a result of implementing something similar at your work place. Some software features I am looking for the tool to have: Backup and Logical device acquisitions Custom selection of app / artifacts to acquire  Custom date range for data acquisition prior to data acquisition  Capable of generating a PDF report Ability to take photos and or upload required docs to include with report Must have extraction log that regular users cannot modify or delete,  require admin acess Perfer software solution that can be installed on a any device running Windows 10 Must have the ability for customizable directions / help windows that could force users for required actions Here is my email if you wish to contact me off discord. Bskoenig3347@gmail.com  Here is a list of tools being considered at this time: @Cellebrite Responder #ADF Mobile Device Examiner  #Susteen Datapilot @MSAB Kiosk @Magnet Forensics SHIELD Thanks in advance for any feedback. (edited)
Avatar
DeeFIR 🇦🇺 12/5/2020 2:40 PM
@ScottKjr3347 My opinion is that if you're going to go down the road of the investigators having 'very limited training' prior to using any tool, then the tool itself must be cut down and follow a standard documented and approved workflow. If it's simple for the investigators to plug in a device and push a button, and any queries besides basic operation are handed by suitably qualified DF examiners, then it's solely reliant on the feature set of the tool. Is this process going to be for mobile devices only?
💯 1
Avatar
Andrew Rathbun 12/5/2020 2:42 PM
Yeah, at my agency, we tried the whole patrol officers dumping phones thing and like 7 or so got trained on it and they proceeded never to use that skill for the next 2.5 years that I was still there. Overall, it was nice on paper but in practice it was a complete waste. It all depends on how often you'll be having officers put in that scenario where they have to dump the phone because you're not around, or for whatever reason. We didn't really have that scenario, which was a luxury, I suppose. But if you are faced with that, then I suppose this might work better for you than it did for us.
Avatar
DeeFIR 🇦🇺 12/5/2020 2:48 PM
Sounds similar to what we have, @Andrew Rathbun. We had some other specialist areas use triaging/assessment tools on computers and it caused a whole range of issues because they weren't suitably trained. Same as MSAB's XRY kiosk. To reduce the complexity of the workflow, it's so cut down it's borderline useless. Most things come into our section to be processed. I still feel the core issue is a lack of training and understanding and the risk associated with the entire process. Just because the process is simple; "I plugged a phone into the kiosk and I followed the bouncing ball" still doesn't prepare that operator for potential questions about the implications of their interaction/s with the device.
Avatar
randomaccess 12/5/2020 4:04 PM
We had something similar, @DeeFIR 🇦🇺 may be familiar with the case in a state netiher of us live in. Basically a non-trained officer got slammed on the stand because he pushed buttons, got results, and couldnt explain anything about it. As a result LE here had to implement some better training for non technical officers. The major issue is that they dont understand that there's more than just push button get result
4:05 PM
As long as it's "process followed" "person admits to whatever" case closed...then it's mostly going to go without consequence. What instead will happen is.....process follower, wait xyz amount of time, person throws out multiple theories about how said data occurred on the device, everyone scrambles to try get a DF exam performed last minute or it gets thrown out when someone with a bit more knowledge than the officer starts asking questions the officer is unable to answer and loses credibility
4:06 PM
either way, likely out of @ScottKjr3347 's control: would recommend you email the requirements to the different vendors and saay "can you tick all these boxes" and see what they come back with
4:07 PM
I think @Magnet Forensics may have a product that's free for LE that would be suitable that's not on your list, but best check with them
Avatar
DeeFIR 🇦🇺 12/5/2020 4:19 PM
Australasian Legal Information Institute (AustLII), a joint facility of UTS and UNSW Faculties of Law.
👍 1
4:19 PM
R v BEVAN? @randomaccess
4:20 PM
Australasian Legal Information Institute (AustLII), a joint facility of UTS and UNSW Faculties of Law.
👍 1
Avatar
randomaccess 12/5/2020 4:20 PM
Yeah I think that's it
Avatar
DeeFIR 🇦🇺 12/5/2020 4:20 PM
Can you tell me how the Cellebrite package actually works - - - I don't understand the question. How does it work? Explain to me, a layman, who knows nothing about Cellebrite, how it works - - - It extracts data from a telephone. How? How does it do that - - - It uses software. And how does that software work - - - I couldn't tell you. What about the XRY - - - The same. If you don't know how it works, how can you say its reliable - - - You'd have to ask the manufacturer. Okay. I'm asking you. How can you say its reliable - - - I can't.
4:20 PM
Embarassing
4:22 PM
I understand there are going to be questions the operator can't answer, like how certain exploits/wizardry/blackbox tech works, which are proprietary products belonging to certain vendors, but you can at least explain it in a broad sense to give some insight into how the tool works
4:23 PM
That's the danger of having unqualified and unexperienced people performing these tasks when you're talking about the possibility of someone being deprived of their liberty for years
Avatar
Do "qualified" and "experienced" people actually know how certain extraction methods work? (edited)
Avatar
randomaccess 12/5/2020 4:25 PM
To your level @Mr. F. probably not
4:26 PM
Those questions were to throw sand in the gears, not invalidate the findings
Avatar
DeeFIR 🇦🇺 12/5/2020 4:28 PM
Do "qualified" and "experienced" people actually know how certain extraction methods work?
@Mr. F. more than “it uses software” 🤪
Avatar
Avatar
DeeFIR 🇦🇺
@ScottKjr3347 My opinion is that if you're going to go down the road of the investigators having 'very limited training' prior to using any tool, then the tool itself must be cut down and follow a standard documented and approved workflow. If it's simple for the investigators to plug in a device and push a button, and any queries besides basic operation are handed by suitably qualified DF examiners, then it's solely reliant on the feature set of the tool. Is this process going to be for mobile devices only?
ScottKjr3347 12/5/2020 5:40 PM
Yes
Avatar
Avatar
Andrew Rathbun
Yeah, at my agency, we tried the whole patrol officers dumping phones thing and like 7 or so got trained on it and they proceeded never to use that skill for the next 2.5 years that I was still there. Overall, it was nice on paper but in practice it was a complete waste. It all depends on how often you'll be having officers put in that scenario where they have to dump the phone because you're not around, or for whatever reason. We didn't really have that scenario, which was a luxury, I suppose. But if you are faced with that, then I suppose this might work better for you than it did for us.
ScottKjr3347 12/5/2020 5:46 PM
There are instances where Investigators have the legal authority to conduct a search of the device without a search warrant. I won't get into the practices prior to my position being created, but let's just say it wasn't good. Now with the introduction of new legislation certain turnaround times must be days, it that isn't going to work with our current work flow so got to come up with something that can work with a quick turnaround where analysis isn't needed or requested. Additionally these cases do not require search warrants, only a court order that is issued at the start of supervision, thus I would like only the a logical and backup acquisition be available.
Avatar
Avatar
DeeFIR 🇦🇺
Sounds similar to what we have, @Andrew Rathbun. We had some other specialist areas use triaging/assessment tools on computers and it caused a whole range of issues because they weren't suitably trained. Same as MSAB's XRY kiosk. To reduce the complexity of the workflow, it's so cut down it's borderline useless. Most things come into our section to be processed. I still feel the core issue is a lack of training and understanding and the risk associated with the entire process. Just because the process is simple; "I plugged a phone into the kiosk and I followed the bouncing ball" still doesn't prepare that operator for potential questions about the implications of their interaction/s with the device.
ScottKjr3347 12/5/2020 5:47 PM
Yep I am well aware of the risks.
Avatar
dumpanddecode 12/5/2020 8:54 PM
Look at the Data Pilot 10. That thing is literally push button forensics. Field level triage. Screen capture, date/time filter, built in consent form with signature window, pdf export with hashed artifacts. It’s slightly larger than the pro sized iPhones. Comes with the kit, box, charger, spare battery and painless updates. Very minimal training required and you can carry it in your pocket pretty much.
👍 3
Avatar
cyberc3nturion 12/6/2020 6:20 AM
I hate getting denied because of my experience or lack of for entry level spots lol
Avatar
+1 for the Data Pilot. Easy to use field triage tool that can be used by investigators with a little bit of training. Can view reports, search for artifacts, etc right on the device in the field or can export and review on the desktop report viewer back in the office. For my agency, I use the Data Pilot for triage at CSAM warrants and our detectives and investigators use it to pull data from phones during interviews with cooperating witnesses or other involved people. It also can do screen captures which is great for when the crime involves messages from cloud messaging services like Facebook Messenger. Investigators can sit there and capture everything during an interview with the victim
👍 2
👌 1
Avatar
chrisforensic 12/6/2020 9:48 PM
goood morning @Cellebrite ... a little question concerning cpu-usage when using latest PA 7.40.0.68 ... since this version (at least I've only just noticed) of PA i recognize, that my system slooows down fully when opening an extraction ... (edited)
9:49 PM
9:51 PM
Is this problem known? what could be the cause? maybe only i have the problem 🧐
Avatar
Could be Anti-Virus playing havoc?
Avatar
chrisforensic 12/7/2020 12:07 AM
@Rob no problem with antivirus.... all folders from cellebrite in exclusionlist 🙂
Avatar
Avatar
chrisforensic
@Rob no problem with antivirus.... all folders from cellebrite in exclusionlist 🙂
What AV do you have?
Avatar
chrisforensic 12/7/2020 12:12 AM
really low cpu-usage from eset 🙂 while loading next datas - iphone adv. log. , but cpu is high (edited)
12:13 AM
windows antivirus is turned off 🙂
Avatar
Avatar
chrisforensic
goood morning @Cellebrite ... a little question concerning cpu-usage when using latest PA 7.40.0.68 ... since this version (at least I've only just noticed) of PA i recognize, that my system slooows down fully when opening an extraction ... (edited)
The image classifying feature is very intensive. Are you are using that by chance?
Avatar
Avatar
Neon
The image classifying feature is very intensive. Are you are using that by chance?
chrisforensic 12/7/2020 4:29 AM
no, just import extraction
Avatar
Avatar
chrisforensic
no, just import extraction
Not sure then. Sorry. Just wanted to throw it out there.
Avatar
Avatar
Neon
Not sure then. Sorry. Just wanted to throw it out there.
chrisforensic 12/7/2020 4:31 AM
no prob 😉
Avatar
CLB - DavidK 12/7/2020 4:40 AM
Hello, As a forensic examiner or investigator,you probably encounter cases where data needs to be collected fast and selectively. We believe you need a full toolkit of collection methods thatallows you to perform everything from a comprehensive device extraction tocherry-picking a single file or chat. With Cellebrite UFED and Responder v7.40we introduced - Chat Capture, a new consent-based method to collect datafrom 3rd party android applications. To learn more about the Chat Capture capability check the link below: https://www.cellebrite.com/en/blog/chat-capture-a-new-way-to-quickly-capture-chat-data/ We would love to get your feedback on this very first release. Download the latest release and tell us what you think via email, david.krasilshik@cellebrite.com or DM.
OK, I know this sounds cliché, but queue the violins because I’m going to say it anyway, “Examiners have a tough job.” Think about it. Mobile-device technologies are advancing at such a fast pace, it seems like new devices and applications are being introduced faster than you can say “encryption.” And even if you keep … Continue reading "Chat Ca...
Avatar
Is this planned to be brought to iOS as well? @Cellebrite
Avatar
Avatar
DeeFIR 🇦🇺
Can you tell me how the Cellebrite package actually works - - - I don't understand the question. How does it work? Explain to me, a layman, who knows nothing about Cellebrite, how it works - - - It extracts data from a telephone. How? How does it do that - - - It uses software. And how does that software work - - - I couldn't tell you. What about the XRY - - - The same. If you don't know how it works, how can you say its reliable - - - You'd have to ask the manufacturer. Okay. I'm asking you. How can you say its reliable - - - I can't.
blake_at_amped 12/7/2020 8:00 AM
@Andrew Rathbun and @Mr. F. , I think you all make great points to training, and the importance of getting some understanding in whatever tool you use for forensics. I will say, in the Video and Imaging world, there has been some precedent for processing and clarifying images. Specifically a case in 2004 called State of Connecticut V. Swinton, where an agency "enhanced" an image using 2 different tools. The appeals court determined that the evidence was admissible despite the officer's lack in specific knowledge of the algorithms used, and no real understanding in how computer programs were written. The determination was based on understanding terminology and how to use the specific program. Specifically, the court adopted these steps toward authenticating the computer-generated work: '(1) the computer equipment is accepted in the field as standard and competent and was in good working order, (2) qualified computer operators were employed, (3) proper procedures were followed in connection with the input and output of information, (4) a reliable software program was utilized, (5) the equipment was programmed and operated correctly , and (6) the exhibit is properly identified as the output in question.'
  • Christopher B. Mueller & Laird C. Kirkpatrick, Evidence: Practice under the Rules Where this may apply to the scenario you mentioned is that if the examiner has received training on how to use a specific tool, they need not know the specifics in how the tools accomplished the task. While it is really helpful to the examiner to know all those things (which is why we teach a lot of the how and why in our @Amped Software classes), understanding the science or logic behind an algorithm isn't necessary for extraction or even potentially to processing. But this topic is a large part of why we try to be as transparent in our software as possible, so people can explain what was done in a forensic process.
(edited)
👍 4
Avatar
Avatar
blake_at_amped
@Andrew Rathbun and @Mr. F. , I think you all make great points to training, and the importance of getting some understanding in whatever tool you use for forensics. I will say, in the Video and Imaging world, there has been some precedent for processing and clarifying images. Specifically a case in 2004 called State of Connecticut V. Swinton, where an agency "enhanced" an image using 2 different tools. The appeals court determined that the evidence was admissible despite the officer's lack in specific knowledge of the algorithms used, and no real understanding in how computer programs were written. The determination was based on understanding terminology and how to use the specific program. Specifically, the court adopted these steps toward authenticating the computer-generated work: '(1) the computer equipment is accepted in the field as standard and competent and was in good working order, (2) qualified computer operators were employed, (3) proper procedures were followed in connection with the input and output of information, (4) a reliable software program was utilized, (5) the equipment was programmed and operated correctly , and (6) the exhibit is properly identified as the output in question.'
  • Christopher B. Mueller & Laird C. Kirkpatrick, Evidence: Practice under the Rules Where this may apply to the scenario you mentioned is that if the examiner has received training on how to use a specific tool, they need not know the specifics in how the tools accomplished the task. While it is really helpful to the examiner to know all those things (which is why we teach a lot of the how and why in our @Amped Software classes), understanding the science or logic behind an algorithm isn't necessary for extraction or even potentially to processing. But this topic is a large part of why we try to be as transparent in our software as possible, so people can explain what was done in a forensic process.
(edited)
blake_at_amped 12/7/2020 8:00 AM
If you get bored over the Christmas break, here is a good article from a law journal about State v. Swinton and its implications (albeit from 2007 with is 100 years in digital terms). Note that things on Discord from strangers should never be taken as legal advice :) https://www.stetson.edu/law/lawreview/media/the-swinton-six-the-impact-of-state-v-swinton-on-the-authentication-of-digital-images.pdf (edited)
👍 3
Avatar
I'm trying to figure out when my @Magnet Forensics axiom license expires. I am not seeing an option in the software or on the website... feeling dumb.
Avatar
Avatar
whee30
I'm trying to figure out when my @Magnet Forensics axiom license expires. I am not seeing an option in the software or on the website... feeling dumb.
Andrew Rathbun 12/7/2020 2:17 PM
Try Help, Licensing…I think
2:18 PM
While in Process or Examine
Avatar
@whee30 pretty sure if you launch axiom process w/o the dongle and then plug it in after it launches, it'll show you the dongle license and date remaining once it refreshes.
Avatar
Avatar
dumpanddecode
Look at the Data Pilot 10. That thing is literally push button forensics. Field level triage. Screen capture, date/time filter, built in consent form with signature window, pdf export with hashed artifacts. It’s slightly larger than the pro sized iPhones. Comes with the kit, box, charger, spare battery and painless updates. Very minimal training required and you can carry it in your pocket pretty much.
spicy_caveman 12/7/2020 2:51 PM
I run dp10 also. And it is a great tool that can get what you need quickly
👍 1
Avatar
@Solec @Andrew Rathbun I know Cellebrite does the no dongle then plug it in trick... Axiom doesn't appear to do the same. Help > Licensing > Dongle takes me to a blank license manager screen with no dates to view
3:30 PM
in the license .bin on the dongle itself there is some plaintext that suggests a month/year combo which I
3:31 PM
I'm pretty sure is my expiration. Be nice to see it an easier spot though
Avatar
I updated to 4.7 and I'm not sure if it's because I turned on the interwebz to that machine or if 4.7 fixed a bug but now the date shows up
3:41 PM
🤷
Avatar
@DeeFIR 🇦🇺 @randomaccess @Mr. F. @ScottKjr3347 @Andrew Rathbun Sorry but just wanted to chime in "little late", Reference the person testifying and the questions your showing. I do not think the problem solely rests with the person on the stand. Those questions posted seem to have originated from the defense. These questions should not have had the teeth they probably had if the prosecutor had attacked those on direct examination. My understanding would have been after the prosecutor went through your training and experience, this would have been followed by things like what is digital evidence, how is digital evidence stored, and follow up with the tool and how it reads the data from its rested state. I am a newer examiner but I don't think the failures outline rest totally with the witness. I welcome thoughts especially those with the first hand knowledge of the discussed situation. In conclusion my opinion when this happens is, the witness may have failed but the whole TEAM failed as well.
Avatar
DefendingChamp 12/8/2020 11:11 AM
has anyone recovered data from a lg g7 board that doesn't boot?
11:12 AM
I believe the board is shorted out
Avatar
@DefendingChamp since it's encrypted you'll have to make sure it boots
Avatar
DefendingChamp 12/8/2020 12:48 PM
Is there any recommended training courses for boards that get shorted? I can imagine running into this in the future if it's for a case.
Avatar
Can't suggest anything. I'm self-taught mostly, so maybe someone else suggests something. It can be as simple as cleaning after water damage, locating shorted capacitor (thermal camera is useful), or as complex as shorted RAM on the CPU itself.
Avatar
Avatar
CLB - DavidK
Hello, As a forensic examiner or investigator,you probably encounter cases where data needs to be collected fast and selectively. We believe you need a full toolkit of collection methods thatallows you to perform everything from a comprehensive device extraction tocherry-picking a single file or chat. With Cellebrite UFED and Responder v7.40we introduced - Chat Capture, a new consent-based method to collect datafrom 3rd party android applications. To learn more about the Chat Capture capability check the link below: https://www.cellebrite.com/en/blog/chat-capture-a-new-way-to-quickly-capture-chat-data/ We would love to get your feedback on this very first release. Download the latest release and tell us what you think via email, david.krasilshik@cellebrite.com or DM.
DefendingChamp 12/8/2020 12:53 PM
as DF that's working where most of the relevant data are in text messages, this is very useful
Avatar
Avatar
Arcain
Can't suggest anything. I'm self-taught mostly, so maybe someone else suggests something. It can be as simple as cleaning after water damage, locating shorted capacitor (thermal camera is useful), or as complex as shorted RAM on the CPU itself.
DefendingChamp 12/8/2020 12:55 PM
I'm pretty much self taught too via google, etc. I've dealt with larger hardware i.e. PC and etc, just not as much on mobile devices. Was hoping there were some good materials out there. They're all pretty similar, but was hoping to get some good suggestions. Hopefully someone can chip in.
Avatar
@DefendingChamp there are some youtube channels worth watching that do stuff like this, but those are mostly iPhone/iPad related, much less other brands. Lack of schematics and boardview files for most modern mobile phones doesn't help.
Avatar
DefendingChamp 12/8/2020 1:13 PM
which channels do you follow?
Avatar
ipad rehab, Mark Shaffer, Paul Daniels, REWA, RepairLab, STS Telecom, Electronics repair school, Louis Rossman (this is more macbook related), CINO Technology, Apfeldoktor (although he doesn't explain much, at least recently but is very good with cpu swaps) (edited)
👍 1
Avatar
DefendingChamp 12/8/2020 5:25 PM
I follow some of those channels too, i.e. i recognize ipad rehab. she knows her stuff.
Avatar
cyberc3nturion 12/8/2020 6:41 PM
I need an email forensic program. Anyone have any suggestions?
Avatar
DeeFIR 🇦🇺 12/8/2020 7:21 PM
Metaspike
Avatar
Hey everyone. I made a blog post on something near and dear to me. This topic is very sensitive in nature so if you are uncomfortable by these topics I suggest you do not read because I don’t want to exploit your well-being for clicks. This blog is going to talk about the rise of online predators with my perspective on it as a cyber security major. CW: discussions on child pornography, enticement, grooming and intoxication. https://digitella.weebly.com/blog/the-rise-of-online-predators-from-the-perspective-of-a-cyber-security-major
Since I was a child, I've been immersed in the world of computers since my dad owns an IT business. I spent a lot of time online playing games such as Webkinz, Club Penguin and Stardoll. I was young...
👏🏻 2
👍 1
Avatar
@Cellebrite Anyone available to chat regarding an issue with PA?
Avatar
CLB - DavidK 12/9/2020 3:53 AM
@pinball Sure, DM me
Avatar
Avatar
Dany
Hey everyone. I made a blog post on something near and dear to me. This topic is very sensitive in nature so if you are uncomfortable by these topics I suggest you do not read because I don’t want to exploit your well-being for clicks. This blog is going to talk about the rise of online predators with my perspective on it as a cyber security major. CW: discussions on child pornography, enticement, grooming and intoxication. https://digitella.weebly.com/blog/the-rise-of-online-predators-from-the-perspective-of-a-cyber-security-major
Andrew Rathbun 12/9/2020 4:09 AM
Good read and thanks for sharing. Interesting anecdotes and perspective from someone who is over a decade younger than me and is even more of a "digital native" than I am.
Avatar
Hi, anyone from @Magnet Forensics available for a question in DM? Regarding AXIOM Process. TIA
Avatar
forensicmike @Magnet 12/9/2020 5:44 AM
Sure, send away @danielj91 (edited)
Avatar
John Connor 12/9/2020 8:08 PM
anyone from @Law Enforcement [USA] federal law enforcement in the USA that I could talk to? I am a rising senior in college in a forensics program and I want to connect with someone that can provide advice on getting into forensics in federal law enforcement (edited)
Avatar
Andrew Rathbun 12/10/2020 4:29 AM
@John Connor #training-education-employment
Avatar
DefendingChamp 12/10/2020 7:19 AM
Connor are you in forensic science or digital forensics? Both are completely different
Avatar
Anyone @Cellebrite got a few minutes for a quick chat RE Cellebrite reader? We have managed to get the product whitelisted by publisher on our force systems (Applocker) , but looks like something has changed on the newer versions of the reader product which is triggering Windows Defender Exploit Protection to block it. Looking at getting IT to add an exception in but would be good to know if anyone else has reported this issue and knows the cause, as exploit protection has a lot of features that will be painful to test one by one. (edited)
Avatar
DefendingChamp 12/10/2020 8:04 AM
Haha, K23 I work on both IT and DF department. We usually have our DF stations off the domain.
8:04 AM
Does your IT Dept require it be on the domain?
Avatar
This isn't for DF stations, this is to allow officers to view our reports on normal police laptops. Works brilliant when it works
8:05 AM
Literally just the reader product I'm talking about here haha
Avatar
DefendingChamp 12/10/2020 8:05 AM
Ah I see.
8:05 AM
If they can't figure it out and you guys are in a pitch, isn't there a standalone reader?
8:06 AM
Must be something in the new version that creates a false positive.
Avatar
Avatar
DefendingChamp
If they can't figure it out and you guys are in a pitch, isn't there a standalone reader?
That's what they've had to use in the past yes, but the standalone computers around the force are ancient and not kept up to date.
Avatar
Avatar
DefendingChamp
Must be something in the new version that creates a false positive.
That's my thinking as the old versions work absolutely fine
Avatar
DefendingChamp 12/10/2020 8:07 AM
Probably have to roll back until they fix it.
8:08 AM
does your IT dept use Sccm? it shouldn't be that bad to roll back.
Avatar
Cellebrite isn't backwards compatible. We've started doing examinations now using the latest so roll back isn't an option. And the reader isn't deployed via SCCM. It's whitelisted to run off of USB / disk so that IT don't need to update / package with every release as they do not have time for that and we can't wait that long for updates
8:13 AM
Managed to get around it by renaming some folder structures so really not sure what's going on here. Doing more testing! 😂
Avatar
DefendingChamp 12/10/2020 8:13 AM
Wait it can't roll back? What? Haha I never realized.
Avatar
Avatar
DefendingChamp
Wait it can't roll back? What? Haha I never realized.
If you do an exam in 7.40 and try to open it up in a 7.37 reader for instance, it won't open
Avatar
DefendingChamp 12/10/2020 8:15 AM
Oh yeah, I always give it a standalone reader with the report. Or are you guys saving the complete dumps?
Avatar
That standalone reader is what I'm talking about
8:15 AM
That's the problem 😂
Avatar
DefendingChamp 12/10/2020 8:16 AM
lol I gotta check it out. I haven't touched many cases this the pandemic.
8:16 AM
during*
8:16 AM
courts and literally anything DF related has been on pause for a while
Avatar
The backlog caused by the first lockdown has kept us busy. As have outsource reviews. And well UKAS next week. We haven't really stopped tbh
Avatar
DefendingChamp 12/10/2020 8:18 AM
Which coast in the US if you don't mind? I guess your area isn't that bad. We're about to be on our 2nd lock down haha
Avatar
UK not US
Avatar
DefendingChamp 12/10/2020 8:19 AM
Ah I see.
8:24 AM
I wonder if Cellebrite or DF would ever host their extraction tools in the cloud one day if internet speed wasn't an issue.
8:24 AM
*any DF comapny
Avatar
I know some forces over here use a local VM approach. Cloud would be interesting, depending on data security requirements etc
Avatar
I personnally wouldn't use a cloudbased tool. I don't want to have potential data breaches
Avatar
Avatar
MrNonoss
I personnally wouldn't use a cloudbased tool. I don't want to have potential data breaches
DefendingChamp 12/10/2020 10:54 AM
That's true. But my idea was the extracted data would live on the client end but the computing and software would be in the cloud?
Avatar
Cloud is the present and the future of where we are going, like it or lump it.
Avatar
DefendingChamp 12/10/2020 11:48 AM
Yeah, it all depends on how it's implemented and etc. But it's bound to be leveraged one way or another. I can imagine a large unit having a centralized cloud based system to make things easier to manage if we're doing remote extractions.
Avatar
That's I think our plan
2:31 PM
Albeit it years down the line.
Avatar
Just saw a presentation by Truxton where they talk about this.
Avatar
can anybody give some ideas on making project for my college final year?
Avatar
Lordicode Oxygen Forensics 12/11/2020 7:58 AM
#training-education-employment seems to be a better fit for this question, as it may be more specialized to what you need 🙂 @Heisenberg
👍 1
7:59 AM
From me I gotta say, nothing drains your soul more if you are doing a thesis or a project on smth you don't care about at all, so probably start there. After that choose your tools and best of luck @Heisenberg
Avatar
Who has a nice forensic report template they would share? I'm looking for something professional looking that I can drop screenshots into and links to photos or Axiom portable cases and Cellebrite Reader cases that I can burn to a DVD / thumb drive and hand off to the prosecution.
Avatar
DefendingChamp 12/11/2020 2:32 PM
Magnet Webpage Saver v3, looks pretty good vs an actual Magnet Cloud Extraction for mainly just achieving web pages. Would anyone argue something saved from Magnet Webpage Saver vs actually pulling something from say Magnet AXIOM?
Avatar
Avatar
Lordicode Oxygen Forensics
#training-education-employment seems to be a better fit for this question, as it may be more specialized to what you need 🙂 @Heisenberg
Okay i'll see into that
Avatar
I’ve got a bunch of CDR records from Sprint. I’m trying to cross reference the ENode B id from the CDR to the list of tower sites that was sent. They seem to be formatted differently. Anyone run into this? I am sure there is a simple answer but I can’t seem to figure it out.
Avatar
I've read the brochure for @Cellebrite Responder, it's very "synthetic" and for what i understand it's like UFED4PC and P.A. merged into one single product. Anyone knows something more about it?
Avatar
@Moderators I've had some cryptocurrency bots contact me
Avatar
Yeah, me as well. I just shot the screen grab to @OllieD
Avatar
Its the same thing that happened a couple weeks ago.
Avatar
They've been making the rounds. It's the discord-equivalent of Nigerian royalty at this point. 😄
Avatar
Avatar
Cole
@Moderators I've had some cryptocurrency bots contact me
Andrew Rathbun 12/13/2020 2:13 PM
How long ago did the message come through?
2:13 PM
If it's from the previous effort a few weeks ago then just disregard. If it's a new batch then let me know
Avatar
In the last hour
Avatar
Avatar
Cole
In the last hour
Andrew Rathbun 12/13/2020 2:14 PM
What's the username?
2:15 PM
I see like 7 people joined with a minute at 1628 and 1629 EST. Maybe that's a smaller batch of bots
2:15 PM
Also does the person who messaged you that crypto stuff share this server with you or another?
Avatar
I've had several reported and been able to ban 5
💯 1
CBBanMeow 1
Avatar
Avatar
FabianoQ
I've read the brochure for @Cellebrite Responder, it's very "synthetic" and for what i understand it's like UFED4PC and P.A. merged into one single product. Anyone knows something more about it?
Dm sent
Avatar
elizavetabelkasoft 12/13/2020 10:51 PM
Hello. Brett Shavers, a well-known digital forensics expert from the USA, reviews our new Belkasoft X DFIR tool. Read a short part. He says: "Belkasoft X gives great value in both cost and features. Acquire, process, and delve into the data with an intuitive interface that cleanly shows automated categorization of forensic artifacts. Although easy to use, this is a true forensic suite that does more than what you might expect for the price of the license." Read the entire story at https://bit.ly/2WdDmHW (edited)
Avatar
I need to get a new write blocker, any recommendations for a "do-it-all" (mostly SATA and USB) thats portable and does not cost an arm and a leg?
Avatar
Ratool is free (or was) from memory
7:14 AM
Mostly that's a portable one that (and software based)
7:14 AM
But could work in conjuction with an icybox or similar
Avatar
Avatar
Rob
Ratool is free (or was) from memory
If you do not have access to a physical write blocker, would you recommend using Ratool over changing the Windows registry? Which one would be more reliable?
Avatar
Does anyone have or know of a video Exif viewer software that is trusted?
Avatar
Avatar
FullTang
If you do not have access to a physical write blocker, would you recommend using Ratool over changing the Windows registry? Which one would be more reliable?
Less likely for someone to make a mistake with Ratool
👍 1
Avatar
Avatar
DFLSher
Does anyone have or know of a video Exif viewer software that is trusted?
Freeware I use both exiftool and mediainfo (CLI). When you say “trusted” I haven’t had any security issues with either but I am sure someone else can chime in if they have. In terms of trusting results, that becomes a little stickier.... both tools could report different, potentially incorrect results (especially with some proprietary file formats) due to the way that they parse data. Doesn’t happen often and not to all the data within a file, but it is possible. If it is that important I would suggest manually confirming that value.
💯 1
Avatar
hmm, i need to write an image to a usb stick but don't want windows (10) to touch the stick at all after - naively i get both changes in the partition as well as the GPT header if i write and read it right back
11:21 AM
does anyone know a tool?
Avatar
Anyone good with regex?
12:01 PM
(╯°□°)╯︵ ┻━┻
Avatar
Avatar
FullTang
If you do not have access to a physical write blocker, would you recommend using Ratool over changing the Windows registry? Which one would be more reliable?
randomaccess 12/15/2020 12:09 PM
Changing the windows registry is not write blocking. It prevents windows from writing with a subset of possible methods. Meaning I can get around it and it doesn't prevent writes to some devices. A proper software or hardware write blocker is advised
12:10 PM
use it as a last resort, but yeah if you have access to others there are better options
Avatar
Avatar
Pseudonym
Anyone good with regex?
What do you need?
❤️ 1
Avatar
I have this string hexidecimal string, which I would like to find within a hexdump: 0488ADE4000000000000000000873DFF81C02F525623FD1FE5167EAC3A55A049DE3D314BB42EE227FFED37D50800E8F32E723DECF4051AEFAC8E2C93C9C5B214313817CDB01A1494B917C8436B35E77E9D71 It's signature is 0488ADE4 , the following 156 hexidecimal values are random
Avatar
Anyone have some resources for me to take a look at in regards to debugging E01 files. I have a few that I am unable to mount and im not sure the root cause.
12:19 PM
Running linux if that helps.
12:19 PM
Maybe there is a tool I am not aware of?
Avatar
I'm ussing xxd to parse a hex dump, then using grep to confirm the presence of the full string, however, I'd like to be able to do it for future string swhich have a different 156
Avatar
Avatar
randomaccess
Changing the windows registry is not write blocking. It prevents windows from writing with a subset of possible methods. Meaning I can get around it and it doesn't prevent writes to some devices. A proper software or hardware write blocker is advised
Thanks for clarifying. Would you say that using software like Ratool for write blocking is a forensically sound process?
Avatar
Avatar
Luci
What do you need?
No idea where to start with it..
Avatar
randomaccess 12/15/2020 12:21 PM
@FullTang I don't believe I've heard of ratool. Have you tested it?
Avatar
I have tested by seeing if it will allow for writing to the USB by copying a file and by seeing if it will update accessed times on USB devices. It is successful at both. Is there other tests I should do?
Avatar
Avatar
Pseudonym
I'm ussing xxd to parse a hex dump, then using grep to confirm the presence of the full string, however, I'd like to be able to do it for future string swhich have a different 156
^(0488ADE4).{156}
12:22 PM
probably something like this?
Avatar
Avatar
Pseudonym
I'm ussing xxd to parse a hex dump, then using grep to confirm the presence of the full string, however, I'd like to be able to do it for future string swhich have a different 156
You can test it here https://regexr.com/
RegExr is an online tool to learn, build, & test Regular Expressions (RegEx / RegExp).
12:24 PM
Luci you're an amazing person, don't let anyone tell you otherwise
❤️ 1
Avatar
randomaccess 12/15/2020 12:24 PM
@FullTang yep. I'd suggest trying to write to a drive directly with a hex editor (HXD is a good one)
Avatar
Avatar
Pseudonym
Click to see attachment 🖼️
Of course the rest depends on whether there is more after this sting or other unexpected chars
Avatar
randomaccess 12/15/2020 12:25 PM
You can also text other USB devices. Kevin ripa did a series on it on his 3minmax YouTube videos
Avatar
Avatar
randomaccess
@FullTang yep. I'd suggest trying to write to a drive directly with a hex editor (HXD is a good one)
Ok I will try that as well and look up that video series. Thanks!
Avatar
Avatar
Luci
Of course the rest depends on whether there is more after this sting or other unexpected chars
I'll give that a try, just need to figure out how to fit that in with grep now
12:28 PM
There's definitly further data after the string
12:28 PM
The characthers are limited to hexidecimal
12:31 PM
Which i'm having the horrible realisation, that I may not be able to use that regex query in grep...
Avatar
randomaccess 12/15/2020 12:32 PM
@Pseudonym grep -e
linux 2
Avatar
grep -e "^(0488ADE4).{156}" ??
Avatar
unless I misunderstand what you're trying to retrieve, you can just do grep 0488ADE4 (edited)
12:36 PM
you'll get something like this in response
Avatar
I'm currently using grep -o --colour --byte-offset
12:39 PM
Which will show only the specified string along with where in the data it is
12:40 PM
I can do it for the header, but struggling to get it to show the following 156 chars
Avatar
Dont include -o then
12:41 PM
12:41 PM
from my understanding of grep, it will return the line that the characters appear on
Avatar
Still not luck grep --byte-offset --colour -E "^(0488ADE4).{156}"
Avatar
you dont need any fancy regex
12:42 PM
grep --colour --byte-offset 0488ADE4
12:43 PM
that returns all lines that have 0488ADE4 in them
Avatar
That returns the string, but a lot of the string that happens to be on the line prior to it
12:43 PM
sorry, a lot of not needed before it, maybe if I use "cut" with the output of grep
12:44 PM
12:44 PM
Not a really suspectimage btw
Avatar
so you dont need the information before
Avatar
negative, it would be the header and the following 156 chars
Avatar
grep -o --colour --byte-offset '0488ADE4.*'
12:47 PM
will return
12:47 PM
everything after and including the header.
12:48 PM
past that im not so sure, maybe cut is a good option
12:51 PM
@Pseudonym try grep -o --colour --byte-offset -P '0488ADE4.{0,132}' (edited)
Avatar
Thats the badger!
12:52 PM
156 rather than 132 thogh
12:53 PM
Avatar
ah my bad, but yeah that should work . Glad i could be of help
Avatar
Thank you very much to both of you, that was driving me mental
Avatar
How would I mount Ex01 image files? (edited)
Avatar
Same way as an E01?
Avatar
I just updated UFED Touch2 (Setup 7.40.0.85 Generic 5G_UFED) but now I turn it in, I can't see anything but a black screen. Has anyone been through this who can help me?
Avatar
Avatar
Jake
Same way as an E01?
What OS?
Avatar
Avatar
Pseudonym
What OS?
Ubuntu Linux
Avatar
ewfmount should support it
3:00 PM
https://manpages.debian.org/unstable/ewf-tools/ewfmount.1.en.html installed with the ewf-tools package on debian at least
3:01 PM
The libewf library on github is bit hazy on whether it does, or does not support particular types of ex01
3:01 PM
But I'm fairly sure i had success on a mac with it
Avatar
Hey everybody. Does anybody have any ideas on a software or service that can do AI picture categorization on PDF documents?
Avatar
griffeye maybe?
Avatar
@goalguy would @Magnet Forensics Axiom or @Cellebrite PA be able to since they would see the PDF as images? (edited)
Avatar
good-evening all! — asking out of curiosity if there are any ‘sample’/‘demo’ warrant return packages available from Apple? (edited)
Avatar
Deleted User 12/16/2020 3:37 PM
Hey guys, can someone confirm I'm not crazy for a second
3:38 PM
@goalguy And, you could just extract the pictures from the document and use standard picture categorisation.
Avatar
Deleted User 12/16/2020 5:03 PM
Also;
Avatar
Avatar
sholmes
@goalguy would @Magnet Forensics Axiom or @Cellebrite PA be able to since they would see the PDF as images? (edited)
I will have to play around with it some more. Couldn’t figure out how to load the pdf into @Cellebrite in my quick test.
Avatar
Avatar
Deleted User
@goalguy And, you could just extract the pictures from the document and use standard picture categorisation.
Yea but we’re talking over 400,000 pages
Avatar
Deleted User 12/16/2020 5:05 PM
Both approaches are going to be pretty much as heavy.
5:10 PM
And, loading the whole PDF as a picture would probably introduce a lot of false positives.
5:10 PM
@goalguy
5:10 PM
I dunno, if I was doing it, even though that's a hell of a lot of data, you'd prefer it worked reliably
5:10 PM
Extract the images and do your classification, I'd say.
Avatar
For my fellow law enforcement tech geeks, @Law Enforcement [USA] our crisis intervention team is looking for a wireless cellphone throw phone for operations. Currently they have a 1990's wired system and a Samsung S4 they borrowed from a neighboring city that was Root with MDM. (it also did'nt work) The cellphone was set up to call out to one number and modified it so you can not power off the phone. Looking to bring them up to date on technology. DM me if you have some ideas. Thanks !
Avatar
Respond is a crisis response system that replaces traditional throw phones with modern cloud technology.
👍 4
Avatar
Throw phone meaning what exactly? Like a phone you toss into a barricade specifically to speak with the person inside?
Avatar
dumpanddecode 12/17/2020 11:12 AM
Letscorp.us/respond
Avatar
@whee30 yes sir
12:23 PM
@goalguy thank you i'll take a look.
Avatar
Recommendation for a simple light gui tool do decrypt base64 and other simple encodings?
Avatar
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
👍 3
3:28 AM
Amazing for a lot of things 😁 I use it all the time
3:29 AM
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
Avatar
You can also download and use it offline 👍
Avatar
probably preferable if you want to keep your privacy 🙂
Avatar
Hi all. Were renovating our on scene kits. Anyone got a fairly up to date spec or equipment list they could share? DM or .PNN if more appropriate!
Avatar
Avatar
jobsouth
probably preferable if you want to keep your privacy 🙂
exactly
Avatar
Are there any analysts or examiners in here, with a data science background? I have a few questions if you have a few minutes to spare.
Avatar
Is there any courses in online that teaches app development??
10:52 PM
like in udemy or someother else?
Avatar
Anyone from @Cellebrite online for a quick question about optimal laptop specs for best Reader performance when looking at large extractions?
Avatar
Has anyone here had a play with the new M1 macs and iOS apps yet? From my understanding they can run them natively. Could be useful if its possible to side load a database / App extracted from a phone or tablet, similar to how Magnet / Ufed virtual works for Android devices
Avatar
Has anyone got any idea if payment terminals store any data that we could retrieve?
Avatar
@Magnet Forensics we are having issues on 4.7 when creating a timeline from a GK read, it keeps stating there is no data to produce the timeline? Any suggestions?
Avatar
@beatstv 4.8 is out (edited)
6:51 AM
If that helps
Avatar
Anyone got any good RealmDB resources that they could sign post me to, please (other than the RealmDB website)? (I posted a message in the training channel, but not had any responses, so thought I'd widen the net) 😅
Avatar
I am seeking some guidance on some general information for Cellebrite PA carved locations for an Apple iPhone. I am wondering as to why there are multiple carved iOS locations for one specific data and time ranging in different locations that are not remotely close to each other. I am unsure how to validate this evidence, as it pertains to the other carved iOS locations on the device as well.Additionally, if the location services are turned off, does this prevent GPS data from being stored? Thank you
Avatar
@woody38 Best is to test this yourself. As of your last sentence; it doesnt matter. I tested this last month. Drove around with an iphone 6s for 1 week. No location services on, no simcard inserted and no wifi on. It registered 4500 gps location... (edited)
👀 1
😳 1
👍 1
Avatar
Does anyone have any guidance or SOPs around handling GPS tracking devices and what we can do with them?
4:47 AM
And how do we guide seizing officers when they come across a GPS tracking device?
Avatar
elizavetabelkasoft 12/23/2020 6:48 AM
Would you like to get a full-featured Belkasoft X license for free? Complete the Belkasoft Customer Survey and get a chance to win. The end of December is a holiday mood time. So many tasks have to be done. Do not postpone, there are huge chances to forget about the Survey. Full it now and grub your chance to win a reliable end-to-end solution to accelerate digital forensics and incident response investigations. Take the Belkasoft survey now at https://bit.ly/3almRBU
Avatar
bpat461coal 12/23/2020 7:02 AM
Can anyone tell me where the KML export moved to in Cellebrite? I am using 7.39 and selecting export doesn't show it in the list. The manual says it's suppose to be there. I know it use to be there but I can't seem to find it.
Avatar
@bpat461#3572 how are you doing it? Have you tried opening the locations tab and at the top, export from there ?
Avatar
bpat461coal 12/23/2020 7:40 AM
Thanks @Dfdan. I knew it had to be somewhere. I thought it was also in the images thumbnail section but I must have been mistaken. Thanks again.
Avatar
Hi all. Can anyone share their experience - Do redacted images in Cellebrite PA get exported in their redacted form when creating a UFED reader report?
Avatar
If you could have one new feature for Christmas in your favourite Forensics tool, what would it be?
Avatar
The find evidence button? (edited)
😆 1
Avatar
Already got one 👍
🤣 12
💯 2
Avatar
Avatar
jonoshotox
Already got one 👍
I gotta get me one of those
Avatar
Background info if seized
446.13 KB
👍 1
1:30 AM
1:30 AM
1:30 AM
1.32 MB
1:30 AM
979.16 KB
1:30 AM
1:30 AM
Avatar
Avatar
jonoshotox
Already got one 👍
Roccat Vulcan keyboard? 👀
Avatar
Does anyone have a recommendation for a cable management bag that they really like. Looking to thin down the Cellebrite kit and keep some USB/SSDs as well.
Avatar
Avatar
Aero
Roccat Vulcan keyboard? 👀
You got it 👍
Avatar
Avatar
jonoshotox
You got it 👍
I also have it! Awesome keyboard! 😁 👍
Avatar
Andrew Rathbun 12/26/2020 5:14 AM
thank you @Deleted User for the boost!
👍 1
Avatar
Avatar
Andrew Rathbun
thank you @Deleted User for the boost!
Deleted User 12/26/2020 5:14 AM
NP
5:18 AM
Looks like we are 1 boost away from level 3
Avatar
Avatar
Deleted User
Looks like we are 1 boost away from level 3
Andrew Rathbun 12/26/2020 5:19 AM
we've been there many times but keep losing 1 or 2 at a time
😫 1
Avatar
Adam Cervellone 12/28/2020 8:08 AM
I've just run some test iOS images through the @Magnet Forensics Axiom 4.8. Is there a way I can export the hashes of the parsed files to create a known/ignorable hash set?
Avatar
@Adam Cervellone yep will send a DM with steps.
Avatar
anybody got a bead on this phone ? I"m thinking its an Android
11:50 AM
from surveillance video, looking at the wallpaper I have an idea
Avatar
is that a camera on the top left corner
Avatar
thats my guess,
Avatar
The app on the bottom, 2nd from the right looks like the camera app
Avatar
here is the back
12:05 PM
I"m thinking the round cut out is the finger print reader ?
12:06 PM
if it was an Apple the logo would be mid level vs top ?
12:06 PM
Avatar
@Falzar interesting, that might be a winner, i was leaning more toward an LG do to the planets on the wallpaper and rear fingerprint reader but appears this motorola has the rear finger print reader also.
Avatar
there are a few other motorolas on the site that share the same features (rear camera being on the top left when viewed from the back, as well as top left when viewed from the front) so it still needs some verification
👍 1
Avatar
@Falzar At least i can learn towards an Android vs iPhone and start from there
Avatar
Does anyone recognize which secure messaging app this could be? The screen was taken in may 2019 so interface could be a little different now, but maybe somone recognize that lighting match on the bottom of the screen and "secure burn in 2 days" text.
Avatar
Encrochat
Avatar
Are there any open source projects around for searching Office 365 for PII? Weighting the idea of writing a tool or purchasing one for doing a quick search for common PII data in Sharepoint, Exchange, and One Drive.
Avatar
@deponald thanks a lot, you are right 👍
Avatar
Or question #2, does anyone have any experience or recommendations of using an eDiscovery tool/service during an IR engagement to look for PII data that could have been exposed in a BEC or insider threat type of case?
Avatar
Deleted User 12/29/2020 6:16 AM
Is there a collection/news feed of current/ongoing ransomware-campaigns anywhere?
Avatar
Avatar
Deleted User
Is there a collection/news feed of current/ongoing ransomware-campaigns anywhere?
Starting last year, ransomware operators have escalated their extortion strategies by stealing files from victims before encrypting their data. These stolen files are then used as further leverage to force victims to pay.
🙏 1
Avatar
quick question on email metadata, the received field that lists all the servers that it jumped through from source to destination shows that the final server was a google server even though the recipient is using @hotmail.com. Pretty sure this is fishy but is there anyway at all this could happen normally? (edited)
Avatar
anyone from cellebrite on right now @Cellebrite
Avatar
Avatar
PierreX
Does anyone recognize which secure messaging app this could be? The screen was taken in may 2019 so interface could be a little different now, but maybe somone recognize that lighting match on the bottom of the screen and "secure burn in 2 days" text.
dumpanddecode 12/29/2020 9:25 AM
Silent phone maybe. Silentcircle.com
Avatar
Avatar
cflaws
Or question #2, does anyone have any experience or recommendations of using an eDiscovery tool/service during an IR engagement to look for PII data that could have been exposed in a BEC or insider threat type of case?
chuckych33s3 12/29/2020 10:29 AM
The best way to go about this is through a law firm that utilizes Relativity or can contract a Relativity provider for you under council. This maintains confidentiality and Relativity is the top tool for eDisco and review of PII.
Avatar
Avatar
cflaws
Are there any open source projects around for searching Office 365 for PII? Weighting the idea of writing a tool or purchasing one for doing a quick search for common PII data in Sharepoint, Exchange, and One Drive.
chuckych33s3 12/29/2020 10:31 AM
The best way to handle this is Microsofts own Security/Discovery offerings. https://docs.microsoft.com/en-us/microsoft-365/compliance/ediscovery?view=o365-worldwide
Microsoft 365 offers a number of different eDiscovery tools that you can use to search for and hold content found in different locations such as Exchange mailboxes, SharePoint and OneDrive for Business sites, Microsoft 365 Groups, and Skype for Business conversations.
Avatar
Avatar
chuckych33s3
The best way to handle this is Microsofts own Security/Discovery offerings. https://docs.microsoft.com/en-us/microsoft-365/compliance/ediscovery?view=o365-worldwide
Appreciate the feedback. The MS 365 Compliance works well but to access all the features it looks like you have to upgrade to an E5 license. I've got a call with MS to figure that out. Wasn't sure if there were any other tools out there that may help in that effort. I'll definitely have to take a peak at Relativity and any law firms who may be able to help in that regards.
Avatar
Avatar
cflaws
Appreciate the feedback. The MS 365 Compliance works well but to access all the features it looks like you have to upgrade to an E5 license. I've got a call with MS to figure that out. Wasn't sure if there were any other tools out there that may help in that effort. I'll definitely have to take a peak at Relativity and any law firms who may be able to help in that regards.
chuckych33s3 12/29/2020 11:31 AM
If you can get in touch with an account rep, they'll usually throw you a quick trial of the feature. Definitely see if you can get 30 days or so. If that doesn't work out, my first stop personally would be PowerShell and regex, but that's going to be a beating. Relativity is worth it when doing PII/PHI searches, I hope you find a lawfirm or relativity provider.
Avatar
Avatar
chuckych33s3
If you can get in touch with an account rep, they'll usually throw you a quick trial of the feature. Definitely see if you can get 30 days or so. If that doesn't work out, my first stop personally would be PowerShell and regex, but that's going to be a beating. Relativity is worth it when doing PII/PHI searches, I hope you find a lawfirm or relativity provider.
I was mid writing a powershell module to do just that when I figured I should see what products may already exist before spend too much time on it. 😄
😆 1
Avatar
Gold__Viking 12/29/2020 12:36 PM
What common destructive programs would you look for either walking on scene or dead box. I am gathering a reference list. Looking programs like CCleaner, Temp File Cleaner, etc
12:37 PM
And this might be too generic but also looking to make a list of programs of interest ie ToR, Frostwire, VPNs.
Avatar
chuckych33s3 12/29/2020 12:37 PM
sdelete is the most common that I've seen.
👍🏼 1
Avatar
Gold__Viking 12/29/2020 12:44 PM
I have for destructive: CCleaner, TFC, Sdelete, CleanMyPc and Eraser
Avatar
Once have I seen a .bat script designed to wipe a drive
12:57 PM
Glad that one was tested on a virtual machine
Avatar
Not software but hardware. I have seen USB killers and PC towers rigged up with a wired in kill switch. Once activated a voltage surge hits the system and fries it.
Avatar
Gold__Viking 12/29/2020 1:22 PM
@Rob I was going to put that in my list but my employer told me those were too rare for this training.
Avatar
Avatar
Gold__Viking
@Rob I was going to put that in my list but my employer told me those were too rare for this training.
Kinda true tbf
1:26 PM
If its a live scene, consider encryption as well.
1:26 PM
Check for bitlocker via cmd
1:26 PM
TrueCrypt, VeraCrypt etc.
Avatar
@dumpanddecode thanks for an answer but I checked and this was Encrochat for sure.
Avatar
Andrew Rathbun 12/29/2020 6:06 PM
A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. Please add a new issue if you have an idea for something to a...
6:07 PM
Somewhat related to this conversation, I recently put this together. I used sdelete and Change Timestamp. I recently found NewFileTime so I'll eventually use that on some artifacts and update the repo
👍🏼 1
6:07 PM
Probably will use ccleaner too
Avatar
dumpanddecode 12/30/2020 6:50 AM
What’s the best way to open .eml files from a Microsoft warrant return without using my own Microsoft/Outlook account. Looking to be able to open and print all of them. Thanks.
Avatar
In the past I've used Thunderbird and Mail Viewer
Avatar
Gold__Viking 12/30/2020 9:04 AM
Thunderbird
Avatar
Real world experience with the new M1 Macs have started ticking in. They are fast. Real fast. But why? What is the magic?
Avatar
Yeah it was! I didn't know a lot of that information; all I hear is the mainstream non-technical stuff on the internet. X86 is in trouble down the road. I wonder if we'll see a new mass architecture appear in the next 20 years.
Avatar
chuckych33s3 12/30/2020 7:05 PM
Good evening (for me anyway) everyone! Hope you are all well. I was wondering if anyone is aware of an IOC list of just general "this isn't good" items. I have my own that I started today based on some case notes, but if something already exists I'd definitely love to reference it. If no one knows of anything, maybe we can build upon my short list with things you all see on a common basis? I'm using terms in a flat .txt file and feeding it into PS and iterating over tool output of .csv, .txt, and .xlsx content, and then documenting the details of any matches. Some of my items include: mimikatz %comspec% MiniDump (Get-Process lsass) -noprofile -nop -encoded -enc FromBase64 -exec bypass -version 2 -Invoke-Webrequest New-Object System.Net.WebClient wget start-bitstransfer processhacker webbrowswerpassview defendercontrol advanced port scanner logcleaner psexesvc sdelete.exe
Avatar
Here's a maybe useful resource for thing-evading things as a list of target handlers you can add https://anti-debug.checkpoint.com/
Anti-Debug Tricks
Avatar
randomaccess 12/30/2020 7:28 PM
@chuckych33s3 could make it into a big Yara rule?
Avatar
If I have a bplist present in the <data> section of a plist but the <data> bit is encoded in base64, how do I get that out into a format that I can read?
Avatar
Avatar
Gold__Viking
I have for destructive: CCleaner, TFC, Sdelete, CleanMyPc and Eraser
DBAN is still popular and diskpart is built in to your windows system since Win7 or WinServer2008
Avatar
Avatar
Seladour
If I have a bplist present in the <data> section of a plist but the <data> bit is encoded in base64, how do I get that out into a format that I can read?
Are you sure its base64 ?, a bplist usually contains binary data, i use a mac tool called plistedit pro to read these files.
Avatar
I'm pretty sure, I copied it into a basic base64 decoder and all I could read from the decoded data was "bplist" and nskeyedarchive - I just assumed from there I would need to get that bplist out somehow and into a plist editor to read it?
Avatar
Avatar
chuckych33s3
Good evening (for me anyway) everyone! Hope you are all well. I was wondering if anyone is aware of an IOC list of just general "this isn't good" items. I have my own that I started today based on some case notes, but if something already exists I'd definitely love to reference it. If no one knows of anything, maybe we can build upon my short list with things you all see on a common basis? I'm using terms in a flat .txt file and feeding it into PS and iterating over tool output of .csv, .txt, and .xlsx content, and then documenting the details of any matches. Some of my items include: mimikatz %comspec% MiniDump (Get-Process lsass) -noprofile -nop -encoded -enc FromBase64 -exec bypass -version 2 -Invoke-Webrequest New-Object System.Net.WebClient wget start-bitstransfer processhacker webbrowswerpassview defendercontrol advanced port scanner logcleaner psexesvc sdelete.exe
Andrew Rathbun 12/31/2020 3:55 AM
This looks like something I'd use to PowerGREP over all my KAPE output
Avatar
Avatar
Seladour
I'm pretty sure, I copied it into a basic base64 decoder and all I could read from the decoded data was "bplist" and nskeyedarchive - I just assumed from there I would need to get that bplist out somehow and into a plist editor to read it?
So, just to be clear, you found a base64 encoded bplist within the data of another bplist?
Avatar
Avatar
AmNe5iA
So, just to be clear, you found a base64 encoded bplist within the data of another bplist?
I've got a base64 encoded bplist within the data of another plist (I'm looking at the Adjustments.plist if that helps at all).
Avatar
base64 -d base64.file > bplist.file #This command should work. first copy the base64 encoded data into a new file, base64.file is an example as is bplist.file.
4:14 AM
If using windows, you should still be able to use this command using WSL https://docs.microsoft.com/en-us/windows/wsl/
Explore the Windows Subsystem for Linux documentation.
Avatar
Avatar
AmNe5iA
base64 -d base64.file > bplist.file #This command should work. first copy the base64 encoded data into a new file, base64.file is an example as is bplist.file.
You've been really helpful, thank you so much!
Avatar
Avatar
Andrew Rathbun
This looks like something I'd use to PowerGREP over all my KAPE output
chuckych33s3 12/31/2020 6:02 AM
That's exactly what this is.
Avatar
Avatar
chuckych33s3
That's exactly what this is.
Andrew Rathbun 12/31/2020 6:05 AM
ADMIN$ maybe
👍 1
6:05 AM
pastebin
👍 1
Avatar
Avatar
robmsp2677
In the past I've used Thunderbird and Mail Viewer
dumpanddecode 12/31/2020 7:27 AM
Thanks
👍 1
Avatar
Cyb3rSn0rlax 1/2/2021 5:26 AM
Would it be worth the effort to create an open elk instance that parses data generated by dfir tools like kape or eztools and centrally manage and view that on kibana?
5:26 AM
Happy new year to everyone
Avatar
Would it be worth the effort to create an open elk instance that parses data generated by dfir tools like kape or eztools and centrally manage and view that on kibana?
@Cyb3rSn0rlax Have you looked at SOF-ELK? https://github.com/philhagen/sof-elk
Configuration files for the SOF-ELK VM, used in SANS FOR572 - philhagen/sof-elk
Avatar
Avatar
OMENScan
Would it be worth the effort to create an open elk instance that parses data generated by dfir tools like kape or eztools and centrally manage and view that on kibana?
@Cyb3rSn0rlax Have you looked at SOF-ELK? https://github.com/philhagen/sof-elk
Cyb3rSn0rlax 1/2/2021 8:38 AM
Yes i did but i wanna created a dedicated one for windows digital forensics. There is already a great amount of work done for supporting kape maybe i will contribute
8:38 AM
Thanks (edited)
Avatar
You can play with AChoir or AChoirX. They both can collect a machine, and then you can run the AChoir/AChoirX PLASO.ACQ script against the collection to turn it into a supertimeline, and then ingest it into SOF-ELK. Then use Kibana to explore the data.
💙 1
Avatar
Hi all! So I’m running a DFIR blog. I need some new topics to talk about. Does anyone have ideas?
3:38 PM
It’s been almost a month since I posted on my blog. Stress has gotten in the way but I’m ready to get back into it.
Avatar
randomaccess 1/4/2021 1:46 AM
@Dany there are many, depending on what area you want to focus on. Simple things like testing a new tool and comparing it to old ones. Explaining how to create an artifact Describing a problem youre trying to figure out a solution from A book review Walk through answers to a CTF. There are lots of possibilities
Avatar
@Dany GPS in general. Always an important topic in cases. @CLB_iwhiffin did a great blog already.. or "was this picture/video made with this device" is a question we get often.
Avatar
chrissmith6998 1/4/2021 9:05 AM
I've been trying to test acquisitions from the new M1 Macs and haven't met with much success -- anyone else finding that the MacQuisition dongle won't detect? In TDM, data from the machine is presented as network shares (files/folders) and not as disk to image -- not ideal. Looking for other options and any input/validation would be much appreciated!
Avatar
Avatar
chrissmith6998
I've been trying to test acquisitions from the new M1 Macs and haven't met with much success -- anyone else finding that the MacQuisition dongle won't detect? In TDM, data from the machine is presented as network shares (files/folders) and not as disk to image -- not ideal. Looking for other options and any input/validation would be much appreciated!
I'm curious to know if you can boot into Paladin on the new M1. Have you tried that yet?
Avatar
chrissmith6998 1/4/2021 9:27 AM
Not yet but good idea! I'll try that when possible
Avatar
Anybody know how/if you can add a program to a linux bootable USB?
Avatar
Avatar
chrissmith6998
I've been trying to test acquisitions from the new M1 Macs and haven't met with much success -- anyone else finding that the MacQuisition dongle won't detect? In TDM, data from the machine is presented as network shares (files/folders) and not as disk to image -- not ideal. Looking for other options and any input/validation would be much appreciated!
I don't think there are any forensic tools that run on M1. Cellebrite have confirmed that Data Collector (previously MacQuisition) won't work on it. Paladin won't work on it as it's compiled to run on amd64 architecture CPUs (same reason MacQuisition won't work) I think anything that you want to boot into using an M1 Mac will need to be specifically compiled for the M1 chip. I'm not sure if regular ARM linux or ARM WinFE will run on an M1 but I doubt it.
👍 1
Avatar
Avatar
Cole
Anybody know how/if you can add a program to a linux bootable USB?
chrissmith6998 1/4/2021 9:41 AM
I know it's possible at least! Afraid I haven't done it myself however.
Avatar
Avatar
AmNe5iA
I don't think there are any forensic tools that run on M1. Cellebrite have confirmed that Data Collector (previously MacQuisition) won't work on it. Paladin won't work on it as it's compiled to run on amd64 architecture CPUs (same reason MacQuisition won't work) I think anything that you want to boot into using an M1 Mac will need to be specifically compiled for the M1 chip. I'm not sure if regular ARM linux or ARM WinFE will run on an M1 but I doubt it.
chrissmith6998 1/4/2021 9:41 AM
Thanks much! I won't bother spinning my wheels on this with those tools at least... 😉
Avatar
I contacted Cellebrite about M1 support and they only offered the smb share option you have already discovered on your own.
Avatar
Avatar
AmNe5iA
I contacted Cellebrite about M1 support and they only offered the smb share option you have already discovered on your own.
chrissmith6998 1/4/2021 9:42 AM
Yep, makes sense and this was my thinking also -- will work to test it out when I can get to it! (edited)
Avatar
Random question. Has anyone ever had a file in FTK with the date displayed as ##/##/2100. This is an .E01 image that was restored to a HDD on 12/31/2020. Only one file file has the ##/##/2100 date. TIA :)!
Avatar
Avatar
AmNe5iA
I don't think there are any forensic tools that run on M1. Cellebrite have confirmed that Data Collector (previously MacQuisition) won't work on it. Paladin won't work on it as it's compiled to run on amd64 architecture CPUs (same reason MacQuisition won't work) I think anything that you want to boot into using an M1 Mac will need to be specifically compiled for the M1 chip. I'm not sure if regular ARM linux or ARM WinFE will run on an M1 but I doubt it.
Post by @SUMURI 10 minutes in mentions imaging and issues presented. https://youtu.be/rgfYuuAUU8A
Avatar
@chrissmith6998 With RECON ITR, we are able to live image the new M1 machines as well as image using Sharing Mode. However, Sharing Mode is very slow, so we normally recommend using the live imager for M1 Macs. We are currently exploring options for a bootable solution, but it is dependent on changes from Apple's side. Let me know if you have any other questions about the M1 machines or anything Mac let me know. (edited)
👍 1
Avatar
locked Samsung Galaxy S9 (SM-G960U) @Cellebrite can premium get a physical ? DM me.
Avatar
In bound
👍 1
Avatar
have any of you guys tried this "find mobile offline" with Samsung?
Avatar
@Magnet Forensics - Hello, Does Axiom support Instagram collections or is that still in the works ? I dont have access to check on the updates for social media collections.
1:33 PM
Interested in collecting Instagram
Avatar
cScottVance 1/5/2021 1:35 PM
Dm incoming Jay.
Avatar
@Law Enforcement [UK] are any of you lovely peoples involved in CSAM investigations - particularly grading of images? I'm trying to gather an idea of how people present numbers (visual, binary, total) and also any thresholds you have (i.e. 1000 images) - if anyone can DM me would be great thanks
12:04 AM
And 1000 total illegal files (A-C) or 250 A's is our typical advice.
Avatar
A table containing the quantity of binary for each category, for example: Cat A 700 (670 visually unique) Then a description of three of each category
Avatar
Unique. Per exhibit and in total. All cats.
Avatar
@Rob Do you guys stop at that 1000 or do you have someone else complete the categorising ?
Avatar
Depends, some cases it continues
Avatar
was this stuff you agreed with your CPS? or just in-house this is how it's been done
Avatar
But if there's a ton of precat then we typically just do the CAID victim id checks and the officer gets a policy decision to call it a day
12:13 AM
I should add @Sudo that with our counts, if the binary unique vs totals are vastly different then we'll report both values for disclosure else we'll go with solely totals. I was told that our 1000 totals threshold to stop was agreed with our CPS @Muad'dib
Avatar
Same here with the totals reporting.
Avatar
thanks for the info guys
Avatar
CptWaistcoat_57354 1/6/2021 12:28 AM
@Sudo see section titled "The Proportionate Assessment" https://www.cps.gov.uk/legal-guidance/indecent-and-prohibited-images-children This discusses a number of factors when 1000 or 250 might be used or exceeded, whether the suspect is low risk, etc
👍 1
Avatar
We report visually unique numbers per exhibit (and the total thereof). We don’t do breakdown per sub exhibit (our ISO procedures sub exhibit individual hard drives). Binary unique and binary totals are not reported at an SFR1 stage. The numbers we work to are what we understand are agreed as a ‘large collection’ for the sentencing guidelines. In our case this is 150 A, 250 B and 500 C. (edited)
12:39 AM
All grading in our force is done by POLIT officers rather than our DFU. We tend to work to our numbers + 1 hour of work (for CAID - focusing on unconfirmed) + victim ID work. Very often though the grading officers just grade all material from exhibits we are using in evidence
Avatar
thanks everyone
2:45 AM
all very helpful
Avatar
Andrew Rathbun 1/6/2021 3:18 AM
Have done CSAM before. Former US LE. What exactly are these categories? Never heard of those before (edited)
3:21 AM
Ah finally found it in that link towards the bottom. That was a good skim. Seems very straightforward and covers lots of bases
Avatar
trying to sort some sort of similar thing locally yeah
3:35 AM
we have an "MOU" of sorts but it doesn't cover important stuff like how to present the numbers i.e. total, binary, visual
Avatar
Avatar
CptWaistcoat_57354
@Sudo see section titled "The Proportionate Assessment" https://www.cps.gov.uk/legal-guidance/indecent-and-prohibited-images-children This discusses a number of factors when 1000 or 250 might be used or exceeded, whether the suspect is low risk, etc
Worth nothing that this approach should only really be used with low risk offenders. If its someone with first generation images I wouldn't stop at 1000 as there could be additional victims in there that need to be identified
6:53 AM
Literally missed your end bit which stated low risk. 😂 My bad
Avatar
Avatar
K23
Literally missed your end bit which stated low risk. 😂 My bad
CptWaistcoat_57354 1/6/2021 9:57 AM
Haha it's ok, no problems 🙂
Avatar
Please what schools offers digital forensics courses in the usa?
Avatar
There are a lot of them in the USA I know In Canada the Canadien government has built a website of all digital forensics schools. Maybe on the USA government website, you can fount some.
Avatar
@IsaCrypt There are a lot of schools that offer programs now. Check out #training-education-employment . If you are looking for certain courses, etc.
Avatar
What forensics software do you recommend to me, for computer forensics? I know FTK imager and few others. (edited)
Avatar
Avatar
CCNA
What forensics software do you recommend to me, for computer forensics? I know FTK imager and few others. (edited)
If you are looking for free software then I would recommend Autopsy for analyzing the .E01 images created by FTK.
Avatar
Thanks, I know Autopsy it's awsome
👍 2
Avatar
Hello Y'all, I am currently working on Windows 10 Pro machine where Bitlocker was activated and it was disabled after sometime. I am currently trying to find out when the Bitlocker was activated and which user account was used to do. Still, I cannot find out any relevant events for the activity can anyone suggest how to get these artefacts? Thanks
Avatar
Avatar
CCNA
What forensics software do you recommend to me, for computer forensics? I know FTK imager and few others. (edited)
If you are looking for something free to start learning on we offer PALADIN LTS for free to students. It has a lot of open source tools, including things like Autopsy,that are great for students getting into forensics. https://sumuri.com/product/paladin-lts/
PALADIN is a modified “live” Linux distribution based on Ubuntu that simplifies various forensics tasks in a forensically sound manner via the PALADIN Toolbox. PALADIN is a complete solution for triage, imaging, examination and reporting. PALADIN is available for FREE. However, we kindly request a donation to support the project and keep the upd...
Avatar
Thanks you @John
Avatar
Hi guys, are there any good SOPs for handling optical drive data (CDs/DVDs etc)? I am working on CSA cases and I need to screen for this data.
4:52 AM
Right now I was sorting the disks so that I start with RWs and look for sessions with FTK Imager (I think this makes sense?).
4:53 AM
If there's any pics/videos on it I manually screen by display everything recursively in dopus/explorer
4:53 AM
However, this is an exhausting process and very slow
4:53 AM
In another case I created iso-files with FTK but AXIOM wont read them?
4:54 AM
I am dealing with 50 disks rn, any recommentions?
Avatar
Avatar
Luci
I am dealing with 50 disks rn, any recommentions?
Digitalferret 1/7/2021 5:15 AM
if it's any use, Data Recovery sw (particularly R-Studio) might help. the main reason i use it is you can gather all disk files by file extension. in a multidirectory / multi depth environment it helps to extract, say, all JPG (or any combination of extension) and put them in a single level, flat, hierarchy. Then it's easier to make manual checks using an image browser. i find irfanview excellent for this. lmk and i can pop a few screencaps for you. R-Studio is free to trial too, (edited)
Avatar
Digitalferret 1/7/2021 5:32 AM
there are other "perks" too such as when selecting by file ext, you can pop back into folder view and see which folders contained said ext's. it can also provide a full listing of directory contents, or a listing of only the fields (.jpg say) that you [x] select (edited)
Avatar
Digitalferret 1/7/2021 5:39 AM
also if it's any use, just my own opinion not a ratified SOP, maybe image all CD's to a hard drive (find some way to separate, maybe each has its own partition) and then work on those (disc) images rather than each individual CD/DVD. massively quicker in terms of read access and DR operations. (edited)
Avatar
Avatar
Digitalferret
also if it's any use, just my own opinion not a ratified SOP, maybe image all CD's to a hard drive (find some way to separate, maybe each has its own partition) and then work on those (disc) images rather than each individual CD/DVD. massively quicker in terms of read access and DR operations. (edited)
This is what I thought doing after a triage process, however which tools will support iso files? Autopsy maybe?
6:06 AM
tl;dr how to image CDs as e01
Avatar
SPVQct3207 1/7/2021 6:10 AM
Hi there! Yesterday I have to testify in court and I have to explain at the judge how represent 100 tb. The judge know nothing and I have to compare this to usb thumbdrive of 32 gb how much is to 100 000 gb (3125 usb stick). Now I looking for a poster or something like that who can explain 1 go equal to ??? paper, ??? box of paper of ??? book. I would like to keep the poster for me but help me to explain by voice in court. Like a poster of data comparison for newbie! thanks (edited)
Avatar
Avatar
SPVQct3207
Hi there! Yesterday I have to testify in court and I have to explain at the judge how represent 100 tb. The judge know nothing and I have to compare this to usb thumbdrive of 32 gb how much is to 100 000 gb (3125 usb stick). Now I looking for a poster or something like that who can explain 1 go equal to ??? paper, ??? box of paper of ??? book. I would like to keep the poster for me but help me to explain by voice in court. Like a poster of data comparison for newbie! thanks (edited)
I got you
👏 1
6:36 AM
Avatar
SPVQct3207 1/7/2021 6:37 AM
@Cole Nice!!!!! Thanks!
Avatar
I assuming these are all accurate I didn't actually verify
Avatar
SPVQct3207 1/7/2021 6:38 AM
@Cole I will verify with SpaceX if the next launch I can have a seat to verify....!
😂 2
Avatar
Avatar
Luci
tl;dr how to image CDs as e01
Digitalferret 1/7/2021 6:38 AM
R-Studio will perform byte to byte images, not sure about e01, let me check other DR gear
Avatar
Digitalferret 1/7/2021 6:46 AM
DR s/w looks to be hit and miss with respect to writing forensic images . R-Studio will produce (Technican version only) a "forensic" image. GetData explicitly states it can write to e01 format.
Avatar
Digitalferret 1/7/2021 6:55 AM
haven't used it in ages, but i believe FTK imager (free) wil also write to e01
Avatar
Thanks @Digitalferret
Avatar
I have what I hope is an easy question for someone: while I know IPs associated with a mobile device change frequently, when a new lease occurs how different is the new IP?
12:35 PM
I’m working an investigation where some malicious activity occurred on someone’s social media account from XXX.XXX.XXX.42 but I also can confirm that the victim’s mobile IP just a day earlier was XXX.XXX.XXX.40
Avatar
Avatar
Cole
I got you
And if you really want to make an impression, run down to Office Max and buy that many boxes of paper as a exhibit in the courtroom. 😉
💯 1
Avatar
Bringing this question up again as it doesn't look like it's been discussed in here for nearly a year. Does anyone know if there's any way to collect video from TikTok accounts?
Avatar
@zatch you should see pictures of the videos
3:42 PM
They are saved to fresco3cache I have the correct path at work
3:43 PM
I was doing testing and tomorrow I can share what I have
👍 1
Avatar
That would be great! I'm doing some testing of my own as well and can post any results if I find something that works. For some more context, I was asked for a capture of a user's account to which I was provided credentials for and consent to capture (screenshots/PDF of their page and each post) + video of each post in a displayable video format (such as mp4). I tried using WebPreserver which I've had success in capturing video from other web pages with in the past, but it's not able to grab TikTok video
Avatar
Avatar
zatch
Bringing this question up again as it doesn't look like it's been discussed in here for nearly a year. Does anyone know if there's any way to collect video from TikTok accounts?
I have done some research into TikTok videos, downloads, and authenticity. My experience is you will have to download/save each video individually. It will download as an .mp4. If you run into issues with that or authentication of the files feel free to shoot me a message.
Avatar
Avatar
John
I have what I hope is an easy question for someone: while I know IPs associated with a mobile device change frequently, when a new lease occurs how different is the new IP?
Here are 27 mobile data IP addresses (partially redacted) from the same social media account over the course of 30 days.
4:53 PM
AB.XYZ.28.126 AB.XYZ.29.101 AB.XYZ.28.209 AB.XYZ.29.75 AB.XYZ.29.23 AB.XYZ.28.206 AB.XYZ.29.198 AB.XYZ.29.6 AB.XYZ.29.145 AB.XYZ.29.83 AB.XYZ.28.41 AB.XYZ.29.190 AB.XYZ.28.77 AB.XYZ.29.244 AB.XYZ.29.34 AB.XYZ.29.20 AB.XYZ.28.251 AB.XYZ.29.61 AB.XYZ.29.138 AB.XYZ.29.150 AB.XYZ.29.236 AB.XYZ.28.119 AB.XYZ.29.58 AB.XYZ.28.26 AB.XYZ.29.203 AB.XYZ.28.33 AB.XYZ.28.42
4:53 PM
I can determine how long it was between each address, but I wouldn't be able to get that to you until Monday.
Avatar
Deleted User 1/7/2021 8:58 PM
@John You can test this for each provider by just turning off the modem and turning it back on again. Run a script to check the IP each time.
8:59 PM
I imagine that the way they're assigned will differ based on provider.
Avatar
Can someone please suggest me a P2P investigation tool?
Avatar
Deleted User 1/7/2021 9:51 PM
@NOMAD_596 What kind of information were you hoping to glean?
Avatar
Hello everyone, A curiosity question for you all: How do you run your DFIR analysis update calls with your client? (incident management) i.e is this daily calls? do you send daily analysis findings/progress emails? if calls, are these based on some update slides, or pre-shared notes etc. Any input much appreciated 🙂 Was just curious as to all the different ways, and styles it is being done in by members of this community
Avatar
@NOMAD_596 what P2P client do you want to look at
Avatar
what do you mean mr shark? how do we update people to progress on DFIR jobs?
Avatar
Avatar
Sudo
what do you mean mr shark? how do we update people to progress on DFIR jobs?
Andrew Rathbun 1/8/2021 3:33 AM
He's likely talking about private sector engagements and dealing with clients. Something I had no idea about until I joined a consultancy 😋
🙂 1
Avatar
teehee
3:34 AM
we do refer to our recipients as customers or clients, even if they are also LE
😆 1
Avatar
Avatar
Salvatore
Hello everyone, A curiosity question for you all: How do you run your DFIR analysis update calls with your client? (incident management) i.e is this daily calls? do you send daily analysis findings/progress emails? if calls, are these based on some update slides, or pre-shared notes etc. Any input much appreciated 🙂 Was just curious as to all the different ways, and styles it is being done in by members of this community
Andrew Rathbun 1/8/2021 3:35 AM
Daily calls can happen for higher profile engagements or if the client requests it. Usually examiners aren't super involved in those because if you're stuck on calls all the time, who is doing the analysis? And then what is there to ever update if you're always on calls? Lol
😆 1
Avatar
different expectation though I'm sure, though depending on which "customer" it is they want round the clock updates haha
Avatar
Andrew Rathbun 1/8/2021 3:36 AM
Typically, 1-2 calls a week depending on the client/nature of the engagement. If there's active negotiations with the threat actors then sometimes that requires more frequent communications that are driven by forensic findings.
👍 2
3:37 AM
Usually you leave calls with an idea of when the next update call will be. All depends on the tasks at hand and how time intensive they are
👍 1
Avatar
With ISO any submitting officer / the constabulary is technically our customer or client. We have SLAs etc to keep contact up to date, but we also have a massive queue. So normally update when starting a case, if there is any queries during then at the end when reporting the data
Avatar
Ah ok. Yes, for that K23, and Andrew, good insight
Avatar
@Cellebrite if MyCellebrite support ticket shows a status of "Targeted in Release" does that mean the issue is "fixed" and will be in the upcoming release?
Avatar
@AA so the bug fix is coming in an upcoming release
👍 1
Avatar
@FullTang and @Deleted User Thank you for the information. I guess what I'm trying to determine is if a cellphone was using a specific IP address (AB.XYZ.CDE.10) and that the next day malicious activity occurred from IP (AB.XYZ.CDE.2) there's a good chance its coming from the same cellular device. My goal is to determine if genuine activity is occurring in this household or if maybe someone in the house is using the phone when no one is around and making it look like there's strange activity.
Avatar
@Cellebrite I'm interested in Cellebrite Touch 2. But I will use it just a couple of times every year. If I purchase it new, does the license comes with it? IF No, how much does the license cost?
Avatar
Krieger0311 1/8/2021 1:05 PM
@Magnet Forensics or anyone else- we recently purchased Axiom Cyber and have been working through configuring everything to work properly. Most of it was pretty simple, however after creating an account specifically for Axiom and giving it global admin permissions we can connect to everything under the cloud integrations except for O365 audit logs and teams chats. I've opened a support ticket that has been open for over a month now with no real progress and have been spinning my wheels on it. everything seems to be configured fine and there are no errors in the logs. also, for the audit logs I can view them from the Microsoft UI but Axiom says my account doesn't have the right permissions. I've checked the documentation multiple times but still can't get it. If anyone can assist it would be greatly appreciated!
Avatar
Avatar
John
@FullTang and @Deleted User Thank you for the information. I guess what I'm trying to determine is if a cellphone was using a specific IP address (AB.XYZ.CDE.10) and that the next day malicious activity occurred from IP (AB.XYZ.CDE.2) there's a good chance its coming from the same cellular device. My goal is to determine if genuine activity is occurring in this household or if maybe someone in the house is using the phone when no one is around and making it look like there's strange activity.
I haven't done any testing into that, sorry. I like Doc's idea of validation using a mobile device on the same network and running a tool to check the device's IP address. There are apps on both the iTunes and Google Play stores that would work, it would just require validation from the same cellphone provider in question.
Avatar
Avatar
CCNA
@Cellebrite I'm interested in Cellebrite Touch 2. But I will use it just a couple of times every year. If I purchase it new, does the license comes with it? IF No, how much does the license cost?
I see you are a dfir student. Send me a dm and I can put you in touch with the proper people.
Avatar
Avatar
Dfdan
@NOMAD_596 what P2P client do you want to look at
mostly Bittorrent, frostwire,limewire,vuze etc..currently we are using Magnet Axiom for acquisition and analysis of P2P clients. just wanted to know which tool does it best.
Avatar
Avatar
Deleted User
@NOMAD_596 What kind of information were you hoping to glean?
mostly Bittorrent, frostwire,limewire,vuze etc..currently we are using Magnet Axiom for acquisition and analysis of P2P clients. just wanted to know which tool does it best.
Avatar
@NOMAD_596 I would also look at standalone parsers of the torrent client used in your investigation. E.g I have a eMule job. Parsed that in a parser I found online, giving me some clear stats, such as files downloaded, searches carried out, files shared with others, amount of data uploaded, location of downloaded P2P files. This can further prove or disprove the offences.
Avatar
Kind of a silly question if someone can help: encase isn't recognizing the dongle I have so it's giving me a "no v7 cert" error. How do I get it to see the dongle again
Avatar
Avatar
HBC
Kind of a silly question if someone can help: encase isn't recognizing the dongle I have so it's giving me a "no v7 cert" error. How do I get it to see the dongle again
Andrew Rathbun 1/9/2021 4:40 PM
I remember dealing with that a lot. I stopped using EnCase partially because of that 🤷‍♂️
4:40 PM
Sorry, that doesn't help, just making sure you know you aren't alone haha
Avatar
Hahaha thanks! Yea it pops up from time to time for us but it had been a bit (by some miracle) and now we can't remember what we did to fix it (edited)
Avatar
Ah yes came across first one. Cert keys in place! Checking second link
4:43 PM
Yup cert keys hrm.
Avatar
I think I'm just going to try the reinstall...
Avatar
Is it true that with AutoSpy it is capable to recover the Tor Browser History (.onion site)? (edited)
Avatar
Avatar
Andrew Rathbun
I remember dealing with that a lot. I stopped using EnCase partially because of that 🤷‍♂️
randomaccess 1/9/2021 5:27 PM
I solved all my encase problems by learning to use other tools
💯 4
😆 8
😁 1
Avatar
Avatar
HBC
Kind of a silly question if someone can help: encase isn't recognizing the dongle I have so it's giving me a "no v7 cert" error. How do I get it to see the dongle again
Go to program files > encase8 > certs > should be a cert file in there that it looks for. I believe you get this from encase upon purchase of a dongle license (edited)
3:04 AM
I would place all cert files your office has been given over the years in it.
Avatar
The reinstall did work but yea when i went to grab the certs back there were more in our general purpose "certs folder" so I had most of em, i think i grabbed someone elses dongle T_T
2:11 PM
just my luck lol so idk which cert goes with the dongle i have anymore lmao
2:11 PM
but it works now so eh
Avatar
If you add every cert into it you've been given can't go wrong! (edited)
Avatar
Looking for peoples opinions on the best computer forensics textbook beginner to intermediate level
Avatar
Deleted User 1/10/2021 11:59 PM
I'd also be kind of interested in that.
Avatar
Avatar
Ghosted
Looking for peoples opinions on the best computer forensics textbook beginner to intermediate level
"Guide to Computer Forensics and Investigations" hands down (edited)
Avatar
Avatar
Ghosted
Looking for peoples opinions on the best computer forensics textbook beginner to intermediate level
I am currently reading “File System Forensic Analysis“ by Brian Carrier. Even if new technologies appeared since it's release, it keeps answering my questions so far. Maybe "Eoghan Casey's Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet" for a discussion on the whole data gathering and analysis process.
👍 1
Avatar
Avatar
Krieger0311
@Magnet Forensics or anyone else- we recently purchased Axiom Cyber and have been working through configuring everything to work properly. Most of it was pretty simple, however after creating an account specifically for Axiom and giving it global admin permissions we can connect to everything under the cloud integrations except for O365 audit logs and teams chats. I've opened a support ticket that has been open for over a month now with no real progress and have been spinning my wheels on it. everything seems to be configured fine and there are no errors in the logs. also, for the audit logs I can view them from the Microsoft UI but Axiom says my account doesn't have the right permissions. I've checked the documentation multiple times but still can't get it. If anyone can assist it would be greatly appreciated!
forensicmike @Magnet 1/11/2021 8:54 AM
sending a DM
Avatar
Anyone hear about the parler data scrape?
9:47 AM
Parler has been hit by a massive data scrape. Security researchers collected swaths of user data before the network went dark Monday morning.
9:47 AM
Wonder what kind of forensic analysis can be done to locate people who committed criminal activity this past week
Avatar
Avatar
aster
Wonder what kind of forensic analysis can be done to locate people who committed criminal activity this past week
Andrew Rathbun 1/11/2021 10:01 AM
I'm sure whoever is assigned the investigation is doing whatever they can under applicable laws. I don't really envy anyone who's having to make sense of such a big incident such as this. Sounds like a cluster
Avatar
For sure, a lot of pressure to get the job done well and quickly no doubt. kind of the worst scenario to be doing it in
Avatar
Avatar
aster
For sure, a lot of pressure to get the job done well and quickly no doubt. kind of the worst scenario to be doing it in
Andrew Rathbun 1/11/2021 10:25 AM
Been there, done that, not fun at all.
Avatar
What, if any, resources does your agency/organization provide to new forensic examiners? I'm asking because my agency does not have a formal training method or resources for new examiners. Typically, a senior examiner is assigned to train the new hire. I would like to create a packet that contains guides/charts/recommended software/recommended websites to sign up for/etc. Anything important that might be of use that we could hand to a new forensic examiner and have a lot of those beginner things taken care of. Any ideas?
Avatar
@RyanB - in our team, we try and have new forensic examiners (if they beginners) to shadow learn and work with senior examiners. I.e a senior examiner delegates small crunchable tasks such as, parse MFT, analyse EVTX for network logs, etc. that way, they start learning different artefacts etc. i would probably direct them to SANS Hunt Evil posters, to give them an idea of all artefacts that could be looked for results.
11:36 AM
Next thing i would do , is add them to this discord group, so atleast if they get stuck, and you/senior examiner is not around, i have found this discord group to be friendly, in terms of asking questions or bouncing off your thought process
11:37 AM
https://aboutdfir.com/ - is also a good resource, you can learns tool/software capabilities much faster., i.e KAPE,
11:39 AM
You could also, if you are allowed to, on their down time, provide them with reports and case data from older cases, from which they can , either follow your forensic report, or have a go at the case data, and reach to the same findings and conclusions as stated in the forensic report
11:40 AM
That also has an added benefit of getting them familiar with your reporting style and language- which i think is also key when it comes to forensic examinations.
Avatar
Avatar
Salvatore
@RyanB - in our team, we try and have new forensic examiners (if they beginners) to shadow learn and work with senior examiners. I.e a senior examiner delegates small crunchable tasks such as, parse MFT, analyse EVTX for network logs, etc. that way, they start learning different artefacts etc. i would probably direct them to SANS Hunt Evil posters, to give them an idea of all artefacts that could be looked for results.
Thanks for the quick reply! Yes, we do the same thing. New examiners will work with an existing senior examiners for at least a few cases, learning the tricks and all that. I'll look into the posters. This discord, about.dfir.com and forensicfocus.com are definitely on the list of recommended resources. Yes, I was planning on providing copies of reports and such so they could see the format. I like the idea of providing old cases that could work for themselves and compare to my own findings. I hadn't thought of that! I was looking into providing test images that they could play and practice with, but old cases could be even better. Thanks!
👍 1
Avatar
Avatar
RyanB
Thanks for the quick reply! Yes, we do the same thing. New examiners will work with an existing senior examiners for at least a few cases, learning the tricks and all that. I'll look into the posters. This discord, about.dfir.com and forensicfocus.com are definitely on the list of recommended resources. Yes, I was planning on providing copies of reports and such so they could see the format. I like the idea of providing old cases that could work for themselves and compare to my own findings. I hadn't thought of that! I was looking into providing test images that they could play and practice with, but old cases could be even better. Thanks!
At your service
Avatar
Avatar
Ghosted
They are saved to fresco3cache I have the correct path at work
Hey, could you get me that path? I'm having trouble finding fresco3cache
Avatar
Deleted User 1/11/2021 4:22 PM
@aster From what I read
4:22 PM
It's not as complete as a lot of the hype articles are stating.
4:22 PM
Just public stuff.
Avatar
@Magnet Forensics Is there a way when exporting attachments from an Axiom case to maintain original file path of documents?
Avatar
Avatar
Salvatore
You could also, if you are allowed to, on their down time, provide them with reports and case data from older cases, from which they can , either follow your forensic report, or have a go at the case data, and reach to the same findings and conclusions as stated in the forensic report
Andrew Rathbun 1/11/2021 5:25 PM
Hey thanks for the shout! 😎
👍 1
Avatar
Avatar
zatch
Hey, could you get me that path? I'm having trouble finding fresco3cache
Zach sorry tomorrow I will DM you that info
Avatar
Does anyone have any experience with MegaSync? - Specifically the megasync.cfg file stored in AppData? It appears to be encoded/encrypted and I'm wanting to reverse that
Avatar
randomaccess 1/12/2021 12:01 AM
Easy automated syncing between your computers and your MEGA Cloud Drive - meganz/MEGAsync
👍 1
Avatar
Reasonably limited, I’ve passed that onto my colleague who was investigating further though
Avatar
Avatar
Dorsidhion
Does anyone have any experience with MegaSync? - Specifically the megasync.cfg file stored in AppData? It appears to be encoded/encrypted and I'm wanting to reverse that
We're using Axiom now for Mega Downloads if that helps.
Avatar
Avatar
Rob
We're using Axiom now for Mega Downloads if that helps.
It’s an incident response matter, Mega was used to exfil data and were wanting to see contents of the config file to see if there is anything useful in it To what extent are you using axiom for mega downloads?
Avatar
Avatar
Dorsidhion
It’s an incident response matter, Mega was used to exfil data and were wanting to see contents of the config file to see if there is anything useful in it To what extent are you using axiom for mega downloads?
Andrew Rathbun 1/12/2021 5:58 AM
Last I checked when I was looking into making a KAPE Target for Mega, it was all encrypted
👍 1
Avatar
Avatar
Dorsidhion
It’s an incident response matter, Mega was used to exfil data and were wanting to see contents of the config file to see if there is anything useful in it To what extent are you using axiom for mega downloads?
Downloading the physical contents of a suspect MEGA account
7:03 AM
Only thing I've noticed atm that it doesn't yet do is download the conversations
Avatar
Regarding MEGA client-side storage... you may want to run that by Francesco Picasso (https://twitter.com/dfirfpi). He put together a nice workflow for decrypting DPAPI-protected data from earlier versions of Dropbox, assuming DPAPI had already been unlocked. His workflow was solid - we've used it. Maybe he can come up with something for MEGA, and you can use Arsenal Image Mounter for the DPAPI unlocking.
Avatar
Anyone receiving reports of a worm that exploits Whatsapp?
10:46 AM
It already impacted several companies and people down here in Argentina, but it's not targeted at all (edited)
Avatar
Avatar
Dorsidhion
It’s an incident response matter, Mega was used to exfil data and were wanting to see contents of the config file to see if there is anything useful in it To what extent are you using axiom for mega downloads?
randomaccess 1/12/2021 2:09 PM
Have had a very similar investigation. Look for staging (mft or journal), look for file access especially to archive formats (as well as any mrus associated with file archiving tools) and then SRUM we had a case where we could see the .pst.encrypted file that was ransomwared, and SRUM showed a file roughly the same size going up and out before the ransomware was deployed
Avatar
Does the computer was infected or just the file was there?
Avatar
Anyone use the SEH Promax dongle server and remote into a machine with Cellebrite ? I was told the license would be seen when RDP. Anyone have a work around ?
Avatar
I am working on my research and have been trying to get Frida to run on a Google Pixel 4a but have run into several problems and am unsure how to fix them. When entering the commands the adb root command comes back with “adbd cannot run as root in production builds.” Additionally, when entering the adb shell su command, permission is denied. Lastly, the final shell command for frida produces various commands, but each time denies permission. The phone was rooted using Magisk and I have allowed super user permissions through apps and adbs. The SElinux is on enforcing mode. I had used an app to switch SElinux to permissive but the app had stopped working and even when it was on permissive mode it was not allowing the SElinux policy to be saved from the kernel.
Avatar
@Law Enforcement [UK] - Forensic Science Regulator's Annual Report https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/950087/FSR_Annual_Report_2019-2020_Issue_1.pdf. Interested to hear thoughts on the DF portions of this.
Avatar
elizavetabelkasoft 1/14/2021 3:48 AM
Hi everyone, Great news from Belkasoft: Belkasoft X version 1.1 is released. Among new features is a new method of Android acquisition (based on MTK agent), custom jumplists support, Japanese localization, multiple bugfixes, and artifact updates. Read more: https://bit.ly/3ssCfDo You can download the update in your Customer Portal (if you have a valid license) or trial at https://bit.ly/3souyOn
Avatar
Avatar
Lyndsay
I am working on my research and have been trying to get Frida to run on a Google Pixel 4a but have run into several problems and am unsure how to fix them. When entering the commands the adb root command comes back with “adbd cannot run as root in production builds.” Additionally, when entering the adb shell su command, permission is denied. Lastly, the final shell command for frida produces various commands, but each time denies permission. The phone was rooted using Magisk and I have allowed super user permissions through apps and adbs. The SElinux is on enforcing mode. I had used an app to switch SElinux to permissive but the app had stopped working and even when it was on permissive mode it was not allowing the SElinux policy to be saved from the kernel.
@Lyndsay, have you tried setting up an emulated phone via Android Studio instead? This is the way I use Frida for reverse engineering vault apps/locker apps etc. Setup an emulated android device via android studio, push the Frida server to the emulator, and run Frida that way. (edited)
4:26 AM
Advantage of this is you don't have to worry about rooting it etc, it's already rooted. You can save clean snapshots of the emulator. SO if you're messing about with an app and it all goes wrong, you can just load the clean version back up.
4:30 AM
If you do setup an emulated android handset via Android Studio (done via AVD Manager icon) ensure you pick a build WITHOUT the play store icon. If you select one with the play store icon, you'll run into similar issues with root privileges when pushing the frida server to the emulated device.
Avatar
Avatar
Lyndsay
I am working on my research and have been trying to get Frida to run on a Google Pixel 4a but have run into several problems and am unsure how to fix them. When entering the commands the adb root command comes back with “adbd cannot run as root in production builds.” Additionally, when entering the adb shell su command, permission is denied. Lastly, the final shell command for frida produces various commands, but each time denies permission. The phone was rooted using Magisk and I have allowed super user permissions through apps and adbs. The SElinux is on enforcing mode. I had used an app to switch SElinux to permissive but the app had stopped working and even when it was on permissive mode it was not allowing the SElinux policy to be saved from the kernel.
Have you disabled Magisk hide? It interferes with the way frida-server attaches itself to processes through Zygote
Avatar
Avatar
Falzar
Have you disabled Magisk hide? It interferes with the way frida-server attaches itself to processes through Zygote
I never had Magisk Hide turned on
Avatar
Do you have a superuser app to control access to su, like supersu/whatever Magisk uses, because that should show a toast/prompt whenever a command requiring superuser access is executed If you don't see that maybe you need to check there first
Avatar
I am using Magisk as the super user app control. I have it set to allow apps and adb. I see the prompt show up when requiring super user but it always comes back as access denied
Avatar
That's odd, no grant/deny?
6:28 AM
Maybe try reflash magisk and clear cache
6:30 AM
Could also be the prompt time being too short, and you can also try to set to automatically grant
Avatar
No I do not have the option to grant or deny. Okay I will give that a try
Avatar
Avatar
Falzar
That's odd, no grant/deny?
I have realized that when I open other apps on the phone a notification comes up saying that super user rights were granted to the app
Avatar
Avatar
Lyndsay
I have realized that when I open other apps on the phone a notification comes up saying that super user rights were granted to the app
Though when using the command adb shell su, permission is denied
Avatar
Hi guys! Quick question: we're building a manual for wiping files in mobile devices (so that not only our lab experts can do it but also the investigators). Does anyone come across this subject?
Avatar
Avatar
WesDx_Stu
@Law Enforcement [UK] - Forensic Science Regulator's Annual Report https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/950087/FSR_Annual_Report_2019-2020_Issue_1.pdf. Interested to hear thoughts on the DF portions of this.
Thanks for sharing this. I actually just posted on LinkedIn about it to raise awareness, because the FSR report actually contradicts, in many ways, the draft publication (currently in consultation) of the College of Policing APP on digital evidence extraction and analysis. The FSR report actually makes sense, whereas the CoP paper seems to be an absolute mess (and not helpful for Law Enforcement at all)
👍 1
Avatar
Had my first horror story last night. Was removing the encryption from a Bit Locker drive last night and of course half way though my power failed. The one time this has happened to me and of course it was during this. So the drive became unable to be opened, and I needed the recovery key to fix it. Of course the goverment didnt provide this with the drive.
9:17 AM
So I had a good half hour of pure panic.
9:18 AM
Ended up finding a program called M3 Bitlocker recovery that allowed me to recover the drive with just the password, but it's been running all night and still isnt done
Avatar
Avatar
Br3W7h1S
Thanks for sharing this. I actually just posted on LinkedIn about it to raise awareness, because the FSR report actually contradicts, in many ways, the draft publication (currently in consultation) of the College of Policing APP on digital evidence extraction and analysis. The FSR report actually makes sense, whereas the CoP paper seems to be an absolute mess (and not helpful for Law Enforcement at all)
The Attorney General’s revised Guidelines on Disclosure will come into force on 31 December 2020.
Avatar
Ooooh yes - that's been a big point of discussion in Force recently 😅
Avatar
dabeersboys 1/14/2021 10:03 AM
Good morning, afternoon, or evening! I'm helping another detective on a case and she needs to write a warrant to GrubHub. Instead of reinventing the wheel, I was hoping someone here would have one that they could pass along to me. Thanks!
Avatar
Has anyone gone through a renovation to their lab to install Faraday shielding for the whole lab? Just looking for some very general information.
Avatar
Avatar
dfa_adam
Has anyone gone through a renovation to their lab to install Faraday shielding for the whole lab? Just looking for some very general information.
dabeersboys 1/14/2021 10:43 AM
That would be awesome. I visited Indiana state police, one of the things they did is their old radio shop required faraday shielding, they were able to reuse that.
Avatar
randomaccess 1/14/2021 3:19 PM
@dfa_adam the whole lab? rather than just a room?
Avatar
ScottKjr3347 1/14/2021 3:22 PM
THANKS!!! @Cellebrite product team! So many complaints and feature requests have been corrected / incorporated into PA 7.42!! These features & updates will help every examiner. If you are using an older version and your lab requires testing & validation to update, I would suggest getting ready. You should not wait to update!! Great job CB
cellebrite 2
👍 2
Avatar
@randomaccess Yes, whole lab. Have to present a range of options - that'd be the pie in the sky option.
Avatar
Avatar
dfa_adam
@randomaccess Yes, whole lab. Have to present a range of options - that'd be the pie in the sky option.
randomaccess 1/14/2021 3:29 PM
Only downside is the health risks associated with staying in a faraday cage the whole day. We had signs outside ours for people that had pacemakers or were pregnant that had to be cleared. If you make the whole lab a faraday cage you may be limiting who can work there
Avatar
Hi there 👋 I published an article regarding the implant found inside a Russian iPhone. Feel free to take a look if you are interested 😊 https://twitter.com/Requiem_fr/status/1349862676474834951?s=19
I wanted to keep track of this topic and ended up writing my first public article ... if you wanna take a look it's here : https://t.co/33mCR9oeEx, i hope you will enjoy it. https://t.co/OwSDUDqIpe
👍 1
😮 1
Avatar
chrisforensic 1/14/2021 7:54 PM
@ScottKjr3347 is the beta PA 7.42 available for testing right now ?
Avatar
Good morning! Is there any way to see when a FaceID has been created from a full file system extraction?
Avatar
@ScottKjr3347 is the beta PA 7.42 available for testing right now ?
@chrisforensic what are the updates then 😅
Avatar
Yes 7.42 beta is out and it has some juicy updates like an updated gallery view, offline maps in a shared location, preliminary device report and so much more. So excited when it's out of beta!
💯 1
Avatar
chrisforensic 1/15/2021 1:26 AM
@B thanks 4 info ! will write beta-request-email 🙂 (edited)
Avatar
You will love the version for sure!
cellebrite 4
👍 1
Avatar
When it will be released ?
Avatar
Avatar
Franck
Hi there 👋 I published an article regarding the implant found inside a Russian iPhone. Feel free to take a look if you are interested 😊 https://twitter.com/Requiem_fr/status/1349862676474834951?s=19
Nice, we might be able to use this too 😆
🙃 1
Avatar
Avatar
florus
@ScottKjr3347 is the beta PA 7.42 available for testing right now ?
@chrisforensic what are the updates then 😅
@chrisforensic Also can provide wordlist upfront on import of the data.
👍 2
💯 1
🤩 1
Avatar
Avatar
Dfdan
@chrisforensic Also can provide wordlist upfront on import of the data.
That one sounds interesting to me
Avatar
Avatar
Lyndsay
I am working on my research and have been trying to get Frida to run on a Google Pixel 4a but have run into several problems and am unsure how to fix them. When entering the commands the adb root command comes back with “adbd cannot run as root in production builds.” Additionally, when entering the adb shell su command, permission is denied. Lastly, the final shell command for frida produces various commands, but each time denies permission. The phone was rooted using Magisk and I have allowed super user permissions through apps and adbs. The SElinux is on enforcing mode. I had used an app to switch SElinux to permissive but the app had stopped working and even when it was on permissive mode it was not allowing the SElinux policy to be saved from the kernel.
forensicmike @Magnet 1/15/2021 6:50 AM
Getting your test device setup with the correct permissions to run as root, while distinct from the occasional struggle of getting Frida to work once you have root, is definitely one of the bigger challenges to overcome.. especially on newer versions of Android.
Avatar
Avatar
Aero
If you do setup an emulated android handset via Android Studio (done via AVD Manager icon) ensure you pick a build WITHOUT the play store icon. If you select one with the play store icon, you'll run into similar issues with root privileges when pushing the frida server to the emulated device.
forensicmike @Magnet 1/15/2021 6:53 AM
Thought I'd throw in that if you are having trouble tracking down an x86 compatible APK (sometimes sites like APKPure don't have all variants) I've had success with an app called Raccoon ( https://raccoon.onyxbits.de/ ) which masquerades as an x86 device by default (can be changed)
Download the latest free and paid Android apps directly from the Google Play online store with the Raccoon APK Downloader.
👍 1
Avatar
Thanks @forensicmike @Magnet! 😁
Avatar
Trashboat667 1/15/2021 8:10 AM
Anybody had an experience with a Facebook warrant return pdf being different from the archive? I’ve got two on the same accounts and the suspect chats in the pdf start in January 2019 and but the parsed archive suspect chat starts in December 2020. Any idea why they would be different? Same result from both victim and suspect warrant returns. (edited)
Avatar
@Cellebrite Looking to DM someone regarding a recent extraction with multiple methods.
Avatar
Someone has work experienc With UFED premium ?
Avatar
@sforen system like Premium and Graykey have non disclosures i won't get much info about them from this group
12:00 PM
There is no further explanation Someone knows how to buy it
Avatar
Avatar
DCSO
@sforen system like Premium and Graykey have non disclosures i won't get much info about them from this group
Tnk
Avatar
@sforen sorry for the typo, yes in general if you are law enforcement etc you can purchase the system. Its proprietary so they don't ship it to the general market.
Avatar
Question: Is Acquire Forensic's free OST viewer still a viable option or is there a new tool in town to do some OST viewing?
Avatar
Avatar
DEVNULL
When it will be released ?
ScottKjr3347 1/15/2021 6:19 PM
Unknown at this time. Normally it's within 2 weeks of the beta being released.
Avatar
Avatar
DefendingChamp
Connor are you in forensic science or digital forensics? Both are completely different
John Connor 1/16/2021 2:15 PM
Sorry I didn't see this before, I am studying digital forensics as focus in my cybersecurity degree.
Avatar
ACE Alchemy Soulblaze 1/16/2021 2:37 PM
Hi all and happy new year. Is anyone aware of what certifications a DF analyst should pursue? Thanks in advance
Avatar
depending on your budget I would suggest CFCE, eDFCP or GCFE
Avatar
randomaccess 1/17/2021 2:03 AM
2c re the ones mentioned GCFE (cert relating to the SANS FOR500 class) is a great cert (full disclosure, i teach the class). It doesnt cover much in the way of principles of foreniscs and instead focuses on a bit of early process and then full on artifact mode CFCE, i havent taken the BCFE training class, but BCFE did cover some of the principles, but spends a lot of time looking at in depth file system stuff. Good to know, but not as critical as maybe it once was. Certs are great, they cost a lot, and realistically they may be a foot in the door for places them that require it. The other thing to consider is that they're just ascerting some degree of competency in the subject matter. So if there's a way to do that elsewhere then that's also a viable option - testing and documenting what you're learning publicaly is a good start
Avatar
Were a could find an iso image of a case to find evidence on. (I’m a student)
Avatar
Avatar
CCNA
Were a could find an iso image of a case to find evidence on. (I’m a student)
Andrew Rathbun 1/17/2021 7:22 AM
7:23 AM
https://github.com/rathbuna/LoneWolf2018KAPEOutput for KAPE output that I put together and shared (nothing special)
7:23 AM
and I'll update that for you, actually, standby
7:29 AM
Mount the image with Arsenal Image Mounter
7:29 AM
you can run KAPE against it yourself
Avatar
Avatar
Andrew Rathbun
https://github.com/rathbuna/LoneWolf2018KAPEOutput for KAPE output that I put together and shared (nothing special)
Andrew Rathbun 1/17/2021 7:33 AM
there, updated now with new output
Avatar
Avatar
Andrew Rathbun
Nullable Truth 1/17/2021 11:47 PM
@Andrew Rathbun Do you happen to know what file explorer is use in those screenshots?
11:53 PM
It looks like Dopus.
Avatar
Long code incoming. If something looks like the following in a UFED extraction reagrding a location, does that mean that the phone was there at the given time? Googling gave me middling answers. 566f75a3caefb1f868aa6dedfa6cca2460cebc6e_files_full.zip/private/var/mobile/Library/Caches/com.apple.routined/Local.sqlite-wal : 0xFE049 (Table: ZRTLEARNEDLOCATIONOFINTERESTVISITMO, Size: 1112432 bytes)
Avatar
Avatar
Nullable Truth
@Andrew Rathbun Do you happen to know what file explorer is use in those screenshots?
Andrew Rathbun 1/18/2021 2:48 AM
I made the guide so yes I do. Directory Opus.
Avatar
@TwiZtah If i remember correctly that table refers to "Significant Locations" and should be a good indication that the phone might have been there at that time. It could also be another device connected to the same icloud account that was at the location. Information about what device the location was collected from should be present in the same database. As always it should be mentioned that locations are not 100% accurate and it's only the best guess of the device 🙂
Avatar
Hi all, I have a hard drive that was bent by a suspect prior to seizure. No attempts have been made to examine that for fear that powering it on may cause further damage. I am looking to send it away, as our island doesnt have the capability to reconstruct this harddrive. Would any be able to provide me with some contact details for somewhere that will be able to assist in obtaining any data from this harddrive?
Avatar
Avatar
Benj
Hi all, I have a hard drive that was bent by a suspect prior to seizure. No attempts have been made to examine that for fear that powering it on may cause further damage. I am looking to send it away, as our island doesnt have the capability to reconstruct this harddrive. Would any be able to provide me with some contact details for somewhere that will be able to assist in obtaining any data from this harddrive?
Andrew Rathbun 1/18/2021 5:24 AM
I would try searching UK Data Recovery Services and getting some quotes from some of those companies. I did a quick search and looks like you have at least a handful of good options.
Avatar
Does anyone know more forensic suites like NUIX, AccessData Quin-C, AccessData FTK Lab, Cellebrite Pathfinder, t3k.ai? A suite which can handle multiple cases / users, can handle mobil forensic evidence, x86 an apple os?
Avatar
i know that magnet forensics is working on a suite too.
Avatar
I'll try here as well... I'm using Cellebrite PA on an iPhone, and have a question regarding location data. If the location data identifies as a cell tower, the source file for the data is /private/var/root/Library/Caches/locationd/cache_encryptedB.db-wal, table: LteCellLocation, does the position data correspond to the cell tower itself, or the position of the handset?
Avatar
Avatar
dotmatrix
I'll try here as well... I'm using Cellebrite PA on an iPhone, and have a question regarding location data. If the location data identifies as a cell tower, the source file for the data is /private/var/root/Library/Caches/locationd/cache_encryptedB.db-wal, table: LteCellLocation, does the position data correspond to the cell tower itself, or the position of the handset?
it should be the position of the cell tower. here is a rather old but hopefully still valid article about it: https://www.forensicfocus.com/articles/iphone-tracking-from-a-forensic-point-of-view/
– Introduction – iPhoneTracking is sexy!!! Every mobile forensic suite, at least the ones dealing with iPhones, are providing it ... Read moreiPhone Tracking – from a forensic point of view
Avatar
Thank you @Zoidberg!
Avatar
Andrew Rathbun 1/18/2021 12:22 PM
thank you @Mr. Eddie Vedder from Accounting for the boost!
Avatar
rugby_tech#7130 1/19/2021 12:16 PM
Evening, we are looking at outsourcing a number of devices (the usual seized items from IIoC cases). UK LE, which companies have you utilised apart from the obvious shout outs. Any positive testimonials would be appreciated. Thanks in advance
Avatar
@rugby_tech#7130 Depends on the usual shout outs and your location i suppose, however Eurofins, CCL, Intaforensics, Sytech are probably the main players
Avatar
Hi, I'm looking at pushing for expansion of my office and I'm curious as to whether anyone has any research data or documents online they can point me to to show the growth of digital forensics so I can show how the size of storage, and requirement for more funding and manpower has increased? Anyone done anything like this before and had success selling it?
Avatar
Long shot, do we know what the datacount refers to in the database "ZRTLEARNEDLOCATIONSOFINTERESTVISITMO" in an iPhone? I suspect it is how many times in a given time interval the phone has been pinged by the GPS
Avatar
Avatar
TwiZtah
Long shot, do we know what the datacount refers to in the database "ZRTLEARNEDLOCATIONSOFINTERESTVISITMO" in an iPhone? I suspect it is how many times in a given time interval the phone has been pinged by the GPS
Location data is one of the most sensitive pieces of personal information. In today's world, aggregated location data is as sensitive and as valuable as the user's passwords. Once this data is transmitted to the OS manufacturer's cloud service or any of the third-party vendors, the user has the righ
2:45 AM
You will get more answer in #mobile-forensic-decoding
Avatar
Anyone here have PCI-E NVMe SSDs in their workstation and have installed Windows 10 onto them? Can you shoot me a message?
Avatar
Anyone have a drug related cellebrite watch list/wordlist?
Avatar
Avatar
Cole
Anyone have a drug related cellebrite watch list/wordlist?
Andrew Rathbun 1/20/2021 11:11 AM
check dfir.training, they may have one there
Avatar
oooo I like. Thanks!
Avatar
Avatar
Andrew Rathbun
check dfir.training, they may have one there
Didn't realize that was a website....
Avatar
Avatar
Cole
Didn't realize that was a website....
I had no clue either, I like it!
Avatar
Andrew Rathbun 1/20/2021 1:02 PM
Brett Shavers runs the site. He used to do undercover narcotics and whatnot. Great resource for that type of thing.
1:02 PM
@Brett Shavers or @DFIR.Training, for reference (edited)
👍 1
Avatar
Thanks!
Avatar
Avatar
kairos
Question: Is Acquire Forensic's free OST viewer still a viable option or is there a new tool in town to do some OST viewing?
data_grizzly 1/20/2021 4:00 PM
@kairos I use PST Walker (in combination w MSG 2 PST if needed) and Kernel for OST to PST for getting OST to PST/msg
Avatar
Thanks
Avatar
Andrew Rathbun 1/20/2021 7:44 PM
I gotta say, what an awesome community this has become. Thanks to everyone for hanging around day in and day out and keeping this place active. Really awesome checking the newest messages day in and day out and seeing all that goes on. It's just awesome 👍
👍 15
💯 1
Avatar
Avatar
Andrew Rathbun
I gotta say, what an awesome community this has become. Thanks to everyone for hanging around day in and day out and keeping this place active. Really awesome checking the newest messages day in and day out and seeing all that goes on. It's just awesome 👍
data_grizzly 1/20/2021 7:56 PM
Definitely, a great community and a great resource.
💯 6
Avatar
Avatar
Andrew Rathbun
I gotta say, what an awesome community this has become. Thanks to everyone for hanging around day in and day out and keeping this place active. Really awesome checking the newest messages day in and day out and seeing all that goes on. It's just awesome 👍
Thanks to you and the other moderators for setting it up and maintaining it. It's a great resource to exchange ideas and knowledge.
👏 5
Avatar
Does anyone have experience with search warrants and snapchat? I'm trying to understand what their return may contain so I can explain it to the detective.
Avatar
Trashboat667 1/21/2021 6:25 AM
Anybody with experience doing UC chat with Grindr that could message me?
Avatar
Avatar
Neon
Does anyone have experience with search warrants and snapchat? I'm trying to understand what their return may contain so I can explain it to the detective.
Andrew Rathbun 1/21/2021 6:33 AM
I do but a few years ago. I typically got all chat history, and last 90 days of snaps (pics/vids), regardless of timeframe I asked for
6:34 AM
Obviously, it's not as complete as I could because it's hard to be complete while still being relevant to the general LE masses, but it's the best I could do while still being applicable to as large of an audience as possible
Avatar
Avatar
Andrew Rathbun
I do but a few years ago. I typically got all chat history, and last 90 days of snaps (pics/vids), regardless of timeframe I asked for
Thank you very much. It's going to solve a homicide. All of the earlier messages had already disappeared.
Avatar
Avatar
Neon
Thank you very much. It's going to solve a homicide. All of the earlier messages had already disappeared.
Andrew Rathbun 1/21/2021 6:38 AM
As with all things SW and dealing with digital evidence and these social media companies, preservation letter needs to be submitted yesterday (edited)
👍 1
Avatar
Avatar
Andrew Rathbun
As with all things SW and dealing with digital evidence and these social media companies, preservation letter needs to be submitted yesterday (edited)
Yeah that's already been done. How long did it take to get a response?
Avatar
Avatar
Neon
Yeah that's already been done. How long did it take to get a response?
Andrew Rathbun 1/21/2021 6:44 AM
Back in 2016, we were getting responses in 2-3 hours. They've blown up since then and I've heard they take a lot longer now haha
Avatar
Avatar
Andrew Rathbun
Back in 2016, we were getting responses in 2-3 hours. They've blown up since then and I've heard they take a lot longer now haha
Makes sense. Well I appreciate your help. Thanks for the link, I shared it with the detective
👍 1
Avatar
I just presumed they took forever because they wanted to piss us off
🤣 1
Avatar
Avatar
Cole
I just presumed they took forever because they wanted to piss us off
Andrew Rathbun 1/21/2021 6:46 AM
Also not entirely out of the realm of possibility haha
Avatar
Avatar
Cole
I just presumed they took forever because they wanted to piss us off
Haha no doubt. I sent a search warrant to square(ca$h) and it took 6 months to get back on two different occasions.
Avatar
Andrew Rathbun 1/21/2021 6:47 AM
Google routinely took 2-4 months
Avatar
Avatar
3X3
Anyone here have PCI-E NVMe SSDs in their workstation and have installed Windows 10 onto them? Can you shoot me a message?
For anyone who had previously contacted me regarding this question - thank you for all your ideas, suggestions and input. A special thanks to @Cole for pointing me back towards a driver pack that I'd previously attempted and written off as 'not a fix', the driver I needed was certainly in that pack. TL;DR: Anyone else that sees this if they have the same issue, it's most likely a driver issue. 🙂
👍🏻 1
Avatar
Hey all, I am having trouble creating .pdf reports with Magnet AXIOM. I am able to make .html reports and Portable Cases, but the .pdf reports seem to be freezing during creation. Has anyone else had these issues, or have any known fixes?
Avatar
Can you try using the portable case you created to make a PDF report from it ?
10:47 AM
Might be a work around
Avatar
Hey everyone, looking for input on best apps/sources for making a one time call from a spoofed number. Looking to make a UC call to a number. Don't need them to be able call it back or anything. Free is always great, if anyone has reliable free app or a cheap paid app.
Avatar
For anyone who needs it, I made a Start.Me page a few weeks back with tools I use (mostly free) and useful links https://start.me/p/q6mw4Q/forensics
A startpage with online resources about Forensics, created by Stark 4N6.
👀 3
Avatar
Avatar
stark4n6
For anyone who needs it, I made a Start.Me page a few weeks back with tools I use (mostly free) and useful links https://start.me/p/q6mw4Q/forensics
Thats awesome
Avatar
Avatar
Cole
Thats awesome
it's at least an intro page for people getting started in forensics
Andrew Rathbun pinned a message to this channel. 1/21/2021 1:07 PM
Avatar
Avatar
Jobbins
Hey everyone, looking for input on best apps/sources for making a one time call from a spoofed number. Looking to make a UC call to a number. Don't need them to be able call it back or anything. Free is always great, if anyone has reliable free app or a cheap paid app.
TextNow can make phone calls from spoofed numbers. Also, they do not have very useful info when you serve them with a search warrant.
Avatar
Avatar
Neon
Thank you very much. It's going to solve a homicide. All of the earlier messages had already disappeared.
When you get the return from SnapChat, you can parse it using PA to get the data into a much more useable format. In case you didn't already know that.
Avatar
Avatar
FullTang
When you get the return from SnapChat, you can parse it using PA to get the data into a much more useable format. In case you didn't already know that.
I did but thank you. I'm excited to see what we get back.
👍 1
Avatar
Avatar
FullTang
TextNow can make phone calls from spoofed numbers. Also, they do not have very useful info when you serve them with a search warrant.
I’ll take a look, thanks!
👍 1
Avatar
anyone know if Griffeye 20.4 is backwards compatible with cases made in 20.0
Avatar
@Sudo yes should be, on opening it will load a message requiring conversion
Avatar
cool, thank
Avatar
Morning! Quick question for someone @Magnet Forensics about whatsapp cloud extractions using AXIOM, if anyone is available? 🙂
Avatar
not to cut you off bizzlyg..
7:16 AM
has anyone used "https://hunters.ai/"
Hunters delivers an open, knowledge-powered XDR that proactively detects threats across endpoints, cloud, network, and more.
Avatar
@bizzlyg sure whats up? Feel free to DM me.
Avatar
Avatar
FullTang
When you get the return from SnapChat, you can parse it using PA to get the data into a much more useable format. In case you didn't already know that.
Wow this is a game changer. Thanks for that.
👍 1
Avatar
kmacdonald1565 1/22/2021 12:47 PM
anyone familiar with dragonfruit.ai? they do video analytics, seems like a decent tool. Fairly sure my department cant afford it right now but it seems like it would severely cut down on excess surveillance video watching. also any interest in me getting a rep here? i just had a webinar with them; i can reach back out. (xposted with #dvr-multimedia-surveillance )
12:49 PM
wanted to know what you thought of it, if you are using it
Avatar
Document currently doing the rounds in the information security management sector
Avatar
Avatar
Igor Mikhaylov
Andrew Rathbun 1/24/2021 5:31 AM
would be wise to cross post this into #dvr-multimedia-surveillance
Avatar
AugustBurnsBlue 1/24/2021 7:46 PM
Any @Law Enforcement [USA] working @ICAC cases have any experience using or thoughts around the new @Magnet Forensics Outrider 2.0 release?
7:47 PM
I saw a demo last week, and it appears to be light years above the 1.0 version. Hoping to give it a try on-scene soon.
Avatar
I thought the same thing and took it on scene with me last week, but didn’t have the opportunity to use it. I’m interested to hear how it works as well.
Avatar
AugustBurnsBlue 1/24/2021 7:50 PM
Importing the cybertip to reference while scanning looked pretty amazing. It could be a game changer for us.
Avatar
Ostriage replacement?
Avatar
AugustBurnsBlue 1/24/2021 7:54 PM
I'll hold my tongue until I can try it on-scene, but it certainly looks like it.
Avatar
Nice. I tried it out when it was a beta version. I liked it a lot. I’m interested in 2.0. Might request a trial if they still offer it.
👍 1
Avatar
AugustBurnsBlue 1/24/2021 7:59 PM
I'm hoping to get a trial too. Pretty excited about it.
Avatar
dabeersboys 1/24/2021 8:32 PM
I'm not sure what version we have in our lab, but we like it and have 2 licenses, looking at getting atleast one more. Its fast and we really like it!
👍 1
Avatar
Used 2.11 trial last week, once, looked really good, easy to make and use. Plan to compare with OST and other triage tools. Get a trial and take a look.
Avatar
Let us know if you have any questions/comments/suggestions for Outrider! Glad to hear folks are liking v2, it does have a ton of additional functionality compared to v1. In v2.1 we also added a basic network scanning feature that helps you identify other devices on the connected network to see if there are other computers, phones, file servers, etc. in the premises.
Avatar
Avatar
Jad
Let us know if you have any questions/comments/suggestions for Outrider! Glad to hear folks are liking v2, it does have a ton of additional functionality compared to v1. In v2.1 we also added a basic network scanning feature that helps you identify other devices on the connected network to see if there are other computers, phones, file servers, etc. in the premises.
Do you have a release manual on what features it contains? Might take a look and do a little research on it.
Avatar
deepdive4n6 1/25/2021 12:34 PM
@Law Enforcement [USA] Anyone ever deal with Riot Games to get info about a League of Legends user? Looking for activity information to confirm an alibi in a homicide case... (edited)
Avatar
Avatar
Jad
Let us know if you have any questions/comments/suggestions for Outrider! Glad to hear folks are liking v2, it does have a ton of additional functionality compared to v1. In v2.1 we also added a basic network scanning feature that helps you identify other devices on the connected network to see if there are other computers, phones, file servers, etc. in the premises.
Wow!!! We’ll have to check it out. I was fortunate enough to try the beta versions, and the speed was great!
👍 1
Avatar
Avatar
deepdive4n6
@Law Enforcement [USA] Anyone ever deal with Riot Games to get info about a League of Legends user? Looking for activity information to confirm an alibi in a homicide case... (edited)
RarelySophisticated 1/25/2021 12:42 PM
I looked them up on https://www.search.org/resources/isp-list/ and didn't have any luck. I would reach out to their legal department, and if you get any information, send it to search.org so that can add it to the list.
Avatar
deepdive4n6 1/25/2021 12:44 PM
@RarelySophisticated Yup, did Search.org first thing. Also visited their website, but no legal contact info listed. Found a generic phone number, their support email, social media, etc, but was hoping to find someone with experience who has direct contact info for Legal. Thanks for the response!
Avatar
RarelySophisticated 1/25/2021 12:44 PM
No problem. Good luck!
Avatar
Avatar
deepdive4n6
@Law Enforcement [USA] Anyone ever deal with Riot Games to get info about a League of Legends user? Looking for activity information to confirm an alibi in a homicide case... (edited)
JustBuildIt 1/25/2021 12:44 PM
Their president Dylan Jadeja is on Linkedin might respond. He runs Riots legal matters. They also use Twitter and Facebook. Their legal department is Riot Games Attn: Legal Department 12333 W Olympic Blvd Los Angeles CA 90064 DPO@Riotgames.com is the only simple email on their page.
👍 1
Avatar
Avatar
deepdive4n6
@Law Enforcement [USA] Anyone ever deal with Riot Games to get info about a League of Legends user? Looking for activity information to confirm an alibi in a homicide case... (edited)
Do you have thier summoner name if so these websites track match history and game statics. you wont need to go to riot unless the date was awhile back. https://na.op.gg/ https://app.mobalytics.gg/lol/summoner-search https://lolprofile.net/ (edited)
Real-time LoL Stats! Check your Summoner, Live Spectate and using powerful global League of Legends Statistics!
Search for the most detailed real-time summoner statistics on the web. View live games, player profiles, match history, historical LP changes, and much more.
League of Legends summoner search, champion stats, rankings. Lookup LoL summoners match history, statistics, live spectate, rank, runes and mastery.
👍 2
Avatar
deepdive4n6 1/25/2021 12:47 PM
Ooooh... thanks zero!
Avatar
Avatar
deepdive4n6
@Law Enforcement [USA] Anyone ever deal with Riot Games to get info about a League of Legends user? Looking for activity information to confirm an alibi in a homicide case... (edited)
just type in the person's summoner name and you should get their stats. https://na.op.gg/ is your best bet the others are for just incase
Real-time LoL Stats! Check your Summoner, Live Spectate and using powerful global League of Legends Statistics!
Avatar
RarelySophisticated 1/25/2021 12:51 PM
Also, I found their data protection officer's email address dpo@riotgames.com
12:52 PM
Also their address for their legal department is Riot Games, Inc. Attn: Legal Department 12333 West Olympic Blvd. Los Angeles, CA 90064
Avatar
deepdive4n6 1/25/2021 12:52 PM
Great, thanks all!
Avatar
😀 2
Avatar
Avatar
deepdive4n6
@Law Enforcement [USA] Anyone ever deal with Riot Games to get info about a League of Legends user? Looking for activity information to confirm an alibi in a homicide case... (edited)
if you use https://na.op.gg/ dont forget to hover the mouse over how many days ago it states for the match was and it will give you the date and time the match took place (edited)
Real-time LoL Stats! Check your Summoner, Live Spectate and using powerful global League of Legends Statistics!
Avatar
Avatar
deepdive4n6
@RarelySophisticated Yup, did Search.org first thing. Also visited their website, but no legal contact info listed. Found a generic phone number, their support email, social media, etc, but was hoping to find someone with experience who has direct contact info for Legal. Thanks for the response!
Andrew Rathbun 1/25/2021 2:41 PM
Be sure to submit to @Search.org so everyone else can benefit
👍 1
Avatar
Hi! anybody here from MTL tech crime unit (SPVM) ? Please DM....Thks!
Avatar
Avatar
Rob
Do you have a release manual on what features it contains? Might take a look and do a little research on it.
Scan internet history files and capture more data with advanced live system scan options, with even faster speed compared to prior versions of OUTRIDER.
Avatar
Avatar
zero00796
if you use https://na.op.gg/ dont forget to hover the mouse over how many days ago it states for the match was and it will give you the date and time the match took place (edited)
@deepdive4n6 just to chime in, make sure you press the "update" button on the user on op.gg if it states "updated x days ago" to make sure you can see all matches that were played. EDIT: Ignore that, just tested it with my girlfriends league account on op.gg. It shows "last updated: 6 days ago", but it still shows the games played last night. (edited)
Avatar
Can someone from @Cellebrite with knowledge of responder please contact me, thanks
Avatar
Anybody a member of IACIS? I can't remember how to get into my dang IACIS email account.
Avatar
Avatar
LawDawg
Anybody a member of IACIS? I can't remember how to get into my dang IACIS email account.
Email webadmin@iacis.com they should be able to reset password for you.
Avatar
Avatar
Jobbins
Email webadmin@iacis.com they should be able to reset password for you.
I got back in. It wasn't a password issue. Thanks.
Avatar
hey guys
8:21 AM
does anyone have experience with setting up monitor mode on wireless network interfaces on kali?
8:22 AM
ive been trying for probably 6+ hours now, I manage to set up the monitor mode but it seems like I can't get the right frequency, it's MHz and it always goes to GHz
8:22 AM
and btw my network card is 802.11ac so it does have monitor mode enabled
Avatar
brianjmoran 1/26/2021 11:48 AM
Not quite sure "where" the blog posts should go, but general discussion and questions seems like a pretty good spot. I will move it to somewhere else if needed. With that being said, the second installment of the blog post series between Brian Carrier and myself is up, as we talk about ransomware and applying the Divide and Conquer approach to a ransomware investigation https://www.cybertriage.com/2021/how-to-get-data-and-services-online-for-ransomware-recovery-2021/?utm_source=DFIRdiscord
This post shows you how to execute the most important part of ransomware recovery: getting data and services back online.
👏 2
Avatar
I'm in the market for a new PC. Anyone have any favorite brands? Dell? HP? Alienware? Any recommendations appreciated. Here are the specs I'm looking for (per NCMF): Windows 10 Pro, 16GB RAM, 512GB SSD, Intel i5 or above or AMD Ryzen 1600 or above processor, wired ethernet port, HDMI, USB, SD card input.
Avatar
Avatar
brian
I'm in the market for a new PC. Anyone have any favorite brands? Dell? HP? Alienware? Any recommendations appreciated. Here are the specs I'm looking for (per NCMF): Windows 10 Pro, 16GB RAM, 512GB SSD, Intel i5 or above or AMD Ryzen 1600 or above processor, wired ethernet port, HDMI, USB, SD card input.
Most of the parts are the same so I go for customer service. I’m a big fan of HP. When my son was little he severely damaged my brand new (and pretty expensive) laptop. I fully expected to pay for repairs but HP fixed it for free. It’s anecdotal but I’ll keep buying from them until they give me a reason not to.
Avatar
Thanks, @Joe Schmoe!
Avatar
DeeFIR 🇦🇺 1/27/2021 1:35 AM
@brian the same reason @Joe Schmoe likes HP, I like Dell (if I was only able to buy a computer from a retailer and couldn't build my own). They've really come to the party with attractive commercial offers lately, and have really good customer service. My current personal laptop is a Dell, the next one will likely be a Dell.
👍 1
Avatar
DeeFIR 🇦🇺 1/27/2021 1:50 AM
Is anyone having issues with the @Magnet Forensics Discord channel? This is all I can see. I haven't been banned, although I haven't posted any content lately. :/
Avatar
Avatar
DeeFIR 🇦🇺
Is anyone having issues with the @Magnet Forensics Discord channel? This is all I can see. I haven't been banned, although I haven't posted any content lately. :/
theAtropos4n6 1/27/2021 1:58 AM
Me too. I believe that their channels are specific to events, webinars or so. They are not meant to be permanent.
💯 1
Avatar
DeeFIR 🇦🇺 1/27/2021 1:58 AM
Oh really? I could've sworn I saw a general discussion thread a couple of days ago? Unless that's my memory playing tricks on me.
Avatar
Avatar
DeeFIR 🇦🇺
Oh really? I could've sworn I saw a general discussion thread a couple of days ago? Unless that's my memory playing tricks on me.
theAtropos4n6 1/27/2021 2:00 AM
Haha, I am not entirely sure. I have not entered their server for a while. Lets wait and see their answer 😛
Avatar
Andrew Rathbun 1/27/2021 3:19 AM
Their server is not meant to be 24/7. Mostly for events they put on. CC: @b1n2h3x
👍 1
Avatar
any advice on how to do an honor- hry-lx1t - we have password, have tried the Kirin generic and android generic with No luck
3:25 AM
I forget they are temperamental with usb debugging!
Avatar
Hello! I'm looking for a supplier in Canada for Faraday Room. A new laboratory will be built soon and looking for that. thanks!
Avatar
Avatar
SPVQct3207
Hello! I'm looking for a supplier in Canada for Faraday Room. A new laboratory will be built soon and looking for that. thanks!
spicy_caveman 1/27/2021 5:58 AM
@danmiami0001 <<< has a faraday box- if that helps.
Avatar
@spicy_caveman if you have a URL I will check if they made a Faraday room. thks
Avatar
Avatar
SPVQct3207
@spicy_caveman if you have a URL I will check if they made a Faraday room. thks
spicy_caveman 1/27/2021 6:00 AM
he was offering to sell a barely used faraday box in #off-duty
👍 3
Avatar
Avatar
King Pepsi
Can someone from @Cellebrite with knowledge of responder please contact me, thanks
danmiami0001 1/27/2021 6:02 AM
Did you get an answer yet?
Avatar
I did yeah!
👍 1
Avatar
Avatar
spicy_caveman
he was offering to sell a barely used faraday box in #off-duty
danmiami0001 1/27/2021 6:07 AM
Thank you - sent you a dm with info and pics
Avatar
Understand the latest trends that have shaped the landscape of corporate digital forensics Download our FREE report: The State of Corporate Digital Forensics in Cybersecurity 2021. <https://www.magnetforensics.com/corporate-digital-forensics-cybersecurity-report-2021/
We surveyed hundreds of corporate digital forensics professionals to bring together a snapshot of this rapidly changing domain at the end of 2020.
Avatar
Avatar
brian
I'm in the market for a new PC. Anyone have any favorite brands? Dell? HP? Alienware? Any recommendations appreciated. Here are the specs I'm looking for (per NCMF): Windows 10 Pro, 16GB RAM, 512GB SSD, Intel i5 or above or AMD Ryzen 1600 or above processor, wired ethernet port, HDMI, USB, SD card input.
If you want a desktop you could build it yourself if you don't care about support. Building yourself is usually cheaper and you get more performance. If you don't like to tinker though maybe just go with a prebuilt. Stay away from Dell (at least for consumer side)! HP is pretty good.
👍 2
Avatar
Avatar
DeeFIR 🇦🇺
Is anyone having issues with the @Magnet Forensics Discord channel? This is all I can see. I haven't been banned, although I haven't posted any content lately. :/
Hi! Great question. You have full access. Right now - today, we don't have any events going on so only the channel for the CTF is open (if anyone has questions regarding the Custom Artifact Challenge - good place to reach out!) Each day that we have a Webinar or a Tips & Tricks (Most Wednesdays and each Thursday) Channels are opened for those items during and after the talk. Their will be a slew of channels during the Magnet Virtual Summit! The rules channel there has some details about that being the intent of the server to compliment virtual live events to provide the social elements and conversations to events. If you have a support need or general question please email support AT magnetforensics DOT com. Thanks!
magnetforensics 1
Avatar
@SPVQct3207 I can put you in contact with someone who will be able to set you up. I sent you a friend request so we can discuss further.
Avatar
Avatar
SPVQct3207
Hello! I'm looking for a supplier in Canada for Faraday Room. A new laboratory will be built soon and looking for that. thanks!
info@teeltechcanada.com we sell anything faraday.....Bob
Avatar
Avatar
b1n2h3x
Hi! Great question. You have full access. Right now - today, we don't have any events going on so only the channel for the CTF is open (if anyone has questions regarding the Custom Artifact Challenge - good place to reach out!) Each day that we have a Webinar or a Tips & Tricks (Most Wednesdays and each Thursday) Channels are opened for those items during and after the talk. Their will be a slew of channels during the Magnet Virtual Summit! The rules channel there has some details about that being the intent of the server to compliment virtual live events to provide the social elements and conversations to events. If you have a support need or general question please email support AT magnetforensics DOT com. Thanks!
DeeFIR 🇦🇺 1/27/2021 4:44 PM
Thanks for the reply. I must be confusing the Magnet channel with another channel. All good!
magnetforensics_alt 1
Avatar
https://www.youtube.com/watch?v=x0SYGEwJJtw He makes the case that a lot of stuff you end up finding is very disturbing, and he wouldnt want to deal with that. If this is the case, how do you guys deal with this? Does it leave any scars?
👍 1
Avatar
DeeFIR 🇦🇺 1/27/2021 5:24 PM
Haven’t watched the video, but my coping mechanisms come from 10+ years in LE. Speaking about it, exercise, diet, and appropriate coping mechanisms. We all slip sometimes but as long as you’re surrounded by supportive colleagues, you’ll manage. Some people just aren’t wired to deal with it, which is not their fault and it’s human nature. The good that comes from what we do, for me, outweighs the mental anguish.
👍 6
5:28 PM
Re scars; it leaves impressions in your mind that won’t go away. I have a handful of jobs that always stand out. Then I think of the convictions and the danger which has been removed from the community. The thing which keeps me motivated (and sometimes causes more stress than the actual content/media) is thinking about the things we’ve missed. The crooks we haven’t found, and the kids that are still at risk, and I how I can either improve my personal skills and abilities or that of my department.
👍 3
Avatar
Avatar
DeeFIR 🇦🇺
Re scars; it leaves impressions in your mind that won’t go away. I have a handful of jobs that always stand out. Then I think of the convictions and the danger which has been removed from the community. The thing which keeps me motivated (and sometimes causes more stress than the actual content/media) is thinking about the things we’ve missed. The crooks we haven’t found, and the kids that are still at risk, and I how I can either improve my personal skills and abilities or that of my department.
spicy_caveman 1/27/2021 6:55 PM
I enjoy the interview after when I present the confrontation and watch them crumble
👍 3
Avatar
I haven't been in digital forensics, or even general detective work that long, but what motivates me is the good that I am doing by solving cases and finding bad guys that otherwise would go unsolved and unfound. I come from a rural area and the other LE officers in my community have strengths in areas other than computers. Because of that, I am pushing myself to become as tech savvy in every way that I can (mostly digital forensics) because my community really needs someone with that type of expertise.
💯 3
Avatar
Hi, can anyone recommend a good tool to do the OCR for screenshots chats? It is for the translator so she/he can edit text. At the moment we use Abbyy finereader, but it can mostly save text without original background.
Avatar
Andrew Rathbun 1/28/2021 3:34 AM
I know with SnagIt you can grab text from a picture. It's basically like Snipping Tool on crack. Probably not the best option but the program is great for marking up screenshots for internal training documentation
Avatar
@AloK, I really like Adobe Acrobat Pro DC's OCR capability. Very effective, fast, and can recognize multiple languages (although, not Arabic, frustratingly). Click on the Tools tab when you open Acrobat up and select Scan & OCR to recognize text in one or multiple files. Let me know if any Qs. Good luck!
Avatar
Avatar
Oyku
https://www.youtube.com/watch?v=x0SYGEwJJtw He makes the case that a lot of stuff you end up finding is very disturbing, and he wouldnt want to deal with that. If this is the case, how do you guys deal with this? Does it leave any scars?
Deleted User 1/28/2021 1:39 PM
Been in LE 25+ yrs and Digital Forensics since 2007 with a short stint in the private sector (Apple) after Retiring the first time in 2012 and back Contracting with the Fed's since late 2013. Crimes against a Person especially ICAC or Live cases with Children was always the most challenging and difficult to navigate. Lean on your fellow colleagues (definitely the folks who have been in the Arena for a while) Don't ever be afraid to reach out. There are a ton of resources available. The work you do or the Case you handle makes a difference.
💯 3
Avatar
Need Vulnerability Management recommendations - We use Tenable for VM and have been doing authenticated scans. Our server team wants us to do unauthenticated scans to see what is externally vulnerable, since some vulnerable apps on a server are never used. Is there a recommendation on unauthenticated vs authenticated scans? Thanks! (edited)
Avatar
@AccessData/Exterro Around? (edited)
Avatar
Has anyone got a figure that makes it easy to understand the difference between logical, file system and physical extractions? Many thanks!
Avatar
Avatar
King Pepsi
Has anyone got a figure that makes it easy to understand the difference between logical, file system and physical extractions? Many thanks!
Digitalferret 1/29/2021 1:29 AM
no picture but in general, for data recovery - Logical is some corruption at data level only (inc filesystem). next issue is some sort of hardware corruption which may be bad sectors on the disk itself or corrupt firmware. both can be dealt with largely without physical intervention, (edited)
1:31 AM
hardware problems necessitate some sort of physical intervention, such as replacing heads, burnt chips, replacing PCB and so on
1:33 AM
it's why the first step in any recovery should be drive (or device) diagnostic as going to the next stages can contravene Rule:1 Do No Harm
1:35 AM
If that works has a little figure on page 4
1:35 AM
@King Pepsi
1:35 AM
Looks a little old tho
Avatar
Digitalferret 1/29/2021 1:40 AM
site has good info, some product bias as one would expect, but the info there is still of the highest order
1:46 AM
it might be better to look for device specific details, as "physical extraction" could be taken as Chip-Off bypassing all other device hardware
Avatar
Thanks guys!!
Avatar
Hi anyone, Someone have à script or à Web site to decode thé uuid of Apple like : 0008030-00091482E... 16 caracters in hex (edited)
Avatar
Avatar
florus
@AccessData/Exterro Around? (edited)
Andrew Rathbun 1/29/2021 3:26 AM
Not anymore it looks like
Avatar
Avatar
rico
Hi anyone, Someone have à script or à Web site to decode thé uuid of Apple like : 0008030-00091482E... 16 caracters in hex (edited)
I found this script but it doesn't working https://github.com/reincubate/deviceidentifier-py
Utils to manipulate and learn from assorted device identifier formats via Reincubate's API. - reincubate/deviceidentifier-py
Avatar
Andrew Rathbun 1/29/2021 7:11 AM
@Cellebrite should I remove the @deleted-role role entirely and just change all those members to Cellebrite now? Will follow your guidance on that
Avatar
kmacdonald1565 1/29/2021 7:37 AM
I have a question about apple proper. very long story short, a coworker had their identity stolen and someone purchased an iphone in their name...traced stuff to a particular icloud account, and found a suspect...what we are looking for is after multiple subpoenas, apple has not provided mailing address for that device despite explicitly asking for that information. anyone have any luck on getting that information, if so how? any contact that can help facilitate this request. its kind of ridiculous that we say "we need the mailing address for this device bearing this IMEI purchased on this account" and they send a list of information that is of no use.
Avatar
Avatar
Andrew Rathbun
@Cellebrite should I remove the @deleted-role role entirely and just change all those members to Cellebrite now? Will follow your guidance on that
danmiami0001 1/29/2021 8:03 AM
We have transitioned everyone to CLB and the BB site redirects now. If you can update labels, I don’t see any issue.
Avatar
Avatar
danmiami0001
We have transitioned everyone to CLB and the BB site redirects now. If you can update labels, I don’t see any issue.
Andrew Rathbun 1/29/2021 8:07 AM
Yep I'll remove Blackbag and transition. Thank you!
👍 1
Avatar
Mr. Eddie Vedder from Accounting 1/29/2021 8:46 AM
Anyone with @Magnet Forensics have a second to answer a question before I submit a support ticket?
Avatar
cScottVance 1/29/2021 8:49 AM
DM incoming.
Avatar
Deleted User 1/29/2021 12:43 PM
Hey guys, I'm making a little tool, wanted to ask a favor
12:44 PM
If anyone is running iphone, can they send me an image taken by the device along with the model?
12:44 PM
Trying to do some comparisons.
Avatar
Andrew Rathbun 1/29/2021 12:58 PM
@Deleted User maybe use Josh Hickman's images?
Avatar
Hi, I am a student at University of South Wales studying Computer Forensics. I am working on my final project of my bachelors and have created an anonymous survey about IoT in investigations where the results will be used in my project. If anyone has the time and would like to complete it I would appreciate it. It contains 10 questions. https://docs.google.com/forms/d/e/1FAIpQLSclqToU4JQBS6IU9UyaNW9pTa_c94aqcXvEKskzKSsLAnY4dw/viewform?vc=0&c=0&w=1&flr=0
My name is Eirik Færøvik Hansen, and I am a student in Computer forensic at University of South Wales. I am working on my last year project and therefor I have created this survey. The result of this survey will be used in my project on creating a guide on how to investigate an IoT device. All response to this survey will be done anonymously.
Avatar
hi, please tell me a program for remote access and PC control analogue of TeamViewer, preferably free. thanks
Avatar
Hi all, is it a normal behaviour for the metadata, like the image below, be stripped away from the image when sending to someone else?
4:11 AM
Avatar
Avatar
Pacman
Click to see attachment 🖼️
"It Depends" on how it was sent
4:20 AM
If you were to email the image to me then, "No". If you were to send it to me via WhatsApp then, "Yes".
Avatar
Thanks.
Avatar
Another question (images related). IMG_0763.JPG is an image with no metadata but contains the follow information: (edited)
4:37 AM
4:38 AM
IMG_0764.JPG appears to be a modified image of IMG_0763.JPG, someone simply added a black banner with text in middle (Snapchat). However, the creation and modified timestamp is before IMG_0763.JPG?
4:38 AM
4:38 AM
Anyone got any ideas?
Avatar
Avatar
Pacman
Anyone got any ideas?
What was the extraction method?
Avatar
Graykey FFS @AmNe5iA
Avatar
Avatar
Pacman
Graykey FFS @AmNe5iA
So I've opened a GreyKey FFS extraction i have access to using 7-zip. It appears that the only timestamp recorded in the zip file is the modified. I suspect your tool is using that one time stamp to populate the created and accessed time stamps as well. I suspect that someone accessed 763 after creating 764 and that this access modified the modified timestamp (though it may not have actually modified it).
5:31 AM
This may be a zip limitation, I'm not sure. It may well be the reason other tools extract FFS at Tar or Dar rather than zip.
Avatar
I see your point, though I'd need to look into this further.
5:34 AM
I don't think Cellebrite would take the modified timestamp and duplicate it as creation/accessed time. @Cellebrite can you confirm?
Avatar
Avatar
Pacman
I see your point, though I'd need to look into this further.
Did u check the photo's database ?
5:48 AM
If the user changed the date/time on the phone, you can see the date/time changed.
Avatar
Can you point out where might I find that info? (edited)
Avatar
I think it was photos.db
Avatar
I'm looking at photos.sqlite
Avatar
Avatar
Jay528
If the user changed the date/time on the phone, you can see the date/time changed.
Although I don't think this is the case as the difference between the two time is roughly 6 minutes.
Avatar
What is date/time for the record under DCIM ?
6:01 AM
i mean the photos db
Avatar
So I've got a Cellebritte Checkra1n FFS extration of the same phone (dar format) and the same photos now have 3 different distinct MAC times which wasn't the case with the GK zip file.
Avatar
Avatar
Jay528
What is date/time for the record under DCIM ?
The same as what Cellebrite has decoded
Avatar
Avatar
AmNe5iA
So I've got a Cellebritte Checkra1n FFS extration of the same phone (dar format) and the same photos now have 3 different distinct MAC times which wasn't the case with the GK zip file.
I see.. Though that doesn't explain how the modified version of the image was created before? (edited)
Avatar
Because they opened 763 again, after creating 764. I've seen apps changing the modified time despite not actually modifying the file. If you've still got access to the original phone maybe try a Cellebrite Checkra1n extraction...
Avatar
I don't have access to the phone
6:11 AM
I'm doing a statement around these images as they are relevant to the investigation
6:12 AM
Just can't really articulate as to why the timestamps are like this.
Avatar
Analyze the records around the time of the photos and see if there are any anomalies
Avatar
I’ve been working hard on a big update to improve core functionality of APOLLO to include methods to gather up the database files needed so they can be extracted from using the APOLLO modules. New APOLLO Functions: ‘gather_macos’ - Automagically finds and collects database files on macOS us
6:27 AM
run the apollo script and see if anything suspicious was going around that time
Avatar
From a Dar
6:30 AM
Same image from the GK zip file
6:30 AM
Doesn't really clear much up!
6:35 AM
The Dar doesn't report a Created time but does report a Changed time. Zip reports a Created but not a Changed. There are at least 2 different timestamps for each extraction though. It seems weird to me that the MAC times for your examples are all exactly the same. maybe there is an app on that phone that is altering them all at once for some reason?
6:39 AM
Using 7-zip on the GK zip file the only reported time is the Modified which it states was 06/12/2019 06:39:31
Avatar
I'll have to say I don't know why the timestamps are like this. (Phrased professionally, of course)
Avatar
Do you have access to the heic file? Using something like exiftool you may be able to see the file created/modified times (not the filesystem ones). I would add -g2 to the input command to see where the tool is parsing the data from.
Avatar
Avatar
Brandon E
Do you have access to the heic file? Using something like exiftool you may be able to see the file created/modified times (not the filesystem ones). I would add -g2 to the input command to see where the tool is parsing the data from.
The capture time within the file matched the zip's created 06:39:30
Avatar
Avatar
Pacman
Another question (images related). IMG_0763.JPG is an image with no metadata but contains the follow information: (edited)
CLB_iwhiffin 2/1/2021 9:46 AM
Have you checked the photos.sqlite database (ZASSET or ZGENERICASSET table) for the AddedDate, CreatedDate and ModificationDate?
Avatar
Avatar
CLB_iwhiffin
Have you checked the photos.sqlite database (ZASSET or ZGENERICASSET table) for the AddedDate, CreatedDate and ModificationDate?
They match the timestamp decodes by Cellebrite
9:49 AM
Decoded*
Avatar
Anyone ever move from digital Forensics to e-discovey?
Avatar
Avatar
Majeeko
Anyone ever move from digital Forensics to e-discovey?
My old job started as mostly digital forensics and moved to about 30% forensics and 70% eDiscovery. The two job functions were pretty similar, and the data collection was almost identical. I'm new at my current job, but I think that it will be about a 50/50 split between the two.
Avatar
@@cavis interesting, so it's an easily interchangeable skillset?
Avatar
Avatar
BorgSl
hi, please tell me a program for remote access and PC control analogue of TeamViewer, preferably free. thanks
kmacdonald1565 2/1/2021 1:17 PM
you can do a surprising amount with google chrome - chrome remote desktop
1:17 PM
i for one embrace my technological overlords but i understand if you had reservations about using them
Avatar
Avatar
kmacdonald1565
i for one embrace my technological overlords but i understand if you had reservations about using them
Google has wayyyyy too much info on me, but I have to trust someone in order to get work done now-a-days...
Avatar
Avatar
Majeeko
@@cavis interesting, so it's an easily interchangeable skillset?
Yes, I think that many forensic folks could adjust. Before we were permitted to purchase an eDiscovery tool, I used FTK and Axiom to do keyword searches and timelining for eDiscovery. It was obvious that the tools weren't designed for that, but I managed to shoehorn the data into the project and get somewhat suitable results. Once we signed a contract with a eDiscovery vendor (Casepoint), then it didn't take long until I was processing data and building search terms. And if you ever move into eDiscovery, be sure to go with a SaaS solution and not on prem... you'll be much happier in the long run.
Avatar
Has anyone heard of Bill Redirect software?
Avatar
@Magnet Forensics - Anyone available from Support to approve my access to the artifact exchange portal ? Looking for a copy of the axiom wordlist generator
Avatar
Avatar
Jay528
@Magnet Forensics - Anyone available from Support to approve my access to the artifact exchange portal ? Looking for a copy of the axiom wordlist generator
Cant approve your support portal but can get you the file you need in the meantime.
Avatar
thank you sir
Avatar
Anyone an excel wizard?
Avatar
Avatar
Rob
Anyone an excel wizard?
Andrew Rathbun 2/2/2021 4:16 AM
What are you trying to do?
Avatar
Was trying to compare two different columns to find what wasn't included in the other.
Avatar
Filter for unique values, remove duplicate values, and conditionally format unique or duplicate values in Excel.
Avatar
Almost like that. Managed to find a workaround by staring at a log file.
Avatar
you can use vlookup function
Avatar
A colleague was trying to use the ISNUMBER formula
4:30 AM
Or something similar
4:30 AM
But thanks for the assistance folks 🙂
Avatar
Nullable Truth 2/2/2021 6:06 AM
@Magnet Forensics Are there any tools that support parsing Instagram package downloads?
Avatar
cScottVance 2/2/2021 6:08 AM
DM Incoming @Nullable Truth
Avatar
Nullable Truth 2/2/2021 6:08 AM
Cheers.
Avatar
Do anyone here know of any potential forensic forums where I could post a survey I created to be used in my final project of my bachelor? Have tried forensicfocus and this channel, but not a lot of result from it. Thanks for any tip 🙂 Here is the survey if anyone here has the time to fill it out or has a network of their own where they could help share it, contains of 10 questions. https://docs.google.com/forms/d/e/1FAIpQLSclqToU4JQBS6IU9UyaNW9pTa_c94aqcXvEKskzKSsLAnY4dw/viewform?vc=0&c=0&w=1&flr=0
My name is Eirik Færøvik Hansen, and I am a student in Computer forensic at University of South Wales. I am working on my last year project and therefor I have created this survey. The result of this survey will be used in my project on creating a guide on how to investigate an IoT device. All response to this survey will be done anonymously.
Avatar
Avatar
Aakra
Do anyone here know of any potential forensic forums where I could post a survey I created to be used in my final project of my bachelor? Have tried forensicfocus and this channel, but not a lot of result from it. Thanks for any tip 🙂 Here is the survey if anyone here has the time to fill it out or has a network of their own where they could help share it, contains of 10 questions. https://docs.google.com/forms/d/e/1FAIpQLSclqToU4JQBS6IU9UyaNW9pTa_c94aqcXvEKskzKSsLAnY4dw/viewform?vc=0&c=0&w=1&flr=0
I feel that IoT forensics is very specialised, requiring a lot more specialist equipment and knowledge than I have access to. I simply deal with Computer/Phone forensics using commercially available tools. I don't have access to ISP/chip-off equipment for example. I didn't click on the survey as I have no experience of IoT forensics and I suspect that would be the case for most the lurkers here and on FF. I can't point you to anywhere that I know of that more specialist IoT examiners may be lurking. Hopefully someone else may be able to help.
Avatar
Having a strange issue with Cellebrite Reader. I've tagged 118 items in a Cellebrite Reader Report and saved a session file. If I close Reader and reopen my report, it shows I've tagged 485 items. I have no idea where the rest of these items are coming from. The initial tags came from a Watchlist that I tagged. Has anybody had this issue and can explain why it appears Cellebrite is tagging random artifacts for me? Very frustrating! @Cellebrite Edit: Created support ticket with Cellebrite (edited)
Avatar
elizavetabelkasoft 2/2/2021 8:46 AM
New release of Belkasoft X Belkasoft announces a new release of Belkasoft X, the flagship digital forensics and incident response product by Belkasoft. In the version 1.2 you will find: ✅ Logical acquisition of rooted Android devices. Before, Belkasoft X was able to extract only physical dump, what makes less sense nowadays due to encryption. The possibility to acquire a logical image in a case of a rooted phone or tablet helps to avoid encryption ✅ Full file system iOS acquisition using checkm8 method updated for iOS 14.3 and 14.4 ✅iOS СhatSecure application analysis support ✅Notifications and netconfig analysis for macOS ✅A number of issues fixed and improvements made Please review the complete 'What's New' at https://bit.ly/3jbq1L9 More on the new product: https://bit.ly/2MiHXHJ
Avatar
Avatar
Cole
Having a strange issue with Cellebrite Reader. I've tagged 118 items in a Cellebrite Reader Report and saved a session file. If I close Reader and reopen my report, it shows I've tagged 485 items. I have no idea where the rest of these items are coming from. The initial tags came from a Watchlist that I tagged. Has anybody had this issue and can explain why it appears Cellebrite is tagging random artifacts for me? Very frustrating! @Cellebrite Edit: Created support ticket with Cellebrite (edited)
Could be from the timeline (of the artifacts you tagged)?
Avatar
I have numerous images of a person from their unknown Facebook account. Reverse image lookups did locate the individual (Google or Tineye). I have hundreds of Facebook ID from the search_cache_db for Facebook. Is there an automated way to run these IDs through FB? I am presently copying and pasting the ID, but was hoping there was something easier.
Avatar
Avatar
sholmes
I have numerous images of a person from their unknown Facebook account. Reverse image lookups did locate the individual (Google or Tineye). I have hundreds of Facebook ID from the search_cache_db for Facebook. Is there an automated way to run these IDs through FB? I am presently copying and pasting the ID, but was hoping there was something easier.
kmacdonald1565 2/2/2021 5:24 PM
if you are good with javascript, you might be able to write a greasemonkey/tampermonkey script to help automate it
Avatar
kmacdonald1565 2/2/2021 5:34 PM
i might be able to help in off time if you arent familiar
Avatar
Avatar
kmacdonald1565
if you are good with javascript, you might be able to write a greasemonkey/tampermonkey script to help automate it
I am not familiar with JavaScript, but will take a look at it. Thanks for the reply.
Avatar
kmacdonald1565 2/2/2021 7:12 PM
it shouldnt be too hard
Avatar
Avatar
sholmes
I am not familiar with JavaScript, but will take a look at it. Thanks for the reply.
kmacdonald1565 2/2/2021 7:14 PM
greasemonkey(firefox)/tampermonkey(chrome,maybe others?) are a host side plugin to allow javascript edits. you can write a little HTML, drop a list of links (have to have a separator) and have the javascript go one to the next to the next. for me, since i kind of suck at this, would take a half a day or so to get a workable thing going. but would be happy to help, couldnt take hours out of my work day, but could help knock something out if need be (edited)
Avatar
Thanks @kmacdonald1565 I appreciate the offer. I will DM you tomorrow with an update.
Avatar
Wondering if anyone can help. Trying to rebuild a raid in xways. All I know is it’s two disks and it’s Linux. Xways is asking for header and stripe size. Is there a way to find this out on the disks? Or the drive that isn’t raided?
Avatar
Avatar
john_doe
Wondering if anyone can help. Trying to rebuild a raid in xways. All I know is it’s two disks and it’s Linux. Xways is asking for header and stripe size. Is there a way to find this out on the disks? Or the drive that isn’t raided?
If it's a Linux software raid X-Ways normally gives you a hint when in disk view. You should see little post it note icons next to the partitions. Hovering your mouse over them normally gives details about component numbers, component GUIDs and stripe size etc.
Avatar
Avatar
AmNe5iA
If it's a Linux software raid X-Ways normally gives you a hint when in disk view. You should see little post it note icons next to the partitions. Hovering your mouse over them normally gives details about component numbers, component GUIDs and stripe size etc.
Is disk view on the tab next to file?
Avatar
"Disk" to the left of "File"
3:10 AM
But I mean the screen above that
Avatar
@kmacdonald1565 I figured out a quick work around. I exported the FB IDs into an excel spreadsheet. I then combined the ID cell into a cell with www.facebook.com/. (You can use =CONCAT("www.facebook.com/",Cell1) or =Cell1&Cell2). Cell1 and Cell2 should be actual cell location like A1 or J1, etc. This put the ID directly after www.facebook.com. I then copied this column into a Google Spreadsheet, where I highlight numerous links at a time and right click and select open links. (had to disable the popup blocker). I have only been selecting 30 at a time, but it opens them up quickly. Not sure how many links you can open up at a time, but this was a quick work around. Thanks for your suggestions for on Greasemonkey, that led to me researching different scripts which gave me this solution.
Avatar
randomaccess 2/3/2021 3:15 AM
@sholmes Google sheets complains at you if you try to open too many but I think it does it anyways. Then your computer complains at you
3:16 AM
You may be able to do the whole thing in Google sheets if you bound it by the hyperlink command. Then you can press ctrl enter I think on a link in Google sheets and it opens in a new tab
Avatar
@randomaccess I haven't tried too many, but I will shortly just for funzies. 🙂 alt+enter will open them when they are highlighted, but I haven't scripted them to open them all at one time..
3:19 AM
300 failed. It told me to deselect some cells
3:21 AM
50 Google Sheets seems to be the most you can open at one time (edited)
Avatar
Avatar
AmNe5iA
But I mean the screen above that
Yeah I looked there, I don’t think it recognises it or the information is not available. Thanks though
Avatar
Avatar
john_doe
Yeah I looked there, I don’t think it recognises it or the information is not available. Thanks though
Without knowing more it's difficult to help. If you can identify a partition that contains the raid you can sometimes just set the header to the numbers of sectors to get to that partition and then guess at the stripe size, doubling each time you have to guess again
Avatar
Avatar
sholmes
50 Google Sheets seems to be the most you can open at one time (edited)
kmacdonald1565 2/3/2021 6:10 AM
technically i can tell it to open them all pretty quickly, but it might make your computer take a dump though lol
Avatar
@kmacdonald1565 I figured there was a way to automate it, but since I didn't know the scripting language, this was faster for me with only 400ish urls
Avatar
kmacdonald1565 2/3/2021 6:11 AM
for sure
6:12 AM
depending on what you were trying to do also...based on your initial description, i was thinking you were viewing one at a time, so i was thinking a button that cycled through the pages
6:13 AM
but glad to know that works
Avatar
I did need to look at them individually, but just didn't want to click on them individually
Avatar
kmacdonald1565 2/3/2021 6:14 AM
gotcha
Avatar
So automatically opening 50 at a time helped.
Avatar
Can someone answer this question for me please. If I create two images (E01) of two separate drives related to the same case. Is there anything wrong with storing them both on a properly sanitised destination drive? Versus each one being on their own separate drive? Since they are in their own container (E01) there should be no argument about cross contamination right?
Avatar
Avatar
Neon
Can someone answer this question for me please. If I create two images (E01) of two separate drives related to the same case. Is there anything wrong with storing them both on a properly sanitised destination drive? Versus each one being on their own separate drive? Since they are in their own container (E01) there should be no argument about cross contamination right?
Andrew Rathbun 2/3/2021 6:48 AM
I did that ALL the time with the federal government. Never had any issues. I'd be on site imaging 30+ computers in a day on a search warrant and I'd try to consolidate those on as few drives as possible, 3-4 drives ideally. All properly labeled (i.e. S1RAD1 = site 1, room A, Desktop 1) (edited)
👍 1
Avatar
Awesome. Thank you. I assumed I was right but I've been told differently in the past.
Avatar
Same as well.
7:04 AM
Unless hard drive and storage of physical drive is not an issue
👍 1
Avatar
Are they any way to use FTK on a victim remotely. My plan might not be the most ethical, but I need evidence in court. My plan is to connect to a home PC through a RAT and recovered history to know is suspect is a pedo. (I’m not a law informent it’s what I can’t grab someone computer) need help
Avatar
Avatar
CCNA
Are they any way to use FTK on a victim remotely. My plan might not be the most ethical, but I need evidence in court. My plan is to connect to a home PC through a RAT and recovered history to know is suspect is a pedo. (I’m not a law informent it’s what I can’t grab someone computer) need help
FTK Imager is meant to be used on local storage or on a local network shared drive...the bigger question is do you mean you want to connect to somebody else's house and try to pull data off their computer?
Avatar
Avatar
CCNA
Are they any way to use FTK on a victim remotely. My plan might not be the most ethical, but I need evidence in court. My plan is to connect to a home PC through a RAT and recovered history to know is suspect is a pedo. (I’m not a law informent it’s what I can’t grab someone computer) need help
With a question like that, with so many law enforcement members in this discord, if be surprised if anyone gave you a sensible answer. (edited)
👍 1
Avatar
kmacdonald1565 2/3/2021 8:24 AM
yeah, thats kind of a loaded question there, its a bit to digest....now if the victim was cooperative but remote, there might be options, if you are trying to "hack" into someones computer to get info off of it, there are limited ways to do this legally. (edited)
Avatar
My goal is not to be illegal I just want to find some solutions to my problems, does someone have a more ethical solution. If I don’t have evidence what will a tell to the juge?
Avatar
@sholmes have you tried httptrack ? Import the hyperlinks and set it to DL the page
Avatar
@CCNA If you're working with a judge, the other party should have to come to court and defend themselves. In civil case you just need to prove in your favor. If you want to do criminal then file a police report and let law enforcement do the proper investigation (no need to go vigilante). If this person you're referring to has done something illegal, than you can report them and tell LE what you know. I don't know your specific circumstances but this is the best advice I can give you unless I know more. An additional thought: Never sacrifice your integrity, especially if you want a job in DFIR. Integrity is the foundation of our job. Without it, we cannot be trusted, and thus we don't have a job.
👍 4
Avatar
Avatar
CCNA
My goal is not to be illegal I just want to find some solutions to my problems, does someone have a more ethical solution. If I don’t have evidence what will a tell to the juge?
Andrew Rathbun 2/3/2021 9:48 AM
Besides the issues in legality with what you're trying to do, there's also moral and ethical concerns. Look up fruit of the poisonous tree, as well. What you're trying to do may be illegal and therefore make that evidence that could've been obtained through legitimate means (aka law enforcement) not be admissible in court, so therefore, yet another pedophile runs free on a technicality. Law Enforcement works very hard at what they do, and most of the time they get it right, but there's already so many ways for cases to fall apart before it ever gets to trial even if LE does everything right on their end. Try not to make things harder for the imperfect judicial system (assuming you're US, but if not, no judicial system is perfect).
9:50 AM
The best thing you could do is OSINT this person to end of the earth, provide a really nice informational report on what you can find through legal, open source means, as well as any factual personal statements or observations you can attest to and swear to potentially in a courtroom in front of a judge. Hand the case on a silver platter to LE and let them do their preservation requests/search warrants to get the evidence that is actually going to help stick charges against someone. Do not go vigilante, as someone else said.
9:53 AM
If you have questions on how to best package up information to provide to law enforcement so they know what they should be doing, just ask. I'm a former cop and did this stuff all the time. It's been a couple years but I know exactly what needs to be done, I just don't have the authority to do it anymore. Also plenty of current LE in here who can provide the most current information since they do it all the time. Leave it to the professionals if you want charges to actually stick. If you're looking for hacking advice, definitely not the place to be for that.
9:55 AM
Not a single person in LE (current or former) wouldn't drop whatever non-priority item they're doing right now to help put a pedophile away. That's just how it works. Take advantage of it. Hope that makes sense.
9:56 AM
and if anything I said is out of line, please, anyone in LE correct me 🙂
💯 7
Avatar
Avatar
CCNA
Are they any way to use FTK on a victim remotely. My plan might not be the most ethical, but I need evidence in court. My plan is to connect to a home PC through a RAT and recovered history to know is suspect is a pedo. (I’m not a law informent it’s what I can’t grab someone computer) need help
Digitalferret 2/3/2021 10:01 AM
My plan might not be the most ethical it's beyond that, it's illegal. you are looking to get convicted yoursefl, by entering a PC you neither own, nor have permsison to access. if you did succeed and find IIOC you are then guilty of creating illegal images should you copy them as proof. if the "victim" susppects or see's access and then destroys evidence, you've got no-one but yourself in trouble and freed up the suspect. as per replies abvoe, you compromise your own integrity, and are acting illegally. just go to police with suspicions and some reasonable back up for them. as per AR, deferring to LE in terms of advice.
Avatar
Is there any law enforcement in north central Florida who can do a chip off for me? It's for a UConnect 8.4AN out of a 2018 Jeep Wrangler. For a drive by shooting.
Avatar
Avatar
LawDawg
Is there any law enforcement in north central Florida who can do a chip off for me? It's for a UConnect 8.4AN out of a 2018 Jeep Wrangler. For a drive by shooting.
facelessg00n 2/3/2021 12:06 PM
It’s compatible with Berla so you shouldn’t need a chip off.
Avatar
Deleted User 2/3/2021 12:59 PM
@CCNA If you are working from the US or on something based in the US it is always important to be wary of how vague the CFAA is. Recently there was a case where a man found and used an IDOR bug to fetch lab reports off a healthcare portal that for whatever reason did not require authentication to fetch the files. The IDOR was simply in the url where lab reports were stored as a sort of number or string ID which was easily iterated through. The guy ended up getting convicted recently even though he never shared or misused the data he got and even though it could be argued that data was public to begin with since there was no authentication required, it technically violated the expected "authorized access" given to the healthcare portal users. The CFAA is so broad, just using a VPN to get around a ratelimit is a felony. It just never is worth risking it.
Avatar
Avatar
Dfdan
@sholmes have you tried httptrack ? Import the hyperlinks and set it to DL the page
I have not looked into that, but will check it out today. Thanks
Avatar
Avatar
facelessg00n
It’s compatible with Berla so you shouldn’t need a chip off.
Joe Schmoe 2/3/2021 2:38 PM
I had a Jeep that was supposed to be compatible also. Unfortunately when I pulled it all apart I found it not every version was compatible. JTAG was an option though. Might be worth trying before the chip-off.
Avatar
@Cole @Andrew Rathbun Thanks, everyone for your help, I understand better. I was stress because I'm new to DFIR and don't know what to do with a Pedophile case in court when we don't have any evidence. I did OSINT but I haven't found some suspicious information or interesting information.
Avatar
Avatar
CCNA
@Cole @Andrew Rathbun Thanks, everyone for your help, I understand better. I was stress because I'm new to DFIR and don't know what to do with a Pedophile case in court when we don't have any evidence. I did OSINT but I haven't found some suspicious information or interesting information.
Andrew Rathbun 2/3/2021 5:37 PM
Then just report this person to local LE and give them everything you know about this person in terms of facts, circumstances, and any personal identifying information about them, ie description, name, any online usernames, etc.
👍 8
Avatar
thatboy_leo 2/4/2021 8:12 AM
Hello everyone, new guy hear that works for a private sector company. Glad to be apart of forensic discussions
👍 6
Avatar
Avatar
CCNA
@Cole @Andrew Rathbun Thanks, everyone for your help, I understand better. I was stress because I'm new to DFIR and don't know what to do with a Pedophile case in court when we don't have any evidence. I did OSINT but I haven't found some suspicious information or interesting information.
spicy_caveman 2/4/2021 8:43 AM
With respect this is out of your realm and your reach. You will be liable for things even if you meant well. You need to turn your information over to law enforcement that can do these things legally and efficiently. Please.
👍 4
Avatar
data_grizzly 2/4/2021 1:46 PM
Can anyone recommend a quiet generator? Need power supply when in field doing onsite examinations in COVID times. Have been looking online and most are extremely loud! Looking for something powerful enough for run 2-3 computers/acquisitions for 1-8 hours, while also not sounding like a wood chipper
Avatar
No clue if this is the right place to start but eh. So I am currently thinking of studying to get a masters degree in digital forensics, is it worth it? I'd like to get an insight in what you do on your job daily, such as the general tasks and things that are brought upon you. I have no previous IT bachelor degree, only went to study IT in high school which I will be done with this year. I am myself interested in forensics and from what I've read so far I get mixed feelings. Some say its the best job with alot of variation and other says the opposite. I am mainly asking this question for Law Enforcement to answer as thats probably the path I'd like to take. Thanks for any response!
Avatar
Avatar
data_grizzly
Can anyone recommend a quiet generator? Need power supply when in field doing onsite examinations in COVID times. Have been looking online and most are extremely loud! Looking for something powerful enough for run 2-3 computers/acquisitions for 1-8 hours, while also not sounding like a wood chipper
Honda Eu22i, quiet and portable-ish, handles upto 2.2KW.
👍 1
Avatar
DeeFIR 🇦🇺 2/4/2021 3:24 PM
@sadadz if you ask such a broad group of people, you'll get a range of different answers. You said you have mixed feelings; what are they? What attracts you to law enforcement DF instead of private sector DF/IR?
Avatar
Avatar
sadadz
No clue if this is the right place to start but eh. So I am currently thinking of studying to get a masters degree in digital forensics, is it worth it? I'd like to get an insight in what you do on your job daily, such as the general tasks and things that are brought upon you. I have no previous IT bachelor degree, only went to study IT in high school which I will be done with this year. I am myself interested in forensics and from what I've read so far I get mixed feelings. Some say its the best job with alot of variation and other says the opposite. I am mainly asking this question for Law Enforcement to answer as thats probably the path I'd like to take. Thanks for any response!
All I can say is it's probably not needed but nice to have one. I myself have a masters degree and not doing anything more than someone without is.
Avatar
Anyone have a better list of IMEI codes to show country of manufacturing?
Avatar
Avatar
sadadz
No clue if this is the right place to start but eh. So I am currently thinking of studying to get a masters degree in digital forensics, is it worth it? I'd like to get an insight in what you do on your job daily, such as the general tasks and things that are brought upon you. I have no previous IT bachelor degree, only went to study IT in high school which I will be done with this year. I am myself interested in forensics and from what I've read so far I get mixed feelings. Some say its the best job with alot of variation and other says the opposite. I am mainly asking this question for Law Enforcement to answer as thats probably the path I'd like to take. Thanks for any response!
It can open doors in this field if that’s where you want to go. I got into this by dumb luck and these degrees weren’t around at the time.
Avatar
Avatar
Dfdan
Honda Eu22i, quiet and portable-ish, handles upto 2.2KW.
data_grizzly 2/4/2021 5:55 PM
Thanks! I hadn't seen that model, will check it out
Avatar
@Rob Thanks! @DeeFIR 🇦🇺 I have mostly good feelings about going towards forensics, Its more about what kind of job and the tasks I am given that weighs all of it down. Pay isnt the most important but I know private sector does that better. I sway towards LE more as I see that as a more fun job basically(from what ive heard), but that is the case just because I do not know much about the private sector.
Avatar
Avatar
sadadz
@Rob Thanks! @DeeFIR 🇦🇺 I have mostly good feelings about going towards forensics, Its more about what kind of job and the tasks I am given that weighs all of it down. Pay isnt the most important but I know private sector does that better. I sway towards LE more as I see that as a more fun job basically(from what ive heard), but that is the case just because I do not know much about the private sector.
Andrew Rathbun 2/5/2021 12:46 AM
What are your thoughts on potentially being exposed to child pornography, bestiality, etc? If that's an issue for you, I'd consider something other than LE. It's not for everyone and everyone has a shelf life with looking at that stuff before they need to move on. Prepare for the worst LE has to offer and consider other options if that is problematic for you. Lots of good experience to be had in LE, though. Most experience will be good experience at the beginning.
💯 3
Avatar
Avatar
Andrew Rathbun
What are your thoughts on potentially being exposed to child pornography, bestiality, etc? If that's an issue for you, I'd consider something other than LE. It's not for everyone and everyone has a shelf life with looking at that stuff before they need to move on. Prepare for the worst LE has to offer and consider other options if that is problematic for you. Lots of good experience to be had in LE, though. Most experience will be good experience at the beginning.
Child Sexual Abuse Material (CSAM), Child Sexual Abuse Exploitation (CSAE) or any other form of words, just not the term child porn, it's such a derogatory and inappropriate form of words.
💯 2
Avatar
Avatar
Dfdan
Child Sexual Abuse Material (CSAM), Child Sexual Abuse Exploitation (CSAE) or any other form of words, just not the term child porn, it's such a derogatory and inappropriate form of words.
Andrew Rathbun 2/5/2021 1:57 AM
Thank you and I understand this but felt the need to use layman's terms with a student who may not be as familiar with the acronyms. Suppose I could've spelled it out but I didn't. Next time I'll wait till I have two eyes open to respond.
Avatar
Thank you all for the input, I see myself as quite hardened if that is a well translated word.. I've seen some terrible stuff on the internet. I figured the minor part would be "fine" with my mental state aslong as I do not have children myself, if that would become the case I suppose it becomes more "personal" or however you see it. (edited)
3:33 AM
Personal in the matter that it could happen to my children too. But then again that is hard to imagine if you do not have kids
Avatar
Avatar
sadadz
Thank you all for the input, I see myself as quite hardened if that is a well translated word.. I've seen some terrible stuff on the internet. I figured the minor part would be "fine" with my mental state aslong as I do not have children myself, if that would become the case I suppose it becomes more "personal" or however you see it. (edited)
Andrew Rathbun 2/5/2021 4:01 AM
You have a point here, I think, and I can relate. I used to go out of my way to watch horrible stuff on the internet in college for reasons older version of me doesn't relate to. Ogrish/Rotten.com type of stuff. I think that helped me when I got to CSAM investigations to be able to mentally separate myself from what I was seeing as I did in my younger, reckless years on the internet, if that makes sense.
4:02 AM
Also, I only did CSAM cases before I had a kid. I can't imagine doing them now. My hats off to all of those in ICAC and who regularly deal with these types of cases.
Avatar
Do you get to turn down those cases or is it a switch job type of scenario
Avatar
For me that's all I do
4:25 AM
But whilst you personally could likely decline them.
4:25 AM
Just note you'll be in a secluded office with that sort of material of show on other colleagues screens
4:25 AM
You'll also have access to occupational health services on a regular basis
4:25 AM
That may be a mandatory requirement
Avatar
Avatar
sadadz
Do you get to turn down those cases or is it a switch job type of scenario
Andrew Rathbun 2/5/2021 4:28 AM
in LE, someone has to take them on. If it's not you, better hope someone else does. But if they get that one and the next one that comes in is of the same nature, well, I guess you're getting that one. It's inevitable and only the lucky few leave LE without having to be subjected to that material
Avatar
Avatar
sadadz
Do you get to turn down those cases or is it a switch job type of scenario
Whereabouts are you based? If UK I'd be happy to discuss the typical day to day workload
Avatar
Avatar
sadadz
Do you get to turn down those cases or is it a switch job type of scenario
spicy_caveman 2/5/2021 4:33 AM
It depends on what specific field you go into. If you are doing extractions and analysis- you will literally scroll your mouse down into it. If you are just doing extractions, carving, and not in depth viewing material- you will probably not see a lot. Even in leo
💯 3
Avatar
@Rob Sweden
Avatar
Avatar
sadadz
Thank you all for the input, I see myself as quite hardened if that is a well translated word.. I've seen some terrible stuff on the internet. I figured the minor part would be "fine" with my mental state aslong as I do not have children myself, if that would become the case I suppose it becomes more "personal" or however you see it. (edited)
I have kids and work this stuff. I think that even makes me more passionate about the crime. Everyone deals with it differently. To me, it’s more about being able to shoulder the stuff because I know I can handle it. If you can’t, I wouldn’t recommend doing it. Some people do have a difficult time.
Avatar
@dmac I understand. I wouldnt recommend myself doing it either but I probably could handle it aslong as I dont see any of it as more than a job
9:17 AM
However lets not get too far off the bigger picture here. I think this, important but still small part of DF is cleared for now. So other than that, what does the job mainly consit of for LE? Do you get pages of cases per day that you need to sort through and save/analyze data or is it more in the way that you get one case/investigation to work on and you put all your hours into that particular case grabbing data, copying hard drives, recovering data and what not
Avatar
Avatar
sadadz
However lets not get too far off the bigger picture here. I think this, important but still small part of DF is cleared for now. So other than that, what does the job mainly consit of for LE? Do you get pages of cases per day that you need to sort through and save/analyze data or is it more in the way that you get one case/investigation to work on and you put all your hours into that particular case grabbing data, copying hard drives, recovering data and what not
Andrew Rathbun 2/5/2021 10:51 AM
When I was in LE, I had 1-3 forensic cases along with 15-20 non-forensic cases simultaneously. I've heard of others having much more
Avatar
Avatar
sadadz
However lets not get too far off the bigger picture here. I think this, important but still small part of DF is cleared for now. So other than that, what does the job mainly consit of for LE? Do you get pages of cases per day that you need to sort through and save/analyze data or is it more in the way that you get one case/investigation to work on and you put all your hours into that particular case grabbing data, copying hard drives, recovering data and what not
When I was in LE, I had a normal case load of 6-7 cases at a time. Normally 75% of those were cell phones cases and the other 25% computers. So normally I could have processes running on the computer images while I worked the cell phone cases. Multi-tasking is huge at most agencies.Majority of my cases were full exams/reports. (edited)
Avatar
Avatar
sadadz
@dmac I understand. I wouldnt recommend myself doing it either but I probably could handle it aslong as I dont see any of it as more than a job
deepdive4n6 2/5/2021 12:24 PM
My case load is about 25% ICAC related, the rest is major crimes like homicide, drugs, sexual assaults, etc, and I work for a large municipal agency with about 400 sworn officers. I cleared my desk before I left for vacation, but I just came back a week ago and am up to nine active cases again that span about 40 devices. Some of are extractions that are still running, some is tool-based analysis that is still in process, and some others I haven't finished the analysis and generated the forensic reports yet. A few others I have the work done and need to complete the narratives for, and I always have several older inactive cases that are approaching trial with prep work to be done. I have five workstations assigned to me in our lab... very normal for me to have something working on all of them at once. In between all of that, I have two less-experienced coworkers who regularly need a hand, and a pool of about two dozen detectives we work closely with that stop by for questions/technical assistance requests. Constant interruptions and reprioritization, and the ability to multi-task is key... I also try to fit in training/travel where I can, as well as research into new forensic techniques/solutions and improving existing processes. I'm never hurting for something to do, that's for darn sure! All said, I love my work. It's very satisfying to do good work that makes a difference in serious cases, and tackling all the various challenges that come at us is very enjoyable. There are some management aspects of who I am employed by that make things unnecessarily difficult and stressful, but that's true of all jobs. (edited)
💯 4
Avatar
Thankful to receive the Top Forensic Examiner award today .
👍 16
💯 5
Avatar
Avatar
f0r3n5ix_
Thankful to receive the Top Forensic Examiner award today .
theAtropos4n6 2/5/2021 10:06 PM
Congratulations!
Avatar
@Moderators Receiving bitcoin dm's from the user: aleprivet#7451
Avatar
Avatar
florus
@Moderators Receiving bitcoin dm's from the user: aleprivet#7451
Andrew Rathbun 2/6/2021 3:19 AM
No need for further reports. I'll start banning here shortly
3:20 AM
Thanks for reporting 👍
Avatar
Avatar
florus
@Moderators Receiving bitcoin dm's from the user: aleprivet#7451
Andrew Rathbun 2/6/2021 5:18 AM
all banned, if anyone legitimate tried to join at 0413 hours, apologize to them for me as i just banned them 😆 (edited)
👍 1
Avatar
I’ve got a QEMU copy on write (QCOW) disk image file from a VM. It contains a reference to the path for the backing file. Am I right to assume that I really need the backing file in order to do forensic analysis (other than perhaps bulk_extractor) or are there any good tricks to pulling filesystem metadata and files out of a QCOW without its backing file?
Avatar
I need to analyze exports from an MS-SQL-Server (.MDF and .bak-Files). Any recommendation for forensic software that can search for deleted data in there?
Avatar
Anyone here currently running G-eye 20.3.2? Not sure if I'm stumbling across a bug or not... 🤨
Avatar
Avatar
IrishDeath
I’ve got a QEMU copy on write (QCOW) disk image file from a VM. It contains a reference to the path for the backing file. Am I right to assume that I really need the backing file in order to do forensic analysis (other than perhaps bulk_extractor) or are there any good tricks to pulling filesystem metadata and files out of a QCOW without its backing file?
Andrew Rathbun 2/8/2021 5:32 AM
QEMU disk image utility (qemu-img) binaries optimized for Windows. Supporting Hyper-V, VMWare, KVM, VirtualBox and Xen virtualization solutions.
👀 1
5:33 AM
I've had to deal with qcow2 files before and I just converted to something else and ingested that way. Not sure about qcow (without the 2) but this may be a lead to explore
👍 1
Avatar
Avatar
sadadz
@dmac I understand. I wouldnt recommend myself doing it either but I probably could handle it aslong as I dont see any of it as more than a job
If you would like some insight into Swedish LE digital forensics specifically, feel free to DM
Avatar
Avatar
Dfdan
Child Sexual Abuse Material (CSAM), Child Sexual Abuse Exploitation (CSAE) or any other form of words, just not the term child porn, it's such a derogatory and inappropriate form of words.
"Child Pornography" is the only form of the term that is defined by my state's statute. Our ICAC task force uses "CSAM", but I've informed them I will not do so as "CSAM" is not found anywhere in our state's laws.
Avatar
Avatar
LawDawg
"Child Pornography" is the only form of the term that is defined by my state's statute. Our ICAC task force uses "CSAM", but I've informed them I will not do so as "CSAM" is not found anywhere in our state's laws.
kmacdonald1565 2/8/2021 10:03 AM
i am on a similar thing here....long story short CSAM (or equivalent) for conversation; child pornography for legal work...more people understand exactly what you are talking about when you say it this way in court/reports, and the negative, and justified, perception by the lay person may actually help you in court.
Avatar
Anybody have a solution to turn off Windows Defender for a forensic box that has stayed off ?
Windows10B 2
Avatar
you mean how w10 keeps turning realtime protection on?
12:11 PM
It pops up false positives on Cellebrite/Axiom etc when you say turn off real time it does it but will come back on.
Avatar
I tried a few registry fixes with no luck
12:29 PM
it's irritating in my malware VMs
Avatar
randomaccess 2/8/2021 1:45 PM
I just created an excluded directory rather than turning it off. For my axiom processing i tend to put my case on a SSD raid for performance reasons anyways, so excluded that directory and no defender grabbing things
Avatar
Is it OK to direct someone who's looking for some advice on hiring a forensics specialist (well tbh they came into the fitbit community server asking for someone to "decrypt the codes so they could prove they didn't violate a no contact order")
2:50 PM
not just a job offer, more like to figure out what they need/should be looking for
Avatar
Andrew Rathbun 2/8/2021 2:51 PM
Ehh, maybe reddit is a better spot for that 🤷‍♂️
2:52 PM
if they come here, though, #password-encryption-cracking but I don't know how much help that would be for this particular use case (edited)
Avatar
it's not really 'code'
2:52 PM
they got presented with some forensic report by a PI and are trying to figure out what it means
2:52 PM
the exact quote is 'they said because there are more characters before their name that indicates contact'
2:52 PM
ah right
Avatar
Avatar
Seagull
the exact quote is 'they said because there are more characters before their name that indicates contact'
DeeFIR 🇦🇺 2/8/2021 3:05 PM
🤷🏼‍♂️🤷🏼‍♂️
3:06 PM
What does that even mean? Maybe I need another coffee before my brain functions correctly.
Avatar
Deleted User 2/9/2021 12:08 AM
Hey, thanks for letting me in
Avatar
Deleted User 2/9/2021 2:21 AM
Signal is one of the most secure apps in the world. But if FBI agents have access to a device, they can still access supposedly-encrypted messages, even on a locked iPhone.
👀 4
2:22 AM
New article about locked iphone and signal on forbes WatchingYou
Avatar
i have a just factory reset phone. What is best practise to proceed? Is it possible to get back any data?
Avatar
Oxygen Forensics 2/9/2021 5:34 AM
Hello, everyone! Soon in #forensic-focus news of @Oxygen Forensics new 13.3 release will appear. I just wanted to give some users with Sony MTK devices a heads up. With the new release we were able to get MTK extraction working with Sony. Not for every single one, but Sony L1, L2, L3, and XA1 are fair game now.
👍 2
Avatar
Avatar
jaikl
i have a just factory reset phone. What is best practise to proceed? Is it possible to get back any data?
If the phone was encrypted before (iPhones, newer Androids): afaik no. On non encrypted phones you need a physical extraction, then maybe some data can be recovered. Results are mixed.
Avatar
Avatar
Zoidberg
If the phone was encrypted before (iPhones, newer Androids): afaik no. On non encrypted phones you need a physical extraction, then maybe some data can be recovered. Results are mixed.
Okey, thanks
Avatar
@Oxygen Forensics could you guys DM me? I have a quick question
Avatar
Oxygen Forensics 2/9/2021 5:41 AM
Sure thing, give me a moment 🙂
oxygen 1
Avatar
Thanks 😁
Avatar
Hi, I would like to know about your experience of using Intella. Is it helpful in Harddrive Image analysis??
Avatar
@randomaccess Good idea, i'll look into that.
Avatar
Question for the group, we do a lot of consent search phone for domestics etc. some of the consent search is limited to a folder or a select few images or videos on the phones. It would save a lot of time and be able to just select folder for example "abuse" that the victim created with the images/videos but i haven't been able to go this route. Hooking the phone up to the forensic box the device is emulated as a media player/phone so we can't image just that file/folder that we need. We are stuck acquiring 60+ gbs with Cellebrite to get one folder that is 700 Mb. Has anybody found a solution or better ideas ?
Avatar
Hail Mary - we need some help from someone at Red Hat (ideally someone involved in digital forensics), related to an ongoing human rights case. If anyone has someone trustworthy at Red Hat that they can put us in touch with, it would be greatly appreciated.
Avatar
Avatar
DCSO
Question for the group, we do a lot of consent search phone for domestics etc. some of the consent search is limited to a folder or a select few images or videos on the phones. It would save a lot of time and be able to just select folder for example "abuse" that the victim created with the images/videos but i haven't been able to go this route. Hooking the phone up to the forensic box the device is emulated as a media player/phone so we can't image just that file/folder that we need. We are stuck acquiring 60+ gbs with Cellebrite to get one folder that is 700 Mb. Has anybody found a solution or better ideas ?
DataPilot10 has a flex media option that allows for an on scene extraction of phones. It can only seize items within a specific time frame. Its a simple, plug and play, tablet sized device that you could easily train up a patrol officer to use.
👍 1
Avatar
I am almost positive that the DP10 also has the option to seize only specific files, Ill have to check tomorrow when I am back in the office. (edited)
Avatar
Data Recovery 2/9/2021 10:55 PM
i have huawei p30 lite emmc dump file- also i have pin cod -i need decrypt possible ufed4pc this case or need Oxygen
Avatar
Nullable Truth 2/10/2021 2:58 AM
Morning everyone. I've written a brief post on how CSV files are formatted. It came up after talking with @Brigs on some nuances it has when generating and parsing them. Hopefully it should clear up how a CSV file should be formatted, and shows they can be quite complex. https://jamiesharpe.github.io/CSV-Parsing/
Comma Seperated Values (CSV) is a format used to store data within a file in the form of rows and columns for data exchange.
👍 4
Avatar
Speaking of data, I was wondering if anyone knew how useful Data Science/Analyst/Engineering experience is in the Digital Forensics field(Im aware this is broad, but im not as knowledgeable as i would like to be) How much is it used in your daily work , or is it a specific field like Database Forensics or something?
Avatar
@DCSO why dont use a micro usbc lightning to USB adapter? (edited)
Avatar
@DCSO XRY has a file selection method which should do pretty much exactly that, that will allow you to browse the phone and manually select what pictures you want to extract. I believe your scenario should work perfectly with that
Avatar
Coffee break quiz for you all - any ideas on what this is?! No prizes other than the warm glow of getting something right (although I wouldn't know!) (edited)
7:10 AM
Avatar
I started to think an Amazon Echo, but it shouldn't have a battery.
Avatar
It was found on a suspect arrested for going equipped if that helps...
Avatar
Car key frequency booster?
Avatar
No need for a mic in a freq booster.
Avatar
Yeah I was wondering that, some kind of inhibitor? But yes the mic would be odd
Avatar
Am I wrong in thinking the 5 objects strategically placed are buttons?
Avatar
Look like it but I only have the pics - object in another department who are stumped
Avatar
K generally means “1000”. For example a 10k resistor means 10,000 ohms. If part of a component designation (say component K204), it usually indicates a relay. Other than standard use as a decimal point, the 3 places I can think you may see a dot o...
Avatar
I'm assuming K stands for Key in this case, as it matches the shape and solder pad pattern.
Avatar
Ah yeah. Key would make sense.
Avatar
I'm intrigued that it has both a built in mic, and solder points for both mic +/- as well as speaker output...
Avatar
I missed the speaker out.
Avatar
Would be nice to see what's under the battery pack
Avatar
It might or might not be useful to know the freq of the oscillator.
7:23 AM
And the part number of the chips if they are visible. I'm guessing the 8 pin is a 555, but it could be anything.
Avatar
I don't think I can get further pics unfortunately, this is all we have. 😦
Avatar
That long plastic leg screwed to the board indicates it's original packaging was no iPod Shuffle...
Avatar
I'm starting to think it might be some type of bluetooth speaker. The battery side has an FM antenna designation too.
Avatar
@tippenring I was thinking about this one when you posted 😄
7:34 AM
SoundBot® SB518FM FM RADIO Water Resistant Bluetooth Wireless Shower Speaker Hands-Free Portable Speakerphone w/ Smart One Touch Auto-Scan, 6Hrs Music Streaming, Built-in Mic, Detachable Suction Cup click to see  click to see how the SB517FM water proof live demo Click to see how to turn the volume up SB517FM Bluetooth Pairing Instruction Produc...
Avatar
Avatar
.karate.
@tippenring I was thinking about this one when you posted 😄
I was just looking through a quick search. There are a ton of bluetooth speakers with FM tuners.
7:37 AM
Against the bluetooth speaker idea though is the fact that it has a mic. What bluetooth speaker has a mic? Maybe a bluetooth handsfree device for talking on the phone in your car (or wherever)?
7:39 AM
Oh the Soundbot has handsfree speaker also. Hmm.
Avatar
Yeah, looks like it could be that kind of gadget. But i think the answer will be revealed if you look under the battery.
Avatar
Yeah. The board probably has a part number on it that would give it away.
Avatar
I'm not sure i would want to speak to someone on the phone while in the shower but each to their own... 😆
😆 1
Avatar
Does look very similar though - I'll see if I can get a pic under the battery.
Avatar
@Erumaro Good to know, we don't have access to XRY at the moment. I think our dongle is way out dated but wondering if it would still work as we have the passcode.
Avatar
Avatar
JMK
Coffee break quiz for you all - any ideas on what this is?! No prizes other than the warm glow of getting something right (although I wouldn't know!) (edited)
Digitalferret 2/10/2021 12:31 PM
interesting: possibly Bluetooth/WiFi player / recorder? trying to find a similar but nefarious device.
Avatar
It's the nefarious context that doesn't help, if it was the shower speaker why is carrying that round with him while scoping out houses?! Ooh unless his thing is he likes to shower in their bathroom 😂
Avatar
Avatar
JMK
It's the nefarious context that doesn't help, if it was the shower speaker why is carrying that round with him while scoping out houses?! Ooh unless his thing is he likes to shower in their bathroom 😂
Digitalferret 2/10/2021 12:37 PM
human perversity knows no bounds
😂 1
12:38 PM
it's the mic input and no screen that has me intrigued
Avatar
If I get any more info I will update!
Avatar
Digitalferret 2/10/2021 12:49 PM
would be good. conversely, maybe it was a stolen item he put his boot down on to prevent ID. nm, do ping us with any info, hope it lives up to it's expectation. [miscreant apprehended dangling Rx/Tx device though bathroom windows; looks to be an attempt to corner the market in perverse ASMR.]
Avatar
Looking for insight. I had a case where videos and images of interest were located on the MicroSD card which was located inside of an Amazon Fire HD Generation 8. The files were located in the following folder structure Vis\etc\dw. I don't believe this to be a cache folder for any program, but my Google-Fu has not been able to find anything which would indicate if this folder is associated with a specific program. Any thoughts?
12:54 PM
possibly associated with an application called "Videoder Video Downloader" Does anyone have any experience with this application (edited)
Avatar
Deleted User 2/11/2021 8:11 AM
@JMK That looks like it was made with a lot.
👍 1
8:11 AM
Kit*
8:12 AM
Just Google each of the points on the board and you'll probably find the instructions on assembly.
8:12 AM
I would, but I'm on my phone.
Avatar
AugustBurnsBlue 2/11/2021 10:34 AM
Anyone have any experience with @Magnet Forensics Magnet AUTOMATE? How are you liking it? I'd love to incorporate it in my ICAC workflow.
Avatar
Anyone have subpoena compliance for Salsa CRM/Engage? Not in Search ISP
Avatar
Deleted User 2/11/2021 2:14 PM
Anyone have any ideas on the best devices to use for data generation? We're looking for affordable but reliable android devices to use for data generation in terms of IoT devices and routers to then be extracted and examined with Android Studio and UFED systems. We're currently considering buying some refurbished One Plus 6T devices for this, any thoughts would be heavily appreaciated
Avatar
are they a way to find the site list of what hoster host what web site? In another world, does IANA/ICANN have a list of all sites hosted and what they host. I ask this question because I think I found a bulletproof hoster just to make sure.
Avatar
Avatar
Deleted User
Anyone have any ideas on the best devices to use for data generation? We're looking for affordable but reliable android devices to use for data generation in terms of IoT devices and routers to then be extracted and examined with Android Studio and UFED systems. We're currently considering buying some refurbished One Plus 6T devices for this, any thoughts would be heavily appreaciated
Andrew Rathbun 2/11/2021 3:57 PM
@CLB_joshhickman1
Avatar
Avatar
CCNA
are they a way to find the site list of what hoster host what web site? In another world, does IANA/ICANN have a list of all sites hosted and what they host. I ask this question because I think I found a bulletproof hoster just to make sure.
Just enter the URL and find out: The hosting company, IP, Datacenter, Location and Nameservers of any website. And check our other tools for web developers.
Avatar
Just curious if anyone has used templates to make writing search warrants easier. I’ve made some PDF forms but I’m wondering if there is a better way. I’m thinking specifically for electronic devices or phone records.
Avatar
My agency has a fairly extensive template system for all kinds of letters, warrants, etc.. It also includes a case management system meaning it automatically fills in the suspects name, adress, birthdate and case related stuff like suspected offense, reason we initiated criminal proceedings, etc. It's based on OpenOffice / LibreOffice.
11:51 AM
The search warrant template includes standard legal stuff (intruduction, name, adress, standard §§s, etc.). So we only need to fill in the case specific reasoning for the search warrant.
Avatar
Avatar
tecnex
My agency has a fairly extensive template system for all kinds of letters, warrants, etc.. It also includes a case management system meaning it automatically fills in the suspects name, adress, birthdate and case related stuff like suspected offense, reason we initiated criminal proceedings, etc. It's based on OpenOffice / LibreOffice.
Is it custom made or a commercial product based off OpenOffice?
Avatar
Sups! Currently LEO, looking at branching out in to DFIR (Cellex) personally. Is there someone I can network with and ask a couple questions?
Avatar
kmacdonald1565 2/12/2021 1:04 PM
Unless it is like sensitive information type talk, ask away here!
Avatar
Hi all, I’ve been in the Cyber Security space for around 4 years. I just finished my first Blue Team CTF and enjoyed performing DF to find tokens. I want to learn more about DF and tools such as Volatility and autopsy. Can any one recommend good learning materials for DF in general and DFIR tools that I’ll need to learn? Thanks In advance!
Avatar
Not sensitive. Background, LEO now and looking to start a small side business. I sell Faraday cases so the LLC is in place. I think I will need to change the type of biz from ecom to services. For private investigators, what is the majority of cases you work?
Avatar
kmacdonald1565 2/12/2021 1:10 PM
me personally, largely forensics for other peoples cases. those cases run the gamut; drugs, sex assaults; homicides, agg assaults, etc...my cases are mostly either ICAC related or fraud related depending on the crisis of the week.
👆 1
Avatar
What is the typical rate of service in the private industry? Is it based on phone extractions and the hours for the investigation?
Avatar
@Joe Schmoe The document templates are normal .ott and .ots files. The case management software is custom made but the case information gets saved in a .ini file and the automatic filling in of information into the templates uses the userfields of openoffice + some addon/plugin to update the userfield variables to the current case you are working on.
3:11 PM
So it might be possible to recreate it if you are proficient in whatever language openoffice addons/macros are programmed in.
Avatar
Avatar
mitchlang
What is the typical rate of service in the private industry? Is it based on phone extractions and the hours for the investigation?
Andrew Rathbun 2/12/2021 3:12 PM
Billable hours just like law firms
Avatar
Avatar
tecnex
@Joe Schmoe The document templates are normal .ott and .ots files. The case management software is custom made but the case information gets saved in a .ini file and the automatic filling in of information into the templates uses the userfields of openoffice + some addon/plugin to update the userfield variables to the current case you are working on.
Thank you. I’ve made a few templates using Acrobat. It’s easy but limited. I would like to have one organized way to select different types of templates.
Avatar
Avatar
Andrew Rathbun
Billable hours just like law firms
randomaccess 2/12/2021 4:31 PM
Biggest difficulty when moving from LE to private ha
💯 3
Avatar
Avatar
randomaccess
Biggest difficulty when moving from LE to private ha
Andrew Rathbun 2/12/2021 4:34 PM
You're not kidding lol
Avatar
Avatar
Andrew Rathbun
Billable hours just like law firms
Thanks Andrew
Avatar
Hey friends. I'm pretty new to this and am working on a course assignment. So I've got a forensic image of a windows system and was wondering - how do I pull login passwords from the registry SAM file?
Avatar
Avatar
Phill
Hey friends. I'm pretty new to this and am working on a course assignment. So I've got a forensic image of a windows system and was wondering - how do I pull login passwords from the registry SAM file?
Digitalferret 2/14/2021 11:28 AM
hey Phill, there's a number of approaches. rather than repeating here, go to the top right of discord pane and search for "SAM file" . looooooooads o' results. pick one to have a go with, and if you need a bit of guidance maybe post in #password-encryption-cracking with details (edited)
Avatar
@Cellebrite Just wondering since I am out of the office. What version of Windows is the Touch 2 operating on?
Avatar
randomaccess 2/14/2021 4:52 PM
Hello fellow @Phill! I have a blog post on thinkdfir about how to do it with mimikatz otherwise axiom will do it if you have that
Avatar
Name That Hash: Quick online tool to help you identify that HASH! https://nth.skerritt.blog There is a download version as well (https://github.com/HashPals/Name-That-Hash)
Name That Hash
Avatar
Beardy_Dude 2/15/2021 2:09 AM
Hey everyone. I work as a digital forensic investigator (LE) and am additionally allocated as a technician for the crisis negotiation unit. In todays world, people may not want or aren't able to communicate through a regular landline or celltower (mobile). People may communicate by text message, VoIP, Webcam-Feed, etc. This is quite a challenge, when it comes to crisis negotiation. Usually when a regular phone is used for crisis negotiation, key players have the option to remotely listen in on the conversation, in order to quickly respond with the appropriate measures. The call is also recorded. How can we achieve something similar, when it comes to crisis negotiation when an alternative communication channel is used ? (ex. whatsapp, facebook , skype, telegram, etc.) Does anyone have experience with something like this?
Avatar
Avatar
Beardy_Dude
Hey everyone. I work as a digital forensic investigator (LE) and am additionally allocated as a technician for the crisis negotiation unit. In todays world, people may not want or aren't able to communicate through a regular landline or celltower (mobile). People may communicate by text message, VoIP, Webcam-Feed, etc. This is quite a challenge, when it comes to crisis negotiation. Usually when a regular phone is used for crisis negotiation, key players have the option to remotely listen in on the conversation, in order to quickly respond with the appropriate measures. The call is also recorded. How can we achieve something similar, when it comes to crisis negotiation when an alternative communication channel is used ? (ex. whatsapp, facebook , skype, telegram, etc.) Does anyone have experience with something like this?
Since Whatsapp, Facebook, Telegram, etc are end-to-end encrypted you can only add other parties at an end-device. First solution that comes to mind is to use a Desktop-Client for those messengers and then screenshare/record the PC the desktop-client is running on
Avatar
Any users or knowledgeable people on Kik messenger here? Is there an option to upload transacted media to some sort of storage space? I have a kik video with a chunked_upload_storage file path and it's making no sense to me.
Avatar
Avatar
Zoidberg
Since Whatsapp, Facebook, Telegram, etc are end-to-end encrypted you can only add other parties at an end-device. First solution that comes to mind is to use a Desktop-Client for those messengers and then screenshare/record the PC the desktop-client is running on
Beardy_Dude 2/15/2021 2:17 AM
Yeah, we thought about using like an android virtual machine, which is then recorded/live-streamed....but I thought maybe someone has already dealt with something like this or maybe already has a solution...
Avatar
Avatar
Beardy_Dude
Hey everyone. I work as a digital forensic investigator (LE) and am additionally allocated as a technician for the crisis negotiation unit. In todays world, people may not want or aren't able to communicate through a regular landline or celltower (mobile). People may communicate by text message, VoIP, Webcam-Feed, etc. This is quite a challenge, when it comes to crisis negotiation. Usually when a regular phone is used for crisis negotiation, key players have the option to remotely listen in on the conversation, in order to quickly respond with the appropriate measures. The call is also recorded. How can we achieve something similar, when it comes to crisis negotiation when an alternative communication channel is used ? (ex. whatsapp, facebook , skype, telegram, etc.) Does anyone have experience with something like this?
Digitalferret 2/15/2021 2:33 AM
With multi-user support, you can assist co-workers who don’t have admin permissions. Support your users remotely and securely with one simple tool.
2:35 AM
Need to work in tandem? No problem! With TeamViewer, two colleagues can collaborate on the same project simultaneously. not sure if that's expandable
2:40 AM
i'm thinking like team members across departments could connect to the operator dealing with the incoming crisis. Teamviewer directions seem a bit vague on how many and in what capacity. looks to be in the right direction though, and has the ability to record
👍 1
Avatar
Hi all, I got a timestamp from a Kaspersky sqlite report file. Can't figure out the format - 569962147721442560
4:05 AM
timestamp should be Jan 2021 but all the usual converters are quite off
Avatar
Quick poll: Does anyone use any other grading software other than Griffeye, if so did you previously use Griffeye and decide to change? or have you always used that tool? - Feel free to drop me a DM if you have a minute. 🙂
Avatar
Avatar
JMK
Coffee break quiz for you all - any ideas on what this is?! No prizes other than the warm glow of getting something right (although I wouldn't know!) (edited)
@tippenring @dotmatrix @.karate. @Digitalferret @Deleted User @deepdive4n6 Follow up to my coffee break quiz a few days ago - I managed to get some more close up pictures from the officer for the non battery side. The battery is held on with epoxy too firm and he didn't want to damage it so nothing more with that side. Think this will be our lot.
👍🏻 1
7:06 AM
7:07 AM
LTK8002D is a 3W Class-AB audio power amplifier - http://www.datasheetcafe.com/ltk8002d-datasheet-audio-amplifier/ not sure about the top picture though.
LTK8002D Datasheet - Class AB Audio Amplifier - LTKCHIP, LTK8002D pdf, LTK8002D pinout, equivalent, data, circuit, output, ic, LTK8002D schematic, manual.
Avatar
Avatar
Beardy_Dude
Hey everyone. I work as a digital forensic investigator (LE) and am additionally allocated as a technician for the crisis negotiation unit. In todays world, people may not want or aren't able to communicate through a regular landline or celltower (mobile). People may communicate by text message, VoIP, Webcam-Feed, etc. This is quite a challenge, when it comes to crisis negotiation. Usually when a regular phone is used for crisis negotiation, key players have the option to remotely listen in on the conversation, in order to quickly respond with the appropriate measures. The call is also recorded. How can we achieve something similar, when it comes to crisis negotiation when an alternative communication channel is used ? (ex. whatsapp, facebook , skype, telegram, etc.) Does anyone have experience with something like this?
Callyo has something to set up for negotiations units in regards to what you’re looking for. Here is their brochure https://callyo.com/product
Avatar
Not finding anything about the top chip from the numbers, but similar chips from the manufacturer with the same pin layouts are being sold as bluetooth chipsets. (edited)
Avatar
I didn't find it yet either. I was wondering if it was bluetooth, wifi, or maybe both.
Avatar
I think the creepy SoundBot radio shower speaker looks a good fit though.
👍 1
Avatar
I'm almost certain it's an AC6905 from JieLi
Avatar
Avatar
JMK
I think the creepy SoundBot radio shower speaker looks a good fit though.
It's a weird thing to carry around in that kind of dismantled state, though.
Avatar
definitely
Avatar
Then again, we only get to work with the weird people. 😅
😂 2
Avatar
It's true, there's a lot of circs I tell non LE people that i think are normal these days and then I see their puzzled faces, and I remember i've become desensitised to the weirdness!
Avatar
I actually have one of those soundbot BT speakers
Avatar
@rayeh Do you chat to people while you're in the shower? 🤨 😆
Avatar
Here's an interesting github post on someone playing with the HieLi AC6905a. It looks like he concluded the value printed on the chip might be a serial number rather than a part number. https://github.com/christian-kramer/JieLi-AC690X-Familiarization
8:02 AM
He found a programmer for the chip, so I have to wonder if that board that was recovered hadn't been reprogrammed to do something else.
Avatar
Ha no, it was given as a gift. It was actually really good while cooking, suction cup onto whatever
Avatar
Avatar
tippenring
Here's an interesting github post on someone playing with the HieLi AC6905a. It looks like he concluded the value printed on the chip might be a serial number rather than a part number. https://github.com/christian-kramer/JieLi-AC690X-Familiarization
Yeah I saw this. I'm going to go out on a limb and say this suspect isn't the sharpest knife in the block though...
Avatar
Avatar
Garrett
Callyo has something to set up for negotiations units in regards to what you’re looking for. Here is their brochure https://callyo.com/product
Beardy_Dude 2/15/2021 9:06 AM
thank you! you're the best!
Avatar
Avatar
JMK
@tippenring @dotmatrix @.karate. @Digitalferret @Deleted User @deepdive4n6 Follow up to my coffee break quiz a few days ago - I managed to get some more close up pictures from the officer for the non battery side. The battery is held on with epoxy too firm and he didn't want to damage it so nothing more with that side. Think this will be our lot.
Digitalferret 2/15/2021 9:34 AM
Shower radio looks about it but the mic had me wondering if the dude was carrying it as a cheap and impromptu listening device. drop it in on a string through any open window and go sit in a car, or hide a few metres away or that or see if he could eavesdrop on any insecure bluetooth? maybe check the guys phone see if it's registered the device in bluetooth/wifi network history?
Avatar
Avatar
Digitalferret
Shower radio looks about it but the mic had me wondering if the dude was carrying it as a cheap and impromptu listening device. drop it in on a string through any open window and go sit in a car, or hide a few metres away or that or see if he could eavesdrop on any insecure bluetooth? maybe check the guys phone see if it's registered the device in bluetooth/wifi network history?
Oh yes, good call, didn't think about that. I'll suggest it to the officer! And to everyone that assisted and offered help - THANK YOU! Much appreciated 🙂
😘 1
Avatar
PraesensAbsens 2/15/2021 12:16 PM
Hi guys! I have to do a project for uni. Threat Intelligence. Make a tool with python in which I can mount a .E01 and then extract IP addresses from it. Then check if the IP's are known in a known threat database. I've been struggling with it for a while now and my teacher doesn't know how to do it either, so no help there. I'm at a loss, so thought that maybe someone here would be able to help me out. I've been using visual code with ubuntu in it (as it has to be made with python3 on linux) and am trying to use ewfmount.
Avatar
DeeFIR 🇦🇺 2/15/2021 12:29 PM
@PraesensAbsens I can't code to save my life, but it seems like it would be fairly straight forward if you're not looking in specific locations or at specific files for IP addresses. If you're simply running a regex across the entire image, outputting those to a list, then querying a corresponding API with each IP/line in that list, it would seem it would achieve what you need.
Avatar
@PraesensAbsens - libewf+bulk extractor is my suggestion
12:32 PM
This is the development tree. For downloads please see: - simsong/bulk_extractor
12:33 PM
we use https://github.com/google/dfdewey as part of a pipeline for similar things
Contribute to google/dfdewey development by creating an account on GitHub.
Avatar
Avatar
DeeFIR 🇦🇺
@PraesensAbsens I can't code to save my life, but it seems like it would be fairly straight forward if you're not looking in specific locations or at specific files for IP addresses. If you're simply running a regex across the entire image, outputting those to a list, then querying a corresponding API with each IP/line in that list, it would seem it would achieve what you need.
PraesensAbsens 2/15/2021 12:39 PM
See they even kind of made it easier, as we can literally just create our own e01 with a word document that includes some IP's, but mounting it has been giving me issues.
12:40 PM
It keeps denying me permission to then read the mounted ewf
12:40 PM
Or I get something along the lines of "fuse: device not found, try 'modprobe fuse' first.
12:40 PM
And since I've barely had any coding, I have NO idea what that means. 😂
12:41 PM
Trying to make a tool when you only know basics is hard, haha. (edited)
Avatar
Avatar
PraesensAbsens
It keeps denying me permission to then read the mounted ewf
What tool are you using to mount the .E01? If you are using FTK you could try mounting it with Arsenal. I have been told that Arsenal plays nicer with running tools against mounted images.
Avatar
Avatar
FullTang
What tool are you using to mount the .E01? If you are using FTK you could try mounting it with Arsenal. I have been told that Arsenal plays nicer with running tools against mounted images.
PraesensAbsens 2/15/2021 12:52 PM
I unfortunately have to do it with a python script. So I'm using ewfmount
Avatar
Avatar
PraesensAbsens
It keeps denying me permission to then read the mounted ewf
as root? you need to pass -X allow_root to let root read the mounted ewf
1:10 PM
Libewf is a library to access the Expert Witness Compression Format (EWF) - libyal/libewf
Avatar
Avatar
Onager
as root? you need to pass -X allow_root to let root read the mounted ewf
PraesensAbsens 2/15/2021 1:36 PM
I'll try that tomorrow! (It's 10:36pm here now and my brain is tired from all the failed attempts haha). Can I DM you tomorrow if I still can't figure it out?
Avatar
sure, i'll be available on and off tomorrow
Avatar
PraesensAbsens 2/15/2021 1:38 PM
Alright, thank you. I have until friday to do this, so let's hope I'll manage. 😂
Avatar
@PraesensAbsens I’ve just done a quick google, not sure if this article will help you? http://www.swiftforensics.com/2013/10/mounting-encase-images-easy-way-in.html?m=1
This post continues from the earlier one (mounting DD images in Ubuntu13 with one click) . Now we want to do the same for E01 images. We wi...
Avatar
Avatar
3X3
Quick poll: Does anyone use any other grading software other than Griffeye, if so did you previously use Griffeye and decide to change? or have you always used that tool? - Feel free to drop me a DM if you have a minute. 🙂
Bump - more a question for UK LE
Avatar
Hi, does anyone know how to have smaller and more thumbnails in thumbnail-view in Griffeye?
Avatar
Avatar
Luci
Hi, does anyone know how to have smaller and more thumbnails in thumbnail-view in Griffeye?
Drag the info panel to the left to be smaller to have more on view. (edited)
Avatar
@Luci spanner and cog symbol top right corner of thumbnail panel
Avatar
opp_dthawke 2/16/2021 7:17 AM
Sent an Investgator 4 different portable case packages for review and tagging in @Magnet Forensics AXIOM. Investigator was able to generate 3 HTML reports from tagged items from 3 portable cases. One portable case fails with "Export to HTML by tag failed" error. Any ideas why?
Avatar
Avatar
Dfdan
@Luci spanner and cog symbol top right corner of thumbnail panel
It will not shrink the thumbnails going any more left of the center
7:37 AM
of apperance->zoom
Avatar
Hi all, anyone here that works as forensics/IR in a big4? or consulting firm?
Avatar
Is there anyone from @Cellebrite sales that can reach out to me today? I got a last minute opportunity (software) but I need to get the info in today. I left a VM at the sales number earlier.
Avatar
Joe shoot me a dm I’ll get someone for you
Avatar
Avatar
3X3
Bump - more a question for UK LE
Semantics 21 (Tom) 2/16/2021 4:01 PM
The two main tools on the market are Semantics 21 LASERi-X and Griffeye to be honest. DM me if you fancy a trial or demo of LASERi-X. 7 UK forces switched to X last year and globally it’s growing quickly.
Avatar
Avatar
Dfdan
Honda Eu22i, quiet and portable-ish, handles upto 2.2KW.
data_grizzly 2/16/2021 5:53 PM
Thank you for recommendation - I ended up getting the eu2200i, just did field collection took 1.5 hours, generator was much quieter then expected with eco boost on!
Avatar
Have you ever seen temp files that get deleted immediately upon creation by automated processes not show up in the MFT? Is this because these files are somehow immediately overwritten or for some other reason?
Avatar
Avatar
opp_dthawke
Sent an Investgator 4 different portable case packages for review and tagging in @Magnet Forensics AXIOM. Investigator was able to generate 3 HTML reports from tagged items from 3 portable cases. One portable case fails with "Export to HTML by tag failed" error. Any ideas why?
Sending DM
Avatar
Does anyone know if an IMSI stays the same if a user switches SIM cards with the same carrier, or is a new IMSI assigned?
Avatar
Deleted User 2/17/2021 8:02 PM
@JMK It's an Amazon echo (edited)
👍 1
Avatar
theAtropos4n6 2/17/2021 10:04 PM
Without knowing for sure, I would say that it should stay the same, as the IMSI comprises of Country Code+Carrier Code+Subscriber ID.
Avatar
Nullable Truth 2/17/2021 11:08 PM
@Villano is it possible to find artefacts of the file's existence in the journal? Presuming NTFS
Avatar
@Nullable Truth I will look into Journal. Thanks for the tip!
Avatar
Is anyone here using Mailstore? I'm looking for an easy way to extract all mail attachments to actual files (archived mails only get saved in .dat files).
Avatar
@theAtropos4n6 thanks for your response
💯 1
Avatar
Anybody else constantly seeing Cellebrite missing Snapchats data while other software like Axiom etc is pulling thousands ? Appears we are going to have to parse through two + forensics software on every device we do.
Avatar
Thanks @Deleted User 🙂
Avatar
Avatar
DCSO
Anybody else constantly seeing Cellebrite missing Snapchats data while other software like Axiom etc is pulling thousands ? Appears we are going to have to parse through two + forensics software on every device we do.
I always use Axiom is SnapChat is important.
👍 1
Avatar
Avatar
DCSO
Anybody else constantly seeing Cellebrite missing Snapchats data while other software like Axiom etc is pulling thousands ? Appears we are going to have to parse through two + forensics software on every device we do.
DefendingChamp 2/19/2021 9:46 AM
If the case is important enough then yes. It's always good practice to cross examine with multiple extraction sources.
Avatar
I have had similar results, most recently with chats. Had an extraction where PA showed no messages, yet Axiom had a bunch of carved messages that were actually relevant to the investigation.
Avatar
Hi, I am currently a student at University of South Wales on my final year project in Computer Forensics. My project is about creating a guide on how to extract data from a doorbell camera using UART. I have created a survey that contains 16 questions regarding doorbell cameras in digital forensics. Anyone can answer this survey, even if one have not done any forensics on a doorbell camera and it is completely anonymous. If you got a couple of minutes to spare I would appreciate any response to the survey, thank you. https://docs.google.com/forms/d/e/1FAIpQLSclqToU4JQBS6IU9UyaNW9pTa_c94aqcXvEKskzKSsLAnY4dw/viewform?vc=0&c=0&w=1&flr=0 (edited)
The purpose of this survey is to identify how common doorbell cameras are in digital forensics. Participation is voluntary and you may withdraw at any time. No sensitive data will be collected during this study, however if you are uncomfortable answering any questions you may stop at any time. All information provided will be held in confidenc...
Avatar
@Aakra completed, but we haven't had many in so not much help - you seem to have the "how many IoT devices do you investigate a month" question twice
Avatar
@JMK Thanks! The two questions you are refering to I believe is "How many IoT Devices do you investigate in a month?" and "How many Doorbell Cameras do you investigate in a month?"
Avatar
Avatar
Aakra
@JMK Thanks! The two questions you are refering to I believe is "How many IoT Devices do you investigate in a month?" and "How many Doorbell Cameras do you investigate in a month?"
Number 9 and 14 are the same wording for me
Avatar
oh would you look at that, thanks!
Avatar
dumpanddecode 2/20/2021 11:02 AM
@Jobbins did you ever have any luck with that deep insert skimmer you posted on 2/14/19? I had one come in last week with that same exact board on it.
Avatar
Avatar
dumpanddecode
@Jobbins did you ever have any luck with that deep insert skimmer you posted on 2/14/19? I had one come in last week with that same exact board on it.
Sent you a DM!
Avatar
Deleted User 2/20/2021 2:01 PM
Hi everybody, do somebody has experience to writing abuse on Google to remove search result and clear banned resource. Tried like 90 times, I have high court decision and Interpol prescription. Resource is blackmailing and spread cp but google says it’s ok. Thus maybe somebody has experience p, please DM I’m
Avatar
Hi everybody, question: I'm trying to baseline some systems to identify "potential malicious activities". One method I'm utilizing is to extract all the MFT from the systems and use Eric Zimmerman's MFTECMD tool to document files ran and accessed. The output would be CSV from the tool. Do anyone know if I can feed that CSV data to SOF - ELK natively or timesketch? I want to visualize the data if there is a way. Thank you in advance
Avatar
Avatar
MrChoco4u
Hi everybody, question: I'm trying to baseline some systems to identify "potential malicious activities". One method I'm utilizing is to extract all the MFT from the systems and use Eric Zimmerman's MFTECMD tool to document files ran and accessed. The output would be CSV from the tool. Do anyone know if I can feed that CSV data to SOF - ELK natively or timesketch? I want to visualize the data if there is a way. Thank you in advance
Andrew Rathbun 2/21/2021 10:09 AM
Configuration files for the SOF-ELK VM, used in SANS FOR572 - philhagen/sof-elk
Avatar
You can also use plaso to timeline a specific set of collected artifacts (including the $MFT) , and then ingest that onto SOF-ELK
👍 1
Avatar
Avatar
OMENScan
You can also use plaso to timeline a specific set of collected artifacts (including the $MFT) , and then ingest that onto SOF-ELK
Ah yea didn't think of that, using log2timeline to specifcying MFT only. I'll test that out. thanks!
👍 1
Avatar
@Moderators Got one of those spam sales DM at 02:23.
this 1
Avatar
Avatar
Rob
@Moderators Got one of those spam sales DM at 02:23.
theAtropos4n6 2/21/2021 11:47 PM
@Mistercatapulte informed me that the spammer is already banned. This was a super fast ban. FYI everybody. (edited)
👍 1
Avatar
any idea how to connect a SAS drive to my laptop?
Avatar
Avatar
jobsouth
any idea how to connect a SAS drive to my laptop?
Tableau T6u
Avatar
thank you!
Avatar
Avatar
Aakra
Hi, I am currently a student at University of South Wales on my final year project in Computer Forensics. My project is about creating a guide on how to extract data from a doorbell camera using UART. I have created a survey that contains 16 questions regarding doorbell cameras in digital forensics. Anyone can answer this survey, even if one have not done any forensics on a doorbell camera and it is completely anonymous. If you got a couple of minutes to spare I would appreciate any response to the survey, thank you. https://docs.google.com/forms/d/e/1FAIpQLSclqToU4JQBS6IU9UyaNW9pTa_c94aqcXvEKskzKSsLAnY4dw/viewform?vc=0&c=0&w=1&flr=0 (edited)
Submitted my response; interesting questions. Btw, you asked if we are currently a working investigator. A lot of DFIR workers are not technically an "investigator" but could be in some other role doing the analysis e.g. "Examiner". Keep this wording in mind for the future if the wording matters. I absolutely could not say I am an investigator because that title is reserved for other people in this building.
Avatar
Avatar
Cole
Submitted my response; interesting questions. Btw, you asked if we are currently a working investigator. A lot of DFIR workers are not technically an "investigator" but could be in some other role doing the analysis e.g. "Examiner". Keep this wording in mind for the future if the wording matters. I absolutely could not say I am an investigator because that title is reserved for other people in this building.
Thanks for your response on the survey and thank you for the tip on my wording! Will keep this in mind for the future 🙂
Avatar
Does anyone here have a recommendation for an AWS Glacier client they trust and use?
9:27 AM
this is for work, not personal use
Avatar
Avatar
MrChoco4u
Hi everybody, question: I'm trying to baseline some systems to identify "potential malicious activities". One method I'm utilizing is to extract all the MFT from the systems and use Eric Zimmerman's MFTECMD tool to document files ran and accessed. The output would be CSV from the tool. Do anyone know if I can feed that CSV data to SOF - ELK natively or timesketch? I want to visualize the data if there is a way. Thank you in advance
Hey @MrChoco4u, This is Johan, author of Timesketch. Getting that data into Timesketch should be pretty simple as well. I'm not familiar with the format of the CSV that MFTECMD output (column names etc). If you can send me a sample I can take a look.
Avatar
Has anyone got any recommendations for training or resources for inaccessible / accessible files on Android / iOS. Thanks.
Avatar
Avatar
Johan
Hey @MrChoco4u, This is Johan, author of Timesketch. Getting that data into Timesketch should be pretty simple as well. I'm not familiar with the format of the CSV that MFTECMD output (column names etc). If you can send me a sample I can take a look.
Thank you Johan I’ll take a look in the next few days and let you know if I run into any issues .
Avatar
Avatar
Pixel
Has anyone got any recommendations for training or resources for inaccessible / accessible files on Android / iOS. Thanks.
What do you mean by "inaccessible / accessible files"?
Avatar
Avatar
AmNe5iA
What do you mean by "inaccessible / accessible files"?
CPS like to know what's accessible or not. Needed for iioc categorisation
3:35 AM
I. E. Deleted = inaccessible etc
Avatar
Avatar
Rob
CPS like to know what's accessible or not. Needed for iioc categorisation
So @Pixel means file inaccessible / accessible to the user? I'd be surprised if there was a definitive list for this because of so many variations between OS versions as well as all the variations in Apps and even App versions! If there is, I'd love to know it.
Avatar
Avatar
AmNe5iA
So @Pixel means file inaccessible / accessible to the user? I'd be surprised if there was a definitive list for this because of so many variations between OS versions as well as all the variations in Apps and even App versions! If there is, I'd love to know it.
Yes we have to state whether IIOC files are accessible.. can be difficult there are so many apps around!
Avatar
Hi all, whats everyone's thoughts on Threat Hunting vs. Compromise Assessments?
8:35 AM
i.e distinct differences (if any?, because if i know it right, then approach seems similar? , unless i have got it wrong )
Avatar
randomaccess 2/23/2021 3:01 PM
Threat hunting can lead to a compromise assessment. Or a compromise assessment is a type of forensic analysis - how was this known compromised box affected. Threat hunting otherwise is "hey across this network, is anything bad happening that means I need to roll IR?"
👍 1
Avatar
As Dr Tulley steps down as UK FSR (Forensic Science Regulator), this outgoing message in The Guardian Newspaper "Tully also called for greater scrutiny of scientific evidence in court, including training lawyers and police officers on the limitations of forensic science – particularly digital evidence..." https://www.theguardian.com/uk-news/2021/feb/16/forensic-science-funding-cuts-putting-justice-at-risk-says-outgoing-regulator
Dr Gillian Tully says lack of capacity is forcing police to limit toxicology tests on suspected drug drivers
💯 1
Avatar
Avatar
randomaccess
Threat hunting can lead to a compromise assessment. Or a compromise assessment is a type of forensic analysis - how was this known compromised box affected. Threat hunting otherwise is "hey across this network, is anything bad happening that means I need to roll IR?"
Thanks for that. Makes more sense now. I always thought compromise assessment to be "scan through the network, collect basic artefacts, and see which system shows signs of compromise, i.e via suspicious IoCs, odd Run keys etc" But that is also threat hunting, since its proactively analysing systems on the network and trying to determine, which systems may need further analysis.
4:39 AM
@0x434f4f50 and @jason - your thoughts, i searched through history chat, and saw you had mentioned you do compromise assessments too 🙂 Keen and curious to understand
Avatar
While table top exercises are always a hot commodity for our customers, proactive threat hunting and compromise assessments are becoming increasingly popular through our Cisco Incident Response Readiness & Retainer service.
👍 1
Avatar
Cross posted from osint. Anyone know if,when a preservation request, if everything generated by the suspect in the following 90 days is preserved as well or if it's only how that account sat at the time of the notice? to elaborate, some detectives have already preserved an account and want to interview a suspect. They anticipate that suspect making a few phone calls after the interview and then shutting down their accounts. The detectors would like record of the phone calls that they anticipate.
5:29 AM
And by phone calls I mean Facebook Messenger calls
Avatar
Andrew Rathbun 2/24/2021 7:07 AM
more crypto spammers joining, will ban all, ignore PMs from them please
Avatar
Avatar
Andrew Rathbun
more crypto spammers joining, will ban all, ignore PMs from them please
Andrew Rathbun 2/24/2021 7:21 AM
all are banned, great work @Moderators
💪 6
Avatar
Damn, I was hoping to get into crypto
Avatar
Avatar
Jack Frost
Cross posted from osint. Anyone know if,when a preservation request, if everything generated by the suspect in the following 90 days is preserved as well or if it's only how that account sat at the time of the notice? to elaborate, some detectives have already preserved an account and want to interview a suspect. They anticipate that suspect making a few phone calls after the interview and then shutting down their accounts. The detectors would like record of the phone calls that they anticipate.
Here is the language from 18 USC 2703(f) regarding a service providers obligation: (f) Requirement To Preserve Evidence.— (1) In general.— A provider of wire or electronic communication services or a remote computing service, upon the request of a governmental entity, shall take all necessary steps to preserve records and other evidence in its possession pending the issuance of a court order or other process. (2) Period of retention.— Records referred to in paragraph (1) shall be retained for a period of 90 days, which shall be extended for an additional 90-day period upon a renewed request by the governmental entity. I am not a lawyer (didn’t even sleep at a Holiday Inn last night) but I would say there is room for interpretation there, how could a provider be obligated to preserve records that are not in their possession at the time of the request? I am guessing different providers handle it differently, just some food for thought.
Avatar
I read "preserve records and other evidence in its possession" with an assumed "at the time of the request" myself. IANAL either. I bet there is already case law on this question.
Avatar
That was my assumption too but wanted to clarify. I told them to just send another preservation request shortly after the interview .
Avatar
What are you guys using for evidence tracking in the lab? I am thinking of a database/barcode/scanner combination to simplify registering and working with evidence.
Avatar
@Jack Frost I'm not a lawyer either, but DoJ (CCIPS) has put forward specific guidance that preservation orders under 2703(f) are not "prospective", meaning they cannot preserve records created after the request. It's written guidance. If you need the specific reference, let me know.
Avatar
Avatar
5cary
@Jack Frost I'm not a lawyer either, but DoJ (CCIPS) has put forward specific guidance that preservation orders under 2703(f) are not "prospective", meaning they cannot preserve records created after the request. It's written guidance. If you need the specific reference, let me know.
That's good wording, if you find the source that would be great.
Avatar
Avatar
Luci
What are you guys using for evidence tracking in the lab? I am thinking of a database/barcode/scanner combination to simplify registering and working with evidence.
We are using Magnet Atlas
Avatar
Okay, I'll have a look in my stack. The case law that @tippenring alluded to is from the Sixth Circuit IIRC. I'll find the case for that as well if I can. We went through this evolution with an overly aggressive investigations supervisor recently.
Avatar
@Jack Frost Found my notes. The CCIPS guidance is from their Searching and Seizing Computers and Electronic Evidence publication. I believe this 2015 edition (pdf still has 2009 filename) is the most recent. The "prospective" language is in the second paragraph on page 140. https://www.justice.gov/criminal/cybercrime/docs/ssmanual2009.pdf
👍 1
9:59 AM
The case law is from Warshak v. U.S., 532 F.3d 521 (6th Cir. 2008). While it didn't help the subject, the court opinion included specific language against the prospective preservation of new material. You can read the "prospecitve preservation" portion here: https://www.wiley.law/newsletter-3602 . That's all I have on it.
Avatar
hola, I'm trying to understand the relationship between Windows tokens and Kerberos tickets. Let me know if this is out of scope for this channel. Are tokens created and reside in memory for all accounts (including built-in accounts) that are logged into the system at boot and logon after boot? (edited)
Avatar
Avatar
Deleted User
Hi everybody, do somebody has experience to writing abuse on Google to remove search result and clear banned resource. Tried like 90 times, I have high court decision and Interpol prescription. Resource is blackmailing and spread cp but google says it’s ok. Thus maybe somebody has experience p, please DM I’m
GreyMane_Odinson 2/24/2021 12:50 PM
Google is notorious for not complying with government asks...
Avatar
Avatar
Villano
hola, I'm trying to understand the relationship between Windows tokens and Kerberos tickets. Let me know if this is out of scope for this channel. Are tokens created and reside in memory for all accounts (including built-in accounts) that are logged into the system at boot and logon after boot? (edited)
Andrew Rathbun 2/24/2021 2:03 PM
#computer-forensics might be better for it. Please ask in there because I want to see what others say as well
👍 1
Avatar
Avatar
Jack Frost
We are using Magnet Atlas
Thank you
Avatar
Avatar
Luci
What are you guys using for evidence tracking in the lab? I am thinking of a database/barcode/scanner combination to simplify registering and working with evidence.
We use Lima
Avatar
Hi, sorry I know this is a weird request/question. I’m currently researching on log files and using python to analyse log files. I was wondering if anybody had any sample or example log files which I could use for this?
Avatar
Avatar
Junaid
Hi, sorry I know this is a weird request/question. I’m currently researching on log files and using python to analyse log files. I was wondering if anybody had any sample or example log files which I could use for this?
What kind of log files are you talking about?
Avatar
Sorry should’ve been way more specific. Just things like call logs or even user activity log files just so I can base the code to fetch and show the data and present them in graph format
Avatar
Deleted User 2/25/2021 11:55 AM
I mean log file formats are going to differ everywhere maybe just export something out of windows event viewer for the sake of your project. If you have an internet facing windows server you can almost always find credential stuffing attacks on them. Linux has similar logs as well.
Avatar
Anyone out there have a spare invite for Clubhouse? I need to do a little research on the app data so I finally need to try and get an account. 😩
Avatar
thatboy_leo 2/25/2021 1:38 PM
Hello, is anyone else attending/has attended IACIS BCFE. Should I start studying a specific topic or is it ok to head into it with general knowledge
Avatar
Avatar
thatboy_leo
Hello, is anyone else attending/has attended IACIS BCFE. Should I start studying a specific topic or is it ok to head into it with general knowledge
Andrew Rathbun 2/25/2021 1:39 PM
#training-education-employment
Avatar
Avatar
Andrew Rathbun
#training-education-employment
thatboy_leo 2/25/2021 1:39 PM
Ty
Avatar
Avatar
Luci
What are you guys using for evidence tracking in the lab? I am thinking of a database/barcode/scanner combination to simplify registering and working with evidence.
We use Monolith. It has barcode support too. My haiku is done.
Avatar
Avatar
Luci
What are you guys using for evidence tracking in the lab? I am thinking of a database/barcode/scanner combination to simplify registering and working with evidence.
I used Lima in a past life 😉
Avatar
I'm about to write my Bachelor's thesis in Computer Science and a possible subject I was thinking of is Digital Forensics Methodology. I would be thankful to anyone who could point out some good academic resources that I could use 🙂
Avatar
deepdive4n6 2/26/2021 12:09 PM
@pexi86 Literally just google "Digital Forensics Methodology" and you'll find a massive body of scholarly work on the topic...
Avatar
ofc, was more looking for if someone knew of any specific resource that they would definitely include 🙂
Avatar
randomaccess 2/26/2021 12:56 PM
the iso standard is definite include
Avatar
Much appreciated! 👍
Avatar
Does anybody know if Mega will automatically upload files from your phone to an online Mega account? Have a guy claiming that someone sent him photos on whatsapp but he deleted them right away. However, there are paths showing the same files in Mega. Trying to figure out if he purposely uploaded them to Mega or maybe his phone did it without him realizing.
Avatar
Avatar
Cole
Does anybody know if Mega will automatically upload files from your phone to an online Mega account? Have a guy claiming that someone sent him photos on whatsapp but he deleted them right away. However, there are paths showing the same files in Mega. Trying to figure out if he purposely uploaded them to Mega or maybe his phone did it without him realizing.
Digitalferret 2/26/2021 1:46 PM
check for apps? if he has sync, https://play.google.com/store/apps/details?id=com.ttxapps.megasync&hl=en&gl=US deleted on device means deleted in cloud New files in your device are uploaded. If you delete a file on one side, it will be deleted on the other side.
This app is an automatic file sync and backup tool. It lets you automatically synchronize files and folders with MEGA (mega.nz) cloud storage and with your other devices. It is an ideal tool for photo sync, document and file backup, automatic file transfer, automatic file sharing between devices,... New files in your cloud account are automatic...
Avatar
Thanks!
Avatar
hello, do you know a software allowing to make screen mirroring on IOS? An equivalent of scrcpy on android.
Avatar
Avatar
0M364
hello, do you know a software allowing to make screen mirroring on IOS? An equivalent of scrcpy on android.
You can screen record from iOS on Quicktime on a Mac OS computer
👍 2
this 2
👌 1
Avatar
Just ran a quick test with WhatsApp and Mega on iOS and the scenario you describe is possible. WhatsApp has a chat setting where it saves images sent in a chat to the camera roll and on my device when I set it up, that was on by default. Mega also has the option to save iOS camera roll photos to the cloud account; however, this was off by default. So at first glance, in order for the scenario you describe to occur, the suspect would need to have both the WhatsApp and Mega apps on the device and would have had to have manipulated the settings on the Mega App to allow the CameraRoll to upload automatically to his account. So if you can get to the settings on his device, you could probably verify the truthfulness of his claim rather quickly. Also, if you’re working a CSAM case, if you email the links to Mega, they will provide you with info pertaining to those folders including the account that owns the folder and activity associated with that folder. That could be another way to confirm your guy had to actually interact with the files to upload them if they were uploaded to a folder owned by another user
2:13 PM
@Cole
Avatar
thatboy_leo 2/28/2021 6:10 PM
Question on Autopsy tool, my machine has 32gb ram and it’s mot responding after analyzing files on an external hd. How long should I wait before shutting it down and analyzing it again? I’ve turned off a few settings such as setting hash values as this is a personal device that I want to recover photos from. I don’t have any other programs on and have used task manager to kill any known tasks taking up memory
Avatar
Avatar
thatboy_leo
Question on Autopsy tool, my machine has 32gb ram and it’s mot responding after analyzing files on an external hd. How long should I wait before shutting it down and analyzing it again? I’ve turned off a few settings such as setting hash values as this is a personal device that I want to recover photos from. I don’t have any other programs on and have used task manager to kill any known tasks taking up memory
Digitalferret 3/1/2021 12:46 AM
that I want to recover photos from is this a data recovery job? if so, autopsy might not be your best bet. if its hanging up, maybe the external drive has problems, not Autopsy
Avatar
Nullable Truth 3/1/2021 2:21 AM
jumping on what ^ said, you'll want to take an image of the drive before trying to recover any data. It sounds like you're trying to analyse the live device.
Avatar
Avatar
Digitalferret
that I want to recover photos from is this a data recovery job? if so, autopsy might not be your best bet. if its hanging up, maybe the external drive has problems, not Autopsy
thatboy_leo 3/1/2021 5:01 AM
Thank you for your reply. The external hd is definitely the problem. I ended up force quitting and coming back. Thankfully the case saved so I extracted carved images. Is it better practice to create E01 files of the drive and then carve images?
Avatar
Avatar
thatboy_leo
Thank you for your reply. The external hd is definitely the problem. I ended up force quitting and coming back. Thankfully the case saved so I extracted carved images. Is it better practice to create E01 files of the drive and then carve images?
Digitalferret 3/1/2021 5:06 AM
it's better to use data recovery software, not that autopsy isn't a capable tool, it's forensic biased. there are better options for DR. if the drive has problems you are best using a drive test s/w first such as Acelabs free disk checker tool
Avatar
thatboy_leo 3/1/2021 5:09 AM
Ahh I see what you mean. I’ll test out some DR software next weekend. Thank you @Digitalferret
5:10 AM
if the drive has bad sectors, as soon as the OS detects them it will likely hang.
👍 1
5:10 AM
best of luck, feel free to get back if and when
Avatar
kmacdonald1565 3/1/2021 7:00 AM
Sorry for a gross question on a Monday morning.......We have a DVR for a pretty decently bad physical abuse case. It has an unhealthy amount of bugs (likely cockroaches) in it. But the system likely has the abuse on it so their is a need to examine it. What is the best way to proceed without infesting the office? In previous cases, we would clean out dead bugs but after 3 weeks we found some live ones when we went to hook it up. (edited)
🤮 2
🤢 1
7:05 AM
🤢 🤮
Avatar
Avatar
kmacdonald1565
Sorry for a gross question on a Monday morning.......We have a DVR for a pretty decently bad physical abuse case. It has an unhealthy amount of bugs (likely cockroaches) in it. But the system likely has the abuse on it so their is a need to examine it. What is the best way to proceed without infesting the office? In previous cases, we would clean out dead bugs but after 3 weeks we found some live ones when we went to hook it up. (edited)
pass it on to the newest member of staff to examine.
😂 7
😆 1
Avatar
kmacdonald1565 3/1/2021 10:19 AM
just an update, we are probably going with a "roach motel" type killer and just throwing a couple of in the bag and sealing it back up. then doing this:
😆 4
10:19 AM
Avatar
deepdive4n6 3/1/2021 5:10 PM
@kmacdonald1565 I’ve used drying ovens in our regular forensics lab to kill bedbugs in devices. 120F = hot enough to kill them, but not hot enough to damage electronics. (edited)
5:13 PM
Google says cockroaches need 150F. I doubt that’s hot enough to damage a DVR or PC.
5:16 PM
For both, it’ll take 2-3 hours at that temp to kill the live bugs and their eggs.
👍 2
Avatar
Digitalferret 3/2/2021 1:55 AM
^ folks, with any sort of bugs, often forget there's usually more eggs than crawling critters. why do i have a picture of the Alien franchise films in my head now? 🙂
Avatar
Artemisia (They / Them) 3/2/2021 5:06 AM
Hey everyone. We have just started using Cellebrite as a secondary tool. Some of our analysts are having trouble using XRY since installing Cellebrite. Specifically XRY is not recognising any devices (SIM cards, phones etc.). It sounds like a driver conflict where Cellebrite is blocking XRY's USB drivers, but we have not yet found a fix. Any help would be greatly appreciated! Thank you :)
Avatar
Avatar
Artemisia (They / Them)
Hey everyone. We have just started using Cellebrite as a secondary tool. Some of our analysts are having trouble using XRY since installing Cellebrite. Specifically XRY is not recognising any devices (SIM cards, phones etc.). It sounds like a driver conflict where Cellebrite is blocking XRY's USB drivers, but we have not yet found a fix. Any help would be greatly appreciated! Thank you :)
Andrew Rathbun 3/2/2021 5:07 AM
It's been a few years, but isn't there an option with XRY during setup where you can choose to use only their drivers while using XRY and not universally? Maybe that's something worth looking into further.
Avatar
There is
Avatar
Artemisia (They / Them) 3/2/2021 5:09 AM
@Andrew Rathbun I will double check if that is the issue! Thank you for the swift reply
Avatar
I believe the recommended option is only using their drivers when in use.
Avatar
@Artemisia (They / Them) I think XRY and UFED work fairly okay on the same PC now but if any issues I would advise to repair the MSAB Drivers part of the installation after installing the second tool
Avatar
Physical Analyzer 7.43 is out cellebrite
cellebrite 1
👍 1
Avatar
When 4PC...
Avatar
Any Griffeye wizards online? I want to import hashes from one Griffeye to another to save grading time Thanks!
Avatar
Avatar
King Pepsi
Any Griffeye wizards online? I want to import hashes from one Griffeye to another to save grading time Thanks!
Just note you won't be able to upload to CAID if you do that.
12:21 AM
But I'll pm you how to do it (edited)
Avatar
Thanks!
Avatar
@Magnet Forensics Anyone online for a quick question regarding an AXIOM feature? (edited)
Avatar
MF-cbryant 3/3/2021 3:42 AM
Yep. Will shoot you a DM.
👍 1
magnetforensics 1
Avatar
Hi all. Anyone come across an issue where FTK just stalls? I have a coworker who is running 7.4 and every time he begins processing, it says it's queued. He has uninstalled and reinstalled as well as run updates on his machine.
Avatar
Jamiepenguins 3/3/2021 8:32 PM
Does anyone know good resources to learn digital forensics? I’m new to this field and I have limited programming experience
Avatar
Avatar
Jamiepenguins
Does anyone know good resources to learn digital forensics? I’m new to this field and I have limited programming experience
Avatar
Jamiepenguins 3/3/2021 8:33 PM
Thank you
👍 1
Avatar
Has anyone examined 3D printers and the logs exported from them? The exported logs contain all the positional data about the 3d build, do you know if it's possible to recreate the item from these logs. A bit vague question I know, just starting a bit of research on this.
Avatar
Can anyone recommend a few good books on forensics for Linux?
Avatar
Avatar
akula109
Can anyone recommend a few good books on forensics for Linux?
Andrew Rathbun 3/4/2021 5:13 AM
Have you tried LinuxLEO? @LinuxLEO
Avatar
¥SavKenpachi¥ 3/4/2021 5:42 AM
In order to obtain account holder information from cash app/squares inc, is a subpoena sufficient or is a search warrant required?
Avatar
Avatar
¥SavKenpachi¥
In order to obtain account holder information from cash app/squares inc, is a subpoena sufficient or is a search warrant required?
spicy_caveman 3/4/2021 6:40 AM
Subpoenas will usually give you the account number, owner information, phone numbers/ email, and statements.
Avatar
Avatar
¥SavKenpachi¥
In order to obtain account holder information from cash app/squares inc, is a subpoena sufficient or is a search warrant required?
spicy_caveman 3/4/2021 6:41 AM
both CashApp and Square have been- in my experience- a pain in the ass to get anything back within the year.
Avatar
Avatar
spicy_caveman
both CashApp and Square have been- in my experience- a pain in the ass to get anything back within the year.
¥SavKenpachi¥ 3/4/2021 6:41 AM
Lol. Thxs
Avatar
@akula109 The LinuxLEO guide is more of a beginner's guide to Linux as a forensic platform rather than Linux as a target. If you're looking to use linux to do an analysis, look at LinuxLEO. If you're looking to examine a Linux system as a target, then I'd suggest "Linux Forensics" by Philip Polstra as a good starting point. https://www.amazon.com/Linux-Forensics-Philip-Polstra/dp/1515037630
Avatar
@5cary thanks, the book by polstra is the starting point I'm looking for. Tons of Linux tools for window's forensics. I'm looking for Linux artifacts and how to find them.
Avatar
Anyone mess with a Vizio Smart TV with Chromecast? Trying to figure out what best way to examine it. Manual review or other like ISP or chip off?
Avatar
Avatar
akula109
@5cary thanks, the book by polstra is the starting point I'm looking for. Tons of Linux tools for window's forensics. I'm looking for Linux artifacts and how to find them.
if you are looking for a tool/script to acquire Linux artifacts -> https://github.com/tclahr/uac
UAC (Unix-like Artifacts Collector) is a Live Response collection tool for Incident Reponse that makes use of built-in tools to automate the collection of Unix-like systems artifacts. Supported sys...
this 1
Avatar
@tclahr thanks, I'm adding that to my notes
Avatar
So I'm currently doing Digital Forensics in university and we are required to analyse an email header and when analysing I'm only able to find a Private IP address or Microsoft IP. Does anyone have any ideas how I'd be able to find where about the email originated from?
8:42 AM
I also assume if the email was forwarded from another email, the In-Reply-To would be the origin email address?
8:46 AM
I guess in this scenario given, the email has been sent from their college email to their personal; so therefore it looks as if it's been originated from the college.
8:47 AM
I think I've actually managed to figure it out though facepalm
Avatar
Avatar
Jack
So I'm currently doing Digital Forensics in university and we are required to analyse an email header and when analysing I'm only able to find a Private IP address or Microsoft IP. Does anyone have any ideas how I'd be able to find where about the email originated from?
randomaccess 3/4/2021 1:39 PM
if there's an X-Originating-IP address that's a good win for the IP of the sender. Otherwise the first received header can give you a rough idea (caveat, dont assume always)
1:39 PM
I'd suggest watching the two recent workshops by @Metaspike covering their walkthrough of the CTF
👍 2
🙌 1
Avatar
Are they any NSA employee please DM me.
Avatar
Avatar
randomaccess
if there's an X-Originating-IP address that's a good win for the IP of the sender. Otherwise the first received header can give you a rough idea (caveat, dont assume always)
Thank you so much 🙏
Avatar
randomaccess 3/4/2021 5:01 PM
Arman just posted the video in #computer-forensics too
Avatar
Avatar
randomaccess
if there's an X-Originating-IP address that's a good win for the IP of the sender. Otherwise the first received header can give you a rough idea (caveat, dont assume always)
thatboy_leo 3/4/2021 5:43 PM
Any chance X-originating-ip could be vpn? Only tool I use to check if ip is vpn is ipabuse
Avatar
randomaccess 3/4/2021 5:45 PM
absolutely could be a VPN. There's a few places you can go to check out an IP; some VPN providers publish their ranges (yay google), otherwise shodan or centralops or VT may give you clues
Avatar
Avatar
randomaccess
absolutely could be a VPN. There's a few places you can go to check out an IP; some VPN providers publish their ranges (yay google), otherwise shodan or centralops or VT may give you clues
thatboy_leo 3/4/2021 5:46 PM
Cheers, I’ll give it a try tomorrow 👍🏼
Avatar
Avatar
CCNA
Are they any NSA employee please DM me.
Joe Schmoe 3/4/2021 5:48 PM
If they DM’d you, they’d have to kill you.
🤣 3
😆 1
Avatar
randomaccess 3/4/2021 5:58 PM
😄 4
Avatar
@Joe Schmoe what do you mean
Avatar
Avatar
CCNA
@Joe Schmoe what do you mean
Joe Schmoe 3/4/2021 6:09 PM
Bad joke I guess
😆 5
6:09 PM
Definition of I could tell you, but then I'd have to kill you in the Idioms Dictionary by The Free Dictionary
Avatar
Does anybody recognize the format of this "hash value"? This is what was sent to me from a CyberTip: 0d9f08617a3407dbca3812ac1b5036c7-eb2ca9134391079
11:37 AM
The first part looks like an MD5
Avatar
Avatar
Cole
Does anybody recognize the format of this "hash value"? This is what was sent to me from a CyberTip: 0d9f08617a3407dbca3812ac1b5036c7-eb2ca9134391079
Salted MD5?
Avatar
Hi I have a friend that allegedly got scamed by a trading company with a website that I can't make out if it's a real investment company or not - would someone be able to help with some intel to see if this company is real? A lot of money was involved It's called Druid ICAV and the alleged website is druidicav[.]com
Avatar
@h4sh if he's lost a lot of money then he should report it to authorities? Stop other people being scammed too
Avatar
Avatar
JMK
@h4sh if he's lost a lot of money then he should report it to authorities? Stop other people being scammed too
yes - reports have been made to authorities. Its just that I can appreciate some intel, since my OSINT work was insufficient to determine whether or not the domain is fraudulent
Avatar
Ah I see, I'd probably have a try in the #osint channel
👍 1
1:50 AM
Triage is going to be more important moving forward
Avatar
Avatar
Andronidas
Salted MD5?
That's what I was thinking too but that's intriguing for an image file. Isn't that usually used for passwords?
Avatar
Thats unbelievable. Two actuator arms?? Who woulda thought!? Luckily though most people hardly use any space on their 1TB hdd that came with their laptop from 10 years ago. Most regular people are using mobile+cloud to store data, at least the data I need to look at.
Avatar
PhrostByte 3/8/2021 8:02 AM
Linux LEO
Avatar
@PhrostByte Is that a statement, question, or challenge? 🙂
Avatar
Avatar
Andronidas
Salted MD5?
Figured it out. It was a Google file name. Looks like Google prepends a unique ID on top of the original file name with the OG file name after the - .
Avatar
Dear people, I am trying to build a response-kit to grab and go to a medium sized company to do various types of extractions on the spot - what should go into this bag?
12:21 AM
I have a TX-1 and a UFED Touch, I thought of spare harddisks, Faraday-bags, evidence bags and paperwork
12:25 AM
some thumb drives with live systems
Avatar
Avatar
Luci
Dear people, I am trying to build a response-kit to grab and go to a medium sized company to do various types of extractions on the spot - what should go into this bag?
Digitalferret 3/9/2021 12:55 AM
covertly, ie computer in situ and employee in the dark, or properly seized / quarantined?
Avatar
Avatar
Digitalferret
covertly, ie computer in situ and employee in the dark, or properly seized / quarantined?
As of right now I can only see properly seized / quarantined happening, but I'd be interesed in what woulöd be the difference
Avatar
Digitalferret 3/9/2021 12:58 AM
take a camera either way. covert, the computer area and office furniture need to look untouched. record everything to replace accurately. i read someplace a guy carries a bag of PC fluff/dust just in case 🙂
12:59 AM
camera can save a lot of note-taking on serials, tech detail etc (edited)
1:01 AM
even on domestic IT i'll take a pic of cables and connections, bc some point later the owner, having kicked it all under a desk, won't know which cable came from where
Avatar
I see yeah this makes sense, I'd take a camera in any case
1:06 AM
photo doc is everything 😄
Avatar
Digitalferret 3/9/2021 1:15 AM
yup. can't go back in time to find that detail you missed.(hangover from Uni and Lab work. get as much info as possible in the time allowed, you can work on it later)
Avatar
@Luci small toolkit for disassembly.
Avatar
covert extraction tip - reduce the brightness or cover the UFED Touch when doing an extraction - few times I forgot when on site and lit the whole room up like a lighthouse 😄
Avatar
Avatar
Ghost
covert extraction tip - reduce the brightness or cover the UFED Touch when doing an extraction - few times I forgot when on site and lit the whole room up like a lighthouse 😄
lol
Avatar
Law enforcement agencies from the Netherlands and Belgium have shut down today Sky ECC, a company that provided a secure encrypted messaging platform to criminals organizations across the world.
🕵️‍♂️ 5
🦾 1
Avatar
Maybe a bit of a different question... I have a case that has been adjudicated and phones that belong to victim family to return. Phones contain CSAM in various databases based on my previous downloads. I want to wipe the phones and give them back to victims but iOS now wants phone passcode, screen time passcode and iTunes account passcode to wipe. I have one or two of the three passcodes required and I’m trying to just get the phones wiped to give them back. Do I need to wait until they reset all their stuff (which will probably require me walking them through the process) or is there a way to wipe the phone using checkra1n or something?
👀 1
Avatar
enter-serwis.com 3/9/2021 10:40 PM
Hello, Which drive will be the best and least fail safe for data storage in your opinion?
Avatar
Avatar
enter-serwis.com
Hello, Which drive will be the best and least fail safe for data storage in your opinion?
Digitalferret 3/10/2021 12:34 AM
Hard Drive test data from the Backblaze data center. Backblaze is affordable, easy-to-use cloud storage.
12:35 AM
generally i grab WD for HDD, Samsung Evo /NVMe for SSD (edited)
Avatar
Avatar
whee30
Maybe a bit of a different question... I have a case that has been adjudicated and phones that belong to victim family to return. Phones contain CSAM in various databases based on my previous downloads. I want to wipe the phones and give them back to victims but iOS now wants phone passcode, screen time passcode and iTunes account passcode to wipe. I have one or two of the three passcodes required and I’m trying to just get the phones wiped to give them back. Do I need to wait until they reset all their stuff (which will probably require me walking them through the process) or is there a way to wipe the phone using checkra1n or something?
I'm always nervous to give back devices on CSAM cases for this exact reason...but, I also hear the argument of "why wipe an iOS device? chances are good they'll restore from iCloud and CSAM will be right back on the device, so you might as well give it to them". Not saying I agree with that argument, but it is an interesting point.
Avatar
TryCatchHCF 3/10/2021 1:58 PM
NEW: A working RCE PoC was released today for the Microsoft Exchange ProxyLogon vulnerabilities https://t.co/UmOT5tnIhV
Avatar
Avatar
chrismyers
I'm always nervous to give back devices on CSAM cases for this exact reason...but, I also hear the argument of "why wipe an iOS device? chances are good they'll restore from iCloud and CSAM will be right back on the device, so you might as well give it to them". Not saying I agree with that argument, but it is an interesting point.
We ended up resetting enough passwords that the devices could be wiped. The devices went back to victims, not suspects and I’m confident they’re “clean” now given the file based encryption coupled with a factory reset. iCloud was purged a long time ago.
👍 2
Avatar
justan_obody 3/10/2021 5:05 PM
hello! is there a good channel to ask about a vendor?
Avatar
Avatar
justan_obody
hello! is there a good channel to ask about a vendor?
Andrew Rathbun 3/10/2021 5:18 PM
Which vendor? Just ping them
5:18 PM
This is insane. Really technical article.
😮 1
Avatar
Avatar
Andrew Rathbun
Which vendor? Just ping them
justan_obody 3/10/2021 5:25 PM
Hey fellow FOR508 CTF team member! I wanted to get feedback on a vendor, and not from the vendor. I have a client asking what I know about them.
💯 1
Avatar
Avatar
justan_obody
Hey fellow FOR508 CTF team member! I wanted to get feedback on a vendor, and not from the vendor. I have a client asking what I know about them.
Andrew Rathbun 3/10/2021 5:30 PM
Why hello there! Glad to see you around here. Hope you're enjoying your stay.
5:31 PM
I'd say just ask your question in the open and people will answer openly or message you in private
5:31 PM
"Hey if anyone has any experience with XYZ vendor, can you please message me or respond in channel" Something like that has been done plenty of times
Avatar
justan_obody 3/10/2021 5:32 PM
ah ok. i wasn't sure if that was frowned upon, and/or had a channel more for that kind of thing Ill need to take part in this discord server more. tons of great info.
Avatar
Andrew Rathbun 3/10/2021 5:33 PM
Just be professional in your approach and pretty much anything is fair game
Avatar
justan_obody 3/10/2021 5:40 PM
Thanks. Here goes. Does anyone use Cynet as an MSSP or use them as a direct customer? What do you like / dislike? How do they compare to other MDR vendors like KROLL, ReconInfosec, Red Canary, Crowdstrike Complete, etc? I cannot seem to find any articles or videos of people using the product for IR/MDR or reviewing it as a customer. I only find marketing material. My preference would be to steer the client towards my own service for MDR (we use crowdstrike as an MSSP/IR) but I want to be fair to Cynet since they somehow ended up on my customers radar. Please feel free to send me a DM or reply with any information you might have. Thank you for your time!
Avatar
Avatar
whee30
We ended up resetting enough passwords that the devices could be wiped. The devices went back to victims, not suspects and I’m confident they’re “clean” now given the file based encryption coupled with a factory reset. iCloud was purged a long time ago.
Thanks for sharing your process. I recently returned an Android phone that originally had CSAM. I did multiple factory resets and recorded video until the internal memory was full in-between resets. I went a little overboard but its better to be safe than sorry. Its good to know what is needed for returning a former CASM iPhone because I have a feeling I will be getting one of those here soon. (edited)
Avatar
Hi folks, I'm into sans SEC 543 how many hours do I need to complete a sans certification?
Avatar
Anyone have an Apple iCloud preservation letter they are willing to share with me.
Avatar
Avatar
CCNA
Hi folks, I'm into sans SEC 543 how many hours do I need to complete a sans certification?
Andrew Rathbun 3/11/2021 6:33 PM
#training-education-employment
Avatar
Does anyone have any LE policies/procedures for when defense experts come to review CSAM?
Avatar
Avatar
zotl54321
Does anyone have any LE policies/procedures for when defense experts come to review CSAM?
We don’t have anything on paper, but our Local ICAC Task Force has a dedicated office that defense’s expert can use. We station a detective outside the office, defense can take as long as they want. Evidence is taken and secured in a different room at the end of each day by the detective.
Avatar
Avatar
Luci
lol
spicy_caveman 3/13/2021 5:28 AM
Streamlight makes a nice rechargeable pen light. It can clip in most larger pen slots. You will probably find a need for a small flashlight. Small stash of nitrile gloves. Using a host computer or mobile device on site to triage for seizure... need to protect your hands. Pre cut toe tags with wire for inventory. Sharpies.
Avatar
Avatar
zotl54321
Does anyone have any LE policies/procedures for when defense experts come to review CSAM?
spicy_caveman 3/13/2021 5:35 AM
The district attorneys will get the request and then we schedule a conference. If defense wants to bring a forensic analysis to dump the device to check how it was processed. We put all devices in a conference room. With an evidence tech and our guy next to him while he does it. Then they leave and evidence is placed back in vaults.
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 3/13/2021 7:49 AM
#training-education-employment
Avatar
Deleted User 3/14/2021 7:02 AM
Hello everyone, I'm currently doing the ACT1 from DeterLAB. I'm not sure if any of you know about it. But in the scenario they say there was an Internet Spike at 4AM. However, when I look to the system, I think I know where it comes from but I don't seem to find any useful information on the syslog to prove it. I mean, I have found the crontab file, and the command with the string format to prove it. But, nothing in the logs about it I instead see this : syslog:Jan 4 08:56:07 server crontab[2501]: (kevin) LIST (kevin) syslog:Jan 4 08:56:07 server crontab[2505]: (kevin) REPLACE (kevin) syslog:Jan 4 08:56:07 server crontab[2506]: (kevin) LIST (kevin) (edited)
7:02 AM
does anyone know what they mean? And why there are no logs about crontab at 4AM when it got activated?
Avatar
Sorry, I am new here but why do you relate internet spike to Cron?
Avatar
Also you can check further on what user Kevin was running. Crontab -l Kevin I think
Avatar
Deleted User 3/15/2021 2:59 AM
Because he automated an rsync between a remote pc to the university server with cron. He uploaded music files on the server from his pc
3:01 AM
And I think they (the university) considered this weird that it happened at 4am, and they suspected it was a worm at first
3:04 AM
But then the only evidence that it tells me it got configured at 4AM by this “kevin” was when checking the bash history of his account. And checking his cronjob file in /spool/crontab/, where we can see the specific command with rsync
3:05 AM
And couldn’t find other evidence to prove more it’s him. As I didn’t find any other 4am data in syslog, or auth.log etc.
3:07 AM
To prove there were no malware on the disk, I had to do an antivirus scan on the whole disk with ClamAV. But not sure if it’s a standard tool in digital forensics. If anyone can let me know (edited)
Avatar
20 years of law enforcement has culminated in me looking at anime furry porn at eight in the morning to start off my week. **** my life.
😂 4
Avatar
@Magnet Forensics Anyone able to pop up in DM for a quick query?
Avatar
@MSAB Adam The SIM card is locked. I have the PUK code, but I can't extract it in XRY. Any way to overcome this?
Avatar
sure@3X3 Feel free to DM me
magnetforensics 1
Avatar
@Deleted User did you check "sar -n DEV" This provides traffic details if sysstat was deployed on the system.
Avatar
Hi Everyone! "Long-time listener, first-time caller" 🙂 We have a case with 29 iPhones/iPads that need to be reviewed, that range between 64GB and 256GB. We extracted them with Cellebrite (which took several days, per phone). We're using UFED Reader but the larger devices can take an hour+ to load. We're going to evaluate other tools but I would like to hear what experiences you've had with tools to examine mobile devices, from a performance and usability standpoint. Extra points for tools that allow you to create a portable case that can be reviewed without a dongle. Message me directly or post to the channel. Also, apologies if this should be posted to a different channel.
Avatar
@Carlos Mobile decoding might be more suited, but it depends what you are after. For a quick triage Ileapp could be of great help. Its Open source, "owner" is @Brigs .
Avatar
@florus I thought about that but this isn't a triage situation. They need to be reviewed for evidence. Thanks for the suggestion!
Avatar
Avatar
Carlos
Hi Everyone! "Long-time listener, first-time caller" 🙂 We have a case with 29 iPhones/iPads that need to be reviewed, that range between 64GB and 256GB. We extracted them with Cellebrite (which took several days, per phone). We're using UFED Reader but the larger devices can take an hour+ to load. We're going to evaluate other tools but I would like to hear what experiences you've had with tools to examine mobile devices, from a performance and usability standpoint. Extra points for tools that allow you to create a portable case that can be reviewed without a dongle. Message me directly or post to the channel. Also, apologies if this should be posted to a different channel.
@Cellebrite ‘s Pathfinder might be an option. You probably can’t get around the time it’s going to take in extracting and loading the data to parse through everything. Pathfinder can help you manage the large amount of data your going to have to go through. Worth a look.
Avatar
@Carlos MSAB XRY creates files that natively can be opened by their free software.
Avatar
@Carlos Magnet AXIOM portable case is also able to run without a license afaik. Axiom also parses a bit more data when it comes to iOS than UFED, depending on what data is interesting for the case of course. From what i've seen a portable cases open quicker than UFED reader files as well.
magnetforensics_alt 2
Avatar
Anyone know how i access the activity log on X-Ways Forensics? I've found the msglog.txt but i was under the impression there was a more extensive log of all the activity.
Avatar
@Majeeko When you create a Case report you can choose "output activity log". Case report is created under Case Data > File > Create Report
Avatar
@Oscar Thank you
Avatar
Avatar
Carlos
Hi Everyone! "Long-time listener, first-time caller" 🙂 We have a case with 29 iPhones/iPads that need to be reviewed, that range between 64GB and 256GB. We extracted them with Cellebrite (which took several days, per phone). We're using UFED Reader but the larger devices can take an hour+ to load. We're going to evaluate other tools but I would like to hear what experiences you've had with tools to examine mobile devices, from a performance and usability standpoint. Extra points for tools that allow you to create a portable case that can be reviewed without a dongle. Message me directly or post to the channel. Also, apologies if this should be posted to a different channel.
Like others have suggested, XRY, Axiom, and I would also suggest Oxygen. Cellebrite, unfortunately, seems behind the times with how poorly the software works for large extractions. Its really unfortunate that the software performs so bad because the results are quite good. I never see it use more than a a couple CPU cores and hardly any RAM.
Avatar
Avatar
Carlos
Hi Everyone! "Long-time listener, first-time caller" 🙂 We have a case with 29 iPhones/iPads that need to be reviewed, that range between 64GB and 256GB. We extracted them with Cellebrite (which took several days, per phone). We're using UFED Reader but the larger devices can take an hour+ to load. We're going to evaluate other tools but I would like to hear what experiences you've had with tools to examine mobile devices, from a performance and usability standpoint. Extra points for tools that allow you to create a portable case that can be reviewed without a dongle. Message me directly or post to the channel. Also, apologies if this should be posted to a different channel.
XRY, Axiom and Cellebrite can all give you a portable case style report that doesn't need a license dongle to open. We use mainly Axiom or Cellebrite PA to analyse our GK extractions. Have found PA to be a lot quicker and our officers reviewing much prefer the layout; easier to view evidence and tag and it seems to be more stable for us. We recently did some revalidation work and PA came out slightly better for what it decoded, but it was close between it and Axiom. As with all things tho everyone has their personal preference I'm sure!
Avatar
@Law Enforcement [Canada] @Law Enforcement [USA] We have a lady that was scammed out of 30K cash, calls come out of Rogers Wireless in Canada. Has any US Law Enforcement been able to get Rogers out of Canada to produce some records without doing a MLAT? PM me if you have info thanks.
Avatar
@DCSO They don't respond to US warrants. Reach out to a RCMP Liaison Officer by calling any Canadian embassy, should be able to get you in touch with an LO. More than likely an MLAT
Avatar
@Sky831 That's what i'm afraid of, UGH MLAT's are a pain in the rear
Avatar
@DCSO Doesn't sound worth it for 30k. And more than likely your victim "fell" for a scam im guessing?
Avatar
@Sky831 Yeppers
Avatar
Avatar
Carlos
Hi Everyone! "Long-time listener, first-time caller" 🙂 We have a case with 29 iPhones/iPads that need to be reviewed, that range between 64GB and 256GB. We extracted them with Cellebrite (which took several days, per phone). We're using UFED Reader but the larger devices can take an hour+ to load. We're going to evaluate other tools but I would like to hear what experiences you've had with tools to examine mobile devices, from a performance and usability standpoint. Extra points for tools that allow you to create a portable case that can be reviewed without a dongle. Message me directly or post to the channel. Also, apologies if this should be posted to a different channel.
Sounds like you might have an issue with your forensic machines. An iPhone rip might take an hour but not an entire day per phone. As for the loading, axiom does a great job takes about as long as cellebrite but you only have to parse it once then open the case later with almost instant access to the data. I use magnet and cellebrite for my iPhone cases. I prefer cellebrite on some things but loading and multiple devices wise axiom always wins that fight.
Avatar
saltshaiker 3/16/2021 6:41 PM
I'm working on a presentation for my DF course, and was wondering if anyone has any information/resources on how GDPR has changed how DF investigations are conducted? Also curious to see how the investigative process may differ between countries. I'm reading through some papers and articles at the moment, but if any of y'all have any experience or information to share about its impact, I'd greatly appreciate it :) (edited)
Avatar
Avatar
DCSO
@Law Enforcement [Canada] @Law Enforcement [USA] We have a lady that was scammed out of 30K cash, calls come out of Rogers Wireless in Canada. Has any US Law Enforcement been able to get Rogers out of Canada to produce some records without doing a MLAT? PM me if you have info thanks.
Dm me. I have some contacts in the RCMP cyber centre. Not sure if it falls under them but might be a decent place to start.
👍 1
Avatar
Any UK folks know any good suppliers for anti-static mats? Floor ones and desk ones. Thanks in advance! (edited)
Avatar
Hi everyone, I want to ask what's the difference between Duplicators and Forensic Bridges? Is it possible to use only the Duplicator to do imaging or the Forensic Bridges are neccessary as well? Thank you!
Avatar
randomaccess 3/17/2021 3:35 AM
@navant can't really do a triage examination with the duplicator without doing a collection first. If I wanted to get answers quickly id plug the drive in via the bridge or write blocker, take a quick triage dump, and then work on that while imaging.
Avatar
Avatar
navant
Hi everyone, I want to ask what's the difference between Duplicators and Forensic Bridges? Is it possible to use only the Duplicator to do imaging or the Forensic Bridges are neccessary as well? Thank you!
Further to what @randomaccess has said. Not all duplicators are write blocked. Forensic bridges main purpose is that they are forensically sound (are write blocked by default) to ensure data integrity (no data is changed whilst imaging). As mentioned previously, it's not really viable to triage with a duplicator, especially if it's not write blocked. If you want to triage you'd use a Forensic Bridge and in any case, I'd usually stick to Forensic Bridges when imaging too, unless there's a hardware write block on the duplicator. (edited)
Avatar
randomaccess 3/17/2021 3:39 AM
I mean, if you're getting a forensic duplicator like a td1 or Falcon then itll be write blocked. But just depends on how much imaging you do and whether it's worth the cost
👍 1
3:40 AM
You could also invest in a software write blocker like safeblock and go that route
Avatar
Avatar
randomaccess
You could also invest in a software write blocker like safeblock and go that route
Just to play devils advocate, software write blockers are good on occasion, however, if for any reason they fail to start on boot, or crash without a user noticing, there's a risk of data alteration. Best practice would always be a hardware write blocked device.
Avatar
randomaccess 3/17/2021 3:42 AM
My preference is to have a hardware write blocker. But they similarly can fail in the same way. For ex if someone uses a yellow tableau/weibetrch and forgets to turn it onto write mode. Or someone flips the dip switches on a standard tableau
👍 1
3:43 AM
I'm not sure what would happen if it crashes after the drive has been connected
3:43 AM
Because I don't understand enough about how their custom drivers work
Avatar
You're entirely correct. We always keep all write blockers intact with the tamper proof cover so there is no way to change the write blocking off with the switch.
Avatar
So the best practice would be connecting the drive to the bridge then to the duplicator for imaging? And for triage would be using the bridge?
Avatar
randomaccess 3/17/2021 4:31 AM
Best practice isn't really the right term
4:32 AM
Some of this is entirely dependant on the situation
4:33 AM
I don't have a duplicator. So I use the write blocker that I do have
4:33 AM
If the computer comes in at 5pm. Well it's going to image overnight so I don't really need to take a triage image to work on while it's imaging
4:34 AM
Others have various prebuilt processes so they will need a forensic image to go through those. For example you can image and process, then match against hashsets and do other classifications
4:35 AM
I'm sure duplicators such as the td1 have the ability to collect triage data sets but I don't have that so I use KAPE and my write blocker
Avatar
I see, thank you very much!
Avatar
Avatar
randomaccess
I'm sure duplicators such as the td1 have the ability to collect triage data sets but I don't have that so I use KAPE and my write blocker
TD1, no. TD3 and TX1, yes. You can connect a duplicator to a host computer using a network cable and do anything over iSCSI.
5:35 AM
Also, you can ship a duplicator to a remote location and access it remotely (if there is IT staff to configure some port forwarding).
Avatar
Avatar
3X3
Just to play devils advocate, software write blockers are good on occasion, however, if for any reason they fail to start on boot, or crash without a user noticing, there's a risk of data alteration. Best practice would always be a hardware write blocked device.
Some hardware write blockers are just Linux machines. You have custom hardware, but it's Linux inside. (Other hardware write blockers aren't, they run custom SATA/PATA-to-USB firmware, no Linux.)
5:41 AM
Also, let me remind you of TD3 with no write blocking at all. More than 4 years ago I discovered an issue with writes going through a write blocked port, but there is no fix. My original report got silently ignored. My further attempts to reach them were unsuccessful too.
Avatar
Avatar
Mr. F.
Also, let me remind you of TD3 with no write blocking at all. More than 4 years ago I discovered an issue with writes going through a write blocked port, but there is no fix. My original report got silently ignored. My further attempts to reach them were unsuccessful too.
Digitalferret 3/17/2021 6:06 AM
confirmation, if any was needed, that folks should test tools as rigorously as time allows; accept nothing at face value. I've worked in a business, MilSpec, which turned a blind eye to reported problems with devices because one doesn't want to slow production and thus lose profit. not this one, but its along the same lines. even when lives are at risk. https://www.theguardian.com/uk/2013/may/02/fake-bomb-detector-conman-jailed
James McCormick, who sold more than £55m worth of fake detectors likely to have caused Iraqi deaths, jailed for 10 years
Avatar
Avatar
Mr. F.
TD1, no. TD3 and TX1, yes. You can connect a duplicator to a host computer using a network cable and do anything over iSCSI.
randomaccess 3/17/2021 8:51 AM
Whoops. Every reference I made to td1 was meant to be tx1. Got naming confused.
Avatar
the device time doesn't match with real time. when loaded in Cellebrite, are the parsed being adjust or do i need to convert them?
Avatar
@Law Enforcement [USA] @FullTang Does anyone know if Google will respond to legal process referencing a Google account by the 8-byte Android ID that Kik provides in their subpoena responsive data? (I.e. the line in the Kik subscriber PDF that reads "<DATE> REGISTRATION_CLIENT_INFO android-id=78100cf2486578a8" -- I made up the android-id in this example)
Avatar
lxwarhammerxl 3/17/2021 12:02 PM
At one point in time those IDs did NOT match up. I know that kik has undergone some changes so I'm not sure atm. Google CAN provide subscriber information based on a android ID though.
👍 1
Avatar
Avatar
TheDale432
@Law Enforcement [USA] @FullTang Does anyone know if Google will respond to legal process referencing a Google account by the 8-byte Android ID that Kik provides in their subpoena responsive data? (I.e. the line in the Kik subscriber PDF that reads "<DATE> REGISTRATION_CLIENT_INFO android-id=78100cf2486578a8" -- I made up the android-id in this example)
I have not served them to identify with that information. However, I did ask Kik about the android id as reported on their returns, (edited)
12:05 PM
and I got this response.
Avatar
Avatar
FullTang
and I got this response.
So perhaps the android-id reported by Kik is not specific/unique to that device via Google, but is specific/unique to that account via Kik?
Avatar
Just know that the device reported Android ID will not match with the Kik reported android ID. Espeically if the device is running Android 8 or higher.
12:09 PM
Kik uses the term "Android ID" just like Google does, but it is not the same Android ID. Even if it was, it would be different than what Google uses for Devices running Android 8 or higher.
12:09 PM
"For apps installed on a device running Android 8.0, the value of ANDROID_ID is now scoped per app signing key, as well as per user. The value of ANDROID_ID is unique for each combination of app-signing key, user, and device. As a result, apps with different signing keys running on the same device no longer see the same Android ID (even for the same user)." (Taken from https://developer.android.com/about/versions/oreo/android-8.0-changes)
👍 2
Avatar
Avatar
FullTang
"For apps installed on a device running Android 8.0, the value of ANDROID_ID is now scoped per app signing key, as well as per user. The value of ANDROID_ID is unique for each combination of app-signing key, user, and device. As a result, apps with different signing keys running on the same device no longer see the same Android ID (even for the same user)." (Taken from https://developer.android.com/about/versions/oreo/android-8.0-changes)
This makes sense. Thank you!
👍 1
Avatar
Anyone know what -3333 or -xxxx means on Sprint CDR records
Avatar
@Magnet Forensics I need a renewal quote on my NCFI dongle. Can someone private message me. My dongle expires in November and I would like to get the process started asap with my agency.
Avatar
DM'ing you now @dfir_rick
Avatar
Deleted User 3/18/2021 2:05 AM
I had 2 iPhones now where I cant remove PIN code. The phones are in flightmode. Is there a new feature on iOS that phones most be connected to iCloud or something if I wanna remove code?
Avatar
Avatar
Deleted User
I had 2 iPhones now where I cant remove PIN code. The phones are in flightmode. Is there a new feature on iOS that phones most be connected to iCloud or something if I wanna remove code?
MDM?
👍 1
Avatar
@Deleted User i read someone from clb answer that Apple pay might prevent that? (Edit: search for Apple pay in mobile extraction, 6 days ago) (edited)
👍 2
Avatar
Deleted User 3/18/2021 5:27 AM
@AmNe5iA @florus Thank you guys!! There was no MDM but disable apple pay worked 😄
Avatar
@Deleted User Nice, good to know. Thanks @CLB-Paul for the tip.
Salute 1
Avatar
Avatar
Deleted User
@AmNe5iA @florus Thank you guys!! There was no MDM but disable apple pay worked 😄
Just wondering, why do you want /need to remove the PIN codes?
Avatar
Deleted User 3/18/2021 5:52 AM
@AmNe5iA It needs to be removed on iPhone 8 and iPhone X with iOS 14 when using checkm8 exploit in Ufed 4pc
👍 1
5:53 AM
Or at least they recommend you to remove pin or something. Dont have 4pc here right now so I cant check 🙂
Avatar
Avatar
Deleted User
@AmNe5iA It needs to be removed on iPhone 8 and iPhone X with iOS 14 when using checkm8 exploit in Ufed 4pc
DeeFIR 🇦🇺 3/18/2021 6:00 AM
Do you mean iOS 14 or 14.4?
Avatar
Deleted User 3/18/2021 6:00 AM
Im not sure what iOS versions. But I think its iPhone 8 and X
Avatar
Avatar
AmNe5iA
Just wondering, why do you want /need to remove the PIN codes?
DeeFIR 🇦🇺 3/18/2021 6:01 AM
One of the software mitigations Apple implemented was to cause a kernel panic, so the exploit isn’t effective in 14.4
👍 1
Avatar
The passcode thing should be for iOS 14 as a whole for iPhone 8 and up. From the checkra1n crew: In iOS 14, Apple added a new mitigation to SEPOS on A10 and above (except on Apple TVs and iBridge): if the device was booted from DFU mode and the Secure Enclave receives a request to decrypt user data, it will panic the device. (edited)
👍 2
Avatar
From the checkra.in website : A11 devices on iOS 14.0 and above require removing the passcode and enabling “Skip A11 BPR check” in the options. This is not recommended, but it’s there. A11 is in iPhone 8, 8 plus and X
👍 3
Avatar
Inspector_Gadget 3/18/2021 8:05 AM
The iPhone Bluetooth MAC randomization "thing"- Does this only apply to discovery / advertising or does it also use a random MAC when successfully connected / paired?
👀 1
Avatar
@TheDale432 They can if the Android ID matches that Google provides for the device, some companies create there own Android ID for the account vs using what actual device reveals.
👍 1
Avatar
I am looking for some advice on computer specs. A full forensic desktop is an option, but has features (like built-in write blocks, raids or multiple removable bays) that are unnecessary for the expected tasks. The majority of the expected work will be cellphone examination. The case I am working on now has an iPhone 11 Pro Max and an X. I have repeatedly run into out of memory issues on the system I inherited that was not meant for this work.
9:03 AM
When doing exams only, not extractions: Intel or AMD? Gaming system with lots of RAM or forensic desktop?
Avatar
Avatar
Greg-IACIS
I am looking for some advice on computer specs. A full forensic desktop is an option, but has features (like built-in write blocks, raids or multiple removable bays) that are unnecessary for the expected tasks. The majority of the expected work will be cellphone examination. The case I am working on now has an iPhone 11 Pro Max and an X. I have repeatedly run into out of memory issues on the system I inherited that was not meant for this work.
Some consumer AMD gaming systems allow for use of ECC memory (depending on motherboard) which is a good idea for forensic workstaions. Just a thought. Maybe others have additional input, but it seems to me that higher single core performance is slightly more useful than more cores. Some of the software do not make use of all of my 20c/40t, so in those situations I believe higher single core performance may be beneficial. As a side note, on synthetic benchmarks my personal computer at home with an AMD Ryzen 3900x (12c/24t) scores higher benchmark results than my forensic workstation's dual Xeon Silver 4114 (2x10c/20t) in both single and multi-threaded tasks. (edited)
Avatar
Avatar
Greg-IACIS
I am looking for some advice on computer specs. A full forensic desktop is an option, but has features (like built-in write blocks, raids or multiple removable bays) that are unnecessary for the expected tasks. The majority of the expected work will be cellphone examination. The case I am working on now has an iPhone 11 Pro Max and an X. I have repeatedly run into out of memory issues on the system I inherited that was not meant for this work.
Hey Greg, please send me a DM. I'd love to chat about your spec questions and see if I can offer a good recommendation to you!
Avatar
Hello, Do you know a simple procedure to convert .dar to .tar? thank you very much
Avatar
Avatar
0M364
Hello, Do you know a simple procedure to convert .dar to .tar? thank you very much
👍 1
Avatar
Don't know where this goes or if it's already been brought up, but this is pretty interesting: https://www.bleepingcomputer.com/news/security/twitter-images-can-be-abused-to-hide-zip-mp3-files-heres-how/#.YFIuPIVM_aw.twitter
Yesterday, a researcher disclosed a method of hiding up to three MB of data inside a Twitter image. In his demonstration, the researcher showed both MP3 audio files and ZIP archives contained within the PNG images hosted on Twitter.
👍 2
Avatar
Hello guys, this may sound too naive but I tried to google as well search in this server about errors while installing volatility 3 but couldn't resolve the issue. Please help me. Unable to validate the plugin requirements
Avatar
Anybody have any insight/recommendation for speeding up file transfers to a cheap flash drive? I'm putting a couple reports on it (about 35GB so its a 64GB flash drive) but its a bunch of small files (almost 400,000 files). Using Teracopy id guess its gonna take about a week to copy. The behavior I am noticing is that it will copy a bunch of files then pause for around 10 seconds then copy more then pause. I assume this is because the USB drive buffer is full and the actual flash memory is slow. Would formatting it with a higher or lower cluster size make a difference? Most files are 4-10 KB and the current sector size is 4096 bytes. Or will that not really make a difference and I just have to wait.
Avatar
Avatar
HackerM0nk
Hello guys, this may sound too naive but I tried to google as well search in this server about errors while installing volatility 3 but couldn't resolve the issue. Please help me. Unable to validate the plugin requirements
Andrew Rathbun 3/19/2021 6:46 AM
try #memory-forensics
6:46 AM
Also, the Volatility Wiki on GitHub is very verbose, be sure to check it out
6:52 AM
take a shot every time i say the word "verbose" today lol (edited)
Avatar
Avatar
Cole
Anybody have any insight/recommendation for speeding up file transfers to a cheap flash drive? I'm putting a couple reports on it (about 35GB so its a 64GB flash drive) but its a bunch of small files (almost 400,000 files). Using Teracopy id guess its gonna take about a week to copy. The behavior I am noticing is that it will copy a bunch of files then pause for around 10 seconds then copy more then pause. I assume this is because the USB drive buffer is full and the actual flash memory is slow. Would formatting it with a higher or lower cluster size make a difference? Most files are 4-10 KB and the current sector size is 4096 bytes. Or will that not really make a difference and I just have to wait.
IF you were to put the files into a container, such as veracrypt or a VHD, the files should transfer over much quicker. Cheap USB's, loads of 4kb files are the main reason for slow transfer. (edited)
Avatar
skiddyfruit 3/19/2021 8:49 AM
Hello everyone, could i ask a question here in regards to andy emulator that is needed for cellebrite virtual analyzer or is this the wrong channel?
8:50 AM
It is in regards to installation issues
Avatar
Avatar
skiddyfruit
Hello everyone, could i ask a question here in regards to andy emulator that is needed for cellebrite virtual analyzer or is this the wrong channel?
Andrew Rathbun 3/19/2021 8:54 AM
Try one of the mobile channels
👍 1
Salute 1
Avatar
Avatar
Dfdan
IF you were to put the files into a container, such as veracrypt or a VHD, the files should transfer over much quicker. Cheap USB's, loads of 4kb files are the main reason for slow transfer. (edited)
I gave up on it and zipped everything. Its my preferred method anyway for a lot of small files, but some people getting the report don't understand you need to unzip them first 🙄 so its a last resort.
Avatar
@Cole We stopped using Tera copy because if it had errors copying over a Cellebrite exam to a DVD etc it would error out and not tell us. We zip everything now and include a readme file as a TXT document that is not zipped. If they can't read that then we have bigger problems 🙂
😄 1
Avatar
Avatar
DCSO
@Cole We stopped using Tera copy because if it had errors copying over a Cellebrite exam to a DVD etc it would error out and not tell us. We zip everything now and include a readme file as a TXT document that is not zipped. If they can't read that then we have bigger problems 🙂
Interesting about teracopy. I have it use xxhash64 on every copy so hopefully that should catch anything. I built a really nice PDF readme with pictures and links to pages. I wonder how many people actually read the "READ ME FIRST" before calling and complaining.
Avatar
Does anyone use a software mouse jiggler? I need to keep a system up and running during the imaging process and it keeps hibernating. I was going to use a software mouse jiggler, but don't have experience with one. If you have one you use and like, please let me know.
Avatar
Avatar
sholmes
Does anyone use a software mouse jiggler? I need to keep a system up and running during the imaging process and it keeps hibernating. I was going to use a software mouse jiggler, but don't have experience with one. If you have one you use and like, please let me know.
Digitalferret 3/19/2021 11:20 AM
pending that, maybe cmd as admin and powercfg /hibernate off ?
👍 1
11:21 AM
i could have booted the pc out of a window some times. imaging and W10 decides to just update and reboot. went through many iterations of "how to stop W10 ..." etc.
💯 1
Avatar
It is Surface Pro and the examiner said he found a known issue with them ignoring the no hibernate setting without a software upgrade. So I was hoping someone had a suggestion on the jiggler.
Avatar
Digitalferret 3/19/2021 11:22 AM
acelabs tho. windows only
Avatar
Avatar
sholmes
It is Surface Pro and the examiner said he found a known issue with them ignoring the no hibernate setting without a software upgrade. So I was hoping someone had a suggestion on the jiggler.
Digitalferret 3/19/2021 11:23 AM
ah right. yeh, i was reluctant to suggest powercfg thinking you must already know. always worth a shot
Avatar
Avatar
sholmes
It is Surface Pro and the examiner said he found a known issue with them ignoring the no hibernate setting without a software upgrade. So I was hoping someone had a suggestion on the jiggler.
Digitalferret 3/19/2021 11:27 AM
if its a regular thing maybe go for a hardware one? saves installing and potentially fouling evidence
11:27 AM
some alternatives: can even build-ur-own 🙂 https://ericdraken.com/usb-mouse-jiggler/
Mouse jiggler from an ATtiny85 Digistump and a simple Arduino sketch to move the mouse periodically to prevent the screensaver from activating.
Avatar
Avatar
sholmes
Does anyone use a software mouse jiggler? I need to keep a system up and running during the imaging process and it keeps hibernating. I was going to use a software mouse jiggler, but don't have experience with one. If you have one you use and like, please let me know.
Andrew Rathbun 3/19/2021 12:21 PM
Mouse Jiggler is a very simple piece of software whose sole function is to "fake" mouse input to Windows, and jiggle the mouse pointer back and forth. - cerebrate/mousejiggler
Avatar
Thanks @Andrew Rathbun. I saw a few of these. Have you used it before?
Avatar
Andrew Rathbun 3/19/2021 12:23 PM
I've used one before a couple years ago but not sure if it was this one or not. It was provided to me and this one I knew of from my GitHub travels
Avatar
Avatar
sholmes
Does anyone use a software mouse jiggler? I need to keep a system up and running during the imaging process and it keeps hibernating. I was going to use a software mouse jiggler, but don't have experience with one. If you have one you use and like, please let me know.
I have used Caffeine and it worked well for me. Very light-weight. https://www.zhornsoftware.co.uk/caffeine/
👍 2
Avatar
Andrew Rathbun 3/19/2021 12:38 PM
https://mouse-jiggler.en.uptodown.com/windows Is the one I've used before @sholmes
Download the latest version of Mouse Jiggler for Windows. Simulate the movement of your mouse cursor. Mouse Jiggler is a simple tool with which you can simulate...
💯 1
👍 1
Avatar
thank you sir
12:42 PM
Thanks all. I have a working mouse jiggler
💯 1
Avatar
@Magnet Forensics is magnet AXIOM developed for Intel CPUs? I heard rumors AMD procesor should freeze during processing. Is it true or not? AMD CPUs are now dominating on market.
Avatar
Avatar
sholmes
Does anyone use a software mouse jiggler? I need to keep a system up and running during the imaging process and it keeps hibernating. I was going to use a software mouse jiggler, but don't have experience with one. If you have one you use and like, please let me know.
I have an "official" hardware USB mouse jiggler. However I have also made my own. I bought some Digispark ATTiny85 usb boards 3 x £7 and programmed them to turn into a mouse jiggler. On connection to a PC shows up as a normal mouse. Let me know if you want my step by step notes on how to build it. (edited)
👍 1
Avatar
@denyzkoo It is not developed only for specific CPUs - Intel or otherwise. Not sure what is being referenced around freezing during processing with AMD CPUs. The only specific requirements of that nature are for Magnet.AI GPU usage.
Avatar
Avatar
MF-cbryant
@denyzkoo It is not developed only for specific CPUs - Intel or otherwise. Not sure what is being referenced around freezing during processing with AMD CPUs. The only specific requirements of that nature are for Magnet.AI GPU usage.
So I can buy AMD Ryzen Threadripper 3990X for my workstation without any doubts? It will work with magnet as any other intel proccesor as well?
Avatar
Andrew Rathbun 3/19/2021 1:19 PM
Also, I get what you mean but I don't think AMD is dominating the market yet in terms of market share. They are dominating the market in terms of hype for actual competition in the CPU sector, that's for sure. I want a TR for my next build 🤤
Avatar
Not sure about Threadrippers and workstation platforms, but Ryzen is not exactly stable at the moment. Amount of AGESA updates and changes (both positive and negative) is quite big, plus there are some USB issues on X570 and B550 chipsets - they may get solved with next AGESA release (edited)
1:31 PM
The initial BIOS that i had for 5900x was fine, but then, 2 months later i installed a current one at the time and had random crashes, mostly during idle. Another BIOS update with more recent AGESA fixed that issues 3 weeks later and it seems stable now
Avatar
Deleted User 3/19/2021 2:12 PM
Hey so I found some discord servers selling drugs and getting around it by calling them "research chemicals"( to not get flagged by bots. How much information do I need to gather to report them to law enforcement?
Avatar
Avatar
Deleted User
Hey so I found some discord servers selling drugs and getting around it by calling them "research chemicals"( to not get flagged by bots. How much information do I need to gather to report them to law enforcement?
Andrew Rathbun 3/19/2021 2:27 PM
Probably the server ID you can use to report to Discord for violations of the terms of use. Could always just submit that here, too: https://www.fbi.gov/tips
The public can report violations of U.S. federal law or suspected terrorism or criminal activity to the FBI online or via telephone or mail.
Avatar
Deleted User 3/19/2021 2:39 PM
Thanks.
Avatar
Avatar
denyzkoo
So I can buy AMD Ryzen Threadripper 3990X for my workstation without any doubts? It will work with magnet as any other intel proccesor as well?
we have people all over the place using Intel and AMD and have had no reported issues that deal with AMD I would feel fine. NCFI The national Computer Forensic Institute has issued students thread rippers in the past and they use AXIOM on those workstation again with no reported issues on the AMD processor
4:06 PM
I cant tell you go for it, but there would be no reason why it would not work as expected. I hope that anybody on the forum that is using AMD could speak to that.
Avatar
Avatar
sholmes
Thanks @Andrew Rathbun. I saw a few of these. Have you used it before?
4:09 PM
By default the app starts enabled, and works every 59 seconds. There are some command line switches you can use to alter this behaviour: xx - where xx is a number which sets the number of seconds between simulated keypresses. This must be the first text on the commandline -startoff - application starts disabled. -exitafter:xx - application will terminate after xx minutes -activefor:xx - application will become inactive after xx minutes -inactivefor:xx - application will become active after xx minutes -appexit - terminates current running instance of application -appon - makes the current running instance of the application active -appoff - makes the current running instance of the application inactive -apptoggle - toggles the running state of the current running instance of the application -apptoggleshowdlg - toggles the running state, and shows dialog -replace - closes the current running instance, replacing it -noicon - does not show a task tray icon -useshift - simulate the shift key instead of F15 -allowss - prevent sleep, but allow the screensaver to start -stes - tell Windows to stay awake, don't use F15 -showdlg - shows a dialog indicating whether caffeine is active -ontaskbar - show a task bar button (use with -showdlg) -key:xx - simulate using virtual key code xx Note: the codes on the linked page are in Hex, convert them to decimal for use with this parameter -keypress - simulate a full key press, not just a key up event -oldicons - use more colourful tray icons -watchwindow:xx - active only when a window with xx in the title is found -activehours:........xxxxxxxx........ - put 24 . or x characters - which indicate from hour 0 to hour 23 of the day. Caffeine will be active only in hours with an x
👍 1
Avatar
Hi, I am currently a student at University of South Wales on my final year project in Computer Forensics. My project is about creating a guide on how to gain shell access on an IP Camera using UART. I have created a survey that contains 15 questions regarding IP Cameras in digital forensics. Anyone can answer this survey, even if one have not done any forensics on an IP Camera and it is completely anonymous. I previously had a different survey up but had to change the direction as it ended up being to hard to complete within the deadline. If you got a couple of minutes to spare I would appreciate any response to the survey, thank you. https://docs.google.com/forms/d/e/1FAIpQLSdrtSz2zArf4rLZ80mbdesO4n7HL-s52C1VypsZXQ77uRdEzw/viewform?usp=sf_link
The purpose of this survey is to identify how common IP Cameras are in digital forensics. Participation is voluntary and you may withdraw at any time. No sensitive data will be collected during this study, however if you are uncomfortable answering any questions you may stop at any time. All information provided will be held in confidence, in ...
Avatar
marketloser 3/22/2021 11:01 AM
@Magnet Forensics - Hello, I have a lot of Instagram SW returns and noticed that the Chats are in the .PDF but when I process the .zip file, there are no chats. Am I doing something wrong or is it the way Instagram returns the data?
Avatar
@marketloser have you examined the ZIP to see if it has the chats ? If so then Axiom is missing them.
Avatar
Avatar
DCSO
@marketloser have you examined the ZIP to see if it has the chats ? If so then Axiom is missing them.
marketloser 3/22/2021 11:57 AM
Yeah, they are in the .html under "unified Chats". But they are not parsed out in AXIOM.
Avatar
@marketloser try it with Cellebrite if it parses then its an issue with Axiom.
Avatar
Avatar
marketloser
@Magnet Forensics - Hello, I have a lot of Instagram SW returns and noticed that the Chats are in the .PDF but when I process the .zip file, there are no chats. Am I doing something wrong or is it the way Instagram returns the data?
It is possible the HTML has changed. I am DM'ing you now
Avatar
Deleted User 3/23/2021 3:32 AM
Uhh can I dm someone who has experience investigating drug dealers?
3:33 AM
I found a server that allows people to sell drugs , I'll send you screenshots.
Avatar
Avatar
Deleted User
I found a server that allows people to sell drugs , I'll send you screenshots.
MrTurdTastic 3/23/2021 4:37 AM
Your best bet is to find out how to make a report to your local police who will forward it on to the relevant department
💯 1
👍 1
Avatar
Artemisia (They / Them) 3/23/2021 8:21 AM
@Erumaro - Is there a way to use KeyWord list searches to find date/time metadata? I know that we could use the date/time filter, but our unit has been instructed to validate our installation of XRY Version 9.3.2 for ISO accreditation - specifically by using a keyword search to find artefacts based on date/time. (edited)
Avatar
@Artemisia (They / Them) Should be possible to just search for example for 2016-08-10 11:52:59 using the text search as well! 🙂
Avatar
elizavetabelkasoft 3/23/2021 10:00 AM
Great news! A new version 1.5 of Belkasoft X is released featuring 🔥Recursive view of File System 🔥WhatsApp downloading with QR code 🔥More Google Clouds downloading 🔥Mounting of UFD with DAR images inside 🔥More macOS and iOS artifacts And many more powerful functions! Check them out at https://bit.ly/3rgj8KC
Avatar
MrMacca (Allan Mc) 3/23/2021 4:01 PM
What tools are you guys using to create Reference media for hard drive, SD Card and USB devices? So that we can use them to test Write blockers. We are currently using CFTT v5 and the cftt-di command but it seems a bit hit and miss on the drives. Just wondering if there is any similar tools.
Avatar
Avatar
MrMacca (Allan Mc)
What tools are you guys using to create Reference media for hard drive, SD Card and USB devices? So that we can use them to test Write blockers. We are currently using CFTT v5 and the cftt-di command but it seems a bit hit and miss on the drives. Just wondering if there is any similar tools.
PC3000 FLASH
Avatar
Hello, do you know how windows 10 sanitize a drive with the inbuild format option (not quick mode)? is it All 0's or pseudorandom ? my director would like to ask to users (basics users) to "sanitize" their removable drives before using them. I personally use third party tool to do it but they would like to tell them using windows 10
12:47 AM
this information seems hard to find on internet
Avatar
I would like to pose a general question to the community; I am in the corporate space how long do companies retain evidence for in an HR case or a malware case?
Avatar
Digitalferret 3/24/2021 6:37 AM
given the trend for some folks to reach back years in order to claim some easy <currency> , i'd say as long as is (legally?) possible. the human tendency towards opportunity greed seems to know no bounds. /cynic
Avatar
Avatar
AnTaL
Hello, do you know how windows 10 sanitize a drive with the inbuild format option (not quick mode)? is it All 0's or pseudorandom ? my director would like to ask to users (basics users) to "sanitize" their removable drives before using them. I personally use third party tool to do it but they would like to tell them using windows 10
Not sure how reliable this is, but this website is stating that the full format just checks the disk for bad sectors as opposed to zeroing out the data so it's likely still recoverable: https://www.computerhope.com/issues/ch001407.htm
What is the difference between a quick format and a full format on a computer?
Avatar
@K23 thanks a lot for the link !
Avatar
Avatar
AnTaL
@K23 thanks a lot for the link !
No worries. Problem with most third party tools too is that they often have way more features than are actually needed. At work we use parted magic for wiping, but that involves booting into a live environment. CCleaner has some decent wiping functionality, but there's also a load of other stuff on there which could be potentially dangerous to the inexperienced. I imagine a good way to do it would be to bitlocker the drive (Plus this means it's encrypted too!), clicking the option to do the full drive instead of just used space. I imagine that should do a decent job and is a fairly easy process for users to do as it's built into Windows 10. Still, I'd test it first by sticking some stock data on a drive, trying the method then seeing if the data is recoverable.
Avatar
yes ! I tried it too
2:27 AM
because bitlock encrypt the data with a key and if you quick format re-encrpyt, it will be with another key and even if data is still on usb drive, it's not recoverable without the first one
2:27 AM
right ?
Avatar
Avatar
AnTaL
because bitlock encrypt the data with a key and if you quick format re-encrpyt, it will be with another key and even if data is still on usb drive, it's not recoverable without the first one
That's the theory. With these kinds of things I'd test it first though
Avatar
I stopped my digging after 1 try and it seems to work like that
👍 1
2:29 AM
I'll go on, thanks a lot
2:29 AM
I had to stop ofc
2:30 AM
not because 1 is enough
Avatar
Sounds good, hope it works out
Avatar
Avatar
K23
Not sure how reliable this is, but this website is stating that the full format just checks the disk for bad sectors as opposed to zeroing out the data so it's likely still recoverable: https://www.computerhope.com/issues/ch001407.htm
@K23 it seems to talk about quick format and full format. Indeed, quick format doesn't do the job
2:34 AM
full format theorically does zeroing
2:34 AM
oh no
Avatar
That goes against the article I just send you, hence why I suggested Bitlocker on top
Avatar
"A Full Format runs an additional step that checks the hard drive for any bad sectors. This check is what makes the full format take so much longer than a quick format. Unfortunately, like the quick format, the files still exist and the volume could be re-built to gain access."
2:35 AM
indeed, but it's the first time I see that
2:35 AM
in my tests I opened the drive with an hex editor and blocks were zeroed
Avatar
Did you have test data written to the device first? Like I said it's not something I've tested, and MS being closed source does not have nice documentation on this
Avatar
yes sure I did
Avatar
DM'd you @AnTaL as this is getting a bit lengthy aha 🙂
Avatar
and I don't know why this informations are so undocumented
Avatar
@AnTaL https://docs.microsoft.com/en-US/troubleshoot/windows-server/backup-and-storage/format-command-not-write-zeros-to-disk “By default in Windows Vista and later versions, the format command writes zeros to the whole disk when a full format is performed. In Windows XP and earlier versions of Windows, the format command doesn't write zeros to the whole disk when a full format is performed”
Discusses a change in the behavior of the format command in Windows Vista and later Windows versions.
👍 1
3:17 AM
Possibly conflicting information due to differences in implementation on different Windows versions?
Avatar
thanks for your answer 🙂 yes it was improved after 8 if I remember correctly
3:18 AM
oh no Vista, mb
3:21 AM
"the format command", I just wonder if the format "command" works like the inbuilt format option in the interface but I think it does
Avatar
thanks a lot, it confirms a little bit more what I tested and noted. I had just one another source explaining this
Avatar
I have an odd question, so I work in a regional lab and with the current need to keep devices in AFU status I am finding myself needing battery packs so offices can mail me their phones. The problem I have is I have bought 5/6 different types of battery packs. They all charge the phone to 100% then stop charging. Well when registered mail takes a few days to get to us that phone has died connected to a fully charged battery pack. Does anyone here know of a battery pack that continues to charge even after the device reaches 100%? Feel free to DM me if you prefer.
Avatar
Avatar
Palazar82
I have an odd question, so I work in a regional lab and with the current need to keep devices in AFU status I am finding myself needing battery packs so offices can mail me their phones. The problem I have is I have bought 5/6 different types of battery packs. They all charge the phone to 100% then stop charging. Well when registered mail takes a few days to get to us that phone has died connected to a fully charged battery pack. Does anyone here know of a battery pack that continues to charge even after the device reaches 100%? Feel free to DM me if you prefer.
kmacdonald1565 3/25/2021 7:10 AM
just for clarity, your saying the battery pack charges to 100% then no longer charges, allowing the phone to die even though the battery pack still has juice?
7:11 AM
if so, thats a little weird, i havent tried it on my personal battery packs, but i swear i thought they kept it topped off. i will test when i get a chance, but might be a few days.
Avatar
Avatar
kmacdonald1565
just for clarity, your saying the battery pack charges to 100% then no longer charges, allowing the phone to die even though the battery pack still has juice?
Correct
Avatar
Avatar
kmacdonald1565
if so, thats a little weird, i havent tried it on my personal battery packs, but i swear i thought they kept it topped off. i will test when i get a chance, but might be a few days.
Thank you, I appreciate it. Might be an EU thing as ally packs I'm buying are here in Germany. But if there is an American one that doesn't or whatever I'll buy those instead.
Avatar
The Cyber-investigative Analysis Standard Expression (CASE) open-source community has published CASE version 0.3.0. Visit the CASE Community to learn more about this release at https://caseontology.org/releases/0.3.0/
Open Source Community for the Cyber-investigation Analysis Standard Expression (CASE) Ontology.
Avatar
Avatar
Palazar82
Thank you, I appreciate it. Might be an EU thing as ally packs I'm buying are here in Germany. But if there is an American one that doesn't or whatever I'll buy those instead.
kmacdonald1565 3/25/2021 7:54 AM
my personal ones are as cheap as they come, i get ones on amazon special. new ones have power delivery, old ones just a 2 amp (or so) usb plug. i will see what i can do for you with that. i think one or two of my old ones are similar to what you said but newer ones i cant say for sure.
Avatar
Avatar
kmacdonald1565
my personal ones are as cheap as they come, i get ones on amazon special. new ones have power delivery, old ones just a 2 amp (or so) usb plug. i will see what i can do for you with that. i think one or two of my old ones are similar to what you said but newer ones i cant say for sure.
Awesome, I'm totally down to buy whatever works. I have a few old battery packs but can't find a vendor still selling them. I would need to buy 30 or so packs so need to find ones new enough that they still sell them.
Avatar
Jack of Trades 3/25/2021 11:47 AM
@Dingoeater
Avatar
Andrew Rathbun 3/25/2021 6:17 PM
3 year anniversary of the server tomorrow 😎
🥳 15
🍻 7
💯 5
🍾 4
Salute 2
Avatar
Avatar
K23
Not sure how reliable this is, but this website is stating that the full format just checks the disk for bad sectors as opposed to zeroing out the data so it's likely still recoverable: https://www.computerhope.com/issues/ch001407.htm
In my experience, it zero s out everything.
👍 1
Avatar
Avatar
Palazar82
I have an odd question, so I work in a regional lab and with the current need to keep devices in AFU status I am finding myself needing battery packs so offices can mail me their phones. The problem I have is I have bought 5/6 different types of battery packs. They all charge the phone to 100% then stop charging. Well when registered mail takes a few days to get to us that phone has died connected to a fully charged battery pack. Does anyone here know of a battery pack that continues to charge even after the device reaches 100%? Feel free to DM me if you prefer.
The battery back doesnt have an always on function. Thats what causes that.
Avatar
Avatar
florus
The battery back doesnt have an always on function. Thats what causes that.
That's what I need to find, none of the battery packs I am finding here have trickle charging or always on as a feature at least not advertised as such and the 5/6 we have bought did not have it. Do you know of a current battery pack that does by chance?
Avatar
Ill dm you. An example with always on: Voltaic v50 powerbank. (edited)
Avatar
Avatar
AnTaL
"the format command", I just wonder if the format "command" works like the inbuilt format option in the interface but I think it does
My experience and understanding is that the full format in the GUI also writes zeroes. I have confirmed this in my own testing on Win10.
Avatar
Avatar
Cole
My experience and understanding is that the full format in the GUI also writes zeroes. I have confirmed this in my own testing on Win10.
Digitalferret 3/26/2021 6:55 AM
same, as per prior mention: W10 . full format
💯 1
Avatar
Avatar
Digitalferret
same, as per prior mention: W10 . full format
Love HxD. If its not installed on every one of my computers I feel like im missing something.
Avatar
Avatar
Cole
Love HxD. If its not installed on every one of my computers I feel like im missing something.
Digitalferret 3/26/2021 6:59 AM
hehe, same. similar CLI gear under linux makes it easy-peasy too
7:00 AM
unix-stackexchange has a note Simply using `od` or `hexdump` should be fine since these programs avoid outputting repeated lines (or use `xxd -a` as above). Eg:
7:02 AM
main thing is to always verify, there's a lot of info misrepresented online. too easy to screw up, and with erasure, or lack of, consequences can be far reaching
Avatar
One of my favorite linux commands for verifying erased disk is this: dd if=/dev/sdb bs=1M | cmp -l /dev/zero dd will read the drive and compare it to zeroes. Anything that is not a 0 will be printed on screen and its location. Replace sdb with your disk, of course. (edited)
Avatar
Hey everyone, I know I don't post at all but thanks to the information and the guidance y'all helped me get my GCFE recently and I just wanted to say this is an awesome community. Thank you for your help and keep being awesome ThumbsUpParrot
💯 3
Avatar
Avatar
Icarus
Hey everyone, I know I don't post at all but thanks to the information and the guidance y'all helped me get my GCFE recently and I just wanted to say this is an awesome community. Thank you for your help and keep being awesome ThumbsUpParrot
Andrew Rathbun 3/26/2021 8:13 AM
Avatar
@Andrew Rathbun so you do remember! yes it was super helpful. I really appreciate it.
💯 1
Avatar
heatherDFIR 3/26/2021 8:29 AM
I have a student asking for advice on where to learn how to use python scripts appropriately. Any advice? I suggested to practice and leverage the ReadMe, but they are looking for more.
Avatar
Avatar
heatherDFIR
I have a student asking for advice on where to learn how to use python scripts appropriately. Any advice? I suggested to practice and leverage the ReadMe, but they are looking for more.
Andrew Rathbun 3/26/2021 8:30 AM
Maybe @Brigs and #dfir-python-study-group might be a resource you can send their way?
8:30 AM
Also, if there is a resource they come across, please share because it's something I struggle with, as well
👍 1
Avatar
Avatar
heatherDFIR
I have a student asking for advice on where to learn how to use python scripts appropriately. Any advice? I suggested to practice and leverage the ReadMe, but they are looking for more.
Any details on what the student is struggling with? I have a full python for DFIR coding class (as you know) but maybe that is too much. With enough details I would be more than happy to make a video that can try and fill that knowledge gap.
Avatar
Avatar
Brigs
Any details on what the student is struggling with? I have a full python for DFIR coding class (as you know) but maybe that is too much. With enough details I would be more than happy to make a video that can try and fill that knowledge gap.
heatherDFIR 3/26/2021 8:36 AM
That is too much. He needs help troubleshooting errors and just running scripts. ALEAPP, APOLLO, ILEAPP and your usagestats script terrified him. His fear is that when I am not there to tell him how to use it he won't be able to.
Avatar
Avatar
heatherDFIR
That is too much. He needs help troubleshooting errors and just running scripts. ALEAPP, APOLLO, ILEAPP and your usagestats script terrified him. His fear is that when I am not there to tell him how to use it he won't be able to.
With my script the main user take aways, if you are not using the release windows executables, are: 1) Install Python 2) Download the scripts 3) Install/troubleshoot packages 4) Run the scripts 5) Locate/leverage the output I think most scripts follow the same workflow. Would a video on these steps help?
Avatar
@heatherDFIR @ScottKjr3347 made a video on YouTube on how to use APOLLO.
Avatar
@Brigs is that a paid course or online resource? I want to get into python properly when I have some time, I don't have the time to commit right now and forget things, but an actually focused course sounds promising.
Avatar
@Cole Thank you ! so your tests confirm also one full format in the GUI is enough to have no recoverable data ?
Avatar
Avatar
CCC
@Brigs is that a paid course or online resource? I want to get into python properly when I have some time, I don't have the time to commit right now and forget things, but an actually focused course sounds promising.
Free online resource. Check the pinned items in the DFIR Python Study Group channel here in this Discord for class exercises and different things I make reference to in the videos. https://youtube.com/playlist?list=PLz61osc7c3OqQ_xBZJbzZdIkVd8HnxLmC
Basic Python course Textbook: Head First Python: A Brain-Friendly Guide, 2nd edition DFIR Discord: https://aboutdfir.com/a-beginners-guide-to-the-digital-for...
Avatar
@Digitalferret Yes I saw your screen, but I just wanted more technical answer than a popup in windows
Avatar
Thanks!
👍 1
Avatar
Avatar
AnTaL
@Digitalferret Yes I saw your screen, but I just wanted more technical answer than a popup in windows
Digitalferret 3/26/2021 10:13 AM
all good, i was replying to sgman, in case he missed it (edited)
10:15 AM
<- techno nerds often repeat repeat things things 🙂
😅 2
Avatar
Avatar
AnTaL
@Cole Thank you ! so your tests confirm also one full format in the GUI is enough to have no recoverable data ?
A full format writes zeroes to the entire drive. Note the first part of the drive will have the partition structure re-written, so its not technically full of zeroes, but the data has been overwritten. Whether or not it is recoverable is up for interpretation. Certainly its not recoverable to someone with my expertise.
Avatar
@Cole not sure to understand, what could be recoverable with a disk overwritten with 0's regardless the the technic ?
Avatar
Avatar
AnTaL
@Cole not sure to understand, what could be recoverable with a disk overwritten with 0's regardless the the technic ?
Good question. The people who insist on overwriting a drive multiple times think one time isn't enough. I personally think one time is plenty.
Avatar
Avatar
heatherDFIR
That is too much. He needs help troubleshooting errors and just running scripts. ALEAPP, APOLLO, ILEAPP and your usagestats script terrified him. His fear is that when I am not there to tell him how to use it he won't be able to.
forensicmike @Magnet 3/26/2021 12:56 PM
i'd also point out that even the most experienced developers face the troubleshooting errors / dependency issues problem. the python 2 - 3 divide in particular is enough to drive anyone batty. i think the best way is to just google the particular errors he runs into and start to get comfortable diagnosing issues with the trusty stack overflow. repositories like iLEAPP and ALEAPP provide precompiled windows binaries on the releases page, so when in doubt he could fall back on using those too.
👍 2
12:57 PM
for me though the best training is the poking/prodding till it either works or i rage quit 😄
Avatar
@Cole you are totally on the good question. So it's the answer I'm looking for. Why, technically, some people think/know 1 time is not enough
1:06 PM
Not theorically
1:07 PM
I'm just looking and searching for facts or results
Avatar
Andrew Rathbun 3/26/2021 1:09 PM
@Brigs if one doesn't exist already, an idea would be show how an idiot like me who sees pip install and wonders wtf that means can go from not knowing what that is to using something python related, i.e. one of your tools
👍 1
1:10 PM
That is my current barrier and I'm just too involved in other things to really troubleshoot that barrier. It just hasn't happened yet. So just throwing it out there
1:10 PM
I see something cool on GitHub, oh it's python? Oh well, moving on.
1:12 PM
That being said, this was all before I did lots of things in command line like I do now, so it's worth a revisit, naturally, but that was my barrier previously and I'm not ashamed to admit it. All gotta start somewhere
👍 1
Avatar
Hey everyone! I am currently doing research for my PhD thesis. One of the topics is (automotive) digital forensics and corresponding data formats. If you have some minutes to fill out a survey, it would help me a lot! 🙂 Here is the link to survey: https://www.soscisurvey.de/automotive-data-formats/
👍 1
Avatar
Avatar
Brigs
With my script the main user take aways, if you are not using the release windows executables, are: 1) Install Python 2) Download the scripts 3) Install/troubleshoot packages 4) Run the scripts 5) Locate/leverage the output I think most scripts follow the same workflow. Would a video on these steps help?
heatherDFIR 3/26/2021 3:16 PM
That would be fantastic.
Avatar
Avatar
heatherDFIR
That would be fantastic.
Just got the hardware for the demo. Hope to get it done over the weekend. 👍
👍 2
🔥 2
Avatar
@AnTaL From a search of related literature, could it be due to legacy notions from the floppy disk era where overwritten data can be recovered by estimating the original bit value through magnetic force microscopy techniques? 1) https://commons.erau.edu/cgi/viewcontent.cgi?article=1131&=&context=jdfsl 2) https://www.sans.org/blog/overwriting-hard-drive-data/ 3) https://www.usenix.org/legacy/publications/library/proceedings/sec96/full_papers/gutmann/index.html (edited)
SANS Digital Forensics and Incident Response Blog blog pertaining to Overwriting Hard Drive Data
Avatar
Avatar
varbytes
@AnTaL From a search of related literature, could it be due to legacy notions from the floppy disk era where overwritten data can be recovered by estimating the original bit value through magnetic force microscopy techniques? 1) https://commons.erau.edu/cgi/viewcontent.cgi?article=1131&=&context=jdfsl 2) https://www.sans.org/blog/overwriting-hard-drive-data/ 3) https://www.usenix.org/legacy/publications/library/proceedings/sec96/full_papers/gutmann/index.html (edited)
Digitalferret 3/27/2021 3:59 AM
pretty much this. bit density on drives etc
4:01 AM
if i remember right, even then it was like NSA level. were any cases highlighted where it actually gleaned enough evidence to convict?
Avatar
Avatar
Andrew Rathbun
@Brigs if one doesn't exist already, an idea would be show how an idiot like me who sees pip install and wonders wtf that means can go from not knowing what that is to using something python related, i.e. one of your tools
Hopefully this video answers some of those questions. Super key to address. Thank you so much for expressing the need. Really important. https://www.youtube.com/watch?v=tQ5EiH2Hccg
💯 4
Salute 2
🤝 1
Avatar
Avatar
Brigs
Hopefully this video answers some of those questions. Super key to address. Thank you so much for expressing the need. Really important. https://www.youtube.com/watch?v=tQ5EiH2Hccg
Andrew Rathbun 3/27/2021 6:27 PM
Way to deliver, going to watch it now 👍 thank you sir
Avatar
Hi. Does anyone know if the X-Ways sim search feature will search through data in the registry files? Thanks
Avatar
Herpderp5002 3/28/2021 4:16 PM
I have no idea if anyone who maintains Autopsy is here but Yara support is huge! Thank you for implementing that!
👍 1
Autopsy 2
Avatar
Unoriginal_name 3/28/2021 4:55 PM
@Cole I was told in a training class that a long format, or a full format does not replace all of the bits with zeros. I guess I need to grab a thumb drive and test it out. That’s good info!
Avatar
Avatar
Herpderp5002
I have no idea if anyone who maintains Autopsy is here but Yara support is huge! Thank you for implementing that!
Andrew Rathbun 3/28/2021 7:00 PM
@Brian Carrier
❤️ 2
👍 1
Avatar
Avatar
Unoriginal_name
@Cole I was told in a training class that a long format, or a full format does not replace all of the bits with zeros. I guess I need to grab a thumb drive and test it out. That’s good info!
In general i don't think it does (say on a digital camera, for example). On Windows (since Vista), it will replace with zeroes in the process. Of course its always good to verify it yourself! 👍
Avatar
Can anyone recommend a decent online hash lookup service like the cymru hash lookup service? But better? (https://team-cymru.com/community-services/mhr/)I have been happily netcatting hashes at it for some time but have discovered that the database is not great. A week ago it recognized exactly one of the 12 web shell hashes that have been published about the Halfnium compromise that I threw at it. I’m hoping to find a free alternate malware hash db that is more up to date.
Using Team Cymru’s Pure Signal™ Platform, we map out additional domains and hosting IP addresses associated with the AEON bank domain spoofing threat.
Avatar
Avatar
bedemead
Can anyone recommend a decent online hash lookup service like the cymru hash lookup service? But better? (https://team-cymru.com/community-services/mhr/)I have been happily netcatting hashes at it for some time but have discovered that the database is not great. A week ago it recognized exactly one of the 12 web shell hashes that have been published about the Halfnium compromise that I threw at it. I’m hoping to find a free alternate malware hash db that is more up to date.
Okay that url didn’t render correctly, ignore the picture
Avatar
TryCatchHCF 3/29/2021 7:07 AM
Malicious commits made to PHP source repository yesterday. https://news-web.php.net/php.internals/113838 "Yesterday (2021-03-28) two malicious commits were pushed to the php-src repo [1] from the names of Rasmus Lerdorf and myself. We don't yet know how exactly this happened, but everything points towards a compromise of the git.php.net server (rather than a compromise of an individual git account). While investigation is still underway, we have decided that maintaining our own git infrastructure is an unnecessary security risk, and that we will discontinue the git.php.net server. Instead, the repositories on GitHub, which were previously only mirrors, will become canonical. This means that changes should be pushed directly to GitHub rather than to git.php.net." (edited)
Avatar
Avatar
TryCatchHCF
Malicious commits made to PHP source repository yesterday. https://news-web.php.net/php.internals/113838 "Yesterday (2021-03-28) two malicious commits were pushed to the php-src repo [1] from the names of Rasmus Lerdorf and myself. We don't yet know how exactly this happened, but everything points towards a compromise of the git.php.net server (rather than a compromise of an individual git account). While investigation is still underway, we have decided that maintaining our own git infrastructure is an unnecessary security risk, and that we will discontinue the git.php.net server. Instead, the repositories on GitHub, which were previously only mirrors, will become canonical. This means that changes should be pushed directly to GitHub rather than to git.php.net." (edited)
Funny that... Over the past short while, I've been getting password reset requests to my email for my GitHub account - maybe not linked but interesting.
Avatar
@Magnet Forensics anyone answer a question about the training portal?
Avatar
Anyone use Shodan? and is this worth it? https://twitter.com/shodanhq/status/1376610973629493254
Shodan now has more than 4 million users! To celebrate we are offering the membership at a discounted price of $4 for the next 24 hours: https://t.co/e6mRc8kQGt
Retweets
107
Likes
174
🍾 1
Avatar
Avatar
stark4n6
Anyone use Shodan? and is this worth it? https://twitter.com/shodanhq/status/1376610973629493254
I recall using it briefly in one of my computer security classes and it was interesting but I don't know much about its full functionality.
2:29 PM
We were cautioned to be very careful about how we use it
Avatar
Digitalferret 3/29/2021 2:36 PM
https://www.safetydetectives.com/blog/what-is-shodan-and-how-to-use-it-most-effectively/#review-2 How is Shodan Legal? If all of this sounds rather scary to you, you’re not alone. Upon launch, many news reports, including one by CNN Business referred to Shodan as “the scariest search engine on the Internet.” From a consumer perspective, a search engine that provides such deep user and device-level insights should be a privacy concern, if not a legal or ethical dilemma. However, Shodan is completely legal and does not breach the US government’s Computer Fraud and Abuse Act. On its own, the service only collects data that was already available to the public. The metadata for various IoT devices is already broadcasted online, and Shodan simply reports what it finds.
With IoT devices on the rise, understanding Shodan, and how to remain secure while using it, will protect you online - SafetyDetective has you covered.
💯 5
2:36 PM
for $4 - what is there to lose, other than 4 dollars?
2:38 PM
wouldn't anybody pay a measly 4 bucks to check the settings Rathbun's toaster? 🙂
🍞 4
Avatar
Deleted User 3/29/2021 4:16 PM
Does checkm8 work on devices where the passcode is unknown? We have an iPhone 6+, iPhone 8+ and an iPhone 11...all passcoded and we've not been able to use Cellebrite to checkm8 them for a BFU extraction
Avatar
thatboy_leo 3/29/2021 8:05 PM
4 digit or 6 digit pin?@Deleted User
Avatar
Deleted User 3/29/2021 8:23 PM
@thatboy_leo 6 digit pins, we'll probably send them out to be cracked, but was hoping to grab something in the mean time
Avatar
Avatar
Deleted User
@thatboy_leo 6 digit pins, we'll probably send them out to be cracked, but was hoping to grab something in the mean time
thatboy_leo 3/29/2021 8:28 PM
I just discussed this scenario with my boss, only help I got was graykey which is only LE. We use Cellebrite as well
Avatar
Avatar
stark4n6
Anyone use Shodan? and is this worth it? https://twitter.com/shodanhq/status/1376610973629493254
Shodan is great if you are trying to find very specific things, like everyone with a certain router model or specific open TCP port. Wonderful for finding victims for your new exploit or open webcams. Less useful for blue teams
Avatar
Avatar
bedemead
Shodan is great if you are trying to find very specific things, like everyone with a certain router model or specific open TCP port. Wonderful for finding victims for your new exploit or open webcams. Less useful for blue teams
randomaccess 3/30/2021 4:43 AM
for $4 it's worth it
👍 1
Avatar
Andrew Rathbun 3/30/2021 4:44 AM
I've made worse, more expensive decisions at Taco Bell 🤷‍♂️
😆 7
🌮 2
Avatar
Yeah totally worth it even if you don't need it. It was worth it at full price if there was a specific use case
Avatar
Avatar
Ghosted
@Magnet Forensics anyone answer a question about the training portal?
Sorry I was off yesterday and therefore not monitoring but yes I can answer whatever question you have...
Avatar
@Jamey was trying to get into the portal and it was saying this computer is not authorized.
Avatar
Anyone using Magnetic GPS trackers? If so do you have any brands that you've used with longevity?
Avatar
Does anyone have any lab notes forms and/or on-scene preview forms they’d like to share? I’m creating new ones for our examiners and could use some inspiration
Avatar
Avatar
Brigs
Just got the hardware for the demo. Hope to get it done over the weekend. 👍
I also Have cam link 4K I love it
👍 1
Avatar
Avatar
LowKeyMax
I also Have cam link 4K I love it
@Brigs I just finally got my Shadowcast which is mostly geared towards gaming but I think works as a capture card too https://www.kickstarter.com/projects/humanthings/genki-shadowcast
Avatar
Avatar
stark4n6
@Brigs I just finally got my Shadowcast which is mostly geared towards gaming but I think works as a capture card too https://www.kickstarter.com/projects/humanthings/genki-shadowcast
That's a great price. And yes it is a capture card 💯.
Avatar
Avatar
Ghosted
@Jamey was trying to get into the portal and it was saying this computer is not authorized.
Email me at jamey.tubbs@magnetforensics.com with your portal login, email and info and I will check on it asap
Avatar
@Jamey Sent and thanks Jamey
Avatar
Anytime
Avatar
You should have gotten a couple of emails...
Avatar
kmacdonald1565 3/31/2021 9:51 AM
anyone have an app or site they go to for spoofing calls? trying to contact a suspect from a victim's phone number (line no longer in service, very recently) and spoofing was brought up as an idea to mitigate it.
Avatar
Deleted User 3/31/2021 11:51 AM
Hi guys! I'm currently involved in penetration testing and I have been granted the opportunity to take a couple of years out (Mainly from saving up for a break!) After a fair amount of consideration, the thought of working in digital forensics for the police really seems to sway me. Since I have the time to smash some studying out for a while I was hoping someone could point me in the right direction for a course? Paid or free I dont mind as long as the quality is good. Thanks guys!
Avatar
Avatar
Deleted User
Hi guys! I'm currently involved in penetration testing and I have been granted the opportunity to take a couple of years out (Mainly from saving up for a break!) After a fair amount of consideration, the thought of working in digital forensics for the police really seems to sway me. Since I have the time to smash some studying out for a while I was hoping someone could point me in the right direction for a course? Paid or free I dont mind as long as the quality is good. Thanks guys!
Andrew Rathbun 3/31/2021 11:52 AM
#training-education-employment
Avatar
Anyone ever do a thunderbird analysis on a windows machine?
Avatar
Avatar
maddie
Anyone ever do a thunderbird analysis on a windows machine?
Andrew Rathbun 3/31/2021 6:50 PM
This repository serves as a place for community created Targets and Modules for use with KAPE. - EricZimmerman/KapeFiles
Avatar
Avatar
maddie
Anyone ever do a thunderbird analysis on a windows machine?
I made a Kape file for any interesting artefacts which Andrew has kindly linked. The amount of artefacts left behind is pretty extensive.
Avatar
bmitchell194 4/1/2021 6:03 AM
Has anyone been through a Daubert/Frye hearing for google location history? If so can you cite the case or point me in the right direction. Defense lawyers are making a huge deal out of the accuracy of the records and that it has not been challenged in PA
Avatar
Avatar
bmitchell194
Has anyone been through a Daubert/Frye hearing for google location history? If so can you cite the case or point me in the right direction. Defense lawyers are making a huge deal out of the accuracy of the records and that it has not been challenged in PA
@columbuscop2290
Avatar
Do iPhone store any logs to say when it was last backed up to a laptop via iTunes?
Avatar
Avatar
Pacman
Do iPhone store any logs to say when it was last backed up to a laptop via iTunes?
columbuscop2290 4/1/2021 7:21 AM
Data_ark.plist
Avatar
Avatar
columbuscop2290
Data_ark.plist
Thanks, just unzipping extraction to look into it
7:39 AM
Does it show timestamp, what device it backed up to etc?
Avatar
Avatar
Pacman
Does it show timestamp, what device it backed up to etc?
columbuscop2290 4/1/2021 7:52 AM
It can but depends on what actually occurred with it
Avatar
Avatar
columbuscop2290
It can but depends on what actually occurred with it
What info does it give, can you remember?
Avatar
Avatar
Pacman
What info does it give, can you remember?
columbuscop2290 4/1/2021 8:04 AM
Last backup date and time, computer name it was backed up to, etc
Avatar
That's very useful. Thanks.
8:05 AM
Still waiting for case files to unzip.
Avatar
Alpine Mastiff 4/1/2021 8:09 AM
Hi all, anyone have any recommendations for a decent USB drive for live boot. I've been plagued by poorly performing drives and just want to get a keyring of like 5 reasonably priced drives
Avatar
@columbuscop2290 what does it look like if it has been backed up? I don't see any entries that suggest a backup was done
8:22 AM
so I don't think he has done any backup
Avatar
Is anyone able to identify the website or app this would be from? The screenshot was forwarded to the victim, who keeps getting inquiring phone calls. Trying to get a subpoena out and get it taken down. I tried googling details from the post and reverse image searching but didn't have any luck
11:37 AM
@Law Enforcement [USA]
Avatar
Avatar
Pacman
@columbuscop2290 what does it look like if it has been backed up? I don't see any entries that suggest a backup was done
columbuscop2290 4/1/2021 11:38 AM
I’d have to see it. Did you pull the plist up
Avatar
I'm at home now - I looked at the plist and there's no info re backup
11:39 AM
so probably never been backed up
Avatar
Avatar
Solec
Is anyone able to identify the website or app this would be from? The screenshot was forwarded to the victim, who keeps getting inquiring phone calls. Trying to get a subpoena out and get it taken down. I tried googling details from the post and reverse image searching but didn't have any luck
Andrew Rathbun 4/1/2021 11:41 AM
Maybe try Googling for Backpages alternatives 2021 and then follow these instructions to see mobile versions of each site - https://www.browserstack.com/guide/view-mobile-version-of-website-on-chrome
Avatar
@Andrew Rathbun looks like that did it. Might be yesbackpage.com. Wish I went into incognito mode first 🙂 Thanks!
💯 1
Avatar
this one has similar formatting on their classifieds postshttps://www.muamat.com/classifieds/
Avatar
Avatar
Solec
Is anyone able to identify the website or app this would be from? The screenshot was forwarded to the victim, who keeps getting inquiring phone calls. Trying to get a subpoena out and get it taken down. I tried googling details from the post and reverse image searching but didn't have any luck
ninjadeathsquad 4/1/2021 11:51 AM
I would look at the screenshot under ELA here https://29a.ch/photo-forensics/#forensic-magnifier and would Google dork for text elements on site, the more unique the better.
Forensically is a set of free tools for digital image forensics. It includes clone detection, error level analysis, meta data extraction and more.
Avatar
Avatar
ninjadeathsquad
I would look at the screenshot under ELA here https://29a.ch/photo-forensics/#forensic-magnifier and would Google dork for text elements on site, the more unique the better.
yea looking for the reply to not shown portion was how i found the muamat one above. i bet a qoutes search if he has the actual post# would be perfect
👍🏻 1
Avatar
TVivD (TVivD on BGA) 4/1/2021 12:17 PM
Has anyone here used Magnet AXIOM Review? We commonly use AXIOM Portable Case for providing review copies of data for investigators/case agents to look through, but now attorneys at my agency want to "deploy" Reviewer. I know that it's one of the formats that output from AXIOM can be placed into, and that it's for collaboration, but I'm not familiar with the setup requirements, e.g., does the I.T. department have to provide any special setup or access on a network share/file server for stakeholders to access the web interface? I watched the explanation video, but I'm looking for more back-end details. Thanks for any insights.
Avatar
What tools are available to grab memory from an iPhone? Any info on what’s possible to get out of it after extraction?
Avatar
Anyone with @Grayshift out there? I reached out to support on the site a week ago to get an estimate on getting Graykey for my agency. I haven’t heard back.
Avatar
Super helpful! Thank you!! from any of your experience are you familiar/do you know if there’s any way to tell besides the log file any other email accounts the application viewed/when?
Avatar
^ Or even why there may not be a log file? Has to do with maybe the version running of thunderbird that’s my assumption
Avatar
I'm investigating the origin of two pictures found on an iOS device. The pictures seem to be screenshots but I want to know if they are created with the device. I've looked up the pictures in the photos.sqlite and the CreatorBundleID is com.apple.springboard. Can somebody confirm if this is the correct CreatorBundleID for screenshots? Are there any other hints I should take a look at?
Avatar
bmitchell194 4/2/2021 8:01 AM
Has anyone been through a Daubert/Frye hearing for google location history? If so can you cite the case or point me in the right direction. Defense lawyers are making a huge deal out of the accuracy of the records and that it has not been challenged in PA
Avatar
Avatar
bmitchell194
Has anyone been through a Daubert/Frye hearing for google location history? If so can you cite the case or point me in the right direction. Defense lawyers are making a huge deal out of the accuracy of the records and that it has not been challenged in PA
spicy_caveman 4/2/2021 11:53 AM
US v Chatrie
Avatar
Avatar
bmitchell194
Has anyone been through a Daubert/Frye hearing for google location history? If so can you cite the case or point me in the right direction. Defense lawyers are making a huge deal out of the accuracy of the records and that it has not been challenged in PA
spicy_caveman 4/2/2021 11:53 AM
11:55 AM
5f0ba578-cfe1-4fb9-9e76-5d40778f3f40.pdf
11:56 AM
Search warrant and suppression strategy are there. It is ultimately up to your prosecutor and how good they are at redirect for privacy issues. It is still a difficult thing to get done no matter where you are.
Avatar
Avatar
Sockmoth
I'm investigating the origin of two pictures found on an iOS device. The pictures seem to be screenshots but I want to know if they are created with the device. I've looked up the pictures in the photos.sqlite and the CreatorBundleID is com.apple.springboard. Can somebody confirm if this is the correct CreatorBundleID for screenshots? Are there any other hints I should take a look at?
spicy_caveman 4/2/2021 12:06 PM
Springboard is what displays the homescreen. So it is a good start. Are you able to find it in whatever container or db - along with what else is there? I found this if you didn't have it also: https://developers.perfectomobile.com/plugins/servlet/mobile?contentId=29558458#content/view/29558458
Avatar
Does anyone know how I can get around installing EnCase Forensics for Academic purposes? I do have have an Academic Evaluation .wibucmrau file
Avatar
Nvm think I;ve found it
Avatar
Avatar
Jack
Does anyone know how I can get around installing EnCase Forensics for Academic purposes? I do have have an Academic Evaluation .wibucmrau file
DeepDiveForensics 4/5/2021 11:30 AM
Import .wibucmrau into Codmeter. File--->Import License.
Avatar
Adam Cervellone 4/5/2021 12:25 PM
Does anyone know if a full file system Zip file for an iOS extraction can be opened correctly in XWays Forensics?
Avatar
Avatar
Adam Cervellone
Does anyone know if a full file system Zip file for an iOS extraction can be opened correctly in XWays Forensics?
DeeFIR 🇦🇺 4/5/2021 11:16 PM
Haven't done it myself before, I'll have a look now
Avatar
Even though it might be questionable to have a #CTI channel within a DFIR server, would that still makes sense? What you guys think?
Avatar
Good morning (for me anyway). I found this discord through LinkedIn, and I was wondering if there is a place a newbie who'd like to get into this world could ask questions and not bother everyone?
Avatar
randomaccess 4/6/2021 2:48 AM
@DocFiPS pretty much anywhere on this discord is suitable for that
Avatar
Avatar
randomaccess
@DocFiPS pretty much anywhere on this discord is suitable for that
Ty!
3:07 AM
I just kind of wanted to see expert opinion on where to start, certs, etc. About to get out of the military, want a career change (been in medical almost a decade). Combing through everything, I have a real big interest in DFIR, mostly the forensics side to it. I kind of wanted to see what other certs outside of SANS are good to study for that could land me somewhere? Truth is, I can't really drop the 7k on those classes right now. I'm hoping to apply for the vetsuccess program when it opens, but that's some months away. I wanted to start trying to study now and see if there is anything other than SANS that could be good to look at.
Avatar
Avatar
DocFiPS
Ty!
What branch? There are a couple resources that are branch-specific that might be good places to look.
Avatar
Avatar
pug4N6
What branch? There are a couple resources that are branch-specific that might be good places to look.
Navy. But I'm medical not it or Cyber.
Avatar
Avatar
DocFiPS
Navy. But I'm medical not it or Cyber.
I know about a couple programs from the Army and Air Force, but not specifically the Navy, but I've heard of folks using their GI Bill for the SANS education/degree track ... that might be something worth looking into.
Avatar
Avatar
pug4N6
I know about a couple programs from the Army and Air Force, but not specifically the Navy, but I've heard of folks using their GI Bill for the SANS education/degree track ... that might be something worth looking into.
That's on my list to look and see how that works.
Avatar
randomaccess 4/6/2021 4:30 AM
not sure what vetsuccess is, sans does have some stuff for veterans, may be worth looking into in terms of where to start, loads of free resources online. Reddit has an FAQ that's helpful: https://www.reddit.com/r/computerforensics/wiki/faq
r/computerforensics: Dedicated to the branch of forensic science encompassing the recovery and investigation of material found in digital devices …
Avatar
Avatar
randomaccess
not sure what vetsuccess is, sans does have some stuff for veterans, may be worth looking into in terms of where to start, loads of free resources online. Reddit has an FAQ that's helpful: https://www.reddit.com/r/computerforensics/wiki/faq
This is the vet success program. They will let you take 3 programs off of scholarships. https://www.sans.org/about/academies/vetsuccess/
SANS CyberTalent Vet Success Academy equips veterans and active duty spouses with in-demand cybersecurity skills. Learn how the program works and how to apply.
👍 1
Avatar
ForensicDev 4/6/2021 10:34 AM
UsnJrnl question. I know the UsnJrnl is rolling out records fairly quick, yet what may cause the UsnJrnl to only have 2 days worth of records? On a Microsoft Surface Pro. (edited)
8:17 AM
Anybody know how to filter out images with no preview/thumbnail in Griffeye? I don't really care to see gray boxes.
Avatar
@Griffeye Would be interested to know also 😄
Avatar
Anyone know which DFIR channel QR Code security would be in?
Avatar
Avatar
Stormykun
Anyone know which DFIR channel QR Code security would be in?
Andrew Rathbun 4/7/2021 9:28 AM
might as well ask here 🤷‍♂️
Avatar
xD
9:29 AM
Well might anyone know methods to prevent QR code phishing ? Im currently doing my final year project on it
Avatar
other methods than identifying it manually of course
Avatar
ninjadeathsquad 4/7/2021 10:01 AM
Other than debugging the QR to see what’s inside it and then reverse engineer I’m not sure there is much else that can be done.
Avatar
Avatar
Stormykun
Well might anyone know methods to prevent QR code phishing ? Im currently doing my final year project on it
Typically a phone scanning the QR code will show you the URL it is going to and ask you to approve it. I guess its on the user at that point.
Avatar
I’m trying to express the importance of digital forensics to my command staff and why we should be doing more of it in-house. Does anyone have a PowerPoint expressing the importance of digital forensics in an investigation? I already started reaching out to the surrounding outsourced agencies we use for digital forensics and how many requests go out to them.
Avatar
Avatar
Cole
Anybody know how to filter out images with no preview/thumbnail in Griffeye? I don't really care to see gray boxes.
Just a thought, if you go to the grid view, isn't there a column titled something like "is viewable" or "can view" ? Filter the column and deselect the negative files.
this 1
Avatar
Avatar
Dfdan
Just a thought, if you go to the grid view, isn't there a column titled something like "is viewable" or "can view" ? Filter the column and deselect the negative files.
@Cole @Rob Exactly that, Dan! The column is called "Can Open" in Grid View. You could filter on that column, which would allow you to see only the unopenable files (where no thumbnail was generated), or filter only on valid files with thumbnails. Excluding files with dimensions smaller than 50 pixels during initial import processing will help quite a bit too. (edited)
👍 1
Avatar
Avatar
Griffeye
@Cole @Rob Exactly that, Dan! The column is called "Can Open" in Grid View. You could filter on that column, which would allow you to see only the unopenable files (where no thumbnail was generated), or filter only on valid files with thumbnails. Excluding files with dimensions smaller than 50 pixels during initial import processing will help quite a bit too. (edited)
Just to confirm, within "Filters" there's no such filter?
12:15 PM
Only via Grid View as a column?
Avatar
Avatar
Rob
Only via Grid View as a column?
That's correct. Filters tabs (on the right working pane) is kind of "Easy Mode" for filtering. There are more options available in Grid View, and you have a wider selection of operators in Grid View as well. The instructors are pretty strongly of the opinon that "Grid View is the Best View". 😉
Avatar
Avatar
dfir_rick
I’m trying to express the importance of digital forensics to my command staff and why we should be doing more of it in-house. Does anyone have a PowerPoint expressing the importance of digital forensics in an investigation? I already started reaching out to the surrounding outsourced agencies we use for digital forensics and how many requests go out to them.
Andrew Rathbun 4/7/2021 12:26 PM
ask them how many devices they own in their household. Imagine all the data that could be located about themselves, their family, etc. Suspects too have households full of devices and families who are screen addicted. If you want that evidence, then invest. If not, then enjoy not closing as many cases 🙂 (edited)
😎 1
Avatar
Valid point there! I come from a major city with roughly 1500 officers. I’m the only one who attended BCERT in 2019. But with out cellebrite premium and gk I’m very limited. Once detectives hear I cannot get into a locked device, they continue going to other agencies. I’ve started to reach out to the outside agencies for stats. I’m getting ready to prepare an argument and hopefully start a well funded unit.
Avatar
Avatar
dfir_rick
Valid point there! I come from a major city with roughly 1500 officers. I’m the only one who attended BCERT in 2019. But with out cellebrite premium and gk I’m very limited. Once detectives hear I cannot get into a locked device, they continue going to other agencies. I’ve started to reach out to the outside agencies for stats. I’m getting ready to prepare an argument and hopefully start a well funded unit.
Andrew Rathbun 4/7/2021 1:16 PM
I wish you the best of luck in that endeavor. Keep us informed and let us know if you have any more questions
Avatar
Avatar
Andrew Rathbun
I wish you the best of luck in that endeavor. Keep us informed and let us know if you have any more questions
Thank you, sir!
💯 1
Avatar
Avatar
Griffeye
That's correct. Filters tabs (on the right working pane) is kind of "Easy Mode" for filtering. There are more options available in Grid View, and you have a wider selection of operators in Grid View as well. The instructors are pretty strongly of the opinon that "Grid View is the Best View". 😉
Goodness! I didn't even think of filtering there because there's the "Easy Mode" right there. I'll be using Grid View from now on!! Thanks for the help! @Dfdan @Griffeye
Avatar
Are there any good digital forensic books and resource recommendations for beginners?
6:26 PM
I've been looking at "The Art of Memory Forensics" and "Digital Forensics Handbook" for books. But I'm not sure what books are worth the while (edited)
Avatar
Avatar
Jawsh Um
Are there any good digital forensic books and resource recommendations for beginners?
Andrew Rathbun 4/7/2021 6:26 PM
Introduction The world of Digital Forensics and Incident Response (DFIR) is so expansive that it’s impossible for one person to know it all, let alone a fraction of it. To combat this, one must first be aware of and second utilize the resource that’s best catered to the issue at hand. There are multiple resources […]
This has been an absolute long time coming from me, I think! The reason for this is during the crazy times we currently live in here in 2020, this is probably something I should have worked on much earlier to give folks a bit of a leg up on some reading material. Coming full circle, […]
Avatar
Does the date of publication matter? Like the 2005 file system forensics book
Avatar
Avatar
Jawsh Um
Does the date of publication matter? Like the 2005 file system forensics book
Andrew Rathbun 4/7/2021 6:28 PM
Negative. Still very relevant
6:28 PM
File systems I don't think have changed in that period of time. Referring to NTFS and the other big ones
6:29 PM
I'm sure I'm wrong in some regard but it's still very highly regarded
Avatar
Avatar
Andrew Rathbun
Negative. Still very relevant
Ah alright, that makes sense. I was thinking about if there were a few outdated tools of some sort
Avatar
Andrew Rathbun 4/7/2021 6:29 PM
@Brian Carrier wrote it
Avatar
Avatar
Andrew Rathbun
@Brian Carrier wrote it
Oh nice, I'll check them out thanks!
Avatar
Avatar
Andrew Rathbun
Thanks @Andrew Rathbun! Pretty new to this stuff lol
Avatar
Avatar
Jawsh Um
Thanks @Andrew Rathbun! Pretty new to this stuff lol
Andrew Rathbun 4/7/2021 6:36 PM
You're in the right place. Hang around and soak it in
Salute 3
Avatar
Humble#2244 4/7/2021 6:40 PM
DO NOT USE “HOME” VERSIONS OF MICROSOFT OPERATING SYSTEMS FOR YOUR FORENSIC/DATA RECOVERY WORKSTATION SETUP AT HOME.
6:40 PM
I found this instruction somewhere, can someone please explain why is that?
Avatar
Avatar
Humble#2244
I found this instruction somewhere, can someone please explain why is that?
Andrew Rathbun 4/7/2021 8:42 PM
Pro is for people to use at work, and Home is for personal machines. But what's the real difference? Let's take a look at Windows 10 Home vs Pro.
Avatar
Humble#2244 4/8/2021 12:33 AM
Thanks a lot
Avatar
Andrew Rathbun 4/8/2021 4:47 AM
Dear Valued Customers, We have some exciting news to share about Cellebrite’s future. Cellebrite has taken an important step forward on the path to becoming an independent, publicly traded company. Today we announced that we intend to merge with TWC Tech Holdings II Corp. (Nasdaq: TWCT), a Special Purpose Acquisition Company (“SPAC”) sponsored by an affiliate of San Francisco-based private equity fund True Wind Capital. The merger is expected to close in the second or third quarter of 2021 and, at that point, Cellebrite will be a public company and our stock will be listed on the Nasdaq and traded under the ticker symbol CLBT. This transaction will enable us to enhance our industry-leading Digital Intelligence investigative platform and related services, and help you run your investigations even more efficiently. The capital raised will be used to expand our ability to help you to protect and save lives, accelerate justice, and preserve privacy. This is an important day in Cellebrite’s history, and the entire team is looking forward to the opportunities that lie ahead. We deeply appreciate your continued support and look forward to building on our relationship in the future. Sincerely, Yossi Carmil | Cellebrite CEO
😮 3
cellebrite 5
Avatar
Who had stock options that worked at cellebrite anyone?
Avatar
Hi all! Anyone have any fun weekend plans involving DFIR? I'll be working on a course I'm developing. Can't say much about it, but I'm DAMN excited :). What are ya'll up to?
Avatar
FATHEAD7466 4/8/2021 9:52 AM
checking my Robinhood as we speak!😋
Avatar
kmacdonald1565 4/8/2021 9:52 AM
no disrespect, but typically work is the last thing on my mind unless i get called in or prepping for a class or court or something...that being said, my weekends involve a bunch of other work...never ending house work, second (& third sometimes?) jobs, and, with the exception of some gaming, a bunch of stuff off of a computer typically
Avatar
Avatar
FATHEAD7466
checking my Robinhood as we speak!😋
Did you end up buying after the news came out this morning?
Avatar
FATHEAD7466 4/8/2021 3:54 PM
bought when news came out.
3:54 PM
I will get the stock as recommended for the time line when it comeout
3:56 PM
@Michuu I got a whole pile of money sitting for investment (non stimulus). I burned my envelope when it came in.
Avatar
Avatar
rj_chap
Hi all! Anyone have any fun weekend plans involving DFIR? I'll be working on a course I'm developing. Can't say much about it, but I'm DAMN excited :). What are ya'll up to?
randomaccess 4/8/2021 4:19 PM
@rj_chap 👀👀👀
starecharlie 1
Avatar
Anyone know if there is a tool to extract metadata from a website? Or certificates and licenses the website has?
Avatar
Avatar
Stormykun
Anyone know if there is a tool to extract metadata from a website? Or certificates and licenses the website has?
randomaccess 4/8/2021 7:17 PM
like a domain? I generally use centralops/hexillion. VirusTotal also pulls cert/whois data
Avatar
danke
Avatar
Avatar
FATHEAD7466
@Michuu I got a whole pile of money sitting for investment (non stimulus). I burned my envelope when it came in.
Nice and now would be the time to buy since it is cheap
Avatar
@Cellebrite Hi, Where can I find your most recent published PA SupportedApps spreadsheets for iOS and Android, the most recent one I seem to have is 7.34. Thanks in advance
Avatar
Forensic@tor 4/9/2021 4:00 AM
@sky on the download tab under technical data sheets
Avatar
Thank you @Forensic@tor
Avatar
Avatar
sky
@Cellebrite Hi, Where can I find your most recent published PA SupportedApps spreadsheets for iOS and Android, the most recent one I seem to have is 7.34. Thanks in advance
CLB-drorimon 4/9/2021 4:58 AM
You can also find it under PA -> Help menu.
👍 1
Avatar
Avatar
kmacdonald1565
no disrespect, but typically work is the last thing on my mind unless i get called in or prepping for a class or court or something...that being said, my weekends involve a bunch of other work...never ending house work, second (& third sometimes?) jobs, and, with the exception of some gaming, a bunch of stuff off of a computer typically
KUDOS for you taking this approach! I live and breathe DFIR, sometimes to the detriment of my personal life. Sometimes == often. While it helps with career progression, golly it can suck sometimes.
Avatar
kmacdonald1565 4/9/2021 12:22 PM
prior to covid, i would work probably an extra 20 - 40 minutes a day, voluntarily. averaging about 20 minutes of working day. that added up to ~62 hours in a year. i try not to do that anymore
Avatar
Hi, I am currently a student at University of South Wales on my final year project in Computer Forensics. My project is about creating a guide on how to gain shell access on an IP Camera using UART. I have created a survey that contains 15 questions regarding IP Cameras in digital forensics. Anyone can answer this survey, even if one have not done any forensics on an IP Camera and it is completely anonymous. This survey is to create a picture of how common IP Cameras are in investigations. It is also to build a picture on how many investigators have done investigations on IP Cameras or not, and if there are people who are not investigators that also have done this or not. If you got a couple of minutes to spare I would appreciate any response to the survey, thank you. https://docs.google.com/forms/d/e/1FAIpQLSdrtSz2zArf4rLZ80mbdesO4n7HL-s52C1VypsZXQ77uRdEzw/viewform?usp=sf_link
The purpose of this survey is to identify how common IP Cameras are in digital forensics. Participation is voluntary and you may withdraw at any time. No sensitive data will be collected during this study, however if you are uncomfortable answering any questions you may stop at any time. All information provided will be held in confidence, in ...
Avatar
Beginner here. My brother is well-versed in computer forensics. He's challenged me to wipe an SSD and he's gonna check how well of a job I did. What's the best way I can go about this? I heard something about partedmagic
Avatar
Avatar
presti9999
Beginner here. My brother is well-versed in computer forensics. He's challenged me to wipe an SSD and he's gonna check how well of a job I did. What's the best way I can go about this? I heard something about partedmagic
Andrew Rathbun 4/10/2021 6:54 PM
Eraser works fine, too.
6:54 PM
wipe it 32 times or something silly like that
Avatar
Thank you bro
Avatar
KillSwitchX7 4/10/2021 8:57 PM
I wanna learn more about Indicators Of Compromise (IOCs) , any resources on that ?! (edited)
Avatar
Avatar
KillSwitchX7
I wanna learn more about Indicators Of Compromise (IOCs) , any resources on that ?! (edited)
let's talk in #cyber-threat-intelligence
👍 1
Avatar
Avatar
presti9999
Beginner here. My brother is well-versed in computer forensics. He's challenged me to wipe an SSD and he's gonna check how well of a job I did. What's the best way I can go about this? I heard something about partedmagic
Digitalferret 4/11/2021 1:39 AM
might be an idea to check the manufacturers website for their own toolset. usually includes ATA Secure Erase tool/command, if they don't give Parted Magic a go. it's for $$ now, but imho, well worth the $11 or so. last available free version can be found here https://www.majorgeeks.com/files/details/parted_magic.html or for pay, partedmagic.com .
1:40 AM
also Importantly, the ATA Secure Erase command does not write anything to the SSD, unlike a traditional secure wipe tool. Instead, the command causes the SSD to apply a voltage spike to all available flash memory blocks in unison. The process resets every available block of space in a single operation, and the SSD is "clean." Using the ATA Secure Erase command does use a whole program-erase cycle for your SSD. So yes, it does cause a small amount of wear, but it is negligible in comparison to a traditional secure wipe tool. taken from https://www.makeuseof.com/tag/securely-erase-ssd-without-destroying/
SSDs can only be written to a limited number of times. Then how can you securely erase your SSD? Here's what you need to know!
9:49 PM
its free ❤️
Avatar
Hello everyone ! I have a processor 18 physical cores and 36 logicals. Do you know in the setting of BlackLight and Axiom if I can set only physical for "number of processor" or logicals works fine too ?
Avatar
@AnTaL it's number of threads available as far as i rememer, at least in Axiom. 36 should be fine if you want to use all of them
Avatar
@Arcain Thank you !
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 4/13/2021 4:58 AM
#training-education-employment
Avatar
Avatar
Andrew Rathbun
#training-education-employment
Deleted and moving. Sorry.
Avatar
Avatar
DocFiPS
Deleted and moving. Sorry.
Andrew Rathbun 4/13/2021 5:05 AM
No apologies needed, just trying to keep things organized 😛
Avatar
Trust me, I get it. Not finished my coffee yet this morning.
Avatar
So I all ready have sent error logs to Cellebrite but was wondering if anyone else was seeing these errors in Windows error log. I did complete uninstall Cellebrite and when I reinstalled even used the most recent version. This error keeps repeating so it is impossible to see any other window log errors.
7:41 AM
Avatar
Hi, thanks to a specific combination of buttons, the following animation appears on the device. Could you kindly explain which operating systems is?
1:07 AM
Avatar
Avatar
manuelevlr
Click to see attachment 🖼️
Oxygen Forensics 4/15/2021 2:06 AM
Hi guys, I made those bootanimations for my personal use but I thought to share them. They will work on any resolution, but they might be displayed too big or too small depending on your resolution. If you don't like the original size, you can...
2:07 AM
Just an Android bootloader animation
Avatar
Deleted User 4/15/2021 3:34 AM
If the fbi wants you to work as an informant is it normal for them to stop by, ask a few questions and give you their phone number and email address? The email address ended in fbi.gov
👀 2
Avatar
Avatar
manuelevlr
Click to see attachment 🖼️
Pretty sure you found the new Death Star plans.
Avatar
FATHEAD7466 4/15/2021 6:29 AM
Exactly what I was thinking!!
6:29 AM
@Cole 😋
Avatar
@Cole That was my first thought as well lol.
Avatar
Deleted User 4/15/2021 6:46 AM
@Cole not enough holes
6:46 AM
The real plans are in my smelly basement
Avatar
@Cellebrite any chance to get a temporary licence for a french officer for monday? (edited)
8:28 AM
just pingin here to get someone helpful 😄
Avatar
Yep dm me and ill@put in contact right person
Avatar
Now that CCleaner no longer let's you wipe free space on your OS. What is another good tool for cleaning OS between exams and wiping the free space?
Avatar
Avatar
Palazar82
Now that CCleaner no longer let's you wipe free space on your OS. What is another good tool for cleaning OS between exams and wiping the free space?
Maybe the cipher command built into windows. cipher /w:<directory> https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/cipher
Reference article for the cipher command, which displays or alters the encryption of directories and files on NTFS volumes.
👍 1
Avatar
Had not heard of this, thank you.
Avatar
elizavetabelkasoft 4/15/2021 9:48 AM
GREAT NEWS: Belkasoft announces the release of a new product, called Belkasoft Remote Acquisition (Belkasoft R for short)! The new product is designed to help incident responders and digital forensic investigators remotely acquire a variety of devices in a forensically sound manner. Learn the details about Belkasoft R and request the beta-version right now at https://bit.ly/32hpBer 🌎Investigations are without borders with Belkasoft!
Avatar
data_grizzly 4/15/2021 1:58 PM
Happy Thursday - looking for recommendations for a point-and-click camera for documenting case work. I purchased a Sony DSC-W800 as reviews were decent and price was $100. This camera is a piece of shit, 1 out of 5 pics comes out, the rest are blurry, too low light, and I end of taking 6 pictures to get one decent shot. My old iPhone 8 works much better wtf. I am not looking to become a photographer just need something that can capture serial numbers, the basics 📸 (edited)
Avatar
Avatar
data_grizzly
Happy Thursday - looking for recommendations for a point-and-click camera for documenting case work. I purchased a Sony DSC-W800 as reviews were decent and price was $100. This camera is a piece of shit, 1 out of 5 pics comes out, the rest are blurry, too low light, and I end of taking 6 pictures to get one decent shot. My old iPhone 8 works much better wtf. I am not looking to become a photographer just need something that can capture serial numbers, the basics 📸 (edited)
I have the exact same issue I would love to hear a recommendation as well. Right now I have to take ~50 photos per phone including attached cards, make/model info, etc, for my reports just to choose the 6 non blurry ones. Also, figuring out how to prevent reflections when photographing the screens and super reflective phones has been interesting. Currently I hold a piece of cardboard above the phone and out of frame so I am not photographing my office in the reflection. (edited)
👍 1
Avatar
Avatar
FullTang
I have the exact same issue I would love to hear a recommendation as well. Right now I have to take ~50 photos per phone including attached cards, make/model info, etc, for my reports just to choose the 6 non blurry ones. Also, figuring out how to prevent reflections when photographing the screens and super reflective phones has been interesting. Currently I hold a piece of cardboard above the phone and out of frame so I am not photographing my office in the reflection. (edited)
Maybe convert a test phone to use as a camera. My phone takes way better pictures than my point and shoot.
😅 1
👍 1
Avatar
Avatar
Joe Schmoe
Maybe convert a test phone to use as a camera. My phone takes way better pictures than my point and shoot.
AzuleOnyx🛡 4/15/2021 5:41 PM
My wife was pointing out the TG5 or TG6 ... since it does macro shots and is nearly unbreakable. It's a nice point-in-shoot. It runs around $500 but you may need the light attachment as well which runs about $34.
5:42 PM
It's more then you may want to spend, but she keeps wanting one (for years ... lol). Though, since she has a Sony A7ii ... I won't let her get it just yet.
Avatar
Avatar
data_grizzly
Happy Thursday - looking for recommendations for a point-and-click camera for documenting case work. I purchased a Sony DSC-W800 as reviews were decent and price was $100. This camera is a piece of shit, 1 out of 5 pics comes out, the rest are blurry, too low light, and I end of taking 6 pictures to get one decent shot. My old iPhone 8 works much better wtf. I am not looking to become a photographer just need something that can capture serial numbers, the basics 📸 (edited)
We use a Canon IXUS 185, as long you hold it still and give it good lighting its fine. Perhaps you may want to invest in a mini tripod?
Avatar
Avatar
data_grizzly
Happy Thursday - looking for recommendations for a point-and-click camera for documenting case work. I purchased a Sony DSC-W800 as reviews were decent and price was $100. This camera is a piece of shit, 1 out of 5 pics comes out, the rest are blurry, too low light, and I end of taking 6 pictures to get one decent shot. My old iPhone 8 works much better wtf. I am not looking to become a photographer just need something that can capture serial numbers, the basics 📸 (edited)
Digitalferret 4/16/2021 1:17 AM
needs more light / mini tripod / anti shake function. blurry pics: auto settings giving too slow a shutter speed as a function of too little light.
Avatar
Digitalferret 4/16/2021 1:41 AM
or find a way to brace the camera, like putting your elbows on the desk as you shoot.
Avatar
Avatar
FullTang
I have the exact same issue I would love to hear a recommendation as well. Right now I have to take ~50 photos per phone including attached cards, make/model info, etc, for my reports just to choose the 6 non blurry ones. Also, figuring out how to prevent reflections when photographing the screens and super reflective phones has been interesting. Currently I hold a piece of cardboard above the phone and out of frame so I am not photographing my office in the reflection. (edited)
Digitalferret 4/16/2021 1:46 AM
card is a great solution to reflections, that or the sprung out reflector/shader gadget. if your camera has a filter holder (maybe not if it's a point and shoot) try a polarising filter; or MacGyver a means to attach one.
1:48 AM
👍 2
Avatar
Anyone know how long Amazon retains their IP address records for?
Avatar
Avatar
Digitalferret
card is a great solution to reflections, that or the sprung out reflector/shader gadget. if your camera has a filter holder (maybe not if it's a point and shoot) try a polarising filter; or MacGyver a means to attach one.
FYI the polarizer will reduce the incoming light by about 50%, so if you already have low light issues, a polarizer will not help. However, a polarizer is perfect for getting rid of some reflections! To reduce blur the best thing is to get more light on the subject. That way you can use a faster shutter speed. Have someone hold a powerful flashlight at your subject and you'll be surprised at how well the shots come out. Also, if you're trying to photograph textures (such as microSD serial numbers), hold the light source to the side of the subject and you'll see it much better.
8:24 AM
👍 3
👍🏻 1
8:25 AM
This is the same card. First photo has direct light, second has light from an angle.
Avatar
All great tips, thanks everyone! It is funny how digital forensics forces you to learn photography tricks and buy guitar picks and dental tools.
Avatar
Avatar
Cole
FYI the polarizer will reduce the incoming light by about 50%, so if you already have low light issues, a polarizer will not help. However, a polarizer is perfect for getting rid of some reflections! To reduce blur the best thing is to get more light on the subject. That way you can use a faster shutter speed. Have someone hold a powerful flashlight at your subject and you'll be surprised at how well the shots come out. Also, if you're trying to photograph textures (such as microSD serial numbers), hold the light source to the side of the subject and you'll see it much better.
Digitalferret 4/16/2021 10:07 AM
you are quite right, re polarizer. my second point was for reflections only. the blur comment was in the earlier post : 'more light / mini tripod / anti shake'
Avatar
Avatar
Digitalferret
you are quite right, re polarizer. my second point was for reflections only. the blur comment was in the earlier post : 'more light / mini tripod / anti shake'
Yep, I saw your earlier comment. Was replying to your post to connect my comment to the conversation, not target you.
👍🏻 1
1:09 PM
Ever see this before? Appear to be sim cards.
1:12 PM
Figured it out, it's a R-sim 12 for unlocking iphones apparently.
Avatar
Cool never seen those before
Avatar
I feel silly now for not reading the purple plastic. But they fit so poorly inside I didn't think they came in those plastic cases.
😅 2
Avatar
AzuleOnyx🛡 4/16/2021 2:31 PM
@GRIZZ I think we've all done that with random things we have 'acquired'
Avatar
CptWaistcoat_57354 4/16/2021 2:58 PM
Does anyone know what distinguishes the Protection of Children Act 1978 versus the section 160 of the Criminal Justice Act 1988, given that both have a mental and physical element. The older legislation is broader in terms of what could be considered under the offence, and carries a more significant sentence for files which may in fact be inaccessible to the user, yet evidencing accessibility under the newer legislation carries a lesser sentence? Does one over ride the other?
Avatar
Anyone know how to extract evidence from a vhd file using autopsy or FTK imager (edited)
Avatar
Avatar
Brother O
Anyone know how to extract evidence from a vhd file using autopsy or FTK imager (edited)
Don't know about FTK Imager but could you not try convert the vhd image to a raw format to use with Autopsy? qemu-img (and probably other tools) can convert VHD images to raw format easily and you could then work on them with Autopsy/The Sleuth Kit. I did that with qcow2 disk images, converted them to raw format and then used TSK to do some analysis. Try googling qemu-img and see if it's any help.
Avatar
ok
Avatar
https://techpiezo.com/linux/convert-disk-images-to-various-formats-using-qemu-img/ maybe this will be helpful. This should be available on Windows but I used it on a Linux system
In this article, we would focus on how to convert disk images like qcow2, raw, vdi & vmdk to various formats using command-line utility qemu-img in Ubuntu.
Avatar
randomaccess 4/17/2021 12:09 AM
@Brother O ftk imager should support it natively or make a copy, mount with windows, open as a physical disk
Avatar
Hey everyone....I'm wondering if anyone has a checklist on how to conduct a malware investigation on a mobile device. Long story short...my organization currently doesn't do malware investigations but I'm looking for a resource that I can put in front of my leadership to show them everything that goes into it and that it's going to require a lot of training for us to do this the correct way. Thanks.
Avatar
burgers_N_bytes 4/17/2021 7:54 AM
Can someone point me in the direction of some Apple documentation that points to where iOS gets its clock time information from? Thanks.
Avatar
data_grizzly 4/17/2021 10:05 AM
@FullTang exactly. @Joe Schmoe was actually thinking of that, doesnt make sense my Sony camera is same megapixels as iPhone 8, but iPhone 8 takes way better pics. Will check out Canon IXUS 185, thank you @Rob I will research that. That sounds like what I want, just point shoot move on. I got my wife a Canon Rebel for christmas but I thought something like that would be overkill for forensics, but based on price you said I will see! Thanks also for mentioning filters, jesus looks like im gonna have to become Ansel Adams whether I want to or not
👍 1
Avatar
LαȥყTσɯɳTҽƈԋιҽ★ 4/17/2021 10:12 AM
Can someone explain to me what the difference is between conducting digital forensics on a USB drive and on a laptop or smartphone, related articles would be appreciated.
Avatar
Avatar
data_grizzly
@FullTang exactly. @Joe Schmoe was actually thinking of that, doesnt make sense my Sony camera is same megapixels as iPhone 8, but iPhone 8 takes way better pics. Will check out Canon IXUS 185, thank you @Rob I will research that. That sounds like what I want, just point shoot move on. I got my wife a Canon Rebel for christmas but I thought something like that would be overkill for forensics, but based on price you said I will see! Thanks also for mentioning filters, jesus looks like im gonna have to become Ansel Adams whether I want to or not
Digitalferret 4/17/2021 12:41 PM
other than getting "a complete dog" of a camera it's just as much, if not more, about familiarising with your setup. i just bought c$2k's worth of (used) DSLR and lens to replace a recently deceased pocket camera and bridge camera (started in 1980 w/ film). on holiday atm and have more blurred pics than good while I'm getting used to the controls. i guess iPhone has better "guess the best settings" tech than pocket cams these days but once you get to grips, the camera will likely be more versatile. btw, what's price diff between iPhone and <small pocket camera> nowadays?
Avatar
Avatar
burgers_N_bytes
Can someone point me in the direction of some Apple documentation that points to where iOS gets its clock time information from? Thanks.
ninjadeathsquad 4/17/2021 11:05 PM
Apple use their own NTP server time.apple.com - https://support.apple.com/en-us/HT210060
Learn which hosts and ports are required to use your Apple products on enterprise networks.
Avatar
burgers_N_bytes 4/17/2021 11:15 PM
@ninjadeathsquad you sir are awesome! That’s exactly what I was looking for. Thank you!
Avatar
ninjadeathsquad 4/17/2021 11:18 PM
Glad to assist 👍🏻
Avatar
Anyone good at using FTK imager?
Avatar
@Brother O what are you trying to accomplish?
11:29 AM
Have you tried opening a copy of the vhd with a program like 7zip?
11:29 AM
I did that with a virtual machine recently and you can just export the partition or files you want
Avatar
ive opened it and gotten to the root file
11:30 AM
but i need to get evidence from it and i dont know how
11:30 AM
like im seeing a lot of desktop.ini files
11:30 AM
and some shell text
Avatar
What kind of files are you trying to find? User data files or user activity logs? What is the goal?
Avatar
yh
11:40 AM
the activity and data files
Avatar
Anybody using an external GPU enclosure with their forensic laptops? Looking for practical advice or pros and cons. The goal is to hopefully speed up processing and media categorization.
Avatar
Need a presentation on mobile security and wireless security... Can anyone help
Avatar
Avatar
santkhad2
Need a presentation on mobile security and wireless security... Can anyone help
DeeFIR 🇦🇺 4/19/2021 12:38 AM
No one is going to help you if you spam the same question across multiple channels without providing any context or insight into why you're asking. On the face of it, it appears as though you're asking someone to do your work for you.
💯 3
Avatar
@Magnet Forensics could one of the Magnet guys please DM me regarding a Chromebook acquisition?
Avatar
Deleted User 4/19/2021 3:31 AM
Is there any way I can help law enforcement as a civy?
Avatar
Avatar
Deleted User
Is there any way I can help law enforcement as a civy?
Andrew Rathbun 4/19/2021 4:08 AM
Larger agencies usually have civilian examiners whereas smaller ones don't, in my experience
Avatar
Avatar
Deleted User
Is there any way I can help law enforcement as a civy?
Digitalferret 4/19/2021 4:43 AM
yes: you might not want to even "go there" though. https://www.bbc.com/news/uk-england-birmingham-48615274
A police force is seeking volunteers willing to sift through distressing and indecent images.
4:44 AM
A police force's appeal for volunteer digital forensic analysts has been branded a "disaster waiting to happen".
😀 2
Avatar
Avatar
DeeFIR 🇦🇺
No one is going to help you if you spam the same question across multiple channels without providing any context or insight into why you're asking. On the face of it, it appears as though you're asking someone to do your work for you.
I think you have misunderstood. Anyways point taken.
Avatar
elizavetabelkasoft 4/19/2021 8:24 AM
Use Belkasoft Remote Acquisition. Start with beta-version now! ✅ With Belkasoft R, there is no longer a need to interrupt an employees' daily routine or draw excessive attention to your investigation. ✅ No more geographical challenges and expensive trips. ✅No need in having trained specialists in all locations of your organization’s offices. ✅ Belkasoft R saves your time and money doing forensically sound remote acquisitions: no more excessive costs and extra time for travels. 🔥Belkasoft R is now available as beta-version. Use it to your advantage and make your contribution in developing the new DFIR product! Request a beta at https://bit.ly/32hpBer
Avatar
Avatar
Digitalferret
other than getting "a complete dog" of a camera it's just as much, if not more, about familiarising with your setup. i just bought c$2k's worth of (used) DSLR and lens to replace a recently deceased pocket camera and bridge camera (started in 1980 w/ film). on holiday atm and have more blurred pics than good while I'm getting used to the controls. i guess iPhone has better "guess the best settings" tech than pocket cams these days but once you get to grips, the camera will likely be more versatile. btw, what's price diff between iPhone and <small pocket camera> nowadays?
data_grizzly 4/19/2021 8:37 AM
Funny you should ask - I priced an older iPhone Xs to use as a standalone camera - $500 Same as a Canon / DSLR haha pretty much equal cost. Enjoy your holiday Cheers
Avatar
Avatar
data_grizzly
Funny you should ask - I priced an older iPhone Xs to use as a standalone camera - $500 Same as a Canon / DSLR haha pretty much equal cost. Enjoy your holiday Cheers
Digitalferret 4/19/2021 8:48 AM
cheers, not bad then, for a multi-task device. camera/phone/watch/everything-else. i'm old: i like things to do a single job and do it well. reminds me, where's the blimmin abacus gone? 🙂
😂 1
Avatar
LαȥყTσɯɳTҽƈԋιҽ★ 4/19/2021 10:10 AM
Does anyone know how to find the last time your computer was turned on in the registry on windows?
10:10 AM
I'm assuming it's somewhere in SYSTEM and not SOFTWARE Am I wrong?
Avatar
Little4n6Fox 4/19/2021 10:52 AM
does someone use bluethooth, GSM or other scanners to find hidden devices during an operation?
Avatar
ninjadeathsquad 4/19/2021 11:07 AM
Yes. I leave a burner running Wigle in my EDC.
Avatar
thatboy_leo 4/19/2021 11:15 AM
Never encountered this request, after I do an imaging for a personal laptop, remove ex-company files from a date range.
11:16 AM
Should I be removing files from my image or from the source hd once I find files that need to be deleted?
Avatar
anyone got a forensics report template i can use? (edited)
Avatar
Avatar
thatboy_leo
Should I be removing files from my image or from the source hd once I find files that need to be deleted?
Digitalferret 4/19/2021 1:38 PM
maybe get more info and background from the guy about the situation? ie what he's trying to achieve /why/legalities etc
Avatar
Avatar
Digitalferret
maybe get more info and background from the guy about the situation? ie what he's trying to achieve /why/legalities etc
thatboy_leo 4/19/2021 3:45 PM
Looks like they’re switching companies. I don’t have all the details but they were using personal devices for work and the company wants to be sure no HIPPA data remains on the device
3:45 PM
I hope it’s not more intricate then files such as PDFs, word, images, etc.
Avatar
Avatar
Brother O
anyone got a forensics report template i can use? (edited)
Andrew Rathbun 4/19/2021 5:24 PM
@JonasWanobi maybe?
Avatar
Avatar
thatboy_leo
Looks like they’re switching companies. I don’t have all the details but they were using personal devices for work and the company wants to be sure no HIPPA data remains on the device
Digitalferret 4/19/2021 6:23 PM
unless they made provision for doing exactly that, it sounds like they are asking you to un-screw up for them, like untangle this bowl of spaghetti pls :/ Maybe ask how they differentiated whose data is stored where? might also be more expedient to archive their personal files and wipe the drive and re-install the system & software and be sure the onus of responsibility to lay with themselves? I'd be looking to protect my <your> own self first and foremost and follow their explicit instruction rather than interpret for them. just my aged and cynical 2c, no privacy HIPAA expert here.
Avatar
Avatar
Digitalferret
unless they made provision for doing exactly that, it sounds like they are asking you to un-screw up for them, like untangle this bowl of spaghetti pls :/ Maybe ask how they differentiated whose data is stored where? might also be more expedient to archive their personal files and wipe the drive and re-install the system & software and be sure the onus of responsibility to lay with themselves? I'd be looking to protect my <your> own self first and foremost and follow their explicit instruction rather than interpret for them. just my aged and cynical 2c, no privacy HIPAA expert here.
thatboy_leo 4/19/2021 6:25 PM
Haha I’m still green to the field so that could be what’s going on with them. The reverse option might be easier, since I’m just worried deleted company files could linger in unallocated data. I could just overwrite entire drive after getting his data out of it
6:26 PM
And I ain’t messing with nothing unless they give me that authority
💯 1
Avatar
Andrew Rathbun 4/19/2021 6:41 PM
Waterloo-based cybersecurity company Magnet Forensics plans to go public with an initial public offering (IPO) aimed at raising CDN$90 million, according to a prospectus filed yesterday. The proposed offering would see the company’s shares trade on the TSX under the symbol MAGT. The company plans to offer between 5,625,000 and 6,428,571 shares p...
magnetforensics_alt 5
Avatar
Avatar
thatboy_leo
Haha I’m still green to the field so that could be what’s going on with them. The reverse option might be easier, since I’m just worried deleted company files could linger in unallocated data. I could just overwrite entire drive after getting his data out of it
Digitalferret 4/20/2021 12:37 AM
all good. i'm nr to 60 and still consider myself somewhat "green" 🙂
😂 1
12:38 AM
tech advances quicker than we do, seems like if you stop for any length of time to actually "do other things" you can quite easily fall behind
Avatar
Avatar
LαȥყTσɯɳTҽƈԋιҽ★
Does anyone know how to find the last time your computer was turned on in the registry on windows?
I'm not sure if that is available in the registry, only last shutdown time as far as i know. If you have the event logs you can use nirsofts tool: https://www.nirsoft.net/utils/computer_turned_on_times.html
Windows tool that allows you to view the time/date ranges that your computer was turned on
Avatar
anyone use command prompt?
2:21 AM
sort -r Script.txt > sorted.txt why isnt this working? (edited)
Avatar
Avatar
Brother O
anyone use command prompt?
randomaccess 4/20/2021 4:28 AM
Sort /r script.txt
Avatar
do you also know how to use the more command to ouput from a certain line (edited)
Avatar
I am pleased to announce the launch of Medex, a video source identification and authentication tool on May 1. If you conduct examinations where identifying the source type of device and method of transmission (i.e. this video came from an Apple iPhone 8 via WhatsApp) of video files would be helpful, we want to hear from you! Medex is currently seeking a core group of users to provide feedback about the platform. Participants will receive special software pricing and other rewards. A limited number of users will be selected within the next few weeks. Sign up at https://bit.ly/3tyqICA or feel free to shoot me a DM for more info.
Thank you for your interest in participating in Medex's inner circle to test new product development and provide feedback. Participants will receive special software pricing and other rewards to participate. Please complete the following information and we will contact you with further updates and instructions.
Avatar
Deleted User 4/20/2021 5:51 AM
Does anyone know if I can get a indication when a android was last factory reset by checking it manually?
Avatar
ninjadeathsquad 4/20/2021 7:09 AM
If I had a device and no forensic image and wanted to guess the last reset I would look at the timestamp of the very first image taken on the device.
Avatar
Has anyone here ever made a digital forensic report?
11:37 AM
pls i need a template 😢 or at least subheading😫 (edited)
11:43 AM
PLEASE
Avatar
ninjadeathsquad 4/20/2021 11:50 AM
Something like this should work: intro, acquire, methodology, findings, summary. Number pages so 3rd parties can quick reference. Cover every detail eg used Guymager V 0.8.12 to image SSD S/N 123456.
👍 1
Avatar
“How do I write a good DFIR report?” – Literally Everyone at some point You wouldn’t believe how many times that ... Read moreWriting DFIR Reports: A Primer
👍🏻 2
Avatar
Avatar
ninjadeathsquad
Something like this should work: intro, acquire, methodology, findings, summary. Number pages so 3rd parties can quick reference. Cover every detail eg used Guymager V 0.8.12 to image SSD S/N 123456.
Yes, provide more detail than you think is necessary as long as it is accurate. Some of the things I need to do for my reports make me shake my head but thats how detailed we have to be.
👍🏻 1
Avatar
Might be different over there
12:54 PM
But I find less info the better
Avatar
have you got like a formal case template that I can put like case numbers in and stuff? (edited)
Avatar
Sadly nothing that could be shared
Avatar
just to make it look legitimate (edited)
12:56 PM
i dont need the information just the layout and design
Avatar
But in a sense, its intro (who you are, who you work for), purpose of examination, exhibits you actually looked at, table of what you found if csam (if csam job), creation dates for csam, then summary findings for internet history etc and extra if there's anything else.
12:58 PM
Then at the end what reports you made
12:58 PM
I'll see if I can put together a mock up template tomorrow.
Avatar
alright
Avatar
what do you call the suspects in a report
3:01 PM
like is it perpetrator or suspect? (edited)
Avatar
Tbf, I just use their name
3:02 PM
Or suspect
Avatar
but i dont know the persons name so suspect it is
👍 1
Avatar
You could use the owner of the device
Avatar
but the owner of the device has a alias name kinda thing
Avatar
Or user of the device at the time.
Avatar
most of the persons files are deleted and i only have one folder of his/her the rest is with others
3:11 PM
so i cant really find a name other than the windows username (edited)
Avatar
State what you can factually then, that's the main part.
Avatar
last question on average how many words is a report?
Avatar
Few thousand. Not a ton really.
3:16 PM
Depends
3:16 PM
Typically 2-3 pages
3:17 PM
At least from what I've seen
Avatar
is anyone available who doesn't mind proofreading my report please (edited)
3:26 PM
its not long
Avatar
Humble#2244 4/20/2021 3:54 PM
sure
Avatar
randomaccess 4/20/2021 10:22 PM
@Brother O really curious what school this assignment is for
👍🏻 1
Avatar
Avatar
randomaccess
@Brother O really curious what school this assignment is for
Warwick university
Avatar
Avatar
Brother O
Warwick university
ninjadeathsquad 4/21/2021 2:28 AM
Can DM if you still need a proofreader
Avatar
Ok
Avatar
Hi all. What’s the best way to recover emails from a greykey extraction?
2:40 AM
Sorry parse should be the word
Avatar
Avatar
john_doe
Hi all. What’s the best way to recover emails from a greykey extraction?
what mail application
Avatar
Hello All! If you are involved in digital forensics and not already following this case, I recommend that you start: https://www.washingtonpost.com/world/asia_pacific/india-bhima-koregaon-activists-jailed/2021/02/10/8087f172-61e0-11eb-a177-7765f29a9524_story.html and most recently https://www.washingtonpost.com/world/2021/04/20/india-bhima-koregaon-activists-report. We posted some technical details related to email attacks this morning at https://twitter.com/ArsenalArmed.
👍 1
Avatar
Thoughts on Signal CEO exploiting vulns in Cellebrite? https://signal.org/blog/cellebrite-vulnerabilities/
Cellebrite makes software to automate physically extracting and indexing data from mobile devices. They exist within the grey – where enterprise branding joins together with the larcenous to be called “digital intelligence.” Their customer list has included authoritarian regimes in Belarus, Russi...
😬 11
👏 2
Avatar
Avatar
kdog
Thoughts on Signal CEO exploiting vulns in Cellebrite? https://signal.org/blog/cellebrite-vulnerabilities/
Ouch. This is a huge problem if true. What is the value of an extraction....... if the device which generates them is full of flaws?
Avatar
RandyRanderson 4/21/2021 11:20 AM
The addition of fake files to dork with the extractions are going to be problematic if true. Could stop the extraction process midway without the user knowing
11:20 AM
Or deface the report with a watermark that can’t be removed
Avatar
Mr. Eddie Vedder from Accounting 4/21/2021 11:33 AM
I will give them props for using all those Hackers reference. I always appreciate such fine taste in cinema.
😎 1
Avatar
Hey guys, long time listener, first time caller 😆 I'm trying to figure out a resource or just in general what the significance of the factory.db associated with the coreLocation.framework on iOS?
Avatar
skysafe-josh 4/21/2021 12:26 PM
looking for a recommendation or link to a good android rooting util. I have searched but found only junk and bloatware...
Avatar
Forensic@tor 4/21/2021 12:30 PM
TWRP (https://twrp.me/) and XDA (https://www.xda-developers.com/) are great resources for rooting
This is the Team Win website and the official home of TWRP! Here you will find the list of officially supported devices and instructions for installing TWRP on those devices.
Avatar
skysafe-josh 4/21/2021 12:32 PM
thx
Avatar
Avatar
ChutzpahAI
Hey guys, long time listener, first time caller 😆 I'm trying to figure out a resource or just in general what the significance of the factory.db associated with the coreLocation.framework on iOS?
Andrew Rathbun 4/21/2021 1:06 PM
try #mobile-forensic-decoding
Avatar
Avatar
kdog
Thoughts on Signal CEO exploiting vulns in Cellebrite? https://signal.org/blog/cellebrite-vulnerabilities/
this is aouch!
Avatar
Avatar
RandyRanderson
The addition of fake files to dork with the extractions are going to be problematic if true. Could stop the extraction process midway without the user knowing
ninjadeathsquad 4/21/2021 1:41 PM
A savvy attorney might read the linked story and dispute the validity of any forensic report where Cellebrite was used. Marlinspike is adept at chess. And timing.
Avatar
Avatar
ninjadeathsquad
A savvy attorney might read the linked story and dispute the validity of any forensic report where Cellebrite was used. Marlinspike is adept at chess. And timing.
RandyRanderson 4/21/2021 1:53 PM
Absolutely agree. It’s gonna be rough, especially for private sector when dealing with million dollar legal entities fighting over validity of extractions. Especially iPhones if it used that DLL outside of terms
Avatar
RandyRanderson 4/21/2021 2:17 PM
This also makes me wonder what Magnets response would be too....axiom parses it too does it not? Not sure if they do the scanning or not. Guess it’s time to to test lol
Avatar
Mr. Eddie Vedder from Accounting 4/21/2021 3:40 PM
I think someone’s just a little hurt CB began decrypting their messages. You claim altering “past and future reports”’without altering checksums on reports show me that and not a dialog box. You want to hurt their credibility show me that so defense can make the argument, don’t make vague threats of randomly including the exploited file in some signal downloads. CB gonna go back in and patch stuff (they probably did more harm mentioning outdated plugins). In the end Cellebrite got someone’s money (either Signal bought a kit or knew someone who did) and a free vulnerability check. I think the bigger whoop, like Randy said, is the DLL’s I’m sure somewhere in an Apple agreement it’s a no-no.
this 4
👍 1
Avatar
RandyRanderson 4/21/2021 4:29 PM
I would guess they have PoC for this and just sitting on it. Like most bug bounty type stuff — don’t tip your hand unless the company is willing to pay up and not sue. Which....ya...
Avatar
Looks like CB is working on some fixes, who knows at this point https://twitter.com/TheRegister/status/1385011741772238852
UPDATE: After @signalapp's @moxie highlighted exploitable vulnerabilities in Cellebrite's phone-probing tools, a spokesperson told us it will "continually audit and update our software in order to equip our customers with the best digital intelligence solutions available."🤔 https://t.co/LPwwL0LBBW
Avatar
Avatar
stark4n6
Looks like CB is working on some fixes, who knows at this point https://twitter.com/TheRegister/status/1385011741772238852
RandyRanderson 4/21/2021 5:13 PM
Little egg on the face keeps ya humble...sucks. But hopefully makes them a better company and product
👍 1
Avatar
Cellebrite has been going downhill for years. Their support is garbage now and it's impossible to get any tech on the phone who knows what they are talking about. I used to be able to call and talk to the guy who wrote the bootloader exploit for a Samsung phone, now I have to deal with level 1 support who asks me if I'm using the right cable or if iTunes is up to date. They went real corporate real fast
5:42 PM
No surprise they don't have any internal pentesting or security audits done
Avatar
thatboy_leo 4/21/2021 7:40 PM
The only paid license we have in our office is Cellebrite. Just got my Cellebrite certifications 😦
Avatar
@Law Enforcement [UK] UK people - do you upload to the case file or provide your examination contemp notes as standard?
Avatar
Retain in case file. Can be provided upon request
👍 2
Avatar
^^^^this
Avatar
Section 7.8.1.3 of ISO17025:2017 refs
Avatar
what's it say, don't have ISO 😄
Avatar
Be aware of CPIA CoP section 6.6. If your notes include things which fall in list a-g, you need to provide a copy on the file for submission to the CPS precharge.
Avatar
Avatar
busted4n6
Be aware of CPIA CoP section 6.6. If your notes include things which fall in list a-g, you need to provide a copy on the file for submission to the CPS precharge.
Just on the back of that we disclose that the notes exist on our MG6C disclosure form - schedule of non-sensitive unused material and retain the notes in the case file on the forensic server
Avatar
Avatar
FunkeDope
Cellebrite has been going downhill for years. Their support is garbage now and it's impossible to get any tech on the phone who knows what they are talking about. I used to be able to call and talk to the guy who wrote the bootloader exploit for a Samsung phone, now I have to deal with level 1 support who asks me if I'm using the right cable or if iTunes is up to date. They went real corporate real fast
Digitalferret 4/22/2021 2:14 AM
L1 support ... went real corporate real fast ain't that the truth with pretty much all. have you tried turning it off and on again? 🙂 next logical step is to outsource to a "cheaper labour" country. there's an irony here that big co's that have the "British" prefix has usually outsourced support that way. "but clients want cheaper / we need to remain competitive.." not to the point of being <profanity> useless to anyone in possession of >1 brain cell. /rant off 🙂
Avatar
are screenshots allowed in a forensic report?
Avatar
Avatar
Brother O
are screenshots allowed in a forensic report?
yes, I use like Figure 1 - <description> and reference it in the sentence I refer it to
2:38 AM
Apologies for not getting a template to you yet, workload went up in the last 2 days
Avatar
its fine ill just deal with what i have
Avatar
is there a quick way to get image hash without calcuating on autopsy?
Avatar
Avatar
Brother O
is there a quick way to get image hash without calcuating on autopsy?
DeeFIR 🇦🇺 4/22/2021 2:57 AM
Of each of the E01 chunks, or verifying the original source hash?
Avatar
original source hash
3:01 AM
would it be the MD5?
Avatar
DeeFIR 🇦🇺 4/22/2021 3:10 AM
which tool was it created with and which tools do you have access to other than autopsy?
Avatar
ftk imager
3:14 AM
what tool was what created with? (edited)
Avatar
i need the one you dont caluclate
Avatar
Ftk provides in the txt created when you finish imaging.
👍 1
Avatar
Avatar
Brother O
i need the one you dont caluclate
DeeFIR 🇦🇺 4/22/2021 3:33 AM
Ok, let's start again. What format is your image in? It was created with FTK? Was it set to verify when it was created? Do you have the txt file which includes verification information upon completion?
Avatar
jpeg
3:33 AM
what text file?
Avatar
DeeFIR 🇦🇺 4/22/2021 3:34 AM
Right, so we're talking about a picture as opposed to a forensic container/E01/image
Avatar
yh
3:34 AM
does the md5 count as an image hash?
Avatar
DeeFIR 🇦🇺 4/22/2021 3:34 AM
Just remember you're in a forensics forum, image and picture are completely different. If you're going to refer to an image you're going to receive questions about image format/E01/DD etc.. not everyone will assume it's a picture/multimedia file
👍🏻 3
Avatar
oh ok
Avatar
DeeFIR 🇦🇺 4/22/2021 3:35 AM
If you're calculating the hash of a single file like a jpeg picture, then you can use md5sum/sha1sum on Linux, or $ get-filehash -algorith md5/sha1/sha256/sha512 on powershell
Avatar
ok great
3:36 AM
thats what i done
Avatar
DeeFIR 🇦🇺 4/22/2021 3:36 AM
PS D:> Get-FileHash -Algorithm MD5 picture.jpg Algorithm Hash Path --------- ---- ---- MD5 CCEFA602D411CA6ACE9FC8137545250F D:\picture.jpg
Avatar
yh
Avatar
DeeFIR 🇦🇺 4/22/2021 3:36 AM
👍
Avatar
thanks
Avatar
Avatar
K23
Just on the back of that we disclose that the notes exist on our MG6C disclosure form - schedule of non-sensitive unused material and retain the notes in the case file on the forensic server
Indeed. However if the notes have anything from that specific list (eg you discussed the investigation with the oic and made notes), those notes not only have to be scheduled but also disclosed to the cps on first submission precharge. Ie I think you should actually be providing them to the oic if they meet the rebuttable presumption test.
👍 1
Avatar
Whats the job role for a digital forensics guy called?
Avatar
Avatar
Brother O
Whats the job role for a digital forensics guy called?
Andrew Rathbun 4/22/2021 6:13 AM
#training-education-employment
👍 1
Avatar
as in the job title my fault
Avatar
Avatar
Brother O
as in the job title my fault
Depends on the agency/organization. I'm the "digital forensics guy" for my department and my job title is just "Detective."
👍 2
Avatar
Some other common ones are Digital Forensic Examiner or Digital Forensic Investigator.
Avatar
Avatar
FullTang
Depends on the agency/organization. I'm the "digital forensics guy" for my department and my job title is just "Detective."
are you one of those cool detectives in the movies?
Avatar
Avatar
Brother O
are you one of those cool detectives in the movies?
Andrew Rathbun 4/22/2021 12:05 PM
There's lots of those "cool detectives" here along with other working professionals in the private sector, forensic vendors, etc. Also lots of former all the above who now do different things.
💯 2
Avatar
we strategically leverage business paradigms to dynamically invert expectation matrices
4:12 AM
what does this mean?
Avatar
Have you guys ever heard "L2TC "before?
Avatar
Avatar
Brother O
what does this mean?
Andrew Rathbun 4/23/2021 5:14 AM
buzzwords
Avatar
NetSecNinja 4/23/2021 6:29 AM
Means you are in the wrong meeting
💯 3
😂 3
Avatar
Andrew Rathbun 4/23/2021 6:42 AM
That's someone talking a lot but saying nothing
6:47 AM
Like this?
Avatar
Andrew Rathbun 4/23/2021 7:01 AM
Bingo!
Avatar
That's the kind of stuff you say when you want to impress the people you're talking to but you actually have no idea what the plan is.
Avatar
Mr. Eddie Vedder from Accounting 4/23/2021 7:34 AM
💯 3
Avatar
great (edited)
Avatar
Has anybody used the VICS export function in Axiom? I don't know for certain but it seems like its slower in version 4.11 than 4.10. Another coworker and I have tried exporting around ~200,000 to ~300,000 files out of Axiom and its almost uselessly slow, as in multiple days. I used to be able to do it in an afternoon. When Axiom started exporting, it was exporting around 500 files per minute. Now its done to about 1-2 files per minute. My CPU, RAM, and Disk usage are minimal.
Avatar
Deleted User 4/23/2021 1:51 PM
SQL Forensics Question: I am playing around with deleted texts on iOS, and I am reading from Sanderson's SQLite Forensics. In the iOS section, he tells readers to check "don't hash integer PKs if alias for ROWID." I'm not even finding the "Recovery Options" window (doesn't exist under tools-->Options/can't even find the "Options" window). Anyone have any advice here? Operating on DB Browser for SQLite.
Avatar
Avatar
Deleted User
SQL Forensics Question: I am playing around with deleted texts on iOS, and I am reading from Sanderson's SQLite Forensics. In the iOS section, he tells readers to check "don't hash integer PKs if alias for ROWID." I'm not even finding the "Recovery Options" window (doesn't exist under tools-->Options/can't even find the "Options" window). Anyone have any advice here? Operating on DB Browser for SQLite.
Andrew Rathbun 4/23/2021 1:51 PM
My guess is he's referring to his SQLite tool, which is now sold by TeelTech, I think.
Avatar
Deleted User 4/23/2021 1:53 PM
Thank you sm @Andrew Rathbun
Avatar
GrayKey for Android Mobile Forensics; get same day, lawful access and extract of Android with Exynos chip support
Avatar
Avatar
FunkeDope
Cellebrite has been going downhill for years. Their support is garbage now and it's impossible to get any tech on the phone who knows what they are talking about. I used to be able to call and talk to the guy who wrote the bootloader exploit for a Samsung phone, now I have to deal with level 1 support who asks me if I'm using the right cable or if iTunes is up to date. They went real corporate real fast
CLB - DavidK 4/25/2021 7:43 AM
I would really like to understand what was the gap and try to help you out with the issues you are facing, please note my DM.
Avatar
LαȥყTσɯɳTҽƈԋιҽ★ 4/25/2021 9:31 AM
Stupid question but what is the difference between cloud and network forensics?
Avatar
Avatar
LαȥყTσɯɳTҽƈԋιҽ★
Stupid question but what is the difference between cloud and network forensics?
Andrew Rathbun 4/25/2021 9:36 AM
Cloud would be like Azure instances, cloud storage services, etc, and network forensics is more like PCAP analysis
Avatar
Avatar
Andrew Rathbun
Cloud would be like Azure instances, cloud storage services, etc, and network forensics is more like PCAP analysis
randomaccess 4/25/2021 4:45 PM
and logs and netflow!
💯 1
Avatar
Anyone using Synology NAS run into issues transferring files that begin with a special character (.com.apple.mobile etc.)? Their support people told me I need to run a script to remove those characters before they can be transferred. Is there a workaround that doesn't involve changing the file names?
Avatar
Avatar
Turey43
Anyone using Synology NAS run into issues transferring files that begin with a special character (.com.apple.mobile etc.)? Their support people told me I need to run a script to remove those characters before they can be transferred. Is there a workaround that doesn't involve changing the file names?
Can't say that I have tried that but i certainly can try at home and see if it works. I've never seen any issues though. Also are you transferring the file to the NAS? And over what protocol? (edited)
Avatar
Any @Law Enforcement [UK] use or trialing Cellebrite Pathfinder ? (edited)
Avatar
@Dfdan Evening, happy to have a discussion about it if you would like just DM me
Avatar
Avatar
Turey43
Anyone using Synology NAS run into issues transferring files that begin with a special character (.com.apple.mobile etc.)? Their support people told me I need to run a script to remove those characters before they can be transferred. Is there a workaround that doesn't involve changing the file names?
I found that if I .zip my files before uploading them to my Synology NAS I don’t run into errors
Avatar
hey guys i am very happy to see like this community and discord server ❤️ , i am a CS student who wants to work as a DFIR after college but don't know how , because this field doesn't have enough resources about specific roadmaps or anything , i know that there are sans , elearn and etc , but don't know what to start with or even how , i hope if anyone understand me and help me , so if anyone expert or just beginner and would like to dm me to be friends and study together on specific plan i would be thankful ❤️ (edited)
Avatar
i have a similar question but in regards to getting into dfir in australian law enforcement
2:08 AM
would i have to go through joint degree in information tech and criminology? for under grads and im currently looking at CompTIA Network+ and Security+ (edited)
Avatar
randomaccess 4/27/2021 2:36 AM
@chei-d5 I went into Australian LE straight out of university. Had some experience working in IT during uni but otherwise applied and got an entry level DF examiner job with the state cops. Limited civilian spots though
Avatar
did you go through just a bachelors in computer science/info tech?
Avatar
randomaccess 4/27/2021 2:38 AM
Info systems yeah
Avatar
oh sick alright
2:38 AM
thanks man
Avatar
randomaccess 4/27/2021 2:38 AM
I spoke about it briefly on a webcast last year. Tldr look at the job reqs for the type of work you want
Avatar
is there a certain way into law enforcement or did you apply through their website or local hq?
Avatar
randomaccess 4/27/2021 2:41 AM
Can chat offline
2:42 AM
(it's nothing secret, just others probs don't care)
2:44 AM
i think i'll be good for now regardless thanks for letting me know
Avatar
Good morning, I have a Snapchat return that I’m trying to process though cellebrite but for some reason it keeps getting stuck in project finisher. I let it run over night and came back this morning it it was still running. I ran it through Axiom and it did not have any problems processing the information. All updates are updated. Any suggestions??? Thanks
Avatar
Avatar
Garrett
I found that if I .zip my files before uploading them to my Synology NAS I don’t run into errors
Good call, that solved my issue. Thanks!
👍 1
Avatar
Avatar
Cole
Can't say that I have tried that but i certainly can try at home and see if it works. I've never seen any issues though. Also are you transferring the file to the NAS? And over what protocol? (edited)
I was transferring to the NAS using NFS but I think that was my issue. I switched to FTP and didn't have any problems.
Avatar
Interesting case with DF tools to acquire evidence and use of 'exclusionary' search terms and Unrelated Search Terms or "USTs" etc
Avatar
@Magnet Forensics can we have the facility to remove tagged false positives and material subject to legal privilege before creating a portable case. As far as I am aware the only thing I can do is to tag everything else but? (edited)
Avatar
KillSwitchX7 4/28/2021 3:02 AM
anyone knows how to extract .bin file ?
3:02 AM
safely, either on computer or android
Avatar
randomaccess 4/28/2021 4:13 AM
@busted4n6 I generally create an exclude tag. And then I think you can filter that out and export everything in the current view.
Avatar
Avatar
randomaccess
@busted4n6 I generally create an exclude tag. And then I think you can filter that out and export everything in the current view.
Perhaps I’m missing a trick. I can only see how to filter in
Avatar
randomaccess 4/28/2021 4:16 AM
There's a way to do it in the filter bar at the top. I think I just selected blanks or every tag except my "exclude" tag. I haven't done it recently so have clearly forgotten ha
this 1
4:16 AM
Avatar
Avatar
busted4n6
@Magnet Forensics can we have the facility to remove tagged false positives and material subject to legal privilege before creating a portable case. As far as I am aware the only thing I can do is to tag everything else but? (edited)
You can add a tag to the false positives if you want and then go to the filter bar and include all tags including untagged items. Just leave out the tag that you called false positives, and you will no longer see those artifacts.
😆 1
Avatar
Avatar
Jamey
You can add a tag to the false positives if you want and then go to the filter bar and include all tags including untagged items. Just leave out the tag that you called false positives, and you will no longer see those artifacts.
Hahah how did I miss that! Thanks
magnetforensics 1
Avatar
@KillSwitchX7 have you tried binwalk?
Avatar
Avatar
Sha1_4n6
@KillSwitchX7 have you tried binwalk?
KillSwitchX7 4/28/2021 7:02 AM
Thanks, will look into it (edited)
Avatar
chrisforensic 4/28/2021 11:24 AM
hello @Magnet Forensics Axiom 5.0 will be released sooooon, right ? 😉
Avatar
Avatar
chrisforensic
hello @Magnet Forensics Axiom 5.0 will be released sooooon, right ? 😉
Should be with the Virtual Summit coming up in May
Avatar
Tip of my tongue, but can't think of the actual name of the software, similar to CAINE/Paladin. Sounds similar to 'serkou' I believe Linus based... Anyone able to help me out?
Avatar
Avatar
chrisforensic
hello @Magnet Forensics Axiom 5.0 will be released sooooon, right ? 😉
As a member of a publicly traded company I cannot confirm nor deny the truthfulness of that statement. 😉
😆 2
😇 1
Avatar
Does anyone know of a tool that will use AWS role-based access to collect data from S3 buckets? Axiom Cyber requires key pairs, but my organization discourages using that method due to key rotation and related security issues. (this was posted several days ago in cloud-forensics, but I'm trying again as no one answered.)
Avatar
Avatar
cavis
Does anyone know of a tool that will use AWS role-based access to collect data from S3 buckets? Axiom Cyber requires key pairs, but my organization discourages using that method due to key rotation and related security issues. (this was posted several days ago in cloud-forensics, but I'm trying again as no one answered.)
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc. - toniblyx/my-arsenal-of-aws-security-tools
👍 1
Avatar
@RP maybe Santoku? https://santoku-linux.com/
Avatar
Avatar
RP
Tip of my tongue, but can't think of the actual name of the software, similar to CAINE/Paladin. Sounds similar to 'serkou' I believe Linus based... Anyone able to help me out?
ninjadeathsquad 4/28/2021 9:39 PM
There is also Tsurugi Linux
Avatar
Deleted User 4/28/2021 10:05 PM
Welp. It's that time! Starting to think about my capstone project as a Digital Forensics student with a minor in Cybersecurity. I have a lot of experience as an IoT researcher, so may do something in that field, but I think the best way to really plan for it is to ask you all, the professional community! What are some fields of research, technical or logistical, that you'd like more information on? Something you'd like to see researched that hasn't been yet just because it's interesting to you, or because it would help greatly in your professional career! Let me know either here or via DM. Any input would be greatly appreciated. It's something I need and want to do for myself, but part of that is advancing this fiel d in the right direction!
Avatar
Avatar
KillSwitchX7
anyone knows how to extract .bin file ?
Extract the shellcode? hexdump -v -e '"\\""x" 1/1 "%02x" ""' <bin_file>
Avatar
Avatar
ryd3v
Extract the shellcode? hexdump -v -e '"\\""x" 1/1 "%02x" ""' <bin_file>
KillSwitchX7 4/28/2021 11:01 PM
Thank you sir! I'll try this as well
Avatar
No problem, if you want to just save a section from a PE, try PE-Bear https://github.com/hasherezade/pe-bear-releases
PE-bear (builds only). Contribute to hasherezade/pe-bear-releases development by creating an account on GitHub.
11:04 PM
There are other ways with python , etc but for me, I write my shellcode in ASM and use the above method to extract a bin, then hexdump to extract my shellcode
11:05 PM
🍻
Avatar
Avatar
Deleted User
Welp. It's that time! Starting to think about my capstone project as a Digital Forensics student with a minor in Cybersecurity. I have a lot of experience as an IoT researcher, so may do something in that field, but I think the best way to really plan for it is to ask you all, the professional community! What are some fields of research, technical or logistical, that you'd like more information on? Something you'd like to see researched that hasn't been yet just because it's interesting to you, or because it would help greatly in your professional career! Let me know either here or via DM. Any input would be greatly appreciated. It's something I need and want to do for myself, but part of that is advancing this fiel d in the right direction!
Andrew Rathbun 4/29/2021 4:29 AM
If you get no ideas here try again in #training-education-employment
🙏🏻 1
Avatar
Does anyone know how to find the entropy of a folder?
4:44 AM
My theory is that I have to find entropy of all the files inside and then somehow average it out
Avatar
NetSecNinja 4/29/2021 6:46 AM
@Jawsh Um What are you referencing? The NW3C CTF?
6:47 AM
If so, PM me for some hints
Avatar
I've gotta do an essay on the ethical and legal issues within Digital Forensic Investigations - but there's like nothing on the internet to research 😅 can someone point me in the right direction
Avatar
Avatar
Jack
I've gotta do an essay on the ethical and legal issues within Digital Forensic Investigations - but there's like nothing on the internet to research 😅 can someone point me in the right direction
https://commons.erau.edu/cgi/viewcontent.cgi?article=1105&context=jdfsl https://link.springer.com/content/pdf/10.1007%2F1-4020-8070-0_28.pdf https://www.dfir.training/dfir-resources/legal-issues-in-computer-forensics-and-digital-evidence-admissibility These looked like decent articles when I searched "legal issues digital forensics" If you're in the US, most of the legal issues you'll find are related to the Bill of Rights. Otherwise in EU theres the GDPR. Start there. Also from an ethical POV, one possible topic is how governments may keep known loopholes and vulnerabilities to themselves in order to use them. On one hand, they need to keep it a secret so they can get into devices for good reasons, on the other, its potentially hurting the consumer by having a vulnerability. (edited)
COMPUTER FORENSICS INTEGRATES THE FIELDS OF COMPUTER SCIENCE AND LAW TO INVESTIGATECRIME. FOR DIGITAL EVIDENCE TO BE LEGALLY ADMISSIBLE IN COURT, INVESTIGATORS SHOULD FOLLOW PROPERLEGAL PROCEDURES WHEN RECOVERING AND ANALYZING DATA FROM COMPUTER SYSTEMS. THE LAWS WRITTENBEFORE THE ERA OF COMPUTER FORENSICS ARE OFTEN OUTDATED AND CANNOT ADEQUATEL...
Avatar
Thank you @Cole
Avatar
Hey everyone. A quick reminder that my survey is still running (until 07.05.2021). I would appreciate if you could participate 🙂 https://www.soscisurvey.de/automotive-data-formats/
Avatar
Avatar
kgomez
Hey everyone. A quick reminder that my survey is still running (until 07.05.2021). I would appreciate if you could participate 🙂 https://www.soscisurvey.de/automotive-data-formats/
Andrew Rathbun 4/30/2021 7:11 AM
submitted, good luck!
Avatar
thatboy_leo 4/30/2021 10:18 AM
For forensic imaging, does it use cpu and ram or just cpu?
10:19 AM
To increase the speed for imaging ^
Avatar
So I'd say it needs some ram to operate but not a great deal. It will need some cpu to calculate hash and more CPU and RAM to compress the image if that's what you're doing. But I feel the main botteneck is IO to and from the input and output devices.
👍🏼 2
Avatar
thatboy_leo 4/30/2021 10:27 AM
Thank you, I guess usb 2.0 vs 3.1 would see better imaging speed as well
Avatar
Avatar
thatboy_leo
Thank you, I guess usb 2.0 vs 3.1 would see better imaging speed as well
Digitalferret 4/30/2021 11:44 AM
much with @AmNe5iA , bottleneck will be IO, and much prefer native connections here. ie sata cables for sata drives.
Avatar
Avatar
Digitalferret
much with @AmNe5iA , bottleneck will be IO, and much prefer native connections here. ie sata cables for sata drives.
thatboy_leo 4/30/2021 11:45 AM
Awesome. Would you happen to know if checksum values rely on either of those components
Avatar
Avatar
thatboy_leo
Awesome. Would you happen to know if checksum values rely on either of those components
Digitalferret 4/30/2021 2:51 PM
not that i'm aware. cables are a data transport mechanism, checksums are part of an error checking process regardless of the medium that files are transferred over or between.
Avatar
Avatar
Digitalferret
not that i'm aware. cables are a data transport mechanism, checksums are part of an error checking process regardless of the medium that files are transferred over or between.
thatboy_leo 4/30/2021 2:57 PM
Thank you. I’m learning speeding up these machines won’t be too much trouble since the paperwork behind documenting everything is something I can do when it’s all running
Avatar
Avatar
thatboy_leo
Thank you. I’m learning speeding up these machines won’t be too much trouble since the paperwork behind documenting everything is something I can do when it’s all running
Digitalferret 4/30/2021 3:02 PM
the challenge is when you get a drive with bad sectors. anything connected to a Windows box directly will have the capacity to lock the entire machine up. Linux not so much, but the rudimentary programs such as DD derivatives can feel lethargic against a (pretty much) turnkey hardware solution such as Deepspar kit or Atola
Avatar
thatboy_leo 4/30/2021 3:03 PM
Lucky to not have encountered it yet, it’s gonna be fun testing out these tools and making my custom toolbox depending on the circumstances of cases
Avatar
Digitalferret 4/30/2021 3:04 PM
entirely software solutions, if they have little or no means to control will keep trying to re-read bad sectors, one by one. others can take huge leaps after a small section of errors and then come back and "get closer to the edges" using multiple passes
this 1
Avatar
thatboy_leo 4/30/2021 3:04 PM
I wish there was just a checkbox for every case but there’s just so many unknown variables that can come up
Avatar
Digitalferret 4/30/2021 3:05 PM
main thing is to "do no harm" or as little as possible. multiple reads and scans can thrash a disk to death. once it's destroyed there's no glue for the pixie dust a scratched disk leaves behind (edited)
Avatar
thatboy_leo 4/30/2021 3:07 PM
Lifespans of HDDs for this line of work are probably a lot less than industry standards then
3:07 PM
At least the cost has been good over the years
Avatar
Digitalferret 4/30/2021 3:07 PM
the other "biggie" is ensuring write protection
3:08 PM
and that's a hardware thing. we've seen more than a few "i did dd and got source and destination wrong, what do, it was only for a few seconds". other pro-techies have actually come to me with portable devices saying "well i attached it to the Windows box, i mean, that can't have lost data can it?" (edited)
3:12 PM
hardware write blocking is pretty much like air-gapping a machine from the network. if you attach a drive to the source cable, it ensures it cannot be written to, although some hardware vendors allow you to explicitly reverse that, or fake it to allow certain functions to be actioned
Avatar
Avatar
Digitalferret
hardware write blocking is pretty much like air-gapping a machine from the network. if you attach a drive to the source cable, it ensures it cannot be written to, although some hardware vendors allow you to explicitly reverse that, or fake it to allow certain functions to be actioned
thatboy_leo 4/30/2021 3:12 PM
So you prefer hardware over software write blockers?
Avatar
Digitalferret 4/30/2021 3:12 PM
absolutely
Avatar
thatboy_leo 4/30/2021 3:12 PM
I feel like hardware I can rely on more
3:12 PM
Considering unknown bugs
Avatar
Digitalferret 4/30/2021 3:13 PM
its similar to having independent rotary dials on the top of a camera instead of having to wade through multiple screens and menus to check if the camera is set as you want it.
3:14 PM
if i plug a drive into a Deepspar Disk Imagers (DDI3 for instance) Source Drive cable, it cannot be written to. period (edited)
Avatar
thatboy_leo 4/30/2021 3:15 PM
That’s good to know, I only understood the policy of using one, now the reason
Avatar
Digitalferret 4/30/2021 3:16 PM
what it does do is prevent Windows interacting with the drive to its detriment
Avatar
thatboy_leo 4/30/2021 3:16 PM
I gotta look over hex editing for file systems these next few months I’m gonna go crazy
Avatar
Digitalferret 4/30/2021 3:17 PM
i must clarify though, it's your responsibility to check that "guarantee". I'm sure I've heard of companies with drive copiers with alleged write protection having had clients find out that in some instances it hasn't worked
Avatar
Avatar
thatboy_leo
I gotta look over hex editing for file systems these next few months I’m gonna go crazy
Digitalferret 4/30/2021 3:18 PM
just learn as you go? don't get into hyper technical stuff until it's needed.
Avatar
Avatar
Digitalferret
i must clarify though, it's your responsibility to check that "guarantee". I'm sure I've heard of companies with drive copiers with alleged write protection having had clients find out that in some instances it hasn't worked
thatboy_leo 4/30/2021 3:18 PM
Yea one of the coaches said there’s something that can verify a write blocker works every use, since it attempts to write to disk and gives a certificate that it made the attempt and failed
Avatar
Digitalferret 4/30/2021 3:18 PM
if it works via an automated process, just let it run. hex edit is for when other things fail and you need to try alternate means.
3:19 PM
or, you maybe at Uni, in which case follow the course material 🙂
😂 1
Avatar
Avatar
Digitalferret
just learn as you go? don't get into hyper technical stuff until it's needed.
thatboy_leo 4/30/2021 3:19 PM
Yea that’s what I was wondering for. Maybe for a case where I can’t find any artifacts or I’m getting partial recovers
Avatar
Digitalferret 4/30/2021 3:20 PM
pretty much. you can sometimes reconstruct files if you know what you are looking for, and under certain conditions
3:20 PM
or find traces where no files exist
3:21 PM
hexedit (view) is also a quick and dirty means to check free space on a drive.
Avatar
thatboy_leo 4/30/2021 3:25 PM
Hmmm I’m gonna buy a hdd on pawn sites and see what I can find
3:25 PM
Most of my drives I’ve done checksum’s and made sure data is gone from it
Avatar
Digitalferret 4/30/2021 3:28 PM
how do you mean?
Avatar
thatboy_leo 4/30/2021 3:49 PM
I’ve sterilized our HDDs in our lab but I want to familiarize myself with hex editing on a drive that’s not too big, like 50-250GB
Avatar
how do i run a file showing just the STDERR output in command prompt (edited)
Avatar
Avatar
Brother O
how do i run a file showing just the STDERR output in command prompt (edited)
Not entirely sure what you mean by "run a file". But if you only want stderr, you could redirect stdout to /dev/null or something. Can you give more details on exactly what you want to accomplish?
Avatar
Avatar
5cary
Not entirely sure what you mean by "run a file". But if you only want stderr, you could redirect stdout to /dev/null or something. Can you give more details on exactly what you want to accomplish?
got a file in my computer and i want the only output to be the STDERR (im using command prompt) (edited)
5:05 PM
i know you have to use io reditection but i dont know which one
Avatar
I think you’re looking to redirect STDERR to STDOUT as @5cary mentioned.
7:46 PM
command > file 2>&1
7:46 PM
file redirect the stdout to file, and 2>&1 redirect the stderr to the current location of stdout.
7:47 PM
In Bash and other Linux shells, when a program is executed, it uses three standard I/O streams. Each stream is represented by a numeric file descriptor: 0 - stdin, the standard input stream. 1 - stdout, the standard output stream. 2 - stderr, the standard error stream.
Avatar
Avatar
dan_johns
I think you’re looking to redirect STDERR to STDOUT as @5cary mentioned.
thanks got one more question whats the format to start from a specific line with the "more" command
Avatar
@thatboy_leo whatever you do, do not rely on the USB write block registry key script. It's critically flawed in several areas.
Avatar
Morning all. Been asked for some advice RE submerged handsets and was wondering if there was some sort of flow chart/advice etc around that i could forward on to them before i start writing anything up?
Avatar
We've got a process @Artea, I'll DM.
Salute 1
Avatar
That would be great @K23
Avatar
If you haven't read or heard about this yet. Very good article in the barrister magazine that explains it quite well https://www.barristermagazine.com/regulation-of-experts-is-the-proposed-cure-worse-than-the-disease/ and https://bills.parliament.uk/bills/2616/stages
View stages which have occurred or have been scheduled for Forensic Science Regulator Act 2021
Avatar
Avatar
Brother O
thanks got one more question whats the format to start from a specific line with the "more" command
The answer to your "more" command question is right in the man pages: more +<number> <filename> will start the more output at line <number>.
Avatar
airplanedetective 5/4/2021 6:16 AM
I am looking for a good source of chip data sheets, willing to pay for a service if that exists. Anyone recommend something?
Avatar
Avatar
airplanedetective
I am looking for a good source of chip data sheets, willing to pay for a service if that exists. Anyone recommend something?
Andrew Rathbun 5/4/2021 7:37 AM
might be a better question for #jtag-isp-chip-off-flasherbox
Avatar
Deleted User 5/4/2021 8:15 AM
Is there a way too check at what time a user logged in with AppleID on a iPhone? In this phone sms.db and addressbook.sqlite is created 2019-10-10 (iphone 11 pro so no FFS). From checking the timeline a big number of thumbnails are created 2019-11-30 from iCloud pictures so I guess that is when she loggs in. Is sms.db and addressbook.sqlite before or after setup?
Avatar
Anyone know a good way to look at twitter warrant returns, the tweets.js file is now account number tweets.txt and can't find a reader/program to display/parse data. Also looking to give investigator a portable case for him to review
Avatar
I'm creating a flashdrive with useful software for search warrants. I've got Jiggler (to keep the computer awake), any other recommendations? This doesn't need things like EnCase, OsTriage, Outrider, PA, etc. Just looking for small, useful programs that might come in handy on-scene. Thanks!
👀 1
Avatar
Avatar
RyanB
I'm creating a flashdrive with useful software for search warrants. I've got Jiggler (to keep the computer awake), any other recommendations? This doesn't need things like EnCase, OsTriage, Outrider, PA, etc. Just looking for small, useful programs that might come in handy on-scene. Thanks!
Andrew Rathbun 5/4/2021 10:01 AM
Download Everything, you should be using it everyday anyways 😛 - https://www.voidtools.com/ there's a portable version
10:01 AM
A portable version of your favorite text editor is helpful
10:02 AM
A diffing tool like WinMerge (free) or any of the other premium alternatives (Beyond Compare, UltraCompare, etc) may come in handy
10:03 AM
ShareX is a FOSS tool that is super helpful in creating GIFs and taking screenshots, I use it all the time for GIFs
10:04 AM
Bring a copy of Arsenal Image Mounter (free) so you can mount images on site
10:04 AM
EZ Tools on the flash drive since they are all portable in nature
10:04 AM
SumatraPDF if you don't like how bloated Adobe Reader is when viewing PDFs on scene (or ever, really)
Avatar
Avatar
Andrew Rathbun
EZ Tools on the flash drive since they are all portable in nature
Andrew Rathbun 5/4/2021 10:05 AM
EZViewer at the very least since it's a zero dependency viewer of many file types
Avatar
Avatar
ccbdub
Anyone know a good way to look at twitter warrant returns, the tweets.js file is now account number tweets.txt and can't find a reader/program to display/parse data. Also looking to give investigator a portable case for him to review
Andrew Rathbun 5/4/2021 10:07 AM
So it's just a text file? Can you post a screenshot of what it looks like while maintaining opsec?
Avatar
Avatar
RyanB
I'm creating a flashdrive with useful software for search warrants. I've got Jiggler (to keep the computer awake), any other recommendations? This doesn't need things like EnCase, OsTriage, Outrider, PA, etc. Just looking for small, useful programs that might come in handy on-scene. Thanks!
I think our USBs contain Rekall, FTK Imager, Jiggler. I'm considering adding a script to check bitlocker status and possibly capture the recovery key at the same time. I might also try to find a portable friendly screenshot / screen record tool in the event a camera is forgotten / flat.
Avatar
Andrew Rathbun 5/4/2021 10:24 AM
I don't think Rekall is maintained anymore, right? FTK Imager is a good one, too. https://portableapps.com/apps would have plenty of ideas for useful utilities for various whatnots and what have yous
Avatar
Avatar
Andrew Rathbun
I don't think Rekall is maintained anymore, right? FTK Imager is a good one, too. https://portableapps.com/apps would have plenty of ideas for useful utilities for various whatnots and what have yous
No clue, does the job 😂
😆 1
Avatar
Avatar
Rob
No clue, does the job 😂
Andrew Rathbun 5/4/2021 10:31 AM
people smarter than me are saying it's not maintained anymore so I guess FYI on that
Avatar
Oh maybe it doesn't do the job anymore
😆 1
10:33 AM
What tool is most reliable to not cause a blue screen then whilst getting memory dumps
Avatar
@Andrew Rathbun it looks the exact same as the .js file we used to get. I'm out of the office there at the moment but will post a picture with the relevant details blacked out
Avatar
Avatar
ccbdub
@Andrew Rathbun it looks the exact same as the .js file we used to get. I'm out of the office there at the moment but will post a picture with the relevant details blacked out
Andrew Rathbun 5/4/2021 10:34 AM
Sounds good, thanks. Not familiar with old .js format that was provided so any visual would be helpful
Avatar
Avatar
Rob
What tool is most reliable to not cause a blue screen then whilst getting memory dumps
Andrew Rathbun 5/4/2021 10:35 AM
Why not FTK Imager? You can Capture Memory from even the Lite version (2010) last I knew
Avatar
Don't trust ftk imager
10:36 AM
Caused a blue screen once on a test
10:36 AM
And then I read it on occasion conflicts with a bios setting
10:36 AM
Which you won't know
10:36 AM
Til it does
Avatar
Andrew Rathbun 5/4/2021 10:38 AM
Fair enough!
Avatar
I think it's the virtualisation bios setting.
Avatar
Andrew Rathbun 5/4/2021 10:42 AM
https://github.com/Velocidex/WinPmem might be an alternative to Rekall for getting a memory dump
10:45 AM
@Rob @RyanB grab a copy of CyberChef and slap it on your search warrant thumb drive(s).
10:45 AM
I'll do some testing
Avatar
@Andrew Rathbun @Rob thank you for the replies and recommendations!
💯 1
Avatar
Avatar
Rob
I'll do some testing
Andrew Rathbun 5/4/2021 11:05 AM
👍 1
Avatar
Avatar
Rob
What tool is most reliable to not cause a blue screen then whilst getting memory dumps
DeeFIR 🇦🇺 5/4/2021 4:54 PM
Windows? Comae, Belkasoft RAM Capture, ADF Triage (in order of preference). No FTK on that list either 😂
👍 1
Avatar
Andrew Rathbun 5/4/2021 6:55 PM
A look at the quarterly and lifetime failure rates of 175,443 drives, including a comparison of failure rates of HDD and SSD boot drives.
Avatar
Is it possible to extract information from the chipset of the Concox AT4 asset tracker? https://www.iconcox.com/products/at4-10000mah-asset-gps-tracker.html#spec
The advanced features, rugged construction and industry-leading battery life make the AT4 the new state of the art in GPS Vehicle Tracking. Using GPS, LBS positioning, AT4 gives detailed reports and tell you exactly where a vehicle has been.
Avatar
Silly question but how do I close tickets on Cellebrite Support? 😂 (edited)
4:51 AM
@Cellebrite
Avatar
We do it on our end
4:54 AM
You can rely to one of the emails asking for it to be closed
Avatar
Avatar
Pacman
Silly question but how do I close tickets on Cellebrite Support? 😂 (edited)
CLB-drorimon 5/5/2021 5:01 AM
Not sure. You can open a support ticket on that.
😂 6
Avatar
Hey folks, does anyone know how/where HelloKitty leaks
Avatar
Here is the twitter warrant return versus a normal twitter download
6:29 AM
They appear to have added extra line breaks in the warrant return
6:32 AM
6:32 AM
Here's a normal tweet.js twitter file
6:37 AM
Avatar
Adrenal1ne 5/5/2021 7:38 AM
Hi, could someone recommend me how to perform the analysis of windows event logs in 15 pcs +, is there any tool to automate this? i was thinking on elastic + kibana but im not sure if its ok. Thanks
Avatar
Has anyone else noticed reporting from UFED PA is taking significantly longer than in the past? I've got plenty of resources on my workstations, so it isn't that kind of problem. This has been present in the past several versions... Just want to see if others are having similar experiences.
Avatar
Andrew Rathbun 5/5/2021 8:34 AM
free tool to generate file listings with ability to export to CSV and TXT, free lifetime license - https://vovsoft.com/giveaway/free-filename-lister-2021/
Here you can find the giveaway information about Filename Lister, published by .
💯 3
Avatar
Oooh I like
Avatar
Has anyone ever experimented with using virtual machines as forensic lab boxes, mainly for running software(axiom, x-ways, etc) on images already made and hosted on a central repo?
Avatar
Avatar
Turb0Yoda
Has anyone ever experimented with using virtual machines as forensic lab boxes, mainly for running software(axiom, x-ways, etc) on images already made and hosted on a central repo?
Nope, but sounds super interesting. I made a half-hearted joke to some of my coworkers about rather than having all these desktop forensic workstations that we could all just remote in to virtual machines hosted on a central hypervisor. They said it was not gonna happen. I think it should be possible with the right hardware. (edited)
Avatar
yeah we're looking into a concept like that at work
Avatar
just need to figure out how things like case data/findings would be shared for things like axiom or x-ways. AXIOM just yknow, toss on a mapped drive that's really a SAN but I'm not familiar enough with XW to figure that out yet
Avatar
You could do separate storage and processing. We have desktops and all our stuff is held on a SAN. You could do the same thing except the desktops are virtualized.
Avatar
Avatar
Turb0Yoda
just need to figure out how things like case data/findings would be shared for things like axiom or x-ways. AXIOM just yknow, toss on a mapped drive that's really a SAN but I'm not familiar enough with XW to figure that out yet
RandyRanderson 5/5/2021 7:45 PM
There is a mechanism to push a network license through to the VM's. I would just make the VMs static IPs and that should "help" with licensing with Axiom and XWF (not to mention other stuff). Personally, I think it is a great idea to use VMs as opposed to regular systems anyway. Much cleaner and you can facilitate multiple things going on at once in different "containers" as opposed to multi-tasking on 1 system OR requiring multiple machines (Which ultimately can save a ton of money). Some ideas for doing this is not just to do it for Windows but,
  • Network Forensic Dedicated Linux/Windows Systems
  • Memory Dedicated Linux/Windows Systems
  • Smartphone (albeit Cellebrite is a PITA, but I never had issues with Oxygen)
  • OSINT
  • Malware Sandbox
I mean, the sky is basically the limit on it if you ask me. 🙂
Avatar
Yeah currently we use network licensing for our forensics software so I'm good on that front- it's mostly because we have only a few physical machines and a lot more consultants, but the usage of the actual forensic tools is (relatively speaking) rare for us(mostly IR). I was originally thinking about simply having a constantly updated golden image, and as new cases come in and the need to examine images comes up, us consultants can simply spin up the images as need be. Not too worried about the last two bullet points since we have those on a completely separate stack that we don't have to manage :p
7:49 PM
Just kind of trying to formulate a non-janky plan since I'm too used to doing janky things for CCDC haha
Avatar
RandyRanderson 5/5/2021 7:49 PM
So long as you're golden with the licensing of the OS (legit don't know what Windows 10 Pro or anything has ToS that is weirdly worded), I think that is a solid approach
7:49 PM
Just keep the VM with the case?
7:50 PM
That way if consultant get hit by bus, another peer can just go and spin up the machine and pick up where they left off type thing?
7:51 PM
You can certainly divvy out the licenses and just release the license after you are done using it. OR, make your golden image with everything on there + Axiom and then have the licenses on another VM for processing (you could in theory beef those ones up to handle more cores/RAM -- speed up Axiom even more) and when done, close out the case and move the Processing FOlder into your network share and open it from a different VM for analysis too
Avatar
Avatar
Turb0Yoda
Yeah currently we use network licensing for our forensics software so I'm good on that front- it's mostly because we have only a few physical machines and a lot more consultants, but the usage of the actual forensic tools is (relatively speaking) rare for us(mostly IR). I was originally thinking about simply having a constantly updated golden image, and as new cases come in and the need to examine images comes up, us consultants can simply spin up the images as need be. Not too worried about the last two bullet points since we have those on a completely separate stack that we don't have to manage :p
Found a design from 2008 that you might be interested in created by the Forensic Science Institute, University of Central Oklahoma: https://commons.erau.edu/cgi/viewcontent.cgi?article=1052&context=adfsl
Avatar
Thank you
8:02 PM
I've done a wee bit of architecture design for some SIEM and malware firing ranges but this has a different set of complexities ig
Avatar
Avatar
Adrenal1ne
Hi, could someone recommend me how to perform the analysis of windows event logs in 15 pcs +, is there any tool to automate this? i was thinking on elastic + kibana but im not sure if its ok. Thanks
DeeFIR 🇦🇺 5/5/2021 9:21 PM
ELK stack. What exactly are you looking for? Otherwise have a look at Velociraptor if you want to have a dig yourself
Avatar
chrisforensic 5/5/2021 9:55 PM
good morning @MSAB ! just need some basic info. I want to do a fresh install of XRY/XAMN. Is it ok to install XRY v9.4 and then update with latest micro-release v9.4.2 ? Or should i install XRY V9.3 and update to V9.4 and then V9.4.2 ? After then install XAMN 6.0.1 Full Setup is ok? thanks ! (edited)
Avatar
Avatar
chrisforensic
good morning @MSAB ! just need some basic info. I want to do a fresh install of XRY/XAMN. Is it ok to install XRY v9.4 and then update with latest micro-release v9.4.2 ? Or should i install XRY V9.3 and update to V9.4 and then V9.4.2 ? After then install XAMN 6.0.1 Full Setup is ok? thanks ! (edited)
oscarchoi_msab 5/5/2021 10:00 PM
Hi Chris, you can install XRY 9.4 then install XRY 9.4.2. After then you can install Full XAMN 6.0.1
Avatar
chrisforensic 5/5/2021 10:01 PM
@oscarchoi_msab 👍 so no further installs are to do? all drivers etc. will be installed?
Avatar
Avatar
chrisforensic
@oscarchoi_msab 👍 so no further installs are to do? all drivers etc. will be installed?
oscarchoi_msab 5/5/2021 10:02 PM
Yes
Avatar
chrisforensic 5/5/2021 10:02 PM
thanks, have a nice day !
Avatar
Avatar
chrisforensic
thanks, have a nice day !
oscarchoi_msab 5/5/2021 10:03 PM
You are most welcome. Have a nice day!
Avatar
Does anyone have a proper understanding of the "Save videos up to x" setting in Axiom Video artifacts? I know the maximum is up to 1024MB but I don't understand how to use the setting properly.
Avatar
Anyone know any good free resources/training for python security engineering?
Avatar
Whilst dealing with this matter sensitively it seems opinion is against Signal for the treatment towards Cellebrite - this article makes a strong case for it. In Fighting Cellebrite, Signal May Have Gone Too Far Signal’s founder says he is fighting for free speech. But his conduct and threats to Israeli mobile data firm Cellebrite pose no less of a moral problem https://www.haaretz.com/israel-news/tech-news/.premium-in-fighting-cellebrite-signal-may-have-gone-too-far-1.9776714 (edited)
👏 3
Avatar
I know each of you will have your own professional way to handle this matter. My feedback to those that asked for observations was take this opportunity to what we can learn from it. (edited)
8:39 AM
Perhaps most people would think the path to take where a vulnerability has been found in a product is to report CVE or write to the company seeking a bounty to not to disclose whilst providing detail to the company to enable update/patch? If the company is not interested or does not respond then credible hackers disclose the details with a statement why they are disclosing about the vulnerability. Pragmatism suggests take this as an opportunity to re-check agreements and policies, practices and procedures. There are numerous avenues labs can explore to mitigate using 'proactive surveillance': 1. Are there known proven cases the exploit has been actioned on real evidence? 2. Check QA procedures; see how updates and patching are handled - do they include requiring supplier to explicitly confirm the software has up-to-date vulnerability patches applied? 3. Run pen tests on your forensic suites aimed directly at the signal exploit etc., and identify the potential for the exploit to occur following device acquisition, during parsing, etc.? 4. Does the forensic suites use unlicensed software which the IP proprietor could seek suspension of use through the High Court Order? 5. And so on...
Avatar
dumpanddecode 5/6/2021 8:44 AM
Can anyone recommend a program (preferably free) that I can use to enhance the audio in a .mp4 file? There’s a 3 second segment where someone whispers something. I can almost make out what is being said but I need to hear exactly what is being said. Thanks.
Avatar
Audacity is what I typically use
Avatar
dumpanddecode 5/6/2021 9:32 AM
@whee30 thanks. Is it a free program?
Avatar
@dumpanddecode yes, Audacity is a free app
Avatar
dumpanddecode 5/6/2021 10:20 AM
@Arcain thanks
Avatar
Are there known proven cases the exploit has been actioned on real evidence?
How would you know for sure?
see how updates and patching are handled - do they include requiring supplier to explicitly confirm the software has up-to-date vulnerability patches applied?
This reminds me of updates without bumping the version number. In forensics software. --- So far, no security vulnerabilities caused problems with evidence. It's easier to ignore them than to deal with them, it's easy to repeat "we validate everything" mantra.
(edited)
Avatar
So I discovered something today. I had a Huawei with File Safe Box enabled. The physical extraction showed a number of encrypted files. The safe box database showed the titles of the files, the encrypted names, the number in there and other bits. The application itself needed a pin and a password to access the application. The initial pin was due to app lock. Anyway the file safe box also allowed for a fingerprint to access the contents. We didn't  have the password but what I did discover was if you add a fingerprint as in your own you can access the application and view the contents 😁 so after doing that I inserted a unused new sd card to move the contents to it. There is no option for copying the files. Unfortunately needed the password to move the files to a new inserted sd card. But if you go to delete the safe box it gives you the option to move the files to a location of your choice and only requires the fingerprint as access. Not ideal. But you can then image the SD card and exhibit it as the file safe box. Obviously the correct permissions from the powers  that be.....but it's a solution 😁
👍 3
Avatar
🐊Ricky_GFJC 5/6/2021 11:08 AM
Hi @Cellebrite when I do a fresh install of the latest UFED/PA, do I need to also install the APK Downgrade Pack and the UFED App Categorization DB? How do you know when these need to be updated? And for PA do I need to install the GPU Package for Media Classification? Will the GPU significantly speed up the Media Classification?
Avatar
Avatar
DeeFIR 🇦🇺
ELK stack. What exactly are you looking for? Otherwise have a look at Velociraptor if you want to have a dig yourself
Thanks, I'm looking for any malicious activity or anomalies in the event logs. For example, creation of tasks, users, use of rdp, services, etc.
Avatar
Avatar
dumpanddecode
@Arcain thanks
ninjadeathsquad 5/6/2021 12:20 PM
To enhance vocal/voice put the audio through an EQ and raise the level for 500mhz
Avatar
@🐊Ricky_GFJC fresh install yes the apk and app cat are seperate as they are optional (and can be large) they are periodically updated and uploaded to the portal (usually corresponding to a release but not every) gpu is needed if using CSE image category, and yes GPU will assist with speed of processing media.
Avatar
Avatar
punacmc
Has anyone else noticed reporting from UFED PA is taking significantly longer than in the past? I've got plenty of resources on my workstations, so it isn't that kind of problem. This has been present in the past several versions... Just want to see if others are having similar experiences.
heatherDFIR 5/6/2021 1:58 PM
Which version? And are you selecting to report the same items as before or are other artifacts selected? I can try to replicate. Also, which format are you exporting to?
Avatar
Avatar
🐊Ricky_GFJC
Hi @Cellebrite when I do a fresh install of the latest UFED/PA, do I need to also install the APK Downgrade Pack and the UFED App Categorization DB? How do you know when these need to be updated? And for PA do I need to install the GPU Package for Media Classification? Will the GPU significantly speed up the Media Classification?
heatherDFIR 5/6/2021 2:00 PM
Hey rick. I did a Tip Tues on this. I would install them anytime you do an update just in case. They are always there as Add-ons for the versions when needed. A feature request was pushed to R&D to alert you of the version. I agree this is needed.
Avatar
@heatherDFIR To answer your question, it has been 7.42 and the two before that. Longer in a specific use case. I wanted to see if other Cellebrite customers were having similar experiences without biasing the responses. Our use case has been in support for a while and was recently pushed to R&D. While troubleshooting that issue, we have been noticing that this can occur outside of our use case at times. Seems that our PDF and LegalView reports can come to a crawl. I don't want to clog up the forum, so anyone can PM me for further. In a different matter, we are paying close attention to the security vulnerability exploit fallout. Very interested in the community discussion.
Avatar
Avatar
Adrenal1ne
Thanks, I'm looking for any malicious activity or anomalies in the event logs. For example, creation of tasks, users, use of rdp, services, etc.
DeeFIR 🇦🇺 5/6/2021 5:14 PM
If you’re happy to collect the logs or push a client to the endpoint to collate logs, then ELK. If you want to push a client to the endpoint and then go hunt, Velociraptor.
Avatar
Avatar
Colman
Perhaps most people would think the path to take where a vulnerability has been found in a product is to report CVE or write to the company seeking a bounty to not to disclose whilst providing detail to the company to enable update/patch? If the company is not interested or does not respond then credible hackers disclose the details with a statement why they are disclosing about the vulnerability. Pragmatism suggests take this as an opportunity to re-check agreements and policies, practices and procedures. There are numerous avenues labs can explore to mitigate using 'proactive surveillance': 1. Are there known proven cases the exploit has been actioned on real evidence? 2. Check QA procedures; see how updates and patching are handled - do they include requiring supplier to explicitly confirm the software has up-to-date vulnerability patches applied? 3. Run pen tests on your forensic suites aimed directly at the signal exploit etc., and identify the potential for the exploit to occur following device acquisition, during parsing, etc.? 4. Does the forensic suites use unlicensed software which the IP proprietor could seek suspension of use through the High Court Order? 5. And so on...
Moral implications aside, the implications of the exploit need to be discussed. I have never had training where the forensic instructor goes over an anti-forensic exploit that (allegedly) executes upon the collection of data. In this case, how could you prove, or disprove your collection was clean? Allegedly, the sky is the limit on ways the exploit could be utilized. Has anyone reproduced the report? Has anyone validated the claims? Are other forensic tools as vulnerable? Did Signal implement before disclosure? What is an equivalent forensic example of this exploit? A piece of physical evidence that could destroy/alter all of the other evidence collected and stored in the evidence van on scene? Perhaps, I am reading too much into it. But I'd like to hear what everyone else is thinking but not saying.
💯 1
Avatar
Avatar
punacmc
Moral implications aside, the implications of the exploit need to be discussed. I have never had training where the forensic instructor goes over an anti-forensic exploit that (allegedly) executes upon the collection of data. In this case, how could you prove, or disprove your collection was clean? Allegedly, the sky is the limit on ways the exploit could be utilized. Has anyone reproduced the report? Has anyone validated the claims? Are other forensic tools as vulnerable? Did Signal implement before disclosure? What is an equivalent forensic example of this exploit? A piece of physical evidence that could destroy/alter all of the other evidence collected and stored in the evidence van on scene? Perhaps, I am reading too much into it. But I'd like to hear what everyone else is thinking but not saying.
I think yours and @Mr. F. are asking the same question. Has the Signal code actually been released in the wild? My understanding at the moment is it hasn't but I could be wrong. I am going on roughly the statement by Signal and the hacking community complaining why Signal has not released the code. So even before running infosec pen testing, Cellebrite quite rightly informed all its users to verify with other tools first then apply Cellebrite and see if the exploit occurs (using test phones) with UFED / PA. Also not to use PA until matters are resolved. This is one proactive surveillance course of action. (edited)
11:13 PM
The second course of surveillance will be when defendants scream from the roof tops that the evidence wasn't generated by them as a defence. Have you heard any screams yet? Maybe that is because the exploit isn't in the wild yet. The issue of making such a public threat must be conjuring thoughts in peoples minds of, as an example. the computer misuse act. I don't know if Signal sent the exploit to Cellebrite to prove their point. (edited)
11:16 PM
I did speak with an iso17025 accredited lab who had brought in a pen tester to understand the exploit. They found there was a small chance of an exploit working but have taken steps to mitigate. I don't know what they did as this was their internal approach but I am sure they will filter through the correct channels to the College of Policing, FCN and BAU.
11:22 PM
My personal thoughts are Cellebrite has been treated disgracefully in the way this has been enacted against them. If an exploit is found then follow the appropriate procedure, which are not hard to find. Also, the infosec requirement for law enforcement 17025 labs will mean checks are mostly needed. The other part to this Signal matters is that it hits out at and impacts on everyone in the digital forensics food chain. The private and smaller organisations using forensics suites are left wondering.
Avatar
CB patched PA etc from what I can understand (following on from it all)
Avatar
Avatar
Colman
I think yours and @Mr. F. are asking the same question. Has the Signal code actually been released in the wild? My understanding at the moment is it hasn't but I could be wrong. I am going on roughly the statement by Signal and the hacking community complaining why Signal has not released the code. So even before running infosec pen testing, Cellebrite quite rightly informed all its users to verify with other tools first then apply Cellebrite and see if the exploit occurs (using test phones) with UFED / PA. Also not to use PA until matters are resolved. This is one proactive surveillance course of action. (edited)
If an exploit is found then follow the appropriate procedure, which are not hard to find.
There is no procedure to follow. Responsible disclosure is just an option, not a requirement.
Has the Signal code actually been released in the wild? My understanding at the moment is it hasn't but I could be wrong.
No need. Cellebrite confirmed the issue by releasing a fix. You won't release a fix for a non-existing issue.
Cellebrite quite rightly informed all its users to verify with other tools first then apply Cellebrite and see if the exploit occurs (using test phones) with UFED / PA.
This makes no sense. A successful exploitation attempt may remain unnoticed. Using more than one tool won't protect examiners against code execution issues in one of them. The vulnerability has been confirmed, so the only verification reasonable is to compare the UFED 4PC/PA version number to see if it's up-to-date.
They found there was a small chance of an exploit working but have taken steps to mitigate.
Mitigations make exploitation harder, not impossible.
Also, the infosec requirement for law enforcement 17025 labs will mean checks are mostly needed.
So, the proposal is to ignore the issue by running checks that don't result in anything useful. I disagree.
(edited)
👍 1
Avatar
Avatar
heatherDFIR
Hey rick. I did a Tip Tues on this. I would install them anytime you do an update just in case. They are always there as Add-ons for the versions when needed. A feature request was pushed to R&D to alert you of the version. I agree this is needed.
🐊Ricky_GFJC 5/7/2021 5:15 AM
Awesome. I will have to catch up on my tip Tuesdays. Thanks.
Avatar
Avatar
CLB-AndyM
@🐊Ricky_GFJC fresh install yes the apk and app cat are seperate as they are optional (and can be large) they are periodically updated and uploaded to the portal (usually corresponding to a release but not every) gpu is needed if using CSE image category, and yes GPU will assist with speed of processing media.
🐊Ricky_GFJC 5/7/2021 5:18 AM
Will add them now. Thanks!
Avatar
Has anyone reported on a Cellebrite Chat Capture? I've spent days working through the chat capture and now that I finally have all my screenshots it appears that PA doesn't even parse it well. I don't know how I'm supposed to deliver thousands of screenshots when theyre all out of order.
8:08 AM
Even if I sort alphabetically its not usable because it orders it like this: chat1_screen1 chat1_screen10 chat1_screen100 .... chat1_screen199 chat1_screen2
8:11 AM
And I can't rename any of the images because they're all packaged in a zip with a UFD hash. Any suggestions would be really helpful!
8:11 AM
@Cellebrite
Avatar
Avatar
Mr. F.
If an exploit is found then follow the appropriate procedure, which are not hard to find.
There is no procedure to follow. Responsible disclosure is just an option, not a requirement.
Has the Signal code actually been released in the wild? My understanding at the moment is it hasn't but I could be wrong.
No need. Cellebrite confirmed the issue by releasing a fix. You won't release a fix for a non-existing issue.
Cellebrite quite rightly informed all its users to verify with other tools first then apply Cellebrite and see if the exploit occurs (using test phones) with UFED / PA.
This makes no sense. A successful exploitation attempt may remain unnoticed. Using more than one tool won't protect examiners against code execution issues in one of them. The vulnerability has been confirmed, so the only verification reasonable is to compare the UFED 4PC/PA version number to see if it's up-to-date.
They found there was a small chance of an exploit working but have taken steps to mitigate.
Mitigations make exploitation harder, not impossible.
Also, the infosec requirement for law enforcement 17025 labs will mean checks are mostly needed.
So, the proposal is to ignore the issue by running checks that don't result in anything useful. I disagree.
(edited)
No Mr F I disagree with your over simplification tone of 'just ignore it'; but perhaps that is just best for you.
Avatar
Avatar
Colman
No Mr F I disagree with your over simplification tone of 'just ignore it'; but perhaps that is just best for you.
It's not oversimplification. This is how things actually work in our field. This vulnerability raised the same old new arguments like "it's an examiner who testifies, not a tool", "not a peer-reviewed vulnerability report, thus can't bring it into a courtroom", etc. Vulnerabilities that affect the integrity of the evidence collection process aren't something new, but they are simply ignored. Have you ever heard of NIST-validated imaging tools running code from attached HDDs during the boot? Have you ever heard of LinEn installing KNOPPIX updates from an evidence drive? Or EnCase Imager being exploited from an evidence drive? Or EnCase... there are enough examples. I'm glad that labs try to validate things and mitigate vulnerabilities, but this isn't enough, obviously. For example, building quick and dirty mitigations around UFED 4PC to protect against this and similar vulnerabilities can actually affect (weaken) acquisition capabilities (like blocking the ability to spawn a new process in an attempt to block possible exploits and post-exploitation stuff). (edited)
💯 1
Avatar
Avatar
Colman
I think yours and @Mr. F. are asking the same question. Has the Signal code actually been released in the wild? My understanding at the moment is it hasn't but I could be wrong. I am going on roughly the statement by Signal and the hacking community complaining why Signal has not released the code. So even before running infosec pen testing, Cellebrite quite rightly informed all its users to verify with other tools first then apply Cellebrite and see if the exploit occurs (using test phones) with UFED / PA. Also not to use PA until matters are resolved. This is one proactive surveillance course of action. (edited)
I heard nothing from Cellebrite on this matter. Which I hate to admit, I am not surprised about. Not all LE labs are ISO certified. Most LE I've worked or trained were leaning towards being button pushers. Almost no interest in taking a deep dive into the digital forensic subject. They would take a vendor at their word and not verify a thing that the tool produced. Not saying that is everywhere, but I saw enough in my experience to be worried with folks who follow the leaders blindly. There seems to be a lot of educated experienced forensicators here. This is an interesting topic that doesn't get discussed much in depth, which is what I am looking for.
👍 1
Avatar
Does anyone know if third-party apps (like Kik, Whatsapp, etc) can be installed in Huawei PrivateSpace?
Avatar
HOT OFF THE PRESS! "Six Steps to Successful #MobileValidation" - A SANS #DFIR paper created in collaboration with @Cellebrite @MSAB_XRY @MagnetForensics @oxygenforensic @GrayshiftLLC @parabencorp @Belkasoft @ElcomSoft Download now -->https://t.co/s7JuNk8o7d #mobileforensics
👍 13
😍 2
9:46 PM
Very cool community collaboration and yes of course a shout out to this discord group. Vendor neutral. Just a team approach to extractions / validation.
💯 6
Avatar
Hi all, jobs available at the CCTV team at West Midlands Police, based in Birmingham. Interest in people with skills in device penetration, networking and coding, esp Linux: https://wmp.referrals.selectminds.com/jobs/video-imaging-officer-1277
Grade: Band D Lower Salary: £29,793-£36,369 Closing Date: 19th May 2021 MAIN PURPOSE OF ROLE To provide a comprehensive video recovery...
Avatar
Avatar
wamhp
Hi all, jobs available at the CCTV team at West Midlands Police, based in Birmingham. Interest in people with skills in device penetration, networking and coding, esp Linux: https://wmp.referrals.selectminds.com/jobs/video-imaging-officer-1277
Andrew Rathbun 5/8/2021 10:30 AM
#training-education-employment
Avatar
Humble#2244 5/8/2021 10:21 PM
10:22 PM
I've just installed autopsy on my laptop (Windows 10 Home), the font size is so small that can't even read properly . Anyone else had this issue?
Avatar
In this guide, we show you the steps to change the high DPI settings for classic desktop applications individually to fix scaling problems on the Windows 10 April 2018 Update without having to sign-out and in again.
Avatar
Avatar
danaa#0138
Does anyone know if third-party apps (like Kik, Whatsapp, etc) can be installed in Huawei PrivateSpace?
Yes, any app can be run in it. It can have a separate Google account associated
Avatar
Humble#2244 5/9/2021 7:48 AM
Thanks for the reference , but it didn't work. I believe this fixes apps being blurry but i'm having a little different issue here. I didn't work I tried
Avatar
Hi, if some of you have a iMac forensic workstation, what are your specs please ? Already ram/cpu/gpu, I'll check the rest later
Avatar
Anyone have anything they can reccommend in the way of audio forensics for courses or certifications? UNV of CO has a program but interested in other tracks as well!
Avatar
Anyone recognize this symbol from an LG phone? The apps also appear in another place with no symbol.
Avatar
Avatar
Cole
Anyone recognize this symbol from an LG phone? The apps also appear in another place with no symbol.
It’s dual apps
👍 1
4:48 PM
Different accounts for different SIM cards
Avatar
Hi @Magnet Forensics, someone call tell me please why Axiom need to locate the source after ingesting ? and we need to relocate if we move it ? because artifacts are still there, previews also, the file system view is still built
5:54 AM
Just want to know why relocating is important
Avatar
Avatar
Reedsterz
It’s dual apps
thanks!
Avatar
Avatar
AnTaL
Hi @Magnet Forensics, someone call tell me please why Axiom need to locate the source after ingesting ? and we need to relocate if we move it ? because artifacts are still there, previews also, the file system view is still built
If you wish to dig into the FS view - ie PList viewer, SQLite viewer etc
Avatar
@b1n2h3x I saw the message for relocate in artifact view on a document. It's a bug so ?
Avatar
Nope, not a bug. You will see it for that source if not linked 🙂
Avatar
that's why I was asking. The preview still worked and the metadata seemed to be good in artifact view. So I was wondering why I would need to relocate
Avatar
Mike MC from Magnet 5/11/2021 10:02 AM
Hi @AnTaL, The file system data is available, but if you wanted to see the actual contents of a file, the source is required to do so.
Avatar
Hi all - anyone here an DF/IR MSSP and using Splunk as a log ingestion and analysis platform? would like to ask a few questions..i.e how does the licencing work?
Avatar
Avatar
Salvatore
Hi all - anyone here an DF/IR MSSP and using Splunk as a log ingestion and analysis platform? would like to ask a few questions..i.e how does the licencing work?
Andrew Rathbun 5/11/2021 6:24 PM
We use splunk but I have no clue how the licensing works. It might be related to how much you can ingest per day but that's a guess based on the daily limits we have.
👍 1
Avatar
Avatar
Salvatore
Hi all - anyone here an DF/IR MSSP and using Splunk as a log ingestion and analysis platform? would like to ask a few questions..i.e how does the licencing work?
RandyRanderson 5/11/2021 8:02 PM
What questions do you have? It’s all about how much you plain to ingest. At my former employer, we were at about 1TB/mo and even then, we had to get pretty selective with our shit.
👍 1
8:03 PM
Do NOT try to ingest deep packet inspection from something like Bluecoat lol
Avatar
would love some opinions on how to get the ideal setup for running investigations in a corporate environment, starting with virtual vs physical machine. We currently have Encase on a desktop pc, and I am trialing AXIOM on an Azure VM. I believe we will go to AXIOM when our renewal comes up, and the desktop is due for replacement. What is a better set up?
Avatar
Avatar
JR-21
would love some opinions on how to get the ideal setup for running investigations in a corporate environment, starting with virtual vs physical machine. We currently have Encase on a desktop pc, and I am trialing AXIOM on an Azure VM. I believe we will go to AXIOM when our renewal comes up, and the desktop is due for replacement. What is a better set up?
RandyRanderson 5/11/2021 10:13 PM
How much time you have 😂
10:14 PM
I can most certainly set you up. DM me. Give you a good layout.
Avatar
RandyRanderson 5/11/2021 10:14 PM
Or if the group wants it. Fuck it lol
Avatar
Hah
Avatar
RandyRanderson 5/11/2021 10:15 PM
Source to this: I helped stand up a very large one. Been in all 4 sectors (public, private, consulting, academic) — I’m not perfect with it. But I can help make it work in a budget.
10:16 PM
Cause you know “grants”
10:18 PM
Budget aside. The size of the company is the first thing I need to know. Can be generic. But give a rough range of size and amount of cases. And what you’re seeing from a forecast on both those #s. Don’t build for today. Build for tomorrow.
Avatar
2000 employees, only 500 use work issued laptops. Company is in the health sector so lots of public facing staff. Roughly 1 investigation a month ranging from "did this employee do any actual work" to allegations of neglect/abuse of customers, and even one prolonged one relating to theft of corporate data. Most cases are just 1-2 devices and some Office 365 data, but one in the last 18 months involved 8 laptops, 3 phones and about 20 user accounts. I don't have a budget as such, but all the budget for this will need approval before I can spend a cent. The company is a non-profit so our corporate side needs to stay lean.
11:05 PM
Current purchased setup is a 3 year old Dell desktop, 2TB SSD, i7 processor, 16GB RAM, running Encase. Last big investigation it took 28 hours to process a 200GB laptop drive. Also currently trialing AXIOM 5.0 on an Azure VM, usually D16s V4, but I have been playing around with scaling it up and down for different MVS labs to see how much difference there is. Lastly, we use tapes to store backups of all departing manager laptops, which are captured using Encase.
11:06 PM
The quote for AXIOM is currently with the CEO so that part is probably a done deal
Avatar
RandyRanderson 5/11/2021 11:31 PM
Got it my friend. Give me till morning US time. I’ll lay you out like “holy smokes”
11:32 PM
Yay twins lol
11:32 PM
Any budget or IT sensitivity issues? Meaning - you got internal “pay to play”
Avatar
No issues I can think of other than the stuff above about needing to keep it "lean". Just needs to be justifiable expense, and luckily I have other areas of budget U can tweak if needed. I want to build a solution that will last so I only need one big approval and can leave it at that for a while.
👍 1
Avatar
Any recommendations to prevent Axiom Process from eating all my RAM and crashing? Somewhat common occurrence. I'm watching it slowly burn through my 64GB RAM and virtual memory.
8:43 AM
Currently using 122GB of RAM+virtual memory
Avatar
DeeFIR 🇦🇺 5/12/2021 9:24 PM
@Cole last time I saw that it was unpacking a tonne of archives; zips, jar etc, and recursively unpacked them with no end in sight.. What's the activity like on the thread details in Process?
Avatar
DeeFIR 🇦🇺 5/12/2021 10:16 PM
Has anyone tested Axiom v5 and noticed any realworld improvements?
Avatar
Avatar
JR-21
No issues I can think of other than the stuff above about needing to keep it "lean". Just needs to be justifiable expense, and luckily I have other areas of budget U can tweak if needed. I want to build a solution that will last so I only need one big approval and can leave it at that for a while.
RandyRanderson 5/13/2021 8:27 AM
Sorry for the massive delay on my part Jay! First, I would ditch EnCase based on your current setup. Much like FTK, you're going to be very resource heavy in order to move quickly. The one major thing I liked about FTK (not sure if EnCase even has this) is they had the ability to send you an email once it was done processing. You didn't need to set up anything for that to happen either (X-Ways you need to). This is super helpful when processing the whole thing. Second, I worked in MedTech as a Cyber Investigator for a few years -- we were doing roughly 2 cases a week for Non-Compete/IP Theft. Based on your comment on "did this employee do actual work" you're basically in the same boat. With that said, you probably are doing "too much" if that makes sense. I would strongly suggest looking to something like KAPE and processing for artifacts that are much more relevant to your investigations. For example, you probably are not needing to go dig into if a file is there or not. The aspect of the employee opening a specific file from a USB drive is much more beneficial to the investigation (and subsequent litigation) than the actual file being there. My recommendation would be this: GET Evidence > Inventory/Evidence Collection > Image Hard Drive > KAPE from Image > Analyze > Report Findings > Release Evidence based on approval from Legal/HR Teams
👍 1
Avatar
Avatar
RandyRanderson
Sorry for the massive delay on my part Jay! First, I would ditch EnCase based on your current setup. Much like FTK, you're going to be very resource heavy in order to move quickly. The one major thing I liked about FTK (not sure if EnCase even has this) is they had the ability to send you an email once it was done processing. You didn't need to set up anything for that to happen either (X-Ways you need to). This is super helpful when processing the whole thing. Second, I worked in MedTech as a Cyber Investigator for a few years -- we were doing roughly 2 cases a week for Non-Compete/IP Theft. Based on your comment on "did this employee do actual work" you're basically in the same boat. With that said, you probably are doing "too much" if that makes sense. I would strongly suggest looking to something like KAPE and processing for artifacts that are much more relevant to your investigations. For example, you probably are not needing to go dig into if a file is there or not. The aspect of the employee opening a specific file from a USB drive is much more beneficial to the investigation (and subsequent litigation) than the actual file being there. My recommendation would be this: GET Evidence > Inventory/Evidence Collection > Image Hard Drive > KAPE from Image > Analyze > Report Findings > Release Evidence based on approval from Legal/HR Teams
RandyRanderson 5/13/2021 8:28 AM
For the actual Lab Setup, you have 2 options really. You can either get hardware to do forensics on, or you can virtualize the entire process. From a hardware perspective, Dell Precision Towers are probably your best bet. Especially if you're corporate and they want you to stay within the contract obligations with a preferred vendor. Dell appears to be the best bet with medical companies still. But what you're looking for is Xeon Processors (and with Dell Precision you typically get 2 processors), or i7/i9, AMD Ryzer with at least 16 cores. Most tools hit your CPU cores before they break the bank on your RAM. If you can splurge, look at a custom build with a Threadripper 32+ core. From a RAM perspective, anything less than 32GB is useless IMO if you're using any of the "big 4" tools: (FTK, EnCase, Axiom, X-Ways).
💯 1
Avatar
Avatar
RandyRanderson
For the actual Lab Setup, you have 2 options really. You can either get hardware to do forensics on, or you can virtualize the entire process. From a hardware perspective, Dell Precision Towers are probably your best bet. Especially if you're corporate and they want you to stay within the contract obligations with a preferred vendor. Dell appears to be the best bet with medical companies still. But what you're looking for is Xeon Processors (and with Dell Precision you typically get 2 processors), or i7/i9, AMD Ryzer with at least 16 cores. Most tools hit your CPU cores before they break the bank on your RAM. If you can splurge, look at a custom build with a Threadripper 32+ core. From a RAM perspective, anything less than 32GB is useless IMO if you're using any of the "big 4" tools: (FTK, EnCase, Axiom, X-Ways).
RandyRanderson 5/13/2021 8:32 AM
If you decided to virtualize, you'll probably need approval to get a PHYSICAL server on the network infrastructure. What you're looking for is simply speed. Have your system administrator team help you build one out. But same concept, only now you'll want at least 128GB of RAM and as many processors as you can. Make sure it can support virtualization and then you'll need to set up the enterprise licenses for Windows for your machines. I would suggest giving each one of the systems at least a handful of cores and 32GB of RAM. However, what I've heard many doing nowadays is creating a VM for each case. They store the evidence of each case within this VM and when the case is complete, they just archive the VM and move on. Something to consider with your Legal/Leadership teams as there is risk (like everything else) to this. You will also need to verify with licensing of your software if this can be done. With KAPE...not a problem. I'm sure TZWorks is the same way. I've never heard of Magnet saying no to this. But could be something (or just a headache) if using things like EnCase or FTK that require physical dongles.
Avatar
Avatar
RandyRanderson
If you decided to virtualize, you'll probably need approval to get a PHYSICAL server on the network infrastructure. What you're looking for is simply speed. Have your system administrator team help you build one out. But same concept, only now you'll want at least 128GB of RAM and as many processors as you can. Make sure it can support virtualization and then you'll need to set up the enterprise licenses for Windows for your machines. I would suggest giving each one of the systems at least a handful of cores and 32GB of RAM. However, what I've heard many doing nowadays is creating a VM for each case. They store the evidence of each case within this VM and when the case is complete, they just archive the VM and move on. Something to consider with your Legal/Leadership teams as there is risk (like everything else) to this. You will also need to verify with licensing of your software if this can be done. With KAPE...not a problem. I'm sure TZWorks is the same way. I've never heard of Magnet saying no to this. But could be something (or just a headache) if using things like EnCase or FTK that require physical dongles.
RandyRanderson 5/13/2021 8:37 AM
Frankly speaking, here is what my ideal Corporate Lab would have:
  • Mac Mini (you should always try to do Mac Forensics on a Mac) that does NOT have the M1 chip
  • 2 Dell Precision Towers. Set one up with Cellebrite/Oxygen/Elcomsoft for mobile devices. If you have not gotten into Tablets/Phones yet -- you're missing out on pretty much 90% of what your Legal/HR Teams are concerned about. The other machine, house your VM's within it. Max out RAM and Processors. Keep both machines as STATIC IPs on your internal network.
You need to be the only people who can access your centralized storage share of evidence. Work with your Sys Admins/Network team to properly lockdown with permissions to a Network share that you will keep evidence located at. You could, in theory, store this on your internal computers within your Lab....but there may be times where you need to access evidence (or others on your team do) that you don't want them to have access to your Forensic Computers OR you're actually using them yourself (or your team is)
Avatar
Avatar
RandyRanderson
Frankly speaking, here is what my ideal Corporate Lab would have:
  • Mac Mini (you should always try to do Mac Forensics on a Mac) that does NOT have the M1 chip
  • 2 Dell Precision Towers. Set one up with Cellebrite/Oxygen/Elcomsoft for mobile devices. If you have not gotten into Tablets/Phones yet -- you're missing out on pretty much 90% of what your Legal/HR Teams are concerned about. The other machine, house your VM's within it. Max out RAM and Processors. Keep both machines as STATIC IPs on your internal network.
You need to be the only people who can access your centralized storage share of evidence. Work with your Sys Admins/Network team to properly lockdown with permissions to a Network share that you will keep evidence located at. You could, in theory, store this on your internal computers within your Lab....but there may be times where you need to access evidence (or others on your team do) that you don't want them to have access to your Forensic Computers OR you're actually using them yourself (or your team is)
RandyRanderson 5/13/2021 8:43 AM
If you're looking at Software, my suggestion would be:
  • Axiom
  • KAPE and all of Eric's Tools
  • X-Ways
  • Cellebrite Investigator
  • Cellebrite UFED/Physical Analyzer
  • Oxygen
  • F-Response
The tools aside, these are just what I personally trust. However, you (as the investigator) need to have all options available to you in order to do your job. F-Response is amazing for mounting remote drives (Magnet Cyber and Power Response [Powershell Module you can get on Github for free], Velociraptor do the same too). Oxygen is amazing with things like WhatsApp if you're dealing with that chat application at all (which you are if you're international). Physical Analyzer/UFED is still the standard IMO for phone analysis. X-Ways for deep dive forensics. Axiom if you want to process for things AND/OR provide its portable case to another peer/investigator/legal to look through. Eric's tools + KAPE legit is going to give you probably everything you need for 98% of your cases involving Windows machines.
Avatar
@RandyRanderson can I get this all written up in a document lol, fantastic references and options
😆 4
Avatar
Avatar
RandyRanderson
If you're looking at Software, my suggestion would be:
  • Axiom
  • KAPE and all of Eric's Tools
  • X-Ways
  • Cellebrite Investigator
  • Cellebrite UFED/Physical Analyzer
  • Oxygen
  • F-Response
The tools aside, these are just what I personally trust. However, you (as the investigator) need to have all options available to you in order to do your job. F-Response is amazing for mounting remote drives (Magnet Cyber and Power Response [Powershell Module you can get on Github for free], Velociraptor do the same too). Oxygen is amazing with things like WhatsApp if you're dealing with that chat application at all (which you are if you're international). Physical Analyzer/UFED is still the standard IMO for phone analysis. X-Ways for deep dive forensics. Axiom if you want to process for things AND/OR provide its portable case to another peer/investigator/legal to look through. Eric's tools + KAPE legit is going to give you probably everything you need for 98% of your cases involving Windows machines.
RandyRanderson 5/13/2021 8:46 AM
Again, tools aside, your biggest hurdles are going to be internal discussions. Most of your tools are going to require typical vendor profiling by your Finance people. You'll most likely need waivers as they are on annual fees and require you to probably exceed your spending ability through a corporate card. You will also need to justify the expensive forensic computers + laptop of your team. Most companies at this point usually only allow 1 machine (usually a laptop) per person. Your leadership will need to sign off on justification of basically $3K+ devices. What we've brought up should help with that
Avatar
Avatar
stark4n6
@RandyRanderson can I get this all written up in a document lol, fantastic references and options
RandyRanderson 5/13/2021 8:46 AM
I've done this a time or two 🙂
8:47 AM
Every company is different, but for the most part the biggest headache is dealing with internal shit. Especially getting the software
8:47 AM
Not to mention the pain that is getting the waiver for YOU to be the Sys Admin for things like Updates + Disabling AV + Disabling EDR + Enabling certain Firewall ports.... etc etc etc
Avatar
Avatar
RandyRanderson
Every company is different, but for the most part the biggest headache is dealing with internal shit. Especially getting the software
totally agree, still building out our team covering over 50k employees globally, and management wants to fight us over Case Management tools haha
Avatar
Avatar
stark4n6
totally agree, still building out our team covering over 50k employees globally, and management wants to fight us over Case Management tools haha
RandyRanderson 5/13/2021 8:48 AM
When we did ours at one of the places I was at -- it was a nightmare
8:48 AM
Especially when dealing with EMEA and GDPR
8:48 AM
It was still a new thing and Legal was having a complete aneurysm with what was being logged.
8:50 AM
Another key thing I would suggest is breaking out your investigations to help with your customers on 1) tempering expectations and 2) what results they are going to get
8:51 AM
For Non-Competes you want to provide them with a list of things that most likely were recently accessed and other external media (if allowed) that was on the system within a reasonable (usually 30 days) time frame. You'll also want to get Admin rights to 0365 Console so you can pull email + logs from any 3rd-party cloud resource (Google Drive, Box, 0365, etc.). Ultra bonus points -- get justification for a SPLUNK instance and ingest that shit
8:52 AM
You'll also want to get yourself, or a teammember, on the HR/RIF teams so you can proactively monitor if they're doing anything prior to announcement. Not to mention, you'll want to be assisting with the termination process of employees who would be deemed high risk (typically sales reps, but I made the power move to include many HQ functions based on access)
8:57 AM
Also, start warming up (if you haven't already) with folks in Compliance, HR, Legal, and Finance Investigation as well. These are all avenues to get you more work and ultimately justify move headcount. While IP Theft (what was employee doing) type cases are the bread and butter for corporate forensics....there is soooooo much more you can be doing that is ultimately more rewarding. Additionally, you should start to make the play to those various teams that YOU should be the gatekeeper when dealing with third-party forensics teams (EY, KPMG, Fireeye, Mandiant, Kroll, etc.). YOU ARE THE SME FOR YOUR COMPANY NOT THEM!!!
8:59 AM
A lot of those third-parties are there to do their job (and they doing amazingly!) but they don't have you and your teams best interest at hand. If anything, they are also trying to sales pitch your internal teams that they can do your job. If you are at the table, you insure your teammembers are not being "talked over" with IT jargon along with keeping those third-parties honest with what they're doing. It also allows YOU to be the person they have to go through if they want things like: Evidence, Logs, Physical Access, etc. They should be an extension of your team, not a replacement
Avatar
RandyRanderson 5/13/2021 9:29 AM
Also, if you're looking at laptops -- keep in mind you are probably moving around a lot, so weight + charging mechanism is a massive factor. I would also double down and say not to get a M1 Macbook since you can't virtualize yet to my knowledge. I would get something that either can be charged by USB-C (just makes charging easier as you can customize how you want to do it and not bring a giant brick). And Windows is probably going to be your best bet IF your IT policy allows the software installation Not all companies are "friendly" with that. But if you can at least get VMWare on your system, you can always virtualize a Forensic Workstation and do your work that way. Same concept though, anything less than 32GB you're going to be hurting if you're doing any type of processing power (i.e. Axiom, FTK, Encase). However, for me, I was about being as discrete as possible when I traveled. I had an altoids can that had my Cellebrite dongle, X-Ways dongle and I had the Axiom license from our license server installed on the VM already. The dongles were not marked, so they just looked like normal thumb drives to an unknown person. I carried 3 USB drives (128GB, 256GB, 512GB) for any imaging purpose. There was also a 2TB nvme drive via USB-C/USB3 adapter if I was doing more than 1 SSD + 1 phone. I kept a separate laptop charger, secondary monitor screen, all that provided above + medical things (anti-acid, allergy, pain, bandaids, etc.) all in my bag. There was also a notebook with Chains of Custody, Rocketbook notepad + pens/highlighters all in there in basically a "go bag." Even had at least a days worth of clothes (minus pants) in it at all times. That bag went with me literally everywhere. I cannot tell you the amount of times I got calls to go do something <24 hours notice. And I'm not just talking domestic flights...
9:32 AM
Again, keep in mind weight with laptops though!! Cannot stress it enough. I had a Dell sent to me in my govvie days that had 64GB of RAM and 2x2TB SSDs in it. It was SUPER cool, but holy F, did it weight a ton!! And you've got that on your back/side all the time. Plus all the other stuff (write blocker, etc.) that weighs you down. Nothing is more annoying than being on a plane for 18 hours and then having to truck a 30lb backpack on your back through a large ass airport cough Atlanta cough
Avatar
Avatar
RandyRanderson
Not to mention the pain that is getting the waiver for YOU to be the Sys Admin for things like Updates + Disabling AV + Disabling EDR + Enabling certain Firewall ports.... etc etc etc
Thanks so much for all the advice. The great part with this is that the SysAdmins and IT procurement staff all report to me, and given we had a supreme court case to deal with last year the board are open to getting the right setup.
Avatar
Avatar
JR-21
Thanks so much for all the advice. The great part with this is that the SysAdmins and IT procurement staff all report to me, and given we had a supreme court case to deal with last year the board are open to getting the right setup.
RandyRanderson 5/13/2021 1:04 PM
Perfect!
1:04 PM
Make sure you get budgeted annually for renewals
1:06 PM
If you can, I’d keep your Forensic workstations on your domain so you can remote into them. Get a dirty line ran to your lab if you’re going to be physically in a building too. Sometimes you need to research or download things your company blocks. Same if you get consent to pull cloud logs/email.
1:07 PM
Easier to do from a dirty machine where you can dork with ports than it is to get a firewall exception
Avatar
my "lab" is the server room and we have a dirty line already because it was a freebie after our connection build costs skyrocketed, so it sounds like by pure dumb luck I already have some of the things you are suggesting. Reaching out to my Dell account manager to get a quote on a machine.
Avatar
RandyRanderson 5/13/2021 5:58 PM
If you need specifics on machines let me know
5:59 PM
Don’t buy Alienware shit lol.
5:59 PM
If you foresee travel. Keep laptop as light as possible. Get a work tablet for email.
6:00 PM
Workstations. Xeon processors and Max the ram out
6:01 PM
You can buy your own drives if needed. If you can’t do that. Get 2 drives - 1 that is SSD/nvme roughly 1TB for OS and other stuff. The other. Get an sea gate iron wolf and the biggest you can get. 8+TB for a working drive
Avatar
Avatar
RandyRanderson
Don’t buy Alienware shit lol.
Oh don't worry, I wont fall for the trick of paying for the badge - plus we get government pricing on professional machines, but not on consumer ones.
6:19 PM
while we do have offices really spread out, instead of me traveling we just ship all devices back to me for processing.
6:21 PM
Thanks so much for all this, it is giving me a way better starting point than what I would have gotten from searching around online
Avatar
Avatar
RandyRanderson
Workstations. Xeon processors and Max the ram out
I'd probably suggest i9s
11:05 PM
Xeons have too many threads that won't be completely used.
11:06 PM
We used to have Xeons but our newer builds we went for the i9s
👍 1
Avatar
morn! Does anyone have (and be willing to share) an up-to-date general checklist for home/premises searches which includes dealing with running machines - eg capturing RAM, live imaging, checking for encryption etc? Also including suggested software/hardware. Thanks!
Avatar
burgers_N_bytes 5/14/2021 7:58 AM
Does anyone know the hardware specs on the UFED Touch2 tablet? Thanks in advance.
Avatar
Hi, i got access to a Cellebrite report of a logical extraction, but I don't see any hash values. Is that because it's a mobile device, because it's a logical extraction, or is it something else?
Avatar
Avatar
manuelevlr
Hi, i got access to a Cellebrite report of a logical extraction, but I don't see any hash values. Is that because it's a mobile device, because it's a logical extraction, or is it something else?
Yes. You only get hash values from file system and physical extractions.
Avatar
Avatar
Joe Schmoe
Yes. You only get hash values from file system and physical extractions.
then would it be appropriate to hash the resulting download folder / subfolder which contains the extracted logical data?
Avatar
Avatar
manuelevlr
then would it be appropriate to hash the resulting download folder / subfolder which contains the extracted logical data?
It couldn’t hurt. It’s always nice for confirmation later if needed.
Avatar
but if one were to modify a file and then load the * .ufd file (I'm just talking about logical extraction), would PA notice it?
Avatar
I’m not sure how it would unless you broke something. That’s why validation is so important. Are you asking because of the Signal drama?
Avatar
no, simple curiosity
Avatar
crystalcity 5/16/2021 6:01 AM
So I am currently in online school and in my final year. I started working toward a degree in intelligence. And then really liked a cyber class so switched to cyber intelligence. Now I’m in a digital forensics class and really loving that, wanting to make it my focus. Not changing my major, just focusing on digital forensics. Anyways, WHERE DO YOU START?! This topic is so huge and reading through conversations on here I am completely lost. It seems like a large number of people have their own business. Any input on that? Is business pretty regular? New to this world and really enjoying learning about it
Avatar
Avatar
crystalcity
So I am currently in online school and in my final year. I started working toward a degree in intelligence. And then really liked a cyber class so switched to cyber intelligence. Now I’m in a digital forensics class and really loving that, wanting to make it my focus. Not changing my major, just focusing on digital forensics. Anyways, WHERE DO YOU START?! This topic is so huge and reading through conversations on here I am completely lost. It seems like a large number of people have their own business. Any input on that? Is business pretty regular? New to this world and really enjoying learning about it
Andrew Rathbun 5/16/2021 6:04 AM
There is such thing as Cyber Threat Intelligence (in fact, #cyber-threat-intelligence 🙂 ) so you could always move towards that. Do you have any DFIR experience? If you want, we can move to #training-education-employment and continue the discussion and get you on a path to success
Avatar
Avatar
Andrew Rathbun
There is such thing as Cyber Threat Intelligence (in fact, #cyber-threat-intelligence 🙂 ) so you could always move towards that. Do you have any DFIR experience? If you want, we can move to #training-education-employment and continue the discussion and get you on a path to success
crystalcity 5/16/2021 6:34 AM
I do not have any experience. I am currently taking two classes on the topic. One is simply “computer forensics” the other is “network and mobile device forensics”. The first couple weeks were enough to spark my interest. And yes we can move over there! Perfect.
Avatar
Avatar
DeeFIR 🇦🇺
@Cole last time I saw that it was unpacking a tonne of archives; zips, jar etc, and recursively unpacked them with no end in sight.. What's the activity like on the thread details in Process?
Been a couple days, sorry. It looked like it was scanning sector by sector at the time. I added more RAM and it made it through.
Avatar
Do anyone know if Clonezilla is forensically sound?
Avatar
Avatar
prche
Do anyone know if Clonezilla is forensically sound?
Digitalferret 5/17/2021 9:16 AM
likely not; https://clonezilla.org/ "Clonezilla saves and restores only used blocks in the hard disk. This increases the clone efficiency. " (edited)
Avatar
Thank You!
👍🏻 1
Avatar
Can anyone recommend some good password dictionaries for cracking an alpha-numeric phone password?
Avatar
ninjadeathsquad 5/17/2021 11:37 AM
I can share one I just generated for every permutation of a 4 pin, 3 digits and 1 letter if you like?
Avatar
Avatar
MarkF
Can anyone recommend some good password dictionaries for cracking an alpha-numeric phone password?
Andrew Rathbun 5/17/2021 11:53 AM
#password-encryption-cracking would be a good place to ask too
Avatar
Are there any cloud solutions out there for keeping track of imaged devices and delivering access to clients without having to send physical copies?
3:28 PM
And by access I don't mean file downloads but an actual forcenic review suite online.
Avatar
Avatar
Jake
Are there any cloud solutions out there for keeping track of imaged devices and delivering access to clients without having to send physical copies?
randomaccess 5/17/2021 3:40 PM
Magnet REVIEW does this I believe
Avatar
Do they handle third party report/data formats or is it their own? @randomaccess
Avatar
randomaccess 5/17/2021 3:51 PM
Magnet REVIEW collects and documents all your digital evidence into a single platform, allowing non-technical users to analyze it from their web browser.
3:53 PM
according to this, yes
Avatar
Question: If someone would cast CP to an Xbox one, is it possible to see which device used the casti g function?
Avatar
Hi everyone ! someone knows the difference, in Axiom, between adding a folder containing logical files as evidence with the checkboxes in the file/folder option and adding it in the same view with the button "folders" and you have to select the folder via the popup
4:33 AM
One is very fast and the other slower
4:33 AM
I don't have the same results of artifacts too but it's the same folder and same options
4:34 AM
just the way to select it
4:40 AM
the "folder browser" seems to create duplicates for words/excel documents (not always the same number) but with "carving" as recovery method
Avatar
Avatar
Dan15
Question: If someone would cast CP to an Xbox one, is it possible to see which device used the casti g function?
ninjadeathsquad 5/18/2021 5:19 AM
At a bit of a guess, if you had a PCAP of the network traffic it should indicate IP/MAC.
Avatar
Hi there. Any French judicial experts here ? I am planning on applying for next Year and would like to ask questions.
Avatar
@Cellebrite need some help regarding an open ticket on the portal, could someone please pm me?
Avatar
Anyone seen a Linkedin email that has the suggested connections 'Connect' button going through a Linkedin .cn?
Avatar
I exported media files out of AXIOM in VICS 2.0 JSON format. When I import into Griffeye, it says a portion of the images in the JSON file do not have original files available. Can anyone explain why this may be?
Avatar
Avatar
B
@Cellebrite need some help regarding an open ticket on the portal, could someone please pm me?
CLB - DavidK 5/18/2021 11:55 PM
Just did
Avatar
@ninjadeathsquad Yes, unfortunately there has not been any network investigation yet. I was just wondering where to look for such a connection. Thanks for your input.
👍🏻 1
Avatar
honor_the_data 5/19/2021 6:20 AM
Does anyone know the channel(s) that correspond with the MVS2021 summit?
Avatar
Avatar
honor_the_data
Does anyone know the channel(s) that correspond with the MVS2021 summit?
This year Magnet has there own Discord server they are using for the summit. I'll send you a DM. (edited)
👍 1
Avatar
MaverickCanuck 5/19/2021 7:52 AM
Hi @Jobbins where do I find Jason Jordan's / Magnets discord?
Avatar
Avatar
MaverickCanuck
Hi @Jobbins where do I find Jason Jordan's / Magnets discord?
👍 1
Salute 1
Avatar
Apologies if this has already been posted (I did search but didn't find it), but this is a really interesting article on the state of end-to-end encryption & the fight against online child abuse by wired which is worth a read: https://www.wired.co.uk/article/whatsapp-encryption-child-abuse
A trail of clues helped police close in on a dangerous predator. Now, a battle over the future of end-to-end encryption could change the rules of engagement
👍 2
Avatar
wynona's big brown beaver 5/19/2021 2:45 PM
Hi, I'm a new DF student and I had a few questions about making disk images. How are very large disks being imaged? (4-6TB?) Even if it only has 100GB, you're still getting the full disk size?
Avatar
Avatar
wynona's big brown beaver
Hi, I'm a new DF student and I had a few questions about making disk images. How are very large disks being imaged? (4-6TB?) Even if it only has 100GB, you're still getting the full disk size?
Andrew Rathbun 5/19/2021 5:54 PM
Maybe that 6tb drive only has 100GB of stuff on it. Why have your image be 5.9TB of zeroes when the image could just say "the remaining sectors are FF FF" or whatever the equivalent to being zeroed out is in HEX. Someone correct me if I'm wrong
Avatar
wynona's big brown beaver 5/19/2021 5:55 PM
that was my thoughts as well, however wouldn't you miss out on deleted files?
Avatar
Avatar
wynona's big brown beaver
Hi, I'm a new DF student and I had a few questions about making disk images. How are very large disks being imaged? (4-6TB?) Even if it only has 100GB, you're still getting the full disk size?
You can image the entire drive and then compress the image. I’ve imaged 6TB drives before but depending on policy it may be required. (edited)
Avatar
wynona's big brown beaver 5/19/2021 5:58 PM
are you able to analyze or extract data from a compressed disk?
Avatar
It would be a compressed image file. And yea forensic software can read it. It may take longer to process.
Avatar
wynona's big brown beaver 5/19/2021 6:21 PM
awesome
6:22 PM
I got a friend's hard drive that won't boot, and I was going to do a raw disk image, but it's 2TB
Avatar
Hi everyone
6:28 PM
Is there any standard competence reference for a person that want to make CSIRT?
Avatar
NIST SP800-61 and 800-86 are pretty great.
Avatar
Can anyone recommend a database viewer that can display BLOB data like a plist or embedded graphic? Physical analyzer is good about this but of course I can’t use PA for everything. Db browser is great but won’t display BLOB data.
Avatar
have you tried Blacklight? not sure about images but if your blob is a plist it's amazing
10:19 PM
double click, boom you've got another window with a plist
Avatar
@whee30 what OS? I pretty much use PA for everything - it will certainly view plists in databases and some blob objects. However you may have more luck using a python script to pull out the files from the database and view separately.
Avatar
Avatar
wynona's big brown beaver
I got a friend's hard drive that won't boot, and I was going to do a raw disk image, but it's 2TB
Create a E10 image. If you use FTK imager (free tool) you van choose the amount of compression you are comfortable with. But with the standard settings I have never had any issues with analysing data afterwards.
Avatar
It'll depend on the tools, some like FTK Imager will image everything whereas imaging via X-Ways for example will skip the "empty space". (edited)
Avatar
Avatar
whee30
Can anyone recommend a database viewer that can display BLOB data like a plist or embedded graphic? Physical analyzer is good about this but of course I can’t use PA for everything. Db browser is great but won’t display BLOB data.
Ribbon!
👍 1
1:25 AM
CCL releases RabbitHole as its successor to Ribbon, giving analysts a significant performance edge in forensic data explorations
1:25 AM
I haven't actually used RabbitHole yet (edited)
Avatar
randomaccess 5/20/2021 1:38 AM
I was meant to test this out but ran out of time. Someone test it and write a blog post so I can read it plzz 😂
Avatar
Digitalferret 5/20/2021 1:57 AM
hmm, digitalferret - rabbithole. convergent? 🙂
Avatar
@whee30 SQLite Expert Personal will do the job. Agree with @OllieD that Ribbon, now known as Rabbit Hole is superb but obviously comes with a cost
3:19 AM
The author of Ribbon - wanted to call it Rabbit Hole from the start in regards to a Plist within a Plist within a Plist etc but I think the company made him call it Ribbon, pleased for Alex that its now called what he originally wanted 😆
💯 5
Avatar
Avatar
whee30
Can anyone recommend a database viewer that can display BLOB data like a plist or embedded graphic? Physical analyzer is good about this but of course I can’t use PA for everything. Db browser is great but won’t display BLOB data.
Alex (Foxton Forensics) 5/20/2021 4:07 AM
For SQLite databases? If so SQLite Examiner will pull out all images - https://www.foxtonforensics.com/sqlite-database-examiner/
SQLite Examiner is a free tool for inspecting the contents of SQLite databases. Includes many features for analysing Binary Large Objects (BLOB) stored within SQLite databases.
Avatar
Avatar
wynona's big brown beaver
I got a friend's hard drive that won't boot, and I was going to do a raw disk image, but it's 2TB
Most tools offer E01 compression which would work for your case. Best idea is to image it to as large a medium as you have because you don't necessarily know how much data is on the hard drive.
Avatar
Digitalferret 5/20/2021 9:18 AM
@wynona's big brown beavermaybe do a quick visual check with something you can check the raw data with, like HxD or a free copy of R-Studio. hook the drive up, scroll through. as others have mentioned, it's unlikely to be full. You could then maybe image say a 1TB (or however much is used) block with a free imager program. Another means might be to use Clonezilla, which as far as I'm aware only clones used space. (edited)
Avatar
Hello everyone! I am new to the community. I hope to grow with you all, and thanks for the opportunity to be here! (edited)
Salute 4
👍 4
👋🏻 4
Avatar
wynona's big brown beaver 5/20/2021 4:51 PM
thanks @Cole @Digitalferret
Avatar
Hi ppl !.. just graduated from digital forensics and new to the field. I want to know how can we extract data from a fitbit or mi smart band watches. I Tried YouTube but had no luck and discovered this server...any ideas. Thanks.
Avatar
Any1 have any idea why, facebook messenger Vanish mode is not working with android 11?
Avatar
@Cellebrite when bruteforcing a Galaxy A20 in UFED i wasnt able to choose a custom wordlist or i overlooked it. It runs your wordlist, this phone only contains digits, is your strategy all 4-pin first then all 6-pin?
Avatar
Avatar
Arlakossan
@Cellebrite when bruteforcing a Galaxy A20 in UFED i wasnt able to choose a custom wordlist or i overlooked it. It runs your wordlist, this phone only contains digits, is your strategy all 4-pin first then all 6-pin?
I think at first release we’re not supporting custom dict
Avatar
I regret doing a whole bunch of patches and updates in one day. My @Cellebrite workstation is responding to clicks in PA with delays and I can't tell what is causing it... Anyone else struggling with PA 7.45.0.96 performance by any chance? (edited)
Avatar
Avatar
GRIZZ
I regret doing a whole bunch of patches and updates in one day. My @Cellebrite workstation is responding to clicks in PA with delays and I can't tell what is causing it... Anyone else struggling with PA 7.45.0.96 performance by any chance? (edited)
Do you by any chance have nvidia GPU and g-sync compatibile monitor, with gsync enabled?
Avatar
Avatar
Arcain
Do you by any chance have nvidia GPU and g-sync compatibile monitor, with gsync enabled?
I have a nVidia GTX 1070 with the latest studio drivers (should I be running game ready drivers?) No G-Sync capable monitors here.
7:11 AM
Among all the things I installed yesterday, I also installed the Cellebrite "GPU Package for Media Classification". I thought it would help after a case took 18 hours to open. (edited)
Avatar
@GRIZZ i'm asking because a lot of apps built on Electron is lagging with g-sync enabled and i have to manually disable it per app to get them working correctly. PA isn't built like that but was worth to try
👍 1
Avatar
Avatar
Mr.robot
Hi ppl !.. just graduated from digital forensics and new to the field. I want to know how can we extract data from a fitbit or mi smart band watches. I Tried YouTube but had no luck and discovered this server...any ideas. Thanks.
DeeFIR 🇦🇺 5/21/2021 2:57 PM
@facelessg00n has a teardown guide hiding somewhere
Avatar
Avatar
DeeFIR 🇦🇺
@facelessg00n has a teardown guide hiding somewhere
facelessg00n 5/21/2021 3:38 PM
I have something hiding somewhere, like most of my projects it’s not finished though :p. I have some pinouts for a couple of them. This paper (not mine$ will give you a bit of an idea what you are in for with them though. https://homepages.inf.ed.ac.uk/ppatras/pub/raid17.pdf
Avatar
burgers_N_bytes 5/22/2021 11:38 AM
Has anyone attempted to run forensic software from Parallels on an M1 Mac yet?
Avatar
burgers_N_bytes 5/22/2021 11:47 AM
The new MacBook is very tempting especially with @Elcomsoft newest update (edited)
Avatar
randomaccess 5/22/2021 3:27 PM
@burgers_N_bytes didn't m1 parallels only run ARM win10?
Avatar
burgers_N_bytes 5/22/2021 3:28 PM
Good question....maybe I skimmed over that tidbit of important information. I’ll check back into it.
Avatar
randomaccess 5/22/2021 3:56 PM
From memory Parralels and VMware came out and said they werent going to support x86 virtualisation. So part of the benefits of using a Mac for DFIR are out the window. At this stage if my work laptop falls over, ill be looking at a Windows laptop instead
💯 1
Avatar
Theycallmekirby 5/22/2021 9:54 PM
Hello everyone, sorry if this is the wrong place to post this but I was wondering if anyone had tips/advice for getting into cyber security/DFIR. I have a BA in history/pol sci and a few years of experience in ESL teaching and working as a paralegal. I'm looking into getting a few certs to help me get a foot in the door. Would certs such as A+, networking+, and security be useful for working in help desk then move up and go from there? I'm just unsure on how to shift my liberal arts education into something that could be used in the IT field.
Avatar
randomaccess 5/22/2021 10:08 PM
@Theycallmekirby working in help desk is definitely helpful. It can be difficult and a rite of passage so to speak but it does mean you have experience dealing with problems. Building a foundation with certs may be beneficial, as well as testing on your own computers to try figure out how they work. The thing that sets new folks apart is showing that they can and will teach themselves. Because that is a critical (difficult to teach) skill in dfir
Avatar
Avatar
Theycallmekirby
Hello everyone, sorry if this is the wrong place to post this but I was wondering if anyone had tips/advice for getting into cyber security/DFIR. I have a BA in history/pol sci and a few years of experience in ESL teaching and working as a paralegal. I'm looking into getting a few certs to help me get a foot in the door. Would certs such as A+, networking+, and security be useful for working in help desk then move up and go from there? I'm just unsure on how to shift my liberal arts education into something that could be used in the IT field.
Check out #training-education-employment too 😊
Avatar
DefendingChamp 5/23/2021 5:08 AM
Is there anyone based in the UK? Ran across someone online who needs DF services in the UK to cross examine VOIP audio files given to her but she feels was tampered with. Just wanted to give my referral to her.
Avatar
Avatar
Theycallmekirby
Hello everyone, sorry if this is the wrong place to post this but I was wondering if anyone had tips/advice for getting into cyber security/DFIR. I have a BA in history/pol sci and a few years of experience in ESL teaching and working as a paralegal. I'm looking into getting a few certs to help me get a foot in the door. Would certs such as A+, networking+, and security be useful for working in help desk then move up and go from there? I'm just unsure on how to shift my liberal arts education into something that could be used in the IT field.
DefendingChamp 5/23/2021 5:10 AM
DF and cybersec is a specialized subset of IT. I recommend trying to get into an entry role of IT such as IT support or Helpdesk first. Good luck!
Avatar
Theycallmekirby 5/23/2021 8:39 AM
Thank you all very much, it’s much appreciated. Is it possible for me to start in help desk without any certs and a degree in non tech field? (edited)
Avatar
burgers_N_bytes 5/23/2021 11:44 AM
@randomaccess I looked back and you are correct. According to Microsoft documentation In Dec ‘20 they introduced x64 and x86 emulation. How well that works though is anyone’s guess.
Avatar
Avatar
Theycallmekirby
Thank you all very much, it’s much appreciated. Is it possible for me to start in help desk without any certs and a degree in non tech field? (edited)
RandyRanderson 5/23/2021 4:45 PM
Depends in your area. But it’s possible. However, look at certs like CompTIA A+ and Network+ though too. There are terrific free resources out there to help to self study. The tests are pretty cheap too. It’s a great way to get your feet wet.
Avatar
Avatar
Theycallmekirby
Hello everyone, sorry if this is the wrong place to post this but I was wondering if anyone had tips/advice for getting into cyber security/DFIR. I have a BA in history/pol sci and a few years of experience in ESL teaching and working as a paralegal. I'm looking into getting a few certs to help me get a foot in the door. Would certs such as A+, networking+, and security be useful for working in help desk then move up and go from there? I'm just unsure on how to shift my liberal arts education into something that could be used in the IT field.
krisc#21223 5/23/2021 5:29 PM
I would definetly look into SANS courses. They are pricey but worth it. Also you can look into IACIS.
Avatar
@Magnet Forensics anybody on for an Axiom question ?
9:55 AM
DM , me please
Avatar
kmacdonald1565 5/24/2021 10:17 AM
Anyone know of a good way to return a found ipod touch 7g? off duty i found one in a weekly rental house that has been empty since about October, and it has a pass code. I tried getting particulars off of it but all i have is a S/N. tried throwing it on cellebrite premium to get an apple id or any other email / phone number but it wasnt doing anything, just kept saying waiting to connect. Nearest apple store is probably an hour and a half or more away.
Avatar
Avatar
kmacdonald1565
Anyone know of a good way to return a found ipod touch 7g? off duty i found one in a weekly rental house that has been empty since about October, and it has a pass code. I tried getting particulars off of it but all i have is a S/N. tried throwing it on cellebrite premium to get an apple id or any other email / phone number but it wasnt doing anything, just kept saying waiting to connect. Nearest apple store is probably an hour and a half or more away.
Digitalferret 5/24/2021 10:23 AM
maybe a facebook/twitter post with a local hashtag or area code? give vague details and ask for the "losing party" to provide correct details as proof. I'm sure mention of Police Dept would deter chancers 🙂 Don't your PD's have a lost & found dept? (UK here)
Avatar
kmacdonald1565 5/24/2021 10:25 AM
facebook/twitter post probably wouldnt work, too many vacationers and transients. and we do have lost/found department, but it would sit there and rot unclaimed, it would not be actively looked into. it was also from a town that has the reputation of having rich vacationers, so they probably didnt bother to report it missing.
Avatar
Digitalferret 5/24/2021 10:31 AM
ah, fair - no idea from over here of the logistics involved.
10:32 AM
facebook is the usual "help needed / i lost a cat / dog / specs / " etc in a local area group
Avatar
Avatar
kmacdonald1565
Anyone know of a good way to return a found ipod touch 7g? off duty i found one in a weekly rental house that has been empty since about October, and it has a pass code. I tried getting particulars off of it but all i have is a S/N. tried throwing it on cellebrite premium to get an apple id or any other email / phone number but it wasnt doing anything, just kept saying waiting to connect. Nearest apple store is probably an hour and a half or more away.
Throw a add up on Kijiji, of they can provide pop .. (edited)
Avatar
Does anyone know where I can get some up-to-date forensic images/extractions for practice with? I want to give an intern a drive to learn the tools with, but not a real case. It'd be nice if there was an "answer sheet" as well with the things that are in the image so I can kind of grade how they do with it and what they find. Thanks!
Avatar
Avatar
RyanB
Does anyone know where I can get some up-to-date forensic images/extractions for practice with? I want to give an intern a drive to learn the tools with, but not a real case. It'd be nice if there was an "answer sheet" as well with the things that are in the image so I can kind of grade how they do with it and what they find. Thanks!
CLB_joshhickman1 5/25/2021 6:14 AM
Digital Corpora has several images, most of which have accompanying documentation. https://digitalcorpora.org (edited)
Salute 1
Avatar
Has anybody from @Law Enforcement [USA] @Law Enforcement [Switzerland] dealt with ProtonMail in regards to legal demand ? If so please DM me regarding a school district bomb threat. Thank you
Avatar
Avatar
DCSO
Has anybody from @Law Enforcement [USA] @Law Enforcement [Switzerland] dealt with ProtonMail in regards to legal demand ? If so please DM me regarding a school district bomb threat. Thank you
Dealing with them currently, I'd go via interpol or europol
10:30 AM
Followed their LE online advice which said to email their legal team whom replied saying to connect to them via official police channels I. E. Interpol or europol
👍 2
Avatar
hey, if you missed it HITB is back this week ! https://conference.hitb.org/hitbsecconf2021ams/
May 27 - 28th / ONLINE
Avatar
Wee post on cipher.exe. Hope you find it interesting if you haven't heard about it before or take something away if you have. Cheers
Salute 1
👍 1
2:04 AM
Gone with out a trace (a garbled one at least)
Avatar
dumpanddecode 5/26/2021 2:31 PM
Anyone know what info pinger can return with a search warrant? And will they provide subscriber information for numbers without a subpoena if the dates and times for messages is provided with a request?
Avatar
Avatar
dumpanddecode
Anyone know what info pinger can return with a search warrant? And will they provide subscriber information for numbers without a subpoena if the dates and times for messages is provided with a request?
They will not provide any info without a subpoena but they are typically very helpful.
Avatar
LordWhistleBottom 5/26/2021 7:16 PM
Hi all - hope you are doing well, it's late for some of us and I'm here in a personal capacity. I've been a recent victim of a cyber attack and I'll stay out of the weeds and ask just a couple questions. I have a nvme drive and ram attached to my laptop that i use strictly for crypto mining which is, why, i assume, I've popped up on someone's radar. a little over a week ago I noted my mining wallet changed from my wallet to another, first red flag. I changed it back to mine, disabled rdp on all my computers, changed my logon credentials and disabled all remote network features as well as isolated my laptop to my guest network. a couple days later, wallet changed again, I then reinstalled windows.... couple more days and again wallet changed. The short of what I need is a suggestion for a freeware tool to wipe my RAM and (dod wipe) NVME drive. I wont get into the potential of identity theft because I know I'm already boned as the browser on this laptop had many stored passwords. I'd just like to clearn this device and get back to having it make money for me on a sterile device that poses no threat to my other network devices. Any advice would be appreciated.
7:19 PM
I suppose I should mention how I got here. I'm an ediscovery professional that has worked for two fortune 500 companies and now a very large law firm. I'm not some bum off the street. I just don't have many outlets outside of this community that can give me the answers I'm looking for
Avatar
JonasWanobi 5/27/2021 5:57 AM
Voting is open for the 2021 Digital Forensics 4:Cast Awards. ! You have until Jul 22nd. https://t.co/CyIr7iZ8w5?amp=1
💯 1
5:58 AM
Then come see our gracious host @Andrew Rathbun and myself give presentations at the SANS DFIR Summit.
PartyParrot 7
5:59 AM
💯 2
Avatar
Anyone used the MAGNET Chromebook Acquisition Assistant? I
7:05 AM
Oops. I am having some issues*
Avatar
@RyanB I can likely help connect you with the right folks.
Avatar
I'm having a brain freeze, I have video from Walmart and I have the VerintVideo Codec loaded but VLC etc will not play them. Ideas or solutions?
Avatar
Mr. Eddie Vedder from Accounting 5/27/2021 9:38 AM
Any US LEO's with Axiom, a PhotoDNA license and Project Vic json care to DM me. I've been having an issue with one of those and trying to narrow it down.
Avatar
Avatar
DCSO
I'm having a brain freeze, I have video from Walmart and I have the VerintVideo Codec loaded but VLC etc will not play them. Ideas or solutions?
blake_at_amped 5/27/2021 9:46 AM
Did it come with "Evidence Reviewer" to play in the player. Verint codecs are terrible. That said, we do also have them supported in @Amped Software's Replay and FIVE. If you want a trial to check out the video, let me know.
Avatar
Spready-Amped 5/27/2021 9:53 AM
Verint? - Thats a computer killer! - their codecs are buggy as hell!@DCSO
Avatar
@blake_at_amped No it came with .avi's and VerintVideoSolutionsCODEC installer which is already loaded from several other cases.
10:28 AM
@Spready-Amped@blake_at_amped Got it to open with MPC (mpc-hc.org) Thanks
Andrew Rathbun pinned a message to this channel. 5/27/2021 6:34 PM
Avatar
Avatar
LordWhistleBottom
Hi all - hope you are doing well, it's late for some of us and I'm here in a personal capacity. I've been a recent victim of a cyber attack and I'll stay out of the weeds and ask just a couple questions. I have a nvme drive and ram attached to my laptop that i use strictly for crypto mining which is, why, i assume, I've popped up on someone's radar. a little over a week ago I noted my mining wallet changed from my wallet to another, first red flag. I changed it back to mine, disabled rdp on all my computers, changed my logon credentials and disabled all remote network features as well as isolated my laptop to my guest network. a couple days later, wallet changed again, I then reinstalled windows.... couple more days and again wallet changed. The short of what I need is a suggestion for a freeware tool to wipe my RAM and (dod wipe) NVME drive. I wont get into the potential of identity theft because I know I'm already boned as the browser on this laptop had many stored passwords. I'd just like to clearn this device and get back to having it make money for me on a sterile device that poses no threat to my other network devices. Any advice would be appreciated.
Hi Trog, sorry that happened! Sounds nasty. First, RAM is volatile, so if you remove power from RAM, all stored data is wiped instantly. DOD wipes are needless, especailly on flash memory. If you really want to be nuts, you could use DBAN to wipe it with 0s, although most people would say that isn't the best idea on a flash memory because it is needless wear and tear. I'm not an infosec expert, but my guess is (based on the steps you've previously outlined) that someone is getting to your data from somewhere else, not your mining machine. Do you have other devices on the network that could be compromised? Can your wallet address be changed from a webserver? I've done a bit of mining myself but I'm not exactly sure which address you are referring to and how its used.
Avatar
Well, that did not take long. Anyone know the process for Apple Airtags? I'm assuming you pop the battery and there is a unique ID under the battery and you modify an apple search warrant?
9:00 AM
Can any data loss be done if the battery is removed?
Avatar
I've found online there is a serial under the AirTag battery. I'm all set.
Avatar
LordWhistleBottom 5/28/2021 9:27 AM
@Cole are there tools built for dband with nvme? also thank you for answering. I was under the impression that data could be taken from RAM even after power is lost, from a forensic point of view. As a result, I figured that a virus could live there and a similar 0,1 write action could be performed to wipe the ram. As for other machines, yes several and none of them are as yet compromised. Webserver - sort of, I had enabled an API tool that would allow browser to change the config file but I thought it was LAN access only, either way once I noticed the compromise I disabled all webserver config tools and went so far as to make my machines undiscoverable on the network, removed RDP and even remote assistance on all computers. The wallet address is the destination for your crypto to go, mine is an intermediary between my bank and my miner. Some people use a hardware wallet which is in a bit more of a vaccum. This person, edited the config file of my miner to point all mining of currency to go to another wallet which I have since had banned from the mining network I use. So, a small win for me. This person took about 10 bucks from me and I took about 200 from them 😄
Avatar
chrisforensic 5/28/2021 10:20 AM
hello and good evening @Cellebrite is there a new version of the BSSID-DB, or is this latest version?
Avatar
Avatar
LordWhistleBottom
@Cole are there tools built for dband with nvme? also thank you for answering. I was under the impression that data could be taken from RAM even after power is lost, from a forensic point of view. As a result, I figured that a virus could live there and a similar 0,1 write action could be performed to wipe the ram. As for other machines, yes several and none of them are as yet compromised. Webserver - sort of, I had enabled an API tool that would allow browser to change the config file but I thought it was LAN access only, either way once I noticed the compromise I disabled all webserver config tools and went so far as to make my machines undiscoverable on the network, removed RDP and even remote assistance on all computers. The wallet address is the destination for your crypto to go, mine is an intermediary between my bank and my miner. Some people use a hardware wallet which is in a bit more of a vaccum. This person, edited the config file of my miner to point all mining of currency to go to another wallet which I have since had banned from the mining network I use. So, a small win for me. This person took about 10 bucks from me and I took about 200 from them 😄
Some NVME drives support a secure erase command which sometimes can be accessed from manufacturer software utility. Basically instead of writing 0s or 1s to the entire drive, the drive controller will flash every single sector to 1 in one go (supposedly- i've never used it myself). On another note, is it possible the mining software you use is the issue? Without your intervention, its pretty unlikely someone could have widespread access throughout your machine. One additional idea is to have two user accounts on the machine. One admin account, one regular user account. Run the mining program under the user account. That way if someone were to get access they could not do anything else without administrator password.
Avatar
I suspect its the software.
this 1
Avatar
A question to the @Cellebrite_UFED users, In Physical Analyzer, do you use / leverage? #DFIR
6:31 PM
Just looking to gather some info on media export if you can take 2 sec to vote
Avatar
Avatar
chrisforensic
hello and good evening @Cellebrite is there a new version of the BSSID-DB, or is this latest version?
What’s on the portal is most up to date
👍 1
Avatar
Avatar
LordWhistleBottom
@Cole are there tools built for dband with nvme? also thank you for answering. I was under the impression that data could be taken from RAM even after power is lost, from a forensic point of view. As a result, I figured that a virus could live there and a similar 0,1 write action could be performed to wipe the ram. As for other machines, yes several and none of them are as yet compromised. Webserver - sort of, I had enabled an API tool that would allow browser to change the config file but I thought it was LAN access only, either way once I noticed the compromise I disabled all webserver config tools and went so far as to make my machines undiscoverable on the network, removed RDP and even remote assistance on all computers. The wallet address is the destination for your crypto to go, mine is an intermediary between my bank and my miner. Some people use a hardware wallet which is in a bit more of a vaccum. This person, edited the config file of my miner to point all mining of currency to go to another wallet which I have since had banned from the mining network I use. So, a small win for me. This person took about 10 bucks from me and I took about 200 from them 😄
Hi, regarding the wipe of the RAM I think that if you boot the computer using something like TAILS on the RAM it will wipe the RAM when you power it off. (edited)
Avatar
Avatar
CLB-Paul
Just looking to gather some info on media export if you can take 2 sec to vote
randomaccess 5/29/2021 3:00 AM
Context is important on voters though. LE focused then for sure (although not in every lab). Civil side, less of a reason to
👍 2
Avatar
Avatar
randomaccess
Context is important on voters though. LE focused then for sure (although not in every lab). Civil side, less of a reason to
Good point Phil, more in relation to ICAC / Child exploitation files
Avatar
LordWhistleBottom 5/30/2021 7:27 PM
@Cole THanks for all your help and you too @Dam
Avatar
Deleted User 5/31/2021 12:56 AM
Someone know if Motorola E6 play xt2029-2 is FDE or FBE?
Avatar
Andrew Rathbun 6/1/2021 7:39 AM
Come spend some time with @stark4n6 and @b1n2h3x - https://www.youtube.com/watch?v=v4lXVMC1vPM in 20 minutes!
💯 1
Avatar
Good afternoon everyone. Always remember, it’s a great day when you wake up and could investigate and provide forensics. Make it a great one
💯 4
Avatar
Hi I am a student new to android forensics the .dd image that i acquired is encrypted. Anyone has any recommendations or guides to get around the encryption?
Avatar
@ehh if you can get around this you would be paid a handsome reward 🙂 I believe Android encryption with it be file based or full is in the SHA-256 family.
Avatar
Even if I have the passphrase? or all possible credentials to crack the encryption? (edited)
Avatar
@ehh That is my understanding you can take this to #password-encryption-cracking those guys would know best.
Avatar
Alright Thanks for your help! :)
Avatar
Has anyone done any research on biometric data on devices? For instance, what, if anything, is stored on the device for face or fingerprint unlock? Can this data be used to identify a person using the device? Etc.
Avatar
@Law Enforcement [UK] how are you guys set up in terms of internet on DFIR machines? We have none coming in to the network but I'm finding more and more it's causing problems with Windows components almost requiring it now to function properly
Avatar
Avatar
Sudo
@Law Enforcement [UK] how are you guys set up in terms of internet on DFIR machines? We have none coming in to the network but I'm finding more and more it's causing problems with Windows components almost requiring it now to function properly
No WWW here, we are alone.
Avatar
Avatar
Sudo
@Law Enforcement [UK] how are you guys set up in terms of internet on DFIR machines? We have none coming in to the network but I'm finding more and more it's causing problems with Windows components almost requiring it now to function properly
Andrew Rathbun 6/3/2021 4:27 AM
Have you looked into W10 LTSC or something like that which doesn't have all the telemetry BS?
Avatar
We have a separate ‘dirty laptop’ nothing that goes onto it can go onto the forensic network with rigorous sheep dipping
4:28 AM
Without*
Avatar
We have just gotten our own 1gbe internet line. At the minute it’s standalone. However I’m looking to get it plumbed into the dfu network via a ‘walled garden’ with a proxy server in the middle with a whitelist of allowable sites
Avatar
it's probably not even just limited to windows honestly, I'm testing now cuz I already had a problem with RDP because of no internet, now I'm wondering if our other network problems are linked
Avatar
Wouldn’t even risk having the physical connection to the forensic network
Avatar
Also could you look at deploying a windows update server
Avatar
Avatar
Sudo
@Law Enforcement [UK] how are you guys set up in terms of internet on DFIR machines? We have none coming in to the network but I'm finding more and more it's causing problems with Windows components almost requiring it now to function properly
We have a dirty laptop we use for these types of things and cloud downloads. All this on a seperate WiFi only our unit uses. (edited)
Avatar
Part of the FSR codes requires a forensic network not to be internet facing
Avatar
Unless it’s specifically for windows updates, we get them from our IT team who can push them out over the network to patch
4:29 AM
They sheep dip themselves
Avatar
Avatar
dan_
Part of the FSR codes requires a forensic network not to be internet facing
Is it as black and white as that or is there more to it?
Avatar
I’ve always understood it to be a line in the sand
Avatar
I imagine it comes from the similar vein of "don't change data" which isn't possible any more (on phones anyway)
Avatar
Plus, it’s an unnecessary risk, any connection would be a vulnerability
Avatar
Avatar
busted4n6
Is it as black and white as that or is there more to it?
Check the PDF section 23 starting from page 65
👍 2
Avatar
It’s not unnecessary where you need to connect to cloud provisioned services (eg a cloud-based dems solution we have) or use tools such as camera forensics. Open access is risky but this can be controlled via good network design
Avatar
That’s why we have a dirty laptop
4:31 AM
Which is connected, but nothing produced on it can enter the forensic network
4:31 AM
Maintaining the air gap
Avatar
Which works fine provided you don’t need area officers to access data for example
4:32 AM
Or want to use cloud provisioned tools
Avatar
Avatar
busted4n6
It’s not unnecessary where you need to connect to cloud provisioned services (eg a cloud-based dems solution we have) or use tools such as camera forensics. Open access is risky but this can be controlled via good network design
As someone mentioned above about creating access control lists, these could be created at firewall level and would allow internet access for cloud based services
Avatar
Say you do a cloud extractions on the dirty laptop
4:32 AM
You then sheep dip that specifically and then move it over
4:33 AM
We use it for some of our tools which aren’t accredited as well
4:34 AM
Along with some open source tools which we can’t have on the main network
Avatar
It’s what we do now but when you get in hundreds of gigs for cyber server acquisitions and the like it becomes a pain. Also there is a risk of air gapped machines become stale with very outdated software on them which you have to deal with
Avatar
We patch our forensic server with offline windows update patches from our IT dept
4:34 AM
Or should 😬
4:35 AM
Fingers crossed we never have a suspect machine with ransom ware on it!
4:35 AM
Fuck me that would reak havoc
Avatar
Digitalferret 6/3/2021 4:35 AM
Murphy's ^
Avatar
We deal with ransomware most weeks but I’m aware some@forces don’t both doing forensics on their cyber jobs
4:36 AM
It scared the shit out of me that if you click on an exe in ftk imager, it immediately extracts it from an e01 and puts it in a temp folder
Avatar
Yup!
4:36 AM
We also update our software weekly, just with offline installers
Avatar
Luckily Windows was up to date with its av hahaha
Avatar
I get the inconvenience of it, every one of our desks used to have an internet connected terminal next to it
4:37 AM
But we’re down to one machine now, as the risk of the air gap being breached and all manner of data been “potentially” accessible from the outside world is considered not worth the risk
👍 1
Avatar
Colleague also ransomwared his standalone laptop
Avatar
We also have dpa responsibilities which are much harder to uphold if we’re internet connected
4:39 AM
I think the future solution for us is cloud based, which shifts the responsibility to the cloud provider
Avatar
Cloud is the future
Avatar
And having internet connected VM’a on our network for cloud extractions etc
Avatar
There are offsens systems on aws already
4:40 AM
Df just needs the money to uplift
Avatar
Some Uk LE have already made the switch
Avatar
so basically, it's complicated 😂
Avatar
Cloud based doesn’t shift the responsibility to the cloud provider. It’s not amazon’s job to provide a soc etc, it’s yours. Unless you pay extortionate amounts to have a company run your cloud provision for you
Avatar
we've always run offline but it's been a couple issues now, switches constantly moaning about internet, broken updates, RDP being janky
Avatar
Avatar
Sudo
we've always run offline but it's been a couple issues now, switches constantly moaning about internet, broken updates, RDP being janky
This is probably you’re routing. The route for 0.0.0.0 isn’t going anywhere so things time-out.
Avatar
Avatar
TheNetCat
Cloud is the future
It’s not. It’s far too expensive for what many HO forces are doing. On prem is cheaper for everything but archive.
Avatar
You have a national approach.
Avatar
Avatar
TheNetCat
You have a national approach.
Do you work for uk law enforcement 😉 Two police forces can’t even agree on having the same word for a TWOC.
this 1
4:45 AM
Also, it’s still expensive because the costs scale in a linear fashion for compute and storage.
Avatar
I do have 0.0.0.0 in the routing table, I don't think it would be that
Avatar
Avatar
Sudo
I do have 0.0.0.0 in the routing table, I don't think it would be that
Do you have a default gateway ip set? It may be that your computer is sending something to a gateway that does nothing but times out
Avatar
Like I said there are DF systems and services online in the cloud for certain parts of LE. It's only time before it's rolled out more nationally to local. Shared licensing, shared storage, collaborative opportunities, case management.
Avatar
yeah we do, firewall
4:46 AM
and all the usual domain accoutrements
Avatar
So the firewall may need modification to TCP reject anything not on the internal network otherwise you’ll have to wait for a timeout.
Avatar
I run several domains and only our DFIR one has all these issues, which is why I wondered about t'internets
Avatar
So something like AXIOM looking for an update server will sit there frozen for 30 seconds
Avatar
yeah it's set to only allow LAN to LAN, no external
Avatar
Avatar
TheNetCat
Like I said there are DF systems and services online in the cloud for certain parts of LE. It's only time before it's rolled out more nationally to local. Shared licensing, shared storage, collaborative opportunities, case management.
It’s a good idea and I’m sure it’ll happen. But I need a solution today as I don’t want to throw a load of money at more expensive workstations. I also need for officers from across our force to use things like cellebrite reader in a sandboxed environment. We’re probably going for on-prem computer and storage for three years. Then archive to the cloud.
Avatar
Avatar
Sudo
yeah it's set to only allow LAN to LAN, no external
Yes but what does the firewall do with any LAN->WAN traffic it receives. If it just drops it, it’ll cause timeouts. It needs to reject it so the client can move on
Avatar
it was on block, so I'll try reject
Avatar
Anyone from @Cellebrite know how to sign up for the new release emails? I never seem to get them
Avatar
Avatar
stark4n6
Anyone from @Cellebrite know how to sign up for the new release emails? I never seem to get them
CLB-dan.techcrime 6/3/2021 7:15 AM
Maybe your organization is blocking them?
Avatar
Avatar
CLB-dan.techcrime
Maybe your organization is blocking them?
I get the Digital Intelligence and Training ones though, if there is somewhere I can sign up feel free to DM me
Avatar
Avatar
stark4n6
Anyone from @Cellebrite know how to sign up for the new release emails? I never seem to get them
CLB-dan.techcrime 6/3/2021 7:17 AM
Also make sure that the PA and UFED products are registered in MyCellebrite
Avatar
Avatar
CLB-dan.techcrime
Also make sure that the PA and UFED products are registered in MyCellebrite
CLB-dan.techcrime 6/3/2021 7:18 AM
Maybe sign up for a webinar too and make sure you opt-in: https://www.cellebrite.com/en/resources/technical-webinars/
Avatar
Avatar
busted4n6
So something like AXIOM looking for an update server will sit there frozen for 30 seconds
Deleted User 6/3/2021 7:18 AM
Tried a DNS “black hole”? Add entries in your local hosts file for any host trying to phone home. DNS resolution should always hit the local hosts file first. Entry example: 127.0.0.1 foo.com
Avatar
Avatar
CLB-dan.techcrime
Maybe sign up for a webinar too and make sure you opt-in: https://www.cellebrite.com/en/resources/technical-webinars/
CLB-dan.techcrime 6/3/2021 7:19 AM
Note that emails come from an EU server that may not be trusted by your organization if you are in the US
Avatar
thatboy_leo 6/3/2021 7:32 AM
Does anyone happen to know what cloud services Oneplus phone uses
7:32 AM
An ex-spouse was able to view a text message sent to another party without her consent. If it’s using the android os is it Google?
Avatar
Avatar
CLB-dan.techcrime
Also make sure that the PA and UFED products are registered in MyCellebrite
Definitely are
Avatar
Looking for files which would indicate when an LG LML413DL (Android 8.1.0) was wiped. We received a phone which was powered off. Once powered on in a faraday box the phone was on a setup screen. Looking for a way to tell when it was wiped. Looking at last_log I have Creation date of January 22, 2021, and Modified Dates of May 14, 2021. May 14 is when we setup the phone in the lab. Last_install shows January 22, 2021 creation date and May 14, 2021, deletion date. The log file in the recovery folder shows January 22, 2021 creation date and a Modify date of April 26, 2021. The phone was seized on April 30, 2021, so I was expecting to find a date between April 30, 2021, and May 14, 2021. Any suggestions?
Avatar
RarelySophisticated 6/3/2021 1:38 PM
Does anybody know how much Berla is going for now? And does that include training?
Avatar
Humble#2244 6/3/2021 2:34 PM
I was trying to install sift on oracle virtual box. This is the error i'm getting. Anyone else had the same issue ?
Avatar
Avatar
sholmes
Looking for files which would indicate when an LG LML413DL (Android 8.1.0) was wiped. We received a phone which was powered off. Once powered on in a faraday box the phone was on a setup screen. Looking for a way to tell when it was wiped. Looking at last_log I have Creation date of January 22, 2021, and Modified Dates of May 14, 2021. May 14 is when we setup the phone in the lab. Last_install shows January 22, 2021 creation date and May 14, 2021, deletion date. The log file in the recovery folder shows January 22, 2021 creation date and a Modify date of April 26, 2021. The phone was seized on April 30, 2021, so I was expecting to find a date between April 30, 2021, and May 14, 2021. Any suggestions?
You might be able to find something in the last_history log or some of the other recovery logs.
5:19 PM
I should have read a bit more before responding, looks like you have already looked there.
👍 1
Avatar
Yeah I did, but thanks for responding. @FullTang
👍 1
Avatar
Avatar
Humble#2244
I was trying to install sift on oracle virtual box. This is the error i'm getting. Anyone else had the same issue ?
Deleted User 6/3/2021 10:40 PM
Delete all files for that VM you created. Goto Import Appliance. Select the SIFT .ova you downloaded. Make sure the VM is called "Ubuntu" and Linux 64 bit selected otherwise Virtualbox should fail. All else fails, a search engine will have an answer for you.
Avatar
Not sure where I should put this so hopefully this is the best place. Is there anyone who’s had success with kape pushing collections to azure blobs? I’m getting a TLS error and not sure how to troubleshoot the kape error.
Avatar
Cancel that. I got it.
Avatar
Does anybody have any good human trafficking/prostitution keywords?
Avatar
Avatar
goalguy
Does anybody have any good human trafficking/prostitution keywords?
Gold__Viking 6/4/2021 7:29 AM
Avatar
Joe Schmoe 6/4/2021 7:31 AM
Any cell phone mapping gurus that can help refresh my memory? I have T-mobile timing advance records (lte) and a tower list. I’m trying to validate the sectors of the towers used.
7:31 AM
It’s definitely not as straight forward as CDR’s.
Avatar
Avatar
Deleted User
Delete all files for that VM you created. Goto Import Appliance. Select the SIFT .ova you downloaded. Make sure the VM is called "Ubuntu" and Linux 64 bit selected otherwise Virtualbox should fail. All else fails, a search engine will have an answer for you.
Humble#2244 6/4/2021 9:57 AM
Thanks alot. I'm trying it now.
👍 1
Avatar
Avatar
Deleted User
Delete all files for that VM you created. Goto Import Appliance. Select the SIFT .ova you downloaded. Make sure the VM is called "Ubuntu" and Linux 64 bit selected otherwise Virtualbox should fail. All else fails, a search engine will have an answer for you.
Humble#2244 6/4/2021 10:23 AM
Still didnt work out. I deleted everything manually
Avatar
DeeFIR 🇦🇺 6/5/2021 5:28 PM
@Humble#2244 assuming you've imported the OVA, you need to change the boot order. Deselect floppy/optical, and make sure the virtual disc field is populated
5:29 PM
5:30 PM
Avatar
Original message was deleted or could not be loaded.
CLB-dan.techcrime 6/6/2021 1:06 PM
No issue for me using my test account with 2FA enabled... can you reset your password?
Avatar
Original message was deleted or could not be loaded.
I don’t think so but if you need reach out to me and we can chat about it
Avatar
cyberc3nturion 6/7/2021 10:18 AM
So I was able to get this for $175 did I waste my money?
Avatar
Still looking for some help with Autopsy and hash sets, please DM if you might be able to assist. Thanks.
Avatar
Avatar
cyberc3nturion
So I was able to get this for $175 did I waste my money?
I don't think so. The case alone is probably $100 😄 The T35es is a little older but half of my team still uses it. The rest of us have the T35u (esata connector vs usb)
👍 1
Avatar
Avatar
Cole
I don't think so. The case alone is probably $100 😄 The T35es is a little older but half of my team still uses it. The rest of us have the T35u (esata connector vs usb)
cyberc3nturion 6/7/2021 12:16 PM
That’s good to hear. I thought it was a good price. Not bad for $175.
Avatar
Avatar
cyberc3nturion
That’s good to hear. I thought it was a good price. Not bad for $175.
Did that include shipping? Because I think thats a really good deal. The T35es by itself is just under $100 on ebay.
Avatar
Avatar
Cole
Did that include shipping? Because I think thats a really good deal. The T35es by itself is just under $100 on ebay.
cyberc3nturion 6/7/2021 12:19 PM
No shipping was separate .
Avatar
Still. I think you did well.
Avatar
Avatar
cyberc3nturion
So I was able to get this for $175 did I waste my money?
looks like a decent deal to me
👍 1
Avatar
Avatar
DeeFIR 🇦🇺
@Humble#2244 assuming you've imported the OVA, you need to change the boot order. Deselect floppy/optical, and make sure the virtual disc field is populated
Humble#2244 6/7/2021 2:31 PM
Thanks for reply. Yes it is OVA file. As you instructed i deselected all other boot orders but there is no option as virtual disk. Now it says no boot order selected in settings and give this error on screen.
Avatar
DeeFIR 🇦🇺 6/7/2021 2:32 PM
You need to select something to boot from - you need to boot from the virtual disk you imported
Avatar
ShinDaddison 6/7/2021 5:25 PM
At the moment, I am searching through a MacBook Pro image using Macquisition to find any potential Malware, Spyware, or remote access tools. Where would I find this information besides looking through deleted files and looking for applications with suspicious names?
Avatar
Avatar
ShinDaddison
At the moment, I am searching through a MacBook Pro image using Macquisition to find any potential Malware, Spyware, or remote access tools. Where would I find this information besides looking through deleted files and looking for applications with suspicious names?
Bubbajubba 6/7/2021 5:40 PM
I would look at startup items and installed applications and maybe SSH logging also look at emails for attachments and suspect URL's
👍 1
Avatar
ShinDaddison 6/7/2021 5:51 PM
Thank you, @Bubbajubba! I appreciate it!
Avatar
I don't normally post in here, but I just wanted a general consensus on this question: If I were to ever start a career in DFIR, is having a degree in Criminal Justice required, or is it something that's flexible depending on the opportunities and/or direction in the future? (edited)
6:27 PM
Sorry if this is not in the appropriate room. It seems like this room would fit best.
Avatar
Avatar
ul7
I don't normally post in here, but I just wanted a general consensus on this question: If I were to ever start a career in DFIR, is having a degree in Criminal Justice required, or is it something that's flexible depending on the opportunities and/or direction in the future? (edited)
There are plenty of jobs that don't require it, matter of fact probably more common for IT or cybersecurity specific degrees more so. All depends, plenty have come without degrees too
Avatar
Avatar
stark4n6
There are plenty of jobs that don't require it, matter of fact probably more common for IT or cybersecurity specific degrees more so. All depends, plenty have come without degrees too
Cool, thanks for the feedback. Really appreciate it.
Avatar
Anybody know of a tool that will allow me to convert a windows log that have been properly formatted in json, csv, etc back into evtx format? I’ve found plenty of tools that will allow evtx to whatever, but nothing for the other way
👀 1
Avatar
Avatar
Hab
Anybody know of a tool that will allow me to convert a windows log that have been properly formatted in json, csv, etc back into evtx format? I’ve found plenty of tools that will allow evtx to whatever, but nothing for the other way
randomaccess 6/8/2021 3:56 AM
Dont know if one exists. What's the purpose of it?
Avatar
Avatar
ShinDaddison
At the moment, I am searching through a MacBook Pro image using Macquisition to find any potential Malware, Spyware, or remote access tools. Where would I find this information besides looking through deleted files and looking for applications with suspicious names?
Deleted User 6/8/2021 4:28 AM
I would scour the log files as well as looking for unusual events, user account creation and failures (services, logins). The Console app for OSX stores the logs and a look around /var/log should help as well. Also look for files with the incorrect extension. (edited)
👍 1
Avatar
cyberc3nturion 6/8/2021 5:29 AM
Does anyone here do DFIR as a side hustle? I wanna make a little extra cash. Kids are expensive 😂
💯 1
Avatar
I would love to side hustle busting criminals if I ever get on that level.
9:03 AM
🙂
Avatar
ShinDaddison 6/8/2021 9:08 AM
Thank you, @Deleted User!!
Avatar
Avatar
randomaccess
Dont know if one exists. What's the purpose of it?
Just a request from a sponsor I’m working for. We’re building out some training tools for them. They gave us a bunch of data that had already been ingested into elasticsearch, but wanted the corresponding evtx logs as well
Avatar
Avatar
Joe Schmoe
Any cell phone mapping gurus that can help refresh my memory? I have T-mobile timing advance records (lte) and a tower list. I’m trying to validate the sectors of the towers used.
Try ZetX. You may be able to get a free trial of their product. Use them and I've always been very happy.
Avatar
Avatar
A_A_Ron
Try ZetX. You may be able to get a free trial of their product. Use them and I've always been very happy.
Thank you. I have CellHawk. I’m just trying to validate a couple locations by hand.
Avatar
QuantumCyberSoldier780th 6/8/2021 1:01 PM
Hello everyone, hope all is doing well.
Avatar
danmiami0001 6/8/2021 3:46 PM
Anyone with the IRS here? If so, can you DM me, please?
Avatar
Does anyone have a link to the Magnet webinar that just started?
10:06 AM
Nm I think it was earlier today
Avatar
Avatar
Joe Schmoe
Any cell phone mapping gurus that can help refresh my memory? I have T-mobile timing advance records (lte) and a tower list. I’m trying to validate the sectors of the towers used.
Check out CellHawk’s Hawk Talk in reference to the Carrier Breakdown of T-Mobile. They do a great job at explaining T-Mobile’s records in detail. https://support.hawkanalytics.com/hawktalk-carrier-breakdown-tmobile-returns/
Avatar
Hey guys I just started reading im new, the thing is I started reading "Learn Computer Forensics by William Oettinger " and I wanted to know what should I read or learn after that book and what certifications should I look for
Avatar
Avatar
Hit
Hey guys I just started reading im new, the thing is I started reading "Learn Computer Forensics by William Oettinger " and I wanted to know what should I read or learn after that book and what certifications should I look for
Andrew Rathbun 6/10/2021 8:04 AM
#training-education-employment
Avatar
chrisforensic 6/10/2021 11:22 AM
hmmm.... is this a "new" product? or ufed-premium without extra-hardware ? @Cellebrite (edited)
Avatar
Yes it is. I have seen things of them unveiling it at the Techno Security Conference that is going on in Myrtle Beach right now.
😄 1
Avatar
any ePO gurus in the house?
Avatar
@Law Enforcement [UK] Has anyone got a contact in the UK or Europe that they have used to repair a Samsung phone? I have an S20 5G which has been bent in half and because of that the connectors on the mainboard have shattered so ideally someone who can micro solder and replace connectors!
Avatar
We use Fonefunshop quite a lot
6:25 AM
never had any problems with them tbh and super reliable, based in Sheffield
Avatar
We tend to go to Fonefunshop also
Avatar
Beno 🇬🇧 6/11/2021 6:26 AM
I can second that, only place our devices go too fonefunshop
Avatar
mellotronworkerscotland 6/11/2021 6:26 AM
I once had the bright idea of taking it to a jewellers to get soldered because some of the connectors are extremely small. Don't bother. The soldering kit operates at about 10 times the temperature of normal soldering kits and would fry the device to a crisp!
😆 7
Avatar
Fonefunshop or Phil Cocking with control-F
ControlF 2
Avatar
Thank you all, really appreciate the immediate response, you are obviously not busy and on the internet 🤣
😂 3
Avatar
If the mainboard has been broken and would require micro-soldering, would a series of chip transplants be more appropriate?
Avatar
CloudCuckooLand 6/11/2021 7:11 AM
@Zhaan I can help with that 😁
😵 1
7:12 AM
Latest patient 🤯
7:15 AM
Completed CPU/eMMC swap on a bent Blackview A60 Pro (edited)
Avatar
Best SANS course for a security engineer to take? Debating an ICS course or cloud automation.
Avatar
Avatar
5kybur5t
Best SANS course for a security engineer to take? Debating an ICS course or cloud automation.
Andrew Rathbun 6/11/2021 8:08 AM
#training-education-employment
Avatar
posted threat intel on a campaign i discovered in #cyber-threat-intelligence
Avatar
Unoriginal_name 6/12/2021 8:00 PM
Any Mac gurus in here that has a list of common artifacts for a Mac and their corresponding plist? In essence, maybe a checklist of commonly used plists that contain relatable artifacts to most computer investigations.
Avatar
Avatar
Unoriginal_name
Any Mac gurus in here that has a list of common artifacts for a Mac and their corresponding plist? In essence, maybe a checklist of commonly used plists that contain relatable artifacts to most computer investigations.
Andrew Rathbun 6/12/2021 8:44 PM
8:44 PM
This also looks outdated but it exists - https://github.com/pstirparo/mac4n6
Collection of forensics artifacs location for Mac OS X and iOS - pstirparo/mac4n6
Avatar
Avatar
Trashboat667
@Andrew Rathbun I feel very confident you CANNOT download a TikTok profile like you can a Facebook or Google Takeout. Thanks for the reply.
Avatar
Morning, morning! If anyone here has information on and/or video/screen-shareable access to any of the following for some general familiarization / common tasks / tips / tricks I'd be grateful. New job is picking up/using: Carbon Black, VMRay Malware Sandbox, Axiom, PowerGREP, 010 Editor, Event Log Explorer, CAPLoader Pro, Network Miner Pro, Volexity Volcano, and WebLog Expert Pro ... I won't be seeing any of that for the next 2 weeks unless I can find some training on a decent platform. Speaking of, does anyone know which platforms might sport some training w/ some of these? I'm about to do the googling due diligence but wanted to reach out to the community first. Many thanks!
Avatar
What’s everyone use for a password manager. I mostly use Apple eco system.
Avatar
trickyricky 6/14/2021 5:31 PM
LastPass
Avatar
I’ve had LastPass for a few years - no personal complaints. I was considering switching to 1password because I had heard about a few past breaches and some ad tracker activity built into their app… haven’t pulled the trigger yet.
Avatar
Deleted User 6/14/2021 10:36 PM
Keepass over here
Avatar
Avatar
Buell13
What’s everyone use for a password manager. I mostly use Apple eco system.
DeeFIR 🇦🇺 6/14/2021 11:34 PM
Ditched LastPass when they changed their business model. Moved to Bitwarden.
💯 4
Avatar
Digitalferret 6/14/2021 11:48 PM
Keepass, for years now, bc local storage. Kee(fox) browser plugin was ok on Win, but had issues in Lin, so now using KeepassXC and associated plugin.
Avatar
Good ol' Chrome for me 😂
this 1
Avatar
I’m currently using strongbox on my phone and MacBook and use keepass xc on my windows machine. I just didn’t know is there really a huge difference between them all besides bells and whistles.
Avatar
+1 for Bitwarden, changed from LastPass after their change of device policy
Avatar
Avatar
Buell13
What’s everyone use for a password manager. I mostly use Apple eco system.
Andrew Rathbun 6/15/2021 9:45 AM
1Password FTW
Avatar
Avatar
Buell13
What’s everyone use for a password manager. I mostly use Apple eco system.
I use keepass and lastpass (i don't need mobile so latest changes does not affect me). Plan to switch to bitwarder one day, but i'm too lazy so far 😉 (edited)
Avatar
Please can someone from @Magnet Forensics DM me reference a software request I put into the web site last week, thanks
Avatar
Avatar
Si_
Please can someone from @Magnet Forensics DM me reference a software request I put into the web site last week, thanks
DM'd you
Avatar
I moved to Bitwarden. See how this goes.
Avatar
I switched to Bitwarden about 6 months ago from PasswordSafe. I'm very happy with it. The migration was super easy.
Avatar
Hey! I have a question. Has anyone ever extracted a physical or full file system of a SM-A500FU? In that case, Which program did you use to extract physical or file system data? I can only extract logical data. I suspect that the phone does not have OTG support. I have the known code.
Avatar
not sure if I have but sometimes I get luck with the generic Samsung chipset / FBE filesystem extractions
Avatar
Avatar
dushe
Hey! I have a question. Has anyone ever extracted a physical or full file system of a SM-A500FU? In that case, Which program did you use to extract physical or file system data? I can only extract logical data. I suspect that the phone does not have OTG support. I have the known code.
Andrew Rathbun 6/16/2021 5:29 AM
#mobile-forensic-extractions FYI
Avatar
Hi all! Has any of you looked into the forensic analysis of ATMs after a "jackpotting" attack? What are the possible forensic artefacts after such an incident? Has anyone already defined a checklist or standardised procedure / methodology forensic analysis of ATMs? thx!
Avatar
Guys i need help with my hard drive.. it's partition is screwed.. is there any way to fix that?
Avatar
iOS 14.2 iPhone XS Is it possible to tell from a logical/backup extraction when the iPhone was last reset/setup?
Avatar
Avatar
D1g1talDan
iOS 14.2 iPhone XS Is it possible to tell from a logical/backup extraction when the iPhone was last reset/setup?
Andrew Rathbun 6/17/2021 3:21 AM
Check the earliest timestamp on the device maybe?
Avatar
That’s what I was thinking but I was hoping I could find a proper ‘Artefact’
Avatar
Can anyone from @Cellebrite help me with a simple query, I would like to know if there's a log file to determine if the clock settings on an iPhone have been modified or not
Avatar
randomaccess 6/17/2021 6:38 AM
@D1g1talDan don't have links but from memory Heather and Mattia have both produced blog posts on this. I don't think it's as simple without a full file system
👍🏻 1
Avatar
Anyone have any good alternatives to Excel? Fed up of how little it can handle 🤦‍♂️
Avatar
I think zimmerman has a tool
👍 1
6:46 AM
I end up just using grep/bash utils
Avatar
Avatar
3X3
Anyone have any good alternatives to Excel? Fed up of how little it can handle 🤦‍♂️
Andrew Rathbun 6/17/2021 7:03 AM
yep, Timeline Explorer
👍 1
7:04 AM
Also, you can always throw large output into a text editor and delete the stuff that isn't within your relevant timeframe, save out a copy, and then ingest into TLE
👍 1
Avatar
Thanks rayeh and Andrew for the input 👍 (edited)
👍 1
Avatar
I have a Samsung Chromebook 4 that I am practicing with. I am using the Magnet Chromebook Acquisition Assistant v1.0.5 and right after the Chromebook starts copying files I get a message saying "Extraction failed. See debug log for more details." Has anyone encountered this problem? Is there a workaround?
Avatar
𝗖𝗲𝗹𝗹𝗦𝗼𝗹𝗱𝗶𝗲𝗿𝘀 6/17/2021 11:48 AM
@FM930 Check the Journey section in report...hopefully you il get it there.
Avatar
Avatar
rayeh
I end up just using grep/bash utils
randomaccess 6/17/2021 3:14 PM
Python!
👍 1
Avatar
Python absolutely for middle to heavy lifts, but I've gotten really comfortable with chaining cmdline utils for a lot of things
3:20 PM
Grep, cut, sed, awk, wc, sort, uniq, parallel it's all so powerful
Avatar
@Law Enforcement [UK] Hi all, just wanting to ask if anyone's dabbled with Ring (doorbell) forensic artifacts? - Software used? - main artefacts taken from mobile/forensic images?
Avatar
I think we had a job but it was more about cloud/TEI etc
Avatar
@busted4n6 thanks for the reply, in the back of my mind I'm thinking it's more a request of information rather then forensic 'imaging/processing' etc....
Avatar
yeah cloud extraction most likely you woulda thunk
4:11 AM
it doesn't have local storage capacity, or even the ability to store to a local device like a NAS
💯 3
Avatar
@Law Enforcement [UK] Hi all, just wanting to ask if anyone's dabbled with Ring (doorbell) forensic artifacts? - Software used? - main artefacts taken from mobile/forensic images?
@Akko Oxygen cloud extractor has support for artefacts as of 13.6
👍 1
Avatar
templare cristiano crociato 6/18/2021 5:23 AM
would be possible to extract Baseband firmware for gaining some forensics data (Like connections log ecc...) ? (not related to any specific Vendor)
Avatar
@Cellebrite Anybody have the updated "minimum" and "recommended" RAM etc needed for Cellebrite Reader ? I have agencies that are still trying to run it on 8GB of RAM and ofcourse its crashing and having issues. I would like something in writing recommendation from users or Cellebrite to back my recommendation of 16GB plus etc.
Avatar
Anybody know easy is it for someone to spoof their IP address and pretend to be coming from an actual house or residence when they do there crime when they are not ?
Avatar
Hey guys, I’m looking into doing my MSc final project on KnowledgeC. Just curious if anyone has looking into this in any detail and if there’s any recommendations/ suggests. Thanks
Avatar
@Junaid Sarah Edwards.
Avatar
I’ve looked through her paper: Knowledge is power and that’s what interested me to base the project on Knowledge C
Avatar
Avatar
DCSO
Anybody know easy is it for someone to spoof their IP address and pretend to be coming from an actual house or residence when they do there crime when they are not ?
I could see someone hiding their IP address (VPN, proxy) to commit crimes but non-duplication of IP addresses is a core component of the internet. The only way you could spoof an IP address like you are talking about is when sending UDP. You would not be able to do it for TCP because it requires handshake authentication. A returning packet would not know where to go for TCP. Basically, someone could send limited types of data on that kind of spoofed address, but they would not be able to receive any data on that spoofed address.
11:52 AM
Did the crime involve video being streamed or a phone call being made from the source IP in question? Off the top of my head those are really the only ways that it might be possible to spoof an IP address to commit a crime is something like that. (edited)
Avatar
@FullTang this particular incident i forsee the suspect saying someone spoofed there IP address and make an email account and then did crimes with it etc. but it wasn't him. The info you provided backs my thinking that it's' not a realistic defense .
Avatar
Avatar
DCSO
@FullTang this particular incident i forsee the suspect saying someone spoofed there IP address and make an email account and then did crimes with it etc. but it wasn't him. The info you provided backs my thinking that it's' not a realistic defense .
You are right, it is not realistic. They couldn’t receive emails on a spoofed IP address. (edited)
Avatar
For those that use Griffeye Analyze, does anybody have the issue where it says "license has expired" and then after you hit ok, it grabs a license from the license server and loads anyway? Why does it do this? We used to have offline license, but I uninstalled Griffeye and then installed a new version, hoping it would solve this issue.
Avatar
@Griffeye 👆
Avatar
Avatar
JMK
@Griffeye 👆
Got 'em, thanks. 😉
Avatar
@DCSO while unlikely, a machine within their network could be compromised and used as a proxy
Avatar
Avatar
rayeh
Grep, cut, sed, awk, wc, sort, uniq, parallel it's all so powerful
randomaccess 6/18/2021 7:20 PM
Yeah absolutely. I find that if I want to something repetitively I use python to store it. Otherwise nix commands for small things absolutely. I tend to not preserve them for long term retention though which is where I fall back to python
Avatar
yeah I've burned myself a lot not saving them, now I keep a joplin note full of one liners for various things
Avatar
Avatar
Junaid
I’ve looked through her paper: Knowledge is power and that’s what interested me to base the project on Knowledge C
randomaccess 6/18/2021 7:23 PM
What else did you want to know? May be worth reaching out to her and asking on where she knows there's deficiencies. And or use her work and then test iOS and macos betas which should be available
Avatar
Avatar
FullTang
You are right, it is not realistic. They couldn’t receive emails on a spoofed IP address. (edited)
CLB-drorimon 6/20/2021 11:44 AM
Unless one set up a vpn proxy on that residence prior to the incident, so they could route their tcp to look like it's originated from there.
👍 1
Avatar
Are there any good magazines for cyber crime or computer forensics?
Avatar
Avatar
rayeh
@DCSO while unlikely, a machine within their network could be compromised and used as a proxy
There is known exploits allowing for traffic reflection via routers subject to UPnP abuse… Not likely that an attacker with this level of skill would use that to mask petty criminality. Skills like that would be used for larger campaigns.
Avatar
Has anyone had VMProtect errors with Cellebrite Physical Analyzer when installing on bare metal eg not a VM
8:03 PM
can't wrap my head around this one
Avatar
Tr3nchf00t (Keith) 6/21/2021 9:03 PM
Does anyone have any experience investigating compromised LinkedIn accounts have any advice or write ups? We've ran the usual suspects and so far come up empty.
Avatar
Does anyone have any recommendations for LAN messengers? I'm looking for something like Discord that we could setup across LAN. Best I've found so far is https://www.outputmessenger.com/.
Secure instant messenger office chat software for team communication provides seamless office instant messaging for corporate and enterprise business communication needs.
Avatar
Avatar
Alex
Does anyone have any recommendations for LAN messengers? I'm looking for something like Discord that we could setup across LAN. Best I've found so far is https://www.outputmessenger.com/.
templare cristiano crociato 6/22/2021 2:42 AM
When I was child, for communicating via LAN with my father I used this: https://www.lantalk.net/downloads/ pretty simple and works quite good on Win 7 and Win 10 in my experience. (edited)
Downloads list of LanTalk Network division. LAN messenger, network messenger and other software for LAN networks, intranet, internet, WAN and VPN
Avatar
burgers_N_bytes 6/22/2021 5:03 AM
Need suggestions.....I’m in the market for a new workstation laptop. What is everyone else currently using? I’m running Magnet AXIOM, Cellebrtie, and XRY. Currently debating between a Surface laptop or intel-MacBook.
Avatar
Avatar
burgers_N_bytes
Need suggestions.....I’m in the market for a new workstation laptop. What is everyone else currently using? I’m running Magnet AXIOM, Cellebrtie, and XRY. Currently debating between a Surface laptop or intel-MacBook.
Andrew Rathbun 6/22/2021 5:04 AM
Is this for running those forensic suites on? If so, I'd suggest something beefier like a gaming laptop. I have a Sager currently which is a beast. Lots of cores/threads (not like Threadripper though) so it can handle anything I throw at it very well
Avatar
Avatar
Andrew Rathbun
Is this for running those forensic suites on? If so, I'd suggest something beefier like a gaming laptop. I have a Sager currently which is a beast. Lots of cores/threads (not like Threadripper though) so it can handle anything I throw at it very well
burgers_N_bytes 6/22/2021 5:38 AM
It is. I’ll look into Sager. I guess the drawback I see with gaming laptops is weight. I travel quite a bit so trying to balance weight and power is a real struggle lol.
Avatar
Avatar
burgers_N_bytes
It is. I’ll look into Sager. I guess the drawback I see with gaming laptops is weight. I travel quite a bit so trying to balance weight and power is a real struggle lol.
Andrew Rathbun 6/22/2021 5:58 AM
Yep that's very fair. Horsepower gets the job done quick though 🤘
Avatar
Avatar
𝗖𝗲𝗹𝗹𝗦𝗼𝗹𝗱𝗶𝗲𝗿𝘀
@FM930 Check the Journey section in report...hopefully you il get it there.
Do you or anyone know where the Journey section is located in UFED PA? @Cellebrite
Avatar
super nerds of Discord, I need you.
9:05 AM
We had a penetration into our firewall this weekend which knocked out our phones and network to one of our locations. Running a dcdiag I now get Delegation failed error
Avatar
Avatar
GrayTech
We had a penetration into our firewall this weekend which knocked out our phones and network to one of our locations. Running a dcdiag I now get Delegation failed error
templare cristiano crociato 6/22/2021 10:58 AM
Here I am, sorry but I maybe have misunderstood your question, are you asking why dcdiag return this type of error? I have adapted an online reply (from Microsoft Forum): it seems that your domain is not properly delegated. (https://serverfault.com/questions/530415/what-is-dns-delegation) if you see a local form when you run the DNS Manager, then the solution seem to consist of deleting the local and after recreate the DNS delegation with pointing to the proper address of DNS server that contains this subdomain . (edited)
In an answer to my previous question I noticed these lines: It's normally this last stage of delegation that is broken with most home user setups. They have gone through the process of buying ...
💯 1
Avatar
Can anyone explain how on an iPhone, the created, accessed, modified dates and times are all the same however the changed date and time stamp is completely different? Can anyone provide any examples of how this change can occur? I assume this cant be changed by the user of the handset? Created: 20/05/2020 11:40:35(UTC + 1) Accessed: 20/05/2020 11:40:35(UTC + 1) Modified: 20/05/2020 11:40:35(UTC + 1) Changed: 14/06/2020 08:33:17(UTC + 1) Taken from UFED Physical Analyzer @Cellebrite
Avatar
Has anyone ever tried to do a data extraction from a Nintendo Switch?
Avatar
Avatar
Andrew Rathbun
Yep that's very fair. Horsepower gets the job done quick though 🤘
burgers_N_bytes 6/22/2021 1:30 PM
What specs would you suggest?
Avatar
Avatar
burgers_N_bytes
What specs would you suggest?
Andrew Rathbun 6/22/2021 1:31 PM
Lots of cores/threads so long as the software is optimized to utilize threads. I know AXIOM can because you can see the Thread Details in AXIOM Process when you're chewing through an image. I'm sure others do, too. X-Ways does too, I believe
Avatar
Avatar
burgers_N_bytes
What specs would you suggest?
the TUF gaming laptops are really nice imo. Mine at work is a Ryzen 7 4800H. 8core i think? and it chugs along just fine. paired with the 2060 and 16gb of ram i haven’t had any issues processing yet
Avatar
If you want something light you should look at the new Razer Blade 14". Thats got a very beefy AMD processor in it and reviews so far are good, definitely not cheap though! @burgers_N_bytes (edited)
Avatar
@Law Enforcement [UK] are you guys using Griffeye? Apparently we can't open other cases made by someone else any more?
Avatar
Depends on the version and the licence @Sudo
5:26 AM
Core DI
Avatar
Beno 🇬🇧 6/23/2021 5:26 AM
Yep they changed recently you need a paid version
Avatar
Pro can open pro, core can open core. Pro cannot open core, core cannot open pro (Edit - This is for editing. I believe both Pro & Core can open each others for read-only purposes as mentioned by @OllieD, but for us we need to be able to edit) (edited)
Avatar
that's what I thought
5:26 AM
core can open core (but only made by your own core)
Avatar
We switched to pro a while back as we knew this was coming
Avatar
Pro can open core I think, but as read only
👍 2
Avatar
sits back gleefully waiting for the management to find this out…
😂 2
Avatar
Pro can also open older core files without issue. 18.6 for instance opens fine and can be edited, but that version is dated now
Avatar
thanks for the infoos
Avatar
Paid version with server based licensing works well for us 👍
this 1
Avatar
We have DI Pro Personal licences that have backwards capability
5:49 AM
So can open any version of Griffeye
Avatar
Avatar
Rob
So can open any version of Griffeye
That's what we have. We can open up Core, but if it was created on a version later than 18.6 then we cannot edit the products. Was an issue with outsourcing until they switched to Pro (edited)
Avatar
Avatar
K23
That's what we have. We can open up Core, but if it was created on a version later than 18.6 then we cannot edit the products. Was an issue with outsourcing until they switched to Pro (edited)
Yep, luckily we found out prior to purchasing DI Pro that they had the Personal version that allowed us to open our old Griffeye cases
👍 1
Avatar
Avatar
Rob
Yep, luckily we found out prior to purchasing DI Pro that they had the Personal version that allowed us to open our old Griffeye cases
Think we are moving to the server version / floating soon so will be interesting to see if we hit any issues with that. It's all fun!
Avatar
Avatar
K23
Think we are moving to the server version / floating soon so will be interesting to see if we hit any issues with that. It's all fun!
Curious to know what the difference /decision behind the move is
6:51 AM
I guess, when it comes to re-licensing you probably want to all avoid the 10 minutes it takes to upload the file to the offline-activation website
Avatar
Save money most likely, management decision. Also implementing the GID stuff properly at the same time. Fairly sure we are on non-personal at current as we have one admin that manages it all via the offline activation
Avatar
Aha, we recently got the GID setup
6:53 AM
Can actually receive regular CAID updates now
6:53 AM
Prior to that I think we were working on a Nov 19 update.
Avatar
We had some quirky system where we all updated our GIDs locally but that broke, which isn't surprising as it wasn't how the system was designed. Think at current it is running on one of our teams workstations in the background but will hopefully be shifted onto a proper server soon. Think we were up to Aug 20 on CAID (edited)
Avatar
I think we're on a closeish version of CAID
6:56 AM
Whatever the non broken gold disk version is
🤣 1
Avatar
Has anyone here switched to Semantics21 from Griffeye?
Avatar
Anyone know how to solve the issue with Cellebrite Virtual Analyzer. I have tried three computers and get the same response.
Avatar
Avatar
Ghosted
Anyone know how to solve the issue with Cellebrite Virtual Analyzer. I have tried three computers and get the same response.
4n6\xC0FFE3 6/23/2021 12:08 PM
You will have much better luck exporting the relevant app/data folder and importing it into your own android VM
👍 1
Avatar
DefendingChamp 6/23/2021 5:47 PM
Is anyone familiar with Axiom Process? I am having trouble pulling a Twitter Reply
5:49 PM
It's a public Tweet reply but when I try to generate the public tweet it doesn't pull anything despite putting their public twitter handle and the date they replied publicly
5:51 PM
no luck pulling the tweet on magnet web saver either, only able to download the video on that tweet it manually
Avatar
Avatar
Ghosted
Anyone know how to solve the issue with Cellebrite Virtual Analyzer. I have tried three computers and get the same response.
Are you trying to install VA? Do you get error code 0x80070643?
Avatar
@AmNe5iA Yes I was wondering if I am having the issue because of VMWare
Avatar
There is an article on the support portal for exactly this issue. https://community.cellebrite.com/s/article/How-to-Resolve-Virtual-Analyzer-Install-Error-0x80070643 Answer: Go to Windows' Apps & Features (add/remove programs) and uninstall all Microsoft Visual C++ Redistributable's 2015 and higher Download and install VMWare player 15.0.0 from here: https://my.vmware.com/en/web/vmware/downloads/details?downloadGroup=PLAYER-1500&productId=800&rPId=47861 Restart if necessary Try installing Virtual Analyzer again
Avatar
@AmNe5iA Ok I had two of those deleted and trying now.
Avatar
@Cellebrite Is there any way of finding out when a device became supported by 4PC? Or am i able to download release notes for versions not listed on your site?
Avatar
I didn’t think we go that deep in our release notes
Avatar
Ah, ok, couldnt remember if you listed newly supported devices etc within the release notes
Avatar
Thanks for them speedy reply @CLB-Paul
Avatar
I suprise myself sometimes :), there is a column of date added burried at the end of the supported device xls
5:34 AM
Its available via the portal
Avatar
Crabbicus82 6/24/2021 6:33 AM
Good Morning. Does anyone know if a remote wiping log of when they remotely wiped their device would be stored in a persons iCloud account via the "get a copy of your data"? Apple ID/Password would be supplied, but was curious if this information could be obtained. Thanks!
Avatar
Avatar
Crabbicus82
Good Morning. Does anyone know if a remote wiping log of when they remotely wiped their device would be stored in a persons iCloud account via the "get a copy of your data"? Apple ID/Password would be supplied, but was curious if this information could be obtained. Thanks!
Good afternoon!
Avatar
DefendingChamp 6/24/2021 6:59 AM
Does anyone use Axiom here?
😆 3
Avatar
Howdy all. I am currently at a new place of employment and have been tasked with setting up hash databases for knows files relating to computer forensics. In LE I was spoilt with all the CAID / Project VIC hash sets and I know I'm not able to use them but to supplement the NSRL hashsets I'm looking for others of similar content, all known files I can discard. I've seen Hashsets.com seem to do some good ones. anyone know of any others that can be used? Also is there some form of hash set management tool that people use? Like I said, I was spoilt in LE and had it all done for me.
Avatar
Avatar
DefendingChamp
Does anyone use Axiom here?
Yes, I use Axiom from Magnet Forensics.
Avatar
DefendingChamp 6/24/2021 7:39 AM
@AmNe5iAHave you tried to pull Cloud Artifacts recently? I'm having trouble pulling a public tweet reply
7:40 AM
I've put the @ and their user name and it's not pulling anything. I wonder if it's just me.
Avatar
I don't use axiom cloud
Avatar
DefendingChamp 6/24/2021 7:43 AM
For now I'm only able to pull it using the Magnet Web Saver
7:43 AM
What do you use for Cloud?
7:43 AM
Cellebrite?
Avatar
Don't
7:43 AM
Deadbox forensics
Avatar
DefendingChamp 6/24/2021 7:43 AM
Can you test a random Public Twitter for me if you can on Axiom?
Avatar
I don't have axiom cloud
Avatar
DefendingChamp 6/24/2021 7:44 AM
Ah okay...
7:44 AM
Wished I had an alternative looks like I'll have to just work with magnet web saver for now and manually extract
Avatar
CptWaistcoat_57354 6/24/2021 8:31 AM
@Law Enforcement [UK] anyone from Bedfordshire DFU who could pm me a contact so I can give you a bell. Happy to exchange emails first to verify I'm from Kent
Avatar
@CptWaistcoat_57354 no luck via the switchboard?
Avatar
Avatar
OllieD
@CptWaistcoat_57354 no luck via the switchboard?
CptWaistcoat_57354 6/24/2021 8:32 AM
If you have a number for it I'll give it go 🙂
Avatar
I've reached them via 101, external force, then ask operator for DFU
Avatar
Avatar
OllieD
I've reached them via 101, external force, then ask operator for DFU
CptWaistcoat_57354 6/24/2021 8:39 AM
Legend! Thank you
👍 1
Avatar
Avatar
Crabbicus82
Good Morning. Does anyone know if a remote wiping log of when they remotely wiped their device would be stored in a persons iCloud account via the "get a copy of your data"? Apple ID/Password would be supplied, but was curious if this information could be obtained. Thanks!
Crabbicus82 6/24/2021 8:50 AM
Friendly bump on this to see if anyone knows 🙂
Avatar
Avatar
Crabbicus82
Good Morning. Does anyone know if a remote wiping log of when they remotely wiped their device would be stored in a persons iCloud account via the "get a copy of your data"? Apple ID/Password would be supplied, but was curious if this information could be obtained. Thanks!
Andrew Rathbun 6/24/2021 8:53 AM
may wanna try one of the mobile channels?
Avatar
Avatar
CptWaistcoat_57354
@Law Enforcement [UK] anyone from Bedfordshire DFU who could pm me a contact so I can give you a bell. Happy to exchange emails first to verify I'm from Kent
If you want to DM me, I'll drop you some contact details, if you still need them 👍
Avatar
Avatar
Andrew Rathbun
may wanna try one of the mobile channels?
Crabbicus82 6/24/2021 8:55 AM
Thanks!
Avatar
DefendingChamp 6/24/2021 9:09 AM
Would Magnet Web Saver be sufficient to preserve a Public Twitter post?
Avatar
Avatar
DefendingChamp
Would Magnet Web Saver be sufficient to preserve a Public Twitter post?
Probably, or just take a screenshot. No fancy tools required if its one post.
9:37 AM
Keep it simple
Avatar
Forensic@tor 6/24/2021 9:43 AM
@Artea I have a repository of release notes going back to 7.23. I can send them to you if needed.
Avatar
@AmNe5iA So I was able to get Virtual Analyer to work on my laptop but only after I removed VM Workstation Pro. Thanks for the Tip.
Avatar
Hmm did you then re install workstation?
Avatar
No because I didn't want to loose all my VM's set up in it.
Avatar
DefendingChamp 6/24/2021 10:27 AM
@Colejust concerned someone will question the authenticity of the screenshot
10:27 AM
but i guess there's not much to do with something online
Avatar
I wonder if the wayback web archive can do public twitter posts
Avatar
DefendingChamp 6/24/2021 11:00 AM
Good idea.
11:02 AM
I think they essentially print the page as a pdf or parse the site?
Avatar
Avatar
Cole
I wonder if the wayback web archive can do public twitter posts
Highly doubt it
Avatar
Avatar
DefendingChamp
I think they essentially print the page as a pdf or parse the site?
You could also print page as a pdf
11:35 AM
If someone tries hard enough anything can be fabricated though
Avatar
Avatar
Cole
I wonder if the wayback web archive can do public twitter posts
Deleted User 6/24/2021 11:46 AM
If it’s a popular account there may be some archived tweets.
Avatar
Avatar
DefendingChamp
@Colejust concerned someone will question the authenticity of the screenshot
Deleted User 6/24/2021 11:49 AM
What I do is capture the screenshot which covers my desktop clock. I also save the page source or anything that contains a UID to any post. If needed I will also produce a copy of the screenshot under ELA to prove it was not edited.
Avatar
DeeFIR 🇦🇺 6/24/2021 6:29 PM
Is anyone from @Cellebrite around for a quick question regarding UFED/PA installer? No errors, just a general question
Avatar
I’ll take PA for 100 Alex
🤟 1
Avatar
Deleted User 6/24/2021 9:00 PM
Hi! Has any one solved the labs provided by DFIR Madness on "THE CASE OF THE STOLEN SZECHUAN SAUCE"? I am new to DF and needed help on finding something.
9:01 PM
One of the question here is about data ex-filtration and I am unknown on how to find it. Any help would be appriciated.
Avatar
Avatar
Forensic@tor
@Artea I have a repository of release notes going back to 7.23. I can send them to you if needed.
That would be great if you could 🙂
Avatar
Avatar
Deleted User
Hi! Has any one solved the labs provided by DFIR Madness on "THE CASE OF THE STOLEN SZECHUAN SAUCE"? I am new to DF and needed help on finding something.
DeeFIR 🇦🇺 6/25/2021 3:08 AM
In this article you will find the answers to the Case of the Stolen Szechuan Sauce that we originally published in September 2020.
3:09 AM
I have a few recorded videos I was planning to post on youtube but just haven't had time
Avatar
Avatar
Crabbicus82
Good Morning. Does anyone know if a remote wiping log of when they remotely wiped their device would be stored in a persons iCloud account via the "get a copy of your data"? Apple ID/Password would be supplied, but was curious if this information could be obtained. Thanks!
Andrew Rathbun 6/25/2021 3:52 AM
You would be surprised how many times such a request comes up in our #DFIR field. Excellent work, as usual, by @HeatherMahalik & @BlakDouble. Bookmark this peer-reviewed article. 👇 https://t.co/8HgDlu08uO
Avatar
Avatar
DefendingChamp
@Colejust concerned someone will question the authenticity of the screenshot
Never happened yet. If you have an OSIRT solution, such as hunchly then it will automatically save to your case. Otherwise, screenshot the tweet, screenshot it's position in the user's thread, screenshot a live website for time/date, hash and if feel completted then email it all somewhere whilst making contemp notes, or burn onto dvd. I'm a firm believer you could theoretically fabricate any evidence if you REALLY cared but for things like this unless you have been selective what can you pragmatically do?
Avatar
Deleted User 6/25/2021 4:27 AM
Thanks for the information but I was looking on how to find those evidence (more like where can I find them). The blog just mentions the answers to those questions.
Avatar
DeeFIR 🇦🇺 6/25/2021 4:40 AM
Ah roger. Sorry, I thought you were just after the answers. If there’s a specific question I can help with feel free to reach out in the channel. There’s a wealth of knowledge here
Avatar
Deleted User 6/25/2021 4:41 AM
What channel are you referring to? I'm a bit confused 🙂
Avatar
DeeFIR 🇦🇺 6/25/2021 4:50 AM
Depends on the nature of your question. If it’s the memory component of the challenge, then #memory-forensics or #network-forensics for pcap analysis etc
Avatar
Deleted User 6/25/2021 4:58 AM
Okay, thanks!
Avatar
Anyone else annoyed that a lot of computers will probably not have CPUs officially supported by Windows 11?! https://www.theverge.com/2021/6/25/22549725/microsoft-windows-11-cpu-support-tpm-hardware-requirements
TPM and CPU changes have led to some confusion.
Avatar
Avatar
stark4n6
Anyone else annoyed that a lot of computers will probably not have CPUs officially supported by Windows 11?! https://www.theverge.com/2021/6/25/22549725/microsoft-windows-11-cpu-support-tpm-hardware-requirements
Andrew Rathbun 6/25/2021 5:23 AM
yes I'm annoyed because I am in the same boat. I need to test and see if enabling TPM in my BIOS will allow me to pass PC Health Check. I have an 8700K so I feel like I should be good but who knows. I'm not ready to reboot my computer quite yet lol, got too much other stuff going on
5:24 AM
Oh wow, seeing the list in the article for the first time. I barely make the cut with Intel 8th gen. WOW, that's a 2017 CPU IIRC, because that's when I built this system during Black Friday
Avatar
Avatar
Andrew Rathbun
yes I'm annoyed because I am in the same boat. I need to test and see if enabling TPM in my BIOS will allow me to pass PC Health Check. I have an 8700K so I feel like I should be good but who knows. I'm not ready to reboot my computer quite yet lol, got too much other stuff going on
My main test machine is 6th gen Intel, which looks like it won't work but guess I need to read into it more
Avatar
Avatar
stark4n6
My main test machine is 6th gen Intel, which looks like it won't work but guess I need to read into it more
it will, but you'll have to enable PTT in UEFI, or (worst case scenario) get a TPM module. Many mainboards have a correct socket for it
5:38 AM
TPM requirement was also bypassed for the leaked build - it was enough to use windows 10 installer with new .wim files
Avatar
kmacdonald1565 6/25/2021 5:45 AM
my general plan is to run windows 10 until the wheels fall off, proverbially speaking
Avatar
I enabled TPM in my workstation. It's detected as 1.2 version but still incompatible with 11. I suppose i'm missing wddm 2.0 gpu driver (edited)
Avatar
Andrew Rathbun 6/25/2021 7:23 AM
it shouldn't be this difficult.....
Avatar
Well, the tool should at least say where the problem is. My home PC with Ryzen 5900x is not compatible as well, but once i enable fTPM in UEFI (which is TPM 2.0 module implementation in the CPU itself), it is compatible now (edited)
9:06 AM
Another weird problem is that i have to install the "verification" app again each time i want to run it. Otherwise it won't start
Avatar
NetSecNinja 6/25/2021 9:38 AM
Win10 will be supported until 2025. By then, you'll want a new computer anyways.
Avatar
Andrew Rathbun 6/25/2021 10:05 AM
I enabled TPM in my BIOS and now I'm all set
10:05 AM
Notice, Intel calls it PTT or something like that. AMD something different. I had to do like asus bios enable tpm intel to find what I needed. Change out variables for whatever brands you have of motherboard, CPU, etc
Avatar
Avatar
Andrew Rathbun
Notice, Intel calls it PTT or something like that. AMD something different. I had to do like asus bios enable tpm intel to find what I needed. Change out variables for whatever brands you have of motherboard, CPU, etc
It's called fTPM on AMD (at least Ryzen), and you enable it and switch from discrete, to "Firmware TPM" to use the built-in one, which is TPM 2.0 implementation
10:35 AM
I think i have my OS installed on MBR and not GPT so maybe that's another roadblock. For some reason, Windows 10 woulnd't install when booted from GPT ready pendrive back then (edited)
Avatar
Avatar
Arcain
I think i have my OS installed on MBR and not GPT so maybe that's another roadblock. For some reason, Windows 10 woulnd't install when booted from GPT ready pendrive back then (edited)
Deleted User 6/25/2021 12:04 PM
Should work if you change to legacy BIOS from UEFI if I recall.
Avatar
Avatar
Deleted User
Should work if you change to legacy BIOS from UEFI if I recall.
I don't think there was any option in BIOS for this workstation. I'll worry about that next time i'll need to do a clean install 🙂
👍🏻 1
Avatar
We just made updates to the Windows 11 PC Health Check App. It now provides more detailed info on requirements not met. This should help in cases where folks assumed CPU compat issues were TPM related https://t.co/hTWMe16DWO
Retweets
118
Likes
384
1:05 PM
Looks like they improved the app, and now it'll display a more detailed message
Avatar
Andrew Rathbun 6/25/2021 2:18 PM
Thank goodness. It was so inadequate in its prior state
Avatar
Based on the comments, it still isn't great. I still get a generic "your pc doesn't meet the requirements to run 11", with no details (edited)
Avatar
Avatar
Arcain
Based on the comments, it still isn't great. I still get a generic "your pc doesn't meet the requirements to run 11", with no details (edited)
Andrew Rathbun 6/26/2021 3:39 AM
Detection Script to help identify why your PC isn't Windows 11 ready - rcmaehl/WhyNotWin11
Salute 1
Avatar
This is more detailed. Says boot type is "legacy", gpt not detected and secure boot disabled + cpu may not be supported, but i think it's not mandatory if tpm is available and active (edited)
3:42 AM
MS should release that type of tool in the first place
💯 1
Avatar
Andrew Rathbun 6/26/2021 3:48 AM
I fully agree. Don't know what they were thinking making such a big change like that and releasing a tool that doesn't provide enough verbosity
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 6/26/2021 9:50 AM
let's move to #training-education-employment
Avatar
Avatar
Andrew Rathbun
let's move to #training-education-employment
Yeah sorry good shout
Avatar
Digitalferret 6/26/2021 1:46 PM
not that I'm a cynical old fart <cough> but, the correct version of Win is always going to be the current release ^n-1 or ^n-2 😁
Avatar
AzuleOnyx🛡 6/26/2021 7:06 PM
Amazon’s cloud services giant Amazon Web Services (AWS) is getting into the encrypted messaging business. The company has just announced that it has acquired secure communications service Wickr — a messaging app that has geared itself towards providing services to government and militar…
7:06 PM
Hmm
Avatar
Avatar
Andrew Rathbun
MS win11 Compatibility tool should do this by default, its crazy we have find it out out of the way
Avatar
Haha, looks like MS just dropped support for TPM 1.2 and not only supports >=2.0 in 11 (edited)
Avatar
I've noticed when I RDP to a server then execute a program remotely on another system from the sever using PSEXEC, it runs a lot slower than if I execute the same program locally. Is this because PSEXEC is not pushing the execution to the remote system or because of the cmd output?
Avatar
Deleted User 6/29/2021 6:17 AM
someone know what type of video this is? "iphone/mobile/Library/Springboard/OriginalLockVideo.mov" the content look like a normal video recorded with the iphone but the path is not familiar for me (edited)
Avatar
Avatar
Deleted User
someone know what type of video this is? "iphone/mobile/Library/Springboard/OriginalLockVideo.mov" the content look like a normal video recorded with the iphone but the path is not familiar for me (edited)
Deleted User 6/29/2021 7:39 AM
@Brandon E is likely the best person to ask (edited)
Avatar
Springboard is the bit that deals with the thumbnails you see when app switching so I presume a screensaver, which this supports: https://github.com/Skittyblock/WallpaperLoader/issues/4
Setting app crashed when I tried to set a live wallpaper from DynaWall V3.0 Not sure if it's from this end or DynaWall's end
Avatar
Avatar
Cole
used /norris
Avatar
Avatar
Deleted User
@Brandon E is likely the best person to ask (edited)
Our work is in source device identification by data found inside the file. So, if you are concerned what make/model device created the video that is something we can help with. We have not done anything with identification of filesystem artifacts so I don’t have much add here, sorry. If you want to talk about identifying the source device type that created the video feel free to shoot me a DM. (edited)
👍🏻 1
Avatar
DefendingChamp 6/29/2021 12:14 PM
about 70 GB of photos on iPhone 11 Pro shouldn't take more than 5 hours right?
12:14 PM
to pull a logical Cellebrite extraction>
12:15 PM
wished Cellebrite give me a rough estimate
Avatar
Hello everyone , I would like to ask if anyone know about where could i get an image that contains a list of sample videos of all possible extensions to use it in testing if this is possible ... thank you guys in advance. (edited)
Avatar
Avatar
OJ
Hello everyone , I would like to ask if anyone know about where could i get an image that contains a list of sample videos of all possible extensions to use it in testing if this is possible ... thank you guys in advance. (edited)
Andrew Rathbun 6/30/2021 5:47 AM
ask #dvr-multimedia-surveillance or #multimedia-forensics
Avatar
Thanks @Andrew Rathbun
Avatar
Avatar
OJ
Thanks @Andrew Rathbun
Andrew Rathbun 6/30/2021 6:11 AM
You're welcome, I am sure one of the vendors there can provide some guidance one way or another. Asking the right question but in the wrong place 😛 Good luck!
Salute 1
Avatar
Another question @Andrew Rathbun , is it possible to share the Link for our forenisc Tool, if yes where can i share it?
Avatar
Avatar
OJ
Another question @Andrew Rathbun , is it possible to share the Link for our forenisc Tool, if yes where can i share it?
Andrew Rathbun 6/30/2021 7:47 AM
Who do you work for? I can't keep track of 7500+ people 😋
Avatar
Avatar
Andrew Rathbun
Who do you work for? I can't keep track of 7500+ people 😋
They've already posted in #dvr-multimedia-surveillance: https://discordapp.com/channels/427876741990711298/428944804873764875/859802561133412362 (edited)
Avatar
@Andrew Rathbun I work with Forensafe
7:52 AM
@OllieD if its agains the roles here i can edit the post... I want to make sure that everything is fine.
Avatar
Avatar
OJ
@OllieD if its agains the roles here i can edit the post... I want to make sure that everything is fine.
No you're fine 🙂
Salute 1
Avatar
I need to poste it where everyone can see it, the software is Windows/MacOS/Android and iOS Digital forensics tool, your guidance is very much appreciated. Which Channel do you recommand?
Avatar
@OJ Id say #mobile-forensic-extractions and #mobile-forensic-decoding and #computer-forensics
BlackBag 1
Avatar
MrMacca (Allan Mc) 6/30/2021 11:02 AM
@MSAB Got a weird question. We've been supplied a collection of images, however they no longer know the password to gain access to the extractions. Is there anything that can be done? Basically it's 2 agencies, the 2nd has sent it to us, but the 1st agency set the passwords and are now unresponsive. Thanks in advance.
11:02 AM
Meant to say extractions * not images.
Avatar
Avatar
MrMacca (Allan Mc)
@MSAB Got a weird question. We've been supplied a collection of images, however they no longer know the password to gain access to the extractions. Is there anything that can be done? Basically it's 2 agencies, the 2nd has sent it to us, but the 1st agency set the passwords and are now unresponsive. Thanks in advance.
Extractions of what / file types ?
Avatar
MrMacca (Allan Mc) 6/30/2021 11:31 AM
Within a an xry extension.
11:32 AM
Mobile phone extractions.
Avatar
@MrMacca (Allan Mc) Hi! Thanks for reaching out. I am sorry, I am afraid there's no other way to gain access to password protected extractions if you don't have the pass-code.
Avatar
thaconnecter 6/30/2021 5:34 PM
Hi guys, im on a search warrant and i have an elitebook thats running win10 but session is lock. I need to do a warm-boot to use passware tool. Any body knows how to perform a warm-boot on a hp HSN-113c-5
Avatar
@florus I did on #computer-forensics, thanks.
Avatar
Someone from @Magnet Forensics want to do me a big favour and send me a link to the latest full install of Axiom. The guy will all the logon passwords is off for a while and I really ned to get some machine updated.
Avatar
Avatar
Majeeko
Someone from @Magnet Forensics want to do me a big favour and send me a link to the latest full install of Axiom. The guy will all the logon passwords is off for a while and I really ned to get some machine updated.
AU_Magneteer21 7/1/2021 11:38 PM
Magnet AXIOM 5.2.0.25407 DOWNLOAD MAGNET AXIOMView file details and MD5 Hash Extract the content of the .zip file to a location on your computer.Double-click AXIOMsetup.exe file to start the installation wizard.
11:38 PM
There you go..
Avatar
Thank you
Avatar
anyone from @Cellebrite available for a quick question regarding the UFED PA trial?
Avatar
Morning all, just wondering if anyone or anyone’s unit has a collection of defined/accepted terms for commonly used terms in their reports, etc. that they are willing to share?
👋 1
Avatar
Avatar
ds275
Has anyone ever tried to do a data extraction from a Nintendo Switch?
How did you get on with this? I've just picked up a job with a Switch and an Xbox.
👀 1
Avatar
Anyone familiar with Mega Application and why the download of the Mega application folder direct from MEGA would be 6 files less than what we see on the suspects phone?
5:56 AM
trying to figure out a way to locate the 6 files so I can explain. There is 30k plus files
Avatar
Avatar
Ghosted
Anyone familiar with Mega Application and why the download of the Mega application folder direct from MEGA would be 6 files less than what we see on the suspects phone?
Andrew Rathbun 7/2/2021 6:48 AM
Application folder...do you mean in AppData?
6:48 AM
What files are missing? Any filenames you can give that won't be too sensitive?
Avatar
Avatar
Ghosted
Anyone familiar with Mega Application and why the download of the Mega application folder direct from MEGA would be 6 files less than what we see on the suspects phone?
Deleted User 7/2/2021 6:53 AM
Perhaps stray files downloaded from another Mega link, not yet synced?
Avatar
@Deleted User @Andrew Rathbun inside the mega application are three user generated folders containing CSAM. When we download the files we get 6 less for some unknown reason. We have reached out to mega and are awaiting an answer but didn’t know if anyone has run into this before.. was thinking Deduplication but that was ruled out
Avatar
Andrew Rathbun 7/2/2021 7:11 AM
Are those 6 files CSAM themselves?
7:12 AM
Maybe the user deleted them from their MEGA account so when you download them from MEGA they're not there anymore. But they're still in the suspect's (presumably) computer image because that's a snapshot in time. Total shot in the dark here
Avatar
That is the problem. Finding the missing 6 in 30k plus files
Avatar
Mr. Eddie Vedder from Accounting 7/2/2021 7:13 AM
I'm gonna make a plug for Griffeye. Process the 30k plus the 6 and tell it to find visually similar in the 6 see if you get a hit that way
Avatar
We can see what is in the folder by name on the mega account. When we download them we get 6 less. The download takes about 8 hours and in two days mega deletes the account
7:15 AM
Wish we could do excel of files from mega and just filter on our list to show the 6 but we can’t
Avatar
JonasWanobi 7/2/2021 7:26 AM
We need a memes channel @Andrew Rathbun 🤣
😂 3
😆 1
this 1
7:27 AM
And maybe one for cool wallpapers. 😜
Avatar
Andrew Rathbun 7/2/2021 7:31 AM
@Ghostedso you just want to do a diff between two folders on a computer? You can use something like FreeFileSync and run a compare between the two folders
👍 1
7:33 AM
kinda like this
Avatar
Avatar
JonasWanobi
We need a memes channel @Andrew Rathbun 🤣
Andrew Rathbun 7/2/2021 7:34 AM
While it would be a fun idea, I think a Twitter account for DFIRMemes would be better for something like that 🙂
🤔 1
Avatar
Avatar
Andrew Rathbun
@Ghostedso you just want to do a diff between two folders on a computer? You can use something like FreeFileSync and run a compare between the two folders
I believe you can also use QuickHash to compare folders
Avatar
@Ghosted assuming this is the service you are speaking of: https://help.mega.nz/webclient/cloud-drive.html#how-do-i-upload-files-to-mega It mentions the use of zip64 which may not be supported out of the box so if you downloaded the folders as zip, I’ll start by checking there. Secondly you mentioned there were 3 folders. Perhaps try downloading each folder individually to identify the problematic one?
Avatar
Avatar
Ghosted
Wish we could do excel of files from mega and just filter on our list to show the 6 but we can’t
You can’t generate excel list of files from mega but is it possible to generate the list of files from the suspect’s phone via an extraction or something? The list from the phone can then be compared against downloaded files from mega to find the missing 6. Just throwing out some ideas here
👍 1
Avatar
Avatar
Ghosted
We can see what is in the folder by name on the mega account. When we download them we get 6 less. The download takes about 8 hours and in two days mega deletes the account
Is it possible they have the same name and during the download you're skipping it? I know mega allows you to have multiple folders with the same name etc.
10:24 AM
Also what tool are you using? MegaSync or something else @Ghosted
10:25 AM
There's a way to get a free upgrade of the account you're interested in to get a super fast download (depending on your Internet)
Avatar
@Rob MegaSync is being used as it was the fastest option and we only have a limited time to access the account.
Avatar
Avatar
Ghosted
@Rob MegaSync is being used as it was the fastest option and we only have a limited time to access the account.
Have you emailed the mega abuse team?
10:29 AM
They will put a protection order on the account and upgrade the account to Pro III
10:29 AM
They can also restore deleted files
Avatar
@Rob yes the account was disabled pending our legal compliance. Since Mega is not in the US we received authorization to download the content to external and execute US warrant on the external drives content. Mega however will only keep the account open to us for 4 days with only 2 left. (edited)
Avatar
They have an open relationship with any LE regardless of country
Avatar
Yes they have been very helpful but we were looking at legal ramifications on obtaining data outside the US without authority from the host country
Avatar
I've always been able to get them to reactivate it upon request (they give you 4 days as you mentioned)
Avatar
The information they gave us the account will be purged in 4 days.
10:32 AM
So we are scrambling, but I feel the 6 missing images are a drop in the bucket and will play little to none in the grand case.
10:32 AM
When you have 10k plus CSAM what is missing 6 images.
Avatar
Never had an account purged, they'll disable it but with a protection order so data isn't deleted during their inactivity checks
10:33 AM
Have you got access to ufed Cloud or axiom?
Avatar
I do not
Avatar
You could try to download it via either if you have access or could grab a trial for either.
10:33 AM
Then should be able to make an excel format to see what's up.
Avatar
Does a trial give you full access to the software?
Avatar
No idea.
10:34 AM
Previously you could, but not sure of things have changed.
Avatar
I am going to reach out to another lab who has cloud and see if they are willing to do it. Thanks for the idea Rob
10:35 AM
I'm sure they will just download it and overnight it to me.
10:38 AM
Should at least give you the metadata for each file.
10:38 AM
To compare vs your current download
10:38 AM
Then it'll just be a case of searching manually for the missing files and completing the download
Avatar
It's such a small thing for the case but either Mega gives us the answer ( I will share if they do) or maybe the cloud pulls all the files and we are good.
👍 1
Avatar
are there any research papers related to cryptanalysis of image encryption algorithm?
Avatar
So.. Seeing how you guys and gals are much smarter than me and more reliable than google. Is there a way to restore a physical extraction of a mobile phone.. to another mobile phone? With the flashing and the Odin (Praise the Allfather) and stuff.. Going to do some in house training, and would love to give everyone the same starting point.
Avatar
elizavetabelkasoft 7/2/2021 1:03 PM
Hi, Belkasoft is glad to inform you that version 1.8 of Belkasoft X is released! Among the most important updates of Belkasoft X v. 1.8 are: ✅ Massive improvements in the Android APK downgrade method ✅ Android SD card acquisition support ✅ Two-factor authentication support for iCloud download ✅ The possibility to re-attach a data source (including portable cases) ✅ Crypt14 decryption for WhatsApp ✅ A number of performance and stability improvements ✅ New and updated mobile and computer artifacts for Android, iOS, macOS, and Windows This is not a complete list. See even more innovations on the What's new page: https://bit.ly/3rgj8KC
Avatar
Avatar
MetaStig
So.. Seeing how you guys and gals are much smarter than me and more reliable than google. Is there a way to restore a physical extraction of a mobile phone.. to another mobile phone? With the flashing and the Odin (Praise the Allfather) and stuff.. Going to do some in house training, and would love to give everyone the same starting point.
Possible - yes, but for devices with hardware backed encryption, userdata won't be decrypted correctly on the clone (edited)
🇺🇸 2
Avatar
I have a question. What is an ideal Operating System for anything DFIR related? I mean is there a preference, or is there some good obvious choices? I'm a bit new to a lot of this, so pardon the ignorance. I'll try and scour the threads as much as possible until then.
Avatar
DeeFIR 🇦🇺 7/3/2021 5:38 PM
An ideal operating system is one that you're familiar with, and supports the tools required to perform the tasks relative to your investigation. I personally have a Windows host OS, with WSL, and then Linux VMs for specific tasks, because that's what I'm more comfortable with and provides the most amount of flexibility within the environment that I operate in.
Salute 3
Avatar
I've been using SIFT
7:52 PM
But yes, it's probably going to vary.
Avatar
chrisforensic 7/5/2021 10:29 AM
hello @Cellebrite ... just saw there is a "crypto tracer" from you to investigate all things concerning bitcoin transactions? is it possible to get a trial?
Avatar
Avatar
chrisforensic
hello @Cellebrite ... just saw there is a "crypto tracer" from you to investigate all things concerning bitcoin transactions? is it possible to get a trial?
DMing
👍 1
Avatar
@Cellebrite do you have a minute for a private chat? I have a question, thanks!
📩 1
Avatar
Andrew Rathbun 7/6/2021 4:45 AM
new Binalyze emoji Binalyze
Binalyze 6
Avatar
Does anyone know if Chromebooks have a "wipe after so many attempts" feature?
Avatar
HungryEmperor 7/6/2021 7:57 AM
Does anyone know do Eric Zimmermans command line tools automatically output to UTC or so your need to preference it?
Avatar
More news today re: one of our ongoing cases. If you are involved with electronic evidence in any way keep an eye on this case: https://www.washingtonpost.com/world/2021/07/06/bhima-koregaon-case-india/
👀 3
Avatar
Avatar
HungryEmperor
Does anyone know do Eric Zimmermans command line tools automatically output to UTC or so your need to preference it?
Andrew Rathbun 7/6/2021 11:08 AM
Eric says there is only one timezone, and that's UTC
Salute 4
💯 3
Avatar
Avatar
Andrew Rathbun
Eric says there is only one timezone, and that's UTC
HungryEmperor 7/6/2021 12:05 PM
🙏🙏 many thanks xD
Avatar
Avatar
Andrew Rathbun
Eric says there is only one timezone, and that's UTC
randomaccess 7/6/2021 4:28 PM
heh they output in the format that the data is written so be wary that some data within the registry is written in local time
Avatar
@Law Enforcement [UK] morning peeps, quick question - what cloud examination / extraction tools are you guys using (if any)?
👍 1
Avatar
Avatar
Sudo
@Law Enforcement [UK] morning peeps, quick question - what cloud examination / extraction tools are you guys using (if any)?
Axiom, UFED and Oxygen
👍 7
Avatar
Avatar
Sudo
@Law Enforcement [UK] morning peeps, quick question - what cloud examination / extraction tools are you guys using (if any)?
UFED & Oxygen
Avatar
Avatar
AP95
Axiom, UFED and Oxygen
how's Axioms?
Avatar
Avatar
Sudo
how's Axioms?
Pretty good, easy to use and our officers are used to Axiom cases so reviewing is a lot easier. Don’t get me wrong it struggles like they all do to keep up with the changing API’s but magnet roll out updates pretty often to help with that
👍 2
Avatar
mellotronworkerscotland 7/7/2021 1:22 AM
Any other cloud products on the market? Or is it limited to Axiom, Oxygen and UFED?
Avatar
We use Axiom and UFED
Avatar
do any of them handle 2FA well yet?
Avatar
Ufed I've seen it use 2fa well
1:29 AM
Never tried 2fa with axiom
Avatar
iPhone stuck on boot screen. Can't hard reset. Any options that wont cause me to lose user data?
Avatar
RW_Digital 7/7/2021 1:50 AM
What model?
Avatar
@RW_Digital A1687
Avatar
RW_Digital 7/7/2021 1:59 AM
Is it just showing the Apple logo? You can try the 'exit cellebrite mode' on UFED. If a hard reset has failed then I suspect maybe a power issue. Try a replacement battery.
Avatar
Device has been shipped all over the country and without power for some time.
2:05 AM
Exit Cellebrite Mode is a No Go
2:05 AM
I will try the battery option.
Avatar
@Sudo not using any cloud tools myself at the moment, but highly rated @Oxygen Forensics whilst still at @Control-F. Some 2FA support too. As @AP95, still struggles to keep up with API changes like all tools, but found their support was very good at quickly looking into and resolving issues when flagged to them
Avatar
Hey everyone, I've got an exigent warrant return from apple for ip location info. The it's return the IP addresses are the destination ip addresses ( 17 x x x) which is apples io range and not the source IP where the connection is coming from. Any idea why they would send that instead?
Avatar
Hey guys I’m trying to find some emails using autopsy for Digital forensics anyone able to assist me on this?
Avatar
Avatar
Neon
Hey everyone, I've got an exigent warrant return from apple for ip location info. The it's return the IP addresses are the destination ip addresses ( 17 x x x) which is apples io range and not the source IP where the connection is coming from. Any idea why they would send that instead?
D1g1talDan 7/7/2021 6:11 AM
A devices will hide their MAC addresses and only supply fake ones to devices such as routers. I wonder if it hides their IP too
Avatar
Anyone know how to verify the integrity of an AFF4 image? I've tried EnCase and FTK but they don't support the image format
Avatar
Avatar
D1g1talDan
A devices will hide their MAC addresses and only supply fake ones to devices such as routers. I wonder if it hides their IP too
Thanks
Avatar
Avatar
Neon
Thanks
A device can give out a fake MAC, but it can't give out a 'fake' IP without help. It can hide its IP by using a VPN or Proxy service, but the warrant should still return information on the service. The reason for the Apple IP on your return could be because Apple is acting as the VPN or proxy, or Apple is giving you the IP info for one of their services rather than the end-user IP info.
Avatar
Avatar
John Ksi
Hey guys I’m trying to find some emails using autopsy for Digital forensics anyone able to assist me on this?
NW3C has a couple of webinars on using Autopsy. https://www.nw3c.org/webinars/Register?id=11014
NW3C offers a number of webinars on various law enforcement-related topics.
6:36 AM
Maybe those can help you.
Avatar
Avatar
FullTang
A device can give out a fake MAC, but it can't give out a 'fake' IP without help. It can hide its IP by using a VPN or Proxy service, but the warrant should still return information on the service. The reason for the Apple IP on your return could be because Apple is acting as the VPN or proxy, or Apple is giving you the IP info for one of their services rather than the end-user IP info.
Yeah I just sent another asking for source IP info. They own the hop so they should be able to tell where it's coming from
👍 1
Avatar
RW_Digital 7/7/2021 9:29 AM
Anyone know how to verify the integrity of an AFF4 image? I've tried EnCase and FTK but they don't support the image format
@HSleep Have you tried evimetry
👍 1
Avatar
Avatar
D1g1talDan
A devices will hide their MAC addresses and only supply fake ones to devices such as routers. I wonder if it hides their IP too
Deleted User 7/7/2021 9:48 AM
Only in regards to probe requests no?
Avatar
Hello, everyone. Is there a channel here dedicated to KAPE?
Avatar
Avatar
Fil0s0v
Hello, everyone. Is there a channel here dedicated to KAPE?
More than likely the incident response channel
Avatar
Avatar
Fil0s0v
Hello, everyone. Is there a channel here dedicated to KAPE?
Andrew Rathbun 7/7/2021 11:35 AM
#computer-forensics or #incident-response are probably the most appropriate channels
Avatar
anyone have any experience with after updating windows, blue screening then black screening then freezing in bios? if you can’t tell i’m having a blast of a night
😫 2
Avatar
hi all, does anyone know if it's possible to add agents to Elcomsoft Premium Forensic Bundle? they sell 2 differents packs (one with 5 and the other with 20 agents) but it's not explained if it's possible to add more
1:51 AM
La compagnie Elcomsoft offre une gamme complète des produits pour la récupération des mots de passe, le décriptage des fichiers et l'audit plateformes de la sécurité réseau et l' extraction des données des appareils mobiles et des services en nuage.
Avatar
Avatar
Jake
anyone have any experience with after updating windows, blue screening then black screening then freezing in bios? if you can’t tell i’m having a blast of a night
AzuleOnyx🛡 7/8/2021 4:14 AM
I think this was happening to me as well. I ended up reinstalling Windows. I have no idea what was going on even the event log was not helping.
Avatar
@v_katalov @rooxy
Avatar
Avatar
rooxy
hi all, does anyone know if it's possible to add agents to Elcomsoft Premium Forensic Bundle? they sell 2 differents packs (one with 5 and the other with 20 agents) but it's not explained if it's possible to add more
You can buy the EDPR pack separately https://www.elcomsoft.co.uk/edpr.html - may be worth reaching out to their sales team via the website if you've already got the premium bundle
Break complex passwords, recover encryption keys and unlock documents in a production environment.
Avatar
I dunno what channel to direct this to specifically
12:12 PM
anyone used map coordinates (say exported into an excel) to map out movements automagically (like with python)
12:13 PM
or is it built into things like the CB offline map
Avatar
Avatar
Sudo
anyone used map coordinates (say exported into an excel) to map out movements automagically (like with python)
Deleted User 7/8/2021 12:37 PM
Not quite Python but when I have had multiple GPS co-ords I feed them into https://www.mapcustomizer.com helps to visualize movement and accepts bulk uploads.
Plot multiple locations on Google Maps
👍 1
Avatar
ah awesome
12:38 PM
thanks
👍🏻 1
Avatar
Avatar
mellotronworkerscotland
Any other cloud products on the market? Or is it limited to Axiom, Oxygen and UFED?
Have a look at Elcomsoft Cloud eXplorer and Elcomsoft Phone Breaker. They are also pretty good.
Avatar
I have a bunch of folders that all start with the same format i.e. 1234AB but the difference being the numbers iterate i.e. 1234AB01, 1234AB02 etc. Is there a tool that'll enable me to mass rename these to decrement these so 1234AB02 becomes 1234AB01 for example and so on?
6:21 AM
Basically trying to avoid manually renaming 100+ folders
Avatar
Avatar
Rob
I have a bunch of folders that all start with the same format i.e. 1234AB but the difference being the numbers iterate i.e. 1234AB01, 1234AB02 etc. Is there a tool that'll enable me to mass rename these to decrement these so 1234AB02 becomes 1234AB01 for example and so on?
Andrew Rathbun 7/9/2021 6:22 AM
https://www.bulkrenameutility.co.uk/ I don't know if this is your answer, but this is the tool I'd try
Bulk Rename Utility: Free File Rename Utility for Windows. Bulk Rename Utility allows you to easily batch rename files and folders based upon many flexible criteria. Free Download.
👍 1
Avatar
mmh will check it out 😄
Avatar
Andrew Rathbun 7/9/2021 6:23 AM
it can be overwhelming, so take a breath before you dive in
👍 1
6:23 AM
I am sure there's a config somewhere where you can make something work for you
Avatar
Batch rename files and folders in a snap. Perfect for any kind of file renaming including music and photo files. Preview your files before renaming and undo erroneous renaming jobs.
👍 1
Avatar
Deleted User 7/9/2021 1:48 PM
I have a question regarding NVMe drives that feature the SED (Self Encrypting Drive) feature and it's encryption, which channel would be appropriate?
Avatar
Avatar
Deleted User
I have a question regarding NVMe drives that feature the SED (Self Encrypting Drive) feature and it's encryption, which channel would be appropriate?
Andrew Rathbun 7/9/2021 3:08 PM
Here or #computer-forensics
Avatar
Deleted User 7/9/2021 3:09 PM
It's a pretty long question, essentially a summary of information I've gathered through out the day, is that okay? It contains all the sources from which I got the information as well
Avatar
Avatar
Deleted User
It's a pretty long question, essentially a summary of information I've gathered through out the day, is that okay? It contains all the sources from which I got the information as well
Andrew Rathbun 7/9/2021 3:47 PM
#computer-forensics then
👍 1
Avatar
DeeFIR 🇦🇺 7/9/2021 9:22 PM
Can someone from @Magnet Forensics please DM me. I'm trying to download the web page saver tool, but it's blocked by mimecast 🙄 and the URL in the email has been re-written
Avatar
For the Windows users; Everything Search by voidtools Use this as a replacement for basic Windows 10 NTFS search, because its slow garbage. Everything Search can index terabytes files very quickly; https://www.voidtools.com/downloads/
💯 1
Avatar
randomaccess 7/10/2021 2:43 AM
@7oaster endorsed by threat actors everywhere! (Haven't used it, heard it's good, seen it on a bunch of investigations)
Avatar
Avatar
randomaccess
@7oaster endorsed by threat actors everywhere! (Haven't used it, heard it's good, seen it on a bunch of investigations)
Haha yeah, its a great tool for Windows especially if you are a datahoarder like me lol. I only run windows on my second PC, which is basically dedicated to downloading stuff.
2:46 AM
I prefer using Windows for organizing data, dont really know why but it works
2:49 AM
Everything Search is unfortunatly not open sourced. https://github.com/voidtools
voidtools has 3 repositories available. Follow their code on GitHub.
Avatar
Avatar
7oaster
For the Windows users; Everything Search by voidtools Use this as a replacement for basic Windows 10 NTFS search, because its slow garbage. Everything Search can index terabytes files very quickly; https://www.voidtools.com/downloads/
Andrew Rathbun 7/10/2021 3:43 AM
Yes this tool is the best. I swear by it. It's great for research too
Avatar
Digitalferret 7/10/2021 3:55 AM
Everything, yup, concur. been using it forever too. well worth digging through the settings/features and such
Avatar
Would Google be able to supply us with older Whatsapp backups if we serve them with a warrant? We already got a takeout using the account credentials which we also could use to restore the most current database but we're interested in previous generated backups.
Avatar
G'day, I am soon to give a presentation on Data Recovery & Forensics. When I first got it I thought it wouldn't be too bad but there is just so much information, I don't overly know how I should structure my presentation. I will be giving it to a bunch of System Admins. If you where to give it, how would you structure it? I intend on trying to find some interesting case studies that where solved using recovered data as forensics, so if you have any good links for that I would also be interested. This subject is far more indepth than I anticipated.
Avatar
randomaccess 7/12/2021 5:58 PM
@ImWell I'd probably want to focus on what they can do as first responders and what they can do to assist an investigation proactively (turning on log sources, application control). Maybe what their actions do that can hamper data recovery.
Avatar
@randomaccess hmm I really like that. Thanks for the advice. I think I will also talk about career avenues they go through.
Avatar
Avatar
Andrew Rathbun
Yes this tool is the best. I swear by it. It's great for research too
can you use Everything Search for network drives?
Avatar
Avatar
sholmes
can you use Everything Search for network drives?
Andrew Rathbun 7/13/2021 3:53 AM
Unfortunately not
3:54 AM
@sholmes maybe I'm wrong How do I index a mapped network drive/NAS/Network share? To add a mapped network drive/NAS/Network share to your Everything index: In "Everything", from the Tools menu, click Options. Click the Folders tab on the left. Click Add.... Select the mapped network drive/NAS/Network share and click OK. Click OK. If network drive is not listed in Everything, please try running Everything as a standard user: In "Everything", from the Tools menu, click Options. Click the General tab on the left. Check Everything service. Uncheck Run as administrator. Click OK. Restart "Everything" (right click the Everything tray icon and click Exit).
👍 1
Avatar
Cool I will check this app out
Avatar
Andrew Rathbun 7/13/2021 3:55 AM
Ahh so you add it as a folder, not a drive, interesting
Avatar
Avatar
sholmes
Cool I will check this app out
Andrew Rathbun 7/13/2021 3:55 AM
You'll never go back, I can almost promise you
👍 1
Avatar
I hate scanning my system for a file I know I had, and Windows search takes FOREVER (edited)
Avatar
Andrew Rathbun 7/13/2021 3:56 AM
Yeah don't ever use Windows to search, stop abusing yourself
3:57 AM
This is the exact use case for Everything
Avatar
Sometimes I need a little masachism in my life.
😆 1
3:59 AM
Install was supper fast and it just scanned my full system in a matter of seconds.
Avatar
Andrew Rathbun 7/13/2021 3:59 AM
Yeah you'll never go back 😛
💯 1
Avatar
Dear windows.......WTH? that is sweet
4:01 AM
it is taking awhile to scan a nas across our network, but that doesn't surprise me on my network.
4:01 AM
I will be sending this out to all the lab today to install
Avatar
Avatar
sholmes
it is taking awhile to scan a nas across our network, but that doesn't surprise me on my network.
Andrew Rathbun 7/13/2021 4:01 AM
oh yeah that's going to be slow no matter what tool you use, doing stuff over network will likely suck
Avatar
looks like you can have it scan for changes daily, so once it is done, that will be nice
Avatar
Andrew Rathbun 7/13/2021 4:03 AM
here's some cool things you can do with it
4:04 AM
would be better to see full paths but I hid them just for "privacy" reasons
4:04 AM
You get the point, but yeah use wildcards, etc
Avatar
yeah that is sweeet
Avatar
Nullable Truth 7/13/2021 4:51 AM
The windows search, I agree is bad in comparison to Everything, but by default it searches the file contents. For just file name searches you need to prepend the flag "name:"
4:51 AM
And only works if those files have been indexed ofc
4:52 AM
That's why it takes an extremely long time, and still may not find that obviously named "secrets.docx" file
4:58 AM
Also for dark mode, open everything.ini and set the following: normal_background_color=#222c28 normal_foreground_color=#ffffff highlighted_backgroundcolor=#333d39
Avatar
Avatar
Andrew Rathbun
here's some cool things you can do with it
!!cool stuff folder 😆 (edited)
Avatar
Avatar
stark4n6
!!cool stuff folder 😆 (edited)
Andrew Rathbun 7/13/2021 5:12 AM
yep, pretty funny haha, just needed a folder at the top of a pictures folder where i kept commonly referenced pictures and that was the name I came up with at the time 🤷‍♂️
😂 1
5:12 AM
one of those things you just want a folder name to satisfy Windows and just move on
Avatar
Avatar
Nullable Truth
Also for dark mode, open everything.ini and set the following: normal_background_color=#222c28 normal_foreground_color=#ffffff highlighted_backgroundcolor=#333d39
Andrew Rathbun 7/13/2021 5:19 AM
hmm this didn't work for me
Avatar
Nullable Truth 7/13/2021 5:21 AM
Should have mentioned, everything needs to be closed first, then reloaded
5:21 AM
Otherwise it will overwrite your modifications
Avatar
@Andrew Rathbun indexing of nas worked well. took a bit to finish, but worked
Avatar
Avatar
Nullable Truth
Should have mentioned, everything needs to be closed first, then reloaded
Andrew Rathbun 7/13/2021 5:45 AM
I did try that, but still had issues. Got a screenshot of what it looks like so I can see if it's worth the effort? 🙂
Avatar
Avatar
Andrew Rathbun
I did try that, but still had issues. Got a screenshot of what it looks like so I can see if it's worth the effort? 🙂
Same here. Just downloaded it, closed it completely, modified the ini file and no dice.
Avatar
Avatar
goalguy
Same here. Just downloaded it, closed it completely, modified the ini file and no dice.
Helps if you edit the correct .ini file. For some reason the .ini file in appdata had not be created yet. Once it was created after the second launch I edited that file and now it works. I will post a screenshot shortly @Andrew Rathbun
👍 1
Avatar
@Andrew Rathbun
Avatar
Avatar
goalguy
@Andrew Rathbun
Andrew Rathbun 7/13/2021 7:23 AM
Cool thank you!
Avatar
@Andrew Rathbun have you seen this? https://github.com/stnkl/EverythingToolbar
Everything integration for the Windows taskbar. Contribute to stnkl/EverythingToolbar development by creating an account on GitHub.
Avatar
Avatar
stark4n6
@Andrew Rathbun have you seen this? https://github.com/stnkl/EverythingToolbar
Andrew Rathbun 7/13/2021 8:06 AM
I sure have seen that. Pretty neat. I wish MS would just buy Everything and implement it 🙂
Avatar
Avatar
Andrew Rathbun
I sure have seen that. Pretty neat. I wish MS would just buy Everything and implement it 🙂
for real, Everything >>>
Avatar
kmacdonald1565 7/13/2021 10:54 AM
void tools is blocked on my network by sophos lol
Avatar
Avatar
kmacdonald1565
void tools is blocked on my network by sophos lol
Digitalferret 7/13/2021 11:00 AM
lol, gotta keep users safe, they might actually Find things 🙂 similar getting Nirsoft package(s) in under the radar without wanting to trash the AV / PC / the nearest furry creature ....
Avatar
kmacdonald1565 7/13/2021 11:02 AM
@Digitalferret we all have our methods of bending the rules 😈
Avatar
Digitalferret 7/13/2021 12:58 PM
🙂 (edited)
Avatar
Deleted User 7/13/2021 3:51 PM
Anyone do a full file system extraction with iOS Triage....we did one, have the passcode, and it was successful....but it came out to be about 64 gigs where with Cellebrite and XRY we get about 30 gigs...wondering if it really grabs that much more or is it something else?
Avatar
Anyone know what the letters 'NN' or 'N' stand for in the world of IIOC / CSE? Im just doing a job on a website with all the useual terms that I know, LS, BD Vlad ect but not come across 'NN' before.
Avatar
Bit of a weird one, I have an E01 of a tablet that runs both Windows and Android. Does anyone know a way to split an image by partition, or, would you just process it twice, once as Android and once as Windows?
Avatar
Avatar
Majeeko
Anyone know what the letters 'NN' or 'N' stand for in the world of IIOC / CSE? Im just doing a job on a website with all the useual terms that I know, LS, BD Vlad ect but not come across 'NN' before.
Digitalferret 7/14/2021 12:33 AM
might be the same as other photo/image/media sites, Non-Nude & Nude?
Avatar
Is their a tech spec about for the Mk 3 @MSAB kisoks?
Avatar
MSAB supplies several different hardware platforms for our products for every kind of need: MSAB Office, MSAB Field, MSAB Kiosk and MSAB Tablet. Learn more.
Avatar
Thanks for the link but i can not see anything RE the tech specs (CPU, Ram etc) or am i being blind?
Avatar
Avatar
Pseudonym
Bit of a weird one, I have an E01 of a tablet that runs both Windows and Android. Does anyone know a way to split an image by partition, or, would you just process it twice, once as Android and once as Windows?
Cancel, just exported the android_data partition as a logical did volume, going to process that in UFED as android generic
Avatar
Avatar
Digitalferret
might be the same as other photo/image/media sites, Non-Nude & Nude?
Thanks, That makes sense as to what i'm looking at.
👍🏻 1
Avatar
@Artea - Apologies for the delayed response, been teaching today. If you can send me a PM I will share the details with you 👍
Avatar
Does anyone here use Semantics21? Instead of Griffeye
Avatar
@Semantics 21 ooooh there's a tag! Hello hah!
Avatar
Does anybody recognize this icon or app?
12:28 PM
Avatar
Avatar
goalguy
Does anybody recognize this icon or app?
Digitalferret 7/14/2021 1:01 PM
looks like it might be one of those "hide/encrypt" (my) Message apps designed to look like a calculator. had a look around online, can't see that exact icon. knowing the OS Android/iPhone etc might narrow it down
Avatar
Avatar
Digitalferret
looks like it might be one of those "hide/encrypt" (my) Message apps designed to look like a calculator. had a look around online, can't see that exact icon. knowing the OS Android/iPhone etc might narrow it down
It is an Android not sure of OS version. All I was sent were the 2 images above. The icon in the bottom left hand corner in the second image looks like the Grindr icon.
💯 1
Avatar
DAI is offered on both platforms (Android/iOS) as a free security feature to all our Grindr Users.  Here are the steps you will need to follow to set up your DAI: Open your Profile Tap on Setti...
💯 1
1:22 PM
Grindr is the largest social networking app for gay,  bi, trans, and queer people. It is available w...
👍 2
1:23 PM
Avatar
hey guys, can i get some book recommendations for DFIR? I've seen "Incident Response & Computer Forensics, Third Edition" and it seems a good bet, are there other or better recommendations?
Avatar
Avatar
digoblin
hey guys, can i get some book recommendations for DFIR? I've seen "Incident Response & Computer Forensics, Third Edition" and it seems a good bet, are there other or better recommendations?
Andrew Rathbun 7/15/2021 4:48 AM
That one is often recommended for IR work. What do you do exactly as that may help with recommendations?
Avatar
DFIR 😄
Avatar
Andrew Rathbun 7/15/2021 4:50 AM
kinda broad, but i see the conversation is lively in #training-education-employment so I'll meet you there
👍 1
Avatar
Hi all. I'm helping to develop a mobile forensics class. If anyone has a syllabus, text book recommendations, image file resources, etc. they'd be willing to send my way that'd be great :)! TIA
Avatar
Avatar
KHUltra14
Hi all. I'm helping to develop a mobile forensics class. If anyone has a syllabus, text book recommendations, image file resources, etc. they'd be willing to send my way that'd be great :)! TIA
templare cristiano crociato 7/15/2021 5:52 AM
Hello, I used to analyze android devices under the security point of view, one book I loved is this: Seeking the Truth from Mobile Evidence , still extremely actual, another one which seems good (never read it completely) is Cell Phone Location Evidence for Legal Professionals, if you want DM me, I can give you even more manuals, but first I would like to know your class focus (also, do you want books about android or about IOS?). (edited)
👍 1
Avatar
Avatar
KHUltra14
Hi all. I'm helping to develop a mobile forensics class. If anyone has a syllabus, text book recommendations, image file resources, etc. they'd be willing to send my way that'd be great :)! TIA
Andrew Rathbun 7/15/2021 6:20 AM
😆 1
Avatar
This is exactly what I was looking for. Thanks, Andrew!!!
Avatar
Avatar
KHUltra14
Hi all. I'm helping to develop a mobile forensics class. If anyone has a syllabus, text book recommendations, image file resources, etc. they'd be willing to send my way that'd be great :)! TIA
Got some test images, tools and processes listed here https://startme.stark4n6.com
A startpage with online resources about Forensics, created by Stark 4N6.
👍 5
Avatar
Avatar
stark4n6
Got some test images, tools and processes listed here https://startme.stark4n6.com
Thank you!
Avatar
super helpful @stark4n6
💯 1
Avatar
Avatar
KHUltra14
Thank you!
glad to help, hope you find it useful
👍 1
Avatar
Is this your site?
Avatar
Can anyone point me to a resource for checking if a phone has been reported stolen/lost or blacklisted? I have two phones that show us with a clean IMEI using the free sites, but according to the carriers they are reported stolen. Trying to find somewhere that doesn't require me to contact the carrier for every device.
Avatar
Avatar
wcso_pete
Can anyone point me to a resource for checking if a phone has been reported stolen/lost or blacklisted? I have two phones that show us with a clean IMEI using the free sites, but according to the carriers they are reported stolen. Trying to find somewhere that doesn't require me to contact the carrier for every device.
NibblesNBits 7/15/2021 9:06 AM
Not sure but swappa use to verify ESN and IMEI numbers for free once you registered an account. I havent used it in quite some time but it is worth a shot.
Avatar
Avatar
mitchlang
Is this your site?
Andrew Rathbun 7/15/2021 9:49 AM
Yes it's his
👍 2
Avatar
Very well done.
Avatar
Hey all, I'm building a small dedicated home lab for forensics, with the intention that I can do some freelance work in the future. Has anyone had exprience of using a M1 Mac mini as the analysis machine (for mac forensics)? Is it overkill? Are older Macs preferred? I am currently torn between upgrading my workstation to a Ryzen 5950x, or buying a new Mac Mini M1, so appreciate any inputs I can get. Thanks!
Avatar
Good afternoon. Newbie here. Currently in the medical field and working on changing my career path to DFIR. I was wondering if there are any US LEOs that wouldn't be opposed to some newbie questions?
Avatar
Sure, DM @DocFiPS (edited)
Avatar
Avatar
stark4n6
Got some test images, tools and processes listed here https://startme.stark4n6.com
Deleted User 7/15/2021 5:52 PM
Based
Avatar
Avatar
DocFiPS
Good afternoon. Newbie here. Currently in the medical field and working on changing my career path to DFIR. I was wondering if there are any US LEOs that wouldn't be opposed to some newbie questions?
Andrew Rathbun 7/15/2021 6:21 PM
Newbie questions are very welcome. Fire away. If they relate to #training-education-employment then use that channel instead
Avatar
randomaccess 7/15/2021 11:20 PM
@DE personally wouldn't get an m1. I don't think any of the virtualisation company's have built x86 support, so you can't use the prebuilt VMs like sift which I use a lot
💯 1
👍 1
Avatar
elizavetabelkasoft 7/16/2021 1:49 AM
Participate in Belkasoft DFIR industry survey. We are starting research and invite DFIR experts to exchange useful experience. You will find questions about work-life balance, learning in DFIR, your DFIR toolkit, lifestyle, and some questions for fun. All completed entries will have the opportunity to win a full-featured license of Belkasoft X. We are going to share the survey results with the DFIR community, so you can help each other by participating. Join the research: https://bit.ly/3z4GmI5
Avatar
Looking for MacBook TDM mode write-blocker recommendations, thank you!
Avatar
randomaccess 7/16/2021 4:04 PM
@dep a software write blocker is probably the easiest
Avatar
Thought so too, I've reached out to Cellebrite for a quote on SafeBlock. Thankfully TDM wasn't required for my most urgent case after all.
Avatar
I am trying to track down a tool... I think I heard about it in a SANS seminar last year... but I can't recall at all. Basically what I remember about the presentation was that it was a tool for parsing unknown data in as many forms as possible recursively. It showed the results that parsed as a tree. The person went into lengths about how it parsed snowflakes such as those from twitter and extracted and parsed timestamps and showed them as their own nodes in the tree. My Google-Fu is failing me. Does any of this ring a bell for anyone else? (edited)
Avatar
randomaccess 7/16/2021 9:35 PM
Unfurl
9:35 PM
@WWMB only works for urls though. Although I guess if you wanted to put a random data string at the end of a dummy url it could work as a tool for parsing unknown data
Avatar
Andrew Rathbun 7/17/2021 3:47 AM
@Ryan Benson made that tool FYI @WWMB
Avatar
randomaccess 7/17/2021 4:37 AM
O Hai @Ryan Benson
Avatar
@randomaccess @Andrew Rathbun THANK YOU!! That has been bugging me for so long!
3:33 PM
And ahhh, yeah, requires the url to be a recognizable format before it applies some of the parsers. Not quite what I was looking for when some of the things I was trying to analysis reminded me of it. But I'm sure it'll help me later when my needs match the use case better. 🙂
Avatar
randomaccess 7/17/2021 3:36 PM
@WWMB otherwise try this https://github.com/bee-san/pyWhat
🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙‍♀️ - bee-san/pyWhat
🌟 2
Avatar
What type of software would you call paliscope and hunchly
3:45 PM
along with things like analyst's notebook
3:45 PM
'investigation tools'? Because that seem to refer equally to things like username lookup services
Avatar
RandyRanderson 7/17/2021 8:40 PM
That’s gonna be subjective. But I call them analyst tools as they’re methods of recording what you’re doing and/or thoughts
Avatar
Avatar
randomaccess
@WWMB otherwise try this https://github.com/bee-san/pyWhat
Awesome!!
Avatar
just finished my old job now im finally getting into forensics a week tomorrow pretty happy even if i didnt leave on good terms
👍 3
Avatar
Avatar
RABIDFOX
just finished my old job now im finally getting into forensics a week tomorrow pretty happy even if i didnt leave on good terms
DeeFIR 🇦🇺 7/18/2021 5:34 PM
Congrats. What kind of company/organisation are you going to be working for?
👆 1
Avatar
Anyone with experience using APOLLO? The tool developed by Sarah Edwards
Avatar
Hi ! anyone already had issues with OCR on pictures in Axiom ? the process fails with the error "2021-07-19 11:04:55 93 ERROR Failed to run the OCR action System.AggregateException: One or more errors occurred. ---> System.OutOfMemoryException: Array dimensions exceeded supported range. "
Avatar
Anyone know of a program which is better at coping with reviewing CD-R/DVD-R's - Windows Explorer is always terrible and slow/crashes on bad discs.
Avatar
randomaccess 7/19/2021 3:50 AM
@3X3 isobuster
3:50 AM
@Gladros yeah a little bit
Avatar
Avatar
randomaccess
@3X3 isobuster
Thanks mate
Avatar
Avatar
randomaccess
@Gladros yeah a little bit
So I’m just looking into the framework and I’ve watched a few videos that Sarah has presented. I was wondering if you can use a GrayKey extraction to parse through the tool? As the videos I’ve seen use a jailbroken iPhone connected via an SSH connection.
Avatar
randomaccess 7/19/2021 3:58 AM
You can parse a full file system extraction with it yep. That's even preferable considering how much extra data you get
3:59 AM
I imagine you can just unzip the FFS extraction and then run it against that. If you have Blacklight or whatever it's called now that has Apollo integrated
3:59 AM
I haven't used it in a few years now
Avatar
@randomaccess called "Inspector
👍 1
Avatar
Avatar
DeeFIR 🇦🇺
Congrats. What kind of company/organisation are you going to be working for?
private sector it took me 2 interviews but they hired me on the second attempt
Avatar
BritishBulldog 7/19/2021 6:14 AM
Well that was quick!
Avatar
A solution for Digital forensic processing hardware from purchase, to processing of real-world data and hardware life cycle
Avatar
When making a report in PA. I am trying to remove images as they can't be provided however I keep getting bleed over from emails. Is there a way to not provide the attachments while keeping the email?
Avatar
Delete the attachment folder?
Avatar
@Rob my problem is I have images all over the place in SMS, in Emails, Contact Cards. Is there a way to keep all that from being included in the extraction? Keep the email content but exclude the attachments and pictures. Keep the contact information without the image associated.
Avatar
Avatar
Ghosted
@Rob my problem is I have images all over the place in SMS, in Emails, Contact Cards. Is there a way to keep all that from being included in the extraction? Keep the email content but exclude the attachments and pictures. Keep the contact information without the image associated.
Aside from delete the attachment folder, could hunt for the files you don't want and use the "remove/add to report" column to untick the items you don't want included.
Avatar
Yeah Ive been trying that all day. Has to be a better way. I'm down from 6k to about 100 now. I just saw redact all attachments under the report option I am trying this now.
Avatar
Avatar
Gladros
So I’m just looking into the framework and I’ve watched a few videos that Sarah has presented. I was wondering if you can use a GrayKey extraction to parse through the tool? As the videos I’ve seen use a jailbroken iPhone connected via an SSH connection.
DeeFIR 🇦🇺 7/19/2021 5:27 PM
Yep you can. Grab your FFS, extract it, and run APOLLO over it
👌🏻 1
5:28 PM
If you’re looking for a particular record like battery health, or records you know are in a specific database, just make sure that module is looking in the correct location otherwise you may be missing certain results
Avatar
Something people maybe interested in, It states Law Enforcement only but if you register with a work email, invite will be issued on a case by case basis. https://www.eventbrite.co.uk/e/bld-presenting-the-lenovo-thinkstation-powered-by-amd-threadripper-tickets-163342294199
A solution for Digital forensic processing hardware from purchase, to processing of real-world data and hardware life cycle
🍉 2
Avatar
Avatar
8198-IZ54
Something people maybe interested in, It states Law Enforcement only but if you register with a work email, invite will be issued on a case by case basis. https://www.eventbrite.co.uk/e/bld-presenting-the-lenovo-thinkstation-powered-by-amd-threadripper-tickets-163342294199
MalcolmPowder 7/20/2021 8:26 AM
I'm only going to watch if you wear that brushed red t-shirt from Florida.
Avatar
Avatar
DE
Hey all, I'm building a small dedicated home lab for forensics, with the intention that I can do some freelance work in the future. Has anyone had exprience of using a M1 Mac mini as the analysis machine (for mac forensics)? Is it overkill? Are older Macs preferred? I am currently torn between upgrading my workstation to a Ryzen 5950x, or buying a new Mac Mini M1, so appreciate any inputs I can get. Thanks!
M1 is great but there's limited support for running apps on it that haven't been ported. Additionally, most retail forensic software is built for Windows. There are a lot of linux based software that may or may not run in a macos command line. Typically people doing forensic work use Windows/linux unless analyzing a mac, where macos can work better. I think staying on x86 would be much better than jumping to M1 for the work you want to do. Way more flexibility and less compatibility issues. (edited)
👍 1
Avatar
Also one additional thought. CPU power is needed only in specific circumstances. Most of the time during a case the CPU sits idle. If you have money to burn, you may consider putting the $800 toward more storage vs a better CPU (depending on what you have now). SSDs speed up processing and forensic images take up a ton of hard drive space.
Avatar
Avatar
DE
Hey all, I'm building a small dedicated home lab for forensics, with the intention that I can do some freelance work in the future. Has anyone had exprience of using a M1 Mac mini as the analysis machine (for mac forensics)? Is it overkill? Are older Macs preferred? I am currently torn between upgrading my workstation to a Ryzen 5950x, or buying a new Mac Mini M1, so appreciate any inputs I can get. Thanks!
I just recently got the Mac M1 mini , so far it's great, you can use parallels and install a windows VM if need be , I do have a backup x86 based laptop and also a hyper-v server as well, but so far it's been great
👍 1
11:11 PM
If you already have a x86 based machine, I'd say it's probably better to grab the Mac for mac based forensics
Avatar
Is there an adapter available to convert an iPod hard drive to something else like SATA or USB?
Avatar
Avatar
Cole
Is there an adapter available to convert an iPod hard drive to something else like SATA or USB?
I think iPods use a ZIF drive, I know Tableau makes an adapter you can buy (edited)
Avatar
Avatar
stark4n6
I think iPods use a ZIF drive, I know Tableau makes an adapter you can buy (edited)
Thanks! We found that adapter hidden in a drawer actually.
👍 1
Avatar
Avatar
DE
Hey all, I'm building a small dedicated home lab for forensics, with the intention that I can do some freelance work in the future. Has anyone had exprience of using a M1 Mac mini as the analysis machine (for mac forensics)? Is it overkill? Are older Macs preferred? I am currently torn between upgrading my workstation to a Ryzen 5950x, or buying a new Mac Mini M1, so appreciate any inputs I can get. Thanks!
As a general rule always use mac on mac as the file structure isn't supported on windows and you hit problems.
👍 2
Avatar
Mr-Protocol 7/22/2021 4:49 PM
Anyone know of a way to mount a drive as read-only/write-blocker but write the changes to a diff file? I can do this with Arsenal Image Mounter if I image the full drive first. Ultimately I need to trick Windows 10 that it's a r/w drive and hook it to a VM for encryption recovery so I can image the decrypted data. Trying to avoid imaging twice if possible.
Avatar
Mr-Protocol 7/22/2021 5:07 PM
Basically looking for this, but for physical drives:
Avatar
DeeFIR 🇦🇺 7/22/2021 6:50 PM
@Mr-Protocol I'll DM you
Avatar
Avatar
Mr-Protocol
Anyone know of a way to mount a drive as read-only/write-blocker but write the changes to a diff file? I can do this with Arsenal Image Mounter if I image the full drive first. Ultimately I need to trick Windows 10 that it's a r/w drive and hook it to a VM for encryption recovery so I can image the decrypted data. Trying to avoid imaging twice if possible.
Internal builds of Arsenal Image Mounter do this… DM and we can get it to you. Public release probably in a week or so.
👍🏼 2
Avatar
Anybody put together a RAID 0 pool from freenas/truenas before? I Imaged the two disks, and then tried a logical but as far as I can tell there is no allocated data on the zpool. There's a ton of data existing on the drives, however. Thinking maybe the suspect could have nuked it.
11:20 AM
There's like 140,000 photo fragments but each only has about half a photo, so thats why im thinking it could be part of an old raid 0
Avatar
Avatar
Cole
Anybody put together a RAID 0 pool from freenas/truenas before? I Imaged the two disks, and then tried a logical but as far as I can tell there is no allocated data on the zpool. There's a ton of data existing on the drives, however. Thinking maybe the suspect could have nuked it.
Digitalferret 7/23/2021 11:53 AM
do you have UFS Explorer? pretty good kit, raid wise. If not you can always download the free trial, to check if it's viable, then work around with something else
Avatar
Avatar
Digitalferret
do you have UFS Explorer? pretty good kit, raid wise. If not you can always download the free trial, to check if it's viable, then work around with something else
I haven't heard of it, but I will give it a shot! Thanks
Avatar
DFIRDetective 7/23/2021 1:55 PM
Congrats to @Andrew Rathbun and the discord community for winning the Forensic 4:Cast Award for "DFIR Resource of the Year"!!! For those who weren't able to catch the SANS DFIR Summit, I aggregated all of the links shared (with no context). https://start.me/p/xbgNmz/sans-dfir-2021
A startpage with online resources about SANS DFIR 2021, created by DetectiveDashboard.
🥳 8
👍 7
Avatar
Avatar
Cole
I haven't heard of it, but I will give it a shot! Thanks
DeeFIR 🇦🇺 7/23/2021 3:33 PM
UFS easily handles RAID configs, it’ll detect both drives in RAID0 and arrange them accordingly. So does x-ways. I’m not sure if x-ways supports RAID-Z or ZFS, but UFS does.
Avatar
Avatar
DeeFIR 🇦🇺
UFS easily handles RAID configs, it’ll detect both drives in RAID0 and arrange them accordingly. So does x-ways. I’m not sure if x-ways supports RAID-Z or ZFS, but UFS does.
Looks like its detecting it, but I think the problem I'm going to have is that they might have previously been used as ZFS, formatted, and now are being used as ZFS again...
Avatar
DeeFIR 🇦🇺 7/23/2021 4:19 PM
If you’ve rebuilt the array, have you been able to identify any zpools?
Avatar
Anyone else having popups that id needs to be verified using a phonenumber on discord android app. Unable to post anything at this stage. doing so its giving me the sign the number has recently been used at another account. Thats not possible. Deinstalled app, and installed again. Im back for now..... @Andrew Rathbun (edited)
Avatar
Andrew Rathbun 7/25/2021 7:50 AM
Not sure what's up with that. Curious if others have seen that
Avatar
Anyone from @Magnet Forensics available to answer a question about Slack acquisition?
Avatar
DFIRDetective 7/25/2021 10:37 AM
Depending on the server @florus they can require a verified phone on their account. It's the "Highest" verification level that can be set on a server. It's an effort to prevent "raiding".
Avatar
Andrew Rathbun 7/25/2021 10:38 AM
Truth, here's a visual aid
Avatar
@DFIRDetective is it needed on this server?
Avatar
Andrew Rathbun 7/25/2021 12:34 PM
@florus it's been like this for a long time so I'm not sure what is making this pop up all of a sudden
12:40 PM
I sent you a friend request so you can message me if you're still locked out for some reason
Avatar
Does anyone have any interesting Criminal cases that where solved due to DataRecovery/Digital Forensics. I am giving a talk soon and I will discuss some that I have found online, but chasing some good interesting ones I can talk about.
Avatar
How do you change your roles? Can't find the documentation
Avatar
@Rory Speak with Moderator, they can change it.
Avatar
Avatar
3X3
@Rory Speak with Moderator, they can change it.
Thank you, much appreciated
👍 1
Avatar
Avatar
Rory
Thank you, much appreciated
Andrew Rathbun 7/26/2021 5:25 AM
Roles are purely cosmetic. Did you get this taken care of?
Avatar
This logo was found on a hidden camera. Anyone recognize the brand?
Avatar
Has anyone else noticed a recent change to windows explorer? Some are nice, others are rather annoying. Some examples are automatic updates to file size without refresh but make a new folder/deleting a folder now requires a refresh to see the change.
6:13 AM
This also applies to making a new folder in ftk imager when exporting to a new directory
Avatar
Avatar
jball77
Has anyone else noticed a recent change to windows explorer? Some are nice, others are rather annoying. Some examples are automatic updates to file size without refresh but make a new folder/deleting a folder now requires a refresh to see the change.
Andrew Rathbun 7/26/2021 6:22 AM
It's a good idea to specify which OS you're talking about. I'm running the W11 Dev Preview right now so that'd be good to know if you're on that, or a W10 beta, Dev Preview, or just stable channel.
Avatar
Valid. This is on Win10 enterprise 20H2 (Build 19042.1083)
Avatar
Andrew Rathbun 7/26/2021 6:24 AM
Yeah normally it'd be assumed you're on W10, but that changed about a month ago 😛
Avatar
Ya, I haven’t been able to check out win11. On my short list of To do’s
Avatar
@Magnet Forensics Does Axiom support ZFS?
Avatar
Avatar
Andrew Rathbun
Roles are purely cosmetic. Did you get this taken care of?
Yes all sorted, thanks
Avatar
Avatar
Cole
@Magnet Forensics Does Axiom support ZFS?
AFAIK, no... You'll have to mount it in Linux and acquire it (you could use ewftools or just zip the contents up)
Avatar
Avatar
busted4n6
AFAIK, no... You'll have to mount it in Linux and acquire it (you could use ewftools or just zip the contents up)
I figured that was the case. I went ahead and zipped it.
Avatar
Andrew Rathbun 7/26/2021 6:59 PM
Threads are coming tomorrow apparently
Avatar
randomaccess 7/27/2021 1:28 AM
Finally
Avatar
I has a question for everyone. I've been directed to choose a laptop for our detectives to use for viewing UFED reports. What is the most important part for this task? The processor? I need something that isn't going to lock up on them when viewing large extractions.
11:13 AM
I'm currently looking at laptops from Xotic.
Avatar
Avatar
LawDawg
I has a question for everyone. I've been directed to choose a laptop for our detectives to use for viewing UFED reports. What is the most important part for this task? The processor? I need something that isn't going to lock up on them when viewing large extractions.
I would say processor and RAM. Look at a Sager Notebooks. What is the budget? https://www.sagernotebook.com/home.php
Sager Notebooks is a premium gaming laptop brand for gaming enthusiast looking for custom gaming laptops and notebooks. Browse through our selection of best gaming laptops at sagernotebook.com
Avatar
$5,000
11:51 AM
Just looked. The xotics have the i9-11980
Avatar
Avatar
LawDawg
$5,000
I just got this one: https://www.sagernotebook.com/customize.php?productid=2049 with upgraded RAM (64gb)
Sager Notebooks is a premium gaming laptop brand for gaming enthusiast looking for custom gaming laptops and notebooks. Browse through our selection of best gaming laptops at sagernotebook.com
11:52 AM
and upgraded SSD's
Avatar
Andrew Rathbun 7/27/2021 11:52 AM
Typing from a Sager right now. Intel(R) Core(TM) i9-9980HK CPU @ 2.40GHz
11:53 AM
Thing is noticeably faster when running SQLite queries against massive DBs than my 6 core desktop
Avatar
One of my many bosses is going to get it from some obscure grant, so it needs to last or awhile. I like the 17" screen and better processor, as I understand it.
Avatar
Andrew Rathbun 7/27/2021 11:53 AM
Also much better with VMs as a result
11:54 AM
4K screen?
Avatar
If I had the budget I would have gone with the 17" and i9
Avatar
It's just to be used by our detectives to look at cell phone dumps on UFED reader
Avatar
Andrew Rathbun 7/27/2021 11:54 AM
The Sager 4K screen is gorgeous
Avatar
something they can check out and use
Avatar
Andrew Rathbun 7/27/2021 11:54 AM
Well it'll serve you well in that regard. Processing anything will be as fast as it's going to be, within reason
11:55 AM
SSD and Cores and RAM should be all you need to make quick work of it
Avatar
Yeah, they're not going to be doing anything we would be doing. I just need something somewhat future proof.
Avatar
Andrew Rathbun 7/27/2021 11:56 AM
Don't forget RAM Disks and how fast they are
Avatar
the xotic has 64 GB at 3200
Avatar
Andrew Rathbun 7/27/2021 11:56 AM
Could set up a persistent RAM disk for the reports to reside on
Avatar
I don't know what that is
11:56 AM
i know what persistent is and what RAM is, but not together
Avatar
Andrew Rathbun 7/27/2021 11:57 AM
11:58 AM
Let's say you have 64GB of RAM. You could set aside 32 of that and mount it as a drive. Whatever you store on it would be running from RAM, not spinny disk or SSD
11:58 AM
See chart above
Avatar
Snap! I'm going to google how to do that. Do you use that for your work?
Avatar
Andrew Rathbun 7/27/2021 11:59 AM
Programs are cheap, too
Avatar
Andrew Rathbun 7/27/2021 11:59 AM
We use lab shares and whatnot. I don't ever have evidence locally. It's all remote
Avatar
But...
Avatar
Andrew Rathbun 7/27/2021 11:59 AM
but if I did have evidence locally, I'd definitely do that, within reason
Avatar
If you're evidence is larger than the theoritcal 32GB of persistent RAM, are you out of luck using it?
Avatar
Andrew Rathbun 7/27/2021 12:00 PM
Yeah pretty much. The benefit is the insane speed, even compared to SSDs
12:00 PM
Downside is limited by your system RAM
12:00 PM
and obviously you can't use ALL of it
Avatar
Ok, so good for small stuff
Avatar
Andrew Rathbun 7/27/2021 12:01 PM
yep
Avatar
My new computer I'm getting has 256GB of RAM, so I could use it for cell phone stuff
Avatar
Andrew Rathbun 7/27/2021 12:01 PM
If you ever deal with a 3gb CSV, for instance, like event log output, that's not a bad idea to throw on a small RAM Disk and then open it in something like Modern CSV, Timeline Explorer, etc
Avatar
Avatar
LawDawg
My new computer I'm getting has 256GB of RAM, so I could use it for cell phone stuff
Andrew Rathbun 7/27/2021 12:02 PM
Bingo, exactly. It's at least worth testing and benchmarking to see if you notice huge differences
12:02 PM
I think SoftPerfect RAMDisk is like 29 bucks, which is nothing
Avatar
A 128 GB persistent RAM disk on this new computer should cover all cell phone dumps
12:02 PM
Snap! Learn something new everyday.
12:04 PM
Again, worth testing and benchmarking, do the trial for RAMDisk and see if it works for you and is worth it
Avatar
I never thought about this, I should repurpose some RAM heavy machines to do so
Avatar
Andrew Rathbun 7/27/2021 12:06 PM
You could even test by having a system with a HDD, SSD, M.2, and RAMDisk and use FTK Imager and see how fast the imaging goes. Likely, you'd have to have the image go to the RAMDisk so the destination isn't a bottleneck for write speeds, etc, but that is another way to test
12:07 PM
We've all imaged HDDs and SSDs a lot by now, but would be interesting to compare M.2 and RAM Disk speeds with common forensic tools as ways to measure perceived benefits in using a RAMDisk for specific tasks like processing, or reading large CSVs that take forever to load, etc
Avatar
If they would speed up the development of RAM to make it cheaper, it would be nice to load a forensic acquisition into RAM for processing.
Avatar
Andrew Rathbun 7/27/2021 12:13 PM
All depends on what your acquisition is. I often deal with KapeTriage packages that are 1.5GB in size. I could easily store that even on a system with 32GB RAM
12:14 PM
Then just point a forensic tool at it and let it rip, or let Eric's tools do their thing
12:14 PM
All depends on what you do and what you can make work for your workflow
Avatar
We have a new HP Z Fury 17" with i9-10885H... Might have to try the RAMDisk idea 😄
💯 1
12:38 PM
Although the PCIe 4 storage on my just-built @Griffeye GID server is pretty sweet too!
Avatar
Avatar
busted4n6
Although the PCIe 4 storage on my just-built @Griffeye GID server is pretty sweet too!
Do you have a dedicated hardware server for your GID?
Avatar
I built a gaming spec pc based on recommendations from them
12:46 PM
Ryzen 5900x with 64gb of good ram. X570 based with pcie 4 storage. Far cheaper than any server of similar spec. Needs to last us 18months or so
12:49 PM
About to start properly testing it. Have 250m hashes
Avatar
I just ordered a computer from Bitmindz. It has a 4TB RAID 0 with 4 SSDs. Should make processing E01s go pretty fast.
Avatar
Looking to buy a second faraday box with the moon man gloves and window and power strip etc. I have a Ramsey box, is that still the standard?
Avatar
So far I’ve found Ramsey and mission darkness. They look like the same box with a different logo
Avatar
Avatar
whee30
So far I’ve found Ramsey and mission darkness. They look like the same box with a different logo
I think the Mission Darkness one is a different construction, don't quote me on that though
Avatar
Andrew Rathbun 7/28/2021 11:51 AM
Threads enabled
Avatar
Avatar
whee30
So far I’ve found Ramsey and mission darkness. They look like the same box with a different logo
Ryan MOS Equipment 7/28/2021 12:55 PM
We make the Mission Darkness BlockBox Lab. I won't give you the whole pitch but I do want to help you understand the differences. We released a new box a few months ago that's 2.5x the volume of our old one, for only a few hundred bucks more. The reason why is most of our customers need to place Graykey/Cellebrite/other tools inside the box, and bring in faraday bags to transfer to the tool. The increased size is necessary. It's a huge box for the price. Few other points - RJ45 included for the tool licenses, extra set of gloves included (they rip over time), extra seals (they compress over time), $200 worth of included bags.
Avatar
I hadn’t realized it came with other stuff too. I included it in my memo this morning, we will see what happens. I definitely like the idea of a larger box, I have the Ramsey STE3000F2 currently.
2:35 PM
No complaints other than I have too many devices in it.
Avatar
Hello, I have a very not professionnal question about what seems to be simple deleted file recovery on my personnal computer. I have just transfered 10Gb of photos from my android phone to my ubuntu distro, under /home/rebrec/Documents/photos Just after transfering those 10Gb of data, i have, from a shell done a rm -rf * in /home/rebrec/ ... (yes... I know...) About less than 30 second after this, I realized my mistake and I ran poweroff. Now, I am on the same computer from a Linux Live (ubuntu) where I have installed testdisk. What I have trouble to understand is why I can recover most of my removed folders, BUT, when I go to each "Default" folder of my user profile (Desktop, Documents, Downloads, Music, Pictures, ...) they are all empty... either I am totally unlucky (which seems to be possible), either I may be missing something.... I have then tried to run photorec on the same partition but I don't find any "recent jpg"... I guess this is a professionnal channel, but I hope some of you will have time to give me a hint. thanks
Avatar
I can't really offer any help. I'm just wondering what made you run the command rm -rf *? I thought it was well known amongst linux users that its a bad idea.
Avatar
Avatar
AmNe5iA
I can't really offer any help. I'm just wondering what made you run the command rm -rf *? I thought it was well known amongst linux users that its a bad idea.
just tired, types ls blah, then instead of doing cd $_ && rm -rf * I just did the second one...
12:23 PM
should I post my question on #computer-forensics perhaps ?
Avatar
Avatar
rebrec
should I post my question on #computer-forensics perhaps ?
I'd try #data-recovery
Avatar
@Jobbins thanks
Avatar
Hi all, Anyone here working with Staffordshire able to send me a quick DM?
Avatar
Need interview tips for soc tier 2 and some incident response
Avatar
Avatar
A.sh3ban
Need interview tips for soc tier 2 and some incident response
Andrew Rathbun 7/31/2021 9:47 AM
#training-education-employment
Avatar
PhrostByte 8/2/2021 9:31 AM
I have an IBM 1726-31x NAS with a 4-disk RAID. Does anyone know where I can find any info on what file system and RAID parameters are used on this thing? This is the first RAID I have worked on and UFS Explorer isn't detecting it automatically. I have images of the disks, but I can't figure out how to rebuild the RAID.
Avatar
pathsofglory 8/2/2021 5:36 PM
Does anyone have any international experience in DFIR, especially in Northern Europe? I've been in the field for about 5 years, but my wife's job is moving her to Stockholm. I can't bring my current position with me to work remotely, so I'm looking for something in the industry that I can work remotely, or for something EU based
Avatar
Avatar
pathsofglory
Does anyone have any international experience in DFIR, especially in Northern Europe? I've been in the field for about 5 years, but my wife's job is moving her to Stockholm. I can't bring my current position with me to work remotely, so I'm looking for something in the industry that I can work remotely, or for something EU based
DeeFIR 🇦🇺 8/2/2021 5:37 PM
I don't have anything to offer, but good luck with your move 👍
🍻 1
👆 1
Avatar
pathsofglory 8/2/2021 5:40 PM
@Law Enforcement [Sweden] if anyone you know is hiring for DFIR in the Stockholm area, please send me a DM swe
👍 1
5:40 PM
Sorry for the ping
Avatar
Andrew Rathbun 8/2/2021 5:42 PM
@pathsofglory isn't @MSAB Sweden based?
5:43 PM
When is the move?
Avatar
pathsofglory 8/2/2021 5:43 PM
January 2022
5:43 PM
but I can move there a bit earlier if needed
Avatar
DeeFIR 🇦🇺 8/2/2021 5:59 PM
Can you be Tobias' coffee courier?
😂 5
Avatar
pathsofglory 8/2/2021 6:11 PM
if there's a solid paycheck in it
🤑 1
Avatar
Deleted User 8/2/2021 6:54 PM
anyone have a list of Spanish passwords?
Avatar
DeeFIR 🇦🇺 8/2/2021 7:05 PM
#password-encryption-cracking
Avatar
Hello , can anyone share forensic checklist for windows server? thank you
Avatar
randomaccess 8/3/2021 2:25 AM
@veins very broad question But get the red and blue poster from sans for different artifacts. Ultimately the checklist is going to be: define what you're looking for, identify where that evidence may be, work through the artifacts available
2:25 AM
You can also use the MITRE attack framework to some degree
Avatar
@randomaccess Thanks for your reply. Mind if i DM u some other questions? Really just a beginner wanting to transition and have been task with some windows server artifacts to be analyzed
randomaccess started a thread. 8/3/2021 4:37 AM
Avatar
randomaccess 8/3/2021 4:37 AM
heh wow discord really wants to make threads feel like a bigger deal than they are
Avatar
If I'm honest, I don't really get threads. Is it just to continue a random offshoot conversation in a controlled manner? It then gets deleted, which would suck for here.
Avatar
randomaccess 8/3/2021 5:54 AM
they get deleted after a period of inactivity. but in terms of keeping things organised, i like threads in slack
Avatar
I thought they just became archived, and no longer show on the tree view (edited)
Avatar
Does anyone have any insight towards the advantages/disadvantages in using a .me hosted address? This is often left out from the discussions so I’m naturally not as familiar with the data laws in comparison to Switzerland or Sweden for example.
Avatar
Avatar
randomaccess
they get deleted after a period of inactivity. but in terms of keeping things organised, i like threads in slack
Bit of a bummer for sustained learning though. I like searching these archives for solutions!
Avatar
Any Texas LEOs in the group mind reaching out to me? I’ve got a question regarding intake and processing devices.
Avatar
Avatar
Lflores
Any Texas LEOs in the group mind reaching out to me? I’ve got a question regarding intake and processing devices.
Andrew Rathbun 8/3/2021 9:35 AM
@LawDawg
Avatar
Avatar
Andrew Rathbun
@LawDawg
Florida. Sorry.
Avatar
Andrew Rathbun 8/3/2021 9:43 AM
My bad, thought you were Texas 😛
Avatar
Unoriginal_name 8/3/2021 10:26 AM
@Lflores I’ll PM you shortly
Avatar
Hi Guys, if you had opportunity to use EDR instead of classic tools (like EZ suite for example) for IR, except for scale which features would you like or expect to see ? (edited)
Avatar
randomaccess 8/4/2021 2:58 AM
@Natay heh you say opportunity but I find combining Forensic artifacts with edr is best bang for buck between the two
Avatar
Obviously but the purpose of my question before jumping to use both is in IR context what's the plus of an EDR versus analyzing offline artefacts ? What Can I do more ?
Avatar
randomaccess 8/4/2021 3:34 AM
Edr is good for tracking process execution and relationships, commandlines, network connections, and more. It has a response capability as well. I've spent most of my time in carbon black. And I've found tracking things like lateral movement much easier with forensic artefacts
3:34 AM
Ideally edr would be an evidence source available to you. I like using Velociraptor to also triage and then collect more data from relevant hosts
Avatar
hey guys, we have a request for the analysis of a computer from an employee whose email account was used to send emails without their consent/knowledge, he uses Office 365. What kind of evidence/data do you guys think will help in the investigation? I've identified these, can you identify anything else?:
  • affected computer/disks
  • date and time of the incident
  • logs from office 365, not sure what is possible but will ask for logins and sent/received email by the user
anything else i can get from office 365?
(edited)
Avatar
Avatar
digoblin
hey guys, we have a request for the analysis of a computer from an employee whose email account was used to send emails without their consent/knowledge, he uses Office 365. What kind of evidence/data do you guys think will help in the investigation? I've identified these, can you identify anything else?:
  • affected computer/disks
  • date and time of the incident
  • logs from office 365, not sure what is possible but will ask for logins and sent/received email by the user
anything else i can get from office 365?
(edited)
Andrew Rathbun 8/4/2021 8:21 AM
Avatar
thank you, will check
Avatar
Avatar
randomaccess
Edr is good for tracking process execution and relationships, commandlines, network connections, and more. It has a response capability as well. I've spent most of my time in carbon black. And I've found tracking things like lateral movement much easier with forensic artefacts
Thanks for the answer. I use velo sometime too ^^ About your experience, why tracking lateral movements is easier with artefacts than EDR ? I'm looking for metrics which could justify using EDR alongside usual process
Avatar
Avatar
Natay
Thanks for the answer. I use velo sometime too ^^ About your experience, why tracking lateral movements is easier with artefacts than EDR ? I'm looking for metrics which could justify using EDR alongside usual process
randomaccess 8/4/2021 2:35 PM
At least with carbon black. It's tracking things like processes, registry modifications, network connections. An RDP session between two computers would look like a couple processes executed at the same time. Whereas a few event log entries would highlight the RDP session better Exception to that however is if someone is using Wmi or other commandlines, edr would by default record better information than standard windows. So yeah, they both have their place
Avatar
Good Morning! I have a problem with some geo-locations. A device shows in google maps Location 1 but i'm 400km away with my android phone on Location 2. If we use the "get position" button, we have the correct position. In this case we have more than 20 mobile HotSpots from guys who come from Location 1 next to us. So in our thinking we get with our android phone the geolocations from the HotSpots for a few seconds. Is this information stored on the device? "seen WiFis" with geodata? We were not connected to one of the HotSpots! But we cant found any information on the device (with cloud-data). (iwc_dump.txt, wpa_supplicant.conf or ssrm_heating.log ?!) THANKS! 😉
Avatar
Hello guys, I'm a newbie here. I was wondering how do I get started building scripts with python because I am interested in building hands-on projects, e.g. "Andriller" I would like to build a feature where you can extract specific data, for example, pornography pictures in a windows or an android. Is it possible for me to build this system within six months since I only learn Java in college? So I decided to learn python soon so that I can create more frameworks in future. I'm also having problems like I don't know how to get started? I try to invest myself by studying "File system forensics" and "Mastering Python Forensics" textbooks. I'm not sure whether this is sufficient, but please let me know if you have any recommendations. One more thing, do you guys have any recommendations on any udemy python courses? Are Angela Yu's courses sufficient? I also bought another python course called " Master Python programming by solving scientific projects."
Avatar
Avatar
screamxx
Hello guys, I'm a newbie here. I was wondering how do I get started building scripts with python because I am interested in building hands-on projects, e.g. "Andriller" I would like to build a feature where you can extract specific data, for example, pornography pictures in a windows or an android. Is it possible for me to build this system within six months since I only learn Java in college? So I decided to learn python soon so that I can create more frameworks in future. I'm also having problems like I don't know how to get started? I try to invest myself by studying "File system forensics" and "Mastering Python Forensics" textbooks. I'm not sure whether this is sufficient, but please let me know if you have any recommendations. One more thing, do you guys have any recommendations on any udemy python courses? Are Angela Yu's courses sufficient? I also bought another python course called " Master Python programming by solving scientific projects."
Andrew Rathbun 8/5/2021 4:57 AM
re: Python, why not follow #dfir-python-study-group by @Brigs? He ran a Python study group and it's all on YouTube.
4:58 AM
Also, #programming_reverse-engineering is a channel but if you want more Python help, there is a Python Discord Server that I'm sure is really active. It's a Verified server too, IIRC
Avatar
oh, i was actually confused where to post , thank you for the heads up
Avatar
Andrew Rathbun 8/5/2021 4:59 AM
And if you want help from people who code, @Programmer is a thing too but I'm sure there's LOTS of people missing from that role currently
Avatar
Hi, I joined to server because I am trying to recover an NTFS partition after accidentally deleting it in Disk Management. Currently, I am using DMDE. After clicking "Insert" on the found partition on the drive, nothing happened. It just changed the button to "Remove" and Disk Management still shows the drive as unallocated, even after closing and reopening it. EDIT: Solved: https://discord.com/channels/427876741990711298/528318849565589505/872859856317595679 (edited)
Avatar
Is there a workaround for pcie ssd write blocking in the field that doesn’t require the $400 pcie write blocker bridge from tableau (or the equivalent weibetech)? I’ve got a td2u setup but when I need to examine a pcie ssd in the field, it doesn’t have the capability. I have the tableau adapter for the pcie ssd but not the bridge, which is $400. So I just need to pony up the $$$ or is there a good workaround where I can use my existing blocker setup?
Avatar
Rocketek M.2 NVME SSD Enclosure Adapter Tool-Free, USB C 3.1 Gen 2 10Gbps or Thunderbolt 3 NVME PCIe M-Key or B+M Key, 6Gbps SATA NGFF B+M Key, External Aluminum Case for 2230 2242 2260 2280 SSDs
Avatar
We’ve added these and mSata adapters to our kits and it works fine with the TD3. I haven’t used the TD2U in years, but I would think it would work using the USB port.
Avatar
Yeah I was thinking a USB adapter would work and then run the usb adapted drive through the usb bridge
3:54 PM
Didn’t help today obviously, but for next time
Avatar
I wouldn't see why an enclosure with a USB writeblocker wouldn't work just fine, you may see some speed differences but functionally should be ok
Avatar
Avatar
stark4n6
I wouldn't see why an enclosure with a USB writeblocker wouldn't work just fine, you may see some speed differences but functionally should be ok
randomaccess 8/5/2021 10:20 PM
to get around that speed bump you would employ a software writeblocker like safeblock (https://www.forensicsoft.com/products/safe-block)
👍 1
Avatar
DeepDiveForensics 8/6/2021 12:07 AM
Hello, Is there any way to Format a USB Drive in a different file system like FAT, NTFS, EXT, APFS on my windows Machine. (edited)
Avatar
Avatar
DeepDiveForensics
Hello, Is there any way to Format a USB Drive in a different file system like FAT, NTFS, EXT, APFS on my windows Machine. (edited)
chaosmunkey 8/6/2021 12:23 AM
I think you can do both FAT and NTFS natively within windows. As for the others, I don't think it's possible, especially as you have to install extra software to read the EXT format (at least that was the case). If you're in need of those formats, it might be worth spinning up an Ubuntu VM and passing through the USB device and performing the format there (edited)
Avatar
Avatar
randomaccess
to get around that speed bump you would employ a software writeblocker like safeblock (https://www.forensicsoft.com/products/safe-block)
never used SafeBlock before other than just recently for FOR498, seems pretty cool
Avatar
Russell Abel - Bastrop County SO 8/6/2021 9:35 AM
If anyone has a copy of the ACES WriteBlocker software, I sure would appreciate a DM. I know there's WriteBlocker XP, but I think there's a newer version. Either way, I would be appreciative of either version. The ACESLE website/organisation is no more, so I can't just download from their site.
Avatar
Digitalferret 8/7/2021 5:27 AM
just throwing something up that I've known about a long while, yet often neglected to consult myself (until "it" already happened). Although this is named as an Admin document, it pretty much serves anyone with operational responsibility and probably more so in a Forensic environment. png and pdf available from https://adminzen.org/ (edited)
👍 3
Avatar
Quick question on Texas laws and Drone flight. Is it illegal to fly drones over peoples backyard or houses? I've already tracked it to an address, and it seems a bit of a hairy subject. Any opinions on this would be much appreciated. I plan contacting the local chapters here soon, but just wanted to know anyone in LE that may be helpful. It's not everyday, but it's not uncommon to see it weekly. Thanks in advance. (edited)
Avatar
Avatar
ul7
Quick question on Texas laws and Drone flight. Is it illegal to fly drones over peoples backyard or houses? I've already tracked it to an address, and it seems a bit of a hairy subject. Any opinions on this would be much appreciated. I plan contacting the local chapters here soon, but just wanted to know anyone in LE that may be helpful. It's not everyday, but it's not uncommon to see it weekly. Thanks in advance. (edited)
Andrew Rathbun 8/7/2021 11:51 AM
👍 1
Avatar
Thanks @Andrew Rathbun
11:53 AM
We've had neighbors really feel uncomfortable about it, and I completely understand the concern. I'll take it from here! Thank you so much once again, @Andrew Rathbun!
💯 1
Avatar
Hello, any X-Ways Forensics/WinHex users around? I'm looking for a user to interview for my academic obligations . I would be grateful for any assistance! Thanks guys
Avatar
Avatar
atnaf
Hello, any X-Ways Forensics/WinHex users around? I'm looking for a user to interview for my academic obligations . I would be grateful for any assistance! Thanks guys
Andrew Rathbun 8/8/2021 6:03 PM
Feel free to PM me if you still need someone
Avatar
Andrew Rathbun 8/9/2021 4:19 AM
Great work on this, Lee, thanks for putting this together 👍
Avatar
Digitalferret 8/9/2021 5:00 AM
he's never been the same since D***labs 🙂
Avatar
Avatar
Digitalferret
he's never been the same since D***labs 🙂
The placement of the asterisks are unfortunate…
😁 5
Avatar
Hi, not sure if this is the correct channel (https://discord.com/channels/427876741990711298/679742846269784064/874259896961470464) - however, my colleagues and I are having a discussion about process geneology, which is relevant for spotting abnormal in the process hierarchy. At the MSDN page for inheritance windows mentions several properties and resources that a child process may inherit (or not) from its parent. The discussion on the other hand is the inheritance of privileges. Does a child process inherit the privileges of the parent? If so, in what scenarios? Would love to hear your thoughts on this.
Avatar
Avatar
atnaf
Hello, any X-Ways Forensics/WinHex users around? I'm looking for a user to interview for my academic obligations . I would be grateful for any assistance! Thanks guys
Ross Donnelly 8/9/2021 10:22 AM
Drop me a message if you're still looking
Avatar
Avatar
atnaf
Hello, any X-Ways Forensics/WinHex users around? I'm looking for a user to interview for my academic obligations . I would be grateful for any assistance! Thanks guys
Andrew Rathbun 8/9/2021 12:54 PM
FYI I just got done with this interview. Took about 20 minutes. Alex seemed like a cool dude and it wasn't a heavy lift. Would definitely appreciate anyone else who can help him out with this 👍
😀 1
👌 1
Avatar
Avatar
Andrew Rathbun
FYI I just got done with this interview. Took about 20 minutes. Alex seemed like a cool dude and it wasn't a heavy lift. Would definitely appreciate anyone else who can help him out with this 👍
Thank you for your good words Andrew! I've reached the number of interviews I had in mind Once again thank you and everyone else you replied for your assistance
💯 1
Avatar
Hello good Morning. I am currently working on creating a kernel-level driver in windows to deny access to all users who try to read the memory of my process, write it or suspend this same process. Honestly I am quite lost, I have no idea how to do it. My program is made in Python, although I am aware that I must do it in another language. Could someone warm me up a bit?
Avatar
Avatar
ZaikoARG
Hello good Morning. I am currently working on creating a kernel-level driver in windows to deny access to all users who try to read the memory of my process, write it or suspend this same process. Honestly I am quite lost, I have no idea how to do it. My program is made in Python, although I am aware that I must do it in another language. Could someone warm me up a bit?
Andrew Rathbun 8/9/2021 5:51 PM
#programming_reverse-engineering
5:52 PM
Also, Python has a really active Discord server as does pretty much any other language. You may be best fit asking there too
Avatar
Avatar
Andrew Rathbun
Also, Python has a really active Discord server as does pretty much any other language. You may be best fit asking there too
Ok thanks
Avatar
Anyone got experience with analysis of the ‘Find My’ app database?
Avatar
Avatar
Arsenal
Internal builds of Arsenal Image Mounter do this… DM and we can get it to you. Public release probably in a week or so.
Mr-Protocol 8/10/2021 11:44 AM
Forgot to update on this. The new feature of Arsenal to write block with a diff file physical devices worked great for my needs. I tested with the internal build sent to me and worked as I hoped. I was able to connect the mounted physical drive (Arsenal) to a recovery VM and repair/decrypt the full disk encryption without having to image first. (edited)
Avatar
Avatar
ZaikoARG
Hello good Morning. I am currently working on creating a kernel-level driver in windows to deny access to all users who try to read the memory of my process, write it or suspend this same process. Honestly I am quite lost, I have no idea how to do it. My program is made in Python, although I am aware that I must do it in another language. Could someone warm me up a bit?
Deleted User 8/11/2021 7:42 PM
like an anti-cheat would? https://www.unknowncheats.me/forum/anti-cheat-bypass/ you can take a look here - people reverse popular anti cheats like BE/EAC which essentially have to accomplish the same thing you are describing. You can find a lot of the read/write detection vectors these guys inevitably find as they develop bypasses.
Download Anti-Cheat Bypass Hacks, Cheats and Trainers. This forum is for everything related to Anti-Cheat Bypass Game Hacking and Cheating!
Avatar
Does anyone know where to download or get the RCMP HDL DOS Write Blocker?
Avatar
BritishBulldog 8/12/2021 1:30 AM
Unsure which channel this question fits in - I'm trying to do a GREP search for underage where people confess their age
1:30 AM
1-17 yo/years old/year old etc
1:31 AM
1?[1-9].?(yo|year(s?).?(old)?) I expected this to bring back false positives (18-19 years old) but it brings back quite a lot of 20-40 years old
Avatar
Avatar
BritishBulldog
1-17 yo/years old/year old etc
Andrew Rathbun 8/12/2021 1:34 AM
Build out a regex101 for it
Avatar
Avatar
BritishBulldog
1-17 yo/years old/year old etc
Digitalferret 8/12/2021 1:34 AM
coincidentally been chatting about exactly that : https://ptb.discord.com/channels/427876741990711298/427886054675185664/874250210593890304 and scroll down
Avatar
Andrew Rathbun 8/12/2021 1:35 AM
https://github.com/rathbuna/DFIRRegex If you figure it out let me know and I'll add it here
A repo to centralize some of the regular expressions I&#39;ve found useful over the course of my DFIR career. - GitHub - rathbuna/DFIRRegex: A repo to centralize some of the regular expressions...
1:36 AM
Regex101 will allow you to put in sample data and you can see hits live. Also you can save the link and share with others. I did that for all the ones on my repo so you can see what you're getting yourself into before you use an expression
Avatar
Avatar
Andrew Rathbun
Regex101 will allow you to put in sample data and you can see hits live. Also you can save the link and share with others. I did that for all the ones on my repo so you can see what you're getting yourself into before you use an expression
Digitalferret 8/12/2021 1:37 AM
ooh nice. somehow missed that one. 👍🏻
Avatar
Andrew Rathbun 8/12/2021 1:37 AM
Essential tool for troubleshooting regex. Very neat
1:38 AM
Re: the regex for the age, it seems like that should work fine but I'd have to be at my computer to play around with it
Avatar
BritishBulldog 8/12/2021 1:38 AM
Any help is greatly appreciated! I can't take credits for the regex I provided - @Matt came up with it 🙂 (edited)
Avatar
Andrew Rathbun 8/12/2021 1:39 AM
@Matt is smart as a whip so I'm not surprised 😎
😊 1
1:39 AM
I'm only awake because the storm killed the power which killed the sound machine so I'll need a few hours before I can fiddle with it
Avatar
BritishBulldog 8/12/2021 1:40 AM
Storm? 😮 Hope you're alright and safe!
Avatar
Andrew Rathbun 8/12/2021 1:40 AM
Yeah just thunderstorm. Went off for like 5 seconds. Just enough to have to get up and turn it back on 😂
😂 1
1:43 AM
And now here I am 👀 at 0445 (edited)
😅 3
Avatar
Digitalferret 8/12/2021 1:49 AM
no UPS and backup generator, what sort of geek are you? (looking at UPS which has needed a new batteryl for longer than i care to remember.. gennie needs a service too)
😂 1
Avatar
Avatar
Andrew Rathbun
Regex101 will allow you to put in sample data and you can see hits live. Also you can save the link and share with others. I did that for all the ones on my repo so you can see what you're getting yourself into before you use an expression
I was using that to try and test but my regex skills just aren’t good enough 😂
Avatar
BritishBulldog 8/12/2021 3:35 AM
better than mine!
Avatar
Andrew Rathbun 8/12/2021 3:58 AM
I firmly believe no one gets better at regex. I think the fog clears with more familiarity/exposure with it but It's so perishable and complex. Having good reference material, tools like PowerGREP and Regex 101, stealing from Stack Overflow, and failing multiple times are how you fake the funk until you're right on accident
Avatar
Avatar
BritishBulldog
Unsure which channel this question fits in - I'm trying to do a GREP search for underage where people confess their age
Would this work for you? ^(0?[1-9]{1}|[1]{1}[0-7]{1})\s?(y(\s?)o|yr(s?|z?)|year(s?|z?)|y)(\s(old)?)
4:45 AM
This is my search criteria
Avatar
Andrew Rathbun 8/12/2021 4:46 AM
@jball77can you ctrl+s and share the link?
Avatar
Regular expression tester with syntax highlighting, explanation, cheat sheet for PHP/PCRE, Python, GO, JavaScript, Java. Features a regex quiz & library.
Avatar
Andrew Rathbun 8/12/2021 4:50 AM
this is superb work, thank you on behalf of the requester
Avatar
Awesome job 🙂
Avatar
Andrew Rathbun 8/12/2021 4:51 AM
@jball77 do you care if I include this on my DFIRRegex repo? I can credit you if you like. I don't take credit for any of the regex on there, it's just purely meant for centralizing
Avatar
BritishBulldog 8/12/2021 4:51 AM
So it brings back 100 years old and 18-19 years old?
Avatar
Andrew Rathbun 8/12/2021 4:51 AM
Nope, if they're not highlighted those are not hits
updoot 2
Avatar
BritishBulldog 8/12/2021 4:51 AM
oooh!
4:51 AM
That IS NEAT
Avatar
@Andrew Rathbun Of course! please feel free.
🤘 1
Avatar
Andrew Rathbun 8/12/2021 4:51 AM
Yeah it's incredible stuff, really
Avatar
I was having issues with the 2[4 years old] being highlighted
Avatar
Andrew Rathbun 8/12/2021 4:52 AM
Regex101 is great
Avatar
BritishBulldog 8/12/2021 4:52 AM
Thanks @jball77
Avatar
Yeah, nice one @jball77
Avatar
Avatar
Andrew Rathbun
Regex101 is great
RegExr is an online tool to learn, build, & test Regular Expressions (RegEx / RegExp).
Avatar
Andrew Rathbun 8/12/2021 4:52 AM
@BritishBulldog you are welcome to add more test data in that link and see what it hits on or doesn't hit on, it's all in real time
Avatar
BritishBulldog 8/12/2021 4:53 AM
I'm running that one through a case now
Avatar
Andrew Rathbun 8/12/2021 4:53 AM
While we are on the subject, if you want to mass generate data for the purpose of testing regex, https://www.mockaroo.com/ is pretty awesome
A free test data generator and API mocking tool - Mockaroo lets you create custom CSV, JSON, SQL, and Excel datasets to test and demo your software.
Avatar
@BritishBulldog You're very welcome. Thanks for the idea!
Avatar
@jball77 One minor suggestion, maybe replace the \s with ., it's common for it to be formatted like 14-years-old
Avatar
Andrew Rathbun 8/12/2021 4:56 AM
also, 14-yo, that may be a good one to cover just in case
4:56 AM
trying to think about how teens would type (poorly) on the internet
Avatar
yr, yrs, yrz, yr, y would be the common ones i think
4:56 AM
spaces and dashes for common delimiters
4:57 AM
don't think there's any other common delimeters?
Avatar
Avatar
Matt
@jball77 One minor suggestion, maybe replace the \s with ., it's common for it to be formatted like 14-years-old
Thats an interesting one I didnt cover. The yrz is covered already. If I change the \s, it breaks things. I can work on it.
👌 1
Avatar
Andrew Rathbun 8/12/2021 4:57 AM
Here's a scenario of test data I generated where it has random names, birthdates, species, preferences, SSN, etc all that stuff. Basically each row is a person and all the data about them. Yes, these people are animals lol. Yes they have BitCoin addresses, too.
Avatar
Avatar
jball77
Thats an interesting one I didnt cover. The yrz is covered already. If I change the \s, it breaks things. I can work on it.
BritishBulldog 8/12/2021 4:59 AM
That would be great, I can run your examples against a live case I have and let you know if it works or not.
Avatar
Might look into any UK regexes I can add to your DFIRRegex repo Andrew
4:59 AM
Any other common strings you can think of @BritishBulldog?
Avatar
BritishBulldog 8/12/2021 5:00 AM
relating to IIOC?
Avatar
Anything you might need for investigation really
5:01 AM
The first ones that jump to mind are sort codes and bank account numbers
Avatar
BritishBulldog 8/12/2021 5:01 AM
Hmm the link Andrew provided is pretty good
5:01 AM
A repo to centralize some of the regular expressions I&#39;ve found useful over the course of my DFIR career. - GitHub - rathbuna/DFIRRegex: A repo to centralize some of the regular expressions...
Avatar
Avatar
Matt
Might look into any UK regexes I can add to your DFIRRegex repo Andrew
Andrew Rathbun 8/12/2021 5:01 AM
Yes please do, Either do a PR or I can just add myself. Whatever works
5:02 AM
@jball77 added yours to the repo, thank you again
Avatar
BritishBulldog 8/12/2021 5:03 AM
Just thought of another response, could be "I'm 13" and not mention year old or yo 😂
5:03 AM
Now we're just making regex very complicated
Avatar
@Andrew Rathbun Thanks Andrew! Really cool resource!
Avatar
Avatar
jball77
@Andrew Rathbun Thanks Andrew! Really cool resource!
Andrew Rathbun 8/12/2021 5:06 AM
Thanks! It's nothing groundbreaking whatsoever but I think the centralized repo with Regex101 links is the main value to the repo. It'll grow over time
5:13 AM
Great collab everyone 👍
Avatar
Avatar
Andrew Rathbun
@jball77 added yours to the repo, thank you again
BritishBulldog 8/12/2021 5:26 AM
I think @jball77 said he was going to tweak it a little more 🙂
5:26 AM
Oh speak of the devil
Avatar
Updated to include "17-year-old"
Avatar
BritishBulldog 8/12/2021 5:27 AM
Running it now against a job I'm on
Avatar
the "-" was a bit tricky and my eyes started to cross with all the parentheses
😂 2
Avatar
BritishBulldog 8/12/2021 5:29 AM
Does it make the regex significantly complicated if I asked if you can add "I'm" before the age, as in "I'm 13" or "im 13" etc
Avatar
The only issue is that I would need to remove the ^ (Start of string), which automatically includes 8yo from "18yo". Let me see what I can do. So you need im | i'm | I'm | I'M | I am ?
5:34 AM
It would make it more complicated for conversations though. They are, she/he is, we are, etc.
5:35 AM
Just curious, what are you running this on? SMS/chat?
Avatar
Cancel that, doesn’t matter
Avatar
BritishBulldog 8/12/2021 5:46 AM
Okay - your latest regex didn't pull anything back.
5:46 AM
Hmm
5:47 AM
Running on a second exhibit @jball77 - this one should return some hits cos I've seen underage confessions on this one
Avatar
maybe the ^ is the issue. Try removing that char and rerun it. You would get more fp that way like 8yo from "18yo"
Avatar
BritishBulldog 8/12/2021 5:57 AM
rerunning now
Avatar
BritishBulldog 8/12/2021 6:12 AM
I'm probably 70% of the way and I'm getting 0 hits.
6:15 AM
That performs a lookback for Im variants, and a lookforward matching my latest regex, and anything in between.
Avatar
BritishBulldog 8/12/2021 6:21 AM
@jball77 I've had 0 returns, weird (edited)
6:21 AM
let me double check the data
6:24 AM
Ah kids don't seem to say "years old or yo" in the case I'm working on
6:24 AM
It's either "I'm 15" or "im 15" or "i 15" or just the number !15"
Avatar
"i 15"? Grammar out the window huh?
Avatar
BritishBulldog 8/12/2021 6:25 AM
Well that one was from an 11 year old
6:26 AM
I just stuck with 15 as an age lol
6:26 AM
but yes, grammar out of the window
Avatar
Ok, let me adjust the last query
6:37 AM
That should match your case 'i 15' as well as yo,years old, etc if its present.
6:41 AM
I would assume you should get a lot of fp's. even "iacd314" would match because of the poor grammar. anything between "I" and <17 would hit.
6:42 AM
DM me if you have any other ideas that would help.
Avatar
BritishBulldog 8/12/2021 6:59 AM
lol
7:00 AM
The number 1 before 5 isn't highlighted, does this mean it's missed?
Avatar
Avatar
Digitalferret
no UPS and backup generator, what sort of geek are you? (looking at UPS which has needed a new batteryl for longer than i care to remember.. gennie needs a service too)
finally purchased a new battery for my UPS after over 3 mo of my stuff turning off randomly due to battery issue. smh I should have done this way earlier.
7:15 AM
A little late to the conversation, but here's a small regex/keyword list we typically use for child exploitation cases. Its a good indicator of places to look if there are any hits and avoids having too many words. The first two lines are for ages 1-17. We got this list from Forensic Explorer a couple versions ago, so hopefully they don't mine me sharing... FYI some of the words in here might be NSFW and offensive. I know theres a lot of people on this server. See document a couple messages below. Marked as spoiler. (edited)
Avatar
Avatar
BritishBulldog
The number 1 before 5 isn't highlighted, does this mean it's missed?
No, its matching 1, and 15.
Avatar
Huh. Thats pretty slick way of doing 1-17. It wouldn't cover 09, but I do like it. Not sure how the hex section "- _+" works tbh. Doesn't seem to be an OR statement.
Avatar
Avatar
Cole
A little late to the conversation, but here's a small regex/keyword list we typically use for child exploitation cases. Its a good indicator of places to look if there are any hits and avoids having too many words. The first two lines are for ages 1-17. We got this list from Forensic Explorer a couple versions ago, so hopefully they don't mine me sharing... FYI some of the words in here might be NSFW and offensive. I know theres a lot of people on this server. See document a couple messages below. Marked as spoiler. (edited)
Andrew Rathbun 8/12/2021 9:21 AM
Ugly reality of life, unfortunately. Stuff like this needs to be here IMO for the benefit of search but definitely not something we want posted day in and day out. Once is enough IMO so thanks for sharing
👍 3
9:21 AM
If anything, I THINK there is a way you can upload a file as a spoiler. May be worth investigating how that works and then deleting and reuploading
Avatar
I believe if you name it SPOILER_<file name> that works
Avatar
Avatar
Cole
A little late to the conversation, but here's a small regex/keyword list we typically use for child exploitation cases. Its a good indicator of places to look if there are any hits and avoids having too many words. The first two lines are for ages 1-17. We got this list from Forensic Explorer a couple versions ago, so hopefully they don't mine me sharing... FYI some of the words in here might be NSFW and offensive. I know theres a lot of people on this server. See document a couple messages below. Marked as spoiler. (edited)
Here's the document containing child exploitation related keywords and regex. NSFW (unless it is your work...lol) and likely offensive. Read at your own risk. (edited)
👍 4
Avatar
This is the one we use. Contains a few notable P2P applications in addition to known associated keywords.
👍 2
Avatar
BritishBulldog 8/13/2021 12:39 AM
Can watchlist take regex?
12:39 AM
within Cellebrite
Avatar
As far as I know, no.
12:48 AM
X-Ways and Axiom can
Avatar
Avatar
Matt
I believe if you name it SPOILER_<file name> that works
This is awesome!
😀 1
Avatar
The more you know haha
Avatar
Avatar
Rob
This is the one we use. Contains a few notable P2P applications in addition to known associated keywords.
I love how duckduckgo is on there. Thats my favorite search engine lol
6:23 AM
Sadly, it's on there due to our RSO's typically being told they cannot use it.
😆 2
Avatar
Avatar
Rob
Sadly, it's on there due to our RSO's typically being told they cannot use it.
Can't say I disagree with that though. Beyond some artifacts in observed.db it seems pretty good and wiping.
Avatar
chrisforensic 8/13/2021 7:22 AM
hello @Oxygen Forensics ... can you please describe the improvements of new release 13.7.0.100 compared to 13.7.0.48? thanx 😉
Avatar
Oxygen Forensics 8/13/2021 7:44 AM
Yes, of course! @chrisforensic It was actually supposed to be just a small hotfix to fix communication with the PKM module, but we decided why not put in something that is already done? So, here is what changed: Changes in version 13.7.0.100 (August 2021): 1) Oxygen Forensic® Extractor. Updated the ability to extract Viber calls via OxyAgent. 2) Oxygen Forensic® Extractor. Updated the ability to extract Discord account details via OxyAgent. 3) Applications. Updated support for Signal backups extracted from Android OS devices directly or via OxyAgent. 4) Data import. Improved support for Snapchat Warrant Returns. 5) General. Improved support for F2FS physical images. 6) Fixed the license issue with the Passware Kit Mobile module.
7:44 AM
QoL mini patch with some fixes (edited)
Avatar
chrisforensic 8/13/2021 7:49 AM
thanx @Oxygen Forensics for info! 💯 👍
oxygen 1
Avatar
Dallas Mayor Eric Johnson wants the Dallas City Council to investigate a massive data loss involving the city’s police department.
Avatar
burgers_N_bytes 8/13/2021 1:15 PM
Does anyone have some examples/wording for discovery request for cellphone imaging
Avatar
RIP so much for having proper backups
Avatar
Had anyone here had a vsan vmdk dump- except it was as a -stream.vmdk file? Can't get it to parse and the vmware-vdiskmanagerprogram doesn't seem happy
Avatar
nvm- got my -flat out but it's a LVM- segment 3 of 3...
Avatar
Does anyone know a method to convert an excel sheet to a chat view with chatbubbles to make the conversation better readable?
Avatar
I would use lots of conditional formatting and filtering but depends what your excel source is.
Avatar
Does any1 know if you get conversation/snap data from users that you have blocked on Snapchat when doing a "request my data" ?
Avatar
I don't think you ever get conversation data with request my data.
4:26 AM
At best you will get a load of blank lines to show you had a conversation with that person
Avatar
Allright, thanks!
Avatar
I've fallen for this before, it's not like facebook
Avatar
simsandhopps 8/16/2021 6:49 AM
T337v
Avatar
Long shot, but has anyone ever been able to measure distance from recorded gunshot audio? We have a 911 call where the victim is on the phone and a gunshot can be heard.
Avatar
Avatar
iNDO_o
Long shot, but has anyone ever been able to measure distance from recorded gunshot audio? We have a 911 call where the victim is on the phone and a gunshot can be heard.
Two questions, was the victim being shot at (just wanted to make sure) and do you know the type of firearm+ammunition doing the shooting? Also, are you trying to determine a long range or close range distance?
Avatar
We believe that the victim is the one that fired the gunshot and is blaming his ex wifes new boyfriend. A 9mm casing was found on scene
12:59 PM
i'm assuming that the 911 center utilizes the same audio compression, so i'm tempted to just do some field tests and compare the db levels in adobe audition. im getting way out of my lane though
Avatar
So the recording and the gun are suspected to be held by the same person? You seem to be on the right track with db levels. I was thinking more along the lines of a long range shot (someone is sniping at a victim) you should be able to determine how far away they were from a recording generated from the victim if other factors are known.
Avatar
I have asked this before but it did not really lead anywhere: How do you organize your evidence? I am searching for a solution that can help me book and track evidence in our lifecycle and allow me to export reports and audit trails - anyone has any recommendation?
Avatar
If a user IP address comes back to Amazon, is there a service that the end user is likely using or is it more likely a 3rd party service using Amazon services on the back end?
Avatar
Avatar
Joe Schmoe
If a user IP address comes back to Amazon, is there a service that the end user is likely using or is it more likely a 3rd party service using Amazon services on the back end?
Deleted User 8/17/2021 10:07 AM
Could be all of the above: infrastructure or hosting pools etc. Feed the IP into Shodan and see what ports are open or if any banner grabbing gives you a clue.
10:50 AM
Is there a difference between these commands ?
10:50 AM
as in their result ...
Avatar
Avatar
Neefje
Click to see attachment 🖼️
I think the result would be the same. But the top one appears to be using the user password whilst the bottom one is using the recovery key. Both would unlock the volume.
Avatar
Avatar
AmNe5iA
I think the result would be the same. But the top one appears to be using the user password whilst the bottom one is using the recovery key. Both would unlock the volume.
I concur with that interpretation
Avatar
Avatar
Deleted User
Could be all of the above: infrastructure or hosting pools etc. Feed the IP into Shodan and see what ports are open or if any banner grabbing gives you a clue.
Thank you. I’ve never used Shodan but it looks really interesting. I got “no results found” but I’ll keep messing with it.
Avatar
Avatar
Joe Schmoe
Thank you. I’ve never used Shodan but it looks really interesting. I got “no results found” but I’ll keep messing with it.
Deleted User 8/17/2021 1:17 PM
No problem. DM if you get stuck.
Avatar
About to release my first github project, any do and donts? Put the MIT License on it.
Avatar
Make sure you’ve got a brief description of what the project does, and a setup and usage guide eg any requirements
👍 1
Avatar
Avatar
OggE
About to release my first github project, any do and donts? Put the MIT License on it.
Andrew Rathbun 8/18/2021 3:58 AM
do: post a link to it. don't: not post a link to it
💯 7
Avatar
Does anyone have any links to .eml files with malicious attachments they could share? Unable to find any examples on our incident reporting system, and need to test some internal tools… Google isn’t helping
Avatar
Given the changing security environment in Afghanistan, Pakistan is playing this as a win for them and a loss for India. Is this impacting anyone's operations with remote staff/operations Pakistan/India? For those of you not impacted by this but have insights, I'd love hear any thoughts you may have on this impacting remote operations and staff in those regions.
Avatar
Avatar
Andrew Rathbun
do: post a link to it. don't: not post a link to it
its private for now, just afraid of other ppl to see it 😛
Avatar
Avatar
Matt
Does anyone have any links to .eml files with malicious attachments they could share? Unable to find any examples on our incident reporting system, and need to test some internal tools… Google isn’t helping
I haven't explored it further, but I believe you'll find other examples on the same site: https://www.malware-traffic-analysis.net/2020/05/12/index.html
Avatar
Avatar
OggE
its private for now, just afraid of other ppl to see it 😛
Gotta take the plunge! 😛
👍 1
Avatar
Avatar
cermmik
I haven't explored it further, but I believe you'll find other examples on the same site: https://www.malware-traffic-analysis.net/2020/05/12/index.html
That's great, thanks
👍 1
Avatar
Avatar
OggE
About to release my first github project, any do and donts? Put the MIT License on it.
DeeFIR 🇦🇺 8/18/2021 3:26 PM
Even if one other person finds it useful, it’s worth it. Don’t downplay your hard work 👏🏼
💯 2
Avatar
thanks guys 😄
10:56 PM
its now live, #roastme
10:56 PM
snapchat parser. Contribute to Ogg3/CheckArroyo development by creating an account on GitHub.
👍 8
Avatar
chrisforensic 8/18/2021 11:57 PM
good morning @MSAB short question... is it possible to extract a hashlist (MD5) as textfile out of your "MSAB Known Data lib v003.bin" ? maybe to use with other forensic tools ? oxygen has this option to export there known filelist (edited)
Avatar
Good morning @chrisforensic, no this is not something we currently support. The file is meant for use in XAMN and we do not really have any way of exporting the hashes inside.
👍 1
Avatar
chrisforensic 8/19/2021 12:01 AM
Avatar
@Magnet Forensics Anyone available for a query about AXIOM, to do with if a feature is supported.
Avatar
thatboy_leo 8/19/2021 8:38 AM
How much do you guys recommend private sector charge clients to retain data on hard drives
8:39 AM
We have a few hard drives that I was thinking of making a monthly cost to retain, if they can’t pay we can give them the data to hold, or if they request we can destroy the data
Avatar
We're looking at building a password cracking server (I'm leaning toward Hashcat). Obviously GPUs are hard to come by right now but we have a couple spare ones we can use until prices come down. Does anybody know of a front end for hashcat? I really like the looks of Hashview but it doesn't appear to have been updated for 3 years. Ideally multiple users could add jobs to a queue. Besides these questions, does anybody have any other recommendations?
Avatar
I believe Hashtopolis is a good frontend, plus it allows workloads to be distributed if you have additional cracking rigs
10:52 AM
Paging @chick3nman as he knows infinitely more than me 🙂
Avatar
Hello, what do we need?
10:55 AM
oh i see
10:55 AM
yeah, probably your best bet for on-prem hardware is Hashtopolis
10:56 AM
That said, queuing jobs may not be ideal in all scenarios so you should expect Someone to have to run a job manually at some point
Avatar
Oh look at that theres a Hashcat person here! nice! Alright, hashtopolis it is! Here's another question. One of the servers we have (which i might run an instance of hashcat on) is Windows server. Its running another thing but it rarely gets used, so to cut costs we thought we might crack passwords in the mean time. Can I run hashtopolis on another server and have it connect to the windows version of hashcat? The only time I've ever used hashcat is on a desktop workstation, so the brain and server stuff is brand new to me.
11:03 AM
@chick3nman
Avatar
Yeah
11:04 AM
You don't really need hashcat brain, most people dont need it
11:05 AM
but hashtopolis is a server that will connect to any client you want (edited)
11:05 AM
it has a local agent component that controls hashcat on the computing device
11:05 AM
and its OS agnostic, written in python
11:05 AM
so windows wont be a problem
Avatar
Thats what I gathered. Good to know. How much resources does the hashtopolis server require? I see that it says "your MySQL server is configured with performance in mind" but what does this mean? Is this referring to high IO storage, more ram, or fast CPU, etc.
11:10 AM
Just referring to the server, not the agents.
11:11 AM
Im gonna create a thread and we can continue there. I haven't used these yet. (edited)
Avatar
Hey, so I missed an important uni assignment due to being ill with meningitis, it put me out of action for a long time, I was wondering if anyone had any advice on how I should go about getting this done
1:01 PM
I have only used the older versions of EnCase, and they were always incredibly clunky, so I am unsure on how to move forward because we have not had access to the new encase due to the campus being closed for covid
Avatar
Avatar
DenisM
I have only used the older versions of EnCase, and they were always incredibly clunky, so I am unsure on how to move forward because we have not had access to the new encase due to the campus being closed for covid
Andrew Rathbun 8/19/2021 1:02 PM
Throw it through Autopsy?
Avatar
for some reason my course only uses axium and encase, the assignment is about the concepts needed for using encase v20, rather than actually performing an examination with an image
1:04 PM
the changes between the old version of encase vs v20 are where i'm stumbling up
Avatar
Andrew Rathbun 8/19/2021 1:04 PM
That's very unfortunate that this assignment is tool-specific
this 2
Avatar
Yeah, the lecturer is quite old school and insists that autopsy being open source is not recognised well by the courts and is not as established as the commercial tools
😢 1
Avatar
Avatar
DenisM
Yeah, the lecturer is quite old school and insists that autopsy being open source is not recognised well by the courts and is not as established as the commercial tools
Andrew Rathbun 8/19/2021 2:07 PM
sigh
Avatar
Luckily I only need 12 marks out of 100 cause I'm already at a high enough percentage from everything else
Avatar
Avatar
Andrew Rathbun
sigh
Deleted User 8/19/2021 2:08 PM
Second that sigh.
Avatar
Andrew Rathbun 8/19/2021 2:08 PM
@Brian Carrier I'm sure would love to read this 🙂
Avatar
Avatar
DenisM
Luckily I only need 12 marks out of 100 cause I'm already at a high enough percentage from everything else
Andrew Rathbun 8/19/2021 2:09 PM
I'd do bare minimum on it, personally, or just do it how you WANT and hope you get those 12 marks 🙂
2:10 PM
I once had it where I had a 114% going into a final exam. I answered a few questions and maybe got like 20% on the final and ended up with a 98% in the class
2:11 PM
So does every other tool ^
Avatar
But you don't know what file type can be relevant Oo
2:12 PM
Surely any and all file types can be possibly relevant
Avatar
Andrew Rathbun 8/19/2021 2:12 PM
"it depends"
😆 2
Avatar
Your lecturer needs a reality check 😂
💯 1
Avatar
Andrew Rathbun 8/19/2021 2:14 PM
I would 100% do the exam how I wanted if I didn't need to ace this assignment lol
😂 1
Avatar
Either way, I think you can download the latest Encase from their website but from experience their website is a literal maze.
☝️ 1
Avatar
Andrew Rathbun 8/19/2021 2:15 PM
You can then have a nice war story to tell 10 years from now like me where you did something renegade like that but still owned the class in the end, AND you probably learned more actionable skills by doing it your own way lol
🤘 1
Avatar
Avatar
Rob
Either way, I think you can download the latest Encase from their website but from experience their website is a literal maze.
Andrew Rathbun 8/19/2021 2:15 PM
It's been a few years for me (thankfully) but man I got dizzy in there a few times. Especially right around the OpenText acquisition
Avatar
I remember a colleague managed to find it once
2:16 PM
Then didn't remember where it was located on their website to download it again
Avatar
Andrew Rathbun 8/19/2021 2:18 PM
Yeah... @randomaccess has the best EnCase related quote: "I solved all my EnCase problems by learning to use other tools"
😆 1
Avatar
The fact you have Encase is fair enough for a possibly underfunded course.
2:18 PM
Could have easily been forced to use Autopsy if money was tight.
Avatar
I don't think encase is used that much anymore except in schools
Avatar
Andrew Rathbun 8/19/2021 2:22 PM
Plenty of them here to verify one way or another!
2:24 PM
It may have been well used during his time but I think a lot of agencies have moved on. EnCase was hardly touched for like 2 years straight a few years ago and then all of a sudden they changed their versioning to v20 or whatever. I think that's when it got injected with some life but I have no clue where it stands right now. All I know is back in 2016 EnCase wasn't able to find an entire deleted partition full of CSAM whereas X-Ways was when pointing them both at the same image. Ever since then, I pretty much stopped using EnCase (edited)
Avatar
^ I think thats why my supervisor changed tools for us.
2:25 PM
That was before my time though so idk
Avatar
Andrew Rathbun 8/19/2021 2:25 PM
After the OpenText acquisition, it seemed like EnCase was forgotten about. It was hardly updated and other tools were lapping it (edited)
2:29 PM
Download link: Microsoft has made the official Windows 11 ISO images (version 21H2 aka October 2021 update) available now. Read on WinCentral
Avatar
Digitalferret 8/19/2021 2:55 PM
@DenisMnot sure of how it is now, but yrs back it was apparent that uni's were hamming together DF courses, with whatever lecturers they could find and using "stocking fillers" to make up the rest of the content. i found this out as the CEO and owner of a student forensic site (in which i was a mod) had to explain to uni's that unless graduates could work the gear that did the job, they couldn't earn money. Uni's were very out of step with that process it would seem. eventually some started buying in Encase/Access for rudimentary training. students were being told that industry would be "lapping it up" for them as managers, but the grim reality was they'd likely need to spend a few extra thousand getting a qual from the s/w suppliers too
2:57 PM
i checked it myself at a uni up here (north uk) and it was true. large part of the course was s/w code based. the dude said i'd be expected to be able to create something like my own hex editor
2:58 PM
a mate that signed up nearly failed as he was expected to be able to create stuff to 3d model a room, sat, for a forensic (physical) examination
2:59 PM
^ same. 30 above NCL 🙂
2:59 PM
yep
3:00 PM
last time i was there, it was so rough even Rotties walked round in two's for safety 🙂 Redhouses or smthn
3:01 PM
yup. i can believe it
3:02 PM
mate put his veedub camper outside mates house. same night we had police cars, copters and more all over the estate. some scallies had taken a sierra cossie and put it on the field as a bonfire. mate was asleep in his camper w/ a bottle of calor gas ouside 🙂
3:03 PM
anyhows, lol, shi**ing up the channel with "barrens chat" 🙂
🤣 2
3:04 PM
yep, thats on topic, there was something in the news recently about that. some chief ripping up an agreement about prioritising. google "police +tosh" i think.
3:05 PM
underfunded, overworked.
Avatar
Understaffed too
this 2
Avatar
Original message was deleted or could not be loaded.
Now I know you're from the UK lol
WatchingYou 1
Avatar
Original message was deleted or could not be loaded.
bugger you had it here too
Avatar
Good thing he's in the less populated north, gives you a much higher chance of finding him 😂
Avatar
Digitalferret 8/19/2021 3:50 PM
hadawayanshiteyee, yal neerguess wheramfrom liek
Avatar
Avatar
Andrew Rathbun
It may have been well used during his time but I think a lot of agencies have moved on. EnCase was hardly touched for like 2 years straight a few years ago and then all of a sudden they changed their versioning to v20 or whatever. I think that's when it got injected with some life but I have no clue where it stands right now. All I know is back in 2016 EnCase wasn't able to find an entire deleted partition full of CSAM whereas X-Ways was when pointing them both at the same image. Ever since then, I pretty much stopped using EnCase (edited)
I'd say the injection of life its has has made it viable again
Avatar
BritishBulldog 8/20/2021 1:39 AM
Does anyone here have any documentation/research papers around \Root\data\kik.android\cache\ (Android)? Especially sub folders such as profpics, contentpics, chatPicsBig, chatVids etc?
Avatar
I've had good experiences with smbclient - I believe the mget command will provide the functionality you would want ie get with a specific filename
Avatar
Good day all. Is there per chance a dedicated channel re prepping for court/expert testimony. Tips and guidance for forensic examiners undergoing a baptism by fire.
🔥 2
Avatar
Avatar
theridlr
Good day all. Is there per chance a dedicated channel re prepping for court/expert testimony. Tips and guidance for forensic examiners undergoing a baptism by fire.
We do not have a dedicated channel for this. I think this channel would probably be the most appropriate.
Avatar
Avatar
Jobbins
We do not have a dedicated channel for this. I think this channel would probably be the most appropriate.
Thanks @Jobbins. I have an upcoming trial (my first) later this year. I plan to know my report like the back of my hand. Aside from extensive familiarity with my report and my ability to explain forensic jargon, artifacts etc in a non technical way, are there other key things I should be bearing in mind (ask for questions to be repeated to ensure I take time to think of the questions being posed, yes ma’am, no ma’am)?
Avatar
Avatar
theridlr
Thanks @Jobbins. I have an upcoming trial (my first) later this year. I plan to know my report like the back of my hand. Aside from extensive familiarity with my report and my ability to explain forensic jargon, artifacts etc in a non technical way, are there other key things I should be bearing in mind (ask for questions to be repeated to ensure I take time to think of the questions being posed, yes ma’am, no ma’am)?
The Demon-Haunted World: Science as a Candle in the Dark
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony as an Expert Technical Witness
Avatar
Avatar
Arsenal
If you only invest in two books (I'm referring to the time to read and digest), here are the two... https://www.amazon.com/Demon-Haunted-World-Science-Candle-Dark/dp/0345409469 and https://www.amazon.com/Guide-Forensic-Testimony-Presenting-Technical/dp/0201752794
Interesting. Thank you. I'll definitely be grabbing my lemonade and reading!
Avatar
Avatar
theridlr
Thanks @Jobbins. I have an upcoming trial (my first) later this year. I plan to know my report like the back of my hand. Aside from extensive familiarity with my report and my ability to explain forensic jargon, artifacts etc in a non technical way, are there other key things I should be bearing in mind (ask for questions to be repeated to ensure I take time to think of the questions being posed, yes ma’am, no ma’am)?
Andrew Rathbun 8/20/2021 7:51 AM
If you can't remember the details, ask if you can refresh your recollection and refer to your report.
Avatar
Hello, Can anyone help me with MEGA NZ application forensics on Windows and MAC OS ?
Avatar
Avatar
h4ck3L
Hello, Can anyone help me with MEGA NZ application forensics on Windows and MAC OS ?
Andrew Rathbun 8/20/2021 10:50 AM
What have you tried so far and how has that not gotten you where you want to be?
Avatar
Avatar
Andrew Rathbun
What have you tried so far and how has that not gotten you where you want to be?
I'm successful in extracting the file names and their timestamps but only when they are in default location. I'm unable to find the SYNC Folder location if changed by the USER
Avatar
chrisforensic 8/20/2021 9:27 PM
good morning @Cellebrite is there any update of the BSSID database (last version 15 was released january) available?
Avatar
Good question let me see
Avatar
Avatar
CLB-Paul
Good question let me see
chrisforensic 8/20/2021 10:55 PM
thanks ! any update available?
Avatar
as far as I got it’s the latest one available.
Avatar
Avatar
Andrew Rathbun
If you can't remember the details, ask if you can refresh your recollection and refer to your report.
Thanks Andrew. Tip noted! Is there particular language that I should try to avoid? (The logs indicate, it would appear, etc) Or should I stick to yes/no and definitive responses as is applicable?
Avatar
If anything, say only stuff you know you can be certain
10:40 AM
Don't sound as if you aren't sure
10:41 AM
So I would just say the timestamp reported was X etc.
10:41 AM
Go off the facts.
10:42 AM
If you say it would appear, then you're opening yourself to be ripped apart.
💯 2
10:43 AM
That being said, the above is more relevant for UK. I don't know how any foreign courts work but can't imagine its much difference
Avatar
Digitalferret 8/21/2021 10:50 AM
as per Rob^ short definitive statements & a demeanour bordering on phlegmatic (a tendency to uninvolvement, even in highly emotive cases) especially if you testify in person. similarly, in person, don't be drawn into the trap of filling in the silences left by the questioner. effectively MicDrop unless asked to expand.
10:53 AM
you might also consider keeping a copy back for yourself, with a wide margin (or verbose appendix), to add your own aide memoire: useful if a long period of time has elapsed before you hear/see the case again.
👍 1
Avatar
Andrew Rathbun 8/21/2021 11:32 AM
Less is more. The more you talk and babble, the more you may say something stupid or go down an irrelevant rabbit hole. Only answer questions you're asked. Sometimes it's on purpose for very short and succinct questions to be asked. Don't assume you know where the Prosecutor or defense attorney is going. Short and sweet, to the point, and less is more. If you underanswer and they want more out of you, they'll ask clarifying questions. The prosecutor is like a puppet master and you're the puppet. Just answer what they ask and nothing more. If you're not doing what they want they'll ask questions to get you on track. They're trying to tell a narrative via the Socratic method, effectively, to the jury.
👍 3
Avatar
Are non-LE DFIR folks getting put in front of courts? e.g. employee generating artifacts/disks at request of LE, or for legal teams (civil suits)? (edited)
Avatar
Avatar
rayeh
Are non-LE DFIR folks getting put in front of courts? e.g. employee generating artifacts/disks at request of LE, or for legal teams (civil suits)? (edited)
Digitalferret 8/21/2021 2:31 PM
non LE here (uk) and have been to court, on behalf of an employer, to present evidence of computer use by an employee. not sure how often that is the case though.
2:32 PM
painful experience of what Andy/Rob mentioned. Points etched into my soul after 🙂
Avatar
F, thanks
Avatar
Thank you all @Andrew Rathbun @Digitalferret @Rob. These are helpful tips that I will bear in mind.
👍 1
Avatar
Avatar
theridlr
Thanks @Jobbins. I have an upcoming trial (my first) later this year. I plan to know my report like the back of my hand. Aside from extensive familiarity with my report and my ability to explain forensic jargon, artifacts etc in a non technical way, are there other key things I should be bearing in mind (ask for questions to be repeated to ensure I take time to think of the questions being posed, yes ma’am, no ma’am)?
Have you had a defense interview yet? Does the prosecutor have any inklings as to what their plan of attack is?
Avatar
Avatar
whee30
Have you had a defense interview yet? Does the prosecutor have any inklings as to what their plan of attack is?
No interview just yet. I want to be proactive and ensure that piece is done or at least I am aware of what to expect
Avatar
Sure - if you do get that interview, ask them for a printed copy when they transcribe it. Then you can go over the sorts of Qs they were asking you.
Avatar
Avatar
whee30
Sure - if you do get that interview, ask them for a printed copy when they transcribe it. Then you can go over the sorts of Qs they were asking you.
Thanks @whee30 !
Avatar
Avatar
Rob
If you say it would appear, then you're opening yourself to be ripped apart.
I get this concept but also it's important to be careful with certainties when a lot of things simply can't be stated to that degree. Doing this can also open you up to being ripped apart by the defence/defence expert, especially if you are forced to back track on something in front of the jury.
👍 1
Avatar
Avatar
bizzlyg
I get this concept but also it's important to be careful with certainties when a lot of things simply can't be stated to that degree. Doing this can also open you up to being ripped apart by the defence/defence expert, especially if you are forced to back track on something in front of the jury.
Digitalferret 8/23/2021 1:23 AM
i think it's about limiting what you do say to that which can be supported by evidence and not simply conjecture
👍 1
Avatar
Avatar
Digitalferret
i think it's about limiting what you do say to that which can be supported by evidence and not simply conjecture
yeah I agree. Defence teams love to try and get you in a cycle or providing yes/no or short definitive statements and before you know it you are in a world of pain 😄 (edited)
1:49 AM
I only gave evidence a handful of times (UK), mostly went fine, one time however defence team ambushed me with a report about a tomtom (yes, this was like 10 years ago almost) produced by someone else, which I didn't even know existed. Trying to make me comment on someone else's work, nightmare.
Avatar
Hello all - anyone have any good ediscovery company recommendations? For e-discovery of 5TB of data to review PII information etc
Avatar
Avatar
Salvatore
Hello all - anyone have any good ediscovery company recommendations? For e-discovery of 5TB of data to review PII information etc
👍 1
Avatar
Avatar
bizzlyg
yeah I agree. Defence teams love to try and get you in a cycle or providing yes/no or short definitive statements and before you know it you are in a world of pain 😄 (edited)
Digitalferret 8/23/2021 8:09 AM
yep, been there. Opposition playing you like Harry Corbett did Sooty (if ur old enough to remember 🙂 )
😂 1
Avatar
Hi. I'm currently looking for a system to manage cases and the evidences, to enforce or hint on procedures and finally to generate some sort of report. Thx
Avatar
Hey, i just got into my first job(yay) and i got ask to testing an EDR, so if someone has experiences or idea, it would help me a lot =D. Thank you for reading me
Avatar
rodeo_squirrel 8/23/2021 12:00 PM
Does anyone know generally what leads to O365 Update operation events in the audit log?
Avatar
Hey everyone, im doing a cyber bootcamp, and was beginner to cyber about 6 months ago, and am looking to getting a bachelors degree, but am interested in being an analyst down the road and get into DFIR ive been looking at a few schools, and seen some different bachelor of science degrees in cybersecurity, computer science, cybersecurity and information assurance, cyber and digtical forensics, computer forensics analytics and information security, that are offered online by accredited universities. I was wondering if anyone had some advice or experience in differences and what may be good for what im wanting to do. (edited)
Avatar
Avatar
JINXED
Hey everyone, im doing a cyber bootcamp, and was beginner to cyber about 6 months ago, and am looking to getting a bachelors degree, but am interested in being an analyst down the road and get into DFIR ive been looking at a few schools, and seen some different bachelor of science degrees in cybersecurity, computer science, cybersecurity and information assurance, cyber and digtical forensics, computer forensics analytics and information security, that are offered online by accredited universities. I was wondering if anyone had some advice or experience in differences and what may be good for what im wanting to do. (edited)
Digitalferret 8/23/2021 1:53 PM
maybe drop that in #training-education-employment too
Avatar
Avatar
Digitalferret
maybe drop that in #training-education-employment too
didnt see that channel, will do!
Avatar
Swift Arrow 8/24/2021 5:46 AM
Hey everyone. Just wanted to say hi. I took digital forensics as a minor at UTSA in texas a couple years back but i ultimately took a job that continued my analyst experience from the US military without using the classes. But i found this discord and thought i’d check it out
💯 4
👍 2
Avatar
Does anyone have a warrant template they wouldn't mind sharing for Square Inc.?
Avatar
Avatar
Paul1775
Does anyone have a warrant template they wouldn't mind sharing for Square Inc.?
Andrew Rathbun 8/24/2021 7:04 AM
If one gets shared, then maybe we can start a working repo on GitHub of Warrant Templates. Please ping me if one exists and we can sanitize and centralize
Avatar
Avatar
Andrew Rathbun
If one gets shared, then maybe we can start a working repo on GitHub of Warrant Templates. Please ping me if one exists and we can sanitize and centralize
Great Idea. Will do!
Avatar
Avatar
Paul1775
Great Idea. Will do!
Andrew Rathbun 8/24/2021 7:08 AM
https://github.com/Digital-Forensics-Discord-Server/LawEnforcementResources this is live but currently empty. If anyone in LE wants to be a lead on something collaborative like this, please ping me and I'll get you set up
Resources provided by the community that can serve to be useful for Law Enforcement worldwide - GitHub - Digital-Forensics-Discord-Server/LawEnforcementResources: Resources provided by the communit...
7:09 AM
Also, if this interests someone in LE and they don't know how to use GitHub, I will teach you.
Avatar
Avatar
Andrew Rathbun
https://github.com/Digital-Forensics-Discord-Server/LawEnforcementResources this is live but currently empty. If anyone in LE wants to be a lead on something collaborative like this, please ping me and I'll get you set up
I can't head this up but have multiple warrant templates we use that I'm happy to share. How do I upload them?
Avatar
Avatar
Paul1775
I can't head this up but have multiple warrant templates we use that I'm happy to share. How do I upload them?
Andrew Rathbun 8/24/2021 7:24 AM
you can just DM them to me and I'll do that part of it
7:24 AM
if you want credit, please advise how you'd like to be referred to as, but totally optional on that part
Avatar
Okay, I don't need credit. Happy to share the info.
👍 2
Avatar
Anyone have suggestions for unzipping a RAR file that contains a password? 7zip isn’t working
8:57 AM
Could be the password though but figured I’d ask before I lose my mind.
Avatar
@Matt 7zip is usually my go to program, you can try Winzip trial and see if it does the same thing.
Avatar
Avatar
Matt
Anyone have suggestions for unzipping a RAR file that contains a password? 7zip isn’t working
Deleted User 8/24/2021 10:29 AM
unrar package on Linux, Keka on OSX works great otherwise fire it into rar2john and try John The Ripper on it.
Avatar
Avatar
Matt
Anyone have suggestions for unzipping a RAR file that contains a password? 7zip isn’t working
Digitalferret 8/24/2021 12:33 PM
as per others suggestions, but what OS and CLI or GUI have you? i've found CLI paste function in linux to sometimes be flaky depending on the un/rar program. also the file manager in Linux tends not to like unzipping passworded files. For Windows, make sure you have the most up-to-date Winrar if you give that a go. also watch out for partial/corrupt files. i also seem to remember that sometimes it will tell you it requires a pass when it doesn't bc it's corrupt. only other thing: make sure the file isn't being held by some other program; in which case try a file unlocker. (edited)
Avatar
Calling any scripting folks. I have 65 top directories with similiar names that count up by one, e.g. Folder1,Folder2,Folder3. There is a folder under each of those the type folders with the same name, call it "stuff". In each "stuff" folder is the actual data I would like to copy into another folder. These folders do have a folder structure I would like to maintain. Each of these folders may have other folders that have the same name, in which case I want to add files into the directories. Anyone have ideas for a script that goes down to directory levels, copies the data and places/adds data to another location? Google is not helping. Thank you!
Avatar
Hey all, I'm currently working in IR and looking to upgrade my monitors. I spend most of my time in emails, writing reports and reviewing logs. I have been looking at going with an ultrawide monitor setup with maybe one other additional screen. My current setup is two horizontal (24" Acer and the Dell 15" XPS laptop) and one vertical (24" BenQ). What are others working with and what do you like/not like about your setup?
Avatar
Avatar
Mig
Calling any scripting folks. I have 65 top directories with similiar names that count up by one, e.g. Folder1,Folder2,Folder3. There is a folder under each of those the type folders with the same name, call it "stuff". In each "stuff" folder is the actual data I would like to copy into another folder. These folders do have a folder structure I would like to maintain. Each of these folders may have other folders that have the same name, in which case I want to add files into the directories. Anyone have ideas for a script that goes down to directory levels, copies the data and places/adds data to another location? Google is not helping. Thank you!
Andrew Rathbun 8/25/2021 2:24 AM
Copy one or multiple files to many folders.
2:25 AM
Also directory opus would make very quick work of this. Go to your top directory, activate flat view, select those stuff folders, copy to clipboard, paste to wherever and choose to recreate directories. I do that all the time and it takes but a few seconds
Avatar
Thank you for the suggestions. I will give them a try!
Avatar
Hey command line nerds, I'm looking for a powershell / command prompt script syntax to add a network location to "This PC". I don't want a network drive. I've found some online resources to create a network link file, but thats not what I'm looking for. Anybody know?
Avatar
Avatar
Cole
Hey command line nerds, I'm looking for a powershell / command prompt script syntax to add a network location to "This PC". I don't want a network drive. I've found some online resources to create a network link file, but thats not what I'm looking for. Anybody know?
Andrew Rathbun 8/25/2021 4:45 PM
Add-NetworkLocation might be the cmdlet you need
4:46 PM
Recently I have run into the issue of users potentially having over 26 Mapped network drives...yes I know poor folder management I just do what i'm told.... However I noticed th...
4:46 PM
top answer
Avatar
Morning! Is anyone aware of or has anyone ever compiled a checklist of possible indicators (that can be checked with manual inspection or non-invasive techniques) to show when/if a mobile device has been either jailbroken or rooted? I am thinking of things like - check for cydia, query with ADB commands etc, but wondered if there was a more complete/definitive list? (edited)
Avatar
Hi all, Has anybody looked at a GPS tracker like the one on the pictures? It has a micro-SIM card slot and a mini-USB port. I can't see the actual board as I'm afraid of damaging the battery that sits right on top. When powered on and connected to a PC, the tracker is recognized as an "Other Device" by Windows. As it is not recognized as mass storage, I haven't had luck in getting any data from it. Would you have any other tips, besides ISP/chip-off? Thank you in advance!
Avatar
Hello All, somebody here has experience with forensics on modern cars and their digital equipments? I think it will be a core task for crimes investigation and their solution in the future, as it is now for smartphones. Any experience?
3:08 AM
I'm sorry, I've seen right now that there the dedicated channel #vehicle-forensics
Avatar
Anyone here can assist with autopsy on Mac OS X and how to allow the solr service to access a NAS shared folder. Receiving errors regarding core creation. Works fine storing to local drive and external ssd but not to NAS. Thnx.
Avatar
ShadowTruth 8/26/2021 8:29 AM
Out of curiosity, how does everyone record key steps and evidence identified during their forensic investigations thus making it easier for when writing the Forensic/Intel report? Do you use Excel/OneNote or even a speciality tool?
Avatar
Personally I use Monolith notes to help keep me organized as I go along.
👍 1
8:40 AM
They have a paid version, but I've just used their free option so far.
Avatar
Avatar
norbs.ac
Personally I use Monolith notes to help keep me organized as I go along.
ShadowTruth 8/26/2021 8:50 AM
Thanks! I'll have a look into this 🙂
Avatar
Avatar
ShadowTruth
Out of curiosity, how does everyone record key steps and evidence identified during their forensic investigations thus making it easier for when writing the Forensic/Intel report? Do you use Excel/OneNote or even a speciality tool?
By policy, we have to write chronological case notes. Probably some better ways to do it, but another idea. We use MS Word. Every day gets its own heading.
👍 1
8:58 AM
Additionally, we have worksheets for every physical evidence item that we fill out identifying information (e.g. serial number)
Avatar
Avatar
Cole
By policy, we have to write chronological case notes. Probably some better ways to do it, but another idea. We use MS Word. Every day gets its own heading.
ShadowTruth 8/26/2021 9:00 AM
That's another great idea, thanks!
Avatar
@spadart sent you a PM
Avatar
Hello good, a question. In windows we can create partitions and put files in that partition. A program for this is VeraCrypt, which creates virtual partitions After that we can simply delete the disk partition. How could this be detected?
Avatar
sanity check, if I wanted to timeline windows login activity for the past month, would it be sufficient to focus on the Windows Security Event IDs login (4624) and logoff (4647)or do other sources contain more information?
11:27 AM
context: a potential hack over a month ago with leaked credentials
Avatar
Avatar
Fierry
sanity check, if I wanted to timeline windows login activity for the past month, would it be sufficient to focus on the Windows Security Event IDs login (4624) and logoff (4647)or do other sources contain more information?
Andrew Rathbun 8/26/2021 11:35 AM
Definitely check RDP, as well. 21, 24, 25 from TS-LSM. 1102 will show outbound RDP from a system. 4624 type 10 will be RDP as well. 4778/79 are good ones, too, sometimes you see threat actor workstation names bleed through in these events
this 4
Windows10C 3
Avatar
good call, thanks 🙂
👍 1
Avatar
Avatar
Andrew Rathbun
Definitely check RDP, as well. 21, 24, 25 from TS-LSM. 1102 will show outbound RDP from a system. 4624 type 10 will be RDP as well. 4778/79 are good ones, too, sometimes you see threat actor workstation names bleed through in these events
Pretty sure people have spent thousands on training just to learn this info right here.
💯 2
Avatar
Avatar
conf1ck3r
Pretty sure people have spent thousands on training just to learn this info right here.
randomaccess 8/26/2021 9:52 PM
heh not sure why if it's just that - that's all on the SANS blue and red posters that are free 🙂
😂 1
✅ 1
Avatar
I'm looking to pick some brains about a personal NAS setup i have. I've got a primary synology NAS and an underused TrueNAS build. I'm wondering about ideas to use them both. I'll start a thread on this.
Avatar
Avatar
Cole
I'm looking to pick some brains about a personal NAS setup i have. I've got a primary synology NAS and an underused TrueNAS build. I'm wondering about ideas to use them both. I'll start a thread on this.
CHIA farming. 😬
4:59 PM
I actually did that for awhile but it wasn't actually going to be worth the cost
Avatar
@spadart I only see one pic without any marking or brands. IME you can get great info from the provider that tracks the tracker data. Because what good is a good tracker if you can’t check the info real time on some server?
6:56 PM
Are there pics beyond the first once that would make ID any easier?
Avatar
Avatar
conf1ck3r
Pretty sure people have spent thousands on training just to learn this info right here.
randomaccess 8/28/2021 5:12 AM
Made this a while back, might also help https://t.co/0e9f4N0Ftg
👍 1
👀 1
Avatar
Andrew Rathbun 8/28/2021 5:17 AM
@Cyb3rSn0rlax nice work on that
Avatar
Avatar
Andrew Rathbun
@Cyb3rSn0rlax nice work on that
Cyb3rSn0rlax 8/28/2021 5:19 AM
Thanks 🙏
5:21 AM
Full pdf versions on github. The mindmap needs some further reviews according to each windows version but it has the general ideas https://github.com/H1L021/RDP-NLA
RDP usage artifacts with and without NLA enabled. Contribute to H1L021/RDP-NLA development by creating an account on GitHub.
Avatar
Avatar
Cyb3rSn0rlax
Full pdf versions on github. The mindmap needs some further reviews according to each windows version but it has the general ideas https://github.com/H1L021/RDP-NLA
Andrew Rathbun 8/28/2021 5:21 AM
What are you using for mindmapping?
Avatar
Cyb3rSn0rlax 8/28/2021 5:22 AM
For this one i used draw.io Whimsical and minmanager are also greag alternatives
Avatar
Andrew Rathbun 8/28/2021 5:23 AM
If you're able to open source the mindmap file, others could import into XMind (what I'm using currently) or another MindMap tool to expand upon. I've long thought about starting a DFIR MindMap project which would open source the files themselves so the community could build upon them
Avatar
Avatar
Andrew Rathbun
If you're able to open source the mindmap file, others could import into XMind (what I'm using currently) or another MindMap tool to expand upon. I've long thought about starting a DFIR MindMap project which would open source the files themselves so the community could build upon them
Cyb3rSn0rlax 8/28/2021 5:24 AM
I would love to but this was not made with a mindmap tool just drawing one
👍 1
5:28 AM
Greag idea btw visual learners like me prefer mindmaps so it would be great addition to the community
👍 1
Avatar
Avatar
Cyb3rSn0rlax
Greag idea btw visual learners like me prefer mindmaps so it would be great addition to the community
Andrew Rathbun 8/28/2021 5:30 AM
I have one for KapeTriage ready to add, so we can start with that? I can get one going
Avatar
Avatar
Andrew Rathbun
I have one for KapeTriage ready to add, so we can start with that? I can get one going
Cyb3rSn0rlax 8/28/2021 5:35 AM
Would be awsome
Avatar
Avatar
Cyb3rSn0rlax
Would be awsome
Andrew Rathbun 8/28/2021 5:36 AM
alright standby, let me get it going
💙 1
Avatar
Avatar
Andrew Rathbun
alright standby, let me get it going
Andrew Rathbun 8/28/2021 5:40 AM
Contribute to rathbuna/DFIRMindMaps development by creating an account on GitHub.
💙 1
5:44 AM
Just added my KapeTriage one. I'll work on an !EZParser one later today
5:44 AM
.xmind file should be able to be imported into other tools, it's a pretty common format (edited)
5:47 AM
https://github.com/rathbuna/DFIRMindMaps/tree/main/KAPE/KapeTriage Added a readme as a template for others that get added. I think there's a nice benefit to have the current .PNG there so people see what it looks like along with the source file so people can improve upon it
Contribute to rathbuna/DFIRMindMaps development by creating an account on GitHub.
Avatar
Andrew Rathbun 8/28/2021 6:18 AM
Contribute to rathbuna/DFIRMindMaps development by creating an account on GitHub.
Avatar
Avatar
Andrew Rathbun
https://github.com/rathbuna/DFIRMindMaps/tree/main/KAPE/KapeTriage Added a readme as a template for others that get added. I think there's a nice benefit to have the current .PNG there so people see what it looks like along with the source file so people can improve upon it
Cyb3rSn0rlax 8/28/2021 6:25 AM
Great effort and work Andrew Will help and contribute
Avatar
Avatar
Cyb3rSn0rlax
Great effort and work Andrew Will help and contribute
Andrew Rathbun 8/28/2021 6:26 AM
Thank you! I will work on some MindMaps as I study for the GCIH so that's also part of my motivation for doing this, as well
Avatar
Avatar
Andrew Rathbun
Thank you! I will work on some MindMaps as I study for the GCIH so that's also part of my motivation for doing this, as well
Cyb3rSn0rlax 8/28/2021 6:27 AM
Thank you for starting this
6:27 AM
And good luck
👍 1
Avatar
Andrew Rathbun 8/28/2021 2:21 PM
@Cyb3rSn0rlax https://github.com/rathbuna/DFIRMindMaps/tree/main/NetworkTools/tcpdump rough draft of tcpdump is now up, definitely not a final version
A repository of DFIR-related Mind Maps geared towards the visual learners! - DFIRMindMaps/NetworkTools/tcpdump at main · rathbuna/DFIRMindMaps
👍 1
Avatar
Avatar
Andrew Rathbun
@Cyb3rSn0rlax https://github.com/rathbuna/DFIRMindMaps/tree/main/NetworkTools/tcpdump rough draft of tcpdump is now up, definitely not a final version
Cyb3rSn0rlax 8/28/2021 2:22 PM
I am making an RDP DFIR mindmap
2:22 PM
should that be in a separate folder different than tools ?
Avatar
Andrew Rathbun 8/28/2021 2:23 PM
@Cyb3rSn0rlax if you want I can create a DFIR MindMaps channel in the DFIR Community Room and we can continue to collaborate there?
Avatar
Avatar
Andrew Rathbun
@Cyb3rSn0rlax if you want I can create a DFIR MindMaps channel in the DFIR Community Room and we can continue to collaborate there?
Cyb3rSn0rlax 8/28/2021 2:23 PM
great idea
👍 1
Avatar
hey all - anyone particularly good at X-Ways? One of the new features says that i can parse .evtx logs into a .tsv file. I was hoping to understand where exactly the .tsv files are then stored, or placed, for me to look at?
Avatar
Avatar
Salvatore
hey all - anyone particularly good at X-Ways? One of the new features says that i can parse .evtx logs into a .tsv file. I was hoping to understand where exactly the .tsv files are then stored, or placed, for me to look at?
Andrew Rathbun 8/28/2021 5:18 PM
I can poke around on Monday and see if I can help with this but in true X-Ways fashion I'm sure it's not a straightforward process. I think they implemented something similar to Eric's Maps so I'm curious myself to see their take on event log parsing
👍 1
5:19 PM
X-Ways Forensics can extract specific data from the event payload in .evtx event logs and list them directly in the event list. This makes working with event logs much more powerful, as it allows to quickly filter for usernames, IP addresses from log-in or RDP events, task or service names, PowerShell commands, etc. There is a tab-separated definition file "Event Log Events.txt" in the installation directory that contains a list of event IDs, (optional) log provider and the list of individual data fields to extract. The definition file can be adjusted to your own requirements. The events in an .evtx file are output in a TSV table.That table contains the complete payload of each event. It is ideally viewed in MS Excel or similar applications.
Avatar
randomaccess 8/28/2021 5:22 PM
i would guess it's in the case folder, but generally i havent found xways useful for event log examinations - that being said, my experience with it for event logs has been when looking in the timeline feature and its generally vague in its descriptions of events
👍 1
Avatar
I checked the case folder, but ill check once more, and run greedy mode refine volume snapshot
Avatar
Deleted User 8/29/2021 8:03 AM
hey, does anyone have the invite to the Magnet Forensics Discord server?
8:04 AM
Can you please dm me?
Avatar
Avatar
Deleted User
hey, does anyone have the invite to the Magnet Forensics Discord server?
Andrew Rathbun 8/29/2021 8:43 AM
The Magnet Forensics Discord Server will give you the opportunity to speak with each other as well as speakers after the conclusion of their talks.
Avatar
hi guys, i have started to learn how to use autopsy and volatility from CTFs and tutorials but never in real life. Recently i thought it would be a great opportunity to practice on an old samsung table i have that its screen doesnt work and just try to get something out of it. My question is should i use volatility or autopsy (or sth else) for such job
Avatar
Avatar
vaghoul
hi guys, i have started to learn how to use autopsy and volatility from CTFs and tutorials but never in real life. Recently i thought it would be a great opportunity to practice on an old samsung table i have that its screen doesnt work and just try to get something out of it. My question is should i use volatility or autopsy (or sth else) for such job
randomaccess 8/29/2021 3:49 PM
if the screen doesnt work youre going to be battling uphill for entry level mobile forensics unfortunately. so you may want to try replace the screen and then you can take an ADB backup (manually or use the free tools by belkasoft or magnet) and examine that
Avatar
ok thnx
Avatar
@vaghoul don’t dismiss the idea though. ADB is a command line interface where you can interact with an android device and navigate the file system etc. it’s definitely fun to play with and learn some of the commands. Reminded me of my first time wandering through Linux
Avatar
The problem here would be to enable and pair adb at that state, but it depends on the phone. Once you do that, you can use scrcpy to view the screen over adb as on a working phone
Avatar
Avatar
whee30
@vaghoul don’t dismiss the idea though. ADB is a command line interface where you can interact with an android device and navigate the file system etc. it’s definitely fun to play with and learn some of the commands. Reminded me of my first time wandering through Linux
Second this, knowing adb is very useful, I've had to use it a few times in the past
Avatar
Avatar
Arcain
The problem here would be to enable and pair adb at that state, but it depends on the phone. Once you do that, you can use scrcpy to view the screen over adb as on a working phone
I have never heard of scrcpy. Looks very useful, thanks for sharing!
Avatar
Anyone else getting "this system needs 9.5.X of XRY" when trying to update to the new micro release? 9.5.0 is installed and working.
Avatar
Avatar
whee30
@vaghoul don’t dismiss the idea though. ADB is a command line interface where you can interact with an android device and navigate the file system etc. it’s definitely fun to play with and learn some of the commands. Reminded me of my first time wandering through Linux
i have seen some tutorials about ADB and im ready to test this out. At first i was thinking i would want to use sth like autopsy to access the data but from the tutorials i have seen ADB is worth trying. Thanks for the tip
Avatar
Avatar
Arcain
The problem here would be to enable and pair adb at that state, but it depends on the phone. Once you do that, you can use scrcpy to view the screen over adb as on a working phone
The scrcpy idea really helped me with the screen situation (i was in a dead end)😂 . Thanks
Avatar
@OggE Sounds like 9.5 may not be perfectly installed, check in Control Panel that both MSAB XRY x64 and MSAB XRY Extraction Platform are on 9.050. If not, uninstall both, restart your PC, install 9.5 and then run 9.5.1. Feel free to DM me if you have any further issues! (edited)
Avatar
Avatar
Erumaro
@OggE Sounds like 9.5 may not be perfectly installed, check in Control Panel that both MSAB XRY x64 and MSAB XRY Extraction Platform are on 9.050. If not, uninstall both, restart your PC, install 9.5 and then run 9.5.1. Feel free to DM me if you have any further issues! (edited)
will try, thanks 😄
Avatar
Avatar
Erumaro
@OggE Sounds like 9.5 may not be perfectly installed, check in Control Panel that both MSAB XRY x64 and MSAB XRY Extraction Platform are on 9.050. If not, uninstall both, restart your PC, install 9.5 and then run 9.5.1. Feel free to DM me if you have any further issues! (edited)
MSAB XRY x64 was 9.040, time to uninstall
Salute 1
Avatar
Avatar
OggE
MSAB XRY x64 was 9.040, time to uninstall
That would explain why, uninstall that and then run the 9.5 installer again and you should hopefully have more luck!
Avatar
Anyone familiar with crack OSX
12:26 PM
Or xforce
Avatar
what do you mean exactly with "crack OSX", @maddie ?
Avatar
@maddie Do you mean pirated software for OSX type of crack ?
Avatar
Hi guys, Can anyone give me any ideas for Machine Learning based projects in Digital forensics ? It would be really helpful for me doing a mini project on any such ideas
Avatar
Avatar
maddie
Anyone familiar with crack OSX
I really don't think you should be doing crack man 🤣
Avatar
Avatar
Rob
If anything, say only stuff you know you can be certain
I would add to this, it's okay to say "I don't know" and "I'm sorry, but I am not the right person to answer that question".
👍 1
Avatar
elizavetabelkasoft 8/31/2021 6:35 AM
Sneak peek of Belkasoft X v.1.10! Watch the video: Irene and Yuri are brute-forcing passcodes for iOS devices with the help of Belkasoft X🔥🔥🔥 Irene works with an iPhone while Yuri cracks an iPad. Who will be quicker to find the correct unlock code? That's the intrigue! https://www.youtube.com/watch?v=CYiGtpccwKk (edited)
👏🏼 2
Avatar
Deleted User 8/31/2021 7:37 AM
Looking for some advice. I was doxxing myself and found a website with a list of emails including mine in a "leaked" txt file. The website is full of files that indicate that they are most likely a hacking group (folders with dates of leaks, cracked software, hacking software, porn). I did some investigating and managed to find other websites created by the group. I went to report them to actionfraud but it says they don't deal with cybercrime if it's outside the UK. Any advice on who to report them to? (edited)
Avatar
chrisforensic 8/31/2021 7:37 AM
hmmm... on latest ios ? don´t think so....
Avatar
Avatar
ryd3v
I really don't think you should be doing crack man 🤣
I was being serious but ok thanks for nothing
Avatar
Avatar
DCSO
@maddie Do you mean pirated software for OSX type of crack ?
I wish I even knew I’m looking at an image and that’s was the beginning the file structure says
Avatar
Avatar
Deleted User
Looking for some advice. I was doxxing myself and found a website with a list of emails including mine in a "leaked" txt file. The website is full of files that indicate that they are most likely a hacking group (folders with dates of leaks, cracked software, hacking software, porn). I did some investigating and managed to find other websites created by the group. I went to report them to actionfraud but it says they don't deal with cybercrime if it's outside the UK. Any advice on who to report them to? (edited)
DFIRDetective 8/31/2021 8:11 AM
Avatar
Avatar
Deleted User
Looking for some advice. I was doxxing myself and found a website with a list of emails including mine in a "leaked" txt file. The website is full of files that indicate that they are most likely a hacking group (folders with dates of leaks, cracked software, hacking software, porn). I did some investigating and managed to find other websites created by the group. I went to report them to actionfraud but it says they don't deal with cybercrime if it's outside the UK. Any advice on who to report them to? (edited)
Depends on who controls the domain I suppose, you might get the pages shut down.
Avatar
Avatar
DFIRDetective
Deleted User 8/31/2021 8:53 AM
Thank You, I've reported them.
Avatar
Avatar
CCC
Depends on who controls the domain I suppose, you might get the pages shut down.
Deleted User 8/31/2021 8:58 AM
Yes, I was going to report them to whoever gave them the domain but then I realised they would just get new domain and start over as they had previous ones before.
Avatar
Avatar
Deleted User
Yes, I was going to report them to whoever gave them the domain but then I realised they would just get new domain and start over as they had previous ones before.
Deleted User 8/31/2021 9:14 AM
Options are a takedown request from an attorney with focus on how the content either infringes your rights or causes harm to your person. It’s a roll of the dice though. Another option is same takedown request to the sites service provider. Option 3 - poison the address (change the account owners name, use it to register on a bunch of sites you would never normally use, post it in pastebins with gibberish data) and then create a new address. (edited)
Avatar
Avatar
maddie
I wish I even knew I’m looking at an image and that’s was the beginning the file structure says
Maybe the image was previously encrypted and it was "cracked" can you access the image? Your question was pretty vague , OSX is free if you have access to a Mac, so there is no cracked OSX, it's not like Microsoft where you need an activation key right (edited)
Avatar
Avatar
Deleted User
Options are a takedown request from an attorney with focus on how the content either infringes your rights or causes harm to your person. It’s a roll of the dice though. Another option is same takedown request to the sites service provider. Option 3 - poison the address (change the account owners name, use it to register on a bunch of sites you would never normally use, post it in pastebins with gibberish data) and then create a new address. (edited)
Deleted User 8/31/2021 9:58 AM
Thanks for the advice, I've reported them to Internet Crime Complaint Center.
👍 1
Avatar
Avatar
maddie
I was being serious but ok thanks for nothing
xforce could be a keygen software used to crack various paid programs, or another application, chances are it's a keygen software
Avatar
Anyone had success reading the logs within MEGA. The file header appears to be US BS NULL
Avatar
Does anyone have any thoughts on optimizing Autopsy? I've been running file type identification (and no other ingest modules) on an image of a 1 TB drive for like a week and its only 18% complete. JVM memory is set to 25 GB (which it is using all of). You can see the CPU and disk usage fluctuating in the task manager so its definitely not frozen, but when you look at the Ingest Progress Snapshot its been trying to identify a file for the past 17 minutes.
Avatar
Looking for input on video recording our examinations. State's Attorney wants us to start recording extractions as another layer of proof that we did not manipulate the evidence. Obviously I can't take my workstation to our interview room and tie that up for days on end. Do we just buy a couple security cameras with SD card storage or is there something more appropriate for this scenario?
Avatar
Avatar
wcso_pete
Looking for input on video recording our examinations. State's Attorney wants us to start recording extractions as another layer of proof that we did not manipulate the evidence. Obviously I can't take my workstation to our interview room and tie that up for days on end. Do we just buy a couple security cameras with SD card storage or is there something more appropriate for this scenario?
Joe Schmoe 9/1/2021 2:43 PM
Wow. That seems like an unreasonable request. Maybe a body camera if your agency has them. If it were me, I would want something I could disable audio with.
Avatar
Avatar
Joe Schmoe
Wow. That seems like an unreasonable request. Maybe a body camera if your agency has them. If it were me, I would want something I could disable audio with.
I think it’s a little crazy too, but they want the entire process from unsealing the evidence bag to extraction completion even though I warned them some computer drives could take days
Avatar
Avatar
wcso_pete
I think it’s a little crazy too, but they want the entire process from unsealing the evidence bag to extraction completion even though I warned them some computer drives could take days
Joe Schmoe 9/1/2021 2:59 PM
The video size will almost be as large as some of the drives.
Avatar
burgers_N_bytes 9/1/2021 7:05 PM
FastStone capture does a good job in regards to screen recording.
Avatar
Avatar
wcso_pete
Looking for input on video recording our examinations. State's Attorney wants us to start recording extractions as another layer of proof that we did not manipulate the evidence. Obviously I can't take my workstation to our interview room and tie that up for days on end. Do we just buy a couple security cameras with SD card storage or is there something more appropriate for this scenario?
Looped recording that uploads to a backup server , onsite, obs or another screen recorder for the on desktop work. You could do it with blink cameras but it would be a bit more labor intense than a professional surveillance camera system (edited)
Avatar
Avatar
wcso_pete
Looking for input on video recording our examinations. State's Attorney wants us to start recording extractions as another layer of proof that we did not manipulate the evidence. Obviously I can't take my workstation to our interview room and tie that up for days on end. Do we just buy a couple security cameras with SD card storage or is there something more appropriate for this scenario?
Surely just verifying the hash is good enough?
10:24 PM
You can't be recording screens for risk of recording csam etc
👆 1
Avatar
Avatar
wcso_pete
I think it’s a little crazy too, but they want the entire process from unsealing the evidence bag to extraction completion even though I warned them some computer drives could take days
To me it would be reasonable to photograph the process. The timestamps on the photographs combined with the forensic tool hashing the extracted data in transit should be enough to prove the examiner did not tamper with the evidence. At the very most you could video record the beginning of the extraction and photograph the rest, but you gotta do what you gotta do.
Avatar
Avatar
Rob
You can't be recording screens for risk of recording csam etc
You could blur the screen on some parts of the process if need be though
Avatar
Avatar
ryd3v
You could blur the screen on some parts of the process if need be though
True, but sounds like they'd be possibly accused of manipulation.
Avatar
Same with time stamped photos, also can be manipulated. I agree though, I don't think it should be recorded at all, unless it's just cctv of the examination room.
11:10 PM
At that point though, if you don't trust chain of evidence, and the people on staff, how can you accept anything 🤔 (edited)
👍 7
11:12 PM
Maybe they watched the line of duty, good show btw xD The season with all the evidence tapering (edited)
EverythingIsReddit 2
Avatar
Avatar
wcso_pete
Looking for input on video recording our examinations. State's Attorney wants us to start recording extractions as another layer of proof that we did not manipulate the evidence. Obviously I can't take my workstation to our interview room and tie that up for days on end. Do we just buy a couple security cameras with SD card storage or is there something more appropriate for this scenario?
Windows? Use gamebar or obs potentially
11:25 PM
Or grab a body worn video
11:25 PM
For me, I photograph the bag sealed, unseal and do the exhibit, make an extraction, reseal and photograph the bag.
Avatar
Is there any powershell guru here in the channel who would like to help me out with an little project. DM for more information 🙂
Avatar
Avatar
CCC
For me, I photograph the bag sealed, unseal and do the exhibit, make an extraction, reseal and photograph the bag.
Yeah, I think anything more than this is definitely going into unreasonable territory
2:57 AM
Never heard of someone asking for the whole thing to be video recorded before, sounds ridic to me (edited)
Avatar
@wcso_pete Just say NO 🙂 thats crazy
💯 1
Avatar
I mean most programs seem to generate a hash, you can record this and note it when copied across but yeah, 'I pressed extract logical and waited'.
Avatar
Avatar
bizzlyg
Yeah, I think anything more than this is definitely going into unreasonable territory
Her whole concern is that a defense attorney is going to tear me apart because we use Autopsy and there isn't a certification for it (that I've found at least). She is one of these people that believes that if you don't have a couple letters after your name and a piece of paper then nobody is going to believe you. I agree that it is a little overkill, but my orders are to do this for now to prove to them I'm not an idiot.
Avatar
TheGhostHunter 9/2/2021 8:40 AM
Hey guys, I’m sure lotta ppl ask this but forgive me if I sound like a broke. Record. What cert/course should I start with to get into forensics ? I have solid cyber foundation, cissp certified and MSc in cyber. Most of my experience is with FWs and networking.
Avatar
@TheGhostHunter Welcome, head over to the training-education channel I think there should be resources for you there and ask this question.
Avatar
Avatar
wcso_pete
Her whole concern is that a defense attorney is going to tear me apart because we use Autopsy and there isn't a certification for it (that I've found at least). She is one of these people that believes that if you don't have a couple letters after your name and a piece of paper then nobody is going to believe you. I agree that it is a little overkill, but my orders are to do this for now to prove to them I'm not an idiot.
Autopsy do their own training, it was free during Covid but costs like $500 normally I think
9:35 AM
It’s not the “letters after your name” kind of training though
Avatar
Avatar
Matt
Autopsy do their own training, it was free during Covid but costs like $500 normally I think
Deleted User 9/2/2021 11:54 AM
If I recall the training is usually free for LE members. You get a cert upon completion.
Avatar
@Deleted User I think your correct, and would be much easier than having to record 24/7
Avatar
@wcso_pete Better yet, tell the States Attorney you will record yourself doing the job if she does the same 😆
😂 3
Avatar
Avatar
wcso_pete
Her whole concern is that a defense attorney is going to tear me apart because we use Autopsy and there isn't a certification for it (that I've found at least). She is one of these people that believes that if you don't have a couple letters after your name and a piece of paper then nobody is going to believe you. I agree that it is a little overkill, but my orders are to do this for now to prove to them I'm not an idiot.
Unoriginal_name 9/2/2021 2:57 PM
The IACIS BCFE class has a scholarship every year for a LEO to attend their training in Orlando. They have the application online.
Avatar
Hi guys, We are in the process of moving into another building and therefore we have the chance to build up our digital forensics lab from scratch. We are currently discussing options of how to control electrostatic discharge in our lab. What are you guys using in your lab? A simple ESD mat for desks and wrist straps or do you guys have a more advanced setup with ESD floor matting, grounding stations, body ESD tester, earth bonding point bars, etc.
Avatar
Avatar
Unoriginal_name
The IACIS BCFE class has a scholarship every year for a LEO to attend their training in Orlando. They have the application online.
I'll definitely look into this. Thanks! I'm waiting to find out if I got into the NCFI BCERT course in October, but I've heard from some of my federal friends that the training centers are closing down again.
Avatar
Avatar
goofycom
Hi guys, We are in the process of moving into another building and therefore we have the chance to build up our digital forensics lab from scratch. We are currently discussing options of how to control electrostatic discharge in our lab. What are you guys using in your lab? A simple ESD mat for desks and wrist straps or do you guys have a more advanced setup with ESD floor matting, grounding stations, body ESD tester, earth bonding point bars, etc.
Digitalferret 9/3/2021 5:58 AM
there's likely to be a ton of hardware options out there, overall's / tools / gloves etc but those would depend on the level of how safe do you need to be (do you regularly have drives and circuit boards in bits, or exposed on a bench top. Do folks need to walk between benches a lot and so forth (heel straps & ESD flooring))?. one thing oft overlooked is that of staff training and accountability: the kit is next to worthless without proper handling procedure and a means to verify your straps/PPE at a local ESD test station and stamping your QC/QA book.
5:58 AM
you might also want to check the plugging in/out of USB devices. they have their own set of issues if not protected, ESD wise.
6:01 AM
on a comical note, my previous work was in a MilSpec lab designing/building/testing radar warning receivers / filters / and the like. The QA guy, a friend, told me the single biggest contribution to ESD safety in the firm was me having my hair cut (think Brian May in his HeyDay) having measured several thousand volts on me noggin 🙂
😂 1
😋 1
Avatar
Can someone refer to me free software that can unlock android devices. The only ones i have found are either not commercial or overpriced or they only work with USB Debugging on
Avatar
burgers_N_bytes 9/3/2021 12:24 PM
Free software that does what you’re asking doesn’t exist.
👆 10
Avatar
Avatar
goofycom
Hi guys, We are in the process of moving into another building and therefore we have the chance to build up our digital forensics lab from scratch. We are currently discussing options of how to control electrostatic discharge in our lab. What are you guys using in your lab? A simple ESD mat for desks and wrist straps or do you guys have a more advanced setup with ESD floor matting, grounding stations, body ESD tester, earth bonding point bars, etc.
At a previous job we used ESD mats with grounding stations, our examinations were mostly limited to retrieving hard drives from desktops/laptops. What are your use cases?
Avatar
Avatar
Fierry
At a previous job we used ESD mats with grounding stations, our examinations were mostly limited to retrieving hard drives from desktops/laptops. What are your use cases?
Thanks @Fierry. We have a similar use case. We are mainly disassemble hard drives from laptop / desktop pc and do JTAGing on various types of smart devices (IoT). We do use ESD mats. Now we consider to invest more in ESD material. On the other hand, we've had almost zero incidents the last 10 years.
Avatar
Avatar
Digitalferret
you might also want to check the plugging in/out of USB devices. they have their own set of issues if not protected, ESD wise.
Thanks @Digitalferret. We do have disassemble parts of laptop / desktop pc lying around on benches and the working tables are shared tables. So there is a bit of walking between tables. But as you said, it should be easy enough that people can follow the procedures, otherwise it's worthless. We are just wondering if using ESD mats on tables is enough for our use case (disassembling HDDs from laptops / pc's) or if we should invest more equipment.
Avatar
Avatar
goofycom
Thanks @Digitalferret. We do have disassemble parts of laptop / desktop pc lying around on benches and the working tables are shared tables. So there is a bit of walking between tables. But as you said, it should be easy enough that people can follow the procedures, otherwise it's worthless. We are just wondering if using ESD mats on tables is enough for our use case (disassembling HDDs from laptops / pc's) or if we should invest more equipment.
Digitalferret 9/6/2021 1:21 AM
Where your device travels between it being acquired, operated on and finally being discharged (groan) will have a bearing on the gear you require. it's my understanding that ESD damage can be small but cumulative; for instance the more a device (in production say, with many different stages) travels the greater the potential (sorry) for damage than if it's a one off job like your bench disassemble/repair/reassemble. the other part of training is rudimentary ESD education such as labels and what they mean and best practices; where to use what and how. For instance, knowing the difference between dissipative or conductive materials and where to apply each? Again, the stages of travel may determine what you required better than a shotgun approach at purchase. from the description you gave, it sounds likely that there's little travel other than between one or two work stations if that. Maybe then start by making a diagram of your work cycle from start to finish and addressing each stage of reception/work/discharge whilst devices are in your care?
👍 1
1:23 AM
even if it only travels a few feet across your work area, between benches say, the benches, the route, and the device should be protected or at least the risk identified and mitigated.
👍 1
1:25 AM
also, are you looking at, or already have, ESD rated tools such as tweezers, drivers, soldering kit? gloves to prevent contamination (conductivity of fingerprints, oils, bench detritus and so on). (edited)
👍 1
Avatar
Hey guys, random question but does your main machines use the exfat file system?
Avatar
Avatar
lala1234
Hey guys, random question but does your main machines use the exfat file system?
Deleted User 9/6/2021 5:53 AM
If I use a Win box I would say its usually NTFS. I believe exfat is designed for flash drives.
Avatar
In my experience exfat is slower than NTFS so I stick with NTFS whenever possible for everyday use.
Avatar
ssaadakhtarr 9/6/2021 7:43 AM
Hello! Anyone know how I can modify the gui of autopsy like changing logo and nav style etc. ?
Avatar
Avatar
Deleted User
If I use a Win box I would say its usually NTFS. I believe exfat is designed for flash drives.
Thank you! 😁
Salute 1
Avatar
Avatar
FullTang
In my experience exfat is slower than NTFS so I stick with NTFS whenever possible for everyday use.
Thank you! 😃
👍 1
Avatar
Echo: Is there a way within Office 365 admin centre to review previous alias assignement? I have an email address that only seems to have ever been an alias. I can see its current assignment but is there a means to determine how long the alias has been in play and whether it was pointed elsewhere prior?
Avatar
Is any mail auditing logging available? Inspecting previous mails could give you a clue
Avatar
In the Microsoft 365 mailbox audit logs for MailItemsAccessed, message-id's are used to identify the e-mails. Beyond using messagetrace to identify the specific e-mail involved (limited to 90 days) or using something like Veaam backup for office365 (limited to searching for one message-id at a time).. is anyone aware of a way to quickly determine properties like the subject or the sender for a couple thousand message-ids?
Avatar
Avatar
lala1234
Hey guys, random question but does your main machines use the exfat file system?
I use exfat on large portable devices when they go between different OSs. Mac can't write to NTFS. I don't think you can boot off exfat either.
2:02 PM
on a side note I wish there was general acceptance of large format file systems. A FAT32 flash drive can be plugged into literally anything and work, but that caps out at 4GB per file. I can't say the same about any other file system.
Avatar
@Cole the number of times I have had to field a "My thumbdrive is empty but it says I don't have enough room" phone call... I just want windows to fess up to what the error really is so that people aren't so confused.
Avatar
Avatar
Bryserker
In the Microsoft 365 mailbox audit logs for MailItemsAccessed, message-id's are used to identify the e-mails. Beyond using messagetrace to identify the specific e-mail involved (limited to 90 days) or using something like Veaam backup for office365 (limited to searching for one message-id at a time).. is anyone aware of a way to quickly determine properties like the subject or the sender for a couple thousand message-ids?
randomaccess 9/7/2021 7:46 PM
I haven't looked into this but I would write a query through edisco as a compliance search for the message IDs. It might not be obvious in the GUI do you'd have to do PowerShell queries. And you'd end up with a big list of the identified emails
Avatar
Avatar
whee30
@Cole the number of times I have had to field a "My thumbdrive is empty but it says I don't have enough room" phone call... I just want windows to fess up to what the error really is so that people aren't so confused.
If we are wishing for Windows fixes, how about file signature analysis instead of relying solely on the extension when determining how to open a file?
😆 1
Avatar
Anyone good at wireshark
Avatar
Avatar
FullTang
If we are wishing for Windows fixes, how about file signature analysis instead of relying solely on the extension when determining how to open a file?
Radical thinking there 😂
😂 1
Avatar
Avatar
John Ksi
Anyone good at wireshark
Andrew Rathbun 9/8/2021 4:25 AM
#network-forensics
Avatar
Avatar
FullTang
If we are wishing for Windows fixes, how about file signature analysis instead of relying solely on the extension when determining how to open a file?
But then I couldn't hide all my illegal files by changing the extension!
🧐 1
6:02 AM
Obviously the computer people won't be able to find it
Avatar
Avatar
whee30
@Cole the number of times I have had to field a "My thumbdrive is empty but it says I don't have enough room" phone call... I just want windows to fess up to what the error really is so that people aren't so confused.
ughh windows. Let's try to make a seamless experience by hiding all errors or other process output because our software never has any issues and if it does they can just call Microsoft to help them or look up an 0x code. Our users totally know that you have to convert the 0x hex code into decimal to actually find the problem.
Avatar
DeepDiveForensics 9/8/2021 8:17 AM
Hello Everyone, Recently I found a unusual thing. I sent a message through Signal from a android device (OS-11) to an iPhone user, they already using Signal but the message delivered into the native imessage application not into the signal. I tested this on two iPhone 5S (OS-12.5.4) and X (OS-14.7.1). Once I opened the signal manually on iPhone the message is not there, it's still showing into the imessage application.
8:17 AM
Is there any probable cause for this unusual behavior or is there any bug in Signal or iOS
Avatar
Avatar
DeepDiveForensics
Is there any probable cause for this unusual behavior or is there any bug in Signal or iOS
RubberDucky 9/8/2021 8:21 AM
I thought there was an option to send to sms when setting up signal, been a long time so maybe I forgot ...
Avatar
DeepDiveForensics 9/8/2021 8:26 AM
Yes, that option is Avaliable for Android, you can set as default messaging application
Avatar
I use to have a PDF and working sheet on the most common swipe patterns but have misplaced it. Does anybody have any recent content ?
Avatar
Does anyone know if an older Google Pixel pattern lock will wipe if to many tries are attempted, right now i'm at 17 and its at 30 seconds each attempt, which is fine with me i can try the most popular ones but worried at say 20 or 30 it wipes ?
Avatar
Avatar
DCSO
I use to have a PDF and working sheet on the most common swipe patterns but have misplaced it. Does anybody have any recent content ?
Andrew Rathbun 9/8/2021 1:20 PM
Let me check the archives
1:20 PM
I will put it on GitHub if its not sensitive in any way
1:21 PM
Here are some Common Lock Pattern which people keep and believe that this will save their phones. But no it won't Compare your Pattern Lock with ones given here and check is your phone really Locked. With tips to select a proper more secure pattern for your mobile Click here and Read to know more
1:21 PM
1:24 PM
Resources provided by the community that can serve to be useful for Law Enforcement worldwide - LawEnforcementResources/CommonLockPatterns.jpg at main · Digital-Forensics-Discord-Server/LawEnforcem...
1:25 PM
Also, if that's not the one you're thinking of, I may have it laying around somewhere and I can look elsewhere, but that's at least a start, even if its from 7 years ago
Avatar
It's weird that this jpg doesn't have more variants of an L type (the short one, like 1478, 1236, 2369 etc) passcode. I found them used quite often in my area (edited)
Avatar
Andrew Rathbun 9/8/2021 1:27 PM
List of all pattern locks possible in numerical order. Also files containing pattern locks of certain length - GitHub - ByteRockstar1996/All-Possible-Pattern-Locks: List of all pattern locks possib...
Avatar
@Andrew Rathbun Thanks Andrew this helps !
Salute 1
Avatar
Andrew Rathbun 9/8/2021 1:31 PM
I will centralize when I have time on the #dfir-open-source-projects LE Resources repo but its here for now 😛
Avatar
@Andrew Rathbun I was hoping Cellebrite would put something together on what they harvest from extractions.
💯 1
Avatar
Does anyone have experience with Apple Airdrop? Our schools are getting airdropped with threats of a school shooting and I’m trying to locate the sending party. Any help or guidance would be appreciated!
Avatar
Avatar
DB
Does anyone have experience with Apple Airdrop? Our schools are getting airdropped with threats of a school shooting and I’m trying to locate the sending party. Any help or guidance would be appreciated!
RubberDucky 9/8/2021 7:50 PM
I found this https://www.magnetforensics.com/resources/following-the-airdrop-breadcrumbs-with-axiom/ Specifically: Additionally AXIOM will provide the sender’s name and the device that initiated the transfer, which can be quite useful if you’re working to identify additional persons of interest for your investigation.
AXIOM will parse the unified log for entries surrounding the use of AirDrop, which can be reviewed on computer & mobile sources.
Avatar
Avatar
DCSO
@Andrew Rathbun I was hoping Cellebrite would put something together on what they harvest from extractions.
I love the idea, but how would cellebrite know? Gone are the days of gatekeeper where the pattern lock was stored in plain text numbers... Cellebrite never really interacts with pattern locks anymore... maybe info from when lockpick worked? If they don't ask for it, then how would they get the info? I've had relatively good luck with the lists that @Andrew Rathbun posted above so I default to them. I would love a more recent and authoritative voice though.
Avatar
Avatar
DB
Does anyone have experience with Apple Airdrop? Our schools are getting airdropped with threats of a school shooting and I’m trying to locate the sending party. Any help or guidance would be appreciated!
have dealt with that very specific issue, what I ended up doing was initiating and dumping unified logs. I was able to determine the airdrop name of the sending device but unless it
9:07 PM
s something specific like "whee30's iPhone", it wasn't super useful. I'm unaware if a paper to Apple could ID an Apple ID through the airdrop info provided by those logs
9:08 PM
I saw this article “ NYC plans to make AirDropping dick pics a crime ” on Friday and it got me thinking. What exactly are the cops going to find if they do an analysis of a device, either the sender or the receiver?  I’ve already done my fair share of analysis when it comes to the Conti
9:09 PM
I used this blog post as a how-to on taking a look. It may not be perfect, but it's a start. The logs you generate this way are pretty massive.
9:09 PM
I hope it helps, it was ultimately a dead end for me but I still learned something along the way
Avatar
AccessInvestigations 9/8/2021 9:13 PM
Hey guys, for the life of me I don't remember where I came across the resource but, there was something (I think it was open source) that allowed an investigator to take a video and break it into its individual frames for analysis, to allow the investigator to search in each frame for items, wording, faces. Does anyone know what I am talking about, or is this something that I totally imagined?
Avatar
Thanks for the info. I received the same article earlier today from a USSS contact. I’ll try looking into the sysdiagnose log of a receiving phone.
Avatar
Avatar
AccessInvestigations
Hey guys, for the life of me I don't remember where I came across the resource but, there was something (I think it was open source) that allowed an investigator to take a video and break it into its individual frames for analysis, to allow the investigator to search in each frame for items, wording, faces. Does anyone know what I am talking about, or is this something that I totally imagined?
Deleted User 9/8/2021 9:30 PM
Tsurugi Linux ships with several OCR tools that can do most of this for you https://tsurugi-linux.org/
Welcome to TSURUGI Linux world a DFIR open source distribution to perform your digital forensics analysis and for educational pourposes
Avatar
Avatar
DB
Does anyone have experience with Apple Airdrop? Our schools are getting airdropped with threats of a school shooting and I’m trying to locate the sending party. Any help or guidance would be appreciated!
Deleted User 9/8/2021 9:40 PM
Running Wigle on an Android device in the area might produce a result in regards to location. Inconspicuous as well because it’s running off a smart phone. Option 2 could be Kismet on a laptop with an external WiFi antennae for range. https://wigle.net/ https://www.kismetwireless.net/
Maps and database of 802.11 wireless networks, with statistics, submitted by wardrivers, netstumblers, and net huggers.
The home of the Kismet wireless sniffer and related projects and documentation.
Avatar
Avatar
AccessInvestigations
Hey guys, for the life of me I don't remember where I came across the resource but, there was something (I think it was open source) that allowed an investigator to take a video and break it into its individual frames for analysis, to allow the investigator to search in each frame for items, wording, faces. Does anyone know what I am talking about, or is this something that I totally imagined?
randomaccess 9/8/2021 9:41 PM
You can use ffmpeg for this
👍 2
9:42 PM
Sidebar if someone wants to automate the collection of the matrix 4 teaser trailers from the internet over a 24 hour period, strip out each frame, deduplicate and recompile into a single video that'd be appreciated :)
😆 2
Avatar
Avatar
randomaccess
You can use ffmpeg for this
AccessInvestigations 9/8/2021 10:18 PM
You know the more I think about this, I am now thinking it was a DF vendor or maybe a whitepaper that was discussing the ability to dissect videos into frames for the software to analyze each frame for exploitation, so an investigator didn't have to spend hours watching videos that may not even be relevant. This obviously would not be an open source tool. I just can't remember where I read or saw that. It gets harder everyday to even remember my name LOL
Avatar
ssaadakhtarr 9/9/2021 5:46 AM
Hello! Can anyone tell me either all iphone versions 3g to 12 have same architecture and file system or not? My team is working on iOS forensics and want to test our autopsy modules on real phones but we don't know if they will work on every iphone or if there is some difference in the file system.
Avatar
Avatar
ssaadakhtarr
Hello! Can anyone tell me either all iphone versions 3g to 12 have same architecture and file system or not? My team is working on iOS forensics and want to test our autopsy modules on real phones but we don't know if they will work on every iphone or if there is some difference in the file system.
Digitalferret 9/9/2021 6:33 AM
maybe #mobile-forensic-decoding #mobile-forensic-extractions
Avatar
heya, does anyone know if its possible to include the file system view in axiom portable cases? thanks
Avatar
@whee30 Good points, I wasn't sure if Cellebrite Premium service would catalog the swipe pattern etc.
Avatar
Avatar
Harry
heya, does anyone know if its possible to include the file system view in axiom portable cases? thanks
Digitalferret 9/9/2021 8:22 AM
not sure if/when they pop in, but chance pinging @Magnet Forensics
👍 1
Avatar
@AccessInvestigations I second FFMPEG open source, tons of You Tube videos out there
👍 1
Avatar
Hello, I've got a bit of an odd question. I've been doing some benchmarking for file recovery. This particular image is of a FAT32 formatted thumb drive. I have deleted a file, whose metadata is still present, and no clusters have been overwritten. I can recover the file without carving using encase or xways, however using autopsy/TSK it seems that only the first cluster is recovered. Is TSK not trying to recover the file based off its size and first cluster?
10:11 AM
My exact command was :
10:11 AM
icat -f fat -r DISK.dd 7
10:12 AM
Or am I using the tool the wrong way?
10:12 AM
(which is most certainly the case)
Avatar
Avatar
Harry
heya, does anyone know if its possible to include the file system view in axiom portable cases? thanks
From experience we always found it was a licence only thing
Avatar
Avatar
Grenadine
Or am I using the tool the wrong way?
What does 'stat' show for that same directory entry? Under sectors...
1:44 PM
'istat' I mean
Avatar
only one is visible, which is expected
1:44 PM
I read the source code and it seems that if the fat parser deems the clusters unfit for recovery it just returns the first cluster
1:45 PM
So my guess is my image hits one of those checks, I'll investigate further tomorrow (edited)
Avatar
Okay...you have piqued my curiosity, so if you find anything, let us know!
Avatar
Will do
Avatar
Avatar
Harry
heya, does anyone know if its possible to include the file system view in axiom portable cases? thanks
randomaccess 9/9/2021 2:24 PM
Need a license for that
Avatar
Ah that’s a shame - cheers all
Avatar
Avatar
Digitalferret
not sure if/when they pop in, but chance pinging @Magnet Forensics
@Harry No their are only select views available in Portable case and by nature File System view is not one of the as portable cases are no longer connected to the evidence files and run instead off of the Database. And thanks for the callout @Digitalferret (edited)
Avatar
Avatar
Grenadine
Hello, I've got a bit of an odd question. I've been doing some benchmarking for file recovery. This particular image is of a FAT32 formatted thumb drive. I have deleted a file, whose metadata is still present, and no clusters have been overwritten. I can recover the file without carving using encase or xways, however using autopsy/TSK it seems that only the first cluster is recovered. Is TSK not trying to recover the file based off its size and first cluster?
@Grenadine There are 6 items in a FAT 32 Directory entry. (1. Created , 2. Accessed, and 3. Written dates and times, 4. Logical size, 5. starting cluster, and 6. filename). The FAT Table only tracks allocation and fragmentation of the files and clusters that data is laid down on. I believe EnCase and XWays uses the starting cluster from the Directory entry if it has not been overwritten and calculates the number of cluster it would take to recover based on the number of bytes per cluster on the drive geometry set forth in the Volume Boot Record. There is a problem that once the FAT Table entry is deleted for a file in a FAT file system Volume it is a guessing game as their is no map to put the file back together. Because Encase and Xways reads the directory entry for the file and knows it is 6 clusters long and its starting cluster it "hypothesizes" the starting cluster laid out in the deleted, but not over written, 32 byte directory entry as well as the following 5 contiguous clusters are the ones to make up the file. If however the file is fragmented or was prior to deletion this is where the hypothesis can go wrong and the recovery not be accurate. I believe Autopsy does not try to hypothesize and instead lets you see the first cluster. In the same scenario using EnCase or Xways imagine the starting cluster is being reused by another file but the directory entry has not yet been overwritten you will get the Ghostbuster symbol and it will state deleted and overwritten in the status of the file. I really hope I did not take you further down the rabbit hole and will glad speak to you on the phone if you like.
💯 4
Avatar
Avatar
Jamey
@Grenadine There are 6 items in a FAT 32 Directory entry. (1. Created , 2. Accessed, and 3. Written dates and times, 4. Logical size, 5. starting cluster, and 6. filename). The FAT Table only tracks allocation and fragmentation of the files and clusters that data is laid down on. I believe EnCase and XWays uses the starting cluster from the Directory entry if it has not been overwritten and calculates the number of cluster it would take to recover based on the number of bytes per cluster on the drive geometry set forth in the Volume Boot Record. There is a problem that once the FAT Table entry is deleted for a file in a FAT file system Volume it is a guessing game as their is no map to put the file back together. Because Encase and Xways reads the directory entry for the file and knows it is 6 clusters long and its starting cluster it "hypothesizes" the starting cluster laid out in the deleted, but not over written, 32 byte directory entry as well as the following 5 contiguous clusters are the ones to make up the file. If however the file is fragmented or was prior to deletion this is where the hypothesis can go wrong and the recovery not be accurate. I believe Autopsy does not try to hypothesize and instead lets you see the first cluster. In the same scenario using EnCase or Xways imagine the starting cluster is being reused by another file but the directory entry has not yet been overwritten you will get the Ghostbuster symbol and it will state deleted and overwritten in the status of the file. I really hope I did not take you further down the rabbit hole and will glad speak to you on the phone if you like.
I know this wasn't my question but this made perfect since to me. Thanks for the explanation!
magnetforensics_alt 1
Avatar
Anyone in the UK know of a company that manages ISO 17025? So for example we pay a company to look after our networks and computers, we are potentially looking to find a company to assist with our ISO 17025 accreditation instead of employing an in-house Quality Manager.
Avatar
Avatar
Majeeko
Anyone in the UK know of a company that manages ISO 17025? So for example we pay a company to look after our networks and computers, we are potentially looking to find a company to assist with our ISO 17025 accreditation instead of employing an in-house Quality Manager.
I know Intaforensics offered consultancy services for 17025 but not a complete management afaik. You could give them a shout still though
Avatar
If you are involved in DFIR in any way and haven't read Kim Zetter's recent Substack article, please do so now - https://zetter.substack.com/p/hacking-team-customer-in-turkey-was
An investigation that weaves a winding tale between police in Ankara who were charged with spying on their own colleagues... and the purchase of Hacking Team's surveillance software.
Salute 2
6:00 AM
In terms of electronic evidence tampering involving the misuse of offensive technologies (particularly those provided exclusively to government users), the canary in the coal mine has long since died. Kim's article exposes some of that to the general public.
Avatar
Avatar
Majeeko
Anyone in the UK know of a company that manages ISO 17025? So for example we pay a company to look after our networks and computers, we are potentially looking to find a company to assist with our ISO 17025 accreditation instead of employing an in-house Quality Manager.
The amount of work you need to achieve accreditation is not really something you can outsource. For it to work properly, there has to be internal investment from your team. You might be able to get advisors as Bizzly suggested, but I highly doubt you will be able to fully outsource this. You will also need more than one post, a QM alone is not going to cut it
Avatar
Avatar
AccessInvestigations
You know the more I think about this, I am now thinking it was a DF vendor or maybe a whitepaper that was discussing the ability to dissect videos into frames for the software to analyze each frame for exploitation, so an investigator didn't have to spend hours watching videos that may not even be relevant. This obviously would not be an open source tool. I just can't remember where I read or saw that. It gets harder everyday to even remember my name LOL
burgers_N_bytes 9/10/2021 10:01 AM
Input Ace may be what your thinking of
Avatar
Avatar
Jamey
@Grenadine There are 6 items in a FAT 32 Directory entry. (1. Created , 2. Accessed, and 3. Written dates and times, 4. Logical size, 5. starting cluster, and 6. filename). The FAT Table only tracks allocation and fragmentation of the files and clusters that data is laid down on. I believe EnCase and XWays uses the starting cluster from the Directory entry if it has not been overwritten and calculates the number of cluster it would take to recover based on the number of bytes per cluster on the drive geometry set forth in the Volume Boot Record. There is a problem that once the FAT Table entry is deleted for a file in a FAT file system Volume it is a guessing game as their is no map to put the file back together. Because Encase and Xways reads the directory entry for the file and knows it is 6 clusters long and its starting cluster it "hypothesizes" the starting cluster laid out in the deleted, but not over written, 32 byte directory entry as well as the following 5 contiguous clusters are the ones to make up the file. If however the file is fragmented or was prior to deletion this is where the hypothesis can go wrong and the recovery not be accurate. I believe Autopsy does not try to hypothesize and instead lets you see the first cluster. In the same scenario using EnCase or Xways imagine the starting cluster is being reused by another file but the directory entry has not yet been overwritten you will get the Ghostbuster symbol and it will state deleted and overwritten in the status of the file. I really hope I did not take you further down the rabbit hole and will glad speak to you on the phone if you like.
The ghostbuster symbol LMAO!! Just a couple days ago my colleagues and I were trying to figure out what that symbol was actually called.
😆 1
Avatar
ssaadakhtarr 9/11/2021 1:44 AM
Has anyone built autopsy from source? I need some help
Avatar
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to invest...
Avatar
Avatar
Matt
ssaadakhtarr 9/11/2021 2:54 AM
I have followed BUILDING.txt file but on step 5 when I'm building autopsy by running 'ant' command it shows build failed error
2:57 AM
I am getting this error
Avatar
Looks like you’re missing some dependencies somehow
Avatar
Avatar
Matt
Looks like you’re missing some dependencies somehow
ssaadakhtarr 9/11/2021 3:09 AM
How to check which ones I am missing?
Avatar
Avatar
Matt
I’m not sure, try following the steps in this file
Avatar
Avatar
ssaadakhtarr
I am getting this error
From the errors it looks like Java is required but isn't installed
7:53 AM
Also why build from source on windows? They release a installer file no?
7:54 AM
Bug Fixes: Fixed connection leak associated with creating OS Accounts Decreased priority of OS Account Content Viewer Misc bound check fixes in TSK
Avatar
Avatar
ryd3v
From the errors it looks like Java is required but isn't installed
ssaadakhtarr 9/11/2021 8:36 AM
I have the required java version installed but still getting this error
Avatar
Avatar
ryd3v
Also why build from source on windows? They release a installer file no?
ssaadakhtarr 9/11/2021 8:37 AM
Actually I am trying to change the ui and develop changes in the autopsy source code thats why I am building it
Avatar
ah I see ok
8:54 AM
well your erros say your missing 2 modules, so track those down and it should be good to go
Avatar
ssaadakhtarr 9/12/2021 3:49 AM
The above errors got resolved and autopsy build was successful but when I'm running 'ant run' command it loads autopsy but then the terminal says build successful and closes the ui
3:49 AM
Avatar
Avatar
ssaadakhtarr
Click to see attachment 🖼️
ssaadakhtarr 9/12/2021 3:50 AM
It shows this loading screen then it disappears. Anyone know about this issue?
Avatar
Avatar
ssaadakhtarr
It shows this loading screen then it disappears. Anyone know about this issue?
I was going to suggest the Sleuthkit forums, but I see you've already posted there. Are you sure you have all the plugin requirements installed? I've never installed Autopsy on Windows, by the error you're seeing seems to indicate a plugin issue.
Avatar
Avatar
5cary
I was going to suggest the Sleuthkit forums, but I see you've already posted there. Are you sure you have all the plugin requirements installed? I've never installed Autopsy on Windows, by the error you're seeing seems to indicate a plugin issue.
ssaadakhtarr 9/12/2021 7:12 PM
I guess I'll try to redo all the steps maybe I have missed something.
Avatar
Avatar
AccessInvestigations
Hey guys, for the life of me I don't remember where I came across the resource but, there was something (I think it was open source) that allowed an investigator to take a video and break it into its individual frames for analysis, to allow the investigator to search in each frame for items, wording, faces. Does anyone know what I am talking about, or is this something that I totally imagined?
Semantics 21 (Tom) 9/13/2021 2:11 PM
Our LASERi-X tool can do just that but it’s a paid for application. Face, scene, object, age, CSAM, OCR, ANPR, emotion, blurred detection, QR can all be run against frames or images.
Avatar
Andrew Rathbun 9/13/2021 3:00 PM
Magnet Forensics Inc. (“Magnet Forensics”) (TSX:MAGT) a developer of digital investigation software used globally by public safety organizations and e
👀 1
👍 1
3:00 PM
Wow, so Magnet owns DVR Examiner now
Avatar
Avatar
Andrew Rathbun
Wow, so Magnet owns DVR Examiner now
burgers_N_bytes 9/13/2021 3:12 PM
I saw this earlier. It will be interesting to see how/if they integrate directly into Axiom.
Avatar
If I'm looking to get data recovered off an SSD, and want to go to a local place, what kind of places should i look for? keep in mind that I want to find someplace that's local that I can walk into, since the issue im having seems to be related to the ssd failing to communicate properly with whatever system i put it into rather than with the data itself (see https://discord.com/channels/427876741990711298/528318849565589505/886975461891137546) im in australia if it helps to know (edited)
Avatar
randomaccess 9/13/2021 4:29 PM
which part of australia @Waruta
4:30 PM
We've used OnTrack in the past
Avatar
melbourne
Avatar
randomaccess 9/13/2021 4:30 PM
unsure if they have a melbourne presence (edited)
Avatar
im currently looking at technetics https://www.techneticsdata.com.au/ (edited)
Technetics Data Recovery specialises in providing data recovery services. Our expert team performs a wide range of recovery services for a variety of different clients. For professional data recovery Melbourne based & nation-wide services, browse our website or contact us directly and we will be ready to assist you.
Avatar
Does anyone happen to have a contact at Microsoft that could help recover a compromised Microsoft O365 admin account? I've been getting the run around from the support rep who has been handling the case. I've gotten so far as to validate the domain but Microsoft has still refused to give access back.
Avatar
Avatar
Waruta
im currently looking at technetics https://www.techneticsdata.com.au/ (edited)
Digitalferret 9/14/2021 2:19 AM
if you haven't sent already, I've check and filtered a few responses in HDDguru's forum for you. This seems to be the best recent. http://www.elcotronics.com.au/contact.html from http://forum.hddguru.com/viewtopic.php?f=3&t=40251&hilit=australia
2:20 AM
I have known Haque (online) for some years, and he's relatively BS free, compared to some of the usual suspects in there 🙂 (edited)
Avatar
Avatar
Digitalferret
if you haven't sent already, I've check and filtered a few responses in HDDguru's forum for you. This seems to be the best recent. http://www.elcotronics.com.au/contact.html from http://forum.hddguru.com/viewtopic.php?f=3&t=40251&hilit=australia
i probably should've mentioned im in melbourne as well i couldn't find any good places within distance to drop it off physically, but i did find ozdatarecovery which quotes $150
2:31 AM
i'll try the methods in #data-recovery first since i can only mail the drive tomorrow
Avatar
Any advice on what professional associations are worth joining? Especially if any offer any extra training/education resources? Looking to join a couple and any info would be greatly appreciated! Been thinking about HTCIA
Avatar
@Andrew Rathbun I love DME DVR Examiner, they moved to a pay system that tripled in price and a yearly license that shut off after expiring. This prevented us from getting it as $1,500 a year was to much for 2-3 DVR's that we get.
Avatar
Avatar
DCSO
@Andrew Rathbun I love DME DVR Examiner, they moved to a pay system that tripled in price and a yearly license that shut off after expiring. This prevented us from getting it as $1,500 a year was to much for 2-3 DVR's that we get.
Andrew Rathbun 9/14/2021 7:30 AM
I really like the monthly purchase @Arsenal Recon does for use cases like that
Avatar
@Andrew Rathbun I'll take a look, I know there was a pay per use for DVR Examiner but i think it was up to $750 a case.
Avatar
Avatar
DCSO
@Andrew Rathbun I'll take a look, I know there was a pay per use for DVR Examiner but i think it was up to $750 a case.
randomaccess 9/14/2021 3:45 PM
they just got purchased by Magnet - not sure how that may alter things
Avatar
Hallo! Not sure in which channel this would best fit, so let me do it here in general. Is anyone aware of a way to extract data from a partial 7z archive? So in the scenario of downloading a 1GB 7z archive, download fails at 500MB, which leaves you with a 500MB archive.7z.part file. So far, none of the standard archive tools I've tried can do anything with the file.
Avatar
Avatar
jaco
Hallo! Not sure in which channel this would best fit, so let me do it here in general. Is anyone aware of a way to extract data from a partial 7z archive? So in the scenario of downloading a 1GB 7z archive, download fails at 500MB, which leaves you with a 500MB archive.7z.part file. So far, none of the standard archive tools I've tried can do anything with the file.
Digitalferret 9/15/2021 2:08 AM
you could have a look at https://7-zip.org/recover.html see if any of the methods there suit your case. i'd save the original tho and work on a copy; always protect the source.
2:09 AM
involves some hex editor work. maybe give the generic "we can fix your file" programs a miss, some are wildly optimistic
Avatar
Avatar
Digitalferret
involves some hex editor work. maybe give the generic "we can fix your file" programs a miss, some are wildly optimistic
What do you do to your links to make them un-clickable? I have to copy and paste them into my browser to follow them. Is it a security thing?
Avatar
He uses ` around them to mark them as block
3:08 AM
`URL GOES HERE` (edited)
Avatar
Avatar
jaco
Hallo! Not sure in which channel this would best fit, so let me do it here in general. Is anyone aware of a way to extract data from a partial 7z archive? So in the scenario of downloading a 1GB 7z archive, download fails at 500MB, which leaves you with a 500MB archive.7z.part file. So far, none of the standard archive tools I've tried can do anything with the file.
any reason you cant just redownload it
Avatar
Good morning, does anyone happen to know where I can find the verification hashes once Axiom is finished processing a piece of evidence?
Avatar
Avatar
AmNe5iA
What do you do to your links to make them un-clickable? I have to copy and paste them into my browser to follow them. Is it a security thing?
Digitalferret 9/15/2021 4:57 AM
it's a channel courtesy to prevent Discord fetching webpages & images which would clutter the chat, but allows members to copy and paste if interested. As Matt noted you enclose the text with the ` character (the Shifted-key under the Esc button). for multiple lines, such as formatted text / code etc you can use three strung together before and after. (edited)
Avatar
Hello there, just wondering if there are any law enforcement officers from USA who are able to enlighten me on the US Court's rules in terms of admitting digital evidence, and if possible how the court views/opinions on the admissibility of performing live acquisition. And also, if there have been any instances whereby a foreign law enforcement agency officer has ever testified as an expert witness US court. Very much appreciated! 🙏 (edited)
Avatar
Hi! I am trying to snag credentials from a locked Windows pc using P4wnP1 and Responder.py. But unfortunately it is not working. According to Google I think the problem is that there is no local-proxy-config in the DHCP config that sends a wpad.dat file to the victim machine. Now my question is, how do I add a wpad.dat file to the DHCP config in a P4wnP1 machine? The service is started with the command P4wnP1_cli net set server -i usbeth -a 172.16.0.1 -m 255.255.255.248 -o "3:" -o "6:" -r "172.16.0.2|172.16.0.2|5m", so it is not a normal DHCP config file.
Avatar
Avatar
Bushykai
Hello there, just wondering if there are any law enforcement officers from USA who are able to enlighten me on the US Court's rules in terms of admitting digital evidence, and if possible how the court views/opinions on the admissibility of performing live acquisition. And also, if there have been any instances whereby a foreign law enforcement agency officer has ever testified as an expert witness US court. Very much appreciated! 🙏 (edited)
These are important questions that require long answers. Trying to remember from my schooling on these topics to give specific examples. Depends on the state, but generally digital evidence doesn't follow the "Best Evidence" rule (for example, a photocopy of a document would not be considered "Best Evidence", however, the parties can agree that it is admissible and then it isn't an issue). If a party challenged digital evidence as being altered or non-original, then you might have to show exactly where that information resides on the original evidence, rather than a forensic image. Typically forensic images are accepted and it is the collection process that is under scrutiny. Non-traditional acquisition methods (like a live acquisition) can be accepted as accurate but you need to be able to explain what consequences and changes there are for doing so and also why a "dead-box" acquisition wasn't performed. I don't have an answer for the foreign law enforcement testifying in US court but I'm sure its happened.
Avatar
Avatar
Cole
These are important questions that require long answers. Trying to remember from my schooling on these topics to give specific examples. Depends on the state, but generally digital evidence doesn't follow the "Best Evidence" rule (for example, a photocopy of a document would not be considered "Best Evidence", however, the parties can agree that it is admissible and then it isn't an issue). If a party challenged digital evidence as being altered or non-original, then you might have to show exactly where that information resides on the original evidence, rather than a forensic image. Typically forensic images are accepted and it is the collection process that is under scrutiny. Non-traditional acquisition methods (like a live acquisition) can be accepted as accurate but you need to be able to explain what consequences and changes there are for doing so and also why a "dead-box" acquisition wasn't performed. I don't have an answer for the foreign law enforcement testifying in US court but I'm sure its happened.
Thanks alot for your inputs!!
Avatar
Avatar
arnby.
Hi! I am trying to snag credentials from a locked Windows pc using P4wnP1 and Responder.py. But unfortunately it is not working. According to Google I think the problem is that there is no local-proxy-config in the DHCP config that sends a wpad.dat file to the victim machine. Now my question is, how do I add a wpad.dat file to the DHCP config in a P4wnP1 machine? The service is started with the command P4wnP1_cli net set server -i usbeth -a 172.16.0.1 -m 255.255.255.248 -o "3:" -o "6:" -r "172.16.0.2|172.16.0.2|5m", so it is not a normal DHCP config file.
Deleted User 9/15/2021 10:28 AM
Using the P4wnP1 lockpick? Microsoft patched it a while ago so it only works on older versions.
Avatar
ughhhh Axiom crashed due to running out of RAM when it was 99% complete with processing after 30 hours (again). Is there any other way to prevent this other than throwing more RAM at it? I have 112GB of RAM installed right now.
Avatar
(Admins please delete if not allowed) Our CactusCon Call for Papers is OPEN! We are Arizona's premiere (well, only) hacker/security conference! With 1.5k in-person attendance back in 2019 and even more in our digital-only 2020 conference, we're excited to return in February with a hybrid model! Cannot wait to see your blue-, purple-, red-, and other-related submissions!! https://www.cactuscon.com/cfp
Call for Papers
👍 1
Avatar
Avatar
Digitalferret
it's a channel courtesy to prevent Discord fetching webpages & images which would clutter the chat, but allows members to copy and paste if interested. As Matt noted you enclose the text with the ` character (the Shifted-key under the Esc button). for multiple lines, such as formatted text / code etc you can use three strung together before and after. (edited)
you can use <example.com> to make the clickable without them embedding
👍🏻 1
4:41 PM
anyway, im looking at https://ozdatarecovery.com.au/ for a non-mission critical ssd data recovery, but couldn't find much info on them
Most affordable data recovery Service in Melbourne. At OZ Data Recovery Melbourne not only give free quotes but no data no charge option
4:41 PM
any thoughts?
4:42 PM
i've been on the phone with them and so far my only gripe is that they don't do full byte for byte copies, and only copy over the files that are deemed user files and not system/os files, to an ntfs or fat32 partition on another drive
4:43 PM
the drive in question was a raspbian boot drive for a Pi 4
Avatar
randomaccess 9/15/2021 6:47 PM
@Waruta you're probably not going to find a) many Australians on here and b) many that have an opinion about the variety of data recovery shops in Melbourne. Sorry. Overall YMMV with data recovery shops. And I have no idea how to determine if they're going to do a good job. You may be able to ask them to do a full DD, or a full file system copy rather than them going through all of your file (they'll still go through all of your files either way...)
Avatar
Avatar
Deleted User
Using the P4wnP1 lockpick? Microsoft patched it a while ago so it only works on older versions.
No, I added Responder.py to the P4wnP1 and using that. I like the P4wnP1 system and want to use it as a base. If I can't get it working there are other options. Thing is dat Responder need that local-proxy-config and I can't find how to add that to the usbeth DCHP settings.
Avatar
Avatar
arnby.
No, I added Responder.py to the P4wnP1 and using that. I like the P4wnP1 system and want to use it as a base. If I can't get it working there are other options. Thing is dat Responder need that local-proxy-config and I can't find how to add that to the usbeth DCHP settings.
Deleted User 9/16/2021 12:44 AM
Tried editing the Master Template? (I assume you are using P4wnP1 A.L.O.A.) Should be able to add your wpad.dat file from there I reckon.
Avatar
Avatar
Waruta
i've been on the phone with them and so far my only gripe is that they don't do full byte for byte copies, and only copy over the files that are deemed user files and not system/os files, to an ntfs or fat32 partition on another drive
Digitalferret 9/16/2021 2:10 AM
they don't do full byte for byte copies did they say why?
Avatar
Avatar
Digitalferret
they don't do full byte for byte copies did they say why?
from what i heard over the phone its because not every file or part of the filesystem is guarranteed to be intact
2:27 AM
it could also just a case of them not understanding im an advanced user
Avatar
Morning everyone. Has anyone ever had any dealings with downloading/extracting data from OCULUS QUEST VR headsets? My questions are as follows: Is it even possible?/can you extract data from the headsets? What kind of data does the OCULUS store? If data can be extracted, what tools were used? What tool was used to decode the data? Any help would be appreciated.
Avatar
Avatar
Waruta
it could also just a case of them not understanding im an advanced user
Digitalferret 9/16/2021 2:40 AM
yep, might be they see little value in collecting anything other than what they can directly access.
Avatar
i kind of find it odd how that ssd failed anyway
2:42 AM
it's a datacentre one that's at 99% remaining life
Avatar
Avatar
blake-ee
Morning everyone. Has anyone ever had any dealings with downloading/extracting data from OCULUS QUEST VR headsets? My questions are as follows: Is it even possible?/can you extract data from the headsets? What kind of data does the OCULUS store? If data can be extracted, what tools were used? What tool was used to decode the data? Any help would be appreciated.
Digitalferret 9/16/2021 2:42 AM
no idea but i'm intrigued as to what you guys are looking for. has "that sort of material" gone VR?
Avatar
and it dies while being used as a boot drive for an rpi (edited)
2:43 AM
granted i did use it for plotting proof-of-space crypto before, but the drive should still built to handle heavy workloads like that
Avatar
Avatar
Waruta
and it dies while being used as a boot drive for an rpi (edited)
Digitalferret 9/16/2021 2:43 AM
from the brief trawl i've seen on the forums, some are saying it was the OS that screwed things over. but there's a lot of clutching at straws, with no real hard evidence, nor any repeatable solutions. folks individual problem seems to be particular to themselves and not to others
Avatar
never really heard of an os screwing up a drive that it won't even be recognised as a disk, firmware corruption maybe?
Avatar
Digitalferret 9/16/2021 2:47 AM
maybe. i still get "witchcraft" cases, a la "Any sufficiently advanced technology is indistinguishable from magic.” 🙂 (edited)
Avatar
to be fair, i have had a few issues keeping the thermals down on that ssd while plotting, which could've shortened it's life
2:48 AM
it just seems a bit odd that it would die during a shutdown while hosting raspbian rather than plotting
Avatar
Digitalferret 9/16/2021 2:49 AM
it probably needs some sort of direct access, non-OS, to check its proper status.
2:49 AM
but
2:50 AM
in similar vein, Win can leave drives un-mountable elsewhere
Avatar
i have had that issue before
2:51 AM
a thumbdrive that shows up as a usb-drive that's never ready on one system, while working flawlessly on another
2:52 AM
it shows up fine when i boot into linux and access it from the latter system, heck i can even boot from that thumbdrive into a live environment (edited)
Avatar
Digitalferret 9/16/2021 2:52 AM
if i recall right it's a windows hybrid shutdown issue on some. use Shift-Shutdown to force a full, not a hybrid
Avatar
Digitalferret 9/16/2021 2:53 AM
else it's left as marked "Active"
Avatar
well anyway, i've mailed the ssd to the recovery shop i mentioned earlier, along with an identical drive to copy the results to
2:54 AM
hopefully they can tell me what part of the drive died
2:55 AM
i did open it up before to see if there was maybe a piece of metal shorting out the pcb, but found nothing
2:55 AM
i noticed that the only thermal pad on the ssd was the one on what i assume to be the controller (edited)
Avatar
Digitalferret 9/16/2021 3:05 AM
the other thing to remember is that there are some wholly disreputable businesses out there. the good seem to be those that were "enthusiasts turned pro" and don't have a shark like business approach. the other end is run by "bean counters" and will do anything and everything based on client stats to extract the maximum possible amount for the minimum amount of work. they will bait with cheap offers and then sting with the real price and a "assessment fee" which inlines clients to drop into the sunk-cost fallacy. they also tend to be the most guarded when it comes to giving the client good info. Of course this is a huge generalisation. (edited)
3:07 AM
but there have been cases where reputable Co's have found sabotaged chips when clients have "taken it elsewhere, after a bad experience ie "if we aren't doing it for you, no-one else is" which is dispicable (edited)
Avatar
Avatar
Waruta
hopefully they can tell me what part of the drive died
Digitalferret 9/16/2021 3:08 AM
let me know. you might get the "oh, the technician report doesn't say" if you're being dealt with by Reception / non-tech staff
3:09 AM
which is a coverall for "can't say or won't say"
Avatar
Avatar
Waruta
i did open it up before to see if there was maybe a piece of metal shorting out the pcb, but found nothing
Digitalferret 9/16/2021 3:11 AM
i'm sure you know, but, don't ever do that with spinning disc type of drives. any evidence of "lid off" attracts a significant price increase. a reputable lab i use will add 100GBP if the lid has been off.
Avatar
yeah i would never open up a hdd like that
3:11 AM
as for the reputability
3:12 AM
the data on there isn't valuable enough that i'm willing to look for another more expensive option
Avatar
Digitalferret 9/16/2021 3:12 AM
another, a client here, had "lid off" bc the local PC shop said it wasn't recoverable. he's an Engy (not DR) so took a look. it came to me wrapped in tin foil and was beyond anything (edited)
Avatar
Avatar
Waruta
the data on there isn't valuable enough that i'm willing to look for another more expensive option
Digitalferret 9/16/2021 3:12 AM
yeh, it's always the balance
Avatar
so i figured i'd take my chances with oz-dr. according to their website they're a team of 9 to 11 people
Avatar
Digitalferret 9/16/2021 3:14 AM
that sounds reasonable for a small/medium, but website claims can be what ...uuuh, optimistic 🙂 (edited)
Avatar
we'll see i guess
3:14 AM
if it turns out to be a scam, then i guess i'll be the first one to leave a review for them
Avatar
Digitalferret 9/16/2021 3:15 AM
yeh 🙂 i'll paste the next, just for entertainment, in prv. i think "proper business" has been done in main chan, save clagging the place up
Avatar
in addition to calling authorities i guess
Avatar
Digitalferret 9/16/2021 3:15 AM
lol, aye
Avatar
Wondering if anyone uses a program to automatically hash files transferred to a server. I have a server which holds my evidence images but I am trying to streamline the process of having to hash them once they are onto the server. I am wondering if anyone is using a program which will hash the files put onto a specific volume, folder, or server.
Avatar
hey i have an audio file and i wanna check if it's edited is that possible ?
Avatar
Avatar
Player V
hey i have an audio file and i wanna check if it's edited is that possible ?
Digitalferret 9/16/2021 3:06 PM
for free you could have a look at Audacity, otherwise there's the professional gear
Avatar
Avatar
Player V
hey i have an audio file and i wanna check if it's edited is that possible ?
Yes. Absolutely possible. Problem is that there aren’t any tools where you can put in a file and get a simple yes/no answer. Tools will will give results but interpreting them is another story…
💯 3
Avatar
Digitalferret 9/16/2021 3:07 PM
then there's the examiners "interpretation" skills to consider
👍 1
Avatar
Avatar
Brandon E
Yes. Absolutely possible. Problem is that there aren’t any tools where you can put in a file and get a simple yes/no answer. Tools will will give results but interpreting them is another story…
yea np wanna check if two audios are merged into one file
Avatar
Avatar
Player V
yea np wanna check if two audios are merged into one file
Digitalferret 9/16/2021 3:09 PM
grab Audacity then maybe simulate your own to see what "merged" looks like
Avatar
okk thx i'll check that
Avatar
Avatar
Ghosted
Wondering if anyone uses a program to automatically hash files transferred to a server. I have a server which holds my evidence images but I am trying to streamline the process of having to hash them once they are onto the server. I am wondering if anyone is using a program which will hash the files put onto a specific volume, folder, or server.
DeeFIR 🇦🇺 9/16/2021 3:16 PM
Have you considered TeraCopy?
Avatar
Avatar
Player V
yea np wanna check if two audios are merged into one file
When you say “merged” do you mean one file was inserted after another to make it seem as one? That is called a “butt-splice” if you want to search or read up on it. Can be detected. I would recommend starting with https://drive.google.com/file/d/1dcmOt-8Evyhf3E9iU_b1C4aNbANVsCcx/view?usp=drivesdk for some background.
Avatar
Avatar
Brandon E
When you say “merged” do you mean one file was inserted after another to make it seem as one? That is called a “butt-splice” if you want to search or read up on it. Can be detected. I would recommend starting with https://drive.google.com/file/d/1dcmOt-8Evyhf3E9iU_b1C4aNbANVsCcx/view?usp=drivesdk for some background.
mean inserted in top of it like playing voice at the same time of playing another
Avatar
Avatar
Player V
mean inserted in top of it like playing voice at the same time of playing another
Ahh sorry that is something entirely different and would probably be more in lone with “device identification” in that doc. But at least I got to use the term “butt-splice” today…
😁 4
Avatar
Avatar
Brandon E
Ahh sorry that is something entirely different and would probably be more in lone with “device identification” in that doc. But at least I got to use the term “butt-splice” today…
lol yep thx for helping anyway
3:23 PM
am saving this doc for future looks interesting
Avatar
Hello to all, I am analyzing the internet data consumption in 2016 on an iphone 4s. I see that all these processes consume a lot of 2G/3G data. Do you know if these processes are related to Apple's services or if they are user actions? Thanks for your answers.
Avatar
@DeeFIR 🇦🇺 going to check it out today. Thanks
Avatar
Avatar
Ghosted
Wondering if anyone uses a program to automatically hash files transferred to a server. I have a server which holds my evidence images but I am trying to streamline the process of having to hash them once they are onto the server. I am wondering if anyone is using a program which will hash the files put onto a specific volume, folder, or server.
RapicCRC
Avatar
MrMacca (Allan Mc) 9/17/2021 4:17 AM
Teracopy would do it if you are copying to the server. It would chekc the source and then compare it to the destination file. You would have to manually click to save the final hash however.
👍 1
Avatar
Hello. If I’m asking in the wrong room, please redirect. I’m reading the Brian Carrier book and I see a lot of references to dd images, xxd and the mmls tool. I’d like to get some real data to look through and start to understand some of the file system layouts and Hex output. Is there somewhere I can get ‘fake’ dd images from to learn with ?
Avatar
Avatar
CloudyT
Hello. If I’m asking in the wrong room, please redirect. I’m reading the Brian Carrier book and I see a lot of references to dd images, xxd and the mmls tool. I’d like to get some real data to look through and start to understand some of the file system layouts and Hex output. Is there somewhere I can get ‘fake’ dd images from to learn with ?
Andrew Rathbun 9/17/2021 10:27 AM
Avatar
Ahh. I see. It looks like http://dftt.sourceforge.net/ would be closer to what I'm familiar with. I'm comfortable with the command line but new to this . Where would a beginner start ?
Avatar
a "dd" image is really just a block by block copy
10:47 AM
are you more interested in windows, or linux systems?
10:49 AM
looking for CTF challenges is a good place to find some
Avatar
Well. I'm trying to learn Win, Linux, and BSD.
10:49 AM
I'm studying the book and I'm on the BSD partition chapter now.
Avatar
another option is to spin up small VMs and generate images from those
10:50 AM
virtualbox is free, microsoft offers free development VMs
Avatar
I thought about the VM thing but I figured that would be too big on an image.
10:50 AM
I have virtual box and Proxmox
Avatar
probably in the 30-40gb range is more than enough
10:51 AM
linux/bsd much less
Avatar
Tell me more about the CTF challenges. I'm only familiar with them on the ethical hacking community.
Avatar
they're not as common as the exploit/web categories for ctf events, but they're frequent enough that an event will offer volatile memory challenges, or disk images with a challenge to find x,y,z for the challenge
10:53 AM
and often there will be write-ups available from teams who competed, giving a path if you are stuck
Avatar
Oooh. Cool.
10:54 AM
Volatile memory = RAM ?
Avatar
https://ctftime.org/writeups searching can be a bit awkward, as a lot of other things get put in the forensics category at these events too
Capture The Flag, CTF teams, CTF ratings, CTF archive, CTF writeups
10:54 AM
yep
10:54 AM
so using volatility or other tools
10:55 AM
https://cfreds.nist.gov/ this is actually new to me
10:55 AM
but might be what you want
Avatar
Wow. There is a lot here. The book I'm reading seems dated. Is this the best way to learn ? Grab data, throw it in a VM and start digging around with tools ?
Avatar
Avatar
CloudyT
Wow. There is a lot here. The book I'm reading seems dated. Is this the best way to learn ? Grab data, throw it in a VM and start digging around with tools ?
@T.F. If you're referring to File System Forensic Analysis, it is a very dated book but still very relevant. The majority of the concepts still apply and once you get a grip on the way file systems allocate data and manage files you'll be well on your way to understanding file system analysis. Forensics as a whole is much more than that (application layer forensics is a whole 'nother beast). If you want to try the tools in Carrier's book (you mentioned mmls and xxd), I'd like to suggest giving the guide at https://linuxleo.com a try. It covers basic linux and Brian Carrier's Sleuthkit tools (as used in the book). There's also practical images for the hands on parts. (edited)
👍 1
Avatar
@5cary Thanks a lot. This all looks cool . I don't know where to start. hah
Avatar
yeah experimenting, if you have a goal in mind it makes the motivation a bit easier which is where I like CTF stuff
Avatar
@rayeh Thanks. It takes me a while to follow all of this little/big endian and Hex stuff but I'm just going to jump in.
Avatar
Avatar
CloudyT
@rayeh Thanks. It takes me a while to follow all of this little/big endian and Hex stuff but I'm just going to jump in.
if you haven't seen it already, take a look at cyberchef for a quick way to move between encodings/number systems
Avatar
burgers_N_bytes 9/17/2021 4:13 PM
Quick question…….I’ve got a situation where a school monitored chrome book sent a notification to IT that a child attempted to search and goto an adult website during a known timeframe. The child says he clicked on an email that took him to a blocked website. He then exited and deleted the email. My dilemma, I’ve acquired a cloud acquisition of the Google account and downloaded the Google takeout request with no luck. I haven’t found evidence of the search history or the email. Am I missing something or would there be something of value on the chrome book itself? Thanks.
Avatar
Avatar
CloudyT
@rayeh Thanks. It takes me a while to follow all of this little/big endian and Hex stuff but I'm just going to jump in.
randomaccess 9/17/2021 4:58 PM
If you're just focusing on file systems then I wouldn't bother with getting a VM or test images. Create a VHD in windows disk manager, put some files and folders on it, mess around and then image it. That way you can play around with data you created
Avatar
@randomaccess Ah, I see. Very good.
Avatar
Avatar
burgers_N_bytes
Quick question…….I’ve got a situation where a school monitored chrome book sent a notification to IT that a child attempted to search and goto an adult website during a known timeframe. The child says he clicked on an email that took him to a blocked website. He then exited and deleted the email. My dilemma, I’ve acquired a cloud acquisition of the Google account and downloaded the Google takeout request with no luck. I haven’t found evidence of the search history or the email. Am I missing something or would there be something of value on the chrome book itself? Thanks.
DeeFIR 🇦🇺 9/17/2021 7:41 PM
What kind of monitoring platform is the school using, and what kind of logs does it produce? Depends on how far you want to push it - you could always deploy your own chromebook, emulate the same setup, test both theories and see if the kid's story fits your data set
Avatar
burgers_N_bytes 9/17/2021 7:43 PM
Monitoring platform is Bark. I’m not very familiar with it and I haven’t seen the supposed logs yet. Good idea with test setup, I’m not sure this case warrants it but it’s good to keep in mind.
Avatar
DeeFIR 🇦🇺 9/17/2021 7:48 PM
Looks like everything through Bark is proxied somehow, so you could possibly generate or analyse some kind of timeline of activity.. but it depends on the granularity of the data they (Bark) can provide you with
Avatar
cyberPanther 9/17/2021 9:35 PM
Hello, I am trying to install SANS SIFT-CLI on an Ubuntu machine. I got stuck on the " Install cosign" step. I keep getting an error "The go.mod file for the module providing named packaged contains one or more replace directives" I have tried researching this and very few resources on cosign out there. Anyone successfully installed this and able to help? Thank you
Avatar
Hello everyone, does anyone knows an web app security logging field standard ?
Avatar
Has anyone used tokens extracted from a device to log into that account to bypass two-factor authentication? Asking for a LE friend who has a homicide victim's locked phone they they were able to extract data from but not unlock. They need to get access to the the victim's home security camera system.
Avatar
Avatar
FullTang
Has anyone used tokens extracted from a device to log into that account to bypass two-factor authentication? Asking for a LE friend who has a homicide victim's locked phone they they were able to extract data from but not unlock. They need to get access to the the victim's home security camera system.
Andrew Rathbun 9/18/2021 11:24 AM
Is the home security system cloud based or closed circuit? Was going to suggest SW if it's something like Ring.
Avatar
Avatar
Andrew Rathbun
Is the home security system cloud based or closed circuit? Was going to suggest SW if it's something like Ring.
It is cloud based and they are looking into that as well, but it is unknown how long that will take. If anyone has a good template for Blink that could be useful.
Avatar
Avatar
FullTang
It is cloud based and they are looking into that as well, but it is unknown how long that will take. If anyone has a good template for Blink that could be useful.
Andrew Rathbun 9/18/2021 11:30 AM
I don't have access to IACIS anymore but maybe someone who still does could check for anything historical. @IACIS Member @IACIS Staff Anything we can centralize on AboutDFIR or GitHub for future reference would be great, too. I'd love to be able to help out LE enough to where there's a place for this information when it's needed, especially for homicides and other heinous crimes.
11:31 AM
ahh it's an Amazon company, interesting
Avatar
Forensic@tor 9/18/2021 11:32 AM
Ring is Amazon company as well
Avatar
Avatar
FullTang
Has anyone used tokens extracted from a device to log into that account to bypass two-factor authentication? Asking for a LE friend who has a homicide victim's locked phone they they were able to extract data from but not unlock. They need to get access to the the victim's home security camera system.
We do that, mind you don't always bypass the 2FA
Avatar
Avatar
Rob
We do that, mind you don't always bypass the 2FA
How do you do it?
Avatar
Andrew Rathbun 9/18/2021 11:36 AM
I'd imagine the ask on the SW would be something to the effect of:
  • Any and all recordings during the timeframe specified at the residence with the service address of insert address here belonging to victim's name
  • This includes recordings and logs from all devices attached with the account belonging to victim's name including but not limited to : video recordings, sound recordings, motion detection event logs, video recording event logs, audio recording event logs, and other general security events within the residence
11:38 AM
Being a Ring customer for 5 years now, if I were to do a SW on my own Ring account for something like a homicide, I feel like this would cover all you'd need
11:39 AM
maybe a blurb to specify recordings from certain devices i.e., state types of devices Blink offers or what you know the household had in it (floodlight cam, stick up cam, etc)
Avatar
Good verbiage, thanks for sharing.
Avatar
Avatar
FullTang
How do you do it?
We use UFED Cloud or Axiom. Sometimes 2FA require us to use the original exhibit to recieve the text or notification to allow access
👍 1
Avatar
Andrew Rathbun 9/18/2021 11:43 AM
oh I have door sensors with Ring. I'm sure door opening/closing events would be great to have too. Also, do they have a smart garage door opener? Or is that tied into Blink? Either way, video will be super hepful
👍 1
Avatar
Avatar
Rob
We use UFED Cloud or Axiom. Sometimes 2FA require us to use the original exhibit to recieve the text or notification to allow access
Do you know of a free tool that will do that? It doesn’t need to be a forensically sound way to access the account, they just need access.
Avatar
Not that I'm aware of sadly, a suggestion I'd say is since most home security services nowadays are cloud based. If you can find the credentials from your download, perhaps login using another computer and pray there's no 2FA
11:53 AM
Then see what you can access.
11:54 AM
The only concern I have, Ring doesn't save much unless the user has a premium account
11:55 AM
Not sure if this the same for yours.
Avatar
Avatar
Rob
Not that I'm aware of sadly, a suggestion I'd say is since most home security services nowadays are cloud based. If you can find the credentials from your download, perhaps login using another computer and pray there's no 2FA
Ok thanks for the heads up. Looks like a preservation request + SW is the way to go.
Avatar
If you can find the PIN for the original exhibit, that's the route I'd take in your situation
11:56 AM
Otherwise I believe there's been some UFED have had some Ring parsing functions.
👍 1
Avatar
burgers_N_bytes 9/18/2021 12:33 PM
Possibly look into if Blink has a public API they could use to get data.
👍 1
Avatar
Deleted User 9/19/2021 8:32 AM
Anyone have any idea what the format of this string is eg "f18f21d2-43cf-47cd-84b9-848d1f2600da" ? I have seen it used as a UID in some places but not sure if it resolves or decodes into something else?
Avatar
depending on an attorney's interpretation of the law in your local jursidiction, they might want a wiretap for cloud based video since audio can be recorded on some of those cameras. The issue came up a couple of years ago where they insisted on doing that here, haven't had it pop up don't know if they're still trying to navigate down that rabbit hole
Avatar
Ross Donnelly 9/19/2021 1:29 PM
How do I add tags to my profile? I'm an IACIS member and noticed some people have that tag 🙂 (not that it really matters!)
Avatar
Avatar
Ross Donnelly
How do I add tags to my profile? I'm an IACIS member and noticed some people have that tag 🙂 (not that it really matters!)
Andrew Rathbun 9/19/2021 2:01 PM
You do what you just did 😋 added!
Avatar
Avatar
Andrew Rathbun
You do what you just did 😋 added!
Ross Donnelly 9/19/2021 2:03 PM
Cheers Andrew!
Avatar
Avatar
Deleted User
Anyone have any idea what the format of this string is eg "f18f21d2-43cf-47cd-84b9-848d1f2600da" ? I have seen it used as a UID in some places but not sure if it resolves or decodes into something else?
it looks like a microsoft guid. it is used as a record identifier which takes into account machine, date time etc https://docs.microsoft.com/en-us/dotnet/api/system.guid.tostring?view=net-5.0, https://devblogs.microsoft.com/oldnewthing/20080627-00/?p=21823 I thought it was not unique, there were exceptions in the past, but the article claims different.
Returns a string representation of the value of this instance of the Guid structure.
A customer needed to generate an 8-byte unique value, and their initial idea was to generate a GUID and throw away the second half, keeping the first eight bytes. They wanted to know if this was a good idea. No, it’s not a good idea.
Avatar
Avatar
SamJack
it looks like a microsoft guid. it is used as a record identifier which takes into account machine, date time etc https://docs.microsoft.com/en-us/dotnet/api/system.guid.tostring?view=net-5.0, https://devblogs.microsoft.com/oldnewthing/20080627-00/?p=21823 I thought it was not unique, there were exceptions in the past, but the article claims different.
Deleted User 9/20/2021 1:09 AM
Thanks I’ll have a look. In this case the UID I quoted is being used to ID an account in a Ponzi so it’s making me wonder.
Avatar
DeeFIR 🇦🇺 9/20/2021 1:35 AM
@Deleted User it can be a GUID for any platform, it's just a structured piece of data used as an identifier. I recently received a gift card and the giftcard ID is in the same format.
Avatar
Avatar
DeeFIR 🇦🇺
@Deleted User it can be a GUID for any platform, it's just a structured piece of data used as an identifier. I recently received a gift card and the giftcard ID is in the same format.
Deleted User 9/20/2021 3:02 AM
Yeah I suspected as much, but was hoping there was something I could extract from it. Thanks!
Avatar
Hey has anyone ever did analysis on ardamax key logging software?
Avatar
Hey guys, is there anyway to extract a file found on MFT but is no longer on disk? Im using volatility!
Avatar
Avatar
Deleted User
Thanks I’ll have a look. In this case the UID I quoted is being used to ID an account in a Ponzi so it’s making me wonder.
I searched a little bit and seemingly in some cases you can extract info http://guid.one/guid
Avatar
Avatar
SamJack
I searched a little bit and seemingly in some cases you can extract info http://guid.one/guid
Deleted User 9/21/2021 12:58 AM
Excellent thank you! My research did not yield much but this is all helpful. Thanks community Salute
Avatar
@Magnet Forensics Is it possible to change the Axiom Case Number? I made a typo and I don't want to reprocess days of evidence...
Avatar
Avatar
Cole
@Magnet Forensics Is it possible to change the Axiom Case Number? I made a typo and I don't want to reprocess days of evidence...
Edit the case information.xml file I believe.
6:14 AM
Will display the Case Number in there
6:14 AM
Also Case information.txt
6:15 AM
Make a copy first tho, before you do, but was the case with IEF that you could just edit the txt file and it'll update the actual case number.
Avatar
I tried both of those (replacing all instances the number appeared) but it still shows the old one. I'm guessing I'd have to edit the case database file :/ but I don't want to touch that unless I have to.
6:40 AM
Not even sure if you can edit the mfdb file
Avatar
I opened the case database (including the WAL and SHM) in DB Browser and I found case information in a couple places. First, under the case_info table under the case_number field. This probably changes the easily visible case number in axiom. I also found the case number under the table scan_attribute buried in a json value (once per entry). After writing changes, axiom successfully opened the new database and the values are now correct
Salute 1
Avatar
indianadmin 9/21/2021 6:45 AM
Can anyone recommend a way to find out if the user uploaded any files from laptop to cloud drives or webmail solutions?
6:46 AM
This is just by looking at the laptop as there is no access to any proxy logs nor is there any DLP or any endpoint protection.
Avatar
I'd also like to thank Magnet for making the database super easy to read and understand
Avatar
Avatar
indianadmin
Can anyone recommend a way to find out if the user uploaded any files from laptop to cloud drives or webmail solutions?
Could be a better solution, but one idea is to A, see if those files exist on the laptop, B, check web history over the times that the files were allegedly uploaded, and C, check internet connection/traffic at that time.
6:52 AM
If you can determine that the laptop has the files and the cloud platform was accessed at the time the files were uploaded, that gives you a lot of evidence. You'd still need other information from the subject or the cloud provider to make the conclusion solid.
Avatar
Avatar
Cole
Could be a better solution, but one idea is to A, see if those files exist on the laptop, B, check web history over the times that the files were allegedly uploaded, and C, check internet connection/traffic at that time.
indianadmin 9/21/2021 7:18 AM
I agree, but I only have access to the laptop and not to the cloud platform.
Avatar
Avatar
indianadmin
Can anyone recommend a way to find out if the user uploaded any files from laptop to cloud drives or webmail solutions?
Is it a drive, or an application like onedrive, google drive or box? Which OS?
Avatar
Avatar
SamJack
Is it a drive, or an application like onedrive, google drive or box? Which OS?
indianadmin 9/21/2021 11:16 PM
Laptop with Windows 10. No applications like google backup or box sync and drive are present.
Avatar
MrMacca (Allan Mc) 9/22/2021 7:45 AM
@Magnet Forensics when I am trying to export out a report to html, or even a pdf. No matter what I do, they always fail. How can I find out the reason for this? The only thing it will export to successfully is the portable case. Any ideas?
Avatar
The #DFRWSEU2022 CFP deadline is around the corner! Submit your paper before October 3rd! Details here: https://dfrws.org/conferences/dfrws-eu-2022/ #DFIR
DFRWS EU 2021 will be held virtually 28th-31st March, 2022, with all of the content one would normally expect at DFRWS. CFP open through Oct 14, 2021.
Avatar
Avatar
MrMacca (Allan Mc)
@Magnet Forensics when I am trying to export out a report to html, or even a pdf. No matter what I do, they always fail. How can I find out the reason for this? The only thing it will export to successfully is the portable case. Any ideas?
How long is the path you're trying to export to? Try exporting to your desktop
8:37 AM
One of the logs should give you an error reason
Avatar
MrMacca (Allan Mc) 9/22/2021 9:10 AM
I'll give it a try, cheers.
Avatar
Avatar
MrMacca (Allan Mc)
@Magnet Forensics when I am trying to export out a report to html, or even a pdf. No matter what I do, they always fail. How can I find out the reason for this? The only thing it will export to successfully is the portable case. Any ideas?
Sending DM now
Avatar
Avatar
MrMacca (Allan Mc)
@Magnet Forensics when I am trying to export out a report to html, or even a pdf. No matter what I do, they always fail. How can I find out the reason for this? The only thing it will export to successfully is the portable case. Any ideas?
If you have not already solved the problem please try to exclude the evidence in formation in your report and see if that solves it.
12:07 PM
Avatar
Hey all, I'm a digital forensics student, and still pretty new to the field, trying to get some help with a school assignment involving FTK imager. It's pretty basic stuff I think, is there a specific channel I might ask for help in?
Avatar
Avatar
v3izy
Hey all, I'm a digital forensics student, and still pretty new to the field, trying to get some help with a school assignment involving FTK imager. It's pretty basic stuff I think, is there a specific channel I might ask for help in?
DFIRDetective 9/22/2021 12:13 PM
#computer-forensics would be a good starting point. Otherwise, you can post it here and people can redirect you.
Avatar
Thanks!
Avatar
Avatar
Jamey
If you have not already solved the problem please try to exclude the evidence in formation in your report and see if that solves it.
MrMacca (Allan Mc) 9/22/2021 2:38 PM
Sadly the 2 recommendations did not work. I attempted to create a HTML report using the 43 tagged items. I had them all selected, right clicked and chose Create report. I also use the FILE > Create Report option and only chose the specific tags I wanted. Both times I deselected the Evidence overview. I also tried a different destination location. Which Logfile do I need to interrogate to see what might be causing the issue? Thanks in advance
Avatar
I would suggest at this point to use the collect logs in the help menu and then send that to support@magnetforensics.com with a brief description of the issue so they know what they are looking for in the logs and they can get you squared away. This will open a formal trackable ticket and correspondence with you.
5:01 PM
@MrMacca (Allan Mc)
Avatar
Avatar
indianadmin
Laptop with Windows 10. No applications like google backup or box sync and drive are present.
This is not an answer, but it helped me to better understand better how data leakage can be detected. So perhaps it can help you. See https://cfreds-archive.nist.gov/data_leakage_case/data-leakage-case.html at the bottom you find questions and the answers give a hint what to check https://cfreds-archive.nist.gov/data_leakage_case/leakage-answers.pdf . Maybe this can also help to dig deeper in windows 10 activity timeline https://www.youtube.com/watch?v=-vsXFrOZOtc
Avatar
Has anyone come across AVG Photo Vault before? Since when were they encrypting and hiding media files?
Avatar
Question Folks, what would you throw in a IR Playbook **Faremwork** doco? I've got one but that's more like a style guide doco.
Avatar
Hello, Does anyone know how i can remove wind noise from ring doorbell audio to try and focus on voice
Avatar
Avatar
B74
Hello, Does anyone know how i can remove wind noise from ring doorbell audio to try and focus on voice
Andrew Rathbun 9/25/2021 9:47 AM
Could try something like Camtasia?
Avatar
izotope rx 8
👍 2
Avatar
I could use help from any law enforcement official who can make an urgent data request to a site for an investigation. We need verifiable evidence of whether certain accounts share IP addresses. Apologies if this isn't the appropiate channel for this.
Avatar
Avatar
Randomware
I could use help from any law enforcement official who can make an urgent data request to a site for an investigation. We need verifiable evidence of whether certain accounts share IP addresses. Apologies if this isn't the appropiate channel for this.
Andrew Rathbun 9/25/2021 8:32 PM
You need to go through your local PD and provide information so they can properly follow through. This is purely a jurisdictional issue. No clue where you live but the police department that has jurisdiction (this is key) over where the crime occurred is the only entity that can handle this. If they are not tech savvy, then reach out to us and we'd be happy to help spoonfeed steps to take in order to fulfill the request, so long as probable cause exists (if you're in the USA, at least. I can't speak for other countries).
Avatar
If they are not tech savvy
Yes, this is a considerable part of the problem. Also the legal process is making things way too slow.
8:39 PM
I'm from outside the U.S.
8:41 PM
I'll see what other options there are. Thank you.
Avatar
Avatar
B74
Hello, Does anyone know how i can remove wind noise from ring doorbell audio to try and focus on voice
Deleted User 9/25/2021 8:44 PM
You won’t be able to remove it but you might be able to reduce it in some cases. I would rather try EQ the voices and start around the 500hz mark bringing it up and down to find that sweet spot.
💯 1
Avatar
Avatar
Randomware
I'm from outside the U.S.
randomaccess 9/26/2021 2:19 AM
You can ask your legal reps to make a request for the data. Or at least you could try get them to preserve the logs until the process to obtain them gets through
Avatar
chrisforensic 9/26/2021 8:36 AM
hello @Cellebrite ... can you give info, when will a new bssid database be put online?
❔ 1
Avatar
CLB_iwhiffin 9/26/2021 2:54 PM
We’re looking into options. The services that have previously helped us create that dataset have updated their policies and no longer provide the locations of individual BSSIDs.
Avatar
chrisforensic 9/26/2021 7:02 PM
thanks @CLB_iwhiffin for info ✌️
Avatar
ssaadakhtarr 9/27/2021 12:24 AM
Is it possible to root a locked android phone? If yes then how?
Avatar
That really depends on the type of phone, what phone are you working with?
Avatar
Anyone use encase v8 here? How do I get a list of all the emails accessed 😪
Avatar
Avatar
Robin Hood
That really depends on the type of phone, what phone are you working with?
ssaadakhtarr 9/27/2021 3:10 AM
Samsung A7 with android 8.0
Avatar
ssaadakhtarr 9/27/2021 3:36 AM
3:36 AM
i am trying to bruteforce the passcode of android and when i tried to run it.. It shows the following error
3:37 AM
Anyone who have worked with this package
3:38 AM
please help!
Avatar
this won't work, you need a phone with proper kernel that can switch your phone to act like as a hid device
3:40 AM
plus, samsung phone you're trying to bf will increase delays with each failed attempt to a point that makes this method pointless
Avatar
ssaadakhtarr 9/27/2021 3:52 AM
What do you mean by proper kernel? Is not there on android devices
3:52 AM
U mean rooted phone?
Avatar
A Nethunter phone (or any rooted Android with HID kernel support) - that's from the github that you took the script from
4:11 AM
Convert your Android device into USB keyboard/mouse, control your PC from your Android device remotely, including BIOS/bootloader. - GitHub - pelya/android-keyboard-gadget: Convert your Android dev...
Avatar
Avatar
Andrew Rathbun
You need to go through your local PD and provide information so they can properly follow through. This is purely a jurisdictional issue. No clue where you live but the police department that has jurisdiction (this is key) over where the crime occurred is the only entity that can handle this. If they are not tech savvy, then reach out to us and we'd be happy to help spoonfeed steps to take in order to fulfill the request, so long as probable cause exists (if you're in the USA, at least. I can't speak for other countries).
One detail's been bothering me. What entity should handle it, given that a crime was commited through a public internet platform by an anonymous account and we only know the location of the accusing victim? (in other words: if we don't yet have any verifiable way of proving where that specific crime occurred) Is it whichever police department has jurisdiction over where the platform is hosted?
3:34 PM
Or can the request be made by the police department that the victim resorted to?
Avatar
Any local, state, or federal department that covers the victim's jurisdiction would need to take it in as there's no identifiers for where the suspect would be and issue a subpoena or w/e other legal authorization for that account. They can either try to work in conjunction with the local agency or make a referral to where the suspect resides if its out of their jurisdiction. Or it comes back to a foreign country that doesn't care and it's not a big enough crime to warrant a MLAT and you go 🤷‍♂️ (edited)
this 4
👌 1
Avatar
Avatar
Solec
Any local, state, or federal department that covers the victim's jurisdiction would need to take it in as there's no identifiers for where the suspect would be and issue a subpoena or w/e other legal authorization for that account. They can either try to work in conjunction with the local agency or make a referral to where the suspect resides if its out of their jurisdiction. Or it comes back to a foreign country that doesn't care and it's not a big enough crime to warrant a MLAT and you go 🤷‍♂️ (edited)
Andrew Rathbun 9/27/2021 4:50 PM
This ☝
Avatar
DeepDiveForensics 9/27/2021 11:32 PM
Hello, I'm trying to access UFED Application via RDP but it's showing License not found. Any Idea @Cellebrite
Avatar
Avatar
DeepDiveForensics
Hello, I'm trying to access UFED Application via RDP but it's showing License not found. Any Idea @Cellebrite
DMing
Avatar
Has anyone found a way to identify a spoofed number or where the number originated?
Avatar
Hello, I hope that this is the right channel for this post. I’m looking for some guidance and/or mentor. I’m currently a patrol officer for a US LE agency. I’m wanting to shift directions in my career and work more in cyber security/digital forensics. I’m new to all of this but I am super eager to learn. I’m feeling a bit overwhelmed with all the available online training and different study pathways. If anyone has any insight on how/where I should focus my studies I would appreciate your thoughts.
Avatar
Avatar
RangerDude
Hello, I hope that this is the right channel for this post. I’m looking for some guidance and/or mentor. I’m currently a patrol officer for a US LE agency. I’m wanting to shift directions in my career and work more in cyber security/digital forensics. I’m new to all of this but I am super eager to learn. I’m feeling a bit overwhelmed with all the available online training and different study pathways. If anyone has any insight on how/where I should focus my studies I would appreciate your thoughts.
Deleted User 9/28/2021 9:07 AM
Start with the fundamentals like networking, learn some Operating Systems outside of Windows like OSX and Linux. That foundation is essential. Then worry about the tools and methodologies. You can’t go wrong if you run Kali Linux and complete a few of these tutorials: https://null-byte.wonderhowto.com/ you can always DM for further questions.
Null Byte is a white hat hacker world for anyone interested in hacking, science, networking, social engineering, security, pen-testing, getting root, zero days, etc.
Avatar
@RangerDude welcome, try taking a peek in the #training-education-employment channel. @Andrew Rathbun and the crew have spent a lot of time filling it up with helpful information.
Avatar
Avatar
RangerDude
Hello, I hope that this is the right channel for this post. I’m looking for some guidance and/or mentor. I’m currently a patrol officer for a US LE agency. I’m wanting to shift directions in my career and work more in cyber security/digital forensics. I’m new to all of this but I am super eager to learn. I’m feeling a bit overwhelmed with all the available online training and different study pathways. If anyone has any insight on how/where I should focus my studies I would appreciate your thoughts.
Andrew Rathbun 9/28/2021 9:52 AM
You're welcome to DM me so we can get you on the right path. I used to be on patrol as well. Looking forward to talking to you soon.
Avatar
Avatar
RangerDude
Hello, I hope that this is the right channel for this post. I’m looking for some guidance and/or mentor. I’m currently a patrol officer for a US LE agency. I’m wanting to shift directions in my career and work more in cyber security/digital forensics. I’m new to all of this but I am super eager to learn. I’m feeling a bit overwhelmed with all the available online training and different study pathways. If anyone has any insight on how/where I should focus my studies I would appreciate your thoughts.
I would recommend starting with https://www.nw3c.org/. They are a good stepping stone into digital forensics and some of the Online Trainings certainly apply to a patrol officer even they don't want to transition into digital forensics. The "CI153 Searching Without a Warrant" has great info for everyone in law enforcement that I have yet to see in another online training, but maybe I am deprived 🤷‍♂️
The National White Collar Crime Center (NW3C) is a nationwide support system for the prevention, investigation and prosecution of economic and high-tech crime.
Avatar
Avatar
Deleted User
Start with the fundamentals like networking, learn some Operating Systems outside of Windows like OSX and Linux. That foundation is essential. Then worry about the tools and methodologies. You can’t go wrong if you run Kali Linux and complete a few of these tutorials: https://null-byte.wonderhowto.com/ you can always DM for further questions.
Thanks for that resource. I’ll check it out.
Avatar
Avatar
Solec
Any local, state, or federal department that covers the victim's jurisdiction would need to take it in as there's no identifiers for where the suspect would be and issue a subpoena or w/e other legal authorization for that account. They can either try to work in conjunction with the local agency or make a referral to where the suspect resides if its out of their jurisdiction. Or it comes back to a foreign country that doesn't care and it's not a big enough crime to warrant a MLAT and you go 🤷‍♂️ (edited)
Thank you.
Avatar
Avatar
RangerDude
Hello, I hope that this is the right channel for this post. I’m looking for some guidance and/or mentor. I’m currently a patrol officer for a US LE agency. I’m wanting to shift directions in my career and work more in cyber security/digital forensics. I’m new to all of this but I am super eager to learn. I’m feeling a bit overwhelmed with all the available online training and different study pathways. If anyone has any insight on how/where I should focus my studies I would appreciate your thoughts.
Unoriginal_name 9/28/2021 2:30 PM
Make friends with your local secret service office. They can send you to free training at the NCFI for everything to social media investigations to full-blown network intrusion investigations. It’s all free to you (including hotel/per diem/ equipment). Probably the best resource for state/local officers. Feel free to DM for further info or for “tips” to help get in.
this 1
Avatar
Are there any best practices related to hunting for IOC's on a Windows system?
Avatar
Avatar
Fierry
Are there any best practices related to hunting for IOC's on a Windows system?
Andrew Rathbun 9/29/2021 7:01 AM
Sure, for IR? Run Loki against an image or Chainsaw over Events Logs. Also, RECmd has limited support for Threat Hunting artifacts - https://github.com/EricZimmerman/RECmd/blob/ce3edbcff61857b0851871741724627cfbaf5912/BatchExamples/Kroll_Batch.reb#L3016 (edited)
👍 1
Avatar
Loki was already on the list, REcmd wasn't. Thanks! 🙂
Avatar
Andrew Rathbun 9/29/2021 7:11 AM
If you're running Loki against a mounted image, be sure to include --noprocscan so you're not scanning your live system's processes 🙂
7:12 AM
@cyb3rops thanks for the work on Loki, btw. Great tool
👍 1
Avatar
Avatar
Andrew Rathbun
Sure, for IR? Run Loki against an image or Chainsaw over Events Logs. Also, RECmd has limited support for Threat Hunting artifacts - https://github.com/EricZimmerman/RECmd/blob/ce3edbcff61857b0851871741724627cfbaf5912/BatchExamples/Kroll_Batch.reb#L3016 (edited)
NibblesNBits 9/29/2021 7:41 AM
chainsaw look like an awesome tool is it integrated in kape as a module i just updated m modules and dont see it, seems like it would be a good addition
Avatar
Avatar
NibblesNBits
chainsaw look like an awesome tool is it integrated in kape as a module i just updated m modules and dont see it, seems like it would be a good addition
Andrew Rathbun 9/29/2021 8:29 AM
I added the Chainsaw Module within the past week or so. KAPE will never ship with any binaries outside of Eric's own for liability purposes. You need to download Chainsaw and place it into the .\KAPE\Modules\bin folder for the Module to run correctly (edited)
8:29 AM
Ping me if you have issues with it
8:29 AM
Output will be in .\KAPE\Modules\bin\chainsaw since Chainsaw doesn't support choosing output directory yet
Avatar
NetSecNinja 9/29/2021 1:36 PM
Can anyone explain why when using KAPE via CLI, flush is not enabled by default, but when using gkape it is enabled by default? I've heard too many horror stories about people deleting files without meaning to only because it was enabled by default in the GUI. I'd honestly prefer (and I'm sure others would too) for it to be disabled both in CLI and GUI, but I'm not sure where to send a recommendation for that.
Avatar
Avatar
NetSecNinja
Can anyone explain why when using KAPE via CLI, flush is not enabled by default, but when using gkape it is enabled by default? I've heard too many horror stories about people deleting files without meaning to only because it was enabled by default in the GUI. I'd honestly prefer (and I'm sure others would too) for it to be disabled both in CLI and GUI, but I'm not sure where to send a recommendation for that.
Andrew Rathbun 9/29/2021 6:17 PM
https://github.com/EricZimmerman/KapeFiles/issues is where you bring up any grievances
This repository serves as a place for community created Targets and Modules for use with KAPE. - Issues · EricZimmerman/KapeFiles
👍 1
6:18 PM
Since this issue would involve a codebase modification, Eric will be the one to respond to this.
Avatar
chrisforensic 9/30/2021 2:06 AM
hello @Cellebrite short question: will the "USB2 Communication Cable" sent automatically to all customers? If you connect cable 170 on usb2-port on this sort of extraction, will it be possible without this cable? (edited)
2:06 AM
Avatar
Avatar
chrisforensic
hello @Cellebrite short question: will the "USB2 Communication Cable" sent automatically to all customers? If you connect cable 170 on usb2-port on this sort of extraction, will it be possible without this cable? (edited)
CLB-dan.techcrime 9/30/2021 2:11 AM
You can try Cable 170 alone but it could fail since our exploit works better with a USB 2.0 cable... I believe you can just use a standard male to female USB 2.0 extender cable. I highly doubt we will send one out to each customer...
Avatar
chrisforensic 9/30/2021 2:13 AM
thanks @CLB-dan.techcrime for fast answer, top 👍
Avatar
ESIM question for the group, I have a Note 20 Ultra 5G that I can not get into airplane mode without the pin code, we have removed the sim card and it was in a faraday back all the way to use until we got it into a ramsey box. Now what ? I can't keep the thing in there forever and we want to keep the device on for AFU extraction. I"m worried that removing the sim has not isolated the esim connection. Is there some thing on the screen to indicate it was using the esim over Sim card ?
Avatar
Hey guys, I'm looking for help decoding a powershell string found in a windows server event log. Which channel should I go to with this request?
Avatar
Welcome @Wrisk there's some resources from #incident-response which can be accessed from https://discord.com/channels/427876741990711298/440608301898530838/882606725025382421
Avatar
Avatar
Matt
Welcome @Wrisk there's some resources from #incident-response which can be accessed from https://discord.com/channels/427876741990711298/440608301898530838/882606725025382421
Thank you
Avatar
Is anyone aware whether it's possible to enable SRUM (srudb.dat) on Windows server? I've noticed it is enabled by default in Windows Server 2022 now, which is great! But I've not been able to find a way to activate it for Win2K12R2.
Avatar
randomaccess 10/1/2021 6:32 AM
@Bryserker I tried and failed
6:33 AM
I have seen it on David cowens test kitchen on server 2019 but it turns out it depended on the installation media used because a different installation didn't have it on
Avatar
@randomaccess Thanks and yeah, that matches my findings so far. It appears the relevant .dll files (e.g. appsruprov.dll) aren't in the system32 folder. It's a shame because it's usually servers where I'd love to have the logging, haha.
Avatar
Trashboat667 10/1/2021 9:15 AM
Latest version of UFED4PC. IPhone X running iOS 14.7.1. Trying to complete a checkm8. Phone goes into DFU no problem and exploits and shows the checkm8 symbol. As soon as that completes, the phone reboots and checkm8 fails. Any ideas? Tried on two machines. Same results on each. (edited)
Avatar
Avatar
Trashboat667
Latest version of UFED4PC. IPhone X running iOS 14.7.1. Trying to complete a checkm8. Phone goes into DFU no problem and exploits and shows the checkm8 symbol. As soon as that completes, the phone reboots and checkm8 fails. Any ideas? Tried on two machines. Same results on each. (edited)
Andrew Rathbun 10/1/2021 10:00 AM
#mobile-forensic-extractions
Avatar
@DCSO I have a very similar situation, just a slightly different model of phone. My current plan is to just carry my ramsey box to the office where it will be downloaded and try it through the shielded ports. Good luck, let us know how it turns out. I'm fairly confident mine has a wipe command waiting on it based on comments by the owner.
Avatar
Avatar
whee30
@DCSO I have a very similar situation, just a slightly different model of phone. My current plan is to just carry my ramsey box to the office where it will be downloaded and try it through the shielded ports. Good luck, let us know how it turns out. I'm fairly confident mine has a wipe command waiting on it based on comments by the owner.
Along the same lines, I keep a small faraday bag in my faraday cage so that I can keep a phone fully isolated at all times. I can put the phone into the bag for a short time to open the cage to add other phones, battery packs, transport faraday bags, remove faraday bags from phones delivered in faraday bags, etc. (edited)
Avatar
hey i have a file called uboot.env
2:56 PM
and i have no idea
2:56 PM
what it is?
2:58 PM
anyone can tell any info about this file
Avatar
mkenvimage: a new utility to generate a U-Boot environment image - Contributed by David Wagner from Bootlin.
2:59 PM
Google knows most things 😄
Avatar
yea i've looked into that
3:02 PM
but the file send seems encrypted or something like that
3:02 PM
it's actually a ctf challenge and they gave me three files
3:03 PM
an image file called u-boot.img
3:03 PM
and a zImage file
Avatar
Are the others valid - can you boot it?
Avatar
i have no idea how to boot it
Avatar
Not sure, cursory google suggests they are all to do with a linux boot so probably need to get them on a removable media and find a linux machine
Avatar
wdym by removable media ?
Avatar
sd card / usb
Avatar
oh yea
Avatar
I mean I just googled uboot and zimage
Avatar
yep that's what am trying to do rn
3:27 PM
and am lost lol
Avatar
Andrew Rathbun 10/2/2021 7:19 PM
Have you ran the hash through VirusTotal or found a HybridAnalysis or JSB link for it? In the future, try not to upload random files here because we can't verify if it's malicious or not. Not that we suspect you're up to no good, and it's not that I don't trust you, but I don't trust anyone 🙂
Avatar
Galaxy A70 Android 10. File System Qualcomm Live extraction. The device has Secure Folder installed but passcode unknown. I can see all sorts of databases relating to the Secure Folder, when it was created, what’s inside, I’ve got the images for the secure folder default apps. What I would like to know is if the folder root/data/Knox is totally empty (0 files 0kb) does this mean the Secure Folder has not been extracted?
Avatar
@Law Enforcement [UK] or any other law enforcement. What is everyone doing about iOS 15 coming out? Any 5g Faraday bags out there? Or is it business as normal for everyone until a device is wiped? (edited)
Avatar
@Player V looks like a part of firmware of some kind (based on linux with an kernel image and a boot wrapper?) Is the third file a squashfs? (edited)
Avatar
Avatar
pinball
Galaxy A70 Android 10. File System Qualcomm Live extraction. The device has Secure Folder installed but passcode unknown. I can see all sorts of databases relating to the Secure Folder, when it was created, what’s inside, I’ve got the images for the secure folder default apps. What I would like to know is if the folder root/data/Knox is totally empty (0 files 0kb) does this mean the Secure Folder has not been extracted?
Digitalferret 10/3/2021 12:01 PM
◀️ maybe echo in #mobile-forensic-extractions
Avatar
Avatar
Andrew Rathbun
@cyb3rops thanks for the work on Loki, btw. Great tool
I wonder why you wouldn't use the free THOR Lite. LOKI is somehow unmaintained. (I only do bugfixes and brought it to Py3 a while ago) (edited)
Avatar
Avatar
cyb3rops
I wonder why you wouldn't use the free THOR Lite. LOKI is somehow unmaintained. (I only do bugfixes and brought it to Py3 a while ago) (edited)
Andrew Rathbun 10/3/2021 12:53 PM
I'll dive into Thor Lite then. I've only heard of it. Never actually used.
Avatar
Andrew Rathbun 10/3/2021 12:56 PM
Thanks, just filled out the form 👍
12:59 PM
I'll send you some Trial Vouchers for THOR via PM
💯 1
Avatar
Andrew Rathbun 10/3/2021 12:59 PM
Thanks Florian, I'll run it this week
Avatar
If you're investigating a real incident, it'll help you more ... We'll release the current TechPreview v10.6 on Monday or Tuesday. Make sure to update the version that you download before scanning using the "thor-util" command line tool.
1:05 PM
The new v10.6 features a monitoring thread that detects CobaltStrike beaconing and other new detection features
Avatar
Andrew Rathbun 10/3/2021 1:05 PM
Awesome, sounds very robust. I'll give it a whirl on some evidence this week when it arrives to our lab
👍 1
Avatar
RandyRanderson 10/3/2021 4:37 PM
Nice
Avatar
Avatar
cyb3rops
If you're investigating a real incident, it'll help you more ... We'll release the current TechPreview v10.6 on Monday or Tuesday. Make sure to update the version that you download before scanning using the "thor-util" command line tool.
Ross Donnelly 10/4/2021 5:31 AM
I was just having a play with this. Is there a way to scan a mounted image with the Lite version? If I use the --fsonly switch I get an error that only the Forensic Lab license supports this, so I assume it's only in the paid version.
Avatar
Anyone good with batch scripts and writing them?
Avatar
Avatar
Ross Donnelly
I was just having a play with this. Is there a way to scan a mounted image with the Lite version? If I use the --fsonly switch I get an error that only the Forensic Lab license supports this, so I assume it's only in the paid version.
http://thor-manual.nextron-systems.com/en/latest/usage/special-scan-modes.html#forensic-lab-license - we'll add the link to the chapter in the manual to the error message (edited)
Avatar
Avatar
cyb3rops
http://thor-manual.nextron-systems.com/en/latest/usage/special-scan-modes.html#forensic-lab-license - we'll add the link to the chapter in the manual to the error message (edited)
Ross Donnelly 10/4/2021 9:36 AM
Good to know, thanks
Avatar
Does anybody have much experience with the ADF Solutions (https://www.adfsolutions.com/) suite of software? Such as the Triage-Investigator? (edited)
The best computer forensics & mobile triage software, iOS forensics, Android forensics, MacOS forensics, Windows, Linux - Frontline Field Digital Forensics
Avatar
Avatar
Yes
Does anybody have much experience with the ADF Solutions (https://www.adfsolutions.com/) suite of software? Such as the Triage-Investigator? (edited)
Ive never used TI, but I have used their DEI software a ton.
Avatar
Avatar
Rob
Anyone good with batch scripts and writing them?
DeeFIR 🇦🇺 10/5/2021 12:04 AM
Depends what you want to do 😬
Avatar
Avatar
DeeFIR 🇦🇺
Depends what you want to do 😬
Trying to figure a simple if statement based on user input 😂
Avatar
AARC TASK FORCE 10/5/2021 4:30 AM
Any input would be greatly appreciated.... I have a motherboard to a 2017 MacBook A1534. I only have the motherboard. I have purchased an A1534 and tried to put the suspect motherboard into the new macbook but it would not boot. Does anyone know a way to recover the data from the soldered on SSD?
Avatar
When the first teardown of Apple’s new 2016 MacBook Pro was published earlier this month, a couple notable changes were spotted related to the machine’s SSD. Components for the SSD are now soldered onto the logic board, which likely allows for some design and thinness enhancements, but hurts overall repairability. On top of not being […]
5:19 PM
Aside from the above device, perhaps there's a pinout somewhere that will allow you to remove the drive and solder an m.2 or sata connector to it.
Avatar
Avatar
AARC TASK FORCE
Any input would be greatly appreciated.... I have a motherboard to a 2017 MacBook A1534. I only have the motherboard. I have purchased an A1534 and tried to put the suspect motherboard into the new macbook but it would not boot. Does anyone know a way to recover the data from the soldered on SSD?
Does it power on at all? Can you get into recovery? Or is the board dead?
Avatar
AARC TASK FORCE 10/5/2021 8:59 PM
Does not boot at all. LED light on the logic board is lit.
Avatar
Avatar
FullTang
Along the same lines, I keep a small faraday bag in my faraday cage so that I can keep a phone fully isolated at all times. I can put the phone into the bag for a short time to open the cage to add other phones, battery packs, transport faraday bags, remove faraday bags from phones delivered in faraday bags, etc. (edited)
That's how I get the phones in there to begin with, it just gets very cumbersome very quickly. The ramsey box is limited on space to maneuver. I have a new Mission Darkness XL box but it's at a different facility than me for the next few months. It'll be so nice to have all the extra room in there!
Avatar
Avatar
whee30
That's how I get the phones in there to begin with, it just gets very cumbersome very quickly. The ramsey box is limited on space to maneuver. I have a new Mission Darkness XL box but it's at a different facility than me for the next few months. It'll be so nice to have all the extra room in there!
The XL box looks massive, I am jealous! I like the idea of actually transporting the ramsey box with the phone inside to where you will do the extraction if needed. You can keep the phone plugged into power the entire time with a car inverter and not worry about battery packs inside of faraday bags.
Avatar
@AARC TASK FORCE is the screen dead can you try an external monitor ?
Avatar
Hi not sure if this is the right channel to ask. Recently did a fresh install of Linux from a live USB and enabled LUKS encryption. I noticed on the USB today that there are "install-logs" present, from what I can tell they mainly just have details of what software was installed during the installation. Will there be any trace of the LUKS key or password on that USB? I would assume not as that would be a massive security issue, but just wanted to confirm
Avatar
Avatar
hannix7403
Hi not sure if this is the right channel to ask. Recently did a fresh install of Linux from a live USB and enabled LUKS encryption. I noticed on the USB today that there are "install-logs" present, from what I can tell they mainly just have details of what software was installed during the installation. Will there be any trace of the LUKS key or password on that USB? I would assume not as that would be a massive security issue, but just wanted to confirm
I don’t have the answer, but you can perhaps try to do at first a keyword research on the usb key (I mean on the « block dev »).
Avatar
Avatar
hannix7403
Hi not sure if this is the right channel to ask. Recently did a fresh install of Linux from a live USB and enabled LUKS encryption. I noticed on the USB today that there are "install-logs" present, from what I can tell they mainly just have details of what software was installed during the installation. Will there be any trace of the LUKS key or password on that USB? I would assume not as that would be a massive security issue, but just wanted to confirm
Usually all this stuff are made in a temporary memory like tmpfs file system.
Avatar
ah i see. I was just worried in case it meant that a copy of my luks key was now on that USB
11:42 AM
the live usb
Avatar
Avatar
hannix7403
ah i see. I was just worried in case it meant that a copy of my luks key was now on that USB
Deleted User 10/6/2021 9:41 PM
Should not be, no. Booting off USB is non-persistent unless you have configured otherwise. The OS is loaded into RAM and runs from there until reboot.
Avatar
Hi all, are SANS SIFT VM's usable on the latest M1 MacBook Pro's? 🙂
1:04 AM
If so, I'm quite curious about the performance
Avatar
randomaccess 10/7/2021 1:46 AM
@Fierry nope. VMware doesn't support x86/x64 emulation.
Avatar
ah that's too bad :/
1:47 AM
hopefully some sort of ARM-based forensics image will be available in due time
Avatar
randomaccess 10/7/2021 1:48 AM
I don't expect there to be an ARM based SIFT image.
1:49 AM
Not in the near future anyways
Avatar
Would experience in litigation or eDiscovery be helpful in transitioning into a career in digital forensics?
Avatar
can you expand abit more on that? 🙂
Avatar
Sure! So I’m a litigation paralegal and I would like to transition into digital forensics. I am in grad school for comp sci ( but my BA was in legal studies unfortunately). I am wondering if I were to work in an eDiscovery firm I could eventually transfer over to a job in digital forensics/forensic analyst? Here’s more info on the skill set of a paralegal in eDiscovery. https://www.rasmussen.edu/degrees/justice-studies/blog/what-is-ediscovery/
eDiscovery has become a crucial part of a paralegal’s job due to the increased prevalence of information sharing via technology. Learn more about th
8:07 AM
Or is it unreasonable to think working in eDiscovery could land be a job in computer forensics?
Avatar
randomaccess 10/7/2021 2:22 PM
Suggest moving this to #training-education-employment channel, but no it's not unreasonable thinking you can transition from edisco to dfir.
Avatar
Thank you @randomaccess !
Avatar
I have recently cleared the cache of my browser, which inturn removed some credentials I had for certain apps and require me to relog into them. Is that information stored within a logged file that I could access for the browser or can i assume the information is gone?
Avatar
Avatar
ImWell
I have recently cleared the cache of my browser, which inturn removed some credentials I had for certain apps and require me to relog into them. Is that information stored within a logged file that I could access for the browser or can i assume the information is gone?
Deleted User 10/7/2021 11:26 PM
Well, yes. You have removed your cookies.
Avatar
Avatar
ImWell
I have recently cleared the cache of my browser, which inturn removed some credentials I had for certain apps and require me to relog into them. Is that information stored within a logged file that I could access for the browser or can i assume the information is gone?
Digitalferret 10/8/2021 2:23 AM
with Howard on that, but maybe you could run some Nirsoft kit and see if anything else had access to those credentials and spilled/stored them?
Avatar
chrisforensic 10/8/2021 4:06 AM
hello @Cellebrite just 4 info.... updated system win 10 to win 11... no problem to work with UFED4PC or PA 👍 (edited)
Windows10C 1
👏 1
Avatar
Avatar
chrisforensic
hello @Cellebrite just 4 info.... updated system win 10 to win 11... no problem to work with UFED4PC or PA 👍 (edited)
Intel, or AMD system?
Avatar
Avatar
Arcain
Intel, or AMD system?
chrisforensic 10/8/2021 4:07 AM
Intel
Avatar
I'd hold on with AMD for now. Read that new scheduler causes issues with L3 cache on Ryzen CPUs, resulting in much lower performance, like 15% in various tasks
Avatar
Looking to virtualize an E01, any ideas?
Avatar
Avatar
Jogoyo
Looking to virtualize an E01, any ideas?
This is a Windows 64 bit GUI for a procedure to virtualize your EWF(E01), DD(Raw), AFF disk image file without converting it, directly with VirtualBox. It is forensically proof.
Avatar
quick question
12:30 PM
im trying to use dban to wipe a hard drive but it just wont boot from the USB
12:30 PM
I tried it on other machines and it works there
Avatar
Avatar
Zealot
im trying to use dban to wipe a hard drive but it just wont boot from the USB
Is secure boot enabled?
Avatar
its off (edited)
Avatar
Avatar
Zealot
its off (edited)
Is the USB before the HD in the boot order?
Avatar
There might be another setting in the BIOS that is preventing booting from USB. You could try booting into Paladin or similar to see if the machine will even allow booting from any USB and work from there. At least that's where I would start.
Avatar
The boot option correspond with the bios UEFI/Legacy ?
Avatar
Avatar
Zealot
im trying to use dban to wipe a hard drive but it just wont boot from the USB
Iirc DBAN isn’t maintained and just isn’t very good as it can’t wipe some drive types. I use ABAN instead https://aban.derobert.net (edited)
Avatar
I wonder if anyone has dealings with recovering data from an Xbox One X? We have a job where the suspect has several hundred indecent images stored within his Xbox at a file path of U:\Users\usermgr0\pictures we are doing an examination using a clone of the original and can’t seem to find any method of getting these files off the device for evidential purposes. We have tried different storage media and there is no option to copy data from this area to any external devices. Any help or ideas would be appreciated
Avatar
TyphoidMeredith/Case 10/11/2021 3:04 AM
Would copies from a viewer screen or the like suffice? Or it has to be direct chain from the device to your evidence needed?
Avatar
TyphoidMeredith/Case 10/11/2021 3:14 AM
Or can you pull the hard drive and connect it to a FRED?
Avatar
Avatar
cdbandit
I wonder if anyone has dealings with recovering data from an Xbox One X? We have a job where the suspect has several hundred indecent images stored within his Xbox at a file path of U:\Users\usermgr0\pictures we are doing an examination using a clone of the original and can’t seem to find any method of getting these files off the device for evidential purposes. We have tried different storage media and there is no option to copy data from this area to any external devices. Any help or ideas would be appreciated
TyphoidMeredith/Case 10/11/2021 3:18 AM
Messaged you, if that’s alright
Avatar
Avatar
cdbandit
I wonder if anyone has dealings with recovering data from an Xbox One X? We have a job where the suspect has several hundred indecent images stored within his Xbox at a file path of U:\Users\usermgr0\pictures we are doing an examination using a clone of the original and can’t seem to find any method of getting these files off the device for evidential purposes. We have tried different storage media and there is no option to copy data from this area to any external devices. Any help or ideas would be appreciated
Xbox drives are fat32 iirc, have you tried dmde on the image to find any artifacts?
Avatar
TyphoidMeredith/Case 10/11/2021 3:53 AM
Nice
Avatar
Avatar
ryd3v
Xbox drives are fat32 iirc, have you tried dmde on the image to find any artifacts?
I have looked at the image of the drive in various tolls but it appears that the images may be contained in the personal encrypted area of the drive
Avatar
Ah OK, yeah, in that case, it would have to be decrypted first which I'm sure your aware, sorry I couldn't help you further
Avatar
Hi - has anyone done any testing re: iOS 15 and the possibility of it receiving a ‘kill signal’ via the ‘Find My’ network?
Avatar
TyphoidMeredith/Case 10/11/2021 5:00 AM
Dang, lots of good stuff today, get back with you Aaron!
Avatar
Just for info, tracking an iPhone 12 that's been turned off only seems to currently work on the 'Find My' app and doesnt track it on the iCloud website. (edited)
Avatar
TyphoidMeredith/Case 10/11/2021 8:45 AM
That runs counter to what Apple claims, I believe
Avatar
Avatar
busted4n6
Hi - has anyone done any testing re: iOS 15 and the possibility of it receiving a ‘kill signal’ via the ‘Find My’ network?
CLB_joshhickman1 10/11/2021 10:15 AM
@busted4n6 I did some testing on that feature and the location tracking in the iOS 15 betas, and found that the phone was not able to receive the wipe command while powered off.
👍 8
Avatar
CloudCuckooLand 10/11/2021 10:34 AM
@CLB_joshhickman1 And was that with a internet-connected iOS15 iPhone 11(?)/12/13 nearby?
Avatar
CLB_joshhickman1 10/11/2021 10:34 AM
Yes.
10:35 AM
I live in the Apple ecosystem, and have for quite some time now. I use an iPhone, have a couple of HomePods, use AppleTV, and typed this blog post (and most of my others) on an iPad. The integratio…
👍 3
👏 1
Avatar
CloudCuckooLand 10/11/2021 11:43 AM
@CLB_joshhickman1 You were testing an iPhone 8 - my understanding is that the offline and off remote wipe feature is only supported by iPhone 11 and up devices with the U1 chip.
Avatar
CLB_joshhickman1 10/11/2021 11:47 AM
Interesting I had not heard that there were specific U1 capabilities. It was my understanding that offline tracking would work with any device running iOS 15. As far as an offline wipe, I would be interested in hearing more about what you know so I can give it a test spin.
Avatar
Avatar
CLB_joshhickman1
Interesting I had not heard that there were specific U1 capabilities. It was my understanding that offline tracking would work with any device running iOS 15. As far as an offline wipe, I would be interested in hearing more about what you know so I can give it a test spin.
Ross Donnelly 10/11/2021 11:53 AM
"This new feature is based on Ultra Wideband (UWB) technology, which is part of Apple’s U1 chip. Only iPhone 11 and newer models (except for the second-generation iPhone SE) have the U1 chip, so that is why only these devices will work with Find My even when turned off." https://www.google.com/amp/s/9to5mac.com/2021/07/21/ios-15-here-are-the-devices-that-support-find-my-when-turned-off/amp/
Read on as we detail which Apple devices support the new Find My location when turned off with the iOS 15 update.
Avatar
CLB_joshhickman1 10/11/2021 12:03 PM
Ah, ok. Offline ≠ Power Off. Thanks for pointing this out. I’ll test and report back.
👀 3
Avatar
chrisforensic 10/11/2021 11:45 PM
hello @Cellebrite is latest version of PA available on customer portal? shows releasedate 10.10.2021, but download is not possible for new version...
11:45 PM
11:45 PM
Avatar
Is there any good photo album software that people use? Otherwise I shall continue to use word or just batch print to pdf, but not optimum.
Avatar
MrMacca (Allan Mc) 10/12/2021 6:59 AM
@CCC you tried IRFANVIEW? https://www.irfanview.info/ Download that along with the plugins.
IrfanView ... one of the most popular viewers worldwide.
7:01 AM
then when it is installed, you goto OPTIONS on the menu at the top, then Multiple images > then PDF
7:01 AM
If that's what you are after that is.
Avatar
Thinking more for my digital camera roll, but I didn't know that about Irfanview so thanks!
Avatar
I've extracted a Huawei P20 Pro physically in XRY. I've found some interesting pictures in the folder /snapchat/memories/filenname_thumnail.jpg does anyone know or have done any research regards to this amtter if its the owners stories thumbnails or is it if the owner has looked on a story?
10:04 AM
I cant find the original files I'm afraid and when I look in the phone the memories aint "cached" and we are not allowed to connect it to the internet.
Avatar
Question about axiom, when we make a portable case, we can’t have the timeline. (How) Is it possible to add the timeline in the portable case ? Thank’s (Manual said that other kind of view are disable of the portable case, but is it possible to enable it…)
Avatar
Avatar
Feg
Question about axiom, when we make a portable case, we can’t have the timeline. (How) Is it possible to add the timeline in the portable case ? Thank’s (Manual said that other kind of view are disable of the portable case, but is it possible to enable it…)
Andrew Rathbun 10/13/2021 12:25 AM
Might need a dongle to enable it, I'm guessing.
Avatar
Avatar
Andrew Rathbun
Might need a dongle to enable it, I'm guessing.
I have dongle and a full licence …
Avatar
Avatar
Feg
I have dongle and a full licence …
Andrew Rathbun 10/13/2021 12:27 AM
Plugged into the machine while viewing the portable case?
Avatar
Avatar
Andrew Rathbun
Plugged into the machine while viewing the portable case?
In our case yes the dongle is into it.
Avatar
Andrew Rathbun 10/13/2021 12:36 AM
Hmm not sure then
Avatar
i believe the portable case does not support timeline
Avatar
Avatar
Talmidim
i believe the portable case does not support timeline
A ticket is send I will update the answer here. But timeline by default in the « Examine » is not generated. But if you generated it, and not it the portable it’s a real issue for « lambda » inspector. For non ICT inspector timeline is really more explicit.
Avatar
@Feg If all parties have a full license you can just give them the normal case folder instead of creating a portable case 🙂 (edited)
Avatar
Avatar
Feg
Question about axiom, when we make a portable case, we can’t have the timeline. (How) Is it possible to add the timeline in the portable case ? Thank’s (Manual said that other kind of view are disable of the portable case, but is it possible to enable it…)
Timeline isn't available in portable.
1:05 AM
Regardless of dongle.
Avatar
Avatar
Oscar
@Feg If all parties have a full license you can just give them the normal case folder instead of creating a portable case 🙂 (edited)
Here I just test my extraction before to share it with non ict inspector but they don’t have the dongle.
Avatar
Avatar
Rob
Timeline isn't available in portable.
That’s really a missing point compare to their « IEF » portable case.
Avatar
I'd agree.
👍 1
Avatar
randomaccess 10/13/2021 3:19 AM
You can generate the timeline in examine without a dongle
3:20 AM
Although I don't think you can export it
3:21 AM
Heh I'm also a bit hesitant to give people that don't know what they're doing the timeline because some artifacts are in categories that I think people will incorrectly attribute meaning
👍 2
💯 1
Avatar
Andrew Rathbun 10/13/2021 4:33 AM
I shutter to think how many cases may have gone a certain way or another by someone saying something happened at X time but it was like a Registry LastWrite timestamp or something, and no one knew any better
Avatar
Avatar
busted4n6
Hi - has anyone done any testing re: iOS 15 and the possibility of it receiving a ‘kill signal’ via the ‘Find My’ network?
CLB_joshhickman1 10/13/2021 5:29 AM
@busted4n6 @CloudCuckooLand after a little bit of fuss, I was able to test this out using an iPhone 11 and 12 Pro (the test phone). Both phones were running 15.0.2. I was not able to erase the 12 Pro while it was powered off. (edited)
💯 2
👍 1
5:29 AM
I am going to write up a short blog post about what I saw.
👍 2
5:30 AM
Also, the tracking stuff I mentioned in the other blog post still applies (iCloud could not see the 12 Pro while it was powered off, but Find My on my iPad could) (edited)
Avatar
Avatar
CLB_joshhickman1
@busted4n6 @CloudCuckooLand after a little bit of fuss, I was able to test this out using an iPhone 11 and 12 Pro (the test phone). Both phones were running 15.0.2. I was not able to erase the 12 Pro while it was powered off. (edited)
That’s good. Did your testing include sending a kill signal to the iPhone 12 and then switching it on but keeping off WiFi and cellular? What we’re curious to know is whether a nearby ‘online’ iPhone can cause the factory reset of an ‘offline’ device
Avatar
CLB_joshhickman1 10/13/2021 5:50 AM
It did. Under simulation (i.e. pulled SIM card and Wi-Fi radio off) the phone was still not able to receive the command. However, I would recommend keeping these devices in a signal-free zone (no other phones/wearables)...Apple can always change things.
👍 5
Avatar
For a Discord search warrant, do you receive only files that the user personally uploaded or anything that they've looked at? I've got a case where a user has some CP files in their account. Need to make sure they are the ones that personally uploaded the files or whether they just accessed them after somebody else posted them
Avatar
Avatar
RyanB
For a Discord search warrant, do you receive only files that the user personally uploaded or anything that they've looked at? I've got a case where a user has some CP files in their account. Need to make sure they are the ones that personally uploaded the files or whether they just accessed them after somebody else posted them
Andrew Rathbun 10/13/2021 8:12 AM
I honestly cannot speak from experience but it seems like files they've personally uploaded would be the expected outcome vs anything they've viewed. Either that, or media that was uploaded to servers they're apart of? Are the folks at Discord helpful whatsoever with clarifying questions?
Avatar
moshekaplan 10/13/2021 8:19 AM
Random question: Why are partitions needed at all? Why can't we just format an entire disk as NTFS or another FS?
Avatar
If you assign space to a system partition, you don't need to worry about the user taking up so much space that the machine becomes inoperable
8:21 AM
E.g. the user partition could be full, but so long as the system partition has space available, it can still make use of that space
Avatar
moshekaplan 10/13/2021 8:21 AM
That explains why multiple partitions are useful. I'm referring to an instance where only a single partition is used
Avatar
Andrew Rathbun 10/13/2021 8:22 AM
https://askleo.com/should_i_partition_my_hard_disk/ has some good reasons why. I don't know if it's needed per se. But I'm guessing it is "needed" because the operating system needs to know how to store and access files, how to handle deleted files, etc. NTFS does things differently than FAT32, etc. Are you basically asking why can't everything just be raw disk space and leave it at that?
Avatar
The reasons why multiple partitions are useful is exactly why we don't run with single partitions typically. Perhaps I'm misunderstanding the question
8:25 AM
So let's say you have a single partition on your PC and the user decides to download loads of movies - partition gets full, system can't swap memory, no space for logging, no space for any temporary files at all
8:25 AM
System dies 😦
Avatar
moshekaplan 10/13/2021 8:25 AM
I should have phrased the question differently - Based on the first instruction of a FS being a JMP to the bootloader, shouldn't it be possible to have a disk with a single filesystem and no MBR/GPT ? (edited)
8:27 AM
(And yes, I'm aware that this would make having a second partition or filesystem on the disk impossible) (edited)
Avatar
Ah I see. I believe that some embedded systems work exactly like that (but am certainly not an expert in that)
Avatar
moshekaplan 10/13/2021 8:30 AM
Embedded linux devices or simpler devices?
Avatar
So if you had a use case that only necessitated a single partition, I guess whatever primary bootloader exists could boot straight from the single partition/filesystem available
Avatar
Avatar
moshekaplan
Embedded linux devices or simpler devices?
Simpler
Avatar
moshekaplan 10/13/2021 8:33 AM
ack
Avatar
RISC OS based devices I think may meet that use case
Avatar
moshekaplan 10/13/2021 8:35 AM
I was thinking more devices that are created based on ASICs * (edited)
Avatar
It iterates over any physical drives connected until it finds a "!Boot" file and then goes from there
Avatar
moshekaplan 10/13/2021 8:37 AM
Right, I'm aware
👍 1
8:38 AM
I'm writing some training slides on Windows forensics now and I was thinking about partitions - trying to anticipate questions and make sure I have answers (edited)
Avatar
Ahhhh I see
8:38 AM
So are you trying to find functional examples that don't use logical partitioning?
Avatar
moshekaplan 10/13/2021 8:39 AM
Nope. Just a thought exercise for my own understanding
👍 1
8:39 AM
This is meant to be 'intro to cyber' for HS students. 4 days of instruction. day 1 is disk forensics.
8:40 AM
8:40 AM
Rough outline
Avatar
Gotcha - makes sense to want to arm yourself with that knowledge, but can't imagine you'd be able to go too in depth on the relative strengths and weaknesses of MBR vs GPT etc in that time frame?
Avatar
moshekaplan 10/13/2021 8:41 AM
Nope. Not even planning on discussing them
👍 1
8:42 AM
Like, I could if someone asked. But I otherwise plan to gloss over details like an MBR existing.
Avatar
I always find it shocking how many forensics-related capabilities are implemented as one-off scripts or tools. (edited)
11:33 AM
Like, Autopsy is relatively mature, but I'm only scratching the surface and still seeing things that are only available as external programs or plugins.
Avatar
The realese notes for UFED 4PC is not available under My login, Can any1 share it?
9:59 PM
I can download the new exe but not Read realese notes
Avatar
@Arlakossan Release notes are not an option for UFED 4PC for me either. The PA release notes are available but not UFED, maybe someone forgot to upload them? @Cellebrite ?
Avatar
Wouldn't surprise me if the "release notes" is the bit at the top in this minor release.
Avatar
Im checking into it
Avatar
Anyone good with using netwitness
Avatar
Odd question: I took the test out option for Cellebrite Mobile Forensics Fundamentals. How would you write that into a CV? Do you write "0 Hours", or "Exam Only", or just leave it blank in the area I normally place the hours of training?
Avatar
Avatar
GRIZZ
Odd question: I took the test out option for Cellebrite Mobile Forensics Fundamentals. How would you write that into a CV? Do you write "0 Hours", or "Exam Only", or just leave it blank in the area I normally place the hours of training?
add it as a certification
Avatar
malwarehobo 10/14/2021 8:14 PM
Has anyone used this forensic tool? https://www.tc4shell.com/en/7zip/forensic7z/
Forensic plugin for the 7-Zip archiver
8:15 PM
It's a plugin for 7zip that lets you browse EnCase and FTK files and such. Sounds pretty nifty but I am wondering if it is reliable and trustworthy.
Avatar
Avatar
malwarehobo
Has anyone used this forensic tool? https://www.tc4shell.com/en/7zip/forensic7z/
I haven't used that plugin but I use the "CRC SHA >" right-click function from a normal 7zip install all the time. I have never been given a reason not to trust it and it has caught copies that for some reason did not have the same hash when moving them between volumes.
Avatar
misterturtle 10/15/2021 2:00 AM
Hey everyone, if you need to ship a parcel but maintain proof of chain of custody, are there any UK courriers you use? maybe one that does direct pickup and delivery w/o a depot being involved?
Avatar
Avatar
misterturtle
Hey everyone, if you need to ship a parcel but maintain proof of chain of custody, are there any UK courriers you use? maybe one that does direct pickup and delivery w/o a depot being involved?
Digitalferret 10/15/2021 2:06 AM
maybe a tamper proof container?
Avatar
misterturtle 10/15/2021 2:09 AM
Is that sufficient for using a standard courrier service?
Avatar
Digitalferret 10/15/2021 2:10 AM
not sure how LEA deal, but i'd use a hard box and seal, or at least a tamper evident bag/box. paperwork: received - seal intact
2:11 AM
whichever courier you use how else would you verify no one took a peek, or worse?
2:11 AM
high value is another matter i guess
2:12 AM
both for belt and braces (edited)
Avatar
misterturtle 10/15/2021 2:13 AM
Even single courier we would have tamper proof box or seals, advice from an ex colleague was that sending a package with chain of custody would require a single courier with a direct delivery, so I've just approached it with that assumption
2:13 AM
I'll look into the legal side, but tbh I can't see an issue with tamper proof equipment
Avatar
Digitalferret 10/15/2021 2:13 AM
yeh, likely good
2:15 AM
best i've seen, previous job, dude flew in from US with an attache case handcuffed to him. car from airport to factory, bit of "aircraft kit" loaded into lockable/tamper evident case, car back to airport, fly back to US. likely had some sort of arms although we didn't see
2:16 AM
someone told me it was the single "foreign" bit of a B2's electronics suite (edited)
2:18 AM
hilarious bit: someone dropped a unit on the way through the factory. all hell let loose to replace the bent handle. minutes to go
Avatar
Avatar
misterturtle
Hey everyone, if you need to ship a parcel but maintain proof of chain of custody, are there any UK courriers you use? maybe one that does direct pickup and delivery w/o a depot being involved?
https://www.dxdelivery.com/corporate/services/dx-secure/ I think DX is/has been used by some UK labs
DX can help you deliver a 1st rate parcel service to your customers with our secure and tracked residential delivery service
Avatar
Avatar
OllieD
https://www.dxdelivery.com/corporate/services/dx-secure/ I think DX is/has been used by some UK labs
Digitalferret 10/15/2021 2:19 AM
👍🏻 added
Avatar
misterturtle 10/15/2021 2:21 AM
I've found these guys too https://www.topspeedcouriers.co.uk/chain-of-custody/ but obviously have no experience with them for recommendations
2:21 AM
Thanks for the link OllieD
Avatar
Avatar
misterturtle
I've found these guys too https://www.topspeedcouriers.co.uk/chain-of-custody/ but obviously have no experience with them for recommendations
Never heard of them, but I see DX vans and lorries everywhere
Avatar
Digitalferret 10/15/2021 2:22 AM
topspeed looks ideal, esp for the sensitive forensic, perishables etc
2:23 AM
maybe echo in #policies-and-procedures ?
Avatar
misterturtle 10/15/2021 2:24 AM
I'ma give them a call and see what they're like
Avatar
I've been working on write blocker validation today, following a long and generally boring process. I've not done validation work before, so this is new to me. I've come across NIST's CFTT Live Linux suite and found it really useful. Has anyone used this for validation that has passed a UKAS assessment? I know how...........particular UKAS can be.
Avatar
Avatar
misterturtle
Hey everyone, if you need to ship a parcel but maintain proof of chain of custody, are there any UK courriers you use? maybe one that does direct pickup and delivery w/o a depot being involved?
We use Topspeed at MD5.
Avatar
Avatar
Majeeko
I've been working on write blocker validation today, following a long and generally boring process. I've not done validation work before, so this is new to me. I've come across NIST's CFTT Live Linux suite and found it really useful. Has anyone used this for validation that has passed a UKAS assessment? I know how...........particular UKAS can be.
Ross Donnelly 10/15/2021 5:36 AM
We use this (doesn't need to be a Wiebetech blocker) - UKAS didn't have any issues with it https://www.cru-inc.com/support/software-downloads/writeblocking-validation-utility/
Forensic Software Utility allows you to update the firmware, view information about, or modify features of your CRU forensic products.
👍 1
Avatar
Avatar
Ross Donnelly
We use this (doesn't need to be a Wiebetech blocker) - UKAS didn't have any issues with it https://www.cru-inc.com/support/software-downloads/writeblocking-validation-utility/
Thanks, i'll take a look
Avatar
Avatar
malwarehobo
Has anyone used this forensic tool? https://www.tc4shell.com/en/7zip/forensic7z/
I have used it and it does work. However, I would suggest trying it out and testing it with what you do regularly and see if it would have any value
Avatar
chrisforensic 10/15/2021 8:30 AM
hello folks at @Cellebrite can i get a short info about difference of UFED premium and premium ES ? we have UFED Ultimate and want to upgrade to a stronger solution. maybe a short DM? thanks in advance
Avatar
Hey @chrisforensic shoot me a dm. And we can chat. (edited)
Salute 1
Avatar
AzuleOnyx🛡 10/17/2021 11:52 AM
I have been missing from in the server for a while--maybe I need a better process to manage my 20+ discords!. I hope everyone is doing well. I have been working on a project that people can now probably take a look at https://pypi.org/search/?q=xleapp < just added it to PyPI today. Still in alpha phase. The CLI is stable (at least I think so) but the GUI is currently broken. I'll be fixing that soon, I hope. There are still artifacts that need to be transitioned over from the iLEAPP (which is where I started) and the other sister programs. Also anyone have an iTunes backup they can share or test with? I think that maybe broken too. I have been testing with a tar file -- https://thebinaryhick.blog/2020/04/16/ios-13-images-images-now-available/. If you want to help me out, drop me a line. 😄
Avatar
Is there any possibility to find out the admin PW when I have an unencrypted dump of a MacOS system? I somehow need to get into the keychain-
12:28 AM
I tried to chance it via pre-boot terminal but that did not work (forensical soundness not required)
Avatar
this is more a question for #password-encryption-cracking you can try to crack the admin pwd; more info here https://hashcat.net/forum/thread-7792.html
Avatar
at what point in cloning an external hdd does the data being copied become readable?
Avatar
or, @Luci , you can try to crack the keychain-hash, wich is faster (but contains more false positives); more info, here https://github.com/hashcat/hashcat/issues/2457
Avatar
Are there any free tools similar to forensic notes?
Avatar
Avatar
cnc747
Are there any free tools similar to forensic notes?
Andrew Rathbun 10/18/2021 3:56 AM
Maybe try Obsidian or OneNote? Not 1:1 but probably the best you're going to do.
Avatar
Avatar
Andrew Rathbun
Maybe try Obsidian or OneNote? Not 1:1 but probably the best you're going to do.
Thanks Andrew!
Avatar
Andrew Rathbun 10/18/2021 5:26 AM
@Magnet Forensics can someone from the AXIOM Process side of thing (Product Manager or otherwise) send me a PM so I can run something past you? (edited)
Avatar
Avatar
Andrew Rathbun
@Magnet Forensics can someone from the AXIOM Process side of thing (Product Manager or otherwise) send me a PM so I can run something past you? (edited)
Morning @Andrew Rathbun passed the request along to the team. Someone will be in touch soon.
👍 1
Avatar
Do we have any reps from Griffeye on the server?
Avatar
@Griffeye
👍 2
Avatar
figured may be quicker on here than help portal.
Avatar
rugby_tech#7130 10/19/2021 1:43 PM
Any individuals from Hampshire DFU present? I need a contact, if possible to reach out to regarding a private company who you may have dealt with previously.
📩 1
Avatar
Hi, Does anyone know if there is a diff module for autopsy? I would like to compare two images to the which files have been changed. If there is any other open source project as well, id love to look into those. I need the files that has been altered to be highlighted somehow. So far I havent found anything but the Golden Image module, which I could not make work.
Avatar
So, I use UFED/PA a lot as I'm sure many of you do as well. It's a good tool, my biggest gripe is the slow project opening times and the propensity to crash. Today, I lost a few hours into a project that takes over an hour to open. I save relatively often but I still lose some work when it crashes and then it takes over an hour to open back up again. Nothing is failing in the trace window and my computer is no slouch, I'm just wondering if anyone has discovered any tricks to making the software more reliable?
2:04 PM
I've got an i9 7900X, 64GB RAM and a GeForce 1050Ti. It's a few years old but should still be plenty of computer to run the software.
Avatar
MrTurdTastic 10/20/2021 2:02 AM
@Law Enforcement [UK] Anyone got a contact or email for Instagram data? Specifically access logs from a victim's account
Avatar
Avatar
MrTurdTastic
@Law Enforcement [UK] Anyone got a contact or email for Instagram data? Specifically access logs from a victim's account
You will need to speak with your SPOC. IG has a law enforcement portal for these types of enquiries
Avatar
MrTurdTastic 10/20/2021 2:06 AM
Yeah apparently they know sod all about it which is a ballache
🤣 1
Avatar
They should be able to access CD Services which has a list of the types of data they can get. They can also engage with the National knowledge and engagement team for more esoteric questions. You can definitely get IP login history via an IPA event data application.
4:02 AM
Also, be aware of the criminal offences that can be committed by requesting communication data if you’re not a SPOC 😉
Avatar
Hello all, I've been asked questions about FindMy Offline Tracking. We have a covert site for exhibit storage and there has been raised concerns that the new iOS Feature will disclose this location due to the high amount of phones being stored (Which may not have been powered off correctly) and employees devices which would be live. would this pose a risk? and aside from faraday environment is there any other solutions to mitigate this?
Avatar
guys can you help me take data out of my bad drive???
Avatar
Well finally got the magnetic closure Faraday cases made. Only 6 months late 🤣 . https://mtdfe.com/products/new-advanced-faraday-mag-case-tablet-sized
🧲 Strong magnetic closure 📴Cellphone and tablet RFID signal blocking case with padding to protect your devices.📴Perfect for large tablets and large phones + cases.  It will even house a small laptop such as a Chromebook.📴Compatible with Apple and Android devices.📴Isolates mobile devices to help prevent remote erasing w
8:33 AM
There are free cases on the site as well if you check out the catalog. I pay for everything. Plz only 1 ea.
👍 1
Avatar
Avatar
LAmbrose
Hello all, I've been asked questions about FindMy Offline Tracking. We have a covert site for exhibit storage and there has been raised concerns that the new iOS Feature will disclose this location due to the high amount of phones being stored (Which may not have been powered off correctly) and employees devices which would be live. would this pose a risk? and aside from faraday environment is there any other solutions to mitigate this?
iOS devices are placed within anti static Faraday bags to block any signals when at our sites. This stops / reduces the chances of your devices talking to the exhibits.
Avatar
Also - if you find yourself running out of actual bags to store devices long term until the battery finally dies, buy some nice tinfoil for those devices that need long term storage.
this 1
Avatar
jwatson7428 10/20/2021 3:15 PM
Can anyone one in here give me their opinion on the proper way to express numbers in forensic reports (ie; 1-9/10 written, written up to two words then numeric, etc)? It seems that my peers have mixed opinions and was wondering if I could get an "industry standard" point of view. I have referenced APA, Chicago, and MLA, as well as tried to find answers online, but there are a lot of opinions. Just looking for a bit more of a definitive answer than I currently have. TIA
Avatar
I don’t know specific to DFIR but through college it was always write out zero-ten and then use numbers for the rest.
3:26 PM
What do folks here use for in-field write blocking of nvme drives? The tableau bridge is $$$$ and I’m leaning towards getting a USB enclosure and using my existing USB write blocker. I’d never get around the controller anyhow so trim etc don’t seem to matter here.
Avatar
Avatar
jwatson7428
Can anyone one in here give me their opinion on the proper way to express numbers in forensic reports (ie; 1-9/10 written, written up to two words then numeric, etc)? It seems that my peers have mixed opinions and was wondering if I could get an "industry standard" point of view. I have referenced APA, Chicago, and MLA, as well as tried to find answers online, but there are a lot of opinions. Just looking for a bit more of a definitive answer than I currently have. TIA
Andrew Rathbun 10/20/2021 4:21 PM
Hopefully my response will be relevant to what you're asking, but I apologize if its not in advance. We usually say "....observed ten (10) endpoints where Cobalt Strike was...."
this 4
Avatar
I'm looking for a better way to handle investigative datasets of facilities (account details, IP history, phone numbers, addresses) that is currently stored in a spreadsheet. On top of static spreadsheets, almost all of my cases involve multiagency with no shared storage/network connectivity. I want to move this format to a database and I think Neo4j would be perfect. Is anyone using Neo4j to store case data and to track relationships for large cases?
Avatar
4JSN6🇬🇧 10/21/2021 3:06 AM
Just had a question, a new update to iPhones allow phones to be remotely wiped when in an off state? Is this true? I’m guessing it has something to do with their ultra wideband technology?
Avatar
Avatar
4JSN6🇬🇧
Just had a question, a new update to iPhones allow phones to be remotely wiped when in an off state? Is this true? I’m guessing it has something to do with their ultra wideband technology?
Ross Donnelly 10/21/2021 4:21 AM
@CLB_joshhickman1 did some testing in this channel recently and couldn't get it to wipe whilst turned off - the UWB seemed to be limited to only tracking the device (for now)
Avatar
4JSN6🇬🇧 10/21/2021 4:33 AM
Interesting! And wildly concerning at the same time 😅
4:33 AM
thanks @Ross Donnelly
Avatar
Hello! I am researching different standards that are related to digital forensics, and i have found the ISO series, SWGDE standards and NIST so far. Do you know of any other standards that might be relevant?
Avatar
Avatar
Anders
Hello! I am researching different standards that are related to digital forensics, and i have found the ISO series, SWGDE standards and NIST so far. Do you know of any other standards that might be relevant?
Those are the major ones in terms of "standards" if you expand your research to practice guides and procedures you should turn up some other sources or see where the adopted the ones you already found. ACPO - Association of Chief Police Officers is an example.
👍 1
Avatar
Hi All, I am currently completing one of my DFIR Uni assignments, we have been tasked to pull evidence out of a computer image. I am currently attempting to pull emails, the target was using the Windows 10 Mail app and I attempting to recover any sent/received emails. The Unistore/UnistoreDB is clean and there are no emails present. In the EFMData folder there are a couple of emails however this is not a complete list. Researching the HxStore.hxd file (https://boncaldoforensics.wordpress.com/2018/12/09/microsoft-hxstore-hxd-email-research/) and reading it with a hex editor has allowed me to manually pull out fragmented and mildly corrupted emails. I was wondering if anyone had any insight into tools I could use to automate this process or even correct the corrupted emails I have already? Thanks.
Possible additional Windows Live Mail message location? Up until Windows 10, you could find email-related files with the extension “.EML”.  These files presented the opportunity for ema…
Avatar
Avatar
yddeT
Hi All, I am currently completing one of my DFIR Uni assignments, we have been tasked to pull evidence out of a computer image. I am currently attempting to pull emails, the target was using the Windows 10 Mail app and I attempting to recover any sent/received emails. The Unistore/UnistoreDB is clean and there are no emails present. In the EFMData folder there are a couple of emails however this is not a complete list. Researching the HxStore.hxd file (https://boncaldoforensics.wordpress.com/2018/12/09/microsoft-hxstore-hxd-email-research/) and reading it with a hex editor has allowed me to manually pull out fragmented and mildly corrupted emails. I was wondering if anyone had any insight into tools I could use to automate this process or even correct the corrupted emails I have already? Thanks.
I should note, I have already found numerous emails within "HxStore.hxd" that were not present in EFMData that have either been removed or just are stored somewhere I am unable to find them.
Avatar
@yddeT What tools did your professor recommend ?
Avatar
Avatar
DCSO
@yddeT What tools did your professor recommend ?
I am currently using Autopsy in conjunction with FTK Imager, they have recommended MailXaminer and a few other tools to process these email files. However, our workshops were on Outlook .pst files and there are none present with the assignment so I'm just researching and going from there at the moment.
Avatar
@yddeT Autopsy is a great too, I would also look at @Arsenal Recon Arsenal Image Mounter https://arsenalrecon.com/products/ I believe the freeware version should work for education and is slightly better than FTK Imager in my opinion.
Avatar
Avatar
DCSO
@yddeT Autopsy is a great too, I would also look at @Arsenal Recon Arsenal Image Mounter https://arsenalrecon.com/products/ I believe the freeware version should work for education and is slightly better than FTK Imager in my opinion.
I'll take a look, thanks.
Avatar
If I wanted to add a line to a search warrant to get the logs from an iPhones KnoledgeC how would you phrase it? The best I can think of is “logging of application usage from (time X to time Y)”
6:11 AM
But that wouldn't include screen unlocks and plugging in though...
Avatar
Why not specifically mention KnolodgeC in your warrant? You may also have to include a paragraph explaining what KnolodgeC is and what information it contains, but that seems like the most straightforward.
👍 1
Avatar
To be honest, I'd have to admit its not clear to me what the extent of the database is in order to explain it elegantly, and without loosing them in the weeds. But I appreciate your suggestion and will look into this option today. (edited)
👍 1
Avatar
@GRIZZ typically we don't get that detailed on what you are searching for like "SQLite database area" blah blah, it should be "device usage including locations and app data usage related to the homicide investigation occuring on January 1st 2020" etc... Just my 2 cents
this 5
Avatar
This server is obviously a great resource for many people. I have my own server and think it would be really cool to benefit from following the Newsfeed channels. It also would provide a way for members of my server to automatically find this server and recognize the news sources as notable DFIR news. Could a mod consider this feedback and potentially allow us to use the Follow integration (Discord feature)? Thanks! Tagging @Andrew Rathbun to coordinate.
Avatar
Avatar
Swiz
This server is obviously a great resource for many people. I have my own server and think it would be really cool to benefit from following the Newsfeed channels. It also would provide a way for members of my server to automatically find this server and recognize the news sources as notable DFIR news. Could a mod consider this feedback and potentially allow us to use the Follow integration (Discord feature)? Thanks! Tagging @Andrew Rathbun to coordinate.
Andrew Rathbun 10/22/2021 12:15 PM
Sure, what is needed from my end? Are you currently unable to Follow one of those channels?
12:15 PM
Let me know which cord I have to trip over in the Server Room to fix things 😛
Avatar
Avatar
Andrew Rathbun
Sure, what is needed from my end? Are you currently unable to Follow one of those channels?
I believe this means you have to enable it per channel. For example, if you go to this Arduino server, you will see a Follow ability under #\announcements.
Avatar
Looks like the requested channels has to be considered an announcement channel, which I don’t think ours are currently configured that way. (edited)
Avatar
Andrew Rathbun 10/22/2021 12:21 PM
Avatar
Yup there it is!
Avatar
Andrew Rathbun 10/22/2021 12:22 PM
I don't see any reason not to do this
12:22 PM
I can change each one in DFIR Newsfeed category
12:23 PM
unless @Jobbins you wanna start from bottom, I'll start from top?
Avatar
I do'nt think it changes anything
Avatar
I think we could do our announcement and news feeds channels
Avatar
Andrew Rathbun 10/22/2021 12:23 PM
agreed, nothing more needed really
Avatar
Exactly
Avatar
It DOES allow others to follow your server indirectly. The pros of this are others not having to join the server, but with the easy pointer to it if they want to. Yup, just for the news channels 🙂
12:24 PM
However, I do encourage that also for the actual announcement channels.
Avatar
Andrew Rathbun 10/22/2021 12:24 PM
I'll start with #13cubed and you wanna start with #this-week-in-4n6 ?
Avatar
Yup sounds good
Avatar
Andrew Rathbun 10/22/2021 12:24 PM
#announcements has been changed now
Avatar
Gaming and other types of communities often do this as a way for people to easily follow when a new release, bug fix, event, etc is available.
12:25 PM
I'll let you know when the above works for the news channels 🙂
12:25 PM
Appreciated! Now I won't have to constantly invite ppl invidually to the server 😉
Avatar
Andrew Rathbun 10/22/2021 12:25 PM
@Swiz try now
12:25 PM
might need to ctrl+r
Avatar
they show the megaphone icon now on my screen
12:26 PM
yup
12:26 PM
mega
Avatar
Andrew Rathbun 10/22/2021 12:26 PM
👍 thanks for speaking up
👍 4
Avatar
How it looks
Avatar
Andrew Rathbun 10/22/2021 12:39 PM
very cool!
12:39 PM
thanks for sharing
Avatar
Hey guys, I plan to study cybersecurity and this question is not exactly forensics related but is C used elsewhere in cybersecurity besides writing exploits (if you're pentesting)? I believe any unique tooling required would likely be written in something like Python but I'm not sure. (edited)
Avatar
Deleted User 10/23/2021 12:07 AM
Sure, like reading decompiled C code while reversing vulnerabilities, exploits, and malware
12:08 AM
At least that's why I plan on studying it
12:09 AM
Besides that, you could contribute to projects written in C
Avatar
I see, thanks.
12:21 AM
I C*
😂 2
12:21 AM
Thought I'd try learn a bit of C before starting uni
12:26 AM
Just realised I forgot to ask if we were going to cover assembly in the uni course
Avatar
C has kinda always been the default for digging deep into the OS. Historically all the really good libraries for systems type programs were available for C. Its also typically easy to statically compile, so usually you can just run system type utilities without having to install a bunch of dependencies. Having said that... I am finding GoLang to be a decent alternative. I thing C is still better, but GoLang is easier and pretty powerful.
Avatar
Go's syntax threw me off a little
12:33 PM
I'm a bit picky when it comes to the style of syntax
12:33 PM
Same reason I didn't like python and went for JS instead (edited)
12:36 PM
Not sure if anyone here has experience in the pentesting industry, but is it common for roles to include a bit of physical security too? (edited)
Avatar
Hello everyone, I'm currently doing my dissertation on Threat Intelligence for SOC. I'm currently doing research around preventing SOC fatigue through the use of machine learning to help reduce false positive and aiding incident response times. To those working as a SOC analyst, this question is for you. From a security operations perspective, what are some of the biggest challenges you face working as as a SOC analyst when comes to dealing with threat intelligence feeds ? realistic Insights will greatly benefit and add value to what I'm doing as this is a big issue within the security community being able to change the way we look threat intelligence will not only aid SOCs and Incident response teams but also truly help protecting infrastructure including banks, hospitals and other cooperate companies who have a security dedicated teams. (edited)
Avatar
@$CozyBear I may have some feedback regarding your main question, but can I DM my information?
Salute 1
Avatar
Avatar
Squiblydoo
@$CozyBear I may have some feedback regarding your main question, but can I DM my information?
@Squiblydoo Yes that would be amazing, please do
👍 1
Avatar
question Any recommendations for a 3rd party decryption tool that can be used in a ransom recover activity? One that can be scaled and deployed well across Enterprise network?
Avatar
I was going to say hashcat but I thought it was too sarcastic xD
😅 1
Avatar
Avatar
equation
question Any recommendations for a 3rd party decryption tool that can be used in a ransom recover activity? One that can be scaled and deployed well across Enterprise network?
MrTurdTastic 10/25/2021 4:33 AM
Try enquiring with Crypto Sheriff https://www.nomoreransom.org/crypto-sheriff.php
To help us define the type of ransomware affecting your device, please fill in the form below. This will enable us to check whether there is a solution available. If there is, we will provide you with the link to download the decryption solution.
Avatar
I've tried to look this up, but... Does anyone know the format of Axiom .kws (keyword list) files? I'm simply not able to find a description or examples.
Avatar
Avatar
Andbern
I've tried to look this up, but... Does anyone know the format of Axiom .kws (keyword list) files? I'm simply not able to find a description or examples.
Andrew Rathbun 10/25/2021 6:25 AM
What's the file header?
Avatar
I'm not so sure there is a header. It's the file format Magnet Axiom uses to add keywords that it then again is run against the evidence. I looked for a "questions about tools" kinda channel but this general one seemed tobe the closest.
Avatar
Has anybody seen or dealt with the Jupyter backdoor in the wild?
7:06 AM
Not a Jupyter notebook vulnerability, rather the generally called "Jupyter Infostealer/Backdoor" or "Jupyter loader"
Avatar
Avatar
Andronidas
Has anybody seen or dealt with the Jupyter backdoor in the wild?
Yes, I do a lot of research into Jupyter Infostealer
7:34 AM
I've seen it in numerous client environments and have it in a lab.
Avatar
Avatar
Squiblydoo
Yes, I do a lot of research into Jupyter Infostealer
Hey Squibly, didn't know you participated in here
8:06 AM
Is it ok if I dm you?
Avatar
Avatar
Andronidas
Hey Squibly, didn't know you participated in here
Yes, go ahead and DM. I haven't really posted in the server previously, just been lurking.
Avatar
Roger that, ty
Avatar
I see it a lot
Avatar
Can I ask what capacity you work in, rayeh, and what actions you take for mitigation/response? (edited)
Avatar
IR for academic medical, usually users looking for various documents (personal and work related), we contain/re-image at minimum and investigate more depending on how much was allowed to run or data residing /processed on device
8:23 AM
recently it hasn't been able to proceed beyond setting up persistence, with the persistence mechanism being blocked by behavioral engine
Avatar
OK, good to know. I try to download it every week and upload it to a few places to keep detection up. Microsoft has been good at stopping the setup script right now.
8:26 AM
They started dropping their infostealer again this week, but it also has high AV detection rates.
Avatar
yeah, I saw that when I grabbed one last week
👍 1
8:27 AM
yeah I see your comment on the dll I uploaded last week on VT
Avatar
Ah nice. I was glad to see someone else had grabbed it and uploaded both DLL. :)
Avatar
they changed their powershell loader from what I usually see from the bxor to gzip but it doesn't seem to have done any favors
8:29 AM
at least with falcon
Avatar
That is good to know.
Avatar
I'd love it if users would pause a bit more when searching
8:30 AM
their strategy seems very effective from what we see, of people at least attempting to grab it
8:32 AM
so far I haven't really observed them do much of anything
8:32 AM
have either of you?
Avatar
Likewise. I read pretty much everything that gets published about it, and I have not seen anyone who has observed any further activity than stealing information.
Avatar
Avatar
Andbern
I've tried to look this up, but... Does anyone know the format of Axiom .kws (keyword list) files? I'm simply not able to find a description or examples.
Do you have one already or are you trying to make one?
Avatar
Avatar
rayeh
their strategy seems very effective from what we see, of people at least attempting to grab it
If you would mind pinging me (DMs/Twitter), when you find new samples, it would be appreciated. Even just a VT link would be appreciated. Of the researchers I know, I am being the most agressive with tracking, documenting, and reporting aspects of the malware. However, I do my malware research as an independent, so additional sources of information are appreciated. I’ve got some connections with larger research organizations and am passing them intel as well as having my own unique sources of intel.
Avatar
Avatar
Squiblydoo
If you would mind pinging me (DMs/Twitter), when you find new samples, it would be appreciated. Even just a VT link would be appreciated. Of the researchers I know, I am being the most agressive with tracking, documenting, and reporting aspects of the malware. However, I do my malware research as an independent, so additional sources of information are appreciated. I’ve got some connections with larger research organizations and am passing them intel as well as having my own unique sources of intel.
yep will keep you in mind
👍 1
Avatar
Avatar
Andbern
I'm not so sure there is a header. It's the file format Magnet Axiom uses to add keywords that it then again is run against the evidence. I looked for a "questions about tools" kinda channel but this general one seemed tobe the closest.
Ross Donnelly 10/25/2021 12:41 PM
Is it not just a plain text file, with one keyword per line? That's the format I usually use with Axiom when importing a keyword list (but not .kws specifically)
Avatar
That is one way. But by using the mentioned format the other settings (charset, regex/grep) are preserved. Or so the documentation claims. I have yet to find a format description or example of the not-txt option. (edited)
👍 1
Avatar
Avatar
hxz
Not sure if anyone here has experience in the pentesting industry, but is it common for roles to include a bit of physical security too? (edited)
I'm not a pentester, but yes, depending on the security audit required by the company, pentests often require being a spy. Theres a bunch of good stories on the podcast Darknet Diaries from these people. Basically a company might hire you to hack into their computers, and then you have to work yourself into the building and gain access. Or you might be hired as an "intern" and try to work your way to domain admin.
1:51 PM
Really exciting stuff if you are really good at what you do.
Avatar
TyphoidMeredith/Case 10/25/2021 1:51 PM
Can I ask a quick point of order question?
1:52 PM
Wouldn’t pentesting refer to the loud knocking, obvious, noisy attack simulations?
1:53 PM
While trying to be more covert or using tactics extremely close to those of threat actors would more be known as red teaming?
1:54 PM
The entirety of the service offered and executed being an engagement?
1:54 PM
I’m not trying to be pedantic, I just want to make sure I’m not mistakenly thinking I know my terms when I do not
1:55 PM
I wanted to do pentesting and red teaming and all that awhile back
1:55 PM
But DFIR stole me away
Avatar
Andrew Rathbun 10/25/2021 1:55 PM
My impression has been that pentesting is a red team thing, as in pentesting falls under the umbrella of red team duties
⬆️ 1
Avatar
TyphoidMeredith/Case 10/25/2021 1:55 PM
Sounds reasonable too
1:55 PM
You’re probably right
Avatar
Andrew Rathbun 10/25/2021 1:56 PM
i am sure there are other red team things they do besides pentesting that fall under the Red Team umbrella, but honestly, maybe joining the SANS Red Team Discord Server might be a good idea for you to ask those experts
Avatar
TyphoidMeredith/Case 10/25/2021 1:57 PM
Sure, additional knowledge is always welcome. Truthfully, I’m here because this is where I found my passion in security
1:57 PM
DFIR is all about the coolest things, to me
1:58 PM
I really hope I can learn a lot from the experts here
Avatar
Avatar
Andrew Rathbun
i am sure there are other red team things they do besides pentesting that fall under the Red Team umbrella, but honestly, maybe joining the SANS Red Team Discord Server might be a good idea for you to ask those experts
links please
Avatar
Avatar
Cole
I'm not a pentester, but yes, depending on the security audit required by the company, pentests often require being a spy. Theres a bunch of good stories on the podcast Darknet Diaries from these people. Basically a company might hire you to hack into their computers, and then you have to work yourself into the building and gain access. Or you might be hired as an "intern" and try to work your way to domain admin.
Ah yes, I've heard of such stories from my cybersecurity teacher and was wondering if that was still done nowadays The darknet diaries sound interesting, I haven't listened to them yet but I heard that they had some good episodes covering NSO and Pegasus (edited)
Avatar
TyphoidMeredith/Case 10/25/2021 2:02 PM
I watched a pretty damn good talk from Chris Nickerson, mentioning all the names and teams and divisions we have in sec
Avatar
Avatar
Cole
I'm not a pentester, but yes, depending on the security audit required by the company, pentests often require being a spy. Theres a bunch of good stories on the podcast Darknet Diaries from these people. Basically a company might hire you to hack into their computers, and then you have to work yourself into the building and gain access. Or you might be hired as an "intern" and try to work your way to domain admin.
I'm guessing they don't teach that stuff at uni, right?
Avatar
Avatar
hxz
I'm guessing they don't teach that stuff at uni, right?
I did have two classes that went over a bunch of security related practices and how to do OSINT, but no one specifically taught us how to pick a lock or clone a rfid badge lol
Avatar
Avatar
TyphoidMeredith/Case
Wouldn’t pentesting refer to the loud knocking, obvious, noisy attack simulations?
No not necessarily, the idea is not to get caught.
Avatar
Avatar
ryd3v
No not necessarily, the idea is not to get caught.
TyphoidMeredith/Case 10/25/2021 4:49 PM
I suppose yes that is accurate. But as far as my understanding has been and my learning, Penetration Test you can do the easiest and loudest stuff first to see if that’s picked up
4:50 PM
And if it’s not, well that’s a damn big finding already
4:50 PM
So why proceed to the quieter more subtle attacks?
4:51 PM
You already know your engagement isn’t going to involve super stealth techniques, they couldn’t even tell when you were banging on the door
Avatar
General question/poll: I've always run Kali in VMs for ease but also paranoid safety. Is it worth the hassle? Environment 1:
TryHackMe (online but guided, spins up dedicated VMs for you to interact with, has no open team vs. team scenario, provides vpn)
Environment 2:
Scoped-CTF (global online team vs team, maybe red-vs-blue, is scoped to specific challenges and boxes, often there is monitoring for mucking with the challenges/platform itself)
Environment 3:
Non-scoped CTF / bug-bounty programs (HackTheBox or interacting with real environments, possibly where bad actors are more likely to be present, even if just trolling)
Environment 4:
Professional purposes (at your real job, involves your real identity, as contractor or internal infosec, typically assumes safer environment but may have a smaller footprint and test how effective internal endpoint monitoring is)
Environment 5 (this is for entertainment/debate - open thread to discuss):
Personal banking and shopping (VM in VM in VM? USB? Single device? LTE only?)
For polling the community here, use the following emoji: USB = USB virtualbox = VM 🖥️ = native OS
(edited)
6:13 PM
Environment 1 (edited)
USB 1
virtualbox 3
🖥️ 3
6:13 PM
Environment 2 (edited)
USB 1
virtualbox 5
🖥️ 1
6:13 PM
Environment 3 (edited)
USB 1
virtualbox 6
🖥️ 1
6:16 PM
Environment 4 (edited)
USB 1
virtualbox 1
🖥️ 4
6:16 PM
Alternatively, point out if there is another or better way to pentest safely and for the environment/scenario, or if all of this doesn't matter at all.
Avatar
krisc#21223 10/25/2021 6:52 PM
Looking to transition from a paper and camera method to tablets for onscene documentation. Looking to see if anybody has any recommendations. It would be strictly for documentation.
Avatar
Avatar
TyphoidMeredith/Case
So why proceed to the quieter more subtle attacks?
well that's not really the philosophy, red-teaming is designed to simulate an attack or infiltration, so bad guys don't use that methodology right
Avatar
Avatar
krisc#21223
Looking to transition from a paper and camera method to tablets for onscene documentation. Looking to see if anybody has any recommendations. It would be strictly for documentation.
iPad
Avatar
Avatar
krisc#21223
Looking to transition from a paper and camera method to tablets for onscene documentation. Looking to see if anybody has any recommendations. It would be strictly for documentation.
MrTurdTastic 10/25/2021 11:03 PM
Panasonic Toughpads are decent for your typical LE usage
Avatar
Hi, I'm currently using ENCASE for computer's analysis and i'm considering acquiring BELKASOFT X in addition of the first one. Would someone have feedback (benchmark) between those two softwares ? (MacOS imaging with all chips available, data extraction, bitlocked computer for example) Thanks in advance.
Avatar
I have a Samsung A01 Core running Android 10. Both CPU and memory chips are cracked on one corner (the phone has been bent in half). Any amazing gadget out there we could use like a chip fixerer? I am of the opinion it is the end of the road for this phone but just casting my net out there JIC.
Avatar
Anyone give me some advice regarding getting data from an alexa show 5? Never received one before and not sure whats stored on them, if we can get it, and if so, what tools should be used. Thanks
Avatar
Avatar
KR-4n6
Hi, I'm currently using ENCASE for computer's analysis and i'm considering acquiring BELKASOFT X in addition of the first one. Would someone have feedback (benchmark) between those two softwares ? (MacOS imaging with all chips available, data extraction, bitlocked computer for example) Thanks in advance.
Andrew Rathbun 10/26/2021 3:48 AM
Belkasoft X was really fast in my brief testing and the GUI was really nice. I was impressed. I liked how they put the SQLite databases themselves in the examiner's face so they can see the raw data rather than how it's being parsed and presented by the software.
Avatar
Avatar
Zhaan
I have a Samsung A01 Core running Android 10. Both CPU and memory chips are cracked on one corner (the phone has been bent in half). Any amazing gadget out there we could use like a chip fixerer? I am of the opinion it is the end of the road for this phone but just casting my net out there JIC.
Andrew Rathbun 10/26/2021 3:49 AM
#mobile-forensic-extractions
Avatar
Avatar
Artea
Anyone give me some advice regarding getting data from an alexa show 5? Never received one before and not sure whats stored on them, if we can get it, and if so, what tools should be used. Thanks
Andrew Rathbun 10/26/2021 3:49 AM
I'd probably try the same channel too ^
Avatar
chipapa1974 10/26/2021 5:46 AM
Hi Guys, What software can I use to repair corrupt Audio files (aac, mp3, m4a)?
Avatar
@Magnet Forensics and anyone else who wants to chime in, is there a way to create a portable case in Axiom that contains artifacts filtered to a date range but also include all artifacts which have no timestamp at all? I'm trying to adhere to some frustratingly specific terms in a search warrant but I seem to be running up against a wall on this... (edited)
Avatar
Avatar
chipapa1974
Hi Guys, What software can I use to repair corrupt Audio files (aac, mp3, m4a)?
Digitalferret 10/26/2021 6:55 AM
what's the back story ie the source of the files? if it' from a data recovery it's less likely to be corruption and more fragmentation? (edited)
Avatar
Avatar
n3ls0n
@Magnet Forensics and anyone else who wants to chime in, is there a way to create a portable case in Axiom that contains artifacts filtered to a date range but also include all artifacts which have no timestamp at all? I'm trying to adhere to some frustratingly specific terms in a search warrant but I seem to be running up against a wall on this... (edited)
If you use your filters to get things down to a dataset you want to add to a portable case you can tag it and include it. In other words add a "no Dates" tag to the files that dont have dates you have determined and then Tag the files that are in your date range with "Dates within range" and then when you generate your portable case you can check all
7:28 AM
that apply
Avatar
That should work, though it is a little effort intensive. I'll give it a go. Thanks @Jamey
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 10/26/2021 7:56 AM
#training-education-employment
Avatar
Avatar
Andrew Rathbun
#training-education-employment
My bad
Avatar
Anyone know a similar server but for red team/ pentesting?
Avatar
Avatar
Swiz
links please
@hxz Check out this thread for multiple cyber Discord servers.
Avatar
Avatar
hxz
Anyone know a similar server but for red team/ pentesting?
DM me
Avatar
Avatar
Digitalferret
what's the back story ie the source of the files? if it' from a data recovery it's less likely to be corruption and more fragmentation? (edited)
Hi, the files are from data recovery, they were deleted from the folder created on the desktop and also deleted from recycle bin. I run a recovery software and managed to recover the entire files from the recycle bin but those files were all corrupted. I tried several data recovery softwares but same results. My next step is to try repair those corrupted audio files recovered which I am asking for someone who knows a tool that can help to repair the files.
Avatar
Avatar
chipapa1974
Hi, the files are from data recovery, they were deleted from the folder created on the desktop and also deleted from recycle bin. I run a recovery software and managed to recover the entire files from the recycle bin but those files were all corrupted. I tried several data recovery softwares but same results. My next step is to try repair those corrupted audio files recovered which I am asking for someone who knows a tool that can help to repair the files.
Digitalferret 10/27/2021 12:42 AM
it may not be as simple as that. with fragmentation the files can be stored on the (HDD) disk as many much smaller files. if the recovery software recovers via a file table/index it will pick up all the fragmented parts, much like the normal file system would and reassemble as a full file. (edited)
12:44 AM
if the data are "carved" using header info, the software may only pick up the first so many bytes and you will have that and an undetermined size after of garbage found at that disk location as there will be no means to pick up the other scattered fragments.
12:45 AM
this is for spinning hard disks. solid state drives store files as fragments regardless so it's even worse in that respect. that's my understanding of it anyway.
12:46 AM
given that, you may not be able to repair the file because the original data are not intact in the file that is recovered. it isn't so much corrupt, as just garbage with a good file header at the front (edited)
Avatar
Avatar
ryd3v
DM me
Doesn't let me lol
🤣 1
Avatar
Avatar
Andrew Rathbun
Belkasoft X was really fast in my brief testing and the GUI was really nice. I was impressed. I liked how they put the SQLite databases themselves in the examiner's face so they can see the raw data rather than how it's being parsed and presented by the software.
Thanks for your feedback
Avatar
Anyone know of any good, yet cheap, portable USB harddrives which come with either port covers or a carrying case? Preferably at least 1TB and on reputable sites like Amazon. Thanks. (edited)
Avatar
Avatar
hxz
Anyone know of any good, yet cheap, portable USB harddrives which come with either port covers or a carrying case? Preferably at least 1TB and on reputable sites like Amazon. Thanks. (edited)
I use this one and it's great https://www.canadacomputers.com/product_info.php?cPath=179_1160&item_id=139023 Sure you can find it on Amazon
ORICO NVMe M.2 SSD Enclosure 10Gbps, Silver (ORICO TCM2-C3-SV-BP)
Avatar
I think that's only an enclosure, also sadly out of my budget 😦
Avatar
Avatar
ryd3v
I use this one and it's great https://www.canadacomputers.com/product_info.php?cPath=179_1160&item_id=139023 Sure you can find it on Amazon
Btw, don't you get data loss if SSD's are unpowered for like a week
Avatar
Andrew Rathbun 10/27/2021 11:45 AM
I plugged in a SSD from like 3 years ago earlier this year, still had data on it
Avatar
Yep, I've plugged in SSDs from years ago, nothing changed.
11:50 AM
Also nvmes are 'non-volatile'
11:50 AM
Basically a big fast usb stick xD
💯 1
Avatar
I was referring to this, I'm guessing that's probably a rare chance
Avatar
Yeah I don't know where that is from, but it's incorrect
Avatar
Andrew Rathbun 10/27/2021 11:51 AM
I guess anything's possible but yeah sounds very wrong to me (edited)
Avatar
I always thought that was true lol, so I was scared to use SSDs for important data
Avatar
Andrew Rathbun 10/27/2021 11:53 AM
Nowadays, cloud storage is so cheap/free. Important stuff should be backed up ideally using the 3-2-1 rule, but even a free Google or Microsoft account will give you 15GB or so of free storage. I don't think those companies are going away anytime soon
Avatar
SSDs don't last forever but they do have a shelf life, doesn't mean the data magically disappears, but data loss is a factor over time, something like 10 years, or a certain amount of read, write cycles, I found this article that has a few good facts, although, ssd manufacturers consistently update their hardware and software, there is also space reserved on a ssd for this reason, https://www.ontrack.com/en-ca/blog/how-long-do-ssds-really-last Don't quote me on any of the information in the article, I just skimmed it, but it seems to be pretty standard info *Edited because my phone keyboard hates me 😂 (edited)
Recovering data from failed SSDs is still more challenging than HDDs for data recovery service providers. Read more about the SSD lifespan.
12:00 PM
is it safe to buy second hand hard drives? (edited)
Avatar
Andrew Rathbun 10/27/2021 12:01 PM
Define "safe". You could buy a used drive, carve for files and find some shady stuff on it. Or, you could review the SMART data and it could have 100000 power on hours and then you know it's closer to the end of its life than the beginning lol
12:01 PM
The answer is always "it depends"
this 4
Avatar
Was talking about the latter but would be fun to try run Autopsy or smth on it lol
12:01 PM
Was gonna use it for my main backup
Avatar
Andrew Rathbun 10/27/2021 12:02 PM
Could be fun, could also be a piece of evidence for your local PD's evidence room 😆
Avatar
I dumpster dive often 😂
Avatar
"It depends..."
12:09 PM
The best answer because it is always right!
Avatar
Good enough
12:13 PM
Only reason I'm buying an external drive is cause I can't trust my current backup one, about a week ago it randomly stopped working, Windows kept telling me it's unable to write to it, I then restarted the pc and it took a solid 2 minutes to load the HDD (edited)
Avatar
Avatar
ryd3v
I dumpster dive often 😂
I'm sure there's cool stuff to find, but I'm not gonna bother unless I have a spare hazard suit lying around
12:14 PM
I'm not good around bugs and stuff
Avatar
Avatar
hxz
Only reason I'm buying an external drive is cause I can't trust my current backup one, about a week ago it randomly stopped working, Windows kept telling me it's unable to write to it, I then restarted the pc and it took a solid 2 minutes to load the HDD (edited)
Cloud backups? 🤔
Avatar
Sounds expensive 👀
12:14 PM
Or rather
Avatar
Avatar
hxz
I'm not good around bugs and stuff
Yeah, electronic dumps usually are pretty bug free but yolo (edited)
Avatar
I'm like 80% sure I won't be able to pay the monthly fees because my bank often drops to periods of below £10 (edited)
Avatar
Interesting, there are lots of free online storage available, and if you have concerns about the data, just encrypt it locally before you back it up to the cloud.
Avatar
there are lots of free online storage available
I have about 800gb worth of stuff to back up, the free ones usually provide like 2gb max
12:22 PM
But I like have an offline backup too
12:22 PM
When I'm more financially stable I'll likely look into cloud backups too (edited)
Avatar
Anyone know how to exclude OS pics from the Media tab in Axiom?
Avatar
Avatar
Trashboat667
LG 125DL Classic Flip. Is this phone possible? It’s a flip phone and I can’t figure out how to get into debug or if it’s even possible
Ever have any luck with this?
Avatar
Avatar
Forgedmom
Ever have any luck with this?
Trashboat667 10/27/2021 1:59 PM
Avatar
Avatar
Jogoyo
Anyone know how to exclude OS pics from the Media tab in Axiom?
If you use the NSRL Hash Database to exclude files, I think that will exclude those pics
Avatar
PSA: There seem to be an ongoing phishing campaign to target discord user via the link "discorde[.]gift". Be aware (edited)
Avatar
Avatar
abefroman
If you use the NSRL Hash Database to exclude files, I think that will exclude those pics
Awesome! Thanks!
Avatar
So... we did this and now the phone wont even turn on... any ideas?
Avatar
Avatar
Forgedmom
So... we did this and now the phone wont even turn on... any ideas?
Trashboat667 10/28/2021 12:59 PM
Is the phone plugged into UFED? It may actually be on and in EDL. The screen is just black. (edited)
Avatar
Avatar
Trashboat667
Is the phone plugged into UFED? It may actually be on and in EDL. The screen is just black. (edited)
We arent sure what happened. But we shut it all down, rebooted, and started again. Ended up with a partial extraction. Cannot seem to get SMS off the device. These older phones are a real PITA
Avatar
Avatar
Forgedmom
We arent sure what happened. But we shut it all down, rebooted, and started again. Ended up with a partial extraction. Cannot seem to get SMS off the device. These older phones are a real PITA
Trashboat667 10/28/2021 3:20 PM
It worked when we did it. However that was several ufed versions ago
Avatar
Original message was deleted or could not be loaded.
test comple :: please change password now Rebooting in 3,2,1 ... Connection lost
Avatar
@Forgedmom when you plugged the phone in to a computer and look in the device manger do you see a "Qualcomm" connection ? if so you are in EDL and should be able to pull it.
👍 1
Avatar
For someone trying to really figure out what they want to do in cyber security space, I know there are a ton of options ( i have no comp sci/ computer background). I am using cybrary.it so far and really enjoying it but always lookinga for more ways to learn if anyone has suggestions (looking for more beginning level / intro stuff till I know more)
Avatar
So I dropped an executable into virustotal and it came back with 0 detected viruses, yet windows defender for some reason quarantined on my pc few days ago when i downloaded it and said it was a trojan the executable does nothing virus-like, it doesn't even connect to the internet, mainly just does some calculation, so I have no clue why it was flagged does the method of downloading a file also determine whether it gets flagged? Because when it got flagged, it was immediately after I downloaded it via powershell
Avatar
@Roll4Combat #training-education-employment
Avatar
Thank you must have missed that @DCSO ty
Avatar
Avatar
hxz
So I dropped an executable into virustotal and it came back with 0 detected viruses, yet windows defender for some reason quarantined on my pc few days ago when i downloaded it and said it was a trojan the executable does nothing virus-like, it doesn't even connect to the internet, mainly just does some calculation, so I have no clue why it was flagged does the method of downloading a file also determine whether it gets flagged? Because when it got flagged, it was immediately after I downloaded it via powershell
Digitalferret 10/29/2021 1:20 PM
download it via alternate means and check?
Avatar
I already pressed allow on windows defender
1:23 PM
I later removed the exemption and downloaded again via the same method
1:24 PM
But it didn't flag this time
1:24 PM
I'll try it on a vm or smth and see wagwan
Avatar
There's the possibility it's packed, and has routines to detect if it's running in a sandbox and not unpacking
7:24 AM
I would expect that to raise the score on a couple of vendors though
Avatar
Hey, I'm trying to run FTK Imager Lite and it's telling me that "An administrator has blocked you from running this app", my account is the only account on this computer and also has administrator privileges so I'm not sure why I'm being blocked
4:30 AM
Oh apparently it's to due with it being an old version, I'll try a newer version (edited)
Avatar
Andrew Rathbun 10/31/2021 4:30 AM
FTK Imager Lite has been updated in 11 years. You're likely using the most updated version
Avatar
Is there no portable up-to-date version of the regular ftk imager?
Avatar
Andrew Rathbun 10/31/2021 4:33 AM
Some people turn FTK Imager (not Lite) into a portable version but I'm not personally up on that method. Would be worth a blog post if one doesn't exist already. Try searching in this server for instructions as I know it's been talked about before
4:33 AM
I recall trying the method a couple years ago and I always ran into some missing DLL issue or something like that. I just moved on 🤷‍♂️
4:33 AM
Technically it should work if you just dropped the whole accessdata folder where it's installed onto a usb, right?
Avatar
Andrew Rathbun 10/31/2021 4:34 AM
In theory yes but in practice it didn't work for me but it worked for others, so likely something I did wrong
Avatar
I don't think they even do Lite anymore.
Avatar
Andrew Rathbun 10/31/2021 4:47 AM
It's still available for download but it's not been touched in over a decade
Avatar
Ye, sounds about right. Speaking from experience, good ol regular FTK imager is fine.
4:48 AM
I've used it effectively in a portable stance albeit it not the latest.
Avatar
Avatar
hxz
Technically it should work if you just dropped the whole accessdata folder where it's installed onto a usb, right?
No, you need to copy some DLL files too. There is a list on their site, but they don't mention all of the DLL files required.
5:26 AM
Question How can I run Imager from a portable drive?   Answer Prerequisites: A computer other than the target system Procedure: On a machine other than the system to be imaged, install FTK Imager Insert a flash drive formatt...
Avatar
exploit.quest 10/31/2021 9:25 AM
Hey guys, so say you have some internal tools running locally and you wanted people to easily access it whilst connected to your vpn, so instead of typing out the IP for the service say I wanted them to use a subdomain, i.e. admin.hxz.wtf Now, I've tried adding a DNS A record for admin which points to 10.8.0.2, which works fine but is that normally how you'd so something like that? If someone accesses it and they're not connected to the vpn, it would technically point to a service on their local network right? not really a problem but a bit weird imo
9:25 AM
not exactly forensics related but I'm guessing you guys would have some idea about how that stuff usually works
Avatar
Avatar
exploit.quest
Hey guys, so say you have some internal tools running locally and you wanted people to easily access it whilst connected to your vpn, so instead of typing out the IP for the service say I wanted them to use a subdomain, i.e. admin.hxz.wtf Now, I've tried adding a DNS A record for admin which points to 10.8.0.2, which works fine but is that normally how you'd so something like that? If someone accesses it and they're not connected to the vpn, it would technically point to a service on their local network right? not really a problem but a bit weird imo
Ross Donnelly 10/31/2021 1:18 PM
The A record would usually be published only on your internal DNS. This means the correct IP is presented when connected to the VPN (so internal DNS is accessible), but would simply fail to resolve when not connected.
Avatar
exploit.quest 10/31/2021 1:29 PM
Okay thank you, what's common practice for urls to internal services?
1:29 PM
I was told some people use *.internal.example.com
1:30 PM
is there any other common styles of doing it
Avatar
Avatar
exploit.quest
Okay thank you, what's common practice for urls to internal services?
Ross Donnelly 10/31/2021 1:36 PM
Yeah a subdomain of an externally routable address (like your example) is considered best practice, although some people with legacy domains might not be able to do that very easily.
Avatar
Released my database crawler on github if anyone wants to use it. Useful if you are looking for Ex: a row called latitude or a blob that contains a string. https://github.com/Ogg3/DatabaseCrawler
Finds databases in a directory and then crawls them looking for strings. - GitHub - Ogg3/DatabaseCrawler: Finds databases in a directory and then crawls them looking for strings.
👍 4
Avatar
ForensicDev 11/1/2021 2:39 PM
does anyone know if there is a discord channel for "M365 Defender" which discusses the threat hunting aspect of the product?
Avatar
Avatar
ForensicDev
does anyone know if there is a discord channel for "M365 Defender" which discusses the threat hunting aspect of the product?
Andrew Rathbun 11/1/2021 7:47 PM
#incident-response is probably your best bet (edited)
Avatar
Anyone here familiar with the Cellebrite Touch 2? And doing a bit of troubleshooting? I turn it on I see the windows investigator screen for about 2 seconds shows the dots in a circle loading thing. Then screen goes black. Leave it for hours never comes back try touching screen never a response but when you push the power button on back you see a very quick shutting down circle of dots again then black screen and off. Any ideas?
Avatar
Avatar
Palazar82
Anyone here familiar with the Cellebrite Touch 2? And doing a bit of troubleshooting? I turn it on I see the windows investigator screen for about 2 seconds shows the dots in a circle loading thing. Then screen goes black. Leave it for hours never comes back try touching screen never a response but when you push the power button on back you see a very quick shutting down circle of dots again then black screen and off. Any ideas?
Try a different lead? We tested a new kettle lead recently as ours wouldn't power up properly or charge and found it was the lead.
Avatar
Avatar
Rob
Try a different lead? We tested a new kettle lead recently as ours wouldn't power up properly or charge and found it was the lead.
I did try that, I have 2 units I just got in the mail since the one worked perfect figured swap the cables but no luck. The one that did work once I saw investigator screen it did also go black but for like 10 seconds then the UFED 7.45 loaded up. (Just downloaded 7.49 going to update in a bit) What makes me think it might now be power issue is that hours later when I push the power button it shows shutting down as if it was on the whole time.
12:36 AM
It's also a much longer shutdown time (I say longer it's maybe 5 seconds) but the busted one it is maybe a second or two shutting down maybe a rotation. Of the circle and black screen.
Avatar
Sounds like you need to do an RMA ticket with cellebrite
Avatar
That hurts the soul.
Avatar
Deleted User 11/3/2021 3:17 AM
Hello everyone, i was wondering if it was possible to use usb license dongles over the network using anywhereUSB by Digi, if anyone has any experience please let me know. e: since we have different physical servers and moving around dongles is very hectic with the techs in my company (edited)
Avatar
@Cellebrite is there someone available to talk about the touch 2 and how to get like an ISO for the touch 2? For the Touch 2 mentioned above. I connected a display to it thinking maybe it is trying to display on a separate screen. Sadly it doesn't show. But when I connect a keyboard and do control alt delete and get to task manager I can sign out and see the investigator when when I select sign in black screen. But there is a UFED manager that I don't have the password for. Wondering if there is something more I can do. Really don't want to do an RMA.
Avatar
Avatar
Deleted User
Hello everyone, i was wondering if it was possible to use usb license dongles over the network using anywhereUSB by Digi, if anyone has any experience please let me know. e: since we have different physical servers and moving around dongles is very hectic with the techs in my company (edited)
Yes y havve used it for virtual machine and it woeks very well I have encase ftk oxígen cellebrite and no issues
5:55 AM
They are some software solutions to try the worked to, but is much more easy the digy solution
Avatar
Avatar
Palazar82
@Cellebrite is there someone available to talk about the touch 2 and how to get like an ISO for the touch 2? For the Touch 2 mentioned above. I connected a display to it thinking maybe it is trying to display on a separate screen. Sadly it doesn't show. But when I connect a keyboard and do control alt delete and get to task manager I can sign out and see the investigator when when I select sign in black screen. But there is a UFED manager that I don't have the password for. Wondering if there is something more I can do. Really don't want to do an RMA.
There are ways to recover it. Best way to start is via our support groups. I know before I joined cellebrite I did have to 'restore' a unit. Touch base w/ support@cellebrite.com or via the portal
Avatar
I'll see if I can get the website portal to work. Thanks.
Avatar
If you can't, you can just email them also
Avatar
Avatar
mdogilvie
They are some software solutions to try the worked to, but is much more easy the digy solution
Deleted User 11/3/2021 6:50 AM
yes i have been looking at virtualhere and USBnetworkgate
6:53 AM
thank you btw
Avatar
The only thing to considera is if that hardware fails, it happend to me and we had to do magic to work, we had our lab in hyper v and it didn t recognize the do gles
Avatar
Deleted User 11/3/2021 8:16 AM
U mean if the usb hub fails ?
Avatar
@Magnet Forensics - Is there any way to run AXIOM (not cyber) in an azure vm instance? The sales rep is trying to push cyber and cloud licence server which is what we dont want, as we only have one axiom licence.
Avatar
Avatar
DF51 Shaf
@Magnet Forensics - Is there any way to run AXIOM (not cyber) in an azure vm instance? The sales rep is trying to push cyber and cloud licence server which is what we dont want, as we only have one axiom licence.
Hello Shaf, I believe I know the answer already but, double checking something with my licensing guru's. I will DM you the answer when I get my response...
Avatar
Avatar
Jamey
Hello Shaf, I believe I know the answer already but, double checking something with my licensing guru's. I will DM you the answer when I get my response...
Thank you kindly sir. Appreciate the followup! 🙂
Avatar
Avatar
Jamey
Hello Shaf, I believe I know the answer already but, double checking something with my licensing guru's. I will DM you the answer when I get my response...
I would be interested in this as well. In a very similar situation.
👍 1
Avatar
pathsofglory 11/3/2021 10:44 AM
Does anyone recommend any social media analysis/OSINT tools?
10:46 AM
At this time we are looking at Voyager and Maltego/Shadowdragon (edited)
10:48 AM
oh and Skopenow
Avatar
Avatar
pathsofglory
Does anyone recommend any social media analysis/OSINT tools?
Andrew Rathbun 11/3/2021 12:50 PM
#osint and @7oaster
Cheers 1
Avatar
@Cellebrite - time sensitive question if there’s tech support on right now
Avatar
Hey. Not tech support but can try to help. (edited)
Avatar
Love that support. Thanks for the assist!
Avatar
Avatar
Deleted User
yes i have been looking at virtualhere and USBnetworkgate
I use VirtualHere on a Synology NAS and it works perfectly.
Avatar
(KAOS) ReacherJ 11/4/2021 5:46 AM
Good afternoon everyone. I am working on a European DF project called Formobile and as part of the project they are producing guidance for the Judiciary. I've been asked to provide some case studies that show what we do well and where things have gone wrong. So if anyone is aware of cases in the public domain that cover the following areas - pre-acquisition, acquisition, preparation, analysis and reporting then I'd be really grateful. Feel free to DM me if you want to know more or have any such cases you can share. (edited)
Avatar
Avatar
(KAOS) ReacherJ
Good afternoon everyone. I am working on a European DF project called Formobile and as part of the project they are producing guidance for the Judiciary. I've been asked to provide some case studies that show what we do well and where things have gone wrong. So if anyone is aware of cases in the public domain that cover the following areas - pre-acquisition, acquisition, preparation, analysis and reporting then I'd be really grateful. Feel free to DM me if you want to know more or have any such cases you can share. (edited)
Ross Donnelly 11/4/2021 9:57 AM
SWGDE might cover some of these https://www.swgde.org/
The Scientific Working Group on Digital Evidence (SWGDE) brings together organizations actively engaged in the field of digital and multimedia evidence to foster communication and cooperation as well as to ensure quality and consistency within the forensic community.
Avatar
Morning all, I know this question was asked last year without an answer, but is there any go to GPS expert that forces refer to in the UK at current? @Law Enforcement [UK]
Avatar
MrTurdTastic 11/5/2021 2:11 AM
Not to my knowledge, I'd suggest your local NCA office may know though (edited)
👍 1
Avatar
Avatar
K23
Morning all, I know this question was asked last year without an answer, but is there any go to GPS expert that forces refer to in the UK at current? @Law Enforcement [UK]
Most forces or their ROCU should have an RFPS team. Although they don’t do GPS they may know someone who does. Otherwise NCA expert witness finder
👍 1
Avatar
Thanks all! 👍
3:14 AM
Another one for @Law Enforcement [UK] , how, if at all, are you deploying Cellebrite Reader so that it can be used and accessed on force IT systems? Or at current are you just directing users to view on standalone viewing machines?
Avatar
Avatar
K23
Another one for @Law Enforcement [UK] , how, if at all, are you deploying Cellebrite Reader so that it can be used and accessed on force IT systems? Or at current are you just directing users to view on standalone viewing machines?
We advise to view on standalone machines as a matter of operational security. However, I know of forces that allow it on standard networked machines also. Its a matter of internal policy.
Avatar
MrTurdTastic 11/5/2021 3:19 AM
@Magnet Forensics Any of you lovely chaps at the Tech Talk in London next week? Be good to network
Avatar
hello everyone, for those who use cellebrite, have you encountered problems concerning the "openjdk platform binary" process which makes the CPU go to 60/70% while not using the ufed4pc / PA software?
4:03 AM
@Cellebrite
Avatar
Avatar
RW_Digital
We advise to view on standalone machines as a matter of operational security. However, I know of forces that allow it on standard networked machines also. Its a matter of internal policy.
In the past we have directed to use standalone but these machines are not widely supported by IT and come in varying shapes and sizes, and arguably more of an operational security concern as these are not managed. With deployment on standard network machines, was more looking for technical details as we have hit a few road blocks with the more recent releases of reader unfortunately.
Avatar
Avatar
K23
Another one for @Law Enforcement [UK] , how, if at all, are you deploying Cellebrite Reader so that it can be used and accessed on force IT systems? Or at current are you just directing users to view on standalone viewing machines?
We deployed it and XAMN Viewer through IT and the Force Software Centre, built into Windows enterprise. New version releases were tested by IT and pushed out for users to install locally. Seems to work well.
👍 1
Avatar
Avatar
K23
Another one for @Law Enforcement [UK] , how, if at all, are you deploying Cellebrite Reader so that it can be used and accessed on force IT systems? Or at current are you just directing users to view on standalone viewing machines?
Artemisia (They / Them) 11/5/2021 4:13 AM
We have XAMN Viewer & Cellebeite Reader on our Software Centre (available to download) for all network machines
👍 1
Avatar
Avatar
manuelevlr
hello everyone, for those who use cellebrite, have you encountered problems concerning the "openjdk platform binary" process which makes the CPU go to 60/70% while not using the ufed4pc / PA software?
Hey. Shoot me a dm we can chat more about it
Avatar
Avatar
Br3W7h1S
We deployed it and XAMN Viewer through IT and the Force Software Centre, built into Windows enterprise. New version releases were tested by IT and pushed out for users to install locally. Seems to work well.
Thanks we do similar with XAMN and our IT was able to do that without issue. Its just CB that's been the problem!
Avatar
Avatar
Artemisia (They / Them)
We have XAMN Viewer & Cellebeite Reader on our Software Centre (available to download) for all network machines
Interesting, mind if I drop you a DM?
Avatar
Avatar
K23
Morning all, I know this question was asked last year without an answer, but is there any go to GPS expert that forces refer to in the UK at current? @Law Enforcement [UK]
Ross Donnelly 11/5/2021 5:35 AM
We at KBC might be able to help if you wanted to get in touch. We regularly work on GPS cases https://www.keithborer.co.uk/
Keith Borer Consultants provides high quality independent forensic science consultancy in criminal, civil, family and disciplinary matters. Our Forensic Scientists are expert witnesses and are instructed by solicitors, barristers, police forces, companies and private individuals to examine the strength and reliability of evidence and report on ...
Avatar
Avatar
Ross Donnelly
We at KBC might be able to help if you wanted to get in touch. We regularly work on GPS cases https://www.keithborer.co.uk/
Thanks Ross, I'll pass the details on
Avatar
Avatar
K23
Another one for @Law Enforcement [UK] , how, if at all, are you deploying Cellebrite Reader so that it can be used and accessed on force IT systems? Or at current are you just directing users to view on standalone viewing machines?
We're old fashioned. Standalone for analysts and CD/DVD for RO to run the generated reports on Force IT.
Avatar
DefendingChamp 11/5/2021 10:35 AM
any idea when iphone 13 will be supported by cellebrite
10:36 AM
it works treating it as a 12 pro max for logical though
10:37 AM
and other things
Avatar
Avatar
K23
Another one for @Law Enforcement [UK] , how, if at all, are you deploying Cellebrite Reader so that it can be used and accessed on force IT systems? Or at current are you just directing users to view on standalone viewing machines?
We currently place our reports with Cellebrite reader on a network drive for officers to access on their workstation. It not a brilliant solution but it just about works. The issues we have at the moment are that the corporate laptops and computers struggle to open large UFDR files. Also our IT are getting virus alerts which regularly point to something within the UFDR file. The deeper our IT department move along their NEP/365 journey I can’t see us being allowed to distribute reports the way we are We are looking at Magnet Review though however are yet to see a demo of it.
👍 1
Avatar
Hi guys - I have an iPhone back up stored on a computer that is encrypted with apples back up encryption - any idea where I may find the password
Avatar
Avatar
Benj
Hi guys - I have an iPhone back up stored on a computer that is encrypted with apples back up encryption - any idea where I may find the password
Digitalferret 11/6/2021 4:18 AM
indirectly "Asymmetric Thinking", but I just lifted an entire raft of passwords, from web browsers on an associated (windows) machine using Nirsoft. More than a few followed the same naming system so wasn't too hard to extrapolate for the clients lost (iPad) passwords. worth a look if you have similar scenario?
👍 1
💯 1
Avatar
Thanks! Sounds like a good plan
Avatar
Avatar
Digitalferret
indirectly "Asymmetric Thinking", but I just lifted an entire raft of passwords, from web browsers on an associated (windows) machine using Nirsoft. More than a few followed the same naming system so wasn't too hard to extrapolate for the clients lost (iPad) passwords. worth a look if you have similar scenario?
This is by far one of the easiest ways to find likely passwords
Avatar
Avatar
pug4N6
This is by far one of the easiest ways to find likely passwords
Digitalferret 11/6/2021 7:27 AM
yup. it's easy to get so involved in lock picking to the point you forget to try the handle first or look for the keys, hung over there ->
7:27 AM
be like Progressive Undertaker: thinking outside the box 😁
Avatar
Hi guys i was wondering if it is still possible for mobile phones to receive signals if they are powered off and if a powered off phone was found at a crime scene whether a faraday bag should be used or not?
Avatar
Avatar
MrSadface
Hi guys i was wondering if it is still possible for mobile phones to receive signals if they are powered off and if a powered off phone was found at a crime scene whether a faraday bag should be used or not?
Hot topic atm. With iOS 15, it is possible to locate switched off iPhones. Faraday use depends on local force policies, but yes it would always be recommended where available. Unfortunately cost implications of each bag and the facility for Faraday boxes to safely open up the bags / examine the phones are quite high so there's a lot of risk management that happens based on case risk level etc.
Avatar
It sounds silly, but tin foil is just as effective as faraday bags. The downside is foil is more cumbersome and not as reusable as faraday bags.
Avatar
How are agencies talking about dealing with devices being brute forced? Faraday cages come to mind but those can get pricey too. Does airplane mode adequately protect from a wipe?
Avatar
Can anyone recommend a timeline analysis tool for me? I am using timesketch now, but there are often some bugs, oft need refresh page
Avatar
Avatar
warlock40
How are agencies talking about dealing with devices being brute forced? Faraday cages come to mind but those can get pricey too. Does airplane mode adequately protect from a wipe?
As far as I know there haven’t been any reports of a device in airplane mode being wiped, but maybe someone else has
Avatar
Avatar
RX
Can anyone recommend a timeline analysis tool for me? I am using timesketch now, but there are often some bugs, oft need refresh page
Andrew Rathbun 11/7/2021 6:53 PM
https://discord.com/channels/427876741990711298/427936091220344833/881236998315212950 Here's my answer about timeline stuff. Still curious if a good solution exists out there but it all depends on your use case, what's important to your case, and the potential level of scrutiny down the road you could face (i.e., courtroom testimony, etc)
Salute 1
Avatar
Hello, do you know the filesystem that ps4 hard drive uses? (edited)
Avatar
Avatar
Prometheus
Hello, do you know the filesystem that ps4 hard drive uses? (edited)
Deleted User 11/7/2021 11:44 PM
They encrypt them so I have never gotten further than that. I did read an article where an examiner found somewhat of a solution by imaging drive first, then attaching console to video capture device and recording.
Avatar
Avatar
Prometheus
Hello, do you know the filesystem that ps4 hard drive uses? (edited)
I’m of the understanding that they are encrypted to the device they are from. I have used a voom shadow and then powered in the console in the past
Avatar
Avatar
FullTang
It sounds silly, but tin foil is just as effective as faraday bags. The downside is foil is more cumbersome and not as reusable as faraday bags.
In the UK world of validation, the codes and 17025 that method would be a big no! 😆
😂 3
Avatar
Hello! does anyone know what chipset a Scroll Excel 2 tablet has? There is very limited information online. Thank you!
Avatar
@g.wilson Boxchip A10, aka Allwinner A10 most likely
💯 1
Avatar
@Arcain Thank you!
Avatar
Hi everyone, doing some brainstorming right now in regards to an email sent out by a gmail address and received by a company address. goal would be to identify the original sender of that email or any information that could narrow things down like location information. The email contains no attachments and the work is public sector related (no LE). Currently, I could imagine doing the following but maybe some of you got additional ideas. a) Header Analysis: Having a look if information about the email client, IP or any location information can be deduced. From what I remember there won't be much for gmail as no IP of the sender etc. should be visible here? b) OSINT: verifying if the email address was used somewhere else so it potentially could be associated with an existing profile. c) Associations on local drives: if there is a suspected user, the users harddrives could be analyzed for any associations to the particular email address. There would probably also the option to use the password recovery function in order to get a small potion of an associated email address, phone number or associated device. Cheers
Avatar
Avatar
.yuzumi.
Hi everyone, doing some brainstorming right now in regards to an email sent out by a gmail address and received by a company address. goal would be to identify the original sender of that email or any information that could narrow things down like location information. The email contains no attachments and the work is public sector related (no LE). Currently, I could imagine doing the following but maybe some of you got additional ideas. a) Header Analysis: Having a look if information about the email client, IP or any location information can be deduced. From what I remember there won't be much for gmail as no IP of the sender etc. should be visible here? b) OSINT: verifying if the email address was used somewhere else so it potentially could be associated with an existing profile. c) Associations on local drives: if there is a suspected user, the users harddrives could be analyzed for any associations to the particular email address. There would probably also the option to use the password recovery function in order to get a small potion of an associated email address, phone number or associated device. Cheers
Deleted User 11/8/2021 7:23 AM
a) with gmail the headers won’t reveal much b) OSINT only works some of the time because these types of emails are usually from one-and-done burner accounts c) suspect likely to have sent email from somewhere they felt safe to do so likely not on a company machine. The content of your email is usually your biggest clue. Find the motive and go backwards from there. Social engineering the suspect via that email address can sometimes work but has to be done just right.
Avatar
Avatar
warlock40
How are agencies talking about dealing with devices being brute forced? Faraday cages come to mind but those can get pricey too. Does airplane mode adequately protect from a wipe?
DFIRDetective 11/8/2021 7:29 AM
https://thebinaryhick.blog/2021/10/27/ios-15-powered-off-tracking-remote-bombs/ This talks a bit about it but essentially it looks like they can track location but can't remote wipe when the device is off/disconnected for now.
If you are not a member of DFIR Discord you are really missing out. It is a fantastic resource. I am constantly learning stuff from the practitioners there and it helps me keep up with trends in ar…
Avatar
Thinking that has to change in the future though, right?
Avatar
Avatar
CCC
Thinking that has to change in the future though, right?
It has stayed the same from iOS 14 to 15, with remote wiping requiring internet access but tracking only requires Bluetooth. This can probably change whenever apple decides to, but there must be some reason why they kept it the same.
Avatar
Does anyone know what the current renewal price is for cellebrite UFED Ultimate?
Avatar
Avatar
MrTurdTastic
@Magnet Forensics Any of you lovely chaps at the Tech Talk in London next week? Be good to network
We will have about ten people at Tech talk including @Jad Nick Volpe and many others...
Avatar
MrTurdTastic 11/8/2021 8:39 AM
Look forward to it 🙂
Avatar
heatherDFIR 11/8/2021 9:29 AM
There are zoom issues today so we will have to postpone Life Has No Ctrl+Alt+Del until next week. Sorry for the hassle! See you on Monday.
👍 3
Avatar
Avatar
.yuzumi.
Hi everyone, doing some brainstorming right now in regards to an email sent out by a gmail address and received by a company address. goal would be to identify the original sender of that email or any information that could narrow things down like location information. The email contains no attachments and the work is public sector related (no LE). Currently, I could imagine doing the following but maybe some of you got additional ideas. a) Header Analysis: Having a look if information about the email client, IP or any location information can be deduced. From what I remember there won't be much for gmail as no IP of the sender etc. should be visible here? b) OSINT: verifying if the email address was used somewhere else so it potentially could be associated with an existing profile. c) Associations on local drives: if there is a suspected user, the users harddrives could be analyzed for any associations to the particular email address. There would probably also the option to use the password recovery function in order to get a small potion of an associated email address, phone number or associated device. Cheers
Digitalferret 11/8/2021 11:01 AM
was it malicious? if it's more than just annoyance/interest maybe contact Google with whoever you have highest rank there. had one yrs back, malicious mail to member of staff. Head of IT contacted Yahoo directly. miscreant was caught in rapid order.
Avatar
Anyone have a good setup they are using for charging devices while BF is being done?
Avatar
I’m looking for some charging stations for long term phone storage. Anyone know if the stations that protect from overcharging turn off at 100% (like batteries) or if they will keep the phone charged indefinitely?
Avatar
Avatar
Ghosted
Anyone have a good setup they are using for charging devices while BF is being done?
Oddly enough I posted the same thing before I saw your comment.
👍 1
Avatar
Avatar
Deleted User
a) with gmail the headers won’t reveal much b) OSINT only works some of the time because these types of emails are usually from one-and-done burner accounts c) suspect likely to have sent email from somewhere they felt safe to do so likely not on a company machine. The content of your email is usually your biggest clue. Find the motive and go backwards from there. Social engineering the suspect via that email address can sometimes work but has to be done just right.
DeeFIR 🇦🇺 11/8/2021 11:58 AM
Re gmail headers, it depends on how the suspect sent the email. If it was sent from the web interface, then the headers won't contain the end user's IP address. If it was sent using an email client, then it will.
Avatar
My googlefu is lacking these days, I can't find an answer to this. Is there a way to correlate what URL dropped a file into the browser cache? For instance, if there's a hit for some malicious js. I'd like to know the source of it. The creation timestamp on the file may correlate closely to the URL's recovered from the browser history. But without analysing that URL and then any subsequent i-frames, includes or redirects you'd end up with a somewhat accurate picture, maybe. This likely gets worse as the investigation time moves forward from the time of the detected download. Would be curious about what's around for all usual suspect browsers, but Edge (chromium) in particular.
Avatar
Avatar
00willo
My googlefu is lacking these days, I can't find an answer to this. Is there a way to correlate what URL dropped a file into the browser cache? For instance, if there's a hit for some malicious js. I'd like to know the source of it. The creation timestamp on the file may correlate closely to the URL's recovered from the browser history. But without analysing that URL and then any subsequent i-frames, includes or redirects you'd end up with a somewhat accurate picture, maybe. This likely gets worse as the investigation time moves forward from the time of the detected download. Would be curious about what's around for all usual suspect browsers, but Edge (chromium) in particular.
Andrew Rathbun 11/8/2021 5:49 PM
https://www.nirsoft.net/utils/chrome_cache_view.html Have you tried this tool and maybe see what it says and try to correlate with browsing history and the MFT?
ChromeCacheView is a small utility for Windows that reads the cache folder of Google Chrome Web browser, and displays the list of all files currently stored in the cache.
Avatar
Avatar
00willo
My googlefu is lacking these days, I can't find an answer to this. Is there a way to correlate what URL dropped a file into the browser cache? For instance, if there's a hit for some malicious js. I'd like to know the source of it. The creation timestamp on the file may correlate closely to the URL's recovered from the browser history. But without analysing that URL and then any subsequent i-frames, includes or redirects you'd end up with a somewhat accurate picture, maybe. This likely gets worse as the investigation time moves forward from the time of the detected download. Would be curious about what's around for all usual suspect browsers, but Edge (chromium) in particular.
Try Hindsight, should timeline cache alongside history, and might correlate the site the cache came from https://github.com/obsidianforensics/hindsight
Web browser forensics for Google Chrome/Chromium. Contribute to obsidianforensics/hindsight development by creating an account on GitHub.
Avatar
Avatar
Andrew Rathbun
https://www.nirsoft.net/utils/chrome_cache_view.html Have you tried this tool and maybe see what it says and try to correlate with browsing history and the MFT?
Thanks, I'll definitely check it out. It may not suit what I'm ultimately after as my next steps are geared towards usage with a SOAR platform.
Avatar
Avatar
stark4n6
Try Hindsight, should timeline cache alongside history, and might correlate the site the cache came from https://github.com/obsidianforensics/hindsight
This might be very helpful, I should be able to dig out the process of the correlation from here to implement as part of pulling the required pieces remotely for evaluation. Thanks.
Avatar
Hey, need some help identifying some exif tags on some jpgs. IFD0 - Artist IFD0 - XP Author XMP-dc - Creator XMP-rdf - about (There is a uuid here). I found a little more about the tags on exiftool.org but after that i couldnt find much.
Avatar
Hello, I need your help. Is there any data(report or something..) on the use of Cellbrite CAS or Graykey by law enforcement agencies in U.S.? Even if it is not the U.S, it is okay to be in other countries such as Europe.
Avatar
Deleted User 11/9/2021 4:36 AM
I would say a Microsoft app either modified or created the image based on “IFD0 - XP Author”. Have you tried to google dork the UUID for luck?
Avatar
Andrew Rathbun 11/9/2021 4:42 AM
If anyone is looking for an awesome SQLite program, Navicat is having a sale for the next 3 days. 30% off licenses.
👀 3
Avatar
@KoKi why do you need to know this ?
Avatar
What channel would be the best one to ask about acquiring a USB HID device? It's not showing up under /dev to acquire it and I'm not finding any way to acquire from /devices/pci*
Avatar
Avatar
0b01000011
What channel would be the best one to ask about acquiring a USB HID device? It's not showing up under /dev to acquire it and I'm not finding any way to acquire from /devices/pci*
Digitalferret 11/9/2021 3:13 PM
probably #data-recovery bc plugged in hw? altho i guess here is as good as any. what device and have you tried lshw hwinfo and the like?
Avatar
Just curious, does anyone know a way to compare 2 ufdrs and only display the differences? Maybe @Cellebrite has a solution? Or does pathfinder supports this?
Avatar
Avatar
B
Just curious, does anyone know a way to compare 2 ufdrs and only display the differences? Maybe @Cellebrite has a solution? Or does pathfinder supports this?
CLB-drorimon 11/10/2021 3:48 AM
In PA you can open the first ufdr and then open and merge the second one into it. In the merged project, on each table view in the Analyzed Data section you can filter for only the non-deduped items.
👍 3
Avatar
dumpanddecode 11/10/2021 5:00 AM
Does anyone know what discord data is available from a GrayKey extraction, both BFU and AFU of an iphone?
Avatar
Maybe somebody use LTO8 tape drives for data archiving? Do these devices require special software or everything to work Drag & Drop? Does it take long to retrieve the recorded information? e.g. if I want to extract only one small file from a tape? I'm talking about an external device not about tape libraries.
Avatar
Hello everyone, could you recommend external SOC services? (ie: Arctic Example, eSentire)
Avatar
Avatar
Digitalferret
probably #data-recovery bc plugged in hw? altho i guess here is as good as any. what device and have you tried lshw hwinfo and the like?
Yea, used dmesg -w to get VID and PID. Also, captured the keys pressed when it was inserted. I think we got all we need. Thx again @Digitalferret
👍🏻 1
Avatar
Roll4Combat 11/11/2021 2:21 AM
Any recommendations regarding CyberSecurity Bootcamps? Trying to speed up the pace of my learning and get job ready faster (can fund anywhere between 12-26 weeks of fulltime bootcamp) Just looking for suggestions/ reccomendations if any of you have gone down that path.
Avatar
Anyone ever had a situation where a machine has two monitors (Win 10), but when trying to remote in with TightVNC, it shows only one and a black screen for the second? (edited)
3:08 AM
It's as if TightVNC detects the second monitor, but isn't displaying it.
3:09 AM
Just a black screen for where the display would be
Avatar
I'm not sure it should matter, but is the second monitor connected through a second gpu? (like using integrated motherboard GPU + dedicated gpu)
Avatar
Avatar
rayeh
I'm not sure it should matter, but is the second monitor connected through a second gpu? (like using integrated motherboard GPU + dedicated gpu)
There is no external gpu. All through the motherboard. (edited)
5:57 AM
We have an exact same setup next to the machine that works
5:58 AM
But despite my best attempts at copying it, I can't figure out what's not working
Avatar
Avatar
Rob
But despite my best attempts at copying it, I can't figure out what's not working
Digitalferret 11/11/2021 6:49 AM
maybe poke around in Settings-Display (on both source and taget) if you haven't already. on single here so can't check, but maybe also look for laptop style option to either mirror or extend display to second screen. no doubt it'll be obvious once you sort but :clutching-straws: here, lol
6:49 AM
Avatar
Avatar
Digitalferret
maybe poke around in Settings-Display (on both source and taget) if you haven't already. on single here so can't check, but maybe also look for laptop style option to either mirror or extend display to second screen. no doubt it'll be obvious once you sort but :clutching-straws: here, lol
Both are set to extend.
6:55 AM
To clarify, both monitors are working perfectly fine as expected and displaying both screens fine
6:56 AM
However, they're in another part of the building we're in so we have to walk over to them currently instead of remote connecting as we normally do.
6:58 AM
Looks like this to us when remote connecting (not actually the desktop, just taken some random image off google)
6:58 AM
6:58 AM
So we can for example see the left display, and it's seemingly detecting the second, just not displaying it
👍🏻 1
Avatar
Is it a limitation of tightvnc perhaps? You tried ultravnc?
Avatar
Avatar
baggins
Is it a limitation of tightvnc perhaps? You tried ultravnc?
I haven't, but willing to give it a try. Tightvnc works on the exact same computer next to the one that doesn't that has the same setup ie two monitors etc.
Avatar
Avatar
arforensic
Maybe somebody use LTO8 tape drives for data archiving? Do these devices require special software or everything to work Drag & Drop? Does it take long to retrieve the recorded information? e.g. if I want to extract only one small file from a tape? I'm talking about an external device not about tape libraries.
We use LTO8 there are applications that use ltfs which is universal, but to be honest if really doesn't play nice with lots of small files. We are in the process of trying to find a new application but so far struggling to find one that isn't overly complex
Avatar
Avatar
Roll4Combat
Any recommendations regarding CyberSecurity Bootcamps? Trying to speed up the pace of my learning and get job ready faster (can fund anywhere between 12-26 weeks of fulltime bootcamp) Just looking for suggestions/ reccomendations if any of you have gone down that path.
#training-education-employment
💯 1
Avatar
Lawyers for Kyle Rittenhouse inaccurately claimed an iPad's pinch-to-zoom would manipulate video, and the judge appears to have accepted the argument..
4:45 PM
Also posted to the multimedia channel - I'm surprised to see misinformation/spin like this
🤦 1
Avatar
hi everyone, a quick one in regards to compliance center: a colleague just told me that they getting errors when using the content search when it comes to paths that have e. g. parentheses included. since I cant look it up right now myself / test it due to traveling: is there any annotation so that the full path for the content search is considered even if it has special characters included?
Avatar
Why is there not an Incident response channel? Do we just class is as dfir as a whole?
Avatar
Digitalferret 11/12/2021 6:40 AM
you mean #incident-response channel?
🧐 1
6:40 AM
⬅️
6:41 AM
nah, haven't seen one mate, poke (W)rathbunny 🙂 (edited)
Avatar
Ah hahahaha pops on glasses
Avatar
Digitalferret 11/12/2021 6:42 AM
lol, i do it all the time (spec savers ad) 🙂
👍 1
Avatar
New to field here. Question, I fairly certain it's not possible but I wanted a second opinion. *Is it possible to trace the actual end point IP of the email sending computer in a corporate enviroment like O365\Outlook? *Some reference info, 2 users involved, one user whos account the offending email was sent from claims she shared her account credentials with another user and claims that user actually sent the offending email. HR wants to either disprove one of the original user didn't sent it, or prove the accused user did send it. All fun...lol
Avatar
Digitalferret 11/12/2021 1:22 PM
easy: hit the one that shared credentials 🙂
😆 1
Avatar
Thats was my first sentance to HR when they spoke to me , clearly stated in their employee contract
Avatar
Original message was deleted or could not be loaded.
check bottom board (the one with charging port) and a different battery
Avatar
MrTurdTastic 11/13/2021 5:50 AM
@Moderators This chappy be a spambot
Avatar
Andrew Rathbun 11/13/2021 5:50 AM
yep we just had like 50 accounts join all at once, thanks for the heads up
Avatar
MrTurdTastic 11/13/2021 5:50 AM
np
Avatar
Andrew Rathbun 11/13/2021 5:50 AM
Everyone, just ignore and report/block/whatever you want to do. Don't fall for it, obviously 🙂
Avatar
MrTurdTastic 11/13/2021 5:50 AM
Of all the discord servers to do it on 😂
💯 2
Avatar
Andrew Rathbun 11/13/2021 5:51 AM
Anyone who joined between 0846-0848 is getting banned
5:52 AM
if anyone had a buddy who joined in that timeframe, let me know, and I apologize ahead of time, I can unban later
5:54 AM
we have controls in place that prevent them from posting in the general channels, thankfully, but the way Discord works, all they need is a mutual server to be able to PM someone
5:59 AM
all banned, let's move on with life 👍
Avatar
I really thought I won some $btc
🇫 6
Avatar
Avatar
MrTurdTastic
@Moderators This chappy be a spambot
But free BTC 🥺
Avatar
Avatar
Matt
But free BTC 🥺
Andrew Rathbun 11/13/2021 6:40 AM
Would be better if this happened a decade ago 😆
Avatar
Andrew Rathbun 11/13/2021 6:41 AM
Hindsight is always 20/20
Avatar
Avatar
Andrew Rathbun
Would be better if this happened a decade ago 😆
My mate misplaced a wallet with half a BTC in and couldn't find it 😬
Avatar
Avatar
Matt
My mate misplaced a wallet with half a BTC in and couldn't find it 😬
Andrew Rathbun 11/13/2021 6:52 AM
RIP
Avatar
My brother sold about 100 btc when they were ~100$
🇫 4
Avatar
Andrew Rathbun 11/13/2021 11:57 AM
Thanks all for reporting that earlier. Great to know there's others keeping a watchful eye on this community of ours 👍
Avatar
We have been hit by the Conti ransomware :/
Avatar
Avatar
malrker
We have been hit by the Conti ransomware :/
Andrew Rathbun 11/13/2021 7:42 PM
Very sorry to hear that. Do you have good backups? If you need assistance with what to look for, frankly, that's the best ransomware variant to be hit with given recent leaks. Check out #cyber-threat-intelligence if you have more questions on IOCs
Avatar
Avatar
Andrew Rathbun
Very sorry to hear that. Do you have good backups? If you need assistance with what to look for, frankly, that's the best ransomware variant to be hit with given recent leaks. Check out #cyber-threat-intelligence if you have more questions on IOCs
yeah our backups were luckily not hit, we have shut down the entire network and the backups to prevent them from infecting them. busy doing DFIR now
7:45 PM
Thanks will check it now
Avatar
Avatar
malrker
yeah our backups were luckily not hit, we have shut down the entire network and the backups to prevent them from infecting them. busy doing DFIR now
Andrew Rathbun 11/13/2021 7:46 PM
Avatar
randomaccess 11/13/2021 8:00 PM
we've got a couple conti cases ongoing, havent had to deal with them in a little bit
8:00 PM
search for rclone and anydesk
Avatar
@randomaccess is anydesk and rclone used as their dropper for conti?
Avatar
randomaccess 11/13/2021 8:05 PM
rclone is for exfil
☝️ 1
8:05 PM
anydesk is remote admin, so likely
Avatar
Andrew Rathbun 11/13/2021 8:05 PM
their entire playbook leaked. Check into it @malrker
Avatar
randomaccess 11/13/2021 8:05 PM
anydesk and spalshtop are commonly associated with conti affiliates
Avatar
Andrew Rathbun 11/13/2021 8:05 PM
The Conti cases I've dealt with since the leak have been very, very similar to what intel the leaks provided
Avatar
randomaccess 11/13/2021 8:07 PM
@malrker you dont happen to run onprem exchange do you?
Avatar
@randomaccess yeah we do
Avatar
randomaccess 11/13/2021 8:08 PM
ah. yeah. i'd look there first
Avatar
Andrew Rathbun 11/13/2021 8:08 PM
Proxy* is likely infection vector, I would guess
Avatar
randomaccess 11/13/2021 8:09 PM
yeah thats what ive seen a lot of lately
Avatar
put it this way we are a perfect candidate
8:09 PM
except for backup
Avatar
randomaccess 11/13/2021 8:10 PM
check iis logs and the exchange evtx for references to autodiscover/powershell/New-MailboxExportRequest
Avatar
thats running new hardware n new os etc
Avatar
randomaccess 11/13/2021 8:10 PM
you may find webshells that are hidden as .cer/.psts or just plain randomly named aspx files
Avatar
Andrew Rathbun 11/13/2021 8:15 PM
@malrker https://github.com/microsoft/CSS-Exchange/tree/main/Security/src has some scripts you may want to run
Exchange Server support tools and scripts. Contribute to microsoft/CSS-Exchange development by creating an account on GitHub.
8:15 PM
Exchange Server support tools and scripts. Contribute to microsoft/CSS-Exchange development by creating an account on GitHub.
Avatar
yeah found some last night
8:18 PM
@Andrew Rathbun theyre using new CVE's for attack vectors though
8:18 PM
new ndays and such
8:19 PM
Some thats only a week old or so
Avatar
randomaccess 11/13/2021 8:22 PM
ah yeah thats not going to end well
Avatar
@Random @Andrew Rathbun how can i kill the ports theyre using for their webshell?
Avatar
randomaccess 11/14/2021 12:04 AM
Killl the webshells. Patch exchange?
12:10 AM
But once they're in and moving around the webshell isn't necessarily how they persist. So you have to try track all their activities
Avatar
@randomaccess is carbon black the best tool for that?
12:34 AM
as theyre using aa fake cert
12:34 AM
keeps regenrating if you remove it
Avatar
randomaccess 11/14/2021 12:34 AM
Itll help.
12:34 AM
What keeps regenerating?
Avatar
a certificate
12:35 AM
they sign their own
12:35 AM
ehats good tools to use to track their movements?
12:35 AM
a SIEM?
Avatar
randomaccess 11/14/2021 12:43 AM
We roll carbon black cloud which will let you block the certificate from executing and also let you search for processes making network connections. We also roll out a free tool called Velociraptor that lets you collect and query data at scale. A Siem would be useful too but that may depend on the complexity of your network as to how hard this is to stand up quickly
Avatar
We pretty much switched the whole network off too
12:43 AM
to prevent the spread
Avatar
randomaccess 11/14/2021 12:45 AM
Both CB and velo allow you to isolate hosts from the network so they can only communicate with their respective servers
Avatar
@randomaccess yeah cool, we are using CB, and i also had a look at velo, we are using a siem atm too, is there any good open source tools to be able to scan any dormant malicious files that may be present on the backup server that hasnt been encrypted yet? before backing up
Avatar
randomaccess 11/14/2021 2:00 AM
I don't think you can rely on a tool to find everything
2:02 AM
The main issue with a backup is knowing when the attackers got in and whether they had set persistence when the backups were taken. You'd need to do your analysis across the incident to figure out what they did and then what backups may give them access again should they be restored. May be worth getting some external assistance
Avatar
Yeah we have two third party companies helping us do IR, but the one only asked for the actual file/payload/loader
2:03 AM
the other is using carbon black and siem
2:04 AM
but we are not sure if the company using carbon black will be doing manual DFIR
2:04 AM
or if theyre just automating it
Avatar
Would anyone be familiar with acquiring discord chats from devices (ie laptop / iPhones) - would Cellebrite get the local stuff
12:12 AM
Or is the better process to go down the court order route?
Avatar
Avatar
Dorsidhion
Would anyone be familiar with acquiring discord chats from devices (ie laptop / iPhones) - would Cellebrite get the local stuff
Ross Donnelly 11/15/2021 4:16 AM
Axiom claims to support Discord messages but I've never had cause to use it. On Windows at least, everything is stored in LevelDB files. Here is a research paper on it too https://www.researchgate.net/profile/Michal-Motylinski/publication/347044759_Digital_Forensic_Acquisition_and_Analysis_of_Discord_Applications/links/6073a738299bf1c911c5c7df/Digital-Forensic-Acquisition-and-Analysis-of-Discord-Applications.pdf
Avatar
Avatar
Dorsidhion
Would anyone be familiar with acquiring discord chats from devices (ie laptop / iPhones) - would Cellebrite get the local stuff
If Cellebrite doesn't get it, you can use ChromeCacheView (https://www.nirsoft.net/utils/chrome_cache_view.html) to extract some of the files from the Chromium cache. The messages are stored as JSON files in there. Further information such as username can be found in the Local LevelDB databases
ChromeCacheView is a small utility for Windows that reads the cache folder of Google Chrome Web browser, and displays the list of all files currently stored in the cache.
4:32 AM
If you need a tool to view the database, I have one that I developed specifically to read the Discord LevelDB files that I can DM you a repo link to
Avatar
Avatar
Ross Donnelly
Axiom claims to support Discord messages but I've never had cause to use it. On Windows at least, everything is stored in LevelDB files. Here is a research paper on it too https://www.researchgate.net/profile/Michal-Motylinski/publication/347044759_Digital_Forensic_Acquisition_and_Analysis_of_Discord_Applications/links/6073a738299bf1c911c5c7df/Digital-Forensic-Acquisition-and-Analysis-of-Discord-Applications.pdf
CLB_iwhiffin 11/15/2021 6:05 AM
My ArtEx tool will recover cached messages from iPhones; and I believe iLEAPP does the same.
👍 1
Avatar
Avatar
Dorsidhion
Or is the better process to go down the court order route?
You’ll most likely need an Full File System unless you have something that can specifically target Discord. On iOS devices, Discord stores its cached files under in Applications in the "/Library/Caches/com.hammerandchisel.discord/fsCachedData/" directory which can include chat messages in JSON format. User configuration information is stored in "/Documents/mmkv/mmkv.default" and avatar images can be found in the "/Library/Caches/com.hackemist.SDImageCache/default/" directory. I’ve found that many of the high end tools have trouble parsing out Discord chats with the JSON format.
Avatar
Avatar
OggE
Hey, need some help identifying some exif tags on some jpgs. IFD0 - Artist IFD0 - XP Author XMP-dc - Creator XMP-rdf - about (There is a uuid here). I found a little more about the tags on exiftool.org but after that i couldnt find much.
Update on this: It looks very likley to be converted photoshop files, the tags and patterns look very alike.
👍 2
Avatar
Some question on sock puppets. 1. Do you have them pre made and set up ready for when you need them on all the Facebook, LinkedIn, Tik Tok etc? 2. Do you use them to gain friends and followers to seem more legit? 3. Do you have a VM made where you have them all logged on with that you use/ Is there any good articles about sock puppets and best use etc have tried looking but nit finding much? How do you use yours if you have?
Avatar
What if I told you not all fake social media accounts are used maliciously?
8:36 AM
Found this actually and its really good.
Avatar
Avatar
Matt
If you need a tool to view the database, I have one that I developed specifically to read the Discord LevelDB files that I can DM you a repo link to
That’d be really appreciated!
Avatar
Has anyone here tried making a custom logstash parser in SOF-ELK? I'm having some trouble getting elasticsearch to see the data
Avatar
sheepdog751 11/16/2021 7:10 AM
Anyone have experience doing a Discord server investigation? Looking to see what info I can get out of it. Looking to determine who posted certain messages. Do IP addresses get captured on the posts? I have never looked at a Discord server. Thanks
Avatar
Have you got Discord court/warrant data? You can determine some information from client-side data but you'd need Discord's help to put IPs to usernames
Avatar
sheepdog751 11/16/2021 8:45 AM
No warrant and this may amount to a civil matter but as I thought, IP tracking info would be with Discord and not the server admin side.
Avatar
Avatar
sheepdog751
No warrant and this may amount to a civil matter but as I thought, IP tracking info would be with Discord and not the server admin side.
DFIRDetective 11/16/2021 8:55 AM
You're right, server admins don't have IP data within Discord. You'd have to go direct to Discord for that data.
Avatar
Yeah discord servers are all hosted on Discord’s infrastructure
10:05 AM
No access to that stuff without discord’s compliance
Avatar
Avatar
sheepdog751
No warrant and this may amount to a civil matter but as I thought, IP tracking info would be with Discord and not the server admin side.
nice profile pic
Avatar
Avatar
rayeh
nice profile pic
Thanks. It's my wallpaper on my VM host PC. Stole it from the internet. It's floating around somewhere
Avatar
similar story for how I found it
Avatar
I'm shopping for a Faraday enclosure... Ramsey boasts the following Isolation: >90dB @ 918MHz >85dB @ 2.4GHz >80dB @ 5.8GHz And Mission Darkness ( @Ryan MOS Equipment ) Boasts the following:
blocks WiFi (2.4 & 5GHz), Bluetooth, cell signals including 5G networks, GPS, RFID, and radio signals with >70dB average attenuation. It has been lab tested and certified to shielding effectiveness standards IEEE 299-2006.
Without going back to school, does this mean Mission Darkness blocks more bands but not as well, and Ramsey blocks less bands better?
(edited)
11:57 AM
They both really look like the same box just diffrent branding.
Avatar
ScottKjr3347 11/16/2021 12:36 PM
PLEASE NOTE: This product does not qualify for free domestic shipping. Mission Darkness BlockBox Lab XL - RF Enclosure for Mobile Device Analysis SKU: MDFB-BBL-XL-RJ45 The Mission Darkness™ BlockBox Lab XL offers the ultimate radio frequency ...
Avatar
Avatar
DFIRDetective
You're right, server admins don't have IP data within Discord. You'd have to go direct to Discord for that data.
Andrew Rathbun 11/16/2021 12:37 PM
Can confirm 😛
👍 2
Avatar
I have both boxes, the XL mission darkness is larger and roomier but the gloves feel very thin/flimsy
2:27 PM
I haven’t tested their blocking abilities, nor would I really know how to but it seems like both work for me.
👍 1
Avatar
When is microsft going to issue a security update for this LPE vulnerability CVE-2021-34484 ? I can see ransomware crews will start probably utilzing this, it affects windows 10, windows 2012, windows 11 and a bunch of other versions of windows, there is even a PoC existing online for this.
3:29 PM
0patch has already patched it
Avatar
Avatar
whee30
I haven’t tested their blocking abilities, nor would I really know how to but it seems like both work for me.
Avatar
I've got that app, but other than the device "passing" I haven't gone farther. So far that has worked for me! I was told by the Mission Darkness folks that the velcro on most current faraday bags can be rough on the gloves. Some manufacturers are making magnet closure bags now for that reason, according to them.
Avatar
Anyone from Cellebrite able to chat on DM?
1:38 AM
@Cellebrite
Avatar
@whee30 we just take an iphone and an Android and place them into the box and attempt to locate and or call the phones to field "test" the box
Avatar
Avatar
whee30
I haven’t tested their blocking abilities, nor would I really know how to but it seems like both work for me.
I have one test I'd love for someone to run that had both boxes. Do you have Bluetooth headphones? I've found no faraday enclosure can stop the music from my phone to my BT headphones.
Avatar
@GRIZZ I'll try that shortly. I ran that test when I bought faraday bags, about half of them failed bluetooth. I ended up with silicon forensics bags and they have worked well so far.
8:13 AM
the ramsey box next to me cut BT to my iPhone 13 immediately. My blockbox is in a different building so that will take a while.
8:15 AM
Took about 3 seconds to reconnect to BT on open and about 5 seconds for a pending icloud lock to hit it.
Salute 1
Avatar
Avatar
GRIZZ
I have one test I'd love for someone to run that had both boxes. Do you have Bluetooth headphones? I've found no faraday enclosure can stop the music from my phone to my BT headphones.
NibblesNBits 11/17/2021 10:45 AM
What kind of headphones do you have just curious.
Avatar
Avatar
NibblesNBits
What kind of headphones do you have just curious.
Shop LG HBS-SL5 Black on the official LG.com website for the most up to date information. Buy online for delivery or in-store pick-up.
Avatar
Hello all. Is there any forensic value in investigating Orphaned files?
Avatar
@Jogoyo depends on the case, but sure! Aside from the files themselves and the content therein potentially being consistent with your investigation, plenty of files carry internal metadata to give context. Just know what you can't prove with an orphaned file and it will guide your reliance on them.
12:38 PM
@GRIZZ FWIW I used airpod pro headphones for the BT test. Same thing I used previously with the faraday bags. Some bags you could listen to music and pass commands back and forth such as play/pause, next/previous song. Certainly something to be aware of given the current capability of phones to be tracked via BT even when "off"
👍 1
Avatar
Avatar
whee30
@Jogoyo depends on the case, but sure! Aside from the files themselves and the content therein potentially being consistent with your investigation, plenty of files carry internal metadata to give context. Just know what you can't prove with an orphaned file and it will guide your reliance on them.
That is my worry.. even I find something of interest, I cant say anything with certainty. Did the suspect create that file? If not, did a software create it? Metadata is limited with orphaned files
Avatar
Well - filesystem metadata certainly. But a word doc still contains the internal metadata, just like a photo will still contain EXIF data. It really depends on your case. For example, an orphaned selfie of your prohibited possessor holding a gun with a legible serial number and internal location data pointing at their house would still be a great "clue" to stumble across
👍 1
12:42 PM
it's not ideal but I wouldn't discount orphaned files as a category
12:43 PM
orphaned web cached images from an unknown timeframe/browser/user? Maybe not so valuable.
Avatar
Avatar
Jogoyo
That is my worry.. even I find something of interest, I cant say anything with certainty. Did the suspect create that file? If not, did a software create it? Metadata is limited with orphaned files
randomaccess 11/17/2021 1:29 PM
Nah orphaned files are great. I had a case where someone had a large folder tree of bad files. They copied it to a truecrypt volume and deleted the top level folder. The shellbags showed the folder structure and the orphaned folder retained its structure and content. So could see what all the files were etc
Avatar
is there any DFIR tools that are opensource for LastPass, I found one the other day but I can't seem to find it again
Avatar
Anyone here familiar with htran? to prevent mimkatz creds retrival I had a 17k powershell alert never got around to them "Detection and Protection Establishing a base or normalised network profile, combined with ongoing capture and analysis of network traffic can assist network defenders detect unauthorised connections from tools such as HTran. A combination of network segmentation, denying corporate computers direct Internet connectivity and network/host firewalls will help the prevention or limit the effectiveness of HTran. In some of the samples analysed17, the rootkit component of HTran only hides connection details when the proxy mode is used. When client mode is used, defenders are able to view details about the TCP connections being made. HTran also includes a debugging condition that is useful for network defenders. In the event that a destination becomes unavailable, HTran generates an error message using the following format18: sprintf(buffer, “[SERVER]connection to %s:%d error\r\n”, host, port2); This error message is relayed to the connecting client in the clear. Defenders can monitor for this error message to potentially detect HTran instances active in their environments. " https://www.cyber.gov.au/sites/default/files/2021-06/Joint%20report%20on%20publicly%20available%20hacking%20tools%20-%2020200106.pdf If you ctrl f to htran Is there any way we can prevent them if they modify the htran code/variables to prevent them from attacking mitigate/prevent the attackers When we try deploy credential guard it crashe
Avatar
torskepostei 11/17/2021 11:52 PM
Are there any forensic tools that allows for redacting info from seized data? If, for instance, there is information on a device that is protected by the attorney-client privilege, but there is also information relevant to an investigation on there, it would be nice to redact the attorney communication and build a portable case/report/whatever product that can be handed to an investigator. If I remember correctly you can hide files in x-ways, but I have not come across it in any other tools.
Avatar
Avatar
torskepostei
Are there any forensic tools that allows for redacting info from seized data? If, for instance, there is information on a device that is protected by the attorney-client privilege, but there is also information relevant to an investigation on there, it would be nice to redact the attorney communication and build a portable case/report/whatever product that can be handed to an investigator. If I remember correctly you can hide files in x-ways, but I have not come across it in any other tools.
EnCase from memory, you can could make an L01 (I think excluding items). Nuix you can exclude. X-Ways you can exclude and make a skeleton image. Not sure on other tools.
Avatar
Avatar
Rob
EnCase from memory, you can could make an L01 (I think excluding items). Nuix you can exclude. X-Ways you can exclude and make a skeleton image. Not sure on other tools.
torskepostei 11/18/2021 3:01 AM
Skeleton image sounds interesting, I'll look that up, thanks
👍 1
Avatar
Avatar
torskepostei
Are there any forensic tools that allows for redacting info from seized data? If, for instance, there is information on a device that is protected by the attorney-client privilege, but there is also information relevant to an investigation on there, it would be nice to redact the attorney communication and build a portable case/report/whatever product that can be handed to an investigator. If I remember correctly you can hide files in x-ways, but I have not come across it in any other tools.
RandyRanderson 11/18/2021 4:32 AM
X-ways = Skeleton Image Magnet = Exclude feature FTK/AD Lab = Exclude feature NUIX = Exclude feature Relativity = fun stuff to do it, but I've never done it personally EnCase or FTK Imager = Make a L01/AD1 (edited)
Avatar
Avatar
RandyRanderson
X-ways = Skeleton Image Magnet = Exclude feature FTK/AD Lab = Exclude feature NUIX = Exclude feature Relativity = fun stuff to do it, but I've never done it personally EnCase or FTK Imager = Make a L01/AD1 (edited)
torskepostei 11/18/2021 4:39 AM
Hm, is there an exclude feature in Magnet Axiom? Could not locate anything like that earlier, but I may have missed it.
Avatar
Avatar
torskepostei
Hm, is there an exclude feature in Magnet Axiom? Could not locate anything like that earlier, but I may have missed it.
RandyRanderson 11/18/2021 4:44 AM
Looks like they removed it? I know from years past they had that option as we used it to remove text messages from laptops where an iOS backup was there. It looks like the "convoluted" wait would be to create a Bookmark for everything not under taint review...but ya...I don't like that. At that point you're doing the L01/AD1 anyway...
Avatar
Avatar
RandyRanderson
Looks like they removed it? I know from years past they had that option as we used it to remove text messages from laptops where an iOS backup was there. It looks like the "convoluted" wait would be to create a Bookmark for everything not under taint review...but ya...I don't like that. At that point you're doing the L01/AD1 anyway...
torskepostei 11/18/2021 4:48 AM
Thanks anyway for the great list, I know about a lot more options now 👍 Don't know if @Mike MC from Magnet knows if the exclude feature is taken out of Axiom or perhaps renamed?
Avatar
RandyRanderson 11/18/2021 4:49 AM
I could be completely jacking that up since I can't find the feature. But I could have SWORN they had it in there
😆 1
Avatar
General question for the group, has anyone used "LiquidFiles" to transfer case file information ? If so please DM me. THX
Avatar
If the 'AirTag Found Moving With You' message pops up but you can't click on it in time, how do you get back to that notification? https://www.macrumors.com/how-to/airtag-found-moving-with-you/ (edited)
Apple's AirTags have a built-in safety feature that's designed to prevent them from being used to track you, so no one can plant an AirTag in...
Avatar
Shadow Home Affairs Minister declared the Bill before the Senate was a better Bill because of amendments, and as such, Labor threw its support behind it. Greens, however, took issue with cops being able to take over a person's social media.
1:08 PM
What do you guys think of this new law thats been passed in Australia?
1:12 PM
Wouldn't the 'modify' part, basically break the chain of custody for forensic investigators?
Avatar
Avatar
malrker
Wouldn't the 'modify' part, basically break the chain of custody for forensic investigators?
Digitalferret 11/18/2021 2:51 PM
maybe not if a golden copy of everything was made before take-over. besides, isn't this the way some illicit dark-web sites were taken and thus members tracked? (edited)
Avatar
Avatar
Digitalferret
maybe not if a golden copy of everything was made before take-over. besides, isn't this the way some illicit dark-web sites were taken and thus members tracked? (edited)
Ah right I see. This law was only passed recently, I think a month or two ago, so not sure if the law was in effect then when illicit dark-websites were seized
Avatar
Iphone
Avatar
@klw27 What about iphone?
Avatar
Whats the best mode of action to retrieve event logs for suspect servers (ransomwared by Conti)? I don't really want to recconect and RDP in
8:35 PM
They are vm's so can get to the consoles without the network card
Avatar
DeeFIR 🇦🇺 11/18/2021 9:36 PM
@malrker https://kb.vmware.com/s/article/900 to pull the vmdks?
9:37 PM
& vmem
Avatar
Avatar
malrker
Ah right I see. This law was only passed recently, I think a month or two ago, so not sure if the law was in effect then when illicit dark-websites were seized
Digitalferret 11/19/2021 1:20 AM
that's what i meant, sites have been seized for quite some time now. no idea what effect this act will mean. maybe it extends the Govts rights to do as they will, when and where they want and short cuts some of the legislation. ie just extend their powers to draconian. bit Matrix-y but "What do all men with power want? More power"
1:21 AM
ofc this changes from jurisdiction to jurisdiction.
Avatar
Avatar
malrker
Ah right I see. This law was only passed recently, I think a month or two ago, so not sure if the law was in effect then when illicit dark-websites were seized
Think it's still waiting for Royal Assent
1:25 AM
Which surprised me given that it's Australia, though that was only a UK thing
Avatar
Avatar
Matt
Which surprised me given that it's Australia, though that was only a UK thing
Digitalferret 11/19/2021 1:27 AM
isn't Royal Assent a given? QE2 has no political power, paper is handed to her by the Govt and she signs.
Avatar
Yeah pretty much, I just was surprised (some) commonwealth countries still bother with the formality 😆
Avatar
Digitalferret 11/19/2021 1:29 AM
some might say other world leaders are in a similar posn, regardless of their title 🙂
1:31 AM
how many Prez' have walked in expecting to change the country (and ofc reveal all about the UFO cover up: gotta have some tinfoil) to find they are as mired as all their predecessors
Avatar
Avatar
Digitalferret
ofc this changes from jurisdiction to jurisdiction.
This is a federal law
1:56 AM
In Australia
1:56 AM
So it gives the AFP and such power over here in Australia
Avatar
Be interesting to see how it’s used in the future, the account takeover is of particular interest
Avatar
Here in Australia if you don't give up your password to police, they can send you mandatory 6 months jail, and potentially prolong it until you give up your password to your device.
2:01 AM
Thats a law thats been around for a while.
2:01 AM
Though.
2:01 AM
Learnt that in Forensics Course at Uni.
Avatar
Avatar
Matt
Be interesting to see how it’s used in the future, the account takeover is of particular interest
Yeah I just hope it isnt abused by dodgey cops.
Avatar
We’ve got one around protected data in specific cases (s49 notice, RIPA 2000)
Avatar
I don't think it will be, but never know
2:03 AM
Correlium lol
Avatar
Avatar
malrker
Yeah I just hope it isnt abused by dodgey cops.
You’d hope there’s enough safeguards especially with warrant applications
Avatar
Greybox lol
2:03 AM
Grayshift sorry*
Avatar
Avatar
Matt
You’d hope there’s enough safeguards especially with warrant applications
Here for Terrorism and Drug offences no warrant is required.
2:04 AM
To search your premises
2:04 AM
just reasonable suspicion
2:04 AM
Afaik
2:06 AM
We also have no privacy laws here.
Avatar
Avatar
Matt
We’ve got one around protected data in specific cases (s49 notice, RIPA 2000)
Have you ever gotten around bitlocker and such?
2:07 AM
Without the key ofc
2:07 AM
I remember there was a vulnerbility with it a while ago
2:08 AM
I think it was jonas_lyk who discovered it
Avatar
Avatar
malrker
Have you ever gotten around bitlocker and such?
Not personally
2:24 AM
I have seen a good blog post on BitLocker just using the TPM, and extracting the key from it
Avatar
Lock screen/Bitlocker bypass/elevation of privilege in Bitlocker https://t.co/Q2t1lCRX92
Retweets
305
Likes
643
Avatar
Thanks I’ll read it in a bit
👍 1
Avatar
Avatar
malrker
Yeah I just hope it isnt abused by dodgey cops.
Digitalferret 11/19/2021 2:54 AM
lol "hope it isnt abused" ... not only by dodgy cops. Govt want anything they just have to append terrorist or paedophile. sorry, having dealt directly with politicians i have a very jaded/cynical view. I'll stop now, before we pollute forum too much with the unholy trinity of S/P/R 🙂
Avatar
Yep I agree, it's very likely it will be abused by the govt.
💯 1
Avatar
Andrew Rathbun 11/19/2021 3:44 AM
https://github.com/0x90n/InfoSec-Black-Friday Stay tuned as PRs come in over the next few days
All the deals for InfoSec related software/tools this Black Friday - GitHub - 0x90n/InfoSec-Black-Friday: All the deals for InfoSec related software/tools this Black Friday
👍🏻 2
Andrew Rathbun pinned a message to this channel. 11/19/2021 3:44 AM
Avatar
AARC TASK FORCE 11/19/2021 6:48 AM
Brainstorm!! I have an E01 of a bit locker encrypted drive. I acquired the bitlocker keys from the companies system administrator but none of the keys that he gave me match the bitlocker identifier of the image. Any ideas?
Avatar
Does anyone have experience virtualising android extractions (both logical and physical) with Windows 11?
Avatar
Not tried it yet. Usually just use Cellebrite for the individual applications
Avatar
@AARC TASK FORCE are you trying to attach it directly to a windows box or through a forensic software ?
Avatar
AARC TASK FORCE 11/19/2021 11:14 AM
@DCSO I have had it in both Axiom and EnCase. Keys were sent to my (with the identifiers) but none of the identifiers match. I do believe that the keys that the system administrator gave me are what are true to the system.
Avatar
Hello all, i joined specifically to ask this question. I seem to have deformities in my left pinky finger and right thumb prints, can anyone tell me what these are? They have been there for as long as i can remember (edited)
Avatar
Avatar
Orydian
Hello all, i joined specifically to ask this question. I seem to have deformities in my left pinky finger and right thumb prints, can anyone tell me what these are? They have been there for as long as i can remember (edited)
Are you making a joke about 'digit'al forensics?
😆 1
11:26 AM
Cuz if you aren't, you're in the wrong place.
Avatar
Avatar
AmNe5iA
Are you making a joke about 'digit'al forensics?
No, i am genuinely curious about what the deformities on the tip of my fingers are
11:27 AM
I just figured people with expertise would know. Its entirety possible im asking the wrong group
Avatar
It's possible someone here may know but I feel a 'wet' forensic discord may be more likely to know this sort of thing.
Avatar
Avatar
AmNe5iA
It's possible someone here may know but I feel a 'wet' forensic discord may be more likely to know this sort of thing.
What do you mean by wet?
Avatar
blood, fingerprints, dna type forensics
Avatar
Avatar
AmNe5iA
blood, fingerprints, dna type forensics
Ah. Makes sense
Avatar
Best I know of is https://en.wikipedia.org/wiki/Adermatoglyphia
11:32 AM
In your case, maybe you burnt those fingertips as a kid. (edited)
Avatar
Avatar
AmNe5iA
Best I know of is https://en.wikipedia.org/wiki/Adermatoglyphia
I mean i still have a distinct fingerprint, there is just a spot on my right thumb and left pinky that doesnt line up with the linear fingerprint and more resembles dots. Entirely possible it may be burns from childhood, i wouldnt be aware though. I thought fingerprints regenerate through burns? (edited)
11:33 AM
Avatar
Andrew Rathbun 11/20/2021 12:13 PM
Yeah this is not a forensic science Discord server, this is like cell phones and computers digital forensics. @Orydian you're definitely not the first and won't be the last 😛
Avatar
Cool we got random fingerprints now 🤣
🤣 4
Avatar
Digitalferret 11/20/2021 1:07 PM
TFW folks just pop in to give us the finger 🙂
Avatar
anyone use ftk imager or autopsy? (edited)
Avatar
i want to open a ad1 file but its confusing
Avatar
randomaccess 11/21/2021 3:34 AM
which part is confusing? @Brother O
Avatar
Avatar
randomaccess
which part is confusing? @Brother O
im making a new case and mounting the ad1 file as a logical file but nothing comes out
3:35 AM
in autopsy
Avatar
randomaccess 11/21/2021 3:35 AM
i dont use autopsy regularly enough to assist on that front - but if you add it as an evidence item in ftk imager what do you see?
Avatar
oh i got it to work now
3:41 AM
how do i make a report on ftk imager so it holds all the evidence in a folder
Avatar
randomaccess 11/21/2021 3:42 AM
you cant do reporting in FTKi, but im also not entirely sure that's what you want to do?
Avatar
Avatar
randomaccess
you cant do reporting in FTKi, but im also not entirely sure that's what you want to do?
I want it to be evidence I gathered with notes on it
Avatar
randomaccess 11/21/2021 5:01 AM
Ftk imager doesn't do any of that so you're probably best served with another tool
Avatar
Avatar
randomaccess
Ftk imager doesn't do any of that so you're probably best served with another tool
Does autopsy do that?
Avatar
If I remember correctly from my courses, I believe autopsy does, but it’s been a little over a year since I used it.
Avatar
Avatar
Brother O
Does autopsy do that?
Deleted User 11/21/2021 11:47 AM
Yes. But it makes no sense without context so you can add the Autopsy report as an annexure to your report and make reference to it. (edited)
Avatar
Avatar
Deleted User
Yes. But it makes no sense without context so you can add the Autopsy report as an annexure to your report and make reference to it. (edited)
ok
Avatar
Is there any good tools to parse and forensically analyze logs in .csv file format?
Avatar
DeeFIR 🇦🇺 11/22/2021 1:19 AM
timeline explorer
uppoint 1
Avatar
@DeeFIR 🇦🇺
2:44 AM
Not sure why I am getting this error?
2:44 AM
WIth timeline explorer
2:45 AM
When I do have the plugin
2:46 AM
Any ideas?
Avatar
@Andrew Rathbun
2:47 AM
Andrew should know @malrker 😄
Avatar
Thanks, any ideas why its not working @Andrew Rathbun ?
Avatar
Avatar
malrker
Thanks, any ideas why its not working @Andrew Rathbun ?
Andrew Rathbun 11/22/2021 3:25 AM
I'm awake now, sorry
3:25 AM
Did you use Windows to extract the Timeline Explorer files? If so, never do that again. Use anything else.
3:27 AM
Without those DLLs you're not going to be able to load things into TLE. Use 7Zip or WinRAR
Avatar
@Andrew Rathbun I used 7zip
4:26 AM
@Andrew Rathbun Now I am getting a bunch of warnings saying bad data found
4:29 AM
@Andrew Rathbun What format should the xml file be?
Avatar
Avatar
malrker
@Andrew Rathbun What format should the xml file be?
Andrew Rathbun 11/22/2021 4:39 AM
XML? Why are you loading XML into TLE?
Avatar
Avatar
malrker
@Andrew Rathbun Now I am getting a bunch of warnings saying bad data found
Andrew Rathbun 11/22/2021 4:41 AM
I need a lot more context. What exactly are you trying to load into TLE? You mentioned CSV above but now we're talking about XML? XML and TLE do not mix. If Excel can display it then TLE can too, in most cases with some limitations
Avatar
@Andrew Rathbun Oops I meant .csv
4:47 AM
Not xml
4:47 AM
I am loading a csv file
Avatar
Andrew Rathbun 11/22/2021 4:47 AM
It probably has bad data because the first line isn't headers
4:48 AM
If that's the case, then just delete the first line and make the top line include the headers and only the headers
Avatar
What should the headers be?
Avatar
Andrew Rathbun 11/22/2021 4:48 AM
Anything comma separated
Avatar
Looking to create some DFIR training videos for work, any suggestions on a free tool for video editing, mainly just looking to cut out mistakes and waiting for processing or combine two videos together?
Avatar
Avatar
pug4N6
Looking to create some DFIR training videos for work, any suggestions on a free tool for video editing, mainly just looking to cut out mistakes and waiting for processing or combine two videos together?
chaosmunkey 11/23/2021 7:24 AM
Kdenlive is a good tool for video editing. I use it for editing videos for the missus. Quick and easy (edited)
Avatar
jonathanscott 11/23/2021 8:40 AM
can anyone recommend a good reputable mac laptop forensics firm in Berlin, Germany
Avatar
Avatar
pug4N6
Looking to create some DFIR training videos for work, any suggestions on a free tool for video editing, mainly just looking to cut out mistakes and waiting for processing or combine two videos together?
Andrew Rathbun 11/23/2021 9:18 AM
I know you asked for free, but I use Camtasia to do all my videos (most of which are internal to my employer). Besides Camtasia, I've heard OBS Studio as a common free alternative to Camtasia which is what a lot of YouTube/Twitch people use for streaming, etc. Maybe worth looking into.
Avatar
Digitalferret 11/23/2021 10:07 AM
similarly, OBS only for capture though, and Camtasia for editing. look out for BlackFriday deals on the latter, inc Snagit, too.
Avatar
Andrew Rathbun 11/23/2021 10:40 AM
SnagIt and Camtasia are chef's kiss
Avatar
Hello guys, Do you know if there is a way to find out if the audio speaker was " on " or "off" on windows ?
Avatar
Avatar
CWolf
Hello guys, Do you know if there is a way to find out if the audio speaker was " on " or "off" on windows ?
Andrew Rathbun 11/23/2021 10:55 AM
Avatar
@Andrew Rathbun Agree, if I recall correctly Camtasia is pretty pro LE and donates a lot of there software to ICAC investigations. That's how I came across a raffle license and love it.
Avatar
Avatar
Digitalferret
similarly, OBS only for capture though, and Camtasia for editing. look out for BlackFriday deals on the latter, inc Snagit, too.
Andrew Rathbun 11/23/2021 12:14 PM
Literally just got this email: The Cyber Monday Sale You Need to See We’re cranking up both the holly and jolly this Cyber Monday with our biggest sale of the year! Expect eyebrow-raising savings from Monday, November 29 to Tuesday, November 30 on all things TechSmith, including Snagit, Camtasia, Assets for Snagit, Assets for Camtasia, Audiate, and Knowmia. Don’t miss it!
Avatar
Avatar
Andrew Rathbun
Literally just got this email: The Cyber Monday Sale You Need to See We’re cranking up both the holly and jolly this Cyber Monday with our biggest sale of the year! Expect eyebrow-raising savings from Monday, November 29 to Tuesday, November 30 on all things TechSmith, including Snagit, Camtasia, Assets for Snagit, Assets for Camtasia, Audiate, and Knowmia. Don’t miss it!
Digitalferret 11/23/2021 12:16 PM
yep, regular as cuckoo cuckoo
12:17 PM
same for some DataRecovery s/w, Affinity art proggies and more. being a tightwad i pretty much have them taped 🙂 <4Yorkshiremen>
Avatar
@chaosmunkey @Andrew Rathbun and @Digitalferret Thanks! I’ve been using OBS, if I want anything else I’ll probably have to buy it myself, but I’ve heard good things about Camtasia, I’ll have to check it out
Avatar
Does anyone know of any good, legit test images for practice?
Avatar
Avatar
OxOA
Does anyone know of any good, legit test images for practice?
Andrew Rathbun 11/23/2021 7:18 PM
7:19 PM
Practicing what, in particular?
Avatar
I want to try Autopsy on Linux (edited)
7:20 PM
I have used it on Windows, previously.
Avatar
Andrew Rathbun 11/23/2021 7:20 PM
Ok that's fine. Are you looking to investigate a Windows system? Something else? What are you trying to accomplish?
7:20 PM
Test images is a very broad statement
Avatar
I am just trying to keep my skills from getting rusty, atm... I was thinking about disk images...
7:21 PM
Really, the puzzle of figuring out how to deal with any particular one is what I am after.
Avatar
Andrew Rathbun 11/23/2021 7:21 PM
What skills in particular? That's very broad too.
Avatar
Puzzle solving, I guess, lol.
7:22 PM
I took the Autopsy certification on Windows when it was free. I want to make sure I don't forget what I learned.
Avatar
Andrew Rathbun 11/23/2021 7:22 PM
IR? DF? Do you want an image that has a bunch of deleted stuff and you try to recover it? Do you want a malware case? There's so many potential skills to sharpen
Avatar
I really wish I could practice on FTK again, but that will be a while
7:24 PM
Ah, I see what you mean... I did general forensics before, but only a little malware analysis... (edited)
Avatar
Andrew Rathbun 11/23/2021 7:24 PM
If you learn the artifacts, not the tools, you won't have to worry about forgetting how to use a tool. You can just use a tool to make it work for you around your understanding of the artifacts, if that makes sense
💯 2
Avatar
that does.
Avatar
Andrew Rathbun 11/23/2021 7:24 PM
Unless you're talking about X-Ways, then yeah that's not the easiest tool in the world to use haha
Avatar
Actually, I think what you sent covers what I'm after for right now... I do plan to spend time in the Malware Analyst's Cookbook, at some point
👍 1
Avatar
Avatar
OxOA
Actually, I think what you sent covers what I'm after for right now... I do plan to spend time in the Malware Analyst's Cookbook, at some point
Andrew Rathbun 11/23/2021 7:30 PM
Glad to hear, that's why it was curated the way it was!
Avatar
Avatar
OxOA
Does anyone know of any good, legit test images for practice?
Deleted User 11/24/2021 12:41 AM
Here is a good place to look: https://digitalcorpora.org/
Avatar
Ross Donnelly 11/24/2021 3:08 AM
💪 4
Avatar
Avatar
Deleted User
Here is a good place to look: https://digitalcorpora.org/
Seconded, other sources are cyberdefenders.org and blueteamlabs.online
Avatar
Avatar
Andrew Rathbun
If you learn the artifacts, not the tools, you won't have to worry about forgetting how to use a tool. You can just use a tool to make it work for you around your understanding of the artifacts, if that makes sense
I'm stealing that line to put on a motivational poster.
Avatar
Avatar
Andrew Rathbun
If you learn the artifacts, not the tools, you won't have to worry about forgetting how to use a tool. You can just use a tool to make it work for you around your understanding of the artifacts, if that makes sense
Digitalferret 11/24/2021 5:35 AM
yep, pretty much this. ie the ingredients make the cake, not the food mixer
Avatar
Avatar
CCC
I'm stealing that line to put on a motivational poster.
Andrew Rathbun 11/24/2021 5:40 AM
I'm sure I got it from someone like @randomaccess he's always full of wisdom like that
Avatar
There's going to be a thread full of dolphins with quotes soon.
😂 1
Avatar
Avatar
Pacman
@Cellebrite Yesterday I tried to carry out Android Generic Exynos FBE extraction on a Samsung Galaxy S10, it started a full file system extraction and I left it. I found that it appears to have errored and it asked me to put the phone into download mode. Entered download mode, selected Continue - and it came up with an error message with an option to abort or retry. Retry doesn't do anything so I had to abort. Samsung S10 is now stuck in a boot loop CMD Parameter modified. Unable to enter recovery mode, but can enter download mode. I have tried Samsung Exynos Recovery and I keep getting "Communication Error (Cannot initialize connection)". What do I do>
I'm at this stage now on an S10! Can I ask what the fix was? @Cellebrite (edited)
Avatar
For anyone who is interested - The guest request application for the January 10-14 SWGDE meeting (virtual) is now open until 12/10 at https://www.swgde.org/membership/guest-request
Guest Attendance Request
Avatar
Is anyone experiencing any issues running Cellebrite Reader (current version) on Windows 10 machines?
Avatar
Avatar
luis511_
Is anyone experiencing any issues running Cellebrite Reader (current version) on Windows 10 machines?
v7.50? Not that I've noticed but it only came out on Monday.
Avatar
Sorry. Version 7.49.13 of reader
Avatar
Does anyone have a nice forensic glossary of terms written up that they like to use as an appendix for their mobile device reports? SWGDE's is a bit lacking on the mobile front and NIST's is rather old (2014). I'm working on updating what I have but it's a real pain going in and adding terms. I'd be glad to share mine (edited)
Avatar
Avatar
Beefhelmet
Does anyone have a nice forensic glossary of terms written up that they like to use as an appendix for their mobile device reports? SWGDE's is a bit lacking on the mobile front and NIST's is rather old (2014). I'm working on updating what I have but it's a real pain going in and adding terms. I'd be glad to share mine (edited)
Andrew Rathbun 11/24/2021 8:13 AM
Sounds like a really good thing to centralize on GitHub. Let me know if you're interested and we can host it so everyone can collaborate
8:14 AM
If you provide what you have I can add it and we can ensure alternate definitions exist for those who want multiple options
Avatar
Avatar
Andrew Rathbun
Sounds like a really good thing to centralize on GitHub. Let me know if you're interested and we can host it so everyone can collaborate
Absolutely. Would you like me to PM you?
8:48 AM
It's a hodge-podge from NIST, SWGDE, and some stuff that other examiners that I've met have put together, as well as stuff I've written (specifically to do with graykey and software I use)
Avatar
I should add that it's largely mobile speciffic
Avatar
Avatar
Beefhelmet
Does anyone have a nice forensic glossary of terms written up that they like to use as an appendix for their mobile device reports? SWGDE's is a bit lacking on the mobile front and NIST's is rather old (2014). I'm working on updating what I have but it's a real pain going in and adding terms. I'd be glad to share mine (edited)
If you want to pass along any terms to add to the SWGDE glossary please feel free to send to secretary@swgde.org Please also feel free to join us in January to suggest them then. Guests requests are now open (see my post above). Would love to have the input!
Avatar
Avatar
Brandon E
If you want to pass along any terms to add to the SWGDE glossary please feel free to send to secretary@swgde.org Please also feel free to join us in January to suggest them then. Guests requests are now open (see my post above). Would love to have the input!
Sure thing, I'll send my version. Like I said it's mobile device specific, generally, I just use the SWGDE glossary from 2014 when doing computers. I do have information about specific proprietary information about a certain gray device that we don't talk much about. Just in terms of what extraction types it creates. I don't think it violates anything NDA-wise, just stuff that I think I would have to explain in court anyhow. (edited)
9:23 AM
So with that I'm leaning on your descretion with that info.
Avatar
Avatar
Beefhelmet
Absolutely. Would you like me to PM you?
Andrew Rathbun 11/24/2021 11:33 AM
Please do
Avatar
Quick question, what kinda certs should I start looking out for "entry level" digital forensics, I'm mainly looking to go into law enforcement.
Avatar
Avatar
Halito
Quick question, what kinda certs should I start looking out for "entry level" digital forensics, I'm mainly looking to go into law enforcement.
Andrew Rathbun 11/24/2021 12:10 PM
#training-education-employment
Avatar
Oh I'm blind, I looked up and down for one like that and didnt see it, thank you!
Avatar
Anyone know how I can receover deleted firewall logs from checkpoint firewall server? It's running gaia which is a form of centos
Avatar
this is pretty australian centric, but i imagine similar issues are found in all countries, and it's a bit more cyber-general than df, but i'm hoping i might find some useful perspectives here to assist a young woman who has recently asked for some advice: Could you please explain as an international student how to start my journey in cybersecurity, I am struggling to secure a role with my 485 visas? I had many interviews and talked to many networks in the industry, I couldn't get a role due to budget constraints and not citizen or PR. Thanks.
Avatar
Anyone know any good tools that I can use to demonstrate email spoofing to compare headers to legitimate email?
Avatar
randomaccess 11/25/2021 3:57 AM
@ro after you trying to send spoofed emails? If so you can setup a local mail server and send email using smtp commands
👍🏻 1
Avatar
3pil0gu3#112 11/25/2021 9:02 PM
The Microsoft email header analyzer is a good tool to review the email headers https://mha.azurewebsites.net/ (edited)
this 1
9:04 PM
mail-tester.com is a good email for testing if your emails will make it through spam filters https://mha.azurewebsites.net/ so you can use that for a test example
Avatar
Does anyone have a tool that'll let me filter Event Viewer that contains a particular phrase within the EventData?
1:19 AM
Not analysing an E01, just trying to hunt down the crash logs for Axiom
Avatar
randomaccess 11/26/2021 1:20 AM
You can use evtxecmd to parse your live logs and then use tle?
1:20 AM
Otherwise event log explorer should work
Avatar
Anything better than Event Viewer will probably be good
Avatar
randomaccess 11/26/2021 1:21 AM
Running evtxecmd as an admin will work
Salute 1
1:22 AM
But the crash logs for axiom are either in the case or in the root of your os drive usually
Avatar
Axiom in my case isn't handling the crashes
1:24 AM
So there isn't any crash logs in the usual locations
1:24 AM
Speaking to their support peeps currently.
Avatar
Deleted User 11/26/2021 1:33 AM
when I create VICS case from UFED sourceID for the files is missing in the JSON file. Someone know why? Is there a setting or something for that?
Avatar
3pil0gu3#112 11/26/2021 2:09 AM
Chainsaw is pretty good for event logs
Salute 1
2:10 AM
you can specifiy strings
2:10 AM
and specify the log types
2:11 AM
it runs on both Windows and Linux
2:11 AM
13cubed did a recent video covering it
Avatar
Avatar
Rob
Does anyone have a tool that'll let me filter Event Viewer that contains a particular phrase within the EventData?
Andrew Rathbun 11/26/2021 11:49 AM
EvtxECmd all day. To automate it with KAPE, open up gkape, enable both Targets and Modules side, you know what, screw it, gonna GIF it up for you
Avatar
Avatar
Rob
Does anyone have a tool that'll let me filter Event Viewer that contains a particular phrase within the EventData?
Andrew Rathbun 11/26/2021 11:51 AM
Do this, let it parse, ingest into Timeline Explorer, and filter and search to your heart's content
Salute 1
Avatar
Andrew Rathbun 11/26/2021 12:01 PM
Target Destination (where files pulled are stored) and Module Destination (where tool output is stored) cannot be the same, so that's why Execute was greyed out initially, i changed blah to blaha just to enable it 😛
Salute 1
12:02 PM
you can technically just run Module side by itself, but personally, I like have a copy of the files I'm analyzing residing outside the image, triage package, whatever, etc so I can throw other tools at those specific artifacts, if necessary.
Avatar
Hi All, do anybody have study material in connection with analysing IPDR, finding the clue of VoIP calls in IPDR, tracing IP address, types of data which we can ask from telecom service providers etc...
Avatar
Avatar
randomaccess
@ro after you trying to send spoofed emails? If so you can setup a local mail server and send email using smtp commands
Arman Gungor 11/27/2021 9:59 AM
I recommend NodemailerApp for this 👌🏻
Avatar
exploit.quest 11/28/2021 5:35 AM
You know how governments sometimes ask companies (mainly those that handle communications afaik) to add backdoors for them, how are these usually implemented? Are they just given a VPN and login credentials to connect to an internal administration service? Also I recently heard of port knocking, is that ever used for something like this?
Avatar
Large vendors typically have lawful intercept functionality built in these days: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/lawful/intercept/book/65LIch1.html To first order, lawful intercept wouldn’t bother with using something as complex as port knocking
Avatar
Avatar
mtu
Large vendors typically have lawful intercept functionality built in these days: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/lawful/intercept/book/65LIch1.html To first order, lawful intercept wouldn’t bother with using something as complex as port knocking
exploit.quest 11/28/2021 10:50 AM
I see, thank you
Avatar
Avatar
Ghosted
Do we have any reps from Griffeye on the server?
Evening Ghosted, just double checking to see if the questions you had were answered. If there are questions about @Griffeye and I can help, let me know.
Avatar
3pil0gu3#112 11/29/2021 2:43 AM
Quick question guys will Timeline Explorer eventually support MDE (Microsoft Defender Endpoint) output as a plugin? I'm trying to get some colour coding on key events to work with an MDE eported CSV file. I haven't found much info on the plugin development but was unsure if this was on the roadmap. I guess failing that its developing my own plugin (edited)
2:44 AM
The CSV file is extracted from the MDE Timeline from the portal
Avatar
randomaccess 11/29/2021 4:45 AM
@3pil0gu3#112 you can build your own support so yes it will if you build it :)
4:46 AM
@Andrew Rathbun probably has written a guide
Avatar
Avatar
3pil0gu3#112
Quick question guys will Timeline Explorer eventually support MDE (Microsoft Defender Endpoint) output as a plugin? I'm trying to get some colour coding on key events to work with an MDE eported CSV file. I haven't found much info on the plugin development but was unsure if this was on the roadmap. I guess failing that its developing my own plugin (edited)
Andrew Rathbun 11/29/2021 4:47 AM
If you're looking for color coding then that's related to the .layout file. Right click on a column header, conditional formatting, then make all your changes and save that layout.local file.
👍 1
4:48 AM
I'm working on making a repo with stuff like that for Eric's tool output
4:48 AM
Simple things like highlighting scvhost.exe etc
4:50 AM
No coding is required. Plugins only help mostly for adding line and tag columns along with making columns with timestamps treat each timestamp not as a strong but date and time so the filtering can be identical to Eric's tool output
👍 1
Avatar
3pil0gu3#112 11/29/2021 2:32 PM
Thanks @Andrew Rathbun will have a look at this cheers (edited)
👍 1
Avatar
Hi questions for all, I have going thru a users PC and see a txt file in users\public directory, I viewed the file it mentions a website and when I search this website on VT it shows clean and search on alienvault it shows as a crypto mining pool. There is a passwords in the txt file aswell. I didnt provide the website, cause I dont know if that is allowed. Are they things main things I should check on this PC to see if anything suspicious is going on? EDR didnt pick anything on the PC. Thanks
7:43 PM
Should mention this website doesnt ping and when searched on abuseipdb shows low hits running on an ec2
Avatar
3pil0gu3#112 11/29/2021 7:46 PM
are any suspicious processes running, suspicious network connections and so forth. Also maybe doing a quick AV scan to identify if anything suspicious/malicious is present as a fast triage
7:47 PM
Then from an EDR perspective generating a package/timeline to investigate how the file got there
7:47 PM
and also reviewing from a network perspective whether you have had any rules that have fired or suspicious activity from the endpoint
7:48 PM
on your IDS solution
Avatar
Yeh scanned with AV no threats. Was going to ask EDR admins to send me report on the PC. We use zscaler for our proxies and if a user goes to this spexific websire it gets flagged as a cobalt strike flag. The PC didnt get get flagged by zscaler as it never went to that site
8:31 PM
Need to figure out how this file got there
Avatar
Andrew Rathbun 11/29/2021 8:31 PM
See if there's a zone identifier attached to the file in the MFT. That might give you a hint (edited)
8:32 PM
Also you should install Sysmon on all your systems moving forward for better logging. I don't have advice on a specific config file but that'll help log any badness much better
8:33 PM
Default Sysmon is better than no Sysmon
Avatar
3pil0gu3#112 11/29/2021 8:35 PM
Cobalt Strike is interesting if that is present would be looking in event logs for 4688 process creation security Event Logs, possibly logging for SMB named pipe creation and also if rundll32 was used as a side loading technique. However you will need to do some timeline analysis. @Andrew Rathbun is correct with sysmon logs (edited)
8:36 PM
Turn this on
8:37 PM
Also check out the ConsoleHost_History.txt file for every user and see if you can see PS commands ran by someone who shouldn't be there (edited)
Avatar
Hmm kk cool will do. I appreciate the help @Andrew Rathbun @3pil0gu3#112
Avatar
Andrew Rathbun 11/29/2021 8:38 PM
C:\Users\%user%\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt (edited)
👍 1
Avatar
I would think our SOC would be able to give me more info on the event logging. We do have a SIEM and SOAR
Avatar
Andrew Rathbun 11/29/2021 8:41 PM
Check for shady 7045 events. 400/600/800 PowerShell events
Avatar
Kk will do. Will report back on the outcome.
Avatar
3pil0gu3#112 11/29/2021 8:47 PM
If attributed to Cobalt Strike DFIR report have an awesome writeup https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/
As you have noticed from our reporting so far, Cobalt Strike is used as a post-exploitation tool with various malware droppers responsible for the initial infection stage. Some of the most common droppers we see are IcedID (a.k.a. BokBot), ZLoader, Qbot (a.k.a. QakBot), Ursnif, Hancitor, Bazar and TrickBot.
👍 2
Avatar
Hi, is there any information about android "data_usage.db" tables and columns?
Avatar
So I find out an answer on the above issue with that txt file and cobalt strike alert. Its part of an 3rd parry pentest activity. They will need to figure out why this 3rd party is dropping these files on users PC.
👍 2
Avatar
SyphrusFenix 11/30/2021 4:39 PM
Is anyone good with troubleshooting why my wireless network adapter wouldn't be able to connect in my Kali Linux vm in virtualbox?
Avatar
RandyRanderson 11/30/2021 4:54 PM
what type of wireless network adapter
Avatar
@Cellebrite Hi, when will I be able to watch yesterdays webinar on demand ?
Avatar
Hello guys, Do you have a trick to connect (at first time) a usb key into the computer, first in VM (virtual box) but never in windows ? I ask for that because i wonder what is the benefit it would comes if the usb connect at first on windows then and VM ( for avoid trojan, virus from a connected usb to the computer) thanks for the answers 🙂
Avatar
chrisforensic 12/1/2021 2:09 AM
sooooo cool 😆
🥳 1
Avatar
Deleted User 12/1/2021 2:57 AM
@AccessData/Exterro Hello, we have a problem with accessing FTK license manager. When we have our dongle inserted and we open it, it says that there are multiple security devices found. Codemeter shows a GetData Trial CMstick but we have no idea how to remove it since 'Remove license is greyed' Thank you very much
Avatar
DeepDiveForensics 12/1/2021 3:19 AM
1. Stop the Codemeter Service from Codemeter Control Center. 2. Go to programs files/Codemeter /CmAct. 3. Cut and paste those files somewhere else. 4. Then run the License Manager. Once task is done, paste those files at the same location.
Avatar
Avatar
callzor
@Cellebrite Hi, when will I be able to watch yesterdays webinar on demand ?
Give it a week or so. It will be on the website. If you registered You will get a link to it.
Avatar
Avatar
CLB-Paul
Give it a week or so. It will be on the website. If you registered You will get a link to it.
Thanks for the information.
Avatar
Avatar
DeepDiveForensics
1. Stop the Codemeter Service from Codemeter Control Center. 2. Go to programs files/Codemeter /CmAct. 3. Cut and paste those files somewhere else. 4. Then run the License Manager. Once task is done, paste those files at the same location.
Deleted User 12/1/2021 1:55 PM
thank you very much this helped
Avatar
@Magnet Forensics Anyone available to help with a CLS issue? Just updated to the latest version on a box and Process won't recognize the license even though the license manager says otherwise.
Avatar
Avatar
Tyler_Leno
@Magnet Forensics Anyone available to help with a CLS issue? Just updated to the latest version on a box and Process won't recognize the license even though the license manager says otherwise.
Sorry I am at the hospital today but for this Operations needs to get involved so i recommend involving support@magnetforensics.com It will open a ticket and get quick attention and your email will get automatic responses on the progress of the ticket up until the point they are able to call you.
Avatar
Avatar
Jamey
Sorry I am at the hospital today but for this Operations needs to get involved so i recommend involving support@magnetforensics.com It will open a ticket and get quick attention and your email will get automatic responses on the progress of the ticket up until the point they are able to call you.
Thanks - I'll reach out to them.
Avatar
Hi Someone from @Magnet Forensics please ? Or someone who knows... I have a google token available to get data with UFED Cloud but when I try with Axiom it says the token is incorrent
11:47 PM
Anyone already had it ?
Avatar
Hi guys, i got a question im using a wiebetech ultradock v5.5. But I'm able to create and delete files on the mounted folder. It seems like the write block isn't working but if power it down and back up its all gone. And when making a image there are no traces of the activity. Is it some caching funtion on the writeblocker or some windows thing?
Avatar
https://www.cellebrite.com/en/episode-15-ibeg-to-dfir-location-data-on-ios-and-android-devices/ For those that missed the webinar. Cheatsheet also included in the link.
In this episode, we are joined by special guests Jared Barnhart & Ian Whiffin to discuss location information as recorded by iOS and Android devices. Location data has been integral to many investigations but there are so many different types of location artifacts that are recorded by a device making it can be challenging to … Continue reading "...
Avatar
Hello folks! Question. Is is possible to recover Calendar event\meetings and deleted emails from O365 online? No physical access to device
Avatar
Avatar
CLB-Paul
https://www.cellebrite.com/en/episode-15-ibeg-to-dfir-location-data-on-ios-and-android-devices/ For those that missed the webinar. Cheatsheet also included in the link.
theAtropos4n6 12/2/2021 9:08 AM
This webinar is awesome. It is pure gold! The research performed by @CLB_iwhiffin @heatherDFIR and the rest of the Cellebrite team is outstanding. Congratulations to you all! And thank you for sharing this. It is so useful and enlightening. Salute 🤯 🤯 🤯 🤯 🤯 🤯
💯 1
Avatar
Avatar
theAtropos4n6
This webinar is awesome. It is pure gold! The research performed by @CLB_iwhiffin @heatherDFIR and the rest of the Cellebrite team is outstanding. Congratulations to you all! And thank you for sharing this. It is so useful and enlightening. Salute 🤯 🤯 🤯 🤯 🤯 🤯
Glad you enjoyed it.
Avatar
Hello everyone, Any issue with eDiscovery module from compliance.microsoft.com since they had the "new case" function ?
Avatar
hello! excited to participate in this community.
🍻 2
Avatar
Hey everyone! Has anyone worked with instagram/facebook vanish mode? Has anyone had any success with recovering the vanished messages from either an android or iOS device?
Avatar
I have a dumb question - I believe I am overthinking but I need someone to set me straight! I have a huge extraction 100+gb. I need to carve it, etc but its taking over 24hrs. The warrant is only for 90 days. Is there a way to save just 90 days I want, load it into PA and carve it, etc?
Avatar
Avatar
Forgedmom
I have a dumb question - I believe I am overthinking but I need someone to set me straight! I have a huge extraction 100+gb. I need to carve it, etc but its taking over 24hrs. The warrant is only for 90 days. Is there a way to save just 90 days I want, load it into PA and carve it, etc?
@Cellebrite Help?
Avatar
Avatar
Forgedmom
@Cellebrite Help?
So kind of but your will only be caring within the files. What are you trying to carve for specifically ?
Avatar
Avatar
Forgedmom
I have a dumb question - I believe I am overthinking but I need someone to set me straight! I have a huge extraction 100+gb. I need to carve it, etc but its taking over 24hrs. The warrant is only for 90 days. Is there a way to save just 90 days I want, load it into PA and carve it, etc?
Andrew Rathbun 12/2/2021 6:34 PM
You already have the extraction from the phone in question? Isn't that considered the search at the time of extraction? Then the dump of the phone can sit in evidence for months and still be analyzed whenever. Did things change in the last 2.75 years or do you work in California or somewhere like that?
6:36 PM
It's coming back to me now that I'm thinking about it but I'm pretty sure the west coast had some ridiculous ruling that put time limits on analysis of devices. I forget the justification but I always thought it was whack. Maybe that is trickling east now?
Avatar
Avatar
CLB-Paul
So kind of but your will only be caring within the files. What are you trying to carve for specifically ?
I’m just trying to see if there’s a way to cut time. I’m on 36 hours of location carving and it’s not done. Plus the detective can’t look at the whole extraction, just what they have the warrant for - which is 90 days. So to wait for days for it to process on PA to carve and parse the entire phone is frustrating.
Avatar
Avatar
Andrew Rathbun
You already have the extraction from the phone in question? Isn't that considered the search at the time of extraction? Then the dump of the phone can sit in evidence for months and still be analyzed whenever. Did things change in the last 2.75 years or do you work in California or somewhere like that?
We extract the whole phone, but they can only look at the timeframe in their warrant. So I filter those dates for them in PA. This case I’m working currently has 9 phones. It’s taking me forever.
Avatar
Avatar
Forgedmom
We extract the whole phone, but they can only look at the timeframe in their warrant. So I filter those dates for them in PA. This case I’m working currently has 9 phones. It’s taking me forever.
Andrew Rathbun 12/2/2021 6:43 PM
Oh so the 90 days is the timeframe authorized in the search warrant, not an expiration date for when you have to stop looking at said devices. I think I'm tracking now
Avatar
Avatar
Andrew Rathbun
Oh so the 90 days is the timeframe authorized in the search warrant, not an expiration date for when you have to stop looking at said devices. I think I'm tracking now
Yes. We had a law like that but it’s been revised - thankfully.
Avatar
Avatar
Forgedmom
Yes. We had a law like that but it’s been revised - thankfully.
Andrew Rathbun 12/2/2021 6:45 PM
I'm very glad to hear that lol. Ok well I'll step back since I can't help you on this but best of luck. Any thoughts on just doing one phone at a time? Instead of 9 at once?
Avatar
Avatar
Andrew Rathbun
I'm very glad to hear that lol. Ok well I'll step back since I can't help you on this but best of luck. Any thoughts on just doing one phone at a time? Instead of 9 at once?
I am doing them one at a time. But it’s a high profile case so they are wanting everything yesterday. 🤦🏻‍♀️
Avatar
Avatar
Forgedmom
I am doing them one at a time. But it’s a high profile case so they are wanting everything yesterday. 🤦🏻‍♀️
Andrew Rathbun 12/2/2021 6:47 PM
Fully understand and appreciate that. Always a battle those in LE have with the less technical minded in our ranks. Tell them if they want it quicker that you need better equipment or more personnel lol
Avatar
Avatar
Andrew Rathbun
Fully understand and appreciate that. Always a battle those in LE have with the less technical minded in our ranks. Tell them if they want it quicker that you need better equipment or more personnel lol
Literally what I’m doing. Hahahaha. They are pricing out better computers.
Avatar
Avatar
Forgedmom
Literally what I’m doing. Hahahaha. They are pricing out better computers.
Andrew Rathbun 12/2/2021 7:58 PM
Strike while the iron is hot! Good luck
♨️ 1
Avatar
Avatar
Forgedmom
I’m just trying to see if there’s a way to cut time. I’m on 36 hours of location carving and it’s not done. Plus the detective can’t look at the whole extraction, just what they have the warrant for - which is 90 days. So to wait for days for it to process on PA to carve and parse the entire phone is frustrating.
@Forgedmom We have a test version of PA 7.51 with a fix for the location carving issue, could send you a link for it, please DM your email if you are interested
Avatar
Hey all
7:32 AM
I have a hunch Zoho's codebase or, at least Tomcat has been compromised
7:32 AM
First AD manager, now Service Desk+, both exploited via a failure in apache tomcat
7:33 AM
Can anyone tell me if I'm crazy or not
Avatar
@Ben Smash maybe try #cyber-threat-intelligence #incident-response ?
Avatar
will do thanks
Avatar
Tiedye9531 my new account dm 12/4/2021 6:43 AM
how to get started in dfir
Avatar
Avatar
Tiedye9531 my new account dm
how to get started in dfir
Digitalferret 12/4/2021 7:08 AM
depends what "turns your cogs". do you like finding things, for instance?
Avatar
Avatar
Digitalferret
depends what "turns your cogs". do you like finding things, for instance?
Tiedye9531 my new account dm 12/4/2021 7:19 AM
yes
Avatar
Digitalferret 12/4/2021 8:36 AM
there you go, you have started already
8:37 AM
maybe start refining that interest and pursuing it
Avatar
Avatar
Tiedye9531 my new account dm
how to get started in dfir
take a look at https://startme.stark4n6.com, plenty of resources to get you started, play with tools and whatever else you'd like! (edited)
Avatar
elizavetabelkasoft 12/6/2021 2:12 AM
Take a chance to win Belkasoft X full-featured license! Traditional Belkasoft end-of-the-year customer survey has started. Share your user experience of Belkasoft products. Your opinion about interaction with Belkasoft educational materials and events is important as well. Take a part in the survey and get a chance to win a full-featured Belkasoft X license. Filling out the survey will take about 15 minutes. Do it now: https://bit.ly/3dm2QM3
2:12 AM
Avatar
Anyone know how fast a TX1 can duplicate a drive? wondering how many min per gb.
9:32 AM
Spinning drive to spinning drive
Avatar
rugby_tech#7130 12/6/2021 10:32 AM
Afternoon, I have been informed that our unit that monitors RSOs are having to change the software they utilise to monitor their phones and computers. They currently install and monitor via eSafe but was wondering what other forces are utilsing. Apparently eSafe are really pushing their prices up next year and therefore an alternative needs to be found. Thanks
Avatar
Avatar
Ghosted
Anyone know how fast a TX1 can duplicate a drive? wondering how many min per gb.
I typically get 75-90 MB/s for acquisition and slightly higher during verification.
Avatar
@Tyler_Leno thanks
Avatar
anyone used / using Nuix discover?
Avatar
sheepdog751 12/6/2021 3:37 PM
Anyone using JMP Software for data analytics?
Avatar
It's always us-east-1 🤣
Avatar
Anybody have a thoughts on playing video surveillance from cheap wireless pan/tilt cameras ? My partners of course went out removed the SD cards from them and didn't document the device. The file format is a 21345.data files on a fat32 formatted MicroSD's. I"ve tried Axiom and its not decoding it. #dvr-multimedia-surveillance
Avatar
Avatar
DCSO
Anybody have a thoughts on playing video surveillance from cheap wireless pan/tilt cameras ? My partners of course went out removed the SD cards from them and didn't document the device. The file format is a 21345.data files on a fat32 formatted MicroSD's. I"ve tried Axiom and its not decoding it. #dvr-multimedia-surveillance
forensicmike @Magnet 12/7/2021 1:13 PM
I'd definitely expect a better answer in #dvr-multimedia-surveillance so I'd cross post there for sure. Is there a specific header / magic in your data files? Sometimes that can be more telling than the filenames/extensions in the world of CCTV cameras.
1:14 PM
but DVR Examiner would have a better chance at decoding than AXIOM 🙂 and they can do trial licenses upon request I believe.
Avatar
@forensicmike @Magnet appears open source player MPC-HC.org is able to play it but not stop/fastforward etc. hope this helps someone else #dvr-multimedia-surveillance
👍 1
Avatar
DVR examiner is designed to work with proprietary DVR filesystems (which it does a great job with) but it won’t work with individual files on a SD card. I am sure other software vendors will chime in to lend a hand but in the meantime you can try FFmpeg (open source) to get playback or convert. https://drive.google.com/open?id=1OH9tNLeZ3_aqXlVJsUNB6nr3SR1ULR74 (edited)
👍 1
Avatar
blake_at_amped 12/7/2021 2:25 PM
Agree with @Brandon E that ffmpeg might work, and there is a document from SWGDE about h.264 that might help if the file was encoded as h.264. You are welcome to send it over to us at @Amped Software as well (www.ampedsoftware.com/upload)
Avatar
Kyle Fittro 12/7/2021 5:56 PM
What is the best resource to install a client and monitor an android device completely including things like Snapchat, when you have very brief access to the device? The device owner has to remain unaware this is occurring. This to be done with full legal authority to do under the scope of a Title III search warrant. Is a pre-built "spy app" like Spyine better or is there more success with one built in Linux and then install the apk? I'm proficient in Kali Linux and it's components. Just never been faced with this potential challenge. Thoughts? Suggestions?
Avatar
Glad I switched to iPhone recently 😂
Avatar
Data Recovery 12/7/2021 11:09 PM
Ransomware data recovery possible any tools have
Avatar
Avatar
ryd3v
Glad I switched to iPhone recently 😂
Pegasus has entered the chat
😂 2
Avatar
Avatar
Pacman
A Snapchat video extracted from a Samsung Galaxy A51 was found to be relevant to investigation, and will be relied on in court. The question was is it possible to say the snapchat video was recording using Samsung Galaxy A51? (As opposed to having received the video from someone else)
@Pacman did you ever find an answer to this? I'm guessing the answer is no, as snapchat videos do not contain metadata with the device name.
Avatar
Avatar
Pacman
Filepath is: /data/media/0/Snapchat/Snapchat-1861604616.mp4
^ file path in question
Avatar
Avatar
Mr Saturn
@Pacman did you ever find an answer to this? I'm guessing the answer is no, as snapchat videos do not contain metadata with the device name.
We have had success in answering this question based on a different analysis approach using a video file’s structure. Basically able to say this video has been recorded on a make/model device and never transmitted anywhere or this video was recorded on a make/model device and transmitted using xyz app. You can shoot me a DM or check out www.medexforensics.com for more details.
Avatar
@Brandon E I like the idea of FFmppeg i've only used it to pull still images out of a video feed, did nt think about using it as a player
Avatar
Morning all, does anybody have any experience using the NIST cal-drive.csh script in the CFTT linux distro to create reference data on M2 chips? I've been trying for a couple of weeks now and despite running through USB3 connected adaptors it seems to run glacially slowly, and I haven't yet seen the script finish.
Avatar
Hi, am sure this has been asked before but would some1 know a good resource that grabs news from threat actors from the “dark web” such as claiming to infect, alrdy infected or any news in general? TIA
Avatar
Avatar
Ghosted
Anyone know how fast a TX1 can duplicate a drive? wondering how many min per gb.
Deleted User 12/9/2021 2:13 PM
Hey don't know if anyone answered We just did 2 -1 TB Spinner to Spinner in just under 2 hrs
Avatar
This Log4J issue is becoming an issue..
Avatar
Avatar
B74
This Log4J issue is becoming an issue..
Andrew Rathbun 12/10/2021 3:07 PM
Yeah seems like a big deal...oof
Avatar
TyphoidMeredith/Case 12/10/2021 3:07 PM
It’s a big deal
Avatar
Andrew Rathbun 12/10/2021 3:08 PM
Hopefully lots of applications get patched in the near to immediate future
Avatar
eh, it only scored a 10 on cvss
😆 4
Avatar
randomaccess 12/10/2021 4:12 PM
@Andrew Rathbun even if they do .... Well ...I have a call about unpatched exchange next week
👍 1
Avatar
Andrew Rathbun 12/10/2021 4:25 PM
I'm more talking about Steam and other everyday applications. Exchange servers are hopeless at this point 🤕
Avatar
randomaccess 12/10/2021 4:32 PM
People not patching is going to keep me in a job for a long while
💯 7
Avatar
@DCSO amped5 has this implemented for me a while back. @Amped Software (not sure if all the .data structures are the same though) (edited)
Avatar
pathsofglory 12/12/2021 5:02 PM
The Log4Shell hack is a brand new 0-day attack that’s considered the worst computer vulnerability the internet has ever seen.
Avatar
Anyone have any info on detecting air tags in stalking cases?
Avatar
In order to keep all information regarding log4j together and easily searchable, please use #log4j thread in the #incident-response channels (edited)
Avatar
Avatar
Ghosted
Anyone have any info on detecting air tags in stalking cases?
Its my understanding that iPhones not connected to the iCloud account of air tags will notify the user of the iPhone that an unknown air tag is following them. As far as physically locating the air tag, would an electronic detection K9 find them?
Avatar
Morning all. When looking at deleted files in Autopsy, what is the difference between ‘File System’ and ‘All’? I can’t seem to find the answer anywhere.
Avatar
For sharepoint: does the owner of a an item (e. g. video) see in any ways who viewed the item? I know the log files might show activities but asking from a frontend / notification perspective
Avatar
Avatar
florus
@DCSO amped5 has this implemented for me a while back. @Amped Software (not sure if all the .data structures are the same though) (edited)
martino_amped 12/13/2021 3:45 AM
Of course, there are always different variants, we support a few but some are more popular than others!
Avatar
Avatar
FullTang
Its my understanding that iPhones not connected to the iCloud account of air tags will notify the user of the iPhone that an unknown air tag is following them. As far as physically locating the air tag, would an electronic detection K9 find them?
That's what I through I'd read too
Avatar
Avatar
FullTang
Its my understanding that iPhones not connected to the iCloud account of air tags will notify the user of the iPhone that an unknown air tag is following them. As far as physically locating the air tag, would an electronic detection K9 find them?
Deleted User 12/13/2021 11:59 AM
And Wigle on an Android phone?
Avatar
Avatar
martino_amped
Of course, there are always different variants, we support a few but some are more popular than others!
Thanks for the insight!
👍 1
Avatar
Avatar
Deleted User
And Wigle on an Android phone?
Could work. Does Wigle show a signal strength for nearby BT devices? I have used a BT scanner on Android and it showed signal strength but I don't remember the name right now.
Avatar
Avatar
FullTang
Could work. Does Wigle show a signal strength for nearby BT devices? I have used a BT scanner on Android and it showed signal strength but I don't remember the name right now.
Deleted User 12/13/2021 12:36 PM
Even though I use it almost every day, I honestly cannot remember. I was behind a delivery van the other day and it picked up a smart tag in the back which I thought was interesting. I think it was just a generic tag.
👍 1
Avatar
BLE finder is one that i have used on iPhones for an app, @Deleted User@FullTang
👍🏻 1
Avatar
Has anyone got a contact in the UK to buy Infinity box credits? Fonefunshop is no longer supporting them.
2:24 AM
Or does anyone use the Pandora box and wouldnt mind DM me their thoughts on it?
Avatar
Avatar
Zhaan
Has anyone got a contact in the UK to buy Infinity box credits? Fonefunshop is no longer supporting them.
gsmserver sells them
👍 1
Avatar
Avatar
Ghosted
Anyone have any info on detecting air tags in stalking cases?
Apple have just published "Tracker Detect" for Android devices
Avatar
https://play.google.com/store/apps/details?id=com.apple.trackerdetect
👍 1
Avatar
Hector!221B 12/14/2021 3:57 AM
hi there im a new to digital forensics and i want to ask what digital forensics certs is good for someone like me and what sites are offering them. thanks!
Avatar
Avatar
Hector!221B
hi there im a new to digital forensics and i want to ask what digital forensics certs is good for someone like me and what sites are offering them. thanks!
Andrew Rathbun 12/14/2021 4:39 AM
#training-education-employment
Avatar
Avatar
OllieD
Apple have just published "Tracker Detect" for Android devices
I would say Airguard, but that has to be near a tag that is away from its respective paired iphone for 15 minutes or more. Now I'll have to look at tracker detect, probably works the same.
Avatar
Avatar
CCC
I would say Airguard, but that has to be near a tag that is away from its respective paired iphone for 15 minutes or more. Now I'll have to look at tracker detect, probably works the same.
Most likely. Think it needs manually running, it doesn't automatically scan, unlike the equivalent functionality on iOS
Avatar
Airguard can be set to always run in the background, depends how bothered you are I suppose.
7:42 AM
But trying it at my desk was useless owing to the 15 minutes way from phone caveat
7:43 AM
I wonder if anyone actually uses them for tracking? I just seem to see gps on cars.
7:44 AM
I don't seem to have trackerdetect on play store.
Avatar
Anyone know off the top of there head where the default file path voicemails are stored. (android device.)
Avatar
burgers_N_bytes 12/14/2021 11:36 AM
Out of curiosity, how does everyone go about explaining to their client when a device needs to be sent into CAS for extraction?
Avatar
Always interested in meeting new people! Would love to connect with anyone on LinkedIn :) https://www.linkedin.com/in/garrett-hassian/
Avatar
Avatar
ghass
Always interested in meeting new people! Would love to connect with anyone on LinkedIn :) https://www.linkedin.com/in/garrett-hassian/
templare cristiano crociato 12/14/2021 5:09 PM
here I am!
Avatar
Hey, does anyone have decryptor for globeimposter ransomware? I've already tried emsisoft decryptor and it didn't work 😭
Avatar
Does anyone know of any other online free digital magazines for DFIR similar to whats below for EVD Collection? TIA. https://read.nxtbook.com/wordsmith/evidence_technology/
Avatar
Avatar
cmuk
Morning all. When looking at deleted files in Autopsy, what is the difference between ‘File System’ and ‘All’? I can’t seem to find the answer anywhere.
Hi. The difference is that All will also contain carved files.
Avatar
Avatar
B74
This Log4J issue is becoming an issue..
Our IT department just started on a change freeze for the holidays which means they could spend time to do a bunch of upgrades for our forensic lab infrastructure. Now they're all busy with the Log4j.... my christmas is ruined lol
Avatar
Avatar
b8vr
Hi. The difference is that All will also contain carved files.
Thanks B8vr
Avatar
Our department IT must have changed something in response to Log4j, now my Cellebrite readers don't work on any IT managed device. Same readers work fine on unmanaged devices
Avatar
TyphoidMeredith/Case 12/15/2021 11:16 AM
Oh crap
11:16 AM
Are you still able to do your job then or is this just borked?
Avatar
I'm just including HTML/PDF with the readers for the managed devices. I've assigned an unmanaged device to them for the readers so they can tag and make new reports etc.
12:48 PM
they just can't put the unmanaged device on the network so it's airgapped
Avatar
any tips on how to image a vhdx, Windows won't mount it and its not visible in the explorer. Arsenal also mounts it buts not visible to the end user
Avatar
Any Idea of the best tool for reconstituting Disk images that form part of an LVM
Avatar
Avatar
8198-IZ54
Any Idea of the best tool for reconstituting Disk images that form part of an LVM
I've used libvslvm (libyal project) in the past. The vslvmmount tool from libvslvm will fuse mount the LVM to a given mount point.
Avatar
kmacdonald1565 12/16/2021 6:24 AM
sorry for the semi-long story incoming: One of my local (non-tech) detectives just received an iCloud production. the file was unusually small (~1.5 MB). I open it up, find a couple of html files. they have multiple downloads corresponding with bookmarks, contacts, pictures (multiple downloads), etc. each one of these downloads also need to be decrypted. I am working on downloading all of the files and decrypting them. its only a about 9 GB worth. but I imagine this would be a painful task with larger productions. my questions are: 1. did apple move to this for all of their productions? 2. say I had a 100 GB production, is there a way to automate this (besides writing my own script)? 3. does Cellebrite still support production decoding with having so many files and no central hierarchy? (x-posted on #cloud-forensics )
Avatar
@Fierry What do you mean image a vhdx? It's already a container, why cant you just hash it, duplicate it and then hash verify?
7:04 AM
If arsenal mounts the vhdx and you aren't "seeing" a drive, it may be formatted in a manner that Windows doesn't support for the GUI. open up disk manager to see if you have a new disk available. Open up FTK imager when the vhdx is mounted to check for the new "disk" that way as well.
7:08 AM
For example: I have an .aff4 acquisition created by Cellebrite Collector. I can mount that acquisition through AIM and nothing pops up to me or is visible in explorer. FTK Imager shows it as a Arsenal Virtual SCSI Disk and I can browse the structure that way. Does that answer your question?
Avatar
Avatar
whee30
@Fierry What do you mean image a vhdx? It's already a container, why cant you just hash it, duplicate it and then hash verify?
It turned out that arsenal attempted to mount it and shows it as mounted, however other checks confirmed that the vhdx supplied by the client were incomplete :/
8:02 AM
Thanks for the assist 🙂
Avatar
andrew_case 12/16/2021 9:58 AM
The 2022 DFRWS USA CFP is now open. This is a great venue to publish a peer-reviewed paper in an academic setting that understand the value of memory forensics and malware analysis. Please see the full details here: https://dfrws.org/dfrws-usa-2022-call-for-papers-is-open/
The DFRWS USA 2021 Call for Papers is open through March 7, 2021. Prepare and submit your digital forensics research papers now!
Avatar
MF-Katie McMichael 12/16/2021 10:21 AM
The Magnet Summit 2022 CFP is now open. Submit your presentation here: https://magnetmarketing.wufoo.com/forms/magnet-user-summit-2022. We're excited to be presenting the Magnet Summit 2022 as both an in-person event and virtual event in April 2022. The in-person event is taking place in Nashville, TN from April 11-13, 2022. 30-minute lectures will be available for both event formats, along with workshops and hands-on labs happening only at the in-person event. Interested in filling one of our available 30-minute speaking slots? Any qualified industry professional is welcome to submit a proposal and all ideas are welcome — including DFIR talks that don’t include our products. Our goal for this event is to be relevant to the industry, with general interest talks that help investigators from all walks. Among other things, this speaking opportunity is a great way to educate and share with others about the important work you do. The deadline to submit your proposal is January 3rd, 2022. Reach out to us at magnetusersummit@magnetforensics.com if you have any questions.
Avatar
Good afternoon. I currently am classified as a DFIR student, but I have since graduated and am now employed in LE in the US. How would I go about getting myself properly classified? Also, I am being tasked with rebuilding the digital lab essentially from scratch. Would anyone have suggestions for types of hardware and software I should look at? Thank you!
Avatar
One of the mods should hopefully see this and get in touch to update your role
uppoint 1
Avatar
Avatar
Nilandia
Good afternoon. I currently am classified as a DFIR student, but I have since graduated and am now employed in LE in the US. How would I go about getting myself properly classified? Also, I am being tasked with rebuilding the digital lab essentially from scratch. Would anyone have suggestions for types of hardware and software I should look at? Thank you!
Andrew Rathbun 12/16/2021 7:31 PM
I got you. Congrats on graduating and the new gig! Make us proud
Avatar
Avatar
Nilandia
Good afternoon. I currently am classified as a DFIR student, but I have since graduated and am now employed in LE in the US. How would I go about getting myself properly classified? Also, I am being tasked with rebuilding the digital lab essentially from scratch. Would anyone have suggestions for types of hardware and software I should look at? Thank you!
Andrew Rathbun 12/16/2021 7:32 PM
What types of cases are you going to be working?
Avatar
Avatar
Andrew Rathbun
I got you. Congrats on graduating and the new gig! Make us proud
Thank you! I'm very excited. I'll be taking whatever cases get sent my way, but I've been warned the vast majority of cases will deal with child exploitation.
Avatar
Avatar
Nilandia
Thank you! I'm very excited. I'll be taking whatever cases get sent my way, but I've been warned the vast majority of cases will deal with child exploitation.
Andrew Rathbun 12/16/2021 7:41 PM
Start learning about file and folder access artifacts so you can prove when your suspect opened a file, whether it exists or not. Learn about the $MFT and $J. If you have questions on how to learn about those things, please ask. (edited)
Avatar
This ^ and do the preservation request asap.
Avatar
Good idea. I do know some, but it's good to become as familiar as possible.
Avatar
I would also sign up for the Facebook/Instagram and Google portals to serve them with preservation requests/legal process before you get the case where you need to do it. I am assuming you will be doing investigations in addition to digital forensics, and that might not be the case for you.
uppoint 1
Avatar
Avatar
Nilandia
Thank you! I'm very excited. I'll be taking whatever cases get sent my way, but I've been warned the vast majority of cases will deal with child exploitation.
Side note, if you have never done it before or it's your first time, be prepared, the first one is rough. Was for me anyways.
Avatar
Avatar
ryd3v
Side note, if you have never done it before or it's your first time, be prepared, the first one is rough. Was for me anyways.
I appreciate it. It will be my first one. I'm trying to brace for impact, but I know there's no such thing as being truly prepared.
Salute 1
Avatar
Avatar
Nilandia
I appreciate it. It will be my first one. I'm trying to brace for impact, but I know there's no such thing as being truly prepared.
Andrew Rathbun 12/17/2021 3:57 AM
Just be mechanical about it. Understand it's what you have to do to put horrible people away. Think ahead and plan out ways to review the material as few times as possible. In my mind, there's the first pass where you discover where it's located as you're scrolling through all the pictures and videos on the device. Next, at least the way we did it, we had to describe the pictures and videos in detail since they obviously can't be included in our report. Try to make it so you only go through each piece of media once for that part of the report. Do what you gotta do while it's in front of you and really try not to have to revisit it again even though the images will never leave your head.
💯 1
3:59 AM
Also you'll need to know counts of all pictures and videos so maybe you do that when everything is a small thumbnail so you're not getting a lot of detail with each one. Counting illicit images, you only need to see the image enough to know it's bad, not the high definition details
Avatar
Avatar
Andrew Rathbun
Also you'll need to know counts of all pictures and videos so maybe you do that when everything is a small thumbnail so you're not getting a lot of detail with each one. Counting illicit images, you only need to see the image enough to know it's bad, not the high definition details
Digitalferret 12/17/2021 4:04 AM
this is where I'd imagine Dopus to be a huuge benefit, what with all the extra info at fingertips. (just bought in. wish I'd have sooner)
💯 1
Avatar
Avatar
Digitalferret
this is where I'd imagine Dopus to be a huuge benefit, what with all the extra info at fingertips. (just bought in. wish I'd have sooner)
Andrew Rathbun 12/17/2021 4:05 AM
Yep I wish I knew of DOpus back then. Going on 3+ years of use and never looking back. Sorry Microsoft
4:06 AM
If DOpus is too expensive, strongly consider XYplorer. Everyone should be using a File Explorer replacement. I did a lot of research on various File Explorer replacements and number one was DOpus and second was XYplorer IMO. The rest were a distant 3rd and beyond. Mostly those Commander apps. (edited)
Avatar
Avatar
Digitalferret
this is where I'd imagine Dopus to be a huuge benefit, what with all the extra info at fingertips. (just bought in. wish I'd have sooner)
Andrew Rathbun 12/17/2021 4:09 AM
https://github.com/AndrewRathbun/DirectoryOpus-DFIRConfig If you use this, please let me know any feedback you have
A config file that&#39;s curated for DFIR examiners with shortcuts to common Windows artifacts and settings enabled that help make your life easier with various file management tasks. - GitHub ...
👍 3
Avatar
Avatar
Andrew Rathbun
https://github.com/AndrewRathbun/DirectoryOpus-DFIRConfig If you use this, please let me know any feedback you have
Digitalferret 12/17/2021 4:11 AM
thanks, already bookmarked, still finding my feet with basics. got a big time investment required this weekend for a pro bono neighbourhood report thing. tons of images / vids. can't now imagine sorting without Dopus. only reason i stayed with R-Studio as data recovery s/w was the better file management and file selection. now i have dopus i can do that outside of DR progs
Avatar
Avatar
Digitalferret
thanks, already bookmarked, still finding my feet with basics. got a big time investment required this weekend for a pro bono neighbourhood report thing. tons of images / vids. can't now imagine sorting without Dopus. only reason i stayed with R-Studio as data recovery s/w was the better file management and file selection. now i have dopus i can do that outside of DR progs
Andrew Rathbun 12/17/2021 4:12 AM
You'll want to look into customizing media folders. Right click on a column header, More, then toy around with the default columns. You can set that as default for various folder types and all that. Pretty cool stuff.
Avatar
Avatar
Andrew Rathbun
You'll want to look into customizing media folders. Right click on a column header, More, then toy around with the default columns. You can set that as default for various folder types and all that. Pretty cool stuff.
Digitalferret 12/17/2021 4:14 AM
thanks, yes indeed. i've already fallen out with MS for categorizing my phone/media etc a ****ing music box: file name : album : artist etc 🙂 every time. can't use cleaners / shellbags without it resetting
🤣 1
Avatar
Avatar
Andrew Rathbun
Digitalferret 12/17/2021 4:17 AM
pretty much exactly what i meant. cheers 🙂
💯 1
Avatar
Thanks guys, we do on scene examinations and so this might help for usb drives - I will try this Dopus.
Avatar
Avatar
Nilandia
I appreciate it. It will be my first one. I'm trying to brace for impact, but I know there's no such thing as being truly prepared.
Axen Cleaver 12/17/2021 5:52 AM
The best thing I've found is using a timer. I never view material for the first hour after I get into the office, thirty minutes either side of lunch break, and an hour before I go home. It's easy to fall into the trap of working it regardless of time or overtime, but all that leads to is burn out and bad dreams. Take care of yourself and be conscious of how often you're viewing the material. Welcome aboard to one of the best jobs in the world, because doing it right means the bad guys go away for a long time and stay there!
👍 2
Avatar
Avatar
Andrew Rathbun
https://github.com/AndrewRathbun/DirectoryOpus-DFIRConfig If you use this, please let me know any feedback you have
NibblesNBits 12/17/2021 6:02 AM
So I have been using DO. I know this feature exists as a add in script but cant seem to find it or make one work. Can it display a hash value of the file in question or verify hashes?
Avatar
Avatar
NibblesNBits
So I have been using DO. I know this feature exists as a add in script but cant seem to find it or make one work. Can it display a hash value of the file in question or verify hashes?
Andrew Rathbun 12/17/2021 6:09 AM
Not at my desk this very second but try Edit -> Calculate hashes
6:10 AM
You should be able to add this as a function in your right click context menu. You can add pretty much anything there that you want
6:10 AM
If you need more direction beyond that, let me know and we can figure it out together and document centrally so we never have to do that dance again 😂
Avatar
Avatar
Andrew Rathbun
Not at my desk this very second but try Edit -> Calculate hashes
NibblesNBits 12/17/2021 6:31 AM
Guess I should RTFM DOH!
Avatar
Avatar
NibblesNBits
Guess I should RTFM DOH!
Andrew Rathbun 12/17/2021 6:49 AM
You can make that column default too if you want, but that'd be pretty CPU intensive. You could always make it so directories with images or other certain file types will calculate the file hashes by default, if you wanted
Salute 1
Avatar
You all are amazing. Thank you for the tips! I do know that I'm good at viewing rather disturbing crime scene photos, so I'm hoping at least part of that will carry over into the child exploitation cases.
Avatar
Andrew Rathbun 12/17/2021 8:49 AM
Another thing I will say is if you've never seen the videos that were hosted on sites like rotten.com, ogrish.com, etc, from back in the day (could still be around now, who knows), the impact of viewing those types of images will very likely be greater than someone who has seen those messed up videos in the past (edited)
Avatar
Hi everyone, I just joined the server and wanted to know if there are any informative or helpful websites for beginners. I also really enjoy the challenge type websites also. I recently took a cyber crime and digital forensics class and fell in love with the field. I would appreciate all of it ❤️ Feel free to dm me so the reccomendations don’t get lost! (edited)
Avatar
Avatar
laflame
Hi everyone, I just joined the server and wanted to know if there are any informative or helpful websites for beginners. I also really enjoy the challenge type websites also. I recently took a cyber crime and digital forensics class and fell in love with the field. I would appreciate all of it ❤️ Feel free to dm me so the reccomendations don’t get lost! (edited)
Andrew Rathbun 12/17/2021 12:28 PM
https://aboutdfir.com/ should have some good stuff to poke around about in. Let us know what else you're looking for when you see or hear about something you're interested in
Avatar
Avatar
Andrew Rathbun
https://aboutdfir.com/ should have some good stuff to poke around about in. Let us know what else you're looking for when you see or hear about something you're interested in
I really appreciate it! I will get back to everyone (:
Avatar
another Log4j deserialization about to drop..
6:25 PM
(or dropped)
6:25 PM
-about
Avatar
While everyone is dropping knowledge in here - I also avoid having audio on with videos unless it's necessary. I can review audio independently but somehow with them together its just extra bad.
👍 2
Avatar
Avatar
laflame
Hi everyone, I just joined the server and wanted to know if there are any informative or helpful websites for beginners. I also really enjoy the challenge type websites also. I recently took a cyber crime and digital forensics class and fell in love with the field. I would appreciate all of it ❤️ Feel free to dm me so the reccomendations don’t get lost! (edited)
I'll send you the same message here https://www.learn2hack.ca/index.php/DFIR My site is a wip, but this should get you going, also War Games has some DFIR stuff too https://www.learn2hack.ca/index.php/War_games
Avatar
Avatar
ryd3v
I'll send you the same message here https://www.learn2hack.ca/index.php/DFIR My site is a wip, but this should get you going, also War Games has some DFIR stuff too https://www.learn2hack.ca/index.php/War_games
Thank you so much!!
🍻 1
Avatar
where do I start to learn DFIR properly.
Avatar
I´ve had a question from an investigator do run a virus/malmware scan on a few devices. Whats the best approach?
Avatar
Avatar
Tejas
where do I start to learn DFIR properly.
Read through #training-education-employment this has been answered a few times. If you have specific questions feel free to ask.
Avatar
sure thanks
Avatar
Avatar
jaikl
I´ve had a question from an investigator do run a virus/malmware scan on a few devices. Whats the best approach?
Phone or Computers or both?
Avatar
Avatar
Jobbins
Phone or Computers or both?
Computers/harddrives
Avatar
Avatar
jaikl
Computers/harddrives
Andrew Rathbun 12/20/2021 6:13 AM
Run MalwareBytes or Windows Defender or insert other AV solution here
Avatar
Avatar
Andrew Rathbun
Run MalwareBytes or Windows Defender or insert other AV solution here
Okey, but when you say run, how? I have the disk imaged as 01 files. Should i mount the disk and then run ex. windows defender?
Avatar
Avatar
jaikl
Okey, but when you say run, how? I have the disk imaged as 01 files. Should i mount the disk and then run ex. windows defender?
Andrew Rathbun 12/20/2021 6:22 AM
Mount with AIM and scan the drive letter
Avatar
Avatar
Tejas
where do I start to learn DFIR properly.
Check this out 😁 https://startme.stark4n6.com (edited)
A startpage with online resources about Forensics, created by Stark 4N6.
💪 2
👍 4
Avatar
wow thanks man
Avatar
hello everyone i want to have your opinion on the chfi cert for beginners is it good or there are better options and thank you
Avatar
Avatar
Hector!221B
hello everyone i want to have your opinion on the chfi cert for beginners is it good or there are better options and thank you
#training-education-employment try there, and use the search function in discord to search chfi as I believe there has been previous discussions about it.
Avatar
Avatar
Jobbins
#training-education-employment try there, and use the search function in discord to search chfi as I believe there has been previous discussions about it.
Hector!221B 12/21/2021 5:51 AM
yes i did but didn't find what im looking for
Avatar
We have some interesting holiday reading for all of you. The fourth Arsenal report in the ongoing Bhima Koreagon case is now public. This case involves (by many metrics) the most disturbing electronic evidence tampering which has ever occurred. This is another case in which digital forensics practitioners before us have failed in spectacular ways - from essentially blessing the evidence to fundamentally misunderstanding what happened to the victims. There is a tangible human cost associated with these failures. Here are links to all four reports (with exhibits), along with examples of press coverage: First Report: https://ArsenalExperts.com/persistent/resources/pages/BK-Case-Rona-Wilson-Report-I.zip / https://www.washingtonpost.com/world/asia_pacific/india-bhima-koregaon-activists-jailed/2021/02/10/8087f172-61e0-11eb-a177-7765f29a9524_story.html Second Report: https://ArsenalExperts.com/persistent/resources/pages/BK-Case-Rona-Wilson-Report-II.zip / https://www.washingtonpost.com/world/2021/04/20/india-bhima-koregaon-activists-report/ Third Report: https://ArsenalExperts.com/persistent/resources/pages/BK-Case-Surendra-Gadling-Report-III.zip / https://www.washingtonpost.com/world/2021/07/06/bhima-koregaon-case-india/ Fourth Report: https://ArsenalExperts.com/persistent/resources/pages/BK-Case-Rona-Wilson-Report-IV.zip / https://thewire.in/rights/rona-wilson-pegasus-iphone-arsenal When I (this is Arsenal President, Mark Spencer) worked in law enforcement many years ago, I thought the kinds of electronic evidence tampering we have been dealing with in some of our cases at Arsenal was the stuff of spy novels (the fiction variety), not the real world. Everyone involved in digital forensics, from student to professor and from evidence custodian to prosecutor, should carefully read each of these reports.
👍 9
💯 3
Avatar
So I have a bit of time before I go into field training. I start training in January, meaning my time right now is free and I'd like to make the most of it. Which online service provider portals require creating an account before I can submit requests that you believe would be worthwhile setting up? Any free training you'd recommend? Anything else I can be doing while I wait?
Avatar
@Nilandia #training-education-employment off hand I can think of Google LE portal and Facebook portal to get acquainted with it.
this 1
Avatar
Avatar
DCSO
@Nilandia #training-education-employment off hand I can think of Google LE portal and Facebook portal to get acquainted with it.
Yahoo (Oath) and Charter Communications are a couple of other portals I have used, but they are less common than what DCSO mentioned.
Avatar
Avatar
Arsenal
We have some interesting holiday reading for all of you. The fourth Arsenal report in the ongoing Bhima Koreagon case is now public. This case involves (by many metrics) the most disturbing electronic evidence tampering which has ever occurred. This is another case in which digital forensics practitioners before us have failed in spectacular ways - from essentially blessing the evidence to fundamentally misunderstanding what happened to the victims. There is a tangible human cost associated with these failures. Here are links to all four reports (with exhibits), along with examples of press coverage: First Report: https://ArsenalExperts.com/persistent/resources/pages/BK-Case-Rona-Wilson-Report-I.zip / https://www.washingtonpost.com/world/asia_pacific/india-bhima-koregaon-activists-jailed/2021/02/10/8087f172-61e0-11eb-a177-7765f29a9524_story.html Second Report: https://ArsenalExperts.com/persistent/resources/pages/BK-Case-Rona-Wilson-Report-II.zip / https://www.washingtonpost.com/world/2021/04/20/india-bhima-koregaon-activists-report/ Third Report: https://ArsenalExperts.com/persistent/resources/pages/BK-Case-Surendra-Gadling-Report-III.zip / https://www.washingtonpost.com/world/2021/07/06/bhima-koregaon-case-india/ Fourth Report: https://ArsenalExperts.com/persistent/resources/pages/BK-Case-Rona-Wilson-Report-IV.zip / https://thewire.in/rights/rona-wilson-pegasus-iphone-arsenal When I (this is Arsenal President, Mark Spencer) worked in law enforcement many years ago, I thought the kinds of electronic evidence tampering we have been dealing with in some of our cases at Arsenal was the stuff of spy novels (the fiction variety), not the real world. Everyone involved in digital forensics, from student to professor and from evidence custodian to prosecutor, should carefully read each of these reports.
Awesome thank you!
👍 1
Avatar
Avatar
Nilandia
So I have a bit of time before I go into field training. I start training in January, meaning my time right now is free and I'd like to make the most of it. Which online service provider portals require creating an account before I can submit requests that you believe would be worthwhile setting up? Any free training you'd recommend? Anything else I can be doing while I wait?
If you go to https://www.search.org/toolbar/ we have a list of LE portals you can access/register for on the very bottom option of resources
Web site created using create-react-app
👍 3
Avatar
When analysing files on a USB (FAT32) drive, would there be any reason why a file wouldn’t be found? If the file was deleted it should still show up in a tool like Autopsy or FTK. Thank you.
Avatar
@cmuk depends "how" it was deleted, how long ago etc etc
Avatar
Avatar
whee30
@cmuk depends "how" it was deleted, how long ago etc etc
One of the more recent files. I can’t see lots of files just not the one in question.
Avatar
with FAT32 on a standard delete, the directory entry is marked with a 0xE5, the FAT chain is zeroed out but the data is left alone
Avatar
can you find the directory entry in the hex when you open in FTK imager?
Avatar
The folder was deleted where the file was stored
10:16 AM
There is no evidence in the root directory
Avatar
can you find the 0xE5 directory entry for the folder that contained the file?>
10:16 AM
that would be an "orphaned" file, if your tools categorize those differently
Avatar
Ok. I’ll take a look. Thanks for the swift response
Avatar
sure. PM me if you have more questions... I'm just sipping my coffee and catching up on emails.
Avatar
Avatar
jaikl
I´ve had a question from an investigator do run a virus/malmware scan on a few devices. Whats the best approach?
Dr. Kaan Gündüz 12/22/2021 10:44 AM
clamav is integrated inside forensic explorer, you can give it a try without mounting a disk image
Avatar
Hello Everyone There is a way to know when someone clean the web history ( Chrome for example)
Avatar
Avatar
CWolf
Hello Everyone There is a way to know when someone clean the web history ( Chrome for example)
Andrew Rathbun 12/22/2021 1:38 PM
Are you asking or telling? I'm guessing you're asking. Check the last modified time in the MFT for the History SQLite Database. Maybe that will provide some insight? Or check the $J for that file in particular to see when datatruncation occurred.
Avatar
Avatar
Andrew Rathbun
Are you asking or telling? I'm guessing you're asking. Check the last modified time in the MFT for the History SQLite Database. Maybe that will provide some insight? Or check the $J for that file in particular to see when datatruncation occurred.
yes, sorry, i was asking :), thank you, i will check
Avatar
maybe this has been asked before but does anybody have a youtube video or free webinar for Detectives to use UFED Reader ? @Cellebrite I can share vs recreating the wheel. Thanks
Avatar
Avatar
DCSO
maybe this has been asked before but does anybody have a youtube video or free webinar for Detectives to use UFED Reader ? @Cellebrite I can share vs recreating the wheel. Thanks
CLB_4n6s_mc 12/22/2021 3:10 PM
We do have online courses for reader you could enroll using Cellebrite learning center website but it is not free
👍 1
Avatar
Hi, I learn a bit of computer forensics by myself on Udemy and Youtube and I really love DIFR. I am a student in a software developer. I'm not sure to continue school to become a software dev. I heard that many people in DIFR study something completely different. I was wondering if companies are interested to make an internship with my little bits of knowledge in computer forensics?
Avatar
what kind of knowledge do you have?
Avatar
@Fierry Restoring browser history, restoring deleted files, and mail. and a bit more + OSINT I also take the OSCP training (no exam) (edited)
Avatar
maybe try completing some CTFs at cyberdefenders.org to see if you still like it 🙂
11:59 AM
there's lots of free software to assist you like Autopsy, KAPE, plaso and other tools
11:59 AM
try to take lots of notes about stuff you came across so you can refer back
Avatar
And what is CTF ? That they teach
Avatar
A CTF is a challenge in which you answer questions pertinent to the case 🙂
Avatar
Capture the Flag
2:10 PM
As mentioned above, you get given a image and questions
Avatar
I especially can recommend the Hunter CTF as it gives you a good overview of Windows evidence 🙂 - https://cyberdefenders.org/labs/32
Training platform for #BlueTeams to test and advance their #CyberDefense skills..
Avatar
Avatar
Andrew Rathbun
Are you asking or telling? I'm guessing you're asking. Check the last modified time in the MFT for the History SQLite Database. Maybe that will provide some insight? Or check the $J for that file in particular to see when datatruncation occurred.
Thank you for yr help
👍 1
Avatar
Is it free?
Avatar
Avatar
CCNA
Is it free?
The Hunter CTF? It is free.
Avatar
hi not a specific question about specifics, but in general what changes has there been in the computer forensics world in the last decade
3:28 AM
biggest changes, pros, cons, etc
Avatar
The last decade? That's an enourmous period.
Avatar
Avatar
hannix7403
hi not a specific question about specifics, but in general what changes has there been in the computer forensics world in the last decade
Encryption.
this 1
Avatar
Avatar
hannix7403
hi not a specific question about specifics, but in general what changes has there been in the computer forensics world in the last decade
Digitalferret 12/24/2021 7:28 AM
the sheer breadth and quantity of data to sift through whether that's just a function of the increase in storage device sizes or the cumulative effect as folks either collect (images/videos in their millions) and add to or, rather than house-keep (deleting emails say), just add more storage. Recent case reported on BBC where couple (sexual exploitation of minors) apparently had 175,000 pages of text/comms passing between each other. How the heck?
Avatar
Agreed, I think the DFIR future relies on post processing of data quite a lot to make it more easily accessible to investigators, parsing evidence sources manually is going to take a lot of time if the amount of evidence keeps expanding
11:32 AM
That’s not to say parsing is effective in all cases, manual verification remains a necessity in order to ensure evidence and artifact validity
Avatar
I reckon the cloud side of data will become more of a thing as well.
Avatar
Just today I had a case in which manual parsing yielded more date/time stamps, so know your tools and know the limits of your tools as well 🙂 (edited)
Avatar
Mike_Blueteam 12/24/2021 7:40 PM
What are some resources for real-life blue team simulations? Cyberdefenders/blueteamlabs any others? Looking for good technical practice in memory forensics, logs and pcap analysis, RE, etc. (edited)
Avatar
Avatar
Mike_Blueteam
What are some resources for real-life blue team simulations? Cyberdefenders/blueteamlabs any others? Looking for good technical practice in memory forensics, logs and pcap analysis, RE, etc. (edited)
for RE maybe HackTheBox
Avatar
chrisforensic 12/24/2021 8:20 PM
hello from austria to @MSAB 😉 Just a general question. If I want to install XRY on a new PC, is it enough to install XRY Office 10.0 and XAMN 7.0? are all necessary files installed then for acquisition and decoding? Or do I have to install an older version first and then update it? Is the latest XRY-licensemanager included in latest setup? (edited)
Avatar
@chrisforensic yes, grabing the latest xry 10 bundle from the customer portal will install the full XRY 10 will all the trimmings, as well as lates XAMN and licence manager. So you will be good to go 👍
👍 1
Avatar
chrisforensic 12/25/2021 4:56 AM
thanks @MartinW for info 👍
Avatar
🚨 🚨Please be aware of recent spam/phishing messages, claiming to be for 3 months of Discord Nitro. These are scams and not from Discord or this channel. If you see posts containing these types of messages please alert @Moderators and we will deal with them accordingly. Thank you all! 🚨🚨
👍 5
Avatar
Merry Christmas fam
Avatar
Mike_Blueteam 12/25/2021 8:58 AM
Merry Christmas!
Avatar
Avatar
CCNA
Hi, I learn a bit of computer forensics by myself on Udemy and Youtube and I really love DIFR. I am a student in a software developer. I'm not sure to continue school to become a software dev. I heard that many people in DIFR study something completely different. I was wondering if companies are interested to make an internship with my little bits of knowledge in computer forensics?
Probably not, you should finish school.
Avatar
Merry Christmas 🎄 everyone.
Avatar
Quick question. I work for a pretty small police department in VA, about 50 sworn. We recently got Cellebrite with the standard UFED/PA combo. We’re looking at dropping some money on a dedicated forensic workstation for Cellebrite and future programs (GrayKey and Axiom). Budget would be 12-13k. We’re pretty set on a Sumuri Talino. Are there any “must haves” for the workstation? What should be the priority when building it?
Avatar
Avatar
mcdoz
Quick question. I work for a pretty small police department in VA, about 50 sworn. We recently got Cellebrite with the standard UFED/PA combo. We’re looking at dropping some money on a dedicated forensic workstation for Cellebrite and future programs (GrayKey and Axiom). Budget would be 12-13k. We’re pretty set on a Sumuri Talino. Are there any “must haves” for the workstation? What should be the priority when building it?
Andrew Rathbun 12/26/2021 8:05 PM
Be aware of bottlenecks. Talk to Sumuri about it, if needed. Don't buy top notch parts that can't go faster than another really important part of the processing workflow that you ended up skimping on. Thankfully with those builds it should be pretty bottleneck proof but just keep that in mind when you start modifying one of their preconfigured builds.
Avatar
Avatar
MartinW
@chrisforensic yes, grabing the latest xry 10 bundle from the customer portal will install the full XRY 10 will all the trimmings, as well as lates XAMN and licence manager. So you will be good to go 👍
chrisforensic 12/26/2021 9:16 PM
info: fresh install XRY 10 on Windows 11 worked without problems, thanks ! 👍 XRY
Avatar
AARC TASK FORCE 12/27/2021 9:54 AM
Does anyone have experience with dell optane memory? I received two E01’s for examination. One E01 is showing the acquisition of a 512GB hard drive from a dell. The other E01 is showing an image of a 32GB drive. The 512GB drive appears to be encrypted but the 32GB drive has the file structure of the full 512GB. The 32GB image shows that the files exist but they can’t be exported as a readable file due to the file not residing on the 32. Is there a way to rebuild it to get a live acquisition?
9:54 AM
Any other ideas?
Avatar
Avatar
AARC TASK FORCE
Does anyone have experience with dell optane memory? I received two E01’s for examination. One E01 is showing the acquisition of a 512GB hard drive from a dell. The other E01 is showing an image of a 32GB drive. The 512GB drive appears to be encrypted but the 32GB drive has the file structure of the full 512GB. The 32GB image shows that the files exist but they can’t be exported as a readable file due to the file not residing on the 32. Is there a way to rebuild it to get a live acquisition?
I had an optane drive not to long ago. We imaged it and the hard drive. I found evidence on the optane. I will DM you
Avatar
Passware has a dell encryption bruteforce option
1:55 PM
I'd imagine maybe there might be something similar for hashcat if you don't have
1:56 PM
Whether it's the same encryption 🤷‍♂️
Avatar
Wonder if @Magnet Forensics detects what type of encryption and if it is the Dell type
Avatar
Never personally used that option tho
Avatar
I asked and then googled. So I deleted my question. LOL @Rob
Avatar
I like the @Passware option
2:06 PM
I also wonder if the encryption key would be stored on the optane drive, since it is used as a cache drive.
Avatar
I have never run into an Optane drive, nor had I heard about it... am I living under a rock? Is this a niche or a widespread thing?
Avatar
I'd say it's not a permanent data storage option, more used for data processing. Came out around 2018 or so.
Avatar
Hey, has anyone tested or knows how reliable locations from snapchat memories are? Thanks 🙂
Avatar
Avatar
dushe
Hey, has anyone tested or knows how reliable locations from snapchat memories are? Thanks 🙂
If locations are enabled, it depends on the accuracy within the OS. On Android obviously locations can be spoofed, while on iOS you can prohibit an app from knowing your precise location.
4:14 AM
Same with jailbroken iOS. Generally if it provides coordinates that can be verified using an external source eg Google maps, always worth double checking
4:14 AM
@Pacman if you see this, please pitch in
Avatar
elizavetabelkasoft 12/28/2021 4:17 AM
Take a chance to win Belkasoft X full-featured license! This week is the last chance to participate. Share your user experience of Belkasoft products. Your opinion about interaction with Belkasoft educational materials and events is important as well. Take a part in the survey and get a chance to win a full-featured Belkasoft X license. Filling out the survey will take about 15 minutes. Do it now: https://bit.ly/3pwVrjG
👍 1
4:17 AM
Avatar
So we got a reference iPhone which we use for reference testing that displays some kind of error when I did an upgrade from iOS 14.x to 15.x. Got the error "SCEP server configuration is not supported" during the iOS 15 setup screen. Does anyone know a way to fix the error or skip the setup screen somehow?
Avatar
Not even sure what channel this would belong in. What software would be used for analyzing the electrical network frequency (ENF) and would this type of analysis be possible for those of us not in the UK? https://www.youtube.com/watch?v=e0elNU0iOMY&ab_channel=TomScott
Avatar
Avatar
FullTang
Not even sure what channel this would belong in. What software would be used for analyzing the electrical network frequency (ENF) and would this type of analysis be possible for those of us not in the UK? https://www.youtube.com/watch?v=e0elNU0iOMY&ab_channel=TomScott
The majority of the work on ENF was carried out by Dr. Catalin Grigoras, now at the National Center for Media Forensics (NCMF) at UC Denver. It is possible to be done outside of the UK/EU using Matlab scripts. There may be other ways but that is the only way I know of. There are a lot of published papers on the topic at the NCMF website linked below. I should also note that it is my understanding that advances in cell phones and wireless communication makes ENF analysis pretty limited nowadays. https://artsandmedia.ucdenver.edu/areas-of-study/national-center-for-media-forensics/national-center-for-media-forensics-research (edited)
👍 4
Avatar
Avatar
FullTang
Not even sure what channel this would belong in. What software would be used for analyzing the electrical network frequency (ENF) and would this type of analysis be possible for those of us not in the UK? https://www.youtube.com/watch?v=e0elNU0iOMY&ab_channel=TomScott
I recently found a YouTube channel of a guy named captain jive Turkey who analyzes old hydrophone audio from incidents involving submarines and posts the analysis. Some very cool stuff and gets you thinking what else you can do with this… https://m.youtube.com/watch?v=9HIyW4PC8vo
💯 2
👍 1
Avatar
Hello everyone, Do you know any open source IR scripts(generic evidence collection at this point) for FreeBSD Only found https://github.com/tclahr/uac so far, if anyone can share some alternatives, it's much appreciated.
UAC is a Live Response collection tool for Incident Response that makes use of built-in tools to automate the collection of Unix-like systems artifacts. - GitHub - tclahr/uac: UAC is a Live Respons...
Avatar
Avatar
blake-ee
Morning everyone. Has anyone ever had any dealings with downloading/extracting data from OCULUS QUEST VR headsets? My questions are as follows: Is it even possible?/can you extract data from the headsets? What kind of data does the OCULUS store? If data can be extracted, what tools were used? What tool was used to decode the data? Any help would be appreciated.
What did you find out about examining the Oculus headsets? We just got one with out controllers. It does have the ability to store images and videos from a computer on the headset. Just wondering if a ChipOff or other method of extraction might be possible.
11:14 AM
I was able to go through the settings using the volume buttons to make selections on the screen. I connected it to a computer and it loads as a USB device, but I think it might need Oculus software to be able to interface with the device. I was wondering if it is possible to see the drive, even if logically, so it can be imaged through FTK / Axiom / Etc.
11:16 AM
Doing the manual exam of the Quest 2, I was able to see the device can go to websites etc, so I am leaning towards doing a chipoff if it is eligible. More research needed before I try that.
Avatar
The Oculus Quest 2 It does appear to be eligible for ChipOff, based upon the chip image from iFixIt.
Avatar
AccessInvestigations 12/30/2021 8:23 AM
Do we have anyone here that is experienced with ADF Solutions DEI software?
Avatar
Avatar
AccessInvestigations
Do we have anyone here that is experienced with ADF Solutions DEI software?
Digitalferret 12/30/2021 9:43 AM
Salute 1
Avatar
Hi all. Any recommendations on a Mac platform (and specs) suitable as a forensic workstation? Mac Minis, iMacs etc? Intent is to go Boot Camp or VMs for Windows-specific tools etc.
Avatar
You’re pretty limited on Mac configs unless you want to juice up a Mac Pro to like 50k or something… Sumuri sells bundles of computers+software on their site, that should be a decent baseline at least for their product.
10:09 AM
I had thought the new M1 processors no longer allowed dual boot to windows but maybe someone figured that out?
Avatar
It's a legal minefield due to licencing around Windows on ARM
Avatar
Oof - I thought I was joking but…
🤣 2
floshb 1
10:14 AM
I have a touchbar MacBook Pro that I can dual boot but I have found it easier (if you have the space and budget) to use two computers. I rarely get macs in though, so having a Mac centric bottleneck with what hardware I can use doesn’t make sense (edited)
Avatar
Yeah plus I doubt there's much forensic software for non-macOS uses which runs well on Mac
Avatar
I have an investigation where I received a large number of logs from Apple which include for example Store Transaction History and iTunes in the Cloud Authorization. Does anyone have details on how/why these logs are populated? Specifically I have devices with multiple Associated Date entries, IP addresses and User Agent Strings. They seem pretty self explanatory but am looking to validate what I am interpretting.
Avatar
Avatar
whee30
I have a touchbar MacBook Pro that I can dual boot but I have found it easier (if you have the space and budget) to use two computers. I rarely get macs in though, so having a Mac centric bottleneck with what hardware I can use doesn’t make sense (edited)
Oh wow. Duly noted. Yes I think until the M1 becomes a little bit more mature, Intel Macs would be best due to compatibility. Thanks
Avatar
Avatar
theridlr
Oh wow. Duly noted. Yes I think until the M1 becomes a little bit more mature, Intel Macs would be best due to compatibility. Thanks
randomaccess 12/30/2021 8:11 PM
M1 Mac's won't really be suitable for forensics until someone emulates x64 and the big players like vmware arent going down that path last I heard.
8:12 PM
Intel Mac's are being phased out so they're hard to find in laptop form
Avatar
I don't have recon (yet) but I was told that it's M1 native, its a very purpose built tool though. Needs a mac to run on and only examines macs. I like my work intel macbook pro and my personal m1 mini but I find that I'm using the PCs way more often.
Avatar
Happy New Year everyone! I hope no one bricks any phones and don’t get stuck in a boot loop!
💯 5
🤣 1
👀 1
Avatar
Avatar
whee30
Oof - I thought I was joking but…
The computer cost the same price as a car, it's crazy expensive. I know apple silicone and Nvidia are in war of with GPU is the best now Nvidia, are willing to make the RTX Serie 40 much better. (edited)
Avatar
Thatthreatguy 1/2/2022 11:38 AM
Hey thanks for allowing me to join recently got into cyber securty last year from a career chnage bene working in a soc now for 7 months looking to move in to a DF role. Currently learning Autopsy Chain of custody Types of digital evidence Aka all the Billy basics So thanks for having me
👋 4
Avatar
Avatar
OggE
Hey, need some help identifying some exif tags on some jpgs. IFD0 - Artist IFD0 - XP Author XMP-dc - Creator XMP-rdf - about (There is a uuid here). I found a little more about the tags on exiftool.org but after that i couldnt find much.
Update: The exif seems to be coming from the builtin windows snippet tool
👍 1
Avatar
Avatar
mcdoz
Quick question. I work for a pretty small police department in VA, about 50 sworn. We recently got Cellebrite with the standard UFED/PA combo. We’re looking at dropping some money on a dedicated forensic workstation for Cellebrite and future programs (GrayKey and Axiom). Budget would be 12-13k. We’re pretty set on a Sumuri Talino. Are there any “must haves” for the workstation? What should be the priority when building it?
For 12-13K you should be asking for a Threadripper 3990x. My last build I had this processor put in and the difference is unreal when it comes to processing times. If that can’t put you in that processor at that price point let me know.
this 3
Avatar
Digitalferret 1/4/2022 2:52 AM
I'll take a threadripper in exchange pls....
🤣 1
2:57 AM
^ gamer's (and forensics dudes) be like ^
Salute 2
Avatar
Dang right.
Avatar
Do we have any members here that are currently or have experience with the PCI PFI (https://www.pcisecuritystandards.org/assessors_and_solutions/pci_forensic_investigators) program?
PCI data security standards are for all merchants levels who accept credit cards. If you are a merchant of any size accepting credit cards, you must be in compliance with PCI Security Council standards. This site provides: credit card data security standards documents, PCI compliant software and hardware, qualified security assessors, technical...
Avatar
The Scientific Working Group on Digital Evidence (SWGDE) is pleased to announce posting of the following draft documents for public review and comment at https://www.swgde.org/documents/draft-released-for-comment • SWGDE Best Practices for Forensic Audio v2.5 • SWGDE Best Practices for Frame Timing Analysis of Video Stored in ISO Base Media File Formats v1.1 • SWGDE Considerations for Facial Recognition and Face Comparison v1.1 • SWGDE Considerations for Release of Synopsis Videos for Public Review v1.0 • SWGDE Lighting Techniques in Forensic Photography v.1.0 • SWGDE Technical Notes on FFmpeg v2.1 As noted on the cover page of all our documents, SWGDE encourages stakeholder feedback and suggestions for modifications to any document are welcome at all times. Please use the "Submit Comments" link beside the listed document to provide feedback. We appreciate your participation as SWGDE continues its mission to bring together organizations actively engaged in the field of digital and multimedia evidence to foster communication and cooperation as well as ensuring quality and consistency within the forensic community. Please feel free to forward/redistribute this announcement to any colleague, forum, or listserv you deem appropriate.
SWGDE encourages stakeholder participation in the preparation of documents. The following documents are draft versions being provided for comment by all interested parties for a minimum period of 60 days. Suggestions for modifications are welcome and must be submitted following the provided
👍 1
Andrew Rathbun pinned a message to this channel. 1/4/2022 9:25 AM
Avatar
Obi-Wan-IP 1/4/2022 1:04 PM
Hi all, wonder if any of the UK forces have gained 17025 for Kiosk deployments across their respective divisions, using central config etc? If so I would like to hear from you please. Ta.
Avatar
Avatar
Obi-Wan-IP
Hi all, wonder if any of the UK forces have gained 17025 for Kiosk deployments across their respective divisions, using central config etc? If so I would like to hear from you please. Ta.
Andrew Rathbun 1/4/2022 3:03 PM
@Law Enforcement [UK]
3:04 PM
btw, I secretly love reading when all of UK LE gets tagged. You all are in the same boat with ISO and all that. Really awesome collaboration which is in the spirit of what this server is all about. Love seeing it every time you all assist each other 👍
💯 7
👍 3
Avatar
Rumour has it the certain UK forces are looking to rid themselves of ISO once and for all.
Avatar
We’re about to start on it. Using cellebrite infield and commander
Avatar
Andrew Rathbun 1/4/2022 3:05 PM
^^ this is what I'm talking about 😆
Avatar
You're just jel we have our fish and chips @Andrew Rathbun
😆 6
Avatar
In theory we only have to validate one kiosk and I’m arguing a lot of the techniques (we only allow logical methods) are already validated when we validate ufed
Avatar
CptWaistcoat_57354 1/4/2022 3:12 PM
We use cellebrite Responder, for certain front line teams. We have SOP's, and a peer competency SOP for it.due to add it to our ETS this year
👍 1
3:13 PM
Centrally validated, and the various deployments verified
Avatar
Avatar
CptWaistcoat_57354
Centrally validated, and the various deployments verified
How's the process to iso mobiles gone?
3:17 PM
Annoyingly for us the computer side of things they've just vomited words up into SOPs so praying mobile side of things is smoother and written by an examiner
Avatar
Anyone use magnet outrider for Mac Acquisition? Wondering how it works
Avatar
jesusofcool 1/4/2022 5:56 PM
If there is anybody with HDD recovery experience can you please have a peek at what i posted in #data-recovery ? thanks 😄
Avatar
Avatar
Andrew Rathbun
btw, I secretly love reading when all of UK LE gets tagged. You all are in the same boat with ISO and all that. Really awesome collaboration which is in the spirit of what this server is all about. Love seeing it every time you all assist each other 👍
Pity UKAS don’t ‘assist’ us!
😆 1
Avatar
You do seem better off making zero effort first time around and getting the list of how you should do it from UKAS.
Avatar
Avatar
robbieD
Rumour has it the certain UK forces are looking to rid themselves of ISO once and for all.
Obi-Wan-IP 1/5/2022 3:06 AM
We can only dream🤣
Avatar
Does anyone have a program or script to compare the hash values of images that are in two separate folders?
Avatar
Avatar
iNDO_o
Does anyone have a program or script to compare the hash values of images that are in two separate folders?
What are you trying to do exactly? Find a known photo(s) in a group of unknown photos or verify that two different folders contain the same data?
Avatar
I have two folders from separate cyber tips, on a CD. both contain csam images but all the file names are different so i'd like to compare all the hash values from the separate cases for matches
11:49 AM
I should specify, the new cyber tip contains photos of images i recognize form an older case.
11:50 AM
So instead of manually trying to find the matching photos, i'd like to just compare the hash values and filter by any that match
Avatar
If I were to do it I would load the photos from each folder into Eric Zimmerman's hasher to get a list of hashes. Do it again for the other folder. Use Excel magic to find the duplicates. Or load the hash list into your old case and search for the photos. https://ericzimmerman.github.io/#!index.md
11:51 AM
But I am sure there is a better way.
👍 1
Avatar
Could put them into griffeye?
11:51 AM
Then you can filter by hash etc.
11:52 AM
But probably the above method would work
Avatar
I'll load the hashes into the old case, was just hoping for the easy way 😆
Avatar
Forensicator 1/5/2022 12:08 PM
Just passed my GCIH lezzz gooo!
👍 5
🙌 2
Avatar
Forensicator 1/5/2022 1:18 PM
Next stop.... Sec 508 I guess
Avatar
Avatar
iNDO_o
I should specify, the new cyber tip contains photos of images i recognize form an older case.
You could probably use the FCIV tool from Microsoft to hash all files, and pipe the output to a text file. You could then import that into Excel and filter.
👍 1
Avatar
Avatar
iNDO_o
Does anyone have a program or script to compare the hash values of images that are in two separate folders?
QuickHash may do it under one of the “compare” tabs but I haven’t used it so I can’t be sure. https://www.quickhash-gui.org/
The homepage of Quickhash-GUI - free, cross platform, data hashing tool for Windows, Linux and Apple OSX
Avatar
You can do it in powershell on windows if needed. Get-filehash and you have -algorithm to specify a different hash type. You can add all of the hashes to an array and just check for duplicates.
Avatar
Avatar
Forensicator
Next stop.... Sec 508 I guess
Andrew Rathbun 1/5/2022 4:23 PM
That's a good one. Are you using GCIH and GCFA material in LE currently?
Avatar
Avatar
iNDO_o
Does anyone have a program or script to compare the hash values of images that are in two separate folders?
Andrew Rathbun 1/5/2022 4:25 PM
http://www.listdiff.com/ or http://barc.wi.mit.edu/tools/compare/ can do it online. I've used these before. Hashes aren't sensitive, per se, but YMMV re: using an online service. https://www.excel-easy.com/examples/compare-two-lists.html too (edited)
Compare list differences online with this text fixer and list comparison tool
This example describes how to compare two lists in Excel using conditional formatting. For example, you may have two lists of NFL teams.
Avatar
Avatar
Andrew Rathbun
That's a good one. Are you using GCIH and GCFA material in LE currently?
Forensicator 1/5/2022 4:32 PM
Yes, we respond to cyber intrusions all the time. It's actually our bread and butter at my agency.
4:33 PM
kick down the door yell CYBER POLICE! and pull out the forensic falcon 😆
🤣 1
4:37 PM
We kinda chop up PICERLL though to PIC.... and assist with Eradication but most of the time we don't do that at all. We leave recovery and Lessons learned up to the places we go to (edited)
4:38 PM
So while it was fun learning all of the material I kinda had to take a step back and think about how much it really applied to my everyday. It's definitely beneficial though for my home lab when I release malware on it!
💯 2
Avatar
Avatar
sholmes
What did you find out about examining the Oculus headsets? We just got one with out controllers. It does have the ability to store images and videos from a computer on the headset. Just wondering if a ChipOff or other method of extraction might be possible.
Buy ALLSOCKET Internal Memory Adapter,eMMC169/153 Memory Reader with SD Interface BGA153/169 Adapter FLASH Memory Data Recovery Reader Chip-off Tool Retrieve Data for Most Android Smartphone online at best price at Desertcart. ✓FREE Delivery Across Oman. ✓FREE Returns - 55328149.
👍 1
Avatar
Avatar
robbieD
Rumour has it the certain UK forces are looking to rid themselves of ISO once and for all.
I think that the Forensic Science Regulator Act 2021 gave the FSR statutory powers. Depending on the route the new Regulator takes it may be possible for a force to rid themselves of ISO but I suspect that the act would make it more difficult to do so if the Regulator continues to support 17025 and 17020 for forensics in the Codes. https://www.legislation.gov.uk/ukpga/2021/14/contents/enacted https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1041792/2021_FSR_Newsletter_37.pdf
👍 3
Avatar
I have heard that ct and the three letter group and looking into suspending it as it’s not working and is not viable
4:05 AM
DF should never have fallen under the Regulator, we should of just written on a national sop that had the blessing of the chiefs and ran with that.
👍 2
Avatar
Hi all. Has anyone done 'live' forensics on Docker containers?
4:47 AM
Looking for a method to pull processes without offlining it and doing dead box 4n6 on it
Avatar
NibblesNBits 1/6/2022 6:51 AM
@Cellebrite Does Cloud Analyzer still allow for capturing public profiles? I'm looking for alternative capture methods and we used this product years ago with success but havent in more recent years.
Avatar
@NibblesNBits you can even do with PA without cloud licence, you need to add an avatar for this
Avatar
Anyone doing corporate work ever had to do a part 35 compliant forensic report? I've read and understand the rules okay, i'm just wondering if it has to be in a specific format or as long as it contains all the required data its okay.
Avatar
Avatar
bypx
@NibblesNBits you can even do with PA without cloud licence, you need to add an avatar for this
NibblesNBits 1/6/2022 7:06 AM
I will look for a new installer. I tried this and also added an avatar but it doesnt seem to allow collection, admittedly its a very old version. I appreciate the confirmation though. (edited)
Avatar
@NibblesNBits just tied now with latest PA selecting “last month” activity of the target.
Avatar
Avatar
sim0n
I think that the Forensic Science Regulator Act 2021 gave the FSR statutory powers. Depending on the route the new Regulator takes it may be possible for a force to rid themselves of ISO but I suspect that the act would make it more difficult to do so if the Regulator continues to support 17025 and 17020 for forensics in the Codes. https://www.legislation.gov.uk/ukpga/2021/14/contents/enacted https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1041792/2021_FSR_Newsletter_37.pdf
When I left CT 6 months ago they were still neck deep in ISO 17025, not as anal as another force I worked for though. Some parts of it work okay but the majority is just a ball ache.
Avatar
Avatar
JustNit
Hi all. Has anyone done 'live' forensics on Docker containers?
NetSecNinja 1/6/2022 1:00 PM
Some of my notes from research I did a year-or-so ago, might help: https://netsecninja.github.io/dfir-notes/docker/
Notes regarding how to use Docker and some DFIR information that I researched
❤️ 1
👍🏻 1
Avatar
Avatar
NetSecNinja
Some of my notes from research I did a year-or-so ago, might help: https://netsecninja.github.io/dfir-notes/docker/
Awesome thanks!
Avatar
@Law Enforcement [USA]@Search.org Does anyone have contact info for someone for Merkury cameras? I have a high-profile case that centers around those cameras. I know there is likely to be minimal cloud data stored, but I still would like access logs to the camera systems. Search.org and my Google-Fu are both failing me.
8:30 PM
For almost 20 years, Merkury Innovations has followed the trends of electronic accessory and tech, keeping us ahead of the curve and providing you affordable products without compromising taste and design. Our wireless sound systems, E-sports gear, and LED home décor help to personalize your atmosphere while our advanc
Avatar
Avatar
FullTang
@Law Enforcement [USA]@Search.org Does anyone have contact info for someone for Merkury cameras? I have a high-profile case that centers around those cameras. I know there is likely to be minimal cloud data stored, but I still would like access logs to the camera systems. Search.org and my Google-Fu are both failing me.
I was able to find employees including the CEO on LinkedIn. Maybe you could try cold messaging people on LinkedIn?
👍 2
10:07 PM
site:merkuryinnovations enforcement gave a privacy page that referenced mygeeni (parent company? sister company?) Same process for mygeeni gives support emails for both and a physical address
👍 2
10:12 PM
that phone number has a robo attendant for merkury
10:12 PM
212-840-8550
Avatar
Thank you, good leads to try!
Avatar
Is there a quick fix for 'failed to enable constraints' error message if a re-installation doesnt fix it???
Avatar
Avatar
iNDO_o
I have two folders from separate cyber tips, on a CD. both contain csam images but all the file names are different so i'd like to compare all the hash values from the separate cases for matches
Morning @iNDO_o. There are a few ways you could tackle this with @Griffeye to make things a bit easier. 1. If you have a list of the hashes from the older case you can load them into your Griffeye Intelligence Database (GID) and then bring in the files you are looking to inspect. The GID would then flag the files you have already seen and identify the files that you have left to work with.
Avatar
Avatar
iNDO_o
I'll load the hashes into the old case, was just hoping for the easy way 😆
You could also see the visual or binary copies stacked together so if you have matches from the two different folders you can see them pointed out to you. Reach out to me when you get started back up today if you are interested.
Avatar
Hello
👋 2
Avatar
Hello!
👋 3
Avatar
ForensicDev 1/7/2022 2:40 PM
Have a WesternDigital MyPassport USB drive that uses their proprietary WDUnlock.exe tool to unlock the data partition. I need to verify the password provided by the owner. I tried connecting the WD MyPassport to various USB blockers (Tableau Bridge T3456789iu and Tableau USB Bridge), yet the usually emulated CD-ROM drive does not appear to unlock the drive. I have tried multiple machines, no luck. The TX-1 sees the two data partitions, one containing the WDUnlock.exe. Any other ideas on how to "test" the password, without compromising the integrity of the evidence by not using a write-blocker? (edited)
Avatar
Avatar
MD4N6
For 12-13K you should be asking for a Threadripper 3990x. My last build I had this processor put in and the difference is unreal when it comes to processing times. If that can’t put you in that processor at that price point let me know.
The only threadripper they have available is the 3960X which is the one I’m looking at. I would have have it with 128GB of 3600MHz ram, RTX 2080 super, M.2 NVMe SSD drives. For OS, temp and database and a quad M.2 carrier.
Avatar
Anyone familiar with examining the Hola browser?
Avatar
Avatar
Matt
Anyone familiar with examining the Hola browser?
randomaccess 1/7/2022 6:39 PM
Considering there's nothing new under the sun... Is it a repackaged chromium and can be parsed with axiom/hindsight?
Avatar
It did not parse with axiom
6:42 PM
My limited research is that it is a browser plug-in.
Avatar
Avatar
randomaccess
Considering there's nothing new under the sun... Is it a repackaged chromium and can be parsed with axiom/hindsight?
Andrew Rathbun 1/7/2022 7:29 PM
Avatar
Avatar
Matt
My limited research is that it is a browser plug-in.
randomaccess 1/7/2022 7:30 PM
Could be both according to the site
7:30 PM
Suggest you'll need to get into the weeds with a Json,XML,sqlite viewer
7:30 PM
And write up what you figure out :)
7:31 PM
Smooth.
Avatar
randomaccess 1/7/2022 7:31 PM
That gives me Firefox vibes
7:32 PM
But I'm still banking on chromium
Avatar
Appreciate the references. I’ll get to work Monday
Avatar
Andrew Rathbun 1/7/2022 7:33 PM
The vertical dots give me huge Chrome vibes, almost 1:1
7:33 PM
but that's just UI and can be customized so 🤷‍♂️
Avatar
Who even uses computers anymore…🤦‍♂️
😂 1
7:34 PM
Just when you make progress on mobile devices you get a computer curveball
Avatar
Andrew Rathbun 1/7/2022 7:35 PM
Thankfully Chrome and Firefox are mostly SQLite and plenty of queries out there floating around
Avatar
Very true. I’m looking forward to that.
Avatar
Avatar
Matt
Anyone familiar with examining the Hola browser?
If I remember correctly hola uses P2P to give you “VPN” addresses. So in essence it’s tunneling your traffic through another user of the Hola extension. It was notorious for that behavior.
Avatar
Hi I have a question. How you harden your windows forensics workstation ? Do you some scripts or not harden at all ?
Avatar
Avatar
sidi7
Hi I have a question. How you harden your windows forensics workstation ? Do you some scripts or not harden at all ?
Not all of this will apply to a forensic workstation setup, but there's some good advice and policies available here: https://www.ncsc.gov.uk/collection/device-security-guidance/platform-guides/windows Section 23.3 of the FSR codes of practice also includes some guidance on this area, although the majority of that is more policy based for the wider forensic lab & organisation than physical steps for your windows machine: (Page 67 onwards): https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/968638/100_Codes_of_Practice_and_Conduct_-_Issue_7.pdf
👀 1
👍 1
Avatar
Avatar
K23
Not all of this will apply to a forensic workstation setup, but there's some good advice and policies available here: https://www.ncsc.gov.uk/collection/device-security-guidance/platform-guides/windows Section 23.3 of the FSR codes of practice also includes some guidance on this area, although the majority of that is more policy based for the wider forensic lab & organisation than physical steps for your windows machine: (Page 67 onwards): https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/968638/100_Codes_of_Practice_and_Conduct_-_Issue_7.pdf
Thank you
Avatar
Anyone have experience with Siforce forensic towers? How to they compare to Sumuri?
Avatar
?? TCL A509DL MTK 6765 file based Android 11 - Patched October 2021 I tried MTK Live and filesystem MTK nothing 😦 Thoughts ?
Avatar
So my agency has run into a need to see what data is stored on the mag strip of a homebrew CC. Is there a recommended tool for this? I'
11:11 AM
I'm sure I could just hunt eBay and find something but if there's a industry standard tool that might look better on the expense report
Avatar
also - a lot of what im seeing are read/write. I'd like to get just a read only tool so my people dont accidentally wipe data or overwrite it
Avatar
@whee30 send you a PM
👍 1
Avatar
Avatar
whee30
I'm sure I could just hunt eBay and find something but if there's a industry standard tool that might look better on the expense report
Deleted User 1/10/2022 11:03 PM
might not be what you are looking for but some interesting research in regards to magstripes: https://samy.pl/magspoof/
💯 1
Avatar
MrMacca (Allan Mc) 1/11/2022 3:43 AM
I'm using KAPE on a arsernal recon mounted E01 image that I know has Itunes backups. When I run KAPE with the Itunes backup target enabled, it doesn't see the backups? Any ideas as to the cause of this? I've checked the target options and the filepath is referenced. Kind regards
Avatar
Avatar
Deleted User
might not be what you are looking for but some interesting research in regards to magstripes: https://samy.pl/magspoof/
Cool post! The bit where he dips the CC into the metal dust to reveal the barcode is really cool.
👍 2
Avatar
Avatar
whee30
Cool post! The bit where he dips the CC into the metal dust to reveal the barcode is really cool.
Deleted User 1/11/2022 7:01 AM
Kamkar is a really smart guy. You might remember the MySpace worm years ago that kept adding everyone as a friend to a certain account. That was him.
Avatar
@Nuix hey there, any chance to dm me about search and tag json format ? Many thanks
Avatar
@ForensicDev You'll have fun with this one. Hopefully you have the right password - though there are options if you don't. First, regarding your writeblocker question - if I recall correctly, you can't use the built-in unlocker successfully through a writeblocker. So, you need an image or a clone. Shuck your drive - is your My Passport a model with an integrated USB interface, or is it SATA with a plug-in USB adapter?
Avatar
Avatar
MrMacca (Allan Mc)
I'm using KAPE on a arsernal recon mounted E01 image that I know has Itunes backups. When I run KAPE with the Itunes backup target enabled, it doesn't see the backups? Any ideas as to the cause of this? I've checked the target options and the filepath is referenced. Kind regards
make sure to update the targets, I think @Andrew Rathbun changed/pushed something today (edited)
Avatar
Avatar
stark4n6
make sure to update the targets, I think @Andrew Rathbun changed/pushed something today (edited)
Andrew Rathbun 1/11/2022 9:07 AM
That was as a result of this 🙂
Avatar
Avatar
Andrew Rathbun
That was as a result of this 🙂
I had a feeling but wanted to make sure haha
Avatar
Avatar
stark4n6
make sure to update the targets, I think @Andrew Rathbun changed/pushed something today (edited)
Digitalferret 1/11/2022 9:17 AM
😆 2
😎 2
Avatar
Avatar
whee30
Cool post! The bit where he dips the CC into the metal dust to reveal the barcode is really cool.
Agreed...I never knew that!
Avatar
@Magnet Forensics Hi, I have a question regarding "baseband date/time" timestamps for a battery status from the PowerLog (iOS). Do you have an article more in depth about this or do you have time to answer a question?
Avatar
For anyone familiar with the iOS KTX files, do you know if iOS creates two at the exact same time, one in light mode and one in dark mode? The timestamps on them are the exact same but one shows a light background and one shows a dark background. This is regarding the recent apps.
Avatar
seems like that makes sense... do you see any without a paired image?
6:43 AM
anything different about the directory or naming convention? It would make sense to generate those up front for when your night mode kicks on so the phone doesn't have to render all of the "active" ktx files all at once
Avatar
Hello everyone, a new comer here
👋 2
Avatar
Welcome! 🙂
Avatar
Kinda serious question for anyone UK-based. Any word from Kevin Beaumont? https://mobile.twitter.com/GossiTheDog
cybersecurity pleb 🐿 my tweets are severely limited by my lack of understanding of what I am doing.
Tweets
75949
Followers
117700
7:45 AM
No activity since 12/31.
Avatar
That is unusual.
Avatar
Yeah, he's usually super active.
Avatar
Avatar
whee30
anything different about the directory or naming convention? It would make sense to generate those up front for when your night mode kicks on so the phone doesn't have to render all of the "active" ktx files all at once
Appears that they probably do that. On another device, an iPad, theres actually several KTX images, in dark mode and light mode, but also different orientation and some are labeled as downsampled. Maybe they just generate them all at once so that they can use the correct one for any scenario.
Avatar
And a good dude full of good info.
Avatar
Oh yeah. He's high on the list in my twitter feed.
Avatar
LinkedIn also quiet since then
7:52 AM
😕
Avatar
Hopefully he's taking a well-deserved vacation after his exceptional log4j efforts.
🤞 3
Avatar
Ok, I found a coworker of his and they're gonna check on him.
👍 1
Avatar
Any tips or tutorials for case report writing? [US]
Avatar
Amazing, thank you
Avatar
Avatar
dfa_adam
@ForensicDev You'll have fun with this one. Hopefully you have the right password - though there are options if you don't. First, regarding your writeblocker question - if I recall correctly, you can't use the built-in unlocker successfully through a writeblocker. So, you need an image or a clone. Shuck your drive - is your My Passport a model with an integrated USB interface, or is it SATA with a plug-in USB adapter?
ForensicDev 1/12/2022 3:52 PM
@dfa_adam thanks. Didn't even think of making a clone onto one of our MyPassport USB drives. Will give that a try. The drive is a 2.5" MyPassport with a USB 3.0 <> SATA adapter.
Avatar
Avatar
ForensicDev
@dfa_adam thanks. Didn't even think of making a clone onto one of our MyPassport USB drives. Will give that a try. The drive is a 2.5" MyPassport with a USB 3.0 <> SATA adapter.
Okay, if the drive itself is SATA, you're in luck. That saves you a bunch of soldering to bypass the integrated usb that is on some my passports. Remove the drive from the enclosure, and take a look at the chip on the bridge. It's likely a JMS538S, but it could be an initio, symwave, or plx chip. Remove your bridge and image the drive. You should also check out the reallymine repo on GitHub, as well as the linux-mybook-tools repo. They'll provide a lot of in-depth info and tools to unlock your drive (or an image of it) on Linux. If you run into any other issues, let me know.
Avatar
Morning all, if anyone uses Eurofins, please DM me.
Avatar
Hey, anyone that knows how reliable locations from My Eyes Only are from snapchat?
Avatar
Avatar
dushe
Hey, anyone that knows how reliable locations from My Eyes Only are from snapchat?
Take them with a pinch of salt, they could be falsified on Android/jailbroken iOS. If possible use OSINT to verify the location
Avatar
@dushe What Matt said and I would add that recent iOS feature allow for less accurate locations via the iOS if you choose.
Avatar
What does an informational interview for a digital evidence lab internship entail?
Avatar
Avatar
PolePuma
What does an informational interview for a digital evidence lab internship entail?
#training-education-employment try in there or #dfir-recruitment
Avatar
Avatar
Jobbins
#training-education-employment try in there or #dfir-recruitment
Thanks!
Avatar
maskedroyalwindadept 1/13/2022 6:36 PM
Hello everyone I am in quite a unique situation here so let's get right into it. I been researching ways to start a startup business and in my research I know I want to approach this with a Craftsman mindset of selling digital products and improving on said product until I can eventually sell it off to the highest bidder. Now my problem lies in that I am not sure what vehicle I want to use for my prototype like on one hand i was super set on making a web app and doing a zero to hero thing by learning flask/Django and I still intend on learning flask but I am also in a network security co-op or internship and I want to use that expertise or knowledge that I will learn from there into my own MVP. So in a weird way I am torn I want to get really good at a skill that will help me build my prototype for my business but I want to know what will be the best course of action should I combine both or choose one and go with it. (edited)
Avatar
DeeFIR 🇦🇺 1/13/2022 8:32 PM
This isn't a SaaS startup forum, you're better off on another Discord channel (or posting it in another off-topic channel)
Avatar
Great post by @Brett Shavers . I'm guilty of not documenting things I've done and I need to get on it! https://brettshavers.com/brett-s-blog/entry/there-are-only-two-things-that-set-you-apart-from-another-dfir-practitioner
Two things that set you apart from other practitioners are (1) what you know and (2) what you can do. In this litigious world where court...
Avatar
I was looking to review YouTube Videos on Discord, when I came across one that I suggest that you also view in-order to get a security view on the Social Media -- If you have Privacy and Security Concerns in the use of Discord (does this group have concerns of ?), then you may want to review this video < https://www.youtube.com/watch?v=oHCK3NKFBW4 >
👍🏻 1
Avatar
Avatar
Harvey
I was looking to review YouTube Videos on Discord, when I came across one that I suggest that you also view in-order to get a security view on the Social Media -- If you have Privacy and Security Concerns in the use of Discord (does this group have concerns of ?), then you may want to review this video < https://www.youtube.com/watch?v=oHCK3NKFBW4 >
Digitalferret 1/15/2022 10:00 AM
not watched the video link yet but I've always has misgivings about how data farming was conflated with security concerns. Discord for some time asked permission to monitor your prv msgs, under the guise of keeping you safe. the wording was also suss, ie something like "you like to live dangerously" or some such, if you declined to be "protected". like any business, the sole purpose is to generate profit, it's just that the morals/ethics/scruples tend to matter less to companies nowadays.
10:02 AM
every now and again some settings would revert. so with Discord (and W10), i make regular checks as to what they've reset. always assuming they actually comply with your own settings, which i suspect some don't (edited)
Avatar
Avatar
Digitalferret
not watched the video link yet but I've always has misgivings about how data farming was conflated with security concerns. Discord for some time asked permission to monitor your prv msgs, under the guise of keeping you safe. the wording was also suss, ie something like "you like to live dangerously" or some such, if you declined to be "protected". like any business, the sole purpose is to generate profit, it's just that the morals/ethics/scruples tend to matter less to companies nowadays.
A regulatory fine is a surcharge we pay to do what we want anyway. It’s all part of the business.
Avatar
Avatar
Digitalferret
not watched the video link yet but I've always has misgivings about how data farming was conflated with security concerns. Discord for some time asked permission to monitor your prv msgs, under the guise of keeping you safe. the wording was also suss, ie something like "you like to live dangerously" or some such, if you declined to be "protected". like any business, the sole purpose is to generate profit, it's just that the morals/ethics/scruples tend to matter less to companies nowadays.
You said, " like any business, the sole purpose is to generate profit, it's just that the morals/ethics/scruples tend to matter less to companies nowadays. " But when did it become Only for profit and not for providing something that is needed and solves a need for business and/or community ? I understand, but it use to be also about doing the right and ethical way of business. Taking the community and the people in it in consideration. When did it change to be anything goes as long as it is not Criminal and to gain as much profit regardless. It has been a long and slow change, but you would have been somewhat blind if you did not see this coming (Only Profit for Profit sake)...
Avatar
Avatar
conf1ck3r
A regulatory fine is a surcharge we pay to do what we want anyway. It’s all part of the business.
So it is Ok to pass this accumulated expense and pass it along to the consumer all in the name of just doing Business, right ? The only right is that you are doing business and not a Good business ? Help me to understand.
9:11 PM
Is it right for Discord to record everything and that they claim it for their own and then to sell this collected communications / information to the next buyer without anyone's say on all of these Servers ? (edited)
Avatar
Oh no. I wasn’t trying to argue right vs wrong. I’m just telling you the actual arguments I’ve heard when discussing things with the lawyers. A fine is just a “do what I want tax” when the bad behavior has some sort of negative consequences and it makes you enough money to not worry about the consequences. (edited)
Avatar
Avatar
conf1ck3r
A regulatory fine is a surcharge we pay to do what we want anyway. It’s all part of the business.
Digitalferret 1/16/2022 2:34 AM
yep, a bit like the old UK TV series "Porridge" (jail time). the judge tells him that he takes prison as an occupational hazard. for those that can generate so much money (from a single job say) they will "take the hit" regardless. much like a Newspaper publishing a scoop before establishing the truth of it. (unlike Cronkite who was diligent in waiting for facts to be established regardless of pressure to go to News) (edited)
Avatar
Avatar
Harvey
You said, " like any business, the sole purpose is to generate profit, it's just that the morals/ethics/scruples tend to matter less to companies nowadays. " But when did it become Only for profit and not for providing something that is needed and solves a need for business and/or community ? I understand, but it use to be also about doing the right and ethical way of business. Taking the community and the people in it in consideration. When did it change to be anything goes as long as it is not Criminal and to gain as much profit regardless. It has been a long and slow change, but you would have been somewhat blind if you did not see this coming (Only Profit for Profit sake)...
Digitalferret 1/16/2022 2:41 AM
doing the right thing is irrelevant (as a business) if the process does not make profit. Food for instance. originally the basic product say, was made as a form of nutrition. the food came first and if it could be sold for money, then that was good. now "added value" food starts with "is it profitable?" and has far less concern as to nutritional value: (convenience v time, say). end result is manufacturers providing a product that has entirely dubious benefit to the consumer but makes good money. the recognisable turning point in some is when a small business sells to "bean counters
2:41 AM
who are detached from the process.
2:42 AM
maybe continue in #off-duty as we are deviating from dfir? (edited)
Avatar
Hello, i need some advice to formulate a research question on the topic of cyberforensics/network forensics or computer forensics, does anyone wanna help and discuss, feel free to DM me!
Avatar
Avatar
conf1ck3r
Oh no. I wasn’t trying to argue right vs wrong. I’m just telling you the actual arguments I’ve heard when discussing things with the lawyers. A fine is just a “do what I want tax” when the bad behavior has some sort of negative consequences and it makes you enough money to not worry about the consequences. (edited)
I'm sorry for the misunderstanding, but it seemed to offer the chance to be understood in that manner. Lef me ask, how do you feel these fines change things ? Does it affect small to mid-size firms the same as large ? I do not believe so and thus my comment. So dependent upon the size of the firm, a fine will have varying results (some of what we would want and for larger, just the cost of doing business)...
Avatar
Avatar
Digitalferret
maybe continue in #off-duty as we are deviating from dfir? (edited)
Sorry for the way that this information that I provided has deviated. I am still interested in views After member's finally view the video And the information that is presented about how Not secure direct use of Discord via an app versus Use through (the suggestion) of use by and through a Browser. Also, What about their suggested Alternatives.
Avatar
So to update my personal situation, and I maybe off by posting this and apologize in advance, I have found out this morning that there is an individual who was trying to "recruit" my baby sister into providing CP to him starting from the time she was 13 years old, and it is ongoing, he says he is American from Texas. I don't even know how to ask this question as being it's a family member, I am a bit perplexed. I think I need advice on this one, please help me. If anyone in Toronto can help me via pm or here in general I don't mind, I would be grateful. @Law Enforcement [Canada] I need to hand off my sisters phone to the correct cyber division, and make sure it get's into the right hands for analysis, and tbh the constable that originally handled the case is a rookie, I don't want this evidence getting lost in the void for lack of experience, being that it was overlooked the firs time around.. I am in Toronto currently, is there a specific division I can go to, that I can directly hand it off? I don't know if Peel has the expertise this situation requires. Please help.
Avatar
Andrew Rathbun 1/16/2022 12:33 PM
@CLB-Paul @forensicmike @Magnet might be able to assist too even though they were in different parts of Canada
Salute 1
Avatar
That would be amazing, her mother is handing me off the phone this afternoon, she contacted me, I plan on taking an image as soon as I get it before I hand it off, at the least a full backup of the device.
Avatar
Avatar
ryd3v
That would be amazing, her mother is handing me off the phone this afternoon, she contacted me, I plan on taking an image as soon as I get it before I hand it off, at the least a full backup of the device.
Andrew Rathbun 1/16/2022 12:36 PM
Just consider the image LE needs to try and make their case before you go doing anything to that phone. It is evidence and as little as you can do to it before LE gets their image the better
Avatar
Shotty_2_Hotty 1/16/2022 12:37 PM
The constable isn't necessarily the person that will dump the data fromm your sisters phone. He will take it through the proper channels i.e to a trained DMFT tech or a DFU. Rookie or not, that's in their training with chain of custody (edited)
Avatar
Avatar
Andrew Rathbun
Just consider the image LE needs to try and make their case before you go doing anything to that phone. It is evidence and as little as you can do to it before LE gets their image the better
100% anything with regards to the handoff I should do, to keep the COC
Avatar
Avatar
Shotty_2_Hotty
The constable isn't necessarily the person that will dump the data fromm your sisters phone. He will take it through the proper channels i.e to a trained DMFT tech or a DFU. Rookie or not, that's in their training with chain of custody (edited)
100%, just first time around, they didn't do that , even-though they had the device
12:38 PM
Also the OIC is off until, tomorrow , but I have to pick up the phone today
Avatar
Andrew Rathbun 1/16/2022 12:39 PM
It may be wise to data mine your sister's brain for info on this guy. Usernames, apps used, timeframes, anything related to a personal description of him etc
💯 1
12:39 PM
If LE has to do a search warrant for comms that are owned by some company then they're going to need specific information for the purpose of a search warrant/MLAT
12:42 PM
may I share the pic that has got my attention? it is a message which he divulges some information regarding him. tbh I am kinda stunned xD
Avatar
Avatar
ryd3v
may I share the pic that has got my attention? it is a message which he divulges some information regarding him. tbh I am kinda stunned xD
Andrew Rathbun 1/16/2022 12:43 PM
This is a public forum so it's your call but if you feel more comfortable via dm then you can do that too
Avatar
it's cool, nothing graphic, we can always delete later , to say the least, it's got my attention, as he states he owns a "Cyber Security" company
12:44 PM
12:45 PM
the pic was sent to me from the mother just a half hour ago, so I'm trying to prepare my next steps
12:45 PM
keep in mind, she was 13 years old at this date
Avatar
RubberDucky 1/16/2022 12:45 PM
Hope things get better for you and your family @ryd3v :) @Shotty_2_Hotty is right, the person accepting in the phone might be clueless, hopefully the person working the phone isn't though.
Avatar
So I'm a little on fire atm
Avatar
Avatar
RubberDucky
Hope things get better for you and your family @ryd3v :) @Shotty_2_Hotty is right, the person accepting in the phone might be clueless, hopefully the person working the phone isn't though.
1005%Thank you brother (edited)
Avatar
So after some thought, the plan I've come up with is to record the handoff from the mother, then drive the device to TPS and hand off to the OIC, I think that dots all the i's and crosses the tee's
Avatar
DefendingChamp 1/16/2022 1:46 PM
Anyone familiar with Recon Imager for MacBooks?
Avatar
@Law Enforcement [USA] Has anyone served Sony (PlayStation) with legal process? I have done my fair share of search warrants, but Search.org says to contact Corporation Service Company ("CSC") to serve them. When I contacted CSC they said I needed to serve their representative in my state via personal service or a recognized mailing system (certified mail?), they would not accept service via fax or email. Just making sure this is correct, because I have yet to serve a digital warrant via snail mail, and it seems odd to do so for a large company like Sony. (edited)
Avatar
Avatar
FullTang
@Law Enforcement [USA] Has anyone served Sony (PlayStation) with legal process? I have done my fair share of search warrants, but Search.org says to contact Corporation Service Company ("CSC") to serve them. When I contacted CSC they said I needed to serve their representative in my state via personal service or a recognized mailing system (certified mail?), they would not accept service via fax or email. Just making sure this is correct, because I have yet to serve a digital warrant via snail mail, and it seems odd to do so for a large company like Sony. (edited)
Haven’t served Sony but we used to have to serve every cell phone company and Facebook that way. They all used one of two law offices and close enough to drive to and serve in person.
2:01 PM
After a court ruling a couple years ago it was no longer necessary.
Avatar
Avatar
Joe Schmoe
Haven’t served Sony but we used to have to serve every cell phone company and Facebook that way. They all used one of two law offices and close enough to drive to and serve in person.
I am glad Facebook changed to using an online portal and it is good to know this method has been done before. Thanks!
Avatar
Ross Donnelly 1/16/2022 2:04 PM
The latest release of XWays has this in the release notes - does anyone have any resources about the new EXIF format? "Improved PNG screenshot identification. In particular, a new Exif format is supported that is used mainly for Android screenshots. This allows to verify whether such Android screenshots are original."
Avatar
Avatar
FullTang
I am glad Facebook changed to using an online portal and it is good to know this method has been done before. Thanks!
One judge wouldn’t sign any search warrants if there wasn’t a local agent to serve. He said he didn’t have jurisdiction outside the state. Luckily that’s been addressed.
👍 1
Avatar
Avatar
FullTang
@Law Enforcement [USA] Has anyone served Sony (PlayStation) with legal process? I have done my fair share of search warrants, but Search.org says to contact Corporation Service Company ("CSC") to serve them. When I contacted CSC they said I needed to serve their representative in my state via personal service or a recognized mailing system (certified mail?), they would not accept service via fax or email. Just making sure this is correct, because I have yet to serve a digital warrant via snail mail, and it seems odd to do so for a large company like Sony. (edited)
It's been a few years, but their rep was a local attorney. Dropped off at his office and in a few days Sony called and gave me everything I needed. It was reference Playstation accounts and IP logging.
👍 1
Avatar
@FullTang Yes, that’s the correct process. I spoke with Sony legal counsel who confirmed this when I served a search warrant for PSN records last year. After getting the SW signed by my local judge, I mailed it certified USPS to my state’s CSC location which you can look up. It took a few weeks but eventually got emailed results direct from Sony pertaining to the SW. https://www.cscglobal.com/cscglobal/pdfs/CSC-registered-agent-addresses.pdf just mail to the closest location in your state.
Avatar
Avatar
zc823
@FullTang Yes, that’s the correct process. I spoke with Sony legal counsel who confirmed this when I served a search warrant for PSN records last year. After getting the SW signed by my local judge, I mailed it certified USPS to my state’s CSC location which you can look up. It took a few weeks but eventually got emailed results direct from Sony pertaining to the SW. https://www.cscglobal.com/cscglobal/pdfs/CSC-registered-agent-addresses.pdf just mail to the closest location in your state.
Excellent, thank you! I would think that a big company like Sony would have an online portal or accept service via email/fax, but I guess not.
Avatar
Avatar
ryd3v
Click to see attachment 🖼️
Andrew Rathbun 1/16/2022 2:19 PM
SnapChat? Or am I getting rusty? Lol
Avatar
Yeah that’s Snapchat
💯 1
Avatar
Avatar
FullTang
Excellent, thank you! I would think that a big company like Sony would have an online portal or accept service via email/fax, but I guess not.
Of course! I know right? Isn’t it 2022? You should be good getting results that way. Hopefully they work out for your case.
👍 2
Avatar
Avatar
ryd3v
the pic was sent to me from the mother just a half hour ago, so I'm trying to prepare my next steps
just a little bit of advice, dont have the mum send you anything that can be considered illegal i.e. csam pics etc. (even if its her own daughter). Both the mother/you would technically be committing an offence yourselves if you did.
this 2
💯 1
3:09 PM
At least the way we do things over here, is to recommend they just leave things as they are and we'll arrange with the victim (or guardian based on age) to do a phone download and then wipe the phone if needed and return said phone ideally within 48hrs to victim/guardian
this 1
Avatar
Avatar
DefendingChamp
Anyone familiar with Recon Imager for MacBooks?
forensicMouse 1/16/2022 4:19 PM
I’m testing recon out right now. What questions do you have?
Avatar
Avatar
Andrew Rathbun
SnapChat? Or am I getting rusty? Lol
You got it right on the head haha
Avatar
Avatar
Rob
just a little bit of advice, dont have the mum send you anything that can be considered illegal i.e. csam pics etc. (even if its her own daughter). Both the mother/you would technically be committing an offence yourselves if you did.
100%, I know this as well and nothing was sent to me directly, this pic came from my Dad
Avatar
Avatar
Rob
At least the way we do things over here, is to recommend they just leave things as they are and we'll arrange with the victim (or guardian based on age) to do a phone download and then wipe the phone if needed and return said phone ideally within 48hrs to victim/guardian
100%, don't think they will wipe the device, but it was handed of to the OIC just an hour ago, so hopefully all goes well with their investigation. I'm staying out of it
👍 1
Avatar
Avatar
forensicMouse
I’m testing recon out right now. What questions do you have?
DefendingChamp 1/17/2022 3:52 AM
Under Recon Imager for a Macbook, the volumes listed are Macintosh HD - Data disk1s1 vs Macintosh HD- disk1s5. Both have the same size. Does it matter which one gets imaged? Is there a difference? Google is giving conflictng answers.
Avatar
I got a bit of a strange question but here goes Does anyone know if there is any research done on what thumb people usually use for each position on a locked screen when unlocking phones in general ? I got a case where we can possible see each thumb press for the unlock on surveillance but where it is impossible to determine exactly what is being pressed. My thinking is that humans probably are more likely to use the different thumbs for different numbers which in this case might be used to create better brute force candidates. This might be totally a rabbit hole with no real answer but I thought I would throw the question in here! maybe some1 has had a similar case 🙂
Avatar
I'm looking for a way to export a report in Autopsy that would give me the exact same result as the "Files - Text" CSV does, but WITH every folder as well. Because it only does files it seems to skip folders that are empty, I want the folders to be part of the list, not only listed as a parent of a file (kinda like treating any folder like a file). Anyone has a take on this, or could point me in some direction? (edited)
Avatar
it seems someone is claiming they're coming back to target more security analysts. https://twitter.com/campuscodi/status/1483084191864655878
Someone claiming to be LeakTheAnalyst is threatening to expose data from security firms
7:28 AM
Video ends implying they're coming after Syborg SentinelOne Verint McAffee CheckPoint Trendmicro PaloAlto F5 Clearsky CyberArk
7:29 AM
Warning: wild speculation ahead So Russian intel likes to resurrect past hacktivist operations and masquerade. We saw this with guccifer 2.0 and Syrian cyber army turning out to be Ivan. They also like to do stuff around civil rights holidays in the US. Blue leaks targeted the fusion centers and was dumped in honor of Juneteenth in 2020. Today is obviously MLK day. Didn’t some of those orgs have problems related to solarwinds? Lots of coincidence here… (edited)
Avatar
Anyone know if an outlook profile contains any artifacts related to delegation changes? Checked server side logs and they have already rotated.
Avatar
Hi i am having a problem with regripper when i run perl ./rip.pl -r reghive.e01 -f all > report.txt i get error on all plugings not found how can i fix this
Avatar
randomaccess 1/17/2022 3:23 PM
@Alvo would suggest reading the documentation about what file types regripper supports and what file type you've provided it
Avatar
I have tried with all other file formats buts still same error @randomaccess
Avatar
randomaccess 1/17/2022 3:24 PM
All?
Avatar
Sorry not all i meant to say different
Avatar
randomaccess 1/17/2022 3:25 PM
Right. What is an E01 file?
Avatar
Even changing the -f to a -p while specifying one plugin still get an error
3:26 PM
I believe its an encase file obtained from ftk imager
Avatar
Avatar
Alvo
Even changing the -f to a -p while specifying one plugin still get an error
randomaccess 1/17/2022 3:30 PM
Yes this won't do anything. Were working through your problem :) rather than just giving you the answer
Avatar
Avatar
Alvo
I believe its an encase file obtained from ftk imager
randomaccess 1/17/2022 3:30 PM
Yes. And what file type does regrippper say it needs?
Avatar
DeeFIR 🇦🇺 1/17/2022 3:31 PM
🍿
this 4
Avatar
Let me share a screenshot
👍 1
3:41 PM
3:42 PM
I think that should be a better veiw of both erros @randomaccess
Avatar
randomaccess 1/17/2022 3:42 PM
Oh I know exactly why it's not working
3:42 PM
But I want you to figure that out
Avatar
How can i fix that
Avatar
randomaccess 1/17/2022 3:43 PM
What file type does regrippper expect?
Avatar
I want to say a raw file but i am not quite sure its my first time working with regripper
Avatar
randomaccess 1/17/2022 3:44 PM
That's ok
3:44 PM
Have a look at the first comment in the code
Avatar
Hive file
Avatar
randomaccess 1/17/2022 3:49 PM
Yep. And an E01 or RAW/DD is what?
Avatar
I know DD is a raw image
3:53 PM
E01 is encase so it means i would have to convert the E01 to DD or something of the sort because i know a raw file would work with volatility
Avatar
randomaccess 1/17/2022 3:53 PM
Volatility is for memory images
3:54 PM
You don't need to convert it. You'll just need to figure out how to open the disk iamge to get the registry hives out
Avatar
But i have seen people use it to get data from .raw files
3:57 PM
I have opened it with autopsy but the file is to big and jumbled up and the rip.pl documentation show i can open the EO1 file and specify the -f system and rip the information regarding the system and grep what i need from that and also autopsy takes quite some time to parse through the file and give me output (edited)
Avatar
randomaccess 1/17/2022 4:00 PM
You can open an e01 as a disk image with autopsy
4:00 PM
It sounds like you've opened it as a file
4:00 PM
Otherwise you can mount an e01 using ewfmount
Avatar
No i selected disk image file
Avatar
randomaccess 1/17/2022 4:00 PM
Or open it as. Adisk image with ftk imager which is a windows based tool
Avatar
I tried mounting with ewfmount but when i use mmls to get the offsets it gives another different error
4:04 PM
Both ftk imager and autopsy work its just that its quite large to go through i have done some research and seen people solve it with regripper unfortunately i get that error about the plugins i have tried it on windows, ubuntu, siftworkstantion and remnux without any luck
Avatar
randomaccess 1/17/2022 4:05 PM
When you say work, if you open it with ftk imager can you see the file system?
Avatar
Yes i mean i see all the file systems it even shows thats its a windows image
Avatar
randomaccess 1/17/2022 4:12 PM
That's great! So now you just need to figure out where the registry hives are, and export them so you can parse them with regripper
4:12 PM
Bearing in mind they aren't all in the same place and regripper plugins will tell you which give they're expecting
4:13 PM
(I think that may have changed, I haven't used 3.0 in a while)
Avatar
3.0 from my experience today hasnt been so helpful one major thing with it is that i checks if the hive i dirty the gui that comes with it has no plugins option
4:15 PM
I guess i would just have to read through all this data then till rip.pl is updated or fixed
Avatar
randomaccess 1/17/2022 4:19 PM
Ha you will be waiting a long time for it to be fixed when its probably not broken
4:19 PM
If a hive is dirty it'll still parse it just won't show you the data in the transaction logs
4:20 PM
Harlan isn't adding in transaction log support and states in his documentation how to repair the hives to work
Avatar
I gues i will have to go about it the hard way for know and read through the documentation more maybe change some if the code in rip.pl
Avatar
randomaccess 1/17/2022 4:23 PM
Why do you need to change some code?
Avatar
I dont know i think that it cant locate the plugins from the error that plugin nit found
Avatar
randomaccess 1/17/2022 4:25 PM
Maybe. But as I said before, it doesn't support e01s so you were also giving it the wrong input
4:25 PM
Otherwise you can execute rip.pl and the plugins are all .pl files in the plugins directory
4:25 PM
If there's nothing in plugins then yeah itll fail because regripper needs plugins to work
4:26 PM
RegRipper3.0. Contribute to keydet89/RegRipper3.0 development by creating an account on GitHub.
Avatar
I have checked some tutorials on youtube as i was looking for a simpler way if doing it and i came across regripper and they showed a guide on how to do it
4:27 PM
The plugins directory was the first thing i checked and to my surprise everything is in there
Avatar
randomaccess 1/17/2022 4:27 PM
Heh the next question is what does log4shell have to do with the windows registry
Avatar
Its the name if the challange as i downloaded it from cyberdefenders.com
Avatar
randomaccess 1/17/2022 4:29 PM
But that's a bigger question of "what are you looking for". I'd suggest doing a few things and reporting back Firstly, figure out where your key registry hives are located Then export them in ftki or autopsy Next make sure rr is set up correctly (just download the newest version of GitHub, unzip using 7z, run rip.exe -c - l and see if it gives you a list of plugins). Then try parse some hives
Avatar
I am basically looking for os information such as ip address domain name assigned user creation dates stuff like that
Avatar
randomaccess 1/17/2022 4:31 PM
Well getting the list of plugins from regripper will help let you figure out which hives that data sits in
Avatar
All plugins are present for some reason i dont know how it breaks
Avatar
randomaccess 1/17/2022 4:33 PM
Have you given it a registry hive instead of a disk image?
Avatar
Because i have seen i can run rip.pl -r .e01 -f system > report.txt then from there i can just grep for os_version and so on
Avatar
Avatar
randomaccess
Have you given it a registry hive instead of a disk image?
No i havent the challange come with e01 and nothing more
Avatar
randomaccess 1/17/2022 4:34 PM
Right. Go back and look at the steps Ive described
4:35 PM
Youre giving it the wrong input and then saying the tool is broken
Avatar
Avatar
Alvo
Because i have seen i can run rip.pl -r .e01 -f system > report.txt then from there i can just grep for os_version and so on
randomaccess 1/17/2022 4:35 PM
No you can't. That doesn't work (edited)
Avatar
Okay let me search for a hive file and try it
Avatar
Avatar
randomaccess
No you can't. That doesn't work (edited)
SANS Digital Forensics and Incident Response Blog blog pertaining to RegRipper: Ripping Registries With Ease
Avatar
randomaccess 1/17/2022 4:41 PM
Where am I looking?
Avatar
Then i gues it need a hive file
💯 1
🥳 3
4:46 PM
Okay they have not specified the extension but the syntax is correct
Avatar
DeeFIR 🇦🇺 1/17/2022 4:46 PM
All you need to do is give it the registry file you want to review, give it a location for the report, and select the type of registry file. Then push a button.
Avatar
randomaccess 1/17/2022 4:47 PM
This may be slightly different because that's an earlier version of RR. But the -h flag should give you the full command syntax
4:47 PM
Harlans pretty good at documenting these things
Avatar
Okay can i convert the e01 to hive file
AccessData 1
Avatar
randomaccess 1/17/2022 4:48 PM
No...
Avatar
To bad them its autopsy for me then
Avatar
randomaccess 1/17/2022 4:49 PM
Sure. Autopsy should even run regripper if you choose the right module. From memory you can set it at ingest
Avatar
DeeFIR 🇦🇺 1/17/2022 4:49 PM
Why don't you use FTK to export the hives?
Avatar
Avatar
DeeFIR 🇦🇺
Why don't you use FTK to export the hives?
randomaccess 1/17/2022 4:49 PM
That's what I would do. Or just mount the image with ewfmount or ftk imager
Avatar
Avatar
DeeFIR 🇦🇺
Why don't you use FTK to export the hives?
Dint know this was an option will definitely do this
Avatar
Avatar
Alvo
Dint know this was an option will definitely do this
randomaccess 1/17/2022 4:50 PM
I said this like 20 minutes ago ha
Avatar
Avatar
randomaccess
That's what I would do. Or just mount the image with ewfmount or ftk imager
Doesnt work for me when i use mmls to get more mount points i get some error
Avatar
Avatar
randomaccess
I said this like 20 minutes ago ha
I asked above and you said no
Avatar
Avatar
Alvo
Okay can i convert the e01 to hive file
This is me asking
Avatar
randomaccess 1/17/2022 4:52 PM
No I didn't
4:52 PM
That's not the same thing
Avatar
Avatar
randomaccess
No...
Your answer
Avatar
randomaccess 1/17/2022 4:52 PM
You can convert a forensic image to a disk image or another disk/forensic image format (edited)
4:52 PM
But you don't convert a ZIP file to a JPEG
Avatar
Its just that i used convert instead of export my bad
Avatar
randomaccess 1/17/2022 4:53 PM
Ha yes well they're different things
4:53 PM
Think of a disk image as a container
4:53 PM
You need something to open the container, parse the file system, and then you can go find the hive files to export
Avatar
Funny thing the hint on the challange says that i should use regripper
Avatar
randomaccess 1/17/2022 4:56 PM
Sure. It's a good tool for its use case. But you need to use it correctly
Avatar
Thanks let me export it to a hive file then try and see what happens
👍 1
Avatar
DeeFIR 🇦🇺 1/17/2022 6:13 PM
What's the resolution to this absolute nail-biter of a drama
🍿 12
Avatar
Hi all, has anyone here encountered this issue on iOS devices: Snapchat chat participants are displayed only as hexadecimal strings, with no usernames being identifiable. I looked in the SQL database for Snapchat and the User IDs are all hexadecimals strings in the actual database too, so it isn't a decoding issue
12:53 AM
I've tried different decoding tools and two different extractions, both which gave the same result
12:53 AM
Does anyone know why this might happen?
Avatar
Avatar
Alex Owen
Hi all, has anyone here encountered this issue on iOS devices: Snapchat chat participants are displayed only as hexadecimal strings, with no usernames being identifiable. I looked in the SQL database for Snapchat and the User IDs are all hexadecimals strings in the actual database too, so it isn't a decoding issue
You can map guid to username if you check the following files: table "snapchatter" in primary.docobjects, arroyo.db and/or pref.docobjects.
💯 2
👍 2
Avatar
Avatar
Alex Owen
I've tried different decoding tools and two different extractions, both which gave the same result
Sometimes axiom has been able to show the usernames correctly but this is not always the case i have seen.
Avatar
Avatar
.karate.
You can map guid to username if you check the following files: table "snapchatter" in primary.docobjects, arroyo.db and/or pref.docobjects.
I've managed to find this now, thank you for pointing me in the right direction 🙂
👍 1
Avatar
Eric Zimmerman 1/18/2022 5:19 AM
man that conversation was master level trolling
💯 1
5:23 AM
you can lead RegRipper to an E01, but you cant make it parse it
😂 1
Avatar
My Eyes Only (Snapchat) question: Can we get exif data like, device model, from a "video (first frame)" by using the exif tool?
Avatar
ForensicDad#0001 1/18/2022 7:07 AM
Give it a try. Should work since EXIF data is in the file header (preceding the first frame).
Avatar
Avatar
DeeFIR 🇦🇺
What's the resolution to this absolute nail-biter of a drama
Avatar
Hi everyone, since I am not that experienced with analysing network related log files: I am trying to see when a user was connected to the network. is it safe to assume the machine was up and running in the time frame where I see tons of kerberos authentication messages (ticket requested, granted), login events (tons of "an account was successfully logged on" how does it actually happen that tons of logon events are being created during the day? is it just being automatically verified if the session is still up and then counting as a logon event?), UserID login messages etc. that during those times the machines associated with the user (its the same machine) was connected? I dont have the machine at hand and was able to create a rough timeline of events including when the user started to work. but there are also blanks where I dont see any activity except of mail synchronisations but kinda a few of the events named above. so I am wondering if they still occur, even if the machine would be fully shut down.
Avatar
https://arstechnica.com/gadgets/2022/01/the-pinephone-pro-brings-upgraded-hardware-to-the-linux-phone/ Has anyone come across a linux phone? I'm curious how the download process would work with one of these
Pine64 calls this "the fastest mainline Linux smartphone on the market."
Avatar
Avatar
.yuzumi.
Hi everyone, since I am not that experienced with analysing network related log files: I am trying to see when a user was connected to the network. is it safe to assume the machine was up and running in the time frame where I see tons of kerberos authentication messages (ticket requested, granted), login events (tons of "an account was successfully logged on" how does it actually happen that tons of logon events are being created during the day? is it just being automatically verified if the session is still up and then counting as a logon event?), UserID login messages etc. that during those times the machines associated with the user (its the same machine) was connected? I dont have the machine at hand and was able to create a rough timeline of events including when the user started to work. but there are also blanks where I dont see any activity except of mail synchronisations but kinda a few of the events named above. so I am wondering if they still occur, even if the machine would be fully shut down.
Andrew Rathbun 1/18/2022 9:20 AM
Are you looking at the event logs from a Domain Controller? It sounds like it just by what I'm reading here
Avatar
I had a question from my boss to see if I know of a private firm that does "video enhancement" I didn't know off hand as I only deal with LEO's. Anybody ? PM me if you have some insight.
Avatar
Avatar
DCSO
I had a question from my boss to see if I know of a private firm that does "video enhancement" I didn't know off hand as I only deal with LEO's. Anybody ? PM me if you have some insight.
Andrew Rathbun 1/18/2022 12:04 PM
@Amped Software might be able to advise
Avatar
Avatar
DCSO
I had a question from my boss to see if I know of a private firm that does "video enhancement" I didn't know off hand as I only deal with LEO's. Anybody ? PM me if you have some insight.
Andrew Rathbun 1/18/2022 12:04 PM
and @iNPUT-ACE
Avatar
blake_at_amped 1/18/2022 12:09 PM
@DCSO I have a few of our private users I have the ok to send information on. I'll send you a message.
👍 2
Avatar
chuckych33s3 1/18/2022 12:27 PM
Anyone had to try and triage an ESXi host? Finding that UAC and Catscale aren't running properly.
Avatar
Which is better for DF? CS or CE?
Avatar
Avatar
codyp915
Which is better for DF? CS or CE?
Andrew Rathbun 1/18/2022 6:09 PM
What is CS or CE?
Avatar
Avatar
Andrew Rathbun
What is CS or CE?
Computer engineering=CE Computer science=CS
Avatar
Andrew Rathbun 1/18/2022 6:12 PM
CS is Cobalt Strike to me so yeah, thanks for the clarification
😆 5
Avatar
Avatar
codyp915
Computer engineering=CE Computer science=CS
Andrew Rathbun 1/18/2022 6:13 PM
#training-education-employment BTW. Let's continue there
Avatar
How much does @Magnet Forensics Axiom leverage the graphics card when processing/examining files? Is it significant enough to spend additional money for an upgrade?
Avatar
Avatar
AtomicDI
How much does @Magnet Forensics Axiom leverage the graphics card when processing/examining files? Is it significant enough to spend additional money for an upgrade?
Andrew Rathbun 1/19/2022 4:53 AM
You're using IEF right now then? I think processing is more CPU related since they show all the threads and their individual tasks when processing. If you're going from IEF to AXIOM then there's no comparison IMO. I just did the MCFE for both of them and going back to IEF was like a trip back to the 90s, comparatively 😋
Avatar
Thank you. I'm currently using Axiom and am a fan of it myself. My laptop died that I run it on and need to replace it. I wasn't sure if I upgraded the graphics card if I would see significant time savings. Everything is pricy theses days.
Avatar
randomaccess 1/19/2022 5:07 AM
I think it uses the graphics card for magnet ai
5:07 AM
But not for other processing
5:08 AM
That being said, axiom should be significantly faster than Ief
Avatar
Hector!221B 1/19/2022 8:19 AM
hi there what do you recommend tryhackme or BTLO or any other platfortm?
Avatar
Avatar
AtomicDI
How much does @Magnet Forensics Axiom leverage the graphics card when processing/examining files? Is it significant enough to spend additional money for an upgrade?
forensicmike @Magnet 1/19/2022 9:31 AM
agree with both @randomaccess and @Andrew Rathbun , as far as I know (not an engineer) AXIOM only uses GPU directly for AI purposes as mentioned, and perhaps indirectly by some dependencies. if your goal is to optimize for AXIOM processing, you are generally better speccing more/faster RAM + more/faster CPU cores.
Avatar
Avatar
forensicmike @Magnet
agree with both @randomaccess and @Andrew Rathbun , as far as I know (not an engineer) AXIOM only uses GPU directly for AI purposes as mentioned, and perhaps indirectly by some dependencies. if your goal is to optimize for AXIOM processing, you are generally better speccing more/faster RAM + more/faster CPU cores.
Thank you all for clarifying. I appreciate the insight.
Avatar
Avatar
Hector!221B
hi there what do you recommend tryhackme or BTLO or any other platfortm?
Rese4rch_4D 1/19/2022 10:38 AM
Both good platforms. It depends what you’re after. If you want more blue team BTLO is good. But if you after more of a broad selection THM is good.
Avatar
Avatar
DefendingChamp
Under Recon Imager for a Macbook, the volumes listed are Macintosh HD - Data disk1s1 vs Macintosh HD- disk1s5. Both have the same size. Does it matter which one gets imaged? Is there a difference? Google is giving conflictng answers.
forensicMouse 1/19/2022 12:48 PM
Generally disk0 is the physical and disk1 is the APFS container of disk0s2. I would recommend imaging disk1 entirely which includes disk1s1 and disk1s5. They all share the logical space of disk0s2 so it shouldn’t take that much longer and take up more space. I think disk1s5 is a virtual machine of disk1s1 that Mac creates for whatever purpose.
Avatar
chuckych33s3 1/19/2022 1:04 PM
Does anyone know of somewhere I can download an apache web server test image that has been "compromised"? Trying to come up with a training for my team without using actual client data.
Avatar
Avatar
chuckych33s3
Does anyone know of somewhere I can download an apache web server test image that has been "compromised"? Trying to come up with a training for my team without using actual client data.
chuckych33s3 1/19/2022 1:30 PM
Everything related to Linux Forensics. Contribute to ashemery/LinuxForensics development by creating an account on GitHub.
Avatar
randomaccess 1/19/2022 1:53 PM
(I'm assuming you're answering your own question and not asking where to download the case data for this?)
👍 1
Avatar
Avatar
forensicMouse
Generally disk0 is the physical and disk1 is the APFS container of disk0s2. I would recommend imaging disk1 entirely which includes disk1s1 and disk1s5. They all share the logical space of disk0s2 so it shouldn’t take that much longer and take up more space. I think disk1s5 is a virtual machine of disk1s1 that Mac creates for whatever purpose.
DefendingChamp 1/19/2022 2:38 PM
Got it! Thank you! I was double checking since the size were the same. Odd.
Avatar
Question: I've moved into a more LEO organization and wanted to know how you all cope with seeing images and videos of some pretty terrible stuff. Like do you have counselors at your place of employment that you can talk to? A support group? If not, what are some of your coping mechanisms. Looking for ideas to implement at the start of my career
Avatar
Avatar
DFE Travis
Question: I've moved into a more LEO organization and wanted to know how you all cope with seeing images and videos of some pretty terrible stuff. Like do you have counselors at your place of employment that you can talk to? A support group? If not, what are some of your coping mechanisms. Looking for ideas to implement at the start of my career
Andrew Rathbun 1/19/2022 5:02 PM
Avatar
Avatar
Andrew Rathbun
Thanks man, I've been here on this server since I was a student. Can't believe I'm finally starting in my dream job of a federal level LEA as a DFE. I'm sure you'll see me here tons more now. I'll be using Axiom, which I read now has some officer wellness tools, hopefully that works too.
🤘 3
Avatar
Avatar
DFE Travis
Thanks man, I've been here on this server since I was a student. Can't believe I'm finally starting in my dream job of a federal level LEA as a DFE. I'm sure you'll see me here tons more now. I'll be using Axiom, which I read now has some officer wellness tools, hopefully that works too.
Andrew Rathbun 1/19/2022 5:21 PM
Really awesome to hear you've been here so long and are still here. Happy to have you and don't hesitate to check in with us since a lot of us have done what you're about to do (re: viewing potentially horrible things)
Salute 1
Avatar
Avatar
DFE Travis
Question: I've moved into a more LEO organization and wanted to know how you all cope with seeing images and videos of some pretty terrible stuff. Like do you have counselors at your place of employment that you can talk to? A support group? If not, what are some of your coping mechanisms. Looking for ideas to implement at the start of my career
In addition to Andrew's post, try not to view the terrible stuff towards the end of the day. Give yourself a at least a few hours before you end your shift and go home to your family so you don't go directly from terrible images to everyday life.
Salute 1
Avatar
Avatar
Hector!221B
hi there what do you recommend tryhackme or BTLO or any other platfortm?
HackTheBox
Avatar
Avatar
ryd3v
HackTheBox
Hector!221B 1/19/2022 11:37 PM
yeah but i think it's more red teaming
Avatar
Avatar
Hector!221B
yeah but i think it's more red teaming
There’s some forensics challenges
Avatar
Avatar
Hector!221B
yeah but i think it's more red teaming
https://socvel.com has some perpetually running BlueTeam CTFs; they give you a bunch of logs from a Windows host and ask a bunch of questions
Avatar
Avatar
DFE Travis
Question: I've moved into a more LEO organization and wanted to know how you all cope with seeing images and videos of some pretty terrible stuff. Like do you have counselors at your place of employment that you can talk to? A support group? If not, what are some of your coping mechanisms. Looking for ideas to implement at the start of my career
Deleted User 1/20/2022 3:32 AM
Keeping balance is key. What happens in the office must always stay there and people who have not seen and done the things you have, will never understand or be able to empathise. Which is understandable. If you do not have a hobby, find something you enjoy and send it. When struggling, talk to someone, either a colleague or professional. Congratulations on the new role 👍
Salute 1
Avatar
This is the best place I could think of to ask this: Is it illegal in the EU to download publicly available database dumps of breaches? rockyou.txt came out of such a dump and every offsec person has this file on their pc. Anyone knows the legislation here?
Avatar
Avatar
Skusku
This is the best place I could think of to ask this: Is it illegal in the EU to download publicly available database dumps of breaches? rockyou.txt came out of such a dump and every offsec person has this file on their pc. Anyone knows the legislation here?
Andrew Rathbun 1/20/2022 10:30 AM
If it's illegal anywhere, that's a perfect example of law in the books vs law in practice. Are prosecutors really going to charge millions of people at this point with possession of something that's illegal? Kinda like MP3 and Movie Piracy. They try to cut the head off the snake. I'm guessing since rockyou.txt is being hosted so freely around the web and it's not like whack a mole to find a site that's hosting it this very minute, it's likely not illegal. Not a lawyer, not in the EU, but just my personal opinion on the matter, for what it's worth 😛
👍 1
Avatar
Thanks, yes that sounds reasonable, just looking for some opinions of people who are close to this topic 🙂
Avatar
not sure, but your question reminds me of this fun github convo
Avatar
Avatar
Skusku
This is the best place I could think of to ask this: Is it illegal in the EU to download publicly available database dumps of breaches? rockyou.txt came out of such a dump and every offsec person has this file on their pc. Anyone knows the legislation here?
Digitalferret 1/20/2022 11:21 AM
https://www.al.com/news/2015/08/is_it_illegal_to_download_the.html In other words, the legal community is split on the issue of whether someone could be charged and convicted of crimes for downloading illegally obtained files such as those contained in the Ashley Madison data dump could be charged and convicted of crimes. Proceed at your own risk. not EU but both sides of the argument, and pretty solid. consensus: don't put yourself in the position of a test case. EU/UK folks have been had for another publicly available bit of kit - an4rchists c00kbook. (edited)
👍 1
Avatar
Looking to upgrade some writeblocker hardware, anyone have favorites? Most I've seen are still operating over USB 3.0 speed wise
Avatar
Avatar
rayeh
not sure, but your question reminds me of this fun github convo
I think they also asked to rename the streisand-effect to dolphins-effect
😆 1
Avatar
Avatar
stark4n6
Looking to upgrade some writeblocker hardware, anyone have favorites? Most I've seen are still operating over USB 3.0 speed wise
Digitalferret 1/20/2022 12:24 PM
depends on how much you want to spend but have you considered imaging hardware such as Deepspar and associated addons? not cheap tho it also covers drive instability, bad sectors and so on
Avatar
Avatar
Digitalferret
depends on how much you want to spend but have you considered imaging hardware such as Deepspar and associated addons? not cheap tho it also covers drive instability, bad sectors and so on
Like Guardonix?
Avatar
Avatar
Digitalferret
depends on how much you want to spend but have you considered imaging hardware such as Deepspar and associated addons? not cheap tho it also covers drive instability, bad sectors and so on
Honestly we have some spend to use to looking for probably something like Tableau's, Weibetech, etc. something that can handle multiple input types (SATA/NVME/IDE) mostly
Avatar
Avatar
stark4n6
Honestly we have some spend to use to looking for probably something like Tableau's, Weibetech, etc. something that can handle multiple input types (SATA/NVME/IDE) mostly
Digitalferret 1/20/2022 4:01 PM
i was thinking the full shmoo, like DDi4 - SATA/native connections
Avatar
Digitalferret 1/20/2022 4:10 PM
but the rest of the kit options inc usb stabilizer / Guardonix you can tailor features v expenditure and so on, too (edited)
Avatar
IAwardYouNoPoints 1/21/2022 4:19 AM
Hi all, I'm looking for links/sites that "index" forensic/IR tools and resources. We all have methods for tracking the insane amount of information out there, and a while back, I saw a post (Twitter, I think) during a SANS community event that included a nice spreadsheet of resources. Looking back, it looks like I failed to bookmark it, but it came to mind this morning. A couple of examples of what I'm rambling about are: https://start.me/p/q6mw4Q/forensics and https://docs.google.com/spreadsheets/d/18rtqh8EG2q1xBo2cLNyhIDuK9jrPGwYr9DI2UncoqJQ/edit#gid=930747607
Avatar
Avatar
IAwardYouNoPoints
Hi all, I'm looking for links/sites that "index" forensic/IR tools and resources. We all have methods for tracking the insane amount of information out there, and a while back, I saw a post (Twitter, I think) during a SANS community event that included a nice spreadsheet of resources. Looking back, it looks like I failed to bookmark it, but it came to mind this morning. A couple of examples of what I'm rambling about are: https://start.me/p/q6mw4Q/forensics and https://docs.google.com/spreadsheets/d/18rtqh8EG2q1xBo2cLNyhIDuK9jrPGwYr9DI2UncoqJQ/edit#gid=930747607
Andrew Rathbun 1/21/2022 6:39 AM
@DFIRDetective is the one who put those together!
Avatar
Avatar
IAwardYouNoPoints
Hi all, I'm looking for links/sites that "index" forensic/IR tools and resources. We all have methods for tracking the insane amount of information out there, and a while back, I saw a post (Twitter, I think) during a SANS community event that included a nice spreadsheet of resources. Looking back, it looks like I failed to bookmark it, but it came to mind this morning. A couple of examples of what I'm rambling about are: https://start.me/p/q6mw4Q/forensics and https://docs.google.com/spreadsheets/d/18rtqh8EG2q1xBo2cLNyhIDuK9jrPGwYr9DI2UncoqJQ/edit#gid=930747607
DFIRDetective 1/21/2022 6:41 AM
Yep that was probably me! https://linktr.ee/dfirdetective should take you to all the SANS summit links I had saved from 2021 and I plan to do it for 2022 when I can as well! (edited)
Andrew Rathbun pinned a message to this channel. 1/21/2022 6:43 AM
Avatar
Avatar
rayeh
not sure, but your question reminds me of this fun github convo
This absolute gold
Avatar
bmitchell194 1/21/2022 9:56 AM
I am looking for any information on NIST standards relating to cell site coverage areas. Anyone have any links for documents they can pass on?
Avatar
Avatar
forensicmike @Magnet
agree with both @randomaccess and @Andrew Rathbun , as far as I know (not an engineer) AXIOM only uses GPU directly for AI purposes as mentioned, and perhaps indirectly by some dependencies. if your goal is to optimize for AXIOM processing, you are generally better speccing more/faster RAM + more/faster CPU cores.
Can you say how AXIOM uses the AI with a GPU and what would be the best configuration for performance throughput ?
Avatar
Avatar
Rese4rch_4D
Both good platforms. It depends what you’re after. If you want more blue team BTLO is good. But if you after more of a broad selection THM is good.
Can you help with translation of "BLTO" & / or "THM" ..
Avatar
Avatar
DCSO
?? TCL A509DL MTK 6765 file based Android 11 - Patched October 2021 I tried MTK Live and filesystem MTK nothing 😦 Thoughts ?
Any luck with getting ffs on this device?
Avatar
Avatar
Harvey
Can you help with translation of "BLTO" & / or "THM" ..
Rese4rch_4D 1/21/2022 10:58 AM
BTLO is Blue Team Labs online and THM - is TryHackMe.
Avatar
Avatar
Rese4rch_4D
BTLO is Blue Team Labs online and THM - is TryHackMe.
Thanks for this explanation. We can get into our own use of abbreviations ..
Avatar
Avatar
Digitalferret
i was thinking the full shmoo, like DDi4 - SATA/native connections
I haven't heard of this device, but I do believe that we need to maintain the ability to connect to even old Tech due to the habit of Corp to create a system and as long as it keeps working, they do not replace it. So it could be 10 or more years old. So if you have older device that work keep them and make them available when called upon.
Avatar
Avatar
stark4n6
Honestly we have some spend to use to looking for probably something like Tableau's, Weibetech, etc. something that can handle multiple input types (SATA/NVME/IDE) mostly
Which Vendor should be considered for these types of devices, May I ask ?
Avatar
Avatar
forensicmike @Magnet
agree with both @randomaccess and @Andrew Rathbun , as far as I know (not an engineer) AXIOM only uses GPU directly for AI purposes as mentioned, and perhaps indirectly by some dependencies. if your goal is to optimize for AXIOM processing, you are generally better speccing more/faster RAM + more/faster CPU cores.
Is there any other DFIR Software that seems to be designed in this manner ?
11:39 AM
I leave now but will return much later ...
Avatar
Avatar
Digitalferret
https://www.al.com/news/2015/08/is_it_illegal_to_download_the.html In other words, the legal community is split on the issue of whether someone could be charged and convicted of crimes for downloading illegally obtained files such as those contained in the Ashley Madison data dump could be charged and convicted of crimes. Proceed at your own risk. not EU but both sides of the argument, and pretty solid. consensus: don't put yourself in the position of a test case. EU/UK folks have been had for another publicly available bit of kit - an4rchists c00kbook. (edited)
So that would apply to password sites like Dehashed etc., right?
2:41 PM
Or having the large password database comb21 or similar
Avatar
Avatar
whee30
So that would apply to password sites like Dehashed etc., right?
Digitalferret 1/21/2022 3:51 PM
i think with all similar things, it depends if someone makes a nuisance of themselves / attracts attention or if an establishment wants to make an example of someone. a lot of illegal activity is "blind eyed" bc it's simply not worth the expense of chasing what are effectively ghosts. password lists on their own is a different thing say, to releasing them with the associated logins, cc details, addresses and more. downloading those and storing might be akin to the police catching someone "going equipped".
3:55 PM
its similar to the old "is a Brick an offensive weapon" scenario. it depends on the circumstance. in the hand of a youth in a nightclub, well yeah. if it's in the hands of a builder on site, then no. Semi amusingly, on a TV police show, some dude is caught walking down the highstreet (UK) with a chainsaw, albeit in its bright orange blade cover. "come with us sonny" "but officer, I'm doing nothing wrong..." and the so long day dragged on 🙂
Avatar
Avatar
Harvey
I haven't heard of this device, but I do believe that we need to maintain the ability to connect to even old Tech due to the habit of Corp to create a system and as long as it keeps working, they do not replace it. So it could be 10 or more years old. So if you have older device that work keep them and make them available when called upon.
Digitalferret 1/21/2022 4:00 PM
indeed. i still have SCSI / 3½ 1.44MB floppy drives, iOmega Zips, not sure if i have a 5¼ 360k, etc (edited)
Avatar
Avatar
Harvey
I haven't heard of this device, but I do believe that we need to maintain the ability to connect to even old Tech due to the habit of Corp to create a system and as long as it keeps working, they do not replace it. So it could be 10 or more years old. So if you have older device that work keep them and make them available when called upon.
Digitalferret 1/21/2022 4:02 PM
the main use for Deepspar kit is to image unstable / bad sector HDDs and more recently drives with USB interface, and now to keep Windows from crashing on SSDs that are flaky by acting as a man in the middle device
Avatar
xxSuccessful- 1/21/2022 7:40 PM
Hey all, quick question. I am taking a course on Apple Forensics, and there are some practical questions involved. My question is, is it shady to document what some of the artifacts show on a blog post which I will later be linked to my Linkedin account? I will mention that I am taking a course (more than likely not by name). Does anyone have any opinions on this?
Avatar
xxSuccessful- 1/21/2022 7:50 PM
Just to add to my previous post, I am doing this as an attempt to become a better writer and to showcase my passion for Digital Forensics.
Avatar
Avatar
xxSuccessful-
Hey all, quick question. I am taking a course on Apple Forensics, and there are some practical questions involved. My question is, is it shady to document what some of the artifacts show on a blog post which I will later be linked to my Linkedin account? I will mention that I am taking a course (more than likely not by name). Does anyone have any opinions on this?
Andrew Rathbun 1/21/2022 7:51 PM
Are you allowed to reproduce the content in that course? Don't do anything that goes against any agreement you signed by taking the course.
Avatar
Avatar
Andrew Rathbun
Are you allowed to reproduce the content in that course? Don't do anything that goes against any agreement you signed by taking the course.
xxSuccessful- 1/21/2022 7:55 PM
That is a good point, I'll review the agreement and move from there. Thanks for the feedback!
👍 1
Avatar
Avatar
xxSuccessful-
Hey all, quick question. I am taking a course on Apple Forensics, and there are some practical questions involved. My question is, is it shady to document what some of the artifacts show on a blog post which I will later be linked to my Linkedin account? I will mention that I am taking a course (more than likely not by name). Does anyone have any opinions on this?
randomaccess 1/21/2022 11:21 PM
Generally the answer is "yes demonstrate what you've learned, but don't share the data that would 'ruin' the class for someone else" For example in the sans 500 class we do an investigation throughout the week. If you shared some of the findings that would make it a lesser experience for someone if they hadn't read your post
11:22 PM
What I generally say is recreate the artifacts, which is an even better way of demonstrating your understanding on top of your communication skills
11:22 PM
"not only can I explain this artifact, look if I push this button this happens"
Avatar
Avatar
DFIRDetective
Yep that was probably me! https://linktr.ee/dfirdetective should take you to all the SANS summit links I had saved from 2021 and I plan to do it for 2022 when I can as well! (edited)
IAwardYouNoPoints 1/22/2022 12:59 PM
Very nice and many thanks!
Avatar
Avatar
randomaccess
Generally the answer is "yes demonstrate what you've learned, but don't share the data that would 'ruin' the class for someone else" For example in the sans 500 class we do an investigation throughout the week. If you shared some of the findings that would make it a lesser experience for someone if they hadn't read your post
xxSuccessful- 1/22/2022 2:27 PM
Thank you for this. I will follow this format.
Avatar
Avatar
xxSuccessful-
Thank you for this. I will follow this format.
randomaccess 1/22/2022 4:33 PM
Send me your blog post when it's written so I can include it in the weekly
Avatar
Avatar
randomaccess
Send me your blog post when it's written so I can include it in the weekly
xxSuccessful- 1/22/2022 5:20 PM
Thank you, I will!
Avatar
What do y'all use for tracking of physical evidence, drives and such?
Avatar
randomaccess 1/22/2022 8:48 PM
there's a lot of different systems but it depends on your use case ranging from a simple spreadsheet to monolith/magnet atlas/cellebrites offering which i forget the name of/lima forensics and a bunch of others
8:50 PM
i like monolith because its fairly cheap per user and the dev is very responsive, we use it for the class that i wrote $dayjob we used to use atlas but it was turning out to be more expensive than we needed for a really big team - but if you had a req to track a lot more than just evidence it was very fully featured
Avatar
We just do spreadsheets but I'm kind of considering pushing for software or something we can self host ourselces
5:03 PM
It's just evidence but I feel like there's a more "proper" way idk
5:05 PM
Trial by fire baybeeeee 🙃
Avatar
randomaccess 1/23/2022 5:11 PM
ask matt at monolith for a trial of his tool
Avatar
If anyone is interested in learning about A/I / Leap (and others), @Brigs is on Life Has No Ctrl Alt Del today at 1230EST.
👍 2
Avatar
Artemisia (They / Them) 1/24/2022 6:45 AM
Hey all 😀 Is anyone else unable to locate the "OR" filter in XAMN v7.0.0? @MSAB
Avatar
@Artemisia (They / Them) Unfortunately the filter had to be removed last minute due to it causing some instability in XAMN when used together with some of the new features in XAMN 7.0. I am happy to discuss this further with you in direct messages in case this feature is sorely missed and take that back to development (edited)
Avatar
New Year, New Us! AccessData is changing our name to ExterroFTK!
🤯 2
👀 2
👍 1
Avatar
Trashboat667 1/24/2022 9:53 AM
Anybody ever do and/or have a Google Keywords search warrant?
Avatar
@Trashboat667 from my understanding Google would not comply with that as its to broad.
Avatar
Avatar
DCSO
@Trashboat667 from my understanding Google would not comply with that as its to broad.
Trashboat667 1/24/2022 3:25 PM
That’s what I’m afraid of. I attended a webinar recently where one presenter was talking about them and he made it sound like he’s had returns on them.
Avatar
Avatar
randomaccess
i like monolith because its fairly cheap per user and the dev is very responsive, we use it for the class that i wrote $dayjob we used to use atlas but it was turning out to be more expensive than we needed for a really big team - but if you had a req to track a lot more than just evidence it was very fully featured
Plus one to Monolith, our firm uses it and it’s excellent
Avatar
skinnyfrenchman 1/24/2022 7:28 PM
Anyone have any idea of the cost for Magnet User Summit this year? Need to request funding soon.
Avatar
TyphoidMeredith/Case 1/24/2022 11:18 PM
Hi y’all! Question:
11:18 PM
Could not load the Qt platform plugin "xcb" in "" even though it was found. This application failed to start because no Qt platform plugin could be initialized. Reinstalling the application may fix this problem. Available platform plugins are: eglfs, linuxfb, minimal, minimalegl, offscreen, vnc, xcb. Aborted (core dumped) i am facing this type of error
11:19 PM
Reinstalled and all, any suggests? On how to fix the installation?
Avatar
Deleted User 1/24/2022 11:31 PM
Is QT_PLUGIN_PATH pointing to the correct path in your environment variables?
Avatar
TyphoidMeredith/Case 1/24/2022 11:37 PM
I’m not certain of the answer I’m helping someone out with this and I know here is the place to ask
11:37 PM
If the path is wrong, fix that and off to the races?
11:37 PM
@Deleted User thank you for helping, btw
Avatar
Deleted User 1/24/2022 11:38 PM
If it's a Linux machine, try running export QT_PLUGIN_PATH=/usr/lib/qt/plugins first
Avatar
TyphoidMeredith/Case 1/24/2022 11:39 PM
Alright
11:41 PM
Attempted, no improvement
11:41 PM
Path is set pointing correctly
11:43 PM
Is it due to a broken install or anything?
Avatar
Deleted User 1/24/2022 11:43 PM
Is the plugin actually in that directory?
Avatar
TyphoidMeredith/Case 1/24/2022 11:43 PM
Allegedly so
Avatar
Deleted User 1/24/2022 11:44 PM
Are you able to list the contents of the directory to confirm?
Avatar
TyphoidMeredith/Case 1/24/2022 11:44 PM
Sec
11:46 PM
I received this in response: robon@ubuntu:~$ env | grep QT QT_ACCESSIBILITY=1 QT_IM_MODULE=ibus QT_PLUGIN_PATH=/usr/lib/qt/plugins
11:46 PM
Not sure if that is even helpful
Avatar
Deleted User 1/24/2022 11:47 PM
The error is saying it's unable to locate the plugin so you're going to have to locate it direct it there using that environment variable
💜 1
11:49 PM
I wrote application for linux which uses Qt5. But when I am trying to launch it on the linux without Qt SDK installed, the output in console is: Failed to load platform plugin "xcb". Available
spiffyheart 1
Avatar
TyphoidMeredith/Case 1/25/2022 12:00 AM
Thank you @Deleted User problem is now solved
12:00 AM
Somehow there were dependencies missing
12:01 AM
Dependencies installed, no issues
12:01 AM
Done deal
Avatar
Deleted User 1/25/2022 12:07 AM
Awesome. Good to hear.
Avatar
TyphoidMeredith/Case 1/25/2022 12:39 AM
I’m not sure, wouldn’t you really perforce have to go the route of a handheld or whatever OCR, one that doesn’t need to talk to the Internet?
Avatar
Doofenshmirtz 1/25/2022 5:23 AM
I've a question, just asking, can we copy/extract files of specific path ( files in system32) in the image using linux commands?
Avatar
Do you mean in an ewfmounted image? In that case, yes.
Avatar
Avatar
Ghosted
Any luck with getting ffs on this device?
No I could only get an Advanced Logical 🤷‍♂️
👍 1
Avatar
Avatar
DCSO
No I could only get an Advanced Logical 🤷‍♂️
Digitalferret 1/25/2022 7:53 AM
quite a few of my devices get ffs'd .... uuuh, wait up
Avatar
Avatar
Doofenshmirtz
I've a question, just asking, can we copy/extract files of specific path ( files in system32) in the image using linux commands?
You can simply mount the image and copy the directory out, quick and dirty. If you're looking for a command line way, something like "sorter" from the Sleuthkit is a bit more "forensicky" to extract the contents of a specific directory.
Avatar
Ok guys so here is a good one for you, anyone know if iOS logs any relevant data when it sees an air tags. I've got a concerned individual that thinks she is being stalked because she is getting the notificaion on her phone that "Your current location can be seen by the owner of this item." We've been unable to locate an airtag on her and she doesn't own any. Secondly, does this only happen with airtags or do other bluetooth le devices cause it.
Avatar
@Chris Chris this can occur with other Apple Devices, its a flaw if you ask me. We had the same issue and I determined it was Apple Airpod Pro that was bluetoothing to the "victims" device. It would mention that a "unidentified accessory" can view your location. https://nerdschalk.com/unknown-accessory-detected-message-alert/
Apple has revamped a lot of features with the release of iOS 15 and one of them has been a major overhaul to the Find my app. The app can now track your AirTags, notify you about lost items and eve…
1:00 PM
Look at # 6
Avatar
Interesting, I'll have the investigator check with her on this
Avatar
thatboy_leo 1/25/2022 1:14 PM
Is there any analysis I can do on a signature on a pdf that wasn’t digitally signed? Aside from looking at the metadata and hash of a file I can’t imagine what else I could do
Avatar
Avatar
Chris
Ok guys so here is a good one for you, anyone know if iOS logs any relevant data when it sees an air tags. I've got a concerned individual that thinks she is being stalked because she is getting the notificaion on her phone that "Your current location can be seen by the owner of this item." We've been unable to locate an airtag on her and she doesn't own any. Secondly, does this only happen with airtags or do other bluetooth le devices cause it.
Ross Donnelly 1/25/2022 1:50 PM
A brief look at AirTag artifacts within an iOS Filesystem
👍 3
❤️ 1
Avatar
@Cellebrite Android Full File System extraction with the latest 7.52 is take over 3+ hours and has not completed it appears to be 1/4 of the way done and its only 30 gigs. Anybody else have issues with this latest release ?
Avatar
Avatar
DCSO
@Cellebrite Android Full File System extraction with the latest 7.52 is take over 3+ hours and has not completed it appears to be 1/4 of the way done and its only 30 gigs. Anybody else have issues with this latest release ?
Not sure which phone you're dealing with, but it always took a long time, at least for Samsung devices
Avatar
Avatar
DCSO
@Cellebrite Android Full File System extraction with the latest 7.52 is take over 3+ hours and has not completed it appears to be 1/4 of the way done and its only 30 gigs. Anybody else have issues with this latest release ?
How big is the extraction. ? Is the phone fully loaded ?
Avatar
How-to find which App on an Android 11 Samsung phone has given-up recent information between two (2) friends during a conversation ? What happened, my friend was talking to a friend about his need for an Uninterruptible Power Supply (UPS) for his PC. When they disconnected, his friend received a Pop-up message suggesting a product and saying that it was coming from my Friend, who had just disconnected from his friend and the conversation. Is there any known possible cause of this type of Pop-up and/or is there a suggested tool to help locate this Pop-up ? ?
Avatar
@Magnet Forensics Anyone from Magnet able to reach out and discuss use cases and which version would best fit those?
Avatar
Avatar
Murst
@Magnet Forensics Anyone from Magnet able to reach out and discuss use cases and which version would best fit those?
Mel_Hungate 1/26/2022 5:39 AM
If you shoot me a message with: 1. your contact details (name, email, phone #) 2. where you're located and 3. which agency / org you belong to I can pass that along to the right person at Magnet to have a chat with you about your use cases!
Avatar
Avatar
Mel_Hungate
If you shoot me a message with: 1. your contact details (name, email, phone #) 2. where you're located and 3. which agency / org you belong to I can pass that along to the right person at Magnet to have a chat with you about your use cases!
Thank you!
Avatar
Good morning. I have a photoDNA question and I'm not sure where else to post it. I have an "Original Binary Hash of File (PhotoDNA)" that I received in a NCMEC file. It is all numbers (224,0,21,3,75,24,12,17,8,50,5,57,12.....etc.) not binary 1s and 0s. After processing all seized devices with Axiom all the image PhotoDNA hashes are a combination of letters and number (Jk0YYB00EjAajx2PqUIfvVUlIGIYwRg...etc.). Is there some sort of conversion that can be done on either hash so I can find a match? Thanks in advance.
Avatar
Avatar
CLB-Paul
How big is the extraction. ? Is the phone fully loaded ?
It was a FFS GK 32 Gb Samsung took over 8 hrs to decode. We've never had it take this long, I'll try the extraction with a lower version of UFED PA and see if its quicker and decodes the same amount.
Avatar
Avatar
DCSO
It was a FFS GK 32 Gb Samsung took over 8 hrs to decode. We've never had it take this long, I'll try the extraction with a lower version of UFED PA and see if its quicker and decodes the same amount.
Not overly big. Can you shoot me logs via dm if possible
Avatar
https://twitter.com/rj_chap/status/1486385327702904835 I'm not 100% sure if posting your own Tweet is SUPER lame, or just kinda lame. But here we are :).
Want to learn more about the #Log4j #vulnerability in @vmwarehorizon? My awesome co-workers at @BlackBerry have put together a great article! Check out "Log4U, Shell4Me" by Codi Starks, Will Ikard, and Ryan Gibson. https://t.co/jC8X3eohoQ #Log4Shell #vulnerabilities #DFIR
9:19 AM
Drop a link and bounce mode, ACTIVATED!
😂 2
Avatar
Hi, so I took up a forensics class this sem in my college and I am trying setup a lab env for myself. The course requires me to use Autopsy and FTK Imager. I was thinking of setting up a VM in cloud and wanted some suggestions. I had a look at azure and I do have some student credits there, but is there any better option to setup a cloud instance which is cheap? (edited)
Avatar
Avatar
ArcherL
Hi, so I took up a forensics class this sem in my college and I am trying setup a lab env for myself. The course requires me to use Autopsy and FTK Imager. I was thinking of setting up a VM in cloud and wanted some suggestions. I had a look at azure and I do have some student credits there, but is there any better option to setup a cloud instance which is cheap? (edited)
DeeFIR 🇦🇺 1/26/2022 2:34 PM
Azure/AWS if you can use your student credits. Are you looking at Linux or Windows? If you're just looking at an isolated environment for something non-malicious such as testing tools on specific datasets (and not performing malware analysis/RE etc) then I'd just setup a virtual machine on your host using virtualbox/vsphere etc.
Avatar
I am looking for a windows machine, to run autopsy. The course has case studies which after unzipping expand upto 60GB.
2:53 PM
so running a 2 day analysis on the virtual machine would be very resource intensive, and I have other classes as well lol, so I was thinking of a cloud based option
Avatar
Avatar
ArcherL
Hi, so I took up a forensics class this sem in my college and I am trying setup a lab env for myself. The course requires me to use Autopsy and FTK Imager. I was thinking of setting up a VM in cloud and wanted some suggestions. I had a look at azure and I do have some student credits there, but is there any better option to setup a cloud instance which is cheap? (edited)
randomaccess 1/26/2022 3:00 PM
depending on what youve got on your host microsoft provides free VMs for browser testing
3:01 PM
cloud is fine, just may cost i think i processed a full axiom case on a windows vm on a 5 year old computer overnight, so i wouldnt worry about performance too mcuh. that image was about 60gb as well
👍 1
Avatar
Thanks @DeeFIR 🇦🇺 and @randomaccess for the help! Much appreciated : )
Avatar
Carb0hydrates 1/26/2022 3:33 PM
Hey everyone, new to the Discord, so if there is a better place to post this, please let me know! Does anyone have experience collecting from updox.com? I have a client asking me about this, but I can't imagine that it will be easy given that it's a telehealth/medical information handling site.
Avatar
@Magnet Forensics Anyone from Magnet for a quick question please?
Avatar
Chirag Garg 1/27/2022 12:11 AM
Hello, Can anyone suggest Or share me some resources for cyber forensics
Avatar
Avatar
Chirag Garg
Hello, Can anyone suggest Or share me some resources for cyber forensics
You looking for books? courses? ctfs?
Avatar
Avatar
ryd3v
You looking for books? courses? ctfs?
Chirag Garg 1/27/2022 1:10 AM
Books and Courses
Avatar
I'd probably look at INE and Packt to begin https://ine.com https://www.packtpub.com
INE is the premier provider of online IT training and certifications, focused on providing world class instruction with hands-on labs. Focusing on Networking, Cyber Security and Cloud, our 100's of courses feature 1000's of in-browser labs, designed to immediately challenge you to prove your knowledge. Our certifications in Cyber Security and Cl...
Packt is the online library and learning platform for professional developers. Learn Python, JavaScript, Angular and more with eBooks, videos and courses
Avatar
Okay, I have a question that has probably been asked but I'm looking for a definitive answer. I've always done lab based DF in law enforcement, more recently the private sector. I'm getting lots of recruiters approaching me for DFIR jobs. What are the skills I will need for DFIR that I'm not using in lab based forensics?
Avatar
Avatar
Majeeko
Okay, I have a question that has probably been asked but I'm looking for a definitive answer. I've always done lab based DF in law enforcement, more recently the private sector. I'm getting lots of recruiters approaching me for DFIR jobs. What are the skills I will need for DFIR that I'm not using in lab based forensics?
Digitalferret 1/27/2022 3:35 AM
maybe echo that in #training-education-employment too
👍 1
Avatar
Avatar
v3N0m
@Magnet Forensics Anyone from Magnet for a quick question please?
I am in the US so just got in but yes I am here feel free to email me at jamey.tubbs@magnetforensics.com or DM me here
Avatar
Avatar
rj_chap
https://twitter.com/rj_chap/status/1486385327702904835 I'm not 100% sure if posting your own Tweet is SUPER lame, or just kinda lame. But here we are :).
forensicmike @Magnet 1/27/2022 6:08 AM
I think the potential for lameness depends greatly on the who and the what. In this case I think it's perfectly hip 😎
WatchingYou 1
catjam 1
💯 1
👍 1
Avatar
Avatar
ryd3v
You looking for books? courses? ctfs?
Humble Bundle has a 27-ebook cyber bundle for $18 right now. Some of the stuff is a bit older, but still relevant.
💯 1
Avatar
Yeah! Humble bundle is dope, I've really expanded my personal collection from there
Avatar
Avatar
Chirag Garg
Hello, Can anyone suggest Or share me some resources for cyber forensics
TheArchbish0p 1/27/2022 12:57 PM
Harlan Carvey’s books are fantastic in terms of Windows forensics
12:57 PM
Follow Harlan A. Carvey and explore their bibliography from Amazon.com's Harlan A. Carvey Author Page.
Avatar
@Chirag Garg Brians book is also good. It helped me sleep at night preparing for IACIS cert 🙂 https://www.amazon.com/Brian-Carrier/e/B001KDJ2KK?ref=dbs_a_def_rwt_sims_vu00_r0_c0
Follow Brian Carrier and explore their bibliography from Amazon.com's Brian Carrier Author Page.
👍🏻 1
Avatar
Avatar
DCSO
@Chirag Garg Brians book is also good. It helped me sleep at night preparing for IACIS cert 🙂 https://www.amazon.com/Brian-Carrier/e/B001KDJ2KK?ref=dbs_a_def_rwt_sims_vu00_r0_c0
randomaccess 1/27/2022 2:33 PM
File system forensic analysis was instrumental in passing cfce
Avatar
Avatar
Chirag Garg
Books and Courses
There is a big 'o list of books here too ->https://6ixcode.com/books
Avatar
@Cellebrite @Oxygen Forensics Good morning, I have an iphone XR (A2105) with ios 13.2.3 with known passcode and known encryption backup password. The iOS backup ectracts all chat applications except facebook messenger (it extracts only contacts). Is it due to the fb programmer that fb messenger backup is not included in ios backup? I tried acquisition with Oxygen, UFED, XRY as well as decoding with Axiom, but still database is not retrieved.
Avatar
Avatar
DCSO
It was a FFS GK 32 Gb Samsung took over 8 hrs to decode. We've never had it take this long, I'll try the extraction with a lower version of UFED PA and see if its quicker and decodes the same amount.
We're seeing similar performance issues with Android extractions in PA 7.52
👍 1
Avatar
Avatar
Flipz4n6
@Cellebrite @Oxygen Forensics Good morning, I have an iphone XR (A2105) with ios 13.2.3 with known passcode and known encryption backup password. The iOS backup ectracts all chat applications except facebook messenger (it extracts only contacts). Is it due to the fb programmer that fb messenger backup is not included in ios backup? I tried acquisition with Oxygen, UFED, XRY as well as decoding with Axiom, but still database is not retrieved.
Facebook Messenger on iOS is one of those apps which has gone in and out of the iTunes backup unfortunately, do you know what version of Messenger was installed and what version of XRY was used?
Avatar
Avatar
Erumaro
Facebook Messenger on iOS is one of those apps which has gone in and out of the iTunes backup unfortunately, do you know what version of Messenger was installed and what version of XRY was used?
Thanx Tobias for the response. App version is 244.0.0.41.220 and XRY version is 10
Avatar
Avatar
Flipz4n6
Thanx Tobias for the response. App version is 244.0.0.41.220 and XRY version is 10
We do not have support for that version specifically but we do have support for 243.2 and 261.1 which both are unfortunately only possible to extract/decode from jailbroken or full file system extractions of some kind.
Avatar
Avatar
Flipz4n6
@Cellebrite @Oxygen Forensics Good morning, I have an iphone XR (A2105) with ios 13.2.3 with known passcode and known encryption backup password. The iOS backup ectracts all chat applications except facebook messenger (it extracts only contacts). Is it due to the fb programmer that fb messenger backup is not included in ios backup? I tried acquisition with Oxygen, UFED, XRY as well as decoding with Axiom, but still database is not retrieved.
Oxygen Forensics 1/28/2022 2:22 AM
FB Messenger presence in iTunes backup depends strongly on its version. For example I had extracted an iTunes backup with Facebook Messenger of version 282.0 and got Cache, Accounts, Contacts, Group chats info, Chats, Calls. But some other may not get it. Most likely you need a jailbroken device or device on which it is possible to perform a checkm8 on to extract the Facebook Messenger data of version 244.0
Avatar
Anyone from @Cellebrite for a question please?
Avatar
Avatar
TheArchbish0p
Harlan Carvey’s books are fantastic in terms of Windows forensics
Deleted User 1/28/2022 7:46 AM
I'm new to the group. I used to work with Harlan when he was at SecureWorks...was always super helpful
Avatar
Avatar
Flipz4n6
@Cellebrite @Oxygen Forensics Good morning, I have an iphone XR (A2105) with ios 13.2.3 with known passcode and known encryption backup password. The iOS backup ectracts all chat applications except facebook messenger (it extracts only contacts). Is it due to the fb programmer that fb messenger backup is not included in ios backup? I tried acquisition with Oxygen, UFED, XRY as well as decoding with Axiom, but still database is not retrieved.
burgers_N_bytes 1/28/2022 7:48 AM
@Elcomsoft iOS Forensic Toolkit supports a full file system extraction for this device if I’m not mistaken.
Avatar
Avatar
Flipz4n6
@Cellebrite @Oxygen Forensics Good morning, I have an iphone XR (A2105) with ios 13.2.3 with known passcode and known encryption backup password. The iOS backup ectracts all chat applications except facebook messenger (it extracts only contacts). Is it due to the fb programmer that fb messenger backup is not included in ios backup? I tried acquisition with Oxygen, UFED, XRY as well as decoding with Axiom, but still database is not retrieved.
Have you attempted a FFS from those tools you mentioned with "checkrain" exploit ? I believe it's within the specs.
Avatar
Avatar
pinball
Anyone from @Cellebrite for a question please?
Hey. It’s been a busy day. Can I help ?
Avatar
@CLB-Paul busy day also in front of the Parlement ? 😂
Avatar
Avatar
SPVQct3207
@CLB-Paul busy day also in front of the Parlement ? 😂
Ha I had to dip before blocked in by the trucks
6:26 PM
Our CAS lab is right downtown sooo ….
Avatar
@CLB-Paul Yeah I know the area....Be patient I think they will be there more then saturday 🤛 (edited)
Avatar
#closedforweekend
👍 1
6:30 PM
Même les Québec flag
🤣 1
Avatar
burgers_N_bytes 1/29/2022 6:51 AM
Has anyone tested Windows 11 ARM Insider Preview on a M1 Mac yet? Specifically if the emulation is working for common forensic software.
6:51 AM
I don’t want to be the first guinea pig haha
Avatar
yep Edit; *Works fine (edited)
Avatar
Andrew Rathbun 1/29/2022 11:32 AM
There may be some spam messages going around in private messages. Please don't click those links!
Avatar
Got one, didn't click.. It says something like "this gift is for you bro"
👍 2
Avatar
Sorry about that, still trying to figure out what happened
Avatar
Avatar
Flipz4n6
@Cellebrite @Oxygen Forensics Good morning, I have an iphone XR (A2105) with ios 13.2.3 with known passcode and known encryption backup password. The iOS backup ectracts all chat applications except facebook messenger (it extracts only contacts). Is it due to the fb programmer that fb messenger backup is not included in ios backup? I tried acquisition with Oxygen, UFED, XRY as well as decoding with Axiom, but still database is not retrieved.
skysafe-josh 1/30/2022 3:08 PM
Try an APK downgrade extraction in Oxygen!
Avatar
Avatar
skysafe-josh
Try an APK downgrade extraction in Oxygen!
DeeFIR 🇦🇺 1/30/2022 4:08 PM
For an iOS device.. what kind of wizardry is this?
🤣 2
android2 1
Avatar
skysafe-josh 1/30/2022 4:10 PM
Ah the devils in the deets, I got Android on the brain. This don’t work for IOS devices. I started reading the post and got focused on app version numbers and the APK downgrade rushed to the front of my brain! Hah (edited)
Avatar
Doofenshmirtz 1/30/2022 8:54 PM
if we verify md5 of e01 using ftk/autopsy, md5 value is different than md5 calculated using md5calculator.
Avatar
Avatar
Doofenshmirtz
if we verify md5 of e01 using ftk/autopsy, md5 value is different than md5 calculated using md5calculator.
Doofenshmirtz 1/30/2022 8:54 PM
why is that?
Avatar
Doofenshmirtz 1/30/2022 9:03 PM
also md5 of dd image of an USB drive ( created by ftk ) and verifying md5 of the whole usb drive ( again using ftk ) showing different values. any reason for this?
Avatar
Avatar
Doofenshmirtz
if we verify md5 of e01 using ftk/autopsy, md5 value is different than md5 calculated using md5calculator.
Is md5calculator only hashing the data blocks of the .e01 or is it hashing the whole .e01?
Avatar
Avatar
Doofenshmirtz
also md5 of dd image of an USB drive ( created by ftk ) and verifying md5 of the whole usb drive ( again using ftk ) showing different values. any reason for this?
Is the dd image of the entire USB including the MBR or is it only a dd image of the allocated clusters?
Avatar
Avatar
FullTang
Is md5calculator only hashing the data blocks of the .e01 or is it hashing the whole .e01?
Doofenshmirtz 1/30/2022 9:08 PM
the whole .e01
Avatar
Avatar
FullTang
Is the dd image of the entire USB including the MBR or is it only a dd image of the allocated clusters?
Doofenshmirtz 1/30/2022 9:09 PM
entire drive!!
Avatar
Avatar
Doofenshmirtz
the whole .e01
I am pretty sure that FTK/Autopsy only calculate the hash of the data blocks of the .E01, and compare that to the hash of the data blocks that is stored in the .E01. If you hash the entire .E01 (including the CRCs and the hash) you should get a different value than the hash that is only targeting the data blocks.
👍 2
Avatar
Avatar
FullTang
I am pretty sure that FTK/Autopsy only calculate the hash of the data blocks of the .E01, and compare that to the hash of the data blocks that is stored in the .E01. If you hash the entire .E01 (including the CRCs and the hash) you should get a different value than the hash that is only targeting the data blocks.
Doofenshmirtz 1/30/2022 9:12 PM
got it! thanks
👍 1
Avatar
speaking of FTK, does anyone know why FTK and/or Intel drives flip their serial numbers? The Intel drive I have has a printed serial number of(example) 123ABC but FTK prints out CBA321
Avatar
Avatar
dnguyen
speaking of FTK, does anyone know why FTK and/or Intel drives flip their serial numbers? The Intel drive I have has a printed serial number of(example) 123ABC but FTK prints out CBA321
Edit: It does not do that to all Intel drive. I have 2 Intel drive. One prints of the serial number flipped, one prints the serial number as it is printed on the drive label.
Avatar
Avatar
dnguyen
Edit: It does not do that to all Intel drive. I have 2 Intel drive. One prints of the serial number flipped, one prints the serial number as it is printed on the drive label.
It's an issue that's been known for a while: https://gessen-forensics.blogspot.com/2018/01/ftk-imager-issue.html https://www.linkedin.com/pulse/dont-use-access-data-ftk-imager-ananta-sansare/
Avatar
Avatar
AmNe5iA
It's an issue that's been known for a while: https://gessen-forensics.blogspot.com/2018/01/ftk-imager-issue.html https://www.linkedin.com/pulse/dont-use-access-data-ftk-imager-ananta-sansare/
Awesome. Thank you!
Avatar
@Law Enforcement [USA] Hello all, can anyone tell me how to execute a search warrant on Telegram? I can’t seem to find an email/portal or anything. It’s my understand that they’re outside the US as well, so any information would be helpful
Avatar
You check search.org yet?
Avatar
Avatar
C. Russell
@Law Enforcement [USA] Hello all, can anyone tell me how to execute a search warrant on Telegram? I can’t seem to find an email/portal or anything. It’s my understand that they’re outside the US as well, so any information would be helpful
It’s based out of the UAE. They won’t respond to US legal process.
Avatar
Yeah search.org had nothing. If they won’t respond is there any way to get that information?
1:06 PM
*without the device
Avatar
Avatar
C. Russell
@Law Enforcement [USA] Hello all, can anyone tell me how to execute a search warrant on Telegram? I can’t seem to find an email/portal or anything. It’s my understand that they’re outside the US as well, so any information would be helpful
My guess would be an MLAT, but never had to serve them yet.
this 3
Avatar
I guess you could try to Suss out an mlat but you might be out of luck
Avatar
yeaaah we all know that’s not likely 🤣 thanks everyone
Avatar
Avatar
C. Russell
@Law Enforcement [USA] Hello all, can anyone tell me how to execute a search warrant on Telegram? I can’t seem to find an email/portal or anything. It’s my understand that they’re outside the US as well, so any information would be helpful
sheepdog751 1/31/2022 1:09 PM
As far as I know Telegram is encrypted end to end so they would not have any useable data. From Telegram: Q: Do you process data requests? Secret chats use end-to-end encryption, thanks to which we don't have any data to disclose. To protect the data that is not covered by end-to-end encryption, Telegram uses a distributed infrastructure. Cloud chat data is stored in multiple data centers around the globe that are controlled by different legal entities spread across different jurisdictions. The relevant decryption keys are split into parts and are never kept in the same place as the data they protect. As a result, several court orders from different jurisdictions are required to force us to give up any data. Thanks to this structure, we can ensure that no single government or block of like-minded countries can intrude on people's privacy and freedom of expression. Telegram can be forced to give up data only if an issue is grave and universal enough to pass the scrutiny of several different legal systems around the world. To this day, we have disclosed 0 bytes of user data to third parties, including governments.
Avatar
Perfect, thank you for sharing!
Avatar
kmacdonald1565 1/31/2022 1:12 PM
So, this one has me/us a little stumped. our Cellebrite Physical Analyzer computer (yes, singular; its a Dell Precision 3620) is throwing an error while trying to decode exams. Seems to be happening to most last week, and all this week....windows generic error box (title: CellebritePhysicalAnalyzer.exe - Application Error) "The instruction at 0x771df127 referenced memory at 0xffffffff. The memory could not be read. Click on OK to terminate the program I have rebooted and tested, uninstalled, rebooted, reinstalled and tested to absolutely no avail. version 7.52.0.36, windows 7 (I know, I know). The system has plenty of free drive space. BIOS basic diagnostic test came up okay, extensive memtest is going on now. I tested on a separate computer (windows 10, but with less ram than the 3620) I just threw PA on and it seems to open. Any advice on how to proceed?
Avatar
Have you tried rolling it back a version to see if it’s the new update?
Avatar
kmacdonald1565 1/31/2022 1:18 PM
it started on the one previous we had installed. 7.49 i believe. it started, tried the update, didnt fix.
1:18 PM
we havent tried rolling it older
1:19 PM
I have to also test to see if this happens with all exam types. we have tried several different ones so far, but several different full file systems ones
Avatar
Avatar
C. Russell
@Law Enforcement [USA] Hello all, can anyone tell me how to execute a search warrant on Telegram? I can’t seem to find an email/portal or anything. It’s my understand that they’re outside the US as well, so any information would be helpful
Obyss (NoobinTraining) 1/31/2022 1:24 PM
I was advised by one of our people that because they are EU our people have to use MLAT (sorry, I'm not familiar with that). They work with FBI as well.
Avatar
UnicornSprinkles 1/31/2022 1:34 PM
This is from a recent FBI report in encrypted messaging apps. From our research, their development team is in Dubai....they don't provide a contact for LE.
Avatar
UnicornSprinkles 1/31/2022 1:47 PM
You can try their business address in the British virgin islands.....if you're dealing with something in the EU, they have an address for their rep in London under their privacy policy. Good luck.
Avatar
Trashboat667 1/31/2022 6:03 PM
Anybody know if a foreign mobile phone provider like Digicel in Jamaica is allowing a customer to roam in the United States mainland will IP address activity still show Digicel in Jamaica or will it show a domestic company?
Avatar
And I am sure you know this, but be careful about using Maxmind or other geolocation services to say where a mobile IP address came from. I have personally seen it be off by hundreds of miles or more.
Avatar
Avatar
FullTang
And I am sure you know this, but be careful about using Maxmind or other geolocation services to say where a mobile IP address came from. I have personally seen it be off by hundreds of miles or more.
Trashboat667 1/31/2022 8:10 PM
Yeah I ignore their location stuff. I just use their ISP info. I don’t know on the IP stuff. Everything I find is 50/50. Some route it back to the home country some don’t. Depends on lots of factors. (edited)
Avatar
Avatar
Trashboat667
Yeah I ignore their location stuff. I just use their ISP info. I don’t know on the IP stuff. Everything I find is 50/50. Some route it back to the home country some don’t. Depends on lots of factors. (edited)
Trashboat667 1/31/2022 8:10 PM
When I say it goes back to Jamaica I really just mean a company in Jamaica.
Avatar
Sree | ergokeyboard.sg 2/1/2022 1:25 AM
Hi does anyone have the official solution for digital corpora m57-Jean?
Avatar
Anyone know what the cost of Oxygen Detective is for a year? Ball park.
Avatar
Avatar
Ghosted
Anyone know what the cost of Oxygen Detective is for a year? Ball park.
@Ghosted I tagged @Oxygen Forensics for you. They can help you with that question.
👍 1
Avatar
@sholmes Thanks I have an email into them but was trying to put a memo into admin for the tool just needed estimate of cost. I was thinking must be similar to PA and Axiom.
Avatar
No problem. Hopefully they hit you right back to get you that information.
👍 1
Avatar
Avatar
Ghosted
@sholmes Thanks I have an email into them but was trying to put a memo into admin for the tool just needed estimate of cost. I was thinking must be similar to PA and Axiom.
Oxygen Forensics 2/1/2022 5:17 AM
Messaged you 🙂 Thank you for the tag @sholmes
👍 2
💯 1
oxygen 1
Avatar
dongle_dude. 2/1/2022 9:05 AM
I'm examining an iOS device where two Apple IDs have been found. CSAM is found in DCIM. Any thoughts on how to conclusively link the CSAM to a single Apple ID and eliminate the other Apple ID?
👀 1
Avatar
Avatar
kmacdonald1565
So, this one has me/us a little stumped. our Cellebrite Physical Analyzer computer (yes, singular; its a Dell Precision 3620) is throwing an error while trying to decode exams. Seems to be happening to most last week, and all this week....windows generic error box (title: CellebritePhysicalAnalyzer.exe - Application Error) "The instruction at 0x771df127 referenced memory at 0xffffffff. The memory could not be read. Click on OK to terminate the program I have rebooted and tested, uninstalled, rebooted, reinstalled and tested to absolutely no avail. version 7.52.0.36, windows 7 (I know, I know). The system has plenty of free drive space. BIOS basic diagnostic test came up okay, extensive memtest is going on now. I tested on a separate computer (windows 10, but with less ram than the 3620) I just threw PA on and it seems to open. Any advice on how to proceed?
kmacdonald1565 2/1/2022 9:08 AM
So a follow up to my things yesterday. Advanced memtest came back okay. The Windows Event Logs show the crash is related to .net framework. @Cellebrite What do you recommend for repairing physical analyzer given my tests. Simple uninstall/reinstall didnt work. Should I reinstall the .net framework? Wipe computer and start over? I have event logs if they help.
Avatar
Great question. I’ll ping devs for guidance.
Avatar
kmacdonald1565 2/1/2022 9:14 AM
thank you
Avatar
manuelevlr 2/1/2022 9:24 AM
hello everyone, on an iphone after how many wrong passcode attempts, the device is permanently disabled? Are there any data recovery solutions in these cases?
Avatar
Avatar
manuelevlr
hello everyone, on an iphone after how many wrong passcode attempts, the device is permanently disabled? Are there any data recovery solutions in these cases?
As of iOS 15.3, it’s 10 failed attempts. It will be iCloud locked as well upon reset. No recovery solutions since it will delete all data. (edited)
Avatar
Avatar
CLB-Paul
Great question. I’ll ping devs for guidance.
kmacdonald1565 2/1/2022 11:46 AM
hey, any update?
Avatar
Hi there, i would like to learn forensic windows and linux after that analysis malware, how i can start please ?
Avatar
@dongle_dude. I am not sure this can be done. It has been about a year or so since I looked at iOS forensics though. Your best bet is to locate the photos.sqlite (/private/var/mobile/Media/) and parse this manually. You can extract information about the image including the album name it belongs to, which application created the image and if it exists on iCloud. You could (location and legal dependant) request Apple to provide ownership information if it does exist on iCloud. Here are a couple of blogs that might get you started in the right direction; https://smarterforensics.com/2020/08/does-photos-sqlite-have-relations-with-cameramessagesapp-by-scott-koenig/ https://www.forensicmike1.com/2019/05/02/ios-photos-sqlite-forensics/ Edit: now with less IP address (edited)
First, I would like to thank Heather Mahalik for her help with this process and for allowing me to post something on her blog. It’s an honor! Additionally, thanks to Jared Barnhart for his assistan…
Discussing with Shafik the correlation of photo albums to pictures on iOS using Photos.sqlite.
Avatar
Avatar
Gohy
Hi there, i would like to learn forensic windows and linux after that analysis malware, how i can start please ?
Andrew Rathbun 2/1/2022 1:24 PM
#training-education-employment
Avatar
ok @Andrew Rathbun thanks
Avatar
Avatar
Velcro
@dongle_dude. I am not sure this can be done. It has been about a year or so since I looked at iOS forensics though. Your best bet is to locate the photos.sqlite (/private/var/mobile/Media/) and parse this manually. You can extract information about the image including the album name it belongs to, which application created the image and if it exists on iCloud. You could (location and legal dependant) request Apple to provide ownership information if it does exist on iCloud. Here are a couple of blogs that might get you started in the right direction; https://smarterforensics.com/2020/08/does-photos-sqlite-have-relations-with-cameramessagesapp-by-scott-koenig/ https://www.forensicmike1.com/2019/05/02/ios-photos-sqlite-forensics/ Edit: now with less IP address (edited)
forensicmike @Magnet 2/1/2022 1:57 PM
This is good advice & I def agree, I am deeply curious how you ended up with an IP address instead of my domain forensicmike1.com though 😂 google?
Avatar
Avatar
forensicmike @Magnet
This is good advice & I def agree, I am deeply curious how you ended up with an IP address instead of my domain forensicmike1.com though 😂 google?
Ah, the vagaries of copy/paste from my iPhone. Using the copy function when using the share button gives the IP address. Should have copy/pasted from the address bar. I will go edit; computers are hard (edited)
Avatar
Avatar
Velcro
Ah, the vagaries of copy/paste from my iPhone. Using the copy function when using the share button gives the IP address. Should have copy/pasted from the address bar. I will go edit; computers are hard (edited)
forensicmike @Magnet 2/1/2022 3:03 PM
haha it prompted me to double check and sure enough that was the IP of the ec2 instance, not cloudfront/load balancer.... not a big deal really but that def shouldnt be permitted by the vpc / security group rules since it bypasses the load balancer & WAF rules. i got 'er fixed 🙂 just glad I happened to notice your message lmao
Avatar
Hi everyone. I am in graduate school getting my masters in CS. I am interested in security so I took a DF class. Part of the class is a semester long research project where i need a practical/experimental component. I am new to DF and do not know where to start. Does anyone have recomendations as to what resources i should look at for inspiration? Does anyone have an idea they wanna pitch?
4:25 PM
examples of past projects GPS Accuracy comparison between Garmen handheld GPS, IPhone phone, and Android phone. Chat messenger forensics with modern chat applications Steganography algorithms use and detection Data recovery with modern harddrives Data recovery between various file systems Creating Hash Collisions Skin tone detection algorithms overview and implementation Malware analysis Decryption techniques (edited)
Avatar
Looking for assistance with a Google SW return explanation of the location data accuracy that is provided
Avatar
trickyricky 2/1/2022 7:41 PM
What other players in the market (besides AXIOM) provide an ad-hoc agent for full disk / memory collection?
Avatar
Avatar
Velcro
@dongle_dude. I am not sure this can be done. It has been about a year or so since I looked at iOS forensics though. Your best bet is to locate the photos.sqlite (/private/var/mobile/Media/) and parse this manually. You can extract information about the image including the album name it belongs to, which application created the image and if it exists on iCloud. You could (location and legal dependant) request Apple to provide ownership information if it does exist on iCloud. Here are a couple of blogs that might get you started in the right direction; https://smarterforensics.com/2020/08/does-photos-sqlite-have-relations-with-cameramessagesapp-by-scott-koenig/ https://www.forensicmike1.com/2019/05/02/ios-photos-sqlite-forensics/ Edit: now with less IP address (edited)
ScottKjr3347 2/1/2022 8:14 PM
Here is another photos.SQLite post I did which has links to my most recent queries. I’ll have updated queries this week or by next weekend…NHL All Star game this weekend… https://theforensicscooter.com/2021/11/23/photos-sqlite-queries/ Feel free to dm me if you have any questions.
Hello everyone! Back in August 2020, I wrote a blog “Using Photos.Sqlite to show the relationships between photos and the application they were created with?” which was posted on Heather Mahaliks’ …
👍 3
Avatar
Avatar
trickyricky
What other players in the market (besides AXIOM) provide an ad-hoc agent for full disk / memory collection?
Hello again readers and welcome back!! Today I would like to announce the public release of updates to the Live Response Collection (LRC)...
Avatar
Avatar
npd206
Looking for assistance with a Google SW return explanation of the location data accuracy that is provided
Andrew Rathbun 2/1/2022 10:00 PM
What's the issue?
Avatar
Avatar
Gene
Hi everyone. I am in graduate school getting my masters in CS. I am interested in security so I took a DF class. Part of the class is a semester long research project where i need a practical/experimental component. I am new to DF and do not know where to start. Does anyone have recomendations as to what resources i should look at for inspiration? Does anyone have an idea they wanna pitch?
Andrew Rathbun 2/1/2022 10:01 PM
#training-education-employment
Avatar
Avatar
Andrew Rathbun
#training-education-employment
Ty
Avatar
Digitalferret 2/2/2022 8:05 AM
re DOpus: anyone know if it's possible to add to the Exif data shown on a files, mouse-over to check for GPS co-ords? tried a number of help keywords, mouseover, popup, hover, metadata and so on, to no avail.
Avatar
Does anyone have experience with Cortex XQL queries?
Avatar
Avatar
Digitalferret
re DOpus: anyone know if it's possible to add to the Exif data shown on a files, mouse-over to check for GPS co-ords? tried a number of help keywords, mouseover, popup, hover, metadata and so on, to no avail.
Andrew Rathbun 2/2/2022 8:56 AM
standby
Avatar
Avatar
Digitalferret
re DOpus: anyone know if it's possible to add to the Exif data shown on a files, mouse-over to check for GPS co-ords? tried a number of help keywords, mouseover, popup, hover, metadata and so on, to no avail.
Andrew Rathbun 2/2/2022 8:56 AM
👍🏼 1
8:57 AM
timestamped link ^^
Avatar
Avatar
Andrew Rathbun
timestamped link ^^
Digitalferret 2/2/2022 9:51 AM
many thanks. I'd originally wanted the mouse-over to show GPS (see pic) and still can't but it looks like the addition of Co-ords column makes that an even easier / quicker proposition
9:52 AM
column's option makes it "at a glance" - would have never even thought to check for that. very much appreciated (edited)
9:54 AM
additionally, if anyone uses, info given with irfan view if you open the image and go to Info has a direct link-through so you can go right to Googlemaps from the extracted GPS metadata
Avatar
Avatar
Digitalferret
many thanks. I'd originally wanted the mouse-over to show GPS (see pic) and still can't but it looks like the addition of Co-ords column makes that an even easier / quicker proposition
Andrew Rathbun 2/2/2022 9:54 AM
Your best bet would be to post on the forums asking for this as a feature, if you want. They're always adding stuff and the forums are full of power users. There may be a solution out there or they could implement it.
Avatar
Avatar
Andrew Rathbun
Your best bet would be to post on the forums asking for this as a feature, if you want. They're always adding stuff and the forums are full of power users. There may be a solution out there or they could implement it.
Digitalferret 2/2/2022 9:55 AM
noted, cheers
Avatar
Avatar
Digitalferret
noted, cheers
Andrew Rathbun 2/2/2022 9:55 AM
Main area for support: Questions, suggestions and bug reports.
Avatar
Digitalferret 2/2/2022 9:55 AM
i think the columns option though, in this instance, completely overshadows the mouseover in terms of speed and utility
💯 2
Avatar
return2zero 2/2/2022 6:08 PM
Does anyone have a clever idea or tool to preserve full movies that are being illegally streamed on a site? There is approx 1000 movies to capture as evidence.
Avatar
Avatar
return2zero
Does anyone have a clever idea or tool to preserve full movies that are being illegally streamed on a site? There is approx 1000 movies to capture as evidence.
Digitalferret 2/2/2022 6:14 PM
the usual "security expert" kit is a VPN and video ripper to download preserve to your own storage ... so I'm told 😂 - sorry, couldn't resist (edited)
🤣 1
Avatar
Avatar
Digitalferret
the usual "security expert" kit is a VPN and video ripper to download preserve to your own storage ... so I'm told 😂 - sorry, couldn't resist (edited)
return2zero 2/2/2022 9:22 PM
Ha, the ol' tried and proven method hey.
Avatar
Avatar
trickyricky
What other players in the market (besides AXIOM) provide an ad-hoc agent for full disk / memory collection?
Volexity’s Surge, F-Response
Avatar
Avatar
return2zero
Does anyone have a clever idea or tool to preserve full movies that are being illegally streamed on a site? There is approx 1000 movies to capture as evidence.
Deleted User 2/3/2022 1:36 AM
youtube-dl might work and you could maybe script something if the page for each video has a UID eg piratesite.com/00001 -> piratesite.com/999999. Also, perhaps run "wget -r piratesite.com" and then parse all the links it downloads as well since they might lead to more videos.
Avatar
Avatar
Deleted User
youtube-dl might work and you could maybe script something if the page for each video has a UID eg piratesite.com/00001 -> piratesite.com/999999. Also, perhaps run "wget -r piratesite.com" and then parse all the links it downloads as well since they might lead to more videos.
return2zero 2/3/2022 2:16 AM
Thanks for the response, I'll look into this and test 👍
👍 1
Avatar
Avatar
return2zero
Thanks for the response, I'll look into this and test 👍
Digitalferret 2/3/2022 3:01 AM
there's a number of solutions, be very wary of those that offer access via a web interface or app
3:01 AM
if you want to learn a bit around it, look up how to download with ffmpeg - lots of forum posts
Avatar
Avatar
Digitalferret
if you want to learn a bit around it, look up how to download with ffmpeg - lots of forum posts
return2zero 2/3/2022 3:09 AM
Cheers!
Avatar
@Magnet Forensics Is there a reason why there is no longer an option for OCR in AXIOM 5.9?
Avatar
Avatar
Flavius
@Magnet Forensics Is there a reason why there is no longer an option for OCR in AXIOM 5.9?
Are you attempting to utilize the OCR in PROCESS or EXAMINE? In EXAMINE you simply need to navigate to Process|Extract Text From Files(OCR) and follow any prompts
Avatar
Avatar
Tim F
Are you attempting to utilize the OCR in PROCESS or EXAMINE? In EXAMINE you simply need to navigate to Process|Extract Text From Files(OCR) and follow any prompts
In PROCESS. I haven't checked the EXAMINE yet, it's the first processing I do with the new version (edited)
Avatar
I just checked in EXAMINE and it's unchanged from 5.8, let me take a quick peak at PROCESS
8:46 AM
You should still see it as a feature within processing details.
8:50 AM
I try also a clean install 😕
Avatar
Do you have an AXIOM Complete license?
Avatar
Yes, excluding the cloud part
Avatar
We're working on replicating the issue. It shouldn't be missing given all the variables. Hang tight while we work it out
Avatar
Thank you. I asked a colleague and he reported having the same problem (same license, also same workstation). Tomorrow I will be able to tell you if the option is also missing in the EXAMINE and i'll try on a different pc 🤔
Avatar
SPVQct3207 2/3/2022 4:46 PM
Hello, are there people who need to capture videos, comments on social media sites like Facebook for live events in public profile? What software do you use to be more productive? Currently our team does it manually with Opera (PDF files), extention savefrom.net, etc... I will try Hunchy next week. Thanks ! (edited)
Avatar
Avatar
SPVQct3207
Hello, are there people who need to capture videos, comments on social media sites like Facebook for live events in public profile? What software do you use to be more productive? Currently our team does it manually with Opera (PDF files), extention savefrom.net, etc... I will try Hunchy next week. Thanks ! (edited)
Andrew Rathbun 2/3/2022 6:27 PM
Hunchly was going to be my suggestion. Hope it works out for you.
💪 1
Avatar
silvanceknight 2/4/2022 5:10 AM
What dependencies do I need to run cmd.exe and powershell from a portable evidence drive to avoid launching it on the target computer? I tried just putting the actual cmd.exe on the drive but it gets errors with system messages.
Avatar
Hi all, looking at potentially buying some new hardware for a new machine and was wondering what people are using or recommend. We currently use Griffeye, Cellebrite and XRY. As far as i'm aware non of the above are GPU accelerated so we would focus most of the budget in the CPU. But we are unsure if more cores are better or if clock speed is more important... Would like to hear what you guys have to say
Avatar
Avatar
dn
Hi all, looking at potentially buying some new hardware for a new machine and was wondering what people are using or recommend. We currently use Griffeye, Cellebrite and XRY. As far as i'm aware non of the above are GPU accelerated so we would focus most of the budget in the CPU. But we are unsure if more cores are better or if clock speed is more important... Would like to hear what you guys have to say
In XRY we can use nVidia CUDA to speed up the image recognition so if that is something you are looking to do that's worth keeping in mind!
🙏 1
Avatar
Avatar
Erumaro
In XRY we can use nVidia CUDA to speed up the image recognition so if that is something you are looking to do that's worth keeping in mind!
Thanks Tobias will keep that in mind 😄
Avatar
UnicornSprinkles 2/4/2022 8:40 AM
Good day folks. Has anyone done a Search Warrant to Google for any data relating to a specific IP address during a specific window of time? We have a suspect that we know was doing google searches from his home during a 24 hour period we're interested in. We want his searches, googles search results, and which links he clicked on.
Avatar
Avatar
UnicornSprinkles
Good day folks. Has anyone done a Search Warrant to Google for any data relating to a specific IP address during a specific window of time? We have a suspect that we know was doing google searches from his home during a 24 hour period we're interested in. We want his searches, googles search results, and which links he clicked on.
Andrew Rathbun 2/4/2022 8:48 AM
https://aboutdfir.com/resources/preservation-letter-search-warrant-templates/google/ I've done Google SW's in the past. Do you need help drafting language? See the above for a jump start and let me know if anything needs to be added.
Legal Disclaimer The information listed below is purely informational in nature and not meant to be a substitute for legal advice. One should consult with their respective jurisdiction’s district attorney, prosecutor, judge, etc prior to using this language for any legal process in an actual investigation. AboutDFIR and its authors are not liabl...
Avatar
UnicornSprinkles 2/4/2022 9:05 AM
We've done regular google warrants regarding specific google accounts, mostly ICAC.... This is a first for us trying to get a data dump for everything on a specific IP. We dont have a google account.... We just know he was using google to search for info relating to his crime.
Avatar
Avatar
UnicornSprinkles
We've done regular google warrants regarding specific google accounts, mostly ICAC.... This is a first for us trying to get a data dump for everything on a specific IP. We dont have a google account.... We just know he was using google to search for info relating to his crime.
Andrew Rathbun 2/4/2022 9:13 AM
I think main thing would be date and time or range of time for when that IP is of interest. As specific as possible. I can click a button and I have a new IP address so I can't imagine they will like a non-specific request
Avatar
UnicornSprinkles 2/4/2022 9:14 AM
So we confirmed with comcast his house IP did not change during our timeframe. We also know his T mobile phone IP was constant during our timeframe.
9:15 AM
Is there verbage different from what we'd use in our google warrants that go after a known account?
Avatar
Avatar
UnicornSprinkles
Is there verbage different from what we'd use in our google warrants that go after a known account?
Andrew Rathbun 2/4/2022 9:17 AM
Haven't been in LE in a few years, so take my advice with a pound of salt, but something to the effect of Any and all data associated with the IP address 123.123.123.123 from X timestamp to Y timestamp, including but not limited to the following: * Personal identifying information of the account owner related to the aforementioned IP address during the timeframe of interest * list things you're interested in here * Google has a ton of services so be specific (edited)
Avatar
kmacdonald1565 2/4/2022 10:47 AM
@UnicornSprinkles i dont have too much other insight, but let us know how you make out with this. love hearing about some pioneering work
Avatar
Avatar
UnicornSprinkles
So we confirmed with comcast his house IP did not change during our timeframe. We also know his T mobile phone IP was constant during our timeframe.
Deleted User 2/4/2022 10:57 AM
If possible I would see if there was a way to get his DNS lookups.
Avatar
UnicornSprinkles 2/4/2022 11:43 AM
Thanks for the insights. I'll keep y'all posted in how this goes.
Avatar
I like the DNS lookup idea. It looks like that would require a warrant to Comcast as the ISP is usually responsible for DNS queries.
👍 1
Avatar
Anyone have Amazon SW template they are willing to share?
Avatar
Avatar
SPVQct3207
Hello, are there people who need to capture videos, comments on social media sites like Facebook for live events in public profile? What software do you use to be more productive? Currently our team does it manually with Opera (PDF files), extention savefrom.net, etc... I will try Hunchy next week. Thanks ! (edited)
xxSuccessful- 2/4/2022 7:04 PM
Try page freezer's web preserver or a tool called FAW
💪 1
Avatar
Original message was deleted or could not be loaded.
Yes, After I ran media categorization and Watchlist. When I go to tag items it crashes. I have been making full reader files and tagging and exporting from there.
Avatar
hello, when trying to connect to the mycellebrite page, I encounter the following warning. Anyone get similar error. @Cellebrite (edited)
2:16 PM
Avatar
Avatar
invest00
hello, when trying to connect to the mycellebrite page, I encounter the following warning. Anyone get similar error. @Cellebrite (edited)
i got in no problem ...
Avatar
Avatar
FullTang
I like the DNS lookup idea. It looks like that would require a warrant to Comcast as the ISP is usually responsible for DNS queries.
Deleted User 2/6/2022 3:38 AM
Thanks. Sometimes this can be useful as well if you know subjects IP and have no warrant: https://iknowwhatyoudownload.com/en/peer/
Detailed statistic for torrent downloads and distributions for IP address 35.237.4.214
👍 2
Avatar
Nathan_Infinity 2/6/2022 8:07 PM
Hi, anyone knows if there are ways to get data from Wickr on IOS or Android, trying to gather information about data analysis that can be done for it for a school assignment, and from what I can find, there doesn't see to be alot of data that can be collected from a device when talking about Wickr.. Thanks for any help or site that might give more info 🙂
Avatar
Afternoon, anyone from @Cellebrite around for a licence question?
📬 1
Avatar
Nathan_Infinity 2/7/2022 6:46 AM
found that yeah was wondering if there was anyting more recent. I know there's ways to get some data if you manage to extract the entire FS including the keychain even though from what I understand it's still pretty hard to do even with all that..
Avatar
Have others seen a location shown in a different state when 1) pairing an apple watch 2) approving in person a child's app request? I've seen this in a few different client accounts. I suspect it is an apple server and not reflecting the actual location since the user is logging in just before the prompt. Can anyone confirm?
Avatar
Avatar
Nathan_Infinity
found that yeah was wondering if there was anyting more recent. I know there's ways to get some data if you manage to extract the entire FS including the keychain even though from what I understand it's still pretty hard to do even with all that..
Andrew Rathbun 2/7/2022 6:59 AM
#mobile-forensic-decoding #mobile-forensic-extractions
Avatar
DFE Travis 2/7/2022 7:42 AM
does anyone have a template or a resource on how you should set up your file structure when you begin a case? For instance, the main folder being the case number, having a folder for each forensic tool [cellebrite, axiom, ftk, encase,etc]? Anything else?
Avatar
Avatar
DFE Travis
does anyone have a template or a resource on how you should set up your file structure when you begin a case? For instance, the main folder being the case number, having a folder for each forensic tool [cellebrite, axiom, ftk, encase,etc]? Anything else?
This is a great question. I’m going to respond right now to say that I find putting all of the tool case folders under the main case folder is more difficult than having evidence files and tool case files under a separate parent folder (e.g. U:\EvidenceFiles\Case123 And V:\AxiomCase\Case123). This is based on how the tools use default directories.
🤔 1
Avatar
Avatar
uochaos
This is a great question. I’m going to respond right now to say that I find putting all of the tool case folders under the main case folder is more difficult than having evidence files and tool case files under a separate parent folder (e.g. U:\EvidenceFiles\Case123 And V:\AxiomCase\Case123). This is based on how the tools use default directories.
Yep this - you're better off trying it and seeing how the tools interract then document it. I've always included a \tmp dir within the case folder so any exports I do can be stored in one place, and then binned at the end when they're not needed rather than filling up different areas of disk that I might be paranoid about clearing out
Avatar
DFE Travis 2/7/2022 7:57 AM
Very good points, thank you. Do you think, then, that perhaps dropping a shortcut to the tool folder for the respective case might be a good alternative in case I have to reference a specific case and navigate to it?
Avatar
Avatar
DFE Travis
Very good points, thank you. Do you think, then, that perhaps dropping a shortcut to the tool folder for the respective case might be a good alternative in case I have to reference a specific case and navigate to it?
Shortcuts can work. I’m not sure what issue (if any) sparked your question. The end of a case can be one factor. I typically retain some of the admin items (contract, some notes, etc). I will usually wipe the evidence files and case folders. As MrStu suggested, I do typically export reports and files to an Export folder under my main case folder (vs a separate drive or parent folder). Also consider whether you keep your case notes separate in Google Drive or something mobile.
Avatar
Avatar
DFE Travis
Very good points, thank you. Do you think, then, that perhaps dropping a shortcut to the tool folder for the respective case might be a good alternative in case I have to reference a specific case and navigate to it?
I've always steered clear of shortcuts, I'd just rather know where that data is than delete a shortcut and have the frustration of having to go look for something anyway. If you've not already considered path lengths then please do - I've been caught out in the past creating a nice folder structure only to find out some forensic tool has put its own structure underneath it and exceeded path length or I can't copy the data somewhere because of path length.
Avatar
Avatar
uochaos
Have others seen a location shown in a different state when 1) pairing an apple watch 2) approving in person a child's app request? I've seen this in a few different client accounts. I suspect it is an apple server and not reflecting the actual location since the user is logging in just before the prompt. Can anyone confirm?
Possibly related to the iCloud Relay (Beta) VPN which is in iOS 15? This is an Apple+ feature an you can set it to general location, or time zone (different state).
Avatar
Avatar
WesDx_Stu
I've always steered clear of shortcuts, I'd just rather know where that data is than delete a shortcut and have the frustration of having to go look for something anyway. If you've not already considered path lengths then please do - I've been caught out in the past creating a nice folder structure only to find out some forensic tool has put its own structure underneath it and exceeded path length or I can't copy the data somewhere because of path length.
Digitalferret 2/7/2022 11:14 AM
... path length - been there, done that got the 😱 shirt. 🙂 (edited)
Avatar
Thanks for all the insight. I'm a new DFE operationally; I've done the schooling but have very limited hands on experience.
Avatar
I'm looking at a logical image of an iPhone 12 mini in Cellebrite PA. I have timestamps for the instant messages going back to early November 2021. All of the messages before that have a timestamp of 12/31/2000 6pm (UTC-6). Can anyone explain why the real timestamps aren't there?
Avatar
Thats a "epoch" time (edited)
3:05 PM
so basically it's an epoch reference that a numerical value would reference upon
3:05 PM
12/31/2000 is the base and the "time" in the database would be something like the number of seconds from that date
3:05 PM
other epochs have different baselines
3:06 PM
so in your case, a blank value would likely reflect the reference date. Look in the database and see if those timestamp fields are empty
Avatar
random question guys, anyone know how to "substract" one Qr code from another? Basically looking to check the leftovers of two qr codes or a good resource on QR steno
Avatar
Avatar
uochaos
This is a great question. I’m going to respond right now to say that I find putting all of the tool case folders under the main case folder is more difficult than having evidence files and tool case files under a separate parent folder (e.g. U:\EvidenceFiles\Case123 And V:\AxiomCase\Case123). This is based on how the tools use default directories.
DeeFIR 🇦🇺 2/7/2022 4:13 PM
I start with a case stored in a single location; T:\Cases\YYYY\K-YYYY-xxxx\ Case reference number. This folder contains Tool-specific folders (X-Ways, Axiom, etc) Acquisitions, Reports, Files, Temp. Even though an Axiom case may be nested (K-YYYY-xxxx\Axiom\Reference) I find it easier to keep track of everything in a case-specific folder, rather than a tool-specific folder.
Avatar
Hey I have some questions about these tools Magnet Axiom Blackbag mobilize UFED cellebrite which channel should i use to ask?
Avatar
Avatar
Gene
Hey I have some questions about these tools Magnet Axiom Blackbag mobilize UFED cellebrite which channel should i use to ask?
You're jumping topics there. Usage? Licence cost? Capabilities? Maybe just ask the questions and someone will either answer or point you to the right channel.
Avatar
Avatar
5cary
You're jumping topics there. Usage? Licence cost? Capabilities? Maybe just ask the questions and someone will either answer or point you to the right channel.
Fair point. So I am in a digital forensics class at the masters level. Part of my class is to do a semester long research project with some sort of experiment or demonstration portion. I have stumbled around looking for about a week or so and I found some studies done on moble phone vault apps. There are studies done on how well the vaults actually protect data and what tools are good and bad at finding photos in them. A study that i found used those 3 tools. I was thinking about reproducing the study but with an updated version of the vaults, tools and phone OS. was wondering where i could get someone advice on this. Some of those tools have free trials, not sure if thats a good idea to do versus asking the school to buy it. Do not know if there are better tools or programs to use ect.
Avatar
DeeFIR 🇦🇺 2/7/2022 6:32 PM
If you're focusing more so on the application itself, I'd be asking in #mobile-forensic-decoding for insight. You can do a lot with Android Studio/VD Manager/Emulator and DB Browser without any of the commercial tools.
Avatar
awesome. ill post what i said above there
6:35 PM
thanks
Avatar
Avatar
DeeFIR 🇦🇺
If you're focusing more so on the application itself, I'd be asking in #mobile-forensic-decoding for insight. You can do a lot with Android Studio/VD Manager/Emulator and DB Browser without any of the commercial tools.
whats the difference between mobile forensic decoding vs extraction. sounds like the same thing to me
Avatar
DeeFIR 🇦🇺 2/7/2022 6:37 PM
Extraction is acquiring the data itself, decoding it is decoding databases, trawling through records, assembling them, piecing together different artefacts etc
👍 3
Avatar
Avatar
DFE Travis
does anyone have a template or a resource on how you should set up your file structure when you begin a case? For instance, the main folder being the case number, having a folder for each forensic tool [cellebrite, axiom, ftk, encase,etc]? Anything else?
I wrote a small python script that does the following: Create a parent folder with a user inputted case number Create sub-folders named for each user inputted item number Create a “reports” folder Create a work log txt file with headers for each item number Copy an established examination report template from a set location into the reports folder and rename it “<case number> examination report.docx”
8:21 PM
So in practice I double click my script, type the case number and hit enter, type the item numbers separated by a space and hit enter. That’s it and then my folder structure is all generated. Then I have places to save my acquisition files as I make them. (edited)
Avatar
That's way fancier than me. I just have a template folder for my reports with a readme.txt, installers for .7zip and VLC, and a word document for my forensic summary report where everything is filled in except for the case number. All portable cases, UFED Reader reports, etc, go into the reports folder inside a folder with their item number. The report folder is ultimately copied to the flash drive for the officer requesting the exam. When making a new case, I copy the report folder to my case folder that was created using Ctrl + N (new folder, I use that hotkey very frequently) and labeled with the case number + agency requesting the exam + suspect name. Inside of my template word document / forensic summary report, all items that need to be changed for each case are designated with XXs. A part of my final proofreading is to do a Ctrl + F for 'XX' to make sure I haven't missed anything.
Avatar
Just curious but did anybody investigate the forensic opportunities of the Whatsapp multi-device beta yet?
Avatar
20% off GIAC cert renewal https://www.giac.org/mlp/renewal-2022/
Save 20% when you renew your GIAC cybersecurity certification today
Avatar
Avatar
whee30
So in practice I double click my script, type the case number and hit enter, type the item numbers separated by a space and hit enter. That’s it and then my folder structure is all generated. Then I have places to save my acquisition files as I make them. (edited)
Would you be willing to share this script? I've been thinking of something like this for years and my scripting abilities stall after "Hello world."
Avatar
Sure - I’ll comment it and post it soon. I’m not a coder so if it’s sloppy please keep that in mind.
Avatar
Avatar
whee30
Sure - I’ll comment it and post it soon. I’m not a coder so if it’s sloppy please keep that in mind.
Still better than what I
7:32 AM
would be able to do. Thanks!
Avatar
Avatar
Gene
Fair point. So I am in a digital forensics class at the masters level. Part of my class is to do a semester long research project with some sort of experiment or demonstration portion. I have stumbled around looking for about a week or so and I found some studies done on moble phone vault apps. There are studies done on how well the vaults actually protect data and what tools are good and bad at finding photos in them. A study that i found used those 3 tools. I was thinking about reproducing the study but with an updated version of the vaults, tools and phone OS. was wondering where i could get someone advice on this. Some of those tools have free trials, not sure if thats a good idea to do versus asking the school to buy it. Do not know if there are better tools or programs to use ect.
Ross Donnelly 2/8/2022 9:40 AM
This blog is a good resource for you - things that the main tools aren't going to be automatically pulling for you https://theincidentalchewtoy.wordpress.com/
He used to byte, now its just a nibble
Avatar
@Law Enforcement [UK] are there any outsourcing companies in the UK that would assist in preserving and extracting data from phones that have been recovered from the sea or a river, please? Particularly using the ultrasonic bath method?
Avatar
Avatar
ApC
@Law Enforcement [UK] are there any outsourcing companies in the UK that would assist in preserving and extracting data from phones that have been recovered from the sea or a river, please? Particularly using the ultrasonic bath method?
MD5 forensics offer this mate
Salute 1
Avatar
A lot offer this service, have had quotes/service from CCL, Data Clinic and MD5
👌🏻 1
Salute 1
Avatar
Avatar
Pseudonym
A lot offer this service, have had quotes/service from CCL, Data Clinic and MD5
What he said ⬆️
Avatar
Avatar
DFE Travis
does anyone have a template or a resource on how you should set up your file structure when you begin a case? For instance, the main folder being the case number, having a folder for each forensic tool [cellebrite, axiom, ftk, encase,etc]? Anything else?
MugiwaraNoLuffy 2/8/2022 10:49 AM
I wrote some VBA code to create a folder structure based on the parameters you put in the spreadsheet the code is embedded in. It's configured for our server but happy to share it
Avatar
Remove if is not allowed Join this only if you are an AASP, IRP, or Inside Support. All whats needed for apple systems and support. https://discord.gg/zJRHTMJK
Avatar
@A_A_Ron and anyone else who wants to scold me for shoddy code, here is my folder structure script I run before each case
🙏 1
1:27 PM
A simple python script to generate nested folders based on user input. The script will also name and place a template report document and generate a named worklog based on user input. - GitHub - Wh...
1:27 PM
Avatar
I threw it together just for me - I haven't done anything fancy like sanitize user input so use at your own risk if a special character is going to set your machine on fire.
Avatar
Looks fine to be honest, should throw some tkinter at it and get a promotion
Avatar
Avatar
Ross Donnelly
This blog is a good resource for you - things that the main tools aren't going to be automatically pulling for you https://theincidentalchewtoy.wordpress.com/
i dont understand tbh
Avatar
https://www.tethabyte.com/ Anyone know the creator of WinFi. I guess he is in Germany?
Official WinFi Distributor.
Avatar
Tkinter version of script mentioned earlier on for people to tinker with
👍 2
Avatar
Avatar
whee30
@A_A_Ron and anyone else who wants to scold me for shoddy code, here is my folder structure script I run before each case
Specifically an adaptation of this one
Avatar
Any recommendation on tools to scan a wordpress site for cc skimming?
Avatar
Avatar
1337bash
Any recommendation on tools to scan a wordpress site for cc skimming?
randomaccess 2/8/2022 7:34 PM
not a tool but do you know for certain it's got a skimmer on it?
Avatar
Avatar
randomaccess
not a tool but do you know for certain it's got a skimmer on it?
yea, they were notified from Visa with CC numbers that were compromised and were used on the site, and after the following days, some of their customers sent them emails saying they are seeing new chargers and the last thing the customers did was a purchase from this site. (edited)
Avatar
Avatar
1337bash
yea, they were notified from Visa with CC numbers that were compromised and were used on the site, and after the following days, some of their customers sent them emails saying they are seeing new chargers and the last thing the customers did was a purchase from this site. (edited)
randomaccess 2/8/2022 7:38 PM
is it a straight wordpress site, or does it run something like magento?
Avatar
Avatar
randomaccess
is it a straight wordpress site, or does it run something like magento?
It does have Magneto and they use Authorize.net for payment processing
Avatar
randomaccess 2/8/2022 7:39 PM
Magento has a lot of problems in it, I had a case just recently where we found a malicious Google Tag Manager account within one of the structures through the Admin portal
👍 2
7:40 PM
Have a flick through the admin portal and see if you can find any Script tags that no one recognises
👍 2
Avatar
Avatar
randomaccess
Have a flick through the admin portal and see if you can find any Script tags that no one recognises
Thank you, we will checkout the admin console for this specific site. We were given access to the Linux box which hosts multiple sites, since it might be one of the sites affecting the other.
Avatar
randomaccess 2/8/2022 7:48 PM
Yeah the magecart case i did recently there was nothing on the host because when the user accessed the page it would load the custom script on their endpoint
Avatar
Avatar
randomaccess
Yeah the magecart case i did recently there was nothing on the host because when the user accessed the page it would load the custom script on their endpoint
And that script was nowhere to be found on disk?
Avatar
randomaccess 2/8/2022 7:52 PM
no because when the user accessed the site it would call out to an external location and load the JS
Avatar
Gotcha, how did you find it?
Avatar
randomaccess 2/8/2022 7:55 PM
luck?
😆 1
7:55 PM
lots of reading, and going through the portal, found a script tag that no one recognised
7:55 PM
and it aligned iwth other IOCs from other reporting
Avatar
Got it. Thank you so much for replying 😊
Avatar
randomaccess 2/8/2022 7:57 PM
In this posting, we go over what web skimming attacks are and how they work. We then analyze a series of web skimming attacks that we found which were active from March 2021 to the present. These attacks abused the Google Tag Manager...
7:57 PM
and can take a lot of different formats
👍 1
Avatar
Cuckoo and CAPE sandbox evasion in one legitimate Windows API function call? It is possible due to issues we found in Cuckoo and CAPE monitor.
Avatar
General question for anyone. Does anyone use cardboard boxes to secure mobile devices (seizure/ transport) ...after a few products to trial , test after a revamp of procedures ? Any links to products would be welcome
Avatar
Avatar
monkpete
General question for anyone. Does anyone use cardboard boxes to secure mobile devices (seizure/ transport) ...after a few products to trial , test after a revamp of procedures ? Any links to products would be welcome
We recommend it, if only to protect the exhibit in transport. The benefit used to be that you could see the device through a plastic window on the cardboard box, that’s a mute point now there’s a faraday bag around it. The box along with cable ties to hold it steady, then considerations need to be made into how to tamper seal the box.
5:56 AM
I say we recommend it, most of the time it’s a clear evidence bag with some sodding tin foil around the phone…
Avatar
Adam Cervellone 2/9/2022 6:20 AM
Has anyone here ever examined a Steam Link device? It appears to be streaming device to play steam games on your TV. Would it have any relevant onboard storage that could be imaged or extracted?
Avatar
Avatar
Pseudonym
Tkinter version of script mentioned earlier on for people to tinker with
Avatar
Is it at all possible to somehow convert a E01 to a vmdk to run it in a vm? (edited)
Avatar
@0xSxS you could probable mount the EO1 with FTK Imager etc and then create a VHD with Arsenal Image Mounter (AIM)
Avatar
Joe Schmoe 2/9/2022 8:09 AM
Just wondering how other law enforcement agencies are storing large digital evidence. We still use disks and USB drives for most things. Computer and phones extractions are stored in a NAS (that keeps filling quickly). Our plan is to upgrade to a really large and scalable server for all digital evidence. The hardware is expensive enough but the some of the quotes for software are insane.
Avatar
Avatar
0xSxS
Is it at all possible to somehow convert a E01 to a vmdk to run it in a vm? (edited)
Doesn't Paladin have this facility built in, convert from eo1 to vmdk. @SUMURI (edited)
Avatar
Avatar
Adam Cervellone
Has anyone here ever examined a Steam Link device? It appears to be streaming device to play steam games on your TV. Would it have any relevant onboard storage that could be imaged or extracted?
Andrew Rathbun 2/9/2022 8:42 AM
I have one of these but I don't think there's any onboard storage... But I really don't know. Might be a teardown on ifixit or something
Avatar
Avatar
Dfdan
Doesn't Paladin have this facility built in, convert from eo1 to vmdk. @SUMURI (edited)
Chris-SUMURI 2/9/2022 9:13 AM
@0xSxS PALADIN could convert that E01 but not to a VMDK. Our current supported formats would be clone, dd, E01, Ex01, SMART, and DMG. But we’d likely be able to virtualize the image you have with CARBON. Just dm me if you want more info about CARBON
Avatar
@Magnet Forensics Within Axiom, is there a way to "stack" hash duplicated images when traversing large swaths of images/videos/files? So that if one image shows up in 19 places it only occupies one thumbnail slot when I'm scrolling? I'm not aware if you already offer this, but I know I like the feature from cellebrite
9:33 AM
For example.... lots of repeat images. Axiom already hashes them, it'd be cool to be able to filter by md5 to only show uniques or something like that. If it's a feature already I must have just missed it
Avatar
Avatar
0xSxS
Is it at all possible to somehow convert a E01 to a vmdk to run it in a vm? (edited)
Md5 forensics offer a product called vfc which does this fairly seamlessly. Otherwise, it’s a hell of a time trying to mount it, DD and modify registries and dll’s for it to work. I think VFC automates and does all required changes in cache.
Avatar
Avatar
Joe Schmoe
Just wondering how other law enforcement agencies are storing large digital evidence. We still use disks and USB drives for most things. Computer and phones extractions are stored in a NAS (that keeps filling quickly). Our plan is to upgrade to a really large and scalable server for all digital evidence. The hardware is expensive enough but the some of the quotes for software are insane.
We’re running servers, but it’s getting to the point of being too expensive, they’re flirting with a cloud solution now. Depending on the size of your organisation, might work out cheaper than hiring a server admin plus getting the server, plus the additional storage in the future
Avatar
Avatar
0xSxS
Is it at all possible to somehow convert a E01 to a vmdk to run it in a vm? (edited)
Also OSForensics can boot E01s
9:40 AM
Could anyone from MSAB ping me pls?
Avatar
Avatar
Pseudonym
We’re running servers, but it’s getting to the point of being too expensive, they’re flirting with a cloud solution now. Depending on the size of your organisation, might work out cheaper than hiring a server admin plus getting the server, plus the additional storage in the future
Joe Schmoe 2/9/2022 9:46 AM
Thank you for the reply. We first looked at Box.com which is much more reasonably priced for unlimited storage than I first thought (after getting the server quotes). The concerns where putting all of our evidence in the hands of a private company and also large file uploads brought our network to its knees in trying so it needs to be reworked.
9:47 AM
My ideal system would be a hybrid, locally stored but backed up to the cloud.
Avatar
Avatar
Joe Schmoe
Thank you for the reply. We first looked at Box.com which is much more reasonably priced for unlimited storage than I first thought (after getting the server quotes). The concerns where putting all of our evidence in the hands of a private company and also large file uploads brought our network to its knees in trying so it needs to be reworked.
Yeah absolutely the cloud provider would need to be accredited to a certain level, I swear I read a paper on digital forensics cloud providers that met all the governance
9:48 AM
But can’t remember where I would have found it, I remember Microsoft and aws, but there was some obscure providers on there too
9:48 AM
I want to say it was a UK GOV white paper
Avatar
Avatar
Pseudonym
But can’t remember where I would have found it, I remember Microsoft and aws, but there was some obscure providers on there too
Joe Schmoe 2/9/2022 9:49 AM
They are CJIS compliant with solid encryption. I don’t know what would happen if they just closed shop one day though.
Avatar
This guidance outlines how to create and implement a cloud strategy, and when to consider a single, hybrid or multi-cloud solution.
Avatar
Avatar
Joe Schmoe
They are CJIS compliant with solid encryption. I don’t know what would happen if they just closed shop one day though.
Yeah fairsies with closing shop, but you would spend this much money without reviewing the contract bids business continuity plan
9:58 AM
Wouldn’t
Avatar
Avatar
whee30
@Magnet Forensics Within Axiom, is there a way to "stack" hash duplicated images when traversing large swaths of images/videos/files? So that if one image shows up in 19 places it only occupies one thumbnail slot when I'm scrolling? I'm not aware if you already offer this, but I know I like the feature from cellebrite
Mel_Hungate 2/9/2022 10:29 AM
Media explorer will automatically stack by MD5 hash, and optionally by PhotoDNA if you have it enabled! https://www.magnetforensics.com/blog/the-all-new-media-explorer-in-magnet-axiom-5-0/
We highlight the new Media Explorer found within AXIOM and how examiners can use it within their examination workflows.
👍 2
Avatar
Avatar
0xSxS
Is it at all possible to somehow convert a E01 to a vmdk to run it in a vm? (edited)
If you want to launch E01s reliably into virtual machines, try Arsenal Image Mounter. You will also have access to extremely powerful (and unique) Windows authentication and DPAPI bypasses. We will send a temporary license via DM later today. (You can also use AIM for conversions, but why not launch E01s directly.) (edited)
Avatar
Avatar
Pseudonym
Yeah fairsies with closing shop, but you would spend this much money without reviewing the contract bids business continuity plan
What do you use for software? How would a patrol officer add digital evidence to a case?
Avatar
@Mel_Hungate see - I knew there should be (and is) a solution. Thanks for the quick response, building the explorer now.
😄 1
Avatar
Avatar
0xSxS
Is it at all possible to somehow convert a E01 to a vmdk to run it in a vm? (edited)
As someone else stated earlier, md5 have vfc, which I use quite a lot. But it can also be done using ftk and virtualbox, which I've also done several times: https://andreafortuna.org/2020/12/21/how-to-boot-an-encase-e01-image-using-virtualbox/
Sometimes, during an incident analysis, you may need to replicate behaviours of a specific host, perhaps already acquired with a forensic method. In order to perform this test, you first need to create a VM starting from a forensic image, so today wee se how to convert an Encase (E01) image into a file that can be read from VirtualBox [1]. First...
12:06 PM
If you are using wmic in your's scripts, it is time to rewrite them. (edited)
Avatar
Avatar
Andrew Rathbun
I have one of these but I don't think there's any onboard storage... But I really don't know. Might be a teardown on ifixit or something
Adam Cervellone 2/9/2022 12:07 PM
Thank you! I've already got what I need in this case so anything from the Steam Link would just be a bonus
💯 1
Avatar
Avatar
Joe Schmoe
What do you use for software? How would a patrol officer add digital evidence to a case?
That’s a big question!
Avatar
Avatar
0xSxS
Is it at all possible to somehow convert a E01 to a vmdk to run it in a vm? (edited)
DeeFIR 🇦🇺 2/9/2022 3:43 PM
Why don't you just mount it (with AIM or FTK shudder), create a sparse VMDK (linking it to the mounted physical drive) and then attach that VMDK to a VM?
Avatar
Error_Code_413 2/9/2022 3:51 PM
Hi everyone, Im a student and I was wondering if someone could help me understand something my Prof. couldn't explain. In Video Forensics, we're currently looking at different file formats and their Headers in hex. Can someone explain to me why it is standard for some files (like WAV) to switch between big endian and little endian? At first I thought it would be for some sort of efficiency/optimization, but I think any potential gain from this is mitigated by constantly switching back and forth. Can someone explain?
Avatar
In what context does it switch? If it’s presenting ASCII text like in metadata, it makes sense for big endian since that’s how we read. In the context of offsets, numbers, dates etc. it makes sense to use little endian since the processor that needs/uses that info reads in that direction… I’m not big into video so if I’m way off base from your question I apologize.
Avatar
Error_Code_413 2/9/2022 4:01 PM
Like, even within the first 12 bytes for the RIFF chunk, the first 4 for Chunk ID is in big endian, the Chunk Size is in little for the next 4, and the 4 following that for format switches back to big. That can't be more efficient than just picking one and sticking with it, can it?
Avatar
Well the processor reads everything little endian so it does all technically go the same direction. The software interpreting the data is written to know how to read it and what to do with it. You’d probably have to find some documentation from the creators to know why.
Avatar
Avatar
Joe Schmoe
Just wondering how other law enforcement agencies are storing large digital evidence. We still use disks and USB drives for most things. Computer and phones extractions are stored in a NAS (that keeps filling quickly). Our plan is to upgrade to a really large and scalable server for all digital evidence. The hardware is expensive enough but the some of the quotes for software are insane.
Similar path for us, outgrew synology nas and now we use Linux servers utilizing ceph, has scaled amazingly well, just keep adding servers as needed, very resilient if you have it background and can maintain it yourself.
Avatar
Not a CS question but here it goes. Does anybdy know if its possible to set a domain account to force password change on 2nd login instead of 1st login ?
Avatar
Avatar
Medi
Similar path for us, outgrew synology nas and now we use Linux servers utilizing ceph, has scaled amazingly well, just keep adding servers as needed, very resilient if you have it background and can maintain it yourself.
Joe Schmoe 2/9/2022 6:38 PM
Interesting. I’m not familiar with Ceph but I will take a look.
Avatar
Hello, when was FBE encryption adopted on iOS? (edited)
Avatar
Avatar
manuelevlr
Hello, when was FBE encryption adopted on iOS? (edited)
From iPhone 4. Its possible to obtain a physical from IPhone 4, after that you cant) (edited)
Avatar
Avatar
florus
From iPhone 4. Its possible to obtain a physical from IPhone 4, after that you cant) (edited)
there has never been a full disk encryption encrypted then? directly to the file based encrypted you passed? (it wasn't like android)
Avatar
Does anybody know what the file signature is for the AFF4 format? I was excited to see the latest version of FTK Imager supported AFF4, but i'm very disappointed to see that it doesn't appear to actually image in AFF4 format, rather, it appears to still use the original AFF (I'm getting this from the file signature ASCII "AFF10", and the fact it was slower than molasses). Perhaps this means it can read AFF4.... don't have a way to test it though. (edited)
Avatar
ntrsandman28 2/10/2022 12:40 PM
Forensic Software question: For those that have used or currently use Oxygen Forensic Detective, MSAB and Magnet Axiom, how do they compare head to head to head? Is there an overall advantage to one over the other, or does one do particular things better than the other. One of our biggest issues has been locked Android devices, and while I'm aware that is a difficulty for everyone, does one of these do a better job getting into more devices than the others? Also, has anyone found that one of them does a better job pulling the most data over the others? I'm curious to know thoughts on this, as we are comparing them currently.
Avatar
Avatar
Cole
Does anybody know what the file signature is for the AFF4 format? I was excited to see the latest version of FTK Imager supported AFF4, but i'm very disappointed to see that it doesn't appear to actually image in AFF4 format, rather, it appears to still use the original AFF (I'm getting this from the file signature ASCII "AFF10", and the fact it was slower than molasses). Perhaps this means it can read AFF4.... don't have a way to test it though. (edited)
randomaccess 2/10/2022 1:25 PM
Aff4 is a zip64 container. So probably PK as a header.
👍 1
Avatar
Avatar
ntrsandman28
Forensic Software question: For those that have used or currently use Oxygen Forensic Detective, MSAB and Magnet Axiom, how do they compare head to head to head? Is there an overall advantage to one over the other, or does one do particular things better than the other. One of our biggest issues has been locked Android devices, and while I'm aware that is a difficulty for everyone, does one of these do a better job getting into more devices than the others? Also, has anyone found that one of them does a better job pulling the most data over the others? I'm curious to know thoughts on this, as we are comparing them currently.
randomaccess 2/10/2022 1:27 PM
When I was in LE I was very fortunate to have access to a few different tools. But the way that mobile support works, you almost need to to get the best coverage of device/operating system/file system/app data. Mobiledit had a blog post about a comlaritive study and showed that you need more than one for better coverage
1:27 PM
Whether they do a better job is relative. I did a job where oxygen was the only tool that supported a specific encrypted app. But couldn't produce. Areport of the contents with exif data. So out of one tool and into another
Avatar
Digitalferret 2/10/2022 2:51 PM
pretty much this ^. if the only tool you have is a hammer, everything starts to look like a nail - kinda thing. even in data recovery there's a substantial difference in which ones are better at what, even given that they are all operating on a pretty standard format device (say a spinning HDD) quite unlike Mobile Phones.
Avatar
Hi! So I was doing a Shell bag analysis on UsrClass.data with SBECmd (Eric Zimmerman's tool) and saw that CSV file it generated gave me empty columns for Created Date and Modified date
8:33 PM
anyone has any experience with the tool and knows why is it happening?
Avatar
Avatar
ArcherL
Hi! So I was doing a Shell bag analysis on UsrClass.data with SBECmd (Eric Zimmerman's tool) and saw that CSV file it generated gave me empty columns for Created Date and Modified date
Andrew Rathbun 2/10/2022 8:35 PM
Did you get first interacted and last interacted timestamps?
Avatar
Yeah
Avatar
Andrew Rathbun 2/10/2022 8:36 PM
Good deal. Do you need anything more than that?
Avatar
I was going through the issues on github of the tool, no mention of it
Avatar
Avatar
Andrew Rathbun
Good deal. Do you need anything more than that?
Yeah, I mean I have to compare in one of my assignments if the file was moved from one place to another and wanted to check it against created date
8:37 PM
one drive/external media*
Avatar
Avatar
ArcherL
I was going through the issues on github of the tool, no mention of it
Andrew Rathbun 2/10/2022 8:37 PM
There's no SBECmd repo so I'm guessing you're referring to his general issues repo
Avatar
Yeah
8:37 PM
my bad
Avatar
Avatar
ArcherL
Yeah, I mean I have to compare in one of my assignments if the file was moved from one place to another and wanted to check it against created date
Andrew Rathbun 2/10/2022 8:37 PM
Where would you find timestamps of a file that could indicate a potential file copy took place?
Avatar
as in, if a file created say x and the same file is elsewhere in another drive as well but with a Y timestamp which is after X
8:39 PM
I can hypothesize it might be copied from x timestamp place to Y timestamp place
8:39 PM
but I am just guessing
Avatar
Andrew Rathbun 2/10/2022 8:39 PM
You're on the right track. Where would you find the timestamps for said files?
8:40 PM
And what dataset are you afforded for this assignment? An image?
Avatar
Avatar
Andrew Rathbun
You're on the right track. Where would you find the timestamps for said files?
createdON, ModifiedOn I guess? I am not really sure what information is LastWriteTime and FirstTimeINteracted is giving, is it like the same as the former two? (I mean they are synonymous but from the SBECmd wise)
Avatar
Avatar
Andrew Rathbun
And what dataset are you afforded for this assignment? An image?
Yeah, an image, I have extracted the NTUSER.dat, UsrClass.dat (and log files for both)
👍 1
Avatar
Avatar
ArcherL
createdON, ModifiedOn I guess? I am not really sure what information is LastWriteTime and FirstTimeINteracted is giving, is it like the same as the former two? (I mean they are synonymous but from the SBECmd wise)
Andrew Rathbun 2/10/2022 8:44 PM
SBECmd is going to parse shellbags, which is indicative of folder traversal by a given user. First and last interacted are the first and last times the user traversed that folder
8:45 PM
It appears your assignment wants you to key in on timestamps of a specific file(s).
8:45 PM
The “Evidence of...” categories were originally created by SANS Digital Forensics and Incidence Response faculty for the SANS course FOR500: Windows Forensic Analysis. The categories map a specific artifact to the analysis questions that it will help to answer. Use this poster as a cheat-sheet to help you remember where you can discover key Wind...
Avatar
Avatar
ArcherL
Hi! So I was doing a Shell bag analysis on UsrClass.data with SBECmd (Eric Zimmerman's tool) and saw that CSV file it generated gave me empty columns for Created Date and Modified date
I mean the whole column for every entry is empty
Avatar
Andrew Rathbun 2/10/2022 8:45 PM
Top section of the poster is relevant to your interest
8:46 PM
There's a very important NTFS metadata file that contains timestamps for every file on the file system
💯 1
8:46 PM
I just gave you 2 and 2. Go find 4
👍 1
8:47 PM
Best of luck
Avatar
Got it, thanks for the help @Andrew Rathbun
Avatar
Andrew Rathbun 2/10/2022 8:49 PM
Circle back if you get stuck only after reporting what you tried that failed
Avatar
Hey has anyone here recently taken the SANS FOR500 (GCFE) Course on Demand? (edited)
8:56 PM
I'm trying to figure out how many hours of video content the course has
Avatar
Avatar
Andrew Rathbun
Circle back if you get stuck only after reporting what you tried that failed
I just had one doubt, why is the SBECmd giving me the whole createdON column empty!
9:09 PM
for my friend it has values for some items
Avatar
Avatar
Phill
I'm trying to figure out how many hours of video content the course has
It has about 24 hours of content (audio only, plus video/demos). That said, I always put in a caveat to say doing the course will take longer if done properly (review, note taking, doing the labs etc)
👍 1
❤️ 1
Avatar
Avatar
ArcherL
I just had one doubt, why is the SBECmd giving me the whole createdON column empty!
Andrew Rathbun 2/11/2022 1:00 AM
No idea man. Check your syntax when your friend's. Any differences? Hard to troubleshoot without showing debug console output, command etc
Avatar
Avatar
dn
Hi all, looking at potentially buying some new hardware for a new machine and was wondering what people are using or recommend. We currently use Griffeye, Cellebrite and XRY. As far as i'm aware non of the above are GPU accelerated so we would focus most of the budget in the CPU. But we are unsure if more cores are better or if clock speed is more important... Would like to hear what you guys have to say
Mornin! Griffeye does offer GPU processing options when it comes to the Griffeye Brain functionality. Cellebrite I would wonder if the media categorization processing option post ingestion utilizes GPU. I use the Forensic Computer PHANTYM line with pretty good success if it helps. Also use Talinos from Sumuri.
Avatar
Avatar
ByteSweep
Mornin! Griffeye does offer GPU processing options when it comes to the Griffeye Brain functionality. Cellebrite I would wonder if the media categorization processing option post ingestion utilizes GPU. I use the Forensic Computer PHANTYM line with pretty good success if it helps. Also use Talinos from Sumuri.
Yeah I believe the categorization addon program utilizes it. But I never actually looked at the resources when using it to see how well. Just going by the notes. (edited)
Avatar
Avatar
ArcherL
I just had one doubt, why is the SBECmd giving me the whole createdON column empty!
Are you both working from the same image? It should produce Created On timestamps for any entries of type Directory. Also be sure to be running SBECmd as Administrator (just in case there is a permissions issue)
Avatar
More on aggressive surveillance and electronic evidence tampering in an ongoing criminal case that you should all be aware of by now... this time from SentinelOne: https://www.sentinelone.com/labs/modifiedelephant-apt-and-a-decade-of-fabricating-evidence/ (Full report at https://s1.ai/mod-elephant?lb-mode=overlay)
A previously unreported threat actor has been targeting civil society for over a decade. Read about how it operates and its relationships to other threats.
ModifiedElephant is responsible for targeted attacks on human rights activists, human rights defenders, academics, and lawyers across India with the objective of planting incriminating digital evidence.
Avatar
Avatar
Arsenal
More on aggressive surveillance and electronic evidence tampering in an ongoing criminal case that you should all be aware of by now... this time from SentinelOne: https://www.sentinelone.com/labs/modifiedelephant-apt-and-a-decade-of-fabricating-evidence/ (Full report at https://s1.ai/mod-elephant?lb-mode=overlay)
Something to keep in mind as you learn more - both public and private sector digital forensics practitioners have been effectively toyed with in this case. Don’t be like them. (edited)
👀 1
Avatar
This fragmentation of the leaks community produced by raidforums going down is driving me nuts
7:47 AM
Just keep it all in one place god damnit! It's the streaming platforms scenario all over again!
Avatar
Hello everyone, I am currently pursuing Bachelors in Computer Science. I was willing to initiate a student chapter related to cyber security. Our college is in India. We wont be having too much members (initially not more than 15). It would be really helpful if I can get some suggestions for the organizations that I can reach to for the same. Thanks.
Avatar
Avatar
Chinz
Hello everyone, I am currently pursuing Bachelors in Computer Science. I was willing to initiate a student chapter related to cyber security. Our college is in India. We wont be having too much members (initially not more than 15). It would be really helpful if I can get some suggestions for the organizations that I can reach to for the same. Thanks.
Andrew Rathbun 2/12/2022 8:18 PM
#training-education-employment let's move this discussion here 👍
Avatar
Avatar
Andrew Rathbun
#training-education-employment let's move this discussion here 👍
Okay sure
Avatar
Avatar
Arsenal
More on aggressive surveillance and electronic evidence tampering in an ongoing criminal case that you should all be aware of by now... this time from SentinelOne: https://www.sentinelone.com/labs/modifiedelephant-apt-and-a-decade-of-fabricating-evidence/ (Full report at https://s1.ai/mod-elephant?lb-mode=overlay)
Interesting article, thank you for sharing! I like that the article provides a list of indicators of compromise file hashes. I know @Cellebrite includes their malware scanner in physical analyzer, are there other resources out there as far as IOC or malicious mobile file hashes? Especially recent ones?
Avatar
Anyone got experience with some tools that can deobfuscate php? 🙂
Avatar
Avatar
Fierry
Anyone got experience with some tools that can deobfuscate php? 🙂
For people wanting to deobfuscate (malicious) php code I can recommend: https://sandbox.onlinephpfunctions.com/
PHP Sandbox. Run, execute and test PHP code from your browser. Versions: 8.0.0, 7.4.13, 7.4.7, 7.4.0, 7.3.25, 7.3.19, 7.3.12, 7.3.5, 7.2.31, 7.2.25, 7.2.18, 7.2.4, 7.1.33, 7.1.29, 7.1.0, 7.0.14, 7.0.5, 7.0.4, 7.0.3, 7.0.2, 7.0.1, 5.6.29, 5.6.20, 5.6.19, 5.6.18, 5.6.17, 5.6.2, 5.5.34, 5.5.33, 5.5.32, 5.5.31, 5.5.18, 5.5.5, 5.5.0.a6, 5.5.0.a.5, 5....
Avatar
Avatar
whee30
Interesting article, thank you for sharing! I like that the article provides a list of indicators of compromise file hashes. I know @Cellebrite includes their malware scanner in physical analyzer, are there other resources out there as far as IOC or malicious mobile file hashes? Especially recent ones?
As far as we know, ModifiedElephant IOCs are specifically related to Indian targets. You can find some IOCs more recent than what you fill find our reports in the Amnesty article at https://www.amnesty.org/en/latest/research/2020/06/india-human-rights-defenders-targeted-by-a-coordinated-spyware-operation/. Amnesty's article deals with ModifiedElephant attacks on the people who came to the defense of the defendants in our case.
Amnesty International and the Citizen Lab have uncovered a coordinated spyware campaign targeting at least nine human rights defenders (HRDs) in India. Eight of the nine HRDs have been calling for the release of other prominent activists, popularly known as the Bhima Koregaon 11, most of whom have been imprisoned in Maharashtra, India since 2018...
Avatar
Avatar
Arsenal
As far as we know, ModifiedElephant IOCs are specifically related to Indian targets. You can find some IOCs more recent than what you fill find our reports in the Amnesty article at https://www.amnesty.org/en/latest/research/2020/06/india-human-rights-defenders-targeted-by-a-coordinated-spyware-operation/. Amnesty's article deals with ModifiedElephant attacks on the people who came to the defense of the defendants in our case.
Some of the IOCs are of limited value for reasons which include ModifiedElephant using a variety of different crypters in combination with a tendency to build things just prior to sending them to specific targets. A lot of care and feeding went into being able to track specific targets - e.g. the sheer volume of unique NetWire Host Ids/DarkComet Server IDs is fascinating.
Avatar
trickyricky 2/14/2022 3:45 AM
Has anyone here put an axiom (cyber) dongle on a server to allow multiple people access to the software (my entire team is remote)? Looking to do something similar, however not sure how the dongle plays with RDP sessions? Can’t justify paying for their AWS offering or additional dongles. Anyone have any suggestions to the reduce the single man point of failure situation?
Avatar
Digitalferret 2/14/2022 4:06 AM
Seriously, the more i use Dopus... I'm not sure whether to mention other DR/DFIR folks how stupidly OP Flat view is, bc it feels like I'm giving away "my edge".
Avatar
Avatar
trickyricky
Has anyone here put an axiom (cyber) dongle on a server to allow multiple people access to the software (my entire team is remote)? Looking to do something similar, however not sure how the dongle plays with RDP sessions? Can’t justify paying for their AWS offering or additional dongles. Anyone have any suggestions to the reduce the single man point of failure situation?
randomaccess 2/14/2022 4:49 AM
Unsure but if it doesn't work they do have some sort of network licensing. Not sure if it's more expensive though
Avatar
can anyone help me with a college assignment, i'm trying to track payments made possibly to a number of betting agency's is there a way of doing this without having a form of warrant or access to the suspected accounts. e.g. through an IP log ?
Avatar
Avatar
Reaper 22
can anyone help me with a college assignment, i'm trying to track payments made possibly to a number of betting agency's is there a way of doing this without having a form of warrant or access to the suspected accounts. e.g. through an IP log ?
Digitalferret 2/14/2022 5:46 AM
what material / resources / direction have the college given you? (edited)
Avatar
the background ive been given is just the reason why it being done and acess to basic stuff such as proDiscoer or the slueth kit autopsy
5:52 AM
the only thing is for me to use the autopsy part i need to physically be able to plug the phone into it but the phone has built in encryption
Avatar
Digitalferret 2/14/2022 5:53 AM
ah, you have a device 🙂 (edited)
Avatar
i have the phone but roughly would only have about 8 hours of access so want to use it wisely
5:54 AM
so was thinking if there was a work around for this
Avatar
Digitalferret 2/14/2022 5:56 AM
sorry, "phones-Я-us" is totally not me, lol, maybe echo in #mobile-forensic-decoding too. some groovy dudes in there
5:57 AM
w/ any luck others will pop by here with pointers too
Avatar
yeah might throw it into there, probably should have picked one of the assignments with a little less of a focus on phone work a computer would have been easier
Avatar
Avatar
Reaper 22
yeah might throw it into there, probably should have picked one of the assignments with a little less of a focus on phone work a computer would have been easier
Digitalferret 2/14/2022 6:08 AM
it may be that once you are "in" you could check for any betting apps and see what info, if any, they hold.user might have been kind and also left login details which would support your case going forward if you, theoretically, needed to apply for a warrant. (you likely know to access other's priv info without a warrant, or similar, could get you in more trouble than the <accused> - check country/state laws etc) (edited)
Avatar
yeah true ive definitely seen that i have to do a lot to tip toeing around this area i might just go more theoretical such as how'd i do it then actually give a demonstration on me doing it. just to aviod access something accidently and breaking laws especially with GDPR being so watched atm
Avatar
Avatar
Reaper 22
yeah true ive definitely seen that i have to do a lot to tip toeing around this area i might just go more theoretical such as how'd i do it then actually give a demonstration on me doing it. just to aviod access something accidently and breaking laws especially with GDPR being so watched atm
Digitalferret 2/14/2022 6:14 AM
so, who owns the phone. the way you are talking sounds like its real data you're potentially messing with
Avatar
the phone is owned by the college we've used it before for getting evidence of photos but its the first time being asked to get a form of transaction off a real company through the phone if the owner of the phone is aware in the sense of that were using the phone will that technically cancel out the GDPR part? the sense is the phone has been retrieved through an arrest but not for the reason in why were accessing this data we have cause to search the phone as were aware that the information is there. im starting to think writing in the assigment that it would be better to just use the prior knowledge and see if its enough to get granted access
6:24 AM
pretty much the background is the person arrested is being held on a different offence but we are and have been activly following the suspects activites in scams and money wiring through using peoples debit cards and then charing high amounts of transcations then when the money is cleared there using betting sites to wash the money between 2 accounts. the aim is to get the first account thrugh the transcations then using the info as a stepping stone to get the second account
Avatar
Digitalferret 2/14/2022 6:31 AM
sorry, i'm feeling particularly caffeine deficient here (dim) 🙂 are you saying that this phone is actually part of a real investigation, or has been explicitly "set up" by the college?
6:34 AM
theoretically, jurisdiction dependent, it might be be wise to seek legal counsel before going sideways. "we got <this>, but when we got in, we found <that>.
Avatar
set up by college
👍🏻 1
Avatar
perez0951#1093 2/14/2022 9:42 AM
Hey everyone. I’m wondering if you guys have any thoughts on Magnet Axiom v. FTK. We currently have axiom but our higher ups are looking at other options as well. Any thoughts are appreciated.
Avatar
Avatar
perez0951#1093
Hey everyone. I’m wondering if you guys have any thoughts on Magnet Axiom v. FTK. We currently have axiom but our higher ups are looking at other options as well. Any thoughts are appreciated.
Andrew Rathbun 2/14/2022 9:58 AM
What kind of cases do you normally work?
Avatar
Avatar
Andrew Rathbun
What kind of cases do you normally work?
perez0951#1093 2/14/2022 10:01 AM
We work mostly CP cases but we help with other things as well.
Avatar
@perez0951#1093 for CP cases I would look at Xways and Griffeye
Avatar
Avatar
DCSO
@perez0951#1093 for CP cases I would look at Xways and Griffeye
perez0951#1093 2/14/2022 10:51 AM
I was reading up on Xways but didn’t see a much difference between it and Axiom. I may have just missed it. Is there any reason you would suggest those over the other two?
Avatar
how can I find volume slack in fat16 file system?
Avatar
Avatar
perez0951#1093
Hey everyone. I’m wondering if you guys have any thoughts on Magnet Axiom v. FTK. We currently have axiom but our higher ups are looking at other options as well. Any thoughts are appreciated.
Axiom wins that.
11:19 AM
But you may want to stock up on tools I'd say. We have Inspector, X-Ways, Axiom and EnCase in our kit.
11:20 AM
Not every tool supports everything basically
Avatar
Avatar
perez0951#1093
I was reading up on Xways but didn’t see a much difference between it and Axiom. I may have just missed it. Is there any reason you would suggest those over the other two?
Axiom and XWays are very different approaches to forensics. Axiom presents you with interpreted data as artifacts which are categorized and sorted for you. You then follow the artifacts back to the source if you want more info. XWays is much more barebones, you need to manually dig through the file structure or know how to seek out specific files or file types that are pertinent to your case. I like Axiom for the speed at identifying artifacts and XWays for digging under the hood of the filesystem. The hex view in Axiom doesn't compare to XWays, though it also doesn't seem to be their intention to compete in that area.
11:30 AM
if you need to work in hex at all, XWays is the clear winner there
this 4
Avatar
Avatar
Rob
But you may want to stock up on tools I'd say. We have Inspector, X-Ways, Axiom and EnCase in our kit.
perez0951#1093 2/14/2022 11:35 AM
I get that. We usually only use axiom for our hard drives and cloud based services. We have Cellebrite for cellphones and other mobile stuff.
👍 1
Avatar
Avatar
perez0951#1093
I get that. We usually only use axiom for our hard drives and cloud based services. We have Cellebrite for cellphones and other mobile stuff.
Mobile side is the same. We have Oxygen, XRY, Axiom and Cellebrite.
Avatar
@Law Enforcement [USA] Hello all, can anyone tell me what kind of information Apple can offer if you provide them a UDID number? thank you
Avatar
I do mostly CP cases with NCIS and use primarily Axiom with Cellebrite next. Multiple tools are good if you can afford but sometimes, you’re stuck with what you have. Personally, after several hundred cases, I prefer Axiom for computers and mobile devices. Cellebrite is sometimes easier to get into a phone with, but I will@usually take that image and run it into Axiom. For me, Axiom is still much better at any social media and chats than Cellebrite - and I prefer how it handles tagged items better.
Avatar
What kind of info you looking for from Apple? I’ve had very bad luck with them. They are anti law enforcement and will make you jump through every possible hoop. Your better off using a grey key or similar to dump info.
Avatar
Just looking to identify the owner of the device
Avatar
anyone from berla or ive on the chat...
Avatar
I've had good luck with Apple including UUID-based search warrants although that was a few years back (for a UUID search).
1:33 PM
@C. Russell If you serve them with a search warrant based on UUID you can get subscriber info, account info, payment, etc. Everything you normally get by iCloud ID or phone number.
Avatar
@🥕Carrotney🥕 are you local or federal?
1:58 PM
If federal 18 U.S.C. § 2703 articulates the steps that the government must take to compel providers to disclose the contents of stored wire or electronic communications (including e-mail and voice mail) and other information such as account records and basic subscriber information. Section 2703 offers five mechanisms that a "government entity" can use to compel a provider to disclose certain kinds of information. The five mechanisms, in ascending order of required threshold showing, are as follows: 1) Subpoena; 2) Subpoena with prior notice to the subscriber or customer; 3) § 2703(d) court order; 4) § 2703(d) court order with prior notice to the subscriber or customer; and 5) Search warrant.
1:59 PM
2703d is similar to a subpoena and provides the info you need.
Avatar
How can you capture the decrypted packets in ic2kp?
Avatar
I’m spearheading a plan at work to move us to using virtual machines for a majority of our analysis(dead disk forensics aside, mostly IR work). I have the choice to use either proxmox and ceph for storage, or Hyper-V and storage spaces direct. I have a mental list of pros and cons, and am leaning towards proxmox despite the downside of it being fully self supported by me… and basically being a bloody homelab. I guess the TLDR is Has anyone here actually run a forensics lab off of proxmox or should I stick to Hyper-V despite some of the pains it has? (Please ping me since I will probably forget about this in 10 seconds) (edited)
Avatar
Avatar
Turb0Yoda
I’m spearheading a plan at work to move us to using virtual machines for a majority of our analysis(dead disk forensics aside, mostly IR work). I have the choice to use either proxmox and ceph for storage, or Hyper-V and storage spaces direct. I have a mental list of pros and cons, and am leaning towards proxmox despite the downside of it being fully self supported by me… and basically being a bloody homelab. I guess the TLDR is Has anyone here actually run a forensics lab off of proxmox or should I stick to Hyper-V despite some of the pains it has? (Please ping me since I will probably forget about this in 10 seconds) (edited)
DeeFIR 🇦🇺 2/14/2022 6:04 PM
I run a personal lab in PVE, I don't use Hyper-V. It would be easier to provision/manage/destroy VMs if you're going to do it programmatically through PVE's API.
Avatar
Avatar
DeeFIR 🇦🇺
I run a personal lab in PVE, I don't use Hyper-V. It would be easier to provision/manage/destroy VMs if you're going to do it programmatically through PVE's API.
yeah- the plan is to use IaaS to deploy everything. I am not adverse to running proxmox, but putting it in prod is scaring me a little...
6:04 PM
and frankly, Hyper-Vs networking stack gives me an aneurysm.
Avatar
DeeFIR 🇦🇺 2/14/2022 6:05 PM
Is there a reason ESXi isn't a contender?
Avatar
Avatar
DeeFIR 🇦🇺
Is there a reason ESXi isn't a contender?
want HA/clustering and unfortunately I was unable to push the vSphere HCI kit in the budget
Avatar
Avatar
Examinator
I do mostly CP cases with NCIS and use primarily Axiom with Cellebrite next. Multiple tools are good if you can afford but sometimes, you’re stuck with what you have. Personally, after several hundred cases, I prefer Axiom for computers and mobile devices. Cellebrite is sometimes easier to get into a phone with, but I will@usually take that image and run it into Axiom. For me, Axiom is still much better at any social media and chats than Cellebrite - and I prefer how it handles tagged items better.
I agree. Axiom is much better at finding artifacts than Cellebrite. Cellebrite is okay for verifying and acquiring data. Not for digging into the data for evidence.
Avatar
silvanceknight 2/15/2022 4:32 AM
We have Cellebrite in our lab, but most of us prefer XRY honestly.
Avatar
Digitalferret 2/15/2022 5:55 AM
umm how did @SPVQct2842 Eric topic get into #rules ? 🙂 - anyhoo, maybe this helps - GUID/Hash guides if you hadn't found already CoCreateGuid( (::GUID*)&GUID ); </source> The Shareaza 2.0 code appears to be generating GGUID values without using CoCreateGUID. In Network.cpp, the CreateID method fills the value of a GGUID using the tick count, an incremented count, and the rand function. not a coder myself but had spare time to go looking. hth
Avatar
Avatar
Digitalferret
umm how did @SPVQct2842 Eric topic get into #rules ? 🙂 - anyhoo, maybe this helps - GUID/Hash guides if you hadn't found already CoCreateGuid( (::GUID*)&GUID ); </source> The Shareaza 2.0 code appears to be generating GGUID values without using CoCreateGUID. In Network.cpp, the CreateID method fills the value of a GGUID using the tick count, an incremented count, and the rand function. not a coder myself but had spare time to go looking. hth
Looking into that 😝
Avatar
Digitalferret 2/15/2022 7:20 AM
hehe, LE-37 c4n4d14|| |-|4><Or no doubt - even labels as LE 🏴☠
Avatar
Question for a blue teamer. How would you rank the following certifications? Comptia Pentest + Elearn eJPT EC Council Certified Pentester
Avatar
DeeFIR 🇦🇺 2/15/2022 4:04 PM
You're asking a blue teamer to evaluate the quality of red teaming certificates?
Avatar
No. For me. A blue teamer who knows nothing about pentest certs
4:31 PM
Sorry phrasing was confusing
Avatar
Avatar
conf1ck3r
Question for a blue teamer. How would you rank the following certifications? Comptia Pentest + Elearn eJPT EC Council Certified Pentester
Andrew Rathbun 2/15/2022 4:41 PM
#training-education-employment would be a good spot for that
👍 1
4:41 PM
And @RandyRanderson might have some good input on that (edited)
Avatar
Avatar
conf1ck3r
Question for a blue teamer. How would you rank the following certifications? Comptia Pentest + Elearn eJPT EC Council Certified Pentester
RandyRanderson 2/15/2022 7:13 PM
If it isn’t OSCP or GPEN it’s too basic
👍 1
7:15 PM
eJPT has some merit. But again, considered by many in the red team area as too basic.
👍 1
Avatar
Avatar
RandyRanderson
If it isn’t OSCP or GPEN it’s too basic
How well is GPEN considered? Especially compared to the OSCP (which I see a lot more positions asking for)
Avatar
Avatar
Tcisaki
How well is GPEN considered? Especially compared to the OSCP (which I see a lot more positions asking for)
RandyRanderson 2/15/2022 7:32 PM
OSCP has become the de facto cert for network pen testing. Largely because it’s actually cheap to take, it’s now a proctored test, and they just updated it to make you steal the AD of a domain controller. Effectively you’re actually doing pen testing. GPEN has gotten WAY more involved. But what it hits on that makes it’s valuable is they talk about the admin side. I’ve done both OSCP and GPEN, among many others, and GPEN is much more a corporate cert. they’ve done great at advancing the material…but even in my SANS bias eyes Offensive Security has done a much better job
💯 1
7:33 PM
I see GPEN more on CSIRT jobs than I do actual red team classes. But. There are other SANs classes that are stepping up the game
💯 1
Avatar
That was my thinking as well. Thanks Randy
Avatar
Avatar
Tcisaki
That was my thinking as well. Thanks Randy
RandyRanderson 2/15/2022 8:41 PM
Always mate!
Avatar
tyl3rdurd3n 2/16/2022 4:18 AM
New here so I hope my question isn't I'll formed. Seems like trying to inspect devices for hardware subversion/sabotage is particularly hard to go backwards and find all affected instances of. Would a kind of Circuit Board "OCR" be useful there? Like if you could throw the boards on a conveyor belt under camera trained to identify ICs. Maybe the bot could spot any boards that have components not in original design? Might be weird idea or wrong channel apologies if so.
Avatar
xray and compare to known good?
👍 1
Avatar
Avatar
tyl3rdurd3n
New here so I hope my question isn't I'll formed. Seems like trying to inspect devices for hardware subversion/sabotage is particularly hard to go backwards and find all affected instances of. Would a kind of Circuit Board "OCR" be useful there? Like if you could throw the boards on a conveyor belt under camera trained to identify ICs. Maybe the bot could spot any boards that have components not in original design? Might be weird idea or wrong channel apologies if so.
randomaccess 2/16/2022 4:57 AM
Possibly useful but how would you get the reference boards?
Avatar
tyl3rdurd3n 2/16/2022 4:59 AM
Mm true those are probably a bit coveted by companies designing them.
Avatar
randomaccess 2/16/2022 5:02 AM
Not only that, you buy a Samsung galaxy s8 at two different times and they might have different components
5:03 AM
I just pulled apart two MacBook Pros with the same model number and they had different nvme drives with different connection ports internally
😩 1
this 1
5:03 AM
Unfortunately for us, they don't care about us
Avatar
tyl3rdurd3n 2/16/2022 5:09 AM
Oh geez. Didn't realize that was the state of affairs.
5:11 AM
More thinking needed. So it's not totally absurd in theory though? Assuming we all played nice and stuck to consistent manufacturing processes
5:11 AM
Perhaps the last part is what makes it absurd 😅
Avatar
silvanceknight 2/16/2022 6:19 AM
I've got CySA+ coming up in two weeks. Any of you guys taken it before?
Avatar
Avatar
silvanceknight
I've got CySA+ coming up in two weeks. Any of you guys taken it before?
Andrew Rathbun 2/16/2022 6:57 AM
#training-education-employment
Avatar
Original message was deleted or could not be loaded.
Yes, using it but not a sysadmin for it, so I can only offer best effort advice. What are you seeing?
Avatar
Curious if anyone recognizes this device based on camera pattern?
Avatar
do you think the bottom opening is a camera lens or a button?
Avatar
I was guessing a camera, looks like the flash maybe on the right of that lens?
Avatar
yeah - so two cameras and that top one is suuuper close to the edge of the phone
Avatar
If I were to guess, something close to HTC One M8
11:05 AM
That sorta style
11:06 AM
Not the exact same model, but kinda close.
Avatar
dang it - i hjust found the one m8
11:07 AM
how were you searching? I was doing a feature search on gsm arena
Avatar
List of Dual Lens Camera Phones and Advantages of Dual Camera Smartphones. Updated List of Dual Rear Camera and Dual Front Camera Mobile Phones based on Android, iOS & Windows Phone.
11:07 AM
😂
Avatar
nice! good hunting! 🙂 Could be it, very close! Its a mirror shot so flash would be on the other side like the one m8 is. Just wondering what that is in the top right of the flash, looks like an additional flash/sensor?
11:10 AM
Or maybe just some wierd artifact reflected off of the case
11:13 AM
Thanks @Rob & @whee30!
👍 2
Avatar
Has anyone had a judge order the return of a device prior to the case concluding? We have a judge saying we have a FFS of the device so there is no need to keep the phone as we have everything we are going to get. Anyone have valid argument points? I have a few which hinge on best evidence rule but maybe I am overlooking.
Avatar
Avatar
Ghosted
Has anyone had a judge order the return of a device prior to the case concluding? We have a judge saying we have a FFS of the device so there is no need to keep the phone as we have everything we are going to get. Anyone have valid argument points? I have a few which hinge on best evidence rule but maybe I am overlooking.
Andrew Rathbun 2/16/2022 3:58 PM
That doesn't seem to pass the common sense rule....why does this judge care?
Avatar
He feels we should give it back and says we have an image of the phone so need to keep
Avatar
randomaccess 2/16/2022 4:00 PM
Depends on the case
4:00 PM
Is it a requirement for that person to do their job Does it have CSAM on it Is it the victims or accessed
4:00 PM
Accused*
4:01 PM
Is the defense examiner going to want to examine the original device
Avatar
It’s a bank robbery case and the defendant wants his phone back that’s the crux
Avatar
Andrew Rathbun 2/16/2022 4:14 PM
Everyone wants their phones back ASAP because it's like their second brain, they can't live without it for 2 seconds 😆
👍 5
Avatar
I have returned phones to their owner after extraction but before charges in some cases. It has either come directly from upper management or from my DA. I have not had a judge order me to do that, yet.
👍 1
Avatar
Could I say this, the extraction I have is only a FFS and not a physical. So I do not have everything from the device. Technology could advance in the future allowing for a physical extraction which would be more data than we currently have.
4:21 PM
I know we most likely will not get the ability to get the physical because it’s FBE but who knows what the brilliant minds of tomorrow will develope
Avatar
Valid points and I totally agree with following the best practices of keeping the phone until the case is fully concluded. I also know who signs my paycheck and how to follow orders! 😅
4:26 PM
I would document in your report the reason for releasing the evidence since it is against best practice. I always document in each report the date/time I received and released/booked each evidence item. I only document the reason why it was I did one of those things if it is out of the ordinary.
Avatar
Is there a specific document I can reference for best practice on this?
Avatar
Avatar
Ghosted
Is there a specific document I can reference for best practice on this?
DeeFIR 🇦🇺 2/16/2022 4:47 PM
the principle of best evidence?
👍 4
Avatar
randomaccess 2/16/2022 5:07 PM
Most cases its probably ok to return after you've done your extraction. You're not likely to get more evidence in 6 months time. Maybe advancements etc but you're probably ok. You can still make a song and dance about it though and make sure the judge signs off on them being held responsible if something arises that requires the device
5:08 PM
Like, finding something that is truely easier for everyone to understand if demonstrated in court on the original device
Avatar
Avatar
Ghosted
Is there a specific document I can reference for best practice on this?
ScottKjr3347 2/16/2022 5:46 PM
Don’t forget about acquired device data validation. Having the original device allows for the acquired data to be validated via hand scrolling on the physical device. My wife works in DNA and it makes me think…would a judge order LE to hand over a blood soaked t-shirt after DNA analysis is completed because it’s the defendants favorite shirt?
👍 4
Avatar
I have released items in the past when both prosecution and defense agree to accept the download as the best available evidence.
Avatar
Avatar
whee30
I have released items in the past when both prosecution and defense agree to accept the download as the best available evidence.
DeeFIR 🇦🇺 2/16/2022 6:17 PM
Yeah, if there's an undertaking that both parties agree to and they both understand the risks involved, then sure, it's out of the IO's hands.. but if they're uneducated, not adequately informed, and the issue of integrity/custody/interpretation/extraction/whatever is raised later - then guess who it's going to come back on.
Avatar
Hello everyone. Are there any US persons in Europe who will testify for the defense? The Prosecutors office that I am testing for asked if I could supply them with a digital forensic expert that's in Europe like a co-worker or something... we don't do that so she asked if maybe OSI or CID or someone else has anyone.
Avatar
Carb0hydrates 2/17/2022 10:35 AM
Does anybody have a successful experience with obtaining Microsoft Teams data using Axiom?
Avatar
Avatar
Ghosted
Has anyone had a judge order the return of a device prior to the case concluding? We have a judge saying we have a FFS of the device so there is no need to keep the phone as we have everything we are going to get. Anyone have valid argument points? I have a few which hinge on best evidence rule but maybe I am overlooking.
We have had this argument over and over here, one example was do you give back a T-shirt after swabbing it for DNA, Swabbing a Gun ? Its original evidence blah blah ..... usually the judge will start to rethink it. They can have it back 90 days after the case is complete.
👍 4
Avatar
Avatar
Carb0hydrates
Does anybody have a successful experience with obtaining Microsoft Teams data using Axiom?
No experience but I know that Axiom has an entire setup guide at https://www.magnetforensics.com/blog/investigating-microsoft-teams-with-magnet-axiom-cyber/
In this blog we’ll discuss the steps necessary for investigators to complete to acquire MS Teams data directly into AXIOM Cyber.
Avatar
Carb0hydrates 2/17/2022 1:33 PM
Thank you for the information. I was able to find this as well, but when we went through Azure, the Magnet application never showed up. Even when logged in as the global admin.
1:33 PM
I'll give it another go though, perhaps it was just delayed.
Avatar
Hey is there anytool to convert timestamps like this 2019-01-20 21:11:38Z to EST (I know an offline tool like Dcode date time exists but I was hoping to get to know an alternative)
3:22 PM
I mean a simple -5 also works
3:23 PM
but I need to automate this, so I was hoping for a program
Avatar
writing a python script is probably the easiest
Avatar
Yeah, I was planning on doing that, but if something like it already exists why re-invent the wheel?
👍 2
Avatar
Avatar
perez0951#1093
I was reading up on Xways but didn’t see a much difference between it and Axiom. I may have just missed it. Is there any reason you would suggest those over the other two?
forensicMouse 2/17/2022 4:20 PM
I had a thumbdrive with a deleted zip container of photos. X ways was able to carve the contents inside the container, Axiom only parsed the file name of the zip container
Avatar
Avatar
ArcherL
Yeah, I was planning on doing that, but if something like it already exists why re-invent the wheel?
I have a python script that does that for Internet proxy logs. Just feed the dates in a loop (you'll have to pull them out yourself). Stack exchange was a big help. The relevant part for you is about 20 lines. I can make it stand alone.- I can paste here or dm you if you prefer. (are we allowed to paste code here?).
💯 1
Avatar
DM would be better! Thanks again for the help!!
Avatar
Sent.
😁 1
Avatar
Avatar
ArcherL
Hey is there anytool to convert timestamps like this 2019-01-20 21:11:38Z to EST (I know an offline tool like Dcode date time exists but I was hoping to get to know an alternative)
Is the data in a spreadsheet? If so you can just create a column and subtract the time.
Avatar
Why didn't I think this lol!!
6:49 PM
but there are some text files as well, so a python script was better
Avatar
Avatar
ArcherL
Why didn't I think this lol!!
This is why we ask questions. To remember what we had previously forgotten 😄
Avatar
Is anyone here familiar with attempts to create some kind of standardised digital forensic import/export format (CASE)? The idea I assume is for all DF/cyber tools to support this to allow more efficient workflows, enhance testing/validation etc. I have some info about it, can see how it's a good idea but wondering if this is even still alive? I have not noticed this in the popular tools, but could be it has somehow passed me by!
Avatar
This is why I always hash evidentiary items when copying to another volume!
10:59 AM
Copied the Axiom portable case and associated report items to a flash drive to give to the investigating officer, hashed everything with 7zip, and got two different values even though they are the exact same size down to the byte. Something somewhere flipped a bit.
Avatar
Especially to usb flash drives!
Avatar
Avatar
FullTang
This is why I always hash evidentiary items when copying to another volume!
did you use the native Explorer to copy? Wondering if that messed something up along the way. Could try something like Teracopy to see if hashes get changed using another copy software (edited)
Avatar
Avatar
stark4n6
did you use the native Explorer to copy? Wondering if that messed something up along the way. Could try something like Teracopy to see if hashes get changed using another copy software (edited)
I did use native explorer. I have already deleted the copy, recopied, and rehashed. The hashes matched the 2nd time. This isn't the first time it has happened to me, but the previous time I wasn't 100% positive it wasn't somehow user error. This time I know all I did was copy and hash. It is a "Verbatim" USB so not the best quality.
Avatar
Avatar
FullTang
Copied the Axiom portable case and associated report items to a flash drive to give to the investigating officer, hashed everything with 7zip, and got two different values even though they are the exact same size down to the byte. Something somewhere flipped a bit.
Never use 7zip to hash a folder, I don't know why but it produce stranger and unreproducible results. Always calc the hash on files. I suggest you to use teracopy or fastcopy to copy and verify You can also use rapidcrc unicode (it's my favorite but you can use what you want, also a powershell/terminal command) to calc hashes of files and save a checksum file
Avatar
Avatar
Flavius
Never use 7zip to hash a folder, I don't know why but it produce stranger and unreproducible results. Always calc the hash on files. I suggest you to use teracopy or fastcopy to copy and verify You can also use rapidcrc unicode (it's my favorite but you can use what you want, also a powershell/terminal command) to calc hashes of files and save a checksum file
Interesting. Do you still trust the hashing function of 7zip on individual files?
Avatar
Avatar
FullTang
Interesting. Do you still trust the hashing function of 7zip on individual files?
Yes, never had any issue on individual files. Anyway, try using the software I've listed (they are also portable), I bet you'll never go back 😉
Avatar
Digitalferret 2/18/2022 2:30 PM
wondering if its hashing any hidden system files in the folder?
Avatar
Avatar
Flavius
Yes, never had any issue on individual files. Anyway, try using the software I've listed (they are also portable), I bet you'll never go back 😉
Do Taracopy and fastcopy automatically verify that the copy was successful and generate a checksum? I like removing steps from my workflow so if I only have to do one thing instead of having to come back to it and hash after copying it that is fantastic.
Avatar
Hey guys, know of a solid repo or have a good resource on cybersecurity policy templates/examples(been googling but that I would ask)
Avatar
Yes, you can turn on the verification and generate a checksum. Teracopy supports more hash types and has a better integration into the system IMO
Avatar
Been playing with it, I like it. Thanks! (edited)
Salute 1
Avatar
Hey, So I was going through one of my assignments and doing analysis for the Downloaded files, and I got Prefetch analysis, Autopsy and I am looking at the downloaded file via FTK Imager (I have the image file). The timestamps in all three (when it was created) are different!
3:02 PM
Like one time stamp is 1/21/2019 5:10 AM and other is 1/20/2019 7:19 PM and they other is like 1/21/2019 2:10 PM
3:03 PM
I am really very confused, anyone has any idea what am I or might be doing wrong?
Avatar
Avatar
ArcherL
Like one time stamp is 1/21/2019 5:10 AM and other is 1/20/2019 7:19 PM and they other is like 1/21/2019 2:10 PM
Ross Donnelly 2/19/2022 5:18 PM
If the minutes and seconds are the same and just the hours are different (for the 5:10 and 14:10 timestamps) the chances are it's a timezone issue, with one tool reporting in UTC and the other your local timezone
💯 1
Avatar
All the timestamps are in UTC, actually (edited)
Avatar
Avatar
ArcherL
Like one time stamp is 1/21/2019 5:10 AM and other is 1/20/2019 7:19 PM and they other is like 1/21/2019 2:10 PM
But I got it cleared, I drew the whole timeline and pretty much got to a conclusion (ignored this one file with weird timestamps)
7:28 PM
Can we have a blockchain channel?
7:32 PM
Crypto Issue: Just letting people here know, Do not click any links coming from discord or anyone on discord, OpenSea, Etherscan, Metamask & Revoke have had some issues and there is a huge amount of phishing links going around right now. Revoke all approvals from OpenSea if you think you may have interacted with a malicious website, any malicious website, in the past few months.
👍🏻 1
Avatar
Avatar
B74
Can we have a blockchain channel?
Andrew Rathbun 2/19/2022 8:42 PM
#darknet-virtual-currencies is probably the best we can do for now. If you want blockchain added to the channel name, then that can be arranged
Avatar
I mean, it’s upcoming and most likely going to be discussed here at some point wether it’s security, audits, hacks or vulnerabilities etc.
Avatar
Avatar
B74
I mean, it’s upcoming and most likely going to be discussed here at some point wether it’s security, audits, hacks or vulnerabilities etc.
Andrew Rathbun 2/19/2022 9:00 PM
Gun to head though, that's currently the most appropriate channel for blockchain-related discussion with current channel naming convention. Either that or just a general question in #general-discussion-and-questions 🤷‍♂️
Avatar
is there any tool online/offline where we can draw the timeline for any forensic investigation?
9:35 AM
I was using white board, but it get very shabby and disoriented, so a software would be better, or everyone uses an excel sheet? (edited)
Avatar
Excel is actually better
Avatar
I use joplin for my running notes/timeline/abstract for IR; (cmd+shift+t, ctrl+shift+t) to drop in quick timestamps
10:04 AM
but the more formal version lives in our ticketing system
10:05 AM
spreadsheets are really good though
Avatar
I am using excel but thing is the X axis is only taking dates @rayeh (edited)
10:54 AM
and not the time
10:54 AM
10:54 AM
it looks like this, lol which is useless from an analysis stand point lol (edited)
Avatar
thatboy_leo 2/20/2022 11:20 AM
Having trouble imaging an encrypted bit locker laptop using Paladin. Secure boot has been disabled. No error messages just a blank “_” icon. Has anyone encountered this?
Avatar
ThatLukeGuy 2/20/2022 2:58 PM
Looking for some info in regards to email forensics. Some quick facts about the case. The suspect is spoofing the email domain to appear to work for a popular vacation rental company. The suspect is then setting up vacation rentals fraudulently and accepting deposits. When the victims arrive in town and go to speak with the vacation rental company, they obviously have no record of any of this.
2:59 PM
I am somewhat aware of how email domain spoofing works. One victim utilizes protonmail. My thought it to see if the victim can obtain the raw email to include header information and examine that for info. Short of being the victim being able to get the raw email from protonmail, I do not feel like there is much to go on short of chasing down the financial side of it.
2:59 PM
Any thoughts anyone?
Avatar
DeeFIR 🇦🇺 2/20/2022 3:01 PM
When you're saying the suspect is spoofing the domain, are they actually spoofing it? Is it the exact same domain? Can you speak to the victims and ask for a copy of any emails they've received? You'd need to confirm it yourself before you start identifying the technical side of things.
Avatar
ThatLukeGuy 2/20/2022 3:02 PM
Domain is EXACT. Not a close match.
Avatar
DeeFIR 🇦🇺 2/20/2022 3:02 PM
Is it actually being sent from that account/domain? What makes you think it's spoofed and not a compromised account?
Avatar
ThatLukeGuy 2/20/2022 3:02 PM
Vacation rental company has no record of this particular email ever existing.
Avatar
DeeFIR 🇦🇺 2/20/2022 3:03 PM
You really need the headers to confirm where it's come from, not just the vanity/display name
Avatar
ThatLukeGuy 2/20/2022 3:03 PM
Yep. This is what I figured, I just do not know if ProtonMail will allow the user to download the raw email. Ill go test this now
3:04 PM
I presume ProtonMail would likely not respond to my subpoena....
Avatar
DeeFIR 🇦🇺 2/20/2022 3:05 PM
You don't need to subpoena them, the victim who uses protonmail can view it for themselves Go to the email, select 'more' then 'view headers'. Looks like this (edited)
👍 2
3:09 PM
Avatar
Im fairly sure you can get email header information from most email providers
Avatar
Avatar
ThatLukeGuy
I presume ProtonMail would likely not respond to my subpoena....
They're really not le friendly from experience
this 2
Avatar
Avatar
DeeFIR 🇦🇺
You don't need to subpoena them, the victim who uses protonmail can view it for themselves Go to the email, select 'more' then 'view headers'. Looks like this (edited)
Andrew Rathbun 2/20/2022 5:16 PM
Avatar
ThatLukeGuy 2/20/2022 5:27 PM
Yep. Did some testing. Easily accessible from the UI. Thanks for the help guys.
Avatar
Avatar
ThatLukeGuy
Domain is EXACT. Not a close match.
Arman Gungor 2/20/2022 8:57 PM
Something to look into, if you haven't, is the DMARC configuration of the target domain to determine if it is in a "spoofable" state. This can be done through DNS without a sample message. If you can obtain a sample message, then you will be in a much better place to determine what happened. For instance, how DKIM and ARC played out, etc.
this 1
Avatar
Avatar
Arman Gungor
Something to look into, if you haven't, is the DMARC configuration of the target domain to determine if it is in a "spoofable" state. This can be done through DNS without a sample message. If you can obtain a sample message, then you will be in a much better place to determine what happened. For instance, how DKIM and ARC played out, etc.
randomaccess 2/21/2022 1:31 AM
Now if only there was an email forensics training class
❤️ 2
Avatar
Hey guys I have another quick question, I have been asked to list the newsgroups that the owner of the computer is registered with by analysing the same image file. So I looked at the web history within autopsy and found 2600.com, cnn.com, drudgereport.com etc. Will this be classes as newsgroups registered to the user eventhough he didnt sign up to the site? (edited)
6:54 AM
Sorry last thing from the screenshot below would it be correct in saying the time zone is central standard time? (edited)
6:54 AM
Avatar
Avatar
razzmountz
Click to see attachment 🖼️
Digitalferret 2/21/2022 7:03 AM
if i recall right, the PC populates itself with a full list of Newsgroup topic names. once you click, or whatnot, it will populate the sub-topic with headers. then, client dependent i guess, you would download messages / attachments that you were interested in. maybe check for larger sized sub-folders?
7:03 AM
also, might be of use to find what the perp used as a client. with a view to what gets downloaded on auto
Avatar
Just looking for some input on new lab workstations. We are looking at replacing our entire lab and these are the specs we've been quoted from Dell. Most case work is CP related and software used is primarily Axiom, Cellebrite, Griffeye, EnCase.
Avatar
Avatar
jaket2452
Just looking for some input on new lab workstations. We are looking at replacing our entire lab and these are the specs we've been quoted from Dell. Most case work is CP related and software used is primarily Axiom, Cellebrite, Griffeye, EnCase.
Precision 7820 Tower XCTO Base -2x Intel Xeon Silver 4210R 2.4GHz,(3.2GHz Turbo, 10C, 9.6GT/s, 2UPI,13.75MBCache,HT(100W) DDR4-2400) -NVIDIA Quadro P2000, 5GB -64GB 8x8GB DDR4 2933MHz RDIMM ECC Memory -M.2 2TB PCIe NVMe Class 40 Solid State Drive
Avatar
Digitalferret 2/21/2022 7:06 AM
finding actual content would certainly strengthen any argument: Mens rea
Avatar
Thanks guys what about the screenshot am I correct in saying its central standard time sorry if it is a dumb question
Avatar
Avatar
jaket2452
Precision 7820 Tower XCTO Base -2x Intel Xeon Silver 4210R 2.4GHz,(3.2GHz Turbo, 10C, 9.6GT/s, 2UPI,13.75MBCache,HT(100W) DDR4-2400) -NVIDIA Quadro P2000, 5GB -64GB 8x8GB DDR4 2933MHz RDIMM ECC Memory -M.2 2TB PCIe NVMe Class 40 Solid State Drive
I have to ask why they're providing you with 2933MHz memory when the CPU can't do more than 2400MHz?
7:43 AM
Unless it's cheaper for the faster memory, that might be something worth querying if you don't plan on upgrading the CPUs in the future?
Avatar
Avatar
Matt
I have to ask why they're providing you with 2933MHz memory when the CPU can't do more than 2400MHz?
That's a good catch. I don't have an answer yet. Maybe it is cheaper, but I would bet it equates to higher profit on their end.
Avatar
Also might be worth finding out what version of PCIe they're using for the m.2 drive, the CPUs don't support higher than 3.0, so make sure they're not trying to throw in 4.0 😂 (edited)
Avatar
Does anyone have a copy of a contract for doing DF work? I’m looking to do some work on the side for a lawyer. Thanks.
Avatar
Does anyone know if there is a booklet for study, for the EC council cyber forensic associate by chance
Avatar
Avatar
jaket2452
Precision 7820 Tower XCTO Base -2x Intel Xeon Silver 4210R 2.4GHz,(3.2GHz Turbo, 10C, 9.6GT/s, 2UPI,13.75MBCache,HT(100W) DDR4-2400) -NVIDIA Quadro P2000, 5GB -64GB 8x8GB DDR4 2933MHz RDIMM ECC Memory -M.2 2TB PCIe NVMe Class 40 Solid State Drive
I would maybe move to RAID NVMe. That's what our beefiest rig has, other systems have RAID SSD.
  • we run AXIOM, EnCase, X-Ways for mostly IR, some deep dive dead disk stuff
9:21 PM
agreed with the mem speed and NVMe gen stuff tho
Avatar
@A_A_Ron writing a novel?
Avatar
Avatar
jaket2452
Precision 7820 Tower XCTO Base -2x Intel Xeon Silver 4210R 2.4GHz,(3.2GHz Turbo, 10C, 9.6GT/s, 2UPI,13.75MBCache,HT(100W) DDR4-2400) -NVIDIA Quadro P2000, 5GB -64GB 8x8GB DDR4 2933MHz RDIMM ECC Memory -M.2 2TB PCIe NVMe Class 40 Solid State Drive
I recently got a 5820, with the Intel Xeon Processor W-2265 (12C 3.5GHz 4.8GHz Turbo HT 19.25MB 165W DDR4-2933), 64GB 4x16GB DDR4 2933MHz RDIMM ECC Memory, (2) M.2 1TB PCIe NVMe Class 40 Solid State Drive, and added two 4Tb SATA's on the intel Raid config (went to RAID 0 for 8tb). I went with the RTX A4000 16GB for the GPU, which is "the most powerful single-slot GPU for professionals, delivering real-time ray tracing, AI-accelerated compute, and high-performance graphics to your desktop." This was decided after talking with a Dell engineer. It was a few months ago, but if I recall, the price difference of upgrading the GPU was pretty negligible for the price of "future proofing" the rig. My ICAC counterparts were pricing out Dells at the same time and also did the upgrade. My only complaint with the Dell set up is that when running hashcat to crack passcode history files, it will overheat the GPU and shut down on a multiple pc file (think five hashes). Without the ability to manual control my fans from the desktop, I have to run them one or two at a time (for some reason, the main fans don't kick on when hashing). The RTX A4000, however, runs single passcodes much faster than my other machines. I have been pretty happy with the Dell, and the pricing was absolutely unbeatable (gov't contract, however) and we included the 3 year I break it they fix it protection plan. All this being said, 99% of my work is phones, so I'm usually doing "smaller" file sets.
Avatar
Avatar
DFE Travis
@A_A_Ron writing a novel?
It was more of a novela 😆
Avatar
Oh, I guess you were lmaoo
Avatar
@Law Enforcement [UK] Those who currently use Griffeye, do you wait until the home office authorise a new release before using or do you go ahead and use it with the hope it doesn’t effect your CAID uploads?
Avatar
Avatar
AP95
@Law Enforcement [UK] Those who currently use Griffeye, do you wait until the home office authorise a new release before using or do you go ahead and use it with the hope it doesn’t effect your CAID uploads?
we wait
👍 1
Avatar
Nullable Truth 2/22/2022 10:27 AM
We use it. Hasn't affected caid uploads.
👍 1
Avatar
Avatar
AP95
@Law Enforcement [UK] Those who currently use Griffeye, do you wait until the home office authorise a new release before using or do you go ahead and use it with the hope it doesn’t effect your CAID uploads?
@we wait in Sussex
👍 1
Avatar
Nullable Truth 2/22/2022 10:28 AM
We have internal caid export testing too beforehand for 2.0 Vics json
Avatar
Avatar
AP95
@Law Enforcement [UK] Those who currently use Griffeye, do you wait until the home office authorise a new release before using or do you go ahead and use it with the hope it doesn’t effect your CAID uploads?
We use new. Doesn’t effect any uploads.
👍 1
Avatar
The CAID team won't like that. If i remember correctly they have chased issues in the past that were caused by people updating to the newest version without giving them a chance to test it.
👍 1
Avatar
Avatar
AP95
@Law Enforcement [UK] Those who currently use Griffeye, do you wait until the home office authorise a new release before using or do you go ahead and use it with the hope it doesn’t effect your CAID uploads?
we wait
👍 1
Avatar
In Northumbria we wait till given the go ahead
👍 1
Avatar
Same at herts
👍 1
Avatar
Can anyone help me with the dd command? I want to hide something in sector 4 of a device containing an MBR
Avatar
Thanks everyone that’s brilliant
Avatar
Avatar
Henil
Can anyone help me with the dd command? I want to hide something in sector 4 of a device containing an MBR
You need a hexeditor for that. Not dd.
Avatar
how can I go about doing that?
Avatar
Avatar
Henil
how can I go about doing that?
Andrew Rathbun 2/22/2022 11:32 AM
Just download a hex editor and edit the hex. 010 Editor is a good one. EditPad Pro is another capable tool. Really any text editor not named Notepad more than likely has hex editing capabilities. (edited)
Avatar
Avatar
Andrew Rathbun
Just download a hex editor and edit the hex. 010 Editor is a good one. EditPad Pro is another capable tool. Really any text editor not named Notepad more than likely has hex editing capabilities. (edited)
I'm using kali so is there any built-in hex editor?
Avatar
Avatar
Henil
I'm using kali so is there any built-in hex editor?
Andrew Rathbun 2/22/2022 11:34 AM
In this guide, we show the step by step instructions to install and use hex editors on Kali Linux.
Avatar
Avatar
Andrew Rathbun
okay I'll take a look at it. Thanks for sharing it. what should I do next after opening the disk in a hex editor?
Avatar
Avatar
Henil
okay I'll take a look at it. Thanks for sharing it. what should I do next after opening the disk in a hex editor?
Andrew Rathbun 2/22/2022 11:39 AM
Why don't you take a stab at it first and then come back and ask for help. Once you get into hex view, you'll be in a lot better position to attempt what you're trying to do
Avatar
Avatar
Andrew Rathbun
Why don't you take a stab at it first and then come back and ask for help. Once you get into hex view, you'll be in a lot better position to attempt what you're trying to do
I tried doing something like this
Avatar
mellotronworkerscotland 2/22/2022 11:54 AM
We wait too
Avatar
but I get all 0's
Avatar
There isn't an mbr then
12:01 PM
Thanks!! I will try to find something with MBR
Avatar
sudo dd if=/dev/sda count=1|hexdump -C [sudo] password for user: 1+0 records in 1+0 records out 512 bytes copied, 9.1899e-05 s, 5.6 MB/s 00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| * 000001b0 00 00 00 00 00 00 00 00 47 f5 e1 5f 00 00 00 00 |........G.._....| 000001c0 01 00 ee fe ff ff 01 00 00 00 af 6d 70 74 00 00 |...........mpt..| 000001d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| * 000001f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 aa |..............U.| 00000200 This is what my protective MBR looks like (GPT)
Avatar
yea I was reading an article and it also had something like this
12:12 PM
but for some reason my MBR is all 0's
12:12 PM
is it because it's a virtual disk?
Avatar
Don't think so. What makes you think it has an MBR?
Avatar
cause I added the disk in my kali and it was mounted and when I do 'fdisk -l' it shows the disk so I thought it might have a MBR
12:14 PM
12:15 PM
if I change sdb to sda it does show me something like ^^^
Avatar
I really need to see the latter half of the sector to tell if it has an MBR (edited)
12:16 PM
ending in 55 aa like mine did is a good sign
Avatar
okay hold up let me go and grab the other half
12:17 PM
12:17 PM
mine also ends in 55 aa
Avatar
does it have two partitions?
Avatar
It looks to me like a MBR with a GRUB bootloader
Avatar
Avatar
AmNe5iA
does it have two partitions?
I think 3
Avatar
the 2nd one is an extended one so the rest of the partition information is stored in an EBR
Avatar
so the sda2 is an extension of sda1?
Avatar
I suspect the rest of the GRUB bootloader resides in the sectors after the MBR probably including sector 4. Before hiding anything there it is probably best to check. try increasing the count= to 5 or 6
Avatar
Avatar
Henil
so the sda2 is an extension of sda1?
No, it is a special partition that can hold an unlimited amount of other partitions. Without using an extended partition you are limited to 4 partitions with an MBR
Avatar
Avatar
AmNe5iA
I suspect the rest of the GRUB bootloader resides in the sectors after the MBR probably including sector 4. Before hiding anything there it is probably best to check. try increasing the count= to 5 or 6
what does increasing the count mean when we change it from 1 to 5 or 6?
Avatar
so it will output 5 or 6 sectors rather than just 1
Avatar
hmm the output is quite long this time
12:30 PM
how do I see what information is located in sector 4?
Avatar
dd skip=4 if=/dev/sda count=1|hexdump -C
Avatar
here, skip=4 means it will go to 4th sector and grab hex from there?
Avatar
if I was going to hide a 512 byte file, hidefile, into the 4th sector of a drive the command i'd use would be dd if=hidefile of=/dev/sda seek=4 but I wouldn't recommend this at this stage cuz I think you'll damage your bootloader (edited)
Avatar
Avatar
Henil
here, skip=4 means it will go to 4th sector and grab hex from there?
skip=4 means it will skip to the 4th block (the default blocksize is 512 bytes which is the same size as a sector)
Avatar
Avatar
AmNe5iA
skip=4 means it will skip to the 4th block (the default blocksize is 512 bytes which is the same size as a sector)
so is 4th block same as 4th sector?
Avatar
if you use the command man dd it'll give an explanation of the commands
Avatar
Avatar
Henil
so is 4th block same as 4th sector?
Yes unless you've changed the blocksize by using the bs=nnn argument
Avatar
if I had put bs=446 then one block will be of 446 bytes right which is not the default size
Avatar
Yes but that would be a strange number to use for this type of work
Avatar
it should be a multiple of 512 right ex: 1024 etc...
Avatar
sectors are normally 512 and sometimes 4096 bytes long
Avatar
that's the standard?
Avatar
after hiding the data does it look something like this
12:50 PM
Avatar
Yikes!!! I'm not sure you'll boot that VM again. Looks like you have overwritten the bootloader!
Avatar
ohh dang
12:54 PM
any way to restore the changes?
12:54 PM
thank god I had a snapshot
Avatar
I forgot you could do that with VMs. So the 1st partitions doesn't start until sector 2048 and I doubt the bootloader extends past the first couple of hundred sectors. I'd look to hide it somewhere after the bootloader but before sector 2048. Look for a massive gap of zeros before sector 2048 and put it in there somewhere
Avatar
Avatar
AmNe5iA
I forgot you could do that with VMs. So the 1st partitions doesn't start until sector 2048 and I doubt the bootloader extends past the first couple of hundred sectors. I'd look to hide it somewhere after the bootloader but before sector 2048. Look for a massive gap of zeros before sector 2048 and put it in there somewhere
so I would change skip from 4 to 2048 and if there's a bunch of 0's there then I can hide it there
Avatar
no, I'd change the count to 2048 and look for somewhere where this happens 000001d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| * note the offset, convert to decimal, then devide by 512 to get the sector count. (edited)
1:41 PM
Write to one of the sectors after this happens, as it indicates that it is all zeros after this point. (edited)
1:42 PM
i.e. the sectors don't hold any 'information'
1:45 PM
dd if=/dev/sda count=2048|hexdump -C
1:46 PM
whatever blank sector, X, you choose then use the command dd if=hidefile.txt of=/dev/sda seek=X
Avatar
Avatar
AmNe5iA
no, I'd change the count to 2048 and look for somewhere where this happens 000001d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| * note the offset, convert to decimal, then devide by 512 to get the sector count. (edited)
I don't understand the part where we convert to decimal and then divide by 512
1:54 PM
dd if=/dev/sda count=4608|hexdump -C tried doing something like this
1:54 PM
got a bunch of values
1:55 PM
Avatar
4608? where did that come from?
2:04 PM
200ish <X <2048
Avatar
Avatar
Henil
I don't understand the part where we convert to decimal and then divide by 512
The offset given by hexdump is in hexidecimal so we need to convert to decimal and the divide by 512 to get the sector count.
Avatar
Avatar
AmNe5iA
4608? where did that come from?
I was trying to look for empty space. I think you're telling me to find empty space before 2048 right?
Avatar
I think it's fully packed can't find all 0's within 2048
Avatar
I doubt the bootloader is really taking that many sectors so I'd probably try writing to sector 2047 and then see if it can actually reboot
Avatar
I'll give it a shot cause none of the values gave me all 0's
Avatar
can i access a dd file from a mac terminal?
Avatar
Yea I think you can
Avatar
pretty sure that it is simliar to linux. If the dd image is from a block device (not a partition) then you have to specify the offset of the partition you want to mount. ie: mount -o loop offset=1024 -t auto /path/to/image.dd /mount/point
Avatar
Original message was deleted or could not be loaded.
Digitalferret 2/23/2022 12:30 AM
first, go to #data-recovery 🙂
Avatar
Digitalferret 2/23/2022 10:35 AM
any suggestions for tool to parse thunderbird email messages? looking for an easy means to show dialogue between two parties only. personal job, one off, so not looking to spend as if it was going to be a daily workhorse (edited)
Avatar
@Digitalferret try @Autopsy does a pretty good job at POP3 mail
👍🏻 1
Avatar
Digitalferret 2/23/2022 3:16 PM
its probably more about making some order out of the messages. i have direct access tio thunderbird but laying it out in some semblance of order like he said she said (imagine the scrolling chat pane on a phone message app) (edited)
3:20 PM
looks to be a complete PIA, but here's my "chance to excel" i guess, lol.
Avatar
what about exporting the file, loading it in a VM with the thunderbird application and then screenshotting/exporting from the app itself?
Avatar
Avatar
whee30
what about exporting the file, loading it in a VM with the thunderbird application and then screenshotting/exporting from the app itself?
Digitalferret 2/23/2022 3:22 PM
yep, i think its going to be an export and reformat job
Avatar
thats what i had to do forever ago with google hangouts... none of the tools parsed it effectively so I had to use an email program and then export from within the email program to csv
Avatar
Digitalferret 2/23/2022 3:24 PM
i could save to a folder and export that out and open as an instance of a portable Tbrid
👍 1
3:24 PM
maybe
3:24 PM
yeh, things starting to formulate... thanks for the sounding board guys (edited)
Avatar
yeah - you still have your original evidence file and you're using the program that natively supports the data you're trying to display... seems reasonable to me
Avatar
Hi everyone, wy would someone prefer propietary software for forensic analisys vs ope source tools??
Avatar
Avatar
mdogilvie
Hi everyone, wy would someone prefer propietary software for forensic analisys vs ope source tools??
Digitalferret 2/23/2022 3:31 PM
forensicz wise the main criteria as i see it is tried and tested / recognised software than that which is not (which doesn't necessarily imply FOSS is either good or bad). Some might argue that proprietary is usually a much more streamlined, smooth operation. YMMV (edited)
Avatar
Avatar
mdogilvie
Hi everyone, wy would someone prefer propietary software for forensic analisys vs ope source tools??
Sometimes the big name tools just do the job "better" or more efficiently overall. A forensic suite you pay for will parse lots of different things in a consistent manner. A lot of open source tools are purpose built and great at what they do but the interfaces, uses and outputs of those tools might all be different.
this 1
3:44 PM
Some paid tools have abilities that open source tools don't, simply due to their high R&D budget, which is also why you'd be paying for it
Avatar
randomaccess 2/23/2022 5:12 PM
Some orgs are backwards and need to use approved tools, and don't trust foss
5:12 PM
Because if they pay for it it has to be better
Avatar
@Digitalferret did you try this addon in thunderbird : https://addons.thunderbird.net/en-us/thunderbird/addon/importexporttools/
Adds some tools to import and export folders and messages
👍🏻 1
Avatar
Have people successfully evaded/bypassed detection within NDR solutions?
Avatar
Avatar
malrker
Have people successfully evaded/bypassed detection within NDR solutions?
randomaccess 2/24/2022 1:36 AM
Almost certainly if it can be used to transmit data it can be utilised by threat actors. But that might depend on your rules. For ex someone may know you use slack for corporate so they use slack as a c2
1:37 AM
I've never had a tweet thread go super critical like this. I'm going to TRY to respond to as many DMs as I can. Please do not take it personally if it takes a while to respond. For each one I respond to, I'm getting 6-10 new ones. I can see the waves of shares by my DM backlog
Avatar
@Magnet Forensics Hello. I think a have an issue related to 5.10, how can I download the full install for going back to 5.9 please ?
Avatar
Avatar
randomaccess
Almost certainly if it can be used to transmit data it can be utilised by threat actors. But that might depend on your rules. For ex someone may know you use slack for corporate so they use slack as a c2
Yeah thats living off the land binaries/programs, but it still picks it up based on correlation/timing/size of data transmitted etc.
2:20 AM
What I mean is someone able to remain undected throughout the whole time being on the network.
2:20 AM
With an NDR solution
2:21 AM
So through c2's, remote code execution,moving laterally, exfil etc (edited)
Avatar
Avatar
AnTaL
@Magnet Forensics Hello. I think a have an issue related to 5.10, how can I download the full install for going back to 5.9 please ?
DM'ing you now
Avatar
Hi, we currently have a case where a guy prepare ''secured'' cellphone for a group of criminal people. The ''tech'' guy is willing to help the police and we have an opportunity to play in the cellphone before they are shipped to the criminal people for bad use. We are looking for a way to install an APK on these android phone before delivery for a Local Collection of chats database (signal, whatsapp, sms, etc.). We do not want any remote access to the device, we will gain physical access a couple month later and we are looking to collect the ''new'' DB with all the chats, wether they are deleted or not from original service provider (ex signal). All this process wont be disclosed for the court, as it is ''secret technique''. Im looking for people to DM me if you have an idea of a company/tool that could help. We have the money to invest in that kind of tool, so its not a problem. I saw many ''child'' surveillance app, but we are not looking for any remote access - and we do not want the bad guy to discover the app called ''Spy-your-kid'' lol, so... Anyway, if you have any info for me, Quick DM please.
Avatar
What channel can i ask about ftk imager
Avatar
@Gene probable #computer-forensics I would guess
Avatar
Avatar
DCSO
@Gene probable #computer-forensics I would guess
that would make sense =), thanks
Avatar
Avatar
SPVQct3207
@Digitalferret did you try this addon in thunderbird : https://addons.thunderbird.net/en-us/thunderbird/addon/importexporttools/
Digitalferret 2/24/2022 2:23 PM
will give it a go dude, many thanks
Avatar
does anyone know what channel would be good to ask about Spotify Car Thing forensics?
Avatar
Avatar
Gbear
does anyone know what channel would be good to ask about Spotify Car Thing forensics?
#iot-forensics or #vehicle-forensics imo
Avatar
have some free time soon so I can download SIFT Workstation and finally get "hands on"
Avatar
If viewing Google JSON in Cellebrite PA amd have a Q re timestamps the decoding forum is my best bet yeah? I joined about a year ago and have put up maybe 10 Q over that time that have all gone unanswered. Are there other Cellebrite user channels that people use?
Avatar
Hey, so my laptop has; ESET Endpoint encryption, Forced Yubi Key (for startup and decryption) Then password and keyboard to login. For some bizarre reason USB driver is not working and I’m having trouble getting into my computer 😵💫
Avatar
My drive is soldered onto the motherboard too
11:44 AM
Any ideas how to update USB driver or fix the driver so I can unlock.
Avatar
Avatar
B74
My drive is soldered onto the motherboard too
Digitalferret 2/27/2022 1:46 PM
the usb device not being recognised might not be a driver issue?
Avatar
I can plug my phone in and it gets power, my mouse and keyboard light up, but no input from multiple keyboards etc
Avatar
All I need to do is press the button on my yubi key to unlock… but it doesn’t recognise it and I’m stuck 🤷‍♀️
Avatar
Avatar
B74
All I need to do is press the button on my yubi key to unlock… but it doesn’t recognise it and I’m stuck 🤷‍♀️
Digitalferret 2/27/2022 3:34 PM
tried a manufacturers/hard reboot? like battery out, power key held down for a few seconds? maybe check the makers website for that specific instruction. something sounds corrupt or hanging for sure
Avatar
Battery is inside laptop, warranty void if I open it (edited)
Avatar
Avatar
B74
Battery is inside laptop, warranty void if I open it (edited)
Digitalferret 2/28/2022 12:37 AM
checked makers website for instructions? sounds like a netbook?
Avatar
Hello everyone! I have to build a new forensic workstation for our lab. The budget is somewhere around 11k eur. We mostly run Cellebrite, Axiom, Oxygen, FTK, Belkasoft X. What do you recommend? Dual Xeon 5120 CPUs with 64GB RAM ECC and lower graphics, or single i9 129000K with 128GB RAM DDR5 and Nvidia RTX 3090? Is Xeon better than i9 for general forensics? Or do you have other suggestions? Thank you!
Avatar
Avatar
Cip
Hello everyone! I have to build a new forensic workstation for our lab. The budget is somewhere around 11k eur. We mostly run Cellebrite, Axiom, Oxygen, FTK, Belkasoft X. What do you recommend? Dual Xeon 5120 CPUs with 64GB RAM ECC and lower graphics, or single i9 129000K with 128GB RAM DDR5 and Nvidia RTX 3090? Is Xeon better than i9 for general forensics? Or do you have other suggestions? Thank you!
The latter option is the better one. You'd definitely feel the benefit. (edited)
Avatar
I also feel that higher clock speed but with less cores are in fact better for general usage of these apps. However, I've seen that many forensic workstations are using Xeon CPUs and I'm wondering why.
Avatar
I think at one point, dual xeon's were the way, but at least our unit has moved away and seen that reality is, they didn't figure well vs i9s
5:37 AM
It's about what your tool actually uses
5:37 AM
I think most its about 32 processes?
5:38 AM
Plus at least with Axiom, you need a good RAM/CPU combo
5:39 AM
Plus, more tools these days are using GPU for processing
Avatar
I read that Axiom only uses GPU for some AI processing of the images. Most of the processing is still done by the CPU.
5:41 AM
Thanks for the tips @Rob
👍 1
Avatar
Avatar
Cip
I read that Axiom only uses GPU for some AI processing of the images. Most of the processing is still done by the CPU.
OCR uses GPU afaik, plus if you use Griffeye, that uses GPU for processing. XRY uses nVidia CUDA to speed up image recognition. Plus, with a decent GPU you can have more fun cracking hashes etc 🙂 (edited)
Avatar
I did not know that about OCR. We've used Griffeye on a case with 1,5 million images. It took its time on my current workstation (core i7 8700, 32 GB RAM, GTX 1660 🙂 ). We don't do password cracking, but maybe there a dual Xeon could do better than a more potent GPU.... I don't know. Anyway... it seems that i9 is the way to go for my type of forensics. Thanks again
Avatar
Don't forget fast storage. NVMe makes a huge difference
this 1
Avatar
Ofcourse. I'll try to go with 3 NVMes: 2TB for OS and apps (maybe multiple OS, hashes etc), 4 TB for cache, some databases and cases data (the fastest), 8 TB for storage of images and maybe cases data. Hope the budget will suffice for this setup
👍 1
Avatar
DefendingChamp 2/28/2022 8:50 AM
Has anyone has to renew their CCPA or CCO with Cellebrite? It says there is no need for EXAMs for certifications? Is this normal?
Avatar
@Digitalferret It's a Asus ROG Zephrus Duo, $4000 laptop.
9:39 AM
Warranty won't look at it as it needs to be unlocked first. And i can't trust my data to asus.
9:40 AM
There is a screw under a label that says warrenty void if broken
9:42 AM
Avatar
Avatar
B74
@Digitalferret It's a Asus ROG Zephrus Duo, $4000 laptop.
Digitalferret 2/28/2022 9:44 AM
loool, my bad, sorry 🙂
9:45 AM
i have a netbook with similar sounding setup. hood pretty much welded shut
Avatar
The 550 has a M.2 but the 551QS has the chip on the board with the 3080
9:45 AM
This one will open, But it's only a few months old.
9:46 AM
I've told asus about it, They said they can't test with encryption enabled.
9:46 AM
But i can't disable it without USB 😛
Avatar
Digitalferret 2/28/2022 9:46 AM
figuratively i meant. had to wipe and start again w/ MX linux over a crippled Win 10
Avatar
I can't even do that
Avatar
Avatar
B74
But i can't disable it without USB 😛
Digitalferret 2/28/2022 9:46 AM
yeh understood
Avatar
I have to unlock the drive
Avatar
Digitalferret 2/28/2022 9:47 AM
just wondering if there's a means of getting into whatever subs for BIOS these days.
Avatar
Keyboard, Touchpad + USB Keyboard & Mouse don't work
9:48 AM
ESET Full Disk Encryption is FIPS 140-2 validated with 256 bit AES encryption.
Avatar
Digitalferret 2/28/2022 9:48 AM
if it's locked, i can only think of escaping someway after powerup such as the Shift Restart trick
Avatar
I have the Yubi Key to unlock, No way to unlock without USB
Avatar
Digitalferret 2/28/2022 9:48 AM
but if its not getting to any options at all... not much idea
9:48 AM
what screen do you get to after power on? (edited)
Avatar
ESET Endpoint Encryption 1. Start System 2. Reset Password 3. Shutdown
Avatar
Avatar
B74
Warranty won't look at it as it needs to be unlocked first. And i can't trust my data to asus.
Digitalferret 2/28/2022 9:50 AM
and 100% on that. neighbour was at similar with Toshiba. he would have lost data as they wanted to just re fit a new drive
Avatar
Avatar
B74
ESET Endpoint Encryption 1. Start System 2. Reset Password 3. Shutdown
Digitalferret 2/28/2022 9:51 AM
ok. and there's no way to bail out prior? like to reset bios / check USB? (edited)
9:52 AM
wasn't sure regarding keyboard. you have some I/O at least with the built in one?
9:53 AM
thinking the others were just plugging in via usb socket
Avatar
Seamless, fully validated encryption and two-factor authentication solutions to ensure data protection and regulatory compliance.
9:55 AM
Don't think it allows me to get into the bios without first putting in the code
Avatar
Digitalferret 2/28/2022 9:56 AM
hmm
9:59 AM
I also have the recovery key too but i need to put that on a USB key and plug it in lol
Avatar
Digitalferret 2/28/2022 9:59 AM
yeh i was gonna ask about rec key. but
9:59 AM
so, switch on, ESET first, then Yubikey unlock or vice versa, and do you have any input means at all. ie the inbuilt keyboard works ok
10:00 AM
even without giving it back to Asus, they should have some means to let users know how and if they can get into bios
10:07 AM
got to leave it for now dude, hopefully someone in here has more specific knowledge than my general. i can see the need to be careful if that data is the only copy you have
Avatar
Press the power button, First thing pops up before bios or ROG logo or windows is the ESET and when i hit start system it asks for the key
10:09 AM
If i hit reset it would ask for the key or the backup recovery key
10:10 AM
If I had known the NVMe was soldered on the board I'd probably of not gotten the laptop.
Avatar
There was a new article That was posted a few days ago about usb forensics and the serial number not meaning what we thought it meant. Anyone see this and can provide the link? I can’t find it anymore!
10:24 AM
Found it.
Avatar
Avatar
B74
If I had known the NVMe was soldered on the board I'd probably of not gotten the laptop.
Digitalferret 2/28/2022 10:26 AM
yep, its getting harder to escape an ecosystem these days
10:27 AM
any chance with asking ESET how to bail prior? they must have an alt plan, surely (edited)
Avatar
There is absolutely nothing that can be done to unlock it without USB functionality.
11:35 AM
And/or keyboard.
11:36 AM
Their first reply from ESET was remove the drive, And run the recovery unlocker on another device.. Thing is... It can't be done as it's soldered on the board. (edited)
11:37 AM
The only thing i can think of currently is hardware modification, Trying to bridge the NVME over to a USB-C by some how connecting each point on the board to a external NVMe caddy
11:38 AM
On the board, There are contacts next to the NVMe, Those contacts should be able to be touched. Asus probably has some hardware to troubleshoot the drive
11:39 AM
They could have some sort of connector to make it readable if the mb died
Avatar
Avatar
B74
Their first reply from ESET was remove the drive, And run the recovery unlocker on another device.. Thing is... It can't be done as it's soldered on the board. (edited)
Digitalferret 2/28/2022 12:05 PM
roger that. one viable, depends on finance tho, is send to a reputable data recovery shop. I'm sure this won't be the first instance they've seen and might at least be able to offer advice on connection/removal or offer the service.
Avatar
Ross Donnelly 2/28/2022 12:09 PM
Asus suggest powering off the laptop, then pressing and holding the power button for 40 seconds to do a hard reset - some models with PSU connected, others with it disconnected so worth trying both. For entering BIOS, it's quite common for them to boot too fast to press a key. Asus say "While the computer isn't powered on yet, press and hold the [F2] button of the keyboard, and then press the [Power button] (Do not release F2 button until the BIOS configuration display.)" Have you also tried a powered USB hub?
Avatar
Avatar
Ross Donnelly
Asus suggest powering off the laptop, then pressing and holding the power button for 40 seconds to do a hard reset - some models with PSU connected, others with it disconnected so worth trying both. For entering BIOS, it's quite common for them to boot too fast to press a key. Asus say "While the computer isn't powered on yet, press and hold the [F2] button of the keyboard, and then press the [Power button] (Do not release F2 button until the BIOS configuration display.)" Have you also tried a powered USB hub?
Digitalferret 2/28/2022 12:11 PM
that's what i was talking about. hard reset. I've used it to clear a stuck Toshiba Laptop before now. worth a go
12:12 PM
but also that the battery needed removing, if i remember right
12:13 PM
nothing to lose tho
Avatar
Now you've mentioned it
12:23 PM
The power button is on the keyboard.
12:23 PM
12:24 PM
I tried F2
12:24 PM
F10 F12 etc all the standard options.
12:24 PM
Even del
12:24 PM
I tried everything, All three USB's + USB-C
Avatar
Digitalferret 2/28/2022 12:28 PM
other hard reset option is to just leave it on and run down? leave as much plugged in as possible in any and all USB sockets (edited)
Avatar
Where might I look to determine when an android was first setup? Trying to determine what is preexisting cloud data that might be prior to phone setup.
Avatar
Avatar
Cole
Where might I look to determine when an android was first setup? Trying to determine what is preexisting cloud data that might be prior to phone setup.
Andrew Rathbun 3/1/2022 12:51 PM
#mobile-forensic-decoding
👍 1
Avatar
Joe Schmoe 3/1/2022 3:38 PM
Is there any software that will monitor a folder for new files, hash them and log the results?
3:39 PM
I was thinking about trying to write something in Python but it’s a little more complicated than I hoped so hopefully there is already something like that.
Avatar
Can someone explain exactly what this is?
Avatar
Avatar
ryuk0126
Can someone explain exactly what this is?
Avatar
Avatar
Joe Schmoe
I was thinking about trying to write something in Python but it’s a little more complicated than I hoped so hopefully there is already something like that.
randomaccess 3/1/2022 3:59 PM
You could use Velociraptor for it but might be overkill
Avatar
Avatar
ryuk0126
Can someone explain exactly what this is?
Like Matt said, looks like autopsy running in kubernetes and set up to be distributed for performance. Uses products like Apache solr, kafka, spark, postgre and Amazon elastic file storage
Avatar
Avatar
randomaccess
You could use Velociraptor for it but might be overkill
Joe Schmoe 3/1/2022 4:47 PM
Thank you. I’ll take a look. I haven’t used it yet.
Avatar
Dr. Kaan Gündüz 3/2/2022 12:48 AM
Freeware file monitor can detect changes in files or folders and react by running the associated Task to perform a wide range of automated operations.
12:50 AM
you can execute a cmd command
12:50 AM
if it's triggered
12:51 AM
eg: new E01 file, process it with your favourite app
Avatar
Avatar
Murst
Like Matt said, looks like autopsy running in kubernetes and set up to be distributed for performance. Uses products like Apache solr, kafka, spark, postgre and Amazon elastic file storage
I could find that actual image on their site
Avatar
Deleted User 3/2/2022 2:48 AM
Hello, i wanted to ask the viability of moving all our physical analysis server on VM instead of having physical servers for each indexing, analysis etc. would it be worth it ? will the virt overhead be an issue ?
2:49 AM
2 nodes connected to a san
Avatar
Dr. Kaan Gündüz 3/2/2022 3:24 AM
vms are cool
3:24 AM
the bottleneck would be network
Avatar
@Cellebrite anyone from CLB available for a quick question?
📩 1
Avatar
Avatar
Deleted User
Hello, i wanted to ask the viability of moving all our physical analysis server on VM instead of having physical servers for each indexing, analysis etc. would it be worth it ? will the virt overhead be an issue ?
You have to take a look in the storage performance to
Avatar
Avatar
mdogilvie
You have to take a look in the storage performance to
Deleted User 3/2/2022 4:23 AM
Yes I’m looking at hybrid sans with an ssd cache
Avatar
Does anyone have any experience with getting accounts shut down? Our specific case involves Cashapp and Squarespace. I'm unsure of what they are going to require from us.
Avatar
Anyone know how to open a .ldb file? Looks to be a Microsoft access record locking file. I can view contents using notepad++ but not very pretty. Looking for more native way.
Avatar
CCL's Principal Analyst Alex Caithness asks the question: After SQLite, what comes next? A must-read primer on LevelDB - tomorrow's ubiquitous format?
updoot 2
Avatar
digital Bowles 3/2/2022 11:23 AM
We just had an air tag come in that was found on a persons vehicle. Do you have information on how to processed with getting information from the tracker.
Avatar
Avatar
digital Bowles
We just had an air tag come in that was found on a persons vehicle. Do you have information on how to processed with getting information from the tracker.
Search warrant to Apple to get associated devices, icloud accounts, and other stored data is probably your best bet.
this 1
12:02 PM
I haven't heard of anyone getting data off the airtag itself yet.
Avatar
Do you know which type of LevelDB database it is? The name of the folder normally indicates if it’s IndexedDB or Local Storage
Avatar
Avatar
Matt
Do you know which type of LevelDB database it is? The name of the folder normally indicates if it’s IndexedDB or Local Storage
Andrew Rathbun 3/2/2022 1:26 PM
was going to ping you but here you are 😛 beat me to it
😂 1
Avatar
Avatar
Matt
Do you know which type of LevelDB database it is? The name of the folder normally indicates if it’s IndexedDB or Local Storage
Indexed I believe
Avatar
Ah yeah that’s the most common type, you’ll want to use CCL’s Python toolkit (I’ve written a tool that works well with Local Storage DBs, but Indexed DBs are a different beast)
Avatar
Avatar
Matt
Ah yeah that’s the most common type, you’ll want to use CCL’s Python toolkit (I’ve written a tool that works well with Local Storage DBs, but Indexed DBs are a different beast)
I tried using this https://github.com/lxndrblz/forensicsim but it looks like it’s only targeting the log file and not the .ldb
A forensic open-source parser module for Autopsy that allows extracting the messages, comments, posts, contacts, calendar entries and reactions from a Microsoft Teams IndexedDB LevelDB database. - ...
1:30 PM
I’ll look into CCL more tomorrow thank you!
Avatar
You might need to do some programming for that one
1:31 PM
If you ever come across a Local Storage DB, let me know and I’ll ping you over my tool
Avatar
With physical analyzer - is there a way to ingest tags or a project session from a reader report back into the original extraction? For example, I generate a reader report for my detective, they tag stuff according to their case knowledge and then I ingest those tags into the full extraction to reap the benefit of his case knowledge and the database/backend of a full dump for a final report?
8:24 PM
like axiom's portable case system, but in physical analyzer
8:25 PM
I have tried loading the project session from the reader but that doesnt work
8:30 PM
I have figured out a way, it's just a bit cumbersome. I can add the reader report to the open main extraction and once it's loaded in I can open the saved project session from the reader report. It works, it's just more steps than I think it should take and results in "extra" extractions appearing since the reader report is now included as well.
Avatar
MrMacca (Allan Mc) 3/3/2022 3:24 AM
There's discussion at work to take our current local workstations offline, and moving to a virtualised environment.
3:25 AM
Does anyone have any experience of this happening and what are your thoughts?
3:25 AM
I personally prefer the local workstations and don't really see the benefits from a virtualised environment
👍 2
Avatar
Avatar
MrMacca (Allan Mc)
There's discussion at work to take our current local workstations offline, and moving to a virtualised environment.
Digitalferret 3/3/2022 4:27 AM
bean counters involved by any chance?
🤣 1
Avatar
Melrose142 3/3/2022 5:43 AM
@MrMacca (Allan Mc) using a virtualized environment is a tradeoff. If you're working remotely, virtualized may be the way to go, but there are performance considerations. If you do heavy processing, such as EnCase, Axiom or FTK, your virtualized system may not be up to the task. It's understood that the processing takes place on the virtualized system and the processing is not taking place on your local machine, but how much memory will your VM have? 16, 32, 64? How many other VMs are running on the server in the office? More my money, I would prefer a physical machine for forensic work.
👍 1
Avatar
forensicres 3/3/2022 5:48 AM
Dear all, any one involved in Formobile EU project in here?
Avatar
Avatar
MrMacca (Allan Mc)
There's discussion at work to take our current local workstations offline, and moving to a virtualised environment.
Dr. Kaan Gündüz 3/3/2022 6:25 AM
i choose vms over physical machines
6:25 AM
they can be wiped, re-created
6:26 AM
but for the hypervisor part, i think it's better to use xenserver or vsphere
6:27 AM
you can keep all your cases and images in a network location and use the vms for processing only
6:27 AM
i prefer reverting to snapshots before i process a new case
6:27 AM
to avert cross-case contamination
6:28 AM
and re-allocating resources back to the vm
6:29 AM
the performance part is related to the network speed, cpu and ram dedicated to vms are easily managed
6:29 AM
imho, more ram, more cpu doesn't always end up faster examinations
6:30 AM
you can do your tests with your favourite forensic solution to see what works best
Avatar
Avatar
Dr. Kaan Gündüz
the performance part is related to the network speed, cpu and ram dedicated to vms are easily managed
You do physical usb controller passhrough for extractions?
Avatar
Avatar
MrMacca (Allan Mc)
There's discussion at work to take our current local workstations offline, and moving to a virtualised environment.
The upgrade cycle for a VM is likely to be longer than you might have for a number of physical machines. We used to buy top spec analyst machines and then roll those down to imaging machines or similar after a few years. You might not be able to upgrade part of your VM server, so can end up with lots of slower cores after a few years. As others have said RAM/CPU isn't so much of a concern as I would guess you'll be looking at a VM server that can accommodate at least 1TB RAM. Consider Disk speed as well and look at a sizeable chunk of NVMe storage for active case work, backed by spinning disks for general storage. This was the single biggest win for us, we moved from SSD to NVMe and the performance gains were like moving from HDD to SSD. You'll also need to consider anything that might need a graphics card for password cracking and whether that will be included or even compatible with the VM server and the virtualisation software.
Avatar
Avatar
Arcain
You do physical usb controller passhrough for extractions?
Dr. Kaan Gündüz 3/3/2022 6:58 AM
i create forensic images on the network storage, so it's a hybrid workplace
6:58 AM
evidence -> imaging -> nas <- processing vms -> nas case folder (edited)
Avatar
Avatar
Dr. Kaan Gündüz
i create forensic images on the network storage, so it's a hybrid workplace
I mean for extractions, but if i now understand, VMs are used for decoding and processing
Avatar
Dr. Kaan Gündüz 3/3/2022 7:22 AM
indeed
7:23 AM
if you own high end servers, vms are the best option, but one can always use smaller computers dedicated to one job like Intel NUCs
7:23 AM
having an automation solution with lots of vms helped during the pandemic
7:24 AM
i could send the staff home
Avatar
Avatar
Jobbins
I tried using this https://github.com/lxndrblz/forensicsim but it looks like it’s only targeting the log file and not the .ldb
@Magnet Forensics any knowledge if decoding these DBs on the roadmap for Axiom?
Avatar
Russell Abel - Bastrop County SO 3/3/2022 12:48 PM
Anyone have a search warrant template for CashApp?
Avatar
Avatar
Melrose142
@MrMacca (Allan Mc) using a virtualized environment is a tradeoff. If you're working remotely, virtualized may be the way to go, but there are performance considerations. If you do heavy processing, such as EnCase, Axiom or FTK, your virtualized system may not be up to the task. It's understood that the processing takes place on the virtualized system and the processing is not taking place on your local machine, but how much memory will your VM have? 16, 32, 64? How many other VMs are running on the server in the office? More my money, I would prefer a physical machine for forensic work.
I setup my own VPN to remote back to on the road to my analysis machines, never really had a performance issue, you can have a static machine for some work but VMs are definitely the way to go. Snapshots, upgrading , cloning and moving, sharing machines are much easier.
👏 1
Avatar
Avatar
WesDx_Stu
The upgrade cycle for a VM is likely to be longer than you might have for a number of physical machines. We used to buy top spec analyst machines and then roll those down to imaging machines or similar after a few years. You might not be able to upgrade part of your VM server, so can end up with lots of slower cores after a few years. As others have said RAM/CPU isn't so much of a concern as I would guess you'll be looking at a VM server that can accommodate at least 1TB RAM. Consider Disk speed as well and look at a sizeable chunk of NVMe storage for active case work, backed by spinning disks for general storage. This was the single biggest win for us, we moved from SSD to NVMe and the performance gains were like moving from HDD to SSD. You'll also need to consider anything that might need a graphics card for password cracking and whether that will be included or even compatible with the VM server and the virtualisation software.
Deleted User 3/4/2022 2:50 AM
thank you for this
2:50 AM
i am looking into moving into a virtualised infrastructure
Avatar
MugiwaraNoLuffy 3/4/2022 4:13 AM
Any UK folk using UFED PA 9.53 beware if you're using filters to narrow down your reports, the latest update breaks this feature and it flips it to US date format so may not bring back the data you expect it to
Salute 2
Avatar
I know this is probably one that gets brought up every once in a while, but does anyone have any sample reports they are able to share? I am looking at revamping how we write reports in our LE lab and would like to see what others are doing to streamline and/or be more efficient with them, while providing enough detail that it doesn't make it seem like you're being lazy. I've talked to some people who do very little (obtained device, imaged device, provided portable case to agent) to others who have multiple pages typed every device they do. I assume there has to be some in between, like check boxes for actions you took, tools you used, and notes of the extraction. Thanks for any help anyone can provide, and if you can, you can email them to me at awillmarth@cheyennepd.org.
Avatar
Avatar
A_A_Ron
I know this is probably one that gets brought up every once in a while, but does anyone have any sample reports they are able to share? I am looking at revamping how we write reports in our LE lab and would like to see what others are doing to streamline and/or be more efficient with them, while providing enough detail that it doesn't make it seem like you're being lazy. I've talked to some people who do very little (obtained device, imaged device, provided portable case to agent) to others who have multiple pages typed every device they do. I assume there has to be some in between, like check boxes for actions you took, tools you used, and notes of the extraction. Thanks for any help anyone can provide, and if you can, you can email them to me at awillmarth@cheyennepd.org.
Andrew Rathbun 3/4/2022 11:12 AM
If this is something we need to centralize on https://github.com/Digital-Forensics-Discord-Server/LawEnforcementResources as a #dfir-open-source-projects then let's do it. If anyone has any they can share, let me know and I can ensure they're here
Resources provided by the community that can serve to be useful for Law Enforcement worldwide - GitHub - Digital-Forensics-Discord-Server/LawEnforcementResources: Resources provided by the communit...
Avatar
Avatar
Andrew Rathbun
If this is something we need to centralize on https://github.com/Digital-Forensics-Discord-Server/LawEnforcementResources as a #dfir-open-source-projects then let's do it. If anyone has any they can share, let me know and I can ensure they're here
This would be a great place to share search warrant go-by's, contacts for other agencies and/or service providers, and other items which many of us are looking for, as well. I think this would be a great addition!
Avatar
Avatar
A_A_Ron
This would be a great place to share search warrant go-by's, contacts for other agencies and/or service providers, and other items which many of us are looking for, as well. I think this would be a great addition!
Andrew Rathbun 3/4/2022 11:15 AM
Yes, I know it would be, but I'm no longer a cop so I have to rely on others to generate this content, which is the hard part 😛 help me help you all! 😄
👍 1
11:17 AM
I can only do so much from the outside so now I need help from those still on the inside, if they're able to. I don't expect a lot because of the sensitive nature of everything, and totally understand that. Everything I felt comfortable sharing is here: https://aboutdfir.com/resources/preservation-letter-search-warrant-templates/
Avatar
wordrascal 3/4/2022 1:41 PM
Greetings! I just posted this on Twitter & would love to hear from more people about it for a potential podcast or story: https://twitter.com/christammiller/status/1499827212152942607
I keep thinking about #DFIRforGood becoming a thing while people marched in the streets for George Floyd. I'd really like to see a continuation of that conversation. Obv a lot of sensitivity around the work esp now; anyone in #DFIR willing to talk abt what you can?
Avatar
Derrick
Avatar
Hi everyone, I was going through one of my assignments and I did a pre-fetch analysis. I noticed a exe file with name: MPAM-C74E2EB3.EXE (First I though it was something like WINDOWS-KB890830-X64-V5.58.EX which is documented online as a The Microsoft Windows Malicious Software Removal Tool (890830))
2:46 PM
can the "C74E2EB3" be something random?
2:46 PM
or should I assume this as a potential virus? It is 92820 in size (edited)
Avatar
Do you have access to the exe? VirusTotal is always - provided you can distribute the file - a good go-to
3:08 PM
If not, then you can get the SHA-1 hash and check VT with the hash
Avatar
@ArcherL Which tool(s) were you using for your analysis?
Avatar
eric zimmerman pecmd @Tcisaki (edited)
Avatar
Avatar
Matt
Do you have access to the exe? VirusTotal is always - provided you can distribute the file - a good go-to
Oh yeah, totally forgot about running an amcahe analysis!! Thanks
Salute 2
Avatar
i have a a wav file
5:47 PM
am playing ctf
5:47 PM
don't know what to do with it
5:47 PM
it's forensic challenge
5:47 PM
in the description the wrote smtgs like Goertzel
5:48 PM
any idea what could i do ?
5:48 PM
5:48 PM
the wav file
Avatar
randomaccess 3/5/2022 6:00 PM
Probably run strings over it
Avatar
did it nothing found
Avatar
Avatar
Player V
it's forensic challenge
Andrew Rathbun 3/5/2022 6:34 PM
#challenges-and-ctfs
Avatar
Lachrymosa 3/5/2022 6:37 PM
Hi all, I'm trying to set up a reverse engineering malware lab. I was following the guide on malwareunicorn.org but they want me to use VirtualBox VMs and I'm committed to ESXi VMs for now. Can anyone point me to a guide on how to set up a secure detonation VM and a good investigation VM for it? Mainly want to focus on hardening configs and recommended tools.
Avatar
Avatar
Lachrymosa
Hi all, I'm trying to set up a reverse engineering malware lab. I was following the guide on malwareunicorn.org but they want me to use VirtualBox VMs and I'm committed to ESXi VMs for now. Can anyone point me to a guide on how to set up a secure detonation VM and a good investigation VM for it? Mainly want to focus on hardening configs and recommended tools.
Andrew Rathbun 3/5/2022 8:15 PM
@RandyRanderson this might be a good one for you?
Avatar
Avatar
Lachrymosa
Hi all, I'm trying to set up a reverse engineering malware lab. I was following the guide on malwareunicorn.org but they want me to use VirtualBox VMs and I'm committed to ESXi VMs for now. Can anyone point me to a guide on how to set up a secure detonation VM and a good investigation VM for it? Mainly want to focus on hardening configs and recommended tools.
Andrew Rathbun 3/5/2022 8:15 PM
have you tried something preconfigured like https://github.com/mandiant/flare-vm ?
Avatar
Lachrymosa 3/5/2022 8:16 PM
No, I haven't, I'll take a look though 😄
Avatar
Avatar
Lachrymosa
No, I haven't, I'll take a look though 😄
Andrew Rathbun 3/5/2022 8:18 PM
Which is the best alternative to flare-vm? Based on common mentions it is: ✅Commando-vm, ✅Radare2, ✅Drakvuf-sandbox, ✅Flare-fakenet-ng or ✅Binance-APK-Analysis
Avatar
Lachrymosa 3/5/2022 8:19 PM
Thanks, I appreciate it!
Avatar
Avatar
Lachrymosa
Hi all, I'm trying to set up a reverse engineering malware lab. I was following the guide on malwareunicorn.org but they want me to use VirtualBox VMs and I'm committed to ESXi VMs for now. Can anyone point me to a guide on how to set up a secure detonation VM and a good investigation VM for it? Mainly want to focus on hardening configs and recommended tools.
RandyRanderson 3/5/2022 9:04 PM
Remnux is free and has all your fun stuff on it. It’s used in SANS FOR610. Far as a detonation you have locally - https://cuckoosandbox.org/ Hybrid analysis and any.run are web-based and can be useful if you don’t mind it being public to the webs
Avatar
Lachrymosa 3/5/2022 9:11 PM
I've used any.run and joe sandbox before. The interest I have here is to prepare for FOR610 and also learn reverse engineering as a hobby/life-skill. I've enjoyed doing the hunting and remediation that GCFA teaches and I just want to learn more about the actual malware that causes the problems.
Avatar
Avatar
Player V
Click to see attachment 🖼️
Deleted User 3/5/2022 11:20 PM
Not going to do your CTF for you because that defeats the point, but they are DTMF tones. Find a decoder...you might extract a type of number....
💯 1
Avatar
Avatar
A_A_Ron
I know this is probably one that gets brought up every once in a while, but does anyone have any sample reports they are able to share? I am looking at revamping how we write reports in our LE lab and would like to see what others are doing to streamline and/or be more efficient with them, while providing enough detail that it doesn't make it seem like you're being lazy. I've talked to some people who do very little (obtained device, imaged device, provided portable case to agent) to others who have multiple pages typed every device they do. I assume there has to be some in between, like check boxes for actions you took, tools you used, and notes of the extraction. Thanks for any help anyone can provide, and if you can, you can email them to me at awillmarth@cheyennepd.org.
Sent you an email.
Avatar
Forensicator 3/6/2022 7:56 AM
Anyone ever had any success on a forensic exam in which the OS used was QubesOS?
7:59 AM
I’ve gotten absolutely no where with it lol
Avatar
Avatar
Player V
any idea what could i do ?
Google play store has a tone analyzer as a hint, that’s all you’ll get from me xD
Avatar
hey guys
2:10 PM
so basically i want to get into cybersecurity
Avatar
Do you know where you want to start?
Avatar
I guess
2:12 PM
like i have some basic idea on where to start
2:12 PM
im planning to get my CCNA first
Avatar
Networking is a great place to start
Avatar
I've heard some people say that CCNA is actually kind of saturated and it won't even get you a basic IT job anywhere (edited)
Avatar
I’d probably go more for the network+
2:13 PM
You could also try some ctf sand a few great books out there to get you going
Avatar
How long does it usually take to become ccna certified?
Avatar
Not long
Avatar
Avatar
ryd3v
I’d probably go more for the network+
so you prefer network+ over ccna?
Avatar
CCNA is really a prerequisite but any networking experience definitely helps
2:15 PM
Yep
2:15 PM
CCNA is Cisco only
2:15 PM
Network + is everything you need really
Avatar
I see
Avatar
After network plus you could try security + maybe then OSCP
2:16 PM
If that’s the direction you decide to take
Avatar
So network+, security+ and then OSCP
Avatar
But before jumping into CCNA I’d maybe try some hack the box or something similar to see what your really interested in
Avatar
these are all prerequisites?
Avatar
No none are really prerequisite
2:17 PM
Just a organized path it’s really up to you
Avatar
Avatar
ryd3v
But before jumping into CCNA I’d maybe try some hack the box or something similar to see what your really interested in
I tried hack the box. Didn' really understand whats going on
Avatar
Yeah so there you go
2:17 PM
Start with the basics maybe like over the wire bandit
2:18 PM
Cyber security is a huge field with many topics
2:18 PM
Depends what you like
2:18 PM
Some people like forensics , some people like red team some blue
2:18 PM
What interests you the most?
Avatar
Hmm so now im kinda confused all over again lol
2:19 PM
Your probably not ready for the CCNA ether then
2:20 PM
I have a poorly written blog post here, that needs to be finished, but may help you get started on your journey https://6ixcode.com/blog/begin
6ixCode is a free online content project sharing information technology knowledge.
Avatar
so heres a bit about myself
2:21 PM
I come from a business background, just graduated college with a BBA degree (a very generic degree indeed)
Avatar
I’m case you don’t want to visit that link, here is the first one
Avatar
and because of the current job crisis, i couldn't land a job in the marketing or HR sector. Also they kinda pay less to begin with. However i've noticed that networking, cybersecurity fields have more potential and growth
Avatar
Avatar
ryd3v
I’m case you don’t want to visit that link, here is the first one
yes ill visit that link
2:23 PM
its open on another tab
Avatar
Start with the lab setup and being comfortable with the various operating systems, Linux and Windows. Next learn the basics of networking and understanding fundamentals of networking. Finally make a plan, how are you going to learn? Books, Courses? both?, set yourself some easy goals to begin with, for example the basics of the Linux command line. Certifications to go for at this level CompTIA Network+ (edited)
2:23 PM
🍻
2:23 PM
It’s ok, today I can’t find backticks on my iPhone so it’s all good
2:24 PM
Found it
Avatar
Avatar
theDude
and because of the current job crisis, i couldn't land a job in the marketing or HR sector. Also they kinda pay less to begin with. However i've noticed that networking, cybersecurity fields have more potential and growth
Digitalferret 3/6/2022 2:25 PM
maybe take a few steps back and ask yourself what really gives you a kick, in terms of reward, rather than trying to find a job that sounds like it might suit you pay/conditions/future wise?
1000 1
Avatar
Avatar
Digitalferret
maybe take a few steps back and ask yourself what really gives you a kick, in terms of reward, rather than trying to find a job that sounds like it might suit you pay/conditions/future wise?
I really wish i could follow my passion and pursue what gives me a kick in terms of reward. But unfortunately, the country I live in is very laid back and the only way to thrive here is to actually hop on opportunities that can make you more money
2:29 PM
And networking, cybersecurity fields are booming here
Avatar
Yeah if money is the motivation, cyber isn’t the way
2:29 PM
People do cyber for passion not money
Avatar
Digitalferret 3/6/2022 2:29 PM
other than living expenses, what are you looking for in terms of reward, that money can buy? <things?>
Avatar
At least in my case
2:29 PM
For money , I’m a software engineer xD
Avatar
Avatar
ryd3v
People do cyber for passion not money
Idk about that but I've seen countless examples of people changing careers to cybersecurity just for the big bucks
Avatar
Hahaha
Avatar
Avatar
ryd3v
For money , I’m a software engineer xD
funny how most software engineering jobs here are underpaid
Avatar
Guess depends where here is
Avatar
Digitalferret 3/6/2022 2:31 PM
bc folks years ago derided others for say wanting to ride motorbikes. teacher smacked a pupil around the head with his motorbike magazine. said "dont.you.know.you.will.never.make.a.living..,.<etc>
Avatar
Pretty high paid here
Avatar
Digitalferret 3/6/2022 2:31 PM
turned out to be Barry Sheene, later to become legend bike rider
2:32 PM
others, similar with "stop playng computer games..." now Twitch stars
Avatar
I guess my point is that if your getting into cyber security for the money, that’s not the motivation that will give you the best success.
Avatar
Digitalferret 3/6/2022 2:32 PM
those are pretty low chance things, just saying don't be bound by convention
Avatar
Digitalferret 3/6/2022 2:33 PM
you never did say, what is it exactly that is your passion
Avatar
That does it for me hahahaha
Avatar
Avatar
ryd3v
I guess my point is that if your getting into cyber security for the money, that’s not the motivation that will give you the best success.
i really can't say much about that mindset. I got into coding just for the money
2:35 PM
and i still remember busting my ass off learning it even though i didn't like every second of it
Avatar
Well hey good luck on your journey
Avatar
Avatar
Digitalferret
you never did say, what is it exactly that is your passion
if i were to keep it real
2:39 PM
i actually don't like to work. I'd rather prefer to invest in a couple of stocks and just sleep at home lol
Avatar
Digitalferret 3/6/2022 2:40 PM
but what gives you the "kick". finding deals, making a profit, etc
Avatar
Avatar
ryd3v
Well hey good luck on your journey
Im actually going to follow the path you laid out. seems very organized
Avatar
Thank you, I have to work on that post a bit, I did it in a rush lol
Avatar
Avatar
Digitalferret
but what gives you the "kick". finding deals, making a profit, etc
Making a profit.
Avatar
There are never enough hours in the day to complete all the things I have to do
💯 1
Avatar
Avatar
ryd3v
Thank you, I have to work on that post a bit, I did it in a rush lol
just take your time. Im sure the longer it takes, the more comprehensive its going to be
2:42 PM
I built that site from scratch , so sometimes you get writers block lol
2:43 PM
I’m actually working on a comprehensive beginner training program right now for my local area(Canada) (edited)
2:43 PM
May take me a few weeks to get it all polished up but I think it’s going to be great
2:45 PM
I already made an online school for remote learning , just getting and writing all my curriculum now
Avatar
Avatar
theDude
Making a profit.
Digitalferret 3/6/2022 2:45 PM
now there's synchronicity or what you call it. i was gonna recommend the story about the fisherman and businessman, and by pure chance, one of the many re-tellings is by someone that deals in investments http://www.livelearninvest.com/the-businessman-and-the-fisherman-story/
2:47 PM
I’m saving that one
Avatar
Digitalferret 3/6/2022 2:48 PM
for me, i had no clue. tried many and sundry as wide a latitude as you can think of before eventually graduating with B.Eng in electronics. by pure chance, having fallen ill with ME/CFS i started again in something i could do from home, on pure interest level. then i realised what I'd know from being very young. the "finding" or "finding the / a solution" gave me the reward.
2:49 PM
"research was another, in similar veinn, bc it was "finding out"
Avatar
For me it was the perpetual trying to break into everything. Started in ‘85 when I got my first computer, been breaking and fixing pcs since then 🤣
Avatar
Digitalferret 3/6/2022 2:51 PM
some of the best lessons i've had recently have been from having spare capacity here and "running info errands" for those that are in work overload, such as LEA. they have no real time to spend trawling through search engines.
Avatar
Definitely, the past 11 days or so have been a bit of a whirlwind
Avatar
Avatar
ryd3v
For me it was the perpetual trying to break into everything. Started in ‘85 when I got my first computer, been breaking and fixing pcs since then 🤣
Digitalferret 3/6/2022 2:51 PM
lol, pretty much same thing here, and i'm not going to admit, given the audience, what i was doing
2:52 PM
Well they say to be the best detective, you have to be a better criminal right
Avatar
Digitalferret 3/6/2022 2:52 PM
enough to say i was one of those taking all of the risks when others were getting all the rewards
Avatar
Digitalferret 3/6/2022 2:52 PM
funny you should mention, i have that direct line, family wise
Avatar
Digitalferret 3/6/2022 2:53 PM
great grandfather was made the first detective chief inspector of <county>
Avatar
Oh that’s sick
Avatar
Digitalferret 3/6/2022 2:54 PM
i did research on his history, and showed my nan his Obit in the local paper
Avatar
I’m the opposite, all my ancestors were criminals , so I decided to be the good boy lmao 🤣
Avatar
Digitalferret 3/6/2022 2:54 PM
commended for <long list>
2:55 PM
she said he knew exactly who was who in the criminal fraternity, especially with regard to the towns famous Classic horse race week.
2:55 PM
because he let lodgings to most of them
Avatar
I have a famous Irish last name. xD
2:55 PM
KEKW
Avatar
Digitalferret 3/6/2022 2:56 PM
my fam history is similar. everything from card sharps, conmen, crooks and more. just as well, although the techniques interest me, that i don't see the acquisition of money "at any cost" as a reward
2:56 PM
if i did i'd either be very rich now, or very jailed
Avatar
I always say it’s a good thing I’m a good guy, otherwise I’d be rich
2:57 PM
KEKW
Avatar
Digitalferret 3/6/2022 2:57 PM
yup. roger that
2:57 PM
the old poacher turned gamekeeper
Avatar
Yeah haha
Avatar
Digitalferret 3/6/2022 2:59 PM
now, the other traits, of our "type". some form or martial art, lockpicking (or cracking as it's digital couterpart), musical interest, if not actively playing an instrument...
2:59 PM
and oddly, i've found, sharpening things
Avatar
Combat, check, lock picking , check lol
3:00 PM
Indeed, sharping one’s blade is also a great pastime
Avatar
Digitalferret 3/6/2022 3:00 PM
can't even begin to tell you the list of "you too?" i have with a dude stateside.
Avatar
Digitalferret 3/6/2022 3:00 PM
almost like Bladerunner and memory implants
Avatar
Haha yeah that’s true
Avatar
Digitalferret 3/6/2022 3:02 PM
geh, best stop, i'll have some ^&*ing OSINT guys checking me out with all the data i just spilled
3:02 PM
I'm one of those that would too, lol
Avatar
Hahahaha true
3:03 PM
I have to jet anyways , wife wants to go out , have a great afternoon lads
Avatar
Digitalferret 3/6/2022 3:04 PM
later dude, tc / enjoy
Avatar
Anyone know how to find logs about if/when a group policy ran. In my example there is a Group policy that deletes userprofiles after 60 days of inactivty. I am trying to find a list of all the userprofiles that were deleted. Even if there is a just an event log on the endpoint where the userprofile was deleted that would still work. then I can just search endpoints for that event. Thanks in advance.
Avatar
Avatar
Jobbins
Anyone know how to find logs about if/when a group policy ran. In my example there is a Group policy that deletes userprofiles after 60 days of inactivty. I am trying to find a list of all the userprofiles that were deleted. Even if there is a just an event log on the endpoint where the userprofile was deleted that would still work. then I can just search endpoints for that event. Thanks in advance.
9:06 AM
should be logged on the endpoint to both System and the Operational\GroupPolicy area
Avatar
Hey guys is there any tool that can parse creation time, modification time, access time to a list (csv) of all files and folders on window pc? (just like forensic software filesystem UI) Need fast incident-response, no disk dump Previously I used the cmd command dir to save as csv, but he parsed out the format painfully And I know $MFT, but the content he saves is not complete (edited)
Avatar
Avatar
RX
Hey guys is there any tool that can parse creation time, modification time, access time to a list (csv) of all files and folders on window pc? (just like forensic software filesystem UI) Need fast incident-response, no disk dump Previously I used the cmd command dir to save as csv, but he parsed out the format painfully And I know $MFT, but the content he saves is not complete (edited)
randomaccess 3/7/2022 10:31 PM
what do you mean by the content he saves is not complete
10:32 PM
if you collect the $MFT file and parse it with mftecmd -f $mft --csv . --csv mftoutput.csv or something along those lines you'll get a CSV that has the files along with their MAC times and more
10:32 PM
there's even a KAPE module so you could pretty much go Run kape -> target file system, modules mftecmd.mkape and it should be done in a few minutes
Avatar
Avatar
randomaccess
there's even a KAPE module so you could pretty much go Run kape -> target file system, modules mftecmd.mkape and it should be done in a few minutes
I need these information and fields, $MFT can't have these details companyname,filedescription,fileversion,internalname,legalcopyright,originalfilename
Avatar
randomaccess 3/8/2022 1:28 AM
Right. You didn't mention those.before...
Salute 1
1:29 AM
I'm not sure what you're trying to achieve? Maybe exiftool would be what youre after
Avatar
Avatar
RX
Hey guys is there any tool that can parse creation time, modification time, access time to a list (csv) of all files and folders on window pc? (just like forensic software filesystem UI) Need fast incident-response, no disk dump Previously I used the cmd command dir to save as csv, but he parsed out the format painfully And I know $MFT, but the content he saves is not complete (edited)
but i found the tools , KAPE's Module CrowdResponse can do this thank you , thank guys!!!
Avatar
Avatar
randomaccess
Right. You didn't mention those.before...
thank you! i will try that
Avatar
Avatar
RX
but i found the tools , KAPE's Module CrowdResponse can do this thank you , thank guys!!!
randomaccess 3/8/2022 1:30 AM
Isn't crowdresponse a collection tool? Making running kape redundant?
Avatar
Avatar
randomaccess
Isn't crowdresponse a collection tool? Making running kape redundant?
yap it is This is the tool I found so far that lists all the files, information, and details (edited)
Avatar
randomaccess 3/8/2022 1:34 AM
Righto. Would recommend becoming familiar with what the tool is doing so you can understand where its getting the data from
Salute 1
Avatar
thank you! respect
Avatar
Digitalferret 3/8/2022 3:25 AM
Win10 USB car readers / thumbdrives: hitting a regular problem in that PC doesn't recognise a swapout without having to go into device manager and remove the driver & reboot. even then that's kinda hit and miss. error is the usual Windows cannot load the device driver for this hardware because a previous instance of the device driver is still in memory. (Code 38) The driver could not be loaded because a previous version of the driver is still in memory.
3:25 AM
any ideas?
Avatar
Digitalferret 3/8/2022 4:34 AM
so far, removed drivers. reboots. 3 different card readers/cables. Nirsoft USBDview remove any and all old devices. update W10....
Avatar
Digitalferret 3/8/2022 5:42 AM
... anyone got a litre of "accelerant" spare? ima need some real soon, then 🐧 time
Avatar
Avatar
Digitalferret
... anyone got a litre of "accelerant" spare? ima need some real soon, then 🐧 time
Before you wipe the system, just to test to be sure it is not a hardware problem, run a live linux distro first and see if it works.
Avatar
@Law Enforcement [UK] Anyone obtained and exmained logs from 3D printer/s ? Printer recieves files from SD card and not networked. If so drop me a PM, need to draw some information from you.
Avatar
D1g1talDan 3/8/2022 6:58 AM
No but I’d be really interested what the outcome is 🧐
👍 3
Avatar
I'm dealing with that exact scenario - deciding on how to approach it. Anyone have a workflow/tips beyond just documenting the printer, checking for onboard storage, and imaging/processing the SD card?
Avatar
That's about all you can do unless there is a pi onboard with octoprint on it
7:25 AM
Model dependant
Avatar
Avatar
Tcisaki
Before you wipe the system, just to test to be sure it is not a hardware problem, run a live linux distro first and see if it works.
Digitalferret 3/8/2022 7:44 AM
thanks, already grabbing Parrot. any attempt to shove the SDXC card in any recognised card reader locks pretty much anything else up
Avatar
What's the approach for gcode files located on the SD? Try to convert them to STL to see what the model looks like? Never tried it, but sounds like results are iffy that way... Try printing them?
Avatar
Avatar
Tcisaki
Before you wipe the system, just to test to be sure it is not a hardware problem, run a live linux distro first and see if it works.
Digitalferret 3/8/2022 7:45 AM
got to keep at least one instance of W10 running someplace, bc PC3000 but other than that, i think i'm moving back to penguin land.
Avatar
Avatar
dfa_adam
What's the approach for gcode files located on the SD? Try to convert them to STL to see what the model looks like? Never tried it, but sounds like results are iffy that way... Try printing them?
You can render gcode in cura
Avatar
Some printers have web UIs, that might hold volatile information about the last print?
Avatar
Avatar
dfa_adam
What's the approach for gcode files located on the SD? Try to convert them to STL to see what the model looks like? Never tried it, but sounds like results are iffy that way... Try printing them?
Open it in Cura Ultimaker and as @Aghast says it should render and display the 3D version fo the file.
Avatar
Does anyone have a DF report template that I can use by chance? I am doing my senior year Capstone (which is a mock Digital investigation).
Avatar
@codyp915 Have you looked at the Forensic Expert Witness Report examples available on the internet? They have some very good ones, and to be honest, many DF firms use them as a basis for their own templates.
Avatar
quick question @Cellebrite we want to reset our Touch 2 as its been buggy. Anybody had issues using the reset switch on the back ? It's been a long time since we have done this.
Avatar
Its possible, support has the exact instructions as they may vary depending on version
👍 1
Avatar
Avatar
DCSO
quick question @Cellebrite we want to reset our Touch 2 as its been buggy. Anybody had issues using the reset switch on the back ? It's been a long time since we have done this.
Be careful with this - we had one reset unintentionally (don't ask!) and the version it reset to was too old to support the new format license files, so we couldn't re-apply the license and do the updates. There is a solution, provided by Cellebrite Support that solved the problem very neatly (Thanks, Fit@Cellebrite ANZ) but there was a bit more involved than just resetting and updating. Ask about the Touch 2 Re-Image Kit and guide if you strike this problem...
Avatar
Noob Question, I'm building a forensic workstation, getting an I9-12900k, would I notice any significant differences going with ddr5 ram 4800 instead of ddr4, 3600 Cas 16? Mainly using Magnet Axiom and Cellabrite Thanks in advance (edited)
Avatar
Saucisson Slicer 3/9/2022 12:34 AM
Hi ! I'm building a forensic process for a customer (company with around 3000 employees). They have a lot of cloud and industrial perimeter. Do you have 5-6 must have tools in mind ? I personally think of Axiom magnet and Cellebrite. Thank you in advance 😁
Avatar
Avatar
Saucisson Slicer
Hi ! I'm building a forensic process for a customer (company with around 3000 employees). They have a lot of cloud and industrial perimeter. Do you have 5-6 must have tools in mind ? I personally think of Axiom magnet and Cellebrite. Thank you in advance 😁
Andrew Rathbun 3/9/2022 3:22 AM
Entirely depends on what type of casework you're going to be doing. Can you go into further detail?
Avatar
Avatar
ExisT
Noob Question, I'm building a forensic workstation, getting an I9-12900k, would I notice any significant differences going with ddr5 ram 4800 instead of ddr4, 3600 Cas 16? Mainly using Magnet Axiom and Cellabrite Thanks in advance (edited)
Andrew Rathbun 3/9/2022 3:24 AM
I am by no means an expert on this, but law of diminishing returns is going to come into play at some point, especially for the price difference that exists between DDR4 and DDR5. I think higher volume of RAM is going to be more helpful than higher clock speeds of RAM for those particular forensic tools.
Avatar
Avatar
Andrew Rathbun
Entirely depends on what type of casework you're going to be doing. Can you go into further detail?
Saucisson Slicer 3/9/2022 4:11 AM
Well there is currently nothing about forensic process but the one I am developing. It is going to be done by the CSIRT so they have technical profiles (but not used to perform forensic). They want to be able to investigate on lots of cases. It can be a compromised EC2 instance to investigate (with a little bit of malware analysis). It can be a worker doing illegal stuffs on his workstation so they have to investigate to get elements to a disciplinary procedure. I can't be exhaustive but they want to be able to investigate on lots of cases, this is why I was thinking of Axiom. It seems to be great for working on different kinds of assets
Avatar
forensicMouse 3/9/2022 5:57 AM
@Cellebrite @Magnet Forensics @Griffeye Would we see any substantial performance improvements on your tools if we run it on the new Mac M1 Ultra chip?
Avatar
Avatar
Saucisson Slicer
Well there is currently nothing about forensic process but the one I am developing. It is going to be done by the CSIRT so they have technical profiles (but not used to perform forensic). They want to be able to investigate on lots of cases. It can be a compromised EC2 instance to investigate (with a little bit of malware analysis). It can be a worker doing illegal stuffs on his workstation so they have to investigate to get elements to a disciplinary procedure. I can't be exhaustive but they want to be able to investigate on lots of cases, this is why I was thinking of Axiom. It seems to be great for working on different kinds of assets
Andrew Rathbun 3/9/2022 5:58 AM
So this is likely deadbox forensics to enumerate user behavior that may or may not violate policy. Seems like Cellebrite and Magnet are a good start. For computer forensics, there's plenty of free tools out there on GitHub (even outside of Eric's tools) to squeeze more from the artifacts
Avatar
Avatar
Andrew Rathbun
So this is likely deadbox forensics to enumerate user behavior that may or may not violate policy. Seems like Cellebrite and Magnet are a good start. For computer forensics, there's plenty of free tools out there on GitHub (even outside of Eric's tools) to squeeze more from the artifacts
Saucisson Slicer 3/9/2022 6:06 AM
Yes ! That's it ! Yeah I already selected a bunch of free tools (automated like autopsy and some more manual). Buy the idea was to find tools to do "the most" in one. As my customer is more in this mindset and they do not have any experience in this field
Avatar
Avatar
Saucisson Slicer
Yes ! That's it ! Yeah I already selected a bunch of free tools (automated like autopsy and some more manual). Buy the idea was to find tools to do "the most" in one. As my customer is more in this mindset and they do not have any experience in this field
Andrew Rathbun 3/9/2022 6:11 AM
One thing to consider, is your washer and dryer the same unit? Or would you prefer to have them separate? I know my answer. Sometimes using tools that were made to do a single function is the best way to go for speed, results, etc, rather than a massive swiss army knife that has a lot of moving parts. Not talking in code here about any particular tools, but just because something does a lot of things doesn't mean it does them well. It all comes down to tool validation and understanding the artifacts. Learning how to use tools is a separate issue. Knowing artifacts will always reign supreme in my mind and knowing how to use a tool suite will be a secondary consideration, if that makes sense.
Avatar
Avatar
Andrew Rathbun
One thing to consider, is your washer and dryer the same unit? Or would you prefer to have them separate? I know my answer. Sometimes using tools that were made to do a single function is the best way to go for speed, results, etc, rather than a massive swiss army knife that has a lot of moving parts. Not talking in code here about any particular tools, but just because something does a lot of things doesn't mean it does them well. It all comes down to tool validation and understanding the artifacts. Learning how to use tools is a separate issue. Knowing artifacts will always reign supreme in my mind and knowing how to use a tool suite will be a secondary consideration, if that makes sense.
Saucisson Slicer 3/9/2022 6:29 AM
I totally agree with you on that point. I personally prefer to understand what am I searching for and why I am searching on a particular element to pick a tool to help me (like the tools nirsoft provide for windows artifacts). But my customer is more in a "easy and fast investigation" way of thinking and call an expert if needed on a harder case
Avatar
Saucisson Slicer 3/9/2022 6:49 AM
Anyway, thank you for your help, I'm going to keep digging 😄
Avatar
Avatar
forensicMouse
@Cellebrite @Magnet Forensics @Griffeye Would we see any substantial performance improvements on your tools if we run it on the new Mac M1 Ultra chip?
AXIOM runs on the windows platform and since there really hasn't been any progress on virtualizing Windows 11 on an M1 chip that may be a mistake. (edited)
7:02 AM
A google search as well to make usre I hadn't missed something is unless your running Parrallels then you are out on bootcamp and Fusion as well for Win10 (edited)
👍🏼 1
7:03 AM
I just bought new MACs and bought I9's and am very happy with performance
7:04 AM
Avatar
Avatar
dfa_adam
What's the approach for gcode files located on the SD? Try to convert them to STL to see what the model looks like? Never tried it, but sounds like results are iffy that way... Try printing them?
I personally use the PrusaSlicer G-Code Viewer to 3D render .gcode files.
Avatar
Does anyone recommend any Certs for brand new examiners? I plan to go to Kent state for computer science with my specialization in information security, but I want to look into some Certs while I’m doing classes. I will be getting my bachelors of science
Avatar
Avatar
codyp915
Does anyone recommend any Certs for brand new examiners? I plan to go to Kent state for computer science with my specialization in information security, but I want to look into some Certs while I’m doing classes. I will be getting my bachelors of science
Andrew Rathbun 3/9/2022 8:27 AM
#training-education-employment
Avatar
Hi all, Does anyone know what program I can use to certify that an audio file has not been manipulated and that it has no cuts?
Avatar
Dr. Kaan Gündüz 3/9/2022 8:48 AM
AFAIK there is not an automated solution for that (edited)
8:53 AM
General and comprehensive Audio Forensic Analysis Solutions for forensic departments and government agencies
Avatar
Thanks! i will see.
👍 1
Avatar
depends on if you need dfr or software engineering
6:04 AM
probably easier to find jobs as a swe but both are in relatively high demand
Avatar
NibblesNBits 3/10/2022 6:58 AM
timeline
Avatar
Anyone aware of this site or how the results actually links to users? 🤔 https://www.hudsonrock.com/search?domain=bbc.com (edited)
Avatar
how can I know whether this photo has been tempered with and what online tools would you guys use to figure it out?
10:59 AM
Another question I would have is how to search for copies, or modified copies, of certain images? Assume this could be either on the forensic image of the same PC, or other devices. (edited)
Avatar
Avatar
Marcell
Another question I would have is how to search for copies, or modified copies, of certain images? Assume this could be either on the forensic image of the same PC, or other devices. (edited)
Have you tried hash vales and PhotoDNA?
11:24 AM
what hashes do you think could be useful in a case like this? cryptographic or perceptual?
Avatar
Avatar
Marcell
how can I know whether this photo has been tempered with and what online tools would you guys use to figure it out?
Digitalferret 3/10/2022 11:36 AM
maybe give https://asecuritysite.com/forensics/ a go, under the [Graphics formats] header, and also https://29a.ch/photo-forensics/ including the Help page
Avatar
Avatar
Marcell
what hashes do you think could be useful in a case like this? cryptographic or perceptual?
Cryptographic will find untampered copies while perceptual should find slightly modified copies.
Avatar
Thanks for that guys!
11:51 AM
11:52 AM
Any tips regarding this by any chance? (edited)
11:52 AM
other than the fact that it can match files transferred over the network to files in an image I can't really think of anything else
Avatar
Btw does anyone here use Red Canary? Are they good? What has peoples experiences been with it? Red Canary is the 'wrapper' service that manages the Carbon Black alerts.
1:20 PM
MDR
Avatar
Anyone using open source or low cost software for officers to upload digital evidence to a server? The commercial solutions are insanely expensive.
Avatar
Avatar
Joe Schmoe
Anyone using open source or low cost software for officers to upload digital evidence to a server? The commercial solutions are insanely expensive.
Andrew Rathbun 3/10/2022 2:15 PM
What kind of server? Is it a simple drag and drop onto a mounted network share or something fancier?
Avatar
It’s all up in the air right now. The quotes were for full servers and software. I’m hoping just add storage to existing network shares if I can set up good controls. (edited)
2:40 PM
For example I debated writing a Python script to monitor an intake folder and hash the files added.
Avatar
Original message was deleted or could not be loaded.
It can be if you plan on doing DFIR in the future as a career path, otherwise no.
Avatar
hey guys, not sure if this is the right place to ask, but I wanted to get some advice on a job offer i just received. I currently work staff aug for this company so my salary is paid by a third party. My current total comp is ~150k (125base, 25k bonuses)as a red team engineer, but the client has been using me as an IR engineer for the last year or so. They gave me a full time offer with almost the exact same total comp (137 base, 10% bonuses, total comp ~150). Is this a generally fair offer? I would have thought getting hired by the client would result in a decent pay bump. Would it be unreasonable for me to ask for 150 base and 10% bonuses? I'm one of the most experienced people on a relatively small team, and my focus has been on creating tooling to automate large parts of IR work. they'd be wasting a lot of time without that infrastructure
Avatar
my opinion? always negotiate
Avatar
absolutely, i'm definetly going to try, but wanted to get some ideas on what might be considered reasonable. There isn't a whole lot of info out there on what an IR engineer salary averages
Avatar
Avatar
Joe Schmoe
Anyone using open source or low cost software for officers to upload digital evidence to a server? The commercial solutions are insanely expensive.
I use cross ftp to upload to aws govcloud. Single person shop so needs are low.
Avatar
Avatar
whee30
I use cross ftp to upload to aws govcloud. Single person shop so needs are low.
Just my stuff would be easy. I’m trying to find a system for everyone to use. It needs to be very straight forward.
Avatar
Ah. My agency uses evidence.com for audio and video, some type of in house to manage physical evidence. Good luck!
Avatar
Avatar
Marcell
Another question I would have is how to search for copies, or modified copies, of certain images? Assume this could be either on the forensic image of the same PC, or other devices. (edited)
forensicMouse 3/10/2022 5:15 PM
Autopsy plugins meant to detect photo and video manipulations. - Photo-and-video-manipulations-detector/detect_deepfake_photos.py at main · saraferreirascf/Photo-and-video-manipulations-detector
5:16 PM
Answer to first question
Avatar
Avatar
wedemmoez
hey guys, not sure if this is the right place to ask, but I wanted to get some advice on a job offer i just received. I currently work staff aug for this company so my salary is paid by a third party. My current total comp is ~150k (125base, 25k bonuses)as a red team engineer, but the client has been using me as an IR engineer for the last year or so. They gave me a full time offer with almost the exact same total comp (137 base, 10% bonuses, total comp ~150). Is this a generally fair offer? I would have thought getting hired by the client would result in a decent pay bump. Would it be unreasonable for me to ask for 150 base and 10% bonuses? I'm one of the most experienced people on a relatively small team, and my focus has been on creating tooling to automate large parts of IR work. they'd be wasting a lot of time without that infrastructure
Andrew Rathbun 3/10/2022 7:27 PM
If you're wondering about whether the number is good or not, it depends on where you live. In NYC you'd be lucky to afford a walk in closet at that salary. In the Midwest USA, you'd be sitting pretty.
Avatar
Avatar
Andrew Rathbun
If you're wondering about whether the number is good or not, it depends on where you live. In NYC you'd be lucky to afford a walk in closet at that salary. In the Midwest USA, you'd be sitting pretty.
I’m in Dallas
Avatar
Avatar
Joe Schmoe
Anyone using open source or low cost software for officers to upload digital evidence to a server? The commercial solutions are insanely expensive.
Dr. Kaan Gündüz 3/10/2022 7:59 PM
why not use owncloud on your own server? https://owncloud.com/download-server/
Download Server Packages for ownCloud, find the right package for you
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 3/10/2022 8:10 PM
it's all relative 😛 my house in California goes for 6.3x the price I paid for it. Cost of living matters more than salary
👍 3
Avatar
Avatar
Dr. Kaan Gündüz
why not use owncloud on your own server? https://owncloud.com/download-server/
I appreciate it. I’m not really familiar with it but I’ll take a look.
👍 1
Avatar
Are there any belkasoft employees here or some one who is attending belkasoft x mobile training?
Avatar
Avatar
Tejas
Are there any belkasoft employees here or some one who is attending belkasoft x mobile training?
Andrew Rathbun 3/10/2022 9:11 PM
@Belkasoft
Avatar
am wondering how it is a training with few youtube videos and google form
9:11 PM
I'm finding it difficult to work with software and understand
Avatar
Andrew Rathbun 3/10/2022 9:12 PM
you can also ping @elizavetabelkasoft in #belkasoft-ctf
9:12 PM
I'm guessing you're referring to the CTF going on in a few hours?
Avatar
Avatar
Andrew Rathbun
I'm guessing you're referring to the CTF going on in a few hours?
Avatar
Andrew Rathbun 3/10/2022 9:13 PM
Never complain about free training 😛
Avatar
Andrew Rathbun 3/10/2022 9:13 PM
I am messing with you but for the price, it's hard to nitpick. They certainly don't have to provide 2-3 free hours of training with a test. That's pretty generous
Avatar
yep thats true
9:14 PM
maybe a little more details for newbies maybe 👀
Avatar
Andrew Rathbun 3/10/2022 9:14 PM
Also, plenty of great knowledge on YouTube or like platforms. Paid and free.
Avatar
or was it intended only for those only working in a company cuz eligibility wasn't mentioned
Avatar
Andrew Rathbun 3/10/2022 9:15 PM
If you have feedback for them, definitely let them know. Same for any vendor. They are generous enough to be here and be subject to feedback from end users so take advantage of that and help shape things for the better
Avatar
Avatar
Tejas
or was it intended only for those only working in a company cuz eligibility wasn't mentioned
Andrew Rathbun 3/10/2022 9:15 PM
That's beyond the scope of my knowledge. My job is to keep the water warm here for vendors and end users alike. Anything vendor specific, I defer to them.
Avatar
okay 😄 thanks tho. I ll wait for reply from belkasoft team maybe
Avatar
Avatar
Tejas
okay 😄 thanks tho. I ll wait for reply from belkasoft team maybe
Andrew Rathbun 3/10/2022 9:17 PM
Best of luck
😄 1
Avatar
Any recommendations of software for moving and hashing evidence? People here say that Nuix evidence mover has/had issues and seem reluctant to use it.
Avatar
Avatar
Artea
Any recommendations of software for moving and hashing evidence? People here say that Nuix evidence mover has/had issues and seem reluctant to use it.
TaraCopy can move, hash after it moves the file, and then store a small file containing the hash all in one interaction from the user. https://www.codesector.com/teracopy
Official site of TeraCopy, a free utility designed to copy files faster and more secure. It can verify copied files to ensure they are identical. It skips bad files during copy, not terminating the entire transfer. Seamless integration with Windows Explorer.
👍 5
Avatar
Dr. Kaan Gündüz 3/10/2022 11:38 PM
https://freefilesync.org/ is an alternative
Download FreeFileSync 11.18. FreeFileSync is a free open source data backup software that helps you synchronize files and folders on Windows, Linux and macOS.
👍 2
Avatar
Andrew Rathbun 3/11/2022 4:06 AM
Use those both. Both are great tools
Avatar
techforensic 3/11/2022 6:36 AM
This is great - I was also searching for a solution like this especially for copying large files like phone dumps and other image files. @Andrew Rathbun do you have a preference on which is better?
Avatar
Avatar
Tejas
Are there any belkasoft employees here or some one who is attending belkasoft x mobile training?
elizavetabelkasoft 3/11/2022 6:41 AM
Yeap. Contact me or support@belkasoft.com
Avatar
Avatar
elizavetabelkasoft
Yeap. Contact me or support@belkasoft.com
I got 2 tickets open
6:43 AM
already
Avatar
Avatar
elizavetabelkasoft
Yeap. Contact me or support@belkasoft.com
Is it fine If I dm?
Avatar
Avatar
Tejas
Is it fine If I dm?
elizavetabelkasoft 3/11/2022 6:46 AM
Yes, of course
Avatar
Ok so my capstone project for my HS is a DF investigation, I am using FTK imager and such, does anyone know of any reporting software for the report phase? I HATE paperwork with a passion
Avatar
Avatar
codyp915
Ok so my capstone project for my HS is a DF investigation, I am using FTK imager and such, does anyone know of any reporting software for the report phase? I HATE paperwork with a passion
Andrew Rathbun 3/11/2022 7:40 AM
Well you might need to overcome that hatred or consider a new career path, frankly. Depending on which route you go, there's going to be paperwork. Administrative stuff isn't sexy but the pen is mightier than the sword. Administrative stuff keeps businesses running and your paychecks not bouncing. Microsoft makes some pretty decent reporting software. It's called Word 😛 I honestly don't know of any fancy reporting software but reporting absolutely should not be automated or "pumped and dumped". AI may take over the world someday but anytime soon the world still needs humans to interpretively analyze data and draw reasonable conclusions, especially earlier into your career and education like you are so you get exposure and experience.
💯 2
Avatar
Avatar
techforensic
This is great - I was also searching for a solution like this especially for copying large files like phone dumps and other image files. @Andrew Rathbun do you have a preference on which is better?
Andrew Rathbun 3/11/2022 7:41 AM
For your use case, probably TeraCopy. We used it in the US Federal Government for that very purpose. FreeFileSync I use to just sync files from my personal computer to my NAS on an automated basis
👍 1
Avatar
Avatar
codyp915
Ok so my capstone project for my HS is a DF investigation, I am using FTK imager and such, does anyone know of any reporting software for the report phase? I HATE paperwork with a passion
It’s easier to report if you document along the way, I’ve moved to Obsidian for notes and then eventual conversion to PDF or work with markdown and Word Templates
Avatar
Avatar
tklane
It’s easier to report if you document along the way, I’ve moved to Obsidian for notes and then eventual conversion to PDF or work with markdown and Word Templates
Andrew Rathbun 3/11/2022 8:09 AM
Obsidian is all the rage lately. Markdown is an awesome format to document things. I don't know how it would work when it comes to final reporting that would go to a client or prosecutor, but absolutely for notes along the way it's a great solution. I hope it someday dethrones OneNote, if it hasn't already. Can't beat the amount of updates it gets, especially compared to OneNote. Their Discord server is very active, too.
Avatar
Does anyone know how far back google takeout data goes? I am looking for location data possibly from 2+ years ago.
Avatar
As far back as the user has data, albeit you have a wait on your hands
Avatar
@CCC Perfect and why would there be a wait? It will be a consent to search with the users login/password.
Avatar
Avatar
dfir-rick
@CCC Perfect and why would there be a wait? It will be a consent to search with the users login/password.
Ross Donnelly 3/11/2022 11:21 AM
Google Takeouts can take a long time to generate once you press the request button. Location data used to go back forever - now it depends on user settings. You can choose to set a retention period for the location data (I believe that retaining forever is still the default for new accounts but I'm not sure)
Avatar
Avatar
Ross Donnelly
Google Takeouts can take a long time to generate once you press the request button. Location data used to go back forever - now it depends on user settings. You can choose to set a retention period for the location data (I believe that retaining forever is still the default for new accounts but I'm not sure)
Ross Donnelly 3/11/2022 11:21 AM
Avatar
@Ross Donnelly thank you. The investigator stated the victim is pretty clueless when it comes to technology so I am hoping it is still set to the default option of forever. I will be receiving her device next week and if that doesn't pull the location data, I will let the investigator know about takeout data.
Avatar
Avatar
codyp915
Ok so my capstone project for my HS is a DF investigation, I am using FTK imager and such, does anyone know of any reporting software for the report phase? I HATE paperwork with a passion
Cherrytree, make a template, fill it in , export 😃
Avatar
Avatar
Andrew Rathbun
Well you might need to overcome that hatred or consider a new career path, frankly. Depending on which route you go, there's going to be paperwork. Administrative stuff isn't sexy but the pen is mightier than the sword. Administrative stuff keeps businesses running and your paychecks not bouncing. Microsoft makes some pretty decent reporting software. It's called Word 😛 I honestly don't know of any fancy reporting software but reporting absolutely should not be automated or "pumped and dumped". AI may take over the world someday but anytime soon the world still needs humans to interpretively analyze data and draw reasonable conclusions, especially earlier into your career and education like you are so you get exposure and experience.
The main reason I need to automate it as much as possible is because I have Cerebral Palsy and can only use my left hand (effectively), therefore taking me longer to write up reports. So I want to make it easier on myself.
Avatar
Avatar
codyp915
The main reason I need to automate it as much as possible is because I have Cerebral Palsy and can only use my left hand (effectively), therefore taking me longer to write up reports. So I want to make it easier on myself.
Andrew Rathbun 3/11/2022 4:25 PM
Totally understand. That would've been good context to know off the bat. I don't know much about what programs offer good accessibility features for that but hopefully someone else does
Avatar
Avatar
Andrew Rathbun
Totally understand. That would've been good context to know off the bat. I don't know much about what programs offer good accessibility features for that but hopefully someone else does
Oh, sorry, my bad
Avatar
Avatar
codyp915
Oh, sorry, my bad
You both arent wrong! Definitely lots of paperwork, unironically a not insignificant part of the gig is streamlining that kind of thing so automating it is just getting ahead of the game. Ry gave good advice, if you can make something a template, save yourself the trouble. I would also be sure that you save your reports because you will probably find yourself using similar language to describe similar situations/tools/findings/etc. Over time you can basically create your own database to take advantage of. Unfortunately so much of this stuff is niche so I would think speech to text tools must be a total coin toss lol, but Im sure you've already done that.
Avatar
Avatar
dfir-rick
Does anyone know how far back google takeout data goes? I am looking for location data possibly from 2+ years ago.
I had data from 2016 in there so probably as far as it can get data about you
Avatar
I have doubt, how does image/files extraction work with software like autopsy/belkasoft/.... Once when I tried autopsy on my own machine as an experiment, I tried deleting few files and analyzing using autopsy to see if it can recover images/files. But it didn't. It shows some arbitrary images/files..
7:47 PM
Does it work all the time and it seem to not work for me?
7:47 PM
or am doing something wrong
Avatar
Avatar
Tejas
I have doubt, how does image/files extraction work with software like autopsy/belkasoft/.... Once when I tried autopsy on my own machine as an experiment, I tried deleting few files and analyzing using autopsy to see if it can recover images/files. But it didn't. It shows some arbitrary images/files..
randomaccess 3/12/2022 3:55 AM
Easy way to play around is to create a VHDX in disk management. And then move things around, delete things, and then go look in a forensic tool
3:55 AM
It also helps to read a bit about how the file systems are working at a high level
3:55 AM
And understanding at least at a high level what happens when a file is deleted
3:56 AM
But depending on the media a deleted file may last on disk a long time (until it's overwritten) or it may be gone once it's deleted
Avatar
okay thanks
Avatar
Any one here from Ohio?
12:11 PM
Specifically anyone who went for CS? What is better for DFIR Infosec concentration or no concentration and computer forensics minor?
12:12 PM
*at Kent
Avatar
Andrew Rathbun 3/12/2022 12:12 PM
@codyp915#training-education-employment
Avatar
Avatar
randomaccess
Easy way to play around is to create a VHDX in disk management. And then move things around, delete things, and then go look in a forensic tool
Andrew Rathbun 3/12/2022 12:14 PM
@Tejas this is one of the first things I did on GitHub - https://github.com/AndrewRathbun/Anti-Forensics-VHDX I did the very same thing @randomaccess suggested here. Making a VHDX is effortless and then it can serve as your own experimental sandbox for toying around with whatever filesystem you format it with.
👍 2
Avatar
Thank you 😄
Avatar
Avatar
codyp915
Specifically anyone who went for CS? What is better for DFIR Infosec concentration or no concentration and computer forensics minor?
Not from/did not go to Kent, but I can possibly help you decide. Do you know what you want to do long term in DFIR? because that may change what you do
Avatar
Avatar
Murst
Not from/did not go to Kent, but I can possibly help you decide. Do you know what you want to do long term in DFIR? because that may change what you do
Forensic analysis
Avatar
Avatar
codyp915
Forensic analysis
Boots on the ground doing the analysis? Or background identifying and developing new tools?
Avatar
Avatar
Murst
Boots on the ground doing the analysis? Or background identifying and developing new tools?
Actually doing the analysis
Avatar
Avatar
codyp915
Actually doing the analysis
Assumptions: This is the Minor: http://catalog.kent.edu/colleges/ap/computer-forensics-security-minor/#programrequirementstext This is the Major Concentration: https://www.kent.edu/cs/information-security Thats a rough decision, Based solely off course titles, it seems the Major concentration is more around Secure coding and crypto. So from that aspect I would think the minor might be more helpful. It looks like Kent also offers a Undergrad Cert in Forensics/Security and a BSIT with focus in Forensics/Security. Have you explored those options? Also, I would 100% recommend talking with your advisor. Some colleges let you do a build your own focus/Minor as well.
Avatar
Avatar
codyp915
The main reason I need to automate it as much as possible is because I have Cerebral Palsy and can only use my left hand (effectively), therefore taking me longer to write up reports. So I want to make it easier on myself.
Have you thought about using a dictation software suite?
Avatar
Hello! My name is Mariam and I am a student in forensics. I am currently writing a research paper and need to collect some research. I have two surveys linked below that would be greatly appreciated if you took about five minutes of your day to help me out. Thank you so much! I promise they're short. https://forms.gle/WSRRKYQKzocurdkcA https://forms.gle/QReL4F62yS3BFk8e8
How technology evolving has affected forensics
Avatar
Avatar
Mariam™
Hello! My name is Mariam and I am a student in forensics. I am currently writing a research paper and need to collect some research. I have two surveys linked below that would be greatly appreciated if you took about five minutes of your day to help me out. Thank you so much! I promise they're short. https://forms.gle/WSRRKYQKzocurdkcA https://forms.gle/QReL4F62yS3BFk8e8
Assumption, when you say forensics, you mean digital forensics right?
Avatar
Doing some research for a presentation I'm giving later in the month. I don't see a way to make a poll here, so my Twitter thread: https://twitter.com/christammiller/status/1503371084078497793 and for those not on Twitter, same questions on LinkedIn (you can access all 3 questions from my profile): https://www.linkedin.com/in/christammiller/ Thanks in advance!
Hey #DFIR Twitter: I'm giving a presentation soon & would like to know (1/3): What's your take on how news media report on digital forensics and/or incident response?
Avatar
Hello! Can you help with some information about a GPS tracker, brand-Sinotrack model-AK-GT25. Some way using linux to access the equipment and read the memory?
Avatar
Avatar
Castrol
Hello! Can you help with some information about a GPS tracker, brand-Sinotrack model-AK-GT25. Some way using linux to access the equipment and read the memory?
I can't help you with the on board data, but is there a reason you need to know the local data? I've always had success in getting a warrant for the provider... the user of the device has to access the tracking data somewhere after all. Typically there is an online portal with plenty of good info available, unless its a different type of device I've not heard about yet.
Avatar
Avatar
whee30
I can't help you with the on board data, but is there a reason you need to know the local data? I've always had success in getting a warrant for the provider... the user of the device has to access the tracking data somewhere after all. Typically there is an online portal with plenty of good info available, unless its a different type of device I've not heard about yet.
The device is with me to do the forensic examination. The owner of the equipment is under arrest. The device has a SIM but no information, after a search with Cellebrite.
Avatar
I have a case of identity theft/ harassment I'm investigating. I have a suspect who I believe is utilizing Apple Private Relay to access websites and put requests to buy items in my victims name. On one of the website I was able to subpoena for webserver logs associated with the connections. They provided an IP address that (according the ARIN) comes back to AKAMAI. Does anyone know if I can link this back to my suspect somehow? Also, included in this response is a Google Analytics ID, does anyone know if this ID would still be broadcast while utilizing Private Relay or if this information is some sorta of autogenerated number (similar to how Apple now provides burner emails within the same service) Thank you for any assistance. (edited)
Avatar
right. Check the website for the manufacturer of the device, see if they service it. The SIM will have a provider code built into the ICCID written on the card, as well as the IMSI stored inside the card. What I have done in the past is provided those values to the service provider (spytec, most recently) and received a wealth of billing, activity and login info.
9:55 AM
@Castrol - it may be possible to get some type of data off of the device, but I got absolutely everything I needed from the site provided in nice neat excel docs and pdfs... I never looked into jtag to see if there was local info simply because I didn't need to. I know it doesn't directly answer your question but it may save you some time.
Avatar
Avatar
DMG
I have a case of identity theft/ harassment I'm investigating. I have a suspect who I believe is utilizing Apple Private Relay to access websites and put requests to buy items in my victims name. On one of the website I was able to subpoena for webserver logs associated with the connections. They provided an IP address that (according the ARIN) comes back to AKAMAI. Does anyone know if I can link this back to my suspect somehow? Also, included in this response is a Google Analytics ID, does anyone know if this ID would still be broadcast while utilizing Private Relay or if this information is some sorta of autogenerated number (similar to how Apple now provides burner emails within the same service) Thank you for any assistance. (edited)
Deleted User 3/14/2022 10:15 AM
Do you mean Akamai? If so then I would try subpoena them for log files. Surely since they are a huge load balancing/CDN there should be a session ID per IP address? If the Google Analytics ID starts with "UA-**-**" I would try Google dork for it to find the site(s) it is attached to and tracking.
Avatar
Avatar
Deleted User
Do you mean Akamai? If so then I would try subpoena them for log files. Surely since they are a huge load balancing/CDN there should be a session ID per IP address? If the Google Analytics ID starts with "UA-**-**" I would try Google dork for it to find the site(s) it is attached to and tracking.
Yes I do mean Akamai, not sure how I lost the A. I’ve fixed it now. I can’t seem to find there subpoena compliance department. Also referencing Apple info on the service they seem to split the traffic between themselves and cloud flare or Akamai or another company I’m not recalling this second . I’m wondering if anyone has patched these two together
Avatar
Avatar
Deleted User
Do you mean Akamai? If so then I would try subpoena them for log files. Surely since they are a huge load balancing/CDN there should be a session ID per IP address? If the Google Analytics ID starts with "UA-**-**" I would try Google dork for it to find the site(s) it is attached to and tracking.
The numbers starts with GA1.2.2
Avatar
Avatar
DMG
Yes I do mean Akamai, not sure how I lost the A. I’ve fixed it now. I can’t seem to find there subpoena compliance department. Also referencing Apple info on the service they seem to split the traffic between themselves and cloud flare or Akamai or another company I’m not recalling this second . I’m wondering if anyone has patched these two together
Deleted User 3/14/2022 10:30 AM
I think one could end up making calls to both services on the same site, but not certain. I checked and Akamai retains IP, browser and some telemetry. The best contact address I could find for LE was: privacy@akamai.com No idea about the GA1.2.2 but hopefully someone else on here can assist.
Avatar
Hey everyone! Does anyone have a good way of upgrading from iOS 13.2.2 to iOS 14.5 or 14.8? I have an iphone 8 that is my test device, with iOS 13.2.2 that I am trying to upgrade to iOS 14.5 to see about getting access to the findMy app data. I have already tried some methods, but they didnt seem to work.
Avatar
Avatar
m1gr@n3
Hey everyone! Does anyone have a good way of upgrading from iOS 13.2.2 to iOS 14.5 or 14.8? I have an iphone 8 that is my test device, with iOS 13.2.2 that I am trying to upgrade to iOS 14.5 to see about getting access to the findMy app data. I have already tried some methods, but they didnt seem to work.
forensicmike @Magnet 3/14/2022 11:00 AM
If you check here you can see which versions of iOS are still signed by Apple. The signature of the ipsw is verified during installation, and if it's not still signed, it will fail. https://idevicecentral.com/ios-signing-status/ The reason you need to pick the device type on this site is because it varies for older hardware which is not able to run the latest and greatest versions of things (e.g. iPhone 5 can only run up to iOS 10).
To view the current signed iOS versions, signed iOS Betas, as well as the versions that are no longer signed for your device, please select your device model from the list. You will be redirected automatically to the results page*. Please select your Device: ----- iPhone -----iPhone 13 Pro - iPhone14,2iPhone 13 Pro Max -
11:02 AM
As far as installing an iOS version that is not signed, I think you need shsh blobs. (I havent used them much) and you may also need to find an unsigned version of that IPSW rather than one you get from Apple. (edited)
Avatar
Avatar
forensicmike @Magnet
As far as installing an iOS version that is not signed, I think you need shsh blobs. (I havent used them much) and you may also need to find an unsigned version of that IPSW rather than one you get from Apple. (edited)
Thanks. I see that the OS that I want to go to is not signed. I just didnt want to go to the latest iOS from iOS 13.2.2.
Avatar
Avatar
DMG
Yes I do mean Akamai, not sure how I lost the A. I’ve fixed it now. I can’t seem to find there subpoena compliance department. Also referencing Apple info on the service they seem to split the traffic between themselves and cloud flare or Akamai or another company I’m not recalling this second . I’m wondering if anyone has patched these two together
I think the other company is Fastly. To go from the Akamai IP, you might have to request Apple and Akamai try to play ball. But from Apples doc (https://www.apple.com/privacy/docs/iCloud_Private_Relay_Overview_Dec2021.PDF) , they may not have info to help correlate:
Logging Private Relay’s design, combined with a minimal logging policy, ensures that proxy logs do not contain enough information to connect a user’s IP address or account information with their browsing activity. The information logged by Private Relay contains no unique identifiers and is limited to the following, for the sole purpose of operating and improving the service: • Connection properties and performance metrics • Network and region information derived from IP address • Anonymous token validation success rate and performance • Private Relay system resource usage The following fields related to anonymous token issuance are logged as a part of Private Relay’s fraud prevention and anti-abuse measures, but cannot be correlated with connection information: • iCloud account, software version, and request timestamp
Avatar
@Cellebrite got this Qualcomm Live error, and doing a search I have not seen anything posted yet. Thoughts ? Error" 7F777DE7
Avatar
nothing anormal, that can happen, keep trying @DCSO (edited)
👍 1
Avatar
Avatar
Castrol
The device is with me to do the forensic examination. The owner of the equipment is under arrest. The device has a SIM but no information, after a search with Cellebrite.
burgers_N_bytes 3/14/2022 3:04 PM
I’m not familiar with this device but based on my experience in similar situations, onboard data is stored on a EEPROM/Flash chip or the GPS chip itself. Chip off or JTAG are your best bets.
Avatar
Has anyone else renewed licensing with Cellebrite recently, after moving to a 'new subscription pricing' model in 2022? I am seeing price rises of UFED4PC and PA of 50% and Responder 60% rise on last year's bill. In some instances an increase of £2000 per annum per license. Subscription model seems to be short for prices going up, in a year that we have already seen big decoding errors in the tool with 2022 timestamps.
🤷‍♂️ 1
Avatar
Anyone know how to get individual builds of MS Office 16 for Windows? macOS builds are easy enough to get (e.g. 16.43.20110804, 16.44.20121301, 16.46.21021202, etc.) but we haven't found the Windows builds.
Avatar
Dr. Kaan Gündüz 3/15/2022 3:53 AM
i found these via google: https://macadmins.software/ (sorry just macs) https://tb.rg-adguard.net/public.php (edited)
This website was created with simplicity in mind. Here you can easily download products directly from Microsoft. This website neither its author are not affiliated with Microsoft Corporation.
3:58 AM
"Not all previous versions of Windows or Microsoft Office can be downloaded. The site is limited to providing token download links to installation media that Microsoft still allows for downloading. If you can't find the version of the software you want using the drop-down selection arrows, it's not available. Windows 7 and earlier, for example, is not available. One is also limited regarding editions, e.g. no Windows Pro or Education editions can be downloaded for Windows 10. For Windows 8.1 only the Pro edition can be downloaded. All of that is out of TechBench's control. Not all software downloads will generate an expiring time stamp. That's normal and the reason for that is unknown. It is, however, normal behaviour and not a fault with the site. To be on the safe side, download your media at your earliest convenience lest it gets removed from availability by Microsoft."
Avatar
Hi, does anyone know if I can skip the 2-step verification by SMS for a google drive account? I have access to two "backup security codes" but I never get the chance to use them. Any ideas?
Avatar
Avatar
Dr. Kaan Gündüz
"Not all previous versions of Windows or Microsoft Office can be downloaded. The site is limited to providing token download links to installation media that Microsoft still allows for downloading. If you can't find the version of the software you want using the drop-down selection arrows, it's not available. Windows 7 and earlier, for example, is not available. One is also limited regarding editions, e.g. no Windows Pro or Education editions can be downloaded for Windows 10. For Windows 8.1 only the Pro edition can be downloaded. All of that is out of TechBench's control. Not all software downloads will generate an expiring time stamp. That's normal and the reason for that is unknown. It is, however, normal behaviour and not a fault with the site. To be on the safe side, download your media at your earliest convenience lest it gets removed from availability by Microsoft."
At this point we have been collecting particular Office 16 builds (for Windows) by searching our own workstations for Office installations that haven't already been updated to later builds.
Avatar
Dr. Kaan Gündüz 3/15/2022 4:01 AM
i'm sure NIST has all of them 🙂
Avatar
Dr. Kaan Gündüz 3/15/2022 4:15 AM
it seems MS has a tool called office deployment tool
4:16 AM
"1. Download Office 2016 deployment tool at this page: Office 2016 Deployment Tool. 2. Unzip the tool to your computer, for example I unzip it to a folder named ODT on my desktop, then modify the configuration.xml file. you can copy the script below: <Configuration> <Add OfficeClientEdition="32" Channel="Broad" Version="16.0.8431.2270"> <Product ID="O365ProPlusRetail"> <Language ID="en-us" /> </Product> </Add> <Updates Enabled="FALSE" /> </Configuration> 3. Press Win+R to open Run, insert cmd to open Command window. 4. Type cd C:\Users\Administrator\Desktop\ODT to read the folder. Then type setup.exe /configure to download and install Office."
4:17 AM
it may be scripted, with a list of release numbers
Avatar
Avatar
Dr. Kaan Gündüz
it may be scripted, with a list of release numbers
I’m not sure if we’ve tried that… I’ll check and report back if it works! (Or, if it doesn’t.)
👍 1
Avatar
hi
Avatar
Avatar
Arsenal
I’m not sure if we’ve tried that… I’ll check and report back if it works! (Or, if it doesn’t.)
Dr. Kaan Gündüz 3/15/2022 4:29 AM
one alternative may be installing a WSUS server for office updates (edited)
Avatar
hello everyone, advice on a free antivirus?
Avatar
What platform are you trying to protect?
Avatar
windows
Avatar
Avatar
manuelevlr
windows
Microsoft's built-in protections are actually pretty good. Defender used to be pretty useless, but they've made big improvements in the last few years. I'm perfectly happy running my own personal Windows machine with just what's built in.
Avatar
Works pretty well for me too. Actually too good. Whenever I do some forensic testing with an image that has malware, I always end up getting detections.....
Avatar
Avatar
Arsenal
I’m not sure if we’ve tried that… I’ll check and report back if it works! (Or, if it doesn’t.)
We got errors when trying to request some builds we know existed… but we did get more with ODT than we had yesterday. Thanks!
👍 1
Avatar
Avatar
Arsenal
We got errors when trying to request some builds we know existed… but we did get more with ODT than we had yesterday. Thanks!
It is possible those builds were pulled due to vulnerabilities (think superseeded updates). Sadly it not easy anymore with the continual change in the O365 version vs the desktop platform
🤷‍♂️ 1
Avatar
Avatar
Murst
It is possible those builds were pulled due to vulnerabilities (think superseeded updates). Sadly it not easy anymore with the continual change in the O365 version vs the desktop platform
We’ll hassle some people at MS as our last step before we move on. 😉
Avatar
On a much different note, we've had three suspicious purchases this last week involving Kyiv. (After not having any interaction with UA for years.) Bogus physical addresses, notorious bulletproof hosts used during purchase, inability to confirm identity when asked, etc. Have any DF software vendors here noticed anything similar? (edited)
Avatar
Hi everyone, I hope y’all can point me in the right direction. I received this drive to be imaged and I have never seen this connection before and do not see any cables with my write blockers to connect to it. Browsing the internet I think it is a My Passport hard drive with its case removed. Can it be imaged using the micro USB port ? All of the My Passport drives I have seen use the USB micro data PC cable. Thanks in advance
Avatar
yeah that looks like a drive that was shucked
Avatar
randomaccess 3/15/2022 2:15 PM
Agreed. Standard external drive without a case
Avatar
I am currently working in a SOC doing a little bit of everything. The biggest thing that I feel like I am lacking is learning resources, there are a ton making it really difficult to determine which one to follow. If there was one book or course you would recommend that would cover IR and DFIR, what would it be? (This is my first post. Please let me know if I need to post this somewhere else!) (edited)
Avatar
Avatar
R3V3R53
Hi, does anyone know if I can skip the 2-step verification by SMS for a google drive account? I have access to two "backup security codes" but I never get the chance to use them. Any ideas?
hufflebeast 3/15/2022 4:44 PM
I recently had to do this, when it asks you to verify with the sms code there should be an option to say you no longer have the phone. If that option doesn’t appear you may have to click help and you should get the option. I believe at this point it will ask you to verify with a backup email or other method. FYI if you are trying to access the account from a device and or IP it has not connected to before, additional security verifications will be needed. If at all possible try to access the google account from a recognized IP or device.
Avatar
Avatar
Hutch
I am currently working in a SOC doing a little bit of everything. The biggest thing that I feel like I am lacking is learning resources, there are a ton making it really difficult to determine which one to follow. If there was one book or course you would recommend that would cover IR and DFIR, what would it be? (This is my first post. Please let me know if I need to post this somewhere else!) (edited)
Always depends on where you want to go and how much funding is. SANS courses are always good but expensive (5-8k). Depending on where you want to focus it might lead to different books.
Avatar
Avatar
Hutch
I am currently working in a SOC doing a little bit of everything. The biggest thing that I feel like I am lacking is learning resources, there are a ton making it really difficult to determine which one to follow. If there was one book or course you would recommend that would cover IR and DFIR, what would it be? (This is my first post. Please let me know if I need to post this somewhere else!) (edited)
Andrew Rathbun 3/15/2022 7:19 PM
Let's move this to #training-education-employment
Avatar
for local file decryption a la mobile app file lockers etc... what are y'all using as a solution? Currently I'm using the local version of cyberchef but I'm curious if there are other options out there. For most use cases I just wouldn't risk putting unknown content encrypted files into a web application because I don't want to lose control of it.
8:13 PM
This week I have been looking at another Android application designed to keep files secure. ‘Calculator – hide photos’ has many features, including a vault ‘…Through t…
Avatar
Avatar
manuelevlr
hello everyone, advice on a free antivirus?
Windows defender
Avatar
Avatar
Totoro
Hi everyone, I hope y’all can point me in the right direction. I received this drive to be imaged and I have never seen this connection before and do not see any cables with my write blockers to connect to it. Browsing the internet I think it is a My Passport hard drive with its case removed. Can it be imaged using the micro USB port ? All of the My Passport drives I have seen use the USB micro data PC cable. Thanks in advance
looks like a proprietary connector from seagate WD external drive that was removed from the case, if you check your local computer supply store, they should be able to match that mini usb connector (edited)
Avatar
Hello everyone! I acquired two disks from a computer (removed them from the computer and imaged them with a hardware write-blocker) and the report says that they are encrypted with Bitlocker. I mounted one of the disks with FTK Imager and then run this command in cmd: manage-bde -status. The picture shows the result (Conversion status: Used Space Only Encrypted, Protection status: Protection off, Lock status: Unlocked). The partition has only one folder with two files, so it's almost empty. Can someone please help me understand what am I looking at? Is the partition encrypted or not? Do I have all the data?
12:47 AM
I loaded the image in Axiom and it reports that it is a Clear Key Bitlocker and it will automatically decrypt the partition without the need for a password or recovery key. So I guess I do have all the data. But... what's the point of this encryption then?
Avatar
Avatar
Cip
I loaded the image in Axiom and it reports that it is a Clear Key Bitlocker and it will automatically decrypt the partition without the need for a password or recovery key. So I guess I do have all the data. But... what's the point of this encryption then?
So it probably shipped to the user like that. They are often shipped encrypted but "protected" with a clear key. The user then normally completes the setup procedure for the encryption and is prompted to save/print the bitlocker recovery key. Only after they have done this does the clearkey get deleted and the volume is normally unlocked using the TPM (Trusted Platform Module) from then on. The clearkey can also temporarily be written to the drive when doing a major upgrade between windows versions or if the user selects to suspend protection (i.e. when updating computer BIOS as this often causes the TPM to not release the decryption key). (edited)
👍 2
Avatar
Avatar
Cip
I loaded the image in Axiom and it reports that it is a Clear Key Bitlocker and it will automatically decrypt the partition without the need for a password or recovery key. So I guess I do have all the data. But... what's the point of this encryption then?
That command you ran normally list the key protectors. Normally you'd see TPM and Numerical Password (AKA Recovery Key). What is listed in your case?
Avatar
Avatar
AmNe5iA
That command you ran normally list the key protectors. Normally you'd see TPM and Numerical Password (AKA Recovery Key). What is listed in your case?
So I was really lucky to find this type of "encryption". Maybe the computer was seized when the suspect was upgrading to Windows 11. 🙂 That command shows that there are no key protectors (None Found)
1:49 AM
Probably it is the first thing you said, about the incomplete setup and that's why it was unencrypted
Avatar
Avatar
Cip
Probably it is the first thing you said, about the incomplete setup and that's why it was unencrypted
Yes, that's what I think has happened.
Avatar
Avatar
AmNe5iA
So it probably shipped to the user like that. They are often shipped encrypted but "protected" with a clear key. The user then normally completes the setup procedure for the encryption and is prompted to save/print the bitlocker recovery key. Only after they have done this does the clearkey get deleted and the volume is normally unlocked using the TPM (Trusted Platform Module) from then on. The clearkey can also temporarily be written to the drive when doing a major upgrade between windows versions or if the user selects to suspend protection (i.e. when updating computer BIOS as this often causes the TPM to not release the decryption key). (edited)
Thank you for the clarification Salute
Avatar
DefendingChamp 3/16/2022 5:49 AM
lol yeah luckily, otherwise SOL i think? Unless Bitlocker has a weak key
Avatar
Hashcat would be a good option for you. In this particular case, I'm almost sure that hashcat mode 26403 would be the one to use.
Avatar
Avatar
AmNe5iA
So it probably shipped to the user like that. They are often shipped encrypted but "protected" with a clear key. The user then normally completes the setup procedure for the encryption and is prompted to save/print the bitlocker recovery key. Only after they have done this does the clearkey get deleted and the volume is normally unlocked using the TPM (Trusted Platform Module) from then on. The clearkey can also temporarily be written to the drive when doing a major upgrade between windows versions or if the user selects to suspend protection (i.e. when updating computer BIOS as this often causes the TPM to not release the decryption key). (edited)
I'm confused. Basically, if during a windows update (we mean the blue screen "Update in progress .. DO NOT TURN OFF THE COMPUTER"?) And I had to remove the power, the disk would be unencrypted?
Avatar
I'm not sure, as I haven't been keeping an eye on it the last few years but when you did a major version upgrade from say 1903 to 1909 then yes, it would write the clearkey to the disk during the upgrade.
10:01 AM
I don't think it did that for just normal patch Tuesday updates though
Avatar
asd: D then he must have been very lucky to catch the "unencrypted" volume
Avatar
No cuz you'd still have the TPM and numerical password protectors. His indicates the user never "enabled" the encryption. Never activated the TPM and never saved the recovery key.
Avatar
Avatar
b8vr
Hashcat would be a good option for you. In this particular case, I'm almost sure that hashcat mode 26403 would be the one to use.
Maybe I’m not asking the right question, I have the key to decrypt the files and strings, the article covers that bit. I’m just talking about decrypting an image or a video file, does hashcat decrypt files now? I’ve always used hashcat to break a code, not decrypt a file
Avatar
Avatar
whee30
Maybe I’m not asking the right question, I have the key to decrypt the files and strings, the article covers that bit. I’m just talking about decrypting an image or a video file, does hashcat decrypt files now? I’ve always used hashcat to break a code, not decrypt a file
If it's a local copy of cyberchef you are using why can't you use that to decrypt the files? It's not like you are sending them across the internet.
Avatar
It works, I was just curious if there were other things out there. I’m just learning about this stuff now, it has worked the one time I’ve used it so far.
Avatar
Avatar
whee30
Maybe I’m not asking the right question, I have the key to decrypt the files and strings, the article covers that bit. I’m just talking about decrypting an image or a video file, does hashcat decrypt files now? I’ve always used hashcat to break a code, not decrypt a file
Nah, guess I just didn't understand the question properly. I thought you were speaking in more general terms and just used the calculator apps as an example. I was thinking you could use hashcat to crack those hashes, and then use the retrieved passwords for decryption.
Avatar
Avatar
whee30
It works, I was just curious if there were other things out there. I’m just learning about this stuff now, it has worked the one time I’ve used it so far.
If you have just one file cyberchef is probably the easiest. If you have a lot of files to decrypt at the same time you can do it fairly easily in python
👍 1
Avatar
Does anyone have resources for macOS forensics? Not particularly tools but knowledge of how the file system works, different forensic artifacts of interest etc.
Avatar
Deleted User 3/17/2022 1:38 AM
i recover dd.file and i need to know the orginal file name f0016384.mp4 how
Avatar
Avatar
Deleted User
i recover dd.file and i need to know the orginal file name f0016384.mp4 how
Digitalferret 3/17/2022 1:52 AM
if you haven't already, use a tool to scan for a filesystem, not just individual files.
Avatar
Deleted User 3/17/2022 1:53 AM
ext4
Avatar
Digitalferret 3/17/2022 1:54 AM
which software did you use to look at the dd image?
Avatar
Deleted User 3/17/2022 1:58 AM
scalpel
Avatar
Avatar
Digitalferret
which software did you use to look at the dd image?
Deleted User 3/17/2022 1:59 AM
scalpel
2:01 AM
sorry
2:01 AM
photorec
2:01 AM
not scalpel
Avatar
Avatar
Deleted User
scalpel
Digitalferret 3/17/2022 2:01 AM
not used scalpel in years, so can't adivse only that what i remember is it carves files by header and footer. maybe try some proprietary software like Raise data recovery or UFS Explorer see if they can find a file table
2:01 AM
yes, Photorec is same. carved data
Avatar
Deleted User 3/17/2022 2:02 AM
thank you sir
Avatar
Digitalferret 3/17/2022 2:02 AM
my pleasure, best of luck
2:03 AM
maybe also check https://www.turbogeek.co.uk/ext4-data-recovery/ for extra info. easy to read
👍 1
Avatar
Avatar
whee30
for local file decryption a la mobile app file lockers etc... what are y'all using as a solution? Currently I'm using the local version of cyberchef but I'm curious if there are other options out there. For most use cases I just wouldn't risk putting unknown content encrypted files into a web application because I don't want to lose control of it.
forensicmike @Magnet 3/17/2022 5:51 AM
Cyberchef is great, but if avoiding having to trust anyone is your goal, and you want to be able to decrypt 'anything', learning how to do it in a programming language (such as Python) is probably going to be a solid time investment for you.
Avatar
Avatar
Oscar
If you have just one file cyberchef is probably the easiest. If you have a lot of files to decrypt at the same time you can do it fairly easily in python
forensicmike @Magnet 3/17/2022 5:52 AM
haha, just saw this.. looks like Oscar and I are on the same page.
Avatar
Avatar
whee30
for local file decryption a la mobile app file lockers etc... what are y'all using as a solution? Currently I'm using the local version of cyberchef but I'm curious if there are other options out there. For most use cases I just wouldn't risk putting unknown content encrypted files into a web application because I don't want to lose control of it.
forensicmike @Magnet 3/17/2022 5:54 AM
if you are delving into reverse engineering, another option is to observe the app you are researching actually doing the decryption, helping to spill its secrets.
👍 1
Avatar
Has anyone had any issues with Axiom not pulling back all the results from a keyword search? Mine seems to be missing some, even when the keyword is simply in the file name, there is no pattern to what it is missing?
Avatar
Avatar
Cip
Probably it is the first thing you said, about the incomplete setup and that's why it was unencrypted
This is quite common. Probably about half of the bitlockered computers I have dealt with are clear key encrypted. I assume the majority are just from incomplete bitlocker setups. Seems unlikely to seize that many devices mid-update. Arsenal and Axiom both deal just fine with clear key.
this 1
Avatar
Avatar
malen123
Has anyone had any issues with Axiom not pulling back all the results from a keyword search? Mine seems to be missing some, even when the keyword is simply in the file name, there is no pattern to what it is missing?
So I’m not sure if this is what you’re experiencing, but I have observed that axiom will start to get choked up on “stacked” filters… like you search for a term and then filter on column within those results. At that point, axiom will sometimes be unable to revert back to a fully non-filtered state and will need to be turned off and on again. If you hit clear filters, you only go as far back as your first filter. Is that what you’re seeing or completely different?
Avatar
Avatar
whee30
So I’m not sure if this is what you’re experiencing, but I have observed that axiom will start to get choked up on “stacked” filters… like you search for a term and then filter on column within those results. At that point, axiom will sometimes be unable to revert back to a fully non-filtered state and will need to be turned off and on again. If you hit clear filters, you only go as far back as your first filter. Is that what you’re seeing or completely different?
Slightly different. The only filter I will have on is a keyword, it just doesn't highlight them all. For example of all the torrent files I extracted, "young" appears 10 times, when I do a keyword search for "young" it only filters out and highlights 6 of them. No other filters on other than that one keyword
Avatar
Sounds like the indexing didn’t get done all the way maybe? Are the artifacts from different partitions or sources? Was the processing completed?
Avatar
Does Carbon Black EDR Sensors use p2p to update? once one fetches it it'll share to another
Avatar
Avatar
whee30
Sounds like the indexing didn’t get done all the way maybe? Are the artifacts from different partitions or sources? Was the processing completed?
All artifacts on the same partition and the processing was completed successfully with no errors
Avatar
Also, if I just use the search box in the top right to search for a single word it pulls back all the results, it just the keyword lists filter than isn't
Avatar
Sorry for the cross-post the computer channel, but want as a varied of an opinion as possible. I have a case where all the images are located in the unallocated area of a hard drive. I have various sizes of the thumbnails and have images with meta data (phone/time and date/Geo). Is it safe to say that since I have both the various sized thumbnails and recovered images with metadata, that the images were previously located on this drive and not just cached? This is a Linux drive.
Avatar
anyone from Secret Service here? I got a super weird LinkedIn request from someone claiming to be an Analyst, but stuff is seriously not adding up. I've been getting some weird LinkedIn requests lately so seems like this could be part of a campaign? (edited)
Avatar
There’s a government US role that you could tag if you want to poke that nest
Avatar
Update: I might be wrong. hahahaha
😂 1
Avatar
Avatar
sholmes
Sorry for the cross-post the computer channel, but want as a varied of an opinion as possible. I have a case where all the images are located in the unallocated area of a hard drive. I have various sizes of the thumbnails and have images with meta data (phone/time and date/Geo). Is it safe to say that since I have both the various sized thumbnails and recovered images with metadata, that the images were previously located on this drive and not just cached? This is a Linux drive.
You mentioned this being an Ubuntu machine. I had mentioned previously checking the journal for to see if you could match blocks with inodes. That would be a monumental task with a large number of files and would be spotty at best. Another thought: Is this computer single user or multi user? If there are a limited number of users you could check home directories for the XML files that maintain recently used objects. I dont' use Ubuntu or have an Ubuntu box handy to test with, but Ubuntu's default GUI is GTK based IIRC, so you might find recently used artifacts (.xbel or .xml) under $HOME/.local (maybe .local/share?). It's worth a look.
👍 1
6:09 PM
The amount of data you find in there is likely to be very limited, but here should be some access times if you have any way of correlating file activity (not easy, I know).
Avatar
Thanks @5cary I’ll check those Monday. I think I have what I need, but if I can show further connection, it can’t hurt the case.
Avatar
Deleted User 3/19/2022 9:49 AM
vulnerable web application project that OWASP wrote node.js any idea
Avatar
Avatar
Deleted User
vulnerable web application project that OWASP wrote node.js any idea
Andrew Rathbun 3/19/2022 12:49 PM
what are you asking?
Avatar
Avatar
Andrew Rathbun
what are you asking?
Deleted User 3/19/2022 12:52 PM
i find the anwser thank you for asking
Avatar
Avatar
Deleted User
i find the anwser thank you for asking
Andrew Rathbun 3/19/2022 12:52 PM
Care to report for the benefit of the rest of us?
Avatar
Deleted User 3/19/2022 12:54 PM
I was studying one of the site rooms letsdefend
Avatar
Avatar
Deleted User
I was studying one of the site rooms letsdefend
Andrew Rathbun 3/19/2022 12:54 PM
Ok, well what did you find in case someone a year from now has the same "question" as you? Can you provide what solved your problem so someone else can benefit from it?
12:57 PM
i was studing this room and there is a question What is the name of the vulnerable web application project that OWASP wrote with Node.js for security researchers to improve themselves? (Format: xxx_xxx)
12:58 PM
Juice_Shop
Avatar
Avatar
Andrew Rathbun
Ok, well what did you find in case someone a year from now has the same "question" as you? Can you provide what solved your problem so someone else can benefit from it?
Deleted User 3/19/2022 12:58 PM
sir
12:59 PM
i have a problem i am cisco in Instructor Test-Drive (Evaluation Academy) - globalacademy - 400056343 Instructor,
Avatar
Andrew Rathbun 3/19/2022 1:00 PM
Alright, I was more interested in the methodology on how you got to the answer, not the answer itself, but I tried 🤷‍♂️
Avatar
Deleted User 3/19/2022 1:00 PM
sorry
1:00 PM
for that
1:00 PM
It just requires a simple search
1:01 PM
if you interested in website that you can practise blue team operation i can help you
Avatar
Andrew Rathbun 3/19/2022 1:02 PM
Never lose sight of the fact that just because something is simple to you doesn't mean it's simple to everyone. Any time you can break something down and explain to others how you got to a certain answer is way more valuable that giving them the answer. It's the whole "give someone a fish vs teaching them how to fish" (edited)
💯 4
👍 3
Avatar
Deleted User 3/19/2022 1:04 PM
okay
Avatar
Avatar
Deleted User
if you interested in website that you can practise blue team operation i can help you
Ye post the site
Avatar
Deleted User 3/20/2022 3:19 AM
i was meaning other website (edited)
Avatar
Hi all, Anybody worked with Mvision EDR?
Avatar
Avatar
malen123
Has anyone had any issues with Axiom not pulling back all the results from a keyword search? Mine seems to be missing some, even when the keyword is simply in the file name, there is no pattern to what it is missing?
I have found that the issue is that the "Artefact Only" keyword list search doesn't give us the option to turn case sensitive on or off and it appears to be on by default. This is why my search was missing some results. I have raised this with Magnet and they are looking into it but something to be aware of
Avatar
what does VAD mean?
Avatar
Avatar
Tejas
what does VAD mean?
Andrew Rathbun 3/21/2022 10:58 AM
In this part of the series, we will understand how the process can be enumerated within memory. Just as a refresher in part 1 of this series we had a look
Avatar
Thanks 🙏
Avatar
Anyone have experience with Microsoft Onenote? I have a URL that was found with Axiom (carved) and can be viewed in hex. It has "label" :"https://url of interest". When I click on view source. But I dont see the link in the current onenote or the previous versions
2:26 PM
I didnt find a way to view labels within OneNote
Avatar
Anyone have a good solution either via Cellebrite PA or other means to determine which phone number my phone has had the most text/instant messages with? For example, I want to be able to show the "top 5 numbers" that my phone has texted/instant messaged the most.
Avatar
if you click on the various column headers, you can see how many of a specific contact there is... you can filter the columns this way too. Since many of the chats are fragmented among categories, you might be better served doing this type of filtering on timeline where everything is put together
Avatar
Avatar
whee30
if you click on the various column headers, you can see how many of a specific contact there is... you can filter the columns this way too. Since many of the chats are fragmented among categories, you might be better served doing this type of filtering on timeline where everything is put together
Yeah, I've been able to filter the columns, but when I filter it, i can only do it for one side of the conversation at a time. I'm trying to see which conversations have the most messages together, if that makes sense.
Avatar
right. you may just have to do it for each column and then add up. I';ve never used analytics but that may be something that tool accomplishes
Avatar
Look up Pivot table for excel
Avatar
where are good places to look at research done on dating app forensics? Interested in it as a broad topic right now. Was going to do my own research on what information I can pull from a phone backup but want to know whats been done and if research done has suggestions as to what I can do to contribute to the topic.
Avatar
Avatar
Jay528
Anyone have experience with Microsoft Onenote? I have a URL that was found with Axiom (carved) and can be viewed in hex. It has "label" :"https://url of interest". When I click on view source. But I dont see the link in the current onenote or the previous versions
Andrew Rathbun 3/21/2022 6:12 PM
The DB is a mess for OneNote. It's just a SQLite databases. I'm guessing they're just running regex over the DB and calling it an artifact of interest? Get the DB and throw it into a SQLite tool so you can try to find the context surrounding that URL yourself
Avatar
thanks
Avatar
Avatar
AMB
Anyone have a good solution either via Cellebrite PA or other means to determine which phone number my phone has had the most text/instant messages with? For example, I want to be able to show the "top 5 numbers" that my phone has texted/instant messaged the most.
Wouter#0195 3/22/2022 1:15 AM
These statistics are available by default with @Oxygen Forensics’s OFD (not OxyViewer). (edited)
oxygen 3
Avatar
Hello all, I was wondering if anyone here uses an Apple M1 Macbook to back up mobile devices (mobile-forensic). Of course the M1 can't run native Windows. We would use it with Parallels and a Windows 10 and only in case of need, as we otherwise have our workstations. We are currently in the procurement process and just want to decide whether it makes sense or not.
Avatar
Avatar
Manu182
Hello all, I was wondering if anyone here uses an Apple M1 Macbook to back up mobile devices (mobile-forensic). Of course the M1 can't run native Windows. We would use it with Parallels and a Windows 10 and only in case of need, as we otherwise have our workstations. We are currently in the procurement process and just want to decide whether it makes sense or not.
randomaccess 3/22/2022 2:47 AM
You can't as far as I know run win10 in parallels the way you're thinking
2:48 AM
You can run arm win10. But not many forensics tools are going to run out of the box. Interpreted ones would, and maybe dotnet6 core will run I haven't checked. But yeah, M1 is dramas for forensics
Avatar
Avatar
randomaccess
You can run arm win10. But not many forensics tools are going to run out of the box. Interpreted ones would, and maybe dotnet6 core will run I haven't checked. But yeah, M1 is dramas for forensics
Thank you for the answer. However, Parallels supports x86 & x64 Windows 10/11 for M1 as far as I know. The applications should therefore already run. It would only be important that connected USB ports are hardwired to the VM. Even if a mobile device comes with different hardware IDs.
Avatar
Avatar
Manu182
Thank you for the answer. However, Parallels supports x86 & x64 Windows 10/11 for M1 as far as I know. The applications should therefore already run. It would only be important that connected USB ports are hardwired to the VM. Even if a mobile device comes with different hardware IDs.
randomaccess 3/22/2022 2:56 AM
https://kb.parallels.com/125375 I'm not certain that's true
To install a new virtual machine on a Mac with Apple M1 chip, you need to use an with a .
Avatar
Avatar
randomaccess
https://kb.parallels.com/125375 I'm not certain that's true
you're right, thank you. So the decision has been made.
Avatar
Dr. Kaan Gündüz 3/22/2022 5:55 AM
hi, parallels supports the ARM version of windows
Avatar
Avatar
Andrew Rathbun
The DB is a mess for OneNote. It's just a SQLite databases. I'm guessing they're just running regex over the DB and calling it an artifact of interest? Get the DB and throw it into a SQLite tool so you can try to find the context surrounding that URL yourself
Looks like my user deleted the link and it was found in slack. I did some testing and i was able find the deleted link
👍 1
Avatar
Avatar
Manu182
Thank you for the answer. However, Parallels supports x86 & x64 Windows 10/11 for M1 as far as I know. The applications should therefore already run. It would only be important that connected USB ports are hardwired to the VM. Even if a mobile device comes with different hardware IDs.
Nope, but UTM does support x86
11:00 AM
It’s what I use for x86 on the M1 https://getutm.app/
Run virtual machines on iOS
11:01 AM
Btw UTM runs really well, in some cases the x86 runs better than on bare metal in the case of windows xp xD
11:03 AM
With M1 there is also rosseta, not sure if that would work in your case for applications but it’s there nonetheless
Avatar
Paul Mastered 3/22/2022 12:03 PM
hello everyone and thanks for giving me access to the server Salute
Avatar
Avatar
ryd3v
With M1 there is also rosseta, not sure if that would work in your case for applications but it’s there nonetheless
Ok thanks, that sounds a little bit like test enviroments. Not for really productifity mobile forensic. So the M1 isn`t the solution I searched for.
Avatar
Cool! That’s too bad, it’s been great for me
2:21 PM
But I also have access to x86 machines if need be, but honestly 96% is on the M1
Avatar
Short version: Here is the link to pre-order: Long version: Pre-order to get your copy faster. Pre-order to get your copy cheaper ($10 off plus FREE shipping*) *For international (non-USA) orders, …
5:46 PM
pre order for X-Ways Practitioner guide 2.0 is out!
👍 7
💸 1
Avatar
Nice! Easy money to spend
Avatar
Avatar
ryd3v
But I also have access to x86 machines if need be, but honestly 96% is on the M1
But can you really read smartphones with UTM? Can you hardwire a USB port so that the bootloader can be reloaded in an emergency? Just as an example. And why can UTM do that, but Parallels can't? There must be some restrictions.
Avatar
Avatar
DCSO
?? TCL A509DL MTK 6765 file based Android 11 - Patched October 2021 I tried MTK Live and filesystem MTK nothing 😦 Thoughts ?
Any luck with this?
Avatar
Does anybody know if a device receives new cookies every time you visit a website? On mobile or desktop. I have a case where suspect had multiple cookies from website on same date and then one on another date. Was asked if that meant he only visited the website on those two dates (not including the possibility of clearing cookie data).
Avatar
Avatar
Ghosted
Any luck with this?
Nope 😦
👍 1
Avatar
digital Bowles 3/23/2022 6:57 AM
Does anyone have a supplier for phone parts. We have an iPhone 12 with a broken screen. I can replace the screen myself, but need to find one at a good price.
Avatar
Avatar
Manu182
But can you really read smartphones with UTM? Can you hardwire a USB port so that the bootloader can be reloaded in an emergency? Just as an example. And why can UTM do that, but Parallels can't? There must be some restrictions.
When you say hardwire, do you mean USB pass through? Both support that, reloading bootloaders isn’t a problem, the only issue is using x86 software, and only UTM will run a x86 Based OS
Avatar
Avatar
RyanB
Does anybody know if a device receives new cookies every time you visit a website? On mobile or desktop. I have a case where suspect had multiple cookies from website on same date and then one on another date. Was asked if that meant he only visited the website on those two dates (not including the possibility of clearing cookie data).
Dr. Kaan Gündüz 3/23/2022 8:50 AM
I believe it depends on the website's cookie preferences.
8:50 AM
And of course whether the user deletes the cookies periodically or not.
Avatar
Avatar
RyanB
Does anybody know if a device receives new cookies every time you visit a website? On mobile or desktop. I have a case where suspect had multiple cookies from website on same date and then one on another date. Was asked if that meant he only visited the website on those two dates (not including the possibility of clearing cookie data).
Digitalferret 3/23/2022 8:53 AM
might want to dig a bit deeper on returned values from whatever software you are using to analyse that.
Avatar
Avatar
RyanB
Does anybody know if a device receives new cookies every time you visit a website? On mobile or desktop. I have a case where suspect had multiple cookies from website on same date and then one on another date. Was asked if that meant he only visited the website on those two dates (not including the possibility of clearing cookie data).
Digitalferret 3/23/2022 8:53 AM
it might also be worth emulating the site and browser setup, options permitting, and check. i just did a dry run with Firefox and bbc.co.uk. the cookies returned showed bbc.com and over several iterations of reload and clicking links on the site the number raised by 2 with bbc.co.uk appearing after several trips.
8:54 AM
this is just a short dummy run i tried. browser is Firefox and util is Nirsoft Cookie Viewer Edit: that's 4 and 6, i removed non-bbc lines (adsbexchange) (edited)
👍 1
8:57 AM
ccleaner showed cookies slightly differently
Avatar
Avatar
RyanB
Does anybody know if a device receives new cookies every time you visit a website? On mobile or desktop. I have a case where suspect had multiple cookies from website on same date and then one on another date. Was asked if that meant he only visited the website on those two dates (not including the possibility of clearing cookie data).
Digitalferret 3/23/2022 9:04 AM
the other goldmine you might want to check is an sqlite viewer. there's a lot of extra info there that will show visited websites despite data being cleaned by some regular "hide my history" packages
9:10 AM
this from recent visit to https://sqliteviewer.app find sqlite files with Everything file finder and just drag over to the web interface (edited)
Avatar
Seeking information/knowledge on proper techniques and procedures for collection data on an Apple watch?
Avatar
Dr. Kaan Gündüz 3/23/2022 9:31 AM
Microsoft is releasing a new optional update for Windows 10, and it includes a new feature called Search Highlights, along with fixes.
👀 1
Avatar
Avatar
nbh2493
Seeking information/knowledge on proper techniques and procedures for collection data on an Apple watch?
I know the first gens had a data port inside the wrist band attachment point. Beyond that I believe you are best off downloading the device it syncs to.
9:52 AM
The panel inside here has a six pin connector from what I’ve read. Never done it myself
9:54 AM
How do you extract an Apple Watch? While several extraction methods are available, you need an adapter if you want to get the data directly from the device. There are several different options available on the market, some of them costing north of $200. We tested a large number of such adapters. How
Avatar
Thanks Whee30 !
Avatar
Avatar
digital Bowles
Does anyone have a supplier for phone parts. We have an iPhone 12 with a broken screen. I can replace the screen myself, but need to find one at a good price.
ScottKjr3347 3/23/2022 3:11 PM
https://www.fixez.com/ they are local here in Vegas.
Find brand new smartphone and tablet replacement screens and parts at affordable prices. DIY repair resources including tools, videos, and teardown guides.
Avatar
Looking for iOS Application UUID listing. This exist?
Avatar
Avatar
coastal4n6
Looking for iOS Application UUID listing. This exist?
I'm pretty sure the UUIDs are hashes of application and hardware ID. In PA, they're listed under installed applications so you can match them up.
Avatar
Is there a product that people here use to show status of cases to detectives? I have a small office with 8-10 people that have cases with me at a given time. I don't have the budget for a $$$ solution, but the shared excel doc I currently use leaves something to be desired. Just not very polished. Ideally I would find a solution that I update on the backend and everyone else visits a web interface or something like that on the intranet.
9:46 AM
To give them an idea of where their project is in the queue or remind them I'm waiting on something.
Avatar
Avatar
whee30
Is there a product that people here use to show status of cases to detectives? I have a small office with 8-10 people that have cases with me at a given time. I don't have the budget for a $$$ solution, but the shared excel doc I currently use leaves something to be desired. Just not very polished. Ideally I would find a solution that I update on the backend and everyone else visits a web interface or something like that on the intranet.
You can try checking out Monolith, not sure what they're pricing looks like these days but I remember it being reasonable https://monolithforensics.com/ (edited)
Monolith Pro is a comprehensive case management system for digital forensics. Monolith can be used with many users across an organization.
Avatar
I remember seeing this at IACIS, I think it was one dude doing all the programming etc?
Avatar
Avatar
whee30
I remember seeing this at IACIS, I think it was one dude doing all the programming etc?
yep, Matt Danner I think is his name
👍 1
Avatar
Got my demo, will install it later today. Thanks for the tip
🔥 1
Avatar
Hi anyone, can i ask what is possible the way to trace back the transaction of crypto, i’m currently learning about the nth room case in Korea, as they said that they got the location of suspect by tracing back of the crypto transaction
7:03 PM
And i’m think it is quite interesting to see how it’s work
Avatar
@whee30 You mean you telling them it will be done when I say it's done doesn't work for them ? 😆
Avatar
Is there any way to find out the initial startup of a smartphone (Android / iOS)? Artifacts, where resetting or wiping a smartphone can be analyzed, I have found from several articles. Is there a timestamp in a database that keeps the actual first startup despite multiple wipes or resets? thx lg
Avatar
Avatar
Bbteela
Hi anyone, can i ask what is possible the way to trace back the transaction of crypto, i’m currently learning about the nth room case in Korea, as they said that they got the location of suspect by tracing back of the crypto transaction
Chris Hammerschmidt 3/25/2022 10:14 AM
Trace back to where? Crypto currencies have a public ledger, so you can trace back any coin in its history from/to known addresses/exchanges etc
Avatar
Avatar
peMo
Is there any way to find out the initial startup of a smartphone (Android / iOS)? Artifacts, where resetting or wiping a smartphone can be analyzed, I have found from several articles. Is there a timestamp in a database that keeps the actual first startup despite multiple wipes or resets? thx lg
Avatar
Is here a way how to know the volumes names of the USBs?
Avatar
Avatar
wiener
Is here a way how to know the volumes names of the USBs?
Andrew Rathbun 3/25/2022 4:51 PM
There should be a plugin that resolves all of those. Use bookmarks to find it. There will be a second tab named after the plugin which will have the parsed output. You're looking at the raw output
Avatar
Avatar
wiener
Is here a way how to know the volumes names of the USBs?
randomaccess 3/25/2022 11:35 PM
USB Detective heh
11:35 PM
but also usb stuff can be a bit finicky because things get overwritten. So you may not be able to tell what that volume GUID relates to
Avatar
hey guys i have a small question novice here
1:16 AM
i have a rootfs.ext4 filesystem data i mounted it and i changed content of a file
Avatar
Hello everyone, between OXYGEN and UFED4pc, which of the two is better? or are they complementary to each other? I specify that I have never used oxygen.
Avatar
Avatar
Andrew Rathbun
There should be a plugin that resolves all of those. Use bookmarks to find it. There will be a second tab named after the plugin which will have the parsed output. You're looking at the raw output
hmm. ok. I will try to use the plugin if i will figure out how to do it. But i don't understand what you mean the second tab, which one?
Avatar
Avatar
manuelevlr
Hello everyone, between OXYGEN and UFED4pc, which of the two is better? or are they complementary to each other? I specify that I have never used oxygen.
Very similar, but both do things the other doesn't. There isn't a single tool in my opinion that'll cover everything so budget depending I'd have both at least
Avatar
Avatar
wiener
hmm. ok. I will try to use the plugin if i will figure out how to do it. But i don't understand what you mean the second tab, which one?
Andrew Rathbun 3/26/2022 4:19 AM
Right click copy key path of where you are in the hive and paste that here please
Avatar
Hi, thx - i have already studied these articles in detail and can only recommend them. I could not find any artifacts where, for example, an iPhone was put into operation for the very first time. The last reset did. Android (FFS image) has a clear advantage here.
Avatar
Avatar
Andrew Rathbun
Right click copy key path of where you are in the hive and paste that here please
Hi, which plugin do you mean?
Andrew Rathbun started a thread. 3/26/2022 12:34 PM
Avatar
Avatar
Andrew Rathbun
Right click copy key path of where you are in the hive and paste that here please
I already figured it out by my self. I was only in root\system\MountedDevices
👍 1
Avatar
@Cellebrite anyone able to provide some urgent assistance? Much appreciated
Avatar
Avatar
RP
@Cellebrite anyone able to provide some urgent assistance? Much appreciated
Hey
Avatar
Hi, I'm thinking of taking up eCDFP - eLearn Security's Certified Digital Forensics Professionals. https://elearnsecurity.com/product/ecdfp-certification/ How is the standard.. Is it worth the money for a beginner (edited)
The eCDFP designation stands for eLearnSecurity Certified Digital Forensics Professional. eCDFP is the most practical and advanced certification available on the market on digital forensics. By passing the challenging exam and obtaining the eCDFP certificate, a digital forensics investigator can prove their advanced skills in the fast growing ar...
Avatar
Hello guys Happy to meet this community A small question if i may, will be more then happy for answers Im searching after the best tool for automatic detection of malware or malicious (shells, Etc) activity from an infected machine dump. Iv used a few trials of Belkasoft and axiom but They dont realy doing anything special, Didnt even recognizing hashes of wannacry... Any advices? (edited)
Avatar
Avatar
Y8765
Hello guys Happy to meet this community A small question if i may, will be more then happy for answers Im searching after the best tool for automatic detection of malware or malicious (shells, Etc) activity from an infected machine dump. Iv used a few trials of Belkasoft and axiom but They dont realy doing anything special, Didnt even recognizing hashes of wannacry... Any advices? (edited)
Andrew Rathbun 3/27/2022 8:38 AM
try Thor-Lite (free) or Thor (paid). Use something like Chainsaw to leverage Sigma rules against the .evtx files
Avatar
Avatar
Andrew Rathbun
try Thor-Lite (free) or Thor (paid). Use something like Chainsaw to leverage Sigma rules against the .evtx files
There is a budget Looking for the most efficient one, or more then one:) (edited)
Avatar
Andrew Rathbun 3/27/2022 8:39 AM
No offense to those tools mentioned and many common tools you didn't mention, but they are digital forensic tools, and great ones at that, but they are NOT IR tools, which your question specifically falls into the IR realm. If you're referring to an Exchange Server, then Thor-Lite will serve you very well.
8:40 AM
You want to leverage YARA, Sigma, and any other detection rules to try and identify evil that is present on that dump (edited)
Avatar
Avatar
Andrew Rathbun
No offense to those tools mentioned and many common tools you didn't mention, but they are digital forensic tools, and great ones at that, but they are NOT IR tools, which your question specifically falls into the IR realm. If you're referring to an Exchange Server, then Thor-Lite will serve you very well.
Regular Endoint inside of an organization
Avatar
Avatar
Andrew Rathbun
You want to leverage YARA, Sigma, and any other detection rules to try and identify evil that is present on that dump (edited)
Tnx for your edvices 👌
Avatar
Avatar
Y8765
Regular Endoint inside of an organization
Andrew Rathbun 3/27/2022 8:41 AM
Run Thor-Lite against the mounted dump, see what it comes up with. Either that or Loki. One in the same, but Thor-Lite is the new hotness and made in Golang vs Python so it's faster and has better reporting functionality than Loki. https://github.com/EricZimmerman/KapeFiles/tree/master/Modules/Apps/Thor-Lite will give you a running start for syntax
8:42 AM
I just trialed Thor for a week and it was awesome. Definitely going to make a push to purchase at least one license for it.
Avatar
Avatar
Andrew Rathbun
Run Thor-Lite against the mounted dump, see what it comes up with. Either that or Loki. One in the same, but Thor-Lite is the new hotness and made in Golang vs Python so it's faster and has better reporting functionality than Loki. https://github.com/EricZimmerman/KapeFiles/tree/master/Modules/Apps/Thor-Lite will give you a running start for syntax
Oh, its in eric zimmerman tools Ive downloaded many tools and pre-ready work stations, Just there are too many and Didnt had the time yet to get into his tools, Tnx for the shurcut (edited)
Avatar
Andrew Rathbun 3/27/2022 8:44 AM
Thor-Lite is not an EZ Tool. It's simply a Module in KAPE that I linked you to. If you use KAPE, then you can leverage Thor-Lite with the click of a button. If not, then that Module at least gives you a running start on what the syntax would look like for your use case (edited)
Avatar
Sounds cool, will defintly try tommorow
Avatar
Andrew Rathbun 3/27/2022 8:45 AM
Ping me if you have issues. Good luck
👍 1
Avatar
Avatar
Andrew Rathbun
Ping me if you have issues. Good luck
Much appreciated
Avatar
Avatar
Andrew Rathbun
I just trialed Thor for a week and it was awesome. Definitely going to make a push to purchase at least one license for it.
Any idea the relative cost of a license? I cannot see anything on the website
Avatar
Avatar
Tcisaki
Any idea the relative cost of a license? I cannot see anything on the website
Andrew Rathbun 3/27/2022 11:08 AM
There's multiple licensing options available depending on your use case, i.e., deploying on client environment, only running against images, etc. I'll DM you
Avatar
ccube | damFamily 3/27/2022 12:53 PM
Question about SIM card extractions using Cellebrite, what is the voice mail number that’s stored in contacts? Is it a number that called the phone?
Avatar
I don’t know that I’ve seen that, perhaps it’s the number that the user has to call to access voicemail? Is it stored as a contact?
Avatar
ccube | damFamily 3/27/2022 1:17 PM
Yes stored as a contact
Avatar
My guess is that it’s what I suggested. You probably see some other default contacts too, right? Like 411 or similar? The user calls that number to access the voicemail
Avatar
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ .0
Avatar
Hopefully that’s not a password 😃
😅 1
Avatar
Looks like a toddler or a cat to me 😉
😂 2
Avatar
Anybody using foreman forensics in an iso 17025 compliant lab? Looking for a case management tool that will tick the accreditation boxes. Anyone have any recommendations?
Avatar
Avatar
Pseudonym
Anybody using foreman forensics in an iso 17025 compliant lab? Looking for a case management tool that will tick the accreditation boxes. Anyone have any recommendations?
randomaccess 3/28/2022 1:49 AM
Is that still under development?
Avatar
Looks like it’s released, with installation guides, no idea if if it’s usable yet, I’m still scoping out options
2:03 AM
Options include Lima and black rainbow, but the lab will only be small, don’t want to swamp funds with minimum spends with those companies
Avatar
Avatar
Pseudonym
Options include Lima and black rainbow, but the lab will only be small, don’t want to swamp funds with minimum spends with those companies
randomaccess 3/28/2022 2:58 AM
Look at monolith. It's relatively inexpensive
Avatar
Avatar
FullTang
Looks like a toddler or a cat to me 😉
Deleted User 3/28/2022 3:16 AM
Russian Woodpecker.
🐦 1
Avatar
Avatar
FullTang
Looks like a toddler or a cat to me 😉
Or one very dirty key 😂
⌨️ 1
Avatar
Original message was deleted or could not be loaded.
BritishBenji 3/28/2022 4:45 AM
This might want deleting. It's a scam
4:47 AM
@Mistercatapulte (sorry for ping, only mod with online status)
Avatar
Mistercatapulte 3/28/2022 4:48 AM
@BritishBenjithx
peepo 1
Avatar
Hi! I'm looking for a way to create a hashset from the content of a .zip file. Tried to create a program myself but running out of time. Any ideas?
Avatar
Avatar
callzor
Hi! I'm looking for a way to create a hashset from the content of a .zip file. Tried to create a program myself but running out of time. Any ideas?
Import to x-ways and export list of hashes maybe?
Avatar
Avatar
FullTang
Looks like a toddler or a cat to me 😉
Andrew Rathbun 3/28/2022 7:17 AM
Can confirm, have 1 of toddler and 5 of cat. Happens more than I care to admit 🙂
🐈 2
🚸 1
👍 1
Avatar
Having a discussion with a colleague. what's the definitive way everyone gets the windows installation time. Do you trust the tools as X-Ways shows it as install time but Axiom shows it as Install / Update time. Windows and User folders can show dates that pre date this time too. What th one go-to way you get it for sure?
Avatar
Avatar
Majeeko
Having a discussion with a colleague. what's the definitive way everyone gets the windows installation time. Do you trust the tools as X-Ways shows it as install time but Axiom shows it as Install / Update time. Windows and User folders can show dates that pre date this time too. What th one go-to way you get it for sure?
Is it even needed to be known? But to answer your question, depends on version
Avatar
Were discussing a Windows 10 pro machine. The Tools and system info are giving a date but the Windows / User created time is almost a year prior to this date. I have one camp that says the Windows folder is the original and one camp that says the Tools are correct. I'm curious for some more input from other people.
Avatar
Avatar
Majeeko
Were discussing a Windows 10 pro machine. The Tools and system info are giving a date but the Windows / User created time is almost a year prior to this date. I have one camp that says the Windows folder is the original and one camp that says the Tools are correct. I'm curious for some more input from other people.
Well it used to be you could use a registry value that stated the install date. However, with Windows 10, the registry install date indicates the date the latest Feature Update build that was installed. Could that be what is happening?
Avatar
Avatar
Majeeko
Were discussing a Windows 10 pro machine. The Tools and system info are giving a date but the Windows / User created time is almost a year prior to this date. I have one camp that says the Windows folder is the original and one camp that says the Tools are correct. I'm curious for some more input from other people.
Considering last install date for Win 10 typically corresponds to last update I would ignore it mostly. You could look for things such as creation timestamp for the user folder/registry files.
Avatar
Can anyone shed some light on an issue I’m facing. My friends PC is not wanting to POST when any IDE devices are connected. It’s a new MOBO an everythin else works fine, just when connected to IDE HDD it refuses to work
Avatar
thatboy_leo 3/28/2022 9:20 AM
Has anyone encountered payjoy on Samsung devices? Is it basically a MDM
Avatar
Avatar
ds275
Has anyone ever tried to do a data extraction from a Nintendo Switch?
John Schoth 3/28/2022 9:51 AM
Did you ever get a response to this question?
Avatar
@Law Enforcement [Australia] Does anybody from Australia work for New South Wales Police? We have a software write blocker application that has a date on it from 2005 from NSW Police State Electronics Evidence Branch. Wondering if this tool has been updated since then? (edited)
Avatar
Avatar
obi95
Can anyone shed some light on an issue I’m facing. My friends PC is not wanting to POST when any IDE devices are connected. It’s a new MOBO an everythin else works fine, just when connected to IDE HDD it refuses to work
How are they connecting the IDE drive to the MOBO? Thought IDE connectors were mostly phased out on recent MOBOs. I'm assuming he's using a SATA > IDE connector of some sort?
Avatar
Adam Cervellone 3/28/2022 11:03 AM
If anyone here has experience setting up a small one or two man forensic lab, could you please DM me? I am in need of advice for evidence storage solutions
Avatar
Avatar
obi95
Can anyone shed some light on an issue I’m facing. My friends PC is not wanting to POST when any IDE devices are connected. It’s a new MOBO an everythin else works fine, just when connected to IDE HDD it refuses to work
Digitalferret 3/28/2022 11:28 AM
same as Jaykay - check connection especially power. bad drives would sometimes force power protection / over-current and refuse to boot. if it's a converter or addon board, check that too.
Avatar
Figured out the issue everyone. Turns out it was just the way the IDE cables were connected as I was unaware they had a preferred way. And the jumpers on the back were weird in that one of the drives had 2 connected in the shape of a T
12:30 PM
The computer is from 1996 I should mention😂
Avatar
oh boy, the generation gap hits hard 😉
1:07 PM
"white goes to pin one"
1:07 PM
or black
1:07 PM
the jumper settings are usually on the drive label
Avatar
Avatar
obi95
The computer is from 1996 I should mention😂
Jeez, that machine needs to be retired 😂
Avatar
Avatar
whee30
My guess is that it’s what I suggested. You probably see some other default contacts too, right? Like 411 or similar? The user calls that number to access the voicemail
ccube | damFamily 3/28/2022 6:19 PM
Yes, it is in the contacts section along with 411 & 611
👍 1
Avatar
Avatar
randomaccess
Look at monolith. It's relatively inexpensive
Monolith has a great forensic notes application I only found out about last week as well. It’s free as well. I think I’m moving over from notepad++ for my case notes.
👍 1
Avatar
Avatar
Cole
@Law Enforcement [Australia] Does anybody from Australia work for New South Wales Police? We have a software write blocker application that has a date on it from 2005 from NSW Police State Electronics Evidence Branch. Wondering if this tool has been updated since then? (edited)
facelessg00n 3/28/2022 7:59 PM
Not from NSW, but im my experience most of those scripts just change some registry keys, not that hard to make one / modify it yourself. However all the ones I have seen do not fully pass write blocker tests (ie Weibetech) so should be used in emergencies only. Also typically they will not write protect USB HDD's which is something to keep in mind when using it. I dont use or endorse them as I think its fraught with danger.
Avatar
Avatar
callzor
Hi! I'm looking for a way to create a hashset from the content of a .zip file. Tried to create a program myself but running out of time. Any ideas?
facelessg00n 3/28/2022 8:02 PM
Just shove it into your favourite forensic tool as a file and make sure it is set to unpack zips.
Avatar
Avatar
Cole
@Law Enforcement [Australia] Does anybody from Australia work for New South Wales Police? We have a software write blocker application that has a date on it from 2005 from NSW Police State Electronics Evidence Branch. Wondering if this tool has been updated since then? (edited)
randomaccess 3/28/2022 9:20 PM
It probably has. DM me and I can ask
Avatar
Avatar
facelessg00n
Not from NSW, but im my experience most of those scripts just change some registry keys, not that hard to make one / modify it yourself. However all the ones I have seen do not fully pass write blocker tests (ie Weibetech) so should be used in emergencies only. Also typically they will not write protect USB HDD's which is something to keep in mind when using it. I dont use or endorse them as I think its fraught with danger.
randomaccess 3/28/2022 9:21 PM
Yeah, the older ones used registry write blocking which is super easy to get around. It just stops.tje windows API. You can open a disk with a hex editor and write to it. If you use a software write blocker that uses its own custom driver that's different.
9:22 PM
For ex SAFEBLOCK which is not free
Avatar
Avatar
Rob
Considering last install date for Win 10 typically corresponds to last update I would ignore it mostly. You could look for things such as creation timestamp for the user folder/registry files.
Yeah, thats my thinking. I always like to double check things and find the inconstancies and explain them before the other person does. Thanks for the input.
👍 1
Avatar
Digitalferret 3/29/2022 1:23 AM
Q: What are the "daily driver" distro's for folks on here? starting to feel like doing a Smith on Windows OS atm. so p*ssed with USB borking, updates failing and other niggly things. halp!
Avatar
Dr. Kaan Gündüz 3/29/2022 1:44 AM
i use windows server 2016
1:44 AM
less nagging
1:44 AM
tried reactos 64 bit, but still needs work to be done
Avatar
ReactOS is like stepping back in time 😂
😂 2
1:46 AM
Massive nostalgia feel
Avatar
Dr. Kaan Gündüz 3/29/2022 1:46 AM
it is indeed 🙂
1:48 AM
I like linux mint these days. But at the end of the day one still needs a windows distro to run beloved forensic software.
Avatar
Avatar
Dr. Kaan Gündüz
I like linux mint these days. But at the end of the day one still needs a windows distro to run beloved forensic software.
Digitalferret 3/29/2022 2:48 AM
yep, and hardware like pc3000 sadly. i'd keep a bare installation for use with that but for all else i'd move. mint was ok a while back, have a small machine with MX which has run incredibly reliably for over a year, minimal interaction needed. uptimes like 6mnth+ each iteration (edited)
2:49 AM
used to run Arch, but i'm getting too old to be configuring everything again.. and again lol
🙌 1
Avatar
Dr. Kaan Gündüz 3/29/2022 2:50 AM
the only time i faced an issue with win server was, UFED didn't like it (installing wireless option to server resolved it btw) (edited)
Avatar
Avatar
Dr. Kaan Gündüz
the only time i faced an issue with win server was, UFED didn't like it (installing wireless option to server resolved it btw) (edited)
Digitalferret 3/29/2022 2:53 AM
there's always gonna be a special snowflake tho 🙂 - just trying to limit the damage, so to speak. appreciate the info, thanks (edited)
👍 1
Avatar
Avatar
Digitalferret
Q: What are the "daily driver" distro's for folks on here? starting to feel like doing a Smith on Windows OS atm. so p*ssed with USB borking, updates failing and other niggly things. halp!
I run Slackware on everything I use - from forensic workstations to Steam gaming boxes. With a Windows VM for things like Axiom and CPA, etc. Our lab has a dedicated workstation for the PC3000 for times when we need it. YMMV. I'm an old curmudgeon. For less work up front and more prevalent support, you'd do well to stay with an ubuntu derivative or the like. It all comes down to preference and, in the end, they can all be made to behave much the same (barring pkg management and preferences like system init stuff). One piece of advice - steer clear of "rolling distros" like Manjaro. My $.02
Avatar
Avatar
facelessg00n
Not from NSW, but im my experience most of those scripts just change some registry keys, not that hard to make one / modify it yourself. However all the ones I have seen do not fully pass write blocker tests (ie Weibetech) so should be used in emergencies only. Also typically they will not write protect USB HDD's which is something to keep in mind when using it. I dont use or endorse them as I think its fraught with danger.
parsec3point26 3/29/2022 4:32 AM
It’s just a registry key flip. It’s not been updated in years. It also only works on ‘USB Mass Storage’. Will not work on memory cards, cameras, some USB SDD (SCSI) etc
Avatar
Avatar
parsec3point26
It’s just a registry key flip. It’s not been updated in years. It also only works on ‘USB Mass Storage’. Will not work on memory cards, cameras, some USB SDD (SCSI) etc
randomaccess 3/29/2022 5:36 AM
There's a version that uses diskpart from memory
5:37 AM
I actually have no idea how diskpart mounts things as read only though
Avatar
Avatar
5cary
I run Slackware on everything I use - from forensic workstations to Steam gaming boxes. With a Windows VM for things like Axiom and CPA, etc. Our lab has a dedicated workstation for the PC3000 for times when we need it. YMMV. I'm an old curmudgeon. For less work up front and more prevalent support, you'd do well to stay with an ubuntu derivative or the like. It all comes down to preference and, in the end, they can all be made to behave much the same (barring pkg management and preferences like system init stuff). One piece of advice - steer clear of "rolling distros" like Manjaro. My $.02
Digitalferret 3/29/2022 5:53 AM
thanks, very useful, esp VM stuff. i also think dedicated WinOS machine for items that will only run via WinOS (properly) such as PC3000. Rolling - yep ok for enthusiasts, of which i was one, but there's a lot of RNG potential for FUBARs.
5:55 AM
recent "baby and bathwater" incident was having to use Device Manager to remove USB storage entries in order to just plug USB<whatever> device in at every instance and reboot (edited)
Avatar
Greetings, with approval from Andrew Rathbun, the Calfornia Department of Justice CJIS Digital Forensics Group (mouthful i know), is conducting informal and anonymous (we are only asking for your agency name) research into best practices for Digital Forensics when it comes to network connectivity for forensic workstations, servers, and storage. As an expert in the field, we wanted to reach out and invite you to take the survey. If you could take three minutes to complete the linked survey below, it would be very much appreciated. It’s a Microsoft Form. The survey will be available until 4/8/2022. https://forms.office.com/r/6RSATY3JbW Please feel free to DM me if you have any questions.
Avatar
Requesting some assistance with iPhone voicemails. I performed the extraction with UFED4PC and then was asked be a legal rep about deleted voicemails. I know there is nothing in the extraction that shows deleted voicemails on the surface. However, I stumbled upon voicemails in the file system in a DB (name of DB escapes me at the moment) I also believe voicemails are not stored in the iCloud back up (I think) I can confirm. anyone with iPhone Voicemail experience I woul d love to one on one and pick your brain.
Avatar
Avatar
nbh2493
Requesting some assistance with iPhone voicemails. I performed the extraction with UFED4PC and then was asked be a legal rep about deleted voicemails. I know there is nothing in the extraction that shows deleted voicemails on the surface. However, I stumbled upon voicemails in the file system in a DB (name of DB escapes me at the moment) I also believe voicemails are not stored in the iCloud back up (I think) I can confirm. anyone with iPhone Voicemail experience I woul d love to one on one and pick your brain.
Andrew Rathbun 3/29/2022 10:05 AM
#mobile-forensic-decoding #mobile-forensic-extractions
Avatar
Any IACIS member in here available for general question.
Avatar
Avatar
Ghosted
Any IACIS member in here available for general question.
what?
Avatar
Is it possible to identify a mobile device through an IP address. I received subpoena return with ip’s associated with a mobile device
Avatar
@JNewman74 - hypothetically, you could walk the IP address to a mobile provider, potentially a phone number (damn natting router IPs) and from there a Google or Apple account attached to the phone number... I know Apple stores devices registered under an account. That doesn't solve an Android that hasn't been fully set up though.
Avatar
Avatar
JNewman74
Is it possible to identify a mobile device through an IP address. I received subpoena return with ip’s associated with a mobile device
If you can subpoena a known account of the possible target for the same date and time of the IP address in question you can tie the two together. But you have to have an external lead on your target. I don't know of any way to narrow down who the end-user might be with only a mobile IP address.
Avatar
Hi all, I have question. For IR we are making kape module to automate collection of system information and we found one problem. If you have mounted network drives as a usere for example drive R:. And if you run command net use or Get-PSDrive in elevated powershell or cmd, you will not see mounted network shares. So question is, how can you list users mounted networkshares in this case.
Avatar
Avatar
sidi7
Hi all, I have question. For IR we are making kape module to automate collection of system information and we found one problem. If you have mounted network drives as a usere for example drive R:. And if you run command net use or Get-PSDrive in elevated powershell or cmd, you will not see mounted network shares. So question is, how can you list users mounted networkshares in this case.
randomaccess 3/30/2022 1:19 AM
Isn't that going to be in the registry and you can pull the hives and parse them offline?
1:20 AM
Not to say you shouldn't run PS on a host but if you're running kape anyways you can go the offline route
Avatar
Yes you are right, but this module is fo quick IR info. Netstat, dns cache, sistem info etc ...
Avatar
Dr. Kaan Gündüz 3/30/2022 1:50 AM
can you please elaborate? source of the installer (usb/dvd) or the options that were used while installing?
Avatar
Can somebody from @Cellebrite ping me? I need to discuss a serious vulnerability in their customer portal.
📬 1
2:42 AM
Also would be cool if this was a thing… https://cellebrite.com/.well-known/security.txt
updoot 1
Avatar
“…During a close to 8-hour long trilogue (three-way talks between Parliament, Council and Commission), EU lawmakers agreed that the largest messaging services (such as Whatsapp, Facebook Messenger or iMessage) will have to open up and interoperate with smaller messaging platforms, if they so request. Users of small or big platforms would then be able to exchange messages, send files or make video calls across messaging apps, thus giving them more choice. As regards interoperability obligation for social networks, co-legislators agreed that such interoperability provisions will be assessed in the future” This sounds like a technical nightmare to actually implement? Could be a big change for digital forensics. https://www.europarl.europa.eu/news/en/press-room/20220315IPR25504/deal-on-digital-markets-act-ensuring-fair-competition-and-more-choice-for-users
On Thursday evening, Parliament and Council negotiators agreed new EU rules to limit the market power of big online platforms.
Avatar
Hi, @Law Enforcement [UK] are Avatu the only UK supplier for the Tableau TX1s?
👍 1
Avatar
Avatar
ApC
Hi, @Law Enforcement [UK] are Avatu the only UK supplier for the Tableau TX1s?
afaik, yes.
Salute 1
Avatar
I'm working on a group project about Bitwarden. We are currently looking for information on times it's been hacked and they have lost data. We can't seem to find anything on them. You think they have to have some type of breach.
Avatar
Avatar
Johnie
“…During a close to 8-hour long trilogue (three-way talks between Parliament, Council and Commission), EU lawmakers agreed that the largest messaging services (such as Whatsapp, Facebook Messenger or iMessage) will have to open up and interoperate with smaller messaging platforms, if they so request. Users of small or big platforms would then be able to exchange messages, send files or make video calls across messaging apps, thus giving them more choice. As regards interoperability obligation for social networks, co-legislators agreed that such interoperability provisions will be assessed in the future” This sounds like a technical nightmare to actually implement? Could be a big change for digital forensics. https://www.europarl.europa.eu/news/en/press-room/20220315IPR25504/deal-on-digital-markets-act-ensuring-fair-competition-and-more-choice-for-users
I would imagine those big companies are scrambling to pivot and find a loophole... how do you make a secure messaging program if any small platform needs to be provided access?
😀 2
Avatar
Dr. Kaan Gündüz 3/30/2022 11:59 AM
who will be hosting video conferences, who will respond to subpoenas, what will happen if one of the parties won't use end-to-end encryption... it first sounded like they want blackberry unified messaging back. 🙂
Avatar
Hello, anyone got some tips to get a physical out of a Logicom fleep 178 ?
Avatar
Hi @Oxygen Forensics any idea why a software license displays 2 different expiration dates on 2 different workstations? Thanks
Avatar
Avatar
sky
Hi @Oxygen Forensics any idea why a software license displays 2 different expiration dates on 2 different workstations? Thanks
Oxygen Forensics 3/31/2022 7:11 AM
Hello, please let me DM you regarding this issue
Avatar
@lerti_sdu do you have any internal photos from FCC or EU so we can see the chipset ? Might be a EDL candidate.
Avatar
Deleted User 3/31/2022 8:38 AM
Speaking at a SANS Summit gives you the opportunity to engage with thousands of cybersecurity professionals, to share your expertise, and to expand your network. If you have original content to share with the community, we encourage you to submit a talk proposal.
Avatar
forensicMouse 3/31/2022 11:15 AM
I’m looking for fire suppression systems for a forensics lab buildout. Currently considering FM-200, any other viable options out there?
Avatar
@forensicMouse 🙂 I bought my own fire extinguisher when one of the batteries started on fire. I've also read that a fire blanket is better as the lithium ion will still burn without oxygen.
Avatar
Avatar
DCSO
@lerti_sdu do you have any internal photos from FCC or EU so we can see the chipset ? Might be a EDL candidate.
hi, I got a physical dump with XRY 10.0.1 profile The Posh 170 with 40315 cable without magic button. Thanks for your help.
XRY 2
👍 2
Avatar
Anyone from @Griffeye able to assist with an issue i'm having when importing files please
Avatar
Just realised I posted in the wrong chat
Avatar
thatboy_leo 4/1/2022 11:11 AM
Is there anyway to tell what iOS a locked iPhone is?
Avatar
Avatar
thatboy_leo
Is there anyway to tell what iOS a locked iPhone is?
Avatar
thatboy_leo 4/1/2022 1:44 PM
Cheers!
Avatar
I have no idea who the admin is, could someone tag the right person to inform that the #forensic-lunch channel is showing an error
Avatar
Andrew Rathbun 4/3/2022 6:55 AM
@w00tzon I'll take a look later. Sometimes those YouTube feeds error out after a while or need to be renewed
👍 1
Avatar
So I understand that cybercrime can cost businesses a lot of money but I want to understand why? Why would a business would have to pay so much to sort cyber attack stuff?
Avatar
The cost of retrieving your data so your business can run, the cost of the PR nightmare of losing your customers trust, the cost of class action lawsuits in the case you mismanage “secure” data…
👍🏽 1
10:59 AM
Paying off the ransomware group, paying the professionals to come in and figure out what happened, paying the professionals to recover data or to teach you to not get compromised again in the future. It’s all a lot of training and time you need to pay for. Gets very spendy.
Avatar
Avatar
swan
So I understand that cybercrime can cost businesses a lot of money but I want to understand why? Why would a business would have to pay so much to sort cyber attack stuff?
Deleted User 4/3/2022 12:32 PM
It’s also quantified under risk analysis: Average Loss Expectancy, Annual Rate of Occurence etc. A dollar amount can be assigned per minute or per hour of downtime.
👍🏽 1
Avatar
Avatar
swan
So I understand that cybercrime can cost businesses a lot of money but I want to understand why? Why would a business would have to pay so much to sort cyber attack stuff?
Andrew Rathbun 4/3/2022 12:37 PM
Think about if you were to buy something from your favorite website and you couldn't....for like 2 days. Think about how much business would be lost in those 48 hours for that retailer. There's a huge ripple effect in play. You're trying to buy something but the site is down, so what do you do? You go to their competitor to buy it. Many other things I won't break down further but you get the point. All great insights above, too
👍🏽 1
Avatar
Thank you so much for useful & great insights! I see why that can get so expensive quickly.. I wonder if there are any known companies that arent willing to spend a lot of money on security 😬
Avatar
Avatar
swan
Thank you so much for useful & great insights! I see why that can get so expensive quickly.. I wonder if there are any known companies that arent willing to spend a lot of money on security 😬
Andrew Rathbun 4/3/2022 12:46 PM
Hint: almost all of them 😛
12:48 PM
Ever see Office Space? If not, stop what you're doing and watch it. Most companies are like Peter Gibbons where they're doing the bare minimum to get by (aka just enough not to get fired). Either that, or they simply don't have the training to understand why making every user a local Admin is a horrible idea 🤷‍♂️ Lots of variables in play and lots of variance in things within/not within the IT team's control
👍 3
💯 3
Avatar
Avatar
Andrew Rathbun
Hint: almost all of them 😛
*All of them until a security incident happens
💯 4
Avatar
Digitalferret 4/3/2022 2:00 PM
Insurance premiums very similar to Backing up : "Nobody wants backup. Everyone wants restore." (edited)
Avatar
Avatar
swan
So I understand that cybercrime can cost businesses a lot of money but I want to understand why? Why would a business would have to pay so much to sort cyber attack stuff?
on the “opportunity cost” side: Think about a manufacturing plant. They can track downtime costs in the tens of thousands per minute of unplanned down time. So if a cyber attack happens and effects their production line, that can get costly real fast. A similar thing could be said about most companies too. A 500 person company with an average person hour cost of 26 would experience 13k in loses per hour or 104k for a whole day.
Avatar
Security is always seen as a cost center (a place you put money in) versus a revenue generator. Businesses always want to reduce costs and increase profits/shareholder value. We will ALWAYS be underfunded and have to justify our existence and spending to the infinite detail. That is the way things are. So the better we are able at communicating to upper management about the 'risk' and potential costs of cyber incidents, the more 'value' we will appear to bring.
Avatar
thatboy_leo 4/4/2022 3:16 PM
Is there a way to enhance thumbnail images?
Avatar
Hey guy im using autopsy right now to assess an image and was asked to find all files copied from a usb, how can i differentiate between normal files and files copied on to the system?
Avatar
Avatar
thatboy_leo
Is there a way to enhance thumbnail images?
Semantics 21 (Tom) 4/4/2022 3:35 PM
The Semantics 21 Enhance app can increase the resolution x4 and our new Face enhance AI works well if that’s what you’re after. https://www.semantics21.com/s21-enhance
We make award-winning software and cutting-edge algorithms for digital forensics. We specialise in building state-of-the-art intelligent tools, which enable law enforcement and associated agencies to conduct reliable and fast forensics investigations of digital media artefacts.
Avatar
Avatar
FunGuy
Hey guy im using autopsy right now to assess an image and was asked to find all files copied from a usb, how can i differentiate between normal files and files copied on to the system?
Depending on the OS you may find info in event viewer, recent docs or ADS zone identifier. But in reality, I don’t think you would find those
Avatar
Avatar
Murst
Depending on the OS you may find info in event viewer, recent docs or ADS zone identifier. But in reality, I don’t think you would find those
1 more thing i was asked to find the earliest operating system used on the suspects pc, and how it was installed. i found the system but cant find how i find how it was installed
3:53 PM
any tips for that?
Avatar
Earliest OS would probably be the one from the manufacture. If it was a dell you could search the service tag and see a config usually
3:59 PM
Otherwise maybe an os sticker on the machine? But even those aren’t really good indicators
Avatar
i just have a disk image to play with no physical machine, these are some of the question i had in an assignment i was given in university
Avatar
Avatar
DCSO
@forensicMouse 🙂 I bought my own fire extinguisher when one of the batteries started on fire. I've also read that a fire blanket is better as the lithium ion will still burn without oxygen.
forensicmike @Magnet 4/5/2022 6:09 AM
nothing like having a phone explode in your face to increase hazard awareness is there.... i stank up the lab for a whole day once haha
😆 1
Avatar
funny you all mention this, I had to extract a balloon battery from a macbook pro last week. My lipo fire bag showed up today for holding those suckers for disposal.
👍 1
Avatar
@whee30 cheap insurance for those non-stable batteries.
Avatar
Has anyone here use chocolatey(or some similar tool) to automate the update of forensic tools on forensic workstations? eg updating AXIOM or XWF
6:20 PM
ditto for building golden VM images for analysis, but with terraform/ansible/similar...
Avatar
I have not used it, as in setting it up. But Flare-VM uses it extensively and I was planning on looking into it
Avatar
The golden image thing is definitely beyond my current capabilities… but I got a majority of our ancillary tools(eg EZTools, notepad++, mobaxterm, etc) and other stuff all wrapped up in a simple powershell script utilizing chocolately and Invoke-WebRequest.. the harder part will be actual commercial tools like AXIOM and EnCase I think
10:46 PM
6:20PM->10PM… really not bad I think considering I haven’t touched powershell or chocolatey in bloody years and kept on skipping parts of the PoSH documents LOL… and dinner mmm (edited)
10:47 PM
“Why won’t this unzip damnit” “Didn’t specify the output file” I did that too many times
Avatar
Deleted User 4/6/2022 3:41 AM
Hello, https://digitalintelligence.com/products/fred_c_workgroups im wondering if this worth it instead of doing HPE esxis connected through fiberchannel to a SAN (edited)
3:42 AM
or talino. Because we have the capability inhouse to manage our own servers and build a virtualized platform with forensic software windows images (edited)
Avatar
Are you currently doing virtualization for your processing? Looking at that solution it seems like it would be a regular old workstation inside of a different style chassis and an attached tape drive If you have the capacity I’d suggest looking into trying out some of your tools in a virtual setup
4:54 AM
Depending on how your HPE/SAN is architected, it could allow for better redundancy and easier scaling out (assuming you don’t use dongles).
Avatar
Is anyone having issues with freezing/not responding when using Axiom 5.10.0.30634?
Avatar
Avatar
Murst
Are you currently doing virtualization for your processing? Looking at that solution it seems like it would be a regular old workstation inside of a different style chassis and an attached tape drive If you have the capacity I’d suggest looking into trying out some of your tools in a virtual setup
for dongles in virtualized environments I have used the digi solution
Avatar
kartoffel4n6 4/6/2022 11:57 AM
Anyone have an extra Sans GCFA practice test?
Avatar
Does anyone have an explanation that they use in court to explain what Epoch time is? I need to explain this and it just sounds nuts. lol
3:42 PM
This is what I plan to say. Epoch / Unix time format is s system for representing a point in time. It is the number of mili seconds that have elapsed since 1st January, 1970
Avatar
Avatar
Gumpoo
This is what I plan to say. Epoch / Unix time format is s system for representing a point in time. It is the number of mili seconds that have elapsed since 1st January, 1970
randomaccess 4/6/2022 3:54 PM
Number of seconds
Avatar
Avatar
Gumpoo
This is what I plan to say. Epoch / Unix time format is s system for representing a point in time. It is the number of mili seconds that have elapsed since 1st January, 1970
Don't forget it's on UTC as well
Avatar
Avatar
randomaccess
Number of seconds
Seconds... Right on!
4:49 PM
Yep. Good thing www.epochconverter.com converts to local time.
Avatar
Hey all - anyone have any recommendations for forensic workstations? My team is looking at purchasing a new one and we want to evaluate more than just one vendor. At the end of the day, I feel like they are all just custom computers - nothing crazy special other than built in raids and/or built in write blockers, but I may be over looking something. Any suggestions would be great!
👍 1
Avatar
Essentially you are correct. I will say I use the Tableau ultra bay 4 in my tower constantly. A large raid is also super nice to have. I think for budget concerns, it’s a lot easier for admin to wrap their heads around a premade product versus giving me a budget to build my own. Also when my raid controller failed I had great tech support overnighting me a new one
Avatar
Yeah, our leadership has no appetite for me or anyone on my team building from scratch due to support concerns. At this point, it's really a matter of "is there a vendor that is superior to others in product delivery as well as continued support."
Avatar
Sci force makes good stuff
11:18 PM
Silicon forensics in SoCal is who we go thru- always top notch if we need help or drivers or anything
👍 1
Avatar
Morning all. Does anyone use Cellebrite Smart Translator? If so, what are your thoughts on your it? My team will be working with a lot of foreign devices and will need a quick turn arounds so looking for a solution.
Avatar
Has anyone had experience with bodies who offer Digital Forensic Proficiency Testing? (Both computer and mobile) It appears that there isn't anyone in the UK that offer this - at least from my initial research. Or would anyone have experience with ILC/round robin that is ISO compliant? Any info anyone has would be appreciated 😊 😊 @Law Enforcement [UK] (edited)
Avatar
Avatar
Yoshi4N6
Has anyone had experience with bodies who offer Digital Forensic Proficiency Testing? (Both computer and mobile) It appears that there isn't anyone in the UK that offer this - at least from my initial research. Or would anyone have experience with ILC/round robin that is ISO compliant? Any info anyone has would be appreciated 😊 😊 @Law Enforcement [UK] (edited)
randomaccess 4/7/2022 4:24 AM
SANS has it but it's broadly "digital forensics" rather than computer or mobile specific. I think it was 150 a test sold in packs of 10
Avatar
Avatar
Yoshi4N6
Has anyone had experience with bodies who offer Digital Forensic Proficiency Testing? (Both computer and mobile) It appears that there isn't anyone in the UK that offer this - at least from my initial research. Or would anyone have experience with ILC/round robin that is ISO compliant? Any info anyone has would be appreciated 😊 😊 @Law Enforcement [UK] (edited)
Ross Donnelly 4/7/2022 4:40 AM
CTS sell tests to the UK http://cts-forensics.com/
Collaborative Testing Services offers the following proficiency tests: Forensic Biology, DNA (sample-specific), drug analysis, latent prints, imprints impressions, firearms, toolmarks, serial number restoration, paint analysis, glass analysis, fiber analysis, flammables analysis, questioned documents, handwriting examination, blood alcohol, brea...
👍 1
Avatar
Avatar
Ross Donnelly
CTS sell tests to the UK http://cts-forensics.com/
Thank you for the info. If you've used them before, what was your experience with them?
Avatar
Avatar
randomaccess
SANS has it but it's broadly "digital forensics" rather than computer or mobile specific. I think it was 150 a test sold in packs of 10
Thanks for the info1 I didn't see much information on their website when I had a quick look?
Avatar
Avatar
Yoshi4N6
Thanks for the info1 I didn't see much information on their website when I had a quick look?
Ross Donnelly 4/7/2022 7:44 AM
No complaints, found them to be slightly more polished than FPTS (which used to offer PTs in the UK but left the market). As always with PTs, there is the odd question which is a bit open for interpretation. The PTs we've had were all about the interpretation so were provided with extractions digitally - if you needed a PT to include the extraction I'm not sure if they offer actual devices to examine.
Avatar
Avatar
Ross Donnelly
No complaints, found them to be slightly more polished than FPTS (which used to offer PTs in the UK but left the market). As always with PTs, there is the odd question which is a bit open for interpretation. The PTs we've had were all about the interpretation so were provided with extractions digitally - if you needed a PT to include the extraction I'm not sure if they offer actual devices to examine.
Yes, our lab previously used FPTS. I'll certainly take a look and see what services they offer, I know with some of the outside sources; there was a few that came up in my searches, but not all favourable. I guess its like everything, it depends what you are looking for and everything is open to interpretation. Thanks again for the info 😊
Avatar
Avatar
Yoshi4N6
Thanks for the info1 I didn't see much information on their website when I had a quick look?
randomaccess 4/7/2022 8:26 AM
Cybersecurity scholarship academies with SANS training and GIAC Certifications help employers find cyber talent.
👍 1
Avatar
Do we by any chance have any recent graduates that have gone through the UK security clearance process? I've got a couple of questions I'd like to ask. Reposted from #training-education-employment to hopefully target a wider audience aPES_Hide
Avatar
Avatar
Keepo
Do we by any chance have any recent graduates that have gone through the UK security clearance process? I've got a couple of questions I'd like to ask. Reposted from #training-education-employment to hopefully target a wider audience aPES_Hide
Ross Donnelly 4/7/2022 10:16 AM
I can pass on your questions to a colleague who graduated and joined us last year (so went through clearance), if it helps
Avatar
Avatar
Ross Donnelly
I can pass on your questions to a colleague who graduated and joined us last year (so went through clearance), if it helps
That’d be helpful! I’m a bit caught up at the minute but will drop you a message later tonight/tomorrow morning 😁
Avatar
Can anyone suggest me books to prepare for eCDFP?
Avatar
Can anybody recommend some reading material relating to preparing a Digital Forensic Readiness plan?
12:22 AM
And what recommendations there are for an organisation to maximise their evidence potential?
Avatar
Deleted User 4/8/2022 6:42 AM
Looking for data storage recommendations. Currently we store forensic extractions and reports on 3 TB Western Digital portable hard drives. We also have 1 TB SanDisk portable ssds as well. With the size of phone extractions I’m concerned we are going to burn through them quickly. What solutions have you or your organizations come to for long term data storage that is stable and secure?
Avatar
Synology RackStation RS820+ Compact Rack Mount NAS Server Bundle with Rail Kit for economical and space saving deployment, advanced backup with snapshot replication technology, near unlimited file management and sharing, digital asset protection, and certified storage virtualization features; mad...
Model: R720xd 12-Bay Server with 3.5'' Drives Processors: 2x 2.70Ghz E5-2680 8 Core Processors - Total of 16x Cores Memory: 24x 4GB PC3-10600R RAM - Total of 96GB Memory Hard Drives: 12x 4TB 7.2K SAS 3.5'' 6G - Total Storage of 48.0TB Power Supplies: 2x 750W Platinum Power Supplies with 2x Power ...
👍🏽 1
Avatar
Deleted User 4/8/2022 6:48 AM
Thanks for the quick response I’ll look through this. 😎👍🏽
Avatar
I will say buy more than you think you need. I recently upped my working RAID to 21tb and I have quickly filled about 19tb in there right now waiting to be finished and archived.
👍 2
Avatar
Avatar
Deleted User
Looking for data storage recommendations. Currently we store forensic extractions and reports on 3 TB Western Digital portable hard drives. We also have 1 TB SanDisk portable ssds as well. With the size of phone extractions I’m concerned we are going to burn through them quickly. What solutions have you or your organizations come to for long term data storage that is stable and secure?
Are you looking for silo type solutions or more central network file storage type? We have a few storage solutions. A ceph cluster for high performant storage that can scale (add more servers to the cluster) 45drives is a great vendor for this. then we also use synology which has been great but has single volume scale/size issues over 100-200tb and we are looking at qnap as a replacement.
👍🏽 1
Avatar
@Magnet Forensics is there a way to do media explorer inside of a certain directory?
Avatar
Last time I asked this they said the feature was pending and the current workaround was to do a search top right for the directory name
Avatar
Oh nice. Let me try that. Thanks
9:28 AM
Thanks that worked
👍 1
Avatar
thatboy_leo 4/8/2022 1:26 PM
Does there exist an E01 mounter for Macs running Monterey?
Avatar
Does anyone know if Magnet AXIOM or Encase 6.17/8.x have silent install options if executed via CMD/PoSH?
11:38 PM
Just offhand- ofc I’m thinking about this when I should be asleep 😭
Avatar
What is this sleep thing I keep hearing about?
Avatar
Avatar
Turb0Yoda
Does anyone know if Magnet AXIOM or Encase 6.17/8.x have silent install options if executed via CMD/PoSH?
randomaccess 4/9/2022 1:27 AM
axiom def does, encase dont know
1:28 AM
installer.exe /verysilent
1:28 AM
works for AXIOM and UFED PA, can always try it with other installers. can try things like installer.exe --h or /h and see what pops up
Avatar
if the modified date is older then the creation date what would that suggest to you
Avatar
Is there some good tool to reading exchange server edb database ? Or how to aproach it without turning on exchange server.
Avatar
Avatar
sidi7
Is there some good tool to reading exchange server edb database ? Or how to aproach it without turning on exchange server.
randomaccess 4/9/2022 2:52 AM
An email parsing tool. Nuix is good but expensive
Avatar
And magnet axiom or belkasoft evidence center will not work with them ?
Avatar
Avatar
randomaccess
works for AXIOM and UFED PA, can always try it with other installers. can try things like installer.exe --h or /h and see what pops up
Tysm- encase I’m not too worried about since we have perpetual licenses. I think the real challenge is XWF
Avatar
Avatar
Turb0Yoda
Tysm- encase I’m not too worried about since we have perpetual licenses. I think the real challenge is XWF
Ross Donnelly 4/9/2022 7:45 AM
XWF is just a bunch of files, your script to install just needs to copy the folder to wherever you want it - it doesn't need to be installed
Avatar
randomaccess 4/9/2022 8:11 AM
XWF you can also use Eric's tool but I wish that had a way for me to package all that up easier ha commandline xways fim
Avatar
Yeah I was gonna look into XWFIM
10:30 AM
I’m attempting to overhaul our entire lab in 2 months and automate all the updates on our physical boxes - in the past it’s been a manual download everything and do it manually
10:30 AM
I got most everything into a lil powershell script tho
Avatar
@Magnet Forensics anyone happen to be around today?
Avatar
Avatar
Ghosted
@Magnet Forensics anyone happen to be around today?
Not in full capacity but what’s up?
Avatar
Avatar
Turb0Yoda
I got most everything into a lil powershell script tho
If that's sharable let me know, I know I usually make gold images of our forensics machines but it's burdensome when updates need to happen
Avatar
Avatar
stark4n6
If that's sharable let me know, I know I usually make gold images of our forensics machines but it's burdensome when updates need to happen
I can ask. It’s mostly just chocolatey with some invoke-https stuff to pull down EZTools and some GitHub stuff and unpacking them in our tools directory- super simple
👍 1
11:20 AM
Choco handles most of the generic type stuff like 7-zip, N++, etc. I’m in between on if I want to make custom choco packages for things like axiom and etc or just pull from our NAS And have it grab from there
Avatar
Avatar
randomaccess
works for AXIOM and UFED PA, can always try it with other installers. can try things like installer.exe --h or /h and see what pops up
C:\Tools\Forensic_Tool_Updates\AXIOM*.exe /SP /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /CLOSEAPPLICATIONS A bit of a long and this entire script is fairly crude... but it does work
Avatar
Avatar
Turb0Yoda
C:\Tools\Forensic_Tool_Updates\AXIOM*.exe /SP /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /CLOSEAPPLICATIONS A bit of a long and this entire script is fairly crude... but it does work
randomaccess 4/9/2022 2:30 PM
I didn't think you need more than very silent
Avatar
oh
2:31 PM
well
2:31 PM
let me modify it then rn.. doing another test run in this vm
Avatar
Does anyone know of a CLI based tool that will grab the system and user registry hives (protected files) like FTK Imager does?
Avatar
Kape will
👍 1
Avatar
Avatar
randomaccess
I didn't think you need more than very silent
yep.. that alone works haha. Looks like that covers everything but encase and grabbing our internal tooling(but that'll be easy to fix).. oh well.
Avatar
Andrew Rathbun 4/9/2022 8:27 PM
@Law Enforcement [UK] has anyone worked with this lady before? This is amazing https://youtu.be/N0vbYBWzNMk
💯 4
👍 2
Avatar
Amazing. Looks like we need to start taking hand shots with the mug shots when inmates are booked into our jail.
💯 2
Avatar
I have had sue black involved in a few of my cases. Each time she has been able to confirm from the hand shots that the accused was involved in the 1st gen content. This lead to long custodial sentences for the accused.
💯 4
Avatar
Avatar
Ghoulgnome
I have had sue black involved in a few of my cases. Each time she has been able to confirm from the hand shots that the accused was involved in the 1st gen content. This lead to long custodial sentences for the accused.
Andrew Rathbun 4/10/2022 4:45 AM
That's amazing. Thank you for sharing
Avatar
sounds like a great tool
5:42 AM
reminds me of the one where they can use background noises from the electric grid to catch crims https://www.youtube.com/watch?v=e0elNU0iOMY
Avatar
Andrew Rathbun 4/10/2022 5:42 AM
@Ghoulgnome can anyone in LE UK use her? How do they go about using her services?
👍 1
Avatar
I'm not really sure to the answers to those questions, as I passed on my findings to the reporting officer who dealt with the rest of the process.
👍 1
Avatar
Dr. Kaan Gündüz 4/10/2022 6:37 AM
the problem with identification in common is in most of the cases investigators deal with low quality/SNR recordings. the vein identification algorithm sounds amazing. in addition to comparison, i'd also consider calculating LR scores.
6:40 AM
ENF is exactly what it's told in the video, it's either there or it's not. If you are a part of a synced grid and have enough samples, you can use it for both timestamping media and finding doctored/edited recordings. Very good indeed.
💯 1
Avatar
Avatar
Sudo
reminds me of the one where they can use background noises from the electric grid to catch crims https://www.youtube.com/watch?v=e0elNU0iOMY
We discussed this internally, in reality this probably won’t be as useful as it seems unless you’re clutching at straws
Avatar
Digitalferret 4/10/2022 2:06 PM
^^ Veins AI / what the F ?!
Avatar
Right?! So because she was able to control her emotions she was less believable? Doesn't make since to me.
Avatar
Dr. Kaan Gündüz 4/11/2022 12:14 AM
That's not normal. She could have been under the affects of a psychiatric medicine or traumatized/shut. A psych evaluation should have taken place. She didn't break? That's unfair...
Avatar
Avatar
Andrew Rathbun
@Ghoulgnome can anyone in LE UK use her? How do they go about using her services?
We’ve dealt with a couple of cases which also involved a report from Sue Black. Not sure who instructed her initially though.
👍 1
Avatar
Avatar
Matt
We discussed this internally, in reality this probably won’t be as useful as it seems unless you’re clutching at straws
We’ve used ENF in cases where the date/time a particular recording was made becomes important and is either not obvious by other means (clock of the recording device not set correctly for example) and/or is being questioned.
Avatar
Avatar
rojo
We’ve used ENF in cases where the date/time a particular recording was made becomes important and is either not obvious by other means (clock of the recording device not set correctly for example) and/or is being questioned.
That’s very interesting to know
Avatar
Ross Donnelly 4/11/2022 4:19 AM
A connection of mine is performing some research for their MSc if anyone wanted to contribute 10 minutes to a questionnaire. "What is the Purpose of the Study? The primary aim of this study is to explore the impact of child abuse investigations and identify possible protective factors in regard to coping strategies and personality traits. To our knowledge no study has exclusively explored these elements together, and this is a needed area of research not only to enhance understanding but to strengthen supportive practice for professionals." https://nclpsych.eu.qualtrics.com/jfe/form/SV_9MOpxbAXyS78LB4
Qualtrics makes sophisticated research simple and empowers users to capture customer, product, brand & employee experience insights in one place.
👍 1
Avatar
AtticusInTheEther 4/11/2022 1:46 PM
Greetings all! I just joined the server and I'm here mainly to lurk and learn. If you have any questions about intellectual property law or amateur radio I'll be much more useful.
🤘 3
👍 1
Avatar
Not sure if anyone here is familiar with RAID forums, but if someone wants to pass along some massive kudos, thank you. This place has cost me weekends and holidays. Well done taking this down. https://www.justice.gov/usao-edva/pr/us-leads-seizure-one-world-s-largest-hacker-forums-and-arrests-administrator
The U.S. Department of Justice today announced the seizure of the RaidForums website, a popular marketplace for cybercriminals to buy and sell hacked data, and unsealed criminal charges against RaidForums’ founder and chief administrator, Diogo Santos Coelho, 21, of Portugal. Coelho was arrested in the United Kingdom on January 31, at the United...
💯 6
7:49 AM
Avatar
Avatar
conf1ck3r
Not sure if anyone here is familiar with RAID forums, but if someone wants to pass along some massive kudos, thank you. This place has cost me weekends and holidays. Well done taking this down. https://www.justice.gov/usao-edva/pr/us-leads-seizure-one-world-s-largest-hacker-forums-and-arrests-administrator
That’s a massive win, kudos to everyone involved
Avatar
This account is fuckin cursed 4/12/2022 10:45 AM
Woahh nice
Avatar
Time to exploit the power vacuum. I’m going to start braid forums, combo hacking/hairstyling community
😂 2
Avatar
I am getting started in DF, what hardware would you recomend? I know it is "better" to plug the drive that is going to be cloned directly into the motherboard instead of using a usb. For laptop drives that you want to connect to a desktop.
Avatar
Avatar
whee30
Time to exploit the power vacuum. I’m going to start braid forums, combo hacking/hairstyling community
raidforums2.com is already a thing
🤬 2
12:00 PM
Beaten to it 😂
Avatar
Which windows registry hive shows deleted files and uninstalled software? (edited)
Avatar
Avatar
whee30
Time to exploit the power vacuum. I’m going to start braid forums, combo hacking/hairstyling community
Digitalferret 4/12/2022 12:07 PM
power vacuum & hairstyling? don't forget the dye, son 🙂 (edited)
Avatar
Avatar
DDragneel
I am getting started in DF, what hardware would you recomend? I know it is "better" to plug the drive that is going to be cloned directly into the motherboard instead of using a usb. For laptop drives that you want to connect to a desktop.
Digitalferret 4/12/2022 12:08 PM
I know it is "better" to plug the drive that is going to be cloned directly into the motherboard instead of using a usb ummmm....
12:09 PM
better using Native cables and hardware write blocker maybe, or dedicated imaging hardware w/hashing
12:10 PM
but what constitutes "starting"? amateur tries on ebay drives or actually supplying a service in forensics / LE etc
Avatar
Yes sorry my terminology is off. When I say starting: I am teaching myself, Im on the ground level. I have old laptop ssds that I plan on cloning from my dektop. Im just trying to figure out what hardware is the most recomended to achieve this.
Avatar
Digitalferret 4/12/2022 12:20 PM
at that stage then, any cables will do, some form of write block would be nice, but if not going to court not really necessary. i'd prefer a Linux distro and utility to do a dd image, maybe hddsuperclone. then it depends what you want to look for in there. grab some free / FOSS forensic s/w like Autopsy, or free Data Recovery s/w maybe like DMDE / Testdisk/Photorec
12:21 PM
even inaging at this stage isn't critical, just good process. always protect the source.
12:21 PM
image and work on the clone
12:22 PM
but the world is your molusc. just play/have fun/find out
Avatar
In that case you would connect the old hdd to a write blocker and then use FTK or any imaging software to make a .dd image right? so the integrity of original evidence is preserved?
Avatar
Digitalferret 4/12/2022 12:23 PM
absolutely nothing wrong with a dock and usb at that level. even the speeds are reasonable
12:25 PM
pretty much with <squiggle>^ start as you mean to go on
Avatar
Avatar
Digitalferret
absolutely nothing wrong with a dock and usb at that level. even the speeds are reasonable
Thank you for your advice, I plan on "practicing how I play" meaning having good process and procedures.
💯 1
Avatar
Digitalferret 4/12/2022 12:28 PM
beware tho, it's a very deep wabbit hole. never mind taking the Red Pill, it can get to the entire party pack
12:29 PM
And if you go chasing rabbits And you know you're going to fall Tell 'em a hook-ed DFIR dude Has given you the call
Avatar
Avatar
Matt
raidforums2.com is already a thing
Already taken out 😂
Avatar
kladblokje_88 4/13/2022 2:43 AM
Rf takedown was very obvious imo
2:44 AM
Early januari it went offline for a week. Came back, admins did not respond to some threatgroups I was talking to. And admin sections were viewable for every user
2:44 AM
Including a thread where admins ordered staff merch, listing their adresses
Avatar
Andrew Rathbun 4/13/2022 4:59 AM
Trying out this new event feature on Discord https://discord.gg/AuQPSqns?event=963770132176453653
Avatar
@here has anyone had experience running forensics with Apple AirTags? Does the paired phone contain any location data in a plist or can we just get user info from the AirTag via subpoena or LEO portal, etc.? Thanks!
Avatar
marco_polo076 4/13/2022 10:35 AM
Hello I have a question
Avatar
Digitalferret 4/13/2022 10:36 AM
just ask, don't ask to ask. we don't bite .. much 🙂
Avatar
Avatar
TCSkyKing
@here has anyone had experience running forensics with Apple AirTags? Does the paired phone contain any location data in a plist or can we just get user info from the AirTag via subpoena or LEO portal, etc.? Thanks!
I think Josh Hickman has a write up on this. If not him, someone else recently did a pretty good writeup on them, victim devices, and android apps to help view them. If I remember right, they are randomized MACs, so it may be a bit tricky to link them to a device, specifically. Apple can give you information on who they are registered to in iCloud.
Avatar
Avatar
A_A_Ron
I think Josh Hickman has a write up on this. If not him, someone else recently did a pretty good writeup on them, victim devices, and android apps to help view them. If I remember right, they are randomized MACs, so it may be a bit tricky to link them to a device, specifically. Apple can give you information on who they are registered to in iCloud.
Andrew Rathbun 4/13/2022 10:53 AM
Yes, @CLB_joshhickman1 does have a writeup here: https://thebinaryhick.blog/2022/01/08/androids-airtags-oof/
Special thanks Jared Barnhart for his help with the AirGuard research. Last month I released an Android 12 public image, and if you looked, you would have seen an app that was added at the very end…
👍 1
Avatar
CLB_joshhickman1 4/13/2022 11:13 AM
I’d also check this out, too, from Chris Vance. Hot off the presses… https://blog.d204n6.com/2022/04/airtag-youre-it.html
This is the accompanying blogpost to the Magnet User Summit 2022 talk: [Air]Tag You're It! Bluetooth Low Energy and You First, a primer on ...
👍 1
11:14 AM
A brief look at AirTag artifacts within an iOS Filesystem
👍 1
Avatar
Jerry Porter 4/13/2022 2:02 PM
I am looking for the file/path where iOS stores the Exchange Device ID that is used for ActiveSync as seen at the bottom of the Exchange account configuration screen.
Avatar
Avatar
Jerry Porter
I am looking for the file/path where iOS stores the Exchange Device ID that is used for ActiveSync as seen at the bottom of the Exchange account configuration screen.
I am thinking that this ID comes from the Exchange Server that this account is linked to. I remember having to remove these connections when users replaced their mobile devices. I could be missing what you are looking for though.
Avatar
Avatar
PatP
I am thinking that this ID comes from the Exchange Server that this account is linked to. I remember having to remove these connections when users replaced their mobile devices. I could be missing what you are looking for though.
Jerry Porter 4/13/2022 2:13 PM
So, it appears that the Exchange Device ID is generated by the iPhone and reset when the device iphone is factory reset. It is the same ID that gets linked on the Exchange server. I believe it is in a . plist or some other file somewhere on the phone. The screenshot that I shared has never been connected to exchange but still has the ID. (edited)
Avatar
Avatar
Jerry Porter
So, it appears that the Exchange Device ID is generated by the iPhone and reset when the device iphone is factory reset. It is the same ID that gets linked on the Exchange server. I believe it is in a . plist or some other file somewhere on the phone. The screenshot that I shared has never been connected to exchange but still has the ID. (edited)
Thank you for sharing - I had it in reverse then - my apologies...
Avatar
Avatar
PatP
Thank you for sharing - I had it in reverse then - my apologies...
Jerry Porter 4/13/2022 2:16 PM
No problem. Thanks for your input.
👍 1
Avatar
anyone know if it is possible on the iOS health app to "edit" (not add or delete) any of the entries?
Avatar
Deleted User 4/13/2022 8:28 PM
Job posting has been moved to correct channel :) (edited)
Avatar
DeeFIR 🇦🇺 4/13/2022 10:31 PM
@Deleted User #training-education-employment (edited)
💙 1
Avatar
Avatar
DeeFIR 🇦🇺
@Deleted User #training-education-employment (edited)
Deleted User 4/13/2022 11:38 PM
Ty ill delete from here and move it :) :)
Avatar
Hi folks Is there any tool that can list the ownership of a file ?(just like dir) Also, it can tell me when the file was created, modified, and accessed. Exiftool or crowdresponse or MFT can only list permissions(rwx) at most, but not ownership like dir. (edited)
1:19 AM
DIR parsering makes it difficult for me to analyze using excel or timeline explorer
1:22 AM
The reason for the need for ownership is that I want to know what kind of privileges the attacker had when he created or modified certain files.
1:25 AM
Thank you to everyone in the discussionSalute
Avatar
Avatar
RX
Hi folks Is there any tool that can list the ownership of a file ?(just like dir) Also, it can tell me when the file was created, modified, and accessed. Exiftool or crowdresponse or MFT can only list permissions(rwx) at most, but not ownership like dir. (edited)
Digitalferret 4/14/2022 3:36 AM
you could try GOW - Gnu On Windows. you can then use basic unix applications. you can see ownerships and privs but MAC times, it would appear, can only be shown individually, not all at once. you can, both in DOS CMD window and the iteration of GOW inside it, redirect the output to a file (edited)
3:38 AM
then, for example, check the man pages for ls
3:43 AM
list of GOW commands : https://github.com/bmatzelle/gow/tree/master/bin and as usual, examples are only a few clicks away via <search-engine-of-choice>
Avatar
kladblokje_88 4/14/2022 3:49 AM
Yo anyone with a PoC for that RPC runtime vuln everyone is talking about?
Avatar
Pretty sure people aren't sharing any PoCs yet due to the criticality of the vuln
Avatar
kladblokje_88 4/14/2022 4:02 AM
Would not be surprised
Avatar
If I see a public one floating around, I'll ping it over
❤️ 1
Avatar
Avatar
Digitalferret
you could try GOW - Gnu On Windows. you can then use basic unix applications. you can see ownerships and privs but MAC times, it would appear, can only be shown individually, not all at once. you can, both in DOS CMD window and the iteration of GOW inside it, redirect the output to a file (edited)
GOW seems to be as difficult to analyze as DIR, and parsing makes it hard for me to use EXCEL or Timeline Explorer to analyze. 🥲 But still, thank you very much.
Avatar
Avatar
RX
Hi folks Is there any tool that can list the ownership of a file ?(just like dir) Also, it can tell me when the file was created, modified, and accessed. Exiftool or crowdresponse or MFT can only list permissions(rwx) at most, but not ownership like dir. (edited)
Does anyone else know of any tools that can do this? This makes me very confused 😓
Avatar
Avatar
RX
Does anyone else know of any tools that can do this? This makes me very confused 😓
Digitalferret 4/14/2022 5:08 AM
"GOW seems to be as difficult to analyze as DIR" - which part?
Digitalferret started a thread. 4/14/2022 5:20 AM
Avatar
Avatar
RX
GOW seems to be as difficult to analyze as DIR, and parsing makes it hard for me to use EXCEL or Timeline Explorer to analyze. 🥲 But still, thank you very much.
Digitalferret 4/14/2022 5:32 AM
btw, what is the back story? is this a school/uni assignment, or you've been hacked, or someone asked you to do a job of work.. or?
5:35 AM
many pre-built tools / apps use fundamental commands and just wrap them up in an easy?-to-use interface. learning those fundamentals for yourself free's you from all the angst of trying to find an app that does exactly what you want on a single click.
5:36 AM
there is also a limiting factor to using such apps in that you often can't tweak the response
5:40 AM
full toolkits give you even more options but the learning curve can be quite steep (and fairly expensive). Autopsy is free and well worth a download, even just for a look at capabilities. Autopsy® is the premier end-to-end open source digital forensics platform. Built by Basis Technology with the core features you expect in commercial forensic tools, Autopsy is a fast, thorough, and efficient hard drive investigation solution that evolves with your needs.
Avatar
Avatar
RX
Hi folks Is there any tool that can list the ownership of a file ?(just like dir) Also, it can tell me when the file was created, modified, and accessed. Exiftool or crowdresponse or MFT can only list permissions(rwx) at most, but not ownership like dir. (edited)
Powershell can do these things. There are two different commands involved: Get-ChildItem (Powershell's version of dir) and Get-Acl, which will list permissions. There are also plenty of ways to script these things together to get just the values you want, and Powershell can easily output to CSV or XML.
Avatar
Avatar
Digitalferret
"GOW seems to be as difficult to analyze as DIR" - which part?
I was hoping it could just export out a csv format, which would make timeline explorer or excel good for analysis. Because dir and ls, it seems that they can not export output to csv format, they look like a text, excel and timeline explorer can not be properly tabulated for sorting
Avatar
Avatar
RX
I was hoping it could just export out a csv format, which would make timeline explorer or excel good for analysis. Because dir and ls, it seems that they can not export output to csv format, they look like a text, excel and timeline explorer can not be properly tabulated for sorting
Digitalferret 4/14/2022 7:33 AM
u realise CSV is just Comma Separated Variable? when you import the text file specify [Space] or [Tab] as the separator?
🔥 1
7:35 AM
🔥 1
Avatar
Avatar
Digitalferret
btw, what is the back story? is this a school/uni assignment, or you've been hacked, or someone asked you to do a job of work.. or?
IR job lol 🤣 My team will not image the hard drive, we are collect some necessary logs to do the investigation, when analyzing the file timeline, now we use MFT and dir, it is very tiring and inefficient to keep switching between the two files, so I am looking for a tool, it can list the ownership of a file ? (just like dir) Also, it can tell me when the file was created, modified, and accessed. (edited)
Avatar
Digitalferret 4/14/2022 7:37 AM
might want to invest in some pro tools maybe, make your whole operation more streamlined.
7:37 AM
IR not my main bag, sorry.
Avatar
still thank you bro
7:39 AM
its fine!
Avatar
Avatar
Digitalferret
Click to see attachment 🖼️
is it a tool? or just EXCEL
Avatar
Digitalferret 4/14/2022 7:41 AM
above? it's Libre Office Calc. you output your list to a file with a csv extension, then open with a spreadhseet program, import as <space> variable
7:42 AM
like ls -alh > myfile.csv
Avatar
im trying
7:46 AM
excel cant do that? did I do anything wrong? im already import as <space> variable
Avatar
Digitalferret 4/14/2022 7:47 AM
open the csv in a text editor first maybe, so you can see it without an excel formatting
7:48 AM
maybe make minor tweaks. you really need to experiment to get settings that work for you
7:50 AM
for instance, choose which arguments to pass in dir or ls for a particular output
Avatar
Avatar
Digitalferret
open the csv in a text editor first maybe, so you can see it without an excel formatting
well.. I have chosen to import csv from Excel and import as <space> variable, I don't know why, but EXCEL is working as shown above, but libre office is working well (edited)
7:57 AM
Avatar
Avatar
RX
IR job lol 🤣 My team will not image the hard drive, we are collect some necessary logs to do the investigation, when analyzing the file timeline, now we use MFT and dir, it is very tiring and inefficient to keep switching between the two files, so I am looking for a tool, it can list the ownership of a file ? (just like dir) Also, it can tell me when the file was created, modified, and accessed. (edited)
you can use UAC (github.com/tclahr/uac) to create a bodyfile of the file system, then use plaso or mactime to create a nice timeline of the file system. Or even load the bodyfile.txt output into an excel, since the bodyfile is just a piple | separated file. I mean, for *nix systems only. (edited)
👍🏻 1
Avatar
Avatar
Digitalferret
Click to see attachment 🖼️
When there are spaces in the date and time or spaces in the file name, the parsed format is still not easy to read, which is one of the most troubling factors for me, because dir, as text, can still be imported using delimiters, and will also have the problem of not easy to read
8:07 AM
Sorting can be a problem
Avatar
Avatar
tclahr
you can use UAC (github.com/tclahr/uac) to create a bodyfile of the file system, then use plaso or mactime to create a nice timeline of the file system. Or even load the bodyfile.txt output into an excel, since the bodyfile is just a piple | separated file. I mean, for *nix systems only. (edited)
nice!!, it's a pity he doesn't support windows
Avatar
Avatar
RX
Sorting can be a problem
Digitalferret 4/14/2022 8:11 AM
then you need to do this with awk
8:11 AM
ls -alh | awk -v OFS="\t" "$1=$1" > awked.csv
Salute 1
8:11 AM
to get
8:12 AM
8:13 AM
that changes to Tab delimited file for output, and your spreadsheet will then ignore the leading spaces on file size
8:15 AM
health warning: these dopamine hits when you "get it" can be addictive. other staff will be bowing like they are unworthy and bring you free drinks and more
8:15 AM
well .... might have exaggerated the last bit 🙂 (edited)
Avatar
Anyway, thanks a lot for this discussion, my English is not good, can't express very well, hope you don't mind, thank you!
Avatar
Avatar
RX
Anyway, thanks a lot for this discussion, my English is not good, can't express very well, hope you don't mind, thank you!
Digitalferret 4/14/2022 8:22 AM
to me your English is excellent, and it's my pleasure. best of luck
Salute 1
Avatar
Avatar
RX
Anyway, thanks a lot for this discussion, my English is not good, can't express very well, hope you don't mind, thank you!
Wow, I wouldn’t have thought it wasn’t your first language tbh, good job
Avatar
I had no clue you could import a text file to Excel (or Libre Office) using a different delimiter than a comma. Thanks for the heads up!
👍🏻 1
Avatar
Avatar
FullTang
I had no clue you could import a text file to Excel (or Libre Office) using a different delimiter than a comma. Thanks for the heads up!
Andrew Rathbun 4/14/2022 10:45 AM
Oh yeah, Data -> From Text/CSV. Use it all the time 😛 Also there's Data -> Text to Columns that's really helpful whenever Excel pastes everything into a single column (edited)
💯 1
👍 1
Avatar
Avatar
FullTang
I had no clue you could import a text file to Excel (or Libre Office) using a different delimiter than a comma. Thanks for the heads up!
Digitalferret 4/14/2022 11:33 AM
full disclosure: neither did i 'til i picked up the dude's question and ran with it 🙂
👍 2
Avatar
Avatar
Digitalferret
full disclosure: neither did i 'til i picked up the dude's question and ran with it 🙂
Always learning!
💯 2
Avatar
Andrew Rathbun 4/14/2022 11:34 AM
The more you know, the more you know you don't know
💯 3
this 2
Avatar
Digitalferret 4/14/2022 11:34 AM
sad but so very true, lol
11:36 AM
there's so much you gain for yourself by (trying at least) helping others. if you have spare time it's silly not to
Avatar
Avatar
Andrew Rathbun
The more you know, the more you know you don't know
Andrew I had a flashback to my younger years 🙂
😆 1
Avatar
iOS Notes app deleted by mistake. Person reinstalled the app but old notes are not showing. Notes were not set to sync with cloud. Anyone know if there is a way to get the notes back with forensic tools?
Avatar
does anyone know a good way to crack the passwords of a locked doc file, i tried this https://null-byte.wonderhowto.com/how-to/crack-password-protected-microsoft-office-files-including-word-docs-excel-spreadsheets-0193959/ but it didn't give me anything and I've tried a bunch of apps like passfab but they all cost money to use lol
Microsoft Office files can be password-protected in order to prevent tampering and ensure data integrity. But password-protected documents from earlier versions of Office are susceptible to having their hashes extracted with a simple program called office2john. Those extracted hashes can then be cracked using John the Ripper and Hashcat.
Avatar
Avatar
Lurking
does anyone know a good way to crack the passwords of a locked doc file, i tried this https://null-byte.wonderhowto.com/how-to/crack-password-protected-microsoft-office-files-including-word-docs-excel-spreadsheets-0193959/ but it didn't give me anything and I've tried a bunch of apps like passfab but they all cost money to use lol
#password-encryption-cracking
Avatar
thanks lol sorry im new here
Avatar
no worries 🙂
Avatar
Avatar
m.bates
iOS Notes app deleted by mistake. Person reinstalled the app but old notes are not showing. Notes were not set to sync with cloud. Anyone know if there is a way to get the notes back with forensic tools?
burgers_N_bytes 4/14/2022 2:59 PM
I’ve had so much information thrown at me this week but I do know this was covered in SANS FOR585…..shameless plug. That said I don’t think there is a way to get those back but you could try carving the database. Otherwise if you know some of the wording you could keyword search the entire file and maybe get lucky that there are wear leveling artifacts left over of the note.
3:00 PM
Assuming you have a FFS.
Avatar
Avatar
Jerry Porter
So, it appears that the Exchange Device ID is generated by the iPhone and reset when the device iphone is factory reset. It is the same ID that gets linked on the Exchange server. I believe it is in a . plist or some other file somewhere on the phone. The screenshot that I shared has never been connected to exchange but still has the ID. (edited)
Jerry Porter 4/14/2022 4:06 PM
Replying to my own post to close out this question. I found what I was looking for. The Exchange Device ID can be found in /private/var/mobile/Library/DataAccess/DeviceSpecificInfo.plist.
👍 2
Avatar
Avatar
burgers_N_bytes
I’ve had so much information thrown at me this week but I do know this was covered in SANS FOR585…..shameless plug. That said I don’t think there is a way to get those back but you could try carving the database. Otherwise if you know some of the wording you could keyword search the entire file and maybe get lucky that there are wear leveling artifacts left over of the note.
Thanks for your rapid response! Hope the week was entertaining...I'll give the database carving once I get me hand on the device.
Avatar
any sanderson sqlite users here whom i can ask a question 🙂
Avatar
Avatar
RX
Hi folks Is there any tool that can list the ownership of a file ?(just like dir) Also, it can tell me when the file was created, modified, and accessed. Exiftool or crowdresponse or MFT can only list permissions(rwx) at most, but not ownership like dir. (edited)
In powershell you could do cd yourFolder Get-ChildItem -File -Recurse -Filter *.pdf | ForEach-Object { Get-Acl $_.FullName -Audit | Select-Object -ExpandProperty access -Property PSPath | export-CSV yourdestination.csv -Append } Inspired by https://pcnettips.blogspot.com/2012/07/powershell-v3-adding-sacl-auditing-to.html (edited)
Security, in Windows, can be a pretty large, complex subject, particularly from a developer's perspective. A few years ago I started explori...
Avatar
Avatar
SamJack
In powershell you could do cd yourFolder Get-ChildItem -File -Recurse -Filter *.pdf | ForEach-Object { Get-Acl $_.FullName -Audit | Select-Object -ExpandProperty access -Property PSPath | export-CSV yourdestination.csv -Append } Inspired by https://pcnettips.blogspot.com/2012/07/powershell-v3-adding-sacl-auditing-to.html (edited)
ownership working well but this command can show MAC time together?!
Avatar
Ever thought of fls/istat?
Avatar
Avatar
RX
ownership working well but this command can show MAC time together?!
# From https://github.com/ili101/Join-Object/blob/master/README.md # and https://devblogs.microsoft.com/powershell/join-object/ # Install module manually # Install-Module -Name Join-Object -Scope CurrentUser cd yourFolder Get-ChildItem -File -Recurse -Filter *.pdf | ForEach-Object { $file = $_ | Select-Object FullName, CreationTimeUtc, LastAccessTimeUtc, LastWriteTimeUtc $acl = Get-Acl $_.FullName -Audit | Select-Object -ExpandProperty access -Property @{name="FullName"; expression={"$fullName"}} Join-Object -Left $file -Right $acl -LeftJoinProperty FullName -RightJoinProperty FullName -KeepRightJoinProperty -Type OnlyIfInBoth -Prefix service_ | export-CSV yourDestination -Append } (edited)
Avatar
Ross Donnelly 4/16/2022 11:47 PM
Happy Easter everyone - hope the Easter Bunny brought you lots of forensic toys to play with! 🐰
🐰 6
Avatar
Avatar
SamJack
# From https://github.com/ili101/Join-Object/blob/master/README.md # and https://devblogs.microsoft.com/powershell/join-object/ # Install module manually # Install-Module -Name Join-Object -Scope CurrentUser cd yourFolder Get-ChildItem -File -Recurse -Filter *.pdf | ForEach-Object { $file = $_ | Select-Object FullName, CreationTimeUtc, LastAccessTimeUtc, LastWriteTimeUtc $acl = Get-Acl $_.FullName -Audit | Select-Object -ExpandProperty access -Property @{name="FullName"; expression={"$fullName"}} Join-Object -Left $file -Right $acl -LeftJoinProperty FullName -RightJoinProperty FullName -KeepRightJoinProperty -Type OnlyIfInBoth -Prefix service_ | export-CSV yourDestination -Append } (edited)
Andrew Rathbun 4/17/2022 4:48 AM
# Install module manually # Install-Module -Name Join-Object -Scope CurrentUser cd yourFolder Get-ChildItem -File -Recurse -Filter *.pdf | ForEach-Object { $file = $ | Select-Object FullName, CreationTimeUtc, LastAccessTimeUtc, LastWriteTimeUtc $acl = Get-Acl $.FullName -Audit | Select-Object -ExpandProperty access -Property @{name="FullName"; expression={"$fullName"}} Join-Object -Left $file -Right $acl -LeftJoinProperty FullName -RightJoinProperty FullName -KeepRightJoinProperty -Type OnlyIfInBoth -Prefix service_ | export-CSV yourDestination -Append }
👍 1
Avatar
Forensicator 4/18/2022 8:53 AM
hello @Cellebrite anyone know how to change the path to save a prelim report in PA. It seems like it remembers an extraction I did a week ago and I am not seeing a "save to" etc. ty in advance
Avatar
thatboy_leo 4/18/2022 12:40 PM
Any forensic tools capable of converting .arc image files to E01s?
Avatar
@thatboy_leo I'm not up to speed on what format an ".arc" is but if you can mount it with @Arsenal Arsenal Image Mounter as a drive and them create an E01 from it ?
Avatar
Avatar
DCSO
@thatboy_leo I'm not up to speed on what format an ".arc" is but if you can mount it with @Arsenal Arsenal Image Mounter as a drive and them create an E01 from it ?
If it’s an arc file from R-Drive Image, I don’t think we have ever been asked about that format before. Unless arc files are raw disk images, the OP may need to buy R-Drive Image to mount and convert. Caveat: Not familiar with R-Drive Image.
2:31 PM
If it’s the other kind of arc file, I’m having flashbacks to running a Renegade BBS.
Avatar
Avatar
Arsenal
If it’s the other kind of arc file, I’m having flashbacks to running a Renegade BBS.
Lol, I was thinking back to my BBS days too
Avatar
Hi, is there a way to check the history of outbound connections on a Windows PC? I have a host that made connections to multiple destinations on port 445
Avatar
Avatar
Vendetta
Hi, is there a way to check the history of outbound connections on a Windows PC? I have a host that made connections to multiple destinations on port 445
randomaccess 4/19/2022 12:03 AM
Not really as windows doesn't typically log this. Do you have memory? You may have some luck in the app data depending on what's installed
Avatar
Anyone know any good tools to compare two digital images, from the same system, just taken at different times?
Avatar
Avatar
thatboy_leo
Any forensic tools capable of converting .arc image files to E01s?
Digitalferret 4/19/2022 2:12 AM
late to the party but R-Drive images use .rdr extension which i seem to remember are/can-be compressed . if i recall right previous versions would also let you create a bitwise image .dsk? . .arc format is possibly a Norton backup file. might need to do a restore and then image to .E01? (edited)
Avatar
Avatar
Ali
Anyone know any good tools to compare two digital images, from the same system, just taken at different times?
randomaccess 4/19/2022 2:14 AM
Suggest defining your questions otherwise that's really broad
Avatar
Avatar
Ali
Anyone know any good tools to compare two digital images, from the same system, just taken at different times?
Digitalferret 4/19/2022 2:14 AM
if you are checking to see if they are different maybe just hash both images and compare that. if you are looking at specific file changes, new/old/deleted thats a different bucket of prawns (edited)
Avatar
Avatar
randomaccess
Suggest defining your questions otherwise that's really broad
For instance, I have a image of a system prior to installing a desktop-based crypto wallet, and I have an image of the same system after installing the wallet, and I don't want to manually identify all changes to the image, I was wondering if tool would be able to identify the specific changes to the system when looking at both images.
Avatar
Avatar
Digitalferret
if you are checking to see if they are different maybe just hash both images and compare that. if you are looking at specific file changes, new/old/deleted thats a different bucket of prawns (edited)
unfortunately looking for the bucket of prawns
Avatar
randomaccess 4/19/2022 2:16 AM
Run procmon while installing
2:17 AM
But all things considered The wallet will likely create files in a few directories, and registry entries. So the few directories can be sorted by grabbing the Mft after install and then sorting by created
Avatar
Avatar
randomaccess
Run procmon while installing
that was my initial idea, however I am not allowed to analyze the system outside of its image format, weird rule but it is what it is
Avatar
Avatar
Ali
that was my initial idea, however I am not allowed to analyze the system outside of its image format, weird rule but it is what it is
randomaccess 4/19/2022 2:18 AM
That's fine. If you know when the item was installed you can still look at the registry and file system after that install date
Avatar
Avatar
Ali
that was my initial idea, however I am not allowed to analyze the system outside of its image format, weird rule but it is what it is
Digitalferret 4/19/2022 2:19 AM
how large an image?
Avatar
roughly 30gb
Avatar
Digitalferret 4/19/2022 2:21 AM
i'll defer to randomaccess, but if it's not ridiculously large, you might consider taking a file list of both and then perform some sort of comparison via commandline sort/uniq etc
2:25 AM
bbl, irl calls. best of luck
Avatar
Avatar
Arsenal
If it’s the other kind of arc file, I’m having flashbacks to running a Renegade BBS.
I ran Renegade! It was great until the internet came and rounded all the fun.
Avatar
Avatar
Joe Schmoe
I ran Renegade! It was great until the internet came and rounded all the fun.
We are dating ourselves. Renegade SysOps should be retired by now. 😉
Avatar
filosofos#1337 4/19/2022 8:56 AM
Hello everyone! My name is George Ioannou and I am a research fellow at Brunel University, London. We are doing research on bringing together Explainable AI with Cyber Incident Response to create an agent that will work as a team with experts as well as novices. We are currently running a small exercise in the form of a survey for training the underlying model which is based on the NIST framework for incident response. The survey can be found in https://brunel.onlinesurveys.ac.uk/xaicsa-questionnaire and is completely anonymous. Your contribution would be very vital to our work. I hope you enjoy the survey and please do not hesitate to post any feedback! Salute Salute Salute Salute
Avatar
Avatar
Arsenal
We are dating ourselves. Renegade SysOps should be retired by now. 😉
It was a fork of Telegard I think. I had a pretty popular BBS for two reasons. One was long distance fees. There were only a few in the local calling area so not much competition. Most importantly my sister would use it occasionally. Girls were a rare sighting in that space.
Avatar
Avatar
Digitalferret
late to the party but R-Drive images use .rdr extension which i seem to remember are/can-be compressed . if i recall right previous versions would also let you create a bitwise image .dsk? . .arc format is possibly a Norton backup file. might need to do a restore and then image to .E01? (edited)
thatboy_leo 4/19/2022 3:18 PM
Thank you sir!
Avatar
Bulletproof (נתן צ'אן) 4/19/2022 3:27 PM
Hi everyone, I know threat actors for ransomware cases will rename rclone to prevent forensics (anti-forensics). If so, have you seen any of the renames and if so which ones?
Avatar
Favorite tools for outlook forensics(PST dumps) that isn’t AXIOM or outlook? About to chuck this lab station into a bin right now
5:00 PM
Pretty sure autopsy is decent for PST forensics but it’s been a bit… no time like the present
Avatar
not much out there. i know a few people who worked on this: https://github.com/bmalik4444/PST-Go-Phish it relies mainly on libpff and pretty much requires ubuntu. this one is for identifying phishing email candidates
The original script lets you automatically identify potentially suspicious emails based on a combination of message header heuristics. The modified version of the original script lets you leverage ...
5:11 PM
@Turb0Yoda
Avatar
Thanks
5:12 PM
Will give it a good
5:12 PM
Go
Avatar
the other smartest DFIR devs I know were writing pst output to json and using jquery to analyze it. this isnt their code but purports to do something similar with no guarantee: https://github.com/braintapper/pst_to_json/releases
Converts an Outlook PST to JSON. Contribute to braintapper/pst_to_json development by creating an account on GitHub.
5:18 PM
if you Google "dump pst file to json" there are some other results as well. ymmv
5:18 PM
unfortunately there weren't a whole lot of good options
Avatar
Yeah- something is wonky with this axiom and this box is slated for a rebuild next Tuesday just like… cmon couldn’t wait a few days before crapping out?
Avatar
Avatar
Bulletproof (נתן צ'אן)
Hi everyone, I know threat actors for ransomware cases will rename rclone to prevent forensics (anti-forensics). If so, have you seen any of the renames and if so which ones?
randomaccess 4/19/2022 6:50 PM
Renaming rclone doesn't prevent forensics, at best it may prevent detection but that also depends on the monitoring in place. They'd likely also alter something in the binary so it doesn't have a hash match
6:51 PM
Why do you want to know about the rename? I've seen it once renamed, but, if it's for collating detections I'd be more inclined to look for the arguments in the command line than the binary name
Avatar
marco_polo076 4/19/2022 7:03 PM
Anyone know how to use an ftk imager
Avatar
Avatar
marco_polo076
Anyone know how to use an ftk imager
User Guide is the best meterial.
Avatar
marco_polo076 4/19/2022 7:16 PM
where
Avatar
Avatar
marco_polo076
where
Run FTK Imager -> F1 Button Clcik
Avatar
Avatar
randomaccess
Why do you want to know about the rename? I've seen it once renamed, but, if it's for collating detections I'd be more inclined to look for the arguments in the command line than the binary name
Bulletproof (נתן צ'אן) 4/19/2022 9:50 PM
Hi @randomaccess, Thanks for the info. I have dissected some Sigma rules for this. If the command line contains the commands like: pass, user, copy, mega, sync, config, lsd, remote, and ls, they are usually tell-tale signs of usage. But, my question, what if the hacker deletes rclone? Then, what should we do?
9:50 PM
I have no forensic images, given the fact, only $MFT logs, but they are not detecting anything. I can't disclose any more than that. (edited)
Avatar
We just had a TA rename rclone as 7-zip in a recent case, that was mildly annoying
10:15 PM
Am I tripping or did Microsoft literally change the edisco options in O365 from “basic” and “advanced” to “standard” and “premium” between yesterday and today
10:18 PM
I need to sleep
10:20 PM
Yeah it looks like they did
🤣 1
10:20 PM
Fml
Avatar
Avatar
Turb0Yoda
Am I tripping or did Microsoft literally change the edisco options in O365 from “basic” and “advanced” to “standard” and “premium” between yesterday and today
Bulletproof (נתן צ'אן) 4/19/2022 10:34 PM
All good. Thanks for the tips.
Avatar
Avatar
Bulletproof (נתן צ'אן)
I have no forensic images, given the fact, only $MFT logs, but they are not detecting anything. I can't disclose any more than that. (edited)
Andrew Rathbun 4/19/2022 11:08 PM
$J?
Avatar
Avatar
Turb0Yoda
We just had a TA rename rclone as 7-zip in a recent case, that was mildly annoying
Andrew Rathbun 4/19/2022 11:09 PM
Oof. That's a rough one lol
Avatar
Avatar
Andrew Rathbun
$J?
Bulletproof (נתן צ'אן) 4/20/2022 1:11 AM
What do you mean by $J?
Avatar
Bulletproof (נתן צ'אן) 4/20/2022 1:22 AM
Got it. 🙂
1:22 AM
@Andrew Rathbun Thanks.
👍 1
Avatar
Avatar
Bulletproof (נתן צ'אן)
Hi @randomaccess, Thanks for the info. I have dissected some Sigma rules for this. If the command line contains the commands like: pass, user, copy, mega, sync, config, lsd, remote, and ls, they are usually tell-tale signs of usage. But, my question, what if the hacker deletes rclone? Then, what should we do?
randomaccess 4/20/2022 2:57 AM
If you only have a $mft then no you don't have enough to go off sorry
2:57 AM
Even if I told you I've seen an attacker name rclone to ABC.exe that doesn't mean that if you find ABC.exe that it's rclone
2:57 AM
Especially if they deleted it ....
2:58 AM
I'd be looking in the logfile or USN journal as @Andrew Rathbun mentioned but there are better artefacts to review....like...edr telemetry if it exists, event logs, amcache, shimcache
❤️ 1
Avatar
Avatar
randomaccess
Especially if they deleted it ....
Bulletproof (נתן צ'אן) 4/20/2022 6:55 AM
Thanks brother. This means so much to me.
Avatar
Arman Gungor 4/20/2022 9:26 AM
If you are interested in investigating the PST (MAPI properties, intelligence on entities, MIME headers, etc.), then FEI might be a good fit. https://www.metaspike.com/forensic-email-intelligence/ On the other hand, if your goal is to just search and dump the emails, a forensic suite should be okay. @Turb0Yoda @Sha1_4n6 (edited)
Experts' choice for investigating email fraud, business email compromise (BEC), malware delivery, and CAN-SPAM Act violations.
Avatar
Gaming console forensics question. Can anyone confirm that all of the user data on an Xbox 360 S, model 1439, is stored on the removable hard drive?
Avatar
Avatar
Arman Gungor
If you are interested in investigating the PST (MAPI properties, intelligence on entities, MIME headers, etc.), then FEI might be a good fit. https://www.metaspike.com/forensic-email-intelligence/ On the other hand, if your goal is to just search and dump the emails, a forensic suite should be okay. @Turb0Yoda @Sha1_4n6 (edited)
We were actually talking about buying it at work unfortunately it’s not something we’ll get anytime soon with how accounts works here ._.
Avatar
Avatar
Turb0Yoda
We were actually talking about buying it at work unfortunately it’s not something we’ll get anytime soon with how accounts works here ._.
Arman Gungor 4/20/2022 1:29 PM
Oh, I hear you. Feel free to DM if there is anything I can help with. Always happy to chat about email forensics 😁
🙏 1
Avatar
Avatar
stephenie
Has anyone come across AVG Photo Vault before? Since when were they encrypting and hiding media files?
Dredging up a very old post! https://theincidentalchewtoy.wordpress.com/2022/02/23/decrypting-the-avg-photo-vault/ for a write up of how it works and a link to the script that can be used to deal with PINs, pattern and encryption: https://github.com/4n6chewtoy/AVGPhotoVault
Screenshot of AVG Menu I have been holding onto this post for a while now, one of the first applications I attempted to decrypt which took a very long time. ‘AVG AntiVirus – Mobile Security &…
A python script to decrypt media files encrypted using the Android application &#39;AVG Antivirus&#39;&#39;. Will identify PIN / pattern used. - GitHub - 4n6chewtoy/AVGPhotoVault: A pyt...
👍 3
Avatar
@Law Enforcement [UK] Anyone tried out the new Griffeye accessible/inaccessible paths yet? Is there any documentation for how to add to the inaccessiblePatterns JSON file? I just want to add file names but it looks like it works off paths only?
Avatar
Avatar
Lewis
@Law Enforcement [UK] Anyone tried out the new Griffeye accessible/inaccessible paths yet? Is there any documentation for how to add to the inaccessiblePatterns JSON file? I just want to add file names but it looks like it works off paths only?
We haven’t yet as we are still on 21.1 as it needs to be signed off by the Home Office prior to being used I believe
Avatar
got signed off last week
Avatar
Bulletproof (נתן צ'אן) 4/21/2022 8:50 AM
Hey folks, Good morning. I am just wondering what are the most common ways you have seen data exfiltration from a server? For example, does the TA zip and compress everything, map new network shares so that it's easier to exfiltrate at a central endpoint, etc.? Thanks.
Avatar
Avatar
Bulletproof (נתן צ'אן)
Hey folks, Good morning. I am just wondering what are the most common ways you have seen data exfiltration from a server? For example, does the TA zip and compress everything, map new network shares so that it's easier to exfiltrate at a central endpoint, etc.? Thanks.
Andrew Rathbun 4/21/2022 8:51 AM
Often via PowerShell to some external IP, using rclone, Total Commander's FTP plugin, mega, web browser to ufile.io, etc. You name it!
❤️ 1
8:53 AM
Think about how you would go about getting a file from your computer to me. Not using Discord or email (file size limits and plus there are many more lightweight, less noisy options than Discord to share files). That's pretty much the extent of the options haha
8:53 AM
the more command line the more likely the option will be considered for use by TAs
Avatar
Bulletproof (נתן צ'אן) 4/21/2022 8:54 AM
So, what you're saying is that anything is possible? I think the TA would have to compress it first, since sending file by file is hard. Would you say so?
Avatar
Avatar
Bulletproof (נתן צ'אן)
So, what you're saying is that anything is possible? I think the TA would have to compress it first, since sending file by file is hard. Would you say so?
Andrew Rathbun 4/21/2022 8:55 AM
PowerShell script to search for files of interest (i.e., finance, accounting, accounts receivable, etc), then use 7zip CLI to zip it up then exfil via rclone. All command line.
❤️ 1
Avatar
Bulletproof (נתן צ'אן) 4/21/2022 8:56 AM
Are there 7zip forensics that you know of?
Avatar
Avatar
Bulletproof (נתן צ'אן)
Are there 7zip forensics that you know of?
Andrew Rathbun 4/21/2022 8:56 AM
Sure, there are some registry keys and values that get populated with 7Zip, much like WinRAR. They are pretty similar, in fact. But I honestly don't know if 7Zip CLI logs anything in the registry
Avatar
Bulletproof (נתן צ'אן) 4/21/2022 8:58 AM
Thanks man. Copy that.
Avatar
Hey buddy's I'm wanna star in DFIR field but to start i don't know,can anyone help me
Avatar
Avatar
KeSHaV
Hey buddy's I'm wanna star in DFIR field but to start i don't know,can anyone help me
Andrew Rathbun 4/21/2022 10:57 AM
Avatar
Avatar
KeSHaV
Hey buddy's I'm wanna star in DFIR field but to start i don't know,can anyone help me
Andrew Rathbun 4/21/2022 10:58 AM
Avatar
Avatar
KeSHaV
Hey buddy's I'm wanna star in DFIR field but to start i don't know,can anyone help me
check out my StartMe page, plenty of resources to get you going https://startme.stark4n6.com
A startpage with online resources about Forensics, created by Stark 4N6.
❤️ 1
🔥 1
👍 1
Avatar
Avatar
Lewis
@Law Enforcement [UK] Anyone tried out the new Griffeye accessible/inaccessible paths yet? Is there any documentation for how to add to the inaccessiblePatterns JSON file? I just want to add file names but it looks like it works off paths only?
We are just about to install the 22.0.2 version approved by CAID across the force.
Avatar
Avatar
Bulletproof (נתן צ'אן)
Hey folks, Good morning. I am just wondering what are the most common ways you have seen data exfiltration from a server? For example, does the TA zip and compress everything, map new network shares so that it's easier to exfiltrate at a central endpoint, etc.? Thanks.
Accessing and browsing network shares, copying to one or multiple staging hosts, compressing and uploading to somewhere via rclone
Avatar
Anyone know where to officially download DumpIt?
Avatar
Avatar
Jogoyo
Anyone know where to officially download DumpIt?
Memory Dump. Contribute to Crypt2Shell/Comae-Toolkit development by creating an account on GitHub.
Salute 2
Avatar
does anyone here know how to rebuild a boot record? rhel 4 i got corrupted grub. the thing is i did a physical 2 virtual so i messed it up its something mkinit, work out the boot partition and lvm is correct but i know windows just not linux
Avatar
Josephine Mama 4/21/2022 11:42 PM
does anyone here know what the best way is to test a new HDD on a windows machine before using?
Avatar
Avatar
Josephine Mama
does anyone here know what the best way is to test a new HDD on a windows machine before using?
Digitalferret 4/22/2022 1:36 AM
if its new, what are you wanting to test?
Avatar
Cellebrite Digital Collector Who thought it was a good idea to put ‘mount drive’ next to ‘format drive’ 😂….Not done anything wrong…thank god but I feel any option that has the potential to erase data should be miles away from a mount option. I hope everyone is careful where they click.
🤣 3
Avatar
Avatar
D1g1talDan
Cellebrite Digital Collector Who thought it was a good idea to put ‘mount drive’ next to ‘format drive’ 😂….Not done anything wrong…thank god but I feel any option that has the potential to erase data should be miles away from a mount option. I hope everyone is careful where they click.
@Cellebrite seems a very legit RFC.
Avatar
Avatar
D1g1talDan
Cellebrite Digital Collector Who thought it was a good idea to put ‘mount drive’ next to ‘format drive’ 😂….Not done anything wrong…thank god but I feel any option that has the potential to erase data should be miles away from a mount option. I hope everyone is careful where they click.
🙏
Avatar
Hi folks, I am doing some work around router downloads within my police force for some training.. and my manager has asked me “how we can/can’t use Mac addresses for attribution” as well as is there anything we can do if a Mac is randomised”. The second question I can be pretty sure If it’s a randomised MAC address then you are unable to get anything - potentially get something from a forensic download, if you’re lucky… but the first question I’m none the wiser, is there anyone who might be able to share their knowledge. Many thanks for your time! 🙂
Avatar
Avatar
Boiga
Hi folks, I am doing some work around router downloads within my police force for some training.. and my manager has asked me “how we can/can’t use Mac addresses for attribution” as well as is there anything we can do if a Mac is randomised”. The second question I can be pretty sure If it’s a randomised MAC address then you are unable to get anything - potentially get something from a forensic download, if you’re lucky… but the first question I’m none the wiser, is there anyone who might be able to share their knowledge. Many thanks for your time! 🙂
There is a plist from iOS devices that contains the randomized MAC addresses that it uses for different access points. Here is a link for more info. https://ciofecaforensics.com/2020/10/24/apple-private-addresses/
👍 1
Avatar
Attribution is a very tough subject. MAC randomization is easy for bad guys to do. If you’re dealing with a non-tech savvy perp, then MAC address attribution could be something you could use to attribute actions, but keep in mind that they can be randomized while doing so. If you are looking at actions within a short period of time, logical attribution can be achieved, however linking them to a physical device could be tricky. TLDR - Probably not useful (edited)
👍 1
Avatar
Does anyone know companies that are doing DFIR internships in Ohio?
Avatar
Avatar
malrker
does anyone here know how to rebuild a boot record? rhel 4 i got corrupted grub. the thing is i did a physical 2 virtual so i messed it up its something mkinit, work out the boot partition and lvm is correct but i know windows just not linux
Live boot into the Linux , chroot into your system, reinstall grub
Avatar
just wanted to let people know there is a new phishing scam going on i just got the email but didn't activate it this was sent to me 2 times trying to claim i bought something when i never did and the account it emailed was a throw away email address.
12:42 PM
first off i do not have the funds for the transaction cause i am using most of it for college so my bank would never allow this just want you guys to be aware someone is trying to make it look official and be careful of this.
12:44 PM
2 first names and the email address is very fishy when i tried to look at the email it was alot of numbers and letters that made it look like it was auto generated.
Avatar
For anyone that is running into issue with @Cellebrite Qualcomm live dumps on Samsungs and freezing at "sepolicy_version" it appears to be an issue with Samsung Health app, going back to Version 7.50.0.137 dumped successfully with no issues.
📬 2
Avatar
Avatar
FullTang
There is a plist from iOS devices that contains the randomized MAC addresses that it uses for different access points. Here is a link for more info. https://ciofecaforensics.com/2020/10/24/apple-private-addresses/
Thank you so much for this. I will study it when I am back on monday to see if I can comprehend what the person is on about. Sounds really good though, potentailly something to implement within my force. 🙂
👍 1
Avatar
@DCSO ok - how do you know what version to revert back to? Was there a major change in QL after that version?
3:42 PM
I love the info I just want to know how to figure that out myself without banging my head on the desk for a day straight
Avatar
Avatar
attackd0gz
Attribution is a very tough subject. MAC randomization is easy for bad guys to do. If you’re dealing with a non-tech savvy perp, then MAC address attribution could be something you could use to attribute actions, but keep in mind that they can be randomized while doing so. If you are looking at actions within a short period of time, logical attribution can be achieved, however linking them to a physical device could be tricky. TLDR - Probably not useful (edited)
Thank you mate, it was useful. It's more information and credability I can go to my DS and explain that it's really fecking difficult, unless you know whats going on it's super tricky and potentially unable to attribute.... but router logs are always useful to get (if the router has them of course). Thank you again! 🙂
👍 1
Avatar
marlboro_jamez 4/22/2022 11:24 PM
Hi everyone, the private sector where I'm working at has been kind enough to setup my training towards doing the EnCE, but due to the requirements of completing the EnCase DF-120 and DF-210 that should be completed first, I was wondering if anyone has great resources regarding to preparation, and would be kind enough sharing those. I've just jumped into this space recently so you could see me as fresh meat in this industry as you would say. Even recommendations of books would be great to start off with. (edited)
Avatar
Been a minute (15 years) since I took EnCE but best resource is to understand file systems
Avatar
Hi everyone, do you know some free material to get started in DFIR? I am relatively fresh out of university and in my first cybersecurity job.
Avatar
Avatar
STD1990
Hi everyone, do you know some free material to get started in DFIR? I am relatively fresh out of university and in my first cybersecurity job.
Digitalferret 4/23/2022 1:24 PM
↖️ maybe check channels tabs under [DFIR NEWSFEED] - esp https://discord.com/channels/427876741990711298/645449956949491749 >> https://aboutdfir.com (edited)
👍 1
Avatar
Sigma_Sekos 4/23/2022 1:40 PM
does anyone have any peer reviewed information on using knoppix as digital forensics OS?
Avatar
Avatar
marlboro_jamez
Hi everyone, the private sector where I'm working at has been kind enough to setup my training towards doing the EnCE, but due to the requirements of completing the EnCase DF-120 and DF-210 that should be completed first, I was wondering if anyone has great resources regarding to preparation, and would be kind enough sharing those. I've just jumped into this space recently so you could see me as fresh meat in this industry as you would say. Even recommendations of books would be great to start off with. (edited)
13Cubed is a side project maintained by me, Richard Davis. This channel covers information security-related topics including Digital Forensics and Incident Response (DFIR) and Penetration Testing, as well as tutorials and overviews of various apps and scripts I've written. ● Release Schedule: New videos are released on Mondays, at least once pe...
Avatar
marlboro_jamez 4/23/2022 11:55 PM
Thank you!! Will do.
Avatar
Avatar
Digitalferret
if its new, what are you wanting to test?
Josephine Mama 4/24/2022 6:19 AM
just to be better on the safe side to make sure i didn't receive a faulty drive
6:20 AM
just an extra precaution
6:20 AM
amazon is known for sending out bad drives
Avatar
Avatar
Josephine Mama
just an extra precaution
Digitalferret 4/24/2022 6:57 AM
Avatar
Avatar
Josephine Mama
just to be better on the safe side to make sure i didn't receive a faulty drive
Vitaliy Mokosiy 4/24/2022 9:45 AM
https://www.hdsentinel.com/ is a decent one to test a drive
Monitoring hard disk health and temperature. Test and repair HDD problems, predict disk failure.
👍🏼 1
Avatar
For real this time. Looks the the new edition of X-Ways Practitioner's Guide will be launched in about 4 hours. https://order-dfir.com/optin1650476589319
Get notified when the 100-hour sale starts!
Avatar
It is launched!
Avatar
Avatar
derekeiri
For real this time. Looks the the new edition of X-Ways Practitioner's Guide will be launched in about 4 hours. https://order-dfir.com/optin1650476589319
marlboro_jamez 4/24/2022 9:13 PM
Avatar
DeeFIR 🇦🇺 4/24/2022 10:15 PM
Cost of postage to Australia is the same as the book itself!
Avatar
marlboro_jamez 4/25/2022 5:14 AM
Hi everyone I'm looking for some advice, but I think it's best for me to give a bit of background to the situation; So the company where I'm employed had always outsourced DFIR services, and their planning to open up their own lab, where I've done the research regarding to hardware requirements and accessories that would be needed to conduct investigations. We are planning to make use of EnCase and I am aware of other open-source and software providers, but unfortunately Cellebrite isn't available in our country (South Africa) due to political reasons -_- The EnCase Training is a bit far from reach regarding their training dates, and this is something to be done ASAP. The major concern regarding to certification is to be representable in the court of law as a expert. EnCE requirements would be to cover DF-120 & DF-210 which we are still planning on doing but only in July, are there any other recommendations and solutions that I can look towards certifications to fulfil our needs in the meantime, as everything regarding to my studies will be sponsored through the company, as I'm grateful for the major opportunity. I know there are many workarounds to the use of not purchasing EnCase, but I would also appreciate anything regarding to that as well, I would really appreciate any guidance or advice. Best Regards
Avatar
Avatar
whee30
@DCSO ok - how do you know what version to revert back to? Was there a major change in QL after that version?
Trial and error here by our crew, I thought I would share with the group so we don't all bang out head on it. Cellebrite stated the more recent version is having errors with the Samsung Health / Keystore. I'm thinking the earlier version of the Q-Live it was not grabbing this at all hence why its not getting stuck. (untested)
👍 1
Avatar
Avatar
derekeiri
For real this time. Looks the the new edition of X-Ways Practitioner's Guide will be launched in about 4 hours. https://order-dfir.com/optin1650476589319
I'm not a book guy but I would like to get the Kindle version of this if it ever came out.
🤞 1
Avatar
Avatar
marlboro_jamez
Hi everyone I'm looking for some advice, but I think it's best for me to give a bit of background to the situation; So the company where I'm employed had always outsourced DFIR services, and their planning to open up their own lab, where I've done the research regarding to hardware requirements and accessories that would be needed to conduct investigations. We are planning to make use of EnCase and I am aware of other open-source and software providers, but unfortunately Cellebrite isn't available in our country (South Africa) due to political reasons -_- The EnCase Training is a bit far from reach regarding their training dates, and this is something to be done ASAP. The major concern regarding to certification is to be representable in the court of law as a expert. EnCE requirements would be to cover DF-120 & DF-210 which we are still planning on doing but only in July, are there any other recommendations and solutions that I can look towards certifications to fulfil our needs in the meantime, as everything regarding to my studies will be sponsored through the company, as I'm grateful for the major opportunity. I know there are many workarounds to the use of not purchasing EnCase, but I would also appreciate anything regarding to that as well, I would really appreciate any guidance or advice. Best Regards
If you're open to taking an OnDemand/online course, OpenText has an online/passport program, which includes DF-120 and DF-210.
Avatar
Avatar
derekeiri
If you're open to taking an OnDemand/online course, OpenText has an online/passport program, which includes DF-120 and DF-210.
marlboro_jamez 4/25/2022 7:42 AM
Yeah, I've had a look at that but the only issue is the Directors aren't willing to wait until July (upcoming dates), so they went ahead and told me to come up with a alternative solution in the meantime that can be done within 3-4 weeks, to look at a different certification that can still fill the requirements of being representable in court. Then when July comes I can go ahead and do the DF-120, DF-210 and then of course the EnCE. So I'm unsure if any GIAC certs would fill those needs -_- they honestly make it so frustrating, but yeah what can I do
Avatar
maybe it's changed since i took it, but you can take the ondemand (recorded) course as soon as you pay and granted access. (edited)
Avatar
@marlboro_jamez dose it have to be EnCase ? How about X-Ways ? Axiom ? etc
Avatar
Avatar
DeeFIR 🇦🇺
Cost of postage to Australia is the same as the book itself!
You have to pay extra in Australia for special boats to keep them from falling off the bottom of the earth
🤣 3
Avatar
Avatar
marlboro_jamez
Yeah, I've had a look at that but the only issue is the Directors aren't willing to wait until July (upcoming dates), so they went ahead and told me to come up with a alternative solution in the meantime that can be done within 3-4 weeks, to look at a different certification that can still fill the requirements of being representable in court. Then when July comes I can go ahead and do the DF-120, DF-210 and then of course the EnCE. So I'm unsure if any GIAC certs would fill those needs -_- they honestly make it so frustrating, but yeah what can I do
You can consider to get a Exterro ACE (FTK) certification. But I'm not sure this certification would fill needs in court.
Avatar
Avatar
DCSO
@marlboro_jamez dose it have to be EnCase ? How about X-Ways ? Axiom ? etc
marlboro_jamez 4/25/2022 8:58 AM
Doesn't have to be EnCase at all, I'm open to anything that would fill the requirement as mentioned above
Avatar
Avatar
DCSO
@marlboro_jamez dose it have to be EnCase ? How about X-Ways ? Axiom ? etc
marlboro_jamez 4/25/2022 9:00 AM
Would those be seen representable in court? I apologize for the inconvenience though, I thought it would be best to ask those who have been in the industry for ages.
Avatar
I imagine that may be depend on the jurisdiction. I see that you’re in South Africa. Jason Jordaan is based out of South Africa. He has a five part series on LinkedIn, Re: thoughts on forensic regulation and the role of the Association of Certified Fraud Examiners. The latest refers to digital forensics specifically. Joradaan and that article series might be good resources. https://www.linkedin.com/pulse/trying-regulate-south-african-forensic-industry-acfe-sa-jason-jordaan
I have been a member of the ACFE for over twenty years, and last year received my 20 year CFE pin from the ACFE. This was a really proud moment for me.
Avatar
Avatar
marlboro_jamez
Would those be seen representable in court? I apologize for the inconvenience though, I thought it would be best to ask those who have been in the industry for ages.
Yes - the above forensic tools are widely used in US and Europe . It may very for your county
Avatar
Avatar
derekeiri
I imagine that may be depend on the jurisdiction. I see that you’re in South Africa. Jason Jordaan is based out of South Africa. He has a five part series on LinkedIn, Re: thoughts on forensic regulation and the role of the Association of Certified Fraud Examiners. The latest refers to digital forensics specifically. Joradaan and that article series might be good resources. https://www.linkedin.com/pulse/trying-regulate-south-african-forensic-industry-acfe-sa-jason-jordaan
marlboro_jamez 4/25/2022 10:00 AM
Thank you, I'll have a read on that, maybe I'll see if I can approach him as well. I really do appreciate everyone's insight and help on this!
Avatar
Question for the general group: how are you seeing scams/frauds being committed in the metaverse? I found one indictment so far regarding someone falsely advertising games/services in Metaverse. https://www.justice.gov/usao-sdny/press-release/file/1486816/download
12:41 PM
I'm also looking into brand/reputational monitoring in metaverse spaces, so if you have any ideas I'm all ears, but also curious in any examples of how frauds and scams are presently occurring.
12:42 PM
Like, can I post a fake billboard with a link in metaverse that would lead to a fake sign-in for Paypal?
Avatar
I wonder if some of the ones that do darknet/web scanning for such stuff would start doing this as well.
Avatar
Yeah I'm gonna put some queries that direction as well
12:45 PM
Add that to their collections.
12:45 PM
I need to create an account on decentraland and go figure some of this out for myself, but I don't have it in me to create one more login for social media.
12:45 PM
If I had a livejournal I should be grandfathered in at this point.
Avatar
Recorded Future comes to mind. And I am sure others might as well, if they think there is any business value in it
Avatar
“After a deep security research by Cysource research team led by Shai Alfasi & Marlon Fabiano da Silva, we found a way to execute commands remotely within VirusTotal platform and gain access to its various scans capabilities. “ https://www.cysrc.com/blog/virus-total-blog
Avatar
ssaadakhtarr 4/27/2022 12:44 AM
Hello! I'm writing a security SOP for MS SQL server integration with IBM qradar. So what kind of security logs should we enable on qradar to be monitored? By default some general logs are being forwarded to qradar like login failure, db creation etc. so my question is, are these logs enough or do I need to add something additional?
Avatar
Bulletproof (נתן צ'אן) 4/27/2022 3:42 PM
Hi again, For TAs, how do they usually exfiltrate? Is it through compression of the whole file sets (victim data) by .zip, .rar, or .7z?
3:42 PM
I can't seem to find it on the system; any hints?
3:44 PM
Or, where do I look for logs?
Avatar
All of these above
👍 2
4:12 PM
Commonly rars
👍 1
Avatar
I have seen it done as any of the above. Even non compressed individual files. Best thing is to look for deleted files (Journal files etc)
Avatar
Bulletproof (נתן צ'אן) 4/27/2022 4:14 PM
What's that?
Avatar
Slides in the zip have common exfiltration artifacts for Rar
4:15 PM
Others items to look for in indx buffers, memory and unallocated space
4:15 PM
Old but still good
Avatar
Bulletproof (נתן צ'אן) 4/27/2022 4:15 PM
Do you mean in the $MFT?
4:15 PM
I can't find any .rars, .zips, or .7zs. That's the core problem.
4:16 PM
Have tried even UsnJrnl.
Avatar
Avatar
Bulletproof (נתן צ'אן)
I can't find any .rars, .zips, or .7zs. That's the core problem.
Usually they are deleted by the TA right after transfer, for obvious reasons.
Avatar
Avatar
Bulletproof (נתן צ'אן)
Have tried even UsnJrnl.
Do you have a date/time when you think the data might have been exfilled?
Avatar
Bulletproof (נתן צ'אן) 4/27/2022 4:17 PM
But, shouldn't they leave a trace, per $MFT?
4:17 PM
Yes, I do.
Avatar
Avatar
Bulletproof (נתן צ'אן)
But, shouldn't they leave a trace, per $MFT?
They can, but if a bit of time has gone by, or if the TA used any kind of file wiping (have seen it done in about 1/4 of my exfil cases) it will not.
Avatar
Bulletproof (נתן צ'אן) 4/27/2022 4:21 PM
I see @Tcisaki -- any where else I can look for logs?
4:22 PM
Or artifacts?
Avatar
Well you can also look at items like the SRUM database (System Resource Usage) for signs of large transfers etc
4:23 PM
But file carving or memory (if the system has not been rebooted, and is fairly recent) may hold signs
Avatar
Bulletproof (נתן צ'אן) 4/27/2022 4:25 PM
Where do I look for file carving?
Avatar
You would need a full disk image, and a tool for file carving. That would hopefully be able to find any deleted files, where the data is still on the HD
Avatar
Bulletproof (נתן צ'אן) 4/27/2022 4:26 PM
Like Autopsy right?
Avatar
Autopsy can, yes.
4:28 PM
A tool like photorec can be useful too. Works very fast and you can set which file types you are interested in.
Avatar
BBRodriguez 4/27/2022 5:00 PM
Does anyone have any resources for standing up/maturing a threat hunting team? Everything I'm finding online is just "tips" from different vendors. For background: I've been a threat hunter for several years, my last year in my last org I was the team lead and I was responsible for maturing the threat hunting team. Everyone on the team had been there for several years and knew the tools and network, made it pretty easy. I'm in a new org now that is trying to mature a threat hunting capability that basically just looks for hashes they find in intel reports. I'd like to get them to the point of both anomaly detection and proactively looking for activity based on the MITRE framework. I'm trying to find resources that lay out some detailed steps and best practices to start maturing the program, without entirely re-inventing the wheel. (edited)
Avatar
I'm predy good at osint, and I do OSINT as a hobby, I'm a student in computer science in canada I was wondering if you know some companies that are looking for an internship.
Avatar
Whats the most common distro people use IN DFIR?
Avatar
Avatar
BBRodriguez
Does anyone have any resources for standing up/maturing a threat hunting team? Everything I'm finding online is just "tips" from different vendors. For background: I've been a threat hunter for several years, my last year in my last org I was the team lead and I was responsible for maturing the threat hunting team. Everyone on the team had been there for several years and knew the tools and network, made it pretty easy. I'm in a new org now that is trying to mature a threat hunting capability that basically just looks for hashes they find in intel reports. I'd like to get them to the point of both anomaly detection and proactively looking for activity based on the MITRE framework. I'm trying to find resources that lay out some detailed steps and best practices to start maturing the program, without entirely re-inventing the wheel. (edited)
You might find some resources on one of these two servers. They are more focused on Threat Hunting over there. https://discord.gg/wJDxzwAhgU https://discord.gg/jeekfH9Ghs
Avatar
There is a book called Practical Threat Intelligence and Data-Driven Threat Hunting which has a good blueprint for threat hunting teams and ops
Avatar
Avatar
SlyDaw
Whats the most common distro people use IN DFIR?
I tyhink that answer will change depending on who you ask. I used a combo of SIFT and Flare for a while. I am testing out a new one that was posted here a bit ago. https://discord.com/channels/427876741990711298/880235044873068574/962914518864891944
Avatar
Avatar
Tcisaki
I tyhink that answer will change depending on who you ask. I used a combo of SIFT and Flare for a while. I am testing out a new one that was posted here a bit ago. https://discord.com/channels/427876741990711298/880235044873068574/962914518864891944
are they primarily linux based?
Avatar
Avatar
SlyDaw
are they primarily linux based?
DeeFIR 🇦🇺 4/27/2022 6:44 PM
Flare is built on Windows, SIFT is built on Ubuntu.
Avatar
The link I posted is Windows based. Using teraform I think. It includes ALOT of tools
Avatar
The SIFT one seems to come up a lot, would that be appropriate for a beginner to use?
Avatar
I think any of them would be. Really depends on the person using it, and their comfort.
6:51 PM
For forensics, I have been enjoying the Windows ones, as there are many more tools for it. However I still use SIFT whenever I am looking at malware etc. The other benefit of the Windows ones right now, is they use WSL (Windows Subsystem for Linux) so they have basically a Linux vm inside of the Windows VM. So a bit of both worlds
Avatar
Makes sense, thanks for those
Avatar
Hi folks, is there a tool that can recover file without a disk image? I know ntfstool seems to do it, but it doesn't seem to be able to automate the collection (set a specific path and file name and then recover) via batch commands, it almost requires a completely manual process and is a bit dumb to select the ID number to recover https://github.com/thewhiteninja/ntfstool#undelete (edited)
Forensics tool for NTFS (parser, mft, bitlocker, deleted files) - GitHub - thewhiteninja/ntfstool: Forensics tool for NTFS (parser, mft, bitlocker, deleted files)
10:29 PM
😓
Avatar
Avatar
RX
Hi folks, is there a tool that can recover file without a disk image? I know ntfstool seems to do it, but it doesn't seem to be able to automate the collection (set a specific path and file name and then recover) via batch commands, it almost requires a completely manual process and is a bit dumb to select the ID number to recover https://github.com/thewhiteninja/ntfstool#undelete (edited)
randomaccess 4/27/2022 11:18 PM
If you can select the path why are you doing file carving?
Avatar
Avatar
randomaccess
If you can select the path why are you doing file carving?
sorry i dont understand, you mean?
Avatar
Avatar
RX
sorry i dont understand, you mean?
randomaccess 4/27/2022 11:51 PM
Why are you trying to carve without a disk image. What are you trying to achieve etc
Avatar
Avatar
randomaccess
Why are you trying to carve without a disk image. What are you trying to achieve etc
I am doing IR ,because the attacker deleted the critical web access log and the client's hard disk is 2TB, I want to be able to recover the file without image disk, I also have some clients from different countries that need to be processed remotely, apparently disk image is impractical and will take very much time. (And of course my customers don't want the hard disk to be imaged) (edited)
Avatar
Avatar
RX
I am doing IR ,because the attacker deleted the critical web access log and the client's hard disk is 2TB, I want to be able to recover the file without image disk, I also have some clients from different countries that need to be processed remotely, apparently disk image is impractical and will take very much time. (And of course my customers don't want the hard disk to be imaged) (edited)
randomaccess 4/28/2022 12:54 AM
Bit silly but you can run things like bulk extractor locally. You'll stomp everywhere but that's their call I guess
12:55 AM
Velociraptor can be deployed and has the ability to carve for strings and stuff but yeah. Stomping
🙏 1
Avatar
thank you very much, i will try
2:38 AM
hope its work 🙂
Avatar
DeeFIR 🇦🇺 4/28/2022 3:28 AM
@RX Can you deploy forensic tools on the host itself, and browse it? Not ideal, but can you load X-Ways on the host? FTK Imager? Literally load FTK Imager, select the source disk and see if recently deleted items have been deleted? That may be a suitable approach given the constraints (edited)
Avatar
Avatar
RX
I am doing IR ,because the attacker deleted the critical web access log and the client's hard disk is 2TB, I want to be able to recover the file without image disk, I also have some clients from different countries that need to be processed remotely, apparently disk image is impractical and will take very much time. (And of course my customers don't want the hard disk to be imaged) (edited)
physical machine or VM? Would they be open to standing up a new VM for you with an iso you provide, and attaching the disk (or a copy) to that vm? (edited)
6:18 AM
so you can do things in a read-only state
Avatar
Avatar
DeeFIR 🇦🇺
@RX Can you deploy forensic tools on the host itself, and browse it? Not ideal, but can you load X-Ways on the host? FTK Imager? Literally load FTK Imager, select the source disk and see if recently deleted items have been deleted? That may be a suitable approach given the constraints (edited)
randomaccess 4/28/2022 6:32 AM
Yeah you can go that route too if you've got the ability. We've def put xways on a USB and loaded that up to identify whether we could do data recovery
Avatar
thatboy_leo 4/28/2022 3:11 PM
Why are dictionary lists for bruteforcing passcodes not in numerical order?
Avatar
Avatar
thatboy_leo
Why are dictionary lists for bruteforcing passcodes not in numerical order?
Most popular codes at the beginning so it cracks faster?
💯 1
Avatar
Does anyone here know much about the imperva waf.. colleague is saying some customers are not getting links, but its fine for our infra team
Avatar
Avatar
FullTang
Most popular codes at the beginning so it cracks faster?
thatboy_leo 4/28/2022 5:24 PM
Thank you, I was having trouble finding an article or writing from my Google searches lol
👍 1
Avatar
Hi all - wanted to take the pulse of the community here and see what the various Digital Forensics teams have or are planning on building out for KPIs for their teams. My team is strictly DF in which we assist IR during more complex investigations on one arm and the other arm is conducting internal investigations for various internal stakeholders. Having a hard time coming up with valuable and actionable KPIs that I can either immediately implement or work towards implementing as we mature.
Avatar
Avatar
Mags42
Hi all - wanted to take the pulse of the community here and see what the various Digital Forensics teams have or are planning on building out for KPIs for their teams. My team is strictly DF in which we assist IR during more complex investigations on one arm and the other arm is conducting internal investigations for various internal stakeholders. Having a hard time coming up with valuable and actionable KPIs that I can either immediately implement or work towards implementing as we mature.
I also realize this is an extremely broad ask here. I'm simply looking for basic starter metrics that aren't your typical IR metrics like MTTR etc. Most of our investigations do not lead to any requirement of litigation, but we try to prepare as if it does go to litigation. We simply collect, process, analyze, report on whatever request is sent our way.
Avatar
Avatar
Mags42
Hi all - wanted to take the pulse of the community here and see what the various Digital Forensics teams have or are planning on building out for KPIs for their teams. My team is strictly DF in which we assist IR during more complex investigations on one arm and the other arm is conducting internal investigations for various internal stakeholders. Having a hard time coming up with valuable and actionable KPIs that I can either immediately implement or work towards implementing as we mature.
Andrew Rathbun 4/28/2022 8:06 PM
What are KPIs? That can mean different things to different people. Speaking for myself it would help to define that so I'm on the same page as you
Avatar
Avatar
Andrew Rathbun
What are KPIs? That can mean different things to different people. Speaking for myself it would help to define that so I'm on the same page as you
I’m referring to Key Performance Indicators. For example, simply saying “we handled X # of cases this month” isn’t very valuable because some cases can be open and shut, some may be extremely complex and be open for a very long time, and some may be simple but have large waiting times between points in your process due to 3rd party response lag time, amount of data being processed, etc.
Avatar
Avatar
Mags42
I’m referring to Key Performance Indicators. For example, simply saying “we handled X # of cases this month” isn’t very valuable because some cases can be open and shut, some may be extremely complex and be open for a very long time, and some may be simple but have large waiting times between points in your process due to 3rd party response lag time, amount of data being processed, etc.
Andrew Rathbun 4/28/2022 8:15 PM
KPI is way over my head but that's called "metrics" in my world in a previous life. Thank you for clarifying
Avatar
Avatar
Andrew Rathbun
KPI is way over my head but that's called "metrics" in my world in a previous life. Thank you for clarifying
Ahhh you might be right, actually. I’m getting KPI and metrics confused and was making them more interchangeable. Essentially I am looking for objective ways to measure my team’s performance on investigations.
Avatar
RandyRanderson 4/28/2022 8:35 PM
Key Performance Indicator
8:35 PM
It’s your measurement 🙂
Avatar
hello guys, I'm currently doing my assignment and i'm really stuck, so i need help :( 1. how do i know the cluster address and sector address of $MFT? 2. how to know the value of date run in $index_allocation_attribute? 3. how do i find which MFT entry contains the txt file? i have a dd file, i will share it out if you need it huge thanks for saving my life and my grades! :(
Avatar
You may still consider case load and clearance if you have a few parameters in play. For example, say you have cases that are categorized by severity based on impact/risk to an org. Depending on the severity, a team may set standards when those cases reach specific phases. For ordinary cases (priority c), intake/consultation must occur within 4 business days from day of request. Priority A cases must have an intake/consult within 24 hours of request. Then you can calculate the % of cases where intake/consultation meets the expectation for priority a or c cases. Let’s say an imaginary baseline suggests a team can achieve priority c intake standard 95% of the time. You can then assess “performance.” If a team achieves 89% for priority c cases during a single calendar year, that might suggest poor performance or there might be other influential variables. If a team meets the expectation 99% of the time, that may indicate the team is exceeding performance. The challenge with this approach is documenting it consistently and objectively. It might help if you have case management software/solution to do this. @Mags42 (edited)
👍 1
Avatar
Avatar
derekeiri
You may still consider case load and clearance if you have a few parameters in play. For example, say you have cases that are categorized by severity based on impact/risk to an org. Depending on the severity, a team may set standards when those cases reach specific phases. For ordinary cases (priority c), intake/consultation must occur within 4 business days from day of request. Priority A cases must have an intake/consult within 24 hours of request. Then you can calculate the % of cases where intake/consultation meets the expectation for priority a or c cases. Let’s say an imaginary baseline suggests a team can achieve priority c intake standard 95% of the time. You can then assess “performance.” If a team achieves 89% for priority c cases during a single calendar year, that might suggest poor performance or there might be other influential variables. If a team meets the expectation 99% of the time, that may indicate the team is exceeding performance. The challenge with this approach is documenting it consistently and objectively. It might help if you have case management software/solution to do this. @Mags42 (edited)
Another idea is to have the team members count the # of training hours (staying current), then tier performance from that, as appropriate.
Avatar
filosofos#1337 4/29/2022 2:36 AM
Hello everyone! My name is George Ioannou and I am a research fellow at Brunel University, London. We are doing research on bringing together Explainable AI with Cyber Incident Response to create an agent that will work as a team with experts as well as novices. We are currently running a small exercise in the form of a survey for training the underlying model which is based on the NIST framework for incident response. The survey can be found in https://brunel.onlinesurveys.ac.uk/xaicsa-questionnaire and is completely anonymous. Your contribution would be very vital to our work. I hope you enjoy the survey and please do not hesitate to post any feedback! Salute Salute Salute Salute
Avatar
Avatar
bc
hello guys, I'm currently doing my assignment and i'm really stuck, so i need help :( 1. how do i know the cluster address and sector address of $MFT? 2. how to know the value of date run in $index_allocation_attribute? 3. how do i find which MFT entry contains the txt file? i have a dd file, i will share it out if you need it huge thanks for saving my life and my grades! :(
Andrew Rathbun 4/29/2022 5:02 AM
Avatar
thanks! i'l have a look
5:03 AM
do u mind telling me where is $index_allocation_attribute tho
5:03 AM
i couldnt find it in my codes
Avatar
Avatar
FullTang
You might find some resources on one of these two servers. They are more focused on Threat Hunting over there. https://discord.gg/wJDxzwAhgU https://discord.gg/jeekfH9Ghs
BBRodriguez 4/29/2022 5:31 AM
Thanks @FullTang I’ll take a look!
👍 1
Avatar
Andrew Rathbun 4/29/2022 7:22 AM
@bc try using active disk editor on your own system to figure that out
Avatar
is it for linux?
7:23 AM
because im doing in linux (edited)
Avatar
Avatar
RandyRanderson
Key Performance Indicator
randomaccess 4/29/2022 7:24 AM
Ugh I missed this. @randys KPI. Is number of courses taken divided by 10 plus number of simultaneous projects
Avatar
question about O365 audit log exports: the web interface seems to be pretty unstable at times. sometimes it has good times and sometimes bad in a sense of throwing errors that the export takes too long even if you do it for a pretty little timeframe (e. g. logs for a particular user only covering like 4 hours). doing the export via powershell is more reliable in that regards but when comparing the logs you get via powershell and the logs via the webinterface (IF it actually runs through) the powershell ones contain tons of redundant rows with one event sometimes covering a lot of rows (also if you adjust the rows to match the one of the web interface and dedupe its basically the same as of the web interface). anyone knows how it is possible to already get rid of those redundant entries at the export phase? yeah I could run some operations on the created csv once the export completely ends. but due to the redundancy the files getting much bigger than they actually have to be. running some test cases basically using the following script https://docs.microsoft.com/en-us/microsoft-365/compliance/audit-log-search-script?view=o365-worldwide and comparing the results with similar textcases exported via the web interface.
Use a PowerShell script that runs the Search-UnifiedAuditLog cmdlet in Exchange Online to search the audit log. This script is optimized to return a large set of audit records each time you run it. The script exports these records to a CSV file that you can view or transform using Power Query in Excel.
Avatar
Hello guys. I have mission to unlock Apple iPhone X. Not known what version is running on it. How to unlock the phone without losing data. Help me guys.
9:56 PM
I am using Cellebrite4PC.
Avatar
Avatar
Magneto
Hello guys. I have mission to unlock Apple iPhone X. Not known what version is running on it. How to unlock the phone without losing data. Help me guys.
Andrew Rathbun 4/30/2022 4:42 AM
#mobile-forensic-extractions
Avatar
Hello everyone. Is it possible to find the identity of an Instagram account that was deleted 2 months ago? If yes, how ? How long does Instagram keep data?
Avatar
If the account is actually deleted and not deactivated or simply renamed, probably not? You’d have to try and ask them unless someone here knows the answer. They make it tough to delete though. Your suspect (if you have one) may still have the confirmation emails in their account. (edited)
Avatar
the account has been deleted
9:19 AM
instagram not responding
Avatar
Ah I see you’re private sector. Not sure how you’d go about it, I would send a subpoena.
Avatar
Andrew Rathbun 4/30/2022 12:22 PM
^^ Perfect example of why we have roles to help provide important context in everyday conversation 👍 (edited)
Avatar
Avatar
whee30
Ah I see you’re private sector. Not sure how you’d go about it, I would send a subpoena.
i am freelance also
Avatar
is there a name for this type of table?
12:28 PM
whats "unique" is the binary yes no answers
Avatar
matrix?
this 1
Avatar
Karl (karsil) 5/2/2022 6:43 AM
@Magnet Forensics Axiom Process won't start, stuck on the loading screen, tried reinstalling the program without any success. Any tips on how to fix it.
Avatar
Avatar
Karl (karsil)
@Magnet Forensics Axiom Process won't start, stuck on the loading screen, tried reinstalling the program without any success. Any tips on how to fix it.
Do you have logging turned on? If so you can send me your crash logs and I can look over them to see what the issue is
Avatar
Avatar
rayeh
matrix?
yes lmao thank you.
tipshat 1
Avatar
We have a new Cellebrite CTF starting soon : ) Standby for details 😄 🕵WatchingYou
👀 9
👍 2
🔥 1
Avatar
@Cellebrite - I have noticed this line in the trace window... "Your CPU is not compatible with our media classification engines. Processing time will take much longer."
5:23 PM
I have the GPU support installed and I don't recall seeing this before. Is this a new thing?
Avatar
Avatar
whee30
@Cellebrite - I have noticed this line in the trace window... "Your CPU is not compatible with our media classification engines. Processing time will take much longer."
Let me check this. I recall seeing something about this recently. Ill get back to you. Which ver are you using ? (edited)
Avatar
Does anyone know a script or tool that will convert a CSV file containing time/sender/receiver/text into a WhatsApp template pdf or sms styled template. Like for each entry in the CSV file produce a little text message box similar to what cellebrite/axiom produces
Avatar
Avatar
ccbdub
Does anyone know a script or tool that will convert a CSV file containing time/sender/receiver/text into a WhatsApp template pdf or sms styled template. Like for each entry in the CSV file produce a little text message box similar to what cellebrite/axiom produces
Mel_Hungate 5/3/2022 8:42 AM
I'll add a feature request for us to support this in AXIOM via custom artifacts. Curious which app the csv file has come from to begin with, since perhaps it's one we should be supporting to begin with?
Avatar
@Mel_Hungate thanks very much for the response, it's an SQL dump that I've converted to CSV for investigators. They now want it prepared for court and I think showing the messages as they would appear on device is preferable. It's not something we got from device
Avatar
Avatar
ccbdub
@Mel_Hungate thanks very much for the response, it's an SQL dump that I've converted to CSV for investigators. They now want it prepared for court and I think showing the messages as they would appear on device is preferable. It's not something we got from device
Deleted User 5/3/2022 10:15 AM
This free Magnet tool might be helpful for how you want to present evidence: https://www.magnetforensics.com/resources/magnet-app-simulator/
MAGNET App Simulator: What Does it Do? MAGNET App Simulator lets you load application data from Android devices in your…
Avatar
@Deleted User thanks I'll take a look like I say these messages aren't from a device there from server side so I've a dump of db, then I went from SQL to csv
10:18 AM
A script that produced html bubbles like axiom does for Whatsapp etc.. would be ideal
Avatar
caroline_l 5/3/2022 9:53 PM
Hello, anyone here work on insider threats / internal investigations? Working to formalize a program at my org and looking for resources. I have checked out the MITRE KB and also the guide from CISA.
Avatar
Avatar
caroline_l
Hello, anyone here work on insider threats / internal investigations? Working to formalize a program at my org and looking for resources. I have checked out the MITRE KB and also the guide from CISA.
Andrew Rathbun 5/4/2022 2:27 AM
What kind of resources are you looking for? I don't think CISA and MITRE would really apply to those types of cases, right? I think of insider threat as more like employee who is about to be fired steals confidential files before they leave, not so much deploying malware/ransomware, but I suppose those could be internal jobs as well 🤷‍♂️ I guess it depends on the type of cases you perceive insider threats to be which would then determine what kind of resources you're looking for
Avatar
ApexPredator 5/4/2022 3:09 AM
Ransomeware gangs have tried to pay employees to install ransomeware on their corporate networks to get there foothold in the past. And it’s one of the oldest TTPs for nation state actors to pay or blackmail someone on the inside to get access so I would still look at those on a insider threat program. A mature insider threat program also needs to protect all aspects of the organization and not just the digital assists or assets threatened by network attacks. While our piece in it does revolve around network and host based detection methods it needs to look at low of the threats to the organization that could be detect from a users network behavior and chat/email conversations.
3:13 AM
You need to start with policy that is enforceable by the organizational leadership and then build technical controls around that. If there isn’t leadership buy in to take action then the detection tools don’t help that much other than let you know something will happen and you can’t do anything about it. User Activity Monitoring tools are also very invasive and can have privacy concerns so you need policy, consent to monitor, and acceptable use agreements for employees to sign to make it all legal. If the organization has a legal team they should be invoked in the process as a stakeholder to make sure everything is covered from a legal aspect. (edited)
👍 1
Avatar
Avatar
caroline_l
Hello, anyone here work on insider threats / internal investigations? Working to formalize a program at my org and looking for resources. I have checked out the MITRE KB and also the guide from CISA.
Some more resources here as well https://www.sei.cmu.edu/our-work/insider-threat/
The SEI conducts research, modeling, analysis, and outreach to develop data-driven, socio-technical solutions that help organizations reduce the impact and likelihood of insider threats.
👍 1
Avatar
caroline_l 5/4/2022 1:31 PM
Thank you @ApexPredator and @tklane
1:32 PM
@Andrew Rathbun CISA actually has a guide specific for Insider Threats and MITRE has developed an Insider Threat TTP knowledge base for it.
1:38 PM
We already have a lot things in place in terms of leadership/legal/privacy etc. just trying to formalize more.
1:39 PM
Written by Adam Hlavek, Shelley Folk, Suneel Sundar, and Jon Baker.
Avatar
Once upon a time I had seen a website with a huge pie chart showing the logos and names of a bunch of categorized social media services, it was DFIR/OSINT related but basically it just named and categorized a ton of services. Anyone have a clue? My Google-fu is failing.
Avatar
Avatar
caroline_l
Hello, anyone here work on insider threats / internal investigations? Working to formalize a program at my org and looking for resources. I have checked out the MITRE KB and also the guide from CISA.
Hi Caroline, I work in insider threats. Not so much from the strategic program point of view, but as an investigator. If there's anything I can help with, shoot me a PM.
👍 1
Avatar
Avatar
whee30
Once upon a time I had seen a website with a huge pie chart showing the logos and names of a bunch of categorized social media services, it was DFIR/OSINT related but basically it just named and categorized a ton of services. Anyone have a clue? My Google-fu is failing.
Digitalferret 5/5/2022 2:52 AM
👍 1
2:54 AM
and multiple renditions using different graphics https://jess3.com/projects/brian-solis-conversation-prism-v5/ (looks like they used the prism to show off their design service tho) (edited)
Avatar
@Magnet Forensics I am attempting to access your magnetidealab.com site for the chromebook acquisition assistant and its blocking my IP on mobile and hotspot. Do you have a direct download available?
Avatar
Hello Ricardo, if you could DM me your IP address I can whitelist it for you (edited)
Avatar
RyanAllegra 5/5/2022 6:21 AM
Hi, I'm working on documentation for a company. We wanted to go over all the different topics where DF might come up. I was writing an article on printer forensics. So far we have documentation on SPL file and EMF files, as well as some registry keys. Does anyone know any other files we should add?
Avatar
Question for those archiving evidence and case files after case closure, what are your standard processes for keeping these files? And are they secured on an encrypted drive or share? Do you use physical locks like a safe or something?
Avatar
Avatar
Digitalferret
That’s the one! Thank you, I forgot to bookmark last time I saw it.
👍🏻 1
Avatar
Avatar
stark4n6
Question for those archiving evidence and case files after case closure, what are your standard processes for keeping these files? And are they secured on an encrypted drive or share? Do you use physical locks like a safe or something?
My prior agency had a workflow that went like this: CURRENT YEAR CASES U:/Workspace/Task Force Agency/Examiner (Current year cases stored on local lab server but backed up to off-site mirror) PRIOR 5 YEAR CASES U:/Archive/2021/TFA/Examiner (prior 5 year cases stored on main agency servers but backed up to off-site mirror) BEYOND 5 YEAR CASES Offsite Tape Vaulting (Iron Mountain or similar) Statutory storage minimum requirements also come into play depending on the type of case (Homicide, Sexual Assault, Property Crimes etc)
🙏 1
👍 1
Avatar
Avatar
Tim F
My prior agency had a workflow that went like this: CURRENT YEAR CASES U:/Workspace/Task Force Agency/Examiner (Current year cases stored on local lab server but backed up to off-site mirror) PRIOR 5 YEAR CASES U:/Archive/2021/TFA/Examiner (prior 5 year cases stored on main agency servers but backed up to off-site mirror) BEYOND 5 YEAR CASES Offsite Tape Vaulting (Iron Mountain or similar) Statutory storage minimum requirements also come into play depending on the type of case (Homicide, Sexual Assault, Property Crimes etc)
thanks for the reference, looking more from a corporate side but still great info
👍 1
Avatar
trickyricky 5/5/2022 6:38 PM
S3 Glacier Archive works well and is fairly cheap for long term
Avatar
Check your company's policy regarding PII and the cloud tho 🙂
Avatar
Hi! I am currently performing an investigation with help of 365 audit logs. something that I noticed when looking at the details field are all the app IDs. I was wondering if it is possible to perform a mapping of app IDs to a friendly name. I managed to resolve some of them by checking enabled applications (PS: Get-App and Get-AzureADApplication) but still see many "blanks" that I cannot resolve. I also found a few lists of standard App-IDs. Sadly the microsoft documentation seems to not leave too many words about the different app IDs used in the audit logs (applicationID, appID, clientappID, application, ...) that would help in my search. But maybe someone did already a lot with them and can maybe help with some additional references.
Avatar
Avatar
.yuzumi.
Hi! I am currently performing an investigation with help of 365 audit logs. something that I noticed when looking at the details field are all the app IDs. I was wondering if it is possible to perform a mapping of app IDs to a friendly name. I managed to resolve some of them by checking enabled applications (PS: Get-App and Get-AzureADApplication) but still see many "blanks" that I cannot resolve. I also found a few lists of standard App-IDs. Sadly the microsoft documentation seems to not leave too many words about the different app IDs used in the audit logs (applicationID, appID, clientappID, application, ...) that would help in my search. But maybe someone did already a lot with them and can maybe help with some additional references.
We're in our infancy with the product so I'd be interested to see a mapping as well
Avatar
attackd0gz 5/6/2022 7:35 AM
@Cellebrite tried a couple times to get in touch with someone in sales with some questions I have about capabilities through the contact form to no avail. Can anyone PM me or point me in the right direction please? Thank you!
Avatar
Hey
7:35 AM
send me a dm and I can it moving.
👍 1
Avatar
Avatar
RyanAllegra
Hi, I'm working on documentation for a company. We wanted to go over all the different topics where DF might come up. I was writing an article on printer forensics. So far we have documentation on SPL file and EMF files, as well as some registry keys. Does anyone know any other files we should add?
RyanAllegra 5/6/2022 8:59 AM
Going to bump this- just wanted to make sure I have all the artifacts
Avatar
Avatar
RyanAllegra
Going to bump this- just wanted to make sure I have all the artifacts
When you say printers, does that include drivers?
Avatar
Avatar
Matt
When you say printers, does that include drivers?
RyanAllegra 5/6/2022 10:03 AM
Sure-- although I am not familiar on how you would go about doing that.
Avatar
I was thinking purely from a “which printers might the user have used” perspective. I’ve not really come across printer drivers in DF but thought it might be worth throwing the idea in…
Avatar
randomaccess 5/7/2022 12:19 AM
I've seen people use a file system timeline to infer printer usage but not much is logged as far as I can see about printing on windows
Avatar
if you have internal network netflow, or edr, network connections by process or port might be useful to detect/audit printing activity
Avatar
can anyone give me two good analysis tools to conduct a malware analysis? (edited)
Avatar
beansidebean2020 5/9/2022 7:23 AM
Hi all. Has anyone had any luck with a Samsung A03s MTK 6765 android OS 11? Not having much luck with UFED or XRY
Avatar
SPVQct3207 5/9/2022 7:39 AM
Hi! Is there a way to make the links (web history) in a PDF Cellebrite report not clickable ? I have looked in the settings and I can't find anything. Thanks @Cellebrite
Avatar
Avatar
bc
can anyone give me two good analysis tools to conduct a malware analysis? (edited)
any part of malware analysis in particular? Take a peek at the tools deployed with flare vm
Avatar
Avatar
bc
can anyone give me two good analysis tools to conduct a malware analysis? (edited)
Good morning! Axiom is an extremely powerful tool for analyzing malware/memory. Check out our high level view video's about Axiom's capabilities here:https://www.magnetforensics.com/resources/axiom-at-work-malware-investigations/
❤️ 2
Avatar
marketloser 5/9/2022 1:10 PM
Hey, I'm having an issue with AXIOM. Creating a HTML report and it has videos. The report itself has a picture of the video in the 10 photo preview format, but there is no hyperlink to actually click and see the video. The video is in the attachments folder but it's not accessible from the HTML. This will be for court and I don't want to confuse the DA :). @Magnet Forensics
Avatar
For those of you who need to keep multiple mobile devices on power and organized, what are you using? I'm considering a simple file organizer for the envelopes they're kept in with a long powerstrip mounted next to it. Getting them off of the desk seems like a nice space saving step.
1:22 PM
something like this... I'm sure there are all in one solutions somewhere
Avatar
Avatar
whee30
For those of you who need to keep multiple mobile devices on power and organized, what are you using? I'm considering a simple file organizer for the envelopes they're kept in with a long powerstrip mounted next to it. Getting them off of the desk seems like a nice space saving step.
Mel_Hungate 5/9/2022 1:27 PM
I think you're looking for a multi device charging station like so: https://www.amazon.ca/Charging-Compatible-Multiple-Simultaneously-Upgraded/dp/B072BXXWDW?th=1
Desktop USB Fast Charging Station Charges up to 10 USB devices simultaneously with 1 power supply. 11 baffles allow you to divide the area up to match your devices, holding a large number of gadgets. It is an ideal solution for you to charge all your power-hungry devices easily. It's suitable for...
Avatar
Avatar
marketloser
Hey, I'm having an issue with AXIOM. Creating a HTML report and it has videos. The report itself has a picture of the video in the 10 photo preview format, but there is no hyperlink to actually click and see the video. The video is in the attachments folder but it's not accessible from the HTML. This will be for court and I don't want to confuse the DA :). @Magnet Forensics
Hey @marketloser , When you're in the process of creating the HTML Report, there is a check box titled "Make External Links Clickable" when you're within the wizard itself (See Screen Shot). Once you check that box, navigate to the HTML Report, and when you scroll to the right, you should see the hyperlink that points to the file in the HTML Report folder structure. Let me know if this solves the issue!
Avatar
So fancy and purpose built... I like it
😄 1
Avatar
Avatar
whee30
So fancy and purpose built... I like it
CLB-dan.techcrime 5/9/2022 1:53 PM
This is what we use in our global CAS labs: https://ipadcarts.com/rack-mounts/
Healthcare Rack Mount Solutions Mobile Device Managers and UniDock For the large scale storage, security and management of mobile devices, Datamation Systems has developed a 19″ rack mount system that is perfect for applications in healthcare, retail and hospitality
👀 2
Avatar
Avatar
Tim F
Hey @marketloser , When you're in the process of creating the HTML Report, there is a check box titled "Make External Links Clickable" when you're within the wizard itself (See Screen Shot). Once you check that box, navigate to the HTML Report, and when you scroll to the right, you should see the hyperlink that points to the file in the HTML Report folder structure. Let me know if this solves the issue!
marketloser 5/9/2022 2:32 PM
Thanks @Tim F , Apparently you cant do it from a portable case though, only through an actual case.
Avatar
Deleted User 5/9/2022 3:31 PM
Anyone recommend a PDF password remover?
Avatar
Avatar
marketloser
Thanks @Tim F , Apparently you cant do it from a portable case though, only through an actual case.
Ok thanks for letting me know!
Avatar
Avatar
bc
can anyone give me two good analysis tools to conduct a malware analysis? (edited)
Ghidra, Ida
6:48 PM
If you can’t afford Ida , next would be Binary Ninja 🙂
Avatar
hello all, can anyone tell me the difference between hard disk forensics and memory forensics?🙇🏻‍♂️
Avatar
Avatar
whee30
something like this... I'm sure there are all in one solutions somewhere
Our lab uses, a laptop charging cart that looks similar to this
Avatar
Avatar
whee30
something like this... I'm sure there are all in one solutions somewhere
👍 1
Avatar
Avatar
bc
hello all, can anyone tell me the difference between hard disk forensics and memory forensics?🙇🏻‍♂️
randomaccess 5/10/2022 4:05 AM
One is analysing data stored on a hard disk. Generally less volatile One is analysing data stored in memory. Generally more volatile
4:07 AM
But, I don't know if that's answering your question
Avatar
Avatar
randomaccess
One is analysing data stored on a hard disk. Generally less volatile One is analysing data stored in memory. Generally more volatile
thank you, i'll try to understand more online
Avatar
anyone in here have a background with Hikvision NVR's?
Avatar
Avatar
GrayTech
anyone in here have a background with Hikvision NVR's?
Digitalferret 5/10/2022 11:19 AM
maybe echo in #dvr-multimedia-surveillance
Avatar
Avatar
Deleted User
Anyone recommend a PDF password remover?
Deleted User 5/10/2022 12:09 PM
Have not come across any but Hashcat may be able to crack it.
12:11 PM
@Deleted User thanks! We have Passware running agains it, just thought if I can remove it saves us the time...not evidence or anything
Salute 1
Avatar
Avatar
Deleted User
@Deleted User thanks! We have Passware running agains it, just thought if I can remove it saves us the time...not evidence or anything
thatboy_leo 5/10/2022 12:19 PM
I’ve had good success with Passware for password protected word documents in past cases.
Avatar
Deleted User 5/10/2022 5:23 PM
How do I get into cyber forensics
Avatar
Read books, study hard, learn lots of cool stuff.
Avatar
Avatar
Deleted User
How do I get into cyber forensics
Digitalferret 5/11/2022 12:05 AM
and once you've done that, go buy some old drives from ebay or such ... grab some FOSS or trial s/w, see what you can find (check your country legals first) and be damn quiet about anything you do find 🙂 that's the data recovery part. if that "floats your boat" then start looking at what Law requires you do and how you do it. (edited)
Avatar
Deleted User 5/11/2022 12:07 AM
Oh cool thanks so much!!!!
Avatar
Also checkout some CTFs
12:07 AM
BTOL is great
Avatar
Deleted User 5/11/2022 12:07 AM
Will do, thank you!!!
12:08 AM
Hack the box also has a forensics section
12:08 AM
Maybe to wet your whistle
12:08 AM
😬
12:09 AM
A gamified platform for cyber defenders to test and showcase their skills
12:10 AM
From beginners to experts, this is where hackers level up! Join today and learn how to hack.
12:10 AM
There is also INE and Packt has some great content
12:10 AM
Packt is the cheaper option
Avatar
Digitalferret 5/11/2022 12:13 AM
@Deleted User now look, you've set Ry off 🙂 but that's the level of excitement you need to carry a career in this. being an incurable nosey bast*** helps too 😁 (edited)
12:14 AM
I’m supposed to be sleeping but wifey snores like a wilderbeast and guess who forgot to buy earplugs xD
12:15 AM
Heading to Home Depot in the Morning that’s for sure 😬
Avatar
Deleted User 5/11/2022 12:17 AM
Lol
12:18 AM
I’m also supposed to be sleeping but oh well, I’ve got the entire day to now that I’m on summer break for college
Avatar
Excellent! Perfect time to jump into some of those platforms
Avatar
Deleted User 5/11/2022 12:20 AM
Yes!!!
Avatar
Digitalferret 5/11/2022 12:21 AM
😄 2
Avatar
Avatar
ryd3v
I’m supposed to be sleeping but wifey snores like a wilderbeast and guess who forgot to buy earplugs xD
Digitalferret 5/11/2022 12:22 AM
Dear Mrs Ry, so, your husband tells us.....
Avatar
Deleted User 5/11/2022 12:23 AM
Lmao
Avatar
Busted bahahahaha
Avatar
Digitalferret 5/11/2022 12:39 AM
of course mine does no such <cough> thing. <cough> at all <cough> .
Avatar
The National Institute of Standards and Technology (NIST) has published Digital Investigation Techniques: A NIST Scientific Foundation Review. This draft report, which will be open for public comment for 60 days, reviews the methods that digital forensic experts use to analyze evidence from computers, mobile phones and other electronic devices. https://www.nist.gov/news-events/news/2022/05/nist-publishes-review-digital-forensic-methods
Report documents the scientific foundations of digital evidence examination and recommends ways to advance the field.
👍 1
Avatar
Avatar
Deleted User
How do I get into cyber forensics
Check out my page, lots to get you going https://startme.stark4n6.com
A startpage with online resources about Forensics, created by Stark 4N6.
Avatar
@Law Enforcement [UK] Afternoon all, have any UK LEA's come away from mass used mobile extraction kiosks?...or are kiosks in operation in your agency that are used by a large number of officers? Would you mind DM'ing me please 🙂
Avatar
Avatar
ApC
@Law Enforcement [UK] Afternoon all, have any UK LEA's come away from mass used mobile extraction kiosks?...or are kiosks in operation in your agency that are used by a large number of officers? Would you mind DM'ing me please 🙂
MrTurdTastic 5/11/2022 5:38 AM
I'm unsure of the question, are you asking which Kiosks we use for routine data extraction?
Avatar
Avatar
stark4n6
Check out my page, lots to get you going https://startme.stark4n6.com
Deleted User 5/11/2022 5:40 AM
Cool thank you!!
👍 1
Avatar
Anyone got a good tool for opening and modifying large (>1GB) JSON files? Notepad++ is not up to the task
Avatar
Avatar
Lewis
Anyone got a good tool for opening and modifying large (>1GB) JSON files? Notepad++ is not up to the task
Try sublime text
Avatar
Avatar
Lewis
Anyone got a good tool for opening and modifying large (>1GB) JSON files? Notepad++ is not up to the task
yoiminfashion 5/11/2022 6:23 AM
Try VIM
Avatar
Dr. Kaan Gündüz 5/11/2022 6:25 AM
splitting the json files could be an option
6:30 AM
Notepad++ Plugin for reading large files. Contribute to superolmo/BigFiles development by creating an account on GitHub.
Avatar
Avatar
Lewis
Anyone got a good tool for opening and modifying large (>1GB) JSON files? Notepad++ is not up to the task
Vscode
Avatar
Avatar
Lewis
Anyone got a good tool for opening and modifying large (>1GB) JSON files? Notepad++ is not up to the task
Digitalferret 5/11/2022 8:45 AM
maybe try the demo of EditPadPro : Edit huge files without breaking a sweat, including files larger than 4 GB, even if your PC only has a few GB of RAM. Also, the maximum length of a single line is not limited, which is a problem with many editors claiming to support “unlimited” file sizes. https://www.editpadpro.com/editpadpro.html
👍 1
Avatar
Avatar
Digitalferret
maybe try the demo of EditPadPro : Edit huge files without breaking a sweat, including files larger than 4 GB, even if your PC only has a few GB of RAM. Also, the maximum length of a single line is not limited, which is a problem with many editors claiming to support “unlimited” file sizes. https://www.editpadpro.com/editpadpro.html
Andrew Rathbun 5/11/2022 10:40 AM
EditPad Pro is the truth. Use it everyday. For JSON, UltraEdit is already great. There's a really nice JSON and XML manager which helps deal with those structured data types
Avatar
Anyone dealing with the BPFdoor malware?
Avatar
kmacdonald1565 5/11/2022 1:02 PM
Hey everyone, just wanted to know what you all think system specs should be for a cell-phone forensics specific workstation. Generally going to be primarily a machine for Cellebrite PA as most of our phones are done through this, but it is entirely possible for additional software.... Our current machine is 6+ years old and obviously a lot has changed over the last few years. It still does the job, but hopefully we can get something that will decode extractions a little faster since phones are getting bigger. basically looking for i7vsi9vsxeon sort of thing (obviously AMD is acceptable too). we know generally more ram is just better. video card worth it in a machine like this (does it support GPU accelerated processing, decoding, or loading of visuals/thumbnails/videos)? prebuilt from dell, hp, etc. or spec out parts (which is less desirable)? I tried finding general specs of forensic machines that Cellebrite offers but they are general "up to 128 gb of ram" type specs. and could not find what PA recommends, but did message @Cellebrite . Also, I am not sure if this is a "me issue" or whats happening but the form on the forensic workstation page does not load:
1:02 PM
Avatar
Avatar
kmacdonald1565
Hey everyone, just wanted to know what you all think system specs should be for a cell-phone forensics specific workstation. Generally going to be primarily a machine for Cellebrite PA as most of our phones are done through this, but it is entirely possible for additional software.... Our current machine is 6+ years old and obviously a lot has changed over the last few years. It still does the job, but hopefully we can get something that will decode extractions a little faster since phones are getting bigger. basically looking for i7vsi9vsxeon sort of thing (obviously AMD is acceptable too). we know generally more ram is just better. video card worth it in a machine like this (does it support GPU accelerated processing, decoding, or loading of visuals/thumbnails/videos)? prebuilt from dell, hp, etc. or spec out parts (which is less desirable)? I tried finding general specs of forensic machines that Cellebrite offers but they are general "up to 128 gb of ram" type specs. and could not find what PA recommends, but did message @Cellebrite . Also, I am not sure if this is a "me issue" or whats happening but the form on the forensic workstation page does not load:
Andrew Rathbun 5/11/2022 1:20 PM
128 GB of ram, then allocate enough of that RAM to a RAM disk, throw your .bin or whatever on there, parse it out at wrap speed* and then analyze off the RAM Disk 🙂 *this claim is purely theoretical and has not been tested, please do try out at home and let me know how it goes
Avatar
kmacdonald1565 5/11/2022 1:24 PM
Lol
Avatar
Andrew Rathbun 5/11/2022 1:25 PM
Joking but not joking at the same time. Benchmarks don't lie. That'll just make it goes as fast as whatever you next bottleneck is, which definitely won't be your I/O speed from the RAM (edited)
Avatar
So I have a friend in the Ukraine helping out, and they are using Drones (not military drones) just standard ones used for recon. does anyone here have any good ideas on OPSEC with regards to using these drones? Like OPSEC for poiloting drones, as they will be using that for supply runs and security, QRF and extractions. Artiterllery can be directed to RTH and controller posoitions so he will be securing those drones and training those guys and plug them into an aerial threat intel feed. Is anyone here good with drone security? As these drones are going to be flown on the frontline and my friend needs to make sure its as secure as possible. I understand these drones communicate over unencrypted radio frquencies, and there is no detecting and jammingcapabilities out there. Does anyone know of any implementable countermeasures i.e anti jamming and detection avoidance mechnaisms that could be integrated into the drone?Or any other hardening capabailities?Also in terms of DJI or any other commercial drone vendor obtaining real time GPS and usage data etc I suppose using a device with no SIM and never connecting it to any network for an uplink should mitigate that factor as RF is limited with its reach. seperatly, in terms of cellular opsec, can a foreign phone be used with a foreign SIM?or can the IMEI number and any other device ID's be correlated and idenitified as a foreign device? Or is it just the foreign SIM itself? Im unsure how these may be detected, either infiltration to Ukraines cellular/network porivider or with stingrays/dirtboxes. Im unsure what data stingrays or dirt boxes pull or how that equipment works but all i know is that russia has been directing strikes and artilerry to foreign phone locations.
2:34 PM
my friend is guessing getting a burner phone is probably the best idea. So what are peoples thoughts? Is anyone here good with cellular security/drone security?
Avatar
Paint it black
6:53 PM
Disconnect leds
6:54 PM
Sorry I’m out of ideas as it’s a public product xD
6:55 PM
Everything your asking is basically upgrading it to reaper ,
6:56 PM
But when I get to my pc I’ll break that up into paragraphs and see if I get any ideas
Avatar
Avatar
Andrew Rathbun
128 GB of ram, then allocate enough of that RAM to a RAM disk, throw your .bin or whatever on there, parse it out at wrap speed* and then analyze off the RAM Disk 🙂 *this claim is purely theoretical and has not been tested, please do try out at home and let me know how it goes
Does PA really benefit from 128GB RAM? I’ve rarely seen it eat that much. We’ve just received some i9-12900k machines. Currently 64GB but could look to put more in if it could be justified
Avatar
Avatar
busted4n6
Does PA really benefit from 128GB RAM? I’ve rarely seen it eat that much. We’ve just received some i9-12900k machines. Currently 64GB but could look to put more in if it could be justified
He's not saying 128GB is needed for PA. He's saying have that much RAM so that you can create a RAM disk to process phone extractions from.
👆 1
Avatar
Can anyone from @MSAB spare some time to chat?
Avatar
Avatar
AmNe5iA
He's not saying 128GB is needed for PA. He's saying have that much RAM so that you can create a RAM disk to process phone extractions from.
Ahhhhh. Rtfm. That’s a good idea which we can try
Avatar
Avatar
busted4n6
Does PA really benefit from 128GB RAM? I’ve rarely seen it eat that much. We’ve just received some i9-12900k machines. Currently 64GB but could look to put more in if it could be justified
facelessg00n 5/12/2022 3:45 AM
I have 64GB and it hardly uses that, unless you get greedy and simultaneously have 5x or so PA instances decoding.... The biggest RAM hogs seem to be things like AXIOM etc when they are unpacking stuff. (edited)
Avatar
Avatar
kmacdonald1565
Hey everyone, just wanted to know what you all think system specs should be for a cell-phone forensics specific workstation. Generally going to be primarily a machine for Cellebrite PA as most of our phones are done through this, but it is entirely possible for additional software.... Our current machine is 6+ years old and obviously a lot has changed over the last few years. It still does the job, but hopefully we can get something that will decode extractions a little faster since phones are getting bigger. basically looking for i7vsi9vsxeon sort of thing (obviously AMD is acceptable too). we know generally more ram is just better. video card worth it in a machine like this (does it support GPU accelerated processing, decoding, or loading of visuals/thumbnails/videos)? prebuilt from dell, hp, etc. or spec out parts (which is less desirable)? I tried finding general specs of forensic machines that Cellebrite offers but they are general "up to 128 gb of ram" type specs. and could not find what PA recommends, but did message @Cellebrite . Also, I am not sure if this is a "me issue" or whats happening but the form on the forensic workstation page does not load:
facelessg00n 5/12/2022 3:59 AM
I would recommend against Dell / HP . Their off the shelf solutions are pretty hard to spec appropriately for DF work and you don't get much for your money. They also use weird proprietary parts. I would build your own or use a local vendor that can build you an appropriate machine with warranty. For example we use places like Metabox for our laptop builds. Get as much SSD as you can afford as storage is usually the bottleneck.
Avatar
Avatar
AdamB
Can anyone from @MSAB spare some time to chat?
Could do, what’s up?
Avatar
Avatar
busted4n6
Does PA really benefit from 128GB RAM? I’ve rarely seen it eat that much. We’ve just received some i9-12900k machines. Currently 64GB but could look to put more in if it could be justified
Andrew Rathbun 5/12/2022 5:08 AM
I haven't used PA in 3 years so 🤷‍♂️ I didn't know about RAM disks back then but I do now yet I have no ability to test it on that specific software. Sorry!
5:12 AM
If you want to reduce I/O bottlenecks, get a large NVMe M.2 for your processing drive (and ideally OS drive). I think plenty of models of motherboards have 2x or more M.2 slots. If you look at the benchmarks for NVMe vs SATA, it's quite a difference. This speed chart gives you the general idea even though you could probably find more professionally tested benchmarks elsewhere.
Avatar
Avatar
Erumaro
Could do, what’s up?
Thanks Tobias, I have sent you a message
👍 1
Avatar
Avatar
busted4n6
Does PA really benefit from 128GB RAM? I’ve rarely seen it eat that much. We’ve just received some i9-12900k machines. Currently 64GB but could look to put more in if it could be justified
ScottKjr3347 5/12/2022 8:11 AM
In my opinion, yes having the RAM does help prevent crashing, but when the new version of PA is released, you shouldn’t need to max out the RAM.
Avatar
Avatar
ScottKjr3347
In my opinion, yes having the RAM does help prevent crashing, but when the new version of PA is released, you shouldn’t need to max out the RAM.
chrisforensic 5/12/2022 8:57 AM
so the new pa will not put as much strain on the ram memory? do you know if PA 8.0 will released this month? (edited)
Avatar
Avatar
chrisforensic
so the new pa will not put as much strain on the ram memory? do you know if PA 8.0 will released this month? (edited)
ScottKjr3347 5/12/2022 9:09 AM
It still requires RAM but isn’t a hog like the current version. I would still recommend getting as much ram as possible, but just wanted to mention it’s not as bad on the new version. I have no idea of the release date.
Avatar
@kmacdonald1565 when looking at a new forensic machine, search this forum for issues with Intel Processors and the time it takes to process Android records vs AMD Threadripper's.
Avatar
Anybody recognize this SIM card carrier? Orange on the back.
Avatar
Avatar
Cole
Anybody recognize this SIM card carrier? Orange on the back.
T-mobile possibly?
Avatar
Avatar
Rob
T-mobile possibly?
I'm guessing its a MVNO that uses tmobile networks. When I reverse Google image searched it, it came up with some Boost Mobile results, which matches the orange, but I have no way of comparing the two. I couldn't find the GD anywhere. (edited)
Avatar
Avatar
Cole
I'm guessing its a MVNO that uses tmobile networks. When I reverse Google image searched it, it came up with some Boost Mobile results, which matches the orange, but I have no way of comparing the two. I couldn't find the GD anywhere. (edited)
Should be able to find out either way via the full iccid
Avatar
Gotcha. I don't have access to those fancy databases. Maybe I'll have one of the agents look it up and see if we can determine the MVNO.
👍 2
Avatar
so 89 is telecom standard, 01 is USA, 240 seems to be Tmobile based on the google machine
10:31 PM
How to check and decode SIM Card Number? To help you to obtain detailed information from the SIM (Subscriber Identity Module)
👍 1
10:33 PM
You can also download the SIM and decode the IMSI for the "current" service... The MCC and MNC should tell you who to reach out to
10:34 PM
ICCID really only gets you who issued the card originally, not who services the SIM currently
Avatar
Avatar
Cole
Gotcha. I don't have access to those fancy databases. Maybe I'll have one of the agents look it up and see if we can determine the MVNO.
Digitalferret 5/13/2022 12:24 AM
<cough> the truth is out there ... <cough>
🤣 4
Avatar
Have any of you done virtual world forensics? For example: SecondLife, GTA5 Online, IMVU, etc? It's something I've always been interested in, but the only real research I've seen was published in 2012.
Avatar
Avatar
DFE Travis
Have any of you done virtual world forensics? For example: SecondLife, GTA5 Online, IMVU, etc? It's something I've always been interested in, but the only real research I've seen was published in 2012.
That sounds very interesting, never heard of anyone even attempting it! What would you do forensics on? I guess you could pull local client files and information from a personal computer, but my understanding is most of the information is stored on the MMO server. So maybe you could find enough information to subpoena the company? I don't think chat logs would be stored anywhere, and stuff like player inventory is definitely server-side. Character name(s) and friends lists might have a copy client-side. This is all just off the top of my head combining my knowledge of digital forensics and my years of gaming experience lol.
Avatar
Avatar
DFE Travis
Have any of you done virtual world forensics? For example: SecondLife, GTA5 Online, IMVU, etc? It's something I've always been interested in, but the only real research I've seen was published in 2012.
AFAIK, SecondLife chat is an Axiom artifact but never seen anything useful from it.
Avatar
Avatar
Rob
AFAIK, SecondLife chat is an Axiom artifact but never seen anything useful from it.
A quick Google search says you are right. There are local logs of Second Life chat history saved client side. Who knew?
9:15 AM
Looks like Second Life stores quite a bit of info client side. Logs and such.
Avatar
It does, which is good for us lol
👍 1
9:20 AM
I spoke to my supervisor and he's okay with me doing some research on it, so this will be fun
Avatar
Gaming for work to see what information is logged clientside. Good times!
Avatar
Avatar
FullTang
Gaming for work to see what information is logged clientside. Good times!
Deleted User 5/13/2022 9:36 AM
Adult websites and gaming are the 2 most common vectors I come across when profiling. Steam is like the Yellow Pages for threat actors.
Avatar
Yeah I was going through our past case database and noticed a couple that involved ageplay on virtual worlds
9:52 AM
^ This is the paper if anyone was curious
💯 1
Avatar
This has me going down a mental rabbit hole trying to figure out types of criminal activity that can occur over video games and information logged by the client of the video game to aid in the prosecution of that crime. The biggest thing would be chat logs for any video game because anything could be discussed related to any crime. Friends lists would be useful to identify other suspects or victims. CSAM cases are common, and sometimes fraudsters wash funds with the purchase and sale of digital currency/items. So any info showing the amount of in-game money or inventory an account has would be useful, but any game used for washing funds shouldn't have the info editable by the client, it could be logged somewhere though? Now I just need to figure out how to get a supervisor like @DFE Travis has who will approve me playing video games for work lol.
Avatar
For Second Life specifically, it has its own exchange. So it's entirely possible to launder through that platform
Avatar
Yep, never really played it and I just started reading the paper you linked, thanks!
Avatar
It's a wild west over there, enjoy the rabbit hole haha
😎 1
Avatar
You might find this interesting -- a number of years ago (erm 2009, I'm aging myself here...), a Law Enforcement Guide leaked out of Blizzard for World of Warcraft. This appears to be a legitimate copy of the guide. https://cryptome.org/isp-spy/blizzard-spy.pdf
Avatar
DefendingChamp 5/13/2022 5:39 PM
Anyone experiencing problems with ufed having trouble with partial logical extraction?
5:39 PM
Seems to be an issue with itune encrypted iphones
5:39 PM
And even if i reset the settings it'll fail
5:40 PM
3rd phone this week
Avatar
Andrew Rathbun 5/13/2022 7:08 PM
@DefendingChamp #mobile-forensic-extractions
Avatar
On the subject of games.. Something that's had my noggin joggin for a while, what options are available for extractions for modern consoles? I've been thinking mainly about the xbox one because I'd like to not have to think about anything beyond the Microsoft ecosystem for now to keep it simple. I was thinking it must be relatively simple to develop an app that could be sideloaded that may find more than just doing a manual review. I've since found there are some remote utilities as well to access storage (https://docs.microsoft.com/en-us/gaming/gdk/_content/gc/system/overviews/local-storage) however access to these utilities and their documentation are subject to an NDA, so I'd need to sign up as a partner to get access, which is for commercial entities not individuals, and my guess is that there would be difficulty in registering my force as a game developer 😂 so my question, anyone else delved down this rabbit hole? I know we don't get many consoles seized, but I wonder if this is because historically the outcome has impacted the demand
Describes the temporary local storage available to titles on Xbox consoles and how to access temporary locally stored data, installed game data, and the developer scratch partition.
Avatar
I got an Xbox 360 to examine on a CSAM case but I didn’t have a donor console for a manual examination. I made an .E01 of the removable HD and did a byte level carve for .jpg images. I found CSAM, but without the file system info it was the equivalent of carving photos from unallocated space. If the examiner were to find photos of a known victim on the suspect’s console (or via versa) that could be very useful, but fortunately I had other devices in this case that were better evidence than what I found on the console.
Avatar
Deleted User 5/14/2022 9:40 AM
Played around with a PS4 once but the file system is encrypted. Found research where some folks simply went through the console and output it to a video card. I suspected the browser would be an Achilles heel and sure enough I found a YouTube video (forgotten it’s title) where a guy loaded an exploit via the browser.
Avatar
CloudCuckooLand 5/14/2022 10:09 AM
@FullTang looks like the 360 uses FATX https://free60.org/FATX/
💯 1
Avatar
Avatar
FullTang
I got an Xbox 360 to examine on a CSAM case but I didn’t have a donor console for a manual examination. I made an .E01 of the removable HD and did a byte level carve for .jpg images. I found CSAM, but without the file system info it was the equivalent of carving photos from unallocated space. If the examiner were to find photos of a known victim on the suspect’s console (or via versa) that could be very useful, but fortunately I had other devices in this case that were better evidence than what I found on the console.
360s can be examined via Axiom
💯 1
10:12 AM
All other Xboxs and PlayStations you're stuck with doing a manual and then taking photos and reporting those photos.
👍 1
Avatar
Avatar
CloudCuckooLand
@FullTang looks like the 360 uses FATX https://free60.org/FATX/
Great info, thanks guys! @Rob (edited)
Avatar
facelessg00n 5/14/2022 7:23 PM
We are starting to see a few consoles now as well. Would be a good little research project for someone. At the moment we are usually limited to capturing it via HDMI
Avatar
Deleted User 5/14/2022 10:38 PM
I briefly started some research into getting a Rubber Ducky to interact with a PS4 console. I believe there is a GitHub repo for this server. Suggestion: those of us interested kick off a project to map and document DFIR for consoles.
Avatar
Sorry if this has been asked. Any drawbacks to upgrading a forensics workstation to Windows 11? I wasn't sure if there have been any performance or compatibility issues identified with the usual set of tools (Axiom, Cellebrite, FTK, etc.)
Avatar
Yep, probably the worse windows to date.
Avatar
Digitalferret 5/15/2022 7:26 AM
anecdotal but, based on (mainly domestic) customers experience of upgrading their machine with the older version of Win in situ, I'll normally give it a couple of years after initial release so MS can get their shit together w/ issues/patches/bugs etc. can't speak to brand new h/w pre-installed other than having to shore up the [Express Setup - trust us, no really - it'll be ok] settings that tailor it to MS monitoring/marketing rather than one that favours the client's privacy and so forth.
Avatar
Avatar
AtomicDI
Sorry if this has been asked. Any drawbacks to upgrading a forensics workstation to Windows 11? I wasn't sure if there have been any performance or compatibility issues identified with the usual set of tools (Axiom, Cellebrite, FTK, etc.)
I upgraded a laptop to test it out and have not had any issues with axiom or ftk. I briefly used Cellebrite PA on it with out issues.
Avatar
@dfir_rick Thanks for the feedback!
Avatar
Andrew Rathbun 5/15/2022 2:58 PM
I've been using Windows 11 since the beta in June 2021 or whatever. I'd suggest sticking to Windows 10 for a couple more years, honestly. It's overall a net feature loss plus there's some cool security features coming soon that may move the needle on my current opinion, but for now, Windows 10. Stay tuned for 22H2 and see how that turns out. Only yearly updates now instead of every 6 months.
👍🏻 3
Avatar
Avatar
AtomicDI
Sorry if this has been asked. Any drawbacks to upgrading a forensics workstation to Windows 11? I wasn't sure if there have been any performance or compatibility issues identified with the usual set of tools (Axiom, Cellebrite, FTK, etc.)
Cellebrite Physical Analyzer has been force closing on my two laptops since upgrading to Windows 11. Cellebrite could only suggest downgrading because it’s not officially supported. (edited)
Avatar
@Joe Schmoe Thank you! I'll hold off for a while longer.
Avatar
I’d say use a Linux host and if you need windows use a vm. At least you can do snapshots etc. imo windows 10 was better than 11
8:27 PM
I’ve de-windows my entire house now too. Even converted all servers to Linux 😂
💯 1
Avatar
Avatar
FullTang
This has me going down a mental rabbit hole trying to figure out types of criminal activity that can occur over video games and information logged by the client of the video game to aid in the prosecution of that crime. The biggest thing would be chat logs for any video game because anything could be discussed related to any crime. Friends lists would be useful to identify other suspects or victims. CSAM cases are common, and sometimes fraudsters wash funds with the purchase and sale of digital currency/items. So any info showing the amount of in-game money or inventory an account has would be useful, but any game used for washing funds shouldn't have the info editable by the client, it could be logged somewhere though? Now I just need to figure out how to get a supervisor like @DFE Travis has who will approve me playing video games for work lol.
I don't know if this is obvious or stupid, or whatever, but since there's a direct virtual <-> real money thing going on in Secondlife, is there a possibility this gets used for laundering?
1:15 AM
or at least, say, some obfuscation in the process of payments
1:16 AM
I guess it usually does require some form of bank details, or whatever though
Avatar
You have a point. I think it is more known because it is directly supported by the game to convert fiat money to a virtual currency. I would imagine that it happens in other games as well, but it’s harder to detect because it is against the TOS for most games. Also, Second Life logs more than other games making it easier to locate forensic evidence for crimes that use its platform.
Avatar
facelessg00n 5/16/2022 5:41 AM
Not sure where to post but here is a good a spot as any. I have had to draw some network diagrams recently and was looking for something lighter weight than dragging out i2 and found DrawIO. Its pretty amazing and better yet, open source. Lots of DF related sysmbols such as HDD's etc baked in if you need to chart up where all your evidence came from as well. https://github.com/jgraph/drawio-desktop
Official electron build of diagrams.net. Contribute to jgraph/drawio-desktop development by creating an account on GitHub.
Avatar
Deleted User 5/16/2022 6:07 AM
@Cellebrite question on maps/geo location. I’m working on installing the offline maps right now. If I make a report and hand it to one of our investigators who opens said report on a different computer, will they see maps corresponding to geo location data or will it only present maps on the offline computer that has the maps package installed?
Avatar
heatherDFIR 5/16/2022 7:19 AM
Hey everyone! The Cellebrite CTF kicks off again on Monday. More information is available here: https://cellebrite.com/en/cellebrite-capture-the-flag-may-2022/
What/Why a CTF? Cellebrite’s Capture the Flag event is a great way for the Digital Forensics and Incident Response (DFIR) community to come together and challenge themselves. Whether you are new to DFIR or a seasoned veteran, this CTF has something for everyone. The challenges were written so that some are easier, and some are … Continue reading...
💯 2
🔥 4
Avatar
Anyone here see anything dodgey on this mac? From this information?
2:18 PM
26.31 KB
Avatar
AugustBurnsBlue 5/16/2022 6:30 PM
Per chance, does anyone know an easy way to find the single license costs of most popular forensics tools (ballpark estimates) without having to go back and forth with the sales team of each company? Just trying to do some napkin math budgeting. (Axiom, EnCase, UFED 4PC & PA, DVR Examiner, Griffeye DI Pro, etc). Or if you manage purchase orders for a lab and could PM me, that would be great. 🙂 (edited)
Avatar
Avatar
AugustBurnsBlue
Per chance, does anyone know an easy way to find the single license costs of most popular forensics tools (ballpark estimates) without having to go back and forth with the sales team of each company? Just trying to do some napkin math budgeting. (Axiom, EnCase, UFED 4PC & PA, DVR Examiner, Griffeye DI Pro, etc). Or if you manage purchase orders for a lab and could PM me, that would be great. 🙂 (edited)
ScottKjr3347 5/16/2022 7:07 PM
Based on my experience, yes dealing with sales can be annoying at times, but if you get to know your area sales person for each vendor while you are only inquiring it allows you to build a relationship. Then when you really NEED something you will get responses back a lot faster because they know you vs the first time talking with them. They understand your aren’t making a purchase every time you get a quote. I just built a budget 2-4 examiners. If you want some help dm me. But I still suggest getting quotes and getting to know your sales. It will benefit you in the future.
❤️ 1
this 1
Avatar
Avatar
AugustBurnsBlue
Per chance, does anyone know an easy way to find the single license costs of most popular forensics tools (ballpark estimates) without having to go back and forth with the sales team of each company? Just trying to do some napkin math budgeting. (Axiom, EnCase, UFED 4PC & PA, DVR Examiner, Griffeye DI Pro, etc). Or if you manage purchase orders for a lab and could PM me, that would be great. 🙂 (edited)
facelessg00n 5/17/2022 4:34 AM
Also for the less often used tools see if there are any neighbouring labs you can collab with.
Avatar
DefendingChamp 5/17/2022 5:11 AM
is there something that can trace where the WOL is coming from?
5:11 AM
i have my computer with WOL enabled and it randomly turns on
Avatar
DefendingChamp 5/17/2022 5:21 AM
nvm it's not my WOL, but powercfg command helped me figure it out
Avatar
Would a Virtual World and Consoles channel be something we can do here?
Avatar
Avatar
DFE Travis
Would a Virtual World and Consoles channel be something we can do here?
Andrew Rathbun 5/17/2022 7:55 AM
@Moderators and I aren't opposed to adding channels for topics the community requests, it's just a matter of balancing the number of channels with the relevancy of said topics vs other channels/topics that already exist. Could this topic be implemented into a currently existing channel (and rename that channel to better reflect the new topic)? Should this channel exist on its own? Could this channel be added and we drop another that hasn't been touched in a long time? Trying to avoid channel creep while also serving you all the best we can. These are just a sample of questions we ask ourselves when we get new channel requests so let me know what you're thinking.
👍 2
Avatar
I will allow for others to input if they'd like to see a dedicated channel as well. Looking at the current channels the only one that might be applicable is #darknet-virtual-currencies , but it doesn't currently cover consoles. The reason for lumping virtual worlds and consoles together is perhaps for interoperability (i.e. Roblox, Fortnite). #iot-forensics might be an option if we consider expansion to virtual reality hardware and what it stores locally to the hardware themselves
Avatar
Avatar
DFE Travis
I will allow for others to input if they'd like to see a dedicated channel as well. Looking at the current channels the only one that might be applicable is #darknet-virtual-currencies , but it doesn't currently cover consoles. The reason for lumping virtual worlds and consoles together is perhaps for interoperability (i.e. Roblox, Fortnite). #iot-forensics might be an option if we consider expansion to virtual reality hardware and what it stores locally to the hardware themselves
Andrew Rathbun 5/17/2022 9:54 AM
maybe #iot-forensics could be changed to iot and other device forensics? Unless someone can think of a better name
9:54 AM
iot-console-forensics?
Avatar
perhaps, though it doesn't quite encompass virtual worlds, which is a bit of an oddball. Could go to #darknet-virtual-currencies and consoles go to #iot-forensics ?
Avatar
Any1 familiar with FAT Time Conversion
11:17 AM
Trying to convert manually but i seem too end up with the wrong answer
Avatar
Andrew Rathbun 5/17/2022 11:52 AM
@Arlakossanwhat kind of raw value are you working with? Got an example?
Andrew Rathbun started a thread. 5/17/2022 11:56 AM
Avatar
any @Law Enforcement [UK] from City of London?
Avatar
Has anyone done any forensic analysis of a gopro video? I'm trying to understand how the file structure of the mp4 as well as how the GPS coordinates get embedded/encoded into the file.
Avatar
Avatar
m1gr@n3
Has anyone done any forensic analysis of a gopro video? I'm trying to understand how the file structure of the mp4 as well as how the GPS coordinates get embedded/encoded into the file.
Andrew Rathbun 5/17/2022 12:23 PM
Have you tried using 010 Editor's binary templates on the MP4 files to see how it's all laid out?
Avatar
Avatar
Sudo
any @Law Enforcement [UK] from City of London?
Do City even have a digital forensic team? Thought they relied on the Met to do everything forensic for them 🤣
12:31 PM
no clue lol
Avatar
Avatar
Andrew Rathbun
Have you tried using 010 Editor's binary templates on the MP4 files to see how it's all laid out?
I have not, but I will check it out now. 👍
Avatar
Avatar
Sudo
any @Law Enforcement [UK] from City of London?
@MrTurdTastic
Avatar
Avatar
m1gr@n3
Has anyone done any forensic analysis of a gopro video? I'm trying to understand how the file structure of the mp4 as well as how the GPS coordinates get embedded/encoded into the file.
It’s been a while but from what I remember it is a standard mp4 wrapped file. GPS data is in a user defined box within the structure. (edited)
Avatar
Avatar
HSleep
Do City even have a digital forensic team? Thought they relied on the Met to do everything forensic for them 🤣
They have a high tech crime unit, not sure if they have their own DFU
Avatar
Avatar
Sudo
any @Law Enforcement [UK] from City of London?
MrTurdTastic 5/17/2022 3:03 PM
Aye
Avatar
Avatar
HSleep
Do City even have a digital forensic team? Thought they relied on the Met to do everything forensic for them 🤣
MrTurdTastic 5/17/2022 3:04 PM
We do indeed. Better than the met's one too 😎
Avatar
Avatar
Matt
They have a high tech crime unit, not sure if they have their own DFU
MrTurdTastic 5/17/2022 3:04 PM
HTCU is our DFU
Avatar
Avatar
MrTurdTastic
We do indeed. Better than the met's one too 😎
Umm we all know the Met has the best DFU in the UK end of
Avatar
Still rocking the old name htcu I see (edited)
Avatar
Avatar
HSleep
Umm we all know the Met has the best DFU in the UK end of
MrTurdTastic 5/17/2022 3:06 PM
The met think they're the best at everything but if so then why are city the golden bois 😎
Avatar
Avatar
MrTurdTastic
The met think they're the best at everything but if so then why are city the golden bois 😎
Don't you guys just work for investment bankers though? You don't do any proper crimes 🤣
Avatar
Avatar
HSleep
Don't you guys just work for investment bankers though? You don't do any proper crimes 🤣
MrTurdTastic 5/17/2022 3:12 PM
Money makes the world go round, rather bankers than facebook domestics and possession of class b!
😆 1
Avatar
Avatar
HSleep
Umm we all know the Met has the best DFU in the UK end of
No prizes for guessing which force you work for then 😂
Avatar
DeeFIR 🇦🇺 5/17/2022 4:18 PM
this 3
Avatar
Humble#2244 5/17/2022 8:49 PM
I remember once I came across an australian website if i'm not wrong, it had list of all dfir tools. I can't find the site again, please help me if someone knows the one i'm talking about.
Avatar
Avatar
Humble#2244
I remember once I came across an australian website if i'm not wrong, it had list of all dfir tools. I can't find the site again, please help me if someone knows the one i'm talking about.
ScottKjr3347 5/17/2022 9:43 PM
Pretty good list by @stark4n6 https://start.me/p/q6mw4Q/forensics
A startpage with online resources about Forensics, created by Stark 4N6.
❤️ 1
Avatar
Humble#2244 5/17/2022 11:49 PM
thanks for sharing
Avatar
#doubt Please help me with this. After Full file system generation report from Physical analyzer Computer taking long time to copy the entire data in to Pendrive. It's HP 3.0 64 gb pendrive, I have windows 11, 8 gb ram.. When I'm using windows 10 os, getting error. Any tips friends to copy the data to pendrive. The size of data around 39 gb. in safe mode is it possible? I believe some files long name they take long time. Thanks in advance
Avatar
Avatar
Afeef
#doubt Please help me with this. After Full file system generation report from Physical analyzer Computer taking long time to copy the entire data in to Pendrive. It's HP 3.0 64 gb pendrive, I have windows 11, 8 gb ram.. When I'm using windows 10 os, getting error. Any tips friends to copy the data to pendrive. The size of data around 39 gb. in safe mode is it possible? I believe some files long name they take long time. Thanks in advance
Digitalferret 5/18/2022 2:31 AM
what is the source drive (and does it have problems) and how much data are you trying to transfer over? you say you have Win11 but using Win 10 ?? . what exactly is/are the errors?
Avatar
Avatar
Afeef
#doubt Please help me with this. After Full file system generation report from Physical analyzer Computer taking long time to copy the entire data in to Pendrive. It's HP 3.0 64 gb pendrive, I have windows 11, 8 gb ram.. When I'm using windows 10 os, getting error. Any tips friends to copy the data to pendrive. The size of data around 39 gb. in safe mode is it possible? I believe some files long name they take long time. Thanks in advance
FAT32 filesystem with 4GB file size limit?
Avatar
Avatar
Digitalferret
what is the source drive (and does it have problems) and how much data are you trying to transfer over? you say you have Win11 but using Win 10 ?? . what exactly is/are the errors?
Error 0x80070570 This is the error. And when I transfer the Data using windows 11 os . it transferred but it will take 24+ hours. Main problem is our power back system where damaged. So, when I using win 8 os this error is prompting. Over all data from hard disk is around 39 gb. So, im try to transfer to 64 gb pendrive. Now, I have trying in safe mode in windows 8 os. (edited)
Avatar
Digitalferret 5/18/2022 3:25 AM
looks like you have corrupt file(s) or damaged drive.
3:26 AM
so far you have mentioned 3 different versions of Windows?
Avatar
Avatar
Digitalferret
looks like you have corrupt file(s) or damaged drive.
I have tried two Pendrive ls. Same result. Its take too much time in windows 11
Avatar
Digitalferret 5/18/2022 3:27 AM
so, you keep changing your main recovery PC hoping that it will recover files better?
Avatar
Avatar
Digitalferret
looks like you have corrupt file(s) or damaged drive.
May be there is a chance for corrupted files. But, as forensic examiner i need to transfer all the data to the pendrive
Avatar
Digitalferret 5/18/2022 3:29 AM
if it's forensic, first you need to make a complete image of the drive being examined
3:29 AM
if there are issues with the drive, they will show up at this stage
3:30 AM
if the drive is faulty, bad sectors or instability, you will need a solution to get past this, such as a hardware imager, or software that allows you to skip/bypass bad areas
3:30 AM
once you have the image on a new, stable, fresh drive, you can recover data
Avatar
Avatar
Digitalferret
if it's forensic, first you need to make a complete image of the drive being examined
Using ufed 4pc i have generated report as well as files. I believe there is problem with some files namely .so and lengthy type files names etc
Avatar
Digitalferret 5/18/2022 3:32 AM
also, with reference to @AmNe5iA suggestion, check if there are larger files than the filesystem can handle.
Avatar
Avatar
Digitalferret
also, with reference to @AmNe5iA suggestion, check if there are larger files than the filesystem can handle.
Okay, thank you.
Avatar
Digitalferret 5/18/2022 3:33 AM
is this a Mobile thing? i have no experience with UFED4 but it looks to be a mobile solution?
Avatar
Avatar
Digitalferret
is this a Mobile thing? i have no experience with UFED4 but it looks to be a mobile solution?
Yes, extracted data from mobile phone, full file system extraction
Avatar
Digitalferret 5/18/2022 3:35 AM
ah right, so you have imaged a phone....
👍 1
3:36 AM
given the nature of this, i'll bow out. not general data recovery, and @AmNe5iAhas far more experience than me with regard to forensics
3:36 AM
best of luck
👍 1
Avatar
I think he's used PA to create some report. If you create a pdf report for example (rather than a ufdr one which is effectively a zip file with everything contained within) then it tends to produce lots of small linked files (pictures videos tumbnails, plist files etc.). He is then trying to copy all these files to a pendrive and is being impatient.
Avatar
Avatar
AmNe5iA
I think he's used PA to create some report. If you create a pdf report for example (rather than a ufdr one which is effectively a zip file with everything contained within) then it tends to produce lots of small linked files (pictures videos tumbnails, plist files etc.). He is then trying to copy all these files to a pendrive and is being impatient.
Exactly
Avatar
So try zipping it all up and then transferring the zip file instead.
Avatar
Avatar
AmNe5iA
So try zipping it all up and then transferring the zip file instead.
But, Modified date will change right?
Avatar
I'd probably reformat the pendrive to exFAT beforehand too. (edited)
Avatar
Avatar
AmNe5iA
I think he's used PA to create some report. If you create a pdf report for example (rather than a ufdr one which is effectively a zip file with everything contained within) then it tends to produce lots of small linked files (pictures videos tumbnails, plist files etc.). He is then trying to copy all these files to a pendrive and is being impatient.
Digitalferret 5/18/2022 3:38 AM
roger that, thanks for the explanation, i get the gist now (edited)
Avatar
Avatar
AmNe5iA
I'd probably reformat the pendrive to exFAT beforehand too. (edited)
I have done in NTFS format, Also I have formated using tablue t2dtu device. pendrive is working. Actually i need to speedup th copying process.
Avatar
Avatar
Afeef
I have done in NTFS format, Also I have formated using tablue t2dtu device. pendrive is working. Actually i need to speedup th copying process.
Else I wish to fix the Error 0x80070570 and transfer the data from using windows 8 os.
Avatar
You need to give context to the error. Surprisingly, I doubt anyone knows what 0x80070570 actually means. i could google but i'm not going to.
3:45 AM
So if the report files are corrupted then why not delete them, then create a new report? I assume you still have the original extraction to work from.
Avatar
Avatar
Afeef
But, Modified date will change right?
Why would zipping a file modify it?
Avatar
Avatar
AmNe5iA
You need to give context to the error. Surprisingly, I doubt anyone knows what 0x80070570 actually means. i could google but i'm not going to.
Yes. Thank you. I will do it.
Avatar
Avatar
Afeef
But, Modified date will change right?
Hans Leißner 5/18/2022 8:07 AM
It changes when you copy it. It is not changed when zipping
Avatar
Avatar
Humble#2244
I remember once I came across an australian website if i'm not wrong, it had list of all dfir tools. I can't find the site again, please help me if someone knows the one i'm talking about.
maybe https://thisweekin4n6.com/ from @randomaccess?
Your weekly roundup of Digital Forensics and Incident Response news
Avatar
Avatar
stark4n6
maybe https://thisweekin4n6.com/ from @randomaccess?
Humble#2244 5/18/2022 10:14 AM
No, not this one. That had a very long list and each list further had myraid of tools listed. I remember it had some connection with Australia
Avatar
Has anyone seen these type of phishing emails where it just contains a jpeg attachment of a fake invoice? What exactly is the goal of this type of email? Just to get a user to reply?
Avatar
To bypass email controls
3:51 PM
Many tools assume marketing email and don’t take action. Worked an incident with single image for sextortion. Threat actor generated the image and included many character sets to try and throw off image to text converters.
Avatar
AugustBurnsBlue 5/18/2022 4:18 PM
Anyone know a good forensic workstation vendor outside of Sumuri and Digital Intelligence? I've been tasked with putting together quotes for a forensic workstation, and our policy requires us to have minimum three quotes from different vendors.
Avatar
Hello, Is Axiom can process nsf (lotus notes) files ?
Avatar
Silicon Forensics, Ace Computers, Avail Forensics, Forensic Computer inc
5:12 PM
@AugustBurnsBlue
👍 1
Avatar
Avatar
whee30
For those of you who need to keep multiple mobile devices on power and organized, what are you using? I'm considering a simple file organizer for the envelopes they're kept in with a long powerstrip mounted next to it. Getting them off of the desk seems like a nice space saving step.
To follow up on this - I had some end of fiscal year cash and got a purpose built solution for this. I split the difference between the tabletop charging station and the large laptop rolling cabinet with a Tripp Lite 16 tablet locking cabinet.
👍 1
8:18 PM
Tripp Lite 16 Port USB Charging Station Cabinet for Tablet, iPad & &roid, Charge & Sync, Wall Mount (CS16USB) https://www.amazon.com/dp/B00T0YYBF2/ref=cm_sw_r_cp_api_i_B185JQ5D8JZ7TSGNPQQ8 (edited)
Tripp Lite 16 Port USB Charging Station Cabinet for Tablet, iPad & &roid, Charge & Sync, Wall Mount (CS16USB)
8:19 PM
This way I can keep items in/with their evidence envelope and close it all up to add some additional security.
Avatar
Avatar
whee30
For those of you who need to keep multiple mobile devices on power and organized, what are you using? I'm considering a simple file organizer for the envelopes they're kept in with a long powerstrip mounted next to it. Getting them off of the desk seems like a nice space saving step.
MrTurdTastic 5/18/2022 11:03 PM
We have a couple Faraday boxes with ports inside
Avatar
Hello there, is anyone here able to read Persian text?
Avatar
Avatar
Christiano
Hello there, is anyone here able to read Persian text?
Andrew Rathbun 5/19/2022 3:59 AM
🙌 1
Avatar
Avatar
AugustBurnsBlue
Anyone know a good forensic workstation vendor outside of Sumuri and Digital Intelligence? I've been tasked with putting together quotes for a forensic workstation, and our policy requires us to have minimum three quotes from different vendors.
Since you are in the states, I think Bitmindz might help you out - https://bitmindz.com/
Avatar
Avatar
bizzlyg
Since you are in the states, I think Bitmindz might help you out - https://bitmindz.com/
I think they are associated with TeelTech, in case that adds some validity
Avatar
Avatar
inzeos
Many tools assume marketing email and don’t take action. Worked an incident with single image for sextortion. Threat actor generated the image and included many character sets to try and throw off image to text converters.
Were the images fake ?
Avatar
Avatar
AugustBurnsBlue
Anyone know a good forensic workstation vendor outside of Sumuri and Digital Intelligence? I've been tasked with putting together quotes for a forensic workstation, and our policy requires us to have minimum three quotes from different vendors.
You can also go through your IT and have Dell or HP provide a bid at the "forensic" level with comparable equipment to fulfill your third bid.
Avatar
Hey guys I have been looking to get into DF where do I start?
Avatar
Avatar
ryuk0126
Hey guys I have been looking to get into DF where do I start?
Digitalferret 5/19/2022 9:51 AM
ima bad. want to say "give up right now while ur ahead" 🙂 (edited)
😆 1
9:52 AM
on behalf of LEA or a sideline to get you up and running?
🤣 1
Avatar
Anyone in here part of a larger digital forensics unit (15-20+)?
Avatar
Avatar
tolsen
Anyone in here part of a larger digital forensics unit (15-20+)?
Andrew Rathbun 5/19/2022 1:26 PM
I am sure a lot of the folks in the UK are with their large LE DF units
Avatar
Avatar
Villano
Were the images fake ?
Threat actor leveraging data from have I been pwned
Avatar
Avatar
inzeos
Threat actor leveraging data from have I been pwned
What I mean is was the JPEG an image or was it an executable
Avatar
Oh sorry, believe it was a PNG but static image file dynamically built with the image content
Avatar
Avatar
inzeos
Oh sorry, believe it was a PNG but static image file dynamically built with the image content
Andrew Rathbun 5/19/2022 1:40 PM
Sounds like IcedID to me?
Avatar
Avatar
tolsen
Anyone in here part of a larger digital forensics unit (15-20+)?
@Pacman @MrTurdTastic you guys have pretty big DFUs right?
Avatar
Avatar
Andrew Rathbun
Sounds like IcedID to me?
This was a specific target ring phishing campaign with obfuscated human readable sentences with demands for bitcoin payment or a release of alleged nsfw content of the targeted victim or accessed by the victim.
2:11 PM
The obfuscation was to use multiple character sets and fonts to try and make AI text detection from the images fail.
Avatar
NibblesNBits 5/19/2022 3:50 PM
I know it's slipping my mind. Can anyone name a bootable forensic distribution that can queue up multiple drives and image one task after the other? The best solution I have this far is WinFe (awesome) with multiple X-Ways instances.
Avatar
Avatar
NibblesNBits
I know it's slipping my mind. Can anyone name a bootable forensic distribution that can queue up multiple drives and image one task after the other? The best solution I have this far is WinFe (awesome) with multiple X-Ways instances.
DeeFIR 🇦🇺 5/19/2022 5:05 PM
Paladin?
Avatar
Avatar
DeeFIR 🇦🇺
Paladin?
NibblesNBits 5/19/2022 5:10 PM
I thought about it also but thought I would have to open several instances. I'm going to a thorough look. If there isn't a built in functionality that would be an awesome addition I think. Image source A verify, then source B verify, source C etc. to one destination. All in one window as opposed to several instances.
5:11 PM
Trying to get a mass imaging station going
Avatar
DeeFIR 🇦🇺 5/19/2022 5:11 PM
Can’t you just open multiple instances of the imager? Or am I missing what you’re trying to achieve
Avatar
Avatar
DeeFIR 🇦🇺
Can’t you just open multiple instances of the imager? Or am I missing what you’re trying to achieve
NibblesNBits 5/19/2022 5:13 PM
You are correct and I can accomplish this with WinFe and X-Ways but I was looking for something that has that functionality built into one session as opposed to several instances. It's not a problem to do several instances but something cleaner in one instance would be nice.
Avatar
Avatar
DeeFIR 🇦🇺
Can’t you just open multiple instances of the imager? Or am I missing what you’re trying to achieve
NibblesNBits 5/19/2022 5:18 PM
I'm not going for speed here so multiple destination drives isn't necessary single destination for all images in e01. I get multiple instances to different destination drives.
Avatar
Wouldn’t be hard to roll your own Linux distro and make a script to accomplish that goal.
Avatar
Can deleted MS Teams chats be recovered by attackers? Say fro example someone pastes a password in Teams chat, then deletes it, is an adversary able to recover deleted passwords/chats from Teams?
Avatar
And if so, how can we prevent attackers from recovering deleted messages/passwords?
Avatar
Avatar
malrker
And if so, how can we prevent attackers from recovering deleted messages/passwords?
MrTurdTastic 5/19/2022 10:47 PM
Overwrite the message first
Avatar
Avatar
MrTurdTastic
Overwrite the message first
Yeah but how can this be done for multiple users? If they put say a password or sensitive information in Teams?
Avatar
MrTurdTastic 5/19/2022 10:49 PM
I mean the best prevention for that is staff training
Avatar
And what do you mean by overwrite?
Avatar
MrTurdTastic 5/19/2022 10:49 PM
Don't post passwords in teams lol
10:49 PM
And I mean using the edit function if teams has it? Can't recall
Avatar
Like edit the message then delete?
Avatar
MrTurdTastic 5/19/2022 10:50 PM
Yep
10:50 PM
Most recoveries I've seen can only pull the most recent message from deletion
Avatar
Is there no Automated way of doing this?
Avatar
MrTurdTastic 5/19/2022 10:51 PM
Not to my knowledge but I'm not the most technical bod out there, I'm an investigator. I'm sure one of my learned DFIR colleagues could advise on the feasibility of that
Avatar
Avatar
tolsen
Anyone in here part of a larger digital forensics unit (15-20+)?
facelessg00n 5/20/2022 1:32 AM
Yeah, whats on
Avatar
Avatar
DCSO
You can also go through your IT and have Dell or HP provide a bid at the "forensic" level with comparable equipment to fulfill your third bid.
facelessg00n 5/20/2022 1:37 AM
The Dell and HP builds they try and sell you for this are sh*t. Use the quotes they supply as leverage and get something else.
👍 1
Avatar
Avatar
ryd3v
Wouldn’t be hard to roll your own Linux distro and make a script to accomplish that goal.
NibblesNBits 5/20/2022 4:13 AM
Ha maybe for you. Scripting isn't my strong point but this is a project and challenge so Im actually going to challenge myself with this one and give that a try. I think it's really the best way to get what you really want. Thx
🍻 2
Avatar
For UK law enforcement. The Forensic Capability Network are looking to provide free computer ground truth date GTD (physical devices, files, and procedures) to forces. https://fcn.lets-go.live/news/2022-05/computer-ground-truth-data-gdt-expressions-interest
Would your Force or area collaboration be interested in a free computer GTD package? We’re working on a proposal, and we’d like to know how many forces could potentially benefit.
Avatar
What's the next step after mobile analyst? I was thinking of going into SOC
9:49 AM
By Yelisey Bogusalvskiy & Vitali Kremez (with special thanks to AdvIntel Intel Production Analyst Marley Smith) This is a redacted report that is based on our internal investigations. The full version of the report includes additional information, evidence, IOCs, and commentary for AdvIntel customers and Law Enforcement. Conti’s Death Notice On ...
Avatar
Anyone who has some detailed insights into the Unified Audit Logs of Compliance Center and Microsoft Defender? Identified events labeled "FileCreatedOnRemovableMedia" and "FileCopiedToRemovableMedia" but looking at the filepaths it appears to me that the files were all originating from the same location if I match it against the local userfiles. So wondering what the difference could been especially if its evolving around 1k files that then also were deleted after on the local hard drive.
Avatar
Does anyone know if Microsoft can identify which O365 account/Tennent made a PDF with MS Word 365, if they are given the DocumentID and InstanceID? (edited)
Avatar
Avatar
MrTurdTastic
Most recoveries I've seen can only pull the most recent message from deletion
What tool/or how did you recover deleted messages/passwords from teams by the way, just out of curiosity?
6:45 PM
And is it the same for teams Desktop app and teams web browser?
Avatar
Avatar
malrker
And is it the same for teams Desktop app and teams web browser?
Depends on how the tenant and license and tools are set up. Legal hold compliance center etc can dig out a lot of stuff even user deleted materials.
Avatar
I have a memory dump file for a challenge from uni that I have to work out the implant framework the malware is generated from. I'm using volatility. Was done via dll injection. I am wondering how to work out the framework. I have run the dll hashes though virustotal but I am not sure what I am looking for. Any hints or pointers would be appreciated.
Avatar
Avatar
Ph03n1%
I have a memory dump file for a challenge from uni that I have to work out the implant framework the malware is generated from. I'm using volatility. Was done via dll injection. I am wondering how to work out the framework. I have run the dll hashes though virustotal but I am not sure what I am looking for. Any hints or pointers would be appreciated.
randomaccess 5/21/2022 1:10 AM
What port was the implant communicating on?
Avatar
How often do you folks update your forensic rigs? I only have one so it’s not like I have a bunch to compare with. It’s a 2018 FRED, it’s no slouch but I’m sure there are bigger/better out there. Do you upgrade piecemeal like a new GPU or additional RAM or just buy a new box altogether?
Avatar
DeeFIR 🇦🇺 5/21/2022 2:35 PM
@whee30 upgrade? What’s that? 🫠
Avatar
Avatar
whee30
How often do you folks update your forensic rigs? I only have one so it’s not like I have a bunch to compare with. It’s a 2018 FRED, it’s no slouch but I’m sure there are bigger/better out there. Do you upgrade piecemeal like a new GPU or additional RAM or just buy a new box altogether?
Andrew Rathbun 5/21/2022 2:42 PM
Obligatory download more RAM comment goes here
Avatar
Avatar
Andrew Rathbun
Obligatory download more RAM comment goes here
I tried that and now I have Norton antivirus and an AltaVista search toolbar on my Netscape browser
🤣 2
🤨 1
Avatar
Avatar
whee30
How often do you folks update your forensic rigs? I only have one so it’s not like I have a bunch to compare with. It’s a 2018 FRED, it’s no slouch but I’m sure there are bigger/better out there. Do you upgrade piecemeal like a new GPU or additional RAM or just buy a new box altogether?
Our entire rig gets updated every 5ish years.
Avatar
Avatar
whee30
I tried that and now I have Norton antivirus and an AltaVista search toolbar on my Netscape browser
Andrew Rathbun 5/21/2022 2:51 PM
What about Bonzi Buddy? 😂
Avatar
Avatar
randomaccess
What port was the implant communicating on?
Port 53, DNS
Avatar
Andrew Rathbun 5/21/2022 6:46 PM
If someone can think of a good emoji for Private Sector, Public Sector, and any other common roles I've missed, PLEASE let me know
💸 1
👔 1
🖥️ 1
💻 1
Avatar
Avatar
whee30
How often do you folks update your forensic rigs? I only have one so it’s not like I have a bunch to compare with. It’s a 2018 FRED, it’s no slouch but I’m sure there are bigger/better out there. Do you upgrade piecemeal like a new GPU or additional RAM or just buy a new box altogether?
We don't upgrade our boxes; replacement schedule is staggered but around 5 years
Avatar
Avatar
Andrew Rathbun
If someone can think of a good emoji for Private Sector, Public Sector, and any other common roles I've missed, PLEASE let me know
MrTurdTastic 5/22/2022 7:18 AM
chad
7:18 AM
For public
Avatar
docyes Public Sector. doclock Private Sector.
updoot 3
7:28 AM
WumpusKeyboardSlam
Avatar
Avatar
MrTurdTastic
chad
I think you mean
7:43 AM
earpiece
Avatar
Avatar
B74
docyes Public Sector. doclock Private Sector.
Andrew Rathbun 5/22/2022 7:46 AM
That's a neat concept. Really like those sub-icons
Avatar
Want me to grab the original icons for you?
Avatar
Never mind 😂
Avatar
Andrew Rathbun 5/22/2022 8:00 AM
I was also thinking all LE roles could be blue now since we have flag designators now
8:00 AM
but, it's been the way it has been for 4 years now so if people think that's not a necessary change, then that's fine
Avatar
^ Community vote?
Avatar
Avatar
B74
^ Community vote?
Andrew Rathbun 5/22/2022 8:01 AM
yeah i should probably do another Google Form for this so I can have pretty graphs and all that to present final results
Avatar
I'd be up for that tbh, I always found the colours a bit too varied for the roles
Avatar
You could just ask and then people can react with a 👍 or 👎
Avatar
Avatar
Matt
I'd be up for that tbh, I always found the colours a bit too varied for the roles
Andrew Rathbun 5/22/2022 8:03 AM
The primary color of a given country's flag is the color of that LE role 😛 that was the best I had at the time but agreed it's a bit of a mess across the LE spectrum
Avatar
I always found myself having to click on a user to see which role they had
8:04 AM
The flags is a really nice touch though, I'd forgotten they'd added that
Avatar
Andrew Rathbun 5/22/2022 8:05 AM
With the server boosts we have, we can have emojis attached to roles, so thankfully they have every flag known to mankind, so that was a simple thing to add that IMO adds a lot of benefit. You can click on the emoji on mobile and it'll show you which role the person is. Or, on desktop, you can hover over it and you'll see the role. Saves you a click which nerds love so much
😂 2
8:11 AM
Community Feedback Needed - Voting Thread
Andrew Rathbun pinned a message to this channel. 5/22/2022 8:24 AM
Avatar
A bit late, but I picture a person bashing their head on a keyboard for public LOL At least it felt like that when I was in the space
🤣 2
Avatar
Maybe just a roll of red tape will suffice... lol
🤣 3
Avatar
Avatar
Matt
Maybe just a roll of red tape will suffice... lol
Andrew Rathbun 5/22/2022 11:21 AM
Honestly not a bad idea...
Avatar
what happens when an external hard drive formatted as exFAT runs out of space while downloading files on windows 10? asking because my hdd ran out of space and showed 0 bytes available while downloading videos with 4kvideodownloader(similar to youtube-dl) and all of a sudden few seconds later when i am about to free up some space it shows me 900mb available
12:11 PM
wondering if windows would ever delete or misplace files without my permission or knowledge to free up space
12:12 PM
i would greatly appreciate any insight on this
Avatar
does that happen to coincide with the size of the failed download? Maybe you had 900mb available that filled up during the dl and the partial file was removed upon failure? I don't know - its purely speculation.
Avatar
yes the downloads did fail once it the drive ran out of space but the files weren't deleted
Avatar
Avatar
inzeos
Depends on how the tenant and license and tools are set up. Legal hold compliance center etc can dig out a lot of stuff even user deleted materials.
Is that something you have seen attackers use before to recover deleted messages? Or is it pretty uncommon?
Avatar
Avatar
malrker
Is that something you have seen attackers use before to recover deleted messages? Or is it pretty uncommon?
In theory they could? But those user rights should be pretty guarded.
Avatar
Dr. Kaan Gündüz 5/23/2022 4:03 AM
private sector emoji?
😂 1
Avatar
Is that the GCHQ office plan via drone? (edited)
😂 3
Avatar
Any tips for connecting a MAC address / OUI (9a:3c:fd) to a vendor? Tried several lookup services to no avail. Want to get in contact with vendor to retrieve IMEI
Avatar
Avatar
Ph03n1%
Is that the GCHQ office plan via drone? (edited)
Where’s the Greggs tho?
Avatar
Avatar
Dr. Kaan Gündüz
private sector emoji?
Digitalferret 5/23/2022 7:02 AM
i think Wrathbunny would Block that in case it started a Cluster-xxxx of ideas from other tech Heads on the same Track (edited)
🤣 3
Avatar
We have a distributed team and looking to put FTK on a Windows machine in Azure. Has anyone experience with this setup and are there any issues that we should consider (besides cost). E.g. how much scratch space needs to be allocated, type of system, etc. Thanks
Avatar
MrTurdTastic 5/23/2022 12:39 PM
With that length of time I think you'll be shit out of luck mate
👆 1
Avatar
I need a pithy snappy name for a copying tool that hashes either side
1:19 PM
All I’ve come up with so far is… hashinator
Avatar
Avatar
Pseudonym
I need a pithy snappy name for a copying tool that hashes either side
Ross Donnelly 5/23/2022 1:30 PM
Cross-hash Hash2hash Copy-Hasher Hash/Copy Hashy McHashface
Avatar
Hashy mchashface 💖
😆 5
1:34 PM
Hash-Copy-Hash could work
Avatar
what is the tool built on
Avatar
Python
Avatar
Andrew Rathbun 5/23/2022 1:35 PM
HashCopy
Avatar
PytchForC? python tool for copying haha
Avatar
Andrew Rathbun 5/23/2022 1:37 PM
PyCopyHash PyCopy
Avatar
Avatar
Sha1_4n6
PytchForC? python tool for copying haha
Rolls off the tongue 😁
Avatar
Andrew Rathbun 5/23/2022 1:38 PM
ForenCopy
1:39 PM
Choppy?
1:40 PM
Copy and hash married together
Avatar
Choppy is good one
Avatar
Andrew Rathbun 5/23/2022 1:40 PM
CHoppy, C for Copy, H for Hash
Avatar
Ross Donnelly 5/23/2022 1:40 PM
coPYhash, if you wanted to play on the Python bit
Avatar
HashCopy is taken (powershell script on GitHub)
Avatar
Avatar
Pseudonym
HashCopy is taken (powershell script on GitHub)
Andrew Rathbun 5/23/2022 1:40 PM
HashCoPy
👍 1
1:42 PM
HashCoPyHash
Avatar
Right, HashCoPyHash it is
1:45 PM
CHopPy could work too…
Avatar
Avatar
Pseudonym
Right, HashCoPyHash it is
Andrew Rathbun 5/23/2022 1:45 PM
I'll send you my invoice later this week 😛
Avatar
😆 2
1:46 PM
I can send you… 1000 safemoon…
Avatar
Avatar
MrTurdTastic
With that length of time I think you'll be shit out of luck mate
Deleted User 5/23/2022 1:55 PM
Sigh, these messages are literally the smoking gun. The case will be pretty much open-and-shut if we were able to recover them. (edited)
Avatar
Has anyone taken the new FOR608 class from SANS? Opinions? It seems interesting and useful for my line of work (SOC T3 guy)
Avatar
Not yet, but will be doing on QC work on it in a couple of weeks
2:14 PM
@kime
Avatar
I have a mac that I am trying to do some safari work on. I know that the particular web history I am looking at was synced from another device (history.db > history_visits > origin = 1). I know I can't determine was device it came from without finding the corresponding origin=0 for the same history.
3:09 PM
I'm trying to figure out if there is a PLIST or something that simply tells me what apple ID synced the info. I have three or four apple IDs on this device, trying to figure out which one to correlate the data to.
3:10 PM
I am not finding the answer in the same history.db but I am digging through the other files in the same directory structure to see if I can figure it out. My Googling is coming up empty so far.
Avatar
what are people useing for google search warrant returns.. and not Axiom and Cellebrite.. these are all json files.. what are you using for json files.
Avatar
Avatar
Jetten_007
what are people useing for google search warrant returns.. and not Axiom and Cellebrite.. these are all json files.. what are you using for json files.
If you cant find anything, CyberChef can convert .json files into .csv files to make it a little easier.
Avatar
@FullTang great idea...
👍 1
Avatar
Avatar
Jetten_007
what are people useing for google search warrant returns.. and not Axiom and Cellebrite.. these are all json files.. what are you using for json files.
randomaccess 5/23/2022 3:39 PM
Does rleapp have support? https://github.com/abrignoni/RLEAPP
Returns Logs Events And Properties Parser. Contribute to abrignoni/RLEAPP development by creating an account on GitHub.
Avatar
i did not... i can look again and make sure i the most current
Avatar
randomaccess 5/23/2022 3:40 PM
(if it doesn't, it would be worth trying to add support)
Avatar
i was thinking of asking brignoni... i could send him my dataset.
Avatar
Avatar
Jetten_007
i was thinking of asking brignoni... i could send him my dataset.
Andrew Rathbun 5/23/2022 7:08 PM
@Brigs
👍 2
Avatar
Avatar
Jetten_007
i was thinking of asking brignoni... i could send him my dataset.
Send me an email. 4n6@abrignoni.com 👍
Avatar
Avatar
Pseudonym
I need a pithy snappy name for a copying tool that hashes either side
Digitalferret 5/24/2022 1:06 AM
a bit artyfarty but use the octothorpe/hash sign? #copy#
Avatar
I was going to take a step further and suggest #cp# but… no…
👀 4
Avatar
Digitalferret 5/24/2022 1:08 AM
i was tryna make something of welsh rarebit (a hash of sorts) but 'bit' . nm and lol, yeh might cause a stir that ^
Avatar
Yeah, probably for the best…
Avatar
For sure!
Avatar
#copy# could be cool though!
Avatar
Chuck a 0 in there for extra coolness
Avatar
#C0Py# < edgy, unrememberable, it’s perfect
💯 1
😂 1
Avatar
Pretty nifty
Avatar
Avatar
Pseudonym
I need a pithy snappy name for a copying tool that hashes either side
Have you considered something a bit warmer and personable?
😂 1
3:53 AM
Like Frank?
Avatar
😂 no meaning behind it, we just happened to like the name Frank
3:55 AM
‘Kevin v0.01’
Avatar
Avatar
Pseudonym
‘Kevin v0.01’
Don't tell Mr Mansell, it'll go right to his head
Avatar
Dr. Kaan Gündüz 5/24/2022 4:33 AM
ver-o-copy
Avatar
Avatar
Pseudonym
#C0Py# < edgy, unrememberable, it’s perfect
Digitalferret 5/24/2022 5:10 AM
kinda reminds me of the "what's brown and sticky?" thing
Avatar
Does anyone have any procedures they follow regarding eSIMs during a mobile device extraction process? Also does anyone have any information that they could provide regarding eSIMs in a forensic investigation
Avatar
Avatar
Lyndsay
Does anyone have any procedures they follow regarding eSIMs during a mobile device extraction process? Also does anyone have any information that they could provide regarding eSIMs in a forensic investigation
I believe all you are going to get for the eSIM during the extraction is the IMEI and the ph # assigned to it. I have not see a lot of people using them yet, I think it will take a while.
Avatar
In terms of an esim connecting to a network while in lab, rather than an extraction?
Avatar
Avatar
Lyndsay
In terms of an esim connecting to a network while in lab, rather than an extraction?
A neighboring agency has a full on faraday room they can work inside of, the esim becomes a non-issue for them.... For me, either work inside of a cluttered faraday box or get it into airplane mode... It is definitely becoming more of a concern.
Avatar
Avatar
whee30
A neighboring agency has a full on faraday room they can work inside of, the esim becomes a non-issue for them.... For me, either work inside of a cluttered faraday box or get it into airplane mode... It is definitely becoming more of a concern.
The problem we are having is that we have several phones that can not be placed into airplane mode, and only have one faraday box
Avatar
That is definitely a problem... I don't have a solution for you but I'm tagging along for any other advice
Avatar
Avatar
whee30
A neighboring agency has a full on faraday room they can work inside of, the esim becomes a non-issue for them.... For me, either work inside of a cluttered faraday box or get it into airplane mode... It is definitely becoming more of a concern.
Is the faraday room used for extraction/acquisition only? It would be slightly annoying not to have cell service for your own phones while at work.
Avatar
yes that is correct. It's pretty awesome, I wish I had access to it.
👍 1
Avatar
I wish I had access to your budget lol. I had to spend my own money to buy a charging rack to store AFU and in-progress bruteforce phones and you are able to drop almost grand on a super fancy charging rack!
🇫 1
💯 1
Avatar
Avatar
Lyndsay
The problem we are having is that we have several phones that can not be placed into airplane mode, and only have one faraday box
Its expensive but they do have forensics faraday bag, that have usb filtering https://www.amazon.com/dp/B07W3PMY6C?ref_=cm_sw_r_cp_ud_dp_1GDW0TGWF6W74KREDGTX
The Mission Darkness Window Charge & Shield Faraday Bag for Phones allows a device to remain shielded from RF signals and powered after seizure, until it can be transferred to a forensic box, lab, or tool for data extraction. The bag includes a dual sided USB filter, NeoLok closure system for saf...
Avatar
Avatar
DCSO
Its expensive but they do have forensics faraday bag, that have usb filtering https://www.amazon.com/dp/B07W3PMY6C?ref_=cm_sw_r_cp_ud_dp_1GDW0TGWF6W74KREDGTX
ScottKjr3347 5/24/2022 10:36 AM
Just spent some TFO money on their the XL block box and it was well worth the money. It was unexpected but they also threw in some bags for free with the purchase. It can hold multiple devices with no problem. Plenty of space to work.
Avatar
Anyone fancy giving my script a quick try for me?
Avatar
Avatar
FullTang
I wish I had access to your budget lol. I had to spend my own money to buy a charging rack to store AFU and in-progress bruteforce phones and you are able to drop almost grand on a super fancy charging rack!
It was a surprise to me too, EOY thing. I am not complaining.
💯 1
Avatar
@whee30 @FullTang I was tempted to foil the walls of our server closet to make my own faraday room 🙂 I feel your pain 🤣
😂 2
Avatar
AARC TASK FORCE 5/24/2022 5:15 PM
I have an image split up between two drives. (1.8TB on 2 1TB drives). How can I load the image into encase or FTK without combining them onto 1 drive?
5:17 PM
/ is it possible to do that.
5:18 PM
Reason for not combining them onto 1 drive is due to a time limitation and needing to verify the images file structure.
Avatar
Avatar
Pseudonym
Anyone fancy giving my script a quick try for me?
Andrew Rathbun 5/24/2022 6:04 PM
#dfir-open-source-projects might be a good place to post
Avatar
Avatar
AARC TASK FORCE
I have an image split up between two drives. (1.8TB on 2 1TB drives). How can I load the image into encase or FTK without combining them onto 1 drive?
DeeFIR 🇦🇺 5/24/2022 7:00 PM
You can’t do that with FTK, not sure about EnCase, I’m pretty sure you can do it with X-Ways if you have access to it
Avatar
Avatar
AARC TASK FORCE
I have an image split up between two drives. (1.8TB on 2 1TB drives). How can I load the image into encase or FTK without combining them onto 1 drive?
Arman Gungor 5/24/2022 7:14 PM
I would try using symbolic links to bring them all to one folder. That is, symlinks to each image segment on Drive 1 + symlinks to each image segment on Drive 2 all in one folder—perhaps on a third drive or network location.
7:15 PM
If your forensic tool follows the symlinks nicely, this should be plug and play. Perhaps some command line magic or batch file can be used to loop through the files and create the links with minimal effort.
Avatar
Hello, I am trying to find something that has any reference to "50cent cryptolocker" but can't find much. Has anyone encountered this before?
Avatar
Anyone using OneNote for your forensic / bench notes? Wondering if anyone has a good notebook they use and are willing to share. I am going to start creating one if not and will share mine.
Avatar
Avatar
Ghosted
Anyone using OneNote for your forensic / bench notes? Wondering if anyone has a good notebook they use and are willing to share. I am going to start creating one if not and will share mine.
Andrew Rathbun 5/25/2022 5:18 AM
Yeah I use OneNote for pretty much everything. Best advice I can give is to start typing then push TAB so you can get a table created and organized your thoughts that way. Bullet points help, too. OneNote is awesome but hopefully should be getting better in due time now that M$ cares about it again after abandoning it
Avatar
@Andrew Rathbun I am really interested in putting it in my workflow. I have been watching some videos about it. I really like being able to put my incoming email / requests directly into the notes. This will allow me to keep everything together. I just need to make a template notebook that I can use to start each case. I didn't know if any examiners already have a template notebook they use for exams.
5:22 AM
@Andrew Rathbun thinking about making it so I can complete the intake on it and move into the photographing of the evidence all the way through to my bench notes. Right now all these are kind of all over the place and I pull them into a folder structure. Trying to streamline the flow to be more efficient.
Avatar
I use Obsidian for note taking sometimes, you can format it with markdown which is super nice
👍 1
Avatar
Andrew Rathbun 5/25/2022 5:31 AM
Yes Obsidian is a really popular option. It's all local, too, so you own your notes, not insert cloud service here. I doubt it integrates with Outlook and all that stuff as OneNote does, but that's purely speculation on my part.
5:31 AM
Markdown is an awesome format to write anything in, so that's a plus.
Avatar
Joplin is quite good as well
👍 1
Avatar
I use joplin pretty heavily; it has a few little things that annoy me with moving notes up/down, or I've killed it by dropping in a large chunk of code from malware i'm analyzing and the markdown renderer goes crazy (just have to edit the sqlite db directly)
6:27 AM
but I haven't found a replacement that is better yet
Avatar
Anyone have direct experience creating new syntax high lighting for MD documents?
Avatar
Avatar
inzeos
Anyone have direct experience creating new syntax high lighting for MD documents?
Andrew Rathbun 5/25/2022 8:19 AM
as in three backticks then inputting the language of the syntax you want highlighted?
8:20 AM
Avatar
Avatar
Andrew Rathbun
as in three backticks then inputting the language of the syntax you want highlighted?
correct, there's a ton available but of course the one I was looking for in my latest project isn't there LOL. "spl" for Splunk Query Language"
Avatar
Has anyone got a source they use for pre-populated handsets? Looking to get some for validation purposes. Thanks!
Avatar
Below are links to my public images.  If you find a link that isn’t working, please let me know! Android Android 7 (hosted by Digital Corpora) Android 8 (hosted by Digital Corpora) Android 9 …
Avatar
Good morning all. I'm wondering if any of you out there know of any Forensic Identification forums or discord servers similar to this that deal with thigs such as crime scene investigation, fingerprinting etc.?
Avatar
Avatar
stps358
Good morning all. I'm wondering if any of you out there know of any Forensic Identification forums or discord servers similar to this that deal with thigs such as crime scene investigation, fingerprinting etc.?
Andrew Rathbun 5/26/2022 7:30 AM
Avatar
Avatar
stps358
Good morning all. I'm wondering if any of you out there know of any Forensic Identification forums or discord servers similar to this that deal with thigs such as crime scene investigation, fingerprinting etc.?
Andrew Rathbun 5/26/2022 7:34 AM
https://discord.com/invite/4MHY6Ty here's the discord server that appears to be associated with r/forensics
👍 2
Avatar
Avatar
Andrew Rathbun
https://discord.com/invite/4MHY6Ty here's the discord server that appears to be associated with r/forensics
Thanks
Avatar
Deleted User 5/26/2022 9:30 AM
I’m curious, when checking a warrant return I found an India country code phone number. Are there any resources to check into numbers that are outside the US?
Avatar
Avatar
Deleted User
I’m curious, when checking a warrant return I found an India country code phone number. Are there any resources to check into numbers that are outside the US?
Andrew Rathbun 5/26/2022 10:13 AM
Check here: https://github.com/Digital-Forensics-Discord-Server/LawEnforcementResources and if such a resource doesn't exist, ask in #dfir-open-source-projects or make an issue in the repo for a request for such a thing and we can try to track one down
Resources provided by the community that can serve to be useful for Law Enforcement worldwide - GitHub - Digital-Forensics-Discord-Server/LawEnforcementResources: Resources provided by the communit...
Avatar
Avatar
Andrew Rathbun
Check here: https://github.com/Digital-Forensics-Discord-Server/LawEnforcementResources and if such a resource doesn't exist, ask in #dfir-open-source-projects or make an issue in the repo for a request for such a thing and we can try to track one down
Deleted User 5/26/2022 10:14 AM
Ty
Avatar
NibblesNBits 5/26/2022 11:07 AM
Anyone know if you can set environment variables in WinFe? I am using PE bakery and haven't seen the option.
Avatar
Avatar
NibblesNBits
Anyone know if you can set environment variables in WinFe? I am using PE bakery and haven't seen the option.
Andrew Rathbun 5/26/2022 11:08 AM
Maybe ask Brett Shavers on Twitter?
👍 1
11:09 AM
For those who weren't aware, members of this server are writing a book in #deleted-channel. If you want to vote on the book title, please take a moment to vote here: https://forms.gle/eZtkh5NZkzdjwaq66 https://discord.gg/J3fF7mVX?event=979592172267532288 (edited)
The DFIR Community needs your input as to what should replace the placeholder CrowdsourcedDFIRBook title for the collaborative book being written and edited on GitHub (https://github.com/Digital-Forensics-Discord-Server/CrowdsourcedDFIRBook) and published on Leanpub! The options with the top 3 most votes will move on to the second and final rou...
Avatar
Slightly off topic here, does anyone have experience within Anti-Piracy investigations here ? Highly doubt it xD (edited)
Avatar
Do you mean investigations into piracy or anti-piracy?
Avatar
Avatar
Andrew Rathbun
For those who weren't aware, members of this server are writing a book in #deleted-channel. If you want to vote on the book title, please take a moment to vote here: https://forms.gle/eZtkh5NZkzdjwaq66 https://discord.gg/J3fF7mVX?event=979592172267532288 (edited)
RandyRanderson 5/26/2022 6:38 PM
Booky McBookface
🤣 9
Avatar
Dr. Kaan Gündüz 5/26/2022 11:39 PM
El Libro Diablo!
Avatar
Avatar
OllieD
Amazing, thanks!
👍 1
Avatar
Avatar
RandyRanderson
Booky McBookface
Winner.
🔥 3
this 1
💯 1
Avatar
Avatar
Arman Gungor
I would try using symbolic links to bring them all to one folder. That is, symlinks to each image segment on Drive 1 + symlinks to each image segment on Drive 2 all in one folder—perhaps on a third drive or network location.
AARC TASK FORCE 5/27/2022 7:50 AM
Thank you for replying to this. I had to do hardlinks instead of the symlinks and it worked flawlessly. I'm new to foirensics so I'm still learning. Thank you!
Avatar
Avatar
AARC TASK FORCE
Thank you for replying to this. I had to do hardlinks instead of the symlinks and it worked flawlessly. I'm new to foirensics so I'm still learning. Thank you!
Arman Gungor 5/27/2022 8:08 AM
You are very welcome. Glad it helped! 👍🏻
💯 1
Avatar
Starting my first job Monday as a junior analyst
🎉 13
🤘 3
Avatar
Avatar
lilD
Starting my first job Monday as a junior analyst
Congrats! Good luck!
Avatar
Avatar
lilD
Starting my first job Monday as a junior analyst
Andrew Rathbun 5/28/2022 7:23 PM
huge huge congrats! Let us know how it goes and don't be afraid to ask a "stupid" question here. We're all in this together
👍 3
Avatar
Avatar
lilD
Starting my first job Monday as a junior analyst
Donghyun Kim 5/29/2022 5:42 AM
Congratulations! 🙂 (edited)
Avatar
@Cellebrite trying to get access to the iOS device package, not got usual resources... (dont have auth app with me)
Avatar
Avatar
RP
@Cellebrite trying to get access to the iOS device package, not got usual resources... (dont have auth app with me)
CLB-dan.techcrime 5/29/2022 7:46 AM
I've reached out 😶
Avatar
Deleted User 5/29/2022 12:53 PM
Non-forensic, personal help: Azulle Access3. attached to microUSB power, LED shows red (powered). power button doesn't flip the light to blue (on/booting). The website is awful, if it even works. Totally fanless, stick-style PC - any tips to diagnose - please DM. Thanks y'all
Avatar
Avatar
lilD
Starting my first job Monday as a junior analyst
Congratulations! Wishing you all the best success with your new role.
Avatar
stevensuba#2503 5/30/2022 3:52 PM
@lilD congratulations!!!
Avatar
@Magnet Forensics I just got the dongle for axiom. The url for axiom download, the link is not working.
Avatar
Avatar
Jay528
@Magnet Forensics I just got the dongle for axiom. The url for axiom download, the link is not working.
Avatar
Hi @Tim F. I’m trying to get my dongle ID to register for an account.
10:31 AM
Is there an easier way other than installing the application ?
Avatar
Avatar
Jay528
Hi @Tim F. I’m trying to get my dongle ID to register for an account.
If you email Support@magnetforensics.com they can get it to you pretty quickly.
Avatar
Thanks!
Avatar
Anyone got any recommendation for budget commercial tools to complement X-Ways, that offers the best 'bang for the buck'? Axiom is out the question due to cost, and Encase/ FTK have not returned my request for a quote. Forensic Explorer and OSForensics are my contenders due to their perpetual licenses, and the ability to create VMs, but they don't seem to be very popular with the community. Has anyone used either for their casework recently? Would you recommend either software? Is there any reason as to why these are not as popular?
Avatar
DeeFIR 🇦🇺 6/1/2022 3:42 AM
I'd be interested to hear why FEX isn't popular. I like it for basic work (coupled with X-Ways).
Avatar
MrMacca (Allan Mc) 6/1/2022 4:14 AM
What tools are people using to forensically capture websites? After some recommendations. We currently use offline explorer.
Avatar
Avatar
MrMacca (Allan Mc)
What tools are people using to forensically capture websites? After some recommendations. We currently use offline explorer.
In my old job we had this - https://www.x1.com/products/x1-social-discovery/ . It was a good few years back now though since I used it, did the job.
X1 Social Discovery is the industry-leading solution for anyone who needs to collect and search data from social networks and the internet
Avatar
Avatar
MrMacca (Allan Mc)
What tools are people using to forensically capture websites? After some recommendations. We currently use offline explorer.
Also these guys in Germany - https://www.socialnetworkharvester.de/en/home/. Prob best to get some free trials and play around
Avatar
Avatar
DE
Anyone got any recommendation for budget commercial tools to complement X-Ways, that offers the best 'bang for the buck'? Axiom is out the question due to cost, and Encase/ FTK have not returned my request for a quote. Forensic Explorer and OSForensics are my contenders due to their perpetual licenses, and the ability to create VMs, but they don't seem to be very popular with the community. Has anyone used either for their casework recently? Would you recommend either software? Is there any reason as to why these are not as popular?
Unoriginal_name 6/1/2022 7:27 AM
I think FEX is very nice to have. It was (not sure if still currently) given to NCFI BCERT students and it is currently used for training at the IACIS basic computer class. Lots of people have it. I think their marketing strategies are different than AXIOM and other companies which may make it not as mainstream. If you ever have an issue with FEX, email support and most of the time, Zeke will quickly email you back and even offer to call you to help fix it. However, the main issue that most have with FEX is their reporting feature. Which, isn’t too big of a deal for me since I mainly use screen captures in my report. If you are the type of person that just dumps everything out to a tool-based repot, you may be disappointed. Another tool I use quite frequently is Autopsy. It is free-99 and even now has a certification process if that is required where you work. (edited)
Avatar
Avatar
Unoriginal_name
I think FEX is very nice to have. It was (not sure if still currently) given to NCFI BCERT students and it is currently used for training at the IACIS basic computer class. Lots of people have it. I think their marketing strategies are different than AXIOM and other companies which may make it not as mainstream. If you ever have an issue with FEX, email support and most of the time, Zeke will quickly email you back and even offer to call you to help fix it. However, the main issue that most have with FEX is their reporting feature. Which, isn’t too big of a deal for me since I mainly use screen captures in my report. If you are the type of person that just dumps everything out to a tool-based repot, you may be disappointed. Another tool I use quite frequently is Autopsy. It is free-99 and even now has a certification process if that is required where you work. (edited)
+1 for FEX. It has the ability to do Windows virtualization from an .E01 and custom carving tools but it loads the initial image very quickly. The renewal fees are quite reasonable. The negatives are the reporting feature is so customizable that it can be hard to get it to work how you want and it is not as user-friendly as other tools (like Axiom) because it has so many different options. It is good for an experienced examiner to use to find specific pieces of evidence, but it is not good for processing and turning all the evidence over for the investigating officer/detective to review.
Avatar
Avatar
MrMacca (Allan Mc)
What tools are people using to forensically capture websites? After some recommendations. We currently use offline explorer.
MrTurdTastic 6/1/2022 8:54 AM
HTTrack
Avatar
MrMacca (Allan Mc) 6/1/2022 9:10 AM
Thanks all for the recommendations. Will pass them on.
Avatar
Avatar
DE
Anyone got any recommendation for budget commercial tools to complement X-Ways, that offers the best 'bang for the buck'? Axiom is out the question due to cost, and Encase/ FTK have not returned my request for a quote. Forensic Explorer and OSForensics are my contenders due to their perpetual licenses, and the ability to create VMs, but they don't seem to be very popular with the community. Has anyone used either for their casework recently? Would you recommend either software? Is there any reason as to why these are not as popular?
I was one of the FEX deniers but to be fair I have spoken to more people that liked it than people who disliked it... Also there was a major update a month after my license expired years back. I would have to give it a second chance. OS Forensics has been on my wish list for a while, price is very reasonable, interface seems no nonsense and simple... maybe try to grab a trial of each and check it out? I love being able to virtualize an acquisition, Arsenal Image Mounter does that for me currently.
Avatar
Hello, I'm running a weekly challenge called the SocVel Cybersecurity Quiz. It covers interesting cyber events from the past week in the form of 10 questions. Have a look over at https://quiz.socvel.com
Your weekly SocVel Cybersecurity Quiz. Play Now!
Avatar
Avatar
whee30
I was one of the FEX deniers but to be fair I have spoken to more people that liked it than people who disliked it... Also there was a major update a month after my license expired years back. I would have to give it a second chance. OS Forensics has been on my wish list for a while, price is very reasonable, interface seems no nonsense and simple... maybe try to grab a trial of each and check it out? I love being able to virtualize an acquisition, Arsenal Image Mounter does that for me currently.
@whee30 We had several licenses of FEX for years and did use it because it would give us the Blue Screen of death on us. What we did use it for was the emulation mode for hard drives it was a nice visual to show jury where the suspect had there folders of suspected items 🙂 Even flying out a rep to our office they could not locate the issue and it happened on several different machines. I hope they resolved this.
Avatar
Avatar
DE
Anyone got any recommendation for budget commercial tools to complement X-Ways, that offers the best 'bang for the buck'? Axiom is out the question due to cost, and Encase/ FTK have not returned my request for a quote. Forensic Explorer and OSForensics are my contenders due to their perpetual licenses, and the ability to create VMs, but they don't seem to be very popular with the community. Has anyone used either for their casework recently? Would you recommend either software? Is there any reason as to why these are not as popular?
Semantics 21 (Tom) 6/1/2022 3:16 PM
What about Belkasoft? I use most DF tools and this has the simple interface for web/comms data recovery and review.
3:20 PM
Has SOC seen an uptick yet of this being actively exploited in the wild in the past few days or so?
3:20 PM
Or DFIR
Avatar
⏰ Tempo v1.0.0 now released. ℹ️ Lightweight timestamp decoder for MacOS Now supports: ✅ Unix epoch ✅ Unix epoch / 1000 ✅ Cocoa Core Data ✅ Google Chrome ✅ Timezone modifiers ✅ History https://github.com/kibaffo33/Tempo/releases/tag/1.0.0
Tempo now supports Unix Epoch Unix Epoch / 1000 Cocoa Core Data Timestamp Google Chrome
Avatar
Avatar
kibaffo33
⏰ Tempo v1.0.0 now released. ℹ️ Lightweight timestamp decoder for MacOS Now supports: ✅ Unix epoch ✅ Unix epoch / 1000 ✅ Cocoa Core Data ✅ Google Chrome ✅ Timezone modifiers ✅ History https://github.com/kibaffo33/Tempo/releases/tag/1.0.0
Andrew Rathbun 6/1/2022 6:30 PM
#dfir-open-source-projects
👍 1
Avatar
Avatar
MrMacca (Allan Mc)
What tools are people using to forensically capture websites? After some recommendations. We currently use offline explorer.
Deleted User 6/2/2022 1:22 AM
What is Vortimo? Vortimo is software that helps you with online investigations. Vortimo turns your boring browser into a super browser. It overlays pages with a heads-up display while it records, recalls, scrapes, enrich, reports and finds web pages you've visited before. And it does it all locally on your computer. Who should use Vortimo? ...
Salute 1
Avatar
Hey everyone, does anybody have some example reports, report templates, resources, etc... from a private sector/multi-box environment they can share or point me in the direction of? All of my experience comes from the public sector/Law Enforcement so this a different world.
Avatar
Avatar
goalguy
Hey everyone, does anybody have some example reports, report templates, resources, etc... from a private sector/multi-box environment they can share or point me in the direction of? All of my experience comes from the public sector/Law Enforcement so this a different world.
Andrew Rathbun 6/2/2022 8:03 AM
@holly this might be something to consider for the roadmap with your project in #dfir-open-source-projects (edited)
👍 1
8:04 AM
wrong person, pinging @holly
Avatar
Brian Carrier 6/2/2022 9:16 AM
Apologies if you already saw this, but we are pausing OSDFCon this year and instead doing an event focused on Investigating Ransomware Attacks. Same style event as OSDFCon (30-minute, technical talks), but with a focus on the type of attack vs. type of tool. In-person. DC(ish). Sept 13. The CFP is open until June 10, so please submit if you have Ransomware-related knowledge to share. https://cyberrespondercon.com/call-for-presentations/
We invite all cyber responders and DFIR investigators who have ransomware experience to submit a presentation by June 10, 2022. This is a unique opportunity to share your knowledge and help follow responders.
Avatar
Deleted User 6/2/2022 9:25 AM
Got a micro sd from a Merkury security camera. Files show type “.data”. Shows on Cellebrite as uncategorized. Any idea how to open these files?
Avatar
Avatar
Deleted User
Got a micro sd from a Merkury security camera. Files show type “.data”. Shows on Cellebrite as uncategorized. Any idea how to open these files?
melissa_at_amped 6/2/2022 9:27 AM
Amped FIVE can interpret some .data files.
Avatar
Avatar
Deleted User
Got a micro sd from a Merkury security camera. Files show type “.data”. Shows on Cellebrite as uncategorized. Any idea how to open these files?
melissa_at_amped 6/2/2022 9:27 AM
I'll message you!
Avatar
Avatar
Brian Carrier
Apologies if you already saw this, but we are pausing OSDFCon this year and instead doing an event focused on Investigating Ransomware Attacks. Same style event as OSDFCon (30-minute, technical talks), but with a focus on the type of attack vs. type of tool. In-person. DC(ish). Sept 13. The CFP is open until June 10, so please submit if you have Ransomware-related knowledge to share. https://cyberrespondercon.com/call-for-presentations/
Will the talks still be recorded for viewing later by people who are unable to attend in person?
Avatar
Avatar
Tcisaki
Will the talks still be recorded for viewing later by people who are unable to attend in person?
Brian Carrier 6/2/2022 11:36 AM
Yes. We'll record and post them.
Avatar
Avatar
Brian Carrier
Yes. We'll record and post them.
Thanks! Always love the stuff that comes out of OSDFCon, so I am sure this will be the same
Avatar
Adam Cervellone 6/2/2022 12:57 PM
Does anyone have any good recommendations for good forensic office furniture? Looking for a desk that can accommodate two forensic computers, a laptop with monitors and docking station as well as some sort of work bench/desk for processing cell phones, DVRs, etc... Budget of $1500-$2000 give or take (edited)
Avatar
@Adam Cervellone We use Workrite https://workriteergo.com/fundamentals-ex-lx-electric/, you can also just buy the sit/stand raise part and add it to any desk by removing the legs and at the power system too it.
Fundamentals sit stand desk features an integrated computerized control and is one of the most energy efficient tables in the industry.
❤️ 1
Avatar
Anyone have any information about Tile devices ? Extracting and obtaining information from the tile fobs ?
Avatar
Humble#2244 6/2/2022 2:25 PM
Anyone in the group uses Encase for their investigations?
Avatar
Avatar
Humble#2244
Anyone in the group uses Encase for their investigations?
Andrew Rathbun 6/2/2022 2:25 PM
Not anymore
Avatar
Humble#2244 6/2/2022 2:26 PM
should I assume that you are still familiar with it?
Avatar
Andrew Rathbun 6/2/2022 2:26 PM
What question do you have? Someone surely can help you here
2:27 PM
also, would be a better question for #computer-forensics, I'm guessing
Avatar
Humble#2244 6/2/2022 2:27 PM
ok, I'll post in computer forensics section
2:28 PM
wasn't really sure where to ask so thought of general
Avatar
Hey guys, quick one, I have to run a PowerShell script on some of our hosted boxes, and it requires us to allow remote signed. Do you think this will trigger Carbon Black EDR or red canary MDR?
Avatar
Avatar
malrker
Hey guys, quick one, I have to run a PowerShell script on some of our hosted boxes, and it requires us to allow remote signed. Do you think this will trigger Carbon Black EDR or red canary MDR?
Andrew Rathbun 6/2/2022 8:13 PM
Only one way to find out 😛
😆 2
Avatar
Test it, in PRODUCTION!
😂 2
Avatar
Avatar
Tcisaki
Test it, in PRODUCTION!
We actually do this 😬
Avatar
Avatar
Matt
We actually do this 😬
Digitalferret 6/3/2022 6:05 AM
if Micro$oft do, everyone else should 🙂
🤣 1
Avatar
Avatar
Andrew Rathbun
@holly this might be something to consider for the roadmap with your project in #dfir-open-source-projects (edited)
Definitely. @goalguy, check it out and see if it might be of interest to you!
Avatar
kartoffel4n6 6/3/2022 11:39 AM
How do people Feel about AD Enterprise VS. Axiom Cyber? Any other tool/competitor out there you like more?
Avatar
iOS sync question. If a user has a MacBook and an iPhone both signed into the same account, will the KnowledgeC.db sync across both devices? So if both devices are connected to the internet, would I see KnowledgeC.db entries on the MacBook from when they were using their iPhone?
🤔 1
Avatar
Just a reminder that big tech will bow to totalitarian human rights abuses if the money is right. I'm tired of repeating the same rant. You get the idea. https://mobile.twitter.com/GossiTheDog/status/1533136202303516672
33rd anniversary of Tiananmen Square massacre. Bing vs Google.
Likes
414
Retweets
123
💯 2
6:10 PM
Just google “tainanmen square meat pie” and look for the British embassy cable. It’s heartbreaking.
6:10 PM
The biggest threat to Chinese people is Chinese government but hey they’re the victims of the evil west so sure. Whatever.
Avatar
Avatar
conf1ck3r
Just a reminder that big tech will bow to totalitarian human rights abuses if the money is right. I'm tired of repeating the same rant. You get the idea. https://mobile.twitter.com/GossiTheDog/status/1533136202303516672
Digitalferret 6/5/2022 12:16 AM
it's almost always about the money. so much on sexual child abuse, so little about child employment abuse; big names right down to subcontinent brick factories
12:17 AM
then "lobbying" .. you could cry
Avatar
Hello everybody!! I was wondering what GPUs are you using for your forensic workstation? I was just researching the market but I also wanted to know your opinion about it. Thanks in advance :)
Avatar
Avatar
kartoffel4n6
How do people Feel about AD Enterprise VS. Axiom Cyber? Any other tool/competitor out there you like more?
Not a tool endorsement or saying that I like it better but F-Response has been around for awhile and may be good for your needs depending on what they are.
Avatar
Avatar
ZetLoke77
Hello everybody!! I was wondering what GPUs are you using for your forensic workstation? I was just researching the market but I also wanted to know your opinion about it. Thanks in advance :)
We're just upgrading our machines and getting NVIDIA T1000s. However we have a separate rig for password cracking so we don't need a crazy powerful GPU
Avatar
Hi all, has anyone done research or case work into files held on iOS devices in the following location: Media/PhotoData/CPL/Storage/filecache/XXX This relates to iOS v15.1. I wish to understand this further for some case work I am working on, so if anyone can assist me then I would be most appreciative. Thank you!
8:33 AM
As a side note, I am aware that CPL relates to Cloud Photo Library, I just wish to understand the existence of this file path on the device better.
Avatar
Avatar
Alex Owen
Hi all, has anyone done research or case work into files held on iOS devices in the following location: Media/PhotoData/CPL/Storage/filecache/XXX This relates to iOS v15.1. I wish to understand this further for some case work I am working on, so if anyone can assist me then I would be most appreciative. Thank you!
Andrew Rathbun 6/7/2022 10:53 AM
#mobile-forensic-decoding
Avatar
Looking for some feedback on a basic flowchart for my patrol officers. Could I get some feedback if there is something else that should be done differently? I am trying to keep it basic.
👍 6
🔥 4
Salute 1
Avatar
Avatar
mitchlang
Looking for some feedback on a basic flowchart for my patrol officers. Could I get some feedback if there is something else that should be done differently? I am trying to keep it basic.
Andrew Rathbun 6/7/2022 1:16 PM
Really awesome, nice work!
Avatar
Avatar
Andrew Rathbun
Really awesome, nice work!
wow, thanks Andrew. Appreciate that.
Avatar
Avatar
mitchlang
Looking for some feedback on a basic flowchart for my patrol officers. Could I get some feedback if there is something else that should be done differently? I am trying to keep it basic.
Might be technical, but idk if you want to try and ascertain whether its in BFU or AFU mode by what's stated on the passcode entry screen?
2:25 PM
I would also suggest they turn off wifi / bluetooth where possible as those result in chances where a wipe signal could reach the phone. (edited)
Avatar
Avatar
Rob
I would also suggest they turn off wifi / bluetooth where possible as those result in chances where a wipe signal could reach the phone. (edited)
Yes, I couldn't agree more. I had a lot more in it about 30 mins ago and I considered just that. Then I was like just plug it in if it is on... I was going to make another based flow chart based on Lee Reiber's work. (edited)
Avatar
Avatar
mitchlang
Looking for some feedback on a basic flowchart for my patrol officers. Could I get some feedback if there is something else that should be done differently? I am trying to keep it basic.
I don't like turning the device off with a known password... The apps shut down and pending database changes are committed. Plus there's the chance that secure boot on android has a different passcode than the lock screen so you might be locking your device. I have my officers turn on airplane, turn wifi and bluetooth off and then still stick it in a faraday bag. Asking the officers to record IMEI may "force" them to pull a battery or remove a SIM to find the IMEI... might just include some CYA language like "If available without manipulating the device..." Other than that, just a few grammar things to look over to make it pretty
👍🏼 4
Avatar
Avatar
whee30
I don't like turning the device off with a known password... The apps shut down and pending database changes are committed. Plus there's the chance that secure boot on android has a different passcode than the lock screen so you might be locking your device. I have my officers turn on airplane, turn wifi and bluetooth off and then still stick it in a faraday bag. Asking the officers to record IMEI may "force" them to pull a battery or remove a SIM to find the IMEI... might just include some CYA language like "If available without manipulating the device..." Other than that, just a few grammar things to look over to make it pretty
Those are great points and replacements. I'll make some corrections.
Avatar
Avatar
mitchlang
Looking for some feedback on a basic flowchart for my patrol officers. Could I get some feedback if there is something else that should be done differently? I am trying to keep it basic.
Deleted User 6/7/2022 4:50 PM
Looks very cool, and simple! Also, thank you for all you do and for keeping people safe!! (edited)
Avatar
Avatar
mitchlang
Those are great points and replacements. I'll make some corrections.
DeeFIR 🇦🇺 6/7/2022 4:54 PM
Have you seen https://draw.io? It might help you break out some of the sub steps to make it easier to follow/visualise.
Avatar
Avatar
DeeFIR 🇦🇺
Have you seen https://draw.io? It might help you break out some of the sub steps to make it easier to follow/visualise.
Yeah, this is great. I use it for my python projects
Avatar
Hey, shot in the dark, but does anybody have a search warrant to get a live intercept on Snapchat they'd be willing to share with me?
Avatar
Avatar
mitchlang
Looking for some feedback on a basic flowchart for my patrol officers. Could I get some feedback if there is something else that should be done differently? I am trying to keep it basic.
I'm thinking over this kind of thing for our own patrol -- is there money available to issue officers (or at least the shift) a little digital evidence response kit? Faraday bag, a couple cables, a battery? That cuts down a lot of your if-then
Avatar
Avatar
holly
I'm thinking over this kind of thing for our own patrol -- is there money available to issue officers (or at least the shift) a little digital evidence response kit? Faraday bag, a couple cables, a battery? That cuts down a lot of your if-then
I got around part of the budget on mine by issuing a few sets to the squad supervisors instead of outfitting every officer. Seems like the best time to ask is either right at the beginning of budget year when the coffers are full or right near the end when excess money needs to be spent.
Avatar
Avatar
holly
I'm thinking over this kind of thing for our own patrol -- is there money available to issue officers (or at least the shift) a little digital evidence response kit? Faraday bag, a couple cables, a battery? That cuts down a lot of your if-then
Sometimes, it really depends. I hear a lot of agencies do not commit a lot of a resources to DFIR evidence programs.
12:56 PM
So it depends.
Avatar
hi guys, im new to this server and I have questions about forensics tools
7:15 PM
dont anyone ever still using rekall forensics?
7:15 PM
what is it nowadays?
7:16 PM
ill try in incident response or memory forensics
Avatar
Anyone here familiar with setting up drone relays? DJI
Avatar
Avatar
Cyx2
hi guys, im new to this server and I have questions about forensics tools
randomaccess 6/9/2022 2:30 AM
Rekall is dead
Avatar
Does anyone know of any script or program where i can scan/lookup hundreds of ip addresses and then filter by country? (edited)
Avatar
Avatar
R3V3R53
Does anyone know of any script or program where i can scan/lookup hundreds of ip addresses and then filter by country? (edited)
Hi, I can provide you with a Python script that I made last year as an assignment for a masters degree (so it's not extensively tested and I didn't maintain it since then). It scans all text files from a folder, extract unique valid IPs (v4 dot decimal notation and v6 standard notation) and check them against WhoIs, TOR and location (based on a free (and not too reliable) service). It outputs txt, csv and kml files. The script is not too complex and it has a little over 400 lines, including comments. You may need to adjust it to your needs and maybe fix some broken dependencies. Let me know if you don't find anything else and are interested in my script.
Avatar
@Cip sounds interesting. Mind sharing this to others?
Avatar
Avatar
fraser
@Cip sounds interesting. Mind sharing this to others?
Sure! I also included the document that explains everything about the script.
👏 3
👍 2
🙌 1
Avatar
Avatar
Cip
Hi, I can provide you with a Python script that I made last year as an assignment for a masters degree (so it's not extensively tested and I didn't maintain it since then). It scans all text files from a folder, extract unique valid IPs (v4 dot decimal notation and v6 standard notation) and check them against WhoIs, TOR and location (based on a free (and not too reliable) service). It outputs txt, csv and kml files. The script is not too complex and it has a little over 400 lines, including comments. You may need to adjust it to your needs and maybe fix some broken dependencies. Let me know if you don't find anything else and are interested in my script.
Thanks Cip, appreciate your sharing. Will look into it 🙂
👍 1
Avatar
Thanks @Cip!
👍 1
Avatar
Click for full downloadable/printable image.
👍 4
🔥 1
Avatar
in NTFS tunneling, anyone know if overwriting file A with file B will inherit anything other than the file create timestamp and short name? ik it creates a new entry in the MFT so I assume it's treated as a separate file.
CattoCry 1
Avatar
Avatar
holly
I'm thinking over this kind of thing for our own patrol -- is there money available to issue officers (or at least the shift) a little digital evidence response kit? Faraday bag, a couple cables, a battery? That cuts down a lot of your if-then
AngryRabbit 6/9/2022 11:59 AM
If you can't get money for faraday bags, the Army approach is a roll of tinfoil and some duct tape. It's obviously not ISO approved but it's pretty cost effective (and may shame the bean counters into giving you Faraday bags). We just tell officers flight mode or SIM out since very few mobiles where losing AFU matters don't have externally accessible SIM cards. It also reduces the temptation to have a quick look when they have the phone unlocked.
Avatar
Avatar
babybat
in NTFS tunneling, anyone know if overwriting file A with file B will inherit anything other than the file create timestamp and short name? ik it creates a new entry in the MFT so I assume it's treated as a separate file.
Humble#2244 6/9/2022 12:59 PM
I might be wrong but every file we create is a new file itself but in tunneling it just acquires some of filename and standard attributes of previous file
Avatar
Avatar
Humble#2244
I might be wrong but every file we create is a new file itself but in tunneling it just acquires some of filename and standard attributes of previous file
yes which is why I'm interested in if it acquires anything else outside of timestamp
Avatar
Humble#2244 6/9/2022 1:04 PM
Is it safe to say that the way mobile device's acquisition work, they don't need to be write blocked or in some cases can't be write blocked to acquire the physical or logical image?
Avatar
Avatar
babybat
yes which is why I'm interested in if it acquires anything else outside of timestamp
Humble#2244 6/9/2022 1:05 PM
if you are concerned with data attribute then I would say no, every file has its own data
Avatar
Avatar
Humble#2244
if you are concerned with data attribute then I would say no, every file has its own data
less worried about the data itself, moreso interested in the metadata that's inherited
Avatar
Avatar
AngryRabbit
If you can't get money for faraday bags, the Army approach is a roll of tinfoil and some duct tape. It's obviously not ISO approved but it's pretty cost effective (and may shame the bean counters into giving you Faraday bags). We just tell officers flight mode or SIM out since very few mobiles where losing AFU matters don't have externally accessible SIM cards. It also reduces the temptation to have a quick look when they have the phone unlocked.
I have a roll of tinfoil at my desk. 5-7 wraps will do it 🙂
Avatar
Avatar
Humble#2244
Is it safe to say that the way mobile device's acquisition work, they don't need to be write blocked or in some cases can't be write blocked to acquire the physical or logical image?
DeeFIR 🇦🇺 6/9/2022 4:37 PM
Correct. Considering for example that logical/agent acquisitions actually involve writing data to the device (uploading an agent, or sending adb commands etc) then if you were to have something blocking that, you wouldn't be able to acquire any data.
Avatar
Does anyone know, on Android, is there any other reason a Snapchat video would show up in the /Snapchat folder on the media share OTHER than holding the video down in your chat view and selecting save to gallery? I'm trying to find how some of these videos exist. All I can recreate is having the files on my phone when I do this action. Whether I sent a video to someone then saved my own video, or saved a video sent to me, it goes into that folder with a random number appended. Just curious if there are other ways for these files to exist?
Avatar
Does an Apple Watch allow remote wipe? Should Apple Watches be removed from suspects upon entering residence during search warrant?
Avatar
Question for @Cellebrite or if anyone knows the answer. Is there a quick guide floating around in how to use reader? I would like to give something to detectives as a quick reference in navigating the tool. I know there's a reader course but I'm just looking for a quick guide.
Avatar
Avatar
RyanB
Does an Apple Watch allow remote wipe? Should Apple Watches be removed from suspects upon entering residence during search warrant?
In the Settings>General>Reset it only shows the option to wipe the watch itself. Of course, on the iPhone you have the option to wipe the watch. There are no options on the watch to sign out of the Apple ID account or turn off Find My iPhone. Seems that the watch cannot wipe the iPhone...someone correct me if I'm wrong.
Avatar
Avatar
dfir-rick
Question for @Cellebrite or if anyone knows the answer. Is there a quick guide floating around in how to use reader? I would like to give something to detectives as a quick reference in navigating the tool. I know there's a reader course but I'm just looking for a quick guide.
I belive there is a "certification" under the cellebrite learning website just for reader. I'm not sure if that video is downloadable by saving it locally and distributing it otherwise everyone would need to sign up for the platform.
Avatar
Avatar
Neon
I belive there is a "certification" under the cellebrite learning website just for reader. I'm not sure if that video is downloadable by saving it locally and distributing it otherwise everyone would need to sign up for the platform.
@dfir-rick Everything is pretty old from what I recall, and the certification Cellebrite Reader has you have to pay for.
Avatar
Avatar
DCSO
@dfir-rick Everything is pretty old from what I recall, and the certification Cellebrite Reader has you have to pay for.
Really!? I could have sworn that was free but it has been several years since I've looked at it
Avatar
Avatar
DCSO
@dfir-rick Everything is pretty old from what I recall, and the certification Cellebrite Reader has you have to pay for.
Yep absolutely right $299 for reader. That's wild
Avatar
Avatar
Neon
Really!? I could have sworn that was free but it has been several years since I've looked at it
That reader course was free not long ago. I appreciate the replies.
Avatar
Thanks Paul!
Avatar
Do we have anyone who works for the US Postal Inspector on the server?
Avatar
RyanAllegra 6/13/2022 10:58 AM
Hi guys, I am curious, does anyone know a viewer that can examine .RAW files generated from printers, other than a hex editor? The only programs I see are from cameras
Avatar
if you run file or binwalk against the file, what does it say?
👆 1
11:02 AM
I sort of expect them to be postscript files, but I am not familiar with the full context of where they came from
11:04 AM
so maybe a postscript renderer/viewer or alternatively maybe a PCL viewer
uochaos started a thread. 6/13/2022 1:10 PM
Avatar
Besides DidierStevensSuite can anyone recommend any other good tooling to pull apart phishing emails ?
Avatar
Avatar
DeLF
Besides DidierStevensSuite can anyone recommend any other good tooling to pull apart phishing emails ?
oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging. - GitHub - decalage2/oleto...
👍 1
Avatar
Does anyone know of any suicide keyword lists please?
👀 1
Avatar
Avatar
pinball
Does anyone know of any suicide keyword lists please?
Andrew Rathbun 6/14/2022 1:32 AM
Maybe a good idea for another #dfir-open-source-projects
Avatar
Avatar
DeLF
Besides DidierStevensSuite can anyone recommend any other good tooling to pull apart phishing emails ?
before moving to cofense triage, I would usually use msgconvert if it was forwarded as msg, then emldump from didier to drop the objects out
👍 1
Avatar
Where I can learn about digital forensics physically tools is there any course, explain that thing I can't buy this equipment it is very expensive and not allowed in my country
Avatar
Avatar
MR.Falcon
Where I can learn about digital forensics physically tools is there any course, explain that thing I can't buy this equipment it is very expensive and not allowed in my country
Look at the #training-education-employment feed, you're questions might be answered in that. (edited)
Avatar
Avatar
MR.Falcon
Where I can learn about digital forensics physically tools is there any course, explain that thing I can't buy this equipment it is very expensive and not allowed in my country
Digitalferret 6/15/2022 11:55 AM
on account of me obviously being too stupid to have noticed our DFIR-science channel content i'd just like to plug the entire site/channel. what a fabulous resource. https://dfir.science/ and https://www.youtube.com/c/DFIRScience #dfir-science this pinned anyplace @Andrew Rathbun
Avatar
Avatar
Digitalferret
on account of me obviously being too stupid to have noticed our DFIR-science channel content i'd just like to plug the entire site/channel. what a fabulous resource. https://dfir.science/ and https://www.youtube.com/c/DFIRScience #dfir-science this pinned anyplace @Andrew Rathbun
I already watched all the videos I want something different with all due respect
Avatar
Digitalferret 6/15/2022 12:52 PM
"all the videos" ?
12:52 PM
all?
12:53 PM
i have some catching up to do, maybe you should give links for me 🤣
🤣 1
Avatar
Avatar
MR.Falcon
I already watched all the videos I want something different with all due respect
Digitalferret 6/15/2022 12:54 PM
maybe list what you have found and where it is short of information that you need. "all" is quite big
Avatar
Is anyone familiar with any successful, in the wild criminal uses of NFC replay attacks targeting digital payment platforms?
Avatar
data_grizzly 6/15/2022 5:15 PM
Howdy! Does anyone here specialize in video enhancement? I have a Ring video we need enhanced, have footage of suspects but their faces are lower res than needed to identify. Interested in recommended video enhancement software, but would rather hire an expert to handle case instead 🙂 PM Me
Avatar
Avatar
data_grizzly
Howdy! Does anyone here specialize in video enhancement? I have a Ring video we need enhanced, have footage of suspects but their faces are lower res than needed to identify. Interested in recommended video enhancement software, but would rather hire an expert to handle case instead 🙂 PM Me
Andrew Rathbun 6/15/2022 5:53 PM
#dvr-multimedia-surveillance
Avatar
data_grizzly 6/15/2022 5:54 PM
Thank you @Andrew Rathbun !
Avatar
I want to start analyzing a malware sample do you recommend any OS to do the analyzing process
11:40 PM
However, I have only 8GB of RAM
Avatar
Avatar
MR.Falcon
However, I have only 8GB of RAM
randomaccess 6/16/2022 2:01 AM
Linux Vms run on much less than windows so you should be fine. Download the remnux VM and work through some of the online tutorials for malware analysis
Avatar
I want to do both DF and Malware analysis than you ( by the way)
Avatar
randomaccess 6/16/2022 2:03 AM
Ok. Suggest picking something and starting with it. Rather than trying to do everything at once.
2:05 AM
Lots of free reading and watching material. The SANS ransowmare summit is today even and it's free
Avatar
Thank you I will take remnux at the beginning (edited)
2:20 AM
One more thing
2:23 AM
I am watching a series CSI and in the second episode during the investigation, they found a laptop and put it in a weird device to scan the laptop using X-rays. does this happen in real life ?
Avatar
Avatar
MR.Falcon
I am watching a series CSI and in the second episode during the investigation, they found a laptop and put it in a weird device to scan the laptop using X-rays. does this happen in real life ?
randomaccess 6/16/2022 2:53 AM
I'm going to say no but the answer is technically "maybe in very specific cases that are likely not what they showed on tv" The only time I know x-rays are used are when assessing or reverse engineering electronics components
2:55 AM
CSI cyber showed a lot of stuff that isn't real. Maybe 1% of the stuff was close to right
💯 1
Avatar
The case was they found a photo burned on the laptop cover so they did the scan to extract that photo and print the photo after that but it in ice the hold the paper air so the photo will be seen
Avatar
Avatar
randomaccess
CSI cyber showed a lot of stuff that isn't real. Maybe 1% of the stuff was close to right
But forensics non-technology things are real right?
Avatar
randomaccess 6/16/2022 2:58 AM
Absolutely no idea
2:59 AM
Mostly I'd ignore what you see on tv. Although Mr. Robot tried to be more legit in its hacking stuff
👆 3
Avatar
Avatar
Digitalferret
"all the videos" ?
Not all but the last 10 videos talk about writer's block and other physical tools
Avatar
Avatar
randomaccess
Absolutely no idea
They seem to be real using biology science and a microscope
Avatar
Hey has anyone taken SANS for401 course, have got it coming up in a month or so and would just like to pick the brains of someone who'd taken it
Avatar
Avatar
MR.Falcon
But forensics non-technology things are real right?
Digitalferret 6/16/2022 8:36 AM
check youtube for videos about "what <some film> got wrong" . people joined up to fly off the back of the 1986 topgun before they realised it was pretty much fantasy. real forensic companies still make jokes about [Enhance] (when the actors say enhance and a pixel becomes a crystal clear picture of a mans face. and more
8:37 AM
laptops are picked up and an Intern says, "i'll just write a program in visual basic and get us in" <password hack> . the list is endless
8:38 AM
and whatever you do. DO NOT put electrical devices in a freezer to make them work again.
Avatar
Is anyone using any creative ways to write reports and track stats? I have type reports in a (terrible) records manage system for every device. Right now I just use a word template and copy and paste it into the RMS. What I would like to do come up with a report template that will also track info such as statistics, make/models of unsuccessful phones, pins, etc. A big bonus would be if it could be used to fill out FPR’s. I looked at some of the commercial solutions but they were too expensive and duplicated some features (evidence intake) that I already have.
Avatar
Avatar
data_grizzly
Howdy! Does anyone here specialize in video enhancement? I have a Ring video we need enhanced, have footage of suspects but their faces are lower res than needed to identify. Interested in recommended video enhancement software, but would rather hire an expert to handle case instead 🙂 PM Me
Semantics 21 (Tom) 6/16/2022 8:58 AM
Just PM'ed you 🙂
Avatar
Avatar
Digitalferret
and whatever you do. DO NOT put electrical devices in a freezer to make them work again.
😂
Avatar
Semantics 21 (Tom) 6/16/2022 9:08 AM
Sorry can't find the original post asking about imaging multiple devices, but hopefully you'll see this post. We've now added image stacking (X-Ways) to the S21 Jedson Tech Streamline app. Image & Process in X-Ways Forensics, export via Jedson Tech and Review media in LASERi-X, all automated in one GUI. https://videos.semantics21.com/v/9OIROqUDVGzCDZ0GHmTuRanVW
Shared with Jumpshare
Avatar
digital Bowles 6/16/2022 10:24 AM
I have a cold death case from 2018 brought to me. I have a possible cell phone number for the victim, if I check the number carrier now how likely would it be the same carrier from 2018? I may have follow questions to this post as it going. Thanks for any help, this is a learning experience for me and my agency.
Avatar
John Jarocki 6/16/2022 10:46 AM
Hi All, Is anyone here available in the Phoenix area to do some forensics work on a private matter? This is for a non-profit that a friend of mine is involved with. Please DM me if you are interested!
Avatar
Avatar
randomaccess
CSI cyber showed a lot of stuff that isn't real. Maybe 1% of the stuff was close to right
What about the episode of Bones where they scan bones and the markings upload malware into the system? I know a guy who is buddies with someone that happened to.
Avatar
Avatar
digital Bowles
I have a cold death case from 2018 brought to me. I have a possible cell phone number for the victim, if I check the number carrier now how likely would it be the same carrier from 2018? I may have follow questions to this post as it going. Thanks for any help, this is a learning experience for me and my agency.
Andrew Rathbun 6/16/2022 1:12 PM
Try FoneFinder and see what carrier owns that number NOW and then contact them asking if that number was owned by them back in 2018?
1:13 PM
I think I've had it before where I was able to ask a carrier if they owned a number and they said "no but X carrier does"
💯 1
Avatar
I tried using the global search but I cant find it. Does anyone have a flow chart for mobile devices? Basically something basic patrol can utilize.
Avatar
Avatar
dfir_rick
I tried using the global search but I cant find it. Does anyone have a flow chart for mobile devices? Basically something basic patrol can utilize.
Digitalferret 6/16/2022 3:02 PM
Avatar
trying to help out a BCERT buddy, i'll send him this one. Thank you!
👍🏻 1
Avatar
Avatar
dfir_rick
trying to help out a BCERT buddy, i'll send him this one. Thank you!
Digitalferret 6/16/2022 3:06 PM
maybe ping Mitch or DM, i think it was a WIP, i found the next iteration but there's likely more. https://mtdfe.com/blogs/frequently-asked-questions/patrol-investigators-mobile-device-flowchart (edited)
Click for full downloadable/printable image.
Avatar
Avatar
Digitalferret
maybe ping Mitch or DM, i think it was a WIP, i found the next iteration but there's likely more. https://mtdfe.com/blogs/frequently-asked-questions/patrol-investigators-mobile-device-flowchart (edited)
Perfect, thank you! I found a couple other things to help my buddy out. He's teaching a quick course to the new guys at his PD.
Avatar
Carb0hydrates 6/16/2022 6:22 PM
Hey everyone! Hoping someone has encountered this before. I am collecting records from a 3rd party medical software provider. They provided our client with a .bak of what I can only assume is a sqlite DB on their end. I have tried every software I have and cannot get this .bak file to open or to restore out. The company I'm collecting from says most people hire "Database Administrators" who restore the backup out to HTML format, but I have had no success. Any suggestions would be greatly appreciated!
Avatar
Avatar
Carb0hydrates
Hey everyone! Hoping someone has encountered this before. I am collecting records from a 3rd party medical software provider. They provided our client with a .bak of what I can only assume is a sqlite DB on their end. I have tried every software I have and cannot get this .bak file to open or to restore out. The company I'm collecting from says most people hire "Database Administrators" who restore the backup out to HTML format, but I have had no success. Any suggestions would be greatly appreciated!
Arman Gungor 6/16/2022 6:53 PM
I would start by looking at the file header to see if it is consistent with SQLite. If it's not SQLite, perhaps it is a database backup since they mentioned hiring a DB administrator.
Avatar
Avatar
Carb0hydrates
Hey everyone! Hoping someone has encountered this before. I am collecting records from a 3rd party medical software provider. They provided our client with a .bak of what I can only assume is a sqlite DB on their end. I have tried every software I have and cannot get this .bak file to open or to restore out. The company I'm collecting from says most people hire "Database Administrators" who restore the backup out to HTML format, but I have had no success. Any suggestions would be greatly appreciated!
DeeFIR 🇦🇺 6/16/2022 6:55 PM
.bak is typically MSSQL (of course a file extension can mean anything, obviously). Have a look at restoring backups with SQL Express (edited)
👍 1
Avatar
Avatar
DeeFIR 🇦🇺
.bak is typically MSSQL (of course a file extension can mean anything, obviously). Have a look at restoring backups with SQL Express (edited)
Arman Gungor 6/16/2022 6:57 PM
That would be my first guess as well without additional context.
Avatar
DeeFIR 🇦🇺 6/16/2022 6:57 PM
6:58 PM
You want context!?
🤣 1
😆 1
Avatar
Carb0hydrates 6/16/2022 7:01 PM
lol well thank you guys for the suggestions! I'll get crackin' and see if I can't get SQL Express working
Avatar
DeeFIR 🇦🇺 6/16/2022 8:09 PM
What's the file header first?
8:09 PM
Don't leave us hanging
Avatar
Avatar
whee30
What about the episode of Bones where they scan bones and the markings upload malware into the system? I know a guy who is buddies with someone that happened to.
randomaccess 6/16/2022 10:05 PM
I don't remember that episode. I do remember the one where the computer hacker rented books from the library and used that to hack things. That was weird
Avatar
Carb0hydrates 6/17/2022 9:06 AM
@DeeFIR 🇦🇺 You nailed it: "MSSQLBAK"
Avatar
Avatar
digital Bowles
I have a cold death case from 2018 brought to me. I have a possible cell phone number for the victim, if I check the number carrier now how likely would it be the same carrier from 2018? I may have follow questions to this post as it going. Thanks for any help, this is a learning experience for me and my agency.
I’ll send you a DM.
Avatar
Avatar
Carb0hydrates
@DeeFIR 🇦🇺 You nailed it: "MSSQLBAK"
Arman Gungor 6/17/2022 11:35 AM
Thanks for reporting back! 👍🏻
Avatar
Anyone know anything about Google Drive File Stream? and if the cache files are readable? (edited)
Avatar
Hello all. I used OSForensics to create a virtual machine of my E01 file and it booted to the BitLocker screen and says to "Plug in the USB drive that has the BitLocker key". I previously used Magnet Axiom to process the drive and did so without any issues and no mention of bitlocker. I searched Axiom for bitlocker recovery keys and found nothing of value. What's going on here?
Avatar
Avatar
Carb0hydrates
@DeeFIR 🇦🇺 You nailed it: "MSSQLBAK"
randomaccess 6/17/2022 6:38 PM
I just did a job with an mssql backend - installed mssql then imported the database. Used heidisql to connect to it and run queries.
6:39 PM
Took a bit of explaining to get my head around it but I couldn't use a viewer to "open the database" like you can with sqlite. Had to create a blank database with mssql and then reapply the backup to it, and tada it was there.
Avatar
Carb0hydrates 6/17/2022 6:57 PM
Oh my gosh!
6:57 PM
Thank you for your insight, I was struggling with this all day!
6:58 PM
@randomaccess
Avatar
randomaccess 6/17/2022 6:59 PM
No worries. I wouldn't have figured it out without @Yogesh Khatri.
Avatar
Ross Donnelly 6/18/2022 7:41 AM
🤓 3
🤣 3
💯 1
Avatar
Avatar
Ross Donnelly
Click to see attachment 🖼️
Digitalferret 6/18/2022 8:31 AM
this is the way 🙂
Avatar
Dr. Kaan Gündüz 6/18/2022 11:37 PM
this the way we connect people
Avatar
I am new in digital forensics the question is what does digital devices counter look like ?
Avatar
Avatar
MR.Falcon
I am new in digital forensics the question is what does digital devices counter look like ?
Andrew Rathbun 6/19/2022 8:40 AM
I'm not sure what you mean by counter?
Avatar
I mean the box you put digital devices in
Avatar
Avatar
MR.Falcon
I mean the box you put digital devices in
DeeFIR 🇦🇺 6/19/2022 4:57 PM
A faraday box?
Avatar
unrelated but shout-out to @Arsenal Recon and AIM for letting us ressurect our on-prem DC long enough to get roles transferred over cleanly to another box. The launch VM from e01 is super neat and saved me like a week's worth of headache, I only wish I tried it sooner lol
👍 3
Avatar
Avatar
DeeFIR 🇦🇺
A faraday box?
I guess so
Avatar
DeeFIR 🇦🇺 6/19/2022 11:34 PM
You’re the one asking. What exactly are you asking?
Avatar
Wait second sir
11:37 PM
I want to know what digital devices contender look like
Avatar
Avatar
MR.Falcon
I want to know what digital devices contender look like
Describe the process you're referring to? What's your desired outcome? Are you referring to something for mobile devices or computers or something else?
Avatar
Mobile and computer
12:13 AM
Thank you sir for u help
Avatar
We need a bit more info as to what you actually need to know about: are you looking for examples of how to package and store devices? Or something like a faraday environment to prevent a device connecting to some kind of network?
Avatar
Sounds like how to get data to me from a mobile/computer via write blocker or similar?
Avatar
Ross Donnelly 6/20/2022 3:29 AM
Any UK sales reps for @Cellebrite here? Our old rep has left and I haven't been able to get a response elsewhere yet (admittedly it's only been a few days of trying)
📬 1
Avatar
Avatar
OllieD
We need a bit more info as to what you actually need to know about: are you looking for examples of how to package and store devices? Or something like a faraday environment to prevent a device connecting to some kind of network?
Yeah that thing
4:51 AM
Sorry guys for distributing you and thank you for answering my question
Avatar
Avatar
MR.Falcon
Yeah that thing
You'll need to give a little more detail, which of the two options in my previous message do you need to know more about? Packaging? Or Faraday?
Avatar
Packaging
4:57 AM
Sorry I didn't make the question clear for you it is my first time asking this kind of question most of the time I google it and find the answer alone
👍 1
Avatar
Avatar
OllieD
You'll need to give a little more detail, which of the two options in my previous message do you need to know more about? Packaging? Or Faraday?
Digitalferret 6/20/2022 5:08 AM
\\/// (edited)
Avatar
Avatar
MR.Falcon
Sorry I didn't make the question clear for you it is my first time asking this kind of question most of the time I google it and find the answer alone
That's ok!
5:12 AM
There are various options, two of which I've seen used are collapsible cardboard boxes, or weapons tubes
5:12 AM
180mm x 110mm x 65mm, Cardboard, clear plastic window, flat-packed with insert, mobile phone box. Used for the forensic recovery of a mobile telephone handset or similar type device. Can be provided as ISO 18385:2016 – Forensic DNA Grade. The boxes are in packs of 25, but can be purchased in varying quantities in heavy
5:12 AM
Clear Plastic, twist, cylindrical weapons tubes. Used for the collection of rigid evidence without pointed or sharp edges. The tubes are available as single items, but can be purchased in varying quantities in heavy duty re-sealable bags to assist in the conformity to ISO 17020:2012
5:13 AM
Those would work for mobiles
5:13 AM
For computers, I often see them seized just in a large plastic evidence bag with a security seal on it
Avatar
Thank you sir for your help
👍 1
5:29 AM
Do you mind if I ask one more question
👍 1
5:34 AM
if I want to build my own tool for digital forensics what is the programming language you suggest to me and (ideas for tools already some people made ) I will try to build the same tools to improve my knowledge
Avatar
For simple tools/scripts, python is a good way to go
5:36 AM
Depends on use case though: I've seen some great code written in Rust, Golang etc etc
5:37 AM
Plenty of people on here who are regular contributors to some great open-source projects who might have more experience with that topic
Avatar
🌸 1️⃣ understood sir
Avatar
anyone here from blueteamonline lab
Avatar
Avatar
Digitalferret
\\/// (edited)
you are insulting me sir
Avatar
What is the best way to extract only a few emails (say 200) from a live system? The client has them in a folder in Outlook. Can't acquire the whole .pst for legal reasons. Much thanks.
Avatar
Avatar
MR.Falcon
you are insulting me sir
Digitalferret 6/20/2022 8:23 AM
not at all. i was joking with Ollie. it's a Logical OR gate and very cleverly put
Avatar
1️⃣
Avatar
Avatar
Luci
What is the best way to extract only a few emails (say 200) from a live system? The client has them in a folder in Outlook. Can't acquire the whole .pst for legal reasons. Much thanks.
Arman Gungor 6/20/2022 8:31 AM
If the same emails are available on an email server, you can target them with an in-place search directly on the email server. If you need to work off the local PST, then you can ingest it into a forensic tool (e.g., X-Ways, FTK, etc.), narrow it down to the messages you need, and create a logical image of just the emails you are after. I would be inclined to do this over the network if possible—throw an agent in there, mount the target's drive in read-only mode on your forensic laptop, and go from there. If this is not possible, you could bring a portable and lightweight forensic tool to the target, or pull the drive out and connect it to your forensic workstation through a write blocker if the target system can be stopped.
Avatar
Avatar
Luci
What is the best way to extract only a few emails (say 200) from a live system? The client has them in a folder in Outlook. Can't acquire the whole .pst for legal reasons. Much thanks.
Axiom via an IMAP/POP3 cloud data extraction?
Avatar
Avatar
Arman Gungor
If the same emails are available on an email server, you can target them with an in-place search directly on the email server. If you need to work off the local PST, then you can ingest it into a forensic tool (e.g., X-Ways, FTK, etc.), narrow it down to the messages you need, and create a logical image of just the emails you are after. I would be inclined to do this over the network if possible—throw an agent in there, mount the target's drive in read-only mode on your forensic laptop, and go from there. If this is not possible, you could bring a portable and lightweight forensic tool to the target, or pull the drive out and connect it to your forensic workstation through a write blocker if the target system can be stopped.
None of these options are really possible, as we're talking about a few mails that have been sorted by the client in his local outlook instance where all the other mails from the account are highly confidential legal correspondence. I can not do any kind of server-side acquisition because of that. The simplest way that I thought of is to drag-and-drop whatever is in that folder from the local client to some folder as .msg files. Of course this is not sound at all, but in this case it's not that important. However, I thought maybe there was a small tool that could open the local pst/ost on the fly to extract the mails in a more fancy matter?
9:00 AM
Like starting a tool from USB live on that machine, selecting the local .pst, exporting that specific folder and it's contents to some kind of container or even "partial" .pst - but I dont know too much about pst if something like this is even possible.
9:01 AM
(Thanks for your answers so far!)
Avatar
Avatar
Luci
Like starting a tool from USB live on that machine, selecting the local .pst, exporting that specific folder and it's contents to some kind of container or even "partial" .pst - but I dont know too much about pst if something like this is even possible.
Arman Gungor 6/20/2022 9:07 AM
This is along the lines of what I meant by "you could bring a portable and lightweight forensic tool to the target". X-Ways could be a good option there if you have access to it.
9:09 AM
You would be leaving quite a bit of contextual evidence behind that would be useful in investigating the emails. But, if this is largely a discovery exercise, perhaps you can get away with acquiring the email contents and high-level metadata.
9:10 AM
X-Ways wouldn't give you a partial PST, but a container with a subset of the messages.
Avatar
@Luci you can use Outlook's built-in import/export options to select the folder you created with only the necessary emails in it and export these to a pst file. very simple, you just follow the export wizard, select the folder in the navigation window, select pst as the export type, and then finish
Avatar
like Arman says, you will lose context about the emails like where they were originally stored but I you can record that with pictures or something too.
Avatar
kladblokje_88 6/20/2022 3:48 PM
hey
3:49 PM
anyone here have experience with setting up wireguard using yubikey?
Avatar
Avatar
Arman Gungor
You would be leaving quite a bit of contextual evidence behind that would be useful in investigating the emails. But, if this is largely a discovery exercise, perhaps you can get away with acquiring the email contents and high-level metadata.
Thank you for the in-depth answer!
👍 1
Avatar
Avatar
Sha1_4n6
@Luci you can use Outlook's built-in import/export options to select the folder you created with only the necessary emails in it and export these to a pst file. very simple, you just follow the export wizard, select the folder in the navigation window, select pst as the export type, and then finish
Thanks! This is probably the way to go here. It's just all about the content.
Avatar
Anyone can guide me to setup DFIR lab and practice to learn
Avatar
Avatar
kladblokje_88
anyone here have experience with setting up wireguard using yubikey?
WireGuard is just a protocol, it doesn’t support things like YubiKeys
Avatar
Avatar
DRG3N
Anyone can guide me to setup DFIR lab and practice to learn
Intel put out a lab guideline document. Certainly overkill for what sounds like a one person startup but I’m sure you could trim it way down.
Avatar
Avatar
Matt
WireGuard is just a protocol, it doesn’t support things like YubiKeys
kladblokje_88 6/21/2022 3:41 AM
I c
Avatar
Does any1 here know of a good list of search terms to use when investigating a case involving stolen login credentials? Im thinking maybe known websites for markets where logins are sold or dumped etc.
Avatar
Avatar
Johnie
Does any1 here know of a good list of search terms to use when investigating a case involving stolen login credentials? Im thinking maybe known websites for markets where logins are sold or dumped etc.
Deleted User 6/21/2022 7:03 AM
Raidforum dumps usually contained “*_RF” in their naming convention. “Combo List” is what I see from the script kiddies harvesting logins creds from proxies/free vpn.
👍 1
Avatar
Avatar
Johnie
Does any1 here know of a good list of search terms to use when investigating a case involving stolen login credentials? Im thinking maybe known websites for markets where logins are sold or dumped etc.
Digitalferret 6/21/2022 8:01 AM
pretty much what Howard said, but also if you do a wordsearch on the machine you are interrogating, for the usual type of email address, you might see the name of the file and work backwards from there ie "<combo-list-name>.txt / zip / rar and so on (edited)
👍 1
Avatar
Avatar
DRG3N
Anyone can guide me to setup DFIR lab and practice to learn
Digitalferret 6/21/2022 8:03 AM
easiest and cheapest, "acquire" old drives and then work with free tools to see what you can extract
Avatar
Avatar
Digitalferret
easiest and cheapest, "acquire" old drives and then work with free tools to see what you can extract
I just did this for a talk this summer/fall. Many more people are properly sanitizing disks these days. But not all of course. The only thing I will say, is if you have your tax data, pictures of your id, passport, medical cards etc etc etc.... For the love of all sanity, destroy your disks........
💯 1
Avatar
Avatar
Cole
Even if I sort alphabetically its not usable because it orders it like this: chat1_screen1 chat1_screen10 chat1_screen100 .... chat1_screen199 chat1_screen2
Hi @Cole SGman1908, I also had this sorting issue in Chat capture, and found a way to do it right. On the ChatCapture extraction, in Physical Analyser, select Table View, and sort the images by the "Textual metadata" column. Doing so will sort the images correctly, Chat1_Screen1.png, Chat2_Screen2.png, and so on instead of ...screen1, screen10, screen11...
❗ 3
Avatar
Avatar
ct3374
Hi @Cole SGman1908, I also had this sorting issue in Chat capture, and found a way to do it right. On the ChatCapture extraction, in Physical Analyser, select Table View, and sort the images by the "Textual metadata" column. Doing so will sort the images correctly, Chat1_Screen1.png, Chat2_Screen2.png, and so on instead of ...screen1, screen10, screen11...
Thanks!!! I'll write that down to try when I have to do those again.
👍 1
Avatar
I am having trouble install volatility3 on windows
11:36 AM
anyone can help
Avatar
Avatar
ct3374
Hi @Cole SGman1908, I also had this sorting issue in Chat capture, and found a way to do it right. On the ChatCapture extraction, in Physical Analyser, select Table View, and sort the images by the "Textual metadata" column. Doing so will sort the images correctly, Chat1_Screen1.png, Chat2_Screen2.png, and so on instead of ...screen1, screen10, screen11...
Hopefully this feature gets more attention moving forward. Cool idea for otherwise unsupported apps but the current state just isn’t quite there.
Avatar
Anyone from the forensic team at TikTok here? Can I get a DM please?
Avatar
memory forensics tools for windows (Volatility) doesn't work
Avatar
Avatar
MR.Falcon
memory forensics tools for windows (Volatility) doesn't work
Can we get a bit more details? Are you running the pre-built volatility3 executable, or are you running it under Python directly? What errors are you getting etc?
Avatar
python
Avatar
Mind if you DM me the error you are getting?
Avatar
Does anyone know if @Cellebrite can be installed on macs (m1)? besides Inspector. I can't find any info on the website, although all the pics are made to look like they are running natively on OS X 🙃
Avatar
Forensic@tor 6/23/2022 4:15 AM
@trillian Windows only. You can use Parallels with Windows, but the adapter may not work. (edited)
👍 2
Avatar
Good morning all ... wondering if anyone has had any luck identifying artifacts from the Omegle chat site? Doing some searching it looks like there may have been an app in the past or some way to share photos, but not really seeing either of those things now?
Avatar
There have been various 3rd party Omegle apps over the years, some of which I think integrated file sharing? All very sketchy and badly designed apps usually - I'm sure artefacts would vary greatly between them
Avatar
Can anyone identify these programs just from their taskbar icons?
Avatar
3rd is vueprint
Avatar
Left might be R-Studio
8:25 AM
Well, it looks like the R Language symbol, R-Studio is the first IDE that comes to mind but it doesn't use the same logo
Avatar
R-Studio/R was the first thing that came to mind for me as well, but the slope of the top right of the letter looks quite different to the reference logos that I could find
Avatar
hmm, thats interesting
9:17 AM
theres a bit of grey on the middle left and top left, though the artifacting/compression makes it hard to see
9:17 AM
that i thought could be the big circle they place behind the R
Avatar
Ross Donnelly 6/23/2022 9:24 AM
Architect and Revit guru  Brian Payne recently had a clever idea and created a custom Revit 2018 icon; here is the Twitter link . He did ...
Avatar
Avatar
Ross Donnelly
i agree with this one, this is much stronger than my idea
Avatar
Avatar
jaket2452
Can anyone identify these programs just from their taskbar icons?
10:14 AM
I did some upscale/processing on the center image to try and make it more recognizable
10:14 AM
hope that helps
Avatar
Anyone familiar with CrowdStrike Falcon FileCreateInfo events? I'm trying to determine why we are only seeing this event on some systems. Does anyone know what setting enables this? Is it created for any file or just specific types?
Avatar
@Law Enforcement [USA] Has anyone served a search warrant on Apple using a UID to identify the device and received any useable result? If so, do you have a template that you would be willing to share?
Avatar
dabeersboys 6/23/2022 1:58 PM
@FullTang We have done it and that is how we do it with air tags, is pulling the number from the inside of the device.
Avatar
Avatar
dabeersboys
@FullTang We have done it and that is how we do it with air tags, is pulling the number from the inside of the device.
Perfect. Thank you!
Avatar
Avatar
pug4N6
Good morning all ... wondering if anyone has had any luck identifying artifacts from the Omegle chat site? Doing some searching it looks like there may have been an app in the past or some way to share photos, but not really seeing either of those things now?
I had a case in 2019 there was an Omegle app installed it stored chats and records in a different database plain text though was easy to identified headers and footers for the convo and then pointers to the pictures that matched by MD5 for tying back to the same chat thread.
Avatar
Avatar
jaket2452
Can anyone identify these programs just from their taskbar icons?
MrMacca (Allan Mc) 6/23/2022 2:32 PM
Could the 1st be this? https://www.r-project.org/
2:33 PM
Avatar
Avatar
MrMacca (Allan Mc)
Could the 1st be this? https://www.r-project.org/
That's what I thought at first as well
2:39 PM
i think @Ross Donnelly nailed it with Revit though
2:39 PM
coloration and angles look much closer for the Revit logo than the R logo, which is more solid blue
Avatar
MrMacca (Allan Mc) 6/23/2022 2:40 PM
Yeah, I kind of agree looking again at it 👍
Avatar
the center one i spent some time look for earlier, tried similar processing as well
2:41 PM
no luck
Avatar
MrMacca (Allan Mc) 6/23/2022 2:42 PM
Looks like a C I.
Avatar
Yeah, that's what I see as well, was trying some searches with context earlier, assuming left is Revit and right is vueprint, what other program might someone have installed
Avatar
Dr. Kaan Gündüz 6/23/2022 11:27 PM
the one at the middle looks like a dictionary/translation software icon, or bobba fett
Avatar
Avatar
jaket2452
Can anyone identify these programs just from their taskbar icons?
Middle one looks like the HP SMART logo
Avatar
Is crss.exe a file that often changes (for example with updates) or can it’s integrity be confirmed with a known file filter?
Avatar
Avatar
rojo
Middle one looks like the HP SMART logo
Could well be on to something with that one. Hard to tell with compression artefacts. I also agree with @Ross Donnelly on Revit being a better suggestion than R
Avatar
Avatar
rojo
Middle one looks like the HP SMART logo
Digitalferret 6/24/2022 9:47 AM
yep, it passes the "squint test" for me. well found (edited)
👍 1
Avatar
Avatar
OllieD
Could well be on to something with that one. Hard to tell with compression artefacts. I also agree with @Ross Donnelly on Revit being a better suggestion than R
Digitalferret 6/24/2022 10:18 AM
multiple iterations of resize-small-large-small, pixelate, gaussian blur etc. theres a likeness
👍 3
Avatar
Avatar
Digitalferret
yep, it passes the "squint test" for me. well found (edited)
Years of fixing the parents printer have finally payed off 😂
💯 2
😆 1
Avatar
Avatar
rojo
Years of fixing the parents printer have finally payed off 😂
Ross Donnelly 6/24/2022 11:41 AM
Were you usually drunk when fixing the printer? That's the only way you'd be able to recognise it that blurry....
Avatar
Digitalferret 6/24/2022 11:44 AM
rofl, but ooooh, that's below the belt 😄
11:45 AM
all i have to do is take the specs off, blessed, far cheaper effect than having to buy alcohol
Avatar
That's a really good call @Digitalferret
11:45 AM
i had looked at that app icon in my searches but i skipped over it because it didnt look quite close enough
11:45 AM
but your compressed version has convinced me
Avatar
Avatar
chick3nman
but your compressed version has convinced me
Digitalferret 6/24/2022 11:46 AM
ty good sir //bow
11:47 AM
all down to rojo tho. i'd never have found that in a month of sunday's
👍 1
Avatar
oh yeah @rojo gets credit for finding it too 😛
👍 2
Avatar
Avatar
chick3nman
oh yeah @rojo gets credit for finding it too 😛
Digitalferret 6/24/2022 11:55 AM
totally OT, but do you have this moniker on Twitter? knew a guy when i was on yrs back, but checking there are so many chickenmen it's like maybe knowing Johhn Smith (edited)
11:56 AM
UK based here. usual crowd were data recovery set inc folks from Disklabs
11:56 AM
Lee whatsisface and Lord Steggles
Avatar
https://twitter.com/Chick3nman512 (escaped so it doesnt populate as a link, dont want to self advertise too much :P)
Avatar
Digitalferret 6/24/2022 11:57 AM
lol, yeh its you 🙂 chicken logo
Avatar
Digitalferret 6/24/2022 11:59 AM
since years lol. i just don't go on that much
Avatar
hahaha awesome, i'm not super active on there in terms of posting recently but i still have it open 24/7
12:01 PM
lot of security folks tend to center around twitter, makes keeping up with stuff a lot easier(or harder, depends on how you look at it)
Avatar
Digitalferret 6/24/2022 12:01 PM
yeh, its very current although i think some treat it like write only memory
12:02 PM
i started as this name, then wanted to split business and normal use. so swapped to this with uk appended...
12:02 PM
and carried on venting my personal opine about all sorts of shit, so just gave up the former account for dead
12:03 PM
some really genuine folks on there, just responded to Snipey and 4n6woman. absolutely BS free folks ftw
12:05 PM
and Snipey is very sweary, 4n6 has Akitas -both winners imho 🙂
Avatar
haha i think i follow at least 4n6, if not the former
Avatar
Avatar
Ross Donnelly
Were you usually drunk when fixing the printer? That's the only way you'd be able to recognise it that blurry....
I’ve found that’s the best way when dealing with family IT issues!
Avatar
Avatar
rojo
I’ve found that’s the best way when dealing with family IT issues!
That is SO true
Avatar
Avatar
rojo
I’ve found that’s the best way when dealing with family IT issues!
RELATIVE: So... I heard you are good with computers, right? ME (has a master's degree in CS): Nope #programming #meme
💯 4
🤣 2
👍 1
👏 1
Avatar
Digitalferret 6/24/2022 11:14 PM
yup. "sorry, I'm a bricklayer" or "all thumbs with that shit" 🙂
🤣 1
Avatar
I just tell them I am good at breaking them. Or finding their deleted porn
😂 4
Avatar
Avatar
Tcisaki
I just tell them I am good at breaking them. Or finding their deleted porn
Digitalferret 6/25/2022 10:07 AM
seriously, once helped a relly, at my PC, go thro his camera card and he saw two things. 1: i had a folder of tools with the word Forensic on it. he shat. 2: he saw a directory which he patently thought he'd deleted and asked if i'd recovered it. he shat bricks., i hadn't and told him so and said that whilst his camera viewer might think they were deleted the PC did not. he was keen for us to move along swiftly. (edited)
10:08 AM
and yes, there were "those" sort of pictures in there 🙂 i'd already found and was discreet enough not to mention.
10:11 AM
seriously, if i were less than totally confidential and/or less that completely ethical, i'd either be very rich or very dead. i can say that of any and all work I've taken, the one's that had more "moral/ethical" standpoint, such as Pastors/Religious types, Councillors etc, the more sordid was the content.
Avatar
Haha, I just started doing this to my relatives lately. Awesome feeling. “No, I do CS aunty, thats a whole different field”
🤣 1
Avatar
Hy geeks, What tools can recover deleted GoPro videos from SD card? The videos has been deleted directly from SD card (using DEL button) when it was attachet to card reader. I tried FTK imager and Recuva - no success.
Avatar
Sounds like something for photorec 🙂
updoot 1
6:21 AM
It’s free 🙂
Avatar
Avatar
2numb3rs
Hy geeks, What tools can recover deleted GoPro videos from SD card? The videos has been deleted directly from SD card (using DEL button) when it was attachet to card reader. I tried FTK imager and Recuva - no success.
I just pulled an SD card out of a GoPro 7. It's exFAT. I was able to view/recover deleted jpgs and MP4s with fls and icat (from sleuthkit). Interesting that the fls command does not exit or return to prompt, but the entry numbers still return valid jpgs, MP4s or JSON data.
Avatar
What tool for a Linux command line can be used to examine emails and email files?
Avatar
Avatar
Soda cool
What tool for a Linux command line can be used to examine emails and email files?
Digitalferret 6/27/2022 12:38 AM
what specific data are you trying to extract, what have you tried so far?
Avatar
Avatar
Soda cool
What tool for a Linux command line can be used to examine emails and email files?
Digitalferret 6/27/2022 12:41 AM
Avatar
АКСИПИТЭР13 6/27/2022 2:56 AM
Hello, I have a very specific question regarding KAPE and DFIR-Orc (french developed collection tool). DFIR-Orc is a tool able to embed other third parties binaries, enabling orchestration of a lot of tasks. I'd like to have some help to embed KAPE. I'm able to run KAPE from Orc, however kape tries to find the .tkape files in the /Targets directory. However since I'm not running Kape itself but from Orc, it's not able to find the targets. I tried embedding the targets in Orc thinking that kape would find it in its running context, but it doesn't work. I tried a lot more things but I can't make KAPE to find the targets. Is someone able to help? DFIR-Orc documentation : https://dfir-orc.github.io/index.html (edited)
Avatar
Avatar
АКСИПИТЭР13
Hello, I have a very specific question regarding KAPE and DFIR-Orc (french developed collection tool). DFIR-Orc is a tool able to embed other third parties binaries, enabling orchestration of a lot of tasks. I'd like to have some help to embed KAPE. I'm able to run KAPE from Orc, however kape tries to find the .tkape files in the /Targets directory. However since I'm not running Kape itself but from Orc, it's not able to find the targets. I tried embedding the targets in Orc thinking that kape would find it in its running context, but it doesn't work. I tried a lot more things but I can't make KAPE to find the targets. Is someone able to help? DFIR-Orc documentation : https://dfir-orc.github.io/index.html (edited)
randomaccess 6/27/2022 4:50 AM
Any reason why you're trying to do that? (Appreciate that might be the task and suggesting alternatives isn't what you're asking....but it sounds like it might be the hard way)
Avatar
АКСИПИТЭР13 6/27/2022 5:02 AM
The reason is we want to have a certification from ANSSI. We think that we would have better chances to get it by using french tools. So we want to replace our velociraptor with DFIR-Orc. We know that Orc is able to do artifact collection, however it copies the artifacts byte for byte, and it would be easier for our analysis if we have the files as is, and not a series of bytes (edited)
Avatar
@Magnet Forensics Is it possible to remove keywords or a keyword list from a case that has already been processed in Magnet AXIOM v6.2?
Avatar
Avatar
RyanB
@Magnet Forensics Is it possible to remove keywords or a keyword list from a case that has already been processed in Magnet AXIOM v6.2?
Michael Paleshi 6/27/2022 9:06 AM
hi @RyanB, let me do a little digging and see how quickly I can get you an answer.
Avatar
I have a question regarding my school project. So we basically have a victims laptop that got infected (like a roleplay not actual with a virus but a student instead who left behind some clues). The problem is my group is the only group where they deleted the entire system32 file (the task was to not let windows boot anymore, couldve simply deleted the bootloader file but hey the other group just straight up deleted everything😫). Now thwt my group got access to the infected laptop, we need to find evidence. The other group left behind clues which unfortunately a lot of them they hid in the system32 folder. Now my question is if there is a way to retrieve this file? I have cloned the devices OS onto a HDD and used Osforensics to see some more detailed things. Now in OSforensics i see it got moved to the recylce bin, so not fully deleted. Is there a way i can retrieve this file resulting in me being able to boot the device again? @Magnet Forensics (edited)
Avatar
Avatar
RyanB
@Magnet Forensics Is it possible to remove keywords or a keyword list from a case that has already been processed in Magnet AXIOM v6.2?
Ross Donnelly 6/27/2022 9:30 AM
I was told no, the last time I asked this question
Avatar
Avatar
Digitalferret
what specific data are you trying to extract, what have you tried so far?
Whats in the email without opening it, pretty much metadata, and I’ve tried exiftool.
Avatar
Original message was deleted or could not be loaded.
Michael Paleshi 6/27/2022 11:43 AM
Hi @RyanB and @Ross Donnelly: I spoke with one of our UX wizards and this is a known issue. I have also updated our eng team to let them know it's still an in-demand request. I'm still waiting to hear back from our examiner group too.
👍 2
Avatar
Avatar
Celox
I have a question regarding my school project. So we basically have a victims laptop that got infected (like a roleplay not actual with a virus but a student instead who left behind some clues). The problem is my group is the only group where they deleted the entire system32 file (the task was to not let windows boot anymore, couldve simply deleted the bootloader file but hey the other group just straight up deleted everything😫). Now thwt my group got access to the infected laptop, we need to find evidence. The other group left behind clues which unfortunately a lot of them they hid in the system32 folder. Now my question is if there is a way to retrieve this file? I have cloned the devices OS onto a HDD and used Osforensics to see some more detailed things. Now in OSforensics i see it got moved to the recylce bin, so not fully deleted. Is there a way i can retrieve this file resulting in me being able to boot the device again? @Magnet Forensics (edited)
Michael Paleshi 6/27/2022 11:59 AM
Hey @Celox , I'm still new here and I can lean more on our Forensic analysts but, from what I do know, if you still have access to the drive and can take a full image of it, AXIOM should be able to carve your deleted space (depending how long it's been since "infection" and now - sectors could have been overwritten) and you should be able to recover your missing data. Happy hunting!
Avatar
Digitalferret 6/27/2022 12:32 PM
so what file exactly are you checking for the meail messages themselves? ie is it a specific format for a particular email client? i'm thinking maybe the answer has to take into account the email program. either that or try a generic toolkit like Sleuthkit/Autopsy (edited)
Digitalferret started a thread. 6/27/2022 12:33 PM
Avatar
Avatar
Michael Paleshi
Hey @Celox , I'm still new here and I can lean more on our Forensic analysts but, from what I do know, if you still have access to the drive and can take a full image of it, AXIOM should be able to carve your deleted space (depending how long it's been since "infection" and now - sectors could have been overwritten) and you should be able to recover your missing data. Happy hunting!
Luckily the drive is not being used so the files shouldnt be overwritten in theory right? (edited)
Avatar
Avatar
Celox
Luckily the drive is not being used so the files shouldnt be overwritten in theory right? (edited)
Michael Paleshi 6/27/2022 12:48 PM
exactly. If the drive has been offline then the FAT shouldn't be overwriting yet.
Avatar
Avatar
Michael Paleshi
exactly. If the drive has been offline then the FAT shouldn't be overwriting yet.
in osforensics a tool we had to use for school, i could still see the recycle bin with the system32 folder right after i unplugged it. so ye should be fine thx for the help ill check axiom out tommorow and hopefully get that system32 recovered so i can boot the pc again or maken an vm from it
👍 1
Avatar
Avatar
Celox
in osforensics a tool we had to use for school, i could still see the recycle bin with the system32 folder right after i unplugged it. so ye should be fine thx for the help ill check axiom out tommorow and hopefully get that system32 recovered so i can boot the pc again or maken an vm from it
DeeFIR 🇦🇺 6/27/2022 1:56 PM
Assuming a HDD and not an SSD with TRIM, then it’s likely recoverable. Do you know what kind of drive is in the laptop? Otherwise if you’re still seeing filesystem entries (FAT/NTFS) then the records could still exist, but the data relating to each entry may not exist (in the case of trim).
Avatar
Avatar
АКСИПИТЭР13
The reason is we want to have a certification from ANSSI. We think that we would have better chances to get it by using french tools. So we want to replace our velociraptor with DFIR-Orc. We know that Orc is able to do artifact collection, however it copies the artifacts byte for byte, and it would be easier for our analysis if we have the files as is, and not a series of bytes (edited)
randomaccess 6/27/2022 7:30 PM
Could you make a Velociraptor offline collector and package that within ORC?
Avatar
Hi, does anyone have a mapping between Event ID and its meaning for SMB Connectivity Logs in Windows?
Avatar
Avatar
navant
Hi, does anyone have a mapping between Event ID and its meaning for SMB Connectivity Logs in Windows?
DeeFIR 🇦🇺 6/27/2022 9:53 PM
Avatar
Thank you! Is there any documentation for Event ID above 30000?
Avatar
Avatar
randomaccess
Could you make a Velociraptor offline collector and package that within ORC?
АКСИПИТЭР13 6/28/2022 12:21 AM
We could, but I’m not sure it responds at the mission i have. My manager explicitely said that we have to quit using velo. Thanks for the answer anyway
👍 1
Avatar
Avatar
АКСИПИТЭР13
We could, but I’m not sure it responds at the mission i have. My manager explicitely said that we have to quit using velo. Thanks for the answer anyway
randomaccess 6/28/2022 12:57 AM
Would be keen to know why you're moving away from velo - mostly curious because we use it a lot so good to know what the reason in so we can figure out if it's something we need to consider :)
Avatar
Avatar
randomaccess
Would be keen to know why you're moving away from velo - mostly curious because we use it a lot so good to know what the reason in so we can figure out if it's something we need to consider :)
АКСИПИТЭР13 6/28/2022 1:12 AM
May I redirect you to one of my earlier messages explaining our reasons : https://discord.com/channels/427876741990711298/537760691302563843/990950343674298378
Avatar
Avatar
АКСИПИТЭР13
May I redirect you to one of my earlier messages explaining our reasons : https://discord.com/channels/427876741990711298/537760691302563843/990950343674298378
randomaccess 6/28/2022 1:20 AM
Right so just "french tools == easier certification" no dramas. Might have the same issues with kape == Amercian tool as much as velo == Australian tool. So following on with that, probably best to use OFC for the entire collection process somehow isntead
Avatar
Avatar
randomaccess
Right so just "french tools == easier certification" no dramas. Might have the same issues with kape == Amercian tool as much as velo == Australian tool. So following on with that, probably best to use OFC for the entire collection process somehow isntead
АКСИПИТЭР13 6/28/2022 1:42 AM
You'd be right if I had more time. I only have two months left to configure, verify the collection, and test it. Would easily take a lot of time to create a lot of configuration files, so if we can, for now, use kape to collect, I could gain a lot of time. In the future we will use DFIR-Orc only, however i'm a bit short in time atm
👍 1
Avatar
Avatar
navant
Thank you! Is there any documentation for Event ID above 30000?
Andrew Rathbun 6/28/2022 4:42 AM
Event Tracing For Windows (ETW) Resources. Contribute to nasbench/EVTX-ETW-Resources development by creating an account on GitHub.
Avatar
What is everybody's time to parse an iPhone extraction with Cellebrite lately ? I have a newer PC Intel i9-10900x CPU 128GB of memory and running the case on an M2 and its taking 4-5 hours to parse a 66GB iPhone, @Cellebrite using 7.55.2.2
9:38 AM
Cellebrite is only using 7% of the CPU and 20% of the memory
Avatar
FFS?
Avatar
Location carving and photo/video classification takes a while too.
Avatar
@CLB-Paul Yes FFS extraction
Avatar
Avatar
DCSO
What is everybody's time to parse an iPhone extraction with Cellebrite lately ? I have a newer PC Intel i9-10900x CPU 128GB of memory and running the case on an M2 and its taking 4-5 hours to parse a 66GB iPhone, @Cellebrite using 7.55.2.2
Not a great answer admittedly, but have you tried out the PA Ultra coming out? You can get the beta through design partners... it's supposed to reduce load time considerably. Like I said - not a great fix right now but certainly hope moving forward.
Avatar
@Neon I don't have photo/video classification on at this time, I'll check location carving. I'm just baffled that its not cranking on the CPU/cores and memory .
Avatar
Avatar
DCSO
@Neon I don't have photo/video classification on at this time, I'll check location carving. I'm just baffled that its not cranking on the CPU/cores and memory .
Hmm. I know FFS takes mine a while too. My rig is xeon silvers but with less ram than yours
Avatar
Avatar
whee30
Not a great answer admittedly, but have you tried out the PA Ultra coming out? You can get the beta through design partners... it's supposed to reduce load time considerably. Like I said - not a great fix right now but certainly hope moving forward.
I'm really excited about Ultra. It's going to be nice not having to reparse data.
🥳 2
Avatar
Avatar
Neon
I'm really excited about Ultra. It's going to be nice not having to reparse data.
Does PA Ultra come with a normal license or is it extra?
Avatar
Andrew Rathbun 6/28/2022 11:17 AM
If anyone wants to vote for the title of the book we're writing in #deleted-channel, today is the last day of voting! Vote here: https://forms.gle/eZtkh5NZkzdjwaq66
The DFIR Community needs your input as to what should replace the placeholder CrowdsourcedDFIRBook title for the collaborative book being written and edited on GitHub (https://github.com/Digital-Forensics-Discord-Server/CrowdsourcedDFIRBook) and published on Leanpub! The options with the top 3 most votes will move on to the second and final rou...
Avatar
@FullTang eventually it will replace PA and its the same $. (what I've read)
😍 2
Avatar
Hoping it's the same costs because PA licenses have skyrocketed the past 2 years
Testify 1
Avatar
No extra cost for ultra. There’s FAQ at bottom of the page https://cellebrite.com/en/pa-ultra/
💯 1
♥️ 2
Avatar
Fantastic. Looking forward to it!
Avatar
On a somewhat related note, are there any plans for UFED4PC/Touch 2 supporting Smart Watch extractions?
Avatar
Anybody have a recommendation for adding media Codec to @Cellebrite to play videos natively in PA, i usually have to export them to GOM player. Thanks
Avatar
Avatar
DCSO
Anybody have a recommendation for adding media Codec to @Cellebrite to play videos natively in PA, i usually have to export them to GOM player. Thanks
I've had this issue recently too. I have the klite codec pack installed and it hasn't helped. I've noticed most of the times the issue is more prevalent when the extraction is on a network storage location when parsing. That's anecdotal obviously. But PA should be able to natively play most of the video files on a phone. I have been exporting all of the photos and videos with the Griffeye format and importing it in there. It has many features that makes it better for reviewing videos.
👍 1
2:40 PM
Griffeye is free too*
Avatar
Avatar
FullTang
On a somewhat related note, are there any plans for UFED4PC/Touch 2 supporting Smart Watch extractions?
Nothing in immediate future
👍 1
Avatar
Anyone @MSAB able to DM me re issue with Samsung A20e. Ta
Avatar
Avatar
CLB-Paul
No extra cost for ultra. There’s FAQ at bottom of the page https://cellebrite.com/en/pa-ultra/
Ross Donnelly 6/29/2022 1:42 AM
Any reason we can't see it in our customer portal yet? The FAQ says it should be available for all PA users. Is it still in Beta or is it final product now?
👍🏻 1
Avatar
dinosaurdave 6/29/2022 3:05 AM
anyone know if upgrading my workstation to Windows 11 affect any of the major Forensic softwares (X-Ways, Cellebrite, Axiom, EnCase etc)?
Avatar
Avatar
tony1815
Anyone @MSAB able to DM me re issue with Samsung A20e. Ta
Sure!
Avatar
Avatar
Ross Donnelly
Any reason we can't see it in our customer portal yet? The FAQ says it should be available for all PA users. Is it still in Beta or is it final product now?
Little4n6Fox 6/29/2022 4:04 AM
Same here, too. I do not find the download in our customer portal, but I like to test it
Avatar
Avatar
whee30
Not a great answer admittedly, but have you tried out the PA Ultra coming out? You can get the beta through design partners... it's supposed to reduce load time considerably. Like I said - not a great fix right now but certainly hope moving forward.
CLB_iwhiffin 6/29/2022 4:22 AM
Ultra will decrease the RELOAD time considerably for sure. Initial parse time is still going to take a while sadly. It’s still an awesome addition but I don’t want anyone to be disappointed that if they are expecting faster initial parse times. Making more use of resources is a common request and one that is being examined for later versions of ultra.
Avatar
Avatar
dinosaurdave
anyone know if upgrading my workstation to Windows 11 affect any of the major Forensic softwares (X-Ways, Cellebrite, Axiom, EnCase etc)?
I’ve not tested it but the release notes for Axiom 6.3 mentions ‘AXIOM now supports Windows 11’ - whether that means running it on Win 11 or support for processing Win 11 images I don’t know though.
Avatar
dinosaurdave 6/29/2022 5:21 AM
I'll find out soon 😂
Avatar
When is the launch date of Ultra? Not seeing it in our Portal. @Cellebrite
5:24 AM
@Cellebrite is Ultra an addon or different PA product? This obviously causes issues for ISO!
5:27 AM
Or perhaps a name change?
Avatar
Avatar
Zhaan
When is the launch date of Ultra? Not seeing it in our Portal. @Cellebrite
PA is v7 etc, Ultra is v8. I think consider it similar to EnCase going from v6 -> 7 -> 8 (That's how I see it anyho!) (edited)
😂 1
Avatar
Avatar
CLB_iwhiffin
Ultra will decrease the RELOAD time considerably for sure. Initial parse time is still going to take a while sadly. It’s still an awesome addition but I don’t want anyone to be disappointed that if they are expecting faster initial parse times. Making more use of resources is a common request and one that is being examined for later versions of ultra.
Fair point - thanks for the clarification.
Avatar
Avatar
Rob
PA is v7 etc, Ultra is v8. I think consider it similar to EnCase going from v6 -> 7 -> 8 (That's how I see it anyho!) (edited)
How DARE you compare Encase to the mighty PA! Disgraceful behaviour! No wonder you dont have Trevor!
🤣 6
🇧 1
🇪 1
🇹 1
🇦 1
Avatar
Hi everyone, I am trying to analyse Windows 7 security configurations. Is there a guide you know that describes this? I'm specially interested in the settings which, enabled or disabled, can cause the OS to become completely vulnerable (e.g. disabling Firewall, Windows Defender, etc.). I'd really appreciate it if you could let me know.
Avatar
This set of tools allows enterprise security administrators to download, analyze, test, edit and store Microsoft-recommended security configuration baselines for Windows and other Microsoft products, while comparing them against other security configurations.
sumuri_alt 1
1:30 PM
From 1st party, Microsoft provides this ^ @degent_
2:48 PM
Btw I'm trying to connect my guest VM (which is host-only and has a vboxnet I/F to connect to the internet) to my DNS VM (which uses a bridged-adapter). The guest VM can ping the DNS VM, however, the DNS VM can't ping the vboxneto I/F nor the guest VM. How may I fix this? I'd really appreciate it if anyone could help me out.
Avatar
CIS also has baselines, couldn't spot the W7 standard though https://www.cisecurity.org/benchmark/microsoft_windows_desktop
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Microsoft Windows Desktop.
👍 1
Avatar
For those KAPE wizards out there, is there a magical set of flags that would automatically set the destination drive to the one that Kape is running off of? I am thinking, you plug this in and run Kape as admin and unplug when done.
Avatar
Avatar
Murst
For those KAPE wizards out there, is there a magical set of flags that would automatically set the destination drive to the one that Kape is running off of? I am thinking, you plug this in and run Kape as admin and unplug when done.
Andrew Rathbun 6/29/2022 4:34 PM
Maybe use %kapeDirectory% for your destination?
Avatar
Avatar
Murst
For those KAPE wizards out there, is there a magical set of flags that would automatically set the destination drive to the one that Kape is running off of? I am thinking, you plug this in and run Kape as admin and unplug when done.
Andrew Rathbun 6/29/2022 4:39 PM
I asked Eric. He said try .. \tout. . is KAPE directory. .. is a directory up from that. So you could do the above and have it go to your tout folder. Give it a try and let us know
4:42 PM
Or if you have KAPE.exe on the root of your flash drive, I suppose . would work for you 🤷‍♂️
Avatar
Mel_Hungate 6/30/2022 7:06 AM
Posting to say AXIOM 6.3 is available. magnetforensics_alt https://www.magnetforensics.com/blog/magnet-axiom-6-3-take-control-of-evidence-processing/ The TLDR is: 1. Parsing-Only Processing and Post-Processing Carving 🏃 💨 2. Support for Find My Artifacts 🗺️ 3. Better logging for PhotoDNA Hash Matching and Passwords #️⃣ 4. Windows 11 support Windows10B -> 🪟 (gotta get the windows 11 emoji added, but this one is pretty darn close lol) 5. Support for Windows Search Artifacts 🔍 p.s. we haven't really done this before, open to feedback. Is this helpful or just annoying? 🙃 (edited)
magnetforensics_alt 2
👍 10
Avatar
Hey all, how’s things going!
Avatar
Dr. Kaan Gündüz 6/30/2022 7:29 AM
ahoy! better than yesterday.
Avatar
PA ultra 8.1 is out today, I'm sure with such a big change in architecture there will be some kinks but it's exciting to see some fixes to one of my biggest complaints which is the repeated load times. With major software updates like this, are there independent bodies that evaluate and publish results based on known datasets (like NIST)?
Avatar
Avatar
whee30
PA ultra 8.1 is out today, I'm sure with such a big change in architecture there will be some kinks but it's exciting to see some fixes to one of my biggest complaints which is the repeated load times. With major software updates like this, are there independent bodies that evaluate and publish results based on known datasets (like NIST)?
ScottKjr3347 6/30/2022 11:23 AM
I have not completed bit for bit comparison nor has my comparisons been published, but I’ve been using PA 8 in beta for over a year. Other than what CB has published as not currently supported, the recent beta parsing and PA 7 parsing results have been spot on. In the recent release I thought there was some parsing difference, but it was a setting error that I made. If you have any questions about the parsing differences I would suggest asking for or accessing the CB CTF acquisitions and do a comparison yourselves with PA 8 and PA 7. I think you will be pleasantly surprised. This is what I did when Magnet AXIOM release it’s new full version 6.0. I would imagine NIST will do a work up but I’m sure it’s going to take a year or so before they release results. I know that puts a lot on lab staff but it works if you work it (edited)
👍 3
this 1
Avatar
Has anyone done a law enforcement request from Snapchat and asked for/got back device information? I am wondering if they capture any IMEI or other identifying info. Trying to correlate a device that is logging into a specific account that isn't theirs.
Avatar
Avatar
A A
Has anyone done a law enforcement request from Snapchat and asked for/got back device information? I am wondering if they capture any IMEI or other identifying info. Trying to correlate a device that is logging into a specific account that isn't theirs.
@Law Enforcement [USA]
Avatar
I ask but never get a device id, advertising id etc.
Avatar
Avatar
sirlane
I ask but never get a device id, advertising id etc.
same here
Avatar
DFIRDetective 6/30/2022 3:03 PM
I feel like every warrant I get from Snap, Google, and Apple give different responses with the exact same language in their respective requests. My most recent Snap warrant was on a cybertip and snap administratively deleted the account and didn't even save the email or phone number used to sign up. 😮💨 You can try but, I wouldn't expect much. (edited)
Avatar
I expected as much but figured I would double check with someone that's done one recently. Thanks everyone for the quick responses.
Avatar
I have a recent one. Under ip_data.csv they provided the Android model and pda version with each app_login_username entry along with the snapchat version. No IMEI though. (edited)
👍 1
Avatar
Lachrymosa 7/1/2022 3:16 AM
Hi all, I have a project requiring real fake printers and wanted to know the best approach. These printers would exist in a virtual environment but need to be as digitally real as possible (can live without paper/ink levels but would be super nice to have). Looking for any advice or directions on where to begin to do this. Please and Thank You!
Avatar
Avatar
Lachrymosa
Hi all, I have a project requiring real fake printers and wanted to know the best approach. These printers would exist in a virtual environment but need to be as digitally real as possible (can live without paper/ink levels but would be super nice to have). Looking for any advice or directions on where to begin to do this. Please and Thank You!
Ross Donnelly 7/1/2022 4:19 AM
Print to PDF presents itself as a virtual printer, guess it depends on exactly what you're testing
Avatar
Avatar
Ross Donnelly
Print to PDF presents itself as a virtual printer, guess it depends on exactly what you're testing
Lachrymosa 7/1/2022 4:22 AM
This specific use case is more of a honeypot with the potential of an adversary getting into the base OS of the printer/Printer FS. We didn't want them to realize at that point in their intrusion that it is fake. If I am understanding the FILE: option in creating a printer correctly, this just gives an interface for a host to ship a print job to, but no actual network location or resident OS on that network device.
Avatar
Avatar
Lachrymosa
This specific use case is more of a honeypot with the potential of an adversary getting into the base OS of the printer/Printer FS. We didn't want them to realize at that point in their intrusion that it is fake. If I am understanding the FILE: option in creating a printer correctly, this just gives an interface for a host to ship a print job to, but no actual network location or resident OS on that network device.
Ross Donnelly 7/1/2022 4:26 AM
I think you're going to struggle to find something like that, as there is no use case (other than yours!) for anyone to have produced a system that does that, and it's unlikely to be a common format you can just rip and virtualise outside of the hardware. Good luck though!
Avatar
Avatar
Ross Donnelly
I think you're going to struggle to find something like that, as there is no use case (other than yours!) for anyone to have produced a system that does that, and it's unlikely to be a common format you can just rip and virtualise outside of the hardware. Good luck though!
Lachrymosa 7/1/2022 4:28 AM
Yea, the deeper I google, the more I'm realizing that this hasn't quite been done, and if it has, people aren't forthcoming about it. Appreciate the attempt! If anyone else is sitting on some secret techniques though, I'd be happy to hear them.
Avatar
Didn't want to pollute the training channel, but.... Does anyone else, after completing a certification (or similar) feel a bit down afterwards. Like "Now what the heck do I do?" kind of feeling?
✋ 2
Avatar
Avatar
Lachrymosa
Yea, the deeper I google, the more I'm realizing that this hasn't quite been done, and if it has, people aren't forthcoming about it. Appreciate the attempt! If anyone else is sitting on some secret techniques though, I'd be happy to hear them.
Deleted User 7/1/2022 10:15 AM
Have you tried creating a virtual printer inside HyperV? I have no knowledge of HyperV but know it can create virtual switches, so why not virtual printers.
Avatar
Fantastic the midnlunch crash lag of scopely
Avatar
kladblokje_88 7/2/2022 3:07 AM
Just bought two VPS', gonna use one as a honeypot. The other one for personal stuff like a blog, Wireguard, password manager and note taking app. You guys got any recommendations on what software to use, or good/bad practices?
Avatar
I'd avoid keeping a password manager on a public facing VPS. Same with Notetaking apps, unless they're encrypted at rest with a strong password. For a blog, Ghost is really good, and for a password manager, I use 1Pass, but Bitwarden is OSS
Avatar
Agree, password manager in the cloud is a bad idea, unless fully encrypted, for blog react
Avatar
React is a bit of effort though...?
Avatar
Yeah for some true.
10:23 AM
🤣
Avatar
Just don't use bloody Wordpress, you'll be fine 🤣
😂 1
Avatar
Lol 100%
Avatar
Alternatively, use Wordpress on your honeypot
Avatar
Avatar
kladblokje_88
Just bought two VPS', gonna use one as a honeypot. The other one for personal stuff like a blog, Wireguard, password manager and note taking app. You guys got any recommendations on what software to use, or good/bad practices?
Also keep in mind a honeypot can generate a lot of traffic really fast. And if you’re paying for the vps, you could get a large bill rather quickly so keep that in mind.
Avatar
Avatar
Matt
I'd avoid keeping a password manager on a public facing VPS. Same with Notetaking apps, unless they're encrypted at rest with a strong password. For a blog, Ghost is really good, and for a password manager, I use 1Pass, but Bitwarden is OSS
kladblokje_88 7/2/2022 10:25 AM
seems legit, I will run those apps behind VPN
Avatar
Avatar
Matt
Alternatively, use Wordpress on your honeypot
kladblokje_88 7/2/2022 10:26 AM
HAHAHAHA
Avatar
A vpn won’t help a compromise vps
10:26 AM
Just don’t put a password manager on a public vps
updoot 1
Avatar
If you want it to be easily accessible, use a solution like 1Pass which handles that for you
Avatar
Or Enpass which is what I use
Avatar
If you're doing it yourself, with something like a password manager, one mistake would be extremely costly
Avatar
kladblokje_88 7/2/2022 10:30 AM
i see
Avatar
Another thing to do with honeypots - if possible - would be to look into Docker, it would make it easier for you and it's a good technology to learn how to use 🙂
10:36 AM
You could also play around with shipping logs to your other/another VPS if you wanted to analyse the data you're getting from the honeypot, presuming you've thought ahead that far 😆
Avatar
Avatar
Matt
Another thing to do with honeypots - if possible - would be to look into Docker, it would make it easier for you and it's a good technology to learn how to use 🙂
kladblokje_88 7/2/2022 2:33 PM
t-pot is docker containers galore
Avatar
Avatar
kladblokje_88
t-pot is docker containers galore
Good for learning
👍 1
Avatar
bigbeard24 7/3/2022 4:58 PM
Anyone based in the UK and involved with Mobile Device Forensics, I would appreciate it if you participated in a survey to assist my Research Project. I would also appreciate if you could share this with your colleagues! https://forms.gle/Kxuai4jkAq31Zcyj9
Aim of Survey: To capture the consensus amongst practitioners on the availability of standards, best practice guidelines for development and use of test devices, datasets and proficiency trials to support method validation for mobile device forensics. The survey is open to anyone involved in the forensic examination and/or tool and method testi...
Avatar
Hi, does anyone know if the string "--Apple-Mail-<Numbers-&-letters>" that is found in the ".emlx" file is a unique value inside the Apple Mail application?
Avatar
kladblokje_88 7/4/2022 5:44 AM
yoyoyo dude chill down
Avatar
Original message was deleted or could not be loaded.
kladblokje_88 7/4/2022 5:46 AM
why do you need our help lad. You are indexing
5:46 AM
we cant make it faster xDDD
Avatar
Apologies to anyone who was tagged aggressively by those messages. @Dyno was a little slow and this person slipped through the cracks before we had time to assign them a proper role
Avatar
Avatar
OllieD
Apologies to anyone who was tagged aggressively by those messages. @Dyno was a little slow and this person slipped through the cracks before we had time to assign them a proper role
I’ll forgive you this time Salute
Salute 1
😆 1
Avatar
4n6equals10 7/4/2022 7:55 AM
Hi, has anybody examined Raymarine ST6002 or MLR Valsta 03 maritime GPS devices?
Avatar
Avatar
OllieD
Apologies to anyone who was tagged aggressively by those messages. @Dyno was a little slow and this person slipped through the cracks before we had time to assign them a proper role
Wait what? Admins actually think they have a life outside of admining? 🤯
😂 9
Avatar
dinosaurdave 7/5/2022 1:55 AM
Hey all, I have a colleague doing his Masters who is struggling to come up with a dissertation topic. Any recommendations for forensic based topics?
Avatar
Avatar
dinosaurdave
Hey all, I have a colleague doing his Masters who is struggling to come up with a dissertation topic. Any recommendations for forensic based topics?
bigbeard24 7/5/2022 2:23 AM
Read the latest articles of Forensic Science International: Digital Investigation at ScienceDirect.com, Elsevier’s leading platform of peer-reviewed scholarly literature
Avatar
dinosaurdave 7/5/2022 2:27 AM
Ill pass this link to him, thanks 🙂
Avatar
Avatar
dinosaurdave
Hey all, I have a colleague doing his Masters who is struggling to come up with a dissertation topic. Any recommendations for forensic based topics?
Ross Donnelly 7/5/2022 9:56 AM
I wrote a paper about manipulating Google Location data. He could take it much further and consider the accuracy of all the different variables recorded and how they might be spoofed or altered https://dfir.pubpub.org/pub/d39u7lg1/release/1
👍 1
Avatar
Sorry if posted already but I didn't see it.... https://www.wired.com/story/apple-ios-16-lockdown-mode/
Starting with iOS 16, people who are at risk of being targeted with spyware will have some much-needed help.
Avatar
Avatar
A A
Sorry if posted already but I didn't see it.... https://www.wired.com/story/apple-ios-16-lockdown-mode/
thatboy_leo 7/6/2022 11:03 AM
Beat me to it, will be interesting to test this on extractions
11:04 AM
Apple today detailed two initiatives to help protect users who may be personally targeted by sophisticated digital threats.
11:05 AM
Wired connections are blocked while iPhone is locked (edited)
Avatar
Carb0hydrates 7/6/2022 11:44 AM
Hello everyone! I'm trying to collect a Domino server and I've never run up against one before. Is it just like any other server, where I can just get a physical/logical image and then deal with the contents downstream? Or is there a problem with that approach? Unfortunately, I don't have too many details (like if it's used to host Email, or websites, or if it's just files), but I'm just wondering how the collection process might go.
Avatar
Avatar
A A
Sorry if posted already but I didn't see it.... https://www.wired.com/story/apple-ios-16-lockdown-mode/
Yeah we are screwed 🙂
😢 1
Avatar
Avatar
DCSO
Yeah we are screwed 🙂
Not really... ask nicely for the passcode 🙂 (edited)
Avatar
@Jay528 ha I wish that were the case 🙂 My guess is they will probably have some prompt to have it connect to iCloud and and verify the complex passcode vs the 6 digit pin, but who knows. (edited)
Avatar
Trying to identify the chat application. Subject uses iPhone but I found bluestacks references on the machine, banner ad for Amazon across the top. Odd shape on the word bubbles (edited)
3:34 PM
I can give more context I just need to redact stuff
3:36 PM
Avatar
Textme?
Avatar
Avatar
whee30
Trying to identify the chat application. Subject uses iPhone but I found bluestacks references on the machine, banner ad for Amazon across the top. Odd shape on the word bubbles (edited)
Deleted User 7/6/2022 6:00 PM
How are you not able to figure out the application? You have the phone.. You're obviously logged in. Very confusing post?
Avatar
I don’t have the phone. It’s a screenshot on a laptop saved into a folder. The content of the message is relevant and I’m looking to see if I can send a paper to a company for more info
Avatar
Deleted User 7/6/2022 6:01 PM
Ah
6:01 PM
Ok
6:02 PM
Context would be helpful
6:02 PM
Are you LE?
Avatar
The shape of the word bubbles is unique and the row of buttons at the bottom might help… I’m just not finding the same setup on the apps I have
6:02 PM
Yes
Avatar
Deleted User 7/6/2022 6:02 PM
Laptop in question, why does it possess a chain of custody item
6:02 PM
Can you not also obtain the phone or are you trying to be quiet?
6:03 PM
Can you also give context to the type of crime
6:03 PM
Certain pedos use X, while dealers use Y
6:03 PM
etc.
Avatar
Without writing the whole report here, the phone is unavailable, the laptop was all that I had access to. All I’m trying to do is identify a chat application based on the characteristics of the icons in case someone is familiar. @conf1ck3r I will check out textme
Avatar
Avatar
Deleted User
Are you LE?
Andrew Rathbun 7/6/2022 6:04 PM
Look at this role. You can see it's LE [USA]. Sending paper is a way of saying serving a search warrant FYI
Avatar
Avatar
Andrew Rathbun
Look at this role. You can see it's LE [USA]. Sending paper is a way of saying serving a search warrant FYI
Deleted User 7/6/2022 6:05 PM
I know exactly what you meant, but I didnt bother clicking that handle 🙂 (edited)
Avatar
Andrew Rathbun 7/6/2022 6:05 PM
Also, most in LE can only provide so much detail about their cases, so just understand that when trying to help LE as you may not be able to have answers to questions you have out of respect for the sensitivity of the case/people involved
Avatar
Deleted User 7/6/2022 6:05 PM
Thats why Im askin context on the type of crime
6:05 PM
Also why Im being vague, I know you have to be 🙂
6:05 PM
But any context as to what the perp was doing would help slim out probable leads on the app of choice.
6:06 PM
Wanna fight in Ukraine as an example? Use telegram, etc.
6:06 PM
If you have a high quality image of the screenshot, I would isolate the icons and use a reverse image search
6:06 PM
@whee30 ^^
6:08 PM
@whee30 "had access to", if I follow this is a confiscated laptop and thus it would make sense there would perhaps be a record also of activity on that laptop perhaps of the same type of application. (edited)
Avatar
Right - I get all your digging for answers… it’s a good trait to have. I’ve been there and done that on the device I have. There are devices I don’t have, what I’ve posted is what is available.
Avatar
Avatar
whee30
Right - I get all your digging for answers… it’s a good trait to have. I’ve been there and done that on the device I have. There are devices I don’t have, what I’ve posted is what is available.
Deleted User 7/6/2022 6:13 PM
Ok. Step 1 take that photo and slice up as clean as you can. From there use a couple reverse image engines
6:13 PM
If you get no hits, let me know and I'll spend some time checking for you.
6:13 PM
But do that at least.
6:13 PM
Spend my tax dollars good =)(
6:14 PM
1 recommend is https://tineye.com/
6:14 PM
If you do that and google... Yeah I'll help further.
Avatar
@whee30 That looks like Kik to me
💯 7
Avatar
Deleted User 7/6/2022 6:54 PM
Sex then
6:54 PM
=/
Avatar
Avatar
abefroman
@whee30 That looks like Kik to me
Just re downloaded it, looks like it to me! Thank you for the assist.
💯 5
Avatar
Andrew Rathbun 7/6/2022 7:35 PM
Nice teamwork, all!
🎉 7
Avatar
And we're back! Check out https://quiz.socvel.com for our latest weekly SocVel Cybersecurity Quiz.
Your weekly SocVel Cybersecurity Quiz. Play Now!
Avatar
dinosaurdave 7/8/2022 6:53 AM
Forensic Friends... I am attempting to convince my unit managers to switch from EnCase to X-Ways and as a result I have been asked to prepare a document stating the benefits etc. Has anyone here ever prepared such a paper before? Or any case studies comparing the tools? My person experience with indecent image cases has shown X-Ways to be better at carving, so any comparisons of file carving would be of the utmost interest. I am of course intending to carry out tests myself and document the results, but just though I would check with the community first incase others have already done so.
Avatar
A few things I would touch on is that xways is a lightweight program you can deploy from a USB in the field if needed, almost certainly less expensive (I don’t have encase), IME all of my training has mentioned encase as the old standard that has fallen out of favor (anecdotal), and without knowing your office you could possibly touch on the examiner vs the tool argument. If you’re the only examiner and you accomplish your job better with a specific tool, perhaps that’s the tool they should be buying. Lastly, we shouldn’t be relying on a single tool, if they’re stuck on encase it’s there an argument you can make for both?
Avatar
dinosaurdave 7/8/2022 8:09 AM
We also have Axiom and Forensic Explorer licenses, so we can use them verify results etc
Avatar
Avatar
whee30
A few things I would touch on is that xways is a lightweight program you can deploy from a USB in the field if needed, almost certainly less expensive (I don’t have encase), IME all of my training has mentioned encase as the old standard that has fallen out of favor (anecdotal), and without knowing your office you could possibly touch on the examiner vs the tool argument. If you’re the only examiner and you accomplish your job better with a specific tool, perhaps that’s the tool they should be buying. Lastly, we shouldn’t be relying on a single tool, if they’re stuck on encase it’s there an argument you can make for both?
dinosaurdave 7/8/2022 8:09 AM
Thanks for your reply
Avatar
Avatar
Carb0hydrates
Hello everyone! I'm trying to collect a Domino server and I've never run up against one before. Is it just like any other server, where I can just get a physical/logical image and then deal with the contents downstream? Or is there a problem with that approach? Unfortunately, I don't have too many details (like if it's used to host Email, or websites, or if it's just files), but I'm just wondering how the collection process might go.
Arman Gungor 7/8/2022 8:35 AM
A couple of things to be mindful of in my experience: 1. You can run into encryption on many levels such as fields, documents, and databases. 2. If you preserve a running Domino server, it is possible to end up with some corrupt Notes databases in your forensic image. If the server can be stopped for imaging, this should be a non issue.
Avatar
Carb0hydrates 7/8/2022 8:45 AM
@Arman Gungor Thank you for the advice friend! I'll definitely keep my eye out!
👍🏻 1
Avatar
Avatar
dinosaurdave
We also have Axiom and Forensic Explorer licenses, so we can use them verify results etc
Axiom is awesome but the hex view is lacking. I love the combo of axiom and xways. I was just working across both programs on a case yesterday. Good luck. Here is one article with some benchmarks included: https://cloudyforensics.medium.com/encase-vs-ftk-vs-x-ways-review-2b7b075333ef
We’ve created a new tool to automate investigating and responding to security incidents in AWS and Azure — you can get a free trial here.
Avatar
Does anyone have a favorite timeline notes tool? I can use Google's or visio for report writing but would like something I can add events to as I go and then review as part of my work flow.
Avatar
Andrew Rathbun 7/8/2022 9:24 AM
CyberChef incremented like 8 versions (and counting) today so far, be sure to update your local copies! https://github.com/gchq/CyberChef/blob/master/CHANGELOG.md
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis - CyberChef/CHANGELOG.md at master · gchq/CyberChef
👍 5
Avatar
Avatar
Andrew Rathbun
CyberChef incremented like 8 versions (and counting) today so far, be sure to update your local copies! https://github.com/gchq/CyberChef/blob/master/CHANGELOG.md
plist and LZString support? Hell yeah
PartyParrot 6
Avatar
Hi everyone, I'm reading about NAT in GeeksforGeeks and came across this sentence, If NAT runs out of addresses, i.e., no address is left in the pool configured then the packets will be dropped and an Internet Control Message Protocol (ICMP) host unreachable packet to the destination is sent. But how can NAT run out of addresses? I thought the whole point of NAT was to translate private ipv4 addresses into one or various public ipv4 addresses. What do they mean then with this statement? Is it referring to how NAT is configured and how many devices need a public IPv4 address? (i.e. for a given network NAT can only provide 2 public IPv4 addresses but there are 3 devices that require their own public IPv4 address)? (edited)
Avatar
Avatar
whee30
Click to see attachment 🖼️
krisc#21223 7/8/2022 3:23 PM
The read symbol looks alot like KiK I am not sure if you can customize the bubbles. It might be worth looking at.
Avatar
Avatar
degent_
Hi everyone, I'm reading about NAT in GeeksforGeeks and came across this sentence, If NAT runs out of addresses, i.e., no address is left in the pool configured then the packets will be dropped and an Internet Control Message Protocol (ICMP) host unreachable packet to the destination is sent. But how can NAT run out of addresses? I thought the whole point of NAT was to translate private ipv4 addresses into one or various public ipv4 addresses. What do they mean then with this statement? Is it referring to how NAT is configured and how many devices need a public IPv4 address? (i.e. for a given network NAT can only provide 2 public IPv4 addresses but there are 3 devices that require their own public IPv4 address)? (edited)
It means if NAT runs out of Private IP addresses. For example, if you set up NAT to use a 192.168.0.0/27 subnet you only have 30 private host IPs available for the one Public IP address. If there are 31 devices connected to that LAN at the same time all trying to use the same Public IP address then packets would be dropped.
Avatar
DeeFIR 🇦🇺 7/8/2022 3:39 PM
NAT itself doesn’t ‘run out of’ addresses though. It’s simply mapping source/dest IP with source/dest port. If you exhaust the NAT table you wouldn’t be able to map additional connections, or if you had more than ~65,000 connections from a single internal host. If you consider your example about having a /27 subnet, that’s a relatively small office setup which may have a single internet connection/public IP. Are you saying 30 hosts wouldn’t be able to access the internet at the same time? What am I missing? Am I caffeine deprived?
Avatar
I think that would be the difference between NAT and PAT. https://techdifferences.com/difference-between-nat-and-pat.html
The main difference between NAT and PAT is that NAT is used to map public IP addresses to private IP addresses, it could be a one-to-one or many-to-one relation. On the other hand, PAT is a type of NAT where the multiple private IP addresses are mapped into a single public IP (many-to-one) by using ports.
Avatar
Halp! Do you know of, prefer, or maintain any blueteam-oriented repos of GPOs/ADMX files? Would LOVE to know about them! https://twitter.com/rj_chap/status/1545567139037229056
Which repos of GPOs (ADMX) specific to #cybersecurity/#cyberdefense do you like? We #DFIR folks recommend Credential+Exploit Guard, LAPS, class handlers for bat/js/ps1 > notepad.exe, and more. Let's share examples! https://t.co/ufELejuy7i https://t.co/zDFX7Gm2HT @SwiftOnSecurity
Avatar
Avatar
dinosaurdave
Forensic Friends... I am attempting to convince my unit managers to switch from EnCase to X-Ways and as a result I have been asked to prepare a document stating the benefits etc. Has anyone here ever prepared such a paper before? Or any case studies comparing the tools? My person experience with indecent image cases has shown X-Ways to be better at carving, so any comparisons of file carving would be of the utmost interest. I am of course intending to carry out tests myself and document the results, but just though I would check with the community first incase others have already done so.
I believe Eric Zimmerman put together a side by side comparison of suites a few years back. May want to use that as a jumping point to formulate an up to date argument, along with whatever feedback you get from this group
Avatar
Avatar
HeavyVin
Does anyone have a favorite timeline notes tool? I can use Google's or visio for report writing but would like something I can add events to as I go and then review as part of my work flow.
Timesketch is an open source collaborative timeline analysis tool (source code) for for digital forensics and incident response. Using…
Avatar
Avatar
luis511_
I believe Eric Zimmerman put together a side by side comparison of suites a few years back. May want to use that as a jumping point to formulate an up to date argument, along with whatever feedback you get from this group
Andrew Rathbun 7/8/2022 6:27 PM
Random links and other stuff Imaging speed tests My imaging speed test results can he found here Forensic programs testing My test...
this 1
Avatar
Interesting stuff! Wonder if he's done any comparisons recently as both have had some severe updates
Avatar
jaspatocat 7/9/2022 8:14 PM
Hi everyone, I have a situation where there was a break in and as part of break in robbers disconnected the G-pon terminal, is there a way to timestamp that event through ISP or any other means thanks.
Avatar
what are the 5 frameworks used for digital forensic process
Avatar
Avatar
Rajeshwari
what are the 5 frameworks used for digital forensic process
Digitalferret 7/10/2022 9:00 AM
.. (edited)
this 1
9:01 AM
like these or?
Avatar
randomaccess 7/10/2022 6:08 PM
There's more than 5. But they're mostly all variations of the same thing
Avatar
Avatar
jaspatocat
Hi everyone, I have a situation where there was a break in and as part of break in robbers disconnected the G-pon terminal, is there a way to timestamp that event through ISP or any other means thanks.
Not my area of expertise but is there any chance there's connected devices that log networking failures?
Avatar
Hi everyone, i'm wondering if anyone has any entry-level project ideas for a summer project - i'm a student so don't have access to costly tools, but would definitely love to challenge myself, cheers
Avatar
Avatar
Elliott
Hi everyone, i'm wondering if anyone has any entry-level project ideas for a summer project - i'm a student so don't have access to costly tools, but would definitely love to challenge myself, cheers
Andrew Rathbun 7/11/2022 6:20 AM
Can you code? If so, which language(s)?
Avatar
Avatar
Andrew Rathbun
Can you code? If so, which language(s)?
I can code in Python, would only say beginner level though
Avatar
Avatar
Elliott
I can code in Python, would only say beginner level though
randomaccess 7/11/2022 7:26 AM
Pick a popular endpoint application (Dropbox, google drive, chat apps, whatever) Do some testing about what you can find (plus google a lot) Write tool to decode and present the data For reference see OneDriveExplorer by Brian Maloney @Beercow
7:28 AM
(this is me definitely not mentioning two tools by name that primarily have sqlite databases and text based Configs that should be easily understandable and Id like timeline and information gathering parsers for)
Avatar
Avatar
randomaccess
Pick a popular endpoint application (Dropbox, google drive, chat apps, whatever) Do some testing about what you can find (plus google a lot) Write tool to decode and present the data For reference see OneDriveExplorer by Brian Maloney @Beercow
That's great i'll look into that and have a go thank you!
Avatar
Avatar
randomaccess
Pick a popular endpoint application (Dropbox, google drive, chat apps, whatever) Do some testing about what you can find (plus google a lot) Write tool to decode and present the data For reference see OneDriveExplorer by Brian Maloney @Beercow
Or if you are still not comfortable with writing the tools, document your findings. Research is STILL so important as it adds to our collective understanding. Tools can always come later as well
💯 5
Avatar
Digitalferret 7/11/2022 11:11 AM
as per Mr SwearyVaynerchuk, maybe document something you do already and trace the install/artefacts/uninstall/deleteds and such, maybe if you torrent or smnthn (edited)
Avatar
Thanks for all your help guys! Will be giving all that a good crack!
Avatar
Deleted User 7/11/2022 10:41 PM
Can anyone with experience successfully serving a warrant to ProtonMail please share your experience. Feel free to DM, thanks.
Avatar
Avatar
Deleted User
Can anyone with experience successfully serving a warrant to ProtonMail please share your experience. Feel free to DM, thanks.
Not a warrant, but in general their LE approach is hard work and I found it likegetting getting blood from of a stone.
Avatar
Avatar
Rob
Not a warrant, but in general their LE approach is hard work and I found it likegetting getting blood from of a stone.
Deleted User 7/11/2022 10:54 PM
Thanks. Figured as much. Any advice on the right approach that got you that blood from said stone?
Avatar
Avatar
Deleted User
Thanks. Figured as much. Any advice on the right approach that got you that blood from said stone?
I had a single email reply from I believe their abuse email address to speak to their legal team whom then never replied and I then had no further replies.
10:59 PM
The way we got around it in a case of ours, the suspect was cooperative and once you have the password it's easyish mode to download
11:00 PM
Can't download the account in bulk via pop3/imap if it's a free account so we had to upgrade the account.
Avatar
Avatar
Rob
The way we got around it in a case of ours, the suspect was cooperative and once you have the password it's easyish mode to download
Deleted User 7/11/2022 11:00 PM
Thanks Rob. My task is a bit more daunting since the subject is unknown. Appreciate the response 👍🏻
Avatar
Aha, best of luck!
11:02 PM
Should be possible from what I've heard/been told so I would imagine their dealings with official subpoenas etc are likely to be better than their email replying skills.
Salute 1
Avatar
Does anyone have some prebuilt keyword/regex lists to use when processing different types of cases? I have one for CSAM cases, but I am looking for ones that can be used on drug cases, ID theft, etc.
Avatar
Avatar
FullTang
Does anyone have some prebuilt keyword/regex lists to use when processing different types of cases? I have one for CSAM cases, but I am looking for ones that can be used on drug cases, ID theft, etc.
Andrew Rathbun 7/12/2022 1:45 PM
💯 1
👍 1
Avatar
My Google-Fu failed me. Thanks!
Avatar
Andrew Rathbun 7/12/2022 1:46 PM
Best resource I have. If you wanna GitHub a wordlist for drugs or something else, let me know and we'll spin up a repo!
👍 2
Avatar
I've seen an Excel sheet that shows which artifact is available on Server or Workstations but I can't find it anymore. Does anyone know such a matrix?
Avatar
Avatar
Cyb3rMonk
I've seen an Excel sheet that shows which artifact is available on Server or Workstations but I can't find it anymore. Does anyone know such a matrix?
randomaccess 7/13/2022 5:18 AM
for program execution artefacts?
5:19 AM
UPDATED 2019-01-04 This week I have been working a case where I was required to identify users on a Windows Server 2003 system who h...
Avatar
yeah, this was the one. Thanks!
5:20 AM
hmm, is there something similar for network, and other activities?
Avatar
randomaccess 7/13/2022 5:28 AM
not that im aware of if you think it would be useful you can probably get some folks here to help you compile it 🙂
Avatar
I'll think about it. Just dumping ideas at the moment 😄
Avatar
Hey all weird question, but just wanted to see if I could get some input. In regards to MAC times... is the "Created" time updated when the file is saved or when the file is changed?
Avatar
Avatar
attackd0gz
Hey all weird question, but just wanted to see if I could get some input. In regards to MAC times... is the "Created" time updated when the file is saved or when the file is changed?
Digitalferret 7/13/2022 1:12 PM
might be quicker just testing it?
1:13 PM
without googling, i'd go for Saved else there'd be a disparity later if it was changed and then not saved?
Avatar
Ok, here is my usual answer. It depends
Avatar
I have a file that the MAC times are in this order: Created: Jan 13 2021 2:30 AM Modified: Oct 1 2020 Accessed: Jan 12 2021 At first glance, I thought the file was copied, because in that operation, mod time is preserved, but then shouldn't the Create and Access time be the same date?
Avatar
Avatar
Digitalferret
might be quicker just testing it?
You right
Avatar
Avatar
attackd0gz
I have a file that the MAC times are in this order: Created: Jan 13 2021 2:30 AM Modified: Oct 1 2020 Accessed: Jan 12 2021 At first glance, I thought the file was copied, because in that operation, mod time is preserved, but then shouldn't the Create and Access time be the same date?
Digitalferret 7/13/2022 1:33 PM
also, and alluded to by dsplice image - this example is on windows OS? (edited)
1:34 PM
my understanding is that Created time is when the file lands on <your> system
Avatar
Yes Windows
Avatar
Digitalferret 7/13/2022 1:35 PM
so, the file could have been accesses (read) on the 12th and copide/moved to 'that' system on the 13th
1:36 PM
i'll be honest, MAC times have always bent my head, and splices chart made it hurt even more 😄
Avatar
Hahaha. Same here. I would assume the copy operation would then update the access time as well. I hate MAC times now that I am thinking about it again
Avatar
Ross Donnelly 7/13/2022 2:26 PM
"Test 5 - Move a file to another location in the same volume, drag-n-drop, via the Windows Explorer shell" might be a good one to test http://windowsir.blogspot.com/2014/07/file-system-ops-effects-on-mft-records.html?m=1
I recently conducted some testing of different actions on a Windows 7 system, with the specific purpose of identifying artifacts within the ...
2:28 PM
Something like X-Ways will also let you read the MAC times from both $Standard_Information and $Filename attributes which can be really helpful in figuring out what's going on
👍 2
Avatar
Avatar
Ross Donnelly
Something like X-Ways will also let you read the MAC times from both $Standard_Information and $Filename attributes which can be really helpful in figuring out what's going on
Andrew Rathbun 7/13/2022 6:35 PM
MFTECmd too! I just wrote a blog post series covering doing this exact timestamp analysis. https://www.kroll.com/en/insights/publications/cyber/anti-forensic-tactics/detecting-analyzing-timestomping-with-kape
Timestomping can be detected by using a combination of KAPE, timeline explorer and MFTECmd. Learn more
👍 2
Avatar
Hi all. I’ve got a file which contains illegal characters and im unable to remove/rename/delete the file. I’ve tried using ROBOCOPY, powershell etc. but it says access denied, any idea on how I can get rid of it?
Avatar
Avatar
obi95
Hi all. I’ve got a file which contains illegal characters and im unable to remove/rename/delete the file. I’ve tried using ROBOCOPY, powershell etc. but it says access denied, any idea on how I can get rid of it?
maybe with fastcopy. or else boot a live linux?
Avatar
Avatar
leifsoren
maybe with fastcopy. or else boot a live linux?
can also maybe try TeraCopy
Avatar
Avatar
obi95
Hi all. I’ve got a file which contains illegal characters and im unable to remove/rename/delete the file. I’ve tried using ROBOCOPY, powershell etc. but it says access denied, any idea on how I can get rid of it?
Digitalferret 7/14/2022 8:01 AM
left-field but maybe give Iobit unlocker https://www.iobit.com/en/iobit-unlocker.php a go, see if it enables the file for action
8:02 AM
there's also Unlocker for Windows 1.92 https://filehippo.com/download_unlocker/ . I've successfully used both before
Avatar
Anyone familiar with what I assume is a Developer Scoped UUID (Apple)? We did a request to binance and they responded with some UUID's for devices. Just trying to see the best way to word the legal process to apple.
Avatar
A new SocVel Cybersecurity Quiz is out! (W18) In this week's quiz, we cover everything from SQL servers getting popped to crypto hacks being topped. From cars being remotely hacked to ransomware having the education sector on its back. And much more! https://quiz.socvel.com
Your weekly SocVel Cybersecurity Quiz. Play Now!
Avatar
I think someone had previously mentioned this but things to look forward to when encountering iOS 16 https://www.theverge.com/2022/7/6/23196978/apple-lockdown-mode-security-hacking-pegasus-macos-ios-ipados
Protection against ‘state-sponsored mercenary spyware’
Avatar
@Law Enforcement [UK] Does anyone have a keyword list that they may run on suicide jobs?
Avatar
Avatar
Rob
@Law Enforcement [UK] Does anyone have a keyword list that they may run on suicide jobs?
Colleague of mine created one, I’ll see if I can dig it out. DM me your email and if I find it I’ll send it over.
👍 1
Avatar
Avatar
rojo
Colleague of mine created one, I’ll see if I can dig it out. DM me your email and if I find it I’ll send it over.
If you find it, could I possibly have a copy as well?
Avatar
Avatar
rojo
Colleague of mine created one, I’ll see if I can dig it out. DM me your email and if I find it I’ll send it over.
I know I am on the other side of the pond but could you send a copy my way?
Avatar
@obi95 @FullTang Yes to both, DM your emails across and I’ll send it over. I just found it - it’s by no means extensive and is a few years old now so the websites listed may not be current anymore but it might hopefully be a good starting point at least.
👍 3
Avatar
Avatar
stark4n6
Got some test images, tools and processes listed here https://startme.stark4n6.com
This is great!
❤️ 1
Avatar
Avatar
B@man
This is great!
Hope you find it useful
Avatar
What’s the general consensus on Sumuri Talino forensic laptops. Are they worth it if you’re going for a forensic workstation in a laptop form factor? 🙂 https://sumuri.com/product/talino-ka-l-alpha/
The SUMURI TALINO KA-L Alpha is an extremely portable forensic Laptop specifically designed to perform faster than most desktop forensic workstations. The TALINO KA-L Alpha packs a tremendous amount of power in a small thin form factor.  Like all of our other products, the KA-L Alpha is customizable to suit your needs and comes with our standard...
Avatar
Avatar
Fierry
What’s the general consensus on Sumuri Talino forensic laptops. Are they worth it if you’re going for a forensic workstation in a laptop form factor? 🙂 https://sumuri.com/product/talino-ka-l-alpha/
Seems expensive for the specs. Only viable if you're triaging on scene etc.
👍 1
Avatar
@Fierry I have one in the lab. the laptop works with 2 power supplies. Both power supplies must be connected for the battery to be powered. I find the laptop too big and cumbersome at the scene of a search warrant. There are a lot of unnecessary options like the colors of the keyboard and around the laptop. But in the lab the performance is there. Includes a powerful video card. I have a rtx3080 inside. But for the price, you can get more for less. (edited)
👍 1
Avatar
That’s what I was thinking as well. I was finding different similarity specked laptops far below the offered price point
Avatar
Andrew Rathbun 7/17/2022 4:57 AM
https://twitter.com/shodanhq/status/1548472517731311620?t=5Y3Vpi2fEABqYt0U7k2WnA&s=19 Skip a trip to McDonald's and grab this for yourself today only!
The Shodan Membership is on sale now for $5 until the end of Sunday, July 17th (GMT): https://t.co/0iqiq2MWrn
Likes
1473
Retweets
889
updoot 8
Avatar
KillSwitchX7 7/17/2022 7:17 AM
Hey guys Could anyone share any threat hunting reporting template, I would be really grateful ❤️
Avatar
Avatar
Andrew Rathbun
https://twitter.com/shodanhq/status/1548472517731311620?t=5Y3Vpi2fEABqYt0U7k2WnA&s=19 Skip a trip to McDonald's and grab this for yourself today only!
they only take credit cards 😦
Avatar
Avatar
PS
they only take credit cards 😦
And debit cards
Avatar
Avatar
Andrew Rathbun
https://twitter.com/shodanhq/status/1548472517731311620?t=5Y3Vpi2fEABqYt0U7k2WnA&s=19 Skip a trip to McDonald's and grab this for yourself today only!
DeeFIR 🇦🇺 7/17/2022 3:46 PM
And remember that if you're a student you can request a free academic upgrade! https://help.shodan.io/the-basics/academic-upgrade
💯 2
Avatar
nem'n'nem (nemz) 7/18/2022 1:50 AM
Ooof thanks @DeeFIR 🇦🇺, seen after I already went the $5 route but I'll share this with my uni mates 😊
Avatar
Avatar
nem'n'nem (nemz)
Ooof thanks @DeeFIR 🇦🇺, seen after I already went the $5 route but I'll share this with my uni mates 😊
DeeFIR 🇦🇺 7/18/2022 1:55 AM
You still get more 😉 like being able to use the vuln tag..
Avatar
Avatar
DeeFIR 🇦🇺
And remember that if you're a student you can request a free academic upgrade! https://help.shodan.io/the-basics/academic-upgrade
𝙎𝙥𝙡𝙞𝙣𝙩𝙚𝙧#0101 7/18/2022 2:07 AM
Thanks m8. 👍
Avatar
nem'n'nem (nemz) 7/18/2022 3:10 AM
Amazing, I look forward to checking it out, cheers
Avatar
Hello, I was wondering if any of you encountered the problem of a windows vm not booting, after you resize the virtual disk and the snapshots as well. I did the resize on another VM (also with the snapshots) and works perfectly fine but on this one it just keeps restarting. The hypervisor is VirtualBox.
Avatar
Avatar
ZetLoke77
Hello, I was wondering if any of you encountered the problem of a windows vm not booting, after you resize the virtual disk and the snapshots as well. I did the resize on another VM (also with the snapshots) and works perfectly fine but on this one it just keeps restarting. The hypervisor is VirtualBox.
Also used gparted as a live boot cd, allocated the unallocated space to the partition but still no results. (edited)
Avatar
Avatar
Fierry
What’s the general consensus on Sumuri Talino forensic laptops. Are they worth it if you’re going for a forensic workstation in a laptop form factor? 🙂 https://sumuri.com/product/talino-ka-l-alpha/
We think they're pretty great, but if you have a specific spec or budget to hit, we're known for working with people as needed. Please DM me if you need anything!
Avatar
Avatar
ZetLoke77
Hello, I was wondering if any of you encountered the problem of a windows vm not booting, after you resize the virtual disk and the snapshots as well. I did the resize on another VM (also with the snapshots) and works perfectly fine but on this one it just keeps restarting. The hypervisor is VirtualBox.
Deleted User 7/18/2022 7:45 AM
Had the exact same issue today 😣 No idea why my primary partition would not expand. Busy re-installing after it failed to reboot and don’t have the patience to deal with Windows.
Avatar
Any free tools for orphaned OST recovery or are they all paid?
9:08 AM
I don't mind paying again just curious if I was missing one that was out there
Avatar
MrMacca (Allan Mc) 7/18/2022 9:13 AM
Any tools recommended to pull data from the HxStore.hxd and then export it to a PST/OST?
Avatar
Avatar
FX_Tymills
Any free tools for orphaned OST recovery or are they all paid?
Im fairly certain FTK imager will highlight orphaned files and folder. If you try it and it works I would love to know.
Avatar
Avatar
Deleted User
Had the exact same issue today 😣 No idea why my primary partition would not expand. Busy re-installing after it failed to reboot and don’t have the patience to deal with Windows.
Yes windows is a real pain. I will try tonight to do a repair with an ISO image of win10 to see if it works. With chkdsk from the console didn't work as well. It said that the partition was read only... And clearing the attributes of read-only was not possible unfortunately
👍 1
Avatar
Avatar
MrMacca (Allan Mc)
Any tools recommended to pull data from the HxStore.hxd and then export it to a PST/OST?
Ross Donnelly 7/18/2022 11:05 AM
Latest versions of Axiom are supposed to support this, and can export to PST, but haven't tried it myself
Avatar
MrMacca (Allan Mc) 7/18/2022 11:07 AM
@Ross Donnelly It does, however it removes the senders Email address at the moment, which I'm trying to retain. Magnet are looking into it as we speak Salute
Avatar
Avatar
MrMacca (Allan Mc)
@Ross Donnelly It does, however it removes the senders Email address at the moment, which I'm trying to retain. Magnet are looking into it as we speak Salute
Ross Donnelly 7/18/2022 11:08 AM
Who needs the sender anyway....
Avatar
Anyone in here from Germany? I am looking to emigrate after college, but I want to make sure DF is somewhat in demand over there.
Avatar
Avatar
Deleted User
Had the exact same issue today 😣 No idea why my primary partition would not expand. Busy re-installing after it failed to reboot and don’t have the patience to deal with Windows.
Startup repair didn't work either 😂
Avatar
is this where i would ask regarding exif data ?
Avatar
Avatar
ZetLoke77
Startup repair didn't work either 😂
Deleted User 7/19/2022 12:25 AM
Every day is a Monday with Windows 🤡 I am still rebuilding my VM.
Avatar
Avatar
Deleted User
Every day is a Monday with Windows 🤡 I am still rebuilding my VM.
Unfortunately I will have to do it as well. Next time when doing labs I will try to get enough storage capacity so I won't need to resize again :)))
Salute 1
Avatar
Avatar
rojo
Colleague of mine created one, I’ll see if I can dig it out. DM me your email and if I find it I’ll send it over.
Can I have one too?
Avatar
Avatar
CCC
Can I have one too?
Sure, send me your email and I’ll send it over
Avatar
Avatar
greggert
is this where i would ask regarding exif data ?
Digitalferret 7/19/2022 12:59 AM
only one way to find out 🙂
Avatar
Avatar
Fierry
What’s the general consensus on Sumuri Talino forensic laptops. Are they worth it if you’re going for a forensic workstation in a laptop form factor? 🙂 https://sumuri.com/product/talino-ka-l-alpha/
Idk , seems like an unbranded Older MSI , nothing special about the specs tbh, I do see that they charge $6000+ for a $600 Mac Mini M1 so I don’t know if their software is really wicked or? Seems like a lot of money for nothing tbh (edited)
Avatar
Just encountered an HDD which Windows doesnt see and it says it is like 0 bytes capacity. No problem viewing it in Linux, but when I try to delete some folders it says the file-system is read-only. Tried to solve the problem by using the remount option with read and write permissions or by specifying the file system ntfs-3g but it didn't work. Any idea how I can delete some of its contents taking in consideration this situation? (edited)
Avatar
Avatar
ZetLoke77
Just encountered an HDD which Windows doesnt see and it says it is like 0 bytes capacity. No problem viewing it in Linux, but when I try to delete some folders it says the file-system is read-only. Tried to solve the problem by using the remount option with read and write permissions or by specifying the file system ntfs-3g but it didn't work. Any idea how I can delete some of its contents taking in consideration this situation? (edited)
Digitalferret 7/19/2022 6:15 AM
windows (your OS or the source system) might need to "release it" with a clean/full shutdown. force that in Windows by keeping the Shift key held down and using Shutdown also maybe check the power settings to see if it or any other drives have Power Button does <everything but shutdown> (sleep/hibernate ) etc (edited)
6:20 AM
and just to ask Windows doesnt see and it says it is like 0 bytes capacity - if windows can't see it... howso it reports zero bytes
Avatar
Avatar
Digitalferret
and just to ask Windows doesnt see and it says it is like 0 bytes capacity - if windows can't see it... howso it reports zero bytes
I wanted to say it doesn't see the content....my bad man. I will try what you said... Thanks 👍
👍🏻 1
Avatar
Avatar
ZetLoke77
Just encountered an HDD which Windows doesnt see and it says it is like 0 bytes capacity. No problem viewing it in Linux, but when I try to delete some folders it says the file-system is read-only. Tried to solve the problem by using the remount option with read and write permissions or by specifying the file system ntfs-3g but it didn't work. Any idea how I can delete some of its contents taking in consideration this situation? (edited)
How do you connect the disk? Any external ports like USB?
Avatar
Avatar
Fierry
How do you connect the disk? Any external ports like USB?
Via SATA. It is an internal HDD.
Avatar
You might want to try initializing it using the Windows Disk Management snap in 🙂
Avatar
is anyone a wizard with the new @Griffeye html formats where i want to add a custom column to the html? (edited)
7:18 AM
Just wanna add the LensModel section (which shows it being taken with back camera)
Avatar
Avatar
Fierry
You might want to try initializing it using the Windows Disk Management snap in 🙂
Digitalferret 7/19/2022 7:57 AM
you sure about that? he has files on there
Avatar
Ah apologies, I made a mix up, I meant turning the disk offline/online
Avatar
I already miss my snack times from SANS last week 😦
😆 1
Avatar
was interested in exif codes through hexdump, i don’t understand how the math works from https://exiftool.org/TagNames/EXIF.html tags to tags on hexdump -c of a image
11:13 AM
for example a hexdump of a image with a sony make leads to this]
11:13 AM
0000-00a0: ac 00 00 00-54 02 00 00-53 4f 4e 59-00 00 48 44 ....T... SONY..HD
11:13 AM
but the "tag" for it is
11:13 AM
0x010f
11:14 AM
I want to make a parser but I dont fully understand it
11:17 AM
Sample images for testing Exif metadata retrieval. - exif-samples/Sony_HDR-HC3.jpg at master · ianare/exif-samples
11:17 AM
This is the image I was referring to
Avatar
Avatar
greggert
0000-00a0: ac 00 00 00-54 02 00 00-53 4f 4e 59-00 00 48 44 ....T... SONY..HD
Digitalferret 7/19/2022 11:32 AM
maybe read around : https://en.wikipedia.org/wiki/Exif Problems | Technical. some Maker notes / tags . but in general, go to as many different technical resources as possible, and pool the data to make your own understanding of it. beware also that some notes are proprietory
Avatar
ive looked around a lot, the main thing i want to understand is just how to get to 0000-00a0 from 0x010f
Avatar
Digitalferret 7/19/2022 11:44 AM
rubber duck me. what is 0000-00a0
Avatar
its just the tag in the hexdump (edited)
11:44 AM
the hexdump i used displayed it weird
11:44 AM
one sec lemme see if i cna find another
11:44 AM
i believe there normally isnt dashs
Avatar
000090 my bad
11:54 AM
is the tag where sony would be
Avatar
Avatar
greggert
0000-00a0: ac 00 00 00-54 02 00 00-53 4f 4e 59-00 00 48 44 ....T... SONY..HD
Digitalferret 7/19/2022 12:01 PM
000090 or even 0000-00a0 is the address or hex displacement / offset
12:02 PM
The standard defines a MakerNote tag, which allows camera manufacturers to place any custom format metadata in the file. This is used increasingly by camera manufacturers to store camera settings not listed in the Exif standard, such as shooting modes, post-processing settings, serial number, focusing modes, etc. As the tag contents are proprietary and manufacturer-specific, it can be difficult to retrieve this information from an image or to properly preserve it when rewriting an image. Manufacturers can encrypt portions of the information; for example, some Nikon cameras encrypt the detailed lens data in the MakerNote data. (edited)
12:03 PM
Sony Tags The following information has been decoded from the MakerNotes of Sony cameras. Some of these tags have been inherited from the Minolta MakerNotes.
12:04 PM
MakerNote data The "MakerNote" tag contains image information normally in a proprietary binary format. Some of these manufacturer-specific formats have been decoded:
12:12 PM
unless there's anyone else here who has explicit knowledge of the actual structure of exif/Makernotes a nd decoding etc, you might get more return in a Image/Graphics specific forum/group. i'd hazard a gues that most here just actually use the output data of the applications rather than DIY it from raw data
Avatar
Avatar
Digitalferret
unless there's anyone else here who has explicit knowledge of the actual structure of exif/Makernotes a nd decoding etc, you might get more return in a Image/Graphics specific forum/group. i'd hazard a gues that most here just actually use the output data of the applications rather than DIY it from raw data
yeah thats kinda what i was looking for when i found this server
Avatar
Avatar
greggert
yeah thats kinda what i was looking for when i found this server
Digitalferret 7/19/2022 12:40 PM
you might be confusing the actual hex address with the offset from where Exif starts?
Avatar
very possible , i still dont exactly follow lol
12:40 PM
i dont know why exif is so difficult for me to follow
Avatar
Digitalferret 7/19/2022 12:41 PM
im doing this on the hoof too 🙂
12:42 PM
cant g'tee how far Ill get, but i'll open a thread, save filling GenDisc
Avatar
Ross Donnelly 7/19/2022 1:22 PM
Here's a good question for DF - what's something that you technically understand, but still seems a bit like magic? I'd say public key encryption - I still find it incredible that you can negotiate a secure channel over the public internet without anyone being able to eavesdrop.
💯 1
Avatar
Avatar
Ross Donnelly
Here's a good question for DF - what's something that you technically understand, but still seems a bit like magic? I'd say public key encryption - I still find it incredible that you can negotiate a secure channel over the public internet without anyone being able to eavesdrop.
Andrew Rathbun 7/19/2022 1:28 PM
1's and 0's and hex and all that crazy stuff going on underneath the hood with computers and mobile devices
👍 3
Avatar
Avatar
Ross Donnelly
Here's a good question for DF - what's something that you technically understand, but still seems a bit like magic? I'd say public key encryption - I still find it incredible that you can negotiate a secure channel over the public internet without anyone being able to eavesdrop.
The shear speed at which all encoding and processing operations are performed. It’s one thing to know exactly how data is stored and transmitted, but to know those operations are literally performed BILLIONS of times per SECOND (GHz) with minimal to no errors is just baffling to me.
👍 1
Avatar
Is anyone familiar with what ‘onlineuser’ might be in terms of windows user events (4648) or SMB user activity? I thought it referred to the currently logged in user but I cannot find anything to support that.
2:13 PM
*anything to support meaning documentation or KB articles etc.
Avatar
Avatar
Ross Donnelly
Here's a good question for DF - what's something that you technically understand, but still seems a bit like magic? I'd say public key encryption - I still find it incredible that you can negotiate a secure channel over the public internet without anyone being able to eavesdrop.
randomaccess 7/19/2022 9:02 PM
Why someone thought it was a good idea to make sand think with lightning
👍 2
Avatar
Just for getting other opinions... recommendations for laptops for DFIR?
Avatar
Avatar
B@man
Just for getting other opinions... recommendations for laptops for DFIR?
Andrew Rathbun 7/20/2022 4:57 AM
Cores and RAM! SSDs! We use Sager at Kroll but there are plenty of other good options.
👍 1
Avatar
Avatar
B@man
Just for getting other opinions... recommendations for laptops for DFIR?
We use HP Zbook's for laptops in the field. Haven't had an issue with them so far (knock on wood) https://www.hp.com/us-en/workstations/mobile-workstation-pc.html
HP most powerful, most secure mobile workstation PCs, designed and built for high-performance computing, allowing you to process large amounts of data, or render 3D graphics and videos
👍 2
Avatar
Avatar
Carcino
Im fairly certain FTK imager will highlight orphaned files and folder. If you try it and it works I would love to know.
When I say orphaned here I just mean the OST is orphaned from Outlook, if the profile was active in outlook I could just export to a PST myself
Avatar
Avatar
FX_Tymills
When I say orphaned here I just mean the OST is orphaned from Outlook, if the profile was active in outlook I could just export to a PST myself
Ah ok, I don't have experience with that, good luck!
👍 1
Avatar
There are OST viewers out there. Javed used one by Kernel with good success
Avatar
Avatar
Tcisaki
There are OST viewers out there. Javed used one by Kernel with good success
Digitalferret 7/20/2022 10:53 AM
same here, worked ok for me, but if i remember right (been a while) there must be a current/working/valid installation of Outlook on the machine that will be reading the recovered items
Avatar
Avatar
Digitalferret
same here, worked ok for me, but if i remember right (been a while) there must be a current/working/valid installation of Outlook on the machine that will be reading the recovered items
If you export items yes. To just view, no. Also libpff works good under Linux
👍🏻 1
Avatar
has anyone been able to install and or fix a cracked screen on an iPhone WITHOUT power off the phone to ensure we don't lose AFU ?
Avatar
CloudCuckooLand 7/20/2022 11:50 AM
@DCSO what model?
Avatar
Hello team! Looking at starting up a personal DF Cellex gig. I am looking for a mentor to assist with some of the business details to bounce off once and a while.
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 7/20/2022 3:51 PM
There's not enough information here. How would someone from this server assist? I'm assuming whoever would potentially volunteer wouldn't work for your company so....how can they assist? Genuinely curious.
Avatar
Avatar
B@man
Just for getting other opinions... recommendations for laptops for DFIR?
I’ve been eyeing one of the Asus g15 laptops with a r9 and RAID 0 NVMe to match my workstation… maybe not the best idea to do RAID 0 on a laptop but :IOPs
👍 1
Avatar
@Andrew Rathbun From the business side I am wondering how they interact with clients. My background is nearly exclusive Mil & LE side the interactions are much different. I'm basically looking for someone to connect with and provide some clarity in this realm. (edited)
Avatar
Sager/clevo is good tho as mentioned and has loads of@options
Avatar
facelessg00n 7/20/2022 8:48 PM
A good lecture on iOS device security from MIT, covers most things including checkra1n. PAC didn't get a mention though. https://www.youtube.com/watch?v=Fs3EghQRmAs
👍🏽 1
Avatar
Avatar
DCSO
has anyone been able to install and or fix a cracked screen on an iPhone WITHOUT power off the phone to ensure we don't lose AFU ?
randomaccess 7/21/2022 4:46 AM
I don't think I've tried that but at least some models it was just a single connection and the first you'd disconnect so you wouldn't have to power it off. But I'd test it first. Not sure whether the replacement touch ID might caught dramas (so you'd have to switch that too) and not sure if losing its connection to touchid would cause a problem
Avatar
Avatar
randomaccess
I don't think I've tried that but at least some models it was just a single connection and the first you'd disconnect so you wouldn't have to power it off. But I'd test it first. Not sure whether the replacement touch ID might caught dramas (so you'd have to switch that too) and not sure if losing its connection to touchid would cause a problem
I guess it sounds like we will have to test this out first, now just have to find an iPhone 11 to play with 🤣
Avatar
Has anyone gone through the process of building a Faraday lab recently (last couple of years)? Either as a renovation or new build, or even as room within a room? I'm just looking for some very general info at this point, reputable vendors to consider, and ballpark pricing we might be looking at.
Avatar
And a new SocVel Cybersecurity Quiz is out! https://socvel.com/quiz
The SocVel Cybersecurity Quiz [w19]Your Weekly Cybersecurity Quiz!Following a recent push to move public services to online platforms, which country's government was forced to take its websites offline following a cyberattack?SEKOIA IO researchers covered a smishing campaign targeting users in France. What credentials did it aim to steal from iP...
👍 1
Avatar
Darn developers.... Making a new version of a tool, not a problem. Deprecating the old one without notice, making users have to switch, AND changing around your standard option parameters is NOT cool! Time to fix a bunch of automation
Avatar
Deleted User 7/21/2022 10:12 PM
Question for the UK residents: A Hutchinson 3G SIM card - can a person get one over the counter without providing any form of ID? Jump through any hoops to get the SIM? Thanks
Avatar
Dr. Kaan Gündüz 7/21/2022 11:15 PM
Fellow forensicators, i'm proud to announce FEX-LAB. https://getdataforensics.com/product/fex-lab/ (edited)
Avatar
What is the solution Samsung devices support forensic software How is MDM installed on them that does not allow to enter download mode
Avatar
Avatar
Deleted User
Question for the UK residents: A Hutchinson 3G SIM card - can a person get one over the counter without providing any form of ID? Jump through any hoops to get the SIM? Thanks
Yes, you can purchase a 'Pay as you go Sim card' over the counter. Most providers also offer an options for individuals to 'top up' (pay for phone credits) anonymously (edited)
Avatar
Avatar
DE
Yes, you can purchase a 'Pay as you go Sim card' over the counter. Most providers also offer an options for individuals to 'top up' (pay for phone credits) anonymously (edited)
Deleted User 7/22/2022 12:12 AM
As I suspected, thank you.
Avatar
forensicgeek 7/22/2022 1:56 AM
Hello all, I currently have an Apple iPhone X which will not power on. I have changed the screen, battery and charger port. I have identified that when I plug in the device to a external power supply and power monitor that it device will go to 0.50a and then straight back to 0.00 and will continuisly keep doing that. Any help or advice to diagnose the problem would be greatly appreciated.
Avatar
Avatar
Dr. Kaan Gündüz
Fellow forensicators, i'm proud to announce FEX-LAB. https://getdataforensics.com/product/fex-lab/ (edited)
DeeFIR 🇦🇺 7/22/2022 3:36 AM
Nice, this looks good. I'm always a fan of distributed processing. Do you know when RRP pricing will be made public?
Avatar
Dr. Kaan Gündüz 7/22/2022 4:02 AM
very soon i hope 🙂
Avatar
Hello all, a while ago I started to design and build a PoC regarding an increase in read/write performance with a new forensic file format. The PoC resulted in the specification of a first than a second improved version of a new file format for forensic images "zff" - as an alternative to the meanwhile quite outdated EWF, AFF, ... formats. Zff has the potential (depending on the input data) to provide significant speed increase (see benchmarks at https://github.com/ph0llux/zff). Furthermore, zff offers a massively expanded feature set:
  • physical and logical dumps
  • multiple dumps (both logical and physical) in one container keeping related evidence together
  • extension of existing containers (with both logical and physical dumps)
  • hashing algorithms used for integrity purposes considered most secure, fast and modern at the moment
  • optional data encryption (even partially, if desired) (for security purposes).
  • optional digital signature of stored data (for authenticity purposes; using a public-private key method).
  • great flexibility when adding descriptions to cases
  • and much more
The documentation of the file format can be found at https://zff.dev (website is work in progress). I've written also a reference implementation to create, analyze and handle files in zff format. The library is written in Rust and can be found at https://github.com/ph0llux/zff. You can try it out yourself using the tools zffacquire, zffmount and zffanalyze (see the github link). We've tested the tools ourselves, but if you find any errors in the reference library, please open a github issue.
Zff is a completly new designed forensic file format.
👍 7
Avatar
Avatar
ph0llux
Hello all, a while ago I started to design and build a PoC regarding an increase in read/write performance with a new forensic file format. The PoC resulted in the specification of a first than a second improved version of a new file format for forensic images "zff" - as an alternative to the meanwhile quite outdated EWF, AFF, ... formats. Zff has the potential (depending on the input data) to provide significant speed increase (see benchmarks at https://github.com/ph0llux/zff). Furthermore, zff offers a massively expanded feature set:
  • physical and logical dumps
  • multiple dumps (both logical and physical) in one container keeping related evidence together
  • extension of existing containers (with both logical and physical dumps)
  • hashing algorithms used for integrity purposes considered most secure, fast and modern at the moment
  • optional data encryption (even partially, if desired) (for security purposes).
  • optional digital signature of stored data (for authenticity purposes; using a public-private key method).
  • great flexibility when adding descriptions to cases
  • and much more
The documentation of the file format can be found at https://zff.dev (website is work in progress). I've written also a reference implementation to create, analyze and handle files in zff format. The library is written in Rust and can be found at https://github.com/ph0llux/zff. You can try it out yourself using the tools zffacquire, zffmount and zffanalyze (see the github link). We've tested the tools ourselves, but if you find any errors in the reference library, please open a github issue.
Arman Gungor 7/22/2022 9:42 AM
Very cool! It looks like you covered macb times. I was wondering if it would be possible to accommodate both $STANDARD_INFORMATION and $FILE_NAME NTFS timestamps within a logical container.
Avatar
Avatar
Arman Gungor
Very cool! It looks like you covered macb times. I was wondering if it would be possible to accommodate both $STANDARD_INFORMATION and $FILE_NAME NTFS timestamps within a logical container.
Zff is very flexible at this point. You can add more file related metadata via "file metadata extended information" (https://zff.dev/docs/header_layout/#file-metadata-extended-information).
Avatar
Avatar
ph0llux
Zff is very flexible at this point. You can add more file related metadata via "file metadata extended information" (https://zff.dev/docs/header_layout/#file-metadata-extended-information).
Arman Gungor 7/22/2022 11:26 AM
That's good to know! If we implemented an imager that outputs to Zff and added those NTFS timestamps as File Metadata Extended Information, how would we communicate that to other third-party tools that ingest Zff images? I think that's where having standardized metadata could be helpful. Having said that, there are more than 8 timestamps associated with files on NTFS—so, I understand one has to draw the line somewhere 😃
Avatar
Avatar
Arman Gungor
That's good to know! If we implemented an imager that outputs to Zff and added those NTFS timestamps as File Metadata Extended Information, how would we communicate that to other third-party tools that ingest Zff images? I think that's where having standardized metadata could be helpful. Having said that, there are more than 8 timestamps associated with files on NTFS—so, I understand one has to draw the line somewhere 😃
I agree with you on all points. I had to draw a line somewhere, but then I was able to ensure that some flexibility and extensibility is given via the extended in metadata fields. I will add your question to the FAQ tomorrow. I'm afraid that you won't be the last one to ask such a question, unfortunately. In that case, the easiest way is to email me and I will list the appropriate metadata-keyword(s) in the appropriate table on the website (first come, first serve). Extended metadata is still optional - but if available, all tools should be able to read it accordingly. Thanks for the hint! ;)
👍 1
Avatar
Avatar
ph0llux
I agree with you on all points. I had to draw a line somewhere, but then I was able to ensure that some flexibility and extensibility is given via the extended in metadata fields. I will add your question to the FAQ tomorrow. I'm afraid that you won't be the last one to ask such a question, unfortunately. In that case, the easiest way is to email me and I will list the appropriate metadata-keyword(s) in the appropriate table on the website (first come, first serve). Extended metadata is still optional - but if available, all tools should be able to read it accordingly. Thanks for the hint! ;)
Arman Gungor 7/22/2022 3:27 PM
Thanks for your work on this, and for sharing it with the community. On my short list of cool things to play with. I hope to use the library in a project in the near future 😁
Avatar
Avatar
Arman Gungor
Thanks for your work on this, and for sharing it with the community. On my short list of cool things to play with. I hope to use the library in a project in the near future 😁
Would be pretty cool if it will be used in more projects :)
Avatar
Admittedly I have not been following this, and am jumping in at this very moment, but how does zff compare to afff4 as opposed to e01?
Avatar
Avatar
d05
Admittedly I have not been following this, and am jumping in at this very moment, but how does zff compare to afff4 as opposed to e01?
  • The main goal was to increase speed by applying more modern algorithms. Zff has the potential to enable faster read/write performance (see benchmarks on https://github.com/ph0llux/zff).
  • Zff offers a huge feature set, but most of it is optional, so fast dumps can be done in a very simple way.
  • It is simply structured and so also easy to understand (whereby such a thing is in principle rather relative... :D )
  • it is well documented.
  • It is very flexible in many places (see discussion above)
  • it has a dual open source license (MIT/Apache2.0) which is interesting for an open source community as well as for companies with proprietary software.
  • there is already a reference implementation that offers the full feature set - you can start programming and using it right away.
  • ...
Avatar
Avatar
ph0llux
  • The main goal was to increase speed by applying more modern algorithms. Zff has the potential to enable faster read/write performance (see benchmarks on https://github.com/ph0llux/zff).
  • Zff offers a huge feature set, but most of it is optional, so fast dumps can be done in a very simple way.
  • It is simply structured and so also easy to understand (whereby such a thing is in principle rather relative... :D )
  • it is well documented.
  • It is very flexible in many places (see discussion above)
  • it has a dual open source license (MIT/Apache2.0) which is interesting for an open source community as well as for companies with proprietary software.
  • there is already a reference implementation that offers the full feature set - you can start programming and using it right away.
  • ...
Ross Donnelly 7/23/2022 5:16 AM
Interesting work - well done. It is, however, very hard to gain traction with a new format. There have been plenty of attempts over the years, yet the inefficient E01s are still dominant. For me as a practitioner there are two main issues - both much more important than performance and other features. Firstly is compatibility with the primary forensic tools - it's all good being able to capture something to ZFF, but it's not much good if I can't load it into XWF/Axiom/Encase etc. Secondly is the integrity of the evidence. I understand you refer to certain elements and algorithms that have been validated, but not the overall file format. Does your implementation have any weaknesses? Could it be potentially changed? Could I stand up in Court and swear that the data has not changed? I would need to see independent verification of the format - AFF4 for example published peer reviewed papers regarding the format and put a lot of work into proving that it does what it says. Extensibility also means different ways to do things. One Imager might capture certain information that another doesn't. This makes it very hard for tools to know what data to expect and present that to the user in a sensible fashion, and understanding the significance of something that's missing could be tricky - is it missing because it wasn't there or because it wasn't captured. All these are (not insurmountable) challenges that would need to be addressed to drive adoption of a new format - good luck!
Avatar
Avatar
Ross Donnelly
Interesting work - well done. It is, however, very hard to gain traction with a new format. There have been plenty of attempts over the years, yet the inefficient E01s are still dominant. For me as a practitioner there are two main issues - both much more important than performance and other features. Firstly is compatibility with the primary forensic tools - it's all good being able to capture something to ZFF, but it's not much good if I can't load it into XWF/Axiom/Encase etc. Secondly is the integrity of the evidence. I understand you refer to certain elements and algorithms that have been validated, but not the overall file format. Does your implementation have any weaknesses? Could it be potentially changed? Could I stand up in Court and swear that the data has not changed? I would need to see independent verification of the format - AFF4 for example published peer reviewed papers regarding the format and put a lot of work into proving that it does what it says. Extensibility also means different ways to do things. One Imager might capture certain information that another doesn't. This makes it very hard for tools to know what data to expect and present that to the user in a sensible fashion, and understanding the significance of something that's missing could be tricky - is it missing because it wasn't there or because it wasn't captured. All these are (not insurmountable) challenges that would need to be addressed to drive adoption of a new format - good luck!
I agree with you on the first point - but it's not up to me to change that. I have provided a recipe and cooked an example. If you want to make the pizza yourself, you now have all the instructions you need :) Regarding the integrity questions: the implemented code is open source ( transparency ) and my proposed solution uses independently audited implementations of cryptographic algorithms (and a wide community usage) - the hash algorithms are validated not only by reviews but by a wide community usage. I wouldn't write my own - especially when it comes to encryption. That can always go wrong. But even with 100 independent checks, you'll never have 100% certainty that there's no security hole - just like with E01. Hopefully enough people will find time and interest to check my implementation independently - but they are only found when I share the work on channels like this one ;)
👍 4
Avatar
Avatar
ph0llux
I agree with you on the first point - but it's not up to me to change that. I have provided a recipe and cooked an example. If you want to make the pizza yourself, you now have all the instructions you need :) Regarding the integrity questions: the implemented code is open source ( transparency ) and my proposed solution uses independently audited implementations of cryptographic algorithms (and a wide community usage) - the hash algorithms are validated not only by reviews but by a wide community usage. I wouldn't write my own - especially when it comes to encryption. That can always go wrong. But even with 100 independent checks, you'll never have 100% certainty that there's no security hole - just like with E01. Hopefully enough people will find time and interest to check my implementation independently - but they are only found when I share the work on channels like this one ;)
Arman Gungor 7/23/2022 9:09 AM
I think preparing example projects (just as you did for Rust) for C# and Python would go a long way toward adoption—both for commercial tools and open-source projects. Since this is a new format, making it easy to integrate could sway teams to consider implementing Zff in their new projects.
👍 1
Avatar
Arman Gungor 7/23/2022 9:27 AM
This is not to say you should personally do all this. Hopefully, the community will step up with ports, wrappers, etc. where needed. I, for one, will take Zff for a spin and see if there is anything we can contribute 😊
👍 1
Avatar
Avatar
Ross Donnelly
Interesting work - well done. It is, however, very hard to gain traction with a new format. There have been plenty of attempts over the years, yet the inefficient E01s are still dominant. For me as a practitioner there are two main issues - both much more important than performance and other features. Firstly is compatibility with the primary forensic tools - it's all good being able to capture something to ZFF, but it's not much good if I can't load it into XWF/Axiom/Encase etc. Secondly is the integrity of the evidence. I understand you refer to certain elements and algorithms that have been validated, but not the overall file format. Does your implementation have any weaknesses? Could it be potentially changed? Could I stand up in Court and swear that the data has not changed? I would need to see independent verification of the format - AFF4 for example published peer reviewed papers regarding the format and put a lot of work into proving that it does what it says. Extensibility also means different ways to do things. One Imager might capture certain information that another doesn't. This makes it very hard for tools to know what data to expect and present that to the user in a sensible fashion, and understanding the significance of something that's missing could be tricky - is it missing because it wasn't there or because it wasn't captured. All these are (not insurmountable) challenges that would need to be addressed to drive adoption of a new format - good luck!
Arman Gungor 7/23/2022 10:02 AM
I also think a detailed comparison to AFF4 (not AFF) and benchmarks against the reference AFF4 implementation would be very helpful.
👍 3
Avatar
Deleted User 7/23/2022 10:41 AM
Hello
10:41 AM
Does someone has practiced an autopsy?
Avatar
Avatar
Deleted User
Does someone has practiced an autopsy?
randomaccess 7/23/2022 5:34 PM
Definitely not. Different kind of forensics
😆 1
5:34 PM
Using autopsy however. There's a lot of information online and test images on digital corpora too!
Avatar
Hi, I got a random pop-up that my phone was hacked, does anyone know how I can get to my logs on an iPhone I need to make sure there was no intrusion
5:56 PM
It is worth noting this happened to my personal phone
Avatar
Is there any magnet forensics rep here?
Avatar
Avatar
Z3Y19
Is there any magnet forensics rep here?
@Magnet Forensics Do you have a particular question?
Avatar
Avatar
codyp915
It is worth noting this happened to my personal phone
Deleted User 7/24/2022 1:45 AM
You can start at by going to Settings -> Privacy -> Analytics & Improvements -> Analytics Data If you disable pop-ups and JavaScript in your phones browser you likely won’t see that message again (assumption is this is the standard “you have been hacked” ploy)
updoot 2
Avatar
Avatar
Deleted User
Does someone has practiced an autopsy?
Dr. Kaan Gündüz 7/24/2022 7:31 AM
lots of them back then.
Avatar
Hi everyone does anyone know of a legit source describing (Windows 7) virtual machine stealth techniques so it looks more like a real machine? Online I only find pieces of information here and there but no definite guide describing what should be changed.
Avatar
DeeFIR 🇦🇺 7/24/2022 1:45 PM
@degent_ understand how malware attempts to determine if it’s being analysed in a virtual environment and then design your VM/configure your OS with those countermeasures in mind https://evasions.checkpoint.com/
👍 1
Avatar
Avatar
degent_
Hi everyone does anyone know of a legit source describing (Windows 7) virtual machine stealth techniques so it looks more like a real machine? Online I only find pieces of information here and there but no definite guide describing what should be changed.
💯 1
👍 1
Avatar
Thank you very much to both of you. Has anyone ever changed the BIOS release date for a virtualbox VM? I'm trying to run the command listed for it but it causes no change in the VM BIOS relase date
Avatar
Avatar
degent_
Thank you very much to both of you. Has anyone ever changed the BIOS release date for a virtualbox VM? I'm trying to run the command listed for it but it causes no change in the VM BIOS relase date
DeeFIR 🇦🇺 7/24/2022 6:21 PM
5 votes and 5 comments so far on Reddit
Avatar
I already read it but that post only refers to system time and not to BIOS release date, which is different. But thank you though. (edited)
Avatar
DeeFIR 🇦🇺 7/24/2022 6:51 PM
@degent_ try setting it as a string instead of a numeric value. <ExtraDataItem name="VBoxInternal/Devices/pcbios/0/Config/DmiBIOSReleaseDate" value="string:01/01/2022"/>
6:53 PM
Avatar
@Griffeye or anyone else know what this error is or if it can be corrected? Asking for a colleague that is reviewing some cases. Currently using Griffeye DI Core v 22.0.2
Avatar
Avatar
Majeeko
@Griffeye or anyone else know what this error is or if it can be corrected? Asking for a colleague that is reviewing some cases. Currently using Griffeye DI Core v 22.0.2
I had this error as well, I could solve it by replacing the case file (ANCF) from the Backup Folder within the Griffeye case.
👍 1
Avatar
Original message was deleted or could not be loaded.
randomaccess 7/26/2022 2:27 AM
I'm not sure how this is a forensics related product. Can you please elaborate? It seems like it's related to email spam filtering?
👆 3
Avatar
Is there someone from @Magnet Forensics I can chat with please 🙂
Avatar
Avatar
D1g1talDan
Is there someone from @Magnet Forensics I can chat with please 🙂
chriscone_ar 7/26/2022 5:39 AM
I’m happy to try and help.
Avatar
khushigupta0641 7/26/2022 7:15 AM
Hello everyone, just needed some insights on what options are out there to store and archive large amounts of digital evidence. Any leads would be much appreciated.
Avatar
Chris Myers 7/26/2022 8:35 AM
Anyone have experience purchasing or using a man-sized faraday enclosure? We're building a new lab and have room to put a faraday enclosure big enough to step into and sit at a desk/work bench. Any insight would be greatly appreciated.
Avatar
Avatar
khushigupta0641
Hello everyone, just needed some insights on what options are out there to store and archive large amounts of digital evidence. Any leads would be much appreciated.
Chris Myers 7/26/2022 8:36 AM
I recently saw a presentation from @Cellebrite for their tool Guardian. It's more of a case management suite, but it incorporates AWS gov cloud with a ton of storage.
Avatar
Avatar
Chris Myers
I recently saw a presentation from @Cellebrite for their tool Guardian. It's more of a case management suite, but it incorporates AWS gov cloud with a ton of storage.
Its not Just Case Management, but also evidence management, storage, . Online review and other features.
Avatar
Digitalferret 7/26/2022 10:25 AM
@Moderators https://discord.com/channels/427876741990711298/537760691302563843/1001180846151184545 looks to be generic marketing email seemingly unassociated with anything Forensic (edited)
👀 4
Salute 1
Avatar
Avatar
Digitalferret
@Moderators https://discord.com/channels/427876741990711298/537760691302563843/1001180846151184545 looks to be generic marketing email seemingly unassociated with anything Forensic (edited)
Andrew Rathbun 7/26/2022 10:30 AM
sorted, thank you
Gavel 7
Salute 2
Avatar
Could an admin change my role from dfir student to private sector ?
✅ 1
🍻 4
Avatar
Avatar
Chris Myers
Anyone have experience purchasing or using a man-sized faraday enclosure? We're building a new lab and have room to put a faraday enclosure big enough to step into and sit at a desk/work bench. Any insight would be greatly appreciated.
Add about $200 of aluminum foil...
🤣 7
Avatar
but when you open the door you let out the smells RF
Avatar
At that scale I imagine you would just contract to have a solution built/engineered on site. A neighboring agency to me has a (very expensive) room built into the building. It also requires being recertified regularly.
2:39 PM
IN STOCK This Large RF shielding room is built to secure an entire area for you to work in a protected room that is free from any outside attempts at manipulating or interfering with your devices. The small tent measures at 318.5 cubic feet. This tent averages -85 dB attenuation in the range of 30 MHz to 1 GHz and an average of -90 dB attenuati...
Avatar
Since we are on the topic of faraday enclosures, does anyone have an idea on how to extract an iPhone that is inside of a USB-filtered Faraday bag? I am thinking I would need a female-to-female lightning connector, but finding one that transfers data might be tricky. https://www.amazon.com/dp/B07W3PMY6C?ref_=cm_sw_r_cp_ud_dp_1GDW0TGWF6W74KREDGTX
The Mission Darkness Window Charge & Shield Faraday Bag for Phones allows a device to remain shielded from RF signals and powered after seizure, until it can be transferred to a forensic box, lab, or tool for data extraction. The bag includes a dual sided USB filter, NeoLok closure system for saf...
3:10 PM
iMangoo Pencil Adapter Lightning Cable Connector Female to Female Convertor Pencil Charging Adapters for iPad Pro Pencil [2 Pack]
3:10 PM
I am thinking about trying the iMangoo one out, if it doesn't work its only $10.
Avatar
Does the cable inside not pass data? If the cable inside passes data, it effectively translates the lightning into USB A doesn't it? Then you just need to connect your workstation to the female USB A on the outside of the bag?
6:04 PM
Model Number: A8197 Anker USB-A to Lightning Audio Adapter The Lightning Adapter with Flawless Sound Keep Listening With this adapter, you don’t need to use separate headphones for your phone and laptop. Just connect the adapter to any USB port to instantly start using your Lightning headphones. ...
6:10 PM
that way you can have something like this... [BOX]---[male lightning] [female lightning]---[male USB A] [Bag input]---[Bag internal connection] [standard USB]---[lightning cable] [suspect device] if my ridiculous formatting makes any sense
Avatar
Ok so I have a serious question, are professional organizations worth it? If so, what are some you guys recommend?
Avatar
Yep the Police
12:37 AM
12:37 AM
Avatar
Avatar
codyp915
Ok so I have a serious question, are professional organizations worth it? If so, what are some you guys recommend?
Digitalferret 7/27/2022 12:49 AM
um, you mean Certs, or? just seemed an odd question, no context
Avatar
Avatar
Digitalferret
um, you mean Certs, or? just seemed an odd question, no context
No professional organizations like the International society of forensic computer examiners, as an example
Avatar
Avatar
codyp915
No professional organizations like the International society of forensic computer examiners, as an example
Digitalferret 7/27/2022 1:06 AM
ah, sorry, my bad. UK generally called an Association or Professional body, like the IEEE. i mistook organisation for an employer (edited)
1:10 AM
i suppose it depends on which career path you are taking. some require continued professional development to progress, others just time served in a "professional" job, to gain rank. in the worst cases you just pay a monetary fee to stick a badge on your resume/vehicle. as to whether these will gain better employment prospects, maybe ask around in targetted establishments prior
Avatar
Avatar
codyp915
No professional organizations like the International society of forensic computer examiners, as an example
DeeFIR 🇦🇺 7/27/2022 2:15 AM
ISFCE is limited to those with a CCE certification. Do you just mean a professional body of peers without a qualification/certification requirement? Like the ACS in Australia?
Avatar
Avatar
DeeFIR 🇦🇺
ISFCE is limited to those with a CCE certification. Do you just mean a professional body of peers without a qualification/certification requirement? Like the ACS in Australia?
Yes
Avatar
This will work perfectly for what am thinking about for use with a special tool. Thanks!
Avatar
I’m looking at pursuing a career in infosec, probably something like threat intel or digital forensics. Has anyone done the SANS undergrad program for something like this?
Avatar
Avatar
kswanalyst
I’m looking at pursuing a career in infosec, probably something like threat intel or digital forensics. Has anyone done the SANS undergrad program for something like this?
Andrew Rathbun 7/27/2022 8:23 AM
#training-education-employment
Avatar
Oh worddddd
Avatar
Hi, Quick question, is there a maximum display limit for Browsing history view from Nirsoft ?
Avatar
Avatar
CWolf
Hi, Quick question, is there a maximum display limit for Browsing history view from Nirsoft ?
Andrew Rathbun 7/27/2022 9:33 AM
There shouldn't be. Can always run the tool from the command line and produce a CSV, which definitely shouldn't have any display limitations.
Avatar
Avatar
Andrew Rathbun
There shouldn't be. Can always run the tool from the command line and produce a CSV, which definitely shouldn't have any display limitations.
Thank you, i will try this option to see if i have the same result
Avatar
Avatar
CWolf
Thank you, i will try this option to see if i have the same result
Andrew Rathbun 7/27/2022 9:46 AM
This repository serves as a place for community created Targets and Modules for use with KAPE. - KapeFiles/NirSoft_BrowsingHistoryView.mkape at c542faf38020b2fe32e71744690a3515700bdd2f · EricZimme...
Avatar
I need an advise, client child mother took the child after the father applied for a custody. Here is the story according to the client and i need an advise on who can help in these type of cases. “ I am going through a custody battle in court to receive custody of my daughter the judge never ruled on the case because the mother of my child took off to another state with my child ,when my lawyer verified she was missing to the courts it was to late she have already submitted all false information to the courts so right now no one can find her. I need a way to trace her to serve her in order to server her the legal documents.” Please advise how I can help the client
Avatar
Pretty sure that situation is out of the scope for this server. At least publicly anyways.
10:57 PM
I maybe wrong though.
Avatar
Avatar
Dr. Simba
I need an advise, client child mother took the child after the father applied for a custody. Here is the story according to the client and i need an advise on who can help in these type of cases. “ I am going through a custody battle in court to receive custody of my daughter the judge never ruled on the case because the mother of my child took off to another state with my child ,when my lawyer verified she was missing to the courts it was to late she have already submitted all false information to the courts so right now no one can find her. I need a way to trace her to serve her in order to server her the legal documents.” Please advise how I can help the client
Deleted User 7/28/2022 12:49 AM
Opinion: I would not touch this. If you quoted your client verbatim above I see 2 consistent indications they could be selling you a story. I believe most countries have laws about taking minors across borders/states = LE jurisdiction.
Avatar
Avatar
Dr. Simba
I need an advise, client child mother took the child after the father applied for a custody. Here is the story according to the client and i need an advise on who can help in these type of cases. “ I am going through a custody battle in court to receive custody of my daughter the judge never ruled on the case because the mother of my child took off to another state with my child ,when my lawyer verified she was missing to the courts it was to late she have already submitted all false information to the courts so right now no one can find her. I need a way to trace her to serve her in order to server her the legal documents.” Please advise how I can help the client
Digitalferret 7/28/2022 12:57 AM
with Rydev and Howard - not really a Forensics topic, but if what you say is correct and if you need to act "over a border" i'd say this is a Law Enforcement Agency issue, check with your local/national authority
1:03 AM
maybe state your country in here, and ask for any LE officers if they can point you to the right authority as it sounds llike one of those false imprisonment/child abduction cases even if the adult is the child's parent. YMMV per country (edited)
Salute 1
Avatar
Anyone using Recon ITR? (the imager tool from Sumuri). I would love to hear your thoughts! Also what storage size works best?
Avatar
Take care. There is a discord server invite going around which points you to scan a QR code. Scanning the QR code authenticates a discord session and allows access to your account. Once authenticated it re-sends the invite & scrapes any server you are on. Remediation - requires the user to reset their password and kill the session. The invites have now timed out or discord are on the ball. example-
👍 2
Avatar
Hi all, anyone know what on earth this is and what connection this is? As it’s just come in for analysis and we have no idea what it is
Avatar
Avatar
obi95
Hi all, anyone know what on earth this is and what connection this is? As it’s just come in for analysis and we have no idea what it is
Deleted User 7/28/2022 6:07 AM
I think it’s related to Ubisoft and their uPlay offering. The “U” is consistent with their logo. Perhaps it was a drive as part of a promo.
Avatar
Are you able to open it up? May just be an adapter connected to sata
6:26 AM
Tho double check you're getting readable data if it is.
Avatar
Avatar
FullTang
Since we are on the topic of faraday enclosures, does anyone have an idea on how to extract an iPhone that is inside of a USB-filtered Faraday bag? I am thinking I would need a female-to-female lightning connector, but finding one that transfers data might be tricky. https://www.amazon.com/dp/B07W3PMY6C?ref_=cm_sw_r_cp_ud_dp_1GDW0TGWF6W74KREDGTX
Pop it into a faraday box remove it from the back and pull the data through the faraday box when finished through it into the bag again ?
Avatar
Avatar
DCSO
Pop it into a faraday box remove it from the back and pull the data through the faraday box when finished through it into the bag again ?
Yep that would be ideal, but my faraday box does not have USB filtering.
Avatar
Avatar
trillian
Anyone using Recon ITR? (the imager tool from Sumuri). I would love to hear your thoughts! Also what storage size works best?
I use it for imaging on occasion, and I don't use the live triage option hardly ever. I personally think Macquisition is more intuitive and generates E01s, which is what a lot of opposing experts or contractors (when subcontracting) expect. ITR is less expensive, and I don't image a lot of Macs, which is why I started off with Recon Imager in the first place. Support for ITR is good, although you do typically hear on a support call how ITR is the only tool that actually works. I just noticed that they offer a rental program for about $150/week. That could work if you only plan to use on occasion (and can plan ahead enough to get the device shipped to you before the engagement) or want to try the tool out.
Avatar
Avatar
uochaos
I use it for imaging on occasion, and I don't use the live triage option hardly ever. I personally think Macquisition is more intuitive and generates E01s, which is what a lot of opposing experts or contractors (when subcontracting) expect. ITR is less expensive, and I don't image a lot of Macs, which is why I started off with Recon Imager in the first place. Support for ITR is good, although you do typically hear on a support call how ITR is the only tool that actually works. I just noticed that they offer a rental program for about $150/week. That could work if you only plan to use on occasion (and can plan ahead enough to get the device shipped to you before the engagement) or want to try the tool out.
Thank you for the info! The rental option is just for the US unfortunately. Do you happen to get anything from a locked Mac with ITR? In your experience, I mean
Avatar
Avatar
trillian
Anyone using Recon ITR? (the imager tool from Sumuri). I would love to hear your thoughts! Also what storage size works best?
Love it! and the Sumuri guys are really great support and answering questions.
Avatar
Avatar
Deleted User
I think it’s related to Ubisoft and their uPlay offering. The “U” is consistent with their logo. Perhaps it was a drive as part of a promo.
Ross Donnelly 7/28/2022 10:15 AM
Logo matches this more than Ubisoft, so something to do with music streaming? https://apps.apple.com/us/app/id684183096
‎The QED uPlay Steam Hi-Fi Network Music Steamer brings together your digital music collection and your audio system. Simply connect the uPlay Stream to your audio system and enjoy streaming of uncompressed high resolution digital music using Wi-Fi or Ethernet. This free uPlay Stream App allows you…
Avatar
Avatar
Ross Donnelly
Logo matches this more than Ubisoft, so something to do with music streaming? https://apps.apple.com/us/app/id684183096
Deleted User 7/28/2022 10:33 AM
Indeed, nice find 👍🏻
Avatar
The 20th SocVel Cybersecurity Quiz is out! Another quiz jam-packed with 10 of the most interesting infosec stories from the past week. Have a go now! https://socvel.com/quiz
The SocVel Cybersecurity Quiz [w20]Your Weekly Cybersecurity Quiz!A recent ZDNet report covered what they labelled "the most lucrative form of cybercrime". What were they referring to?Which country's tax agency did the LockBit ransomware group claim to have breached, stealing 100GB of data?Avast researchers detailed activities from a secretive s...
Avatar
Avatar
FullTang
Yep that would be ideal, but my faraday box does not have USB filtering.
ah gotcha, Mission Darkness sells USB filtering add ons for faraday boxes you just have to drill a hole and thread it on.
Avatar
Avatar
DCSO
ah gotcha, Mission Darkness sells USB filtering add ons for faraday boxes you just have to drill a hole and thread it on.
I had no idea. Ill have to look into that, thanks!
Avatar
Avatar
FullTang
I had no idea. Ill have to look into that, thanks!
facelessg00n 7/28/2022 6:53 PM
Yeah we have the new ones with the ethernet and USB holes, the whole bag of stuff goes in and you then get to fumble around like a surgeon. Pro tip though, you can wirelessly charge through the bags with a good charger (Like Belkin) if you are in a pickle and your target device is going flat. (edited)
Avatar
Sounds fancy and thanks for the tips! I knew the newer boxes had filtering, I just did know you could add filters to an existing box. I only recently found out (from a post on this server) about faraday bags with USB filters so that solved my problem about how to economically extract a new iPhone with BLE. The wireless charging thing is slick! I have been trying to find a really big wireless charging mat so that positioning wouldn’t be an issue if it was in a faraday bag but I haven’t found one yet.
Avatar
Avatar
FullTang
Sounds fancy and thanks for the tips! I knew the newer boxes had filtering, I just did know you could add filters to an existing box. I only recently found out (from a post on this server) about faraday bags with USB filters so that solved my problem about how to economically extract a new iPhone with BLE. The wireless charging thing is slick! I have been trying to find a really big wireless charging mat so that positioning wouldn’t be an issue if it was in a faraday bag but I haven’t found one yet.
facelessg00n 7/28/2022 7:58 PM
Yeah I have found the Belkin ones quite good as the cheap ones don’t seem to get through the bag. It’s handy for when one comes in a bag and they forgot to connect a battery. Get your Faraday box checked after any Mods as well and the seals can wear out letting RF in. Our old one got to a point where you could make a video call out from inside it if the phone was with a certain local carrier. That was enough motivation to get them to get us a new one 😂
👍 1
Avatar
I'm pursuing undergrad in cyber security. Looking for some internship or Part Time (edited)
Avatar
I have never before heard of Nill... is this a rabbit hole I'm about to go down?
Avatar
Avatar
Tejas
I'm pursuing undergrad in cyber security. Looking for some internship or Part Time (edited)
DeeFIR 🇦🇺 7/28/2022 11:13 PM
Internship or part time in what discipline of cyber exactly? DF?
Avatar
Avatar
DeeFIR 🇦🇺
Internship or part time in what discipline of cyber exactly? DF?
I'm looking mostly red team based. I'm open too blue teaming too. I have knowledge in web app pentesting, network pentesting (AD). Some memory forensics..
Avatar
DeeFIR 🇦🇺 7/28/2022 11:18 PM
Which country? Have you applied anywhere? What do you need help with specifically? Or are you just hoping someone will throw an opportunity your way?
Avatar
I'm in India. I'm trying to get some industry experience in the above said fields. I did apply for part time in few companies. Timing didn't work well...
Avatar
Avatar
whee30
I have never before heard of Nill... is this a rabbit hole I'm about to go down?
Deleted User 7/29/2022 1:45 AM
Strap yourself in buddy. If a furry and a Windows sys admin merged into an Uber driver.
😂 2
Avatar
anyone run an offline map server for use with Axiom
2:26 AM
just curious how big the map is on disk
Avatar
Nick Papagiorgio 7/29/2022 5:30 AM
@Law Enforcement [USA] Anyone has any experience with legal process on FOG Reveal for advertiser ID searching?
Avatar
Avatar
Nick Papagiorgio
@Law Enforcement [USA] Anyone has any experience with legal process on FOG Reveal for advertiser ID searching?
digital Bowles 7/29/2022 5:44 AM
When we had the trail you just email them the device Ad Id. They will check and see if it matches their system. IF I REMEMBER RIGHT it really does not go much further then that. They do not collect or store device information.
Avatar
Avatar
digital Bowles
When we had the trail you just email them the device Ad Id. They will check and see if it matches their system. IF I REMEMBER RIGHT it really does not go much further then that. They do not collect or store device information.
Nick Papagiorgio 7/29/2022 5:45 AM
Thanks
Avatar
Avatar
codyp915
Hi, I got a random pop-up that my phone was hacked, does anyone know how I can get to my logs on an iPhone I need to make sure there was no intrusion
TiffanyRbns 7/29/2022 6:00 AM
Hi @codyp915 To pull the syslogs from iPhone you do the following or at least from what I know. Go to settings > Accessibility > Touch> Assistive Touch - “Turn on”> Custom Actions > Double Tap - “select Analytics” (this will place a button on your phone)… You will double tap the button you will see at the top of the screen where it says “generating logs/analytics”. To get the logs you will go to Settings > Privacy > scroll to bottom and select Analytics and improvements. Of course it is a lot! Hope this helps. If you found another way, please share.
Avatar
Avatar
Ross Donnelly
Logo matches this more than Ubisoft, so something to do with music streaming? https://apps.apple.com/us/app/id684183096
We found the part yesterday, turns out it’s a Bluetooth transmitter for old iPods
👍 4
Avatar
Avatar
Sudo
anyone run an offline map server for use with Axiom
facelessg00n 7/29/2022 5:10 PM
We do, i'll have to check the size when im back in the office. The only zoomed in tiles which we added were the local ones to our country though. As the global tileset to the building level (13? ) was quite large
Avatar
Avatar
TiffanyRbns
Hi @codyp915 To pull the syslogs from iPhone you do the following or at least from what I know. Go to settings > Accessibility > Touch> Assistive Touch - “Turn on”> Custom Actions > Double Tap - “select Analytics” (this will place a button on your phone)… You will double tap the button you will see at the top of the screen where it says “generating logs/analytics”. To get the logs you will go to Settings > Privacy > scroll to bottom and select Analytics and improvements. Of course it is a lot! Hope this helps. If you found another way, please share.
You can also press and hold volume up + volume down + side button for 1-1.5 seconds and release to trigger a sysdiagnose. The phone should take a screen shot and vibrate to let you know you were successful. If you call 9-1-1 you went to far. I find this way a bit simpler and faster but there have also been times where I thought I timed it right and didn’t, ending up waiting around 10 minutes for nothing followed by some choice words.
Avatar
TiffanyRbns 7/29/2022 6:58 PM
@Brandon E good to know!!! Thanks I knew what I had was long. Appreciate the tip!
Avatar
Hi has someone used Cuckoo Sandbox before and confifgured it to route traffic through a VPN? Because I'm getting the following error: (edited)
Avatar
CyberJunkie 7/30/2022 8:52 AM
Hey does recovered files from autopsy has its exif data changed?
8:52 AM
i recovered a png file , its meta data was changed,
8:52 AM
using exiftool
8:52 AM
i verified this
🤔 1
Avatar
Avatar
CyberJunkie
i recovered a png file , its meta data was changed,
What data was changed? Are you able to show screenshots? (never seen this before)
Avatar
Avatar
codyp915
Hi, I got a random pop-up that my phone was hacked, does anyone know how I can get to my logs on an iPhone I need to make sure there was no intrusion
burgers_N_bytes 7/30/2022 3:48 PM
Elcomsoft can pull the crash logs and sysdiagnose logs for you if you have a copy.
Avatar
Hi everyone 1- what is best way (or best practices) to analysis and work with malware infected digital evidence? 2- how do you guys archive and secure malware infected digital evidence? Thanks
Avatar
Avatar
Yousha
Hi everyone 1- what is best way (or best practices) to analysis and work with malware infected digital evidence? 2- how do you guys archive and secure malware infected digital evidence? Thanks
randomaccess 8/1/2022 1:10 AM
This is a very vague question so it's difficult to answer. Are you asking for the best way to set up your analysis system to analyse malware affected disk images? Because you can setup your systems the same as any other forensic analysis system. Same rules apply - don't execute the malware
1:10 AM
Archiving and securing depends on your organisation. civil labs may operate differently to le. Regular organisations that have blue teams have different standards again
Avatar
Adam Cervellone 8/1/2022 5:53 AM
@Magnet Forensics Feature request for Axiom: Would it be possible to add a custom case type at the Case Details screen? In my current role I am often working officer involved shootings, death investigations, fatal vehicle collisions or hit and run accidents. I have been using the "Other" case type on these examinations but it would be nice to add in something more specific.
Avatar
@Magnet Forensics - It's been a few years since I've used DVR Examiner, does it export out logs or would I still need to log into the system to export out the logs ?
Avatar
Avatar
Adam Cervellone
@Magnet Forensics Feature request for Axiom: Would it be possible to add a custom case type at the Case Details screen? In my current role I am often working officer involved shootings, death investigations, fatal vehicle collisions or hit and run accidents. I have been using the "Other" case type on these examinations but it would be nice to add in something more specific.
chriscone_ar 8/1/2022 6:43 AM
I'll forward that along, could really be useful for anything that doesn't fit with the listed choices.
Avatar
Avatar
Jay528
@Magnet Forensics - It's been a few years since I've used DVR Examiner, does it export out logs or would I still need to log into the system to export out the logs ?
chriscone_ar 8/1/2022 6:46 AM
I believe you'd still need to log into the unit to export the logs. Also a good opportunity to review the different settings - especially confirming time offsets.
Avatar
Thanks @chriscone_ar
👍 1
Avatar
Avatar
chriscone_ar
I'll forward that along, could really be useful for anything that doesn't fit with the listed choices.
Adam Cervellone 8/1/2022 6:55 AM
Thank you!
👍 1
Avatar
Has anyone installed a Windows VM on an M1 Mac, using either vmware or parallels?
Avatar
Avatar
luis511_
Has anyone installed a Windows VM on an M1 Mac, using either vmware or parallels?
My understanding was that support was not available until very very recently when someone got arm windows running. I haven't tried it yet, my apple silicon macs are personally owned and I haven't had a reason to try yet
Avatar
Avatar
whee30
My understanding was that support was not available until very very recently when someone got arm windows running. I haven't tried it yet, my apple silicon macs are personally owned and I haven't had a reason to try yet
Thank you.
Avatar
TiffanyRbns 8/1/2022 11:38 AM
😂 working on a Digital Forensics newsletter! I’m not as creative in this field. Anyone have any suggestions for creative newsletter name?
Avatar
Avatar
TiffanyRbns
😂 working on a Digital Forensics newsletter! I’m not as creative in this field. Anyone have any suggestions for creative newsletter name?
Andrew Rathbun 8/1/2022 11:47 AM
Thinking DFIRently?
Avatar
TiffanyRbns 8/1/2022 11:49 AM
I like, just not IR related. Only DF 😊 (edited)
Avatar
Avatar
TiffanyRbns
I like, just not IR related. Only DF 😊 (edited)
Andrew Rathbun 8/1/2022 12:41 PM
DFIR is still the general umbrella term 🤷‍♂️ but i get it!
Avatar
Avatar
TiffanyRbns
😂 working on a Digital Forensics newsletter! I’m not as creative in this field. Anyone have any suggestions for creative newsletter name?
Digitalferret 8/1/2022 1:54 PM
The Fuzzy Bits
1:56 PM
so many hooks with that 🙂
Avatar
Avatar
TiffanyRbns
I like, just not IR related. Only DF 😊 (edited)
Nibbles of knowledge... Bytes of inspiration... Maybe I am not as creative either....
Avatar
Avatar
TiffanyRbns
😂 working on a Digital Forensics newsletter! I’m not as creative in this field. Anyone have any suggestions for creative newsletter name?
The LastWritten Times
Avatar
TiffanyRbns 8/1/2022 8:07 PM
@Digitalferret 😂
8:07 PM
@Jamey nice!
8:07 PM
@MeGaBiTe sounds like a criminal minds episode 😂 but love it
Avatar
Avatar
Yousha
Hi everyone 1- what is best way (or best practices) to analysis and work with malware infected digital evidence? 2- how do you guys archive and secure malware infected digital evidence? Thanks
Sandboxed VM , isolated from networks (network disabled) usually a external drive. For malware samples a 7zip archive with the password “infected” also stored on an external drive.
12:57 AM
Usually you have a dedicated malware analysis machine, I like something like the older Thinkpad that has a hardware airplane mode switch that disables all networking , additionally you can even remove the wireless card.
1:00 AM
So the scenario would be to acquire the sample that’s zipped, copy to a thumb drive, plug the thumb drive into the analysis machine and pass the usb drive to the vm. Then copy the sample to the vm and then extract it there, then conduct your static analysis. You can also setup a proxy network if you also need some network analysis as well.
1:01 AM
I also usually do a snapshot before analysis, then revert to the “clean” state once analysis is completed.
1:02 AM
There are some vm escape methods, but generally you should be safe. That’s the reason for the dedicated device in the event that the host is also infected.
1:02 AM
In the event the host is infected, wipe the drive, reflags the bios and reinstall the host OS. You should be golden.
1:03 AM
Hopefully that’s a decent explanation in a short amount of time , and it’s what you’re looking for
1:04 AM
Here is a curated list of books, which also include a great selection on malware analysis https://ryd3v.rocks/posts/books
Ryan Collins, Software Engineer, teaching programming, development, React, Next.js
1:05 AM
1:06 AM
Sorry for the long link. It’s not an affiliate link.
1:06 AM
But if you google the title on google you can check the link beforehand. I just copied the link google gave me. 😆
Avatar
Looking for some Cellebrite PA 8.1 assistance. I have created cases on individual extractions. Is there a way to add an additional extraction to a current case? I cant seem to find anywhere to do it.
Avatar
Avatar
tydras
Looking for some Cellebrite PA 8.1 assistance. I have created cases on individual extractions. Is there a way to add an additional extraction to a current case? I cant seem to find anywhere to do it.
Andrew Rathbun 8/2/2022 9:27 AM
#mobile-forensic-extractions try there
Avatar
Hi everyone, I'm trying to find Botnet samples for Windows to gather results for the Sandbox Environment I'm developing but I'm having a hard time finding anything. I have checked Malwarebazaar but most botnets are ELF files (Linux). Therefore where can I find 100-200 botnet samples for Windows OS? Thanks in advance.
Avatar
Avatar
degent_
Hi everyone, I'm trying to find Botnet samples for Windows to gather results for the Sandbox Environment I'm developing but I'm having a hard time finding anything. I have checked Malwarebazaar but most botnets are ELF files (Linux). Therefore where can I find 100-200 botnet samples for Windows OS? Thanks in advance.
randomaccess 8/2/2022 3:52 PM
Probably vx underground
Avatar
D1g1talDan 8/3/2022 1:34 AM
Morning everyone, I’m trying to determine origin of images held on an iOS device. In the file path CPLAssests is mentioned, OS research shows that it might be evidence of the iCloud synchronisation of some respect. \root\private\var\mobile\media\PhotoData\CPLAssests…… Any help at all would be lovely (edited)
Avatar
Have you looked at the corresponding Photos.sqlite record for that file?
Avatar
Avatar
D1g1talDan
Morning everyone, I’m trying to determine origin of images held on an iOS device. In the file path CPLAssests is mentioned, OS research shows that it might be evidence of the iCloud synchronisation of some respect. \root\private\var\mobile\media\PhotoData\CPLAssests…… Any help at all would be lovely (edited)
Recommend running this over your job, may find some helpful artefacts - https://github.com/controlf/mift
mift - a mobile image forensic toolkit. Contribute to controlf/mift development by creating an account on GitHub.
👍 1
Avatar
Avatar
OllieD
Have you looked at the corresponding Photos.sqlite record for that file?
D1g1talDan 8/3/2022 2:14 AM
I’ll have a look mate thanks 😊
Avatar
Avatar
Rob
Recommend running this over your job, may find some helpful artefacts - https://github.com/controlf/mift
D1g1talDan 8/3/2022 2:15 AM
Running anything of GitHub is a no go from my organisation. Crazy! I know 😂
Avatar
Avatar
D1g1talDan
Running anything of GitHub is a no go from my organisation. Crazy! I know 😂
It's from Control-F, the training vendor
2:15 AM
So you could always contact them to see if they could supply you with a copy directly? (edited)
Avatar
D1g1talDan 8/3/2022 2:16 AM
Yeah I might have to
Avatar
You're on the right track with suspecting that the CPL assets are related to cloud synchronisation. I'm sure it's changed a lot since I last looked, but photos synced from iCloud to a device would be saved in those paths to then be displayed in the Photos app
2:20 AM
On a side note, deefinitely worth striking up a conversation with relevant stakeholders about relaxing your policy on GitHub, or creating a process for requesting access to a repo. There are sooooo many great open-source resources: MIFT, KAPE, Andriller, Mobile Revelator, Autopsy, iLEAPP, ALEAPP
2:20 AM
The list goes on 🙂
2:21 AM
Many other UK organisations will have designated standalone machines with a "dirty" internet connection, to facilitate accessing those resources if the corporate firewall blocks them
👍 1
2:21 AM
With permissions from their relevant IT teams ofc. Sometimes easier/safer than whitelisting the site for the whole userbase!
Avatar
D1g1talDan 8/3/2022 2:24 AM
Believe me…it’s an on going battle 😂
🤣 1
Avatar
Avatar
D1g1talDan
Morning everyone, I’m trying to determine origin of images held on an iOS device. In the file path CPLAssests is mentioned, OS research shows that it might be evidence of the iCloud synchronisation of some respect. \root\private\var\mobile\media\PhotoData\CPLAssests…… Any help at all would be lovely (edited)
ScottKjr3347 8/3/2022 3:22 AM
If you dm me with an email I can provide you with a SQLite query for photos.sqlite that will help. Another file to analyze is store.cloudphotodb I have a query for this also. This file should provide how the file was synced with iCloud photos. If you need documentation about the file path read through this blog and feel free to ask any specific questions: https://theforensicscooter.com/2022/05/02/photos-sqlite-query-documentation-notable-artifacts/ (edited)
As many of you are aware, I recently updated my Photos.sqlite queries. Since releasing the different query iterations, I have received several questions about how I was able to decode the data incl…
👌🏻 3
Avatar
Avatar
D1g1talDan
Morning everyone, I’m trying to determine origin of images held on an iOS device. In the file path CPLAssests is mentioned, OS research shows that it might be evidence of the iCloud synchronisation of some respect. \root\private\var\mobile\media\PhotoData\CPLAssests…… Any help at all would be lovely (edited)
I assume you've looked at the low hanging fruit of checking what type of device the photo was taken with to see if it's consistent and then checking the capture time against other photos in the standard DCIM folder to see if it makes sense... photos.sqlite is enormous, it's worth spending time in to see what's getting missed for sure. Report back with what you find!
Avatar
Avatar
whee30
I assume you've looked at the low hanging fruit of checking what type of device the photo was taken with to see if it's consistent and then checking the capture time against other photos in the standard DCIM folder to see if it makes sense... photos.sqlite is enormous, it's worth spending time in to see what's getting missed for sure. Report back with what you find!
D1g1talDan 8/3/2022 8:16 AM
Yes mate 🙂 my heart sunk the first time I opened photos.sqlite for a ‘quick look’
8:16 AM
Pandoras Box comes to mind
Avatar
There's a table ZGENERICALBUM which tracks album names, multiple contributors enabled etc... I keep a txt file with some SQLite queries, although @ScottKjr3347 published way more in depth analysis by the time I caught on to try my hand at it
Avatar
Avatar
D1g1talDan
Yes mate 🙂 my heart sunk the first time I opened photos.sqlite for a ‘quick look’
Semantics 21 (Tom) 8/3/2022 9:52 AM
Dan, you can also use the iOS runtime feature to establish which device the images came from. You just need a known image from the same device on the same power cycle. DM me if you need assistance, it's a feature in the S21 LASERi-X app, very awesome, especially as Apple doesn't apply the device serial numbers to image.
👀 2
Avatar
Avatar
Semantics 21 (Tom)
Dan, you can also use the iOS runtime feature to establish which device the images came from. You just need a known image from the same device on the same power cycle. DM me if you need assistance, it's a feature in the S21 LASERi-X app, very awesome, especially as Apple doesn't apply the device serial numbers to image.
Is this proprietary to the software or do you have a white paper somewhere that shows how the correlation can be made manually?
Avatar
Avatar
whee30
Is this proprietary to the software or do you have a white paper somewhere that shows how the correlation can be made manually?
Semantics 21 (Tom) 8/3/2022 10:58 AM
It's something i spotted that Semantics 21 offered in their products whilst i worked at BlackBag Tech, its not proprietary, they just have a clever way of displaying the linked images. I'll write up an article and post on the S21 case studies site: https://www.semantics21.com/case-studies/
We are proud to showcase the success and experiences of others​
👍 1
10:59 AM
Heres a video of the iOS Runtime filtering: https://videos.semantics21.com/v/oegkMTP3Eumum1OXHSfQjTlPt
Shared with Jumpshare
Avatar
Avatar
D1g1talDan
Believe me…it’s an on going battle 😂
are you able to write your own sequal statements ??? you can just copy an paste some of them.. I know that in Cellebrite PA you can paste a sql statement into it that you get from somewhere else..
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 8/3/2022 11:37 AM
mind moving this to #training-education-employment?
11:38 AM
should be a good discussion, but want to make sure we're keeping things organized as best we can 😛
👍 1
Avatar
ExaltedSlayer 8/3/2022 11:41 AM
Of course, let me copy/paste and then I'll delete the ones here 🙂
11:41 AM
There, I moved it to #training-education-employment 🙂
💯 1
Avatar
Avatar
D1g1talDan
Running anything of GitHub is a no go from my organisation. Crazy! I know 😂
facelessg00n 8/3/2022 3:43 PM
Ouch !
Avatar
Avatar
Jetten_007
are you able to write your own sequal statements ??? you can just copy an paste some of them.. I know that in Cellebrite PA you can paste a sql statement into it that you get from somewhere else..
D1g1talDan 8/3/2022 3:44 PM
Not something I’ve done before. I’ve had so much help now…time to digest (edited)
Avatar
Best places to purchase a TX-1? Saved up some money for one of my own (edited)
Avatar
Avatar
shulgi
Best places to purchase a TX-1? Saved up some money for one of my own (edited)
Avatar
Avatar
shulgi
Best places to purchase a TX-1? Saved up some money for one of my own (edited)
In the lab, or in the field, the NEW Tableau Forensic Imager (TX1) acquires more data, faster, from more media types, without ever sacrificing ease-of-use or portability. Successor to the Tableau TD3 and redesigned from the circuit board up, the TX1 is built on a custom Linux kernel, making it lean and powerful. Every component is hand-selected ...
Avatar
Thanks @stark4n6. Looks like I need to save up one more paycheck for it lol
Avatar
Avatar
shulgi
Thanks @stark4n6. Looks like I need to save up one more paycheck for it lol
prices may vary depending on vendor too because some offer extra cases and stuff
Avatar
Avatar
stark4n6
prices may vary depending on vendor too because some offer extra cases and stuff
Yeah I see that. Some of these extras may prove useful, so I’ll shop around
Avatar
Alex Harmon 8/3/2022 9:38 PM
Does anyone know where I can buy a Tableau T4/T4es SCSI bridge? (Not SATA, not SAS -- must be SCSI) Looks like they stopped making them a loooong time ago, and I'm not seeing used ones sold anywhere. One sold on ebay a few months back, and that's it.
Avatar
Hi everyone. I apologise if this question has been asked before... That being said, I just wondered if anyone in UK Law Enforcement could advise me how they validate their write blockers. We all use internal Tableau T356789iu devices but to maintain UKAS accreditation we have to prove that these work - I know they do but thats ISO/UKAS (sigh). We have a solution (it seems very antiquated > in-out-in-out shake it all about!!) however in my opinion it is very clunky. I think that this could be streamlined but I don't want to upset UKAS. Any help would be most appreciated. Thanks.
Avatar
Avatar
blake-ee
Hi everyone. I apologise if this question has been asked before... That being said, I just wondered if anyone in UK Law Enforcement could advise me how they validate their write blockers. We all use internal Tableau T356789iu devices but to maintain UKAS accreditation we have to prove that these work - I know they do but thats ISO/UKAS (sigh). We have a solution (it seems very antiquated > in-out-in-out shake it all about!!) however in my opinion it is very clunky. I think that this could be streamlined but I don't want to upset UKAS. Any help would be most appreciated. Thanks.
Here's a very brief overview of what we did back when I was LE: Step 1 - Populate a drive with known data (Having a pool of different types, and say using a known NIST image is a good idea). Confirm ground truth/Hash if possible Step 2 - Connect device to write blocker Step 3 - Take an image through write blocker Step 4 - Confirm data has not changed Step 5 - Try and write/alter data while connected to write blocker Step 6 - Again confirm that data has not changed. Repeat this for each individual write blocker, using a mix of drives that you image in your labs, so hard drives, SSDs, USBs, SD cards etc. It might be a pain but it is good to verify that these things work correctly, we have had some fail in the past so on-going testing should be required, but you won't need to do full re-validation each time. Feel free to DM for details, alternatively FCN should have some decent resources for this kind of thing.
Avatar
Avatar
K23
Here's a very brief overview of what we did back when I was LE: Step 1 - Populate a drive with known data (Having a pool of different types, and say using a known NIST image is a good idea). Confirm ground truth/Hash if possible Step 2 - Connect device to write blocker Step 3 - Take an image through write blocker Step 4 - Confirm data has not changed Step 5 - Try and write/alter data while connected to write blocker Step 6 - Again confirm that data has not changed. Repeat this for each individual write blocker, using a mix of drives that you image in your labs, so hard drives, SSDs, USBs, SD cards etc. It might be a pain but it is good to verify that these things work correctly, we have had some fail in the past so on-going testing should be required, but you won't need to do full re-validation each time. Feel free to DM for details, alternatively FCN should have some decent resources for this kind of thing.
Ross Donnelly 8/4/2022 4:20 AM
For periodic checks (rather than a full revalidation eg after a firmware update) we use this tool. Works with anything (doesn't need weibetech hardware) and throws every possible write command at the drive to get full coverage. https://wiebetech.com/software/writeblocking-validation-utility/
👍 3
Avatar
Avatar
Ross Donnelly
For periodic checks (rather than a full revalidation eg after a firmware update) we use this tool. Works with anything (doesn't need weibetech hardware) and throws every possible write command at the drive to get full coverage. https://wiebetech.com/software/writeblocking-validation-utility/
Now that looks cool, thanks for sharing!
Avatar
Avatar
Ross Donnelly
For periodic checks (rather than a full revalidation eg after a firmware update) we use this tool. Works with anything (doesn't need weibetech hardware) and throws every possible write command at the drive to get full coverage. https://wiebetech.com/software/writeblocking-validation-utility/
This is exactly what we used in our UK LE for 17025 validation. Pick a 'Random' disk out of 20 prefabbed empty/noncase drives, connect it to the write blocker, use wiebetech, pass/fail - if it fails (which it has done). We had to use a different disk for each 'technology' (HHD/SSD/Mem Card). It cut down our testing considerably. (edited)
👍 1
Avatar
Agreed that sounds much quicker. Only main benefit of populating/using known data is that you can use the same drives later on for analysis validation if that's the direction you're heading
Avatar
Hey is leaving my first Cybersecurity job after only 6 months a bad look?
Avatar
Avatar
Ventose
Hey is leaving my first Cybersecurity job after only 6 months a bad look?
Andrew Rathbun 8/4/2022 2:33 PM
Can you explain why you left without sounding unprofessional? Could always say it wasn't a culture for or the job didn't end up being what you expected
Avatar
Avatar
Andrew Rathbun
Can you explain why you left without sounding unprofessional? Could always say it wasn't a culture for or the job didn't end up being what you expected
Yeah, I chose to leave a little while ago because the traveling was just too much. But I was just curious about how a 6-month stay at a company would look to interviewers
Avatar
Avatar
Ventose
Yeah, I chose to leave a little while ago because the traveling was just too much. But I was just curious about how a 6-month stay at a company would look to interviewers
Andrew Rathbun 8/4/2022 2:42 PM
As long as you can explain it when asked with a fair reason I don't think anyone will fault you
👍 5
Avatar
Thanks
Avatar
Honesty is always the best policy.
💯 1
Avatar
Avatar
ryd3v
Honesty is always the best policy.
Digitalferret 8/5/2022 12:55 PM
unless ur in Govt and then ur gonna be SOL 🙂
😆 4
Avatar
Anyone in IR Consulting? Looking to transition into it from a SOC / MSSP role and would like a mentor
Avatar
Avatar
burytoes.
Anyone in IR Consulting? Looking to transition into it from a SOC / MSSP role and would like a mentor
Andrew Rathbun 8/6/2022 1:25 PM
Plenty of us are, if you have any questions, #training-education-employment might be the best place for it. Start a new thread, if needed
👍 1
💯 1
Avatar
What are differences between modified date and changed date present in photo metadata in iOS
Avatar
Hello... Can anyone recommend any website from where you can buy a dope badge related to digital forensics? Been searching but didn't come across sth that nice. Thanks!!
Avatar
Avatar
shedex
What are differences between modified date and changed date present in photo metadata in iOS
Andrew Rathbun 8/7/2022 5:03 AM
#mobile-forensic-decoding
Avatar
Avatar
ZetLoke77
Hello... Can anyone recommend any website from where you can buy a dope badge related to digital forensics? Been searching but didn't come across sth that nice. Thanks!!
Digitalferret 8/7/2022 5:30 AM
dope badge or "dope" badge 🤣
Avatar
Avatar
Digitalferret
dope badge or "dope" badge 🤣
You know what kind of dope 😎. Didn't bother to use quotation marks anymore 😂
5:33 AM
Still open to suggestions though 😱
Avatar
Make enough friends in the space and some folks have challenge coins specific to their agencies. I know the various vendors do as well, find them at trade shows and classes
Avatar
Avatar
whee30
Make enough friends in the space and some folks have challenge coins specific to their agencies. I know the various vendors do as well, find them at trade shows and classes
Ross Donnelly 8/7/2022 12:03 PM
It's what I've missed the most during the pandemic - vendor swag!! (If any vendors are reading... 😎)
Avatar
I am curious with regards to photographs forensics is it possible to bypass error level analysis by resaving it over and over? If not how can you tell if a image has been photoshopped/edited using forensics?
Avatar
Avatar
malrker
I am curious with regards to photographs forensics is it possible to bypass error level analysis by resaving it over and over? If not how can you tell if a image has been photoshopped/edited using forensics?
Deleted User 8/8/2022 3:41 AM
ELA can surely be fooled in my experience. The clone detection catches lots of false positives as well I’ve found. If I look at an image manually I look for artefacting and if there is text in a forged image of a document usually has the fonts in slightly differing lightness/darkness. I look at file naming convention as well for anomalies. If someone has deep etched an object I also look at any diagonal lines to see if there are unusual pixels.
Avatar
Anyone got experience dumping data/getting root on a DJI Mini 2 Drone? Or parsing the DJI Assistant DAT files?
Avatar
Avatar
cygnusx
Anyone got experience dumping data/getting root on a DJI Mini 2 Drone? Or parsing the DJI Assistant DAT files?
Digitalferret 8/8/2022 7:23 AM
maybe #drones
Avatar
Deleted User 8/9/2022 5:49 AM
Is there a way to connect Cellebrite PA to a map tile server? I don not have a license for the offline package and wonder if there is a way to connect Cellebrite PA to a locally installed map server. Due to legal restrictions we are not allowed to connect our lab computers to the internet. I have read the manual and been poking around in the settings menu but nothing comes to mind
Avatar
I don’t have an answer for you on the file server but perhaps a workaround could be installing google earth and then exporting your kml files on cases where location is important?
Avatar
Andrew Rathbun 8/9/2022 6:58 AM
I wonder if we have a Target for KAPE for those KML files...
Avatar
Avatar
Deleted User
Is there a way to connect Cellebrite PA to a map tile server? I don not have a license for the offline package and wonder if there is a way to connect Cellebrite PA to a locally installed map server. Due to legal restrictions we are not allowed to connect our lab computers to the internet. I have read the manual and been poking around in the settings menu but nothing comes to mind
DeeFIR 🇦🇺 8/9/2022 6:03 PM
@facelessg00n where is this configured?
Avatar
Avatar
DeeFIR 🇦🇺
@facelessg00n where is this configured?
facelessg00n 8/9/2022 7:19 PM
I’ll check when I get in the office. It’s in the settings tab somewhere
Avatar
Avatar
facelessg00n
I’ll check when I get in the office. It’s in the settings tab somewhere
DeeFIR 🇦🇺 8/9/2022 7:19 PM
Avatar
Avatar
whee30
I don’t have an answer for you on the file server but perhaps a workaround could be installing google earth and then exporting your kml files on cases where location is important?
facelessg00n 8/9/2022 7:20 PM
Usually best to avoid the google especially if you have an offline map server.
Avatar
Avatar
DeeFIR 🇦🇺
Click to see attachment 🖼️
facelessg00n 8/9/2022 7:21 PM
I miss u too.
☺️ 1
Avatar
why not have polls without collecting email IDs..
Avatar
Avatar
Tejas
why not have polls without collecting email IDs..
Andrew Rathbun 8/9/2022 8:53 PM
What are you referring to? The book cover vote? Doing it so it prevents votespam. I don't do anything with the emails. Who knows what Google does with it. Make a fake email or don't participate 🤷‍♂️
Avatar
Avatar
Andrew Rathbun
What are you referring to? The book cover vote? Doing it so it prevents votespam. I don't do anything with the emails. Who knows what Google does with it. Make a fake email or don't participate 🤷‍♂️
yep that one, okay
8:54 PM
can have discord IDs as an alternative maybe
8:54 PM
suggestion
Avatar
Andrew Rathbun 8/9/2022 8:55 PM
Suggestion heard but I'm simply not doing all of that work. That sounds like a massive PITA. Most people probably don't know how to get their own ID whereas everyone has an email
💯 1
Avatar
okay thanks ✌️
Avatar
MrMacca (Allan Mc) 8/10/2022 7:23 AM
I asked the website midjourney.com to generate a design for the book. It uses Artificial intelligence and keywords to create something unique. Here's the 4 designs it came up with...
Avatar
Avatar
MrMacca (Allan Mc)
I asked the website midjourney.com to generate a design for the book. It uses Artificial intelligence and keywords to create something unique. Here's the 4 designs it came up with...
Andrew Rathbun 8/10/2022 7:44 AM
can you post in #deleted-channel?
Avatar
Avatar
Ross Donnelly
"This new feature is based on Ultra Wideband (UWB) technology, which is part of Apple’s U1 chip. Only iPhone 11 and newer models (except for the second-generation iPhone SE) have the U1 chip, so that is why only these devices will work with Find My even when turned off." https://www.google.com/amp/s/9to5mac.com/2021/07/21/ios-15-here-are-the-devices-that-support-find-my-when-turned-off/amp/
Does anyone know if there are any breadcrumb's associated with this that could be viewed off a FFS of the location broadcasting iPhone? Scenario is a unknown burglar breaks into home, if subject had an iPhone 11 or higher either in a powered on or powered off state on his person, is it possible a victim's iphone 11 or higher could have seen this device and have a MAC address or associated ID that could be pulled off the victim's phone with a FFS? Ideally something that Apple would be able to provide if issued a subpoena.
Avatar
Avatar
Solec
Does anyone know if there are any breadcrumb's associated with this that could be viewed off a FFS of the location broadcasting iPhone? Scenario is a unknown burglar breaks into home, if subject had an iPhone 11 or higher either in a powered on or powered off state on his person, is it possible a victim's iphone 11 or higher could have seen this device and have a MAC address or associated ID that could be pulled off the victim's phone with a FFS? Ideally something that Apple would be able to provide if issued a subpoena.
I feel like router interrogation of the home router (even with MAC randomization on newer devices) or a Google Geofence warrant would yield better results. If the home is remote then a cell tower dump might be reasonable as well.
Avatar
I suggested to do the geofence as well, I was kind of spitballng and the above idea kind of crossed my mind. Are you typically seeing devices on routers even if they didn't connect and make a handshake?
Avatar
I think it depends on the model of the router and the type of WiFi protocol (802.11b, a, g, n, ac, ax) that is being used. My understanding is newer WiFi protocols would be less likely to store devices.
👍 1
Avatar
copy, thanks
👍 1
Avatar
Avatar
FullTang
I think it depends on the model of the router and the type of WiFi protocol (802.11b, a, g, n, ac, ax) that is being used. My understanding is newer WiFi protocols would be less likely to store devices.
That is my understanding, the default logging of devices near the router has been turned off for years from what I've heard and seen.
👍 1
Avatar
Avatar
Solec
I suggested to do the geofence as well, I was kind of spitballng and the above idea kind of crossed my mind. Are you typically seeing devices on routers even if they didn't connect and make a handshake?
Deleted User 8/10/2022 1:18 PM
If subjects Wi-Fi radio was turned on it should send probe requests with a random MAC. A router with very verbose logging might capture that request, but I doubt it.
Avatar
hey everyone! how do you personally collect data (tools / methods) from an external sharepoint where you do not have access to compliance center?
Avatar
ForensicDev 8/10/2022 5:20 PM
We have an inquiry to have forensic collections (computer & mobile) done in South Africa. Must be in-country, no foreign travel. Travel within country OK. Onsite & in person acquisitions, no remote acquisition. We don’t have specific locations at this point. If anyone knows of a good outfit or contact located in South Africa, please IM me directly @ForensicDev .
Avatar
Avatar
ForensicDev
We have an inquiry to have forensic collections (computer & mobile) done in South Africa. Must be in-country, no foreign travel. Travel within country OK. Onsite & in person acquisitions, no remote acquisition. We don’t have specific locations at this point. If anyone knows of a good outfit or contact located in South Africa, please IM me directly @ForensicDev .
Andrew Rathbun 8/10/2022 6:36 PM
Contact Jason Jordaan. He's easy to find on Google. SANS instructor in South Africa
6:36 PM
@Jason Jordaan4N6
Avatar
Peacekeeper 8/11/2022 12:23 AM
Hi all, We have a child sexual exploitation case with multiple victims. The platform used to get in contact was BuzzCast (previously named FaceCast). As far as I can tell this is an American company. I have tried reaching out to their support email address, but haven't gotten a response in over 3 weeks unfortunately, so I don't think that's going to happen. Is there anyone here that has experience with BuzzCast and what kind of info a warrant would return and how long the info is stored on BuzzCast servers, before we are going to walk this painstaking path? We have only a username/nickname, ID and signature/status of the contacts, and no other details. We would like to know what information we could get when we're going through the proper international legal channels. In particular we are interested in identifying information like an email address, phone number, IMEI number, IP address, as well, if possible, chat contents of this user. We suspect there are more victims we don't yet know about. Thanks for any information you might be able to provide me with.
Avatar
Avatar
Peacekeeper
Hi all, We have a child sexual exploitation case with multiple victims. The platform used to get in contact was BuzzCast (previously named FaceCast). As far as I can tell this is an American company. I have tried reaching out to their support email address, but haven't gotten a response in over 3 weeks unfortunately, so I don't think that's going to happen. Is there anyone here that has experience with BuzzCast and what kind of info a warrant would return and how long the info is stored on BuzzCast servers, before we are going to walk this painstaking path? We have only a username/nickname, ID and signature/status of the contacts, and no other details. We would like to know what information we could get when we're going through the proper international legal channels. In particular we are interested in identifying information like an email address, phone number, IMEI number, IP address, as well, if possible, chat contents of this user. We suspect there are more victims we don't yet know about. Thanks for any information you might be able to provide me with.
Andrew Rathbun 8/11/2022 5:06 AM
Any chance you emailed support@buzzcast.info and asked for the direct email to their legal department/counsel?
Avatar
Avatar
Andrew Rathbun
Any chance you emailed support@buzzcast.info and asked for the direct email to their legal department/counsel?
Peacekeeper 8/11/2022 5:19 AM
Hi Andrew, I have emailed that support mailaddress but unfortunately haven't gotten any response.
Avatar
Avatar
Peacekeeper
Hi all, We have a child sexual exploitation case with multiple victims. The platform used to get in contact was BuzzCast (previously named FaceCast). As far as I can tell this is an American company. I have tried reaching out to their support email address, but haven't gotten a response in over 3 weeks unfortunately, so I don't think that's going to happen. Is there anyone here that has experience with BuzzCast and what kind of info a warrant would return and how long the info is stored on BuzzCast servers, before we are going to walk this painstaking path? We have only a username/nickname, ID and signature/status of the contacts, and no other details. We would like to know what information we could get when we're going through the proper international legal channels. In particular we are interested in identifying information like an email address, phone number, IMEI number, IP address, as well, if possible, chat contents of this user. We suspect there are more victims we don't yet know about. Thanks for any information you might be able to provide me with.
BuzzCast is listed in the Play store as being a VPB live video streaming app. The address for VPB is 611 Wilshire Blvd #1008 Los Angeles, CA 90017. (Which is the same address the SEARCH ISP List has for the former FaceCast entry (https://www.search.org/resources/isp-list/). I found an email address for VPB of support@vpb.com and a phone number of +1-909-485-3844. Maybe try one of those?
💯 3
❤️ 1
Avatar
Avatar
laurenw
BuzzCast is listed in the Play store as being a VPB live video streaming app. The address for VPB is 611 Wilshire Blvd #1008 Los Angeles, CA 90017. (Which is the same address the SEARCH ISP List has for the former FaceCast entry (https://www.search.org/resources/isp-list/). I found an email address for VPB of support@vpb.com and a phone number of +1-909-485-3844. Maybe try one of those?
Andrew Rathbun 8/11/2022 5:37 AM
@Search.org to the rescue 😄
Searchhdotorg 1
Avatar
Avatar
Peacekeeper
Hi all, We have a child sexual exploitation case with multiple victims. The platform used to get in contact was BuzzCast (previously named FaceCast). As far as I can tell this is an American company. I have tried reaching out to their support email address, but haven't gotten a response in over 3 weeks unfortunately, so I don't think that's going to happen. Is there anyone here that has experience with BuzzCast and what kind of info a warrant would return and how long the info is stored on BuzzCast servers, before we are going to walk this painstaking path? We have only a username/nickname, ID and signature/status of the contacts, and no other details. We would like to know what information we could get when we're going through the proper international legal channels. In particular we are interested in identifying information like an email address, phone number, IMEI number, IP address, as well, if possible, chat contents of this user. We suspect there are more victims we don't yet know about. Thanks for any information you might be able to provide me with.
Because it’s a U.S. company, obviously the best way to get info from them is a request for records from a US based LEA. I see you are not US, but is there any chance one or more of the victims is in the US? If so, maybe a US LEA can partner with you, and serve legal process on buzzcast. Would be much quicker than an MLAT.
Avatar
Avatar
MeGaBiTe
Because it’s a U.S. company, obviously the best way to get info from them is a request for records from a US based LEA. I see you are not US, but is there any chance one or more of the victims is in the US? If so, maybe a US LEA can partner with you, and serve legal process on buzzcast. Would be much quicker than an MLAT.
Peacekeeper 8/11/2022 6:08 AM
Hi Megabite, So far we only know of Dutch victims, so it's probably going to be an MLAT. But since we had no experience with BuzzCast, and an MLAT is going to take time, I wanted to get some more info first.
👍 1
Avatar
Avatar
Peacekeeper
Hi Megabite, So far we only know of Dutch victims, so it's probably going to be an MLAT. But since we had no experience with BuzzCast, and an MLAT is going to take time, I wanted to get some more info first.
Good luck, and don’t give up!
Avatar
Avatar
MeGaBiTe
Good luck, and don’t give up!
Peacekeeper 8/11/2022 6:13 AM
We never do, certainly not with CSA/CSE cases. Thanks for the help all! (edited)
💯 5
Avatar
skysafe-josh 8/11/2022 4:36 PM
Hello! anyone know of a tool that will open a SAGE Backup file?
Avatar
Avatar
skysafe-josh
Hello! anyone know of a tool that will open a SAGE Backup file?
As far as I was aware to review SAGE data you have to use the SAGE application
Avatar
Hi everyone! I’d like to know if you can share some ways/tools to collect DFIR related data. This is our use case: there is an incident in a remote business unit. We request the team in charge of that business unit to collect relevant logs, disk images and so on and send them to the main team in charge of DFIR. What tools can be leverage to send such large files? SFTP? Next cloud? O other tools? (edited)
Avatar
Avatar
oareont
Hi everyone! I’d like to know if you can share some ways/tools to collect DFIR related data. This is our use case: there is an incident in a remote business unit. We request the team in charge of that business unit to collect relevant logs, disk images and so on and send them to the main team in charge of DFIR. What tools can be leverage to send such large files? SFTP? Next cloud? O other tools? (edited)
As far as collection I can recommend FTK Imager (Free) or X-ways (paid), both can make disk images and logical images (however Imager's logical images are in the AD1 format which is proprietary to Access Data). Also, x-ways, while it requires a subscription, is a full forensic suite, so it can process the images as well.
Avatar
Avatar
J05H
As far as I was aware to review SAGE data you have to use the SAGE application
It was quite a few years ago, but this is what we ended up doing. I vaguely recall having to deal with a SAGE licensing issue, perhaps because we were virtualizing the disk image from the finance person’s workstation.
Avatar
Avatar
oareont
Hi everyone! I’d like to know if you can share some ways/tools to collect DFIR related data. This is our use case: there is an incident in a remote business unit. We request the team in charge of that business unit to collect relevant logs, disk images and so on and send them to the main team in charge of DFIR. What tools can be leverage to send such large files? SFTP? Next cloud? O other tools? (edited)
What are the security requirements? Is it business sensitive data of any kind? 🙂
Avatar
Avatar
oareont
Hi everyone! I’d like to know if you can share some ways/tools to collect DFIR related data. This is our use case: there is an incident in a remote business unit. We request the team in charge of that business unit to collect relevant logs, disk images and so on and send them to the main team in charge of DFIR. What tools can be leverage to send such large files? SFTP? Next cloud? O other tools? (edited)
DeeFIR 🇦🇺 8/12/2022 4:25 PM
Are you geographically dispersed? Do you host any of your own infrastructure? Are you looking to host your own server/s, or are you relying on cloud resources? Any bandwidth limitations at each site?
Avatar
Avatar
DeeFIR 🇦🇺
Are you geographically dispersed? Do you host any of your own infrastructure? Are you looking to host your own server/s, or are you relying on cloud resources? Any bandwidth limitations at each site?
We are geographically dispersed. We have dedicated infrastructure to host any tools and we don’t have bandwidth limitations at each site. Currently what we do is that when an incident occurs in a remote geographically dispersed business unit, we request the team managing that particular business unit to collect all the necessary data and we setup a SFTP server where they can upload the collected data. I was wondering if there is a better scalable solution instead of setting up a SFTP server every time when there is an incident. (edited)
Avatar
Avatar
oareont
We are geographically dispersed. We have dedicated infrastructure to host any tools and we don’t have bandwidth limitations at each site. Currently what we do is that when an incident occurs in a remote geographically dispersed business unit, we request the team managing that particular business unit to collect all the necessary data and we setup a SFTP server where they can upload the collected data. I was wondering if there is a better scalable solution instead of setting up a SFTP server every time when there is an incident. (edited)
randomaccess 8/13/2022 2:06 AM
Yes. You can use kape and upload to sftp/S3 or predeploy Velociraptor. You could also use whatever edr you have but ymmv
2:07 AM
You can get a lot done without needing a disk image
Avatar
Deleted User 8/13/2022 10:58 AM
Question for the US based folks: how do courts generally view screenshots of messages from smart phones in regards to validity? Thanks.
Avatar
I would imagine it's all down to your documentation of how you came to possess screenshots vs a download of the device. Pictures of a cellphone screen used to be the standard before forensic software became commonplace... I still screen record on apps that are not supported by the software available to me.
👍 3
Avatar
Avatar
Deleted User
Question for the US based folks: how do courts generally view screenshots of messages from smart phones in regards to validity? Thanks.
While not exactly the same, the courts seem split on this with most case law applying to screen shots of social media posts- but I can see that parallel to other digital evidence. Some courts are ok with screen shots and testimony (Texas rule) but others really frown upon it (Maryland rule). Here is a decent article addressing it in more detail https://www.jdsupra.com/legalnews/authenticating-social-media-evidence-at-33843/ (edited)
Social media is ubiquitous in our cyber-connected world. For many, the first thing a person does when they wake up, and the last thing that person...
👍 1
Avatar
Avatar
oareont
We are geographically dispersed. We have dedicated infrastructure to host any tools and we don’t have bandwidth limitations at each site. Currently what we do is that when an incident occurs in a remote geographically dispersed business unit, we request the team managing that particular business unit to collect all the necessary data and we setup a SFTP server where they can upload the collected data. I was wondering if there is a better scalable solution instead of setting up a SFTP server every time when there is an incident. (edited)
DeeFIR 🇦🇺 8/13/2022 3:57 PM
What about using cloud hosted object storage? Something like MinIO if you want to host it yourself, or something else which is S3 compatible? You can use an S3 browser at each site, provide pre-signed URLs (for tools which allow them) and also user credentials for operators.
💯 1
Avatar
ForensicDev 8/13/2022 10:31 PM
Need to borrow some brain power. Working an intrusion case. Victim observes computer takeover (mouse moves, opens emails, uses Windows search bar, etc.). So not the stuck mouse-button that causes random activity. We triage the system, pivoting backwards from the time the takeover was observed. We run the system through AV/AM scans - no hits. We do a DFIR triage timeline on the standard items that would show browsing, download, execution, persistence - nothing obvious either. So my question is. Assuming the observed behavior is truly a 3rd party taking control of the system. By what means can the computer be controlled remotely, not RDC since they observed the screen, if no artifacts of dropper/payload is present? Trying to figure out how this can be accomplished from an attacker's side. The system had TeamViewer installed by default for IT support, yet its logs did not show any connections that raise suspicion. Any thoughts/ideas on how this "takeover event" could have been done, would be greatly appreciated.
Avatar
Avatar
ForensicDev
Need to borrow some brain power. Working an intrusion case. Victim observes computer takeover (mouse moves, opens emails, uses Windows search bar, etc.). So not the stuck mouse-button that causes random activity. We triage the system, pivoting backwards from the time the takeover was observed. We run the system through AV/AM scans - no hits. We do a DFIR triage timeline on the standard items that would show browsing, download, execution, persistence - nothing obvious either. So my question is. Assuming the observed behavior is truly a 3rd party taking control of the system. By what means can the computer be controlled remotely, not RDC since they observed the screen, if no artifacts of dropper/payload is present? Trying to figure out how this can be accomplished from an attacker's side. The system had TeamViewer installed by default for IT support, yet its logs did not show any connections that raise suspicion. Any thoughts/ideas on how this "takeover event" could have been done, would be greatly appreciated.
Deleted User 8/13/2022 10:51 PM
I would get the user to go over their story again to see if it changes and then review all USB devices inserted into machine. A Rubber Ducky like device may be able to execute what you mention above. I would also review all network traffic and ports to see what was talking to what. Anecdote: experienced same issue, user filmed desktop on phone. Turned out to be internal IT staff trying to loot their machine because said user dealt with million dollar accounts. IT guy connected via something similar to TeamViewer (can’t recall exact app but it was their preferred and vetted remote access solution)
Avatar
Avatar
Deleted User
I would get the user to go over their story again to see if it changes and then review all USB devices inserted into machine. A Rubber Ducky like device may be able to execute what you mention above. I would also review all network traffic and ports to see what was talking to what. Anecdote: experienced same issue, user filmed desktop on phone. Turned out to be internal IT staff trying to loot their machine because said user dealt with million dollar accounts. IT guy connected via something similar to TeamViewer (can’t recall exact app but it was their preferred and vetted remote access solution)
ForensicDev 8/13/2022 11:49 PM
This all happened in a hotel while the user was traveling, which makes this all a bit more of a strange situation. Will dig a bit more on the remote connection. Most of the Windows EVTX have rolled over since the incident.
Avatar
Avatar
ForensicDev
Need to borrow some brain power. Working an intrusion case. Victim observes computer takeover (mouse moves, opens emails, uses Windows search bar, etc.). So not the stuck mouse-button that causes random activity. We triage the system, pivoting backwards from the time the takeover was observed. We run the system through AV/AM scans - no hits. We do a DFIR triage timeline on the standard items that would show browsing, download, execution, persistence - nothing obvious either. So my question is. Assuming the observed behavior is truly a 3rd party taking control of the system. By what means can the computer be controlled remotely, not RDC since they observed the screen, if no artifacts of dropper/payload is present? Trying to figure out how this can be accomplished from an attacker's side. The system had TeamViewer installed by default for IT support, yet its logs did not show any connections that raise suspicion. Any thoughts/ideas on how this "takeover event" could have been done, would be greatly appreciated.
randomaccess 8/14/2022 12:32 AM
I just recently had something like this - there was one hit in event logs because the malware set an AV exclusion and then the rest was tracked by the AV/EDR which was limited but useful standard artifacts had all degrees of nothing
12:33 AM
id be checking for AV exclusions (evtx/registry), any logging associated with whatever AV was installed, as well as any application that provides remote access/management capability (usually youll find a couple) and then you may be out of luck if the artifacts have rolled
Avatar
Avatar
ForensicDev
Need to borrow some brain power. Working an intrusion case. Victim observes computer takeover (mouse moves, opens emails, uses Windows search bar, etc.). So not the stuck mouse-button that causes random activity. We triage the system, pivoting backwards from the time the takeover was observed. We run the system through AV/AM scans - no hits. We do a DFIR triage timeline on the standard items that would show browsing, download, execution, persistence - nothing obvious either. So my question is. Assuming the observed behavior is truly a 3rd party taking control of the system. By what means can the computer be controlled remotely, not RDC since they observed the screen, if no artifacts of dropper/payload is present? Trying to figure out how this can be accomplished from an attacker's side. The system had TeamViewer installed by default for IT support, yet its logs did not show any connections that raise suspicion. Any thoughts/ideas on how this "takeover event" could have been done, would be greatly appreciated.
Digitalferret 8/14/2022 2:30 AM
Similar to Howard, see if anything here fits the bill https://shop.hak5.org/ . Hotel environment could be set up to farm anyone "plugged in".
Avatar
Avatar
Digitalferret
Similar to Howard, see if anything here fits the bill https://shop.hak5.org/ . Hotel environment could be set up to farm anyone "plugged in".
Deleted User 8/14/2022 4:05 AM
Hotel=digital Petri dish. Transparent proxy could cause issues for sure.
Avatar
Avatar
Deleted User
Hotel=digital Petri dish. Transparent proxy could cause issues for sure.
Digitalferret 8/14/2022 4:11 AM
lol Digital petri dish 🙂 so true
😎 3
Avatar
ForensicDev 8/14/2022 9:40 AM
Thanks all. Will go back and have another look. The user is an experienced and aware of cyber threats/phishing, etc. He was not even using the computer when the takeover took place and noticed the activity after walking past it in the room. He used WiFi connect. Thanks again for all the ideas.
👍🏻 2
Avatar
My friends project if anyone wishes to contribute: https://github.com/freeload101/DIGGER
Bash Scripts to query CBR,Cloud API's and generally automate the IR process. - GitHub - freeload101/DIGGER: Bash Scripts to query CBR,Cloud API's and generally automate the IR process.
Avatar
Original message was deleted or could not be loaded.
I’m guessing it’s android based? Try #mobile-forensic-extractions
Avatar
Avatar
Fierry
I’m guessing it’s android based? Try #mobile-forensic-extractions
Ah, I thought i was in right channel ^^
Avatar
Avatar
R3V3R53
Ah, I thought i was in right channel ^^
You’ll find that people specialized in certain topics tent to frequent certain channels 🙂
Avatar
SomeAwesomeDude 8/15/2022 7:11 AM
Hey folks, have a question. We have a 256Bit AES encrypted File. We know the password. How you would decrypt it? OpenSSL?
Avatar
Yeah OpenSSL would be one of the go-to’s. If you want a more user friendly version, GCHQ’s CyberChef tool has AES decryption as an input https://gchq.github.io/CyberChef/
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
😘 1
thistbh 2
Avatar
Does anyone know if Threema is worth to subpoena data for? Are they keeping anything on the server?
Avatar
Avatar
chauan
Does anyone know if Threema is worth to subpoena data for? Are they keeping anything on the server?
3:19 PM
Gotta love FOIA
😆 1
Avatar
Hi. I’m interested in talking with any LEOs who are doing ICAC cases, are part of a unit of four or less, and working forensic requests from surrounding agencies. I’m an LEO as well. I’m interested in hearing about your agency’s capacity and strategy used to work cases on multiple fronts. Please DM me if possible. Thanks!
Avatar
Hey everyone! Glad to be here and looking forward to learning from you all (edited)
Avatar
Hey all, thanks for letting me in! Sorry I got confused with the entry system, managed to work it out eventually lol
3:47 PM
Quick intro, I am Will aka BushidoToken on Twitter, I’m a CTI analyst that supports our CERT/DFIR team, in my spare time, I write blogs on https://bushidotoken.net and help run Curated Intel CTI research group https://curatedintel.org (edited)
CTI, threat intelligence, OSINT, malware, APT, threat hunting, threat analysis, CTF, cybersecurity, security
Avatar
You’ll love #cyber-threat-intelligence 😉
❤️ 1
3:48 PM
Also I see your stuff circulated internally at work, big props for your work
Avatar
Hey thanks!
Avatar
ForensicDev 8/15/2022 10:05 PM
What am I missing here? Trying to have log2timeline (v.20220724) process a ZIP file that contains triage data sets. Running Ubuntu 22.04. When I run log2timeline.py timeline.plaso /path/to/my/project/data.zip it is telling me unrecognized arguments: /path/to/my/project/data.zip. The data.zip file is not password protected.
Avatar
Avatar
ForensicDev
What am I missing here? Trying to have log2timeline (v.20220724) process a ZIP file that contains triage data sets. Running Ubuntu 22.04. When I run log2timeline.py timeline.plaso /path/to/my/project/data.zip it is telling me unrecognized arguments: /path/to/my/project/data.zip. The data.zip file is not password protected.
ForensicDev 8/15/2022 10:16 PM
Resolved: log2timeline.py --storage-file timeline.plaso /path/to/my/project/data.zip
Avatar
ForensicDev 8/15/2022 10:31 PM
Spoke too early. While the command line now starts the processing it seems that log2timeline does not support reading native ZIP files as a source. The error log shows: filestat unable to parse file: data.zip with error: [Errno 95] Operation not supported Just seems strange, because ZIP files seem to be supported, unless I am reading the documentation wrong. Anyone came across this?
Avatar
Avatar
ForensicDev
Spoke too early. While the command line now starts the processing it seems that log2timeline does not support reading native ZIP files as a source. The error log shows: filestat unable to parse file: data.zip with error: [Errno 95] Operation not supported Just seems strange, because ZIP files seem to be supported, unless I am reading the documentation wrong. Anyone came across this?
ForensicDev 8/15/2022 10:33 PM
Found a workaround by mounting the ZIP file and feeding the mount point into log2timeline.
Avatar
Anyone had problems when enabling psremoting on some clients that are part of a domain? Just enabled psremoting on the client and on the remote host and added them to the trustedclients on both pcs. But still I can not invoke any commands remotely neither start a powershell session on the remote host. Also winrm traffic was added on the firewall rules to be allowed.
Avatar
dbirista3412 8/16/2022 5:52 AM
Hey Folks! Thanks for letting me in to your community. I'm currently working in Threat Intelligence at Verizon for the DBIR and am excited to connect with folks from the DFIR and Threat Intel world. This seems like an awesome community/resource and I'm excited to learn more from y'all.
💯 2
Avatar
Are we ok to hand out invite links to colleagues?
Avatar
Absolutely
Avatar
Avatar
TomZon
Are we ok to hand out invite links to colleagues?
Andrew Rathbun 8/16/2022 8:22 AM
It's a public server! Just make sure they read the readme
Avatar
Hello Everyone, I have an other "quick question"... When your windows session is locked, do you know which process is involved when you move your mouse ? when your screen get out of your screensaver to the windows "welcome page" before you did ctrl+alt+del ?
Avatar
Avatar
ZetLoke77
Anyone had problems when enabling psremoting on some clients that are part of a domain? Just enabled psremoting on the client and on the remote host and added them to the trustedclients on both pcs. But still I can not invoke any commands remotely neither start a powershell session on the remote host. Also winrm traffic was added on the firewall rules to be allowed.
You could try a port scanning on 5985 or 5986 from both ends to double check that's been successfully implemented
Avatar
HEYOOOOOO!!!! Congrats on the win!
💯 1
Avatar
Avatar
ZetLoke77
Anyone had problems when enabling psremoting on some clients that are part of a domain? Just enabled psremoting on the client and on the remote host and added them to the trustedclients on both pcs. But still I can not invoke any commands remotely neither start a powershell session on the remote host. Also winrm traffic was added on the firewall rules to be allowed.
Just a reminder that by default only members of the local Administrators group on the target computer can connect inbound to that computer via PowerShell remoting, so that would be the first thing I’d check
Avatar
Avatar
ZetLoke77
Anyone had problems when enabling psremoting on some clients that are part of a domain? Just enabled psremoting on the client and on the remote host and added them to the trustedclients on both pcs. But still I can not invoke any commands remotely neither start a powershell session on the remote host. Also winrm traffic was added on the firewall rules to be allowed.
Also if you manually enable PowerShell remoting on client systems with the command ‘enable-psremoting -force’ then this will configure the WinRM service and inbound firewall rules. No need to mess with the firewall to allow WinRM traffic unless you’re enabling Remoting through Group Policy. (edited)
Avatar
https://github.com/0vercl0k/CVE-2022-21971 So we have Checkpoint (NGFW) zero cloud protection thing it should detect that macro or w/e embedded into that word doco right? and in theory not let anyone download it or Clean up the file(changed hash/file size)
PoC for CVE-2022-21971 &quot;Windows Runtime Remote Code Execution Vulnerability&quot; - GitHub - 0vercl0k/CVE-2022-21971: PoC for CVE-2022-21971 &quot;Windows Runtime Remote Code Execu...
Avatar
JeezyCreezy 8/17/2022 2:19 AM
I need to show whether the user had Telegram auto download enabled and don’t have access to the (Android) phone. Does anyone know where I’d find the relevant Telegram configuration info within the data extraction? Thanks @Law Enforcement [UK] (edited)
Avatar
If I am writing a partial filepath, whats the best way to denote its a partial path? I wrote .\File\Path\Here\file.ext. Is that a good way to do it?
Avatar
Have a case processed with Axiom, exported findings out to a portable case. Agent has over 50 keywords to search. Whenever we load the list the portable case displays fails to complete the search. Any insight as to why this happens? @Magnet Forensics
Avatar
Avatar
rdubu
Have a case processed with Axiom, exported findings out to a portable case. Agent has over 50 keywords to search. Whenever we load the list the portable case displays fails to complete the search. Any insight as to why this happens? @Magnet Forensics
chriscone_ar 8/17/2022 8:12 AM
You're adding the keyword list in for processing from the main case, right?
Avatar
The agent wants to run their own keywords, so this is done on the portable case. The search starts, and after we check hours later there is a failed keyword search down on the bottom
Avatar
Have any of you had a good experience (or, a bad one) trying to work with TinyURL to deal with malicious activity?
Avatar
Avatar
Arsenal
Have any of you had a good experience (or, a bad one) trying to work with TinyURL to deal with malicious activity?
DeeFIR 🇦🇺 8/17/2022 2:12 PM
In a private capacity, I’ve had good experiences with them when reporting malicious URLs. Clear and concise abuse notifications are actioned quickly.
👍 1
Avatar
can anyone recommend any sources besides NIST or SWGDE for model/example forensics SOPs?
2:19 PM
or dfs.dc.gov
Avatar
Avatar
crash
can anyone recommend any sources besides NIST or SWGDE for model/example forensics SOPs?
Digitalferret 8/17/2022 2:42 PM
maybe echo in #policies-and-procedures ?
👍 1
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 8/17/2022 5:00 PM
#mobile-forensic-extractions
Avatar
fangoutbang 8/17/2022 7:31 PM
Good evening looking to see if anyone has some preferred advice on mobile device forensic tools?
Avatar
Which kind of devices are you expecting to examine?
Avatar
Avatar
fangoutbang
Good evening looking to see if anyone has some preferred advice on mobile device forensic tools?
facelessg00n 8/18/2022 2:53 AM
what do you need to know
Avatar
fangoutbang 8/18/2022 3:34 AM
Android and IOS I believe is the target. I am being asked about options from a second hand.
Avatar
Does anyone have a quick and easy way to break down large wordlists into 20 or 50mb files? To add to brute forces agents etc
Avatar
Avatar
Gladros
Does anyone have a quick and easy way to break down large wordlists into 20 or 50mb files? To add to brute forces agents etc
Andrew Rathbun 8/18/2022 5:48 AM
maybe try #password-encryption-cracking
👍🏻 1
Avatar
Avatar
Gladros
Does anyone have a quick and easy way to break down large wordlists into 20 or 50mb files? To add to brute forces agents etc
Deleted User 8/18/2022 6:33 AM
Have a look at “man split” on your Linux box. Breaks down files into smaller ones defined by line count.
Avatar
Avatar
Deleted User
Have a look at “man split” on your Linux box. Breaks down files into smaller ones defined by line count.
Legend - thanks!
Salute 1
Avatar
usermobiles 8/18/2022 8:21 AM
Hi Everyone, I was just searching for info on CMMAssets in IOS file systems, any information will be much appreciated. Thank you
Avatar
Avatar
usermobiles
Hi Everyone, I was just searching for info on CMMAssets in IOS file systems, any information will be much appreciated. Thank you
Andrew Rathbun 8/18/2022 8:29 AM
#mobile-forensic-decoding
👍 1
Avatar
usermobiles 8/18/2022 9:29 AM
@ScottKjr3347 wondering if you had any info regarding CMM assets? Many thanks
Avatar
ScottKjr3347 8/18/2022 10:03 AM
Yes they are called Cloud Master Moments in Photos.sqlite. They are also called iCloud Share links. I recently posted a specific query for these artifacts on my GitHub I would have posted the specific query for you here but you didn’t mention an iOS version. https://github.com/ScottKjr3347/iOS_Photos.sqlite_Queries/tree/main Information can be found in other artifacts depending on how the link was shared. I believe @cScottVance#0659 is currently working on that aspect of iCloud links in messages. There is some information about them in my Photos.sqlite documentation blog if you search for Cmm you should find the documentation also if you look around Figure #18 there should be an example video I’ll be updating the specific query for these but I’m working on some related stuff and they won’t be ready for awhile. The ones posted should get you started. Dm if you have any specific questions.
iOS Photos.sqlite queries that may help with decoding data stored in Photos.sqlite. These queries are based on testing, research and some community published research. These queries were written to...
💯 2
👍 2
Avatar
Avatar
rdubu
The agent wants to run their own keywords, so this is done on the portable case. The search starts, and after we check hours later there is a failed keyword search down on the bottom
Is it possible to run a keyword search within the portable case environment? I would like to think - Yes. It would be the same as automating repeat-single-keyword searches. Is the list in a plain txt file?
Avatar
Yes its a plain .txt file
Avatar
Avatar
ScottKjr3347
Yes they are called Cloud Master Moments in Photos.sqlite. They are also called iCloud Share links. I recently posted a specific query for these artifacts on my GitHub I would have posted the specific query for you here but you didn’t mention an iOS version. https://github.com/ScottKjr3347/iOS_Photos.sqlite_Queries/tree/main Information can be found in other artifacts depending on how the link was shared. I believe @cScottVance#0659 is currently working on that aspect of iCloud links in messages. There is some information about them in my Photos.sqlite documentation blog if you search for Cmm you should find the documentation also if you look around Figure #18 there should be an example video I’ll be updating the specific query for these but I’m working on some related stuff and they won’t be ready for awhile. The ones posted should get you started. Dm if you have any specific questions.
ScottKjr3347 8/18/2022 2:51 PM
Just for full clarity, today I’ve been asked the same questions almost verbatim by a few different people, so in fairness I won’t be answering questions about CMM via private messages. If you have a question please feel free to post it to the #mobile-forensic-decoding channel and I’ll do my best to answer. (edited)
💯 2
Avatar
Avatar
Deleted User
Have a look at “man split” on your Linux box. Breaks down files into smaller ones defined by line count.
Digitalferret 8/18/2022 3:22 PM
my mind. when i read "man split" .. sorry, i'll see myself out 🤪 Edit: possibly NSFW - BORДT (edited)
SPOILER
Image attachment
😂 2
Avatar
Avatar
Digitalferret
my mind. when i read "man split" .. sorry, i'll see myself out 🤪 Edit: possibly NSFW - BORДT (edited)
Thank you for the <spoiler> tags!
👍🏻 2
Avatar
Avatar
OllieD
Thank you for the <spoiler> tags!
Digitalferret 8/18/2022 3:55 PM
wasn't sure if it was NSFW - can add if needed (edited)
😂 2
Andrew Rathbun pinned a message to this channel. 8/18/2022 4:46 PM
Avatar
Avatar
ScottKjr3347
Just for full clarity, today I’ve been asked the same questions almost verbatim by a few different people, so in fairness I won’t be answering questions about CMM via private messages. If you have a question please feel free to post it to the #mobile-forensic-decoding channel and I’ll do my best to answer. (edited)
Andrew Rathbun 8/18/2022 4:47 PM
Thanks for helping out as always 👍
Avatar
A friend of mine is looking for a mobile forensics analyst(image acquisition and analysis). The role is in one of big IT companies. The office is located in Virginia. If you are interested or know someone, please let me know.
Avatar
MD5/VFC_Aaron D 8/19/2022 1:09 AM
So I have a file system location I've not seen before and I was wonder if anyone is able to confirm what it is related to/used for? com.sec.android.app.sbrowser\files\images\share-images I know its related to the Samsung Native Browser but not sure what the share-images folder is for? I'm currently assuming it when a user has sent an image from the browser and the handset has cached it? The location is not accessible on the handset
Avatar
Avatar
dfsub
A friend of mine is looking for a mobile forensics analyst(image acquisition and analysis). The role is in one of big IT companies. The office is located in Virginia. If you are interested or know someone, please let me know.
Digitalferret 8/19/2022 1:23 AM
maybe echo in the mobile ner specialist and/or #training-education-employment subs
Avatar
Avatar
MD5/VFC_Aaron D
So I have a file system location I've not seen before and I was wonder if anyone is able to confirm what it is related to/used for? com.sec.android.app.sbrowser\files\images\share-images I know its related to the Samsung Native Browser but not sure what the share-images folder is for? I'm currently assuming it when a user has sent an image from the browser and the handset has cached it? The location is not accessible on the handset
Digitalferret 8/19/2022 1:24 AM
similarly, maybe worth hitting the Mobile subs too? #mobile<xxxx>
Avatar
Andrew Rathbun 8/19/2022 1:54 AM
@Digitalferret read my mind on both of these. Thank you for saving me the effort 😎
Avatar
Avatar
Andrew Rathbun
@Digitalferret read my mind on both of these. Thank you for saving me the effort 😎
Digitalferret 8/19/2022 1:58 AM
all good, bud. Full Turing disclosure, i am not a bot, and i do actually have a life outside of the matrix this Discord server 🙂
😆 1
Avatar
Avatar
Digitalferret
all good, bud. Full Turing disclosure, i am not a bot, and i do actually have a life outside of the matrix this Discord server 🙂
Andrew Rathbun 8/19/2022 1:59 AM
I try to as well haha
Avatar
Hello! I don't know if this is the right place.
8:25 AM
(rsocks malicious reverse proxies)
8:25 AM
It has been unclassified but since I am Canadian, I can't access it on the justice.gov system
8:25 AM
Let me know if this is the right place and someone can help
Avatar
Avatar
SynneR
Hello! I don't know if this is the right place.
Search Warrant affidavits are usually not made public. Just because it’s unclassified does not mean it wasn’t sealed by a court. “Sealed” prevents disclosure. Your best chance at finding it (if it’s not sealed) is using a US court records account like Pacer.
Avatar
Thanks!
9:26 AM
it is on pacer.
👍 2
9:27 AM
But I cant access it from Canada.
Avatar
Avatar
SynneR
But I cant access it from Canada.
Andrew Rathbun 8/19/2022 9:51 AM
Is that based on IP? If so, VPN might work?
Avatar
Avatar
Andrew Rathbun
Is that based on IP? If so, VPN might work?
It is based on the credit card location 😦
Avatar
Avatar
SynneR
It is based on the credit card location 😦
Can you buy a U.S. based preloaded credit card and use that?
👆 1
Avatar
Avatar
Cole
If I am writing a partial filepath, whats the best way to denote its a partial path? I wrote .\File\Path\Here\file.ext. Is that a good way to do it?
I do a similar thing, but use an ellipsis: ... \File\Path\Here\file.ext
Avatar
Avatar
SynneR
It is based on the credit card location 😦
You can send them a money order or cheque, you can get a US money order at any Canadian bank xD
8:18 PM
Also Visa usually is international, maybe send them an email to see if they accept it.
Avatar
kladblokje_88 8/20/2022 3:04 AM
Anyone here knows if subsriber numbers from at&t phone numbers (last 4 digits of a phone number) are geographically bound?
3:05 AM
I am not from the US, but I am researching a phone number that is used by a developer of stealer malware
Avatar
Andrew Rathbun 8/20/2022 3:07 AM
I think the last 4 numbers are generally randomized and not tied to a geographical domain. At the very least, the area code is probably what you'd care about most. For instance, the area code of my phone number that was assigned to me like 20 years ago resolves back to where I grew up aka where I lived at the time I got the phone number.
Avatar
Any have a list of Splunk queries that you typically use in your investigations? For example, when looking for lateral movement, persistence, code execution .
Avatar
anyone has some good news articles / reports about dawn raid related fines received when the raided company wasnt technically able to comply with the demands of the dawn raid due to lack of enough IT support or remarkable cases where companies had internal investigations going on but failes to provide the right evidence due to a lack of in house forensic support / too late involvement of externals?
Avatar
Hey. is there any way at all to attempt recovery of VMWare files that got conti'ed?
Avatar
@malrker do you have more information? Was a wiper used?
Avatar
Avatar
Andrew Rathbun
I think the last 4 numbers are generally randomized and not tied to a geographical domain. At the very least, the area code is probably what you'd care about most. For instance, the area code of my phone number that was assigned to me like 20 years ago resolves back to where I grew up aka where I lived at the time I got the phone number.
kladblokje_88 8/22/2022 1:47 AM
I see, can I find somewhere when a phonenumber was handed out?
1:48 AM
Btw the combination of the first six numbers of the phone number is only found for three places in Oxford Mississippi, which are all in the west of the city, hence my question about geographical boundries
1:48 AM
AT&T, probably West Oxford, but dont know who is the owner of subscription 2379 @ATTPolicyMS
Avatar
Avatar
kladblokje_88
Btw the combination of the first six numbers of the phone number is only found for three places in Oxford Mississippi, which are all in the west of the city, hence my question about geographical boundries
Deleted User 8/22/2022 2:03 AM
Their IP address is Googles recursive name server??? Run the number through PhoneInfoga but at a guess I would say this is a VOIP number. That’s usually the MO.
😂 1
Avatar
Avatar
Deleted User
Their IP address is Googles recursive name server??? Run the number through PhoneInfoga but at a guess I would say this is a VOIP number. That’s usually the MO.
kladblokje_88 8/22/2022 3:07 AM
Its landline
👍 1
3:07 AM
That google part is funny indeed
3:07 AM
Could be dummy data, could be opsec failure. Idk for sure
Avatar
@Magnet Forensics is there a way to DELETE the keywords I have used in a case when creating a new portable case? Once I export it, the keywords come with the case and I can't have it like that.
Avatar
Avatar
trillian
@Magnet Forensics is there a way to DELETE the keywords I have used in a case when creating a new portable case? Once I export it, the keywords come with the case and I can't have it like that.
chriscone_ar 8/22/2022 5:14 AM
Unfortunately, not in portable case. Once you've added keywords they are part of the case database.
Avatar
Avatar
chriscone_ar
Unfortunately, not in portable case. Once you've added keywords they are part of the case database.
Thank you for the quick answer!
Avatar
Avatar
trillian
Thank you for the quick answer!
chriscone_ar 8/22/2022 5:32 AM
Happy to help!
Avatar
Avatar
kladblokje_88
Btw the combination of the first six numbers of the phone number is only found for three places in Oxford Mississippi, which are all in the west of the city, hence my question about geographical boundries
You were born after cellphones became the norm I take it? But yes, the area code is state specific. The next three digits, the exchange code, are smaller locations in the area code. Depending on the the size and amount of users, a city may have one or more exchange codes. With moving away from land lines to cellphones, you can carry the number with you anywhere. And the carrier can pick from a pool of numbers that are not in your city. With that said. If the person got a cellphone, has never moved, and the telephone company has not added any area or exchange codes, you might be close to their location.
👍 4
Avatar
Avatar
Beercow
You were born after cellphones became the norm I take it? But yes, the area code is state specific. The next three digits, the exchange code, are smaller locations in the area code. Depending on the the size and amount of users, a city may have one or more exchange codes. With moving away from land lines to cellphones, you can carry the number with you anywhere. And the carrier can pick from a pool of numbers that are not in your city. With that said. If the person got a cellphone, has never moved, and the telephone company has not added any area or exchange codes, you might be close to their location.
kladblokje_88 8/22/2022 7:31 AM
I was born in 2001, had a phone at home for pretty much my entire life. Got a mobile phone when I was 12, which was a Samsung E1272. First smartphone was an HTC Desire C when I went to high school at 13. I am sorry I am not old xD
7:31 AM
I was aware of most of it indeed
7:32 AM
Had already plundered the numbering plan
Avatar
Avatar
kladblokje_88
I was born in 2001, had a phone at home for pretty much my entire life. Got a mobile phone when I was 12, which was a Samsung E1272. First smartphone was an HTC Desire C when I went to high school at 13. I am sorry I am not old xD
You calling me old? 🤣 All good, just figured you were more familiar with cellphones by the question.
Avatar
Avatar
Beercow
You calling me old? 🤣 All good, just figured you were more familiar with cellphones by the question.
kladblokje_88 8/22/2022 7:42 AM
are you old? makes me less wrong for calling it out xDDDDD
Avatar
Avatar
kladblokje_88
are you old? makes me less wrong for calling it out xDDDDD
If 43 is old. 🤷‍♂️
Avatar
kladblokje_88 8/22/2022 7:43 AM
Nah ur not stone age old, you are twice my age sure. But you keep up with the young folks
Avatar
Little off topic for DFIR. Anyone have a party line growing up?
Avatar
Anyone from @Magnet Forensics available? Not a technical question but contact need in a hurry.
Avatar
Avatar
Ghosted
Anyone from @Magnet Forensics available? Not a technical question but contact need in a hurry.
chriscone_ar 8/22/2022 12:05 PM
How can I help?
Avatar
Avatar
Ghosted
Anyone from @Magnet Forensics available? Not a technical question but contact need in a hurry.
Also available if you need help
Avatar
Avatar
Beercow
Little off topic for DFIR. Anyone have a party line growing up?
Lol you never called those did ya?
Avatar
Avatar
Beercow
Little off topic for DFIR. Anyone have a party line growing up?
Digitalferret 8/22/2022 2:26 PM
party as in BT / UK. 2 callers sharing 1 bit of copper? (lol, not PartyParteh)
2:26 PM
yeh, i am that ancient
Avatar
Avatar
ryd3v
Lol you never called those did ya?
I don’t think we’re talking about the same thing. 🤣
😆 1
Avatar
Digitalferret 8/22/2022 2:28 PM
ah right. over here there ended up with more callers than the phone lines could cope with, so the get-by was pairing your line with the neighbour. if they were on and you picked up, you had full access to their convo, inc saying "wups, sorry" before hanging up
2:29 PM
talikng like 70s/80s
Avatar
Avatar
Beercow
I don’t think we’re talking about the same thing. 🤣
Digitalferret 8/22/2022 2:29 PM
what did you mean by Party?
Avatar
Avatar
Digitalferret
what did you mean by Party?
Phone would ring at multiple houses because they were all on the same line.
Avatar
Digitalferret 8/22/2022 2:32 PM
yeh, thats the thing
2:32 PM
but i think with us, your number only made your own ring, but there was usually a brief tinkle to be heard. (i think) on the neighbours
Avatar
I was thinking more like
2:34 PM
🤣
2:35 PM
Call now, only $22.99 per min
2:35 PM
Lol
Avatar
On android, Anyone know if the primary key for messaging gets reset when you restore a new phone from an old one. In other words can I tell if a message has been deleted from the old phone once the data is restored to a new phone?
Avatar
Avatar
OregonDFIR
On android, Anyone know if the primary key for messaging gets reset when you restore a new phone from an old one. In other words can I tell if a message has been deleted from the old phone once the data is restored to a new phone?
Andrew Rathbun 8/22/2022 5:34 PM
#mobile-forensic-decoding
Avatar
brbr (berber) 8/22/2022 8:01 PM
mentioned the DFIR book on my Twitch stream tonight... Bought a copy and am looking forward to going through it for the malware analysis portions.
👍 3
Avatar
Excuse me for doubling up on this post but I figured it would be relevant here as well: Anyone recently ran into very convincing iPhone 13 Pro Max fakes? Just had one cross my desk with no apparent way to extract - Thinks its a removable USB drive in device manager, and both UFED Console and XRY can't detect it. Any insights?
Avatar
Hello, i'm trying to import a raw (dd) image into Axiom Process. Unfortunately the image is on a read only storage and has no file extension. Axiom throws a "unsupported format" error, I think because the missing file extension as identifier. Is there a way to say "open this file as raw image"? I would like to avoid copying the images from the read only storage to rename them.
Avatar
@Magnet Forensics anyone available to grant a trial license on short notice? 🙂
Avatar
Avatar
Fierry
@Magnet Forensics anyone available to grant a trial license on short notice? 🙂
chriscone_ar 8/23/2022 7:27 AM
I should be able to help with that 🙂 Can I DM you for some details on what you're looking for?
Avatar
Avatar
Caveira
Hello, i'm trying to import a raw (dd) image into Axiom Process. Unfortunately the image is on a read only storage and has no file extension. Axiom throws a "unsupported format" error, I think because the missing file extension as identifier. Is there a way to say "open this file as raw image"? I would like to avoid copying the images from the read only storage to rename them.
chriscone_ar 8/23/2022 7:45 AM
Just saw this - in Axiom Process have you changed the "Select the image" drop-down menu from "All Support Images" to "All Files"? And if so, that's when you're seeing the unsupported format error?
Avatar
I set the filter to all files to see the image file in the file browser. But when I select the image to add this to the case it says unsupported format (my guess is that the format is chosen by the extension) (edited)
Avatar
Avatar
Caveira
I set the filter to all files to see the image file in the file browser. But when I select the image to add this to the case it says unsupported format (my guess is that the format is chosen by the extension) (edited)
chriscone_ar 8/23/2022 8:22 AM
Let me DM you and we'll see if we can't figure out what the problem is.
Avatar
On a Win10 machine is there a good way to audit when a Network Interface's static IP was set or changed?
12:05 PM
I would figure this info would be in the event log somewhere but having the darndest time figuring it out
Avatar
Avatar
FX_Tymills
On a Win10 machine is there a good way to audit when a Network Interface's static IP was set or changed?
Andrew Rathbun 8/23/2022 12:30 PM
https://github.com/EricZimmerman/RECmd/blob/e3f5b24485eebc3c623f696019e9f5a676b6c5db/BatchExamples/Kroll_Batch.reb#L1042 try here. Check the last write timestamp. Also, if its domain joined, check a domain controller that has the Active Directory Domain Services (ADDS) role assigned and view the DnsInfo table for historical IP resolution
Command line access to the Registry. Contribute to EricZimmerman/RECmd development by creating an account on GitHub.
👍 1
Avatar
it is not domain joined but thanks for the info I will check that out (edited)
Avatar
Do 12th gen intel CPUs play nicely with forensic software? Possibly moving away from Xeons and going high end desktop.
Avatar
They play best with Windows 11 from what I know due to the custom scheduler for those CPUs...
Avatar
In other words, if the forensics software is compatible with Windows 11, it should hopefully work - but it's not a guarantee. The main thing I've heard of having problems is around virtualization use cases, though, with both HyperV and VMWare. There are some reports that users have to turn off the efficiency cores for HyperV to work, or for VMWare to resort to manually editing configuration files to be able to utilize some cores. I've not tested. Another thing to keep in mind is that AMD's current 5000 series, and their upcoming 7000 series, still does not utilize the new BIG.little architecture, which is where most of the problems seem to come up around compatibility (i.e. AMD should in theory work 'better' for virtualization scenarios). However, rumor is that the 7000 series has been delayed due to some firmware issues around PCIe5 support, but should still launch by the end of September. Also, keep in mind Intel's 13th gen processors are supposed to release next month as well, though that will be more of an iterative release from the drastic changes in their 12th gen architecture. (edited)
Avatar
This will be AMD's last big release before they, too, switch to BIG.little, according to their roadmap.
Avatar
Good morning, im looking for methods and tools that can be used to examine an Amazon echo show, now tv stick and ring cameras (door bell and stick up cam) chip off could be an option on the echo show but looking for none destructive methods first. We aren’t able to access the cloud accounts to pull down the data. Can anyone help?
Avatar
I made a cable (USB<->SERIAL) and connected it to the TKSTAR TK-905 GPS Tracker. After inserting the SIM card (turning on the device) I get only Bootloader information through Putty. Maybe someone has more experience and knows if it is possible to get additional information, IMEI, device configuration settings, etc. Video from my test https://youtu.be/_HhW97Owf5U
Avatar
Doofenshmirtz 8/24/2022 7:17 AM
can we image a bitlocker enc HDD?
Avatar
Avatar
Sea9
In other words, if the forensics software is compatible with Windows 11, it should hopefully work - but it's not a guarantee. The main thing I've heard of having problems is around virtualization use cases, though, with both HyperV and VMWare. There are some reports that users have to turn off the efficiency cores for HyperV to work, or for VMWare to resort to manually editing configuration files to be able to utilize some cores. I've not tested. Another thing to keep in mind is that AMD's current 5000 series, and their upcoming 7000 series, still does not utilize the new BIG.little architecture, which is where most of the problems seem to come up around compatibility (i.e. AMD should in theory work 'better' for virtualization scenarios). However, rumor is that the 7000 series has been delayed due to some firmware issues around PCIe5 support, but should still launch by the end of September. Also, keep in mind Intel's 13th gen processors are supposed to release next month as well, though that will be more of an iterative release from the drastic changes in their 12th gen architecture. (edited)
Thanks! Due to contracts we're forced to buy HP, and they only sell Intel CPUs right now. Think its worth waiting a month or so and see if we can get a 13th gen? Also, we have to run Windows 10, so what kind of problems could we expect with that?
Avatar
Andrew Rathbun 8/24/2022 8:34 AM
@chreswenn #dvr-multimedia-surveillance (edited)
Avatar
my bad, sry
8:35 AM
done
Avatar
Avatar
Doofenshmirtz
can we image a bitlocker enc HDD?
You can image it, but without the key it will be gibberish. If the system is turned on, you can do a logical image, or export the recovery key, then get a physical image.
Avatar
Avatar
Cole
Thanks! Due to contracts we're forced to buy HP, and they only sell Intel CPUs right now. Think its worth waiting a month or so and see if we can get a 13th gen? Also, we have to run Windows 10, so what kind of problems could we expect with that?
If there is a representative at HP that your department or organization works with, you might be able to reach out to them to see if they know when workstations or desktop product lines with 13th generation Intel CPUs will be available. It's just a pure guess on my part, but I would not expect them to be available before November, even if they release some product lines with the new parts quickly. Not to mention organizations tend to evaluate and negotiate to approve new systems, which can be a very, very long process (over a year at one company that I worked for)... so if you have a need for a new system in a time-frame like a month or two, it almost definitely does not make sense to wait. Intel's 12th gen processors will 'work' on Windows 10, but users won't be able to recognize the full benefit of the new architecture providing separate performance (P) and efficiency (E) cores. Windows 10 unfortunately does not fully support Intel's 'Thread Director', which was introduced to help handle the additional scheduling considerations that come with having separate P and E cores. Testers have verified that Windows 10 does sometimes allocate intensive or high-priority tasks to E cores, which can sporadically impact performance when compared to Windows 11. This becomes more noticeable if you are running multiple applications at a time. A Windows 10 system with Intel 12th gen processors may expect to see approximately a 15-20% performance hit in these cases (if encountered) when compared with Windows 11. There is somewhat of a workaround that users can use for heavily-used processor-intensive applications, since you can still pin those processes to P cores. That helps to prevent those applications from slowing down, but it's obviously not a magic bullet, as any new threads do not always inherit the affinity set by the parent (though child processes should), and it's simply unrealistic for users to apply this to every intensive process all the time.
Avatar
Avatar
Sea9
If there is a representative at HP that your department or organization works with, you might be able to reach out to them to see if they know when workstations or desktop product lines with 13th generation Intel CPUs will be available. It's just a pure guess on my part, but I would not expect them to be available before November, even if they release some product lines with the new parts quickly. Not to mention organizations tend to evaluate and negotiate to approve new systems, which can be a very, very long process (over a year at one company that I worked for)... so if you have a need for a new system in a time-frame like a month or two, it almost definitely does not make sense to wait. Intel's 12th gen processors will 'work' on Windows 10, but users won't be able to recognize the full benefit of the new architecture providing separate performance (P) and efficiency (E) cores. Windows 10 unfortunately does not fully support Intel's 'Thread Director', which was introduced to help handle the additional scheduling considerations that come with having separate P and E cores. Testers have verified that Windows 10 does sometimes allocate intensive or high-priority tasks to E cores, which can sporadically impact performance when compared to Windows 11. This becomes more noticeable if you are running multiple applications at a time. A Windows 10 system with Intel 12th gen processors may expect to see approximately a 15-20% performance hit in these cases (if encountered) when compared with Windows 11. There is somewhat of a workaround that users can use for heavily-used processor-intensive applications, since you can still pin those processes to P cores. That helps to prevent those applications from slowing down, but it's obviously not a magic bullet, as any new threads do not always inherit the affinity set by the parent (though child processes should), and it's simply unrealistic for users to apply this to every intensive process all the time.
Awesome thank you! We're planning on purchasing one desktop for a forensic workstation to test the i9 CPUs in comparison to Xeons. Significantly cheaper and in my research most of the programs in forensics benefit from fewer, faster cores, than more, slower cores. It'll be a test workstation to run benchmarks on and see if it is good enough to upgrade more workstations down the road. I'm guessing the scheduler won't be a major issue for our workload (especially if each E core is faster than a single Xeon core), but I can see how it certainly could be a problem for other applications, eg. gaming.
Avatar
Hello all Which forensic products have inbuilt computer vision/object detection capabilities? Also, what keywords should I use to find papers around this topic? I’ve been trying since past few months but haven’t been able to find many papers. Please advise
Avatar
Avatar
custard
Hello all Which forensic products have inbuilt computer vision/object detection capabilities? Also, what keywords should I use to find papers around this topic? I’ve been trying since past few months but haven’t been able to find many papers. Please advise
Deleted User 8/24/2022 10:29 PM
As a starter since group members will have even more: Tsurugi Linux distro has several OCR tools as well as facial recognition. https://tsurugi-linux.org/
Welcome to TSURUGI Linux world a DFIR open source distribution to perform your digital forensics analysis and for educational pourposes
💯 1
Avatar
Avatar
Deleted User
As a starter since group members will have even more: Tsurugi Linux distro has several OCR tools as well as facial recognition. https://tsurugi-linux.org/
I see, will look into it 🙂
Avatar
Avatar
Doofenshmirtz
can we image a bitlocker enc HDD?
Just be careful if its a machine using TMP there is the potential to trip BitLocker recovery Mode. Its up to you but it may be wiser to power on the device and get the recovery key first. You will need logon credentials though.
Avatar
Avatar
Cole
You can image it, but without the key it will be gibberish. If the system is turned on, you can do a logical image, or export the recovery key, then get a physical image.
Also, if you get the physical@image first it will acquire all the data, preserving it. You can then use the recovery key to decrypt the image in tools such as Pass-ware and axiom
👍 1
Avatar
Avatar
Ryan-G
Also, if you get the physical@image first it will acquire all the data, preserving it. You can then use the recovery key to decrypt the image in tools such as Pass-ware and axiom
Axiom will decrypt the image and put a decrypted file in the case folder, that can be then be opened in tools that don't support decryption like X-Ways.
Avatar
Avatar
Majeeko
Axiom will decrypt the image and put a decrypted file in the case folder, that can be then be opened in tools that don't support decryption like X-Ways.
That’s right, I’ve got one running at the moment.
Avatar
Avatar
custard
Hello all Which forensic products have inbuilt computer vision/object detection capabilities? Also, what keywords should I use to find papers around this topic? I’ve been trying since past few months but haven’t been able to find many papers. Please advise
A lot of categorisation software has this sort of thing built in as a feature. Have a look at semantics 21 and griffeye. Also, ADF pro has a classifier feature that runs after a scan.
💯 1
Avatar
Avatar
Ryan-G
A lot of categorisation software has this sort of thing built in as a feature. Have a look at semantics 21 and griffeye. Also, ADF pro has a classifier feature that runs after a scan.
Will look into them 🙂
Avatar
Anyone have a good contact RE swatting investigations? I saw some earlier (2019) posts about FBI being a good place to start but maybe in the last 3 years someone new has emerged as an expert
Avatar
Hello all, I was looking into setting up Magnet Review for my department to aid in getting evidence to detectives faster but I can't afford the setup cost. Does anyone have advice on a in house alternative for sharing of portable cases?
Avatar
@Magnet Forensics does Axiom support cli? I haven't found any info other than older versions of IEF having supported it. If so is there any documentation I can reference? I'm trying to automate some workflows.
Avatar
cScottVance 8/25/2022 6:12 PM
Base AXIOM does not have CLI, for CLI you need the Automate product.
Avatar
Has anyone recently been on instructor-led Cellebrite CPO and CPA course?
Avatar
Avatar
Pacman
Has anyone recently been on instructor-led Cellebrite CPO and CPA course?
We're doing some huge overhauls of our courses, including CASA
Avatar
Avatar
Pacman
Has anyone recently been on instructor-led Cellebrite CPO and CPA course?
Chance of training for you? Long overdue 👀
Avatar
Avatar
Matt
Chance of training for you? Long overdue 👀
hurhurhur had some questions about it - done mine about 5 years ago lol
Avatar
Avatar
Pacman
hurhurhur had some questions about it - done mine about 5 years ago lol
Time for a refresher 😉
Avatar
Does anyone know if WhatsApp messages are retained on WhatsApp desktop installations? It’s a Windows 7 PC, WhatsApp 0.3.4679 I have located some databases just waiting to in-jest them into an SQL viewer.
Avatar
ScottKjr3347 8/27/2022 11:46 PM
Anyone available to give me a DM about a rough cost for @Magnet Forensics Review. I have a message into my sales, but I got a late night notification I have some 💰to spend and working on a request doc that’s needed in the morning?
Avatar
Patrick.Beaver 8/28/2022 1:15 AM
Yep I’ve got ya
💯 1
Avatar
So how popular is Autopsy Digital Forensics oppose to paid stuff like Encase and XWays?
Avatar
Is anyone willing to share the core skill set a junior staff vs a senior staff in digital forensics should have ?
5:27 PM
I have a general list but looking to see if I can update or move around the skillset to the appropriate section
Avatar
Avatar
Odysseus
So how popular is Autopsy Digital Forensics oppose to paid stuff like Encase and XWays?
I think i'ts good backup and an analyst should be familiar with it 🙂
12:54 AM
It post processes Windows hosts quite well and is extensible to a degree
Avatar
Avatar
Jay528
Is anyone willing to share the core skill set a junior staff vs a senior staff in digital forensics should have ?
Can you share the list so I can elaborate? 🙂 (edited)
Avatar
Avatar
custard
Hello all Which forensic products have inbuilt computer vision/object detection capabilities? Also, what keywords should I use to find papers around this topic? I’ve been trying since past few months but haven’t been able to find many papers. Please advise
Semantics 21 (Tom) 8/29/2022 7:55 AM
The semantics21 LASERi-X product has a document detection for passports, credit card, forms. Along with facial, object, scene, OCR, QR, CSAM. You can also search for any similar object you feed into the search.
💯 2
Avatar
Avatar
Semantics 21 (Tom)
The semantics21 LASERi-X product has a document detection for passports, credit card, forms. Along with facial, object, scene, OCR, QR, CSAM. You can also search for any similar object you feed into the search.
Thanks! These features will be really helpful 🙂
9:33 AM
@Fierry - this is what I have so far
❤️ 1
Avatar
I'll send you a Pm as to not clog this channel 🙂
Avatar
Is there a macOS forensic channel?
Avatar
Avatar
Kadesu-か
Is there a macOS forensic channel?
Not specifically. You can post in #computer-forensics
Avatar
Is there a way to access an Android phone's contents without a password? A colleague's son died suddenly and his family would like to get information off of his Android phone (for memory purposes, not for any criminal investigation). Any suggestions appreciated.
Avatar
Avatar
seattleebm
Is there a way to access an Android phone's contents without a password? A colleague's son died suddenly and his family would like to get information off of his Android phone (for memory purposes, not for any criminal investigation). Any suggestions appreciated.
thatboy_leo 8/29/2022 12:45 PM
what model phone and tools do you have available? also what type of passcode? (edited)
Avatar
Avatar
seattleebm
Is there a way to access an Android phone's contents without a password? A colleague's son died suddenly and his family would like to get information off of his Android phone (for memory purposes, not for any criminal investigation). Any suggestions appreciated.
Deleted User 8/29/2022 1:10 PM
Usually depends on the device. Maybe mention state or location, there might be someone from the private sector that can assist you/the family.
Avatar
Avatar
Jay528
Click to see attachment 🖼️
Seems like the jr gotta know more than the senior xD
👍 1
😆 1
Avatar
Avatar
custard
Hello all Which forensic products have inbuilt computer vision/object detection capabilities? Also, what keywords should I use to find papers around this topic? I’ve been trying since past few months but haven’t been able to find many papers. Please advise
X-Ways Forensics, starting with 20.5, has an add-on module called Excire PhotoAI. https://www.x-ways.net/excire.html
💯 1
🤓 1
Avatar
Anyone able to help me with aws on how to create an ec2
Avatar
Avatar
John Ksi
Anyone able to help me with aws on how to create an ec2
Anything in particular? This guide should get you 90% of the way https://www.guru99.com/creating-amazon-ec2-instance.html
An EC2 instance is nothing but a virtual server in Amazon Web Services terminology. It stands for Elastic Compute Cloud. It is a web service where an AWS subscriber can request and provision a compute
Avatar
Avatar
derekeiri
X-Ways Forensics, starting with 20.5, has an add-on module called Excire PhotoAI. https://www.x-ways.net/excire.html
CaptBiscuits260 8/30/2022 3:43 AM
Hi - if you are on LinkedIn please see my post on Excire PhotoAI or please see video on X-Ways YouTube channel. https://www.linkedin.com/posts/jim-metcalfe_xways-xwaysforensics-forensics-activity-6956255680718594048-tPBN?utm_source=share&utm_medium=member_desktop
Please see my article on Identifying Objects in Pictures with X-Ways Forensics and Excire PhotoAI. #xways #xwaysforensics #forensics #ExcirePhotoAI #photography...
👍 1
Avatar
UFED PA found gps coordinates in a dump of an iPhone 12 pro. The source file is com.google.Maps.plist and the description in PA is "Last Viewed Place". I need to verify if the device was actually at this location but I don't have a lot to go on. Has anybody done research on this subject? We don't have cellular history of this device so that's a dead end.
Avatar
Avatar
Sockmoth
UFED PA found gps coordinates in a dump of an iPhone 12 pro. The source file is com.google.Maps.plist and the description in PA is "Last Viewed Place". I need to verify if the device was actually at this location but I don't have a lot to go on. Has anybody done research on this subject? We don't have cellular history of this device so that's a dead end.
thatboy_leo 8/30/2022 6:22 AM
Check #mobile-forensic-decoding
Avatar
Has anyone attempted an extraction while lockdown mode is enabled on iOS 16 beta? I have tried it using cellebrite and BFU it says that the USB accessory is disabled. After unlocking though, I'm able to proceed as normal. Can anyone else running iOS 16 beta confirm this? (edited)
Avatar
Have you also confirmed this on beta 8? It might be the final beta which. might be used as the RC
Avatar
Avatar
Sockmoth
UFED PA found gps coordinates in a dump of an iPhone 12 pro. The source file is com.google.Maps.plist and the description in PA is "Last Viewed Place". I need to verify if the device was actually at this location but I don't have a lot to go on. Has anybody done research on this subject? We don't have cellular history of this device so that's a dead end.
Aired: November 30, 2021 Duration: 1 hour Download our Location Cheat Sheet here Let’s be honest and agree that locations on mobile devices can be a nightmare. How do we know what we can trust? What are the ways to validate the artifact and most importantly, what if a location on the device is the only … Continue reading "I Beg to DFIR – Was it ...
Avatar
Avatar
thatboy_leo
what model phone and tools do you have available? also what type of passcode? (edited)
I got information on the make and model. It's actually an LG V35 ThinQ. I believe the phone is in Illinois.
Avatar
Avatar
seattleebm
I got information on the make and model. It's actually an LG V35 ThinQ. I believe the phone is in Illinois.
thatboy_leo 8/30/2022 2:58 PM
Depending on the Android OS and SPL, LockPick with UFED could work and allow you to get a FFS extraction with Qualcomm Live.
Avatar
Curious if anyone has tried this out. Thoughts/feedback. https://cybercentrecanada.github.io/assemblyline4_docs/
Avatar
kladblokje_88 8/30/2022 4:21 PM
I made a little thing with midjourney
4:21 PM
Avatar
I have a question about a procedure. We have found a Word file which can no longer be opened. The file was read into X-Ways and Axiom and still no content could be extracted. We tried to manually zip the file once to get to the Document.XML to view the content. The file can be zipped but not unzipped. Does anyone here have a tip on how else we can get to the content?
Avatar
Hey fellow cyber sec experts I have a question can one be able to track a stolen phone and how can it be done cause I am from being robbed and they took my phone it has all my business contacts please I need you help
Avatar
Avatar
root
Hey fellow cyber sec experts I have a question can one be able to track a stolen phone and how can it be done cause I am from being robbed and they took my phone it has all my business contacts please I need you help
Andrew Rathbun 8/31/2022 12:26 AM
Were none of those contacts stored in the cloud like Google Contacts or whatever Apple has (not an 🍎 person myself)?
Avatar
Avatar
Andrew Rathbun
Were none of those contacts stored in the cloud like Google Contacts or whatever Apple has (not an 🍎 person myself)?
Nope not at all and to make the matter worse I have three clients today that I had to contact so now I can't even complete my orders am stuck
Avatar
JeezyCreezy 8/31/2022 4:36 AM
Anyone at @Magnet Forensics able to provide me with a trial licence for the MCFE assessment?
Avatar
chriscone_ar 8/31/2022 4:37 AM
I can do that, DM me an email address and I’ll be happy to forward you one.
Avatar
Avatar
root
Hey fellow cyber sec experts I have a question can one be able to track a stolen phone and how can it be done cause I am from being robbed and they took my phone it has all my business contacts please I need you help
iPhones have the "find my" feature if you enable it, otherwise you will probably need the good graces of a law enforcement agency or the cell provider in order to track it. If that doesn't help and you want to be petty you can have the IMEI blacklisted (if you know it) so it cannot connect to towers, rendering the phone a bit useless.
this 1
Avatar
Avatar
root
Hey fellow cyber sec experts I have a question can one be able to track a stolen phone and how can it be done cause I am from being robbed and they took my phone it has all my business contacts please I need you help
kladblokje_88 8/31/2022 5:46 AM
If its an android phone, google has a platform where you can log in to the google account of your phone and if connected to the internet you can find its approximate location: https://www.google.com/android/find?u=0 (edited)
Avatar
Avatar
Fierry
Have you also confirmed this on beta 8? It might be the final beta which. might be used as the RC
it was beta 7.
Avatar
Avatar
Beercow
Curious if anyone has tried this out. Thoughts/feedback. https://cybercentrecanada.github.io/assemblyline4_docs/
It’s a good start but I prefer strekla or laikaboss over it, Strekla’s built into security onion now and LB has had some updates
Avatar
Avatar
Beercow
Curious if anyone has tried this out. Thoughts/feedback. https://cybercentrecanada.github.io/assemblyline4_docs/
I have not used or seen it in action. But I can speak for the people behind it. Our national CERT team and a very good group of people.
Avatar
quick question about log file parsing: what tools are you usually using to perform log file parsing? especially if it contains data (e. g. urls) that have a high chance to just break the loading process due to having the same special characters as the delimiters
Avatar
Avatar
.yuzumi.
quick question about log file parsing: what tools are you usually using to perform log file parsing? especially if it contains data (e. g. urls) that have a high chance to just break the loading process due to having the same special characters as the delimiters
Andrew Rathbun 8/31/2022 10:16 AM
https://www.logviewplus.com/ Give this a shot. Might work out well for you
Professional log viewer that can parse files in a variety of different formats.
Avatar
Doofenshmirtz 8/31/2022 10:22 PM
open source tools for MAC os parsing? like we have eric zimmerman tools, alternative equivalent to MAC
Avatar
Avatar
Doofenshmirtz
open source tools for MAC os parsing? like we have eric zimmerman tools, alternative equivalent to MAC
randomaccess 8/31/2022 11:39 PM
Yogeshs macapt is probably the closest all in one
👍 1
Avatar
+1 for mac_apt
1:12 AM
Macs are notoriously painful for examination. I know that Axiom does lots of automatic parsing but it will cost you 🙂
😬 1
Avatar
Hi all, Would someone have some recommendations for Linux Forensics courses (preferably with certifications but course quality is more important). (I talk about Forensics for Linux workstations, not forensics with a Linux as analysis computer)
Avatar
Avatar
Vergas
Hi all, Would someone have some recommendations for Linux Forensics courses (preferably with certifications but course quality is more important). (I talk about Forensics for Linux workstations, not forensics with a Linux as analysis computer)
JeezyCreezy 9/1/2022 1:22 AM
Hi Vergas, I found the Certified Linux Forensic Practitioner course by 7Safe to be quite informative (https://www.7safe.com/our-courses/certified-digital-forensics-courses/details/clfp-linux-forensic-investigation) and would recommend this
❤️ 1
linux 1
Avatar
Anyone got any experience with successfully processing an Xbox Series X SSD for artifacts/videos/pictures etc? (edited)
2:50 AM
@Law Enforcement [UK] anyone got experience of the above? Thanks in advance!
Avatar
Avatar
3X3
@Law Enforcement [UK] anyone got experience of the above? Thanks in advance!
My experience with the Xbox One X found that the best tactic is for a live analysis using a video capture card. As far as I am aware there are no workarounds for ‘dead’ forensics on the new Xbox hardware
this 4
Avatar
Avatar
cdbandit
My experience with the Xbox One X found that the best tactic is for a live analysis using a video capture card. As far as I am aware there are no workarounds for ‘dead’ forensics on the new Xbox hardware
Thanks, that's our usual examination tact, just wondered if there was some magic new method, haha. Thanks bandit!
Avatar
Avatar
3X3
Thanks, that's our usual examination tact, just wondered if there was some magic new method, haha. Thanks bandit!
No problem
Avatar
Afternoon all, is anyone able to share any solutions for digital note taking that has been implemented for when you are out on scene etc.
Avatar
Avatar
Artea
Afternoon all, is anyone able to share any solutions for digital note taking that has been implemented for when you are out on scene etc.
Andrew Rathbun 9/1/2022 4:34 AM
OneNote is great for this IMO
Avatar
Shoutout to Aurora if you want to keep it local (for instance , due to sensitive data) 🙂
Avatar
Saucisson Slicer 9/1/2022 5:59 AM
Hi Guys ! I guess this is a question that you've already answered, but I wanted to ask : what do you think of XWay forensics ? Compared to ftk Imager for exemple ? XWay seems pretty hard to get used to it
Avatar
Avatar
Saucisson Slicer
Hi Guys ! I guess this is a question that you've already answered, but I wanted to ask : what do you think of XWay forensics ? Compared to ftk Imager for exemple ? XWay seems pretty hard to get used to it
Andrew Rathbun 9/1/2022 6:00 AM
FTK Imager and X-Ways aren't comparable in functionality. If you're talking FTK vs X-Ways, that's more reasonable. FTK Imager is just a free imaging program and X-Ways is a forensic suite. X-Ways is great but it has a high learning curve, no doubt.
Avatar
randomaccess 9/1/2022 6:01 AM
FTK Imagers free, that's one of the things going for it
6:02 AM
Its ok as an imaging tool
6:02 AM
It's ok as a viewer
6:02 AM
And I'd be sad if they stopped supporting it
6:02 AM
but....you get a lot more for your money out of xways....as long as you have the money
Avatar
Avatar
Andrew Rathbun
FTK Imager and X-Ways aren't comparable in functionality. If you're talking FTK vs X-Ways, that's more reasonable. FTK Imager is just a free imaging program and X-Ways is a forensic suite. X-Ways is great but it has a high learning curve, no doubt.
Saucisson Slicer 9/1/2022 6:04 AM
Yes sry I meant FTK, I typed faster than I thought
Avatar
Avatar
randomaccess
but....you get a lot more for your money out of xways....as long as you have the money
Saucisson Slicer 9/1/2022 6:05 AM
Well money isn't really an issue right now, since this is a company investment. Plus XWay isn't that expensive compared to other forensics solutions on the market haha
Avatar
randomaccess 9/1/2022 6:08 AM
i havent used ftk so it's hard to comment on it but i think it depends on the use case i use xways on most investigations though - as with any tool need to be aware of what it does well, and what it doesnt
Avatar
Avatar
Saucisson Slicer
Well money isn't really an issue right now, since this is a company investment. Plus XWay isn't that expensive compared to other forensics solutions on the market haha
How many people are going to be using the tool, are they experienced forensicators or just starting out? 🙂
Avatar
Avatar
Artea
Afternoon all, is anyone able to share any solutions for digital note taking that has been implemented for when you are out on scene etc.
Trusted Camera and pen and paper 😅 is how I do it atm. ISO wise I think there's a Memorandum (edited)
Avatar
Avatar
randomaccess
i havent used ftk so it's hard to comment on it but i think it depends on the use case i use xways on most investigations though - as with any tool need to be aware of what it does well, and what it doesnt
Saucisson Slicer 9/1/2022 6:17 AM
Oh OK, I was told the search functions are particularly good within this tool. Since you use it, do you agree ?
Avatar
Avatar
Fierry
How many people are going to be using the tool, are they experienced forensicators or just starting out? 🙂
Saucisson Slicer 9/1/2022 6:20 AM
Hum a low amount of people. Like 2-3. They are more used to perform pure incident response. They already ran some forensics investigations, but not too deep. Still learning a lot every time
Avatar
FTK has index search, it takes a whie to build the index during ingestion but afterwards searches are nearly instant
6:32 AM
Then they might get used to X-Ways 🙂 If they were really junior I would recommend other tooling
Avatar
Avatar
Saucisson Slicer
Oh OK, I was told the search functions are particularly good within this tool. Since you use it, do you agree ?
randomaccess 9/1/2022 6:38 AM
Yeah xways search is great. I don't use the indexing feature that often though.
Avatar
@Project VIC Is anyone available for a simple question who can DM me? (edited)
Avatar
Nanotech Norseman 9/1/2022 6:51 AM
Hey there! I sent you a message 😄
👍 1
Avatar
Avatar
Fierry
Then they might get used to X-Ways 🙂 If they were really junior I would recommend other tooling
Saucisson Slicer 9/1/2022 7:12 AM
OK I see. Thank you 😊
Avatar
Avatar
randomaccess
Yeah xways search is great. I don't use the indexing feature that often though.
Saucisson Slicer 9/1/2022 7:12 AM
Oh ok, thank you !
Avatar
Avatar
Saucisson Slicer
Hi Guys ! I guess this is a question that you've already answered, but I wanted to ask : what do you think of XWay forensics ? Compared to ftk Imager for exemple ? XWay seems pretty hard to get used to it
My opinion: xways - good for single experienced examiner who needs a fast tool with great drive level/hex level analysis. If you stick with xways you can learn to do just about anything with an image, but it is not a quick learn. (also great for live forensic as it is under a gig in size) FTK Lab - good for someone who needs to provide a platform for investigators to review material and collaborate. Bonus Axiom - great if your case revolves around internet artifacts and it also parses phone extractions. Certainly has the best interface and allows for portable cases which you can give to investigators.
Avatar
Avatar
Carcino
My opinion: xways - good for single experienced examiner who needs a fast tool with great drive level/hex level analysis. If you stick with xways you can learn to do just about anything with an image, but it is not a quick learn. (also great for live forensic as it is under a gig in size) FTK Lab - good for someone who needs to provide a platform for investigators to review material and collaborate. Bonus Axiom - great if your case revolves around internet artifacts and it also parses phone extractions. Certainly has the best interface and allows for portable cases which you can give to investigators.
Saucisson Slicer 9/1/2022 9:06 AM
Oh great thank you for your opinion. Yes, I'm almost sure we are going to take Axiom (or similar). The idea is to take another tool for checking results, being able to investigate when we have a non-recognized file system or a corrupt image, and also to perform more in-depth investigation with things such as data carving etc.
Avatar
Avatar
Saucisson Slicer
Oh great thank you for your opinion. Yes, I'm almost sure we are going to take Axiom (or similar). The idea is to take another tool for checking results, being able to investigate when we have a non-recognized file system or a corrupt image, and also to perform more in-depth investigation with things such as data carving etc.
Hearing that I saw xways all the way
Avatar
Saucisson Slicer 9/1/2022 9:21 AM
OK thanks for your help ! 😊
Avatar
Hello all
9:27 AM
I am conducting some forensics on a laptop and was interested in a WiFi network the laptop connected to. I detected it by looking at the "netsh wlan show all" command, which listed it as a WiFi profile. Now I wanted to prove the time and date when someone connected to this network, and went to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\NetworkList\Profiles location in the registry, however I could not find proof of the network on there. I also checked the managed/unmanaged section, which listed many networks but not the suspicious one I wanted. Main question: How is "netsh wlan show profiles" getting information about this previously connected network if its not stored in the registry? The event logs are also no help as they were stored just for 1 day
Avatar
Avatar
Doofenshmirtz
open source tools for MAC os parsing? like we have eric zimmerman tools, alternative equivalent to MAC
Apollo is another good open source option
Avatar
Avatar
stan
I am conducting some forensics on a laptop and was interested in a WiFi network the laptop connected to. I detected it by looking at the "netsh wlan show all" command, which listed it as a WiFi profile. Now I wanted to prove the time and date when someone connected to this network, and went to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\NetworkList\Profiles location in the registry, however I could not find proof of the network on there. I also checked the managed/unmanaged section, which listed many networks but not the suspicious one I wanted. Main question: How is "netsh wlan show profiles" getting information about this previously connected network if its not stored in the registry? The event logs are also no help as they were stored just for 1 day
You might try posing in #computer-forensics as well.
Avatar
Avatar
stan
I am conducting some forensics on a laptop and was interested in a WiFi network the laptop connected to. I detected it by looking at the "netsh wlan show all" command, which listed it as a WiFi profile. Now I wanted to prove the time and date when someone connected to this network, and went to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\NetworkList\Profiles location in the registry, however I could not find proof of the network on there. I also checked the managed/unmanaged section, which listed many networks but not the suspicious one I wanted. Main question: How is "netsh wlan show profiles" getting information about this previously connected network if its not stored in the registry? The event logs are also no help as they were stored just for 1 day
Andrew Rathbun 9/1/2022 9:47 AM
I saw Josh Wright's response in another place where this question was posted. Grab the SRUM database and parse with SrumECmd to see what some of the network profiles on the box were. SRUM is basically the backend database for Task Manager
9:48 AM
https://github.com/EricZimmerman/Srum#repairing-the-srudbdat for instructions on repairing the DB. SRUM-Dump is really slow and SrumECmd is a lot faster, so that's just another option
Avatar
Brilliant thanks. If the connection is over 30 days old though, then I'm out of luck?
Avatar
Avatar
stan
Brilliant thanks. If the connection is over 30 days old though, then I'm out of luck?
Andrew Rathbun 9/1/2022 9:55 AM
yeah SRUM only records about 30 days of data
👍 1
Avatar
dfir_rook [CA] 9/1/2022 11:19 AM
Hello All, we have to grab a Facebook Messenger chat group for an investigaton. One of the participants will let us access his account so we can grab what we need. But the conversation has been going on for over a year, any tool recommend to proceed or it will be SnagIT kinda of a thing ??? Axiom won’t let us grab only a specific group chat conversation!!
Avatar
Avatar
dfir_rook [CA]
Hello All, we have to grab a Facebook Messenger chat group for an investigaton. One of the participants will let us access his account so we can grab what we need. But the conversation has been going on for over a year, any tool recommend to proceed or it will be SnagIT kinda of a thing ??? Axiom won’t let us grab only a specific group chat conversation!!
Facebook will let you download only messages directly from your account settings page, but it doesn't look like you can select which message threads to grab. https://www.facebook.com/dyi/?referrer=yfi_settings
See posts, photos and more on Facebook.
Avatar
To all: What is your preferred 0n-scene Mac preview/triage tool?
Avatar
Avatar
RyanB
To all: What is your preferred 0n-scene Mac preview/triage tool?
Andrew Rathbun 9/1/2022 12:34 PM
https://discord.com/channels/427876741990711298/537760691302563843/1014767257135616002 Guessing it'll be the same answer but I'm the wrong person to answer this, admittedly
Avatar
Avatar
FullTang
Facebook will let you download only messages directly from your account settings page, but it doesn't look like you can select which message threads to grab. https://www.facebook.com/dyi/?referrer=yfi_settings
Ross Donnelly 9/1/2022 1:57 PM
Whilst you can't select which ones to download, they are usually downloaded as separate HTML files for each thread - so it would be quite easy to download all messages then scrap the threads that aren't the chat of interest
Avatar
Avatar
dfir_rook [CA]
Hello All, we have to grab a Facebook Messenger chat group for an investigaton. One of the participants will let us access his account so we can grab what we need. But the conversation has been going on for over a year, any tool recommend to proceed or it will be SnagIT kinda of a thing ??? Axiom won’t let us grab only a specific group chat conversation!!
Yeah we get a takeout then pump it into Axiom to further parse the thread of interest only. I think all tools will require a full messenger takeout as a first step. Alternately the Cellebrite Live message capture might have FB for your phone model? The resulting screen grabs aren't searchable though so depends on your later required steps.
Avatar
HW&S Nashie 9/2/2022 3:45 AM
Does anyone have any idea how long an Apple iPhone 12 will keep on allowing tracking via ‘find my phone’ using UWB when in power reserve mode please?
👀 1
Avatar
Avatar
Ross Donnelly
Whilst you can't select which ones to download, they are usually downloaded as separate HTML files for each thread - so it would be quite easy to download all messages then scrap the threads that aren't the chat of interest
dfir_rook [CA] 9/2/2022 12:22 PM
Exactly what I did today finally, dump all the message and scrap what’s not needed. Also try the dump to json and import into Axiom. Work well also and I was also able to do a portable case like that … thanks all for your help much appreciate
👍 1
Avatar
skinnyfrenchman 9/2/2022 12:28 PM
Hello, I'm hoping to build my own forensic machine in the near future (likely a desktop). I'm not looking for specific builds, but I'm wondering if anyone has experience doing this and has any advice? Should I focus on powerful processor? More memory? Tons of storage? What would you consider a minimum for cases today? Thank you
Avatar
Avatar
skinnyfrenchman
Hello, I'm hoping to build my own forensic machine in the near future (likely a desktop). I'm not looking for specific builds, but I'm wondering if anyone has experience doing this and has any advice? Should I focus on powerful processor? More memory? Tons of storage? What would you consider a minimum for cases today? Thank you
I guess it depends a bit on what kind of forensics you'll be doing on it. You'll probably want it to be able to comfortably run some VMs, both for analysis (i.e. SIFT Workstation, FlareVM, etc), and for sandboxing (combustion chamber for malware analysis, etc). More processor cores and memory tends to help the most with those use-cases. If you'll be handling lots of device/disk images on it, more disk space is useful for that case. If you'll regularly be performing any kind of brute forcing or credential auditing (i.e. hashing/cracking) on it, then faster processor/gpu can be helpful (depending on what you're running to perform the audit)
12:38 PM
I'm sure there's other use cases that might have different requirements, too. 🤔
Avatar
Avatar
skinnyfrenchman
Hello, I'm hoping to build my own forensic machine in the near future (likely a desktop). I'm not looking for specific builds, but I'm wondering if anyone has experience doing this and has any advice? Should I focus on powerful processor? More memory? Tons of storage? What would you consider a minimum for cases today? Thank you
Andrew Rathbun 9/2/2022 12:41 PM
Definitely focus on cores/threads for processing power. If you're cracking passwords, you want GPU power. If you're doing anything else, CPU power should reign supreme. Threadripper would be pretty awesome but it's expensive. I wouldn't go any less than 8 cores nowadays and for futureproofing your build. Ideally, get an Intel or AMD CPU that has double digit cores, i.e., 16 Cores/32 Threads. That should last you quite a bit yet still not be as expensive as a 32 core/64 thread Threadripper.
👍 1
12:43 PM
If you GitHub and want to add to these answers, please do a PR and I'll merge. Let's get these fleshed out so we can just link to these answers moving forward for the myriad of questions we get often. Please PR other questions that need to be answered, as well! We can work on answers over time 😄
Avatar
Avatar
Andrew Rathbun
If you GitHub and want to add to these answers, please do a PR and I'll merge. Let's get these fleshed out so we can just link to these answers moving forward for the myriad of questions we get often. Please PR other questions that need to be answered, as well! We can work on answers over time 😄
skinnyfrenchman 9/2/2022 1:39 PM
Ha, i figured someone would have asked this before. Thanks, i'll take a look
Avatar
Borderbingo 9/2/2022 6:46 PM
Hello! Peeps is there any media player other than Windows media player you guys recommend for opening PA audio files. Thanks for the help. (edited)
Avatar
Avatar
Borderbingo
Hello! Peeps is there any media player other than Windows media player you guys recommend for opening PA audio files. Thanks for the help. (edited)
Andrew Rathbun 9/2/2022 7:05 PM
VLC?
this 8
Avatar
Avatar
Andrew Rathbun
Definitely focus on cores/threads for processing power. If you're cracking passwords, you want GPU power. If you're doing anything else, CPU power should reign supreme. Threadripper would be pretty awesome but it's expensive. I wouldn't go any less than 8 cores nowadays and for futureproofing your build. Ideally, get an Intel or AMD CPU that has double digit cores, i.e., 16 Cores/32 Threads. That should last you quite a bit yet still not be as expensive as a 32 core/64 thread Threadripper.
Have you tried the new intel hybrid core architecture chips yet? I hear there are lots of problems with virtualization software and hybrid cores. Personally I’d go for the newer AMD Ryzen chip with up to 16 normal cores. (edited)
💯 1
Avatar
Avatar
Sensei
Have you tried the new intel hybrid core architecture chips yet? I hear there are lots of problems with virtualization software and hybrid cores. Personally I’d go for the newer AMD Ryzen chip with up to 16 normal cores. (edited)
Andrew Rathbun 9/3/2022 4:42 AM
same
Avatar
Avatar
Borderbingo
Hello! Peeps is there any media player other than Windows media player you guys recommend for opening PA audio files. Thanks for the help. (edited)
MrMacca (Allan Mc) 9/3/2022 10:42 AM
Potplayer has always played most file types I've thrown at it that Vlc struggled with.
👍🏻 4
Avatar
Avatar
MrMacca (Allan Mc)
Potplayer has always played most file types I've thrown at it that Vlc struggled with.
Digitalferret 9/3/2022 11:20 AM
nice one, never even heard of it. my 2 are VLC and MediaPlayerClassic. added 🙂
Avatar
Anyone know of a website similar to Phonescoop, that would have schematics and diagrams for hard disks and other electronics we come across in DFIR?
Avatar
Avatar
skinnyfrenchman
Hello, I'm hoping to build my own forensic machine in the near future (likely a desktop). I'm not looking for specific builds, but I'm wondering if anyone has experience doing this and has any advice? Should I focus on powerful processor? More memory? Tons of storage? What would you consider a minimum for cases today? Thank you
Get the latest motherboard you can afford, Intel or AMD doesn’t really matter, focus on the highest core count (physical cores) you can afford, at least 1 nvme boot drive for your host and at least one large ssd fir data, images can be dumped to a good HDD like a red. Get the most amount of ram you can afford. In my opinion you should have a solid host OS , I’d use Ubuntu. Then run everything else in a VM. Also a good nic and wireless built in would be great. I’d also water cool the cpu with a good aio
3:45 PM
I’ve had good success with Asus motherboard in the past and I’d probably start with this and build out from there. https://www.asus.com/ca-en/Motherboards-Components/Motherboards/Workstation/Pro-WS-WRX80E-SAGE-SE-WIFI/
ASUS Pro Workstation motherboards are designed for professionals in AI training, deep learning, animation, or 3D rendering. Featuring expandable graphics, storage, impressive connectivity and reliability, an ASUS Pro Workstation motherboard is the ideal solution for creative professionals and IT administrators.
Avatar
Avatar
ryd3v
I’ve had good success with Asus motherboard in the past and I’d probably start with this and build out from there. https://www.asus.com/ca-en/Motherboards-Components/Motherboards/Workstation/Pro-WS-WRX80E-SAGE-SE-WIFI/
Digitalferret 9/4/2022 3:57 PM
ooh i thought, thats worth a look, right up until ... 🙂
3:59 PM
Make ya tingle in ya dingle 😬
😆 1
3:59 PM
I usually start with the motherboard since this is the nervous system
3:59 PM
Then pick the best cpu I can afford
4:00 PM
Then pick the fastest memory the cpu can run with the lowest latency
4:00 PM
Then populate some drives.
4:00 PM
I use pcpartpicker to plan out builds
4:01 PM
Of course budget is the actual starting point. What’s the budget. xD
4:02 PM
For me that board is
4:02 PM
Tbh $1289.00 isn’t that much for an examiner workstation as an investment
4:02 PM
I should work sales at Asus xD
4:04 PM
Imagine having 7x titan cards in that xD
💯 1
Avatar
Avatar
ryd3v
Imagine having 7x titan cards in that xD
Digitalferret 9/4/2022 4:30 PM
techpr0n, lol. nah, for me that much speed/capability wouldn't make much if any return. I'd be better, maybe with more PC's not an UberPC
4:31 PM
a lot of folks, non pro, waste so much money on spec they simply don't need
Avatar
True. XD
Avatar
Avatar
ryd3v
Get the latest motherboard you can afford, Intel or AMD doesn’t really matter, focus on the highest core count (physical cores) you can afford, at least 1 nvme boot drive for your host and at least one large ssd fir data, images can be dumped to a good HDD like a red. Get the most amount of ram you can afford. In my opinion you should have a solid host OS , I’d use Ubuntu. Then run everything else in a VM. Also a good nic and wireless built in would be great. I’d also water cool the cpu with a good aio
Avoid Xeons in my opinion, may have a ton of cores but it's about utilisation and processing power. Reality is, not many tools will use all those cores.
👆🏻 2
Avatar
Haven’t really had any issue with Xenon’s in the past , but the above board is AMD xD
Avatar
Avatar
ryd3v
Haven’t really had any issue with Xenon’s in the past , but the above board is AMD xD
Digitalferret 9/5/2022 1:55 AM
think its more about matching the hardware to the job, looking at bottlenecks etc. some dudes just go for tactical nukes bc well why not spend thousands.
Avatar
🤣 true
Avatar
Pretendigator 9/5/2022 5:34 AM
@ryd3v next time your building something i'd suggest picking which cpu you want first over the mobo, then you know which socket you'll need etc and can filter the features a bit easier too
Avatar
Yeah usually motherboard dictates the CPU as motherboards usually come out with features first
Avatar
Avatar
Pretendigator
@ryd3v next time your building something i'd suggest picking which cpu you want first over the mobo, then you know which socket you'll need etc and can filter the features a bit easier too
If you pick the CPU first, your kinda setting yourself in a box with only a motherboard that supports that CPU 🙂
Avatar
100% will definitely take a look as soon as I wake up
Avatar
Digitalferret 9/5/2022 6:30 AM
no HW guru here, but for me it would be checking with your main-job software vendors spec to see their basic recommendations and how/where to optimise that going forward. for certain DR hardware, years back, improving the spec of the PC didn't really matter a jot as it wasn't the bottleneck
Avatar
Avatar
Digitalferret
no HW guru here, but for me it would be checking with your main-job software vendors spec to see their basic recommendations and how/where to optimise that going forward. for certain DR hardware, years back, improving the spec of the PC didn't really matter a jot as it wasn't the bottleneck
Pretendigator 9/5/2022 7:09 AM
indeed, our forensic network is abysmal, fancy fast rigs being choked by terrible infrastructure.
Avatar
Pretendigator 9/5/2022 7:35 AM
as for forensic software requirements: EnCase; utilises around 10-15% of CPU while running 'standard' processing options, all 24 logical cores are active. (Xeon E5-2620 v3 @2.4GHz (currently boosting to 2.8GHz), old and getting replaced once the ISO committee allows...) In terms of RAM EnCase is taking around 5GB out of the available 128GB (8 slots in use @1866 MHz) The cache while processing 'average' HDDs, (laptops with around 1tb storage) will occasionally exceed 1TB during processing. One issue I've encountered is our 1tb SSD cache drive maxing out and encase falling over if you don't set a secondary cache location. Might be worth mentioning to consider a high speed + capacity for cache/temp files etc. separate to OS & storage. Needless to say, I'm quite excited for our new workstations in the coming months.
💯 3
Avatar
Avatar
Pretendigator
as for forensic software requirements: EnCase; utilises around 10-15% of CPU while running 'standard' processing options, all 24 logical cores are active. (Xeon E5-2620 v3 @2.4GHz (currently boosting to 2.8GHz), old and getting replaced once the ISO committee allows...) In terms of RAM EnCase is taking around 5GB out of the available 128GB (8 slots in use @1866 MHz) The cache while processing 'average' HDDs, (laptops with around 1tb storage) will occasionally exceed 1TB during processing. One issue I've encountered is our 1tb SSD cache drive maxing out and encase falling over if you don't set a secondary cache location. Might be worth mentioning to consider a high speed + capacity for cache/temp files etc. separate to OS & storage. Needless to say, I'm quite excited for our new workstations in the coming months.
Andrew Rathbun 9/5/2022 7:37 AM
Thank you!
Salute 1
Avatar
Avatar
Digitalferret
no HW guru here, but for me it would be checking with your main-job software vendors spec to see their basic recommendations and how/where to optimise that going forward. for certain DR hardware, years back, improving the spec of the PC didn't really matter a jot as it wasn't the bottleneck
Andrew Rathbun 9/5/2022 7:38 AM
This is actually on my to-do list for the FAQs repo
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 9/5/2022 7:59 AM
Have you toyed around with Active Disk Editor?
Avatar
Original message was deleted or could not be loaded.
Unoriginal_name 9/5/2022 9:43 AM
Looks like you are US law enforcement. Reach out to your local USSS office and request to go to the basic classes at NCFI in Alabama. They cover all costs associated with the travel.
👆 2
Avatar
Avatar
Pretendigator
as for forensic software requirements: EnCase; utilises around 10-15% of CPU while running 'standard' processing options, all 24 logical cores are active. (Xeon E5-2620 v3 @2.4GHz (currently boosting to 2.8GHz), old and getting replaced once the ISO committee allows...) In terms of RAM EnCase is taking around 5GB out of the available 128GB (8 slots in use @1866 MHz) The cache while processing 'average' HDDs, (laptops with around 1tb storage) will occasionally exceed 1TB during processing. One issue I've encountered is our 1tb SSD cache drive maxing out and encase falling over if you don't set a secondary cache location. Might be worth mentioning to consider a high speed + capacity for cache/temp files etc. separate to OS & storage. Needless to say, I'm quite excited for our new workstations in the coming months.
I’m wondering and assuming that you’re using Windows, in your power settings is it set to balanced or performance , high performance?
Avatar
Avatar
Digitalferret
no HW guru here, but for me it would be checking with your main-job software vendors spec to see their basic recommendations and how/where to optimise that going forward. for certain DR hardware, years back, improving the spec of the PC didn't really matter a jot as it wasn't the bottleneck
I design differently. Most customers don’t use just one software, and as software improves over time , and developers take more advantage of better hardware , I always like to have the future proof option, I never design with just the best minimum, I always design with the best components in mind for the tasks at hand. Or at least what the machine will mostly be used for. 😄
Avatar
Avatar
ryd3v
I design differently. Most customers don’t use just one software, and as software improves over time , and developers take more advantage of better hardware , I always like to have the future proof option, I never design with just the best minimum, I always design with the best components in mind for the tasks at hand. Or at least what the machine will mostly be used for. 😄
Digitalferret 9/5/2022 5:26 PM
yeh, roger that. i'm a "design to a quality, not a price" type of guy. just i see so many people needlessly blowing a lot of cash not really knowing if they need it (the spec). i mean, more must be better, right? 🙂 (edited)
Avatar
Haha yeah, wait till you read the post I’m making for Andrew xD
6:17 PM
My methodology will all make sense xD
Avatar
Avatar
ryd3v
My methodology will all make sense xD
Digitalferret 9/5/2022 6:18 PM
grrovy, i'll check it out for sure. for me, across all fields not just tech, one should always start with diagnosis. what's the point of a solution if it doesn't match the need?
Avatar
Yeah understandable, with tech it can be hard sometimes with the wealth of options and the frequency that innovation takes place, what’s good today doesn’t always == good tomorrow
6:20 PM
Age old question does it run Crysis? Lol
6:20 PM
My favorited builds are@for flight sims lol
Avatar
Digitalferret 9/5/2022 6:38 PM
all those farmers tho. proof of work v proof of stake 🙂
🤣 1
Avatar
hi everyone, working on some weblog analysis (access to the users workstation does currently not exist). since we cannot see directly particular pages that the user accessed through the logs I was wondering if the links pushed through the facebook CDN (video-lga3-1.xx.fbcdn.net/v/... ; scontent-lga3-1.xx.fbcdn.net/v/... ; ...) could be translated in some static content / potions of the URLs could be translated into page IDs / user IDs / message IDs etc. if so, anyone who has some documentation available around that?
Avatar
Ok, until I do a pull request, I'll post my blog link here https://ryd3v.rocks/posts/wrkstnbuild
Ryan Collins, Software Engineer, teaching programming, development, React, Next.js
👍🏻 1
Avatar
Pull request submitted
💯 1
Avatar
Avatar
ryd3v
Pull request submitted
Andrew Rathbun 9/5/2022 8:49 PM
Thank you. I had added a blurb pointing to the link above as well. It's not finalized yet and it's a bit of a mess, but the README will be cleaned in short order 🙂 thank you again for doing that!
💯 1
🙏 1
Avatar
Avatar
Andrew Rathbun
Thank you. I had added a blurb pointing to the link above as well. It's not finalized yet and it's a bit of a mess, but the README will be cleaned in short order 🙂 thank you again for doing that!
My pleasure
Avatar
Avatar
ryd3v
Ok, until I do a pull request, I'll post my blog link here https://ryd3v.rocks/posts/wrkstnbuild
Decent read! I'd probably suggest for a forensic workstation watercooling isn't needed but I see an advantage of it.
🙏 1
🍻 1
Avatar
Avatar
Rob
Decent read! I'd probably suggest for a forensic workstation watercooling isn't needed but I see an advantage of it.
Thank you so much, yes, I mostly like a quiet workspace xD
Avatar
Avatar
ryd3v
Thank you so much, yes, I mostly like a quiet workspace xD
Digitalferret 9/6/2022 12:44 AM
lol, me too, but the soul feels there's something quite wrong about having water go through a box of electrickery (a bit like shoving pineapple on top of pizza) 🙂
🍍 1
12:50 AM
most AIO's are filled with a mixture of ethylene glycol and distilled water or a mineral oil mix that is somewhat safe for modern electronics, providing they are powered down fast enough, I had one leak once, on a video card, and surprising, the PC stayed on, and when I turned it off, it cleaned up nicely, and no damage occurred. 🤣
12:51 AM
I mean obviously you don't want to purposely spill the fluid on your rig, but I've shipped pre-built systems globally, never had one leak xD
Avatar
Digitalferret 9/6/2022 1:04 AM
so you admit they are faulty and have urinated inside thy machine, like a scared rabbit, when put under duress? 🙂
Avatar
Lol no, I accidentally cut a tube once while testing and removing a second video card 100% my fault 🤦🏻‍♂️
1:40 AM
I was doing some testing on a new custom loop and was using some tubes of rubber. Was trying a SLI setup and got to hurried lmao
1:41 AM
Nowadays though the AIO tubes come wrapped in nylon to parent that sort of thing. This must have been over ten years ago when the custom loop thing first started xD
Avatar
Digitalferret 9/6/2022 1:41 AM
all is as god Bob wills it 🤣 (edited)
Avatar
Hahahaha
1:42 AM
Don’t think I’ve done a all air system in over ten years tbh
Avatar
Digitalferret 9/6/2022 1:42 AM
you tried those Ergo Mouse things? ball under thumb? this old Razer Naga is R-Click starting to fail
Avatar
Oh no. They look interesting though
Avatar
Digitalferret 9/6/2022 1:43 AM
had one of the first trackerball mice, Logitech, 2 button ball in middle. was ok for only certain things
Avatar
Yeah. I remember cleaning the balls lol
Avatar
Digitalferret 9/6/2022 1:45 AM
yep, Red Ball with micro dots. balanced on 3 tiny ball bearings.
1:45 AM
oh the old Razer tho. rubber ball, iirc 2000DPI, boy did those fluff up
1:45 AM
boomslang?
Avatar
Lol yeah
1:55 AM
Tech has definitely come a long way since then that’s for sure
1:57 AM
I better get myself to bed or the morning is gonna be rough xD 🍻🍻
Avatar
Digitalferret 9/6/2022 1:58 AM
laters dude, tc
Avatar
Basic "digital forensic specialist" roadmap
👍 2
Avatar
Avatar
ryd3v
I’m wondering and assuming that you’re using Windows, in your power settings is it set to balanced or performance , high performance?
Pretendigator 9/6/2022 4:20 AM
set to ultimate performance but im sure IT have set some weird policy to mess with it. We don't even have the ability to disable screen timeouts or change our desktop wallpaper...
Avatar
Avatar
ryd3v
Ok, until I do a pull request, I'll post my blog link here https://ryd3v.rocks/posts/wrkstnbuild
Pretendigator 9/6/2022 4:35 AM
nice post! I believe you have a typo at 'This motherboard isn't available on PCPARTPICKER at the moment, so we will just add the other components to our final build list, that are compatible with the CPU selected.' replace CPU with MOBO? Either that or dyslexia is tying my shoelaces I also still disagree with your mobo first philosophy but I won't say anything more 😉
Avatar
Avatar
Pretendigator
set to ultimate performance but im sure IT have set some weird policy to mess with it. We don't even have the ability to disable screen timeouts or change our desktop wallpaper...
Surprised your IT department has any control over them
this 3
Avatar
Avatar
Rob
Surprised your IT department has any control over them
Pretendigator 9/6/2022 5:43 AM
With the amount of arguments we've had with them over the last 5 years, so am I.
🤣 3
Avatar
Avatar
Pretendigator
set to ultimate performance but im sure IT have set some weird policy to mess with it. We don't even have the ability to disable screen timeouts or change our desktop wallpaper...
Interesting, I wonder if balanced profile would make a difference? Maybe like you said some policy affecting performance somewhere
Avatar
Avatar
Pretendigator
nice post! I believe you have a typo at 'This motherboard isn't available on PCPARTPICKER at the moment, so we will just add the other components to our final build list, that are compatible with the CPU selected.' replace CPU with MOBO? Either that or dyslexia is tying my shoelaces I also still disagree with your mobo first philosophy but I won't say anything more 😉
Thank you, could be a few typos in there lol 😂
😂 1
Avatar
Avatar
Digitalferret
had one of the first trackerball mice, Logitech, 2 button ball in middle. was ok for only certain things
I use trackball (thumb ball) exclusively now. Never regretted it
👍🏻 1
🖲️ 1
Avatar
+1 for a trackball over here
Avatar
Pretendigator 9/7/2022 5:47 AM
Before i boot up a test device and 'get busy' with it; Has anyone got much experience with CCleaner specifically it 'cleaning' $logfile entries? I have a file that im looking into, however the first entry related to it in the $logfile has the operation of 'delete'. Low and behold, CCleaner has a last run time of around 15 minutes prior to the delete entry in the $logfile. My assumption is, yes, ccleaner is cleaning up $logfile entries but I wouldn't mind someone confirming this or providing any other reasons / hypothesis on why im missing $logfile records.
Avatar
Avatar
Pretendigator
Before i boot up a test device and 'get busy' with it; Has anyone got much experience with CCleaner specifically it 'cleaning' $logfile entries? I have a file that im looking into, however the first entry related to it in the $logfile has the operation of 'delete'. Low and behold, CCleaner has a last run time of around 15 minutes prior to the delete entry in the $logfile. My assumption is, yes, ccleaner is cleaning up $logfile entries but I wouldn't mind someone confirming this or providing any other reasons / hypothesis on why im missing $logfile records.
Digitalferret 9/7/2022 6:04 AM
possibly not if this is anything to go by. 2011 but should still be valid. any other cleaners on there?
Avatar
Avatar
Digitalferret
possibly not if this is anything to go by. 2011 but should still be valid. any other cleaners on there?
Pretendigator 9/7/2022 7:04 AM
I did do quite a bit of googling and reading their forum posts but couldn't see anything about $logfile past 2016, the current version shows a tickbox under the OS options to clean 'windows log files'. Currently pulling the logfile off my research machine, after that ill be running CCleaner and comparing the logfiles. I'll post an update incase anyone in the future searches for $logfile / ccleaner etc. (edited)
👍🏻 1
Avatar
Avatar
Pretendigator
I did do quite a bit of googling and reading their forum posts but couldn't see anything about $logfile past 2016, the current version shows a tickbox under the OS options to clean 'windows log files'. Currently pulling the logfile off my research machine, after that ill be running CCleaner and comparing the logfiles. I'll post an update incase anyone in the future searches for $logfile / ccleaner etc. (edited)
Digitalferret 9/7/2022 7:08 AM
yeh, i took that to mean "other" log files, but haven't tested myself.
Avatar
Avatar
Digitalferret
yeh, i took that to mean "other" log files, but haven't tested myself.
Pretendigator 9/7/2022 7:12 AM
exactly my interpretation too, I'll make sure to let you know
Avatar
Digitalferret 9/7/2022 7:17 AM
umm, im not sure I've got the gist properly mate. you are looking at a file, it has been deleted, CCleaner was run prior. would this not indicate the the logfile is simply showing that the file was deleted? cleaners will often then clean residual traces... if it's any use, cross pollinating from the other top cleaners: Bleachbit and Privaz, who mention which/what etc
7:18 AM
learning as i go, but happy to share the legwork, if
Salute 1
Avatar
Pretendigator 9/7/2022 7:33 AM
ccleaner ran at 15:15, $logfile record indicating file 'XXX' deleted at 15:20. there are a few entries in the $logfile relating to the file after 15:20 but none prior. I was expecting to have entries within the $logfile relating to file 'XXX' prior to 15:20 (file deleted entry) i.e an entry indicating file 'XXX' created. Started as curiosity as to why i'm missing entries that I believe should be there. Hopefully, this is making some sense...
Avatar
Hello everyone, has anyone worked in a certified forensic lab before? I have some questions on what the pros and cons are to having a lab certified
Avatar
Avatar
4n6s7oth
Hello everyone, has anyone worked in a certified forensic lab before? I have some questions on what the pros and cons are to having a lab certified
Pretendigator 9/7/2022 7:39 AM
not much changed, just now theres specific ways to do things i.e using a sticker to reference a HDD rather than using a sharpie to write on it. It's also delayed rollout of new hardware because it needs to be 'validated' which has taken 6 months... I imagine a 'pro' of it would be that the standard of work would be very consistent among each member of the team. I will say we are only accredited for imaging of HDDs so the actual examination is unaffected for now. I've also made the assumption that when you say 'certified' you are refering to ISO? - sorry if not
Avatar
Avatar
Pretendigator
not much changed, just now theres specific ways to do things i.e using a sticker to reference a HDD rather than using a sharpie to write on it. It's also delayed rollout of new hardware because it needs to be 'validated' which has taken 6 months... I imagine a 'pro' of it would be that the standard of work would be very consistent among each member of the team. I will say we are only accredited for imaging of HDDs so the actual examination is unaffected for now. I've also made the assumption that when you say 'certified' you are refering to ISO? - sorry if not
This helps! I am referring to ISO. Some senior members are telling management that they do not think having a certified lab is a good idea and I am trying to understand why not.
Avatar
Avatar
4n6s7oth
This helps! I am referring to ISO. Some senior members are telling management that they do not think having a certified lab is a good idea and I am trying to understand why not.
Pretendigator 9/7/2022 7:49 AM
I've been in UK LE digital forensics since 2015, witnessing the start of the process and the current result over that time. HUGE HUUUGE waste of money/time/resources for essentially a badge that says your lab has a hygiene rating of 5*. You would think that time and money could be invested in to making sure investigators are properly trained, rather than dictating what colour sticker to use to cover a selfie cam... I'd love for some actual certs to give me weight in court, but in todays climate it seems better to stand up and say you blindly followed the ISO guidelines so your evidence is of 'higher' quality...
7:49 AM
You might be able to tell how I feel about it.🥲 (edited)
this 2
Avatar
Digitalferret 9/7/2022 8:09 AM
paper for papers sake, makes it look like someone's doing something. pretty much like the Govt here, lol. as long as someone can tick boxes that have been pre-arranged you can have a shite product but as long as it's done according to [standards] it all be good
💯 1
8:09 AM
goldplate:turd
Avatar
Avatar
Pretendigator
ccleaner ran at 15:15, $logfile record indicating file 'XXX' deleted at 15:20. there are a few entries in the $logfile relating to the file after 15:20 but none prior. I was expecting to have entries within the $logfile relating to file 'XXX' prior to 15:20 (file deleted entry) i.e an entry indicating file 'XXX' created. Started as curiosity as to why i'm missing entries that I believe should be there. Hopefully, this is making some sense...
Pretendigator 9/7/2022 8:11 AM
@Digitalferret did that make sense?
Avatar
Avatar
Pretendigator
@Digitalferret did that make sense?
Digitalferret 9/7/2022 8:28 AM
brains chewing on it, having a senior moment rn, grabbing coffee 🙂
8:29 AM
does the logfile not just register changes? ie the file lived there quite happily, disturbing no-one until it was deleted?
8:31 AM
i'm sure there's some Windows system egghead guru sat watching this, if so please chime in 🙂
😂 1
Avatar
Avatar
Digitalferret
does the logfile not just register changes? ie the file lived there quite happily, disturbing no-one until it was deleted?
Pretendigator 9/7/2022 8:34 AM
there are 'normally' create or modify etc. entries in the logfile. which you would definitely expect to see for a 'user created' file because for it to be deleted, it must have first been created. Now im starting to feel like yoda or mr miyagi
Avatar
Digitalferret 9/7/2022 8:39 AM
ah, right, i think. in my poor head i thought it would be sequential log, ie created would be way back. Who said that "Better to remain silent and be thought a fool than to speak and to remove all doubt" 🙂
Avatar
Pretendigator 9/7/2022 8:40 AM
yes the created entry should be way back, but its just not their atall. I dont believe it writes over itself in a cyclical way overwrites itself/cyclical recording (edited)
Avatar
Digitalferret 9/7/2022 8:40 AM
oh!
8:41 AM
um, i think it actually does
Avatar
Pretendigator 9/7/2022 8:42 AM
ohhh snap
8:45 AM
just re-opening axiom to check how far back the entries go, although the created date on the file itself is on the same day as deletion (its in recycle bin)
Avatar
Avatar
Pretendigator
just re-opening axiom to check how far back the entries go, although the created date on the file itself is on the same day as deletion (its in recycle bin)
Digitalferret 9/7/2022 8:50 AM
so, basically it landed in the target drive, and got deleted same day. not entirely sure, but i couldn't see the log file going on to infinity over an age
Avatar
Pretendigator 9/7/2022 9:01 AM
I believe I may have embarrassed myself a small amount here... the only entries (except one, 2 months prior) are all from the same day in question. although the existing other entries pre-date the created date on the file Going to have a read over of that link and head home. Today has not been my day 😮💨
Avatar
Digitalferret 9/7/2022 9:09 AM
nah, it's the fear of f*&king up that prevents folks from sharing that "we are all learning" moments. props for putting your thoughts into view so we can all benefit
this 1
💯 1
Avatar
Avatar
Digitalferret
Pretendigator 9/7/2022 9:10 AM
Update (2019-02-17): How long does it take for old data to become overwritten with new data? In one of my tests with Windows 10, it took 16 minutes. In another test with Windows 10, it took 5 hours and 20 minutes. In both tests, mouse movements were the only user activity.
Avatar
Digitalferret 9/7/2022 9:10 AM
yup
Avatar
Pretendigator 9/7/2022 9:10 AM
just got to the end of it, should have just skipped ahead 😂
Avatar
Digitalferret 9/7/2022 9:11 AM
lol, thats my problem, getting too far ahead of myself and missing the bloody obvious in the first paragraph. we should team up, lol
😂 1
9:12 AM
"scuse me, can you tell me where the train station is" : woman says nothing but stares above my head. yup I'm under a big sign that says ...
Avatar
Avatar
Digitalferret
nah, it's the fear of f*&king up that prevents folks from sharing that "we are all learning" moments. props for putting your thoughts into view so we can all benefit
Pretendigator 9/7/2022 9:13 AM
it was also partly useful to just explain the case 'outloud' but im always happy to embarrass myself if it means im going to learn or someone else is
👍 1
Avatar
Avatar
Digitalferret
"scuse me, can you tell me where the train station is" : woman says nothing but stares above my head. yup I'm under a big sign that says ...
Pretendigator 9/7/2022 9:14 AM
me stood next to the eggs in the shop: "ey lad, do you know where the eggs are" you could tell he was already having a long day from the sigh he gave...
🤣 1
Avatar
Avatar
Pretendigator
I've been in UK LE digital forensics since 2015, witnessing the start of the process and the current result over that time. HUGE HUUUGE waste of money/time/resources for essentially a badge that says your lab has a hygiene rating of 5*. You would think that time and money could be invested in to making sure investigators are properly trained, rather than dictating what colour sticker to use to cover a selfie cam... I'd love for some actual certs to give me weight in court, but in todays climate it seems better to stand up and say you blindly followed the ISO guidelines so your evidence is of 'higher' quality...
Thank you for the insight, I appreciate your perspective !
Salute 1
Avatar
I have a cool project going on in my biomedical class, does anyone wanna try solving a crime scene?
Avatar
Digitalferret 9/7/2022 12:13 PM
i think its more a DFIR group mate, rather than biological CSI
12:13 PM
someone may jump in tho
Avatar
okay i’ll ask in the dfir group
12:13 PM
thank you
12:15 PM
wait is the dfir group the right group to ask to help me solve a crime scene
12:15 PM
not real body or anything it’s just a class project that’s worth a lot and it would help
12:16 PM
i see multiple dfir channels
Avatar
Digitalferret 9/7/2022 12:16 PM
just a clue, D.F.I.R (Digital Forensics Incident Response)
Avatar
Oh!
12:17 PM
Okay thank you very much
Avatar
Digitalferret 9/7/2022 12:17 PM
all good
Avatar
No more SIM tray on the iPhone 14. I know the Razr also doesn't have one. I would imagine they'll start dropping like flies, probably saves a few cents in manufacturing
🧐 1
Avatar
Avatar
whee30
No more SIM tray on the iPhone 14. I know the Razr also doesn't have one. I would imagine they'll start dropping like flies, probably saves a few cents in manufacturing
Interestingly I noted that this is a US-only feature
Avatar
*and Canada
Avatar
I expect it to make more headway in Europe starting next year 🙂
this 1
💯 1
Avatar
Digitalferret 9/8/2022 12:49 AM
Apple: Round edge upgrades to square edge updates to round edge upgrades to square edge updates to round... more re-runs than Police Academy 🙂
Avatar
4JSN6🇬🇧 9/8/2022 1:02 AM
An open question, what do we all use for our contemporaneous notes?
Avatar
Avatar
4JSN6🇬🇧
An open question, what do we all use for our contemporaneous notes?
Digitalferret 9/8/2022 1:54 AM
non-forensic (these days) here, but for me it's a Mk1 pencil & paper, accurate watch (ok ...mobile phone). Carry it any/everywhere, zero setup time, sod all to go wrong. Use double spaced. it's possibly the cheapest and most effective means as it can be seen if records were amended later. there's the usual shill for the wrting software equivalent of a NEAL audio setup I'm sure, but that gets as close to contemporaneous as one can get. Plus a camera (phone) for things not written (for me, cable layouts, hardware setups etc) (edited)
Avatar
Avatar
4JSN6🇬🇧
An open question, what do we all use for our contemporaneous notes?
Pretendigator 9/8/2022 4:26 AM
Word to stay inline with our iso stuff, then copy pasted to one note when finished. (one notes indexing/searching is just 👌)
🔥 2
Avatar
Notion for general DFIR stuff 🙂
Avatar
Anyone using LGUP at all for firmware downgrade? (edited)
Avatar
Hello 😄 I'm a freshman in college currently working towards an AS in Cybersecurity, where I plan to transfer to the SANS Bachelor program. I have a severe interest in Digital Forensics and am wondering what recommendations you may have for learning/practicing skills outside the usual school coursework. I firmly believe I learn best when it is hands-on, and I can apply the general knowledge I've learned to real situations and learn from there, rather than just taking notes and calling it a day.
👋 3
Avatar
Grab a really good recommended book and jump in and go through all the examples and exercises , practice all the theory imo is the best way.
Avatar
Any book recommendations yourself?
Avatar
PryWaySeeProf 9/8/2022 11:27 PM
Hi, I'd like to know if there are any free alternatives to encase imager tool.
Avatar
randomaccess 9/9/2022 1:38 AM
Ftk imager
1:38 AM
But, what do you need it for?
1:38 AM
(just in case ftki isn't suitable)
Avatar
GeordieSteve999 9/9/2022 2:31 AM
@PryWaySeeProf as above FTK Imager (has nice ability to mount image files too) or a Forensic Live Boot like WinFE if you want to configure your own forensic edition of windows (useful for driver issues etc) or there are plenty of others to play with such as " CAINE 11.0 - Wormhole is out! that has imaging tool too and some other nice features" 🙂 what are you wanting to capture and in what format?
Avatar
Avatar
dfir-ent
Hello 😄 I'm a freshman in college currently working towards an AS in Cybersecurity, where I plan to transfer to the SANS Bachelor program. I have a severe interest in Digital Forensics and am wondering what recommendations you may have for learning/practicing skills outside the usual school coursework. I firmly believe I learn best when it is hands-on, and I can apply the general knowledge I've learned to real situations and learn from there, rather than just taking notes and calling it a day.
Yep, do not just read them but actually perform it and do not read ahead
Avatar
Avatar
dfir-ent
Any book recommendations yourself?
I’ll link you a few titles when back to pc
Avatar
Avatar
Fierry
Yep, do not just read them but actually perform it and do not read ahead
👍 👍
Avatar
Avatar
ryd3v
I’ll link you a few titles when back to pc
Thank you, much appreciated!
Avatar
in order to create a DIY Faraday bag, is it just as simple as completely enclosing the device with multiple layers of aluminum?
Avatar
Avatar
pi0
in order to create a DIY Faraday bag, is it just as simple as completely enclosing the device with multiple layers of aluminum?
Yep, just wrap it up with tin foil and make sure there are no gaps. You can’t have a charging cord connected to the phone and coming out of the tin foil because it would act as an antenna, but if you connect the phone to a battery pack and wrap up both of them then you should be good. You can always test the enclosure by wrapping up a test phone and trying to send the test phone a text message.
Avatar
understood, thank you very much!
👍 1
Avatar
Avatar
pi0
understood, thank you very much!
Thank that you're wrapping a burrito and you don't want any of the juice leaking out.
Avatar
When generating an excel or XML report in Physical Analyser is there a way to generate just the file and not export the Data Files to speed things up?
Avatar
I was looking at shell bags in autopsy, and in the path column it said My Computer{numbers-and-letters-here}\file.zip. What is that inside the {}? I'm assuming it's a volume GUID, and I'm wondering how I can see what that volume was?
11:15 AM
Trying to find evidence of exfil using an E01 of the target machine
11:15 AM
Checked usbstor but timestamp was older than the file
Avatar
Avatar
clockwork
I was looking at shell bags in autopsy, and in the path column it said My Computer{numbers-and-letters-here}\file.zip. What is that inside the {}? I'm assuming it's a volume GUID, and I'm wondering how I can see what that volume was?
Andrew Rathbun 9/11/2022 11:39 AM
Any other artifacts that point to file.zip?
Avatar
Avatar
Andrew Rathbun
Any other artifacts that point to file.zip?
The ones I found were with the keyword search, regRipper results, lnk files, webcache
11:46 AM
Locations point to downloads, and that guid
Avatar
C:\Users\User\Downloads\file.zip My Computer\{GUID}\file.zip /Users/User/AppData/Local/Temp/file.zip (edited)
Avatar
Avatar
clockwork
The ones I found were with the keyword search, regRipper results, lnk files, webcache
Andrew Rathbun 9/11/2022 12:17 PM
If you have X-Ways try searching the E01 for file.zip
Avatar
Avatar
Andrew Rathbun
If you have X-Ways try searching the E01 for file.zip
Ill try the evaluation version
Avatar
Avatar
clockwork
C:\Users\User\Downloads\file.zip My Computer\{GUID}\file.zip /Users/User/AppData/Local/Temp/file.zip (edited)
Are you able to give the guid as an example at all?
Avatar
Avatar
Tcisaki
Are you able to give the guid as an example at all?
Do you have a way to get info from it?
Avatar
Avatar
clockwork
Do you have a way to get info from it?
I was just wondering if this was one of those 'well known' guid locations. eg Appendix B https://www.giac.org/paper/gcfa/9576/windows-shellbag-forensics-in-depth/128522
Avatar
Avatar
Tcisaki
I was just wondering if this was one of those 'well known' guid locations. eg Appendix B https://www.giac.org/paper/gcfa/9576/windows-shellbag-forensics-in-depth/128522
Haven't seen that before that's pretty neat, no it isn't any of those sadly.
Avatar
Avatar
clockwork
Haven't seen that before that's pretty neat, no it isn't any of those sadly.
Those are very out of date. If you are not worried about the guid itself, could always google it, just to see
Avatar
Avatar
Tcisaki
Those are very out of date. If you are not worried about the guid itself, could always google it, just to see
It's the guid for the downloads folder 🤦
1:37 PM
Now I'm back to no leads lol
Avatar
Avatar
clockwork
Now I'm back to no leads lol
So both a good thing and a bad thing then. 🙂
Avatar
The scenario here is disgruntled employee is fired, and on their last day they download a bunch of corporate files to a zip. I gotta figure out what the method of exfil was.
1:40 PM
I just have an E01
1:41 PM
I've checked usbstor, email pst files, and web History for file upload sites
Avatar
And no additional shellbags to help?
Avatar
Only what's on the e01, should I pull and parse them outside of autopsy?
1:45 PM
Maybe I didn't parse the emails well enough, what's your workflow for checking psts? I only have access to freeware stuff tho lol
Avatar
You can export the PST/OST using Autopsy and then use linux utilities to look through them (like readpst)
1:51 PM
And no worries about freeware stuff. I focus alot of my preaching and such, for using it
Avatar
Avatar
Tcisaki
You can export the PST/OST using Autopsy and then use linux utilities to look through them (like readpst)
Do pst/ost files contain attachments too
Avatar
Avatar
clockwork
Do pst/ost files contain attachments too
Yup. OST for instance is the file that is used by outlook for all it's offline stuff (so will have Calendar, notes, Emails etc etc)
Avatar
Avatar
Tcisaki
Yup. OST for instance is the file that is used by outlook for all it's offline stuff (so will have Calendar, notes, Emails etc etc)
Awesome! I appreciate all the help. Thanks everyone
Avatar
Andrew Rathbun 9/11/2022 2:36 PM
Outlook is a really good PST/OST viewer 😋
Avatar
Bloatware 😛
Avatar
Avatar
clockwork
The scenario here is disgruntled employee is fired, and on their last day they download a bunch of corporate files to a zip. I gotta figure out what the method of exfil was.
Deleted User 9/11/2022 9:14 PM
Don’t forget cloud storage: Dropbox, Onedrive etc.
Avatar
Abby Normal 9/11/2022 10:00 PM
Some enterprises don't allow encryption in zip files so they can see what's being sent out (bit of a double edged sword right there). They also allowed the use of KeePass and encouraged encryption. So... people could export their keepass kdbx file which had a lot of work attachments inside the database...
Avatar
Heyhey, anyone knows if there is a way to access CDN links from facebook (example below; just blanked out some parts). just cutting out the actual link to the content or removing the timestamp information etc usually leads to "URL signature expired", "URL signature mismatch", "Bad URL hash" or "Bad URL timestamp". Two years ago it appeared that you were just able to modify the link to have direct access to the content but it appears to not work anymore. Any workaround for this? (edited)
Avatar
Hey... Any idea of how to place a random string inside a specific sector of a disk in Linux? For example I want to place "Hello" inside sector nr. 15000. (edited)
Avatar
Any recommended software or tools to view the data from an MSSQL full backup .BAK file? (edited)
Avatar
👀 1
1:20 PM
Wondering what everyone's offices are thinking with the pending release of the iPhone 14 into the wild. With the removal of the physical SIM card, what are all your plans for isolation if you are unable to place it into Airplane mode without a PIN code. I guess our only option now is Faraday bags? If this is the way of the future, we might need more bags!
Avatar
Oh yeah.. I guess this only affects the US for now.
Avatar
Avatar
camdeezee.
Wondering what everyone's offices are thinking with the pending release of the iPhone 14 into the wild. With the removal of the physical SIM card, what are all your plans for isolation if you are unable to place it into Airplane mode without a PIN code. I guess our only option now is Faraday bags? If this is the way of the future, we might need more bags!
ScottKjr3347 9/12/2022 1:42 PM
1:42 PM
Buy stock in aluminum foil!
💸 10
Avatar
Invest in microwaves, good for lunch and limited usage of blocking signals
Avatar
Avatar
camdeezee.
Wondering what everyone's offices are thinking with the pending release of the iPhone 14 into the wild. With the removal of the physical SIM card, what are all your plans for isolation if you are unable to place it into Airplane mode without a PIN code. I guess our only option now is Faraday bags? If this is the way of the future, we might need more bags!
You can 'remove' an eSIM by removing the cellular plan from iOS settings > cellular. However, just as with removing a physical SIM, the device will still be able to use emergency cellular services, bluetooth, and wifi (so simply removing a SIM doesn't fully isolate a phone). Enabling airplane mode does prevent even emergency cellular services, but doesn't always turn off bluetooth either (but it will remember if you manually turn it off when in airplane mode).
Avatar
Avatar
Sea9
You can 'remove' an eSIM by removing the cellular plan from iOS settings > cellular. However, just as with removing a physical SIM, the device will still be able to use emergency cellular services, bluetooth, and wifi (so simply removing a SIM doesn't fully isolate a phone). Enabling airplane mode does prevent even emergency cellular services, but doesn't always turn off bluetooth either (but it will remember if you manually turn it off when in airplane mode).
Yeah we do all of that now. I'm referencing seizing phones via Search Warrants and if the control center is disabled unless the phone is unlocked, then we aren't able to place the phone in Airplane mode/disable eSIM... our only option is Faraday or Foil.
👍 1
Avatar
Avatar
camdeezee.
Yeah we do all of that now. I'm referencing seizing phones via Search Warrants and if the control center is disabled unless the phone is unlocked, then we aren't able to place the phone in Airplane mode/disable eSIM... our only option is Faraday or Foil.
Ah OK. I suppose there are already a lot of phones that support eSIM (in addition to a physical SIM), I guess those might just not be commonly encountered yet. Sounds like some standard operating procedures are going to need to be tweaked a bit. (edited)
this 1
Avatar
I need to figure out how to find the funds for the adaptors to modify my faraday cage to support the extraction of phones while they are inside the cage.
this 1
Avatar
Wrap everything in foil? 🤔
Avatar
yes, blocks all signals
Avatar
Avatar
FullTang
I need to figure out how to find the funds for the adaptors to modify my faraday cage to support the extraction of phones while they are inside the cage.
Turn the crime lab into a huge faraday cage 😄
updoot 1
Avatar
Avatar
Sea9
Turn the crime lab into a huge faraday cage 😄
Brilliant! When the boss/wife/investigators try to call me on my cell phone I will be unreachable because I am in my office! Just need to wear headphones and no one will ever bother me ever again lol.
🤣 3
Avatar
Avatar
FullTang
Brilliant! When the boss/wife/investigators try to call me on my cell phone I will be unreachable because I am in my office! Just need to wear headphones and no one will ever bother me ever again lol.
😂 1
Avatar
Avatar
FX_Tymills
Any recommended software or tools to view the data from an MSSQL full backup .BAK file? (edited)
randomaccess 9/12/2022 6:11 PM
I haven't done mssql but assuming the principle still applies. For MSSQL I had to install the database server on my local machine and import the backup. It's not the same as an sqlite db which is self contained and the viewer opens it
Avatar
Avatar
camdeezee.
Yeah we do all of that now. I'm referencing seizing phones via Search Warrants and if the control center is disabled unless the phone is unlocked, then we aren't able to place the phone in Airplane mode/disable eSIM... our only option is Faraday or Foil.
Deleted User 9/12/2022 8:48 PM
Perhaps a signal jammer is the solution but comes with its own set of issues.
Avatar
Avatar
chauan
Thank that you're wrapping a burrito and you don't want any of the juice leaking out.
understood! thank you!
9:14 PM
is rooting an android device legal?
9:14 PM
in the US?
9:15 PM
I recently purchased a few prepaid devices for an android dev course, but noticed that the vendor does not unlock the bootloader
9:16 PM
the motivation is to run frida on an actual device rather than an android vm
Avatar
Avatar
pi0
is rooting an android device legal?
As long as it is your own device or you have legal authority to do so, I don’t know of any US laws restricting rooting an Android device. I don’t know every law in the US, but I would be very surprised if there was a law preventing you from rooting your own phone lol.
Avatar
i thought it would be Ok, but i figured it would be wise to ask first, and yep i own these devices.
Avatar
Avatar
Deleted User
Perhaps a signal jammer is the solution but comes with its own set of issues.
Is there a circumstance where those are not just blanket illegal? I had thought those were a FCC no-no
💯 1
11:19 PM
Like the drone jammer guns etc
Avatar
Avatar
whee30
Is there a circumstance where those are not just blanket illegal? I had thought those were a FCC no-no
Deleted User 9/12/2022 11:22 PM
Good question and I think illegal in most countries. I would think under certain circumstances (controlled environment with jammer emitting small footprint) it might be practical for our use. Android devices will surely follow suit with Apples changes.
Avatar
Avatar
whee30
Is there a circumstance where those are not just blanket illegal? I had thought those were a FCC no-no
Digitalferret 9/13/2022 1:39 AM
one reason FlipperZero device has standard firmware and those that you download at your own risk, given it's wide latitude of capable transmitting frequencies https://flipperzero.one/
Avatar
Avatar
Deleted User
Perhaps a signal jammer is the solution but comes with its own set of issues.
100% will wind you in jail lol
1:48 AM
*assuming you live or are in NA 😃
Avatar
At least you can question the other inmates to see if they know anything about your case 😄
2:26 AM
YMMV 😛
Avatar
Avatar
randomaccess
I haven't done mssql but assuming the principle still applies. For MSSQL I had to install the database server on my local machine and import the backup. It's not the same as an sqlite db which is self contained and the viewer opens it
Yes that's what I ended up doing, it worked a charm
5:16 AM
Thank you
Avatar
Avatar
pi0
is rooting an android device legal?
Legal in the US... yes no law prohibiting you from modifying what you purchased. Voids the warranty on the devices... possibly/probably. If you care about that maybe read the fine print? I know Apple definitely says if you Jailbreak/root the phone it voids all warranties.
Avatar
Avatar
camdeezee.
Legal in the US... yes no law prohibiting you from modifying what you purchased. Voids the warranty on the devices... possibly/probably. If you care about that maybe read the fine print? I know Apple definitely says if you Jailbreak/root the phone it voids all warranties.
Depends on the specific manufacturer but yes this is true for all of them.
Avatar
Going start a project, downloaded Autopsy but my windows 11 is saying it doesn’t recognize the file
Avatar
Digitalferret 9/13/2022 8:16 AM
yet another reason to ditch 11 🤣. sorry, i'll see myself out
😆 1
Avatar
Microsoft literally has the worst os (edited)
8:20 AM
I had less problems on windows 6 tbh
Avatar
Digitalferret 9/13/2022 8:22 AM
agreed. if i hadn't got recovery hardware that requires Win to operate, i'd pretty much bin it overnight
Avatar
I needed to upgrade from my chromebook for school so it was W11 or Macbook
Avatar
Avatar
FullTang
I need to figure out how to find the funds for the adaptors to modify my faraday cage to support the extraction of phones while they are inside the cage.
You can always retro fit this USB filter that misson darkness sells. I inquired about just getting the filter awhile back and adding it to our farday box by drilling a hole and screwing it in. I think they quoted $300 https://www.amazon.com/Mission-Darkness-Transparent-Shielding-Enforcement/dp/B07W3PMY6C?th=1
The Mission Darkness Window Charge & Shield Faraday Bag for Phones allows a device to remain shielded from RF signals and powered after seizure, until it can be transferred to a forensic box, lab, or tool for data extraction. The bag includes a dual sided USB filter, NeoLok closure system for saf...
Avatar
Avatar
Raines
Going start a project, downloaded Autopsy but my windows 11 is saying it doesn’t recognize the file
From services.msc, do you see the Windows Installer service, and it's startup type is not Disabled (Manual is OK). If that's OK, try to run msiexec /i "file.msi" from a command line (in the same path as the file). If that still doesn't work, can you screenshot the error?
Avatar
Avatar
Sea9
From services.msc, do you see the Windows Installer service, and it's startup type is not Disabled (Manual is OK). If that's OK, try to run msiexec /i "file.msi" from a command line (in the same path as the file). If that still doesn't work, can you screenshot the error?
8:40 AM
I’ve downloaded the file but it’s stuck on the installation menu now
Avatar
Try doing the same command with a command prompt opened as an administrator, and see if the error is the same. (Run as Administrator is, for whatever reason, removed from MSI's right-click options in Windows 11, but can be added back to the registry manually if needed).
Avatar
Avatar
Sea9
Try doing the same command with a command prompt opened as an administrator, and see if the error is the same. (Run as Administrator is, for whatever reason, removed from MSI's right-click options in Windows 11, but can be added back to the registry manually if needed).
Weird so I updated my os and I can’t even uninstall the file for redownloading (edited)
9:20 AM
Okay I got it running
Avatar
Avatar
Raines
Okay I got it running
Digitalferret 9/13/2022 9:30 AM
nice one 👍🏻 - did you work out why it was failing ?/ (edited)
Avatar
Avatar
Digitalferret
nice one 👍🏻 - did you work out why it was failing ?/ (edited)
Have no clue what happened tbh
Avatar
Avatar
DCSO
You can always retro fit this USB filter that misson darkness sells. I inquired about just getting the filter awhile back and adding it to our farday box by drilling a hole and screwing it in. I think they quoted $300 https://www.amazon.com/Mission-Darkness-Transparent-Shielding-Enforcement/dp/B07W3PMY6C?th=1
I saw that posted here a while back and bought one for the office, but I can't seem to figure out how to connect an iPhone that is inside of that faraday bag to a forensic tool (namely GK). @whee30 suggested a USB-A to female lightning adaptor and I purchased one from Amazon but GK will not recognize the device through the USB filter. I was thinking about getting an Ethernet (RJ-45) filter for the faraday cage and putting the GK inside of the faraday cage, do you have any thoughts or ideas? https://www.amazon.com/gp/product/B07W7YQT4S/ref=ppx_yo_dt_b_search_asin_title?ie=UTF8&psc=1
Model Number: A8197 Anker USB-A to Lightning Audio Adapter The Lightning Adapter with Flawless Sound Keep Listening With this adapter, you don’t need to use separate headphones for your phone and laptop. Just connect the adapter to any USB port to instantly start using your Lightning headphones. ...
Avatar
Avatar
Raines
Have no clue what happened tbh
Digitalferret 9/13/2022 9:46 AM
Gremlins 🙂
Avatar
What channel do I go for project ideas?
Avatar
Avatar
Raines
What channel do I go for project ideas?
Andrew Rathbun 9/13/2022 9:48 AM
like...on GitHub? or something else?
Avatar
Avatar
Andrew Rathbun
like...on GitHub? or something else?
On autopsy I want to work on a investigation. This would be my first project
Avatar
Avatar
Raines
On autopsy I want to work on a investigation. This would be my first project
Andrew Rathbun 9/13/2022 9:52 AM
by project do you mean investigation? Are you looking for test images to learn on? Or something else? I am a bit confused with the terminology used here
Avatar
Avatar
Andrew Rathbun
by project do you mean investigation? Are you looking for test images to learn on? Or something else? I am a bit confused with the terminology used here
Just learn on. I have a internship in CF next year that deals with analyzing potential fraud and some threads I’ve seen online suggest start with Autopsy
Avatar
Avatar
Raines
Just learn on. I have a internship in CF next year that deals with analyzing potential fraud and some threads I’ve seen online suggest start with Autopsy
Andrew Rathbun 9/13/2022 9:54 AM
Nothing against Autopsy, but that's probably because it's freely available. I don't know many companies that use Autopsy as a daily driver but it's perfectly fine to learn on. Others may have different opinions though
Avatar
Avatar
Andrew Rathbun
Nothing against Autopsy, but that's probably because it's freely available. I don't know many companies that use Autopsy as a daily driver but it's perfectly fine to learn on. Others may have different opinions though
I’m open to all tools to use. Anything that I can learn on and replicate to real life experience
9:56 AM
I’ve gotten my certs and doing my degree and all but my classes don’t let students try first hand and make projects so we have to find how to do it else where if that makes sense
Avatar
Andrew Rathbun 9/13/2022 9:56 AM
"make projects" seems to mean "do an investigation" in your terms, is that correct?
Avatar
I say investigation cause that’s the position for my internship I’ll be working in
Avatar
Avatar
camdeezee.
Legal in the US... yes no law prohibiting you from modifying what you purchased. Voids the warranty on the devices... possibly/probably. If you care about that maybe read the fine print? I know Apple definitely says if you Jailbreak/root the phone it voids all warranties.
thank you for the clarification, this is good to hear! unfortunately these devices do not seem to be root-able, even tho they are several years old.
👎 1
Avatar
Avatar
Raines
Weird so I updated my os and I can’t even uninstall the file for redownloading (edited)
And that’s why we use a virtual machine to work on and not our host OS. 😂
Avatar
Avatar
Raines
I’m open to all tools to use. Anything that I can learn on and replicate to real life experience
Digitalferret 9/13/2022 12:17 PM
you found 13Cubed yet? https://www.13cubed.com/, then there's a raft of other kit like CAINE/Tsurugi/Paladin/Parrot/Kali etc. good selection of LiveCD/USB kit. but as wRathbunny said, it's usually proprietory software once you get "out there". Fundamentals remain the same, different machinery though, often to streamline processes (edited)
12:18 PM
then grab some old drives from ebay/craigs? see what you can work through, tools wise
☝️ 1
Avatar
Halfway through the Autopsy walkthrough, do I need to use hash database
Avatar
It’s good for looking for known files such as CSE, classified/sensitive documents and more. You can download DBs of hashes iirc and use that to include or exclude files eg windows system files
Avatar
Avatar
Raines
Halfway through the Autopsy walkthrough, do I need to use hash database
Deleted User 9/13/2022 9:14 PM
You can download images from here to practice on as well: https://digitalcorpora.org/
Avatar
Anyone had any issues with Bitlockered forensic machines? We are getting new kit and IT are insisting they are Bitlockered, so just putting it out there in case there are any 'quirks'. I have contacted MSAB and Cellebrite... (edited)
Avatar
Digitalferret 9/14/2022 1:21 AM
"IT are insisting they are Bitlockered" ... no idea but I'd probably be the cynic asking them what their contingency plan is when SHTF 🙂
😂 3
Avatar
Avatar
Digitalferret
"IT are insisting they are Bitlockered" ... no idea but I'd probably be the cynic asking them what their contingency plan is when SHTF 🙂
Not likely to leave it in a taxi...
Avatar
Avatar
Zhaan
Not likely to leave it in a taxi...
Digitalferret 9/14/2022 4:21 AM
lol nah, but having seen "halp, my drive died and it's bitlockered" a few times I'm wondering about te balance of it all. i mean, who are they hiding the drive data from when it's off?
Avatar
Doofenshmirtz 9/14/2022 4:50 AM
what recommended certs are for blue teaming , mainly computer forensics to land good role. yes SANS ones are great but they are very costly.
Avatar
Avatar
Doofenshmirtz
what recommended certs are for blue teaming , mainly computer forensics to land good role. yes SANS ones are great but they are very costly.
When wondering about public certifications, I usually take a look at this: https://pauljerimy.com/security-certification-roadmap/ It's not perfect, but offers a good overview of popular certifications (unfortunately, it doesn't include SANS courses, but since you're excluding SANS anyway that is OK). Additionally, if you are in law enforcement, you may have an option to take NCFI courses that are not listed. There are a lot of GIAC courses in the forensics category, those are the ones that are usually paired up with SANS courses and are popular in the government sphere... they are expensive, but they are not the only option. If interested in clearance or government work, be sure to check the list of approved courses for the role you are interested in. DoD/Military: https://public.cyber.mil/cw/cwmp/dod-approved-8570-baseline-certifications/ FBI: https://www.tlglearning.com/wp-content/uploads/2020/07/FBI_CyberPage_AdditionalCertificates.pdf (typos are on this list, but couldn't find a list on the FBI's official site) National White Collar Crime Center: https://www.nw3c.org/certifications/nw3c-recognized-certifications. GIAC's GCFA ticks the most boxes for traditional forensics, generally. But for blue teaming, you may want to consider the BTL1 or BTL2 (also pricey), or eLearnSecurity's eCTHPv2. Currently, eLearnSecurity is a more budget-friendly option, which makes it great for people who are advancing their own careers or exploring their interests - but the price has been creeping up. Neither of those are on the 'approved certifications' lists referenced above, but are still good options for blue teaming.
Salute 3
6:38 AM
Speaking of certifications and training, does anyone know if NCFI courses are exclusively available to law enforcement, or can people in the public sector enroll too?
Avatar
Avatar
Sea9
Speaking of certifications and training, does anyone know if NCFI courses are exclusively available to law enforcement, or can people in the public sector enroll too?
I know that courses are offered for judges and prosecutors, but the selection process for who attends the courses is entirely handled by the USSS. I would contact your local USSS field office and let them know you are interested and see what they have to say.
👍 2
Avatar
Andrew Rathbun 9/14/2022 10:02 AM
#dfir-discussion-forum created! Discord just rolled out the Forums feature to us, so let's check it out and see how we like it
🔥 2
Salute 1
Avatar
Good morning, anyone have a basic cellphone PowerPoint investigation course for LE they would be willing to share?
Avatar
Thumbs up or down if a channel for cell-site-analysis would be beneficial.
👍 24
👎 2
Avatar
Avatar
uochaos
Thumbs up or down if a channel for cell-site-analysis would be beneficial.
Andrew Rathbun 9/14/2022 1:35 PM
@Law Enforcement [USA] or any other countries (sorry not as familiar if this is a thing outside of the US, frankly)
Avatar
Avatar
mitchlang
Good morning, anyone have a basic cellphone PowerPoint investigation course for LE they would be willing to share?
Check out NDCAC for local training, they put one on with their CAST team utilizing CASTviz.
Avatar
Avatar
Sea9
Speaking of certifications and training, does anyone know if NCFI courses are exclusively available to law enforcement, or can people in the public sector enroll too?
You have to be working for a law enforcement agency if you wish to attend the examiner courses. I know a civilian examiner who works for a suburban agency just went to a few courses.
Avatar
Avatar
uochaos
Thumbs up or down if a channel for cell-site-analysis would be beneficial.
Andrew Rathbun 9/14/2022 3:03 PM
#cell-site-analysis the people have spoken
Salute 3
Avatar
Digitalferret 9/15/2022 12:15 AM
so, anyone had issues with Win accessing drives? weird one for me: writing to a USB pen last night and it balks, saying can't write to device. ok, usual crap, USB pen is dying, methinks.
12:16 AM
before bed, i'm copying a half full 2TB drive to another using PC-3000 as the first drive made a few odd noises. set it all going, went to bed at say 30%
12:17 AM
get up this morning, and it got not much further. error with Targte drive, not source. same as USB cannot create folder/file on target. coincidence?
Avatar
are they on the same network?
12:20 AM
make a simple python server and transfer live over copper xD
Avatar
Digitalferret 9/15/2022 12:21 AM
its on the same machine (edited)
12:25 AM
and i get the speed/economy thing of Assembler/C/Python thing. i was nerding on Python. i can't barely write 10 lines of the stuff. Assembler for me goes back to programming PIC back in the 90s
Avatar
Avatar
Digitalferret
get up this morning, and it got not much further. error with Targte drive, not source. same as USB cannot create folder/file on target. coincidence?
Have you tried checking the USB drive for errors with chkdsk /x /f or by the drive Properties in Windows Explorer? I'd also uncheck the power management boxes for each of the USB Hubs in Device Manager, like this:
Avatar
Avatar
Xenotype
Have you tried checking the USB drive for errors with chkdsk /x /f or by the drive Properties in Windows Explorer? I'd also uncheck the power management boxes for each of the USB Hubs in Device Manager, like this:
Digitalferret 9/15/2022 10:39 AM
properties are all good, but thanks. just odd that the same happened with a SATA connected drive, later
Avatar
Avatar
Digitalferret
properties are all good, but thanks. just odd that the same happened with a SATA connected drive, later
Hmm... Yeah, that's strange.
Avatar
Avatar
Xenotype
Hmm... Yeah, that's strange.
Digitalferret 9/15/2022 10:49 AM
think i found the issue with the SATA copy. PC-3000 see's system files like $Extend and $RECYCLE.BIN - think Win was balking by protecting the ones already on there and preventing writes.
Avatar
Avatar
Digitalferret
think i found the issue with the SATA copy. PC-3000 see's system files like $Extend and $RECYCLE.BIN - think Win was balking by protecting the ones already on there and preventing writes.
Oh, that makes sense. Glad you found it out
Avatar
can someone help me out with a plaso command? I've been banging my head against a wall trying to get this to work on a triage folder
10:57 AM
log2timeline.py -z 'Europe/Amsterdam' --parsers 'win7' plaso.dump /mnt/c/Users/User/Downloads/c70-AD-101/AD-101/Collection/D/
10:58 AM
but every time it returns unrecognized argument: /mnt/c/Users/User/Downloads/c70-AD-101/AD-101/Collection/D/
Avatar
Avatar
Digitalferret
its on the same machine (edited)
One line python -m http.server
11:27 AM
If you want a special port add it as an argument python -m http.server 8080
11:27 AM
Transfer files all day long.
Avatar
Avatar
Digitalferret
its on the same machine (edited)
Oh I just read that wrong. Same machine xD so I guess you don’t need a network then , just disk to disk. My bad
11:29 AM
👉👈
Avatar
Digitalferret 9/15/2022 11:30 AM
ur on a python mission aren't you, lol.
11:32 AM
Sometimes the smallest details slip us by lmao (edited)
11:32 AM
Especially as you get older
11:32 AM
Even dudes in my dreams are calling me an old man now it’s wild.
Avatar
Avatar
Fierry
can someone help me out with a plaso command? I've been banging my head against a wall trying to get this to work on a triage folder
your version may require --storage_file
Avatar
hmm let me try
Avatar
e.g. log2timeline.py --parsers win7_slow --status_view none --storage_file /out/plaso.body /in
Avatar
even the basic version
Avatar
it was a recent change (during the pandemic, where time is a blur)
Avatar
log2timeline.py plaso.dump AD.E01 didnt work
Avatar
yeah throw --storage_file before your plaso intermediary file
11:35 AM
definitely not before the input data, or it will overwrite
11:35 AM
sorry it might be --storage-file not underscore
Avatar
it worked 🥠
catjam 1
Avatar
the --status_view none you can omit, that's just something I throw on when running inside a docker container to avoid filling up the docker logs
Avatar
I'll update my documentation because even the log2timeline help textt doesnt include this in its default example (edited)
Avatar
yeah... it did make it to their readthedocs but I think I ran into a similar thing with it not in the help text
11:39 AM
The command I used was adapted from the FOR508 courseware and i was really struggling to see why it didnt work 🙂
Avatar
breaking changes seem to be a fact of life with a lot of these tools
11:40 AM
libbde versions required by plaso vs other tools frequently caused headaches for us in the past, which is why we run it in a docker container
11:41 AM
for bitlocker decryption
Avatar
sounds like a good idea 😄
Avatar
Digitalferret 9/15/2022 11:52 AM
nice on Rayeh 🙂
👍 1
8:25 PM
Congrats on resource of the year @Andrew Rathbun
Avatar
Andrew Rathbun 9/15/2022 8:26 PM
That was actually last years! 2022's has not been added to the site yet, but thanks 🙂 it was a threepeat for this community and that's all YOUR fault
8:27 PM
It's also confusing because even though the link you provided above says 2021, it's actually the awards for calendar year 2020, but those awards occur in 2021, yet they're called the 2021 awards but they're for calendar year 2020 haha
Avatar
Lol
8:44 PM
Well preemptive congrats then
💯 5
Avatar
Apparently there was an internal network share that contained powershell scripts... "One of the powershell scripts contained the username and password for a admin user in Thycotic (PAM) Using this i was able to extract secrets for all services, DA, DUO, Onelogin, AWS, GSuite"
Likes
410
Avatar
Classic
Avatar
Breach of the year so far I reckon
Avatar
Today we made a Intel build as last time we used AMD https://ryd3v.rocks/posts/intelwrkstn I will post to GitHub asap
Ryan Collins, Software Engineer, teaching programming, development, React, Next.js
💯 2
Avatar
Did you see this? https://www.msn.com/en-au/video/sport/adelaide-man-challenging-nab-over-failure-to-act-on-scam-that-claimed-his-life-savings/vi-AA11YzeI?ocid=msedgdhp&cvid=42a3da908d734409b425b480e5e19a61 Spoofing Names, Gov/NAB should be responsible you get taught smishing/phising to look out for Tellsigns but this is almost hard to tell apart even for a Techincal person
Avatar
on another note how did them TA's manage to spoof SMS names like 'NAB'?
Avatar
Avatar
blkho
Did you see this? https://www.msn.com/en-au/video/sport/adelaide-man-challenging-nab-over-failure-to-act-on-scam-that-claimed-his-life-savings/vi-AA11YzeI?ocid=msedgdhp&cvid=42a3da908d734409b425b480e5e19a61 Spoofing Names, Gov/NAB should be responsible you get taught smishing/phising to look out for Tellsigns but this is almost hard to tell apart even for a Techincal person
Digitalferret 9/19/2022 12:50 AM
thats nothing. twice in 3 months I've been spear phished over a property i own, from legal professionals. Actual Solicitors (attorneys) registered with professional trade bodies. they go to land registry and then send out speculative generic paperwork asking where i want papers served because <reason>.
Avatar
Hello... Did anyone try to send any requests to Tutanova till now to find more info about some email accounts? I'm asking because I have seen they don't have any specific point of contact for law enforcement, just a regular email address for contact support.
Avatar
Avatar
ZetLoke77
Hello... Did anyone try to send any requests to Tutanova till now to find more info about some email accounts? I'm asking because I have seen they don't have any specific point of contact for law enforcement, just a regular email address for contact support.
Digitalferret 9/19/2022 8:17 AM
this would indicate it's at least possible. https://tutanota.com/blog/posts/transparency-report/
8:22 AM
there's also <abuse@tutao.de>
Autopsy 1
Avatar
Doofenshmirtz 9/19/2022 9:26 AM
hello! where to start mobile device forensics suggests me a book and practice material ( as cyber defenders, BTLO for Blue team content )
Avatar
You can look around for some books for the basic concepts... I have "practical mobile forensics" on my shelf next to me. As far as current artifacts and how to interpret the trendy apps, find some blogs to follow. Smart folks are doing solid research all the time and I stand on their shoulders to work my cases.
10:14 AM
Also check out #training-education-employment . @stark4n6 has a great list of resources at https://start.me/p/q6mw4Q/forensics
A startpage with online resources about Forensics, created by Stark 4N6.
♥️ 3
Avatar
Hello everyone, Any idea of what user manipulation can initiate a 4647 event id ?
Avatar
What do you mean by manipulation? 4647 is the standard Windows User Logoff
Avatar
Avatar
Tcisaki
What do you mean by manipulation? 4647 is the standard Windows User Logoff
For example, when your session is locked, when you press "ctrl+alt+del" , you have any option to " disconnect" or "logoff". You just have the option to reboot, shutdown or sleep
Avatar
Avatar
CWolf
For example, when your session is locked, when you press "ctrl+alt+del" , you have any option to " disconnect" or "logoff". You just have the option to reboot, shutdown or sleep
So i was curious if there was any manipulation can create this event
Avatar
can anyone help with a icloud SW... I got the production and downloaded all the gpg files. I now have a bash file to asssit in decompressing all the gpg files... I cant figure out the bash thing...
Avatar
Any good book recommendations regarding NSIT CSF, FAIR, or just risk management in general? The ones I've seen had some reviews that have left me questionable
Avatar
Avatar
Jetten_007
can anyone help with a icloud SW... I got the production and downloaded all the gpg files. I now have a bash file to asssit in decompressing all the gpg files... I cant figure out the bash thing...
how exactly do you decompress a gpg key? usually those are not compressed in any way, do you mean jpg?
Avatar
anyone ever come across Snagscope?
6:08 AM
Periscope capturing app before Periscope was shut down
Avatar
Avatar
Jetten_007
can anyone help with a icloud SW... I got the production and downloaded all the gpg files. I now have a bash file to asssit in decompressing all the gpg files... I cant figure out the bash thing...
are you using the script provided by Apple? If so have you set up all the pre-requisites in the Read Me document they provide? Once you do that, the script should work great. It will download all the GPG files, unencrypt them, and then unzip all the zip files and then delete all the .zip files. You don't even need to download all the .gpg files manually first.
Avatar
So Snapchat for Web seems to be a new thing that’s just launched. Text only but potentially a food source of evidence, especially given how elusive Snapchat can be to investigators
Avatar
Hey guys, how does one find lateral movement with Event logs?
8:38 AM
Can it be done?
Avatar
Avatar
0xSxS
Hey guys, how does one find lateral movement with Event logs?
Andrew Rathbun 9/20/2022 9:29 AM
RDP events (TS-LSM: 21, 24, 25) can show connect, disconnect, and reconnect events. We use that all the time in IR to track where the threat actor has gone within the environment with compromised accounts
Avatar
APFS test image? Anyone got one? Need one to validate software. Don’t want to reinvent the wheel if someone already has a good one.
Avatar
thatboy_leo 9/20/2022 2:19 PM
What would be the best way to upload NIST hashset to PA? I can't view the entire list on excel so worried I may lose data after converting the file from .txt to .csv and removing the duplicates from excel
Avatar
Avatar
thatboy_leo
What would be the best way to upload NIST hashset to PA? I can't view the entire list on excel so worried I may lose data after converting the file from .txt to .csv and removing the duplicates from excel
You don't need to convert from txt to csv. Just select text then point to the txt file.
💯 1
Avatar
Is It Done Yet? 9/21/2022 1:27 AM
Has anyone had any experience analysing the /log/sdp_log file within Android? or does anyone have any useful resources to help digest what all of the logs mean?
1:28 AM
I am currently looking to identify whether a device had a lock on it at a specific date/time (not when the extraction itself was completed). So figured this is going to be the best place to start albeit I cannot find much documentation online as to how to analyse it.
Avatar
Avatar
Is It Done Yet?
Has anyone had any experience analysing the /log/sdp_log file within Android? or does anyone have any useful resources to help digest what all of the logs mean?
Andrew Rathbun 9/21/2022 3:54 AM
#mobile-forensic-decoding
Avatar
Looking for suggestions for Forensic Case Management systems. We presently pay for a product, but are looking to see if there is anything else out there for tracking cases. I am looking for a product that will track the case, devices, software/hardware used, hours, etc. Any suggestions? I know a lot of people use custom made software, but we are not in a place to make our own. I have numerous spreadsheets I am using currently, to validate the case management system we currently own. However, I am looking for something which is customizable and allows me to run reports to obtain my data. TIA
Avatar
Avatar
sholmes
Looking for suggestions for Forensic Case Management systems. We presently pay for a product, but are looking to see if there is anything else out there for tracking cases. I am looking for a product that will track the case, devices, software/hardware used, hours, etc. Any suggestions? I know a lot of people use custom made software, but we are not in a place to make our own. I have numerous spreadsheets I am using currently, to validate the case management system we currently own. However, I am looking for something which is customizable and allows me to run reports to obtain my data. TIA
randomaccess 9/21/2022 1:43 PM
Theres a lot of them out there. Magnet has Atlas, cellebrite has one I can't remember the name. Monolith has been good when Ive used it and it's a bit cheaper than atlas from memory.
Avatar
Avatar
randomaccess
Theres a lot of them out there. Magnet has Atlas, cellebrite has one I can't remember the name. Monolith has been good when Ive used it and it's a bit cheaper than atlas from memory.
Thanks for that info. I looked into Atlas, and that is a bit more than what I want. I don't need the ability to collaborate on cases in an application. I am looking for something more along the line of a case tracking system, which will document chain of custody, examiner notes on cases, software/hardware used on each device in a case, etc. I hadn't checked into Monolith before. It might be more in line with what I am thinking. They are VERY proud of their product at $1,200 per user. Not sure what their enterprise fees are, but it might be worth reaching out to them.
Avatar
@randomaccess have you ever heard of Lima software?
Avatar
Avatar
sholmes
@randomaccess have you ever heard of Lima software?
randomaccess 9/21/2022 2:13 PM
Heard of, never used
👍 1
Avatar
Avatar
sholmes
Thanks for that info. I looked into Atlas, and that is a bit more than what I want. I don't need the ability to collaborate on cases in an application. I am looking for something more along the line of a case tracking system, which will document chain of custody, examiner notes on cases, software/hardware used on each device in a case, etc. I hadn't checked into Monolith before. It might be more in line with what I am thinking. They are VERY proud of their product at $1,200 per user. Not sure what their enterprise fees are, but it might be worth reaching out to them.
Search Kirjuri Forensic
👍 1
Avatar
Avatar
JBGA-BR
Search Kirjuri Forensic
This Kirjuri? Archived and hasn’t been updated in 2 years.
Avatar
Hey everyone, I majored in IT and minored in DF in Minnesota. For my DF minor I read allot about computer law and I feel fairly strong on the basics from an academic standpoint. After one of my law classes I asked the professors about how several websites I had noted which host probably millions of copyrighted games, software or books in digital format can still exist. However, the professor basically chose not to answer. The only thing I see mentioning copyright is a link labeled DMCA at the bottom of the page that brings one to a disclaimer which basically states: "if you are the copyright owner of something here, please make a formal request if you'd like it taken down". My question was how does a mere disclaimer behind a link affect the legality of such a website to operate? (edited)
Avatar
Avatar
Caleb
Hey everyone, I majored in IT and minored in DF in Minnesota. For my DF minor I read allot about computer law and I feel fairly strong on the basics from an academic standpoint. After one of my law classes I asked the professors about how several websites I had noted which host probably millions of copyrighted games, software or books in digital format can still exist. However, the professor basically chose not to answer. The only thing I see mentioning copyright is a link labeled DMCA at the bottom of the page that brings one to a disclaimer which basically states: "if you are the copyright owner of something here, please make a formal request if you'd like it taken down". My question was how does a mere disclaimer behind a link affect the legality of such a website to operate? (edited)
Deleted User 9/21/2022 9:17 PM
Sometimes the DMCA related contact is just for show. One revenge porn matter I worked on the site owner gave zero response and never had any intent of honoring any request. Some sites will adhere while others might respond like the PirateBay team used to by saying that they do not fall under antiquated US law and (loophole) they did not physically host any copyrighted data. The documentary on it all is quite interesting and is on YouTube. The Aaron Schwartz doc is also worth a watch RE copyright.
Avatar
I recently did some pen test ctf and where I got shell as ‘www-data’ on linux machine. After the ctf I got thinking of this from a forensic perspective, is the commands run as www-data stored anywhere?
Avatar
Avatar
d0uch3bag
I recently did some pen test ctf and where I got shell as ‘www-data’ on linux machine. After the ctf I got thinking of this from a forensic perspective, is the commands run as www-data stored anywhere?
Deleted User 9/21/2022 11:04 PM
Shell history.
Avatar
Avatar
Deleted User
Shell history.
Where is that file stored for www-data? (For normal user I know about the .bash_history file) but for other users?
Avatar
Avatar
d0uch3bag
Where is that file stored for www-data? (For normal user I know about the .bash_history file) but for other users?
Deleted User 9/21/2022 11:25 PM
Should be home dir unless I am missing something. The sys log should also capture events.
Avatar
Does www-data have a home dir ? 🤔 (edited)
11:29 PM
I never encountered it thus far
Avatar
Not usually, just a user that is created to run the web server with low priv instead of running as root
Avatar
That’s my thought too but I’m happy to be proven wrong 🙂 (edited)
11:30 PM
It’s always nice to get new artifacts
Avatar
@Fierry ye same here. Will try and look into this a bit more once I get the time to do it 🙂
Avatar
this is maybe a stupid question, but #rules says i need to read #readme and post in #role-assignment for complete access to the discord server, but i do not see either of those channels. what am i missing?
Avatar
Avatar
Fierry
Does www-data have a home dir ? 🤔 (edited)
var
Avatar
That’s a probable path to the logging folder 🙂
Avatar
is it a linux box?
Avatar
Avatar
namreeb
this is maybe a stupid question, but #rules says i need to read #readme and post in #role-assignment for complete access to the discord server, but i do not see either of those channels. what am i missing?
You just have to read the rules, then select role
Avatar
Avatar
ryd3v
You just have to read the rules, then select role
Digitalferret 9/22/2022 1:35 AM
all good, he couldn't see the chans. fixed our side
Salute 5
Avatar
Avatar
ryd3v
is it a linux box?
Yes, its a linux box
Avatar
Avatar
sholmes
@randomaccess have you ever heard of Lima software?
I used to use this in my old organisation, worked well but I am not sure of their pricing models now. I don't remember it being expensive though! I will also add, it formed a large part of our ISO 17025 accreditation and met the requirements for that pretty well. (edited)
👍 1
Avatar
Avatar
sholmes
@randomaccess have you ever heard of Lima software?
Andrew Rathbun 9/22/2022 8:05 AM
I think our lab uses this but I've never used it
👍 1
Avatar
What is y'alls preferred methods/tools for on-scene mobile device triage?
10:02 AM
Our current method is either manual preview (not ideal) or dumping the phone with Cellebrite, opening dump in Physical Analyzer, tagging the necessary artifacts, creating a quick report, copying to results flashdrive, and giving to Agent so they can obtain arrest warrant. With how big phones are getting, that has started to take way too long, even if we do a logical partial and limit to Photos and Videos. Is there a tool out there that would make this process faster or easier? For mobile devices, most of the time we're mostly focusing on pictures and videos. (CSAM). Applications, chats, and web history are of secondary interest too.
Avatar
Avatar
RyanB
What is y'alls preferred methods/tools for on-scene mobile device triage?
Is It Done Yet? 9/22/2022 1:02 PM
1:02 PM
ADF Solutions makes the best mobile device forensics tools for smartphone and tablet triage with instant mobile preview, screenshots and fast phone imaging
1:04 PM
For reference I have only used Cyacomb in a trial capacity - but the concept is intriguing
Avatar
Both good tools, but as with all approaches relying on some form of Hash/PhotoDNA matching, you will miss a lot of CSAM when only relying on those methods (anything first gen, anything modified too much, anything not in your version of the hash DB (CAID, VIC etc). We are soon to release a new CSAM classifier which reaches 80% + CSAM recall with low false positives (we can get close to 100% but the FP increases, so this is a trade off) - in my opinion going forwards, people should be thinking about combining hash/pDNA and classifier methods together, to limit the chance of missing a lot of stuff on that initial scan.
Avatar
Anybody know a good solution for offline version virustotal or similar?
Avatar
Avatar
d0uch3bag
Anybody know a good solution for offline version virustotal or similar?
Digitalferret 9/23/2022 3:18 AM
Virustotal polls something like 70 AV programs, not sure how you'd do that offline unless you also had that many
Avatar
Avatar
d0uch3bag
Anybody know a good solution for offline version virustotal or similar?
There is/was Malice. The repo has been archived though. 😕 https://github.com/maliceio/malice
VirusTotal Wanna Be - Now with 100% more Hipster. Contribute to maliceio/malice development by creating an account on GitHub.
Avatar
Avatar
d0uch3bag
Anybody know a good solution for offline version virustotal or similar?
Avatar
Digitalferret 9/23/2022 3:47 AM
how do these work offline if it's showing need to upload files? are you hosting your own (VT clone) essentially?
Avatar
Avatar
Digitalferret
how do these work offline if it's showing need to upload files? are you hosting your own (VT clone) essentially?
Avatar
Digitalferret 9/23/2022 3:57 AM
yep, ELI5 though? are you essentially hosting your own Virustotal type server and then linking to live databases online? trying to get my head round this as a lot of AV's now still have to d/l defns from the web.
Avatar
Does Microsoft 365 business Premium have any out of the box audit logging? An account has been abused to send phishing mails but the client doesnt seem to have it set up :/ so no UAL (edited)
6:32 AM
Alternatively, are there any other logging sources I can use to track mail activity? (edited)
Avatar
Avatar
Is It Done Yet?
For reference I have only used Cyacomb in a trial capacity - but the concept is intriguing
I’m familiar with ADF so I reached out for a trail of the mobile version. Haven’t gotten it yet. Hadn’t heard of Cyacomb though, so thank you for that! I will reach out to them for a trial.
Avatar
does anyone use any kind of over-arching timelining tools?
10:20 AM
so ingesting from multiple sources to create a central timeline of events
Avatar
Does anyone know what this small pouch is for? Headphones? Makeup? (Or, maybe it's just a generic pouch.) Google has not been helpful, so far at least.
Avatar
Avatar
Sudo
does anyone use any kind of over-arching timelining tools?
Plaso can work well for that. (edited)
Avatar
Avatar
Arsenal
Does anyone know what this small pouch is for? Headphones? Makeup? (Or, maybe it's just a generic pouch.) Google has not been helpful, so far at least.
I think it's the 24-7 bag from flip & tumble. It's opens to a full-sized pouch. https://flipandtumble.com/products/24-7-bag?variant=23709218051
💯 1
Avatar
Avatar
5cary
Plaso can work well for that. (edited)
yeah I was looking at that but not sure it'll do what I'm lookin for
Avatar
Avatar
laurenw
I think it's the 24-7 bag from flip & tumble. It's opens to a full-sized pouch. https://flipandtumble.com/products/24-7-bag?variant=23709218051
That’s almost certainly it… in compact form it looks identical to the evidence photo. Thank you!
Avatar
Avatar
Sudo
so ingesting from multiple sources to create a central timeline of events
Multiple sources as in multiple hosts?
12:53 PM
As an alternative I think you can monitor certain folders and kick of a script as soon as a file enters the directory 🙂
12:53 PM
And kick of another script when a plaso.dump file is created etc
Avatar
Another alternative would be case management software. A free tool is Aurora which allows you to manage a case, create notes, track lateral movement and create an overall manual timeline 🙂
Avatar
Avatar
Fierry
Multiple sources as in multiple hosts?
forensic tool exports
1:14 PM
CSVs probably
Avatar
CSV files can be imported by Aurora. I think you need to match a certain format but that’s doable with scripting 🙂
1:16 PM
I’m unsure if plaso can take the values contained within the CSV and use those as data. Most likely not
1:17 PM
Another tool ( this one I haven’t used) is the hive https://thehive-project.org/
Scalable, Open Source Security Incident Response Solutions designed for SOCs & CERTs to collaborate, elaborate, analyze and get their job done
Avatar
thanks!
1:19 PM
I figured I might have to ingest or convert with python
1:19 PM
but most of the tools do export the date in the same format I think
Avatar
Finally some standardization 😉
Avatar
Avatar
Sudo
CSVs probably
Timesketch, Header Mapping for CSV imports Introduction Timesketch  is an open-source tool for collaborative forensic timeline analysis. T...
Avatar
Ooh nice 😋
1:05 AM
That’s a really recent blog
Avatar
juba0x00 🇵🇸 9/24/2022 5:49 AM
Hello, everyone
5:50 AM
I'm a newbie, want a help please
Avatar
Avatar
juba0x00 🇵🇸
I'm a newbie, want a help please
Can you be a little more specific?
Avatar
Avatar
Beercow
Can you be a little more specific?
juba0x00 🇵🇸 9/24/2022 7:19 AM
I want to start studying Digital Forensics, Could you please suggest me a good road map. Should I study Microsoft Certified Solutions Associate and Certified Network Defender before starting Digital Forensics ? (edited)
Avatar
Avatar
juba0x00 🇵🇸
I want to start studying Digital Forensics, Could you please suggest me a good road map. Should I study Microsoft Certified Solutions Associate and Certified Network Defender before starting Digital Forensics ? (edited)
Andrew Rathbun 9/24/2022 9:47 AM
What do those acronyms mean? Just so we are on the same page. They can mean different things to different people
Avatar
Avatar
Andrew Rathbun
What do those acronyms mean? Just so we are on the same page. They can mean different things to different people
juba0x00 🇵🇸 9/24/2022 10:31 AM
Sorry, I've edited the message
Avatar
Well, to be honest, what area of forensics are you looking to get into? Forensics is a pretty broad field. Are you thinking network, endpoint, cloud, etc… These can also be broken down further.
Avatar
juba0x00 🇵🇸 9/25/2022 12:53 AM
Could Digital Forensics be my first job, or Digital Forensics is not an entry-level job and I should have an experience in Cyber Security ?
Avatar
I can recommend a broad base of Linux/Windows, networking and general sysadmin knowledge 🙂
1:44 AM
Also, digital forensics can be done in law enforcement and incident response. Both cover different fields and generally handle different types of cases
Avatar
Avatar
juba0x00 🇵🇸
Could Digital Forensics be my first job, or Digital Forensics is not an entry-level job and I should have an experience in Cyber Security ?
I’m probably not the best person to answer this because I kind of lucked out. I went from building doors, going back to school, then interning on a soc. They hired me on and invested in their people. I was able to take SANS courses and hear I am. 😊
Avatar
Yep, SOC is a good way to get into it 🙂
Avatar
Avatar
Beercow
I’m probably not the best person to answer this because I kind of lucked out. I went from building doors, going back to school, then interning on a soc. They hired me on and invested in their people. I was able to take SANS courses and hear I am. 😊
randomaccess 9/25/2022 2:18 AM
Also you have an affinity for pulling apart binary formats and writing tools 😛 so not entirely luck
💯 1
Avatar
juba0x00 🇵🇸 9/25/2022 2:21 AM
Is there a good detailed road map you would suggest please @Fierry @randomaccess @Beercow
Avatar
My biggest thing is genuine curiosity. In other words, not just using a tool, running a command, pushing a button. Why is it telling me this, where is the data coming from.?
💯 3
Avatar
Avatar
juba0x00 🇵🇸
Is there a good detailed road map you would suggest please @Fierry @randomaccess @Beercow
I can give you the roadmap I followed. The only thing planned in this was a general IT education everything else kinda just happened:
  • General IT education
  • Did a bachelor focused on computer networks with a major in digital forensics
  • did a masters in criminology
  • Joined a DFIR/SOC employer
  • Switched to pentesting for a few years
  • Now combining the two fields 😋
💯 1
Avatar
Avatar
Beercow
My biggest thing is genuine curiosity. In other words, not just using a tool, running a command, pushing a button. Why is it telling me this, where is the data coming from.?
Seconded
💯 2
Avatar
randomaccess 9/25/2022 2:31 AM
There is no roadmap
2:31 AM
There's a variety of paths
Avatar
Digitalferret 9/25/2022 2:32 AM
dig, dig, dig, dig. school report as a kid said i had "an unquenchable thirst for knowledge" - PC speak for an irritatingly and irrepressably nosey bastage of a kid (edited)
Avatar
randomaccess 9/25/2022 2:32 AM
I went University straight into law enforcement df lab
2:32 AM
But some fall into it after working in IT as an admin etc
Avatar
I think it's very important to not spending too much energy into thinking how exactly to get into the field but rather spending that energy more on actually doing something in this field. As with many things in life there is no shortcut here and really spending time reading on the subject, trying tools or playing ctf is going to be much more valuable than any given "get into the field fast" approach.
💯 2
Avatar
Agree, there is no roadmap per say. Example of curiosity. Did a deep dive on Symantec Quarantine files because there were issues where some would not get decrypted. For years there was thought to be only two types and discovered a third. Left with a better understanding of the format and figured out in some cases, there was extra data around the binary being quarantined. Fairly confident that 99.9% of Symantec’s quarantine files can be decrypted now. It was endless hours looking in a hex editor like watching Netflix’s because no one was going to do it for me. Be curious!
2:43 AM
Sorry. Kind of long.
Avatar
Digitalferret 9/25/2022 2:46 AM
basically, good advice from all. get your hands dirty. to excel you really need to have a pathological need to find things out, uncover, discover, enjoy puzzles etc.
💯 7
2:47 AM
FOSS, free tools, drives from craigs/ebay etc
Avatar
And if you happen to find company data, notify the company in a proper way 😉
Avatar
Avatar
Fierry
And if you happen to find company data, notify the company in a proper way 😉
Digitalferret 9/25/2022 3:54 AM
i'd say just wipe it, there are some complete sh*t's of companies (and individuals) out there, especially one's like banks that don't want any indication that they have insecurities. They will wipe the floor with you, even with your well intentioned communications. the news is littered with such stories. but yeh confidentiality (edited)
Avatar
Avatar
Digitalferret
i'd say just wipe it, there are some complete sh*t's of companies (and individuals) out there, especially one's like banks that don't want any indication that they have insecurities. They will wipe the floor with you, even with your well intentioned communications. the news is littered with such stories. but yeh confidentiality (edited)
this 🙃
Avatar
Good point 🙂
Avatar
Andrew Rathbun 9/25/2022 4:12 AM
My degrees are in Criminal Justice, Sociology, and Human Resources Administration. There's absolutely no right or wrong way to get into this field. What you do now and moving forward is more important than what you've done in the past IMO. Also, luck = preparation meets opportunity. Make your own luck by doing things in the meantime while that opportunity has yet to present itself, and it will. Learn some coding. Make a simple parser. Research an artifact and blog about it. Do one of those things a few times and boom you've made a name for yourself. Doors will open and people will want to work with you
Avatar
https://12ft.io/ - paywall bypass
Show me a 10ft paywall, I’ll show you a 12ft ladder.
Avatar
@juba0x00 🇵🇸 and to @Andrew Rathbun point about blogging. Don’t worry about people saying “it’s already been done before.” (they usually don’t put out content or are trying to be gatekeepers) Do it to document your learning and what you are capable of. Who knows, you might find something that has been overlooked or misinterpreted.
❤️ 2
Avatar
Just cause it’s been done before doesn’t mean you can’t do it better 👍
Avatar
Avatar
Beercow
@juba0x00 🇵🇸 and to @Andrew Rathbun point about blogging. Don’t worry about people saying “it’s already been done before.” (they usually don’t put out content or are trying to be gatekeepers) Do it to document your learning and what you are capable of. Who knows, you might find something that has been overlooked or misinterpreted.
juba0x00 🇵🇸 9/25/2022 8:23 AM
Thank you
Avatar
Digitalferret 9/25/2022 8:27 AM
2 of the most used excuses to avoid work usually at management meetings and from old gnarly ne'er-do-wells We can't do this because 1: it has been done before. or 2: it has not been done before.
😂 4
Avatar
BabyRaptorJesus 9/25/2022 8:51 AM
Good morning community. I am new! 🙂
8:52 AM
I am taking a cyber sec program focused for penetration testers and love it so far!
8:55 AM
I came looking for forensics because it is something that interests me and cause I have tons of questions
Avatar
Avatar
BabyRaptorJesus
I came looking for forensics because it is something that interests me and cause I have tons of questions
You’ve come to the right place 😁
❤️ 1
Avatar
BabyRaptorJesus 9/25/2022 8:59 AM
I had seen you were recently promoted? Congrats! Thanks for the welcoming! Say, I have a question about data recovery, is it okay to just shoot away in that channel? Cheers! 😄
9:00 AM
It is about a personal matter
9:00 AM
or device
Avatar
Avatar
BabyRaptorJesus
I had seen you were recently promoted? Congrats! Thanks for the welcoming! Say, I have a question about data recovery, is it okay to just shoot away in that channel? Cheers! 😄
Cheers. Yeah if you’ve got specific questions there are several channels.
Avatar
BabyRaptorJesus 9/25/2022 9:00 AM
Great!
Avatar
Avatar
BabyRaptorJesus
It is about a personal matter
How do you mean exactly? Is it for personal study?
Avatar
BabyRaptorJesus 9/25/2022 9:01 AM
well yes, tbh. but more specifically I have a personal usb device, and I lost some data on it, and I have to recover it somehow.
9:01 AM
So its not school related*
9:02 AM
I will be asking my professors tomorrow, first day of the fall term yea! But I thought maybe I can ask here too.
9:04 AM
There is so much to learn here, I am amazed tbh how much there is to computerization. Tomorrow I will be starting routing and switching, and Tuesday is python and sql. I just passed my linux intro and cisco intro networking, as well as web / Internet infrastructure and wireless security, which was super fun imo. I never knew how complex and detailed, or deep this subject has gotten.
9:05 AM
My goal is to earn myself a 2 year degree to start, at my local community college.
9:06 AM
I may start making websites or something on the side, maybe take an internship with something security related, I really don't know. I have already went to school twice for other professions, Im middle aged now. No rush, just fulfilling a desire to understand more about computers and in time, earn myself a new career within the subject, somewhere . . . hehe
Avatar
Avatar
BabyRaptorJesus
well yes, tbh. but more specifically I have a personal usb device, and I lost some data on it, and I have to recover it somehow.
I think we had a similar discussion for that a while back, check #computer-forensics
❤️ 1
Avatar
BabyRaptorJesus 9/25/2022 9:10 AM
Okay, I will do this. I appreciate the tip! And good luck with your new duties as moderator Matt! 🙂 cheers
Salute 1
Avatar
anyone know any good OSINT (or cheap proprietary) resources for bitcoin address attribution that don't cost $1000? chainalysis reactor and ciphertrace both cost $1000 (edited)
Avatar
BabyRaptorJesus 9/25/2022 12:59 PM
@michael` I am curious, I can only find information regarding attribution analysis in terms of marketing, or market performing for traders, investors, etc. Wallet attribution is what, exactly?
Avatar
Avatar
BabyRaptorJesus
@michael` I am curious, I can only find information regarding attribution analysis in terms of marketing, or market performing for traders, investors, etc. Wallet attribution is what, exactly?
for example, law enforcement does wallet attribution to identify the addresses of criminal organizations
Avatar
BabyRaptorJesus 9/25/2022 1:01 PM
cool
1:02 PM
I don't know anything about this, sorry bud lol I wish I could help. Im reading an article right now about tracking crypto transactions for real world attribution.
1:03 PM
How do these tools work? They find unique patterns or identifiers and they are assigned attributes and possibly, software analyzes them to formalize patterns, tell where the money came from, possibly where its going?
1:03 PM
Extortion never pays off in crypto. Here are some of the ways that blockchain analytics can be used to track crypto transactions.
Avatar
Avatar
BabyRaptorJesus
I don't know anything about this, sorry bud lol I wish I could help. Im reading an article right now about tracking crypto transactions for real world attribution.
thanks for trying. I'm sure there's decent research on wallet attribution somewhere
Avatar
BabyRaptorJesus 9/25/2022 3:58 PM
@michael` I will ask my teachers tomorrow at school. 😄
Avatar
Avatar
BabyRaptorJesus
@michael` I will ask my teachers tomorrow at school. 😄
thank you!
Avatar
Avatar
michael`
for example, law enforcement does wallet attribution to identify the addresses of criminal organizations
Deleted User 9/26/2022 12:31 AM
Try https://www.breadcrumbs.app/ but it won’t have the same datasets as a tool like Chainanalysis. They will cluster wallets together and some will be flagged eg for terrorism or ransomware gangs. Here is a list of sanctioned wallets as an idea: https://www.opensanctions.org/search/?q=Bitcoin%20
Breadcrumbs is a blockchain analytics platform accessible to everyone. It offers a range of tools for investigating, monitoring, tracking and sharing relevant information on blockchain transactions.
Provide a search term to search across sanctions lists and other persons of interest.
Avatar
IOS 16 FFS ?? anyone ..... we have a school threat with an airdrop image I would like to get info from. We have the passcode but looking for ideas on how to pull the data so we can look at AirDrop artifacts.
Avatar
Avatar
Dunebug
I’m familiar with ADF so I reached out for a trail of the mobile version. Haven’t gotten it yet. Hadn’t heard of Cyacomb though, so thank you for that! I will reach out to them for a trial.
Deleted User 9/26/2022 9:05 AM
Hi There if you haven any questions on Cyacomb Forensics please feel free to DM me
Avatar
Avatar
DCSO
IOS 16 FFS ?? anyone ..... we have a school threat with an airdrop image I would like to get info from. We have the passcode but looking for ideas on how to pull the data so we can look at AirDrop artifacts.
Grab the syslogs and use rleapp on it. @Brigs made a parser for it regarding ios airdrop. It was a collaboration with... cant recall her name. Edit: gforce4n6 dot blogpost dot com. (edited)
💯 1
Avatar
Avatar
florus
Grab the syslogs and use rleapp on it. @Brigs made a parser for it regarding ios airdrop. It was a collaboration with... cant recall her name. Edit: gforce4n6 dot blogpost dot com. (edited)
Thanks, i just saw this article. We might have to do that. Thanks !
👏 1
Avatar
really odd question here, is there any practical use cases of smart TV forensics, like what kind of information can it prove or validate in this use case ? Only reason I can think is intellectual property theft and pirating streams etc. (edited)
Avatar
Avatar
$CozyBear
really odd question here, is there any practical use cases of smart TV forensics, like what kind of information can it prove or validate in this use case ? Only reason I can think is intellectual property theft and pirating streams etc. (edited)
Mh that's an odd one indeed. But I could think of analysing "time in use" or devices that were used for casting media onto the tv? Since they sometimes come with microphones, maybe they even store some recordings on the device? But that is pure speculation of me rn tbh. 🤔
Avatar
Avatar
$CozyBear
really odd question here, is there any practical use cases of smart TV forensics, like what kind of information can it prove or validate in this use case ? Only reason I can think is intellectual property theft and pirating streams etc. (edited)
I'm neither an LE person nor a lawyer but I'm pretty sure pirating streams would never result in a criminal investigation including digital forensics
Avatar
Avatar
einwickler
I'm neither an LE person nor a lawyer but I'm pretty sure pirating streams would never result in a criminal investigation including digital forensics
majority of the people who pirate streams are under suspicion of IP theft leading to illegal broadcast revenue :)
11:09 AM
Staying along the lines intellectual property theft and DF I would assume most modern smart TV's run like ubuntu OS, Android TVs, Firefox os, from what I've read people can reverse engineer STBs (set top boxes) but I'm wondering if a forensic analysis went under to identify or to prove if these video streams being pirated were actually being watched or coming from that origin (IP of the smart TV, history of video stream) but I can't seem to really validate this ????
11:09 AM
Six men have been handed prison sentences for their part in a multi-million piracy ring which allowed thousands of people to watch Virgin Media for free.
Avatar
it will most likely be looking at browser history, proving a person was in the house at the time, etc
Avatar
On 16 June 2022 at Minshull Street Crown Court, Manchester, Michael Hornung, formerly of Hyde, Greater Manchester was sentenced to four years and six months imprisonment following conviction by a jury…
Avatar
LE can get connections records from your ISP if they so choose
11:12 AM
you'll also get installed apps on the box, assuming an image can be made at all
Avatar
Avatar
$CozyBear
really odd question here, is there any practical use cases of smart TV forensics, like what kind of information can it prove or validate in this use case ? Only reason I can think is intellectual property theft and pirating streams etc. (edited)
Digitalferret 9/26/2022 11:13 AM
in any potential crime scene, any and all material could be critically useful as evidential material. one would have to know how and what is recorded (in order to train <our> voice recognition.) but i understand some tv manufacturers have advised customers not to mention "sensitive" material in front of the TV. i can imagine this for violence/cruelty cases where audio could incriminate or clear parties involved. how one would retrieve that material is another matter
Avatar
they generally don't go after customers who paid for this either (as far as they know, it was legal). it's up to the person providing the content to license it. If you're just watching, you don't know if it is licensed
Avatar
Digitalferret 9/26/2022 11:14 AM
recent child cruelty/murder case in UK used (i think) the miscreants own phones/securtiy cam footage?
Avatar
Okay so they configured those stb and sold them. So why would LE analyse the TVs of the suspects? Or are you talking about the customers who bought these custom stbs? I don't really see a reason to analyse any TV regarding these type of crimes tbh. Am I missing something? 🤔
Avatar
Avatar
Digitalferret
in any potential crime scene, any and all material could be critically useful as evidential material. one would have to know how and what is recorded (in order to train <our> voice recognition.) but i understand some tv manufacturers have advised customers not to mention "sensitive" material in front of the TV. i can imagine this for violence/cruelty cases where audio could incriminate or clear parties involved. how one would retrieve that material is another matter
I mean you could a chip off forensics, as smart TVs incorporate eMMc chips, which require manual De-soldering to remove and then analyse the data to identify origin of the pirate stream in the context of intellectual property theft (edited)
Avatar
Digitalferret 9/26/2022 11:15 AM
what does it store?
Avatar
ya, it won't be easy and definitely not doing it for all the subscribers when the service providers are who you really want anyway
Avatar
Digitalferret 9/26/2022 11:16 AM
ur all talking piracy? if it's a recording device data have to be stored someplace
Avatar
Avatar
Digitalferret
in any potential crime scene, any and all material could be critically useful as evidential material. one would have to know how and what is recorded (in order to train <our> voice recognition.) but i understand some tv manufacturers have advised customers not to mention "sensitive" material in front of the TV. i can imagine this for violence/cruelty cases where audio could incriminate or clear parties involved. how one would retrieve that material is another matter
I totally agree to this ☝
Avatar
Avatar
Digitalferret
ur all talking piracy? if it's a recording device data have to be stored someplace
piracy and the use case of forensics, how would you forensically identify piracy from a SmartTV to aid intellectual property theft from a cybercrime perspective. I often read news on piracy about these pirates get fined £200,00 and get 4 years of jail time (edited)
11:19 AM
through the use of set top boxes, though they never go into any technical detail (edited)
Avatar
Avatar
Digitalferret
what does it store?
I would assume network related information as they are smartTVs. Just finding article so everyone can read about it xD. (edited)
Avatar
Digitalferret 9/26/2022 11:21 AM
i'm making like the progressive undertaker: thinking outside the box. film piracy for me is pretty low on any real criminality prio list. and given the heinous means some Co's went to in order to frighten people with speculative prosecution letter, afaic they can burn
11:22 AM
potential recordings of real crime activity can be trawled from almost any source, but given tVs record sound, it makes it a potential gold mine. what of those with cameras?
Avatar
my main advice on imaging iot type things is "try your hardest to never have to be that guy". but I understand it may already be too late for a lot of people, in which case, I'm sorry
😂 1
this 1
Avatar
Avatar
Sha1_4n6
my main advice on imaging iot type things is "try your hardest to never have to be that guy". but I understand it may already be too late for a lot of people, in which case, I'm sorry
Digitalferret 9/26/2022 11:25 AM
nothing more than a chance to excel 🙂
💯 1
Avatar
Avatar
Digitalferret
i'm making like the progressive undertaker: thinking outside the box. film piracy for me is pretty low on any real criminality prio list. and given the heinous means some Co's went to in order to frighten people with speculative prosecution letter, afaic they can burn
That's why I said I think piracy (as normal "user" and not distributor) will never result in digital forensics. It's just not worth it
this 1
Avatar
Avatar
Digitalferret
i'm making like the progressive undertaker: thinking outside the box. film piracy for me is pretty low on any real criminality prio list. and given the heinous means some Co's went to in order to frighten people with speculative prosecution letter, afaic they can burn
https://www.fact-uk.org.uk/illegal-streaming-service-shut-down-and-man-arrested/ https://www.itv.com/news/granada/2022-09-14/man-flees-after-conviction-for-illegal-pay-per-view-for-set-boxes - I guess how these LE agencies identify the source of these pirates stream using DF from set top boxes will a journey of my own field; I will write up article if I do manage to find something :) Here's an interesting read for everyone enjoy. (edited)
A West Mercia police operation working closely with FACT have arrested a man in Shrewsbury in connection with suspected illegal streaming of premium television channels, and other copyrighted material.
A man from Tameside has fled to Cyprus after his conviction for selling illegal 'pay-per-view' set boxes | ITV News Granada
Avatar
Avatar
einwickler
That's why I said I think piracy (as normal "user" and not distributor) will never result in digital forensics. It's just not worth it
agreed, the distributor is the victim or often the ring leader of the organised pirate groups. (edited)
Avatar
Digitalferret 9/26/2022 11:33 AM
multi million dollar organised crime industry around all that - argument is that co's lose revenue. but not if folks have turned to piracy bc they couldd't afford the sevices anywya
Avatar
Avatar
Digitalferret
multi million dollar organised crime industry around all that - argument is that co's lose revenue. but not if folks have turned to piracy bc they couldd't afford the sevices anywya
Agreed but piracy is much a bigger issue then affording services, people often generate profit for themselves whilst everyone pays for paid subscription, organised ring leaders make business out of it because it's an easier option and also by fooling victims through social engineering to perform credential theft. Operation 404 is one of the first known piracy groups to undergo piracy theft in the metaverse (whilst I dangerously stay from that crap, it's still rather interesting) (edited)
Avatar
Avatar
einwickler
Okay so they configured those stb and sold them. So why would LE analyse the TVs of the suspects? Or are you talking about the customers who bought these custom stbs? I don't really see a reason to analyse any TV regarding these type of crimes tbh. Am I missing something? 🤔
I didn't see this, pirates who buy custom STBs and sell them and have then have access to all premium channels. Here's what I mean on reverse engineering stbs. https://www.youtube.com/watch?v=lhbSD1Jba0Q (edited)
Avatar
I got what you meant by that. I just don't see why this would involve analysing smart tvs in an investigation if the crime itself lies more in the "cracked" stbs? But maybe we are just still talking about different things
Avatar
Avatar
einwickler
I got what you meant by that. I just don't see why this would involve analysing smart tvs in an investigation if the crime itself lies more in the "cracked" stbs? But maybe we are just still talking about different things
very good point, but they do go hand in hand just like we need multiple sources of investigative sources other then carrying out a cell site analysis of mobile phones, not sure if that's a good analogy. Manage to find this, very interesting stuff. https://www.dataforensics.org/smart-tv-forensics/ (edited)
This article explains and guide to perform the Smart TV Forensics operation. Explains the method to extract data from a Smart TV
Avatar
Avatar
$CozyBear
Agreed but piracy is much a bigger issue then affording services, people often generate profit for themselves whilst everyone pays for paid subscription, organised ring leaders make business out of it because it's an easier option and also by fooling victims through social engineering to perform credential theft. Operation 404 is one of the first known piracy groups to undergo piracy theft in the metaverse (whilst I dangerously stay from that crap, it's still rather interesting) (edited)
Digitalferret 9/26/2022 12:02 PM
not ikely to catch those on smart tv tho. bit like prosecuting individual dope smokers
Avatar
Avatar
$CozyBear
I didn't see this, pirates who buy custom STBs and sell them and have then have access to all premium channels. Here's what I mean on reverse engineering stbs. https://www.youtube.com/watch?v=lhbSD1Jba0Q (edited)
Digitalferret 9/26/2022 12:05 PM
years back, an actual mate, did the pirate sky tv cards. loophole was that he made the circuit boards with an unpopulated DIL socket for a PIC micro. sold it as "educational" but folks then just went on newsgroups and d/l the code to a PIC. hey presto. 50c circui boards selling for $50. he was approaching a million GBP in the end. then he got greedy and started ripping into set top boxes and got busted big time
12:09 PM
another mate, impressed by how much a dude just made down the pub, realised i had all the PIC kit (uni stuff) and could program a bit. said the guy cleared 40 boards at £100 inside minutes. i declined. said, what do you think is gonna happen the following week when Sky shut the codes down and all those punters are left with dead cards and 100 out of pocket. 🙂 weeks and months later you had punters, who actually knew they were defrauding SKY, complaining on TV news how they'd been ripped off bby the shops selling them 🤣 (edited)
🥲 3
Avatar
Avatar
Digitalferret
another mate, impressed by how much a dude just made down the pub, realised i had all the PIC kit (uni stuff) and could program a bit. said the guy cleared 40 boards at £100 inside minutes. i declined. said, what do you think is gonna happen the following week when Sky shut the codes down and all those punters are left with dead cards and 100 out of pocket. 🙂 weeks and months later you had punters, who actually knew they were defrauding SKY, complaining on TV news how they'd been ripped off bby the shops selling them 🤣 (edited)
that's some crazy stuff, I would assume those would be called Anti Piracy numbers they flash on the screen do identify the origin of the STBs location allowing them to shut down the operations of piracy streaming : ) acts a forensic watermarking technology, interesting enough that's very slowly moving to the DF world for the use CSAM identification but in China though, it's still a experimental theory for now as its does require machine learning. (edited)
Avatar
After the screenshot had been outlined, users were quick to notice how a few modifications to tones and hues provided a long string of digits.
1:30 PM
not exactly csam, do apologise.
Avatar
does ciphertrace allow sharing of purchased licenses?
Avatar
Avatar
DCSO
IOS 16 FFS ?? anyone ..... we have a school threat with an airdrop image I would like to get info from. We have the passcode but looking for ideas on how to pull the data so we can look at AirDrop artifacts.
GK should have their support for 16 out soon. Not sure about Premium...
Avatar
Avatar
$CozyBear
really odd question here, is there any practical use cases of smart TV forensics, like what kind of information can it prove or validate in this use case ? Only reason I can think is intellectual property theft and pirating streams etc. (edited)
I know your general conversation went down the rabbit hole of piracy and IP theft, but here is one real world case that used smart TV forensics. https://discord.com/channels/427876741990711298/735956575151194233/946776184610492426
👍🏾 1
Avatar
Avatar
FullTang
I know your general conversation went down the rabbit hole of piracy and IP theft, but here is one real world case that used smart TV forensics. https://discord.com/channels/427876741990711298/735956575151194233/946776184610492426
I remember reading that Smart TVs send select 'pixels' from time to time back to manufacturers. These pixels are then correlated with a big database of content to determine what content is being displayed, and create advertising profiles. I'd imagine it would not be difficult for a Smart TV manufacturer to do the same thing for CSAM content, or for the FBI to provide 'pixel' databases it could match the pixels to for such purposes, which providers could use to determine whether the content being viewed may be illegal. I am not sure, however, if the pixels that are viewed are stored though... I'd think they are probably just ephemeral, but might be an avenue for investigation (subpoena the manufacturer to see if any viewership tracking data is retained, and consult with the FBI to see if they can correlate it with their databases). Practically every TV sold nowadays is a 'smart' TV, but they don't all have internet connectivity all the time. Source: https://www.washingtonpost.com/technology/2019/09/18/you-watch-tv-your-tv-watches-back/ Now that companies like Apple are launching initiatives to recognize CSAM content, maybe some other companies might be convinced to jump on board with different programs like that too. (edited)
👍 2
Avatar
Avatar
Sea9
I remember reading that Smart TVs send select 'pixels' from time to time back to manufacturers. These pixels are then correlated with a big database of content to determine what content is being displayed, and create advertising profiles. I'd imagine it would not be difficult for a Smart TV manufacturer to do the same thing for CSAM content, or for the FBI to provide 'pixel' databases it could match the pixels to for such purposes, which providers could use to determine whether the content being viewed may be illegal. I am not sure, however, if the pixels that are viewed are stored though... I'd think they are probably just ephemeral, but might be an avenue for investigation (subpoena the manufacturer to see if any viewership tracking data is retained, and consult with the FBI to see if they can correlate it with their databases). Practically every TV sold nowadays is a 'smart' TV, but they don't all have internet connectivity all the time. Source: https://www.washingtonpost.com/technology/2019/09/18/you-watch-tv-your-tv-watches-back/ Now that companies like Apple are launching initiatives to recognize CSAM content, maybe some other companies might be convinced to jump on board with different programs like that too. (edited)
As a general rule, it amazes me how much data big companies can gather from private citizens for “market research” and how restrictive it is for law enforcement to have access the same class of data. Exceptions exist, but that is just my biased opinion.
👍 4
Avatar
Avatar
FullTang
As a general rule, it amazes me how much data big companies can gather from private citizens for “market research” and how restrictive it is for law enforcement to have access the same class of data. Exceptions exist, but that is just my biased opinion.
If you wanted to be sneaky, I'm sure a device could be compromised in such a way so as to send similar data to law enforcement as well, once a valid warrant is obtained. Getting any such data retroactively would be entirely up to relationships/programs with those other companies, though.
Avatar
Avatar
Sea9
If you wanted to be sneaky, I'm sure a device could be compromised in such a way so as to send similar data to law enforcement as well, once a valid warrant is obtained. Getting any such data retroactively would be entirely up to relationships/programs with those other companies, though.
For sure, and to be fair, CyberTips from big companies can provide useful data to catch criminals. It just amazes me that as a society we give up all our rights to privacy so that big business can make a buck but we won’t take reasonable steps to protect our children. It’s frustrating is all.
Avatar
@Cellebrite anyone have time for a DM, I built a new machine and PA is throwing errors left and right
Avatar
chrisforensic 9/26/2022 11:43 PM
@SectorZero do you have windows 11 installed? and latest cumulative update? because with this update, my PA had troubles too, shooting one error message after the other when opening an extraction.... deinstalled the update and PA running fine again 🙂 (edited)
Avatar
Avatar
chrisforensic
@SectorZero do you have windows 11 installed? and latest cumulative update? because with this update, my PA had troubles too, shooting one error message after the other when opening an extraction.... deinstalled the update and PA running fine again 🙂 (edited)
Still on Windows 10 and fully updated, but good to know! I’ll try going backwards. 👍 I don’t have a screenshot on me right now but it was saying no object reference set on the cloud capability, but I didn’t install cloud on this machine. All hashes are good etc
Avatar
chrisforensic 9/26/2022 11:52 PM
good, try PA after deinstalling the last update 👍
Avatar
Avatar
$CozyBear
really odd question here, is there any practical use cases of smart TV forensics, like what kind of information can it prove or validate in this use case ? Only reason I can think is intellectual property theft and pirating streams etc. (edited)
Adding to some of the other use cases, I'd say pattern of life analysis. If someone's alibi is that they were at home watching TV but their TV has no record of being interacted with in that time frame, perhaps that undermines their story. Lots of applications when you think about how it reflects on someone's habits
💯 4
Avatar
Digitalferret 9/27/2022 1:43 AM
most all <customer> tracking devices are marketed as customer convenience and/or QoL improvements, usually with an associated FUD clause. "are you afraid of dying on the loo? you need the new crAppApp to check your movements (movements, lol) download the App now of buy the full CD/DVD set from K-Tel/Ronco/JML. Never be sh*tscared again!"
😂 2
1:43 AM
basically if it has storage, it can be interrogated. you do sh*t, it can be discovered (edited)
Avatar
Digitalferret 9/27/2022 2:02 AM
in that light, I got to share this cautionary tale, from the 80's-ish. i' normally post in off-duty but it is actually 'evidential' and kinda relative to FullTangs post aboutthe creativity of some folks in incriminating themselves. (edited)
2:03 AM
So, this dude is prepping to go to Amsterdam, a big thing when just popping over to EU wasn't that common. He wants to share this with work colleagues (male AND female), and likely show off that he's been there and had the experience, so takes himself a recording device. Place already had a reputation for being hard-core p0rn tolerant, sex shops, massage etc whereas in UK it was pretty much only shrink wrap top shelf of 'liberated' newsagents and used (eww) book/magazine exchange stores.
2:03 AM
So once there he grabs a handful of adult videos from the local smut shop, sets himself down in the hotel room and pops the camera on a tripod to pirate some stuff. Dude gets back to workplace and gets to work on his macho rep by passing the recordings to workmates. Takes a week to get round the factory.
2:03 AM
At some point the dude is approached by a concerned colleagu and asked "did you watch this video mate?" "Nah, i saw the originals, why would I?" "i think you should"
2:04 AM
What the guy hadn't realised was that at the angle he'd set the video, one could see the faint but clear reflections on the hotel TV screen and, to borrow a Borat-ism, it was plain to see him having a "hand party" on the room sofa :/
😳 2
Avatar
Avatar
FullTang
I know your general conversation went down the rabbit hole of piracy and IP theft, but here is one real world case that used smart TV forensics. https://discord.com/channels/427876741990711298/735956575151194233/946776184610492426
Simply beautiful, just reading about this as a actual real world existing case literally gives me goosebumps xD. Thanks for this @FullTang (edited)
👍 1
Avatar
This project is the first of its kind to explore options for the financial disruption of organised crime networks involved in audio-visual piracy.
Avatar
MrMacca (Allan Mc) 9/27/2022 7:33 AM
Has anyone experienced and then found a solution to Cellebrite reader exporting a selection of emails into a MASSIVE PDF document. Emails exported as HTML is 10mb, word is 12mb, PDF is 32gb. I've currently got an open support ticket we are working through, but just wanted to see if anyone had found a solution themselves in the mean time.
7:39 AM
We tend to have alot of officers exporting to PDF, and want to eradicate any potential issues in the future with larger files that are taken at face value.
Avatar
Question about encryption. I am working on my Masters in DFIR and I am taking an encryption class. How often do y'all work or see Kerberos in investigations?
Avatar
Anyone aware of Windows telemetry that records specifically what policy was changed when GPO is modified?
Avatar
Not super knowledgeable, but I'm aware of a few things that I usually check (also some items I found). eventlog/Microsoft-Windows-GroupPolicy/Operational.evtx looking for errors on syncing (preventing changes, e.g.) https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-registry Event IDs listed in there may be of use. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Group Policy Coordinating with prefetch or similar on MMC has yielded me some success for determining if things have been changed, event logs (if available) will also show what changed. Backup-related (VSS): VSS: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\hivelist There may be other software that generates logs. https://learn.microsoft.com/en-us/windows/win32/vss/registry-backup-and-restore-operations-under-vss https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc772100(v=ws.10) https://learn.microsoft.com/en-us/troubleshoot/windows-server/group-policy/applying-group-policy-troubleshooting-guidance (edited)
Avatar
Avatar
medusa
Question about encryption. I am working on my Masters in DFIR and I am taking an encryption class. How often do y'all work or see Kerberos in investigations?
randomaccess 9/27/2022 3:20 PM
Have worked a few investigations where kerberoasting was used to get service accounts to move around with
Avatar
Avatar
Villano
Anyone aware of Windows telemetry that records specifically what policy was changed when GPO is modified?
randomaccess 9/27/2022 3:20 PM
Haven't test it but there's a group policy event log on the DC that might have something valuable in it
Avatar
Avatar
Augment
Not super knowledgeable, but I'm aware of a few things that I usually check (also some items I found). eventlog/Microsoft-Windows-GroupPolicy/Operational.evtx looking for errors on syncing (preventing changes, e.g.) https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-registry Event IDs listed in there may be of use. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Group Policy Coordinating with prefetch or similar on MMC has yielded me some success for determining if things have been changed, event logs (if available) will also show what changed. Backup-related (VSS): VSS: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\hivelist There may be other software that generates logs. https://learn.microsoft.com/en-us/windows/win32/vss/registry-backup-and-restore-operations-under-vss https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc772100(v=ws.10) https://learn.microsoft.com/en-us/troubleshoot/windows-server/group-policy/applying-group-policy-troubleshooting-guidance (edited)
Thanks. I'm aware of the registry events but these are super noisy and usually disabled.
Avatar
Avatar
randomaccess
Haven't test it but there's a group policy event log on the DC that might have something valuable in it
There is an event but it's fairly generic and doesn't actually tell you what was changed.
Avatar
Avatar
Villano
There is an event but it's fairly generic and doesn't actually tell you what was changed.
randomaccess 9/27/2022 3:24 PM
That sounds like windows event logs doesn't it ha What tool are you using to view the events?
Avatar
Avatar
randomaccess
That sounds like windows event logs doesn't it ha What tool are you using to view the events?
Splunk
Avatar
randomaccess 9/27/2022 3:25 PM
Hmm ok so it should be getting the full XML.
3:26 PM
You could always collect the directory and compare it with VSS or backups with beyondcompare
Salute 1
3:26 PM
Object tracking may also help
Avatar
Avatar
randomaccess
Object tracking may also help
Thanks
Avatar
Justagenericusername 9/27/2022 11:22 PM
What should be added?
Avatar
marco_polo076 9/28/2022 6:58 AM
can someone private message i have a few questions about A Distributed Denial of Service attack
Avatar
Does anyone have any experience working with RCFL (Regional Computer Forensic Labs)? This is our first time working with them and I want to make a list of things to analyze, but I am not sure if that's needed. We do not have much information about the systems.
📬 1
Avatar
Avatar
DB
Does anyone have any experience working with RCFL (Regional Computer Forensic Labs)? This is our first time working with them and I want to make a list of things to analyze, but I am not sure if that's needed. We do not have much information about the systems.
Andrew Rathbun 9/28/2022 7:30 AM
I'm sure a lot of people here do. What's on your list so far?
Avatar
Avatar
marco_polo076
can someone private message i have a few questions about A Distributed Denial of Service attack
What is this in relation to? Prevention/mitigation?
Avatar
marco_polo076 9/28/2022 7:54 AM
I want to prevent it for happening because it is happening everyday and I’m not sure what to do @Matt
Avatar
Which kind of service is it? Web?
Avatar
Here's what I have so far: • Thumb drives • SD cards • External hard drives/NAS • Computer hard drives • Virtual machine storage • CCTV footage • Cloud storage for offsite records I am going to break it down in a bit more detail, but I want to make sure I am not missing anything or if there are things they don't really process that will be low value for us. (edited)
Avatar
Avatar
DB
Here's what I have so far: • Thumb drives • SD cards • External hard drives/NAS • Computer hard drives • Virtual machine storage • CCTV footage • Cloud storage for offsite records I am going to break it down in a bit more detail, but I want to make sure I am not missing anything or if there are things they don't really process that will be low value for us. (edited)
Andrew Rathbun 9/28/2022 8:34 AM
That all seems good, but I'd also be more curious as to what tools and processes they're using to analyze each of those various storage mediums
Avatar
https://www.rcfl.gov/services - I am guessing they just do all of the analysis and then sends the agency the data they extract? I am wondering how it works if they use network based storage. Then they would have to go onsite with the serving agency?
Avatar
can anyone help me with a bitcoin forensics problem?
Avatar
Avatar
michael`
can anyone help me with a bitcoin forensics problem?
Andrew Rathbun 9/28/2022 1:34 PM
#darknet-virtual-currencies
Avatar
Doofenshmirtz 9/28/2022 11:04 PM
(noob alert) if a vhdx, vhd etc is given, can we perform carving on it? (edited)
Avatar
Do you know what kind of acquisition was performed? Physical or logical?
11:21 PM
If it’s logical my money would be on no because then you only copied the specifically selected files instead of the file system (edited)
Avatar
Doofenshmirtz 9/28/2022 11:28 PM
and then how to physically acquire a VHDX? only exporting from the hyperV be enough or not.
Avatar
If you’re exporting from a VM then copying the VMDK/VHDX file will do but keep in mind that you’ll potentially get a lot of false positives when performing file carving 🙂
Salute 1
Avatar
randomaccess 9/28/2022 11:47 PM
Yep you can carve inside a virtual disk. Take a copy of it, mount it as a drive letter and run photorec over it no dramas
Avatar
Does anyone know of an online simulated environment to practice digital forensics? Same idea as metasploitable but then more focused on investigating how said vm was breached.
Avatar
Avatar
loln00b
Does anyone know of an online simulated environment to practice digital forensics? Same idea as metasploitable but then more focused on investigating how said vm was breached.
I'd say doing CTF's?
Avatar
Avatar
florus
I'd say doing CTF's?
Yes, good point. This case is more for an educational type of setting. (HBO education)
Avatar
I know that SANS NetWars offers this in the most recent edition but it might be outside the skill and price range of HBO educational institutions 🙂
1:21 AM
The Stolen Szechuan Sauce is a digital forensics lab with you in mind. Share with your students or security team for scenario training.
1:22 AM
Difficulty can be adjusted based on the number of artifacts provided to the class 🙂 (edited)
Avatar
There are many more at https://cyberdefenders.org/ (including The Stolen Szechuan Sauce).
Training platform for #BlueTeams to test and advance their #CyberDefense skills..
Avatar
yep linked to the source specifically because there are a ton of walkthroughs pertaining to different artifacts 🙂
Avatar
Trust Dies in Darkness: Shedding Light on Samsung’s TrustZone Keymaster Design "In this work, we examined the cryptographic design and implementation of Android’s Hardware-Backed Keystore in Samsung’s Galaxy S8, S9, S10, S20, and S21 flagship devices. By an extensive reverse engineering effort, we were able to analyze the Keymaster TA in multiple TZOSs (TEEGRIS, Kinibi, and QSEE). To the best of our knowledge, we are the first to explore the details of the Keymaster TA implementation in TEEGRIS." https://eprint.iacr.org/2022/208.pdf
Avatar
Anyone got some NUIX experience? I have the field 'Item Date' showing and exporting data in the format 'Monday 1 January 2022 12:00:00 Greenwich Mean Time' when I would really like it to display and export as '01/01/2022 12:00:00'. Anyone know how or if I can change it?
Avatar
Avatar
loln00b
Does anyone know of an online simulated environment to practice digital forensics? Same idea as metasploitable but then more focused on investigating how said vm was breached.
Have you tried blue teams online labs?
👍 1
2:46 AM
A gamified platform for cyber defenders to test and showcase their skills
Avatar
Avatar
Majeeko
Anyone got some NUIX experience? I have the field 'Item Date' showing and exporting data in the format 'Monday 1 January 2022 12:00:00 Greenwich Mean Time' when I would really like it to display and export as '01/01/2022 12:00:00'. Anyone know how or if I can change it?
randomaccess 9/30/2022 2:52 AM
You can change it. From memory it's in the column profiles. Right click on the top bar in the middle pane. But...I might be wrong, I haven't done it in a while
👍 1
Avatar
Avatar
randomaccess
You can change it. From memory it's in the column profiles. Right click on the top bar in the middle pane. But...I might be wrong, I haven't done it in a while
Ive got an export running at the mo but I will have a look when its done. Been sort of thrown in at the deep end a bit and trying to fild ways to make the whole process easier.
Avatar
randomaccess 9/30/2022 2:57 AM
Usually the help docs will walk you through what you need to know
Avatar
hello
7:01 AM
BianLian wants to do an interview (Ask-Me-Anything), if you have any questions you want to ask them please PM me or respond to this message. The questions and answers will be posted on this blog: http://the-key.tk/2022/09/29/start-here/
7:02 AM
questions submitted before sunday will be asked to BianLian
Avatar
BabyRaptorJesus 10/1/2022 7:21 AM
@michael` Unfortunately, my professors don't do much with crypto and didn't share any knowledge or insight in BTC wallet Attribution OSINT software. I am sorry but I have nothing to help you with at this time. I will keep reading and if I see anything, I will shoot you a mention here bud. 🙂
Avatar
How is everyrhing guys? Have you guys ever investigated a mac with Cellebrite Inspector? Or does anyone have a dfir guide for Mac investigation? (edited)
Avatar
Avatar
BabyRaptorJesus
@michael` Unfortunately, my professors don't do much with crypto and didn't share any knowledge or insight in BTC wallet Attribution OSINT software. I am sorry but I have nothing to help you with at this time. I will keep reading and if I see anything, I will shoot you a mention here bud. 🙂
thanks for trying!
Avatar
AnarchySnoop 10/2/2022 5:29 AM
Hi everyone. Brand new member here.
👋 4
Avatar
Welcome 🙂
Avatar
AnarchySnoop 10/2/2022 5:39 AM
Thanks. The server looks interesting so far.
Avatar
We’re a friendly bunch
Avatar
AnarchySnoop 10/2/2022 6:08 AM
Seems like it. I too am friendly. ADHD, so I'm a little inconsistent in communicating though. However, I love to learn and I've developed quite fascination with OSINT technique.
💯 2
Avatar
Avatar
AnarchySnoop
Seems like it. I too am friendly. ADHD, so I'm a little inconsistent in communicating though. However, I love to learn and I've developed quite fascination with OSINT technique.
Andrew Rathbun 10/2/2022 6:44 AM
Join the ADHD club. The water is warm. Cheers
😂 3
Avatar
AnarchySnoop 10/2/2022 6:45 AM
Avatar
All, I just wanted to share an important announcement on behalf of HTCIA- Announcement: HTCIA’s International Board of Director’s voted to remove restrictions on for-profit defense work. Bylaws on the site will be updated soon.
11:46 AM
Feel free to at me if any questions
Avatar
Digital forensics student here; I've been given an assignment wherein I have to discuss IMSI Catchers / Cell-Site Simulators, specifically any impact the technology has on DFIR cases, professionals, and the digital forensics field at large. It's obviously a rather broad/vague scope. Any ideas on specific directions I could go with this?
Avatar
AnarchySnoop 10/3/2022 12:37 AM
Sweet, I just realized there's Irish Law Enforcement here on the server. AGS Cyber Crime Unit? J2?
Avatar
Avatar
AnarchySnoop
Sweet, I just realized there's Irish Law Enforcement here on the server. AGS Cyber Crime Unit? J2?
Andrew Rathbun 10/3/2022 4:46 AM
@Law Enforcement [Ireland]
Avatar
hello everyone, an off topic question: do you know where to download the ISO of Windows 10 pro for workstation? from the Microsoft site I can not find it. only the normal one comes out.
Avatar
chrisforensic 10/3/2022 5:10 AM
hi @manuelevlr u can use this windows-iso-downloader
5:10 AM
Avatar
Avatar
chrisforensic
hi @manuelevlr u can use this windows-iso-downloader
I have to download the DELL one but it seems that the link is not valid: /
😕 1
Avatar
Avatar
manuelevlr
I have to download the DELL one but it seems that the link is not valid: /
Pretendigator 10/3/2022 6:37 AM
which region are you?
Avatar
Italy
Avatar
Pretendigator 10/3/2022 6:38 AM
https://www.microsoft.com/en-gb/software-download/windows10ISO Not the Italian version but try that link,
Avatar
using the normal ISO of Windows 10 pro it seems that the license associated with the machine is not recognized. probably because it is associated with version 10 for workstation.
Avatar
Avatar
manuelevlr
using the normal ISO of Windows 10 pro it seems that the license associated with the machine is not recognized. probably because it is associated with version 10 for workstation.
Pretendigator 10/3/2022 6:41 AM
my apologies, I did not realise that win 10 pro Workstation was different!
Avatar
So windows 10 pro for workstation should be a windows 10 pro ISO
6:42 AM
It is my understanding that it is just a software unlock
6:43 AM
For stuff like Direct SMB etc
Avatar
Pretendigator 10/3/2022 6:43 AM
just did some brief googling on it, advice seems to be to install win 10 pro, then use your workstation key to upgrade... No idea if that will actually get you anywhere though.
Avatar
Deleted User 10/3/2022 7:17 AM
@manuelevlr use the link provided by @Pretendigator to download the multi edition iso and when installing you can select on windows installer which version do you like
7:18 AM
that link is also in italian
7:19 AM
if you want you can dm me and i can help you with the process of installation
Avatar
Thanks
Avatar
I've got a phone (unk make/model) coming in for which the owner gave consent for 1 single video. Can someone tell me how they go about forensically obtaining that one specific video without having to pull all videos on a logical?
Avatar
thank you guys. in the end I solved with the multiedition.
Avatar
Avatar
JayB1rd
I've got a phone (unk make/model) coming in for which the owner gave consent for 1 single video. Can someone tell me how they go about forensically obtaining that one specific video without having to pull all videos on a logical?
Pretendigator 10/3/2022 9:21 AM
We've been accepting that, yes we will take a 'full forensic image' of the device, however when providing the extraction to the officer we would create a 'portable case' or report with only the authorised content included.
Avatar
There are some tools that accomplish the pick and choose download method... I think the Cellebrite Kiosk does and, without having used it yet, I've been told DataPilot also does this.
9:30 AM
There may be others
Avatar
spicy_caveman 10/3/2022 9:30 AM
anyone online familiar with manual email dkim checksum calculating using relaxed canonicalization?
Avatar
Avatar
JayB1rd
I've got a phone (unk make/model) coming in for which the owner gave consent for 1 single video. Can someone tell me how they go about forensically obtaining that one specific video without having to pull all videos on a logical?
spicy_caveman 10/3/2022 9:33 AM
@Susteen The DataPilot can do this quickly for logical item extractions. It is a very simple process. On the other side of this, if you need to use UFED you can select only that specific file type extraction like "photos" and deselect everything else and jump to that file in the extraction export it as a PDF for evidence.
Avatar
Avatar
spicy_caveman
@Susteen The DataPilot can do this quickly for logical item extractions. It is a very simple process. On the other side of this, if you need to use UFED you can select only that specific file type extraction like "photos" and deselect everything else and jump to that file in the extraction export it as a PDF for evidence.
That's what I've done in the past on 4PC. I collected just images, created a reader report with just that specific image, then saved the file from PA.
👌 1
Avatar
Avatar
JayB1rd
That's what I've done in the past on 4PC. I collected just images, created a reader report with just that specific image, then saved the file from PA.
spicy_caveman 10/3/2022 9:56 AM
The DataPilot makes it super easy to pull just that video or photo out by itself. If you haven't played with one- well worth the investment for it's portability.
Avatar
Avatar
Pretendigator
We've been accepting that, yes we will take a 'full forensic image' of the device, however when providing the extraction to the officer we would create a 'portable case' or report with only the authorised content included.
Did you retain the full dataset or just the file in question?
Avatar
spicy_caveman 10/3/2022 9:58 AM
For DataPilot you can choose a lot of different ways of getting specific data. They have a date slice, content slice, and a type of file explorer for the phone as it is connected live to it. If you want just the file itself with the metadata attached it will do that, if you want the last 30 minutes of timeline activity on the phone it will grab that. if you want just between 1am and 2:30am it will grab whatever specific files you check the box to and run a HTML report in pretty simple to follow data.
Avatar
Avatar
whee30
There are some tools that accomplish the pick and choose download method... I think the Cellebrite Kiosk does and, without having used it yet, I've been told DataPilot also does this.
4PC asnd the kiosk can select categories of files, but not individual files. Don't have access to DataPilot.
Avatar
spicy_caveman 10/3/2022 9:59 AM
If it is an android- what you could do is plug into a write blocker and file explorer the phone DCIM folder to grab the file that way.
9:59 AM
or an iPhone really.
Avatar
Right - UFED does categories... last time I had hands on with a Kiosk (a year and a half ago?) There was a feature called quick copy which acted like a USB disk... pick and choose a file.
Avatar
Avatar
spicy_caveman
For DataPilot you can choose a lot of different ways of getting specific data. They have a date slice, content slice, and a type of file explorer for the phone as it is connected live to it. If you want just the file itself with the metadata attached it will do that, if you want the last 30 minutes of timeline activity on the phone it will grab that. if you want just between 1am and 2:30am it will grab whatever specific files you check the box to and run a HTML report in pretty simple to follow data.
You know what? 4PC now has a Timeline selection during the extraction process. Thank you for bumping my brain awake, lol! edit: I can't type so good (edited)
Avatar
Avatar
whee30
Right - UFED does categories... last time I had hands on with a Kiosk (a year and a half ago?) There was a feature called quick copy which acted like a USB disk... pick and choose a file.
THANK YOU! 4PC has the same function, but I've never even used it or really explored what it does. QuickCopy!
10:10 AM
Thanks everybody for the input. This really is the best, quickest, and nicest place to get insight and help in mobile forensics.
👍 5
Avatar
Sure thing, it's definitely convenient when you need it. I don't often need the functionality so I had glossed over the fact in my brain that it was also in UFED
Salute 1
10:14 AM
which of course makes sense. Same software, different package
Avatar
Avatar
whee30
There are some tools that accomplish the pick and choose download method... I think the Cellebrite Kiosk does and, without having used it yet, I've been told DataPilot also does this.
Can confirm that Datapilot will allow for a very specific extraction.
👍 1
11:04 AM
And I just got to the bottom of the thread, looks like it all got sorted!
Avatar
Avatar
spicy_caveman
anyone online familiar with manual email dkim checksum calculating using relaxed canonicalization?
Ross Donnelly 10/3/2022 11:53 AM
These python scripts should be able to do that - not needed to use them myself though so can't tell you the commands! https://pypi.org/project/dkimpy/
DKIM (DomainKeys Identified Mail), ARC (Authenticated Receive Chain), and TLSRPT (TLS Report) email signing and verification
👍 1
Avatar
Avatar
Ross Donnelly
These python scripts should be able to do that - not needed to use them myself though so can't tell you the commands! https://pypi.org/project/dkimpy/
randomaccess 10/3/2022 1:33 PM
If anyone knows how to validate dkim in an msg file lmk. Everything I've found assumes an eml
Avatar
Avatar
randomaccess
If anyone knows how to validate dkim in an msg file lmk. Everything I've found assumes an eml
Ross Donnelly 10/3/2022 1:45 PM
Arman from Metaspike once told me it wasn't possible, as MSG makes too many changes to the structure
Avatar
Anyone found a workaround to the significant locations issue when thumbing through an iPhone? Seems like they no longer list the locations since iOS 15.x. Was hoping there was a way to still see it without having to open up Google maps. (edited)
Avatar
Avatar
Jack Frost
Anyone found a workaround to the significant locations issue when thumbing through an iPhone? Seems like they no longer list the locations since iOS 15.x. Was hoping there was a way to still see it without having to open up Google maps. (edited)
ScottKjr3347 10/3/2022 5:54 PM
I haven’t found a way to view them on the device as we were able to do in iOS 14.
Avatar
Avatar
spicy_caveman
anyone online familiar with manual email dkim checksum calculating using relaxed canonicalization?
Arman Gungor 10/3/2022 6:08 PM
We have a manual DKIM verification walkthrough here: https://www.metaspike.com/leveraging-dkim-email-forensics/
DKIM signatures contain valuable information, such as body hash and signature, that forensic examiners can utilize in email forensics.
6:11 PM
Let me know if any questions come up. We've also done quite a few DKIM exercises in our Email Forensics CTF solutions. https://www.youtube.com/playlist?list=PLvOFsJ3VdHa_USZuhzIjDFk_EYA5pRP9Z
Avatar
Avatar
Arman Gungor
Let me know if any questions come up. We've also done quite a few DKIM exercises in our Email Forensics CTF solutions. https://www.youtube.com/playlist?list=PLvOFsJ3VdHa_USZuhzIjDFk_EYA5pRP9Z
randomaccess 10/3/2022 8:11 PM
But not on MSG files
Avatar
Arman Gungor 10/3/2022 8:14 PM
There's an idea for next year's CTF 😁
8:15 PM
Didn't see mention of that in the OP's question 🤷‍♂️
Avatar
randomaccess 10/3/2022 8:43 PM
Nah, might not be. Just something I mentioned as a caveat
8:43 PM
But After last ctf...where dkim failed because microsoft uselessly manipulated an email I don't know what to believe any more
Avatar
hello everyone, an information. do all Samsungs show the "network notch" icon even in the absence of the SIM card inserted in its slot? Does the field that is shown indicate only that which is necessary for any emergency calls?
Avatar
spicy_caveman 10/4/2022 7:55 AM
Good morning! Has anyone done Yahoo mail collections and run into a recent issue with the Generate an App Password feature not being available?
Avatar
Avatar
manuelevlr
hello everyone, an information. do all Samsungs show the "network notch" icon even in the absence of the SIM card inserted in its slot? Does the field that is shown indicate only that which is necessary for any emergency calls?
Well not all, but this occurs, what i have seen. Quite confusing sometimes.
Avatar
Fox-IT just released their Dissect framework. https://www.fox-it.com/nl-en/dissect/
🥳 1
Avatar
Avatar
florus
Well not all, but this occurs, what i have seen. Quite confusing sometimes.
so actually it's a bit weird as a thing. leads to errors, as if there is actually the SIM inside.
Avatar
Avatar
florus
Well not all, but this occurs, what i have seen. Quite confusing sometimes.
so actually it's a bit weird as a thing. leads to errors, as if there is actually the SIM inside.
Avatar
Is anyone available to assist with a DFI application form (it’s for UK public sector)? Really don’t wanna screw this up
Avatar
Avatar
Beercow
Fox-IT just released their Dissect framework. https://www.fox-it.com/nl-en/dissect/
᲼᲼᲼᲼᲼᲼᲼ 10/4/2022 12:56 PM
Very nice.
Avatar
which is the right channel to discuss the UAC tool? The documentation links here for discussion about it.
Avatar
kladblokje_88 10/4/2022 1:43 PM
Do any of you know which malware groups are closed-affiliate?
Avatar
Avatar
bashNinja
which is the right channel to discuss the UAC tool? The documentation links here for discussion about it.
Digitalferret 10/4/2022 2:24 PM
hey dude, don't need to ask to ask, just ask 🙂 likely given https://github.com/tclahr/uac (at)tclahr will pick up if no-one else does
Avatar
Ha. Alright. Just asking where the right discussion place is.
2:26 PM
I'm looking to extend UAC to use a LiME kernel module for memory collection instead of AVML, if the system has the necessary headers. I was wondering if there was a channel where others might have discussed build/contributing to the project so I can review the channel history to gain some insight about the project without having to pester people with questions?
2:27 PM
I didn't see a channel dedicated to UAC, so is that discussion just intermixed throughout the whole discord?
Avatar
Avatar
bashNinja
I didn't see a channel dedicated to UAC, so is that discussion just intermixed throughout the whole discord?
Digitalferret 10/4/2022 3:06 PM
there's such a wide and varied topic base here it would be difficult to allocate channels for each and every one. maybe try Search utility top right ↗️ and enter UAC as a term
3:06 PM
shoudl get you more than a few historic comments / Q&A's
👍 2
Avatar
So Okta, reaached out to us for a chat, anyone here used/uses them? Securely enable remote working without security concerns, Adopt a Zero Trust security model, Improve M&A agility by centralizing IAM and providing day-one access for all, Reduce IT friction & minimise costs while fostering innovation. In my opinion, They're similar to Duo but does it better, Zero trust model will be Okta all all devices and mobile to authorise any signins. Also think they integrate with lots of third parties. it woudln't hurt to replace Duo with Okta, thats the only thing i can think of right now as a use for them. if they're cheaper than Duo, I would go with them. What are people's thoughts Okta VS Duo?
Avatar
Our CactusCon 11 (2023) CFP is open for another 12 days. We'd love to hear from you and/or your team. I ran this conference the past two years (CC9/CC10). I have now transitioned to a new Sponsor/Community Liaison role (just too busy is all). My primary task involves working with potential sponsors, but I'm also a general community advocate for the con. I'll limit this to my one "Hey submit a talk at our conference!" But I couldn't help myself. So get the lead out! https://cactuscon.com/cfp
Call for Papers
9:56 PM
Oddly enough I don't see @Andrew Rathbun's submission yet...
😂 1
Avatar
I always feel like CactusCon is missing an opportunity to host in Tucson... given that Tucson is in the name. Maybe I'll finally make it out to one, @conf1ck3r has been bugging me to for a while.
😂 1
Avatar
Well this is something ... I think I just discovered that macOS is background scanning images on my computer and, when those images are QR codes that point to URLs, it's decoding the codes and requesting the URL... 1/
Likes
5779
Retweets
1648
11:07 AM
autonomous link opening seems not great
Avatar
Well, I was wrong. I now believe the canary token was triggered not by macOS decoding the QR, but by Firefox’s “recent” shortcuts on the home screen. I gave too much trust to a Stack Exchange answer. I have deleted the incorrect information. I regret the error.
Likes
215
Avatar
Thanks for the update, haven't been back on twitter yet due to "work" and "being productive"
👀 3
Avatar
Digitalferret 10/5/2022 2:11 PM
jurisprudence "I regret" 🙂
Avatar
For future reference here's how you can tell not to trust technical information. (edited)
😂 1
3:14 PM
kek
4:27 PM
Uber CISO found guilty of hiding breach.
Avatar
Hey guys, just a quick question. Would it consider “OK” to zip compress evidence files? Will there be any corrupted files when we extract the zip again?
Avatar
Avatar
spyr0
Hey guys, just a quick question. Would it consider “OK” to zip compress evidence files? Will there be any corrupted files when we extract the zip again?
randomaccess 10/6/2022 1:02 AM
I think I've had an issue with compressing ewf files before
1:02 AM
But I don't remember specifics
Avatar
Avatar
randomaccess
I think I've had an issue with compressing ewf files before
Ah ok then, so it’s not that good after all
1:03 AM
Thanks for your reply
Avatar
randomaccess 10/6/2022 1:07 AM
You can compress the ewf file
1:08 AM
So there's not much point in doing it again
Avatar
How is the Elevation (Vertical ) Angle yellow rod is calculated with maths? I know that the azimuth angle is AzimuthAngle =asin(length of minor axis/length of major axis)=asin(width/length) [Question]
Avatar
Avatar
xarisole
How is the Elevation (Vertical ) Angle yellow rod is calculated with maths? I know that the azimuth angle is AzimuthAngle =asin(length of minor axis/length of major axis)=asin(width/length) [Question]
Digitalferret 10/6/2022 2:38 AM
Hi dude, not that anyone won't answer but, this Discord is for Digital Forensics / Incident Response.
Avatar
Avatar
Digitalferret
Hi dude, not that anyone won't answer but, this Discord is for Digital Forensics / Incident Response.
thanks, Is there any channel you think it can help me?
Avatar
Avatar
xarisole
thanks, Is there any channel you think it can help me?
Pretendigator 10/6/2022 3:37 AM
If it isn't a question about digital devices/data then you may want to look for a wet forensics community rather than DFIR (digital forensics incident response), like @Digitalferret said, someone may answer you but it's not our area of expertise.
Avatar
Pretendigator 10/6/2022 3:49 AM
@Law Enforcement [UK] any forces using Semantics21 for viewing/grading?
Avatar
Merseyside use it.
👍 3
Avatar
Avatar
Pretendigator
@Law Enforcement [UK] any forces using Semantics21 for viewing/grading?
I'd be interested in hearing people's views also. As we are exploring S21 as a replacement for LACE.
👍 1
Avatar
Avatar
blake-ee
I'd be interested in hearing people's views also. As we are exploring S21 as a replacement for LACE.
Pretendigator 10/6/2022 3:57 AM
is LACE the bluebear viewing suite?
Avatar
Avatar
Pretendigator
is LACE the bluebear viewing suite?
Yes, we use it to carve and view
Avatar
Avatar
Pretendigator
@Law Enforcement [UK] any forces using Semantics21 for viewing/grading?
Trialling it now in Sussex & Surrey
Avatar
Avatar
Pretendigator
@Law Enforcement [UK] any forces using Semantics21 for viewing/grading?
We briefly looked at it but ended up using Griffeye Processing Engine with lace to carve then DI for viewing. Again interested in hear others views of S21
👌 1
Avatar
Avatar
xarisole
thanks, Is there any channel you think it can help me?
Digitalferret 10/6/2022 5:19 AM
maybe check google for maths/science Discords or find an online forum / reddit. best wishes
Avatar
Avatar
cdbandit
Trialling it now in Sussex & Surrey
Pretendigator 10/6/2022 5:52 AM
would love to know how you get on in the next month or so
Avatar
No problem. It seems quite intuitive so far!
Avatar
Avatar
Pretendigator
@Law Enforcement [UK] any forces using Semantics21 for viewing/grading?
Yup, I have been using it for a while now. (edited)
Avatar
I use it on scene and also in lab. It’s difficult to cover everything it can offer but overall I would say it is a good product.
Avatar
Semantics 21 (Tom) 10/6/2022 2:20 PM
If anyone needs a trial of any S21 products please feel free to message me tom@semantics21.com. You’re welcome to a long term trial to make sure the app meets your requirements.
❤️ 2
Avatar
A video called FullSizeRender.mov was identified relevant (iPhone running iOS 14) It is currently sitting in file path Media/Mutations/PhotoData/CPLAssets/groupx/UID/Adjustments. I understand that the original video has been adjusted (possibly cropped) - I'm struggling to find the original video. Does anyone know if the render video will remain on the handset if the original video has been deleted? I've seen someone mention that if you delete the original video, the FullSizeRender video will also disappear?
2:29 AM
Well, I literally just found the video just as I sent the above message. Urgh.
😂 5
Avatar
Avatar
Pacman
Well, I literally just found the video just as I sent the above message. Urgh.
Deleted User 10/7/2022 2:35 AM
it is possible the edited video was saved on a new folder so that the originals can be deleted from the gallery
2:38 AM
there is also a solution if it was not moved to a new folder(saved as a new video) you need to open the video click edit and at the botom right is revert
2:38 AM
i am not sure tho as i dont have experience with iphone devices
Avatar
AnarchySnoop 10/7/2022 2:39 AM
@Law Enforcement [Ireland] Lads, I need a little advice on information disclosure. Can one of ye DM me? It partains to crypto scams and passing that information on to an international authority.
Avatar
Avatar
xarisole
thanks, Is there any channel you think it can help me?
Yep the channel that does homework for you
😂 5
Avatar
Avatar
ryd3v
Yep the channel that does homework for you
They ask for money, that's why I am here
Avatar
Who’s they? Think you’re in the wrong server 😆
Avatar
Avatar
Pacman
A video called FullSizeRender.mov was identified relevant (iPhone running iOS 14) It is currently sitting in file path Media/Mutations/PhotoData/CPLAssets/groupx/UID/Adjustments. I understand that the original video has been adjusted (possibly cropped) - I'm struggling to find the original video. Does anyone know if the render video will remain on the handset if the original video has been deleted? I've seen someone mention that if you delete the original video, the FullSizeRender video will also disappear?
ScottKjr3347 10/7/2022 5:42 AM
Thanks for the question! I have tested & written about this but only with assets being saved locally on the device. In your scenario it appears the device might have been restored/synced from iCloud Photos or the local storage is full hence the CPLAssets location. I can check this weekend to see if the unedited video might be in iCloud Photos or if the original video is synced with the device along with the adjusted/mutated asset. As @Deleted User stated it’s possible that the user captured a video, edited the length of the video then saved as new asset. This creates a new adjusted asset with a new file name and leaves the original asset unadjusted. Keep in mind that if that happens the edited asset will have indicators of adjustments/mutations. The original asset will not and also will have a different file name compared to the adjusted asset. You can use the photos.sqlite to find the original assets using file names and uuids but only if it hasn’t been deleted. These items are discussed in the documentation blog search for the following to find the sections: Adjustments / Mutations stored files and file paths Timelapse Video Captured then a new asset was created by editing the length of the original video For testing is the suspect device using download and keep originals or optimized storage? (edited)
Avatar
Avatar
ScottKjr3347
Thanks for the question! I have tested & written about this but only with assets being saved locally on the device. In your scenario it appears the device might have been restored/synced from iCloud Photos or the local storage is full hence the CPLAssets location. I can check this weekend to see if the unedited video might be in iCloud Photos or if the original video is synced with the device along with the adjusted/mutated asset. As @Deleted User stated it’s possible that the user captured a video, edited the length of the video then saved as new asset. This creates a new adjusted asset with a new file name and leaves the original asset unadjusted. Keep in mind that if that happens the edited asset will have indicators of adjustments/mutations. The original asset will not and also will have a different file name compared to the adjusted asset. You can use the photos.sqlite to find the original assets using file names and uuids but only if it hasn’t been deleted. These items are discussed in the documentation blog search for the following to find the sections: Adjustments / Mutations stored files and file paths Timelapse Video Captured then a new asset was created by editing the length of the original video For testing is the suspect device using download and keep originals or optimized storage? (edited)
Thanks - I saw your blog on this and it really did help me understand what's going on here. I'm not currently working on it right now but I did think of a question - How accurate are the timestamps (creation etc) for the CPLAssets videos?
Avatar
Avatar
ScottKjr3347
Thanks for the question! I have tested & written about this but only with assets being saved locally on the device. In your scenario it appears the device might have been restored/synced from iCloud Photos or the local storage is full hence the CPLAssets location. I can check this weekend to see if the unedited video might be in iCloud Photos or if the original video is synced with the device along with the adjusted/mutated asset. As @Deleted User stated it’s possible that the user captured a video, edited the length of the video then saved as new asset. This creates a new adjusted asset with a new file name and leaves the original asset unadjusted. Keep in mind that if that happens the edited asset will have indicators of adjustments/mutations. The original asset will not and also will have a different file name compared to the adjusted asset. You can use the photos.sqlite to find the original assets using file names and uuids but only if it hasn’t been deleted. These items are discussed in the documentation blog search for the following to find the sections: Adjustments / Mutations stored files and file paths Timelapse Video Captured then a new asset was created by editing the length of the original video For testing is the suspect device using download and keep originals or optimized storage? (edited)
Deleted User 10/7/2022 5:51 AM
you have a nice blog i gotta say that
👍 2
Avatar
Apologies if this timestamp is already covered in your blog, will get back to reading it when I can.
Avatar
Avatar
Pacman
Thanks - I saw your blog on this and it really did help me understand what's going on here. I'm not currently working on it right now but I did think of a question - How accurate are the timestamps (creation etc) for the CPLAssets videos?
ScottKjr3347 10/7/2022 6:17 AM
That’s a very broad question, several different timestamps to consider, so…it depends… In most cases, they should be accurate. But there are a few scenarios that I can think of where they might not be accurate, haven’t tested this but if a user adjusted the capture timestamp of the original then synced to iCloud Photos then restored same or new device, then you might only have the adjusted capture timestamp. You might be able to see other dates that are prior to the adjusted capture time that allow you to say it might be adjusted. Also might be difficult if the user is changing the device time zone. Yes some of these are in there. But happy to provide additional feedback.
Avatar
AnarchySnoop 10/7/2022 2:33 PM
Since I'm Irish, I've tried contacting the Irish Law Enforcement here on the server, but they probably think I'm a little sus. I'm wondering if anyone after conducting OSINT on a scammer, turned over the information to their clients local authorities for further investigation?
2:35 PM
I've been helping a couple from Canada who invested money in a crypto trading platform, and of course, we all know the scams going around, but people are still getting fooled. This couple unfortunately feel victim and lost $15k, pretty much all their savings in the belief that they would expect a decent return in a short period of time. Yes, I know they were duped and should have known better.
2:36 PM
So again, my question is, is there a procedure for handing over evidence for an international police force to continue the investigation, since they have tools and resources I don't.
Avatar
Avatar
AnarchySnoop
Since I'm Irish, I've tried contacting the Irish Law Enforcement here on the server, but they probably think I'm a little sus. I'm wondering if anyone after conducting OSINT on a scammer, turned over the information to their clients local authorities for further investigation?
Tried contacting the Garda through more official means?
Avatar
AnarchySnoop 10/7/2022 3:31 PM
Well I can, but I was looking for advice, as the clients affected are from Canada and the US.
Avatar
What about providing all of your evidence (mostly documents and other intel I assume?) to the victims so they can contact their local/federal law enforcement? That would make the most sense to me for a US victim and I would assume it would be similar for a Canadian victim but maybe someone from Canada could chime in.
💯 1
Avatar
AnarchySnoop 10/7/2022 3:38 PM
That I suppose is a better idea.
Avatar
A bit of a specific question but, what do you folks typically like to see when it comes to forensic data entry regarding tags and fields on databases storing those records? Things like the timestamp for when the record was added for example. I ask because I've recently worked with an in-development product that stores an MD5 hash of the binary content of the entire record for some reason. I don't think anyone could really rely on that from a chain of custody perspective and the database it uses checks for errors internally, so it was odd to me.
Avatar
Avatar
AnarchySnoop
Well I can, but I was looking for advice, as the clients affected are from Canada and the US.
You can have those clients file reports via their agency equivalent to the US FBI. If that's not a workable process, the FBI will take complaints from non-citizens and even refer those back to international law enforcement if needed. https://www.ic3.gov/Home/ComplaintChoice is where they can submit those complaints.
Avatar
Avatar
AnarchySnoop
I've been helping a couple from Canada who invested money in a crypto trading platform, and of course, we all know the scams going around, but people are still getting fooled. This couple unfortunately feel victim and lost $15k, pretty much all their savings in the belief that they would expect a decent return in a short period of time. Yes, I know they were duped and should have known better.
RE "Yes, I know they were duped and should have known better." - Preferably the scammer should just not have been scamming. They were victimized by a criminal, remember.
Avatar
Avatar
mooseous
RE "Yes, I know they were duped and should have known better." - Preferably the scammer should just not have been scamming. They were victimized by a criminal, remember.
Deleted User 10/7/2022 11:46 PM
The point of contention with these things is that it’s a difficult prosecution. The suspects almost always warn “investors” in a sly manner as to the dangers of investing and that they are not financial advisors and so forth.
Avatar
Definitely valid but still worth reporting.
💯 1
Avatar
Avatar
mooseous
RE "Yes, I know they were duped and should have known better." - Preferably the scammer should just not have been scamming. They were victimized by a criminal, remember.
AnarchySnoop 10/8/2022 11:48 AM
I'm not trying to be dismissive of them and they don't need further victimization. If I can prevent one more person from being scammed, I'd be happy.
👍 2
Avatar
Hi there everyone. I hope you’re all doing well. I’d like to introduce myself if that is okay. I am a recent cyber security graduate who has become very fascinated and honestly obsessed with digital forensics to the point where I based my masters project on it in terms of analysing a Linux server.
1:04 PM
I have a job interview for the role of a graduate digital forensic analyst. Part of the interview will consist of a test they say. I was just wondering if someone here has any idea what kind of questions may be asked to a graduate to test them and their knowledge? I’m just trying to prepare so that it goes well. Thanks
Avatar
Avatar
grimy1928
I have a job interview for the role of a graduate digital forensic analyst. Part of the interview will consist of a test they say. I was just wondering if someone here has any idea what kind of questions may be asked to a graduate to test them and their knowledge? I’m just trying to prepare so that it goes well. Thanks
Digitalferret 10/8/2022 1:11 PM
Maybe re-read the job spec and glean all you can, then go read up or practice?
1:13 PM
any other guidance is only going to be generic "best guess" as it's only you that read the advert and applied.
Avatar
Avatar
Digitalferret
Maybe re-read the job spec and glean all you can, then go read up or practice?
Appreciate the advice but what I know is very limited as I got the interview through a recruiter. All I know is that the role is a Junior PC Analyst and it involves a lot of classroom based training as well as exposure to the labs and software and techniques. I guess a bit more research specifically into this type of role in general could be beneficial however
Avatar
Avatar
grimy1928
Appreciate the advice but what I know is very limited as I got the interview through a recruiter. All I know is that the role is a Junior PC Analyst and it involves a lot of classroom based training as well as exposure to the labs and software and techniques. I guess a bit more research specifically into this type of role in general could be beneficial however
Digitalferret 10/8/2022 1:27 PM
poke the recruiter to do his job right (or bribe him 🙂 ) chat to the guy, ask his advice as you want to present that cliche "my best self" (edited)
1:27 PM
lesson one: don't take second hand advice. with the best will in the world it gets to "Chinese Whispers"
1:28 PM
is he a recruiter employed by the school, a job agency, the employer???
1:30 PM
surely there's a job description he's been given
Avatar
Is anyone here conducting R&D on fake biometrics? I'm working part-time on reproducing fingerprints with liveliness detection bypass capabilities. If someone can share insights I would be grateful.
Avatar
Who else is coming to FS-ISAC conference this week?
Avatar
Can anyone from @Magnet Forensics able to DM me regarding where to find the source of metadata relating to iOS photos that have been uploaded onto Cloud Photos Library?
Avatar
Avatar
Pacman
Can anyone from @Magnet Forensics able to DM me regarding where to find the source of metadata relating to iOS photos that have been uploaded onto Cloud Photos Library?
Pretendigator 10/10/2022 4:01 AM
Users\USERNAME\Photos Library.photoslibrary\database\Photos.sqlite I believe, thats where you want to go I believe but I don't have any test data on hand to confirm but it might be worth a dig. Give me a shout if you want someone to help you muddle through it with
Avatar
Wow, what a server... My server list is kept minimal, I don't want to be in too many servers, but I think I'll be sticking around here.
Salute 3
Avatar
Avatar
Pretendigator
Users\USERNAME\Photos Library.photoslibrary\database\Photos.sqlite I believe, thats where you want to go I believe but I don't have any test data on hand to confirm but it might be worth a dig. Give me a shout if you want someone to help you muddle through it with
Yes I got that - I'm looking at a photo in particular and axiom has reported it came from snapchat. Source file is photos.sqlite I don't see anything in database that says this - so I was curious where it pulled that info from.
Avatar
Pretendigator 10/10/2022 4:12 AM
its from something like ZbundledID or something, photos db keeps track of where files came from, ill try to find which table it was in once my machine reboots 😢
👍 1
Avatar
Avatar
Pretendigator
its from something like ZbundledID or something, photos db keeps track of where files came from, ill try to find which table it was in once my machine reboots 😢
That's the odd thing, it's reporting different app - not snapchat.
🧐 1
4:20 AM
Yeah, thought I'd get Magnet to have a look and see where it has come from.
👌 1
Avatar
Avatar
Pacman
Yeah, thought I'd get Magnet to have a look and see where it has come from.
chriscone_ar 10/10/2022 5:48 AM
I'm happy to help - can you send me the source link and location link for the photo you're interested in?
Avatar
Pretendigator 10/10/2022 7:46 AM
@Sanderson Forensics Anyone available for a quick DM?
Avatar
chriscone_ar 10/10/2022 9:15 AM
Moderator approved message and request for your input. Hi everyone, Magnet forensics is kicking off their annual DFIR Industry Report survey and it would be great to have feedback from this community! Survey information and link are below: #DFIR professionals—Magnet Forensics wants to hear what you think of the state of DFIR in today’s businesses! Take the following survey before Nov 1 to let us know your thoughts, and you can win an Amazon gift card or a prize pack from Magnet Forensics: https://www.surveymonkey.com/r/MF-industry-report
Take this survey powered by surveymonkey.com. Create your own surveys for free.
👍 2
Avatar
AugustBurnsBlue 10/10/2022 9:44 AM
Anyone from @Grayshift available to give me a PM? Thanks!
Avatar
Pretendigator 10/11/2022 3:04 AM
any IR people able to talk me through some 'basic' steps on a hacking/stalking case? Not our usual kind of thing Devices: Windows PC, Macbook, iPad
Avatar
sure 🙂
4:00 AM
sent you a PM
Salute 1
Avatar
anyone (maybe from Magnet) know if you can exclude case data from keyword searching in Axiom?
6:16 AM
doing regex for crypto and it's matching the MD5s of the actual file, could just be me being a sillums
Avatar
Avatar
Sudo
anyone (maybe from Magnet) know if you can exclude case data from keyword searching in Axiom?
chriscone_ar 10/11/2022 6:38 AM
Happy to help - I'll DM you for some details.
Avatar
@Cellebrite can you pm me please
📬 1
Avatar
I also have a question for @Cellebrite , regarding Inspector. Pm please?
📬 1
Avatar
I have a question about Insurance fraud and E Discovery as it relates to Comp Forensics. Anyone familiar with Special Investigation Units with Insurance Companies?
Avatar
Is anyone from @Cellebrite able to indicate whether it is actually necessary to remove a SIM card before performing an extraction of a mobile device? (edited)
Avatar
Avatar
Corey
Is anyone from @Cellebrite able to indicate whether it is actually necessary to remove a SIM card before performing an extraction of a mobile device? (edited)
CLB-dan.techcrime 10/12/2022 3:37 AM
We've discovered with some Sony devices that the phone will reboot when the SIM is removed; other Huawei, Alcatel, Oppo will lock the screen. One Oppo rebooted when the SIM was re-inserted. It's really hit or miss so best practice is to leave SIM in the phone but use RF shielding to block network connectivity - - not always practicable, at minimum airplane mode (edited)
👍 1
Avatar
Has anyone had an iPhone wiped via bluetooth? (I know it can be done over wifi). I’ve attended two classes where they claim it can be done. I haven’t seen any white papers on it or spoken to anyone who has seen it first hand.
Avatar
Avatar
dcs453
Has anyone had an iPhone wiped via bluetooth? (I know it can be done over wifi). I’ve attended two classes where they claim it can be done. I haven’t seen any white papers on it or spoken to anyone who has seen it first hand.
Not possible as far i am aware
Avatar
Avatar
dcs453
Has anyone had an iPhone wiped via bluetooth? (I know it can be done over wifi). I’ve attended two classes where they claim it can be done. I haven’t seen any white papers on it or spoken to anyone who has seen it first hand.
Ross Donnelly 10/12/2022 4:15 AM
They're probably thinking of this (spoiler: doesn't wipe over Bluetooth) https://thebinaryhick.blog/2021/10/27/ios-15-powered-off-tracking-remote-bombs/
If you are not a member of DFIR Discord you are really missing out. It is a fantastic resource. I am constantly learning stuff from the practitioners there and it helps me keep up with trends in ar…
👍 2
Avatar
Avatar
Corey
Is anyone from @Cellebrite able to indicate whether it is actually necessary to remove a SIM card before performing an extraction of a mobile device? (edited)
one reason why you may want to image the sim card every time is that some phones (from other countries, usually) may have a weird os. I've seen the sim card be the only piece of evidence cellebrite has that contains the phone number. sometimes it also has contacts saves to it.
Avatar
Avatar
dcs453
Has anyone had an iPhone wiped via bluetooth? (I know it can be done over wifi). I’ve attended two classes where they claim it can be done. I haven’t seen any white papers on it or spoken to anyone who has seen it first hand.
If the phone has no internet connection no wipe will be possible, even on newer iPhones with ultra wide BT. You can track them tho.
👍 1
Avatar
Avatar
dcs453
Has anyone had an iPhone wiped via bluetooth? (I know it can be done over wifi). I’ve attended two classes where they claim it can be done. I haven’t seen any white papers on it or spoken to anyone who has seen it first hand.
JLindmar (83AR) 10/12/2022 6:42 AM
This presentation covers this topic: https://www.magnetforensics.com/resources/offline-ios-tracking-and-remote-wiping-webinar-oct5/ 1. iOS devices cannot CURRENTLY be remotely erased without being powered on and "connected to a data network [i.e. Internet], such as 3G, 4G, LTE, or Wi-Fi" (https://support.apple.com/guide/icloud/aside/mme7d5999a/1.0/icloud/1.0#:~:text=An%20iOS%20or,or%20Wi%2DFi); 2. A device will participate in the "Find My" mesh network, regardless of the device or "Find My" being turned on or off (https://support.apple.com/guide/icloud/remove-devices-and-items-from-find-my-mmdc23b125f6/icloud#:~:text=Turn%20off%20Find%20My%20on%20an%20iPhone%2C%20iPad%2C%20or%20iPod%20touch&text=On%20your%20iPhone%2C%20iPad%2C%20or%20iPod%20touch%2C%20go%20to,off%20Find%20My%20%5Bdevice%5D), unless the Bluetooth radio is disabled via "Settings > Bluetooth" (not the "Control Center"), "Network and Wireless" services are disabled via "Settings > Privacy > Location Services > System Services > Networking and Wireless", or the device is externally shielded. For mesh network location tracking, older iOS devices utilize Bluetooth Low Energy (BLE), whereas newer (iPhone 11-14) devices also utilize Ultra-Wideband (UWB) via Apple's proprietary "U1" chip (https://www.ifixit.com/News/33257/inside-the-tech-in-apples-ultra-wideband-u1-chip). What was interesting to me about the findings in the presentation, was that Airplane Mode (whether the device was on or off) alone didn't prevent the use of UWB with "Find My" - this appears contradictory to Apple's documentation for iOS 13-16: https://support.apple.com/guide/iphone/ultra-wideband-information-iph771fd0aad/16.0/ios/16.0. So...to make sure a device isn't remotely erased or its location tracked, keep it radio frequency shielded via the applicable iOS settings mentioned above and/or utilize a trusted shielded (aka "Faraday") enclosure.
👍 4
Avatar
I'm looking for some help / suggestions with acquiring data from Android set top boxes (used for IPTV). If anyone has any experience with this please can you DM me for a chat?
Avatar
Has anyone served a search warrant on uber before? If so can you PM me? I just want to know what type of data they retain.
Avatar
Avatar
Neon
Has anyone served a search warrant on uber before? If so can you PM me? I just want to know what type of data they retain.
Ross Donnelly 10/12/2022 2:45 PM
Uber Terms and Policies
Avatar
@Ross Donnelly thank you. That's exactly what I needed
💯 1
Avatar
@Metaspike Hi, Anyone from you guys available right now? Can I DM you for a few questions about FEC? Thank you.
Avatar
anyone knows why the folder "AppData\Local\Microsoft\Outlook" contains tons of .msg files instead of a .OST / .PST? maybe an outdated outlook version? (I do not have access to the device, just a file listing of some folders). all message files have a numeric file name e. g. 2114308.msg (edited)
Avatar
Avatar
.yuzumi.
anyone knows why the folder "AppData\Local\Microsoft\Outlook" contains tons of .msg files instead of a .OST / .PST? maybe an outdated outlook version? (I do not have access to the device, just a file listing of some folders). all message files have a numeric file name e. g. 2114308.msg (edited)
Pretendigator 10/13/2022 4:56 AM
what are the created dates looking like for the msg files?
Avatar
Does anyone have a point of contact at Meta (Facebook) for investigating a child trafficking case? It involves data from Facebook Messenger. (edited)
Avatar
Avatar
pazzone
Does anyone have a point of contact at Meta (Facebook) for investigating a child trafficking case? It involves data from Facebook Messenger. (edited)
I assume you have done preservation requests for all accounts? https://www.facebook.com/records/login/
Avatar
Avatar
pazzone
Does anyone have a point of contact at Meta (Facebook) for investigating a child trafficking case? It involves data from Facebook Messenger. (edited)
Andrew Rathbun 10/13/2022 6:55 AM
@Search.org should have what you need. Make sure to do a preservation request!
👍 1
Avatar
Avatar
FullTang
I assume you have done preservation requests for all accounts? https://www.facebook.com/records/login/
Federal LE is still trying to determine if they have jurisdiction. Unclear if local LE knows the process, but I will pass the message along. I am not LE. This is for my friend's child.
Avatar
Avatar
pazzone
Federal LE is still trying to determine if they have jurisdiction. Unclear if local LE knows the process, but I will pass the message along. I am not LE. This is for my friend's child.
Andrew Rathbun 10/13/2022 6:56 AM
Preservation letter ASAP above all, then they'll have 90 days to submit a search warrant if they're able to procure one based on probable cause
this 1
👍 1
Avatar
^ This this this ^ Preservation requests to Facebook take very little time, are very easy, and are critical to the investigation.
👍 3
Avatar
Avatar
leifsoren
@Metaspike Hi, Anyone from you guys available right now? Can I DM you for a few questions about FEC? Thank you.
Arman Gungor 10/13/2022 7:04 AM
Sure! Please feel free to reach out with any questions.
Avatar
Avatar
FullTang
^ This this this ^ Preservation requests to Facebook take very little time, are very easy, and are critical to the investigation.
Dare I say it's even road patrol doable, we created a PDF on how the road guys can preserve the data for us vs waiting overnight or all weekend to say "hey here is the facebook profile" and we click on it and its gone ! 🙂
👆 2
Avatar
Avatar
Andrew Rathbun
@Search.org should have what you need. Make sure to do a preservation request!
Thanks @Andrew Rathbun - yes, @pazzone please have whatever law enforcement entity is investigating check out https://www.search.org/isp for contact information for over 2500 companies. Also, if you need quick access to law enforcement portals to submit legal process (including Facebook for preservation order), check out the 'Law Enforcement Portals' tab (last one) at https://www.search.org/toolbar.
💯 1
👀 1
👍 2
Avatar
Avatar
Andrew Rathbun
Preservation letter ASAP above all, then they'll have 90 days to submit a search warrant if they're able to procure one based on probable cause
Unoriginal_name 10/13/2022 3:22 PM
Speaking of preservation letters: does anyone have any experience with a US based company NOT preserving data when given a LEO preservation letter? I’ve been told that the US based companies are just “playing nice” and there is no legal requirement to force them to hold the data. I have no experience with this, just heard the above in a class and wanted to see if anyone has had trouble with it.
Avatar
Avatar
Unoriginal_name
Speaking of preservation letters: does anyone have any experience with a US based company NOT preserving data when given a LEO preservation letter? I’ve been told that the US based companies are just “playing nice” and there is no legal requirement to force them to hold the data. I have no experience with this, just heard the above in a class and wanted to see if anyone has had trouble with it.
I've never had an issue with preservation. The legal requirement is spelled out explicitly in 18 USC 2703(f).
💯 1
6:14 PM
18 USC 2703(f): A provider of wire or electronic communication services or a remote computing service, upon the request of a governmental entity, shall take all necessary steps to preserve records and other evidence in its possession pending the issuance of a court order or other process. (edited)
Avatar
Avatar
5cary
18 USC 2703(f): A provider of wire or electronic communication services or a remote computing service, upon the request of a governmental entity, shall take all necessary steps to preserve records and other evidence in its possession pending the issuance of a court order or other process. (edited)
Unoriginal_name 10/13/2022 6:15 PM
Great info! Thanks for sharing
Avatar
Hey, does anyone have experience with the PS5 web browser? Specifically, if web history is stored on the console
Avatar
Anyone know if Nuix can process AD1 images? it's processing at the mo so I can't check.
Avatar
Avatar
Majeeko
Anyone know if Nuix can process AD1 images? it's processing at the mo so I can't check.
Andrew Rathbun 10/14/2022 7:29 AM
https://www.teeltech.com/mobile-device-forensic-tools/nuix/nuix-investigator-workstation/ Extract data from: Loose files and folders Single-user (PST, OST, NSF, mbox) and multiple-user (EDB, Domino, Groupwise) email databases Forensic images including dd, EnCase E01 and L01 and Access Data AD1
👍 1
Avatar
@Andrew Rathbun Thanks. Saves me the ball ache of exporting all the files.
💯 1
Avatar
Avatar
Sam
Hey, does anyone have experience with the PS5 web browser? Specifically, if web history is stored on the console
Didn’t realise there was a web browser in the 5! I’ve got one and tried to get one on it a while back but failed unless they have released one.
Avatar
Avatar
Zhaan
Didn’t realise there was a web browser in the 5! I’ve got one and tried to get one on it a while back but failed unless they have released one.
You can access it either by linking your twitter account or simply sending a Web link via message. It's pretty basic, but there doesn't appear to be a way to view history so concern it can be used to view unsavoury parts of the net
Avatar
Avatar
Sam
You can access it either by linking your twitter account or simply sending a Web link via message. It's pretty basic, but there doesn't appear to be a way to view history so concern it can be used to view unsavoury parts of the net
I didn’t really try that hard as the browser on the PS4 was poor so wasn’t losing sleep over it but can understand your concerns! But I will take another look after what you said to see how compatible it would be with current sites.
Avatar
Avatar
Zhaan
Didn’t realise there was a web browser in the 5! I’ve got one and tried to get one on it a while back but failed unless they have released one.
Might be wrong, but isn't the Web Browser no longer a default app for PlayStations?
Avatar
Avatar
Rob
Might be wrong, but isn't the Web Browser no longer a default app for PlayStations?
Spot on
9:27 AM
It was a dreadful app on the 4 so in some ways I wasn’t to sad when it didn’t appear at all in its previous format on the 5.
Avatar
Avatar
Zhaan
Spot on
The only reason I figured this out was trying to triage one once and getting so confused 😂
Avatar
Avatar
Rob
The only reason I figured this out was trying to triage one once and getting so confused 😂
Yeah, it wasn’t pretty. If you think of the functionality of most browsers, yes even Edge, it didn’t come close so I wouldn’t of thought most current sites would play to well with it but I am more than happy to be proven wrong and I will sit down and shut my stupid mouth.
👍 1
Avatar
Unoriginal_name 10/14/2022 10:33 AM
Hello! I’m trying a different route since my DC dongle is out of commission. I have built a drive with WinFE on it following the instructions at winfe.net/build. When booting to that thumb drive, the only thing that comes up is an admin command prompt. Has anyone come across that before?
Avatar
tetracyclinetuna 10/14/2022 11:44 AM
Hi All, Please bear with me as I'm pretty new in forensics. What are the tools that companies/standard industry uses when collecting evidences from clients?
Avatar
Avatar
tetracyclinetuna
Hi All, Please bear with me as I'm pretty new in forensics. What are the tools that companies/standard industry uses when collecting evidences from clients?
Deleted User 10/14/2022 12:09 PM
Some tools to get you started would be Cellebrite or Magnet for mobile devices, Guymager or FTK for desktop/laptop.
Avatar
Avatar
Deleted User
Some tools to get you started would be Cellebrite or Magnet for mobile devices, Guymager or FTK for desktop/laptop.
tetracyclinetuna 10/14/2022 12:58 PM
Awesome! I appreciate this. Looks like Cellebrite and/or Magnet would require getting licences and Guymager and FTK are free. Thank you!
👍 1
Avatar
Avatar
spicy_caveman
Good morning! Has anyone done Yahoo mail collections and run into a recent issue with the Generate an App Password feature not being available?
Did you find a work around ? I am running into the same issue
Avatar
tetracyclinetuna 10/14/2022 4:10 PM
anyone know a couple of best Social Media Collection tools?
Avatar
F0r3ns1c4t0r 10/14/2022 5:26 PM
Hello all, I don't know if this is the right place to post this but I have been trying to find jobs elsewhere but I am being unsuccessful and I don't know what I'm doing wrong. I currently work as a Digital Forensic Examiner within my national law enforcement organisation and due to being undervalued and unappreciated for the work that I do, I am looking for jobs elsewhere. Since there are no companies with whom I can apply that are related to my line of work I would need to find jobs outside of my country which is fine and I would be willing to relocate. Thank you for reading this and your time. Matt
Avatar
Check out #dfir-job-postings 🙂
👍 1
1:24 AM
I hope you find a good spot somewhere 🙂
Avatar
Avatar
Fierry
I hope you find a good spot somewhere 🙂
F0r3ns1c4t0r 10/15/2022 9:35 AM
Thank you 🙂
Avatar
I’ve started doing some forensic work on the side…does anyone have tips for marketing to lawyers or getting new clients? Thanks.
Avatar
Avatar
ltrain1029
I’ve started doing some forensic work on the side…does anyone have tips for marketing to lawyers or getting new clients? Thanks.
Deleted User 10/15/2022 9:21 PM
RE Lawyers: demonstrate how you can articulate the technical aspects of your work into layman’s terms.
Avatar
Getting licensed in your operating country is a good start 🙂
5:17 AM
Different countries have different licenses
Avatar
tetracyclinetuna 10/16/2022 12:27 PM
Hi Guys, what do you guys think of the best Email Collector? I've used Aid4Mail Investigator and Aid4Mail Enterprise, but do you guys have an alternative favorite?
Avatar
Metaspikes FEC
👍 3
Avatar
Any Infosec auditors over here please dm me. I need help with something. Thank you in advance
Avatar
nachito 4n6s 10/17/2022 5:41 AM
Anyone from @Cellebrite for a quick question about licensing?
Avatar
Avatar
nachito 4n6s
Anyone from @Cellebrite for a quick question about licensing?
sure send me a dm 🙂
Avatar
Anybody have any ideas what this is ? Was left at a scene of a burglary, I only have photos at this point.
👀 2
Avatar
Avatar
DCSO
Anybody have any ideas what this is ? Was left at a scene of a burglary, I only have photos at this point.
Andrew Rathbun 10/17/2022 10:17 AM
If you love power adapters or toys & gadgets that have magnetic connections, you can now experiment with these futuristic connectors easily. It's sorta like a DIY ...
👍🏾 1
Avatar
Avatar
DCSO
Anybody have any ideas what this is ? Was left at a scene of a burglary, I only have photos at this point.
tineye could be of use here.
Avatar
Avatar
DCSO
Anybody have any ideas what this is ? Was left at a scene of a burglary, I only have photos at this point.
Andrew Rathbun 10/17/2022 10:18 AM
I posted this to my internal work chat and another comment was modular low bandwidth sensor
🤔 1
Avatar
Yeah, magnetic quick connector. 3-pin layout. The porting on the large fascia is interesting. If not a microphone, I would anticipate LEDs there
Avatar
Andrew Rathbun 10/17/2022 10:24 AM
Could it be an alarm contact of sorts?
Avatar
Also a wear pattern, striations across that flat surface perpendicular to the porting
Avatar
Avatar
DCSO
Anybody have any ideas what this is ? Was left at a scene of a burglary, I only have photos at this point.
Any other photos or markings?
Avatar
Avatar
Andrew Rathbun
I posted this to my internal work chat and another comment was modular low bandwidth sensor
If it is a modular low bandwidth sensor that could indicate that the burglar was using it to detect low bandwidth frequencies like those that are used in home security systems to see if there was a security system in place at the home or to see if a particular entry point had a sensor nearby.
Avatar
Avatar
FullTang
If it is a modular low bandwidth sensor that could indicate that the burglar was using it to detect low bandwidth frequencies like those that are used in home security systems to see if there was a security system in place at the home or to see if a particular entry point had a sensor nearby.
Andrew Rathbun 10/17/2022 10:53 AM
Another suggestion, maybe a way to bypass an electronic lock?
Avatar
RFID cloner? Could be...
Avatar
would like to see the circuit if possible
👆 1
Avatar
Avatar
$CozyBear
tineye could be of use here.
I tried Google Lens, but i'll try Tinyeye and see if it spots anything different.
👍🏾 1
Avatar
Avatar
FullTang
If it is a modular low bandwidth sensor that could indicate that the burglar was using it to detect low bandwidth frequencies like those that are used in home security systems to see if there was a security system in place at the home or to see if a particular entry point had a sensor nearby.
Form factor is right for a handheld RFID reader antenna.
Avatar
Avatar
rayeh
would like to see the circuit if possible
Thats my next step, I only have photos at this point.
Avatar
Avatar
DCSO
Thats my next step, I only have photos at this point.
Digitalferret 10/17/2022 11:03 AM
maybe also ask what security devices the house had, see if there's a potential technology match (edited)
Avatar
Avatar
Digitalferret
maybe also ask what security devices the house had, see if there's a potential technology match (edited)
it was a pole shed outbuilding the owner stated it did not belong to them and was left by the suspect, more questions than answers at this point 🙂
Avatar
Avatar
DCSO
it was a pole shed outbuilding the owner stated it did not belong to them and was left by the suspect, more questions than answers at this point 🙂
Digitalferret 10/17/2022 11:07 AM
ah rigfht, maybe "going equipped" pocket spill
this 2
Avatar
it sort of reminds me of those scam ultrasound bug repellent devices
11:09 AM
but the magnetic mount for charging and/or quick attach on another device doesn't match that
Avatar
New theory, it was an intentional plant to keep us nerds busy
thinking 6
Avatar
Avatar
Dave
New theory, it was an intentional plant to keep us nerds busy
Digitalferret 10/17/2022 11:30 AM
Candid Camera "gangle pin" 🙂 (edited)
Avatar
Avatar
DCSO
I tried Google Lens, but i'll try Tinyeye and see if it spots anything different.
Deleted User 10/17/2022 11:43 AM
Try Yandex rather since it will pattern match the object as opposed to looking for an image.
Avatar
Avatar
Deleted User
Try Yandex rather since it will pattern match the object as opposed to looking for an image.
Автомобільний відеореєстратор Globex GE-114W купити за вигідною ціною в Хмельницькому в інтернет-магазині - Авто Презент. Автомобільний відеореєстратор Globex GE-114W оптом зі складу з доставкою по всій Україні - Київ, Харків, Дніпро, Одеса
catjam 4
11:52 AM
Avatar
Digitalferret 10/17/2022 12:03 PM
nice. i ran yandex first and got nothing like!
👍 1
12:05 PM
dashcam with GPS and radar detector
Avatar
Andrew Rathbun 10/17/2022 12:10 PM
nice work all!
👍 1
Avatar
Avatar
DCSO
Thats my next step, I only have photos at this point.
Digitalferret 10/17/2022 12:41 PM
btw is it illegal, in your state, to use Radar Detection to avoid speed traps? wondering if the property owner wanted to distance himself from the clip on article. maybe check if he has a dashcam with similar connectors? (edited)
12:42 PM
Avatar
What's going on everyone
Avatar
Calculating the Incalculable here
Avatar
Avatar
Deleted User
Sometimes the DMCA related contact is just for show. One revenge porn matter I worked on the site owner gave zero response and never had any intent of honoring any request. Some sites will adhere while others might respond like the PirateBay team used to by saying that they do not fall under antiquated US law and (loophole) they did not physically host any copyrighted data. The documentary on it all is quite interesting and is on YouTube. The Aaron Schwartz doc is also worth a watch RE copyright.
Thanks a ton, this is exactly what I was interested in.
🫡 1
Avatar
Anyone work in eDiscovery?
Avatar
Avatar
d0uch3bag
Anybody know a good solution for offline version virustotal or similar?
This website allows one to export a database of virus hashes if that interests you https://bazaar.abuse.ch/
Share malware samples with the community
Avatar
Avatar
Raines
Anyone work in eDiscovery?
Yeah, ping me
Avatar
Avatar
Digitalferret
Click to see attachment 🖼️
Nah I don't think so, we can use fuzz busters in this state. More likely this suspect was putting the stolen items into his vehicle and it dropped out of it.
👍🏻 1
Avatar
Any of you know what "I'm tod" would mean in a conversation among young people?
Avatar
Avatar
DFE Travis
Any of you know what "I'm tod" would mean in a conversation among young people?
Do you have more context leading up to or right after this?
Avatar
It's all very sort 'what are you up to' and 'hbu' and 'me to'
10:25 AM
Not sure if it relates to drug use or not
Avatar
Interesting, hasn't come up verbatim in any slang that I've looked through recently
Avatar
yeah these conversations are much more truncated than I'm used to, haha. I feel like I lose a brain cell every time I read one
🤣 3
Avatar
Any chance it's British slang, re: "On my tod"?
Avatar
Idk if 25 is considered young but I haven’t heard of this in any context, even the good old urban dictionary doesn’t seem to have good suggestions. The region may help as well
👆 1
Avatar
My next best guesses are, depending on immediate context, it's either some sort of phonetic in-joke that sounds like something else(e.g. "on god") or "tod" has a meaning to them that is not going to be easy to decipher without more "personal" info/context
Avatar
Does UFED have such weak security features ?
Avatar
Either way, I'm sure it's not just there to lure you into infecting your computer...
🤣 4
Avatar
Avatar
thatboy_leo
Idk if 25 is considered young but I haven’t heard of this in any context, even the good old urban dictionary doesn’t seem to have good suggestions. The region may help as well
I have a good lead for what it may be
10:49 AM
https://www.tiktok.com/@llcoolj/video/7104826435185184046 Check this out, this seems highly likely to be what they are referencing in my opinion
Avatar
Avatar
chick3nman
I have a good lead for what it may be
could check out, my tik tok knowledge is slim haha
Avatar
Avatar
chick3nman
Any chance it's British slang, re: "On my tod"?
Sounds like this.
Avatar
Avatar
netix
Does UFED have such weak security features ?
digiforensic 10/18/2022 11:58 AM
it may be fake (edited)
Avatar
Avatar
DFE Travis
Any of you know what "I'm tod" would mean in a conversation among young people?
Deleted User 10/18/2022 12:56 PM
In context to narcotics a guess would be “Tripping On D__”.
Avatar
Also something I configured. The way these two talk its honestly either sexual or drug related
Avatar
kartoffel4n6 10/18/2022 1:47 PM
If a file is copied to USB, will the original file on the computer have a new last accessed date?
Avatar
This is a general thought and also a question for all. What is the technical advantage and/or disadvantage to perform an analysis on a redacted data container only. For example, you are only given a Cellebrite Reader / Axiom Portable with files of interest are redacted. You can't have access to the original extraction. The one downside I can think right off the bat is me unable to use additional tool to parse for additional information. For example, use APOLLO for iOS devices, etc.. With the original files being unavailable, I can't do block hash, etc..
Avatar
From a forensic examiner's perspective, there are lots of reasons why a redacted copy would be less than ideal. The one point that stands out in my mind is that with a redacted copy you have no ability to prove or disprove either additional artifact based evidence or even exculpatory data. I cannot imagine trying to provide conclusive probative opinions on partial or redacted data.
Avatar
Avatar
kartoffel4n6
If a file is copied to USB, will the original file on the computer have a new last accessed date?
Just fyi, last I knew the Last Accessed Date is turned off in Windows 7 and newer.
Avatar
chrisforensic 10/18/2022 8:40 PM
good morning @MSAB_Sofia ... how do i get access to beta versions of xry? didn´t find "early access beta" option in customer portal... it was mentioned in a presentation by a msab employee at the "Digital Investigation Conference" in vienna on 13th october...
Avatar
Avatar
chrisforensic
good morning @MSAB_Sofia ... how do i get access to beta versions of xry? didn´t find "early access beta" option in customer portal... it was mentioned in a presentation by a msab employee at the "Digital Investigation Conference" in vienna on 13th october...
That is a feature that is implemented in XAMN only. If you go to 'Options' in the Ribbon bar in XAMN and select 'MSAB Early Access' in the left hand menu - you can enable the option to give you access to features that are still in beta stage. If any of this functionality is too unstable, or not to your liking, you can switch this off again. But there is no separate beta version available on the Customer Portal. (edited)
Avatar
chrisforensic 10/18/2022 11:22 PM
thanks @MSAB_Sofia for this info ! now i checked it 😆
Avatar
Avatar
DFE Travis
Not sure if it relates to drug use or not
Digitalferret 10/19/2022 1:18 AM
could it be a germanic ref "I'm dead" if there's drug / hangover / illicit deals going on?
Avatar
Does pentesting go kinda hand in hand with dfir
Avatar
Avatar
medjay
Does pentesting go kinda hand in hand with dfir
Andrew Rathbun 10/19/2022 4:39 AM
I would say yes, to a degree. Pentesting is red team, whereas reactive digital forensics and incident response is blue team. Purple team is one who dabbles in both. Anyone can feel free to correct me if I'm off base, though
👍 1
Avatar
I'd like to start my own service one day... doing both for small businesses seems like its beneficial to learn both
Avatar
If offense (pentesting) does not feed into the defense (blue) then it is just authorized hacking. Needs to have a purpose (checkboxes are not a purpose) and feed into a process to improve security. That is where purple teaming excels
Avatar
Avatar
Digitalferret
could it be a germanic ref "I'm dead" if there's drug / hangover / illicit deals going on?
Deleted User 10/19/2022 7:49 AM
I think that’s “tot” or “totten” in German.
Avatar
Avatar
Deleted User
I think that’s “tot” or “totten” in German.
Digitalferret 10/19/2022 8:32 AM
indeed. just working loosely, like folks said hbu (how bout you), me to(o) . i have hangover, hbu? - " like death. " etc
👍 1
Avatar
Avatar
medjay
Does pentesting go kinda hand in hand with dfir
I would say yes, I perform both at the place I work 🙂
11:13 AM
be aware that you need alot of knowledge to perform both, they're entirely different fields without a lot of overlap
11:15 AM
also note there is a difference between pen testing and red teaming, red teaming is an assignemnt for an extended period of time with set goals/flags and a stealthy approach
Avatar
Avatar
5cary
From a forensic examiner's perspective, there are lots of reasons why a redacted copy would be less than ideal. The one point that stands out in my mind is that with a redacted copy you have no ability to prove or disprove either additional artifact based evidence or even exculpatory data. I cannot imagine trying to provide conclusive probative opinions on partial or redacted data.
Thank you
Avatar
Question about “sanitizing”. Recently we have had a lot of juveniles sending and receiving obscene photos to each other, of each other. As such, we have been seizing their phones and getting consent from parents to “sanitize” them. Best I can tell, disabling cloud backup and doing a factory reset is the only option we have for any kind of wipe. This goes for both Android and Apple platforms. I’ve found some programs such as “iMyFone Umate Pro” that claim to do a wipe but nothing I’ve seen seems to be a true forensic wipe. Any suggestions if a better method would be appreciated!
Avatar
Deleted User 10/19/2022 7:38 PM
Factory reset and go.
Avatar
Hello, I am looking for advice on finding evidence of anti-forensic activities. I am working a case where DLP software is installed on the local computer and it reports back to its network based DLP server. Reports from the Network DLP server show thousands of files copied to a USB device on a particular day. The only artifact I have is the USB device being removed around the time the copy completed. There are no .lnk, jumplist or shellbags found on the local computer that would indicate anything was copied to this USB device. Additionally, this user did do quite a bit of cleanup that I found...uninstalled onedrive, deleted all files from his home, documents and download folders...so the user was working to erase tracks.
Avatar
Avatar
DFIS721
Question about “sanitizing”. Recently we have had a lot of juveniles sending and receiving obscene photos to each other, of each other. As such, we have been seizing their phones and getting consent from parents to “sanitize” them. Best I can tell, disabling cloud backup and doing a factory reset is the only option we have for any kind of wipe. This goes for both Android and Apple platforms. I’ve found some programs such as “iMyFone Umate Pro” that claim to do a wipe but nothing I’ve seen seems to be a true forensic wipe. Any suggestions if a better method would be appreciated!
ScottKjr3347 10/19/2022 8:43 PM
It’s sounds like you have good intentions but I don’t think a factory reset or wipe apps (haven’t used them) will destroy all items. Most devices, apps and users are using some type of cloud storage. My fear is that once they do a reset or wipe the data can be restored from cloud storage. I feel if you want to ensure that all contraband items are never recoverable, you will have to delete all user accounts for apps like Snapchat and WhatsApp, then you will also have to permanently delete user accounts for gmail or Apple ID accounts. This would delete the cloud data for those apps and accounts. This also has a caveat that the user doesn’t perform an account recovery after you are not interacting with them.
Avatar
Avatar
CyberTend
Hello, I am looking for advice on finding evidence of anti-forensic activities. I am working a case where DLP software is installed on the local computer and it reports back to its network based DLP server. Reports from the Network DLP server show thousands of files copied to a USB device on a particular day. The only artifact I have is the USB device being removed around the time the copy completed. There are no .lnk, jumplist or shellbags found on the local computer that would indicate anything was copied to this USB device. Additionally, this user did do quite a bit of cleanup that I found...uninstalled onedrive, deleted all files from his home, documents and download folders...so the user was working to erase tracks.
Deleted User 10/19/2022 9:42 PM
Do you keep a log of their browsing history?
Avatar
Avatar
CyberTend
Hello, I am looking for advice on finding evidence of anti-forensic activities. I am working a case where DLP software is installed on the local computer and it reports back to its network based DLP server. Reports from the Network DLP server show thousands of files copied to a USB device on a particular day. The only artifact I have is the USB device being removed around the time the copy completed. There are no .lnk, jumplist or shellbags found on the local computer that would indicate anything was copied to this USB device. Additionally, this user did do quite a bit of cleanup that I found...uninstalled onedrive, deleted all files from his home, documents and download folders...so the user was working to erase tracks.
Did you check the MFT Journal? 🙂
Avatar
Avatar
DFIS721
Question about “sanitizing”. Recently we have had a lot of juveniles sending and receiving obscene photos to each other, of each other. As such, we have been seizing their phones and getting consent from parents to “sanitize” them. Best I can tell, disabling cloud backup and doing a factory reset is the only option we have for any kind of wipe. This goes for both Android and Apple platforms. I’ve found some programs such as “iMyFone Umate Pro” that claim to do a wipe but nothing I’ve seen seems to be a true forensic wipe. Any suggestions if a better method would be appreciated!
Digitalferret 10/20/2022 1:21 AM
could give Redkey a shout, or i can contact directly from here. also hit me up if you want to buy, i got a discount code on behalf of the server: https://redkeyusb.com/products/redkey-usb-ultimate?_pos=1&_sid=eead316b0&_ss=r (edited)
Avatar
Maybe some sort of exfil folder was used 🙂
Avatar
So I left this out of the first post but before doing the factory reset, we go into cloud settings and delete each app’s data from their cloud backup. So even if they restore it, there won’t be anything there.
👍 3
Avatar
Avatar
Digitalferret
could give Redkey a shout, or i can contact directly from here. also hit me up if you want to buy, i got a discount code on behalf of the server: https://redkeyusb.com/products/redkey-usb-ultimate?_pos=1&_sid=eead316b0&_ss=r (edited)
Have you used this on a mobile device? I was reading the product info on their site and it says it supports Apple and Android, I just wonder what it’s actually doing.
Avatar
Avatar
DFIS721
Have you used this on a mobile device? I was reading the product info on their site and it says it supports Apple and Android, I just wonder what it’s actually doing.
Digitalferret 10/20/2022 4:30 AM
not tested on phones just yet, doing a batch of hard drive erasures with it right now. will let you know though. I've also popped them a mail on this topic (phones) awaiting reply. they are UK TZ so hoping they'll get back soon as they usually do
4:30 AM
my brief read is that it leaves the phone OS intact and erases what would be considered the users data
Avatar
Avatar
Digitalferret
not tested on phones just yet, doing a batch of hard drive erasures with it right now. will let you know though. I've also popped them a mail on this topic (phones) awaiting reply. they are UK TZ so hoping they'll get back soon as they usually do
Awesome I appreciate that. I might go ahead and buy it anyway. Seems pretty handy
Avatar
Avatar
DFIS721
Awesome I appreciate that. I might go ahead and buy it anyway. Seems pretty handy
Digitalferret 10/20/2022 4:39 AM
DM incoming - redkey replied
Avatar
Unable to find an appropriate room for discussions in regards to vulnerability scanners/vulnerability assessments. Thought I would try my luck in this room. Has anyone experience with Tenable? I am new to the product and some things are confusing, would love to discuss the matters with someone with more experience.
Avatar
Avatar
Deleted User
Do you keep a log of their browsing history?
Yep, nothing showing up in there...I have two snapshots as well
Avatar
Does the iCloud retain geolocation data for a users device? My SA is asking what he should be asking Apple in a search warrant and I am sadly still iPhone dumb.
Avatar
Avatar
Fierry
Did you check the MFT Journal? 🙂
Thanks Fierry, I had started looking through $J and $MFT, but I probably did not spend enough time looking through them. Doing that today. Not sure if there would be anything in particular to zero in on or not...but I will look around the time the employee left the company.
Avatar
Avatar
Fierry
Did you check the MFT Journal? 🙂
Another interesting artifact came up on a new ingest I did via carving and searching for hidden encrypted volumes...one has shown up in unallocated space
Avatar
Cool! 😃
12:37 PM
Guess someone’s plan is in tatters 😉
Avatar
Avatar
Fierry
Cool! 😃
Yes, I just have to figure out how the heck to get to it 🙂
Avatar
Looking for some testers before I release the next version of OneDriveExplorer. This is a significant update and would like some feedback. DM me if interested.
Avatar
The newly released EZTools manual on Leanpub mentioned it is also possible to run the tools on Linux due to .NET 6 portability. is it also possible to run Timeline Explorer in such a way? As it stands I can't find the .NET6 Desktop Runtime for Linux, it only seems to be available for Windows 😦
Avatar
Avatar
Fierry
The newly released EZTools manual on Leanpub mentioned it is also possible to run the tools on Linux due to .NET 6 portability. is it also possible to run Timeline Explorer in such a way? As it stands I can't find the .NET6 Desktop Runtime for Linux, it only seems to be available for Windows 😦
randomaccess 10/21/2022 1:31 AM
No
👆 1
1:31 AM
Because of the windows runtime as you mentioned
2:12 AM
too bad 🙂
Avatar
randomaccess 10/21/2022 3:11 AM
More incentive to work on SOF-ELK ingestions
Avatar
Never had an opportunity to use it yet, it’s on my list of stuff to check out with a lot of other things 🙂
Avatar
Avatar
Fierry
The newly released EZTools manual on Leanpub mentioned it is also possible to run the tools on Linux due to .NET 6 portability. is it also possible to run Timeline Explorer in such a way? As it stands I can't find the .NET6 Desktop Runtime for Linux, it only seems to be available for Windows 😦
Andrew Rathbun 10/21/2022 4:04 AM
I'll have to clarify that. Thanks for bringing it up 👍
👍 1
Avatar
does anybody know if anything ever came of NISTs forensic examiner evaluation study? it has been done for a long time and no results ever came out that I can find. kind of concerning...
Avatar
Avatar
Sha1_4n6
does anybody know if anything ever came of NISTs forensic examiner evaluation study? it has been done for a long time and no results ever came out that I can find. kind of concerning...
Andrew Rathbun 10/21/2022 5:01 PM
The National Institute of Standards and Technology (NIST) conducted a black-box study in conjunction with a scientific foundation review documented in NISTIR 83
Avatar
lol. thanks.
5:33 PM
I guess I didn't look hard enough, my bad.
5:36 PM
I was sure this would be all over reddit or Twitter when it came out and the last time I searched for it I didn't find it
Avatar
Best DFIR Linux os?
Avatar
Avatar
medjay
Best DFIR Linux os?
Andrew Rathbun 10/21/2022 7:13 PM
blue team? red team?
Avatar
Blue team
7:13 PM
Both actually lol
Avatar
Andrew Rathbun 10/21/2022 7:14 PM
Well, I don't think it's a great idea to have my washer also be a dryer, so I keep them as separate appliances lol
7:14 PM
That being said, doesn't mean you can't make a VM that has tools for both use cases
7:14 PM
Kali Linux is probably up there for red teams, I'd imagine
Avatar
Yeah I thought about getting parrot
Avatar
Avatar
medjay
Best DFIR Linux os?
Ubuntu , install the tools you need yourself.
Avatar
In a VM tho right
Avatar
Avatar
medjay
In a VM tho right
Andrew Rathbun 10/21/2022 8:05 PM
Yeah why not? You can leverage snapshots with VMWare Workstation Pro, for instance
Avatar
Avatar
Andrew Rathbun
I'll have to clarify that. Thanks for bringing it up 👍
Andrew Rathbun 10/21/2022 8:17 PM
@Fierry I just added a sentence that'll go out with next update that addresses this, thanks again for flagging
👍 1
Avatar
Avatar
ryd3v
Ubuntu , install the tools you need yourself.
id agree, im doing this and its helping me learn and not be so overwhelmed with all the tools preinstalled on things like kali or parrot
Avatar
Avatar
medjay
In a VM tho right
Yes
10:08 AM
You can also use virtual box and it’s free. Does all the same things VMware does 😀
Avatar
Yeah I may do the Ubuntu route with tools much easier
10:16 AM
I'm looking for a new laptop that will allow me to run multiple VMs
Avatar
Avatar
medjay
Best DFIR Linux os?
burgers_N_bytes 10/22/2022 10:17 AM
Paladin from @SUMURI…..shameless plug lol
this 1
sumuri_alt 1
Avatar
Is it free
10:35 AM
yes, but ima charge you for googling it 🙂
😆 1
Avatar
Digitalferret 10/22/2022 10:36 AM
Donationware + Pro version for $$
Avatar
That's pretty cool
10:39 AM
Need a better laptop
Avatar
Digitalferret 10/22/2022 10:40 AM
wts the day when Gamers say they need a Forensic laptop 🙂
Avatar
Hacker laptops are better than forensics laptops lol
Avatar
Digitalferret 10/22/2022 11:24 AM
nah, i've seen the typing on them, |-|4c|<3r'5 |<3Y|304Rd's R |3oR|<3D
Avatar
Avatar
Digitalferret
nah, i've seen the typing on them, |-|4c|<3r'5 |<3Y|304Rd's R |3oR|<3D
Hackers keyboard's are borked For those that don't want to manually translate it but are curious!
😂 2
Avatar
Avatar
medjay
Need a better laptop
What kind of laptop do you have now?
Avatar
An HP with Ubuntu on it 8gbRam
Avatar
I can really recommend the thinkpads from lenovo... E.g. the x1 carbon is really lightweight and has a lot of power(in top spec configuration) or also the p-series
Avatar
X1 carbon sounds expensive lol
Avatar
Avatar
medjay
An HP with Ubuntu on it 8gbRam
That’s probably fine!
3:16 PM
+1 for Thinkpad, I got a T470 and it’s awesome as a forensics machine
Avatar
It's not good for running from VMs
Avatar
You probably want to have at least 16GB RAM for good day to day performance
Avatar
Yea 16 is ideal, but ram is cheaper than a new laptop xD
PepeLaugh 1
Avatar
Anyone else have a hard time getting trial licenses for software when just a student? Finding it hard to get vendors to accept a non business email.
Avatar
Yeah that’s hard, maybe .edu might have better luck
Avatar
Avatar
dsplice
Anyone else have a hard time getting trial licenses for software when just a student? Finding it hard to get vendors to accept a non business email.
create business email, issue solved
10:35 PM
Avatar
Avatar
dsplice
Anyone else have a hard time getting trial licenses for software when just a student? Finding it hard to get vendors to accept a non business email.
Digitalferret 10/24/2022 12:35 AM
what's the reply from said vendors; or are you just trying to enter on a form? - for one off's I've used disposablemail as their domians aren't often added to the generic gmail/hotmails etc
Avatar
I always use johnnyappleseed@apple.com
Avatar
Digitalferret 10/24/2022 12:36 AM
other than that, try [Contact Us] or a .edu or ask your faculty?
Avatar
And 4169671111 for phone number
Avatar
Digitalferret 10/24/2022 12:37 AM
hard if they send a link back for download and it's not your email
Avatar
Yeah in that case it wouldn’t work but I wonder how many emails he gets ? Lol betcha a lot
Avatar
Avatar
ryd3v
Yeah in that case it wouldn’t work but I wonder how many emails he gets ? Lol betcha a lot
Digitalferret 10/24/2022 12:41 AM
not with you mate; he gets a lot of emails from what?
Avatar
Johnyappleseed@apple.com is like a email example from Apple devices so I’m sure many people pick that address lol
Avatar
Digitalferret 10/24/2022 12:43 AM
dear vendor, can i get a trial please? or just enter a disposablemail.com - any trials i get are either a simple <yeh you filled an email address for us to spam> or <here's your down;load link> . for pro s/w i'd contact the Co direct and just say how it is. mostly they're trying to avoid scraping or bots
Avatar
Avatar
ryd3v
Johnyappleseed@apple.com is like a email example from Apple devices so I’m sure many people pick that address lol
Digitalferret 10/24/2022 12:43 AM
ah right, got it.
12:44 AM
not much good tho if they send you the d/l to that addy
Avatar
Yeah no would not work if they have to email you a download link
Avatar
Avatar
dsplice
Anyone else have a hard time getting trial licenses for software when just a student? Finding it hard to get vendors to accept a non business email.
randomaccess 10/24/2022 1:46 AM
Twitter DMS work some times
Avatar
Avatar
tklane
Yeah that’s hard, maybe .edu might have better luck
A lot of vendors are secretive about their software. (And for good reason). I’ve signed multiple NDA over the years.
Avatar
Avatar
dcs453
A lot of vendors are secretive about their software. (And for good reason). I’ve signed multiple NDA over the years.
Digitalferret 10/24/2022 2:45 AM
can vouch. but offering (NDA) and a proper application / expression of interest goes a long way. from just checking some erasure s/w & h/w to asking about purchase, to using, I got invited to focus group in a matter of days.
Avatar
SgtMoose114 10/24/2022 5:00 AM
Anyone have recommendations for Intel v. AMD for processors while running forensic software? We are building a new computer and are looking at some of the AMD Threadrippers out there, but wanted to see if anyone had positives or negatives going one way or the other. We are primarily running Cellebrite with some FTK and Axiom sprinkled in.
Avatar
Avatar
SgtMoose114
Anyone have recommendations for Intel v. AMD for processors while running forensic software? We are building a new computer and are looking at some of the AMD Threadrippers out there, but wanted to see if anyone had positives or negatives going one way or the other. We are primarily running Cellebrite with some FTK and Axiom sprinkled in.
spicy_caveman 10/24/2022 6:20 AM
Great morning. I guess the main question is are you building a dual purpose station? As in primarily used for imaging, or primarily used for analysis tools like PA? When I was LEO I started with an i7 and a decent video card. The most important piece to the puzzle is your write speed so focusing on like a M.2 SSD is a must have. I think getting into whether people are rocking Ryzen 7 or 9 versus the 12th gen i7-i9 is like arguing 9mm vs .40 ammo or religion to some people. You should check your clock speeds for what you are building on top of. So your motherboard- what is it supporting and what is available in the upper echelon tier processor kits. I have read that the Ryzen 7 can out perform an i9 in some cases- but I don't know if that is enough to justify a swap. (edited)
Avatar
Avatar
spicy_caveman
Great morning. I guess the main question is are you building a dual purpose station? As in primarily used for imaging, or primarily used for analysis tools like PA? When I was LEO I started with an i7 and a decent video card. The most important piece to the puzzle is your write speed so focusing on like a M.2 SSD is a must have. I think getting into whether people are rocking Ryzen 7 or 9 versus the 12th gen i7-i9 is like arguing 9mm vs .40 ammo or religion to some people. You should check your clock speeds for what you are building on top of. So your motherboard- what is it supporting and what is available in the upper echelon tier processor kits. I have read that the Ryzen 7 can out perform an i9 in some cases- but I don't know if that is enough to justify a swap. (edited)
SgtMoose114 10/24/2022 7:00 AM
We use one rig for both imaging and analysis. Imaging tends to run pretty smoothly, and we are trying to increase our parsing speeds in PA. Right now it is taking a full day to load up and run reports on large extractions (50GB+). And considering phones are just getting bigger, I don't think it's going to get any better. A big part of our downfall is the image categorization, and we don't have a great GPU right now. But overall speed improvements would also be great. We also have the money to do a build right now, so I'm trying to spec out a computer that will serve us well for 5+ years.
Avatar
Avatar
SgtMoose114
We use one rig for both imaging and analysis. Imaging tends to run pretty smoothly, and we are trying to increase our parsing speeds in PA. Right now it is taking a full day to load up and run reports on large extractions (50GB+). And considering phones are just getting bigger, I don't think it's going to get any better. A big part of our downfall is the image categorization, and we don't have a great GPU right now. But overall speed improvements would also be great. We also have the money to do a build right now, so I'm trying to spec out a computer that will serve us well for 5+ years.
spicy_caveman 10/24/2022 7:12 AM
sent PM
Avatar
It'd also be important to know how many cores/ threads your programs are using or how much multitasking you'd be using on your system when doing case work. Could get a threadripper with 128 threads but iirc a program like axiom would currently only utilize up to 32 of those.
Avatar
Avatar
Solec
It'd also be important to know how many cores/ threads your programs are using or how much multitasking you'd be using on your system when doing case work. Could get a threadripper with 128 threads but iirc a program like axiom would currently only utilize up to 32 of those.
SgtMoose114 10/24/2022 8:10 AM
Great point, I'll do some digging into that.
Avatar
Avatar
SgtMoose114
Anyone have recommendations for Intel v. AMD for processors while running forensic software? We are building a new computer and are looking at some of the AMD Threadrippers out there, but wanted to see if anyone had positives or negatives going one way or the other. We are primarily running Cellebrite with some FTK and Axiom sprinkled in.
A repository to store answers to some of the most commonly asked questions within the Digital Forensics Discord Server - GitHub - Digital-Forensics-Discord-Server/FrequentlyAskedDFIRQuestions: A re...
9:49 AM
Easy on the eyes version here, https://ryd3v.rocks/posts/wrkstnbuild
Ryan Collins, Software Engineer, teaching programming, development, React, Next.js
9:50 AM
AMD was slightly more expensive in my build guides but some new chips and boards are on the horizon
Avatar
SgtMoose114 10/24/2022 9:51 AM
🍻 cheers to that! This will be a huge help - Thank you!
Avatar
My pleasure 🍻
9:52 AM
If you need any help let me know
9:52 AM
The motherboard on the AMD build could be swapped with a more readily available board of course.
9:53 AM
Also intel launched the 13 gen chips
9:54 AM
And they are quite good, so may have to update the build guide
9:55 AM
So in reality a new system should have the 13900K and DDR5 with mobo to match
🤙 1
Avatar
Avatar
Digitalferret
what's the reply from said vendors; or are you just trying to enter on a form? - for one off's I've used disposablemail as their domians aren't often added to the generic gmail/hotmails etc
Usually the form itself just rejects it. Sometimes if a human is looking at it, they just say that I need to use a business email
Avatar
Avatar
dsplice
Usually the form itself just rejects it. Sometimes if a human is looking at it, they just say that I need to use a business email
Buy a domain, something like mycoolbusinessname.com then use a protonmail email and link the domain to the email, instant business email
10:46 AM
You can even make yourself a little landing page to make it look even more legit
10:46 AM
🤣
Avatar
Avatar
dsplice
Usually the form itself just rejects it. Sometimes if a human is looking at it, they just say that I need to use a business email
Digitalferret 10/24/2022 1:26 PM
yeh, i find disposablemail dot com or similar has enough randomness to the name that they get accepted
Avatar
Just hack they server and grab your goods
8:17 PM
🤣
8:17 PM
That’s a joke pls don’t ban me
Avatar
Anyone have encountered a file with the extension .meta? Small 20b file, first thought the hex was timestamps but doesn't decode well. (edited)
Avatar
@LuisV85 can i dm You ?
Avatar
Avatar
juan21_15
@LuisV85 can i dm You ?
Si claro
Avatar
Avatar
OggE
Anyone have encountered a file with the extension .meta? Small 20b file, first thought the hex was timestamps but doesn't decode well. (edited)
Have you tried Cyber Chef?
Avatar
Avatar
5cary
Have you tried Cyber Chef?
Not yet, have tried Decode (LE and BE), binwalk and x-ways data interpreter
Avatar
Avatar
OggE
Anyone have encountered a file with the extension .meta? Small 20b file, first thought the hex was timestamps but doesn't decode well. (edited)
is the filename 40 characters hex?
9:06 AM
e.g. AD03A494B5F94A2FF28B5806882D81D3338B2FB5.meta
Avatar
Avatar
chick3nman
is the filename 40 characters hex?
No its the name of a video from telegram on iOS, i saw somewhere that it might be metadata from the file but i dont understand how
Avatar
hmm interesting
9:30 AM
i was guessing it could be the .meta format you see for torrents
Avatar
telegramvideo.mp4 telegramvideo.meta
9:32 AM
the name had something like "telegram-cloud-video-<numbers>_partial", already checked the numbers they are not a timestamp either
Avatar
not sure about that, not the format i was hoping it would be
Avatar
Avatar
chick3nman
not sure about that, not the format i was hoping it would be
thanks anyway 🙂
Avatar
perhaps its a partial file?
Avatar
Random question - Anyone got a reliable / safe source to download 20H2 build of windows? (We have licences for it!) (edit: Rufus <3) (edited)
Avatar
Hi there do you have any recommendations for good forensic conferences ? On my list I have already Sans Summit, DFRWS, OSDF Con and Virusbulletin
Avatar
digital Bowles 10/26/2022 10:48 AM
I have a list of addresses in an excel sheet. I am trying to find there Lats and Longs then map the addresses without entering each address. If that makes sense. Is there a way to do this?
Avatar
Avatar
digital Bowles
I have a list of addresses in an excel sheet. I am trying to find there Lats and Longs then map the addresses without entering each address. If that makes sense. Is there a way to do this?
Deleted User 10/26/2022 10:57 AM
Give this a try with its bulk upload feature: https://www.mapcustomizer.com/
Plot multiple locations on Google Maps
Avatar
digital Bowles 10/26/2022 11:01 AM
Thank you.
👍 1
Avatar
digital Bowles 10/26/2022 12:44 PM
Hours of googling and checking each site I came across the batchgeo.com. You can drag and drop the excel file and direct it with which columns hold what data. It then sent me a link to an email address (not the agency one yet). The link opened a nice map with each location identified.
💯 1
👍🏻 2
Avatar
It’s ok to share that data with a 3rd party website?
Avatar
Avatar
Rob
Random question - Anyone got a reliable / safe source to download 20H2 build of windows? (We have licences for it!) (edit: Rufus <3) (edited)
This new tool allows an easy and comfortable way to download genuine Microsoft Windows 7, 8.1 and 10, as well as Office 2007, 2010, 2013 and 2016 disk images (ISO) directly from Microsoft's servers.
👍 1
Avatar
Avatar
Rob
Random question - Anyone got a reliable / safe source to download 20H2 build of windows? (We have licences for it!) (edit: Rufus <3) (edited)
Universal MCT wrapper script for all Windows 10/11 versions from 1507 to 21H2! - GitHub - AveYo/MediaCreationTool.bat: Universal MCT wrapper script for all Windows 10/11 versions from 1507 to 21H2!
👍 2
Avatar
Does anyone have a Lenovo ThinkPad X1 Nano Gen 2 laptop (12th Gen Intel i7-1280P) accessible? This is relatively new hardware with some "interesting" (aggravating?) security features that we are testing. We would like to see if our findings can be replicated and are happy to throw in an Arsenal license for the help.
Avatar
Avatar
Fierry
Did you check the MFT Journal? 🙂
So in the MFT journal, I am showing "Last Record Change0x10" on the date the file was copied to this USB in question 7/31/2022. No other journal entries have changed. "last Record Change0x30" is a much much earlier date, back to 3/22/2021. I thought these two should match?? Also, path associated is: .\PathUnknown\Directory with ID 0x0000D029-00000A0B. This case I have a signature hit for TrueCrypt/Veracrypt/DriveCrypt volume in unallocated space.
Avatar
Avatar
CyberTend
So in the MFT journal, I am showing "Last Record Change0x10" on the date the file was copied to this USB in question 7/31/2022. No other journal entries have changed. "last Record Change0x30" is a much much earlier date, back to 3/22/2021. I thought these two should match?? Also, path associated is: .\PathUnknown\Directory with ID 0x0000D029-00000A0B. This case I have a signature hit for TrueCrypt/Veracrypt/DriveCrypt volume in unallocated space.
Andrew Rathbun 10/27/2022 6:36 AM
Looks like you're looking at the $MFT? That PathUnknown artifact means the directory is not currently present. I'm guessing you're using MFTECmd? If you're using TLE, make sure you have the subseconds on your timestamp values enabled. If you have no idea what I'm talking about, let me know
Avatar
Sorry to ask this question all, is there a universal device that could replicate any devices screen output? Basically a mirror for changing settings to do a device download but without buying and replacing the screen
Avatar
Avatar
Andrew Rathbun
Looks like you're looking at the $MFT? That PathUnknown artifact means the directory is not currently present. I'm guessing you're using MFTECmd? If you're using TLE, make sure you have the subseconds on your timestamp values enabled. If you have no idea what I'm talking about, let me know
Yes sir, $MFT and using Eric Z's Timeline Explorer. I am not seeing how to enable subseconds...current Date format is set to: yyyy-MM-dd HH:mm:ss. So the PathUnknown, this is an issue where we know these files were copied to a USB drive. The Network DLP application shows this. All I have in the registry is an artifact showing the USB drive removal about the time the network DPL reported the files copied to the USB completed. I have no lnk, shellbags, jumplists or recent documents showing these files accessed on the local machine. So I am trying to, somehow, correlate the $MFT listing of files to this particular USB and prove that both Network DLP and local computer artifacts support the fact the files were indeed copied.
Avatar
Avatar
CyberTend
Yes sir, $MFT and using Eric Z's Timeline Explorer. I am not seeing how to enable subseconds...current Date format is set to: yyyy-MM-dd HH:mm:ss. So the PathUnknown, this is an issue where we know these files were copied to a USB drive. The Network DLP application shows this. All I have in the registry is an artifact showing the USB drive removal about the time the network DPL reported the files copied to the USB completed. I have no lnk, shellbags, jumplists or recent documents showing these files accessed on the local machine. So I am trying to, somehow, correlate the $MFT listing of files to this particular USB and prove that both Network DLP and local computer artifacts support the fact the files were indeed copied.
Andrew Rathbun 10/27/2022 6:47 AM
Change it to yyyy-MM-dd HH:mm:ss.fffffff and exit and reingest the CSV
Avatar
Avatar
Andrew Rathbun
Change it to yyyy-MM-dd HH:mm:ss.fffffff and exit and reingest the CSV
Thanks I will do that now.
Avatar
Avatar
CyberTend
Thanks I will do that now.
Andrew Rathbun 10/27/2022 6:48 AM
https://github.com/AndrewRathbun/TimelineExplorerSettings here's my TLE settings file, for reference
A public repo to host and maintain my settings file for Timeline Explorer - GitHub - AndrewRathbun/TimelineExplorerSettings: A public repo to host and maintain my settings file for Timeline Explorer
Avatar
Avatar
CyberTend
Yes sir, $MFT and using Eric Z's Timeline Explorer. I am not seeing how to enable subseconds...current Date format is set to: yyyy-MM-dd HH:mm:ss. So the PathUnknown, this is an issue where we know these files were copied to a USB drive. The Network DLP application shows this. All I have in the registry is an artifact showing the USB drive removal about the time the network DPL reported the files copied to the USB completed. I have no lnk, shellbags, jumplists or recent documents showing these files accessed on the local machine. So I am trying to, somehow, correlate the $MFT listing of files to this particular USB and prove that both Network DLP and local computer artifacts support the fact the files were indeed copied.
Andrew Rathbun 10/27/2022 6:49 AM
Have you looked at the SANS poster that shows timestamps for file copy, file move, etc events?
6:49 AM
Filesystem Timestamps: What Makes Them Tick?
The “Evidence of...” categories were originally created by SANS Digital Forensics and Incidence Response faculty for the SANS course FOR500: Windows Forensic Analysis. The categories map a specific artifact to the analysis questions that it will help to answer. Use this poster as a cheat-sheet to help you remember where you can discover key Wind...
Avatar
Thanks, I do have all of those and will study them today. Picked them up recently at the Austin SANS DFIR summit 🙂
💯 1
Avatar
Avatar
CyberTend
Thanks, I do have all of those and will study them today. Picked them up recently at the Austin SANS DFIR summit 🙂
RandyRanderson 10/27/2022 7:50 AM
and you didn’t even say hi while there?!
Avatar
Avatar
RandyRanderson
and you didn’t even say hi while there?!
Salute Next time....Great show, very well worth taking a few days to come down to Austin
🥳 1
Avatar
Avatar
TetsuoAR
Sorry to ask this question all, is there a universal device that could replicate any devices screen output? Basically a mirror for changing settings to do a device download but without buying and replacing the screen
Most devices that support USB-C to HDMI or OTG have to be logged into to replicate the screen output. I typically bite the bullet and buy a cheap screen on Amazon to get us through the extraction, i'm not concerned how long it last after that 🙂
Salute 1
Avatar
burgers_N_bytes 10/27/2022 9:16 AM
What does everyone use to view levelDB?
Avatar
@Law Enforcement [USA] Looking to see if anyone has a procedure on destroying electronic evidence devices. We have court orders to destroy items, and looking for best ways to destroy them. Businesses that would take and destroy them.
Avatar
Avatar
burgers_N_bytes
What does everyone use to view levelDB?
Andrew Rathbun 10/27/2022 9:27 AM
@Matt
Avatar
Avatar
sholmes
@Law Enforcement [USA] Looking to see if anyone has a procedure on destroying electronic evidence devices. We have court orders to destroy items, and looking for best ways to destroy them. Businesses that would take and destroy them.
Our evidence tech just takes a sledge hammer to them, not sure if that is what you are looking for lol.
👍 2
Avatar
Avatar
sholmes
@Law Enforcement [USA] Looking to see if anyone has a procedure on destroying electronic evidence devices. We have court orders to destroy items, and looking for best ways to destroy them. Businesses that would take and destroy them.
Andrew Rathbun 10/27/2022 9:28 AM
I know my former PD outsourced old hard drives being shredded to some local company. Thoughts on doing the same?
👍 1
Avatar
Avatar
sholmes
@Law Enforcement [USA] Looking to see if anyone has a procedure on destroying electronic evidence devices. We have court orders to destroy items, and looking for best ways to destroy them. Businesses that would take and destroy them.
Depends if your talking data or device. Device, shredding to dod spec (I think 1/125" is the standard), if it's magnetic media degausing is also an acceptable option to us.
👍 1
Avatar
Avatar
sholmes
@Law Enforcement [USA] Looking to see if anyone has a procedure on destroying electronic evidence devices. We have court orders to destroy items, and looking for best ways to destroy them. Businesses that would take and destroy them.
Nanotech Norseman 10/27/2022 9:29 AM
If it's any kind of hard disk media, we tend to DOD wipe them (can do with a standard computer, though I can't remember off the top of my head which program), but we have a special (and noisy) piece of tech that does it for us. Then we drill holes and hand them off
Avatar
Andrew Rathbun 10/27/2022 9:29 AM
Google confidential shredding for places in your area @sholmes
👍 1
Avatar
Nanotech Norseman 10/27/2022 9:30 AM
☝
Avatar
Avatar
burgers_N_bytes
What does everyone use to view levelDB?
What application’s database are you viewing?
Avatar
burgers_N_bytes 10/27/2022 9:31 AM
Telematics system using in commercial transportation vehicles so not your typical application lol
9:31 AM
Used*
Avatar
Avatar
burgers_N_bytes
Used*
Andrew Rathbun 10/27/2022 9:32 AM
up arrow key after you post a message will go into edit mode of your most recent message, btw
👍 1
Avatar
Avatar
Andrew Rathbun
up arrow key after you post a message will go into edit mode of your most recent message, btw
burgers_N_bytes 10/27/2022 9:32 AM
Thank you for that!
🤣 1
💯 1
Avatar
Avatar
Nanotech Norseman
If it's any kind of hard disk media, we tend to DOD wipe them (can do with a standard computer, though I can't remember off the top of my head which program), but we have a special (and noisy) piece of tech that does it for us. Then we drill holes and hand them off
who do you hand them off to?
Avatar
Avatar
burgers_N_bytes
Telematics system using in commercial transportation vehicles so not your typical application lol
Is it in an IndexedDB folder or leveldb folder?
Avatar
burgers_N_bytes 10/27/2022 9:40 AM
I believe it’s a levelDB folder but don’t have it in front of me at the moment
Avatar
Avatar
sholmes
@Law Enforcement [USA] Looking to see if anyone has a procedure on destroying electronic evidence devices. We have court orders to destroy items, and looking for best ways to destroy them. Businesses that would take and destroy them.
😂 7
🤣 4
🥓 2
Avatar
Avatar
burgers_N_bytes
I believe it’s a levelDB folder but don’t have it in front of me at the moment
Sweet, I’ll DM you
Avatar
Avatar
sholmes
who do you hand them off to?
Nanotech Norseman 10/27/2022 9:52 AM
Our inventory control guy handles post-destruction disposals for us. We get the fun job of destruction XD
🔨 4
👍 1
🤣 1
Avatar
Avatar
sholmes
@Law Enforcement [USA] Looking to see if anyone has a procedure on destroying electronic evidence devices. We have court orders to destroy items, and looking for best ways to destroy them. Businesses that would take and destroy them.
Our procedure is to wipe hard drives and phones, then crush them with one of these https://purelev.com/ (batteries removed of course). I'm not sure what happens to them after they are destroyed. That's the IT department's problem!
👍 1
🤣 1
Avatar
Avatar
sholmes
@Law Enforcement [USA] Looking to see if anyone has a procedure on destroying electronic evidence devices. We have court orders to destroy items, and looking for best ways to destroy them. Businesses that would take and destroy them.
lxwarhammerxl 10/27/2022 10:29 AM
How many pieces are you destroying
Avatar
Avatar
lxwarhammerxl
How many pieces are you destroying
couple hundred
Avatar
lxwarhammerxl 10/27/2022 10:59 AM
Ooooof…..we three hole punch platter drives, smash cellphones with sledges, snap NVME drives, and 3 pass wipe thumb drives (flash media). If we had a couple hundred I would at least get a quote from shred it (any disposal company will do). When we use a third party we watch them shred the evidence though.
👍 1
Avatar
Obyss (NoobinTraining) 10/27/2022 11:06 AM
We use Acitve Kill disk (paid version) to DOD wipe hare drives, unless the order is for physical destruction. Our State Police has a hard drive shredding machine. Cell phones are factory wiped and then a Sledgehammer to them (since you can't shred lithium batteries). Our local university just did a mass purchase of cell phones from propertyroom.com and found almost half the devices unlocked and still with user data...... Don't be them!
this 1
💯 1
👍 1
Avatar
We use Shredit. They scan serial numbers then provide a certificate of destruction. We also watch to kill time.
👍 1
Avatar
Avatar
sholmes
@Law Enforcement [USA] Looking to see if anyone has a procedure on destroying electronic evidence devices. We have court orders to destroy items, and looking for best ways to destroy them. Businesses that would take and destroy them.
Crusher so I'm told
👍 2
Avatar
Avatar
burgers_N_bytes
What does everyone use to view levelDB?
Digitalferret 10/27/2022 12:27 PM
for the wiping side I'm using Redkey USB. having checked all the other 'usual suspects' it offers great value, wipes multiple devices in parallel to intl standards (I'm using NIST 800-88 Purge) and produces reports. can also wipe mobile devices altho they are working on certification for that rn. one off price per USB device, no extras or per drive costs.
Avatar
Does anyone know of a site either on the clear or deep web where I can check for identities that are in credit card dumps. I have a list of victims and their PII and I'm wondering if it is just from a cc dump or some other source.
Avatar
Avatar
Neon
Does anyone know of a site either on the clear or deep web where I can check for identities that are in credit card dumps. I have a list of victims and their PII and I'm wondering if it is just from a cc dump or some other source.
Pastebin
Avatar
Avatar
luis511_
Pastebin
Great idea, thanks
Avatar
Avatar
Neon
Great idea, thanks
NP. Also, if you’re able to contact an investigator at the cc company, and the company has the Intel, they might be able to give you a lead on how the pII was compromised
👍 1
Avatar
Does anyone know why FTK Imager wouldn't show me my deleted files? I'm using a virtual machine to test this out, and it only shows me files that were just deleted right before an image was captured. If I wait a few seconds and take the image again, these deleted files are not shown anymore. I can't find the answer anywhere online? Thank you for any help in advance
Avatar
Avatar
q3
Does anyone know why FTK Imager wouldn't show me my deleted files? I'm using a virtual machine to test this out, and it only shows me files that were just deleted right before an image was captured. If I wait a few seconds and take the image again, these deleted files are not shown anymore. I can't find the answer anywhere online? Thank you for any help in advance
Is the VM on a SSD or a HDD and is the allocated space static or dynamic?
Avatar
Allocated space is dynamic and solid state drive
Avatar
Both of those would contribute to not being able to see your data. Garbage collection on the SSD would recycle the unallocated data over time, but most likely the dynamic space is what is really causing you to not see the data because once a file is deleted that unused portion of the drive will no longer be assigned to the VM.
👍 1
8:34 PM
For the best results (while on a budget) for tinkering with deleted files, you could use an external rotational hard drive. One of those annoying external hard drives that require an additional power source and are the size of a small book.
😂 3
Avatar
Thank you so much, this information helps a lot 👍!!
👍 1
Avatar
misterturtle 10/28/2022 12:33 AM
I know this is generally a blue team server, but has anyone found any reasonable articles and research on ProxyNotShell beyond the high level analysis?
Avatar
Avatar
misterturtle
I know this is generally a blue team server, but has anyone found any reasonable articles and research on ProxyNotShell beyond the high level analysis?
Andrew Rathbun 10/28/2022 3:53 AM
If there is demand for a penetration testing channel, just speak up. That being said there's a SANS red team server that is probably a better fit unless there's a whole group of red teamers here that I'm not aware of
Avatar
Good morning. Is there anyone from @Magnet Forensics available to talk about picture categorization?
Avatar
Avatar
stps358
Good morning. Is there anyone from @Magnet Forensics available to talk about picture categorization?
chriscone_ar 10/28/2022 5:21 AM
I’m happy to help
Avatar
Deleted User 10/28/2022 9:19 AM
Hello I need help, how could I find a file executed with process ghosting?
Avatar
Avatar
Deleted User
Hello I need help, how could I find a file executed with process ghosting?
Understanding how endpoint products work to identify malicious actions can lead to the discovery of security gaps which can be used for evasion during red team operations. The technique Process Her…
👍 2
Avatar
Avatar
Andrew Rathbun
Change it to yyyy-MM-dd HH:mm:ss.fffffff and exit and reingest the CSV
OK!!!! It looks like the list of files this individual stole ALL have timestamps with Last Modifiedx10 .000000 subseconds, the first part of the date looks to be somewhat randomized.
5:35 PM
Well I need to add one more f, but 5 zeros anyway here
5:41 PM
@Andrew Rathbun Also this:
Avatar
Avatar
CyberTend
@Andrew Rathbun Also this:
Andrew Rathbun 10/28/2022 5:43 PM
Are these malicious files, per chance?
Avatar
Avatar
Andrew Rathbun
Are these malicious files, per chance?
Nope, just highly proprietary company owned intellectual property
Avatar
Avatar
Andrew Rathbun
Are these malicious files, per chance?
So all of these are .pdf, .docx, .xlsx. The files we believe were taken do have the SI<FN & u Sec all zeros
Avatar
Avatar
Andrew Rathbun
Are these malicious files, per chance?
And all of these do have values in the Created (0x30). Obviously this is a different time than in Created(0x10)
Avatar
Avatar
Nanotech Norseman
If it's any kind of hard disk media, we tend to DOD wipe them (can do with a standard computer, though I can't remember off the top of my head which program), but we have a special (and noisy) piece of tech that does it for us. Then we drill holes and hand them off
Dban?
Avatar
Avatar
Digitalferret
yeh, i find disposablemail dot com or similar has enough randomness to the name that they get accepted
I tried using my custom domain (managed to get email working on it). But no dice. I guess Magnet and X-ways do not like me LOL (CANNOT imagine why </sarcasm>)
Avatar
Avatar
dsplice
I tried using my custom domain (managed to get email working on it). But no dice. I guess Magnet and X-ways do not like me LOL (CANNOT imagine why </sarcasm>)
Digitalferret 10/31/2022 1:11 AM
SMH, when email paranoia overtakes the desire to do business.
1:14 AM
nearly as bad as call centre for national Co "your call is important to us... <glacial wait times> .. Hello your through to Tier one, which queue would you like to wait i next?"
Avatar
Hi! I’m a student currently working on a big project for my forensics class and have some questions I need to ask, is anyone familiar with ballistics or even works as a ballistics/firearms expert?
Avatar
This is a server more for digital forensics, not the traditional forensics work
Avatar
Ah okay thank you!!
Avatar
Shot in the dark, are any of you out of Hawaii?
Avatar
has anyone seen a SDL file within a GPS unit ? It looks like its maping data but just dont know how to decode it.
Avatar
Avatar
Jetten_007
has anyone seen a SDL file within a GPS unit ? It looks like its maping data but just dont know how to decode it.
Digitalferret 10/31/2022 3:55 PM
you think it might be worth giving Rand McNally a call?
Avatar
That may work... it may take some time to find the right person..
👍🏻 1
Avatar
Do you guys have antivirus software on your personal and/or work devices? Im curious as considering theres a lot of government workers here id assume your workplaces would have SOCs or SEIMs an all that so do you guys not bother with antivirus or are they super important in workplaces and personal devices ontop of these other tools and resources?
Avatar
Avatar
Atom
Do you guys have antivirus software on your personal and/or work devices? Im curious as considering theres a lot of government workers here id assume your workplaces would have SOCs or SEIMs an all that so do you guys not bother with antivirus or are they super important in workplaces and personal devices ontop of these other tools and resources?
Is It Done Yet? 11/1/2022 12:57 AM
We have a mixture of networked and open source devices, including computers, laptops and mobile devices. The networked devices are managed internally by IT with their processes and policies, the open source devices don't see the internal network so stuff like antivirus is not something we have to worry about in that regard.
Avatar
Avatar
Is It Done Yet?
We have a mixture of networked and open source devices, including computers, laptops and mobile devices. The networked devices are managed internally by IT with their processes and policies, the open source devices don't see the internal network so stuff like antivirus is not something we have to worry about in that regard.
Thank you for your answer:D Say a policy is breached i.e user falls victim to phishing, plugs in a rouge device etc, wouldnt an antivirus be helpful to prevent and/or flag any malware? Or would internal IT processes pick up on that and then IT just looks into it thus removing the need for the warning part that antiviruses usually have?
Avatar
Avatar
Atom
Thank you for your answer:D Say a policy is breached i.e user falls victim to phishing, plugs in a rouge device etc, wouldnt an antivirus be helpful to prevent and/or flag any malware? Or would internal IT processes pick up on that and then IT just looks into it thus removing the need for the warning part that antiviruses usually have?
Is It Done Yet? 11/1/2022 1:13 AM
I work mainly in the open source world, as I do digital forensics which is not done on the networked side of things, so cannot give you a definitive answer. That said, all network machines are monitored internally by IT so any malware etc would be identified. As for our digital forensic machines etc like our laptops we use for open source we just accept there is a risk.
Avatar
Avatar
Is It Done Yet?
I work mainly in the open source world, as I do digital forensics which is not done on the networked side of things, so cannot give you a definitive answer. That said, all network machines are monitored internally by IT so any malware etc would be identified. As for our digital forensic machines etc like our laptops we use for open source we just accept there is a risk.
Ahh ok cool, thank you! Love learning about this stuff
Avatar
Avatar
Atom
Do you guys have antivirus software on your personal and/or work devices? Im curious as considering theres a lot of government workers here id assume your workplaces would have SOCs or SEIMs an all that so do you guys not bother with antivirus or are they super important in workplaces and personal devices ontop of these other tools and resources?
Malwarebytes on a vm that deals with downloading samples , on windows usually just defender is sufficient, on Linux clamav if it’s also a device for downloading files, on Mac, Malwarebytes as it’s the easiest to scan files coming from or going to Windows.
1:43 AM
Other than that I use https://www.ossec.net/
OSSEC is a multiplatform, open source and free Host Intrusion Detection System (HIDS). You can tailor OSSEC for your security needs through its extensive configuration options, adding custom alert rules and writing scripts.
Avatar
Avatar
Atom
Do you guys have antivirus software on your personal and/or work devices? Im curious as considering theres a lot of government workers here id assume your workplaces would have SOCs or SEIMs an all that so do you guys not bother with antivirus or are they super important in workplaces and personal devices ontop of these other tools and resources?
One thing I’ve noticed is my AV doesn’t flag any malware during the extraction process. However, if I zip a final extraction/report with malware in it, my AV screams at me.
Avatar
Avatar
dcs453
One thing I’ve noticed is my AV doesn’t flag any malware during the extraction process. However, if I zip a final extraction/report with malware in it, my AV screams at me.
Yeah, that sucks. I've tried using Capev2 and Cuckoo sandboxes with limited success. Still takes a bit to setup right to have malware running on windows 7. Wish it was a bit easier to turn off security on windows, but then it'd be easier for malware too.
Avatar
@Cellebrite morning - I was wondering why some of our workstations have blank 'New Computer ID's' in the licensing section of UFED PA, but not all of them. Is there a fix? Thanks in advance
Avatar
Can I ask anyone here a question about a DFIR job posting. I really want to build my skills up to selling myself in interviews but I don’t know what kind of entry level jobs to go for (edited)
Avatar
Avatar
Raines
Can I ask anyone here a question about a DFIR job posting. I really want to build my skills up to selling myself in interviews but I don’t know what kind of entry level jobs to go for (edited)
Andrew Rathbun 11/1/2022 9:44 AM
#training-education-employment
Avatar
SANS Difference Makers Awards voting is now open. Please vote for me in Open Source Tool Creator of the Year! https://survey.sans.org/jfe/form/SV_eXuwVrkCVdeoKMu
Make your selection for the winner in each of 11 categories!
💯 1
Avatar
Don't forget about the Hitchhikers Guide to DFIR 😉
👍 4
this 1
Avatar
Avatar
Fierry
Don't forget about the Hitchhikers Guide to DFIR 😉
Got my vote. 😉
💯 1
Avatar
Can anyone recommend a program to pull text msg/iMessages off iPhones for an IT networking area for HR or ER type of investigation ? They are trying to avoid using us which is fine with me 🙂
Avatar
any @Magnet Forensics sales can chat? i want to understand Magnet Review
Avatar
Avatar
DCSO
Can anyone recommend a program to pull text msg/iMessages off iPhones for an IT networking area for HR or ER type of investigation ? They are trying to avoid using us which is fine with me 🙂
Itunes backup then examine the backup with 3utools and there is messages section which can be exported to PDF
👍 1
10:24 AM
3uTools V 2.19 has been released for several days, have you experience the latest update? This tutorial will show you how to quickly search a message in 3uTools backup viewer.
Avatar
Pretendigator 11/3/2022 4:43 AM
@Magnet Forensics or anyone that knows... Which command line arguments I can use with the axiom installer? (v671) Also the same for @Griffeye installer? Can't find the documentation 😦 (edited)
Avatar
Speaking of @Magnet Forensics, any chance someone can help a brother get a trial license? Not working currently and looking to do some self education.
Avatar
Avatar
RX
any @Magnet Forensics sales can chat? i want to understand Magnet Review
Michael Paleshi 11/3/2022 7:44 AM
hey @RX - Has anyone reached out to you? If not, I can get someone to touch-base with you
Avatar
Dsplice, glad you asked for a trial license. I have found myself in the same position now that I am retired, but participating in the CTF’s from Magnet and Cellebrite is a great and free way to grab a license for a limited time I am a also coach for IACIS so we received licenses for Belkasoft, FEX and OSTriage this year so if you are a CFCE being a coach is another way to grab a few licenses and really help a brother or sister out by volunteering.
Avatar
Avatar
sean4597
Dsplice, glad you asked for a trial license. I have found myself in the same position now that I am retired, but participating in the CTF’s from Magnet and Cellebrite is a great and free way to grab a license for a limited time I am a also coach for IACIS so we received licenses for Belkasoft, FEX and OSTriage this year so if you are a CFCE being a coach is another way to grab a few licenses and really help a brother or sister out by volunteering.
I will look into that. Unfortunately I am not a CFCE, but likely should look into it as well!
Avatar
Hi, maybe someone here can help me. Does anyone know what data can be asked at Facebook / Google considering search query or profile views? Is that even a possible? I'm doing this with a warrant.
Avatar
Avatar
Walter_Ego
is there a way to write out an ecryptfs volume as a block image? i have opened one using ecryptfs-recover-private and have it mounted but it doesn't appear to have a block device i can slurp with dd or similar
Hi, I had the same situation. I mounted .Private folder. In order to use Xways, I created an empty .IMG file with dd and I copied the contents of .Private folder in the .IMG file in order to import it in Xways. (edited)
👍 1
Avatar
cheers mate
Avatar
I was wondering if anyone might know of a website or source that I could find detailed pictures of different models of cars and specifically changes between model years without searching for each model individually? Lately I find myself doing a lot of vehicle identification work with pretty shoddy security cam footage. A page where I could compare a few different models say headlight shape at a time would be immensely helpful.
Avatar
Avatar
gizmobeans
I was wondering if anyone might know of a website or source that I could find detailed pictures of different models of cars and specifically changes between model years without searching for each model individually? Lately I find myself doing a lot of vehicle identification work with pretty shoddy security cam footage. A page where I could compare a few different models say headlight shape at a time would be immensely helpful.
I typically use www.edmunds.com after i have an idea of the vehicle make, and I've also had good luck using google lens or simular to get a model/type
Avatar
Avatar
gizmobeans
I was wondering if anyone might know of a website or source that I could find detailed pictures of different models of cars and specifically changes between model years without searching for each model individually? Lately I find myself doing a lot of vehicle identification work with pretty shoddy security cam footage. A page where I could compare a few different models say headlight shape at a time would be immensely helpful.
melissa_at_amped 11/4/2022 6:55 AM
The FBI has a resource called DAIS (Digital Automotive Image System) that you can get as law enforcement. That might be what you're looking for.
Avatar
Avatar
melissa_at_amped
The FBI has a resource called DAIS (Digital Automotive Image System) that you can get as law enforcement. That might be what you're looking for.
@DCSO I've been using Edmonds for a lot but I was hoping for something a little more streamlined. I hadn't thought of using Lens though, I'll see if that gets me anywhere. Thanks!
Avatar
Avatar
melissa_at_amped
The FBI has a resource called DAIS (Digital Automotive Image System) that you can get as law enforcement. That might be what you're looking for.
That sounds perfect, thank you!
👍 1
Avatar
is anyone aware of software that can monitor/record all of the various USB dongle licenses that are being actively used within an office?
Avatar
benny | RlP 11/4/2022 9:16 AM
i think its just possible through a kind of dongle share like virtualhere. (maybe i am wrong)
👍 2
Avatar
Utn manager
Avatar
Avatar
Gorp
is anyone aware of software that can monitor/record all of the various USB dongle licenses that are being actively used within an office?
I’d probably use https://github.com/snovvcrash/usbrip or modify it for my use case with regards to a specific file.
Tracking history of USB events on GNU/Linux. Contribute to snovvcrash/usbrip development by creating an account on GitHub.
Avatar
Any interest in a adding a channel for blockchain forensics?
Avatar
Avatar
Gorp
is anyone aware of software that can monitor/record all of the various USB dongle licenses that are being actively used within an office?
Most people seem to use Virutalhere server software, you can use a raspberry pie etc to do it. Search "dongle server" on here and you will see a lot of talk about it.
👍 1
Avatar
Avatar
Dave
Any interest in a adding a channel for blockchain forensics?
Probably #darknet-virtual-currencies
Avatar
https://sif.org.uk/ - as UK going through tough times (interest rates increasing etc) anyone working in security is protected by FIS (never head of, until now xD) and is automatically discounted for food, clothing, gym and legal coverage, monthly subscription is involved. Thought I'd share as it maybe useful to others. (edited)
👍 1
Avatar
Jack of Trades 11/5/2022 7:50 AM
Anyone at dfw bsides today?
Avatar
@Magnet Forensics - im creating my second portable case file and it has run for over 24 hours. The first one I ran contained larger evidence and more records. I see tmp files are still being created and still running. Is this normal to take over 24 hours or longer ?
8:41 AM
one of the evidence is a mac, might this be a cause ?
Avatar
Avatar
Jay528
@Magnet Forensics - im creating my second portable case file and it has run for over 24 hours. The first one I ran contained larger evidence and more records. I see tmp files are still being created and still running. Is this normal to take over 24 hours or longer ?
Not Magnet, but how big is the extraction and what type of PC are you running it on ?
Avatar
750 gb mac and 500 gb windows
10:46 AM
The first was 3 windows
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 11/7/2022 3:43 AM
#challenges-and-ctfs
Avatar
Seraphina1698 11/7/2022 3:46 AM
Oh snap, sorry! moving it it now. Thank you!
Avatar
Avatar
Jay528
@Magnet Forensics - im creating my second portable case file and it has run for over 24 hours. The first one I ran contained larger evidence and more records. I see tmp files are still being created and still running. Is this normal to take over 24 hours or longer ?
chriscone_ar 11/7/2022 5:35 AM
Evidence source really shouldn't have much impact since the evidence files aren't aren't included in the portable case . Can I DM you for some specifics and we'll see if we can figure it out? Definitely shouldn't be taking that long!
Avatar
yes, thanks
Avatar
Avatar
chriscone_ar
Evidence source really shouldn't have much impact since the evidence files aren't aren't included in the portable case . Can I DM you for some specifics and we'll see if we can figure it out? Definitely shouldn't be taking that long!
Since few months some portablecases take several hours to create and are a little bit huge (I had a 300gb portableCase for a 500gb drive)
Avatar
Avatar
AnTaL
Since few months some portablecases take several hours to create and are a little bit huge (I had a 300gb portableCase for a 500gb drive)
chriscone_ar 11/7/2022 10:02 AM
Hi @AnTaL - I thought you were busy fighting with password protected Word documents 🤣 I'd be interested if you could share what the content of the portable cases were that are taking longer to complete. Just an example - if they mostly consist of media items that could make for a rather large portable case compared to a portable case consisting of other more text-based items, like operating system artifacts. If you see a pattern similar to that example, we may be at the mercy of copying 300gb of data to whatever location you are creating the portable case - drive type and case data location plays a role here. However, if you're seeing portable cases of all types taking several hours to complete - even when they aren't chock-full of media items, then something else may be at issue and we need to loop support in and get it looked at.
Avatar
I have so much fights @chriscone_ar (edited)
😁 1
10:09 AM
Indeed that's what I suspected, often linked to huge amount of medias. Anyway I had a doubt when you said "evidence files are not included" in the PortableCase
Avatar
Avatar
AnTaL
Indeed that's what I suspected, often linked to huge amount of medias. Anyway I had a doubt when you said "evidence files are not included" in the PortableCase
chriscone_ar 11/7/2022 10:11 AM
Ah - let me clarify what I was thinking instead of what I typed. The evidence containers (E01, DD, etc.) are not included in the portable case. Those media items are included, as you've found. Sorry for the confusion, totally my fault!
Avatar
No worry, understood, it was clear after your reply about medias
👍 1
Avatar
@Magnet Forensics does AXIOM support a sparsefile as a disk image? I imaged a mac using SUMURI's and it ended up creating a sparsefile.
Avatar
Any interest in a Melbourne (Australia) DF community night? We are going to start a monthly community night in Feb 2023. If you are interested in joining, or even better speaking, please send me a DM! Cheers, Dave (CDFS)
Avatar
anyone know of a write blocker for a NVME 2230 ssd ?
7:18 AM
Avatar
Avatar
Jay528
Click to see attachment 🖼️
Digitalferret 11/8/2022 7:20 AM
depends what your budget is but Deepspar miight be compatible. Guardonix/USB-Stabiliser range
Avatar
thank you
Avatar
Digitalferret 11/8/2022 7:21 AM
yw. the main device is the blocker, then it's just the set of adapters (or buy your own)
Avatar
might be out of budget
Avatar
Digitalferret 11/8/2022 7:24 AM
yeh, they aren't a cheap co, but the gear is good. otherwise check a DR co and se eif they'll image for you?
Avatar
The SSD will connect to write blocker I have but it isnt held down securely
7:26 AM
I wasnt sure if there was a company who already made the 2230 ssd w/b
Avatar
Digitalferret 11/8/2022 7:26 AM
dude, engineer it 🙂 blue tac
Avatar
sounds like you have some free time and I can be your marketing agent
Avatar
Digitalferret 11/8/2022 7:26 AM
hehe
7:28 AM
most gear started of as some sort of kludge, then got refined. if it's just the length, do you not just need an adapter?
7:29 AM
and the Guardonix/Stabiliser - you could likely get your money back in a couple of recoveries if you are friends with any tech shops over there
Avatar
I am looking for adapter if it exists
7:37 AM
7:37 AM
this one doesnt fit the 30 mm (edited)
Avatar
Avatar
Jay528
this one doesnt fit the 30 mm (edited)
For most M.2 SSDs I have had to use a USB to M.2 SSD adaptor and then attach it to a write-blocked USB port.
💯 1
👍 1
7:46 AM
SSK Aluminum M.2 NVME SSD Enclosure Adapter, USB 3.1 Gen 2 (10 Gbps) to NVME PCI-E M-Key Solid State Drive External Enclosure (Fits only NVMe PCIe 2242/2260/2280)
7:46 AM
M.2 SATA SSD to USB 3.0 External SSD Reader Converter Adapter Enclosure with UASP, Support NGFF M.2 2280 2260 2242 2230 SSD with Key B/Key B+M
7:48 AM
My TX1 has issues reading M.2 SSDs and that has been the best solution. You should be able to use other adapters, those are just the ones I bought.
Avatar
thank you
Avatar
Avatar
FullTang
My TX1 has issues reading M.2 SSDs and that has been the best solution. You should be able to use other adapters, those are just the ones I bought.
I dont know if this is something you have considered, but my experience using the m.2 adapter for the TX1 requires booting the TX1 after it is plugged in (cant hot swap). Otherwise a normal USB m.2 adapter has shown to be hot swappable.
👍 1
Avatar
Avatar
Carcino
I dont know if this is something you have considered, but my experience using the m.2 adapter for the TX1 requires booting the TX1 after it is plugged in (cant hot swap). Otherwise a normal USB m.2 adapter has shown to be hot swappable.
Thanks for the tip. Even when connecting some M.2 SSDs to the TX1 while the TX1 is turned off, then powering on the TX1, it still fails to detect some M.2 SSDs. Anything that the TX1 fails to detect with its adaptors so far has been detected with those two M.2 adaptors I listed on the write-blocked USB on the TX1.
Avatar
Avatar
FullTang
Thanks for the tip. Even when connecting some M.2 SSDs to the TX1 while the TX1 is turned off, then powering on the TX1, it still fails to detect some M.2 SSDs. Anything that the TX1 fails to detect with its adaptors so far has been detected with those two M.2 adaptors I listed on the write-blocked USB on the TX1.
Thats good to know, I will make a note of that. Do you happen to know if there is any commonality between the ones which the TX1 could not read?
Avatar
Avatar
Carcino
Thats good to know, I will make a note of that. Do you happen to know if there is any commonality between the ones which the TX1 could not read?
Great question. I have not kept track of the specs of each hard drive to try and find out why the TX1 won't read them. I think most of my issues have been with SATA M.2 SSDs, NVME tends to work on the TX1.
👍 1
Avatar
Avatar
Jay528
Click to see attachment 🖼️
I’ve used this before with either some kapton tape or a (not too heavy duty) rubber band around it to hold it down
Avatar
Avatar
rojo
I’ve used this before with either some kapton tape or a (not too heavy duty) rubber band around it to hold it down
i did the same as a bootable distro didnt work
👍 1
Avatar
anyone with contacts to gmail? Got a threat actor doing MX-only abuse.
Avatar
Avatar
conf1ck3r
anyone with contacts to gmail? Got a threat actor doing MX-only abuse.
I’ve got a contact, unless it’s a large amount might be awhile before it’s addressed but I’ll send details either way (edited)
Avatar
Avatar
tklane
I’ve got a contact, unless it’s a large amount might be awhile before it’s addressed but I’ll send details either way (edited)
Much appreciated thanks! It’s thousands of domains at the moment.
Avatar
Avatar
conf1ck3r
Much appreciated thanks! It’s thousands of domains at the moment.
DM me the deets and I can forward on
Avatar
Rich Mahogany 11/9/2022 1:15 AM
@Law Enforcement [UK] What does everyone use to store/charge devices in PIN decryption? We currently have ours spread out on a counter top in trays and I'm looking into more practical space-saving solutions. My initial thought was a 'charging trolley' like they have in schools. I'd be interested in any suggestions. Cheers!
Avatar
Avatar
Rich Mahogany
@Law Enforcement [UK] What does everyone use to store/charge devices in PIN decryption? We currently have ours spread out on a counter top in trays and I'm looking into more practical space-saving solutions. My initial thought was a 'charging trolley' like they have in schools. I'd be interested in any suggestions. Cheers!
Laptop charging lockers by Probe. Perfect for schools. Portable and anti-bacterial Free delivery from Manutan UK.
Avatar
Avatar
Rich Mahogany
@Law Enforcement [UK] What does everyone use to store/charge devices in PIN decryption? We currently have ours spread out on a counter top in trays and I'm looking into more practical space-saving solutions. My initial thought was a 'charging trolley' like they have in schools. I'd be interested in any suggestions. Cheers!
We use these
👍 1
Avatar
Avatar
blake-ee
We use these
Same here
Avatar
Something like this with cables running into the back and a laminated label on the front to write in dry wipe marker. Not sure how ISO17025 friendly that is though.
1:20 AM
Charging cables were just off the shelf cables with multi usb chargers.
1:20 AM
You can stack them on top of each other if you get the right brand.
👍 2
Avatar
Rich Mahogany 11/9/2022 1:30 AM
Nice one. Thanks for the getting back everyone. I’ll put forward some different options management and see what they prefer 😁
1:31 AM
Shouldn’t see any issues with ISO as long as everything is labelled correctly and within our secure lab 👍
Avatar
Avatar
blake-ee
We use these
We had these and it was deemed a risk to batteries/fire issue. Moving to cabinet. Taking a while to be delivered.
Avatar
Avatar
blake-ee
We use these
We had these is previous job. ISO people were fine with it.
Avatar
We had a steel cabinet affixed to the wall.
3:06 AM
Something like this
Avatar
Avatar
Rich Mahogany
@Law Enforcement [UK] What does everyone use to store/charge devices in PIN decryption? We currently have ours spread out on a counter top in trays and I'm looking into more practical space-saving solutions. My initial thought was a 'charging trolley' like they have in schools. I'd be interested in any suggestions. Cheers!
90 locker cabinets with usb hub power cables to all running from 3 UPS. 10 of the cabinets have usb c and micro USB connectors for the phones that are using the tool that cannot be mentioned (Trevor). Cabinets like @Corey and @Steve2609 have already screenshot. Had the cabinets running for about 3 years with no issue. The cabinets are just big enough for the average iPad. (edited)
Salute 1
Avatar
Does anyone have any idea if we can remove an evidence from the Nuix processed case? @Nuix
Avatar
Can anyone confirm that chat capture in 4PC does not work on the newer iOS versions? I don't have a newer iphone available to test. @Cellebrite (edited)
Avatar
nachito 4n6s 11/9/2022 10:13 AM
Does anyone knows if Samsung high end devices support 2 eSIM active at the same time ?
Avatar
Avatar
WyzMan
Can anyone confirm that chat capture in 4PC does not work on the newer iOS versions? I don't have a newer iphone available to test. @Cellebrite (edited)
I havent tried chat capture but screen capture did not work with iOS 16
Avatar
Avatar
Jay528
I havent tried chat capture but screen capture did not work with iOS 16
Thanks Jay.
Avatar
Avatar
WyzMan
Can anyone confirm that chat capture in 4PC does not work on the newer iOS versions? I don't have a newer iphone available to test. @Cellebrite (edited)
Let me check into this.. ill get back to you
Avatar
MrMacca (Allan Mc) 11/10/2022 3:19 AM
Morning all, I've been tasked with setting up Electro Static Discharge protection within our imaging lab. Looking for any company recommendations that produce high quality Anti static equipment at good prices. I'm UK based. Also what hardware are you guys currently using in your work place? I'm leaning towards anti static mats, wrist straps, but if there's something you feel is a high recommendation please do say. Are gloves overkill? Thanks in advance.
Avatar
Avatar
MrMacca (Allan Mc)
Morning all, I've been tasked with setting up Electro Static Discharge protection within our imaging lab. Looking for any company recommendations that produce high quality Anti static equipment at good prices. I'm UK based. Also what hardware are you guys currently using in your work place? I'm leaning towards anti static mats, wrist straps, but if there's something you feel is a high recommendation please do say. Are gloves overkill? Thanks in advance.
Digitalferret 11/10/2022 3:39 AM
i'd add some sort of Ed/Training to that list. much like security, ESD protection is as much mindset as a (set of) products. Gearwise, my last pro lab was milspec and all about ESD. flooring, heelstraps, lab coat, wrist straps, full ESD bench (know the difference between conductive and dissipative) and also wall mounted test station and a daily/per-shift sign in sheet. any and all gear on those benches had to be ESD considered too.
3:41 AM
I proudly made the biggest contribution to ESD safety in our place. i got a hair cut. QA measured 3.5kv on me head prior, big hair kinda thing. think Bryan May but blown dry.
😂 2
Avatar
MrMacca (Allan Mc) 11/10/2022 3:42 AM
Well since having a daughter and working in forensics...ive lost my hair 😛
😂 5
Avatar
Digitalferret 11/10/2022 3:47 AM
might as well embarrass meself here as in public 🙂 (edited)
PepeLaugh 4
3:47 AM
🤣 2
3:48 AM
got s spot of cash for a local charity too, so all good
Avatar
If it’s for charity it’s worth it
Avatar
Digitalferret 11/10/2022 3:50 AM
yeh, it was for me, but there's no sense wasting an opportunity. StMartins kids hospice/Respite was a favourite as a work colleague had a kid in there
3:51 AM
only wish I'd have considered contacting them first, they might have raised thosuands more (you've seen the things on TV etc)
3:52 AM
aaaaaaaaaaaanyway. ESD
Avatar
MrMacca (Allan Mc) 11/10/2022 3:56 AM
In the 1st picture I thought a sloth was sat on your head....
Avatar
Digitalferret 11/10/2022 4:14 AM
hdehe, pretty much
Avatar
Avatar
WyzMan
Can anyone confirm that chat capture in 4PC does not work on the newer iOS versions? I don't have a newer iphone available to test. @Cellebrite (edited)
So i missed the iOS part. Chat Capture is for Android, screenshot method has a bug in it for iOS 16, but is getting fixed in upcoming release of 7.60 (edited)
Avatar
Avatar
CLB-Paul
Let me check into this.. ill get back to you
Thank you sir.
Avatar
Avatar
CLB-Paul
So i missed the iOS part. Chat Capture is for Android, screenshot method has a bug in it for iOS 16, but is getting fixed in upcoming release of 7.60 (edited)
Roger that. The CANSOF guys I am sitting next to say hello.
Avatar
Solid group of guys.. and long over due for a 🍻
cheers 1
Avatar
anyone know where I can get some practice E01’s?
Avatar
Avatar
CasaJaguar
anyone know where I can get some practice E01’s?
chriscone_ar 11/10/2022 1:24 PM
Avatar
@Cellebrite hello I'm having a problem doing an extraction on an Samsung SM-S367VL. I'm getting malfunction 54 error. What does this error mean?
Avatar
Avatar
CasaJaguar
anyone know where I can get some practice E01’s?
A bunch of links on my page under Test/CTF Images https://startme.stark4n6.com/
A startpage with online resources about Forensics, created by Stark 4N6.
Salute 2
Avatar
Avatar
mitchlang
@Cellebrite hello I'm having a problem doing an extraction on an Samsung SM-S367VL. I'm getting malfunction 54 error. What does this error mean?
Andrew Rathbun 11/11/2022 12:14 PM
#mobile-forensic-extractions
👍 1
Avatar
@stark4n6 , I noticed a link that was not working on the page. Just wondering if you would like it reported (in what manner if yes, is most convenient)?
Avatar
Avatar
dsplice
@stark4n6 , I noticed a link that was not working on the page. Just wondering if you would like it reported (in what manner if yes, is most convenient)?
What one is broken?
Avatar
Avatar
stark4n6
What one is broken?
Avatar
Will take a look, most likely the site finally expired
Avatar
Avatar
stark4n6
Will take a look, most likely the site finally expired
No worries!
Avatar
Avatar
dsplice
No worries!
thanks for the heads up
Avatar
Avatar
stark4n6
thanks for the heads up
Thanks for all the information! 🙂
👍 1
Avatar
@Cellebrite I was curious since I called multiple times what days you guys are open. I left 2 messages today
Avatar
Avatar
ChadlyThicc
@Cellebrite I was curious since I called multiple times what days you guys are open. I left 2 messages today
Our support lines are not avail via phone one weekend. Via email but not phone
10:25 AM
Who are you trying to reach support or sales ?
Avatar
Sales team for my free trial
Avatar
Avatar
ChadlyThicc
Sales team for my free trial
If you don’t get answer by next week send me a Dm and I can send it along.
Avatar
Really sorry kids usage 🙌
Avatar
ChadlyThicc 11/13/2022 8:44 AM
When I erase my phone and click start from backup will it show the backups I manually did
8:45 AM
Like I clicked the backup now button on the iCloud or will it just still be the most recent one
8:45 AM
Because I don’t want to accidentally erase my phone
Avatar
Would be the latest backup , unless you did full backups on a desktop
Avatar
Because this one video I looked up the guys phone looked like this
10:08 AM
10:09 AM
I’m looking at the latest iPhone backups how there’s 3
Avatar
Pick one 😀
🤣 1
Avatar
Oh this isn’t my phone this is the example the guy used lol
😆 1
Avatar
1.what is the best tool to recover recent deleted call logs and messages of whatsapp and whatsapp bussiness from mobile, either logical or physical extraction? (if physical not supported then) android and why official WA bussiness app not supported in logical and FFS? (edited)
Avatar
Hi all, we have a few spare hi spec PC’s that we are going to use for experiments but we aren’t sure what to use them for. Anyone have any suggestions? They don’t have any hi spec graphics just 1050ti’s and 8th GEN (I believe) Intel extreme CPU’s
Avatar
Avatar
obi95
Hi all, we have a few spare hi spec PC’s that we are going to use for experiments but we aren’t sure what to use them for. Anyone have any suggestions? They don’t have any hi spec graphics just 1050ti’s and 8th GEN (I believe) Intel extreme CPU’s
What about turning them into sandbox VMs you can use for testing unseen software? You can use that to identify relevant DF artefacts
12:16 PM
Granted it is a bit of a waste of 1050Tis
Avatar
Avatar
obi95
Hi all, we have a few spare hi spec PC’s that we are going to use for experiments but we aren’t sure what to use them for. Anyone have any suggestions? They don’t have any hi spec graphics just 1050ti’s and 8th GEN (I believe) Intel extreme CPU’s
Esxi boxes.
Avatar
ChadlyThicc 11/13/2022 4:12 PM
I erased all contacts because I though my manually backup was still there
4:12 PM
It wasn’t
4:12 PM
Would the NAND be fully erased
Avatar
For the SIs and hardware nuts here, my main rig(5950x) has a fried mobo, and I’m looking at jumping to either the 7950x or a 13900k, leaning towards the former… anyone have real world insight on what might be better for forensic processing?
Avatar
Avatar
ChadlyThicc
Would the NAND be fully erased
The storage is encrypted, once the erase is completed the key to read the data is erased and the content not recoverable , iirc
Avatar
Avatar
Turb0Yoda
For the SIs and hardware nuts here, my main rig(5950x) has a fried mobo, and I’m looking at jumping to either the 7950x or a 13900k, leaning towards the former… anyone have real world insight on what might be better for forensic processing?
13900k
Avatar
Avatar
ryd3v
13900k
Any specific reason?
Avatar
The intel chip is faster according to all the recent benchmarks
10:48 PM
Really boils down to your budget. If money isn’t a concern I’d go with the best mobo you could get for the intel chip.
10:49 PM
The AMD looks great but Intel is always king. 😄
Avatar
My understanding was that they trade blows
10:49 PM
I’m also not entirely fond of the P/E cores
10:49 PM
Yeah Intel is not always king lol
Avatar
Well the Intel has the higher clock and top max GHz so, in regards to processing power at the end of the day a higher GHz is going to perform better
10:50 PM
The right measurement is IPC there
10:50 PM
Not clock speed
Avatar
If 1 CPU had 5 IPC at 3 GHz, and another 10 IPC at 2Ghz, that slower CPU will still get more work done
Avatar
Depends if your application is using multi threading
Avatar
True
10:52 PM
Even then, with intel using a mix of core types, that’s my main reason why I ask
Avatar
So in a real world scenario and based on all the tests and comparisons so far of both chips the intel has been the best
Avatar
Specific to forensic tasking or in general
Avatar
In general, which forensics tasks would be more towards the tasks that have been tested.
10:53 PM
Just my opinion , if it was me, I’d probably go for the intel Chip.
10:54 PM
The intel chips seem to have better motherboard options and performance as well. Also
10:55 PM
The intel chips have a higher ram speed so in forensics scenario higher cpu and ram speed would definitely be a major factor.
Avatar
Tbh with DDR5 and PCIe 5.0, they all seem hilariously overkill, mobo choice isn’t a concern, it’ll be an ASRock Taichi all day either way
10:56 PM
I’m mostly hoping this mobo limps along until the 3D v-cache stuff in January
10:56 PM
I made a mistake ditching my Taichi for asus
Avatar
Yeah guess it personal preference, I don’t particularly like asrock myself.
10:56 PM
I tend to stick with Asus or gigabyte
10:57 PM
Also like MSI depending on the budget
10:57 PM
I’d probably go with a workstation board. By Asus tbh
Avatar
I’ve had 10 years of bad experiences with asus
10:58 PM
Current mobo is a proart and bios is unstable and has uhh
10:58 PM
The visual lines… I’m blanking out
10:58 PM
Like screen tear and glitching…
10:59 PM
Last job also had all the asus mobos onboard raid card die 🫠
Avatar
That could be many things.
10:59 PM
Gigabyte is solid. Never had one bad gigabyte board.
Avatar
It could, but swapping GPU, putting in a 5900x instead of my 5950, and a fresh kit of RAM did nothing
10:59 PM
Neither did a bios flash or reset
Avatar
Have had a lot of bad experiences with asrock, even when customers request them, I try to talk them out if it
Avatar
So RMA it is, paid for the warranty at microcenter (edited)
Avatar
Avatar
Turb0Yoda
It could, but swapping GPU, putting in a 5900x instead of my 5950, and a fresh kit of RAM did nothing
Could be power delivery, bad hdmi cable etc. not necessarily the mobo (edited)
Avatar
The three Taichi boards I had had 0 issues and are still running
11:00 PM
Not the cables either
11:01 PM
Persisted with both the Sf750 and the 1kw silverstone it has now
11:01 PM
Not much else to blame
Avatar
Hard to say, I don’t know your specific setup and would be hard to diagnose over discord but could also be a faulty board. Not all Asus boards are top notch. Did you try a bios update?
Avatar
Avatar
Turb0Yoda
Neither did a bios flash or reset
Yep
11:01 PM
Like I said, had issues with asus since x58
Avatar
Yeah I’ve had a few bad Asus boards in the past. Depends if all the components are actually supported by the board itself
Avatar
I just avoid their products if I can
Avatar
I’m the same with asrock
Avatar
I’m the opposite 🤣
Avatar
Had a few since the 90’ never bought another since
11:02 PM
I also don’t particularly like the asrock company
Avatar
Was that when they were still apart of asus?
Avatar
But I do like Asus and gigabyte
Avatar
Meh, arguments can be made that MSI is worse id imagine
Avatar
Oh yeah have had a few bad MSI as well
11:04 PM
Honestly never had 1 bad gigabyte board yet
Avatar
They’re… 60/40 good/bad for me iirc
Avatar
I think the world record for GHz was with the gigabyte intel combo
Avatar
I haven’t personally had a gigabyte mobo since… core 2 duo?
Avatar
Oh really wow
11:05 PM
Yeah they are great
Avatar
C2D or the first gen intel
11:05 PM
I’ve done builds with them with way more recent stuff
11:05 PM
10th/12Th gen intel
11:05 PM
Mixed bag
Avatar
yeah lots of factors
11:06 PM
depends on the build, for me, customization bios, and easy fan control, with water cooling support. Japanese caps, and dual bios roms
11:07 PM
also price, of course, what you get spec wise for what you're paying and general availability
Avatar
Yeah
11:07 PM
Would be surprised if you find anything less than NCC/Rubycon on high end mobos… they tend to cheap out on PSUs
11:07 PM
Teapo caps everywhere
11:08 PM
not that it's a flex, there is still chip lottery but
Avatar
lol
Avatar
The Core i9 13900K (8P) @ 8812.8MHzscores getScoreFormatted in the CPU Frequency benchmark. elmorranks #1 worldwide and #1 in the hardware class. Find out more at HWBOT.
11:09 PM
Asus INtel combo
11:10 PM
obviously you won't run nitro in your forensics lab, but still lol
11:10 PM
just the fact these clocks are possible is mind blowing
11:11 PM
asrock can suck it lmao
11:11 PM
😁
11:15 PM
11:15 PM
here his specs, impressive
11:15 PM
[k3dwcu] Validated Dump by elmor (2022-10-14 07:15:16) - MB: Asus ROG MAXIMUS Z790 APEX - RAM: 32768 MB
Avatar
Good morning. Does anyone know of an Android system log that tracks sim card insertion and removal?
5:47 AM
I've read that simcard.dat will track it if it is found on the device, but is not always present.
Avatar
P4perTrails 11/14/2022 7:23 AM
@Cellebrite question re PA 7.57. Is there a way to sort images in thumbnail view based on filepath? (edited)
Avatar
@P4perTrails yes. when your in images tab, switch to file view. Highlight just the file path you want. go back to thumbnail view and select just the selected. I can send you some screen shots in a few if your having problems.
Avatar
Avatar
Ghosted
@P4perTrails yes. when your in images tab, switch to file view. Highlight just the file path you want. go back to thumbnail view and select just the selected. I can send you some screen shots in a few if your having problems.
I'd appreciate a screenshot if you can... As I've tried something similar like that and it didn't seem to do anything.
Avatar
@P4perTrails ok will DM you a few. Loading an extraction now. when done I will send. (edited)
Avatar
𝗖𝗮𝗶𝘁 | 𝗣𝗵𝗶𝗹𝗶𝗽𝗽𝗶𝗻𝗲𝘀 👮🏻 11/14/2022 4:14 PM
Thank you for accepting me here 😊 digital forensic examiner from Philippines 🇵🇭
Avatar
Welcome
❤️ 2
Avatar
Avatar
𝗖𝗮𝗶𝘁 | 𝗣𝗵𝗶𝗹𝗶𝗽𝗽𝗶𝗻𝗲𝘀 👮🏻
Thank you for accepting me here 😊 digital forensic examiner from Philippines 🇵🇭
F0r3ns1c4t0r 11/14/2022 5:24 PM
Welcome
❤️ 1
Avatar
chrisforensic 11/14/2022 6:27 PM
@𝗖𝗮𝗶𝘁 | 𝗣𝗵𝗶𝗹𝗶𝗽𝗽𝗶𝗻𝗲𝘀 👮🏻 yw mate 😉
❤️ 1
Avatar
AugustBurnsBlue 11/15/2022 1:46 PM
@Law Enforcement [USA] what solution are you using for digital evidence storage, that covers both localized data redundancy and disaster recovery (e.g., ransomware, etc)? My lab size is 2-3 people, but we have a sizeable grant we can tap into for proper and secure storage.
Avatar
I am just running a small LAN (NAS) synology
this 1
Avatar
Drobo
1:48 PM
with no remote connection capabilities on any computers that are attached to the LAN
Avatar
I also have a small NAS Synology connected to my forensic LAN. I tend to keep it physically unplugged from the network/offline when not in use just to be extra safe.
Avatar
Avatar
AugustBurnsBlue
@Law Enforcement [USA] what solution are you using for digital evidence storage, that covers both localized data redundancy and disaster recovery (e.g., ransomware, etc)? My lab size is 2-3 people, but we have a sizeable grant we can tap into for proper and secure storage.
We've got a petabyte SAN of some sort and I don't know much about it other than it's expensive. It is also airgapped, like others have said here.
Avatar
Avatar
AugustBurnsBlue
@Law Enforcement [USA] what solution are you using for digital evidence storage, that covers both localized data redundancy and disaster recovery (e.g., ransomware, etc)? My lab size is 2-3 people, but we have a sizeable grant we can tap into for proper and secure storage.
You might look into Evidence.com. I have heard rumors that they have cloud storage available and might integrate well if your agency uses Axon body cameras.
👍 1
Avatar
Anyone can tell me more about the map: com.facebook.Facebook.MosaicGImageDiskCache
Avatar
Avatar
Mako
Anyone can tell me more about the map: com.facebook.Facebook.MosaicGImageDiskCache
Andrew Rathbun 11/16/2022 4:38 AM
#mobile-forensic-decoding maybe?
👍🏻 1
Avatar
Anyone familiar with google logs ? Under activities - a list of google services accessed by, Product Name "Account Central". Anyone know what Account Central is ?
Avatar
Hi, anyone knows if It's able to modified a sent mail or fake It in Yahoo email count if you acquire the emails from the server?
Avatar
i was not able to find a channel for this but is there a list of recommended vms for FOR I am mainly looking for a windows vm not linux for windows forensics
10:08 AM
and i have only found flares malware FOR
Avatar
A Windows VM will most likely be difficult to find due to Windows license fees
Avatar
Avatar
Fierry
Did you check the MFT Journal? 🙂
@Andrew Rathbun Hi guys, I am back digging in deeper on this case. This screenshot has to do with some of the files the user is believed to have exfiltrated. This is output in TLE for LECmd.
Avatar
short recap? 🙂
👆 1
Avatar
Andrew Rathbun 11/17/2022 12:39 PM
If you want to solve the case, you have to use Dark Mode 😛
😂 3
Avatar
Avatar
Fierry
short recap? 🙂
:), I am investigating a user who recently left a very high profile company and position and went to a competitor. This individual indeed copied a large amount of proprietary documents off to a USB device that was a corporate approved device. No other USB's were allowed, per DLP, besides this Kingston DT2000. The user claims they never have owned or inserted such a USB. DLP clearly shows the user indeed inserted this USB on the last two days of employment and copied the files over. The local machine image I obtained, unfortunately, did not show these files copied out to the Kingston USB, but I have evidence this USB was inserted. This user was very technically savvy, so we believe he used ccleaner, timestomping, or some other means to cover his tracks. We know, on the surface, he deleted all the files in documents, desktop, downloads and such, uninstalled OneDrive. What the company is asking me is if I can determine exactly what was executed to obfuscate the files copied out from the local machine perspective, vs. what is shown in DLP. So, I have grabbed KAPE, I am actually taking the December 8th class to understand more. My day-to-day application is Belkasoft, but it did not reveal what I needed to present to the corporate investigators.
kape 1
Avatar
Avatar
CyberTend
:), I am investigating a user who recently left a very high profile company and position and went to a competitor. This individual indeed copied a large amount of proprietary documents off to a USB device that was a corporate approved device. No other USB's were allowed, per DLP, besides this Kingston DT2000. The user claims they never have owned or inserted such a USB. DLP clearly shows the user indeed inserted this USB on the last two days of employment and copied the files over. The local machine image I obtained, unfortunately, did not show these files copied out to the Kingston USB, but I have evidence this USB was inserted. This user was very technically savvy, so we believe he used ccleaner, timestomping, or some other means to cover his tracks. We know, on the surface, he deleted all the files in documents, desktop, downloads and such, uninstalled OneDrive. What the company is asking me is if I can determine exactly what was executed to obfuscate the files copied out from the local machine perspective, vs. what is shown in DLP. So, I have grabbed KAPE, I am actually taking the December 8th class to understand more. My day-to-day application is Belkasoft, but it did not reveal what I needed to present to the corporate investigators.
Andrew Rathbun 11/17/2022 12:46 PM
Nice, I'll see you there as I'll be teaching the first part of KAPE 😄
👍 1
Avatar
What filesystem was present on the USB drive?
12:47 PM
Also, kape is awesome 😉
Avatar
Avatar
Andrew Rathbun
Nice, I'll see you there as I'll be teaching the first part of KAPE 😄
awesome, this particular case prompted me to sign up for the class
Avatar
Avatar
Fierry
Also, kape is awesome 😉
Yes sir, I am absolutely loving this application
Avatar
Avatar
Fierry
What filesystem was present on the USB drive?
Because if it uses NTFS you can use the MFT or carved MFT records to determine which files have been copied
12:50 PM
Additionally, have you looked at shellbags?
Avatar
Avatar
Fierry
What filesystem was present on the USB drive?
Looking to find where the FS would be listed for the Kingston.
Avatar
Avatar
Fierry
Additionally, have you looked at shellbags?
Yes, on shellbags load, shellbag explorer loaded but threw errors several errors...Error parsing shellbag, extension block count mismatch, Unmapped GUID. most loaded though. The above error messages had this in them: More extension block signatures were found in the ShellBag than have been processed! Please send the hive to saericzimmerman@gmail.com so support can be added
Avatar
I know Eric is also on this server 🙂
Avatar
I did indeed compress and send the hive
👍 1
12:55 PM
The unmapped GUID relates to the Kingston
12:56 PM
COOL, yes the FS is indeed NTFS
12:57 PM
Do you know what the user has done with it previously in regards to potentially destructive actions?
Avatar
Avatar
Fierry
😄
No this is what I am hunting for now actually. I need to figure out how he used any application that would require local administrator privilege's. This user did not have such, but, he could have got the local administrator password from someone...potentially.
1:01 PM
The Security Log would be able to help you out there 🙂
Avatar
Avatar
Fierry
Hmm
Yes, I will look...now that I know the Kingston was NTFS, I should be able to carve that out of $MFT, or filter on it somewhow?
Avatar
Avatar
Fierry
The Security Log would be able to help you out there 🙂
Event ID 4648 will be able to tell you if RunAs has been used, 4672 will also be present if Administrator was used
Avatar
Avatar
CyberTend
Yes, I will look...now that I know the Kingston was NTFS, I should be able to carve that out of $MFT, or filter on it somewhow?
It should have its own MFT file
Avatar
I did also just find out there was no restrictions for the user to run powershell scripts
Avatar
along with its own journal, if the file activity is limited enough, it might contain traces of the file copy
Avatar
Avatar
Fierry
along with its own journal, if the file activity is limited enough, it might contain traces of the file copy
Ok, any idea where to look for that $MFT...KAPE parsed the image from the root for $MFT and $MFTMirr. I have those
Avatar
Avatar
CyberTend
I did also just find out there was no restrictions for the user to run powershell scripts
KAPE can also collect the $J file, this is what you're looking for if you're intending to use the journal
1:07 PM
and KAPE can also call MFTeCmd to parse it
Avatar
Ok, yes I see that under ../$Extended from the KAPE extract
Avatar
Ok, I have not parsed the $J, I will do that now
Avatar
You've got this 🙂
👍 1
1:09 PM
If the journal doesnt work out, refer back to the MFT, it might contain data runs which indicate a file copy
Avatar
Avatar
Fierry
You've got this 🙂
Thanks for the assist. I do see in MFT, and through reading the docs, the copy column checked for many of these files.
1:13 PM
@Andrew Rathbun Looking forward to the class. I am executing your PowerShell_MFTECmd_J-MFTParsing script as well :).
Avatar
Avatar
CyberTend
Thanks for the assist. I do see in MFT, and through reading the docs, the copy column checked for many of these files.
anytime 🙂
Avatar
Avatar
CyberTend
Yes, on shellbags load, shellbag explorer loaded but threw errors several errors...Error parsing shellbag, extension block count mismatch, Unmapped GUID. most loaded though. The above error messages had this in them: More extension block signatures were found in the ShellBag than have been processed! Please send the hive to saericzimmerman@gmail.com so support can be added
Andrew Rathbun 11/17/2022 1:16 PM
use SBECmd instead. Output to CSV. sbecmd.exe -d "path" --csv "outputpath"
Avatar
Avatar
CyberTend
I did also just find out there was no restrictions for the user to run powershell scripts
Andrew Rathbun 11/17/2022 1:17 PM
Check the consolehost_history.txt for that user. Also, PowerShell:400 events
this 1
Avatar
Avatar
Andrew Rathbun
use SBECmd instead. Output to CSV. sbecmd.exe -d "path" --csv "outputpath"
Will do, thanks
Avatar
4104/4105 in powershell logging might also show malicious powershell 🙂 (edited)
Avatar
Avatar
CyberTend
@Andrew Rathbun Looking forward to the class. I am executing your PowerShell_MFTECmd_J-MFTParsing script as well :).
Andrew Rathbun 11/17/2022 1:18 PM
that plus !EZParser Module should serve you well
Avatar
such a timesaver 🙂
1:18 PM
SANS/KAPE triage > EZParser
Avatar
Avatar
CyberTend
Thanks for the assist. I do see in MFT, and through reading the docs, the copy column checked for many of these files.
Andrew Rathbun 11/17/2022 1:19 PM
Just remember, that's just a simple logic check. If you filter on that checked, you'll likely see thousands of files but that doesn't mean they've been copied. It just means those files fit the logic commonly found with copied files. Same for the u Sec Zeroes column. Doesn't mean those were all timestomped
👍 1
this 1
Avatar
I believe there's a 13Cubed video
Avatar
Thanks, yes I am a member on 13Cubed...I will pause and go watch this...thanks
Avatar
@CyberTend Also check out $I30 files (Indx files). They sometimes have deleted file entries still in their slack space. https://github.com/harelsegev/INDXRipper
Carve file metadata from NTFS index ($I30) attributes - GitHub - harelsegev/INDXRipper: Carve file metadata from NTFS index ($I30) attributes
💯 1
Avatar
Avatar
dsplice
@CyberTend Also check out $I30 files (Indx files). They sometimes have deleted file entries still in their slack space. https://github.com/harelsegev/INDXRipper
Thanks, I will grab it. I probably should have added earlier for @Fierry and @Andrew Rathbun that I do not have the Kingston DT2000 USB. No one does evidently, not even the user who was clearly using it 🙂
Avatar
Avatar
CyberTend
Thanks, I will grab it. I probably should have added earlier for @Fierry and @Andrew Rathbun that I do not have the Kingston DT2000 USB. No one does evidently, not even the user who was clearly using it 🙂
Then likely you are interested in file knowledge (aka shellbags), file existence (usually MFT), and file deletion (usually journal/$I30
Avatar
Avatar
dsplice
Then likely you are interested in file knowledge (aka shellbags), file existence (usually MFT), and file deletion (usually journal/$I30
Thanks, much appreciated
Avatar
Actually, probably a dumb question for anyone familiar with it here. But has anyone run MFTECmd against a mounted image? I managed to get the $MFT to work, but cannot get it to find the journal ($J)?
Avatar
Nevermind, managed to find my own answer
Avatar
Avatar
dsplice
Nevermind, managed to find my own answer
Andrew Rathbun 11/17/2022 4:41 PM
Glad to hear it 👍
Avatar
Avatar
CyberTend
:), I am investigating a user who recently left a very high profile company and position and went to a competitor. This individual indeed copied a large amount of proprietary documents off to a USB device that was a corporate approved device. No other USB's were allowed, per DLP, besides this Kingston DT2000. The user claims they never have owned or inserted such a USB. DLP clearly shows the user indeed inserted this USB on the last two days of employment and copied the files over. The local machine image I obtained, unfortunately, did not show these files copied out to the Kingston USB, but I have evidence this USB was inserted. This user was very technically savvy, so we believe he used ccleaner, timestomping, or some other means to cover his tracks. We know, on the surface, he deleted all the files in documents, desktop, downloads and such, uninstalled OneDrive. What the company is asking me is if I can determine exactly what was executed to obfuscate the files copied out from the local machine perspective, vs. what is shown in DLP. So, I have grabbed KAPE, I am actually taking the December 8th class to understand more. My day-to-day application is Belkasoft, but it did not reveal what I needed to present to the corporate investigators.
ForensicDev 11/17/2022 8:51 PM
If the user initiated a drag 'n drop copy of folder(s) onto the USB drive, yet never accessed any such folders/data on the USB drive, there will not be much, if any, indication on the Windows system a copy occurred. Does the Windows Registry and other logs on the computer show the USB drive was inserted? Are any AV programs installed that may have scanned the USB destination as data was written to it? In regards to execution, look at Prefetch data and UserAssist keys.
Avatar
Avatar
ForensicDev
If the user initiated a drag 'n drop copy of folder(s) onto the USB drive, yet never accessed any such folders/data on the USB drive, there will not be much, if any, indication on the Windows system a copy occurred. Does the Windows Registry and other logs on the computer show the USB drive was inserted? Are any AV programs installed that may have scanned the USB destination as data was written to it? In regards to execution, look at Prefetch data and UserAssist keys.
randomaccess 11/18/2022 1:44 AM
On newer versions of windows 10 There should be a jumplist entry created. Should list the USB, and your Mac times should reflect the copy (modified before creation)
Avatar
Any reccomendations on free security stacks for analysing event logs? I'm making a little DFIR lab and I'm thinking of using ELK at the moment but haven't been sold on one yet
Avatar
Does anyone have experience with legal requests to Fitbit? Is there something to 'get'? If yes, what and does someone have contact-details? (edited)
CyberTend started a thread. 11/18/2022 6:48 AM
Avatar
Original message was deleted or could not be loaded.
Depends... would need to see what kind of drive is it, does it use additional controllers.. might be good for #data-recovery
Avatar
Andrew Rathbun 11/18/2022 8:07 AM
@Magnet Forensics is there anyone I can contact re: inquiring about suggesting an API for cloud licensing? There's gotta be a better way to monitor the licenses within an organization and maybe we're not aware of something that already exists, but just want to bark up the right tree. Can someone pass on an email or DM me? Happy to do things the "official" way so the decision makers can hear this feedback. Definitely something we're struggling with.
Avatar
Avatar
Andrew Rathbun
@Magnet Forensics is there anyone I can contact re: inquiring about suggesting an API for cloud licensing? There's gotta be a better way to monitor the licenses within an organization and maybe we're not aware of something that already exists, but just want to bark up the right tree. Can someone pass on an email or DM me? Happy to do things the "official" way so the decision makers can hear this feedback. Definitely something we're struggling with.
chriscone_ar 11/18/2022 8:12 AM
I can put you in touch with someone on the team - interested in your feedback on this, also!
Avatar
Avatar
chriscone_ar
I can put you in touch with someone on the team - interested in your feedback on this, also!
Andrew Rathbun 11/18/2022 8:12 AM
Please do. Thank you!
Avatar
Avatar
Andrew Rathbun
@Magnet Forensics is there anyone I can contact re: inquiring about suggesting an API for cloud licensing? There's gotta be a better way to monitor the licenses within an organization and maybe we're not aware of something that already exists, but just want to bark up the right tree. Can someone pass on an email or DM me? Happy to do things the "official" way so the decision makers can hear this feedback. Definitely something we're struggling with.
We can definitely get the info/suggestion to the right place.
8:13 AM
Dang @chriscone_ar always hitting the finish line first
Avatar
Avatar
Tim F
Dang @chriscone_ar always hitting the finish line first
chriscone_ar 11/18/2022 8:14 AM
It's that rural Arkansas fiber connection 🤣
Avatar
You know it is a good community when the vendors fight with themselves to help you the fastest.
👍 3
Avatar
I live in “Gig city”, I shouldn’t be losing!
Avatar
Avatar
dsplice
You know it is a good community when the vendors fight with themselves to help you the fastest.
chriscone_ar 11/18/2022 8:16 AM
Maybe we're just in a rush to avoid a Microsoft Teams meeting 🤷‍♂️
🤣 8
🫢 1
Avatar
Hi all a question regarding Windows Event ID: 4672. I see these in windows event viewer and timeline explorer. This is the text: Special privileges assigned to new logon. Subject: Security ID: SYSTEM Account Name: SYSTEM Account Domain: NT-AUTORITÄT Logon ID: 0x3E7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege I presume the Account Name: SYSTEM means a local Administrator account login was used?
9:56 AM
And/Or is this something like Linux su or sudo? There are a ton of these one right after the other with just seconds separating the events.
Avatar
SYSTEM is the root level equivalent of Administrator
9:59 AM
It supersedes Administrator
10:00 AM
AV vendors for instance, can spawn system level services for scanning but it is also often used by adversaries
Avatar
Avatar
Fierry
SYSTEM is the root level equivalent of Administrator
Ah, ok..makes sense. The user logged in say at 8:32:52(4648), then all of these SYSTEM level logon's(4672 and 4624) scroll after that. I do see a weird one for 4624--Subject; Security ID: NULL SID, Logon Information Logon Type 3(network), New Logon Security ID: Anonymous logon, Account Name Anonymous-ANMELDUNG. Also another where Security ID: is system, type is 2(interactive), Account name DWM-1 The rest are type 5--System Services starting I do believe.
Avatar
As well, I do see the user login trigger event ID: 4672, with elevated privilege of: Privileges: SeLoadDriverPrivilege
10:39 AM
HA, this user local language is German, the ANMELDUNG means LOGON in german
Avatar
ForensicatorEC 11/19/2022 7:22 AM
Does anyone have any intel on when and if we can expect the fourth edition of Incident Response and Computer Forensics - by Jason Luttgens and Matthew Pepe?
Avatar
We are doing some research to understand and discover some habits as it pertains to mobile device. Quick questionnaire https://cellebrite.iad1.qualtrics.com/jfe/form/SV_2mB0tXId88j9Q8e 🙏
The most powerful, simple and trusted way to gather experience data. Start your journey to experience management and try a free account today.
Salute 1
Avatar
Original message was deleted or could not be loaded.
I have a big issue with SIFT, cant manage to start it up normaly 😦
3:27 PM
End up setting up my own Windows machine with Linux on WSL
Avatar
What is the preferred method of opening .dd files on Windows?
Avatar
You can try FTK Imager 🙂
Avatar
Andrew Rathbun 11/21/2022 4:33 AM
https://twitter.com/directory_opus/status/1594492237697908738?t=J0mpMkarHRqa50IZ5i-m-A&s=19 It's on sale usually once a year and that time is now. Ping me with questions, if needed
Back by popular demand... Black Friday 2022 Sale Is Now On! Use coupon code BF2022NOV for 40% off everything (new licences, upgrades, optional features) at the Directory Opus store. Valid until end of November. https://t.co/C2vLBikDBl
this 1
Avatar
Any recommendations on a DFIR PC build?
Avatar
Avatar
equation
Any recommendations on a DFIR PC build?
Andrew Rathbun 11/21/2022 5:14 AM
A repository to store answers to some of the most commonly asked questions within the Digital Forensics Discord Server - FrequentlyAskedDFIRQuestions/README.md at main · Digital-Forensics-Discord-S...
Avatar
The Washington Post recently won the South Asian Journalists Association's Daniel Pearl Award (https://www.saja.org/page-935554/12994098) for a series of articles covering our digital forensics reports in an ongoing Indian case involving terrorism-related allegations. You can read the articles at https://www.washingtonpost.com/world/asia_pacific/india-bhima-koregaon-activists-jailed/2021/02/10/8087f172-61e0-11eb-a177-7765f29a9524_story.html, https://www.washingtonpost.com/world/2021/07/06/bhima-koregaon-case-india/, and https://www.washingtonpost.com/world/2021/07/20/indian-activists-surveillance. If you are a digital forensics practitioner and concerned about the integrity of electronic evidence, please get familiar with this case. As a reminder, our first four reports (and their exhibits) are available from our website: First Report: https://ArsenalExperts.com/persistent/resources/pages/BK-Case-Rona-Wilson-Report-I.zip Second Report: https://ArsenalExperts.com/persistent/resources/pages/BK-Case-Rona-Wilson-Report-II.zip Third Report: https://ArsenalExperts.com/persistent/resources/pages/BK-Case-Surendra-Gadling-Report-III.zip Fourth Report: https://ArsenalExperts.com/persistent/resources/pages/BK-Case-Rona-Wilson-Report-IV.zip
💯 5
👀 3
👍 3
❤️ 2
Avatar
Just reading the first one.... WOW! Amazing work!
Avatar
Digitalferret 11/21/2022 8:08 AM
same: mind blown. fabulous work. Kudos
Avatar
When people ask me about CSI level forensic stuff, that is what I imagine it would look like 😄
Avatar
ChadlyThicc 11/21/2022 8:43 AM
Does anyone know how much Mobilogy recovery cost is (edited)
Avatar
@dsplice @Digitalferret Thank you both! It will take some time to read through our reports (especially if going back and forth with exhibits), but we are pretty sure you won’t be bored.
Avatar
Avatar
ChadlyThicc
Does anyone know how much Mobilogy recovery cost is (edited)
Digitalferret 11/21/2022 9:00 AM
not sure what you mean? cellebrite service? Welcome to Mobilogy Mobilogy - a Cellebrite company, offers solutions that enable operators, retailers, aftermarket service providers, and enterprises to provide enhanced customer experience, increase revenue, improve productivity, enhance security, and reduce cost.
Avatar
ChadlyThicc 11/21/2022 9:00 AM
Yes
9:00 AM
can’t find their website or any information about them online
Avatar
Digitalferret 11/21/2022 9:02 AM
looks more to me like a means of managing clients, not recovering data
9:03 AM
is that what you were after? maybe ping Cellebrite in here
Avatar
ChadlyThicc 11/21/2022 9:04 AM
Yes
Avatar
Digitalferret 11/21/2022 9:04 AM
maybe I was mistaking your data recovery posts in with this
Avatar
ChadlyThicc 11/21/2022 9:05 AM
It’s alright I opened another inquiry with the via email waiting for a replay back
👍🏻 1
Avatar
Avatar
Digitalferret
not sure what you mean? cellebrite service? Welcome to Mobilogy Mobilogy - a Cellebrite company, offers solutions that enable operators, retailers, aftermarket service providers, and enterprises to provide enhanced customer experience, increase revenue, improve productivity, enhance security, and reduce cost.
ChadlyThicc 11/21/2022 9:08 AM
Would you mind directing me to where you found this?
9:09 AM
And also when I called them they put in a ticket and to wait for it to be reviewed
Avatar
Avatar
Digitalferret
not sure what you mean? cellebrite service? Welcome to Mobilogy Mobilogy - a Cellebrite company, offers solutions that enable operators, retailers, aftermarket service providers, and enterprises to provide enhanced customer experience, increase revenue, improve productivity, enhance security, and reduce cost.
I think that's just the ufed touch now.
👍🏻 1
Avatar
good night everyone how can i do mobile imagine without tools
Avatar
Avatar
MR.Falcon
good night everyone how can i do mobile imagine without tools
Andrew Rathbun 11/21/2022 10:21 AM
#mobile-forensic-extractions
Avatar
thx sir
Avatar
Any @Law Enforcement [UK] DF units bought in Cellebrite Premium Enterprise Solution (ES) ?
Avatar
Beno 🇬🇧 11/21/2022 12:11 PM
Yep
Avatar
MugiwaraNoLuffy 11/21/2022 12:11 PM
Yup
Avatar
Yep
Avatar
yeah
Avatar
Yep
Avatar
Question for the group, I have an agency that is inquiring about a stalking case, the victim blocked the suspect on her iPhone but was getting threating messages on her iWatch. They want to know if we can download the iWatch, I know the soultions out there are not good so i'm asking myself how this happened if she blocked him on her iPhone why did she get them on her iWatch ?
2:03 PM
I tried to duplicate this and when we blocked a contact on a test iPhone it would not send it to the iWatch.
Avatar
Avatar
DCSO
Question for the group, I have an agency that is inquiring about a stalking case, the victim blocked the suspect on her iPhone but was getting threating messages on her iWatch. They want to know if we can download the iWatch, I know the soultions out there are not good so i'm asking myself how this happened if she blocked him on her iPhone why did she get them on her iWatch ?
JLindmar (83AR) 11/21/2022 4:18 PM
It sounds like the watch is not syncing correctly.
👍 1
Avatar
Avatar
DCSO
Question for the group, I have an agency that is inquiring about a stalking case, the victim blocked the suspect on her iPhone but was getting threating messages on her iWatch. They want to know if we can download the iWatch, I know the soultions out there are not good so i'm asking myself how this happened if she blocked him on her iPhone why did she get them on her iWatch ?
Is the iwatch tied to a different AppleID then the iPhone? Sending iMessages to the AppleID receiving on the watch, but a different AppleID in phone blocked the number. Just a thought.
👍 1
Avatar
Hi All, can anyone point me in a direction where I can find proper analysis on Word Document forensics? I am particularly interested in the "Content Created" metadata field but I am struggling to find anything relevant on it in a forensic manner. Any assistance would be much appreciated ! (edited)
Avatar
Avatar
Reinard
Hi All, can anyone point me in a direction where I can find proper analysis on Word Document forensics? I am particularly interested in the "Content Created" metadata field but I am struggling to find anything relevant on it in a forensic manner. Any assistance would be much appreciated ! (edited)
Digitalferret 11/22/2022 4:52 AM
Avatar
Avatar
florus
Does anyone have experience with legal requests to Fitbit? Is there something to 'get'? If yes, what and does someone have contact-details? (edited)
@Law Enforcement [USA]
Avatar
Avatar
florus
Does anyone have experience with legal requests to Fitbit? Is there something to 'get'? If yes, what and does someone have contact-details? (edited)
The ISP List is a database of Internet service and other online content providers that will help you get the information you need for your case. For each Internet Service Provider listed, you’ll find the legal contact information and instructions needed to serve subpoenas, court orders, and search warrants. The ISP List is a law … ISP List and L...
Avatar
You sir/madame saved the day. Thanks!
Avatar
Avatar
florus
You sir/madame saved the day. Thanks!
No problem buddy
Avatar
Avatar
DCSO
Question for the group, I have an agency that is inquiring about a stalking case, the victim blocked the suspect on her iPhone but was getting threating messages on her iWatch. They want to know if we can download the iWatch, I know the soultions out there are not good so i'm asking myself how this happened if she blocked him on her iPhone why did she get them on her iWatch ?
If the watch has cellular, it has its own phone number through a carrier. I’ve never tried to contact myself with that number, but now I’m curious if it would work. (edited)
👍 1
Avatar
Andrew Rathbun 11/22/2022 5:13 AM
@Search.org can help too
Salute 1
Avatar
Avatar
JLindmar (83AR)
It sounds like the watch is not syncing correctly.
I've inquired with the Detective working the case, I'll wait and see what he has to say.
Avatar
Hello folks! I have “Apple MacBook Pro” A2338 (EMC 3578) which based on M1 Silicon chip and it's is locked with user's password which I don't know. What is the possibilities to acquire forensics image of this Macbook?
Avatar
Avatar
2numb3rs
Hello folks! I have “Apple MacBook Pro” A2338 (EMC 3578) which based on M1 Silicon chip and it's is locked with user's password which I don't know. What is the possibilities to acquire forensics image of this Macbook?
Are you able to boot into Digital Collector? That'll tell you if filevault is actually turned on. If filevault is NOT on, I think you can acquire it without needing the password. We've found from experience that a few of the M1 devices we have encountered have had filevault turned off. Otherwise, if filevault is on you'll need to get some passwords from any other devices (such as phones, other computers) and try those.
Avatar
Anyone by any chance have an Excel formula to extract valid IP addresses from columns? Got a bunch of unnecessary data within one column mixed in with IP addresses, and my Google-Fu has failed me
Avatar
Avatar
Fr0stByt3
Are you able to boot into Digital Collector? That'll tell you if filevault is actually turned on. If filevault is NOT on, I think you can acquire it without needing the password. We've found from experience that a few of the M1 devices we have encountered have had filevault turned off. Otherwise, if filevault is on you'll need to get some passwords from any other devices (such as phones, other computers) and try those.
In my case I attach Cellebride Digital Collector USB stick to MacBook and hold down the power button, then the boot environment appears. Then I choose “DC ARM Boot”. After that Recovery Mode appears and there is prompted select an admin user which known password. In my case I don’t know a passowrd.
Avatar
If encryption is on, your sol
Avatar
Avatar
Matt
Anyone by any chance have an Excel formula to extract valid IP addresses from columns? Got a bunch of unnecessary data within one column mixed in with IP addresses, and my Google-Fu has failed me
No worries, given up and writing a Python script 😂
Avatar
dinosaurdave 11/23/2022 2:58 AM
@Law Enforcement [UK] Any UK forces gone through ISO accreditation for their forensic labs? If so, whats your opinion on it? Does it benefit your work or make it harder for you?
😭 3
Avatar
Oh god, some one grab the can of worms
🤣 19
😫 1
Avatar
Avatar
dinosaurdave
@Law Enforcement [UK] Any UK forces gone through ISO accreditation for their forensic labs? If so, whats your opinion on it? Does it benefit your work or make it harder for you?
🤣 8
Avatar
Avatar
dinosaurdave
@Law Enforcement [UK] Any UK forces gone through ISO accreditation for their forensic labs? If so, whats your opinion on it? Does it benefit your work or make it harder for you?
In my opinion, it serves a purpose, without it I'm sure a good handful of people would be operating like it's the wild west. However it depends on who's writing your SOPs, I think there's a fine balance between documenting processes to enforce common sense practice and being so strict that it restricts the freedom to research and innovate. So... it depends
👍 1
Avatar
Avatar
Pseudonym
Oh god, some one grab the can of worms
Too late! Its already been opened 💀
Avatar
Avatar
dinosaurdave
@Law Enforcement [UK] Any UK forces gone through ISO accreditation for their forensic labs? If so, whats your opinion on it? Does it benefit your work or make it harder for you?
this 1
Avatar
Avatar
dinosaurdave
@Law Enforcement [UK] Any UK forces gone through ISO accreditation for their forensic labs? If so, whats your opinion on it? Does it benefit your work or make it harder for you?
I have DMed but wanted to also add why it isnt a standard process for all of us to follow, I dont know, its like they enjoy 43 different versions of things so they are forced to charge us for 43 different versions with 43 visits, poor UKAS...
Avatar
I think tbf it'll depend on whoever made your SOPs
3:15 AM
If it's anything like ours, best of luck.
Avatar
Avatar
Rob
I think tbf it'll depend on whoever made your SOPs
Anything under 300 pages is barely worth an index.
😂 1
Avatar
Avatar
Rob
I think tbf it'll depend on whoever made your SOPs
Definitely depends on the quality of your quality team 🙂
Avatar
Avatar
Zhaan
Anything under 300 pages is barely worth an index.
Joking BTW
Avatar
I think some of ours are 30+ pages and even still barely understandable 🤣
Avatar
I think the Welsh forces should do it in Welsh and English.
😂 4
Avatar
Avatar
Zhaan
I think the Welsh forces should do it in Welsh and English.
Not sure which would be harder to understand
Avatar
Avatar
Matt
Not sure which would be harder to understand
Encryption
PepeLaugh 3
Avatar
Wait until you get mind blowing questions from UKAS. When reviewing working instruction around testing Faraday box UKAS: "I can see you're testing mobile data, WiFi, Bluetooth, NFC and nothing penetrates this Faraday box - it works as intended. Good job. What about UV Rays?"
🤣 7
😂 1
3:48 AM
Avatar
dinosaurdave 11/23/2022 3:48 AM
We are essentially having it forced on us by a team of people who do not understand nor appreciate what we do. So it is not looking good. Thanks for the replies haha
Avatar
Avatar
dinosaurdave
We are essentially having it forced on us by a team of people who do not understand nor appreciate what we do. So it is not looking good. Thanks for the replies haha
I think this is basically 99% of uk forces 😄
3:50 AM
I would just say, if you can, keep SOPs vague
👍 1
Avatar
dinosaurdave 11/23/2022 3:50 AM
I dont even know who will be writing the SOPs 😂
Avatar
Then you're not tied down to any specifically named software for any processes
3:51 AM
I say that because our SOP does just this and it's chaos for "going outside the scope"
Avatar
Avatar
Pacman
Wait until you get mind blowing questions from UKAS. When reviewing working instruction around testing Faraday box UKAS: "I can see you're testing mobile data, WiFi, Bluetooth, NFC and nothing penetrates this Faraday box - it works as intended. Good job. What about UV Rays?"
I did raise the point that as gravity/mass effects time dilation should we also record the altitude at which we acquire images when it comes to time checks.
🤣 1
Avatar
Avatar
baggins
I did raise the point that as gravity/mass effects time dilation should we also record the altitude at which we acquire images when it comes to time checks.
Avatar
Avatar
Pacman
Click to see attachment 🖼️
Well i got told our SOP was updated to say we must calibrate our clocks.. by dialing the speaking clock. Just another time wasting exercise
⏲️ 2
Avatar
Avatar
baggins
Well i got told our SOP was updated to say we must calibrate our clocks.. by dialing the speaking clock. Just another time wasting exercise
Speaking clock??
Avatar
Avatar
baggins
Well i got told our SOP was updated to say we must calibrate our clocks.. by dialing the speaking clock. Just another time wasting exercise
We use radio clocks (not the clocks with radios)
Avatar
Avatar
Pacman
Speaking clock??
Yup, not a trusted NTP server or something sensible like that
Avatar
Avatar
dinosaurdave
We are essentially having it forced on us by a team of people who do not understand nor appreciate what we do. So it is not looking good. Thanks for the replies haha
You're having something forced on you? Isnt there a law for something along those lines...
Avatar
Avatar
baggins
Well i got told our SOP was updated to say we must calibrate our clocks.. by dialing the speaking clock. Just another time wasting exercise
In fact, our radio clocks had their own little write up because they were so clocky and accurate, we clapped that day, good times
Avatar
Avatar
Rob
I say that because our SOP does just this and it's chaos for "going outside the scope"
dont be such a digital forensic baby, where's your spirit of adventure man?!?!?!
🤣 1
4:03 AM
I love out of scope, thats why me and Mavis Beacon are best buds, my typing speed is amazing because of ISO
Avatar
Avatar
Zhaan
dont be such a digital forensic baby, where's your spirit of adventure man?!?!?!
Tell that to our quality team 😄
Avatar
Avatar
Rob
Tell that to our quality team 😄
No thanks, since ISO, I talk to no-one in fear of a non compliance
😂 2
Avatar
Avatar
dinosaurdave
@Law Enforcement [UK] Any UK forces gone through ISO accreditation for their forensic labs? If so, whats your opinion on it? Does it benefit your work or make it harder for you?
MugiwaraNoLuffy 11/23/2022 4:09 AM
Definitely makes it harder but more consistent, until the software changes and all the sops have to be re written
Avatar
Avatar
baggins
Well i got told our SOP was updated to say we must calibrate our clocks.. by dialing the speaking clock. Just another time wasting exercise
MugiwaraNoLuffy 11/23/2022 4:11 AM
Time.is Or timeanddate.com should suffice
Avatar
dinosaurdave 11/23/2022 4:24 AM
You guys are really filling me with joy - cant wait
Avatar
Andrew Rathbun 11/23/2022 4:25 AM
You should search the server for previous ISO discussions 😂. This is definitely not the first rodeo
Avatar
dinosaurdave 11/23/2022 4:25 AM
I would but I dont want to put myself on an even bigger downer
😆 1
Avatar
I still cannot believe how open to interpretation it is
5:19 AM
The differences between what is acceptable varies so much between all of our forces
Avatar
Avatar
Rob
I would just say, if you can, keep SOPs vague
Digitalferret 11/23/2022 5:21 AM
pretty much your take on VHDL , your "V" being Vague i guess 🙂 ie describe what a <process> does before it gets translated into an actual <solution/hardware/software>
this 1
Avatar
Avatar
dinosaurdave
@Law Enforcement [UK] Any UK forces gone through ISO accreditation for their forensic labs? If so, whats your opinion on it? Does it benefit your work or make it harder for you?
JLindmar (83AR) 11/23/2022 6:22 AM
I'm in the US, and I understand you have much more regulation in the UK (e.g. UKAS, Forensic Science Regulator) that is still being navigated, but you are also light years ahead of many other countries as far as implementing and adopting quality requirements in digital forensics. I'm an ISO 17025 technical assessor in digital forensics for an accrediting body, and most of the issues I see revolve around a lack of understanding and guidance on how to best apply ISO requirements within digital forensics. Universally, those labs with more complex SOPs almost always have the biggest problems following their own SOPs. In the UK, are you provided any guidance on how to implement ISO requirements, and if so, is the same guidance given to everyone or is everyone expected to figure it out on their own?
Avatar
Thank you 🙂 Andrew
Avatar
Avatar
Pacman
Wait until you get mind blowing questions from UKAS. When reviewing working instruction around testing Faraday box UKAS: "I can see you're testing mobile data, WiFi, Bluetooth, NFC and nothing penetrates this Faraday box - it works as intended. Good job. What about UV Rays?"
Do you think they meant IR rather than UV?
Avatar
Avatar
AmNe5iA
Do you think they meant IR rather than UV?
I kid you not, they meant UV Rays.
Avatar
Avatar
Pacman
I kid you not, they meant UV Rays.
Ross Donnelly 11/23/2022 9:26 AM
Need to block everything. Schrödinger's Faraday box!
Avatar
The phone is both dead and alive
🤣 3
Avatar
Avatar
Pacman
I kid you not, they meant UV Rays.
9:48 AM
Military and civil authorities could benefit from secure optical communication systems that use light to carry messages between moving vehicles. Researchers at KAUST have now demonstrated rapid data transfer using ultraviolet-B (UV-B) light, which provides many advantages over visible light.
9:51 AM
Personally, I would be more worried about Walter White and Jesse Pinkman with an electromagnet truck than UV-B communications.
thistbh 1
Avatar
numbersevenfan 11/23/2022 11:09 AM
I feel dumb asking this, but could I use the Tableau TD3 Forensic Imager as a write blocker connected to a computer to preview a device on scene? As opposed to connecting a device to a forensic bridge then my computer.
11:09 AM
And am I thinking in a way that overcomplicates it?
Avatar
Avatar
numbersevenfan
I feel dumb asking this, but could I use the Tableau TD3 Forensic Imager as a write blocker connected to a computer to preview a device on scene? As opposed to connecting a device to a forensic bridge then my computer.
I don't think the TD3 can, but I know the falcon can as I've done it: https://www.logicube.com/shop/forensic-falcon-neo/
The Falcon-NEO is a future-focused, next-generation digital forensic imager. Unmatched performance designed to streamline evidence collection processes.
Avatar
Avatar
Sha1_4n6
I don't think the TD3 can, but I know the falcon can as I've done it: https://www.logicube.com/shop/forensic-falcon-neo/
numbersevenfan 11/23/2022 11:14 AM
Thank you for the sanity check!
Avatar
the falcon will connect via USB and show the drive over iscsi. never seen the td3 do that
11:26 AM
it's pretty sweet honestly
😎 1
Avatar
Avatar
dinosaurdave
We are essentially having it forced on us by a team of people who do not understand nor appreciate what we do. So it is not looking good. Thanks for the replies haha
This is the same situation we are in here.
Avatar
Avatar
JLindmar (83AR)
I'm in the US, and I understand you have much more regulation in the UK (e.g. UKAS, Forensic Science Regulator) that is still being navigated, but you are also light years ahead of many other countries as far as implementing and adopting quality requirements in digital forensics. I'm an ISO 17025 technical assessor in digital forensics for an accrediting body, and most of the issues I see revolve around a lack of understanding and guidance on how to best apply ISO requirements within digital forensics. Universally, those labs with more complex SOPs almost always have the biggest problems following their own SOPs. In the UK, are you provided any guidance on how to implement ISO requirements, and if so, is the same guidance given to everyone or is everyone expected to figure it out on their own?
dinosaurdave 11/24/2022 1:26 AM
We're in the early stages and us lowly analysts are pretty much kept in the dark, so I can't quite answer your question. But from what I can tell thus far, some boss has mentioned 'ISO', and everyone else has said 'that sounds fancy, lets do it'.
1:27 AM
The SOPs will likely be written by people in a 'project team' that have no forensic experience.
1:28 AM
And they are likely just groping blindly in the dark in an attempt to figure out how to do it. But it will no doubt end in some boss being promoted as it was their idea, and that was likely their end goal.
😂 1
Avatar
I understand the pain for the UK LE guys with this. Having also done this in past life and written prob 50% or more of the SOPs I would say, like others have said, that you absolutely need someone writing them with realistic knowledge of the actual workflows and processes involved. Having bad or unreasonable SOPs will slow everything down or could even prevent some functions/analysis methods which you simply need/have to use. I would say @dinosaurdave it will be a bit painful at first but some parts will have some benefit (depending on how you do things currently) or will least make sense in terms of why they are needed. (edited)
Avatar
DeepDiveForensics 11/24/2022 7:20 AM
Hello Folks, Any open source tools to perform bulk scan to identify the potential steganography documents/Media files.
Avatar
Avatar
DeepDiveForensics
Hello Folks, Any open source tools to perform bulk scan to identify the potential steganography documents/Media files.
Digitalferret 11/24/2022 8:43 AM
how "bulk" is it? have you been through these yet? https://www.google.com/search?q=FOSS+steganography+detection
Avatar
Avatar
Digitalferret
how "bulk" is it? have you been through these yet? https://www.google.com/search?q=FOSS+steganography+detection
DeepDiveForensics 11/24/2022 8:48 AM
"Bulk" means scan multiple files in one go to identify those files, whether it is images, audio etc.
Avatar
Digitalferret 11/24/2022 8:51 AM
sorry, my bad. i understand bullk, i meant it to mean, 10 files, a directory, an entire 16TB drive? etc (edited)
8:52 AM
and, did you check the regular google search that showed those results?
Avatar
Avatar
Digitalferret
sorry, my bad. i understand bullk, i meant it to mean, 10 files, a directory, an entire 16TB drive? etc (edited)
DeepDiveForensics 11/24/2022 9:13 AM
Yeah, right from a directory
Avatar
Avatar
numbersevenfan
I feel dumb asking this, but could I use the Tableau TD3 Forensic Imager as a write blocker connected to a computer to preview a device on scene? As opposed to connecting a device to a forensic bridge then my computer.
I think you can. If you connect to the TD3 via ethernet to the Web Portal, you can browse the source disk. I think you may be able to download isolated files for analysis. It is not particularly efficient, but I believe it is possible.
Avatar
Pretendigator 11/25/2022 3:16 AM
@Griffeye anyone available for a DM in regards to the bluebear carver plugin?
Avatar
All the deals for InfoSec related software/tools this Black Friday - GitHub - 0x90n/InfoSec-Black-Friday: All the deals for InfoSec related software/tools this Black Friday
Avatar
Chris Sanders 11/25/2022 6:15 AM
All of our course are on sale at https://networkdefense.io for the next few days.
Affordable, effective, online information security training. Made by analysts, for analysts.
Avatar
I will add that the courses are really good!
💙 1
Avatar
Avatar
dsplice
I will add that the courses are really good!
Andrew Rathbun 11/25/2022 7:22 AM
Agreed. I've bought 2 myself
💙 1
Avatar
Avatar
dinosaurdave
We are essentially having it forced on us by a team of people who do not understand nor appreciate what we do. So it is not looking good. Thanks for the replies haha
CptWaistcoat_57354 11/25/2022 2:17 PM
Well we were all supposed to be accredited by 2017, so it was bound to be forced on you at some point 😂
Avatar
@dsplice @Andrew Rathbun any recommendations? 🙂
Avatar
Avatar
Fierry
@dsplice @Andrew Rathbun any recommendations? 🙂
For? (sorry if I missed it, multitasking)
Avatar
Which AND course? 😋
Avatar
Hi everyone! I have a discounts list I keep updated year-round. I tried to get all of the DFIR training, book, and software discounts for Black Friday & Cyber Monday. It can be filtered by "DFIR Related Deals" https://training.dfirdiva.com/current-discounts
Current Sales on DFIR, IT, & Cybersecurity Training and Books. Updated year-round including Black Friday and Cyber Monday.
👍 3
Avatar
Avatar
Fierry
@dsplice @Andrew Rathbun any recommendations? 🙂
Andrew Rathbun 11/25/2022 5:28 PM
I did Building Virtual Labs and Demystifying Regular Expressions. Both on the cheaper side and they were really good.
👍 1
5:28 PM
I want to take the CyberChef one eventually
Avatar
Avatar
Fierry
Which AND course? 😋
Ah. Ok took Investigation Theory (I have all my junior IR people take it), OSQuery, ELK for Security Analysis, and Practical Packet Analysis
Avatar
Good to know :). I’m indeed thinking about investigation theory or practical threat hunting
Avatar
I found Investigation Theory a very good 'level setting' course. Many times we would get technical people into the entry level jobs, but without alot of actual analysis experience. This course helped get them into the mindset of following the data, and how to watch for bias and other pitfalls
Avatar
MartinInDFIRland 11/26/2022 12:13 AM
dont see SANS blackfriday discount (course & exam cert)
Avatar
Avatar
dsplice
I found Investigation Theory a very good 'level setting' course. Many times we would get technical people into the entry level jobs, but without alot of actual analysis experience. This course helped get them into the mindset of following the data, and how to watch for bias and other pitfalls
Guess it’s settled then 🙂
Avatar
Avatar
dsplice
I found Investigation Theory a very good 'level setting' course. Many times we would get technical people into the entry level jobs, but without alot of actual analysis experience. This course helped get them into the mindset of following the data, and how to watch for bias and other pitfalls
randomaccess 11/26/2022 1:12 AM
It's on my list to take when I have time! Looks like a useful one
Avatar
Avatar
DFIRDiva
Hi everyone! I have a discounts list I keep updated year-round. I tried to get all of the DFIR training, book, and software discounts for Black Friday & Cyber Monday. It can be filtered by "DFIR Related Deals" https://training.dfirdiva.com/current-discounts
Digitalferret 11/26/2022 2:23 AM
maybe add R-Studio, they do sales during the year as well as Black Friday. genuine 25% off inc yearly subs
2:25 AM
oooh, first time i've ever seen, UFSExplorer fam 20% discount too. https://www.ufsexplorer.com/
Avatar
Avatar
Digitalferret
oooh, first time i've ever seen, UFSExplorer fam 20% discount too. https://www.ufsexplorer.com/
I added both. Thank you!
👍🏻 1
Avatar
What's your take if public defender's offices (or your equivalent) starting to having their own DF people? Probably not doing extraction but to interpret reports and data? Do you feel this is not good for the job? Or prefer to see the proper check and balance introduced to the system?
Avatar
Avatar
chauan
What's your take if public defender's offices (or your equivalent) starting to having their own DF people? Probably not doing extraction but to interpret reports and data? Do you feel this is not good for the job? Or prefer to see the proper check and balance introduced to the system?
randomaccess 11/27/2022 9:21 AM
Some do This is good for the job. You have people on the accused side explaining the evidence and get them to make informed decisions. Plus even just recently heard of a case where the prosecution really acted inappropriately and claimed things not backed up by evidence
💯 2
👍 2
Avatar
Hello, I am looking for current quality assurance processes used in digital forensics. Can you recommend websites that I can use?
Andrew Rathbun pinned a message to this channel. 11/28/2022 5:02 AM
Avatar
Hi everyone! Does anyone know how the check characters of a UK drivers license is generated? They are the 15th and 16th characters of the license number and are automatically generated through an algorithm, but that algorithm does not appear to be widely known.
Avatar
Avatar
maxabo
Hello, I am looking for current quality assurance processes used in digital forensics. Can you recommend websites that I can use?
JLindmar (83AR) 11/28/2022 5:44 AM
Here is a good and recent US resource: https://www.ignet.gov/sites/default/files/files/Quality_Standards_for_Digital_Forensics_2019.pdf If you have specific questions, feel free to contact me directly. (edited)
Avatar
Avatar
JLindmar (83AR)
Here is a good and recent US resource: https://www.ignet.gov/sites/default/files/files/Quality_Standards_for_Digital_Forensics_2019.pdf If you have specific questions, feel free to contact me directly. (edited)
Thanks a lot.
Avatar
Any good resources on APFS? I want to learn how to interpret Apple systems
Avatar
Is it possible to downgrade an iPhone's OS version need to test a specific version of iOS. Same thing with applications, is it possible to download an old version of an application and if so where can I get my hands on that? If it isn't possible to downgrade the iOS version, does anybody know of a place that sells iPhones running specific iOS versions?
Avatar
Avatar
ar1195
Is it possible to downgrade an iPhone's OS version need to test a specific version of iOS. Same thing with applications, is it possible to download an old version of an application and if so where can I get my hands on that? If it isn't possible to downgrade the iOS version, does anybody know of a place that sells iPhones running specific iOS versions?
Struggling with buggy software or simply dislike the latest features? Apple doesn't make it easy to revert back to a previous software version. Before you begin, we'll cover some important things you need to know before you reinstall iOS software, then we'll walk you through how to downgrade iOS versions.
Avatar
Thank you. This article mentions making sure the OS version is still signed by Apple. The version that I need is no longer signed by Apple which according to the article means we cannot install the OS via iTunes. Do you happen to know if there is anything else we can use to install it?
Avatar
Avatar
ar1195
Thank you. This article mentions making sure the OS version is still signed by Apple. The version that I need is no longer signed by Apple which according to the article means we cannot install the OS via iTunes. Do you happen to know if there is anything else we can use to install it?
I’m not an expert on the subject. All I know is the iTunes rollback method. Maybe others here can assist
Avatar
Has anyone done any pen register type warrant for for facebook? Situation: bad guy doesn't have service, ditch his cell phone likely got a new one. uses FB and Whats app to do all his communication. he has an active arrest warrant. we are looking for a way to use facebook and the ip addresses he logs in with or accesses with to be report to us so we can track him down.
Avatar
ScottKjr3347 11/28/2022 2:59 PM
As far as the device, Here are a few resources: https://discord.gg/sileo-odyssey-team-468422899716456498 https://discord.gg/palera1n https://www.reddit.com/r/jailbreak/ In most cases to roll back to an unsigned version you must have saved SHSH2 blobs for your specific device for the iOS version that you want to rollback to. Other peoples/devices blobs will not work for your device. You can then use some open source tools (futurestore) to make this happen. Not sure about where to get old application versions. (edited)
Avatar
I have a few PDFs with ID photos in them, I need to be able to identify the persons likeness to compare to another record. The PDFs are "printed" from a program. However, they are VERY poor. It looks as if they were scanned with the exposure turned all the way up like 3 times over and over again to make them hard to read/ID the photos. The provider said this is what they have in their system. I don't believe that. There is URLs and titles very close to the edges of the PDFs that are perfectly lined up. The documents are VERY proportional & square. It looks like they post-processed them to blur things. Is there anything I can look at in the PDFs metadata to see if it's been done? The reports have a 'run' date and time, and a saved date and time that are a few hours apart, but that's obviously not any kind of evidence of an issue.
Avatar
Is it possible to detect if the time on a file has been changed using touch? (edited)
Avatar
Excuse my ignorance, we are behind the times, is "touch" a piece of software? I don't have any DiFi tools unfortunately, just what you can do through standard Windows devices.
Avatar
just the standard terminal command: https://en.wikipedia.org/wiki/Touch_(command)
In computing, touch is a command used to update the access date and/or modification date of a computer file or directory. It is included in Unix and Unix-like operating systems, TSC's FLEX, Digital Research/Novell DR DOS, the AROS shell, the Microware OS-9 shell, and ReactOS. The command is also available for FreeDOS and Microsoft Windows.
Avatar
You could look at the terminal history if it is available, if other files were modified at different times you can start to construct a timeline (edited)
Avatar
Thank you @AR.C and @Matt! This should send me down a rabbit hole for a bit.
PepeLaugh 1
Avatar
Avatar
Matt
You could look at the terminal history if it is available, if other files were modified at different times you can start to construct a timeline (edited)
do you mean a history file like .bash_history or .zsh_history? thank you.
11:10 AM
until recently, I thought the only use of touch was to create an empty file and only recently found out about its ability to change timestamps
Avatar
Avatar
AR.C
do you mean a history file like .bash_history or .zsh_history? thank you.
Yeah exactly, whichever file the terminal command history is stored within
Avatar
awesome, thanks again
👍 1
Avatar
Digitalferret 11/29/2022 11:28 AM
fab article from a fellow Ctrl-R user 🙂
👌 1
Avatar
Anyone an EnCase 6.19 and EnCase 7/8/22 user ? Can I ask a question ?
Avatar
Avatar
Jay528
Anyone an EnCase 6.19 and EnCase 7/8/22 user ? Can I ask a question ?
Andrew Rathbun 11/29/2022 1:38 PM
@Melrose142
Avatar
Is that your second profile 🙂
😂 2
Avatar
Andrew Rathbun 11/29/2022 1:38 PM
Nah it's a coworker 😛
Avatar
Thanks ! I also bought the Kape manual today
1:39 PM
I will have a lot of fun with 300+ pages
Avatar
Avatar
Jay528
Thanks ! I also bought the Kape manual today
Andrew Rathbun 11/29/2022 1:40 PM
EZ Tools? Regardless, thank you for the support! Much appreciated
Avatar
yup, EZ tools
Avatar
Andrew Rathbun 11/29/2022 1:40 PM
sweet! Let me know if you have any feedback or requests
Avatar
i do, will DM yo
1:40 PM
you
Avatar
if a company (3rd party IT support) comes in to your business and deletes your data as a result of wiping your c: drive are there any GDPR or DPA issues/breaches ?
Avatar
Avatar
ddf_dude
if a company (3rd party IT support) comes in to your business and deletes your data as a result of wiping your c: drive are there any GDPR or DPA issues/breaches ?
Digitalferret 11/29/2022 3:52 PM
in what way? that they came in? that they (3rd party) wiped? that they read the drives? that they weren't supposed to? etc
Avatar
Has anyone used Kon-Boot for bypassing login screens on windows or Mac? I can't tell if it's legit or not
Avatar
Avatar
Neon
Has anyone used Kon-Boot for bypassing login screens on windows or Mac? I can't tell if it's legit or not
I've used it several times on Windows. It's legit.
❤️ 1
Avatar
Avatar
ddf_dude
if a company (3rd party IT support) comes in to your business and deletes your data as a result of wiping your c: drive are there any GDPR or DPA issues/breaches ?
Ross Donnelly 11/30/2022 4:10 AM
"A personal data breach can be broadly defined as a security incident that has affected the confidentiality, integrity or availability of personal data. In short, there will be a personal data breach whenever any personal data is accidentally lost, destroyed, corrupted or disclosed; if someone accesses the data or passes it on without proper authorisation; or if the data is made unavailable and this unavailability has a significant negative effect on individuals." https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/personal-data-breaches/
The GDPR introduces a duty on all organisations to report certain types of personal data breach to the relevant supervisory authority
👍 1
Avatar
Avatar
DFIRDiva
I've used it several times on Windows. It's legit.
Do you have to run the Kon-Boot on a live machine or would this work with an image some how ? (edited)
Avatar
You could use it against an E01 or similar format
👍 1
Avatar
Avatar
Neon
Has anyone used Kon-Boot for bypassing login screens on windows or Mac? I can't tell if it's legit or not
Something to keep in mind, if you aren’t already aware: https://discord.com/channels/427876741990711298/427936091220344833/1004437420323905667
👍 1
Avatar
Does anybody know if there is any digital data left in a currency counter machine that we can acquire ? I recall hearing something about this and I searched Discord but came up empty handed. I have a Detective that is inquiring, I gave them the old forensic" its depends" answer 🙂
Avatar
Florida's Jalen Kitna, the son of ex-NFL QB Jon Kitna, has been jailed on multiple felony complaints involving child pornography. He has been suspended.
👎 2
Avatar
What organization is the European equivalent of NIST?
Avatar
Avatar
JonasWanobi
What organization is the European equivalent of NIST?
Nevermind. I literally just googled that exact question and found this. LOL "The European Union Agency for Network and Information Security is the equivalent of NIST"
💯 2
Avatar
Police overwhelmed by digital forensics as 25,000 devices await checks – report https://www.standard.co.uk/news/uk/police-home-office-crown-prosecution-service-b1043999.html?amp
Inspectors examined how effective the police are at capturing evidence from digital devices, including smartphones and computers.
👍 1
Avatar
Cuts have consequences unfortunately…
this 3
Avatar
Avatar
DFIRDiva
I've used it several times on Windows. It's legit.
I had never even heard of it before... sounds like a tool I need to try out
Avatar
Avatar
whee30
I had never even heard of it before... sounds like a tool I need to try out
they had a discount over Black Friday, we used to have a license of it, not sure if it's any good now. This was probably 4-5 years ago
Avatar
Seems like the license is sufficiently cheap that I wouldn't need to hunt a sale... for anyone who uses it, what are the significant limitations? What CANT it get into?
10:35 AM
I have Arsenal for mounting/VM/bypass goodness, but the ability to live boot a system and bypass could def. come in handy. Especially if the mac stuff works...
Avatar
Avatar
whee30
I have Arsenal for mounting/VM/bypass goodness, but the ability to live boot a system and bypass could def. come in handy. Especially if the mac stuff works...
I assume there are certain situations where it's limited like SecureBoot or full disk encryption loaded
Avatar
Hello everyone I have a question I would appreciate it if anyone could help me; the SIEM team had an alert saying that there is a brute force attack on one of the clients using the client username. I looked at Security Event Log in the Event 4625 I found nothing suspicious so I followed the SIEM rule that generates this alert it points to the id 4648 (A logon was attempted using explicit credentials) in this Event ID I found a significant number of records generated form the Exchange server like in one second there is 10 records and all of them in the Executable info field show OUTLOOK.EXE, anyone has an idea why this data exist?
Avatar
@Cellebrite having issues with installing UFED for PC, uninstalled the previous version and restarted multiple times but nothing works
Avatar
Avatar
stark4n6
@Cellebrite having issues with installing UFED for PC, uninstalled the previous version and restarted multiple times but nothing works
umm.. there's a for install in %temp%.. we'd need to see whats up
Avatar
Avatar
CLB-Paul
umm.. there's a for install in %temp%.. we'd need to see whats up
let me know if there is anything specific to look at
Avatar
Avatar
Colman
Police overwhelmed by digital forensics as 25,000 devices await checks – report https://www.standard.co.uk/news/uk/police-home-office-crown-prosecution-service-b1043999.html?amp
Developing examiners the right way should be the true answer...but usually the shortcuts win the budget.
👍 1
Avatar
Hi everyone, currently working on a couple of log files provided by a DLP solution indicating copy processes from a laptop to an external drive. I realized that in the recorded mass-copy processes that e. g. last for 30seconds it appears that some single files appear several times within that time frame. same origin, destination, hash value just different time stamp within those 30 seconds. are there any technical explanations behind that? Also potential (technical) explanations why a device-mount or unmount operation might be encountered without the corresponding counterpart? The DLP not able to "catch" it fast enough? The mount not being recorded within the screened logs, e. g. event logs?
Avatar
Avatar
Sam8763Ze
Hello everyone I have a question I would appreciate it if anyone could help me; the SIEM team had an alert saying that there is a brute force attack on one of the clients using the client username. I looked at Security Event Log in the Event 4625 I found nothing suspicious so I followed the SIEM rule that generates this alert it points to the id 4648 (A logon was attempted using explicit credentials) in this Event ID I found a significant number of records generated form the Exchange server like in one second there is 10 records and all of them in the Executable info field show OUTLOOK.EXE, anyone has an idea why this data exist?
it could just be that the service is trying impersonate which is not uncommon It is great when an adversary goes to a privileged account or changes account and etc
3:04 AM
what you originally did looking for 4625 is the way to check for brute force attacks It could just be a misconfiguration or maybe its not definitely take a closer look (edited)
Avatar
oh yah just found it Outlook will use Microsoft accounts to authenticate to the mail server Computer accounts also use this as well (edited)
Avatar
Avatar
avesta
oh yah just found it Outlook will use Microsoft accounts to authenticate to the mail server Computer accounts also use this as well (edited)
Thank you so much
Avatar
indianadmin 12/3/2022 5:42 AM
One of users have complained that their computer Just started typing stuff out while she had opened Outlook. I tried looking at the event logs if there have been any remote connections with eventID 4624, looked at the prefetch logs to see any programs being run when this event occurred. Unable to find any clue as to what happened. What else should I be looking for? There are no firewall logs with the company.
Avatar
Evidence of execution artifacts, prefetch shimcache, Amcache 🙂
6:02 AM
Also perhaps installed services event 7045
Avatar
Avatar
indianadmin
One of users have complained that their computer Just started typing stuff out while she had opened Outlook. I tried looking at the event logs if there have been any remote connections with eventID 4624, looked at the prefetch logs to see any programs being run when this event occurred. Unable to find any clue as to what happened. What else should I be looking for? There are no firewall logs with the company.
Andrew Rathbun 12/3/2022 6:22 AM
Must be some remote access tool/backdoor in play
Avatar
ChadlyThicc 12/3/2022 7:29 AM
How much is a Cellebrite renewal licence for a UEFD touch?
Avatar
ChadlyThicc 12/3/2022 9:47 AM
Also as well an a Cellebrite UEFD scan a factory reseted phone
Avatar
Avatar
indianadmin
One of users have complained that their computer Just started typing stuff out while she had opened Outlook. I tried looking at the event logs if there have been any remote connections with eventID 4624, looked at the prefetch logs to see any programs being run when this event occurred. Unable to find any clue as to what happened. What else should I be looking for? There are no firewall logs with the company.
another alternative to check (which doesn't rule out malware), is the device in a shared space with wireless keyboards that get mixed up/re-used by staff (e.g. during cleaning/sanitizing)
10:47 AM
we had an occasion where multiple keyboards were paired to the same device
Avatar
Avatar
indianadmin
One of users have complained that their computer Just started typing stuff out while she had opened Outlook. I tried looking at the event logs if there have been any remote connections with eventID 4624, looked at the prefetch logs to see any programs being run when this event occurred. Unable to find any clue as to what happened. What else should I be looking for? There are no firewall logs with the company.
I reckon additional information is warranted, such as whether it's typing gibberish (like consecutive letters vs readable stuff), is it having at specific time(range) or when outlook is opened only? When did it began? What if any did the user do before all this began? Did the user downloaded/executed/installed/clicked on something?
Avatar
Avatar
deetnutz
I reckon additional information is warranted, such as whether it's typing gibberish (like consecutive letters vs readable stuff), is it having at specific time(range) or when outlook is opened only? When did it began? What if any did the user do before all this began? Did the user downloaded/executed/installed/clicked on something?
indianadmin 12/3/2022 8:45 PM
Individual words are proper, but overall sentence is gibberish. This happened for the first time, and as soon as it was seen, the laptop was taken off the network. A new laptop has been given to the user and no issues on the new one.
Avatar
Avatar
deetnutz
I reckon additional information is warranted, such as whether it's typing gibberish (like consecutive letters vs readable stuff), is it having at specific time(range) or when outlook is opened only? When did it began? What if any did the user do before all this began? Did the user downloaded/executed/installed/clicked on something?
indianadmin 12/3/2022 8:47 PM
Nothing was downloaded by the user. i see radskman which seems to be a remote access tool by HP. Will have to check with the company if this is something they use.
Avatar
Avatar
indianadmin
Nothing was downloaded by the user. i see radskman which seems to be a remote access tool by HP. Will have to check with the company if this is something they use.
RAT could be a possibility, but I like to get teh low hanging fruit out of the way. What have you done so far if any to check if the machine is compromised?
8:51 PM
Also @rayeh theory is plausible
Avatar
Avatar
deetnutz
RAT could be a possibility, but I like to get teh low hanging fruit out of the way. What have you done so far if any to check if the machine is compromised?
indianadmin 12/3/2022 9:03 PM
Checked event logs for any incoming remote access. Prefetch for any executions around the time of incident. Checking scheduled tasks. USB is blocked.
Avatar
Avatar
indianadmin
Checked event logs for any incoming remote access. Prefetch for any executions around the time of incident. Checking scheduled tasks. USB is blocked.
What's your rational behind checking EventID 4624 when looking for any remote connections? What other event id did you check? Are you checking it against the event viewer on the machine or are you using SIEM? Do you have EDR in place at the organization?
Avatar
Avatar
deetnutz
What's your rational behind checking EventID 4624 when looking for any remote connections? What other event id did you check? Are you checking it against the event viewer on the machine or are you using SIEM? Do you have EDR in place at the organization?
indianadmin 12/3/2022 9:34 PM
Event viewer. And there is no EDR or SIEM. I looked at event IDs to see if therenwas incoming remote connection.
Avatar
Avatar
indianadmin
Event viewer. And there is no EDR or SIEM. I looked at event IDs to see if therenwas incoming remote connection.
Look at 4688 (if you haven't done so yet), perform MFT analysis, review ASEP and start gathering evidence of execution artifacts and reviewing them as well (edited)
Avatar
Avatar
deetnutz
Look at 4688 (if you haven't done so yet), perform MFT analysis, review ASEP and start gathering evidence of execution artifacts and reviewing them as well (edited)
indianadmin 12/3/2022 9:50 PM
Thanks. Will start this first thing Monday
👍 1
Avatar
randomaccess 12/4/2022 12:14 AM
Remote desktop logs are ok... But there's less of a chance that someone would have an rdp session and start typing without logging off the user Looking at installed applications and all program execution artefacts as suggested is a good start
Avatar
it being gibberish... were any speech to text applications active? (MS or otherwise). It might explain why it was only dictionary words (if I understand correctly), but the grammar/sentence had no meaning (edited)
this 1
Avatar
Anyone good with regex?
3:00 AM
Got 1 that works, and then copying the format doesn't work for another
Avatar
Avatar
Rob
Anyone good with regex?
😅 2
3:01 AM
What are you using the regex for?
3:01 AM
IP/Bitcoin wallet/custom?
Avatar
Removing a false positive.
3:02 AM
Using the [^false]positive format
3:02 AM
i.e I want false to be matched, but not falsepositive etc. (edited)
Avatar
Are there delimiters like a space or colon? You could try to match something like ^false\s
Avatar
You could chain two grep together one looking for false and the other excluding falsepositive from the result
Avatar
We took it to DMs and came up with this ([^a-zA-Z\n]+|^)<term>([^a-zA-Z\n]+|$). Needed it to avoid coming up with subsets such as rapist being a word within therapist - feedback or improvements appreciated
👍🏻 1
Salute 1
Avatar
Avatar
Matt
We took it to DMs and came up with this ([^a-zA-Z\n]+|^)<term>([^a-zA-Z\n]+|$). Needed it to avoid coming up with subsets such as rapist being a word within therapist - feedback or improvements appreciated
Digitalferret 12/5/2022 5:35 AM
good call, butI'm so old i can remember that being a skit on the Benny Hill Show. signwriter split the sign wrong so it said John Smith the Rapist not John Smith - Therapist. You wouldn't go near that with a bargepole these days.
PepeLaugh 1
Avatar
It did the job 🙂
👌 1
6:04 AM
Should say, it's spurred several other ideas but that can be saved for a rainy day 😅
6:04 AM
Issue with Regex, it's addictive and you always want to then keep going
Avatar
Avatar
Rob
Issue with Regex, it's addictive and you always want to then keep going
Digitalferret 12/5/2022 6:18 AM
nah, thats fibs that is. do regex, get result, close the box, lock the lid, throw the key 😁
🤣 3
Avatar
Avatar
Digitalferret
nah, thats fibs that is. do regex, get result, close the box, lock the lid, throw the key 😁
But there's almost more fine tuning for the same result!
6:21 AM
It needs to look visually pleasing!!!
Avatar
Digitalferret 12/5/2022 6:33 AM
lol, elegant regex; an oxymoron if ever there was one
🧐 1
Avatar
Avatar
Matt
We took it to DMs and came up with this ([^a-zA-Z\n]+|^)<term>([^a-zA-Z\n]+|$). Needed it to avoid coming up with subsets such as rapist being a word within therapist - feedback or improvements appreciated
I suppose the same thing can be achieved with \b
Avatar
Avatar
Steve2609
I think you can. If you connect to the TD3 via ethernet to the Web Portal, you can browse the source disk. I think you may be able to download isolated files for analysis. It is not particularly efficient, but I believe it is possible.
numbersevenfan 12/5/2022 6:59 AM
I will try this, thank you!
Avatar
Matt - Monolith Forensics 12/5/2022 8:40 AM
I had some fun with ChatGPT - this is actually pretty solid; I'll have to try some more complex prompts and see how detailed it can get.
👍 1
⚡ 1
Avatar
I wonder, with the sophistication of this type of chat bot, will there be telltale signs of use? Or will universities have to start doing more oral presentation type exams?
Avatar
Matt - Monolith Forensics 12/5/2022 9:23 AM
I think that can be alleviated by citing sources, though maybe the bot can provide those too if asked.
Avatar
Avatar
Matt - Monolith Forensics
I think that can be alleviated by citing sources, though maybe the bot can provide those too if asked.
All the sources I've seen provided by the bot have been fabricated, so... PepeLaugh
Avatar
There was a recent LTT video where they requested it cite sources and it cited things formatted correctly but made up the actual pages... it would be incumbent on the evaluator to check sources
9:45 AM
I've never graded college papers though, I would imagine checking every source against every paper would be extremely tedious
Avatar
I'd like to think you'd get used to seeing the same sources time and time again, so you could spot unusual or bogus references
Avatar
Matt - Monolith Forensics 12/5/2022 11:50 AM
We are also seeing this tech in its infancy - its only going to get better over time. I have no doubt it will be optimized for things like citing correct sources - especially if its linked to real data repositories. This is also from a generic chat bot - we will probably be able to use AI like this that has been trained in specific disciplines like chemistry, computer science, digital forensics, etc..
Avatar
Surprise! Another ChatGPT tweet! Except this time it is people making ChatGPT punch itself in the face *Images via @Kevin2600
Likes
333
3:03 PM
OMEGALUL
Avatar
Any police officer from OPP (ontario 🇨🇦) here ? DM if you are, thanks
Avatar
Avatar
SPVQct3207
Any police officer from OPP (ontario 🇨🇦) here ? DM if you are, thanks
Andrew Rathbun 12/5/2022 4:44 PM
@Law Enforcement [Canada]
Avatar
@Magnet Forensics can you have someone contact me regarding a renewal please
Avatar
Avatar
Neon
@Magnet Forensics can you have someone contact me regarding a renewal please
Sending you a DM for info
Avatar
https://twitter.com/HeatherMahalik/status/1600110902572744704?s=20&t=AWWgU8xDDfxjDHJHiYfqJw We got a great show planned for tomorrow @ScottKjr3347 on Life has no Ctrl Alt Delete
Tomorrow at 12:30 Eastern we have @Scott_Kjr on Life Has No Ctrl+Alt+Del. Don’t miss it. https://t.co/OURuhA2Ej4 Last show in 2022💥 #DFIR @Cellebrite
Avatar
Avatar
SPVQct3207
Any police officer from OPP (ontario 🇨🇦) here ? DM if you are, thanks
Sup
👍 1
6:08 AM
(I'm a DF analyst/investigator with OPP Cyber Operations Section - DM me directly)
Avatar
I am not able to open checkpoint firewall logs anyone who can help me ?
7:08 AM
I tryed in notepad and exel but none worked
Avatar
Avatar
SamuraiPwn
I am not able to open checkpoint firewall logs anyone who can help me ?
Andrew Rathbun 12/6/2022 7:11 AM
What format are they in? Also, use Notepad for nothing. Get a better text editor. Literally anything. Notepad++, EditPad Pro, UltraEdit, Sublime Text, etc, there's so many better options
Avatar
I love notepad++... I'm sad when I have to open regular notepad for something on someone else's computer
this 4
Avatar
Avatar
Andrew Rathbun
What format are they in? Also, use Notepad for nothing. Get a better text editor. Literally anything. Notepad++, EditPad Pro, UltraEdit, Sublime Text, etc, there's so many better options
I use notepad++ only --__--
Avatar
Avatar
Andrew Rathbun
What format are they in? Also, use Notepad for nothing. Get a better text editor. Literally anything. Notepad++, EditPad Pro, UltraEdit, Sublime Text, etc, there's so many better options
in .log
Avatar
Andrew Rathbun 12/6/2022 7:18 AM
ok, so flat text file then? or is it like a binary file?
Avatar
Avatar
Andrew Rathbun
What format are they in? Also, use Notepad for nothing. Get a better text editor. Literally anything. Notepad++, EditPad Pro, UltraEdit, Sublime Text, etc, there's so many better options
VSCode :^)
Avatar
ig its binary bcz its just rubbish on opening in notepad or hex editor
Avatar
Avatar
SamuraiPwn
ig its binary bcz its just rubbish on opening in notepad or hex editor
It could be a .log.gz file, in which case you'll need to uncompress
Avatar
nahh
7:19 AM
its .log
Avatar
Just to troll..... VI!!
kekW 1
Avatar
Avatar
Matt
It could be a .log.gz file, in which case you'll need to uncompress
I know this much 😐
Avatar
Avatar
SamuraiPwn
its .log
.log is normally a text file, and it wouldn't be the first time a file has been mis-extensioned 🙂
💯 1
Avatar
Avatar
Matt
.log is normally a text file, and it wouldn't be the first time a file has been mis-extensioned 🙂
Oh
Avatar
Andrew Rathbun 12/6/2022 7:20 AM
file extensions are largely meaningless
Avatar
Yea but I got them in .log only 😐
Avatar
Have you come across CyberChef before?
7:21 AM
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
Avatar
I wonder what the unix 'file' command would say about it
thistbh 1
Avatar
Avatar
dsplice
I wonder what the unix 'file' command would say about it
data sir
7:21 AM
I tryed that too
Avatar
Then likely pure binary output. Only suggestion is google to see if anyone has written a parser for it
Avatar
I can view them in the application but when I downloaded them and tryed opening in notepad++ but dint worked
Avatar
Avatar
dsplice
Then likely pure binary output. Only suggestion is google to see if anyone has written a parser for it
Oh
Avatar
Avatar
SamuraiPwn
Oh
Many applications (and especially networking devices that deal with a lot of data) often output in a binary format for speed. (thinking of snort/suricata and the binary logging)
Avatar
Avatar
dsplice
Many applications (and especially networking devices that deal with a lot of data) often output in a binary format for speed. (thinking of snort/suricata and the binary logging)
Gotya
7:26 AM
I think you are dammn right bcz on running strings i get readable data
👍 1
Avatar
Original message was deleted or could not be loaded.
WTF
7:31 AM
@Moderators spam going on
Avatar
member since jan 27, playing the long con
Avatar
Thanks I just deleted it
🤘 1
Avatar
Another hacked account...
Avatar
Avatar
Matt
Another hacked account...
lol
Avatar
Andrew Rathbun 12/6/2022 7:33 AM
well that was fun 😛
😆 2
Avatar
Consider this your reminder to enable 2FA folks
💯 4
Avatar
Avatar
Andrew Rathbun
well that was fun 😛
can say tho
Avatar
See if binwalk returns anything usefulv
Avatar
Avatar
deetnutz
See if binwalk returns anything usefulv
on .log file okay I will try
Avatar
might need to grab it from Linux repo, if you don't have it installed (edited)
Avatar
I have it
7:43 AM
😄
7:44 AM
nothing useful ig
Avatar
Avatar
deetnutz
See if binwalk returns anything usefulv
7:46 AM
I think foremost is better then binwalk
Avatar
Andrew Rathbun 12/6/2022 7:49 AM
are those IIS logs?
Avatar
Avatar
SamuraiPwn
nothing useful ig
I concur. How did you stumble on that "log" file?
Avatar
Avatar
Andrew Rathbun
are those IIS logs?
firewall log
Avatar
Andrew Rathbun 12/6/2022 7:50 AM
Naming convention reminded me of IIS logs, only reason I asked haha
Avatar
Oh
7:51 AM
Well its of checkpoint like the the firewall was of checkpoint
7:51 AM
so the company gave me the logs in native formate not in readable format 😐
7:52 AM
and now those are overwritten (edited)
Avatar
Do i smell xor obfuscation in play? 🤔
Avatar
lol I think Nope
7:54 AM
bcz strings gave me readable text
7:54 AM
So not xor ig
Avatar
Gotcha. I'm leaning towards native format as well.
Avatar
Avatar
deetnutz
Gotcha. I'm leaning towards native format as well.
Cool
Avatar
Avatar
Matt
Consider this your reminder to enable 2FA folks
Have ChatGPT write up a MFA policy for the channel
😂 6
Avatar
Avatar
whee30
Have ChatGPT write up a MFA policy for the channel
👍 1
7:59 AM
If only Discord supported HSK/PSKs 🥲
Avatar
@SamuraiPwn mind if I take a peek if you can share one?
Avatar
Digitalferret 12/6/2022 9:11 AM
lol ChatGPT That’s what Arvind Narayanan, a computer science professor at Princeton, pointed out in a tweet: “People are excited about using ChatGPT for learning. It’s often very good. But the danger is that you can’t tell when it’s wrong unless you already know the answer. I tried some basic information security questions. In most cases the answers sounded plausible but were in fact BS.”  and they just farmed your mobile no. source https://venturebeat.com/ai/the-hidden-danger-of-chatgpt-and-generative-ai-the-ai-beat/
Avatar
Avatar
Digitalferret
lol ChatGPT That’s what Arvind Narayanan, a computer science professor at Princeton, pointed out in a tweet: “People are excited about using ChatGPT for learning. It’s often very good. But the danger is that you can’t tell when it’s wrong unless you already know the answer. I tried some basic information security questions. In most cases the answers sounded plausible but were in fact BS.”  and they just farmed your mobile no. source https://venturebeat.com/ai/the-hidden-danger-of-chatgpt-and-generative-ai-the-ai-beat/
Yeah I didn’t like that it needed my mobile number
9:17 AM
Burner phones ftw
💯 2
Avatar
Does anyone run a public instance of OpenCTI and allow users to apply to create them a personal account to leverage the platform? Just curious if someone has already done this for folks in a somewhat closed group like this
Avatar
I am curious what everyone is using for Faraday boxes. We have had a Mission Darkness XL and its leaking. I’ve sent it back for repair and it's leaking again.
Avatar
Avatar
SamuraiPwn
Well its of checkpoint like the the firewall was of checkpoint
If those are from a Check Point firewall, you can't open them in a text editor. You have to run a command from the firewall to use their logexport tool to get them in a readable format. Check Point logs outside of using their native tools are a real pain
👍 1
Avatar
Does anyone know if it is possible to pre-fill the case information input boxes when creating a new image in FTK Imager? Getting tired of writing my own name everytime 😄
Avatar
Avatar
tecnex
Does anyone know if it is possible to pre-fill the case information input boxes when creating a new image in FTK Imager? Getting tired of writing my own name everytime 😄
Ross Donnelly 12/6/2022 12:16 PM
Could you script it from the command line?
Avatar
That would be possible but as I also examine the device through the gui version, I would prefer to stay in that version and not having to switch to a different program. The handling of custom content images which we use a lot at my department is also more user friendly in the gui version.
Avatar
Avatar
tecnex
That would be possible but as I also examine the device through the gui version, I would prefer to stay in that version and not having to switch to a different program. The handling of custom content images which we use a lot at my department is also more user friendly in the gui version.
randomaccess 12/6/2022 1:09 PM
Maybe the paid version does But also do you do the examination in the free ftki or paid ftk?
Avatar
Avatar
Forgedmom
I am curious what everyone is using for Faraday boxes. We have had a Mission Darkness XL and its leaking. I’ve sent it back for repair and it's leaking again.
Curious what wireless signal is it leaking ? Are you leaving the box open when not using it to extend the life of the seals ? I've heard of some boxes blocking everything but bluetooth signals.
Avatar
Basic cellular signal is leaking. And yes it’s open when not in use.
Avatar
what determines the hash of powershell.exe itself? Does it changed based on the windows version? (edited)
Avatar
Avatar
Ghost
what determines the hash of powershell.exe itself? Does it changed based on the windows version? (edited)
Andrew Rathbun 12/6/2022 5:33 PM
Probably depends on the version installed on Windows at the time of hashing
Avatar
Avatar
Beercow
@SamuraiPwn mind if I take a peek if you can share one?
its like 2 gb
Avatar
Avatar
CyberGhost
If those are from a Check Point firewall, you can't open them in a text editor. You have to run a command from the firewall to use their logexport tool to get them in a readable format. Check Point logs outside of using their native tools are a real pain
Thx
Avatar
Avatar
SamuraiPwn
its like 2 gb
That explains why notepad++ won’t open it. It’s too big. 😂
Avatar
Andrew Rathbun 12/7/2022 7:36 AM
Notepad++ has size limits like that?
Avatar
Use Glogg if 2GB
Avatar
Avatar
Andrew Rathbun
Notepad++ has size limits like that?
Digitalferret 12/7/2022 10:23 AM
Avatar
MrMacca (Allan Mc) 12/7/2022 10:34 AM
Not a forensic question, but has anyone had an issue, and resolved a Windows 11 Machine unable to RDP to a device due to the logon attempt failing? The username and password work on a windows 10 machine remoting in. Any ideas?
Avatar
Avatar
MrMacca (Allan Mc)
Not a forensic question, but has anyone had an issue, and resolved a Windows 11 Machine unable to RDP to a device due to the logon attempt failing? The username and password work on a windows 10 machine remoting in. Any ideas?
JLindmar (83AR) 12/7/2022 10:45 AM
https://www.bleepingcomputer.com/news/microsoft/microsoft-investigates-windows-11-22h2-remote-desktop-issues/ https://answers.microsoft.com/en-us/windows/forum/all/issues-with-remote-desktop-on-windows-11-after/2f0b90c8-9549-46bb-bede-41c2d3990380
"Until Redmond provides official mitigation measures, you can address the problems by rolling back the Windows 2022 Update or disabling UDP connections on affected clients. To disable UDP connections, you have to go to HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\Client using the Registry Editor, create a new DWORD entry named fClientDisableUDP with a value of 1, and restart the device."
(edited)
Microsoft is investigating user reports of issues with Remote Desktop on Windows 11 systems after installing the Windows 11 2022 Update.
Avatar
Avatar
randomaccess
Maybe the paid version does But also do you do the examination in the free ftki or paid ftk?
I wasn't very clear on that 🙂 We (=IT department) use FTK Imager to image the devices we deem "image-worthy". We are taking part in search warrants and need to decide on-scene if a device is image-worthy. This decision is mostly done by looking at the files through FTK Imager. The images later get put into the full FTK for the investigating officer (=not IT) to analyse all the files we acquired.
11:00 AM
As we acquire multiple images per search warrant and are on-scene regularly I wondered if I could somehow get "default values" into those case information input boxes.
Avatar
Avatar
JLindmar (83AR)
https://www.bleepingcomputer.com/news/microsoft/microsoft-investigates-windows-11-22h2-remote-desktop-issues/ https://answers.microsoft.com/en-us/windows/forum/all/issues-with-remote-desktop-on-windows-11-after/2f0b90c8-9549-46bb-bede-41c2d3990380
"Until Redmond provides official mitigation measures, you can address the problems by rolling back the Windows 2022 Update or disabling UDP connections on affected clients. To disable UDP connections, you have to go to HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\Client using the Registry Editor, create a new DWORD entry named fClientDisableUDP with a value of 1, and restart the device."
(edited)
MrMacca (Allan Mc) 12/7/2022 11:05 AM
Thanks I'll give this a read
Avatar
Avatar
tecnex
As we acquire multiple images per search warrant and are on-scene regularly I wondered if I could somehow get "default values" into those case information input boxes.
randomaccess 12/7/2022 11:39 AM
I used to just setup a text file and copy stuff out since a lot of stuff would be similar. Might be worth looking into xways since it's faster. Might have the ability to store stuff
Avatar
Avatar
MrMacca (Allan Mc)
Thanks I'll give this a read
JLindmar (83AR) 12/7/2022 12:17 PM
Let me know if this solved your issue, as I'll have some systems "upgraded" to Windows 11 within the next few days. (edited)
🪦 1
Avatar
Avatar
Beercow
That explains why notepad++ won’t open it. It’s too big. 😂
For similar cases, I use PSPAD. It accepts better big files and it can work on files without opening them. It also has many option like "operations on lines" (delete duplicates lines, delete blank lines, etc...) It also can compare two files. In short, it's a good notepad !
Avatar
Avatar
Digitalferret
JLindmar (83AR) 12/7/2022 1:18 PM
You can also load large files if you install the "BigFiles" plugin that's available via Plugins > Plugins Admin.
👍🏻 1
5:41 PM
Nice work @Magnet Forensics
Avatar
NibblesNBits 12/7/2022 7:53 PM
@Magnet Forensics or anyone. Can anyone direct me to documentation or other information on correctly processing an Apple search warrant return. I've already done the download and decrypting. I've tried processing but I just want to verify.
Avatar
Avatar
NibblesNBits
@Magnet Forensics or anyone. Can anyone direct me to documentation or other information on correctly processing an Apple search warrant return. I've already done the download and decrypting. I've tried processing but I just want to verify.
chriscone_ar 12/7/2022 8:05 PM
I’ll DM you a couple of links that may help.
Avatar
Hi everyone I'm looking for a GIAC Certified Forensic Analyst (GCFA) exam guide. do you have any recommendation?
Avatar
Avatar
Sam8763Ze
Hi everyone I'm looking for a GIAC Certified Forensic Analyst (GCFA) exam guide. do you have any recommendation?
Are you looking for an index for the books?
Avatar
Avatar
Beercow
Are you looking for an index for the books?
yes
Avatar
Avatar
Sam8763Ze
yes
You’re better off creating it yourself but here is one. https://github.com/mformal/FOR508_Index
FOR508 Index - GCFA. Contribute to mformal/FOR508_Index development by creating an account on GitHub.
Avatar
Does any1 know how to best handle cases where we for example take a phone from a suspect where cloud extractions are needed later but the suspect gets released after say an interrogation and might go home and change passwords on his accounts. Law is still fresh here in Sweden. Im guessing speed is the name of the game here or maybe freeze the accounts somehow?
Avatar
Avatar
Johnie
Does any1 know how to best handle cases where we for example take a phone from a suspect where cloud extractions are needed later but the suspect gets released after say an interrogation and might go home and change passwords on his accounts. Law is still fresh here in Sweden. Im guessing speed is the name of the game here or maybe freeze the accounts somehow?
In the US we have "preservation orders" authorized by the Electronic Communications and Privacy Act. I'm sure Europe has the same thing. I found this, but I'm not a European law expert (though I do dabble in it for teaching purposes). Does this apply to your situation: https://www.eumonitor.eu/9353000/1/j9vvik7m1c3gyxp/vknmikug1xz0 (edited)
Avatar
Avatar
5cary
In the US we have "preservation orders" authorized by the Electronic Communications and Privacy Act. I'm sure Europe has the same thing. I found this, but I'm not a European law expert (though I do dabble in it for teaching purposes). Does this apply to your situation: https://www.eumonitor.eu/9353000/1/j9vvik7m1c3gyxp/vknmikug1xz0 (edited)
This was my thinking aswell! So a preservation order would preserve still allow us to use the cloud tokens without issue? Can they still log in but not alter any data im guessing? Also do you know how fast these orders are executed in practice? (edited)
Avatar
Avatar
Johnie
This was my thinking aswell! So a preservation order would preserve still allow us to use the cloud tokens without issue? Can they still log in but not alter any data im guessing? Also do you know how fast these orders are executed in practice? (edited)
My understanding of how preservation orders work is the cloud provider saves a backup of all data so anything the user may delete, edit, or change is still preserved. The provider will then release all data including the original, unaltered data to law enforcement upon proper legal process (ie: search warrant or subpoena). The user is unaware of any changes to their account, so they would be able to change passwords and delete items so that those items are not visible to them in their account, but the backup still exists. As far as how fast they are executed, the sooner LE can serve them the better, but I think it is fairly quick once the order is received.
this 1
Gavel 1
8:08 AM
So I would be surprised if a user changed a password and your cloud token still worked.
Avatar
Once caveat, at least here in the US is that some providers are now notifying users upon the receipt of a preservation order UNLESS a court order specifying "no notification" is included. Depends on the provider.
👍 2
Avatar
Hi everyone I have a question regarding Linux environments, what distro would you recommend for all round digital forensic work?
Avatar
Avatar
NibblesNBits
@Magnet Forensics or anyone. Can anyone direct me to documentation or other information on correctly processing an Apple search warrant return. I've already done the download and decrypting. I've tried processing but I just want to verify.
Hi Kenobyte, using the Apple Warrant Return Assistant might help get the format needed to process. https://www.magnetforensics.com/resources/magnet-apple-warrant-return-assistant/ The tool downloads, organizes and zips the WR for you.
MAGNET Apple Warrant Return Assistant is a one-click solution to download and prepare Apple warrant return data for processing.
Avatar
Avatar
GwenD
Hi Kenobyte, using the Apple Warrant Return Assistant might help get the format needed to process. https://www.magnetforensics.com/resources/magnet-apple-warrant-return-assistant/ The tool downloads, organizes and zips the WR for you.
NibblesNBits 12/8/2022 1:24 PM
Yes I performed the download, decryption, decompression etc using the magnet tool which is great. I'm just trying to ensure I loaded it into axiom correctly. I added all the unencrypted zips using the search warrant option in Axiom and processed. Just want to make sure this is the correct way. Thank you
👍 1
Avatar
@Cellebrite Can anyone DM with me about CAS?
📬 2
Avatar
Avatar
MrSadface
Hi everyone I have a question regarding Linux environments, what distro would you recommend for all round digital forensic work?
Look at Paladin, Cali, Caine, Deft
Avatar
Avatar
MrSadface
Hi everyone I have a question regarding Linux environments, what distro would you recommend for all round digital forensic work?
Tsurugi
Avatar
So, just saw this post regarding SOC
8:54 AM
The future is here
8:55 AM
this is based of Chatgbt from my understanding
Avatar
Unoriginal_name 12/9/2022 10:43 AM
How are all of the @Law Enforcement [USA] logging iPhone 14 phones in evidence if the phone is locked and the passcode is unknown? Since there is no SIM, there is no SIM card tray to put the IMEI on. Essentially, unless I am mistaken, there are no unique #s on the outside of the phone. Has anyone figured out a good way to list that particular phone in evidence? To be clear, I’m talking when logging the phone in evidence. This is before any analysis is started (edited)
Avatar
Avatar
Unoriginal_name
How are all of the @Law Enforcement [USA] logging iPhone 14 phones in evidence if the phone is locked and the passcode is unknown? Since there is no SIM, there is no SIM card tray to put the IMEI on. Essentially, unless I am mistaken, there are no unique #s on the outside of the phone. Has anyone figured out a good way to list that particular phone in evidence? To be clear, I’m talking when logging the phone in evidence. This is before any analysis is started (edited)
Good question. I haven't dealt with this yet
Avatar
Some Detective just called themselves to get a telephone number. But if there is nothing in my lab we put stickers on phones we receive to identify them properly
💯 3
Avatar
Deleted User 12/9/2022 10:45 AM
An advanced unlock tool may or may not give you the identifying numbers you need to process the device.
Avatar
Unoriginal_name 12/9/2022 10:46 AM
To be clear, I’m talking when logging the phone in evidence. This is before any analysis is started
Avatar
pathsofglory 12/9/2022 10:46 AM
🍿
10:46 AM
haven't dealt with a 14 yet either
Avatar
Avatar
Unoriginal_name
How are all of the @Law Enforcement [USA] logging iPhone 14 phones in evidence if the phone is locked and the passcode is unknown? Since there is no SIM, there is no SIM card tray to put the IMEI on. Essentially, unless I am mistaken, there are no unique #s on the outside of the phone. Has anyone figured out a good way to list that particular phone in evidence? To be clear, I’m talking when logging the phone in evidence. This is before any analysis is started (edited)
We’ve just been doing the color and that’s basically it. 1 silver apple iPhone with no visible IMEI
✅ 3
Avatar
Avatar
Unoriginal_name
How are all of the @Law Enforcement [USA] logging iPhone 14 phones in evidence if the phone is locked and the passcode is unknown? Since there is no SIM, there is no SIM card tray to put the IMEI on. Essentially, unless I am mistaken, there are no unique #s on the outside of the phone. Has anyone figured out a good way to list that particular phone in evidence? To be clear, I’m talking when logging the phone in evidence. This is before any analysis is started (edited)
SgtMoose114 12/9/2022 10:47 AM
All of our evidence is assigned an evidence number when it is taken by and officer. We will probably end up getting the warrant by describing the phone and the evidence number
👍 4
Avatar
Can you scan it for a BT MAC address gives you something?
Avatar
Gwaihir Scout 12/9/2022 10:47 AM
Yeah, simple description and just hope no one takes more than one phone out of its bag at the same time. (edited)
Avatar
Avatar
Unoriginal_name
How are all of the @Law Enforcement [USA] logging iPhone 14 phones in evidence if the phone is locked and the passcode is unknown? Since there is no SIM, there is no SIM card tray to put the IMEI on. Essentially, unless I am mistaken, there are no unique #s on the outside of the phone. Has anyone figured out a good way to list that particular phone in evidence? To be clear, I’m talking when logging the phone in evidence. This is before any analysis is started (edited)
Just put an evidence sticker on it with a barcode or number.
👍 1
Avatar
Has anyone heard of TIMETRAVELERSVPN or TimeTravelersWiFi? As an SSID. I think it’s some sort of rental travel hotspot but would like to confirm somehow.
Avatar
Avatar
DanMaher
We’ve just been doing the color and that’s basically it. 1 silver apple iPhone with no visible IMEI
Unoriginal_name 12/9/2022 10:47 AM
That’s what made me ask the question, lol. I just received “1 purple iPhone”
Avatar
Avatar
Unoriginal_name
How are all of the @Law Enforcement [USA] logging iPhone 14 phones in evidence if the phone is locked and the passcode is unknown? Since there is no SIM, there is no SIM card tray to put the IMEI on. Essentially, unless I am mistaken, there are no unique #s on the outside of the phone. Has anyone figured out a good way to list that particular phone in evidence? To be clear, I’m talking when logging the phone in evidence. This is before any analysis is started (edited)
I just document where the device was located, etc. “iPhone 14 located on master bedroom nightstand with phone number xxx-xxx-xxxx” and log chain of custody on the system. When referring to the phone in search warrants. etc, we list it as “black iPhone 11 currently stored as item number x under case number 22-xxxx which was located on master bedroom nightstand….”
Avatar
Avatar
hardrain
Can you scan it for a BT MAC address gives you something?
You probably could but then you run the risk of remote wipe
Avatar
Avatar
Unoriginal_name
That’s what made me ask the question, lol. I just received “1 purple iPhone”
We normally include 4 photos with every report. Front, back, SIM card and imei number… my last report I just made with 2 photos. Nothing else to photograph on these specific phones
Avatar
That’s a good question, hadn’t realized the 14s did away with SIM cards
Avatar
Avatar
kaulel83
You probably could but then you run the risk of remote wipe
Not with just BT..right?
Avatar
Heck, it might be smarted to keep it vague. I have a suppression hearing I have to testify at next week because the warrant imei was 1 digit incorrect from the actual device imei. It’s called good faith, people make mistakes. Lol
🤦‍♂️ 3
Avatar
Avatar
Murk
That’s a good question, hadn’t realized the 14s did away with SIM cards
Yeah you need to have a faraday option ready
Avatar
Avatar
Neon
Yeah you need to have a faraday option ready
Big fact!
Avatar
Avatar
DanMaher
Heck, it might be smarted to keep it vague. I have a suppression hearing I have to testify at next week because the warrant imei was 1 digit incorrect from the actual device imei. It’s called good faith, people make mistakes. Lol
That's not getting suppressed friend
Avatar
Avatar
Unoriginal_name
How are all of the @Law Enforcement [USA] logging iPhone 14 phones in evidence if the phone is locked and the passcode is unknown? Since there is no SIM, there is no SIM card tray to put the IMEI on. Essentially, unless I am mistaken, there are no unique #s on the outside of the phone. Has anyone figured out a good way to list that particular phone in evidence? To be clear, I’m talking when logging the phone in evidence. This is before any analysis is started (edited)
There is a potential it will have multiple IEMI numbers if it is using multiple eSIM cards. They are only accessible by unlocking the phone so as others have mentioned it’s a case of putting a sticker on it or barcode or other identifying sticker
Avatar
I wonder if coming up with an explainable numbering system could work, for example simply number I know phones in chronological order just like OCA numbers, or maybe make it unique with the date and time received
Avatar
Avatar
Neon
That's not getting suppressed friend
Dude has been throwing poop at the wall trying to make anything stick since 2020. Looking at life in prison w/o the possibility of parole because of what I recovered. He’s trying everything
Avatar
Avatar
DanMaher
Dude has been throwing poop at the wall trying to make anything stick since 2020. Looking at life in prison w/o the possibility of parole because of what I recovered. He’s trying everything
Sounds like a good guy who is misunderstood
Avatar
Avatar
Neon
Sounds like a good guy who is misunderstood
Very misunderstood. Google photos cache will get you every time 🤷🏼‍♂️
🤣 5
Avatar
Avatar
J Harder
Some Detective just called themselves to get a telephone number. But if there is nothing in my lab we put stickers on phones we receive to identify them properly
This sounds like a great way to alter evidence and get it thrown out in court. A good defense attorney would have a field day on the detective.
👍 1
Avatar
Avatar
Unoriginal_name
How are all of the @Law Enforcement [USA] logging iPhone 14 phones in evidence if the phone is locked and the passcode is unknown? Since there is no SIM, there is no SIM card tray to put the IMEI on. Essentially, unless I am mistaken, there are no unique #s on the outside of the phone. Has anyone figured out a good way to list that particular phone in evidence? To be clear, I’m talking when logging the phone in evidence. This is before any analysis is started (edited)
How would your lab describe a bloody knife?
Avatar
Avatar
pdog
How would your lab describe a bloody knife?
Unoriginal_name 12/9/2022 11:08 AM
Unfortunately, our laws dictate that we have to describe the electronic device to a particular device. In the past, we have had issues describing a phone as a “black Samsung” or “red iPhone”. Our laws (in my jurisdiction) state that the electronic item must be described in a particular way in the search warrant. Good thought, though
Avatar
Avatar
Unoriginal_name
Unfortunately, our laws dictate that we have to describe the electronic device to a particular device. In the past, we have had issues describing a phone as a “black Samsung” or “red iPhone”. Our laws (in my jurisdiction) state that the electronic item must be described in a particular way in the search warrant. Good thought, though
Maybe you need to start putting verbiage in the warrant saying that the manufacturer does not allow for specific identification of an electronic device without a search of the digital contents of the device. Hopefully the courts will catch up with technology?
👍 2
Avatar
Avatar
Unoriginal_name
Unfortunately, our laws dictate that we have to describe the electronic device to a particular device. In the past, we have had issues describing a phone as a “black Samsung” or “red iPhone”. Our laws (in my jurisdiction) state that the electronic item must be described in a particular way in the search warrant. Good thought, though
regarding your comment on search warrants, have you considered describing the phone in item(s) to be searched as best you can and then adding photographs of the device in your search warrant? I have done that in the past when there was no identifiable information (edited)
Avatar
Avatar
pdog
This sounds like a great way to alter evidence and get it thrown out in court. A good defense attorney would have a field day on the detective.
A forensic examiner can articulate that action and that is was a Detectives action. It would just require articulation but not a reason to throw out a device. No Documentation would result in it. Also, removing a SIM card or placing a device in DFU are changes to a device that when articulated correctly will stand in a trial proceedings. Just like a live computer that requires a obscene collection.
Avatar
Avatar
Unoriginal_name
Unfortunately, our laws dictate that we have to describe the electronic device to a particular device. In the past, we have had issues describing a phone as a “black Samsung” or “red iPhone”. Our laws (in my jurisdiction) state that the electronic item must be described in a particular way in the search warrant. Good thought, though
Purple Apple iPhone 14 in a _ in color Otterbox case identified as agency name case number evidence item #1, then attach screen shots with it
Avatar
Does anyone have a good contact for GrayShift they can DM me. Filled out the online for sometime ago and no contact.
Avatar
Serial numbers should be printed on the back and pcb, can’t those also be recorded since it’s unique ?
1:49 PM
Even if you can’t unlock a device, even in download mode an apple device can grab a serial number from the command line
Avatar
Avatar
Unoriginal_name
Unfortunately, our laws dictate that we have to describe the electronic device to a particular device. In the past, we have had issues describing a phone as a “black Samsung” or “red iPhone”. Our laws (in my jurisdiction) state that the electronic item must be described in a particular way in the search warrant. Good thought, though
Sharpie something on it. “…iPhone 14 identifiable by [case number]/[detective initials and date]”
Avatar
Avatar
unc05_4n6
regarding your comment on search warrants, have you considered describing the phone in item(s) to be searched as best you can and then adding photographs of the device in your search warrant? I have done that in the past when there was no identifiable information (edited)
That’s what we do, even with IMEI, I put pictures on all my warrants
👍 1
Avatar
Avatar
ryd3v
Serial numbers should be printed on the back and pcb, can’t those also be recorded since it’s unique ?
To access the PCB could technically constitute an intrusive search of the physical internals of the device depending upon the prosecutor or judge’s interpretation of the 4th amendment…
Avatar
Avatar
Revo
To access the PCB could technically constitute an intrusive search of the physical internals of the device depending upon the prosecutor or judge’s interpretation of the 4th amendment…
Oh, yes that would be true, I suppose plugging it into a PC is ok though right? 😁
🤣 1
Avatar
Avatar
ryd3v
Oh, yes that would be true, I suppose plugging it into a PC is ok though right? 😁
Not really. I know a state requires a SW before you can remove the SIM card from the phone. (edited)
Avatar
Oh wow, sorry I'm Canadian xD
Avatar
Avatar
ryd3v
Oh wow, sorry I'm Canadian xD
Don't you have more detailed process? Like everything is discoverable? (edited)
Avatar
Avatar
ryd3v
Oh, yes that would be true, I suppose plugging it into a PC is ok though right? 😁
It’s a hot mess here, depending on the day of the week, the weather, the prosecution’s mood, and the judge’s dog’s eating habits it could change…
💯 1
Salute 1
Avatar
Avatar
chauan
Don't you have more detailed process? Like everything is discoverable? (edited)
Yes, I’d imagine it’s not as bad as the states 😁
Avatar
I heard you (Canada) are the champs on making everything discoverable. We are not there...yet. 😆
Avatar
NotIronManBTW 12/10/2022 6:15 PM
yall know if there is a way I can recover this mp3 file and be able to actually listen to contents?
Avatar
Avatar
Unoriginal_name
How are all of the @Law Enforcement [USA] logging iPhone 14 phones in evidence if the phone is locked and the passcode is unknown? Since there is no SIM, there is no SIM card tray to put the IMEI on. Essentially, unless I am mistaken, there are no unique #s on the outside of the phone. Has anyone figured out a good way to list that particular phone in evidence? To be clear, I’m talking when logging the phone in evidence. This is before any analysis is started (edited)
The 4th amendment requires that you particularly describe the place and thing to be searched. There are lots of ways to get that done without an IMEI. If I don’t have that, I describe what I do have and then describe the device’s exact location (example: in my locking faraday box in my lab located at 123 Main St). I also include a statement why I don’t have an IMEI.
👍 3
Avatar
Avatar
NotIronManBTW
yall know if there is a way I can recover this mp3 file and be able to actually listen to contents?
Did you try DMDE?
Avatar
Avatar
NotIronManBTW
yall know if there is a way I can recover this mp3 file and be able to actually listen to contents?
Digitalferret 12/11/2022 12:49 AM
that looks like a tesdisk/photorec carve? go to the Hex tab. . your main problem is fragmention and it may have found a header for mp3 and then the file is gibberish after that. likely it wont be playable unless as rydev said you find a file table with something like DMDE or a free R-Studio app https://www.r-undelete.com/ .
Avatar
NotIronManBTW 12/11/2022 8:56 AM
Sorry just got back and saw this ya that’s sorta what I was thinking. I’m new to this as it’s for a class though so I’ll look into it. Thank you very much
Avatar
NotIronManBTW 12/11/2022 12:23 PM
Hey so Im working on my final final project for a class. I have my image in Autopsy and I found a zipped file that I need to find the password for. It is hidden somewhere in thousands of photos, mp3,or even plain text. What would be my best way to go about this
Avatar
Avatar
NotIronManBTW
Hey so Im working on my final final project for a class. I have my image in Autopsy and I found a zipped file that I need to find the password for. It is hidden somewhere in thousands of photos, mp3,or even plain text. What would be my best way to go about this
Digitalferret 12/11/2022 2:09 PM
how big is the image?
2:10 PM
oh, cross posted, nm
Avatar
Hey im extremely new to digital forensics and in my first year of studies and i just wonder how hard is it to decrypt windows encrypted files?
Avatar
Avatar
El Schizo
Hey im extremely new to digital forensics and in my first year of studies and i just wonder how hard is it to decrypt windows encrypted files?
Digitalferret 12/11/2022 2:41 PM
dead easy
2:41 PM
if you have the PW of course
🤣 1
Avatar
As long as you have the key 🙂
Avatar
Digitalferret 12/11/2022 2:41 PM
^
Avatar
Otherwise that can make it a smidge trickier 😉
Avatar
Avatar
Digitalferret
if you have the PW of course
what is PW?
Avatar
Digitalferret 12/11/2022 2:47 PM
password / key / pass / etc
2:47 PM
L:P
2:47 PM
login:password
2:48 PM
it's why LEA/Govt trail Crooks in terms of security. u mess with a cartel and they want a "key" they dangle you over a pit of vipers. LE read you your rights
2:55 PM
If you’ve got the key, you can decrypt windows files relatively easily. What’s this for @El Schizo?
Avatar
I experienced an issue earlier where i had to reset my pc and forgot that my certificate/key wasn't backed up externally
2:57 PM
@Matt
2:57 PM
so i got to researching but came to nothing
2:57 PM
so it sparked an interest genereally speaking
Avatar
Ah okay, yeah if you don’t have it then you won’t be able to recover it
Avatar
yeah drew that conclusion sort off
Avatar
There are some attacks but they rely on small keyspaces or generally know factors about the key
2:58 PM
Hope it wasn’t for anything too important
Avatar
it was sentinementally important sadly (edited)
😔 1
2:58 PM
but nevertheless learned a lesson
Avatar
If it's a regular HDD and not an SSD, you might get lucky if you run a file recovery tool, if the old cert is not overwritten. It would be in %userprofile%\Application Data\Microsoft\SystemCertificates. The odds of that working are pretty low, but might be worth a try.
Avatar
Avatar
Sea9
If it's a regular HDD and not an SSD, you might get lucky if you run a file recovery tool, if the old cert is not overwritten. It would be in %userprofile%\Application Data\Microsoft\SystemCertificates. The odds of that working are pretty low, but might be worth a try.
sadly ssd was os drive
😢 1
Avatar
NotIronManBTW 12/11/2022 6:00 PM
anyone have a good general template for chain of custody and a forensic report?
Avatar
Do any of you folks use sed and awk regularly to manipulate/edit log files? I'm just wondering if these are tools that are part of people's toolkits
Avatar
yeah, I regularly use tools like grep, cut, wc, sort, uniq, sed, awk, etc (and additionally python, powershell) to massage data between tools or for quick insights
👍 1
8:15 AM
parallel is really nice also
Avatar
Does anyone know the cost for a 1 Year Axiom Dongle license for a Local PD? Getting the run around by Magnet representatives at the moment.
Avatar
Potentially dumb question. I need to recreate some scenarios for testing some artifacts found in an exam. Is there a repository with older still signed apple ios? Specifically looking for 15.4.1 for an iPhone 7 or 8 (not sure if they are model specific)
Avatar
Avatar
Palazar82
Potentially dumb question. I need to recreate some scenarios for testing some artifacts found in an exam. Is there a repository with older still signed apple ios? Specifically looking for 15.4.1 for an iPhone 7 or 8 (not sure if they are model specific)
Andrew Rathbun 12/12/2022 9:58 AM
#mobile-forensic-decoding might be your best bet?
👍 1
Avatar
Avatar
Tpalermo18
Does anyone know the cost for a 1 Year Axiom Dongle license for a Local PD? Getting the run around by Magnet representatives at the moment.
chriscone_ar 12/12/2022 10:00 AM
If you want to DM me some contact info, I'll get you in touch with someone who can provide the details you're looking for.
Avatar
What do you guys do with digital devices marked for destruction? Particularly cellphones. Previously I've been keeping them for tear downs and testing if needed, usually one of every model I can get my hands on. Since the days of ISP etc are kind of a foregone conculsion there's not much of a need for me to keep most android devices and so now I just keep Apple devices to use for spare parts incase I have to do a repair to get an extraction. All that being said, stuff is piling up and I need to clean house. Is hammering a screwdriver through the PCB and tossing in the bin sufficient in terms of not letting people personal info just go out in the wild or are there other ways of handling this?
😂 1
10:06 AM
I used to just send them down to be incinerated but they don't take them anymore for ...reasons 😅 (edited)
Avatar
Avatar
rayeh
yeah, I regularly use tools like grep, cut, wc, sort, uniq, sed, awk, etc (and additionally python, powershell) to massage data between tools or for quick insights
Thanks!
Avatar
Avatar
Beefhelmet
What do you guys do with digital devices marked for destruction? Particularly cellphones. Previously I've been keeping them for tear downs and testing if needed, usually one of every model I can get my hands on. Since the days of ISP etc are kind of a foregone conculsion there's not much of a need for me to keep most android devices and so now I just keep Apple devices to use for spare parts incase I have to do a repair to get an extraction. All that being said, stuff is piling up and I need to clean house. Is hammering a screwdriver through the PCB and tossing in the bin sufficient in terms of not letting people personal info just go out in the wild or are there other ways of handling this?
Andrew Rathbun 12/12/2022 11:20 AM
I used to keep them for JTAG/Chip-Off reference devices but the ones I couldn't use for those purposes, we wiped and gave to a local women's shelter (edited)
Avatar
Avatar
Palazar82
Potentially dumb question. I need to recreate some scenarios for testing some artifacts found in an exam. Is there a repository with older still signed apple ios? Specifically looking for 15.4.1 for an iPhone 7 or 8 (not sure if they are model specific)
Out of curiosity, which artifacts are you researching? Or which scenarios?
Avatar
Avatar
luis511_
Out of curiosity, which artifacts are you researching? Or which scenarios?
Restoring from a backup do certain cache files get transferred with it.
Avatar
Hello, does anyone have any experience in, or can point me to, resources that would assist me in working with Safeback? Many thanks in advance.
Avatar
Avatar
Beefhelmet
What do you guys do with digital devices marked for destruction? Particularly cellphones. Previously I've been keeping them for tear downs and testing if needed, usually one of every model I can get my hands on. Since the days of ISP etc are kind of a foregone conculsion there's not much of a need for me to keep most android devices and so now I just keep Apple devices to use for spare parts incase I have to do a repair to get an extraction. All that being said, stuff is piling up and I need to clean house. Is hammering a screwdriver through the PCB and tossing in the bin sufficient in terms of not letting people personal info just go out in the wild or are there other ways of handling this?
Keep for spare parts (screens, batteries...) then drill the NANDs
👍🏼 1
Avatar
Avatar
Beefhelmet
What do you guys do with digital devices marked for destruction? Particularly cellphones. Previously I've been keeping them for tear downs and testing if needed, usually one of every model I can get my hands on. Since the days of ISP etc are kind of a foregone conculsion there's not much of a need for me to keep most android devices and so now I just keep Apple devices to use for spare parts incase I have to do a repair to get an extraction. All that being said, stuff is piling up and I need to clean house. Is hammering a screwdriver through the PCB and tossing in the bin sufficient in terms of not letting people personal info just go out in the wild or are there other ways of handling this?
I used them as practice phones.
👍 1
Avatar
Hey guys! New to digital forensics and im in my first year. If you guys could of changed about your mindset or general choices before you started studying or working what would it be? I'd prefer responses to be sent in dms so i can keep the answers organised
📬 1
Avatar
P4perTrails 12/13/2022 2:54 AM
@Cellebrite Is it possible to get PA v8.1 anywhere on the MyCellebrite portal?
📫 1
Avatar
Heads up for anyone involved, in any way, with digital forensics: https://www.washingtonpost.com/world/2022/12/13/stan-swamy-hacked-bhima-koregaon/
Salute 1
Avatar
Any other LE in the US have contact info to Hotwire's legal division? I need to send them a subpoena. Several requests for contact through their customer service line have gone unreturned.
Avatar
Avatar
Leonidas
Any other LE in the US have contact info to Hotwire's legal division? I need to send them a subpoena. Several requests for contact through their customer service line have gone unreturned.
Andrew Rathbun 12/13/2022 9:25 AM
I imagine you checked @Search.org? Have you tried calling them?
Searchhdotorg 2
Avatar
Avatar
Andrew Rathbun
I imagine you checked @Search.org? Have you tried calling them?
Thank you so much. I'm not familiar Search.org. For future reference, how did you locate that on search.org? I searched for "hotwire" in the search bar at the top and received no results.
Avatar
Avatar
Leonidas
Thank you so much. I'm not familiar Search.org. For future reference, how did you locate that on search.org? I searched for "hotwire" in the search bar at the top and received no results.
https://www.search.org/resources/isp-list/ Also check out https://www.search.org/resources/search-investigative-and-forensic-toolbar/ The toolbar installs as an extension in your browser and is an awesome reference tool.
The ISP List is a database of Internet service and other online content providers that will help you get the information you need for your case. For each Internet Service Provider listed, you’ll find the legal contact information and instructions needed to serve subpoenas, court orders, and search warrants. The ISP List is a law … ISP List and L...
The SEARCH Investigative and Forensic Toolbar gives investigators and forensic examiners quick links for finding people, and finding out what they’re up to on Facebook, Twitter, and Instagram. It also includes resources for cell phone forensics, the backbone of any modern-day investigation. The Toolbar offers IP address lookup tools, wireless ho...
Avatar
Thank yall so much! This is a great resource. I'm going to send it out to all the other detectives in my unit as well.
Salute 2
Searchhdotorg 1
Avatar
Avatar
Leonidas
Thank you so much. I'm not familiar Search.org. For future reference, how did you locate that on search.org? I searched for "hotwire" in the search bar at the top and received no results.
Andrew Rathbun 12/13/2022 9:52 AM
Search.org under Resources, there's the ISP List. That's where you get this from
9:52 AM
@Leonidas I wrote a little bit about it here, too - https://aboutdfir.com/resources/preservation-letter-search-warrant-templates/
This section is a work in progress. This part of the site will contain template boilerplate language to include on various forms of legal process. It is highly advised to check with your local prosecutor and mind your local laws when serving legal process. These templates are purely meant to give you a running start […]
9:53 AM
Avatar
Does anyone have any sort of list of physical SIM cards and their associated carriers? Specifically MVNOs as the Big 3 clearly mark theirs. It's easy enough to see the carrier code in the ICCID, but for MVNOs if the name isn't on the SIM card, sometimes it's very tough or near impossible to figure it out. It's not a big deal but it drives me crazy sometimes.
Avatar
Avatar
JayB1rd
Does anyone have any sort of list of physical SIM cards and their associated carriers? Specifically MVNOs as the Big 3 clearly mark theirs. It's easy enough to see the carrier code in the ICCID, but for MVNOs if the name isn't on the SIM card, sometimes it's very tough or near impossible to figure it out. It's not a big deal but it drives me crazy sometimes.
You gents are great. Thanks again!
Avatar
Avatar
deepdive4n6
@Bclark Yup. Hope you like writing warrants. ; ) Message sent in PM. (edited)
My shop is in deep discussion if this can be investigated. Have you had success?
Avatar
Avatar
JayB1rd
Does anyone have any sort of list of physical SIM cards and their associated carriers? Specifically MVNOs as the Big 3 clearly mark theirs. It's easy enough to see the carrier code in the ICCID, but for MVNOs if the name isn't on the SIM card, sometimes it's very tough or near impossible to figure it out. It's not a big deal but it drives me crazy sometimes.
JLindmar (83AR) 12/13/2022 10:27 AM
I don't have that type of resource, the one's I typically encounter I just recognize now, but when trying to figure this exact thing out I first identify the parent carrier, then look at the list of MVNOs under that carrier, (https://en.wikipedia.org/wiki/List_of_United_States_mobile_virtual_network_operators), and then narrow it down from there.
Avatar
Avatar
JLindmar (83AR)
I don't have that type of resource, the one's I typically encounter I just recognize now, but when trying to figure this exact thing out I first identify the parent carrier, then look at the list of MVNOs under that carrier, (https://en.wikipedia.org/wiki/List_of_United_States_mobile_virtual_network_operators), and then narrow it down from there.
Yeah, that's where I start if I can't find anything with a Google image search. But without any other identifiers on the card, it's impossible to say which one it is. No biggie. Thanks for the input, though!
Avatar
Avatar
StarWail
My shop is in deep discussion if this can be investigated. Have you had success?
My understanding of the workflow is to start with a subpoena/CDR to the victim's phone number. Use that to identify the actual suspect phone number (not the displayed number) and work forward from there.
Avatar
Avatar
FullTang
My understanding of the workflow is to start with a subpoena/CDR to the victim's phone number. Use that to identify the actual suspect phone number (not the displayed number) and work forward from there.
Thank you, unfortunately Verizon provided us the spoofed number and an internal 172. IP address. We’re back to square 1.
Avatar
Avatar
JayB1rd
Yeah, that's where I start if I can't find anything with a Google image search. But without any other identifiers on the card, it's impossible to say which one it is. No biggie. Thanks for the input, though!
JLindmar (83AR) 12/13/2022 10:40 AM
This website (https://bestmvno.com/mvnos/) has carrier logos and colors that can be helpful.
👍 1
Avatar
Hey guys! New to digital forensics and im in my first year. If you guys could of changed about your mindset or general choices before you started studying or working what would it be? I'd prefer responses to be sent in dms so i can keep the answers organised
Avatar
can we make image file of a locked phone?
Avatar
Avatar
Ismail
can we make image file of a locked phone?
it depends
Avatar
Avatar
florus
it depends
in phone brand?
Avatar
@Magnet Forensics Can someone from your team pm me? I have a question about running axiom under win11 and about dongle activation
Avatar
Avatar
Ismail
in phone brand?
It depends, yes.
Avatar
Avatar
florus
It depends, yes.
for samsung?
Avatar
Avatar
Ismail
for samsung?
Same answer.
Avatar
Avatar
leifsoren
@Magnet Forensics Can someone from your team pm me? I have a question about running axiom under win11 and about dongle activation
chriscone_ar 12/14/2022 5:37 AM
Doing it now.
Avatar
Avatar
Ismail
for samsung?
You're going to need to be waaaay more precise. Model, SPL, OS etc.
Avatar
thaconnecter 12/14/2022 7:29 AM
@Cellebrite who could I contact regarding the SMS analysis more precisely Read status and read status time, thanks
Avatar
Avatar
thaconnecter
@Cellebrite who could I contact regarding the SMS analysis more precisely Read status and read status time, thanks
Do you mind sending details to our mailing list. A few of us are on there. Stump-us@cellebrite.com
Avatar
thaconnecter 12/14/2022 7:51 AM
Thanks Paul
Avatar
InfraGard, a program run by the U.S. Federal Bureau of Investigation (FBI) to build cyber and physical threat information sharing partnerships with the private sector, this week saw its database of contact information on more than 80,000 members go up…
Avatar
Does anyone have any thoughts or able point me in the right direction regarding legal policy with respect to how website scraping businesses stay in business (ie https://www.dexi.io/ https://www.zyte.com/) given many website terms prohibit scraping? (edited)
Avatar
It's not the first time if I remember correctly; LulzSec got them a few years ago too I believe
Avatar
@Magnet Forensics Hi I'm trying to export a portable case with Telegram info, but it keeps failing. Log indicates that it is having issues exporting sqlite aspects as the cause of failure. Is there a quick fix? Thanks
Avatar
turns out running in admin mode fixes it 😅
Avatar
Is anyone here a ninja on Cisco Secure Endpoint (amp)? 🙂
Avatar
Avatar
Arsenal
Heads up for anyone involved, in any way, with digital forensics: https://www.washingtonpost.com/world/2022/12/13/stan-swamy-hacked-bhima-koregaon/
And new evidence suggests those hackers may have collaborated with the police who investigated him.
Avatar
Avatar
Caleb
Does anyone have any thoughts or able point me in the right direction regarding legal policy with respect to how website scraping businesses stay in business (ie https://www.dexi.io/ https://www.zyte.com/) given many website terms prohibit scraping? (edited)
I'll help myself: this was a decent read: https://www.scraperapi.com/blog/is-web-scraping-legal/
Is web scraping legal? It depends on the data you’re scraping and how it’s used. Our updated 2021 guide helps ensure that your scraping is legal and ethical.
Avatar
Hey everyone. I've got what's going to be considered a noob question, but I don't know the answer. On a FFS extraction of an iPhone, the same picture (with matching hashes) is located in several places all over the phone such as DCIM, file cache, attachments, etc. Axiom recognizes them as different files, are they actually duplicates of the same file, or are they just symbolic links to thr original photo? I need to be able to explain why the image is in all of these different directories. Hope this makes sense.
Avatar
Avatar
Neon
Hey everyone. I've got what's going to be considered a noob question, but I don't know the answer. On a FFS extraction of an iPhone, the same picture (with matching hashes) is located in several places all over the phone such as DCIM, file cache, attachments, etc. Axiom recognizes them as different files, are they actually duplicates of the same file, or are they just symbolic links to thr original photo? I need to be able to explain why the image is in all of these different directories. Hope this makes sense.
ScottKjr3347 12/15/2022 1:08 PM
Here is an article that might help. It’s a long one, but most of them are going to be internal resource assets and are related to the full-sized asset. If the full-sized asset is in the local photo library, photos.SQLite can provide you with some insights. Attachments and plug-in kit cache files are are a little different. Tip-focus on and analyze one asset at a time. narrow your scope and it should allow you to answer some of the questions. If you look/analyze multiple assets at one time it could be more difficult to answer the question. https://theforensicscooter.com/2022/12/05/do-you-have-a-full-sized-assetor-just-a-thumbnail-did-optimized-iphone-storage-process-occur/
Avatar
Avatar
ScottKjr3347
Here is an article that might help. It’s a long one, but most of them are going to be internal resource assets and are related to the full-sized asset. If the full-sized asset is in the local photo library, photos.SQLite can provide you with some insights. Attachments and plug-in kit cache files are are a little different. Tip-focus on and analyze one asset at a time. narrow your scope and it should allow you to answer some of the questions. If you look/analyze multiple assets at one time it could be more difficult to answer the question. https://theforensicscooter.com/2022/12/05/do-you-have-a-full-sized-assetor-just-a-thumbnail-did-optimized-iphone-storage-process-occur/
I forgot about this article, thanks. My concern was the hash matching so it's an exact duplicate. But i think you are saying is they are references to the sql entry, is that about right?
Avatar
Does anyone have experience with the Identifier for Vendors (IDFV) on mobile devices and whether this can be used to identify and track a device? Thanks.
Avatar
Avatar
Neon
I forgot about this article, thanks. My concern was the hash matching so it's an exact duplicate. But i think you are saying is they are references to the sql entry, is that about right?
ScottKjr3347 12/15/2022 2:24 PM
Depends…you could have an attachment and a full-sized asset saved to local photo library DCIM that are a hash match. You could have an attachment and a shared with you linked asset that are a hash match. of course they are going to have different file names and file paths. In my opinion, they are hash match duplicates but that’s it. Even though these can be hash matches, in my opinion these are different files/assets. I don’t remove either of these as duplicates because they can show different user actions. Hash match = same content Hash match in different file paths = same file content but could indicate user actions The thumbnails assets, metadata assets, optimized assets and others will be related to a primary/original full-sized asset but will not have a matching hash. So it depends, again I focus on one asset at a time and try not to make generalizations when I’m analyzing media assets.
Avatar
Avatar
ScottKjr3347
Depends…you could have an attachment and a full-sized asset saved to local photo library DCIM that are a hash match. You could have an attachment and a shared with you linked asset that are a hash match. of course they are going to have different file names and file paths. In my opinion, they are hash match duplicates but that’s it. Even though these can be hash matches, in my opinion these are different files/assets. I don’t remove either of these as duplicates because they can show different user actions. Hash match = same content Hash match in different file paths = same file content but could indicate user actions The thumbnails assets, metadata assets, optimized assets and others will be related to a primary/original full-sized asset but will not have a matching hash. So it depends, again I focus on one asset at a time and try not to make generalizations when I’m analyzing media assets.
Thanks for your help. I understand what you are saying. It's in different places because of user interaction. That makes sense. I'll focus on one in particular and go from there.
Avatar
Avatar
Neon
Thanks for your help. I understand what you are saying. It's in different places because of user interaction. That makes sense. I'll focus on one in particular and go from there.
ScottKjr3347 12/15/2022 2:29 PM
Both system actions and user interactions.
Avatar
Avatar
ScottKjr3347
Both system actions and user interactions.
Gotcha. Thanks again
👍 1
Avatar
Hello. Anyone from @Oxygen Forensics around from a quick question?
Avatar
Avatar
Flavius
Hello. Anyone from @Oxygen Forensics around from a quick question?
Oxygen Forensics 12/16/2022 7:15 AM
Hello, sorry for the late reply. Please DM me how we can help you 🙂
Avatar
Anyone know if GK update was pushed out yet?
12:56 PM
Don’t want to head back to lab if I don’t have to
Avatar
Avatar
Ghosted
Anyone know if GK update was pushed out yet?
i believe it has been pushed yeah
👍 1
Avatar
Avatar
eamundson
Does anyone have experience with the Identifier for Vendors (IDFV) on mobile devices and whether this can be used to identify and track a device? Thanks.
You can read this : https://developer.apple.com/documentation/uikit/uidevice/1620059-identifierforvendor And https://www.adjust.com/glossary/idfv/ The second link says : " The value in this property remains the same while the app (or another app from the same vendor) is installed on the iOS device. The value changes if the user deletes all apps from that vendor from the device and then reinstalls one or more of them." Maybe, Apple can say you what account match with this id. As you're American you must surely have access, from Apple, to more data than I who am in France.
Do you know what IDFV is? Learn what does IDFV stand for and everything else you need to know about identifier for Vendor with Adjust.
Avatar
Original message was deleted or could not be loaded.
Assuming it is a string value, are you replacing one value or a list of values? (edited)
4:32 PM
I’d lean toward python. DM if you want to discuss a rough sketch of a script.
Avatar
Original message was deleted or could not be loaded.
I don't understand why you want to replace SQLITE database but if it helps you, I wrote a python script that transforms blob in text inside SQLite database: https://github.com/chpe1/blob_sqlite (edited)
Contribute to chpe1/blob_sqlite development by creating an account on GitHub.
Avatar
Ok. I understand better. Yes, with python you can do it. You parse each element to sqlite dB and you replace the data that matches with your regex. I let you to do it but if you need, I can help you, don't hesitate.
Avatar
However, when you're meeting a Blob type field, you will have to know what it is made of. If it's a plist, no worries, but if it's a mix of several formats it's going to be complicated. I'm thinking in particular of Snapchat, which stores the user's name and profile image in its field.
Avatar
Anyone very good at Excel formulas? 😄
Avatar
Anyone willing to ADMIT that? LOL
🤣 4
😂 1
Avatar
Avatar
Rob
Anyone very good at Excel formulas? 😄
JLindmar (83AR) 12/19/2022 7:11 AM
What are you trying to do?
Avatar
Calculate whether the sum of 5 rows is greater or equal to 32.6 and if less report "Negative Hours" and if greater report "Over Credit Limit"
Avatar
Avatar
Rob
Calculate whether the sum of 5 rows is greater or equal to 32.6 and if less report "Negative Hours" and if greater report "Over Credit Limit"
Digitalferret 12/19/2022 7:26 AM
uuh, i can't remember specifics, i'll have to check my work, but watch for using time format to calculate totals above 24hrs it's not the standard time format.
Salute 1
Avatar
numbersevenfan 12/19/2022 7:28 AM
Sorry if this has been asked a bunch, but can someone tell me what this blueish-white bar is in AXIOM? I don't recall seeing these until recently. @Magnet Forensics
Avatar
Avatar
Rob
Calculate whether the sum of 5 rows is greater or equal to 32.6 and if less report "Negative Hours" and if greater report "Over Credit Limit"
Digitalferret 12/19/2022 7:32 AM
yeh, here's the time function part of it https://www.wallstreetmojo.com/time-excel-function/
👍 1
Avatar
Avatar
Digitalferret
yeh, here's the time function part of it https://www.wallstreetmojo.com/time-excel-function/
Thanks, currently stumbling my way around this: =IF(SUMIFS(TIME(0,0,V474:V478),TIME(0,0,V474:V478),"=32.6")<32.6,"Negative Hours","Over Credit Limit")
😱 1
Avatar
Digitalferret 12/19/2022 7:36 AM
my issue was the usual excel check v manual mark one eyeball check as the numbers didn't seem right. i was totalling the seen hours for a local aircraft over the period of a year. much like bachelors engineering noites, you look at your work and it's "did i write this? who wrote this?" shock 🙂
7:38 AM
as if that wasn't enough i had to calculate BST against UTC too, so mere mortals understood
🤣 1
7:43 AM
found it! the "thing" was putting the h's in a sq bracket https://www.mrexcel.com/board/threads/difference-between-h-mm-and-h-mm-format.555898/ [h]:mm:ss shows the total number of hours, even if the number of hours is 24 or more. hh:mm:ss effectively only shows the excess hours over and above complete multiples of 24.
7:45 AM
dude explains it far better than i can. only a few responses to read
Avatar
@Cellebrite if an Examiner’s CCO and CCPA certifications expired this past September, can they just take them exam or do they have to repeat the courses?
Avatar
Avatar
Rob
Thanks, currently stumbling my way around this: =IF(SUMIFS(TIME(0,0,V474:V478),TIME(0,0,V474:V478),"=32.6")<32.6,"Negative Hours","Over Credit Limit")
thatboy_leo 12/19/2022 9:21 AM
Chatgpt could assist as well, you may know the specific formula you need for your desired output
Avatar
thatboy_leo 12/19/2022 9:29 AM
chatgpt has helped me with python scripts for generating numeric dictionary files, and having the output text files not exceed 200MB in size
👍 1
Avatar
Avatar
thatboy_leo
Chatgpt could assist as well, you may know the specific formula you need for your desired output
Will give it a go!
👍 1
Avatar
Hey! I have a pretty generic question. We are in the process of building some analysis towers and we're set on parts to buy, but we're still debating on the utility of the GPU in those towers. I know Passware and Hashcat uses GPUs to increassing decryption performance, and I also know @Magnet Forensics and @Cellebrite uses GPUs to increase processing time of picture and chat categorization. The question I have is how much upgrading that GPU should help? Do some of you guys have some kind of benchmarks? Like how could I justify the price going from a 3070 to a 3090 Ti? And do you know other uses for the GPUs other than what I mentionned? All the articles I find on the web are dating a lot! Thanks!
11:54 AM
I also looked into the KBs of Magnet and Cellebrite but the examples provided are pretty vague!
Avatar
Avatar
S Cote / SQ
Hey! I have a pretty generic question. We are in the process of building some analysis towers and we're set on parts to buy, but we're still debating on the utility of the GPU in those towers. I know Passware and Hashcat uses GPUs to increassing decryption performance, and I also know @Magnet Forensics and @Cellebrite uses GPUs to increase processing time of picture and chat categorization. The question I have is how much upgrading that GPU should help? Do some of you guys have some kind of benchmarks? Like how could I justify the price going from a 3070 to a 3090 Ti? And do you know other uses for the GPUs other than what I mentionned? All the articles I find on the web are dating a lot! Thanks!
JLindmar (83AR) 12/19/2022 11:59 AM
Here are some GPU benchmarks unrelated to forensic software performance: https://www.videocardbenchmark.net/ (edited)
Video Card Benchmarks - Over 1 Million Video Cards and 1200 Models Benchmarked and compared graphically - Updated with new system benchmarks daily!
Avatar
Avatar
S Cote / SQ
Hey! I have a pretty generic question. We are in the process of building some analysis towers and we're set on parts to buy, but we're still debating on the utility of the GPU in those towers. I know Passware and Hashcat uses GPUs to increassing decryption performance, and I also know @Magnet Forensics and @Cellebrite uses GPUs to increase processing time of picture and chat categorization. The question I have is how much upgrading that GPU should help? Do some of you guys have some kind of benchmarks? Like how could I justify the price going from a 3070 to a 3090 Ti? And do you know other uses for the GPUs other than what I mentionned? All the articles I find on the web are dating a lot! Thanks!
chriscone_ar 12/19/2022 12:19 PM
Even a modest NVIDIA-based GPU contributes huge performance gains for the Magnet.AI features that utilize them - like image categorization. The link @JLindmar (83AR) posted is a great resource, find a card that strikes the right price / performance balance and you're all set. I've got some comparison numbers, if you're interested.
Avatar
Avatar
chriscone_ar
Even a modest NVIDIA-based GPU contributes huge performance gains for the Magnet.AI features that utilize them - like image categorization. The link @JLindmar (83AR) posted is a great resource, find a card that strikes the right price / performance balance and you're all set. I've got some comparison numbers, if you're interested.
very interested! The main question I have is would those softwares benefit from higher end GPUs like a 3090 Ti instead of buying a 3070 for example. Thanks again
Avatar
Avatar
S Cote / SQ
very interested! The main question I have is would those softwares benefit from higher end GPUs like a 3090 Ti instead of buying a 3070 for example. Thanks again
chriscone_ar 12/19/2022 12:23 PM
Will they benefit? Sure. But diminishing returns and all. I think if you're looking for a solid discrete GPU to install in a general purpose workstation that you'll run a variety of software on, get something that offers high bang-for-your-buck. If it's a dedicated password cracking multi-GPU rig that you can smoke meat on in the lab while it's running, that's another story 🍖
Avatar
Avatar
chriscone_ar
Will they benefit? Sure. But diminishing returns and all. I think if you're looking for a solid discrete GPU to install in a general purpose workstation that you'll run a variety of software on, get something that offers high bang-for-your-buck. If it's a dedicated password cracking multi-GPU rig that you can smoke meat on in the lab while it's running, that's another story 🍖
Yeah we have dedicated CUBIX multi-GPU rigs for that 🙂 The GPU in the analysis towers would be mainly for very small Passware/Hashcat tasks and AI classification.
Avatar
Avatar
S Cote / SQ
very interested! The main question I have is would those softwares benefit from higher end GPUs like a 3090 Ti instead of buying a 3070 for example. Thanks again
chriscone_ar 12/19/2022 12:26 PM
Unscientific test - 135k images to categorize, no GPU 72+ minutes, NVIDA Quadro P1000 16 minutes. That was with an uncalibrated flux capacitor, but same settings, same data set, same system, just an A/B test with and without the GPU.
👍 1
Avatar
Avatar
chriscone_ar
Unscientific test - 135k images to categorize, no GPU 72+ minutes, NVIDA Quadro P1000 16 minutes. That was with an uncalibrated flux capacitor, but same settings, same data set, same system, just an A/B test with and without the GPU.
Very interesting. I suppose for media classification (obv we don'T do gaming on those towers), we would have a better bang for the buck with a Quadro instead of a GeForce
Avatar
Avatar
S Cote / SQ
Yeah we have dedicated CUBIX multi-GPU rigs for that 🙂 The GPU in the analysis towers would be mainly for very small Passware/Hashcat tasks and AI classification.
chriscone_ar 12/19/2022 12:33 PM
For what you're describing I'd say go for a high value GPU - something in the $300-ish range instead of top of the line and put the money saved towards more local flash-based storage that you can benefit from on every case.
Avatar
Avatar
chriscone_ar
For what you're describing I'd say go for a high value GPU - something in the $300-ish range instead of top of the line and put the money saved towards more local flash-based storage that you can benefit from on every case.
We've built a RAID 0 of 2x 4Tb NVMe Gen 4, running at 13 Gb/s read/write for cases, and we got massive speed increases for sure!
😎 1
Avatar
Random question, has anyone ever done an extraction on a leapfrog epic tablet 😆 I've got one that was submitted that has information relevant to the case stored on it. I've looked online and found it's running android 4.4 so I wanted to run out through cellebrite, but dev options seems to be locked down
Avatar
Avatar
S Cote / SQ
Hey! I have a pretty generic question. We are in the process of building some analysis towers and we're set on parts to buy, but we're still debating on the utility of the GPU in those towers. I know Passware and Hashcat uses GPUs to increassing decryption performance, and I also know @Magnet Forensics and @Cellebrite uses GPUs to increase processing time of picture and chat categorization. The question I have is how much upgrading that GPU should help? Do some of you guys have some kind of benchmarks? Like how could I justify the price going from a 3070 to a 3090 Ti? And do you know other uses for the GPUs other than what I mentionned? All the articles I find on the web are dating a lot! Thanks!
Looks like you got some great answers from others already but if you are looking for a deeper dive into exactly what hardware is best for your use case, let me know and I can help you work through it (edited)
Avatar
Avatar
chick3nman
Looks like you got some great answers from others already but if you are looking for a deeper dive into exactly what hardware is best for your use case, let me know and I can help you work through it (edited)
S Cote / SQ 12/19/2022 1:30 PM
I would love to! Feel free to contact me in private for not cluttering this thread, thanks!
👍 1
Avatar
Avatar
WRX_A_Lot
Random question, has anyone ever done an extraction on a leapfrog epic tablet 😆 I've got one that was submitted that has information relevant to the case stored on it. I've looked online and found it's running android 4.4 so I wanted to run out through cellebrite, but dev options seems to be locked down
We’ll be expecting a write up. 😂
Avatar
Avatar
thatboy_leo
Chatgpt could assist as well, you may know the specific formula you need for your desired output
Worked like a treat 👌
Salute 1
Avatar
Random question what’s the best forensic approach to analyzing .7z files? Currently there contained on a bit locker drive that I’ve encrypted behind a write blocker. It would freeze a ton behind imaged so I just used Tera copy with verification to get the files to my staging media. Kinda stumped what to do next as each .7z contains something different. Thought maybe create a AD1 image of the files to preserve the “original evidence” but just was opinions
Avatar
Avatar
maddie
Random question what’s the best forensic approach to analyzing .7z files? Currently there contained on a bit locker drive that I’ve encrypted behind a write blocker. It would freeze a ton behind imaged so I just used Tera copy with verification to get the files to my staging media. Kinda stumped what to do next as each .7z contains something different. Thought maybe create a AD1 image of the files to preserve the “original evidence” but just was opinions
JLindmar (83AR) 12/20/2022 6:52 AM
.7z is the extension for 7-Zip archives, use 7-Zip (https://www.7-zip.org/) or forensic software that can decompress these.
💯 2
Avatar
Is there someone from @Cellebrite and/or @Magnet Forensics AI team (photo classification) who could reach me please? I contacted your support teams and the questions I have aren't really answered, thanks!
Avatar
Avatar
S Cote / SQ
Is there someone from @Cellebrite and/or @Magnet Forensics AI team (photo classification) who could reach me please? I contacted your support teams and the questions I have aren't really answered, thanks!
Hello @S Cote / SQ I will send you a DM to get more info.
👍 1
Avatar
I was replying but got distracted and I don't see it now. But re: the GPS tracker carrier question. I've had luck looking up the FCC ID and getting carrier info from the device manufacture. Sometimes the manuals on fccid.io have clues about what carrier as well. Looks like that one is from Connected Holdings, which is now a Phillips Connet company.
Avatar
Avatar
S Cote / SQ
We've built a RAID 0 of 2x 4Tb NVMe Gen 4, running at 13 Gb/s read/write for cases, and we got massive speed increases for sure!
You got a screen shot of those read wrote speeds? I never understand why people use raid0 on nvme drives.
Avatar
Does anyone know if SANS will provide a copy of just the lab VM for a course I took? I'm hoping the email response would be favorable given that I'm an alumni of said course.. but I figured I ask before blasting off an email.
10:50 PM
I renewed the certification this year. Don't have access to the lab VM any more on their dashboard. Just looking for the lab VM
Avatar
Avatar
deetnutz
Does anyone know if SANS will provide a copy of just the lab VM for a course I took? I'm hoping the email response would be favorable given that I'm an alumni of said course.. but I figured I ask before blasting off an email.
randomaccess 12/21/2022 12:45 AM
I thought you get the isos when you renew but I'm not certain. I'd def email and say you didn't download it during the time you had access.
Avatar
3pil0gu3#112 12/21/2022 1:09 AM
I think it's all on the ISO usually with SANS they give you 50GB ISO files now when you get the course material. You download them, mount and extract what you need. Kind of sucks because I have to keep freeing up disk space everytime I do a SANS course now
Avatar
Avatar
randomaccess
I thought you get the isos when you renew but I'm not certain. I'd def email and say you didn't download it during the time you had access.
That's correct. I lost the iso file hence requesting a copy. Thanks
Avatar
Avatar
3pil0gu3#112
I think it's all on the ISO usually with SANS they give you 50GB ISO files now when you get the course material. You download them, mount and extract what you need. Kind of sucks because I have to keep freeing up disk space everytime I do a SANS course now
That's the exact reason why i couldn't find the image file lol.. (edited)
Avatar
Just gauging opinion. Would you consider the review of an axiom portable case/ufed reader etc to be forensic analysis?
Avatar
Avatar
Obi-Wan-IP
Just gauging opinion. Would you consider the review of an axiom portable case/ufed reader etc to be forensic analysis?
Is It Done Yet? 12/21/2022 2:53 AM
Opinion Alert Good question! I think this is a good place to start regarding this discussion:
"The concerns with clarity primarily centered on reports that lacked analysis. Reports were often solely the output of a forensic tool or tools, and customers were left to figure out what the data meant." (NIST, 2022, pg. 23) https://www.nist.gov/system/files/documents/2022/12/19/OSAC%20DE%20Quality%20Task%20Group%20Report_Dec2022.pdf
Given that many investigators who are not trained in digital forensics, or analysis are being expected to review and produce digital evidence to courts following an extraction of a device, there is most certainly concern in the international dialog about this exact issue. So to answer your question with another question: Are untrained investigators conducting forensic analysis of digital evidence, that is being produced in courts? Simply put, I think the answer is yes. But it has to have a defined scope, there is a basic element of "forensic analysis" - how to view, navigate and interpret a Cellebrite Reader report that is not officially taught, but is passed down through more experienced officers. When this aligns to the NPCC principles of digital evidence, the bar for competence is not particularly high in this regard. It should be expected that deeper and more intrusive levels of forensic analysis should be conducted by someone who is competent, e.g. a Digital Forensic Examiner who has advanced training and certification to underpin their competency. The fact that new officers and investigators are expected to simply understand digital evidence is beyond me, and presents a massive threat area... Is a review of an Axiom Portable Case / UFED Reader considered a forensic analysis, I would say yes. But with a big and underlying caveat.
(edited)
👍 1
Avatar
Avatar
Obi-Wan-IP
Just gauging opinion. Would you consider the review of an axiom portable case/ufed reader etc to be forensic analysis?
Yes, albeit we don't really utilise Portable Cases
👍 1
Avatar
Avatar
Obi-Wan-IP
Just gauging opinion. Would you consider the review of an axiom portable case/ufed reader etc to be forensic analysis?
Ross Donnelly 12/21/2022 4:22 AM
Assuming the question to be related to accreditation, I think when you read the FSR's definition of Digital Data Analysis it would be hard to argue that reviewing data in a portable case would NOT be analysis. The only wiggle room I could see was if you were performing the analysis, and the portable case was just your way of presenting the relevant data. If it's a data dump for someone else to analyse - I'd say that was analysis. https://www.gov.uk/government/consultations/forensic-science-draft-statutory-code-of-practice/code-of-practice-consultation-draft-accessible-version#fsa-definition--digital-data-analysis
👍 1
Avatar
Avatar
Ross Donnelly
Assuming the question to be related to accreditation, I think when you read the FSR's definition of Digital Data Analysis it would be hard to argue that reviewing data in a portable case would NOT be analysis. The only wiggle room I could see was if you were performing the analysis, and the portable case was just your way of presenting the relevant data. If it's a data dump for someone else to analyse - I'd say that was analysis. https://www.gov.uk/government/consultations/forensic-science-draft-statutory-code-of-practice/code-of-practice-consultation-draft-accessible-version#fsa-definition--digital-data-analysis
Yes this is exactly where I was going with this. Here we pass on various review packs from DF to investigators who have no training in digital forensics, they are tasked with reviewing the material and either sub exhibiting artefacts themselves or tagging and passing back to forensics for them to evidence. I know many forces that use this model so my concern is falling foul of the FSR codes as you refer to. In order to comply then all the investigators would have to be part of an accredited system (17025) in this case, which lets be honest is never going to happen😮
🤣 1
Avatar
Avatar
deetnutz
Does anyone know if SANS will provide a copy of just the lab VM for a course I took? I'm hoping the email response would be favorable given that I'm an alumni of said course.. but I figured I ask before blasting off an email.
In my experience they won't after your access to the initial class material has expired.
Avatar
Avatar
Obi-Wan-IP
Just gauging opinion. Would you consider the review of an axiom portable case/ufed reader etc to be forensic analysis?
JLindmar (83AR) 12/21/2022 9:15 AM
IMO, yes and no. It would depend on what data was added to the portable case and is it enough to verify a critical finding and/or make a determination about the existence of inculpable or exculpable information. When my lab returns a report document and/or portable case, we advise our user agency to review the information and to get back with us with any questions about how to interpret something, or whether additional information, outside the report(s), may be available. We also make it clear what we are NOT returning in a result and what will require additional work to produce. As far as investigators and/or attorneys reviewing DF results and then acting as a DF examiner when trying to interpret things, this is absolutely happening. Obviously, many things, a text message for example, may not require in-depth interpretation, but if trying to determine the accuracy of a location artifact, or what sequence of events led to an artifact being created, that would absolutely need the input from a DF examiner and shouldn't be left to an unqualified person to make those determinations. (edited)
💯 5
👍 4
🥂 1
🎯 1
🔥 1
Salute 1
Avatar
Prevention and detection of advanced cyber threats Author: Wolf Co-author: cybersecurity Community Date: 22-12-2022 Version 30.0 “Despite knowing that perfect security cannot be achieved, we strive to come as close to it as we can.” — Anonymous security researchers About the author For...
10:29 PM
if you have any thoughts or comments feel free to dm or put them on the Doc
Avatar
Vitaliy Mokosiy 12/22/2022 1:23 AM
Here is our curated list of digital forensics events in 2023. We'll keep it updated monthly or even more often. https://blog.atola.com/top-digital-forensic-conferences/
A comprehensive list of top digital forensics conferences in 2023. Check conference links, registration fees, locations. We keep it updated!
👍🏻 1
👍 2
Avatar
Avatar
Vitaliy Mokosiy
Here is our curated list of digital forensics events in 2023. We'll keep it updated monthly or even more often. https://blog.atola.com/top-digital-forensic-conferences/
Techno Security is moving from Myrtle Beach to Wilmington this year.
Avatar
Avatar
dcs453
Techno Security is moving from Myrtle Beach to Wilmington this year.
Vitaliy Mokosiy 12/22/2022 4:07 AM
Thank you! It's a typo, fixed it. TechnoSecurity is one of our favorite shows every year 🙂
Avatar
Avatar
Vitaliy Mokosiy
Here is our curated list of digital forensics events in 2023. We'll keep it updated monthly or even more often. https://blog.atola.com/top-digital-forensic-conferences/
melissa_at_amped 12/22/2022 6:43 AM
I think you might also have a typo for the NSA Annual Conference in June. I clicked the link and it says Grand Rapids, Michigan instead of Phoenix 🙂
👍 1
Avatar
Avatar
melissa_at_amped
I think you might also have a typo for the NSA Annual Conference in June. I clicked the link and it says Grand Rapids, Michigan instead of Phoenix 🙂
Vitaliy Mokosiy 12/22/2022 7:03 AM
Definitely 🙂 Thanks a lot Melissa!
8:48 AM
nobody commented yet
Avatar
Avatar
Wolf
nobody commented yet
Andrew Rathbun 12/22/2022 8:48 AM
For what?
8:49 AM
oh the ebook thing above?
8:49 AM
have been working on it for the last 2 years
8:49 AM
it recently started to take up steam
Avatar
Andrew Rathbun 12/22/2022 9:00 AM
it looks pretty comprehensive. You're welcome to post it in #dfir-open-source-projects since it appears you're open sourcing it in some way by sharing it like this
Avatar
Avatar
Wolf
):
You posted this earlier today, and it's over 180 pages long. Substantive comments might take awhile. I've been reading through some of it. Quite a history lesson so far.
Salute 1
Avatar
Thank you I am trying to write a non biase piece
9:30 AM
for educational purposes
Avatar
Andrew Rathbun 12/22/2022 2:59 PM
again, @Wolf if you don't want this to get lost in an active discussion channel, move it on over to #dfir-open-source-projects where it's a bit slower and technically a better channel to discuss this
Avatar
Thank you @Andrew Rathbun it's a honour 🙂
Avatar
Hey Guys, What tool you guys using for create image from Mac book storage. ? for the forensic.
Avatar
randomaccess 12/23/2022 2:00 AM
Digital Collector by Cellebrite
2:00 AM
although I've used Sumuri's tool before and that was fine too - at the time it was cheaper than DC but had fewer features
👍 1
Avatar
Avatar
randomaccess
although I've used Sumuri's tool before and that was fine too - at the time it was cheaper than DC but had fewer features
can i send DM ?
Avatar
randomaccess 12/23/2022 2:20 AM
sure
Avatar
Wishing all our friends here a Merry Christmas, onwards to the new year 🎉
💯 4
🎄 11
Avatar
Merry Christmas
💯 1
Avatar
kladblokje_88 12/25/2022 8:51 AM
@Hetzner_Online tell me why, please wtf is this
PepeLaugh 1
😵 1
Avatar
Merry Christmas everyone! Wishing all a wonderful holiday from my family to yours. 🎄
💯 1
🎄 6
Avatar
Is it recommended to work, exclusively within an VM environment for day-to-day acitivites (eg web surfing, opening email attachments etc) instead of on the Host Machine, to avoid Host Machine infection from Malware and Viruses ?
Avatar
Avatar
armin1855
Is it recommended to work, exclusively within an VM environment for day-to-day acitivites (eg web surfing, opening email attachments etc) instead of on the Host Machine, to avoid Host Machine infection from Malware and Viruses ?
MartinInDFIRland 12/26/2022 6:24 PM
depend on you
6:25 PM
do you know about the APT campaign that targeted 0days researchers?
6:27 PM
yup, my friend who using VM environment for reseach, each for persional activities (like what you say, twitter, opening email attachments etc)
6:27 PM
win p2o
6:27 PM
still hacked 😄
😮 1
😆 1
Avatar
Thanks for replying @MartinInDFIRland What sort of Malware was it and how did it occur ?
Avatar
Avatar
MartinInDFIRland
do you know about the APT campaign that targeted 0days researchers?
I think I may have heard that in Darknet Diaries https://www.youtube.com/watch?v=s6Q7SfI1bHE
Avatar
MartinInDFIRland 12/26/2022 7:36 PM
Details on an ongoing campaign, which we attribute to a government-backed entity based in North Korea, targeting security researchers working on vulnerability research and development.
😮 1
Avatar
I think this was mentioned in the Darknet Dairies. The Researcher was from Google's Project "X" and there was talk about North Korea
Avatar
Avatar
armin1855
Is it recommended to work, exclusively within an VM environment for day-to-day acitivites (eg web surfing, opening email attachments etc) instead of on the Host Machine, to avoid Host Machine infection from Malware and Viruses ?
no, really depends what you're doing though
Avatar
Avatar
armin1855
I think this was mentioned in the Darknet Dairies. The Researcher was from Google's Project "X" and there was talk about North Korea
MartinInDFIRland 12/27/2022 12:19 AM
oh looks like we are rambling a bit, back to your question
Avatar
Avatar
MartinInDFIRland
depend on you
MartinInDFIRland 12/27/2022 12:20 AM
this is my answer
Avatar
Someone from @Cellebrite available for a dm?
📬 1
Avatar
Hey guyes I was thinking how do we capture our printer packets like I am using a usb cable to send print packets so how will I capture them ? ( using wireshark might be 😐 ) .
Avatar
Avatar
SamuraiPwn
Hey guyes I was thinking how do we capture our printer packets like I am using a usb cable to send print packets so how will I capture them ? ( using wireshark might be 😐 ) .
Andrew Rathbun 12/27/2022 8:06 AM
https://www.hhdsoftware.com/ Could try one of these tools?
We are the software development company focused on providing reliable and high-performance solutions for software and hardware developers. For over 20 years we have been offering our customers the best data editing and Serial, USB, Network communications analysis software, as well as advanced virtual serial port tools.
Avatar
right some usb moniters hmm I will give them a try
Avatar
Hmm its working but I think I will need to learn it a bit really new to this kind of software 😄
👍 1
Avatar
Avatar
SamuraiPwn
Hmm its working but I think I will need to learn it a bit really new to this kind of software 😄
You can capture usb traffic with Wireshark also. https://wiki.wireshark.org/CaptureSetup/USB
Avatar
If I had a question about career advice where would be the best channel to ask?
Avatar
Avatar
voidBox
If I had a question about career advice where would be the best channel to ask?
Andrew Rathbun 12/27/2022 11:31 AM
#training-education-employment
Avatar
Avatar
Andrew Rathbun
#training-education-employment
Thanks!
Avatar
anyone familiar with what this format is for a file open via Internet Explorer? This is from LNK files: Internet Explorer (Homepage)\dctmctf:10857:20220810092351234_13087740681263661234:wss:lb
7:36 PM
I have a bunch of these they all start with dctmctf: and end with :wss:lb
Avatar
Does someone know why Event Log Explorer appears to show timestamps at the beginning of each hour? I'm using the forensic edition, Event Viewer shows the correct timestamps. I'm not too familiar with this software (edited)
Avatar
Avatar
CyberTend
I have a bunch of these they all start with dctmctf: and end with :wss:lb
JLindmar (83AR) 12/28/2022 7:08 AM
"Documentum" : https://www.opentext.com/products/documentum-platform Per https://documentum103.rssing.com/chan-59762241/latest-article9-live.php, it looks like "dctmctf" may stand for the "Documentum Content Transfer Framework"; "wss" should be the "WebSockets Secure" protocol, and "lb" looks to be the Documentum "Lockbox" password storage component.
Avatar
Avatar
JLindmar (83AR)
"Documentum" : https://www.opentext.com/products/documentum-platform Per https://documentum103.rssing.com/chan-59762241/latest-article9-live.php, it looks like "dctmctf" may stand for the "Documentum Content Transfer Framework"; "wss" should be the "WebSockets Secure" protocol, and "lb" looks to be the Documentum "Lockbox" password storage component.
Thanks so much
👍 1
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 12/28/2022 9:36 AM
9:37 AM
In this chapter, we conduct a forensic analysis of Amazon’s Kindle Fire HD and report on our findings.
9:38 AM
may not be a bad idea to ask in #mobile-forensic-extractions too since Kindle runs on Android
Avatar
Avatar
Andrew Rathbun
AccessInvestigations 12/28/2022 9:44 AM
Thank you sir, I think that might be the same document I found last night when I was doing some digging. Thanks
Avatar
Hi friends, one of the interview panel yesterday asked me one tricky question,. Q) Is mobile phone hashing (hash value generation ) possible? please help me with the details. Thank you.
Avatar
Well that depends, phone have some unique identifiers, and those identifiers could be hashed. But some of those identifiers could be altered resulting in a different hash, so in reality I’d say you need more detail about what part of the device.
Avatar
Avatar
Afeef
Hi friends, one of the interview panel yesterday asked me one tricky question,. Q) Is mobile phone hashing (hash value generation ) possible? please help me with the details. Thank you.
Not in the same sense that you can hash a "dead box" hard drive. If you hash the contents of a hard drive while doing dead box forensics it should remain the same every time. This is in contrast to phones which require you to power them on in order to extract them, and typically requires the tools to interact with the phone while extracting. This inherently means that the data on the phone is changing even as you are extracting it, so if you perform another extraction and compare the hash of the first to the hash of the second it will always be different.
💯 5
👍 2
Avatar
much better way to say it xD
Avatar
Avatar
Afeef
Hi friends, one of the interview panel yesterday asked me one tricky question,. Q) Is mobile phone hashing (hash value generation ) possible? please help me with the details. Thank you.
Greg Kutzbach 12/29/2022 3:04 PM
Mobile phones will change between collections, for the reasons noted above. However, a hash of the final archive file is useful to show that the data has not changed. This is useful for defending handling of evidence and chain of custody defense.
👍 1
Avatar
Avatar
Greg Kutzbach
Mobile phones will change between collections, for the reasons noted above. However, a hash of the final archive file is useful to show that the data has not changed. This is useful for defending handling of evidence and chain of custody defense.
Agreed and good summary of my answer. I like to think in analogies and to me phone hashing is like hashing an SSD
Avatar
Greg Kutzbach 12/29/2022 4:58 PM
I like the question from the interviewer. It tests to see if people actually know what the underlying technologies are doing.
👍 1
Avatar
Avatar
ryd3v
Well that depends, phone have some unique identifiers, and those identifiers could be hashed. But some of those identifiers could be altered resulting in a different hash, so in reality I’d say you need more detail about what part of the device.
Complete hashing they have asked. Hash value of entire data of any mobile phone
Avatar
Original message was deleted or could not be loaded.
Digitalferret 12/30/2022 4:55 AM
no, but have you tried the usual suspects?
Avatar
Original message was deleted or could not be loaded.
Digitalferret 12/30/2022 10:42 AM
check a known good one before you do. ie make sure the readings you get aren't somehow false
Avatar
Is there a specific section for OT networks or ICS/SCADA?
Avatar
Deleted User 12/30/2022 12:10 PM
Hello everyone, I have a simple question. If I am a student who is about to enter the military academy in crime investigation sciences, what book do you recommend for me, knowing that I do not have a background on it and I am bad at biology, but if you can add a book to help, I will be happy and thank you.
Avatar
Avatar
Deleted User
Hello everyone, I have a simple question. If I am a student who is about to enter the military academy in crime investigation sciences, what book do you recommend for me, knowing that I do not have a background on it and I am bad at biology, but if you can add a book to help, I will be happy and thank you.
Is It Done Yet? 12/30/2022 12:52 PM
Hi - Your question may be better placed in #training-education-employment, however, to be honest I am struggling to understand exactly what it is you are asking for here. This server is primarily focused on the digital forensics and cyber security sector? (edited)
Avatar
Avatar
Is It Done Yet?
Hi - Your question may be better placed in #training-education-employment, however, to be honest I am struggling to understand exactly what it is you are asking for here. This server is primarily focused on the digital forensics and cyber security sector? (edited)
Deleted User 12/30/2022 1:09 PM
yes i know sir my question about books teach you how to think like detective or digtel forensics detective
Avatar
Despite directions given by the special court to NIA to provide all the evidence, only 40% has been shared, says advocate for some of the accused in the case
6:07 PM
Well example of how digital forensic scientists can give investigate in scientific way. Kudoos to USA Arsenal forensic firm
Avatar
Anyone knows if a playstations logs information what network it got connected to? So: a ps4 gets stolen, suspect connects it to his own wifi-network to play or set it up. Can i, as owner, in my playstation account, see what network (ip) my ps4 gets connected to. I am not a gamer myself, so i have no idea wat options i have.
Avatar
Avatar
florus
Anyone knows if a playstations logs information what network it got connected to? So: a ps4 gets stolen, suspect connects it to his own wifi-network to play or set it up. Can i, as owner, in my playstation account, see what network (ip) my ps4 gets connected to. I am not a gamer myself, so i have no idea wat options i have.
randomaccess 12/31/2022 3:09 AM
I highly doubt you as the account owner can tell. But, Sony may. Do an account takeout and see if your serial number is associated with your account in some way. Then if someone else logged into their account on your PS then sony could pull the account details for that and provide it to LE
👍 1
Avatar
I had a question recently I wanna shop around and see what the consensus is Is it easier to make high paying wages as a red team or blue team? At 5 years of experience as a pen tester or security analyst who would expect higher salaries?
Avatar
Can I start with the inevitable? It depends.... In my experience it has tended to be higher in the pentest world. But then again, the ones I usually see are on the higher end of the skill and experience spectrum.
Avatar
Avatar
conf1ck3r
I had a question recently I wanna shop around and see what the consensus is Is it easier to make high paying wages as a red team or blue team? At 5 years of experience as a pen tester or security analyst who would expect higher salaries?
Digitalferret 1/1/2023 2:07 AM
Red Team, obv, but that may not be the case if he wants to stay legal 🤣
Avatar
Problem is to get the 5 year salary job, you need 20 years experience and a PHD
Avatar
NotIronManBTW 1/2/2023 10:17 AM
So I did this sentinel one ctf and got sent a hint for next step that has some binary on it. Ive tried very hard to figure it out someone else wanna look over it? if you like puzzles you may wanna try
Avatar
itsdrinkingthewater 1/2/2023 8:53 PM
someone remind me of the infosec mastadon server? for au/oceania?
Avatar
I know the main one is https://infosec.exchange 🙂
A Mastodon instance for info/cyber security-minded people.
Avatar
@Magnet Forensics can anyone do me a solid and hit me up with a DL link to the latest Axiom. The guy with the portal login in off and it's a mild emergency. Thanks in advance.
Avatar
Avatar
Majeeko
@Magnet Forensics can anyone do me a solid and hit me up with a DL link to the latest Axiom. The guy with the portal login in off and it's a mild emergency. Thanks in advance.
chriscone_ar 1/3/2023 1:30 AM
Sent you the link
Avatar
"what unique problems that different file systems pose in the digital forensic process?" Can anybody provide resources to this question?
Avatar
Avatar
maxabo
"what unique problems that different file systems pose in the digital forensic process?" Can anybody provide resources to this question?
For example and to get the ball rolling, what are the differences between NTFS & FAT32?
Avatar
Avatar
maxabo
"what unique problems that different file systems pose in the digital forensic process?" Can anybody provide resources to this question?
SubnetterOne 1/3/2023 11:09 AM
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics. - GitHub - mikeroyal/Digital-Forensics-Guide: Dig...
Avatar
Avatar
maxabo
"what unique problems that different file systems pose in the digital forensic process?" Can anybody provide resources to this question?
Ross Donnelly 1/3/2023 2:16 PM
Digital forensic investigations require that file metadata are interpreted correctly. In this paper we focus on the timestamps of the exFAT file syste…
Avatar
ShinDaddison 1/3/2023 5:53 PM
Does anyone know any good map-related software tools or forensic tools that allow you to enter a series of coordinates/locations, pick a central location, and the output is a map showing how the distance between each coordinate from the central location? Asking for a potential case.
Avatar
Avatar
ShinDaddison
Does anyone know any good map-related software tools or forensic tools that allow you to enter a series of coordinates/locations, pick a central location, and the output is a map showing how the distance between each coordinate from the central location? Asking for a potential case.
Andrew Rathbun 1/3/2023 6:47 PM
Google Earth?
Avatar
Avatar
ShinDaddison
Does anyone know any good map-related software tools or forensic tools that allow you to enter a series of coordinates/locations, pick a central location, and the output is a map showing how the distance between each coordinate from the central location? Asking for a potential case.
Greg Kutzbach 1/3/2023 9:19 PM
How to calculate distance in Excel from Latitude and Longitude. Download sample file with code base on Vincenty's formula..
👀 1
Avatar
Avatar
K23
We've got a process @Artea, I'll DM.
Hi, that's an old question but if you still have a process that you can share I am also interested 🤗
Avatar
Is Ryan Benson from unfurl active here? Edit: found him. @Ryan Benson (edited)
Avatar
DFE Travis 1/4/2023 6:12 AM
Anyone around that can help me with an Apple return? I'm following to guide for using powershell to extract the logs but having trouble getting p7zip to install via powershell as the instructions say
Avatar
DFE Travis 1/4/2023 6:31 AM
Disregard, running update on ubuntu then doing the install command worked
Avatar
Did someone encounter till now problems booting a macOS (Big Sur in my case) in VirtualBox after enabling FileVault? Encountered this problem twice till now.
Avatar
Good day, all! We are in the design phases of a new lab. We are going to do a faraday room or enclosure. Our contractor picked out the following 8x8 enclosure. https://shop.faradaydefense.com/custom-modular-hardwall-enclosures/. The other option is to build a room/enclosure. So, is there anyone on here with experience with either this specific company/enclosure, or do you have any experience with a builder in the Rocky Mountain Region? Thanks in advance!
Custom Modular Hardwall Faraday Enclosure Room. RF/EMI Shielding Chamber. Block Signal. Custom Built Enclosures.
Avatar
My understanding about faraday "rooms" is that they are very expensive and need to be serviced/recertified regularly... An agency local to me has a fantastic faraday room but they basically constructed their building around it, retrofitting it wasn't apparently an option. Good luck! Certainly a lot nicer than a cramped faraday box with way too many phones inside of it.
Avatar
Good Morning, Could anyone tell me the prices of the CCPA course with cellebrite, CERT-F With cellebrite and the CCOF course with cellebrite please. Thank you in advance
Avatar
Avatar
Catherine
Good Morning, Could anyone tell me the prices of the CCPA course with cellebrite, CERT-F With cellebrite and the CCOF course with cellebrite please. Thank you in advance
Digitalferret 1/5/2023 3:51 AM
@Cellebrite ^
Avatar
Avatar
Catherine
Good Morning, Could anyone tell me the prices of the CCPA course with cellebrite, CERT-F With cellebrite and the CCOF course with cellebrite please. Thank you in advance
do you mind sending me a dm, and i can place you in touch with our Training team.
Avatar
DFE Travis 1/5/2023 7:16 AM
Anyone see Sextortion: The Hidden Pandemic? https://sextortionfilm.com/
With unique, unrestricted access to government files, victim families, and investigators, Sextortion: The Hidden Pandemic documentary uncovers the hidden world of online enticement and exploitation of children--and what we can do to stop it.
👍 1
Avatar
Beefhelmet 1/5/2023 9:46 AM
@Cellebrite My supervisor was contacted by a sales rep by phone claiming to be from cellebrite. The inquiry was over a software renewal, which was odd that they contacted my Lt. instead of me, their usual point of contact at least over the last few years. The invoice they sent was from a company called Carahsoft which I've never heard of. Can you confirm if this is a valid quote? (edited)
Avatar
Forensic@tor 1/5/2023 9:49 AM
Carahoft is a government clearing house and is legit for cellebrite. Likely they reached out instead of cellebrite
Avatar
Avatar
Forensic@tor
Carahoft is a government clearing house and is legit for cellebrite. Likely they reached out instead of cellebrite
Beefhelmet 1/5/2023 9:54 AM
So effectively like an authorized dealer? (edited)
Avatar
Avatar
Beefhelmet
So effectively like an authorized dealer? (edited)
Yes. If you need to validate the source I would Google Carahsoft and contact them via the number on their website. I go through Carahsoft to renew all of my Cellebrite licenses and I just recently got a quote for additional Cellebrite licenses/training through them.
Avatar
Avatar
FullTang
Yes. If you need to validate the source I would Google Carahsoft and contact them via the number on their website. I go through Carahsoft to renew all of my Cellebrite licenses and I just recently got a quote for additional Cellebrite licenses/training through them.
copy that
Avatar
Forensic@tor 1/5/2023 11:50 AM
@Beefhelmet not a reseller per SE. A clearing house is used to allow for government sectors to use POs or other billing practices. Prevents sellers from jumping through hoops that some agencies require.
Avatar
@Magnet Forensics Rumor has it Axiom supports the FATX file system to allow for the parsing of an Xbox 360 hard drive. Can you confirm? I am getting the No known file system found when I try to add the .E01 to a new case.
Avatar
Avatar
FullTang
@Magnet Forensics Rumor has it Axiom supports the FATX file system to allow for the parsing of an Xbox 360 hard drive. Can you confirm? I am getting the No known file system found when I try to add the .E01 to a new case.
chriscone_ar 1/6/2023 7:45 AM
FATX - not specifically, but using the option for sector level search will likely recover items of interest.
Avatar
Avatar
chriscone_ar
FATX - not specifically, but using the option for sector level search will likely recover items of interest.
Trying it now, thank you!
Avatar
Avatar
FullTang
Trying it now, thank you!
chriscone_ar 1/6/2023 7:51 AM
Glad to do it, let me know if you run into any issues.
Avatar
Has anyone come across IPv6 EUI-64? More specifically, the ability to query MAC addresses from a service provider? I need to do some tested but wanted to check first as this might already be solved... Curious if the RFC (4291) pulls the actual MAC or the MAC provided by the OS (i.e. the MAC randomization).
Avatar
Avatar
chriscone_ar
Glad to do it, let me know if you run into any issues.
It worked like a charm! Axiom primarily parsed out web history and images, two beneficial types of artifacts in a CSAM case. There were even images of the user(s) using Kinect. Thanks!
👏 1
Avatar
Avatar
FullTang
It worked like a charm! Axiom primarily parsed out web history and images, two beneficial types of artifacts in a CSAM case. There were even images of the user(s) using Kinect. Thanks!
chriscone_ar 1/6/2023 9:52 AM
That’s great to hear! Glad it worked out.
Avatar
Avatar
FullTang
It worked like a charm! Axiom primarily parsed out web history and images, two beneficial types of artifacts in a CSAM case. There were even images of the user(s) using Kinect. Thanks!
Did you choose the Xbox specific artifacts as well when processing?
9:53 AM
I can't remember the name of it but there's a website one for 360
Avatar
Avatar
Rob
Did you choose the Xbox specific artifacts as well when processing?
I selected all artifacts it allowed me to select. It didn't take that long, and yes I did get XBox 360 Internet Explorer Favorites/Recent/Featured Items artifacts in the web history.
Avatar
That's the one!
👍 1
Avatar
@everyone Anyone know how to change your email address in discord if you no longer have access to that email anymore?
Avatar
Avatar
adam2817
@everyone Anyone know how to change your email address in discord if you no longer have access to that email anymore?
Andrew Rathbun 1/6/2023 6:45 PM
Everyone is a user here btw lol. Maybe contact Discord support?
👍 1
Avatar
Avatar
Andrew Rathbun
Everyone is a user here btw lol. Maybe contact Discord support?
Digitalferret 1/7/2023 2:51 AM
user? but I've been clean for ... uuh nm
Avatar
Howdy gents. If I had a file that I wanted to run, but before running I changed the name of that file, to one that was already existing on my computer, ran it, deleted it, and put the file that I named it to in its place, can I detect that name-change somehow?
Avatar
Avatar
LFR
Howdy gents. If I had a file that I wanted to run, but before running I changed the name of that file, to one that was already existing on my computer, ran it, deleted it, and put the file that I named it to in its place, can I detect that name-change somehow?
What file system?
Avatar
Avatar
char|i3
What file system?
good ol NTFS
6:19 PM
i was looking thru EZTools but prob missed it
Avatar
Avatar
LFR
good ol NTFS
Love it. I will just assume Recycle Bin has been addressed. Depending on your timeline there may be evidence in the USNJournal for file name and other changes. You may also see entries in the master file table $MFT that could help with the deleted file information . I’d also check the $I30 for the folder of interest to see what was there related to the files you are investigating.
A_love_aaa 2
Avatar
straight legend! Time for research
Avatar
Avatar
LFR
Howdy gents. If I had a file that I wanted to run, but before running I changed the name of that file, to one that was already existing on my computer, ran it, deleted it, and put the file that I named it to in its place, can I detect that name-change somehow?
randomaccess 1/8/2023 9:08 PM
Usn journal tracking the MFT entry and sequence number
9:09 PM
If it's tracking the entire period you'd see that all quite clearly. Especially when combined with recycle bin and program exeuction artefacts
Avatar
Avatar
randomaccess
If it's tracking the entire period you'd see that all quite clearly. Especially when combined with recycle bin and program exeuction artefacts
turns out that this exe disables itself from being found in: Prefetch User Assist msmp Recycle Bin & USN Journal So this is gonna be a fun one (edited)
10:15 AM
But maybe I can use the data from the exe that the professor is renaming the file to to see if it was modified. If not there we go
Avatar
Are the hexordia (I doubt I spelled that correctly) courses any good (specifically in mobile forensics, which I have 0 experience in)
👍 1
Avatar
The free courses I have taken with them are pretty decent, but I have not taken any of their paid courses.
👍🏻 1
Avatar
Avatar
codyp915
Are the hexordia (I doubt I spelled that correctly) courses any good (specifically in mobile forensics, which I have 0 experience in)
randomaccess 1/9/2023 6:28 PM
ask @b1n2h3x 🙂
Avatar
Avatar
randomaccess
ask @b1n2h3x 🙂
Will do, I am just a student and even the lower cost certs are outside of my budget range, but also want to be a well rounded examiner when done with my degree
Avatar
To any watching Law Enforcement in the US, can you talk about CellHawk, if you use it, and is it helpful?
Avatar
Avatar
LFR
To any watching Law Enforcement in the US, can you talk about CellHawk, if you use it, and is it helpful?
Manual parsing of CDR returns is possible, but any automated tool that assists in that process be it CellHawk or NightHawk saves hours and allows for data to be compiled in a way that would be very difficult to do manually even with hours of time invested in it.
Avatar
Avatar
codyp915
Will do, I am just a student and even the lower cost certs are outside of my budget range, but also want to be a well rounded examiner when done with my degree
I am a little biased to answer here. But the reviews from students for the live and On Demand have been quite good. Happy to share them with you. I have been teaching mobile forensics for 6 years at GMU with very high ratings before I started this course. Please try some of the free classes to get a feel. Feedback always welcome!
Avatar
4JSN6🇬🇧 1/10/2023 3:22 AM
For a Samsung handset.. Do we know the main difference between DCIM/.thumbnails and gallery3d/cache? I understand that the cache directory is used for the gallery app to improve performance. However, does the gallery app not also use thumbnails directory? Any input greatly appreciated.
Avatar
anyone of you who got a good overview / diagram of the general order of typical activities that are performed at machine startup / windows 10 boot / user login to display the order and influence of having applications registered as different types of services, in a users autostart, the OS performing file system operations without user interaction etc? to support visualizing that there are things happening on a system even before a user enters his credentials / to differentiate what is happening at boot and before / after user logon. (edited)
Avatar
Avatar
LFR
To any watching Law Enforcement in the US, can you talk about CellHawk, if you use it, and is it helpful?
Another option is Zetx that was purchased by LexisNexis, just to add another comparison.
Avatar
nicastronaut 1/10/2023 9:54 AM
What are folks using for case notes these days - personal notes, not a full fledged case management system, I don't need that. I'm sick of OneNote, been giving me too many issues over there years. Preferably something that doesn't require a cloud sync..
Avatar
I'm very low tech... notepad++
Avatar
nicastronaut 1/10/2023 9:55 AM
classic lol
Avatar
I have a python script that builds my directory structure the same way for every case and then produces a .txt file inside with headers for the various item numbers... it's obviously not tracked or timestamped so that is a deficiency
9:57 AM
I have tried monolith notes in the past, it seems like a really cool tool (and it's free), I just found it to be too many extra steps and I went back to txt.
9:58 AM
Free forensic software provided by the team at Monolith or others in the digital forensics community.
Avatar
nicastronaut 1/10/2023 9:59 AM
Nice, I'll give that a look.
10:02 AM
Seems nifty for quick stuff, one thing it's missing I'd love though is to have a template to re-use for each case. And ability to have tables. (edited)
Avatar
Same here. Notepad++ and markdown files. That way, if I switch to something else, I can convert them to a different format.
Avatar
LincolnLandForensics 1/10/2023 1:31 PM
Does anyone have a custom carver for encase (.e01) files for FTK, or know of another vendor who carves them out? Exterro (FTK) says it’s “outside of the scope of support to write them for you”. It’s that level of support that makes me want to evaluate another vendor. PhotoRec can recover them and even has C code to do it: (https://git.cgsecurity.org/cgit/testdisk/tree/src/file_e01.c) The footer seems to be the hardest part to match. <snip>  Header (hex) : 455646090D0AFF Footer (text): next.............Õÿ.....................................................«.v.
Avatar
Avatar
LincolnLandForensics
Does anyone have a custom carver for encase (.e01) files for FTK, or know of another vendor who carves them out? Exterro (FTK) says it’s “outside of the scope of support to write them for you”. It’s that level of support that makes me want to evaluate another vendor. PhotoRec can recover them and even has C code to do it: (https://git.cgsecurity.org/cgit/testdisk/tree/src/file_e01.c) The footer seems to be the hardest part to match. <snip>  Header (hex) : 455646090D0AFF Footer (text): next.............Õÿ.....................................................«.v.
randomaccess 1/10/2023 1:43 PM
Probably outside the scope of all vendors...
1:44 PM
You may need to figure out whether there's a footer for each chunk.
1:45 PM
Does each segment have that footer?
Avatar
Avatar
randomaccess
Does each segment have that footer?
DeeFIR 🇦🇺 1/10/2023 2:39 PM
I'm looking at an E01 set (27 chunks), only consistent thing I can see in the footer for each segment/chunk is a next indicator for all segments apart from the ending segment. E01 (next - FF FF) E03 (next - FF FF) E04 (next - FD FF) E27 (done) Could you carve for start/non-ending segments using the 45 56 46 / EVF header, and the 6E 65 78 74 footer (next + 72 bytes?), then re-carve for ending segments using the same header, and the 64 6F 6E 65 footer (done + 72 bytes?) Edit: oops, should've read your comment carefully, you've already mentioned this 😄 looks like if you modify any data after the next/done marker, the image itself won't appear valid. I've only tried to open it in FTK, I haven't tried x-ways/axiom yet.. YMMV. (edited)
Avatar
Avatar
nicastronaut
Seems nifty for quick stuff, one thing it's missing I'd love though is to have a template to re-use for each case. And ability to have tables. (edited)
Checkout Cherrytree https://www.giuspen.net/cherrytree/ (edited)
Avatar
Avatar
randomaccess
Probably outside the scope of all vendors...
Greg Kutzbach 1/10/2023 8:09 PM
Magnet allows custom file types. Both carving and parsed. Can be read as hex header, and parsed with python.
Avatar
Avatar
Greg Kutzbach
Magnet allows custom file types. Both carving and parsed. Can be read as hex header, and parsed with python.
randomaccess 1/10/2023 8:16 PM
Sure - ftk will likely allow you to add your own carving logic as well From the OP post their response is that they won't write them for you as part of their support agreement
Avatar
DeeFIR 🇦🇺 1/10/2023 8:25 PM
Does AXIOM or X-Ways allow you to import/inspect a segmented E01 image with incomplete/invalid footer data? FTK imager fails to recognise the image if any data after next/done is modified.
Avatar
Avatar
DeeFIR 🇦🇺
Does AXIOM or X-Ways allow you to import/inspect a segmented E01 image with incomplete/invalid footer data? FTK imager fails to recognise the image if any data after next/done is modified.
Greg Kutzbach 1/10/2023 8:59 PM
Ftk imager is really picky about that. If you want an easy way to mount, use recon imager. Once mounted, you can throw any program at it. To answer your question.. yes, axiom and xways both can deal with completely fubar’d e01’s.
9:00 PM
For truly fubar’d e01’s where the partition tables are either corrupted, hidden, nested, or inside virtual disks, I’ve also had great luck with R-Studio.
Avatar
Avatar
randomaccess
Sure - ftk will likely allow you to add your own carving logic as well From the OP post their response is that they won't write them for you as part of their support agreement
Greg Kutzbach 1/10/2023 9:02 PM
I missed that. Custom carving sounds like a special services contract. Gotta pay the coder, no matter the company. In axiom, it’s pretty easy to write custom carving and artifacts in house. Not sure how easy ftk makes it to write them in house.
Avatar
Avatar
LincolnLandForensics
Does anyone have a custom carver for encase (.e01) files for FTK, or know of another vendor who carves them out? Exterro (FTK) says it’s “outside of the scope of support to write them for you”. It’s that level of support that makes me want to evaluate another vendor. PhotoRec can recover them and even has C code to do it: (https://git.cgsecurity.org/cgit/testdisk/tree/src/file_e01.c) The footer seems to be the hardest part to match. <snip>  Header (hex) : 455646090D0AFF Footer (text): next.............Õÿ.....................................................«.v.
DeeFIR 🇦🇺 1/10/2023 9:10 PM
I just tried a few things. 1 - modified data after the next/done footer in each E01 segment, still mounts in AIM. 2 - zeroed out all data after the next/done footer in each segment, still mounts in AIM. 3 - removed all data after the next/done footer in each segment, also mounts in AIM. So going by that logic, you should only have to match the footer (up to next/done) and it'll mount fine in AIM.
9:11 PM
Thanks for the pointer @Greg Kutzbach
👍 2
Avatar
Avatar
DeeFIR 🇦🇺
I just tried a few things. 1 - modified data after the next/done footer in each E01 segment, still mounts in AIM. 2 - zeroed out all data after the next/done footer in each segment, still mounts in AIM. 3 - removed all data after the next/done footer in each segment, also mounts in AIM. So going by that logic, you should only have to match the footer (up to next/done) and it'll mount fine in AIM.
Greg Kutzbach 1/10/2023 10:30 PM
Cool experimenting! Thank You
Avatar
Yuri Gubanov (Belkasoft) 1/11/2023 1:50 AM
Belkasoft allows custom carving as well, both header+max size or header+footer, you can also import kff/scalpel sets
Avatar
Ross Donnelly 1/11/2023 4:30 AM
Given the general size of E01s, there is probably a good chance they will be fragmented (unless they were put onto a sterile drive) - in which case carving is going to be a dead end.
Avatar
Does anyone know any free tools that can be used to decrypt a bitlockered drive with a clear text Volume Master Key?
Avatar
Avatar
lockbee
Does anyone know any free tools that can be used to decrypt a bitlockered drive with a clear text Volume Master Key?
Use @Arsenal image mounter
👍 2
Avatar
Avatar
lockbee
Does anyone know any free tools that can be used to decrypt a bitlockered drive with a clear text Volume Master Key?
ForensicDad#0001 1/11/2023 8:42 AM
And, it goes without saying, Windows will do it if you know the PIN/password. Connecting the drive to any modern Windows machine should give you the option to decrypt it or at least open it in an unencrypted state.
Avatar
Avatar
Greg Kutzbach
I missed that. Custom carving sounds like a special services contract. Gotta pay the coder, no matter the company. In axiom, it’s pretty easy to write custom carving and artifacts in house. Not sure how easy ftk makes it to write them in house.
ForensicDad#0001 1/11/2023 8:50 AM
My experience with FTK is that building a carver isn't hard, but their not very smart. For my money, I like X-Ways. Many carvers and adding new carvers is very easy--they are stored in a TSV file and easy to modify and add.
Avatar
Nanotech Norseman 1/11/2023 11:43 AM
Hey all. Long time lurker, but I wanted to pop in with a quick question. Anyone set up a self-hosted case management system for local casework? I'm looking to implement something for our lab on our air-gapped network for managing workflow, something similar to a kanban board. I'm relatively proficient in Docker (self-taught homelab experience). Something like a FOSS-y (and understandably less enriched) version of Magnet ATLAS or xBit
11:45 AM
I've played with Wekan and Mattermost (Wekan at home, Mattermost as a trial setup), but I'm trying to find something that I can tinker with enough that our lab can use
Avatar
LincolnLandForensics 1/11/2023 11:45 AM
Probably not what you were looking for @Nanotech Norseman but I ended up writing our case tracker in python (forensicsReporter.exe) https://github.com/LincolnLandForensics/HodgePodge. I'd also like to find the same thing. but this was better than nothing. It also writes my reports, which I like.
Avatar
Nanotech Norseman 1/11/2023 11:46 AM
That's pretty dope, not gonna lie. I'm fairly proficient in Python, so this may lead me on a wild goose chase (I love wild goose chases). I'll check it out, thanks for the recommendation! (If you get a fork, it was probably me)
Avatar
LincolnLandForensics 1/11/2023 11:48 AM
@Nanotech Norseman Fork away. The google translater script worked great and helped us make our case by translating thousands of lines of Chinese. Geek away.
Avatar
Nanotech Norseman 1/11/2023 11:48 AM
Oh hell yeah! Thanks again man 😄
👍 1
Avatar
Avatar
DeeFIR 🇦🇺
Thanks for the pointer @Greg Kutzbach
LincolnLandForensics 1/11/2023 11:54 AM
Wow thanks for the research. I think I could write an FTK custom carver if I don't have to worry about the 72 characters after next/done.
Avatar
I'm using Timeline Explorer to view the output of MFT parsing by MFTecmd. Is it better to sort by the entry number or file creation time when trying to analyze files created around the same time?
Avatar
Others can chime in here. But I think you kind of answered your own question. If you are looking for files created around the same time, then creation time would be what you would focus on and use as your pivot point.
👆 1
Avatar
Avatar
Villano
I'm using Timeline Explorer to view the output of MFT parsing by MFTecmd. Is it better to sort by the entry number or file creation time when trying to analyze files created around the same time?
Andrew Rathbun 1/11/2023 12:12 PM
sort on file creation time
Avatar
hub
Avatar
Thank you
Avatar
Avatar
dsplice
Others can chime in here. But I think you kind of answered your own question. If you are looking for files created around the same time, then creation time would be what you would focus on and use as your pivot point.
I wasn't sure because Entry numbers are supposed to be sequential but when I sort by creation time the entry numbers can be all over the place.
Avatar
Avatar
Villano
I wasn't sure because Entry numbers are supposed to be sequential but when I sort by creation time the entry numbers can be all over the place.
MFT entries are capable of being reused. I haven't dug too much into it but found this https://andreafortuna.org/2018/06/04/using-mft-anomalies-to-spot-suspicious-files-in-forensic-analysis
A typical NTFS filesystem contains hundreds of thousands of files. Each file has its own $MFT entry, and all $MFT entries are given a sequential address starting from zero, zero being the $MFT entry itself. Each MFT entry is addressed using an 6 byte number, additionally the preceding 2 bytes contains the MFT Sequence number, these two numbers c...
Avatar
Avatar
dsplice
MFT entries are capable of being reused. I haven't dug too much into it but found this https://andreafortuna.org/2018/06/04/using-mft-anomalies-to-spot-suspicious-files-in-forensic-analysis
Yes that's true. Thanks.
Avatar
Avatar
Villano
Yes that's true. Thanks.
Interestingly, you can use the different 'sequentiallity' of the results to some conclusions (like there were files deleted in a directory or such). TMYK
Avatar
Avatar
Nanotech Norseman
I've played with Wekan and Mattermost (Wekan at home, Mattermost as a trial setup), but I'm trying to find something that I can tinker with enough that our lab can use
Mattermost is great but I wouldn’t say it’s really case management, more of a self-hosted slack
Avatar
Avatar
Matt
Mattermost is great but I wouldn’t say it’s really case management, more of a self-hosted slack
Nanotech Norseman 1/11/2023 12:57 PM
Yeah, that's somewhat what I came to after fiddling with it a bit. I was hoping to expand more on the kanban style for workflow, but with some kind of case management and ownership aspect. I did find one that I'm still working on building out by Aam-digital, though it's more for NGO casework. I'm wondering if I can modify it extensively to get what I want out of it, but I'm hesitating due to the work involved in such a project.
Avatar
Yeah you really want something you can fire up and crack on with.
Avatar
Nanotech Norseman 1/11/2023 1:03 PM
That's pretty much what I'm looking for, but I doubt I'll find something that easy XD. A coworker discussed xBit a good bit, their previous lab used that extensively. I'm trying to skirt the line of staying within budget and still getting a full amount of usefulness in what we have (and free is great for internal use -- if it works). Still, I appreciate the response 😄 I'll keep researching. If I find a solution (or modify a solution enough to be viable), I'll post back in here at a later point
👌 1
Avatar
Say I was a poor student with forensics homework, where would I go and ask for help? (edited)
Avatar
Avatar
Narnuk
Say I was a poor student with forensics homework, where would I go and ask for help? (edited)
Google?
Avatar
yupyup
Avatar
Avatar
Rob
Google?
yet she remains a cruel mistress
Avatar
Avatar
Narnuk
yet she remains a cruel mistress
are you looking for a learning platform or the answers to your quiz questions?
Avatar
what would be helpful for me would be a workflow for autopsy
1:34 PM
as I have many 60+ GB of data and no real plan of how to go through them
1:35 PM
i like to approach my cases with an objective in mind so i don't get lost in the sauce. what questions are you looking to answer with the data?
Avatar
there are a total of 7 ppl whose name and username we need to find
Avatar
what kind of data do you have available?
Avatar
4 total data sources, a recovered pc, recovered server, 2 recovered sticks
Avatar
you've got the goldmine then! have you dug through autopsy videos at all? THM walk-throughs, cases, etc? youtube will be your best friend on this
Avatar
I'm somewhat familiar with the software, but in my hubris I think most things are self explanatory in the software, I have not seen any specific walkthroughs
1:39 PM
what are THM walkthroughs?
1:40 PM
I google, nvrmind
kekw 1
Avatar
it's a little self explanatory, once you've got an idea of what you're looking for. are you familiar with the data sources themselves ( not the software )? (edited)
1:42 PM
sometimes finding answers to your questions are as simple as a string search, which i think autopsy supports? super rusty with it, been a while since i've used it
Avatar
I think its not supposed to be super difficult, one list I found so far has been encrypted however
1:43 PM
but the password was just hidden in a txt document autopsy found easily
pepepray 1
1:45 PM
whatchama callit when you hide a string in a random file
Avatar
sounds like it should be fairly easy then. if you're interested in learning forensics methodology, i always like to recommend 13cubed's intro to forensics course: https://www.youtube.com/playlist?list=PLlv3b9B16ZadqDQH0lTRO4kqn2P1g9Mve you can easily pick & choose the videos you think you'll need here (such as the introduction to usb detective)
this 1
Avatar
thank you
Avatar
Hello all. Hope you all had a good start for the new year 🙂 .... Wish to ask if there is anyone who can recognize or can suggest what to use to recognize the model and make of a car pls.
Avatar
Avatar
Aikon
Hello all. Hope you all had a good start for the new year 🙂 .... Wish to ask if there is anyone who can recognize or can suggest what to use to recognize the model and make of a car pls.
Digitalferret 1/12/2023 8:32 AM
Avatar
Avatar
Digitalferret
thanks!
Avatar
Hi all. Does anyone here know any resources that could help me in preparing for INE's eCDFP? Thanks in Advance for the lead.
Avatar
Avatar
Aikon
Hello all. Hope you all had a good start for the new year 🙂 .... Wish to ask if there is anyone who can recognize or can suggest what to use to recognize the model and make of a car pls.
If the computers fail and you know any cops, you probably know a cop who’s pretty good at it too! Lots of them are car nerds who also look at tons of crappy images and videos of suspect vehicles (unfortunately it’s not my wheelhouse) (edited)
🔥 1
Avatar
I got excepted into Akron yesterday for Cyber Forensics ladies and gentlemen, transferring from Kent State
👏 6
8:13 PM
Also, does anyone know what certifications are offered through their program?
Avatar
Could someone update my role to Private Sector please? Can't seem to access role assignment channel anymore and I have been employed since joining this group. Thanks very much.
👍 1
Avatar
Thank you Matt
Salute 1
Avatar
Avatar
holly
If the computers fail and you know any cops, you probably know a cop who’s pretty good at it too! Lots of them are car nerds who also look at tons of crappy images and videos of suspect vehicles (unfortunately it’s not my wheelhouse) (edited)
Greg Kutzbach 1/13/2023 1:03 PM
Alethe Denis, in one of her OSINT workshops stressed that there is no replacement for the human eye. Tools are great, but can’t beat scrolling on screen and a practiced eye.
💯 2
Avatar
Is there any known method to decrypt static data from modern gaming consoles (Playstation 3, 4, and 5 / Xbox One S)? The only method for analysis would be to use an HDMI splitter and recording software after putting a cloned drive back into the console keeping the original drive (or an .E01 of the original drive) as evidence, right?
Avatar
Along the same lines, what would be the method for examining a Nintendo Switch other than a pure manual examination? It looks like a fairly simple process to change settings in the Switch to allow for browsing the internet, so it is a possible platform for doing all those criminal things. (edited)
Avatar
Avatar
FullTang
Is there any known method to decrypt static data from modern gaming consoles (Playstation 3, 4, and 5 / Xbox One S)? The only method for analysis would be to use an HDMI splitter and recording software after putting a cloned drive back into the console keeping the original drive (or an .E01 of the original drive) as evidence, right?
Andrew Rathbun 1/13/2023 4:25 PM
Can't speak from experience but that seems pretty reasonable and best effort, in my eyes
👍 1
Avatar
Avatar
FullTang
Is there any known method to decrypt static data from modern gaming consoles (Playstation 3, 4, and 5 / Xbox One S)? The only method for analysis would be to use an HDMI splitter and recording software after putting a cloned drive back into the console keeping the original drive (or an .E01 of the original drive) as evidence, right?
I don't think any of the tools can parse the proprietary file system of PlayStation's. I've always done a manual examination. Chat data is generally online also so it needs to be connected to the web. I think PS3s had the data on the machine. Web history is probably the only other useful thing. Although a colleague did have a case where CSE material was being downloaded to an Xbox. Can't remember what one though
👍 1
Avatar
Avatar
FullTang
Is there any known method to decrypt static data from modern gaming consoles (Playstation 3, 4, and 5 / Xbox One S)? The only method for analysis would be to use an HDMI splitter and recording software after putting a cloned drive back into the console keeping the original drive (or an .E01 of the original drive) as evidence, right?
we've even down lower tech of using a video camera capturing the tv screen. all you can do at this point.
Avatar
Avatar
DCSO
we've even down lower tech of using a video camera capturing the tv screen. all you can do at this point.
I was thinking about doing that. Considering my department’s resources I think I’ll capture it with a normal Axon body camera.
Avatar
Avatar
FullTang
Is there any known method to decrypt static data from modern gaming consoles (Playstation 3, 4, and 5 / Xbox One S)? The only method for analysis would be to use an HDMI splitter and recording software after putting a cloned drive back into the console keeping the original drive (or an .E01 of the original drive) as evidence, right?
Stormphoenix 1/16/2023 6:46 AM
Ps4 user area can be decrypted with a chip dump, but you arent likely to get much more than via screenshot (perhaps a bit more internet history)
👍 1
Avatar
Avatar
Andrew Rathbun
Can't speak from experience but that seems pretty reasonable and best effort, in my eyes
I know if you jailbreak/root the device you can sparse through the file system or even edit it, as far as getting useful information from a dump or cloning the drive, it gets a bit more sticky.
Avatar
Does anyone know anything about criminalip.io or security.criminalip.com
7:32 AM
I have a fresh build of ubuntu on a new VPS i ordered, And there are multiple outgoing requests to there
Avatar
Avatar
B74
Does anyone know anything about criminalip.io or security.criminalip.com
Do a dns search
7:33 AM
They have a search systemm.. Surely this isn't legit.
7:34 AM
7:34 AM
We offer CTI analysis featuring recent cybersecurity vulnerabilities and threats, and also other latest updates and useful guidelines about Criminal IP.
Avatar
I guess I am missing something. Is this a box for school or legit web address you need information on?
7:36 AM
Or dns address I should say
Avatar
I am concerned that there are requests TO this organisation on a fresh ubuntu installation.
7:37 AM
Is this something installed by ubuntu or the ISP..
7:38 AM
Think it poses a bit of a security risk to have your entire systems port mappings, services running, IP's etc etc sent to a third party on a fresh ubuntu install. Sounds like something installed by the host
7:39 AM
It may be something installed by the ISP to ensure that the VPS's are compliant with their terms perhaps but i've never seen this before.
Avatar
Stormphoenix 1/16/2023 7:40 AM
What process is making the requests
Avatar
I wasn't able to capture it.
Avatar
Avatar
Stormphoenix
What process is making the requests
^
7:42 AM
Give me a bit I’m looking for any info
7:44 AM
No dns records whatsoever, site is unreachable. Unfortunately without further info I can’t tell you what exactly is up.
Avatar
Which site is unreachable?
Avatar
Security.criminalip.Io is not a valid address. And there’s no dns information on it. Not even censys has information regarding it.
Avatar
security.criminalip.com
7:45 AM
But then their main website is criminalip.io
Avatar
I apologize one sec.
7:48 AM
7:48 AM
7:50 AM
7:50 AM
It’s a AWS bucket
7:50 AM
Interesting
7:52 AM
Where did you get the Ubuntu install?
7:58 AM
Not sure what else I can say brotha. Good luck
Avatar
Has anyone done an extraction on an Oculus 2 recently?
Avatar
Avatar
FullTang
Along the same lines, what would be the method for examining a Nintendo Switch other than a pure manual examination? It looks like a fairly simple process to change settings in the Switch to allow for browsing the internet, so it is a possible platform for doing all those criminal things. (edited)
Quick update to this. I found a white paper giving an overview of a forensic analysis of a Switch, but it appears to require the use of PIN outs to force the switch to sideload software. Here is some of the data that can be forensically extracted: Connected Displays Last 50 Error Codes Save Time & Game Title Access Time & Game Title 300 users last played with Last Boot Time & Power State Changes .JPG,.MP4 &.PNG screenshots with Timestamps Birth Date, Email, Gender & Location MAC Addresses, NAT, Passwords & SSIDs https://www.sciencedirect.com/science/article/pii/S2666281721000044 On a lower level (and more practical for most purposes) the DNS settings are saved on a per access point basis and will even save if changed from automatic to manual DNS settings. Examining the saved WiFi settings to see if they have been altered to allow the Switch to connect to switchbru DNS (45.55.142.122 under manual DNS settings) should indicate if the user was frequently using the Switch to browse the internet to see if a more advanced analysis is needed.
The Nintendo Switch is a popular handheld gaming console that is used for a variety of purposes. The most common is that of gaming, however, there are…
👍 2
Avatar
Avatar
arforensic
I made a cable (USB<->SERIAL) and connected it to the TKSTAR TK-905 GPS Tracker. After inserting the SIM card (turning on the device) I get only Bootloader information through Putty. Maybe someone has more experience and knows if it is possible to get additional information, IMEI, device configuration settings, etc. Video from my test https://youtu.be/_HhW97Owf5U
Did you get further with this device?
Avatar
@ctr I find some working AT commands. However, this did not significantly benefit the research 😦 I wanted to make a full memory copy (dump) but unsuccessfully. (edited)
Avatar
Anyone familiar with Facebook Messenger records. Wondering if they can provide historical communication logs between users. I have the devices from suspect and victim however they have both deleted the communications. I do have screen shots taken by someone involved in the case however I would like if possible to obtain the logs showing the communication took place between the two accounts.
Avatar
@ManishDTS Depends what youre bruteforcing. Think a bit outside the box. "Okay Im bruteforcing a websites index, Im going to use a directory specific wordlist", understand you can use any wordlist but some are not optimized for what you are doing. Rockyou.txt is one of the largest around but, thats used when no other wordlist is available and I desperately need the credentials. Kali comes preinstalled with a variety of wordlists in /usr/share/wordlists/ if youre simulating an APT, take all words from employees social medias, etc. There is no outline to tell you to "do this and you get this result"
Avatar
Avatar
Rock3t
@ManishDTS Depends what youre bruteforcing. Think a bit outside the box. "Okay Im bruteforcing a websites index, Im going to use a directory specific wordlist", understand you can use any wordlist but some are not optimized for what you are doing. Rockyou.txt is one of the largest around but, thats used when no other wordlist is available and I desperately need the credentials. Kali comes preinstalled with a variety of wordlists in /usr/share/wordlists/ if youre simulating an APT, take all words from employees social medias, etc. There is no outline to tell you to "do this and you get this result"
got it
Avatar
Avatar
ManishDTS
got it
I hope I was able to help 🙂
Avatar
kmacdonald1565 1/19/2023 9:57 AM
anyone have recommendations on standing/counter height work benches or desks? looking for something that isnt crazy priced that is better on my back than leaning over a card table to take things apart and examine them
Avatar
Avatar
kmacdonald1565
anyone have recommendations on standing/counter height work benches or desks? looking for something that isnt crazy priced that is better on my back than leaning over a card table to take things apart and examine them
Remember when you had a reliable and attractive storage solution? The WEN Work Bench provides organization, power, and light. What more could you want? This spacious works station measures in at 62 inches tall with a 25 by 48-inch footprint. The included pegboard combined with the two 20 by 18-in...
Avatar
kmacdonald1565 1/19/2023 10:06 AM
in true government fashion, i dont know my own budget so i was trying to be semi-moderate
😂 1
10:06 AM
i need to take measurements to see what will fit but that sort of thing should work. just looking for options and opinions
Avatar
I don't have the space or need for that type of workbench right now, but I figure a heavy-duty, workshop-style bench with all the storage and lighting would be excellent for any DF lab.
Avatar
kmacdonald1565 1/19/2023 10:16 AM
we just got a new building repurposed building. a bunch of desks and offices for people, but the lab space is ...not ready... but at least we got a semi-green light to start that (edited)
👍 1
Avatar
Deleted User 1/19/2023 10:54 AM
Hello EVERYONE - Hope all is well. I wanted to ask a very general question. All input/info is welcome. Salute I've been working as a Forensic Analyst for a few years now, most of my experience came from working for one of the big 4. Eventually I got good enough to start doing forensics work on the side. Any work I do on the side is mostly done for cash. I have started a company but I have not marketed myself in anyway. Looking for some advice on how to better market myself and get more solidified as a private contractor in DFIR. Looking for advice, personal branding ideas/websites or really just any thoughts on the matter. THANKS 💟
Avatar
Avatar
kmacdonald1565
we just got a new building repurposed building. a bunch of desks and offices for people, but the lab space is ...not ready... but at least we got a semi-green light to start that (edited)
chriscone_ar 1/19/2023 11:33 AM
In a prior role, I had good luck ordering from: https://benchdepot.com/ and https://uline.com plenty of size/configuration options with anti-static surfaces, electrical outlets, lighting, parts bins, etc. Probably a bit higher priced than what @FullTang suggested, but they held up well to a bunch of cops breaking evidence apart on them 😁
Supplier of standard formica and solid maple workbenches. Also cleanroom, static control (ESD) and chemical resistant workbenches.
Uline stocks over 38,500 shipping boxes, packing materials, warehouse supplies, material handling and more. Same day shipping for cardboard boxes, plastic bags, janitorial, retail and shipping supplies.
👌 1
Avatar
kmacdonald1565 1/20/2023 5:48 AM
thank you for your suggestions. i will be putting a few packages together to try and meet my budgeted amount
Avatar
Hey friends. Just wanted to share that we released Another free tool - Hexordia Sysdiagnose Log Toolkit - the both does extraction of Sysdiagnose Logs and can run our Syslog Monitor Tool (it is built in) for live monitoring. More info here: https://www.hexordia.com/blog-1-1/introducing-the-hexordia-sysdiagnose-log-toolkit
Introducing the Hexordia Sysdiagnose Log Toolkit
👏 3
👍 1
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 1/20/2023 8:08 AM
#training-education-employment
Avatar
@Andrew Rathbun got it didn’t see that chat I’ll move that their. Thanks
Avatar
Andrew Rathbun 1/20/2023 9:49 AM
Magnet Forensics Inc. (the “ Company ” or “ Magnet ”) (TSX: MAGT), developer of digital investigation solutions for more than 4,000 enterprises and public safety organizations, is pleased to announce that it has entered into a definitive arrangement agreement (the “ Arrangement Agreement ”) with Morpheus Purchaser Inc. (the “ Purchaser ”), a new...
👀 11
👏 3
Avatar
cosmicthrill 1/22/2023 11:55 AM
Thanks for sharing this, I’ve signed up to the newsletter from this link. Good to see Dstl are still sharing info. I was at CAST briefly as a student!
👍 1
Avatar
What exactly is this hardware? And what's this software doing?
Avatar
Avatar
malrker
What exactly is this hardware? And what's this software doing?
DeeFIR 🇦🇺 1/23/2023 12:29 AM
Looks like a script or something is processing some kind of bin dump (maybe an image of the OS or image of the firmware running on that device) and it's pulled the admin password? As for the device, a network access control device? https://support.trustwave.com/kb/KnowledgebaseArticle20749.aspx
Trustwave helps businesses fight cybercrime, protect data and reduce security risk through cloud and managed security services, integrated technologies and a team of consultants, ethical hackers and security researchers.
Avatar
So what's the superior file system out side FAT and NTFS
Avatar
Avatar
Cougra
So what's the superior file system out side FAT and NTFS
Digitalferret 1/23/2023 5:16 AM
the one that suits the job at hand
this 1
Avatar
Yuri Gubanov (Belkasoft) 1/23/2023 7:18 AM
Hi everyone, our free on-demand SQLite forensics course is now opened and will be offered for the next 30 days. You can find more details at https://www.linkedin.com/posts/yurigubanov_dfir-digitalforensics-mobileforensics-activity-7023303305330122752-9GFF
The SQLite Forensics course by Belkasoft is now officially open! The course is free (terms apply) to the followers of our LinkedIn group. You can follow up and…
Avatar
@Yuri Gubanov (Belkasoft) any other way to follow the course without following you on LinkedIn, i dont have an account and to create a spam one just for this seems to miss its cause? (edited)
Avatar
Avatar
florus
@Yuri Gubanov (Belkasoft) any other way to follow the course without following you on LinkedIn, i dont have an account and to create a spam one just for this seems to miss its cause? (edited)
Yuri Gubanov (Belkasoft) 1/23/2023 8:54 AM
Yes, you can follow us on Twitter or Facebook. DM me if you do not have any.
📩 3
Avatar
Anyone able to spare 30-60 mins reviewing a framework I am developing as a quick evaluation platform for DF tools using remote agents? Feedback is via answering 6 questions about the framework (e.g. have I missed anything :-)) (part of a PhD project) (edited)
Avatar
anyone know how to deal with sesparse vmdks?
Avatar
Hello, this is a pretty generic question. In general, do there exist laws that prevent developing opensource DFIR solutions using DFIR tactics previously only used by the government? Assuming I didn't sign any NDA or NCA? (edited)
Avatar
Avatar
open
Hello, this is a pretty generic question. In general, do there exist laws that prevent developing opensource DFIR solutions using DFIR tactics previously only used by the government? Assuming I didn't sign any NDA or NCA? (edited)
Andrew Rathbun 1/24/2023 5:34 PM
Depends on the country you live in, I'd imagine. I can only speak (but not about this particular issue) for US and it looks like you're not from the US, correct? (edited)
Avatar
Well, in the US context for example. Let's say I heard from someone that the government uses some tactics for DFIR that aren't that popular within opensource space. Am I allowed to develop an opensource tool of the similar functionality ?
Avatar
Avatar
Andrew Rathbun
Depends on the country you live in, I'd imagine. I can only speak (but not about this particular issue) for US and it looks like you're not from the US, correct? (edited)
To be frank, I think only a lawyer would be to answer this definitively, but in general, is it ok or not ok
Avatar
Avatar
open
To be frank, I think only a lawyer would be to answer this definitively, but in general, is it ok or not ok
Andrew Rathbun 1/24/2023 5:40 PM
I mean, unless an idea is trademarked, copyrighted, classified or what have you, someone who works in the government and someone who doesn't can come up with the same idea and it's not illegal so 🤷‍♂️ but I'm not a lawyer so take it with a pound of salt (edited)
👍 1
Avatar
Avatar
RichardA
Anyone able to spare 30-60 mins reviewing a framework I am developing as a quick evaluation platform for DF tools using remote agents? Feedback is via answering 6 questions about the framework (e.g. have I missed anything :-)) (part of a PhD project) (edited)
Andrew Rathbun 1/24/2023 7:11 PM
maybe #dfir-open-source-projects ?
Avatar
Avatar
Andrew Rathbun
maybe #dfir-open-source-projects ?
Thanks Andrew
Avatar
Avatar
Cougra
So what's the superior file system out side FAT and NTFS
btrfs or xfs if you don’t care about data integrity 😀
Avatar
Avatar
ryd3v
btrfs or xfs if you don’t care about data integrity 😀
Digitalferret 1/25/2023 2:06 AM
FS wars, flame bait, lol 😂
🤣 1
Avatar
Hello, does anyone know why when receiving some details about the billing info from Google, some credit cards are shown with full details and some of them not (it just appears the date when they were added to GPay). It is because they were deleted/disassociated from the app?
Avatar
Are there documented cases of an attacker abusing IMAP append? For example, an attacker with IMAP access to a victim’s email account inserting themselves into an ongoing conversation by appending (technically, replacing) an existing message?
Avatar
Avatar
Arsenal
Are there documented cases of an attacker abusing IMAP append? For example, an attacker with IMAP access to a victim’s email account inserting themselves into an ongoing conversation by appending (technically, replacing) an existing message?
randomaccess 1/25/2023 4:17 AM
Sounds like a question for @Metaspike
👍 1
Avatar
Don't know where to post this, but if someone has an LG Smart TV can you please test something. I know you can insert a USB drive and can browse images/videos. When you do this it appears to make a folder called "LG Smart TV\TN" which contains .tn3 thumbnails of the images/videos. I am curious of two things: 1. if you have the USB plugged in and browse the internet, can you download images to the USB? 2. if you unplug the thumbdrive and plug it back in to browse the images, does it update the timestamps on thumbnail files?
Avatar
Has anyone encountered the issue where your USBs all crap out at random? Seems to have something to do with a Cellebrite USB driver. I get the following Windows Event Log: Event 0, hcmon Detected unrecognized usb driver \driver\cbrtfltr
Avatar
hi, does any know a solutions to acquire web pages and social networ evidence or to preserve a webpage for example
Avatar
Avatar
mdogilvie
hi, does any know a solutions to acquire web pages and social networ evidence or to preserve a webpage for example
👍🏻 1
Avatar
thanks yes i tries it but does not works as i expect, it only takes snapshots and i need to download content of what i can
Avatar
Where do we post questions about CDR Mapping? Mobile forensic decoding?
Avatar
Avatar
mdogilvie
hi, does any know a solutions to acquire web pages and social networ evidence or to preserve a webpage for example
You can check out FAW (its a forensics software for acquisition and preservation of website and social network data)
Avatar
Avatar
mdogilvie
hi, does any know a solutions to acquire web pages and social networ evidence or to preserve a webpage for example
X1 Social Discovery is the industry-leading solution for anyone who needs to collect and search data from social networks and the internet
Avatar
Thanks i looked both and they dont get what i need, i need support for p2p and download ftp and sftp sites
Avatar
Avatar
hardrain
Where do we post questions about CDR Mapping? Mobile forensic decoding?
#cell-site-analysis
💯 2
Avatar
4JSN6🇬🇧 1/26/2023 12:39 AM
Quick Q for the mobile analysts out there. While a user has been using the application Telegram, what is the difference between a file saved as -m and one that ends with m_partial in terms of their contents and accessibility? from what I have read, the flag -m would indicate that the file has been completely downloaded and may be in an accessible location to the user. The flag m_partial is a partially downloaded file that may not be accessible? How accurate is that?
Avatar
Hello, I'm testing a multitude of tools to do forensic on *nux servers. I'd like to know if Velociraptor is good for linux or if it works mostly for Windows? (edited)
Avatar
Hey everyone hope you are all doing well. Does anyone have experience with decrypting Telegram Desktop Cache Files? Could someone please point me in the right direction on this?
Avatar
Avatar
Wyrox
Hello, I'm testing a multitude of tools to do forensic on *nux servers. I'd like to know if Velociraptor is good for linux or if it works mostly for Windows? (edited)
Andrew Rathbun 1/26/2023 3:59 AM
https://github.com/golang/go/wiki/MinimumRequirements @randomaccess may have more insight too
The Go programming language. Contribute to golang/go development by creating an account on GitHub.
Avatar
randomaccess 1/26/2023 4:03 AM
It will work on both. You may need to add to the functionality
4:03 AM
I don't do much Linux analysis but it does work. And thankfully most Linux logs are text
Avatar
Deleted User 1/26/2023 5:15 AM
Anyone here has experience with mt-next?
Avatar
Hi DFIR folks, I am new to this channel.looking forward to learn and contribute more to the community🙂
👍 1
👋🏻 1
Avatar
Anyone know what happened to the LE Technology Guide? Used to be distributed by the Oregon Homicide Detectives Association. Looks like its now behind some type of paywall. https://www.orhia.com/le-technology-guide (edited)
LE Technology Guide
Avatar
Avatar
Arsenal
Are there documented cases of an attacker abusing IMAP append? For example, an attacker with IMAP access to a victim’s email account inserting themselves into an ongoing conversation by appending (technically, replacing) an existing message?
Not a case as such but the principle explored here: https://www.metaspike.com/forensic-examination-manipulated-email-gmail/
Forensic examination of a manipulated email in Gmail to determine how it differs from the original. Both server metadata and email header are utilized.
Avatar
Avatar
hardrain
Anyone know what happened to the LE Technology Guide? Used to be distributed by the Oregon Homicide Detectives Association. Looks like its now behind some type of paywall. https://www.orhia.com/le-technology-guide (edited)
Andrew Rathbun 1/26/2023 1:08 PM
I'm pretty sure a few years ago the guy who made it was retired. I wonder if he turned the site over to Cellhawk/LeadsOnline?
👍 1
1:09 PM
I have old versions laying around
Avatar
I have a 2020 Version. but there are a bunch of dead links in it. Specifically looking for some information for a homicide we are working involving an alexa. Lead is looking for some SW Language.
Avatar
Avatar
hardrain
I have a 2020 Version. but there are a bunch of dead links in it. Specifically looking for some information for a homicide we are working involving an alexa. Lead is looking for some SW Language.
Andrew Rathbun 1/26/2023 1:14 PM
https://www.amazon.com/alexa-privacy/apd/home brings me to this page, so this could be a start
1:15 PM
looks like voice recordings, detected sounds, anything related to third-party smart home devices linked via Alexa
1:15 PM
is Ring involved at all here? If so, you may have some good stuff in here
Avatar
Thanks Man! Always appreciate you guys!
Avatar
Avatar
hardrain
Thanks Man! Always appreciate you guys!
Andrew Rathbun 1/26/2023 1:16 PM
Ping us if you need a second set of eyes. Good luck getting the bad guy
Avatar
Avatar
TreeRge
Not a case as such but the principle explored here: https://www.metaspike.com/forensic-examination-manipulated-email-gmail/
That is a really good article. I can confirm that at least one attacker has been using the technique described in this article for quite a few years. The article refers to the technique being used by someone maliciously editing an email they have received, but I am referring to a scenario involving an attacker using it against victims whose email credentials have been compromised. The MIME boundaries are effectively smoking guns. This is nasty and very easily missed if you aren’t looking specifically for it. (edited)
Avatar
Avatar
Arsenal
That is a really good article. I can confirm that at least one attacker has been using the technique described in this article for quite a few years. The article refers to the technique being used by someone maliciously editing an email they have received, but I am referring to a scenario involving an attacker using it against victims whose email credentials have been compromised. The MIME boundaries are effectively smoking guns. This is nasty and very easily missed if you aren’t looking specifically for it. (edited)
As mentioned previously, @Metaspike is your go to guy on this one.
Avatar
Avatar
hardrain
Anyone know what happened to the LE Technology Guide? Used to be distributed by the Oregon Homicide Detectives Association. Looks like its now behind some type of paywall. https://www.orhia.com/le-technology-guide (edited)
ScottKjr3347 1/26/2023 10:02 PM
Hawk Toolbox now leads online here is the registration link: https://www.leadsonline.com/main/register.php https://support.hawkanalytics.com/
Avatar
James Pedersen 1/26/2023 10:14 PM
Hi, does anyone here have any tips or suggestions for recovering, from a jailbroken iPhone, URLs or top-level-domains of web pages that were viewed on the iPhone in Safari in private browsing mode?
Avatar
Avatar
James Pedersen
Hi, does anyone here have any tips or suggestions for recovering, from a jailbroken iPhone, URLs or top-level-domains of web pages that were viewed on the iPhone in Safari in private browsing mode?
Digitalferret 1/27/2023 4:18 AM
maybe #mobile-forensic-extractions or #mobile-forensic-decoding depending on how far into the phone you are?
Avatar
Heimdall4N6K 1/27/2023 8:38 AM
Hi, Anybody have docs on apple watch s7 data extraction? I'm looking for technical docs and info on the characteristics of the materials used. Thank you.
Avatar
Ross Donnelly 1/27/2023 11:33 AM
🤣 1
Avatar
ForensicDev 1/27/2023 4:18 PM
Does anyone know if it is possible to rename an evidence source in @Magnet Forensics AXIOM after it was processed? I know you can change it at the time of going through the Processing workflow. (edited)
Avatar
Avatar
ForensicDev
Does anyone know if it is possible to rename an evidence source in @Magnet Forensics AXIOM after it was processed? I know you can change it at the time of going through the Processing workflow. (edited)
chriscone_ar 1/27/2023 4:19 PM
No, sorry it’s not. But that’s on purpose.
😁 1
Avatar
Avatar
MO
Hey everyone hope you are all doing well. Does anyone have experience with decrypting Telegram Desktop Cache Files? Could someone please point me in the right direction on this?
Yuri Gubanov (Belkasoft) 1/28/2023 2:22 AM
Belkasoft X has this function but one should be aware that no history is stored there, only pic/video thumbnails and things like emoji
Avatar
Avatar
b1n2h3x
Hey friends. Just wanted to share that we released Another free tool - Hexordia Sysdiagnose Log Toolkit - the both does extraction of Sysdiagnose Logs and can run our Syslog Monitor Tool (it is built in) for live monitoring. More info here: https://www.hexordia.com/blog-1-1/introducing-the-hexordia-sysdiagnose-log-toolkit
James Pedersen 1/28/2023 3:49 PM
Is the Hexordia Sysdiagnose Log Toolkit able to decode the hashes of redacted data in the sysdiagnose logs? Or if not, @b1n2h3x , do you know of any tool or software that can be used to accomplish this? (edited)
Avatar
James Pedersen 1/28/2023 8:44 PM
@b1n2h3x Also, if you'd like, feel free to direct message me about this.
Avatar
Hey everyone. I'm currently documenting incident response actions in an excel spreadsheet because that's what I have access to, but I'd be interested to learn what you folks use for documentation. Is there any software designed specifically for incident response documentation for example?
1:33 AM
If I can get some ideas I can raise that as a need to my superiors and hopefully get away from excel which is very clunky for this use.
Avatar
Avatar
James Pedersen
Is the Hexordia Sysdiagnose Log Toolkit able to decode the hashes of redacted data in the sysdiagnose logs? Or if not, @b1n2h3x , do you know of any tool or software that can be used to accomplish this? (edited)
No decoding in the tool… yet
Avatar
Avatar
returnip
Hey everyone. I'm currently documenting incident response actions in an excel spreadsheet because that's what I have access to, but I'd be interested to learn what you folks use for documentation. Is there any software designed specifically for incident response documentation for example?
randomaccess 1/29/2023 3:21 AM
Excel was specifically designed for IR engagements, do people use it for other stuff!?
😂 6
Avatar
Someone from the US LE that might be interested in a crypto fraud regarding a malicious NFT airdrop that leads to a website to "exchange" the NFT for some USDC? Ping-ed that particular web page, did a lookup and it gave me some US results and this is why. If interested please DM me. (edited)
Avatar
Avatar
ZetLoke77
Someone from the US LE that might be interested in a crypto fraud regarding a malicious NFT airdrop that leads to a website to "exchange" the NFT for some USDC? Ping-ed that particular web page, did a lookup and it gave me some US results and this is why. If interested please DM me. (edited)
Andrew Rathbun 1/29/2023 12:08 PM
https://www.ic3.gov/ try reporting here
The Internet Crime Complaint Center, or IC3, is the Nation’s central hub for reporting cyber crime. It is run by the FBI, the lead federal agency for investigating cyber crime.
👍 1
Avatar
I am tasked with updating some processes for physical evidence handling (private sector), and I'd like to understand the current best practice before I make my recommendations. What is the current preferred container for storing/ transporting laptops - Plastic evidence bag or cardboard box (sealed with tamper proof labels)? How is the real evidence (ie: physical laptop) stored, in anticipation of litigation? Should the evidence be stored with the investigations team, or with legal (per any existing legal hold processes)? Any links to current guidelines/ best practices would be greatly appreciated.
Avatar
Hi folks. Has anyone examined a PS2? If so do you have any pearls of wisdom please?
Avatar
Never done a #DFIR #CTF before? No reason to be intimidated - it is a fun hands-on learning experience! Plus @KevinPagano3 and I have a workshop to help you prepare! Join us ow.ly/cTBo50Mwfxa
Avatar
Does anyone have experience collecting data from a Meta Quest 2 VR headset? (edited)
7:57 AM
I understand the the device uses a variant of Android, has anyone been able to image it successfully using Cellebrite?
Avatar
Avatar
secluding
Does anyone have experience collecting data from a Meta Quest 2 VR headset? (edited)
Deleted User 1/30/2023 8:00 AM
Recently the DFIR Community Hardware Fund purchased a Meta Oculus Quest 2 VR headset. Unboxing and device images can be found here. I finally had time to set the device up and play with it a bit to see what it’s all about and possible forensic implications. All data, updates and documents for Oculus Quest 2 Forensics can be found here.
👍 1
Avatar
James Pedersen 1/30/2023 2:23 PM
Hi, I am trying to recover some internet history. I had the idea to contact AT&T directly about it since we can prove that AT&T was the ISP being used at the time. Has anyone here ever successfully obtained internet history-related records from AT&T? Is this feasible? Thank you, James Pedersen
Avatar
Need help from law enforcement friend in australia? (edited)
Avatar
I have a question regarding handling laptops and phones where there is a swollen or physically damaged battery involved. We currently don’t have a good work space to handle these units with proper safety. So I was wondering what kind of equipment and safety precautions do you implement at your forensic labs? My gut feeling is that a lot of people just work on these units and hope for the best but we are looking for a long term solution.
Avatar
Avatar
BlackID
Need help from law enforcement friend in australia? (edited)
Andrew Rathbun 1/31/2023 2:42 AM
What do you need?
Avatar
Avatar
Andrew Rathbun
What do you need?
I will send you a dm
Avatar
Avatar
Johnie
I have a question regarding handling laptops and phones where there is a swollen or physically damaged battery involved. We currently don’t have a good work space to handle these units with proper safety. So I was wondering what kind of equipment and safety precautions do you implement at your forensic labs? My gut feeling is that a lot of people just work on these units and hope for the best but we are looking for a long term solution.
JLindmar (83AR) 1/31/2023 5:40 AM
@Johnie This is something I take seriously. When my section encounters a swollen battery, we remove it from the device and temporarily store it in this: https://brimstonefireprotection.com/collections/fire-containment-bags/products/heavy-duty-battery-fire-and-smoke-containment-kit-large-laptop-preventer-and-preventer-plus-20-000-mah-tested ...until we can move it to our fireproof disposal container, that is filled with vermiculite, that our e-waste provider (https://www.veolianorthamerica.com/what-we-do/waste-capabilities/battery-recycling) will then take. All of our evidence items that contain a lithium battery is stored in one of these: https://cellblockfcs.com/battery-cabinets/ In the event we have a battery fire while an evidence item is out of the storage cabinet, we have several of these kits throughout our section: https://cellblockfcs.com/wall-mounted-libik/
We Are The Best Value Fire Containment Bag On The Market! SAFETY ORANGE, 4 LAYERS WITH VELCRO CLOSURE, AND 1 PAIR FIRE RESISTANT GLOVES (IN
Read more about how we can help your organization use innovative solutions to recycle batteries and help reduce waste.
CellBlock Battery Storage Cabinets are a superior solution for the safe storage of lithium-ion batteries and devices containing them.
Avatar
Avatar
JLindmar (83AR)
@Johnie This is something I take seriously. When my section encounters a swollen battery, we remove it from the device and temporarily store it in this: https://brimstonefireprotection.com/collections/fire-containment-bags/products/heavy-duty-battery-fire-and-smoke-containment-kit-large-laptop-preventer-and-preventer-plus-20-000-mah-tested ...until we can move it to our fireproof disposal container, that is filled with vermiculite, that our e-waste provider (https://www.veolianorthamerica.com/what-we-do/waste-capabilities/battery-recycling) will then take. All of our evidence items that contain a lithium battery is stored in one of these: https://cellblockfcs.com/battery-cabinets/ In the event we have a battery fire while an evidence item is out of the storage cabinet, we have several of these kits throughout our section: https://cellblockfcs.com/wall-mounted-libik/
That kit looks great! And when you examine a laptop for example do you use safety googles and thinner type gloves in a ventilated area at the removal stage? Or do you have some other sort of protection between you and the device?
Avatar
JLindmar (83AR) 1/31/2023 6:04 AM
We do have a ventilation hood and PPE, but the need for there use is determined by the examiner on a case by case basis. More often, when a swollen battery is encountered, the kits are moved into the area for quick access and a second examiner is present to help if need be.
Avatar
Does anyone have any recommendations for laptops that can have flexible/swappable storage options that are also easy to access? Looking at framework laptops but hoping for something a little less proprietary.
Avatar
Avatar
JLindmar (83AR)
We do have a ventilation hood and PPE, but the need for there use is determined by the examiner on a case by case basis. More often, when a swollen battery is encountered, the kits are moved into the area for quick access and a second examiner is present to help if need be.
Thanks for the great resources and response, currently working on upping our safety here at the lab as this has not been adressed before by the management...
Avatar
Avatar
Johnie
Thanks for the great resources and response, currently working on upping our safety here at the lab as this has not been adressed before by the management...
JLindmar (83AR) 1/31/2023 6:20 AM
Honestly, I didn't think of addressing it until our Evidence Receiving Program Manager asked about lithium battery fire prevention measures. They had learned about a lab that lost the entire contents of their evidence storage vault due to a lithium battery fire, and wanted some prevention measures to be put in place. It is something I think most of us overlook because we deal with batteries so frequently. But until you have a problem, you may not think about prevention.
Avatar
Avatar
JLindmar (83AR)
Honestly, I didn't think of addressing it until our Evidence Receiving Program Manager asked about lithium battery fire prevention measures. They had learned about a lab that lost the entire contents of their evidence storage vault due to a lithium battery fire, and wanted some prevention measures to be put in place. It is something I think most of us overlook because we deal with batteries so frequently. But until you have a problem, you may not think about prevention.
Disaster is the best catalyst for change, sadly. Thanks again!
Avatar
Hi all, just on the off chance, does anybody here use Faraday bags (or cases) from Sumuri?
Avatar
Hi all, new to the channel so hi 👋🏼. Is there any known process for offering feedback for Cellebrite UFED? I am interested in offering feedback about a feature request. Mainly having the ability to generate a search warrant return from the Extraction Summary.
Avatar
Avatar
SBcyberCop
Hi all, new to the channel so hi 👋🏼. Is there any known process for offering feedback for Cellebrite UFED? I am interested in offering feedback about a feature request. Mainly having the ability to generate a search warrant return from the Extraction Summary.
Andrew Rathbun 1/31/2023 9:29 AM
@Cellebrite may be able to best advise you
👍 1
Avatar
Avatar
spadart
Hi all, just on the off chance, does anybody here use Faraday bags (or cases) from Sumuri?
We use these cases: (edited)
👍 1
Avatar
Avatar
spadart
Hi all, just on the off chance, does anybody here use Faraday bags (or cases) from Sumuri?
MTDFE.com offers Faraday solutions for personal, military and law enforcement operations. MTDFE Faraday Solutions is 100% veteran owned and operated and offers high quality signal blocking | anti-tracking solutions to protect against hackers and preserve investigations.
👍 1
Avatar
kladblokje_88 1/31/2023 2:23 PM
Hey, I am looking for a full time cyber security research job. Anyone got something cool at a company that is centered around cyber security (or government)? I am dutch, so the netherlands would be nice. But not needed
Avatar
Hi @Cellebrite, I was curious to know if there's any standard way to request a feature or provide feedback for Physical Analyzer. I serve about 3 to 4 search warrants a day with 3 to 6 devices per warrant. Search warrants require a return to search warrant detailing what was "seized." Is there any way to export the Extraction Summary to include it as a search warrant return to the court? For instance, our standard search warrant return is attached below. It allows for data to be entered on the form or attached. It would be nice if analyzer would allow a list showing the counts of artifacts recovered. "text messages: 5, images: 64, etc..."
2:24 PM
2:27 PM
Avatar
Are you looking to report to the court on the items extracted from the phone or the items included in a UFED Reader report?
Avatar
Both. In my case, the information contained in the UFED report is what is classified as "evidence"
Avatar
Avatar
SBcyberCop
Both. In my case, the information contained in the UFED report is what is classified as "evidence"
So are the courts concerned when you perform an FFS when you could have performed an advanced logical and only targeted the items listed in the warrant? Just curious about your procedure.
Avatar
Avatar
FullTang
So are the courts concerned when you perform an FFS when you could have performed an advanced logical and only targeted the items listed in the warrant? Just curious about your procedure.
The court specifically has not been concerned either way. Yet, at least. They are only concerned that the data inside the scope of the warrant is provided and reported. The rest is sealed.
👍 1
Avatar
Avatar
SBcyberCop
Hi @Cellebrite, I was curious to know if there's any standard way to request a feature or provide feedback for Physical Analyzer. I serve about 3 to 4 search warrants a day with 3 to 6 devices per warrant. Search warrants require a return to search warrant detailing what was "seized." Is there any way to export the Extraction Summary to include it as a search warrant return to the court? For instance, our standard search warrant return is attached below. It allows for data to be entered on the form or attached. It would be nice if analyzer would allow a list showing the counts of artifacts recovered. "text messages: 5, images: 64, etc..."
Can you send me a Dm. I’d be curious to hear more about this
Avatar
Quick question, our lab runs two types of work stations right now, both custom builds. We have 3 systems with I9-12900k and 128GB of ram. We also have 3 systems with 24 core 3960x Threadrippers and 256GB of ram. Recently we ran into a case with Axiom where it kept crashing the I9 system that it was running on due to extensive memory use. The threadrippers were able to process the same image without ever using more than 60GB of memory.
5:16 AM
Does anyone have any idea why, or if turning down the number of available cores in the I9 system might allow it to remain running without memory crashing. The I9's are secondary systems and sheer speed isnt as important as stability.
Avatar
Avatar
Kienn
Quick question, our lab runs two types of work stations right now, both custom builds. We have 3 systems with I9-12900k and 128GB of ram. We also have 3 systems with 24 core 3960x Threadrippers and 256GB of ram. Recently we ran into a case with Axiom where it kept crashing the I9 system that it was running on due to extensive memory use. The threadrippers were able to process the same image without ever using more than 60GB of memory.
What do the Axiom logs say? Someone with @Magnet Forensics might be able to assist.
Avatar
Avatar
Kienn
Does anyone have any idea why, or if turning down the number of available cores in the I9 system might allow it to remain running without memory crashing. The I9's are secondary systems and sheer speed isnt as important as stability.
cScottVance 2/1/2023 5:41 AM
Hi there! Getting the logs would be our first step in figuring out what’s up. DM incoming!
Avatar
Avatar
Kienn
Quick question, our lab runs two types of work stations right now, both custom builds. We have 3 systems with I9-12900k and 128GB of ram. We also have 3 systems with 24 core 3960x Threadrippers and 256GB of ram. Recently we ran into a case with Axiom where it kept crashing the I9 system that it was running on due to extensive memory use. The threadrippers were able to process the same image without ever using more than 60GB of memory.
I'm curious what the outcome of this is.
Avatar
Will let you know, sent the logs, and waiting to pull them from second system.
Avatar
Avatar
SBcyberCop
Hi @Cellebrite, I was curious to know if there's any standard way to request a feature or provide feedback for Physical Analyzer. I serve about 3 to 4 search warrants a day with 3 to 6 devices per warrant. Search warrants require a return to search warrant detailing what was "seized." Is there any way to export the Extraction Summary to include it as a search warrant return to the court? For instance, our standard search warrant return is attached below. It allows for data to be entered on the form or attached. It would be nice if analyzer would allow a list showing the counts of artifacts recovered. "text messages: 5, images: 64, etc..."
Our returns just state that a "search and forensic examination of [device description] related to this search warrant was executed and electronic data obtained".
👆 1
Avatar
KillSwitchX7 2/1/2023 12:01 PM
Does someone has spare servers? I wanted to build a full fledged cyber range and emulate threat actors, eventually threat hunt for them as well. If you have such facilities then do lemme know, I don't have such on my end, so I want some.
Avatar
Hello all. Any tips on where I can find tethering/hotspot activation or usage logs from an iPhone 13 Pro? I have a full file system extraction
Avatar
@Cellebrite is there any way to filter Trace Window events? Specifically hiding normal information ℹ️ logs and only showing warnings ⚠
Avatar
Avatar
rickster33
Hello all. Any tips on where I can find tethering/hotspot activation or usage logs from an iPhone 13 Pro? I have a full file system extraction
SBcyberCop 2/1/2023 1:00 PM
I think, don't have a extraction or phone in front of me, it's in the phone under Cellular in settings. Cellular Data, Personal Hotspot.
Avatar
hi all, I am working a case where there are older artifacts of the target user running ccleaner64.exe. Most recent was Feb2022. I dont really have faith in this being the last date as I am sure ccleaner has improved its artifact cleanup in the past year. On my current image I am missing a ton of artifacts. I did a complete HD carve and have back quite a number of artifacts...many of them corrupt as you might suspect. An example of missing artifacts on the mounted image is %users%/appdata/chrome folder does not even exist. Although through a carve I discovered the user was using chrome actively. Any thoughts on how to identify if ccleaner64.exe was actively running, or other similar types of applications?
Avatar
@Cellebrite I’m preparing for the CCME. My textbooks for CCO/CCPA are over 5 years old. Do I need to acquire new text books to study from?
Avatar
Avatar
SBcyberCop
I think, don't have a extraction or phone in front of me, it's in the phone under Cellular in settings. Cellular Data, Personal Hotspot.
rickster33 2/1/2023 1:28 PM
Thank you. Yes that’s how to turn it off or on in the device. I was hoping to find a log of past connections in the phone extraction. Like a particular database or plist
Avatar
Avatar
SBcyberCop
@Cellebrite is there any way to filter Trace Window events? Specifically hiding normal information ℹ️ logs and only showing warnings ⚠
No there isn’t.
👍 1
Avatar
Avatar
dcs453
@Cellebrite I’m preparing for the CCME. My textbooks for CCO/CCPA are over 5 years old. Do I need to acquire new text books to study from?
There likely has been changes. But not sure if it would warrant new books. Im not sure if you could get them without redoing the course.
Avatar
Avatar
DE
I am tasked with updating some processes for physical evidence handling (private sector), and I'd like to understand the current best practice before I make my recommendations. What is the current preferred container for storing/ transporting laptops - Plastic evidence bag or cardboard box (sealed with tamper proof labels)? How is the real evidence (ie: physical laptop) stored, in anticipation of litigation? Should the evidence be stored with the investigations team, or with legal (per any existing legal hold processes)? Any links to current guidelines/ best practices would be greatly appreciated.
I personally prefer plastic bags over boxes as the bags are easier for storage. I've seen clear plastic bags because it's easier to see the contents. I've also seen non-clear bags because it's meant to keep the contents private. So I guess as long as you can come up with a (reasonable) justification that satisfy your bosses is a good solution. And I've also seen brown paper bags as evidence bags...because they are cheaper comparing to the plastic ones. As for storage, a locked room with limited access or a safe with a log book is good enough for storage. The laptop should be only out for the examination and all the work should be done on the forensic images.
Avatar
Hi all, quick question about how you use KAPE - What target do you typically collect? I've been using KapeTriage but wondered what else people recommend
Avatar
Avatar
Biscuit
Hi all, quick question about how you use KAPE - What target do you typically collect? I've been using KapeTriage but wondered what else people recommend
randomaccess 2/1/2023 5:03 PM
Yeah that one. I add wer and wmi
Avatar
Avatar
Biscuit
Hi all, quick question about how you use KAPE - What target do you typically collect? I've been using KapeTriage but wondered what else people recommend
I use the SANS_Triage and then EZParser as my first run
Avatar
Thanks guys, I'll look into these
Avatar
Avatar
Biscuit
Hi all, quick question about how you use KAPE - What target do you typically collect? I've been using KapeTriage but wondered what else people recommend
Andrew Rathbun 2/1/2023 5:46 PM
If you're doing IR, would strongly recommend KapeTriage as a starting point. SANS_Triage IMO isn't production ready unless you're 100% certain what it's pulling is what you want. I think BasicCollection is probably a better fit for deadbox and KapeTriage is a better fit for IR. At the very least as starting points, from a Target perspective. SANS_Triage is simply meant to be a Compound Target that doesn't point to other Targets so students could see all the paths to files that the Target pulls. It's largely unmaintained unlike KapeTriage. It's just meant to be a spelled out version of a Compound Target that probably was constructed back in 2019 when KAPE came out. Whereas, KapeTriage has been updated with at least 3 significant artifacts in the past couple of years (I know because I was involved with all 3) so that's the one I'll stand behind, personally, for IR.
👍 4
Avatar
@Andrew Rathbun Just wondering, is there a way (I am thinking likely Powershell) to see from one or more compound targets, what the end targets all are? I am thinking this would be good for education, plus maybe working with LE or lawyers
Avatar
Avatar
dsplice
@Andrew Rathbun Just wondering, is there a way (I am thinking likely Powershell) to see from one or more compound targets, what the end targets all are? I am thinking this would be good for education, plus maybe working with LE or lawyers
Andrew Rathbun 2/1/2023 6:58 PM
https://github.com/AndrewRathbun/DFIRMindMaps/tree/main/Tools/KAPE/KapeTriage here's one for KapeTriage, is this what you're talking about?
Avatar
Avatar
Andrew Rathbun
https://github.com/AndrewRathbun/DFIRMindMaps/tree/main/Tools/KAPE/KapeTriage here's one for KapeTriage, is this what you're talking about?
YES, I knew something like it must have already been developed. Would still love to be able to do something like that programically for a set of targets (if you selected several compound ones) and would output everything that would run. But that helps alot, to visualize
💯 1
Avatar
Avatar
dsplice
YES, I knew something like it must have already been developed. Would still love to be able to do something like that programically for a set of targets (if you selected several compound ones) and would output everything that would run. But that helps alot, to visualize
Something like this? Could make improvements to it, if you like. https://gist.github.com/Beercow/5e13282541f79580405f96364baca8d5
Python script to dump all fields in KAPE targets and modules, including documentation - kape_info.py
Avatar
I just need to figure out how to run it LOL
Avatar
Avatar
dsplice
I just need to figure out how to run it LOL
pip install PyYAML kape_info.py -d <targets dir> —target kape_info.py -d <modules dir> —module
Avatar
Gives me an idea though to have better output on compound targets. See if I can make an update by the weekend. Time permitting of course.
💯 1
Avatar
LOL
Avatar
Deleted User 2/1/2023 11:18 PM
Hallo, I am looking for an easy way to log shell commands that are used in live forensics. I encountered this once during a lecture on Mac OSX, but I can quite recall the name of the command. It worked something like this: 1) Enter the log command with target path. 2) From now on every executed shell command is executed and logged to the target path.
Avatar
Avatar
Andrew Rathbun
If you're doing IR, would strongly recommend KapeTriage as a starting point. SANS_Triage IMO isn't production ready unless you're 100% certain what it's pulling is what you want. I think BasicCollection is probably a better fit for deadbox and KapeTriage is a better fit for IR. At the very least as starting points, from a Target perspective. SANS_Triage is simply meant to be a Compound Target that doesn't point to other Targets so students could see all the paths to files that the Target pulls. It's largely unmaintained unlike KapeTriage. It's just meant to be a spelled out version of a Compound Target that probably was constructed back in 2019 when KAPE came out. Whereas, KapeTriage has been updated with at least 3 significant artifacts in the past couple of years (I know because I was involved with all 3) so that's the one I'll stand behind, personally, for IR.
randomaccess 2/2/2023 12:11 AM
As the author of basic collection, I don't use it lol
😆 1
Avatar
Avatar
KillSwitchX7
Does someone has spare servers? I wanted to build a full fledged cyber range and emulate threat actors, eventually threat hunt for them as well. If you have such facilities then do lemme know, I don't have such on my end, so I want some.
That’s a tall ask, wouldn’t be cheap, I’d suggest the cheapest option, Linode
12:33 AM
Or check your local buy and sell. For example I bought a used server 3 years ago, been running 24/7 since then and I only paid $140 CAD. Which is like $40 USD 😆
Avatar
@Deleted User - Start-Transcript and Stop-Transcript Using PS?
Avatar
Avatar
MSAB_Adam
@Deleted User - Start-Transcript and Stop-Transcript Using PS?
Deleted User 2/2/2023 7:35 AM
Thank you! But I'm actually i looking for something that works for linux.
Avatar
Avatar
Deleted User
Thank you! But I'm actually i looking for something that works for linux.
Asking the dumb question, but .bash_history?
Avatar
Deleted User 2/2/2023 7:48 AM
I'm aware of that. I just thought there was a little commandline tool for that.
Avatar
Avatar
Deleted User
I'm aware of that. I just thought there was a little commandline tool for that.
Ok, there is the Linux script command. Not sure if that would work fully for your situation. In the past, when doing red/blue team engagements, I had the offensive sec guys record everything inside of putty.
Avatar
Keep in mind with bash, the history will only be saved on a normal exit of bash, if it crashes or is not closed the history will not be updated
8:09 AM
but you can configure it to record timestamps
8:10 AM
same mostly applies for zsh, but I think the default is to update the history file immediately and not on exit
8:11 AM
and what they may have been doing was redirecting which file is used for the history file by updating the environment variable HISTFILE (edited)
8:17 AM
You could set these environment variables at beginning of working the incident (applies to the current shell only) export HISTTIMEFORMAT="%F %T " export HISTSIZE=-1 export HISTFILESIZE=-1 export HISTFILE="/path/to/incident/bash_history" and periodically run history -a to append current session history to the file if worried about crashes
👍 1
8:20 AM
actually you may also be able to do the following to periodically save the history per http://northernmost.org/blog/flush-bash_history-after-each-command/ export PROMPT_COMMAND='history -a'
If you, like me, often work in a lot of terminals on a lot of servers, or even a lot of terminals on the same one, you may recognise the frustration …
👍 1
Avatar
PlastikPistol 2/2/2023 8:27 AM
@Andrew Rathbun Odd question, but I have an analysis report from a homicide investigation. I've never put so much into one document and was wondering if there was anyone that could review or go through it before I submit it to the prosecutor's office? Phones, CDRs, a vehicle download, and some surveillance video.
Avatar
dfir-jesseee 2/2/2023 8:46 AM
I forget how to do log2timeline on multiple E01 files. Does anyone have a procedure on how to do that? I've only done it on one E01 file before..
Avatar
Avatar
PlastikPistol
@Andrew Rathbun Odd question, but I have an analysis report from a homicide investigation. I've never put so much into one document and was wondering if there was anyone that could review or go through it before I submit it to the prosecutor's office? Phones, CDRs, a vehicle download, and some surveillance video.
Andrew Rathbun 2/2/2023 9:13 AM
I'm happy to take a look and keep things confidential, but frankly if it's relating to phones, I'd suggest asking someone else. At the very least, I can sanity check it. Anything I can do to help on serious cases!
Avatar
Avatar
PlastikPistol
@Andrew Rathbun Odd question, but I have an analysis report from a homicide investigation. I've never put so much into one document and was wondering if there was anyone that could review or go through it before I submit it to the prosecutor's office? Phones, CDRs, a vehicle download, and some surveillance video.
I'd be interested in taking a peak just for reference and learning.
Avatar
I'd recommend using something equivalent to the FBI Teleporter for sending it tho.
Avatar
Hello all. I'm looking for some opinions on the best way to install Magnet Axiom. I currently have it installed on the same m.2 as the OS ( is this bad?). I have the temp folder set to a separate m.2 drive and I process from an m.2 array in RAID 0. I feel like I'm getting less performance than I should and am just looking for some opinions.
Avatar
Avatar
stps358
Hello all. I'm looking for some opinions on the best way to install Magnet Axiom. I currently have it installed on the same m.2 as the OS ( is this bad?). I have the temp folder set to a separate m.2 drive and I process from an m.2 array in RAID 0. I feel like I'm getting less performance than I should and am just looking for some opinions.
Honestly the thing that matters most with Axiom is probably the cores and threads of your CPU. Make sure you check your settings in process to make sure it’s set to use all available cores. (If you’re referring to performance when processing)
Avatar
Avatar
Fr0stByt3
Honestly the thing that matters most with Axiom is probably the cores and threads of your CPU. Make sure you check your settings in process to make sure it’s set to use all available cores. (If you’re referring to performance when processing)
It is set to use all 16 cores (32 logical). I'm using a Threadripper, I'm wondering if maybe that is the problem? (edited)
Avatar
Avatar
stps358
It is set to use all 16 cores (32 logical). I'm using a Threadripper, I'm wondering if maybe that is the problem? (edited)
chriscone_ar 2/2/2023 12:27 PM
Hey @stps358 can you remind me which CPU model that AMD is in your machine? And @Fr0stByt3 is right on core/thread count + clock speed = winner. So long as there's enough RAM to keep it all fed with instruction. Evidence read speed is the next big bottleneck.
Avatar
Avatar
chriscone_ar
Hey @stps358 can you remind me which CPU model that AMD is in your machine? And @Fr0stByt3 is right on core/thread count + clock speed = winner. So long as there's enough RAM to keep it all fed with instruction. Evidence read speed is the next big bottleneck.
Hey. Its a Threadripper Pro 3955WX. 256GB RAM. GPU 3080TI. All drives are nvme.
Avatar
Avatar
dfir-jesseee
I forget how to do log2timeline on multiple E01 files. Does anyone have a procedure on how to do that? I've only done it on one E01 file before..
dfir-jesseee 2/2/2023 12:50 PM
hmm doing it wrong I guess
Avatar
@stps358 that Threadripper Pro 3955WX is a decent processor for case work. That's sitting on an sWRX80 motherboard correct? Is that on an Asus Pro WS WRX80E motherboard or a different motherboard. That board is great for processing, and it needs ECC RAM. Are you using ECC RAM? What are the images looking like? Compressed or non-compressed? Also, what NVMe's? That setup should be going through some data fairly quick. Any way you can share some times on the front end processing speed from start to stop? It might not be the hardware at all.
Avatar
Avatar
dfir-jesseee
hmm doing it wrong I guess
dfir-jesseee 2/2/2023 1:33 PM
rebooted and now its working
Avatar
@Law Enforcement [USA] I've been asked a lot lately to be the traveling presenter for Cyber Bullying, Sexting etc for middle school to high schools. Is anybody willing to share there presentations so I can have an idea want to present on ? I'm not the creative type would help to have some ideas. DM me if you have anything, Thanks
Avatar
Avatar
DCSO
@Law Enforcement [USA] I've been asked a lot lately to be the traveling presenter for Cyber Bullying, Sexting etc for middle school to high schools. Is anybody willing to share there presentations so I can have an idea want to present on ? I'm not the creative type would help to have some ideas. DM me if you have anything, Thanks
C. Russell 2/2/2023 1:46 PM
I can shoot you a DM, I used to do similar presentations
👍 1
Avatar
Avatar
Manny
@stps358 that Threadripper Pro 3955WX is a decent processor for case work. That's sitting on an sWRX80 motherboard correct? Is that on an Asus Pro WS WRX80E motherboard or a different motherboard. That board is great for processing, and it needs ECC RAM. Are you using ECC RAM? What are the images looking like? Compressed or non-compressed? Also, what NVMe's? That setup should be going through some data fairly quick. Any way you can share some times on the front end processing speed from start to stop? It might not be the hardware at all.
Yes that is the board. I don’t believe the memory is ecc though. Nvmes are Samsung evo
Avatar
Anyone have some suggestions to help parse a huge (90GB) text file? All I want to do is extract out the numbers only lines to a new file. So anything with a letter or symbol can be ignored. Python? etc? Been trying to research python to help but I haven't gotten far...
Avatar
@stps358 That's a nice setup on the system. What are you getting for processing times for "x" number of gigabytes or terabytes? Samsung 980 Pro or 990 Pro? Program is running off of the OS, Temp is on an NVMe, Cases is on an NVMe, and what's the source data sitting on? NVMe, RAID NVMe, 3.5" rotational?
Avatar
Avatar
Manny
@stps358 That's a nice setup on the system. What are you getting for processing times for "x" number of gigabytes or terabytes? Samsung 980 Pro or 990 Pro? Program is running off of the OS, Temp is on an NVMe, Cases is on an NVMe, and what's the source data sitting on? NVMe, RAID NVMe, 3.5" rotational?
I don’t have any times at this moment. Drives are 980 pros. Source is on nvme in raid 0.
Avatar
@stps358 you're on 6.10? That system should be wicked fast for processing times. When you process a case do you see anything in Task Manager that looks like it's getting "bogged" down? Axiom will chew up some resources, but with that system you are probably good. Samsung 980 Pros (or 990 Pros) are the way to go. Is that NVMe RAID off of the board or on something like a HighPoint 7505 Controller? Is that image compressed? Sorry for the load of questions. Trying to help isolate anything.
Avatar
@DCSO check NCMEC they have tons of stuff from handouts to presentations. You can tweak the presentations to fit your length of time and what your seeing in your community
Avatar
Avatar
chauan
I personally prefer plastic bags over boxes as the bags are easier for storage. I've seen clear plastic bags because it's easier to see the contents. I've also seen non-clear bags because it's meant to keep the contents private. So I guess as long as you can come up with a (reasonable) justification that satisfy your bosses is a good solution. And I've also seen brown paper bags as evidence bags...because they are cheaper comparing to the plastic ones. As for storage, a locked room with limited access or a safe with a log book is good enough for storage. The laptop should be only out for the examination and all the work should be done on the forensic images.
Amazing, thank-you for the insight!
Avatar
Avatar
Manny
@stps358 you're on 6.10? That system should be wicked fast for processing times. When you process a case do you see anything in Task Manager that looks like it's getting "bogged" down? Axiom will chew up some resources, but with that system you are probably good. Samsung 980 Pros (or 990 Pros) are the way to go. Is that NVMe RAID off of the board or on something like a HighPoint 7505 Controller? Is that image compressed? Sorry for the load of questions. Trying to help isolate anything.
No need to apologize. It’s driving me nuts that the system is slow. Raid is off the board. Images are mostly mobile .zips from GK. I can handle the longer processing time. What kills me is clicking through different artifacts etc. it always goes “not responding” before it switches or applies a filter etc.
Avatar
@stps358 The 3080 is in the top slot (x16_1) like usual? (I know, it's a stupid question). How many other PCIe cards are installed?
Avatar
Avatar
A A
Anyone have some suggestions to help parse a huge (90GB) text file? All I want to do is extract out the numbers only lines to a new file. So anything with a letter or symbol can be ignored. Python? etc? Been trying to research python to help but I haven't gotten far...
Have you thought about using grep? I have done something similar and might have some examples that could help.
Avatar
Avatar
Manny
@stps358 The 3080 is in the top slot (x16_1) like usual? (I know, it's a stupid question). How many other PCIe cards are installed?
Yes. And just the Asus raid adaptor for the m.2s
Avatar
@stps358 Makes sense. What about running one of the demos from GPU Caps Viewer just to make sure it's running at x16? I'm sure it is, but sometimes cards or slots get flaky. If you run the demo in GPU Caps Viewer there is a box in the corner that gives the PCIe bandwidth speed. https://www.techspot.com/downloads/4618-gpu-caps-viewer.html Also, maybe log in through IPMI on the motherboard and make sure the slot is set to x16? I've seen boards do all sorts of crazy things over the years. It's also a toss up with 4G Decoding Enabled or Disabled. I can help with the login through IPMI, but I'm sure you already did that to configure the RAID. Are you using the Nvidia Geforce Drivers or the Nvidia Studio Drivers? I've had better luck sometimes with workstation motherboards and the Nvidia Studio Drivers. I don't think that's the issue, but it's definitely something "weird" because that CPU, board, and GPU combination should be smoking through graphics and processing. (edited)
GpuCapsViewer is an OpenGL graphics card utility for Windows.
2:48 PM
@stps358 Also, I'm sure you ran Passmark's Performance Test tool to benchmark the system, but sometimes running it again can identify sources of "lag" with the system. That GPU should be benchmarking fairly high in the charts. https://www.passmark.com/products/performancetest/index.php
Benchmark the speed of your PC computer hardware, then compare the result to other machines. Includes disk, 3D and CPU tests.
Avatar
Avatar
C. Russell
I can shoot you a DM, I used to do similar presentations
digital Bowles 2/2/2023 2:48 PM
If possible please share a copy with me. I had this discussion today about working on something for next school year.
Avatar
Avatar
DCSO
@Law Enforcement [USA] I've been asked a lot lately to be the traveling presenter for Cyber Bullying, Sexting etc for middle school to high schools. Is anybody willing to share there presentations so I can have an idea want to present on ? I'm not the creative type would help to have some ideas. DM me if you have anything, Thanks
Check out the netsmartz series by ncmec
Avatar
Oops just saw other people suggested the same
Avatar
Finally version 43 is out for my book 😄 > Still in development > The art of purple teaming (edited)
🙌 2
Avatar
Avatar
A A
Anyone have some suggestions to help parse a huge (90GB) text file? All I want to do is extract out the numbers only lines to a new file. So anything with a letter or symbol can be ignored. Python? etc? Been trying to research python to help but I haven't gotten far...
I’m not sure how much hate I’ll get here for suggesting this but, you could literally reword this question a little and paste it into ChatGPT. It’s great for getting quick python code for tasks like this. As long as you are savvy enough to run the script, it should solve your problem quick.
Avatar
Avatar
MeGaBiTe
I’m not sure how much hate I’ll get here for suggesting this but, you could literally reword this question a little and paste it into ChatGPT. It’s great for getting quick python code for tasks like this. As long as you are savvy enough to run the script, it should solve your problem quick.
randomaccess 2/2/2023 11:27 PM
Wouldn't even need python Cat file | sed 's/a-z//g' But replace a-z with the regex you want to remove. For that chatgpt would likely get you close if not the exact string you need to put in there
11:28 PM
tr would also work but I can't remember what the characters for :letter: is, if might be that
Avatar
Avatar
randomaccess
Wouldn't even need python Cat file | sed 's/a-z//g' But replace a-z with the regex you want to remove. For that chatgpt would likely get you close if not the exact string you need to put in there
Sorry I should have specified that I was looking for a windows solution
Avatar
Avatar
MeGaBiTe
I’m not sure how much hate I’ll get here for suggesting this but, you could literally reword this question a little and paste it into ChatGPT. It’s great for getting quick python code for tasks like this. As long as you are savvy enough to run the script, it should solve your problem quick.
This is interesting if it works lol. I'll try something when I can get in to it....
Avatar
Avatar
FullTang
Have you thought about using grep? I have done something similar and might have some examples that could help.
I havent, and dont have much experience with it. Any examples you could provide would be appreciated!
Avatar
Avatar
A A
This is interesting if it works lol. I'll try something when I can get in to it....
I’ve shamelessly used it for far more complicated. I never have enough time, so anything to save a little.
💯 3
Avatar
Avatar
A A
Sorry I should have specified that I was looking for a windows solution
randomaccess 2/3/2023 6:41 AM
Heh wsl is on windows
Avatar
Avatar
A A
I havent, and dont have much experience with it. Any examples you could provide would be appreciated!
You should be able to do it with the following command grep -x -E ‘[0-9]+’ OriginalList.txt > NumbersOnly.txt.
7:24 AM
I know that grep -x -E -v ‘[0-9]+’ Wordlist.txt > Alphanumeric.txt will pull out all alphanumeric lines into a new file and -v is the flag for reverse selection. I might be missing something as + might not be needed for your situation so testing would be required.
Avatar
awesome! thank you! I'll let you know how it goes after I finish testing this chatgpt case haha
Avatar
Hi all, I have a case where I am trying to recover Edge cleared browsing history and I would like to document what the users settings are as well. The settings for edge are edge://settings/privacy --> edge://settings/clearBrowsingDataOnClose I have looked in the registry for the user settings here, but perhaps I am missing it. On the cleared browsing history, I did a carve and got some back, but much is corrupt. Anyone know of another method to attempt?
Avatar
Avatar
CyberTend
Hi all, I have a case where I am trying to recover Edge cleared browsing history and I would like to document what the users settings are as well. The settings for edge are edge://settings/privacy --> edge://settings/clearBrowsingDataOnClose I have looked in the registry for the user settings here, but perhaps I am missing it. On the cleared browsing history, I did a carve and got some back, but much is corrupt. Anyone know of another method to attempt?
Andrew Rathbun 2/3/2023 9:15 AM
C:\Users\Andrew Rathbun\AppData\Local\Microsoft\Edge\User Data\Default\Preferences might have it? It should be a SQLite database so throw it into a SQLite viewer and poke around. If it's something you want a query written for, ping me and I'll do it (edited)
Avatar
Avatar
MeGaBiTe
I’ve shamelessly used it for far more complicated. I never have enough time, so anything to save a little.
The first iteration took too much memory and failed because it tried to load the whole 90GB into memory so I asked it for something less memory intensive and it came up with something else that worked awesome. Great suggestion, I will definitely be using that for other things in the future, as long as it's free lol
Avatar
Avatar
FullTang
I know that grep -x -E -v ‘[0-9]+’ Wordlist.txt > Alphanumeric.txt will pull out all alphanumeric lines into a new file and -v is the flag for reverse selection. I might be missing something as + might not be needed for your situation so testing would be required.
Since the other thing worked I didnt get to even try your suggestion but I appreciate you posting it regardless!
Avatar
No worries, glad you figured it out!
Avatar
Avatar
Andrew Rathbun
C:\Users\Andrew Rathbun\AppData\Local\Microsoft\Edge\User Data\Default\Preferences might have it? It should be a SQLite database so throw it into a SQLite viewer and poke around. If it's something you want a query written for, ping me and I'll do it (edited)
Thanks I will look at that file and let you know.
Avatar
Avatar
Andrew Rathbun
C:\Users\Andrew Rathbun\AppData\Local\Microsoft\Edge\User Data\Default\Preferences might have it? It should be a SQLite database so throw it into a SQLite viewer and poke around. If it's something you want a query written for, ping me and I'll do it (edited)
Interesting on the preferences file. It appears to be just a text file. I found the string with the settings for this here: clear_data":{"edge_uwp_browsing_data":true,"form_data":true,"mf_protected_media_data":true,"passwords":true,"site_settings":true,"time_period":4
💯 1
Avatar
digital Bowles 2/3/2023 11:01 AM
My agency has a DP10. Works great for on scene quick needs. Question is can I load the DP10 extraction into cellebrite PA.
Avatar
Avatar
digital Bowles
My agency has a DP10. Works great for on scene quick needs. Question is can I load the DP10 extraction into cellebrite PA.
Deleted User 2/3/2023 11:28 AM
Just sent you DM
Avatar
Deleted User 2/3/2023 12:03 PM
Sharing for the wider group - Loading DP-10 extraction into other analysis tools-
Avatar
hello
12:15 PM
is stenography used in real life scenarios ?
Avatar
Avatar
strategic
is stenography used in real life scenarios ?
Andrew Rathbun 2/3/2023 12:15 PM
FYI, this is digital forensics, not forensic science. Just making sure you're aware
Avatar
Avatar
Andrew Rathbun
FYI, this is digital forensics, not forensic science. Just making sure you're aware
you never heard of steganography tools on linux ?
Avatar
Avatar
strategic
you never heard of steganography tools on linux ?
Andrew Rathbun 2/3/2023 12:26 PM
Not really my wheelhouse
Avatar
@strategic When you first asked the question, I was going to say "Stenography is used in court all the time"...But now I see you mean Steganography. I had one case where steganography was alleged, but we could not find it with any tools (this was 8 or 10 years ago). The problem with steganography is that if you don't find it, it does not mean it wasn't there....So anyone who says "I've never seen it in the wild" really just means they've never found it in the wild.
this 2
Avatar
Avatar
5cary
@strategic When you first asked the question, I was going to say "Stenography is used in court all the time"...But now I see you mean Steganography. I had one case where steganography was alleged, but we could not find it with any tools (this was 8 or 10 years ago). The problem with steganography is that if you don't find it, it does not mean it wasn't there....So anyone who says "I've never seen it in the wild" really just means they've never found it in the wild.
my bad on the typo, and thanks
Avatar
I think of steganography as an obscure form of encryption, but the problem is it is file-based. So if someone was using steganography there should be traces of activity on the device(s) being examined. The examiner could find the steganography program, prefetch files showing the program ran (assuming Windows), deleted files pre-embedding or post-embedding into/outof other files, or other indicators that would prompt them to dig deeper. I also have never found it in the wild, just my way of looking at it.
Avatar
Yeah steganography broadly speaking tends to be the realm of CTFs more than real DF. There will have been someone who’s probably done it to hide something, illegal or otherwise
1:19 PM
Having said that, recognising the telltale signs of stego isn’t necessarily bad, a 10MB file size for a 1080p image is quite an easy spot
1:19 PM
And CTFs are awesome 😎
Avatar
Avatar
CyberTend
Interesting on the preferences file. It appears to be just a text file. I found the string with the settings for this here: clear_data":{"edge_uwp_browsing_data":true,"form_data":true,"mf_protected_media_data":true,"passwords":true,"site_settings":true,"time_period":4
randomaccess 2/3/2023 2:32 PM
Ya it's JSON
Avatar
ForensicDev 2/4/2023 1:54 AM
I was asked to create a directory/file inventory on a live MacBook. We have Recon ITR, yet I don't see any option to just grab a directory/file inventory. How would I accomplish such a task? I am not afraid to use CLI if that is what needs to happen. Ideally, the output should be a CSV where one line represents the full path (incl. file name), size, MACBs, etc.
Avatar
Aftermath is a free macOS IR framework. Contribute to jamf/aftermath development by creating an account on GitHub.
Avatar
Does every electronic device use linux kernel, if i simply ask Does railway engine use linux kernal?
Avatar
SBcyberCop 2/4/2023 7:46 AM
Is anyone available from @Cellebrite to explain the generated coding on the Watch Lists? f1e19fbc-7500-4f52-8128-3d288af86e6a (edited)
7:46 AM
03/02/2023 11:39:29 f1e19fbc-7500-4f52-8128-3d288af86e6a Amphetamines N autofill,chat,contact,email,instantmessage,mms,note,searcheditem,sms,socialmediaactivity,webbookmark,visitedpage,text N"N"#ffff00"Amy N"N"#ffff00"Amps N"N"#ffff00"Bam N"N"#ffff00"B-Bombs N"N"#ffff00"Beans N"N"#ffff00"Bennies N"N"#ffff00"Benz
7:47 AM
From what I can tell, it only changes when the name of the list changes. But I cant decode it.
Avatar
Avatar
SBcyberCop
Is anyone available from @Cellebrite to explain the generated coding on the Watch Lists? f1e19fbc-7500-4f52-8128-3d288af86e6a (edited)
Can you send me a Dm and we can take a look. Ill need to involve our coding group for this.
Avatar
Avatar
p2pexpert
Does every electronic device use linux kernel, if i simply ask Does railway engine use linux kernal?
Highly likely but you may run to something like Windows IoT here and there. Best way is to find documentations from the company or talk to the engineers.
Avatar
I don't see the "perfect" channel to post this in so I'll start here 🙂 I love the idea of Plaso/Log2Timeline or that other solution that Google Devs built up, especially during IR or user activity reconstruction where you're dealing with large amounts of redundant data but I just haven't found the right mix of tooling to really help tell a story. Just curious how everyone else is presenting this kind of information. For example, a compromised web server with web logs and system logs intact but then i also have firewall logs to support and maybe theres some other backend windows system somewhere with some SQL transaction logs in the shape of windows events. I want to be able to combine all of that information, mute the baseline and build a timeline out of the anomalies lol
Avatar
James Pedersen 2/4/2023 9:08 PM
Hi, has anyone here ever successfully obtained a wiretap from AT&T before? Just curious. No need to provide case details, I'm just wondering how commonplace this is. (edited)
Avatar
Avatar
James Pedersen
Hi, has anyone here ever successfully obtained a wiretap from AT&T before? Just curious. No need to provide case details, I'm just wondering how commonplace this is. (edited)
Digitalferret 2/5/2023 5:19 AM
depends how high you climb the ladder to ask 🙂 and those higher up are unlikely to give any info whatsoever https://www.theverge.com/2012/4/4/2925053/att-verizon-us-carriers-wiretap-charges AT&T declined to comment <cough> (edited)
Avatar
Avatar
p2pexpert
Does every electronic device use linux kernel, if i simply ask Does railway engine use linux kernal?
Deleted User 2/5/2023 9:58 AM
Good chance it is a SCADA system. Likely something proprietary and very simple as they generally are.
Avatar
Avatar
n3tl0kr
I don't see the "perfect" channel to post this in so I'll start here 🙂 I love the idea of Plaso/Log2Timeline or that other solution that Google Devs built up, especially during IR or user activity reconstruction where you're dealing with large amounts of redundant data but I just haven't found the right mix of tooling to really help tell a story. Just curious how everyone else is presenting this kind of information. For example, a compromised web server with web logs and system logs intact but then i also have firewall logs to support and maybe theres some other backend windows system somewhere with some SQL transaction logs in the shape of windows events. I want to be able to combine all of that information, mute the baseline and build a timeline out of the anomalies lol
This is a very difficult thing to get right with raw investigation data due to the number of events that are going to be present in the timeline. I'd recommend building a timeline based on your case notes and the questions you're asking during the investigation. One tool that can aid in this regard is Aurora, developed by Matthias Fuchs https://github.com/cyb3rfox/Aurora-Incident-Response
Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders - GitHub - cyb3rfox/Aurora-Incident-Response: Incident Response Documentation made easy. Develope...
💯 1
Avatar
Hello everyone, I was wondering if you can view a https handshake communicating with a restful API endpoint (Firebase), using Wireshark of a particular video streaming based app on android for investigative purposes. Is there any document around this, struggling to find some resources around this ? (edited)
Avatar
if the app doesn't use certificate pinning, you could place your own certificate on the device and mitm
👍🏾 2
2:19 PM
or you could use something like frida injected into the app to examine memory or mitm function calls
👍🏾 1
Avatar
Avatar
rayeh
or you could use something like frida injected into the app to examine memory or mitm function calls
could you elaborate on MITM (Man in the Middle) function calls as in the source code of the app ? (edited)
Avatar
I can't go into great detail as my exposure is limited to conference talks, but you can use it to debug functions the program defines- so for example if you identified the function that does the HTTP request you could inspect what URL, cookies, etc are passed to that function- or the returned object.
Avatar
Avatar
$CozyBear
Hello everyone, I was wondering if you can view a https handshake communicating with a restful API endpoint (Firebase), using Wireshark of a particular video streaming based app on android for investigative purposes. Is there any document around this, struggling to find some resources around this ? (edited)
Depends
😞 1
Avatar
Avatar
$CozyBear
could you elaborate on MITM (Man in the Middle) function calls as in the source code of the app ? (edited)
Deleted User 2/5/2023 8:31 PM
Install interceptor-ng on your android device to carry out a MITM and get you started. Package lives on the Kali Nethunter store app.
Avatar
Hey guys. I have two exhibits. A micro Sd card and a PC. I am trying to prove that the micro Sd card has been plugged into the PC in the past but I’m struggling to prove that as searches for the serial number don’t appear on the PC exhibit. May I ask what procedure you guy’s generally do for providing external devices were connected in the past? Maybe some key under registry?
Avatar
does anyone knows a cloud GPU solution where hashcat is allowed ?
Avatar
Avatar
Yuto
does anyone knows a cloud GPU solution where hashcat is allowed ?
Is It Done Yet? 2/6/2023 2:16 AM
Have you tried https://shadow.tech/en-gb/ ? I am not sure if they allow hashcat though
Avatar
will look into that, thx
Avatar
Avatar
Yuto
will look into that, thx
Is It Done Yet? 2/6/2023 2:23 AM
Monthly subscription fee, obviously dependent on your needs.
Avatar
looks pretty expensive compared to other solutions. also, we won't need any graphical interface, and shadows seems to be pretty "gamer" driven
Salute 1
2:26 AM
but since it looks like a "personal computer", I guess I should be able to use whatever software (hashcat) I want
Avatar
maybe look at aws idk if hashcat is allowed but i guess it should... https://aws.amazon.com/ec2/elastic-graphics/pricing/?nc1=h_ls
2:31 AM
https://www.eiken.dev/blog/2022/03/cracking-with-hashcat-in-the-cloud/ This guy did some hashcat on aws so i guess it should be ok ^^
Thanks to the global chip shortage, for about two years certain electronic items are really hard to buy. This includes graphics cards, those things that make your display useful. They’re also beasts at cracking password hashes. Admittedly, I waited for the situation to resolve so I can buy a graphics card for a sane price and improve my hashcat ...
Avatar
yeah, that looks more suited to our need
Avatar
Avatar
Yuto
does anyone knows a cloud GPU solution where hashcat is allowed ?
CyberGhost 2/6/2023 6:05 AM
I've used AWS, in a similar way that is described in this SANS article. https://www.sans.org/blog/password-hash-cracking-amazon-web-services/
This article will discuss the use of cracking cloud computing resources in Amazon Web Services (AWS) to crack password hashes.
6:06 AM
I have not used this other then in a lab, but NPK is another potential solution: https://github.com/c6fc/npk . It also uses AWS
A mostly-serverless distributed hash cracking platform - GitHub - c6fc/npk: A mostly-serverless distributed hash cracking platform
Avatar
Has anyone had any success obtaining a secure folder password from a Samsung using the cellebrite extraction?
Avatar
Avatar
Yuto
does anyone knows a cloud GPU solution where hashcat is allowed ?
chick3nman 2/6/2023 8:46 AM
I usually use AWS
8:46 AM
though for less critical stuff, Vast.ai is cheaper
Avatar
CasuallyJoseph 2/6/2023 10:55 AM
Is there a way to use a physical axiom dongle to verify licensing for an Azure VM? I find that with bigger cases, having an expanding drive is nice so I don’t have to have a dedicated server. Unless anyone else has any tips or tricks they’d like to offer. I’m at a loss at this point
Avatar
Telegram..anyone have Law Enforcement contact info for this application. I need to serve a search warrant.
Avatar
Avatar
ForensicDev
I was asked to create a directory/file inventory on a live MacBook. We have Recon ITR, yet I don't see any option to just grab a directory/file inventory. How would I accomplish such a task? I am not afraid to use CLI if that is what needs to happen. Ideally, the output should be a CSV where one line represents the full path (incl. file name), size, MACBs, etc.
Chris-SUMURI 2/6/2023 11:38 AM
Hey there, ITR wouldn’t necessarily be able to export a file listing like that on its own, but you should be able to do that with RECON LAB using its super timeline feature. If you DM me I can send over a list of instructions on how to accomplish it or point you in the right direction
Avatar
Avatar
JNewman74
Telegram..anyone have Law Enforcement contact info for this application. I need to serve a search warrant.
Good luck! Telegram doesn't work with LE so far as I know (edited)
this 3
Avatar
Hi all, probably @Andrew Rathbun I am reviewing a case where it is believed an individual downloaded company data and sent the data elsewhere. The file in question is Downloads.zip. I am looking in $MFT_Output in TLE, I have that file with .lnk only. Should I not see the actual(target) file show up in $MFT? I looked in $J as well and see no hits for downloads.zip. No zone identifier on this file either
Avatar
Avatar
CyberTend
Hi all, probably @Andrew Rathbun I am reviewing a case where it is believed an individual downloaded company data and sent the data elsewhere. The file in question is Downloads.zip. I am looking in $MFT_Output in TLE, I have that file with .lnk only. Should I not see the actual(target) file show up in $MFT? I looked in $J as well and see no hits for downloads.zip. No zone identifier on this file either
Andrew Rathbun 2/6/2023 11:46 AM
Do you have SRUM on that system? If so, and the event happened in the last 30 days or so, check SRUM Network Usages output to see if you see bytes outgoing via some proces of interest
11:46 AM
Does $J go back far enough to cover the timeframe of the event?
11:49 AM
Any third party storage providers in play, like OneDrive, Dropbox, Google Drive, etc?
Avatar
Avatar
Andrew Rathbun
Do you have SRUM on that system? If so, and the event happened in the last 30 days or so, check SRUM Network Usages output to see if you see bytes outgoing via some proces of interest
Ok, I will check SRUM, this is within the last 30 days of the image. Image date is 18NOV, Day in question is 27OCT. You are correct on $J, it does not go back that far. OneDrive is in play. No dropbox or Google Drive
Avatar
Avatar
CyberTend
Ok, I will check SRUM, this is within the last 30 days of the image. Image date is 18NOV, Day in question is 27OCT. You are correct on $J, it does not go back that far. OneDrive is in play. No dropbox or Google Drive
Andrew Rathbun 2/6/2023 11:54 AM
Possibly check out OneDrive Explorer by @Beercow as maybe that can help make better sense of those artifacts. One other idea is to check Volume Shadow Copies and see if $J will go further back. Long shot, but answer is no if you don't try
11:55 AM
If there's no Zone.Identifier, then maybe the data wasn't downloaded? Downloads.zip to me sounds like selecting a bunch of files in your Downloads folder, adding to archive, and not changing the filename. Maybe the zip file itself was created on disk, and not downloaded. Unless you know something I don't haha
Avatar
Avatar
CyberTend
Ok, I will check SRUM, this is within the last 30 days of the image. Image date is 18NOV, Day in question is 27OCT. You are correct on $J, it does not go back that far. OneDrive is in play. No dropbox or Google Drive
You could also check the $MFT shadow copies maybe...
Avatar
Avatar
Villano
You could also check the $MFT shadow copies maybe...
@Andrew Rathbun Shadow copies are another weird item noted in this investigation. The shadow copies are 11OCT, 13OCT, 17OCT and 24OCT. None of these produced a $J. They are all exactly the same size. I am looking for artifacts on 27OCT... I will pull the data into OneDrive Explorer as well.
Avatar
Avatar
CyberTend
@Andrew Rathbun Shadow copies are another weird item noted in this investigation. The shadow copies are 11OCT, 13OCT, 17OCT and 24OCT. None of these produced a $J. They are all exactly the same size. I am looking for artifacts on 27OCT... I will pull the data into OneDrive Explorer as well.
OneDrive should have up to 30 days worth of data. If you need any assistance, I’d be happy to help.
💯 1
👍 1
Avatar
Andrew Rathbun 2/6/2023 12:07 PM
One other thing I can think of is to throw all the NTUSER, SOFTWARE, SYSTEM, etc hives into Registry Explorer and search for Downloads.zip and hope you find something you can pivot on in relation to that file and what might've been done with it
Avatar
Avatar
Andrew Rathbun
One other thing I can think of is to throw all the NTUSER, SOFTWARE, SYSTEM, etc hives into Registry Explorer and search for Downloads.zip and hope you find something you can pivot on in relation to that file and what might've been done with it
Thanks guys, I will give both of these a shot
Avatar
Avatar
JNewman74
Telegram..anyone have Law Enforcement contact info for this application. I need to serve a search warrant.
It's highly likely that you will not get any data from them. Their policy is they only give IP and phone number, and it has to be a confirmed terror suspect to get that info.
Avatar
Avatar
Mr.Robot
Good luck! Telegram doesn't work with LE so far as I know (edited)
K thanks..that's what I getting
Salute 1
Avatar
Avatar
CyberGhost
It's highly likely that you will not get any data from them. Their policy is they only give IP and phone number, and it has to be a confirmed terror suspect to get that info.
Copy that..thanks
Avatar
Hey guys quick question. I’m unsure if this is the right channel, but I have an external hard drive that mount anymore but it shows in disk utility and such. Basically I used TestDisk and this is what I now see. I bought a new drive in an attempt to transfer the data so how would I go about this? I’m confused on how to copy the sectors or whatever to a new drive cus when I clicked “P” from the first image it wouldn’t allow me to see my files.
Avatar
Avatar
bengaka
Hey guys quick question. I’m unsure if this is the right channel, but I have an external hard drive that mount anymore but it shows in disk utility and such. Basically I used TestDisk and this is what I now see. I bought a new drive in an attempt to transfer the data so how would I go about this? I’m confused on how to copy the sectors or whatever to a new drive cus when I clicked “P” from the first image it wouldn’t allow me to see my files.
Could you repost in #data-recovery? 🙂
Avatar
Will do thanks
👌 1
Avatar
Hi! Do anyone know of any good offline tool that can transcript (speech to text) the Arabic language? I have a lot of WA voice messages that I need to translate later on. Please tag me in your response so I don't miss out on your answer. Thanks!
Avatar
hello!
👋 1
Avatar
Avatar
nj_crtn
Has anyone had any success obtaining a secure folder password from a Samsung using the cellebrite extraction?
I believe Premium is the only method to BF it.
Avatar
Avatar
Yuto
yeah, that looks more suited to our need
AWS does not let you create large instance by default. I had to submit a ticket to identify the instances I want with justifications. This took couple days...so don't count on any instant access to super powerful instances. (edited)
Avatar
Anyone in here experienced with Blind SQLi Injection? and mind giving me a little bit of direction on what to try next?
Avatar
Avatar
Rock3t
Anyone in here experienced with Blind SQLi Injection? and mind giving me a little bit of direction on what to try next?
Andrew Rathbun 2/6/2023 7:56 PM
I'm not saying you can't talk about red team stuff here but you may have better luck on the SANS Red Team server or some of the other more offensive minded servers. This is largely a blue team server but maybe someone will know!
Avatar
Avatar
Rock3t
Anyone in here experienced with Blind SQLi Injection? and mind giving me a little bit of direction on what to try next?
is it for a CTF? we can chat in #challenges-and-ctfs if it is
Avatar
SpaceInvader 🇦🇺 2/6/2023 10:53 PM
hey all, I'm trying to trace what injected into svchost.exe in M365 Defender logs. Anyone here familiar with what exactly should I look for?
Avatar
@wadde - Have a look at Whisper - https://openai.com/blog/whisper/ (edited)
We’ve trained and are open-sourcing a neural net called Whisper that approaches human level robustness and accuracy on English speech recognition. Read Paper View Code View Model Card Whisper examples: Reveal Transcript Whisper is an automatic speech recognition (ASR) system trained on 680,000 hours of ...
Avatar
Avatar
MSAB_Adam
@wadde - Have a look at Whisper - https://openai.com/blog/whisper/ (edited)
I will, thank you! 🙏🏻
Avatar
Sent you a DM @wadde
Avatar
Avatar
chick3nman
I usually use AWS
thx for the advice
Avatar
Avatar
SpaceInvader 🇦🇺
hey all, I'm trying to trace what injected into svchost.exe in M365 Defender logs. Anyone here familiar with what exactly should I look for?
DeeFIR 🇦🇺 2/7/2023 1:28 AM
Local logs on the endpoint or EDR logs via the defender portal?
Avatar
Avatar
DeeFIR 🇦🇺
Local logs on the endpoint or EDR logs via the defender portal?
SpaceInvader 🇦🇺 2/7/2023 1:50 AM
the EDR logs in Microsoft 365 Defender portal
1:50 AM
I was looking for a comprehensive doco on the event logs Defender collects on process injection techniques
Avatar
Hello everyone!
👋🏻 6
catwave 1
Avatar
Evening all, just a quick one. I’m trying to see mobile devices with location data. If I connect these devices to my mobile hotspot, will they get the location from their own GPS or via the WiFi and GPS? Thanks
11:55 AM
And if anyone knows a great way to seed data on mobiles such as iOS and Android, let me know as I’m creating some validation devices for use in our lab
Avatar
Avatar
Fierry
This is a very difficult thing to get right with raw investigation data due to the number of events that are going to be present in the timeline. I'd recommend building a timeline based on your case notes and the questions you're asking during the investigation. One tool that can aid in this regard is Aurora, developed by Matthias Fuchs https://github.com/cyb3rfox/Aurora-Incident-Response
Thanks, definitely checking this out! I don’t mind doing my own tools and dev but there are so many lesser known jewels in forensics especially, I knew it was worth asking around lol
Avatar
Avatar
obi95
Evening all, just a quick one. I’m trying to see mobile devices with location data. If I connect these devices to my mobile hotspot, will they get the location from their own GPS or via the WiFi and GPS? Thanks
facelessg00n 2/7/2023 6:57 PM
Depends. There are many ways mobile devices obtain their location. GPS. Wifi / Bluetooth or other network artifacts. If the phone is not in flight mode etc I would hazard a guess it would get a fix from the towers it can see and then a fine fix from Bluetooth beacons / wifi it can see
Avatar
Just to make sure this group is for all digital forensics personnel correct? So say civilians who do digital forensics are allowed?
Avatar
There’s no additional validation of roles beyond what users say at this moment in time. As a result you should refrain from discussions of sensitive TTPs. However if you want to collaborate with other members, LE or otherwise, we suggest you validate who they are and communicate privately through methods of your own choosing.
💯 2
Avatar
Understood. I just wanted to invite a friend who does digital forensics for police but she is a civilian and wanted to make sure that’s okay. She’s a certified forensic examiner and deals with the same sensitive data but I know it asked me when I joined.
Avatar
Oh yeah we don’t make the distinction between sworn or unsworn 🙂
Avatar
Many of us are unsworn, I swear! Lol
Salute 4
Avatar
facelessg00n 2/8/2023 1:59 PM
Does anyone know if there is a way to set export templates for @Cellebrite PA, or can we use Python for this? I need a template just to export certain categories of data (I.e. calls, contacts, messages , device info ) to excel so the user doesn’t have to tick the boxes every time.
Avatar
Avatar
facelessg00n
Does anyone know if there is a way to set export templates for @Cellebrite PA, or can we use Python for this? I need a template just to export certain categories of data (I.e. calls, contacts, messages , device info ) to excel so the user doesn’t have to tick the boxes every time.
digital Bowles 2/8/2023 2:38 PM
If you find a way please share. I have been doing it very long way. A short cut would be great
Avatar
kparlier13039 2/8/2023 2:47 PM
Does anyone have experience with com.apple.rapport? Trying to verify what the Service: RPIdentity-FriendAccount is for. We have our theory but trying to see if we can find documentation regarding same
Avatar
Surprised at how low detection rate Carbon Black is compared to the rest
Avatar
For events in Microsoft 365 defender that are tagged "Multiple failed user logon", is it possible to find information about the credentials used? Etc. is it possible to see if it is different password for each request?
Avatar
Beyond the microsd card, does anyone here have experience forensically imaging a flipper zero with an enabled pin lock?
👀 1
Avatar
Is anyone from iPad Rehab on this channel or generally on this server? Does anyone know?
Avatar
Avatar
luis511_
Is anyone from iPad Rehab on this channel or generally on this server? Does anyone know?
@Jessa is, might ask her via PM
Avatar
Ok. Thanks.
Avatar
ForensicDev 2/9/2023 2:50 PM
With Window 10+ updating the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\InstallDate when the feature updates are installed and clearing out event logs, it clearly messes with the identification of the original OS install date/time. Has any one identified any other registry keys that maintain the original and true OS install date? For reference, I came across this article some time ago (https://az4n6.blogspot.com/2017/02/when-windows-lies.html). Unfortunately the suggested registry key "Setup\Source OS" in the SYSTEM hive does not exist on the machine in question.
Avatar
When using a test device to validate findings, are you submitting anything from the test device to evidence or just reporting on what you found?
Avatar
Andrew Rathbun 2/9/2023 5:58 PM
@luis511_@Arcain https://discord.gg/knqkXntQZT might be an option, too
Invite to join a server
👍 1
Avatar
Avatar
d0uch3bag
For events in Microsoft 365 defender that are tagged "Multiple failed user logon", is it possible to find information about the credentials used? Etc. is it possible to see if it is different password for each request?
Not that I am aware of
Avatar
Avatar
FullTang
When using a test device to validate findings, are you submitting anything from the test device to evidence or just reporting on what you found?
DeeFIR 🇦🇺 2/9/2023 7:52 PM
I’d personally archive the relevant artefacts (if possible and within reason), as well as your examination/analysis notes. That way your process and results are verifiable and reproducible if it’s brought into question (by referencing results of your own experiment). As to whether the entire device is entered as evidentiary property, I figure that would depend on the nature of the job, the difficulty in reproducing that data or constructing the same environment again. If you’re relying on multiple artefacts across an entire device and not just a singular artefact like a database or a config file or whatever, then again, depending on the complexity and nature of the job I’d consider entering the entire device into property.
👍 1
Avatar
Avatar
ForensicDev
With Window 10+ updating the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\InstallDate when the feature updates are installed and clearing out event logs, it clearly messes with the identification of the original OS install date/time. Has any one identified any other registry keys that maintain the original and true OS install date? For reference, I came across this article some time ago (https://az4n6.blogspot.com/2017/02/when-windows-lies.html). Unfortunately the suggested registry key "Setup\Source OS" in the SYSTEM hive does not exist on the machine in question.
JLindmar (83AR) 2/10/2023 8:07 AM
There is also a 4-byte encoded timestamp at offset 33 in the "DigitalProductId" value that reflects when the OS install process started (InstallDate & InstallTime reflect when the OS installation process reaches a point requiring user input). I don't recall if it remains static, and it will also be dependent on the accuracy of the system clock when the installation process started. (edited)
👍 1
Avatar
Hi there, is anybody out there who has access to Sony TISS portal? I need a "LOCAL.UPG" file.
Avatar
Hi, external xbox extended storage, can it be plugged into any xbox to be read or does it need to be the same model as the home device?
👀 1
Avatar
Does anyone know how to get ftkimagercli these days? seems to be gone from access data site
Avatar
Avatar
mack3701
Does anyone know how to get ftkimagercli these days? seems to be gone from access data site
I can send you a 32-bit CLI version if you want.
👍 1
Avatar
Avatar
FullTang
I can send you a 32-bit CLI version if you want.
That would be great
Avatar
Avatar
mack3701
That would be great
DM incoming
Avatar
Avatar
Andrew Rathbun
I'm not saying you can't talk about red team stuff here but you may have better luck on the SANS Red Team server or some of the other more offensive minded servers. This is largely a blue team server but maybe someone will know!
copy that.
Avatar
Hi, does anyone know a software i can use to securely extract a youtube video for purposes of preserving it forensic evidence?
Avatar
Avatar
Witty_anns
Hi, does anyone know a software i can use to securely extract a youtube video for purposes of preserving it forensic evidence?
Andrew Rathbun 2/11/2023 12:38 AM
https://www.4kdownload.com/34 I've used this before for YouTube. Worked great. Cheap too
Free and useful applications for all modern platforms. Download video, audio, subs from YouTube, grab photos from Instagram, make slideshows and much more!
👍 2
Avatar
Avatar
Andrew Rathbun
https://www.4kdownload.com/34 I've used this before for YouTube. Worked great. Cheap too
Thank you so much Andrew. Let me check it out.
Avatar
Avatar
Witty_anns
Hi, does anyone know a software i can use to securely extract a youtube video for purposes of preserving it forensic evidence?
Digitalferret 2/11/2023 11:33 AM
how do you mean, like, download from youtube site, or extract a saved / cached video from device? i use this addon in Firefox. it opens up a clickable pane multi format/quality, and you can copy the link if you want to download via alternate means. i use aria2c which seems to be quicker thandirectly from the browser (edited)
11:34 AM
Avatar
Deleted User 2/11/2023 12:03 PM
Hey, what's the most viable VM for Forensics tests / practice / investigations?
Avatar
Avatar
Witty_anns
Hi, does anyone know a software i can use to securely extract a youtube video for purposes of preserving it forensic evidence?
A youtube-dl fork with additional features and fixes - GitHub - yt-dlp/yt-dlp: A youtube-dl fork with additional features and fixes
3:17 PM
Best way to download anything over the net, works with Packt too
Avatar
Avatar
Deleted User
Hey, what's the most viable VM for Forensics tests / practice / investigations?
The one you’re most comfortable with
3:18 PM
Ubuntu, Kali, Fedora, Debian they all good. 😀
3:20 PM
For me personally, Kali. I’m most comfortable with it and I can use it for anything , red team blue team, osint , malware analysis, development , you name it , as a rolling distro and a great kernel it’s a great choice. But to each their own, I also use flare vm on a windows dev box too.
3:21 PM
I also like Ubuntu and Fedora. Opensuse and Arch. Debian of course.
3:21 PM
One distro I do not like is ParrotOS
3:22 PM
😆
Avatar
Deleted User 2/11/2023 3:23 PM
Sounds like UwUntu linux
3:23 PM
;D
Avatar
Ubuntu is great. If that’s what you’re comfortable using
Avatar
Deleted User 2/11/2023 3:23 PM
I'll go for Kali, do you have any light weight hosts?
3:24 PM
Uh, for hosting Kali in a VM that isn't vmbox
Avatar
I’m not sure what you mean by light weight hosts
Avatar
Deleted User 2/11/2023 3:24 PM
I find it complicated to set up an os in
Avatar
I use VMware workstation pro but virtualbox is just fine
3:25 PM
I’d probably just recommend virtualbox
3:25 PM
It’s pretty easy to use
Avatar
Deleted User 2/11/2023 3:25 PM
👍
Avatar
Unless you’re on a Mac
3:25 PM
Then UTM
👍 1
Avatar
Deleted User 2/11/2023 3:26 PM
Gotcha, thanks for recommendations :)
Avatar
No problem 😉
3:26 PM
Back to my nap 😴
Avatar
Avatar
Deleted User
Sounds like UwUntu linux
Deleted User 2/11/2023 3:26 PM
BTW look this one up later, it's the funniest ubuntu ripoff
Avatar
No I’m ok thanks 🙏
3:27 PM
I don’t view anything with uwu included in the name
PepeLaugh 1
3:27 PM
😂
Avatar
Deleted User 2/11/2023 3:27 PM
;D
Avatar
Even typing that out just now was cringe
Avatar
Deleted User 2/11/2023 3:28 PM
Worth it
Avatar
Unlikely
Avatar
Avatar
ryd3v
Ubuntu, Kali, Fedora, Debian they all good. 😀
Dont forget tsurugi, New Kid on the block
💯 2
Avatar
Never tried. But I’ll check it out 😀
Avatar
Deleted User 2/12/2023 5:38 AM
Hey, got a question about OneDrive Personal vault Forensics (if any) The computer has a OneDrive personal vault with a malware in it, I don't know the PID to unlock it but I know the path of the .exe, is there any way to extract it from there to c:\temp for example? And let's per say the executable has been replaced from a different device (like a phone), what could be done about it?
Avatar
Avatar
Deleted User
Hey, got a question about OneDrive Personal vault Forensics (if any) The computer has a OneDrive personal vault with a malware in it, I don't know the PID to unlock it but I know the path of the .exe, is there any way to extract it from there to c:\temp for example? And let's per say the executable has been replaced from a different device (like a phone), what could be done about it?
That is something I have not looked into. May not be helpful now but time for some more research.
👍 2
Avatar
Avatar
Deleted User
Hey, what's the most viable VM for Forensics tests / practice / investigations?
SANS SIFT workstation is a good start, Ubuntu based. Comes preinstalled with many opensource DFIR tools. https://www.sans.org/tools/sift-workstation/
Download the SIFT Workstation to receive free open-source incident response and digital forensic tools designed to perform detailed digital forensic examinations in a variety of settings.
👍 1
Avatar
The latest Macbook with Apple M1/M2 seems to have issues with virtualisation (fusion/virtualbox etc.). SIFT not working on latest Apple M2 processors- Any suggestions ?
Avatar
The M1/M2 chips are a different architecture. Until Apple gets good at x64 cpu emulation, they will not work. Been an issue for a while. Only thing I can suggest, if you are only Mac, is get one just before they went to the M1 chipset.
Avatar
Avatar
Witty_anns
Hi, does anyone know a software i can use to securely extract a youtube video for purposes of preserving it forensic evidence?
JLindmar (83AR) 2/13/2023 5:54 AM
Avatar
Avatar
venkat
The latest Macbook with Apple M1/M2 seems to have issues with virtualisation (fusion/virtualbox etc.). SIFT not working on latest Apple M2 processors- Any suggestions ?
hamish_the_piper 2/13/2023 6:51 AM
You can run SIFT in a docker instance. https://github.com/teamdfir/sift-dockerfiles
A collection of Dockerfile instruction files uses to build docker images that pertain to SIFT - GitHub - teamdfir/sift-dockerfiles: A collection of Dockerfile instruction files uses to build docker...
6:52 AM
You can also install SIFT via CLI on top of an existing distro, but I'm not sure if it'll work on top of say a ubuntu or debain ARM install on Apple Silicon.
🥂 1
6:52 AM
CLI tool to manage a SIFT Install. Contribute to teamdfir/sift-cli development by creating an account on GitHub.
Avatar
Does anyone know approximately how much it costs them to add the ability to use their Cellebrite dongle while connected to their machine via RDP? (edited)
Avatar
@abefroman pretty sure it's free, although that was the case during covid-19
Avatar
Avatar
venkat
The latest Macbook with Apple M1/M2 seems to have issues with virtualisation (fusion/virtualbox etc.). SIFT not working on latest Apple M2 processors- Any suggestions ?
Use UTM
Avatar
Question, would there be any particular need to convert pcap data to JSON ? Like I get it's for reporting for wtv. What are the benefits of converting it when you already have PCAP data given in the file itself ? (edited)
Avatar
actually wait you convert into HAR file format in debugger which is essentially based on a JSON schema ? but this is PCAP, that's a no go.
Avatar
JLindmar (83AR) 2/13/2023 1:17 PM
Anyone using M.2 NVMe in a RAID configuration? I'm in the process of rebuilding my analysis computers, have three, 2TB M.2 NVMe and I'm going back and forth with either using them as independent disks or configuring them as a RAID0. I already have a 12TB HDD RAID10 onboard, so the NVMe's will be used for temp processing (e.g. XWF, Physical Analyzer, etc.), etc. Trying to avoid parity configurations (e.g. RAID5) in order to limit program/erase cycles.
Avatar
Avatar
dsplice
The M1/M2 chips are a different architecture. Until Apple gets good at x64 cpu emulation, they will not work. Been an issue for a while. Only thing I can suggest, if you are only Mac, is get one just before they went to the M1 chipset.
Got to know about this incompatibility after purchasing M2 😃
Avatar
Avatar
ryd3v
Use UTM
Tried it- no success
Avatar
Avatar
venkat
Got to know about this incompatibility after purchasing M2 😃
Honestly the M1 and M2 chips have surprised me (in very good ways) but it reminded me of when Apple went from PowerPC chips, to intel
Avatar
Avatar
hamish_the_piper
You can run SIFT in a docker instance. https://github.com/teamdfir/sift-dockerfiles
Thanks, will give it a try
5:42 PM
Just happened to see this statement from SANS Website: " CRITICAL NOTE: Apple systems using the M1 processor line cannot perform the necessary virtualization functionality and therefore cannot in any way be used for this course."
Avatar
Avatar
venkat
Tried it- no success
What did you try? I’ve used it with no issues.
5:44 PM
I even have YouTube videos using it , even with older vulnhub images 😆
Avatar
That's great ! Would you mind sharing few tips how you did it, please
5:57 PM
@ryd3v
Avatar
Avatar
venkat
That's great ! Would you mind sharing few tips how you did it, please
Sure you can start with this one https://youtu.be/bLMALCIeVb0
Avatar
did anyone solved ssrf in vAPI
Avatar
Avatar
ManishDTS
did anyone solved ssrf in vAPI
DeeFIR 🇦🇺 2/13/2023 8:03 PM
Probably won't find a lot of help in here for a bug bounty (assuming that's what you're asking about). If it's not, perhaps a little more context to your question would help.
Avatar
vAPI is vulnerable API lab in which there is one challenge name ssrf. i was unable to solve that
Avatar
DeeFIR 🇦🇺 2/13/2023 8:10 PM
🤣 2
Avatar
Avatar
ManishDTS
vAPI is vulnerable API lab in which there is one challenge name ssrf. i was unable to solve that
What does ssrf stand for?
Avatar
DeeFIR 🇦🇺 2/13/2023 8:11 PM
Server side request forgery
Avatar
Avatar
ManishDTS
vAPI is vulnerable API lab in which there is one challenge name ssrf. i was unable to solve that
DeeFIR 🇦🇺 2/13/2023 8:11 PM
#challenges-and-ctfs
💯 1
Avatar
Avatar
ryd3v
Sure you can start with this one https://youtu.be/bLMALCIeVb0
Thanks
Avatar
No problem 😉
Avatar
Avatar
DeeFIR 🇦🇺
Server side request forgery
I was trying to help without directly giving the answer. I guess I should have pointed to the proper channel lol. (edited)
Avatar
Avatar
FullTang
I was trying to help without directly giving the answer. I guess I should have pointed to the proper channel lol. (edited)
DeeFIR 🇦🇺 2/13/2023 10:01 PM
Oh sorry, I thought you were genuinely asking 🥲
Avatar
Avatar
DeeFIR 🇦🇺
Oh sorry, I thought you were genuinely asking 🥲
I can totally see that now when I reread my original post! 🥸
Avatar
MrMacca (Allan Mc) 2/14/2023 4:53 AM
Does anybody know what the following file does, or how it is created on a Hauwei device? \data\user_de\0\com.huawei.systemmanager\files\o_c_utc.dat The contents of the file is basically a list files that are no longer present on the device, and folder structures which are no longer on the device. However they are all folders relating to a wide variety of communication applications that we are interested in. Is it an index of files that were present on the device at the time? Any advice is greatly appreciated.
Avatar
chrisforensic 2/14/2023 9:22 AM
good evening @Oxygen Forensics will there be a new version released in the next days? 🙂 i saw, the driverpack was updated yesterday... so maybe (edited)
Avatar
Avatar
abefroman
Does anyone know approximately how much it costs them to add the ability to use their Cellebrite dongle while connected to their machine via RDP? (edited)
During COVID, I asked Cellebrite Support and they activate the dongle for RDP. Dont know if it still free.... (edited)
Avatar
Avatar
JLindmar (83AR)
Anyone using M.2 NVMe in a RAID configuration? I'm in the process of rebuilding my analysis computers, have three, 2TB M.2 NVMe and I'm going back and forth with either using them as independent disks or configuring them as a RAID0. I already have a 12TB HDD RAID10 onboard, so the NVMe's will be used for temp processing (e.g. XWF, Physical Analyzer, etc.), etc. Trying to avoid parity configurations (e.g. RAID5) in order to limit program/erase cycles.
James Pedersen 2/14/2023 3:58 PM
@JLindmar (83AR) Why would you use RAID0? You don't get any fault-tolerance when you use RAID0: See https://en.wikipedia.org/wiki/Standard_RAID_levels (edited)
In computer storage, the standard RAID levels comprise a basic set of RAID ("redundant array of independent disks" or "redundant array of inexpensive disks") configurations that employ the techniques of striping, mirroring, or parity to create large reliable data stores from multiple general-purpose computer hard disk drives (HDDs). The most com...
Avatar
Avatar
James Pedersen
@JLindmar (83AR) Why would you use RAID0? You don't get any fault-tolerance when you use RAID0: See https://en.wikipedia.org/wiki/Standard_RAID_levels (edited)
JLindmar (83AR) 2/14/2023 4:03 PM
I wasn't necessarily as interested in fault tolerance as I was in speed and capacity, while again trying to reduce the number of program/erase cycles on the SSDs to avoid premature wear out. I am open to other suggestions, but my RAID controller is limited on the configurations it supports.
Avatar
Avatar
chrisforensic
good evening @Oxygen Forensics will there be a new version released in the next days? 🙂 i saw, the driverpack was updated yesterday... so maybe (edited)
Oxygen Forensics 2/14/2023 11:36 PM
Hello, I am back, sorry for the late reply 🙂 The update will come out today morning EST timeSalute
Salute 1
Avatar
Other than Cellebrite and Spreadsheet viewers, what other tools can open Discord warrant returns in a more readable format? (edited)
Avatar
Avatar
Oxygen Forensics
Hello, I am back, sorry for the late reply 🙂 The update will come out today morning EST timeSalute
chrisforensic 2/15/2023 6:01 AM
thanks 😉 downloading right now 👍
Salute 1
Avatar
Hi folks! Suggest me please free software which has capability to upload persons photo and it search similar images in the forensics image or physical drive?
Avatar
Avatar
GRIZZ
Other than Cellebrite and Spreadsheet viewers, what other tools can open Discord warrant returns in a more readable format? (edited)
I haven't tried it, but RLEAPP does have scripts to parse Discord returns. https://github.com/abrignoni/RLEAPP/tree/main/scripts/artifacts
Returns Logs Events And Properties Parser. Contribute to abrignoni/RLEAPP development by creating an account on GitHub.
👍 1
Avatar
Avatar
FullTang
I haven't tried it, but RLEAPP does have scripts to parse Discord returns. https://github.com/abrignoni/RLEAPP/tree/main/scripts/artifacts
@GRIZZ depends on the output file but RLEAPP should handle CSV and some other attachment types, I've never seen how the return files look but I know @Brigs has (edited)
Avatar
chrisforensic 2/15/2023 7:41 AM
thanks fly to @Oxygen Forensics for support decoding modified whatsapp versions oxygen 💯 and ofcourse for the new bruteforce things 🙂 (edited)
Salute 3
Avatar
Avatar
chrisforensic
thanks fly to @Oxygen Forensics for support decoding modified whatsapp versions oxygen 💯 and ofcourse for the new bruteforce things 🙂 (edited)
Where can i read the release note. I cant find it in an obvious place. (edited)
Avatar
Avatar
florus
Where can i read the release note. I cant find it in an obvious place. (edited)
Oxygen Forensics 2/15/2023 8:25 AM
Check out the new updates and features that have been added to v.15.2: Brute force for Samsung and Huawei devices, enhanced support for Huawei devices, LastPass cloud extraction, import of Tinder archives, and support for modified WhatsApp versions
Avatar
Avatar
GRIZZ
Other than Cellebrite and Spreadsheet viewers, what other tools can open Discord warrant returns in a more readable format? (edited)
Sent you a PM
👍 1
Avatar
Deleted User 2/15/2023 9:50 AM
Please can someone from ICAC DM me. Need an assist. Thanks.
Avatar
Avatar
Deleted User
Please can someone from ICAC DM me. Need an assist. Thanks.
Andrew Rathbun 2/15/2023 12:51 PM
@ICAC
Avatar
Which ICAC?
Avatar
kmacdonald1565 2/15/2023 1:13 PM
region would be helpful to narrow down the legal scope of responsibility
Avatar
Hoping someone can help me find the minimum/recommended system requirements for celebrite premium? Unable to locate on the website.
Avatar
Avatar
Jam1e480
Which ICAC?
Deleted User 2/15/2023 8:23 PM
Thanks Andrew. USA region please.
Avatar
Avatar
Fuzz
Hoping someone can help me find the minimum/recommended system requirements for celebrite premium? Unable to locate on the website.
Andrew Rathbun 2/15/2023 8:41 PM
May want to ask #mobile-forensic-extractions
Avatar
Avatar
Deleted User
Thanks Andrew. USA region please.
Andrew Rathbun 2/15/2023 8:41 PM
We don't have that granularity with the ICAC roles, unfortunately. Hopefully someone reaches out
👍 1
Avatar
Avatar
Andrew Rathbun
We don't have that granularity with the ICAC roles, unfortunately. Hopefully someone reaches out
Deleted User 2/15/2023 8:46 PM
Thanks everyone checking DM now. Appreciated.
Avatar
if my windows 10 is version 2H22, is that effectively win11 ??
Avatar
Anyone know if media files in a snapchat warrant return have the original date and time stamps maintained, or does snapchat strip this material similar to Facebook?
Avatar
Hello! I'm currently a third year student at Teesside University studying Digital Forensics and as part of my dissertation I am running a survey based around the area of Cloud Forensics. It's a relatively short survey with mostly "tick the box" style questions. If you want to participate please read the attached document and click the survey link attached inside, thank you for your time.
Avatar
Avatar
ddf_dude
if my windows 10 is version 2H22, is that effectively win11 ??
Andrew Rathbun 2/16/2023 8:32 AM
No, it's still Windows 10, it's just the 22H2 code base
👍 1
Avatar
Avatar
Ghosted
Anyone know if media files in a snapchat warrant return have the original date and time stamps maintained, or does snapchat strip this material similar to Facebook?
Andrew Rathbun 2/16/2023 8:32 AM
Are you able to email them to confirm? IIRC they used to be very responsive to questions
👍 1
Avatar
Avatar
Howlo
Hello! I'm currently a third year student at Teesside University studying Digital Forensics and as part of my dissertation I am running a survey based around the area of Cloud Forensics. It's a relatively short survey with mostly "tick the box" style questions. If you want to participate please read the attached document and click the survey link attached inside, thank you for your time.
Ross Donnelly 2/16/2023 10:24 AM
I was going to complete this for you, but noted it's for law enforcement only
👍🏻 1
Avatar
Avatar
Howlo
Hello! I'm currently a third year student at Teesside University studying Digital Forensics and as part of my dissertation I am running a survey based around the area of Cloud Forensics. It's a relatively short survey with mostly "tick the box" style questions. If you want to participate please read the attached document and click the survey link attached inside, thank you for your time.
Digitalferret 2/16/2023 10:30 AM
maybe add the criteria? To be able to take part though you must be a forensic practitioner who works with or for law-enforcement. Unfortunately, you can't take part if you are not currently working with or for law- enforcement.
Avatar
Hi, I know that there will be a presentation on this subject at the next Magnet Summit in March, but I wanted to ask on Discord to learn about some of your experiences... What hardware is best for mainly using Physical Analyzer and AXIOM? Xeon? Threadripper? i9? Ryzen 7000 x3d?
Avatar
Avatar
JSDurand
Hi, I know that there will be a presentation on this subject at the next Magnet Summit in March, but I wanted to ask on Discord to learn about some of your experiences... What hardware is best for mainly using Physical Analyzer and AXIOM? Xeon? Threadripper? i9? Ryzen 7000 x3d?
Whatever I get from NCFI since I can't buy my own gear...
👍🏻 2
Avatar
Avatar
secluding
Does anyone have experience collecting data from a Meta Quest 2 VR headset? (edited)
Any luck with acquiring the Quest 2? Sounds like one might be coming my way
Avatar
Avatar
dfa_adam
Any luck with acquiring the Quest 2? Sounds like one might be coming my way
I was able to do 2 collections 1. I connected it to a write blocker and reviewed the file system, following the steps from this guide: https://dfir.science/2022/04/Oculus-Quest-2-First-Impressions-and-Research-Notes 2. I was able to image the device using axiom's mobile android collection capability Each of the different imaging methods obtained different artifacts. The axiom image had files showing what times games were launched/paused/closed (edited)
👍 1
Avatar
Avatar
secluding
I was able to do 2 collections 1. I connected it to a write blocker and reviewed the file system, following the steps from this guide: https://dfir.science/2022/04/Oculus-Quest-2-First-Impressions-and-Research-Notes 2. I was able to image the device using axiom's mobile android collection capability Each of the different imaging methods obtained different artifacts. The axiom image had files showing what times games were launched/paused/closed (edited)
That's helpful, thanks. I assume yours didn't have an unlock pattern to bypass?
Avatar
Nah, I don't think it is very common. The user has to manually enable it from the settings menu.
Avatar
Okay. Did you try to enable developer mode as well, or just power on, plug in, allow access, and image?
Avatar
I had to enable developer mode to perform the Axiom collection
Avatar
okay, so power on, Settings>System>About>Pairing Code, download app, create and register an oculus developer account, create an organization, refresh app, pair quest 2, Menu>Devices>Developer Mode, restart quest2, plug into writeblocker, allow access, image?
Avatar
I would recommend first imaging on a write blocker without enabling dev mode, and then would enable dev mode and perform the axiom collection (edited)
Avatar
Yep, that makes sense. I'll aim to proceed like that then. May get a tester to run through the process as well. Thanks a lot!
Avatar
I want a test Oculus as well. I don't have a suspect device to download (yet) but I'm supposed to always be prepared, right?
Avatar
Avatar
JLindmar (83AR)
I wasn't necessarily as interested in fault tolerance as I was in speed and capacity, while again trying to reduce the number of program/erase cycles on the SSDs to avoid premature wear out. I am open to other suggestions, but my RAID controller is limited on the configurations it supports.
James Pedersen 2/16/2023 9:33 PM
@JLindmar (83AR) This might be of interest to you: http://www.storagesearch.com/ssdmyths-endurance.html (edited)
👍 1
Avatar
https://www.twitch.tv/producerwolf I am live guys!! just doing some writing and AMA feel free to hop in ((: and dont be afraid to ask -Infosec content 😄
Avatar
Morning/afternoon everyone. Is there a way to recover a users deleted browsing history? In particular for Edge ?
Avatar
Avatar
Calyx
Morning/afternoon everyone. Is there a way to recover a users deleted browsing history? In particular for Edge ?
Yuri Gubanov (Belkasoft) 2/17/2023 3:29 AM
Since it is based on Chromium, I believe the same SQLite recovery methods should work as for any other SQLite databases
Avatar
Avatar
Calyx
Morning/afternoon everyone. Is there a way to recover a users deleted browsing history? In particular for Edge ?
Looking to see if the system has a shadow copy volume would be my first try, might be able to recover it from a point in time before they deleted it.
6:00 AM
(That's assuming it's a Windows system)
Avatar
What kind of madman would install Edge on Linux xD
✋ 1
Avatar
Avatar
ryd3v
What kind of madman would install Edge on Linux xD
There are some strange people in this world 😂
🤣 1
Avatar
Avatar
ryd3v
What kind of madman would install Edge on Linux xD
Digitalferret 2/17/2023 6:56 AM
you could have ended at ..install Edge 🙂
thistbh 1
🤣 5
Avatar
Guys I have a question about transaction regarding NTFS data loss. What does it mean exactly? One definition my professor gave me was that it ensures that volume altering operations are "completed in their entirety or not at all". Still confused and would appreciate an explanation
Avatar
Avatar
Woomir
Guys I have a question about transaction regarding NTFS data loss. What does it mean exactly? One definition my professor gave me was that it ensures that volume altering operations are "completed in their entirety or not at all". Still confused and would appreciate an explanation
Older filesystems don't keep a journal of pending write operations, which can lead to data loss if the system is powered off unexpectedly in the middle of a write to disk. Volatile RAM is much much faster than spinning hard drives, and even SSDs. Writes to disks are not immediate, so ntfs implements a journal of transactions so if the system is unexpectedly powered off on the next boot it can check for transactions in that journal that aren't marked completed and attempt to fix issues that may have been caused by an incomplete write to disk
👍 1
7:40 AM
Impressed with the chatgpt answer though NTFS (New Technology File System) uses a system journal to prevent data corruption in the event of a system crash or unexpected power failure. The system journal is a log file that records all changes made to the file system before they are committed to disk. The journal is stored in a dedicated area of the disk and contains a record of all metadata updates made to the file system. This includes changes to the Master File Table (MFT), file and folder attributes, and security descriptors. When a change is made to the file system, it is first recorded in the journal. The change is not considered complete until it has been recorded in the journal, ensuring that the file system is always in a consistent state. In the event of a system crash or power failure, NTFS can use the information in the journal to roll back any incomplete transactions and restore the file system to a consistent state. The journal is used to complete any transactions that were in progress at the time of the crash, and any incomplete transactions are undone to ensure data consistency. In summary, the NTFS system journal is used to record changes to the file system and ensure that all transactions are completed before they are committed to disk. In the event of a system crash, the journal is used to restore the file system to a consistent state and prevent data corruption.
👌 2
Avatar
Deleted User 2/18/2023 1:32 AM
Hey, so basically I was asked to help the law enforcement in my country, it's about bank transactions; In short - we have the suspect's PC and a list of individual bank transactions that isn't just theirs I managed to filter the suspect's transactions and extract the data they were looking for, but I noticed they transferred money to multiple different accounts so now the enforcements asked me if I could check their conversations within telegram / messenger / Viber, they're logged out from Telegram and Viber, is there a way to export chat data from logged out accounts?
Avatar
thaconnecter 2/18/2023 8:53 AM
@Deleted User if the suspect is using a browser you can't. If the law enforcement agency seized the phone you could access those chat with an acquisition of the suspect phone. If the warrant allow it you could check the saved password in the browser and try to connect remotely and do a takeout. Or you could do a mirror copy of the drive and start the computer with the copy and try to connect to viber, whats app, messenger, etc... and then do a takeout. Good luck
8:53 AM
*if the suspect's using a web browser to access those chat you can't
Avatar
Deleted User 2/18/2023 9:06 AM
Yep, they have Viber and Telegram both installed, at least I can try these, thanks for the help!
Avatar
thaconnecter 2/18/2023 9:07 AM
Which forensic tool are you using
Avatar
Deleted User 2/18/2023 9:07 AM
Will Magnet ram capture be useful for this?
Avatar
thaconnecter 2/18/2023 9:08 AM
has the pc been turned off since the seizure?
Avatar
Deleted User 2/18/2023 9:09 AM
Yeah, it's a laptop that's been used multiple times after
Avatar
thaconnecter 2/18/2023 9:10 AM
who used it?
Avatar
Deleted User 2/18/2023 9:10 AM
The law enforcement, not sure what they did with it during that time
Avatar
thaconnecter 2/18/2023 9:11 AM
🤦
9:11 AM
ram capture wont help you
Avatar
Deleted User 2/18/2023 9:11 AM
Anything with disk manager?
Avatar
thaconnecter 2/18/2023 9:12 AM
i'll dm you
Avatar
Deleted User 2/18/2023 9:12 AM
Alright
Avatar
Deleted User 2/18/2023 9:45 AM
In the meantime, there seems to be an issue with some characters displaying in excel, any clue how to fix these?
Avatar
Avatar
Deleted User
In the meantime, there seems to be an issue with some characters displaying in excel, any clue how to fix these?
Yuri Gubanov (Belkasoft) 2/18/2023 10:35 AM
Specify encoding
Avatar
Deleted User 2/18/2023 10:41 AM
As in, what's the current encoding?
10:41 AM
Or do I have to specify a different encoding
Avatar
is there a section where you can annouce when your stream infsec content?
Avatar
Avatar
Wolf
is there a section where you can annouce when your stream infsec content?
Andrew Rathbun 2/19/2023 11:12 AM
Do it here I guess. Probably the best option (edited)
Avatar
GligarCounter 2/19/2023 11:33 AM
Im torn between my current role as an infrastructure engineer, and a job opportunity i received for active directory management for a hospital. My end goal is to be set in a digital forensics position, so im trying to see if it makes sense to transition to a healthcare environment. My question essentially, are there digital forensic positions in healthcare? Its a pretty big hospital name with several locations. I am just trying to see if working i.t. in a hospital would bring me closer to my goal of becoming a digital forensic examiner, and if it makes sense to stick with the position hoping to pivot into a SOC role, and then into DFIR at the hospital (if they have DFIR), or if im better off building my skills hoping for a DFIR role in the future. Thanks!
Avatar
Avatar
GligarCounter
Im torn between my current role as an infrastructure engineer, and a job opportunity i received for active directory management for a hospital. My end goal is to be set in a digital forensics position, so im trying to see if it makes sense to transition to a healthcare environment. My question essentially, are there digital forensic positions in healthcare? Its a pretty big hospital name with several locations. I am just trying to see if working i.t. in a hospital would bring me closer to my goal of becoming a digital forensic examiner, and if it makes sense to stick with the position hoping to pivot into a SOC role, and then into DFIR at the hospital (if they have DFIR), or if im better off building my skills hoping for a DFIR role in the future. Thanks!
I've seen DFIR roles with hospitals. Some of the larger healthcare networks in my area that are also connected to a University have in house DFIR people. They are a very small group, but that's just my one sample. Every situation is different, but I don't see how it can hurt. If you have IT/infrastructure experience can potentially help you if your goal is to move into digital forensics eventually. Make friends with whoever does IR works now if they do it in house, let it be known you are interested in digital forensics.
12:04 PM
almost at 24 hours lol
Avatar
Avatar
GligarCounter
Im torn between my current role as an infrastructure engineer, and a job opportunity i received for active directory management for a hospital. My end goal is to be set in a digital forensics position, so im trying to see if it makes sense to transition to a healthcare environment. My question essentially, are there digital forensic positions in healthcare? Its a pretty big hospital name with several locations. I am just trying to see if working i.t. in a hospital would bring me closer to my goal of becoming a digital forensic examiner, and if it makes sense to stick with the position hoping to pivot into a SOC role, and then into DFIR at the hospital (if they have DFIR), or if im better off building my skills hoping for a DFIR role in the future. Thanks!
In my experience working for an academic medical center we have had large, continuing growth in cybersecurity headcount over the last decade. I suspect that is similar for for-profit healthcare systems, but it depends on the scale- some may outsource to an MSSP. Internally, there are roles related to incident response and forensics (with a heavy focus on malicious ioc identification for purposes of containment and access of sensitive material). There are also some roles that do digital forensics for the purpose of investigating academic misconduct for example In terms of "is it worth taking the spot just for a path into DFIR", it's hard to make a judgement call on that (edited)
Avatar
밍코 (dead,legacy) 2/19/2023 5:31 PM
Hello. How to bypass bootloader lock of samsung device? Oxygen Detective does it.
5:32 PM
Exynos.
5:33 PM
I think I need to push some code with Odin.
Avatar
Avatar
밍코 (dead,legacy)
Hello. How to bypass bootloader lock of samsung device? Oxygen Detective does it.
Andrew Rathbun 2/19/2023 5:33 PM
#mobile-forensic-extractions
Avatar
밍코 (dead,legacy) 2/19/2023 5:34 PM
ok
Avatar
Hi there, new to this Discord so I apologise if this is the wrong place to ask. Does anyone have any experience examining Xiaomi devices? Specifically the Xiaomi POCO 3 in my case, and the Mi Gallery app?
❤️ 1
Avatar
Avatar
exFAT
Hi there, new to this Discord so I apologise if this is the wrong place to ask. Does anyone have any experience examining Xiaomi devices? Specifically the Xiaomi POCO 3 in my case, and the Mi Gallery app?
DeeFIR 🇦🇺 2/20/2023 1:01 AM
#mobile-forensic-decoding if you post the Android version, device, and APK version you might have some luck.
Avatar
Avatar
DeeFIR 🇦🇺
#mobile-forensic-decoding if you post the Android version, device, and APK version you might have some luck.
Thanks very much!
Avatar
Hi, can anyone suggest to me the relevant study materials for Ec council's CHFI V10 certification exam? I am opting for self study and sit for the exams right away.
Avatar
I am looking for those who have experience with Magnet’s Automate Enterprise. Easy to use? Effective? Issues? Anybody use it to collect full forensic images? Thank you
Avatar
GligarCounter 2/20/2023 2:48 PM
@rayeh @CyberGhost thank you so much. This information actually helped me a lot in my decision, and I appreciate you reaching out!
👍 2
Avatar
Avatar
Wolf
almost at 24 hours lol
Avatar
Avatar
CyberGhost
SANS SIFT workstation is a good start, Ubuntu based. Comes preinstalled with many opensource DFIR tools. https://www.sans.org/tools/sift-workstation/
Last time I used that, it was buggy as hell and a nightmare to update xD
Avatar
Because I can
Avatar
Avatar
rayeh
Impressed with the chatgpt answer though NTFS (New Technology File System) uses a system journal to prevent data corruption in the event of a system crash or unexpected power failure. The system journal is a log file that records all changes made to the file system before they are committed to disk. The journal is stored in a dedicated area of the disk and contains a record of all metadata updates made to the file system. This includes changes to the Master File Table (MFT), file and folder attributes, and security descriptors. When a change is made to the file system, it is first recorded in the journal. The change is not considered complete until it has been recorded in the journal, ensuring that the file system is always in a consistent state. In the event of a system crash or power failure, NTFS can use the information in the journal to roll back any incomplete transactions and restore the file system to a consistent state. The journal is used to complete any transactions that were in progress at the time of the crash, and any incomplete transactions are undone to ensure data consistency. In summary, the NTFS system journal is used to record changes to the file system and ensure that all transactions are completed before they are committed to disk. In the event of a system crash, the journal is used to restore the file system to a consistent state and prevent data corruption.
Yuri Gubanov (Belkasoft) 2/21/2023 3:54 AM
Hi everyone, I created a mini-book on ChatGPT in DFIR. No rocket science inside, but I hope it is entertaining to read. You can request your download at https://belkasoft.com/download-your-free-ebook-on-chatgpt-in-dfir
💯 2
👍 2
Avatar
Avatar
Yuri Gubanov (Belkasoft)
Hi everyone, I created a mini-book on ChatGPT in DFIR. No rocket science inside, but I hope it is entertaining to read. You can request your download at https://belkasoft.com/download-your-free-ebook-on-chatgpt-in-dfir
Digitalferret 2/21/2023 5:08 AM
image 100% nailed it .. across the board, not just DFIR. to err is human, to really %^&k up takes a PC ChatGPT
🤣 1
Avatar
Avatar
Digitalferret
image 100% nailed it .. across the board, not just DFIR. to err is human, to really %^&k up takes a PC ChatGPT
Yuri Gubanov (Belkasoft) 2/21/2023 5:11 AM
Thanks 🙂
Avatar
Digitalferret 2/21/2023 5:12 AM
i suspect this is old(er than we think) technology though , i mean, I've seen political speeches for decades now, in the same vein. sounds great, but factuality can be somewhat hit-&-miss: thruthiness comes to mind
Avatar
Avatar
ryd3v
Last time I used that, it was buggy as hell and a nightmare to update xD
I use it pretty much every day, no more issues when a normal system
🍻 1
Avatar
Deleted User 2/21/2023 9:36 AM
Hey, does anyone know what Appsglobals.txt stores?
9:36 AM
Is it evidence of execution or installed executables and so on
Avatar
huddledfiber 2/21/2023 10:38 AM
I have an iPhone 12 Pro Max from a case from person A. There are 2 chats that contain persons A,B and C. A and B are using the same devices and same numbers for both. However, C has 2 phones and in 1 chat is using his 1st device and in the other chat he's using his 2nd device. In the software they show up as 2 separate chats. Person A had previously provided screen shots to my client that shows messages that came from the separate chats combined together in one "chat". I found out that person A was using iMessage on his iMac to produce the screenshots. I haven't been a Mac user for years, but am wondering how that is possible with 2 separate chats. Does iMessage on the Mac go off the contact names somehow not the chat? My client is looking for an explanation as to how it happened. Anyone have thoughts?
Avatar
Avatar
Deleted User
Hey, does anyone know what Appsglobals.txt stores?
Andrew Rathbun 2/21/2023 10:50 AM
Looks like possibly process IDs? Do any of those correlate with what you're seeing in Task Manager?
Avatar
Deleted User 2/21/2023 11:27 AM
Seems like it stored some processes with their IDs, although it dates far back in 11/08/2022
11:29 AM
And some executables as well
Avatar
Deleted User 2/21/2023 1:48 PM
Anyone knows how to extract NTFS/Journal data from a .raw ram capture? (I'm on Kali)
Avatar
volatility dumpfiles is probably your best bet. list the files, get the offset, -q (offset) --dumpdir=(directory) note: may vary by windows and volatility version (edited)
Avatar
Deleted User 2/21/2023 1:51 PM
👍 thanks!
1:52 PM
*
1:53 PM
Oops nvm :)
Avatar
ah volatility 3. good luck
Avatar
Deleted User 2/21/2023 1:58 PM
Hahaha yeah, heard vol2 is better...
1:58 PM
Seems like sudo apt install python3-capstone did the trick
Avatar
Andrew Rathbun 2/21/2023 4:47 PM
@Deleted User #memory-forensics for future reference
Avatar
Deleted User 2/21/2023 4:47 PM
👍 yeah was wondering where to ask ;D
Avatar
Deleted User 2/22/2023 3:05 AM
Hey everybody, I hope you're all well
3:05 AM
f you removed a file by shift delete then wanted it to be unrecoverable Should you recover it first then remove it by the tool or what?
Avatar
Avatar
Deleted User
f you removed a file by shift delete then wanted it to be unrecoverable Should you recover it first then remove it by the tool or what?
Digitalferret 2/22/2023 3:13 AM
lol, sounds like a "how do i cover my tracks" post. we're about how to recover evidence, not how to cover it up 🤣
Avatar
Deleted User 2/22/2023 3:15 AM
hahaha
3:15 AM
I just speak in case if you sell your PC
3:15 AM
or something
Avatar
Digitalferret 2/22/2023 3:15 AM
and the short answer is "it all depends" - too many variables to ensure you destroyed whatever it was you deleted. it may even already be gone if you have SSD/Trim etc
Avatar
Deleted User 2/22/2023 3:15 AM
or use somone's PC
3:16 AM
it wasn't saved on SSD
Avatar
Digitalferret 2/22/2023 3:16 AM
if you sell your PC you do a secure wipe and re install (OS) from scratch
Avatar
Deleted User 2/22/2023 3:16 AM
it was saved on HDD
Avatar
Avatar
Deleted User
or use somone's PC
Deleted User 2/22/2023 3:16 AM
alright, what about this?
Avatar
Digitalferret 2/22/2023 3:18 AM
it also depends on who you are trying to hide data from. if it's a relative just using an undelete program, you are likely ok. if it's a National Agency and you have done bad things, you are likely screwed, unless you nuke the device (edited)
Avatar
Deleted User 2/22/2023 3:19 AM
National Agency and asking on Discord 🤣
3:19 AM
bloody hell
Avatar
When you delete a file normally in Windows, it's not really gone for good. Learn how to securely erase files and folders so they're unrecoverable.
Avatar
Deleted User 2/22/2023 3:20 AM
the link doesn't open
3:20 AM
plus I know how to delete them without being recoverable
3:20 AM
but I want to know
3:21 AM
should I recover them
3:21 AM
then delete them?
Avatar
With sdelete from sysinternals tools
Avatar
Deleted User 2/22/2023 3:21 AM
because I already deleted them by shift delete
Avatar
Avatar
skyg4mb
With sdelete from sysinternals tools
Deleted User 2/22/2023 3:21 AM
yeah I know
3:21 AM
on powershell
3:21 AM
but they already deleted shift delete
3:21 AM
so?
Avatar
No, with tools like blkls maybe is possible recover it
Avatar
Deleted User 2/22/2023 3:23 AM
yeah, that's what I'm talking about
3:23 AM
it's already deleted shift delete
3:23 AM
so it might be recoverable
3:23 AM
so what should I do to ensure that it won't be recovered? (edited)
Avatar
Rewrite the unallocated space
Avatar
Deleted User 2/22/2023 3:27 AM
how could I do that?
3:27 AM
by sdelete?
Avatar
Are you selling, giving away, or disposing of a Windows PC? Learn how to securely wipe its hard drive so your data cannot be recovered.
3:27 AM
There is the answer
Avatar
Deleted User 2/22/2023 3:28 AM
thanks
3:41 AM
when I use ccleaner
3:42 AM
to wipe the free space
3:42 AM
it won't delete things in the disk
3:42 AM
right?
3:43 AM
because there are things I don't want to delete it
Avatar
Digitalferret 2/22/2023 4:04 AM
i'm on the floor here, lol.
4:07 AM
there are so many artefacts on a PC, whatever you do you'll leave traces all over the place. again, it depends on so many things; content, OS, shadowcopy, edits, temp files, shellbags, backstory etc. (edited)
4:09 AM
ccleaner will, if set up correctly, wipe free space only
4:10 AM
but, in terms of covering tracks, no cleaner is a magic wand / silver bullet.
Avatar
I understand that he doesn't want to cover tracks, he just wants to guarantee that a file has been completely deleted.
Avatar
Honestly it's so subjective, depends on your threat model. Your average person won't be able to recover something once it's gone from the Recycle Bin. Other end of the scale is (so I've been told) the NSA degaussing their HDDs, then grinding them down to metal dust and storing this in a secure storage facility...
Avatar
Avatar
Deleted User
bloody hell
Digitalferret 2/22/2023 4:51 AM
seriously, we get allsorts here, lol. some are barely disguised "how do i hack this" type of questions
thistbh 2
Avatar
Some aren't disguised at all...
Avatar
Avatar
Digitalferret
but, in terms of covering tracks, no cleaner is a magic wand / silver bullet.
Deleted User 2/22/2023 4:52 AM
gotcha
Avatar
Avatar
skyg4mb
I understand that he doesn't want to cover tracks, he just wants to guarantee that a file has been completely deleted.
Deleted User 2/22/2023 4:52 AM
defo
Avatar
Avatar
skyg4mb
I understand that he doesn't want to cover tracks, he just wants to guarantee that a file has been completely deleted.
Digitalferret 2/22/2023 4:52 AM
guarantee that a file has been completely deleted you can only best guess that. don't forget you don't make the actions yourself, you request tat the OS does the job. and that's where it goes to pot
Avatar
Deleted User 2/22/2023 4:54 AM
I see a big stories here
4:54 AM
I'm not hacking NSA for all of that I think
4:54 AM
it's simple as @skyg4mb said
Avatar
Avatar
skyg4mb
I understand that he doesn't want to cover tracks, he just wants to guarantee that a file has been completely deleted.
Deleted User 2/22/2023 4:54 AM
here
Avatar
Avatar
Digitalferret
seriously, we get allsorts here, lol. some are barely disguised "how do i hack this" type of questions
Deleted User 2/22/2023 4:57 AM
I think it would be kinda weird to get asked here how to hack lol
😆 2
4:57 AM
because here people work for gov
4:57 AM
plus
4:57 AM
it's here how to secure
4:57 AM
not a place for even Ethical hacking
4:58 AM
with all respect you all might have experience in Ethical hacking but I don't think it would be as someone that's all what they do
4:58 AM
the same goes for them
4:58 AM
they might have experience in Blue team
4:59 AM
but they're not experts
5:02 AM
plus my question, I think is helpful for people who aren't into CyberSec at all too
5:02 AM
because for example you have the right to be sure you even private pics are not recoverable (edited)
5:03 AM
there are lots of free programs that even people who know nothing (edited)
5:03 AM
could download it to recover some stuff
5:03 AM
and it works
Avatar
in the words of my step-son "super sus" 🤣
😂 12
Avatar
👀 I may have used the phrase “sus” in a professional setting before
👀 1
Avatar
SynthSlicer 2/22/2023 9:14 AM
Does anyone know if would guest SID be different from administrator SID?
Avatar
The SID for Administrator should be 500 and Guest 501 if memory serves me right
👍 1
Avatar
SynthSlicer 2/22/2023 9:15 AM
yeah admin is 544 but I can't find guest
9:16 AM
and I only have reg file, sam, security, ntuser, and software so I have to use reg explorer
Avatar
Marko nije Darko 2/22/2023 11:45 AM
can someone provide me with beginner material from which I can study?
11:45 AM
I just can't find anything deep and long enough on youtube
Avatar
Avatar
Marko nije Darko
can someone provide me with beginner material from which I can study?
Andrew Rathbun 2/22/2023 12:05 PM
#training-education-employment
Avatar
Marko nije Darko 2/22/2023 12:05 PM
thanks!
Avatar
Hey folks! Does anyone have / know of a list, cheat sheet or reference of the default filepath for access logs of the various web server technologies out there? Digging through said technology's documentation works but less than ideal during an active incident. TIA!
Avatar
Avatar
Deleted User
but they're not experts
Some of us are Red team experts yes, but this is a DFIR based server, you’d probably have a better time asking that in a cybersecurity based server 😀 but to answer your question, start with the basics and fundamentals of networking. Knowing how to google or use your favourite search engine is a big plus. Hope that helps.
Avatar
𝗖𝗮𝗶𝘁 | 𝗣𝗵𝗶𝗹𝗶𝗽𝗽𝗶𝗻𝗲𝘀 👮🏻 2/23/2023 12:52 AM
Hi, I have questions kawaiiheartbeat Do you guys use AUTOPSY or any other FREE SOFTWARE to extract data and submit the report to court? kawaiiheartbeat Does the court accept the digital forensic results exported by the free software? thank you in advance. (edited)
12:57 AM
kawaiiheartbeat Do you guys have a Standard Operating Procedures (SOP) or any documents stating that only commercial digital forensic tools is the only allowed tools to be used in conducting Digital Forensic Examination?
Avatar
Morning all! Does anyone have any experience with iOS conference calls (merging an incoming call with an outgoing call)? Hoping to find a record somewhere like the knowledgeC.db
Avatar
Avatar
Logan
Hey folks! Does anyone have / know of a list, cheat sheet or reference of the default filepath for access logs of the various web server technologies out there? Digging through said technology's documentation works but less than ideal during an active incident. TIA!
randomaccess 2/23/2023 1:37 AM
I have some. But I need to find like a month to get my sh together to publish my repo
Avatar
Avatar
ryd3v
Some of us are Red team experts yes, but this is a DFIR based server, you’d probably have a better time asking that in a cybersecurity based server 😀 but to answer your question, start with the basics and fundamentals of networking. Knowing how to google or use your favourite search engine is a big plus. Hope that helps.
Deleted User 2/23/2023 2:47 AM
Thanks for your message but I think you didn't know what the whole conv was about
2:48 AM
I'd recommend you to read from very up
Avatar
Avatar
Deleted User
Hey everybody, I hope you're all well
Deleted User 2/23/2023 2:48 AM
From here
Avatar
Avatar
Deleted User
From here
Yep, now I understand, sorry about that, I didn’t start further up 😆
2:57 AM
In that case #counter-forensics is your friend 😀
2:58 AM
Also ccleaner I’d avoid, checkout bleachbit instead.
Avatar
Hello
3:56 AM
Does anyone know what tools to use to investigate discord?
Avatar
Avatar
Wighty
Does anyone know what tools to use to investigate discord?
ChromeCacheView will help with the Electron Cache, and LevelDBDumper can help with the Local Storage LevelDB
Avatar
Avatar
Wighty
Does anyone know what tools to use to investigate discord?
chrisforensic 2/23/2023 4:12 AM
if you have the access-token for discord-account, you can use this tool...
Avatar
Okay thanks
Avatar
chrisforensic 2/23/2023 4:13 AM
works very well, really 😉
Avatar
You can get the access token from the Local Storage LevelDB
👍 1
Avatar
Avatar
𝗖𝗮𝗶𝘁 | 𝗣𝗵𝗶𝗹𝗶𝗽𝗽𝗶𝗻𝗲𝘀 👮🏻
Hi, I have questions kawaiiheartbeat Do you guys use AUTOPSY or any other FREE SOFTWARE to extract data and submit the report to court? kawaiiheartbeat Does the court accept the digital forensic results exported by the free software? thank you in advance. (edited)
spicy_caveman 2/23/2023 5:39 AM
I always have those tools in my kit. What is important is how you present the exported forensic report to the court. The court accepts evidence that is acceptable for the rules of evidence, so it doesn't matter if you use FTK or Cellebrite. For SOP you may consider SWDG models for the lab you are in. (edited)
❤️ 1
Avatar
anyone here knows how to deal with .realm ? Looking for something to parse data in a .realm file using python or js or anything
6:03 AM
or something to convert .realm in sqlite
Avatar
Can you find evidence on discord with software like FTK imager? (edited)
Avatar
You can extract the relevant files yes, and a KAPE module exists for discord in the event you have an .E01 that you can mount
👆 1
Avatar
Avatar
ryd3v
Yep, now I understand, sorry about that, I didn’t start further up 😆
Deleted User 2/23/2023 7:10 AM
no worries
Avatar
Avatar
ryd3v
Also ccleaner I’d avoid, checkout bleachbit instead.
Deleted User 2/23/2023 7:10 AM
alright, thanks mate
Avatar
kmacdonald1565 2/23/2023 8:15 AM
This battery is still safe right?
apple3 3
🔥 1
Avatar
Avatar
Matt
You can extract the relevant files yes, and a KAPE module exists for discord in the event you have an .E01 that you can mount
Any tutorial on that?
Avatar
Avatar
kmacdonald1565
This battery is still safe right?
JLindmar (83AR) 2/23/2023 8:22 AM
Avatar
GirthBrooks7899 2/23/2023 8:24 AM
I thought this was a safe space…
Avatar
kmacdonald1565 2/23/2023 8:26 AM
lol just so its clear, this is a safe space. i do dangerous stuff for a living
8:27 AM
also </sarcasm>. and that kit looks legit, but our county has stuff to take care of batteries like this, we just turn them over.
Avatar
Avatar
kmacdonald1565
lol just so its clear, this is a safe space. i do dangerous stuff for a living
GirthBrooks7899 2/23/2023 8:28 AM
🤣 2
Avatar
Avatar
GirthBrooks7899
Click to see attachment 🖼️
JLindmar (83AR) 2/23/2023 8:54 AM
Ha!
Avatar
Avatar
kmacdonald1565
lol just so its clear, this is a safe space. i do dangerous stuff for a living
JLindmar (83AR) 2/23/2023 8:55 AM
Are there multiple batteries in that? That looks like a weird bloat.
Avatar
Avatar
Wighty
Any tutorial on that?
Not to hand, but you want to run the Discord KAPE module and then that’ll pull out the files you need.
Avatar
Avatar
Matt
Not to hand, but you want to run the Discord KAPE module and then that’ll pull out the files you need.
Andrew Rathbun 2/23/2023 9:28 AM
FeelsOKMan 1
👍 1
Avatar
Avatar
JLindmar (83AR)
Are there multiple batteries in that? That looks like a weird bloat.
kmacdonald1565 2/23/2023 9:43 AM
It was from a laptop. Cells looked like 3 phone battery cells stitched together.
👍 1
Avatar
I just bought a $20 lipo bag on amazon last time I had a laptop battery like that... no idea if it "works", don't really want to test it.
Avatar
kmacdonald1565 2/23/2023 12:48 PM
was going to say lets test it!
Avatar
Avatar
kmacdonald1565
was going to say lets test it!
https://youtu.be/atkgUwGHL_k I caught up watching some of these videos on the bag tests.
Avatar
Ooooh, I was going through my donor phones today and threw a few sold swollen batteries in a bag like this. Watching now.
Avatar
Avatar
DCSO
https://youtu.be/atkgUwGHL_k I caught up watching some of these videos on the bag tests.
kmacdonald1565 2/23/2023 3:44 PM
well that certainly gives me something to watch on a friday when i should be working. thanks!
3:44 PM
</sarcasm> i swear
Avatar
potentpwnables 2/23/2023 4:38 PM
Hey, all! Please forgive me for what is certainly a dumb question, but I have been unable to find a suitable answer on Google. Context: In my efforts to learn digital forensics, I have been doing Ali Hadi's Web Server challenge (https://www.ashemery.com/dfir.html, Challenge #1) and using a few write ups to guide me on things to look at. Those write ups, however, all seem to use Volatility 2, and make heavy use of the cmdscan plugin. However, Volatility 3's windows.cmdline plugin, which seems to be the replacement for cmdscan, does not provide the command history. Instead it provides the switches that were used for each process that was run. Questions: 1. Am I missing something in Volatility 3 that would allow me to get this information? 2. If not, is Autopsy the next best alternative on a Windows machine? 3. Are any of you sticking with Volatility 2? And if so, how did you install all of the dependencies? pip yelled at me saying it couldn't find everything it needed. 4. Are there other things I should consider? I appreciate your help/insight on this!
Avatar
SynthSlicer 2/23/2023 4:57 PM
Any good free .pst file analyzers not systools?
Avatar
Avatar
SynthSlicer
Any good free .pst file analyzers not systools?
Kernel PST Viewer is a free tool to browse through your PST files without using MS Outlook.
Avatar
Avatar
potentpwnables
Hey, all! Please forgive me for what is certainly a dumb question, but I have been unable to find a suitable answer on Google. Context: In my efforts to learn digital forensics, I have been doing Ali Hadi's Web Server challenge (https://www.ashemery.com/dfir.html, Challenge #1) and using a few write ups to guide me on things to look at. Those write ups, however, all seem to use Volatility 2, and make heavy use of the cmdscan plugin. However, Volatility 3's windows.cmdline plugin, which seems to be the replacement for cmdscan, does not provide the command history. Instead it provides the switches that were used for each process that was run. Questions: 1. Am I missing something in Volatility 3 that would allow me to get this information? 2. If not, is Autopsy the next best alternative on a Windows machine? 3. Are any of you sticking with Volatility 2? And if so, how did you install all of the dependencies? pip yelled at me saying it couldn't find everything it needed. 4. Are there other things I should consider? I appreciate your help/insight on this!
I think cmdscan from Volatility 2 works differently than windows.cmdline from Volatility 3, because there is also a cmdline plugin for Volatility 2. Volatility 3 still misses many plugins from Volatility 2 so it would be the easiest to use Volatility 2 in this case and it's plugins cmdscan and consoles, here you can find a reference: https://github.com/volatilityfoundation/volatility/wiki/Command-Reference#cmdscan I am using Volatility 2 and 3 both in Remnux VM, there are several ways to get this Linux distro: https://docs.remnux.org/install-distro/get-virtual-appliance (edited)
An advanced memory forensics framework. Contribute to volatilityfoundation/volatility development by creating an account on GitHub.
3:17 AM
And if you have more questions regarding Volatility or Memory Forensics, then it would be best to ask in the specific channel #memory-forensics
💯 1
Avatar
Any reason I would have Activity Sensor / Health data displayed in PA for a timeframe a person did not have any type of Watch/Apple Watch? Wondering if the watch was stolen or not seized.
Avatar
Avatar
Ghosted
Any reason I would have Activity Sensor / Health data displayed in PA for a timeframe a person did not have any type of Watch/Apple Watch? Wondering if the watch was stolen or not seized.
Don't iPhones have their own internal mechanism to count steps? Maybe that is what you are seeing?
Avatar
@FullTang Pulling the .db now to see if it was paired with watch or something. I don't see heart rate or other things I expected so you are probably right just the phone moving thanks.
👍 1
Avatar
If any mods see this you can add me to the private sector role 🙂
👍 2
Avatar
Avatar
avesta
If any mods see this you can add me to the private sector role 🙂
kmacdonald1565 2/24/2023 10:20 AM
❤️ 1
10:20 AM
fyi
10:21 AM
i post that as 2 mods give you a thumbs up
Avatar
I'm trying to image a PCMCIA card. The only way I have right now is with an Omnidrive, however that is not working with the Weibetech USB write blocker, has anyone else had any luck with the Omnidrive and write blocker or have a suggestion on other PCMCIA to USB readers that will work with a writeblocker?
Avatar
LEO - I have a child abduction that just occured does anyone have a contact for a live snapchat rep please DM. @Law Enforcement [USA]
Avatar
Avatar
DCSO
LEO - I have a child abduction that just occured does anyone have a contact for a live snapchat rep please DM. @Law Enforcement [USA]
Their emergency response people are pretty quick had a similar situation.
💯 1
Avatar
fastball_giraffe 2/24/2023 10:58 AM
I’d you’re worried about life and safety I would go straight with an emergency ping through the suspect’s phone carrier as well
this 1
Avatar
stvrjohnson 2/24/2023 10:59 AM
Might not have that info, might only have snap
Avatar
HTTPS://lawenforcement.Snapchat.com/en-US/emergency
👍 2
Avatar
Avatar
DCSO
LEO - I have a child abduction that just occured does anyone have a contact for a live snapchat rep please DM. @Law Enforcement [USA]
The ISP List is a database of Internet service and other online content providers that will help you get the information you need for your case. For each Internet Service Provider listed, you’ll find the legal contact information and instructions needed to serve subpoenas, court orders, and search warrants. The ISP List is a law … ISP List and L...
Avatar
HTTPS://less.snapchat.com/submit/edr This is the direct link to submit emergency requests. (edited)
👍 1
Avatar
☝️yes, this is their new exigent link. You will get very fast response
💯 1
❤️ 2
Salute 1
Avatar
I'll forward that to our detective working it, he said nobody is getting back to them. Thank you !
Avatar
Make sure it’s not going to spam. Agency emails are a pain filtering that.
👍 1
Avatar
The emergency team took about an hour on ours. This was 2 years ago
👍 1
Avatar
Andrew Rathbun 2/24/2023 11:02 AM
Good work, all! Best of luck @DCSO
👏 1
💯 2
Avatar
kmacdonald1565 2/24/2023 12:39 PM
i can honestly say, i have had terrible luck with snap, but this was a few years ago. runaway 13-15 year old, would literally only update us 2x a day, with information that was a few hours old. she made it like 100 miles away before we found her.
Avatar
Avatar
Andrew Rathbun
Good work, all! Best of luck @DCSO
Good to go, just in time for HH 🍻 have a good weekend all.
🍻 9
Avatar
kmacdonald1565 2/24/2023 1:37 PM
awesome
1:37 PM
happy friday then
Avatar
Avatar
randomaccess
I have some. But I need to find like a month to get my sh together to publish my repo
Awesome 👍, if you ever get around to doing it feel free to give me a ping. Also happy to share my notes and contribute to a repo
Avatar
Avatar
kmacdonald1565
i can honestly say, i have had terrible luck with snap, but this was a few years ago. runaway 13-15 year old, would literally only update us 2x a day, with information that was a few hours old. she made it like 100 miles away before we found her.
Andrew Rathbun 2/24/2023 1:44 PM
Back in like 2017, I used to get 2 hour turnarounds on search warrants. It was awesome. Then they got bigger and therefore much slower, but they were still months faster than Google 😛
Avatar
Avatar
Andrew Rathbun
Back in like 2017, I used to get 2 hour turnarounds on search warrants. It was awesome. Then they got bigger and therefore much slower, but they were still months faster than Google 😛
kmacdonald1565 2/24/2023 2:03 PM
very true i had a suicidal missing person, left behind a phone. google took 2 days from their exigent stuff to get back to me :/
🤦‍♂️ 1
Avatar
netherlilly 2/25/2023 4:19 AM
Hi! new to the server and still figuring out things, hope this is an okay place to ask a question of this type: I am new to CyberSec and am in the middle of a Certificate program for Introductory Cybersecurity at Colorado University of Boulder. I am excited to learn more and absorb what I can from here! My long term goal is a career in Cyber Forensics, so I'm here to get a better understanding of what the job truly entails and what sub-categories may exist in the field... Question: Should I be looking out for any specific entry level jobs to boost me into Cyber Forensics? What sort of Entry-Level positions exist in Forensics, and Are there specific certs often sought after by those hiring in those positions? I kinda just don't have a solid understanding of the path options that will best land me where I want to be, and Im not even sure I know where I want to be. Edit: A better question might be, Should I lurk here a bit longer until I understand my options a little better before asking such an open ended question 😅 (or am I asking a reasonable question?) (edited)
Avatar
Avatar
netherlilly
Hi! new to the server and still figuring out things, hope this is an okay place to ask a question of this type: I am new to CyberSec and am in the middle of a Certificate program for Introductory Cybersecurity at Colorado University of Boulder. I am excited to learn more and absorb what I can from here! My long term goal is a career in Cyber Forensics, so I'm here to get a better understanding of what the job truly entails and what sub-categories may exist in the field... Question: Should I be looking out for any specific entry level jobs to boost me into Cyber Forensics? What sort of Entry-Level positions exist in Forensics, and Are there specific certs often sought after by those hiring in those positions? I kinda just don't have a solid understanding of the path options that will best land me where I want to be, and Im not even sure I know where I want to be. Edit: A better question might be, Should I lurk here a bit longer until I understand my options a little better before asking such an open ended question 😅 (or am I asking a reasonable question?) (edited)
Digitalferret 2/25/2023 7:30 AM
its the "I've been witgh <partner> x days/months/decades, should i get married? signed Unsure Eric." question. If you aren't sure, then no, don't nail your colours to the mast. keep it general and wait 'til something in you says "this is it". ofc that may never happen and you'll have to best guess until it does, but, early days, keep it as broad as possible.
Avatar
Avatar
Digitalferret
its the "I've been witgh <partner> x days/months/decades, should i get married? signed Unsure Eric." question. If you aren't sure, then no, don't nail your colours to the mast. keep it general and wait 'til something in you says "this is it". ofc that may never happen and you'll have to best guess until it does, but, early days, keep it as broad as possible.
netherlilly 2/25/2023 7:39 AM
Thank you! I expected jokes about my question. I notice a lot of the job listings posted here prefer bachelors degrees, assuming in Forensics? I need a good hand holding, It's difficult to know where to even begin haha. So starting in CyberSec, I understand I should have understanding of networking and of course deep knowledge of OS and methods of analysis.... But to get into the Law side of things.... Im starting to think i maybe can't afford to dip my toes in here
7:42 AM
Would knowledge of CyberSec land me a position willing to aid in getting clearance or law school if necessary?
7:48 AM
I enjoy following True-crime, I'm sure you hear that a ton, and I'd love to be in a position such as analyzing digital evidence, My brain summons the idea of hacking into password blocked devices for evidence as example... was starting in CyberSec Ideal for that? (edited)
Avatar
Avatar
netherlilly
I enjoy following True-crime, I'm sure you hear that a ton, and I'd love to be in a position such as analyzing digital evidence, My brain summons the idea of hacking into password blocked devices for evidence as example... was starting in CyberSec Ideal for that? (edited)
Digitalferret 2/25/2023 8:22 AM
i'm afraid that it's another "it depends" answer. who knows what any prospective employer wants? don't tailor anything you do on what you may see in any TV show though. those are the edited highlights and the best bits. if you are aiming at a true forensic (ie following the framework law requires) hacking/cracking anything is a small part of what is a lengthy and arduous job. it's like seeing the meal presented on a TV chef show but they miss out the full day of peeling veg, prepping meat, cleaning up, and tidying down, whilst the head chef is shouting about time constraints, and throwing a meal out if even the tiniest bit of peel is left on something. (edited)
🙌 1
Avatar
Avatar
Digitalferret
i'm afraid that it's another "it depends" answer. who knows what any prospective employer wants? don't tailor anything you do on what you may see in any TV show though. those are the edited highlights and the best bits. if you are aiming at a true forensic (ie following the framework law requires) hacking/cracking anything is a small part of what is a lengthy and arduous job. it's like seeing the meal presented on a TV chef show but they miss out the full day of peeling veg, prepping meat, cleaning up, and tidying down, whilst the head chef is shouting about time constraints, and throwing a meal out if even the tiniest bit of peel is left on something. (edited)
netherlilly 2/25/2023 9:10 AM
That's a great way to visualize and I understand there's a lot that goes into getting the results, writing reports, getting approvals etc... What I've gotten out of this is: Keep studying, Learn more and be able to prove my knowledge, and wait for the right opportunity
💯 1
Avatar
Avatar
netherlilly
Hi! new to the server and still figuring out things, hope this is an okay place to ask a question of this type: I am new to CyberSec and am in the middle of a Certificate program for Introductory Cybersecurity at Colorado University of Boulder. I am excited to learn more and absorb what I can from here! My long term goal is a career in Cyber Forensics, so I'm here to get a better understanding of what the job truly entails and what sub-categories may exist in the field... Question: Should I be looking out for any specific entry level jobs to boost me into Cyber Forensics? What sort of Entry-Level positions exist in Forensics, and Are there specific certs often sought after by those hiring in those positions? I kinda just don't have a solid understanding of the path options that will best land me where I want to be, and Im not even sure I know where I want to be. Edit: A better question might be, Should I lurk here a bit longer until I understand my options a little better before asking such an open ended question 😅 (or am I asking a reasonable question?) (edited)
I don't know about any specific entry level job that would get you anymore then your cert program. Maybe an internship if that is offered . Or try and connect/network with any one local or local groups that could give you more insight. You might get into this and decide you never want to see a computer again, especially after staring at a progress bar for what feels like 100000 hours waiting on something to process. They don't show that part in the TV shows 😅
💯 1
11:06 AM
A lot of people are fans of TryHackme and Hack The Box for general cyber skills. I think TryHackme has some Digital forensics labs, maybe check those out for hands on where to start practice.
❤️ 1
Avatar
netherlilly 2/25/2023 2:45 PM
Thanks for your Time/feedback guys, I know I'm asking the stupid questions here, I just feel really unsure, I enjoy the need to be constantly learning and don't mind some progress bars haha, but I am intimidated I think. The fear that I can't or won't be seen as above average or minimum in this industry if it turns out my brain can't speak computer lol
Avatar
netherlilly 2/25/2023 2:52 PM
I love computers and have used them since I can remember but not to the extent I've noticed most have been, I interacted most with setting up game servers and minecraft command blocks/redstone and I jokingly relate the concepts but I feel I understand command lines decently well because of such experience. I know there's always a language to it and being able to learn the command lines as quickly as I understand how to spawn a custom entity in vanilla settings of minecraft leads me to think I have a chance at doing well, but I get intimidated by all the updates happening so quickly right now. A.I. Cloud and Threat Actors popping up more frequently, It's a lot to keep up with....So Im lead to believe im thinking WAY too hard and coming here am confirmed to say I need to hammer in the basics
2:56 PM
sorry for the insane run on sentences
Avatar
Hi folks. Does anyone know the significance of a PDF being recovered from the Adobe Reader flattening temporary file path? This was the location of a PDF recovered from a Samsung running Android. Unfortunately I don’t have any version details to hand.
Avatar
Avatar
netherlilly
Thanks for your Time/feedback guys, I know I'm asking the stupid questions here, I just feel really unsure, I enjoy the need to be constantly learning and don't mind some progress bars haha, but I am intimidated I think. The fear that I can't or won't be seen as above average or minimum in this industry if it turns out my brain can't speak computer lol
Late to the party. Don't solely focus on speaking computer. Speak business also. At the end of the day, it's all business. It's good that you can be very technical but better if you can be the bridge in between.
❤️ 1
💯 1
Avatar
Here's a little conundrum. I have had a case where the client has built their AD environment on AWS. During the investigation I noticed that on at least one of the DCs in Windows logs there are multiple hostnames (logs generated on the same host) such as EC2AMAZ-ABCABCD but also log entries that correctly identify the correct hostname of the DC. Is this something specific to AWS or could it be a misconfiguration in the environment? The client themselves did not recognize these EC2 hostnames.
Avatar
Morning! (First time posting here) we have a HP Chromebook 14a-na0503sa in the lab relating to a CSAM investigation. This is the suspects second device to be examined, the first of which (android phone) had several hits on CAID. I’m hoping people could share potential solutions to performing an extraction from the Chromebook, OSR is nudging me towards manual examination but I didn’t want to overlook any potential tools that could assist. I appreciate chromebooks depend heavily on cloud storage however because of information we have from the investigator this exhibit may prove pertinent to the specific incident he was reported for.
Avatar
Avatar
CH.uk?!
Morning! (First time posting here) we have a HP Chromebook 14a-na0503sa in the lab relating to a CSAM investigation. This is the suspects second device to be examined, the first of which (android phone) had several hits on CAID. I’m hoping people could share potential solutions to performing an extraction from the Chromebook, OSR is nudging me towards manual examination but I didn’t want to overlook any potential tools that could assist. I appreciate chromebooks depend heavily on cloud storage however because of information we have from the investigator this exhibit may prove pertinent to the specific incident he was reported for.
Magnet Chromebook Acquisition tool (MCAA). You need to sign up to their IdeaLab page. You need to know the password of the Chromebook though, but since you have another exhibit you could find potential passwords from that. (edited)
Avatar
We are currently at the limit (well, way over the limit) of how much pro bono time we can burn at Arsenal on behalf of generally high-value targets like journalists. Aside from The Citizen Lab and Amnesty Tech, is anyone familiar with organizations that perform aggressive digital forensics pro bono/off-the-clock for high-profile and high-value targets like journalists? I recall seeing some kind of press release for a non-profit (other than Citizen or Amnesty) that intended to specialize in this kind of service, but I can't find it now that it would be useful. 🤬 (edited)
👀 1
Avatar
How to get discord cache from browser?
3:48 AM
Also does using MOBILedit works to investigate mobile version of discord?
Avatar
I bought a WD Green 2tb about a week ago, I was on an absolute hurry so I bought a sketchy box to convert my 3.5 inch HDD to an external one. I formatted it with NTFS and used to store some data. After the data was copied by another person, I plugged it in my Windows PC and it didn't seem to recognize it. So I went ahead and used a software name Paragon NTFS on my mac and backed up the data. The software worked flawlessly in transferring the data. Then I went ahead and removed the HDD from the box and connected it to my PC via SATA. I couldn't get it working because my windows PC said that it failed to due to some hardware error. And I couldn't even format it due to that error. So I booted into my Arch Linux installation and formatted it there successfully to NTFS via mkfs.ntfs. This made it possible for my windows installation to recognize it but after a few hundred megabytes of transfer, it gave me 0 transfer speed and got disconnected after a while. So I just tried and formatted it to ext4 and now I can use the drive flawlessly on my linux installation. I wanted to know that can this be due to the sketchy box messing up the firmware of the HDD or something like that? I will be trying to return it but I wanted to know if that's a possible problem
Avatar
Avatar
CH.uk?!
Morning! (First time posting here) we have a HP Chromebook 14a-na0503sa in the lab relating to a CSAM investigation. This is the suspects second device to be examined, the first of which (android phone) had several hits on CAID. I’m hoping people could share potential solutions to performing an extraction from the Chromebook, OSR is nudging me towards manual examination but I didn’t want to overlook any potential tools that could assist. I appreciate chromebooks depend heavily on cloud storage however because of information we have from the investigator this exhibit may prove pertinent to the specific incident he was reported for.
ForensicDev 2/27/2023 8:58 AM
Before using any "automated" tool, have a look at what those tools do behind the scene. They are likely based on the following write-up, which you can follow step by step and accomplish the same results. HTH. https://dfir.pubpub.org/pub/inkjsqrh/release/2
Avatar
Avatar
Arsenal
We are currently at the limit (well, way over the limit) of how much pro bono time we can burn at Arsenal on behalf of generally high-value targets like journalists. Aside from The Citizen Lab and Amnesty Tech, is anyone familiar with organizations that perform aggressive digital forensics pro bono/off-the-clock for high-profile and high-value targets like journalists? I recall seeing some kind of press release for a non-profit (other than Citizen or Amnesty) that intended to specialize in this kind of service, but I can't find it now that it would be useful. 🤬 (edited)
While they are not a non-profit, I know that Rexxfield will help with some cyber investigations on a pro bono basis. https://rexxfield.com/customer-reviews/
Avatar
Avatar
chauan
Late to the party. Don't solely focus on speaking computer. Speak business also. At the end of the day, it's all business. It's good that you can be very technical but better if you can be the bridge in between.
netherlilly 2/27/2023 9:55 AM
Yes! You must know what the business needs/how it functions to understand how to best protect it!
Avatar
Question, should I be keeping my "analysis copy" of a forensic image, after I complete my analysis? I already keep a "gold copy" which I don't work on. If so, and assuming it matches the original hash , then why?
Avatar
Avatar
APetro
Question, should I be keeping my "analysis copy" of a forensic image, after I complete my analysis? I already keep a "gold copy" which I don't work on. If so, and assuming it matches the original hash , then why?
Andrew Rathbun 2/27/2023 12:24 PM
I don't personally see much reason to 🤷‍♂️
Avatar
Avatar
APetro
Question, should I be keeping my "analysis copy" of a forensic image, after I complete my analysis? I already keep a "gold copy" which I don't work on. If so, and assuming it matches the original hash , then why?
JLindmar (83AR) 2/27/2023 12:46 PM
Do you retain the "gold copy" long term?
Avatar
Avatar
JLindmar (83AR)
Do you retain the "gold copy" long term?
Yep, I do keep those.
Avatar
Avatar
APetro
Yep, I do keep those.
JLindmar (83AR) 2/27/2023 1:31 PM
If they are accessible if need be, then I would agree with @Andrew Rathbun that there may not be a reason to keep an additional "analysis copy". (edited)
Avatar
Avatar
FullTang
While they are not a non-profit, I know that Rexxfield will help with some cyber investigations on a pro bono basis. https://rexxfield.com/customer-reviews/
Thank you! I'll contact them now and see if they are interested in taking on a potentially compromised journalist.
👍 2
Avatar
I am in the process of getting as much hands-on experience as possible in the cyber field, so I am seeking a cyber security internship or volunteer work in the Orleans region. I can also do it remotely. Please connect me, or advise me and much appreciated in advance
Avatar
Avatar
DFIR_tist
I think cmdscan from Volatility 2 works differently than windows.cmdline from Volatility 3, because there is also a cmdline plugin for Volatility 2. Volatility 3 still misses many plugins from Volatility 2 so it would be the easiest to use Volatility 2 in this case and it's plugins cmdscan and consoles, here you can find a reference: https://github.com/volatilityfoundation/volatility/wiki/Command-Reference#cmdscan I am using Volatility 2 and 3 both in Remnux VM, there are several ways to get this Linux distro: https://docs.remnux.org/install-distro/get-virtual-appliance (edited)
potentpwnables 2/27/2023 5:33 PM
Apologies for the delayed response here, but thank you for your insights. I was able to solve my issues with Python2/Volatility 2 and am up and running. I've also installed a REMnux VM to play around with that. I appreciate your help on this!
Avatar
Anyone know if Magnet Acquire of mobile devices can be parsed with Cellebrite PA ?
Avatar
Hi, I'm picking up a project for someone who has left. I'm using FTK 7.1.0.290 and when I open the software I'm getting "please authenticate enter username and password". Googling around I see that creds might have been entered during install and setup? Is that correct? Is there a way to reset that? it is licensed but can't seem to find a support contact on the web? Thanks
Avatar
Avatar
ISOM
Hi, I'm picking up a project for someone who has left. I'm using FTK 7.1.0.290 and when I open the software I'm getting "please authenticate enter username and password". Googling around I see that creds might have been entered during install and setup? Is that correct? Is there a way to reset that? it is licensed but can't seem to find a support contact on the web? Thanks
I am guessing you have a support portal login, so can log a ticket here - https://support.exterro.com/support/home
👍 1
Avatar
Anyone's agency use cloud based storage for evidence? If so who do you go through? Looking for different storage options that provide streamline way of sharing information to prosecutors and other agencies
Avatar
Avatar
ExisT
Anyone's agency use cloud based storage for evidence? If so who do you go through? Looking for different storage options that provide streamline way of sharing information to prosecutors and other agencies
kmacdonald1565 2/28/2023 7:57 AM
evidence.com we use axon for bodycams, discovery, and some other stuff, so we just throw our reports on there if they aren't ridiculously huge.
Avatar
Avatar
kmacdonald1565
evidence.com we use axon for bodycams, discovery, and some other stuff, so we just throw our reports on there if they aren't ridiculously huge.
Thanks for the response, can you store a phone extraction through them?
Avatar
kmacdonald1565 2/28/2023 8:04 AM
so as far as cloud storage goes, they are expensive...but we opted for the unlimited storage through them. I don't see why you couldn't. but if you don't cross over that unlimited threshold, you will run out of space fairly quick. the one thing is, you have to zip stuff before putting it on there. if you dont, you have to download and reorganize the files individually
8:05 AM
ie you have a logical that has 2000 files, you are downloading 2000 items, and placing them in appropriate folders, or you are deleting 2000 files, also individually, and trying again
Avatar
Avatar
kmacdonald1565
so as far as cloud storage goes, they are expensive...but we opted for the unlimited storage through them. I don't see why you couldn't. but if you don't cross over that unlimited threshold, you will run out of space fairly quick. the one thing is, you have to zip stuff before putting it on there. if you dont, you have to download and reorganize the files individually
We looked at using Evidence.com, from what i recall they have have a max size limit on the upload anywhere from 4GB to 20 GB, on a single file zip, i think you would have to 7Zip it and choose split files into chunks. This could of changed though.
Avatar
Avatar
DCSO
We looked at using Evidence.com, from what i recall they have have a max size limit on the upload anywhere from 4GB to 20 GB, on a single file zip, i think you would have to 7Zip it and choose split files into chunks. This could of changed though.
They have a program called sync which would allow you to upload any filesize directly to evidence.com. The issue why we stopped uploading exam results (besides capacity and $$$) is it became too hard for people to unzip files 🤷‍♂️ , plus some agencies apparently still have 15kbps modems from the 1990s. (edited)
🤣 1
💯 1
Avatar
Avatar
DCSO
We looked at using Evidence.com, from what i recall they have have a max size limit on the upload anywhere from 4GB to 20 GB, on a single file zip, i think you would have to 7Zip it and choose split files into chunks. This could of changed though.
kmacdonald1565 2/28/2023 1:30 PM
i 100% have uploaded more than that. the browser based one is like 2 or 4 gb but the program i have is called evidence upload...great unique name there... and i think my biggest one is somewhere around 20 - 30 gb. anything bigger we feel bad making detectives download that large. <sarcasm> defense attorneys on the other hand </sarcasm>
Avatar
Avatar
Solec
They have a program called sync which would allow you to upload any filesize directly to evidence.com. The issue why we stopped uploading exam results (besides capacity and $$$) is it became too hard for people to unzip files 🤷‍♂️ , plus some agencies apparently still have 15kbps modems from the 1990s. (edited)
kmacdonald1565 2/28/2023 1:32 PM
at this point, we have straight up told agencies and defense attorneys this is how we are doing things now. so far push back has gone /okay/ but continuing as planned thus far. it has been like 2 years or so. it is important to note we are the "head LE agency" of our county but we do try to work with people as much as possible instead of being jerks about it. we have taught even defense attorneys how to open them up if needed.
Avatar
marco_polo076 2/28/2023 1:36 PM
I have a question
1:38 PM
It’s about wireless printers
Avatar
Avatar
marco_polo076
I have a question
DeeFIR 🇦🇺 2/28/2023 1:51 PM
this 4
Avatar
Avatar
marco_polo076
I have a question
Wireless and printer....those are nightmare words for any IT person
Avatar
Avatar
DeeFIR 🇦🇺
kmacdonald1565 2/28/2023 2:22 PM
i am saving that badboy. thats up there with lmgtfy
thistbh 2
Avatar
Avatar
kmacdonald1565
i am saving that badboy. thats up there with lmgtfy
Andrew Rathbun 2/28/2023 3:44 PM
SAME
Avatar
RachaelMedhurst 3/1/2023 1:36 AM
Hey, could anyone complete this questionnaire for his dissertation for a digital forensic student is completing at the University of South Wales - https://forms.office.com/Pages/ResponsePage.aspx?id=fP6q5RuXt0qwORQa02rOwHo4qslUzmRKsC2nmOTGYsxUNkFZMkM3VTZCUFgyRjNDTjlNREVMSUZRVC4u
Avatar
Hey! is here someone who transfers Cellebrite Reader Data (ufdr) through a VPN connection? We are doing this since years, but since some weeks we always receive a network error while copying the ufdr file. When we zip the file we don't have problems.
Avatar
Joshua Michel 3/1/2023 1:19 PM
Hi fellow examiners, I have a general question about RAID mounting. I'm wondering what success anyone has had with interpreting and mounting forensic images for RAIDS. I currently had had success with FEX and EnCase for interpreting. EnCase can mount as a Disc but this is logical. FEX does not mount the images at all. I would like to process in Axiom as well but if fails interpretation. Any ideas appreciated.
Avatar
Avatar
Joshua Michel
Hi fellow examiners, I have a general question about RAID mounting. I'm wondering what success anyone has had with interpreting and mounting forensic images for RAIDS. I currently had had success with FEX and EnCase for interpreting. EnCase can mount as a Disc but this is logical. FEX does not mount the images at all. I would like to process in Axiom as well but if fails interpretation. Any ideas appreciated.
DeeFIR 🇦🇺 3/1/2023 3:23 PM
What kind of RAID structure? Was it based on a physical controller? Software RAID? Some kind of bastardised LVM/LVM2 from a NAS?
Avatar
Avatar
DeeFIR 🇦🇺
What kind of RAID structure? Was it based on a physical controller? Software RAID? Some kind of bastardised LVM/LVM2 from a NAS?
Joshua Michel 3/1/2023 3:44 PM
I don't know those details, this is a case where I received no documentation on the setup, only forensic images of two sets of SSDs for two systems but they appear to be setup the same way: to interpret, i choose Type: Hardware, Format: 0 Striping and stripe size 64kb.
3:46 PM
For reference, this is late 2015 early 2016 timeframe.
Avatar
Avatar
nicolasBE
Hey! is here someone who transfers Cellebrite Reader Data (ufdr) through a VPN connection? We are doing this since years, but since some weeks we always receive a network error while copying the ufdr file. When we zip the file we don't have problems.
I would always Zip the file before transfering, if you burn or transfer a Cellebrite case to media etc you might run into file name to long errors etc. Just my 2 cents.
Avatar
OK so looking for a solution to asset tracking and note taking for our lab. I don't need anything too heavy, I'd like be able to run some metrics so I can produce reports. We're currently evaluating Atlas from Magnet. Anyone have any suggestions?
Avatar
We use lastpass at our business/corp. What are the most important security considerations from this document to implement/apply from this document they reccomend? https://support.lastpass.com/help/security-bulletin-recommended-actions-for-business-administrators
Your organization’s security is vital to our mutual success, so we’ve created this guide to help you respond to the recent LastPass security incident in a way that meets your security posture and environment’s needs.
Avatar
Hey I had a question about Scanner and doc rasterization? Mainly the legitimacy of noise artifacts in documents that arent consistent and rooting out if its scanner error or not
Avatar
I am live on twitch infosec stream ❤️
Avatar
Anyone have any sample wechat or QQ extractions? (edited)
Avatar
keving3047 3/4/2023 9:01 AM
Does anyone know a good way to convert a large SQLite.db file (30+ GB) into a flat file so categorized hash files can be exported?
Avatar
Hey guys what kind of research questions can i get from cloud forensics when making a literature review to content related to it? If my question is confusing, let me know I'd appreciate to elaborate rather than getting ignored due to confusion.
Avatar
Deleted User 3/4/2023 10:37 AM
Hey, any good sources for all fsutil usn reasons? (which sequences refer to Data Overwrite / Stream Change) etc
Avatar
Deleted User 3/4/2023 10:55 AM
Contains the information for an update sequence number (USN) change journal version 2.0 record.
Avatar
Avatar
keving3047
Does anyone know a good way to convert a large SQLite.db file (30+ GB) into a flat file so categorized hash files can be exported?
Andrew Rathbun 3/4/2023 1:43 PM
Are you thinking of SQLite query to extract out the info? SQLECmd can do that once a query is made for it. If you need help with it let me know
Avatar
Just Tulpa 3/5/2023 8:00 AM
hi hi
👋 2
Avatar
Does anyone still use https://github.com/AnttiKurittu/kirjuri or maybe even developed it further? (edited)
Kirjuri is a web application for managing cases and physical forensic evidence items. - GitHub - AnttiKurittu/kirjuri: Kirjuri is a web application for managing cases and physical forensic evidenc...
Avatar
Avatar
Andrew Rathbun
Are you thinking of SQLite query to extract out the info? SQLECmd can do that once a query is made for it. If you need help with it let me know
keving3047 3/5/2023 2:24 PM
That should work but I’ve got no experience with writing the queries and I struggle to find time to figure it out haha
Avatar
Avatar
keving3047
That should work but I’ve got no experience with writing the queries and I struggle to find time to figure it out haha
Andrew Rathbun 3/5/2023 2:29 PM
Navicat's query builder makes it pretty simple. If you need help, ping me. If you can provide a sample of the DB itself, I can spin something up.
Avatar
Hello, is anyone aware of any resources that offer downloadable digital forensics oriented challenges? Mainly challenges similar to https://www.ashemery.com/dfir.html and https://dfirmadness.com/the-stolen-szechuan-sauce/. I am aware of Blue Team Labs, however, I would prefer a platform that allows for the download of artifacts so one can use their own tools and environment
Dr. Ali Hadi personel website
The Stolen Szechuan Sauce is a digital forensics lab with you in mind. Share with your students or security team for scenario training.
👍 1
Avatar
Hey guys
6:04 AM
sorry for the newbiness here, but one question: is it valid in forensic terms, to do an image from a drive that is already an image from the original one?
6:04 AM
for instance: the original drive is in very bad shape and it will eventually fail for good
6:04 AM
I should create a 2nd copy, right?
6:05 AM
if the original is dead, is it valid to do a 2nd copy from the 1st copy?
Avatar
Avatar
Larbac
sorry for the newbiness here, but one question: is it valid in forensic terms, to do an image from a drive that is already an image from the original one?
Digitalferret 3/6/2023 6:15 AM
is this a theoretical or an actual forensic job, ie going to court? (edited)
Avatar
theroretical only
6:15 AM
still learning the tricks
Avatar
Digitalferret 3/6/2023 6:15 AM
don't sweat it then, as long as the hashes match you should be good
6:15 AM
some forces might even make 2 direct copies
Avatar
just wanted to be sure, that there's no problem not doing from the first "original" one
6:16 AM
as long as the hashes are the same, all is good then?
Avatar
Digitalferret 3/6/2023 6:18 AM
again, it depends. i'm not LE so someone else will chip in, but there will be cases like yours that will need more than one copy. i would say it's better to take 2 copies on the original imaging pass. also, laws may be different between countries and jurisdictions
6:18 AM
but whatever you do, maintain a full record of actions
6:18 AM
and preserve the source drive.
Avatar
got it
6:19 AM
thanks
👍🏻 1
Avatar
We are running our last episode of @Cellebrite Life Has No Ctrl Alt Del this coming Wednesday. Over 155 episodes. !! Join if you can https://cellebrite.com/en/series/ctrl-alt-del/
Want to virtually meet and collaborate with members of the DFIR community? Join Heather Mahalik, Cellebrite’s Sr. Director of Digital Intelligence, with guest speakers for live Meetups the first Wednesday of every month from 12:30 PM to 1 PM EST.
💯 4
cellebrite 2
Avatar
Nanotech Norseman 3/6/2023 9:22 AM
Hey all, I have a question I hope someone can answer. I've received a QBX file with a note stating it's password protected. My research indicates this is a Quicken Accountant Transfer file. Has anyone had any experience with this type of file or breaking the password? Passware doesn't seem to cover this file-type and Intuit doesn't seem too keen on providing trial software to assist with the investigation.
Avatar
Avatar
Nanotech Norseman
Hey all, I have a question I hope someone can answer. I've received a QBX file with a note stating it's password protected. My research indicates this is a Quicken Accountant Transfer file. Has anyone had any experience with this type of file or breaking the password? Passware doesn't seem to cover this file-type and Intuit doesn't seem too keen on providing trial software to assist with the investigation.
chick3nman 3/6/2023 9:37 AM
Intuit Quicken is one of the oldest tools of its kind. Over the years, Quicken had become the de facto standard for accounting, tax reporting and personal finance management in North America. Finances is an extremely sensitive area that demands adequate protection of the user data. However, prior
9:37 AM
some info here
9:38 AM
if it turns out it needs to be cracked, I don't believe we have a mode for it yet in hashcat but it can always be added
Avatar
Beat me to it...just about to paste that link haha
😎 1
Avatar
Nanotech Norseman 3/6/2023 9:40 AM
Haha, I'll give it a whirl. I thought I read an article of that nature, but QBX seems to be the strange one out compared to something like QBB or similar. Thanks though! I'll deep dive into this.
Avatar
Avatar
Nanotech Norseman
Hey all, I have a question I hope someone can answer. I've received a QBX file with a note stating it's password protected. My research indicates this is a Quicken Accountant Transfer file. Has anyone had any experience with this type of file or breaking the password? Passware doesn't seem to cover this file-type and Intuit doesn't seem too keen on providing trial software to assist with the investigation.
melissa_at_amped 3/6/2023 9:43 AM
From very specific systems, QBX files can be video files as well. If you find that it doesn't end up being a QuickBooks file, let me know and I'll give it a shot.
❤️ 1
Avatar
Also....
9:44 AM
Fast and easy to use software to remove password protection from QBW and QBA files. Instant password recovery with no technical skills required.
Avatar
Avatar
Larbac
as long as the hashes are the same, all is good then?
DeeFIR 🇦🇺 3/6/2023 1:45 PM
I’d explain why you did what you did. If you explained that the drive was failing/faulty, you created an image, then made a clone of that image (and both image hashes matched/were identical), and kept the original drive, then I can’t see an issue. As @Digitalferret said, maintain a chain of custody/integrity document, and document all your actions. Nothing wrong with what you’ve done, I’d do the same thing (and preserve the original image in addition to the original exhibit) if it was for a court case or subject to some kind of legal dispute/hold.
👍 1
Avatar
This was only a rhetorical question
1:47 PM
A doubt
1:47 PM
Thanks for answering
👍🏻 1
Avatar
Hello quick question, we have a victim business that states someone created a similar website to theres with a different play on the business name. The suspect is using textnow #'s to create the domain name, and to use to communicate. The victim stated the suspect is trying to take out loans or credit by using their business info. They have requested the website be marked as fraudulent. So far the suspect has not been successful yet. From a law enforcement perspective I'm drawing a conclusing this person is out of the US and will be a pain to locate and stop. Thoughts ? @Law Enforcement [USA] Send me a DM if you want to talk via official email. Thanks guys
Avatar
Avatar
DCSO
Hello quick question, we have a victim business that states someone created a similar website to theres with a different play on the business name. The suspect is using textnow #'s to create the domain name, and to use to communicate. The victim stated the suspect is trying to take out loans or credit by using their business info. They have requested the website be marked as fraudulent. So far the suspect has not been successful yet. From a law enforcement perspective I'm drawing a conclusing this person is out of the US and will be a pain to locate and stop. Thoughts ? @Law Enforcement [USA] Send me a DM if you want to talk via official email. Thanks guys
Should be able to find out who the provider of the domain for the fraudulent website is and do a search warrant for their records to get an IP address and subscriber information
❤️ 1
Avatar
Avatar
DCSO
Hello quick question, we have a victim business that states someone created a similar website to theres with a different play on the business name. The suspect is using textnow #'s to create the domain name, and to use to communicate. The victim stated the suspect is trying to take out loans or credit by using their business info. They have requested the website be marked as fraudulent. So far the suspect has not been successful yet. From a law enforcement perspective I'm drawing a conclusing this person is out of the US and will be a pain to locate and stop. Thoughts ? @Law Enforcement [USA] Send me a DM if you want to talk via official email. Thanks guys
I lack experience with TextNow, but they may have IP information. You should also be able to get IP information from the domain name provider. (edited)
Avatar
Avatar
DCSO
Hello quick question, we have a victim business that states someone created a similar website to theres with a different play on the business name. The suspect is using textnow #'s to create the domain name, and to use to communicate. The victim stated the suspect is trying to take out loans or credit by using their business info. They have requested the website be marked as fraudulent. So far the suspect has not been successful yet. From a law enforcement perspective I'm drawing a conclusing this person is out of the US and will be a pain to locate and stop. Thoughts ? @Law Enforcement [USA] Send me a DM if you want to talk via official email. Thanks guys
bookandrelease 3/6/2023 2:11 PM
Or just see what IP the domain has an A record for, and serve process on the provide of the IP address
Avatar
dabeersboys 3/6/2023 2:11 PM
@DCSO text now will give you the ip of the original account creation. You might beable to run a whois on the domain name. Some time people do or don't pay for privacy.. if they do you also get an idea of who is hosting the page and if they are foregin.
Avatar
I recently served GoDaddy for information on a fraudulent website scheme that was similar and they provided really good info. Took a while to get the return from them but it worked. (edited)
Avatar
dabeersboys 3/6/2023 2:14 PM
Then you an issue a subpoena to them for account holder info. It might be a giant circle
Avatar
𝓬𝓱𝓮𝔀𝔂_𝓬𝓸𝓸𝓴𝓲𝓮 3/6/2023 2:19 PM
May be useful to download an evidence copy of the offending site before if its taken down. Ive used winhttack
💯 1
Avatar
Have you looked into HTTrack?? It’s a free software tool. Allows you to clone the entire site into a file system. Sometimes the guys who put up the site will leave useful metadata in their public facing uploads to page. Additionally, check the public facing source code. While you shouldn’t need legal process with the first suggestion, check with your prosecutor or DA first.
💯 2
Avatar
Matt Chack 3/6/2023 2:22 PM
Now would be a good time to register for the inteliquent portal. Sounds like you already know that it’s a TextNow user, but inteliquent is involved in almost all of my fraud that involves VOIP. Portal users don’t have to subpoena to get wholesaler info, but it takes a little time to get registered
this 3
Avatar
True - this portal is useful-used last week
Avatar
Avatar
Matt Chack
Now would be a good time to register for the inteliquent portal. Sounds like you already know that it’s a TextNow user, but inteliquent is involved in almost all of my fraud that involves VOIP. Portal users don’t have to subpoena to get wholesaler info, but it takes a little time to get registered
This where I got it from, super useful as it use to take awhile and they would just point us into a different direction.
👍 1
Avatar
Avatar
dabeersboys
@DCSO text now will give you the ip of the original account creation. You might beable to run a whois on the domain name. Some time people do or don't pay for privacy.. if they do you also get an idea of who is hosting the page and if they are foregin.
The whois is made up, points to a university and the Ph number is also a textnow 🙂
Avatar
dabeersboys 3/6/2023 2:33 PM
@DCSO another strand to pull on 🙂
Avatar
Avatar
DCSO
The whois is made up, points to a university and the Ph number is also a textnow 🙂
bookandrelease 3/6/2023 2:59 PM
Do you mind sharing the domain?
Avatar
Deleted User 3/6/2023 4:24 PM
Hello i'd love to get more insight into the actual workload of a DFIR investigator, for example do Digital forensic examiners for law enforcement present evidence in court regularly? As opposed to private sector roles? Or would it be designated based on different tiers of the job like having an individual member of a team assigned to attend court proceedings, or like soc analysts how they are layered in different tiers based on primary incident responders etc. Or if they have the responsibilities for other roles more specific to ediscovery and evidence processing, very curious as to if these duties are typically involved in being an examiner. Also would they be visiting the crime scene and acquiring/seizing devices and evidence often? Or just analysing it once other departments/units transport it back to the lab? Just wondering what other potential duties the job would entail in terms of crime scene visits, and court visits. Sounds interesting for sure. Im aware it could vary per job title or department for each agency/company, but still sharing any of your own personal experience and knowledge is much appreciated.
Avatar
tapatiosec 3/6/2023 5:24 PM
Hi I am a big fan of SANS for their teaching materials. I've been to a couple of free online events from them and really enjoyed them
5:31 PM
I am currently getting into cloud security as my career. However, at the university I study at, I am part of a club that deals with cybersecurity. I am running to take over a research team for next academic year. If I do not get into the Infrastructure team lead positiion, I owe the room a speech for another role. For this reason, I am choosing to run for the Digital Forensics and Incident Response team lead. I only know a fair amount about Wireshark and some bits and pieces about FTK imager and Autopsy.
5:33 PM
If I am to result to plan B, are there any books that you can recommend for having a general overview of DFIR things so I can have a larger view of what kind of project I would do, should I get elected?
Avatar
Avatar
DCSO
The whois is made up, points to a university and the Ph number is also a textnow 🙂
SectorZero 3/6/2023 9:49 PM
If you’re comfortable enough with Kali, run Spiderfoot against the domain. There’s a ton of built in domain tools. You can also do some json digging on the site if it’s poorly built to find host info. You’d be surprised, I’ve found just plaintext IPs sitting in json before. HTTrack is okay but very finicky, especially if it hits a paywall or credential wall. WEcapture does the same thing and it’s just a browser extension. There are ways to trace VOIP but you gotta be an osint wizard
Avatar
testermonkey 3/7/2023 2:25 AM
morning everyone, could only point me to an article or advice on what causes the iphone's safari app save web pages in a pdf format in this container: \private\var\mobile\Containers\Data\Application\0B8CC322-C371-4B6C-9580-AD7E898D543A\tmp\450DC57D-C4F1-479F-B1D5-2F92209012BC.pdf otherwise I'll be playing with a test device for a week trying to find a possible answer
Avatar
Avatar
testermonkey
morning everyone, could only point me to an article or advice on what causes the iphone's safari app save web pages in a pdf format in this container: \private\var\mobile\Containers\Data\Application\0B8CC322-C371-4B6C-9580-AD7E898D543A\tmp\450DC57D-C4F1-479F-B1D5-2F92209012BC.pdf otherwise I'll be playing with a test device for a week trying to find a possible answer
Andrew Rathbun 3/7/2023 3:44 AM
#mobile-forensic-decoding
Avatar
today i learned what a key logger is Its used when someone wants to secretly monitor your keystrokes 😱
Avatar
Avatar
Rabbit
today i learned what a key logger is Its used when someone wants to secretly monitor your keystrokes 😱
And it comes in many varieties. Software, hardware, video, and even acoustic: https://github.com/shoyo/acoustic-keylogger !
👀 1
Avatar
digital Bowles 3/7/2023 7:46 AM
I was given a micro sd card from a Geeni (Merkury) door bell camera. No access to the physical camera or the device app. It is an encrypted file. When attempting to open the file it will not play on any of the players I have. I have GTS several terms with no luck. How can I go about finding the needed player?
Avatar
I am looking for a case management system for free use, on premise and offline. any recommendations?
Avatar
Avatar
digital Bowles
I was given a micro sd card from a Geeni (Merkury) door bell camera. No access to the physical camera or the device app. It is an encrypted file. When attempting to open the file it will not play on any of the players I have. I have GTS several terms with no luck. How can I go about finding the needed player?
melissa_at_amped 3/7/2023 8:00 AM
We might want to move this over to #dvr-multimedia-surveillance but on first glance, everything I see talks about downloading from the app which is obviously a no-go. What format are the files?
Avatar
digital Bowles 3/7/2023 8:03 AM
.data
Avatar
Avatar
digital Bowles
.data
melissa_at_amped 3/7/2023 8:06 AM
I'll DM you 🙂
Avatar
Hello all, I was just wondering if someone may have some insight here. I work in the private sector doing digital forensics and we are rapidly growing as a team. We are therefore considering an office move and I wanted to know what are the security measures needed to satisfy UKAS et al with regards to access control and exhibit security overnight etc. Does anyone have any advice to spare? Thanks!
Avatar
Avatar
tapatiosec
If I am to result to plan B, are there any books that you can recommend for having a general overview of DFIR things so I can have a larger view of what kind of project I would do, should I get elected?
CyberGhost 3/7/2023 8:45 AM
It's a little dated now, but I liked the book Incident Response & Computer Forensics that Kevin Mandia coauthored. Don't focused so much on the tools mentioned as some are probably dated now, but more on the over all process and methodology
Avatar
does anyone know if you can purchase Physical Analyzer as a standalone, or is it only available with UFED Ultimate, which includes 4PC and PA? can it be purchased solely by itself? or would you need at least one UFED license? I guessn im just trying to figure out if you have 1 UFED, but would need 5 PA licenses. Of if as an agency, you rely on another agency to do your extractions and you ONLY want to purchase PA to parse the data after they give you the extraction
Avatar
Andrew Rathbun 3/7/2023 10:38 AM
#training-education-employment
👍 1
Avatar
Thank you, I'll post it there!
Avatar
Avatar
Leonidas
I lack experience with TextNow, but they may have IP information. You should also be able to get IP information from the domain name provider. (edited)
forensicmike @Magnet 3/7/2023 12:24 PM
ive seen a case w/ a request to textnow come back with great info, even when the suspect deleted the phone number shortly after sending the messages.
Avatar
Textnow holds the record for my fastest non-emergency subpoena response of 6 hours
👍 1
Avatar
Avatar
Larbac
Hey guys
Just curious about your terminology. If you have an image of a damaged drive, and you want to create a backup, why not simply copy those files? Usually, an image is in the form of .E01 or .DD, and comes with a hash in a text file that the imaging software spits out, or you can manually hash the files. So if you make a copy, you can then hash the copied files and confirm you have a true copy by comparing the hashes. If you create another image, for example, using an .E01 format, you will get additional data in your header and then the hash will not match the original hash, even though you may have a proper 'image'.
Avatar
Avatar
rfar
Just curious about your terminology. If you have an image of a damaged drive, and you want to create a backup, why not simply copy those files? Usually, an image is in the form of .E01 or .DD, and comes with a hash in a text file that the imaging software spits out, or you can manually hash the files. So if you make a copy, you can then hash the copied files and confirm you have a true copy by comparing the hashes. If you create another image, for example, using an .E01 format, you will get additional data in your header and then the hash will not match the original hash, even though you may have a proper 'image'.
I'm more of a data recovery guy. Usually I don't care about hashes, just want to get the data out. Of course, on a forensic case, this is not the way...
Avatar
Avatar
Sea9
And it comes in many varieties. Software, hardware, video, and even acoustic: https://github.com/shoyo/acoustic-keylogger !
I dont understand what I'm looking at but this is so cool! It seems like it can determine keystrokes through an audio file whaaaaaaaat
Avatar
Avatar
Rabbit
I dont understand what I'm looking at but this is so cool! It seems like it can determine keystrokes through an audio file whaaaaaaaat
Recordings of keyboard sounds. MIT worked on that years and years ago as well. (edited)
Avatar
https://discordapp.com/channels/427876741990711298/537760691302563843/1082701655209938962 - if anyone here has any input/advice, i'd really appreciate! Thanks
Avatar
Avatar
Catherine
https://discordapp.com/channels/427876741990711298/537760691302563843/1082701655209938962 - if anyone here has any input/advice, i'd really appreciate! Thanks
Digitalferret 3/8/2023 3:00 AM
no joy contacting ukas directly?
Avatar
Avatar
Catherine
https://discordapp.com/channels/427876741990711298/537760691302563843/1082701655209938962 - if anyone here has any input/advice, i'd really appreciate! Thanks
When I dealt with this previously we implemented the following: Forensic office/lab access was by controlled by ID card (RFID) access (individually assigned) and also with a physical lock for overnight/extended periods of staff absence and all entry and exit times were electronically logged and archived monthly. The key for the physical lock was kept in a combination lock attached to an outside wall of the lab (general open plan office area). The server room holding the data storage /DF servers was also keycard access only, and since this also included some general IT personnel, the DF racks were kept locked and the key for that was kept in the lab (controlled by keycard access as mentioned). Visitors had to sign in and out of a book also kept in the lab and could not be left unattended. Exhibits were kept in a locked cabinet and assigned specific locations within the cabinet, with their position in the cabinet and any internal movement tracked by a case management system. Any exhibits coming in or out of the lab were also tracked by a case management system & booking in/out forms including signatures (generated from the CMS and signed copies later scanned back in). We had all of this nicely written up as a few SOPS and we had no issues from UKAS with this procedure. Also all of it had to be audited at set intervals and the results of those audits shown to UKAS. (edited)
👍🏻 2
Avatar
Avatar
bizzlyg
When I dealt with this previously we implemented the following: Forensic office/lab access was by controlled by ID card (RFID) access (individually assigned) and also with a physical lock for overnight/extended periods of staff absence and all entry and exit times were electronically logged and archived monthly. The key for the physical lock was kept in a combination lock attached to an outside wall of the lab (general open plan office area). The server room holding the data storage /DF servers was also keycard access only, and since this also included some general IT personnel, the DF racks were kept locked and the key for that was kept in the lab (controlled by keycard access as mentioned). Visitors had to sign in and out of a book also kept in the lab and could not be left unattended. Exhibits were kept in a locked cabinet and assigned specific locations within the cabinet, with their position in the cabinet and any internal movement tracked by a case management system. Any exhibits coming in or out of the lab were also tracked by a case management system & booking in/out forms including signatures (generated from the CMS and signed copies later scanned back in). We had all of this nicely written up as a few SOPS and we had no issues from UKAS with this procedure. Also all of it had to be audited at set intervals and the results of those audits shown to UKAS. (edited)
Thank you so much for this insight! I have been thinking along the same lines, but with RFID key fob types as we are a very small outfit at the moment, ID passes may not be applicable to us. Glad to know I'm thinking in the right way though!
👍 1
Avatar
kmacdonald1565 3/8/2023 7:49 AM
anyone have recommendations for video players to play partial video files? long story short, CSAM partial downloads. VLC and K-Lite are not working.
7:50 AM
not critical in this case but figured i would ask as we run into similar problems occasionally
7:51 AM
@ICAC
Avatar
Avatar
kmacdonald1565
anyone have recommendations for video players to play partial video files? long story short, CSAM partial downloads. VLC and K-Lite are not working.
maybe mpv ?
8:40 AM
seems like a good project idea though, either recovery or try to identify keyframe structures and process (edited)
Avatar
Avatar
VoidOfOne
Beyond the microsd card, does anyone here have experience forensically imaging a flipper zero with an enabled pin lock?
ScottKjr3347 3/8/2023 8:46 AM
Following this if you have any additional information about the topic?
Avatar
Avatar
kmacdonald1565
anyone have recommendations for video players to play partial video files? long story short, CSAM partial downloads. VLC and K-Lite are not working.
When you say partial video files, do you mean a video that is not fully wrapped/containerized into a single file? Like some part of a video was found but not playable? There is a solution but it is not automated (at least not yet 😉). We cover the approach in some of our Medex training courses, including the AVF course at IACIS in April. If you have a specific case need shoot me a DM and I will see how we can help.
Avatar
Avatar
kmacdonald1565
anyone have recommendations for video players to play partial video files? long story short, CSAM partial downloads. VLC and K-Lite are not working.
I wonder if that is something that software from @Amped Software or @iNPUT-ACE could handle?
Avatar
Avatar
kmacdonald1565
anyone have recommendations for video players to play partial video files? long story short, CSAM partial downloads. VLC and K-Lite are not working.
melissa_at_amped 3/8/2023 9:33 AM
I'd absolutely be willing to give it a try! I can drop you a DM.
Avatar
AFredericks (Axon) 3/8/2023 9:43 AM
Happy to help!
Avatar
Hey friends, I feel like im blanking on an easy solution… good ways to capture a webpage that is utilizing JavaScript? Catch is, must be done in a way that the user is not viewing the page at capture (so in a similar fashion to wget.) Thanks in advance!
Avatar
Avatar
unc05_4n6
does anyone know if you can purchase Physical Analyzer as a standalone, or is it only available with UFED Ultimate, which includes 4PC and PA? can it be purchased solely by itself? or would you need at least one UFED license? I guessn im just trying to figure out if you have 1 UFED, but would need 5 PA licenses. Of if as an agency, you rely on another agency to do your extractions and you ONLY want to purchase PA to parse the data after they give you the extraction
Just had a conversation with my Cellebrite rep today. They do not offer it as a standalone option. He literally said, “It’s like Left Twix and Right Twix”. If you just need to be able to parse extractions from other agencies/labs, I would suggest getting familiar with Autopsy. It’s free and can get the job done. Doesn’t have all the bells and whistles but again… it’s free. 💁🏻‍♂️ (edited)
Avatar
Avatar
Brandon E
When you say partial video files, do you mean a video that is not fully wrapped/containerized into a single file? Like some part of a video was found but not playable? There is a solution but it is not automated (at least not yet 😉). We cover the approach in some of our Medex training courses, including the AVF course at IACIS in April. If you have a specific case need shoot me a DM and I will see how we can help.
kmacdonald1565 3/8/2023 11:58 AM
partial as in P2P was involved but the video was incomplete
11:58 AM
so it has pieces of the files as p2p downloaded them
11:59 AM
some of the files are quite large, but just wouldnt play. i am checking out some players and other software
Avatar
Avatar
MeGaBiTe
Hey friends, I feel like im blanking on an easy solution… good ways to capture a webpage that is utilizing JavaScript? Catch is, must be done in a way that the user is not viewing the page at capture (so in a similar fashion to wget.) Thanks in advance!
kmacdonald1565 3/8/2023 12:02 PM
so, i dont know how it might work for your use case, but i know in PHP and Python (and other languages, just never needed other ones) you can get information from webpages that can be parsed into those languages. this allows someone to fully load a webpage behind the scenes and pull out information. I cant remember how extensive it was, but i know it didnt work with everything...depending on what you are trying to accomplish they might be viable
Avatar
Avatar
kmacdonald1565
so, i dont know how it might work for your use case, but i know in PHP and Python (and other languages, just never needed other ones) you can get information from webpages that can be parsed into those languages. this allows someone to fully load a webpage behind the scenes and pull out information. I cant remember how extensive it was, but i know it didnt work with everything...depending on what you are trying to accomplish they might be viable
I did try a small python script using selenium that grabbed some of the page source but it didn’t seem to get me over the JavaScript hurdle. So I’m missing a lot of data.
Avatar
Avatar
DFIS721
Just had a conversation with my Cellebrite rep today. They do not offer it as a standalone option. He literally said, “It’s like Left Twix and Right Twix”. If you just need to be able to parse extractions from other agencies/labs, I would suggest getting familiar with Autopsy. It’s free and can get the job done. Doesn’t have all the bells and whistles but again… it’s free. 💁🏻‍♂️ (edited)
Can you send me a Dm. I want to get to bottom of this.
Avatar
Avatar
kmacdonald1565
anyone have recommendations for video players to play partial video files? long story short, CSAM partial downloads. VLC and K-Lite are not working.
Digitalferret 3/8/2023 4:53 PM
usually thats a .mp4 issue? as far as I'm aware, pretty difficult to reconstruct but may be some headway if you have complete files from the same production device (unlikely but possible on p2p?) or could you check the p2p client's recorded hash value for that file against a database or check for a title?
this 1
Avatar
Avatar
Digitalferret
usually thats a .mp4 issue? as far as I'm aware, pretty difficult to reconstruct but may be some headway if you have complete files from the same production device (unlikely but possible on p2p?) or could you check the p2p client's recorded hash value for that file against a database or check for a title?
It sounds like a .partial file so the file just hasn't been fully downloaded. In cases where this happens to us if we can't get it to play, then we use the hash values against csam databases and use that as confirmation that the file is known etc and what category
👍🏻 1
Avatar
Avatar
Rob
It sounds like a .partial file so the file just hasn't been fully downloaded. In cases where this happens to us if we can't get it to play, then we use the hash values against csam databases and use that as confirmation that the file is known etc and what category
Digitalferret 3/9/2023 12:51 AM
yep, having gone grey trying to reconstruct my own mp4's after a crash, it looks to be the best way forward in ID'ing the miscreants file/intent/mens rea
👍 1
Avatar
Avatar
unc05_4n6
does anyone know if you can purchase Physical Analyzer as a standalone, or is it only available with UFED Ultimate, which includes 4PC and PA? can it be purchased solely by itself? or would you need at least one UFED license? I guessn im just trying to figure out if you have 1 UFED, but would need 5 PA licenses. Of if as an agency, you rely on another agency to do your extractions and you ONLY want to purchase PA to parse the data after they give you the extraction
If you need to divide analysis job to multiple persons, perhaps you could let the person doing extractions also do the parsing with PA and then do a Report of all relevant data in ufdr format + Cellebrite reader included. Reader works well for analysis, it lets you to create new tags and do new Reports according to analysts findings. Not exactly what you asked, I know, but those Cellebrite licence fees are a good incentive to try to find alternative solutions...
Avatar
Avatar
MeGaBiTe
I did try a small python script using selenium that grabbed some of the page source but it didn’t seem to get me over the JavaScript hurdle. So I’m missing a lot of data.
Are you trying to save a screenshot, a select amount of data, or as an "html" copy ? I've used selenium a bit, and have had the best results when using it to walk the elements I care about and parse
Avatar
another strategy is to identify what api's the javascript is calling, then hit those yourself. If it requires a csrf token, I've used selenium to steal the csrf token by running javascript in the page; then you can use normal python requests (edited)
Avatar
Does anyone on here know of anything that replaces NSRLserver and NSRLLookup since NSRL is now a SQLite3 db? Or if Axiom or Encase are supporting the SQLite3 databases?
Avatar
Avatar
fcha256
Does anyone on here know of anything that replaces NSRLserver and NSRLLookup since NSRL is now a SQLite3 db? Or if Axiom or Encase are supporting the SQLite3 databases?
chriscone_ar 3/9/2023 7:38 AM
NIST's RDSv3 minimal files can be used with AXIOM via the Hash Sets Manager.
Avatar
Yuri Gubanov (Belkasoft) 3/9/2023 9:22 AM
Belkasoft X also supports the new NIST format
Avatar
Is there any tool that generates random data for filesystem testing purposes?
9:34 AM
I'm trying to populate a ssd with some junk folders/files/etc.. and I hate doing it manually 😅
Avatar
nvm, I found a python library called faker which does the job
9:43 AM
thanks anyhow
Avatar
Hello! I'm currently a third year student at Teesside University studying Digital Forensics and as part of my dissertation I am running a survey based around the area of Cloud Forensics. It's a relatively short survey with mostly "tick the box" style questions. If you want to participate please read the attached document and click the survey link attached inside, thank you for your time. (Please note this Survey is aimed at current practitioners working for or within law enforcement, Thank you) **Thank you for all those who have participated so far, this is the last time I will be advertising this survey as the paper is in on the 20th, anyone wanting to read it just let me know and I will happily share it after grading! (edited)
Avatar
A Croatian national has been arrested for allegedly operating NetWire, a Remote Access Trojan (RAT) marketed on cybercrime forums since 2012 as a stealthy way to spy on infected systems and siphon passwords. The arrest coincided with a seizure of…
Avatar
More news soon (especially relevant to DFIR practitioners) on the NetWire front. (edited)
👍 1
Avatar
If any of you have dealt with NetWire victims, and still have disk images obtained from compromised computers, you may want to DM us.
Avatar
kladblokje_88 3/10/2023 2:13 AM
im so done with my current school
2:13 AM
its horrid
Avatar
Avatar
kladblokje_88
im so done with my current school
Andrew Rathbun 3/10/2023 4:47 AM
#training-education-employment talk about education stuff there if you don't mind
Avatar
Does anyone have a good go-by warrant for Reddit? Trying to get IP/email/etc of a user.
Avatar
Avatar
kmacdonald1565
anyone have recommendations for video players to play partial video files? long story short, CSAM partial downloads. VLC and K-Lite are not working.
craigcilley 3/10/2023 2:12 PM
As part of the just finished Magnet Virtual Summit, there was a session titled: From Codecs to Containers: The Basics of Working With Video Files. Presenter talked about FFPlay & Media Player Classic as alternatives to VLC.
Avatar
MrMacca (Allan Mc) 3/10/2023 3:20 PM
@kmacdonald1565 you could try potplayer, I've had luck with that playing files others couldn't.
Avatar
Hello everyone I’m new! Any tips for someone new to digital forensics, such as any books or topics I should look upon? Thank you!!!
Avatar
Avatar
Big Crab
Hello everyone I’m new! Any tips for someone new to digital forensics, such as any books or topics I should look upon? Thank you!!!
What areas are you interested in so we can narrow it down for you.
Avatar
Avatar
Beercow
What areas are you interested in so we can narrow it down for you.
Ooh im completely new so probably the identification, collection and reporting processes of data
Avatar
Got some buds from Silicon Valley Bank looking for gigs as of tonight. If you got anything let me know.
Avatar
AstuteCoder 3/10/2023 6:48 PM
hi im new to data recovery.. guys i have a WDC WD10SPCX-24HWST0 unable to format to full. could it be a firmware problem?
6:48 PM
is there any tool to update firmware for wd hard diskz?
Avatar
kmacdonald1565 3/10/2023 7:41 PM
added to the list thanks @craigcilley and @MrMacca (Allan Mc)
Avatar
Avatar
Digitalferret
usually thats a .mp4 issue? as far as I'm aware, pretty difficult to reconstruct but may be some headway if you have complete files from the same production device (unlikely but possible on p2p?) or could you check the p2p client's recorded hash value for that file against a database or check for a title?
kmacdonald1565 3/10/2023 7:42 PM
less likely to work for me in my case, id be better off contacting someone that had the completed downloads but thanks for the option
👍🏻 1
Avatar
Avatar
Big Crab
Ooh im completely new so probably the identification, collection and reporting processes of data
plenty of resources on my page, from starting out to tools to podcasts, to blog rolls and so much more check it out https://startme.stark4n6.com
A startpage with online resources about Forensics, created by Stark 4N6.
Avatar
Avatar
Big Crab
Ooh im completely new so probably the identification, collection and reporting processes of data
Cybersecurity is a fast-growing, dynamic field and SANS mission is to equip you with the skills you need to succeed in the industry. This free live-online event brings together leading experts prepared to share their first-hand knowledge on building a successful career in the field of cyber security. This two day summit will provide you with a c...
this 1
Avatar
blackfootsec 3/10/2023 8:10 PM
Evening all, I have a question about autopsy. I am a cyber security student, but have very little experience in data forensics and recovery. A "Customer" asked me if I could recover the information on a windows box that was returned to the default settings. Could someone point me in the right direction to recover some files off this machine. I have not received the computer yet, but I am assuming it is either Windows 7 or Windows 10.
Avatar
Avatar
stark4n6
plenty of resources on my page, from starting out to tools to podcasts, to blog rolls and so much more check it out https://startme.stark4n6.com
Thank you !
Avatar
blackfootsec 3/11/2023 8:57 AM
Thanks for the information, I will begin to sort through it, that is a gold mine, but I was hoping for something like a .pdf describing the set up for imaging a drive in the proper format and beginning to analyze it with something like autopsy to give me a place to start. Is there a better way to analyze Windows boxes for files that may be deleted by setting the machine back to factory default?
8:58 AM
I was also curious once I open the machine, if it is Windows 10, will all the files be encrypted with a SAM database that no longer exists?
Avatar
Avatar
blackfootsec
Thanks for the information, I will begin to sort through it, that is a gold mine, but I was hoping for something like a .pdf describing the set up for imaging a drive in the proper format and beginning to analyze it with something like autopsy to give me a place to start. Is there a better way to analyze Windows boxes for files that may be deleted by setting the machine back to factory default?
When you say "returned to the default settings", was it reformatted and Windows reinstalled?
Avatar
Major update today to our popular Insights article "BitLocker for #DFIR - Part I" - https://ArsenalRecon.com/insights/bitlocker-for-dfir-part-i. (edited)
👍 6
Avatar
blackfootsec 3/12/2023 8:02 AM
Window was returned to factory default. I am still confirming the information provided by the client, but it appears the system had a factory reset performed on it to return the system to the out-of-the-box initial state.
Avatar
Deleted User 3/13/2023 4:41 AM
Researchers at the School of Cyber Security at Korea University, Seoul, have presented a new covert channel attack named CASPER can leak data from air-gapped computers to a nearby smartphone at a rate of 20bits/sec.
💯 1
4:41 AM
New cyber attack
Avatar
Any indian (especially in NCR region) who work in DFIR company and it might have internship opportunities for students?
Avatar
Avatar
Browny
Any indian (especially in NCR region) who work in DFIR company and it might have internship opportunities for students?
Digitalferret 3/13/2023 6:14 AM
#training-education-employment
Avatar
What is the best software for recovering large mp4 videos from a while ago ?
11:42 AM
On PC
Avatar
Avatar
miota
What is the best software for recovering large mp4 videos from a while ago ?
Digitalferret 3/13/2023 12:16 PM
#data-recovery
Avatar
Hi everyone, I would like to ask if there is any parameter in MFTECmd that allows me to append the original disk drive letter when exporting to a CSV file? Or is there a way to customize the drive letter? I seem to be unable to find any parameter that can do this. It seems that I can only find the option to specify the drive letter using "--bdl" when outputting as a bodyfile. (edited)
Avatar
Avatar
RX
Hi everyone, I would like to ask if there is any parameter in MFTECmd that allows me to append the original disk drive letter when exporting to a CSV file? Or is there a way to customize the drive letter? I seem to be unable to find any parameter that can do this. It seems that I can only find the option to specify the drive letter using "--bdl" when outputting as a bodyfile. (edited)
Andrew Rathbun 3/14/2023 2:45 AM
I imagine you're talking about when you're parsing an MFT from a live system? Because if you parse an offline, loose MFT, there's no way for MFTECmd to know which drive letter it belongs to.
2:47 AM
If you want to make a feature request for this when parsing a live system, try your luck here: https://github.com/EricZimmerman/MFTECmd
Parses $MFT from NTFS file systems. Contribute to EricZimmerman/MFTECmd development by creating an account on GitHub.
Salute 1
Avatar
Avatar
Andrew Rathbun
I imagine you're talking about when you're parsing an MFT from a live system? Because if you parse an offline, loose MFT, there's no way for MFTECmd to know which drive letter it belongs to.
It is offline MFT, but I know its actual drive letter, so I want to assign it a drive letter. (I collected the $MFT of three disk partitions: C, D, E)"
2:50 AM
just want to know if I missed any command parameters, but I think I can easily write a Python code to achieve it
2:50 AM
thank you 🙂
Avatar
Avatar
RX
It is offline MFT, but I know its actual drive letter, so I want to assign it a drive letter. (I collected the $MFT of three disk partitions: C, D, E)"
Andrew Rathbun 3/14/2023 2:51 AM
I'm guessing that's why the ParentPath column starts with .\ for each folder, which would represent the root of the drive, regardless of letter. In that scenario, I just rename the CSV to include _D or _E so I know which drive letter the output from each is. Multiple ways to go about it!
Salute 1
Avatar
Avatar
Andrew Rathbun
I'm guessing that's why the ParentPath column starts with .\ for each folder, which would represent the root of the drive, regardless of letter. In that scenario, I just rename the CSV to include _D or _E so I know which drive letter the output from each is. Multiple ways to go about it!
You are right, there are many ways to achieve it. Thank you for your help and sharing your experience! Sir
👍 1
Avatar
Kali, a well known pentesting distribution, has released a variant dedicated to purple and blue teaming 🥳 https://www.kali.org/blog/kali-linux-2023-1-release/
Today we are releasing Kali 2023.1 (and on our 10th anniversary)! It will be ready for immediate download or updating by the time you have finished reading this post. Given its our 10th anniversary, we are delighted to announce there are a few special things lined up to help celebrate. Stay tuned for a blog post coming out Wednesday 15th March 2...
👍 3
Avatar
Hey people! Does anyone knows how can one protect excel file from being copied from a CD/DVD disk? Or set a protection on a disk to prevent copying files from it?
Avatar
Avatar
ilinor
Hey people! Does anyone knows how can one protect excel file from being copied from a CD/DVD disk? Or set a protection on a disk to prevent copying files from it?
Digitalferret 3/14/2023 10:30 AM
if anything is readable, surely it's copy-able? what are you trying to protect? would you not be better encrypting?
Avatar
Avatar
Digitalferret
if anything is readable, surely it's copy-able? what are you trying to protect? would you not be better encrypting?
Thanks for the reply! I got asked this question by my friend, he only wants an option to prevent copying the file from the CD, unsure why he didn't want to look into any other alternative. Encryption seems like the best option, but the friend isn't happy with that one, unsure of the reason. He found some software, hasn't replied which one it is, but consider this resolved. 😄
👍🏻 1
Avatar
Does anyone have info on US based federal grants that would provide persistent funding for DF equipment and licensing for smaller agencies? Looking to implement new tech in our lab and our city funding for DF is tapped out for the next 5 years on other “more important” projects…
Avatar
Avatar
Revo
Does anyone have info on US based federal grants that would provide persistent funding for DF equipment and licensing for smaller agencies? Looking to implement new tech in our lab and our city funding for DF is tapped out for the next 5 years on other “more important” projects…
I don't know of any federal grants, but I can ask around. We have some local agencies that go after grants a lot. Does your state have any grants? Several local agencies in my area have received grants for new tech from the state. The other thing we have done is obtain substantial discounts from some vendors because of being LE. That of course is up to the vendor, some it was a hard "here is our pricing" 😅
Avatar
Avatar
CyberGhost
I don't know of any federal grants, but I can ask around. We have some local agencies that go after grants a lot. Does your state have any grants? Several local agencies in my area have received grants for new tech from the state. The other thing we have done is obtain substantial discounts from some vendors because of being LE. That of course is up to the vendor, some it was a hard "here is our pricing" 😅
Yeah I’ve worked with the vendors to get a discount and other funding sources but NGO non profits only fund for a year to get you started, unfortunately it’s a pricey improvement and we’ll need perpetual funding
3:44 PM
And out state grants are past the due date in February
3:44 PM
Our*
Avatar
Avatar
Revo
Does anyone have info on US based federal grants that would provide persistent funding for DF equipment and licensing for smaller agencies? Looking to implement new tech in our lab and our city funding for DF is tapped out for the next 5 years on other “more important” projects…
OT: i am shocked - no budget for the next 5 years?? How are you supposed to work? That's absolutely not going to work <.< I really hope you get some funding!
Avatar
Avatar
hopscotch
OT: i am shocked - no budget for the next 5 years?? How are you supposed to work? That's absolutely not going to work <.< I really hope you get some funding!
Tell me about it… Fortunately we have operational budget for licenses we already have but no expansion budget…
Avatar
Yeah funding is a big issues for small agencies here. The only thing that allows us to even have access to some specific tools and tech is that other local agencies share some of their resources. We have a state lab and they are great, but they can be extremely backed up on case work.
Avatar
Avatar
CyberGhost
Yeah funding is a big issues for small agencies here. The only thing that allows us to even have access to some specific tools and tech is that other local agencies share some of their resources. We have a state lab and they are great, but they can be extremely backed up on case work.
That’s why we expanded as much as we have, but as time goes on we need to remain ahead of the technology curve. I’m fortunate enough to have an admin that sees that but when there’s no money, there’s no money 😂 We were in the same boat when I moved us to get a great DF workstation, upgrade to our Cellebrite, and got a GrayKey. But now we’re falling behind on storage of evidence, and still don’t have a way to process computers, only mobile devices…
Avatar
Avatar
Revo
That’s why we expanded as much as we have, but as time goes on we need to remain ahead of the technology curve. I’m fortunate enough to have an admin that sees that but when there’s no money, there’s no money 😂 We were in the same boat when I moved us to get a great DF workstation, upgrade to our Cellebrite, and got a GrayKey. But now we’re falling behind on storage of evidence, and still don’t have a way to process computers, only mobile devices…
Same here lol. Since phones are more the focus usually, we went that route. If it's a computer/laptop/other device, have to get assistance from elsewhere.
Avatar
Avatar
Revo
That’s why we expanded as much as we have, but as time goes on we need to remain ahead of the technology curve. I’m fortunate enough to have an admin that sees that but when there’s no money, there’s no money 😂 We were in the same boat when I moved us to get a great DF workstation, upgrade to our Cellebrite, and got a GrayKey. But now we’re falling behind on storage of evidence, and still don’t have a way to process computers, only mobile devices…
Have you reached out to your local USSS office? They are known to help with finding, training, and equipment.
Avatar
Whoops, typo. I meant to say funding, lol.
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 3/15/2023 4:54 AM
#training-education-employment
👍 1
Avatar
Does anyone know if Dropbox notifies the user if their account was flagged for CSAM? Trying to ascertain why an older user would have Developer Mode on and ZERO picture/video files on the phone. Also no sign of the DropBox app. Thanks!
Avatar
Avatar
TCSkyKing
Does anyone know if Dropbox notifies the user if their account was flagged for CSAM? Trying to ascertain why an older user would have Developer Mode on and ZERO picture/video files on the phone. Also no sign of the DropBox app. Thanks!
as far as i know, the user isn't given a reason as to why their data was removed. historically, db also reports the user immediately to NCMEC to handle it. re: https://gizmodo.com/dropbox-refuses-to-explain-its-mysterious-child-porn-de-1722573363
6:51 AM
at most, they should get an email saying your content violated our policy, it's been removed but it might not even be a warning if it's specifically CSAM
Avatar
Avatar
babybat
as far as i know, the user isn't given a reason as to why their data was removed. historically, db also reports the user immediately to NCMEC to handle it. re: https://gizmodo.com/dropbox-refuses-to-explain-its-mysterious-child-porn-de-1722573363
That’s good reason. It was definitely forwarded from NCMEC to DB for flagging. I’m curious to look at the timeline from the phone dump now. Thanks for the reply!
pepepray 1
Avatar
Anyone having trouble launching Hubstream Intelligence Agent from @Project VIC ?
Avatar
Deleted User 3/15/2023 10:41 AM
where I can find old forensics case puplished online
Avatar
Has anyone ever sent a geofence-esqe warrant to Nissan Connect?
Avatar
Anyone got any experience capturing from an Endeavour EN10 voice recorder?
Avatar
Avatar
DHillTCSO
Has anyone ever sent a geofence-esqe warrant to Nissan Connect?
Some folks in #vehicle-forensics might have? Or maybe give some info if that kina of data is available
Avatar
Is there going to be a way to "upgrade" a standard kali installation to purple as it seems to be an additional set of tool more than anything and I don't want to have to reinstall kali if I can help it
Avatar
Avatar
Alexsaurus
Is there going to be a way to "upgrade" a standard kali installation to purple as it seems to be an additional set of tool more than anything and I don't want to have to reinstall kali if I can help it
You can edit the source list file and do a full-upgrade
Avatar
Does anyone have any good software for cleaning up an audio recording to make it easier to hear people talking?
Avatar
surprise no Velociraptor, huh.
Avatar
Is it possible to detect polyglot ? Can we depend on the hex values for Magic keys and the EOL for specific files?
Avatar
I've got a device with a Qualcomm Snapdragon 617 (a scanner, not a mobile phone, but with android) which I just can't boot into EDL Mode. Not via various button combination and there's no "boot into bootloader" option in recovery mode. I've reached out to the manufacturer and they said "EDL is not supported". My question: is it really possible to disable/ remove EDL Mode? I thought that's not possible..?
Avatar
It can be locked by software, even via OTA update, but there should be a hardware way to get that mode still, either via some testpoint, or via eMMC fault mode (blocking communication with the storage)
👍 1
Avatar
I haven't been here very long time
Avatar
Hi all, currently seeding our new mobile devices with GTD, but im wondering if there is an easier way to do this rather than seeding manually. I have 3 iPhones, 3 androids and 1 burner. I did think of doing a backup but this will also update the OS which I’d rather keep on different versions. Anyone have any suggestions?
😣 1
Avatar
Anyone have a keyword list of common external email domain names for searching?
Avatar
Deleted User 3/16/2023 6:53 AM
Hey, anyone knows how I could contact Nirsoft? or does anyone know how to fix this exception in LAV Exception C0000005 at address 0040E0CB in module LastActivityView.exe Registers: EAX=00000000 EBX=00000000 ECX=02500000 EDX=00000000 ESI=00000000 EDI=00197D44 EBP=00196218 ESP=00195590 EIP=0040E0CB Stack Data: 44 7D 19 00 00 00 00 00 2C 6F 19 00 43 00 3A 00 5C 00 55 00 53 00 45 00 52 00 53 00 5C 00 44 00 49 00 41 00 47 00 54 00 52 00 41 00 43 00 4B 00 5C 00 44 00 45 00 53 00 4B 00 54 00 4F 00 50 00 5C 00 44 00 55 00 53 00 4B 00 2E 00 41 00 53 00 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Code Data: 81 3B 4D 41 4D 04 0F 85 E5 00 00 00 8B 7B 04 89 75 98 89 75 A0 89 75 A4 89 75 A8 89 75 9C 89 75 AC 89 75 B0 89 75 B4 89 75 B8 8D 75 C8 89 7D FC E8 EB 80 FF FF 33 FF 8D 75 98 89 7D D8 89 7D 0C 89 7D D4 E8 DD 48 00 00 39 7D B8 74 0D 8D 45 D4 50 8D 45 0C 50 6A 04 FF 55 B8 39 7D 0C 75 07 C7 45 0C FF FF 00 00 89 7D BC 89 7D C0 8B 7D 0C 8D 75 BC C7 45 C4 88 13 00 00 E8 A2 80 FF FF 8D 75
Avatar
Avatar
Deleted User
Hey, anyone knows how I could contact Nirsoft? or does anyone know how to fix this exception in LAV Exception C0000005 at address 0040E0CB in module LastActivityView.exe Registers: EAX=00000000 EBX=00000000 ECX=02500000 EDX=00000000 ESI=00000000 EDI=00197D44 EBP=00196218 ESP=00195590 EIP=0040E0CB Stack Data: 44 7D 19 00 00 00 00 00 2C 6F 19 00 43 00 3A 00 5C 00 55 00 53 00 45 00 52 00 53 00 5C 00 44 00 49 00 41 00 47 00 54 00 52 00 41 00 43 00 4B 00 5C 00 44 00 45 00 53 00 4B 00 54 00 4F 00 50 00 5C 00 44 00 55 00 53 00 4B 00 2E 00 41 00 53 00 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Code Data: 81 3B 4D 41 4D 04 0F 85 E5 00 00 00 8B 7B 04 89 75 98 89 75 A0 89 75 A4 89 75 A8 89 75 9C 89 75 AC 89 75 B0 89 75 B4 89 75 B8 8D 75 C8 89 7D FC E8 EB 80 FF FF 33 FF 8D 75 98 89 7D D8 89 7D 0C 89 7D D4 E8 DD 48 00 00 39 7D B8 74 0D 8D 45 D4 50 8D 45 0C 50 6A 04 FF 55 B8 39 7D 0C 75 07 C7 45 0C FF FF 00 00 89 7D BC 89 7D C0 8B 7D 0C 8D 75 BC C7 45 C4 88 13 00 00 E8 A2 80 FF FF 8D 75
JLindmar (83AR) 3/16/2023 6:55 AM
❤️ 1
Avatar
Andrew Rathbun 3/16/2023 7:08 AM
I've heard he's very responsive to inquiries about his tools via email/the contact form on his website.
Avatar
Deleted User 3/16/2023 7:45 AM
I'm glad, been having the same error with WinPrefetch on some devices
Avatar
Hello, which is easier to gain info of discord accounts for cybercrime between Microsoft Edge and Chrome?
Avatar
Hi, I would need advice for the acquisition of a software. I need to improve the quality of a soundtrack, but I can't find anything really relevant to this type of processing. Could someone advise me? Thanks for your help
Avatar
Avatar
KR-4n6
Hi, I would need advice for the acquisition of a software. I need to improve the quality of a soundtrack, but I can't find anything really relevant to this type of processing. Could someone advise me? Thanks for your help
Andrew Rathbun 3/16/2023 9:39 AM
#dvr-multimedia-surveillance try asking here
👍 1
Avatar
We are looking into buying a dongle server. Anyone care to share their experience with it?
Avatar
Avatar
FirePhil
We are looking into buying a dongle server. Anyone care to share their experience with it?
10:10 AM
That is the server we used. It worked ok. Didn’t like Cellebrite dongle.
10:11 AM
Wasn’t too bad to get setup instructions were pretty good.
Avatar
Avatar
Jobbins
Wasn’t too bad to get setup instructions were pretty good.
Any issues with Magnet?
Avatar
Avatar
Alexsaurus
Does anyone have any good software for cleaning up an audio recording to make it easier to hear people talking?
Deleted User 3/16/2023 10:46 AM
Use Audacity and fiddle with 500mhz on the EQ to bring voice up and clearer in the mix.
Avatar
Avatar
FirePhil
Any issues with Magnet?
I've had success with axiom and cellebrite
Avatar
Avatar
FirePhil
Any issues with Magnet?
Nope no issues with magnet
Avatar
Has anyone noticed that NirSofts browserhistoryview.exe trips AV?
Avatar
Avatar
Villano
Has anyone noticed that NirSofts browserhistoryview.exe trips AV?
randomaccess 3/16/2023 1:08 PM
Likely because threat actors use it
1:08 PM
I usually add an exclusion for my tools and cases directories
Avatar
Avatar
randomaccess
Likely because threat actors use it
I was thinking the same thing. It lights up VirusTotal. There are some comments about APT. But when I read the references, no actual mention of NirSofts tools.
Avatar
Avatar
Villano
Has anyone noticed that NirSofts browserhistoryview.exe trips AV?
Digitalferret 3/16/2023 2:33 PM
pretty much all Nirsoft tools trigger AV. damned annoying as mine gets deleted on unzip 🙂 #whitelist/ignore
👍🏾 2
Avatar
Avatar
FirePhil
We are looking into buying a dongle server. Anyone care to share their experience with it?
👍 1
Avatar
Hi! Is there someone who know how to convert "reg_binary" value (in Windows registry) to string or something like that? I'm trying to export values with Python script but I'm blocked on reg_binary value.
Avatar
Avatar
non0
Hi! Is there someone who know how to convert "reg_binary" value (in Windows registry) to string or something like that? I'm trying to export values with Python script but I'm blocked on reg_binary value.
Andrew Rathbun 3/16/2023 3:37 PM
I am sure 01 00 00 00 means something in Windows land, so you'd have to figure out what that is. Highly depends on the key/path/value in question
Avatar
Avatar
Andrew Rathbun
I am sure 01 00 00 00 means something in Windows land, so you'd have to figure out what that is. Highly depends on the key/path/value in question
Yes, 01 00 00 00 is an example but I got a key/value about Access rights (certificate) : read/write/full control for 4 differents groups. I don't have it now but it's a loooong value.
Avatar
Avatar
non0
Hi! Is there someone who know how to convert "reg_binary" value (in Windows registry) to string or something like that? I'm trying to export values with Python script but I'm blocked on reg_binary value.
Isn’t it all in hex? You would have to know the encoding scheme, if it’s even something that can be converted to a string.
Avatar
I thought so but it does not give a comprehensible chain, I didn't know "each" app using reg_binary could use their own encoding or something like that. i need to search harder, thanks!
Avatar
Avatar
non0
I thought so but it does not give a comprehensible chain, I didn't know "each" app using reg_binary could use their own encoding or something like that. i need to search harder, thanks!
Andrew Rathbun 3/17/2023 4:52 AM
The Registry is very fragmented IMO. Different artifacts log different things. Different artifact's timestamps are more reliable than others. Some even record their own timestamps within the subkey as a value, separate from the LastWriteTimestamp. The Registry is the wild, wild west at times. And that's just the opinion I've gathered from my extensive yet overall limited adventures in the Registry. Third-party applications do whatever they need or want to do in the Registry. Same with Event Logs. Some third-party applications log to event logs (usually into Application.evtx). Some do it well. Some do it in a barely passable/lazy manner (almost like malicious compliance lol). If that 01 00 00 00 is not a Windows-based artifact (aka some third-party application), then who knows what encoding mechanism is being used unless it appears to be in a structure similar to other known artifacts (FILETIME, etc) (edited)
👍 1
Avatar
Avatar
Jobbins
That is the server we used. It worked ok. Didn’t like Cellebrite dongle.
Cellebrite blocks remote access to dongles, so even if you have two computers in the same room off network you can not use a remote connection to the computer next to you to share the same monitors. They have been granting RDP during covid on select dongles and every update to the dongle requires a phone call or email to Cellebrite.
Avatar
Deleted User 3/17/2023 12:32 PM
Hey! any PowerShell "nerds" here 😅 - I need help with my script $dateString = Read-Host "Enter a date (MM-dd-yyyy) to filter the Prefetch files" $date = [DateTime]::ParseExact($dateString, "MM-dd-yyyy", $null) $prefetchPath = "C:\Windows\Prefetch" $pfFiles = Get-ChildItem -Path $prefetchPath -Filter "*.pf" | Where-Object {$_.CreationTime -ge $date} $exeFiles = foreach ($pfFile in $pfFiles) { # Get the file name without the extension and hash value $fileName = $pfFile.Name -replace '\.pf$', '' -replace '-[A-F0-9]{8}$', '' # Use where.exe to search for the .exe file on the system $whereCommand = "where.exe /r C:\ $fileName" $exePath = Invoke-Expression $whereCommand # Return the file name and path as a custom object [PSCustomObject] @{ FileName = $fileName ExePath = $exePath } } $exeFiles
12:33 PM
I'm trying to create a script that'll first clear .pf of all hashes etc and leave just names of files based on their creation date & use where.exe to locate all the files it finds but it won't work, do I need to specify cmd.exe before where.exe?
12:34 PM
Also wondering if there's a tool that'll use scripts like these against memory captures, I'm trying to do something like that
Avatar
Avatar
Deleted User
I'm trying to create a script that'll first clear .pf of all hashes etc and leave just names of files based on their creation date & use where.exe to locate all the files it finds but it won't work, do I need to specify cmd.exe before where.exe?
If you parse the prefetch files with pecmd, you could grab the file path from the output.
Avatar
Deleted User 3/17/2023 1:31 PM
Ahh, yeah!
1:31 PM
I came up with a different approach
1:31 PM
WinPrefetchView for it!
Avatar
Avatar
Deleted User
WinPrefetchView for it!
That would also work. 😊
Avatar
Deleted User 3/17/2023 1:33 PM
😁
Avatar
Hello! I would like your guys/girls opinion on which degree is necessary and worth taking. This is because I can not really decide my self so I would really like the opinion from people that is in the industry now. I am currently taking my bachelor degree in digital forensics. I have 2 months left before I am done and I am doing very well in my studies with top grades. When I am done my goal is to work for law enforcement as an investigator, if I am going in the private sector it would be for companies providing digital forensics support for law enforcement. So my question is: Should I try getting a job after completing my bachelor and focus on doing certifications or should is a master degree a better option to go with? Thanks for all opinions!
Avatar
Avatar
Panda
Hello! I would like your guys/girls opinion on which degree is necessary and worth taking. This is because I can not really decide my self so I would really like the opinion from people that is in the industry now. I am currently taking my bachelor degree in digital forensics. I have 2 months left before I am done and I am doing very well in my studies with top grades. When I am done my goal is to work for law enforcement as an investigator, if I am going in the private sector it would be for companies providing digital forensics support for law enforcement. So my question is: Should I try getting a job after completing my bachelor and focus on doing certifications or should is a master degree a better option to go with? Thanks for all opinions!
You can focus on getting a job. There are plenty of positions currently open. You can always add the certifications and additional education later and have the agencies pay for it.
👍 3
Avatar
So I have a follow up question. In the county where I am from they have very limited positions for digital investigators. But I would mind moving to the US and work there. But to be able to work in law enforcement in a different country you would need to be a citizen of that country. So for the US, what other options are there available?
Avatar
Avatar
Panda
So I have a follow up question. In the county where I am from they have very limited positions for digital investigators. But I would mind moving to the US and work there. But to be able to work in law enforcement in a different country you would need to be a citizen of that country. So for the US, what other options are there available?
There are plenty of positions within the U.S for foreign nationals in Law Enforcement, you just have to go thru the process. Obtain citizenship is the first start. Or try some of the European countries they are always looking.
Avatar
Avatar
chiprop
There are plenty of positions within the U.S for foreign nationals in Law Enforcement, you just have to go thru the process. Obtain citizenship is the first start. Or try some of the European countries they are always looking.
Sorry for asking a lot of questions here but do you have any names of those kind of companies or something like I could try to contact them and discuss my options? 🙂
1:40 AM
Screens cropped on Google Pixels in 2017-2022 can be un-cropped 👍
1:41 AM
This is due to an undocumented change to open() on Android that stopped automatically trimming the file on overwrite unless specifically requested (which Google’s Markup app didn’t).
👍 1
Avatar
Avatar
eSko
This is due to an undocumented change to open() on Android that stopped automatically trimming the file on overwrite unless specifically requested (which Google’s Markup app didn’t).
Ross Donnelly 3/18/2023 4:00 AM
Scary stuff. There is a POC website too https://acropalypse.app/ if anyone wants to play with it. Seems to have been fixed now on the Pixel 7 (I noted you say 2017-2022).
Avatar
Avatar
Panda
Sorry for asking a lot of questions here but do you have any names of those kind of companies or something like I could try to contact them and discuss my options? 🙂
I have a different opinion on this one. It's a small field for criminal-side of DF jobs here in the US, especially for civilians. These jobs are usually (almost always) asking you to have a either a permanent resident or citizen status due to the nature of LE work. It's very rarely to see someone that's is willing to take someone only with a visa status.
5:47 AM
It may be easier for you to look for DFIR jobs on the civil side with only a visa...but then you're also competing with people who has long-term status....
Avatar
Avatar
chauan
I have a different opinion on this one. It's a small field for criminal-side of DF jobs here in the US, especially for civilians. These jobs are usually (almost always) asking you to have a either a permanent resident or citizen status due to the nature of LE work. It's very rarely to see someone that's is willing to take someone only with a visa status.
Ye that is what my previous research has learned me as well
Avatar
You may try to join military or some local LE who are willing to take a foreign national...but then you'll start as a regular LEO and unlikely to get you to do any DF work right away.
5:50 AM
You can try major tool vendors, like MSAB, Cellebrite, etc..you may be doing tech support but kinda get you in the DF industry....but this may not be what you're looking for though. (edited)
Avatar
Avatar
chauan
You can try major tool vendors, like MSAB, Cellebrite, etc..you may be doing tech support but kinda get you in the DF industry....but this may not be what you're looking for though. (edited)
Ok thanks! One of my teachers works for a company that does DF and data recovery work for LE (Not in the US). I was thinking if there is any of those companies in the US where one could work with just VISA status. But working for vendors is also I good idea! Thanks!
Avatar
Avatar
chauan
You may try to join military or some local LE who are willing to take a foreign national...but then you'll start as a regular LEO and unlikely to get you to do any DF work right away.
Deleted User 3/18/2023 9:56 AM
US MIL requires citizenship. Security clearances will be an issue.
Avatar
Avatar
Deleted User
US MIL requires citizenship. Security clearances will be an issue.
The program for non-citizen to join then naturalized no longer exists?
Avatar
Security clearances often come with residency requirements
Avatar
Avatar
chauan
The program for non-citizen to join then naturalized no longer exists?
Deleted User 3/18/2023 12:09 PM
Was not aware that existed, it may still be a thing but not when I last looked.
👍 1
Avatar
Blocking use of the owner's mobile phone until user submits a received message confirmation is a strange tactic, particularly as cell broadcasting can do the same job in issuing an alert at the local level. "Public emergency alerts to be sent to all UK mobile phones" https://www.bbc.co.uk/news/uk-64999417
The government will send people loud, siren-like warnings to alert them when there is a risk to life.
Avatar
Avatar
Colman
Blocking use of the owner's mobile phone until user submits a received message confirmation is a strange tactic, particularly as cell broadcasting can do the same job in issuing an alert at the local level. "Public emergency alerts to be sent to all UK mobile phones" https://www.bbc.co.uk/news/uk-64999417
Digitalferret 3/19/2023 3:37 AM
yep, misdirection (under the guise of keeping you all safe) reads as Govt: we can block all your fones yo (edited)
Avatar
Avatar
Jobbins
That is the server we used. It worked ok. Didn’t like Cellebrite dongle.
We just updated our Cellebrite dongles when we got RDP capability added to them. We have ours on a proMax dongleserver from the same company and have no issues
Avatar
Avatar
Digitalferret
yep, misdirection (under the guise of keeping you all safe) reads as Govt: we can block all your fones yo (edited)
So if everyone switched off their mobiles on the 23rd April the day of the test and everyone didn't switch them back on until the 24th, what then?
Avatar
Avatar
Colman
So if everyone switched off their mobiles on the 23rd April the day of the test and everyone didn't switch them back on until the 24th, what then?
Digitalferret 3/19/2023 8:15 AM
a blessed miracle, lol. but I dunno, give it a go 🙂
👍 1
Avatar
Is project VIC even a thing anymore? Seems like all support for Hubstream is non existant and the Intelligence Agent isnt working for many people. Not to mention the "updated" hash set is saying +108 days ago when it was working. Am I just out of touch with the latest system to store and compare hash sets?
Avatar
Avatar
SBcyberCop
Is project VIC even a thing anymore? Seems like all support for Hubstream is non existant and the Intelligence Agent isnt working for many people. Not to mention the "updated" hash set is saying +108 days ago when it was working. Am I just out of touch with the latest system to store and compare hash sets?
@Project VIC
Avatar
Avatar
SBcyberCop
Is project VIC even a thing anymore? Seems like all support for Hubstream is non existant and the Intelligence Agent isnt working for many people. Not to mention the "updated" hash set is saying +108 days ago when it was working. Am I just out of touch with the latest system to store and compare hash sets?
Same, havent gotten an update from @Project VIC in over 100 days, maybe a slow down?
Avatar
Avatar
SBcyberCop
Is project VIC even a thing anymore? Seems like all support for Hubstream is non existant and the Intelligence Agent isnt working for many people. Not to mention the "updated" hash set is saying +108 days ago when it was working. Am I just out of touch with the latest system to store and compare hash sets?
Semantics 21 (Tom) 3/20/2023 12:38 AM
If you have access to S21 LASERi-X, you can download the S21 Global Alliance Database (1.4 billion records) for free. www.semantics21.com, we’ve seen lots of users switching over. (edited)
Avatar
Avatar
SBcyberCop
Is project VIC even a thing anymore? Seems like all support for Hubstream is non existant and the Intelligence Agent isnt working for many people. Not to mention the "updated" hash set is saying +108 days ago when it was working. Am I just out of touch with the latest system to store and compare hash sets?
Nanotech Norseman 3/20/2023 8:09 AM
Let me ask around for you. As far as I know ICAC Cops is still updating ProjectVIC Hashes, but that's a question for them. ProjectVIC is just the framework in which the hashes are stored, ICAC and NCMEC maintains the hash sets and distributes them through Hubstream.
Avatar
Personally feel like icac cops and project vic need a little updating 🫤
9:50 AM
But that's the web developer in me haha
Avatar
Avatar
Semantics 21 (Tom)
If you have access to S21 LASERi-X, you can download the S21 Global Alliance Database (1.4 billion records) for free. www.semantics21.com, we’ve seen lots of users switching over. (edited)
What's the difference from Project Vic database and the "S21 Global Alliance Database" ?
Avatar
Avatar
DCSO
What's the difference from Project Vic database and the "S21 Global Alliance Database" ?
Semantics 21 (Tom) 3/20/2023 11:07 AM
Similar idea, the GAD contains hash values, notes, tags, exif data, user info and case info. Plus it’s encrypted and has over 1.4 billion records from our global community of users. It’s designed to deal with extremist and CSAM intelligence.
Avatar
Just took a look at the website. Definitely lookin much more professional than project vic, icac cops or hubstream so far.
Avatar
Avatar
SBcyberCop
Just took a look at the website. Definitely lookin much more professional than project vic, icac cops or hubstream so far.
Nanotech Norseman 3/20/2023 4:33 PM
I don't doubt it, ProjectVIC and ICAC are run by volunteers and former/current law enforcement in conjunction with NCMEC and ICMEC. ProjectVIC isn't our day job, but we're trying to keep it up as much as we can.
👍🏻 1
Avatar
@Magnet Forensics Anyone know why only one of my tagged categories will not register in a portable case? All the others are showing up. Very Strange.
Avatar
𝗖𝗮𝗶𝘁 | 𝗣𝗵𝗶𝗹𝗶𝗽𝗽𝗶𝗻𝗲𝘀 👮🏻 3/20/2023 6:56 PM
Hi everyone, any law enforcers here? I have a question, do you have a Digital Forensic Van?
Avatar
Hi DFIR Community, I am currently in the process of assessing the safety and security concerns of buying an Enote taker. The specific Company in Question is "Onyx Boox International Inc." and Considering the current geopolitical tensions between the NA and CH, I would appreciate help in this assessment. The General Plight concerns the possibility of either PII misuse and/or the possibility for intrusive surveillance and data gathering. A current example I look at is Tik Tok and the huge security and mental health concerns currently apparent in the world. I will post the research I've done so far in #osint as a google drive link. https://discord.com/channels/427876741990711298/493868860601139200/1087580304392323092 This current project is without the purchase or access to a device for an in-depth analysis, on the hardware and software. I will also have to say that I am in no way a professional or experienced enough to conduct a proper investigation on the hardware or software for artifacts and processes of possible malpractice. How should I go about this process and what should I be looking for to make a final assessment on the safety of owning such a device for personal productivity? As a last note It might take me awhile to get back to anyone who helps, so I apologize in advance for the time taken. (edited)
Avatar
Avatar
𝗖𝗮𝗶𝘁 | 𝗣𝗵𝗶𝗹𝗶𝗽𝗽𝗶𝗻𝗲𝘀 👮🏻
Hi everyone, any law enforcers here? I have a question, do you have a Digital Forensic Van?
Is It Done Yet? 3/21/2023 12:19 AM
Yes - can DM me if needed
Avatar
Avatar
OregonDFIR
@Magnet Forensics Anyone know why only one of my tagged categories will not register in a portable case? All the others are showing up. Very Strange.
chriscone_ar 3/21/2023 6:23 AM
Agree, very strange. I'm not aware of a known issue that causes that but would be happy to take a look and see if we can determine the cause.
Avatar
@Cellebrite Are you guys gonna release iPhone 12 Pro Max Bruteforce support in the next update for premium? Or is that not planned for v7.63 (edited)
📬 1
Avatar
Avatar
Leux
@Cellebrite Are you guys gonna release iPhone 12 Pro Max Bruteforce support in the next update for premium? Or is that not planned for v7.63 (edited)
Just curious, if there is support, for what kind of ios versions?
Avatar
Avatar
Mr.Robot
Just curious, if there is support, for what kind of ios versions?
Support of IOS for premium types of services will most likely not be talked about here. You would have to contact Cellebrite support. (edited)
Avatar
Avatar
DCSO
Support of IOS for premium types of services will most likely not be talked about here. You would have to contact Cellebrite support. (edited)
Thnx! Will do that
Avatar
I'm guessing there's something wrong with my workstation causing Hubstream to not work properly. One of my partners is able to run it and download the hashes 😕 still waiting on hubstream to provide any sort of support
Avatar
Deleted User 3/21/2023 3:27 PM
Hey, does anyone know if SAPIEN Script Packager compiled Windows applications will stop working after the trial period runs out?
Avatar
Avatar
Deleted User
Hey, does anyone know if SAPIEN Script Packager compiled Windows applications will stop working after the trial period runs out?
Andrew Rathbun 3/21/2023 3:50 PM
I doubt it, but I don't know for certain
3:50 PM
Shoot them an email, they are normally pretty responsive @Deleted User
Avatar
Deleted User 3/21/2023 3:52 PM
Sure! thanks :)
Avatar
House Whiskey 3/22/2023 3:09 AM
Hey all, has anyone had any trouble uploading files to Cellebrite support in the last week? Had a log file with 0% upload. Tried on different machines and networks. (edited)
Avatar
Avatar
House Whiskey
Hey all, has anyone had any trouble uploading files to Cellebrite support in the last week? Had a log file with 0% upload. Tried on different machines and networks. (edited)
House Whiskey 3/22/2023 3:30 AM
Ah, it seems to be having issues when uploading to the master thread. I was still able to attach files to new comments. (edited)
Avatar
Morning all. Anyone have experience or able to point me in the right direction for browser forensics if a user has used incognito mode? Is this possible to prove? Hindsight and pulling the browsing history has not given me what I need.
4:00 AM
No file so cant even look at streams
Avatar
Avatar
Calyx
Morning all. Anyone have experience or able to point me in the right direction for browser forensics if a user has used incognito mode? Is this possible to prove? Hindsight and pulling the browsing history has not given me what I need.
Is it a computer or phone you are looking at?
Avatar
Avatar
Johnie
Is it a computer or phone you are looking at?
Computer
Avatar
Avatar
Calyx
Computer
if you got a pagefile.sys you could maybe find information there if the browser was based on webkit. I know ive seen Axiom parse out browser history from that file. Not sure if this could be incognito history tho
Avatar
Hi I have my first interview for a digital forensics investigator role tomorrow, does anyone have any tips for me? Or any questions they think I should practice for? (edited)
Avatar
Avatar
squarey
Hi I have my first interview for a digital forensics investigator role tomorrow, does anyone have any tips for me? Or any questions they think I should practice for? (edited)
Andrew Rathbun 3/22/2023 9:50 AM
I had ChatGPT generate interview questions for me the other week. Here's what it came up with: - How did you become interested in digital forensics and incident response, and what inspired you to pursue this career? - Can you tell us about your experience in conducting digital forensic investigations and incident response in a corporate or government environment? - What tools and software do you use to collect and analyze digital evidence during an investigation? - How do you keep up with the latest developments and trends in the digital forensics and incident response field? - How do you ensure the integrity and preservation of digital evidence during an investigation? - Can you walk us through a recent incident response case you handled, including the steps you took to contain and mitigate the incident? - How do you communicate complex technical information to non-technical stakeholders, such as executives or legal counsel? - How do you approach a digital forensic investigation when the evidence is spread across multiple devices or systems? - Can you explain your experience with forensic analysis of network traffic and logs? - How do you ensure that your work complies with applicable laws, regulations, and industry standards, such as GDPR or PCI-DSS? - Can you describe your experience with forensic analysis of mobile devices, including both iOS and Android? - How do you prioritize and manage your workload when handling multiple investigations simultaneously? - How do you balance the need for speed and efficiency with the need for accuracy and completeness in a digital forensic investigation? - How do you maintain your technical proficiency in digital forensics and incident response, including any relevant certifications or training? (edited)
♥️ 8
Avatar
@Andrew Rathbun Thankyou so much!
💯 1
Avatar
Andrew Rathbun 3/22/2023 9:51 AM
If anything, it's a good set of questions to practice on for yourself
Avatar
Avatar
Andrew Rathbun
I had ChatGPT generate interview questions for me the other week. Here's what it came up with: - How did you become interested in digital forensics and incident response, and what inspired you to pursue this career? - Can you tell us about your experience in conducting digital forensic investigations and incident response in a corporate or government environment? - What tools and software do you use to collect and analyze digital evidence during an investigation? - How do you keep up with the latest developments and trends in the digital forensics and incident response field? - How do you ensure the integrity and preservation of digital evidence during an investigation? - Can you walk us through a recent incident response case you handled, including the steps you took to contain and mitigate the incident? - How do you communicate complex technical information to non-technical stakeholders, such as executives or legal counsel? - How do you approach a digital forensic investigation when the evidence is spread across multiple devices or systems? - Can you explain your experience with forensic analysis of network traffic and logs? - How do you ensure that your work complies with applicable laws, regulations, and industry standards, such as GDPR or PCI-DSS? - Can you describe your experience with forensic analysis of mobile devices, including both iOS and Android? - How do you prioritize and manage your workload when handling multiple investigations simultaneously? - How do you balance the need for speed and efficiency with the need for accuracy and completeness in a digital forensic investigation? - How do you maintain your technical proficiency in digital forensics and incident response, including any relevant certifications or training? (edited)
JLindmar (83AR) 3/22/2023 11:08 AM
These aren't bad at all! Do you recall your exact phrasing for ChatGPT? I want to try it in Google Bard to see how it compares. (edited)
Avatar
Avatar
JLindmar (83AR)
These aren't bad at all! Do you recall your exact phrasing for ChatGPT? I want to try it in Google Bard to see how it compares. (edited)
Andrew Rathbun 3/22/2023 11:09 AM
generate X interview questions for a digital forensics examiner candidate, something like that
Avatar
Avatar
Andrew Rathbun
generate X interview questions for a digital forensics examiner candidate, something like that
JLindmar (83AR) 3/22/2023 11:12 AM
Me: "Generate interview questions for a digital forensics examiner candidate." Bard: "Here are some interview questions for a digital forensics examiner candidate: What is your experience with digital forensics? What tools and software have you used in your work? What are your strengths and weaknesses? How would you handle a difficult situation? What is your approach to data recovery? What is your experience with encryption? What is your understanding of the law as it pertains to digital forensics? What is your experience with testifying in court? What is your experience with customer service? What is your experience with teamwork? What is your experience with project management? What is your experience with budgeting? What is your experience with scheduling? What is your experience with quality control? These questions will help you assess the candidate's skills and experience, as well as their ability to meet the demands of the position." And this is the difference when I changed it to "...job candidate." Here are some interview questions for a digital forensics examiner job candidate: What is your experience with digital forensics? What are your strengths and weaknesses? What are some of the challenges you have faced in your career? How would you deal with a difficult situation? What is your knowledge of computer forensics tools and techniques? What is your understanding of the legal aspects of digital forensics? What is your experience with data analysis and interpretation? What is your experience with report writing and presentation? What is your experience with working in a team environment? What are your salary expectations? These questions will help you assess the candidate's qualifications and experience for the position. Bard also gives you three (3) drafts of it's answer. (edited)
👍 1
Avatar
Avatar
JLindmar (83AR)
Me: "Generate interview questions for a digital forensics examiner candidate." Bard: "Here are some interview questions for a digital forensics examiner candidate: What is your experience with digital forensics? What tools and software have you used in your work? What are your strengths and weaknesses? How would you handle a difficult situation? What is your approach to data recovery? What is your experience with encryption? What is your understanding of the law as it pertains to digital forensics? What is your experience with testifying in court? What is your experience with customer service? What is your experience with teamwork? What is your experience with project management? What is your experience with budgeting? What is your experience with scheduling? What is your experience with quality control? These questions will help you assess the candidate's skills and experience, as well as their ability to meet the demands of the position." And this is the difference when I changed it to "...job candidate." Here are some interview questions for a digital forensics examiner job candidate: What is your experience with digital forensics? What are your strengths and weaknesses? What are some of the challenges you have faced in your career? How would you deal with a difficult situation? What is your knowledge of computer forensics tools and techniques? What is your understanding of the legal aspects of digital forensics? What is your experience with data analysis and interpretation? What is your experience with report writing and presentation? What is your experience with working in a team environment? What are your salary expectations? These questions will help you assess the candidate's qualifications and experience for the position. Bard also gives you three (3) drafts of it's answer. (edited)
chriscone_ar 3/22/2023 11:24 AM
As someone who remembers the work it took to get the original 8-bit Creative Labs Sound Blaster to pronounce "guitar" correctly, this is a really fascinating time 😁 It might also be interesting to see the results of posing the generated questions back to ChatGPT or Bard to see the answer given. If you're involved in hiring, I'd suspect it's a matter of time (already happening 🤷🏻‍♂️) before those are the answers some candidates start spouting out in an interview.
Avatar
All of you interested in recent developments in AI… I direct you to the latest episode of South Park. Enjoy. https://southpark.cc.com/episodes/8byci4/south-park-deep-learning-season-26-ep-4 (edited)
Stan is reeling when a cheating scandal hits the school.
🙃 1
😂 2
Avatar
Looking for lab equipment/ software recommendations. My agency is rather progressive and I’ve been tasked with looking into what we need to be considered leading edge. Our current set up is 1 forensic tower (10 years old with no hardware updates.) 2 forensic laptops purchased within the last two years Hardware / software includes: Graykey Premium, Magnet AXIOM (1 dongle), Cellebrite (2 dongles with UFED and Physical Analyzer), Redkey (for forensic wiping). For storage of forensic images,we are using up old 1TB hard drives but would like to move to a NAS system. Any recommendations would be greatly appreciated. (edited)
Avatar
Avatar
JLindmar (83AR)
These aren't bad at all! Do you recall your exact phrasing for ChatGPT? I want to try it in Google Bard to see how it compares. (edited)
Ross Donnelly 3/22/2023 12:07 PM
The thing I don't like about ChatGPT is that you can ask exactly the same question twice and get a completely different answer. With my forensics hat on, I need repeatability!
Avatar
Avatar
DFIS721
Looking for lab equipment/ software recommendations. My agency is rather progressive and I’ve been tasked with looking into what we need to be considered leading edge. Our current set up is 1 forensic tower (10 years old with no hardware updates.) 2 forensic laptops purchased within the last two years Hardware / software includes: Graykey Premium, Magnet AXIOM (1 dongle), Cellebrite (2 dongles with UFED and Physical Analyzer), Redkey (for forensic wiping). For storage of forensic images,we are using up old 1TB hard drives but would like to move to a NAS system. Any recommendations would be greatly appreciated. (edited)
chriscone_ar 3/22/2023 12:21 PM
Just worked on some Magnet Virtual Summit sessions comparing the performance of different CPU options. Broadly, the newer-generation Intel i9 and AMD Ryzen CPUs that support PCIe 4.0 and DDR5 RAM will show massive performance improvements to a system from only a couple of years ago. Adding core count means lower clock speed, but a newer 16-core/32-thread high clock speed CPU would be my suggestion - great balance of available threads/clock speed there. Combined with fast RAM and dedicated local storage for OS, evidence files, temporary files, and case files, plus a decent GPU and you'll have a really nice system. Tons of options out there from different manufacturers. Move what you want to keep quickly available to a NAS when you're done working with it and determine what your answer is for long term storage and evidence retention requirements. I'm also a fan of using a dedicated machine for disk imaging and leaving the high-spec machine for processing. Happy to talk more, if I can help - it's one of my favorite topics! Adding - I've personally had reliable performance with Synology NAS units and they're very easy to configure and can be expanded as needed, There are other options out there, but cost/performance/intended use all factor into the decision. (edited)
💯 2
Avatar
Hi everyone, I'm currently making a CTF challenge for the forensics category of my club's CTF at the moment that deals with seeing the data in the XML of a powerpoint. I'm currently stuck on getting the powerpoint put back together. The following are the steps I am using to do this 1: make a backup of the pptx file. 2: Change the file extension to zip then extract 3: change the XML in files. 4: zip again and change the xip to PPTX The last step in this process results in a pptx shorter in length on disk than the original. How do I ensure that the size is correct so that it can be read? (I'm not sure if this question is appropriate for general. Let me know where it goes if it is not for general. :)) (edited)
Avatar
Avatar
tapatiosec
Hi everyone, I'm currently making a CTF challenge for the forensics category of my club's CTF at the moment that deals with seeing the data in the XML of a powerpoint. I'm currently stuck on getting the powerpoint put back together. The following are the steps I am using to do this 1: make a backup of the pptx file. 2: Change the file extension to zip then extract 3: change the XML in files. 4: zip again and change the xip to PPTX The last step in this process results in a pptx shorter in length on disk than the original. How do I ensure that the size is correct so that it can be read? (I'm not sure if this question is appropriate for general. Let me know where it goes if it is not for general. :)) (edited)
There is a #challenges-and-ctfs channel, just for future reference.
Avatar
Avatar
FullTang
There is a #challenges-and-ctfs channel, just for future reference.
Ahh didn't see that
3:14 PM
thanks for the info
👍 1
3:15 PM
Also I managed to find a way to make it work. Saw a video on youttube
Avatar
Avatar
tapatiosec
Also I managed to find a way to make it work. Saw a video on youttube
Nice. Good work!
Avatar
Can someone from @Magnet Forensics please pm me.
📬 1
Avatar
beansidebean2020 3/23/2023 2:48 AM
Morning all, can anyone confirm their process for counting IIOC media as accessible or inaccessible? Many thanks.
Avatar
Avatar
beansidebean2020
Morning all, can anyone confirm their process for counting IIOC media as accessible or inaccessible? Many thanks.
Computer or Mobile?
Avatar
beansidebean2020 3/23/2023 3:32 AM
Apologies, both!
Avatar
Avatar
Rob
Computer or Mobile?
beansidebean2020 3/23/2023 3:32 AM
Apologies both!
📧 1
Avatar
Good morning. Can an individual user with a business Office 365 account (not the admin) download their entire account? I've done this with Axiom Cloud but can the user themselves do this? Thanks.
DFIS721 started a thread. 3/23/2023 9:40 AM
Avatar
crystalcity 3/23/2023 4:57 PM
I am in my infancy of digital forensics career and have a question about employment. Is there a preferred way to approach local LEO or court systems to offer your services and to land a job? Talking with local police departments I have not had many leads as to how to get in touch with their forensics departments..maybe they do not have one as im surrounded by small towns... Also I would prefer not having to be a beat cop before "promoting" to forensics type work. Just looking for some guidance on best route to begin a career working with law enforcement.
Avatar
Avatar
crystalcity
I am in my infancy of digital forensics career and have a question about employment. Is there a preferred way to approach local LEO or court systems to offer your services and to land a job? Talking with local police departments I have not had many leads as to how to get in touch with their forensics departments..maybe they do not have one as im surrounded by small towns... Also I would prefer not having to be a beat cop before "promoting" to forensics type work. Just looking for some guidance on best route to begin a career working with law enforcement.
If you are surrounded by small local agencies I wouldn't be surprised if they sent their devices to a larger local agency, state agency, or even a federal office for analysis. Also, unless you have an inside source they probably won't tell you what they do with their devices. If you don't want to be a beat cop most likely you will need to look at bigger cities to get a DF job as a civilian. Some background in IT would be good, a 4-year degree in computers of some sort would be good, but if you are willing to pay for the CFCE out of pocket I think that would really help you. Also, if you are able to show proof of work by starting a blog examining forensic artifacts that you have researched on your own time or a GitHub showing scripts you have written to contribute to the DF community to help fill gaps that would help as well.
Avatar
Avatar
FullTang
If you are surrounded by small local agencies I wouldn't be surprised if they sent their devices to a larger local agency, state agency, or even a federal office for analysis. Also, unless you have an inside source they probably won't tell you what they do with their devices. If you don't want to be a beat cop most likely you will need to look at bigger cities to get a DF job as a civilian. Some background in IT would be good, a 4-year degree in computers of some sort would be good, but if you are willing to pay for the CFCE out of pocket I think that would really help you. Also, if you are able to show proof of work by starting a blog examining forensic artifacts that you have researched on your own time or a GitHub showing scripts you have written to contribute to the DF community to help fill gaps that would help as well.
crystalcity 3/23/2023 5:46 PM
Thanks for the input! I am trying to convince my current employer (my first cyber related job) a sans course would be a value add, but I have to be creative because it really isn't so I don't have high hopes. Would you recommend GCFE or GCFA? I was shooting for the latter. I have a degree in cyber intelligence and a top secret clearance and wounded veteran...slowly adding pieces to the puzzle to make myself more marketable!
Avatar
Avatar
crystalcity
Thanks for the input! I am trying to convince my current employer (my first cyber related job) a sans course would be a value add, but I have to be creative because it really isn't so I don't have high hopes. Would you recommend GCFE or GCFA? I was shooting for the latter. I have a degree in cyber intelligence and a top secret clearance and wounded veteran...slowly adding pieces to the puzzle to make myself more marketable!
I have heard great things about the SANS courses but they are outside of my own personal budget and my agency's budget so I can't speak to those. There are plenty of SANS graduates and instructors on this server that can answer that. It looks like you are LE in some capacity, you could also look into NW3C trainings as those are completely free to law enforcement. (edited)
👍 1
Avatar
Avatar
crystalcity
Thanks for the input! I am trying to convince my current employer (my first cyber related job) a sans course would be a value add, but I have to be creative because it really isn't so I don't have high hopes. Would you recommend GCFE or GCFA? I was shooting for the latter. I have a degree in cyber intelligence and a top secret clearance and wounded veteran...slowly adding pieces to the puzzle to make myself more marketable!
If you’re in LE, I’d recommend GCFE. GCFE is designed with insider threats in mind (one user’s system). GCFA is designed more for external threats (multiple systems/incident response).
👍 1
Avatar
DeeFIR 🇦🇺 3/23/2023 7:53 PM
Summon the beast and he shall answer your SANS queries @randomaccess (edited)
Avatar
randomaccess 3/23/2023 7:56 PM
What's the question
Avatar
Avatar
crystalcity
Thanks for the input! I am trying to convince my current employer (my first cyber related job) a sans course would be a value add, but I have to be creative because it really isn't so I don't have high hopes. Would you recommend GCFE or GCFA? I was shooting for the latter. I have a degree in cyber intelligence and a top secret clearance and wounded veteran...slowly adding pieces to the puzzle to make myself more marketable!
randomaccess 3/23/2023 11:59 PM
Sans does a bunch for veterans, but I don't know a lot about the ins and outs. Suggest looking round on the website for that. Otherwise work study is a thing. As a vet you may have a better in through that route
Avatar
Avatar
crystalcity
I am in my infancy of digital forensics career and have a question about employment. Is there a preferred way to approach local LEO or court systems to offer your services and to land a job? Talking with local police departments I have not had many leads as to how to get in touch with their forensics departments..maybe they do not have one as im surrounded by small towns... Also I would prefer not having to be a beat cop before "promoting" to forensics type work. Just looking for some guidance on best route to begin a career working with law enforcement.
Digitalferret 3/24/2023 3:58 AM
ummm, what's your current position?
Avatar
Avatar
crystalcity
Thanks for the input! I am trying to convince my current employer (my first cyber related job) a sans course would be a value add, but I have to be creative because it really isn't so I don't have high hopes. Would you recommend GCFE or GCFA? I was shooting for the latter. I have a degree in cyber intelligence and a top secret clearance and wounded veteran...slowly adding pieces to the puzzle to make myself more marketable!
https://www.ice.gov/hero Just going to drop this here. I am not involved with the program but I’ve trained a lot of folks hired through this initiative. It is an interesting concept and seems to match your goals.
💯 1
👍🏻 1
Avatar
Avatar
char|i3
https://www.ice.gov/hero Just going to drop this here. I am not involved with the program but I’ve trained a lot of folks hired through this initiative. It is an interesting concept and seems to match your goals.
crystalcity 3/24/2023 6:03 AM
That's is exactly what I want, I've tried applying in the past with not much luck but will keep on it
Avatar
Avatar
randomaccess
Sans does a bunch for veterans, but I don't know a lot about the ins and outs. Suggest looking round on the website for that. Otherwise work study is a thing. As a vet you may have a better in through that route
crystalcity 3/24/2023 6:04 AM
Yeah I applied for the vetsuccess program but didn't make it, but will apply next tike it comes around as well.
Avatar
Avatar
Digitalferret
ummm, what's your current position?
crystalcity 3/24/2023 6:21 AM
I'm a research analyst for gvmnt. When I signed up for discord I was a cop. I want to do dfir at Leo capacity.
👍🏻 1
Avatar
Avatar
crystalcity
Thanks for the input! I am trying to convince my current employer (my first cyber related job) a sans course would be a value add, but I have to be creative because it really isn't so I don't have high hopes. Would you recommend GCFE or GCFA? I was shooting for the latter. I have a degree in cyber intelligence and a top secret clearance and wounded veteran...slowly adding pieces to the puzzle to make myself more marketable!
SANS has a work study program, that can make that cost of the classes a little less. Although it's a competitive process for it. In my option, I would start with GCFE. I took SANS FOR500 (training for the GCFE) before taking SANS FOR508 (training for the GCFA). In my opinion already having some exposure to the topics and tools when taking 508 really helped. I don't know where you are located, but your clearance alone can be a foot in the door in some areas if you are interested in working for the federal government or as contractor.
👍 1
Avatar
Do you also use alcohol to remove residue from the USB-C connector?Are there any good tools to buy on Amazon? (edited)
Avatar
Avatar
crystalcity
Yeah I applied for the vetsuccess program but didn't make it, but will apply next tike it comes around as well.
randomaccess 3/24/2023 3:57 PM
SANS edu also accepts the GI bill. (as a non American I have a vague idea of what this means, but there's FAQs about it online)
Avatar
Avatar
randomaccess
SANS edu also accepts the GI bill. (as a non American I have a vague idea of what this means, but there's FAQs about it online)
crystalcity 3/24/2023 4:06 PM
Great point. It's almost like there are too many options, idint do well with that. I will check out how the gi works for sans, I used it for college and they paid for it all, while also paying me for being a student, not a bad deal.
Avatar
Avatar
randomaccess
SANS edu also accepts the GI bill. (as a non American I have a vague idea of what this means, but there's FAQs about it online)
crystalcity 3/24/2023 4:07 PM
Just had to sacrifice my younger years and go thru a divorce...no biggie...lol
Avatar
Hello everyone, Do you know if software like Volatility3 have mechanisms to avoid altering the integrity of the memory image? Or even if it is possible to alter the integrity of the image with Volatility3. This is a question I didn't ask myself until now and it seems quite relevant. Thanks !
Avatar
Have you used any write blocking software/hardware before copying/extracting? There are a lot of options for whatever use case.
Avatar
Avatar
rtificial
Have you used any write blocking software/hardware before copying/extracting? There are a lot of options for whatever use case.
No, I don't think so. For the image, it's basically an image made with LiME.
Avatar
Avatar
Admirakk
No, I don't think so. For the image, it's basically an image made with LiME.
I haven’t heard of lime before. After looking it up, it sounds pretty cool. From what I read it extracts the volatile memory in the least intrusive way possible on Linux/android devices.
10:21 AM
I’d write block that image before copying and diving in.
Avatar
Avatar
rtificial
I haven’t heard of lime before. After looking it up, it sounds pretty cool. From what I read it extracts the volatile memory in the least intrusive way possible on Linux/android devices.
Indeed for the extraction as such I had searched about the alteration. I probably misspoke, I was talking about the analysis software of these images after the extraction. Can the softwares (here Volatility3) alter the image? Assuming that there is only one copy. When you say "I would block the image", is it possible to manually block the image after extraction? (innocent question, I'm not very familiar with all this yet) (edited)
Avatar
Avatar
Admirakk
Indeed for the extraction as such I had searched about the alteration. I probably misspoke, I was talking about the analysis software of these images after the extraction. Can the softwares (here Volatility3) alter the image? Assuming that there is only one copy. When you say "I would block the image", is it possible to manually block the image after extraction? (innocent question, I'm not very familiar with all this yet) (edited)
And no worries. We all have to learn somewhere. I’m still learning too
👍 1
Avatar
Avatar
Admirakk
Indeed for the extraction as such I had searched about the alteration. I probably misspoke, I was talking about the analysis software of these images after the extraction. Can the softwares (here Volatility3) alter the image? Assuming that there is only one copy. When you say "I would block the image", is it possible to manually block the image after extraction? (innocent question, I'm not very familiar with all this yet) (edited)
One more video. This one addresses how to identify data using hashes to later see if it has been altered. We do this A LOT in digital forensics. Hashes let us uniquely identify any data set and they allow us to show our data hasn’t changed. https://m.youtube.com/watch?v=9miEFSs1lk0
Avatar
Does anyone know if there's some journal or article explaining what the key challenges are when doing forensics on cloud storage such as dropbox? trying to complete this assignment right now but its a headache since the info I keep finding is so broad rather than specific.
Avatar
Avatar
Woomir
Does anyone know if there's some journal or article explaining what the key challenges are when doing forensics on cloud storage such as dropbox? trying to complete this assignment right now but its a headache since the info I keep finding is so broad rather than specific.
Look for some security+ videos on cloud and compliance. One of the headaches I remember is for example a company/individual being located in a certain country BUT the cloud data being held on a server in a different country with different data/privacy laws.
12:21 PM
Also troubles with who is responsible for what. Ie. The cloud provider or the individual/company. There’s a whole list of things both parties need to get outlined in writing before doing business
12:22 PM
It’s Gives me anxiety just thinking about all the red tape and lawyers something probably requires
Avatar
Avatar
Admirakk
Hello everyone, Do you know if software like Volatility3 have mechanisms to avoid altering the integrity of the memory image? Or even if it is possible to alter the integrity of the image with Volatility3. This is a question I didn't ask myself until now and it seems quite relevant. Thanks !
randomaccess 3/25/2023 12:47 PM
Volatility shouldn't be altering your memory image. Work on a copy of it anyways because you need a backup. Hash it at the beginning and end and that'll show nothing changed. If you really want, audit the code and there shouldn't be anything that intentionally alters the data. You could put it on a drive and access that through a write blocker but eh wouldn't bother
Avatar
Avatar
randomaccess
Volatility shouldn't be altering your memory image. Work on a copy of it anyways because you need a backup. Hash it at the beginning and end and that'll show nothing changed. If you really want, audit the code and there shouldn't be anything that intentionally alters the data. You could put it on a drive and access that through a write blocker but eh wouldn't bother
That's what I thought, but I had a slight doubt. I didn't really see how it could have changed the data, but since you have to work on a copy, etc., there is still a risk, but I don't see how. And that's why I was wondering if there were any mechanisms either for the image (it seems that there are, according to your different answers) or mechanisms on tools like Volatility3.
Avatar
digital Bowles 3/25/2023 1:47 PM
We have a load of iPhones we have seized for agency use (testing only). I have been able to rest the phones, but many are locked with iTunes activation. The most recent information I found was from 2019 about Apple doing it with court orders. Is that still the only way?
Avatar
Avatar
digital Bowles
We have a load of iPhones we have seized for agency use (testing only). I have been able to rest the phones, but many are locked with iTunes activation. The most recent information I found was from 2019 about Apple doing it with court orders. Is that still the only way?
randomaccess 3/25/2023 2:26 PM
I don't think there was a good way. They're good for spare parts to repair incoming devices to get extractions through
Avatar
Avatar
randomaccess
I don't think there was a good way. They're good for spare parts to repair incoming devices to get extractions through
digital Bowles 3/25/2023 8:19 PM
Thank you. They have been great for spare parts.
👍 1
Avatar
Avatar
Woomir
Does anyone know if there's some journal or article explaining what the key challenges are when doing forensics on cloud storage such as dropbox? trying to complete this assignment right now but its a headache since the info I keep finding is so broad rather than specific.
NIST has defined cloud computing in NIST SP 800-145 document as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider i...
👍 1
Avatar
@digital Bowles I kept a file of removed screens. I just made sure I used the EXACT screen if the device I was examining had a broken screen. And then I would DOCUMENT the shit out of it because, you know, some wise ass defense attorney will go bonkers if you don't. But all the phones made for good parts and learning the hardware side of the devices.
Avatar
Happy Birthday
Avatar
Deleted User 3/26/2023 10:03 AM
Hey, does anyone know how to fix this? there is no Security tab when I access the USB too
Avatar
Just a FYI. The latest version of "TCU Live" (2023MAR26) has been released. It's running the latest Debian sid packages, the Linux 6.1.0 kernel for modern hardware support, and updated third party packages such as the Tor Browser, volatility, etc. See the README in the link for more information: https://drive.google.com/drive/folders/0B8zx3qPcj9rJVjJrcnB4aXl1VG8?resourcekey=0-gjI_o4MHtiCvsjet9TCygw&usp=sharing If you haven't used the distro before, it's built to be fairly lean and extensible and is great for in-house forensics, OSINT, field work, or if you just need to quickly spin up a Linux box. The default boot mode loads the entire OS into memory, so if you are on a machine with limited USB ports, you can unplug the TCU Live key after it boots to free up a USB port. It's also UEFI shimmed so it'll boot machines without having to adjust anything in the BIOS such as enabling legacy boot mode. If you are looking for something that'll boot on almost all x86-64 (AMD64) hardware give it a shot and DM me if you have any comments or issues.
🔥 3
👍 1
Avatar
HTCIA International Conference CFP is open till March 31 - if you have knowledge to share, submit! https://www.htcia.org/2023-international-conference-and-expo/
September 19-21, 2023 Phoenix, Arizona REGISTRATION COMING SOON Platinum Sponsor: Micro Focus is not Open Text Bronze Sponsors: 2023 Sponsor Prospectus Be a Sponsor! 39th ANNUAL HTCIA Conference and EXPO! ⬅️ Check out the 2022 highlight Video Join us September 19-21, 2023 only in-person in Phoenix, AZ for timely educational sessions, engaging ne...
🎉 1
Avatar
51LV3R KN16H7 KM4 3/27/2023 3:12 AM
hello everyone
3:15 AM
It's nice to see you here Autopsy @bquanman
Avatar
Avatar
51LV3R KN16H7 KM4
It's nice to see you here Autopsy @bquanman
Lol :v
Avatar
numbersevenfan 3/27/2023 8:00 AM
Hi all, i'm feeling like i'm missing something obvious here... but I was given a SHA1 hash value that has non hexadecimal characters (Z, P, X, etc) in it. Can SHA1 have those characters?
8:01 AM
And if not, then is there some kind of obvious conversion/decoding you would think to do? (edited)
8:04 AM
And lastly, if there is... why would someone convert/encode it like this if the purpose of giving it to me is to look for matches?
8:04 AM
(In other words, they're not trying to hide/obfuscate this hash) (edited)
Avatar
Avatar
numbersevenfan
And if not, then is there some kind of obvious conversion/decoding you would think to do? (edited)
My first one to check would be Base64 (edited)
8:38 AM
You could use something like CyberChef for a quick on-the-fly conversion
8:39 AM
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
Avatar
Avatar
numbersevenfan
Hi all, i'm feeling like i'm missing something obvious here... but I was given a SHA1 hash value that has non hexadecimal characters (Z, P, X, etc) in it. Can SHA1 have those characters?
Potentially, as @Matt pointed out it could be Base64, in theory the output of SHA1 can be encoded however you like, as long as it retains the 20 bytes correctly. If you still need help identifying it, let me know and I can take a look.
Avatar
numbersevenfan 3/27/2023 9:14 AM
Thank you @Matt @chick3nman, definitely a good idea. Seems like it was a bit of a red herring. All the various base decodes were garbage, but I was able to get the original file and hash it myself and the SHA1 I computed did not match any decoder output using a mass decoder. I think I'm going to have to ask the provider how they got this value...
🤔 1
Avatar
Avatar
numbersevenfan
Thank you @Matt @chick3nman, definitely a good idea. Seems like it was a bit of a red herring. All the various base decodes were garbage, but I was able to get the original file and hash it myself and the SHA1 I computed did not match any decoder output using a mass decoder. I think I'm going to have to ask the provider how they got this value...
DM me and I can double check if its just a different encoding scheme. There's a few ways that it's commonly done.
⭐ 1
Avatar
Avatar
Andrew Rathbun
The Registry is very fragmented IMO. Different artifacts log different things. Different artifact's timestamps are more reliable than others. Some even record their own timestamps within the subkey as a value, separate from the LastWriteTimestamp. The Registry is the wild, wild west at times. And that's just the opinion I've gathered from my extensive yet overall limited adventures in the Registry. Third-party applications do whatever they need or want to do in the Registry. Same with Event Logs. Some third-party applications log to event logs (usually into Application.evtx). Some do it well. Some do it in a barely passable/lazy manner (almost like malicious compliance lol). If that 01 00 00 00 is not a Windows-based artifact (aka some third-party application), then who knows what encoding mechanism is being used unless it appears to be in a structure similar to other known artifacts (FILETIME, etc) (edited)
A feedback from my question about how to parse reg_binary. Real key was Security Descriptor (ACL for AD object) for certificate template ==> a registry key created by Windows so I check Microsoft documentation (product doc & data type sheet) and after a lot of coffee & hours I finally understood how it's stored. "Find and read documentation" is always a good advice 😄
🔥 3
pepepray 2
Avatar
Wondered what everyone was using for Domestic Router Extraction ? I'm aware of the Forensic Compass from First Forensic. Looking for something Open Source if possible.
Avatar
Avatar
Steve2609
Wondered what everyone was using for Domestic Router Extraction ? I'm aware of the Forensic Compass from First Forensic. Looking for something Open Source if possible.
The only thing I can think of off hand is NAFT but it hasn’t been updated in 8 years. https://blog.didierstevens.com/my-software/#NAFT
This list is a work in progress (i.e. it will never be completely up-to-date). It will list all my published software with cross-referenced blogposts. I try to update it monthly (last update 2021/0…
Avatar
Avatar
numbersevenfan
Hi all, i'm feeling like i'm missing something obvious here... but I was given a SHA1 hash value that has non hexadecimal characters (Z, P, X, etc) in it. Can SHA1 have those characters?
Maybe a bit late… is this a csam case by any chance? There is an le tool which stores sha1 hashes of files of interest in non-hex format. I think it was base64 but would need to check. Cyberchef will do it but you need to chain two filters - from hex and then to base64
7:58 AM
Or from base64 and then to hex to go the other way. Using a straight base64 decoded/encode will not work or rather may not give you what are expecting
Avatar
Avatar
busted4n6
Maybe a bit late… is this a csam case by any chance? There is an le tool which stores sha1 hashes of files of interest in non-hex format. I think it was base64 but would need to check. Cyberchef will do it but you need to chain two filters - from hex and then to base64
numbersevenfan 3/28/2023 9:15 AM
It is. That is good to know and would make sense in this case. It did turn out to need exactly that, base32 to raw to hex. Thank you, this sounds a good explanation as any!
Avatar
Avatar
numbersevenfan
It is. That is good to know and would make sense in this case. It did turn out to need exactly that, base32 to raw to hex. Thank you, this sounds a good explanation as any!
Ah yes. Then it’s definitely from the tool I’m thinking of
Avatar
https://blogs.microsoft.com/blog/2023/03/28/introducing-microsoft-security-copilot-empowering-defenders-at-the-speed-of-ai/ Quite interesting, the reverse engineering capability seems cool, wonder how good it will actually be.
The odds are against today’s defenders Today the odds remain stacked against cybersecurity professionals. Too often, they fight an asymmetric battle against prolific, relentless and sophisticated attackers. To protect their organizations, defenders must respond to threats that are often hidden among noise. Compounding this challenge is a global ...
Avatar
I am trying to set up a new computer and it keeps asking for a cloud account.. I want to set it without the cloud setting.. anyone have a link to the procedure.??
1:48 PM
darn Microsoft.
Avatar
Avatar
Jetten_007
I am trying to set up a new computer and it keeps asking for a cloud account.. I want to set it without the cloud setting.. anyone have a link to the procedure.??
DeeFIR 🇦🇺 3/28/2023 2:18 PM
Select personal account, then when it asks for your email/security key, there’s an option in the bottom left which says limited experience or offline account or something similar. Select that and follow the prompts. (edited)
Avatar
ok.. thanks.
Avatar
Avatar
Jetten_007
darn Microsoft.
Digitalferret 3/28/2023 3:29 PM
set the PC up without ethernet plugged in?
Avatar
Rufus can also enable local account only while creating a USB drive
Avatar
digital Bowles 3/28/2023 4:20 PM
Not sure which channel would be best for this. Working on a 13 inch 2019 MacBook Pro. While experimenting the flip connector came off the board. It looks like it is tied to the battery. Any chance of being able to reconnect it.
Avatar
TheMaddMaverick 3/28/2023 7:05 PM
I'm taking some practice tests for CHFI and it mentions some powershell cmdlets that I can't find in my system. BingAI nor google have helped me find these. Does anyone know what module these come from? Get-BootSector: This command that can help the investigator parse GPTs of both types of hard disks including the ones formatted with either UEFI or MBR. Get-GPT: This command helps the investigator analyze the GPT data structure of the hard disk. Get-PartitionTable: This command analyzes the GUID partition table to find the exact type of boot sector (Master Boot Record or GUID PartitionTable) and displays the partition object. Get-MBR: This command displays the MBR Partition Table of a GPT formatted disk. Edit: I've also run Find-(Command) to no avail. (edited)
Avatar
Avatar
TheMaddMaverick
I'm taking some practice tests for CHFI and it mentions some powershell cmdlets that I can't find in my system. BingAI nor google have helped me find these. Does anyone know what module these come from? Get-BootSector: This command that can help the investigator parse GPTs of both types of hard disks including the ones formatted with either UEFI or MBR. Get-GPT: This command helps the investigator analyze the GPT data structure of the hard disk. Get-PartitionTable: This command analyzes the GUID partition table to find the exact type of boot sector (Master Boot Record or GUID PartitionTable) and displays the partition object. Get-MBR: This command displays the MBR Partition Table of a GPT formatted disk. Edit: I've also run Find-(Command) to no avail. (edited)
PowerForensics provides an all in one platform for live disk forensic analysis - GitHub - Invoke-IR/PowerForensics: PowerForensics provides an all in one platform for live disk forensic analysis
🙌🏾 1
Avatar
indianadmin 3/28/2023 11:35 PM
This is a privacy related question. My client has suffered data exfiltration and is considering whether to purchase identity protection for former employees in addition to current employees. What is the standard practice for determining how far back in time do they have to go for former employees? 2 years, 3 years? In cases of massive data leakage due to exfiltration by the ransomware group, it is difficult to determine what exactly was lost.
Avatar
Avatar
indianadmin
This is a privacy related question. My client has suffered data exfiltration and is considering whether to purchase identity protection for former employees in addition to current employees. What is the standard practice for determining how far back in time do they have to go for former employees? 2 years, 3 years? In cases of massive data leakage due to exfiltration by the ransomware group, it is difficult to determine what exactly was lost.
Andrew Rathbun 3/29/2023 4:34 AM
Does it matter how long ago they worked if it's something like a social security number that got exposed? People only get one of those, regardless of whether they worked there 2 years or 25 years ago. I guess it depends on the PII in question but I am not a lawyer
Avatar
Good morning, all. I am looking to identify tooling from a process creation event.. the format of the ImagePath is: %COMSPEC% /C echo net user fred p@ssword /add ^> %SYSTEMDRIVE%\\WINDOWS\\Temp\\xxxxxxxxxxxxxxxx.txt > \\WINDOWS\\Temp\\xxxxxxxxxxxxxxxx.bat & %COMSPEC% /C start %COMSPEC%\\Temp\\xxxxxxxxxxxxxxxx.bat Any thoughts on what tool that is? Seen that pattern before? (edited)
Avatar
Avatar
dis0wn
Good morning, all. I am looking to identify tooling from a process creation event.. the format of the ImagePath is: %COMSPEC% /C echo net user fred p@ssword /add ^> %SYSTEMDRIVE%\\WINDOWS\\Temp\\xxxxxxxxxxxxxxxx.txt > \\WINDOWS\\Temp\\xxxxxxxxxxxxxxxx.bat & %COMSPEC% /C start %COMSPEC%\\Temp\\xxxxxxxxxxxxxxxx.bat Any thoughts on what tool that is? Seen that pattern before? (edited)
Andrew Rathbun 3/29/2023 7:40 AM
ChatGPT says: The format of the ImagePath you provided looks like a batch file that creates a new user account named "fred" with a password "p@ssword". It seems to be using the Windows Command Prompt (cmd.exe) to execute the batch file and create the user account. Based on the format of the ImagePath, it's possible that the process creation event is associated with a malware or a malicious script that is attempting to create a new user account on the compromised system. The use of a temporary batch file and the redirection of output to a temporary file in the system drive could be an attempt to evade detection by security software. It's recommended that you investigate further to determine the source of the process creation event and take appropriate action to mitigate any potential security risks. It very well could just be a script. Not sure why a malicious binary would be created to do the above when a simple script/one-off commands can handle that. (edited)
👍 1
Avatar
Avatar
dis0wn
Good morning, all. I am looking to identify tooling from a process creation event.. the format of the ImagePath is: %COMSPEC% /C echo net user fred p@ssword /add ^> %SYSTEMDRIVE%\\WINDOWS\\Temp\\xxxxxxxxxxxxxxxx.txt > \\WINDOWS\\Temp\\xxxxxxxxxxxxxxxx.bat & %COMSPEC% /C start %COMSPEC%\\Temp\\xxxxxxxxxxxxxxxx.bat Any thoughts on what tool that is? Seen that pattern before? (edited)
JLindmar (83AR) 3/29/2023 7:57 AM
And here is what Google Bard says:
The command creates a new user account called "fred" with the password "p@ssword". It then creates a batch file called "xxxxxxxxxxxxxxxx.bat" that contains the following command: net user fred p@ssword /add The batch file is then started. When it runs, it adds the new user account to the system. The command uses the following syntax: %COMSPEC% /C command The %COMSPEC% variable is replaced with the path to the current user's command prompt. The /C flag tells the command to run in a console window and then terminate. The echo command prints the specified text to the console. The net user command creates a new user account. The /add flag tells the command to add the user account to the system. The p@ssword parameter is the password for the new user account. The /%SYSTEMDRIVE%\WINDOWS\Temp\xxxxxxxxxxxxxxxx.txt parameter is the path to the file that will be created. The > symbol tells the command to redirect the output of the echo command to the file. The %COMSPEC%\Temp\xxxxxxxxxxxxxxxx.bat parameter is the path to the batch file that will be created. The & symbol tells the command to start the batch file in the background. The command creates a new user account and then creates a batch file that adds the new user account to the system. The batch file is then started, which adds the new user account to the system.
Avatar
Avatar
JLindmar (83AR)
And here is what Google Bard says:
The command creates a new user account called "fred" with the password "p@ssword". It then creates a batch file called "xxxxxxxxxxxxxxxx.bat" that contains the following command: net user fred p@ssword /add The batch file is then started. When it runs, it adds the new user account to the system. The command uses the following syntax: %COMSPEC% /C command The %COMSPEC% variable is replaced with the path to the current user's command prompt. The /C flag tells the command to run in a console window and then terminate. The echo command prints the specified text to the console. The net user command creates a new user account. The /add flag tells the command to add the user account to the system. The p@ssword parameter is the password for the new user account. The /%SYSTEMDRIVE%\WINDOWS\Temp\xxxxxxxxxxxxxxxx.txt parameter is the path to the file that will be created. The > symbol tells the command to redirect the output of the echo command to the file. The %COMSPEC%\Temp\xxxxxxxxxxxxxxxx.bat parameter is the path to the batch file that will be created. The & symbol tells the command to start the batch file in the background. The command creates a new user account and then creates a batch file that adds the new user account to the system. The batch file is then started, which adds the new user account to the system.
JLindmar (83AR) 3/29/2023 8:00 AM
And here is what I got back from ChatGPT:
The command you provided is a Windows command prompt command, which performs the following tasks: 1. It uses the %COMSPEC% environment variable to reference the command interpreter executable (usually cmd.exe). 2. It runs the echo command to output the string "net user fred p@ssword /add > %SYSTEMDRIVE%\WINDOWS\Temp\xxxxxxxxxxxxxxxx.txt" to the console. 3. It uses the > symbol to redirect the output of the echo command to a file named xxxxxxxxxxxxxxxx.txt located in the C:\WINDOWS\Temp directory (%SYSTEMDRIVE% is a reference to the drive where Windows is installed, typically C:). 4. It uses the ^ symbol to escape the > character so that it is treated as a literal character rather than as a redirection operator. 5. It uses the & symbol to concatenate multiple commands on a single line. 6. It runs another instance of the command interpreter using %COMSPEC%, passing it the /C parameter to run the command specified as an argument and then exit. 7. It runs the start command to launch the batch file xxxxxxxxxxxxxxxx.bat located in the %COMSPEC%\Temp directory, which executes the command written in step 2 and saves the output to xxxxxxxxxxxxxxxx.txt in the C:\WINDOWS\Temp directory. Overall, the command appears to create a new user account named "fred" with the password "p@ssword" and saves the output of the command to a text file in the C:\WINDOWS\Temp directory. However, the purpose and context of the command are unclear, and it should be used with caution as it could potentially be used for malicious purposes.
(edited)
Avatar
yep.. That's the same conclusion I came to.. I'm more looking for someone that might recognize the specific TTP of "echo string to txt and to bat, then start" It's a bit redundant and thought it might be a signature of crackmapexec or ntlmrelayx tooling..
Avatar
I found the answer! It's a signature for metasploit's ms17_010_command.rb module.. creates a txt and bat version, then executes it..
🤔 1
Avatar
@chick3nman lol.. small world!
Avatar
no kidding 🙂
Avatar
I have no clue why it creates both a text file and a batch file but the source code certainly does that. Start at line 96 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/smb/ms17_010_command.rb
Metasploit Framework. Contribute to rapid7/metasploit-framework development by creating an account on GitHub.
Avatar
Avatar
dis0wn
Good morning, all. I am looking to identify tooling from a process creation event.. the format of the ImagePath is: %COMSPEC% /C echo net user fred p@ssword /add ^> %SYSTEMDRIVE%\\WINDOWS\\Temp\\xxxxxxxxxxxxxxxx.txt > \\WINDOWS\\Temp\\xxxxxxxxxxxxxxxx.bat & %COMSPEC% /C start %COMSPEC%\\Temp\\xxxxxxxxxxxxxxxx.bat Any thoughts on what tool that is? Seen that pattern before? (edited)
That could be smbexec (edited)
Avatar
Avatar
deetnutz
That could be smbexec (edited)
randomaccess 3/29/2023 1:01 PM
Looks like.it could be that too
1:02 PM
Impacket is a collection of Python classes for working with network protocols. - impacket/smbexec.py at master · fortra/impacket
1:03 PM
For impacket stuff look for a service "btobto"
Avatar
Looking around line 277 in that source code, smbexec only creates the .bat file.. my event created a .txt and a .bat file.. smbexec doesn't quite match but it's close.. (edited)
1:06 PM
The msf module is an exact match since it creates an exactly-16-chr file name.. smbexec only creates up to 8 chr.
1:06 PM
(my event had a 16 chr .txt and .bat file)
Avatar
randomaccess 3/29/2023 1:08 PM
It outputs to whatever this line is "        self.output = '\\127.0.0.1\' + self.share + '\' + OUTPUT_FILENAME" So mostly I see people not change it and you get the loop IP. But they could have. If it was an exact match with the metasploit module I'd probably go with that than someone changing the defaults
👍 1
Avatar
Hi, when using FTK imager on a sample how can you tell what a user has deleted?
6:42 PM
I don't really see an easy indicator. I see unallocated spaces, and then also like the recycle bin
6:42 PM
but thats it
Avatar
Avatar
GodLy
Hi, when using FTK imager on a sample how can you tell what a user has deleted?
Andrew Rathbun 3/29/2023 6:42 PM
FTK Imager isn't a forensic suite and shouldn't be used to do forensics, per se. Check the recycle bin and parse the artifacts in there to see what the original filenames were and the time they were deleted
Avatar
Whats good to use for deleted files for a fake forensic case then?
6:43 PM
I have encase and a few other tools. just FTK is what I know the best hence why im using it
Avatar
Avatar
GodLy
Whats good to use for deleted files for a fake forensic case then?
Andrew Rathbun 3/29/2023 6:43 PM
RBCmd by Eric Zimmerman is a good choice for parsing files within the recycle bin
👍 1
6:43 PM
I'm sure other tools, paid and free, parse the same artifacts but that's the answer you're getting from me 😛 (edited)
Avatar
Avatar
GodLy
Whats good to use for deleted files for a fake forensic case then?
Autopsy might be worth a shot for what you're trying to do.
Salute 2
Avatar
Avatar
GodLy
Hi, when using FTK imager on a sample how can you tell what a user has deleted?
silence.s1r 3/29/2023 9:14 PM
Other than the x mark, you can pull out $J from there, parse it with MFTECmd and filter the UpdateReasons column for deleted files. RBCmd too for recycle bin, just make sure you know the SID of the specific user if multiple users are logged in there.
👆 1
Avatar
Digitalferret 3/30/2023 5:53 AM
ping @CLB-dan.techcrime - see this?
👍 1
Avatar
andrew_case 3/30/2023 7:48 AM
The Computer Science department at Louisiana State University (LSU) is currently hiring for many faculty positions related to applied cyber security. Courses taught inside this department include reverse engineering, malware analysis, binary exploitation, memory forensics and other intensive courses related to incident response and offensive security. Ideal candidates will have significant experience with deeply technical areas of cybersecurity. LSU was recently granted the CAE-CO designation and is one of only 21 schools nation-wide to hold it as it is the most technical designation granted by NSA and DHS. The department also runs a large SFS program for cyber security students. If you are interested in one of these positions, then please see the following link. I also ask my industry contacts to please spread the word within academic communities that you have access to: https://lsu.wd1.myworkdayjobs.com/en-US/LSU/job/3325-Patrick-F-Taylor-Hall/Assistant-Professor_R00074211?q=computer%20science%20cybersecurity The cybersecurity effort at LSU has strong support from the highest levels of the school and is rapidly expanding – so now is the perfect time to join. PS: I am not employed by LSU, but do work very closely with the CS department to ensure the courses are relevant to industry and rigorous enough for students to leave with real-world, hands-on experience. If you have questions related to the position, then please direct them to Dr. Golden Richard at LSU: https://www.cct.lsu.edu/~golden/ (edited)
All Job Postings will close at 12:01a.m. CST (1:01a.m. EST) on the specified Closing Date (if designated). If you close the browser or exit your application prior to submitting, the application progress will be saved as a draft. You will be able to access and complete the application through “My Draft Applications” located on your Candidate Home...
Avatar
Hello! I am currently working on a case study of a Steam game. On steam all user accounts have a user ID (9 digit number). In the game there is, however, a "cached_userId" which consists of letters. When investigating the chatlog within the game, the chatlog will refer to the cached userid together with the players Steam Name. I am having trouble differentiating between the user ID(9 digit number) and the cached_userId. Google is really not helping much at all, so any explanation or logic would be much appreciated.
Avatar
The Call for Papers (CFP) for HTCIA international conference closes tomorrow March 31. Submission is easy (abstract and title) - If you have been doing any research, interesting case studies, labs, etc - please submit to share your knowledge! https://hightechnologycrimeinvestigationassociation.growthzoneapp.com/ap/Form/Fill/Lx4YEixL (edited)
8:02 AM
We just announced our keynote speakers for HTCIA conference are Heather Mahalik and David Cowen! https://www.einpresswire.com/article/624957140/htcia-announces-keynote-speakers-for-2023-annual-international-conference-expo
Registration now open and a limited number of sponsorship opportunities remain
👏🏻 1
Avatar
Avatar
Wild_West
Hello! I am currently working on a case study of a Steam game. On steam all user accounts have a user ID (9 digit number). In the game there is, however, a "cached_userId" which consists of letters. When investigating the chatlog within the game, the chatlog will refer to the cached userid together with the players Steam Name. I am having trouble differentiating between the user ID(9 digit number) and the cached_userId. Google is really not helping much at all, so any explanation or logic would be much appreciated.
Deleted User 3/30/2023 8:07 AM
Perhaps they resolve to each other. Feed the cached ID into CyberChef and see what type of data it is?
Avatar
Avatar
Deleted User
Perhaps they resolve to each other. Feed the cached ID into CyberChef and see what type of data it is?
I hadn't tried that, but it didn't give any result. When I look into the chatlog, all of the cached_userid's begin with KU. After that it is just a random mix of 8 small and capital letters with digits. For instance: (KU_q4h6LPNr) username
Avatar
Deleted User 3/30/2023 8:13 AM
Fire up Wireshark and interact with Steam. Maybe that reveals what you are looking for. Good luck 👍🏻 (edited)
Avatar
I just might do that, and the luck is needed 😁
Avatar
could someone give me a dm regarding install hanging at instal of iman service @MSAB
Salute 1
Avatar
TiffanyRbns 3/31/2023 6:28 AM
Seeing if anyone has experienced this…. We have extractions of 2 phones with conversations and one phone is missing a section of the text back and forth in the conversation. No indication the text were deleted per the extraction. Seems as though this person is creating incoming/outgoing spoof text. Does anyone know of any specific apps/tools/website that can do this? Example text shows timestamps of 1:57:00pm, 2:54:00pm, 4:30:00pm.
Avatar
Hey all. I am pulling video off of a camera server and need a 12TB hard drive to submit into evidence. Am I better off putting it on an internal or external drive for submitting into long term evidence? It'll either be a WD Red Pro or a WD My Book. In a perfect world it would go on solid state drives, but that's not in our budget.
Avatar
Anyone in the Financial sector using Magnet Axiom Cyber open to sharing there thoughts with me in DM? Thank you!
Avatar
Avatar
wcso_pete
Hey all. I am pulling video off of a camera server and need a 12TB hard drive to submit into evidence. Am I better off putting it on an internal or external drive for submitting into long term evidence? It'll either be a WD Red Pro or a WD My Book. In a perfect world it would go on solid state drives, but that's not in our budget.
Digitalferret 3/31/2023 8:16 AM
neither may be 'the best' . what are your priorities? fast download, reliable storage, ease of connection in passing it to a 3rd party for viewing, will it actually be in a NAS device etc. maybe check https://www.westerndigital.com/solutions/color-drives . anecdotal, but I'd avoid portable drives unless you actually need to prioritise portability.
Avatar
Avatar
Digitalferret
neither may be 'the best' . what are your priorities? fast download, reliable storage, ease of connection in passing it to a 3rd party for viewing, will it actually be in a NAS device etc. maybe check https://www.westerndigital.com/solutions/color-drives . anecdotal, but I'd avoid portable drives unless you actually need to prioritise portability.
Our priority is potential long term storage. We are being nice and not submitting the whole $20k+ camera server into evidence. It’s a case involving a school employee so we have to keep it in case other victims come forward.
👍🏻 1
Avatar
Digitalferret 3/31/2023 8:22 AM
check the WD site i linked. red may not be the best as its for a one-off store and save.
8:25 AM
I'd always prefer native cables, not USB, but i guess that depends how whoever is going to view wants to hook it up, ie Laptop
Avatar
Avatar
Digitalferret
I'd always prefer native cables, not USB, but i guess that depends how whoever is going to view wants to hook it up, ie Laptop
That's my thought as well. I was originally going to do the SATA drive. I have docks available if anyone ever needs to access the content. Obviously the ideal solution is to try and talk command into getting me an LTO5 tape drive but I'll take what I can get!
Avatar
Avatar
wcso_pete
That's my thought as well. I was originally going to do the SATA drive. I have docks available if anyone ever needs to access the content. Obviously the ideal solution is to try and talk command into getting me an LTO5 tape drive but I'll take what I can get!
Digitalferret 3/31/2023 8:36 AM
" talk command into getting me.." lol, PDs the world over. Officer: we need dis! Command/Accounts: GTFO won't a floppy do?
Avatar
Avatar
wcso_pete
Hey all. I am pulling video off of a camera server and need a 12TB hard drive to submit into evidence. Am I better off putting it on an internal or external drive for submitting into long term evidence? It'll either be a WD Red Pro or a WD My Book. In a perfect world it would go on solid state drives, but that's not in our budget.
chadbrewbaker 3/31/2023 8:36 AM
6TB NAS drives is what my sister who does photography/video uses? Most attorneys will usually be happy to get you a shrinkwrapped drive so their copy it isn't out of your budget.
Avatar
Avatar
wcso_pete
That's my thought as well. I was originally going to do the SATA drive. I have docks available if anyone ever needs to access the content. Obviously the ideal solution is to try and talk command into getting me an LTO5 tape drive but I'll take what I can get!
Digitalferret 3/31/2023 8:50 AM
with 12TB required, and sticking with WD internal, it's looking like Red Pro v Gold. might be worth consiodering this though. NAS drives designed for RAID use -
8:51 AM
similarly nuanced tech issues when folks go for the (sometimes) cheaper AV drives over regular desktop drives.
Avatar
This is a first 😂
Avatar
some custom rom based on Samsung fw? (edited)
Avatar
Hello everyone! I am just inquiring what everyone uses for secure file sharing? This would be for mostly legal files that also may include.pst files, PDFs, excel, etc
Avatar
Avatar
dozadown
Hello everyone! I am just inquiring what everyone uses for secure file sharing? This would be for mostly legal files that also may include.pst files, PDFs, excel, etc
you can use 7zip and 256 bit encrypt the files into a folder and either email them or share a folder. The passcode would be transmitted differently.
this 3
Avatar
I'm looking for some organization/extraction software that will help me create a timeline from chat and email messages... preferably media as well.
12:14 PM
I'm trying to corelate various discussions over a long period of time
12:15 PM
So, the goal would be so search for a key word... and slice across a day through multiple streams
12:17 PM
I might be able to use something like obsidian... but I'm hoping to find something more specialized so that my focus can be on the research rather than the tools
Avatar
Avatar
Arcain
some custom rom based on Samsung fw? (edited)
Customer said it is like this from the first boot 😅
Avatar
Avatar
TiffanyRbns
Seeing if anyone has experienced this…. We have extractions of 2 phones with conversations and one phone is missing a section of the text back and forth in the conversation. No indication the text were deleted per the extraction. Seems as though this person is creating incoming/outgoing spoof text. Does anyone know of any specific apps/tools/website that can do this? Example text shows timestamps of 1:57:00pm, 2:54:00pm, 4:30:00pm.
Andrew Rathbun 3/31/2023 1:11 PM
Try one of the mobile channels #mobile-forensic-extractions #mobile-forensic-decoding
Avatar
Avatar
Andrew Rathbun
Try one of the mobile channels #mobile-forensic-extractions #mobile-forensic-decoding
TiffanyRbns 3/31/2023 1:24 PM
Thanks will do.
👍 1
Avatar
Any suggestions on where to look or what that type of software would be called?
1:28 PM
I've had no luck finding something that matches the requirements
Avatar
Hi everyone! I'm a PhD research student at Teesside University exploring the use of keyword list searches in CSAM cases. The aim is to develop a search strategy which would lead to more effective searches. I'm hoping to find practitioners on here who would do a quick anonymous survey to help with my research. Originally, I was only seeking participants from police DFUs in England and Wales but would now like to get input from various sources, such as private labs and those in law enforcement outside England and Wales to see how the keyword list is used in practice. If you are willing to participate, please read the attached document where you will find information about the project and the links to the survey... one for England and Wales, and a global one for those outside the area. Thanks for your help, please contact me if you have any questions.
Avatar
@DCSO thank you so much!
Avatar
So when is Cellebrite, Magnet or someone else coming out with a GPT-4 enhanced forensics tool that will be able to ingest a warrant, the search request, all the case reports and then go through all the data and automatically tag all the relevant artifacts that are in the scope of the search warrant? The technology exists now so get to work! 😄
😂 2
Avatar
Avatar
JSDurand
So when is Cellebrite, Magnet or someone else coming out with a GPT-4 enhanced forensics tool that will be able to ingest a warrant, the search request, all the case reports and then go through all the data and automatically tag all the relevant artifacts that are in the scope of the search warrant? The technology exists now so get to work! 😄
Andrew Rathbun 3/31/2023 6:29 PM
Are you trying to be unemployed? 😜 Because that's how you get unemployed!
Avatar
Well, I am pretty sure that it's coming whether we like it or not. I see it as a good thing. We will be able to handle more evidence, concentrate on the real forensics aspect instead of reading text messages and looking at photos and used properly, I think it would be extremely powerful.
Avatar
Hey Guys. Senior Cybersecurity student here at The University of Texas in San Antonio. During my time here I’ve really enjoyed Digital Forensics and want to focus on this field for my career! Can someone help me or provide guidance in what I should be doing or how to get started in this field?
10:45 PM
What should I learn first? Where are the best resources? I have lots of questions and would appreciate any help from experienced professionals. Thank you all!
10:46 PM
Please feel free to PM me so as not to clog up this channel.
Avatar
Avatar
quin3089
What should I learn first? Where are the best resources? I have lots of questions and would appreciate any help from experienced professionals. Thank you all!
What part of digital forensics do you want to learn? Check out the channels on the left if you don't know what you don't know about digital forensic sub-topics so we can get an idea of what resources to refer you to.
Avatar
@FullTang Wow, I didn’t even know there was more sub fields. Well, in school I’ve done Malware Analysis and also learned about Parsing through MFT entries and finding artifacts like deleted files and email headers. I’ve enjoyed it all so I’m not sure yet but I’ll research the sub fields. (edited)
Avatar
khushigupta0641 4/1/2023 8:07 AM
Hello everyone, Is there a way to detect what kind of encryption is used on a file?
Avatar
Avatar
khushigupta0641
Hello everyone, Is there a way to detect what kind of encryption is used on a file?
what kind of file are we talking about? if it's an archive it will likely have metadata to indicate which encryption algorithm is used
Avatar
khushigupta0641 4/1/2023 8:14 AM
I have an image of the encrypted file
Avatar
what do file, or binwalk indicate about it ? (edited)
Avatar
khushigupta0641 4/1/2023 8:18 AM
The file is a .enc file
Avatar
I recommend running binwalk against it for a first triage; binwalk is similar to the file command in that it looks at "magic bytes" but does so throughout the file https://en.wikipedia.org/wiki/List_of_file_signatures https://github.com/ReFirmLabs/binwalk
This is a list of file signatures, data used to identify or verify the content of a file. Such signatures are also known as magic numbers or Magic Bytes. Many file formats are not intended to be read as text. If such a file is accidentally viewed as a text file, its contents will be unintelligible. However, sometimes the file signature can be re...
Firmware Analysis Tool. Contribute to ReFirmLabs/binwalk development by creating an account on GitHub.
Avatar
khushigupta0641 4/1/2023 8:30 AM
8:30 AM
This is what I get
Avatar
Avatar
Loof
I'm looking for some organization/extraction software that will help me create a timeline from chat and email messages... preferably media as well.
Yuri Gubanov (Belkasoft) 4/2/2023 3:19 AM
I might be missing the point, but any commercial DFIR software which supports artifact extraction will help you to build a timeline and slice using various filters, e.g. ours Belkasoft X
Avatar
Avatar
JSDurand
So when is Cellebrite, Magnet or someone else coming out with a GPT-4 enhanced forensics tool that will be able to ingest a warrant, the search request, all the case reports and then go through all the data and automatically tag all the relevant artifacts that are in the scope of the search warrant? The technology exists now so get to work! 😄
Yuri Gubanov (Belkasoft) 4/2/2023 3:19 AM
Would you be willing to share case data with Microsoft/OpenAI?
3:22 AM
  • * * *
How Good of a DFIR Investigator Are You? — an All Fools’ Day quiz from Belkasoft. Can you score 10/10? https://belkasoft.com/how-good-dfir-investigator-are-you Have fun!
Avatar
@Yuri Gubanov (Belkasoft) Obviously it will require a locally run version.
Avatar
Avatar
JSDurand
@Yuri Gubanov (Belkasoft) Obviously it will require a locally run version.
Yuri Gubanov (Belkasoft) 4/2/2023 5:41 AM
This is not provided by OpenAI - repeating that would involve costs higher than Cellebrite and Magnet valuation altogether multiple times
5:42 AM
I mean repeating the model training -- but there are also significant hardware costs to be spent by an agency
Avatar
@Yuri Gubanov (Belkasoft) you're right, but there is also a lot of work being done to democratize the technology, for example with Meta's LLaMA.
Avatar
Weird question and maybe it doesnt matter really, but would you rather have the users download folder locally or mapped to a network share? One con I noticed is we cant see the file in the mft and we dont get it when we image the computer, on the other hand we can ask another team to pull the files for us and we get backups on downloaded files.
Avatar
Avatar
janice2858
Hi everyone! I'm a PhD research student at Teesside University exploring the use of keyword list searches in CSAM cases. The aim is to develop a search strategy which would lead to more effective searches. I'm hoping to find practitioners on here who would do a quick anonymous survey to help with my research. Originally, I was only seeking participants from police DFUs in England and Wales but would now like to get input from various sources, such as private labs and those in law enforcement outside England and Wales to see how the keyword list is used in practice. If you are willing to participate, please read the attached document where you will find information about the project and the links to the survey... one for England and Wales, and a global one for those outside the area. Thanks for your help, please contact me if you have any questions.
chadbrewbaker 4/2/2023 11:35 AM
Rather than a keyword list you probably want a corpus of messages used for transmitting links - then train a GPT on it. You can then use that to crawl messages. This is isomorphic to looking for consumers of electric tea kettles - hence I would use that dataset - then repurpose the workflow to any topic of interest to the detective.
Avatar
Avatar
isvak
Weird question and maybe it doesnt matter really, but would you rather have the users download folder locally or mapped to a network share? One con I noticed is we cant see the file in the mft and we dont get it when we image the computer, on the other hand we can ask another team to pull the files for us and we get backups on downloaded files.
chadbrewbaker 4/2/2023 11:40 AM
In general, I prefer federation over forensics. If an attacker can't get at the data then you don't have a breach to investigate.
Avatar
Avatar
JSDurand
@Yuri Gubanov (Belkasoft) you're right, but there is also a lot of work being done to democratize the technology, for example with Meta's LLaMA.
chadbrewbaker 4/2/2023 11:46 AM
I'm giving a talk on this to Central Iowa Linux User Group on April 19th, should be posted to youtube. Lots in our F500 need localhost large language models. I'll wrap what I have in a command line utility so you can shell out to it and a python flask app you can call from whatever.
👍 1
Avatar
Avatar
Yuri Gubanov (Belkasoft)
I mean repeating the model training -- but there are also significant hardware costs to be spent by an agency
chadbrewbaker 4/2/2023 11:48 AM
You usually don't have to retrain the entire model, in several domains they were able to tune LLaMA for just a few hundred dollars. I'll try to add that to my talk.
Avatar
Avatar
Yuri Gubanov (Belkasoft)
  • * * *
How Good of a DFIR Investigator Are You? — an All Fools’ Day quiz from Belkasoft. Can you score 10/10? https://belkasoft.com/how-good-dfir-investigator-are-you Have fun!
chadbrewbaker 4/2/2023 11:51 AM
I had to explain to a manager modulo Microsoft's horrid Azure security, you shouldn't be putting sensitive things into Google the past 20 years either.
Avatar
Avatar
quin3089
Hey Guys. Senior Cybersecurity student here at The University of Texas in San Antonio. During my time here I’ve really enjoyed Digital Forensics and want to focus on this field for my career! Can someone help me or provide guidance in what I should be doing or how to get started in this field?
chadbrewbaker 4/2/2023 11:54 AM
Get an internship in automotive dev. Tesla, John Deere, doesn't matter. You will get blasted with the entire tech stack and learn how to investigate darn near anything.
👍 1
Avatar
Avatar
khushigupta0641
The file is a .enc file
chadbrewbaker 4/2/2023 12:04 PM
Probably one of the openssl supported formats. Most have headers? Should be able to inject into test code and see which header parser doesn't barf. https://github.com/openssl/openssl/tree/master/test Roll this into a command line program and lots would probably use it.
Avatar
Avatar
chadbrewbaker
You usually don't have to retrain the entire model, in several domains they were able to tune LLaMA for just a few hundred dollars. I'll try to add that to my talk.
Yuri Gubanov (Belkasoft) 4/2/2023 1:38 PM
Well, “retrain” means you have the model, which I don’t think OpenAI is going to give you.
Avatar
chrisforensic 4/2/2023 10:34 PM
hi @conf1ck3r ... I think political content has no place here, right?
Avatar
skype.raidercom.
Avatar
Avatar
Queen-L
skype.raidercom.
Digitalferret 4/3/2023 2:09 AM
?
Avatar
Original message was deleted or could not be loaded.
Digitalferret 4/3/2023 2:18 AM
possibly better in #off-duty unless there's a DFIR component.
👍 1
Avatar
Avatar
Digitalferret
possibly better in #off-duty unless there's a DFIR component.
I’ll double check on this too
👍🏻 1
Avatar
Hi all, I'm looking for recent research on forensic methods to detect spyware. Any pointers at all would be helpful
Avatar
Hello, I am currently doing a dissertation where i am doing an extraction from a mobile phone, but currently I'm trying to populate the phone with data. I got recommended from my teacher to just download a bunch of PDF's and whatever to the phone, is there any websites for such purposes?
Avatar
Original message was deleted or could not be loaded.
While we all love bangers, maybe post any song recommendations in #off-duty?
Avatar
Avatar
Matt
While we all love bangers, maybe post any song recommendations in #off-duty?
Andrew Rathbun 4/3/2023 7:13 AM
Specifically, there is a thread for Music, I'll resurrect it - https://discord.com/channels/427876741990711298/927621348677804072
FeelsOKMan 2
Avatar
Avatar
Yuri Gubanov (Belkasoft)
Well, “retrain” means you have the model, which I don’t think OpenAI is going to give you.
chadbrewbaker 4/3/2023 7:14 AM
https://github.com/ggerganov/llama.cpp is probably the best available right now to self-host.
👍 1
Avatar
From embarrassment? It's okay, we all post things by mistake 🙂
Avatar
Andrew Rathbun 4/3/2023 7:42 AM
FYI, we've reached out to that user and people they associate with in other servers and are handling it
Avatar
Avatar
Trond
Hello, I am currently doing a dissertation where i am doing an extraction from a mobile phone, but currently I'm trying to populate the phone with data. I got recommended from my teacher to just download a bunch of PDF's and whatever to the phone, is there any websites for such purposes?
chadbrewbaker 4/3/2023 11:23 AM
Lol. Arxiv? What are you trying to do with the data?
Avatar
Avatar
chadbrewbaker
Lol. Arxiv? What are you trying to do with the data?
Just to fill up the phone's drive so the "evidence" I planted isn't as easily discovered (edited)
Avatar
chadbrewbaker 4/3/2023 11:34 AM
Go to a local cell repair shop - offer $50 for phones that havent' been wiped.
Avatar
It's a good idea, but couldn't get University permission to do that because of ethical reasons in my dissertation, so had to lend a freshly wiped one from school, but Arxiv, Buldata, and Openlibrary will be plenty for now I believe, thank you though! (edited)
Avatar
chadbrewbaker 4/3/2023 11:37 AM
Do you think Walmart is ethical in the cell phone bin they have out front? Probably more ethical to write scripts that carefully preserve privacy for your experiment then properly wipe the phone before recycling.
11:38 AM
Obviously don't use anything network connected with creds on the phone.
11:43 AM
Should be able to do it black box - script A injects what you want - script B detects (make sure it is localhost w no data leaks). Do 100 random injections and the original filesystems. Should give you the probability density function you want.
Avatar
Avatar
chadbrewbaker
Should be able to do it black box - script A injects what you want - script B detects (make sure it is localhost w no data leaks). Do 100 random injections and the original filesystems. Should give you the probability density function you want.
I will do some research on this, thank you for the tips!
Avatar
chadbrewbaker 4/3/2023 11:46 AM
You can also try some tricks similar to stable diffusion - randomly deleting or modifying files to get a good idea of the state space script B does and does not work for.
11:50 AM
The pile is great if you want non-malicious files of real world content for false positive testing https://huggingface.co/datasets/EleutherAI/the_pile
Avatar
Might be a bit to advanced compared to what I'm currently doing, but I'll for sure check it out!
Avatar
MartinInDFIRland 4/3/2023 7:03 PM
can someone suggest me a best p/p EDR/XDR?
7:05 PM
my goal is to be as fast as possible to detect and then response (auto) to prevent users
Avatar
Any reason @Griffeye and @Magnet Forensics Axiom would have different hash values for images from the same forensic image?
Avatar
Avatar
sholmes
Any reason @Griffeye and @Magnet Forensics Axiom would have different hash values for images from the same forensic image?
cScottVance 4/4/2023 10:07 AM
I've seen this issue recently depending on the image type. Shooting you a DM.
Avatar
Thanks @cScottVance
Avatar
Avatar
sholmes
Any reason @Griffeye and @Magnet Forensics Axiom would have different hash values for images from the same forensic image?
Ross Donnelly 4/4/2023 10:55 AM
I assume they are carved images? We regularly see different tools recovering the same images with a few more or less bytes in length - meaning different hash values.
Avatar
Avatar
Ross Donnelly
I assume they are carved images? We regularly see different tools recovering the same images with a few more or less bytes in length - meaning different hash values.
That is what I was banking on, but wanted verification from someone who uses Griffeye. I don't use it, nor do I have access to it to check. Thanks for the response!
Avatar
Any suggestions for a faraday box to fit inside a faraday box? Boxception? I have a mission darkness XL but currently have around 7 phones inside of it. Maneuvering things into bags to open the lid is a PITA, I'm wondering if theres an easy little box I can use for this temporary shielding. Any ideas?
Avatar
James Pedersen 4/4/2023 3:33 PM
Does anyone here know how to obtain the derived AES keys (key 0x85, key 0x86, etc, see https://www.theiphonewiki.com/wiki/AES_Keys ) from a jailbroken iPhone 6? (edited)
Avatar
Avatar
whee30
Any suggestions for a faraday box to fit inside a faraday box? Boxception? I have a mission darkness XL but currently have around 7 phones inside of it. Maneuvering things into bags to open the lid is a PITA, I'm wondering if theres an easy little box I can use for this temporary shielding. Any ideas?
Ramsey has Faraday enclosure. Size is about 4.5"H x 7.2"W x 9.7"D. https://ramseytest.com/ste2200f2
Avatar
Perfect size but at $500 I'll have to keep fiddling with bags... I just had to cram a bunch into some bags to add something new and it's doable but frustrating
Avatar
Ramsey has better build qaulity than MD...but yes...it's expensive. How about foils?
Avatar
a box with an easy to open/close lid would be great but all im seeing so far is a molle pouch from mission darkness, which is effectively a different shaped bag, the ramsey box and a host of cheap "faraday" boxes on amazon
4:03 PM
I agree about the build quality! I have a ramsey box and a mission darkness... if ramsey made a larger box with more working room it would be my favorite
4:04 PM
Well heck, I guess they do make a bigger box...
Avatar
Anyway here who uses Cellebrite Digital Collector and is available per DM to discuss their experience with it?
Avatar
I’ve used it off and on for a few years. No real problems beyond what most tools have, lag in updates etc. bought it back when t2 was the new “big deal” and I had a major case. I am fine with the tool, though I’ve never used Sumuri for any length of time. I think finding someone who has experience with both would be a good idea.
Avatar
I'm evaluating it right now. Our main usage would be to have something easier for doing logical copies of modern (m1, t2 encrypted) Macs. But it seems to fail on those because of Apple's Security Integrity Protection. So I'm not really sure about it's usefulness compared to a more manual approach.
Avatar
Hey guys, has anyone looked into plaso and possibility to improve it's performance?
7:50 AM
I am playing with cylr->plaso->timesketch. Checking what is the time since generating plaso file and tagging it with plaso tags. I see that for couple of minutes some workers are doing something but like after 2-3 min just one "main" worker is utilizing just one CPU rest of them is sitting in idle...
7:51 AM
Mybe someone has nice reading material regarding such things?
Avatar
Avatar
GoblinJu
I am playing with cylr->plaso->timesketch. Checking what is the time since generating plaso file and tagging it with plaso tags. I see that for couple of minutes some workers are doing something but like after 2-3 min just one "main" worker is utilizing just one CPU rest of them is sitting in idle...
Andrew Rathbun 4/5/2023 8:16 AM
Any reason to use CyLR? I thought that project was abandoned?
Avatar
Avatar
Andrew Rathbun
Any reason to use CyLR? I thought that project was abandoned?
No special reason. Mostly for poking reasons.
8:21 AM
I guess plaso does not realy care if i am giving cyler package or Kape package…
Avatar
Avatar
GoblinJu
I guess plaso does not realy care if i am giving cyler package or Kape package…
Andrew Rathbun 4/5/2023 8:22 AM
That would be my guess, but I don't really use Plaso so I can't say for sure
Avatar
At the moment we are playing mostly with forensic packages not full disk image. Just to see how it all works.
Avatar
Avatar
leifsoren
I'm evaluating it right now. Our main usage would be to have something easier for doing logical copies of modern (m1, t2 encrypted) Macs. But it seems to fail on those because of Apple's Security Integrity Protection. So I'm not really sure about it's usefulness compared to a more manual approach.
part of the acquisition process includes rebooting and disabling SIP, is this not an option for you?
this 1
Avatar
DefendingChamp 4/5/2023 10:41 AM
What's going on with Cellebrite
👀 2
Avatar
Avatar
GoblinJu
Hey guys, has anyone looked into plaso and possibility to improve it's performance?
Biggest improvement is not using win7_slow (use win7), and running mft separately so there's something ready to analyze in the meantime (edited)
1:32 PM
otherwise, it'll happily use a ton of sub-processes so having more threads available on the cpu helps (edited)
Avatar
Avatar
rayeh
Biggest improvement is not using win7_slow (use win7), and running mft separately so there's something ready to analyze in the meantime (edited)
MFT seperetly you say... Hmmm
Avatar
Avatar
whee30
part of the acquisition process includes rebooting and disabling SIP, is this not an option for you?
I understand better now how collector works. Disabling SIP means changing things on the device, not sure yet about the tradeoffs. I will try the product more during the next days. It doesn't seem bad so far. Found a few bugs on MacOS 13. Do you have any experience comparing it to Sumuri Recon ITR? I will be trying that one soon aswell to see which of the two is more interesting.
Avatar
I don’t, unfortunately. I do know that Sumuri has been very generous with demos and advice in the past, I like them as a company. I just havent had the time to try an apples to apples comparison.
Avatar
OK thanks. Cellebrite Collector is more expensive so I'm not sure it's worth it. (edited)
Avatar
Hi all, maybe a long shot but does anyone know what the "-mm" args mean on sdbinst.exe?
1:54 AM
Potential application shimming and these args were used but there's nothing online explaining what they do exactly
Avatar
Deleted User 4/6/2023 9:38 AM
Hey. Got a question; My Professor somehow accidentally deleted (with shift+del) their Doctoral works of nearly 2 years now, apparently they've recovered the files but they're corrupt, unable to be read. I told them to not touch the device till tomorrow for safety. What's a good way to recover / fix these files (assuming they're a .txt / .pdf / .doc etc)
Avatar
Does anyone have a reference document to explain the different XML fields on a contact export for @Cellebrite ? <model type="Contact" id="15114428-c630-4d8b-bb16-xxxxxxxxx" deleted_state="Intact" decoding_confidence="High" isrelated="False" source_index="41238" extractionId="0"> <field name="UserMapping" type="DecodingSourceOptions"> <value type="DecodingSourceOptions"><![CDATA[Decoding]]></value> </field> <field name="Source" type="String"> <value type="String"><![CDATA[Snapchat]]></value> </field> <field name="Name" type="String"> <value type="String"><![CDATA[Eric🤩]]></value> </field> <multiModelField name="Photos" type="ContactPhoto" /> <multiModelField name="Entries" type="ContactEntry"> <model type="UserID" id="873a814d-ff21-4994-adf7-xxxxxxxxx" deleted_state="Intact" decoding_confidence="High" isrelated="False" source_index="41239" extractionId="0"> <field name="Category" type="String"> <value type="String"><![CDATA[User ID]]></value> </field> <field name="Value" type="String"> <value type="String"><![CDATA[14bd076b-b6de-49e8-9474-xxxxxxxxxxxx]]></value> </field> <field name="Domain" type="String"> <value type="String"><![CDATA[User ID]]></value> </field> </model>
10:49 AM
<model type="UserID" id="d72a1091-8b2f-4538-97a7-xxxxxxxxxxxx" deleted_state="Intact" decoding_confidence="High" isrelated="False" source_index="41240" extractionId="0"> <field name="Category" type="String"> <value type="String"><![CDATA[Username]]></value> </field> <field name="Value" type="String"> <value type="String"><![CDATA[erict_xxxxxxxxxxxxx]]></value> </field> <field name="Domain" type="String"> <value type="String"><![CDATA[User ID]]></value> </field> </model> </multiModelField> <field name="Group" type="String"> <empty /> </field> <field name="Type" type="ContactType"> <value type="ContactType"><![CDATA[Friend]]></value> </field> <field name="Account" type="String"> <value type="String"><![CDATA[b752662f-90e7-4fd2-88d2-xxxxxxxxx]]></value> </field> <multiField name="InteractionStatuses" type="ContactType"> <value type="ContactType"><![CDATA[Friend]]></value> <value type="ContactType"><![CDATA[ChatParticipant]]></value> </multiField> </model>
10:51 AM
Just trying to get explination on the data fields and what is useful. For instance, with this snapchat export, is the <value type="String"><![CDATA[14bd076b-b6de-49e8-9474-xxxxxxxxxxxx]]></value> useful for serving snap with a search warrant to identify a target? What is the string actually called, User ID or Username? Because User ID is defined twice.
Avatar
Avatar
SBcyberCop
Does anyone have a reference document to explain the different XML fields on a contact export for @Cellebrite ? <model type="Contact" id="15114428-c630-4d8b-bb16-xxxxxxxxx" deleted_state="Intact" decoding_confidence="High" isrelated="False" source_index="41238" extractionId="0"> <field name="UserMapping" type="DecodingSourceOptions"> <value type="DecodingSourceOptions"><![CDATA[Decoding]]></value> </field> <field name="Source" type="String"> <value type="String"><![CDATA[Snapchat]]></value> </field> <field name="Name" type="String"> <value type="String"><![CDATA[Eric🤩]]></value> </field> <multiModelField name="Photos" type="ContactPhoto" /> <multiModelField name="Entries" type="ContactEntry"> <model type="UserID" id="873a814d-ff21-4994-adf7-xxxxxxxxx" deleted_state="Intact" decoding_confidence="High" isrelated="False" source_index="41239" extractionId="0"> <field name="Category" type="String"> <value type="String"><![CDATA[User ID]]></value> </field> <field name="Value" type="String"> <value type="String"><![CDATA[14bd076b-b6de-49e8-9474-xxxxxxxxxxxx]]></value> </field> <field name="Domain" type="String"> <value type="String"><![CDATA[User ID]]></value> </field> </model>
JLindmar (83AR) 4/6/2023 11:33 AM
These should mirror the fields found in PA or Reader for Contacts. Check out Cellebrite's "Supported models and fields" document that can be found under the "Technical Data Sheet" dropdown within the Physical Analyzer or Reader download areas on MyCellebrite. It is a GREAT resource, that unfortunately hasn't been updated since Dec. 2019 (nudge @Cellebrite), that supplements the user manual in explaining what some of the fields are.
❤️ 1
Avatar
Avatar
Deleted User
Hey. Got a question; My Professor somehow accidentally deleted (with shift+del) their Doctoral works of nearly 2 years now, apparently they've recovered the files but they're corrupt, unable to be read. I told them to not touch the device till tomorrow for safety. What's a good way to recover / fix these files (assuming they're a .txt / .pdf / .doc etc)
DeeFIR 🇦🇺 4/6/2023 3:15 PM
#data-recovery But at a high level, remove the drive, stop using it, physical image, then parse/carve and if it has an SSD, fingers crossed TRIM hasn’t hurt you.
Avatar
Digitalferret 4/7/2023 10:26 AM
just a reminder to watch for Easter Sales : R-Studio Data Recovery : 20% off https://www.r-studio.com/
Avatar
Trying to get an image of a Garmin DriveSmart 71. Tried imaging on FTK Imager, no dice as FTK doesn't recognize it. Tried imaging as a Mass Storage Device on Touch2, again, no dice. Touch2 won't connect to the device. Tried using the Generic Garmin Profile on Touch2 but still no connection. Anybody have any ideas?
Avatar
Avatar
House216
Trying to get an image of a Garmin DriveSmart 71. Tried imaging on FTK Imager, no dice as FTK doesn't recognize it. Tried imaging as a Mass Storage Device on Touch2, again, no dice. Touch2 won't connect to the device. Tried using the Generic Garmin Profile on Touch2 but still no connection. Anybody have any ideas?
burgers_N_bytes 4/7/2023 4:15 PM
Have you tried Axiom? And to confirm you were able to enter diagnostic mode and enable mass storage mode?
Avatar
Hi all, does anyone know of a program which can transfer files to an iPhone while maintaining the creation date/time and file hash? I know iTunes and AnyTrans won’t. I’m trying to seed data to my validation devices
11:37 PM
Including file name as well would be needed
Avatar
Specifically to the DCIM folder itself and not any sync folder
Avatar
Did someone see The Night Agents on Netflix? This reminds me of something hmmmmmm (edited)
😂 3
🔍 1
Avatar
I have a question about an IceID pcap from malware traffic analysis about is this the right room ?
Avatar
Avatar
psudojo
I have a question about an IceID pcap from malware traffic analysis about is this the right room ?
DeeFIR 🇦🇺 4/8/2023 7:49 PM
#network-forensics or #malware-analysis
Avatar
Avatar
DeeFIR 🇦🇺
#data-recovery But at a high level, remove the drive, stop using it, physical image, then parse/carve and if it has an SSD, fingers crossed TRIM hasn’t hurt you.
Yuri Gubanov (Belkasoft) 4/9/2023 6:48 AM
No way Trim did not work for 2 years
Avatar
Avatar
Yuri Gubanov (Belkasoft)
No way Trim did not work for 2 years
DeeFIR 🇦🇺 4/9/2023 2:55 PM
The Doctoral work was over a period of 2 years, not a file which was deleted 2 years ago. That’s how the question is written anyway. (edited)
Avatar
Avatar
DeeFIR 🇦🇺
The Doctoral work was over a period of 2 years, not a file which was deleted 2 years ago. That’s how the question is written anyway. (edited)
Yuri Gubanov (Belkasoft) 4/10/2023 1:22 AM
Ah, got it
Avatar
Avatar
Maddino
Did someone see The Night Agents on Netflix? This reminds me of something hmmmmmm (edited)
And then later they use exiftool!
Avatar
Avatar
pug4N6
And then later they use exiftool!
Yes, saw this too. Quite a good technical background for an action series.
Avatar
Avatar
Maddino
Yes, saw this too. Quite a good technical background for an action series.
Didn’t they say something about the MasterKey was supposed to be only for law enforcement too?
Avatar
Avatar
pug4N6
Didn’t they say something about the MasterKey was supposed to be only for law enforcement too?
I think so. They had a short discussion how she got the "MasterKey"
Avatar
Avatar
Maddino
I think so. They had a short discussion how she got the "MasterKey"
NibblesNBits 4/10/2023 11:33 AM
^ It was in her severance package from her startup cybersecurity firm lol
Avatar
Avatar
Maddino
Did someone see The Night Agents on Netflix? This reminds me of something hmmmmmm (edited)
TiffanyRbns 4/10/2023 7:38 PM
😂 I literally did the same thing and sent it to my team. Good show tho
Avatar
Does anyone from europe here have experience with the le portal from Microsoft? For me, one request for records has been on "in progress" for almost 3 months... Before that, I only submitted priority issues to them and they were ready after a few days... is this normal?!
Avatar
beansidebean2020 4/11/2023 3:49 AM
Does anyone know a way to export chat threads from either Cellebrite or Axiom where IIOC is redacted but a marker is left to indicate what that file has been graded as? Thanks
Avatar
Deleted User 4/11/2023 4:43 AM
Does INDXRipper only parse $I30 or does it parse $MFT too?
Avatar
Digitalferret 4/11/2023 5:26 AM
pinging @Cellebrite & @Magnet Forensics ^^ beansidebean
Avatar
Avatar
Digitalferret
pinging @Cellebrite & @Magnet Forensics ^^ beansidebean
beansidebean2020 4/11/2023 5:32 AM
Thanks 👍
Avatar
Avatar
beansidebean2020
Does anyone know a way to export chat threads from either Cellebrite or Axiom where IIOC is redacted but a marker is left to indicate what that file has been graded as? Thanks
chriscone_ar 4/11/2023 6:23 AM
There is an option in the report creation process to 'blur previews for items in illegal categories' but that does not leave an indicator in the generated chat thread of grading.
Avatar
Avatar
beansidebean2020
Does anyone know a way to export chat threads from either Cellebrite or Axiom where IIOC is redacted but a marker is left to indicate what that file has been graded as? Thanks
CLB_joshhickman1 4/11/2023 6:53 AM
What format are you exporting to?
Avatar
beansidebean2020 4/11/2023 6:54 AM
Any that will work! HTML or PDF ideally but CSV if needed
Avatar
CLB_joshhickman1 4/11/2023 6:57 AM
For the PDF, you will get a tag marker for any tagged message, but no description of the tag (I can bring this feature request to our devs). If you export to Excel, there is column "Tag Note - Instant Message" that will contain the tag name, along with when it was created/modified.
Avatar
Dr. Kaan Gündüz 4/11/2023 1:05 PM
SWGDE encourages stakeholder participation in the preparation of documents. The following documents are draft versions being provided for comment by all interested parties for a minimum period of 60 days. Suggestions for modifications are welcome and must adhere to all requirements as stated in
Avatar
David Kovar 4/12/2023 7:09 AM
Is there an appropriate channel for announcing digital forensics hardware for sale?
Avatar
Avatar
David Kovar
Is there an appropriate channel for announcing digital forensics hardware for sale?
I'd think here is fine unless @Andrew Rathbun has other plans for a Yard Sale channel haha
🤣 3
Avatar
David Kovar 4/12/2023 7:20 AM
I have a brand new, in a hard case, CRU Wiebetech Ditto DX up for sale on eBay: https://www.ebay.com/itm/204302732210
Find many great new & used options and get the best deals for CRU Wiebetech Ditto DX - new, in hard case. at the best online prices at eBay! Free shipping for many products!
Avatar
Avatar
stark4n6
I'd think here is fine unless @Andrew Rathbun has other plans for a Yard Sale channel haha
Andrew Rathbun 4/12/2023 7:32 AM
lol dfir-yard-sale, if there's enough demand for it, sure, this server is community-driven!
🪧 7
Avatar
David Kovar 4/12/2023 7:51 AM
My options seem to be Forensic Focus, CCE mailing list, and eBay. And eBay doesn't really have a DFIR category. I told one of these to a guy just starting out in New Zealand via the CCE list. Not sure how much other DFIR gear is just sitting around in people's closets that might be of interest to people just getting started.
Avatar
Avatar
Andrew Rathbun
lol dfir-yard-sale, if there's enough demand for it, sure, this server is community-driven!
could do, with a forum style channel 🙂
👆 1
Avatar
Hello, I made a Windows VM that transfered a malware to a android phone, on the windows machine I then cleared the event logs. I am now currently trying to investigate the Windows event logs on the VM machine through Magnet Examine, is there any event code that is related to connecting a phone through USB? Just to see if I can find any remaining evidence of these two devices connecting (Not sure if that's the correct way to do it) (edited)
Avatar
Avatar
Trond
Hello, I made a Windows VM that transfered a malware to a android phone, on the windows machine I then cleared the event logs. I am now currently trying to investigate the Windows event logs on the VM machine through Magnet Examine, is there any event code that is related to connecting a phone through USB? Just to see if I can find any remaining evidence of these two devices connecting (Not sure if that's the correct way to do it) (edited)
Andrew Rathbun 4/12/2023 9:40 AM
check Registry, too. Also, maybe consider USB Detective, too
👍 1
Avatar
I'll look into that,Thank you! (edited)
Avatar
Is there a way for alert to trigger IFF there is 0 results? SIEM is Splunk. Here me out. Here is a dummy splunk query trying to show what I am trying to do index=email_security [search index=email action=delivered [search index=thtreat_intel indicator_type=email | rename indicator as sender | format] | rename sender as from | format] Threat intel IOC filters on email address, uses the addresses to search in our email for any delivered hits, and then use the result to pass it into my emailsecurity (think armorblox, checkpoint), which doesn’t just scans for known bad IOC (phishing, malware, commercial spam) but takes a behavioral analysis, ML approach to detect and remediate attacks yada yada yada, basically it _should pick up the email (well in theory) that was delivered that was sen in threat_intel. So going back to my question, if there is results, great and well.. bag it and don’t alert on it — this is an indication that email_security did it’s job and mitigated, otherwise if result is empty alert. Any thoughts? Open to better and new ideas that is efficient too. (edited)
Avatar
Hi everyone. Has anyone encounter any of the scenarios below? 1. SRUM sent bytes is a reasonable approximate to bytes sent seen at the FW level. 2. SRUM bytes sent out does not match the sent bytes at the FW level. SRUM is reporting way less bytes being sent out than the bytes sent out at the FW level. I am particularly interested in scenario #2. Any insights as to why that would happen are appreciated. I am currently working a #2 scenario. I’ve never had both logs present to do a 1:1 comparison. I was under the impression that SRUM was a “reliable” artifact. System has more entries in SRUM after the date of interest. System was rebooted 5 days after the last day of interest. If any other info is needed lmk. Thanks! (edited)
Avatar
SRUM can be plus or minus an hour depending on database writes.
Avatar
True. But the times align on both SRUM and FW. Also, the discrepancy is big, ~800GB off. (edited)
Avatar
Andrew Rathbun 4/12/2023 7:40 PM
SRUM is the backend database for Task Manager, so really the artifacts recorded there are only as accurate as Microsoft coded them to be. I know that's not a great answer, but I guess you have to figure out who you trust more, Microsoft or the FW vendor. Should be pretty easy to test, though. Upload something somewhere and do nothing else for ~61ish minutes and wait for SRUM to update and see how the bytes outbound compare to the file size actually uploaded
Avatar
Yeah I thought the same thing about who to trust more. I’ll test this a few times to see if it’s repeatable or not. Thanks for your answer!
Avatar
Hello everybody, i have an ipad pro 12,9 inch 5 gh Generation from 2021. Now i have found a time stamp from May 2020 in the wireless connections. How can this happen? Will this data be synced from another device?
Avatar
Avatar
tost
Hello everybody, i have an ipad pro 12,9 inch 5 gh Generation from 2021. Now i have found a time stamp from May 2020 in the wireless connections. How can this happen? Will this data be synced from another device?
JLindmar (83AR) 4/13/2023 6:31 AM
Do the wireless connections appear associated with user or system activity? If system, it may be a relic from the manufacturer's provisioning; if user, perhaps the system clock was incorrect, a time zone difference - are the timestamps in local or UTC?
Avatar
Avatar
JLindmar (83AR)
Do the wireless connections appear associated with user or system activity? If system, it may be a relic from the manufacturer's provisioning; if user, perhaps the system clock was incorrect, a time zone difference - are the timestamps in local or UTC?
The data is from the com.apple.wifi.known-networks.plist Time stamp is May 2020. The last connection time stamp is from march 2021 and the last automatically connection from march 2023. Perhaps there must have been a sync. It is local time UTC+2 (edited)
Avatar
felloffthebarstool98 4/13/2023 6:45 AM
I have an android and being parsed from usage stats, I have an entry that states “standby bucket changed” & the package name has an email address of interest. What can I derive from usage stats type of “standby bucket change”? What causes this to happen?
Avatar
⭐Jigglypuff⭐ 4/13/2023 6:57 AM
Hello everyone 🤗
6:57 AM
I’m a senior student in Bloomsburg University of Pennsylvania
6:58 AM
Studying Data Science and Digital Forensics (double major) and graduating in a month
6:58 AM
It’s so good to be here!
Avatar
Avatar
felloffthebarstool98
I have an android and being parsed from usage stats, I have an entry that states “standby bucket changed” & the package name has an email address of interest. What can I derive from usage stats type of “standby bucket change”? What causes this to happen?
ScottKjr3347 4/13/2023 7:37 AM
Might want to try the decoding channel
Avatar
⭐Jigglypuff⭐ 4/13/2023 7:40 AM
Does anyone know a good free software that can parse RAID? Parameters of the RAID is unknown
Avatar
Anyone have a link to a narcotics keyword list I can run through Axiom?
Avatar
chadbrewbaker 4/13/2023 8:30 AM
TIL - ChatGPT4 knows the Crowdstrike REST API.
8:32 AM
I'm guessing Microsoft's security co-pilot is just a facade on ChatGPT4 to extract another $$$ monthly.
Avatar
Avatar
Leonidas
Anyone have a link to a narcotics keyword list I can run through Axiom?
Deleted User 4/13/2023 10:29 AM
Someone else posted this a while back (can’t find original post) and might be of use: https://github.com/SBCyberCop/LawEnforcementResources/tree/main/Cellebrite%20Watch%20Lists
Resources provided by the community that can serve to be useful for Law Enforcement worldwide - LawEnforcementResources/Cellebrite Watch Lists at main · SBCyberCop/LawEnforcementResources
Avatar
Avatar
Leonidas
Anyone have a link to a narcotics keyword list I can run through Axiom?
JLindmar (83AR) 4/13/2023 11:57 AM
👍 1
Avatar
Avatar
chadbrewbaker
TIL - ChatGPT4 knows the Crowdstrike REST API.
It also knows the virustotal API
Avatar
Avatar
chadbrewbaker
I'm guessing Microsoft's security co-pilot is just a facade on ChatGPT4 to extract another $$$ monthly.
Some companies have started to apply policies on using ChatGPT in the practice. Microsoft selling an “enterprise grade” version of the product might sway those against it from reconsidering.
12:09 PM
Although there are some very practical reasons why you wouldn’t want to use it.
Avatar
Avatar
Deleted User
Someone else posted this a while back (can’t find original post) and might be of use: https://github.com/SBCyberCop/LawEnforcementResources/tree/main/Cellebrite%20Watch%20Lists
Thank you!
👍 1
Avatar
Hello! I am currently writing my dissertation for my bachelor degree in digital forensics. I done a analyze of the application Spotify on iOS where I located where data is stored and what kind of data you can find. I have written a walkthrough of the data I was able to find. I am now looking for people that wants to take a look at the this guide, you can test it yourself and compare or just have a look at it and provide feedback on your opinion. This is a marking criteria so I really appreciate everyone that wants to take a look at it and give feedback! Just message me or like this post and I will send it! Thanks! 🙂 (edited)
👍 1
Avatar
RDS Hash Sets with Cellebrite PA
Avatar
Avatar
Panda
Hello! I am currently writing my dissertation for my bachelor degree in digital forensics. I done a analyze of the application Spotify on iOS where I located where data is stored and what kind of data you can find. I have written a walkthrough of the data I was able to find. I am now looking for people that wants to take a look at the this guide, you can test it yourself and compare or just have a look at it and provide feedback on your opinion. This is a marking criteria so I really appreciate everyone that wants to take a look at it and give feedback! Just message me or like this post and I will send it! Thanks! 🙂 (edited)
randomaccess 4/14/2023 2:05 AM
I did something along those lines if you want a reference for the older version of the app https://thinkdfir.com/2019/01/11/what-did-i-listen-to-on-spotify-for-ios/
I had a recent examination where I was asked what music was someone listening to at a point in time on an iOS device. Here’s what I found! (TLDR at the bottom)
👍 2
Avatar
Avatar
Panda
Hello! I am currently writing my dissertation for my bachelor degree in digital forensics. I done a analyze of the application Spotify on iOS where I located where data is stored and what kind of data you can find. I have written a walkthrough of the data I was able to find. I am now looking for people that wants to take a look at the this guide, you can test it yourself and compare or just have a look at it and provide feedback on your opinion. This is a marking criteria so I really appreciate everyone that wants to take a look at it and give feedback! Just message me or like this post and I will send it! Thanks! 🙂 (edited)
randomaccess 4/14/2023 2:06 AM
This may be something you can get dfirreview to help with. @b1n2h3x may have an opinion here
Avatar
Avatar
randomaccess
This may be something you can get dfirreview to help with. @b1n2h3x may have an opinion here
Thanks @randomaccess . @Panda, if you are looking to@share it and have it peer reviewed - DFIRReview is a great choice. But the process at this point may not be complete for your end of term. DM me and we can discuss
📫 1
Avatar
Anyone have any classified documents they can share? Asking for a friend....
Avatar
Avatar
Tim F
Anyone have any classified documents they can share? Asking for a friend....
I’m all out at the moment. Any of them I had are already in the public domain. 😕
🫥 5
Avatar
@Cellebrite Anyone know what this error is.? I have some colleagues that are accessing UFDRs via a VM and network storage, its been working fine previously, but now they are getting the above error. Anyone know if there is a simple solution or should they open a support ticket?
Avatar
Avatar
Majeeko
@Cellebrite Anyone know what this error is.? I have some colleagues that are accessing UFDRs via a VM and network storage, its been working fine previously, but now they are getting the above error. Anyone know if there is a simple solution or should they open a support ticket?
Any time there are exception errors like this would be best to go through support.
Avatar
Avatar
CLB-Paul
Any time there are exception errors like this would be best to go through support.
Thanks Paul, I will suggest that to them.
Avatar
static_idle 4/14/2023 9:47 AM
Does anyone here use Azure Sentinel and actually like it?
Avatar
Deleted User 4/14/2023 11:34 AM
Ey, are there any ways of extracting contents of a .wim file?
Avatar
Avatar
Deleted User
Ey, are there any ways of extracting contents of a .wim file?
Digitalferret 4/14/2023 12:04 PM
mount it?
Avatar
Deleted User 4/14/2023 12:30 PM
Yeah figured a minute after I sent the msg
🙂 1
Avatar
Avatar
static_idle
Does anyone here use Azure Sentinel and actually like it?
Yes and no. Lol
Avatar
usermobiles 4/15/2023 6:32 AM
Current challenges in digital forensics
Avatar
Avatar
usermobiles
Current challenges in digital forensics
Storage space for extractions from modern digital devices.
👍 2
Avatar
⭐Jigglypuff⭐ 4/15/2023 10:22 AM
10:22 AM
Wtf?
10:23 AM
Lmao
Avatar
You’re on a list
2:51 PM
🤣
Avatar
Avatar
tost
The data is from the com.apple.wifi.known-networks.plist Time stamp is May 2020. The last connection time stamp is from march 2021 and the last automatically connection from march 2023. Perhaps there must have been a sync. It is local time UTC+2 (edited)
In the plist does it have an ‘AddReason’ key? If it’s an iCloud sync it should say ‘Cloud Sync’.
Avatar
dabeersboys 4/15/2023 6:20 PM
Any of my fellow forensic homies going to the @Magnet Forensics User Summit this week?!?!
Avatar
Patrick.Beaver 4/15/2023 6:25 PM
See you there!
Avatar
Avatar
dabeersboys
Any of my fellow forensic homies going to the @Magnet Forensics User Summit this week?!?!
See ya Monday!
Avatar
Avatar
Patrick.Beaver
See you there!
dabeersboys 4/15/2023 6:28 PM
Looking forward to your Oculus presentation Patrick!
magnetforensics 1
👍 1
Avatar
⭐Jigglypuff⭐ 4/15/2023 7:18 PM
@Tim F I asked your company to give me a trial of your product since I’m a student
7:18 PM
They refused
7:18 PM
So sad
7:19 PM
Not very student friendly of them 🐶
7:20 PM
I was planning to use it for my final project this semester
Avatar
dabeersboys 4/15/2023 8:26 PM
DMd you @⭐Jigglypuff⭐
Avatar
Avatar
⭐Jigglypuff⭐
Not very student friendly of them 🐶
Deleted User 4/15/2023 10:24 PM
Never occurred to you there was a valid business reason.
Avatar
Avatar
⭐Jigglypuff⭐
I was planning to use it for my final project this semester
DeeFIR 🇦🇺 4/15/2023 10:40 PM
Perhaps a better approach would have been to compile a list of appropriate tools, approach the vendors for a trial license with a use case (and highlight the benefits for them instead of just your own project), then select a tool? For what it's worth, many of us have dealt with Magnet staff and requested trial licenses for CTFs, personal projects, etc, and they've always been friendly and helpful. Perhaps there was a miscommunication which resulted in your request being denied..
this 7
Avatar
Avatar
rojo
In the plist does it have an ‘AddReason’ key? If it’s an iCloud sync it should say ‘Cloud Sync’.
Thanks for the answer. I have to look on monday when i am back in office.
👍 1
Avatar
Avatar
⭐Jigglypuff⭐
@Tim F I asked your company to give me a trial of your product since I’m a student
Digitalferret 4/16/2023 2:13 AM
dude, that smacks to me of trying to shame a co in public. please don't do it again. if you get a refusal from anyone here, please take it gracefully and accept it or communicate your displeasure directly
💯 4
👍 1
Avatar
Avatar
⭐Jigglypuff⭐
@Tim F I asked your company to give me a trial of your product since I’m a student
Yuri Gubanov (Belkasoft) 4/16/2023 3:09 AM
request ours 🙂 https://belkasoft.com/trial and put your academic email
Avatar
If you haven't seen it yet: see the video of Micah Sturgis of Barefoot Professional Investigations testimony relating to the forensic analysis of iOS smartphone's functionality in the Alex Murdaugh case. As it involves iOS it is always worth noting the tech points to see if they cross-correlate with a number of iOS forensic examination books out there. https://rumble.com/v2ba18c-alex-murdaugh-trial-micah-sturgis-defense-cellphone-expert.html
Trial: Alex Murdaugh Double Homicide Testimony: Cellphone forensic expert witness for the defense Micah Sturgis.
Avatar
⭐Jigglypuff⭐ 4/16/2023 9:12 AM
Thank you @Yuri Gubanov (Belkasoft)
9:12 AM
I appreciate it
9:19 AM
Is there anyone in cyber security field here rather than digital forensics?
9:19 AM
I’m graduating in a month and I can’t decide what to pursue yet
9:19 AM
I find cyber security fascinating but digital forensics is fun too
Avatar
Hey all, I am trying to find an image that has zoom data on it for my forensics class, can anyone help me? I tried to image my own phone but no joy..
Avatar
Avatar
⭐Jigglypuff⭐
Is there anyone in cyber security field here rather than digital forensics?
cosmicthrill 4/16/2023 11:11 AM
My undergrad was Digital forensics but I’ve been working on a red team for the past few years
Avatar
Avatar
⭐Jigglypuff⭐
I find cyber security fascinating but digital forensics is fun too
Generally speaking there will be overlap. If you enjoy more policy making and security process development with threat intel collection and that sort of stuff it’s more in the cyber security area; but so is red team stuff. You can be hands on in both but forensics more so usually.
11:33 AM
It’s worth learning enough about both that you find a clear winner for yourself.
Avatar
⭐Jigglypuff⭐ 4/16/2023 3:09 PM
I really wanted to work for the US government but me being a dual citizen is a jeopardy. My family still resides in Turkey. @mooseous
3:10 PM
I was talking to my professor and he said it would be difficult for me to work in NSA considering I still have connections in Turkey
Avatar
A ton of government positions allow for dual citizens or non citizens on visas even
Avatar
⭐Jigglypuff⭐ 4/16/2023 3:10 PM
Isn’t it dangerous tho? What if Turkish government tried to hurt my family cuz I work for The US government
Avatar
Just not a lot of the positions that deal with certain information or have certain authority
3:11 PM
I’m not sure about the politics of Turkey specifically. My impression is that they wouldn’t care and you should use discretion either way about that kind of work.
Avatar
⭐Jigglypuff⭐ 4/16/2023 3:11 PM
I know NSA CIA and FBI are desperately looking for Turkish speaking agents (edited)
Avatar
It would be an issue if any of your family holds positions there though, depending on the work you’re looking to do.
3:12 PM
I think every agency in every nation just about are looking for multilingual people who want to help.
this 1
Avatar
⭐Jigglypuff⭐ 4/16/2023 3:12 PM
Yeah
3:12 PM
NSA has this lie detector test I heard
3:12 PM
My friends told me horror stories about NSA hiring process
3:13 PM
Like how they ask you if you downloaded music illegally
Avatar
I’d be wary of anyone claiming to know the process and also those disclosing it.
3:14 PM
Generally people don’t talk about the things.
Avatar
⭐Jigglypuff⭐ 4/16/2023 3:14 PM
Maybe they are lying?
3:15 PM
I’m not sure tho
Avatar
They might be or they might know someone who claimed to know.
Avatar
⭐Jigglypuff⭐ 4/16/2023 3:15 PM
Oh damn
Avatar
It’s also possible they were simply a contractor.
3:15 PM
A lot of people glorify the idea of working at NSA because they want to seem as if they have access
3:15 PM
All that does is endanger them honestly, which is why discretion is usually asked for or preferred.
Avatar
⭐Jigglypuff⭐ 4/16/2023 3:16 PM
I agree
3:16 PM
I would like to work for government
3:16 PM
But people scared me off
3:16 PM
Told me if I ever downloaded illegal music as a youngester, stay away (edited)
Avatar
I wouldn’t even tell people you’re interested, or rather which agencies you’re interested in specifically
Avatar
⭐Jigglypuff⭐ 4/16/2023 3:18 PM
I know! I was confused that people shared that information in classroom setting @mooseous
3:19 PM
Like one girl in my class said everyone that she was interning in FBI
3:19 PM
I was like hmm. I thought you weren’t supposed to disclose
3:20 PM
I’d rather keep it secret if I ever get hired
3:21 PM
Also since you are here, @mooseous do you happen to know any free software that does RAID reconstruction? I don’t know the parameters of the RAID but I need to reconstruct a RAID to use it as an image
Avatar
Unfortunately I don’t, I’m more on the intelligence side of things. OSINT is my jam.
Avatar
⭐Jigglypuff⭐ 4/16/2023 3:22 PM
What’s that?
3:22 PM
Oh wow
3:23 PM
I just googled it
3:23 PM
It’s cool
3:23 PM
It looks very complex tho
3:23 PM
🤔
3:23 PM
3:23 PM
Looks like you need to know both cyber security and digital forensics
Avatar
Avatar
medusa
Hey all, I am trying to find an image that has zoom data on it for my forensics class, can anyone help me? I tried to image my own phone but no joy..
Andrew Rathbun 4/16/2023 6:15 PM
A mobile image? Have you checked the images made by @CLB_joshhickman1?
Avatar
Avatar
⭐Jigglypuff⭐
Like how they ask you if you downloaded music illegally
Andrew Rathbun 4/16/2023 6:17 PM
Anyone who says they've not is either lying or has been cryogenically frozen the past 3 decades. If the government cared that much about people downloading music illegally, the government would have no staff. Rather, it's the largest employer in the US. I have a TS clearance through my time at the US government and I don't recall ever being asked about downloading music
💯 1
Avatar
⭐Jigglypuff⭐ 4/16/2023 6:51 PM
Thanks for clarification @Andrew Rathbun
6:51 PM
That was one of the reasons I was hesitant about applying for government positions
6:51 PM
I’ve been literally driven away
6:54 PM
I am a double major student. I am also finishing my Data Science with ML/AI bachelor's degree along with my Digital Forensics degree. I also got minors in Statistics and Information Systems Analytics
6:54 PM
It's been a tough 5 years
6:54 PM
I am hoping to land a job upon graduation
6:54 PM
I also have a bachelor's in Linguistics
6:54 PM
lol
6:59 PM
Im proficient in Python and R and upper intermediate in Java as well
6:59 PM
per required by my degrees
6:59 PM
😄
Avatar
Avatar
⭐Jigglypuff⭐
I’ve been literally driven away
There is no reason to avoid applying for any job, pretty much ever anywhere, unless there is a cost involved in applying.
7:38 PM
You either get it, or you don't. It helps you understand and become familiar with any processes, too.
Avatar
⭐Jigglypuff⭐ 4/16/2023 7:38 PM
I hope to combine both of my digital forensics and data science skills
Avatar
Never tell yourself your not qualified for a job either. You may miss out on a great opportunity.
Avatar
Applying for jobs is a skill just like any other skill. You can be the most qualified applicant in the world but if you don’t know how to communicate that to get past the HR firewall you won’t get hired. Keep trying and keep applying and one day they will say yes.
👍 1
Avatar
Does anyone use native arch linux with virtualbox? Happens that with the latest lts kernel updates all VMs get stuck at 20% of starting process… Someone experienced that and has a workaround? (edited)
Avatar
Avatar
rojo
In the plist does it have an ‘AddReason’ key? If it’s an iCloud sync it should say ‘Cloud Sync’.
The add reason is „Wifi settings“. There are no information with „cloud“ in the plist. But this information not important anymore. I have the information that i have needed. But thanks for your idea. (edited)
👍 1
Avatar
Avatar
⭐Jigglypuff⭐
That was one of the reasons I was hesitant about applying for government positions
Andrew Rathbun 4/17/2023 12:18 AM
The answer is no if you don't apply
this 2
Avatar
Digitalferret 4/17/2023 12:18 AM
you are guaranteed to miss every goal you don't take a shot at - kinda thing
Avatar
@Cellebrite anyone available for a PM regarding one of your tools?
📩 1
Avatar
Avatar
Tommy
Does anyone use native arch linux with virtualbox? Happens that with the latest lts kernel updates all VMs get stuck at 20% of starting process… Someone experienced that and has a workaround? (edited)
@Tommy, try turning of indirect branch tracking in the kernel at boot (ibt=off). This might work depending on your CPU (later model Intel). I had the same happen with one of my Slackware machines using a custom kernel. (edited)
Avatar
Avatar
5cary
@Tommy, try turning of indirect branch tracking in the kernel at boot (ibt=off). This might work depending on your CPU (later model Intel). I had the same happen with one of my Slackware machines using a custom kernel. (edited)
👍 will try it out - thanks!
Avatar
Avatar
⭐Jigglypuff⭐
Told me if I ever downloaded illegal music as a youngester, stay away (edited)
Hi, I'm new to this disc. I think someone may have severely mislead you on this particular point. Some people here probably know what I mean when I say, I think you'd be surprised, and I hope that encourages you to apply to govt. positions because they need good people. Have a great day guys
Avatar
Anyone have issues with Axiom not exporting all the items from Media Explorer that you've selected? I've noticed, even unstacked, that the number of Matching Results and the number I get after I export are not equal. Additionally, when I export an MP4, DMG, or other video file, I only get a .jpg of that item.
Avatar
Avatar
⭐Jigglypuff⭐
Told me if I ever downloaded illegal music as a youngester, stay away (edited)
Yeah definitely don't worry about this. I have engaged in more questionable things than piracy in the past, but for gov positions that require a clearance, they generally only care that you're honest about it, that it's in the past, that you're trustworthy and reliable now, and that you can't be blackmailed or manipulated. (edited)
Avatar
⭐Jigglypuff⭐ 4/17/2023 11:51 AM
Indeed thanks a lot @v3izy
11:52 AM
I feel more confident to apply government positions now
11:52 AM
I recently became a us citizen too
11:52 AM
So I can get all the clearance I need 😂
11:54 AM
I just had my mock testimony for my digital forensics class. Those testimonies get me nervous 😬
Avatar
Avatar
⭐Jigglypuff⭐
Indeed thanks a lot @v3izy
Get used to testifying if you're going to do this for LE! 😆
Avatar
⭐Jigglypuff⭐ 4/17/2023 12:44 PM
Are there other departments where I can do more like red hat stuff? @Leonidas
12:44 PM
Rather than testifying
Avatar
Avatar
⭐Jigglypuff⭐
Are there other departments where I can do more like red hat stuff? @Leonidas
Not sure, I'd assume some intelligence agencies, CIA or NSA.
Avatar
⭐Jigglypuff⭐ 4/17/2023 12:46 PM
I see
12:46 PM
I’m going to invite my college professor here
12:47 PM
He was really interested in this server
12:47 PM
Do you guys allow teachers in this server? @Andrew Rathbun
12:48 PM
Disregard my question I apologize
12:48 PM
I see you do
Avatar
Avatar
⭐Jigglypuff⭐
Do you guys allow teachers in this server? @Andrew Rathbun
Yep
Avatar
indianadmin 4/18/2023 5:25 AM
Are there any frameworks relating to digital forensics? Assuming ISO 27001 covers most of it.
5:30 AM
If I have to advise someone to keep logs for a particular period, or ask them to keep various types of logs, I would like to match it to sections as per the framework
Avatar
Avatar
indianadmin
Are there any frameworks relating to digital forensics? Assuming ISO 27001 covers most of it.
JLindmar (83AR) 4/18/2023 5:30 AM
ISO/IEC 17025 covers quality management in forensic testing laboratories, then you've got 27037, 27038, 27040, 27041, 27042, 27043, 30121, and 27050 that all cover DF in some aspect. What kind of "logs" are you thinking? Most likely 17025 would cover that. If you can give me specifics I can point you to a particular section. (edited)
Avatar
indianadmin 4/18/2023 5:53 AM
As a company, I want to know what are the best practices that should be followed so that any forensic analysis is possible. For example, I can mandate that critical applications provide authentication logs to the SIEM within 15 minutes. Similarly windows servers should provide event logs among other things for a minimum of 6 months or whatever the period is as per the appropriate standard. Firewall logs should be kept for a max of 1 year.
Avatar
Avatar
⭐Jigglypuff⭐
I am a double major student. I am also finishing my Data Science with ML/AI bachelor's degree along with my Digital Forensics degree. I also got minors in Statistics and Information Systems Analytics
chadbrewbaker 4/18/2023 5:58 AM
You can always be like Halvarflake and go into performance engineering - exact same skill set, just hunting for why code is running slow.
Avatar
Avatar
indianadmin
Are there any frameworks relating to digital forensics? Assuming ISO 27001 covers most of it.
RE the ISO 27K standards that @JLindmar (83AR) referenced, this site gives a good rundown of each: https://www.iso27001security.com/html/27050.html
🫡 1
Avatar
Has anyone heard of Magellan Research group? Research firm reached out to me paid compensation to share my knowledge of Cellebrite, GreyShift and AccessData…not going to do to it, seems fishy. But curious if anyone else got it.
Avatar
Does anyone know life examples using hardware implant like LAN Turtle? Cases from 2022 will be ideal.
Avatar
Avatar
Jobbins
Has anyone heard of Magellan Research group? Research firm reached out to me paid compensation to share my knowledge of Cellebrite, GreyShift and AccessData…not going to do to it, seems fishy. But curious if anyone else got it.
Sounds like some business is paying to research the competition ?
Avatar
⭐Jigglypuff⭐ 4/18/2023 10:00 AM
Hello everyone
10:01 AM
Happy Tuesday!
Avatar
Android question: Is it possible to configure the DND profile to let "Unknown caller ID" pass through, like stared contacts? I haven't found any solution to this on Google and if its possible
Avatar
Does anyone know how to unblur this image, especially the text on it?
Avatar
Avatar
bill15025
Does anyone know how to unblur this image, especially the text on it?
Deleted User 4/18/2023 11:41 AM
I can’t find it right now but dig around on GitHub. There was a repo on there that had a tool that did interpolation with blurred text. However I think only an act of god could recover the text from this image.
Avatar
Restoration of defocused and blurred photos/images - GitHub - Y-Vladimir/SmartDeblur: Restoration of defocused and blurred photos/images
👍 2
Avatar
Thanks, I will try this
Avatar
Anyone here ever play around with pci-leech or TPM sniffing? I've always been curious but never took the plunge. I understand that specialized equipment may be necessary
Avatar
I remember seeing that article about sniffing the private key from a TPM a year or two back
12:29 PM
As far as I’m aware it’s feasible but highly technical
Avatar
I was hoping by now there would be a little snap-on "hat" for the chip. I thought I remembered seeing such a device but it may have just some kind of fever dream
Avatar
If you ever find that please let me know 👀
this 1
Avatar
It depends on the motherboard
1:56 PM
but ftpm prevents that
1:58 PM
I always meant to give it a try with used hardware, you mostly need a digital logic analyzer (like a saleae, but there are cheaper clones and lower spec offerings) (edited)
Avatar
wh1sper 🍃 4/18/2023 2:01 PM
Hi, I have a query regarding Windows OS Forensics course I enrolled on Coursera, My query is that some videos refers to MBR.vhd and GPT.vhd files but there are no links mentioned to download the images from in the platform ( I believe because the course originally belongs to InfoSecinstitute and they will be having links on their website ( which I don't have membership of )) If anyone here has completed this course, please reach out to me, or direct me in the right direction....
SPOILER
Image attachment
Avatar
Avatar
Jobbins
Has anyone heard of Magellan Research group? Research firm reached out to me paid compensation to share my knowledge of Cellebrite, GreyShift and AccessData…not going to do to it, seems fishy. But curious if anyone else got it.
randomaccess 4/18/2023 2:06 PM
I feel like I have. Possibly they run surveys on behalf of other companies (like the various vendors on this channel)
Avatar
Digitalferret 4/18/2023 2:09 PM
im so bad, i was thinking thats got to be an inkblot behind the [Spoiler] mask 🙂
😅 1
Avatar
Avatar
wh1sper 🍃
Hi, I have a query regarding Windows OS Forensics course I enrolled on Coursera, My query is that some videos refers to MBR.vhd and GPT.vhd files but there are no links mentioned to download the images from in the platform ( I believe because the course originally belongs to InfoSecinstitute and they will be having links on their website ( which I don't have membership of )) If anyone here has completed this course, please reach out to me, or direct me in the right direction....
Why not just ask either Coursera or InfoSecInstitute regarding the vhd files?
Avatar
Avatar
chauan
Why not just ask either Coursera or InfoSecInstitute regarding the vhd files?
wh1sper 🍃 4/18/2023 3:04 PM
yups, already doing it but its taking time 🙃
Avatar
⭐Jigglypuff⭐ 4/18/2023 8:50 PM
I managed to run tensorflow on M2
8:50 PM
Impressive
Avatar
@ICAC I was having a conversation at work today about the potential (inevitability?) of AI generated CSAM. I know current publicly available image generators have some safeguards implemented but at some point the floodgates are going to open on that stuff. Beyond the issue of prosecuting simulated CSAM, what are your thoughts on articulating genuine vs "simulated" CSAM in those locations where simulated has not been criminalized? Are there tools to reliably check for hallmarks of AI generated images?
Avatar
Avatar
whee30
@ICAC I was having a conversation at work today about the potential (inevitability?) of AI generated CSAM. I know current publicly available image generators have some safeguards implemented but at some point the floodgates are going to open on that stuff. Beyond the issue of prosecuting simulated CSAM, what are your thoughts on articulating genuine vs "simulated" CSAM in those locations where simulated has not been criminalized? Are there tools to reliably check for hallmarks of AI generated images?
Photorealistic images of CSAM are already available, and have been for some time. No AI needed. The answers to your questions of how it will be criminalized can be answered by looking for instances of those cases.. if you can find any. Everyone who’s ever had a federal CSAM case knows that it ultimately depends on the district it’s prosecuted in. Some take it more seriously than others. I think some very few tools have started trying to detect fakes, but not at the scale and volume of the numerous AI generators. Detection reliability will probably depend on which version of AI it can keep up with.
Avatar
Avatar
whee30
@ICAC I was having a conversation at work today about the potential (inevitability?) of AI generated CSAM. I know current publicly available image generators have some safeguards implemented but at some point the floodgates are going to open on that stuff. Beyond the issue of prosecuting simulated CSAM, what are your thoughts on articulating genuine vs "simulated" CSAM in those locations where simulated has not been criminalized? Are there tools to reliably check for hallmarks of AI generated images?
It’s also important to remember that even though the images are not real CSAM (and May not be subject to CSAM laws), it’s still considered obscene material. Which are different but very similar laws with very similar penalties. They are not frequently prosecuted because they’re less prioritized, however maybe this will be a popular avenue for prosecutors going forward who are worried about whether the “fake” argument will hold. Obviously this all only applies to the USA. (edited)
Avatar
@MeGaBiTe @whee30 Federal statues statues state that any images depicting CSAM is illegal even if there is no real victim. That being said even as a federal ICAC investigator I have had issues with prosecution being very weary of pushing this subsection if there is not a real victim due to differences in judges and locations. It however is often used in sentencing to show patterns of behavior.
💯 1
Avatar
For those UK prosecution and defence experts who are concerned that as single-person businesses (SPBs) or Small to Medium Sized Enterprises (SMEs) who consider that by October 2023 can be excluded from giving or comments on evidence if not registered which requires compliance to ISO17025. I have produced a draft for comment so that it can be raised again, if not to the FSR then maybe the Law Society and/or Bar Council. I am not driving this work merely comments upon posts I keep seeing about the lost or closure for service from SPBs and SMEs.
Avatar
Avatar
whee30
@ICAC I was having a conversation at work today about the potential (inevitability?) of AI generated CSAM. I know current publicly available image generators have some safeguards implemented but at some point the floodgates are going to open on that stuff. Beyond the issue of prosecuting simulated CSAM, what are your thoughts on articulating genuine vs "simulated" CSAM in those locations where simulated has not been criminalized? Are there tools to reliably check for hallmarks of AI generated images?
kmacdonald1565 4/19/2023 6:36 AM
Lets be honest, while reviewing this material, are you examining it that closely to pinpoint that it is fake(AI generated)? Particularly with images, determining one is fake is going to take a high level of scrutiny and most of the time, it is not just a one image case. Playing the odds/statistics, most people who deal with CSAM wouldn't even know (or care for its use purpose) they have a fake image anyway and will likely be contained with actual CSAM. I get it is not optimal for all of us, depending on jobs and roles within those jobs, but part of building the case is finding the CSAM forensically, suspect interview/interrogation, gathering info from NCMEC (cybertip, victim identification, etc.), if applicable p2p information, and so on. Many of the times we are put on to suspects is because of identified CSAM, or a tip that was believed to be CSAM which can be relatively scrutinized ahead of a warrant. But it cannot be understated the importance of getting suspect statements on what the suspect thinks of the material he/she views. obviously a defense attorney can take their time, hire an expert and try to dispute every image. 1. the suspect statement very much goes to state of mind which is hard to counter, especially when genuine images exist 2. disputing every image looks really bad to the jury when your saying "hey this kid getting assaulted is just pretend" as they show the images 3. some state laws don't need to differentiate. i can tell you from my own cases, we had underage victims photoshopped to be made into CSAM and that qualifies as manufacturing CSAM in my state, which is where i would advise my prosecutors to argue AI generated CSAM. My state is more the purpose behind the picture, than the picture solely by itself. a recent appeals case basically said that erotica does not equal CSAM however the law still has the ability to be interpreted as erotica is CSAM when it is with CSAM. it is absolutely new territory but i feel not much will change
Avatar
@Arman Gungor - Can I DM you a question about FEC ?
Avatar
forensicres 4/19/2023 9:10 AM
From your experience, which digital forensic case management system would use for a small lab? From my initial research it seems that Monolith, xBit and Lima are the main players. Thanks.
Avatar
Avatar
Jay528
@Arman Gungor - Can I DM you a question about FEC ?
Arman Gungor 4/19/2023 5:03 PM
Sure!
Avatar
Avatar
Arman Gungor
Sure!
I sent an email and you answered already. Thank you !
👍🏻 1
Avatar
Avatar
forensicres
From your experience, which digital forensic case management system would use for a small lab? From my initial research it seems that Monolith, xBit and Lima are the main players. Thanks.
Matt - Monolith Forensics 4/19/2023 5:56 PM
Plus 1 for Monolith, but I’m a little biased haha. Sign up for a trial on our website and you can take Monolith for a spin.
👍🏻 1
Avatar
Hi all! I'm searching a in-depth course or resources about digital image/video forensics. Deepfakes (but not only), tampered videos, this kind of things. Any advice? Thanks!
Avatar
Avatar
yeoj112689
@MeGaBiTe @whee30 Federal statues statues state that any images depicting CSAM is illegal even if there is no real victim. That being said even as a federal ICAC investigator I have had issues with prosecution being very weary of pushing this subsection if there is not a real victim due to differences in judges and locations. It however is often used in sentencing to show patterns of behavior.
Andrew Rathbun 4/20/2023 4:51 AM
Conversations like this are why I'm so glad we split out all LE roles by country 🙏
Avatar
Avatar
Tesven
Hi all! I'm searching a in-depth course or resources about digital image/video forensics. Deepfakes (but not only), tampered videos, this kind of things. Any advice? Thanks!
melissa_at_amped 4/20/2023 6:58 AM
Hey! I'll send you a DM!
Avatar
Avatar
whee30
Anyone here ever play around with pci-leech or TPM sniffing? I've always been curious but never took the plunge. I understand that specialized equipment may be necessary
I've done TPM sniffing for bitlocker successfully once via a saleae logic analyzer. The TPM was a QFN package that I couldn't solder to, so I hooked into an SOIC8 chip that was also on the SPI bus. They do sell a clip for this. I'd had no prior experience with a logic analyzer, so there was a lot of trial and error with settings, but I eventually was able to pull out the bitlocker key successfully. There are a few good writeups online that show 95% or so of the process. I also have a lattice icestick to attempt via the LPC bus, but haven't found the time to muddle my way through that method. I also tried 3d printing a clip for a TSSOP TPM package, but had trouble with keeping the pin channels from staying clear of resin. It was a low-priority side project, so I didn't keep at it.
💯 1
🔥 1
Avatar
Avatar
Tesven
Hi all! I'm searching a in-depth course or resources about digital image/video forensics. Deepfakes (but not only), tampered videos, this kind of things. Any advice? Thanks!
The Advanced Video Forensics Course (AVF) is a five-day course designed to give investigators, forensic examiners and analysts a deep understanding of
sales@medexforensics.com | 1-917-522-4852 Increase your team's expertise in digital video investigations Medex offers certification and training in basic and advanced digital video authentication and provenance examination, including source detection and modification analysis. Medex Forensics understands that complex digital video files can gene...
❤️ 1
Avatar
Dr.Who-IACIS 4/20/2023 11:24 AM
Anyone attending IACIS BCFE for the first time in just a few days? If you see me, stop me and say Hi. I'm a row coach again this year. (edited)
💯 3
Avatar
Any Symantec Endpoint Security Users?
11:25 AM
If usb is blocked and files are deleted from it, will it still show mounted device in registry?
Avatar
Andrew Rathbun 4/20/2023 12:01 PM
@Beercow might be able to provide some expertise
Avatar
Avatar
Jobbins
If usb is blocked and files are deleted from it, will it still show mounted device in registry?
Not sure on that one. Are you trying to figure out what usb it was that was plugged in?
Avatar
Hello all, I have what is probably an easy one for many of you, but I have not been able to find a solution. I do ediscovery but also conduct audits for things like possible HIPAA breaches. I am wondering if there is an open source and free tool that can parse/filter audit logs efficiently. Or even aggregate the audit logs? Or any free open source tool that you may think would be helpful? Any and all advice is much appreciated! I am up to my nose in audit logs!
Avatar
Avatar
dozadown
Hello all, I have what is probably an easy one for many of you, but I have not been able to find a solution. I do ediscovery but also conduct audits for things like possible HIPAA breaches. I am wondering if there is an open source and free tool that can parse/filter audit logs efficiently. Or even aggregate the audit logs? Or any free open source tool that you may think would be helpful? Any and all advice is much appreciated! I am up to my nose in audit logs!
JLindmar (83AR) 4/20/2023 12:59 PM
If the logs are normalized, perhaps Microsoft's Log Parser?
Avatar
Thank you Jlindmar! I will look this up now!
Avatar
Avatar
dozadown
Thank you Jlindmar! I will look this up now!
Download this ETL log parser for automated SQL querying any text based data or system logs like Web Server logs, Windows System Events and application log files.
Avatar
Hey everyone, got a quick iPhone question. I have a photo with significant evidentiary value. I have several factors that indicate the photo was taken with the device it was recovered from including exif info matching, filename sequence, os version etc. I need to get as close to 100 percent sure the photo was taken with that phone as I can. The photo was stored in the usual location photos from the devices camera are stored. My question is, if you receive a phot as an attachment or through social media, is the end user able to store the photo to the photo directory on iOS? Or does apple only allow you to store it in a certain location. I know with android you can specify where you want to save files when you download them.
Avatar
Avatar
Neon
Hey everyone, got a quick iPhone question. I have a photo with significant evidentiary value. I have several factors that indicate the photo was taken with the device it was recovered from including exif info matching, filename sequence, os version etc. I need to get as close to 100 percent sure the photo was taken with that phone as I can. The photo was stored in the usual location photos from the devices camera are stored. My question is, if you receive a phot as an attachment or through social media, is the end user able to store the photo to the photo directory on iOS? Or does apple only allow you to store it in a certain location. I know with android you can specify where you want to save files when you download them.
CLB-dan.techcrime 4/20/2023 2:16 PM
Check out PRNU forensics if you have the energy and time (and $$$ to buy sample devices)
Avatar
Avatar
CLB-dan.techcrime
Check out PRNU forensics if you have the energy and time (and $$$ to buy sample devices)
Oh that's neat I'll learn about this . I was hoping the answer would be you couldn't save downloads to DCIM though
Avatar
Avatar
Neon
Oh that's neat I'll learn about this . I was hoping the answer would be you couldn't save downloads to DCIM though
CLB-dan.techcrime 4/20/2023 2:22 PM
Basically in simple terms, you buy 9 matching iPhones and take sample pictures and do PRNU on 10 pictures from each phone and then do the same with 10 existing photos on the evidence device... defect pixels in the camera sensors will appear in the same location on each of the pictures... then testify that the chance of the same random pixel appearing in the same location on a different phone is essentially impossible (edited)
Avatar
Avatar
CLB-dan.techcrime
Basically in simple terms, you buy 9 matching iPhones and take sample pictures and do PRNU on 10 pictures from each phone and then do the same with 10 existing photos on the evidence device... defect pixels in the camera sensors will appear in the same location on each of the pictures... then testify that the chance of the same random pixel appearing in the same location on a different phone is essentially impossible (edited)
Yeah thats pretty neat. I've never even thought about that being possible
2:25 PM
It makes sense though
Avatar
Thank you Beercow and Jlindmar! I really very much appreciate it! I am checking these all out tonight!
Avatar
Avatar
Neon
Yeah thats pretty neat. I've never even thought about that being possible
I will note that if you have the questioned device to create exemplars from for PRNU analysis it may not require many other exemplars. Will also say that PRNU has gotten more difficult lately as cell phones employ more digital processing of images which reduces the sensor pattern noise relied on by PRNU. Not saying not to try, just mentioning for context.
Avatar
Avatar
Brandon E
I will note that if you have the questioned device to create exemplars from for PRNU analysis it may not require many other exemplars. Will also say that PRNU has gotten more difficult lately as cell phones employ more digital processing of images which reduces the sensor pattern noise relied on by PRNU. Not saying not to try, just mentioning for context.
We don't deal with this very often, we wouldn't have much use for it. It is a cool technology though. I wasn't even aware it existed. Now I'm going to go down a rabbit hole of learning
SBcyberCop started a thread. 4/20/2023 4:04 PM
Avatar
Avatar
Beercow
Not sure on that one. Are you trying to figure out what usb it was that was plugged in?
Yeah - didn’t see it under mounteddevices. But did find the guid in the alert then matched the guid to a drive in USBStor
Avatar
Avatar
Jobbins
Yeah - didn’t see it under mounteddevices. But did find the guid in the alert then matched the guid to a drive in USBStor
I was going to mention that. If you ever need a tool to parse the logs on the endpoint. https://github.com/Beercow/SEPparser
Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database. - GitHub - Beercow/SEPparser: Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.
8:11 PM
This post contains information on my research into Symantec Endpoint Protection logs, quarantine, and ccSubSDK files. Content will be update...
Avatar
Avatar
Beercow
I was going to mention that. If you ever need a tool to parse the logs on the endpoint. https://github.com/Beercow/SEPparser
Awesome, thank you!
Avatar
Getting real sick of Meta suspending my test accounts. They’ve closed down 3 out of 5 of them I was going to use for validation testing. Any one have any idea how to prevent this from occurring?
Avatar
Avatar
obi95
Getting real sick of Meta suspending my test accounts. They’ve closed down 3 out of 5 of them I was going to use for validation testing. Any one have any idea how to prevent this from occurring?
Are you using a VPN ? (edited)
Avatar
Avatar
DCSO
Are you using a VPN ? (edited)
Nope just using normal WiFi uploaded 1 picture and followed 3 accounts and didn’t even message anyone or anything yet
Avatar
Avatar
obi95
Nope just using normal WiFi uploaded 1 picture and followed 3 accounts and didn’t even message anyone or anything yet
It might be associating your IP address to Gov or state agency and booting you, just a random guess. Try using a VPN or covert line.
Avatar
Can anyone please give me some guidance how to find the real name of user of this twitter account :https://twitter.com/jeiffara36503?t=quGmJabhjktiOCf-fZSMnw&s=09 Thanks guys, any hint how to achive this will help 🙌
Avatar
Avatar
Snofear
Can anyone please give me some guidance how to find the real name of user of this twitter account :https://twitter.com/jeiffara36503?t=quGmJabhjktiOCf-fZSMnw&s=09 Thanks guys, any hint how to achive this will help 🙌
Digitalferret 4/21/2023 2:51 PM
how would you do that if even Twitter don't check for real names? unless you can bring legals to bear and start chasing down IP addresses, (private hidden) mobile numbers etc (edited)
2:52 PM
i mean, you could always mention them and ask, but if they aren't wanting to be known ... /shrug (edited)
Avatar
Twitter will not reveal information unless via a legal request possibly only from LE and even then its possibly for someone to use a false name.
Avatar
Wrote a script that converts the RDSv3 .db files into RSD 2.xx Text File Format if anyone is interested. #deleted-channel
👍 1
Avatar
Avatar
Digitalferret
i mean, you could always mention them and ask, but if they aren't wanting to be known ... /shrug (edited)
Yes i know that... it is a challenge for CTF event
Avatar
Asking for a friend. What can I do to sort per conversation group and extract text from screenshots if there are 1) too many screenshots 2) multiple groups and 3) DB contained no messages at all...
3:08 PM
I know manually sort and OCR works...but wanna know if there is a easier way...🧐
3:09 PM
Screenshots are mixed of WhatsApp/SMS/Messenger
Avatar
Avatar
Snofear
Yes i know that... it is a challenge for CTF event
Digitalferret 4/21/2023 3:15 PM
you might have said. what other info have you? and #challenges-and-ctfs would be the place (edited)
Avatar
Snofear I would run the username through dehashed, spiderfoot, and maltego to see if you get any hits. May not show anything... But...you never know
3:42 PM
I just read CTF event, so never mind sorry!
Avatar
@Digitalferret @dozadown thanks for that.... this is the whole description: Hello agent, we want to look for someone who manages a cyber cafe and uses some of that gaming stuff to contact his victims only thing we could find is this 76561199495313518 can you find us his real name? from there, lead goes to that link: https://steamid.io/lookup/76561199495313518 and from there to https://steamcommunity.com/id/TheSASO25/ and if you look to groups he joined you came across this poem : https://steamcommunity.com/groups/GamersForEverrrr/discussions/0/3825286682757961164/ that leads to that Twitter name and from there i don't know what else to do...https://twitter.com/jeiffara36503?t=quGmJabhjktiOCf-fZSMnw&s=09 if you have any info. where else to look and do i would be greatfull
steamID output for STEAM_0:0:767523895 (76561199495313518)
HAHA I'm THE BEST OF ALL. I'm staring at the stars tonight, Wondering if you're out jhere too. I know we're worlds apart, but meybe, Just maybe, we'll find a way through. I'll keep hilding on, To the hope that we'll meet someday. And I'll keep singing this song, Until we find our way. Cause lofe is a journey, That takes us to the sfars. And I'll...
Avatar
Geohot? George Holtz? Turkey? That's all I got from the lyrics. Lol I am just pulling at straws though
Avatar
Digitalferret 4/21/2023 3:54 PM
silly question, would Carlos Jeiffara @jeiffara36503 not be whta they are lookin g for? like that's the end of the trail you just walked? (edited)
this 2
Avatar
i already got twitter account from poem...if you look for mistakes from that poem like the first one: (j)here you take j and then you go for next one m(e)ybe: its e you eventually get jeiffara36503.. now it is something else it needs to be looked to find out real first and last name.. here it is where i dont realy now what to do 🙂
3:57 PM
yes from here you need to somehow find the right name
3:57 PM
i am lost
3:58 PM
and yes Carlos Jeiffara is not the right name 🙂
Avatar
Digitalferret 4/21/2023 4:01 PM
sounds like torture. have you considered other ways to entertain yourself? 🙂
😆 3
Avatar
You are going to get me sucked into this lol
🛟 3
4:04 PM
If it was not a CTF it would be much easier. This person is covering their tracks lol
4:04 PM
You may need to visit republic of hackers on discord to get some ideas
Avatar
yea i thought of giving up.. it's quite a hard challenge but I will try harder haha @dozadown thanks for info. i will look into it
Avatar
Snofear don't give up! And please let us know how you figured it out! You got this!
Avatar
Are there any good free alternatives to magnet axiom on mac?
12:51 AM
Asking for a friend who has Mac. I currently have axiom installed on my windows box
Avatar
Avatar
tapatiosec
Asking for a friend who has Mac. I currently have axiom installed on my windows box
Unfortunately, all major commercial tools are tied to Windows.
Avatar
Avatar
tapatiosec
Are there any good free alternatives to magnet axiom on mac?
Digitalferret 4/22/2023 3:58 AM
maybe start with what you are trying to acheive and then ask about free/FOSS tools?
Avatar
Avatar
dozadown
Snofear don't give up! And please let us know how you figured it out! You got this!
ohh waybackmachine, all i can say
👍 1
Avatar
LαȥყTσɯɳTҽƈԋιҽ★ 4/22/2023 5:11 AM
Any good resources for practising event log analysis?
Avatar
Avatar
LαȥყTσɯɳTҽƈԋιҽ★
Any good resources for practising event log analysis?
Heimdall4N6K 4/22/2023 11:53 AM
Avatar
Also note that Timeline Explorer can open any CSV (log) file 🙂
Avatar
Why would an identical file saved in a different directory have a different hash value?
Avatar
Avatar
Jaegger
Why would an identical file saved in a different directory have a different hash value?
Digitalferret 4/22/2023 1:33 PM
because they arent identical?
👆 2
Avatar
Andrew Rathbun 4/22/2023 1:35 PM
What's identical about the files? The filename? Content matters when it comes to hashes
Avatar
Digitalferret 4/22/2023 1:35 PM
verify yourself by copying a file to two directories and run the command
Avatar
Andrew Rathbun 4/22/2023 1:36 PM
Does that particular method of hashing factor in the file path? Probably a stupid question but if they are truly 1:1 identical files then I can't think of any other reason why they'd have different hashes
Avatar
Avatar
Andrew Rathbun
Does that particular method of hashing factor in the file path? Probably a stupid question but if they are truly 1:1 identical files then I can't think of any other reason why they'd have different hashes
Digitalferret 4/22/2023 1:37 PM
path, doesn't matter, i just tested to verify 🙂
👍 1
Avatar
Avatar
Andrew Rathbun
What's identical about the files? The filename? Content matters when it comes to hashes
The data on the files are identical only saved in 2 different directories
Avatar
Avatar
Jaegger
The data on the files are identical only saved in 2 different directories
Digitalferret 4/22/2023 1:40 PM
test it then by opening a cmd window in each directory and run on the file
1:41 PM
if the hashes are the same then there's an issue maybe in how you issued the command, as AR said, but for my test, it shows the same hash
1:42 PM
wups , just deleted wrrong msg my abd
1:43 PM
[ @Andrew Rathbun -Wondered if it was like Prefetch where command line arguments are factored in the hash] (edited)
Avatar
Avatar
Jaegger
The data on the files are identical only saved in 2 different directories
Digitalferret 4/22/2023 1:45 PM
how would you test that they are identical, to come to that conclusion?
Avatar
one can always try diff command
Avatar
Avatar
BzdoOREK
one can always try diff command
Digitalferret 4/22/2023 1:47 PM
ssssshhhhhhhhhhhh! lol
1:51 PM
File Compare on windows / diff on Linux
Avatar
Could by an internal metadata modification
Avatar
Avatar
Jaegger
The data on the files are identical only saved in 2 different directories
DeeFIR 🇦🇺 4/22/2023 7:01 PM
Not to be hung up on semantics, but they’re not the same file. You appear to want them to be the same file, and you want an explanation as to why they would produce different hash values.. which is simple, because they are different files. Those files contain differing data, resulting in a different hash value. Can you explain a little bit more about how they were produced, why they’re in different locations, etc? That would help the rest of us try and understand what’s happening without making a range of (likely) incorrect assumptions. For example, if you’ve downloaded the for an assignment, is it possible the download/transfer process itself was interrupted and the file is incomplete or modified in some other way? Do you have a hash value from the source which you can compare it with? Or if you’re transferring/copying/duplicating files on your own machine and it results in a different hash, maybe you have a failing drive with read/write issues. Again, who knows, these are all assumptions.
Avatar
Hi everyone, I am planning to create a home lab for malware analysis and digital forensics. I am not entirely sure where to start. Can anyone recommend any good resources to start off with? Thanks in advance.
Avatar
Avatar
SaltedEgg
Hi everyone, I am planning to create a home lab for malware analysis and digital forensics. I am not entirely sure where to start. Can anyone recommend any good resources to start off with? Thanks in advance.
Andrew Rathbun 4/23/2023 7:13 AM
For malware it's probably better to ask in #malware-analysis. I'd suggest a separate VM for malware analysis, separate from doing digital forensics
Avatar
Avatar
Andrew Rathbun
For malware it's probably better to ask in #malware-analysis. I'd suggest a separate VM for malware analysis, separate from doing digital forensics
Thanks
Avatar
Hello everyone, I'm attempting to reverse engineering an app in the case of IP infringement (source code leak.) Let's suppose the app is using TLS pinning bundled into the application source code. Could you reverse engineer the app by using JADX (only if it's obfuscated) could you create a forged CA to match the root CA within the apps code base and potentially intercept the apps traffic via charles or mitmprox ? (edited)
Avatar
does anyone know where can i find more information about Apple/iOS Biome? Also, is the pronunciation "bi-oh-me" or "bio-mee" or neither?
Avatar
Avatar
trillian
does anyone know where can i find more information about Apple/iOS Biome? Also, is the pronunciation "bi-oh-me" or "bio-mee" or neither?
https://bluecrewforensics.com/2022/03/07/ios-app-intents/ i found a specific forensics article breaking down how some of the biome stuff works. and i assume they want it pronounced as bi-ohm, same ending as home or chrome
🙌 1
6:21 AM
https://www.magnetforensics.com/blog/bringing-it-back-with-biome-data/ oh and looks like magnet wrote it up recently too cat_smile
🙌 1
Avatar
Both Magnet AXIOM and Cellebrite Physical Analyzer started decoding Biome data. A good software to look at the raw files is "Mushy" by Ian Whiffin (https://doubleblak.com/).
👍🏾 1
Avatar
Avatar
$CozyBear
Hello everyone, I'm attempting to reverse engineering an app in the case of IP infringement (source code leak.) Let's suppose the app is using TLS pinning bundled into the application source code. Could you reverse engineer the app by using JADX (only if it's obfuscated) could you create a forged CA to match the root CA within the apps code base and potentially intercept the apps traffic via charles or mitmprox ? (edited)
If it‘s about the traffic have a look at frida (https://frida.re/docs/android/). You will need to have an android virtual device with your own certificate and patch the apk. There are several other ways to do it. If that‘s what you‘re looking for we could dig deeper (edited)
👍🏾 1
Avatar
What do you all do for storing forensic cases long term?
Avatar
Avatar
Jason
What do you all do for storing forensic cases long term?
chriscone_ar 4/24/2023 8:42 AM
This is a topic that interests me - and one I struggled with when I was still in LE. Our state evidence retention requirements for felony level cases ranged from 25 years to indefinitely. The lab I was in also supported all criminal appeal cases which meant we sometimes had to go back in the evidence room and find that dusty, old, cobweb covered case from long, long ago, which had been archived to a media type nobody had seen since MTV still played actual music 😁 So depending on how long you mean by "long term" and volume of data, I have different suggestions. (edited)
Avatar
Avatar
chriscone_ar
This is a topic that interests me - and one I struggled with when I was still in LE. Our state evidence retention requirements for felony level cases ranged from 25 years to indefinitely. The lab I was in also supported all criminal appeal cases which meant we sometimes had to go back in the evidence room and find that dusty, old, cobweb covered case from long, long ago, which had been archived to a media type nobody had seen since MTV still played actual music 😁 So depending on how long you mean by "long term" and volume of data, I have different suggestions. (edited)
7 years + 🙂
Avatar
Avatar
trillian
does anyone know where can i find more information about Apple/iOS Biome? Also, is the pronunciation "bi-oh-me" or "bio-mee" or neither?
Heimdall4N6K 4/24/2023 9:28 AM
👍🏻 1
🙌 1
9:28 AM
and use ileapp or aleapp
Avatar
Avatar
Jason
7 years + 🙂
chriscone_ar 4/24/2023 9:43 AM
There's a lot of variables depending on number and size of cases, case type, etc. and no singular approach, but what worked for me was a tiered approach. Each workstation had a local RAID for evidence files in active use and a drive for case files. Those got pushed to a NAS every Friday night, so data loss was a week (at most) if something happened. This NAS went to tape monthly. When an examiner was done actively working on a case, everything was stored together on a second NAS that was used to store those files for quick retrieval until the case was adjudicated - also helpful when new things popped up or to answer follow up questions about a case since everything was located together in a parent folder named for the case and readily accessible. This NAS also went to tape. Once adjudicated and depending on size, it either went to LTO tape or an archival-grade media (like M DISC), where it could happily live out its evidence retention requirements. I hate tape but hate re-imaging and re-doing casework even more. I'm also not a fan of storing something on a hard disk and throwing it in a box and expecting that drive to work in five or ten years. Archival-tier cloud storage for data you don't expect to need access to but need to keep for compliance is something worth considering.
Avatar
Avatar
chriscone_ar
There's a lot of variables depending on number and size of cases, case type, etc. and no singular approach, but what worked for me was a tiered approach. Each workstation had a local RAID for evidence files in active use and a drive for case files. Those got pushed to a NAS every Friday night, so data loss was a week (at most) if something happened. This NAS went to tape monthly. When an examiner was done actively working on a case, everything was stored together on a second NAS that was used to store those files for quick retrieval until the case was adjudicated - also helpful when new things popped up or to answer follow up questions about a case since everything was located together in a parent folder named for the case and readily accessible. This NAS also went to tape. Once adjudicated and depending on size, it either went to LTO tape or an archival-grade media (like M DISC), where it could happily live out its evidence retention requirements. I hate tape but hate re-imaging and re-doing casework even more. I'm also not a fan of storing something on a hard disk and throwing it in a box and expecting that drive to work in five or ten years. Archival-tier cloud storage for data you don't expect to need access to but need to keep for compliance is something worth considering.
Thank you for this. I was thinking along the lines of Tape and debating archive storage for retention
👍🏻 1
Avatar
First time imaging an android, using Magnet Axiom, how long should it take? Samsung Galaxy S21
Avatar
Heimdall4N6K 4/24/2023 11:39 AM
you can try magnet acquire to
Avatar
sorry, yes I am using magnet acquire to do it.
11:48 AM
it's going on 2 and 1/2 hours so far
Avatar
Avatar
medusa
it's going on 2 and 1/2 hours so far
Deleted User 4/24/2023 12:02 PM
Depends on how large the devices storage is. Can take from 2 hours to 12 hours in my experience.
👍 1
Avatar
okay, thank you. it is 128 gbs.
👍 1
Avatar
Heimdall4N6K 4/24/2023 1:01 PM
so it's going to take some time... but it's free😁
😁 1
Avatar
Hey is there any sort of like WHOIS/ARIN lookup service for non-LE that can figure out if a crypto wallet is held in a major US exchange that would have KYC data for sending off a subpoena/SW?
Avatar
sashadog4562 4/24/2023 4:24 PM
Hello thank you for the add. I am excited to learn more.
4:25 PM
I hope to get a job doing this.
Avatar
Avatar
FunkeDope
Hey is there any sort of like WHOIS/ARIN lookup service for non-LE that can figure out if a crypto wallet is held in a major US exchange that would have KYC data for sending off a subpoena/SW?
Deleted User 4/24/2023 9:25 PM
You can try Breadcrumbs which if you get lucky will indicate an Exchange along the TX chain: https://www.breadcrumbs.app/
Breadcrumbs is a blockchain analytics platform accessible to everyone. It offers a range of tools for investigating, monitoring, tracking and sharing relevant information on blockchain transactions.
Avatar
kmacdonald1565 4/25/2023 6:31 AM
what do you all do when you have a phone that is going through password breaking (premium/GK/etc) for an extended period of time/years and the battery significantly swells? lets say to the point of the screen coming up.
🤯 2
Avatar
@Law Enforcement [UK] Question: who here read the recent Baroness Casey report? https://www.met.police.uk/police-forces/metropolitan-police/areas/about-us/about-the-met/bcr/baroness-casey-review/ I'm deeply curious about how the culture issues described in the report may or may not have factored into efforts over the years, especially recently, to have more frontline officers hands-on with digital evidence and victim response. I.e. technology seen as a solution to austerity measures at the expense of training and other elements of complex responses? Also how these culture issues might have factored into the Forensic Science Regulator's report(s) and/or broader standardization efforts? Please forgive me if I'm overgeneralizing, I'm US-based and so I'm not sure if I'm correctly piecing together fragments I've received over the years (another being the 2021 issues with disclosure)...
Read about the Baroness Casey Review of Met culture and standards of behaviour.
Avatar
Avatar
kmacdonald1565
what do you all do when you have a phone that is going through password breaking (premium/GK/etc) for an extended period of time/years and the battery significantly swells? lets say to the point of the screen coming up.
If you've got an iPhone, definitely remove the screws next to the charge ports. The screen will eventually lift but it seems to relieve some of the short term pressure a swollen battery puts it under. Unfortunately everything else is on a case by case basis. Most Androids pop their back covers themselves over time if the battery starts to swell.
Avatar
Avatar
kmacdonald1565
what do you all do when you have a phone that is going through password breaking (premium/GK/etc) for an extended period of time/years and the battery significantly swells? lets say to the point of the screen coming up.
Luckily with GK you can just pop battery from connectors and it will restart from where it was, when another battery is entered. Premium however is not as friendly let's say. It will restart the brute force, however there is no reason you cannot contact cellebrite for their dictionary and remove the codes already tried. It's obviously easier if it's a user inputted dictionary as you can manually remove the codes tried. (edited)
👍 1
Avatar
We have a 120 day policy in our force. It's unlikely for a device that's submitted for a 4-6 digit pin unlock to take longer than that
8:30 AM
Even so, 120 days isn't enough for a battery to suddenly go haywire and explode on us
Avatar
kmacdonald1565 4/25/2023 11:24 AM
We have had some going for years, no policy with that regard, but we can talk about that for sure. 6 digit iPhones can take a while for sure. thank you all for your input.
Avatar
What job do you think I qualify for? Took have GCFR, GCDA, GCFA, GCFE, GREM, Splunk Core User, Sec+, Net+, A+ and a BS in CompSc. I am in the military and took courses i believed had the most useful depending on my job. I always saw myself as a IR lead. That is what I do now. (edited)
Avatar
a better question is probably what job do you want
Avatar
What he said lol
Avatar
Avatar
Rick
What job do you think I qualify for? Took have GCFR, GCDA, GCFA, GCFE, GREM, Splunk Core User, Sec+, Net+, A+ and a BS in CompSc. I am in the military and took courses i believed had the most useful depending on my job. I always saw myself as a IR lead. That is what I do now. (edited)
The certs are great but probably get grilled on actual experience in those areas, lead might be a stretch right out but excellent team member working towards the lead (edited)
Avatar
Avatar
kmacdonald1565
We have had some going for years, no policy with that regard, but we can talk about that for sure. 6 digit iPhones can take a while for sure. thank you all for your input.
If you have a phone running for years, maybe it's interesting to update the client on that phone. Sometimes it helps to speed up things
Avatar
Avatar
tklane
The certs are great but probably get grilled on actual experience in those areas, lead might be a stretch right out but excellent team member working towards the lead (edited)
The only thing I dont have a lot of experience is cloud forensics, though we did forensics on a hypervisor once.
Avatar
a hypervisor doesn't necessarily have anything to do with "cloud forensics", which most people interpret as forensic analysis of cloud providers such as AWS, GCP, Azure, Cloud-based Services like Box/DropBox/SalesForce, etc. (edited)
👍🏻 1
6:29 AM
I actually hate the term cloud forensics because it makes people think there is some major distinctions between examining a host onprem and examining an AWS EC2 instance - same concepts, same types of tools, just different approaches/logging/availability/restrictions/etc (I'm aware there are also major differences in certain areas such as the underlying infrastructure, possibilities for escalation/lateral movement/implications/etc). I also want to add here that of course there are some huge concepts to learn and understand with respect to analyzing things like AWS Cloudtrail data - but I guess to me, that's no different than analyzing your own internal application logs - you have to have a deep understanding of how the providing application functions and integrates in it's ecosystem (edited)
👍🏻 1
Avatar
Avatar
Mr.Robot
If you have a phone running for years, maybe it's interesting to update the client on that phone. Sometimes it helps to speed up things
kmacdonald1565 4/26/2023 7:47 AM
some may qualify for that for sure, but with no policy or procedure in place we really only look if it is requested by investigators or needed for court
Avatar
Avatar
kmacdonald1565
some may qualify for that for sure, but with no policy or procedure in place we really only look if it is requested by investigators or needed for court
Totally understand that! On our place we have a Excel / Word sheet with all bruteforce listed. On that sheet we see all the important information like os version. When we see there is new update which improve some things, we take a look at that list and see which bruteforce needs an update. Can save a lot of time sometimes
Avatar
💀Raggnar💀 4/26/2023 4:19 PM
I have a question I was hoping someone could help me with. A member in my circle on life360 app has an iPhone SE, alot of time the 360 updates, it'll be hours before "Find my phone" under devices will update or match life 360. How does this happen? Is this an indication of spoofing the gps somehow? T.I.A.!
Avatar
Hey all, not sure where to look but I've been in forensics a long time and I'm still working with my forensic tools on local boxes. I'm looking into building forensic investigation environment in Azure and want to spin up a machine per investigation. Are there any resources out there I can use to set this up ?
Avatar
Avatar
💀Raggnar💀
I have a question I was hoping someone could help me with. A member in my circle on life360 app has an iPhone SE, alot of time the 360 updates, it'll be hours before "Find my phone" under devices will update or match life 360. How does this happen? Is this an indication of spoofing the gps somehow? T.I.A.!
I’m not familiar with life360 but could it just be that the different apps involved have different GPS permissions, eg ‘use always’ vs ‘only when using app’ and also precise location allowed?
Avatar
Avatar
💀Raggnar💀
I have a question I was hoping someone could help me with. A member in my circle on life360 app has an iPhone SE, alot of time the 360 updates, it'll be hours before "Find my phone" under devices will update or match life 360. How does this happen? Is this an indication of spoofing the gps somehow? T.I.A.!
Also, is find my phone a ‘when asked app’ - it’ll only update when someone uses the app to ask where the device is?
Avatar
Avatar
Blacklynx
Hey all, not sure where to look but I've been in forensics a long time and I'm still working with my forensic tools on local boxes. I'm looking into building forensic investigation environment in Azure and want to spin up a machine per investigation. Are there any resources out there I can use to set this up ?
A packer utility to create and capture DFIR Image for use AWS & Azure - GitHub - swimlane/CLAW: A packer utility to create and capture DFIR Image for use AWS & Azure
😍 1
Avatar
Apologies to all and especially @Law Enforcement [UK] for the entirely random question about the Baroness Casey report the other day. It was far from the first awkward group interaction I've ever initiated, but I should have contextualized the question. For those who don't know me, I worked in DFIR vendor marketing for many years and more recently DFIR journalism (which is actually where I started my career). As a non-practitioner I lurk a lot, but I'm looking to change that, hopefully a lot less awkwardly. At any rate, my latest project is a Medium publication examining the intersection between tech and the law. You can catch our first newsletter here https://medium.com/forensic-horizons/april-2023-the-way-things-have-always-and-never-been-done-4d87752192ea (including a brief mention of the Casey report) -- would love comments, suggestions, subscribers, etc. if this project is of interest!
Where tech and the law meet over the horizon lie dragons: the unknown of what it all means to society. Follow us as we navigate!
🕵️ 1
Avatar
Hi does anybody know if it’s possible to compromise a printer to distribute malware and if it posible to do a forensic analysis to a printer??
Avatar
Avatar
mdogilvie
Hi does anybody know if it’s possible to compromise a printer to distribute malware and if it posible to do a forensic analysis to a printer??
yes - printers are just another computer at the end of the day. forensics really depends on your level of access and the hardware/software being run but anything is possible.
👍 1
Avatar
Avatar
busted4n6
Also, is find my phone a ‘when asked app’ - it’ll only update when someone uses the app to ask where the device is?
💀Raggnar💀 4/27/2023 9:43 AM
No, its a find my device app. Basically I'm suspecting someone of using a burner device for life 360, and turning off location services on the actual iPhone. Just need somebody that's really tech savvy to confirm this is possible, or I'm just losing my mind lol. Alot riding on this.
Avatar
Avatar
💀Raggnar💀
No, its a find my device app. Basically I'm suspecting someone of using a burner device for life 360, and turning off location services on the actual iPhone. Just need somebody that's really tech savvy to confirm this is possible, or I'm just losing my mind lol. Alot riding on this.
is this for a personal thing (family member) or a professional thing?
Avatar
💀Raggnar💀 4/27/2023 10:16 AM
Personal, family..
Avatar
I'm looking to network with individuals who are criminal analysts with smaller sized agencies (125 or fewer officers) to learn more about your daily work, tools you use, and what type of analysis you typically end up doing. This may not be the appropriate place for this, but I like shooting buckshot at a problem then narrowing down from there.
👍 1
Avatar
Avatar
💀Raggnar💀
No, its a find my device app. Basically I'm suspecting someone of using a burner device for life 360, and turning off location services on the actual iPhone. Just need somebody that's really tech savvy to confirm this is possible, or I'm just losing my mind lol. Alot riding on this.
Digitalferret 4/27/2023 4:36 PM
this has come way away from your intro in new members for iPhone troubles and data recovery, has it not? (edited)
Avatar
Avatar
Digitalferret
this has come way away from your intro in new members for iPhone troubles and data recovery, has it not? (edited)
💀Raggnar💀 4/27/2023 4:40 PM
Well, when you put it like that, Yes I suppose. But I figured it is a tech question none the less so thought I'd ask. If not allowed I apologize.
Avatar
Avatar
💀Raggnar💀
Well, when you put it like that, Yes I suppose. But I figured it is a tech question none the less so thought I'd ask. If not allowed I apologize.
Digitalferret 4/27/2023 4:43 PM
it's actually starting to sound like you are trying to track someones whereabouts and want to know if they know and are trying not to be tracked?
Avatar
I'm trying to use a program called autopsy but im having a few problems. When I load it up and try create a new case it feels really slow and sluggish. The same happens with any interaction with the UI. And also when I want to open a existing case it takes forever to navigate the file dialog window. So I'm wondering if anyone else has experienced this.
Avatar
Avatar
Digitalferret
it's actually starting to sound like you are trying to track someones whereabouts and want to know if they know and are trying not to be tracked?
💀Raggnar💀 4/27/2023 4:44 PM
That is absolutely correct. I have a teenage daughter in a ridiculous world. I hope you can understand.
Avatar
Digitalferret 4/27/2023 4:45 PM
indeed. is it her phone or someone stringing her along?
Avatar
💀Raggnar💀 4/27/2023 4:48 PM
No idea. I believe she's far smarter than she makes herself out to be. Just a ton of odd coincidences way to often and I've been studying up on spoofing and from what I can tell, it is alarmingly possible. That, scares the crap out of me.
Avatar
Digitalferret 4/27/2023 4:50 PM
so, i'd suggest stopping what you are doing right now, in terms of tracking or whatever. it's quite possible you are breaking the law, country dependent of course.
4:51 PM
i'd also suggest looking up professional help/services/sympathetic friend to find out if she is safe
4:51 PM
and urgnecy/suspicon dependent, possibly LE if the "other guy" has "reputation
4:52 PM
unfortunately we cannot go any further here, because we could be complicit in helping you break the law
4:53 PM
i must say i completely sympathise/empathise, I'd go berserk. but don't make matters worse for yourself and end up being the one in court
Avatar
Avatar
Oceanboi
I'm trying to use a program called autopsy but im having a few problems. When I load it up and try create a new case it feels really slow and sluggish. The same happens with any interaction with the UI. And also when I want to open a existing case it takes forever to navigate the file dialog window. So I'm wondering if anyone else has experienced this.
Digitalferret 4/27/2023 4:58 PM
Avatar
hey there
5:02 PM
I was wondering if some people could help me understand a jpeg compression signature
Avatar
Looked at it but seems to be optimizing for file ingestion, the problem I have is it takes forever to click or do anything :/
Avatar
basically I want to understand what it means. I used jpegsnoop on a file
5:02 PM
5:03 PM
When I google the signature I get other files that have the exact same signature but I'm not sure what process they all go through to get that signature
5:03 PM
I know for a fact the picture was taken on a phone but the compression signature suggests it was taken on a sony cybershot u camera ?
5:03 PM
And likewise with the other photos I googled with the same signature, none of them were actually taken on a sony cybershot u camera
Avatar
Avatar
Oceanboi
Looked at it but seems to be optimizing for file ingestion, the problem I have is it takes forever to click or do anything :/
DeeFIR 🇦🇺 4/27/2023 6:45 PM
Autopsy is a pig when it comes to memory consumption. What are the specs of the machine you’re running it on? How much memory is autopsy using?
Avatar
16gb ram, Ryzen 7 5800x and nvme ssd (edited)
6:49 PM
Iirc task manager said about 40% was being used in total by the system.
6:50 PM
Autopsy was using about 500mb with no case loaded
6:55 PM
There was also an error in the logs saying solr service failed to respond to status request. Which was being used by the keyword search plugin from what I could find. So I disabled that plugin but made no difference (edited)
6:57 PM
Tried downgrading from 4.20.0 to 4.19.3 but same issue (edited)
Avatar
Is anyone familiar with methods of associating phishing websites with the attack group/product? I find there is a very frequent number of phishing campaigns that have the same landing page/source, but are too new to be found in any threat feed. It would be nice if I could tie them to a specific kit or phishing as a service.
Avatar
Avatar
iargue
Is anyone familiar with methods of associating phishing websites with the attack group/product? I find there is a very frequent number of phishing campaigns that have the same landing page/source, but are too new to be found in any threat feed. It would be nice if I could tie them to a specific kit or phishing as a service.
I think the problem here is how loosely the phish kits are deployed, there's a ton of re-use between different groups. It's not uncommon at all as an analyst to find their zip archive on compromised websites by traversing one directory up. If you are able to grab the php sourcecode through previously mentioned zip it will indicate what e-mail address is receiving the phished data (or telegram service, file, etc) (edited)
Avatar
Hope this is the right room. I'm hoping someone can explain how the relationship between the iPhone message retention setting and deletion date of messages works?
7:20 AM
Say I have messages from 6 months ago, and I set the retention setting to 30 days, would all messages outside of this period be deleted with an identical deletion date?
Avatar
In addition, do these messages still remain as marked for deletion for 30 days like usual before vacuum?
Avatar
@Moderators Can I post a link to my Github project that I created. It converts the RDSv3 to CSV files.
Avatar
Avatar
SBcyberCop
@Moderators Can I post a link to my Github project that I created. It converts the RDSv3 to CSV files.
Yes - recommend posting in the channel: #dfir-open-source-projects
👍 2
5:56 PM
Thank you for sharing with the community!!
🤙 1
💯 1
Avatar
[Digital Forensics] WPS Office another cloud based office service available. Got back into the office to find a new download office suite made available run in the cloud. Yet another stop off point for digital forensics to investigate! #law enforcement #digital forensics #dfir #cybercrime #barristers #solicitors #digital #evidence #office suite #office365administration
Avatar
NibblesNBits 4/29/2023 2:51 PM
Have a few Mac devices and had a best practice question. I know disk 1 is usually physical drive disk 2 in my case at least is the APFS container and disk3 is the synthesized APFS drive combo of 1 and 2. Which is the best practice to image...no encryption in this case
Avatar
return2zero 5/1/2023 5:56 AM
Two questions - 1) We would like to move away from carbon triplicate evidence receipt books, is anyone using an electronic solution for evidence receipts / chain of custody forms? 2) What are you using for a team knowledge base, we utilise M365 so SharePoint would be one option. TIA (edited)
Avatar
Avatar
return2zero
Two questions - 1) We would like to move away from carbon triplicate evidence receipt books, is anyone using an electronic solution for evidence receipts / chain of custody forms? 2) What are you using for a team knowledge base, we utilise M365 so SharePoint would be one option. TIA (edited)
Digitalferret 5/1/2023 9:16 AM
maybe echo in #policies-and-procedures
👍 1
Avatar
SBcyberCop 5/1/2023 5:43 PM
Anyone have any advice on getting a seat at NCFI?
Avatar
Avatar
SBcyberCop
Anyone have any advice on getting a seat at NCFI?
Do your FPRs, put in for everything, take what you can get, and don’t hold your breath for MDE, BCERT, or NITRO. If you are not on the FPR system yet it should be easier to get into a virtual class/presentation over an in person class.
👍 1
Avatar
Avatar
SBcyberCop
Anyone have any advice on getting a seat at NCFI?
Joe Schmoe 5/1/2023 6:52 PM
Introduce yourself to your Secret Service RAC. Also put in for online classes. You are more likely to get more competitive classes if you have taken a class before and fill out FPR’s.
👍 1
Avatar
Where can I get more information about circuit boards and electrical understanding
Avatar
Avatar
Ahmedl21
Where can I get more information about circuit boards and electrical understanding
Digitalferret 5/2/2023 1:33 AM
"circuit boards": can you narrow that down a bit? and what electrical systems/theory do you need to understand. on a full scale answer, anything from Hobbyist Electronics class to a full HND or HNC (or whatever the quals are called these days) in Electrical and Electronic Engineering
Avatar
Deleted User 5/2/2023 6:22 AM
Working a case where the crime was committed using an XBox. Looking for some guidance on the best way to conduct an exam on it.
Avatar
Avatar
Deleted User
Working a case where the crime was committed using an XBox. Looking for some guidance on the best way to conduct an exam on it.
Digitalferret 5/2/2023 6:26 AM
Avatar
Avatar
Deleted User
Working a case where the crime was committed using an XBox. Looking for some guidance on the best way to conduct an exam on it.
If it’s anything after an Xbox360 best bet is a manual review and video/photograph the screen.
Avatar
Hey all, we have a new model of Faraday Case out now. If you go to the site you can request a free Faraday case. We have a few in stock and are working on getting more in. Basically these cases are super effective and have a lower bottom line because we direct source. We also support operation teams for human trafficking victims, so if you are involved with that field please let me know.
9:14 AM
🎖️【TOP FARADAY SOLUTION】LAB TESTED DUAL LAYER SHIELDING 🛡🛡️ Blocks Efficiency :70-80DB, Frequency range: 10KHZ-30GHZ📱【VERSATILE】 Protect your CELLPHONE 📱, KEY FOB 🚗, CREDIT CARDS 💳, ID BADGE 🪪🪖🚓【MILITARY-GRADE FARADAY SOLUTION】 Military | Law Enforcement Missions➕【EXTA SPACE】 Large storage with 10"x10" case.🪨[RUGGED S
Avatar
Avatar
mitchlang
Hey all, we have a new model of Faraday Case out now. If you go to the site you can request a free Faraday case. We have a few in stock and are working on getting more in. Basically these cases are super effective and have a lower bottom line because we direct source. We also support operation teams for human trafficking victims, so if you are involved with that field please let me know.
Have you looked into producing bags with shielded USB ports? Phones dying is the biggest problem with these and the portable battery packs don't last very long either. My faraday box has way too many phones in it already so a staging area where I could keep bags plugged in and shielded would be great. Mission darkness makes a bag like that but it costs around $400. Curious if you've looked into the practicality of competing in that space.
Avatar
Avatar
Digitalferret
"circuit boards": can you narrow that down a bit? and what electrical systems/theory do you need to understand. on a full scale answer, anything from Hobbyist Electronics class to a full HND or HNC (or whatever the quals are called these days) in Electrical and Electronic Engineering
I need the basic information to get me started to learn about it. The components and how it works
Avatar
Avatar
whee30
Have you looked into producing bags with shielded USB ports? Phones dying is the biggest problem with these and the portable battery packs don't last very long either. My faraday box has way too many phones in it already so a staging area where I could keep bags plugged in and shielded would be great. Mission darkness makes a bag like that but it costs around $400. Curious if you've looked into the practicality of competing in that space.
Yes, I need a solid USB plug with a filter, but yes this is underway!!
10:30 AM
If anyone has a reference I have a case that is ready to go. I'm hoping to have the first 50 ready by the end of June.
Avatar
Avatar
Ahmedl21
I need the basic information to get me started to learn about it. The components and how it works
Digitalferret 5/2/2023 12:22 PM
college / youtube / books ... (edited)
Avatar
Avatar
FullTang
Do your FPRs, put in for everything, take what you can get, and don’t hold your breath for MDE, BCERT, or NITRO. If you are not on the FPR system yet it should be easier to get into a virtual class/presentation over an in person class.
I’m on pace for 500 FPRs this year and can’t even get an online class. 🤷‍♂️
😦 1
Avatar
digital Bowles 5/2/2023 4:43 PM
Can someone from @Cellebrite DM me reference a sales question.
Avatar
Avatar
digital Bowles
Can someone from @Cellebrite DM me reference a sales question.
Not sales but will get you a connect
Avatar
digital Bowles 5/2/2023 4:46 PM
Yes. I’ve been waiting to hear from someone for a couple of weeks.
Avatar
Sent you a dm@
Avatar
Avatar
Digitalferret
college / youtube / books ... (edited)
Got any suggestions on where tho
Avatar
Avatar
Ahmedl21
Got any suggestions on where tho
DeeFIR 🇦🇺 5/2/2023 11:22 PM
Where have you looked?
this 1
Avatar
Avatar
Ahmedl21
Got any suggestions on where tho
Deleted User 5/3/2023 5:13 AM
YouTube is a good resource and you can shop online for basic electronic build kits complete with breadboards, resisters and solder to help you learn.
Avatar
yeoj112689 5/3/2023 6:53 AM
Can anyone help me with combining json files for project VIC ?
Avatar
Does anyone know if there is a factory reset artifact in android that would show date of last restore?
Avatar
Avatar
Neon
Does anyone know if there is a factory reset artifact in android that would show date of last restore?
I’d like to thank Alexis Brignoni, Heather Mahalik, and Jared Barnhart for their insight and validation, and Alexis for tooling ALEAPP for these artifacts.  DFIR truly is a team effort. They say im…
❤️ 1
Avatar
Avatar
Neon
Does anyone know if there is a factory reset artifact in android that would show date of last restore?
data\misc\bootstat\factory_reset
🤘🏼 2
Avatar
Thank you both
Avatar
I hope everyone has had a great first quarter of 2023. For me, it has been a busy one with settling into a new role at a new employer. As things continue to settle I hope to get back into a bloggin…
🔥 2
💯 1
Avatar
ForensicDev 5/3/2023 1:16 PM
I am drawing a blank on VSC. I was given the VSC files from a file server as a logical image (AD1). Inside the "System Volume Information" folder of the AD1, I see the VSCs. I exported the files and removed the "system, hidden" flag. Now I am trying to mount the 50+ VSCs to browse the folders. VSCmount and AIM only work on full disk images, not logical file captures. Are there any tools that can mount the 50+ in "bulk"?
Avatar
Discord is dropping the four-digit suffix that followed each username.
Avatar
I got an email about that 👀
Avatar
Avatar
ForensicDev
I am drawing a blank on VSC. I was given the VSC files from a file server as a logical image (AD1). Inside the "System Volume Information" folder of the AD1, I see the VSCs. I exported the files and removed the "system, hidden" flag. Now I am trying to mount the 50+ VSCs to browse the folders. VSCmount and AIM only work on full disk images, not logical file captures. Are there any tools that can mount the 50+ in "bulk"?
Andrew Rathbun 5/3/2023 4:50 PM
Have you tried FTK Imager? AD1 is proprietary to AccessData. Not sure if it can do it in bulk but I'd start there 🤷‍♂️
Avatar
Avatar
Andrew Rathbun
Have you tried FTK Imager? AD1 is proprietary to AccessData. Not sure if it can do it in bulk but I'd start there 🤷‍♂️
ForensicDev 5/3/2023 5:36 PM
FTK Imager mounts the AD1 as a "file system" just fine, yet the VSC contained within are not mounted. For example using Eric Zimmerman's VSCMount will create mount points to VSC on forensic images that are mounted via AIM or FTK Imager. However, this tool only seems to work against an actual forensic image, not a logical file folder capture inside an AD1. I am trying to mount the individual VSC files {GUID}{GUID} inside the System Volume Information folder I received in the AD1. So far no luck in getting them to a mount point where I can browse their folder structure.
Avatar
Avatar
ForensicDev
FTK Imager mounts the AD1 as a "file system" just fine, yet the VSC contained within are not mounted. For example using Eric Zimmerman's VSCMount will create mount points to VSC on forensic images that are mounted via AIM or FTK Imager. However, this tool only seems to work against an actual forensic image, not a logical file folder capture inside an AD1. I am trying to mount the individual VSC files {GUID}{GUID} inside the System Volume Information folder I received in the AD1. So far no luck in getting them to a mount point where I can browse their folder structure.
Andrew Rathbun 5/3/2023 5:39 PM
Maybe @Eric Zimmerman has ideas for tools that might do the job?
Avatar
Eric Zimmerman 5/3/2023 6:37 PM
Ad1 does not support VSC afaik. You can try mounting it as a raw in frk to see what it can do but ad1 is a terrible thing that should never be used. If it isn't emulating an ntfs volume windows won't see the vscs
6:37 PM
An ad1 is logical only. Ie no vscs.
Avatar
Avatar
DeeFIR 🇦🇺
Where have you looked?
You know how there a lot online but doesn’t mean it is useful. So far it’s YouTube but they be doing advance things not for beginners
Avatar
Avatar
Deleted User
YouTube is a good resource and you can shop online for basic electronic build kits complete with breadboards, resisters and solder to help you learn.
How did you get started and okay got any suggestions on which ones I should get
Avatar
Avatar
Ahmedl21
How did you get started and okay got any suggestions on which ones I should get
Deleted User 5/3/2023 10:27 PM
I'll use GeoHotz's advice: Find something you want to do or build and start from there. This can work as a starter project for your needs: https://camjam.me/?page_id=236 or look around on Amazon: https://www.amazon.com/Electronics-Dummies-Cathleen-Shamieh/dp/1119117976 If none of our replies have answered your question we might not have the answers you are looking for. Good luck.
Electronics For Dummies
Avatar
Avatar
Deleted User
I'll use GeoHotz's advice: Find something you want to do or build and start from there. This can work as a starter project for your needs: https://camjam.me/?page_id=236 or look around on Amazon: https://www.amazon.com/Electronics-Dummies-Cathleen-Shamieh/dp/1119117976 If none of our replies have answered your question we might not have the answers you are looking for. Good luck.
Both are good got anything for learning about gears, speed they go, and the math behind it
Avatar
Tr4pSec 🇳🇴 5/4/2023 3:20 AM
Does anyone have experience comparing MDE devicenetworkevents to more traditional proxy logs? Like, do you need to have a proxy to have the same visibility?
Avatar
Avatar
Tr4pSec 🇳🇴
Does anyone have experience comparing MDE devicenetworkevents to more traditional proxy logs? Like, do you need to have a proxy to have the same visibility?
DeeFIR 🇦🇺 5/4/2023 3:45 AM
You don’t have the full URI in the network events table, but you have more verbose process events. They’re different but complimentary. It would be great if you had both proxy logs and endpoint telemetry. (edited)
👍 1
Avatar
Tr4pSec 🇳🇴 5/4/2023 3:45 AM
Can you supplement with sysmon for example?
3:45 AM
I havent used sysmon before, not sure what events you can pull from networking
Avatar
Avatar
Tr4pSec 🇳🇴
I havent used sysmon before, not sure what events you can pull from networking
Andrew Rathbun 5/4/2023 4:18 AM
Monitors and reports key system activity via the Windows event log.
Avatar
I've been given an ITunes backup and an oxygen export of messages, and I've generated another export of messages through Cellebrite and somehow they both have messages the other is missing
5:03 AM
I'd have assumed Cellebrite would pick up everything oxygen had picked up - and more
Avatar
Avatar
Neon
Does anyone know if there is a factory reset artifact in android that would show date of last restore?
Heimdall4N6K 5/4/2023 5:16 AM
use aleapp
Avatar
Avatar
Naga
I've been given an ITunes backup and an oxygen export of messages, and I've generated another export of messages through Cellebrite and somehow they both have messages the other is missing
Oxygen Forensics 5/4/2023 5:43 AM
Hello! That is the main reason most people (if possible) use multiple tools. But it is not satisfactory if some messages are missed by Oxygen 🙂 I would like to DM you and ask some questions, if you don't mind
Avatar
Avatar
Naga
I'd have assumed Cellebrite would pick up everything oxygen had picked up - and more
Digitalferret 5/4/2023 8:57 AM
same thing with regard to data recovery programs and as OF said, why Co's use a whole array of programs.
Avatar
Original message was deleted or could not be loaded.
Digitalferret 5/4/2023 10:02 AM
even with multiple software packages, it's still a possibility. there's also really no replacement for experienced operators who understand fundamentals. it's usually a company cost saving exercise trusting to best-guess push-button solutions.
10:04 AM
and then employing Tier One operatives to do the job
Avatar
Digitalferret 5/4/2023 10:24 AM
betting LE be like: wish i could work privately, so I wouldn't have to spend so much time doing pointless things for <superiors> while smiling
💯 1
Avatar
Yeah, there is no difference here. Everyone works for someone.
Avatar
🤣 6
Avatar
Original message was deleted or could not be loaded.
Digitalferret 5/4/2023 11:15 AM
you ever worked in LE? 🙂
11:16 AM
grass is always greener
this 1
11:18 AM
"lots of cases of officers demanding urgent work and being told they will have to wait for the backlog" worldwide. it's an actual thing, you can't overtime imaging. the bottleneck is the hardware and even further categorizing images, which no one externally wants to do
11:19 AM
i've seen LE on here practically begging for large scale co to take drives
11:21 AM
yeh, there are gross generalisations made. but essentially shit rolls downhill. in every co, regardless of sector
11:21 AM
lol
11:22 AM
i'm in UK, and the LE/Emergency sectors have worked on goodwill for so lomng it's completely eroded. from cops to ambulance to doctors, they work incredibly long hours on the back of government emotional blackmail.
11:23 AM
they have fewer resources, equipment, manpower, beds etc. the Govt drives are for efficiency. let me chop off 9 of your fingers and then give you an efficiency guide 🙂
11:24 AM
yup ^ always the guys above, shouting the odds.
11:25 AM
i hear you, but please don't think LE is a universal panacea. it isn't. work out what turns your cogs in terms of work, baloance that against its pay prospects (and figure out why some countries are saturated with accountants and lawyers 🙂 )
Avatar
For sure
Avatar
Digitalferret 5/4/2023 11:28 AM
i'm reluctant to ping UK LE but have plenty of chats with someone in the job you think you are wanting. "LE is better than working private sector" tell me i'm worng, kinda thing
11:29 AM
but yeh, here's me shitting up Gen chan, lol. best of luck going forward 🙂
Avatar
Last I checked our DMI has a six month backlog?
Avatar
Avatar
Digitalferret
betting LE be like: wish i could work privately, so I wouldn't have to spend so much time doing pointless things for <superiors> while smiling
spicy_caveman 5/4/2023 4:33 PM
🤣 Said that.
Avatar
Austin || Lukrativ🔎 5/4/2023 6:49 PM
Random question, what's everyone's go-to portable drive for acquisition purposes? Something I've been meaning to throw out there
Avatar
SanDisk 2TB Extreme PRO Portable SSD
👀 1
Avatar
Avatar
Austin || Lukrativ🔎
Random question, what's everyone's go-to portable drive for acquisition purposes? Something I've been meaning to throw out there
We use a lot of the Samsung T7 drives
👀 1
this 1
Avatar
Avatar
Austin || Lukrativ🔎
Random question, what's everyone's go-to portable drive for acquisition purposes? Something I've been meaning to throw out there
WD Black NVMe in external usb-c case
👀 1
Avatar
Adam Cervellone 5/5/2023 6:08 AM
I am in need of a new forensic laptop for work needing it to do both video forensics, mobile and computer forensics. Do you all have any suggestions on processor, AMD vs Intel and which model specifically? I’m looking at 13th gen Intel and 7000 series AMD Ryzen and will have to get an Alienware as my agency already has them on our purchasing agreement. I am most interested in the best processor for video work. The model options all come with a NVIDIA RTX 4080 or 4090 GPU
Avatar
@Law Enforcement [UK] Anyone around that has knowledge on server specs / contacts for trusted providers? pm if so!
Avatar
Avatar
Rob
@Law Enforcement [UK] Anyone around that has knowledge on server specs / contacts for trusted providers? pm if so!
Sent you a message
Salute 1
Avatar
Avatar
Rob
@Law Enforcement [UK] Anyone around that has knowledge on server specs / contacts for trusted providers? pm if so!
We’re currently doing a lot of infrastructure work so have a good knowledge.
Salute 1
Avatar
Avatar
Adam Cervellone
I am in need of a new forensic laptop for work needing it to do both video forensics, mobile and computer forensics. Do you all have any suggestions on processor, AMD vs Intel and which model specifically? I’m looking at 13th gen Intel and 7000 series AMD Ryzen and will have to get an Alienware as my agency already has them on our purchasing agreement. I am most interested in the best processor for video work. The model options all come with a NVIDIA RTX 4080 or 4090 GPU
Can you get Dell Precision Mobile Workstations? We have found that while not quite as fast, enterprise workstations have better stability and support. We have some HP ZBook and Lenovo workstation laptops that are good.
Avatar
Avatar
busted4n6
Can you get Dell Precision Mobile Workstations? We have found that while not quite as fast, enterprise workstations have better stability and support. We have some HP ZBook and Lenovo workstation laptops that are good.
Adam Cervellone 5/5/2023 10:35 AM
We should be able to purchase any dell/alienware product with ease. Anything outside of Dell is like pulling teeth
Avatar
Hello
👋 2
Avatar
Working an attempted Homicide, suspect dumped phone. Have cell phone towers but no rtt data as it is AT&T. The phone collision detection called 911. Phone is dead. Got 911 call with a 911 ping. Is the data from that ping actually from the phone gps? So far the pings we got from AT&T before the phone died are too broad an area.
Avatar
Russell Abel - Bastrop County SO 5/8/2023 6:56 AM
AT&T doesn't have rtt, but the last time I did a search warrant on them, they have NELOS, which estimates the phone's actual location. As for GPS, as I understand it, when it sends auto crash data, it sends the actual location of the phone, but I'm not 100% sure about that.
Avatar
Ok we’re sending a team to do a search right now. Here’s hoping it’s gps from the phone.
Avatar
Russell Abel - Bastrop County SO 5/8/2023 6:58 AM
I assume that you're looking for the vehicle?
Avatar
No the phone. Suspect was dumping burner phones
Avatar
Russell Abel - Bastrop County SO 5/8/2023 6:59 AM
Do you have the vehicle?
Avatar
This phone was the original however and was present with the suspect at the scene
6:59 AM
While is several states away. Seized so it isn’t available yet for forensics
7:00 AM
Vehicle*. Not “while”
Avatar
Russell Abel - Bastrop County SO 5/8/2023 7:01 AM
Gotcha. Good luck finding the phone!
Avatar
Just got info from 911 claiming its within 5 meters HAS to be gps. I’ll let you all know if we find it as it’s good info for future reference.
👍 2
7:09 AM
Fyi when Apple auto calls 911 it’s dictates the the dispatcher the gps coordinates of the device.
👍 2
Avatar
Andrew Rathbun 5/8/2023 8:32 AM
@mxNinja17best of luck!
Avatar
Device found almost immediately. 🔥
Avatar
manuelevlr 5/9/2023 1:08 AM
Hi everyone, I have an old iPhone 6. What software do you recommend to force the update to iOS > 13? Thank you
Avatar
There's no iOS 13 for iPhone 6. 12.5.7 is the last available one
Avatar
manuelevlr 5/9/2023 1:56 AM
Isn't there a way to force this?
Avatar
there's nothing to force. Apple did not make iOS 13 for iPhone 6
Avatar
Hello community! Does anyone have experience with rights protected messages of O365? I already know that you can’t decrypt them after its collection through the eDiscovery tool but, what if I have the .pst file from the laptop? Is there anything I can do?
Avatar
I have a PUP sample that wont install on any.run or tria.ge. I tried running it in a normal w10 vm which works but then I dont get the reporting obviously. What can I use to check which files it writes etc? Or is there some way to get it working in anyrun/triage?
Avatar
Avatar
isvak
I have a PUP sample that wont install on any.run or tria.ge. I tried running it in a normal w10 vm which works but then I dont get the reporting obviously. What can I use to check which files it writes etc? Or is there some way to get it working in anyrun/triage?
The classic suggestions here would probably be to use procmon/procdot to easily visualize the activity that related processes are generating
👍 1
Avatar
Avatar
javanzato
The classic suggestions here would probably be to use procmon/procdot to easily visualize the activity that related processes are generating
Thanks! Trying out procmon right now so I seem to be on the right track!
Avatar
Apologize if this isn't the right place to ask. But for those in law enforcement does anyone have a search warrant for Amazon to get video and logs from a Ring or Blink door bell camera? I don't mind typing one up but I was just curious for one to use as a go by.
Avatar
Great guest post from Christopher Collins sharing about Cloud Storage and Digital Forensic Evidence. If you needed to see the research regarding the differences between keeping evidence storage on prem or in the cloud - Chris's paper has got you covered! https://www.hexordia.com/blog-1-1/cloud-storage-and-digital-forensic-evidence
The Future of Digital Forensics How Cloud Storage is Revolutionizing the Digital Industry Abstract: How can we leverage cloud-based storage solutions for digital evidence in a laboratory setting and is it safe? Technology is forever evolving, and one fact remains, storage is a finite resource.
👍 5
🙏 1
Avatar
Thanks for sharing, my agency is looking into a digital evidence management system, so far we have looked into axon and fileonq. Anyone use those systems and how do you like it? Any others to check out?
Avatar
Avatar
ExisT
Thanks for sharing, my agency is looking into a digital evidence management system, so far we have looked into axon and fileonq. Anyone use those systems and how do you like it? Any others to check out?
CLB-dan.techcrime 5/10/2023 1:07 AM
Cellebrite Guardian is worth checking out too
cellebrite 1
Avatar
Avatar
ExisT
Thanks for sharing, my agency is looking into a digital evidence management system, so far we have looked into axon and fileonq. Anyone use those systems and how do you like it? Any others to check out?
Take a look at Monolith Forensics. It's flexible to deploy through on-prem and cloud, good case management and reporting.
Avatar
Loz📱🕵 5/10/2023 3:11 AM
"data\sec\photoeditor\0\storage\emulated\0\DCIM\Screenrecordings" Does anyone have an explanation for this file path please?
Avatar
Hey Everyone, I could really use some help. I have a situation that I am trying my best to work out in my personal life. Situation: A family friend (25yo) was diagnosed with Cancer, a week later got married to her bf, they went on a destination wedding/honeymoon. All photos were taken on iPhone. They were then backed up to a MacBook 2015, and removed from the iPhone. Then from the MacBook to an external drive which is formatted as HFS for whatever reason and removed from the MacBook. I have never worked on Mac file systems before and so I could use some help. What I have done so far is used the external drive in Autopsy, here I can see some photos approximately 2/3 are accessible but they insist that all photos should be there, there is no references to any deleted files at all and all additional storage volumes are completely blank. So I dont think they got copied to the drive. They are offering their laptop, that the files were deleted but it hasnt been used enough that it likely hasnt been overwritten. What help I need is: To do this, my thought is to remove the drive and treat it the same as an external drive. Is this going to cause issues with the OS if I then try to reinstall it? Typically for work while on Windows, I collect evidence of specific files, not entire disks. I am just trying to do my best with this as I initially referred them to some professional services but they quoted a $1k analysis fee and $4k recovery if they find anything. So any advise anyone can provide would be much appreciated.
Avatar
Heimdall4N6K 5/10/2023 9:02 AM
don’t know if a free hfs reader for windows can help you: https://hfsexplorer.en.softonic.com/?ex=DINS-635.2
Free tool for HFS files
9:03 AM
and if you want to convert heic files to jpg another free tool: https://imazing.com/fr/converter
iMazing Converter est une application gratuite pour Mac et PC permettant de convertir des photos HEIC en JPEG ou PNG, et des vidéos HEVC en MPEG-4.
9:05 AM
tell me if useful.
9:06 AM
to recover deleted files you can try photorec
Avatar
Establishing a local cyber lab. What wishlist items should we request?
Avatar
Russell Abel - Bastrop County SO 5/10/2023 2:21 PM
A pay raise 🙂
Avatar
Computers
Avatar
if you foresee any password cracking, might be good to wishlist some workstations with decent GPUs or perhaps a bit of cloud spend budget
Avatar
Multi year software license subscriptions so you're only pulling your hair out every few years dealing with purchasing instead of every year 🙃
💯 2
Avatar
Avatar
sstallm2
Establishing a local cyber lab. What wishlist items should we request?
DeeFIR 🇦🇺 5/10/2023 5:05 PM
Depends on what your ‘cyber’ tasks look like. Software/tools/storage/covert infrastructure/training/labs, the list is potentially endless.
Avatar
Check with any other agencies or departments in your area if you can that already have some type of DFIR/cyber lab. See what they like, don't like, what challenges they've had (besides budget, b/c I think we all have that problem 😅 ). It really also depends on what your in-house technical capabilities are. If you are going to focus on mobile forensics that looks different then trying to outfit something focusing on more computer/network forensics. Although pretty much all the departments in my area start with getting the capabilities to do mobile forensics, since that pretty much dominates most cases they see locally. Whatever software you go with, make sure to also including training for it
Avatar
Avatar
sstallm2
Establishing a local cyber lab. What wishlist items should we request?
Heimdall4N6K 5/11/2023 4:34 AM
data storage
💯 1
Avatar
Dr. Kaan Gündüz 5/11/2023 11:00 AM
having set up 2 huge labs and spent a lot of money, all i can say is you should decide what is important to you. if you are going to deal with X, buy stuff for X. if you won't, don't spend your budget on one thing that you will never use. storage gets cheaper, computers get better, it's best to invest in people and training. (edited)
💯 4
this 1
Avatar
Avatar
Dr. Kaan Gündüz
having set up 2 huge labs and spent a lot of money, all i can say is you should decide what is important to you. if you are going to deal with X, buy stuff for X. if you won't, don't spend your budget on one thing that you will never use. storage gets cheaper, computers get better, it's best to invest in people and training. (edited)
storage gets cheaper, computers get better, it's best to invest in people and training. Excellent advice, I love it.
Avatar
I am performing a facebook messenger download directly from Facebook as HTML format. Does anyone know of an app that can ingest the data and make it look pretty ?
Avatar
Heimdall4N6K 5/11/2023 12:15 PM
if it’s html use a web browser
🤣 1
Avatar
When exported, theyre in 2.5 GB zip files, I wanted to consolidate everything
Avatar
Heimdall4N6K 5/11/2023 12:24 PM
found this don’t know if it’s what you want : https://socialdata.site/chapter_04/
The social web has become an ever-more important part of people’s lives. This book provides its readers with an understanding of the kind of data that can be mined from the social web, of the insights that can be gained from it, and of the limitations of its scope.
Avatar
Thanks, I used the step to download directly from FB.
12:25 PM
Just looking into a tool to consolidate and display the contents
Avatar
Anybody have any knowledge on the status of the AFF4 image format? I heard about it a couple years back and was really excited, but haven't seen much about its development since.
Avatar
when you use digital collector on newer macs, it saves as aff4
👍 1
Avatar
Avatar
Cole
Anybody have any knowledge on the status of the AFF4 image format? I heard about it a couple years back and was really excited, but haven't seen much about its development since.
Heimdall4N6K 5/11/2023 12:37 PM
what do you mean by status ?
Avatar
Avatar
Heimdall4N6K
what do you mean by status ?
Support for imaging in the AFF4 format as well as processing AFF4 formats in forensic tools. I'm wondering when we might be able to use AFF4 as our standard image format vs RAW or E01.
Avatar
Heimdall4N6K 5/11/2023 12:41 PM
Well, good day. My name is Bradley Schatz, I’m from Evimetry. Today I’m here, it’s my distinct pleasure to be ... Read more
12:42 PM
axiom, autopsy… support aff4 format
Avatar
Avatar
Cole
Anybody have any knowledge on the status of the AFF4 image format? I heard about it a couple years back and was really excited, but haven't seen much about its development since.
Like @Jay528 says, digital collector on modern Mac’s use AFF4 as standard. Most forensic tools work with this format such as X-Ways, Axiom, inspector, I heard EnCase does (or planning to release) support for it also.
Avatar
Heimdall4N6K 5/11/2023 12:45 PM
arsenal image mounter support aff4 to
Avatar
Yeah that's the webinar I attended. Lots of advantages to AFF4. I was hoping that X-Ways, Axiom, and FTK Imager would support imaging in AFF4 by now. Does anyone know if there is a reason why it hasn't become more widespread yet? I am happy to see several tools support it now, though. Last time I looked it was about one or two tools could image to the format.
Avatar
Hey DFIR gurus, what would be your wishlist of applications running on an endpoint at the time of an intrusion? Would sysmon / windows event log suffice?
Avatar
Avatar
Cole
Yeah that's the webinar I attended. Lots of advantages to AFF4. I was hoping that X-Ways, Axiom, and FTK Imager would support imaging in AFF4 by now. Does anyone know if there is a reason why it hasn't become more widespread yet? I am happy to see several tools support it now, though. Last time I looked it was about one or two tools could image to the format.
Things have progressed a bit strange with AFF and then AFF4, especially in terms of awkward implementations by third parties and project-related pages scattered in various places. We didn’t have much luck finding tools that support the creation of AFF4 disk images. (See https://discord.com/channels/427876741990711298/427936091220344833/959032798642049054)
Discord is the easiest way to communicate over voice, video, and text. Chat, hang out, and stay close with your friends and communities.
👍 1
1:53 PM
It has great potential, probably just needs someone to focus all the resources in one place and be an implementation cheerleader.
Avatar
Avatar
Logan
Hey DFIR gurus, what would be your wishlist of applications running on an endpoint at the time of an intrusion? Would sysmon / windows event log suffice?
trickyricky 5/11/2023 4:54 PM
EDR &| sysmon for sure, extended retention for other windows logs (edited)
Avatar
Has anyone here used socradar/socradar.io in their organization? Whats peoples thoughts on it?
5:24 PM
Specifically their Digital Risk Protection services/aspect? Is it any good?
5:26 PM
"Credential detection technologies"
Avatar
Avatar
Logan
Hey DFIR gurus, what would be your wishlist of applications running on an endpoint at the time of an intrusion? Would sysmon / windows event log suffice?
Sysmon for sure, but it has to be tuned. And that the logs are shipped to a central location like a SIEM.
Avatar
@Magnet Forensics is it possible to get a Trial License for Magnet Axiom? if yes, what information do you need?
Avatar
Avatar
DFIR_tist
@Magnet Forensics is it possible to get a Trial License for Magnet Axiom? if yes, what information do you need?
Patrick.Beaver 5/12/2023 2:10 AM
I will DM you magnetforensics
Avatar
MrMacca (Allan Mc) 5/12/2023 7:04 AM
Got a question relating to a little python script I've created (chatgpt :P) that basically converts all audio containing speech within a folder to text. I want to introduce it to investigators so that they can search the text, but what are the stumbling blocks of using this to find evidence, if and when it goes to court? Not that the text would be used as evidence, but mainly to point towards things of interest. In my testing, accuracy was amazing, however when I started processing some actual evidence of scam calls...accuracy was pretty bad. This is because the audio was horrendous to begin with. So it has it's pitfalls. I strongly believe it could be a game changer, allowing videos and audio to be key word searched. The script logs all of the text and links it to the original audio with some rough time stamps.
Avatar
Avatar
MrMacca (Allan Mc)
Got a question relating to a little python script I've created (chatgpt :P) that basically converts all audio containing speech within a folder to text. I want to introduce it to investigators so that they can search the text, but what are the stumbling blocks of using this to find evidence, if and when it goes to court? Not that the text would be used as evidence, but mainly to point towards things of interest. In my testing, accuracy was amazing, however when I started processing some actual evidence of scam calls...accuracy was pretty bad. This is because the audio was horrendous to begin with. So it has it's pitfalls. I strongly believe it could be a game changer, allowing videos and audio to be key word searched. The script logs all of the text and links it to the original audio with some rough time stamps.
I think it would be like any other form of parsing evidence, the source would need to be verified. It sounds very similar in practice to OCR tools that pull the text out of images and PDF documents. The actual item of interest is still the image or PDF, it just allows for quick searching. Are you able to share the script? I am sure others could benefit from it.
Avatar
MrMacca (Allan Mc) 5/12/2023 7:13 AM
Yeah that's how i was interpreting it too. I've seen OCR of images produce some hilarious outputs, yet it does also work amazing. I'll have to speak with my managers to see if it can be shared, I'd be happy to if given the green light.
👍 2
Avatar
Avatar
MrMacca (Allan Mc)
Got a question relating to a little python script I've created (chatgpt :P) that basically converts all audio containing speech within a folder to text. I want to introduce it to investigators so that they can search the text, but what are the stumbling blocks of using this to find evidence, if and when it goes to court? Not that the text would be used as evidence, but mainly to point towards things of interest. In my testing, accuracy was amazing, however when I started processing some actual evidence of scam calls...accuracy was pretty bad. This is because the audio was horrendous to begin with. So it has it's pitfalls. I strongly believe it could be a game changer, allowing videos and audio to be key word searched. The script logs all of the text and links it to the original audio with some rough time stamps.
Digitalferret 5/12/2023 7:33 AM
[ stumbling blocks of using this to find evidence] - i used Audiate from Techsmith on a trial basis. i think for general speech and language they do ok, but put in anything that doesn't fit the standard model or uses niche/tech language, slang, it falls well short. i used air traffic audio and it was absolutely hopeless. Maybe biasing an AI model might help if the language has a regularly used specific set of words / grammar.
Avatar
Avatar
MrMacca (Allan Mc)
Got a question relating to a little python script I've created (chatgpt :P) that basically converts all audio containing speech within a folder to text. I want to introduce it to investigators so that they can search the text, but what are the stumbling blocks of using this to find evidence, if and when it goes to court? Not that the text would be used as evidence, but mainly to point towards things of interest. In my testing, accuracy was amazing, however when I started processing some actual evidence of scam calls...accuracy was pretty bad. This is because the audio was horrendous to begin with. So it has it's pitfalls. I strongly believe it could be a game changer, allowing videos and audio to be key word searched. The script logs all of the text and links it to the original audio with some rough time stamps.
I have been working on testing and utilizing whisper to script out processing the text output and then searching the output with a keyword list. So far I have been just explaining to others that it is just a speculative tool to help you get an idea as to what is going on in say an interview. It is still up to the investigator to make a full review and verify/validate the efforts/findings of the tool. So far it has been a pretty positive work. I can see it really helping to chop down the output quickly then if the investigator populates a keyword list based on their particular investigation such as street addresses and names/nicknames it can at least help you possibly pinpoint areas of interest in an interview
Avatar
Avatar
MrMacca (Allan Mc)
Got a question relating to a little python script I've created (chatgpt :P) that basically converts all audio containing speech within a folder to text. I want to introduce it to investigators so that they can search the text, but what are the stumbling blocks of using this to find evidence, if and when it goes to court? Not that the text would be used as evidence, but mainly to point towards things of interest. In my testing, accuracy was amazing, however when I started processing some actual evidence of scam calls...accuracy was pretty bad. This is because the audio was horrendous to begin with. So it has it's pitfalls. I strongly believe it could be a game changer, allowing videos and audio to be key word searched. The script logs all of the text and links it to the original audio with some rough time stamps.
To be more direct with the potential stumbling blocks I think they are the same with any tool/script/operation and that should be made clear to all of those who you demonstrate the process to that it is incumbent on the end user of the tool to verify and validate the work product and to not rely on it. I have told others "you are the ones that would testify to this, so you need to do your homework and not completely rely on this tool(s)". hope this helps
Avatar
Avatar
Cole
Support for imaging in the AFF4 format as well as processing AFF4 formats in forensic tools. I'm wondering when we might be able to use AFF4 as our standard image format vs RAW or E01.
spicy_caveman 5/12/2023 11:29 AM
OSForensics parses AFF4 beautifully.
Avatar
MrMacca (Allan Mc) 5/12/2023 11:45 AM
@ByteSweep @Digitalferret Thanks for the information. Yeah whisper is also the tool i've utilised too. Good stuff
👍🏻 1
Avatar
Avatar
Jay528
Just looking into a tool to consolidate and display the contents
if you or your agency are part of NDCAC, you can download .social to help parse it
Avatar
thanks, private company now
1:54 PM
🙂
Avatar
digital Bowles 5/12/2023 2:17 PM
I am currently working for a LE agency. Does anyone work for a LE agency full-time, and maybe part-time with a private attorney using their digital ninja skills. I have a couple of questions?
Avatar
I previously was moonlighting on the side, non criminal cases
Avatar
Avatar
Jay528
I previously was moonlighting on the side, non criminal cases
digital Bowles 5/12/2023 4:10 PM
What I am looking to do in my area. Who paid for the tools used? Was it more just case review or actual extractions? (edited)
Avatar
⭐Jigglypuff⭐ 5/12/2023 4:19 PM
guysssss
🥳 1
4:19 PM
Im graduating tomorrow
🥳 5
Avatar
Avatar
digital Bowles
What I am looking to do in my area. Who paid for the tools used? Was it more just case review or actual extractions? (edited)
The consulting company I worked for paid for the tools.
4:23 PM
Depending on the cost, you pass it onto the client
Avatar
Avatar
digital Bowles
I am currently working for a LE agency. Does anyone work for a LE agency full-time, and maybe part-time with a private attorney using their digital ninja skills. I have a couple of questions?
might want to run that outside employment by your agency counsel...not as big a deal if you are not a sworn officer, but still worth checking first
Avatar
Avatar
compufuzz
might want to run that outside employment by your agency counsel...not as big a deal if you are not a sworn officer, but still worth checking first
For sure this. Just on the Face I’d say a major conflict of interest.
Avatar
⭐Jigglypuff⭐ 5/12/2023 9:28 PM
I’m hoping I can land a job soon
9:28 PM
Graduating always makes me nervous
9:30 PM
I’m looking at the job postings here. Is there any entry level jobs available?
Avatar
Avatar
⭐Jigglypuff⭐
I’m looking at the job postings here. Is there any entry level jobs available?
DeeFIR 🇦🇺 5/12/2023 9:56 PM
#training-education-employment might help to let people know which country/region you’re in
Avatar
Hello
Avatar
Hey has anyone dealt with the windows based application for slack? I’m looking to recover chats from the application itself. I believe they’re stored in cache since I’m seeing all the media involved in the chats. If you’ve dealt w this before do you remember the file ext or am I in the completely wrong place
Avatar
Avatar
maddie
Hey has anyone dealt with the windows based application for slack? I’m looking to recover chats from the application itself. I believe they’re stored in cache since I’m seeing all the media involved in the chats. If you’ve dealt w this before do you remember the file ext or am I in the completely wrong place
LαȥყTσɯɳTҽƈԋιҽ★ 5/13/2023 10:30 AM
A guide to handling Slack data in litigation and internal investigations, this guide lays out the basics of Slack, from an introduction to the app, to Slack preservation settings, how to export data from Slack, and tips for efficient, effective review.
10:31 AM
Anyone doing anything interesting with AI and incident response? (edited)
10:32 AM
Thinking of doing a master's program in AI and I'm interested in specialising in IR or detection & response artificial intelligence
Avatar
Avatar
LαȥყTσɯɳTҽƈԋιҽ★
Anyone doing anything interesting with AI and incident response? (edited)
I've used ChatGPT to write some scripts, that's about it. It's not perfect, but it does better then my poor python skills 😅
💯 1
Avatar
LαȥყTσɯɳTҽƈԋιҽ★ 5/13/2023 10:36 AM
ChatGPT feels like it has gotten worst or something, could be wrong
Avatar
It will be interesting if somethings can be automated with AI in the future. I don't think many things in DFIR can ever be fully automated when it comes to analyzing data.
👍 1
Avatar
Avatar
LαȥყTσɯɳTҽƈԋιҽ★
ChatGPT feels like it has gotten worst or something, could be wrong
It's for sure hit or miss with what you get from it
Avatar
Avatar
LαȥყTσɯɳTҽƈԋιҽ★
ChatGPT feels like it has gotten worst or something, could be wrong
There's been a lot of alignment work to keep it from saying objectionable things. Perhaps that's impacting quality?
Avatar
Avatar
CyberGhost
It will be interesting if somethings can be automated with AI in the future. I don't think many things in DFIR can ever be fully automated when it comes to analyzing data.
I don't think full automation is feasible because the hallucination/false positive problem seems unlikely to be fully solved. It could be useful for flagging things for later analysis, though.
👍 1
Avatar
Avatar
CyberGhost
It will be interesting if somethings can be automated with AI in the future. I don't think many things in DFIR can ever be fully automated when it comes to analyzing data.
LαȥყTσɯɳTҽƈԋιҽ★ 5/13/2023 10:38 AM
Things don't need to be fully automated imo, I think the future of AI will be tools that assist experts rather than replace them
Avatar
Avatar
IHave
I don't think full automation is feasible because the hallucination/false positive problem seems unlikely to be fully solved. It could be useful for flagging things for later analysis, though.
LαȥყTσɯɳTҽƈԋιҽ★ 5/13/2023 10:38 AM
Bingo
10:41 AM
I think the industry needs to shift away from the idea of replacing workers and instead focus on support and assistance (edited)
10:41 AM
A lot of the AI industry is hype too
Avatar
Avatar
IHave
I don't think full automation is feasible because the hallucination/false positive problem seems unlikely to be fully solved. It could be useful for flagging things for later analysis, though.
Agree 100 percent. Too much of DFIR needs a human to review the data. I'm thinking more in like automated parsing data, etc. We already have a ton of tools that can do a lot of this, but stringing them all together to get data "ready for review" for an analysis.
Avatar
Avatar
CyberGhost
Agree 100 percent. Too much of DFIR needs a human to review the data. I'm thinking more in like automated parsing data, etc. We already have a ton of tools that can do a lot of this, but stringing them all together to get data "ready for review" for an analysis.
LαȥყTσɯɳTҽƈԋιҽ★ 5/13/2023 10:43 AM
Very true!
Avatar
Github seems to be moving that direction in software development. They're currently expanding copilot (ML-powered multi-line code autocomplete) to have a series of additional tools to augment software developers, not replace them entirely. Github is owned by Microsoft, which de-facto owns OpenAI. See https://githubnext.com/
GitHub Next investigates the future of software development
Avatar
Yeah some people, and mostly from people that are not technical from my experience, hear about AI and they think it's going to replace every humans job lol
Avatar
Avatar
CyberGhost
Yeah some people, and mostly from people that are not technical from my experience, hear about AI and they think it's going to replace every humans job lol
LαȥყTσɯɳTҽƈԋιҽ★ 5/13/2023 10:51 AM
Yeah this is very true, I feel like a lot of creativity people are sort of over reacting to all this AI hype, nobody is going to want their serious art works be done by an AI
Avatar
Not trying to stop the conversation in this channel, but there were a few links and good thoughts about AI for DFIR shared in this thread.
👍🏻 3
Avatar
Avatar
LαȥყTσɯɳTҽƈԋιҽ★
Very helpful! Thank you! I guess I’m interested to see if which logs hold the settings for the retention of these messages… maybe it’ll make more sense to why I’m not finding the messages
👍🏿 1
Avatar
Anyone here still use FREDs?
👍 2
Avatar
Deleted User 5/14/2023 11:11 AM
As part of an investigation into a phishing scheme, I'd like to get access to a virustotal file. However, special access is required to get this file. Does anyone have experience getting this type of access, or know anyone I can talk to about this? Ref: https://developers.virustotal.com/reference/files-download
This endpoint is similar to GET /files/{id}/download_url, but it redirects you to the download URL. The download URL you are redirected to can be reused as many times as you want for a period of 1 hour. After that period the URL expires and can't be used anymore.
Avatar
Deleted User 5/14/2023 1:50 PM
Hey, are there any fast tools that can parse the C:\$MFT or $i30 of the whole system where we can specify the date range to output the results?
Avatar
Avatar
Deleted User
Hey, are there any fast tools that can parse the C:\$MFT or $i30 of the whole system where we can specify the date range to output the results?
Heimdall4N6K 5/14/2023 1:58 PM
maybe eric zimmerman tools, not sure for date range…
👍 1
Avatar
Avatar
Deleted User
Hey, are there any fast tools that can parse the C:\$MFT or $i30 of the whole system where we can specify the date range to output the results?
trickyricky 5/14/2023 3:28 PM
Zimmermans tools for sure, MFTECmd + Timeline Explorer
Avatar
Deleted User 5/14/2023 3:29 PM
Ty both :)
Avatar
randomaccess 5/14/2023 3:33 PM
Mftecmd won't work for i30 at scale
Avatar
Avatar
Deleted User
Hey, are there any fast tools that can parse the C:\$MFT or $i30 of the whole system where we can specify the date range to output the results?
randomaccess 5/14/2023 3:33 PM
Use indxripper for the whole file system
3:34 PM
If you want to use mftecmd at scale for this you basically need to export all the $i30 files and then use kape
3:34 PM
I run bulk extractor to dump out $i30s and then kape+mftecmd in ransomware cases on encrypted disks. It is very slow
Avatar
Deleted User 5/14/2023 3:34 PM
Indxripper is what I like for this to be fair
3:34 PM
It's just that
Avatar
randomaccess 5/14/2023 3:35 PM
Yep it's cool
Avatar
Deleted User 5/14/2023 3:35 PM
I made a powershell tool to read .csv, find files by their paths and check their contents for specific strings
3:36 PM
But it's slow on 300k+ kb
3:36 PM
Does it have an option to maybe only parse by Last Accessed to be current date
Avatar
randomaccess 5/14/2023 3:38 PM
Use timeline explorer
3:38 PM
But yeah checking the content is going to be a bit hard with the
3:38 PM
Tle*
3:38 PM
Xways would work, if you've got the path list you can filter for all of them at once and then run a string search over the filtered files
Avatar
Avatar
Deleted User
Does it have an option to maybe only parse by Last Accessed to be current date
randomaccess 5/14/2023 3:39 PM
You may need to use a few steps. Run indxripper, and then run a python script to ingest the CSV and filter for your dates
Avatar
Deleted User 5/14/2023 3:40 PM
Oh I haven't thought about a script to separate dates, that might actually do the trick
Avatar
randomaccess 5/14/2023 3:41 PM
If you do it regularly enough Otherwise I'd just use TLE, so a search for the date string and then save the result out to xlsx
Avatar
Deleted User 5/14/2023 3:42 PM
Yup, thank you!
Avatar
Avatar
Deleted User
Hey, are there any fast tools that can parse the C:\$MFT or $i30 of the whole system where we can specify the date range to output the results?
spicy_caveman 5/15/2023 9:17 AM
I have always been a fan of OSForensics
👍 1
Avatar
Looking for training (online/in-person) for evidence handling which would be appropriate for everyone from field technician to evidence room staff. Any suggestions? We are presently looking at the International Associate of Property and Evidence (IAPE) courses, but thought I would see if there was anything else available.
Avatar
Avatar
sholmes
Looking for training (online/in-person) for evidence handling which would be appropriate for everyone from field technician to evidence room staff. Any suggestions? We are presently looking at the International Associate of Property and Evidence (IAPE) courses, but thought I would see if there was anything else available.
Have you looked at NW3C? They have some short online "first responder"/evidence collection offerings, and some in-person as well: https://www.nw3c.org/UI/CourseDetails.html?courseId=248
👍 1
Avatar
@5cary I haven't, but great lead.
Avatar
Anyone on that's any good with CCNA/PacketTracer?
Avatar
https://arstechnica.com/information-technology/2023/05/microsoft-is-scanning-the-inside-of-password-protected-zip-files-for-malware/ So if I'm reading this correctly and Microsoft is bruteforcing or otherwise cracking passwords in order to expand and scan the contents of zip files, I wonder if "successes" are stored somewhere? Like when you write a paper to MS for a OneDrive account, can you now ask for any calculated passcodes for encrypted containers found in the account?
If you think a password prevents scanning in the cloud, think again.
Avatar
Avatar
whee30
https://arstechnica.com/information-technology/2023/05/microsoft-is-scanning-the-inside-of-password-protected-zip-files-for-malware/ So if I'm reading this correctly and Microsoft is bruteforcing or otherwise cracking passwords in order to expand and scan the contents of zip files, I wonder if "successes" are stored somewhere? Like when you write a paper to MS for a OneDrive account, can you now ask for any calculated passcodes for encrypted containers found in the account?
this is probably only for really simple passwords like "infected"
1:39 PM
Virustotal, for example, will populate/store the password to some zip files that get uploaded, assuming they can open it, but most often "infected" is the password if there is one reported
Avatar
Avatar
whee30
https://arstechnica.com/information-technology/2023/05/microsoft-is-scanning-the-inside-of-password-protected-zip-files-for-malware/ So if I'm reading this correctly and Microsoft is bruteforcing or otherwise cracking passwords in order to expand and scan the contents of zip files, I wonder if "successes" are stored somewhere? Like when you write a paper to MS for a OneDrive account, can you now ask for any calculated passcodes for encrypted containers found in the account?
Lowest hanging fruit, other than "infected", is probably using the passwords that the bad actors include in the email bodies for the victims to then use when they open the "extremely important and properly secured" attachments? If Microsoft is doing more creative things that would be interesting. (edited)
Avatar
Does anyone know if an iPhones mobile ad ID can be found in the system files?
Avatar
what system files are you talking about?
Avatar
As in the searching the file system provided through a GK extract
Avatar
Avatar
Just Scott
Anyone on that's any good with CCNA/PacketTracer?
I have used it some and I do have my CCNA.
Avatar
Avatar
Arsenal
Lowest hanging fruit, other than "infected", is probably using the passwords that the bad actors include in the email bodies for the victims to then use when they open the "extremely important and properly secured" attachments? If Microsoft is doing more creative things that would be interesting. (edited)
Could also be checking the CRC-32 hash of the files in the zip.
Avatar
Is it possible to get access to a free trial of Cellebrite or Oxygen as a student? I'm a cybersecurity student and am looking to get hands-on training with these tools as I explore forensics as a career, and I know that Axiom, Cellebrite, and Oxygen are well regarded.
4:04 PM
I don't believe that my college provides access to these tools as their degree programs focus more on other parts of cybersecurity and networking-- things that CompTIA certs would cover basically.
Avatar
Digitalferret 5/16/2023 4:17 PM
@Cellebrite @Oxygen Forensics @Magnet Forensics ^ (edited)
👍 1
Avatar
Avatar
voidBox
Is it possible to get access to a free trial of Cellebrite or Oxygen as a student? I'm a cybersecurity student and am looking to get hands-on training with these tools as I explore forensics as a career, and I know that Axiom, Cellebrite, and Oxygen are well regarded.
Digitalferret 5/16/2023 4:18 PM
^
Avatar
#Unknown ?
👍🏻 1
4:18 PM
also thanks, ferret!
Avatar
Avatar
Talmidim
As in the searching the file system provided through a GK extract
Ok - it took forever to open the iPhone DL I had handy, but one source for the advertising ID appears to be: /private/var/mobile/Containers/Data/Application/52E924F9-C42E-4C37-9319-4257346CBFB3/Library/Application Support/com.crashlytics/CLSUserDefaults.plist
4:32 PM
another is listed as: /private/var/containers/Shared/SystemGroup/D9C558FA-FBD2-4EA2-A6AA-6064DEB73691/Library/Caches/com.apple.lsdidentifiers.plist
4:36 PM
the 52E9 path is likely a specific app, listed as "SquareAspect" which I am not familiar with, the D9C55 path seems to be the system path.
Avatar
Avatar
whee30
Ok - it took forever to open the iPhone DL I had handy, but one source for the advertising ID appears to be: /private/var/mobile/Containers/Data/Application/52E924F9-C42E-4C37-9319-4257346CBFB3/Library/Application Support/com.crashlytics/CLSUserDefaults.plist
You are amazing. That's it. It appears to be in each .plist for every app
4:50 PM
It's in the .plist under MCMMetadataUserIdentity [2] personaUniqueString
Avatar
Probably a bit late now haha just about to sit my skills exam and I'm guessing you will be asleep! Haha ill just have to take 99 out of 100 rather than the full 100 lol
Avatar
Avatar
voidBox
I don't believe that my college provides access to these tools as their degree programs focus more on other parts of cybersecurity and networking-- things that CompTIA certs would cover basically.
Oxygen Forensics 5/17/2023 1:17 AM
Hello! The access to demos is limited for students. It is possible to acquire a demo if your course professor or someone from Uni emails us at sales@oxygenforensics.com and asks about issuing a demo. It should also include why it is needed, from what date to what date, etc. It is reviewed case-by-case basis.
Avatar
Avatar
Talmidim
Does anyone know if an iPhones mobile ad ID can be found in the system files?
CLB-dan.techcrime 5/17/2023 5:13 AM
PA displays the IDFA
Avatar
Avatar
Just Scott
Probably a bit late now haha just about to sit my skills exam and I'm guessing you will be asleep! Haha ill just have to take 99 out of 100 rather than the full 100 lol
Yep, I was definitely asleep and I do remember those being picky! I used Jeremy’s IT Lab videos on YouTube to study for my CCNA and can definitely recommend it. His Discord server is fairly active but I can’t say I am active over there that much.
Avatar
@Cellebrite Hi! I have a problem opening a case in inspector after updating the SW from 10.5 to 10 .7.2. It says the case document is from an older version and needs to get updated. I get this message every time I try to open the case, eventough it has been updated. Any clues to what I need to do?
Avatar
CLB_4n6s_mc 5/17/2023 7:20 AM
Try to reinstall the previous version to see if you could open your case so 10.5
Avatar
Do you guys think I can get a position as Incident Response Consultant at Google Mandiant or CrowdStrike? They were hiring in my area and I don't know if I should go for it. Is there anything bad on my resume?
Avatar
Avatar
mika
Do you guys think I can get a position as Incident Response Consultant at Google Mandiant or CrowdStrike? They were hiring in my area and I don't know if I should go for it. Is there anything bad on my resume?
Just go for it. You got this! Worst thing that can happen you wont get accepted. Thats there loss isnt it?
Avatar
Thanks! I'm kind of worried if I don't get the job now, they will flag me on their automated system to reject future applications from me. So I want to give it all on my first try
Avatar
Avatar
mika
Thanks! I'm kind of worried if I don't get the job now, they will flag me on their automated system to reject future applications from me. So I want to give it all on my first try
A lot of people apply more than once to the big name companies. Unless you did something inappropriate, I wouldn't worry about. Go for it!
Avatar
Avatar
CyberGhost
A lot of people apply more than once to the big name companies. Unless you did something inappropriate, I wouldn't worry about. Go for it!
definitely do this- some (many?) orgs HR require an applicant apply to an individual HR job ID. E.g. you applied for only one of the 3x slots in our team? We can't hire you for the other 2 if you didn't apply.
Avatar
Pizzantelope 5/17/2023 12:01 PM
I just got back a 150 page pdf of gps coordinates from Lyft. Anyone have any tools I can dump this in to plot the route on a map? My go to (nighthawk) won't work
Avatar
Avatar
Pizzantelope
I just got back a 150 page pdf of gps coordinates from Lyft. Anyone have any tools I can dump this in to plot the route on a map? My go to (nighthawk) won't work
Sent you a DM
Avatar
Hello Can we search social media profile of a suspect if we have his photo only.
Avatar
Hans Leißner 5/17/2023 11:15 PM
@Cellebrite anyone online for a quick question regarding testversions? Thanks in advance
📬 1
Avatar
Avatar
JC🧐🧐
Hello Can we search social media profile of a suspect if we have his photo only.
Deleted User 5/17/2023 11:20 PM
Your best bet is to try Pimeyes.
Avatar
Avatar
Deleted User
Your best bet is to try Pimeyes.
Is there any trial version for this website
Avatar
Avatar
JC🧐🧐
Is there any trial version for this website
Deleted User 5/18/2023 12:07 AM
They give you some free lookups but obfuscate the URL on any hits you get. Try it first, if you get a hit then consider paying. Option 2 is to crop the suspects image to mugshot proportions and then run a reverse image lookup on Yandex.
Avatar
Does anybody know if Encase Imager has gone end of life? I can't find any reference to it on the OpenText website and their customer support is spectacularly useless.
😂 2
Avatar
Avatar
PeteB
Does anybody know if Encase Imager has gone end of life? I can't find any reference to it on the OpenText website and their customer support is spectacularly useless.
I think v20.3 is still the latest, and has been for a few years.
2:41 AM
Tableau Forensic Imager
2:42 AM
Assuming that's the one you're referring?
Avatar
Avatar
Rob
Assuming that's the one you're referring?
No, way back in the Guidance Software days there were (for the purposes of this discussion) 3 different products. Encase Forensic the full analysis software which required licensing. Encase Imager, a freeware (as far as we knew) standalone program which was just the acquisition capability from within Encase Forensic And Tableau Imager, the standalone acquisition program optimised for use with Tableau Forensic hardware and originally produced by Tableau before they were bought by GS. When OpenText bought GS all 3 were still available and remained available for several years. I've just gone looking for a fresh copy to Encase Imager to see if it has been updated since the last time we checked and can now find no mention of it on the OpenText website. I've been in touch with OpenText's customer support but despite asking about what was previously a freeware program they have said they can't help us because we don't have a current Encase licence (their customer support system is also failing to let me look at my own raised cases but that's a different issue). So I was hoping somebody might know whether they'd sundowned the standalone program in favour of just having the full licenced suite and Tableau Imager.
Avatar
Avatar
PeteB
No, way back in the Guidance Software days there were (for the purposes of this discussion) 3 different products. Encase Forensic the full analysis software which required licensing. Encase Imager, a freeware (as far as we knew) standalone program which was just the acquisition capability from within Encase Forensic And Tableau Imager, the standalone acquisition program optimised for use with Tableau Forensic hardware and originally produced by Tableau before they were bought by GS. When OpenText bought GS all 3 were still available and remained available for several years. I've just gone looking for a fresh copy to Encase Imager to see if it has been updated since the last time we checked and can now find no mention of it on the OpenText website. I've been in touch with OpenText's customer support but despite asking about what was previously a freeware program they have said they can't help us because we don't have a current Encase licence (their customer support system is also failing to let me look at my own raised cases but that's a different issue). So I was hoping somebody might know whether they'd sundowned the standalone program in favour of just having the full licenced suite and Tableau Imager.
News to me they had 3 😄
💯 1
Avatar
Hey, if I obtained both the private and public key, is it possible to derive a decryptor from that?
7:11 AM
Or, what else would I need to do so?
7:11 AM
Am in the process of verifying some of the additional payloads I have, making sure the public matches across them. (edited)
Avatar
Definitely in a better position to do so when compared to not having either of those - you need to reverse the encryption binary and determine how it is performing encryption of files, what algorithm it is using, etc - it is likely that at some point in the process it uses those PKI components to decrypt the symmetric key (often AES or similar) from memory/the sample itself - once you have any relevant symmetric keys and fully understand the encryption algorithm, theoretically sure, you can write a decryptor
7:13 AM
if you have 0 experience reverse engineering, it will be extremely difficult
Avatar
So might want to drop the payload into something like IDA?
7:15 AM
Pro is like 6k. Am willing to spend that, but if there are some less expensive alternatives, I'm open to that.
Avatar
if you've never used IDA/Ghidra before, buying it won't be of much use
Avatar
Everything we've gotten so far has been mostly obtained through process explorer, a hex editor, and some Ghidra stuff I've been working on.
Avatar
it's not a one-click tool
Avatar
Oh don't I know...lol
7:15 AM
If only it was so.
7:16 AM
I've used Ghidra the last few years, but IDA is really nice too lol
Avatar
to write a decryptor, you need two things: 1. The keys used for encryption 2. The algorithm used for encryption
Avatar
Got it, I think it may be AES, and we know it's intermittent, likely for speed.
Avatar
and when I say algorithm, I don't just mean AES
7:17 AM
I also mean, what else is the encryptor doing, for example, are file types treated differently? Is it only doing certain sections of files? etc
💯 1
Avatar
We are also working to determine where the intermittent encryption is taking place, it looks like some in the beginning, and some in the end, with the middle mostly l;eft alone.
👍 1
7:17 AM
Oh shit, good call
7:19 AM
@javanzato thank you for taking the time to answer my questions, and providing good, insightful help. I really do appreciate that. (edited)
Avatar
of course - writing a decryptor is very difficult honestly - takes a lot of effort reversing the payloads to fully understand the complete algorithm, then of course writing the reverse
❤️ 1
Avatar
Well I presently think with what I have currently, it's quite feasible, and will continue working on it with my team. If it can help anyone else affected by this blight, it's worth the efforts.
👍 1
Avatar
government agencies sometimes have decryptors available for some common strains of malware - worth checking if you've already engaged law enforcement
7:57 AM
at least twice I've had federal agencies step in with a decryptor when I was assisting a client (US that is) (edited)
Avatar
Avatar
PeteB
No, way back in the Guidance Software days there were (for the purposes of this discussion) 3 different products. Encase Forensic the full analysis software which required licensing. Encase Imager, a freeware (as far as we knew) standalone program which was just the acquisition capability from within Encase Forensic And Tableau Imager, the standalone acquisition program optimised for use with Tableau Forensic hardware and originally produced by Tableau before they were bought by GS. When OpenText bought GS all 3 were still available and remained available for several years. I've just gone looking for a fresh copy to Encase Imager to see if it has been updated since the last time we checked and can now find no mention of it on the OpenText website. I've been in touch with OpenText's customer support but despite asking about what was previously a freeware program they have said they can't help us because we don't have a current Encase licence (their customer support system is also failing to let me look at my own raised cases but that's a different issue). So I was hoping somebody might know whether they'd sundowned the standalone program in favour of just having the full licenced suite and Tableau Imager.
version 7.10 is their most recent version of Imager
Avatar
Avatar
jaket2452
version 7.10 is their most recent version of Imager
Cheers, Do you have a current link? (edited)
10:05 AM
Avatar
Thanks but that's Tableau Forensic Imager, not Encase Imager
Avatar
Avatar
PeteB
Thanks but that's Tableau Forensic Imager, not Encase Imager
Appears you need a login to access that area.
Avatar
Avatar
PeteB
Does anybody know if Encase Imager has gone end of life? I can't find any reference to it on the OpenText website and their customer support is spectacularly useless.
You are correct, and they do not offer it any more. Latest version I have is 7.10 and I can tell you that it actually was a life saver in a recent case where the evidence was acquired by a 3rd party through EnCase enterprise.
Avatar
Good for evidence! Make sure if phone seized run evidence extraction and harvest before detained person, who might claim never seen the phone before, looks at seized phone. Could possibly contest evidence of face on phone due to detained person being asked to look at phone whilst switched on prior to examination. https://www.linkedin.com/posts/trewmte_did-you-know-that-your-iphones-face-id-silently-activity-7065772761201156096-uMtF?
Good for evidence! Make sure if phone seized run evidence extraction and harvest before detained person, who might claim never seen the phone before, looks at…
Avatar
@Cellebrite has anyone gotten certified with CMFF, CCO, CCPA recently? I know they had a content change in jan 2023. I am wondering how long they typically take and how the course content is done (modality, online? asynchronous? etc.)
Avatar
Avatar
theshark
@Cellebrite has anyone gotten certified with CMFF, CCO, CCPA recently? I know they had a content change in jan 2023. I am wondering how long they typically take and how the course content is done (modality, online? asynchronous? etc.)
Do you mean how long does the course take to complete. We have several training styles. Self paced online. Instructor led live online or in person
Avatar
Avatar
CLB-Paul
Do you mean how long does the course take to complete. We have several training styles. Self paced online. Instructor led live online or in person
Ok thanks. How long does an average candidate take to complete the self paced online version u think ?
Avatar
Really depends. The course itself is ~5 days in total in person. So depends how has you go
11:30 AM
If you want send me a Dm and ill put you in touch with our training group who have a much better sight of that
👍 1
Avatar
does anyone have experince in AI for analyzing data? I am writing my capstone and would love to pick some brains..
Avatar
Avatar
medusa
does anyone have experince in AI for analyzing data? I am writing my capstone and would love to pick some brains..
define 'AI' - I've done some projects using neural networks/text classification machine learning for malware analysis
Avatar
Does anyone have experience with electronic lock embedded system forensics? I have a lock and would like to see if it is possible to determine the last time a cell phone was connected to the device.
Avatar
Avatar
secluding
Does anyone have experience with electronic lock embedded system forensics? I have a lock and would like to see if it is possible to determine the last time a cell phone was connected to the device.
Would this web-link help give you some lines of enquiry? https://www.newelectronics.co.uk/content/features/debug-forensics
The CSI approach to optimising your debug development. By Dunstan Power.
Avatar
kmacdonald1565 5/22/2023 10:14 AM
@ICAC Our office received a NCMEC tip from Snapchat that contained a single .jpg file. No program has opened it up. we tried playing around with a few things but no luck. The file header shows C3 BF C3 98 C3 BF C3 A0 followed by the normal JFIF part of the header...instead of the normal header FF D8 FF E0 followed by the JFIF. In desperation, I tried playing with the hex to get it to open in no avail. I was not assigned this case specifically but was asked to help get this open. Anyone have any ideas or run into a similar thing? cross posted in #computer-forensics
Avatar
Avatar
kmacdonald1565
@ICAC Our office received a NCMEC tip from Snapchat that contained a single .jpg file. No program has opened it up. we tried playing around with a few things but no luck. The file header shows C3 BF C3 98 C3 BF C3 A0 followed by the normal JFIF part of the header...instead of the normal header FF D8 FF E0 followed by the JFIF. In desperation, I tried playing with the hex to get it to open in no avail. I was not assigned this case specifically but was asked to help get this open. Anyone have any ideas or run into a similar thing? cross posted in #computer-forensics
Reach out to NCMEC and let them know. They will resend it. This happens all the time.
Avatar
kmacdonald1565 5/22/2023 10:16 AM
I think that the other detective did, but i will double check. he said something like this is the second time it was sent, but that might have been him logging in to download it again
10:16 AM
I have a binary data(like image file) in Buffer object(not file), and want to serve the raw binary data to client through http.ServerResponse. How can I do it ?
Avatar
Yes typically they will send it via email encrypted
Avatar
kmacdonald1565 5/22/2023 10:16 AM
okay
10:16 AM
thanks!
👍 1
Avatar
Hi all, I'm looking for participants to help me with my PhD research into use of keyword list searching. If you could spare a few minutes to complete an online survey I would be very grateful. Full details are posted in the training-education channel using this link https://discord.com/channels/427876741990711298/427982915230498826/1110255803996315668
🙌 1
Avatar
@here Calling all fellow forensicators! With the permission of admins, I'm asking for anyone who's a user of Axiom to take a couple minutes to fill out this short survey. We're trying to get/maintain an up to date idea of what examiners are seeing in their day to day work in order to better support what you're facing! New apps you're encountering, favorite tools etc. https://forms.office.com/r/5R6s0N3vCs Thank you for all the support!
Avatar
@here ^^ Any Axiom users, your feedback will help make a difference 🙂
✅ 14
💯 7
👀 5
🏳️‍🌈 2
magnetforensics 5
BongoPings 2
poopypants 1
🇬🇧 1
Avatar
Avatar
javanzato
define 'AI' - I've done some projects using neural networks/text classification machine learning for malware analysis
Thank you for replying. I have read that some investigations can use google gpt or something similar to analyze data, like pictures, meteadata, emails, etx.
Avatar
Andrew Rathbun 5/22/2023 11:42 AM
FYI, anyone can post surveys for grad research, vendors, etc, just run it by one of us to make sure we get it in the right channel so we avoid spam. Equal opportunity for all and every 👍
🫡 2
Avatar
Hello! Been looking into new machines for our Computer investigators, anyone got any recommendations on specs nowadays
Avatar
Avatar
Howlo
Hello! Been looking into new machines for our Computer investigators, anyone got any recommendations on specs nowadays
There was a thread a short time ago covering some good builds around AMD and Intel, if you have a search you should be able to find it. I think it was either here or in the computer forensics channel. What’s your budget per machine?
Avatar
Avatar
rojo
There was a thread a short time ago covering some good builds around AMD and Intel, if you have a search you should be able to find it. I think it was either here or in the computer forensics channel. What’s your budget per machine?
Oh great thanks, 4k per machine is the current budget
Avatar
Hi all, has anybody here attended (or did online) any training courses from QA (www.qa.com)? If so, were you satisfied with the content/quality? Thanks in advance! PS: Hope it's okay for me to post this question here!
Avatar
Does anyone use software to identify spoken language? Google translate can't Detect Language from audio clips. I am unable to figure out what language this is before moving on to getting a translator. The group is medium-olive skin individuals with dark hair. The women had head scarves (not worn) and males had no head coverings. (edited)
Avatar
Anyone have some SANS (or other) courses to recommend? I work as a general blue teamer, I have taken the FOR508/GCFA. Recently started to get more interested in detection engineering and purple teaming. I have considered the GPEN to get more ”red” experience perhaps but I am open to suggestions!
Avatar
밍코 (dead,legacy) 5/23/2023 7:09 AM
I accidentally deleted neovim config lua. Can I recover?
7:09 AM
Ubuntu, deleted due to oem installation
Avatar
Avatar
GRIZZ
Does anyone use software to identify spoken language? Google translate can't Detect Language from audio clips. I am unable to figure out what language this is before moving on to getting a translator. The group is medium-olive skin individuals with dark hair. The women had head scarves (not worn) and males had no head coverings. (edited)
Sent you a DM
Avatar
Avatar
GRIZZ
Does anyone use software to identify spoken language? Google translate can't Detect Language from audio clips. I am unable to figure out what language this is before moving on to getting a translator. The group is medium-olive skin individuals with dark hair. The women had head scarves (not worn) and males had no head coverings. (edited)
Heimdall4N6K 5/23/2023 7:51 AM
can try this i don’t know if it’s what you need: https://github.com/openai/whisper
Robust Speech Recognition via Large-Scale Weak Supervision - GitHub - openai/whisper: Robust Speech Recognition via Large-Scale Weak Supervision
Avatar
Avatar
Howlo
Hello! Been looking into new machines for our Computer investigators, anyone got any recommendations on specs nowadays
We are using Fujitsu Celsius workstations. I am very contented. You can configure it a bit to your wishes. (edited)
❤️ 1
Avatar
Avatar
Howlo
Oh great thanks, 4k per machine is the current budget
Ross Donnelly 5/23/2023 12:50 PM
I screenshotted this last time it came up, to remind when our refresh comes round
❤️ 1
Avatar
Avatar
Ross Donnelly
I screenshotted this last time it came up, to remind when our refresh comes round
Cheers for the help!
Avatar
Avatar
Howlo
Hello! Been looking into new machines for our Computer investigators, anyone got any recommendations on specs nowadays
DM me if you'd like to chat, but we actually now produce systems for investigators vs examiners. Specs that I think work are quick CPUs, healthy RAM, and maybe a dedicated GPU, but for most that's probably overkill.
Avatar
Someone from @Cellebrite available for a DM?
📬 1
Avatar
Same here. Someone from @Cellebrite available for a DM?
📬 1
Avatar
Avatar
Howlo
Hello! Been looking into new machines for our Computer investigators, anyone got any recommendations on specs nowadays
spicy_caveman 5/24/2023 5:55 AM
I have used Silicon Forensics for a decent build at the price point.
Avatar
Avatar
Howlo
Hello! Been looking into new machines for our Computer investigators, anyone got any recommendations on specs nowadays
JLindmar (83AR) 5/24/2023 7:13 AM
If you aren't already, try using PCPartPicker (https://pcpartpicker.com) to build your machines - it makes it easy to see compatible parts and general pricing. I just rebuilt my teams analysis machines right now. Here are the specs (and per item cost) I went with, which should be a nice balance of price and performance: 1     Intel Core i9-12900K 3.2 GHz 16-Core Processor  $409.99      1     Noctua NH-D15 chromax.black 82.52 CFM CPU Cooler (I'm not a fan of water cooling)      $109.95      1     Asus ProArt Z690-CREATOR WIFI ATX LGA1700 Motherboard $419.99      2     G.Skill Ripjaws S5 32 GB (2 x 16 GB) DDR5-6000 CL38 Memory  $169.99      3     Samsung 980 Pro 2 TB M.2-2280 PCIe 4.0 X4 NVME Solid State Drive (Temp data for specific tools)  $199.99      2     Samsung 870 Evo 2 TB 2.5" Solid State Drive (1 OS | 1 Programs)     $159.99      1     Phanteks Enthoo Primo ATX Full Tower Case $289.99 I'm reusing the following parts from a previous build: 1     EVGA SuperNOVA 1000 T2, 80+ TITANIUM 1000W      $297.63 1     GeForce GTX 1060 GPU 4     Western Digital Ultrastar 6TB (RAID 10)   $189.00 You will save significant $ if you can build (and troubleshoot) yourself, but if you prefer having something that just works out-of-the-box and the tech. support to go with it, buying a pre-built system may be a better choice.
sumuri_alt 1
this 1
Avatar
wondering if anyone has any law enforcement contact for Google Canada?
Avatar
Avatar
JLindmar (83AR)
If you aren't already, try using PCPartPicker (https://pcpartpicker.com) to build your machines - it makes it easy to see compatible parts and general pricing. I just rebuilt my teams analysis machines right now. Here are the specs (and per item cost) I went with, which should be a nice balance of price and performance: 1     Intel Core i9-12900K 3.2 GHz 16-Core Processor  $409.99      1     Noctua NH-D15 chromax.black 82.52 CFM CPU Cooler (I'm not a fan of water cooling)      $109.95      1     Asus ProArt Z690-CREATOR WIFI ATX LGA1700 Motherboard $419.99      2     G.Skill Ripjaws S5 32 GB (2 x 16 GB) DDR5-6000 CL38 Memory  $169.99      3     Samsung 980 Pro 2 TB M.2-2280 PCIe 4.0 X4 NVME Solid State Drive (Temp data for specific tools)  $199.99      2     Samsung 870 Evo 2 TB 2.5" Solid State Drive (1 OS | 1 Programs)     $159.99      1     Phanteks Enthoo Primo ATX Full Tower Case $289.99 I'm reusing the following parts from a previous build: 1     EVGA SuperNOVA 1000 T2, 80+ TITANIUM 1000W      $297.63 1     GeForce GTX 1060 GPU 4     Western Digital Ultrastar 6TB (RAID 10)   $189.00 You will save significant $ if you can build (and troubleshoot) yourself, but if you prefer having something that just works out-of-the-box and the tech. support to go with it, buying a pre-built system may be a better choice.
Only 32gb memory? Would suggest 128 min but looks good otherwise
Avatar
Avatar
Rob
Only 32gb memory? Would suggest 128 min but looks good otherwise
JLindmar (83AR) 5/24/2023 10:39 AM
2 x 32 packages ( 4 x 16 GB) for 64 total. For the applications we are typically using I rarely see that amount being fully utilized. In my experience, maximizing I/O by segregating OS, programs, data, etc. on fast storage has this most impact on processing performance. (edited)
Avatar
Avatar
JLindmar (83AR)
2 x 32 packages ( 4 x 16 GB) for 64 total. For the applications we are typically using I rarely see that amount being fully utilized. In my experience, maximizing I/O by segregating OS, programs, data, etc. on fast storage has this most impact on processing performance. (edited)
Ah gotcha. Was gonna say! Axiom and PA love to rinse memory
Avatar
Avatar
Rob
Ah gotcha. Was gonna say! Axiom and PA love to rinse memory
JLindmar (83AR) 5/24/2023 10:47 AM
My preference per workflow is PA, and it typically processes an average full filesystem in about 20ish min on our machines. Again, storage I/O optimization seems to have the most impact for me. I toyed with going from 64 to 128 on these builds, but 64 on our previous machines didn't seem to be a bottleneck. Plus, I figured I'd just upgrade the memory in year 3 if need be. XWF is extremely efficient, as is other tools we use. I agree that Axiom and PA (v7 at least) is memory-hungry! I also lean more toward price considering I'm building multiple machines at the same time and I need to stretch my budget for other needs that pop up throughout the year. (edited)
👍 1
Avatar
Avatar
JLindmar (83AR)
If you aren't already, try using PCPartPicker (https://pcpartpicker.com) to build your machines - it makes it easy to see compatible parts and general pricing. I just rebuilt my teams analysis machines right now. Here are the specs (and per item cost) I went with, which should be a nice balance of price and performance: 1     Intel Core i9-12900K 3.2 GHz 16-Core Processor  $409.99      1     Noctua NH-D15 chromax.black 82.52 CFM CPU Cooler (I'm not a fan of water cooling)      $109.95      1     Asus ProArt Z690-CREATOR WIFI ATX LGA1700 Motherboard $419.99      2     G.Skill Ripjaws S5 32 GB (2 x 16 GB) DDR5-6000 CL38 Memory  $169.99      3     Samsung 980 Pro 2 TB M.2-2280 PCIe 4.0 X4 NVME Solid State Drive (Temp data for specific tools)  $199.99      2     Samsung 870 Evo 2 TB 2.5" Solid State Drive (1 OS | 1 Programs)     $159.99      1     Phanteks Enthoo Primo ATX Full Tower Case $289.99 I'm reusing the following parts from a previous build: 1     EVGA SuperNOVA 1000 T2, 80+ TITANIUM 1000W      $297.63 1     GeForce GTX 1060 GPU 4     Western Digital Ultrastar 6TB (RAID 10)   $189.00 You will save significant $ if you can build (and troubleshoot) yourself, but if you prefer having something that just works out-of-the-box and the tech. support to go with it, buying a pre-built system may be a better choice.
We are also putting together a new PA machine and it looks quite similar to this, decide to go for 2x32GB for the ram (giving expansion options in the future) and the 13700 (with liquid because I'm a fan) but otherwise quite similar. Not currently planning on getting a GPU as we don't really use the image processing features.
Avatar
isn't a good GPU good for cracking password hashes? I guess if you are not buying it it is not used often enough to be worth the investment?
Avatar
Avatar
BzdoOREK
isn't a good GPU good for cracking password hashes? I guess if you are not buying it it is not used often enough to be worth the investment?
DeeFIR 🇦🇺 5/25/2023 1:55 AM
Just use a distributed hash brute forcing system instead.. aka post it on discord and let people fight for brownie points 🍻
👍 5
😂 12
hashcat 5
😆 2
Avatar
Avatar
Alexsaurus
We are also putting together a new PA machine and it looks quite similar to this, decide to go for 2x32GB for the ram (giving expansion options in the future) and the 13700 (with liquid because I'm a fan) but otherwise quite similar. Not currently planning on getting a GPU as we don't really use the image processing features.
JLindmar (83AR) 5/25/2023 5:32 AM
The reason why I went with 4 x 16GB is that I typically replace all four DIMMs at upgrade, but I can see where leaving room to expand existing RAM also makes sense. Same thoughts on GPU. I don't typically use PA's media classification in favor of XWF's. If we routinely needed complex password cracking, I'd go distributed or build a dedicated system as opposed to installing a high-end GPU(s). I've personally not been a fan of liquid cooling (always had a fear of a leak), and typically don't overclock, so traditional coolers are what I stick with. LTT recently had a video comparing liquid and traditional coolers: https://youtu.be/1YFR20MmvpM, including the Noctua NH-D15, which was enlightening. (edited)
this 2
Avatar
Avatar
DeeFIR 🇦🇺
Just use a distributed hash brute forcing system instead.. aka post it on discord and let people fight for brownie points 🍻
it works 😛
💯 5
🤣 1
zoomzoom 2
❤️ 2
Avatar
Avatar
chick3nman
it works 😛
can confirm, My aged machines still get the job done when I have access to @chick3nman via Discord.
😎 2
Avatar
Avatar
JLindmar (83AR)
The reason why I went with 4 x 16GB is that I typically replace all four DIMMs at upgrade, but I can see where leaving room to expand existing RAM also makes sense. Same thoughts on GPU. I don't typically use PA's media classification in favor of XWF's. If we routinely needed complex password cracking, I'd go distributed or build a dedicated system as opposed to installing a high-end GPU(s). I've personally not been a fan of liquid cooling (always had a fear of a leak), and typically don't overclock, so traditional coolers are what I stick with. LTT recently had a video comparing liquid and traditional coolers: https://youtu.be/1YFR20MmvpM, including the Noctua NH-D15, which was enlightening. (edited)
I use a closed loop AIO liquid cooler more for the sound reduction. My FRED already sounds like a jet engine idling haha.
Avatar
⭐Jigglypuff⭐ 5/26/2023 4:28 PM
I feel like finding an entry level job in digital forensics is really hard... Ive been applying for jobs but all of them require at least 5 years of experience lol
Avatar
Avatar
⭐Jigglypuff⭐
I feel like finding an entry level job in digital forensics is really hard... Ive been applying for jobs but all of them require at least 5 years of experience lol
I basically waited for a year to get to the position I'm in now and hating every second week of it due to environment. Love the work and industry but dear god the people I've met in the industry lack basic management skills
Avatar
⭐Jigglypuff⭐ 5/26/2023 6:28 PM
Omg a year?! @Picker That’s crazy. I hope I don’t have to wait that long (edited)
6:29 PM
I have double major double minor so I’m applying both Cybersecurity and Data Science with AI positions @Picker
Avatar
Avatar
⭐Jigglypuff⭐
I have double major double minor so I’m applying both Cybersecurity and Data Science with AI positions @Picker
At least in my country cyber security is a bit easy to get into. That is more testing or GRC roles. Forensics is a lot more narrow/more word of mouth options
Avatar
Avatar
⭐Jigglypuff⭐
I feel like finding an entry level job in digital forensics is really hard... Ive been applying for jobs but all of them require at least 5 years of experience lol
You'll be doing a disservice to yourself if you don't apply. Don't say no to yourself, let the company say no. You have nothing to lose. I would rather pick a candidate with personality any day, you can teach them but you can't teach personality (edited)
💯 3
this 2
Avatar
randomaccess 5/27/2023 1:07 AM
Plus demonstrate what you know....if someone's taking a risk in hiring someone with no experience then do everything you can do demonstrate that the risk is lower. If you've got no work experience, start there. Help desk is always a good place, and supplement by creating a website and using that as a portfolio. It's rough but it'll work in the end
this 2
Avatar
I have a question. If I am collecting logs, say windows event viewer logs (EVTX), and in the process of doing so, it changes the log files modified and created at time, is it bad form to allow that, or does that metadata not really matter since the log entries within the file reflect the correct dates and times for an action or activity that's logged?
Avatar
Modifying the MAC times of the actual EVTX files themselves wouldn't really have an impact on an investigation of their contents (typically) - I guess this depends more on the context - for an investigation that may go to court I might be more concerned but for most cyber-attack investigations I don't think this would really matter (edited)
Avatar
Avatar
javanzato
Modifying the MAC times of the actual EVTX files themselves wouldn't really have an impact on an investigation of their contents (typically) - I guess this depends more on the context - for an investigation that may go to court I might be more concerned but for most cyber-attack investigations I don't think this would really matter (edited)
Okay yeah, I had some of those same thoughts as well. My concern is the court admissibility and all that if needed. But yeah for sure, I appreciate your thoughts and answers!
Avatar
Avatar
Pianist
Okay yeah, I had some of those same thoughts as well. My concern is the court admissibility and all that if needed. But yeah for sure, I appreciate your thoughts and answers!
can always just make sure to preserve the originals via a system image or otherwise, then you will always have the source
💯 1
Avatar
For sure!
Avatar
Examiners could be missing out on understanding where evidence can be generated by pseudo-embedded SIM cards (eSIM). Having spoken to quite a few people about this it appears there is a general unawareness based upon believing they had not had exposure to it/them (pseudo-eSIM). Pseudo-eSIMs are actually physical SIMs that trick Android mobile handset circuitry to believe an eSIM is presented and active. Pseudo-eSIMs use the same handset slots as form factor 2FF (mini) micro (3FF) nano (4FF). Because pseudo-embedded SIM cards have a built-in eUICC, which means it meets the consumer eSIM specifications as published by GSMA. Here is a link to an example pseudo-embedded SIM cards is you are unaware https://esim.me/eSIM-for-your-smartphone/#234784-manage_on_any_esim_me_compatible_android-
Equip your smartphone with the eSIM.me Card and start downloading eSIM profiles online! Check eSIM.me compatibility Download the free eSIM.me APP from the Playstore to verify eSIM.me compatibily of your very own smartphone. Then simply insert the eSIM.me Card in the SIM card slot of your sma
Avatar
Yuri Gubanov (Belkasoft) 5/28/2023 6:54 AM
And by the way, upcoming Belkasoft X 2.0 supports extraction of Android eSims
👏 1
Avatar
Still on going since 2007 even if ePOST is no longer under active development. "ePOST is a cooperative, serverless email system. Each user contributes a small amount of storage and network bandwidth in exchange for access to email service." https://www.epostmail.org/ New developments are being built, too. "The most used email systems rely on a central server that receives, stores and forward the messages: FlowingMail is decentralized and does not rely on a central server to deliver the encrypted emails. The scope of the FlowingMail protocol is to hide the information being transmitted and the parties involved in the communication. The main component of the FlowingMail protocol is a Kademlia Distributed Hash Table (DHT), which is responsible for storing the encrypted emails while they are in transit and the certificates of the participants in the FlowingMail network." https://flowingmail.com/
A P2P (decentralized), secure, encrypted email system. Hides the message and the parties involved in the communication.
Avatar
If anyone here is using bitbucket for repositories and you weren't aware: https://bitbucket.org/blog/ssh-host-key-changes
Hello Bitbucket Cloud users, We recently learned that encrypted copies of Bitbucket’s SSH host keys were included in a data breach…
Avatar
LαȥყTσɯɳTҽƈԋιҽ★ 5/29/2023 8:05 AM
Dumb question: what actually happens when a linux CVE is used in wsl and are there any notable case where an attacker has successfully compromised a windows system through wsl?
👀 1
Avatar
So for an assignment I have to decrypt an encrypted disc image file. I’ve never done this before. We aren’t given the encryption type that is used. We were also given a string of 5 letters, but I do not think that is the password because I’ve tried using it and it doesn’t work. The extension is .img. Any ideas are much appreciated.
Avatar
Avatar
Dany
So for an assignment I have to decrypt an encrypted disc image file. I’ve never done this before. We aren’t given the encryption type that is used. We were also given a string of 5 letters, but I do not think that is the password because I’ve tried using it and it doesn’t work. The extension is .img. Any ideas are much appreciated.
My first thought for trying to identify the encryption used is to just use the Linux ‘file’ command, but I am sure that the people over in #password-encryption-cracking have a better idea.
👍 3
Avatar
yep, file triage first: file, binwalk, mmls would be good starts
👍 2
Avatar
Anyone have any suggestions on apps to utilize the mp3 files from SANS to listen to in the car? Traveling in the next few days and would like to listen to those while having google maps open.
Avatar
Avatar
burytoes.
Anyone have any suggestions on apps to utilize the mp3 files from SANS to listen to in the car? Traveling in the next few days and would like to listen to those while having google maps open.
VLC I think would do it, but I think Spotify may also support local file playback as well.
💯 1
Avatar
Avatar
Pianist
VLC I think would do it, but I think Spotify may also support local file playback as well.
exactly what I was looking for!
batsby 1
😍 1
Avatar
Avatar
burytoes.
Anyone have any suggestions on apps to utilize the mp3 files from SANS to listen to in the car? Traveling in the next few days and would like to listen to those while having google maps open.
MP3 are supported in a number of apps. I've listened to them with Apple Music and Spotify
Avatar
S Cote / SQ 5/30/2023 11:54 AM
Hey! About building forensic workstations, and using them for "basic" forensic things like Physical Analyzer / Axiom processing, image acquisition, Nuix Workstation and things like that, would you go with the intel way (i9-13900KS) or with the AMD way (Ryzen 9 7950X)? And why? Thanks!
Avatar
What alternative password lists do you use with Cellebrite Premium? I exhausted the default one with cellebrite and want to try another.
Avatar
Avatar
dcs453
What alternative password lists do you use with Cellebrite Premium? I exhausted the default one with cellebrite and want to try another.
Sent you a DM
Avatar
Looking for a good resource for email header analysis. Looking to see if we can trace potential fraudulent emails back to a source. I only have an excel spreadsheet which contains the header information for all incoming emails of concern. Not case related, just an inhouse fishing expedition.
Avatar
Avatar
sholmes
Looking for a good resource for email header analysis. Looking to see if we can trace potential fraudulent emails back to a source. I only have an excel spreadsheet which contains the header information for all incoming emails of concern. Not case related, just an inhouse fishing expedition.
13Cubed did a video a while back about email header analysis, I still use the plugin he created for Sublime Text. You can also paste email headers into the tool on MXToolBox to make them easier to read. https://www.youtube.com/watch?v=nK5QpGSBR8c
👍 5
Avatar
Avatar
S Cote / SQ
Hey! About building forensic workstations, and using them for "basic" forensic things like Physical Analyzer / Axiom processing, image acquisition, Nuix Workstation and things like that, would you go with the intel way (i9-13900KS) or with the AMD way (Ryzen 9 7950X)? And why? Thanks!
In that comparison, the intel. Higher clock speed overall, I didn’t check the price , but I’m assuming price doesn’t matter.
👍 1
Avatar
Not entirely related to DF, once again I find myself not sure where to drop this question... I've been tasked with building fake social media profiles on all major platforms (instagram, facebook, tiktok, snapchat). Does anyone have any good resources for doing it properly in terms of building content, and a solid identity?
Avatar
Avatar
CyberGhost
13Cubed did a video a while back about email header analysis, I still use the plugin he created for Sublime Text. You can also paste email headers into the tool on MXToolBox to make them easier to read. https://www.youtube.com/watch?v=nK5QpGSBR8c
Thanks
👍🏻 1
Avatar
Avatar
hallux
Not entirely related to DF, once again I find myself not sure where to drop this question... I've been tasked with building fake social media profiles on all major platforms (instagram, facebook, tiktok, snapchat). Does anyone have any good resources for doing it properly in terms of building content, and a solid identity?
I've had great success with fastmail.us and I pick a very common name, I usually start with Facebook, no vpn, then do, Instagram, Twitter, etc usually with a few days in between, and I regularly log into my soc and post like a random bloke would xD Not sure if that's what youre looking for, but that's what I do anywyas xD
Avatar
Pizzantelope 5/30/2023 10:23 PM
Anyone have access to the berla app? Want to know if a make / model might have anything worth trying to dump
Avatar
Hello all, I'm looking for general information about the Likee app: On what can be discovered on a device Know if certain services have already obtained information from Likeme Pte.Ltd and the kind of data. Feel free to DM me. thx
Avatar
Avatar
ryd3v
I've had great success with fastmail.us and I pick a very common name, I usually start with Facebook, no vpn, then do, Instagram, Twitter, etc usually with a few days in between, and I regularly log into my soc and post like a random bloke would xD Not sure if that's what youre looking for, but that's what I do anywyas xD
More so content like images. I obviously don’t want to snag someone’s real images and engage in some identity theft.
Avatar
Avatar
Pizzantelope
Anyone have access to the berla app? Want to know if a make / model might have anything worth trying to dump
burgers_N_bytes 5/31/2023 4:53 AM
What vehicle do you have?
Avatar
Avatar
hallux
More so content like images. I obviously don’t want to snag someone’s real images and engage in some identity theft.
Thispersondoesnotexsist , or use unsplash xD
Avatar
Avatar
ryd3v
Thispersondoesnotexsist , or use unsplash xD
Haha I did see those, I was hoping to find some sort of AI tool of some sort that could replicate the person in various backdrops and locations and such to help build that in depth persona before dumping out vague content.
Avatar
It’s that could be an option
Avatar
Avatar
burgers_N_bytes
What vehicle do you have?
Pizzantelope 5/31/2023 5:25 AM
Disregard just got my account activated
👍 1
Avatar
Avatar
hallux
Not entirely related to DF, once again I find myself not sure where to drop this question... I've been tasked with building fake social media profiles on all major platforms (instagram, facebook, tiktok, snapchat). Does anyone have any good resources for doing it properly in terms of building content, and a solid identity?
The most advanced fake name generator. Generate random names, addresses, usernames, passwords, email addresses, and more. Use for software testing, social media, or anything else.
Fake name generator - generates random identity to register for different resources and sites. We will help you stay anonymous online. Do not use a real name if you can use fake name.
Generate random human face in 1 click and download it! AI generated fake person photos: man, woman or child.
Proton Mail is the world’s largest secure email service with over 70 million users. Available on Web, iOS, Android, and desktop. Protected by Swiss privacy law.
👍 2
💯 1
Avatar
Avatar
hallux
Not entirely related to DF, once again I find myself not sure where to drop this question... I've been tasked with building fake social media profiles on all major platforms (instagram, facebook, tiktok, snapchat). Does anyone have any good resources for doing it properly in terms of building content, and a solid identity?
For disposable emails, there's also: https://www.sharklasers.com/ https://temp-mail.org/en/ (I find this one to be most useful and working best when certain services detect that emails are generated by Shark Lasers) For disposable phone numbers (useful when signing up and it requires 2FA): https://smsreceivefree.com/info/15715472492/ https://freephonenum.com/ Otherwise, everything that @Beercow sent are also great resources! Good luck!
Don't want to give them your real email? Use a temporary email. No registration, lasts 60 mins. Protection from Spam
Keep spam out of your mail and stay safe - just use a disposable temporary email address! Protect your personal email address from spam with Temp-mail
smsreceivefree.com is a free website to receive SMS online. Virtual phone numbers from USA and Canada to receive SMS for free.
coffeeparrot 1
Avatar
Piggy backing off that, is there like a typical phrase or phrases that can be associated with "temp" emails/numbers etc. Just looking to expand existing keyword lists we run with atm.
Avatar
Those links are perfect 👌🏻 might spin up a Midjourney account if I can get the prompts right to generate consistent content.
❤️ 1
Avatar
Avatar
Rob
Piggy backing off that, is there like a typical phrase or phrases that can be associated with "temp" emails/numbers etc. Just looking to expand existing keyword lists we run with atm.
Hey Rob, I am not sure if I am reading your question correctly, otherwise I apologize! So, do you mean like another way of saying "Temp" when we're talking about disposable identities? I would also say "Burner emails/numbers", "throwaway" or you can probably use transient as well. Not sure if this is what you are looking for.
👍 1
Avatar
kmacdonald1565 5/31/2023 6:37 AM
@ICAC Hey, i need some advice on moving forward with a case. Long story short, was part of a NCMEC cybertip search warrant recently and it ended with an arrest but we trying to really nail down some better evidence. suspect phone had a FFS done back at the office where no CSAM was located on this device, but user accounts for TOR sites were found with the URL in place (that were partially descriptive). My question is, what can we get from other forensic programs that might get us to some CSAM related charges (distribution, enticement, etc)? Is there anything else that can be parsed?
Avatar
Avatar
Thor
Hey Rob, I am not sure if I am reading your question correctly, otherwise I apologize! So, do you mean like another way of saying "Temp" when we're talking about disposable identities? I would also say "Burner emails/numbers", "throwaway" or you can probably use transient as well. Not sure if this is what you are looking for.
If you have a user trying to use a service such as a temp/burner email what would a keyword look like that would find this if run in axiom etc.
Avatar
Avatar
Rob
Piggy backing off that, is there like a typical phrase or phrases that can be associated with "temp" emails/numbers etc. Just looking to expand existing keyword lists we run with atm.
Deleted User 5/31/2023 6:53 AM
“10 minute mail”
👍 1
Avatar
Avatar
Rob
If you have a user trying to use a service such as a temp/burner email what would a keyword look like that would find this if run in axiom etc.
I looked into it and I found Sock puppets, or sock puppet account, to be close to what you may be looking for. This term is "often used to refer to alternative online identities or user accounts used for purposes of deception." or "as a fictitious online identity created for the purposes of deception." Here's a good resource from Norton Labs on the subject, should you wish to dig further into this: https://www.nortonlifelock.com/blogs/norton-labs/identifying-sockpuppet-accounts-social-media Though, I'm not sure if you already have that term in your keyword lists. Hope this helps and what you were looking for!
Evolution of Disinformation Campaigns from 2016 - Present
👍 1
Avatar
Avatar
hallux
Not entirely related to DF, once again I find myself not sure where to drop this question... I've been tasked with building fake social media profiles on all major platforms (instagram, facebook, tiktok, snapchat). Does anyone have any good resources for doing it properly in terms of building content, and a solid identity?
IntelTechniques has been my go to resource for OSINT and this kind of stuff. Highly recommend Michael's book on OSINT techniques. Don't feel like you have to read to book cover to cover, I use it mostly as a reference guide. It can take a lot of setup and maintenance of your sock puppet accounts, Facebook likes to nix accounts it thinks are fake. Usually happens when they are new accounts. https://inteltechniques.com/
Avatar
Avatar
kmacdonald1565
@ICAC Hey, i need some advice on moving forward with a case. Long story short, was part of a NCMEC cybertip search warrant recently and it ended with an arrest but we trying to really nail down some better evidence. suspect phone had a FFS done back at the office where no CSAM was located on this device, but user accounts for TOR sites were found with the URL in place (that were partially descriptive). My question is, what can we get from other forensic programs that might get us to some CSAM related charges (distribution, enticement, etc)? Is there anything else that can be parsed?
spicy_caveman 5/31/2023 8:47 AM
Have you gone after the clouds? Dropbox, OneDrive, Google Drive.
Avatar
Avatar
CyberGhost
IntelTechniques has been my go to resource for OSINT and this kind of stuff. Highly recommend Michael's book on OSINT techniques. Don't feel like you have to read to book cover to cover, I use it mostly as a reference guide. It can take a lot of setup and maintenance of your sock puppet accounts, Facebook likes to nix accounts it thinks are fake. Usually happens when they are new accounts. https://inteltechniques.com/
Thanks! While I don’t think the folks I’ll be monitoring will be smart enough to catch on super quick I’m just hoping to set myself up for success.
Avatar
Avatar
spicy_caveman
Have you gone after the clouds? Dropbox, OneDrive, Google Drive.
kmacdonald1565 5/31/2023 8:54 AM
cloud sources are in the works, not sure how fruitful they will be directly
Avatar
Avatar
kmacdonald1565
cloud sources are in the works, not sure how fruitful they will be directly
spicy_caveman 5/31/2023 8:57 AM
Usually there will be multiple email accounts you can find, I have had enormous success in getting more evidence from these burner emails where they store csam on that particular google drive account. I collected around 7 drive accounts from different burner Gmails for a suspect and had years of data recovered.
Avatar
kmacdonald1565 5/31/2023 9:05 AM
we will check it out. without getting into too much detail, he had accounts for suspected CSAM websites (.onion and one or two .coms) that we believe were created using "3rd party" mail sites and seprately he had accounts that were personal use that used more traditional things like google drive/dropbox which were not used for CSAM. we are doing warrants for that stuff anyway, but thats why my question was more leaning towards what was available regarding tor artifacts and similar. we are working with our prosecutors to see what can be done with the accounts that we have that wont respond to court orders.
Avatar
Avatar
kmacdonald1565
we will check it out. without getting into too much detail, he had accounts for suspected CSAM websites (.onion and one or two .coms) that we believe were created using "3rd party" mail sites and seprately he had accounts that were personal use that used more traditional things like google drive/dropbox which were not used for CSAM. we are doing warrants for that stuff anyway, but thats why my question was more leaning towards what was available regarding tor artifacts and similar. we are working with our prosecutors to see what can be done with the accounts that we have that wont respond to court orders.
artefacts may be slim even with FFS, but you could consider (safely) following those .onion links to document that they take you to CSAM to support a charge for access with intent to view under 18 U.S. Code § 2252A(a)(5)(b)
👍 1
Avatar
Avatar
karver
artefacts may be slim even with FFS, but you could consider (safely) following those .onion links to document that they take you to CSAM to support a charge for access with intent to view under 18 U.S. Code § 2252A(a)(5)(b)
kmacdonald1565 5/31/2023 1:25 PM
We are working on that too, thanks
Avatar
kmacdonald1565 5/31/2023 1:32 PM
some were a bit old, according to what Axiom parsed....i imagine they have since been relocated or taken down by now, thats an adventure for tomorrow
Avatar
Avatar
karver
artefacts may be slim even with FFS, but you could consider (safely) following those .onion links to document that they take you to CSAM to support a charge for access with intent to view under 18 U.S. Code § 2252A(a)(5)(b)
Curious you can get a charge for that since its possible the content has changed since your user viewed it?
karver started a thread. 5/31/2023 1:56 PM
Avatar
Does anyone have a tool their use to monitor traffic for users working remotely? We blocked a few sites at our firewall but when users disconnect from the vpn they can access it
Avatar
Cisco umbrella can help address this
4:16 PM
Or any other like product, zscaler, windows defender network protect etc
Avatar
expose a dns server to the public that does NOT include internal objects, but with the dns filtering you may already be using
Avatar
Avatar
ECIR
Does anyone have a tool their use to monitor traffic for users working remotely? We blocked a few sites at our firewall but when users disconnect from the vpn they can access it
pretty much any proxy/dns product will help you with this - I liked ZScaler for this since you can log and monitor all network traffic at the firewall and proxy levels
Avatar
Are product likes zscaler and Cisco umbrella able to provide internet usage reports for users or devices?
4:35 PM
To be able to provide for example, what websites a specific user visited in a certain timespan
4:44 PM
Will have to offload the logs somewhere else for longing retention but get 30 days usually in portal based on license
👍 1
Avatar
I am looking to learn more about cyber forensics, are there any recommended books, that anyone in the industry should read?
2:16 AM
Also any good resources to study up on all the tools that are avalable to the public that are indsutry standard? I have taken a class and have a very basic understanding of the field, but I find it often hard to find info on tools such as paladins disk imaging tool.
Avatar
Avatar
ECIR
To be able to provide for example, what websites a specific user visited in a certain timespan
To add to tklane answer, you can get any type of reports you want out of the logging, especially if you push it into splunk or similar - it will give you extremely detailed web traffic information including app categorization, bytes sent/received, HTTP metadata (methods, referer, etc) and many other pieces of detailed data that is extremely useful, especially so for security teams (edited)
Avatar
I am looking for an open source tool that will capture and download Instagram videos, does anyone have any recommendations?
Avatar
Avatar
4n6s7oth
I am looking for an open source tool that will capture and download Instagram videos, does anyone have any recommendations?
In the past, I've used instaloader
Avatar
Avatar
segumarc
In the past, I've used instaloader
Thanks for the suggestion!
👍 1
Avatar
Is there a dedicated discord for MSAB/Celebrite/Oxygen?
Avatar
Avatar
tapatiosec
Is there a dedicated discord for MSAB/Celebrite/Oxygen?
Dont think so. This is the best place i guess 🙂
Avatar
Hello Everyone I am applying for masters in Cyber security in USA and I have decided two Universities 1)North Eastern University 2)University of Maryland college park This two universities provide Digital Forensics / Incident response as electives so I found it interesting! So If you guys can suggest me some more Universities in USA, it would be very helpful! Also, If anyone had any views good or bad for above mentioned Universities please share! So I can apply accordingly!
Avatar
Hello everyone, does anyone know what the purpose is of files contained in the following file location? Data/data/com.android.chrome/app_textures The file path is self-explanatory, I'm just trying to figure out what the "app textures" part is. Thank you!
Avatar
Avatar
tapatiosec
Is there a dedicated discord for MSAB/Celebrite/Oxygen?
Andrew Rathbun 6/2/2023 6:47 AM
Not yet, at least.
Avatar
Avatar
Alex Owen
Hello everyone, does anyone know what the purpose is of files contained in the following file location? Data/data/com.android.chrome/app_textures The file path is self-explanatory, I'm just trying to figure out what the "app textures" part is. Thank you!
Andrew Rathbun 6/2/2023 6:47 AM
Would recommend #mobile-forensic-decoding
Avatar
digital Bowles 6/2/2023 1:39 PM
I am a 1 person lab. I have been working on a way to track the status of the devices that come in, but do not need a large (expensive) program. I just need our evidence tech and myself to update it and allow investigators to view it. I have an excel sheet I have been playing with, but no one else can view it. With the number of great minds here is there any ideas. Sorry for the long post and if not allowed I will delete. Thanks
Avatar
Avatar
digital Bowles
I am a 1 person lab. I have been working on a way to track the status of the devices that come in, but do not need a large (expensive) program. I just need our evidence tech and myself to update it and allow investigators to view it. I have an excel sheet I have been playing with, but no one else can view it. With the number of great minds here is there any ideas. Sorry for the long post and if not allowed I will delete. Thanks
I have heard of other agencies using a Google Sheet with shared permissions. Maybe that would work well for your case because you are already using an Excel spreadsheet.
👍 2
Avatar
Avatar
digital Bowles
I am a 1 person lab. I have been working on a way to track the status of the devices that come in, but do not need a large (expensive) program. I just need our evidence tech and myself to update it and allow investigators to view it. I have an excel sheet I have been playing with, but no one else can view it. With the number of great minds here is there any ideas. Sorry for the long post and if not allowed I will delete. Thanks
Something like this ? https://github.com/AnttiKurittu/kirjuri the project is no longer active but you can still use it, you need a web server liké lamp
Kirjuri is a web application for managing cases and physical forensic evidence items. - GitHub - AnttiKurittu/kirjuri: Kirjuri is a web application for managing cases and physical forensic evidenc...
Avatar
⭐Jigglypuff⭐ 6/2/2023 3:05 PM
Does anyone perform hiring here?
3:05 PM
If so is there anyone I can talk to about my resume?
Avatar
Avatar
hrec
Something like this ? https://github.com/AnttiKurittu/kirjuri the project is no longer active but you can still use it, you need a web server liké lamp
digital Bowles 6/2/2023 4:07 PM
Thank you. I love the collection of minds here.
Avatar
Avatar
digital Bowles
I am a 1 person lab. I have been working on a way to track the status of the devices that come in, but do not need a large (expensive) program. I just need our evidence tech and myself to update it and allow investigators to view it. I have an excel sheet I have been playing with, but no one else can view it. With the number of great minds here is there any ideas. Sorry for the long post and if not allowed I will delete. Thanks
Excel spreadsheet for incoming phones. Whiteboard for phones that are unsupported AFU or brute force phones that will be staying for a while.
Avatar
I've heard of others using excel or Google sheets
Avatar
Avatar
digital Bowles
I am a 1 person lab. I have been working on a way to track the status of the devices that come in, but do not need a large (expensive) program. I just need our evidence tech and myself to update it and allow investigators to view it. I have an excel sheet I have been playing with, but no one else can view it. With the number of great minds here is there any ideas. Sorry for the long post and if not allowed I will delete. Thanks
make a private github repo, add your friends, push pull updates xD
💯 2
Avatar
Deleted User 6/3/2023 2:24 AM
Hi
2:25 AM
anyone have a velociraptor client deployment tool thats kinda like CB EDR sensors deployer , thinking of working on one
Avatar
Hans Leißner 6/3/2023 10:04 AM
Anyone know what type of device this is? 🤪 This was found lying in the woods in our area. I have unfortunately only one picture of it... Tineye and Google Image Search negative
Avatar
Avatar
Hans Leißner
Anyone know what type of device this is? 🤪 This was found lying in the woods in our area. I have unfortunately only one picture of it... Tineye and Google Image Search negative
Deleted User 6/3/2023 11:59 AM
are those antennas?
Avatar
Hans Leißner 6/3/2023 12:46 PM
Yeah. 8 of it. (edited)
Avatar
Avatar
digital Bowles
I am a 1 person lab. I have been working on a way to track the status of the devices that come in, but do not need a large (expensive) program. I just need our evidence tech and myself to update it and allow investigators to view it. I have an excel sheet I have been playing with, but no one else can view it. With the number of great minds here is there any ideas. Sorry for the long post and if not allowed I will delete. Thanks
Dr. Kaan Gündüz 6/3/2023 1:11 PM
i recommend designing one with filemaker (excel on steroids) or using onlyoffice community. oo is like google docs but can be self hosted.
Avatar
Avatar
Hans Leißner
Anyone know what type of device this is? 🤪 This was found lying in the woods in our area. I have unfortunately only one picture of it... Tineye and Google Image Search negative
Looks almost like a signal jammer?
Avatar
Avatar
hallux
Looks almost like a signal jammer?
Deleted User 6/3/2023 2:47 PM
Anti UAV signal jammer?
2:48 PM
Looks like some water proof Signal jammer which can be equiped with some high power system
2:48 PM
I've seen some look like that sold by Chinese merchants
Avatar
Avatar
Deleted User
Anti UAV signal jammer?
I'm not sure exactly what kind but it looks like some sort of signal jammer for sure.
Avatar
Avatar
⭐Jigglypuff⭐
Does anyone perform hiring here?
Shoot me a link and I can provide feedback, let me know what type of position you are looking for
Avatar
Hans Leißner 6/3/2023 8:39 PM
Thanks for the answers! I have not yet thought of a jammer. I'll do some more research. Edit: those "display" are actually solar panels. (edited)
Avatar
Avatar
Hans Leißner
Thanks for the answers! I have not yet thought of a jammer. I'll do some more research. Edit: those "display" are actually solar panels. (edited)
Deleted User 6/4/2023 12:18 AM
I say it’s unlikely to be a signal jammer because there are no vents. Jammers generate a lot of heat. The placement and size of the solar panels makes no sense at all. The only logical design implementation here is the spacing of the antennas as to not detune each others frequency. The antennas just seem wrong for TX as well.
🔥 2
Avatar
Avatar
Deleted User
I say it’s unlikely to be a signal jammer because there are no vents. Jammers generate a lot of heat. The placement and size of the solar panels makes no sense at all. The only logical design implementation here is the spacing of the antennas as to not detune each others frequency. The antennas just seem wrong for TX as well.
Hans Leißner 6/4/2023 12:24 AM
Thank you for the input 😃
👍 1
Avatar
Avatar
Hans Leißner
Yeah. 8 of it. (edited)
Digitalferret 6/4/2023 4:12 AM
how sure are you that those are antennas? to me the placement looks more like a physical device, like spring loaded legs, to ensure the box is off the ground whichever way it lands, unless they are actual antenna's with that job in mind.
👍🏻 1
Avatar
This might be a helpful online tool to have in your toolbox: https://redirectdetective.com/ (edited)
👍 1
Avatar
Hans Leißner 6/4/2023 4:35 AM
Would also be a possibility 😄 unfortunately I could not yet see the thing itself. The dimensions are somewhere around 10x10 centimeters (cube). It is only important to us that there is no danger from the thing or that we are not spied on. (edited)
Avatar
Avatar
Hans Leißner
Would also be a possibility 😄 unfortunately I could not yet see the thing itself. The dimensions are somewhere around 10x10 centimeters (cube). It is only important to us that there is no danger from the thing or that we are not spied on. (edited)
Digitalferret 6/4/2023 5:54 AM
-DANGER- yeh, lol, i was gonna say looks quite like a Mine but ... 🙂
Avatar
Hans Leißner 6/4/2023 5:57 AM
😆🙉 Fortunately not
Avatar
Digitalferret 6/4/2023 6:08 AM
Apologies, i saw you are from Austria and the mischief in me took over having seen recent news article regarding Train announcements Could it be a device for transmitting a random speech from a certain deceased politician? I'll see myself out 🙂
6:10 AM
thank the lord, lol
6:10 AM
interesting though, do ffed back if you get a result.
👍🏻 1
Avatar
Hans Leißner 6/4/2023 6:11 AM
Discord bugs .. my message is sending itself again and again
Avatar
Digitalferret 6/4/2023 6:15 AM
same here, was just running a line check
😄 1
6:15 AM
at least it's not the internet (edited)
Avatar
Avatar
Hans Leißner
Anyone know what type of device this is? 🤪 This was found lying in the woods in our area. I have unfortunately only one picture of it... Tineye and Google Image Search negative
Can you go grab it to take it apart? Do you have any other pictures, or great clarity photos?
Avatar
Saucisson Slicer 6/5/2023 6:28 AM
Hi guys ! Searching for help here. I am working on a case when I'll have to retreive data on 3 corrupted disks mounted in RAID 5. As I don't have the disks right now, I don't know how corrupted they are. I have a Tableau TX1 so i'm gonna image each disk individually. However, I would like to know: what are your advices/ressources for reassembling images and retrieving data ? Thank you in advance 🙂
Avatar
Avatar
Saucisson Slicer
Hi guys ! Searching for help here. I am working on a case when I'll have to retreive data on 3 corrupted disks mounted in RAID 5. As I don't have the disks right now, I don't know how corrupted they are. I have a Tableau TX1 so i'm gonna image each disk individually. However, I would like to know: what are your advices/ressources for reassembling images and retrieving data ? Thank you in advance 🙂
Digitalferret 6/5/2023 7:08 AM
"corrupt" covers a multitude of sins. first run tests to check none are physically damaged. should you get to the stage of having taken images you could have UFSExplorer take a look.
Avatar
Avatar
Hans Leißner
Thanks for the answers! I have not yet thought of a jammer. I'll do some more research. Edit: those "display" are actually solar panels. (edited)
chick3nman 6/5/2023 9:12 AM
This looks similar to some high altitude balloon payloads i've seen
🫡 1
9:12 AM
though if that were the case, i wouldn't expect it to be sitting nicely in the forest, it would have had to fall a great distance to get there
9:14 AM
also similar looking to many small cube sats, though those would not be so rugged and the solar panels would likely be larger
Avatar
@Cellebrite - I used Digital Collector for Windows to update my dongle, it ended crashing and now the 1 TB drive needs to initialized.
📬 1
10:00 AM
Any work around ?
Avatar
Avatar
Saucisson Slicer
Hi guys ! Searching for help here. I am working on a case when I'll have to retreive data on 3 corrupted disks mounted in RAID 5. As I don't have the disks right now, I don't know how corrupted they are. I have a Tableau TX1 so i'm gonna image each disk individually. However, I would like to know: what are your advices/ressources for reassembling images and retrieving data ? Thank you in advance 🙂
What box did you pull the disks from as some eg Drobo can be a right PITA> As above or newer iterations of R Studio if you have
Avatar
Avatar
Hans Leißner
Anyone know what type of device this is? 🤪 This was found lying in the woods in our area. I have unfortunately only one picture of it... Tineye and Google Image Search negative
Think it's an audio capture device no? those are legs to keep the mics off the ground? could have parachute down from a weather ballon or some sheet, just a guess, be nice to open it, to see what's inside
Avatar
Hans Leißner 6/5/2023 10:33 PM
I will contact the clerk today to get more details. In the meantime, thank you for your help ! 😄
Avatar
Avatar
Digitalferret
"corrupt" covers a multitude of sins. first run tests to check none are physically damaged. should you get to the stage of having taken images you could have UFSExplorer take a look.
Saucisson Slicer 6/5/2023 11:21 PM
OK I'll check this ! Thank you !
Avatar
@Magnet Forensics I’m getting an error when trying to reply to support@magnetforensics.com telling me your inbox is full and can’t accept messages
Avatar
Avatar
busted4n6
@Magnet Forensics I’m getting an error when trying to reply to support@magnetforensics.com telling me your inbox is full and can’t accept messages
chriscone_ar 6/6/2023 5:38 AM
Thanks for the heads up on the email issue, I’ll let the support team know. Is there anything I can help with?
Avatar
Avatar
chriscone_ar
Thanks for the heads up on the email issue, I’ll let the support team know. Is there anything I can help with?
I have an issue getting Thorn to activate on PROCESS Cyber. I’ve resent the email now, will see if it goes through
👍🏻 1
Avatar
Question: Law enforcement only tools, is there anyway for a non-law enforcement company or person to be able to get access to those legally?
Avatar
If they are LE only....
👆 5
🚓 1
Gavel 1
Avatar
Avatar
florus
If they are LE only....
understood, i answered my own question. I guess i was thinking along the lines of private investigators getting any access to more software than the public
Avatar
Hey everyone! I'm currently trying to fill out gaps in my knowledge and was wondering what free or affordable courses (in anything DFIR related) avaliable for an individual to enroll on.
Avatar
Avatar
Howlo
Hey everyone! I'm currently trying to fill out gaps in my knowledge and was wondering what free or affordable courses (in anything DFIR related) avaliable for an individual to enroll on.
Digital Forensics Courses and Training
Hundreds of free and affordable training resources with a focus on DFIR & Blue Team. Search only the free training or search it all. There is also a free Incident Response training plan starting from complete beginner to IT.
❤️ 3
Avatar
Avatar
Robert_C
understood, i answered my own question. I guess i was thinking along the lines of private investigators getting any access to more software than the public
Many digital forensics tools can be open source. One of my search tools I use; I have entered a search question for you the results of which maybe of interest to you. https://grep.app/search?q=forensic
Search across a half million git repos. Search by regular expression.
💯 2
Avatar
Has anyone come across a CSAM series with "N.E. Inc." as a text logo in the lower right corner of the images?
Avatar
Avatar
iNDO_o
Has anyone come across a CSAM series with "N.E. Inc." as a text logo in the lower right corner of the images?
send you a DM
Avatar
BadgerBacon 6/7/2023 11:43 AM
Anyone have example language for compelling biometrics in a search warrant? I've got a pretty serious sexual assault case and while my research backs it being legal (in the US anyway) I can't find a good example of the actual language for the warrant and would love to see what someone else has used as our local judges haven't been presented with it before.
Avatar
Avatar
BadgerBacon
Anyone have example language for compelling biometrics in a search warrant? I've got a pretty serious sexual assault case and while my research backs it being legal (in the US anyway) I can't find a good example of the actual language for the warrant and would love to see what someone else has used as our local judges haven't been presented with it before.
DM you
Avatar
Avatar
BadgerBacon
Anyone have example language for compelling biometrics in a search warrant? I've got a pretty serious sexual assault case and while my research backs it being legal (in the US anyway) I can't find a good example of the actual language for the warrant and would love to see what someone else has used as our local judges haven't been presented with it before.
Not sure if you already have phone or planning on seizing but biometric unlocks expire after 2 days from last unlock on iphone, 3 days on Android last I checked.
this 1
2:27 PM
Relevant if you also have prosecutors that take 3 weeks to review a warrant 🙃
Avatar
Avatar
Solec
Relevant if you also have prosecutors that take 3 weeks to review a warrant 🙃
BadgerBacon 6/7/2023 2:31 PM
Thanks for the heads up, seized the phones this morning and should be signing warrants tomorrow morning, suspect is still in custody so we should be good, but I actually wasn't aware of this.
2:33 PM
My 3d printing of another suspect's thumbprint is gonna be a problem then as my lab's printer isn't precise enough for what I need and my agency isn't going to fund a resin printer on the theory that it works. Though I suppose I can 3d print my own print and open my own phone with it as a proof of concept that can take as long as needbe,
Avatar
Is anyone from @MSAB availabe for a DM? (edited)
Avatar
Avatar
FullTang
Is anyone from @MSAB availabe for a DM? (edited)
You can DM me. 🙂
👍 1
📬 1
Avatar
Pizzantelope 6/8/2023 7:51 AM
Anyone have experience pulling data from DoorDash? Working a homicide and the suspect DoorDashes. Wondering if it constantly records location data or only when the app is active
Avatar
AARC TASK FORCE 6/8/2023 9:37 AM
Anyone ever work with a Money Counter (Cummins)? Working a Money Laundering case and have multiple money counters. I k now that when they are plugged in, you can print a log if you have an ethernet printer attached.
Avatar
crystalcity 6/8/2023 10:45 AM
Poking around my co.puter today I found my browser is "managed by my organization" this is my home computer...there should be no organization. Maybe I'm just a complete idiot but in very confused. Attached is a screen shot of what my policy is....
Avatar
Avatar
crystalcity
Poking around my co.puter today I found my browser is "managed by my organization" this is my home computer...there should be no organization. Maybe I'm just a complete idiot but in very confused. Attached is a screen shot of what my policy is....
Go open your Edge Browser and put in edge://extensions/ and see what extensions are added, remove them and see what it says after that.
👍 1
Avatar
Deleted User 6/8/2023 11:04 AM
Hey, does anyone have a source that includes at least some info about sandboxes, most known / common ways of "bypassing" the isolation & their patch, much appreciated.
Avatar
Anyone from @Cellebrite around for a Trevor question?
👋 1
♥️ 1
cellebrite 1
Avatar
How often do you guys find osint useful being in a "blue team" or just in general being in the side of defence, forensics and everything?
Avatar
Avatar
Pizzantelope
Anyone have experience pulling data from DoorDash? Working a homicide and the suspect DoorDashes. Wondering if it constantly records location data or only when the app is active
Only when the app is open (background or otherwise).
Avatar
Pizzantelope 6/8/2023 7:47 PM
So if it's in the background and you're waiting for an order DoorDash is recording that? Is all that info able to be pulled from them?
Avatar
Avatar
Robert_C
Question: Law enforcement only tools, is there anyway for a non-law enforcement company or person to be able to get access to those legally?
Yes, join your local law enforcement department 😁
💯 1
🤣 3
7:57 PM
See sometimes the answer is right in front of you 😛
Avatar
Anyone having issues with Cellebrite PA getting stuck at 54% when loading up
Avatar
Hi everyone, I'm really stuck in configuring a simple elasticsearch + kibana instance using certificates generated from my internal Windows CA.. keeps complaining about keystores, and I have no idea how to get it working.. anyone did something similar in the past?
Avatar
I know this is likely a difficult question to answer but what is the average number (approximate) of devices a Tech Crimes Examiner gets assigned within a year - how many reports do they generate? In generalities... for the average device that we're seeing in 2022/2023 (iPhone/Android).
Avatar
Avatar
rjay4380
I know this is likely a difficult question to answer but what is the average number (approximate) of devices a Tech Crimes Examiner gets assigned within a year - how many reports do they generate? In generalities... for the average device that we're seeing in 2022/2023 (iPhone/Android).
Andrew Rathbun 6/9/2023 9:13 AM
Really depends on the case, type of crime, etc. If it's something like healthcare fraud, then you can easily have 50+ devices, mobile, computer, servers, etc in one case at a single office building, or between multiple pharmacies. If you're working a CSAM case, prob a phone or two, however many external hard drives, computers, etc. I would like to imagine the number would be 3 digits, maybe 4, depending on case volume. I can't imagine it'd be a 2 digit number though. I hope that helps 🤷‍♂️
Avatar
Avatar
Andrew Rathbun
Really depends on the case, type of crime, etc. If it's something like healthcare fraud, then you can easily have 50+ devices, mobile, computer, servers, etc in one case at a single office building, or between multiple pharmacies. If you're working a CSAM case, prob a phone or two, however many external hard drives, computers, etc. I would like to imagine the number would be 3 digits, maybe 4, depending on case volume. I can't imagine it'd be a 2 digit number though. I hope that helps 🤷‍♂️
Thank you! Definitely helps quantify it. Would you be able to estimate a rough estimate of average # of devices by an average examiner for a year? Like how many they would run and generate reports on. Again, just generalities as I know there are a lot of variables at play in terms of size, content available, device type, etc.
Avatar
Avatar
rjay4380
Thank you! Definitely helps quantify it. Would you be able to estimate a rough estimate of average # of devices by an average examiner for a year? Like how many they would run and generate reports on. Again, just generalities as I know there are a lot of variables at play in terms of size, content available, device type, etc.
Andrew Rathbun 6/9/2023 10:18 AM
I mean, I'd mention every piece of evidence involved in a case in a report. It's just a matter of does the evidence have relevant data on it or not? I'm not going to write a novel on something that has nothing on it, but it'll get mentioned. So I guess it depends on what you mean by "generate reports". If you're talking about portable cases or UFED reports, I guess that differs from examiner to examiner. But does generating those reports mean you did analysis on it? Regardless, if you seize a piece of digital evidence, it'll get mentioned in the report and any relevant findings will be properly enumerated and detailed for every applicable device. Does that make sense? Hard to quantify
Avatar
Avatar
rjay4380
Thank you! Definitely helps quantify it. Would you be able to estimate a rough estimate of average # of devices by an average examiner for a year? Like how many they would run and generate reports on. Again, just generalities as I know there are a lot of variables at play in terms of size, content available, device type, etc.
randomaccess 6/9/2023 10:11 PM
There are too many variables to provide an answer here
10:15 PM
I can pump through thousands of devices a year as long as they're all delivered to the lab, I only have to image and process and dump out an automated report, and have all the equipment (you'll be much slower if you have one cellebrite and 1000 phones etc). If you're just extracting data and sending it off without analysis you'll get through more If you're in consulting you may not have a steady stream of devices or the equipment. You may work in an area that has a lot of competition so you have enough to keep you busy but not enough to overwork your hours. Is a threat hunt across an org of 1000 devices counted as examining 1000 devices or only the ones you spend more than a few hours looking at? Tldr It's hard to quantify this number without guard rails
💯 3
Avatar
Deleted User 6/10/2023 9:51 PM
Hi all, I would like to know what is the most responsible role of hunting Hackers in Blue Team in CyberSec?
Avatar
Avatar
Deleted User
Hi all, I would like to know what is the most responsible role of hunting Hackers in Blue Team in CyberSec?
Andrew Rathbun 6/11/2023 6:00 AM
Have you asked ChatGPT? This sounds like a homework question...
Avatar
Avatar
Andrew Rathbun
Have you asked ChatGPT? This sounds like a homework question...
Deleted User 6/11/2023 6:03 AM
I did and it's not homework question. I am not even in cybersec uni
6:03 AM
Listening to one opinion isn't a good idea
6:04 AM
So why would I just take chatgpt answers if they're holy words (edited)
Avatar
Avatar
Deleted User
Hi all, I would like to know what is the most responsible role of hunting Hackers in Blue Team in CyberSec?
It’s hard to answer that question as there are many moving parts to cybersecurity, but if I had to pick one based on your parameters, I’d say threat hunting. Hunting is in the name 😉
Avatar
Avatar
ryd3v
It’s hard to answer that question as there are many moving parts to cybersecurity, but if I had to pick one based on your parameters, I’d say threat hunting. Hunting is in the name 😉
Deleted User 6/12/2023 1:24 AM
Thanks bro, I appreciate it
Avatar
You’re very welcome
Avatar
@Cellebrite has anyone had any memory leak issues with the newest Cellebrite PA release ? On two seprate computers it seems to be freezing our systems, with completed extractions its using 69GB of 128 of memory when its done processing the extraction ?
Avatar
Avatar
DCSO
@Cellebrite has anyone had any memory leak issues with the newest Cellebrite PA release ? On two seprate computers it seems to be freezing our systems, with completed extractions its using 69GB of 128 of memory when its done processing the extraction ?
CLB_4n6s_mc 6/12/2023 11:51 AM
Hi which version are you talking about ?
Avatar
Avatar
CLB_4n6s_mc
Hi which version are you talking about ?
7.62
Avatar
I can't seem to pass the 18% mark when processing ONLY videos from a folder (since the E01 didn't pass 3% for days) and I keep getting this error @Griffeye . Anyone knows how to fix it?
Avatar
hi, anyone a hint why Cellebrite Reader is so damn slow when showing images with geolocation metadata? (no offline maps installed, no internet connection on workstation, settings in reader are "use ofline maps" and "diable network traffic") @Cellebrite
📬 1
1:43 AM
if i install ofline maps, last time i had to clean registry cause reader wont start anymore so i would like to not install the map services
Avatar
Anyone have a go to site to check IMEI against blacklisted?
Avatar
Avatar
Ghosted
Anyone have a go to site to check IMEI against blacklisted?
NibblesNBits 6/13/2023 12:16 PM
off the top of my head swappa.com i think does it or use to for free
Avatar
Hello, I updated Digital Collector with the windows updater and it occurs an error during the process. After that everything is messed up and can't recreate the partitions. Another one had the same issue ? Someone from @Cellebrite could have an idea ?
📬 1
Avatar
Avatar
AnTaL
Hello, I updated Digital Collector with the windows updater and it occurs an error during the process. After that everything is messed up and can't recreate the partitions. Another one had the same issue ? Someone from @Cellebrite could have an idea ?
Make sure you always turn off all your Anti-Virus tools before updating. Cellebrite has a FAQ document on how to fix this in their Knowledge Base.
Avatar
99% sure I know the answer, but does @Cellebrite Premium unlock a disabled iPhone?
Avatar
Avatar
coastal4n6
99% sure I know the answer, but does @Cellebrite Premium unlock a disabled iPhone?
Bill (VeriFi) 6/14/2023 7:02 AM
What IOS
Avatar
Avatar
coastal4n6
99% sure I know the answer, but does @Cellebrite Premium unlock a disabled iPhone?
Followup question. Do you just need an extraction or do you actually need it unlocked for some reason. I used Graykey to process two disabled iphones (only BFU because of the iOS version)
Avatar
Bill (VeriFi) 6/14/2023 7:05 AM
I DM’d you
Avatar
@Neon did you actually get much of use out of a BFU extraction? I ask because as I understand it, BFU only allows access to a limited amount of data from the device (edited)
Avatar
Avatar
Neon
Followup question. Do you just need an extraction or do you actually need it unlocked for some reason. I used Graykey to process two disabled iphones (only BFU because of the iOS version)
I'm still not sure the iOS, but it is an iPhone 13. Either option would work, unlocked or just get the data
Avatar
Avatar
bizzlyg
@Neon did you actually get much of use out of a BFU extraction? I ask because as I understand it, BFU only allows access to a limited amount of data from the device (edited)
No, it's useful if you need to get an icloud Id or determine the owner of a phone left at a crime scene
👍 1
Avatar
Avatar
coastal4n6
I'm still not sure the iOS, but it is an iPhone 13. Either option would work, unlocked or just get the data
Is it AFU
Avatar
I just emailed client to ask if they've kept the device powered on
Avatar
Avatar
Neon
Is it AFU
I don't believe so.
10:08 AM
Further, they stated the device says "Unavailable"
Avatar
kladblokje_88 6/14/2023 11:02 AM
Russian Cyber Criminals walking around ex-soviet countries, knowing putin has their back
Avatar
@coastal4n6 I'll dm
Avatar
So, I recently purchased a new Talino forensic workstation... POWERHOUSE! Very excited to get to using it. I also purchased two 43" Samsung CU8000 4K TV's as "monitors" (plan on wall mounting them one on top of another). Anyone have any insight on if this is a good idea? Meaning using TV's as opposed to true computer monitors?
Avatar
Speaking as a nerd and someone who works for SUMURI (enjoy the new TALINO!), it's not bad, per se. But there are a lot of creature comforts you lose when you go to TVs. Like how they power off when left untouched for a long period of time, usually need a remote, and sometimes don't play nice with sleep mode, depending on the TV.
2:26 PM
I am also a monitor nerd
2:27 PM
You can DM me if you have any questions, though!
Avatar
Avatar
coastal4n6
So, I recently purchased a new Talino forensic workstation... POWERHOUSE! Very excited to get to using it. I also purchased two 43" Samsung CU8000 4K TV's as "monitors" (plan on wall mounting them one on top of another). Anyone have any insight on if this is a good idea? Meaning using TV's as opposed to true computer monitors?
masqu3rade_1 6/14/2023 3:08 PM
What are the specs?
Avatar
Hey, I was pondering this article on my phone...You'll not need to use the URL, it's in the top 10 recent articles on bleeping computer.com. What are people's thoughts on this, and how does it work exactly? Is this a pretty common TTP? https://www.bleepingcomputer.com/news/security/chinese-hackers-use-dns-over-https-for-linux-malware-communication/
The Chinese threat group 'ChamelGang' infects Linux devices with a previously unknown implant named 'ChamelDoH,' allowing DNS-over-HTTPS communications with attackers' servers.
Avatar
I'm a little confused. Were they using DOH to query for their command and control hosts? Or using DOH for the communication channel to the hosts? If the second one, then why not just use https.
Avatar
MrTurdTastic 6/15/2023 2:06 AM
Anyone know how to mount a raid VPS with 2 disks in FTK?
2:06 AM
Doing my nut
Avatar
Hans Leißner 6/15/2023 2:41 AM
@Cellebrite LearningCenter down?
✅ 1
🆙 1
Salute 1
Avatar
MrMacca (Allan Mc) 6/15/2023 3:40 AM
@Magnet Forensics Got an issue with axiom v7.1.0.35864 When exporting windows mail to a csv. The entries are all wrong. Record is a weird collection of <div> entries rather than just a numerical number. Tags are filled with random data when there isn't any tags in the case. If exported to excel file, they appear fine. Just wanted to give a heads up.
Avatar
Avatar
masqu3rade_1
What are the specs?
PRODUCT DESCRIPTION • Intel Xeon W5-2465X 3.1 GHz (4.7 GHz Max Turbo) 16-Core LGA 4677 Processor • High End Active Air Cooling for the CPU Providing Maximum Performance • 256GB of DDR5 5600MHz RAM • One (1) 1TB SSD for the Operating System • One (1) 1TB M.2 NVMe SSD for Temporary Files • One (1) 1TB M.2 NVMe SSD for Database(s) • Four (4) 18TB Hard Drives configured in RAID 10 for Evidence • One (1) High End RAID Controller Card with 12 Gb/s Processing • One (1) RTX A4500 with 20GB GDDR6 ECC VRAM Graphics Processing Unit • One (1) 2.5” Hot Swap Bay with Four (4) Removable Trays • One (1) 3.5” Hot Swap Tray with Five (5) Removable Bays • One (1) Blu-Ray 16x BD-R 4MB Cache SATA Blu-Ray Burner • Front Panel Forensic Card Reader • One (1) 4 Port USB 3.0 Hub • One (1) 10 Port USB 2.0 Hub • Tableau T3iu Forensic Bridge • One (1) 1300 Watt Power Supply Unit • High End Whisper Quiet Fans throughout the Entire System (Hydraulic Fluid Ball Bearing rated at 300,000 hour lifespan) • Microsoft Windows 11 Pro 64 Bit • Three (3) Year Standard Warranty • Additional Specifications o Size: 15″W x 19.06″H x 20.06″D (381mm x 484mm x 510mm) o Open 5.25″ Bays = 10 o Fan size(s) = 120mm o PCI Chassis Expansion Slots = 8 o Aluminum Thickness = 0.118″ (or 3.00mm) o Finish = Powder Coated Black with Black Appointments
👀 1
Avatar
Hi everyone. I'm on the hunt for hardware for a forensic lab. Currently I'm looking for advice on a good read/write blocker. What are your opinions?
5:30 AM
I found one from logicube, which comes with adapters for PCIe etc. That sounded pretty neat, but I've never used it myself.
Avatar
Avatar
MrMacca (Allan Mc)
@Magnet Forensics Got an issue with axiom v7.1.0.35864 When exporting windows mail to a csv. The entries are all wrong. Record is a weird collection of <div> entries rather than just a numerical number. Tags are filled with random data when there isn't any tags in the case. If exported to excel file, they appear fine. Just wanted to give a heads up.
chriscone_ar 6/15/2023 5:53 AM
Thanks for the heads up! I'll take a look and get it reported to the team.
Avatar
Avatar
returnip
Hi everyone. I'm on the hunt for hardware for a forensic lab. Currently I'm looking for advice on a good read/write blocker. What are your opinions?
I use a TX1 and it serves most of my needs. https://security.opentext.com/tableau/hardware/details/tx1
👍 1
Avatar
Avatar
FullTang
I use a TX1 and it serves most of my needs. https://security.opentext.com/tableau/hardware/details/tx1
Do you remember how much it was?
Avatar
Avatar
returnip
Do you remember how much it was?
It was free thanks to the NCFI!
😀 1
6:31 AM
No idea how much they normally cost, I have never had to price them out.
Avatar
Does it require you to use any specific software or does it work with any imaging software?
Avatar
Avatar
returnip
Does it require you to use any specific software or does it work with any imaging software?
It’s a standalone solution. One side is write-blocked and the other side is not. It can create forensic images (.E01, dd, “clones”) or securely wipe and verify the wipe with multiple drives at the same time.
Avatar
Oh. Gotcha. I'm looking for something that will never leave a lab though.
6:37 AM
But thanks for the recommendation. I'll put that on the list of candidates.
Avatar
Avatar
returnip
Do you remember how much it was?
~£3000 for a TX1 in UK as a rough guide. About £1500 for a similar that's fixed into a computer.
6:59 AM
Summary: Not cheap (edited)
7:01 AM
Turns out the forensic bridge is slightly cheaper than I recalled. https://avatu.co.uk/collections/forensic-bridges/products/tableau-t356789iu-r2-bridge
SUMMARY The Tableau Forensic Universal Bridge is an integrated write-blocker that mounts in a drive bay of a forensic workstation and supports forensic acquisitions of SATA, USB 3.0, PCIe, SAS, FireWire 800, and IDE. A second-generation Tableau product, replacing the Tableau Forensic Combo Bridge [T35689iu]. FEATURES M
Avatar
Avatar
Rob
Summary: Not cheap (edited)
That's fine. I'm not paying. But the person paying will want to know. 😂
Avatar
SailorCyberMoon 🌙 6/15/2023 7:43 AM
Hello everyone. I just joined the server and would like to see if anyone in digital forensics and incident response would be willing to chat with me. I would like to know about the work life environment and see if it’s a specialization that would actually be compatible with my life . I will appreciate any feedback. Thank you. 😀
Avatar
is there a sift equivalent for Windows?? like flarevm Directly running on windows and not using WSL or do I have to install my forensics tools one by one on the system?
Avatar
Avatar
avesta
is there a sift equivalent for Windows?? like flarevm Directly running on windows and not using WSL or do I have to install my forensics tools one by one on the system?
Have a look at winfe.net
❤️ 1
Avatar
oh thats for acquisition not analysis Still cool though 🙂
Avatar
Avatar
avesta
is there a sift equivalent for Windows?? like flarevm Directly running on windows and not using WSL or do I have to install my forensics tools one by one on the system?
check out WIN-FOR, it's an installer for pulling down tools https://github.com/digitalsleuth/WIN-FOR
Windows Forensics Environment Builder. Contribute to digitalsleuth/WIN-FOR development by creating an account on GitHub.
❤️ 3
💯 3
🙏 2
👍 1
Avatar
Avatar
stark4n6
check out WIN-FOR, it's an installer for pulling down tools https://github.com/digitalsleuth/WIN-FOR
ohhhh thats amazing
10:45 AM
so many options 😄
Avatar
How do you conduct a physical extraction using Cellebrite UFED 3? Also, how much does Cellebrite Physical Analyzer typically cost?
Avatar
Avatar
sstallm2
How do you conduct a physical extraction using Cellebrite UFED 3? Also, how much does Cellebrite Physical Analyzer typically cost?
Send you a DM
Avatar
Avatar
Andrew Rathbun
I mean, I'd mention every piece of evidence involved in a case in a report. It's just a matter of does the evidence have relevant data on it or not? I'm not going to write a novel on something that has nothing on it, but it'll get mentioned. So I guess it depends on what you mean by "generate reports". If you're talking about portable cases or UFED reports, I guess that differs from examiner to examiner. But does generating those reports mean you did analysis on it? Regardless, if you seize a piece of digital evidence, it'll get mentioned in the report and any relevant findings will be properly enumerated and detailed for every applicable device. Does that make sense? Hard to quantify
Yes it does. I meant more generating portable cases or UFED reports vs. analysis on the content itself.
Avatar
Avatar
stark4n6
check out WIN-FOR, it's an installer for pulling down tools https://github.com/digitalsleuth/WIN-FOR
Heimdall4N6K 6/15/2023 11:54 PM
xleapp family and kape inside … what else ?😉
😊 1
Avatar
Hello all, rather simple question I am certain someone here will know, In regards to child abuse we have deciphered multiple emojis but one is remaining. 🏈 - The american football? -- Any one have any idea? Its bugging us to be honest haha. Cheers!
Avatar
hello
5:41 AM
Can anyone suggest me some prefetch forensics tools ?
5:42 AM
I used Rifiuti and Pftriage but nothing is helping
Avatar
Avatar
oed1pus
I used Rifiuti and Pftriage but nothing is helping
Prefetch Explorer Command Line. Contribute to EricZimmerman/PECmd development by creating an account on GitHub.
this 3
Avatar
Andrew Rathbun 6/16/2023 7:20 AM
PECmd all the way. pecmd.exe -d "C:\temp\PrefetchFilesHere" --csv "c:\temp\WhereverYouWantOutputToGo" --mp, simple as that (edited)
7:21 AM
--mp will give you more precise timestamps, if you care, aka subsecond values, but really not necessary, but I just wanted to explain that extra flag
Avatar
chrisforensic 6/16/2023 11:57 PM
hello folks @Cellebrite ... i registered here with my LE-email days ago, but got no answer... do you have any infos ? thanks (edited)
📬 1
Avatar
CLB_4n6s_mc 6/17/2023 12:19 AM
Hello Chris will ask marketing. Have a great week-end
Avatar
Avatar
CLB_4n6s_mc
Hello Chris will ask marketing. Have a great week-end
chrisforensic 6/17/2023 12:20 AM
thanks 👍
Avatar
KAPE is free to use for personal use right? Is there a way to download other than through Kroll's website since it errors for me
Avatar
Avatar
Coco
KAPE is free to use for personal use right? Is there a way to download other than through Kroll's website since it errors for me
Yeah it’s free for personal use. Try using incognito browser as it has no cookies and plugins
6:20 AM
If you’re using DNS ad-blocking, try disabling that temporarily too
Avatar
Avatar
Coco
KAPE is free to use for personal use right? Is there a way to download other than through Kroll's website since it errors for me
Andrew Rathbun 6/17/2023 6:21 AM
Ad blockers and other privacy extensions will prevent successful submission of the request form. Disable those or use incognito as @Matt stated 👍
Avatar
Yeah you right, just had to refresh incognito session cause I modified mine so it does run certain things like that
Avatar
Avatar
Matt
Yeah it’s free for personal use. Try using incognito browser as it has no cookies and plugins
Digitalferret 6/17/2023 6:22 AM
actually.... just found this now you mention Browsers. https://mullvad.net/en/browser it's the Dog's, mate
Avatar
Guess the next part will be hoping the e-mail comes through .-.
Avatar
Check junk mail I think mine ended up there 👀
Avatar
I wish, just didn't get sent I assume
Avatar
Original message was deleted or could not be loaded.
Because RAM
Avatar
Original message was deleted or could not be loaded.
Upon a user unlocking a device, they've authenticated themselves and in relation to encryption this authentication will decrypt the user data. When the phone is locked, the user data is still decrypted. If the phone restarts, the user data is encrypted until the user unlocks the phone again. Data you won't get in an AFU iOS extraction is Apple Health, Apple Email and Apple Location. "Backups" of these can be obtained if you have a 3rd party app syncing either. Bruteforcing is exactly the sane regardless of state 🙂
Avatar
Thank you mannn
Avatar
Could someone assist me in understanding the process of conducting forensic analysis on a router (access point), modem, and switch? Additionally, I would appreciate guidance on acquiring an image of these devices.
Avatar
Does anyone know where I can download the NIST Hacking Case? Their page is under maintenance, I don't know if anyone has the disk image saved and can share it, thanks!
Avatar
Avatar
Opresor
Does anyone know where I can download the NIST Hacking Case? Their page is under maintenance, I don't know if anyone has the disk image saved and can share it, thanks!
Digitalferret 6/18/2023 10:04 AM
mirror
Avatar
Avatar
Digitalferret
mirror
thank you very much!!
Avatar
Avatar
Opresor
thank you very much!!
Digitalferret 6/18/2023 10:08 AM
all groovy, best of luck
Avatar
Could someone assist me in understanding the process of conducting forensic analysis on a router (access point), modem, and switch? Additionally, I would appreciate guidance on acquiring an image of these devices.
Avatar
Avatar
oed1pus
Could someone assist me in understanding the process of conducting forensic analysis on a router (access point), modem, and switch? Additionally, I would appreciate guidance on acquiring an image of these devices.
You asked the same question yesterday, that @Digitalferret answered.....
Avatar
Avatar
florus
You asked the same question yesterday, that @Digitalferret answered.....
Digitalferret 6/19/2023 3:58 AM
ummm, not sure that was me mate. i answered the Q just after his
Salute 1
Avatar
@florus @Digitalferret answered to @Opresor
Salute 1
Avatar
Avatar
oed1pus
@florus @Digitalferret answered to @Opresor
Digitalferret 6/19/2023 4:11 AM
best chance might be Youtube, mate. try https://www.youtube.com/watch?v=yOgQGdoFawU and then go outwards from there?
4:12 AM
there's a router one by another, but for some reason his video is rotated by 90degrees which makes reading awkward
4:17 AM
Avatar
Avatar
Digitalferret
best chance might be Youtube, mate. try https://www.youtube.com/watch?v=yOgQGdoFawU and then go outwards from there?
haha. Thanks man. I will watch them.
Avatar
kmacdonald1565 6/19/2023 9:30 AM
@ICAC So i am reaching out for some help. i found a file that was a zip that was inside another file with potential for a descriptive file name, albeit a single word, and inside of that zip was another zip file named 579_video_files.zip and a password.html file. The password html points to a website to buy a subscription to emload for a specific "access_password.pdf" file. has anyone come across this before/have a password? if not anyone have luck getting a password from such sources.
Avatar
Avatar
kmacdonald1565
@ICAC So i am reaching out for some help. i found a file that was a zip that was inside another file with potential for a descriptive file name, albeit a single word, and inside of that zip was another zip file named 579_video_files.zip and a password.html file. The password html points to a website to buy a subscription to emload for a specific "access_password.pdf" file. has anyone come across this before/have a password? if not anyone have luck getting a password from such sources.
I haven't heard of that before, but you might get lucky if they downloaded the access_password.pdf as the password might be in unallocated or slack space even if they deleted it. Have you tried building a wordlist from the suspect system(s) with Bulk Extractor to attack the hash of the ZIP?
🤘🏼 1
Avatar
Avatar
FullTang
I haven't heard of that before, but you might get lucky if they downloaded the access_password.pdf as the password might be in unallocated or slack space even if they deleted it. Have you tried building a wordlist from the suspect system(s) with Bulk Extractor to attack the hash of the ZIP?
This is how I would handle it to. Use zip2john and attack the password with the word list built from a ram capture (bulk extractor)
👍 1
Avatar
Avatar
kmacdonald1565
@ICAC So i am reaching out for some help. i found a file that was a zip that was inside another file with potential for a descriptive file name, albeit a single word, and inside of that zip was another zip file named 579_video_files.zip and a password.html file. The password html points to a website to buy a subscription to emload for a specific "access_password.pdf" file. has anyone come across this before/have a password? if not anyone have luck getting a password from such sources.
Digitalferret 6/19/2023 10:11 AM
generically, similar mnidset for Fulltang. if you have a disk there, do a full data recovery including deleted, and carving files by header and footer. if the suspect opened and read the file, there may be a possibility it was stored as a temp file and that remains even if the original was deleted (which also may be available as a full file) (edited)
🤘🏼 2
Avatar
Avatar
kmacdonald1565
@ICAC So i am reaching out for some help. i found a file that was a zip that was inside another file with potential for a descriptive file name, albeit a single word, and inside of that zip was another zip file named 579_video_files.zip and a password.html file. The password html points to a website to buy a subscription to emload for a specific "access_password.pdf" file. has anyone come across this before/have a password? if not anyone have luck getting a password from such sources.
Deleted User 6/19/2023 11:23 AM
Naming convention is somewhat similar to a torrent I have flagged before but not familiar - just did a DHT search and got nothing. Heads up that there are prior Google queries on how to open what looks like this “579” file.
Avatar
kmacdonald1565 6/19/2023 4:32 PM
Unfortunately no disk, no exam. This is on a locked newer iPhone. No known pass code but we have some ideas. it is currently unlocked and no screen time out so we were browsing it
Avatar
Avatar
kmacdonald1565
Unfortunately no disk, no exam. This is on a locked newer iPhone. No known pass code but we have some ideas. it is currently unlocked and no screen time out so we were browsing it
You could try generating a wordlist with Axiom WLG.
Avatar
Avatar
kmacdonald1565
Unfortunately no disk, no exam. This is on a locked newer iPhone. No known pass code but we have some ideas. it is currently unlocked and no screen time out so we were browsing it
Digitalferret 6/20/2023 1:25 AM
as per Howards note on google searches, might it be that like other's the suspect has downloaded but not actually bought in? (edited)
Avatar
Avatar
Digitalferret
as per Howards note on google searches, might it be that like other's the suspect has downloaded but not actually bought in? (edited)
kmacdonald1565 6/20/2023 6:02 AM
its possible...but our other evidence is a password protected macbook air, i think it was a A1932. case involved a lot of torrent stuff so anything chargable is what we are looking for at this point.
👍🏻 1
Avatar
Digitalferret 6/20/2023 7:14 AM
roger that. sounds like you need more than a single non-ambiguous document title. no other side ways in like torrent names? the only other way i can think of is doing the search for internet mentions of '579_video_files' and procure a list of pointers. I'd expect there'd be a consistent theme to where that resource is advertised, and it won't be cookery video sites 🙂
Avatar
Avatar
kmacdonald1565
its possible...but our other evidence is a password protected macbook air, i think it was a A1932. case involved a lot of torrent stuff so anything chargable is what we are looking for at this point.
Deleted User 6/20/2023 10:15 AM
Any chance the suspect was into ethical hacking? If so I have a long shot.
Avatar
kmacdonald1565 6/20/2023 10:19 AM
yeah, I didnt find too much. Thats the weird thing about all of this. There are 579 files in the zip all avi files. The contained one is a solid indicator word, but not one of the top ones that you look for...for obvious reasons i dont want to list it here.
Avatar
Avatar
Deleted User
Any chance the suspect was into ethical hacking? If so I have a long shot.
kmacdonald1565 6/20/2023 10:20 AM
eh maybe
Avatar
Avatar
kmacdonald1565
eh maybe
Deleted User 6/20/2023 10:24 AM
My longshot was contingent on filename but since there are actively 576 files it’s null and void. The collection format, naming convention and use of .avi. If it quacks. I have something I can try and will DM you if I get a result. Ran that filename and variations through several more DHT services and got nothing again.
Avatar
Hello everyone, i have a file with HIF file extension, extracted from airport scanner, how can I read and view images on windows 10?
Avatar
My latest article got some decent attention on LinkedIn and I thought it might be of interest here: https://medium.com/forensic-horizons/a-jurors-perspective-of-digital-evidence-65eff2b1b574 Of note: this was a fairly straightforward trial with fairly straightforward evidence, and still, jurors had questions that prosecutors couldn't answer. Really happy for the unexpected opportunity to write about this side of jury trials.
How do jurors really weigh digital evidence? Previously, I wrote about how complicated it can be to present digital evidence to…
Avatar
Case concerning Cellebrite. It's about recovery of data not available at the original time but later when updates had been issued. See paras marked in yellow. Here is link to posted Court ruling https://www.bailii.org/ie/cases/IECA/2023/2023IECA148.html (edited)
👍 1
Avatar
Pizzantelope 6/20/2023 6:39 PM
Does anyone have the number for the fusion center in Houston? Trying to get some info about a crew out there
Avatar
Avatar
Pizzantelope
Does anyone have the number for the fusion center in Houston? Trying to get some info about a crew out there
713-884-4710 is what’s listed from DHS
Avatar
⭐Jigglypuff⭐ 6/20/2023 9:16 PM
Is there anyone in law enforcement here in the USA working for NSA?
9:16 PM
If so how long is the hiring process?
Avatar
Avatar
kmacdonald1565
yeah, I didnt find too much. Thats the weird thing about all of this. There are 579 files in the zip all avi files. The contained one is a solid indicator word, but not one of the top ones that you look for...for obvious reasons i dont want to list it here.
Deleted User 6/20/2023 11:07 PM
Found a lead for you. Sent DM.
👍 1
Avatar
chrisforensic 6/21/2023 1:12 AM
heyho @Cellebrite just tested new beta PA 8.5.100... have to say, works really fine, thanks 👍
Salute 2
cellebrite 2
💪 2
👍 1
Avatar
Avatar
chrisforensic
heyho @Cellebrite just tested new beta PA 8.5.100... have to say, works really fine, thanks 👍
CLB_4n6s_mc 6/21/2023 1:13 AM
Thank you Chris this is really important for us.
Avatar
Does anyone have any recommendations for a trio cable to be used just to charge devices in a box whilst they are being bruteforced or AFU awaiting extraction? Looking for USBC,Micro and Lightning. (edited)
Avatar
Forensic@tor 6/21/2023 4:11 AM
@Rob#0#0#0 better off getting a USB power hub (5-10 ports) with an Anker Powerline 2, a 3 in 1 cable. (edited)
👍 1
Avatar
Avatar
Forensic@tor
@Rob#0#0#0 better off getting a USB power hub (5-10 ports) with an Anker Powerline 2, a 3 in 1 cable. (edited)
Will look into that cable thanks!
Avatar
heatherDFIR 6/21/2023 5:32 AM
We have a new YouTube series that started yesterday. Briggs was my first guest. Check it out - only 19 mins of your time. https://www.youtube.com/live/JYUPc-1nWe0?feature=share Subscribe for future ones. Will run the third Tues of every month. If you want to be a guest or recommend a guest, let me know.
♥️ 1
👍 2
👍🏻 1
cellebrite 1
Avatar
Avatar
heatherDFIR
We have a new YouTube series that started yesterday. Briggs was my first guest. Check it out - only 19 mins of your time. https://www.youtube.com/live/JYUPc-1nWe0?feature=share Subscribe for future ones. Will run the third Tues of every month. If you want to be a guest or recommend a guest, let me know.
Thanks Heather, very informative 👏
😀 1
Avatar
Avatar
Deleted User
My longshot was contingent on filename but since there are actively 576 files it’s null and void. The collection format, naming convention and use of .avi. If it quacks. I have something I can try and will DM you if I get a result. Ran that filename and variations through several more DHT services and got nothing again.
I actually have a zip with that same name in an old case I have. Never succeeded in cracking it though. I'd like to be included on any leads you have on this. (edited)
Avatar
Avatar
b8vr
I actually have a zip with that same name in an old case I have. Never succeeded in cracking it though. I'd like to be included on any leads you have on this. (edited)
Deleted User 6/21/2023 8:05 AM
Will DM you shortly
👍 1
Avatar
Seraphina1698 6/21/2023 9:32 AM
Not sure the best channel for this question, so I'm posting it hear in general to be safe/hope that ok. I need to piece/match EML files extracted from a PST to a list if message-ID for my boss. (I have over 1000 message-id) Is there a tool to help do this or is writing a type of scraping script to scrape all the message-id from the EML files and matching back myself my best option?
Avatar
Avatar
Seraphina1698
Not sure the best channel for this question, so I'm posting it hear in general to be safe/hope that ok. I need to piece/match EML files extracted from a PST to a list if message-ID for my boss. (I have over 1000 message-id) Is there a tool to help do this or is writing a type of scraping script to scrape all the message-id from the EML files and matching back myself my best option?
I'm not sure of one, but if you come across one I will likely need it in the future as well for selectively carving messages that match unauthorized access logs. I have so far assumed when the time came i'd be doing something in python (edited)
Avatar
Seraphina1698 6/21/2023 10:00 AM
OK, yeah I'm working on a python script to try and do what I want because I haven't found a tool yet myself either.
Avatar
Avatar
Seraphina1698
OK, yeah I'm working on a python script to try and do what I want because I haven't found a tool yet myself either.
Haven’t used it but looks like it will dump eml to csv file.
11:22 AM
Convert a collection of eml files to CSV. Contribute to lovasoa/eml2csv development by creating an account on GitHub.
Avatar
Avatar
Seraphina1698
Not sure the best channel for this question, so I'm posting it hear in general to be safe/hope that ok. I need to piece/match EML files extracted from a PST to a list if message-ID for my boss. (I have over 1000 message-id) Is there a tool to help do this or is writing a type of scraping script to scrape all the message-id from the EML files and matching back myself my best option?
Metaspike should help you do this but it needs to be purchased
Avatar
it can likely be done with grep, something like grep -RLif list_of_messageids.txt *.eml | parallel "cp {} matched" to copy matched files to a folder named matched (edited)
11:43 AM
but my worry would be with the forced character width structure eml files use truncating the message id between lines (edited)
Avatar
Avatar
tklane
Metaspike should help you do this but it needs to be purchased
Yes. FEI will extract the message IDs and can be exported
Avatar
Currently working a CSAM case, which is not my common case type. There are hundreds of CSAM images and videos on the device. I'm using Magnet Axiom and am aware of the ability to import a .csv with known CSAM hash values. Where do I obtain the most comprehensive hash value set. (edited)
Avatar
Avatar
Leonidas
Currently working a CSAM case, which is not my common case type. There are hundreds of CSAM images and videos on the device. I'm using Magnet Axiom and am aware of the ability to import a .csv with known CSAM hash values. Where do I obtain the most comprehensive hash value set. (edited)
What are you trying to do? Update a hash set for other investigators, use a hash set to identify additional CSAM, or provide the hash values as evidence that can be discovered?
Avatar
Avatar
FullTang
What are you trying to do? Update a hash set for other investigators, use a hash set to identify additional CSAM, or provide the hash values as evidence that can be discovered?
Use a hash set to identify known CSAM
Avatar
Avatar
Leonidas
Use a hash set to identify known CSAM
Have you tried using Thorn? Its new to Axiom Examine and should be free to LE.
12:50 PM
My understanding is it uses AI to identify CSAM instead of hashes.
Avatar
Avatar
FullTang
Have you tried using Thorn? Its new to Axiom Examine and should be free to LE.
I haven't.
Avatar
Avatar
Leonidas
I haven't.
I would give that a shot. You can also use the hashset from @Project VIC
Avatar
Avatar
FullTang
I would give that a shot. You can also use the hashset from @Project VIC
I'm reading Magnet's website about Thorn now, thank you for the pointers. I am assuming it's a built in feature of the Magnet.Ai categorization. I'll check into @Project VIC as well.
👍 1
Avatar
Avatar
Leonidas
I'm reading Magnet's website about Thorn now, thank you for the pointers. I am assuming it's a built in feature of the Magnet.Ai categorization. I'll check into @Project VIC as well.
You have to sign up for Thorn and it can take a few days to get your key, but it should be free.
Avatar
Avatar
FullTang
You have to sign up for Thorn and it can take a few days to get your key, but it should be free.
Thank you! I'll call Magnet and see about getting access. Magnet's customer portal indicates it's integrated in the latest version of Axiom. I'm just not sure how to utilize it.
Avatar
Avatar
Leonidas
Thank you! I'll call Magnet and see about getting access. Magnet's customer portal indicates it's integrated in the latest version of Axiom. I'm just not sure how to utilize it.
I am pretty sure I signed up using the link when starting a new Axiom Examine Process case. (edited)
12:58 PM
Or... Its somewhere in the settings...
Avatar
Avatar
FullTang
Or... Its somewhere in the settings...
You are correct! Found it! Thank you!
👍 1
Avatar
Avatar
FullTang
Or... Its somewhere in the settings...
Application submitted. Thanks again, Fulltang!
🥳 1
Avatar
Is there a server/channel where DF freelancers can connect/refer/cooperate on jobs? Example, right now I can use someone qualified & willing to potentially testify in federal court re imaging a laptop in the region of Newark NJ (Victim laptop to be handled over to FBI office by an associate in NJ upon completion) (edited)
Avatar
I love when subjects google anti-forensic tactics and then...don't delete their search history 😂
this 8
😄 2
🫡 1
Avatar
Avatar
DFE Travis
I love when subjects google anti-forensic tactics and then...don't delete their search history 😂
kmacdonald1565 6/22/2023 6:31 AM
this happened recently....and from previous cases, googling information about "how much prison time for x crime" or "is prison bad?"
Avatar
😂 Man, you can't make this stuff up
6:32 AM
To drive home his usage, even without chat logs, I'mma sum up the App Usage for the time range he was suspected of sending the messeges
Avatar
Avatar
DFE Travis
I love when subjects google anti-forensic tactics and then...don't delete their search history 😂
mine cleared the history to ""cover his tracks"" then days later went to googling the same methods
🤦‍♂️ 5
🤦 1
🤦‍♀️ 1
Avatar
Avatar
Don Cav
Is there a server/channel where DF freelancers can connect/refer/cooperate on jobs? Example, right now I can use someone qualified & willing to potentially testify in federal court re imaging a laptop in the region of Newark NJ (Victim laptop to be handled over to FBI office by an associate in NJ upon completion) (edited)
We don’t have a channel dedicated to that here and I’m not sure of any other servers that do that. I know in IACIS listerv there are requests that go out similar to yours on a frequent basis.
Avatar
Avatar
DFE Travis
I love when subjects google anti-forensic tactics and then...don't delete their search history 😂
At least they made an informed decision. On an armed robbery case, suspect googled about armed robbery time 3 days prior to the crime.
👀 3
Avatar
I have some Mac Time Machine backups that are saved as a sparse disk image bundle. I could not open the image in EnCase or process it with AXIOM. This bundle contains about 100 backups. Does anyone know how I could get at this data and ideally process it with Magnet AXIOM?
Avatar
Avatar
Jobbins
We don’t have a channel dedicated to that here and I’m not sure of any other servers that do that. I know in IACIS listerv there are requests that go out similar to yours on a frequent basis.
Thx for the lead on that, looks like I might have to re-join IACIS
Avatar
Any @Law Enforcement [UK] who use CAS able to drop me a DM please?
📩 1
Avatar
Speaking of IACIS, is HTCIA still legit? How many folks here are members?
Avatar
⭐Jigglypuff⭐ 6/22/2023 3:03 PM
Hi guys I was wondering if anyone took the Data Science Exam for NSA
3:03 PM
If so is it hard? I was looking at the topics and they looked scary
Avatar
Avatar
conf1ck3r
Speaking of IACIS, is HTCIA still legit? How many folks here are members?
I’m a member for the Northern CA Chapter. I feel that the chapter here is making progress in generating new interest in the org.
Avatar
Anyone in USA know of a GSA contractual vendor that is selling Tableau TX1? We were awarded a JAG grant but due to purchasing policy it must be done via GSA or I've got to obtain three quotes from different vendors.
Avatar
Avatar
Don Cav
Is there a server/channel where DF freelancers can connect/refer/cooperate on jobs? Example, right now I can use someone qualified & willing to potentially testify in federal court re imaging a laptop in the region of Newark NJ (Victim laptop to be handled over to FBI office by an associate in NJ upon completion) (edited)
HTCIA has a listserv that may facilitate those connections, as well. It started up again last year. (edited)
Avatar
Avatar
Leonidas
Anyone in USA know of a GSA contractual vendor that is selling Tableau TX1? We were awarded a JAG grant but due to purchasing policy it must be done via GSA or I've got to obtain three quotes from different vendors.
GSA Advantage is the best place to start, here are some search results for you: https://www.gsaadvantage.gov/advantage/ws/search/advantage_search?q=0:8Mediatech%20tableau&db=0&searchType=0
Avatar
Avatar
Don Cav
GSA Advantage is the best place to start, here are some search results for you: https://www.gsaadvantage.gov/advantage/ws/search/advantage_search?q=0:8Mediatech%20tableau&db=0&searchType=0
Nice! Thank you! Bookmarked!
Avatar
Avatar
conf1ck3r
Speaking of IACIS, is HTCIA still legit? How many folks here are members?
Your username is triggering me 😳
😂 1
Avatar
Avatar
Don Cav
Your username is triggering me 😳
Is this better? troll kek (edited)
Avatar
Wasn’t a first responder on emotet, so we’re good now (plus, makes me think of Brenden Fraser, and how can that be triggering?)
😂 2
💯 1
Avatar
Avatar
glennard
At least they made an informed decision. On an armed robbery case, suspect googled about armed robbery time 3 days prior to the crime.
Andrew Rathbun 6/22/2023 6:47 PM
That's what detectives call a clue
Avatar
Avatar
Andrew Rathbun
That's what detectives call a clue
Digitalferret 6/23/2023 4:24 AM
lol, gift more like. so much return for so little effort. whatsitcalled - "low hanging fruit" . In the words of the immortal prophet Goggins: "Merry Christmas M....r "
4:25 AM
i'd so do that, lol. soon as we get a hit, boom "Merry Christmas....M.." right across the office 🤣
Avatar
We've LIVE! for528.com/summit23
🙌 2
Avatar
Anyone have a good contact with Law Enforcement Liaison for T-Mobile? We have a few phones which were purchased as a result of fraud. Our victim has been made whole, but we now have two iPhone 14's with no owner. They were purchased from some T-Mobile store in the country but we have no way of finding out which one. IMEI"s are blacklisted as stolen or missing.
Avatar
Avatar
Ghosted
Anyone have a good contact with Law Enforcement Liaison for T-Mobile? We have a few phones which were purchased as a result of fraud. Our victim has been made whole, but we now have two iPhone 14's with no owner. They were purchased from some T-Mobile store in the country but we have no way of finding out which one. IMEI"s are blacklisted as stolen or missing.
Andrew Rathbun 6/23/2023 7:28 AM
Have you tried Search.org?
Avatar
@Andrew Rathbun Well I use it all the time and for some unknown reason I did not think about it for this. Haha Thanks Rathbun.
💯 1
Avatar
Hello ! Anyone @Cellebrite can help me about a folder in Cellebrite Mobile Synchronization \Iman folder ? My question is can I delete some temp files inside ? I had around 140 Go of data on it and take some place in my C:\ folder. Also can I change this folder for a new one to free some space ? thanks
📬 1
Avatar
Hello 👋 I’m requesting permission to share a survey form I’ve created for my PhD research work. It is a small form, well only take about 5 minutes to complete. Please advise if I can share the form? It’ll be incredibly helpful for my research work.
👍🏻 1
Avatar
Avatar
Andrew Rathbun
FYI, anyone can post surveys for grad research, vendors, etc, just run it by one of us to make sure we get it in the right channel so we avoid spam. Equal opportunity for all and every 👍
@custard post away 🙂
🤩 1
Avatar
Is anyone able to provide cryptocurrency investigation policy or freeze/seize policy related to crypto?
Avatar
Attention all! Seeking your valuable insights! Hi everyone! I'm currently running a short survey on increasing digital evidence and the challenges around collecting and storing it. It'll only take 5 minutes, tops, to complete, and your input would be greatly appreciated. Here's the survey link: https://tinyurl.com/dfphdsurvey Please share your experiences and thoughts to help shed light on this important topic! Let's work together to address these challenges. Spread the word and encourage others to participate too! The more responses we gather, the better. Thank you in advance for your time and valuable input!
Avatar
Hi everyone- probably a dumb question - we use 'hot swap' hard drives on a forensic PC with normal HDD's in the hot swap enclosure. Do SSD's make extractions (i.e. Cellebrite) go faster than extracting onto a normal HDD?
Avatar
Avatar
E. Paul
Hi everyone- probably a dumb question - we use 'hot swap' hard drives on a forensic PC with normal HDD's in the hot swap enclosure. Do SSD's make extractions (i.e. Cellebrite) go faster than extracting onto a normal HDD?
Yes. SSDs would make it faster. Mainly cuz there are no moving parts in SSDs. You should see considerable speed jump.
👍 1
Avatar
Had anyone done any work with AI since it’s growing from coding or understanding it in the background
Avatar
Avatar
E. Paul
Hi everyone- probably a dumb question - we use 'hot swap' hard drives on a forensic PC with normal HDD's in the hot swap enclosure. Do SSD's make extractions (i.e. Cellebrite) go faster than extracting onto a normal HDD?
Digitalferret 6/24/2023 8:15 AM
In general operations SSD's are faster read/write than HDD's for instance you'll boot up far quicker as you'll likely know, but in practical terms, imaging etc, surely that would depend on the weakest/slowest link or bottleneck? <source> - - <cables/bus> - - <destination> ? (edited)
💯 2
Avatar
Avatar
Ahmedl21
Had anyone done any work with AI since it’s growing from coding or understanding it in the background
Have done some rudimentary work. Used CNNs for face recognition and weapon detection Wrote the script in python with fastai library. Fine tuned existing resent network
Avatar
A NAS i use once a year to store tax returns just used 200 gigabytes of traffic
9:15 AM
I went downstairs and pulled the ethernet cable out but didn’t turn it off
Avatar
Avatar
custard
Have done some rudimentary work. Used CNNs for face recognition and weapon detection Wrote the script in python with fastai library. Fine tuned existing resent network
Got any tips or a good starting places I been trying to learn and understand AI
Avatar
Avatar
Ahmedl21
Got any tips or a good starting places I been trying to learn and understand AI
Digitalferret 6/26/2023 1:38 AM
thats a pretty wide set of goalposts. where have you tried already and broad or narrow focus?
Avatar
Hello @MSAB @Cellebrite, In my work, I got two Radeon RX580 ARMOR 8G OC Could it be useful to add theses two graphics cards in my computer for increase the performance ? Thanks for advance 🙂
Avatar
Avatar
Herodote
Hello @MSAB @Cellebrite, In my work, I got two Radeon RX580 ARMOR 8G OC Could it be useful to add theses two graphics cards in my computer for increase the performance ? Thanks for advance 🙂
I'm afraid that the only graphics card that XRY can benefit from is NVIDIA cards, which can be used to enhance the performace of Image recognition.
👍 1
Avatar
@MSAB_Sofia thanks for the fast answer 🙂 . So you mean that adding a new card (NVIDIA Cards) is pertinent only for enhancing the image recognition (for MSAB)
Avatar
Avatar
Herodote
@MSAB_Sofia thanks for the fast answer 🙂 . So you mean that adding a new card (NVIDIA Cards) is pertinent only for enhancing the image recognition (for MSAB)
Yes, it is only image recognition that can use graphics card to enhance performance in decoding. All other modules are run using the CPU.
👍 1
Avatar
Thanks !!
Avatar
Avatar
Galt1
Is anyone able to provide cryptocurrency investigation policy or freeze/seize policy related to crypto?
Search #policies-and-procedures or #darknet-virtual-currencies I think it may have been talked about in there. I believe @NW3C has a template on there site as well.
Avatar
Avatar
Jobbins
Search #policies-and-procedures or #darknet-virtual-currencies I think it may have been talked about in there. I believe @NW3C has a template on there site as well.
nw3c is a great resource for free classes for those in leo positions
Avatar
hi all- having issues with an m.2 ssd w/ linux installed. Our windows based forensic PC simply does not detect it. Ive tried an array of adapters and cables- no dice. I have an m.2 with windows that was imaged no problem with this same adapter. The linux m.2 doesnt show up in file explorer; and doesnt show up in axiom or autopsy. Using a tableau (sp?) ultrabay 4 write blocker, pcie port
Avatar
Avatar
E. Paul
hi all- having issues with an m.2 ssd w/ linux installed. Our windows based forensic PC simply does not detect it. Ive tried an array of adapters and cables- no dice. I have an m.2 with windows that was imaged no problem with this same adapter. The linux m.2 doesnt show up in file explorer; and doesnt show up in axiom or autopsy. Using a tableau (sp?) ultrabay 4 write blocker, pcie port
it sounds like it's in an unsupported format (like EXT4, for ex). by default, windows can't read (let alone mount) those file systems. that's incredibly odd though that axiom/autopsy can't see it. 100% confirmed that the drive hasn't been tampered with / wiped? you might have to do some manual legwork of A) verifying if the drive is observed at that port but not able to read/mount and B) if the file table is intact within the drive itself once found
8:30 AM
mountvol on windows should do the trick to list all volumes by their GUID
8:31 AM
or, hopefully, disk management
Avatar
Is it nvme? Maybe only sata support?
Avatar
Thanks for the advice. Im positive it was wasnt wiped or tampered with, just simply isnt recognized when plugged in. Tried axiom, autopsy, ftk, no luck 😞
Avatar
@Magnet Forensics or anyone else - performing picture categorization never completes - it hangs at random intervals. Any ideas on how to fix this issue?
Avatar
Avatar
E. Paul
hi all- having issues with an m.2 ssd w/ linux installed. Our windows based forensic PC simply does not detect it. Ive tried an array of adapters and cables- no dice. I have an m.2 with windows that was imaged no problem with this same adapter. The linux m.2 doesnt show up in file explorer; and doesnt show up in axiom or autopsy. Using a tableau (sp?) ultrabay 4 write blocker, pcie port
I have had the same issue. I was using an m.2 SSD to USB adapter. That particular adapter worked on other m2, it was because one was sata the other was
this 1
👍 1
Avatar
Avatar
E. Paul
Thanks for the advice. Im positive it was wasnt wiped or tampered with, just simply isnt recognized when plugged in. Tried axiom, autopsy, ftk, no luck 😞
i'd check disk management - see if it's listed as a storage location but doesn't have a drive letter assigned
👍 1
Avatar
Hello.. so Im in 4th yr of my college and I am planning on doing masters in 2026. I will be opting for digital forensics. I have mostly worked on data science projects in the past 3 years of my college and not many consider this smart but I just feel this is something I would like better. I have done cybersecurity and networking as a part of my course but I really want to dive deeper into this field. So.. how do i start? Also, I would like the courses to be slightly more challenging. For instance, the assignment questions on cs50 were more challenging(for someone who is new to coding) than other free courses. Any kind of help would greatly be appreciated, thank you.
Avatar
Welcome! DF is quite a big field, do you know which parts you'd be more interested in? Mobile forensics? Desktop forensics? Network forensics? Memory forensics?
Avatar
network forensics and memory forensics
Avatar
Currently getting my new work laptop up and running. What is the most secure browser these days that’s recommended? Brave? Arc? Chrome? Also looking for password management suggestions. (edited)
Avatar
Avatar
hallux
Currently getting my new work laptop up and running. What is the most secure browser these days that’s recommended? Brave? Arc? Chrome? Also looking for password management suggestions. (edited)
I use Bitwarden with 2 factor, and complex generated passwords. I use to use lasspass until they started to charge for mobile or computer use. I can't image not using password management today with all the websites to log into.
👍 3
this 3
Avatar
Awesome. I downloaded Bitwarden now! Any browser recommendations?
Avatar
Personally, I switched from Chrome to Edge and I'm happy.
Avatar
Andrew Rathbun 6/26/2023 1:25 PM
Edge with vertical tabs has been awesome. 1Password has been awesome for me. Works awesome on Chrome, Firefox, and Edge
Avatar
Avatar
hallux
Awesome. I downloaded Bitwarden now! Any browser recommendations?
Deleted User 6/26/2023 1:48 PM
Firefox with add on’s uBlock origin + Adblock Plus and then lock the browser down to keep track of no data, so essentially perpetually in “privacy” mode. Throw in a 3rd party DNS service like OpenDNS or something similar to lock it down even more.
Avatar
Avatar
hallux
Currently getting my new work laptop up and running. What is the most secure browser these days that’s recommended? Brave? Arc? Chrome? Also looking for password management suggestions. (edited)
Digitalferret 6/26/2023 2:36 PM
Mullvad browser and a Keepass variant
Avatar
I’m a Apple user so this windows stuff is all wonky. I just had Bitwarden offer for remember a login but the buttons didn’t work to do so lol
Avatar
Avatar
hallux
Currently getting my new work laptop up and running. What is the most secure browser these days that’s recommended? Brave? Arc? Chrome? Also looking for password management suggestions. (edited)
Personally recommend KeepassXC for password manager. Uses local db files. Can be set up to be used with yubikey as well.
Avatar
Thanks for the suggestions, landed on using Bitwarden and Edge for now and I'll see how that goes.
7:01 PM
I downloaded Maltego to play around with and see if I can use it instead of something like Datawalk as it seems to be highly recommended. I found some videos on the Maltego YouTube and it shows to be using a transform called namechkhowever no matter how I try to find that transform, I cannot... many others have complained in the comments of the same. Am I missing something? Additionally, another YouTube video I found running version CE 4.3.1 has many many more entities then I have. Is this a setting issue or did I do something incorrect during install?
Avatar
Avatar
carook
I downloaded Maltego to play around with and see if I can use it instead of something like Datawalk as it seems to be highly recommended. I found some videos on the Maltego YouTube and it shows to be using a transform called namechkhowever no matter how I try to find that transform, I cannot... many others have complained in the comments of the same. Am I missing something? Additionally, another YouTube video I found running version CE 4.3.1 has many many more entities then I have. Is this a setting issue or did I do something incorrect during install?
Did you install the Standard Transforms? https://www.quantusintel.group/standard-transforms-maltego/
Avatar
Avatar
Ahmedl21
Got any tips or a good starting places I been trying to learn and understand AI
fast.ai has a very comprehensive course Includes CV and NLP and more
Avatar
Hi I've been looking into a new laptop. My requiements are pretty high since I want to do stuff with AI and multithreadded programming. I came across the Talino laptops as a possible choice. Since they are for forensics, I figured I'd pose some questions here. Are the Talinos worth $2500 (after tax)? Is the battery life decent (> 6hrs) Are the screens bright enough to be seen outside? How heavy are they? Are they loud? What is their compatibility with aftermarket upgrades? How long do they typically last in the long term?
Avatar
Avatar
tapatiosec
Hi I've been looking into a new laptop. My requiements are pretty high since I want to do stuff with AI and multithreadded programming. I came across the Talino laptops as a possible choice. Since they are for forensics, I figured I'd pose some questions here. Are the Talinos worth $2500 (after tax)? Is the battery life decent (> 6hrs) Are the screens bright enough to be seen outside? How heavy are they? Are they loud? What is their compatibility with aftermarket upgrades? How long do they typically last in the long term?
i wouldn't recommend talinos as a daily driver machine tbh, they're absolutely workhorses. worth the money? yes if you're going to be using the most of their hardware. battery life is subpar imo, we keep ours plugged in 24/7. screens are bright, nothing special. loud + heavy, absolutely. not sure about compatibility but they can be opened up like any other laptop. long term, we have yet to kill one and run them constantly for investigations (i think our oldest is about 5~ years)
💯 1
Avatar
is a laptop absolutely mandatory? Going to be compromises with anything portable
Avatar
Hey I have a home router that I want to do a forensic copy of it. Does anyone have an idea how to do this? Thanks
Avatar
what do you mean make a forensic copy of? Are you just wanting to download router logs?
Avatar
Avatar
whee30
is a laptop absolutely mandatory? Going to be compromises with anything portable
Yes. I want to upgrade my current laptop which can't handle any operating system when it comes to battery. I get around two hours of battery life on both Windows 10/11 and linux. I need a computer that can also take with me to work on the field when I go for testing my ML algorithms for up to three hours a day off battery.
2:45 PM
Also, when I go back to campus, I need to be able to use it outside in the quad under direct sunlight.
Avatar
Avatar
E. Paul
Thanks for the advice. Im positive it was wasnt wiped or tampered with, just simply isnt recognized when plugged in. Tried axiom, autopsy, ftk, no luck 😞
Use a Linux forensics workstation
Avatar
Avatar
hallux
Currently getting my new work laptop up and running. What is the most secure browser these days that’s recommended? Brave? Arc? Chrome? Also looking for password management suggestions. (edited)
I use Enpass for pw manager, Firefox developer editition as main browser.
Avatar
Avatar
tapatiosec
Hi I've been looking into a new laptop. My requiements are pretty high since I want to do stuff with AI and multithreadded programming. I came across the Talino laptops as a possible choice. Since they are for forensics, I figured I'd pose some questions here. Are the Talinos worth $2500 (after tax)? Is the battery life decent (> 6hrs) Are the screens bright enough to be seen outside? How heavy are they? Are they loud? What is their compatibility with aftermarket upgrades? How long do they typically last in the long term?
I’d go for a Thinkpad. Find one on sale in your budget. Will last forever.
Avatar
Avatar
ryd3v
I’d go for a Thinkpad. Find one on sale in your budget. Will last forever.
ww-single-model-think-workstations-thinkpadp-default
8:37 PM
It looks nice specs and cool overall laptop for a nice price.
Avatar
Yes that’s nice. But I prefer the AMD version, I have one with AMD 7 Pro and it’s really fast and good battery life and better graphics than intel
Avatar
These are definitely not $Microsoft but more liked hacked versions; just in case they come up during an examination. https://www.minitool.com/news/windows-11-x-lite.html https://ko-fi.com/windowsxlite
This post shows you how to download Windows 11 X-Lite and install this lite edition on your PC to experience Windows 11 although the PC is low-end.
Become a supporter of Windows X-Lite today! ❤️ Ko-fi lets you support the creators you love with no fees on donations.
Avatar
If a machine's powered on and all efforts to image an m.2 drive have failed (it's simply not recognized by any forensic software or windows itself using various adapters) - just how bad is it to do a live acquisition of the SSD via FTK? I've never done this and know it's most def not 'best practice,' but in a pinch? Thoughts?
4:30 AM
By live acquisition I mean launching FTK right from the target laptop via USB and generating the e01 on an external, also plugged into the target
Avatar
Avatar
E. Paul
If a machine's powered on and all efforts to image an m.2 drive have failed (it's simply not recognized by any forensic software or windows itself using various adapters) - just how bad is it to do a live acquisition of the SSD via FTK? I've never done this and know it's most def not 'best practice,' but in a pinch? Thoughts?
Just write down what you did and why, thats the best what you can do. Its up to the court, if its accepted or not.
👍 1
Avatar
Avatar
E. Paul
If a machine's powered on and all efforts to image an m.2 drive have failed (it's simply not recognized by any forensic software or windows itself using various adapters) - just how bad is it to do a live acquisition of the SSD via FTK? I've never done this and know it's most def not 'best practice,' but in a pinch? Thoughts?
I have had success with cheap Amazon SSD to USB adapters recognizing an M.2 SSD when none of my fancy tools would recognize it. You might also try booting the laptop into Kali Linux on a USB and see if it recognizes the SSD, I have also had success with that OS on an installed SSD when Paladin failed me.
👍 1
4:39 AM
But I have also done a live acquisition like you are talking about. I have a 32bit portable CLI version of FTK Imager that has a minimal footprint and will run on anything for when all else fails.
Avatar
Avatar
FullTang
I have had success with cheap Amazon SSD to USB adapters recognizing an M.2 SSD when none of my fancy tools would recognize it. You might also try booting the laptop into Kali Linux on a USB and see if it recognizes the SSD, I have also had success with that OS on an installed SSD when Paladin failed me.
Any recommendations on Amazon? Preferably a universal m.2 to usb
Avatar
Avatar
E. Paul
Any recommendations on Amazon? Preferably a universal m.2 to usb
There are SATA M.2s and NVME M.2s as M.2 is just a form factor. Here the the SATA one I have used with success: M.2 SATA SSD to USB 3.0 External... https://www.amazon.com/dp/B076DCNZM3?ref=ppx_pop_mob_ap_share
M.2 SATA SSD to USB 3.0 External SSD Reader Converter Adapter Enclosure with UASP, Support NGFF M.2 2280 2260 2242 2230 SSD with Key B/Key B+M(Can't Fit for PCIe NVMe/PCIe AHCI with Key M)
👍 1
Avatar
Avatar
E. Paul
By live acquisition I mean launching FTK right from the target laptop via USB and generating the e01 on an external, also plugged into the target
Is it possible for you to video the problem? In the early days of mobile phone examination taking a video was sometimes the only way to show info on the phone if no forensic suite was available or a mobile was malfunctioning etc.
Avatar
So I just had the same issue again- excuse my ignorance, but it seems to be that our readers don’t detect the m.2 drive with “two notches” at the top (I’m new to the m.2 world). From what I gathered on Reddit, this isn’t nvme and is a different type of drive. I’m going to try the adapter from Amazon and see if that’ll detect it
Avatar
Avatar
E. Paul
So I just had the same issue again- excuse my ignorance, but it seems to be that our readers don’t detect the m.2 drive with “two notches” at the top (I’m new to the m.2 world). From what I gathered on Reddit, this isn’t nvme and is a different type of drive. I’m going to try the adapter from Amazon and see if that’ll detect it
Avatar
NOT SURE IF THIS ONE WILL BE FOR DFIR JOBS? Greater Manchester Police Branch/Division Public Protection and Serious Crime Division Digital Forensic Investigator 1887999, - Ref:1887999 There are 3 Full Time permanent positions available. Closing Date 23 Jul 2023 https://atsv7.wcn.co.uk/search_engine/jobs.cgi?amNvZGU9MTg4Nzk5OSZ2dF90ZW1wbGF0ZT0xMTIwJm93bmVyPTUwNDM5MTQmb3duZXJ0eXBlPWZhaXImYnJhbmRfaWQ9MCZwb3N0aW5nX2NvZGU9MzUx&jcode=1887999&vt_template=1120&owner=5043914&ownertype=fair&brand_id=0&posting_code=351
Avatar
Avatar
E. Paul
So I just had the same issue again- excuse my ignorance, but it seems to be that our readers don’t detect the m.2 drive with “two notches” at the top (I’m new to the m.2 world). From what I gathered on Reddit, this isn’t nvme and is a different type of drive. I’m going to try the adapter from Amazon and see if that’ll detect it
The M.2s with two notches are SATA M.2s. The link I posted earlier is a SATA M.2 reader.
7:42 AM
Usually I have issues with my tools detecting SATA M.2 SSDs and that adapter has worked several times for me so hopefully it will work for you.
Avatar
Avatar
Colman
NOT SURE IF THIS ONE WILL BE FOR DFIR JOBS? Greater Manchester Police Branch/Division Public Protection and Serious Crime Division Digital Forensic Investigator 1887999, - Ref:1887999 There are 3 Full Time permanent positions available. Closing Date 23 Jul 2023 https://atsv7.wcn.co.uk/search_engine/jobs.cgi?amNvZGU9MTg4Nzk5OSZ2dF90ZW1wbGF0ZT0xMTIwJm93bmVyPTUwNDM5MTQmb3duZXJ0eXBlPWZhaXImYnJhbmRfaWQ9MCZwb3N0aW5nX2NvZGU9MzUx&jcode=1887999&vt_template=1120&owner=5043914&ownertype=fair&brand_id=0&posting_code=351
👍 1
Avatar
@stark4n6 OK thank you!
Avatar
Avatar
Beercow
Did you install the Standard Transforms? https://www.quantusintel.group/standard-transforms-maltego/
I only downloaded Maltego, so whatever it comes with out of the box is what I have. I'll assume if I don't have the namechk then I don't have what's needed and will download Standard Transforms. Thank you!
Avatar
Avatar
Beercow
Did you install the Standard Transforms? https://www.quantusintel.group/standard-transforms-maltego/
Appears Standard Transforms is installed, still don't seem to have namechk. I also don't have all of the entities in which I saw another individual have such as weapons, etc.
Avatar
Avatar
E. Paul
By live acquisition I mean launching FTK right from the target laptop via USB and generating the e01 on an external, also plugged into the target
Best practice is a set of guidelines, not carved in stone rules... be able to justify what you did (document the failures and steps you initially took to follow best practices) and you should be set.
Avatar
Avatar
E. Paul
So I just had the same issue again- excuse my ignorance, but it seems to be that our readers don’t detect the m.2 drive with “two notches” at the top (I’m new to the m.2 world). From what I gathered on Reddit, this isn’t nvme and is a different type of drive. I’m going to try the adapter from Amazon and see if that’ll detect it
There are PCIe and SATA standards for these drives... they look similar. when in doubt Google the part number to be sure or use an adapter that can accommodate more than one standard. I have some adapters that are specific to one standard or the other and then a USB C enclosure that works for both. If you use the wrong one you might notice your drive getting hot really quickly.
👍 1
Avatar
Looks like I needed Social Links CE possible for the weapons entities, but I still don't have namechk... I wonder if it's something for a paid version of Maltego?
Avatar
I need to grab intelligence from old cases, does anybody know a software for this??
Avatar
Avatar
mdogilvie
I need to grab intelligence from old cases, does anybody know a software for this??
Define intelligence?
Avatar
Hi everyone, We are looking for your input. We are running the annual industry trend survey, which is vendor / tool neutral. We are looking for you feedback.
  • What challenges do practitioners face with device, work flow and digital evidence,
  • How are you using digital evidence?
  • How does it compare over the years.
The survey should take about 5-7 mins to complete and as a thank you, your name goes in for a chance to win $500 Amazon Gift Card. https://cellebrite.iad1.qualtrics.com/jfe/form/SV_9FRTXk6o0o2NSse?promotionsource=PL
Cellebrite 2023 Industry Trends Survey
Avatar
thefossenjoyer 6/29/2023 11:29 PM
Try searching for writing style analysis tool. I've got quite a few results.
Avatar
Original message was deleted or could not be loaded.
Don’t know specific tools but it sounds like an OSINT problem to me Maybe look for OSINT tools that have NLP or ChatGPT powered OSINT tools?
1:39 AM
One tool that does come to mind is pimeyes. Haven’t used it but they claim to be solving your problem.
Avatar
I have a VM server that has a 3 disk raid5. I was able to create an image of the raid. I can see the partitions but none of my tools can open the file system. Does anyone know a tool that can parse the file system?
10:56 AM
VMFS file system.
Avatar
Digitalferret 6/30/2023 12:08 PM
Avatar
Original message was deleted or could not be loaded.
Deleted User 6/30/2023 1:27 PM
Give “sentiment analysis” a try.
Avatar
How the humble SIM Card content is expanding and evolving to meet the demands of our multi-tech society: Device Access Platforms Visual Representation https://trewmte.blogspot.com/2023/07/device-access-platforms-visual.html Integrated embedded SIMs (eSIMs) (https://trewmte.blogspot.com/2023/07/integrated-embedded-sims-esims.html) USIM Expanded Directories and Files (https://trewmte.blogspot.com/2023/07/usim-expanded-directories-and-files.html) USIM Expanded Capabilities Pt2 (https://trewmte.blogspot.com/2023/07/usim-expanded-capabilities-pt2.html) USIM Expanded Capabilities Pt1 (https://trewmte.blogspot.com/2023/07/usim-expanded-capabilities-pt1.html)
Device Access Platforms Visual Representation Back in 2016 I commented briefly about " Exploration - missing the micro-evidence" ( https://t...
Integrated embedded SIMs (eSIMs) As more and more devices and products are having eSIMS (embedded SIMs) integrated at the board and circuitr...
3GPP TS 31.102 V18.1.0 (2023-06) 3rd Generation Partnership Project; Technical Specification Group Core Network  and Terminals; Characteri...
USIM Expanded Capabilities Pt2 3GPP TS 31.102 V18.1.0 (2023-06) 3rd Generation Partnership Project; Technical Specification Group Core Netwo...
3GPP TS 31.102 V18.1.0 (2023-06) 3rd Generation Partnership Project; Technical Specification Group Core Network  and Terminals; Characterist...
Avatar
So it’s a holiday weekend. End of a long day. I find myself thinking about damn work. Question is maybe my triage response to digital evidence could be better. Figured I would check with people here and see what they are doing. I’m specifically interested in CSAM type cases where your trying to limit what you take. How are you treating the 10 phones, 10 SD cards, 10 USBs. Is there an automated tool your using? Are you running the triage analysis on the original without a write blocker? With a write blocker? I usually use FTK with a write blocker and review USB and SD cards. The rest if it’s off I leave it off and take it. If it’s on PC I’m using OS Triage or Digital collector along with different ram tools. Appreciate anyone’s thoughts or sharing there process. Ohh and Happy almost 4th…..
🎆 4
👍 1
Avatar
pratik13786 7/2/2023 10:08 PM
I want to do forensic of airtel wireless hotspot device Please guide me for this.
Avatar
Anyone from @Oxygen Forensics available ?
Avatar
Avatar
Ghosted
So it’s a holiday weekend. End of a long day. I find myself thinking about damn work. Question is maybe my triage response to digital evidence could be better. Figured I would check with people here and see what they are doing. I’m specifically interested in CSAM type cases where your trying to limit what you take. How are you treating the 10 phones, 10 SD cards, 10 USBs. Is there an automated tool your using? Are you running the triage analysis on the original without a write blocker? With a write blocker? I usually use FTK with a write blocker and review USB and SD cards. The rest if it’s off I leave it off and take it. If it’s on PC I’m using OS Triage or Digital collector along with different ram tools. Appreciate anyone’s thoughts or sharing there process. Ohh and Happy almost 4th…..
kmacdonald1565 7/3/2023 5:58 AM
I suppose this depends on how you handle your CSAM cases. are you doing on scene previews to assist with interviews and quick arrest if we find the suspect? if so we have a fair system for that. if you have to follow up later with an arrest warrant, just take stuff anyway....some fed agencies have to seize then arrest after CSAM is found well after an exam and reviewing with an AUSA. Our warrant procedure involves a few previewers (2 - 3 if we are lucky), a few interviewers, and a few people searching. We kind of work in tandem to find suspects. So lets say it is a NCMEC tip. If the tip has any info on who it might be, say based off of user name/email or OSINT that suggests it might be one of the occupants, we will start with that low hanging fruit. Interviews start there, one previewer starts there, and another previewer does whatever possible to rule out the other people in the house. Sometimes that is a full exam on phones, sometimes not, depends on how interviews and other forensics go. We try to get eyes on every device in some way, shape, or form. Generally, we plan to take everything anyway, but if we can rule out people we try not to clutter our cases and deprive the suspect's family of their devices...a lot of times they are decent enough people and had no clue the suspect was doing what they were doing. Now if we dont have a suspect and get no where on scene with developing one, we generally just take everything and sort it out later. Sometimes this is due to the suspect being unknown, an additional occupant being away at college, etc. The SD card/USB drive thing is an interesting topic. We will preview with whatever, typically FEx or EnCase but I always use a write blocker. We will look through every one we find because we don't want to miss a suspect perping their own kids and having media depicting that. Previewing them is typically quick and if evidence is found would be a horrific "slam dunk" for the case.
👍 2
Avatar
Avatar
emilie_
Anyone from @Oxygen Forensics available ?
Oxygen Forensics 7/3/2023 6:30 AM
Hello, DM'd 🙂
🙏 1
Avatar
@kmacdonald1565 thanks for th info. are you processing the SD cards and USBs in those forensic suites? That must take substantial time. My goal is to streamline and increase speed.
Avatar
kmacdonald1565 7/3/2023 7:32 AM
no specific processing unless we get the vibe that it needs it....loading it up and having a look around...if its full no need wont get stuff carved, if its empty I will check the hex to see if carving is worth while. It is a whole lot of improvising on the fly based on the totality of everything going on.
Avatar
Is any tool available to automagically process NCMEC reports ? Like automatic IP ISP checking or so ?
Avatar
kmacdonald1565 7/3/2023 8:09 AM
A lot of the reports we get have some kind of geolocation and ISP provided.
Avatar
What would be the regex expresion wich can return any file that doesn't have a .md extension?
11:37 AM
I am using this, which currently returns any file that has this extension r"(.md)"
Avatar
Avatar
Doomdie
What would be the regex expresion wich can return any file that doesn't have a .md extension?
you're looking for ?!
Avatar
yeah but the thing is that I want to take that extension and then replace it I found that this works best
11:57 AM
so in the end I'll have this
Avatar
Andrew Rathbun 7/3/2023 11:58 AM
^[^.]+(?!\.md$)[^.]*$ according to ChatGPT Here's a breakdown of the regex pattern: ^ asserts the start of the string. [^.]+ matches one or more characters that are not a dot (.). (?!\.md$) is a negative lookahead assertion. It ensures that the next characters are not ".md" followed by the end of the string. [^.]* matches zero or more characters that are not a dot (.). $ asserts the end of the string.
Avatar
well, chat gpt has some work to do when it comes to regex
Avatar
Andrew Rathbun 7/3/2023 12:00 PM
it also depends on what dialect of regex you're working with. I've found that matters sometimes. All ChatGPT does is give you a running start on something. Very often the final answer doesn't come right away
💯 2
👍 1
Avatar
I know. Anyhow thanks for the help guys, appreciate it!
Avatar
Has anyone had Apple remove a firmware password from a macbook for law enforcement? They say they can do it if they have the original receipt, but naturally we didn't purchase it. (edited)
Avatar
Deleted User 7/3/2023 1:49 PM
Hey, uh, can activitiescache be disabled by default prior Windows installation or is it definitely only doable by the user?
Avatar
Avatar
DEVNULL
Is any tool available to automagically process NCMEC reports ? Like automatic IP ISP checking or so ?
I have a powershell script that scrapes NCMEC returns for hash values to add to our database if that's of interest.
Avatar
Avatar
DEVNULL
Is any tool available to automagically process NCMEC reports ? Like automatic IP ISP checking or so ?
Semantics 21 (Tom) 7/3/2023 3:27 PM
The Semantics 21 tools automatically parse the NCMEC reports. Both triage and media review tools work with Cybertips.
Avatar
@Magnet Forensics hello anyone available for a quick question?
Avatar
Avatar
Hans Leißner
Anyone know what type of device this is? 🤪 This was found lying in the woods in our area. I have unfortunately only one picture of it... Tineye and Google Image Search negative
Hans Leißner 7/5/2023 12:10 AM
In the meantime, I have been able to clarify what this is via the Office for the Protection of the Constitution. It was a measuring device from a government agency. These were used to measure avalanches in our mountains, how they behave under what conditions and how fast they are carried away by the avalanche. @Digitalferret @Pianist @ryd3v (edited)
👍🏻 2
🤯 5
Avatar
Using Sanderson Forensic Browser for SQLite, is there a way I can "search for all locations where this string is found across all the tables"?
Avatar
Does anyone know how to send legal (not LEO) requests to Discord?
Avatar
Avatar
Cole
Has anyone had Apple remove a firmware password from a macbook for law enforcement? They say they can do it if they have the original receipt, but naturally we didn't purchase it. (edited)
I think your success here depends on making a friend at your local store
Avatar
Avatar
quack
Does anyone know how to send legal (not LEO) requests to Discord?
Deleted User 7/6/2023 12:25 AM
Read Discord's Impressum, statement of ownership, as well as company information, here.
Avatar
Avatar
Coolit
I have a VM server that has a 3 disk raid5. I was able to create an image of the raid. I can see the partitions but none of my tools can open the file system. Does anyone know a tool that can parse the file system?
spicy_caveman 7/6/2023 5:14 PM
Did you get this resolved? I just did a data recovery op on some antique RAID setups.
👍 1
Avatar
Anyone stood up timesketch recently and not have the webpage come up after login? Not seeing anything wrong offhand here- fresh pull of the docker containers with their script
Avatar
pratik13786 7/6/2023 11:20 PM
Please help me to take the disk image of the password protected Mac book.
theshark started a thread. 7/7/2023 8:45 AM
Avatar
Anybody using a 3D printer for things around the lab?
1:54 PM
I was thinking of printing picks and cards, but maybe things to hold cords, etc. Any other suggestions or known uses? (edited)
Avatar
Avatar
sholmes
Anybody using a 3D printer for things around the lab?
Andrew Rathbun 7/7/2023 2:04 PM
Could print a big FIND EVIDENCE button 😛
😂 7
Avatar
Avatar
sholmes
I was thinking of printing picks and cards, but maybe things to hold cords, etc. Any other suggestions or known uses? (edited)
This sounds suspiciously like “Should we get a PS3 in the lab to conduct testing?” back in the day. 😂 (edited)
😂 8
😬 2
Avatar
We cleared out a Xbox 360 and PS3 recently. Brilliant array of games with them too 🙂
😉 3
Avatar
For the record, we did have one relatively serious case involving a PS3. So it was important to have experience with them.
💯 3
Avatar
Avatar
Arsenal
This sounds suspiciously like “Should we get a PS3 in the lab to conduct testing?” back in the day. 😂 (edited)
tapatiosec 7/7/2023 2:54 PM
"Test how fun the thing is and report that o the boss"
👍 1
Avatar
Digitalferret 7/7/2023 4:19 PM
Electonics Engineer on my work placement in the 90s requisitioned the scanner to have back in the day. Yupiteru 7000 series (several hundred GBP) His need? just to hear the radio telemetry in the water meter they were designing, which amounted to a few short sharp farty sounds. it wasn't even to decode, just to know it was transmitting. ofc he just had to borrow it, cycling home to the sound of The Archers radio program (UK). i bought one too, years later, superb radio and let me in on some of the best humour and comedy I've ever heard....
4:19 PM
local police radio before all that stuff got encrypted 🙂
4:21 PM
some of the banter between the cops was drier than a witches tit. had me in fits for evenings on end (edited)
Avatar
I find it very interesting that police comms in the US aren’t all digitally encrypted
Avatar
Avatar
Matt
I find it very interesting that police comms in the US aren’t all digitally encrypted
Andrew Rathbun 7/8/2023 6:26 AM
One agency could be but then a mile down the road the smaller department's isn't. US LE is incredibly fragmented on many levels. Current LE correct me if I'm wrong but that's how it was in my experience. Just because one department has XYZ or does XYZ doesn't mean the same departments even in the same county/state do the same thing
💯 4
Avatar
Avatar
Andrew Rathbun
One agency could be but then a mile down the road the smaller department's isn't. US LE is incredibly fragmented on many levels. Current LE correct me if I'm wrong but that's how it was in my experience. Just because one department has XYZ or does XYZ doesn't mean the same departments even in the same county/state do the same thing
Interoperability must be a nightmare
💯 3
Avatar
Avatar
Matt
Interoperability must be a nightmare
Andrew Rathbun 7/8/2023 8:46 AM
It has to exist first for it to be considered a nightmare 🙃
PepeLaugh 1
Avatar
Avatar
Matt
Interoperability must be a nightmare
When department heads are the warring feudal lords of their own fiefdoms, interoperability isn’t even a concept. Us lowly troops can only hope the occasional ceasefire that occurs when that massive incident happens that absolutely requires us to work with each other.
👍 3
Avatar
Avatar
Arsenal
This sounds suspiciously like “Should we get a PS3 in the lab to conduct testing?” back in the day. 😂 (edited)
Exactly why I’m trying to find legitimate things people have used them for…….
Avatar
Avatar
sholmes
Exactly why I’m trying to find legitimate things people have used them for…….
Digitalferret 7/8/2023 9:41 AM
exotic door stop? 🙂
😂 1
Avatar
Avatar
FullTang
When department heads are the warring feudal lords of their own fiefdoms, interoperability isn’t even a concept. Us lowly troops can only hope the occasional ceasefire that occurs when that massive incident happens that absolutely requires us to work with each other.
We have it very easy here by comparison
Avatar
Avatar
Matt
We have it very easy here by comparison
Sounds amazing. Just based on what I have seen on this server, UK law enforcement looks like a tight knit group of professionals.
💯 1
Avatar
Avatar
FullTang
Sounds amazing. Just based on what I have seen on this server, UK law enforcement looks like a tight knit group of professionals.
Andrew Rathbun 7/8/2023 9:58 AM
Agreed. That was one of the first things I learned being here that I never would've otherwise. Whenever someone tags LE UK and asks a question it's always a fascinating read, in a good way. A different world from here that I don't have any other insight into outside of this server. Admiration from afar!
Avatar
Well it depends, 43 different forces can work together well in some cases and less so in others 😂
Avatar
Avatar
sholmes
Anybody using a 3D printer for things around the lab?
gridfinity for storage
5:10 PM
or action figures...
Avatar
Avatar
sholmes
Anybody using a 3D printer for things around the lab?
extenders/adapters for small SSDs
👍 1
Avatar
Encryption / Decryption of images with AES-CBC/ECB - GitHub - user163/image-encryption: Encryption / Decryption of images with AES-CBC/ECB
7:17 AM
Avatar
MartinInDFIRland 7/9/2023 11:51 PM
anyone else heard of ArtiFast from Forensafe Software Solutions (edited)
Avatar
Avatar
MartinInDFIRland
anyone else heard of ArtiFast from Forensafe Software Solutions (edited)
Digitalferret 7/10/2023 1:35 AM
try the search bar ↗️ with artifast, there are a number of mentions including links to articles
Avatar
Avatar
Digitalferret
try the search bar ↗️ with artifast, there are a number of mentions including links to articles
MartinInDFIRland 7/10/2023 1:37 AM
I know, and already did, just wanna discuss more about it
1:40 AM
Just 9 results from 3 ppl, and I want to know if anyone has used it, and in what use cases are it useful
Avatar
Digitalferret 7/10/2023 1:40 AM
ah, my bad. that's the art in asking the proper question then 🙂
1:40 AM
of course the simple answer to the above would have been "yes", but I'm only on my first coffee 😆 (edited)
Avatar
MartinInDFIRland 7/10/2023 1:41 AM
Also part of my fault
Avatar
Digitalferret 7/10/2023 1:41 AM
all good dude, it's monday morning after all
❤️ 3
1:42 AM
and as well as being a Moderator I'm the official channel Grinch
1:42 AM
got to big it up where i can 🤣
😂 1
1:43 AM
best oif luck, I'm sure more will reply, but bear in mind we is worldwide. a lot of our cousins are still in bed
Avatar
MartinInDFIRland 7/10/2023 1:45 AM
haha, where I live, the sun is already high above my head
1:45 AM
So, let me explain my my thoughts. There is not yet buy version of Artifast, and free version takes 500MB
Avatar
Avatar
MartinInDFIRland
Also part of my fault
Digitalferret 7/10/2023 1:45 AM
did you find the Artifast pdf guide yet?
1:46 AM
ooops. aaand that's the phone, bbl
❤️ 1
Avatar
MartinInDFIRland 7/10/2023 1:47 AM
take your time my dear
Avatar
Avatar
MartinInDFIRland
So, let me explain my my thoughts. There is not yet buy version of Artifast, and free version takes 500MB
MartinInDFIRland 7/10/2023 1:50 AM
My choice is collect all evidence as well from victim computer. And then use ArtiFast for parser. I just concern about that: ArtiFast supports parsing of various evidence types (edited)
1:50 AM
But dont know which one could be used for collect evidence
1:53 AM
Their last tweet from May 18, 2021
1:53 AM
Not sure they still update
Avatar
Avatar
MartinInDFIRland
My choice is collect all evidence as well from victim computer. And then use ArtiFast for parser. I just concern about that: ArtiFast supports parsing of various evidence types (edited)
Digitalferret 7/10/2023 2:37 AM
maybe mail their support?
Avatar
MartinInDFIRland 7/10/2023 2:39 AM
seem like Kape & plaso still the best choice
2:39 AM
lol
2:39 AM
😂
Avatar
Avatar
MartinInDFIRland
seem like Kape & plaso still the best choice
Digitalferret 7/10/2023 2:45 AM
if you are into Kape, you might want to check https://discord.com/channels/427876741990711298/427982915230498826/1126632123537829920 if you haven't already
Avatar
Avatar
Digitalferret
if you are into Kape, you might want to check https://discord.com/channels/427876741990711298/427982915230498826/1126632123537829920 if you haven't already
MartinInDFIRland 7/10/2023 2:46 AM
thanks @Digitalferret , I learned a lot from SANS FOR508
2:48 AM
both KAPE and EZtools are in my toolkit already
2:48 AM
Swiss Army knife
💯 1
Avatar
Does anyone have a favorite IP lookup site or software. I have a few but interested in seeing favorites...
Avatar
khushigupta0641 7/10/2023 10:17 AM
Quick question, Can cellebrite collect edited iMessages?
Avatar
A few years back there was gov't grant funding to update agencies to digitally encrypted frequencies. we can "patch" together with surrounding agencies on the same channels now. Problem is that the "encryption" part costs extra and the update to the system as a whole was optional and with strings attached. So some smaller agencies didn't take the funding in order to do their own thing. So it still isn't fixed.
Avatar
Hey, can some one scan my weChat QR so I can access the app, Trying to do some testiing with the app didn't know this was a requirement to access it?
Avatar
Avatar
MartinInDFIRland
Not sure they still update
Andrew Rathbun 7/10/2023 12:13 PM
@Forensafe
Avatar
Avatar
whee30
A few years back there was gov't grant funding to update agencies to digitally encrypted frequencies. we can "patch" together with surrounding agencies on the same channels now. Problem is that the "encryption" part costs extra and the update to the system as a whole was optional and with strings attached. So some smaller agencies didn't take the funding in order to do their own thing. So it still isn't fixed.
Not to mention that Motorola owns the encryption patent that the LEO's use and they license charge for each handset and squad to use it yearly. Its not cheap.
Avatar
Avatar
MartinInDFIRland
Not sure they still update
Dr. Kaan Gündüz 7/10/2023 1:33 PM
they update frequently https://forensafe.com/blog.html
Avatar
Avatar
DCSO
Not to mention that Motorola owns the encryption patent that the LEO's use and they license charge for each handset and squad to use it yearly. Its not cheap.
only a few squads have encrypted channels over here. If you run surveillance you get it, otherwise they don't spend the money on it.
this 1
Avatar
Avatar
khushigupta0641
Quick question, Can cellebrite collect edited iMessages?
4:51 PM
If you get the database there are things to look for.
Avatar
Avatar
whee30
If you get the database there are things to look for.
khushigupta0641 7/10/2023 5:15 PM
Thank you!!
Avatar
Avatar
theshark
Does anyone have a favorite IP lookup site or software. I have a few but interested in seeing favorites...
probably ipinfo.io
💯 2
Avatar
Avatar
theshark
Does anyone have a favorite IP lookup site or software. I have a few but interested in seeing favorites...
Ipinfo io
Salute 1
Avatar
Avatar
theshark
Does anyone have a favorite IP lookup site or software. I have a few but interested in seeing favorites...
ipvoid.com is another one
Salute 1
Avatar
Anyone else had an issue with migrating a large hash DB from PA7 to PA 8 Ultra? I have a DB with 97 million hashes and 8 just isnt having it, smaller DBS around 25 million are going in after about 15 minutes but the larger one isnt.
Avatar
Avatar
MartinInDFIRland
anyone else heard of ArtiFast from Forensafe Software Solutions (edited)
Ekrma Elnour 7/11/2023 2:32 AM
Hey there! I am from @Forensafe team. We wanted to thank you for reaching out to us about ArtiFast. We have multiple versions of our software, and we continuously update it to ensure the best experience for our users. We truly appreciate your feedback. We're also aware that our social media accounts aren't up to date, and we want you to know that we're actively working on improving that.
❤️ 3
Avatar
Great opportunity to learn what happens at SWGDE and to help take part in the development of community #DFIR guidelines! Register as a guest before July 21 https://docs.google.com/forms/d/e/1FAIpQLSeC8qr7DxXANzCx41c860chmHhvIKdO7zEMoqK37UTvI8JwYQ/viewform
The Scientific Working Group on Digital Evidence (SWGDE) is composed of member agencies from all levels of government, academia, and private industry. Our group has a mission of fostering communication and cooperation at all levels. We are working in the forensic community to establish sound practices and standards in the handling of digital and...
Avatar
Avatar
whee30
only a few squads have encrypted channels over here. If you run surveillance you get it, otherwise they don't spend the money on it.
Some of the agencies around here have the opposite problem. They HAVE access to encrypted channels, even for inter ops, yet they still pick unencrypted for things they should not 😅 . Others want to have everything encrypted, even fire departments.
Avatar
Avatar
CyberGhost
Some of the agencies around here have the opposite problem. They HAVE access to encrypted channels, even for inter ops, yet they still pick unencrypted for things they should not 😅 . Others want to have everything encrypted, even fire departments.
Digitalferret 7/11/2023 11:18 AM
before you know it Govt officials will be taking documents home and reading them in the John/Shitter bathroom: wcpgw?
Avatar
Avatar
Digitalferret
before you know it Govt officials will be taking documents home and reading them in the John/Shitter bathroom: wcpgw?
Avatar
What's m2m_dir, m2o_dir and o2m_dir in an ATT CDR?
12:59 PM
All I can think is originating to mobile? Don't see it anywhere on the record key
Avatar
Avatar
Pumpkin
What's m2m_dir, m2o_dir and o2m_dir in an ATT CDR?
In the context of an AT&T Call Detail Record (CDR) I think m2m_dir likely refers to a call from a mobile device to another mobile device. m2o_dir could refer to a call from a mobile device to a non-mobile device. o2m_dir likely refers to a call from a non-mobile device to a mobile device.
Avatar
I've read from a random court doc online that M2M signifies a call between two ATT phones and DIR is outbound unless it gets forwarded. But that doesn't at all match up with the records I'm reading
Avatar
Avatar
Pumpkin
What's m2m_dir, m2o_dir and o2m_dir in an ATT CDR?
This is from an older AT&T Key:
Avatar
khushigupta0641 7/11/2023 1:50 PM
Can someone please help me with the process you use for investigating e sims in an iPhone?
Avatar
Avatar
JRCC_4N6
This is from an older AT&T Key:
Ohhh there we go. That's incredibly helpful. Thanks!
👍 1
Avatar
Avatar
khushigupta0641
Can someone please help me with the process you use for investigating e sims in an iPhone?
be more specific
Avatar
Question to those that use #Belkasoft, do you have the possibility to redact text/data after processing and that be shared to an investigator to go through?
Avatar
Avatar
trillian
Question to those that use #Belkasoft, do you have the possibility to redact text/data after processing and that be shared to an investigator to go through?
Digitalferret 7/12/2023 2:09 AM
pinging @Belkasoft in case it's a feature / one they plan to add / is in beta / nope, sorry
🫶 2
Avatar
Avatar
trillian
Question to those that use #Belkasoft, do you have the possibility to redact text/data after processing and that be shared to an investigator to go through?
elizavetabelkasoft 7/12/2023 3:10 AM
Do you mean the report text or extracted evidence texts? Please let us know the use case for the feature (which we do not directly have atm; only on the level of editing the case database)
Avatar
Avatar
elizavetabelkasoft
Do you mean the report text or extracted evidence texts? Please let us know the use case for the feature (which we do not directly have atm; only on the level of editing the case database)
I meant more for removing confidential conversations either email or sms/messenger app. We would need to remove the information and create a new "clean" case for the investigator (not in pdf or excel, but in the same format as when it is processed with belkasoft)
Avatar
Avatar
trillian
I meant more for removing confidential conversations either email or sms/messenger app. We would need to remove the information and create a new "clean" case for the investigator (not in pdf or excel, but in the same format as when it is processed with belkasoft)
elizavetabelkasoft 7/12/2023 3:27 AM
Interesting request. We can add it to the "Features waitlist." Please contact us at support@belkasoft.com so that we can discuss the details.
💯 1
Avatar
Will do! and thanks 🙂 (edited)
Avatar
does anyone have experience pulling screen time data on an iPhone from over 90 days ago? In settings it only goes back about 3 weeks...
Avatar
or any third party apps that collect historical screen time data
Avatar
Hey guys does anyone know if it’s possible to see if a phone was in range of a wireless router? For example, let’s say you have a burglary and the suspect’s phone was within range of your router at a specific time, is that logged anywhere and accessible?
Avatar
Avatar
braz989
Hey guys does anyone know if it’s possible to see if a phone was in range of a wireless router? For example, let’s say you have a burglary and the suspect’s phone was within range of your router at a specific time, is that logged anywhere and accessible?
Not sure if any detailed logs are made for "in range" detection. It is posisble to subpoena the ISP provider (eg. spectrum) for the detailed connection logs of that account/router/modem if anything, then you could match IP's to a logon or off's, but if you suspect a connection was never made then may be out of luck. Apple may also log info on wireless connection detection for a device/appleid with timestamps but again, not sure.
Avatar
ufed 4pc 7.64 in 100 💵 dollar for 1 pc is that true ?!
Avatar
Avatar
theshark
Not sure if any detailed logs are made for "in range" detection. It is posisble to subpoena the ISP provider (eg. spectrum) for the detailed connection logs of that account/router/modem if anything, then you could match IP's to a logon or off's, but if you suspect a connection was never made then may be out of luck. Apple may also log info on wireless connection detection for a device/appleid with timestamps but again, not sure.
Thank you for the reply
Salute 1
Avatar
Avatar
braz989
Hey guys does anyone know if it’s possible to see if a phone was in range of a wireless router? For example, let’s say you have a burglary and the suspect’s phone was within range of your router at a specific time, is that logged anywhere and accessible?
Might be a to identify from the phone, if you get a FFS from a iPhone cache_encryptedB.db may have harvested mac addresses of wifi locations, but the dates and times of those are when they're downloaded to the phone as far as I know, not necessarily when it was there. (edited)
Avatar
Does anyone have good third party application for re-organizing Cellebrite (excel) extraction data, timeline visualizer, etc.?
Avatar
Quick question, I'm looking at a document of intellectual proprty theft done in India of a large scale piracy incident. When I request it from the webserver, it seems to be the servers are down. The cache version works but the images don't load. Any ideas of how to get these images to appear up on the cached version ? Doing so because the investigation covered tremendously helps with the work. Sorry for such a weird question. (edited)
Avatar
Avatar
$CozyBear
Quick question, I'm looking at a document of intellectual proprty theft done in India of a large scale piracy incident. When I request it from the webserver, it seems to be the servers are down. The cache version works but the images don't load. Any ideas of how to get these images to appear up on the cached version ? Doing so because the investigation covered tremendously helps with the work. Sorry for such a weird question. (edited)
could try a few other caching sites, https://github.com/dessant/web-archives I like to use this plugin to hit a bunch at once
Browser extension for viewing archived and cached versions of web pages, available for Chrome, Edge and Safari - GitHub - dessant/web-archives: Browser extension for viewing archived and cached ver...
👍🏾 1
Avatar
Turns out that the http://dot.gov.in is down, Assuming their server are down xD pretty strange for .gov site, idk (edited)
Avatar
asdfg12349823 7/13/2023 1:42 PM
Are there any good examples/templates of what a chain of custody should look like?
8:22 PM
I yanked it from here but it looks about what I have used in the past- they're all pretty similar just formatting changes https://formspal.com/pdf-forms/other/blank-chain-of-custody-form/
Avatar
Is It Done Yet? 7/14/2023 2:13 AM
Not really sure where this fits, so I'll chuck it in General for now. I am making the shift from LE to private sector, in a training capacity. I would be curious to know: 1. If anyone who has previously done this, any advice, learning or wisdom you may have? 2. Any resources or open-source tools I should be considering taking with me into this new role? Happy to discuss in an open forum or in private message. Just reach out 🙂 (edited)
Avatar
Avatar
Is It Done Yet?
Not really sure where this fits, so I'll chuck it in General for now. I am making the shift from LE to private sector, in a training capacity. I would be curious to know: 1. If anyone who has previously done this, any advice, learning or wisdom you may have? 2. Any resources or open-source tools I should be considering taking with me into this new role? Happy to discuss in an open forum or in private message. Just reach out 🙂 (edited)
Digitalferret 7/14/2023 2:41 AM
might be worth echoing that in #training-education-employment too.
Avatar
Avatar
Digitalferret
might be worth echoing that in #training-education-employment too.
Is It Done Yet? 7/14/2023 2:50 AM
Ta muchly, will do.
Avatar
I have a client that is using a UFDR on a VM via AWS. She has told me that she cannot see any images and when she has shared her screen none of the images are showing. She has mentioned that during training the trainer told her that there is a setting that she may need to enable to allow her to see images and she cant remember what it is. Ive had a look but its been a couple years since i have used it and I cant remember any setting. Anyone know of a setting off the top of their heads that may do this? The images are loading but all appear white in the thumbnail view and any other view.
Avatar
@Cellebrite ^
👍 1
Avatar
Avatar
Majeeko
I have a client that is using a UFDR on a VM via AWS. She has told me that she cannot see any images and when she has shared her screen none of the images are showing. She has mentioned that during training the trainer told her that there is a setting that she may need to enable to allow her to see images and she cant remember what it is. Ive had a look but its been a couple years since i have used it and I cant remember any setting. Anyone know of a setting off the top of their heads that may do this? The images are loading but all appear white in the thumbnail view and any other view.
Ive had alot of investigators with the same issue, i think they usually restart the program and it just works sometimes. If there is a more permanent fix i would also love to hear it. We have assumed its some sort of bug
Avatar
Avatar
Johnie
Ive had alot of investigators with the same issue, i think they usually restart the program and it just works sometimes. If there is a more permanent fix i would also love to hear it. We have assumed its some sort of bug
Ive never had this issue with Cellebrite reader, although i generally always used UFED PA but its been a few years since i used it consistently and I dont remember anyhting like this. I'm wondering if it is because it is being used via AWS/VM but I dont see why. Its a weird issue.
Avatar
Avatar
Majeeko
Ive never had this issue with Cellebrite reader, although i generally always used UFED PA but its been a few years since i used it consistently and I dont remember anyhting like this. I'm wondering if it is because it is being used via AWS/VM but I dont see why. Its a weird issue.
Our investigators get the issue on regular computers and not VM. But its very random and sometimes a few images load in but not all. And usually it works after a restart
Avatar
Just a cellebrite reader restart or a whole machine restart?
Avatar
Apple doesn't keep detailed gps logs and I am interested in knowing the phone location at a certain time over 90+ days ago. Would love to hear any ideas to see if I havent tried something.
Avatar
Avatar
theshark
Apple doesn't keep detailed gps logs and I am interested in knowing the phone location at a certain time over 90+ days ago. Would love to hear any ideas to see if I havent tried something.
any photos of that time frame that may be GPS tagged in EXIF
Avatar
I wish, none were taken.
6:38 AM
I did a apple/google takeout. No data in those artifacts help.
Avatar
Avatar
Johnie
Our investigators get the issue on regular computers and not VM. But its very random and sometimes a few images load in but not all. And usually it works after a restart
a reset has worked. This was litterally the first question I asked her when she first asked for my help, have you tried shutting it down a d restsrting and i was told yes. P.I.C.N.I.C error as always. Thanks for your help
Avatar
Artemisia (They / Them) 7/14/2023 7:47 AM
Has anyone else had XRY 10.6 crash to desktop when clicking "Done" after taking photos? Happened to my colleague and myself. Not every time just occasionally. Photos don't save and so continuity is comprised (evidence bag unsealed before first photo).
Avatar
Does anyone have an answer for what "uninitialized file area" is? Magnet Axiom lists it as part of its inaccessible file carving, but I cannot determine what it actual contains. The user guide also does not define it. Not sure if it is wording specific to Axiom or something more general.
Avatar
Avatar
Cole
Does anyone have an answer for what "uninitialized file area" is? Magnet Axiom lists it as part of its inaccessible file carving, but I cannot determine what it actual contains. The user guide also does not define it. Not sure if it is wording specific to Axiom or something more general.
chriscone_ar 7/14/2023 9:36 AM
The uninitialized file area is disk space that has been reserved by a file but isn’t yet being used by it, or the difference between the logical file size and the valid data length. Edited to add - I realized I didn't completely answer your question, the term 'uninitialized file area' is not unique to AXIOM. I'm assuming you are dealing with an NTFS volume, any given file has an allocated physical and logical size - physical based on cluster size and logical based on actual usage. So for a given file with a logical size less than cluster size, you have the typical file slack (i.e, end of the logical file to the end of the cluster). NTFS uses an approach to file initialization that leads to the storage space which is set aside for a new file not always being completely used. When this occurs, the unused space which was designated for a file is uninitialized space. While the concept is similar to file slack, it is distinct as it is entirely contained within the logical file size. (edited)
Avatar
Digitalferret 7/14/2023 10:05 AM
☝🏻 TIL 🙂
10:06 AM
Fat space on library shelf and a thin book gets put in there
💯 1
10:06 AM
i think ...
Avatar
Avatar
Digitalferret
☝🏻 TIL 🙂
chriscone_ar 7/14/2023 10:07 AM
Except there's something in place that keeps you from getting at the thin book.
Avatar
Digitalferret 7/14/2023 10:07 AM
yep
10:09 AM
i use a similar analogy to explain fragmentation,where there's a large fat book, but lots of thin spaces. rather than moving all the books along, (OS/FS) tears the book into pages and shoves them all over the library, but makes an entry in a file table, per stored sheet, so that the composite parts can be put back together again
10:10 AM
and if that index is lost or corrupt, and the files are fragged, you my only find the front cover and 2 pages
10:10 AM
it's not so much how general pc users think "it's corrupt" its simply been scattered to the 4 winds
Avatar
Avatar
Digitalferret
i use a similar analogy to explain fragmentation,where there's a large fat book, but lots of thin spaces. rather than moving all the books along, (OS/FS) tears the book into pages and shoves them all over the library, but makes an entry in a file table, per stored sheet, so that the composite parts can be put back together again
chriscone_ar 7/14/2023 10:12 AM
That's a great analogy and I'm stealing it 😁 Also, when shoving those thin books going into the fat spaces, some of them push a page or two from another book behind them and they're trapped (aka unitialized file area).
Avatar
Digitalferret 7/14/2023 10:12 AM
then SSD 😱
Avatar
Avatar
chriscone_ar
That's a great analogy and I'm stealing it 😁 Also, when shoving those thin books going into the fat spaces, some of them push a page or two from another book behind them and they're trapped (aka unitialized file area).
Digitalferret 7/14/2023 10:13 AM
yteh, this. thin book, perspex box shelf divider. i can't use it rn so neither can you
Avatar
Avatar
Digitalferret
then SSD 😱
chriscone_ar 7/14/2023 10:13 AM
Ugh! Trim, wear leveling, and spare areas just make it all worse!
Avatar
Digitalferret 7/14/2023 10:13 AM
heheh
10:14 AM
but understood re page-or-two. it's not necessarily clean empty space, can equally be old data / garbage (edited)
Avatar
Avatar
Digitalferret
but understood re page-or-two. it's not necessarily clean empty space, can equally be old data / garbage (edited)
chriscone_ar 7/14/2023 10:17 AM
Exactly. And that old data / garbage will remain in that uninitialized file area as long as the file occupying that space remains. And the user would have no idea it was there or any method for accessing it.
Avatar
Avatar
chriscone_ar
Exactly. And that old data / garbage will remain in that uninitialized file area as long as the file occupying that space remains. And the user would have no idea it was there or any method for accessing it.
Digitalferret 7/14/2023 10:21 AM
hmmmm. so, would that be such a granular level that you couldn't examine with a hex editor in some DR hardware like PC3000 or Atola or would that be sub block size? (edited)
10:22 AM
ie smaller than the accessible smallest unit
Avatar
Avatar
chriscone_ar
Exactly. And that old data / garbage will remain in that uninitialized file area as long as the file occupying that space remains. And the user would have no idea it was there or any method for accessing it.
Digitalferret 7/14/2023 10:23 AM
btw, are you free for a quick DM? unrelated
Avatar
Avatar
chriscone_ar
The uninitialized file area is disk space that has been reserved by a file but isn’t yet being used by it, or the difference between the logical file size and the valid data length. Edited to add - I realized I didn't completely answer your question, the term 'uninitialized file area' is not unique to AXIOM. I'm assuming you are dealing with an NTFS volume, any given file has an allocated physical and logical size - physical based on cluster size and logical based on actual usage. So for a given file with a logical size less than cluster size, you have the typical file slack (i.e, end of the logical file to the end of the cluster). NTFS uses an approach to file initialization that leads to the storage space which is set aside for a new file not always being completely used. When this occurs, the unused space which was designated for a file is uninitialized space. While the concept is similar to file slack, it is distinct as it is entirely contained within the logical file size. (edited)
Ok that's what I was guessing (about windows giving it more space than it uses). In what way is it different than file slack? I understand the logical size/physical cluster size difference which creates file slack. Does windows allocate even more data for files?
10:27 AM
Ok rereading your explanation I think I get it more
Avatar
Avatar
Digitalferret
btw, are you free for a quick DM? unrelated
chriscone_ar 7/14/2023 10:35 AM
Absolutely! I just made it back to the desk.
👍🏻 1
Avatar
Avatar
Cole
Ok that's what I was guessing (about windows giving it more space than it uses). In what way is it different than file slack? I understand the logical size/physical cluster size difference which creates file slack. Does windows allocate even more data for files?
chriscone_ar 7/14/2023 10:44 AM
I suppose if we're splitting hairs, that it's NTFS that allocates the space for files. There's end of file and valid data length. The EOF is the allocated logical space for the file and VDL is the actual length/end of the file on disk. In instances where the VDL is < EOF you have uninitialized file area. What causes the discrepancy between initialization and actual write to disk? Computers, right 🤣 Overall, it is similar in concept to slack, just a distinction.
👍🏻 3
Avatar
In a cellebrite extraction within the log entries can anyone confirm that "Wifiin: WifiOut" details show that a phone is being reconnected to the wif?
Avatar
I'm trying to get into a MacBook Pro (apple silicone) to image it, but do not know the admin pw. I do have a ffs of an iPhone linked to the same iCloud with the keychain decrypted, but I don't see the MBP lockscreen pw anywhere in plain english. How can I use the phone Keychain to unlock the MacBook (can I even do this?)
Cole started a thread. 7/14/2023 12:35 PM
Cole started a thread. 7/14/2023 12:35 PM
Avatar
Is anyone here having issues with the new windows 11 update KB5028185 was making their computer not want to recognize/correctly use the network cards?
Avatar
Hi everyone ! Does somoeone know if we can extract informations from a YubiKey ? Thank you !
Avatar
Avatar
RiL
Hi everyone ! Does somoeone know if we can extract informations from a YubiKey ? Thank you !
Digitalferret 7/15/2023 1:53 AM
is it your yubikey?
Avatar
Avatar
Digitalferret
is it your yubikey?
no
Avatar
Digitalferret 7/15/2023 1:55 AM
is it a legal case?
Avatar
Avatar
Digitalferret
is it a legal case?
yes
Avatar
Digitalferret 7/15/2023 2:03 AM
sorry, had to check, we get a few "suss" characters in here 🙂
2:03 AM
2:04 AM
nolt that I'm giving away trade secrets
Avatar
Avatar
Digitalferret
sorry, had to check, we get a few "suss" characters in here 🙂
no worries, thank you !
Avatar
Avatar
RiL
Hi everyone ! Does somoeone know if we can extract informations from a YubiKey ? Thank you !
They’re designed to be write-only, you can’t extract the secrets from them to the best of my knowledge
Avatar
Digitalferret 7/15/2023 2:25 AM
however, @Matt @RiLif it's a Police case, they may want to investigate if the suspect/miscreant have any backup codes? (edited)
Avatar
Very difficult to do so without logging into the account to check if additional HSKs are registered. There may be some artefacts around YubiKeys on windows which could identify if the subject used multiple keys on their device? I’m not aware of any though, haven’t dealt with a YubiKey other than as a user PepeLaugh
👍🏻 1
Avatar
Digitalferret 7/15/2023 2:27 AM
can't remember how alternative authentication works
Avatar
Avatar
Digitalferret
can't remember how alternative authentication works
Depends on the provider tbh; sometimes they mandate use of a HSK, others times they allow the use of the HSK or a password + 2FA SOTP
👍🏻 1
Avatar
Digitalferret 7/15/2023 2:28 AM
basically you're trying to find a way back in as if you are the user having lost or broken his yubikey
👌 1
Avatar
Talking about logging in and being authenticated I did some work a while back with an organisation that operated what I called 7 (steps) FA (Factor Authentication) for each and every time a login was required. 1) Random Username initiated by Organisation 2) Password number initiated by Organisation using NI number but password can changed 3) Country/Region (must be entered) 4) Location (must be entered) 5) Reference location access point (must be entered) 6) Approved mobile phone number (must be entered) 7) SMS one-time only usage generated code which needs to be entered at site before entering website
Avatar
Just wanted to drop this thought here for whoever may be reading and have similar thoughts… Last year I went back to school for my master’s degree. In particular, I’m doing my degree in securities and intelligence studies. I didn’t realize it but there’s entire schools and research fields on intelligence from academics who form opinions and thesis that make their ways to think tanks and ultimately in to global policy. What’s amazed me the most on this journey is the lack of practical experience by a number of the folks in academia. How terrifying is that? The folks who are influencing, and I mean heavily influencing, national and global policy, sometimes have zero practical experience. That being said, their work does have value – they are smart people doing smart work and coming up with the right questions, asking the right people, and getting good data. But good lord does this field need more of it. There’s a lot of charlatans out there. You could write a whole paper just defining what is “cyber conflict” right now, and make it completely consist of quoting other authors and papers and hoooolyyyyy craaaaap I’m tired of reading that. Can we please get a single definition and move on>>>> If you have realistic intelligence community experience, and even if you were never part of the IC but you have intelligence or other government experience, man, the academic world could use your input. I highly, highly encourage anyone on the fence to go back to school and pursue it. I’m in my 30’s, closing in on my 40’s, and I’ve found my ability to draw from my professional experience and real world knowledge has massively helped by school work. Vice versa, the academics side is also influencing how I look at and do my regular work. Tl;dr If you go back to school, lots of opportunities to be the smartest person in class. And we need more practical and experienced voices making their voices heard in this area. (edited)
❤️ 6
3:12 PM
There's actually a whole community setup around intelligence history. https://www.intelligencehistory.org/
About the North American Society for Intelligence History
DeeFIR 🇦🇺 started a thread. 7/16/2023 3:55 PM
Avatar
The $5 Membership sale is now live! The sale lasts until July 17 23:59 UTC: https://t.co/0iqiq2vTpn
Likes
153
💯 7
🎉 1
Avatar
Digitalferret 7/17/2023 1:28 AM
got to lol, bought this in last sale, still haven't made use. now I'm a membership hoarder 🙂
😂 1
2:39 AM
In progress autometic stop
2:39 AM
Cph2015
Avatar
anyone from magnet available?
Avatar
@Magnet Forensics
👍🏻 1
Avatar
Avatar
Cenizas
anyone from magnet available?
chriscone_ar 7/17/2023 9:27 AM
I’m available
Avatar
Avatar
chriscone_ar
I’m available
Sent you a message
Avatar
Hello everyone. I've recently switched jobs and now I have the opportunity to lead a Forensics department. And one of the things I want to implement is the regular publication of blog articles, covering general digital forensics: types of artifacts, acquisitions, testing of open-source and commercial tools, etc. How do you organize yourselves? How much time do you dedicate to this? How do you organize the information you gather and how do you summarize it? Who do you consult with to get feedback? Thanks!
🔥 1
Avatar
Avatar
Ghibra Mad
Hello everyone. I've recently switched jobs and now I have the opportunity to lead a Forensics department. And one of the things I want to implement is the regular publication of blog articles, covering general digital forensics: types of artifacts, acquisitions, testing of open-source and commercial tools, etc. How do you organize yourselves? How much time do you dedicate to this? How do you organize the information you gather and how do you summarize it? Who do you consult with to get feedback? Thanks!
Digitalferret 7/17/2023 2:42 PM
maybe start by working out who your prospective audience are, then let them know about your blog plan and ask what would be most useful by way of topic. eveything else will fall into place. this is much like the adage of waiting to see where the footsteps go in the garden before building a path
Avatar
Avatar
Digitalferret
maybe start by working out who your prospective audience are, then let them know about your blog plan and ask what would be most useful by way of topic. eveything else will fall into place. this is much like the adage of waiting to see where the footsteps go in the garden before building a path
That makes sense. Thanks!
👍🏻 1
Avatar
Avatar
Ghibra Mad
Hello everyone. I've recently switched jobs and now I have the opportunity to lead a Forensics department. And one of the things I want to implement is the regular publication of blog articles, covering general digital forensics: types of artifacts, acquisitions, testing of open-source and commercial tools, etc. How do you organize yourselves? How much time do you dedicate to this? How do you organize the information you gather and how do you summarize it? Who do you consult with to get feedback? Thanks!
That’s awesome you get to dedicate time (what I’m assuming) through your employer. Consider any social media policy the organization might have, then follow it. I have a personal blog, which gives me the flexibility of writing anything that doesn’t represent the organization I work for. I try to get a piece written at least once a month in my own time. I try to start with things I have questions about, then write about it. I imagine others may have the same question and benefit from what I find out. If I find anything interesting, I try to write it down. This allows me to further develop it when time permits as a draft. If inspiration strikes, sometimes I can knock it out in a couple of days. Others, I have drafts sit for a couple of months. I also keep relevant pictures or screenshots with the draft. It may help me focus on why I have the draft in the first place. When I started, I found Phill Moore’s post at This Week in 4n6 helpful. https://thisweekin4n6.com/starting-a-blog/ (edited)
I’ve had a few people ask for tips on blogging, and thought I’d put it all in one place. I also put down a few reasons why you should create your own home on the web here. Set a schedul…
Avatar
Avatar
derekeiri
That’s awesome you get to dedicate time (what I’m assuming) through your employer. Consider any social media policy the organization might have, then follow it. I have a personal blog, which gives me the flexibility of writing anything that doesn’t represent the organization I work for. I try to get a piece written at least once a month in my own time. I try to start with things I have questions about, then write about it. I imagine others may have the same question and benefit from what I find out. If I find anything interesting, I try to write it down. This allows me to further develop it when time permits as a draft. If inspiration strikes, sometimes I can knock it out in a couple of days. Others, I have drafts sit for a couple of months. I also keep relevant pictures or screenshots with the draft. It may help me focus on why I have the draft in the first place. When I started, I found Phill Moore’s post at This Week in 4n6 helpful. https://thisweekin4n6.com/starting-a-blog/ (edited)
Damn, those are some great tips. Thank you very much!
👍 1
Avatar
randomaccess 7/17/2023 10:19 PM
Oh Hai
10:20 PM
I like how one of my most popular posts can be summarised with "write it down publically"
❤️ 5
😂 6
Avatar
Avatar
randomaccess
I like how one of my most popular posts can be summarised with "write it down publically"
sometimes it's as simple as that though, the barrier to entry is low but people get scared to do so. I know it took me months to share after working on this I wanted out there
Avatar
🇨🇦 ProfessorYoda🇨🇦 7/18/2023 5:54 AM
Hi folks, I am looking for assistance in identifying transaction logs from MSSQL's LDF and MDF files. I have tried all tools on first 2 pages of google. The LDF and MDF files load but none show the transaction logs directly. Has anyone encountered the same? Specifically looking to identify who ran what query. (edited)
Avatar
Avatar
stark4n6
sometimes it's as simple as that though, the barrier to entry is low but people get scared to do so. I know it took me months to share after working on this I wanted out there
Digitalferret 7/18/2023 7:28 AM
imposter syndrome
Avatar
I have a Mac Studio 2022 and MacBook Pro 2021, does anyone know if Target Disk Mode will work with Digital collector and if it is filevault encrypted, how many times I can attempt a password to see if it will unlock ?
Avatar
Avatar
Jay528
I have a Mac Studio 2022 and MacBook Pro 2021, does anyone know if Target Disk Mode will work with Digital collector and if it is filevault encrypted, how many times I can attempt a password to see if it will unlock ?
pretty sure it is 10 attempts.
10:55 AM
settings can be modified although
Avatar
Thanks.
Avatar
is aboutdfir.com the best place to look for entry-level jobs in DFIR. Background: Got GCFE and a masters in digital forensics from Champlain. Looking to get into DFIR but entry level jobs seem hard to come by
Avatar
Avatar
Cash
is aboutdfir.com the best place to look for entry-level jobs in DFIR. Background: Got GCFE and a masters in digital forensics from Champlain. Looking to get into DFIR but entry level jobs seem hard to come by
Wasnt great for me. Reach out to companies directly (email. linkedin dm, website inquiry page). Thats what worked for me.
👍 1
Avatar
Avatar
theshark
Wasnt great for me. Reach out to companies directly (email. linkedin dm, website inquiry page). Thats what worked for me.
my current company is trying to move me to forensics full time but most of the stuff we're doing is acquisitions so far.
👍 1
11:37 AM
move is going slow so far
Avatar
Avatar
Cash
is aboutdfir.com the best place to look for entry-level jobs in DFIR. Background: Got GCFE and a masters in digital forensics from Champlain. Looking to get into DFIR but entry level jobs seem hard to come by
There are several places to look - Here is a post I wrote on 10 places to look for a Digital Forensics Job https://www.hexordia.com/blog-1-1/top-10-places-to-search-for-a-digital-forensics-job TLDR; Google's job search,Ninjajobs, aboutDFIR, This server, Twitter/LinkedIn/Mastodon/Threads, GetYourStartInDFIR, USAJobs... but if I can be blunt (and some may disagree), DFIR isn't always an entry level role. Some PDs do open up entry level positions (i.e. NYSP does each year, but none at the moment). And there are some hires that come from interning - but a lot of folks wind up in the Security Operations Center first. I would look at SOC roles. I also have two suggestions 1) See if you can obtain a cert - what cert? The one the roles you want require 2) Post some demonstrable work ie blog, whitepaper, github, presentation etc. I wrote my thoughts here: https://www.hexordia.com/blog-1-1/top-10-places-to-search-for-a-digital-forensics-job
Top 10 places to job hunt in Digital Forensics or Incident Response (DFIR)
❤️ 2
Avatar
Avatar
b1n2h3x
There are several places to look - Here is a post I wrote on 10 places to look for a Digital Forensics Job https://www.hexordia.com/blog-1-1/top-10-places-to-search-for-a-digital-forensics-job TLDR; Google's job search,Ninjajobs, aboutDFIR, This server, Twitter/LinkedIn/Mastodon/Threads, GetYourStartInDFIR, USAJobs... but if I can be blunt (and some may disagree), DFIR isn't always an entry level role. Some PDs do open up entry level positions (i.e. NYSP does each year, but none at the moment). And there are some hires that come from interning - but a lot of folks wind up in the Security Operations Center first. I would look at SOC roles. I also have two suggestions 1) See if you can obtain a cert - what cert? The one the roles you want require 2) Post some demonstrable work ie blog, whitepaper, github, presentation etc. I wrote my thoughts here: https://www.hexordia.com/blog-1-1/top-10-places-to-search-for-a-digital-forensics-job
thanks for the link! Would you recommend me waiting it out to see how me moving to digital forensics at my current company goes first before looking at SOC jobs? I want to get FOR 508 next to improve my WIndows forensics skills. I also have a blog site but it's pretty basic so far
Avatar
Avatar
Cash
thanks for the link! Would you recommend me waiting it out to see how me moving to digital forensics at my current company goes first before looking at SOC jobs? I want to get FOR 508 next to improve my WIndows forensics skills. I also have a blog site but it's pretty basic so far
I drafted that while you were typing - so I would say NO! If you can start getting DFIR skills under your belt, document those on your resume. The SOC situation may not be appropriate for you. Start documenting your DFIR skills, tools, knowledge, and new title. And if things aren't picking up where you are getting more exposure/learning - look for an opportunity that will get you more hands on cases 🙂
👍 1
11:43 AM
You already had the intro to security role at your current company and successfully made the pivot!
11:44 AM
But I will give the same advice I share with all my mentees - Your resume is a living document! Make a primary copy that tracks everything - at this time you probably are learning a new skill or exposure you can be adding biweekly. So please continue to update the document.
Avatar
Avatar
b1n2h3x
But I will give the same advice I share with all my mentees - Your resume is a living document! Make a primary copy that tracks everything - at this time you probably are learning a new skill or exposure you can be adding biweekly. So please continue to update the document.
thanks again, been keeping some stuff on my blog site. I'm not sure what is good content to show on it. Examples are labs I do, beginner knowledge posts, and getting into more technical topics. I can share a link privately if anyone wants to give suggestions (edited)
Avatar
Avatar
Cash
thanks again, been keeping some stuff on my blog site. I'm not sure what is good content to show on it. Examples are labs I do, beginner knowledge posts, and getting into more technical topics. I can share a link privately if anyone wants to give suggestions (edited)
sharing is caring, do whatever interests you. Would love to add it to my blog roll on https://startme.stark4n6.com, I'm sure @randomaccess would add it to his This Week In 4n6 site too
👍 3
Avatar
Avatar
Cash
thanks again, been keeping some stuff on my blog site. I'm not sure what is good content to show on it. Examples are labs I do, beginner knowledge posts, and getting into more technical topics. I can share a link privately if anyone wants to give suggestions (edited)
Agree with @stark4n6 - share more widely. Also consider submitting any new research with DFIR Review dfir.pubpub.org
👍 1
Avatar
Avatar
stark4n6
sharing is caring, do whatever interests you. Would love to add it to my blog roll on https://startme.stark4n6.com, I'm sure @randomaccess would add it to his This Week In 4n6 site too
nice website! I've used it a couple times haha (edited)
❤️ 2
Avatar
Avatar
stark4n6
sharing is caring, do whatever interests you. Would love to add it to my blog roll on https://startme.stark4n6.com, I'm sure @randomaccess would add it to his This Week In 4n6 site too
I'd appreciate it if you added my blog too. I'm not a frequent poster, but doing more lately and hoping to continue. digiforensics.blogspot.com
❤️ 1
Avatar
Avatar
Ken Pryor
I'd appreciate it if you added my blog too. I'm not a frequent poster, but doing more lately and hoping to continue. digiforensics.blogspot.com
Already had you on there from way back Ken 🙂
Avatar
Avatar
stark4n6
Already had you on there from way back Ken 🙂
haha didn't even know that. Thanks!!!
👍 1
Avatar
digital Bowles 7/18/2023 2:06 PM
Is there a way to search for a FB account by the ID number. I remember being about to a couple of year ago.
Avatar
Avatar
digital Bowles
Is there a way to search for a FB account by the ID number. I remember being about to a couple of year ago.
You should be able to put the ID number into the URL. IE: https://www.facebook.com/1234567890123456789
Avatar
digital Bowles 7/18/2023 2:40 PM
Thank you.
👍 1
Avatar
Borderbingo 7/19/2023 6:16 AM
Do we have a rep for magnet forensics that I can contact?
Avatar
@Magnet Forensics
👍🏻 1
Avatar
Avatar
Borderbingo
Do we have a rep for magnet forensics that I can contact?
chriscone_ar 7/19/2023 8:03 AM
I’m happy to help.
Avatar
Anyone with experience getting workout data (raw coordinate data) from Apple Health? I am tring to access the raw contents of the healthdb_secure.sqlite so I can hope there is logged lat/long at a certain time of high activity. Will I need to request the data from Apple if it wasn't recovered extensively with Cellebrite?
Avatar
SailorCyberMoon 🌙 7/19/2023 3:37 PM
Has anyone been using Caine? I’m looking to install and try out . Hit me up!
Avatar
thatboy_leo 7/19/2023 8:57 PM
Looking for guidance on best channel to ask - my gf WhatsApp receives a call for a 2FA code, minutes later is logged out of WhatsApp, but since 2FA pin passcode is requested account is still secured. How is the other party receiving the 2FA code from the phone call to almost get into the account?
Avatar
Avatar
thatboy_leo
Looking for guidance on best channel to ask - my gf WhatsApp receives a call for a 2FA code, minutes later is logged out of WhatsApp, but since 2FA pin passcode is requested account is still secured. How is the other party receiving the 2FA code from the phone call to almost get into the account?
Andrew Rathbun 7/19/2023 9:16 PM
SIM cloning?
Avatar
Avatar
Andrew Rathbun
SIM cloning?
thatboy_leo 7/19/2023 9:18 PM
Yea my concern since the 2FA only shows as an incoming call, thankful that the 2FA pin protected account but will need to see how to protect in case of sim cloning
Avatar
CyberTitan11 7/19/2023 10:52 PM
Hello Everyone. "Long time listener, first time caller" type of message here. I'll start with my bottom line up front: Am I on the right path? I preface that to say if I am in the wrong area, please guide me along the right path. Right down to it, I'm a future career switcher and aspiring contributor to Digital Forensics field. I've been data mining my way around which led me to this discord, several LinkedIn profiles, podcasts, Magnet Summit earlier this year and have done what is considered my best to gather pertinent info for what I think are my 1st steps to switching careers. Quick background: B.S. Criminal Justice, military experience as military police officer, currently employed by DoD as an Assistant Inspector General (like auditing but of various military programs). Within that timeline, I'd consider myself to have the standard minimum cybersecurity knowledge. With my go-getter spirit, I enrolled in a certificate (bootcamp) program which I completed in June. Currently have my ITF cert, foregoing my A+ but will obtain Net+, Sec+ and maybe AWS Cloud Practitioner, which comes with the classes. Meat & Potatoes of it all: I will likely enroll and commit to Cyber5W's all access pass. (Can't beat the content creators value, input and their prices, so thank you @b1n2h3x & @binary ) Concurrently pending the commitment of family, life, work, education balance I would find me a local on the job training/internship as much as I can however this has been probably the most challenging. If anyone reading has connections in the San Diego/ Riverside/LA county area that I can take to lunch just to get some face to face time, I'd really appreciate it. I expect my plan to be revised but wanted to gain any feedback out there on what I am missing from this plan, how to bullet-proof it as much as possible, etc. Open canvas willing to hear any feedback to launch me into the field.
Avatar
Welcome @CyberTitan11 - Good luck and please feel to reach out if you need to Salute
🤝 1
Avatar
Digitalferret 7/20/2023 2:25 AM
@Deleted User you around mate?
2:31 AM
wondering if you've lost any socks 🙂
Avatar
Avatar
CyberTitan11
Hello Everyone. "Long time listener, first time caller" type of message here. I'll start with my bottom line up front: Am I on the right path? I preface that to say if I am in the wrong area, please guide me along the right path. Right down to it, I'm a future career switcher and aspiring contributor to Digital Forensics field. I've been data mining my way around which led me to this discord, several LinkedIn profiles, podcasts, Magnet Summit earlier this year and have done what is considered my best to gather pertinent info for what I think are my 1st steps to switching careers. Quick background: B.S. Criminal Justice, military experience as military police officer, currently employed by DoD as an Assistant Inspector General (like auditing but of various military programs). Within that timeline, I'd consider myself to have the standard minimum cybersecurity knowledge. With my go-getter spirit, I enrolled in a certificate (bootcamp) program which I completed in June. Currently have my ITF cert, foregoing my A+ but will obtain Net+, Sec+ and maybe AWS Cloud Practitioner, which comes with the classes. Meat & Potatoes of it all: I will likely enroll and commit to Cyber5W's all access pass. (Can't beat the content creators value, input and their prices, so thank you @b1n2h3x & @binary ) Concurrently pending the commitment of family, life, work, education balance I would find me a local on the job training/internship as much as I can however this has been probably the most challenging. If anyone reading has connections in the San Diego/ Riverside/LA county area that I can take to lunch just to get some face to face time, I'd really appreciate it. I expect my plan to be revised but wanted to gain any feedback out there on what I am missing from this plan, how to bullet-proof it as much as possible, etc. Open canvas willing to hear any feedback to launch me into the field.
Great work and thanks for checking out the content. A lot of my thoughts are here https://www.hexordia.com/blog-1-1/pathway-to-digital-forensics I’ll DM as well. Great initiative!
I am often asked how to get into Digital Forensics and/or Incident Response. It is a great question, often filled with a lot of nuances based on the background of the person asking as well as their areas of interest. That said, I think there are 7 key things that need to be considered; namely, Educa
🔥 5
Avatar
Avatar
CyberTitan11
Hello Everyone. "Long time listener, first time caller" type of message here. I'll start with my bottom line up front: Am I on the right path? I preface that to say if I am in the wrong area, please guide me along the right path. Right down to it, I'm a future career switcher and aspiring contributor to Digital Forensics field. I've been data mining my way around which led me to this discord, several LinkedIn profiles, podcasts, Magnet Summit earlier this year and have done what is considered my best to gather pertinent info for what I think are my 1st steps to switching careers. Quick background: B.S. Criminal Justice, military experience as military police officer, currently employed by DoD as an Assistant Inspector General (like auditing but of various military programs). Within that timeline, I'd consider myself to have the standard minimum cybersecurity knowledge. With my go-getter spirit, I enrolled in a certificate (bootcamp) program which I completed in June. Currently have my ITF cert, foregoing my A+ but will obtain Net+, Sec+ and maybe AWS Cloud Practitioner, which comes with the classes. Meat & Potatoes of it all: I will likely enroll and commit to Cyber5W's all access pass. (Can't beat the content creators value, input and their prices, so thank you @b1n2h3x & @binary ) Concurrently pending the commitment of family, life, work, education balance I would find me a local on the job training/internship as much as I can however this has been probably the most challenging. If anyone reading has connections in the San Diego/ Riverside/LA county area that I can take to lunch just to get some face to face time, I'd really appreciate it. I expect my plan to be revised but wanted to gain any feedback out there on what I am missing from this plan, how to bullet-proof it as much as possible, etc. Open canvas willing to hear any feedback to launch me into the field.
Digitalferret 7/20/2023 2:41 AM
Don't do it! Turn around and run now, before "the rabbit hole" consumes you! j/k Whole raft of professionals in here that can give you incredible insight. Welcome and best wishes.
💯 2
Avatar
Hi! Does anyone know if this path comes from an instagram story? var/mobile/Containers/Data/Application/APPID/Library/Caches/com.burbn.instgram.GSparseVideoPrefetchCache
Avatar
What's the best way to explain Greykey when asked in a trial?
4:57 AM
Is there a standard response?
Avatar
Avatar
DFE Travis
Is there a standard response?
Pretty sure they have a pdf on their customer portal you can download for legal responses on what you should or shouldn't say along with what you can or cannot release
Avatar
I sadly don't have a customer account, only the others in my lab do
5:04 AM
Explaining that it functions by performing a brute-force attack against the passcode would be sufficient, correct?
Avatar
Anyone thats familiar with @Griffeye maybe help me with a quick tip. When you have a file in thumbnail view that has multiple visual copies is there a quick way to see both separately? I know if I hover on the "VIS #" it pops them both up but I'm trying to look at the other visual copy in more detail to see more about it. (path, dates, metadata etc) I know I can probably turn off the option that hides visual copies, was just hoping theres a quick way as I locate items of interest.
Avatar
Avatar
DFE Travis
Explaining that it functions by performing a brute-force attack against the passcode would be sufficient, correct?
I'd have them log into the support portal for you and search for the "Requests for Information Regarding GrayKey" and download the PDF. Not trying to be vague but NDAs and what not for GK capabilities I don't want to put anything down. The article answers your question and is a better reference for your testimony than guy on DFIR discord 🙂
Avatar
Much appreciated!
Avatar
Anybody use Synology NAS in their lab workflow?
👍 2
📭 1
Avatar
Avatar
snoop168
Anyone thats familiar with @Griffeye maybe help me with a quick tip. When you have a file in thumbnail view that has multiple visual copies is there a quick way to see both separately? I know if I hover on the "VIS #" it pops them both up but I'm trying to look at the other visual copy in more detail to see more about it. (path, dates, metadata etc) I know I can probably turn off the option that hides visual copies, was just hoping theres a quick way as I locate items of interest.
Click Visual Copies at the bottom? To the right of grid view.
Avatar
Avatar
Queen-L
Hi! Does anyone know if this path comes from an instagram story? var/mobile/Containers/Data/Application/APPID/Library/Caches/com.burbn.instgram.GSparseVideoPrefetchCache
Andrew Rathbun 7/20/2023 9:09 AM
#mobile-forensic-decoding
Avatar
Avatar
b1n2h3x
Great work and thanks for checking out the content. A lot of my thoughts are here https://www.hexordia.com/blog-1-1/pathway-to-digital-forensics I’ll DM as well. Great initiative!
CyberTitan11 7/20/2023 5:08 PM
I love this article.
❤️ 1
Avatar
Avatar
CyberTitan11
I love this article.
Thank you!
Avatar
Avatar
Digitalferret
Don't do it! Turn around and run now, before "the rabbit hole" consumes you! j/k Whole raft of professionals in here that can give you incredible insight. Welcome and best wishes.
CyberTitan11 7/20/2023 5:20 PM
hahaha too late for me. I'm to the point of no return....I told my wife lol She never lets me back out of commitments
😂 2
Avatar
Avatar
CyberTitan11
Hello Everyone. "Long time listener, first time caller" type of message here. I'll start with my bottom line up front: Am I on the right path? I preface that to say if I am in the wrong area, please guide me along the right path. Right down to it, I'm a future career switcher and aspiring contributor to Digital Forensics field. I've been data mining my way around which led me to this discord, several LinkedIn profiles, podcasts, Magnet Summit earlier this year and have done what is considered my best to gather pertinent info for what I think are my 1st steps to switching careers. Quick background: B.S. Criminal Justice, military experience as military police officer, currently employed by DoD as an Assistant Inspector General (like auditing but of various military programs). Within that timeline, I'd consider myself to have the standard minimum cybersecurity knowledge. With my go-getter spirit, I enrolled in a certificate (bootcamp) program which I completed in June. Currently have my ITF cert, foregoing my A+ but will obtain Net+, Sec+ and maybe AWS Cloud Practitioner, which comes with the classes. Meat & Potatoes of it all: I will likely enroll and commit to Cyber5W's all access pass. (Can't beat the content creators value, input and their prices, so thank you @b1n2h3x & @binary ) Concurrently pending the commitment of family, life, work, education balance I would find me a local on the job training/internship as much as I can however this has been probably the most challenging. If anyone reading has connections in the San Diego/ Riverside/LA county area that I can take to lunch just to get some face to face time, I'd really appreciate it. I expect my plan to be revised but wanted to gain any feedback out there on what I am missing from this plan, how to bullet-proof it as much as possible, etc. Open canvas willing to hear any feedback to launch me into the field.
welcome! I would go look at Amazon and search for digital forensics. A couple books I like that are intro are "Handbook of Digital Investigations" by Eoghan Casey and "File System Forensics" by Brian Carrier. SANS courses are great too but are expensive
👍 2
9:55 PM
but if you can get help from where you work, it's worth it
Avatar
Avatar
Cash
welcome! I would go look at Amazon and search for digital forensics. A couple books I like that are intro are "Handbook of Digital Investigations" by Eoghan Casey and "File System Forensics" by Brian Carrier. SANS courses are great too but are expensive
CyberTitan11 7/20/2023 10:13 PM
Definitely will look into the books. I was actually looking at trying to use my veteran status for GI Bill and having them pay for it. 🤷‍♂️ Still working this angle. I meet a guy via LinkedIn that was able to do this.
👍 1
Avatar
Avatar
CyberTitan11
Definitely will look into the books. I was actually looking at trying to use my veteran status for GI Bill and having them pay for it. 🤷‍♂️ Still working this angle. I meet a guy via LinkedIn that was able to do this.
obviously depends on the funds for where you work, but you should be able to get approved. Someone else can probably chime in to see if you get a discount on prices for being a veteran
10:16 PM
I'd start with FOR500 first if you don't know a ton about Windows forensics, then go for FOR508 a little later
Avatar
Avatar
CyberTitan11
Definitely will look into the books. I was actually looking at trying to use my veteran status for GI Bill and having them pay for it. 🤷‍♂️ Still working this angle. I meet a guy via LinkedIn that was able to do this.
They have an MS program at SANS and that is how some GI Bill recipients pay for the classes, certs and degree… worth looking at that
👍 1
Avatar
DefendingChamp 7/21/2023 7:27 AM
How long do you guys retain extractions?
7:28 AM
Esp for places dealing with a lot of extractions per day
Avatar
Avatar
DefendingChamp
How long do you guys retain extractions?
Digitalferret 7/21/2023 8:00 AM
12yo inside me wants to say "til the tooth fairy gives me the coin" . i'll see myself out 🙂
Avatar
Avatar
thatboy_leo
Yea my concern since the 2FA only shows as an incoming call, thankful that the 2FA pin protected account but will need to see how to protect in case of sim cloning
Looking online it shows that a 6 digit pin code can be used for whatsapp ? https://faq.whatsapp.com/1278661612895630?helpref=faq_content
Avatar
Avatar
Kaarvonen
Anybody use Synology NAS in their lab workflow?
We do but as of lately they have become more and more picky on what HDD's you can use in the system. It becomes a pain to obtain those certain HDD's. My 2 cents.
👍 1
Avatar
@DCSO I just got 8 ironwolf 20TB NAS drives and the first thing it said was that they were not recommended
9:25 AM
Oh well. We have to go through purchasing for everything and it’s working for now I guess. I don’t want to have to wait 3 months on more drives.
Avatar
Avatar
Kaarvonen
@DCSO I just got 8 ironwolf 20TB NAS drives and the first thing it said was that they were not recommended
Nice, I'm glad it still working for you. Some of our hard drives it refused to work in the unit becuase it was not ones they recommend. We also had issue of upgrading the firmware in the NAS and afterwards there HDD's that were in the unit for years was not able to be seen because it was not part of the specs they wanted for HDD's 🤣
Elrisitas_laugh 1
Avatar
Thanks for the heads up!
Avatar
Deleted User 7/21/2023 12:44 PM
Hey, has anyone encountered C:\Windows\System32\catroot2\dberr.txt and knows what it's linked to / what actions it logs?
Avatar
Avatar
Deleted User
Hey, has anyone encountered C:\Windows\System32\catroot2\dberr.txt and knows what it's linked to / what actions it logs?
Andrew Rathbun 7/21/2023 1:09 PM
Looks like lots of Event Log Providers being logged here, for some reason.
1:10 PM
Here is one from like 2008 from an open source forensic image CatalogDB: 3:36:21 AM 1/19/2008: SyncDB:: AddCatalog: Microsoft-Windows-RecDisc-Package~31bf3856ad364e35~x86~en-US~6.0.6001.18000.cat CatalogDB: 3:36:21 AM 1/19/2008: SyncDB:: AddCatalog: Microsoft-Windows-RecDisc-Package~31bf3856ad364e35~x86~~6.0.6001.18000.cat CatalogDB: 3:36:21 AM 1/19/2008: SyncDB:: AddCatalog: Microsoft-Windows-RemoteAssistance-Package-Server~31bf3856ad364e35~x86~en-US~6.0.6001.18000.cat CatalogDB: 3:36:21 AM 1/19/2008: SyncDB:: AddCatalog: Microsoft-Windows-RemoteAssistance-Package-Server~31bf3856ad364e35~x86~~6.0.6001.18000.cat CatalogDB: 3:36:21 AM 1/19/2008: SyncDB:: AddCatalog: Microsoft-Windows-RemovableStorageManagement-Package~31bf3856ad364e35~x86~en-US~6.0.6001.18000.cat CatalogDB: 3:36:21 AM 1/19/2008: SyncDB:: AddCatalog: Microsoft-Windows-RemovableStorageManagement-Package~31bf3856ad364e35~x86~~6.0.6001.18000.cat CatalogDB: 3:36:21 AM 1/19/2008: SyncDB:: AddCatalog: Microsoft-Windows-Rights-Management-Services~31bf3856ad364e35~x86~en-US~6.0.6001.18000.cat CatalogDB: 3:36:21 AM 1/19/2008: SyncDB:: AddCatalog: Microsoft-Windows-Rights-Management-Services~31bf3856ad364e35~x86~~6.0.6001.18000.cat
1:10 PM
Then, here are some entries from my Windows 11 system. Appears to have millisecond counts now, for some reason CatalogDB: 9:09:56 AM 6/30/2023: DONE Adding Catalog File (16ms): Microsoft-Windows-MediaPlayer-Opt-Package~31bf3856ad364e35~amd64~~10.0.22621.1972.cat CatalogDB: 9:09:56 AM 6/30/2023: DONE Adding Catalog File (31ms): Microsoft-Windows-Media-Player-Package~31bf3856ad364e35~amd64~~10.0.22621.1972.cat CatalogDB: 9:09:56 AM 6/30/2023: DONE Adding Catalog File (15ms): microsoft-windows-netfx3-ondemand-package-Wrapper~31bf3856ad364e35~amd64~~10.0.22621.1972.cat CatalogDB: 9:09:56 AM 6/30/2023: DONE Adding Catalog File (63ms): Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~10.0.22621.1972.cat CatalogDB: 9:09:56 AM 6/30/2023: DONE Adding Catalog File (0ms): microsoft-windows-notepad-system-fod-package-Wrapper~31bf3856ad364e35~amd64~~10.0.22621.1972.cat CatalogDB: 9:09:56 AM 6/30/2023: DONE Adding Catalog File (0ms): Microsoft-Windows-Notepad-System-FoD-Package~31bf3856ad364e35~amd64~~10.0.22621.1972.cat CatalogDB: 9:09:56 AM 6/30/2023: DONE Adding Catalog File (0ms): microsoft-windows-powershell-ise-fod-package-Wrapper~31bf3856ad364e35~amd64~~10.0.22621.1972.cat CatalogDB: 9:09:56 AM 6/30/2023: DONE Adding Catalog File (16ms): Microsoft-Windows-PowerShell-ISE-FOD-Package~31bf3856ad364e35~amd64~~10.0.22621.1972.cat
1:10 PM
but those 100% look like event log providers
1:11 PM
Now, that being said, doesn't mean they are, they just appear to be very similar to event log providers I've seen. Maybe they are package names or something 🤷
1:13 PM
Have you considered running ProcMon to try and isolate what is writing to dberr.txt @Deleted User?
1:15 PM
I also wonder if that's an error log for Windows updates or something. if you search 31bf3856ad364e35 or similar strings, you see it hits on cumulative updates in Google
Avatar
Deleted User 7/21/2023 1:17 PM
👍
Avatar
Avatar
Andrew Rathbun
Have you considered running ProcMon to try and isolate what is writing to dberr.txt @Deleted User?
Deleted User 7/21/2023 1:18 PM
No, haven't yet, just came across a device where transacted hollowing was executed and it logged the errors there, it seems like I can actually add saved logs to Event Viewer from the files logged in folders from catroot2 too
👍 1
Avatar
Avatar
Deleted User
No, haven't yet, just came across a device where transacted hollowing was executed and it logged the errors there, it seems like I can actually add saved logs to Event Viewer from the files logged in folders from catroot2 too
Andrew Rathbun 7/21/2023 1:19 PM
Report back with any cool findings please!
Avatar
Deleted User 7/21/2023 1:21 PM
Definitely!
Avatar
Deleted User 7/21/2023 1:44 PM
I found a velociraptor doc about it (the .txt file itself actually seems to be related to windows updates & I have no idea why it logs errors with failed hollowing); Here's the doc: https://docs.velociraptor.app/blog/2021/2021-06-09-verifying-executables-on-windows-1b3518122d3c/
How do we know if a windows executable is a legitimate program written by the purported developer and not malware? This post covers the basics of Authenticode signatures in windows and how to verify and query them using Velociraptor.
Avatar
kartoffel4n6 7/21/2023 2:27 PM
Any way to view Citrix netscaler logs on a Windows machine? Client gave me a bunch of newnslog logs but are they only readable in Linux?
Avatar
Deleted User 7/21/2023 3:31 PM
Hey, got another question; On Windows devices with AMD, there's a directory which logs all opened processes (windowed applications etc) In C:\Windows\System32\AMD\EeuDumps; if anyone has ever encountered it, are there any ways of making it humanly readable with paths to applications? I could send the example .txt log if needed
Avatar
Avatar
Deleted User
Hey, got another question; On Windows devices with AMD, there's a directory which logs all opened processes (windowed applications etc) In C:\Windows\System32\AMD\EeuDumps; if anyone has ever encountered it, are there any ways of making it humanly readable with paths to applications? I could send the example .txt log if needed
Andrew Rathbun 7/21/2023 4:37 PM
Send it my way please, am very curious
Avatar
Avatar
Andrew Rathbun
Send it my way please, am very curious
Deleted User 7/21/2023 4:45 PM
It's quite a mess
4:46 PM
Avatar
Is there a website that has windows images to practice on?
Avatar
Avatar
Cash
Is there a website that has windows images to practice on?
randomaccess 7/21/2023 10:11 PM
Aboutdfir.com has an index of them. Otherwise cfreds
👍 1
Avatar
Avatar
Cash
Is there a website that has windows images to practice on?
👍 1
Avatar
anyone has exprirences with the social network "ok.ru"? They're probably not very cooperative, are they?
Avatar
stardustgirl 7/23/2023 10:32 PM
Hello. I am new here. I aspire to be a digital forensics examiner one day. But I am too confused. I have a masters degree in IT. Have worked for two years in cyber security. I recent got a job in fraud forensics, where they use FTK for investigations. So I am taking it thinking that it will be a good stepping stone for me to have a career in digital forensics. This job pays a little less though. But I am very confused on the path, the skills I need to build, the pace I should follow. I tend to start everything at once and then complete nothing. I am really lost and desperate and ruining my life rapidly. If someone could be give me some advise please.
Avatar
Avatar
stardustgirl
Hello. I am new here. I aspire to be a digital forensics examiner one day. But I am too confused. I have a masters degree in IT. Have worked for two years in cyber security. I recent got a job in fraud forensics, where they use FTK for investigations. So I am taking it thinking that it will be a good stepping stone for me to have a career in digital forensics. This job pays a little less though. But I am very confused on the path, the skills I need to build, the pace I should follow. I tend to start everything at once and then complete nothing. I am really lost and desperate and ruining my life rapidly. If someone could be give me some advise please.
What you mean your ruining your life?
Avatar
Avatar
elco6719
What you mean your ruining your life?
stardustgirl 7/23/2023 11:39 PM
well i am too confused, i left my job because i wanted to switch the field. i wasn't able to get it because no experience. I had to resort to a job which is paying me less, and it's embarrassing coz people my age are earning so much. i have no idea what am doing with my life, just feels like wasting time and walking in circles, i am not able to even apply to jobs effeciently.
11:44 PM
i had one job offer which paid good money, but because it was not the field i wanted to pursue i declined the offer. i figured that if i want to switch and do something for my end goal, i need to find a job which falls in the vicinity of digital forensics.
11:46 PM
in hindsight it feels like a mistake perhaps, but idk. It is said that you should follow your interests, but idk how sensible it is do so. 😦
11:46 PM
am sorry for pouring all this out, just stuck in a bad place 😢 (edited)
Avatar
@stardustgirl You should not regret something you did, or tried. In what way can we help?
Avatar
Avatar
florus
@stardustgirl You should not regret something you did, or tried. In what way can we help?
stardustgirl 7/24/2023 12:09 AM
some career advise, the career path for digital forensics, skills to build, certifications....is it possible to get a job in digital forensics with 2+ years of work experience? Or is more experience in other fields needed? (edited)
Avatar
Avatar
stardustgirl
some career advise, the career path for digital forensics, skills to build, certifications....is it possible to get a job in digital forensics with 2+ years of work experience? Or is more experience in other fields needed? (edited)
You could also check #training-education-employment regarding to your questions. I think its important to let uw know in what country you would like to persue a dfir job. In this way people from that area can give you the best advice. I think 2 years of experience is enough, as long as you are eager to learn. (edited)
Avatar
Avatar
florus
You could also check #training-education-employment regarding to your questions. I think its important to let uw know in what country you would like to persue a dfir job. In this way people from that area can give you the best advice. I think 2 years of experience is enough, as long as you are eager to learn. (edited)
stardustgirl 7/24/2023 12:18 AM
ok, I will check it out. thank you. 🙂 I am from India.
Avatar
@Law Enforcement [India] You might be lucky some Indian's want to answer your question in a DM or so. @stardustgirl (edited)
Avatar
Avatar
stardustgirl
Hello. I am new here. I aspire to be a digital forensics examiner one day. But I am too confused. I have a masters degree in IT. Have worked for two years in cyber security. I recent got a job in fraud forensics, where they use FTK for investigations. So I am taking it thinking that it will be a good stepping stone for me to have a career in digital forensics. This job pays a little less though. But I am very confused on the path, the skills I need to build, the pace I should follow. I tend to start everything at once and then complete nothing. I am really lost and desperate and ruining my life rapidly. If someone could be give me some advise please.
Digitalferret 7/24/2023 1:39 AM
look deep inside. what really "floats your boat"? It will be something that when you are working on it, the time just flies by. like 4 hrs just disappeared. Don't get too hung up on pay grade, that can be worked on later. just change Co every 2-3 yrs. Keep adding a bit of education/certs before your next move. Digital Forensics can be more of a "calling", the detective in you wants it, rather than the wage. You might also want to find a "cause" like <gender> or <violence/abuse> issues/rights and make that a side niche. Makes you feel like you are fighting for something worthwhile. best wishes
Avatar
Avatar
stardustgirl
ok, I will check it out. thank you. 🙂 I am from India.
Check DM
👍 2
Avatar
Undersearamen 7/24/2023 5:25 AM
I was wondering if anyone on here has come across the file called "webapp_registry.xml" on the Google Chrome application on android and if they would be able to give a little bit more insight into what it is?
Avatar
Anyone from @Magnet Forensics about for a question about keywords and emojis?
Avatar
Avatar
Rob
Anyone from @Magnet Forensics about for a question about keywords and emojis?
chriscone_ar 7/24/2023 5:42 AM
I’m available
Avatar
Avatar
stardustgirl
am sorry for pouring all this out, just stuck in a bad place 😢 (edited)
welcome! I can understand your pain, I was in a similar boat with not knowing what to do. I took a pay decrease to be in a more forensics role from what I was doing because it's what I want to do as a career. As the cliche saying goes "One step back but two steps forward". I'm just starting a DFIR role in June after being in DLP and Linux Admin for 2 years. I got the role by getting my masters and GCFE (SANS cert). There's tons of paths (Windows, Linux, Mac, Network, Malware). I'd start with looking at the book list on r/computerforensics and buy some books. This will get you some beginner's knowledge and is way cheaper than a master's program. I have a blog site just to show what I'm working on. I think this is a valuable way to show employers your passion for forensics and demonstrate your knowledge of different tools I'd get to know some free tools and do some lab experiments trying to find data. Document that somewhere to show employers you know what you're doing. A more expensive option is SANS courses, but I don't recommend that for you right now if you're still exploring if this is the right field for you. IMO, I think you made the right career move. It's very tough to enter the digital forensics field (most jobs are mid to senior level). Get the experience and in 2-3 years you can then move to something that pays better. I'm far from an expert but if you got questions, shoot me a dm. (edited)
❤️ 2
Avatar
Avatar
stardustgirl
Hello. I am new here. I aspire to be a digital forensics examiner one day. But I am too confused. I have a masters degree in IT. Have worked for two years in cyber security. I recent got a job in fraud forensics, where they use FTK for investigations. So I am taking it thinking that it will be a good stepping stone for me to have a career in digital forensics. This job pays a little less though. But I am very confused on the path, the skills I need to build, the pace I should follow. I tend to start everything at once and then complete nothing. I am really lost and desperate and ruining my life rapidly. If someone could be give me some advise please.
Is It Done Yet? 7/24/2023 8:11 AM
I will not re-iterate what others have said already, but they are right... My contribution to this is that you should consider expanding your network, if you don't have LinkedIn already. Get it. Build a network of people you aspire to be like, ask questions and have informed opinions. You should strive to build a relationship with those in the community and see whether anyone is willing to mentor / coach you, there are plenty of people out there who get satisfaction from helping others get into the field. You just have to take the first step... (edited)
👍 1
Avatar
Avatar
Is It Done Yet?
I will not re-iterate what others have said already, but they are right... My contribution to this is that you should consider expanding your network, if you don't have LinkedIn already. Get it. Build a network of people you aspire to be like, ask questions and have informed opinions. You should strive to build a relationship with those in the community and see whether anyone is willing to mentor / coach you, there are plenty of people out there who get satisfaction from helping others get into the field. You just have to take the first step... (edited)
good point about mentors. I'm relatively new so looking for one myself 😅
Avatar
If anyone has experience using a Synology NAS in their workflow that backs up to AWS S3 Glacier can you like this or dm me. I have a few questions about accessing the data using AWS data transfer services and how to get a file structure similar to what is on the NAS. I have a few gaps in my knowledge with AWS so just looking to ask a few basic questions to clear it up for myself and take the right approach to setup what needs to be done!
Avatar
I recently picked up a Ramsey STE6000 Faraday enclosure for the office. (https://ramseytest.com/ste6000) The box is enormous, plenty of room for activities in there. It measures roughly 15"H x 34"W x 22"D internal dimensions. Came with two LED strips to light up the inside and a power strip along the back for the toys. These boxes are built to order so your specs will likely be a bit different than mine if you have or are going to order one. Mine has a shielded ethernet port as the only interface. I also have locking hasps on the front, which I sorely missed on the Mission Darkness blockbox XL it replaced. The gloves are thicker than those on the Mission Darkness, velcro shouldn't be a concern here in wearing them out. Overall I am happy with the purchase, I have a few criticisms but they wouldn't sway me from getting it again. I needed the room to be able to manage 9-10 devices at a time into a large faraday bag to allow for opening the lid to add or remove items. The blockbox XL was okay in this respect but still cramped at times. The STE6000 is not cramped in any sense while working with that number of devices. The gloves came in very "short", not getting much past halfway to the back wall of the enclosure. I totally didn't adjust the glove mount to allow myself more reach towards the back... The gloves are one size and Ramsey says it's intentional to avoid people plugging/unplugging things through the gloves as they "don't advise" I do that activity. I don't actually buy this explanation since my much smaller STE3000 has gloves that reach the back wall and power strip just fine. I think they just don't stock longer gloves. As it sits I can't quite touch the back wall but I shouldn't lose devices out of reach. My second criticism is that the two LED strips make the interior visible but due to the size it is still quite dim. I would prefer brighter LED strips inside to make things more legible inside the box. (edited)
11:51 AM
FWIW I purchased through Saelig, they were easy to deal with and came in under other vendors on price
Avatar
Avatar
Is It Done Yet?
I will not re-iterate what others have said already, but they are right... My contribution to this is that you should consider expanding your network, if you don't have LinkedIn already. Get it. Build a network of people you aspire to be like, ask questions and have informed opinions. You should strive to build a relationship with those in the community and see whether anyone is willing to mentor / coach you, there are plenty of people out there who get satisfaction from helping others get into the field. You just have to take the first step... (edited)
stardustgirl 7/25/2023 12:04 AM
Yes! I have recently started connecting with some people in digital forensics on LinkedIn, also following their posts, it is very informative, i am getting to know the world of DF slowly. Hence, I also asked this question on Discord and got amazing responses! People indeed are so helpful! Starting to like Discord now, I have never been active before but now I will. There is so much to learn!!
Avatar
Avatar
whee30
I recently picked up a Ramsey STE6000 Faraday enclosure for the office. (https://ramseytest.com/ste6000) The box is enormous, plenty of room for activities in there. It measures roughly 15"H x 34"W x 22"D internal dimensions. Came with two LED strips to light up the inside and a power strip along the back for the toys. These boxes are built to order so your specs will likely be a bit different than mine if you have or are going to order one. Mine has a shielded ethernet port as the only interface. I also have locking hasps on the front, which I sorely missed on the Mission Darkness blockbox XL it replaced. The gloves are thicker than those on the Mission Darkness, velcro shouldn't be a concern here in wearing them out. Overall I am happy with the purchase, I have a few criticisms but they wouldn't sway me from getting it again. I needed the room to be able to manage 9-10 devices at a time into a large faraday bag to allow for opening the lid to add or remove items. The blockbox XL was okay in this respect but still cramped at times. The STE6000 is not cramped in any sense while working with that number of devices. The gloves came in very "short", not getting much past halfway to the back wall of the enclosure. I totally didn't adjust the glove mount to allow myself more reach towards the back... The gloves are one size and Ramsey says it's intentional to avoid people plugging/unplugging things through the gloves as they "don't advise" I do that activity. I don't actually buy this explanation since my much smaller STE3000 has gloves that reach the back wall and power strip just fine. I think they just don't stock longer gloves. As it sits I can't quite touch the back wall but I shouldn't lose devices out of reach. My second criticism is that the two LED strips make the interior visible but due to the size it is still quite dim. I would prefer brighter LED strips inside to make things more legible inside the box. (edited)
We purchased the STE6000 boxes over 2 years ago and haven't looked back since. Working in an accredited ISO17025 lab, everything needs to be planned, recorded and tested. We have had no issues. The gloves themselves can be lengthened as there is extra material retained by the clasp which can be released, although still not enough to reach to the rear of the box. We have both USB 3.0 x 2 and Ethernet x 2 ports, and use our CP adapters/GK units inside each box. We have found that as long as the practitioners have planned their examinations with the relevant cables and charger/cable already connecetd and powered on, plus utnesils such as a screen stylus etc all inside in advance, then everyhthing runs evenly enough. The lights being slightly dimmed means photographs taken are not affected by screen glare. Yes everything is a play off , however the capability and functionality. are excellent and certainly helped sustain our lab accreditation.
Avatar
Hi All, not sure if this is the right place to ask, but hope for some assistance. In short, I got elected to work on phishing alerts although I do not have much experience with this. I know how to interpret mail headers, however struggle to perform any additional validation beyond that. In fact, checking SPF, DKIM, and DMARC is not even much of a concern, because we have Proofpoint Protection Server in front of our O365 infrastructure that should reject anything that fail the mentioned checks. But there are situations that Proofpoint passes an email, say for example sent from an gmail account, and afterwards Defender for 0365 determines a URL within such email as malicious (detection technology == URL detonation reputation). However, when I click on the URL within Defender often I just see Summary == No detonation summary, Screenshots == No screenshots to display, Behavior details == No detonation behaviors lol ( very helpful, indeed). How should I proceed with this? It is just me how should be looking after this. Should I reach out to the end user asking “hey is this an e-mail you were waiting to be delivered?”.
3:56 AM
We don't have any sandbox, I spent some time trying to figure out what is going on: 1. Browsed the URL in https://www.browserling.com using Windows 10 /Chrome 114 and the link https://cw010uiy.page[.]link/R6GT got redirected to http://fsvnr.quram[.]cc/34546de4235m342356
  • the page.link domain looked interesting to me and from what google returned it looks like a Firebase dynamic link that from what I understood may behave differently depending how it is accessed
  • check the fsvnr.quram[.]cc domain on abuseipdb.com and it returned 6 reports and a confidence of abuse of 20%, IP geo location Russia 194.50.130.[0], geo location confirmed on ipinfo.io as well
  • submitted the URL to virustotal -> 5 security vendors flagged this URL as malicious
Try for free now! Cross browser test your websites online in all web browsers – Internet Explorer, Edge, Chrome, Safari, Firefox, and Opera.
3:56 AM
5. Browsed the initial URL https://cw010uiy.page[.]link/R6GT in https://www.browserling.com using Android / default browser 7.1 and was redirect (yesterday) to http://fox-ca.assesslikely.co[.]in/crim/vip/UK/7012/?bet=28368923&affsub2=my today nothing happens …
Try for free now! Cross browser test your websites online in all web browsers – Internet Explorer, Edge, Chrome, Safari, Firefox, and Opera.
3:56 AM
7. submitted yesterday the URL to urlscan.io and it looked like some sort of crypto investment scam https://urlscan.io/result/a3611f0c-31d9-44af-9fe9-4f331322c3ff/compare 8. as of today no able to resolve the domain Based on the findings, I can’t really tell what was the intention of this, information gathering, malware distribution etc? But would classify this as malicious. What could I have done more ? What should I have done differently ? Should I block the IP on my firewall etc? If anyone with experience could guide me a bit, that would be awesome ! THANK YOU !
urlscan.io - Website scanner for suspicious and malicious URLs
Avatar
Avatar
eziboi
5. Browsed the initial URL https://cw010uiy.page[.]link/R6GT in https://www.browserling.com using Android / default browser 7.1 and was redirect (yesterday) to http://fox-ca.assesslikely.co[.]in/crim/vip/UK/7012/?bet=28368923&affsub2=my today nothing happens …
Digitalferret 7/25/2023 4:32 AM
nicely de-linked ty. "co[.]in" maybe drop any replies into a Thread to, easier to follow if
4:33 AM
and yeh possibly better, as you have done, in #incident-response
Avatar
kmacdonald1565 7/26/2023 7:47 AM
anyone have luck with GPS trackers? we have a request for one and just wondering if anyone has any ideas. its a Trak4 LTE and has a usb port on it
Avatar
USB might be charging only. The unit should have an external product key or IMEI number you could subpoena to manufacturer for subscriber information or warrant for logs. Might have a sim card you could rip to get identifiers to issue a subpoena on if you don't see any external identifiers
this 1
Avatar
kmacdonald1565 7/26/2023 8:29 AM
yeah, thats what i believe was done by case detective, but the FAQ says it stores locations if out of cell range...which gave us a little hope there might be something on it
Avatar
Anyone who is cellebrite certified...what modality would you recommend for the course (instructor led, online, on demand)
9:05 AM
in particular the CCO/CCPA (edited)
Avatar
I have doubt. Is it possible to create two files with same size (bit by bit) with two different values. For example, Is it possible to create spiderman (photo) in jpg And Superman (photo) in jpg format with same file size.. (Bit by bit should be same). if so the hashing value of those files will be same right?. Thanks in advance
Avatar
Avatar
Afeef
I have doubt. Is it possible to create two files with same size (bit by bit) with two different values. For example, Is it possible to create spiderman (photo) in jpg And Superman (photo) in jpg format with same file size.. (Bit by bit should be same). if so the hashing value of those files will be same right?. Thanks in advance
Digitalferret 7/26/2023 10:01 AM
only 2 files exactly alike will have exact matching hash values
👍 1
10:02 AM
that's the whole point of accepting "hashed" as a definitve in court.
10:05 AM
that isn't affected by the name though. exact copies with different names will have the same hash value if the contents are exactly alike
Avatar
kmacdonald1565 7/26/2023 10:06 AM
^to add to this, keep in mind there are several hashing algorithms, which by their nature will produce different hashes
10:07 AM
for example, you have a base16 or base32 for sha1
Avatar
to some extent it also depends on the hash, if the hash is 64 bits, there are "only" 2^64 different files, so 2^64+1th file will have identical hash as one of the previous ones
Avatar
Digitalferret 7/26/2023 10:08 AM
yep ^ from stackechange: The hash of a file is the hash of its contents. Metadata such as the file name, timestamps, permissions, etc. have no influence on the hash. Assuming a non-broken cryptographic hash, two files have the same hash if and only if they have the same contents. The most common such hashes are the SHA-2 family (SHA-256, SHA-384, SHA-512) and the SHA3 family. This does not include MD5 or SHA-1 which are broken, nor a CRC such as with cksum which is not a cryptographic hash.
Avatar
there are algorithms for reverse hashing - that is, making a file that has a given hash
Avatar
Digitalferret 7/26/2023 10:09 AM
but the OP was asking if the hashes will be the same for different files but with the same size. not the other way round
Avatar
doesn't mean it will be a Spiderman image, though 😉
Avatar
Digitalferret 7/26/2023 10:10 AM
but then again, everytime i read it, i think something is lost in translation 🤔 (the OP)( (edited)
Avatar
kmacdonald1565 7/26/2023 10:11 AM
this is called hash collision
Avatar
Avatar
kmacdonald1565
this is called hash collision
Digitalferret 7/26/2023 10:11 AM
yep, argument has come up in court here. MD5 iirc
10:12 AM
so rare an event tho
Avatar
kmacdonald1565 7/26/2023 10:13 AM
i always kind of thought too much emphasis was put on the uniqueness of a hash when it comes to finding "identical files"...so as to mean if it is a file that is the target of an investigation (illicit file, CSAM, stolen file, etc), it is viewed and verified anyway. the hash is a tool to help, not the be-all end-all
this 3
Avatar
Digitalferret 7/26/2023 10:13 AM
yep, in context it can be pretty much moot. Mk1 eyeball tells all
10:14 AM
it's a tool, no more
Avatar
Avatar
BzdoOREK
there are algorithms for reverse hashing - that is, making a file that has a given hash
Andrew Rathbun 7/26/2023 10:14 AM
Wouldn't this be like a rainbow table, but for files? Correct me if I'm wrong
Avatar
kmacdonald1565 7/26/2023 10:14 AM
the sound byte of "the file is known to be the file with more certainty than a DNA test" or similar in court is great but meh
10:16 AM
Gavel Testify Judge
Avatar
Digitalferret 7/26/2023 10:16 AM
going back to UAPs chat, fries my brain less 🙂
Avatar
Avatar
Andrew Rathbun
Wouldn't this be like a rainbow table, but for files? Correct me if I'm wrong
kmacdonald1565 7/26/2023 10:17 AM
that sounds like a nightmare to try and figure out, its literally an infinite amount of bit combinations
10:18 AM
like passwords are a pain enough to break and they are like limited to usually under 20 characters, with whatever encoding
Avatar
Avatar
Andrew Rathbun
Wouldn't this be like a rainbow table, but for files? Correct me if I'm wrong
to be honest - no idea, and I don't think it is computationally feasible for serious hashing functions, but I do remember reading some kind of paper on the subject (sigh, can't remember how the process was called, I am an old fart with short memory and English is my 2nd language)
10:24 AM
I was looking for ideas for my game, I use CRC32 to identyify files
10:24 AM
and wondered if someone can generate file with a given CRC
Avatar
A hash function takes an item of a given type and generates an integer hash value within a given range. The input items can be anything: strings, compiled shader programs, files, …
Avatar
hashing functions are much more unique, but it is basically the same idea
Avatar
Avatar
BzdoOREK
to be honest - no idea, and I don't think it is computationally feasible for serious hashing functions, but I do remember reading some kind of paper on the subject (sigh, can't remember how the process was called, I am an old fart with short memory and English is my 2nd language)
If anyone is curious, i can generate collisions for some of the popular hashes relatively easily
10:58 AM
producing 2 files with MD5 collisions is not difficult at all these days
10:58 AM
and for SHA1 its also pretty easy, but only starting from the work that Google did, not freestarting
11:00 AM
for SHA256, 512, and the SHA3 family of hashes, there aren't any publicly known collisions to date
11:00 AM
and producing one would be computationally infeasible as far as we know
Avatar
kmacdonald1565 7/26/2023 11:04 AM
md5 had one that was relatively simple right...like a text file compared against another one each with a different characters in it?
Avatar
yes, the shortest MD5 one is easily short enough to paste here (edited)
11:06 AM
those are the 2 strings that collide
11:07 AM
the difference is best shown with highlighting though, one sec
11:07 AM
11:07 AM
there
11:07 AM
from the wiki page for MD5
11:07 AM
The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and was specified in 1992 as RFC 1321. MD5 can be used as a checksum to verify data integrity against unintentional corruption. Historically it was widely used as a cry...
Avatar
kmacdonald1565 7/26/2023 11:08 AM
nice
Avatar
These two photos have the same MD5 hash.
11:14 AM
11:14 AM
🔥 2
😍 1
11:14 AM
Avatar
Nice!
11:16 AM
the examples i have generated all contain chickens for... well obvious reasons 🙂
💯 1
🤣 11
Avatar
Avatar
kmacdonald1565
yeah, thats what i believe was done by case detective, but the FAQ says it stores locations if out of cell range...which gave us a little hope there might be something on it
Will you update when/if you get a resolution on this? Sounds interesting.... if it's possible to use it without active service and just place/pick up to get a historical location it'd be good to learn a bit more!
Avatar
kmacdonald1565 7/26/2023 4:54 PM
will do, we are going to try a few things
Avatar
Avatar
whee30
Will you update when/if you get a resolution on this? Sounds interesting.... if it's possible to use it without active service and just place/pick up to get a historical location it'd be good to learn a bit more!
kmacdonald1565 7/26/2023 4:54 PM
i cracked it open and saw a esp32 inside
4:54 PM
didnt see any specific memory chips, but i didnt google each thing on the board
4:55 PM
i know i can take a usb to ttl or similar type thing to read/write, just dont know if anything will be useful from it.....
4:56 PM
i have several esp32 and esp8266 type micro controller boards in smart outlets and all. i know i can pull a bin of the program on there, just dont know if i can get any useful memory off of it (edited)
Avatar
Hi, anyone from @AccessData/Exterro/@Exterro able to DM me please?
Avatar
@S1 drop me a dm
Avatar
Avatar
S1
Hi, anyone from @AccessData/Exterro/@Exterro able to DM me please?
Sorted now thanks
Avatar
equalexpert 7/27/2023 2:38 AM
does anyone know of or have a script/tool that can build databases for all or most tools? so griffeye, xways, ufed and axiom etc all have their own built in hash database manager and axiom has their central database manager however it would be nice to have 1 tools or script that you can throw a bunch of hash files into a generate a db file for each tool that can be pushed out to all machines.
Avatar
Avatar
equalexpert
does anyone know of or have a script/tool that can build databases for all or most tools? so griffeye, xways, ufed and axiom etc all have their own built in hash database manager and axiom has their central database manager however it would be nice to have 1 tools or script that you can throw a bunch of hash files into a generate a db file for each tool that can be pushed out to all machines.
Sounds like a open source project idea to me. 😊
Avatar
Avatar
Beercow
Sounds like a open source project idea to me. 😊
equalexpert 7/27/2023 4:20 AM
I thought as much😭
Avatar
Avatar
theshark
Anyone who is cellebrite certified...what modality would you recommend for the course (instructor led, online, on demand)
I prefer instructor led, more important for CCO as you'll get hands-on with devices/extractions. CCPA doesn't matter as you're working with extractions.
👍 1
Avatar
So I am building a parser for forensic images that are formatted with ReFS (more type of FS support will be added in the future) and I was wondering what features would an investigator find useful in such a tool. For ex: Console based or GUI based or Both Have the different fs structures bytes highlighted with colors Having the ability to create on demand reports from a opened case based on the evidence etc etc Let me know!
Avatar
Avatar
equalexpert
I thought as much😭
too bad these companies cant collaborate on a standard server to use across all tools. My vote is for @Griffeye to lead the charge with this and their GID system since a lot of our classifications come back in from griffeye at least in our lab
12:01 PM
does anyone know where I can find IOS update logs? Looking to see when the phone was updated to the current ios version its on, preferably see the version that it upgraded from
Avatar
Anyone concerned about eSIMs becoming suddenly more mainstream - causing major problems for LEA to ensure network isolation for mobile devices pending and during examination (with traditional isolation boxes and rooms being very much cost and practical prohibitive)?
Avatar
Avatar
MBdet
Anyone concerned about eSIMs becoming suddenly more mainstream - causing major problems for LEA to ensure network isolation for mobile devices pending and during examination (with traditional isolation boxes and rooms being very much cost and practical prohibitive)?
Yep, everyone is trying to think of solutions and they are all costly.
Avatar
Avatar
DCSO
Yep, everyone is trying to think of solutions and they are all costly.
A signal jammer with a reasonable degree of range control is the only solution I’m aware of that could be far cheaper and get the job done without the many practical challenges and limitations to boxes and room cladding. Notwithstanding some legal challenges to overcome in terms of the interference, but that shouldn’t be overly difficult eg with an appropriate standing authority. But I’m not sure if the technology is sufficiently developed or available, and it would need to be reasonably so to ensure the interference is limited to the required areas….
Avatar
If you are familar with the ZRTCLOCATIONMO db in a FFS cellebrite IOS 16 extraction can you check out my question in #mobile-forensic-extractions (edited)
Avatar
Hi, can somebody explain to me why it is (not) possible to extract the memory of a OnePlus Nord N10 5G (Android 11). I can extract an encrypted image of the userdata partition with edl: https://github.com/bkerler/edl
Avatar
Avatar
MBdet
A signal jammer with a reasonable degree of range control is the only solution I’m aware of that could be far cheaper and get the job done without the many practical challenges and limitations to boxes and room cladding. Notwithstanding some legal challenges to overcome in terms of the interference, but that shouldn’t be overly difficult eg with an appropriate standing authority. But I’m not sure if the technology is sufficiently developed or available, and it would need to be reasonably so to ensure the interference is limited to the required areas….
I think one of the major problems with signal jamming would be FCC signoff
this 1
1:22 PM
for the US, anyhow
1:25 PM
I'd be curious how controllable the range of a jammer could be. Like could you have a deskpad that jams signals for a foot or two max?
Avatar
Avatar
plmi
Hi, can somebody explain to me why it is (not) possible to extract the memory of a OnePlus Nord N10 5G (Android 11). I can extract an encrypted image of the userdata partition with edl: https://github.com/bkerler/edl
Digitalferret 7/27/2023 1:25 PM
#mobile-forensic-extractions
Avatar
Deleted User 7/27/2023 3:57 PM
Hey, got a question (not sure if this is even related to Forensics though); So there's a function in system informer that can create a kernel live dump, though in the past it used to bluescreen on some windows 11 builds so I was wondering if maybe there are any other forensic tools that can do the same thing (or) if it's been fixed
3:58 PM
I mainly have to work on Live systems so not looking for anything related to RAM / .MEM dumps of the entire system
Avatar
Avatar
Deleted User
I mainly have to work on Live systems so not looking for anything related to RAM / .MEM dumps of the entire system
Wouldn’t something like DumpIt be what you are looking for? https://www.magnetforensics.com/resources/magnet-dumpit-for-windows/
MAGNET DumpIt for Windows is a fast memory acquisition tool for Windows (x86, x64, ARM64). Generate full memory crash dumps of Windows machines.
this 1
❤️ 1
Avatar
Avatar
DCSO
Yep, everyone is trying to think of solutions and they are all costly.
DSCO how are LEA[US] dealing with it currently - are eSIMs already quite prevalent there?
Avatar
Avatar
FullTang
Click to see attachment 🖼️
Could you please snd me those file once again. I'm getting dfrnt hash value. Nd file size of plane nd ship were different.
Avatar
Avatar
MBdet
DSCO how are LEA[US] dealing with it currently - are eSIMs already quite prevalent there?
iPhone 14 in US and Canada is eSIM only if memory serves me right
Avatar
Avatar
Matt
iPhone 14 in US and Canada is eSIM only if memory serves me right
That's what I thought, can imagine it won't be long til it happens over here soon
Avatar
Agreed, it’s only a matter of time until it’s mandatory here too
👍 1
Avatar
Avatar
Afeef
Could you please snd me those file once again. I'm getting dfrnt hash value. Nd file size of plane nd ship were different.
A while ago a lot of people visited my site ( ~  90,000 ) with a post about how easy it is to make two images with same MD5 by using a chos...
👍 1
Avatar
Avatar
Matt
iPhone 14 in US and Canada is eSIM only if memory serves me right
nachito 4n6s 7/28/2023 6:16 AM
Here in Argentina, we are starting to receive iPhones 14 with only eSIM. We are currently exploring different options to counter this new technology
Avatar
Avatar
nachito 4n6s
Here in Argentina, we are starting to receive iPhones 14 with only eSIM. We are currently exploring different options to counter this new technology
Faraday cages or bags is our solution. But we haven't seen many yet (Louisiana, 🇺🇸)
Avatar
nachito 4n6s 7/28/2023 6:20 AM
Yes, we are in the process of shielding the entire lab with a faraday cage. For seizing devices we don't have many faraday bags, so we found a cheap but effective way to mimic a faraday bag using 5 turns of aluminum foil on the device 🤣
💯 5
Avatar
Avatar
nachito 4n6s
Yes, we are in the process of shielding the entire lab with a faraday cage. For seizing devices we don't have many faraday bags, so we found a cheap but effective way to mimic a faraday bag using 5 turns of aluminum foil on the device 🤣
Digitalferret 7/28/2023 6:54 AM
tinfoil! no really 🙂
Avatar
nachito 4n6s 7/28/2023 6:55 AM
Yes tinfoil sorry
Avatar
@Cellebrite need some assistance please!
📬 1
Avatar
Avatar
theshark
in particular the CCO/CCPA (edited)
That would really depend on your existing exposure to the materials covered. If it would be for someone with no exposure to it then instructor lead would be my preference for a new crew member. The ability to ask questions and get immediate answers from the instructor is the big selling point for this format.
👍 1
Avatar
Avatar
Matt
iPhone 14 in US and Canada is eSIM only if memory serves me right
We still have the physical SIM slots on the Canadian version of the iPhone 14. It wont be long though..........
Avatar
Avatar
snoop168
too bad these companies cant collaborate on a standard server to use across all tools. My vote is for @Griffeye to lead the charge with this and their GID system since a lot of our classifications come back in from griffeye at least in our lab
equalexpert 7/28/2023 1:58 PM
that would be nice. yeah @Griffeye would be pretty good as it handles hashes that are re-categorised nicely so then could roll out a new master hashset to other formats
Avatar
CLB-dan.techcrime 7/29/2023 3:00 AM
Faraday bag at time of seizure from a live owner is best but quite costly to deploy to "all" first responders -- the reality is that for deceased victims and phones found at crime scenes, it is impossible to shield from RF immediately at the time of the incident/event -- if network isolation cannot be ensured from the incident location to the lab, then there is zero point in building robust and costly lab solutions that would often be too late in the whole affair (e.g. putting the phone in a Faraday box or $50K Faraday room like 6 days after the murder, after it sat on the floor of the kitchen for 18 hours then in an unshielded evidence bag while in transit and booking in on its way to your lab is completely depressing 😕) (edited)
👍 2
Avatar
Avatar
equalexpert
that would be nice. yeah @Griffeye would be pretty good as it handles hashes that are re-categorised nicely so then could roll out a new master hashset to other formats
I actually sent an open email the @Griffeye and @Magnet Forensics bosses to request they collaborate on this. I think since Magnet makes a competing media review product it would be difficult. It was entirely predictable that hashset manager would come to compete with gid with no real benefit for the double work I now need to do tor nsrl and CAID updates. I’ve noticed both use mongodb dbms so I need to see if having one data store and some ‘virtual’ tables are possible though…
Avatar
Avatar
CLB-dan.techcrime
Faraday bag at time of seizure from a live owner is best but quite costly to deploy to "all" first responders -- the reality is that for deceased victims and phones found at crime scenes, it is impossible to shield from RF immediately at the time of the incident/event -- if network isolation cannot be ensured from the incident location to the lab, then there is zero point in building robust and costly lab solutions that would often be too late in the whole affair (e.g. putting the phone in a Faraday box or $50K Faraday room like 6 days after the murder, after it sat on the floor of the kitchen for 18 hours then in an unshielded evidence bag while in transit and booking in on its way to your lab is completely depressing 😕) (edited)
Definitely.. for us local Kiosk sites are an essential DF solution to address majority of our (Level 1) examinations. So for us the challenge is to isolate devices: 1. From scene 2. In storage (labs and examination rooms can’t store all of those exhibits for the duration of their recovery) 3. At local Kiosk sites (these are dedicated rooms/labs for ISO 17025) 4. At Level 2 / forensic unit lab(s) 5. In transit between all of the above So just having a faraday room for 4. At great cost and practical difficulty (needs; an airlock, to be big enough for multiple workstations to deal with the volume, UPS to work, aircon to work, network and power connectivity to work, to be tested and maintained etc) isn’t going to solve it.
🤞 1
Avatar
SubtleLunatic 7/29/2023 11:32 AM
i've got an image with older onenote files (.one) ingested into autopsy. Anyone know if there is a way to view their contents in autopsy ?
Avatar
Anyone with any experience with bouncie GPS units for vehicles? It’s a module that plugs in by the steering wheel.
Avatar
Random question, has anyone here ever worked an incident or intrusion where they saw the threat actor give up, or been in an organization where they got a threat actor to move on? I'm looking at several competing theories of cyber deterrence but there's not a lot of hard data showing what works. The big three theories Retaliatory Deterrence: (Being afraid to hit a target for fear of retribution. For example, threat actor checking what's on the box and seeing EDR's and seeing it has X provider, so they stop activity because they don't wanna get mentioned on their blog again) Deterrence by Denial: (Giving up because the walls are too thick and it's just not worth the time) Entanglement Deterrence: (Not DDOSing OVH or DigitalOcean because your infrastructure is also hosted their and you don't wanna take them down) I've seen a few of these myself, but curious what your experience has been? (edited)
Avatar
Avatar
conf1ck3r
Random question, has anyone here ever worked an incident or intrusion where they saw the threat actor give up, or been in an organization where they got a threat actor to move on? I'm looking at several competing theories of cyber deterrence but there's not a lot of hard data showing what works. The big three theories Retaliatory Deterrence: (Being afraid to hit a target for fear of retribution. For example, threat actor checking what's on the box and seeing EDR's and seeing it has X provider, so they stop activity because they don't wanna get mentioned on their blog again) Deterrence by Denial: (Giving up because the walls are too thick and it's just not worth the time) Entanglement Deterrence: (Not DDOSing OVH or DigitalOcean because your infrastructure is also hosted their and you don't wanna take them down) I've seen a few of these myself, but curious what your experience has been? (edited)
I've seen Threat Actors "give up" by detonating ransomware when they are caught in the middle of lateral movement/discovery(I think this was a lockbit RAAS case but not sure- been a while). Have also seen SCATTERED SPIDER give up once as the client was able to catch the sim swap within 5 minutes. Normally SCATTERED still tries but this wasn't exactly a prime target for them which may have been why
Avatar
Any LE people here dealing with large amounts of videofootage in high impact crimes? I hope someone is available for a short chat or teams-call, for a thesis im writing. Doesnt have to happen soon, but trying to look at the big picture. Please sent me a DM if you got time and willing to help 🙂 (edited)
🏒 1
Avatar
Thinking from a ISO17025 point of view....Does a hardware write-blocker stop TRIM from occurring? Do you disable TRIM when imaging an m.2/SSD storage device? I ask as we discuss TRIM/Garbage Collection in our Measurement of Undertainty document for 17025. To summarise we say that we can't stop garbage collection from happening but the write-blocker stops the OS initiating TRIM but I am aware some organisations still turn TRIM off prior to imaging.
Avatar
Spoke with our Nuix representative last week and they dropped the bomb that Workstation won’t be available as a standalone product anymore. Will be replace with a different infrastructure named Nuix NEO. With the anticipated price increase that this change will bring, we are looking into moving away from Nuix. Are there other data processing tools out there that allow some type of automation as well as the possibility of outputting data in Load File format to our eDiscovery platform?
Avatar
I guess my first real question here would be, if I have some resource(s) that I think(with high probability) will be useful for the majority of people on this server, is it advised to post it - just to post it ? For example, if I would post resources related to traffic-analysis, I would of course post it in #network-forensics (and so on) And note, it will not be "a big list" of stuff, this is why I ask, so I know in the future :) Or.. Is it more advised to :
  • post the resource when it's requested ? (I always check previous messages as well, so I never post a duplicate)
  • make 1 github repo and just post that link? instead of editing one's reply when updating it? Regards, Will.
(edited)
Avatar
Avatar
Ken-Kaneki
I guess my first real question here would be, if I have some resource(s) that I think(with high probability) will be useful for the majority of people on this server, is it advised to post it - just to post it ? For example, if I would post resources related to traffic-analysis, I would of course post it in #network-forensics (and so on) And note, it will not be "a big list" of stuff, this is why I ask, so I know in the future :) Or.. Is it more advised to :
  • post the resource when it's requested ? (I always check previous messages as well, so I never post a duplicate)
  • make 1 github repo and just post that link? instead of editing one's reply when updating it? Regards, Will.
(edited)
Take a peak at #dfir-open-source-projects - that might be better suited
👍 1
📌 1
Avatar
anyone from @Magnet Forensics around for a quick question about Axiom?
Avatar
Avatar
Matt
Take a peak at #dfir-open-source-projects - that might be better suited
So just to be sure - that's for posting resources? And thanks for replying;
Avatar
Avatar
Ken-Kaneki
So just to be sure - that's for posting resources? And thanks for replying;
Yep!
👌 1
Avatar
Avatar
sholmes
anyone from @Magnet Forensics around for a quick question about Axiom?
chriscone_ar 7/31/2023 10:04 AM
I can try to help.
👍 1
Avatar
Anybody have any experience capturing AWS with @Magnet Forensics AXIOM Cyber? Having some issues with AWS user permissions.
📬 1
Avatar
Hey, can i use Microsoft certifications to earn CPE's for GIAC renewals? I couldn't find the answer on SANS/GIAC website
Avatar
Avatar
kime
Hey, can i use Microsoft certifications to earn CPE's for GIAC renewals? I couldn't find the answer on SANS/GIAC website
Digitalferret 8/1/2023 1:49 AM
maybe echo in #training-education-employment too
Avatar
Avatar
kime
Hey, can i use Microsoft certifications to earn CPE's for GIAC renewals? I couldn't find the answer on SANS/GIAC website
You just need to submit them. The only issue is, they usually don’t give you all the CPE’s unless it has something to do with SANS. I’ve had a couple trainings, that even started on the certificate of completion, that it was 36 CPE’s and only received half of them through GIAC.
Avatar
XenoWarrior 8/1/2023 7:15 AM
Hi, I'm looking for sources regarding digital forensic artifacts and analysis for BSD systems (specifically FreeBSD, OpenBSD and NetBSD). I'm specifically interested in anything covering artifacts for evidence of persistence, lateral movement, privilege escalation and or data exfiltration. I'm looking for possible starting points for a thesis paper. I have checked with a few catalogs covering published papers and searched using Google. So far, I have found little to nothing in that regard. I would appreciate some pointers regarding usable papers, blog posts or similar for this (seemingly very niche) topic. 🙂
Avatar
Avatar
XenoWarrior
Hi, I'm looking for sources regarding digital forensic artifacts and analysis for BSD systems (specifically FreeBSD, OpenBSD and NetBSD). I'm specifically interested in anything covering artifacts for evidence of persistence, lateral movement, privilege escalation and or data exfiltration. I'm looking for possible starting points for a thesis paper. I have checked with a few catalogs covering published papers and searched using Google. So far, I have found little to nothing in that regard. I would appreciate some pointers regarding usable papers, blog posts or similar for this (seemingly very niche) topic. 🙂
Ken-Kaneki 8/1/2023 7:28 AM
when you say Sources - do you include like Resources too? as in, (as you state, blog posts), I thought would github repositories also be helpful? ^ broadly speaking; sorry for the weirdly-formatted question (edited)
Avatar
Avatar
Ken-Kaneki
when you say Sources - do you include like Resources too? as in, (as you state, blog posts), I thought would github repositories also be helpful? ^ broadly speaking; sorry for the weirdly-formatted question (edited)
XenoWarrior 8/1/2023 7:36 AM
I also happily take github repos.
Avatar
Avatar
XenoWarrior
I also happily take github repos.
Ken-Kaneki 8/1/2023 7:37 AM
noted!
Avatar
anyone have experience parsing gmail email headers to get IP? On a base level you only get the mailserver but I am trying to find the IP of the sender prior to it being received by the mails server.
8:07 AM
or outlook
Avatar
Avatar
theshark
anyone have experience parsing gmail email headers to get IP? On a base level you only get the mailserver but I am trying to find the IP of the sender prior to it being received by the mails server.
i believe it depends on the client if that gets stamped on the header... If its there it would be the one furthest down on the header since each server adds their headers to the top pushing everything else down (edited)
👍 1
Avatar
Avatar
theshark
anyone have experience parsing gmail email headers to get IP? On a base level you only get the mailserver but I am trying to find the IP of the sender prior to it being received by the mails server.
Is it a traffic-dump? or regex? or wait I am a bit confused by the end of the question uhm; (edited)
Avatar
Avatar
Ken-Kaneki
Is it a traffic-dump? or regex? or wait I am a bit confused by the end of the question uhm; (edited)
Not sure. Just “show original message” and got that big header info
📌 1
Avatar
Avatar
theshark
Not sure. Just “show original message” and got that big header info
ohh
Avatar
Out of gmail. No files
Avatar
okay; aight sorry I was confused; and; nvm my bad; hope it solves itself; (edited)
Avatar
I tried using traceroute. But that original IP is internal and protected by google
Avatar
Avatar
theshark
anyone have experience parsing gmail email headers to get IP? On a base level you only get the mailserver but I am trying to find the IP of the sender prior to it being received by the mails server.
Andrew Rathbun 8/1/2023 11:47 AM
https://mha.azurewebsites.net/ Have you tried this?
this 1
🎖️ 1
🏆 1
Avatar
Avatar
Andrew Rathbun
https://mha.azurewebsites.net/ Have you tried this?
Something similar. I’ll try this one thanks
Avatar
Avatar
theshark
Something similar. I’ll try this one thanks
Andrew Rathbun 8/1/2023 11:52 AM
I've used it for years and it's been really helpful. Hopefully it helps you with this but let me know if it doesn't. Maybe something I can learn, as well
👍 1
Avatar
Avatar
Andrew Rathbun
I've used it for years and it's been really helpful. Hopefully it helps you with this but let me know if it doesn't. Maybe something I can learn, as well
It still won’t help with private IP’s I guess those are sort of untouchable/unroutable
11:58 AM
Makes sense it would not be easily recovered but I’m trying to find any public tool that can help me get a public routable IP that it attached to the private one. Probably only found on google servers idk. (edited)
Avatar
Avatar
Andrew Rathbun
https://mha.azurewebsites.net/ Have you tried this?
I'm stunned. That's a brilliant resource thanks for posting it! (edited)
Avatar
Avatar
Ken-Kaneki
okay; aight sorry I was confused; and; nvm my bad; hope it solves itself; (edited)
also, a question to staff - should I remove any "obsolete" reply I have written? as I did here; or should I leave it be?
Avatar
Avatar
Ken-Kaneki
also, a question to staff - should I remove any "obsolete" reply I have written? as I did here; or should I leave it be?
Andrew Rathbun 8/1/2023 12:12 PM
I'd much rather the full context of conversations here be memorialized here for the purpose of search. You never know what may help someone years down the road. Ideally, keep your messages high fidelity so you have as little as possible where you feel you may want to delete them 😛
this 4
📌 2
🎖️ 2
Avatar
Avatar
Andrew Rathbun
I'd much rather the full context of conversations here be memorialized here for the purpose of search. You never know what may help someone years down the road. Ideally, keep your messages high fidelity so you have as little as possible where you feel you may want to delete them 😛
oh okay, that's noted! Thanks I'll probably be making myself some templates for posting replies. Thanks again and have a good night on you! Salute (edited)
Avatar
Andrew Rathbun 8/1/2023 12:16 PM
people
12:16 PM
who
12:16 PM
type
12:16 PM
like
12:16 PM
this
12:16 PM
that's not the ideal way to post here, since it's more of a professional/serious discussion environment.
📌 3
Avatar
Avatar
Andrew Rathbun
that's not the ideal way to post here, since it's more of a professional/serious discussion environment.
Yes, sorry did I post like that? sorry - I have a bad habit of editing my messages. (edited)
Avatar
Avatar
Ken-Kaneki
Yes, sorry did I post like that? sorry - I have a bad habit of editing my messages. (edited)
Not from what I’ve seen 🙂
📌 1
Avatar
Oh okay, I will try my best. Thanks to both of you! (edited)
Avatar
Deleted User 8/1/2023 11:43 PM
I am a new member, and I have a question about the worldwide DNS DOH of famous network service providers. I am currently using Google DNS and want to know how to check if their DNS has a DOH feature. Also, I want to know about the security and Privacy policies of Google, Cloudflare, and OpenDNS. Google steals user information, while Cloudflare claims they do not store user data for over 24 hours. However, I have noticed that the speed and connection of Cloudflare are not as good as Google DNS. Can you give me an overview of these two network service providers, Cloudflare and Google?
Avatar
Welcome! Wishes from Sweden. I only wanted to welcome, really. ^_^ (edited)
👍 3
Avatar
Avatar
Deleted User
I am a new member, and I have a question about the worldwide DNS DOH of famous network service providers. I am currently using Google DNS and want to know how to check if their DNS has a DOH feature. Also, I want to know about the security and Privacy policies of Google, Cloudflare, and OpenDNS. Google steals user information, while Cloudflare claims they do not store user data for over 24 hours. However, I have noticed that the speed and connection of Cloudflare are not as good as Google DNS. Can you give me an overview of these two network service providers, Cloudflare and Google?
How does Google "steal" user information ?
Avatar
Avatar
DCSO
How does Google "steal" user information ?
Deleted User 8/2/2023 5:35 PM
I have seen some articles where they said Google has taken user information and they are still being fined by some government.
Avatar
CasuallyJoseph 8/2/2023 6:44 PM
Hey y’all. Trying to break into digital forensics, working on getting my CHFI right now, graduating college around this time next year, saving up money to do SANS FOR500 for the GCFE. Trying to look at different positions and entry level positions to get an idea of what’s out there, where I should be looking and what skills I should be working on. Any tips for things I should really focus on, and what keywords I should be looking at for entry level positions. I have been looking but most entry level positions seem to be SOC analysts, or something along that line. Any tips are appreciated! (edited)
Avatar
Avatar
CasuallyJoseph
Hey y’all. Trying to break into digital forensics, working on getting my CHFI right now, graduating college around this time next year, saving up money to do SANS FOR500 for the GCFE. Trying to look at different positions and entry level positions to get an idea of what’s out there, where I should be looking and what skills I should be working on. Any tips for things I should really focus on, and what keywords I should be looking at for entry level positions. I have been looking but most entry level positions seem to be SOC analysts, or something along that line. Any tips are appreciated! (edited)
Hey! I had some discussion with people about this here: https://discord.com/channels/427876741990711298/537760691302563843/1131519366001856522 . DFIR has a ton of different areas you can focus in. IMO, it’s pretty tough to break into the field as an entry-level but not impossible. The computer forensics Reddit FAQ has some books that are good for learning the basics. I also recommend the 13Cubed channel as hell go over tools and artifacts, some of it will be on the FOR500 test (Introduction to Windows playlist)
6:59 PM
I’m working through the File System Forensics book and it seems pretty good. Only complaint is that it’s outdated and doesn’t go into SSD. Book is from 2000’s. Maybe someone else has a similar resource that is more current?
Avatar
Avatar
Cash
I’m working through the File System Forensics book and it seems pretty good. Only complaint is that it’s outdated and doesn’t go into SSD. Book is from 2000’s. Maybe someone else has a similar resource that is more current?
CasuallyJoseph 8/2/2023 7:14 PM
I have been reading through the 6th edition of guide to computer forensics and investigations by Bill Nelson and others, it goes into file systems some, but I’m unsure if it’s at the level you’re looking for (As I am a beginner it seems like a pretty advanced breakdown of everything, but it very well may be not as advanced as you’re looking for)
Avatar
Avatar
Cash
Hey! I had some discussion with people about this here: https://discord.com/channels/427876741990711298/537760691302563843/1131519366001856522 . DFIR has a ton of different areas you can focus in. IMO, it’s pretty tough to break into the field as an entry-level but not impossible. The computer forensics Reddit FAQ has some books that are good for learning the basics. I also recommend the 13Cubed channel as hell go over tools and artifacts, some of it will be on the FOR500 test (Introduction to Windows playlist)
CasuallyJoseph 8/2/2023 7:15 PM
It does seem to be something that isn’t very entry level friendly. I have been working for a year as a vulnerability manager, but nothing really geared towards forensics. It’s been tough trying to figure out the path I should really take.
Avatar
Avatar
CasuallyJoseph
I have been reading through the 6th edition of guide to computer forensics and investigations by Bill Nelson and others, it goes into file systems some, but I’m unsure if it’s at the level you’re looking for (As I am a beginner it seems like a pretty advanced breakdown of everything, but it very well may be not as advanced as you’re looking for)
I’ll have to take a look at it. I’m not really advanced. I completed For500 in December and have my masters in Dfir. Just started a Dfir job last month
Avatar
CasuallyJoseph 8/2/2023 7:15 PM
I have watched 13Cubed’s content, it’s good stuff
👍 3
Avatar
Avatar
Cash
I’ll have to take a look at it. I’m not really advanced. I completed For500 in December and have my masters in Dfir. Just started a Dfir job last month
CasuallyJoseph 8/2/2023 7:15 PM
Congrats!
Avatar
Avatar
CasuallyJoseph
Congrats!
Thanks. I got pretty lucky in finding my path. Think most places want a cert of some kind at least from what I’ve seen
Avatar
@CasuallyJoseph look at sans edu to see if you can get it at a discount by enrolling in one of their programs. The full price of 9k or whatever isn't cheap obv
Avatar
SOC analyst seems the most popular path for entry level. I also got a blog site I am putting projects and tutorials on different tools. Kinda using it as a resume. @stark4n6 has a good site with lots of resources
Avatar
^^^ what cash said. SOC is pretty good to start, and you might be able to get an employer to pay for the SANS training instead which could save you a ton too.
Avatar
@Magnet Forensics someone around for DM ? (edited)
Avatar
Avatar
emilie_
@Magnet Forensics someone around for DM ? (edited)
chriscone_ar 8/3/2023 5:34 AM
I’m available.
Avatar
@Oxygen Forensics Free for a quick DM?
Avatar
Avatar
Jeezy
@Oxygen Forensics Free for a quick DM?
Oxygen Forensics 8/3/2023 5:58 AM
Of course, please DM me 🙂
📬 1
Avatar
Hi I would also like to discuss with someone from Belgium @Law Enforcement [Belgium] I am a last year student in computer science and would like to apply, thanks!
Avatar
ForensicatorEC 8/3/2023 10:16 AM
Hey does anyone know if AXIOM ever had a Search Warrant Return processing option? I’m on v6.10 with computer, smartphone, and cloud licenses and don’t see it anywhere, but I could have sworn it was once an option.
📬 1
Avatar
chriscone_ar 8/3/2023 11:56 AM
Yes, there are search warrant return options for several service providers. If you aren't seeing them in the UI, it could be due to a license restriction. Let me know which provider you're looking at and I can send a temp license to use for cloud if you don't currently have one.
Avatar
Avatar
Spooky
Hi I would also like to discuss with someone from Belgium @Law Enforcement [Belgium] I am a last year student in computer science and would like to apply, thanks!
I have DM you
👍 1
Avatar
Jerry Hatchett 8/3/2023 1:42 PM
Looking for someone to image a Macbook Pro in Dominica. Any chance somebody knows somebody?
Avatar
Avatar
Jerry Hatchett
Looking for someone to image a Macbook Pro in Dominica. Any chance somebody knows somebody?
You might have luck on the IACIS forum I've seen requests there for private forensics similar to this request.
Avatar
Avatar
Spooky
Hi I would also like to discuss with someone from Belgium @Law Enforcement [Belgium] I am a last year student in computer science and would like to apply, thanks!
Sure, send me a DM.
👍 1
Avatar
Looking for insight on Telegram. @Cellebrite and @Magnet Forensics parsed the cache4.db's "search_recent" table. While trying to validate this finding, I noticed a "sent_files_v2" table. This could potentially be useful in my case, but not really sure. So before I go down the rabbit hole on an adventure that might not make a difference in this case, I thought I would reach out to see if anyone had any insight into this DB/tables. The question is, does this table contain the file names my guy actually sent? It has a column for "uid," "type" which contains numeric values (0,1,2), "data" which is potentially encrypted/encoded but definitely not easily readable, and "parent" which contains data formatted as "sent_0_7644_1817668042_3_61366." (edited)
📬 1
Avatar
People who have gotten a new job in the last 6 months: how is the job market for you? How easy was it? Reason I ask: Reading reddit comments it seems like there's two extremes. People looking for jobs for six months with dozens of interviews and zero luck, and people who snapped up a full remote job with 30% pay bump without issue. What's the experience for you all and whats the difference between those experiences? (edited)
Avatar
Avatar
DCSO
You might have luck on the IACIS forum I've seen requests there for private forensics similar to this request.
Jerry Hatchett 8/4/2023 8:37 AM
Thx.
Avatar
tapatiosec 8/4/2023 5:25 PM
Hi, what is the easiest way to create a forensic image of an apple mobile device on windows?
Avatar
Avatar
tapatiosec
Hi, what is the easiest way to create a forensic image of an apple mobile device on windows?
The iPhone is one of the most popular smartphone devices. Thanks to its huge popularity, the iPhone gets a lot of attention from the forensic community. Multiple acquisition methods exist, allowing forensic users to obtain more or less information with more or less efforts. Some of these acquisition
Avatar
Deleted User 8/5/2023 10:43 AM
Hey, are there any tools that can, for example, scan the MFT for modified attributes? Anything related? (Looking for something that can make it easier to find files that have attributes changed using tools like attribute changer / bulk file changer etc)
Avatar
Avatar
Deleted User
Hey, are there any tools that can, for example, scan the MFT for modified attributes? Anything related? (Looking for something that can make it easier to find files that have attributes changed using tools like attribute changer / bulk file changer etc)
pretty sure autopsy does this and is free
Avatar
Deleted User 8/5/2023 11:56 AM
Oh, I'll check it out, thanks!!
Avatar
chancej715 8/5/2023 2:27 PM
Does anyone here have experience converting Sigma rules into SPL with pySigma?
Avatar
Avatar
Deleted User
Hey, are there any tools that can, for example, scan the MFT for modified attributes? Anything related? (Looking for something that can make it easier to find files that have attributes changed using tools like attribute changer / bulk file changer etc)
randomaccess 8/5/2023 2:59 PM
Are you asking for a change timestamp Or a log of changes? Or to compare a previous MFT with the current MFT. Because they all have different answers
2:59 PM
the USN journal is probably your best bet though
Avatar
Deleted User 8/5/2023 3:02 PM
Yeah Journal should work too, might be more time consuming; looking for something that can "detect" if file's date modified attributes was edited, or something that can detect most attribute editors out there
Avatar
IT Security Certification Roadmap charting security implementation, architecture, management, analysis, offensive, and defensive operation certifications.
💯 10
Avatar
Private Derp 8/6/2023 6:09 PM
Hi there! Our agency is looking into soldering equipment for repairing damaged exhibits and board-level acquisition. Just want to know if many other agencies out there that have already deployed this kind of tool and what challenges they may of have faced. Cheers!
Avatar
Avatar
Private Derp
Hi there! Our agency is looking into soldering equipment for repairing damaged exhibits and board-level acquisition. Just want to know if many other agencies out there that have already deployed this kind of tool and what challenges they may of have faced. Cheers!
Andrew Rathbun 8/6/2023 9:05 PM
You may want to ask @TeelTech via email to see if they can provide you with a contact.
👍 1
Avatar
Deleted User 8/7/2023 3:59 AM
Hey, is there a major difference between a ram capture and a memory dump if my aim is to potentially see what was run from a command prompt? I'm assuming there's a difference if these (.raw & .mem captures) are separate things
Avatar
Avatar
Deleted User
Hey, is there a major difference between a ram capture and a memory dump if my aim is to potentially see what was run from a command prompt? I'm assuming there's a difference if these (.raw & .mem captures) are separate things
Matt Suiche talks full memory crash dumps vs. raw dumps how they measure up for memory analysis during incident response investigations.
Avatar
Deleted User 8/7/2023 4:57 AM
❤️
Avatar
blackleitus 8/7/2023 8:46 AM
Hello I am new to this server. I have been working on the offensive side of things, but I want to have some stats from a blue side perspective how would you categorize the following in 2022-2023? Very Frequent Common Rare Extremely rare types of attacks BEC ( business email compromise ) Data breaches cloud environments attacks IoT attacks hacktivism
Avatar
Avatar
blackleitus
Hello I am new to this server. I have been working on the offensive side of things, but I want to have some stats from a blue side perspective how would you categorize the following in 2022-2023? Very Frequent Common Rare Extremely rare types of attacks BEC ( business email compromise ) Data breaches cloud environments attacks IoT attacks hacktivism
Check out the Verizon dbir. It answers that and much more!
Avatar
digital Bowles 8/7/2023 9:18 AM
Does any of our agencies or as an individuals have experience with the tool CobWebs. No tool is perfect just looking to see if it is better then average and worth the price to a small (200 sworn) agency.
Avatar
Avatar
Jason
Check out the Verizon dbir. It answers that and much more!
blackleitus 8/7/2023 9:47 AM
Read the official 2023 Data Breach Investigations Report (DBIR) today.
Avatar
blackleitus 8/7/2023 9:54 AM
hey guys, what's the possibility tocreate threat driven intelligence? I dont need all data , but pretty specific like threat data ( profiling ) , data type vectors , resilience , purple team , red team, apt reports extraction , etc. how much time / money can you consider to build this?
Avatar
blackleitus 8/7/2023 11:33 AM
I create a graph with data attack vectors and possible economic impact loss .. how accurate is it? I did my best to extract information, economic loss data points ,etc (edited)
Avatar
blackleitus 8/7/2023 11:47 AM
Avatar
Avatar
digital Bowles
Does any of our agencies or as an individuals have experience with the tool CobWebs. No tool is perfect just looking to see if it is better then average and worth the price to a small (200 sworn) agency.
I sent you a DM
Avatar
Avatar
blackleitus
Click to see attachment 🖼️
It’s very difficult to quantify because the source data is not available. Also the size of the organization is an important factor, as well as other factors 🙂
Avatar
Morning! Is anyone aware of or has anyone ever compiled a checklist / assessment kit for tool evaluation in the field of digital forensics? Specifically 1) data collection tools 2) data processing tools 3) review tools. Thanks!
Avatar
Does anyone know how I can change my server tags? I used to be LE private sector but I am about to start a new job in LE public sector UK, thanks
Avatar
Will change your role now Lauren 🙂
👍 1
Avatar
hey what is the purpose of legitimate software to use encoding, obfuscation techniques? I'm looking into writing a custom detection in Defender for Endpoint when PowerShell invokes encoded code for example powershell.exe -EncodedCommand. I've seen legit processes usnig this a lot, and after decoding the base64 block it is just normal PowerShell code checking execution policy etc. Why do vendors do this ? This isn't going to help much from my point of view (although I might be missing something) as this can result in number of false positives. Anyone ?
Avatar
When I did SOC work, Microsoft defender did it a lot. I was surprised how often it did tbh.
👍 1
6:01 AM
As for legitimate reasons, quotes and escape characters aren’t needed when it’s encoded. That’s often why Defender was doing so
👍 2
Avatar
So I guess false positives in this case are not avoidable ...
Avatar
The commands are often repetitive so we were able to ignore alerting for those specific commands within our endpoint agents for a MS Defender parent process
Avatar
Avatar
eziboi
hey what is the purpose of legitimate software to use encoding, obfuscation techniques? I'm looking into writing a custom detection in Defender for Endpoint when PowerShell invokes encoded code for example powershell.exe -EncodedCommand. I've seen legit processes usnig this a lot, and after decoding the base64 block it is just normal PowerShell code checking execution policy etc. Why do vendors do this ? This isn't going to help much from my point of view (although I might be missing something) as this can result in number of false positives. Anyone ?
My understanding as to why legitimate software uses obfuscation is to secure their code. If threat actors don't understand the code, they can't find the vulnerabilities in it.
😂 1
Avatar
Deleted User 8/8/2023 7:20 AM
Hey, random question, are there any webs / tools or, anything really, that has the list of some known teams in the "dark web"?
Avatar
Avatar
Fierry
It’s very difficult to quantify because the source data is not available. Also the size of the organization is an important factor, as well as other factors 🙂
blackleitus 8/8/2023 7:24 AM
sure, but as a general overview frequency vs loss is okay since if you add more factors you will lose sense
Avatar
Avatar
Deleted User
Hey, random question, are there any webs / tools or, anything really, that has the list of some known teams in the "dark web"?
CyberGhost 8/8/2023 8:43 AM
There are some list that track known ransomware groups, if that's what you're asking. Most of the "hacking" groups or politically motivated groups use Telegram channels.
Avatar
Deleted User 8/8/2023 8:46 AM
Yeah I'm looking for something like that, where could I find it?
Avatar
I'm looking into my next cert and not sure where to go. I'm in an incident response job that does a fair amount of digital forensics work, including memory, network, and host. They'll pay for a SANS/GIAC course and test, so I was thinking GCFE or GCFA. Is one of them better to take first? (I currently hold Sec+ and GCIH)
Avatar
Avatar
Deleted User
Yeah I'm looking for something like that, where could I find it?
CyberGhost 8/8/2023 9:56 AM
the transparent ransomware claim tracker 🥷🏼🧅🖥
Avatar
Deleted User 8/8/2023 9:56 AM
Thanks!
👍 1
Avatar
Avatar
Desert
I'm looking into my next cert and not sure where to go. I'm in an incident response job that does a fair amount of digital forensics work, including memory, network, and host. They'll pay for a SANS/GIAC course and test, so I was thinking GCFE or GCFA. Is one of them better to take first? (I currently hold Sec+ and GCIH)
I kind of depends are your current skill set. GCFE (FOR500) is more focused on Windows forensics involving a single machine. GCFA (FOR508) is more incident response/forensics at scale. I think you get the most out of them if you can take FOR500 first and then FOR508. There is some overlap in FOR508 with FOR500, but you would be better off already having a solid foundation first.
💯 3
Avatar
Avatar
CyberGhost
I kind of depends are your current skill set. GCFE (FOR500) is more focused on Windows forensics involving a single machine. GCFA (FOR508) is more incident response/forensics at scale. I think you get the most out of them if you can take FOR500 first and then FOR508. There is some overlap in FOR508 with FOR500, but you would be better off already having a solid foundation first.
chriscone_ar 8/8/2023 10:02 AM
And after FOR500, maybe don't skip FOR508 and go straight to FOR572 🙃
💯 1
Avatar
Avatar
chriscone_ar
And after FOR500, maybe don't skip FOR508 and go straight to FOR572 🙃
FOR508 has been hard, no lie lol. It's a lot of material
Avatar
Avatar
chriscone_ar
And after FOR500, maybe don't skip FOR508 and go straight to FOR572 🙃
Hm, it seems like someone has specific experience with that 🤔
10:07 AM
Cool, I just applied for my organization to pay for FOR500. Thanks for the help!
Avatar
Avatar
Desert
Hm, it seems like someone has specific experience with that 🤔
chriscone_ar 8/8/2023 10:09 AM
While they aren't pre-reqs, each of those 3 courses definitely build on each other. All are a TON of material and directly applicable to real world work. And yes, direct experience. I skipped FOR508 and regret that. Not because it isn't do-able, but because I miss the government paying for those classes for me and I'd really like to take FOR508.
Avatar
Hoping to knock all three out within 12 months. Should be doable
Avatar
Hi all, I wanted to see if anyone else has been using PA Ultra over PA 7.X . I have been using it for a few weeks now but I am not sure if this is really better than regular PA or not and if anyone had some insight. Thanks!
Avatar
Does anyone know how to combine the .json files that Hubstream Intelligence Agent downloads? I'd rather have one large json than have to import multiple iterations...
Avatar
Avatar
FEJelinek
Hi all, I wanted to see if anyone else has been using PA Ultra over PA 7.X . I have been using it for a few weeks now but I am not sure if this is really better than regular PA or not and if anyone had some insight. Thanks!
I've been using it recently. It opens much faster, which is a definite Pro. The complaints I have so far is that there is a delay when tagging and when I complete an all projects search, I cannot collapse down the individual categories... I need to filter on the "type" column to eliminate categories I don't care about. Also, when I try to open some uncategorized objects, I really want a hex view if the program isn't going to attempt to convert the thing for me. I don't want to have to find it in the advanced search area.
👍 1
Avatar
Avatar
whee30
I've been using it recently. It opens much faster, which is a definite Pro. The complaints I have so far is that there is a delay when tagging and when I complete an all projects search, I cannot collapse down the individual categories... I need to filter on the "type" column to eliminate categories I don't care about. Also, when I try to open some uncategorized objects, I really want a hex view if the program isn't going to attempt to convert the thing for me. I don't want to have to find it in the advanced search area.
We installed Ultra here because 7 was hit or miss on giving us "reports generated with error" message. So far that has not happened with Ultra. What I am wondering is if there are still updates with PA 7, would there be a reason to go back to 7 when we already have Ultra. I like the dashboard a lot more with Ultra as well.
Avatar
I think as long as you are happy with the "shortcomings" of Ultra you should be okay. They claim that the parsers are on par with each other. Personally I am still using 7 to output readers to investigators out of my immediate area of influence since they aren't used to any interface changes. For cases that I am personally examining I have started to use Ultra.
👍 1
Avatar
I have someone asking for phone data but they only have a Macbook. Does anyone know if a @Magnet Forensics Axiom Portable case or a @Cellebrite UFED Reader report will run on a Macbook?
Avatar
Avatar
FullTang
I have someone asking for phone data but they only have a Macbook. Does anyone know if a @Magnet Forensics Axiom Portable case or a @Cellebrite UFED Reader report will run on a Macbook?
chriscone_ar 8/8/2023 2:43 PM
Portable case will not, needs 64 bit Windows.
👍 1
Avatar
Doesn't seem intended for the use but this article talks about an emulator of sorts that allows windows games to run on mac
2:50 PM
the article doesn't specify anything but games but it might be worth trying an application?
Avatar
Avatar
FullTang
I have someone asking for phone data but they only have a Macbook. Does anyone know if a @Magnet Forensics Axiom Portable case or a @Cellebrite UFED Reader report will run on a Macbook?
Same, it requires windows OS.
👍 1
Avatar
Avatar
whee30
Doesn't seem intended for the use but this article talks about an emulator of sorts that allows windows games to run on mac
I don't think I will try to get them to run an emulator, but it's not a bad idea. I'll probably just give them a .pdf from PA.
👍 1
Avatar
Avatar
whee30
Doesn't seem intended for the use but this article talks about an emulator of sorts that allows windows games to run on mac
Do keep in mind that other parties might ask questions about using emulator software to run your forensics tool, ie about expected behavior etc 🙂
Avatar
I'm not suggesting it's a great idea, just one worth exploring if there's a need
Avatar
You can always run full Windows in a VM, even on ARM nowadays. No need to emulate anything
👍🏻 3
Avatar
Why would McAfee Security on iPhone have 3.2 GBs, 3x the system storage on this iPhone? Is this typical?
Avatar
Original message was deleted or could not be loaded.
Cool book 😎, Thanks for sharing.
Avatar
Original message was deleted or could not be loaded.
probably not a good idea to post a download link to a full book without the author's consent
💯 3
Avatar
Having a frustrating time trying to learn Timesketch. I made a timeline with the latest version of Plaso, not realizing that Timesketch doesn't support the latest version. Once I found that didn't work, I installed an older version of Plaso but get an error when trying to create a disk.plaso file with it. Has anyone seen this?: Unable to write to storage with error: Unsupported attribute container type: event_source attribute: path_spec data type: dfvfs.PathSpec Hoping it's not too long before Timesketch supports the latest Plaso/log2timeline.
Avatar
Anyone have a faraday bag brand they recommend for isolating devices?
Avatar
I tested a grip of them a few years back and the silicon forensics were decent. Now we have mission darkness bags with the shielded USB port but those are pricy
Avatar
Our SiForce Faraday Bags have inner protective linings that block RF signals to preserve the integrity of wireless devices. Comes in various sizes to fit cell phones, tablets, and laptops. Now with Dual Layer Shielding!
5:08 PM
Please Note: 2-3 Week Lead Time KEEP DEVICES SHIELDED AND LIVE From Seizure to Evidence Storage to Data Extraction To effectively access and recover data from cell phones, tablets, and similar electronics, the latest forensic tools requir...
5:10 PM
the silicon forensics bags are inexpensive and seem to work well enough. The mission darkness bags came with a blocker locker we picked up so devices didn't keep burning out their batteries and turning off. Now the mission darkness locker is the priority location and the pile of other bags is the backup solution.
Avatar
Avatar
Ken Pryor
Having a frustrating time trying to learn Timesketch. I made a timeline with the latest version of Plaso, not realizing that Timesketch doesn't support the latest version. Once I found that didn't work, I installed an older version of Plaso but get an error when trying to create a disk.plaso file with it. Has anyone seen this?: Unable to write to storage with error: Unsupported attribute container type: event_source attribute: path_spec data type: dfvfs.PathSpec Hoping it's not too long before Timesketch supports the latest Plaso/log2timeline.
Did you use the Timesketch CLI importer tool? It’s more reliable than the web UI 🙂
Avatar
Avatar
whee30
the silicon forensics bags are inexpensive and seem to work well enough. The mission darkness bags came with a blocker locker we picked up so devices didn't keep burning out their batteries and turning off. Now the mission darkness locker is the priority location and the pile of other bags is the backup solution.
Thank you for this
Avatar
Original message was deleted or could not be loaded.
chrisforensic 8/9/2023 11:54 PM
be welcome here 😉 (edited)
Avatar
Avatar
Fierry
Did you use the Timesketch CLI importer tool? It’s more reliable than the web UI 🙂
From the error messages I'm seeing, it appears that the version of log2timeline I'm using is not yet supported by TimeSketch. I don't think it's really an upload issue if I'm understanding the error messages correctly.
Avatar
anyone here with expierience running Atomic Red Team tests to test detections on their security stack ? Running one test at a time ( does it make sense?) Would it be a realistic approach to testing this ? What I'm wondering is the lack of behavioral context that could cause EDR not triggering alerts at all ...
3:32 AM
also, would it be the case as it is with Eicar that it would trigger no matter what, because all security vendors incorporate detection's for the Atomic Red Team tests (since they are know and publicly accessible)? (edited)
Avatar
silence.s1r 8/10/2023 3:50 AM
I'm guessing their InvokeAtomic-Runner is what you may be looking for? Here you could create your own sequence of tests to mimic an actual attack flow https://github.com/redcanaryco/invoke-atomicredteam/wiki/Adversary-Emulation
Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the atomics folder of Red Canary&#39;s Atomic Re...
Avatar
Avatar
Ken Pryor
From the error messages I'm seeing, it appears that the version of log2timeline I'm using is not yet supported by TimeSketch. I don't think it's really an upload issue if I'm understanding the error messages correctly.
That’s really odd, I’ve had that error before when the version was too old
Avatar
Tr4pSec 🇳🇴 8/10/2023 5:40 AM
Does anyone have any experiences with using Ditto x86 SE Kit for imaging? (https://wiebetech.com/products/ditto-x86-se/) (edited)
Avatar
Avatar
Tr4pSec 🇳🇴
Does anyone have any experiences with using Ditto x86 SE Kit for imaging? (https://wiebetech.com/products/ditto-x86-se/) (edited)
No I haven't had the chance yet. But I do use some of there other products and would be confident in trying it out.
Avatar
BadgerBacon 8/10/2023 12:57 PM
So I'm the digital forensics detective at a mid-sized sheriff's office in the US, I have a a counterpart (and mentor) at the small city PD within my county. My county has recently obtained a very large building that has plenty of vacant space to create a joint lab. If both of us bring our equipment to a combined MultiJurisdictional Unit we will double our output. I frequently get cases in which 10 devices all seized at once need to be run, but limited resources this can take a week just to extract everything, thats without any analysis. By doubling our toolset we can both drop the everyday cases and power through 10 devices in a day or two to get intel much faster in the case of murders etc. My problem is how to pitch this best to each agency head. I've heard there are grants and funding available to such multijurisdictional units that aren't available to individual agencies, but I haven't been able to find any. Additionally I'm trying to find an example of a similar unit elsewhere to pick their brains but also haven't found it. Thats not surprising given these units aren't usually front page news. Essentially the more logisitcal issues I can have solved prior to pitching a proposal for the unit the easier it is for my Brass to high five and call it a win. Anyone have any recommended resources or know of any jursidictions that already use a multi-agency unit for Digital Forensics?
Avatar
Avatar
BadgerBacon
So I'm the digital forensics detective at a mid-sized sheriff's office in the US, I have a a counterpart (and mentor) at the small city PD within my county. My county has recently obtained a very large building that has plenty of vacant space to create a joint lab. If both of us bring our equipment to a combined MultiJurisdictional Unit we will double our output. I frequently get cases in which 10 devices all seized at once need to be run, but limited resources this can take a week just to extract everything, thats without any analysis. By doubling our toolset we can both drop the everyday cases and power through 10 devices in a day or two to get intel much faster in the case of murders etc. My problem is how to pitch this best to each agency head. I've heard there are grants and funding available to such multijurisdictional units that aren't available to individual agencies, but I haven't been able to find any. Additionally I'm trying to find an example of a similar unit elsewhere to pick their brains but also haven't found it. Thats not surprising given these units aren't usually front page news. Essentially the more logisitcal issues I can have solved prior to pitching a proposal for the unit the easier it is for my Brass to high five and call it a win. Anyone have any recommended resources or know of any jursidictions that already use a multi-agency unit for Digital Forensics?
A bit different but same idea: Around the country are regional computer forensic labratories (RCFLs) which are a combination of federal and local agency personel handling cases from all particpating agencies. https://www.rcfl.gov/
The FBI’s Regional Computer Forensics Laboratory (RCFL) program provides forensic services and expertise to support law enforcement agencies in collecting and examining digital evidence to support a wide range of investigations, including child pornography, terrorism, violent crime, and fraud.
👆 1
Avatar
Alright calling all internet sluths, I have a case where a suspect left there bumper for me unfortunately it did not have a license plate. I know it belongs to a Ford based on the tagging inside of it but the numbers are not the product numbers but more of a manufacturing numbers according to a Ford parts guy. Any help is appreciated, ! (edited)
Avatar
Arman Gungor 8/10/2023 4:58 PM
2008 or 2009 Ford Taurus X perhaps? @DCSO (edited)
4:59 PM
This example looks fairly similar except for the middle divider, which may be missing in the damaged bumper left behind https://static.cargurus.com/images/site/2007/06/27/2009_ford_taurus_x-pic-39652-1600x1200.jpeg (edited)
this 2
👍 4
Avatar
Nice work !! Thank you
👍 1
Avatar
Cyberinsight Canada 8/10/2023 5:32 PM
Free smartphone charging !!
😂 13
Avatar
Tr4pSec 🇳🇴 8/11/2023 12:04 AM
I asked about the ditto yesterday for imaging / capturing disk, but I now realised that does not solve my issues with capturing memory. So I have to change my question: How do you aquire disk and memory images (on user workstations) in an enviroment where the users dont have local admin rights out of the box? Do you use seperate elevated credentials when running the tools on the workstation? Do you have the tools available on a share, where they are auto elevated somehow? Or what do ppl usually do? (edited)
Avatar
Avatar
Cyberinsight Canada
Free smartphone charging !!
Digitalferret 8/11/2023 1:59 AM
looks like a HAK5 freebie demo booth 🤣
1:59 AM
charges your phone $25 for the privilege
Avatar
cyber_p4nn0n1us 8/11/2023 2:18 AM
Do any of you know of any non-commercial collaboration solutions or tools suitable for Incident Response (IR)? I've already evaluated Aurora IR and DFIR IRIS. While Aurora IR is lightweight, it lacks comprehensive collaboration capabilities. On the other hand, DFIR IRIS offers a fully-fledged IR platform, but it's somewhat cumbersome to use and doesn't accommodate convenient features like avoiding the need for a permanent VPN connection during on-site investigations. Any recommendations would be greatly appreciated.
Avatar
Avatar
cyber_p4nn0n1us
Do any of you know of any non-commercial collaboration solutions or tools suitable for Incident Response (IR)? I've already evaluated Aurora IR and DFIR IRIS. While Aurora IR is lightweight, it lacks comprehensive collaboration capabilities. On the other hand, DFIR IRIS offers a fully-fledged IR platform, but it's somewhat cumbersome to use and doesn't accommodate convenient features like avoiding the need for a permanent VPN connection during on-site investigations. Any recommendations would be greatly appreciated.
Tr4pSec 🇳🇴 8/11/2023 5:31 AM
The hive prehaps?
Avatar
any knows the average day rate for a Sr./Pr. Strategy advisor across US? (edited)
Avatar
Looking for what the best steps are to report errors in the @Cellebrite CCPA live on demand course, if i can get a rep let me know.
Avatar
Mark send me a DM and i'll make sure the info gets shared with proper channels @theshark (edited)
Salute 1
Avatar
Can anyone recommend a legit vendor for Windows licenses besides MS?
Avatar
Does anyone have a good set of resources for capturing https via mitmproxy from a website (brand infringement) I need to pull together a documentation (edited)
Avatar
Avatar
coolcalmPC
Can anyone recommend a legit vendor for Windows licenses besides MS?
Andrew Rathbun 8/12/2023 11:33 AM
Windows keys can be bought from so many vendors these days. This article aims to provide you with some of the best options to buy Windows product keys safely and as cost-effective as possible.
Avatar
moving here: Does anyone know if timesketch by default has a folder that it monitors to auto upload plaso/csv files? or a command to bulk upload a folder containing csv/plasos?
1:00 AM
Yall people are gonna be jobless soon, DFIR is fake
Avatar
Twitter drama 🙄
Avatar
Digitalferret 8/14/2023 2:15 AM
no idea if he binned it but it aint there for my timeline. trolls?
Avatar
who is he?
4:37 AM
lol
Avatar
Andrew Rathbun 8/14/2023 5:24 AM
I don't know the full extent of the drama, nor do I care to, but he's earned himself Persona non Grata status in the cyber security community I think thanks to multiple incidents that I'm not privy to the details
5:25 AM
All I care about is he's making a mess on Twitter over the years and not HERE 😛
PepeLaugh 5
Avatar
Original message was deleted or could not be loaded.
kladblokje_88 8/14/2023 5:36 AM
Jonathan Scott, basically the american equivalent of the dutch cyber charlatan called Rian van Rijbroek
5:36 AM
He is crazy
Avatar
Avatar
Andrew Rathbun
All I care about is he's making a mess on Twitter over the years and not HERE 😛
kladblokje_88 8/14/2023 5:37 AM
Once a year I see a meme passing surrounding that dude, good laugh
5:38 AM
No dw
Avatar
Avatar
Turb0Yoda
moving here: Does anyone know if timesketch by default has a folder that it monitors to auto upload plaso/csv files? or a command to bulk upload a folder containing csv/plasos?
it doesn't, and if the csv files aren't from select sources you'll need to provide column selections for timestamp, timestamp description, and message there's a timesketch_importer tool that can be scripted to import a bunch at once
Avatar
Avatar
rayeh
it doesn't, and if the csv files aren't from select sources you'll need to provide column selections for timestamp, timestamp description, and message there's a timesketch_importer tool that can be scripted to import a bunch at once
Yeah- I am Just gonna make a messy bash script for it lol
Avatar
what I'm doing is creating templates for the column selections for common log sources we use
Avatar
This guy (the account in the screetshot) is a controversial person and pretty much nothing but drama. His view points on information security and DFIR are.....out there to say the least. He has published “reports” trying to disprove the use of government spy tools.
Avatar
Avatar
CyberGhost
This guy (the account in the screetshot) is a controversial person and pretty much nothing but drama. His view points on information security and DFIR are.....out there to say the least. He has published “reports” trying to disprove the use of government spy tools.
kladblokje_88 8/14/2023 11:27 AM
I know, I had a little internet fight with him before about something
Avatar
My agency has purchased IBM’s i2 Analysis Notebook but can’t pay to send someone to the training for it. Is there anyone here willing to give some pointers or know of any guides
Avatar
Avatar
rabbit1709
My agency has purchased IBM’s i2 Analysis Notebook but can’t pay to send someone to the training for it. Is there anyone here willing to give some pointers or know of any guides
Andrew Rathbun 8/14/2023 8:38 PM
This is such a government thing to do 🙃 hopefully someone can help you out 🤕
😂 1
Avatar
Avatar
Andrew Rathbun
This is such a government thing to do 🙃 hopefully someone can help you out 🤕
Digitalferret 8/15/2023 1:56 AM
This is such a government thing to do I'm so adopting this. Incredibly useful new2me pejorative 🤣
😂 1
Avatar
Surprised they didn't pull the "we don't have any budget card"
2:06 AM
Trying to get anything is a challenge
Avatar
Deleted User 8/15/2023 5:29 AM
Hey, I was wondering if there are any servers / malware analysis professionals that / who can review a "tool" and determine if it's genuinely malicious or what's wrong with it?
The tool is accused of loading a malicious driver but from my personal analysis it's the same driver Process Hacker uses & the company seems to be verified with Microsoft...
Avatar
Question, How do I go about preparing for the SC-200. My biggest issue I can ready the theory and look at images but what's the point if I can't use a stimulated environment of things work in action like Microsoft Defender, EDR , Investigating alerts, Is anyone aware of I can use emulated enviroments ? (edited)
Avatar
actually nvm
Avatar
Anyone use forensic email collector alot please Dm me! I just need to know what to do if Its having trouble parsing a few items and then also how I can make the report of emails more readable - I only seem to be getting a MIME folder. Can they be parsed in @Cellebrite ? Thanks in advance!
Avatar
Avatar
theshark
Anyone use forensic email collector alot please Dm me! I just need to know what to do if Its having trouble parsing a few items and then also how I can make the report of emails more readable - I only seem to be getting a MIME folder. Can they be parsed in @Cellebrite ? Thanks in advance!
Arman Gungor 8/15/2023 9:07 AM
I use it quite a bit. Sending you a DM now 😉
Salute 1
Avatar
alright I broke l2t yet again.. I thought based on some random threads that l2t would just parse the bodyfile from mftECMD in but.. I guess I'm missing a flag here?
Avatar
Avatar
Turb0Yoda
alright I broke l2t yet again.. I thought based on some random threads that l2t would just parse the bodyfile from mftECMD in but.. I guess I'm missing a flag here?
they changed to require explicit --storage_file output_file semi-recently (edited)
9:38 AM
instead of implicitly by parameter order
Avatar
I see
9:38 AM
Let me try that in a sec
Avatar
sudo docker run -it -v /path/to/mounted/disk:/in:ro -v /path/to/incident/folder/plaso-out:/out/ log2timeline/plaso log2timeline.py --status_view none --parsers win7_slow --storage-file /out/identifier-plaso.body /in/ this is how I usually incant it, or without docker log2timeline.py --parsers win7_slow --storage-file output-folder/identifier-plaso.body /path/to/mounted/disk (edited)
Avatar
oooh that looks to be working..
Avatar
Avatar
rayeh
sudo docker run -it -v /path/to/mounted/disk:/in:ro -v /path/to/incident/folder/plaso-out:/out/ log2timeline/plaso log2timeline.py --status_view none --parsers win7_slow --storage-file /out/identifier-plaso.body /in/ this is how I usually incant it, or without docker log2timeline.py --parsers win7_slow --storage-file output-folder/identifier-plaso.body /path/to/mounted/disk (edited)
You could make the /in directory read only by adding :ro eg /path/to/mounted/disk:/in:ro
Avatar
ah wait I should have had the bodyfile and then the .plaso huh... whoops
Avatar
Avatar
Matt
You could make the /in directory read only by adding :ro eg /path/to/mounted/disk:/in:ro
I used to, and I'm glad you call it out because it may be important depending on how it's mounted
9:47 AM
But for our workflow the disk is already mounted read only or on a write-blocker
Avatar
Oh yes I agree, it’s more of a sanity check than an evidential failsafe
👍 1
Avatar
wow
9:48 AM
overall me processsing these collections with mftecmd took.. 15 minutes... and using l2t took.. 2 hours...
9:50 AM
I don't know why l2t was hanging up on the MFT...
Avatar
for me the value of plaso is running the entire bucket of parsers against the disk while I step back and work on other things
9:51 AM
the parser group win7_slow includes mft, but if you wanted to do mft separately the win7 preset may be better for you
Avatar
yeah.. that would be ideal however we've got 60 collections and a massive time crunch.. life
Avatar
it excludes esedb and mft
Avatar
I wish it was still march
Avatar
in my experience the system used for processing can make a significant difference with plaso also, it will run multiple processes for as many threads available on the system
Avatar
32 core 64GB ram EC2 instance on io1 SSD.. my 7950X3D rig with 980 pros in RAID 0.. something in MFT was causing it to choke idk what
Avatar
it may be worth just running it without MFT, as if you're using timesketch multiple timelines will be interleaved so you could just provide the output from mftecmd
Avatar
yeah that's the plan
9:55 AM
I'm waiting for my crappy ass upload to move this meshed .plaso into timesketch to make sure it's not borked... (edited)
Avatar
one thing I ran into recently, that felt like a silent failure with timesketch- if you check the timeline and the file's event count is much lower than the timeline's event count the underlying opensearch process may have decided it's unsafe to write new records to the indexes due to disk usage
9:57 AM
even with several hundreds of GB free, it stopped writing once it reached I think 95% use
Avatar
there will be warnings in the opensearch logs indicating the disk usage, but not the implication that it will stop writing
10:01 AM
not a recommendation to do this proactively, but in a gotta get it done situation adding: - cluster.routing.allocation.disk.threshold_enabled=false # added per https://stackoverflow.com/questions/63880017/elasticsearch-docker-flood-stage-disk-watermark-95-exceeded to the docker-compose file in opensearch's environment section will get things rolling
Avatar
DefendingChamp 8/15/2023 10:30 AM
I need to pull pics and audio off the notes app in an iPhone 14 max pro. Is there a way to do this on cellebrite ufed?
Avatar
Anybdy have any good articles to read about IPFS links and how to decode them.
Avatar
Hi, we have the possibility of accessing European funds and we are thinking of building a central data-center to act as a central forensic processing computing power for all of our locations spread throughout the country. We are thinking of building virtual machines with dynamic resource allocation that could be accessed from thin-clients. Our tools include the usual commercial tools (Axiom, Physical Analyzer, Oxygen, EnCase, FTK). Does anybody use this scenario for forensic processing? Is this ideea feasible/doable? Would transporting extractions and reports through LAN be too slow? Would it be better than individual forrensic workstations for each examiner? Can each examiner use its own dongle/license in the virtual environment? I know for example that the Cellebrite dognle doesn't like the remote desktop connection. Can this problem be solved with another licensing model? I would appreciate any thoughts/recommendations on this idea. Thank you!
Avatar
beansidebean2020 8/16/2023 2:26 AM
@Cellebrite anyone free to for a quick chat?
📬 1
Avatar
Does anyone work in the financial sector and have a cloud lab? Would love to chat through some questions I have.
Avatar
Avatar
Cip
Hi, we have the possibility of accessing European funds and we are thinking of building a central data-center to act as a central forensic processing computing power for all of our locations spread throughout the country. We are thinking of building virtual machines with dynamic resource allocation that could be accessed from thin-clients. Our tools include the usual commercial tools (Axiom, Physical Analyzer, Oxygen, EnCase, FTK). Does anybody use this scenario for forensic processing? Is this ideea feasible/doable? Would transporting extractions and reports through LAN be too slow? Would it be better than individual forrensic workstations for each examiner? Can each examiner use its own dongle/license in the virtual environment? I know for example that the Cellebrite dognle doesn't like the remote desktop connection. Can this problem be solved with another licensing model? I would appreciate any thoughts/recommendations on this idea. Thank you!
Dr. Kaan Gündüz 8/16/2023 5:11 AM
Vmware Vcenter supports creating vms on the fly. Vmware Horizon/Citrix can be useful for app virtualization. Most of the forensic software vendors support vms, some require additional RDP licenses. Most of the dongles can be served from a single vm, so the processing vms can use remote licenses. You can plug a dongle to a server and assign it to a vm. I used this scenario for 6 years (when i was the director of a large CF department) and was perfectly usable. During covid we didn't need to stop operations, gave the investigators VPN access to the system. You need fast network connections (10G+) for individual servers and storage. Since all data will be processed on vms, you can give your examiners basic laptops (even raspberry pis) to access the system. My personal opinion is to have a hybrid system with desktops and servers, since some operations may require a physical computer. Also you can consider imaging to a NAS system directly from your write blockers. There are a number of these devices that have network ports. Finally you can use a forensic lab solution to automate processes. Since i'm developing one, i can't advertise ours for the sake of this discord's rules, but i can tell that an automation solution makes your life much easier. You can choose templates and trigger processes when image creation is complete. Good luck, ping me if you need anything. (edited)
👍 1
Avatar
Hi there i have a question about oppo phone there is an error during backup as the connection lost to the device do you have a solution for this problem
Avatar
Avatar
Mohassan
Hi there i have a question about oppo phone there is an error during backup as the connection lost to the device do you have a solution for this problem
do it again
Avatar
I’ve tried 3 times but the same thing happened
Avatar
Avatar
Mohassan
I’ve tried 3 times but the same thing happened
What tool are you even using? Try a new cord. Any error/trace log available ? need to be way more descriptive for me to help.
Avatar
@Cellebrite anyone available for a quick question ?
📬 1
1:19 AM
about digital collector (edited)
Avatar
tinylilbones 8/17/2023 7:37 AM
Hey everyone! I'm a student about to start my masters in Digital Forensics Investigations in a week or so at Champlain. I'm very excited as this is what I've been working towards since I was just 16! I'm looking for someone that would want to be a mentor in the field and help guide me/talk and answer questions/network. DFIR seems like such a difficult career field to break into from an outside perspective and I'd love any insight. If there's a specific channel for this please redirect me there 🙏
Avatar
Avatar
tinylilbones
Hey everyone! I'm a student about to start my masters in Digital Forensics Investigations in a week or so at Champlain. I'm very excited as this is what I've been working towards since I was just 16! I'm looking for someone that would want to be a mentor in the field and help guide me/talk and answer questions/network. DFIR seems like such a difficult career field to break into from an outside perspective and I'd love any insight. If there's a specific channel for this please redirect me there 🙏
Andrew Rathbun 8/17/2023 7:42 AM
Feel free to DM me and we can chat
Avatar
Avatar
tinylilbones
Hey everyone! I'm a student about to start my masters in Digital Forensics Investigations in a week or so at Champlain. I'm very excited as this is what I've been working towards since I was just 16! I'm looking for someone that would want to be a mentor in the field and help guide me/talk and answer questions/network. DFIR seems like such a difficult career field to break into from an outside perspective and I'd love any insight. If there's a specific channel for this please redirect me there 🙏
^^ Ditto! 🙂 Although I'm UK based so different experiences 🙂
Avatar
tinylilbones 8/17/2023 8:59 AM
Thank you guys! I'll send you a message!
Avatar
Is there any way of making and image of a hard disk in a windows environment without using a tool, like using powershell or anything. I tried the following command Get-Content -Path "\\.\PhysicalDriveX" -Raw | Add-Content -Path "DriveImage.bin" but it was not able to access the physical drive. I am trying to figure out how to test a write blocker without having to install other tools. Thought i could take an image of the drive hash it, connect the write blocker, try moving data to it, writing files to it etc. Then create another image hash it and compare the hashes.
Avatar
Avatar
fcha256
Is there any way of making and image of a hard disk in a windows environment without using a tool, like using powershell or anything. I tried the following command Get-Content -Path "\\.\PhysicalDriveX" -Raw | Add-Content -Path "DriveImage.bin" but it was not able to access the physical drive. I am trying to figure out how to test a write blocker without having to install other tools. Thought i could take an image of the drive hash it, connect the write blocker, try moving data to it, writing files to it etc. Then create another image hash it and compare the hashes.
If you have wsl you could use dd natively. There's also a dd for Windows, but I've never used it.
Avatar
Awesome! I didn't even thing about using WSL. Thanks,
Avatar
Avatar
fcha256
Awesome! I didn't even thing about using WSL. Thanks,
DeeFIR 🇦🇺 8/17/2023 8:29 PM
Depends if you’re using WSL v1 or v2. You won’t be able to do it using v1.
Avatar
Avatar
Vendetta
Anybdy have any good articles to read about IPFS links and how to decode them.
https://docs.ipfs.tech/concepts/dht/#kademlia from there you can go down a rabbit hole 😁
Learn what distributed hash tables (DHTs) are, how they store who has what data, and how they play a part in the overall lifecycle of IPFS.
Avatar
Avatar
Cip
Hi, we have the possibility of accessing European funds and we are thinking of building a central data-center to act as a central forensic processing computing power for all of our locations spread throughout the country. We are thinking of building virtual machines with dynamic resource allocation that could be accessed from thin-clients. Our tools include the usual commercial tools (Axiom, Physical Analyzer, Oxygen, EnCase, FTK). Does anybody use this scenario for forensic processing? Is this ideea feasible/doable? Would transporting extractions and reports through LAN be too slow? Would it be better than individual forrensic workstations for each examiner? Can each examiner use its own dongle/license in the virtual environment? I know for example that the Cellebrite dognle doesn't like the remote desktop connection. Can this problem be solved with another licensing model? I would appreciate any thoughts/recommendations on this idea. Thank you!
Depends on your budget, definitely doable, more or less boils down to planning, location and hardware. Since it would be for investigation purposes, you would need a highly secured locale and very strict client access rules. I probably wouldn’t use a cloud provider, so basically you need to create Azure in your office, for large scale. If it’s just a few workstations, you can use a Remote Desktop over vpn with a hop to a lan server which could host your vms (edited)
4:05 PM
The other problem is transferring sensitive data, like evidence over the wire.
4:06 PM
With large amounts of data, like drive images for example, that would get expensive fast, unless you’re self sufficient.
4:07 PM
You would definitely need to hire a network engineering team, a systems architect and a cybersecurity consultant to efficiently design and implement a safe and secure environment to suit your needs. (edited)
4:09 PM
Last thing you would want on the open net, leaked data and or evidence. Cases thrown out because of a stipulation regarding your data and how the data was handled.
4:10 PM
In reality. A smarter approach, depending on your infrastructure, would be specialized units in the location of your endeavours.
👍 2
Avatar
Hello Everyone! I have an E01 image collected from a RHEL based Linux host, and am having some issues getting the E01 to mount properly. Is there a better tool to use to be able to mount those E01s to start scanning the filesystem? I figured a Linux based E01 image would need to be mounted in a Linux environment, but am not sure if there is a way to mount that image in Windows as well. I have been running into issues with using ewfmount & the native mount command in a SIFT VM, and was curious if there was an easier process to mount the images?
Avatar
Avatar
M1k3
Hello Everyone! I have an E01 image collected from a RHEL based Linux host, and am having some issues getting the E01 to mount properly. Is there a better tool to use to be able to mount those E01s to start scanning the filesystem? I figured a Linux based E01 image would need to be mounted in a Linux environment, but am not sure if there is a way to mount that image in Windows as well. I have been running into issues with using ewfmount & the native mount command in a SIFT VM, and was curious if there was an easier process to mount the images?
DeeFIR 🇦🇺 8/18/2023 9:55 PM
Definitely easier to mount in a Linux environment if possible. You can mount it on a Windows environment (using AIM, FTK, etc) and then navigate the disk/file structure with whatever tool supports the filesystem of the image. Assuming it's something like ext4 with LUKS, you're going to have an easier time mounting it in a dedicated Linux environment, instead of mucking around with wsl & loopback to try and mount encrypted partitions. What issues are you having? What errors are you seeing when you try and mount it? What's the filesystem in the image? Any encrypted partitions?
Avatar
Avatar
DeeFIR 🇦🇺
Definitely easier to mount in a Linux environment if possible. You can mount it on a Windows environment (using AIM, FTK, etc) and then navigate the disk/file structure with whatever tool supports the filesystem of the image. Assuming it's something like ext4 with LUKS, you're going to have an easier time mounting it in a dedicated Linux environment, instead of mucking around with wsl & loopback to try and mount encrypted partitions. What issues are you having? What errors are you seeing when you try and mount it? What's the filesystem in the image? Any encrypted partitions?
The filesystem I believe is xfs. As far as I am aware no encrypted partitions. I am able to use ewfmount to create a ewf1 file, and then I am using kpartx to created loopback partitions. I am able to mount all of the loopback partitions except for one (the main one with data) in which I get the following error: unknown filesystem type 'LVM2_member'
Avatar
Mobile Forensics aligned to Prawitz epistemic grounding Dag Prawitz is a Swedish logician and philosopher known for his contributions to proof theory and the philosophy of language. One of his significant ideas is the concept of "epistemic grounding," which pertains to the logical connection between a conclusion and the premises that support it. Epistemic grounding essentially refers to the relationship between a proposition (conclusion) and the evidence or reasons (premises) that justify accepting that proposition as true. It deals with how we can establish the validity of a conclusion based on the information or knowledge we have available. Prawitz's work in epistemic grounding emphasizes the connection between logical inference and the justification for making inferences. Prawitz's epistemic grounding is relevant in various ways. One example is Analyzing Reasoning: Understanding epistemic grounding can help in analyzing and evaluating arguments in various fields, such as philosophy, science, law, and everyday discourse. It provides a framework for assessing the strength and validity of reasoning processes.
9:44 AM
Prawitz's epistemic approach in the context of mobile forensics examination in simple terms: Idea (Conclusion): The main idea is to understand what happened on a mobile device, like a phone or tablet, during a specific event. This could be related to a crime or an incident. Evidence (Support): To figure out what happened, experts use different types of evidence: -Text Messages: They look at messages to see who was talking to whom and what they were saying. -Call Logs: They check who called or was called and when. -Photos and Videos: They examine pictures and videos to understand what was captured. -App Usage: They analyze which apps were used and when. Connecting the Dots (Epistemic Grounding): Just like solving a puzzle, experts piece together the evidence to understand the story. They use their knowledge and skills to interpret the evidence and find patterns that explain what happened on the device. Prawitz's epistemic approach in mobile forensics is like being a detective who collects clues (evidence) to understand a situation (idea) by putting the pieces together based on their experience and understanding (connecting the dots).
Avatar
is this homework?
Avatar
Avatar
ryd3v
is this homework?
I don't have such homework 🥹
😂 1
Avatar
Avatar
tinylilbones
Hey everyone! I'm a student about to start my masters in Digital Forensics Investigations in a week or so at Champlain. I'm very excited as this is what I've been working towards since I was just 16! I'm looking for someone that would want to be a mentor in the field and help guide me/talk and answer questions/network. DFIR seems like such a difficult career field to break into from an outside perspective and I'd love any insight. If there's a specific channel for this please redirect me there 🙏
If you have a class with Dave White tell him K says hi and something something tacos
✅ 1
DeeFIR 🇦🇺 started a thread. 8/19/2023 3:18 PM
Avatar
I am brand new to DFIR. Is it possible to get an internship with law enforcement as a citizen or would it be better to get an internship with the feds?
Avatar
Avatar
Gomer95
I am brand new to DFIR. Is it possible to get an internship with law enforcement as a citizen or would it be better to get an internship with the feds?
Digitalferret 8/20/2023 4:06 AM
maybe echo in #training-education-employment too
Avatar
Avatar
Digitalferret
maybe echo in #training-education-employment too
Done.
Avatar
I am also wondering if there is a mentorship program or I can obtain a mentor who can help me in getting a job with the federal government in the DFIR area or something similar? I have been reading a lot about careers in intelligence and law enforcement agencies within DFIR but I still need guidance in what experience and skills I need for those kinds of jobs.
Avatar
I need to transcript several hours of phone calls (2 persons talking) in pt_BR. I was thinking about using Google Speech-to-text API to start with and then listen to the audio files to correct mistakes. But even using an AI, it will be a labor job. Is there anyone here with experience that could give me some tips and hits, even tools used to make this job less painful? Thanks!
Avatar
Can I throw out a general question without it being a political discussion of any kind. Those of you (LE) whose country (EU) has sanctioned Russia-based or established companies. Are you still allowed to use Oxygen Forensics? feel free to DM me
Avatar
Avatar
tclahr
I need to transcript several hours of phone calls (2 persons talking) in pt_BR. I was thinking about using Google Speech-to-text API to start with and then listen to the audio files to correct mistakes. But even using an AI, it will be a labor job. Is there anyone here with experience that could give me some tips and hits, even tools used to make this job less painful? Thanks!
Whisper works rather well. Offline also, so nothing going to the internet. https://github.com/openai/whisper
Robust Speech Recognition via Large-Scale Weak Supervision - GitHub - openai/whisper: Robust Speech Recognition via Large-Scale Weak Supervision
💯 3
👍🏼 1
Avatar
Avatar
Beercow
Whisper works rather well. Offline also, so nothing going to the internet. https://github.com/openai/whisper
+1 for Whisper. I used it recently for transcription on small and it was pretty good. I didn't have the chance to put it on a computer with a better GPU and really try out how accurate large could be. Highly recommend.
Avatar
Avatar
tclahr
I need to transcript several hours of phone calls (2 persons talking) in pt_BR. I was thinking about using Google Speech-to-text API to start with and then listen to the audio files to correct mistakes. But even using an AI, it will be a labor job. Is there anyone here with experience that could give me some tips and hits, even tools used to make this job less painful? Thanks!
Digitalferret 8/21/2023 5:08 AM
possible to hire a professional transcriptor? I've tried <programs> before and they seem ok with general basic language, but you add in anything like technical / slang terms they go to sh*t. left field, but i ended up using Camtasia which gave a graph of the audio, so i could skip past huge amounts of dead space when transcribing ATC type chat.
👍🏼 1
Avatar
Avatar
busted4n6
I actually sent an open email the @Griffeye and @Magnet Forensics bosses to request they collaborate on this. I think since Magnet makes a competing media review product it would be difficult. It was entirely predictable that hashset manager would come to compete with gid with no real benefit for the double work I now need to do tor nsrl and CAID updates. I’ve noticed both use mongodb dbms so I need to see if having one data store and some ‘virtual’ tables are possible though…
Maybe I’ll get my wish with Griffeye joining @Magnet Forensics
Avatar
Avatar
busted4n6
Maybe I’ll get my wish with Griffeye joining @Magnet Forensics
Maybe you're the reason 😮
😁 2
Avatar
For years, cops and other government authorities all over the world have been using phone hacking technology provided by Cellebrite to unlock phones and In a leaked video, a Cellebrite employee urges law enforcement customers to keep their use of its phone hacking technology secret.
Avatar
I'm curious if anyone uses RDP to work on cases remotely. I've historically been uncomfortable with the idea but the amount of time I'm wasting zipping up cases to take with me when im out of the office for an extended period is frustrating. I still wouldn't want to work ICAC cases out of the office but for other stuff that just needs attention while I'm gone I've been considering it. Looking for opinions/policies/procedures for remote work, if any of you do it.
11:00 AM
I've been out of the office a lot lately traveling for various things and being able to keep up on cases would be so nice. There are obvious security concerns opening pandoras box like this but I am so unfamiliar with RDP (have never actually used it) that I don't know if my assumed concerns are overblown or not.
Avatar
As long as you connect through the company VPN before using RDP, that's the important bit. (edited)
Avatar
Any connection to RDP must be through a VPN
11:06 AM
Yeah exactly as @Sea9 said (and beat me to it :p) (edited)
Avatar
Just barely 🙂 There are some other concerns like cached credentials and lingering sessions, but those are problems whether you're local or not. Protecting against MITM is the big thing (because hardly anyone validates certificates properly), and using a VPN at least helps to alleviate the majority of that concern.
👌 1
👍 2
Avatar
Hey, does someone has some infos about the next cellebrite ctf on september, 20 ? On their youtube channel they have announced it but there is no webpage with it 😬 (edited)
Avatar
Nanotech Norseman 8/21/2023 1:32 PM
Hey all, strange question. I have an SMS.db that I'm trying to filter for privilege. When I export the DB from PA, I can't delete any records from it (Execution finished with errors. no such function: after_delete_message_plugin). I can issue a replace command as a way of redacting the information, however. Has anyone had any success or even guidance on how to filter//sanitize a DB in this way?
1:35 PM
(Of course, it goes without saying that the original sms.db is unaltered in the PA and on the GK extraction)
Avatar
Avatar
K8pl3r
Hey, does someone has some infos about the next cellebrite ctf on september, 20 ? On their youtube channel they have announced it but there is no webpage with it 😬 (edited)
the cellebrite CTF ?
Avatar
Avatar
whee30
I'm curious if anyone uses RDP to work on cases remotely. I've historically been uncomfortable with the idea but the amount of time I'm wasting zipping up cases to take with me when im out of the office for an extended period is frustrating. I still wouldn't want to work ICAC cases out of the office but for other stuff that just needs attention while I'm gone I've been considering it. Looking for opinions/policies/procedures for remote work, if any of you do it.
randomaccess 8/21/2023 3:05 PM
We do. I have a workstation in the office and I work from home. I work IR and corp DF cases so content isn't a concern. The main issue is data transfer. If I download a data set on my laptop, getting it across and into the forensic network can be annoying or slow. So for some stuff it's just easier to get into the office
💯 1
Avatar
Avatar
segumarc
the cellebrite CTF ?
yes sorry
Avatar
Avatar
K8pl3r
yes sorry
Seems like more info will be coming
Avatar
Okay, thanks, I'm waiting so 🙃😇
Avatar
Avatar
whee30
I've been out of the office a lot lately traveling for various things and being able to keep up on cases would be so nice. There are obvious security concerns opening pandoras box like this but I am so unfamiliar with RDP (have never actually used it) that I don't know if my assumed concerns are overblown or not.
I would also recommend baselining thr system and then hardening it using something like dod stigs or something similar to help ensure its secure
Avatar
anyone using @Elcomsoft iOS Forensic Toolkit that has a minute to DM? I just have some questions about the tool
Avatar
does anyone have osquery to query/parse the SRUM database?
Avatar
DeeFIR 🇦🇺 8/22/2023 4:13 AM
@Moderators ^ (edited)
Avatar
Has anyone dealt with OneDrive Android app? Subject admitted to csam in his vault but won't give finger print or pin. Did a quick selective extraction for only one drive and found a bunch of cached csam images associated with it. Is that something Microsoft would be able to decrypt and send if issued legal?
Avatar
Avatar
trillian
anyone using @Elcomsoft iOS Forensic Toolkit that has a minute to DM? I just have some questions about the tool
Sure, I am here to help
📬 1
Avatar
Avatar
Solec
Has anyone dealt with OneDrive Android app? Subject admitted to csam in his vault but won't give finger print or pin. Did a quick selective extraction for only one drive and found a bunch of cached csam images associated with it. Is that something Microsoft would be able to decrypt and send if issued legal?
Nanotech Norseman 8/22/2023 7:19 AM
I'm asking some colleagues right now about this, I know we have gotten many of the other hosting providers with returns, Onedrive isn't in my memory banks as if we've tried or not. My gut says yes you can get the data with a SW. I'll confirm later
Avatar
OneDrive doesn't support true zero-knowledge end-to-end encryption to my knowledge, so unless the subject encrypted or otherwise protected data prior to upload, Microsoft should be able to provide everything (even vault contents). (edited)
Avatar
Nanotech Norseman 8/22/2023 7:32 AM
Yep, SWR for Onedrive works in the same manner as the others. Sea9 is the correct, as long as it's not an alternative or secondary encryption you shoul be good
Avatar
@Nanotech Norseman @Sea9 appreciate it, thank you! Will get paperwork started
💯 1
Avatar
Avatar
whee30
I'm curious if anyone uses RDP to work on cases remotely. I've historically been uncomfortable with the idea but the amount of time I'm wasting zipping up cases to take with me when im out of the office for an extended period is frustrating. I still wouldn't want to work ICAC cases out of the office but for other stuff that just needs attention while I'm gone I've been considering it. Looking for opinions/policies/procedures for remote work, if any of you do it.
been rolling my own openvpn server for years and rdp from all over, works great, as long as you have everything setup good
Avatar
Not sure where to ask this but does anyone have any experience with the Nvidia Jetson Orin Nano Developer Kit?
Avatar
Avatar
K8pl3r
Okay, thanks, I'm waiting so 🙃😇
Stay tuned we will be releasing info soon when it becomes available. Sub to YT page and you’ll get the details when they are ready to go out.
🔥 2
Avatar
We’re excited to be bringing back Magnet Virtual Summit February 27-March 7, 2024! MVS is a fantastic chance for DFIR experts and newcomers alike to join a virtual event that offers a wide variety of presenters from many areas of expertise sharing their research in the latest trends in the fields of digital forensics, incident … Continued
Avatar
LeatherCouch 8/23/2023 7:36 PM
Hello all, is there a tool that can pin point which VPN service an IP is registered to?
Avatar
greynoise or spur.us might track that
Avatar
randomaccess 8/24/2023 1:45 AM
Greynoise uses sour
1:45 AM
Spur
Avatar
which tool do you guys use to extract from eml files? The text and attachments
Avatar
I have a user whose Facebook account was hacked. The hacker changed her associated contact information (email address, cell phone number). She cannot report the hack to Facebook as Facebook no longer shows an account associated with her email address and cell phone number. Any suggestions for contacting Facebook about this issue?
Avatar
Avatar
seattleebm
I have a user whose Facebook account was hacked. The hacker changed her associated contact information (email address, cell phone number). She cannot report the hack to Facebook as Facebook no longer shows an account associated with her email address and cell phone number. Any suggestions for contacting Facebook about this issue?
chriscone_ar 8/24/2023 9:36 AM
When dealing with this previously, I found that Facebook sends an email alerting of pending changes to any existing email addresses on file for the account (including recovery addresses) so that a user can revert just such an account takeover attempt. Those messages may get filtered away into a spam folder, though.
Avatar
DefendingChamp 8/24/2023 4:42 PM
Does ufed camera usually support audio?
Avatar
Hello everyone. I have a couple of questions regarding timelines created with log2timeline. How do you typically use it? Do you provide it with a full image, or do you filter with KAPE and extract only the artifacts, events, logs, etc., and then run log2timeline on the resulting VHD?
Avatar
Avatar
DefendingChamp
Does ufed camera usually support audio?
No not that i recall but the camera we had never had audio built in
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 8/25/2023 9:07 AM
What's the question? Sounds like something others would benefit from. Also, #computer-forensics would be a good channel to ask
Avatar
Anyone have issues with the GrayKey plugin in Magnet Axiom? Very often, when transferring image from the GK onto my local machine (via Axiom), the import fails. Axiom log reports "The requested operation culd not be completed due to a file system limitation" The current failure I'm getting is with a 70gig iPhone FFS from GK onto a 3+TB free NTFS raid. I can't think of any file system limitation that is being exceeded.
Avatar
@Magnet Forensics any ideas?
Avatar
Avatar
Leonidas
@Magnet Forensics any ideas?
Hi @Leonidas sending you a DM
Avatar
What forensics workstations do you guys use? We still have digital intelligence FREDS from, like, 2018, and are looking to upgrade. Looking at possibly Talino workstations from Sumuri, but seeing what our options are.
Avatar
Avatar
silvance.
What forensics workstations do you guys use? We still have digital intelligence FREDS from, like, 2018, and are looking to upgrade. Looking at possibly Talino workstations from Sumuri, but seeing what our options are.
There are a good number of options. Depends on how much you want to spend and where you want to get them from. 'Forensic' providers (Sumuri, Digital Intelligence, EDAS Fox, Bitmindz, Silicon Forensics) or big box (HP, DELL, Lenovo)?
Avatar
Most likely through forensic providers. It's easier to get leadership to pay if they're a reputable forensic company.
Avatar
Avatar
silvance.
Most likely through forensic providers. It's easier to get leadership to pay if they're a reputable forensic company.
Yeah, that is common. It is something many have to deal with. If given the opportunity in the future I'd push back against that misnomer because a workstation is a workstation. What matters is the cost, what components are in it, and the quality of the service if you didn't build it yourself. Having said that, any of the forensic providers I listed could work. We have used DI, Bitmindz and we have some Talinos being built.
Avatar
Does anyone regularly use oxygen for their reports? I don't understand why the 'From:' column is not matching the 'Originating Number', unlike the CDR view which appears correctly.
Avatar
Digitalferret 8/25/2023 12:35 PM
@Oxygen Forensics ^
👍 1
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 8/25/2023 4:49 PM
Try #training-education-employment
👍 1
Avatar
Hi, from a forensic perspective, how similar are iPadOS and iOS when it comes to data acquisition and artifacts?
Avatar
I'm having many issues with Oxygen. I love the interface, it's great, but so buggy ime
Avatar
Are encryption keys wiped on an iPhone once it has become "Disabled" or "Unavailable"?
Avatar
Avatar
Andrew Rathbun
Try #training-education-employment
F0r3ns1c4t0r 8/26/2023 5:23 PM
Thanks 🙂
Avatar
Avatar
Iown
Are encryption keys wiped on an iPhone once it has become "Disabled" or "Unavailable"?
I’ll try to find an old post of mine where I asked this, the answer is currently “yes, depending on iOS version”. The specific version is what I don’t remember and will try to find. Nothing recent.
8:44 PM
https://discord.com/channels/427876741990711298/427877097768222740/1095115104263086100 I was informed via DM that from iOS 12.1 onward there was no hope of recovery.
Avatar
Avatar
whee30
I’ll try to find an old post of mine where I asked this, the answer is currently “yes, depending on iOS version”. The specific version is what I don’t remember and will try to find. Nothing recent.
Thank you!
Avatar
SubtleLunatic 8/27/2023 7:30 AM
question for you more experienced folks out here. What do you use for case management? Since i've been using a lot of free tools so far everythings been excel and word files and a file share for collecting objects. It feels like a really bad solution. Curious what is out there and recommended. I took a look at DFIR-IRIS but couldn't get it to run
Avatar
Avatar
SubtleLunatic
question for you more experienced folks out here. What do you use for case management? Since i've been using a lot of free tools so far everythings been excel and word files and a file share for collecting objects. It feels like a really bad solution. Curious what is out there and recommended. I took a look at DFIR-IRIS but couldn't get it to run
Andrew Rathbun 8/27/2023 9:48 AM
I've heard really good things about @Monolith Forensics. @Matt - Monolith Forensics should be around for any questions or guidance (no this message is not sponsored 😛) (edited)
Avatar
SubtleLunatic 8/27/2023 10:17 AM
awesome thank you
Avatar
Joey Juarez 8/27/2023 11:08 AM
Ask away about Monolith I can answer them
Avatar
Joey Juarez 8/27/2023 3:57 PM
@SubtleLunatic www.monolithforensics.com free trial available, taker er for a test ride free
Avatar
SubtleLunatic 8/27/2023 4:00 PM
Will do, appreciate it
Avatar
we have a faraday cage (standing adult size tent) that used to work but doesnt seems to work anymore (I can send sms and scroll the web while inside it). Do you know what could be the issue here ? (I already checked for potential holes but I haven't found any) (edited)
Avatar
Avatar
emilie_
we have a faraday cage (standing adult size tent) that used to work but doesnt seems to work anymore (I can send sms and scroll the web while inside it). Do you know what could be the issue here ? (I already checked for potential holes but I haven't found any) (edited)
Digitalferret 8/28/2023 7:15 AM
check grounding?
Avatar
ok, good suggestion, I don't see any problems so far (edited)
Avatar
Avatar
emilie_
we have a faraday cage (standing adult size tent) that used to work but doesnt seems to work anymore (I can send sms and scroll the web while inside it). Do you know what could be the issue here ? (I already checked for potential holes but I haven't found any) (edited)
Ross Donnelly 8/28/2023 10:16 AM
Could there be any changes to the frequencies the cells in the area are broadcasting on?
Avatar
How do you close the enclosure? Over time the seal can wear and start letting signals through. And do you know if any new masts have appeared in your area recently?
Avatar
Private sector folks, how do you collect Quickbooks Desktop data?
Avatar
Avatar
ThePM.01
Spoke with our Nuix representative last week and they dropped the bomb that Workstation won’t be available as a standalone product anymore. Will be replace with a different infrastructure named Nuix NEO. With the anticipated price increase that this change will bring, we are looking into moving away from Nuix. Are there other data processing tools out there that allow some type of automation as well as the possibility of outputting data in Load File format to our eDiscovery platform?
SameTatsumaki 8/28/2023 6:40 PM
I'm in the same boat and need to at least find another tool to compare to before moving ahead with renewal; one that is more than the built-in black box processing from the various eDiscovery platforms. I'm curious if you landed on anything and happy to discuss.
Avatar
Avatar
SameTatsumaki
I'm in the same boat and need to at least find another tool to compare to before moving ahead with renewal; one that is more than the built-in black box processing from the various eDiscovery platforms. I'm curious if you landed on anything and happy to discuss.
We are not satisfied with our current eDiscovery platform, so we definitely don’t rely on that. We started looking at Axiom Cyber and the Automate software, but it’s not as flexible as Nuix. Closest to Nuix we have at the moment is Intella, but again it’s kind of a pale version of Nuix with less features, scripting, searching capabilities. So no definite answer for now. But would be happy to discuss also.
Avatar
Avatar
Joey Juarez
Ask away about Monolith I can answer them
I have a question. I can see that Monolith has tasks within a case and also notes within a case. But is it possible to take notes within a task? For example a task being acquiring a drive, processing some data, converting some files or whatever. Our current homemade case manager operates a lot like a helpdesk ticketing system and we like that, but we are having trouble finding this type of structure in a case management software.
Avatar
Avatar
secluding
Private sector folks, how do you collect Quickbooks Desktop data?
I don't have the answer for you other than to say I've had a copy of quickbooks kicking around in my office for years waiting to find the person that uses the software... I've heard it's a proprietary format but never had the "pleasure".
9:12 PM
Tagging along to see what folks have to offer though, I'm sure there has to be an open source alternative
Avatar
Avatar
Ross Donnelly
Could there be any changes to the frequencies the cells in the area are broadcasting on?
I don't think so, because we have another faraday cage that works
12:30 AM
it's just this one in particular
Avatar
Does anyone have any tricks to recover a frozen physical analyzer session? My go-to is patience but at a certain point it just isn't going to recover that way... I've had it work a few times trying to shut it down and then canceling the shutdown when it prompts to save a session. Looking for other tips if anyone has them.
Avatar
Avatar
whee30
Does anyone have any tricks to recover a frozen physical analyzer session? My go-to is patience but at a certain point it just isn't going to recover that way... I've had it work a few times trying to shut it down and then canceling the shutdown when it prompts to save a session. Looking for other tips if anyone has them.
Digitalferret 8/29/2023 1:50 PM
might be a 'senior moment' but what exactly is the physical analyzer?
Avatar
Cellebrite PA
👍🏻 1
Avatar
Avatar
whee30
Cellebrite PA
Digitalferret 8/29/2023 2:03 PM
i'd go right ahead and ping @Cellebrite 🙂 ^^
Avatar
I've bumped into an issue when I use mitmproxy CA from mitm.it and Inset into the android store in ADB, the app denies the fake CA obviously the security being in place. Not so sure what exactly security term is for this
2:34 PM
However, can the magisk plugin bypass this and help create fake CA certs
Avatar
DeeFIR 🇦🇺 8/29/2023 4:43 PM
@$CozyBear are you referring to cert pinning?
Avatar
@Cellebrite Good morning, can someone tell me how to add in my Physical Analyzer report, the original path of a video file? I can see it in PA in General File Info but I couldn't find a way to add it in report.
Avatar
Avatar
DeeFIR 🇦🇺
@$CozyBear are you referring to cert pinning?
Not cert pinning within apps but the root store that you find settings which denies the mitmproxy CA from being imported into the root store of the android phone (edited)
Avatar
Avatar
whee30
Does anyone have any tricks to recover a frozen physical analyzer session? My go-to is patience but at a certain point it just isn't going to recover that way... I've had it work a few times trying to shut it down and then canceling the shutdown when it prompts to save a session. Looking for other tips if anyone has them.
hover over the floating window in the taskbar then attempt to close with the x in the top right of the floating window - should force the popup that asks you if you want to close or not and can sometimes save the session (edited)
Avatar
Has anyone looked into installation date for applications that has been restored from a backup on an iPhone? I'm looking into 3 specific applications and I can see that the application folders are created on the same date as the phone gets restored. But when looking at the artifacts for installed applications it presents a installation timestamp that's 2 months after the phone gets restored. I haven't found anything that suggests that the applications have been deleted in between the dates from the reset and the applications installation timestamp. Anyone encountered anything like this before? Or have any suggestions where to find more information?
Avatar
Google Warrants. Helping an agency on a case where the suspect wiped their Android, so all the agency has is the IMEI and MSISDN of phone, but not the associated GMAIL account to send a Search Warrant to Google. One of our detectives said that using IMEI and MSISDN and submitting this to Google in a search warrant worked years ago, but more recent attempts google has said they can't search that way. Has anyone had an issue like this and was succesful? Did you first have to send a SW to google looking for subscriber info using the IMEI and MSISDN, then send a follow up warrant once they gave you the associated GMAIL accounts? Any recent insight / knowledge appreciated. Thanks. [If it makes a difference, this is for an agency in California]
Avatar
The FBI and the Justice Department announced a multinational operation to disrupt and dismantle the malware and botnet known as Qakbot.
🔥 1
Avatar
Avatar
Grok
Google Warrants. Helping an agency on a case where the suspect wiped their Android, so all the agency has is the IMEI and MSISDN of phone, but not the associated GMAIL account to send a Search Warrant to Google. One of our detectives said that using IMEI and MSISDN and submitting this to Google in a search warrant worked years ago, but more recent attempts google has said they can't search that way. Has anyone had an issue like this and was succesful? Did you first have to send a SW to google looking for subscriber info using the IMEI and MSISDN, then send a follow up warrant once they gave you the associated GMAIL accounts? Any recent insight / knowledge appreciated. Thanks. [If it makes a difference, this is for an agency in California]
Andrew Rathbun 8/30/2023 10:35 AM
@Law Enforcement [USA] created a thread above, if you don't mind using that to respond. Might help keep things more organized for this question
Avatar
I have a Samsung S8 (SM-G950F) which will not connect to any forensic software. I have full access, usb debug is on, the port is clean. I have changed the port, changed the usb cable, revoked debugging but all it does when it connects is have the error USB not recognised. It can’t be drivers because a different S8 connects with no issues. All the phone does is charge and that’s it. I never get the USB debug prompt because it never gets that far, any suggestions would be gratefully received! (edited)
12:05 PM
I have also tried Decrypting Boot Loader in UFED with no success. Trevor doesn’t see it, neither does GK or Oxygen, get the picture? 😆
Avatar
Can someone please explain the zhandle table in a call history database of an iPhone? I have a device we're attempting to prove the user deleted all call data prior to handing the device over. There are no calls in the zcallrecords table, but over 10,000 in the zhandle table. Also can someone please define the z_ent, z_opt, and ztype headings (found in zhandle). Thank you for any help you can offer!
Avatar
Avatar
Zhaan
I have a Samsung S8 (SM-G950F) which will not connect to any forensic software. I have full access, usb debug is on, the port is clean. I have changed the port, changed the usb cable, revoked debugging but all it does when it connects is have the error USB not recognised. It can’t be drivers because a different S8 connects with no issues. All the phone does is charge and that’s it. I never get the USB debug prompt because it never gets that far, any suggestions would be gratefully received! (edited)
does it charge correctly, or at ~0.5A only?
12:49 PM
no MDM apps installed?
Avatar
Avatar
Zhaan
I have a Samsung S8 (SM-G950F) which will not connect to any forensic software. I have full access, usb debug is on, the port is clean. I have changed the port, changed the usb cable, revoked debugging but all it does when it connects is have the error USB not recognised. It can’t be drivers because a different S8 connects with no issues. All the phone does is charge and that’s it. I never get the USB debug prompt because it never gets that far, any suggestions would be gratefully received! (edited)
Sounds like it's the Data portion of that connection that's bad. Wonder if perhaps some of the pins on the charging port are oxidized / missing, but the power ones still there. Might consider doing a manual extraction first (with video) and then seeing if you can repair the charging port and hopefully that will fix the data access issue.
Avatar
Avatar
Zhaan
I have a Samsung S8 (SM-G950F) which will not connect to any forensic software. I have full access, usb debug is on, the port is clean. I have changed the port, changed the usb cable, revoked debugging but all it does when it connects is have the error USB not recognised. It can’t be drivers because a different S8 connects with no issues. All the phone does is charge and that’s it. I never get the USB debug prompt because it never gets that far, any suggestions would be gratefully received! (edited)
Before what I said above though, I have had some phones where it keeps changing the USB connection to "Charge Only" instead of "Transfer Files/MTP" options. So make sure that's not what's happening first. If so, might be something on the device like an app trying to prevent access.
Avatar
Avatar
Steve
Can someone please explain the zhandle table in a call history database of an iPhone? I have a device we're attempting to prove the user deleted all call data prior to handing the device over. There are no calls in the zcallrecords table, but over 10,000 in the zhandle table. Also can someone please define the z_ent, z_opt, and ztype headings (found in zhandle). Thank you for any help you can offer!
Andrew Rathbun 8/30/2023 12:52 PM
Definitely ask #mobile-forensic-decoding
Avatar
Thank you!
Avatar
Avatar
Arcain
does it charge correctly, or at ~0.5A only?
Yes it does, 0.99 and wireless charges no issue
Avatar
no fast charge?
Avatar
Avatar
Grok
Sounds like it's the Data portion of that connection that's bad. Wonder if perhaps some of the pins on the charging port are oxidized / missing, but the power ones still there. Might consider doing a manual extraction first (with video) and then seeing if you can repair the charging port and hopefully that will fix the data access issue.
I replaced the port with one that was working on another S8
Avatar
Avatar
Grok
Before what I said above though, I have had some phones where it keeps changing the USB connection to "Charge Only" instead of "Transfer Files/MTP" options. So make sure that's not what's happening first. If so, might be something on the device like an app trying to prevent access.
Tried switching to data but just keeps detecting as USB not recognised
Avatar
Avatar
Arcain
no fast charge?
Yeah, fast charge kicks in
Avatar
Avatar
Grok
Before what I said above though, I have had some phones where it keeps changing the USB connection to "Charge Only" instead of "Transfer Files/MTP" options. So make sure that's not what's happening first. If so, might be something on the device like an app trying to prevent access.
Not that many apps and certainly no security or monitor apps
Avatar
if fast charge works, usb data should work as well. I assume you get unknown device in download mode as well?
Avatar
Avatar
Arcain
if fast charge works, usb data should work as well. I assume you get unknown device in download mode as well?
Yes, SPL is 2020 to so it ain’t as if it’s to recent either
1:34 PM
It’s not the main phone so it could be why the owner bought a new one but that doesn’t help
Avatar
if it's detected in download, then usb is fine
1:38 PM
one thing that comes to mind, if it's detected in download, to try Passware
1:38 PM
and bootrom mode
1:40 PM
testpoint is fairly problematic, as it's next to the UFS, under the metal emi shield (edited)
1:44 PM
although this is one easier and should work as well, if exists on your board (edited)
Avatar
Avatar
Arcain
one thing that comes to mind, if it's detected in download, to try Passware
It isn’t detected in download
2:44 PM
It’s detected as USB not recognised
2:45 PM
Which kind of isn’t 😆
Avatar
Avatar
Zhaan
It isn’t detected in download
Can you board swap?
Avatar
Hi everyone, I'm in the process of doing a full rework of my resume and I was just wondering about something: Would it safe to put in my summary something like experienced forensic analyst (got my GCFA) even though my current role is actually a SOC analyst. The thing is, I work with DFIR principles on a daily basis, minus the memory analysis.. just a bit confused.. (edited)
Avatar
Avatar
Rob
Can you board swap?
I am doing that tomorrow, I’ve swapped the daughter board with the connector on which didn’t change anything so will put the main board in a different phone tomorrow
👍 1
Avatar
Avatar
Zhaan
I am doing that tomorrow, I’ve swapped the daughter board with the connector on which didn’t change anything so will put the main board in a different phone tomorrow
Board swapped, no change at all, very odd. (edited)
Avatar
Avatar
Zhaan
Board swapped, no change at all, very odd. (edited)
check and replace those 2 diodes
1:17 AM
they were often a problem in s7 series, although this should also break fast charging over usb
Avatar
Avatar
Arcain
check and replace those 2 diodes
Ahh, will do, just dumping via BT 😢
Avatar
Avatar
Arcain
check and replace those 2 diodes
Thanks for that
Avatar
Avatar
Zhaan
Ahh, will do, just dumping via BT 😢
see you next week 😉
👴 1
Avatar
Avatar
Arcain
see you next week 😉
I forgot how painful it is, if anyone ever said life was better in the old days I will beat them with a UFED Touch.
😂 2
1:24 AM
DISCLAIMER I would not beat anyone unless in self defence.
Avatar
Avatar
Arcain
see you next week 😉
Not so bad, 466 pictures estimated to take 1 hour and 25 minutes!
Avatar
Avatar
Zhaan
I forgot how painful it is, if anyone ever said life was better in the old days I will beat them with a UFED Touch.
Wonder what's more reliable, a UFED Touch or a Nokia 3310 (edited)
Avatar
Avatar
Rob
Wonder what's more reliable, a UFED Touch or a Nokia 3310 (edited)
3310 day and night, flush it, rage quit it, it is the cockroach of the phone world
🤣 1
2:35 AM
I tell you now, when the sirens go, thats what I am taking into my bunker with Trevor.
😂 2
Avatar
Nikita Khrushchev 8/31/2023 7:08 AM
hi
👋🏻 1
Avatar
Avatar
Zhaan
DISCLAIMER I would not beat anyone unless in self defence.
isnt beating by definition not self defense, because beating kind of implies that the other side is losing. Also what is self defense like in the UK?
🤔 1
Avatar
Anyone with recent/direct experience getting a preservation letter equivalent served to Mega in New Zealand?
Avatar
Avatar
Zhaan
I forgot how painful it is, if anyone ever said life was better in the old days I will beat them with a UFED Touch.
Ross Donnelly 8/31/2023 10:09 AM
Bring back Infrared acquisitions!
Avatar
Avatar
Ross Donnelly
Bring back Infrared acquisitions!
Now you’re talking!
Avatar
Avatar
theintern
isnt beating by definition not self defense, because beating kind of implies that the other side is losing. Also what is self defense like in the UK?
Digitalferret 8/31/2023 10:14 AM
like beating a carp;et, you mean? 🙂
😆 1
10:14 AM
or an egg
Avatar
or some meat
Avatar
Digitalferret 8/31/2023 10:25 AM
behave, lol
😂 3
Avatar
spiffyspiffington 8/31/2023 10:41 AM
Not strictly dfir but probably the best place to ask. Is there any software to block failed attempts to port connections, like fail2ban but not just for ssh? Or can fail2ban do this? After something lightweight as apposed to a full ips
Avatar
firewall normally does that
11:08 AM
normally if the port is not open or being routed through nat it will drop the connection
11:08 AM
open meaning a service is running on it
11:10 AM
so i guess what im saying is, ufw
Avatar
fail2ban can be configured to support various services, as long as it's logged somewhere
Avatar
I'm trying to block IP addresses with fail2ban and ufw with the following configuration and the default ufw.conf in /etc/fail2ban/action.d. Jail config [app-custom] enabled = true maxretry = 1
Avatar
Anyone from @SUMURI available to help troubleshoot a ReconLab install??
Avatar
Chris-SUMURI 8/31/2023 11:43 AM
@MeGaBiTe sure thing, I’ll shoot you a dm and we can get your issue resolved
👍 1
Avatar
kartoffel4n6 8/31/2023 11:49 AM
Anyone know how many agents you can deploy with your axiom cyber license? Can it handle 2k endpoints?
📬 1
Avatar
hi, anyone to provide a reliable way to determine processes behind SMB connections ? https://xkln.net/blog/determining-which-process-is-making-smb-requests-on-windows/ this seams not to work
How would you go about finding what process was making SMB requests on a Windows PC? If you’re like me you probably answered either or PowerShell’s . These are…
Avatar
Avatar
kartoffel4n6
Anyone know how many agents you can deploy with your axiom cyber license? Can it handle 2k endpoints?
@Magnet Forensics
Avatar
spiffyspiffington 8/31/2023 12:44 PM
Thankyou I'll have a play about
Avatar
@Law Enforcement [USA] Best options for a burner phone/sim? What option have you found works best for limited use phones, such as receiving verification texts for accounts etc.?
Avatar
Avatar
MeGaBiTe
@Law Enforcement [USA] Best options for a burner phone/sim? What option have you found works best for limited use phones, such as receiving verification texts for accounts etc.?
$40 phone from a dollar general type store. Any basic android device works out just fine. Have dept petty cash in hand and buy a sim. Good to go and have been many times using it. Bought with cash. Used with a VPN account bought with crypto if needing internet. I’ve also ported over a previously contracted number like an actual AT&T number to Google voice and it works great. Many providers think it’s still AT&T and haven’t had to pay for a long time. (edited)
👀 1
Avatar
Avatar
MeGaBiTe
@Law Enforcement [USA] Best options for a burner phone/sim? What option have you found works best for limited use phones, such as receiving verification texts for accounts etc.?
Purchase trial sim with Mint Mobile. Can get it from Best Buy for a buck or so.
Avatar
Pizzantelope 9/1/2023 9:52 AM
Google voice?
Avatar
Deleted User 9/1/2023 9:52 AM
@MeGaBiTe I usually go to Walmart and for 100 bucks walk out with a phone and a month of service with an Android device
Avatar
Avatar
Pizzantelope
Google voice?
Google Voice gives you one number for all your phones, voicemail as easy as email, no charge US long distance, low rates on international calls, and many calling features like transcripts, call blocking, call screening, conference calling, SMS, and more.
💯 1
Avatar
+1 for Google Voice 95% of the time, but I have seen where some companies won't allow 2-factor on VoIP numbers. (edited)
Avatar
Avatar
sudochaos
Purchase trial sim with Mint Mobile. Can get it from Best Buy for a buck or so.
I have plenty of these, however looking for a solution where I can keep the number for longer than 7days.
Avatar
Avatar
MeGaBiTe
@Law Enforcement [USA] Best options for a burner phone/sim? What option have you found works best for limited use phones, such as receiving verification texts for accounts etc.?
CyberGhost 9/1/2023 1:34 PM
Google Voice works most of the time, but I have run into more and more services that don't like VoIP accounts. I also use MySudo to create VoIP numbers. Most social media platforms I have been able to use a Google Voice/VoIP number. A work around I have done is opened a Mint Mobile account for a month or two and then I ported that number into Google Voice. This has worked for several months so far, services don't see it as a VoIP number. But I'm almost positive it will eventually stop working.
Avatar
Original message was deleted or could not be loaded.
CyberGhost 9/1/2023 1:36 PM
This service seems almost too good to be true lol. Very curious where they get their numbers from if they are not detected as VoIP. They must not be getting them from the big names like Bandwidth or Twilio
Avatar
Avatar
MeGaBiTe
@Law Enforcement [USA] Best options for a burner phone/sim? What option have you found works best for limited use phones, such as receiving verification texts for accounts etc.?
Forensicator 9/1/2023 2:24 PM
Straight talk wireless phone at walmart
2:24 PM
and bluestacks emulator
2:25 PM
dress homeless when you buy it don't have an ID. They prob won't ask anyway. Wear a covid mask
coolflushed 1
2:26 PM
and a hat
2:26 PM
toss it in a faraday bag and turn it on at a fast food place don't use big chains
2:26 PM
use their wifi to configure it
2:27 PM
turn off and faraday bag it when you leave
2:28 PM
Straight talk you can get a year of service for like $400 that's unlimited
2:34 PM
I get one every year before DEFCON lol
Avatar
digital Bowles 9/1/2023 5:22 PM
So I have learned a new hyper-focus, wardriving. I have been playing around with using the idea to collect information from known areas in my area to help with locate devices of interest in investigations. All that to ask can someone point me to learning resources for this, collection device setup, how to decipher collected data, and how to move forward. Thanks
Avatar
There are "off the shelf" open source solutions, you can use an rpi
5:45 PM
Standalone Wardriving setup with the Raspberry Pi using Kali Linux and Kismet on a Oled screen.
Avatar
CyberGhost 9/1/2023 8:13 PM
Kismet will log data into a CSV file. Most cell phones now days use a randomized MAC address when connecting to access points to make them difficult to track. https://www.kismetwireless.net/docs/readme/configuring/wardrive/
The wardriving mode configuration overlay (and code to support it) was added to Kismet in 2022-01-git and subsequent releases. Wardriving mode # Kismet is already equipped for what most would consider to be wardriving out of the box: With a GPS and one (or more) Wi-Fi cards, Kismet will generate logs suitable for uploading to Wigle or generating...
❤️ 3
Avatar
Avatar
CyberGhost
Kismet will log data into a CSV file. Most cell phones now days use a randomized MAC address when connecting to access points to make them difficult to track. https://www.kismetwireless.net/docs/readme/configuring/wardrive/
yep it'll use a new randomized MAC for each SSID, but it'll keep a consistent for that SSID. Devices will scream into the void for any SSIDs they've previously connected to periodically to try to get a connection as well.
Avatar
If you've not played with his project...well, makes some time as it's pretty neat and useful. https://pwnagotchi.ai/
Avatar
blackleitus 9/3/2023 12:29 PM
not sure if I can ask this , but here we go. Which solution can you use to build from the ground a custom Kali Linux machine or an offensive machine that you can overwrite config files, and install toolkit at runtime like docker in a programmatic way or firebase?
Avatar
Avatar
blackleitus
not sure if I can ask this , but here we go. Which solution can you use to build from the ground a custom Kali Linux machine or an offensive machine that you can overwrite config files, and install toolkit at runtime like docker in a programmatic way or firebase?
You could create your own custom Kali ISO
2:37 PM
An alternative would be to write a bash script to auto-install your tools like Docker automatically
Avatar
blackleitus 9/3/2023 5:01 PM
exactly , but the another problem would to output format like ova , vmdk to send to someone to deploy the machine
Avatar
Just do it and them send them the image once you set it uo
Avatar
blackleitus 9/3/2023 7:36 PM
is there a possibility to just send 5MB file config files and depoy themself? like docker
Avatar
I mean yeah, just make a docker image and tell them what its called
Avatar
Can anyone recommend me a list of forensic tools use for disk forensic and file craving. Thanks
Avatar
Avatar
Heisenberg
Can anyone recommend me a list of forensic tools use for disk forensic and file craving. Thanks
DeeFIR 🇦🇺 9/4/2023 2:19 AM
There is an absolute wealth of knowledge, pinned posts, DFIR community room posts, and other links which have recently been posted if you want to have a look around.
Avatar
Heisenberg 9/4/2023 2:20 AM
Thanks. Ill look into it (edited)
Avatar
hiddenbook46 9/4/2023 5:14 AM
Hello, just got my GFACT, Would be a good idea to jump to the GCFA directly or do the Windows one first for Forensic?
Avatar
Avatar
hiddenbook46
Hello, just got my GFACT, Would be a good idea to jump to the GCFA directly or do the Windows one first for Forensic?
randomaccess 9/4/2023 5:15 AM
How did you find the GFACT
Avatar
hiddenbook46 9/4/2023 5:16 AM
It was good indeed I learned more there than in 3 years at the university. Honestly
Avatar
Avatar
hiddenbook46
It was good indeed I learned more there than in 3 years at the university. Honestly
randomaccess 9/4/2023 5:16 AM
Did you find it difficult or just new?
Avatar
hiddenbook46 9/4/2023 5:19 AM
There were a few new topics for me, indeed but it was okay. Indexing it helped me a lot as well. I enjoyed two section for response and forensic
5:20 AM
But not much stuff indeed
5:22 AM
Would be a big jump for your experience ?
Avatar
randomaccess 9/4/2023 5:38 AM
I haven't done the 275 class. But I think going to that without any understanding of windows forensics is a big jump
5:39 AM
I know that a lot of people read gcfa on job requirements and want to skip there....but there's a lot of knowledge that is assumed or required to get the most out of that class
Avatar
hiddenbook46 9/4/2023 5:39 AM
275 explain also Linux and windows file system.
5:40 AM
Maybe for500 is the best solution before I get the 508
5:42 AM
Anyway I know something about jt. Gonna see then thank you
Avatar
randomaccess 9/4/2023 5:43 AM
Yep. Suggest you take a look at the course descriptions for 308-498-500
Avatar
Avatar
hiddenbook46
Hello, just got my GFACT, Would be a good idea to jump to the GCFA directly or do the Windows one first for Forensic?
I took the GCFA as my first cerification, had only been working as an analyst for 1 year roughly. If you build a good index and study there wont be any problems imo. Check this guide out https://tisiphone.net/2015/08/18/giac-testing/ 13cubed has good videos aswell, he also has a certification now which I havent done myself but im sure its great. (edited)
It’s no secret that I’m a fan of SANS and their associated GIAC infosec certifications. Certifications aren’t worth a ton of credibility in the information security arena, but the…
💯 1
Avatar
randomaccess 9/4/2023 6:10 AM
(for the record I don't think you won't pass the gcfa if you go there quickly. I just think that there's a lot of stuff that people miss by going straight to it)
💯 2
Avatar
quick unix question, would you recommend ddrescue or ewfacquire in order to do a physical extraction of a USB flash drive? (edited)
Avatar
Avatar
randomaccess
Yep. Suggest you take a look at the course descriptions for 308-498-500
hiddenbook46 9/4/2023 11:50 AM
I studied the council one for basic forensic stuff, and maybe can be helpful with it( but it is all about theory anyway so I did not enjoy at all. PS: Yes I checked Anyway People saying 508 is a monster one, and Windows one would be a good choice. Thanks anyway for the help (edited)
Avatar
Avatar
isvak
I took the GCFA as my first cerification, had only been working as an analyst for 1 year roughly. If you build a good index and study there wont be any problems imo. Check this guide out https://tisiphone.net/2015/08/18/giac-testing/ 13cubed has good videos aswell, he also has a certification now which I havent done myself but im sure its great. (edited)
hiddenbook46 9/4/2023 11:54 AM
Yes I followed it before, thanks anyway
Avatar
Couple questions... does anyone have any person target templates where you'd include demographics, picture, etc for an ops plan? Also, looking to see what everyone is using to map / link phone tolls?
Avatar
Avatar
emilie_
quick unix question, would you recommend ddrescue or ewfacquire in order to do a physical extraction of a USB flash drive? (edited)
IMHO ddrescue loses some of it's usefulness on flash media. If you want a raw image, use dc3dd. If you need an EWF image then use ewfacquire. And you can always export and EWF image to raw later if that's what you want. Depends on your goals/needs.
👍 2
Avatar
Anyone have a contact for someone at Maltego, looking to ask some questions to see if their product would work for my use case.
Avatar
James Pedersen 9/4/2023 11:00 PM
Can someone please be so kind as to post a link to a publicly accessible web page which lists the data retention periods, broken down by data type (such as calls, SMS, internet history, voicemail, email, etc. ) , of the major US internet service and telecommunications providers?
Avatar
Avatar
5cary
IMHO ddrescue loses some of it's usefulness on flash media. If you want a raw image, use dc3dd. If you need an EWF image then use ewfacquire. And you can always export and EWF image to raw later if that's what you want. Depends on your goals/needs.
Thank you for your answer, can you elaborate a bit more on why ddrescue isn't that usefull on flash media ?
Avatar
Heisenberg 9/5/2023 2:29 AM
Quick question in a forensic process. Let's say I have a soft copy of computer OS and I want to know the owner of the desktop computer which the os was installed. aside from these two Evidence Assessment and Evidence Examination. What else do you think I need to add. Thank you (edited)
Avatar
Hi everyone, I have a quick question. I've been task to create a blue team report following a vendor red team engagement. What would be the best approach when it comes to structuring such report? Create a timeline-like or structure with separate sections for each impacted hosts?
Avatar
hi, new to this and would like to ask, while performing red team activities (not talking about phishing simulation capmaings from Proofpoint etc.) how would you send such crafted phishing emails ?
6:55 AM
asking because there's just me in the infosec director in my company but would like to test how well our tooling would defend against phishing scenarios such as html smuggling --> password protected zip --> contains .iso --> that eventually results in a .lnk file opening calc.exe (edited)
Avatar
Avatar
Alex H.
Hi everyone, I have a quick question. I've been task to create a blue team report following a vendor red team engagement. What would be the best approach when it comes to structuring such report? Create a timeline-like or structure with separate sections for each impacted hosts?
This reminded me I lent my comp sec textbook to someone and I should definitely try to get that back... Anyway its been awhile, but some of the things I remember from school (I don't do reports on these) are to start with an executive summary of the important parts, something that "executives" from the company can read, digest, and understand action items quite quickly (the people who need to pay the bills but aren't necessarily comp sec tech savvy). Then dive into a technical summary for the more technically minded people with more specifics on what went well and what didn't go well. Don't forget to say what went well so they can continue to do that. In the technical section, you can probably also give a timeline of events if that seems important, or just focus on the impacted hosts and give a brief high-level summary view of the timeline.
Avatar
Avatar
emilie_
quick unix question, would you recommend ddrescue or ewfacquire in order to do a physical extraction of a USB flash drive? (edited)
ddrescue is a data recovery tool. If the drive is working fine, stick with ewfacquire or dc3dd. Those also include hashing as part of the process, where ddrescue does not.
Avatar
Hello, I'm not very active here in the forum and I have a question regarding data recovery. is it possible to restore a whatsapp history on an iphone? the data was lost because whatsapp was uninstalled. Is there any way to find the data? Thank you
Avatar
Avatar
John
Hello, I'm not very active here in the forum and I have a question regarding data recovery. is it possible to restore a whatsapp history on an iphone? the data was lost because whatsapp was uninstalled. Is there any way to find the data? Thank you
Your best bet is to restore from a backup. Otherwise you would need a forensic extraction to maybe recover whatsapp data. Unless phone is jailbroken you won't be able to load data back into the phone though. Also whatsapp might save your history and put it back on your phone if you install the app again, but be warned if you do that you'll probably erase any app remnants left or it will be hard to determine what data was from what installation.
🙏 1
Avatar
Avatar
emilie_
Thank you for your answer, can you elaborate a bit more on why ddrescue isn't that usefull on flash media ?
It's not that ddrescue isn't useful. It still is, but the features that make it most useful are designed for dealing with errors on spinning media (map files, splitting, etc.). ddrescue was designed to deal in a very specific way when splitting and reducing errors that it encounters. In many cases, "bad reads" on a flash drive are related to EPROM blocks that can't be read. And as much as devices like USB thumb drives try to emulate ATA disks - the failures don't translate well. You could find ddrescue will simply freeze as it waits for the media to respond to read requests. Of course the same is true for other imaging software as well, but ddrescue's strength is in it's recovery options. If you are doing this for actual casework, you should be using something like PC3000 Flash on damaged/bad flash based storage devices. If the media is working fine, then normal imaging software is fine.
Avatar
Anyone know what the command is to remove software write-protection via linux command line? I'm in Paladin and want to mount a device as read/write but I need to do it via terminal because I cannot access Paladin Toolbox. I can try using "mount" but it will only allow read-only. (edited)
Avatar
I don't know if this will help, but could you just use mount option rw?
Avatar
Heisenberg 9/5/2023 9:06 AM
hello is there anyone here using sift work station ubuntu. I was working on looking for the owner of the desktop computer in the disk. What are the command u use oftern to know just details. Thanks
Avatar
Avatar
Cole
Anyone know what the command is to remove software write-protection via linux command line? I'm in Paladin and want to mount a device as read/write but I need to do it via terminal because I cannot access Paladin Toolbox. I can try using "mount" but it will only allow read-only. (edited)
blockdev --setrw /dev/[device]
❤️ 1
Avatar
Avatar
tclahr
blockdev --setrw /dev/[device]
Yes that's it!! Thanks!
Avatar
Does anyone have a recommendation for a tool that can take bulk Lat and Longs, and convert into addresses? I have a csv with lat and longs and wanting to convert these into addresses in bulk. Preferably an open source tool. I appreciate the help in advance
Avatar
Avatar
Mavum1
Does anyone have a recommendation for a tool that can take bulk Lat and Longs, and convert into addresses? I have a csv with lat and longs and wanting to convert these into addresses in bulk. Preferably an open source tool. I appreciate the help in advance
How's your python? This looks like it would be trivial to implement, depending on how precise you want the results. https://pypi.org/project/reverse-geocode/
Reverse geocode the given latitude / longitude
Avatar
@5cary Python I will check this out. Thanks!
Avatar
Any recommended product to create link charts? Ideally I'm looking to visually graph out suspect targets and their relations to vehicles, people, phone numbers, businesses etc...
5:22 PM
I don't have this data in any real usable manner so I will have to manually create every object, and link.
Avatar
Avatar
carook
Any recommended product to create link charts? Ideally I'm looking to visually graph out suspect targets and their relations to vehicles, people, phone numbers, businesses etc...
Andrew Rathbun 9/5/2023 5:22 PM
Try mind map software, maybe? I use XMind to create these, for example: https://github.com/AndrewRathbun/DFIRMindMaps/tree/main/Tools/KAPE/KapeTriage
A repository of DFIR-related Mind Maps geared towards the visual learners! - AndrewRathbun/DFIRMindMaps
Avatar
I'm hoping to find a method to select say a license plate / vehicle entity and see who else is linked to it.
Avatar
Avatar
Andrew Rathbun
Try mind map software, maybe? I use XMind to create these, for example: https://github.com/AndrewRathbun/DFIRMindMaps/tree/main/Tools/KAPE/KapeTriage
Interesting. Does this mind map software allow you to filter by entity to see who / what else is associated with it?
5:24 PM
I wasn't sure if something like Maltego, I2 Analyst Notebook or Datawalk would be ideal. There really isn't anything that is out of budget right now, except I2. (edited)
Avatar
Avatar
carook
Interesting. Does this mind map software allow you to filter by entity to see who / what else is associated with it?
Andrew Rathbun 9/5/2023 5:35 PM
Nah it's not meant to be analytical or anything. Mostly good for visualizing data and that's about it
Avatar
fam, I am invited to speak at an event on the cyber workforce. Please advise me with a heads-up, on topics to discuss. Much appreciated
Avatar
NotIronManBTW 9/5/2023 6:07 PM
Hey all just got my first job in cybersec on a digital forensics team currently I am doing insider threat and edisco. Our lab is ANAB accredited so I have to have either GCFE or CFCE to do forensics work so I am deciding between the two. I work in the private sector currently. Any suggestions?
6:08 PM
Sadly I have to front the money either way then I get reimbursed after 2 paychecks but man that’s gonna hurt to front
Avatar
Avatar
NotIronManBTW
Hey all just got my first job in cybersec on a digital forensics team currently I am doing insider threat and edisco. Our lab is ANAB accredited so I have to have either GCFE or CFCE to do forensics work so I am deciding between the two. I work in the private sector currently. Any suggestions?
Joe Schmoe 9/5/2023 6:55 PM
To me, CFCE is more foundational. It really helps you understand what the tools are doing. It’s a ton of work and takes a long time. GCFE is geared more toward the artifacts. It also takes a lot of work but for me it was much less time than CFCE.
Avatar
NotIronManBTW 9/5/2023 6:56 PM
If I did CFCE they told me I’d be goin down to Orlando for a week or something. My boss and coworker both have that one but we also work with law enforcement a lot and they recommend that.
6:56 PM
Might go with that over sans
6:58 PM
Thanks for the input though @Joe Schmoe
Avatar
Avatar
NotIronManBTW
If I did CFCE they told me I’d be goin down to Orlando for a week or something. My boss and coworker both have that one but we also work with law enforcement a lot and they recommend that.
Joe Schmoe 9/5/2023 7:03 PM
Between the two, I would do the CFCE first. Of the certs I’ve done, that’s the one that felt like an accomplishment when it was done. (edited)
Avatar
Hello everyone! I'm having an annoying bug on my Windows machine : the Temp folder on C: gets filled with thousands of small "tomcat.randomnumbers.8123" files.. I had this problem about one year ago, and I remember it came just after a Ufed PA update. No idea if it's still the case this time, but does anyone know how to fix it? I haven't tried reinstalling PA yet though... (if it's indeed the culprit)
Avatar
Digitalferret 9/6/2023 2:37 AM
@Cellebrite ^
Avatar
NotIronManBTW 9/6/2023 6:51 AM
Welp I’ve decided to take sans GCFE because my work pays upfront for that one and the other one I’d have to pay out of pocket
6:51 AM
Has anyone here taken GCFE?
Avatar
Avatar
NotIronManBTW
Has anyone here taken GCFE?
Andrew Rathbun 9/6/2023 6:51 AM
Many have. Let's move to #training-education-employment for this discussion though
Avatar
NotIronManBTW 9/6/2023 7:09 AM
Apologies will move there
💯 1
Avatar
can anyone help me out. I want to view these file inside recycler folder. What would be the command for that. Thanks
Avatar
Hello everyone! Does anyone know of any research or have any information on the use of electron microscopes such as scanning electron microscopes and atomic force microscopes in the analysis of computer chips/hard drives/other digital information (especially in a digital forensic context)?
👀 1
Avatar
Avatar
Heisenberg
can anyone help me out. I want to view these file inside recycler folder. What would be the command for that. Thanks
List the files in that location. There should be files named Dc{number} along with the file extension, if memory serves me. Those are the deleted files.
Avatar
Avatar
Beercow
List the files in that location. There should be files named Dc{number} along with the file extension, if memory serves me. Those are the deleted files.
Heisenberg 9/6/2023 1:42 PM
yup there 3 DC names
Avatar
New here. I'm sure it's been discussed before, but can anyone point me to information about getting info off a chromebook? From everything I've read you need the username and password.
Avatar
@Magnet Forensics might know a thing or two when it comes to chromebook extraction
Avatar
Avatar
Edgar_55
New here. I'm sure it's been discussed before, but can anyone point me to information about getting info off a chromebook? From everything I've read you need the username and password.
Like Isaac has said, Manet have their own tool - MAGNET Chromebook Acquisition Assistant - which you can acquire from their Magnet idea lab. Alternatively, you could log into the device with the username/password and perform a live examination.
👍 1
Avatar
I don't know if it's possible offline bruteforce a chromebook in case you don't have the password
Avatar
hey! where can i find a clean windows 7 iso ?
Avatar
Avatar
NotIronManBTW
Has anyone here taken GCFE?
Secret Letters 9/7/2023 6:53 AM
twice NE_sadness
Avatar
Avatar
NotIronManBTW
Welp I’ve decided to take sans GCFE because my work pays upfront for that one and the other one I’d have to pay out of pocket
Secret Letters 9/7/2023 6:54 AM
lucky, I paid out of pocket for the course sadge_business
Avatar
NotIronManBTW 9/7/2023 12:39 PM
So I’ve been tasked at work with building a forensics workstation so we don’t have to buy talinos anymore. Do y’all have a good option/ guide on where to look. They gave me minimum specs and I have 10,000 usd to spend on it
Avatar
Avatar
NotIronManBTW
So I’ve been tasked at work with building a forensics workstation so we don’t have to buy talinos anymore. Do y’all have a good option/ guide on where to look. They gave me minimum specs and I have 10,000 usd to spend on it
Digitalferret 9/7/2023 1:11 PM
well <cough> volunteered <cough> 🙂
Salute 1
Avatar
NotIronManBTW 9/7/2023 1:23 PM
Haha I came up with somewhat of a cool one. They want it to look cool too because we do a lot of tours of our lab (like 5 a week). Our current ones are maxed out 2017 talinos
1:23 PM
I do have access to a local microcenter as well
1:26 PM
Keeping it under 10k would be best if possible. Our EVP is comin In Monday and we just wanna show him we can do it below talinos price before we buy it
Avatar
Digitalferret 9/7/2023 1:56 PM
wolf in sheeps clothing. power pack it and house it in the shittiest, but air-iest, tin box you can find, and batter it a few times with a mallet. show how hard working and efficient/economical your Dept is 🙂
1:56 PM
do.not.buy.led.lit.pc's
Avatar
NotIronManBTW 9/7/2023 3:47 PM
Ahh so load it with RGB perfect
3:48 PM
That’s what I was thinking too high ups are gonna love the rgb 😎
Avatar
This is a long shot but I am curious if anyone on the splunk threat research team is on this discord?
Avatar
Original message was deleted or could not be loaded.
keep up to date, use a long password, use lockdown mode
Avatar
I am investigating a potential Gulima malware infection and kind of got confused. What i've got a is a js file but it is wrapped between xml, package, component, script, and cdata - in that order. Obviously, I want to execute this in a controled envornment. Now, do I understand that this kind of file need to be saved with a .wsf exntension before executing it?
8:57 AM
I did something like this <?xml version="1.0"?> <job> <package> <component id="..."> <script language="JScript"> <![CDATA[ // long js here ]]> </script> </component> </package> </job> (edited)
8:58 AM
And upon executing it, nothing happened. nada!
Avatar
Avatar
cmd.exe
I am investigating a potential Gulima malware infection and kind of got confused. What i've got a is a js file but it is wrapped between xml, package, component, script, and cdata - in that order. Obviously, I want to execute this in a controled envornment. Now, do I understand that this kind of file need to be saved with a .wsf exntension before executing it?
Fixed
Avatar
NotIronManBTW 9/8/2023 11:10 AM
You’re correct on the wsf extension
11:12 AM
It could be a lot of things here tbh though. Could be a dependency thing possibly?
11:13 AM
Could also try running as admin to see if it’s a permission thing too
11:13 AM
Debugger will be best bet after that
Avatar
Avatar
cmd.exe
Fixed
NotIronManBTW 9/8/2023 11:14 AM
Nvm just read this lol. What ended up bein issue?
Avatar
Avatar
NotIronManBTW
Nvm just read this lol. What ended up bein issue?
Turns out it was checking a specific software and it would exit if the software was missing. So I had done everything correctly except I was not paying attention 😂
Avatar
kmacdonald1565 9/8/2023 12:49 PM
i have a weird question, that i like to preface with an introductory message, like this....how many of your phones do you have to clean out to get a good connection? we have an oddly high number that need to be cleaned out in my area. also what are you using? tweezers from small electronic tool kits work well for iPhones for me, but anything USB-C is a tight fit
Avatar
Avatar
kmacdonald1565
i have a weird question, that i like to preface with an introductory message, like this....how many of your phones do you have to clean out to get a good connection? we have an oddly high number that need to be cleaned out in my area. also what are you using? tweezers from small electronic tool kits work well for iPhones for me, but anything USB-C is a tight fit
I use dental tools for cleaning out ports.
12:56 PM
Plaque Remover for Teeth, Professional Dental Hygiene Cleaning Kit, Stainless Steel Tooth Scraper Plaque Tartar Cleaner, Dental Pick Scaler Oral Care Tools Set - with Case
12:57 PM
The 2nd and 3rd from the left in the main photo are my goto’s
Avatar
kmacdonald1565 9/8/2023 12:58 PM
that might work, but i worry about USB-C...i couldnt even get a sim card removal tool down one, the dental pic has to be super thin. i have a set for cleaning my weapons (which i wont mix with the electronics) but they all seem too big anyway
12:58 PM
on USB-C i have gunk down the short side of the port, which i can kinda get out, just not fully and my ocd hurts
Avatar
Yeah, the bottom thingy of those two tools that I mentioned are slim and long. I have yet to find a USB-C that they won’t work on.
Avatar
kmacdonald1565 9/8/2023 12:59 PM
i am going to order those and try it though, they are cheap enough
1:00 PM
the ones i use for my rifle is from harbor freight i think
1:00 PM
which are a little bulkier judging by pics
Avatar
Avatar
kmacdonald1565
the ones i use for my rifle is from harbor freight i think
+1 for all non-electrical tools from harbor freight for most things. Just having the right tool for the job is critical, quality isn’t as important if it isn’t used all the time. I might have tried gun cleaning tools, and if I did they weren’t as skinny as the dental tools.
Avatar
kmacdonald1565 9/8/2023 1:04 PM
ill check them out when i get home to see if they might work, but i will probably order what you got
1:05 PM
it is not a gun cleaning tool by default, but work great for a lot of hard to reach areas....believe it or not the texture grip on a couple of the tools is great for carbon build up on my firing pin and stuff like that.
👍 1
1:06 PM
seriously though, thanks for the input...apparently my jurisdiction is a sweaty dirty constituancy
🤣 1
Avatar
Avatar
kmacdonald1565
I have that set... but I wish I'd sprung for the one with the better handles
1:59 PM
hard to really get leverage with them, but I was using them for popping a car side mirror case off
Avatar
Heisenberg 9/8/2023 9:54 PM
hello how should i know in a pcap file the the following question. Thanks Who are the people communicating in the transmission? IP Address right? When does the first transmission begin and the last transmission finish?
Avatar
Checking in on behalf of someone who I've been providing "pro bono" consulting, as they're approaching requests that's now out of my wheelhouse, but I'd try to do some due diligence in checking my communities (before searching online): Are there any commercial (non-LEO) digital forensic firm reps here that are able to handle iOS/MacOS forensics? Maybe better if you're around Frankfurt, DE or in some proximity. Also taking UK. (edited)
Avatar
Black and White 9/9/2023 10:28 PM
Does anyone know if Magnet Process Capture has the ability to capture high level (I can't think of a better word) processes like csrss.exe, winlogon.exe, etc?
❤️ 1
10:28 PM
I think kernel level is the word
Avatar
Digitalferret 9/10/2023 2:25 AM
@Magnet Forensics ^
Avatar
Nikita Khrushchev 9/10/2023 6:05 AM
hi guys
6:05 AM
anyone has good criminology servers (edited)
Avatar
Avatar
Jack New
Hi, is there any information about android "data_usage.db" tables and columns?
Hi Jack, did you find any information regarding 'data_usage.db'?
Avatar
ForensicDev 9/11/2023 11:58 AM
Does anyone have insight into best practice on how to collect GitHub repositories with all "revisions"?
Avatar
Avatar
ForensicDev
Does anyone have insight into best practice on how to collect GitHub repositories with all "revisions"?
Andrew Rathbun 9/11/2023 11:59 AM
Fork the repo? Then you can just browse the fork and go back in time to every commit.
Avatar
Avatar
Andrew Rathbun
Fork the repo? Then you can just browse the fork and go back in time to every commit.
ForensicDev 9/11/2023 12:01 PM
Would that allow an "offline" browsing and restoring of versions? Are there any tools that would help ensure the proper git command options are used? Also, would the "fork event" be evident in the source repo?
Avatar
Avatar
ForensicDev
Would that allow an "offline" browsing and restoring of versions? Are there any tools that would help ensure the proper git command options are used? Also, would the "fork event" be evident in the source repo?
simply put, you can git clone <path to repo>, move the whole folder (.git files and all) to an offline box that has git installed. you can then "check out" branches that might exist in the repo & review the data within. here's a good starter for using the basic commands for comparison: https://blog.jpalardy.com/posts/git-how-to-find-modified-files-on-a-branch/
Avatar
Avatar
ForensicDev
Would that allow an "offline" browsing and restoring of versions? Are there any tools that would help ensure the proper git command options are used? Also, would the "fork event" be evident in the source repo?
Andrew Rathbun 9/11/2023 12:14 PM
Yes when you fork a repo, it'll increment the number of forks and the owner will be able to see who forked it. Like @babybat said, you can clone the repo and and browse the history that way, too
12:14 PM
could also try GitHub Desktop if you want a GUI, maybe. Download the repo, then point GitHub Desktop to an existing repo, then click on the History tab and you can see all the commits that way
Avatar
ForensicDev 9/11/2023 12:21 PM
Thanks. So "git clone" would be considered the most "forensically sound" / "read-only" approach to capturing a GitHub repo and all its historic data?
Avatar
yep, by default that's how you're gonna get every version / branch / etc. optional flags will simply decrease the amount of data you pull
👍 2
Avatar
Avatar
Heisenberg
hello how should i know in a pcap file the the following question. Thanks Who are the people communicating in the transmission? IP Address right? When does the first transmission begin and the last transmission finish?
That looks like a homework question 🙋🏻‍♂️
Avatar
Avatar
ryd3v
That looks like a homework question 🙋🏻‍♂️
project, we were given a pcap file to investigate and allow ask someone to help us through (edited)
Avatar
You can make some tools to automate the info for you or manually review the pcap 😃
Avatar
NotIronManBTW 9/11/2023 4:48 PM
any of yall got any good resources for some at home labs for practice with dfir? moving into IR soon and pretty nervous for it. been doin DF for a bit
Avatar
Avatar
NotIronManBTW
any of yall got any good resources for some at home labs for practice with dfir? moving into IR soon and pretty nervous for it. been doin DF for a bit
Andrew Rathbun 9/11/2023 6:49 PM
The goal of this repo is to archive artifacts from all versions of various OS&#39;s and categorizing them by type. This will help with artifact validation processes as well as increase access t...
Avatar
@Cellebrite Is there any functionality to see where a licence key was last used if that device was connected to the internet?
Avatar
Hello guys- looking for some advice and guidance on how to analyse a couple of loose emails to determine if they have been tampered and analysing their metadata. Any particular tools or guidance will really be helpful
6:07 AM
More reason to get those downloads done vs letting them wait in a queue…
6:07 AM
Anyone test this yet?
Avatar
Avatar
Will-ko
@Cellebrite Is there any functionality to see where a licence key was last used if that device was connected to the internet?
What are you trying to accomplish.. feel free to dm me if you want
Avatar
Does anyone know of a third party software that can screen record android devices that don't have the capability of screen recording. Preferably something that doesn't require the device to connect to network or download an app
Avatar
Avatar
CLB-Paul
What are you trying to accomplish.. feel free to dm me if you want
Thanks for the reply. Someone from within the office had taken one of the licence keys and it could not be located. I’ve since found it, but at the time was trying to see if there was any reference to find where a licence had last been used in the hope to identify a device name or something.
📬 1
Avatar
Avatar
whee30
Anyone test this yet?
kmacdonald1565 9/12/2023 7:04 AM
they wouldnt believe that web history for me. they all know better
Avatar
Avatar
ZlatanX
Hello guys- looking for some advice and guidance on how to analyse a couple of loose emails to determine if they have been tampered and analysing their metadata. Any particular tools or guidance will really be helpful
Andrew Rathbun 9/12/2023 7:05 AM
7:06 AM
In terms of tampering, like someone provided you loose emails and you're wondering if they changed the contents of the email before passing it along to you? I suppose you could check $J from the system it came from, if it exists, and see if there's any DataExtend or DataTruncate events for the individual email file(s). Also, any LNK files indicating they opened those emails prior to providing them to you?
Avatar
Avatar
Gooner
Does anyone know of a third party software that can screen record android devices that don't have the capability of screen recording. Preferably something that doesn't require the device to connect to network or download an app
Digitalferret 9/12/2023 7:08 AM
maybe offboard the recording by mirroring the screen, ie bluetooth pairing, to another device and record from there?
Avatar
Avatar
Digitalferret
maybe offboard the recording by mirroring the screen, ie bluetooth pairing, to another device and record from there?
Yeah that was an idea but the problem is that doesn't really work with phones that don't have their own screen recording capabilities :/
7:11 AM
It's a pain the ass cause I am struggling to find anything
Avatar
Avatar
Gooner
It's a pain the ass cause I am struggling to find anything
Digitalferret 9/12/2023 7:12 AM
you could go real McGyver and set up a camera to watch the screen?
Avatar
Avatar
kmacdonald1565
they wouldnt believe that web history for me. they all know better
I’m downloading the app when I get into the office today, sucks that it’ll take two weeks before it does anything cool but might as well start now
Avatar
Digitalferret 9/12/2023 7:13 AM
i checked Epiphan which I've used before for oddball stuff, but they don't do phones, likely bc there's no GFX output port
Avatar
Avatar
Digitalferret
you could go real McGyver and set up a camera to watch the screen?
Thats what we're tryna move away from to something that looks better and more clean
Avatar
Avatar
Gooner
Thats what we're tryna move away from to something that looks better and more clean
Digitalferret 9/12/2023 7:18 AM
yeh, understood. for me, i'd probably get a copy stand, good qual camera and possibly adjustable shutter speed, bc screen flicker, and place the phone underneath it whilst operating. it makes a huge difference having everything still, framed and well lit (screen brightness not spotlights)
7:20 AM
my setup is just for still pictures / books, docs that don't scan too well, circuit boards, hard drive parts and more. i should try a phone sometime to show results
7:22 AM
and bluetack / sticky<something> to hold bits steady
Avatar
Avatar
Andrew Rathbun
In terms of tampering, like someone provided you loose emails and you're wondering if they changed the contents of the email before passing it along to you? I suppose you could check $J from the system it came from, if it exists, and see if there's any DataExtend or DataTruncate events for the individual email file(s). Also, any LNK files indicating they opened those emails prior to providing them to you?
Thanks @Andrew Rathbun for the advice
Avatar
Avatar
ZlatanX
Thanks @Andrew Rathbun for the advice
Digitalferret 9/12/2023 7:53 AM
maybe also check other emails for same/similar content & keywords. we caught some guys, having found they received a particular email from a guy, they re-edited to suit their own needs before re-printing and presenting in court, as (patently false) evidence later. (edited)
Avatar
Avatar
whee30
I’m downloading the app when I get into the office today, sucks that it’ll take two weeks before it does anything cool but might as well start now
Let us know how it turns out!
Avatar
Updating my test phone now, I’ll do some browsing today and grab a download then stick it on power for a couple weeks
👍 1
Salute 1
Avatar
Borderbingo 9/12/2023 10:40 AM
@Cellebrite does PA support the new version What’sapp on a advance logical on a iOS?
📬 1
Avatar
Hi, someone of @Passware Support for questions please ?
Avatar
anyone know for Recon ITR?
12:44 AM
Is there anyone who knows why the MD5 and SHA-1 hashes within the log files created alongside the image file differ when verified?
Avatar
Avatar
Gooner
Does anyone know of a third party software that can screen record android devices that don't have the capability of screen recording. Preferably something that doesn't require the device to connect to network or download an app
Dr. Kaan Gündüz 9/13/2023 2:46 AM
hi, perhaps an x to hdmi cable and an hdmi capture card could work
2:46 AM
like we do with most dvrs
2:47 AM
if the device supports hdmi output
Avatar
Avatar
AnTaL
Hi, someone of @Passware Support for questions please ?
Passware Support 9/13/2023 3:13 AM
Sure, DM me
Avatar
Hi guys anyone has any idea how to get my Windows to display the Korean characters which are part of the filename? Right now it is all showing some weird characters
Avatar
Avatar
ZlatanX
Hi guys anyone has any idea how to get my Windows to display the Korean characters which are part of the filename? Right now it is all showing some weird characters
Digitalferret 9/13/2023 3:37 AM
Avatar
Thanks @Digitalferret ! Will check it out.
👍🏻 1
Avatar
Avatar
Dr. Kaan Gündüz
hi, perhaps an x to hdmi cable and an hdmi capture card could work
Yeah that stuff works for devices that have screen recording capabilities but not for ones that dont
Avatar
heatherDFIR 9/13/2023 6:26 AM
HI everyone. The Cellebrite CTF is getting ready to launch next week. You can acces datasets and prepare starting today. Please join the cellebrite-ctf channel. https://cellebrite.com/en/cellebrite-capture-the-flag-september-2023/
👍 4
cellebrite 4
👀 1
Avatar
digital Bowles 9/13/2023 11:38 AM
Is everyone from @Cellebrite available for a dm question.
📬 1
Avatar
as a UK univeristy student I have send off a project to a industry contact who I sent projects to before they tend to respond within a few days but on this occasion its been over a week I want to send them a message to check on the progress with things(I assume their just busy) but don't want to appear rude or self-important we are not under any form of contract or obelgation, they merely took a interest in some of my questions which lead to our repeated corespondent any advice?
Avatar
Avatar
Toast()
as a UK univeristy student I have send off a project to a industry contact who I sent projects to before they tend to respond within a few days but on this occasion its been over a week I want to send them a message to check on the progress with things(I assume their just busy) but don't want to appear rude or self-important we are not under any form of contract or obelgation, they merely took a interest in some of my questions which lead to our repeated corespondent any advice?
Give them a call, and tell them exactly what you are saying here 🙂 You got this! (edited)
Avatar
Avatar
Toast()
as a UK univeristy student I have send off a project to a industry contact who I sent projects to before they tend to respond within a few days but on this occasion its been over a week I want to send them a message to check on the progress with things(I assume their just busy) but don't want to appear rude or self-important we are not under any form of contract or obelgation, they merely took a interest in some of my questions which lead to our repeated corespondent any advice?
Digitalferret 9/14/2023 1:41 AM
Fortnights holiday maybe? Give it a few days, and/or pretty much as florus said.^ "Hi <name>, hope all's well there? just mailing to check my last project (posted 7th Sept) landed ok? thanks and kind regards, Toast". It follows a Royal protocol of "Don't complain, don't explain". the date offers detail that they might be able to find it without having to look too hard, and show's you appreciate their time and effort. (edited)
Avatar
@florus @Digitalferret Thank you both will follow that. I like that royal protocol will keep it in mind
Avatar
Daniel Schwarz mh Service 9/14/2023 6:12 AM
Hi DFIR Community Daniel here. We are hosting a two day Forensic Technology Event in South Germany 26. + 27. September. There will be around 15 Software Vendors i.e. Exterro, Griffeye, Opentext, Oxygen, Web-IQ, Passware and many more. We Expect around 200 Visitors from the Digital Forensic Sector and you can have discussions with other practioners or Vendors on challenges and solutions. We still have free Slots and it is completeley free of Charge to come, Food and Drinks are included as well. more information and registration @ https://ft-day.de/en/ Hope to see you soon. please DM me if you have any Questions about the Event.
Salute 1
Avatar
LeatherCouch 9/14/2023 12:53 PM
Hello all, I am wondering if I can get any use out of this information. I have checked the serial number, but am unable to link it to an apple product.
Avatar
Does anyone happen to know a method using Maltego to create essentially a dual arrowed link? I have a boyfriend and girlfriend that I want to link with either a dual arrow or better recommended method... any idea?
Avatar
Avatar
LeatherCouch
Hello all, I am wondering if I can get any use out of this information. I have checked the serial number, but am unable to link it to an apple product.
Ross Donnelly 9/14/2023 1:18 PM
"Apple registration numbers and Apple hardware product serial numbers use the numbers 0 (zero) and 1 (one) instead of the letters “O” or “I”." So the fact that your serial number has an I in it suggests it's not actually the device's serial number. Not that I can rule out an obscure device where Apple doesn't follow its own rules! Source https://support.apple.com/en-gb/HT204308
Find out how to find the serial number of an iPhone, iPad, iPod, HomePod, Mac or other Apple product.
Avatar
Avatar
Ross Donnelly
"Apple registration numbers and Apple hardware product serial numbers use the numbers 0 (zero) and 1 (one) instead of the letters “O” or “I”." So the fact that your serial number has an I in it suggests it's not actually the device's serial number. Not that I can rule out an obscure device where Apple doesn't follow its own rules! Source https://support.apple.com/en-gb/HT204308
LeatherCouch 9/14/2023 2:53 PM
Thank you
Avatar
ForensicDev 9/14/2023 3:49 PM
Does anyone have any recent (within last 2 years) research, blog links or open source projects on gaming console forensics (Xbox / Playstation)? Have several cases involving such devices and want to read up on the challenges and possible forensic artifacts they may contain. Given the fast release cycle of consoles, I find older articles may no longer be valid due to encryption or other structural changes that may have been introduced. Any pointers would be much appreciated.
Avatar
Black and White 9/14/2023 5:45 PM
Are there any command line tools that can generate live kernel dumps?
Avatar
Avatar
Black and White
Are there any command line tools that can generate live kernel dumps?
7:05 PM
It’s really great 👍🏻
Avatar
Hi. Noob question so please don't laugh. Are there any notable differences between let's say Oxygen and Cellebrite? Are there features that one can do and the other can't? I'm trying to understand if I should become proficient with a single tool for upskilling or learn multiple.
Avatar
As a beginner myself, from all of the corporate-grade tools I've used they all generally have similar features. The way these features are presented could be different. For instance, Belkasoft X and Magnet Axiom have alot of overlap, but Belkasoft presents certain features in a more user-friendly way in my opinion. Essentially, the different corporate grade tools are different spins on a unified set of command line tools.
Avatar
Avatar
Buragany
Hi. Noob question so please don't laugh. Are there any notable differences between let's say Oxygen and Cellebrite? Are there features that one can do and the other can't? I'm trying to understand if I should become proficient with a single tool for upskilling or learn multiple.
I'd say that it'd be good to get really good with the tools that you are most likely to use. Also do what I'm doing and also try to get familiar with the command line versions of certain software in/and CAINE.
Avatar
but if I understand correctly and based on my very limited experience, these CLI and FOSS tools are no match for the commercial ones
Avatar
Avatar
Buragany
but if I understand correctly and based on my very limited experience, these CLI and FOSS tools are no match for the commercial ones
In some situations, yes… in other situations, no. It would be naive for a digital forensics practitioner to take the position (and sometimes they do) that all they need to be competent in their work was either open source or commercial tools - especially when dealing with cases requiring maximum exploitation rather than scratch-and-sniff forensics.
🙌 1
Avatar
Avatar
Buragany
but if I understand correctly and based on my very limited experience, these CLI and FOSS tools are no match for the commercial ones
randomaccess 9/15/2023 4:09 AM
Use both commercial and Foss/free tools. Ultimately answer the questions asked. How you get to the answer really doesn't matter. But don't get sucked into thinking that just because you pay for it that it's better or will give you all the answers.
💯 4
Avatar
Avatar
Buragany
but if I understand correctly and based on my very limited experience, these CLI and FOSS tools are no match for the commercial ones
Digitalferret 9/15/2023 5:32 AM
Proprietary paid for often means they do much the same as that which you can do manually at CLI but have a much more user friendly interface and it's all under one hood.
5:33 AM
in an environment that is time / efficiency critical, it's often worth the premium paid. (edited)
5:34 AM
also much like the Windows v Linux airlines joke/meme, it's either all welded shut under the hood, and you trust the Dealership/Mechanic/Airline or "here's a box of spanners" (edited)
5:41 AM
what really counts is that you understand the fundamentals. Recent misapprehensions by newbros is that
  • Paid for >> FOSS
  • Forensic means better system / software /tool than (say) Data Recovery. It doesn't. 'Forensic' means you have to abide by a certain framework of law whether that's digital or organic/biological (wet). Folks should not add the word Forensic or DFIR merely to legitimise or "big up" a skillset / toolset / service,
much like Screenshare / Mincecraft / GTA guys do in order to catch cheats (whilst also snooping about someones PC looking for other "opportunities").
(edited)
5:42 AM
Simply having a powerful set of paid for programs does not bestow upon the user god like trade status, much as having a bag of power tools does not make one a carpenter (edited)
👏 2
Avatar
I was thinking can you use PlayWright to test malicious sites ? (edited)
Avatar
Could anyone point me in the direction of any resources on how to conduct forensics on servers? It'd be greatly appreciated.
Avatar
hi all. Im really interested in DFIR but really stuck on how do I practice skills w/o actually being in the field. is there a channel that I could be pointed to to get me started?
Avatar
Avatar
aots
Could anyone point me in the direction of any resources on how to conduct forensics on servers? It'd be greatly appreciated.
Digitalferret 9/16/2023 11:02 AM
maybe echo in #computer-forensics too
Avatar
Husky_M00s3 9/16/2023 6:22 PM
Digital Forensics and Incident Response roles will always be required, and always be in demand. Crimes involving digital assets are becoming increasingly common, and as technology and techniques evolve over time, the field needs to adapt and innovate to stay one step ahead, which makes DFIR such an interesting area to work in.
🔥 1
Avatar
I am curious, how do you guys think regarding internet/network on a forensic workstation? In my case both our workstations are completely offline which makes it a pain updating tools and we dont have Microsoft Office (does license activation work without internet?) which would make things easier when writing the report. I can understand airgapping/isolating a malware sandbox, but maybe it would be ok to have internet on a workstation that we just do disk imaging and timeline analysis on? Would be interesting to hear how other people have their labs setup. Maybe you use a Timesketch server? Forensic server? (edited)
Avatar
randomaccess 9/17/2023 1:06 PM
Forensic network has significant network filtering. So not completely air gapped but no open internet. Allows access to specific domains for updates etc.
👍 1
Avatar
You could write your reports in markdown and covert them to a doc if need be with pandoc 😃
👍 1
Avatar
Has anyone ever used come across a stimluated environment using CarbonBlack ? I'm trying to practice the process of isolating threats on a customer endpoint. Was hoping if someone could guide me to resources concerning CarbonBlack ?
Avatar
Avatar
$CozyBear
Has anyone ever used come across a stimluated environment using CarbonBlack ? I'm trying to practice the process of isolating threats on a customer endpoint. Was hoping if someone could guide me to resources concerning CarbonBlack ?
This whitepaper is intended to relay practical knowledge that you can apply in your day-to-day usage of VMware Carbon Black Endpoint Standard.
Avatar
I was hoping if there's actual labs
3:18 PM
But I guess they don't exist😔 but gg lad, thanks for this.
Avatar
I would have to refer you to a platform like letsdefend or something of that nature. Not unless you have a copy and can make a lab yourself
3:19 PM
no problem I tried man.
3:20 PM
Its highly locked propriety stuff so doing osint to find it is a bit tricky
Avatar
Avatar
isvak
I am curious, how do you guys think regarding internet/network on a forensic workstation? In my case both our workstations are completely offline which makes it a pain updating tools and we dont have Microsoft Office (does license activation work without internet?) which would make things easier when writing the report. I can understand airgapping/isolating a malware sandbox, but maybe it would be ok to have internet on a workstation that we just do disk imaging and timeline analysis on? Would be interesting to hear how other people have their labs setup. Maybe you use a Timesketch server? Forensic server? (edited)
Look into something called inetsim. This would simulate internet services so a program that is wanting to be only ran on the internet will think it is on the WWW when it is simply on a VNet that you created. I hope thats what you were needing. (edited)
👍🏾 1
Avatar
Avatar
Rock3t
I would have to refer you to a platform like letsdefend or something of that nature. Not unless you have a copy and can make a lab yourself
I want something more cooperate focused, VMware courses. It does replicate it to a high level but its comes at a cost, quite out of my budget unfortunately. (edited)
Avatar
is this being done for a company?
Avatar
Avatar
Rock3t
is this being done for a company?
No, just training purposes for myself.
Avatar
check dms
Avatar
Request sent
Avatar
Any @Magnet Forensics technical sales available for a chat? I have a quick question about Magnet Review. In particular cloud-based vs. on-premise.
Avatar
Avatar
goofycom
Any @Magnet Forensics technical sales available for a chat? I have a quick question about Magnet Review. In particular cloud-based vs. on-premise.
chriscone_ar 9/19/2023 5:31 AM
Not sure if there’s anyone from sales, but I may be able to answer - feel free to DM any questions and I’ll put you in contact with someone if I don’t know the answer.
Avatar
P4perTrails 9/19/2023 6:20 AM
@Cellebrite quick question .. was "Show preview" intentionally taken out of the UFED? I can't seem to find an option to enable it in v7.66
6:21 AM
I thought it was quite useful for quick info on SIM data
6:21 AM
Instead of opening PA
Avatar
Does anyone happen to know of a usb connector I could use to pull data off of a nvme 9300 series SSD? Myself and a colleague have been unable to find such.
Avatar
Avatar
Remmoto
hi all. Im really interested in DFIR but really stuck on how do I practice skills w/o actually being in the field. is there a channel that I could be pointed to to get me started?
TryHackMe, Hack the Box Academy
Avatar
Avatar
randomaccess
Forensic network has significant network filtering. So not completely air gapped but no open internet. Allows access to specific domains for updates etc.
How are you filtering traffic into your forensic network? Router, Firewall, DNS?
Avatar
I dont suppose anyone has encountered this database in the following location before have they? I am struggling to 'define' it and understand what its actual purpose is...any knowledge would be most welcome! /data/data/com.google.android.googlequicksearchbox/app_si/state_dump_event_content_store/content_store.db
Avatar
Avatar
N1nj4
Does anyone happen to know of a usb connector I could use to pull data off of a nvme 9300 series SSD? Myself and a colleague have been unable to find such.
I believe its a SATA connection ? So SATA to write blocker should work.
Avatar
Avatar
DCSO
I believe its a SATA connection ? So SATA to write blocker should work.
It's not SATA it's U.2 unfortunately
9:31 AM
Different PINs
Avatar
Avatar
N1nj4
It's not SATA it's U.2 unfortunately
Whould this work ? https://a.co/d/c4Jt3sg
SABRENT USB 3.2 Type A to SATA/U.2 SSD Adapter Cable with 12V/2A Power Supply [EC-U2SA]
Avatar
Kind of a random question, how do agencies typically go about disposing of old hardware, particularly if it was obtained from a grant? Trying to get rid of boxes of old write blockers and computers that haven't been used in 7-8 years just taking up space
Avatar
Avatar
DCSO
Whould this work ? https://a.co/d/c4Jt3sg
Thank you! This is exactly what we need. Not sure why we couldn't find this
👍 1
Avatar
Avatar
Solec
Kind of a random question, how do agencies typically go about disposing of old hardware, particularly if it was obtained from a grant? Trying to get rid of boxes of old write blockers and computers that haven't been used in 7-8 years just taking up space
Ewaste and speaking of, Ill take some of it off your hands if thats ok
Avatar
Avatar
dcs453
How are you filtering traffic into your forensic network? Router, Firewall, DNS?
randomaccess 9/19/2023 2:12 PM
At least firewall. Our network team takes care of it
👍 1
Avatar
ScorpionCommando 9/19/2023 7:40 PM
One time post. I’ve left the corp world after 20+ years “in the industry” doing some side work while helping my wife’s business. Customized IT / CyberSec swag is my new gig. Check it out while it’s cheap during early stages. https://bigtimebrands.etsy.com/listing/1564843675
This Wall Hangings item is sold by BigTimeBrands. Ships from Greer, SC. Listed on Sep 12, 2023
Avatar
Hi everyone- does anyone have any guide or portal which can serve as a guide for someone who is a new starter in a digital forensics role?
Avatar
Avatar
ZlatanX
Hi everyone- does anyone have any guide or portal which can serve as a guide for someone who is a new starter in a digital forensics role?
Startme.stark4n6.com
Avatar
Thanks @florus
Avatar
Hi all, does anybody knows legal requirement applied in Netherlands for digital acquisition going to court ? ( who , how limitation etc..)
Avatar
Avatar
Sam
I dont suppose anyone has encountered this database in the following location before have they? I am struggling to 'define' it and understand what its actual purpose is...any knowledge would be most welcome! /data/data/com.google.android.googlequicksearchbox/app_si/state_dump_event_content_store/content_store.db
Just bumping this!
Avatar
Hey @Sam - You would be better off posting that question in the @mobile-forensic-decoding channel 👌🏻
👍 1
Avatar
Anyone exclusively moved to Windows 11 for their forensic machines, and if so, have you had any problems with any software tools not working as expected?
5:16 AM
This question I guess could also go out to vendors to chip in if their software has been tried and tested working on Windows 11. (edited)
Avatar
Avatar
3X3
This question I guess could also go out to vendors to chip in if their software has been tried and tested working on Windows 11. (edited)
Oxygen Forensics 9/20/2023 5:55 AM
Good question! We had it come up recently. At this moment I have a laptop running Windows 11 with OFD installed - no issues. My main workstation is Windows 10 running OFD. I am also running Oxygen Corporate Explorer and Oxygen Analytic Center servers on Windows 11 and Windows Server 2022 VMs, also no issues. Additionally, our remote personnel, if they use personal machines for work, are at about 50/50 using Windows 11 or 10 🙂 (edited)
Salute 2
Avatar
Avatar
Oxygen Forensics
Good question! We had it come up recently. At this moment I have a laptop running Windows 11 with OFD installed - no issues. My main workstation is Windows 10 running OFD. I am also running Oxygen Corporate Explorer and Oxygen Analytic Center servers on Windows 11 and Windows Server 2022 VMs, also no issues. Additionally, our remote personnel, if they use personal machines for work, are at about 50/50 using Windows 11 or 10 🙂 (edited)
Thanks for the prompt and full reply! Much appreciated.
Salute 1
Avatar
Hi All, Been asked a question - Does anyone have a CSAM/IIOC keyword origin list i.e. what does x stand for?
6:47 AM
Just got a few 4 letter keywords and trying to say it means this etc.
Avatar
Avatar
3X3
Anyone exclusively moved to Windows 11 for their forensic machines, and if so, have you had any problems with any software tools not working as expected?
chrisforensic 9/20/2023 7:01 AM
Heyho sunny greets from Austria ! No problem here with Oxygen Forensic Detective, UFED4PC and XRY on Windows 11 Pro, 22H2 👍
❤️ 1
Avatar
Avatar
chrisforensic
Heyho sunny greets from Austria ! No problem here with Oxygen Forensic Detective, UFED4PC and XRY on Windows 11 Pro, 22H2 👍
Hey Chris, greetings from rainy UK, haha! - Thanks for the information 🙂
Salute 1
🤣 1
Avatar
Avatar
Rob
Just got a few 4 letter keywords and trying to say it means this etc.
Never heard of one but welcome to DM and I can try translate from experience.
Avatar
Any known tools one could use to find local file access via Chrome? Looking for evidence of local file exfiltration via a user's personal Gmail account accessed via Chrome.
Avatar
Avatar
MilkFarts
Any known tools one could use to find local file access via Chrome? Looking for evidence of local file exfiltration via a user's personal Gmail account accessed via Chrome.
Windows, Linux or mac?
👆 1
Avatar
Avatar
Jason
Windows, Linux or mac?
Windows
Avatar
Avatar
MilkFarts
Windows
Andrew Rathbun 9/20/2023 8:17 PM
Parse SRUM. Hopefully the NetworkUsages table is present.
Avatar
anyone from @Cellebrite available for a question about digital collector ?
📬 1
Avatar
Avatar
MilkFarts
Any known tools one could use to find local file access via Chrome? Looking for evidence of local file exfiltration via a user's personal Gmail account accessed via Chrome.
randomaccess 9/21/2023 3:09 AM
That's going to be rough. You'll get the URLs that may give you an indication
3:10 AM
SRUM may be useful depending on what they're taking but bearing in mind attachments are going to be 10mb unless they hit google drive, and that standard internet activity can be that size it might not spike up
3:10 AM
You may get something in cache/leveldb/chrome file system
Avatar
Avatar
3X3
Anyone exclusively moved to Windows 11 for their forensic machines, and if so, have you had any problems with any software tools not working as expected?
Pleasantly surprised that PA Ultra is running well on Win11 Pro during the CTF. Mind you, it's a beefy spec machine, so that might be helping all the various pieces of the puzzle 'just get along'.
Salute 1
Avatar
Avatar
g h
Pleasantly surprised that PA Ultra is running well on Win11 Pro during the CTF. Mind you, it's a beefy spec machine, so that might be helping all the various pieces of the puzzle 'just get along'.
Digitalferret 9/21/2023 4:10 AM
i'd love someone to compare that on an equivalent spec machine (with W10), just had to help a neighbours kid. new "gaming" PC with W11 on. runs like a 3 legged blind donkey. this mc here is 5-6yrs older, and W10 runs a good deal quicker. with Linux on it it's like shit off a teflon shovel (edited)
🤣 1
Avatar
Separate NVMe drives makes a big difference to Ultra, as per the CTF video on setting up PA
👍 2
Avatar
Avatar
MilkFarts
Any known tools one could use to find local file access via Chrome? Looking for evidence of local file exfiltration via a user's personal Gmail account accessed via Chrome.
Andrew Rathbun 9/21/2023 4:54 AM
Try the Windows Search Index too. Try SIDR on GitHub
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 9/21/2023 6:51 AM
#mobile-forensic-decoding ?
Avatar
@Magnet Forensics - anyone free to talk about Slack collection ? can they DM me
📬 1
Avatar
Avatar
Digitalferret
i'd love someone to compare that on an equivalent spec machine (with W10), just had to help a neighbours kid. new "gaming" PC with W11 on. runs like a 3 legged blind donkey. this mc here is 5-6yrs older, and W10 runs a good deal quicker. with Linux on it it's like shit off a teflon shovel (edited)
I feel like it would run a lot better if it used more than 2 cores.
👍🏻 1
Avatar
Avatar
MilkFarts
Any known tools one could use to find local file access via Chrome? Looking for evidence of local file exfiltration via a user's personal Gmail account accessed via Chrome.
spicy_caveman 9/21/2023 6:47 PM
Cellebrite Inspector is pretty nice with internet and browser artifact parsing, albeit processing speeds. I also use OSForensics a lot for the User Activity modules that clump the SRUM, Event Logs, Browser, etc together nicely into a timeline- works really quick.
Avatar
Avatar
MilkFarts
Any known tools one could use to find local file access via Chrome? Looking for evidence of local file exfiltration via a user's personal Gmail account accessed via Chrome.
AXIOM is my go-to
Avatar
do you know how to mount .aff4 on linux ?
Avatar
Avatar
emilie_
do you know how to mount .aff4 on linux ?
DeeFIR 🇦🇺 9/22/2023 1:11 AM
Have a look at affuse, or a tool which uses it. IIRC, imagemounter uses affuse. (edited)
Avatar
thank you
Avatar
When does an app change app id? I have a file that iam pretty sure it comes from an app but when i check that app it has a diffrent appid
Avatar
Anyone know of any tried and tested tools for taking a full copy of a current Windows installation with software etc. installed, and creating a .ISO or bootable installation media containing all installed software.
2:45 AM
Essentially looking to clone an installation onto other machines.
Avatar
i used macrium reflect to move or restore working instalations
Avatar
Avatar
3X3
Anyone know of any tried and tested tools for taking a full copy of a current Windows installation with software etc. installed, and creating a .ISO or bootable installation media containing all installed software.
https://clonezilla.org/ also possible and it's free
Avatar
Do both of these solution require the boot drive to be removed and cloned to? (Apologies, was out of office) (edited)
Avatar
Avatar
Emtek
When does an app change app id? I have a file that iam pretty sure it comes from an app but when i check that app it has a diffrent appid
Andrew Rathbun 9/22/2023 6:36 AM
Relating to Windows? Could be a different version of the same app. https://github.com/EricZimmerman/JumpList/blob/master/JumpList/Resources/AppIDs.txt For example ^^
Contribute to EricZimmerman/JumpList development by creating an account on GitHub.
Avatar
Avatar
Emtek
When does an app change app id? I have a file that iam pretty sure it comes from an app but when i check that app it has a diffrent appid
Ross Donnelly 9/22/2023 10:55 AM
AppID is a hash of the path of the executable. If an update changes the path at all, or the executable moves for any other reason = different AppID https://www.hexacorn.com/blog/2013/04/30/jumplists-file-names-and-appid-calculator/
💯 2
👍 1
Avatar
We were awarded with the High Technology Crime Investigation Association's (HTCIA's) "Case of the Year" last week for our work in the ongoing Bhima Koregaon case. Many of you are now familiar with this case, which involves electronic evidence tampering resulting in a staggering human cost - imprisonments >5 years and now one death. For those that are not yet familiar with the case, here are some resources:
🔥 3
5:50 AM
I think we can all agree that most (nearly all) claims of "electronic evidence tampering" are absurd, if not comical. This case involves actual electronic evidence tampering, and at an incredible scale. The fact that extremely detailed digital forensics reports are publicly available is a gift, so please take it. Officially, we have been called liars and our findings "rather weird" - each of you should decide for yourselves.
Avatar
SkyNow TV DRM platform, Microsoft’s PlayReady DRM decryption keys got leaked some time ago. Source of piracy is scalable for VOD channels without premium subscriptions. Most firms don't bother about CA/DRM vulnerability management. In fact never mentioned within the security community. pirates apps often embded 'drm decryption keys' but employ tls pinning🤢 Thought I'd share as people may find it cool to read. (edited)
Avatar
Digitalferret 9/24/2023 1:05 PM
same old, same old. mate years ago made his fortune selling "Sky Cards" - DIY programmable PIC controller PCB. dudes bought the PCB's "for educational purposes" and d/l'd the code from newsgroups. worldwide trade. he had money pouring in (edited)
Avatar
Most security firms don't even bother patching their DRM, and they wonder why people exploiting their systems. Maybe if they added a calendar reminder once in a while to patch their DRM systems. Piracy is lucrative business, no doubt her made alot of money from it. (edited)
Avatar
However, most of the piracy existing today (telegram piracy) channels often scam or often employ credential stuffing, embed malicious payloads in links or phishing techniques in linking sites (website that provides organized and searchable hyperlinks that direct a user to content hosted on other pirates websites) and exploit consumers of pirate content. One individual deiced take part in a ponzi scheme to scam people. (edited)
Avatar
Avatar
$CozyBear
Click to see attachment 🖼️
Digitalferret 9/24/2023 2:42 PM
some guys 😬
Avatar
Thought I'd shed some new light on the digital forensics community. Hope it was insightful xD. (edited)
💯 1
Avatar
Digitalferret 9/24/2023 2:53 PM
sounds like another case for Pirogi 🙂 (edited)
Avatar
Avatar
Digitalferret
sounds like another case for Pirogi 🙂 (edited)
Ive always wanted to help that man. my blackhat days were spent messing with those tards (edited)
Avatar
I'm 21, idk if too young to know him. (edited)
Avatar
ScammerPayback
Avatar
Avatar
$CozyBear
I'm 21, idk if too young to know him. (edited)
Digitalferret 9/24/2023 2:55 PM
youtube it
Avatar
Digitalferret 9/24/2023 2:55 PM
i played my own games with them.
🤣 1
Avatar
At least im not the only one
Avatar
Digitalferret 9/24/2023 2:55 PM
let them carry on showing me ordinary Win error msg logs.
😭 2
😂 3
2:56 PM
then i say "whoa, i think I know what the issue is!"...
2:56 PM
Yes sir? what is problem.
Avatar
deletes system32
😂 1
2:56 PM
I think we both need to restart
Avatar
Digitalferret 9/24/2023 2:56 PM
me: oh it's terrible.... i can actually smell it....
2:56 PM
Sir?
2:56 PM
can you smell....
2:56 PM
oh t is, yes...
2:56 PM
Bullshit
2:56 PM
<dialtone>
Avatar
I just took their data and deleted their systems, making sure to do the 0000000 overwrite overnight. (edited)
Avatar
more like there's an issue with your DDL files and then precedes on to remotely connecting on to your computer.
Avatar
it was like playing a slavehack game if you have any clue what that is
3:00 PM
Only the dummys always connected to you
3:00 PM
Looks like something will keep me awake tonight xD, nearly midnight in the UK (edited)
Avatar
Avatar
$CozyBear
Looks like something will keep me awake tonight xD, nearly midnight in the UK (edited)
Digitalferret 9/24/2023 3:05 PM
same, yeh, have to be careful not to get on the youtube spiral of doom 🙂 23:05 :blink: 02:35
Avatar
Oh dear Rundll32.exe are maliciously modifying my system too in the background.
Avatar
Avatar
Digitalferret
same, yeh, have to be careful not to get on the youtube spiral of doom 🙂 23:05 :blink: 02:35
It came down your suggestion and now I'm in the spiral of doom, ADHD issues😂 (edited)
😂 1
Avatar
https://www.youtube.com/watch?v=5f-JlzBuUUU - My favorite scientist of all time, massive frantic for biology. If anyone has the time to listen to the podcast on evolutionary biology attempt to listen to it, quite insightful. (edited)
Avatar
My main issue with him is that he's got some pretty radical views
Richard Dawkins is an English ethologist, evolutionary biologist, and writer. Dawkins himself has stated that his political views are left-leaning. However, many of Dawkins's political statements have created controversy among left-wing and atheist communities.
4:19 PM
I mean, the title of his book "The God Delusion" illustrates his views pretty well
Avatar
I agree, his views are radical to others who hold strong beliefs of their religious systems or may come across bit oppressive in his behavior. Nevertheless, he can very hash when approaching a subject on religion or often described within his rhetrics or terms like megalomaniac and comparable to the small pox virus. i don't really focus much on this side of thinking but his viewpoints on darwinsim. That's where i like him the most, really just biology stuff. (edited)
Avatar
Digitalferret 9/24/2023 4:58 PM
go find Christopher Hitchins 🙂
Avatar
Id like to do a poll of linux vs windows in this community. Not that either is 'better' than the other. just a weird question lol (edited)
Avatar
Avatar
Rock3t
Id like to do a poll of linux vs windows in this community. Not that either is 'better' than the other. just a weird question lol (edited)
DeeFIR 🇦🇺 9/24/2023 5:40 PM
There won’t be a standard response as you’d expect in a normal consumer environment (ie do you use linux or windows on your main desktop, choose A or B). You’ll have a tonne of responses, mostly along the lines of ‘it depends’. Which OS for which purpose? Analysis? What kind of analysis? Does using WSL count as Windows or Linux? Does using a Windows VM in QEMU on Linux host count as Windows or Linux? What if I’m just doing corporate stuff and writing reports on my windows box?
this 1
Avatar
Avatar
DeeFIR 🇦🇺
There won’t be a standard response as you’d expect in a normal consumer environment (ie do you use linux or windows on your main desktop, choose A or B). You’ll have a tonne of responses, mostly along the lines of ‘it depends’. Which OS for which purpose? Analysis? What kind of analysis? Does using WSL count as Windows or Linux? Does using a Windows VM in QEMU on Linux host count as Windows or Linux? What if I’m just doing corporate stuff and writing reports on my windows box?
Right thats actually my curiosity is the vast amount of setups youd see. Why people take the different routes they do
5:46 PM
I guess that wouldnt be a poll more a discussion. My lack of wording there misrepresented it
Avatar
I always say it’s like a socket set, you got standard and metric. You use Windows or Linux depending on the task, but you should be proficient in both. 😂
Avatar
does anyone here can help me out to find the sql of a disk image of a damaged mobile phone . I been stuck for weeks now no progress at all. Thanks (edited)
Avatar
Avatar
Rock3t
Id like to do a poll of linux vs windows in this community. Not that either is 'better' than the other. just a weird question lol (edited)
Digitalferret 9/25/2023 3:26 AM
i prefer Linux environment, but, as per Deefir, it's whatever you pick up as per "tools for the job". PC-3000 requires Windows, so that's what I have. Similarly other proprietary s/w is Windows only and works alongside the DR hardware. Missus hhas no such needs and is happily running an ancient laptop with MX Linux on it (and she's prolly less bamboozled than if it was Tile City on a Win Box)
3:26 AM
Still runing W10 here and no desire to leave it until forced
Avatar
See I’m like 100% Linux bc I’ll either pass through or virtualize everything. But at the same Time I run into weird problems alllll the time instead of windows where it’s just
8:22 AM
Works
8:23 AM
And like you said there’s certain pieces of software it’s either windows or go home.
Avatar
Avatar
Rock3t
Works
Digitalferret 9/25/2023 9:58 AM
yep, and in a professional environment it's as bad as taking a bleeding edge Linux distro and having to rebuild every time the SHTF. you just can't afford the time and effort, or the risk of loss (edited)
Avatar
Avatar
Digitalferret
yep, and in a professional environment it's as bad as taking a bleeding edge Linux distro and having to rebuild every time the SHTF. you just can't afford the time and effort, or the risk of loss (edited)
Eh Ive never had these problems. Ive always had problems in windows. All applications work but Ill have the weirdest things and I just couldnt fix them.
10:07 AM
then data recovery for NTFS is just awful. I tried BTRFS and just been in heaven ever since. I had 1 time that my first linux image got corrupted by a bad update bc power went out in the middle of the ending of it (perfect timing). But Fallback image brought it back to life, did a btrfs snapshot replace and boom im up. 2 commands.
10:11 AM
those are my experiences though. Im sure someone can come around and give a ubuntu horror story lol
Avatar
Avatar
Rock3t
Eh Ive never had these problems. Ive always had problems in windows. All applications work but Ill have the weirdest things and I just couldnt fix them.
Digitalferret 9/25/2023 10:11 AM
my first taste was redhat 5-ish "dependency hell"
Avatar
Avatar
Digitalferret
my first taste was redhat 5-ish "dependency hell"
See that gives me shivers just
10:12 AM
no
10:12 AM
LOL
Avatar
Digitalferret 9/25/2023 10:12 AM
trying to get mandrake to hook up to the modem. days. forum users not much use at all
10:14 AM
went with Arch when it wasJudd Vinet at the helm, and in its infancy. folks rallied and he crowdsourced funds for a new server. felt like you belonged to something. but always felt you were a few inches short of a proper Linux beard
Avatar
I was too young to even understand was arch was in those days
Avatar
Digitalferret 9/25/2023 10:15 AM
but now like DXO photolab - nothing remotely like it on Linux
10:15 AM
snagit-ccamtasia, nada
Avatar
more in my realm, Cain
10:17 AM
Cain is only runnable on windows and it is my favorite little bugger
Avatar
Digitalferret 9/25/2023 10:19 AM
yeh, been a while since used that. good bit of kit
Avatar
No offense to the hashcat boys bc I love you but like
Avatar
Digitalferret 9/25/2023 10:19 AM
is it still a 2 pack. one live CD/DVD/USB etc the other a plugin for Windows if i recall
Avatar
still prefer cain
10:19 AM
when I can
Avatar
Digitalferret 9/25/2023 10:20 AM
hang on, crossed wires lol. im thinking of Caine
Avatar
Cain and Abel
Avatar
Digitalferret 9/25/2023 10:20 AM
yeh, got it now
Avatar
When that came out I was a nerd on xbox lmfao
10:23 AM
script kiddy ;P
Avatar
Hi everyone im playing a AR for the police cyber investigation and im stuck at level 4 in finding the name of a hacker in a disk image file im using autopsy with not much luck
Avatar
I have an issue on my windows 11 host, using hyper-V to run a kali guest, cannot get the Kali guest to connect to Wi-Fi. It is currently using the virtual Ethernet connection to the host for internet access. Have tried multiple methods found on forums but none seem to work. If anyone has an answer then @ me, next step is most likely just dual boot or find a throwaway laptop to run Kali as host.
Avatar
Avatar
susapr
I have an issue on my windows 11 host, using hyper-V to run a kali guest, cannot get the Kali guest to connect to Wi-Fi. It is currently using the virtual Ethernet connection to the host for internet access. Have tried multiple methods found on forums but none seem to work. If anyone has an answer then @ me, next step is most likely just dual boot or find a throwaway laptop to run Kali as host.
What have you tried? Ifup eth0? Give us “lspci” output?!?
Avatar
Avatar
Ali
Hi everyone im playing a AR for the police cyber investigation and im stuck at level 4 in finding the name of a hacker in a disk image file im using autopsy with not much luck
Andrew Rathbun 9/25/2023 8:00 PM
What's an AR? Don't assume we all know what that means. To me, those are my initials and nothing else.
Avatar
Avatar
Andrew Rathbun
What's an AR? Don't assume we all know what that means. To me, those are my initials and nothing else.
AlternateIntent 9/25/2023 11:20 PM
I would describe Augmented Reality (AR) as VR without the googles (edited)
🤣 1
11:21 PM
More like projecting an 3D image through a device usually a phone (edited)
11:23 PM
kind of like how pokemon go (I cant think of another game) "projects" the game through the app (taking your background and combining it with the game) like the picture in the middle: (edited)
11:24 PM
11:24 PM
wow that image quality sucks lol
Avatar
Avatar
Andrew Rathbun
What's an AR? Don't assume we all know what that means. To me, those are my initials and nothing else.
Its the latest hot game out there: Escape From Castle Workenstein
🤣 1
Avatar
Hi, I'm a student who has just started my digital forensics course, I need to do a presentation on how I'd handle acquisition and analysis of a mobile phone whilst keeping to acpo guidelines. I have a good idea of what I will say during my presentation, but I wanted to ask if there were any topics anyone would suggest including? Or a proccess on how law enforcement handle a situation like this in the UK to refer to?
Avatar
Avatar
Jacktivity
Hi, I'm a student who has just started my digital forensics course, I need to do a presentation on how I'd handle acquisition and analysis of a mobile phone whilst keeping to acpo guidelines. I have a good idea of what I will say during my presentation, but I wanted to ask if there were any topics anyone would suggest including? Or a proccess on how law enforcement handle a situation like this in the UK to refer to?
Ross Donnelly 9/26/2023 8:06 AM
Whilst the principles are still solid, consider where they break down these days - for example how does it apply when you are talking about Cloud data accessed through the phone?
👍 1
Avatar
Avatar
Ross Donnelly
Whilst the principles are still solid, consider where they break down these days - for example how does it apply when you are talking about Cloud data accessed through the phone?
Great point, I'll look for some reading on this, thank you
Avatar
Avatar
AlternateIntent
I would describe Augmented Reality (AR) as VR without the googles (edited)
Andrew Rathbun 9/26/2023 8:47 AM
Ahhh I know what Augmented Reality is, but in the context of this server, I never would've thought you meant that by AR. Thanks for clarifying
Avatar
There is so much to study
10:09 AM
But I'm having some difficulty as I wanted to apply for masters course but couldn't due to some reason (edited)
10:11 AM
Here's the thing since I don't have any curriculum to follow I just read random books like just read cyber forensics for dummies
10:12 AM
There was some quite good information but but there wasn't alot
Avatar
anyone have experience with verakey? specifcally troubleshooting?
Avatar
Avatar
CasaJaguar
anyone have experience with verakey? specifcally troubleshooting?
thatboy_leo 9/26/2023 1:12 PM
💯 2
Avatar
Avatar
CasaJaguar
anyone have experience with verakey? specifcally troubleshooting?
Digitalferret 9/26/2023 1:45 PM
they probably do
Avatar
barely any documentation past marketing materials bc it’s new, hence the broad question to see if anyone has even gotten their hands on it
Avatar
1\ How to prove an iphone was wiped 🔎👇 #dfir #mobileforensics When a user wipes their phone, it generally results in the creation of a file ".obliterated". This file is located: /private/var/root This isn't enough to identify the timestamp of when the wipe occurred (...cont)
Likes
3149
Retweets
460
Avatar
Avatar
Andrew Rathbun
Ahhh I know what Augmented Reality is, but in the context of this server, I never would've thought you meant that by AR. Thanks for clarifying
AlternateIntent 9/26/2023 6:58 PM
oooo
Avatar
Avatar
AlternateIntent
wow that image quality sucks lol
I prefer actual reality myself. Very lifelike. https://m.youtube.com/watch?v=o0AlNLloC8A
Avatar
Which one is supposed to the latest? @Cellebrite
🙈 1
Avatar
Avatar
trillian
Which one is supposed to the latest? @Cellebrite
Hmm let me check. Where are you seeing this. ? Demo license area ?
Avatar
Yeah
Avatar
When extracting lsa secrets using volatlity
12:22 AM
I am getting mangled output
12:23 AM
I.e getting things like this:
Avatar
Anybody aware of a decent or in depth checklist for NIS2?
Avatar
Best program to Image and Process QubesOS?
Avatar
I have a router's BSSID. Any ideas on the best way to identify it's owner via search warrant?
Avatar
Avatar
trillian
Yeah
So for some reason, it got double posted its teh same vers
Avatar
BSSID/Mac address of the router
Avatar
do you have a location ? something like https://wigle.net/ might narrow that down
Maps and database of 802.11 wireless networks, with statistics, submitted by wardrivers, netstumblers, and net huggers.
Avatar
Avatar
rayeh
do you have a location ? something like https://wigle.net/ might narrow that down
I do, it's likely within a known apartment complex.
Avatar
LE tags will probably have better ideas, but the names/types of devices connecting to the bssid might be useful if extra data points are needed
Avatar
Avatar
Leonidas
I have a router's BSSID. Any ideas on the best way to identify it's owner via search warrant?
Hmm, it will be tough to identify an owner by that. If you have the BSSID you could tie it to a specifc device. Looking up the MAC could potentially give you the type of device. Even if you did some kind of signal analysis near the location, not sure that would be enough for a warrant. As far as to identify the specific apartment/location (edited)
Avatar
Avatar
CyberGhost
Hmm, it will be tough to identify an owner by that. If you have the BSSID you could tie it to a specifc device. Looking up the MAC could potentially give you the type of device. Even if you did some kind of signal analysis near the location, not sure that would be enough for a warrant. As far as to identify the specific apartment/location (edited)
It is a Belkin - currently working on a subpoena for any account/email associated with it. Not sure if TCP/IP packets include the router's SSID/MAC.
Avatar
Avatar
Leonidas
It is a Belkin - currently working on a subpoena for any account/email associated with it. Not sure if TCP/IP packets include the router's SSID/MAC.
If you have some kind of packet capture it will have the MAC address, if that device is being used as the router.
Avatar
Avatar
susapr
I have an issue on my windows 11 host, using hyper-V to run a kali guest, cannot get the Kali guest to connect to Wi-Fi. It is currently using the virtual Ethernet connection to the host for internet access. Have tried multiple methods found on forums but none seem to work. If anyone has an answer then @ me, next step is most likely just dual boot or find a throwaway laptop to run Kali as host.
Did you setup a network device that uses the wifi network on the hyper v host?
12:32 AM
@susaprhttps://learn.microsoft.com/en-us/virtualization/hyper-v-on-windows/quick-start/connect-to-network In the first picture of the article, External network, you select your wireless card, you can use task manager to see the details for that card, make sure to select, "allow management os to share..." then, power down your Kali vm, then =dit the settings of the kali vm, adding or changing to the new external card.
Create a Virtual Switch
Avatar
Avatar
ryd3v
@susaprhttps://learn.microsoft.com/en-us/virtualization/hyper-v-on-windows/quick-start/connect-to-network In the first picture of the article, External network, you select your wireless card, you can use task manager to see the details for that card, make sure to select, "allow management os to share..." then, power down your Kali vm, then =dit the settings of the kali vm, adding or changing to the new external card.
I have tried NAT but it didn’t work, probably because the VM I am running is not configged for Wi-Fi, I have found a method that allows me to run openvpn for thm, but I will see if I can find a solution. I tried the method in the doc you sent but it does not fix the issue
Avatar
You have to use the external network and on the vm it won’t show wifi it still shows a lan but it’s connected to the wifi of the host.
1:20 AM
To use a wifi directly you have to use a dongle
1:21 AM
VMware workstation would be better and easier to use a dongle and pass the usb dongle to the vm
Avatar
Avatar
susapr
I have tried NAT but it didn’t work, probably because the VM I am running is not configged for Wi-Fi, I have found a method that allows me to run openvpn for thm, but I will see if I can find a solution. I tried the method in the doc you sent but it does not fix the issue
Nat works by creating a virtual switch, all the traffic is routed through that switch, so it won’t be a direct connection between your wireless nic and the vm. The virtual switch can use any external network to route traffic to the correct vm though network address translation(nat) in order to use wifi as the primary network device, it must be trough an external network switch. If that makes sense. In that scenario it’s a Bridged connection, so I believe what your after is to communicate on the same IP address range as the devices on the wireless network, in that case you need to use bridged.
1:34 AM
If you want to have direct communication with a wifi card let’s say for packet injection, you need to use a dongle and pass the usb dongle to the vm.
1:34 AM
Hopefully that makes sense.
1:34 AM
You have a few options with hyper-v nat, bridged, host only(private)
1:35 AM
Each switch has to be configured. Usually the default is configured (nat)
Avatar
Avatar
ryd3v
Nat works by creating a virtual switch, all the traffic is routed through that switch, so it won’t be a direct connection between your wireless nic and the vm. The virtual switch can use any external network to route traffic to the correct vm though network address translation(nat) in order to use wifi as the primary network device, it must be trough an external network switch. If that makes sense. In that scenario it’s a Bridged connection, so I believe what your after is to communicate on the same IP address range as the devices on the wireless network, in that case you need to use bridged.
i have a bridged virtual network through the switch manager and looking at the control panel, but what i cant use is the kali connect to vpn function i have to use cli, so i have narrowed down my issue to the kali connect to vpn function or what i mentioned before
Avatar
A vpn can use nat.
1:37 AM
It can also use bridged.
Avatar
yes i understand
1:38 AM
also bare with me please i am a novice at best, but complete beginner wth windows
Avatar
So if you’re having an issue with the vpn it could be how your managing the vpn on the kali vm
1:38 AM
Yes no worries
1:38 AM
I understand, we all start somewhere 😂
💯 1
Avatar
thats what i was thinking and i think its a problem with kali itself because i can connect to ovpn through cli but not through the wifi dashboard interface
Avatar
If you are just trying to use a vpn on a kali Linux vm, you don’t need specifically wireless. Nat is fine and hyperv should use whichever network device you have unless you specifically tell it to use a lan nic that isn’t available
Avatar
its an issue with kali vpns only cause i see so may of these on forus and none of them are completely resolved
1:40 AM
also i have never had an issue with vpns on a kali host
Avatar
Well wifi dashboard won’t work regardless because wifi and vpn are two separate things
1:41 AM
So I would just use nat and then configure your vpn from there. You can use the command line or import a openvpn profile in the network manager
Avatar
i am not explaining myself corrrectly, but tmrw i will explain my issue fully and show you my workaround, but agree with everything youve said so far
Avatar
There are some additional settings with a Linux vm on hyperv you can do, overall Linux on hyperv isn’t that good. Your best bet is virtual box or VMware
Avatar
no i know
Avatar
No worries I have to sleep , feel free to ping me anytime. If I’m online I’ll do my best to help you
Avatar
i just want to understand windows better
1:43 AM
tried to add you but couldnt, but ill @ you here
Avatar
Yeah windows and hyperv can be a bit confusing, but overall generally easy at the same time
1:43 AM
Sounds good
Avatar
i know qubes very well so i thought this would be easy, but getting stuck is getting stuck nothing more
Avatar
Probably the best thing is to study networking first 😬
Avatar
Avatar
susapr
i know qubes very well so i thought this would be easy, but getting stuck is getting stuck nothing more
In the meantime, this may help with hyperv and Linux vm nano /etc/initramfs-tools/modules hv_vmbus hv_storvsc hv_blkvsc hv_netvsc update-initramfs -u Reboot
1:52 AM
Example for one module, you can search the rest to see what they do https://manpages.ubuntu.com/manpages/focal/en/man4/hv_vmbus.4freebsd.html
1:54 AM
Specifically guest partitions running on Hyper-V do not have direct access to network devices attached to the Hyper-V server
1:55 AM
Which is the answer you’re looking for regarding access directly to wireless card. It’s just not possible
1:56 AM
Only through external bridged or nat, but the vm still sees the network as lan
1:56 AM
Hope that makes sense
1:56 AM
Salute
Avatar
Anyone know where to find say, a selection of custom Maltego entities - specifically narcotics based entities? ie. mushrooms, heroin, fentanyl, cocaine, marijuana. (edited)
Avatar
Does anyone know if PA 7.6 or Ultra still accepts python plugins? Wrote one up to open video files in VLC since the built in player struggles with lots of video types but when I try to add the plugin it doesn't see it in the folder.
Avatar
I'm managing 10+ digital forensics/ediscovery machines that is not on a domain. Laptops and Desktops. Any recommendations on managing software / windows update ? It is too time consuming (edited)
Avatar
Avatar
radiostar
Does anyone know if PA 7.6 or Ultra still accepts python plugins? Wrote one up to open video files in VLC since the built in player struggles with lots of video types but when I try to add the plugin it doesn't see it in the folder.
Nanotech Norseman 9/28/2023 3:55 PM
It should, though the plugins are specific to IronPython (which if I recall is based on python 9-ish). I know there is a training for python training for Cellebrite, but I haven't taken it
Avatar
Avatar
Jay528
I'm managing 10+ digital forensics/ediscovery machines that is not on a domain. Laptops and Desktops. Any recommendations on managing software / windows update ? It is too time consuming (edited)
Nanotech Norseman 9/28/2023 3:57 PM
Several labs I know about have a very slim AD DS environment staged for the air-gapped network. It makes it easier to push some updates, but is super frustrating if it goes down due to hardware failure (unless you run it in a smaller clustered environment). Attach the laptops/computers to the domain and push manual updates through the primary AD node to be pushed out. Works great for also setting up internal network shares
Avatar
Avatar
Nanotech Norseman
Several labs I know about have a very slim AD DS environment staged for the air-gapped network. It makes it easier to push some updates, but is super frustrating if it goes down due to hardware failure (unless you run it in a smaller clustered environment). Attach the laptops/computers to the domain and push manual updates through the primary AD node to be pushed out. Works great for also setting up internal network shares
thanks
👍 1
Avatar
am correct right this is the password memory dump computer
2:33 AM
using lsadump
Avatar
Anyone from @Cellebrite ? A bit urgent. PM me please. (edited)
📬 1
Avatar
Avatar
Jay528
I'm managing 10+ digital forensics/ediscovery machines that is not on a domain. Laptops and Desktops. Any recommendations on managing software / windows update ? It is too time consuming (edited)
If you don't want to have physical AD infrastructure, Azure AD is another option. InTune can do device management and software
Avatar
Avatar
CyberGhost
If you don't want to have physical AD infrastructure, Azure AD is another option. InTune can do device management and software
thank you @CyberGhost
👍 1
Avatar
Does anyone know what Edge stores in this file? c:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000004.log
Avatar
Avatar
kdkn
Does anyone know what Edge stores in this file? c:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000004.log
Andrew Rathbun 9/29/2023 11:31 AM
https://github.com/search?q=repo%3Achromium%2Fchromium+assets&type=code https://github.com/search?q=repo%3Achromium%2Fchromium+asset+store&type=code I would suggest poking around the code for comments that may explain what files are stored in that folder. Usually there's pretty verbose comments in the Chromium source code that may or may not be helpful
Avatar
Avatar
Andrew Rathbun
https://github.com/search?q=repo%3Achromium%2Fchromium+assets&type=code https://github.com/search?q=repo%3Achromium%2Fchromium+asset+store&type=code I would suggest poking around the code for comments that may explain what files are stored in that folder. Usually there's pretty verbose comments in the Chromium source code that may or may not be helpful
Thank you for the suggestion Andrew, I did not think of that.
👍 1
Avatar
Avatar
Jay528
I'm managing 10+ digital forensics/ediscovery machines that is not on a domain. Laptops and Desktops. Any recommendations on managing software / windows update ? It is too time consuming (edited)
DeeFIR 🇦🇺 9/29/2023 2:23 PM
I’d look at airgapped WSUS infrastructure for OS updates/patches (1 machine connected to the internet, pulls updates, then transfer them to another machine on your isolated network). For software updates, look at chocolatey.
Avatar
Just curious if anyone has looked to see if there are any interesting artifact changes with Edge for Business.
Avatar
Hello
👋🏻 8
Avatar
would anyone know the proxy of settings is of an emulated phone. for context, I'm inserting a mitmproxy CA into the phone for an app. (edited)
1:00 PM
1:01 PM
actually wait, nvm wait found it under 'extended controls ' (edited)
Avatar
Hello DFIR Community! (edited)
5:44 AM
I'm studying about DFIR, and I'm finding a little difficult to find a 'base stack' as, a set of technologies to study more as they are used in the field, and will allow me to learn more about it. For example, I'm taking look at Velociraptor, which I see it most like a EDR. I wonder if it can replace some tools on log collection, like, can I only get all information I would need like, disk image, RAM and other artefacts only using Velociraptor?. Or would I also need tools like UFS explorer?, memory parser?
5:44 AM
And aside from having a SIEM like wahzuh, would it make sense to only have Velociraptor?, and add or just have and IDR like suricata or, even something entirely about network monitoring like Zeek?
5:46 AM
I wonder overall, what could be a good stack to work with when entering a new company, to implement little by little DFIR. As in, I would control de network with Wahzuh or Zeek?, I would consider IDS like suricata?, when there's an incident, I would connect to a pc and get the image or RAM how?, would I only use Velociraptor?, or is Velociraptor and suricata all I need as, Velociraptor has ways to EDR like Wahzuh
Avatar
Avatar
DeeFIR 🇦🇺
I’d look at airgapped WSUS infrastructure for OS updates/patches (1 machine connected to the internet, pulls updates, then transfer them to another machine on your isolated network). For software updates, look at chocolatey.
Thanks
Avatar
Does anyone have experience getting extractions from Nokia Flip 2760? Its a locked device. I’m looking into unlocking the boot loader but not having much success with that. UFED requires that the device be unlocked and since its not a smartphone, Premium can’t access it.
Avatar
Avatar
carook
Anyone know where to find say, a selection of custom Maltego entities - specifically narcotics based entities? ie. mushrooms, heroin, fentanyl, cocaine, marijuana. (edited)
You can create your own entities pretty easily.
Avatar
Avatar
Minall
I'm studying about DFIR, and I'm finding a little difficult to find a 'base stack' as, a set of technologies to study more as they are used in the field, and will allow me to learn more about it. For example, I'm taking look at Velociraptor, which I see it most like a EDR. I wonder if it can replace some tools on log collection, like, can I only get all information I would need like, disk image, RAM and other artefacts only using Velociraptor?. Or would I also need tools like UFS explorer?, memory parser?
Generally, most use Velociraptor during incident response. So it is deployed as a tool to collect data during IR and then removed and not a "full time" EDR. I am sure there are some that are using it on all endpoints, but they likely have the resources to do custom things with it. Velociraptor is great when you need to collect data at scale across a lot of host at once. What kind of technology to use for a new company is a loaded question, they are 1000s of answers since it really depends on the budget, staff skill set, goals. etc.
Avatar
Avatar
CyberGhost
Generally, most use Velociraptor during incident response. So it is deployed as a tool to collect data during IR and then removed and not a "full time" EDR. I am sure there are some that are using it on all endpoints, but they likely have the resources to do custom things with it. Velociraptor is great when you need to collect data at scale across a lot of host at once. What kind of technology to use for a new company is a loaded question, they are 1000s of answers since it really depends on the budget, staff skill set, goals. etc.
True, thank you for your response. Would it make sense to pursuit Velociraptor for Disk Imaging, RAM collection, logs and more on a host, in which I can later respond and even check the RAM files with volatility or soemthing, as well as the disk image? I mean, should I go studying Velociraptor or, standalone cli apps for each of these general steps on DFIR?
Avatar
Has anyone encountered the RTT/TTY settings on an iPhone to be used in a malicious/stalking/monitoring case. A client had it setup in their phone unknowingly and I am trying to test ways where you would be able to see a real-time transcirpt of a phone conversation if you arent the indented receipient but use the 711 service to achieve this. If you have encountered this setting in a case please let me know. (edited)
12:05 PM
You can see these settings in the "Accessibiltity" area on an iPhone.
Avatar
Avatar
Minall
True, thank you for your response. Would it make sense to pursuit Velociraptor for Disk Imaging, RAM collection, logs and more on a host, in which I can later respond and even check the RAM files with volatility or soemthing, as well as the disk image? I mean, should I go studying Velociraptor or, standalone cli apps for each of these general steps on DFIR?
My recommendation for people just starting out is generally to start small. Focus on doing forensics and learning artifacts for a single machine. Use some of the free tools available for disk imaging and memory dumping. There are a lot of resources that have disk images, memory images, and triage data to practice with. Once you have a foundation with that then move to collecting and analyzing more at scale, with tools like Velociraptor.
Avatar
Thank you Cyberghost. I'll take a look to some resources
Avatar
I’d also add, try a couple tools against an artifact. Do they produce different results? Where is the data coming from? You’ll go so much further in your career if you learn more than just to push a button and accept what comes out.
💯 1
Avatar
Avatar
Minall
Thank you Cyberghost. I'll take a look to some resources
As far as some resources for test data, these are some great ones. https://github.com/AndrewRathbun/DFIRArtifactMuseum/tree/main (edited)
The goal of this repo is to archive artifacts from all versions of various OS&#39;s and categorizing them by type. This will help with artifact validation processes as well as increase access t...
💯 1
Avatar
Thank you very much, I’ll take a look
Avatar
spicy_caveman 10/3/2023 5:45 AM
How is AI playing into everyone's daily forensic life? I am enjoying having a fresh perspective to bounce ideas off of- albeit sometime inaccurate responses, but pretty solid overall.
Avatar
Avatar
spicy_caveman
How is AI playing into everyone's daily forensic life? I am enjoying having a fresh perspective to bounce ideas off of- albeit sometime inaccurate responses, but pretty solid overall.
It helps me and my terrible scripting skills by giving me just enough of a script to start with to accomplish what I want 😅 😃
💯 4
🚬 2
Avatar
Can anyone please point me to a tool for cable modem/router data acquisition? I don't have any experience with forensics on a router. I have performed lots of router software modification and such (for fun) - is anyone aware if the routers (specifically a Spectrum leased EN2251 will have some sort of log with previously connected MAC addresses? I can probably log into the router via admin account, but in my experience, the front end on most routers dont openly display a list of previously connected MAC addresses.
Avatar
Hey everyone. I have a question. If someone blocked their number before caing someone else (*67). Is there a way of determining that number through legal process? I seem to recall there wasn't, unless you already know the callers phone number. Curious if anyone has experience with this.
Avatar
Avatar
Neon
Hey everyone. I have a question. If someone blocked their number before caing someone else (*67). Is there a way of determining that number through legal process? I seem to recall there wasn't, unless you already know the callers phone number. Curious if anyone has experience with this.
I have heard that a CDR warrant to the target/victim number (the "someone else") should be able to get the original number that called them, even though it is blocked. However, I have not personally tried it. You could also ask in #cell-site-analysis as the question might get lost in this channel.
❤️ 1
Avatar
Avatar
Neon
Hey everyone. I have a question. If someone blocked their number before caing someone else (*67). Is there a way of determining that number through legal process? I seem to recall there wasn't, unless you already know the callers phone number. Curious if anyone has experience with this.
From my old telecom experience, the phone company switch can still see the phone number that is 'blocked' and there should be a log somewhere so legal process through the phone company should work (especially for cell phones, all that stuff is logged with the phone company for billing purposes). If this is a house line, the called person should initiate a 'harassing type' complaint to the phone company as soon as they get the blocked call and this flags the last number called to the complainant's line. The older phone switches kept the last number that called in memory which should still be accessible by the phone company via legal process... (edited)
❤️ 2
Avatar
Thank you both!
👍 1
Avatar
Danny_Kentucky 10/3/2023 2:51 PM
Hello everyone, I was hoping somebody could point me in a right direction with this question. Basically I have an qualifying exam that will let me join police academy for cybercrime prevention, I have attempted the exam once unfortunately failed missing few points. However, there was one task that just won't let me sleep at night. Scenario is this, there is a laptop, no internet connection, everything is done on locally. Laptops are running virtualBox with lubuntu installed on it. One of the tasks is to extract some data from a (fake) dark web website that runs on XAMPP, where you can by guns, drugs etc... example questions: 1. what is website administrator's email address 2. how many registered users are on the website. 3. which user bought ak-47 and so on. Now the question is how would I extract data like this? Tools that I have are Autopsy, Exiftool, Marble. I was thinking of exporting sql databases and running them through autopsy, but if mysql is password protected which I would assume it is then I cannot export it. There is an idea suggested by someone to try an sql injection attack to possibly access myphpadmin. What other ways could I do it. I have been on this question for a week now and I just cannot find any good answers
Avatar
According to intuition, but god damn i miss this stuff. during uni, the question would come under webserver forensics as indicated by 'XMAPP' I think it's best to narrow down the type of subject the question falls under. But I have no say in this. You'll get some good responses here (edited)
Avatar
randomaccess 10/3/2023 3:08 PM
Probably can suspend the VM and then collect it to USB and examine with a forensics tool pretty easy
Avatar
Avatar
Danny_Kentucky
Hello everyone, I was hoping somebody could point me in a right direction with this question. Basically I have an qualifying exam that will let me join police academy for cybercrime prevention, I have attempted the exam once unfortunately failed missing few points. However, there was one task that just won't let me sleep at night. Scenario is this, there is a laptop, no internet connection, everything is done on locally. Laptops are running virtualBox with lubuntu installed on it. One of the tasks is to extract some data from a (fake) dark web website that runs on XAMPP, where you can by guns, drugs etc... example questions: 1. what is website administrator's email address 2. how many registered users are on the website. 3. which user bought ak-47 and so on. Now the question is how would I extract data like this? Tools that I have are Autopsy, Exiftool, Marble. I was thinking of exporting sql databases and running them through autopsy, but if mysql is password protected which I would assume it is then I cannot export it. There is an idea suggested by someone to try an sql injection attack to possibly access myphpadmin. What other ways could I do it. I have been on this question for a week now and I just cannot find any good answers
The database would be my first focus. All of the answers to those questions are more than likely going to come out of the database. I would stay away from any active attack like a SQL injection, seems like this is more focused on forensics and doing an active attack is far different then forensics. If the exam expected you to solve the questions with the tools they provided and no internet connection, the database being password protected is probably getting ahead of yourself. That or the password would be somewhere.
👍 4
Avatar
Hi I'm considering getting a MacBook Air. If I do this, I will largely lose out on windows support. Is there a way to get around the anti-vm limitations of software like Belkasoft X and cellebrite?
3:24 PM
Better yet, do you guys have any recommendations on free/ low cost replacements for these software suites that run natively on M-series Macs? (edited)
Avatar
Actually question, maybe the least common question in the cybersecurity realm. How important is to excel spreadsheets for data analysis idk in regards to malicious data or web traffic of an IOC, idk maybe you guys have used pivot tables in excel and so on. (edited)
Avatar
Avatar
$CozyBear
Actually question, maybe the least common question in the cybersecurity realm. How important is to excel spreadsheets for data analysis idk in regards to malicious data or web traffic of an IOC, idk maybe you guys have used pivot tables in excel and so on. (edited)
Personally, I use Excel a lot, but when it comes to deeper analysis with a large data set I usually use another tool. Like importing the data (if possible) into Splunk or Elastic. That's just my personal take though, you can do a lot of fancy analysis with Excel and I know some people that do. Timeline Explorer is a great alternative to using Excel for analysis, lots of features specific to DFIR
👍🏾 1
Avatar
AstuteCoder 10/3/2023 10:35 PM
hi guys is there anyway to convert 16bit app to 32bit application?
Avatar
Avatar
CyberGhost
The database would be my first focus. All of the answers to those questions are more than likely going to come out of the database. I would stay away from any active attack like a SQL injection, seems like this is more focused on forensics and doing an active attack is far different then forensics. If the exam expected you to solve the questions with the tools they provided and no internet connection, the database being password protected is probably getting ahead of yourself. That or the password would be somewhere.
I agree with @CyberGhost here. Once you have the database file exported, you should be able to dive into the contents using something like Navicat (insert favorite db viewer). It’s not the same as accessing the db from the running darknet site. Much like you don’t need the windows logon password to dive into the folder structure of a drive, just use Encase etc.
👍 3
Avatar
Avatar
MeGaBiTe
I agree with @CyberGhost here. Once you have the database file exported, you should be able to dive into the contents using something like Navicat (insert favorite db viewer). It’s not the same as accessing the db from the running darknet site. Much like you don’t need the windows logon password to dive into the folder structure of a drive, just use Encase etc.
Andrew Rathbun 10/4/2023 4:13 AM
Navicat ftw!
💯 1
Avatar
Avatar
CyberGhost
Personally, I use Excel a lot, but when it comes to deeper analysis with a large data set I usually use another tool. Like importing the data (if possible) into Splunk or Elastic. That's just my personal take though, you can do a lot of fancy analysis with Excel and I know some people that do. Timeline Explorer is a great alternative to using Excel for analysis, lots of features specific to DFIR
I’m excited to see how the new integration of Python into Excel changes the analysis opportunities.
👍 1
Avatar
Avatar
MeGaBiTe
I’m excited to see how the new integration of Python into Excel changes the analysis opportunities.
Andrew Rathbun 10/4/2023 4:15 AM
Or the new ways to own a network 🙃
💯 1
Avatar
Avatar
FullTang
I have heard that a CDR warrant to the target/victim number (the "someone else") should be able to get the original number that called them, even though it is blocked. However, I have not personally tried it. You could also ask in #cell-site-analysis as the question might get lost in this channel.
This is correct, I've done it for cases were the burglary suspect would * 67 the residence to see if anybody was home and answer the phone prior to breaking in. The CDR shows the *67-555-555-1234 as the originating number. (edited)
💯 2
Avatar
Anyone know good tactics to help identify someone who is harassing via anonymous text/mail. Any bait ideas or sources to help identify the email/text sender.
Avatar
Avatar
theshark
Anyone know good tactics to help identify someone who is harassing via anonymous text/mail. Any bait ideas or sources to help identify the email/text sender.
You can look up who the carrier is of a number on various sites for free, but I would bet money it's one of the many text apps. You will have an uphill battle identifying them without a court order. You can try something like a Canary Token, but you would have to come up with a good way to get them to click on it https://canarytokens.org/generate#
Canarytokens is a free tool that helps you discover you’ve been breached by having attackers announce themselves. The tokens allow you to implant traps around your network and notifies you as soon as they are triggered.
👍 1
Avatar
Avatar
AstuteCoder
hi guys is there anyway to convert 16bit app to 32bit application?
Tldr: No (edited)
Avatar
Avatar
Rock3t
Tldr: No (edited)
Rewrite it 😂
😂 1
Avatar
Is there a way to check on an iPhone the status of the icloud sync backup status ? For icloud backup, you can go under the Device Backup.
6:51 AM
I did some searching and it does not appear to be a way on an iPhone
Avatar
Avatar
Jay528
Is there a way to check on an iPhone the status of the icloud sync backup status ? For icloud backup, you can go under the Device Backup.
Andrew Rathbun 10/5/2023 7:19 AM
Hey @Jay528 may wanna ask in #mobile-forensic-decoding if you haven't already
Avatar
I didn’t because it doesn’t appear to be decoding issue, but I’ll do that
Avatar
SpaceCowboy0310 10/5/2023 9:12 AM
First time poster, long time lurker. I do not mean to overstep any boundaries with this question, but some friends and I are working on a cyber startup. What would your average smartphone forensicator charge per hour? Or is there some other typical pricing model I should be aware of?
Avatar
Avatar
SpaceCowboy0310
First time poster, long time lurker. I do not mean to overstep any boundaries with this question, but some friends and I are working on a cyber startup. What would your average smartphone forensicator charge per hour? Or is there some other typical pricing model I should be aware of?
BourbonBuckeyeGuy 10/5/2023 10:55 AM
🤣 7
😂 3
Avatar
Avatar
SpaceCowboy0310
First time poster, long time lurker. I do not mean to overstep any boundaries with this question, but some friends and I are working on a cyber startup. What would your average smartphone forensicator charge per hour? Or is there some other typical pricing model I should be aware of?
BourbonBuckeyeGuy 10/5/2023 10:56 AM
Sorry, couldn’t resist…I’m sure you’ll get someone more constructive and professional than me. 🙂
Avatar
SpaceCowboy0310 10/5/2023 11:42 AM
I was too perfect to not. lol. Might I add that this is USD I am speaking to. Any quote is welcome, regardless. 🙂
👍 1
Avatar
A question on "exigency." Curious if anyone knows of any cases / case law / precedents related to the following question. A suspect in custody has called someone and asked them to wipe their phone remotely. The phone is in a faraday box. If the box (or faraday bag) is working correctly, I think there's no exigency to acquire that phone before a search warrant is written. But things don't always work as they are supposed to. And if you can't get the phone in airplane mode, and are using GrayKey to acquire the phone, and the GrayKey is not already set up in the faraday enclosure- there's risk when opening the box to connect the phone to GrayKey. So curious if anyone has been a part of or seen a case where something like this has already been litigated and what the outcome was. In California, given we have CalECPA, if the judge determines there was no actual exigency- all the data acquired has to be deleted. No chance of using it in the case. [Related- has anyone had a case like this where phone was dumped using the exigency exception, and then exigency was ruled against, and they simply got another warrant and re-dumped the phone and then could use it as evidence?]
Avatar
Avatar
Grok
A question on "exigency." Curious if anyone knows of any cases / case law / precedents related to the following question. A suspect in custody has called someone and asked them to wipe their phone remotely. The phone is in a faraday box. If the box (or faraday bag) is working correctly, I think there's no exigency to acquire that phone before a search warrant is written. But things don't always work as they are supposed to. And if you can't get the phone in airplane mode, and are using GrayKey to acquire the phone, and the GrayKey is not already set up in the faraday enclosure- there's risk when opening the box to connect the phone to GrayKey. So curious if anyone has been a part of or seen a case where something like this has already been litigated and what the outcome was. In California, given we have CalECPA, if the judge determines there was no actual exigency- all the data acquired has to be deleted. No chance of using it in the case. [Related- has anyone had a case like this where phone was dumped using the exigency exception, and then exigency was ruled against, and they simply got another warrant and re-dumped the phone and then could use it as evidence?]
Two thoughts. 1) Is there a faraday bag inside of the faraday box that you can put the phone into so that GK can be set up inside of the box? If there is no faraday bag inside the box, you might be able to quickly open the box, throw a bag in, and slam it closed, without the wipe command getting to the phone. (If the wipe command gets to the phone or fingers get smashed don't blame me! 🤣) Then you could put the phone in the bag and set up GK inside of the box while the phone is in the bag. 2) Have you contacted your DA to get their opinion on the situation?
👍 2
Avatar
Avatar
FullTang
Two thoughts. 1) Is there a faraday bag inside of the faraday box that you can put the phone into so that GK can be set up inside of the box? If there is no faraday bag inside the box, you might be able to quickly open the box, throw a bag in, and slam it closed, without the wipe command getting to the phone. (If the wipe command gets to the phone or fingers get smashed don't blame me! 🤣) Then you could put the phone in the bag and set up GK inside of the box while the phone is in the bag. 2) Have you contacted your DA to get their opinion on the situation?
Yes, luckily the first guy to touch it was our senior forensic guy and he put it in a faraday bag inside the faraday box for double protection. And it did allow us to get the GrayKey setup in the box and dump it successfully. So this time there was exigency as we didn't know if it would work or not, though think next time they'll have to wait for their SW to be written.
Avatar
Is there a way to view Kik messages on UFED 4PC? Shows that the app is installed on the device, just no messages.
Avatar
Avatar
Grok
A question on "exigency." Curious if anyone knows of any cases / case law / precedents related to the following question. A suspect in custody has called someone and asked them to wipe their phone remotely. The phone is in a faraday box. If the box (or faraday bag) is working correctly, I think there's no exigency to acquire that phone before a search warrant is written. But things don't always work as they are supposed to. And if you can't get the phone in airplane mode, and are using GrayKey to acquire the phone, and the GrayKey is not already set up in the faraday enclosure- there's risk when opening the box to connect the phone to GrayKey. So curious if anyone has been a part of or seen a case where something like this has already been litigated and what the outcome was. In California, given we have CalECPA, if the judge determines there was no actual exigency- all the data acquired has to be deleted. No chance of using it in the case. [Related- has anyone had a case like this where phone was dumped using the exigency exception, and then exigency was ruled against, and they simply got another warrant and re-dumped the phone and then could use it as evidence?]
Andrew Rathbun 10/5/2023 4:05 PM
Agreed with @FullTang this seems like a perfect scenario for someone with a law degree at the prosecutors office to drive the bus on
👍 1
4:06 PM
Especially since they're the ones who are going to be running with it if it ever makes it to a court room. Might as well get them involved right now to best (attempt to) avoid any potential legal technicalities
👍 1
Avatar
Avatar
Grok
A question on "exigency." Curious if anyone knows of any cases / case law / precedents related to the following question. A suspect in custody has called someone and asked them to wipe their phone remotely. The phone is in a faraday box. If the box (or faraday bag) is working correctly, I think there's no exigency to acquire that phone before a search warrant is written. But things don't always work as they are supposed to. And if you can't get the phone in airplane mode, and are using GrayKey to acquire the phone, and the GrayKey is not already set up in the faraday enclosure- there's risk when opening the box to connect the phone to GrayKey. So curious if anyone has been a part of or seen a case where something like this has already been litigated and what the outcome was. In California, given we have CalECPA, if the judge determines there was no actual exigency- all the data acquired has to be deleted. No chance of using it in the case. [Related- has anyone had a case like this where phone was dumped using the exigency exception, and then exigency was ruled against, and they simply got another warrant and re-dumped the phone and then could use it as evidence?]
In Arizona v Hicks, the SCOTUS ruled that copying evidence is not a search. It wasn’t in regards to digital data but I think it applies. I argue that phones always involve exigency. Data is always disappearing even if the phone is in a faraday box. Also if it powers off or reboots it may not be possible to get AC extraction.
👍 2
Avatar
Avatar
Grok
A question on "exigency." Curious if anyone knows of any cases / case law / precedents related to the following question. A suspect in custody has called someone and asked them to wipe their phone remotely. The phone is in a faraday box. If the box (or faraday bag) is working correctly, I think there's no exigency to acquire that phone before a search warrant is written. But things don't always work as they are supposed to. And if you can't get the phone in airplane mode, and are using GrayKey to acquire the phone, and the GrayKey is not already set up in the faraday enclosure- there's risk when opening the box to connect the phone to GrayKey. So curious if anyone has been a part of or seen a case where something like this has already been litigated and what the outcome was. In California, given we have CalECPA, if the judge determines there was no actual exigency- all the data acquired has to be deleted. No chance of using it in the case. [Related- has anyone had a case like this where phone was dumped using the exigency exception, and then exigency was ruled against, and they simply got another warrant and re-dumped the phone and then could use it as evidence?]
Personally, I still wait on a search warrant. But I’m seeing alot of agencies extract the data to prevent data loss. And then getting a search warrant before parsing it. I think it’s an easy articulation based on remote wiping and wear leveling.
👍 1
Avatar
Avatar
Joe Schmoe
In Arizona v Hicks, the SCOTUS ruled that copying evidence is not a search. It wasn’t in regards to digital data but I think it applies. I argue that phones always involve exigency. Data is always disappearing even if the phone is in a faraday box. Also if it powers off or reboots it may not be possible to get AC extraction.
I agree with Joe Schmoe’s statement even though my prosecutors don’t see it the same way. I’m not allowed to extract the data immediately as it is seized to preserve the contents even though remote wiping, wear leveling, garbage collection, vacuuming can all come into play with loss of the data as both Joe and DCS453. I keep telling them I have no problem waiting for a search warrant to look at the data or to refine what can be looked at, but it’s hard to do when the data has disappeared. They just don’t want to be the ones creating case law on it. 😂 (edited)
👍 1
Avatar
Avatar
houndineu
I agree with Joe Schmoe’s statement even though my prosecutors don’t see it the same way. I’m not allowed to extract the data immediately as it is seized to preserve the contents even though remote wiping, wear leveling, garbage collection, vacuuming can all come into play with loss of the data as both Joe and DCS453. I keep telling them I have no problem waiting for a search warrant to look at the data or to refine what can be looked at, but it’s hard to do when the data has disappeared. They just don’t want to be the ones creating case law on it. 😂 (edited)
Mine are not fully on board either but that’s the argument I’ve been making. I’m selective about the cases I do it on.
👍 1
5:32 AM
I do not dump a phone for a homicide if they are not in agreement first.
Avatar
Yeah, Ive moved from boots on the ground investigating and seizing the phones myself to being in a lab that doesn’t get them until they’re submitted with the search warrant or consent attached.
👍 1
Avatar
I posted a challenge involving an intentionally corrupted image in another server. One of the people there pointed out what they think to be an ImageUniqueID of "H12QSKF00SM H12QSKL01VA". They were confused (so am I) because they googled this value and a few other photos popped up with the same value in the ImageUniqueID tag. I checked some Exif documentation and found this tag doesn't have much about the entry.
👀 1
6:10 PM
Anyone familiar with this?
6:11 PM
My guess is that the Exif tool isn't getting the correct ImageUniqueID but some less unique value.
Avatar
anyone from @Elcomsoft available (for an apple watch extraction) ? (edited)
Avatar
Avatar
emilie_
anyone from @Elcomsoft available (for an apple watch extraction) ? (edited)
Sure! Send me DM or just ask right here.
👍 1
Avatar
Does anyone have a recommendation for software that can boot a windows image virtually? Looking for a way to interact with the OS like using a normal windows machine. Preferably in a way that doesn’t require a ton of coversions for the sake of time
Avatar
Avatar
Joe Schmoe
In Arizona v Hicks, the SCOTUS ruled that copying evidence is not a search. It wasn’t in regards to digital data but I think it applies. I argue that phones always involve exigency. Data is always disappearing even if the phone is in a faraday box. Also if it powers off or reboots it may not be possible to get AC extraction.
Interesting on Arizona vs Hicks. I just read up on the case. It seems had they simply looked at the Serial Numbers on the stereo without moving the stereo (which can be difficult, unless you have a flashlight and mirror) then they would have been good. But it sounds like it counted as a search because they moved the stereo equipment if I'm reading it right. What's interesting about this case though is that there was a Warrant already to obtain the phone we had in our possession, but we require a separate warrant then to acquire the data on it. So that probably makes it a little less white and black too. Would be interesting to see any other case law that might relate along the lines of "preservation" vs "search" when it comes to cell phone acquisitions, especially considering as I recall SCOTUS held even manipulation the phone's screen constituted a search. https://www.casebriefs.com/blog/law/criminal-procedure/criminal-procedure-keyed-to-weinreb/the-fourth-amendment-arrest-and-search-and-seizure/arizona-v-hicks/
Arizona v. Hicks Case Brief - Rule of Law: Only when a police officer had probable cause, not reasonable suspicion, could they invoke the "plain view"...
Avatar
Avatar
CasaJaguar
Does anyone have a recommendation for software that can boot a windows image virtually? Looking for a way to interact with the OS like using a normal windows machine. Preferably in a way that doesn’t require a ton of coversions for the sake of time
I use Forensic Explorer. It has a "Virtual Live Boot" option that I've used to do just that. Plus, it's one of the cheaper Forensic Programs I've found, and in tests it seems to be better at finding information than some of its competitors. Taking Magnet classes now to finally get trained using that, we'll see which I prefer after.
❤️ 2
🙏 1
Avatar
Thank you!
Avatar
Arsenal Image Mounter Pro is another option. AIM Pro can also bypass user passwords (DPAPI bypass) while decrypting saved browser passwords and other EFS objects.
💯 1
Avatar
Avatar
FullTang
Arsenal Image Mounter Pro is another option. AIM Pro can also bypass user passwords (DPAPI bypass) while decrypting saved browser passwords and other EFS objects.
Cool. Forensic Explorer will also bypass user passwords for some Windows Version too. When I got trained on it a couple years ago don't think it could bypass passwords on newest windows 10/11, but haven't tried it on one of those in the last couple years.
Avatar
Avatar
Grok
Cool. Forensic Explorer will also bypass user passwords for some Windows Version too. When I got trained on it a couple years ago don't think it could bypass passwords on newest windows 10/11, but haven't tried it on one of those in the last couple years.
Looks like it should do newer Windows too. https://getdataforensics.com/virtual-live-boot/
Virtual Live Boot Boot forensic image files and view electronic evidence in-situ in a forensically sound virtual environment. Boot both Windows (all versions) and Macintosh computers. Live Boot gives…
Avatar
I have used FEX, and from my experience AIM Pro is more stable. Last I knew FEX doesn’t have the same type of bypass of user passwords like AIM, as the FEX bypass doesn’t decrypt saved browser passwords, but maybe it has changed.
🍖 1
Avatar
There is a lot of confusion regarding Windows password bypass, Windows authentication bypass, and DPAPI bypass. Check out this old post: https://discord.com/channels/427876741990711298/427936091220344833/1004437420323905667
👍 4
Avatar
If you are just looking for a virtualization from an .E01 AIM Pro is better imo. If you want a software that can also perform analysis, FEX is the way to go. I like the options FEX has for carving and it’s fast to load up an .E01. Different tools for different uses.
👍 1
Avatar
If you want access to secrets (I.e. DPAPI-protected data), a “password bypass” won’t do it. You need the credentials or a DPAPI bypass. If you work in law enforcement and haven’t seen a DPAPI bypass, I recommend getting familiar with what’s possible with and without it.
👍 2
Avatar
Avatar
Arsenal
If you want access to secrets (I.e. DPAPI-protected data), a “password bypass” won’t do it. You need the credentials or a DPAPI bypass. If you work in law enforcement and haven’t seen a DPAPI bypass, I recommend getting familiar with what’s possible with and without it.
Short videos of various kinds of DPAPI bypasses are at https://vimeo.com/arsenalrecon.
👍 2
this 1
Avatar
Avatar
FullTang
Two thoughts. 1) Is there a faraday bag inside of the faraday box that you can put the phone into so that GK can be set up inside of the box? If there is no faraday bag inside the box, you might be able to quickly open the box, throw a bag in, and slam it closed, without the wipe command getting to the phone. (If the wipe command gets to the phone or fingers get smashed don't blame me! 🤣) Then you could put the phone in the bag and set up GK inside of the box while the phone is in the bag. 2) Have you contacted your DA to get their opinion on the situation?
I've been meaning to do some anecdotal testing on this - I am guessing it would depend on location and the surround signal strengths. My box has too much actual evidence in it to mess with but I wonder what the "time to wipe signal" would be.
Avatar
Avatar
Joe Schmoe
In Arizona v Hicks, the SCOTUS ruled that copying evidence is not a search. It wasn’t in regards to digital data but I think it applies. I argue that phones always involve exigency. Data is always disappearing even if the phone is in a faraday box. Also if it powers off or reboots it may not be possible to get AC extraction.
I think this is interesting due to the "recently deleted" album and the browsing history clock ticking away. I have been asking my prosectutors to weigh in on "protective downloads" but no one wan't to give me a straight answer yet.
Avatar
Avatar
Grok
Interesting on Arizona vs Hicks. I just read up on the case. It seems had they simply looked at the Serial Numbers on the stereo without moving the stereo (which can be difficult, unless you have a flashlight and mirror) then they would have been good. But it sounds like it counted as a search because they moved the stereo equipment if I'm reading it right. What's interesting about this case though is that there was a Warrant already to obtain the phone we had in our possession, but we require a separate warrant then to acquire the data on it. So that probably makes it a little less white and black too. Would be interesting to see any other case law that might relate along the lines of "preservation" vs "search" when it comes to cell phone acquisitions, especially considering as I recall SCOTUS held even manipulation the phone's screen constituted a search. https://www.casebriefs.com/blog/law/criminal-procedure/criminal-procedure-keyed-to-weinreb/the-fourth-amendment-arrest-and-search-and-seizure/arizona-v-hicks/
What's the case law regarding manipulating a screen constituting a search? Context would be important I think, was thwe manipulation to put airplane mode on or was it to look at a message notification?
Avatar
Avatar
whee30
What's the case law regarding manipulating a screen constituting a search? Context would be important I think, was thwe manipulation to put airplane mode on or was it to look at a message notification?
Here's one that seems to apply. In this case, officers sent a text message to a suspect's phone to check if he was the one they'd been texting. Because they had no warrant, the Ohio court of appeals ruled it was an unconstitutional search, even though all they did was verify a text (with known message) came through on that phone. And the Supreme Court denied to hear an appeal to this, thus holding that it was unconstitutional. https://www.apa.org/monitor/2022/01/jn (edited)
Salute 1
Avatar
Avatar
CasaJaguar
Does anyone have a recommendation for software that can boot a windows image virtually? Looking for a way to interact with the OS like using a normal windows machine. Preferably in a way that doesn’t require a ton of coversions for the sake of time
hyper-v
Avatar
marco_polo076 10/9/2023 4:41 PM
I have a pc question u keep getting this error code and need to know if it’s fixable
Avatar
Avatar
marco_polo076
I have a pc question u keep getting this error code and need to know if it’s fixable
What's your question?
Avatar
tactical_tupperware 10/10/2023 9:35 AM
Hello, I am looking for some help in a new role. I am a computer forensics teacher at a high school. We have advisory meeting with people in the field twice a year. All you would have to do is sit in on a "state of the program" meeting, sign off and give advice on what changes could be made to the program. If that interests you. Or you want to help in other ways, like being a guest speaker. Please reach out to me at mbates@scsd.us. Cheers!
👍 1
Avatar
Avatar
tactical_tupperware
Hello, I am looking for some help in a new role. I am a computer forensics teacher at a high school. We have advisory meeting with people in the field twice a year. All you would have to do is sit in on a "state of the program" meeting, sign off and give advice on what changes could be made to the program. If that interests you. Or you want to help in other ways, like being a guest speaker. Please reach out to me at mbates@scsd.us. Cheers!
Andrew Rathbun 10/10/2023 1:24 PM
you teach computer forensics at a high school? Which country are you in? That's wild to me
👍 1
Avatar
Avatar
Andrew Rathbun
you teach computer forensics at a high school? Which country are you in? That's wild to me
tactical_tupperware 10/10/2023 1:26 PM
United States
Avatar
Avatar
ryd3v
What's your question?
marco_polo076 10/10/2023 1:59 PM
So I keep getting deathcom error how can I fix it
Avatar
Sounds like a bad error. Does it have a code?
Avatar
And also what OS?
Avatar
Avatar
Grok
Here's one that seems to apply. In this case, officers sent a text message to a suspect's phone to check if he was the one they'd been texting. Because they had no warrant, the Ohio court of appeals ruled it was an unconstitutional search, even though all they did was verify a text (with known message) came through on that phone. And the Supreme Court denied to hear an appeal to this, thus holding that it was unconstitutional. https://www.apa.org/monitor/2022/01/jn (edited)
Interesting, thanks for the link! So causing the phone to react was the "search" it seems... certainly plenty of scenarios left to address with this. I've been operating under the premise that enabling airplane mode is fine, documenting what you see while en route to enabling airplane mode (bodycam being ideal) is fine but clicking on the screen just to check for notifications is certainly not okay. I have in the past called a number on a stolen cellphone to get it to ring in a house while doing a "knock and talk" at the front door. Though that's a different scenario since a suspect wouldn't have an expectation to privacy in a stolen device. Definitely interesting stuff to keep up on.
Avatar
Avatar
Andrew Rathbun
you teach computer forensics at a high school? Which country are you in? That's wild to me
Our local high schools here in Arizona sometimes have regular forensics clubs... blood, fingerprints etc., I guess it's a natural progression to start including this sort of topic. Pretty cool! School has so much more fun stuff now than when I went through.
Avatar
Morning all, this one is mainly for Law Enforcement UK, how are you all doing getting compliant with the new FSR issue 1? And how are you defining competency?.
Andrew Rathbun started a thread. 10/10/2023 9:46 PM
Avatar
Avatar
obi95
Morning all, this one is mainly for Law Enforcement UK, how are you all doing getting compliant with the new FSR issue 1? And how are you defining competency?.
Andrew Rathbun 10/10/2023 9:47 PM
@Law Enforcement [UK] please use the thread above to respond, if possible. Might help keep things organized better for this topic. Open to feedback if you don't like this though!
Avatar
Avatar
ryd3v
And also what OS?
marco_polo076 10/10/2023 10:56 PM
Windows 10 and its runs then blue screen
Avatar
Sounds maybe like malware? Maybe checkout the error code on Google to see if you can find it
Andrew Rathbun pinned a message to this channel. 10/11/2023 4:02 AM
Avatar
I'm looking to learn more about how I can timestamp / log changes of files. One person recommended md5 hashing of some sort - was wondering if someone could point me in the right direction in learning more about the best way to handle this. Ideally looking to be able to document when a item is changed, and even b whom if possible.
Avatar
Avatar
carook
I'm looking to learn more about how I can timestamp / log changes of files. One person recommended md5 hashing of some sort - was wondering if someone could point me in the right direction in learning more about the best way to handle this. Ideally looking to be able to document when a item is changed, and even b whom if possible.
If it’s Windows, you could setup file/folder auditing and it would be recorded to the event log. https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder
Apply audit policies to individual files and folders on your computer by setting the permission type to record access attempts in the security log.
👍 1
Avatar
This is for a project: Is dd'ing a drive using netcat valid?. I am, through a SSH tunnel, using dd=/dev/sda <- Which is the disk of my ec2 server, and then piping that to | nc localhost 9003, where in my main pc, I have nc -l 9003 > disk.image. This works and it gets transferred, problem being that I'm trying now to check the image with autopsy or sleuth kit and, I get cannot determine file system type every time
5:48 AM
So I wonder how should I check this...
Avatar
Avatar
Minall
This is for a project: Is dd'ing a drive using netcat valid?. I am, through a SSH tunnel, using dd=/dev/sda <- Which is the disk of my ec2 server, and then piping that to | nc localhost 9003, where in my main pc, I have nc -l 9003 > disk.image. This works and it gets transferred, problem being that I'm trying now to check the image with autopsy or sleuth kit and, I get cannot determine file system type every time
Can you show your actual command line? dd=/dev/sda isn't the correct usage. it should be dd if=/dev/sda
Avatar
Oh, yeah, sorry
5:54 AM
From my server, I used: sudo dd if=/dev/xvda status=progress | nc localhost 9003 And in my local, I used: nc -l 9003 > disk.image Actually, I think autopsy is opening it, I tried this serveral times since it finished and I accidentally inputted something and then C-c to finish the transferring, this time I C-c directly. Perhaps it got corrupted before?
Avatar
Avatar
AmNe5iA
Can you show your actual command line? dd=/dev/sda isn't the correct usage. it should be dd if=/dev/sda
Sorry for that lol
5:55 AM
Autopsy did openned differently right now... Perhaps it was that?
Avatar
Avatar
Minall
From my server, I used: sudo dd if=/dev/xvda status=progress | nc localhost 9003 And in my local, I used: nc -l 9003 > disk.image Actually, I think autopsy is opening it, I tried this serveral times since it finished and I accidentally inputted something and then C-c to finish the transferring, this time I C-c directly. Perhaps it got corrupted before?
So this is all being run on the 1 machine? If so, why are you using netcat? As a quick check i'd probably use head disk.image|xxd And see if it has MBR (protective MBR) structure as expected.
Avatar
Avatar
AmNe5iA
So this is all being run on the 1 machine? If so, why are you using netcat? As a quick check i'd probably use head disk.image|xxd And see if it has MBR (protective MBR) structure as expected.
Successful, it is a very large output
5:58 AM
And Capstone finished, now I can see the whole system
5:59 AM
I'm pretty impressed at the amount of data, so I was probably corrupting the file by adding something at the end accidentally
5:59 AM
This is being run in one machine.
6:03 AM
Wow, this is pretty powerful, I can see my whole system, yes, that was my issue. Now Autopsy works for me.
Avatar
Hi all, what software are you using for triaging CSAM exhibits? We use ADF currently but are curious as to what else there is available
Avatar
Avatar
Minall
Successful, it is a very large output
yeah maybe Ctrl-C after the first few sectors... (edited)
Avatar
Avatar
Minall
Successful, it is a very large output
The better command to use is probably head -c 1024 disk.image|xxd as this will only spit out the first 2 sectors. (edited)
Avatar
TheresAFewConors 10/12/2023 7:05 AM
Has anyone worked with MITRE on their evaluations assessment? I’m interested in doing it and curious what’s involved
Avatar
Avatar
AmNe5iA
yeah maybe Ctrl-C after the first few sectors... (edited)
Especifically, after dd finished, I would try to write ls to see if the shell was up, and then C-c. That was where it got corrupted
8:28 AM
Thank you very much for your help
Avatar
Anyone have luck repairing a corrupt MP4? The device shut off before the file finished writing. I tried recover_mp4. It almost works but the video and audio studder too much to be useful.
Avatar
digital Bowles 10/12/2023 3:49 PM
I’m working to justify the purchase of more storage. I keep a log of each device and size of collected data. I am looking for an excel formula to will calculate the TB, GB, MB, KB (and convert to one total).
Avatar
Avatar
digital Bowles
I’m working to justify the purchase of more storage. I keep a log of each device and size of collected data. I am looking for an excel formula to will calculate the TB, GB, MB, KB (and convert to one total).
Are all of the sizes you've recorded in bytes already or are they in various units?
Avatar
Avatar
Joe Schmoe
Anyone have luck repairing a corrupt MP4? The device shut off before the file finished writing. I tried recover_mp4. It almost works but the video and audio studder too much to be useful.
Figured it out after a lot of trial and error. In case anyone else needs it, this made it really easy. https://www.videohelp.com/software/MP4-Repair-untrunc-GUI.
6:33 PM
Had to try a couple different sample files before it worked perfectly. (edited)
Avatar
Avatar
mooseous
Are all of the sizes you've recorded in bytes already or are they in various units?
digital Bowles 10/12/2023 7:19 PM
Currently no. But moving forward that maybe a good idea. Convert it before entering it into my sheet.
Avatar
Yeah, then it would just be easy to divide repeatedly by 1000 or 1024 (gigabytes or gibibytes) for each of the units you want.
8:23 PM
I assume your input is like "10.3 GB" and "193 MB", if so, then the formula is more difficult.
8:23 PM
Unless there's some kind of built-in conversion for it
2:51 AM
Recently been doing this, thought I'd share.
Avatar
Avatar
obi95
Hi all, what software are you using for triaging CSAM exhibits? We use ADF currently but are curious as to what else there is available
DM me
Avatar
Deleted User 10/15/2023 12:18 AM
Has anyone ever been interested in "reversing" a modulated voice? Alternatively, does anyone know how to modulate a voice well to make it as difficult as possible for an attacker to reverse a given voice to its original form?
12:19 AM
I would appreciate any sources of knowledge about that
Avatar
can anyone help why error ocur $ sudo mount -o loop,offset=28672 evidenceA.dd /mnt/e01/ mount: /mnt/e01: wrong fs type, bad option, bad superblock on /dev/loop10, missing codepage or helper program, or other error.
Avatar
You may need to do this: losetup -f #reports first free loop device (e.g. /dev/loop0) losetup /dev/loop0 evidenceA.dd #create virtual disk from device
5:06 AM
Then: mount /dev/loop0 /mnt/e01
5:08 AM
If it’s a full disk image with multiple partitions change the losetup line to losetup -P /dev/loop0 evidenceA.dd then you mount partitions individually by doing mount /dev/loop0p0 /mnt/e01 (for the first partition). You may need to specify a file system type.
Avatar
Avatar
Heisenberg
can anyone help why error ocur $ sudo mount -o loop,offset=28672 evidenceA.dd /mnt/e01/ mount: /mnt/e01: wrong fs type, bad option, bad superblock on /dev/loop10, missing codepage or helper program, or other error.
In short though it’s telling you it doesn’t recognise the partition at offset 28672 so you either have that number wrong or you need to@manually specify a file system type with -t
5:09 AM
Also. Make sure you mount read only if that’s important!
Avatar
mmls says it 512
6:16 AM
then multpli by 56
Avatar
Avatar
Heisenberg
then multpli by 56
Use losetup -P as I suggested, each partition will come up as a node you can mount
9:07 AM
Also, are you sure your first partition starts at 0000000056?
Avatar
Avatar
Heisenberg
mmls says it 512
A couple of things: 1) Are you sure you're working with a raw (dd) image? If the sleuthkit was complied with EWF support, then mmls will read an E01, for example, and give you the correct offsets. But if you try and loop mount using those offsets and it's an EWF file, then it won't work. That MIGHT be happening here. Find out by running file evidenceA.dd. On my system it will identify an EWF file correctly.
Avatar
2) If it is actually a raw image, you can see what is at offset 28672 (512*56) by using dd and the file command. If the file command in (1) above returns a proper boot sector, then try and identify what you see at 28672 either with a hex viewer (xxd) or use this: dd if=evidenceA.dd bs=512 count=3 skip=56 | file -. I use a count of 3 because some file system signatures (like EXT) span multiple sectors.
Avatar
Avatar
5cary
A couple of things: 1) Are you sure you're working with a raw (dd) image? If the sleuthkit was complied with EWF support, then mmls will read an E01, for example, and give you the correct offsets. But if you try and loop mount using those offsets and it's an EWF file, then it won't work. That MIGHT be happening here. Find out by running file evidenceA.dd. On my system it will identify an EWF file correctly.
yes i am
9:06 PM
@5cary
Avatar
Avatar
Heisenberg
@5cary
Try specifying the file system type eg -t ntfs or -t exfat if it complains of unknown handler you’ll may need to install exfat utils (sudo apt-get install exfat-fuse exfat-utils)
Avatar
Avatar
busted4n6
Then: mount /dev/loop0 /mnt/e01
try kpartx -a /dev/loop0
Avatar
Avatar
busted4n6
Then: mount /dev/loop0 /mnt/e01
Actually just sudo kpartx -a EvidenceA.dd should work
this 1
Avatar
Avatar
AmNe5iA
Actually just sudo kpartx -a EvidenceA.dd should work
I forgot about that tool!
Avatar
Avatar
AmNe5iA
Actually just sudo kpartx -a EvidenceA.dd should work
3:43 AM
Avatar
Avatar
Heisenberg
Click to see attachment 🖼️
ls -l?
Avatar
Avatar
Heisenberg
@5cary
Running mmls is just showing that you have a boot sector in the first image. The output is not helpful to solving your issue. And it does NOT mean you are working with a raw image. mmls will recognize other formats that losetup will fail on. As mentioned above, the output of ls -l and perhaps stat evidenceA.dd would be useful (as would the dd and file commands I posted earlier).
Avatar
Avatar
Deleted User
I would appreciate any sources of knowledge about that
You can usually use a Pitchshifter on the obfuscated voice - poorly educated television editors will often just shift pitch. There is something that conforms the audio to a mask rendering it unable to be reverse engineered but do not see it being productive mentioning here.
Avatar
ForensicatorEC 10/16/2023 11:16 AM
Does anyone know if AXIOM 7.5 can recover deleted files from APFS? I know it wasn’t possible with version 6.4 and I’m using the same test media for 7.5 and don’t see anything. (edited)
Avatar
Anyone on from NYSP or NYPD? If so, dm me.
Avatar
Avatar
ForensicatorEC
Does anyone know if AXIOM 7.5 can recover deleted files from APFS? I know it wasn’t possible with version 6.4 and I’m using the same test media for 7.5 and don’t see anything. (edited)
If it's APFS I'd generally presume it's using file based encryption and wouldn't expect to ever recover permanently deleted files regardless of the software version.
Avatar
Avatar
ForensicatorEC
Does anyone know if AXIOM 7.5 can recover deleted files from APFS? I know it wasn’t possible with version 6.4 and I’m using the same test media for 7.5 and don’t see anything. (edited)
Sumuri Andrew 10/16/2023 12:54 PM
I agree with @Solec. It's not really a question for the version number of AXIOM or any other analysis suite. The way that Apple handles user data and files since the introduction of APFS during OS X makes deleted files mostly a non-starter for recovery. There isn't the same kind of capability for carving unallocated space anymore. One key aspect of APFS is its copy-on-write behavior, which can make it more difficult to recover deleted data. When a file is deleted, the space it occupied is immediately marked as free for reuse, and the original data blocks may be deallocated and overwritten quickly, making it challenging to recover files using traditional file carving techniques. Unallocated space is also shared on Apple devices, Apple combines unallocated space as free for use by any Volume on the same drive (so the Data (user volume), Recovery, Updates, etc they all have the same access to unused space) and dynamically expand to encompass what they need.
Avatar
Hello everyone I need help on a really important case please
2:06 PM
I am interning for thé cyber security department for the Nigerian police force and there aren’t a lot of resources or people experienced in this field
2:06 PM
We currently have a kidnapping case where the victims family is receiving phone call threats
2:07 PM
Can anyone walk me through steps where I could use the number to track them please
Avatar
@zach I read your medium article about manipulating event logs. I was able to figure out how to calculate the CRC32 for the Chunk Header, but cannot figure out how to calculate the CRC32 for the Event Records in the chunk. I identify what I believe is the first record in the chunk by the hex 2a 2a, and select everything until I reach the new ELFChnk. Could you provide any info on what I may be doing wrong?
Avatar
I have a really bad striped screw (tiny M2 SSD on board). The thing is toast, basically a smooth circle at this point. Can anyone recommend me something besides super gluing it or the bit and using any type of fill (rubberband, plastic bag, ive done it all) I need something new that is probably more involved. Please help.
Avatar
Avatar
theshark
I have a really bad striped screw (tiny M2 SSD on board). The thing is toast, basically a smooth circle at this point. Can anyone recommend me something besides super gluing it or the bit and using any type of fill (rubberband, plastic bag, ive done it all) I need something new that is probably more involved. Please help.
DeeFIR 🇦🇺 10/16/2023 5:44 PM
Do you have small needle nosed pliers? Grip on the side and turn (above the height of the SSD so you don’t scratch it)
Avatar
@DeeFIR 🇦🇺 it’s flush with the top so I can’t use em
Avatar
DeeFIR 🇦🇺 10/16/2023 5:50 PM
Pic?
Avatar
@DeeFIR 🇦🇺 I just put the case on for the night so that’ll have to wait. I think my only option is going to be cut a long line with a dremel or by hand and then use a flathead but damn
Avatar
DeeFIR 🇦🇺 10/16/2023 5:55 PM
Dremel 😬 any chance you can source a micro screw extractor?
👍🏻 1
Avatar
I would suggest carefully drilling it out with a drill bit in a screwdriver.
Avatar
Ok thanks. @DeeFIR 🇦🇺 this look decent Alden 4507P Grabit Micro Broken Bolt Extractor 4 Piece Kit - Small Bolt and Screw Remover - Made in the USA https://a.co/d/8g5aDjf
Micrograbit, Micro Power Screw Extractor Set, Contains P125, P164, P190 & P236, Will Extract Screw Sizes #5 Up To 1/4" Or M3 Up To M6, Drill & An Extractor In One Tool, Capable Of Drilling & Extracting Grade 8 & Stainless Steel, Worldwide Patents.
Avatar
Avatar
theshark
I have a really bad striped screw (tiny M2 SSD on board). The thing is toast, basically a smooth circle at this point. Can anyone recommend me something besides super gluing it or the bit and using any type of fill (rubberband, plastic bag, ive done it all) I need something new that is probably more involved. Please help.
Digitalferret 10/17/2023 2:40 AM
there's these from i-fixit https://www.ifixit.com/products/precision-screw-extractor-set , otherwise maybe a try attacking the retaining nut rather than the screw, depends on what or how it's fixed to the board. photo's? failing that a micro-engineering firm / real watch repair shop? (not the local key/shoe repair guy that fits batteries) (edited)
👍 1
2:41 AM
Avatar
For people in corporations, how are you getting remote collections from laptops? Are you pushing an agent? And if so how? via EDR or MDM or some other form?
Avatar
SQRLpanic2024 10/17/2023 12:25 PM
which channel will give the best info for forensics on Oculus Quest 2 VR headsets
Avatar
Avatar
stark4n6
For people in corporations, how are you getting remote collections from laptops? Are you pushing an agent? And if so how? via EDR or MDM or some other form?
Velociraptor, either agent or offline collector
1:55 PM
KAPE is good but requires the user to enter a command line and its best to keep it as foolproof as possible 🙂
1:56 PM
EDR can also help 🙂
Avatar
Avatar
stark4n6
For people in corporations, how are you getting remote collections from laptops? Are you pushing an agent? And if so how? via EDR or MDM or some other form?
F-response, Kape via EDR shell (edited)
Avatar
Avatar
stark4n6
For people in corporations, how are you getting remote collections from laptops? Are you pushing an agent? And if so how? via EDR or MDM or some other form?
A mix of F-Response and EDR. Mostly use F-Response to push their agent out and collect triage data. The thing I like about it is all the laptop needs is an internet connection, doesn't have to be on a VPN, etc. I have experimented with Velociraptor, also works well.
Avatar
Avatar
Fierry
KAPE is good but requires the user to enter a command line and its best to keep it as foolproof as possible 🙂
Andrew Rathbun 10/17/2023 2:33 PM
No it doesn't! Use batch mode! _kape.cli. All they have to do is run KAPE as admin and it'll execute whatever is in that file
2:33 PM
Never knew that existed 🙂
Avatar
Avatar
stark4n6
For people in corporations, how are you getting remote collections from laptops? Are you pushing an agent? And if so how? via EDR or MDM or some other form?
As hoc: Push an agent using AXIOM Cyber for machines on the network. We also have EDR for deployed machines.
💯 1
Avatar
Avatar
R3LL1K
@zach I read your medium article about manipulating event logs. I was able to figure out how to calculate the CRC32 for the Chunk Header, but cannot figure out how to calculate the CRC32 for the Event Records in the chunk. I identify what I believe is the first record in the chunk by the hex 2a 2a, and select everything until I reach the new ELFChnk. Could you provide any info on what I may be doing wrong?
Hey yeah I used 010 editor and did a similar thing to want you describe. Let me check my notes though and see if I did anything specific.
👍 1
Avatar
Does anyone have recommendations for faraday equipment? In particular an alternative to this https://mosequipment.com/products/mission-darkness-blockbox-lab-xl
PLEASE NOTE: Current lead time is 2 weeks. This product does not qualify for free domestic shipping. Mission Darkness BlockBox Lab XL - RF Enclosure for Mobile Device Analysis SKU: MDFB-BBL-XL-RJ45 The Mission Darkness™ BlockBox Lab XL offers the ultimate radio frequency (RF) shielding and hands-on accessibility for electroni...
Avatar
Avatar
stark4n6
For people in corporations, how are you getting remote collections from laptops? Are you pushing an agent? And if so how? via EDR or MDM or some other form?
Surge pushed via EDR. Can collect local to the device or have it streamed back to my machine or a cloud storage solution. Pretty versatile but doesn’t handle interrupted connections well
Avatar
andrew_case 10/18/2023 7:11 AM
I will be speaking at BSidesChicago in a few weeks. Please come say hi if you will be there: https://bsideschicago.org/yx/page-3/
Avatar
Hello ! Anyone available at Magnet Forensic for a quick question about Axiom ? thanks
Avatar
Avatar
Xenotype
Does anyone have recommendations for faraday equipment? In particular an alternative to this https://mosequipment.com/products/mission-darkness-blockbox-lab-xl
Do not buy Mission Darkness faraday boxes, we have several agencys that have them and they fail. They sent replacements and those fail also, they have issues. My 2 cents. (edited)
Avatar
Avatar
Xenotype
Does anyone have recommendations for faraday equipment? In particular an alternative to this https://mosequipment.com/products/mission-darkness-blockbox-lab-xl
We have Mission Darkness BlockBox have run it with GK inside, have done testing running two shielded cables one externally and one internally attached to GK, haven't had any issues. (edited)
Avatar
Avatar
DCSO
Do not buy Mission Darkness faraday boxes, we have several agencys that have them and they fail. They sent replacements and those fail also, they have issues. My 2 cents. (edited)
What issues have you experienced? Are you running it with GK internally? Are you using one or two shielded cables? Would be good to know. Thanks (edited)
Avatar
Avatar
DCSO
Do not buy Mission Darkness faraday boxes, we have several agencys that have them and they fail. They sent replacements and those fail also, they have issues. My 2 cents. (edited)
Thanks! We also have one of the older, smaller ones. The gripes I have with that one is the cramped size (we often need to juggle several devices at once), the window is very hard to see through on mobile phones and the gloves are horrendous when it comes to navigating the touch screen. The latter two becomes a liability when it comes to forensical soundness (accidentally hitting the wrong items in menus and such). MOS Equipment does emphasize that the screen on the XL has been greatly improved and they are now delivered with a stylus, so I am guessing it has been a common complaint. As for the cables, I haven't experienced any issues. But we are currently looking for alternatives (edited)
Avatar
Avatar
Xenotype
Does anyone have recommendations for faraday equipment? In particular an alternative to this https://mosequipment.com/products/mission-darkness-blockbox-lab-xl
FYI we have the newer BlockBox Lab XL, screen has been fine certainly could be larger and came with the stylus. Agreed, not a lot of room inside and have had to pre plan before putting devices with GK inside.
Avatar
Avatar
bhughes
FYI we have the newer BlockBox Lab XL, screen has been fine certainly could be larger and came with the stylus. Agreed, not a lot of room inside and have had to pre plan before putting devices with GK inside.
Thanks for the reply. My eyesight isn't great, as I am reluctantly turning into an old man, haha So I guess that and the fact that our new lab hasn't got a light switch for the ceiling, makes up for my issue with the screen.
8:23 AM
I tend to cover my head and the case with a jacket 😅
Avatar
Avatar
Xenotype
Thanks for the reply. My eyesight isn't great, as I am reluctantly turning into an old man, haha So I guess that and the fact that our new lab hasn't got a light switch for the ceiling, makes up for my issue with the screen.
I also am turning into an old man 🥸 so you are not alone 🤣
HappyBossMan 1
Avatar
Avatar
Xenotype
I tend to cover my head and the case with a jacket 😅
Digitalferret 10/18/2023 9:06 AM
exactly how i feel about phonecams / cameras without a viewfinder.
😂 1
Avatar
Can someone help me understand 'DoNetZip-io0mxx3a.tmp' within my Cellebrite report. I thought I password protected a reader report but instead got this. Is this just what the encryption looks like / how do I open it with the password I created ? Kinda confused on whether this is right or corrupted. @Cellebrite
Avatar
Avatar
theshark
Can someone help me understand 'DoNetZip-io0mxx3a.tmp' within my Cellebrite report. I thought I password protected a reader report but instead got this. Is this just what the encryption looks like / how do I open it with the password I created ? Kinda confused on whether this is right or corrupted. @Cellebrite
CLB-dan.techcrime 10/18/2023 12:12 PM
Sounds like it got corrupted or didn't complete the file properly -- and did you mistype? I think it should be DotNet (edited)
Avatar
Avatar
CLB-dan.techcrime
Sounds like it got corrupted or didn't complete the file properly -- and did you mistype? I think it should be DotNet (edited)
Possible. I will try again.
🤞 1
12:14 PM
Thanks
Avatar
Avatar
CLB-dan.techcrime
Sounds like it got corrupted or didn't complete the file properly -- and did you mistype? I think it should be DotNet (edited)
So it is still happening...but yes it was a typo. The .tmp file is 16 GB so seems like it has the contents but still can't see reader. All I did was password protect it in the security panel of the report creation.
Avatar
I'll just put it in a zip and encrypt it that way but weird this does not work correctly for me
📩 1
Avatar
Digitalferret 10/19/2023 3:43 AM
looking for help with Win11 BSOD repeat cycle. neighbours shiny new laptop, fresh install W11. all usual updates as and when. yesterday/today now in startup "your PC ran into problems" BSOD and will restart. Win starts ok, logs in ok,bottom right Alerts inc something about drivers before it crashes. PC co that supplied it are saying do a complete re-install. I've gone in via repair, tried uninstall last update, and another to no avail. sfc /scannow returns corrupt files found, will fix at next reboot. but still goes into the same cycle of BSOD. doesn't stay on long enough to check and disable startup items. ISTR someone mentioned going into UEFI settings? any other hints/tips/advice?
Avatar
Digitalferret 10/19/2023 4:39 AM
sorted: for anyone else. went in via repair screen. cmd console. listed updates. manually removed Oct updates. removed 2nd antivirus program another "helping friend" had put on there. removed 2nd "driver updater" that found its way in. delayed W updates max time til MS sort their shit out. told said neighbour to stop having so many "friends" helping him out, we're effectivel pissing on each others boots. for noiw: prob solved
Salute 2
Avatar
Avatar
Sumuri Andrew
I agree with @Solec. It's not really a question for the version number of AXIOM or any other analysis suite. The way that Apple handles user data and files since the introduction of APFS during OS X makes deleted files mostly a non-starter for recovery. There isn't the same kind of capability for carving unallocated space anymore. One key aspect of APFS is its copy-on-write behavior, which can make it more difficult to recover deleted data. When a file is deleted, the space it occupied is immediately marked as free for reuse, and the original data blocks may be deallocated and overwritten quickly, making it challenging to recover files using traditional file carving techniques. Unallocated space is also shared on Apple devices, Apple combines unallocated space as free for use by any Volume on the same drive (so the Data (user volume), Recovery, Updates, etc they all have the same access to unused space) and dynamically expand to encompass what they need.
ForensicatorEC 10/19/2023 8:04 AM
Thank you and @Solec for the info! This community is the best.
Avatar
ForensicatorEC 10/19/2023 8:13 AM
Has anyone encountered an issue with AXIOM (v7.5) not parsing data from .zip files? Prior to processing I ensured the option to search archives was selected with a max nested container depth of 5. So far, all of the .zip files I have in my test media (Windows 10 Enterprise) have not been parsed, I see them in the file system view, but there are no related artifacts associated with them. A search for the hash values associated with the files in these archives yielded negative results. I didn’t have this issue when testing version 6.4.
Avatar
^ @Magnet Forensics
Avatar
Avatar
ForensicatorEC
Has anyone encountered an issue with AXIOM (v7.5) not parsing data from .zip files? Prior to processing I ensured the option to search archives was selected with a max nested container depth of 5. So far, all of the .zip files I have in my test media (Windows 10 Enterprise) have not been parsed, I see them in the file system view, but there are no related artifacts associated with them. A search for the hash values associated with the files in these archives yielded negative results. I didn’t have this issue when testing version 6.4.
chriscone_ar 10/19/2023 8:20 AM
I’ll test that right now and report back.
Avatar
Avatar
chriscone_ar
I’ll test that right now and report back.
ForensicatorEC 10/19/2023 8:23 AM
Thanks! Also, I had quite a few exceptions when processing this image file and didn’t see the archives I’m looking at in the list of exceptions.
Avatar
Avatar
ForensicatorEC
Thanks! Also, I had quite a few exceptions when processing this image file and didn’t see the archives I’m looking at in the list of exceptions.
chriscone_ar 10/19/2023 8:29 AM
And this is the same image you've used for prior validation? No anti-virus software running or appropriate exceptions created, if so? Also, added different files to a ZIP, tossed in a hash list for some of the files in that ZIP. Processed and the files from the ZIP are categorized as expected and hash hits were tagged appropriately. (edited)
Avatar
Adam Cervellone 10/19/2023 8:35 AM
Any recommendations for free and trust worthy drive wiping tools?
Avatar
Avatar
Adam Cervellone
Any recommendations for free and trust worthy drive wiping tools?
Andrew Rathbun 10/19/2023 8:40 AM
I always used Eraser and it seemed to work fine for me 🤷
this 1
Avatar
Avatar
chriscone_ar
And this is the same image you've used for prior validation? No anti-virus software running or appropriate exceptions created, if so? Also, added different files to a ZIP, tossed in a hash list for some of the files in that ZIP. Processed and the files from the ZIP are categorized as expected and hash hits were tagged appropriately. (edited)
ForensicatorEC 10/19/2023 8:43 AM
It is the same image; however AXIOM needed the data ingested differently with v6.4 and v7.5. With 6.4 AXIOM could not decrypt the image (BitLocker encrypted) and said the recovery key was incorrect. So I had to mount the image with AIM, decrypt with the same recovery key given to AXIOM, and then capture an E01 of the “physical drive”. That decrypted image was then invested into AXIOM v6.4 and it processed successfully. With v7.5, AXIOM can now decrypt the image and processed with several hundred exceptions. None of the archive files I’ve checked were parsed.
Avatar
Avatar
chriscone_ar
And this is the same image you've used for prior validation? No anti-virus software running or appropriate exceptions created, if so? Also, added different files to a ZIP, tossed in a hash list for some of the files in that ZIP. Processed and the files from the ZIP are categorized as expected and hash hits were tagged appropriately. (edited)
ForensicatorEC 10/19/2023 8:46 AM
Magnet support was aware of the decryption issue when I tested 6.4. It was a known issues with the type of system that was encrypted, not all BitLockered systems are created equally and AXIOM just didn’t like this particular type of system. Though with my testing of v7.5, I was hopeful it would work.
Avatar
Is anyone aware of what happens when you encrypt a folder, but windows never prompts for a password or anything afterwards. I'm scared there is already one by default or maybe this is encryption without a password? If anyone can guide me on how to check this before I send it off - would be much appreciated. When I click encrypt in advanced options and apply no further dialogue box appears, and I know it used to but the folder icon indicated it is encrypted.
Avatar
Avatar
chriscone_ar
And this is the same image you've used for prior validation? No anti-virus software running or appropriate exceptions created, if so? Also, added different files to a ZIP, tossed in a hash list for some of the files in that ZIP. Processed and the files from the ZIP are categorized as expected and hash hits were tagged appropriately. (edited)
ForensicatorEC 10/19/2023 11:24 AM
I reprocessed the image in a separate case (this tool test I’m conducting has multiple items with differing OSs and file systems); it processed the archives this time. This is why tool tests are so important, thanks for your assistance!
👍🏻 1
Avatar
Avatar
theshark
Is anyone aware of what happens when you encrypt a folder, but windows never prompts for a password or anything afterwards. I'm scared there is already one by default or maybe this is encryption without a password? If anyone can guide me on how to check this before I send it off - would be much appreciated. When I click encrypt in advanced options and apply no further dialogue box appears, and I know it used to but the folder icon indicated it is encrypted.
Ross Donnelly 10/19/2023 1:06 PM
EFS encryption maybe, so tied to your Windows user account/password?
Avatar
BadgerBacon 10/19/2023 2:57 PM
This might be a touch long but here goes... I've taken over the Digital Forensics for my agency, we are a mid sized County Sheriff's Office in the South East US. I have two ICAC detectives that keep me well supplied with devices as well as a very proactive narcotics division and the general and homicde detectives. I currently I have GrayKey, Cellebrite (UFED4PC), and DataPilot. I have excellent use cases for each and have been happy with them. I have no computer forensic capabilities at this time, but see a definite use for it, especially realted to ICAC. GrayKey and UFED4PC are run off of a fairly capable computer and Datapilot Desktop lives on my Panasonic Toughbook to remain mobile. One of our generous Homicide detectives has taken it upon himself to purchase a Faraday bag for every detective on the floor, however I have no Faraday box or meaningful way to preserve the isolation after opening the bag other than a signal black hole I've found in our EOD truck in the garage... and thats clearly sketchy at best. I'm about to regain about $4k in my budget but I know full well its likely a use it or lose it type scenario. Whats my pitch(s) to the powers that be? Put it towards a larger bill for upgrading Cellebrite to Premium? Put it towards Pen Link (funding the rest from Narcotics seizures)? Add a new tool to the toolbox like Axiom to expand into computer capabilities? Purchase a Farady enclosure? I know this is a fairly simple description, but help the new guy out... where would you want to spend the money if you were me? Should be $4k and if putting towards a larger expense could maybe push up to $10k total (my 4k plus 6k from Narcotics)
Avatar
digital Bowles 10/19/2023 4:31 PM
I am just learning about .json files. I have a few reference OSNIT information. Is the a good source to open and view the information. I understand (believe) it is a program language but I have not gotten that advanced yet.
Avatar
Avatar
digital Bowles
I am just learning about .json files. I have a few reference OSNIT information. Is the a good source to open and view the information. I understand (believe) it is a program language but I have not gotten that advanced yet.
https://www.howtogeek.com/devops/what-is-json-and-how-do-you-use-it/ JSON is essentially structured text. You can view it using a text editor. It is useful because the structured nature of the data means a programmer can organize and access the data as needed.
JSON (JavaScript Object Notation) is a standardized format for representing structured data.
👆 1
Avatar
Avatar
BadgerBacon
This might be a touch long but here goes... I've taken over the Digital Forensics for my agency, we are a mid sized County Sheriff's Office in the South East US. I have two ICAC detectives that keep me well supplied with devices as well as a very proactive narcotics division and the general and homicde detectives. I currently I have GrayKey, Cellebrite (UFED4PC), and DataPilot. I have excellent use cases for each and have been happy with them. I have no computer forensic capabilities at this time, but see a definite use for it, especially realted to ICAC. GrayKey and UFED4PC are run off of a fairly capable computer and Datapilot Desktop lives on my Panasonic Toughbook to remain mobile. One of our generous Homicide detectives has taken it upon himself to purchase a Faraday bag for every detective on the floor, however I have no Faraday box or meaningful way to preserve the isolation after opening the bag other than a signal black hole I've found in our EOD truck in the garage... and thats clearly sketchy at best. I'm about to regain about $4k in my budget but I know full well its likely a use it or lose it type scenario. Whats my pitch(s) to the powers that be? Put it towards a larger bill for upgrading Cellebrite to Premium? Put it towards Pen Link (funding the rest from Narcotics seizures)? Add a new tool to the toolbox like Axiom to expand into computer capabilities? Purchase a Farady enclosure? I know this is a fairly simple description, but help the new guy out... where would you want to spend the money if you were me? Should be $4k and if putting towards a larger expense could maybe push up to $10k total (my 4k plus 6k from Narcotics)
Andrew Rathbun 10/19/2023 7:49 PM
Do you deal mostly with cell phones? If you're dealing with ICAC cases then surely computers are in play often, right?
Avatar
Avatar
BadgerBacon
This might be a touch long but here goes... I've taken over the Digital Forensics for my agency, we are a mid sized County Sheriff's Office in the South East US. I have two ICAC detectives that keep me well supplied with devices as well as a very proactive narcotics division and the general and homicde detectives. I currently I have GrayKey, Cellebrite (UFED4PC), and DataPilot. I have excellent use cases for each and have been happy with them. I have no computer forensic capabilities at this time, but see a definite use for it, especially realted to ICAC. GrayKey and UFED4PC are run off of a fairly capable computer and Datapilot Desktop lives on my Panasonic Toughbook to remain mobile. One of our generous Homicide detectives has taken it upon himself to purchase a Faraday bag for every detective on the floor, however I have no Faraday box or meaningful way to preserve the isolation after opening the bag other than a signal black hole I've found in our EOD truck in the garage... and thats clearly sketchy at best. I'm about to regain about $4k in my budget but I know full well its likely a use it or lose it type scenario. Whats my pitch(s) to the powers that be? Put it towards a larger bill for upgrading Cellebrite to Premium? Put it towards Pen Link (funding the rest from Narcotics seizures)? Add a new tool to the toolbox like Axiom to expand into computer capabilities? Purchase a Farady enclosure? I know this is a fairly simple description, but help the new guy out... where would you want to spend the money if you were me? Should be $4k and if putting towards a larger expense could maybe push up to $10k total (my 4k plus 6k from Narcotics)
I would suggest AXIOM is your best ‘bang for your buck’ as it gives you computer processing but also a second tool to process GK and UFED reads. You often find where one tool can’t, one tool can. You can also do cloud acquisition and process warrant returns. If you don’t have dedicated media grading software for your ICAC officers, the media explorer in AXIOM is pretty good. But the reality is you probably need all of the things you’ve mentioned to do the ‘basics’ these days… Be aware of the faraday bags, a colleague of mine tested some and found that the type that don’t have roll top openings tend to leak rf over time
Avatar
Avatar
digital Bowles
I am just learning about .json files. I have a few reference OSNIT information. Is the a good source to open and view the information. I understand (believe) it is a program language but I have not gotten that advanced yet.
You can also use the command line tool jq on Linux 🙂
4:38 AM
Hearing more and more noises on potential future subscriptions on Twitter/X. Are there other sources where people get valuable DFIR information shared by the community (besides this discord server 😉)
Avatar
Avatar
Fierry
Hearing more and more noises on potential future subscriptions on Twitter/X. Are there other sources where people get valuable DFIR information shared by the community (besides this discord server 😉)
Digitalferret 10/20/2023 7:08 AM
X, formerly known as a social media platform. Or survey said ❌ Eh. Huuuuuu.
Avatar
Avatar
BadgerBacon
This might be a touch long but here goes... I've taken over the Digital Forensics for my agency, we are a mid sized County Sheriff's Office in the South East US. I have two ICAC detectives that keep me well supplied with devices as well as a very proactive narcotics division and the general and homicde detectives. I currently I have GrayKey, Cellebrite (UFED4PC), and DataPilot. I have excellent use cases for each and have been happy with them. I have no computer forensic capabilities at this time, but see a definite use for it, especially realted to ICAC. GrayKey and UFED4PC are run off of a fairly capable computer and Datapilot Desktop lives on my Panasonic Toughbook to remain mobile. One of our generous Homicide detectives has taken it upon himself to purchase a Faraday bag for every detective on the floor, however I have no Faraday box or meaningful way to preserve the isolation after opening the bag other than a signal black hole I've found in our EOD truck in the garage... and thats clearly sketchy at best. I'm about to regain about $4k in my budget but I know full well its likely a use it or lose it type scenario. Whats my pitch(s) to the powers that be? Put it towards a larger bill for upgrading Cellebrite to Premium? Put it towards Pen Link (funding the rest from Narcotics seizures)? Add a new tool to the toolbox like Axiom to expand into computer capabilities? Purchase a Farady enclosure? I know this is a fairly simple description, but help the new guy out... where would you want to spend the money if you were me? Should be $4k and if putting towards a larger expense could maybe push up to $10k total (my 4k plus 6k from Narcotics)
I'll vote towards a faraday box to work inside of like the mission darkness blockbox xl or the Ramseyt STE6000 - I have both and prefer the Ramsey (more room for activites, sturdier build quality). The first time you open a faraday bag and lose the data inside that phone from a pending wipe command, you'll wish you had a box to open that bag inside of. Not sure what you're storing your data on long term but I also really enjoy my Synology NAS for quick access to old cases. Offsite backup is another thing entirely but a NAS and a box are my suggestions. You could do both under 10k.
Avatar
Avatar
BadgerBacon
This might be a touch long but here goes... I've taken over the Digital Forensics for my agency, we are a mid sized County Sheriff's Office in the South East US. I have two ICAC detectives that keep me well supplied with devices as well as a very proactive narcotics division and the general and homicde detectives. I currently I have GrayKey, Cellebrite (UFED4PC), and DataPilot. I have excellent use cases for each and have been happy with them. I have no computer forensic capabilities at this time, but see a definite use for it, especially realted to ICAC. GrayKey and UFED4PC are run off of a fairly capable computer and Datapilot Desktop lives on my Panasonic Toughbook to remain mobile. One of our generous Homicide detectives has taken it upon himself to purchase a Faraday bag for every detective on the floor, however I have no Faraday box or meaningful way to preserve the isolation after opening the bag other than a signal black hole I've found in our EOD truck in the garage... and thats clearly sketchy at best. I'm about to regain about $4k in my budget but I know full well its likely a use it or lose it type scenario. Whats my pitch(s) to the powers that be? Put it towards a larger bill for upgrading Cellebrite to Premium? Put it towards Pen Link (funding the rest from Narcotics seizures)? Add a new tool to the toolbox like Axiom to expand into computer capabilities? Purchase a Farady enclosure? I know this is a fairly simple description, but help the new guy out... where would you want to spend the money if you were me? Should be $4k and if putting towards a larger expense could maybe push up to $10k total (my 4k plus 6k from Narcotics)
Also - try to get with your local USSS office to get out to NCFI. Their courses will give you licenses to PA/Axiom for a year or two. I've found its easier to keep recurring budget items than to add new ones. Get it put in there during the year or two you don't need to actually spend it and then keep the line item when you do.
💯 2
Avatar
Avatar
Andrew Rathbun
Do you deal mostly with cell phones? If you're dealing with ICAC cases then surely computers are in play often, right?
BadgerBacon 10/20/2023 9:44 AM
Any computer they seize gets outsourced to another lab, I imagine we would seize more if we could run them in house (edited)
Avatar
This Belkasoft X for mobile forensics is actually fun. (edited)
Avatar
Avatar
BadgerBacon
Any computer they seize gets outsourced to another lab, I imagine we would seize more if we could run them in house (edited)
spicy_caveman 10/21/2023 6:35 AM
When I was active LEO- during a chat sting or pedo bust, we would seize the electronics after linking them as accessories/ vehicles to facilitate the felony. So we took the car they drove in to pick the "kid" up, the computer/tablet/phone in possession capable of communicating and "soliciting" the "kid". We would asset forefeiture them, and then resale them to fund forensic tools, drives, gear. So picture a nice chat bust with 10 arrests. that is 10 potential phones, 10 potential vehicles... adds up quickly. (almost forgot- it was also a great source for sandbox/ testing/ parts devices in lab) (edited)
💯 2
Avatar
Avatar
spicy_caveman
When I was active LEO- during a chat sting or pedo bust, we would seize the electronics after linking them as accessories/ vehicles to facilitate the felony. So we took the car they drove in to pick the "kid" up, the computer/tablet/phone in possession capable of communicating and "soliciting" the "kid". We would asset forefeiture them, and then resale them to fund forensic tools, drives, gear. So picture a nice chat bust with 10 arrests. that is 10 potential phones, 10 potential vehicles... adds up quickly. (almost forgot- it was also a great source for sandbox/ testing/ parts devices in lab) (edited)
Andrew Rathbun 10/21/2023 7:24 AM
To your last point, I made a post a long time ago about this same thing: https://discord.com/channels/427876741990711298/427877097768222740/560100381061808130 Lots of ways to source test devices!
Avatar
Ross Donnelly 10/22/2023 12:45 AM
Does anyone have any references for the PDF metadata tag <pdfx:SourceModified> - I've got an unexpected date here that doesn't match the usual modified tags, so trying to understand what might change this specific tag.
Avatar
Avatar
Ross Donnelly
Does anyone have any references for the PDF metadata tag <pdfx:SourceModified> - I've got an unexpected date here that doesn't match the usual modified tags, so trying to understand what might change this specific tag.
randomaccess 10/22/2023 1:39 AM
No matter you want to view, edit or annotate a pdf file, PDF X can make it with your needs. Free download and give it a try now.
Avatar
Avatar
randomaccess
Ross Donnelly 10/22/2023 1:42 AM
Thanks, will take a look. I was thinking it was more likely related to the PDF/X standard rather than specific software but definitely worth a try
Avatar
randomaccess 10/22/2023 1:42 AM
Just a guess that the pdf was edited or annotated
Avatar
Digitalferret 10/22/2023 2:48 AM
@Cellebrite & @Oxygen Forensics would you guys pop me a dm at some point forward pls? (edited)
📬 2
oxygen 1
Avatar
kladblokje_88 10/22/2023 6:03 AM
I would love to see the alert logic behind the analytics/rules that are being pushed into the defender products (defender for identity, endpoint, cloud etc etc). In sentinel there is a very nice way of doing so in the analytics tab, giving the rule developement team plenty of granularity. Does anyone know how to do this for defender?
Avatar
SkryptKiddie 10/22/2023 6:56 AM
cloud app security policies?
Avatar
Avatar
Ross Donnelly
Does anyone have any references for the PDF metadata tag <pdfx:SourceModified> - I've got an unexpected date here that doesn't match the usual modified tags, so trying to understand what might change this specific tag.
You can also find previous versions of the PDF by searching the hex. https://github.com/jjrboucher/PDF-Processing
Script to process PDF files. Contribute to jjrboucher/PDF-Processing development by creating an account on GitHub.
Avatar
blackrevan221 10/22/2023 9:52 AM
hello. im looking for some help in cleaning up an image of a license plate. am i in the right place
Avatar
Avatar
SkryptKiddie
cloud app security policies?
kladblokje_88 10/22/2023 10:32 AM
Not only MDC, also MDE, MDI etc etc
Avatar
Avatar
blackrevan221
hello. im looking for some help in cleaning up an image of a license plate. am i in the right place
Digitalferret 10/22/2023 10:32 AM
#dvr-multimedia-surveillance
this 1
Avatar
Hello, does anyone have a recommended reference/resource in doing AD DFIR? Questions that I typically have in mind are 1) How does the authentication work from workstation to DC(how about if there's multiple DC) 2) How to look for authentication attacks(token impersonation, kerberoast, etc.)
Avatar
Avatar
spaceman
Hello, does anyone have a recommended reference/resource in doing AD DFIR? Questions that I typically have in mind are 1) How does the authentication work from workstation to DC(how about if there's multiple DC) 2) How to look for authentication attacks(token impersonation, kerberoast, etc.)
i've got a quick link dump for your rabbit hole needs! https://tajdini.net/blog/forensics-and-security/pentest-windows-active-directory/ -> deep dive into AD concepts, but from a red team perspective, incredibly helpful to understand the flow of AD <-> client communications https://learn.microsoft.com/en-us/archive/blogs/pfesweplat/forensics-active-directory-acl-investigation -> AD Permissions, how to approach investigation from a forensics standpoint https://www.dataforensics.org/microsoft-active-directory/ -> NTDS forensics high level https://www.researchgate.net/publication/351088021_Traces_of_NTDS_dumps -> research paper on NTDS forensics https://www.splunk.com/en_us/blog/security/detecting-active-directory-kerberos-attacks-threat-research-release-march-2022.html -> splunk research on how to follow kerberos attacks (edited)
🐰 2
Avatar
@Magnet Forensics having lots of issues running portablecase on our machines. It intermittently freezes and is unrecoverable. It happens on our city managed (IT) machines, but not on my forensic workstations or non-IT laptops. I've been working with IT to try to resolve the issue with no luck so far. We initially thought it was our antivirus software interfering, but the issue still occurs even after completing uninstalling the antivirus software. Sometimes, the crash occurs as PortableCase is loading. Sometimes it occurs while examining the artifacts. For the last several weeks, we have been having this issue, consistently. (edited)
Avatar
Avatar
Ross Donnelly
Does anyone have any references for the PDF metadata tag <pdfx:SourceModified> - I've got an unexpected date here that doesn't match the usual modified tags, so trying to understand what might change this specific tag.
Ross Donnelly 10/23/2023 9:59 AM
Looks like PDFX tags are just application-defined tags with no presets, so comes down to whatever the application wants to write there https://exiftool.org/TagNames/XMP.html#pdfx
Avatar
Hi everyone, a neighboring agency is asking for help extracting data from a router. They are looking specifically any 'handshakes' with the router to determine who may have been at a home around the time of an incident. I have 0 experience or knowledge with routers and am wondering if any of you can direct me to any resources that provide info on this process or tools that would do it.
🍖 1
Avatar
Avatar
Cenizas
Hi everyone, a neighboring agency is asking for help extracting data from a router. They are looking specifically any 'handshakes' with the router to determine who may have been at a home around the time of an incident. I have 0 experience or knowledge with routers and am wondering if any of you can direct me to any resources that provide info on this process or tools that would do it.
Avatar
Avatar
Cenizas
Hi everyone, a neighboring agency is asking for help extracting data from a router. They are looking specifically any 'handshakes' with the router to determine who may have been at a home around the time of an incident. I have 0 experience or knowledge with routers and am wondering if any of you can direct me to any resources that provide info on this process or tools that would do it.
My understanding is the newer routers have the logging of devices by default to OFF. The user would have to interact with the router to ask it to log devices/connections. Years ago it was on by default but it transitioned away to be off when you purchased newer devices. Again just my 2 cents what we have seen in the wild.
Avatar
Good day! I am trying to generate some educational materials for my officers to follow; we are always floored at the creative ways devices are submitted to us.... as you can all sympathize. I am looking specifically for a few screen shots showing the following messages on Android lock screen "This device is managed by your organization" and "This device is managed by Android" . I have image-searched the web for screenshot examples and came up negative. Does anyone have some screenshots or other training materials i could repurpose and tweek (for Canadian police agencies) on seizing these devices. Hit me up on a PM and i will share my work email that way.
📬 1
Avatar
Avatar
Cenizas
Hi everyone, a neighboring agency is asking for help extracting data from a router. They are looking specifically any 'handshakes' with the router to determine who may have been at a home around the time of an incident. I have 0 experience or knowledge with routers and am wondering if any of you can direct me to any resources that provide info on this process or tools that would do it.
we use first forenscis router kit (https://www.firstforensics.com/) but dunno if they supply US
At First Forensics we use the newest technology and expertly trained staff to make the unfindable, findable. We create bespoke packages to train law enforcement in all things digital forensics and beyond.
Avatar
Thank you all for your responses!
Avatar
Black and White 10/25/2023 11:50 AM
What additional information is provided by populating a Registry Hive into SrumECmd?
11:51 AM
Contribute to EricZimmerman/Srum development by creating an account on GitHub.
Avatar
Avatar
Black and White
What additional information is provided by populating a Registry Hive into SrumECmd?
Andrew Rathbun 10/25/2023 1:41 PM
IIRC it's to resolve network-related information
Avatar
Avatar
Andrew Rathbun
IIRC it's to resolve network-related information
Black and White 10/25/2023 3:23 PM
Hmm @Eric Zimmerman
3:24 PM
I'm sure you know because you made it xd
Avatar
Eric Zimmerman 10/25/2023 3:24 PM
the source would show that but ya, network related stuff
Avatar
Black and White 10/25/2023 3:26 PM
Thanks
Avatar
Avatar
Black and White
Thanks
Eric Zimmerman 10/25/2023 3:27 PM
Contribute to EricZimmerman/Srum development by creating an account on GitHub.
🍻 1
Avatar
Anyone have recommendation as to what app to use for generating graphs/visualization for the findings? I aim to have similar output as with the ones from dfirreport for report/internal sharing purposes (edited)
Avatar
Avatar
spaceman
Anyone have recommendation as to what app to use for generating graphs/visualization for the findings? I aim to have similar output as with the ones from dfirreport for report/internal sharing purposes (edited)
Excalidraw is a virtual collaborative whiteboard tool that lets you easily sketch diagrams that have a hand-drawn feel to them.
🍻 2
8:33 PM
Is how I made this:
8:34 PM
And a ton lot more complicated ones but they come out looking really nice imo
Avatar
Avatar
spaceman
Anyone have recommendation as to what app to use for generating graphs/visualization for the findings? I aim to have similar output as with the ones from dfirreport for report/internal sharing purposes (edited)
randomaccess 10/25/2023 11:46 PM
@zach what's the name of the diagram tool again
👍 1
Avatar
Chris (Satu) 10/26/2023 12:31 AM
Anyone who can recommend a faraday bag brand that allows to operate capacitive touch screens through a see-through window? came across some brands that successfully shielded the phones but still allowed operating the phones but can't recall the brand(s) anymore and the bags from mission darkness, disklabs, ... don't provide that feature unless you pick the oversized versions like mission darkness blockbox touch.
Avatar
Avatar
spaceman
Anyone have recommendation as to what app to use for generating graphs/visualization for the findings? I aim to have similar output as with the ones from dfirreport for report/internal sharing purposes (edited)
Miro
Avatar
Is there a list of the roles? I know theres a lot, would be intersting to see
Avatar
Does any1 know what "IP addresses captured from friend events" actually mean in a legal request from snapchat?
Avatar
Avatar
spaceman
Anyone have recommendation as to what app to use for generating graphs/visualization for the findings? I aim to have similar output as with the ones from dfirreport for report/internal sharing purposes (edited)
we use xmind at thedfirreport
Salute 2
3:50 AM
that second one is mine 😛
Avatar
SkryptKiddie 10/26/2023 3:53 AM
fancy seeing you here Zach 🤣
👀 1
Avatar
Avatar
zach
we use xmind at thedfirreport
Andrew Rathbun 10/26/2023 8:34 AM
XMind is awesome. Very reasonably priced too
apple3 1
Avatar
Question for any LEA's out there, and any other vendors who handle exhibits - what are your agencies using for long term charging storage of phones? Individual lockers, locking charging carts, open shelving in an access controlled room, something else? I'm most interested in anyone who has found a good locker solution, especially if you can provide the vendor used and ballpark pricing as well.
Avatar
Hi! I am a student of Digital forensics and pursuing my bachelor's in it. Can someone suggest me some Digital Forensics related ideas for my Final year project?
Avatar
Avatar
Mr.Brown
Hi! I am a student of Digital forensics and pursuing my bachelor's in it. Can someone suggest me some Digital Forensics related ideas for my Final year project?
Digitalferret 10/26/2023 11:51 AM
maybe narrow it down a bit and repost in #training-education-employment
Avatar
Avatar
dfa_adam
Question for any LEA's out there, and any other vendors who handle exhibits - what are your agencies using for long term charging storage of phones? Individual lockers, locking charging carts, open shelving in an access controlled room, something else? I'm most interested in anyone who has found a good locker solution, especially if you can provide the vendor used and ballpark pricing as well.
One-person shop here. I use this for devices that don't have to live in a faraday box:
12:57 PM
Locking steel cabinet provides 2.4A USB charging, syncing, secure storage and cord management for up to 16 tablets and other USB devices. Recommended for education, office, commercial, retail, industrial and healthcare environments.
🔥 1
12:58 PM
and this is my monster faraday box that I have a large charging hub inside of:
12:58 PM
Saelig Company - Unique Electronics: oscilloscopes, spectrum analyzers, test and measurement, control products, dataloggers and USB serial converters
💯 1
Avatar
Avatar
whee30
and this is my monster faraday box that I have a large charging hub inside of:
Just wondering, how do you add a device to the box while keeping the devices in the box shielded? Do you put them in a bag or is there a secondary faraday compartment inside of the box?
Avatar
I have a bigass(tm) faraday bag by Mission Darkness that lives in the box. It's fiddly and inconvenient but it works. I have thought about trying to find a small shoebox-ish sized container to live inside the box as that would be easier but I haven't done that yet.
👍 1
2:18 PM
The process of unpluggin everything, putting it in the bag and then reversing it after the new device is inside is a PITA, but I haven't found any whitepapers about how long I have to quickly open the box and chuck in a device before everything else in there wipes...
Avatar
KyootyBella 10/26/2023 2:58 PM
Does anyone have a recommendation for a Faraday bag that actually properly cuts everything out? I have tested some models, but I always find a small hole
2:58 PM
Looking for a bag I can use daily
Avatar
Avatar
whee30
I have a bigass(tm) faraday bag by Mission Darkness that lives in the box. It's fiddly and inconvenient but it works. I have thought about trying to find a small shoebox-ish sized container to live inside the box as that would be easier but I haven't done that yet.
Makes sense, I wonder if you can order a box with a secondary compartment. They mention on the website that everything is custom, I just wonder how custom it can be.
Avatar
That would be an interesting idea, build a small compartment integral to the big one and accessible to the gloves. The one thing I've noticed with this box is that because it is so large, I can't reach every square inch of the inside. I wrote to them about getting longer gloves but they told me it's designed that way intentionally and that they don't have longer gloves. Otherwise, it has been a pleasure to use.
Avatar
Avatar
KyootyBella
Does anyone have a recommendation for a Faraday bag that actually properly cuts everything out? I have tested some models, but I always find a small hole
Back when I initially bought bag, I tested a bunch and landed on Silicon Forensics for price and performance. I have discovered you can't really rely on a brand entirely, manufacturing defects can cause one sample to be better than another. My process (though flawed due to sample size) was to buy one bag of each company I could find. Some bags didn't protect anything, some stopped 4G but not bluetooth, some stopped everything. Silicon Forensics was the least expensive variation in the "it works" category at the time. I now use the Mission Darkness blockbox bags that have the shielded USB port for through-charging. No complaints other than the price.
Avatar
Avatar
whee30
Back when I initially bought bag, I tested a bunch and landed on Silicon Forensics for price and performance. I have discovered you can't really rely on a brand entirely, manufacturing defects can cause one sample to be better than another. My process (though flawed due to sample size) was to buy one bag of each company I could find. Some bags didn't protect anything, some stopped 4G but not bluetooth, some stopped everything. Silicon Forensics was the least expensive variation in the "it works" category at the time. I now use the Mission Darkness blockbox bags that have the shielded USB port for through-charging. No complaints other than the price.
KyootyBella 10/26/2023 3:21 PM
Nice, you just doing "small" sleeves or having a backpack? Looking for options to keep my devices "off" when I am not using them
Avatar
Avatar
whee30
That would be an interesting idea, build a small compartment integral to the big one and accessible to the gloves. The one thing I've noticed with this box is that because it is so large, I can't reach every square inch of the inside. I wrote to them about getting longer gloves but they told me it's designed that way intentionally and that they don't have longer gloves. Otherwise, it has been a pleasure to use.
That’s weird that the gloves can’t reach everything inside as a design “feature”, feels more like a design flaw to me. I would get some tongs, one of those small toy grabbers, or otherwise put something in the box to make sure I could reach everything just in case, lol.
Avatar
Avatar
FullTang
That’s weird that the gloves can’t reach everything inside as a design “feature”, feels more like a design flaw to me. I would get some tongs, one of those small toy grabbers, or otherwise put something in the box to make sure I could reach everything just in case, lol.
My "reaching stick" is my stylus I keep in there for phone manipulation. They claimed it was because they didn't want me plugging stuff in to the power strip at the back with the gloves... seemed weird. I have a smaller box that I can reach the back just fine from them. I think it's far more likely they have one size of glove and that's what they use.
👍 1
Avatar
Avatar
KyootyBella
Nice, you just doing "small" sleeves or having a backpack? Looking for options to keep my devices "off" when I am not using them
The bags I use are typically tablet sized. I want room for an external battery or for the rare tablet that has a cell connection.
Avatar
Avatar
whee30
The bags I use are typically tablet sized. I want room for an external battery or for the rare tablet that has a cell connection.
KyootyBella 10/26/2023 3:56 PM
Hmm nice, well thanks for your knowledge, I'll have a check myself
Avatar
I will also suggest finding a bag with magnet closure. The folds are what make the seal and velcro wears out and catches on fabric
4:01 PM
Mission darkness bags also have a thumb snap to hold it shut which is nice
Avatar
anyone from @Cellebrite to answer some questions on PA ultra?
📬 1
Avatar
Avatar
dfa_adam
Question for any LEA's out there, and any other vendors who handle exhibits - what are your agencies using for long term charging storage of phones? Individual lockers, locking charging carts, open shelving in an access controlled room, something else? I'm most interested in anyone who has found a good locker solution, especially if you can provide the vendor used and ballpark pricing as well.
We have ordered one like a safe. But it is a individual build. It protects the outside in case of a fire inside and so on. There are charging ports inside. But i can not give you some information because it is not in the normal product catalogue and not public. It is like a prototype. (edited)
Avatar
Avatar
whee30
My "reaching stick" is my stylus I keep in there for phone manipulation. They claimed it was because they didn't want me plugging stuff in to the power strip at the back with the gloves... seemed weird. I have a smaller box that I can reach the back just fine from them. I think it's far more likely they have one size of glove and that's what they use.
We have someone in house that accidently touched the powerstrip with the gloves on, it gave quite the shock and left the gloves charred and a hole in them. (had to replace them) Afterwards I placed clear tape over the outlets that are not in use to prevent future incidents.
👀 4
Avatar
Avatar
obi95
Hi all, what software are you using for triaging CSAM exhibits? We use ADF currently but are curious as to what else there is available
We found ADF to be terrible as it misses so much particularly around social apps. Also the image size is not adjustable so its hard to view. Doesn't always detect phones........ I wouldn't waste my money buying it if it was me and we advised that to our management. We have often thrown ADF to one side as it's been rubbish and gone to the far better tool such as Cellebrite.
Avatar
I was told from someone who was told from someone (is this what is called "hearsay"?) that the boxes should be kept open (and thus devices should not be kept in them for long). Alledgedly because of wear and tear on the insulating foam between case and lid, but this seems counterintuitive to me. I mean: usually wear and tear comes from friction or kinetic forces - not from static pressure. The case in question was an older Ramsay box. Can anyone confirm or deny such claims? (edited)
Avatar
Avatar
DCSO
We have someone in house that accidently touched the powerstrip with the gloves on, it gave quite the shock and left the gloves charred and a hole in them. (had to replace them) Afterwards I placed clear tape over the outlets that are not in use to prevent future incidents.
That’s scary! I guess it makes sense given what they’re made of but it doesn’t change the fact that the smaller box gives plenty of reach. Probably a product of proportions.
Avatar
Avatar
Xenotype
I was told from someone who was told from someone (is this what is called "hearsay"?) that the boxes should be kept open (and thus devices should not be kept in them for long). Alledgedly because of wear and tear on the insulating foam between case and lid, but this seems counterintuitive to me. I mean: usually wear and tear comes from friction or kinetic forces - not from static pressure. The case in question was an older Ramsay box. Can anyone confirm or deny such claims? (edited)
It was explained to me that the seal will compress over time leaving gaps. It’s why mission darkness includes extra seals and gloves with their boxes. Not sure what else I’m supposed to do with them since I don’t have a faraday room to play in.
this 1
Avatar
Avatar
whee30
It was explained to me that the seal will compress over time leaving gaps. It’s why mission darkness includes extra seals and gloves with their boxes. Not sure what else I’m supposed to do with them since I don’t have a faraday room to play in.
Ahh compression, that makes sense. And that is also our problem - no faradayroom, hence the need for box(es) in the first place.
Avatar
Avatar
whee30
It was explained to me that the seal will compress over time leaving gaps. It’s why mission darkness includes extra seals and gloves with their boxes. Not sure what else I’m supposed to do with them since I don’t have a faraday room to play in.
Thanks, by the way
Avatar
Avatar
Xenotype
Thanks, by the way
Of course!
Avatar
I sent electronic evidence to Iron Mountain for Storage. Iron Mountain's website indicates Chain of Custody. But I am getting the run around trying to get COC. Has anyone recieved Chain of Custody documents from Iron Mountain ? Can you please DM me. (edited)
Avatar
Mohammed Alkharji 10/28/2023 7:46 AM
Hi everyone
7:46 AM
I’ve attended FOR500 in July 2018
7:47 AM
And did not study it yet
7:51 AM
Working with Endpoint Protection Solutions as Delivery Engineer requires me to know about normal Windows processes … etc, SANS FOR500, claim that the course has significant changes since 2018. I thought of going with EC-Council CHFI and combine it with FOR500.
7:51 AM
What are your thoughts about CHFI course in terms of quality of it?
Avatar
Avatar
Mohammed Alkharji
What are your thoughts about CHFI course in terms of quality of it?
It really depends. I can't speak on the CHFI itself, but I can say that the EC-Council and its certification are not well respected by some, but others its indifferent.
Avatar
Mohammed Alkharji 10/28/2023 11:43 AM
Since SANS courses is the most expensive Certs out there, what alternatives I can go for?
Avatar
Avatar
Mohammed Alkharji
Since SANS courses is the most expensive Certs out there, what alternatives I can go for?
Andrew Rathbun 10/28/2023 12:30 PM
Check out https://training.13cubed.com/ by @13Cubed
High quality, online, on-demand, and affordable digital forensics training courses from 13Cubed
12:31 PM
If you're looking for something similar to FOR500, definitely try that Windows course
💯 1
Avatar
I'm stuck in a conundrum. Let's say, hypothetically (it's not hypothetical) that I've got a tool with which I can access files from our enterprise. I can download suspicious files and upload them to a service that auto-analyzes them or places them in a sandbox for me to detonate. Unfortunately, our current practice is to download them directly onto our enterprise-connected workstations and then upload them onto our sandbox. How worried should I be about this practice? It feels really sketchy, but while some tools won't download files into a zipped format, so I don't know what else to do (edited)
Avatar
Black and White 10/28/2023 6:03 PM
This might be a little bit of a stretch, but are their any command line tools that can extract data purely from a Registry Transaction log? (edited)
Avatar
Avatar
Desert
I'm stuck in a conundrum. Let's say, hypothetically (it's not hypothetical) that I've got a tool with which I can access files from our enterprise. I can download suspicious files and upload them to a service that auto-analyzes them or places them in a sandbox for me to detonate. Unfortunately, our current practice is to download them directly onto our enterprise-connected workstations and then upload them onto our sandbox. How worried should I be about this practice? It feels really sketchy, but while some tools won't download files into a zipped format, so I don't know what else to do (edited)
I’d be very concerned by that, especially if one of those viruses was to activate unintentionally. Even with good security on the machines, it only takes one to bring it down. I’d suggest getting Cisco AMP as I think that automatically isolates anything suspicious and also allows you to see what happens in a sandbox environment. It would need to be installed across all your endpoints though and Cisco software isn’t exactly cheap but it’s an amazing tool for what you want to do. Not heard of any place which downloads suspicious files directly to a live machine for transfer to a sandbox. Do you have accreditation to 27001?
this 1
Avatar
Avatar
Desert
I'm stuck in a conundrum. Let's say, hypothetically (it's not hypothetical) that I've got a tool with which I can access files from our enterprise. I can download suspicious files and upload them to a service that auto-analyzes them or places them in a sandbox for me to detonate. Unfortunately, our current practice is to download them directly onto our enterprise-connected workstations and then upload them onto our sandbox. How worried should I be about this practice? It feels really sketchy, but while some tools won't download files into a zipped format, so I don't know what else to do (edited)
Is there an opportunity to choose the filename? If it’s Windows you might be able to rename it to .exe.txt and add an extra layer of security. As an aside, it’s pretty bad that that’s the standard practice, surely you should be doing this inside a VM? (edited)
Avatar
Avatar
Andrew Rathbun
If you're looking for something similar to FOR500, definitely try that Windows course
Mohammed Alkharji 10/29/2023 7:31 AM
I like the content but it’s kinda expensive, I don’t a real experience in DFIR, I need it to help me build EDR projects. I just need something that can build a strong forensics base (edited)
Avatar
Avatar
obi95
I’d be very concerned by that, especially if one of those viruses was to activate unintentionally. Even with good security on the machines, it only takes one to bring it down. I’d suggest getting Cisco AMP as I think that automatically isolates anything suspicious and also allows you to see what happens in a sandbox environment. It would need to be installed across all your endpoints though and Cisco software isn’t exactly cheap but it’s an amazing tool for what you want to do. Not heard of any place which downloads suspicious files directly to a live machine for transfer to a sandbox. Do you have accreditation to 27001?
To be completely honest, I'm not sure about which accreditations we've achieved. I haven't been in the organization (or cybersecurity in general) that long. It's a hard situation because it's an enormous enterprise, so having new tool installed or new permissions allotted is a big ask. There was some discussion of having questionable files saved directly to a USB thumb drive or encrypted SSD, but I honestly don't know if that's a permanent solution.
8:07 AM
The current idea some of us are going with is to save a suspicious file onto a USB stick, then open it up onto our forensics machine. But while that machine isn't directly on a network, it's attached to shared storage which is attached to machines which ARE on the network. And we delete files from the USB stick, but then we use the stick again. Honestly, the whole thing feels janky as hell.
Avatar
Avatar
Matt
Is there an opportunity to choose the filename? If it’s Windows you might be able to rename it to .exe.txt and add an extra layer of security. As an aside, it’s pretty bad that that’s the standard practice, surely you should be doing this inside a VM? (edited)
I wish we could do all this on VMs, but getting VMs onto the network and into our web-based toolset gets complicated. I'll ask about it this week, though, that seems like a much safer option than what we've currently got
Avatar
Yes it would be, definitely worth having that conversation
Avatar
We do have one tool that lets us collect files in a zipped format. Would that be considered safe to do on a workstation? My understanding is that a compressed file can't run until it's extracted
Avatar
Avatar
Desert
We do have one tool that lets us collect files in a zipped format. Would that be considered safe to do on a workstation? My understanding is that a compressed file can't run until it's extracted
Digitalferret 10/29/2023 11:30 AM
zip an exe. click on it and find out. never ever download suspicious files on to a work related environment. isolate isolate isolate
Avatar
Avatar
Desert
The current idea some of us are going with is to save a suspicious file onto a USB stick, then open it up onto our forensics machine. But while that machine isn't directly on a network, it's attached to shared storage which is attached to machines which ARE on the network. And we delete files from the USB stick, but then we use the stick again. Honestly, the whole thing feels janky as hell.
Digitalferret 10/29/2023 11:32 AM
Honestly, the whole thing feels janky as hell. it sounds it
Avatar
Can anyone give advice on how to write strong analysis and reports
Avatar
I'll be doing this soon time down the line for work, been asked to revise this but the resources are limited. How do you conduct network forensics on a BitTorrent network to track down criminal activities' well really specific type ones child pornography or piracy avaliable via torrent, That's my line of thinking of how it could be helpful in terms of LE. (edited)
5:19 AM
idk run the application and download the torrent and capture the traffic. I know would it be using https to encrypt data so mitmproxy will be used (edited)
Avatar
Avatar
$CozyBear
I'll be doing this soon time down the line for work, been asked to revise this but the resources are limited. How do you conduct network forensics on a BitTorrent network to track down criminal activities' well really specific type ones child pornography or piracy avaliable via torrent, That's my line of thinking of how it could be helpful in terms of LE. (edited)
Identifying torrent traffic and endpoints in itself is fairly trivial in Wireshark (unless if it's behind VPN). It is also for the most part possible to identify the software client used (via user agent string) and the file downloaded using the SHA1 hash of the seed.
5:34 AM
(sorry about the thread generation. Fumbled the keyboard)
Avatar
I was thinking that too, I mean the VPN wouldn't effect the IP address torrents itself because each torrent entails it's own public IP regardless of the VPN but I need to validate this and see the outcome with Wireshark and Mitmproxy (edited)
5:43 AM
idk xD
Avatar
I think you're right in validating it yourself. I think it wouldn't take a very complicated setup either.
5:47 AM
Problem with VPN is that it would be harder to identify as bittorent traffic in the first place, as it would all be encapsulated within Wireguard, for instance
👍🏾 1
Avatar
Yes only if my VPN was unintentionally turned on my endpoint😅 (edited)
Avatar
Avatar
Desert
We do have one tool that lets us collect files in a zipped format. Would that be considered safe to do on a workstation? My understanding is that a compressed file can't run until it's extracted
If you’re asking this question, as well as the previous one, on a network connected device, you shouldn’t be working with these files. This sounds like a nightmare and a bad situation waiting to happen.
💯 1
Avatar
anyone have a good book on file systems? Similar to File System Forensic Analysis book by Brian Carrier?
2:18 PM
reason I ask is the book is from 2005. Most of it is accurate but it's missing some recent technology stuff (such as SDD's, etc)
Avatar
Avatar
Cash
reason I ask is the book is from 2005. Most of it is accurate but it's missing some recent technology stuff (such as SDD's, etc)
Maybe the File Format Handbook might be of interest? Also listed two others since you mentioned SSDs. Practical Forensic Imaging, by Bruce Nikkel. Mobile Forensics - The File Format Handbook, by Christian Hummert & Dirk Pawlaszczyk. Upgrading and Repairing PCs 22E, by Scott Mueller. (edited)
👍 2
Avatar
kladblokje_88 10/31/2023 4:22 AM
Hi, I am looking for a job where I analyse malware on the regular
Avatar
Avatar
kladblokje_88
Hi, I am looking for a job where I analyse malware on the regular
Given that this is a DFIR-server, I'm not sure if this is the optimal place to look for malware analyst jobs. You could look in #dfir-job-postings , but I am guessing you'd get more specific answers on the Reverse Engineering server, recruiting section (hope invites are ok to be posted here, mods just delete if not) https://discord.gg/rtfm
Invite to join a server
Avatar
Avatar
Xenotype
Given that this is a DFIR-server, I'm not sure if this is the optimal place to look for malware analyst jobs. You could look in #dfir-job-postings , but I am guessing you'd get more specific answers on the Reverse Engineering server, recruiting section (hope invites are ok to be posted here, mods just delete if not) https://discord.gg/rtfm
kladblokje_88 10/31/2023 4:29 AM
Ye I was browsing through that section. Though not to most interesting jobs listed atm. Ty!
Avatar
@kladblokje_88 I'm not sure what jobs are currently posted, however, keep an eye on #dfir-job-postings - There may be some cyber analyst jobs in there from time to time.
👍 1
4:30 AM
Oh someone has already posted above... Apologies!
Avatar
kladblokje_88 10/31/2023 4:30 AM
Np
Avatar
Avatar
Xenotype
Given that this is a DFIR-server, I'm not sure if this is the optimal place to look for malware analyst jobs. You could look in #dfir-job-postings , but I am guessing you'd get more specific answers on the Reverse Engineering server, recruiting section (hope invites are ok to be posted here, mods just delete if not) https://discord.gg/rtfm
Thanks for sharing the discord link, I’ve added it to #associated-servers
✨ 2
Avatar
Original message was deleted or could not be loaded.
Wasn’t your question answered on the #computer-forensics channel?
Avatar
In digital forensics what kinds of jobs would be in the range of 150-200k? I see most at a lower salary and am curious if higher wages are for engineers vs examiners, 3 letter agencies rather than state/others, and big companies like FAANG vs smaller companies that actually specialize in DFIR.
Avatar
Consulting companies who work on Digital Forensics/Ediscovery/Cyber Incident matters at Director level and above
Avatar
Anyone have a favorite way to parse and visualize JSON location data from Google Takeout's?
12:43 PM
Easily parse location .json files provided by the Google Takeout service - GitHub - DovarFalcone/google-takeout-location-parser: Easily parse location .json files provided by the Google Takeout ser...
Avatar
Avatar
theshark
Anyone have a favorite way to parse and visualize JSON location data from Google Takeout's?
Doesnt Rleapp support Google Take Outs?
Avatar
needing some help with an apple icloud return. I'm running the bash script provided by Apple in linux, p7zip is installed, but the script is saying p7zip isnt installed and the prerequisite check failed.
1:47 PM
i'm looking at the script. it's looking for 7z, but in debian, the package installed is p7zip, not "7z". apt-get install 7z returns with package not found
1:48 PM
heh. disregard.
1:48 PM
p7zip-full is the package i was looking for
1:49 PM
and now that the dependencies are installed, the script provided by apple is indicating "Unknown archive type in the input file:"
1:55 PM
...and disregard - syntax error. I have obtained much success.
👍 3
Avatar
Avatar
Leonidas
needing some help with an apple icloud return. I'm running the bash script provided by Apple in linux, p7zip is installed, but the script is saying p7zip isnt installed and the prerequisite check failed.
DM you
Avatar
@Cellebrite - looking in my trace window and see “user database corrupted” at the top with a red x. Software seems to be working, any idea what I did or should do?
📬 1
Avatar
Avatar
DCSO
DM you
replied. thanks.
Avatar
Avatar
theshark
Anyone have a favorite way to parse and visualize JSON location data from Google Takeout's?
in case anyone was intersted, this is a neat project to get a quick visualization https://koryp.github.io/Google-Location-History-Parser/
12:07 PM
Just dump the sematic location JSON data in and it plots it, still trying to get the CSV generation to work so I can get the xact lat/longs
Avatar
Where can I go to update my role in this server?
Avatar
https://tenor.com/view/question-asking-question-mark-dwight-schrute-the-office-gif-16512390 Does anybody know DFIR mastodon servers and has addresses? BR (edited)
Avatar
Avatar
schoesi
https://tenor.com/view/question-asking-question-mark-dwight-schrute-the-office-gif-16512390 Does anybody know DFIR mastodon servers and has addresses? BR (edited)
this is the one I am aware of: https://infosec.exchange/
A Mastodon instance for info/cyber security-minded people.
Avatar
Avatar
tclahr
this is the one I am aware of: https://infosec.exchange/
since it is Mastodon and you can follow anyone from other instances, there is also https://ioc.exchange
INDICATORS OF COMPROMISE (IOC) InfoSec Community within the Fediverse. Newbies, experts, gurus - Everyone is Welcome! Instance is supposed to be fast and secure.
👏🏼 1
Avatar
Avatar
Swiz
In digital forensics what kinds of jobs would be in the range of 150-200k? I see most at a lower salary and am curious if higher wages are for engineers vs examiners, 3 letter agencies rather than state/others, and big companies like FAANG vs smaller companies that actually specialize in DFIR.
spicy_caveman 11/5/2023 6:23 AM
malware reverse engineers, eDiscovery Forensic Lead, Cyber Threat Hunter- Lead, Bug Bounty Hunt- Lead... it goes on, and on.
Avatar
X BVVBCC CXA / 3@3-0PRZXDFXC
Avatar
Avatar
florus
Doesnt Rleapp support Google Take Outs?
yep! I've worked on a lot of the parsers
Avatar
Avatar
whee30
and this is my monster faraday box that I have a large charging hub inside of:
We just got that Large Faraday box in a couple weeks back. Haven't quite set it up yet, took at least a week to vent that horrible Chemical Pineapple smell coming form it, probably all the plasticizers and other chemicals off gassing. It's tolerable now. Super expensive though.
Avatar
Yes but you have so much room for activities now!
😂 4
Avatar
Avatar
whee30
Yes but you have so much room for activities now!
😂 3
Avatar
Avatar
Mothra
Where can I go to update my role in this server?
#deleted-channel
Avatar
nachito 4n6s 11/7/2023 4:29 AM
Anyone from @Magnet Forensics available for a quick question?
📬 1
Avatar
Avatar
spicy_caveman
malware reverse engineers, eDiscovery Forensic Lead, Cyber Threat Hunter- Lead, Bug Bounty Hunt- Lead... it goes on, and on.
what differentiates a Cyber Threat Hunter from a [SOC]Analyst? i think threat hunting is what i want to settle into but everything I see uses two interchangeably
Avatar
Avatar
TaiCrunch
what differentiates a Cyber Threat Hunter from a [SOC]Analyst? i think threat hunting is what i want to settle into but everything I see uses two interchangeably
spicy_caveman 11/7/2023 8:34 AM
Totally depends on the employer, could be hybrid of both.
Avatar
Hi all. How is everyone dealing with Bluetooth Low Energy (BLE) devices and location tracking while powered off? Discussions are ongoing with correct precautions to take, but if anyone had any particular advice or practices they do to help with this it would be great to know.
Avatar
Avatar
Phillips
Hi all. How is everyone dealing with Bluetooth Low Energy (BLE) devices and location tracking while powered off? Discussions are ongoing with correct precautions to take, but if anyone had any particular advice or practices they do to help with this it would be great to know.
Regarding stalking implications, we recommend a good faraday bag from location of incident back to PD and then proper shielding practices. Last thing you want is a breadcrumb trail back to PD for suspect before you even know who they are. For phones taken as evidence... the same except I really don't care if they know I have it. My involvement is almost never a surprise to the folks I deal with.
Avatar
Could someone from @Magnet Forensics and @Cellebrite please pop me a message if you get a chance? Thanks! 🙂
📬 1
Avatar
hello everyone, i would like to know if you could provide me some reading material, in case of a possible use of digital forensics incident investigation. something like the "perfect" way. thank you
Avatar
No such thing as the perfect way. However there is an organization that makes best practice documents. https://www.swgde.org/documents/published-complete-listing
The following documents have completed the required comment period and are considered final releases. All documents are considered living documents - updates are periodically made at which time they are released for an additional comment period if changes were substantive. All versions are
👍 1
5:11 AM
@Woob ^
Avatar
Avatar
Jobbins
@Woob ^
awesome ! ❤️ thank you sir (edited)
Avatar
Can anyone help me find power up cables for old phones those you connect to the + and - on the phone
Avatar
Avatar
Arlakossan
Can anyone help me find power up cables for old phones those you connect to the + and - on the phone
search for mtk boot cable, or all boot cable, the one with switches on it
Avatar
Avatar
Arcain
search for mtk boot cable, or all boot cable, the one with switches on it
Always here to help, thanks Arcain 🙂Salute
Avatar
Avatar
theshark
Anyone have a favorite way to parse and visualize JSON location data from Google Takeout's?
Here is another resource for parsing the locations from Google Takeout: https://github.com/Scarygami/location-history-json-converter I was able to parse a big location file (with more de 1 million points) and then load, visualize, filter, report it using the Qgis app from the free OSGeoLive virtual machine (https://live.osgeo.org/en/index.html). It's a complex GIS software and thus not easy to use, but it can easily handle large datasets and it offers a lot of spatial analysis tools (joins, intersections (for example with city limits), buffers, filtering, classification, labeling, distance/areas measurements etc.)
Convert the Location History JSON File from Google Takeout into a useable format - GitHub - Scarygami/location-history-json-converter: Convert the Location History JSON File from Google Takeout int...
Avatar
Avatar
Cip
Here is another resource for parsing the locations from Google Takeout: https://github.com/Scarygami/location-history-json-converter I was able to parse a big location file (with more de 1 million points) and then load, visualize, filter, report it using the Qgis app from the free OSGeoLive virtual machine (https://live.osgeo.org/en/index.html). It's a complex GIS software and thus not easy to use, but it can easily handle large datasets and it offers a lot of spatial analysis tools (joins, intersections (for example with city limits), buffers, filtering, classification, labeling, distance/areas measurements etc.)
thank you!
Avatar
Hello, I would like to know if there is a way to identify the iOS version on an iPhone for which I don't know the password?
Avatar
Avatar
0M364
Hello, I would like to know if there is a way to identify the iOS version on an iPhone for which I don't know the password?
Andrew Rathbun 11/10/2023 6:09 AM
Would suggest asking in either #mobile-forensic-extractions or #mobile-forensic-decoding
Avatar
Avatar
Andrew Rathbun
Would suggest asking in either #mobile-forensic-extractions or #mobile-forensic-decoding
Ok 👍 thanks !
Avatar
hello everyone, ive got an emtpy 128gb stick, and try to generate md5/sha256 it takes hours, why ?
Avatar
maybe because it's 128Gb and it's slow because of the stick, or the usb port or your cpu is slow, any combination of the two, but I'm just guessing here
Avatar
Avatar
ryd3v
maybe because it's 128Gb and it's slow because of the stick, or the usb port or your cpu is slow, any combination of the two, but I'm just guessing here
usb3 in both cases
Avatar
Avatar
Woob
hello everyone, ive got an emtpy 128gb stick, and try to generate md5/sha256 it takes hours, why ?
I’d check to see if it cpu or I/O bound. Even if the stick is empty, it still needs to be read from start to finish. It has to read the entire 128Gb to generate the hash.
Avatar
Avatar
Beercow
I’d check to see if it cpu or I/O bound. Even if the stick is empty, it still needs to be read from start to finish. It has to read the entire 128Gb to generate the hash.
ye i understand, i shredded everything to erase 100%, it took 30 minutes with md5 the stick hasnt been mounted, i guess that expands the time as well
Avatar
Hello, I have to do a report from a compromission of an host, what is the more interesting: a chronological analysis of the attack or of the analysis done ?
Avatar
Avatar
K8pl3r
Hello, I have to do a report from a compromission of an host, what is the more interesting: a chronological analysis of the attack or of the analysis done ?
Andrew Rathbun 11/12/2023 5:23 AM
Timeline analysis can tell a story as to what happened A-Z on the host, so I'd start there, personally.
Avatar
Avatar
Andrew Rathbun
Timeline analysis can tell a story as to what happened A-Z on the host, so I'd start there, personally.
Okay, thanks for the advice 😇
Avatar
National Security Agency 11/12/2023 7:43 AM
Evening
👋 1
Avatar
Be sure to consider audience as well, is this intended for Management or Executives or thorough technical examination for the people in the trenches (or student exam)? (edited)
💯 1
Avatar
This will undoubtedly encourage more piracy through the use of third party addons developed by pirate developers. (edited)
Avatar
Avatar
$CozyBear
This will undoubtedly encourage more piracy through the use of third party addons developed by pirate developers. (edited)
spicy_caveman 11/12/2023 7:48 PM
Where we will, we roam.
Avatar
Avatar
spicy_caveman
Where we will, we roam.
And others sail on the sea With the keys to the cage (edited)
8:48 PM
if you get what I mean😉 . Pirates are exploit CDNs to steal decryption keys from CDNs, (edited)
Avatar
@Andrew Rathbun Hello, I have a question about Kape. Im just getting started with using it. I downloaded the zip sent by Kroll and I see 2 "Get-KAPEUdate.ps1" files. Is it ok to delete the older modified one? Also, I wached your KAPE Official Demo on Youtube. In the Update Kape section you mention using "KAPE-EZToolsAncillaryUpdater.ps1" to update everything, where can I get that file?
Avatar
Avatar
R3LL1K
@Andrew Rathbun Hello, I have a question about Kape. Im just getting started with using it. I downloaded the zip sent by Kroll and I see 2 "Get-KAPEUdate.ps1" files. Is it ok to delete the older modified one? Also, I wached your KAPE Official Demo on Youtube. In the Update Kape section you mention using "KAPE-EZToolsAncillaryUpdater.ps1" to update everything, where can I get that file?
Andrew Rathbun 11/13/2023 11:17 AM
1. The only Get-KAPEUpdate.ps1 file you need is the one sitting next to kape.exe. 2. https://github.com/AndrewRathbun/KAPE-EZToolsAncillaryUpdater is where you can get that Updater script. Just put it next to kape.exe and Get-KAPEUpdate.ps1. Ping me with any issues!
A script that updates KAPE (using Get-KAPEUpdate.ps1) as well as EZ Tools (within .\KAPE\Modules\bin) and the ancillary files that enhance the output of those tools - GitHub - AndrewRathbun/KAPE-EZ...
Avatar
Avatar
Andrew Rathbun
1. The only Get-KAPEUpdate.ps1 file you need is the one sitting next to kape.exe. 2. https://github.com/AndrewRathbun/KAPE-EZToolsAncillaryUpdater is where you can get that Updater script. Just put it next to kape.exe and Get-KAPEUpdate.ps1. Ping me with any issues!
Thank you. Any idea why a newly modified version of the Kape Update ps1 is being distributed with the zip? Comparing both files, the main differences are in the signature block, which are commented out anyway.
Avatar
Avatar
R3LL1K
Thank you. Any idea why a newly modified version of the Kape Update ps1 is being distributed with the zip? Comparing both files, the main differences are in the signature block, which are commented out anyway.
Andrew Rathbun 11/13/2023 11:23 AM
Looks like the newer one is outside of the KAPE folder, so probably use that one. I'll raise the issue with Eric and see what's up with that
Avatar
Awesome thank you.
Avatar
Andrew Rathbun 11/13/2023 11:47 AM
@R3LL1KEric fixed this, you can redownload it now, if you want
Avatar
Avatar
Andrew Rathbun
@R3LL1KEric fixed this, you can redownload it now, if you want
No need, just moved the newer file into the kape folder. I also added your ps1. Thanks for this.
👍 1
Avatar
Avatar
Cip
Here is another resource for parsing the locations from Google Takeout: https://github.com/Scarygami/location-history-json-converter I was able to parse a big location file (with more de 1 million points) and then load, visualize, filter, report it using the Qgis app from the free OSGeoLive virtual machine (https://live.osgeo.org/en/index.html). It's a complex GIS software and thus not easy to use, but it can easily handle large datasets and it offers a lot of spatial analysis tools (joins, intersections (for example with city limits), buffers, filtering, classification, labeling, distance/areas measurements etc.)
👍
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 11/13/2023 8:45 PM
this 1
Avatar
Anyone from @Cellebrite free for a quick question?
Avatar
Avatar
Aero
Anyone from @Cellebrite free for a quick question?
CLB_GabeReis 11/14/2023 2:56 AM
Sure, go ahead
Avatar
Avatar
FullTang
I can send you a 32-bit CLI version if you want.
do you still have this? i also need a copy
Avatar
Avatar
KimKip
do you still have this? i also need a copy
Sent you a DM
Avatar
You all are the best <3
Avatar
Is that CTF or school project?
Avatar
NotIronManBTW 11/14/2023 7:45 PM
if you guys had zero context and just an image to work with of a sunset, a horizon with very blurry hills/ some what look to be homes and that is all.. how can I even begin to go about figuring out location
7:46 PM
reverse image hasnt come back with anything on a lot of different sources
Avatar
Avatar
NotIronManBTW
if you guys had zero context and just an image to work with of a sunset, a horizon with very blurry hills/ some what look to be homes and that is all.. how can I even begin to go about figuring out location
EXIF data?
Avatar
NotIronManBTW 11/14/2023 8:06 PM
no useful exif data
8:07 PM
@5cary
Avatar
Avatar
FullTang
I can send you a 32-bit CLI version if you want.
chrisforensic 11/14/2023 10:01 PM
Hi, can you send me ftkimagercli version too? thanks so far
Avatar
Has anyone come across the application Session by Oxen? Is there somewhere to see if the logged in account on the device is linked to other devices?
Avatar
Avatar
chrisforensic
Hi, can you send me ftkimagercli version too? thanks so far
👍 1
Avatar
Avatar
Www
Has anyone come across the application Session by Oxen? Is there somewhere to see if the logged in account on the device is linked to other devices?
as far as i know you are not able to see if the account has been used on more then one phone, to read more about the app check out binary hicks article https://thebinaryhick.blog/2022/07/14/session-on-android-an-app-wrapped-in-signal/
NOTE: parts of this article describe steps by which the order of encryption methods are reversed to render encrypted data in clear-text. This was done in order to investigate the app being discusse…
Avatar
Avatar
Tim
as far as i know you are not able to see if the account has been used on more then one phone, to read more about the app check out binary hicks article https://thebinaryhick.blog/2022/07/14/session-on-android-an-app-wrapped-in-signal/
Thank you, I will take a look at that!
Avatar
LeatherCouch 11/15/2023 1:19 PM
Has anyone had luck subpoenaing or writing a search warrant for a VPN service ? Or ExpressVPN?
Avatar
iPhone 13 Pro Max - yellow screen of death any solution
🔨 2
Avatar
Anyone served a subpoena to couchsurfing.com? In regards to the amount of useful data that was returned would you rank it low, medium or high? Thanks.
Avatar
@Cellebrite can someone ping me about a renewal please?
📬 1
Avatar
Avatar
Arlakossan
iPhone 13 Pro Max - yellow screen of death any solution
That's a new one for me
Avatar
Avatar
Arlakossan
iPhone 13 Pro Max - yellow screen of death any solution
Appears a new screen is needed, $400 bucks min if you do it yourself. https://discussions.apple.com/thread/254771802
Avatar
Is "inviting" others to join this server allowed?
Avatar
Avatar
R3LL1K
Is "inviting" others to join this server allowed?
National Security Agency 11/16/2023 2:59 PM
I think, so.
Avatar
Avatar
R3LL1K
Is "inviting" others to join this server allowed?
Andrew Rathbun 11/16/2023 4:33 PM
The server is more than public. Google digital forensics discord and there's multiple invite links floating about
Avatar
You told me this was super exclusive?????
4:47 PM
I thought I was special!
😂 10
Avatar
thanks for the clarification. Just want to make sure. I was scolded on a different server about it. Lol
5:02 PM
Everyone gets an invite.
😂 6
Avatar
Digitalferret 11/17/2023 12:38 AM
i mean, they let me in 😵💫
😂 1
12:38 AM
then painted me
Avatar
I work in internet piracy, I've digging into ISP, Compliance and RIPA stuff https://academy.ripe.net/ - Can anyone confirm which one of these coures would be useful for SOC stuff ? (edited)
Learn online with the RIPE NCC! Study at your own pace online with the RIPE NCC Academy e-learning courses. Create an account and enrol in the course of your choice. All courses are free, and you can follow them at your own pace. You can also study for a RIPE NCC Certified Professionals exam using these courses. Enrol ...
Avatar
Avatar
$CozyBear
I work in internet piracy, I've digging into ISP, Compliance and RIPA stuff https://academy.ripe.net/ - Can anyone confirm which one of these coures would be useful for SOC stuff ? (edited)
Digitalferret 11/17/2023 5:24 AM
I work in internet piracy Dune 2 pls, oh u mean .... 😄
😂 2
Avatar
Avatar
Digitalferret
I work in internet piracy Dune 2 pls, oh u mean .... 😄
That's if pirates manage to find exploits within Sky DRM platform. Most of the content see on pirates sites or your go to sites for watching movies are either stolen previously from finding vulnerabilities into a DRM platform and saved the stream or often develop add ons and sideload them into IPTVs. I love how you indirectly meant Ha beat you to it, I already got a stream, allegedly. (edited)
Avatar
Avatar
$CozyBear
That's if pirates manage to find exploits within Sky DRM platform. Most of the content see on pirates sites or your go to sites for watching movies are either stolen previously from finding vulnerabilities into a DRM platform and saved the stream or often develop add ons and sideload them into IPTVs. I love how you indirectly meant Ha beat you to it, I already got a stream, allegedly. (edited)
Digitalferret 11/17/2023 6:21 AM
been there, avoided that, got the T-Shirt, im that ancient. A friend, who i chose not to uuh, involve with, was an original creator of "for educational purposes only" circuit board. these seemed to fit nicely into sky boxes and would "perform miracles" once the software was downloaded and written to the Pic 16c54 which the hardware was intedned for. Made an abolute mint, worldwide sales. Ended up, as most do, caught. Full house raid, UK VAT, Police, the lot. bc he got greedy and started opening up set top boxes that didn't belong to him.
❤️ 1
6:22 AM
My interest was the Pic, which i was using as part of my degree project, to control model train sets. a clue to the age was, you needed a UV light to erase the device
❤️ 1
Avatar
Avatar
DCSO
Appears a new screen is needed, $400 bucks min if you do it yourself. https://discussions.apple.com/thread/254771802
Yeah I saw that, the screen prices are insane. In Sweden it's more worth using your home insurance and you'll get a new for 150$
Avatar
Avatar
Digitalferret
been there, avoided that, got the T-Shirt, im that ancient. A friend, who i chose not to uuh, involve with, was an original creator of "for educational purposes only" circuit board. these seemed to fit nicely into sky boxes and would "perform miracles" once the software was downloaded and written to the Pic 16c54 which the hardware was intedned for. Made an abolute mint, worldwide sales. Ended up, as most do, caught. Full house raid, UK VAT, Police, the lot. bc he got greedy and started opening up set top boxes that didn't belong to him.
You really have immersed yourself mate and seen every element of nichey security. I'm geineuly impressed. Given your experience you'd be on big bucks if you worked in piracy😅mainly with ' Sky TV '. I think in your time it was about reverse engineering set top boxes. I'm 21 so my knowledge is quite limited in STBs The biggest raid in the UK that was conducted was flawless IPTV. The internet piracy has shifted on to IPTVs (employ SSL pinning), Pirate Applications, exploiting DRMs (key rotation for each stream) unfortunately this the least talked about in cybersecurity, literally no one talks about it. (edited)
Avatar
Erik Barboza 11/17/2023 11:33 AM
Wasn’t sure where to put this, but does anyone work at a company that does investment banking and is FINRA-regulated? I am being told that I too need to follow training and procedures similar to investment bankers because I have access to the email archive for investigations. Is this normal? I would assume there would be carve outs in FINRA rules for what constitutes an “associated person” when access to such such information is for security purposes.
Avatar
Anyone know how to do a sharepoint collection for an user account?
Avatar
Are there any programmers here that have experience building steganography algorithms? I am having trouble implementing LSB steganography with XOR substitution for a final project in a class. It is based on this article: https://ieeexplore.ieee.org/stampPDF/getPDF.jsp?tp=&arnumber=8938486&ref=aHR0cHM6Ly9pZWVleHBsb3JlLmllZWUub3JnL2Fic3RyYWN0L2RvY3VtZW50Lzg5Mzg0ODY/Y2FzYV90b2tlbj1RNEdIckhiNWRLd0FBQUFBOmwyYmZYTzBjQmR6bll6RXZ6dVpJRHBOeUFTSEFzYWFTdFVyRXlMczJVYi02M0JPZHNJSDhZd2VzZ21UXzVtYkF1WEItR0NIQVNySQ==&tag=1 If you can give advice, feel free to send me a DM and I'll share my code.
Avatar
Avatar
fixclown
Anyone know how to do a sharepoint collection for an user account?
Sent a DM.
Avatar
Thanks
Avatar
Hi, this might be a noob question but i'd like to ask this. I'm trying to find jump list files on win 11. As far as i know, jump list files should be stored in
  • %APPDATA%\Microsoft\Windows\Recent\AutomaticDestinations
  • %APPDATA%\Microsoft\Windows\Recent\CustomDestinations
But theres no Recent folder under the Windows, and still I can see recent files from right click menu and so on. Did jump list files location change?
Avatar
I posted this in the dvr-multimedia-surveillance thread but wanted to throw it out here also.I have a Q-See DVR model: QC938. It's from the old Q-See. The system login is locked and the passwords are unknown. I tried the standard passwords with no success. I contacted support at the new Q-See and they provided some additional passwords to try. Unfortunately no success. I am looking to reset the system to utilize for future use (if possible). I am not worried about any video footage currently on the hard drive. Does anyone have any suggestions on if it is possible to reset a Q-See DVR. I have searched the net but nothing has worked.
Avatar
Avatar
kgsm
Hi, this might be a noob question but i'd like to ask this. I'm trying to find jump list files on win 11. As far as i know, jump list files should be stored in
  • %APPDATA%\Microsoft\Windows\Recent\AutomaticDestinations
  • %APPDATA%\Microsoft\Windows\Recent\CustomDestinations
But theres no Recent folder under the Windows, and still I can see recent files from right click menu and so on. Did jump list files location change?
Andrew Rathbun 11/20/2023 9:06 AM
Not to my knowledge. I still see JumpLists in my Recent folder. Is this an image you're analyzing? Maybe some anti-forensics occurred?
Avatar
garfieldkhan 11/20/2023 10:14 AM
Is it possible for an iPhone to communicate with a BTS antenna when it is turned off?
Avatar
Avatar
garfieldkhan
Is it possible for an iPhone to communicate with a BTS antenna when it is turned off?
Cellular or bluetooth ?
Avatar
Avatar
DCSO
Cellular or bluetooth ?
garfieldkhan 11/20/2023 10:18 AM
cellular
Avatar
Avatar
garfieldkhan
cellular
No , but certain models of iPhones can ping a location of an iPhone through the Ultra Wide Band bluetooth after powering off for up to 24 hrs give or take to locate it.
👍 2
Avatar
Avatar
Andrew Rathbun
Not to my knowledge. I still see JumpLists in my Recent folder. Is this an image you're analyzing? Maybe some anti-forensics occurred?
No i was analyzing a live machine and I could easily locate them with FTK... 😂 thx for the reply!
Avatar
Avatar
kgsm
No i was analyzing a live machine and I could easily locate them with FTK... 😂 thx for the reply!
That would be because they are hidden.
👆 1
Avatar
Avatar
Beercow
That would be because they are hidden.
Andrew Rathbun 11/20/2023 4:32 PM
This. Just like how you don't see a bunch of $MFT and $whatever files on the root of your C drive. MS doesn't want the everyday user to have access to these important system files that keep Windows running
Avatar
Yeah i didnt know jump lists are one of those kinds... now i learned : )
Avatar
I always delete the directories that start with $ 🤣
Fex 1
Avatar
National Security Agency 11/21/2023 4:12 AM
¿GHidra, IDA, Binary Ninja or Cutter?
Avatar
did someone manage to get Cellebrite Virtual Analyzer running in PA on a Win 11 Machine? if yes any Tips?
Avatar
Avatar
National Security Agency
¿GHidra, IDA, Binary Ninja or Cutter?
imhex
Avatar
Avatar
National Security Agency
¿GHidra, IDA, Binary Ninja or Cutter?
Decompiler Explorer is an interactive online decompiler which shows equivalent C-like output of decompiled programs from many popular decompilers.
Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser! - GitHub - decompiler-explorer/decompiler-explorer: Decompiler Explorer! Compare tools on the forefr...
Avatar
Avatar
MHE
did someone manage to get Cellebrite Virtual Analyzer running in PA on a Win 11 Machine? if yes any Tips?
Andrew Rathbun 11/21/2023 7:15 AM
Maybe try #mobile-forensic-decoding ?
Avatar
Is there a popular brand of storage media for disk imaging? I am looking to buy some disks for imaging.
Avatar
What would a user still have access to if I set them to 0 login hours in Active Directory?
Avatar
Avatar
shuf_r
Is there a popular brand of storage media for disk imaging? I am looking to buy some disks for imaging.
Digitalferret 11/21/2023 9:27 AM
depends how big/hard you gonna go. but you can always look up Backblaze here for reliability issues. https://discord.com/channels/427876741990711298/427886054675185664/1174019500090331206
👆 1
Avatar
Thanks!! I was thinking a 2 TB drive being that most systems would not have drives exceeding 1 TB
Avatar
Avatar
shuf_r
Thanks!! I was thinking a 2 TB drive being that most systems would not have drives exceeding 1 TB
Digitalferret 11/21/2023 9:36 AM
unless you are doing this for a living in DR/4n6, ie drives get used again and again on a daily/weekly basis, just go regular and get a few, else get some NAS.
9:39 AM
avoid the cheaper "for AV use" ones. you need accuracy not (that sort of) speed
9:40 AM
and go Native cables if poss. not USB portable
9:41 AM
unless you don't get access to a drive, bc physical constraint
Avatar
Avatar
Digitalferret
unless you are doing this for a living in DR/4n6, ie drives get used again and again on a daily/weekly basis, just go regular and get a few, else get some NAS.
Thanks for the tips I am just a student so don't need anything too fancy. Do the pros do a verification on the disk before adding forensic images for Daubert standard of benchmarking and tool verification. Can AWS storage be used? Currently using old laptop hard drives with a stata harness but they are only 500 GB while the disk I want to image is 500 GB so no go
Avatar
Avatar
shuf_r
Thanks for the tips I am just a student so don't need anything too fancy. Do the pros do a verification on the disk before adding forensic images for Daubert standard of benchmarking and tool verification. Can AWS storage be used? Currently using old laptop hard drives with a stata harness but they are only 500 GB while the disk I want to image is 500 GB so no go
Digitalferret 11/21/2023 9:57 AM
I am just a student so don't need anything too fancy - yep. thats about it. if you are taking 1:1 bitwise copies of disks, and you want to go filecarving, make sure the drive is securely erased prior. if you are going large storage and putting many .dsk images on there maybe not. but check the info on such as these: https://capsicumgroup.com/2-key-differences-between-digital-forensic-imaging-and-digital-forensic-clone-and-how-they-can-affect-your-legal-case/ https://www.forensicsinsider.com/digital-forensics/difference-between-imaging-and-cloning/ (edited)
Avatar
Can someone explain the legality of extracting a spouses devices without their consent ?
Avatar
Avatar
theshark
Can someone explain the legality of extracting a spouses devices without their consent ?
Take the word spouse out and replace it with random person and tell me if you would still ask this question.
💯 2
Avatar
Avatar
Beercow
Take the word spouse out and replace it with random person and tell me if you would still ask this question.
True. Just wasn’t sure if it changes with the concept of a joint bank account. Thanks!
Avatar
Avatar
theshark
True. Just wasn’t sure if it changes with the concept of a joint bank account. Thanks!
That would probably depend on the wording. And vs or.
Avatar
Avatar
CMP511
I posted this in the dvr-multimedia-surveillance thread but wanted to throw it out here also.I have a Q-See DVR model: QC938. It's from the old Q-See. The system login is locked and the passwords are unknown. I tried the standard passwords with no success. I contacted support at the new Q-See and they provided some additional passwords to try. Unfortunately no success. I am looking to reset the system to utilize for future use (if possible). I am not worried about any video footage currently on the hard drive. Does anyone have any suggestions on if it is possible to reset a Q-See DVR. I have searched the net but nothing has worked.
If its running bare minimum Linux like some of them I would remove the drive, mount it somewhere and grab a copy of /etc/passwd and /etc/shadow then with those you can try crack the password.
Avatar
Avatar
shuf_r
Thanks for the tips I am just a student so don't need anything too fancy. Do the pros do a verification on the disk before adding forensic images for Daubert standard of benchmarking and tool verification. Can AWS storage be used? Currently using old laptop hard drives with a stata harness but they are only 500 GB while the disk I want to image is 500 GB so no go
If you're in a pinch and just testing, You might be able to target a 512GB drive with a 512GB drive if you choose .e01 due to the compression. When your work or family upgrade their stuff, start a collection. I asked my town IT and received a box of 10+ large HDDs from their backup server when they upgraded. It's how a bunch of /r/homelab people get started, stalking industry upgrades for the leftover parts\
Avatar
Avatar
whee30
If you're in a pinch and just testing, You might be able to target a 512GB drive with a 512GB drive if you choose .e01 due to the compression. When your work or family upgrade their stuff, start a collection. I asked my town IT and received a box of 10+ large HDDs from their backup server when they upgraded. It's how a bunch of /r/homelab people get started, stalking industry upgrades for the leftover parts\
Great tip thanks. I have been surfing school auction sites. I was thinking about putting out an add to collect ewaste and see what turns up
Avatar
Buying is always an option, but making friends with whoever has to replace equipment can sometimes land you freebies. Often times employers/schools etc don't have set in stone policies what happens to the stuff so there is room for "this guy wants it, can I give it to him?"
👍 1
🔥 1
Avatar
Alrighty friends, we got a major incident at hand. My Snapchat account is banned.
rcdBan 1
Avatar
Inquiring about the possibility of locating the app data folder and understanding the behavior of an application by installing an Android OS on VirtualBox. Wondering if this approach allows access to the application data folder from the PC?
Avatar
Avatar
hfactor
Inquiring about the possibility of locating the app data folder and understanding the behavior of an application by installing an Android OS on VirtualBox. Wondering if this approach allows access to the application data folder from the PC?
Rather use Android Studio for emulating an Android Device: https://developer.android.com/studio . You can Access the folders, take Snapshots etc. (edited)
Android Studio provides app builders with an integrated development environment (IDE) optimized for Android apps. Download Android Studio today.
Avatar
Any good tips on buying mouse jigglers?
Avatar
Avatar
shuf_r
Any good tips on buying mouse jigglers?
I think this is the one that was handed out to me at a training last year... can't speak to this one vs any other but as long as you aren't getting one for 25 cents off of ali express it'll probably work okay. Might not ransomware your computer either.
11:11 AM
Mouse Jiggler MJ-3OVERVIEWPRODUCT INFORMATIONRELATED PRODUCTSBUY PRODUCTS & ACCESSORIESOnly $21.99BUY NOWProgrammable! Create custom scripts for mouse and keyboard simulationTemporarily deactivates screen savers for presentationsBehaves like an ordinary mouseForensic use: Pair with HotPlug to prevent computer sleepingMJ-3 is a simple, programmab...
Avatar
Avatar
whee30
I think this is the one that was handed out to me at a training last year... can't speak to this one vs any other but as long as you aren't getting one for 25 cents off of ali express it'll probably work okay. Might not ransomware your computer either.
I saw those and my first thought was if it's a running system would plugging it in add entries and records and also add to ram . I saw standalone ones that you put the mouse on and thought might be better to preserve the system memory and not confuse things with what I did and what happened before machine was accessed to get image and dump ram. I am very new to this so I'm sure I could be very off base in my thinking. Thanks I will check that product out. Also any worth in building a sandbox machine to purposely get Chinese malware on to analyze?
Avatar
Does anyone have any malicious sites I can dig into or recommended me a site. I'm bored, don't like ctfs unless it has Android Studio and Mitmproxy for digging into apks or domains (being this picky is bad) (edited)
Avatar
garfieldkhan 11/23/2023 4:41 PM
What is currently being used to carro out extractions and analysis on wearables, in this case Apple Watch?
Avatar
Avatar
garfieldkhan
What is currently being used to carro out extractions and analysis on wearables, in this case Apple Watch?
I attended a webinar for these guys, they seemed ok.. If i remeber correctly, their kits had all the adapters for the various connections you will come cross https://www.mobiledit.com/
Software used by millions of users for phone content management, data transfer and investigation.
Avatar
Avatar
$CozyBear
Does anyone have any malicious sites I can dig into or recommended me a site. I'm bored, don't like ctfs unless it has Android Studio and Mitmproxy for digging into apks or domains (being this picky is bad) (edited)
Andrew Rathbun 11/23/2023 6:46 PM
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public. - GitHub - ytisf/theZoo: A rep...
❤️ 1
Avatar
Avatar
rfar
I attended a webinar for these guys, they seemed ok.. If i remeber correctly, their kits had all the adapters for the various connections you will come cross https://www.mobiledit.com/
garfieldkhan 11/24/2023 1:02 AM
Do you think this is the most affordable solution? Are there free tools?
Avatar
does anyone know a good tool to make pretty timeline from a data source (like a csv for instance date,source,details...)
3:41 AM
I've already tried timesketch and plaso but it doesn't fit my needs
Avatar
Thanks mate, looks real fun . (edited)
Avatar
Avatar
emilie_
I've already tried timesketch and plaso but it doesn't fit my needs
Andrew Rathbun 11/24/2023 4:51 AM
Personally, I've yet to find any timeline solution that fits my preferences. I've yet to find something that produces a better product than manually creating a timeline artifact by artifact
Avatar
Avatar
Andrew Rathbun
Personally, I've yet to find any timeline solution that fits my preferences. I've yet to find something that produces a better product than manually creating a timeline artifact by artifact
that was my conclusion as well
Avatar
Andrew Rathbun 11/24/2023 4:56 AM
I've made helper scripts to transpose output into a format that we use at work, but that's about it. I don't do any filtering with those scripts or anything. I do the analysis, not the scripts. The scripts are designed to remove the tedium (edited)
Avatar
Avatar
garfieldkhan
Do you think this is the most affordable solution? Are there free tools?
honestly, i am not sure, there probably is. The webinar was my first exposure to watch forensics.
Avatar
Anyone from @Cellebrite free for a quick question?
📬 1
Avatar
Does anybody know about research regarding specific traces left for different techniques within the mitre att&ck matrix? (I am aware of the detection hints within mitre) (edited)
Avatar
Avatar
AJGZekrom
Alrighty friends, we got a major incident at hand. My Snapchat account is banned.
how is that a major incident? just make a new one PepeHappy
💯 1
Avatar
ACanadianEh 11/25/2023 2:34 PM
Wondering what tool(s) folks use for the timelining of an incident i.e. Keeping track of Date, Time, Description, IPs involved etc. for major events throughout an incident. Current place uses Excel workbooks but I feel like there must be better stuff out there...
Avatar
google sheets
2:37 PM
have been using timesketch a decent amount recently as well, which does allow you to place manual events onto the unified timeline. It's nice that it can also be interacted with by multiple users, and gives a nice unified timeline if you give it your incident specific log sources like plaso timeline, networking logs, etc.
2:38 PM
It can be a bit of extra work to get new sources to parse correctly though
Avatar
Avatar
ryd3v
how is that a major incident? just make a new one PepeHappy
My device is banned lol
🤷‍♂️ 2
🤣 4
KEKWLUL 2
Avatar
Avatar
AJGZekrom
My device is banned lol
Doing you a favour tbh. 😂
Avatar
DeepDiveForensics 11/27/2023 3:33 AM
Dear Team, We have a scenario where we need identify if is there any apple/android backup within the Windows Forensic E01 Image. Note : Apart from iTunes default backup location.
Avatar
Avatar
DeepDiveForensics
Dear Team, We have a scenario where we need identify if is there any apple/android backup within the Windows Forensic E01 Image. Note : Apart from iTunes default backup location.
maybe search for common files like manifest.plist?
👍🏻 1
Avatar
kalad1n4637 11/27/2023 5:51 PM
When I got my new gaming laptop it came with windows 11 i made the Microsoft account but I used of one my anonymous gmail accounts thinking I was protected but after doing some research I learned I was wrong. I didn’t know there actually is a way to setup a windows 11 machine without making an account but I now know what to do but is it too late. Is there a way to unscrew myself from this predicament or am I trapped forever with Microsoft harvesting my data and identity?
Avatar
Avatar
kalad1n4637
When I got my new gaming laptop it came with windows 11 i made the Microsoft account but I used of one my anonymous gmail accounts thinking I was protected but after doing some research I learned I was wrong. I didn’t know there actually is a way to setup a windows 11 machine without making an account but I now know what to do but is it too late. Is there a way to unscrew myself from this predicament or am I trapped forever with Microsoft harvesting my data and identity?
if you do a fresh install, do it offline, not connected to any network
Avatar
Avatar
ryd3v
if you do a fresh install, do it offline, not connected to any network
kalad1n4637 11/27/2023 8:43 PM
Thank you, and this will keep Microsoft from taking anymore data from me? Is there anyway to get Microsoft to erase the data they already gathered from me?
Avatar
There are scripts to@remove telemetry
8:46 PM
This is the Ultimate Windows 10 Script from a creation from multiple debloat scripts and gists from github. - GitHub - ChrisTitusTech/win10script: This is the Ultimate Windows 10 Script from a cre...
8:46 PM
Check his GitHub he has a few
Avatar
kalad1n4637 11/27/2023 8:49 PM
This will keep them from harvesting data from me and delete the data they took?
11:24 PM
This is the one I use but I can't be held responsible if you bork your machine xD
229.87 KB
11:24 PM
just remove the .x
11:25 PM
Chris Titus Tech&#39;s Windows Utility - Install Programs, Tweaks, Fixes, and Updates - GitHub - ChrisTitusTech/winutil: Chris Titus Tech&#39;s Windows Utility - Install Programs, Tweaks, F...
Avatar
Avatar
kalad1n4637
This will keep them from harvesting data from me and delete the data they took?
as far as deleting the data they 'took' you'd have to contact them about the procedure for removing that data.
Avatar
Avatar
ryd3v
as far as deleting the data they 'took' you'd have to contact them about the procedure for removing that data.
Thank you
Avatar
no problem xD
👍 1
Avatar
Anyone use Tripp Lite chargers for the phones in their lab? If so, have you been able to solve the issue of iPhone 15s and iPads with USB-C chargers recognizing it as an accessory instead of charging? I'm not sure if there's a way to disable the firmware update part of the charging station, I would imagine that is what the issue is
Avatar
Any explanation as to why an individual has a personal phone and a work phone sharing the same apple Id but one phone collected data size is different than the other. Both phones have same conversations but one has no attachments but the other does. Is this a synch issue??
Avatar
you have to click the attachement to download it iirc so if on one device they already looked at it, on the other they may have not clicked it, so it didn't download
Avatar
Does anybody have any good software to create a graphical timeline of an investigation?
Avatar
garfieldkhan 11/30/2023 7:35 AM
Anyone from cellebrite here? In Physical Analzer, what does really mean when an item is flagged deleted with the red cross? I don’t know how to explain this in court…
📬 1
bruh 1
Avatar
Avatar
Scrubz
Does anybody have any good software to create a graphical timeline of an investigation?
garfieldkhan 11/30/2023 7:44 AM
i think IPED does a good job
Avatar
Avatar
garfieldkhan
Anyone from cellebrite here? In Physical Analzer, what does really mean when an item is flagged deleted with the red cross? I don’t know how to explain this in court…
Digitalferret 11/30/2023 8:54 AM
@Cellebrite ^
Avatar
Original message was deleted or could not be loaded.
Avatar
Avatar
Scrubz
Does anybody have any good software to create a graphical timeline of an investigation?
xmind works well but its manual
Avatar
National Security Agency 11/30/2023 5:14 PM
Hello there
Avatar
Hello everyone, Do you have an idea where does the battery usage graph on android takes the logs from ? I can only find current battery stats with dumpsys and so on, but can't file the logs files. Thanks in advance for your help Salute
Avatar
Avatar
A47199
Hello everyone, Do you have an idea where does the battery usage graph on android takes the logs from ? I can only find current battery stats with dumpsys and so on, but can't file the logs files. Thanks in advance for your help Salute
Gizmononootje 12/1/2023 2:38 AM
*#9900#
2:38 AM
should create the logfiles
Avatar
Has anyone any knowledge around 3D printers and what is possible to obtain re memory, cache, plans etc. or what remnants are left that can show their use?
Avatar
Avatar
Gizmononootje
*#9900#
Thank you for your answer, but i'm not trying to generate logs. Instead, i'm looking for the logs location that the phone use to generate the battery usage graph
Avatar
Avatar
A47199
Thank you for your answer, but i'm not trying to generate logs. Instead, i'm looking for the logs location that the phone use to generate the battery usage graph
spicy_caveman 12/1/2023 7:13 AM
You may get a little more help if you were to provide more amplifying info, for example- what type of Android... because there are many many flavors.
Avatar
National Security Agency 12/1/2023 4:32 PM
Avatar
So currently you configured the SQL Server app installation in Intune to use the SA account and set a default password. The password is in plaintext in the .ini configuration file. The password is visible in the ini file, but it's all converted to an Intune package file. When it's deployed on the system, it uses PSADT. I don't think the ini file is visible on the system, although its a possibility that PSADT copies temp files somewhere during the setup process that could be visible for a short time. I do need to keep a copy of all the installation files in M365 for other people to reference, as SQL Server is quite complex to deploy compared to most apps. How would that be implemented though using say M365 environment? We have E5 licensing does m365 have any features that do it?
Avatar
Question for @Law Enforcement [UK] (or more specififically Scotland) Do you guys have an Expert Witness report template you'd be willing to share?
Avatar
Steven Sproule 12/2/2023 2:54 AM
By that do you mean for a report you'd create as the examiner with the evidence selected by the IO for Court purposes???
Avatar
Avatar
Scrubz
Question for @Law Enforcement [UK] (or more specififically Scotland) Do you guys have an Expert Witness report template you'd be willing to share?
SamTheMan14 12/2/2023 2:56 AM
If you are referring to SFR's I think what you are looking for can be found from the link below: https://www.fcn.police.uk/sfr-forms
Avatar
Avatar
SamTheMan14
If you are referring to SFR's I think what you are looking for can be found from the link below: https://www.fcn.police.uk/sfr-forms
Oh, those are perfect, thank you! ❤️
Avatar
Avatar
Scrubz
Oh, those are perfect, thank you! ❤️
SamTheMan14 12/2/2023 2:59 AM
No problem! 👍
Avatar
Anyone from @KAPE free for a message? Infact sorry no, wrong tool name 🤦‍♂️ (edited)
Avatar
Eric Zimmerman 12/2/2023 4:59 AM
Ya sure
Avatar
Avatar
Eric Zimmerman
Ya sure
Can I DM you for sanity?
Avatar
Eric Zimmerman 12/2/2023 5:44 AM
Sure
Avatar
Sent thanks
Avatar
@Andrew Rathbun Can I possibly DM you when you have a spare minute, thanks.
Avatar
Avatar
Scrubz
@Andrew Rathbun Can I possibly DM you when you have a spare minute, thanks.
Andrew Rathbun 12/2/2023 5:58 AM
No need to ask. Just DM and I'll respond when I can
Avatar
Avatar
Andrew Rathbun
No need to ask. Just DM and I'll respond when I can
Thanks Dm'd
Avatar
His is there a way to convert data that ADF MDI spits out to a ZIP archive with the standard file tree of an Android/iPhone?
1:57 PM
If there is no way of doing so, what methods do you guys recommend for jailbreaking iOS 17 and getting a full system file tree image?
1:58 PM
For reference, the device I'm going to image is an iPhone 13 pro
Avatar
hello everyone, ive got a deeper question i think, i want to set up my own Linux for example Ubuntu, for forensic copies. Something in that direction like Kali Forensic Mode, Tsurugi or Caine. Which steps do i have to follow for block media like usb sticks. ive found out about udev, automounting but it doesnt feel like its all
Avatar
@Eric Zimmerman are you free for a question about your Timeline Explorer?
Avatar
Eric Zimmerman 12/3/2023 11:31 AM
Sure
Avatar
Avatar
Eric Zimmerman
Sure
It's ok, it's a user issue... 😂
Avatar
Avatar
Eric Zimmerman
Sure
No, it's not. Everytime I use, it replies with not responding, I'm unable to load any files Nevermind, I posted that and it started working... 🤦‍♂️ (edited)
Avatar
Eric Zimmerman 12/3/2023 12:03 PM
what are you loading? how big?
12:03 PM
ok well, it knew i was gonna ask that then
Avatar
Is it typical for a large organization to have digital forensics under GRC division ? Thoughts on this from a structure standpoint? Thank you!
Avatar
Hey guys, who is attending BlackHat London this week?
Avatar
Avatar
Woob
hello everyone, ive got a deeper question i think, i want to set up my own Linux for example Ubuntu, for forensic copies. Something in that direction like Kali Forensic Mode, Tsurugi or Caine. Which steps do i have to follow for block media like usb sticks. ive found out about udev, automounting but it doesnt feel like its all
I think you are looking for blockdev. Have a look at man blockdev for the --setro option. You can use udev to set the option on newly inserted devices as well.
❤️ 1
Avatar
anyone from @Griffeye for a quick question?
Avatar
Avatar
Woob
hello everyone, ive got a deeper question i think, i want to set up my own Linux for example Ubuntu, for forensic copies. Something in that direction like Kali Forensic Mode, Tsurugi or Caine. Which steps do i have to follow for block media like usb sticks. ive found out about udev, automounting but it doesnt feel like its all
These distros are blocking at the kernel level with a kernel patch.
💯 1
❤️ 1
Avatar
Beno 🇬🇧 12/5/2023 2:45 AM
How would I add or invite a new user?
Avatar
Avatar
Beno 🇬🇧
How would I add or invite a new user?
DeeFIR 🇦🇺 12/5/2023 2:53 AM
Invite to join a server
Avatar
Good morning folks, does anyone happen to have an invite code to Bluesky Social?
Avatar
Avatar
DFE Travis
Good morning folks, does anyone happen to have an invite code to Bluesky Social?
sending a DM
Avatar
Found this absolutely wild excerpt in Thomas Rid's book "Cyber War Will Not Happen". Figured the #mobile-forensic-extractions folks would be interested.
👀 2
Avatar
I have a question for anyone at @Oxygen Forensics. Does the discord cloud data extraction collect all messages in channels the account is a member of?
Avatar
Avatar
secluding
I have a question for anyone at @Oxygen Forensics. Does the discord cloud data extraction collect all messages in channels the account is a member of?
Oxygen Forensics 12/5/2023 6:45 AM
Hello! You can control the behavior of the extraction 🙂 You can check if you want to extract messages in channels, but if you are asking if you can choose the specific servers to extract from, then no
Avatar
Avatar
Oxygen Forensics
Hello! You can control the behavior of the extraction 🙂 You can check if you want to extract messages in channels, but if you are asking if you can choose the specific servers to extract from, then no
Thank you! Another follow up question, if I have an account that is a member of a server with multiple text channels will Oxygen collect messages sent by all users in those channels (if the account has appropriate viewing permissions), or only messages sent from the account I am performing the collection from? (edited)
📬 1
oxygen 1
Avatar
To anyone out there using Cellebrite 8.7, do your reports take a really long time to generate? Ive had this Excel Workbook report generating for at least 20 min and its just some text messages. (edited)
Avatar
Andrew Rathbun 12/5/2023 12:15 PM
spammer banned, back to business everyone 🙂
👍 7
perfect 4
🤌🏻 1
Avatar
Avatar
PhrostByte
To anyone out there using Cellebrite 8.7, do your reports take a really long time to generate? Ive had this Excel Workbook report generating for at least 20 min and its just some text messages. (edited)
return2zero 12/5/2023 1:29 PM
Only if it was reading from/writing to a network location and not local storage.
Avatar
Has anyone has ever managed to bypass SSL pinning without using Frida or alternatives like apk-mitm on a app https://github.com/shroudedcode/apk-mitm . I got infringing app which I need to capture requests as a source 'forensic evidence' (edited)
🤖 A CLI application that automatically prepares Android APK files for HTTPS inspection - GitHub - shroudedcode/apk-mitm: 🤖 A CLI application that automatically prepares Android APK files for HTTPS ...
Avatar
Deleted User 12/5/2023 3:39 PM
Hi everyone, good to be here!
👋🏻 1
Avatar
Avatar
PhrostByte
To anyone out there using Cellebrite 8.7, do your reports take a really long time to generate? Ive had this Excel Workbook report generating for at least 20 min and its just some text messages. (edited)
spicy_caveman 12/5/2023 6:22 PM
Yea it is pretty common. I had similar where it can take an hour. Can't rush a good thing.
Avatar
Hi guys- does anyone have any experience in dealing with Foxmail? Any idea what forensic tools can be used for the collection of emails from Foxmail accounts?
Avatar
Has @Griffeye support merged with @Magnet Forensics yet? If so, anyone around?
Avatar
Avatar
Rob
Has @Griffeye support merged with @Magnet Forensics yet? If so, anyone around?
📫
Avatar
Hi, Anyone from @Magnet Forensics available for a question about MAGNET App Simulator ?
Avatar
Avatar
ZlatanX
Hi guys- does anyone have any experience in dealing with Foxmail? Any idea what forensic tools can be used for the collection of emails from Foxmail accounts?
spicy_caveman 12/7/2023 5:50 AM
@Metaspike
Avatar
Avatar
ZlatanX
Hi guys- does anyone have any experience in dealing with Foxmail? Any idea what forensic tools can be used for the collection of emails from Foxmail accounts?
Arman Gungor 12/7/2023 9:42 AM
Hi, @ZlatanX. Is this about the local email data for the Foxmail email client (not a hosted email service)?
Avatar
Hi @Arman Gungor . From what I gathered so far, the custodian is using a Foxmail email client. So the requirement is basically to export out all emails and archives via Foxmail.
Avatar
Thanks to @Cellebrite for putting on the presentation in Charleston today. We appreciate you.
🙏 1
Avatar
Avatar
dcs453
Thanks to @Cellebrite for putting on the presentation in Charleston today. We appreciate you.
CLB_joshhickman1 12/7/2023 4:06 PM
Our pleasure. Thank you for attending. We appreciate you all and all the feedback. 🙏
Avatar
Avatar
ZlatanX
Hi @Arman Gungor . From what I gathered so far, the custodian is using a Foxmail email client. So the requirement is basically to export out all emails and archives via Foxmail.
Silly question but can’t you use the client to do that or is there some other issue getting them?
Avatar
ntrsandman28 12/8/2023 6:31 AM
I'm looking for the location in the iOS file system on an Iphone where I can find when a bluetooth device FIRST connected to the phone. I've looked through db files and found connected devices, and whether they were paired or not, but I can't seem to find when the FIRST connection to the bluetooth devices was made. Any help would be awesome. Thanks
Avatar
Avatar
ntrsandman28
I'm looking for the location in the iOS file system on an Iphone where I can find when a bluetooth device FIRST connected to the phone. I've looked through db files and found connected devices, and whether they were paired or not, but I can't seem to find when the FIRST connection to the bluetooth devices was made. Any help would be awesome. Thanks
I don't have it in front of me, but did you look in com.apple.MobileBluetooth.ledevices.other.db and com.apple.MobileBluetooth.ledevices.paired.db? I looked into it a bit, I don't think you're going to see a first connected date, only last. (edited)
Avatar
Hi all, I was considering purchasing the 13Cubed Investigating Windows Endpoints course. The website FAQs state, “If you purchased the course prior to January 1, 2024, there is no expiration”. However it does not say if you’ll only have access to the earlier content videos or whether you’ll also have access to updated content as it is created. Does anyone know?
Avatar
@13Cubed ^
Avatar
Avatar
r5d48578
Hi all, I was considering purchasing the 13Cubed Investigating Windows Endpoints course. The website FAQs state, “If you purchased the course prior to January 1, 2024, there is no expiration”. However it does not say if you’ll only have access to the earlier content videos or whether you’ll also have access to updated content as it is created. Does anyone know?
Richard Davis (DFIR) 12/9/2023 1:51 PM
You will have full access to any updates that are made to the course material as well. Keep in mind that updates to the course will be made to cover changes in forensic artifacts, but do not expect frequent updates as the major content will probably not change that much.
Avatar
Avatar
r5d48578
Hi all, I was considering purchasing the 13Cubed Investigating Windows Endpoints course. The website FAQs state, “If you purchased the course prior to January 1, 2024, there is no expiration”. However it does not say if you’ll only have access to the earlier content videos or whether you’ll also have access to updated content as it is created. Does anyone know?
Richard Davis (DFIR) 12/9/2023 1:59 PM
That being said, I am planning a comprehensive new practice disk image to be released in early 2024, so you will definitely get access to that as well.
Avatar
Thank you Richard! That is good to know. Purchasing the course now.
❤️ 4
Avatar
Avatar
r5d48578
Thank you Richard! That is good to know. Purchasing the course now.
Andrew Rathbun 12/9/2023 3:26 PM
You won't be disappointed, it's really good
Avatar
Deleted User 12/9/2023 10:32 PM
Hi everyone
10:33 PM
Can anyone recommed me any good courses to get started in DFIR and to help me on my way before I start my GCFA next year? Is 13cubed the way to go? thanks in advance
Avatar
Avatar
spicy_caveman
Yea it is pretty common. I had similar where it can take an hour. Can't rush a good thing.
Cellebrite reports also export attachments, ex. videos, pictures, etc.. Those are likely the main cause for such long time.
Avatar
Avatar
Deleted User
Can anyone recommed me any good courses to get started in DFIR and to help me on my way before I start my GCFA next year? Is 13cubed the way to go? thanks in advance
I’ve watched 13cubed YouTube videos while studying for exams and would definitely recommend.
👍 1
Avatar
Deleted User 12/11/2023 1:10 AM
Thanks a lot! I will probably buy 13cubed courses after I finish all the free YT videos (edited)
Avatar
@Cellebrite The Cellebrite premium adapter has a usb 3 usb port on the back. The included usb cable is 2.0. Why is this? Will data be transfered faster when using the premium adapter with a usb 3 cable?
Avatar
Good day all! Just curious if anyone can comment on Monolith vs Atlas for case management?
Avatar
Avatar
Deleted User
Thanks a lot! I will probably buy 13cubed courses after I finish all the free YT videos (edited)
second-ed this. Currently on the 13Cubed courses, according to my colleague who has taken FOR500 and 508, the Endpoint is a good 'mini-class' for FOR500 at least according to him
Avatar
Hi All! Is there any recommendation of analyzing and interpreting CyberArk log events?
Avatar
Avatar
SavedData
Hi All! Is there any recommendation of analyzing and interpreting CyberArk log events?
OSforensics has a event log and web server log viewer
Avatar
Avatar
ntrsandman28
I'm looking for the location in the iOS file system on an Iphone where I can find when a bluetooth device FIRST connected to the phone. I've looked through db files and found connected devices, and whether they were paired or not, but I can't seem to find when the FIRST connection to the bluetooth devices was made. Any help would be awesome. Thanks
You’ll need a full file system extraction - if there it would be in the KnowledgeC db….the timestamp associated with MobileBluetooth is a last seen time.
Avatar
@Cellebrite Any idea why offline maps on Reader appear gray and don't actually display the world map?
8:37 AM
I've got them set up to use offline maps port 3000 and everything. I've got no lag and everything loads fine, except for the actual visuals in the maps themselves
8:48 AM
The load from file appears to be greyed out too
Avatar
My organization's cyber department is looking at changing/expanding existing teams. Was wondering if anyone here could provide any insight to the following: Any one have thoughts on building out a CyberSec org structure that encompasses smaller, dedicated Readiness and Response components or teams? 1. Cyber Readiness Team (CRT) Cyber Threat Intel Threat Hunting Information Sharing 2. Security Operations Center (SOC) Detection, Prevention, and Initial Response 3. Cyber Sec Incident Response Team (CSIRT) Investigate and Deep Analysis Communications Tactical and Operational Mitigations Would love to hear anyone's input and recommendations!
Avatar
Avatar
theshark
OSforensics has a event log and web server log viewer
? Sorry, I didn’t get it.
Avatar
Avatar
SavedData
? Sorry, I didn’t get it.
What are you confused about
Avatar
Avatar
theshark
What are you confused about
Cyberark PAM solution generate logs from its vault/threat analysis/privileged session manager. Now I have logs sent to syslog and action code references from their docs, but I didn’t understand what does the extended fields mean and cef fields mapping to and thus I don’t know how to utilize these logs. I’ll appreciate if anybody could give me a little url about how to interpret these log. Thanks in advance. (edited)
📬 1
🤯 1
Avatar
Avatar
SavedData
Cyberark PAM solution generate logs from its vault/threat analysis/privileged session manager. Now I have logs sent to syslog and action code references from their docs, but I didn’t understand what does the extended fields mean and cef fields mapping to and thus I don’t know how to utilize these logs. I’ll appreciate if anybody could give me a little url about how to interpret these log. Thanks in advance. (edited)
🫡 1
Avatar
Anyone have a good reference sheet or website for iPhone EXIF data explanation? Thanks
Avatar
Does anyone know if what’s app keeps the metadata in photos? I want to find out if it’s possible to see where the photo was taken.
Avatar
Avatar
dcs453
Does anyone know if what’s app keeps the metadata in photos? I want to find out if it’s possible to see where the photo was taken.
I remember a case I did, and the actual images had all exif stripped from it. Luckily the original images were on that same device
Avatar
Does anyone have any papers I can reference showing how long "disappearing" snaps would be still recoverable on a Android/iPhone?
Avatar
Avatar
snoop168
does anyone know where I can find IOS update logs? Looking to see when the phone was updated to the current ios version its on, preferably see the version that it upgraded from
James Pedersen 12/12/2023 2:36 PM
@snoop168 Did you ever figure this out?
Avatar
Avatar
James Pedersen
@snoop168 Did you ever figure this out?
Yes kinda. I used @ScottKjr3347 photos.sqlite migration script.
2:39 PM
That along with something else trying to recall.
2:45 PM
I added the migrations to a plugin for ileapp
Avatar
Hot take on how effective faraday bags are? I haven’t never found them to be super effective. Want more professional opinions rather than someone who got a basic training on their functionality
Avatar
Avatar
maddie
Hot take on how effective faraday bags are? I haven’t never found them to be super effective. Want more professional opinions rather than someone who got a basic training on their functionality
Faraday bags have two main ways of preventing the deletion of data on evidence phones. 1) Prevent changes to the data (primarily in chat messages like Facebook Messenger) if the data is accessed from another device and content is deleted. 2) Prevent the remote deletion of all of the data on the phone by a wipe command being sent to the phone (like the Find My app on iOS.) All faraday bags/environments need to be tested before being trusted. Aluminum foil can be used in a pinch if faraday bags are not available. SIM cards can also be removed, but phones could still connect to WiFi and eSIMs are becoming more popular. Airplane mode can also be activated, but again phones can still connect to WiFi and changes can be made to the data. If wrapped in a tinfoil or placed in a faraday bag while still on, there is the concern of removing the phone from the bag/foil if there is no faraday box/environment nearby before the phone powers down and goes into a BFU state. Functioning faraday bags with a nearby faraday box/room are the best solution, and extraction of phones in a faraday environment is the gold standard.
👏 2
Avatar
Which channel would be best appropriate for uav forensics
Avatar
Does anyone know if Santoku is around still? It seems to have evaporated - I haven't looked for it in a couple of years, and now I can't find anything 'current'.
Avatar
Avatar
5cary
Does anyone know if Santoku is around still? It seems to have evaporated - I haven't looked for it in a couple of years, and now I can't find anything 'current'.
considering the santoku-linux link now redirects to www.nowsecure.com i will say it's pretty likely the company somehow took ownership of the project and then killed it or made it part of their own paid solutionsanimated_teasip
Avatar
Avatar
jcase
Which channel would be best appropriate for uav forensics
#drones probably
Avatar
forensicMouse 12/13/2023 3:19 PM
If you were offered $1M budget for any big ticket item to your lab but cannot be licenses or password cracking cluster, what would you ask for?
Avatar
Dr. Kaan Gündüz 12/13/2023 6:01 PM
An espresso machine
😂 8
Avatar
Avatar
maddie
Hot take on how effective faraday bags are? I haven’t never found them to be super effective. Want more professional opinions rather than someone who got a basic training on their functionality
The ones we use are pretty good. We usually test them by pairing a dummy mobile to a bluetooh speaker, playing music, then placing the phone in the faraday bag. If the music cuts out, we'll test that same bag (from the manufacturer) several more times, in several different environments from several different distances until we like what we see.
Avatar
Question Is it possible to track where a user downloaded a malicious file from if we have the hash and the file name? User doesnt remember when they downloaded it. I personally think it’s not an easy task.
Avatar
Avatar
Vendetta
Question Is it possible to track where a user downloaded a malicious file from if we have the hash and the file name? User doesnt remember when they downloaded it. I personally think it’s not an easy task.
randomaccess 12/13/2023 10:16 PM
Super broad question. Because it can be as simple as zoneid and browser history and as hard as their system is compromised by an insider that's framing them and using obscure methods to download tools
Avatar
Avatar
Vendetta
Question Is it possible to track where a user downloaded a malicious file from if we have the hash and the file name? User doesnt remember when they downloaded it. I personally think it’s not an easy task.
well, i think possible looking at the $I30 files may be of help for a least knowing when the file was created as they keep a record of all files that exist and existed on windows along with timestamps, MFT record changes, etc as explained it this 13cubed video. https://www.youtube.com/watch?v=x-M-wyq3BXA EDIT: i misread the question initially so had to make some minor edits to not sound like a idiot (edited)
Avatar
Hi, anyone from @Magnet Forensics available ?
📬 1
Avatar
Avatar
Alexsaurus
#drones probably
how did i not see that lol
Avatar
Avatar
forensicMouse
If you were offered $1M budget for any big ticket item to your lab but cannot be licenses or password cracking cluster, what would you ask for?
Faraday solution, tent or stand alone box
Avatar
Nipi The Humble 12/14/2023 9:45 AM
Good morning. If i want to start in DFIR, what would you recommend???
Avatar
Avatar
Nipi The Humble
Good morning. If i want to start in DFIR, what would you recommend???
That’s a good question. It’s such a broad field. My question is, what are you interested in?
Avatar
Avatar
Beercow
That’s a good question. It’s such a broad field. My question is, what are you interested in?
Nipi The Humble 12/14/2023 12:27 PM
Oh boy. Let's say that I want to start somewhere. I know that it's a plethora to go from, but to start, what would you recommend???
Avatar
https://dfirdiva.com/ is a great resource
Digital Forensics & Incident Response Blog Geared Toward Beginners. Free & Affordable Training, Resources, DFIR & Cybersecurity Community Events.
12:41 PM
She’s got a great blog/resources for those beginning.
12:42 PM
SANS as well has a paper on getting a foot into the door of dfir as well. There’s a bunch of good resources with a quick google if that’s the type of recommendation you’re looking for to get a start (edited)
Avatar
Anyone @Cellebrite able to chat in DM real quick.
Avatar
Avatar
maddie
Hot take on how effective faraday bags are? I haven’t never found them to be super effective. Want more professional opinions rather than someone who got a basic training on their functionality
My phone doesn't work in my parking garage, 2 floors down, just make your office in a basement with a faraday bag also xD
Avatar
Looking to show use of a specific MicroSD card on an Android phone. Looking through the SANS posters but I'm not seeing anything just yet. Tried searching but if it's here I'm using the wrong words. Anyone have any tips? I have the MicroSD and a FFS from the phone.
2:22 PM
Right after I posted I found this one on the SANS poster: /data/com.android.providers.media.module/databases/external.db checking there now.
2:26 PM
Great database. Shows all sorts of goodies. One slight change, I found the db at: data/data/com.google.android.providers.media.module/databases/external.db
Avatar
walktexranga 12/14/2023 7:23 PM
Any vendors out there offer a way to image an iwatch?
Avatar
Avatar
walktexranga
Any vendors out there offer a way to image an iwatch?
No experience with it but I’ve seen this link passed around before.
👍 1
Avatar
walktexranga 12/14/2023 7:36 PM
Thx I'll check it out
Avatar
Avatar
walktexranga
Any vendors out there offer a way to image an iwatch?
Datapilot has/had a solution somewhat recently
👍 1
Avatar
Ross Donnelly 12/15/2023 4:20 AM
Google Will Stop Providing Law Enforcement Data on Which Users Were Near a Crime https://time.com/6539416/google-location-history-data-police/
The company said location data will soon be saved directly on users’ devices, blocking Google from seeing it and, by extension, blocking law enforcement demanding that information.
Avatar
Avatar
Ross Donnelly
Google Will Stop Providing Law Enforcement Data on Which Users Were Near a Crime https://time.com/6539416/google-location-history-data-police/
So this will effect the Google Takeout I assume?
12:19 PM
If you ever dealt with Android Parental Controls effecting Cellebrite extraction please check this out: https://discord.com/channels/427876741990711298/427877097768222740/1185315131471691787 (edited)
Avatar
Avatar
theshark
So this will effect the Google Takeout I assume?
Ross Donnelly 12/15/2023 12:32 PM
I read elsewhere the user has the option of storing it locally only or on the cloud (encrypted out of Google's reach), and the default retention is reduced to 3 months (from previous 18 months). So it depends on what options they may have selected.
Salute 1
Avatar
We have in m365 defender/security https://www.netwrix.com/endpoint_management_software.html Anyone here used netwrix to prevent pass-the cookie and/or PRT-Pass-Hash attacks? How well does it work? And does m365 E5 license with MDfE/MS security centre etc have a smimilar capability? Also des m365 have a good PAm solution add-on similar to cyberark's?
Learn how endpoint management software from Netwrix helps you secure workstations, accelerate user productivity, and modernize Windows environments.
Avatar
Hello, is anyone using a PXE boot server to deploy OS images in lab for analysis computers via network? If yes, any recommendations? (edited)
Avatar
the salaryman 12/17/2023 7:49 PM
What are your favorite general and topic-specific dfir books?
Avatar
Mohammed Alkharji 12/18/2023 12:32 AM
Hi all How are you all doing I’ve been searching for an Operating Systems course or mini-course (mainly Win, Linux) from security perspective from which I can learn what I need to know about OSs, processes, memory … etc and what are the normals and abnormals Hopefully someone can save me time and effort instead of having to collect everything by myself Thank you
Avatar
Avatar
Mohammed Alkharji
Hi all How are you all doing I’ve been searching for an Operating Systems course or mini-course (mainly Win, Linux) from security perspective from which I can learn what I need to know about OSs, processes, memory … etc and what are the normals and abnormals Hopefully someone can save me time and effort instead of having to collect everything by myself Thank you
Andrew Rathbun 12/18/2023 4:31 AM
The "Mastering Windows Internals" course could be just the opportunity you're seeking. Let's embark on this journey together to unlock your full potential in cybersecurity
TrainSec - Security and Programming Training
🔥 1
👍 1
Avatar
@Cellebrite When exporting data from a cellebrite report (like location data) I’m getting this error: Report Generation Error : Failed to generate report. Cannot find license 'Aspose.Total.lic.’ (edited)
Avatar
CLB-DannyTheModeler 12/18/2023 8:44 AM
what version of PA?
Avatar
Original message was deleted or could not be loaded.
@sholmes @Digitalferret 👀 (edited)
Avatar
Avatar
CLB-DannyTheModeler
what version of PA?
Cellebrite reader 7.54.1.7
Avatar
Avatar
Fr0stByt3
@sholmes @Digitalferret 👀 (edited)
@Andrew Rathbun
Avatar
@Magnet Forensics When is the next version of Axiom coming out?
Avatar
Avatar
sholmes
@Magnet Forensics When is the next version of Axiom coming out?
Didn't we just get one last week?
👍 1
Avatar
Avatar
Alexsaurus
Didn't we just get one last week?
Thanks! I haven't launched axiom over the past week, while working a case and didn't see the update. I really should read those notifications. I just posted out of frustration. Thansk @Alexsaurus
Avatar
Too eager 😄
2:14 PM
afaik 7.8 is the latest
Avatar
Avatar
sholmes
Thanks! I haven't launched axiom over the past week, while working a case and didn't see the update. I really should read those notifications. I just posted out of frustration. Thansk @Alexsaurus
cScottVance 12/18/2023 2:24 PM
7.8 just dropped with some updates, bug fixes, and new DJI Flight Log Decryption. 7.9 is planned for mid January with some performance enhancements and several new features/updates.
👍 4
Avatar
Can a collected email account timeline be 12 months off when you go to examine/QC the collected data? Any cause for this??
Avatar
Is anyone familiar with using RLEAPP? I'm looking for a better way to parse Google search warrant returns for account information, linked accounts, etc, and RLEAPP seems like a good option. I get an error when I run it in Python and when using the GUI, the program doesn't find the necessary files within the return. I'm sure it's user error and am hoping someone can help.
Avatar
Avatar
IronMule
Is anyone familiar with using RLEAPP? I'm looking for a better way to parse Google search warrant returns for account information, linked accounts, etc, and RLEAPP seems like a good option. I get an error when I run it in Python and when using the GUI, the program doesn't find the necessary files within the return. I'm sure it's user error and am hoping someone can help.
@Brigs might be able to help, he wrote it.
Avatar
Avatar
IronMule
Is anyone familiar with using RLEAPP? I'm looking for a better way to parse Google search warrant returns for account information, linked accounts, etc, and RLEAPP seems like a good option. I get an error when I run it in Python and when using the GUI, the program doesn't find the necessary files within the return. I'm sure it's user error and am hoping someone can help.
Avatar
Avatar
IronMule
Is anyone familiar with using RLEAPP? I'm looking for a better way to parse Google search warrant returns for account information, linked accounts, etc, and RLEAPP seems like a good option. I get an error when I run it in Python and when using the GUI, the program doesn't find the necessary files within the return. I'm sure it's user error and am hoping someone can help.
Avatar
I think it might be a file path error. The program seems to look not just for a file name but searches for the entire file path as Google provides it. This return has already been messed with by the case agent so the files aren't in Google's standard locations.
Avatar
Avatar
IronMule
I think it might be a file path error. The program seems to look not just for a file name but searches for the entire file path as Google provides it. This return has already been messed with by the case agent so the files aren't in Google's standard locations.
Is there anyway you can get the original return as they downloaded it from Google?
Avatar
Yeah. I have plenty of returns I can try it with. I don't necessarily need it for this case. I'm looking for a better way to present this data in the future. I'm finding most agents go right to the emails, documents, etc, and aren't aware of all the other info Google provides that could be relevant.
Avatar
Avatar
IronMule
Is anyone familiar with using RLEAPP? I'm looking for a better way to parse Google search warrant returns for account information, linked accounts, etc, and RLEAPP seems like a good option. I get an error when I run it in Python and when using the GUI, the program doesn't find the necessary files within the return. I'm sure it's user error and am hoping someone can help.
can you share the error in a screenshot?
Avatar
Performed a date filtered a yahoo email collection, using FEC. Date filter was Nov 1 2018 - Dec 31 2019 but i received 150 from 2009? Anyone know what could cause this. It was an Inline search.
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 12/20/2023 6:02 PM
Run the IP through ARIN and see if there's an abuse email listed there?
👍 1
Avatar
Avatar
stark4n6
can you share the error in a screenshot?
You can see the file activities* is there but it's not in a folder named "Access Log Activity". When I have a minute I'll run it against an unaltered return from Google to see if it works. I can't remember the exact error I get when I run it in the command prompt. It doesn't recognize one of the lines of code, something like "pyxx.timezone" or something. I can check when I'm back in my office. (edited)
Avatar
Avatar
IronMule
You can see the file activities* is there but it's not in a folder named "Access Log Activity". When I have a minute I'll run it against an unaltered return from Google to see if it works. I can't remember the exact error I get when I run it in the command prompt. It doesn't recognize one of the lines of code, something like "pyxx.timezone" or something. I can check when I'm back in my office. (edited)
Actually, now that I look at it again, I think this one is in the proper folder. So I really don't know what's going on.
Avatar
Avatar
nbh2493
Performed a date filtered a yahoo email collection, using FEC. Date filter was Nov 1 2018 - Dec 31 2019 but i received 150 from 2009? Anyone know what could cause this. It was an Inline search.
Is it possible the modified time of these emails was within your date range? I recently worked with a gmail return that had emails from 2007 with modified times in 2021.
Avatar
Hi all! Junior DFIR analyst here, was wondering if anyone can offer me any advice or help with regards to Event Logs. Using the standard SANS Triage Kape output, am I able to find any signs from the event log that a threat actor may be pivoting from an AD server to different endpoint machines (I only have the logs for the AD server)? Also, is it possible to acquire the password for the AD server using any malicious tools assuming I have initial access to one of the end points? The end point is connected to the AD server. Thank you! (edited)
Avatar
Hi, Is there a Belgian Judicial IT Forensics expert ?
Avatar
Avatar
IronMule
Actually, now that I look at it again, I think this one is in the proper folder. So I really don't know what's going on.
the screenshot is blurry and small so can't exact read it but maybe the paths need tweaked from the RLEAPP side as well
Avatar
Hello guys, I had an interview for an intership today, one of the question was "A client call you and says that he has been encrypted by a malicious actor. You the CERT, what do you do ?" Does you have any advice about this question ?
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 12/21/2023 9:50 AM
We can move this to #training-education-employment but you'll probably want to look for a consulting gig in the private sector where you can learn on the job while billing hours for your employer. It also helps to network and know people so they can vouch for you to get you in to their employer when hiring opportunities arise.
Avatar
Original message was deleted or could not be loaded.
Andrew Rathbun 12/21/2023 9:55 AM
Just repost, no worries 🙂
👍 1
Avatar
does someone know where to get FTK Imager 32 bit? or any suggestion for a tool that can image (logical, AD1) in a 32bit Enviroment? i got a Windows 8 Tablet with no USB boot options
Avatar
Solved - got an old FTK version 3.x in 32 bit
👍 1
Avatar
Can anyone recommend a good cloud storage configuration that works well with NAS.
Avatar
What do y'all use for a Mobile Forensic Extraction tool. OTHER THAN @Cellebrite
Avatar
I have a Samsung S10 (android 11) that’s in bootloop after attempting to reboot as part of an extraction, I’ve tried pressing all the buttons to get it into download mode or just forcing reboot but still maintains bootloop, it has 50% battery so was thinking let it die then charge n hope it boots normally but any other suggestions?
📬 1
Salute 1
🎖️ 1
Avatar
Avatar
coastal4n6
What do y'all use for a Mobile Forensic Extraction tool. OTHER THAN @Cellebrite
I’ve used @Magnet Forensics AXIOM in the past
Avatar
Avatar
Lauren
I’ve used @Magnet Forensics AXIOM in the past
Thank's Lauren. I also have AXIOM currently. However, I am looking for a complete replacement of @Cellebrite So, I have reached out to Magnet to get a quote on their VeraKey
Avatar
Avatar
Lauren
I’ve used @Magnet Forensics AXIOM in the past
Axiom pulls live response data from androids as well… something I don’t think UFED does (or at least they didn’t a few years back). Had a case where the live response data was vital, axiom was the only tool that gave it to me at the time.
Avatar
Anyone from the digtial forensics analysts , OSINT and investigatons sector are you aware of any courses around i2 Analyst Notebook ? (edited)
Avatar
chrisforensic 12/22/2023 11:35 PM
Special morning greets to @cScottVance from @Magnet Forensics I watched your webinar "Mobile Unpacked - Episode 12" about mediafiles... very well done and full of important information 👍 (edited)
Avatar
Avatar
chrisforensic
Special morning greets to @cScottVance from @Magnet Forensics I watched your webinar "Mobile Unpacked - Episode 12" about mediafiles... very well done and full of important information 👍 (edited)
Isnt Scott from @Magnet Forensics :)?
Avatar
Avatar
florus
Isnt Scott from @Magnet Forensics :)?
chrisforensic 12/23/2023 3:53 AM
haha, yes... my brain is not in best form in the morning 😂
Avatar
Hey Guys. Is there any record or log stored on a memory card indicating the devices to which it has been connected? Additionally, is it feasible to identify the devices the memory card has been connected to through an analysis of the card itself?
Avatar
kmacdonald1565 12/26/2023 1:35 PM
Hey fellas, I have a laptop that recently took a dump. it freezes up on what appears to be a hardware level video error (super hard freeze with sudden graphical glitches on screen), but am still working to diagnose to see if it is salvageable ...its like 6-7 years old so if its gone, no big deal. That being said, I have not shopped for a laptop in a while. This is 90% for ICAC work, particularly with on-scene previews and some typical forensic work back, video editing/enhancing, and similar things back at the office when it is not deployed. my office(county) will only buy dells but being that it is for forensic work i can kind of get around that maybe. anyone have recommendations on a good bang for your buck laptop? I literally just started looking today. Starting with Dells (XPS and Alienware) of course because I think they will be the easiest to get purchased.
Avatar
Avatar
kmacdonald1565
Hey fellas, I have a laptop that recently took a dump. it freezes up on what appears to be a hardware level video error (super hard freeze with sudden graphical glitches on screen), but am still working to diagnose to see if it is salvageable ...its like 6-7 years old so if its gone, no big deal. That being said, I have not shopped for a laptop in a while. This is 90% for ICAC work, particularly with on-scene previews and some typical forensic work back, video editing/enhancing, and similar things back at the office when it is not deployed. my office(county) will only buy dells but being that it is for forensic work i can kind of get around that maybe. anyone have recommendations on a good bang for your buck laptop? I literally just started looking today. Starting with Dells (XPS and Alienware) of course because I think they will be the easiest to get purchased.
Andrew Rathbun 12/26/2023 1:43 PM
Sounds like you'll want lots of cores/threads for processing, lots of RAM, SSDs (No HDDs except for storage drives), and probably a nice screen. Do you have a budget?
Avatar
Deleted User 12/26/2023 5:04 PM
Hi everyone. Has anyone bought the 13cubed video courses? are they worth the money? thanks (edited)
Avatar
Avatar
Deleted User
Hi everyone. Has anyone bought the 13cubed video courses? are they worth the money? thanks (edited)
High quality, online, on-demand, and affordable digital forensics training courses from 13Cubed
I gotta tell you about my experience with the "Investigating Windows Endpoints" training course by Richard Davis from 13Cubed. Let me start by saying it's freaking awesome! Seriously, it's as good as those pricey trainings from other places. And let me tell you, Richard is an absolute legend. He's super helpful, like I can't even
Avatar
Avatar
Beercow
Deleted User 12/26/2023 5:33 PM
thank you 🙂
Avatar
Avatar
Andrew Rathbun
Sounds like you'll want lots of cores/threads for processing, lots of RAM, SSDs (No HDDs except for storage drives), and probably a nice screen. Do you have a budget?
kmacdonald1565 12/26/2023 8:16 PM
Sorry for the delay, not yet...I am assuming under 2k
Avatar
kmacdonald1565 12/27/2023 6:53 AM
its probably a bad sign that memtest86 froze after 2 minutes 30 seconds right? no error, just stopped
6:53 AM
and its been probably 15 minutes lol
Avatar
What do you use to photograph evidence? I need a basic windows app that I can photograph evidence with. Ideally it will start by asking me where I want the photos stored, then proceed with taking photos using my USB camera. (that way they won't get mixed up) I used to use the Cellebrite UFED app, but changes in licencing prevents me from running it on the PC I want to. (edited)
Avatar
Avatar
kmacdonald1565
its probably a bad sign that memtest86 froze after 2 minutes 30 seconds right? no error, just stopped
memtest86 or memtest86+? (edited)
8:01 AM
I recall passmark memtest86 freezing occasionally from my retail days, so it's worth trying + (edited)
8:03 AM
I also had good luck triggering ram issues with prime95 in blend mode IIRC, but that's more for A/B testing while swapping sticks
Avatar
Avatar
rayeh
memtest86 or memtest86+? (edited)
kmacdonald1565 12/27/2023 8:22 AM
i just downloaded it....i should probably know which version it was...either way, i rebooted it after about an hour or so. then failed to boot due to "memory failure/RAM failure"
8:22 AM
tried to boot with one of the 2 sticks, 1 threw an "invalid memory installed" error, the other booted up. doing another test now to see what happens
CryCatUp 1
Avatar
Avatar
GRIZZ
What do you use to photograph evidence? I need a basic windows app that I can photograph evidence with. Ideally it will start by asking me where I want the photos stored, then proceed with taking photos using my USB camera. (that way they won't get mixed up) I used to use the Cellebrite UFED app, but changes in licencing prevents me from running it on the PC I want to. (edited)
What do you use for your evidence system ? If they have an app its convenient as you can select the case file and item and add media from there.
Avatar
Avatar
GRIZZ
What do you use to photograph evidence? I need a basic windows app that I can photograph evidence with. Ideally it will start by asking me where I want the photos stored, then proceed with taking photos using my USB camera. (that way they won't get mixed up) I used to use the Cellebrite UFED app, but changes in licencing prevents me from running it on the PC I want to. (edited)
I just use the ipevo app with my document camera. Ipevo.com I think.
👍 1
Avatar
Avatar
DCSO
What do you use for your evidence system ? If they have an app its convenient as you can select the case file and item and add media from there.
For cellphone forensics I was using Cellebrite UFED.
Avatar
Avatar
whee30
I just use the ipevo app with my document camera. Ipevo.com I think.
Do you use "IPEVO SnapCapture OCR", or a diffrent app?
Avatar
IPEVO Visualizer
9:57 AM
Interface looks like this. It just connects to whatever camera I've got plugged in. Works with my logitech webcam as well so it doesn't seem to care who made the camera
9:57 AM
can do video or stills. I am my evidence management solution so I don't really have a built in app to work with
9:58 AM
this is easy and works for me
Avatar
Avatar
whee30
this is easy and works for me
Thank you, I installed SnapCapture OCR and it was a terrible mistake. It installed trash, required an online account, and broke my video player. Warning for anyone who thinks about trying "IPEVO SnapCapture OCR".
12:16 PM
I'll get Visualizer after I clean up this mess.
Avatar
Avatar
Phillips
Hi all. How is everyone dealing with Bluetooth Low Energy (BLE) devices and location tracking while powered off? Discussions are ongoing with correct precautions to take, but if anyone had any particular advice or practices they do to help with this it would be great to know.
Did you make any progress with this? My concern is post examination when the device still has power and generating the BLE tokens to emit. Even powered off an iOS device will still have 96 tokens (thats one evry 15 minutes for a 24hr period). Once battery drain is complete, it will still have 96 generated during the iOS shut down , despite there being no power left for the user there is always some held back for iOS naturally. So retention in a farady environment until no power is available and then for an extra 24 hours seems the best way, but very labour intensive and placing demands on faraday capability. Intrigued if you progressed this further?.
Avatar
Not sure if this is a relevant question for here or if there’s a more appropriate place to put it within this discord. We’ve got a load of laptops that have been provided by a home office project for us to carry out victims phone extractions. I’m in the process of setting them up and configuring the bitlocker so there is a pre-boot passkey alpha-numeric. No matter what I try, setting this up via group policy stops any users from being able to enable bitlocker on removable drives. I’ve tried enabling the specific group policy for removable drives but this gives the “conflict with group policy” error. I can’t find any online posts about this sort of thing, but I’m sure it must be possible. (edited)
Avatar
Hey guys, I am looking to soothe my imposter syndrome, as I might be wanting to interview with a different company for an IR position than the one I am in right now (also doing IR, mainly windows forensics). I have worked extensively with KAPE and all the Zimmerman tools, and I am responsible for data collection and building/designing our forensic pipeline. I want to prepare myself in terms of possible technical questions, and while I have great analytical skills, I rely on my own notes/sans posters a lot on a daily basis to remember specific event ids, and info about different artifacts. Now… I can’t pull up my laptop and the posters during an interview, so I was wondering if anybody would be willing to share their experiences with IR technical questions from a recruitment interview? How much emphasis was on having events/artifacts memorised? And how much was DNS, Active directory and networking emphasised?
👍 1
Avatar
Anyone from @Belkasoft free for a DM?
Avatar
Avatar
Scrubz
Anyone from @Belkasoft free for a DM?
Yuri Gubanov (Belkasoft) 12/29/2023 8:52 AM
Yes, please
Avatar
Avatar
Yuri Gubanov (Belkasoft)
Yes, please
Replied thanks.
Avatar
hello can anyone here give me some tips or any reading material for postgresql dfir
Avatar
chrisphilly 1/2/2024 7:24 AM
If anyone works with Admin/Finance/Cyber Insurance Underwriters or supports providing documentation to carriers related to cyber insurance policies, I'm creating a list of criteria carriers rely on to assess the likelihood of issuance a cyber insurance policy, assessing risk, and/or determining rates. Goal is to prepare the business before applying for or renewing a cyber insurance policy to ensure issuance/renewal of that policy and the best rate. Similar in concept to meeting an ISO standard, but I'm not finding much by way of guidance via web searching.
Avatar
Avatar
chrisphilly
If anyone works with Admin/Finance/Cyber Insurance Underwriters or supports providing documentation to carriers related to cyber insurance policies, I'm creating a list of criteria carriers rely on to assess the likelihood of issuance a cyber insurance policy, assessing risk, and/or determining rates. Goal is to prepare the business before applying for or renewing a cyber insurance policy to ensure issuance/renewal of that policy and the best rate. Similar in concept to meeting an ISO standard, but I'm not finding much by way of guidance via web searching.
CyberGhost 1/2/2024 9:53 AM
I don't have a whole lot of experience with this, but I can you that from the most recent one I was involved with the providers wanted SO MUCH DOCUMENTATION. Cyber insurance coverage has changed a lot just from a few years ago. Almost all of them wanted policies and procedures for vulnerability assessments, incident response plan, backup/disaster recovery, any risk assessments done, and that MFA was enforced. MFA was a requirement for all of the providers. A select few of them required a review by a 3rd party for a stamp of approval that best practices were being adhered to. Many of them seem base their guidance on NIST cybersecurity framework and also CIS Benchmarks when it comes to were best practices being implemented and maintained.
Avatar
Also another note, a few of them had in the terms that if an incident were to occur the insurance company would be the one to manage the incident response firm. We did not like that.
Avatar
Avatar
CyberGhost
I don't have a whole lot of experience with this, but I can you that from the most recent one I was involved with the providers wanted SO MUCH DOCUMENTATION. Cyber insurance coverage has changed a lot just from a few years ago. Almost all of them wanted policies and procedures for vulnerability assessments, incident response plan, backup/disaster recovery, any risk assessments done, and that MFA was enforced. MFA was a requirement for all of the providers. A select few of them required a review by a 3rd party for a stamp of approval that best practices were being adhered to. Many of them seem base their guidance on NIST cybersecurity framework and also CIS Benchmarks when it comes to were best practices being implemented and maintained.
chrisphilly 1/2/2024 10:25 AM
Super helpful and aligning with a free download I found online. Sharing with the broader team as a resource. https://global.lockton.com/au/en/news-insights/a-guide-to-basic-controls-demonstrating-cyber-preparedness-au
The challenges created by the current cyber threat landscape continue to plague insurers, policyholders and prospective purchasers of cyber insurance.
Avatar
Avatar
CyberGhost
Also another note, a few of them had in the terms that if an incident were to occur the insurance company would be the one to manage the incident response firm. We did not like that.
chrisphilly 1/2/2024 10:27 AM
That's been my experience working in IR Cyber Risk Consulting. The carriers have a list of approved vendors. Since the carriers pay the bills, they want the oversight of their investment.
Avatar
Avatar
chrisphilly
That's been my experience working in IR Cyber Risk Consulting. The carriers have a list of approved vendors. Since the carriers pay the bills, they want the oversight of their investment.
Yeah that seems to be the case. I think where the conflict comes is when an origination does have inhouse IR capabilities. Then it becomes a matter of who is doing what, it really depends on the outside IR firm. Hopefully they would take the approach of working with the internal team vs coming in "taking over". The issue the business had with this is there is potential the outside IR/insurance would get to manage the external communication or any public statements, communication with a potential ransomware operator, etc. They didn't want someone they don't currently even know or do business with speaking for them, potentially. I think there is a balance, because having access to and outside IR firm and outside legal counsel is extremely helpful depending on the scope of the incident.
Avatar
Avatar
CyberGhost
Yeah that seems to be the case. I think where the conflict comes is when an origination does have inhouse IR capabilities. Then it becomes a matter of who is doing what, it really depends on the outside IR firm. Hopefully they would take the approach of working with the internal team vs coming in "taking over". The issue the business had with this is there is potential the outside IR/insurance would get to manage the external communication or any public statements, communication with a potential ransomware operator, etc. They didn't want someone they don't currently even know or do business with speaking for them, potentially. I think there is a balance, because having access to and outside IR firm and outside legal counsel is extremely helpful depending on the scope of the incident.
chrisphilly 1/2/2024 11:36 AM
For general knowledge and maybe to provide some comfort for your leadership teams, based on my experience, during an IR, the IR firm is actually engaged by 3rd party breach counsel. Therefore, all communication between the business and the IR firm is covered by attorney/client privilege. I have never, and I mean NEVER, experienced an IR event where the IR firm communicated with anyone except at counsel's direction. Counsel almost always handles all communication with 3rd parties and the public. I hope you find that to be the case, if, God-forbid, you work through an IR event. Using a 3rd party IR firm provides the business with cover as a neutral, disinterested 3rd party works collaboratively with the business to conduct the investigation. Then the businesses can't be accused of bias/indiscretion. Really great conversation @CyberGhost . Thank you for responding.
👍 1
Avatar
I know this might sound stupid but... i'm having a problem 🙂 a client that was supposed to deliver me a disk with a forensics image of a machine for examination, badly messed up, and for god knows what reason, he sent me a drive that looks like formatted in ReFS (the image is a file inside this filesystem). Unfortunately there might be some versioning issues with the filesystem because even on windows 10 for workstations, that supports ReFS, the fs is seen as raw. I know i can bash the client and ask for a new delivery on a drive that is formatted in a "normal" filesystem that would read on most of the OSes, and i will do, but i really wanted to start examination without having to wait for the couriers delay. So my question is: is there any way to figure out the exact version of the refs in which this drive has been formatted? any "recovery tool" that would allow me to at least read the content of the drive and copy the forensic image off of it? I've tried fsutils but i receive the error: > fsutil.exe fsinfo refsinfo G: Error: The volume does not contain a recognized file system. Please make sure that all required file system drivers are loaded and that the volume is not corrupted. A local REFS volume is required for this operation. on another volume i have a working reFS that is version 3.4 on a windows 10 for workstations 22h2 which works fine
Avatar
Digitalferret 1/2/2024 2:09 PM
"with a forensics image of a machine for examination" " looks like a drive that looks like formatted in ReFS" what else has s/he screwed up? yes: do bash the client and ask for a new delivery on a drive that is formatted in a "normal" filesystem. If you accept the compromise and go forward, I'd guess it's your neck on the line if legal sh*t and fan meet later. Other than that, if you want to play it that way, maybe run it under the nose of UFSExplorer see what it finds
💯 1
Avatar
@Digitalferret well, the problem is simply the fact that i cant access the image stored on the drive, as long as the image is intact and the sha1 is preserved, i don't see any issue in the analysis process. yet it's annoying, and i can see the point if anyone wants to examine the original copy, reFS is definitely not the way to store it. By the way, this thing is not going to court, yet i'm too lazy to take any further action in an attempt to recover data from a source drive i cant read. I'm not paid for that extra work, so.. i'll ask for a new media formatted in NTFS or ext4 or anything that doesn't s**k monkey b...ls
Avatar
Avatar
Rampage
@Digitalferret well, the problem is simply the fact that i cant access the image stored on the drive, as long as the image is intact and the sha1 is preserved, i don't see any issue in the analysis process. yet it's annoying, and i can see the point if anyone wants to examine the original copy, reFS is definitely not the way to store it. By the way, this thing is not going to court, yet i'm too lazy to take any further action in an attempt to recover data from a source drive i cant read. I'm not paid for that extra work, so.. i'll ask for a new media formatted in NTFS or ext4 or anything that doesn't s**k monkey b...ls
Digitalferret 1/2/2024 3:25 PM
my bad, i take "forensic" as an indicator it's a court thing. but yes, it's the client's responsibility to provide the right goods. imagine taking your car to the garage for a service / MOT and keeping the keys, bc well, they can sort that sort of shit anyway
Avatar
I just wanted to start processing things on it, because well.. preprocessing takes time.. timeline, plaso, all other indexing stuff, i wanted to do it over night so that i had my stuff ready by morning... while I'm stuck because of this .. meh nvm i'm not the one to blame for stuff taking longer then expected
Avatar
Husky_M00s3 1/2/2024 4:06 PM
Full disclosure, currently reading about ReFS because of your post (thank you.) Excuse my ignorance , but couldn’t you just spin up a VM with the supported operating system and connect the drive and then copy it to a shared folder. Totally agree with @Digitalferret about getting a “cross-resistant” copy. Also, you are correct. That feels like a lot of work. The curiosity bug bit me. 🪲
Avatar
@Husky_M00s3 the problem is that windows 10 for workstation should support reFS fine, but unfortunately it looks like ReFS has different versions across different versions of windows and they are not interoperable, i should install a windows god knows version in the hope to be able to connect the drive and have it detected
Avatar
installed a VM with the latest version of windows 11 and it managed to open the drive. now i'm exporting the image to my storage for processing
Avatar
Avatar
kmacdonald1565
Hey fellas, I have a laptop that recently took a dump. it freezes up on what appears to be a hardware level video error (super hard freeze with sudden graphical glitches on screen), but am still working to diagnose to see if it is salvageable ...its like 6-7 years old so if its gone, no big deal. That being said, I have not shopped for a laptop in a while. This is 90% for ICAC work, particularly with on-scene previews and some typical forensic work back, video editing/enhancing, and similar things back at the office when it is not deployed. my office(county) will only buy dells but being that it is for forensic work i can kind of get around that maybe. anyone have recommendations on a good bang for your buck laptop? I literally just started looking today. Starting with Dells (XPS and Alienware) of course because I think they will be the easiest to get purchased.
macbook air m2, or if your budget allows a macbook pro m3 xD
Avatar
Avatar
Rampage
installed a VM with the latest version of windows 11 and it managed to open the drive. now i'm exporting the image to my storage for processing
Digitalferret 1/3/2024 1:14 AM
ah you found a .<img> file then. slept on it and was gonna ask 1: why not just ring the client up and ask wtf? or they may havd sent a bitwise image instead. seriously i've had folks send me their "hard drive" and the entire desk top pc has turned up. (edited)
Avatar
Avatar
kmacdonald1565
Hey fellas, I have a laptop that recently took a dump. it freezes up on what appears to be a hardware level video error (super hard freeze with sudden graphical glitches on screen), but am still working to diagnose to see if it is salvageable ...its like 6-7 years old so if its gone, no big deal. That being said, I have not shopped for a laptop in a while. This is 90% for ICAC work, particularly with on-scene previews and some typical forensic work back, video editing/enhancing, and similar things back at the office when it is not deployed. my office(county) will only buy dells but being that it is for forensic work i can kind of get around that maybe. anyone have recommendations on a good bang for your buck laptop? I literally just started looking today. Starting with Dells (XPS and Alienware) of course because I think they will be the easiest to get purchased.
My bad, I read your post in more detail, Dell is fine, but if you can, maybe try a ThinkPad in this series, I'd go with AMD, preferably a 7 pro https://www.lenovo.com/ca/en/p/laptops/thinkpad/thinkpadp/thinkpad-p16s-gen-2-(16-inch-amd)-mobile-workstation/len101t0075 I chose P16 since, I am going to assume, you want a numpad.
Powered by AMD Ryzen™ PRO & integrated AMD graphics, the ThinkPad P16s Gen 2 (16″ AMD) is a mobile workstation that won’t break the bank.
👍 1
1:41 AM
Spec'd as I would myself,
1:45 AM
Couple features to point out - CPU Cores 8, 16 Threads - Max. Boost Clock Up to *5.1GHz* - DDR5-5600 - AMD Ryzen™ AI, Performance Up to 10 TOPS - Memory: 32 GB LPDDR5X-6400MHz (Soldered) if not enough, add before purchase - Integrated Mobile Broadband: Fibocom L860-GL-16 4G LTE CAT16
Avatar
Avatar
ryd3v
My bad, I read your post in more detail, Dell is fine, but if you can, maybe try a ThinkPad in this series, I'd go with AMD, preferably a 7 pro https://www.lenovo.com/ca/en/p/laptops/thinkpad/thinkpadp/thinkpad-p16s-gen-2-(16-inch-amd)-mobile-workstation/len101t0075 I chose P16 since, I am going to assume, you want a numpad.
kmacdonald1565 1/3/2024 6:06 AM
it appears to be a bad RAM stick, took that out (which required taking nearly the whole darn thing apart as it was 1 of 4 slots...2 internal, 2 easily accessible/under battery cover), and it has been on running a few days now. last thing i want is this to crap out when i need it, so i am requesting a new one anyway so i will definately keep that in mind. out of curiosity, why AMD? i am nonpartial and used to buy personal AMD stuff because it was cheaper back in the day, but i havent heard much about them recently.
Avatar
DFE Travis 1/3/2024 7:00 AM
Do any of you have a template for OneNote that you use for your cases?
Avatar
Hi! Does anyone here know if AutoPsy has a module or a good view for files bearing MotW? I am basically trying to get a good overview of all files that has MotW and their respective referring-/Host URLs.
Avatar
Does anyone have a good contact at AWS to discuss storage configurations for my lab, I have a general sales contact but curious if anyone on here is AWS employee or knows of a better contact to speak with.
Avatar
Is anyone from @Cellebrite around for a DM?
📬 1
Avatar
Avatar
godstoge
Hi! Does anyone here know if AutoPsy has a module or a good view for files bearing MotW? I am basically trying to get a good overview of all files that has MotW and their respective referring-/Host URLs.
Recent Activity should pull zone.identifier data
Avatar
blackleitus 1/3/2024 2:29 PM
I am looking for people who have expertise in risk, GRC, or related but are focused on risk. if anyone knows let me know
Avatar
AccessInvestigations 1/3/2024 4:28 PM
Is there any specific flag that we should add to a line in the _kape.cli file that will allow the user (someone that is not computer savvy) to see the collection process and when it ends so they don't remove the KAPE USB before all the target collections have been completed? I have a case where I have to ask a user to run KAPE from the USB drive.
Avatar
Avatar
Digitalferret
ah you found a .<img> file then. slept on it and was gonna ask 1: why not just ring the client up and ask wtf? or they may havd sent a bitwise image instead. seriously i've had folks send me their "hard drive" and the entire desk top pc has turned up. (edited)
yes, the disk they sent me was a "work copy" that was containing the img file, not the "golden" (sorry for the improper term, i mean the forensic one) image. The only problem was that the disk used for storing it was formatted with that cursed filesystem of hell 🙂 oh i rang them! but still i didn't want to lose the night time and wait the next day for starting indexing the evidence. everything went well in the end: plaso saved the day.. as always 😄
👍🏻 1
Avatar
Avatar
ryd3v
Couple features to point out - CPU Cores 8, 16 Threads - Max. Boost Clock Up to *5.1GHz* - DDR5-5600 - AMD Ryzen™ AI, Performance Up to 10 TOPS - Memory: 32 GB LPDDR5X-6400MHz (Soldered) if not enough, add before purchase - Integrated Mobile Broadband: Fibocom L860-GL-16 4G LTE CAT16
I actually have this exact model
💯 1
11:47 PM
Except it’s completely maxed with 64GB of RAM and the 4K OLED
11:48 PM
I paid 1400 for it
11:48 PM
Would eye it when it goes on sale
11:49 PM
Funnily enough it came with the 86Whr battery and a beefier charger I think
11:49 PM
11:51 PM
If you have lifeworks.. or whatever it’s called, through your job(or maybe ADP I’m not sure how it works)- that with a sale can get you massive discounts on Lenovo
11:51 PM
Or sometimes it’s more than the non-member price
11:52 PM
Stock it hits 77C with AIDA64 torture test. I did a PTM9750 swap but I’m pretty sure I got knockoff PTM so I’m waiting for my ebuy shipment.
Avatar
Avatar
Rampage
yes, the disk they sent me was a "work copy" that was containing the img file, not the "golden" (sorry for the improper term, i mean the forensic one) image. The only problem was that the disk used for storing it was formatted with that cursed filesystem of hell 🙂 oh i rang them! but still i didn't want to lose the night time and wait the next day for starting indexing the evidence. everything went well in the end: plaso saved the day.. as always 😄
Digitalferret 1/4/2024 3:30 AM
nice work 🙂
Avatar
Our SANS Ransomware Summit 2024 CFP closes on Fri, February 16th. Would LOVE to see submissions from this group! https://for528.com/summit24
SANS Ransomware Summit provides the very best forum for ransomware content and applicable lessons to safeguard ourselves and our organizations from harmful ransomware tactics.
💯 1
godstoge started a thread. 1/4/2024 7:01 AM
Avatar
Avatar
AccessInvestigations
Is there any specific flag that we should add to a line in the _kape.cli file that will allow the user (someone that is not computer savvy) to see the collection process and when it ends so they don't remove the KAPE USB before all the target collections have been completed? I have a case where I have to ask a user to run KAPE from the USB drive.
chrisphilly 1/5/2024 4:44 AM
I'm not sure there's a flag, but ensuring the command includes creating a VHDX and zipping the container might help? Then the user could look at the destination media for the .zip file. If it's not there, the collection isn't finished. Also, select the --debug option. More stuff appears on the screen when Kape is running, including that the VHDX is being created. When Kape is finished, the window displaying what's going on with the collection (The CLI window) will automatically close. If the CLI window is open, the collection is still ongoing. @Andrew Rathbun Any other recommendations?
Avatar
Avatar
kmacdonald1565
it appears to be a bad RAM stick, took that out (which required taking nearly the whole darn thing apart as it was 1 of 4 slots...2 internal, 2 easily accessible/under battery cover), and it has been on running a few days now. last thing i want is this to crap out when i need it, so i am requesting a new one anyway so i will definately keep that in mind. out of curiosity, why AMD? i am nonpartial and used to buy personal AMD stuff because it was cheaper back in the day, but i havent heard much about them recently.
Their new chips are great, have used T14 with both AMD and Intel, and the AMD runs faster, and cooler, and seems to get better battery life. Also easy drivers for Linux xD
Avatar
Avatar
Turb0Yoda
I actually have this exact model
That is awesome!!
4:48 AM
How do you like it?
Avatar
dwhite21787 1/5/2024 6:19 AM
The NIST NSRL hashset project is looking for feedback to add to a year end report. If it has helped you, or if you have suggestions to better it, email nsrl@nist.gov by Jan. 22. We are especially interested in use of/comments on the CAID/Project VIC sets. Thanks!
Avatar
Avatar
ryd3v
How do you like it?
Pretty pleased. Haven’t had much time to break it fully in yet but it’s been good
💯 1
Avatar
Avatar
chrisphilly
I'm not sure there's a flag, but ensuring the command includes creating a VHDX and zipping the container might help? Then the user could look at the destination media for the .zip file. If it's not there, the collection isn't finished. Also, select the --debug option. More stuff appears on the screen when Kape is running, including that the VHDX is being created. When Kape is finished, the window displaying what's going on with the collection (The CLI window) will automatically close. If the CLI window is open, the collection is still ongoing. @Andrew Rathbun Any other recommendations?
Andrew Rathbun 1/5/2024 8:25 AM
You're still sharp as a tack re: KAPE! 🙂 @AccessInvestigations make sure the --gui switch is appended to the end of your command(s), because then that means the console window will need to be closed manually by the end user. They will see the amount of seconds it took and that KAPE has completed. Hopefully that helps! (edited)
Avatar
Avatar
Andrew Rathbun
You're still sharp as a tack re: KAPE! 🙂 @AccessInvestigations make sure the --gui switch is appended to the end of your command(s), because then that means the console window will need to be closed manually by the end user. They will see the amount of seconds it took and that KAPE has completed. Hopefully that helps! (edited)
AccessInvestigations 1/5/2024 8:29 AM
Yes thanks guys I got it working. I was failing to put the targets on separate lines, but I got it working. Thanks
💯 1
Avatar
Avatar
chrisphilly
I'm not sure there's a flag, but ensuring the command includes creating a VHDX and zipping the container might help? Then the user could look at the destination media for the .zip file. If it's not there, the collection isn't finished. Also, select the --debug option. More stuff appears on the screen when Kape is running, including that the VHDX is being created. When Kape is finished, the window displaying what's going on with the collection (The CLI window) will automatically close. If the CLI window is open, the collection is still ongoing. @Andrew Rathbun Any other recommendations?
AccessInvestigations 1/5/2024 8:29 AM
Thanks I got it working.
Avatar
Has anyone had any interactions with a web site called https://www.sls.com/ I found that they are connected to DashBoardHosting, LLC. This web site is a dating site and a person made an account of my victim. I found there physical address but no phone or e-mail. I checked search.org and several other places with no luck.
Meet like minded singles, couples and group at SLS.com, the premiere alternative lifestyle dating community for the adventurous. Sign up for free!
Avatar
Avatar
bmarvin.
Has anyone had any interactions with a web site called https://www.sls.com/ I found that they are connected to DashBoardHosting, LLC. This web site is a dating site and a person made an account of my victim. I found there physical address but no phone or e-mail. I checked search.org and several other places with no luck.
Check your DM
Avatar
NQtrader2000s 1/5/2024 1:22 PM
general question for the LE community.. have any of you been forced to implement restrictions on the types of cases you will take due to the out of control and ever growing backlog? we are at a point where we now must consider restricting cases submitted for extraction and analysis.. PC seems to have gone out the window and the "presence" of a cell phone on an individual is enough to take every phone in their vicinity and want them analyzed.. if responding here may cause backlash, feel free to DM me.. thanks in advance!!
Avatar
Avatar
NQtrader2000s
general question for the LE community.. have any of you been forced to implement restrictions on the types of cases you will take due to the out of control and ever growing backlog? we are at a point where we now must consider restricting cases submitted for extraction and analysis.. PC seems to have gone out the window and the "presence" of a cell phone on an individual is enough to take every phone in their vicinity and want them analyzed.. if responding here may cause backlash, feel free to DM me.. thanks in advance!!
Must be nice to have judges who are on board with signing search warrants for all the phones!
Avatar
NQtrader2000s 1/5/2024 1:26 PM
@FullTang in the south.. they don't even read them!! the mere fact they "could have" is enough.. so i am now forced to do their job..lol (edited)
Avatar
Avatar
NQtrader2000s
@FullTang in the south.. they don't even read them!! the mere fact they "could have" is enough.. so i am now forced to do their job..lol (edited)
I would move towards a process where you give ALL of the parsed data back to the investigators, they look through it all and tag what they find useful, then they give the tagged portable cases or UFED Reader reports back to you for the final forensic report. It is on the investigator to stay within the scope of their warrant AND find the stuff they want. At least it takes the bulk of the analysis off of your plate, but you do still have to process it.
1:34 PM
You could even show them how to make .pdf reports from the tagged items so it doesn't have to come back to you for the final report. At least for most types of cases.
Avatar
NQtrader2000s 1/5/2024 1:35 PM
@FullTang we do that now but getting 20 -25 phones a week from simple shoplifting to simple assault to be auto is too much (edited)
1:41 PM
i have heard some labs limit the number submitted per or type of crimes..not@to mention nearly all we get are LOCKED as they don't even bother to try and do any works to get the PC , just take it and wait for us to give them all the goods..which is costly too
Avatar
At the very least, not even trying to get the PC is not a good practice. There is definitely some work to be done there.
Avatar
NQtrader2000s 1/5/2024 1:52 PM
@FullTang can't make them do it but can enforce some filtering
👍 1
Avatar
Avatar
NQtrader2000s
general question for the LE community.. have any of you been forced to implement restrictions on the types of cases you will take due to the out of control and ever growing backlog? we are at a point where we now must consider restricting cases submitted for extraction and analysis.. PC seems to have gone out the window and the "presence" of a cell phone on an individual is enough to take every phone in their vicinity and want them analyzed.. if responding here may cause backlash, feel free to DM me.. thanks in advance!!
We have a current policy of 3 exhibits per case. If an officer seizes 50 they have to triage all 50 to find which 3.
Avatar
NQtrader2000s 1/5/2024 2:12 PM
@Rob thank you...taking notes!
👍 1
Avatar
Gethaffare 🇸🇪 1/5/2024 5:12 PM
has anyone done the MDFIR – Certified DFIR Specialist (Mossé Cyber Security Institute), is it any good. Do you recommend it?
Avatar
Avatar
NQtrader2000s
i have heard some labs limit the number submitted per or type of crimes..not@to mention nearly all we get are LOCKED as they don't even bother to try and do any works to get the PC , just take it and wait for us to give them all the goods..which is costly too
CyberGhost 1/5/2024 9:24 PM
Heh, here there is no way we would take a phone for any kind of simple shoplifting or theft case. No one got time for that! lol. High level crimes only, most are related to drug trafficking cases. Even the forensics lab run by the state wouldn't accept items for forensic examination for minor crimes.
💯 1
Salute 1
👍🏾 1
Avatar
Avatar
FullTang
At the very least, not even trying to get the PC is not a good practice. There is definitely some work to be done there.
Husky_M00s3 1/7/2024 6:40 AM
@NQtrader2000s maybe create some incentives for the officers who bring you the PC (fast turnaround times, more analysis etc.) I’d also leverage word lists. Have the offices give you a wordlist and flip the portable case or ufdr back to them. For officers who don’t bring you the passcodes, they might get put on the “no passcode” processing list (longer wait times, less analysis.) Obviously, you have to serve the interests of justice first, but… BFU phone, no passcode, shoplifting case should equal low priority. Good luck! Carbon units are the hardest systems to crack. I saw a great presentation at bsides which referenced Richard Thaler’s behavioral science research. Because of that presentation, his book “Nudge” is on my 2024 reading list.
Avatar
Avatar
Rob
We have a current policy of 3 exhibits per case. If an officer seizes 50 they have to triage all 50 to find which 3.
TooManyShots 1/7/2024 9:22 PM
My force has similar, but we find OICs/DMIs are live triaging laptops/computers and are not recording their actions, which is a bit irritating when it comes to examine it later when timestamps are changed and data like mru is overwritten
Avatar
NQtrader2000s 1/8/2024 7:23 AM
@TooManyShots @Rob we are in accredited lab and we do not allow officers to touch any type of media that's going to initially be analyzed by us for obvious reasons. I think the best practice is to reject all minor crimes unless they are mitigating circumstances such as serial in nature and that can be shown
💯 1
👍 1
Avatar
Andrew Rathbun 1/8/2024 11:24 AM
Continuing the mission of the BasisTech DFIR team I’m pleased to announce the launch of Sleuth Kit Labs, a new company focused on the needs of front line digital investigators. The core of this new company is the same digital forensics team that was a division of BasisTech for over 15 years. This is the...
💯 1
Avatar
Avatar
NQtrader2000s
@TooManyShots @Rob we are in accredited lab and we do not allow officers to touch any type of media that's going to initially be analyzed by us for obvious reasons. I think the best practice is to reject all minor crimes unless they are mitigating circumstances such as serial in nature and that can be shown
CyberGhost 1/8/2024 3:41 PM
I wonder if you could sell them or explain your reasoning for the policy to them backed by some data. Something like for X number of devices submitted with little or no PC, someone spent X amount of time at some cost. When they could have been working on another case or examination that had a higher probability of successful prosecution.
Avatar
Just Tulpa 1/8/2024 4:49 PM
Ello
4:50 PM
File carving will go in which section
Avatar
Avatar
Just Tulpa
File carving will go in which section
Digitalferret 1/8/2024 5:01 PM
maybe #data-recovery if it fits the job
Avatar
Avatar
Digitalferret
maybe #data-recovery if it fits the job
Just Tulpa 1/8/2024 5:01 PM
Ooh thank you
👍🏻 1
Avatar
Hey, anyome from @MSAB can tell me how I should use the module "Translation" in XAMN PRO ? I follow this link https://www.youtube.com/watch?v=8ms8DglKcDQ&t=24s but it seems to me that I didn't have the same interface.. I don't have the "Offiline Language Packs" into "XAMN TOOLS" from your website. I would translate some written arabic language btw. 🙂
Avatar
Avatar
Herodote
Hey, anyome from @MSAB can tell me how I should use the module "Translation" in XAMN PRO ? I follow this link https://www.youtube.com/watch?v=8ms8DglKcDQ&t=24s but it seems to me that I didn't have the same interface.. I don't have the "Offiline Language Packs" into "XAMN TOOLS" from your website. I would translate some written arabic language btw. 🙂
MSAB_Sofia 1/9/2024 7:41 AM
If you can't see 'XAMN Tools' in our Customer portal, it could be that your organisation doesn't have any license for the translation tool. Could you DM me your license number, so that I can have a check?
👍 1
Avatar
Yep 🙂 , sent you a dm
Avatar
I’m looking at a forensic image of an external ssd that when processed with axiom, shows a full working system. Is there a way to determine if it’s an apple Time Machine backup or bootable drive?
Avatar
This is really awesome free training!
Avatar
blackleitus 1/9/2024 9:34 PM
not sure where to ask , but hey guy. what security tooling can help the automation of the penetration testing process / red team ?? e..g nessus , horizon.ai , open source, what else besides open source
Avatar
Avatar
blackleitus
not sure where to ask , but hey guy. what security tooling can help the automation of the penetration testing process / red team ?? e..g nessus , horizon.ai , open source, what else besides open source
Andrew Rathbun 1/10/2024 4:19 AM
By no means an expert on the topic but Nessus seems like something you should look further into
Avatar
CyberGunny⛩ 1/10/2024 4:23 AM
Has anyone left Law Enforcement and taken up a job in a related field in the Public/Private Sectors? If so how did u go about it? Did u up skill first etc?
Avatar
Avatar
CyberGunny⛩
Has anyone left Law Enforcement and taken up a job in a related field in the Public/Private Sectors? If so how did u go about it? Did u up skill first etc?
chrisphilly 1/10/2024 4:26 AM
I have and will message you directly
Avatar
Avatar
chrisphilly
I have and will message you directly
CyberGunny⛩ 1/10/2024 4:33 AM
Perfect! Thank you
Avatar
Anyone from @Cellebrite for a quick question?
📬 1
Avatar
BadgerBacon 1/10/2024 8:07 AM
Anyone have any tools they like to use for cell phone records ie ZetX or Cell Hawk? Any other options or preferences between those for those that use them?
Avatar
Does anyone have experience with ranged archive retrievals in AWS Glacier from the CLI. Please DM if so. (edited)
Avatar
Avatar
BadgerBacon
Anyone have any tools they like to use for cell phone records ie ZetX or Cell Hawk? Any other options or preferences between those for those that use them?
Andrew Rathbun 1/10/2024 9:01 AM
#cell-site-analysis try here!
Salute 1
Avatar
Avatar
theshark
Does anyone have experience with ranged archive retrievals in AWS Glacier from the CLI. Please DM if so. (edited)
Andrew Rathbun 1/10/2024 9:01 AM
#cloud-forensics
Avatar
Avatar
blackleitus
not sure where to ask , but hey guy. what security tooling can help the automation of the penetration testing process / red team ?? e..g nessus , horizon.ai , open source, what else besides open source
make your own, you can fork mine and make it better xD https://github.com/ryd3v/ryd3v-Toolkit (edited)
A cybersecurity enumeration tool. Contribute to ryd3v/ryd3v-Toolkit development by creating an account on GitHub.
11:01 AM
oh just noticed there is a red team role, how do I get that xD
Avatar
Avatar
ryd3v
oh just noticed there is a red team role, how do I get that xD
Huh, never noticed that one before
🙏 1
Avatar
Avatar
ryd3v
oh just noticed there is a red team role, how do I get that xD
Andrew Rathbun 1/10/2024 11:21 AM
#deleted-channel 🙂
💯 1
Avatar
Avatar
chick3nman
Huh, never noticed that one before
Yes but you have a black role, and it looks cool lol
Avatar
Haha yeah fair enough
Avatar
Avatar
Whomble
Hey guys, I am looking to soothe my imposter syndrome, as I might be wanting to interview with a different company for an IR position than the one I am in right now (also doing IR, mainly windows forensics). I have worked extensively with KAPE and all the Zimmerman tools, and I am responsible for data collection and building/designing our forensic pipeline. I want to prepare myself in terms of possible technical questions, and while I have great analytical skills, I rely on my own notes/sans posters a lot on a daily basis to remember specific event ids, and info about different artifacts. Now… I can’t pull up my laptop and the posters during an interview, so I was wondering if anybody would be willing to share their experiences with IR technical questions from a recruitment interview? How much emphasis was on having events/artifacts memorised? And how much was DNS, Active directory and networking emphasised?
Feel you on that. Jealous of the investigators who remember the stuff off the top of their head, I just know my resources and how to look stuff up. Only have the generalized knowledge stored permanently it seems. Imposter Syndrome experienced in most of the areas I feel I probably know a lot more than the public in, just a lot less than I expect myself to know.
Avatar
Avatar
ryd3v
make your own, you can fork mine and make it better xD https://github.com/ryd3v/ryd3v-Toolkit (edited)
blackleitus 1/10/2024 11:38 AM
awesome ... I think enumeration automation is something to improve in penetration testing and low-hanging fruit cases and focus on hard-to-find vuln and analyze data
Avatar
yes sure, depends on what you're doing
Avatar
I am getting some extremely frustrating and repeated errors generating a pdf report through Physical Analyzer. "Could not find a part of the path '<<path here>>/IMG_0206.jpg'.
2:49 PM
I'm testing if I was hitting the file path character limit by saving to the root of a drive, we will see if that changes anything. Anyone experience this before?
Avatar
Do law enforcement agencies often outsource digital forensics investigation work to private companies?
Avatar
Avatar
whee30
I'm testing if I was hitting the file path character limit by saving to the root of a drive, we will see if that changes anything. Anyone experience this before?
Digitalferret 1/11/2024 1:10 AM
no direct experience w/ that but sometimes i'll get other s/w can't write due to path permissions? straw clutching: relative path v direct path?
Avatar
Avatar
BadgerBacon
Anyone have any tools they like to use for cell phone records ie ZetX or Cell Hawk? Any other options or preferences between those for those that use them?
Husky_M00s3 1/11/2024 3:43 AM
CellHawk is awesome. In addition to cell site mapping, you can analyze call frequency, common calls between target numbers, quickly reference first and last towers, create bulk marker lists, and search target numbers. They also research case law, new techniques, and provide great support and boiler plate warrant requests. Their Hawktalks are a great reference, too.
Avatar
Avatar
Grok
Feel you on that. Jealous of the investigators who remember the stuff off the top of their head, I just know my resources and how to look stuff up. Only have the generalized knowledge stored permanently it seems. Imposter Syndrome experienced in most of the areas I feel I probably know a lot more than the public in, just a lot less than I expect myself to know.
Husky_M00s3 1/11/2024 3:53 AM
@Whomble, I would argue that what you view as a weakness is really a strength. You know where to look for answers. So you can point others to those answers. You are organized enough to quickly reference documentation and research. You can direct other less-experienced examiners to those resources. Go crush those interviews!
💯 1
Avatar
Avatar
Husky_M00s3
@Whomble, I would argue that what you view as a weakness is really a strength. You know where to look for answers. So you can point others to those answers. You are organized enough to quickly reference documentation and research. You can direct other less-experienced examiners to those resources. Go crush those interviews!
That is actually a really good point, and a small confidence boost 😄 thanks a lot !
Avatar
Avatar
Grok
Feel you on that. Jealous of the investigators who remember the stuff off the top of their head, I just know my resources and how to look stuff up. Only have the generalized knowledge stored permanently it seems. Imposter Syndrome experienced in most of the areas I feel I probably know a lot more than the public in, just a lot less than I expect myself to know.
We’ll see how people react when I pull the “let me show you how quickly I can look that up” 😂 but yeah I feel you completely
Avatar
Avatar
Digitalferret
no direct experience w/ that but sometimes i'll get other s/w can't write due to path permissions? straw clutching: relative path v direct path?
Well it definitely wasn't the file path limit. Still failed on the same file. Not sure what’s up but I just don’t get to generate the “full” pdf report like my county atty wants. For some reason they want my curated report AND an 80,000 page pdf with everything in it. (edited)
Avatar
Avatar
Digitalferret
no direct experience w/ that but sometimes i'll get other s/w can't write due to path permissions? straw clutching: relative path v direct path?
It was a direct path... whole thing is weird. Gets through 50GB of files and chokes on the same one each time. No weird special characters in the path, no apparent rhyme or reason to it. I wish the whole report wouldn't fail though. Put a disclaimer in the PDF about the failure but let me actually get the PDF still. Each failure was an hour or two lost. (edited)
Avatar
thE_dude702 1/11/2024 8:23 AM
Looking for recommendations on lab hw refresh
Avatar
How can I change my role to Private Sector? I'm still a student at Champlain Online, but I have been employed full time as a Forensic Examiner since 2021.
👍🏻 1
Avatar
Avatar
whee30
It was a direct path... whole thing is weird. Gets through 50GB of files and chokes on the same one each time. No weird special characters in the path, no apparent rhyme or reason to it. I wish the whole report wouldn't fail though. Put a disclaimer in the PDF about the failure but let me actually get the PDF still. Each failure was an hour or two lost. (edited)
Digitalferret 1/11/2024 9:16 AM
i'd only be able to give generic ideas as I've seen Windows Explorer baulk at a particular file when moving/copying a huge amount, hence DR software / splitting dirs / different file manager. Maybe ping @Cellebrite ? ^^
Avatar
Avatar
Digitalferret
i'd only be able to give generic ideas as I've seen Windows Explorer baulk at a particular file when moving/copying a huge amount, hence DR software / splitting dirs / different file manager. Maybe ping @Cellebrite ? ^^
I submitted a ticket already - don't want to double up their system. Figured I would ask here as well. Weird thing is other cases with similar or more files have worked fine within the same software version. It's something weird with this particular case, I've changed the destination directories as well.
👍🏻 1
Avatar
Avatar
Husky_M00s3
@Whomble, I would argue that what you view as a weakness is really a strength. You know where to look for answers. So you can point others to those answers. You are organized enough to quickly reference documentation and research. You can direct other less-experienced examiners to those resources. Go crush those interviews!
Brilliant answer. And to that point, you could say that you used to memorize file paths and forensic rules, but found out the more you did that, the less you relied on the newest data / techniques. And given much of what you know in an area (say, iOs forensics) can change greatly with just one update to the software, rote memorization can get you in trouble. Far better to keep looking up the newest data / techniques, always evolving field. You know your resources.
Avatar
Avatar
Grok
Brilliant answer. And to that point, you could say that you used to memorize file paths and forensic rules, but found out the more you did that, the less you relied on the newest data / techniques. And given much of what you know in an area (say, iOs forensics) can change greatly with just one update to the software, rote memorization can get you in trouble. Far better to keep looking up the newest data / techniques, always evolving field. You know your resources.
Husky_M00s3 1/11/2024 3:45 PM
Great point @Grok It would be catastrophic if you looked in the ”old location, found nothing, and assumed an artifact didn’t exist when it was simply in a “new” spot.
Avatar
I need help to find someone online, can someone DM me and help me, please?
📫 1
4:43 PM
preferably someone who lives in Singapore but fine if not
Avatar
Avatar
Grok
Feel you on that. Jealous of the investigators who remember the stuff off the top of their head, I just know my resources and how to look stuff up. Only have the generalized knowledge stored permanently it seems. Imposter Syndrome experienced in most of the areas I feel I probably know a lot more than the public in, just a lot less than I expect myself to know.
Andrew Rathbun 1/11/2024 7:57 PM
IMHO it's way more important to not know stuff, but know how to find the information you need. Being resourceful >>> memorizing things, because that's how the real work works with aging, kids, family stuff, work, and all the other things we balance in our lives. In the context of interviews, I don't want the candidate to spout the perfect answer, I'd rather them tell me how and why they think their method is the best way to get to an answer, and that can spark a nice back and forth between nerds which is always fun!
👍 4
💯 3
Avatar
Critics say assumption in English and Welsh law that computers are ‘reliable’ reverses usual burden of proof in criminal cases
👍 4
Avatar
Avatar
Fortier
I need help to find someone online, can someone DM me and help me, please?
I don't live in Singapore, but I can help you if you still need
Avatar
@Magnet Forensics can someone DM me please regarding GK
📫 1
Avatar
LeatherCouch 1/13/2024 9:41 AM
Has anyone got anywhere in investigating wifi baby monitors being accessed by an unknown suspect ?
Avatar
Avatar
LeatherCouch
Has anyone got anywhere in investigating wifi baby monitors being accessed by an unknown suspect ?
Not sure about anything from the device as far as forensics, but I know most of the incidents like this are because the credentials being uses to access the app/device were weak, stolen, or brute force attack was used to gain access. People tend to reuse passwords. If it’s some type of app or web portal, not sure if there would be logs there?
Avatar
Avatar
LeatherCouch
Has anyone got anywhere in investigating wifi baby monitors being accessed by an unknown suspect ?
Andrew Rathbun 1/13/2024 8:01 PM
Nanit? Other? Local IP camera? Get some logs that have IP address visibility
Avatar
LeatherCouch 1/13/2024 8:56 PM
It’s a Vtech Leapfrog cam. I haven’t reached out to them to see if they hold logs yet. Was just looking to get some insight before diving in and issuing subpoenas/search warrants.
Avatar
Hello! Anyone here working in forensics for a Cybersecurity insurance company and wants to have a chat? I got some job offerings and I'm currently working in LE, so the work would be a bit different i guess.
Avatar
Avatar
sebaz
Hello! Anyone here working in forensics for a Cybersecurity insurance company and wants to have a chat? I got some job offerings and I'm currently working in LE, so the work would be a bit different i guess.
Digitalferret 1/14/2024 5:52 AM
maybe echo that in #training-education-employment
Avatar
I'm looking for a bit of advice. I need to find a good method to collaborate with some others on a case, mainly in notes format. We need this to be secure in the sense that only certain individuals can view, edit and access. Ideally it can be done via mobile (iPhone) and windows computers. It also must be... technology challenged invididual friendly meaning, senior detectives who aren't tech savvy have to be able to handle it lol - anyone got anything? (edited)
Avatar
+
Avatar
Hi. Are Cellebrite certifications good?
Avatar
Avatar
carook
I'm looking for a bit of advice. I need to find a good method to collaborate with some others on a case, mainly in notes format. We need this to be secure in the sense that only certain individuals can view, edit and access. Ideally it can be done via mobile (iPhone) and windows computers. It also must be... technology challenged invididual friendly meaning, senior detectives who aren't tech savvy have to be able to handle it lol - anyone got anything? (edited)
OneNote?
Avatar
Avatar
FullTang
OneNote?
I was thinking that, or Obsidian but Obsidian is a bit complex. With that though I was thinking of using it just for myself.
Avatar
Avatar
carook
I'm looking for a bit of advice. I need to find a good method to collaborate with some others on a case, mainly in notes format. We need this to be secure in the sense that only certain individuals can view, edit and access. Ideally it can be done via mobile (iPhone) and windows computers. It also must be... technology challenged invididual friendly meaning, senior detectives who aren't tech savvy have to be able to handle it lol - anyone got anything? (edited)
We use OneNote and also Standard Notes.
👍 1
Avatar
Avatar
SSecure7
Hi. Are Cellebrite certifications good?
yes they are "good"😑 but depends what are you looking for in a certification.
Avatar
Deleted User 1/15/2024 10:41 PM
Hi. I am currently studying for my CySA+ cert. After that I will be looking to dip my toes into the forensics side of things, with the ultimate goal of passing my GCFA exam in the near future. I have been looking at the 13cubed courses and they look great, if not a tad pricey. I was thinking first off to jump into the pentester academy video sets on Linux & windows forensics. Has anyone done any of these? Can anyone reccomened any other DFIR resources that will wet my appetite and not hurt my wallet too much. Are there any good books out there besides the hitchhikers guide? Thanks! (edited)
7:21 AM
Still a work in progress.
7:23 AM
If anyone want to help prompt engineer this thing with me - dm.
Avatar
Anyone know how to open a VSF file extension
Avatar
Avatar
Deleted User
Hi. I am currently studying for my CySA+ cert. After that I will be looking to dip my toes into the forensics side of things, with the ultimate goal of passing my GCFA exam in the near future. I have been looking at the 13cubed courses and they look great, if not a tad pricey. I was thinking first off to jump into the pentester academy video sets on Linux & windows forensics. Has anyone done any of these? Can anyone reccomened any other DFIR resources that will wet my appetite and not hurt my wallet too much. Are there any good books out there besides the hitchhikers guide? Thanks! (edited)
Andrew Rathbun 1/16/2024 1:10 PM
GCFA....but 13Cubed training is pricey? How are you going to take the GCFA? Did you take FOR508 along with it? Hitchhiker's Guide was literally my idea, and I'm here to tell you that I wouldn't recommend it whatsoever for GCFA prep 😛 there is a lot to learn in it, but I don't think any of us would pretend that it's viable GCFA preparation material, although the thought is certainly flattering.
💯 1
Avatar
Avatar
Andrew Rathbun
GCFA....but 13Cubed training is pricey? How are you going to take the GCFA? Did you take FOR508 along with it? Hitchhiker's Guide was literally my idea, and I'm here to tell you that I wouldn't recommend it whatsoever for GCFA prep 😛 there is a lot to learn in it, but I don't think any of us would pretend that it's viable GCFA preparation material, although the thought is certainly flattering.
Deleted User 1/16/2024 3:35 PM
for 2024 my training budget is slightly limited. 2025 will be a lot better. I plan on paying myself through the FOR508 in 2025. I just need a few things to wet my appetite before I get there.. I think I will start with the pentester academy courses then on to 13cubed. I just wish he offered a monthly sub like everyone else 😅
Avatar
Avatar
Deleted User
for 2024 my training budget is slightly limited. 2025 will be a lot better. I plan on paying myself through the FOR508 in 2025. I just need a few things to wet my appetite before I get there.. I think I will start with the pentester academy courses then on to 13cubed. I just wish he offered a monthly sub like everyone else 😅
Andrew Rathbun 1/16/2024 3:37 PM
... Do you have any idea how much FOR508 is? Am I missing something? I don't understand why you're saying 13Cubed is expensive but you're paying your own way through FOR508?
Avatar
Avatar
Andrew Rathbun
... Do you have any idea how much FOR508 is? Am I missing something? I don't understand why you're saying 13Cubed is expensive but you're paying your own way through FOR508?
Deleted User 1/16/2024 3:39 PM
Yes. I am well aware how much SANS courses are. Like I said, 2024 my training budget is limited, so $1,300 right now is a lot of money to me, having just spent a considerable amount on my CySA+ course. 2025 I will have more money at my disposal.. (edited)
3:42 PM
My plan for this year is to get my CySA+ and CASP+ and prep in any which way I can for the FOR508
Avatar
@Law Enforcement [UK] has anyone discovered a chat app called Mimosa. Trying to figure out file structures and sent /recieved plae for files
Avatar
Avatar
nodster
@Law Enforcement [UK] has anyone discovered a chat app called Mimosa. Trying to figure out file structures and sent /recieved plae for files
There’s a couple of chat and dating apps under that name available both from the App Store, Google play and as an APK. I’ve not looked into it but it might be a solid candidate for an experiment first on test devices.
Avatar
I found it on app store, (has a palm tree as a logo) this is for IIOC so was just trying to see of anyone had come across it before. I'm in the process of running it through axiom etc, didn't come out on cellebrite and there are about 8 seperate DBs and my SQL skills ain't that good
Avatar
My only issue with this is that it uses the browser, and you don't own the app, and they can see anything you send to the webapp through the api xD stand alone is better, but yeah
Avatar
Avatar
ryd3v
My only issue with this is that it uses the browser, and you don't own the app, and they can see anything you send to the webapp through the api xD stand alone is better, but yeah
For sure need to be careful with user data (I'm working on giving it instructions that remind you of this if you ever provide too much/descriptive). You are 100% right, just wanted to see what these custom GPT's can do.
Avatar
Nice! Would be fun but do you need chatgpt plus as stated on the page?
Avatar
Avatar
Mr.Robot
Nice! Would be fun but do you need chatgpt plus as stated on the page?
Unfortunately yes
Avatar
Avatar
theshark
For sure need to be careful with user data (I'm working on giving it instructions that remind you of this if you ever provide too much/descriptive). You are 100% right, just wanted to see what these custom GPT's can do.
It can do alot, but using the api directly outside the browser is a bit better xD
Avatar
So apparently with the update to iOS 16.2 the GuessedCountry row of purplebuddy.plist no longer shows a date for first setup. Also where previously in MobileBackup.plist there was a true/false value for WasCloudRestore however now i suspect they just emit the row if it's not applicable. Has anyone looked into this recently?
Avatar
Avatar
PhrostByte
How can I change my role to Private Sector? I'm still a student at Champlain Online, but I have been employed full time as a Forensic Examiner since 2021.
chrisphilly 1/18/2024 4:08 AM
Have a serious, self-reflection moment. What do you want to do in the private sector? What impact can your family/health/social life withstand? Working for an IR consulting firm is a 24/7/365 commitment. Working for a private company with in-house forensics is likely a scheduled lifestyle. Outside of that, reach out to industry leaders via LinkedIn. I was amazed at the willingness of professionals to afford me 15 minutes for a call to mentor and provide recommendations. Networking is the key.
💯 1
Avatar
Avatar
SSecure7
Hi. Are Cellebrite certifications good?
chrisphilly 1/18/2024 4:12 AM
If the person making the hiring decision thinks so. Other than that, education and training are great if you apply what you learn and use that new knowledge to solve problems. Application of knowledge is far more important than the paper cert.
🔥 1
Avatar
Avatar
Andrew Rathbun
GCFA....but 13Cubed training is pricey? How are you going to take the GCFA? Did you take FOR508 along with it? Hitchhiker's Guide was literally my idea, and I'm here to tell you that I wouldn't recommend it whatsoever for GCFA prep 😛 there is a lot to learn in it, but I don't think any of us would pretend that it's viable GCFA preparation material, although the thought is certainly flattering.
chrisphilly 1/18/2024 4:15 AM
Funny @Andrew Rathbun . I recently recommended to my university's career working group to incorporate tool agnostic certs like SANS into their curriculum. They said SANS courses are too expensive. Uhhhh, you charge $67,000/year for an education and a SANS course is expensive? That's laughable.
🤣 1
Avatar
Avatar
chrisphilly
Funny @Andrew Rathbun . I recently recommended to my university's career working group to incorporate tool agnostic certs like SANS into their curriculum. They said SANS courses are too expensive. Uhhhh, you charge $67,000/year for an education and a SANS course is expensive? That's laughable.
Husky_M00s3 1/18/2024 4:27 AM
“Never mind that, @chrisphilly! Would you like to make a donation to the university’s endowment fund?”
😆 3
💸 1
Avatar
Avatar
chrisphilly
Funny @Andrew Rathbun . I recently recommended to my university's career working group to incorporate tool agnostic certs like SANS into their curriculum. They said SANS courses are too expensive. Uhhhh, you charge $67,000/year for an education and a SANS course is expensive? That's laughable.
randomaccess 1/18/2024 5:12 AM
If someone took a year off, spent 67k with private training vendors and self education rather than at a university I think they'd be a better practitioner...
Avatar
chrisphilly 1/18/2024 5:12 AM
The great debate going on in the US right now about higher education. Is it worth the price and what's the ROI?
Avatar
randomaccess 1/18/2024 5:14 AM
As with everything it depends on what the hiring manager values or what your goals are
5:14 AM
A lot of certs don't teach you the soft skills that at least you have to fumble your way through college with
Avatar
Avatar
randomaccess
A lot of certs don't teach you the soft skills that at least you have to fumble your way through college with
Husky_M00s3 1/18/2024 5:33 AM
I think the only wrong choice is doing nothing. If you aren’t a self starter, university might keep you on track. If you already have soft skills, maybe certifications are a better route. Both will introduce you to new learning opportunities.
Avatar
been a long time since I've needed to look at it, but financially the loan side of it might be different with private vs uni for the same sticker price. student loan forgiveness, deferments, etc
Avatar
Avatar
chrisphilly
If the person making the hiring decision thinks so. Other than that, education and training are great if you apply what you learn and use that new knowledge to solve problems. Application of knowledge is far more important than the paper cert.
DeeFIR 🇦🇺 1/18/2024 7:20 AM
Again, depends on who values those certs and what they represent. Hiring manager? Court/judicial authority? It might be the difference between being considered an expert and proffering evidence to support an opinion, or a skilled technician. Or is it to support internal investigations? It depends if you’re doing it to achieve some level of competency with a tool, or to satisfy some other legislative or regulatory requirement.
Avatar
Good day. Looking for input on civilian members attending on scene to seize digital evidence during warrant execution. Currently writing assistance orders for civilian DFE to attend. I'm looking for as many reasons as possible to make these people Special Constables (Canada). Any input is greatly appreciated.
Avatar
been on this server for awhile and it's always been a great resource, even tho i never chat. hope to see some of y'all at cactuscon in AZ this year 🙂 just look for the tall lady with the pink/orange hair
Avatar
Avatar
stps358
Good day. Looking for input on civilian members attending on scene to seize digital evidence during warrant execution. Currently writing assistance orders for civilian DFE to attend. I'm looking for as many reasons as possible to make these people Special Constables (Canada). Any input is greatly appreciated.
From my experience, the civilian members were more knowledgeable in the computer / digital forensics side of things because that is why they went to school or took additional course before joining with the police force, where as me (dumb street cop) just had a few courses from CPC . I suppose everyone would have different specialties and perhaps this could be pointed out with their CV? I believe their expertise and background experience helped on scene, especially when the seizure of things was not standard, and the reason why things were seized a certain way could be justified with their expertise.... just need to explain to them the chain of custody thing lol
Avatar
What is the recommend extraction method for an Apple Watch 5? The only tool i see recommend is ElcomSoft iOS Forensic Toolkit. https://blog.elcomsoft.com/2021/08/apple-watch-forensics-the-adapters/
How do you extract an Apple Watch? While several extraction methods are available, you need an adapter if you want to get the data directly from the device. There are several different options available on the market, some of them costing north of $200. We tested a large number of such adapters. How
Avatar
Avatar
stps358
Good day. Looking for input on civilian members attending on scene to seize digital evidence during warrant execution. Currently writing assistance orders for civilian DFE to attend. I'm looking for as many reasons as possible to make these people Special Constables (Canada). Any input is greatly appreciated.
In the UK we can name specific people/groups to assist in the search on the warrant. Some of our civilian staff also have delegated powers that allows them to attend any search a Constable could without specifically being named. I argue that forensic specialists should go in with the arrest team to maximise any opportunity to have the suspect disclose key passwords, get mouse jigglers in and make sure the suspect doesn’t do anything technically sneaky. My experience is that the on scene df work can take longer than the search so getting it started early means everyone isn’t sitting around
💯 2
🔥 2
Avatar
Avatar
stps358
Good day. Looking for input on civilian members attending on scene to seize digital evidence during warrant execution. Currently writing assistance orders for civilian DFE to attend. I'm looking for as many reasons as possible to make these people Special Constables (Canada). Any input is greatly appreciated.
From my own experience attending scenes, it's been useful to the officers as I can prevent items such as portable chargers, USB adapters etc being seized and offer onscene triage for things such as consoles etc so they don't have to always be taken away.
👍 1
4:14 AM
Overall having some technical minded stops the trash coming back at DFU speeding up triage
Avatar
Avatar
stps358
Good day. Looking for input on civilian members attending on scene to seize digital evidence during warrant execution. Currently writing assistance orders for civilian DFE to attend. I'm looking for as many reasons as possible to make these people Special Constables (Canada). Any input is greatly appreciated.
Not sure of your exact situation or laws regarding SW attendance, so some of this may apply and some not. I spent 7 years as a civilian DF examiner in the NSW Police Force (that's in Australia). Our team was a roughly 50/50 mix of sworn & unsworn officers. The unsworn would still attend search warrants, SOP was to have executing officers clear & secure the premises before we entered (this applied to everyone from our branch not just unsworn). Prior to execution we would attend the briefing and advise searching officers on what they should be on the lookout for. Once inside we would conduct a walk through to identify potential sources of evidence and generally devices would be triaged on scene. Not sure on the significance of special constable in NSW vs Canada, for state LE warrants we did not need to be sworn in as special constables, for some federal warrants we did, but that would be done during the briefing.
Avatar
leche squirrel 1/19/2024 10:01 AM
hi all, is anyone very experienced with enterprise SIEM products that would be open to a conversation with me? my company is considering a couple of products that i am trying to get some intelligent perspective on (edited)
Avatar
Avatar
leche squirrel
hi all, is anyone very experienced with enterprise SIEM products that would be open to a conversation with me? my company is considering a couple of products that i am trying to get some intelligent perspective on (edited)
it might be a good discussion for #incident-response if you're okay with having it in an open forum
🙏 1
Avatar
@Cellebrite Hey, I know you all have answered a few questions about the rebranding, but I was hoping you could answer a couple more -- I have some people in my org bugging me about the name change. I can see that PA Ultra is now Inseyets Ultra. The Inseyets page mentions a UFED component, should we expect UFED 4PC to be renamed soon, or will Inseyets UFED be a different product? Is Reader going to stay 'Cellebrite Reader'? I assume PA 7.x won't be renamed but should we expect that to be sunsetting soon?
Avatar
Anyone have some ideas on parsing data from Chrome snss files?
Avatar
Avatar
Carl
@Cellebrite Hey, I know you all have answered a few questions about the rebranding, but I was hoping you could answer a couple more -- I have some people in my org bugging me about the name change. I can see that PA Ultra is now Inseyets Ultra. The Inseyets page mentions a UFED component, should we expect UFED 4PC to be renamed soon, or will Inseyets UFED be a different product? Is Reader going to stay 'Cellebrite Reader'? I assume PA 7.x won't be renamed but should we expect that to be sunsetting soon?
Okay, I just watched the video that came out today and it answered most of my questions.
Avatar
Avatar
Carl
Okay, I just watched the video that came out today and it answered most of my questions.
Just saw this. Glad it did. We will have a webinar with Heather and Jared in a couple weeks that goes a bit deeper into it.
Avatar
Avatar
CLB-Paul
Just saw this. Glad it did. We will have a webinar with Heather and Jared in a couple weeks that goes a bit deeper into it.
The one question I had left was whether Reader will be part of the rebrand. I spend a lot of time showing attorneys and paralegals how to use it, so I'm curious if I will be getting a lot of questions about that once the new reports start trickling into cases.
Avatar
Reader will still be there
Avatar
Avatar
CLB-Paul
Reader will still be there
I get that, I'm wondering if the name will remain "Cellebrite Reader" or change to "Inseyets Reader".
Avatar
As far as I know reader name isn’t changing
Avatar
Great, thank you for your time. I appreciate it!
Avatar
Deleted User 1/20/2024 10:08 AM
a client has been working on a assignment via powerpoint on a MacBook Pro, M-1, 2020. they are being accused of not working on the assignment and have to prove that they were i dug into the .ppt file and there's nothing in there to help them but is there a digital forensics technique, some sort of log file or usage data on Macbooks that could help prove this?
Avatar
Avatar
Deleted User
a client has been working on a assignment via powerpoint on a MacBook Pro, M-1, 2020. they are being accused of not working on the assignment and have to prove that they were i dug into the .ppt file and there's nothing in there to help them but is there a digital forensics technique, some sort of log file or usage data on Macbooks that could help prove this?
Timeline analysis with a tool like AXIOM. Basically pattern of life analysis. Many MacOS systems will log in addition to file time stamps, internet browsing and communications. Interview your client and compare what they are saying to what the timeline shows and you’ll get an idea of whether they are truthful or not. If it’s a corporate environment there might be additional logging in things like WiFi controllers, Microsoft Azure/365, door swipe card reader
Avatar
Deleted User 1/20/2024 12:06 PM
anywhere I can go to look for ppl with access to AXIOM so I can subcontract said ppl? or maybe if someone sees this they can reach out to me privately, just add me and send me a dm (edited)
Avatar
@Deleted User I sent you a PM- you can reach me there if you want to talk more about this.
Avatar
Avatar
Deleted User
a client has been working on a assignment via powerpoint on a MacBook Pro, M-1, 2020. they are being accused of not working on the assignment and have to prove that they were i dug into the .ppt file and there's nothing in there to help them but is there a digital forensics technique, some sort of log file or usage data on Macbooks that could help prove this?
randomaccess 1/20/2024 1:13 PM
Isn't there a history of actions within PowerPoint? As in previous versions etc. There's also a way to revert a doc to previous versions in macos direct. So if you could show when the versions were created and that there are differences, you don't need to do much more? However If you've looked at that and it doesnt show changes, well, maybe that's an answer too
Avatar
Today I learned: last year National Geographic did an episode about Bin Laden's hard drive. https://www.youtube.com/watch?v=4W_P_Yxhnt0
Avatar
Anyone know of an external hard drive which has one of those keypads on the outside but different pins unlock different partitions. Or something like this?
Avatar
Avatar
dfmiket
Anyone know of an external hard drive which has one of those keypads on the outside but different pins unlock different partitions. Or something like this?
iStorage are our go to. The SSD models are fast. Approved by infosec too
thistbh 2
11:09 PM
Although not sure about different partitions. You can give a read only pin
11:12 PM
The only FDE implement I’m aware of that can do this is Vetacrypt where different PIN can unlock a hidden volume. That’s a software implementation though
Avatar
@Law Enforcement [UK] For those who have viewing terminals that have Griffeye installed, are they licenced? If so, what with? We don't intend to process anything, merely use terminals to view already processed Griffeye cases.
8:25 AM
Just wondering if un-licenced copies still allow for Griffeye cases to be opened and edited etc (i.e. allows OIC categorisation)
Avatar
Need a licence. To open view and categorise a case which has been processed in Griffeye DI.
👍 1
Avatar
BukertolasRex 1/22/2024 8:27 AM
Griffeye used to do viewing licences many years ago for free, however for any use of Griffeye now a licence is required.
👍 1
Avatar
Avatar
Rob
@Law Enforcement [UK] For those who have viewing terminals that have Griffeye installed, are they licenced? If so, what with? We don't intend to process anything, merely use terminals to view already processed Griffeye cases.
All licensed with Pro. They need to be for proper VID work to take place by the grading officer. Maybe with speaking to Tris Oliver and Patrick if you haven’t already
👍 1
Avatar
Thanks all, will carry on getting licenses for them, just wanted to check if we were being silly having them licenced.
Avatar
Any souther California law enforcement agencies running cellebrite commander? Considering it for our agency but would like to see it workin, or not not working on a large scale basis. Preferably a county agency that has software on off site computers connected via intranet.
Avatar
Hello
11:03 PM
I wanna learn DNS server forensics
11:03 PM
What kind of logs should i get
11:03 PM
What are the key things that i need to find DNS attacks ?
Avatar
Hey all! Has anyone heard of the use of Snapchat filters altering timestamps of media? (adding or subtracting some hours). I am runnign tests, but I am not getting anything to corroborate this. While it might affect (if possible) the timesamps of the snaps saved in the device, would it also affect those retrieves from memories (downloaded data from Snapchat./com)
Avatar
Avatar
oed1pus
What kind of logs should i get
DeeFIR 🇦🇺 1/23/2024 2:52 AM
Logs are going to be dependant on the software running the DNS service, which is going to be dependant on the server/architecture. Linux/windows/network appliance? Internet facing or internal server/appliance? I think you’d be better off looking at DNS fundamentals, common attacks, and then looking at different architecture and where those logs exist. Don’t try and identify evidentiary sources before you know what you’re looking for.
💯 1
Avatar
Thank you sir 😁😊
Avatar
We are LIVE with a new episode of the SANS Wait Just an Infosec live show with Mari DeGrazia and Russian Panda NOW! Come join us! https://www.linkedin.com/events/2024ransomwaretrendsandpredicti7153031883499474945/theater/
With the continuous evolution of ransomware and its pervasive risks to organizations’ very existence, new threats can be difficult to predict. That’s why, in this newest episode of Wait Just an Infosec, SANS Certified Instructors and leading ransomware authorities, Ryan Chapman and Mari DeGrazia are joined by guest Ann Pham, to break down what t...
Avatar
Avatar
dfmiket
Anyone know of an external hard drive which has one of those keypads on the outside but different pins unlock different partitions. Or something like this?
NibblesNBits 1/23/2024 1:53 PM
IODD devices may be able to do this
Avatar
BadgerBacon 1/24/2024 6:05 AM
Anyone have any experience with a report from "Safebook" in regards to possible threats made to a social media account? We had one come in but with no return number and I can't find contact info for Safebook to try to make contact.
Avatar
I'm having issues with @Magnet Forensics Axiom (v.7.8.0.38310) crashing repeatedly while reviewing images. It did it on the last case, and made it almost unreviewable. I thought maybe it had to do with the couple million images between a few devices, so this time I have four devices and loaded each device into it's own case. However, it keeps closing randomly (or what appears to be randomly. The drive I am reviewing now has 125,664 artifacts, most of which are images and videos. Viewing through Thumbnail view with a skin tone filter of 30-100%, I can scroll a few thousand without issue. However, if I click on an image, it crashes the program and it just closes. I can do the review as long as I don't select an image. Request sent into tech support.
📬 1
Avatar
Avatar
conf1ck3r
Today I learned: last year National Geographic did an episode about Bin Laden's hard drive. https://www.youtube.com/watch?v=4W_P_Yxhnt0
kmacdonald1565 1/24/2024 8:02 AM
watching/listening to this now, very interesting so far
Avatar
James Pedersen 1/24/2024 4:55 PM
Does anyone know of a encryption algorithm for documents which is readily decrypted by law enforcement and other government personnel in the USA, but is difficult for non-government persons to decrypt? (edited)
Avatar
Avatar
stps358
Good day. Looking for input on civilian members attending on scene to seize digital evidence during warrant execution. Currently writing assistance orders for civilian DFE to attend. I'm looking for as many reasons as possible to make these people Special Constables (Canada). Any input is greatly appreciated.
Late to the game but here are few pros with examiners attending the SW. 1) Getting real USB drives and not jsut keyboard/mouse receivers 2) Assess any powered-on computers with lock state and possible encryption (Bitlocker, etc.) 3) Obtain information on house IP, SSID and other LAN-connected devices (usually in CP cases). 4) Assess "what is that" type of devices 5) Able to provide technical support for field interview, etc. 5) Preview computers on site to minimize # of devices seized. 6) Assess security camera system and retrieve videos if needed. 7) Assess Smart Appliances - for example, does this TV has a USB port, able to take an external drive and play videos 8) Grab the correct laptop power adapters
Avatar
Avatar
James Pedersen
Does anyone know of a encryption algorithm for documents which is readily decrypted by law enforcement and other government personnel in the USA, but is difficult for non-government persons to decrypt? (edited)
There is usually a key involved to encrypt data. The algorithm itself may not be the focus.
Avatar
Avatar
chauan
There is usually a key involved to encrypt data. The algorithm itself may not be the focus.
James Pedersen 1/24/2024 5:18 PM
What about a algorithm for which the government has a master key?
Avatar
Can you think of any popular ones that use master keys? 🧐
Avatar
James Pedersen 1/24/2024 5:21 PM
The only thing I can think of is Skipjack: https://en.wikipedia.org/wiki/Skipjack_(cipher), but I don't know if anyone uses it anymore ...
Avatar
James Pedersen 1/24/2024 5:29 PM
@chauan You understand what I'm asking, though?
Avatar
Avatar
James Pedersen
Does anyone know of a encryption algorithm for documents which is readily decrypted by law enforcement and other government personnel in the USA, but is difficult for non-government persons to decrypt? (edited)
I don't think there are any algorithms alone that would allow you to do this because either (1) the algorithm would be weak and therefore potentially accessible by other individuals outside of LE, or (2) the "master" keys may be leaked in the future, again making it weak down the road. I think that was Apple's whole argument when the FBI wanted in and why, once every ten years or so when a politician wants it, the idea kind of gets ridiculed.
Avatar
Avatar
Adam
I don't think there are any algorithms alone that would allow you to do this because either (1) the algorithm would be weak and therefore potentially accessible by other individuals outside of LE, or (2) the "master" keys may be leaked in the future, again making it weak down the road. I think that was Apple's whole argument when the FBI wanted in and why, once every ten years or so when a politician wants it, the idea kind of gets ridiculed.
James Pedersen 1/24/2024 9:02 PM
Think of how useful it would be to government and law enforcement personel though....
Avatar
Avatar
James Pedersen
Think of how useful it would be to government and law enforcement personel though....
There's definitely a debate there to be had, but personally I don't think it would be. I agree it would be incredibly helpful for LE to catch bad guys doing bad stuff, but the downside in my opinion far outweighs the benefit. The biggest downside being that if the "master key"/"LE key" being cracked, leaked, etc, that entire encryption algorithm and everything that leverages is now vulnerable. Imagine if a nation state got a hold of that? They could do some crazy damage
Avatar
I don't necessarily want to dive head first into this conversation because I know how it goes, but this concept of essentially "backdoored" encryption has a very long history
💯 2
Avatar
It's always a fun one though! Haha
Avatar
Yeah, as someone who spends a lot of their time trying to break encryption, even in the context of helping catch criminals, I firmly disgree with the suggestion of using backdoored encryption
👍 8
💯 2
9:55 PM
The concept is nice, but reality doesn't play out like the concept assumes where "only the good guys" could potentially have access to the keys and thus information being protected
Avatar
Avatar
chick3nman
Yeah, as someone who spends a lot of their time trying to break encryption, even in the context of helping catch criminals, I firmly disgree with the suggestion of using backdoored encryption
Advocating for backdoored encryption at this point in human history is absurd.
Avatar
Agreed, it’s often well intentioned but based on an unrealistic idea of how it works
Avatar
Avatar
chick3nman
Agreed, it’s often well intentioned but based on an unrealistic idea of how it works
Yes, and an unrealistic idea of how humans work. We are assuming for purposes of the immediate discussion that the advocating is based on good faith, which is a big assumption.
Avatar
Yeah, even saying “often” well intentioned felt like giving too much leeway
👍 1
Avatar
Well, now we have warned everyone about wading into this as they walk into their offices this morning. 🤣
Avatar
Haha yeah, I didn’t really want to get too into it because of how quickly things can get out of hand, have had that discussion before many times
Avatar
Avatar
James Pedersen
Think of how useful it would be to government and law enforcement personel though....
revolvernotalot 1/25/2024 3:50 AM
Here is a really useful article on the subject https://academic.oup.com/cybersecurity/article/1/1/69/2367066
Abstract. Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforce
3:54 AM
Short version from everything vie read on the subject is that back doored encryption just isn't encryption anymore, non back doored encryption already exists and will continue to be used by bad actors because you cant practically enforce outlawing maths.
👍 1
Avatar
Avatar
chick3nman
The concept is nice, but reality doesn't play out like the concept assumes where "only the good guys" could potentially have access to the keys and thus information being protected
and additionally if the good guys can do it, eventually the bad guys will too xD
👍 1
Avatar
Avatar
James Pedersen
Does anyone know of a encryption algorithm for documents which is readily decrypted by law enforcement and other government personnel in the USA, but is difficult for non-government persons to decrypt? (edited)
why would you want that though? If I want my data private, I want it private from everyone, regardless of who they work for.
💯 2
👍 1
Avatar
Avatar
mikeo
Bruce Schneier always has useful commentary on the subject too: https://www.schneier.com/blog/archives/2019/12/scaring_people_.html
revolvernotalot 1/25/2024 6:09 AM
Thank you, I’ll have a read of this later
Avatar
Avatar
James Pedersen
@chauan You understand what I'm asking, though?
Yes and bit late to the game 😆 . Honestly, I am against backdoored encryptions. Having backdoored encryption is not a protection but more an exclusive access to data. And there were many times a good turns into bad and vice versa.
💯 1
Avatar
Do many people here use tools from Elcomsoft for mobile forensics? I see a lot of Cellebrite and AXIOM pings in the channels, but I don't really see any discussion about other software suites.
Avatar
caramelomacc 1/25/2024 11:04 PM
Hi guys. I took digital forensic during uni and graduated in november 2021. Ever since that i havent touch anything related to digital forensic. After 2 years, im planning on applying for jobs related with digital forensic but i dont feel confident with my skills and knowledge since i missed out on lots of stuff and idk where to start. Any advices/inputs would be much appreciated. Thank you
11:04 PM
Also, I'm trying to warm up by reading my course materials, but I feel like it's not enough since there will always be something new happening in the digital forensic world.
Avatar
Avatar
caramelomacc
Hi guys. I took digital forensic during uni and graduated in november 2021. Ever since that i havent touch anything related to digital forensic. After 2 years, im planning on applying for jobs related with digital forensic but i dont feel confident with my skills and knowledge since i missed out on lots of stuff and idk where to start. Any advices/inputs would be much appreciated. Thank you
Digitalferret 1/26/2024 3:36 AM
echo in #training-education-employment ?
3:36 AM
also, look up 13Cubed / site / Youtube. fabulous set of resource material
Avatar
Avatar
caramelomacc
Hi guys. I took digital forensic during uni and graduated in november 2021. Ever since that i havent touch anything related to digital forensic. After 2 years, im planning on applying for jobs related with digital forensic but i dont feel confident with my skills and knowledge since i missed out on lots of stuff and idk where to start. Any advices/inputs would be much appreciated. Thank you
As a person who hires forensic examiners, I want to see your ability to learn, research, and troubleshoot. Most academic programs are years behind the work anyway. Convey a passion for the work, willingness to learn, and your degree just gives you that much more of a boost! You will do great 😊
💯 4
Avatar
Does anyone know where to get the vehicle make/model software? It' s a database of images and data to identify vehicles; it used to be at the LEEP site, but I can't find it anywhere.
Avatar
Avatar
iNDO_o
Does anyone know where to get the vehicle make/model software? It' s a database of images and data to identify vehicles; it used to be at the LEEP site, but I can't find it anywhere.
I just use Google Image search now, I've had pretty good luck
🤘 1
Avatar
Avatar
char|i3
As a person who hires forensic examiners, I want to see your ability to learn, research, and troubleshoot. Most academic programs are years behind the work anyway. Convey a passion for the work, willingness to learn, and your degree just gives you that much more of a boost! You will do great 😊
Would be nice if all hiring thought this way 😁
Avatar
🚨 🚨 🚨 EVENT ALERT 🚨 🚨 🚨 The long-awaited inaugural 2024 Cellebrite C2C ( Case to Closure) User Summit & Awards Ceremony 🎖https://bit.ly/3UeHR4a August 5 - 8 Location: Washington DC We are opening our call for presenters. 🚨 🚨 🚨 (edited)
🍖 1
Avatar
caramelomacc 1/26/2024 7:50 PM
Thanks a lot! @Digitalferret @char|i3 Have a great day 🙂
👍🏻 1
Avatar
Has anyone else seen the picture in the past of what depicts a scene/house where you are asked to pick out the digital devices? It was a picture I remembered being asked to identify what might be of forensic value (e.g. TV, phone, wifi) and the considerations you might take. I'm now looking at questions for hiring placement students and thought it would be a good question but can't for the life of me find the picture. Thanks in advance 🙂
Avatar
Avatar
KM
Has anyone else seen the picture in the past of what depicts a scene/house where you are asked to pick out the digital devices? It was a picture I remembered being asked to identify what might be of forensic value (e.g. TV, phone, wifi) and the considerations you might take. I'm now looking at questions for hiring placement students and thought it would be a good question but can't for the life of me find the picture. Thanks in advance 🙂
Immersive Labs had a lab like that.
👍🏻 1
Avatar
Avatar
KM
Has anyone else seen the picture in the past of what depicts a scene/house where you are asked to pick out the digital devices? It was a picture I remembered being asked to identify what might be of forensic value (e.g. TV, phone, wifi) and the considerations you might take. I'm now looking at questions for hiring placement students and thought it would be a good question but can't for the life of me find the picture. Thanks in advance 🙂
Digitalferret 1/28/2024 7:27 AM
maybe image search using something like CSI test find digital devices house picture
👍🏻 1
Avatar
Avatar
Digitalferret
maybe image search using something like CSI test find digital devices house picture
Husky_M00s3 1/28/2024 10:59 AM
Take a picture of a desk with hardware wallet, usb drives, hard drives, phones, and a hot swap. Throw in some adapters too. You won’t have to worry about copyright.
👍🏻 1
Avatar
Avatar
Husky_M00s3
Take a picture of a desk with hardware wallet, usb drives, hard drives, phones, and a hot swap. Throw in some adapters too. You won’t have to worry about copyright.
Digitalferret 1/28/2024 12:26 PM
@KM
👍🏻 1
Avatar
Avatar
Husky_M00s3
Take a picture of a desk with hardware wallet, usb drives, hard drives, phones, and a hot swap. Throw in some adapters too. You won’t have to worry about copyright.
That’s a great idea!!!
Avatar
digital Bowles 1/28/2024 2:57 PM
I have 2 very new to axiom questions. I am attempting to load a cellebrite UFED extraction into axiom, do I load the zip, the ufd, or both? In this case we are looking for location data, where do I look? Disclaimer, we just moved to axiom from cellebrite.
Avatar
Avatar
digital Bowles
I have 2 very new to axiom questions. I am attempting to load a cellebrite UFED extraction into axiom, do I load the zip, the ufd, or both? In this case we are looking for location data, where do I look? Disclaimer, we just moved to axiom from cellebrite.
Load the zip. The UFD file just has some info about the extraction.
Avatar
Avatar
Joe Schmoe
Load the zip. The UFD file just has some info about the extraction.
digital Bowles 1/28/2024 4:38 PM
Thank you. In axiom is location data displayed differently. Like CB had a tab for it.
Avatar
Avatar
digital Bowles
Thank you. In axiom is location data displayed differently. Like CB had a tab for it.
No. Axiom will break it out also.
Avatar
digital Bowles 1/28/2024 4:46 PM
Thank you very much
Avatar
Meal prep
Avatar
Avatar
Asherien
Meal prep
Digitalferret 1/29/2024 1:37 AM
we just feed the dog some kibble, much easier 🙂 (edited)
1:38 AM
joking aside, WFPB?
Avatar
Cyb3rScr33ch 1/29/2024 2:18 AM
Good Morning all - I'm currently doing a dissertation project investigating the amount of retrievable PII data from vehicle infotainment systems, specifically Ford and Mercedes (most popular UK licensed vehicles for 22/23) I was wondering if anyone would either know of, or be willing to share, the documentation provided to new vehicle owners, in particular the privacy policy and TOC's and any other documents that mention collection, storage or use of such data. I have access to both vehicle apps but these only give info surrounding the use and connectivity of the app (to the vehicle) itself. There not vehicle owner provided documentation. I have also tried relentlessly to get a dealership to provide a copy but they don't seem to keen to do so 🤔 (especially after explaining why) and hours of searching has turned up very little, or very outdated documents. Any help or support would be greatly appreciated and acknowledged in my final project, many thanks in advance 😊
Avatar
Avatar
Asherien
Meal prep
Rice, carrots and ground beef?
Avatar
Avatar
Cyb3rScr33ch
Good Morning all - I'm currently doing a dissertation project investigating the amount of retrievable PII data from vehicle infotainment systems, specifically Ford and Mercedes (most popular UK licensed vehicles for 22/23) I was wondering if anyone would either know of, or be willing to share, the documentation provided to new vehicle owners, in particular the privacy policy and TOC's and any other documents that mention collection, storage or use of such data. I have access to both vehicle apps but these only give info surrounding the use and connectivity of the app (to the vehicle) itself. There not vehicle owner provided documentation. I have also tried relentlessly to get a dealership to provide a copy but they don't seem to keen to do so 🤔 (especially after explaining why) and hours of searching has turned up very little, or very outdated documents. Any help or support would be greatly appreciated and acknowledged in my final project, many thanks in advance 😊
Digitalferret 1/29/2024 4:26 AM
#vehicle-forensics
Avatar
Avatar
ryd3v
Rice, carrots and ground beef?
Yeah ground beef/turkey mix. Cooked with a Korean inspired sauce. Other bowl is pickled radish/cucumber
💯 1
Avatar
Have you taken any training or read any books? Probably start there 😁
Avatar
I’d say research digital evidence that can be recovered from various digital devices and think “how might this be used, or how could this be useful?” That’s a good place to start and basically is what LE does…since a couple artifacts are quite obvious and easy to determine if they’re useful. Probably not the answer you were hoping for but diving in yourself and coming to your own conclusion whether right or wrong is way more beneficial then being fed the material (edited)
👍 1
Avatar
Is there any resources on this server about getting started in the field? for students and such (edited)
11:24 AM
Is it recommended to complete labs and projects to get that entry level dfir job?
👍 1
Avatar
itismagic86 1/29/2024 11:26 AM
Hey All, Have any of you done the HERO program? I'm in the interview process and would like to know your thoughts on it. TIA!
Avatar
Avatar
John
Is it recommended to complete labs and projects to get that entry level dfir job?
itismagic86 1/29/2024 11:28 AM
Piggybacking off of this. I've been searching for months and haven't had a single entry-level hit yet.
Avatar
A nearby agency has an iPhone 13 from a serious crime that was thrown from a moving vehicle and likely ran over . Thoughts on transferring the board to a working phone ? Has anybody has success ?
Avatar
Avatar
itismagic86
Piggybacking off of this. I've been searching for months and haven't had a single entry-level hit yet.
what do you mean?
Avatar
Original message was deleted or could not be loaded.
itismagic86 1/29/2024 3:06 PM
How about crowdsourced images and video?? Then, use facial recognition to scan them for any hits. You can also use public WiFi and connection data to try and track this missing person's device(s).
👍 1
Avatar
Original message was deleted or could not be loaded.
Since you’re asking about missing people, it’s more than likely going to start with OSINT. You basically start with a dot and then find more dots, then connect them together. 😁 You have to be creative as each case is unique. Start off with a checklist of all the normal places people lurk online, then branch out from there. Friends, family, someone will post something somewhere.
4:25 PM
There are also various tools for OSINT to help you along, but I’m certain #osint channel would be a good place to look for ideas.
Avatar
Think of it like a puzzle, start with a piece, the more pieces you have, the easier it is to complete the puzzle, or, know where the piece you have is supposed to go.
4:38 PM
Hopefully that kinda answers your question, there is no really "original" idea, since each case is not the same. But you can get together a process for yourself, to quickly cut through all the noise, and hyper focus on the important pieces.
4:39 PM
Be familiar with your toolset, and even make your own tools, at least have a 'tool-belt' ready to go, and a plan, if you have a blueprint, the build process goes a lot smoother than winging it .
4:39 PM
😁 Hope that helps a bit
Avatar
Avatar
DCSO
A nearby agency has an iPhone 13 from a serious crime that was thrown from a moving vehicle and likely ran over . Thoughts on transferring the board to a working phone ? Has anybody has success ?
That phone looks to be in rough shape. The board looks toast. You could take it apart and look under the shields at the chips to see how they held up. I wouldn't be optimistic, but a chip swap to a donor board might be an option. You'll need to find someone with expertise in doing that. We had a chip transplant done on a severely damaged iphone X before successfully (we didn't do it ourselves). It wasn't my file, so I don't know what company ended up doing it for us though.
👍 1
Avatar
@Cellebrite Here's an odd one. Why would a UFDR report produced concurrently with an Excel report be 66% larger than a UFDR report produced with the same setting by itself? And yes, I'm looking at the just the size of the individual UFDR files.
Avatar
Avatar
Carl
@Cellebrite Here's an odd one. Why would a UFDR report produced concurrently with an Excel report be 66% larger than a UFDR report produced with the same setting by itself? And yes, I'm looking at the just the size of the individual UFDR files.
CLB-DannyTheModeler 1/30/2024 7:43 AM
@Carl- What version are you using to generate the UFDR?
Avatar
Avatar
dfa_adam
That phone looks to be in rough shape. The board looks toast. You could take it apart and look under the shields at the chips to see how they held up. I wouldn't be optimistic, but a chip swap to a donor board might be an option. You'll need to find someone with expertise in doing that. We had a chip transplant done on a severely damaged iphone X before successfully (we didn't do it ourselves). It wasn't my file, so I don't know what company ended up doing it for us though.
Thanks for the reply !
Avatar
Avatar
DCSO
Thanks for the reply !
If you want to go that route, iPad Rehab might be able to help - or maybe direct you to someone else. @iPad Rehab
Avatar
hyperflyguy 1/30/2024 8:07 AM
Anyone have a good article or video on checking for timestomping on a Linux ext2 image?
Avatar
Avatar
CLB-DannyTheModeler
@Carl- What version are you using to generate the UFDR?
I just looked at some previous reports, and the same thing happened using Reader 7.65 to generate the reports. So 7.65 and 7.66. I'm in the middle of something else, but I'm going to see if it happens when generating a PDF report as well. Both UFDR reports show the same number of artifacts, BTW.
Avatar
Avatar
DCSO
A nearby agency has an iPhone 13 from a serious crime that was thrown from a moving vehicle and likely ran over . Thoughts on transferring the board to a working phone ? Has anybody has success ?
Bill (VeriFi) 1/30/2024 8:58 AM
I would not give up on this phone. Board swap is not an option. This will require board-level repair for sure, but I say it is recoverable from the pictures thus far. I had a similar case that was a successful recovery. (edited)
👍 1
Avatar
I have a Asus Chromebook that is locked with passcode. What type of examination can I do if any to see if it has CSAM.
Avatar
Avatar
DCSO
A nearby agency has an iPhone 13 from a serious crime that was thrown from a moving vehicle and likely ran over . Thoughts on transferring the board to a working phone ? Has anybody has success ?
I’ve had great success with board swaps in the past. As long as the board piece is intact it should fire right up in the donor device.
👍 1
Avatar
Avatar
rabbit1709
I have a Asus Chromebook that is locked with passcode. What type of examination can I do if any to see if it has CSAM.
User data is likely all encrypted if you don't have the passcode or Google account. Your best option might be to subpoena the Google account data and see if they were storing data in Google Drive. ChromeOS is very cloud-driven, but entirely possible to also store data locally.
5:34 PM
Chromebooks are a royal pain in my opnion
this 1
😄 1
Avatar
Hello guys, I have a question about the interest (and their goals) of a cybercriminal strategy. I had received a lot of requests from an IP where it seems its hosts table has our IP for porn activities domains and so on... Does this strategy is commonly used by cybercriminals ? I have this IP since less than 3 months for our organization.
Avatar
Hi All, Can someone with experience securing discords message me. Its a super emergency? (Webhooks, AI, Bots)
Avatar
Avatar
K8pl3r
Hello guys, I have a question about the interest (and their goals) of a cybercriminal strategy. I had received a lot of requests from an IP where it seems its hosts table has our IP for porn activities domains and so on... Does this strategy is commonly used by cybercriminals ? I have this IP since less than 3 months for our organization.
Digitalferret 1/31/2024 8:31 AM
your exact address or a block? in my limited experience, scanners will try a (relatively small) list of known vulnerabilities across a (huge) range of addresses.
Avatar
Avatar
Digitalferret
your exact address or a block? in my limited experience, scanners will try a (relatively small) list of known vulnerabilities across a (huge) range of addresses.
my exact address, not the block. It's not about vuln scanning, ofc there are some, it's about porn traffic redirected to my ip, like if my ip was a proxy
Avatar
Those of you who've been around for awhile, what happened to EnCase? My understanding is that it used to be the primary tool for most LE, and I was trained specifically to use EnCase, but it feels like nobody uses it anymore.
Avatar
Avatar
silvance.
Those of you who've been around for awhile, what happened to EnCase? My understanding is that it used to be the primary tool for most LE, and I was trained specifically to use EnCase, but it feels like nobody uses it anymore.
You are correct its oldschool at this point, it has some benefits for email parsing but Xways, Axiom and others are way ahead at this point. Just my 2cents...
Avatar
Avatar
K8pl3r
my exact address, not the block. It's not about vuln scanning, ofc there are some, it's about porn traffic redirected to my ip, like if my ip was a proxy
When you say "my IP" do you not mean the static IP from your hosting provider? Who could be hosting adult content on the same IP but within a different VM or container?
Avatar
That doesn't make any sense. How would you arbitrarily give a random IP bad reputation? (edited)
Avatar
Avatar
KohleR
When you say "my IP" do you not mean the static IP from your hosting provider? Who could be hosting adult content on the same IP but within a different VM or container?
nop I have the full IP for my router that's why I don't understand :/
Avatar
there is a chance you have a recycled IP, the preivious owner may have hosted the content in question, I'd just ask your ISP for a new one. Make your life easier
12:13 PM
I'm assuming you pay for a static IP right?
Avatar
Avatar
K8pl3r
nop I have the full IP for my router that's why I don't understand :/
Run a reverse DNS lookup on your IP. Outside of that, I am all out of ideas but the above could be a solution.
👎 1
Avatar
because if it's residential, and you're not paying specifically for a static IP, unplug your router for an hour or over night, then you'll get a new dynamic IP
12:16 PM
if you are paying for a static ip, trying to scrub a bad record of said ip could be next to imposible, specifically blacklists, your best option is to explain the ip you got was used in a non professional manor, and it previously hosted p0rn0, and you'd like a new one, they shouldn't have any issue with that and probably would take 5 minutes
Avatar
Avatar
ryd3v
I'm assuming you pay for a static IP right?
I'm in a company where I have no power of decision... I hope that the previous server was taken down by the police so 🙏 I'll try to explain to my superiors. Thank you very much guys for the advices. The reverse dns gave nothing.
12:59 PM
The think that I don't understand who the suposed previous server could host all pn well known websites, csam reputation ones and vpns urls btw.
Avatar
to clarify, where are you seeing these associations? On HTTP headers, on DNS requests, or some 3rd party ?
2:36 PM
and what is the context, is this an IP on-premise or are we talking about a webhost?
Avatar
It is on premise IP and it is HTTP header requests which are suspicious, and seems to not legit (pn domains, vpn domains, piratebay...) (there is also some ssh bruteforce, imap scan)
Avatar
SBcyberCop 2/1/2024 4:44 AM
Any US law enforcement agencies willing to send me forensic analysis narratives? I'm trying to create a blanket case narrative for our forensic investigators who dump phones. Preferably with sections related to software / techniques used, undisclosed / protected methods of password brute force, etc.
4:45 AM
Forensic download / forensic analysis
Avatar
Avatar
K8pl3r
It is on premise IP and it is HTTP header requests which are suspicious, and seems to not legit (pn domains, vpn domains, piratebay...) (there is also some ssh bruteforce, imap scan)
interesting, you mentioned csam as well. I wonder if this might be scanning activity to try to identify these systems. E.g. domain is normally behind cloudflare/other WAF/DDoS protection and they are doing scanning to try to identify the true host.
12:48 PM
CURRYFINGER quickly and effectively identifies the real hosts behind CDN networks like CloudFlare - and outperforms existing tools. Find out how to use it.
12:49 PM
but that is a passive approach I think, using shodan's dataset
Avatar
Avatar
rayeh
interesting, you mentioned csam as well. I wonder if this might be scanning activity to try to identify these systems. E.g. domain is normally behind cloudflare/other WAF/DDoS protection and they are doing scanning to try to identify the true host.
it seems to be exactly that mate 🔥🔥🔥 (edited)
💯 1
1:31 PM
so it is potentially a LE server ?
1:32 PM
it also tries some ssh, imap bruteforce btw
Avatar
maybe LE or other interested parties
👍 1
Avatar
Okay, thank you very much for this help 😉
👍 1
Avatar
Has anyone here evaluated 1Password and/or Bitwarden as a password manager for an enterprise, if so which one is more user friendly & secure?
Avatar
I used 1Password from an enterprise perspective and it works well - you can share across teams and with specific individuals. I don’t think it’s too expensive but it’s a few dollars per user per month last time I checked
Avatar
Has anyone else found a fix for the issue with Cellebrite PA 10 where you cant remap the case db folder? If you create a case and then find you have to rename the Case DB folder, PA 10 doesnt allow you to change it. Changing the default DB path is fine in the Settings but that only works for new cases and not for previous ones. I have only found copying the case data from the new folder to the old works which kind of defeats the object. If you arent aware of the issue it will open your case, create the old folder but have nothing in it so it is blank. Before you ask, yes I have put a ticket in! (edited)
Avatar
Avatar
Zhaan
Has anyone else found a fix for the issue with Cellebrite PA 10 where you cant remap the case db folder? If you create a case and then find you have to rename the Case DB folder, PA 10 doesnt allow you to change it. Changing the default DB path is fine in the Settings but that only works for new cases and not for previous ones. I have only found copying the case data from the new folder to the old works which kind of defeats the object. If you arent aware of the issue it will open your case, create the old folder but have nothing in it so it is blank. Before you ask, yes I have put a ticket in! (edited)
ScottKjr3347 2/2/2024 3:47 AM
I use the export case feature to export a backup of the case db when processing is completed. This way I can take the acquisitions and the case db backup and move them to any workstation and reopen in pa 10. Not a fix for broken case db file path after being changed or moved but would allow you restore cases if the db gets corrupted / malfunctions. Ive asked for some type of reminder to be added to the workflow as not many uses are aware of the feature and would have helped when users encounter problems such as yours. (edited)
💯 2
Avatar
Avatar
ScottKjr3347
I use the export case feature to export a backup of the case db when processing is completed. This way I can take the acquisitions and the case db backup and move them to any workstation and reopen in pa 10. Not a fix for broken case db file path after being changed or moved but would allow you restore cases if the db gets corrupted / malfunctions. Ive asked for some type of reminder to be added to the workflow as not many uses are aware of the feature and would have helped when users encounter problems such as yours. (edited)
Brilliant! Thank you! How long have you worked in Cellebrite support? 😝
👍 1
Avatar
hannix7403 2/2/2024 5:05 AM
Hey have locked myself out of a phone, Android 13. Issue is I changed the passcode last week and forgot it, is there any chance that I could use the old passcode to decrypt at least part or some of the files?
Avatar
No. You can only get BFU if you had adb enabled prior, which does allow access to a very little data (edited)
Avatar
hannix7403 2/2/2024 8:04 AM
that sucks. Thx anyway
Avatar
Avatar
zembera
Has anyone here evaluated 1Password and/or Bitwarden as a password manager for an enterprise, if so which one is more user friendly & secure?
I can't speak about the enterprise side but I use Bitwarden for personal use on my phone, PC and I love it. Has two factor authenticator options, quick unlock with pin code after 5-10 lockout vs using a passcode all day long. (edited)
Avatar
Avatar
iNDO_o
Does anyone know where to get the vehicle make/model software? It' s a database of images and data to identify vehicles; it used to be at the LEEP site, but I can't find it anywhere.
SBcyberCop 2/2/2024 5:34 PM
The Digital Automotive Image System (DAIS) is an investigative forensic program of automotive images and associated technical specifications of vehicles. The system provides law enforcement personnel with a means of searching a database of vehicles to find a particular car or cars and print a high quality 8x10 image of a particular vehicle, incl...
5:34 PM
DAIS is provided free of charge by the FBI to LEOs. It is distributed to via the Law Enforcement Enterprise Portal (LEEP). If you or a colleague has an account, login, go to Justice Connection and search for DAIS. DAIS 2021 is the version that has been out there a number of years now but DAIS 2023 is currently going through the process of being added to the LEEP. If your search turns up only DAIS 2021, you might wait until January and search again. DAIS 2023 should be available by then, it adds new images for the 2022 and 2023 model years.
Avatar
Avatar
zembera
Has anyone here evaluated 1Password and/or Bitwarden as a password manager for an enterprise, if so which one is more user friendly & secure?
Proton pass is superior imo
Avatar
Avatar
zembera
Has anyone here evaluated 1Password and/or Bitwarden as a password manager for an enterprise, if so which one is more user friendly & secure?
depending on your company's threat model, i would shoot for using offline password managers for your end users rather than network-synced ones. the "best" one will be contingent on your needs: 1. are these pws shared across teams / considered shared accounts? 2. are these static pws or are they rolling codes? 3. are these accounts high risk? 4. are these for general user passwords to low privilege applications? 5. should the solution encompass both shared & personal credentials? my two cents would be to split them: end users get their own personal offline storage (i believe 1password can be entirely localized, same w/ solutions like keepass) and administrative credentials / shared accounts should be entirely separate and be incredibly inconvenient in usage (intranet only, passwords reset every n hours, session to access credentials requires MFA + short cookie timeouts, etc etc)
Avatar
for 100% offline(and sync option) I like https://www.enpass.io/ , since proton pass came out I don't use it as much, but it's a great vault.
Choose where your passwords and passkeys are secured and synced. Enpass works with your cloud accounts or completely offline. No data sent to our servers.
Avatar
Cellebrite is filling my C/Windows/Temp folder with hundreds of gigabytes of files. Its constantly creating these files every couple seconds. Has anyone encountered such a thing? Here is a screenshot of procmon showing that somthing called inamsrv.jar is responsible. Does anyone know how to fix this? Should I just open a ticket?
📬 1
Avatar
Avatar
PhrostByte
Cellebrite is filling my C/Windows/Temp folder with hundreds of gigabytes of files. Its constantly creating these files every couple seconds. Has anyone encountered such a thing? Here is a screenshot of procmon showing that somthing called inamsrv.jar is responsible. Does anyone know how to fix this? Should I just open a ticket?
Digitalferret 2/5/2024 11:58 AM
ticket and/or poke @Cellebrite in here 🙂
Avatar
Has anyone created any autofilling templates from notes to SFRs? i.e. specific text from the note sheet to fill in parts of the SFR automatically
Avatar
blackleitus 2/5/2024 1:09 PM
What do you consider small, medium, large, and enterprise networks based on the number of devices served?
Avatar
Should someone seeking entry level try to get a forensics cert before they apply to jobs? if so which one
Avatar
Avatar
John
Should someone seeking entry level try to get a forensics cert before they apply to jobs? if so which one
Digitalferret 2/6/2024 3:06 AM
Maybe find Co's you are interested in first, research the individual co's and make a unique-to-them app saying you are (a student?) looking to find a career in DF/IR. Ask and how you might best tailor your education and experience to provide a good fit. always be polite and express gratitude for any hints/tips/info they can spare the time to share. Don't go looking for Certs first, bottomless pit of expense and you stil may not have what they require. A loose 'boilerplate' template will help save you time, but do not copy and paste a proforma application and just mailshot everyone. It will go straight to File 13 🗑 (edited)
3:07 AM
it will also look good if you've self started, and can show or tell examples of the work you have done off your own bat.
Avatar
Avatar
PhrostByte
Cellebrite is filling my C/Windows/Temp folder with hundreds of gigabytes of files. Its constantly creating these files every couple seconds. Has anyone encountered such a thing? Here is a screenshot of procmon showing that somthing called inamsrv.jar is responsible. Does anyone know how to fix this? Should I just open a ticket?
wethepeople01 2/6/2024 3:32 AM
Could be the highlights setting. You can change the location in the settings. I can’t remember the underlying reason but could be related to image categorisation.
Avatar
Gethaffare 🇸🇪 2/6/2024 4:11 AM
Hi everyone, what tool are you using for revision control of scripts, templates and so on. I have tried a few one but can’t seem to be satisfied. 😊
Avatar
equalexpert 2/6/2024 5:15 AM
Hi all, does anyone know if XRY and Oxygen have a silent install capability for installing via command line? (edited)
Avatar
Avatar
Gethaffare 🇸🇪
Hi everyone, what tool are you using for revision control of scripts, templates and so on. I have tried a few one but can’t seem to be satisfied. 😊
Been many years since I used it but RCS seemed to work well: https://www.gnu.org/software/rcs/
Avatar
beansidebean2020 2/6/2024 7:20 AM
Does anyone UK have any experience with cloud downloads containing IIOC? I presume it is covered under some sort of law, but also logistically what do you consider- standalone laptop etc, alerting your ICT? Anyone got any tips? Thank you.
Avatar
Avatar
Digitalferret
Maybe find Co's you are interested in first, research the individual co's and make a unique-to-them app saying you are (a student?) looking to find a career in DF/IR. Ask and how you might best tailor your education and experience to provide a good fit. always be polite and express gratitude for any hints/tips/info they can spare the time to share. Don't go looking for Certs first, bottomless pit of expense and you stil may not have what they require. A loose 'boilerplate' template will help save you time, but do not copy and paste a proforma application and just mailshot everyone. It will go straight to File 13 🗑 (edited)
What youre saying is forget the specialized certs if you dont have that first job, focus on labs and projects to gain practical experience, and include a professional summary at the top of the resume?
Avatar
Avatar
Digitalferret
Maybe find Co's you are interested in first, research the individual co's and make a unique-to-them app saying you are (a student?) looking to find a career in DF/IR. Ask and how you might best tailor your education and experience to provide a good fit. always be polite and express gratitude for any hints/tips/info they can spare the time to share. Don't go looking for Certs first, bottomless pit of expense and you stil may not have what they require. A loose 'boilerplate' template will help save you time, but do not copy and paste a proforma application and just mailshot everyone. It will go straight to File 13 🗑 (edited)
whats a Co and youre saying to tailor the resume to each job listing? (edited)
Avatar
Avatar
John
What youre saying is forget the specialized certs if you dont have that first job, focus on labs and projects to gain practical experience, and include a professional summary at the top of the resume?
Digitalferret 2/6/2024 9:48 AM
no, you don't need a first job. just self start projects. if you do get a job, all well and good. use that and then get certs. without an idea of exactly what you want to do, and what jobs are available that suit, you would be guessing at Certs and wasting money. Co = Company (edited)
Avatar
Avatar
John
whats a Co and youre saying to tailor the resume to each job listing? (edited)
Digitalferret 2/6/2024 9:49 AM
if you have an idea of what niche part of DFIR you want to be in, find Companies that do that sort of work. write and ask what their ideal candidate looks like in terms of experience, certifications and so on. also what opportunities for those making a start in that area
9:51 AM
data recovery for instance: so much free software out there, and craigslist / ebay / FB marketpalcce. go buy cheap drives and practice. OSINT, same again, all that free software, go find out about <subject> and how much data you can gather. the list is long.
Avatar
I dont know what part of dfir I want to go into, anywhere I can learn what paths someone can take
9:53 AM
like contract forensics expert for courts, things like that
9:53 AM
But yes thanks after I finish my studies Ill get right into various projects
👍🏻 1
10:04 AM
much like cooking, start with what you want to eat, then find recipes to get you there. just filling a basket with groceries and hoping for a good meal at the end might be an "interesting" experience but not very appetising or edible.
Avatar
You just reminded me I have to go to the grocery store…
😄 2
Avatar
Avatar
beansidebean2020
Does anyone UK have any experience with cloud downloads containing IIOC? I presume it is covered under some sort of law, but also logistically what do you consider- standalone laptop etc, alerting your ICT? Anyone got any tips? Thank you.
We do a fair bit - legislation-wise, capture is still not definitively covered in law, but that should change after the GE (hopefully!). Logistically - standalone laptop w/anti-virus, internet-wise we're using a non-corporate line. (edited)
Avatar
Avatar
Qdos
We do a fair bit - legislation-wise, capture is still not definitively covered in law, but that should change after the GE (hopefully!). Logistically - standalone laptop w/anti-virus, internet-wise we're using a non-corporate line. (edited)
beansidebean2020 2/6/2024 12:50 PM
Thank you
Avatar
Avatar
beansidebean2020
Does anyone UK have any experience with cloud downloads containing IIOC? I presume it is covered under some sort of law, but also logistically what do you consider- standalone laptop etc, alerting your ICT? Anyone got any tips? Thank you.
We do quite a bit of cloud acquisition of IIOC material. depends on scenario and your setup and departments legal understanding and appetite. I have sent you a PM with a little bit more information. Just to add I've had great success with Arsenal Image mounter @Arsenal mounting images of computers and exposing them to the internet in order to carry out certain actions.
Avatar
Avatar
beansidebean2020
Does anyone UK have any experience with cloud downloads containing IIOC? I presume it is covered under some sort of law, but also logistically what do you consider- standalone laptop etc, alerting your ICT? Anyone got any tips? Thank you.
We just have a secure Internet connection and a laptop for cloud downloads.
Avatar
beansidebean2020 2/7/2024 12:02 AM
Thank you
Avatar
Hey all! What are the chances someone who is experienced in the field of DFIR could help me analyze some timelines and memory images?
Avatar
anyone from @Magnet Forensics available for a quick question regarding locating sources? (edited)
Avatar
Avatar
abdurahman
Hey all! What are the chances someone who is experienced in the field of DFIR could help me analyze some timelines and memory images?
Digitalferret 2/7/2024 11:29 AM
slim, unless you show/tell what you have done so far, and then ask specifics
Avatar
Hi, I'm looking for help I'm doing my hons project, and I was thinking on doing using AI to detech terrosism material on IoT devices, however I'm having an issue finding some decent terrorism data sets, would anybody know of where to find it?
Avatar
Given in some countries even possessing this kind of material is a criminal offence, you will probably struggle to find any data sets publicly available. If you’re in the U.K., you might want to reach out to Hope not Hate and see if they have any pointers.
💯 2
Avatar
Avatar
Scrubz
Hi, I'm looking for help I'm doing my hons project, and I was thinking on doing using AI to detech terrosism material on IoT devices, however I'm having an issue finding some decent terrorism data sets, would anybody know of where to find it?
Digitalferret 2/8/2024 4:00 AM
why not create your own data sets, and work on the principle of operation, rather than on the 'dangerous' material. For instance, there is photo analyisis software to identify skin pattern or some such. it's model is based on the human hand, but it doesn't take much of an imagination stretch to realise the parallel when used in making ID of other anatomy involved in illegal internet content where ths ubject material, if found, would land you in jail (edited)
Avatar
Two good very valid points, I'll need yo abandon that idea then.
Avatar
Avatar
Scrubz
Hi, I'm looking for help I'm doing my hons project, and I was thinking on doing using AI to detech terrosism material on IoT devices, however I'm having an issue finding some decent terrorism data sets, would anybody know of where to find it?
There are fake file creator tools you can use create new files. Using filenames as possible identifiers, it will limit your initial idea of searching content. (edited)
Avatar
Anyone here work in DF within Türkiye, law enforcement or private sector? Have a few questions I would like to ask. 🙂
Avatar
Digitalferret 2/8/2024 7:53 AM
@Law Enforcement [Türkiye] ^
👍 1
Avatar
Good morning. Is anyone available from @Cellebrite for a question regarding digital collector? Thanks!
📬 1
Avatar
Avatar
Dfdan
There are fake file creator tools you can use create new files. Using filenames as possible identifiers, it will limit your initial idea of searching content. (edited)
Yeah, I think it's probably best I scrap the idea and think of something new.
Avatar
Hi, does anyone know of any good sample data sets for warrant returns? I'd like to be able to demonstrate various tools' abilities but would prefer to not use actual case data.
👀 1
Avatar
Avatar
Scrubz
Two good very valid points, I'll need yo abandon that idea then.
Good plan, unless you can read Arabic and want PTSD. Its not the same thing by any means but have you considered instead Eco Terrorism? My thinking is also when your project is done and its sound you could maybe shop it around.
😁 1
Avatar
aboutdfir.com has some good ones listed
Avatar
Nanotech Norseman 2/8/2024 11:37 AM
Looking for a quick understanding about @Cellebrite Premium and a specific entry in the ufd file
📬 1
11:38 AM
Two cellebrite pings from the main channel within a few hours. Gotta keep them busy I guess XD
Avatar
Has anyone tried using FEC or Axiom to acquire email from iCloud? Did either tool work for you? (cross posting in cloud-forensics for visibility)
Avatar
Avatar
KohleR
Good plan, unless you can read Arabic and want PTSD. Its not the same thing by any means but have you considered instead Eco Terrorism? My thinking is also when your project is done and its sound you could maybe shop it around.
Husky_M00s3 2/9/2024 2:53 AM
GWU tracks extremism. Also, it depends on how narrow your definition of terrorism is. I think Southern Poverty Law Center tracks hate groups and extremism too. The US government has a Foreign Terrorist Organization list. That might be a good starting point. The internet has some ISIS propaganda on it if that is your focus. I would reach out to academic institutions if you really want to study it. Just note, translating Arabic and Farsi isn’t easy. You’ll probably need to work with a native speaker. (edited)
Avatar
Avatar
Scrubz
Hi, I'm looking for help I'm doing my hons project, and I was thinking on doing using AI to detech terrosism material on IoT devices, however I'm having an issue finding some decent terrorism data sets, would anybody know of where to find it?
I would echo what @Digitalferret said and just substitute real data for something that might be more generic but could easily be extrapolated to the real thing. For example people with guns, flags (assuming they are not illegal), symbols. You can still demonstrate a concept or methodology that way. Same thing is done by vendors making tools to flag CSAM, they just let the user use their imagination that whatever actual media item is being demonstrated (dogs, cats, generic children) represents CSAM in the real world. (edited)
Avatar
hi, did anyone try to use some Eric Zimmerman Tools in Linux? I am especially interested in bstrings
Avatar
Avatar
DFIR_tist
hi, did anyone try to use some Eric Zimmerman Tools in Linux? I am especially interested in bstrings
Andrew Rathbun 2/9/2024 11:40 AM
Yep I've used them. Make sure you have .NET 6 installed and run the same commands you would on Windows but instead call the dll (edited)
Avatar
I was able to use the commands, but I did it by running dotnet bstrings.dll
11:42 AM
So I don‘t really need the dotnet in my command right?
Avatar
Avatar
DFIR_tist
So I don‘t really need the dotnet in my command right?
Andrew Rathbun 2/9/2024 11:42 AM
Ah yeah you may need that. It's been a while, admittedly
Avatar
Avatar
DFIR_tist
I was able to use the commands, but I did it by running dotnet bstrings.dll
randomaccess 2/9/2024 1:48 PM
On Linux run dotnet bstrings.dll On windows use the exe
Avatar
Hey !! Really want to learn and understand digital forensics but still having lot of confusion please can you guys provide a roadmap or checklist/training!! Let me know if !! Thanks.
Avatar
Avatar
Banna ☀
Hey !! Really want to learn and understand digital forensics but still having lot of confusion please can you guys provide a roadmap or checklist/training!! Let me know if !! Thanks.
Digitalferret 2/10/2024 2:08 AM
too wide a question dude, youtube what you fancy doing most. look up 13cubed. tbh if it's not turning your cogs enough to go find something, go find something that does? bury yourself in it, see if hours pass like minutes.
Salute 1
Avatar
Avatar
Banna ☀
Hey !! Really want to learn and understand digital forensics but still having lot of confusion please can you guys provide a roadmap or checklist/training!! Let me know if !! Thanks.
Grab a few forensics oriented books, best place to start. Better yet, checkout this blog post with a curated list to get you going. https://ryd3v.com/dfir (edited)
RYD3V Software Engineer & Cybersecurity Enthusiast
🔥 1
4:49 PM
I see articles like this and want to do cool stuff, too!
Avatar
Anyone @Law Enforcement [UK] attending TCUK this week? Might be fun to say hi! I’m giving a talk on DFIR
Avatar
Avatar
busted4n6
Anyone @Law Enforcement [UK] attending TCUK this week? Might be fun to say hi! I’m giving a talk on DFIR
Brill, will see you there ! I'm booked to see your talk.
Salute 1
Avatar
Avatar
Steve2609
Brill, will see you there ! I'm booked to see your talk.
If you’re already here, don’t have too higher expectation of being enlightened 😂😂
😂 2
Avatar
Avatar
busted4n6
Anyone @Law Enforcement [UK] attending TCUK this week? Might be fun to say hi! I’m giving a talk on DFIR
MrTurdTastic 2/12/2024 1:13 AM
Yep, I'm presenting Op Ulex
👍 2
frogeparty 1
Avatar
What is the best tool to take a memory dump of an Ubuntu live machine?
Avatar
ddrescue ?
Avatar
Avatar
M3r1T
What is the best tool to take a memory dump of an Ubuntu live machine?
Not tested it but https://github.com/MagnetForensics/dumpit-linux may be worth a look. If it a virtual machine you can just get a copy of the memory snapshot from there
Memory acquisition for Linux that makes sense. Contribute to MagnetForensics/dumpit-linux development by creating an account on GitHub.
Avatar
Avatar
busted4n6
Not tested it but https://github.com/MagnetForensics/dumpit-linux may be worth a look. If it a virtual machine you can just get a copy of the memory snapshot from there
Thank you
Avatar
Avatar
M3r1T
What is the best tool to take a memory dump of an Ubuntu live machine?
You could also try this. https://github.com/microsoft/avml
AVML - Acquire Volatile Memory for Linux. Contribute to microsoft/avml development by creating an account on GitHub.
🔥 1
Avatar
Avatar
M3r1T
What is the best tool to take a memory dump of an Ubuntu live machine?
DeeFIR 🇦🇺 2/12/2024 4:20 PM
As others have said, AVML or dumpit. I’ve previously forked Magnet’s repo and there’s a build release if you need to use it quickly and can’t build your own. https://github.com/deeFIR/dumpit-linux
Avatar
Avatar
DeeFIR 🇦🇺
As others have said, AVML or dumpit. I’ve previously forked Magnet’s repo and there’s a build release if you need to use it quickly and can’t build your own. https://github.com/deeFIR/dumpit-linux
Thanks : )
Avatar
What's wrong with this, this account falls as unknown. what is this account
Avatar
marco_polo076 2/12/2024 10:01 PM
does anyone know the coding software verse which is used for uefn on fortnite
Avatar
Hello all, Is there a cheet sheet anywhere for how long common web browsers (mainly android) retains history for? Google is chucking out mixed results
Avatar
Avatar
Sam
Hello all, Is there a cheet sheet anywhere for how long common web browsers (mainly android) retains history for? Google is chucking out mixed results
randomaccess 2/13/2024 12:43 AM
Chromium is 90 days but you also get preserved databases in the snapshots folder Don't know Firefox off the top of my head
Avatar
Avatar
M3r1T
What's wrong with this, this account falls as unknown. what is this account
That Security ID (SID) doesn’t correspond to a known user on that computer. This could be a user that’s been deleted, or a user from a different computer / domain.
👍 1
Avatar
Avatar
randomaccess
Chromium is 90 days but you also get preserved databases in the snapshots folder Don't know Firefox off the top of my head
Do you mind if I dm you?
Avatar
It’s a well-known account that started appearing on c:\ permissions after 22h2
1:01 AM
Some security identifiers that you see in access control lists or Security Audit reports do not resolve into friendly names. These may be capability SIDs.
Avatar
Avatar
busted4n6
It’s a well-known account that started appearing on c:\ permissions after 22h2
Thanks
Avatar
Avatar
bizzlyg
I would echo what @Digitalferret said and just substitute real data for something that might be more generic but could easily be extrapolated to the real thing. For example people with guns, flags (assuming they are not illegal), symbols. You can still demonstrate a concept or methodology that way. Same thing is done by vendors making tools to flag CSAM, they just let the user use their imagination that whatever actual media item is being demonstrated (dogs, cats, generic children) represents CSAM in the real world. (edited)
Nah, I'm going to drop that idea. I need to find something new to do, thanks for the suggestion though. 🙂
👍 1
Avatar
Any suggestions with an artefact would be welcome 😂
Avatar
Avatar
Sam
Do you mind if I dm you?
randomaccess 2/13/2024 1:04 PM
Sure
Avatar
Undersearamen 2/14/2024 3:45 AM
Hello I was wondering if anyone has come across the BIgo Live application and happens to know if any of the messages are stored locally on the device?
3:45 AM
And if so where
Avatar
Hello, is there a way to turn off the “moisture detected error” message on a Samsung S9? There’s no moisture.
Avatar
Avatar
Mothra
Hello, is there a way to turn off the “moisture detected error” message on a Samsung S9? There’s no moisture.
Digitalferret 2/14/2024 11:09 AM
“moisture detected error” there are so many possible replies to that, none of which would be useful 🤣 other than that, have you tried the bags of silica gel / air drying / <bag of material that draws moisture> stuuf? ciuld be condensation insde, or a 'bathroom drop' some time ago?
11:10 AM
anyone at @Belkasoft available for a quick DM pls?
Avatar
Avatar
Digitalferret
anyone at @Belkasoft available for a quick DM pls?
Yuri Gubanov (Belkasoft) 2/14/2024 11:10 AM
Yes
👍🏻 1
Avatar
Avatar
Digitalferret
“moisture detected error” there are so many possible replies to that, none of which would be useful 🤣 other than that, have you tried the bags of silica gel / air drying / <bag of material that draws moisture> stuuf? ciuld be condensation insde, or a 'bathroom drop' some time ago?
Will look into that. So far I’ve tried using different cords, clear cache, cleaning the port, disabling fast charging, and safe mode with no success
Avatar
Avatar
Mothra
Will look into that. So far I’ve tried using different cords, clear cache, cleaning the port, disabling fast charging, and safe mode with no success
Digitalferret 2/14/2024 11:31 AM
if it's easy to do, or you have the tools available, de-case the thing, front/back? i'd suspect condensation as a first guess
Avatar
I have a video on a moto cell phone that I’m trying to figure out where it goes to. The path is… /data/data/com.google.android.apps.nbu.files/files/.FilesByGoogle/ video.mp4
Avatar
Avatar
Mothra
Will look into that. So far I’ve tried using different cords, clear cache, cleaning the port, disabling fast charging, and safe mode with no success
Is the warning being displayed on the device, or on the examination tool you are using? The reason I ask is I had an issue using Trevor which displayed that warning, however was successful in using UFED and XRY without any water damage warnings being displayed. Potentially Knox security kicking in when using non logical extraction. Mine was using a validation device which had been stored in a dry room so I could eliminate water damage / moisture. Even 2 years later this still works in UFED/XRY but not in Trevor which still states water damage..
Avatar
Hola! What are the best practices for handling potentially malicious files such as documents and executables? You often need to copy these files from an infected system for analysis. How do you do this in a safe way minimizing the risk to your own system? I think the risk is low since these types of files don't execute on their own simply by being written to the file system. Therefore I would assume copying them to your analysis system would be low risk. But what process do you all follow? (edited)
👀 1
Avatar
Avatar
Villano
Hola! What are the best practices for handling potentially malicious files such as documents and executables? You often need to copy these files from an infected system for analysis. How do you do this in a safe way minimizing the risk to your own system? I think the risk is low since these types of files don't execute on their own simply by being written to the file system. Therefore I would assume copying them to your analysis system would be low risk. But what process do you all follow? (edited)
A common practice would be to compress (zip, 7z, etc) the file(s) and password protect the zip (usually "infected" or "malware").
👍🏾 1
Avatar
Avatar
Ryan W
A common practice would be to compress (zip, 7z, etc) the file(s) and password protect the zip (usually "infected" or "malware").
Thanks! I thought about this. I have seen people do this and then decompress the files on their system for analysis or uploading to a sandbox.
Avatar
Watching the Cellebrite webinar on Inseyets (?). Why to I feel like they are talking about the Continuum Transfunctioner?
🤣 1
Avatar
I swear I've seen this before, but can't recall an explanation. Anyone know why Axiom Portable Case is showing different totals of tags on the case dashboard? Everything within the case seems to be totalling 171.
12:10 PM
@Magnet Forensics
Avatar
3 file system ones? As opposed to artifacts?
Avatar
I considered that, but the file system isn't accessible in the portable case for the investigator to have tagged anything. And I believe normally there would be a 'File System' column header next to 'Artifacts' in the above image.
👍 1
Avatar
Avatar
dfa_adam
I considered that, but the file system isn't accessible in the portable case for the investigator to have tagged anything. And I believe normally there would be a 'File System' column header next to 'Artifacts' in the above image.
do you have three "comments"? Only other thing I can think of would be a deduplication issue but I don't know how axiom handles those
Avatar
What about things within a zip
2:58 PM
Would that cause more tags than artifacts?
2:59 PM
I guess the main thing would be to look at the main case, rather than the portable
Avatar
Okay, looks like they are file system tags - the only place I found reference to them was in 'Manage Tags' (which had 3 file system tags). Merging the case will suddenly populate the 'File System' tag count on the case dashboard. Looking at those (pdf files), they have the same hash as 3 of the tagged pdf documents in the portable case. So a combination of deduplication and file system tags I guess?
Avatar
I've never liked the distinction between artifacts and filesystem tags... I get that they're different in that an artifact can be a single facet or entry in a database vs the whole file, but you can tag whole files from the artifact side as well. Just seems like an unnecessary distinction that has never sat well with me
Avatar
It has been fun having to explain that in court - that an artifact is not necessarily a file, and a file may not be an artifact... Adding in de-duplication and tags auto-generated by the software behind the scenes is a bit of a mess to explain clearly.
Avatar
I have likened it to a facet on a diamond, its one piece and one perspective from an object with lots of pieces. One stone with lots of facets
Avatar
Is there any m365 log that will give me details on what device was a specific user using at a given time? Cannot use signin logs as I need data for the past 180 days
Avatar
Erik Barboza 2/15/2024 7:45 PM
In our environment the answer was yes, but it was dependent on the host and (I think) certain outlook plugins. Authentication logs will at least provide an IP. EDIT: authentication logs in our environment do show hostname for computers, phone model for iPhones. So in short, you should be able to find this information in Azure logging. (edited)
Avatar
Avatar
Erik Barboza
In our environment the answer was yes, but it was dependent on the host and (I think) certain outlook plugins. Authentication logs will at least provide an IP. EDIT: authentication logs in our environment do show hostname for computers, phone model for iPhones. So in short, you should be able to find this information in Azure logging. (edited)
Thanks for the response, with authentication log do you mean the sign-in logs? Since they are only limited to 30 days by default I think.
Avatar
Avatar
Villano
Hola! What are the best practices for handling potentially malicious files such as documents and executables? You often need to copy these files from an infected system for analysis. How do you do this in a safe way minimizing the risk to your own system? I think the risk is low since these types of files don't execute on their own simply by being written to the file system. Therefore I would assume copying them to your analysis system would be low risk. But what process do you all follow? (edited)
Good question, although some malware do execute on their own by design and some are not executable at all but perhaps a dll that is required by another process, and by using another application or service required by the system can actually arm and execute multi stage payloads, unbeknownst to the system user. including malware that is persistent that can survive the main payload being deleted, and system reboots, even rootkits. So first depending on the actual malware they can be high risk and why the treatment of unknown files and or malware should be taken with care. So a two part answer, first malware should be safely copied to a virtual machine, otherwise you could compromise your analysis machine, and may not even know it, evenothough some malware are designed to detect virtual machines. Second, usually the executable or file is renamed with the extension of .mal and then 7zp with a password of infected. Not necessarily all malware has the extension '.exe' Some malware can spread to other network devices even in compressed form, so sometimes depending on the origin of the malware you may use a usb to transfer the file(s) offline form a sand-boxed analysis machine. There is also a thing call FUD malware 'fully undetectable' that can exist and execute without any knowledge of the system user. Malware can use a variety of obfuscation techniques, so it's best to handle all malware with care. Standard practice is to have an offline machine, that uses virtual machines for analysis. A good book is Practical Malware Analysis which details for beginners how to setup a safe virtual environment to analyze malware
👍🏾 1
12:48 AM
usually we use z7p, since it's not installed on most systems by default, with a password of malware
👍🏾 1
Avatar
Avatar
ryd3v
Good question, although some malware do execute on their own by design and some are not executable at all but perhaps a dll that is required by another process, and by using another application or service required by the system can actually arm and execute multi stage payloads, unbeknownst to the system user. including malware that is persistent that can survive the main payload being deleted, and system reboots, even rootkits. So first depending on the actual malware they can be high risk and why the treatment of unknown files and or malware should be taken with care. So a two part answer, first malware should be safely copied to a virtual machine, otherwise you could compromise your analysis machine, and may not even know it, evenothough some malware are designed to detect virtual machines. Second, usually the executable or file is renamed with the extension of .mal and then 7zp with a password of infected. Not necessarily all malware has the extension '.exe' Some malware can spread to other network devices even in compressed form, so sometimes depending on the origin of the malware you may use a usb to transfer the file(s) offline form a sand-boxed analysis machine. There is also a thing call FUD malware 'fully undetectable' that can exist and execute without any knowledge of the system user. Malware can use a variety of obfuscation techniques, so it's best to handle all malware with care. Standard practice is to have an offline machine, that uses virtual machines for analysis. A good book is Practical Malware Analysis which details for beginners how to setup a safe virtual environment to analyze malware
Thanks
🍻 1
Avatar
Hello, can someone please explain how/from where in Autopsy 4.21 is taken/generated Device ID for data sources. For example in my case for USB thumbdrive, because my provided EWF image doesn't have information about serial number.
Avatar
Avatar
fixclown
Thanks for the response, with authentication log do you mean the sign-in logs? Since they are only limited to 30 days by default I think.
Erik Barboza 2/16/2024 5:18 AM
I do. My mistake…I’m so used to having ours available in Splunk after the M365 retention period 😬
Avatar
Ahh fair enough thank you. Yea our client doesn't have splunk setup 🙃
Avatar
Hi guys can i have links to digital forensics lab
Avatar
Avatar
CyberCroc
Hi guys can i have links to digital forensics lab
Are you looking for structured labs which specific scenarios, or just some like test data to run tools on?
Avatar
Structured would be great
Avatar
Avatar
CyberCroc
Structured would be great
CyberDefenders has a good selection of labs, some of them for free https://cyberdefenders.org/. Although known for more offensive/hacking labs, Hack The Box has a section called Sherlocks specific to DFIR. The NIST dataset portal has a lot of datasets that were part of labs or CTF contests https://cfreds.nist.gov/. Some of them contain walkthroughs, but some are just the data. You can usually Google around and find a walkthrough for some of them.
Blue team training platform for SOC analysts, threat hunters, DFIR, and security blue teams to advance CyberDefense skills.
Avatar
garfieldkhan 2/17/2024 4:34 AM
how can data contamination occur if the evidence carrier had been formatted or wiped? Have you ever experienced this?
Avatar
Avatar
garfieldkhan
how can data contamination occur if the evidence carrier had been formatted or wiped? Have you ever experienced this?
What exactly do you mean by “data contamination?” Please explain a complete scenario you have experienced or have in mind.
Avatar
Avatar
Arsenal
What exactly do you mean by “data contamination?” Please explain a complete scenario you have experienced or have in mind.
garfieldkhan 2/17/2024 4:56 AM
“It is crucial to have enough devices where forensic images, clones or data from remote sources will be stored. These devices should preferably be brand new or, at least, securely wiped overwriting all of the data with a known sequence of characters, usually "00" in hexadecimal, to avoid any possible data contamination.”
4:57 AM
to justify this excerpt taken from an article
Avatar
Are you asking an academic question about how “data contamination” could possibly occur after evidence is placed on a sterile storage device/volume?
Avatar
Avatar
Arsenal
Are you asking an academic question about how “data contamination” could possibly occur after evidence is placed on a sterile storage device/volume?
garfieldkhan 2/17/2024 5:01 AM
if evidence is placed in a non sterile storage device
Avatar
Ok, I think I understand now… your original question should have been “had not been formatted” rather than “had been formatted?”
👍 1
Avatar
Avatar
Arsenal
Ok, I think I understand now… your original question should have been “had not been formatted” rather than “had been formatted?”
garfieldkhan 2/17/2024 5:03 AM
yes sorry it was my mistake
Avatar
Best practices aside, and assuming your evidence is contained within logical containers like forensic images, you would actually have to work pretty hard to screw things up even if there has been storage on a non-sterile device/volume. Why take the chance though?
Avatar
Avatar
Arsenal
Best practices aside, and assuming your evidence is contained within logical containers like forensic images, you would actually have to work pretty hard to screw things up even if there has been storage on a non-sterile device/volume. Why take the chance though?
garfieldkhan 2/17/2024 5:16 AM
i agree, but im just trying to build arguments for this
Avatar
The closest we’ve had is a technician accidentally selecting a physical drive rather than an image file. Tool proceeded to carve illegal content from carrier drive rather than image. It was luckily spotted. Also you may find the argument for verifying the image files prior to processing becomes stronger as a control mechanism. Best option I’ve found is istorage drives where you can enter a wipe pin to immediately cryptoshred the keys
👍 1
Avatar
Avatar
busted4n6
The closest we’ve had is a technician accidentally selecting a physical drive rather than an image file. Tool proceeded to carve illegal content from carrier drive rather than image. It was luckily spotted. Also you may find the argument for verifying the image files prior to processing becomes stronger as a control mechanism. Best option I’ve found is istorage drives where you can enter a wipe pin to immediately cryptoshred the keys
garfieldkhan 2/17/2024 7:23 AM
thank you
Avatar
garfieldkhan 2/17/2024 8:33 AM
does anyone know what a "cellular network isolation card" (cnic) is? and how to acquire?
Avatar
Avatar
garfieldkhan
does anyone know what a "cellular network isolation card" (cnic) is? and how to acquire?
Is it a dummy sim card? Needed to examine phones that won’t turn on without a SIM. UFED comes with some
👍 2
Avatar
Fabio Candeias 🇨🇭 2/19/2024 2:57 AM
Is there anybody from @Cellebrite ? I have some questions about installation of Digital Collector. Thank's in adavance
Avatar
Avatar
Mothra
Hello, is there a way to turn off the “moisture detected error” message on a Samsung S9? There’s no moisture.
this is just a short detection system, fix the short
Avatar
Avatar
Fabio Candeias 🇨🇭
Is there anybody from @Cellebrite ? I have some questions about installation of Digital Collector. Thank's in adavance
The only installation, I’m aware of, involved with Digital Collector is the update application. It’s installed and then used to update the DC hardware. It can be found in the customer portal with other tool versions. DC itself is run as a “live application” or as bootable media from the hardware device.
Avatar
Avatar
char|i3
The only installation, I’m aware of, involved with Digital Collector is the update application. It’s installed and then used to update the DC hardware. It can be found in the customer portal with other tool versions. DC itself is run as a “live application” or as bootable media from the hardware device.
Fabio Candeias 🇨🇭 2/19/2024 4:52 AM
The SSD dongle that I received is empty (only 0x000 in the disk), that's why I don't understand
Avatar
Interesting, give the update application a go and feel free to DM me if you have issues.
Avatar
Looking for a tool to do OSINT and social media monitoring in a given geographic region. Anyone familiar with good tools? Looked at the ZeroFox version and it's a wee bit over the price limit.
Avatar
Have you checked out the CSI Linux and Trace Labs VMs? Trace Labs in particular does a gameification of OSINT for missing persons, they might have some geographical tools on board. It's all open source Linux stuff so maybe not as polished as a pay product
8:25 AM
Trace Labs is a nonprofit organization whose mission is to accelerate the family reunification of missing persons while training members in the tradecraft of open source intelligence (OSINT).
8:25 AM
A Complete Cyber Forensics Platform
Avatar
I'll take a look. Is this your YT channel?
Avatar
Anyone from @Magnet Forensics available for a query?
📬 1
Avatar
Avatar
Villano
I'll take a look. Is this your YT channel?
Husky_M00s3 2/20/2024 2:08 PM
No. I learned about it during the Huntress CTF. I see how the similar names could be misleading. My apologies.
👍🏾 1
Avatar
Avatar
Husky_M00s3
No. I learned about it during the Huntress CTF. I see how the similar names could be misleading. My apologies.
Thanks for sharing it.
Avatar
I took Matt's (HuskyHacks) practical malware analysis and triage course on the TCM Security Academy platform a while back, I learned a lot and would recommend it. It looks like that YT video is a condensed version of the course material.
Avatar
Does anyone know of programs other than cellebrite that can create/export material in UFDR format? Looking specifically for programs that support linux (or mac). Trying to find ways to work in linux instead of windows, but our investigators has gotten used to getting UFDR reports and cellebrite only supports windows to my knowledge
Avatar
Avatar
nisse
Does anyone know of programs other than cellebrite that can create/export material in UFDR format? Looking specifically for programs that support linux (or mac). Trying to find ways to work in linux instead of windows, but our investigators has gotten used to getting UFDR reports and cellebrite only supports windows to my knowledge
facelessg00n 2/20/2024 11:04 PM
The UFDR is just a zip file in disguise. The contents is laid out in Cellebrites own format. Matching the format of the content format would be the nightmare if you tried to roll your own.
Avatar
@facelessg00n sure, however, e.g the ufd format, created from cellebrite extractions can be interpreted by many programs. Thus, i dont think it would be unreasonably to think that certain program also could export as ufdr format.
Avatar
Avatar
nisse
@facelessg00n sure, however, e.g the ufd format, created from cellebrite extractions can be interpreted by many programs. Thus, i dont think it would be unreasonably to think that certain program also could export as ufdr format.
facelessg00n 2/21/2024 12:28 AM
From the vendors I have spoken with cellebrite provide them the schema etc. for them to read but I haven’t seen any package 📦 them back into a UFDR yet.
Avatar
Alright, thank you! that's a bummer
Avatar
Samsung S10 with a moisture/debris warning, I have stripped it down and cleaned the USB port, I have put the mainboard in an ultrasonic bath, I have charged to 100%, I have cleared the USB cache, I have tried a different cable and and have turned off fast charging, none of which worked! Any other suggestions? I do have have access to the device.
2:40 AM
The warning is from the phone as soon as I plug it in to a cable. It wireless charges fine.
Avatar
Avatar
Zhaan
Samsung S10 with a moisture/debris warning, I have stripped it down and cleaned the USB port, I have put the mainboard in an ultrasonic bath, I have charged to 100%, I have cleared the USB cache, I have tried a different cable and and have turned off fast charging, none of which worked! Any other suggestions? I do have have access to the device.
we had this with a Samsung Galaxy fold, eded up swapping the usb port for a new one - worked first time in premium after that
Avatar
Avatar
Zhaan
Samsung S10 with a moisture/debris warning, I have stripped it down and cleaned the USB port, I have put the mainboard in an ultrasonic bath, I have charged to 100%, I have cleared the USB cache, I have tried a different cable and and have turned off fast charging, none of which worked! Any other suggestions? I do have have access to the device.
Digitalferret 2/21/2024 2:45 AM
kudos dude, proper job! can only think if the electrical conditions to indicate moisture are a higher resistance reading, therefore may be the battery internals? check make/model compatibility? other than that it's clutching at straws here, other than ringing Samsung direct and flashing your badge (never a bad idea .. /flex 🙂 ) (edited)
2:46 AM
good point by @Aero too. can never be too sure, connectors are always a point of weakness.
🫡 1
2:47 AM
binned my beloved Nokia N900 bc that :/
😢 1
Avatar
Only issue with an S10 it's not as easy as buying a replacement because I THINK (correct me if I'm wrong) that the port is part of the motherboard and not a separate connector (like the Samsung fold)
2:52 AM
So it's not as easy as buying a replacement USB flex connector, port will have to be desoldered and replaced
2:53 AM
Actually @Zhaan , if it's an S10 5G you're in luck - you can just swap the flex connector super easily
Avatar
Avatar
Aero
Only issue with an S10 it's not as easy as buying a replacement because I THINK (correct me if I'm wrong) that the port is part of the motherboard and not a separate connector (like the Samsung fold)
Unfortunately it doesn't have a daughter board and I am not convinced it is the port as I can see corrosion on some legs of chips and stuff.
2:55 AM
ALthough the phone does boot something is really upsetting it
Avatar
Ah man 😦 could be a secondary short
Avatar
not enough for the phone not to boot, but something aint right 😦
Avatar
Avatar
Digitalferret
kudos dude, proper job! can only think if the electrical conditions to indicate moisture are a higher resistance reading, therefore may be the battery internals? check make/model compatibility? other than that it's clutching at straws here, other than ringing Samsung direct and flashing your badge (never a bad idea .. /flex 🙂 ) (edited)
We have several donor units in house and I tried a battery from a different phone, same error but thanks for the thought
Avatar
Avatar
Zhaan
We have several donor units in house and I tried a battery from a different phone, same error but thanks for the thought
Digitalferret 2/21/2024 3:01 AM
thorough 🙂
Avatar
Avatar
Digitalferret
thorough 🙂
Desperate!
Avatar
Avatar
Zhaan
Desperate!
Digitalferret 2/21/2024 3:03 AM
corrosion: you guys confident on circuit board reworks? thinking maybe reflow, but mindful not wanting to brick a device beyond recovery, else find a good lab?
Avatar
The last thing I will try is sticking it on the under heater for 30 minutes at 100 degrees which has fixed some S7 and S8 in the past (edited)
Avatar
Digitalferret 2/21/2024 3:03 AM
^
3:04 AM
that or IR station if you want to try hotter
Avatar
You mean 101? No way, thats dangerous 🤣
🤪 1
Avatar
Update on the Sammy S10 with the moisture warning, after wirelessly charging it to 100%, it now works without the warning, GO SAMSUNG! (edited)
🥳 3
👏 1
Avatar
Avatar
Zhaan
Update on the Sammy S10 with the moisture warning, after wirelessly charging it to 100%, it now works without the warning, GO SAMSUNG! (edited)
glad its working mate 😁
Avatar
Avatar
Aero
glad its working mate 😁
Me too, aint got enough hair to pull it out and its barely mid week! No time for disasters!
😂 3
Avatar
Avatar
Zhaan
Update on the Sammy S10 with the moisture warning, after wirelessly charging it to 100%, it now works without the warning, GO SAMSUNG! (edited)
Digitalferret 2/21/2024 8:01 AM
damn good work dude. persistence pays off \o/
Avatar
Hi all! Does anyone have any idea/suggestions in which coming up a set of criterias that warrants any form of incident/threat response? Am aware that the CVSS scoring system exists, are there any other forms of criteria/playbook out there? Thank you so much!
Avatar
Avatar
ech0
Hi all! Does anyone have any idea/suggestions in which coming up a set of criterias that warrants any form of incident/threat response? Am aware that the CVSS scoring system exists, are there any other forms of criteria/playbook out there? Thank you so much!
Digitalferret 2/22/2024 1:11 AM
might be useful to echo in #policies-and-procedures too, folks will have eyes out for this kind of stuff
🙏 1
Avatar
Hello everyone! I tried today to download KAPE from the official site by providing my work email address during registration. I did not get any confirmation message or any feedback. Do any of you perhaps know in what time frame and if at all I can expect a response from Kroll?
Avatar
Hi There, Anyone suggest good CDR analysis software?
Avatar
Avatar
Kielx
Hello everyone! I tried today to download KAPE from the official site by providing my work email address during registration. I did not get any confirmation message or any feedback. Do any of you perhaps know in what time frame and if at all I can expect a response from Kroll?
I had the same issue, I was given a link where I could download Kape from
Avatar
Thanks for the info, do you remember how long you had to wait for the link?
Avatar
Anyone who has done social media accounts recovery
Avatar
Avatar
CyberCroc
Anyone who has done social media accounts recovery
Digitalferret 2/22/2024 6:32 AM
from what perspective, you are locked out of your own account or ?
Avatar
Yes, I want to help someone who has been hacked out of their instagram an facebook account
Avatar
Digitalferret 2/22/2024 6:39 AM
ho ho ho
💯 1
Avatar
Avatar
CyberCroc
Yes, I want to help someone who has been hacked out of their instagram an facebook account
Digitalferret 2/22/2024 6:40 AM
get them to contact the service provider and be prepared to jump through as many hoops as they dangle, ie have any and all personal details to hand,
Avatar
Avatar
CyberCroc
Yes, I want to help someone who has been hacked out of their instagram an facebook account
Digitalferret 2/22/2024 6:42 AM
that will be a "no" then as it's not your account
Avatar
Thank you
Avatar
Original message was deleted or could not be loaded.
Digitalferret 2/22/2024 10:04 AM
yep, get in touch with Exterro and ask if your credentials are correct?
10:05 AM
you bought the prog, right?
Avatar
has anyone tried to send google a geofence warrant since they shut them down?
Avatar
Avatar
iNDO_o
has anyone tried to send google a geofence warrant since they shut them down?
A few of my partners have - and have received data back. From what I understand the change over is a slow process - so you may or may not get data back until everything is changed over
Avatar
Avatar
8198-IZ54
Hi There, Anyone suggest good CDR analysis software?
I use Nighthawk and it has worked great for me.
Avatar
caramelomacc 2/23/2024 1:25 AM
Has anyone ever done background checks (legally) for a company or a person? Is there any specific method or just searching them on search engines or social medias?
Avatar
testermonkey 2/23/2024 3:14 AM
Hi all, does anyone have any suggestions for powering on a samsung A217f without using any hardware buttons? The board is cracked near the contacts for the HW buttons but the screen does turn on and is does charge. I couldnt see the phone as a ADB device and the two big brand extraction tools cant recognise it properly while turned off.
Avatar
Avatar
caramelomacc
Has anyone ever done background checks (legally) for a company or a person? Is there any specific method or just searching them on search engines or social medias?
Are you in the US? The same private investigation firm that provides us with armed security also does various kinds of background checks that are well worth the cost. Everything from basic record lookups to having previous neighbors in foreign countries interviewed. The end product is a professional report.
Avatar
Avatar
testermonkey
Hi all, does anyone have any suggestions for powering on a samsung A217f without using any hardware buttons? The board is cracked near the contacts for the HW buttons but the screen does turn on and is does charge. I couldnt see the phone as a ADB device and the two big brand extraction tools cant recognise it properly while turned off.
disconnect battery and plug in usb cable. Phone should try to boot, and the moment you'll see Samsung logo, connect the battery. Somtimes this will make the phone to fully boot to Android (edited)
💯 2
👍 1
Avatar
Original message was deleted or could not be loaded.
Digitalferret 2/23/2024 3:22 AM
drop them a mail? If you've paid, there should be support? else check your actions like scrolling down a pane if there is one, alt tabbing to make sure there are no other panels to check and so on (edited)
Avatar
Avatar
Arcain
disconnect battery and plug in usb cable. Phone should try to boot, and the moment you'll see Samsung logo, connect the battery. Somtimes this will make the phone to fully boot to Android (edited)
testermonkey 2/23/2024 3:24 AM
Thanks mate I'll start experimenting with that
3:30 AM
dude! It's alive! thanks @Arcain
Salute 1
Avatar
Digitalferret 2/23/2024 3:43 AM
🙂
😂 1
Avatar
Avatar
Blue56
A few of my partners have - and have received data back. From what I understand the change over is a slow process - so you may or may not get data back until everything is changed over
Sounds good, thanks
Avatar
TheCyberParadigm 2/23/2024 7:25 AM
Greetings all, I cannot for the life of me remember the technique when you delete and recreate a file very quickly that it reuses the MFT entry. It is driving my crazy
Avatar
❓ Hello, I thought there used to be a mobile forensics (not extractions) group, but maybe I lost my mind.. Anyway I have a couple of questions for @Cellebrite regarding the operation of Inseyets PA if anyone is around? 1. the old PA let you uncheck all the boxes in the extraction by disabling it in options, in Inseyets it only applies to new cases, how do you uncheck all the boxes in an extraction, or do you have to re-process the case with the option turned off? 2. how do you delete an already processed case? Thanks
Avatar
Well I answered my own question on the first one, so disregard, but how do you delete a case?
Avatar
Avatar
OregonDFIR
Well I answered my own question on the first one, so disregard, but how do you delete a case?
CLB_joshhickman1 2/23/2024 9:30 AM
The three-dot button to the right of the case you're interested in will present that option to you.
👍 1
Avatar
Avatar
CLB_joshhickman1
The three-dot button to the right of the case you're interested in will present that option to you.
found it thanks!.
Avatar
Hello, I’m new here
👋🏻 9
Avatar
I work at a digital forensic examiner but I've been working network forensics for several years and have lost a lot of that deadbox forensic knowledge. Anyone have any useful study resources I can use to catch myself back up to speed?
Avatar
Does anyone know of some good mobile forensic courses/certifications of advanced/expert level which are good to have?
Avatar
Avatar
obi95
Does anyone know of some good mobile forensic courses/certifications of advanced/expert level which are good to have?
SANS FOR585 looks good. Not done it but other SANS courses have been excellent
Avatar
Avatar
busted4n6
SANS FOR585 looks good. Not done it but other SANS courses have been excellent
I've done it and it's an excellent one !
Avatar
Avatar
obi95
Does anyone know of some good mobile forensic courses/certifications of advanced/expert level which are good to have?
+1 for FOR585 if you can afford it
Avatar
Hello, how does one get started in mobile forensic practice? During my degree this is something we never actually touched on besides some external lectures but no practice. Any help would be great
Avatar
Avatar
obi95
Does anyone know of some good mobile forensic courses/certifications of advanced/expert level which are good to have?
randomaccess 2/25/2024 5:16 PM
There's also the hexordia classes
Avatar
Avatar
Splashum
Hello, how does one get started in mobile forensic practice? During my degree this is something we never actually touched on besides some external lectures but no practice. Any help would be great
randomaccess 2/25/2024 5:17 PM
Lots of free resources. Dump your phone and parse it with the aleapp or ileapp toolkits
Avatar
hello folks at @Cellebrite can i get a some information about difference of UFED premium and premium ES? Recently my business has increased dramatically and I'm about to set up an ISO17025 lab, so I'd like to get some brief information before I do so.
📬 1
Avatar
Avatar
randomaccess
Lots of free resources. Dump your phone and parse it with the aleapp or ileapp toolkits
thanks
Avatar
@Magnet Forensics For some time now, time stamps in magnet Axiom have included hundredths of a second. Do you know how to hide them? Thanks
Avatar
Can anyone tell me how Griffeye flags an image as distributed?
Avatar
Avatar
jt264
Can anyone tell me how Griffeye flags an image as distributed?
Pretty sure it is pulled from your hash sets like ProjectVIC.
Avatar
Hello Everyone, Actually I m in internship of 6 month , among a team of 3 person, THE TOPIC OF MY INTERNSHIP IS 'IRDF', The manager ask for innovation in terms of 'Evidence preservation and also Incident Response ' And I would like your help which type of attack can we choose and the tools recommended to use.
Avatar
𝗖𝗮𝗶𝘁 | 𝗣𝗵𝗶𝗹𝗶𝗽𝗽𝗶𝗻𝗲𝘀 👮🏻 2/26/2024 5:43 PM
5:43 PM
While examining evidence using Magnet Axiom, no usernames were found. Can you help me understand why this might be? @Magnet Forensics
5:43 PM
@everyone
Avatar
Avatar
salwa
Hello Everyone, Actually I m in internship of 6 month , among a team of 3 person, THE TOPIC OF MY INTERNSHIP IS 'IRDF', The manager ask for innovation in terms of 'Evidence preservation and also Incident Response ' And I would like your help which type of attack can we choose and the tools recommended to use.
Sn(h)a(c)ker 2/27/2024 1:14 AM
Hello, What do you mean by IRDF? Regarding this, logs retentention and implementation of a SIEM which does correlation could be a thing (like Splunk log aggregation and Splunk Enterprise Security for the SIEM part) (edited)
1:16 AM
Another question would be, what's you affinity in IR field? 🙂
Avatar
Avatar
Sn(h)a(c)ker
Another question would be, what's you affinity in IR field? 🙂
Digital Forensics Incident Response
Avatar
Avatar
salwa
Digital Forensics Incident Response
Sn(h)a(c)ker 2/27/2024 3:59 AM
Oh, k, not used to see it in that order 😄
Avatar
Avatar
Sn(h)a(c)ker
Hello, What do you mean by IRDF? Regarding this, logs retentention and implementation of a SIEM which does correlation could be a thing (like Splunk log aggregation and Splunk Enterprise Security for the SIEM part) (edited)
So what can I do for example in DFIR PART ? WHICH IS THE MOST IMPORTANT PART IN MY INTERN
Avatar
Avatar
salwa
So what can I do for example in DFIR PART ? WHICH IS THE MOST IMPORTANT PART IN MY INTERN
Sn(h)a(c)ker provided an example on evidence preservation in IR and possibly paving a road to DF (analysis). Are you really sure what you're interning for?
Salute 1
Avatar
Avatar
jt264
Can anyone tell me how Griffeye flags an image as distributed?
From my understanding, the flags are based a known set of hashes, such as Project VIC. In those datasets, there are additional information for 'tags', 'distributed', 'identified', 'series' etc. If you open the JSON file with an editor, you should be able to see all the additional info under the associated hash ... After Griffeye compares the hashes from your case to the known set, it will bring those tags across. However, for the information under the 'tags' coloumn, you have to have those 'tags' installed into your griffeye system in order for them to appear correctly. Under the settings tab -> tags, and from what I remember, they have to be spelled exactly the same as the tags in order for it to match. If you require, I can send you a file for ProjeVIC tags. It might be a bit dated tho... (edited)
Avatar
Avatar
salwa
So what can I do for example in DFIR PART ? WHICH IS THE MOST IMPORTANT PART IN MY INTERN
Sn(h)a(c)ker 2/28/2024 1:51 AM
Do you have affinity with a specific domain already? (Network, Sec Engineering, SysAdmin, etc.?)
Avatar
bob the sexy builder 2/28/2024 4:13 AM
Not sure if this is a stupid question or not but ive been lurking for a short while just vibing as you do (ignore the name i made it years ago and cant be asked to change it) but can we message admins if we have a query and dont know what to do orrr do we request permission to do so?
4:19 AM
Or am i a silly sausage and just have no idea what to do
Avatar
Avatar
bob the sexy builder
Or am i a silly sausage and just have no idea what to do
Digitalferret 2/28/2024 5:31 AM
general forum rule: don't ask to ask. just bung it in #general-discussion-and-questions here and one of the gnarl... helpful mods will point you in right direction, if
Avatar
Avatar
Digitalferret
general forum rule: don't ask to ask. just bung it in #general-discussion-and-questions here and one of the gnarl... helpful mods will point you in right direction, if
bob the sexy builder 2/28/2024 5:31 AM
Ah thank u! That do be pretty groovy
Avatar
Digitalferret 2/28/2024 5:32 AM
groovy, lol. same age grp i fear, what with Bob too
Avatar
bob the sexy builder 2/28/2024 5:33 AM
Long story short. I got my dissertation which is taking up most of my life 😎 and part of it is i need police officers and forensic investigators who have either been on warrants or been effected by them to pop down how they be feelin bout em and theen if they wanna expand on it they can email me and ill try do a interview
Avatar
Avatar
Digitalferret
groovy, lol. same age grp i fear, what with Bob too
bob the sexy builder 2/28/2024 5:33 AM
Im 23 physically but like 80 soul 😭😭🤣
Avatar
Digitalferret 2/28/2024 5:34 AM
fair do, completely wrong end then. i'm kinda Wigan Casino age group
Avatar
Avatar
Digitalferret
fair do, completely wrong end then. i'm kinda Wigan Casino age group
bob the sexy builder 2/28/2024 5:35 AM
I just kinda vibe between all timelines, gotta keep it mysterious 😎
Avatar
Avatar
bob the sexy builder
Long story short. I got my dissertation which is taking up most of my life 😎 and part of it is i need police officers and forensic investigators who have either been on warrants or been effected by them to pop down how they be feelin bout em and theen if they wanna expand on it they can email me and ill try do a interview
Digitalferret 2/28/2024 5:36 AM
maybe stick a QnA form up online, make it easy bc cops have little enough time as it is, and ask in here, or echo in #training-education-employment
Avatar
Avatar
Digitalferret
maybe stick a QnA form up online, make it easy bc cops have little enough time as it is, and ask in here, or echo in #training-education-employment
bob the sexy builder 2/28/2024 5:37 AM
See id do a QnA but id have no time myself hence why i did a little survey with like- 8? Questions which are just the yes no kinda spiele
5:37 AM
So i can then make a lovely graph
5:37 AM
And be like
5:37 AM
Look! Its bad! Or look! Its bloody marvellous
Avatar
Avatar
bob the sexy builder
See id do a QnA but id have no time myself hence why i did a little survey with like- 8? Questions which are just the yes no kinda spiele
Digitalferret 2/28/2024 5:38 AM
"i have no time myself" <cough>
5:39 AM
even a quick bullet point list for folks to tick/cross. would be ok.
Avatar
Avatar
Digitalferret
even a quick bullet point list for folks to tick/cross. would be ok.
bob the sexy builder 2/28/2024 5:39 AM
Thats basically what its like
Avatar
Digitalferret 2/28/2024 5:39 AM
grand, swell, groovy. do it and post a link, be courteous, grateful ect
Avatar
bob the sexy builder 2/28/2024 5:40 AM
What my ult goal is have afew people gimme numbers and then if they wanna expand drop me a email and then i can choose how many interviews i do depending on how the rest of uni goes
5:40 AM
Very sneaky smarts
Avatar
Avatar
Digitalferret
grand, swell, groovy. do it and post a link, be courteous, grateful ect
bob the sexy builder 2/28/2024 5:40 AM
I will do sir! Just gotta finish the bugger. 🤣🤣
Avatar
Avatar
bob the sexy builder
What my ult goal is have afew people gimme numbers and then if they wanna expand drop me a email and then i can choose how many interviews i do depending on how the rest of uni goes
Digitalferret 2/28/2024 5:43 AM
just be mindful few be like "oh great I'm so happy to form fill for someone" if it looks anything like extra work, with a bonus it may bring more workif you like them 🙂 (edited)
Avatar
Avatar
Digitalferret
just be mindful few be like "oh great I'm so happy to form fill for someone" if it looks anything like extra work, with a bonus it may bring more workif you like them 🙂 (edited)
bob the sexy builder 2/28/2024 5:47 AM
Yeaa
5:47 AM
But a gamble
Avatar
Avatar
Digitalferret
just be mindful few be like "oh great I'm so happy to form fill for someone" if it looks anything like extra work, with a bonus it may bring more workif you like them 🙂 (edited)
bob the sexy builder 2/28/2024 6:56 AM
if theyre nearby me and want an interview, ill offer a free coffee bribary is fun
Avatar
Hi, I was wondering if anyone else has had a problem after updating their Tableau TX-1 to the latest firmware (23.4). After updating, the TX-1 won't load the operating system and sits at an endless loading screen. I have tried reformatting the SD Card several times. The update always works but the device won't boot up. It worked fine before the firmware update.
Avatar
I updated two just yesterday without any issues. Maybe try a different Sd card?
Avatar
Avatar
PhrostByte
Hi, I was wondering if anyone else has had a problem after updating their Tableau TX-1 to the latest firmware (23.4). After updating, the TX-1 won't load the operating system and sits at an endless loading screen. I have tried reformatting the SD Card several times. The update always works but the device won't boot up. It worked fine before the firmware update.
Updated TX1 to 23.4.0.6 in Nov. 2023. I didn’t experience any issues.
Avatar
should I buy a write blocker for a homelab project?
Avatar
Avatar
John
should I buy a write blocker for a homelab project?
facelessg00n 2/28/2024 8:13 PM
Depends how rich you are / why you need it. On the limited info provided I ’m going to say no. (edited)
Avatar
Avatar
facelessg00n
Depends how rich you are / why you need it. On the limited info provided I ’m going to say no. (edited)
want to get experience before my first forensics job
8:21 PM
I can get one for like $80
8:22 PM
Any use cases for a 15 year old forensic bridge after one project? 💀 (edited)
Avatar
Avatar
John
want to get experience before my first forensics job
facelessg00n 2/28/2024 8:24 PM
IMHO you would be better off knowing how they work. How hardware vs software blockers/ registry keys work and the pitfalls of both. Everywhere you work will have their own procedures around using and testing the devices. It’s better to know how they work than being able to press a button to turn a tableau on. As a starter try some of the reg key options and test it with something like this to see the differences. I.e usb flash vs usb HDD https://wiebetech.com/software/writeblocking-validation-utility/ (edited)
this 1
Avatar
Avatar
facelessg00n
IMHO you would be better off knowing how they work. How hardware vs software blockers/ registry keys work and the pitfalls of both. Everywhere you work will have their own procedures around using and testing the devices. It’s better to know how they work than being able to press a button to turn a tableau on. As a starter try some of the reg key options and test it with something like this to see the differences. I.e usb flash vs usb HDD https://wiebetech.com/software/writeblocking-validation-utility/ (edited)
Wouldnt using hardware look better on the resume
Avatar
Avatar
John
Wouldnt using hardware look better on the resume
facelessg00n 2/28/2024 8:28 PM
Not if you don’t know how it works. Be better off being able to explain how they work / why they are used / why you would use one over the other. Otherwise you are just showing you can plug something into a cable. (edited)
Avatar
thats what im trying to do tho, my resume shows I have the theoretical knowledge I just need the practical
8:30 PM
demonstrating it in a project of some sort
Avatar
Avatar
John
demonstrating it in a project of some sort
facelessg00n 2/28/2024 8:32 PM
Sounds like you really wanna buy it so just do that 😅
Avatar
I rather not spend money but if it can help me let me know
Avatar
Avatar
John
I rather not spend money but if it can help me let me know
facelessg00n 2/28/2024 8:59 PM
I don’t see a scenario where it would help as possessing the device is only going to show you can plug something into it. Everywhere I have worked has had different policies and procedures around them and interview questions have focussed on stuff like “what would you do if you couldn’t use a HW writeblocker in scenario x”
👍 1
Avatar
@Law Enforcement [UK] what desk mats/backgrounds do you use when taking photographs of mobile phone exhibits?
📬 1
Avatar
Nullable Truth 2/28/2024 10:20 PM
If it's available, one of those cutting mats which have marked measurement grids, otherwise just a plain black mouse pad
👍🏻 1
10:21 PM
The mats are nice with the anti slip rubber. Beats sticking blutack down to keep the phone framed in the cameras view while going through the menus
Avatar
Avatar
ApC
@Law Enforcement [UK] what desk mats/backgrounds do you use when taking photographs of mobile phone exhibits?
We created a laminated sheet with space for case/op name and exhibit ref to be written on with dry markers. Allows each photo to have this information in for future reference.
Avatar
Avatar
ApC
@Law Enforcement [UK] what desk mats/backgrounds do you use when taking photographs of mobile phone exhibits?
Have UKAS asked for desk mats to be used for your photography? We don't use anything and never have. (edited)
Avatar
Avatar
blake-ee
Have UKAS asked for desk mats to be used for your photography? We don't use anything and never have. (edited)
They asked us to get a professional photographer in and get some jaunty angles, must say, our pics look great, Tate Modern at the end of the year (edited)
😂 4
Avatar
Avatar
Zhaan
They asked us to get a professional photographer in and get some jaunty angles, must say, our pics look great, Tate Modern at the end of the year (edited)
At the risk of sounding a bit gullible, that was a joke right?!
Avatar
Avatar
blake-ee
At the risk of sounding a bit gullible, that was a joke right?!
Say 'Cheese!'
Avatar
Avatar
ApC
@Law Enforcement [UK] what desk mats/backgrounds do you use when taking photographs of mobile phone exhibits?
White A4 Laminated sheet that doesn't reflect the light but has space on it for case info etc. (edited)
Avatar
Avatar
Zhaan
They asked us to get a professional photographer in and get some jaunty angles, must say, our pics look great, Tate Modern at the end of the year (edited)
You joke but we’ve had an assessor ask us if the thermometer on the cheap clock on the wall in the lab had a calibration certificate…
😂 2
Avatar
Avatar
busted4n6
You joke but we’ve had an assessor ask us if the thermometer on the cheap clock on the wall in the lab had a calibration certificate…
I hope you got that sorted, bad man.
Avatar
Avatar
ApC
@Law Enforcement [UK] what desk mats/backgrounds do you use when taking photographs of mobile phone exhibits?
Our reprographics unit make signs for outdoor usage, parking spaces. These are basically printed stickers which attach to a white foam board (sort of like two plastic sheets with 5mm of foam in the middle). We got a big sheet of that stuff. It’s not matt but less reflective than laminated paper (edited)
👍🏻 1
Avatar
Avatar
Zhaan
I hope you got that sorted, bad man.
I believe the solution was to put it on the other side of the glass partition wall as the office next door wasn’t a lab 🙂
Avatar
We had an interesting chat about where the radio time signal was coming from on the clocks, no longer Greenwich but he wasnt having it!
12:33 AM
My mate Google saved the day!
Avatar
Indeed we’ve had similar. We removed clocks and use the windows time as this is ntp synced. Likewise we stopped using point and shoot cameras and use work issued mobiles
12:33 AM
At some point we’re gonna put up some ntp radio studio clocks
Avatar
Avatar
Rob
White A4 Laminated sheet that doesn't reflect the light but has space on it for case info etc. (edited)
Does the laminate gloss finish reflect light?
Avatar
Avatar
ApC
Does the laminate gloss finish reflect light?
No. Its some sort of special finish or something
1:56 AM
Doesn't reflect light and can be reused
Avatar
Avatar
blake-ee
Have UKAS asked for desk mats to be used for your photography? We don't use anything and never have. (edited)
Nope not UKAS this time, we’ve always used mats to make the photos look a bit more professional for court etc. Ours are starting to look a bit dirty so I thought it was time for a refresh
🤢 1
Avatar
Avatar
ApC
Nope not UKAS this time, we’ve always used mats to make the photos look a bit more professional for court etc. Ours are starting to look a bit dirty so I thought it was time for a refresh
Digitalferret 2/29/2024 3:16 AM
the 12yo in me would want to spit on it and grab a hankie in front of the inspecting operative, just because 🙂
😂 1
Avatar
Hey all, i have an interview for a data forensics technician coming up. The role seems more admin related as they aren't asking for forensic experience specifically. Any idea what this type of role involves and what questions to expect?
8:06 AM
It's labelled admin and more of a support team to the data forensics team. I'm not sure how this operates but figured it might be a good foot in the door
Avatar
Has anyone come across the file path Google.android.apps.photos/files/mars_files? Particularly what the mars_files relates to? Possibly multi-application-recovery-service but that’s a guess. Any suggestions welcome.
Avatar
Avatar
Splashum
Hey all, i have an interview for a data forensics technician coming up. The role seems more admin related as they aren't asking for forensic experience specifically. Any idea what this type of role involves and what questions to expect?
Digitalferret 2/29/2024 11:23 AM
ummmm....... I'm not fancying your chances if you've applied for a position but you are unclear about what it entails. Would you not be better reading it up, and then going back with a question like "i see <this>, could you clarify <that>... " ?
Avatar
Avatar
ApC
@Law Enforcement [UK] what desk mats/backgrounds do you use when taking photographs of mobile phone exhibits?
I believe it is actually more important to understand how reflections work and how to use lights/dark areas around to make readable photos
11:33 AM
this is more or less what they teach you when you learn about product photography
11:33 AM
and yes, pro will know these things and use them without thinking, but there is no magic, once you understand how it works you shoul be able to follow same ideas
Avatar
Avatar
Splashum
It's labelled admin and more of a support team to the data forensics team. I'm not sure how this operates but figured it might be a good foot in the door
Share the job posting or at least the qualification portion...people here will have a better idea of the true duties. Titles nowaday are borrowed and abused. (edited)
this 1
Avatar
Avatar
Splashum
Hey all, i have an interview for a data forensics technician coming up. The role seems more admin related as they aren't asking for forensic experience specifically. Any idea what this type of role involves and what questions to expect?
UK based or not? Happy to try and help 😊
Avatar
Avatar
Rob
UK based or not? Happy to try and help 😊
Yes! Will shoot a DM
Avatar
dongle_dude. 3/1/2024 11:52 AM
Asking for a colleague who reached out to me…. “What is the recommended setup/configuration for an isolated server for storage of case data?”
Avatar
DeeFIR 🇦🇺 3/1/2024 1:13 PM
It depends #lab-hardware and we can all chip in and run through some requirements? (edited)
💯 1
Avatar
Is there any software that can do the job of installing agent before handing out mobile phones to employees for possible future digital forensics needs?
8:41 AM
computers too
Avatar
Yeah, for mobile devices if your org uses a mdm like airwatch, intune etc you could build a profile that deploys it. With certain manufacturers like Apple you can also enroll the serial numbers so the device will be forced back into mdm control after a restore
❤️ 1
9:23 AM
You can also use the mdm to install other software your org uses, 8021x certs, enforce pin requirements and other security controls
Avatar
Avatar
rayeh
Yeah, for mobile devices if your org uses a mdm like airwatch, intune etc you could build a profile that deploys it. With certain manufacturers like Apple you can also enroll the serial numbers so the device will be forced back into mdm control after a restore
Wow, thanks for the information, I was looking for a more mature monitoring software or MDM that could be easily combined with DF services.
9:30 AM
So far, it looks like the E3 Forensic Platform can do this.🤔
Avatar
stalkernight83 3/2/2024 11:28 AM
Hi everyone does anyone in this group use Griffeye on a normal basis and would be willing to share a report template?
Avatar
Hey everyone, I am in search of software that can Real-Time detect data breaches or suspicious employee activities. I hope it can incorporate remote deployment of agents, enabling me to receive notifications promptly and carry out digital forensics collection tasks (such as extracting files or E01 Images). Does anyone know of any software that can meet these requirements? It would be great if it also comes with a dashboard ticket system for investigators to manage their cases. From what I've learned so far, Nuix Adaptive Security seems to fulfill these needs, but I'm eager to know if there are any better or more cost-effective options out there. Of course, it doesn't have to meet all the criteria exactly; getting to know different software options would also be a great choice! Thanks, everyone.
Avatar
Avatar
RX
Hey everyone, I am in search of software that can Real-Time detect data breaches or suspicious employee activities. I hope it can incorporate remote deployment of agents, enabling me to receive notifications promptly and carry out digital forensics collection tasks (such as extracting files or E01 Images). Does anyone know of any software that can meet these requirements? It would be great if it also comes with a dashboard ticket system for investigators to manage their cases. From what I've learned so far, Nuix Adaptive Security seems to fulfill these needs, but I'm eager to know if there are any better or more cost-effective options out there. Of course, it doesn't have to meet all the criteria exactly; getting to know different software options would also be a great choice! Thanks, everyone.
facelessg00n 3/2/2024 4:00 PM
If it’s insider threat detection have a look at DTEX systems. They have a nice platform. There is a lot of similar products on the market so try and get some demos from your local vendor to see what fits your needs.
Avatar
Avatar
stalkernight83
Hi everyone does anyone in this group use Griffeye on a normal basis and would be willing to share a report template?
If anyone else would like a copy of my custom report, or a few pointers on using Griffeye Analyze DI pro, please reach out to me
Avatar
Original message was deleted or could not be loaded.
Are you talking about the credentials for the PostgreSQL database? The default is postgres / AD@Password
Avatar
Avatar
facelessg00n
If it’s insider threat detection have a look at DTEX systems. They have a nice platform. There is a lot of similar products on the market so try and get some demos from your local vendor to see what fits your needs.
thanks your idea! i will look into it! Salute
Avatar
@Law Enforcement [UK] anybody here from Suffolk DFU?
Avatar
Avatar
RipeHype
@Law Enforcement [UK] anybody here from Suffolk DFU?
TooManyShots 3/6/2024 1:05 AM
Yes, what seems to be your boggle?
Avatar
Avatar
TooManyShots
Yes, what seems to be your boggle?
Just sent you a DM 😊
Avatar
Anyone using @Magnet Forensics AXIOM had any luck using it parse text from ebooks for ease of searching and review for officer review?
Avatar
Anyone can suggest a wiping utility that can take as input a txt file with file paths?
Avatar
Avatar
Luke79
Anyone can suggest a wiping utility that can take as input a txt file with file paths?
Digitalferret 3/6/2024 4:33 AM
Avatar
Avatar
Digitalferret
Click to see attachment 🖼️
Thanks but my request was wipe the file starting from a list in txt format…
Avatar
Avatar
Luke79
Thanks but my request was wipe the file starting from a list in txt format…
Securely overwrite your sensitive files and cleanse your free space of previously deleted files using this DoD-compliant secure delete program.
Avatar
you will need to create a .bat file with the file paths in it. I realize it's not a .txt file but it's better than finding all the files one by one.
Avatar
Original message was deleted or could not be loaded.
sounds like the MFT was wiped out then. what happens if you preview it with Encase/X-Ways?
1:15 PM
you may also be able to rebuild the filesystem with the $MFTMirr file. if not, data carving for files is probably your best bet.
Avatar
Original message was deleted or could not be loaded.
just connect the drive to a write-blocker when previewing it to prevent additional damage from happening.
Avatar
Avatar
Luke79
Thanks but my request was wipe the file starting from a list in txt format…
Digitalferret 3/6/2024 1:52 PM
my bad, i thought the text file was of file paths, not a text file at the end of a file path 🙂
Avatar
Avatar
Luke79
Thanks but my request was wipe the file starting from a list in txt format…
Digitalferret 3/6/2024 1:53 PM
might i ask why this specifically? never seen thgis requirement before
Avatar
Original message was deleted or could not be loaded.
facelessg00n 3/6/2024 2:06 PM
X-ways. Refine volume snapshot, thorough search for file records.
👍 2
Avatar
We just received Cellebrite Inseyets and I we can't get the turbo link working. We have followed both of the knowledgebase articles. @Cellebrite have you got any suggestions?
📬 1
Avatar
Avatar
JKM
We just received Cellebrite Inseyets and I we can't get the turbo link working. We have followed both of the knowledgebase articles. @Cellebrite have you got any suggestions?
Joe Schmoe 3/6/2024 2:50 PM
Not to be too simplistic , but is it connected to a network with internet access?
Avatar
Avatar
Joe Schmoe
Not to be too simplistic , but is it connected to a network with internet access?
There are different deployment types so network + internet isn’t required depending which version you have
Avatar
Avatar
Joe Schmoe
Not to be too simplistic , but is it connected to a network with internet access?
Yep it is
3:02 PM
I've got it trying to do a firmware update when I go back to the first screen but it just keeps looping
3:02 PM
Avatar
Avatar
JKM
I've got it trying to do a firmware update when I go back to the first screen but it just keeps looping
facelessg00n 3/6/2024 3:33 PM
I had this battle a few weeks ago. Make sure it’s on a fast internet connection, I used a 5G modem and standalone laptop and it seemed to update the second box faster. Then prepare to restart it about 20 - 30 times and it will eventually work….. I wish they would make the error messages more verbose. (edited)
👍 1
Avatar
It should be good as it is a 50mb connection. But I'm going to try the laptop just to try and get it up and running
Avatar
Avatar
JKM
It should be good as it is a 50mb connection. But I'm going to try the laptop just to try and get it up and running
facelessg00n 3/6/2024 3:36 PM
Yeah, I had 2 of them to do. I used the 5G modem on the second one and it seemed to need less reboots but that could have been just chance. Super annoying though. The process took 1-2 hours of reboots / unplug etc.
Avatar
Yeah we have 2 as well. Getting over it pretty quickly
💯 1
Avatar
Avatar
JKM
Yeah we have 2 as well. Getting over it pretty quickly
facelessg00n 3/6/2024 3:40 PM
@CLB-Paul / @CLB-Tal can we get the error messages on this update process to be more verbose?
Avatar
Avatar
facelessg00n
@CLB-Paul / @CLB-Tal can we get the error messages on this update process to be more verbose?
I plan to bring it up tomorrow. There’s a couple parts at play here.
Avatar
Avatar
CLB-Paul
I plan to bring it up tomorrow. There’s a couple parts at play here.
facelessg00n 3/6/2024 3:41 PM
Cheers. It has caused a bit of rage in the office.
Avatar
I totally get it.
Avatar
Avatar
facelessg00n
Cheers. It has caused a bit of rage in the office.
I'm ready to throw the damn thing
3:44 PM
Working fine on the laptop it appears
3:45 PM
Laptop is happy. Will see what happens when I plug it back into the desktop
Avatar
Morning, anyone here using Hansken? If yes, please send me a DM. I'd love to have a chat 🙂
Avatar
heatherDFIR 3/7/2024 2:37 PM
Not sure where this belongs, so placing it here. The first annual Cellebrite C2C User Summit is going to be in Washington, DC Aug 5-8th! Call for papers is open for another week or so and we are collecting nominations for awards. If you have issues with the CFP or awards, let me know. https://cellebrite.com/en/events/
Salute 1
Avatar
Anyone have some input regarding case management system? Do you use the same system as the organization or do you have a separate system for the security team? Pros and cons?
Avatar
do you have any good UI example of forensic timeline ?
6:30 AM
(something that is clear/intelligible and a e s t h e t i c ~) (edited)
Avatar
DFIR report does a superb job here’s is an example report https://thedfirreport.com/2024/02/26/seo-poisoning-to-domain-control-the-gootloader-saga-continues/ They use xmind for the timeline I believe
Key Takeaways More information about Gootloader can be found in the following reports: The DFIR Report, GootloaderSites, Mandiant, Red Canary, & Kroll. An audio version of this report can be … Read More
👍 1
Avatar
Avatar
isvak
Anyone have some input regarding case management system? Do you use the same system as the organization or do you have a separate system for the security team? Pros and cons?
I like Monolith case management https://www.monolithforensics.com/ but I can only compare it to the in-house case management system we used at my previous law enforcement position which wasn't the best. I find Monolith very user friendly and lots of options. Being a new user, the work flow made sense to me
Monolith is a cloud platform to help manage your digital forensics lab. Track and manage thousands of cases and evidence, review lab metrics, generate case reports, and streamline your intake process.
Avatar
Eznehlunatik 3/8/2024 12:16 PM
Hello everyone 🙂 I hope you are all doing well! I have a question: how is it possible to detect migration process and find the source binary of the malware ?
Avatar
Does anyone know the difference between XRY and Oxygen for mobile forensics? I work for a firm that currently uses Cellebrite only. I’m looking to purchase a second tool to verify our findings and run additional collections in case we encounter issues with Cellebrite. We’ve noticed several other firms/law enforcement use XRY or Oxygen so I wanted to know people’s experience with these tools. What was the reason for going with XRY vs Oxygen? (edited)
Avatar
Avatar
Yawndy
Does anyone know the difference between XRY and Oxygen for mobile forensics? I work for a firm that currently uses Cellebrite only. I’m looking to purchase a second tool to verify our findings and run additional collections in case we encounter issues with Cellebrite. We’ve noticed several other firms/law enforcement use XRY or Oxygen so I wanted to know people’s experience with these tools. What was the reason for going with XRY vs Oxygen? (edited)
Just request two trials and try for yourself?
Avatar
Avatar
florus
Just request two trials and try for yourself?
I actually did request for a trial license and I’m waiting for the vendors to respond. In the interim, I was curious to know other people’s experience.
Avatar
CasaJaguar 3/8/2024 1:37 PM
does anyone know where to locate EID’s in Physical Analyzer? (edited)
Avatar
stalkernight83 3/8/2024 2:55 PM
Has anyone used Intel ARC in their builds? If so how is work with tools and which tools are not supported?
Avatar
Avatar
stalkernight83
Has anyone used Intel ARC in their builds? If so how is work with tools and which tools are not supported?
It's fine for regular video display. Are you planning anything special?
Avatar
stalkernight83 3/8/2024 5:25 PM
Carving
Avatar
Avatar
daco1992
Anyone using @Magnet Forensics AXIOM had any luck using it parse text from ebooks for ease of searching and review for officer review?
Mainstream eBook formats are DRM protected. I am not aware any legit or open source way to bypass that.
Avatar
Avatar
stalkernight83
Carving
Carving files? Then drives with high IOPS is your target.
Avatar
Avatar
Yawndy
I actually did request for a trial license and I’m waiting for the vendors to respond. In the interim, I was curious to know other people’s experience.
Well each one has it pros and cons. Oxy is all in one tool, where xry splits it into als normal and pro version. Besides that oxy also offers cloud, also in the same package. Other side, xry does a very good job on feature phones. So it depends what you need exactly.
👍 1
Avatar
Avatar
chauan
Mainstream eBook formats are DRM protected. I am not aware any legit or open source way to bypass that.
The bulk of the files shows as embedded HTML files post carving in X-Ways. I’ve also been able to convert every format I’ve tried from my own collection to PDF and extract text that way, it’s just a pain as a bulk process.
Avatar
Avatar
florus
Well each one has it pros and cons. Oxy is all in one tool, where xry splits it into als normal and pro version. Besides that oxy also offers cloud, also in the same package. Other side, xry does a very good job on feature phones. So it depends what you need exactly.
In your experience, does XRY Pro do a good job at unlocking feature phones that are unsupported by other tools?
this 1
Avatar
Avatar
FullTang
In your experience, does XRY Pro do a good job at unlocking feature phones that are unsupported by other tools?
No idea 😂
Avatar
NotIronManBTW 3/8/2024 10:43 PM
In need of some general advice. I’m semi fresh into my career and am feeling a bit stuck in ediscovery. I feel like I’m not learning a whole ton. I’m on a team that has forensics and ediscovery I mostly run out ediscovery cases our forensics team does deadbox and another team has more of the triage stuff. I don’t wanna get caught here as I want to do something more technical. Not sure how to approach my boss about this.
Avatar
Avatar
NotIronManBTW
In need of some general advice. I’m semi fresh into my career and am feeling a bit stuck in ediscovery. I feel like I’m not learning a whole ton. I’m on a team that has forensics and ediscovery I mostly run out ediscovery cases our forensics team does deadbox and another team has more of the triage stuff. I don’t wanna get caught here as I want to do something more technical. Not sure how to approach my boss about this.
Define your "technical" first. There are many specific topics that you can learn on your own first. I would suggest you take begin some self-learning then present it to your boss on opportunities.
Avatar
Avatar
daco1992
The bulk of the files shows as embedded HTML files post carving in X-Ways. I’ve also been able to convert every format I’ve tried from my own collection to PDF and extract text that way, it’s just a pain as a bulk process.
The converting part is probably the key. Calibre, for one example supports batch conversion and may work for you. You still need to do the export then import though.
Avatar
Avatar
chauan
The converting part is probably the key. Calibre, for one example supports batch conversion and may work for you. You still need to do the export then import though.
Yeah, certainly not the end of the world to do. Thanks for your thoughts.
👍 1
Avatar
Avatar
chauan
Define your "technical" first. There are many specific topics that you can learn on your own first. I would suggest you take begin some self-learning then present it to your boss on opportunities.
NotIronManBTW 3/9/2024 11:55 AM
I’m about to take GCIH. About 1 month left of study for that
11:56 AM
I do a lot of self studying outside of that. Idk I guess I just feel like I’m doing data entry basically. Doesn’t feel I’m leaning a whole ton in ediscovery at the moment but I know it can grow into bigger things
11:56 AM
Besides that I have a degree in computer science sci and cyber security. And security +
11:57 AM
I am at a massive corporation though so lots of room for growth
11:59 AM
I just have buddies who work in SOCs and stuff like that so sometimes feel I’m losing out on key foundation by not starting in a SOC
Avatar
Avatar
NotIronManBTW
I just have buddies who work in SOCs and stuff like that so sometimes feel I’m losing out on key foundation by not starting in a SOC
if you like responding to out of hours of incidents then go for it. it's fun work.
Avatar
NotIronManBTW 3/9/2024 3:59 PM
It would be normal shift work for me. We have a 24/7 SOC in different regions so we turnover
3:59 PM
But still seems like I’d get a really good foundation from it
Avatar
Avatar
NotIronManBTW
I do a lot of self studying outside of that. Idk I guess I just feel like I’m doing data entry basically. Doesn’t feel I’m leaning a whole ton in ediscovery at the moment but I know it can grow into bigger things
You can learn a lot about litigation and legal process in eDisco but yes, not too technical in some aspects. You may pay more attention to the business side of things, maintain learning on tehcnical stuff, and wait for transfer oportunity.
Avatar
Original message was deleted or could not be loaded.
purpose of life
11:08 AM
other than that, Bitlocker recovery key is difficult (edited)
Avatar
Avatar
chauan
You can learn a lot about litigation and legal process in eDisco but yes, not too technical in some aspects. You may pay more attention to the business side of things, maintain learning on tehcnical stuff, and wait for transfer oportunity.
NotIronManBTW 3/10/2024 1:41 PM
that makes sense. Do you think that legal process knowledge can transfer at all or is gonna be looked at as useful when I move technical?
Avatar
Original message was deleted or could not be loaded.
Brute force attack is what you may want to learn and look into its pros and cons.
Avatar
Avatar
NotIronManBTW
that makes sense. Do you think that legal process knowledge can transfer at all or is gonna be looked at as useful when I move technical?
Don't limit yourself just to be the technical guy. You still need to talk to management about what you do...knowing more always helps
Avatar
Are there any French legal experts here? I work for a forensic accountancy firm with a DFIR division and we're banging our heads against the wall to try and understand what the restrictions are regarding the use of digital forensic tools in France. We've been told by Cellebrite that we're prohibited from using UFED in France and Magnet have told us the same re: Verakey because of the ANSSI regulations, however we cant find any formal text whatsoever. Given Cellebrite/Magnet have told us there are restrictions, are we correct in assuming that this extends to all forensic applciations (FTK, Encase, X-Ways, Axiom etc.) or is it just for mobile extraction tools? Any guidance would be greatly appreciated!
Avatar
Avatar
FUTCoins23
Are there any French legal experts here? I work for a forensic accountancy firm with a DFIR division and we're banging our heads against the wall to try and understand what the restrictions are regarding the use of digital forensic tools in France. We've been told by Cellebrite that we're prohibited from using UFED in France and Magnet have told us the same re: Verakey because of the ANSSI regulations, however we cant find any formal text whatsoever. Given Cellebrite/Magnet have told us there are restrictions, are we correct in assuming that this extends to all forensic applciations (FTK, Encase, X-Ways, Axiom etc.) or is it just for mobile extraction tools? Any guidance would be greatly appreciated!
Maybe someone from @Law Enforcement [France] or @Government [France] would know? I’m curious to know now that you mentioned it.
Avatar
Avatar
FullTang
Maybe someone from @Law Enforcement [France] or @Government [France] would know? I’m curious to know now that you mentioned it.
Digitalferret 3/11/2024 4:38 AM
yeh, possibly @Mistercatapulte too, apologies for ping if not
Avatar
Avatar
FUTCoins23
Are there any French legal experts here? I work for a forensic accountancy firm with a DFIR division and we're banging our heads against the wall to try and understand what the restrictions are regarding the use of digital forensic tools in France. We've been told by Cellebrite that we're prohibited from using UFED in France and Magnet have told us the same re: Verakey because of the ANSSI regulations, however we cant find any formal text whatsoever. Given Cellebrite/Magnet have told us there are restrictions, are we correct in assuming that this extends to all forensic applciations (FTK, Encase, X-Ways, Axiom etc.) or is it just for mobile extraction tools? Any guidance would be greatly appreciated!
Ross Donnelly 3/11/2024 5:45 AM
With no actual knowledge of this - I'd assume it is focussed on their encryption bypass functions, so would apply to any tools with that type of functionality. Found this online: https://www.at-ica.com/encryption-in-france/ "Under French law (art.29 of law 2004-575 of 21 June 2004 – Law regarding Confidence in the Digital Economy (LCEN)), the means of cryptology are defined as “any hardware or software designed or modified to transform data, whether it is information or signals, using secret conventions or to perform the opposite operation with or without a secret convention. These cryptological means are primarily intended to ensure the security of storage or data transmission, allowing to ensure their confidentiality, authentication or control of their integrity. " The means of cryptology are subject to a specific control by French authorities, which require that such means of encryption should be declared or authorized before they are subject to intra-community transfers, import or export from or to France."
Preventing unauthorized access to information or data can be a matter of life or death, and certainly when it goes about our most vital infrastructure like the communications network, the power grid and the health systems. Encryption is essential to security. However, while encryption is used by most ICT users everyday, the legal framework for t...
Avatar
Mistercatapulte 3/11/2024 6:00 AM
@FUTCoins23 how can i help? ping me in private if u want
Avatar
How is it possible for a victim to complain that all her WhatsApp, Telegram, Botim messages, call history, and other phone activities are accessible to the accused when the accused never had physical access to the phone?
Avatar
Could be any number of things. Sometimes people are paranoid and try to argue that another party knew their password[s] as 'being accessible', or maybe they found the device was jailbroken or had some kind of monitoring app... but they would still have to establish that those things were accessed in court. Need to clarify with them.
Avatar
Yes, I was thinking the same. But is there any possibility, technically, that this could happen? Can spyware be used to monitor the entire functioning of a phone, even installed without physical access?
7:34 AM
Not very likely unless they are a nation-state backed threat actor and a high value target, but theoretically... sure. (edited)
Avatar
Nothing like that. The accused has no such technical background. They could only accomplish this if there were a monitoring app that could be easily downloaded.
Avatar
Is anyone aware of any software outside of Digital Collector used to forensically image a Macbook?
Avatar
Avatar
NotIronManBTW
It would be normal shift work for me. We have a 24/7 SOC in different regions so we turnover
Fr, it is. Depends what you domain in SOC you want go into but SOC can get borig, I really enjoy nichey threat investigation digging into things and see how criminals operators are behaving, or understanding their website infrastructure, do they have website, look at WHOIS records and DNS A records, is it point to telegram group ? Cool time for some OSINT, do they develop malicious apps, cool let's reverse engineer them using. dex2jar, jadx ,frida, httptoolkit or MITMproxy and find out its API or it's C&C server, any dark web links ? goosebumps. (edited)
Avatar
Avatar
secluding
Is anyone aware of any software outside of Digital Collector used to forensically image a Macbook?
I havent used it, but Sumuri Recon ITR.
Avatar
Hi guys, how are you? First, let me say I'm a newbie in Cyber Security. I experienced a cyberattack on my computer, and the Avast Firewall detected and alerted me. I intend to report the incident to the police for investigation, and I need a log file containing details of this attack, with the metadata. The hard drive's Windows boot trail was corrupted a few days after the attack, leaving me only able to access the folders and files as an external USB drive, but they are intact. I need help in locating the correct folder and files. I possess 2 screenshots displaying the Avast warning message, which occurred on January 4, 2024. Can anyone help me with this? This attack occurred at my ex-wife's family beach home, and her brother works in IT, that's why I am convinced it was not a false flag. Besides, my computer was connected for about 3 weeks at the same wi-fi and I didn't get any false positives or any kind of attack warning. Her brother manages the residential network. He wasn't home before the attack, and when he came to pick her daughter up the attack popped up on my screen. Too much coincidence. I am not worried about what he can have intercepted or stolen from my computer. The point is to get evidence on my computer to prove the attack.
7:20 PM
Avatar
Avatar
hfactor
How is it possible for a victim to complain that all her WhatsApp, Telegram, Botim messages, call history, and other phone activities are accessible to the accused when the accused never had physical access to the phone?
I know you can link the WhatsApp and signal accounts to a PC if you had access to the phone briefly. Perhaps this can help explain your scenario?
Avatar
someone from Mgnet here? got some Question regarding Axiom Trial im testing right now with an AFF4 decrypted MacBook Pro (t2) image not showing any files @Magnet Forensics
Avatar
not entirely sure if this is the best channel to ask about security, but is veracrypt still a reliable way to store files securely? I am considering backing up a container and placing it on google drive for long term storage
Avatar
When you execute the following command: Cmd.exe /Q /c dir 1> \\127.0.0.1\c$_testfile.txt 2>&1 Only the "cmd exe /Q /c dir" part of the command shows up in process creation telemetry (both 4688 and Sysmon). Does anyone know why this is the case and the full command isn't recorded? (edited)
Avatar
Does anybody have a creative way to silence an iPhone that has several alarms set and an unknown passcode on it. We have one waiting to be processed and its driving us nuts to go back and forth silencing it. I've tried tape over speakers etc but its still loud and annoying. Thanks
🧱 2
😂 1
Avatar
Avatar
DCSO
Does anybody have a creative way to silence an iPhone that has several alarms set and an unknown passcode on it. We have one waiting to be processed and its driving us nuts to go back and forth silencing it. I've tried tape over speakers etc but its still loud and annoying. Thanks
Digitalferret 3/12/2024 11:24 AM
but if you want to keep it intact, maybe go local high school and ask for one of those bell jars you can create a vacuum with
11:25 AM
given sound needs air to propagate
Avatar
Avatar
Digitalferret
given sound needs air to propagate
I like the creative idea, this device needs to be plugged in at all times (USB-Lighting)
Avatar
Avatar
DCSO
I like the creative idea, this device needs to be plugged in at all times (USB-Lighting)
Digitalferret 3/12/2024 12:08 PM
yeh, needs some hardware geek to maybe make up a clear but sealable box, with sealed powercable into it, and a means to evacuate it. Do you need physical access to the screen much or are you just storing it until <something>?
12:10 PM
or maybe something like
Avatar
Avatar
Digitalferret
or maybe something like
Storing it until *
👍🏻 1
Avatar
Digitalferret 3/12/2024 12:17 PM
i tried checking Vacuum, guess what came back, lol. i think the term is "vacuum chambers" I'm sure there'll be one with cable access
Avatar
Hello, does anyone know of a free camera program for Windows that directly adds the time stamps visibly at the photo? I haven't found a satisfactory one yet (edited)
Avatar
Avatar
Digitalferret
i tried checking Vacuum, guess what came back, lol. i think the term is "vacuum chambers" I'm sure there'll be one with cable access
Pulling a vacuum on a smartphone would probably damage it in some way. The battery could fail from the pressure difference or the device can't cool itself the way it was intended. I've never actually tried it though.
Avatar
Avatar
Crail
Pulling a vacuum on a smartphone would probably damage it in some way. The battery could fail from the pressure difference or the device can't cool itself the way it was intended. I've never actually tried it though.
Digitalferret 3/12/2024 1:24 PM
only needs to lower the air pressure a little, not like off world thing
1:25 PM
there'll be some chart relating sound reduction to pressure drop i guess, but yeh valid point, if
Avatar
Avatar
pi0
not entirely sure if this is the best channel to ask about security, but is veracrypt still a reliable way to store files securely? I am considering backing up a container and placing it on google drive for long term storage
spicy_caveman 3/12/2024 1:38 PM
I use it still, it is decent but tedious.
Avatar
Avatar
spicy_caveman
I use it still, it is decent but tedious.
ah great!
Avatar
How about building a sound dampening box? I have a gun/phone safe that has really thick padding and able to muffle the sound down to an acceptable level.....
👍 1
Avatar
Avatar
DCSO
Does anybody have a creative way to silence an iPhone that has several alarms set and an unknown passcode on it. We have one waiting to be processed and its driving us nuts to go back and forth silencing it. I've tried tape over speakers etc but its still loud and annoying. Thanks
Deleted User 3/12/2024 4:32 PM
this is the ultimate opsec hacker man tool
4:32 PM
just set 99999 alarams
Avatar
Avatar
DCSO
Does anybody have a creative way to silence an iPhone that has several alarms set and an unknown passcode on it. We have one waiting to be processed and its driving us nuts to go back and forth silencing it. I've tried tape over speakers etc but its still loud and annoying. Thanks
Digitalferret 3/12/2024 5:31 PM
ummm, might be a left field alternative, but would a pair of Lightning connector ear pods do the job? ie take any/all sounds exclusively.
5:31 PM
<$15 and Bob's your aunty
Avatar
Avatar
rfar
I know you can link the WhatsApp and signal accounts to a PC if you had access to the phone briefly. Perhaps this can help explain your scenario?
I thought the same. but they are sure that they didn't have any linked devices.
Avatar
Small drill bit, hole through speaker. Alarm silenced forever
🤣 2
Avatar
Avatar
ryd3v
Small drill bit, hole through speaker. Alarm silenced forever
Digitalferret 3/13/2024 2:30 AM
hehe, digital trepanning 🙂
2:30 AM
you need that like a hole in the head ....
😂 1
Avatar
bob the sexy builder 3/13/2024 2:52 AM
hey guys, i know i dont speak often in here and this do be abit cheeky but i asked awhile back if forensic investigators and officers who have been on a search warrant wouldnt mind filling in a survey but i hadnt sent it in here yet as i was trying to finalise it first. I have done so now and i was wondering if anyone would fill it in for me! (It is anonymous but you do have to create a 6 char pin) its for my dissertation. If you could also share it that be brilliant!! this is the link:https://forms.office.com/r/axLFjmV7Bu
👍 1
Avatar
Avatar
secluding
Is anyone aware of any software outside of Digital Collector used to forensically image a Macbook?
ReconITR
👍 1
Avatar
cupofteaandabiscuit 3/13/2024 6:30 AM
Anyone at @Cellebrite available for a quick question about premium?
📬 1
Avatar
Avatar
Digitalferret
ummm, might be a left field alternative, but would a pair of Lightning connector ear pods do the job? ie take any/all sounds exclusively.
I like this idea ! I wonder if it will override the headphones and use the speaker for alarms ? I'll have to test this.
Avatar
Avatar
DCSO
I like this idea ! I wonder if it will override the headphones and use the speaker for alarms ? I'll have to test this.
Digitalferret 3/13/2024 7:54 AM
for less than 15 bucks on Amazon, likely worth a go 🙂 glad its of use
7:54 AM
& do let us know
Avatar
Avatar
DCSO
Does anybody have a creative way to silence an iPhone that has several alarms set and an unknown passcode on it. We have one waiting to be processed and its driving us nuts to go back and forth silencing it. I've tried tape over speakers etc but its still loud and annoying. Thanks
You should be able to access the alarm settings from a locked device where you can disable the alarms(unless it's changed on iOS 17, pretty sure we've done it on iOS 16 devices). We document when we do it, sure the ultra conservative approach would be to not do that, but then again I'm sure they'd also side to silencing an alarm going off as manipulating the device. (edited)
Avatar
Avatar
Solec
You should be able to access the alarm settings from a locked device where you can disable the alarms(unless it's changed on iOS 17, pretty sure we've done it on iOS 16 devices). We document when we do it, sure the ultra conservative approach would be to not do that, but then again I'm sure they'd also side to silencing an alarm going off as manipulating the device. (edited)
AFAIK, if the alarms can be accessed or not while the phone is locked is based on user settings, just like the ability to access Airplane Mode via the control center while the iPhone is locked.
Avatar
Avatar
FullTang
AFAIK, if the alarms can be accessed or not while the phone is locked is based on user settings, just like the ability to access Airplane Mode via the control center while the iPhone is locked.
Yeah that's a fair point (edited)
Avatar
Avatar
FullTang
AFAIK, if the alarms can be accessed or not while the phone is locked is based on user settings, just like the ability to access Airplane Mode via the control center while the iPhone is locked.
Deleted User 3/13/2024 1:20 PM
that's why people use the lockdown mode
Avatar
Would I be ok sharing a link here to a digital forensics practitioner survey we're conducting between University College Dublin/University of Lausanne/University of Oxford/University of Nottingham? (edited)
👍🏻 1
Avatar
Avatar
mrkscn
Would I be ok sharing a link here to a digital forensics practitioner survey we're conducting between University College Dublin/University of Lausanne/University of Oxford/University of Nottingham? (edited)
Digitalferret 3/14/2024 2:38 AM
sure, it's all good. let me know if there's an issue, sometimes the bot doesn't like certain weblinks or anything that looks 'spammy'
Avatar
Great thanks
2:41 AM
We’re running an anonymous Digital Forensics Practitioner Survey to improve DF academic research. Please help to shape the community’s efforts to better assist you in your investigations. If you feel its beneficial, please share the link with colleagues. Survey link: https://bit.ly/dfpulse
Avatar
Anyone from @Cellebrite able to help?
Avatar
Evening all, just a quick one. I need to install the Microsoft security updates on non-networked machines prior to our UKAS assessment. Is there a complete security update which will include all previous security updates or do I need to install them one at a time?
Avatar
@MSAB Have you guys taken down your MSAB monday video about disabling the 'Wasted' app with XRY PRO?
Avatar
Avatar
sky
@MSAB Have you guys taken down your MSAB monday video about disabling the 'Wasted' app with XRY PRO?
Hello. That's correct, due to the sensitivity surrounding this app we moved the video to the Customer Portal. It's generally not a good idea to educate the public what our capabilities are at any given point in time for obvious reasons. So you can still access it if you are an MSAB customer.
Avatar
Avatar
MSAB_Ash
Hello. That's correct, due to the sensitivity surrounding this app we moved the video to the Customer Portal. It's generally not a good idea to educate the public what our capabilities are at any given point in time for obvious reasons. So you can still access it if you are an MSAB customer.
Thats fair - I'm currently reading a grapheneOS forum post about it in the meanwhile 🙂 - https://discuss.grapheneos.org/d/10023-exploit-of-device-after-first-unlock-to-obtain-data-that-isnt-at-rest/5
8:27 AM
I'll go find it on the portal
Avatar
Hello everyone. I'm seeking help to determine if I've experienced a cyber attack, which seems to have occurred, and if it indeed happened, how I can gather evidence on my computer to take the case to the police. If anyone can assist, I have all the details of the incident to explain more thoroughly.
Avatar
Avatar
MSAB_Ash
Hello. That's correct, due to the sensitivity surrounding this app we moved the video to the Customer Portal. It's generally not a good idea to educate the public what our capabilities are at any given point in time for obvious reasons. So you can still access it if you are an MSAB customer.
Any idea what the title is - or can you DM a link? Not seeing it in the video guides section
Avatar
@sky - It is in the Forum at the moment, the video section on the portal is currently going through some changes to make it better 👍🏻
👍 1
Avatar
Avatar
MSAB_Adam
@sky - It is in the Forum at the moment, the video section on the portal is currently going through some changes to make it better 👍🏻
private video - shall I dm you on forum for access
👍🏻 1
Avatar
Hello . Is the book "SQLite Forensics" by Paul Sanderson available in India.Thanks
Avatar
It is widely available on Amazon @hfactor 👍🏻
👍 1
Avatar
I can see the book in Amazon. But no shipping. I have tried different cities. No luck. is there any Ebook purchase option ?
Avatar
May just be a stock issue, unsure on ebook options unfortunately.
👍 1
Avatar
Avatar
obi95
Evening all, just a quick one. I need to install the Microsoft security updates on non-networked machines prior to our UKAS assessment. Is there a complete security update which will include all previous security updates or do I need to install them one at a time?
Ross Donnelly 3/14/2024 11:59 AM
Windows Updates (at least for the core OS) are cumulative, so if you install the latest that includes all previous fixes. You could also look into something like this to make it easier https://www.wsusoffline.net/
Avatar
NotIronManBTW 3/14/2024 12:22 PM
Recently ran into more free time than I’d like to have at work. I’m talking GCIH starting May 1st. Anything I can brush up on before hand for general knowledge?
12:22 PM
I realize sans has everything in the books but didn’t know if there are some good spots I can get into
Avatar
Avatar
Daniel K.
Hello everyone. I'm seeking help to determine if I've experienced a cyber attack, which seems to have occurred, and if it indeed happened, how I can gather evidence on my computer to take the case to the police. If anyone can assist, I have all the details of the incident to explain more thoroughly.
Did you reach out to Greg? You don’t have to keep reposting. https://discord.com/channels/427876741990711298/427936091220344833/1217148096610435122
👍🏻 1
Avatar
Anyone have experience using scp (or similar) to copy files to a Palera1n JB’d iPhone?
Avatar
Currently looking through a Facebook dump for the first time. There is an html file called "secret message" when looking at it, it just says "secret message sent: yes." It gives the device info that the message has been sent from. Does this mean that I need to get the device it was sent from to get the secret messages?
Avatar
Cyb3rScr33ch 3/15/2024 9:13 AM
Good afternoon all, I am currently carrying out my BSc Digital Forensics dissertation project "An Investigation Into Retrievable PII Data from Modern Connected Vehicles", and I'm seeing some amazing results so far! As part of my project, I would like to get an overall understanding of the public and industry knowledge & awareness of the current UK Laws and Regulations shaping the automotive cyber security and digital forensics landscape, the level of industry awareness and knowledge of tools, techniques, methods and research, specifically vehicle forensics, as well as the general understanding of data collection, storage, transmission and usage from the UK public. Could I therefore ask all of the amazing people of LinkedIn to please take 5-10 minutes and help me with my research by completing the attached survey. All responses are entirely anonymous and the responses will be used towards my final dissertation submission. https://forms.office.com/e/ysNx8VmzAb Many thanks in advance.
Avatar
Avatar
Killer3p0
Currently looking through a Facebook dump for the first time. There is an html file called "secret message" when looking at it, it just says "secret message sent: yes." It gives the device info that the message has been sent from. Does this mean that I need to get the device it was sent from to get the secret messages?
Sounds like the "secret message" was sent via end-to-end encryption. If that is the case, you would need one of the end devices to get the messages.
Avatar
Avatar
FullTang
Sounds like the "secret message" was sent via end-to-end encryption. If that is the case, you would need one of the end devices to get the messages.
Thanks for the answer. I did find a white paper from meta explaining how their secret messages work
Avatar
AARC TASK FORCE 3/15/2024 12:25 PM
Can anyone help with Axiom tagging? I have thousands of tagged items based on keywords but almost all of them are in duplicate/triplicate…etc. The only thing different is the “item ID”. Db is the same, table is the same, time is the same…etc. is there a way for me to filter out the extra tags without going through 5k of them individually?
Avatar
Avatar
Daniel K.
Hello everyone. I'm seeking help to determine if I've experienced a cyber attack, which seems to have occurred, and if it indeed happened, how I can gather evidence on my computer to take the case to the police. If anyone can assist, I have all the details of the incident to explain more thoroughly.
Hello, are any files on your device inaccessible? Any strange characters noted for the file extensions? Is there a random note anywhere on your machine?
Avatar
Avatar
AARC TASK FORCE
Can anyone help with Axiom tagging? I have thousands of tagged items based on keywords but almost all of them are in duplicate/triplicate…etc. The only thing different is the “item ID”. Db is the same, table is the same, time is the same…etc. is there a way for me to filter out the extra tags without going through 5k of them individually?
Digitalferret 3/15/2024 3:21 PM
first, did you poke Magnet via support? sec. I don't use Axiom but see similar with some data recovery jobs. Might be that the pull brought our deleted files, but all are essentially same as original? there's usually a recovered original file and anywhere up to say seven or eight extra files with a numerical suffix. essentially same file but the latter have been recovered as deleted files. Not sure if you can filter the files directly, I'll search and delete any/all with the _01 _02 ++ suffix, but i don't have any forensic considerations to make whilst doing. (edited)
Avatar
Evening all, Does there exist a solution like Officer to Examiner remote connection for a mobile device download? i'm aware of the issues with this but given urgent jobs I was curious if its been tested but I can't find a specific version of it if so
Avatar
Hi guys, anyone with good resources on email Forensics
Avatar
Avatar
TetsuoAR
Evening all, Does there exist a solution like Officer to Examiner remote connection for a mobile device download? i'm aware of the issues with this but given urgent jobs I was curious if its been tested but I can't find a specific version of it if so
I'm not aware of any mobile forensic tool that support remote collection. The feature exists on the MDM side but requires a lot more work to prep/get the device enrolled first.
Avatar
Avatar
chauan
I'm not aware of any mobile forensic tool that support remote collection. The feature exists on the MDM side but requires a lot more work to prep/get the device enrolled first.
Thank you, I was just curious of the capabilities of this sort of thing, given conditions and paperwork etc
Avatar
Avatar
TetsuoAR
Thank you, I was just curious of the capabilities of this sort of thing, given conditions and paperwork etc
It is possible but don't we want to airgap the device if possible? Doing remote collection kinda go against that idea.
Avatar
Avatar
chauan
It is possible but don't we want to airgap the device if possible? Doing remote collection kinda go against that idea.
Faraday box with remote viewing via external camera? If manual capture or mirroring of device screen from inside?
Avatar
Oh wait...I thought you mean remote extraction. Remote viewing should be easy. Share a USB camera or document viewer to whoever should do the job.
Avatar
Avatar
CyberCroc
Hi guys, anyone with good resources on email Forensics
Digitalferret 3/17/2024 7:14 AM
anything particular, and what sort of budget?
7:15 AM
not that I have a direct answer, but it may encourage others if you can narrow it down a bit, ie software / education / $$ etc
Avatar
We were "gifted" a number of FREDs for our new forensics lab. We were not gifted a boot disc for the FREDs and they don't seem to work with standard Windows 10/11 ISOs. Where would I look/who do I talk to to get FRED boot discs?
Avatar
Avatar
silvance.
We were "gifted" a number of FREDs for our new forensics lab. We were not gifted a boot disc for the FREDs and they don't seem to work with standard Windows 10/11 ISOs. Where would I look/who do I talk to to get FRED boot discs?
Any brand/model and what happened when you tried the ISOs? It may simply be the ISOs are made for UEFI but the FREDs are set to Legacy (or vice versa).
Avatar
Avatar
chauan
Any brand/model and what happened when you tried the ISOs? It may simply be the ISOs are made for UEFI but the FREDs are set to Legacy (or vice versa).
They're Digital Intelligence FREDs. When I used an ISO for Win10 it simply didn't recognize it as a bootable drive. I tried creating a base OS with the tools I needed on my home computer and it won't recognize that drive either.
7:58 AM
The FREDs are from 2017ish
7:59 AM
FRED DX is what they're listed as on my hand receipt
7:59 AM
FJ1054
Avatar
Check the BIOS and see if it's set to Legacy or UEFI boot. You can then use rufus (or similar) to create an equal boot drive.
8:00 AM
That'll be the first step I would go troubleshooting.
Avatar
I'll check that tomorrow then when I'm back at work. Hopefully that's all it is
👍 1
Avatar
Dr. Kaan Gündüz 3/17/2024 11:41 AM
You can try rufus, balena etcher or ventoy to create a usb drive
Avatar
Avatar
Dr. Kaan Gündüz
You can try rufus, balena etcher or ventoy to create a usb drive
I've tried. It doesn't boot from traditional Win10 or Win11 boot drives created via Rufus. (edited)
Avatar
Dr. Kaan Gündüz 3/17/2024 1:36 PM
Does it support legacy boot in bios?
1:36 PM
Perhaps you should disable fast boot/secure boot as well
1:37 PM
Press all the function keys in the process 😄
Avatar
Avatar
Digitalferret
anything particular, and what sort of budget?
Educational material and the tools to make the job easy. Free resources
Avatar
Avatar
CyberCroc
Educational material and the tools to make the job easy. Free resources
Digitalferret 3/18/2024 1:53 AM
youtube 13cubed email forensic & grab a demo version of Sublime and appropriate plugin.
Avatar
Thank you
Avatar
I am taking a DFIR course at WGU and I have to write a forensic analysis report. Are there any good reporting tools or templates that anyone can recommend?
Avatar
So in a Facebook data dump, the file "secret_messages.html" says secret messages were sent from an iPhone 16. However, there is not an iPhone 16, any explanation why it says a 16?
Avatar
Avatar
Killer3p0
So in a Facebook data dump, the file "secret_messages.html" says secret messages were sent from an iPhone 16. However, there is not an iPhone 16, any explanation why it says a 16?
List of Apple's mobile device codes types a.k.a. machine ids (e.g. iPhone1,1, Watch1,1, etc.) and their matching product names - Apple_mobile_device_types.txt
🧡 1
Avatar
This explains it, thanks!
👍 1
Avatar
blackleitus 3/18/2024 2:17 PM
good question, how do you perform a deep & dark web scans and osint for M&A cyber due diligence exposure?
Avatar
Avatar
silvance.
I've tried. It doesn't boot from traditional Win10 or Win11 boot drives created via Rufus. (edited)
Try another usb stick in dd mode , maybe just a bad usb
7:30 PM
Make sure device guard is turned off
7:30 PM
In bios
Avatar
Anyone have any experience investigating Playstations? And can give me some Insights
Avatar
bob the sexy builder 3/19/2024 4:16 AM
Can anyone reccomend any softwares that are either efficent or specialise in eradication in Incident Response. Ive looked at afew softwares and have found non that specialise in that specific area
Avatar
Avatar
Arlakossan
Anyone have any experience investigating Playstations? And can give me some Insights
The primary function of a games console is that of an entertainment system. However the latest iteration of these consoles has added a number of new interactive features that may prove of value to the digital investigator. This paper highlights the value of these consoles, in particular Sony’s latest version of their PlayStation. This console […...
🔥 1
🙏🏼 1
Avatar
@SUMURI Do any of the Paladin distros support bitlocker decryption?
5:09 AM
Assuming I already have the key
Avatar
Working a recovered stolen vehicle case and the alleged suspect bluetoothed their phone to the vehicle and didn't erase their data. Recovered the phone and the manufacturer and the model match on the vehicle display and the phone. However, the Bluetooth Mac address on the vehicle display and the phone are reversed; eg. phone:58-32-77-ee-b7-6f vehicle:6f-b7-ee-77-32-58. Vehicle is a 2019 Ford F250 using SYNC. Still waiting to hear back from SYNC tech support and Google searches are not yielding any results. Any one have answers on why it did this and how we can defend it in court?
Avatar
Avatar
joeav911
Working a recovered stolen vehicle case and the alleged suspect bluetoothed their phone to the vehicle and didn't erase their data. Recovered the phone and the manufacturer and the model match on the vehicle display and the phone. However, the Bluetooth Mac address on the vehicle display and the phone are reversed; eg. phone:58-32-77-ee-b7-6f vehicle:6f-b7-ee-77-32-58. Vehicle is a 2019 Ford F250 using SYNC. Still waiting to hear back from SYNC tech support and Google searches are not yielding any results. Any one have answers on why it did this and how we can defend it in court?
Check your DM.
Avatar
Thank you all in advance, I am working a case with a Chromebook and was wondering if there are any free or open source tools for extracting data from a Chromebook? I have the username and password.
Avatar
Avatar
Ahender608
Thank you all in advance, I am working a case with a Chromebook and was wondering if there are any free or open source tools for extracting data from a Chromebook? I have the username and password.
No Magenet has some software that helps step you through a select extraction of evidence on chromebooks but i've been told that it Google has sense patched the firmware so that does'nt work. Manually going through it and a search warrant to Google for any cloud data.
Avatar
Avatar
DCSO
No Magenet has some software that helps step you through a select extraction of evidence on chromebooks but i've been told that it Google has sense patched the firmware so that does'nt work. Manually going through it and a search warrant to Google for any cloud data.
Ok that’s what I have been reading. Thank you for your response.
Avatar
Chromebooks are a royal pain. Hopefully, they were using it to store data in Google Drive, that would be the best case. You can store locally on them, but Google pushes you to use Google Drive. They give you expanded storage for using a Chromebook
Avatar
Digitalferret 3/19/2024 5:20 PM
Chromebook: best use forensic scenario ..
SPOILER
Image attachment
💯 2
😂 1
Avatar
Avatar
Ahender608
Thank you all in advance, I am working a case with a Chromebook and was wondering if there are any free or open source tools for extracting data from a Chromebook? I have the username and password.
Learn how to connect, acquire, cast, and even screencast evidence on Chromebooks with ease. Dive in and become a Chromebook investigation pro!
Avatar
Trashboat667 3/19/2024 7:26 PM
So I’m currently taking CASA online self paced. Why is this so outdated? It’s really outdated. They’re still using PA to do iOS extractions, using PA version 7.10, I have 7.67, they say iTunes backup doesn’t allow you to choose what to backup. Kinda disappointed. Unless I’m missing something here.
Avatar
Avatar
Trashboat667
So I’m currently taking CASA online self paced. Why is this so outdated? It’s really outdated. They’re still using PA to do iOS extractions, using PA version 7.10, I have 7.67, they say iTunes backup doesn’t allow you to choose what to backup. Kinda disappointed. Unless I’m missing something here.
facelessg00n 3/19/2024 7:29 PM
We have submitted a number of complaints over the years and moved to in person classes only because of these issues. Wait until you do the refresher and you have to essentially brute force the answers as the software version they use to derive the answers with is from the late Cretaceous period.
🦖 1
Avatar
Avatar
facelessg00n
We have submitted a number of complaints over the years and moved to in person classes only because of these issues. Wait until you do the refresher and you have to essentially brute force the answers as the software version they use to derive the answers with is from the late Cretaceous period.
Trashboat667 3/19/2024 7:30 PM
lol. This class was pretty $$ and it’s years outdated.
Avatar
Avatar
Trashboat667
lol. This class was pretty $$ and it’s years outdated.
facelessg00n 3/19/2024 7:33 PM
Yeah it’s a tad embarrassing as it’s nowhere near as good at their in person classes.
Avatar
Avatar
facelessg00n
Yeah it’s a tad embarrassing as it’s nowhere near as good at their in person classes.
Trashboat667 3/19/2024 7:35 PM
Expensive lesson learned I guess. I really like the online on demand format but this is not cost effective. Is the online instructor led better?
Avatar
Avatar
Trashboat667
Expensive lesson learned I guess. I really like the online on demand format but this is not cost effective. Is the online instructor led better?
facelessg00n 3/19/2024 7:38 PM
I haven’t tried that one. I canned our online self paced ones because of the content which scared me off all the online stuff. Student engagement / learning outcomes from the in person classes offered a way better value for money proposition and student experience but involves taking people offline for a few days.
Avatar
Avatar
facelessg00n
I haven’t tried that one. I canned our online self paced ones because of the content which scared me off all the online stuff. Student engagement / learning outcomes from the in person classes offered a way better value for money proposition and student experience but involves taking people offline for a few days.
Trashboat667 3/19/2024 7:40 PM
Yeah for sure. I guess in person from now on for me.
android1 1
Avatar
ForensicatorEC 3/19/2024 8:25 PM
I’m helping out a small US City PD on a cold case and they have T-Mobile call records for a suspect dating back five years. Specifically, they have several incoming calls received around the time of the incident (occurred 5 years ago). The call records indicate the phone number was associated with a Google Voice account; however, when subpoenaed Google states the number belongs to Vincent Paquet (founder of Google Voice). As I’m fairly certain Mr. Paquet was not the person calling the suspect, I’m curious if anyone has come across this issue. If the Google Voice user opts to make his/her number private and masks it with a generic number, can Google still find who the actual user was that called the suspect’s phone on a specific date and time five years ago?
Avatar
Avatar
ForensicatorEC
I’m helping out a small US City PD on a cold case and they have T-Mobile call records for a suspect dating back five years. Specifically, they have several incoming calls received around the time of the incident (occurred 5 years ago). The call records indicate the phone number was associated with a Google Voice account; however, when subpoenaed Google states the number belongs to Vincent Paquet (founder of Google Voice). As I’m fairly certain Mr. Paquet was not the person calling the suspect, I’m curious if anyone has come across this issue. If the Google Voice user opts to make his/her number private and masks it with a generic number, can Google still find who the actual user was that called the suspect’s phone on a specific date and time five years ago?
ForensicatorEC 3/19/2024 8:28 PM
If anyone has a contact at Google that I could use to ask these questions to directly, I would greatly appreciate it. Also, I’m a U.S. Federal Agent working for one of the MCIOs.
Avatar
Does anyone have any intermediate to advanced NTFS Master File Table resources or expertise? I'm testing file recovery by referencing MFT records for a known file and attempting recovery using Velociraptor on Windows endpoints running Windows 10 22H2 or Windows 11 23H2. Process: 1.) Create text file on disk and note the name of it 2.) Delete the text file and empty recycle bin 3.) Use Velociraptor to query the USN journal and filter by the name of the file created / deleted which gives the original MFT record number. 4.) Use Windows.NTFS.Recover and provide the MFT record found in Step 3. 5.) In testing this typically produces a different but very recently written file (which I think overwrote the old content) instead of the deleted text file. I'd like to further my understanding of how Windows and NTFS choose where to write and whether to use a no-longer-In-Use MFT record or create a new one. I'm new and I may be misguided but thought it might be worth asking here first. If I test on a slave drive formatted as NTFS with the same process above it's fairly easy in most cases to recover the deleted file, as the slave drive isn't being written to frequently like the primary OS drive is and thus writing over the original content. If anyone has any suggestions on other ways to go about testing I'd be interested. I also realize it's probably rare that this process would work as it relies on the disk not being overwritten, but still interested in testing. I originally referenced https://docs.velociraptor.app/blog/2019/2019-11-15_recovering-deleted-ntfs-files-with-velociraptor-1fcf09855311/
Avatar
is anyone using snort in kali linux after 2024 kali linux update ?
Avatar
Suggest forensic tool vendors along with tool name which can crack any Android and Apple devices including iPhone 15 versions in BFU state (perpetual license preferred)
Avatar
doesn't exist
Avatar
Avatar
ph03n1x
Suggest forensic tool vendors along with tool name which can crack any Android and Apple devices including iPhone 15 versions in BFU state (perpetual license preferred)
facelessg00n 3/20/2024 2:32 AM
Is this a bot question.......
Avatar
Avatar
facelessg00n
Is this a bot question.......
Nop. I'm collecting some info
Avatar
Avatar
ph03n1x
Nop. I'm collecting some info
facelessg00n 3/20/2024 2:35 AM
Probably be best to collect some from some vendors..... Do you currently deal with any, the local reps will be able to help you out
Avatar
Avatar
facelessg00n
Probably be best to collect some from some vendors..... Do you currently deal with any, the local reps will be able to help you out
Not having any vendors.
Avatar
Avatar
silvance.
@SUMURI Do any of the Paladin distros support bitlocker decryption?
Sumuri Andrew 3/20/2024 6:12 AM
Yes, PALADIN LTS has bitlocker decryption supported through the Logical Imager. When you select the disk as the source through the Logical Imager it will prompt you for either the BitLocker password, or allow you to select a BitLocker key file. (if you don't have access to the Official file, you can also just paste the key string into a text file as long as you place 17 spaces (or random characters) at the front of the file before the key code.) (Also, LTS is included in PALADIN Pro, but may show up as Carbon-Paladin in the boot mode selection menu.) (edited)
Avatar
Good morning all, I wanted to pick your brain on storage solutions for unused hard drives. I'm considering getting this but I'm open to other suggestions: https://www.uline.com/Product/Detail/H-2511BL/Bin-Organizers/Shelf-Bin-Organizer-36-x-12-x-39-with-4-x-12-x-4-Black-Bins
Get organized! Bins offer easy access to small parts and accessories. Maintenance free, powder-coated steel frame won't rust or corrode. Shelves adjust in 1" increments. Moisture-resistant plastic bins slide and lock for convenience. ULINE offers over 41,000 boxes, plastic poly bags, mailing tubes, warehouse supplies and bubble wrap for your sto...
Avatar
Avatar
RobWilco
Does anyone have any intermediate to advanced NTFS Master File Table resources or expertise? I'm testing file recovery by referencing MFT records for a known file and attempting recovery using Velociraptor on Windows endpoints running Windows 10 22H2 or Windows 11 23H2. Process: 1.) Create text file on disk and note the name of it 2.) Delete the text file and empty recycle bin 3.) Use Velociraptor to query the USN journal and filter by the name of the file created / deleted which gives the original MFT record number. 4.) Use Windows.NTFS.Recover and provide the MFT record found in Step 3. 5.) In testing this typically produces a different but very recently written file (which I think overwrote the old content) instead of the deleted text file. I'd like to further my understanding of how Windows and NTFS choose where to write and whether to use a no-longer-In-Use MFT record or create a new one. I'm new and I may be misguided but thought it might be worth asking here first. If I test on a slave drive formatted as NTFS with the same process above it's fairly easy in most cases to recover the deleted file, as the slave drive isn't being written to frequently like the primary OS drive is and thus writing over the original content. If anyone has any suggestions on other ways to go about testing I'd be interested. I also realize it's probably rare that this process would work as it relies on the disk not being overwritten, but still interested in testing. I originally referenced https://docs.velociraptor.app/blog/2019/2019-11-15_recovering-deleted-ntfs-files-with-velociraptor-1fcf09855311/
In case it's useful to anyone else, Mike replied with some very useful insight: "ntfs is very aggresive in reusing blocks in my experience recovery of deleted files is not usually successful i think the issue is that the mft entry itself is reused quickly and so while the blocks might be on disk the runlist is lost"
Avatar
Hey, probably one for Magnet... is the Auxtera Project still a thing, and is there someone I speak with directly about it? Tried emailing the address on the website but it bounced back... (edited)
Avatar
Has anyone done a semi-recent RFP document for a faraday room for LEA they'd be able to link to/share?
Avatar
WhatsApp question....... I have an image in the directory: whatsapp.shared/message/media/##########/ Does this directory contain sent and recevied media files with this phone number, or just recevied from that #
Avatar
Avatar
DE
Hey, probably one for Magnet... is the Auxtera Project still a thing, and is there someone I speak with directly about it? Tried emailing the address on the website but it bounced back... (edited)
Digitalferret 3/21/2024 1:47 PM
@Magnet Forensics ^^
Avatar
Avatar
whee30
Textnow holds the record for my fastest non-emergency subpoena response of 6 hours
AARC TASK FORCE 3/21/2024 5:40 PM
Hey! Can you share what the content of the return was? I'll be submitting an order tomorrow and would like to get a start on when the deliverable will be.
Avatar
@Griffeye Hi, is there anyone I can talk to about import notifications and how to efficiently double check them? (edited)
Avatar
Anyone recall a free gui app (Windows only I think) that was released last year (or maybe even year before) that will check for updates to the most popular DF tools. Cant seem to find it. Thank you in advance! (edited)
Avatar
Avatar
ForensicatorEC
I’m helping out a small US City PD on a cold case and they have T-Mobile call records for a suspect dating back five years. Specifically, they have several incoming calls received around the time of the incident (occurred 5 years ago). The call records indicate the phone number was associated with a Google Voice account; however, when subpoenaed Google states the number belongs to Vincent Paquet (founder of Google Voice). As I’m fairly certain Mr. Paquet was not the person calling the suspect, I’m curious if anyone has come across this issue. If the Google Voice user opts to make his/her number private and masks it with a generic number, can Google still find who the actual user was that called the suspect’s phone on a specific date and time five years ago?
Trashboat667 3/22/2024 7:01 PM
I would say Google may have records that far back but like I always say, “maybe, it depends”. Even if they did, the subscriber info can be made up. Say they do give you the records and a bunch of IPs for logons/log offs and even a TOS IP (good chance). The chances of the ISP still having the subscriber records for an IP that old are next to zero. I know for certain centurylink (Lumen Tech) only keeps IPs for one year. Google likely might have it but there won’t be a way to resolve it.
Avatar
Avatar
DF51 Shaf
Anyone recall a free gui app (Windows only I think) that was released last year (or maybe even year before) that will check for updates to the most popular DF tools. Cant seem to find it. Thank you in advance! (edited)
only one i know of is the XWays updater by eric zimmerman
👍 1
Avatar
Avatar
DF51 Shaf
Anyone recall a free gui app (Windows only I think) that was released last year (or maybe even year before) that will check for updates to the most popular DF tools. Cant seem to find it. Thank you in advance! (edited)
Digitalferret 3/22/2024 8:01 PM
as per rfar : list of Z's tools and link to shellscript https://ericzimmerman.github.io/
Avatar
Avatar
Digitalferret
as per rfar : list of Z's tools and link to shellscript https://ericzimmerman.github.io/
Thanks Digitalferret.
👍🏻 1
Avatar
hi, anybody use volatility?
Avatar
Avatar
S∑A
hi, anybody use volatility?
DeeFIR 🇦🇺 3/22/2024 11:03 PM
#memory-forensics
Avatar
Avatar
DeeFIR 🇦🇺
#memory-forensics
it seems nobody talks over there
Avatar
Avatar
S∑A
it seems nobody talks over there
DeeFIR 🇦🇺 3/22/2024 11:41 PM
Plenty of chatter over there and you probably won’t get a response in this channel anyway.
Avatar
Avatar
DeeFIR 🇦🇺
Plenty of chatter over there and you probably won’t get a response in this channel anyway.
ok np, where do they share resources like tutorials and such for said program?
Avatar
DeeFIR 🇦🇺 3/22/2024 11:47 PM
🤣 4
Avatar
Avatar
DeeFIR 🇦🇺
Click to see attachment 🖼️
I dont see resources in there cuh
Avatar
bob the sexy builder 3/23/2024 2:16 AM
hi everyone, i uploaded my survey awhile back but i just want to re-upload it for one last time as my dissertations deadline draws near and id love to get as many responses as i can before i need to close off the survey! any input from both officer and forensic would be fantastic, the survey is also anonymous so you can go to town on an opinion and have no worries that it will bite you later
2:16 AM
thats the link for it :))
Avatar
Howdy everyone. Currently have a motorola phone that was thrown away by a subject we released from our jail. The quick share items are hidden, its password locked, and he didn't seem to know the password either (per when he first came in). Unsure of the type of motorola it is, but the subject known for having a long rap sheet and specifically requested us to tell anyone calling up to the department about it to NOT tell them we had the phone. Notably, its not on airplane mode, or anything like that and it has plenty of battery...but no SIM card. I'm still learning my DFIR stuff, so I dont know the full answers for all this, but is there anyway for us to actually try and figure out whose phone this is, or what its importance may be, with just the phone itself? Also, still learning where things go here, so if this goes in a more specific channel, just let me know! : ) (edited)
Avatar
Avatar
Magnus
Howdy everyone. Currently have a motorola phone that was thrown away by a subject we released from our jail. The quick share items are hidden, its password locked, and he didn't seem to know the password either (per when he first came in). Unsure of the type of motorola it is, but the subject known for having a long rap sheet and specifically requested us to tell anyone calling up to the department about it to NOT tell them we had the phone. Notably, its not on airplane mode, or anything like that and it has plenty of battery...but no SIM card. I'm still learning my DFIR stuff, so I dont know the full answers for all this, but is there anyway for us to actually try and figure out whose phone this is, or what its importance may be, with just the phone itself? Also, still learning where things go here, so if this goes in a more specific channel, just let me know! : ) (edited)
Find the imei and request historical call data and try to make the puzzle 🙂
Avatar
Avatar
florus
Find the imei and request historical call data and try to make the puzzle 🙂
So, I suggested the IMEI, but the issue is that we can't get into the phone (as is). I'm actually glad to see this response, because thats exactly the suggestion I gave the officer that found the phone; if we could get the imei, we could figure out what network it was on, and then who may have activated it. Any suggestions for pulling it off of the locked phone?
Avatar
Avatar
Magnus
So, I suggested the IMEI, but the issue is that we can't get into the phone (as is). I'm actually glad to see this response, because thats exactly the suggestion I gave the officer that found the phone; if we could get the imei, we could figure out what network it was on, and then who may have activated it. Any suggestions for pulling it off of the locked phone?
Check the simtray, or the back of the device. Or contact your telecom team.. .
Avatar
Avatar
florus
Check the simtray, or the back of the device. Or contact your telecom team.. .
10-4. I'll check the simtray next I have the opportunity. That said, the back of the device is hardshelled, as the housing for the phone is one of the ones that are completely one-piece. I'll leave that option to folks higher up than I. As for a telecom team, I'll have to inquire about that, as we are a small-town police department. I appreciate your suggestions though, gives me an avenue or two to check with.
Avatar
Avatar
Magnus
10-4. I'll check the simtray next I have the opportunity. That said, the back of the device is hardshelled, as the housing for the phone is one of the ones that are completely one-piece. I'll leave that option to folks higher up than I. As for a telecom team, I'll have to inquire about that, as we are a small-town police department. I appreciate your suggestions though, gives me an avenue or two to check with.
I’d consider just getting a search warrant and reaching out to a department nearby that has advanced forensic software capabilities. They may be able to crack PIN and/or acquire an extraction for you.
Avatar
Avatar
Jshoe
I’d consider just getting a search warrant and reaching out to a department nearby that has advanced forensic software capabilities. They may be able to crack PIN and/or acquire an extraction for you.
That's fair, Jshoe. I had a sneaking suspicion this was gonna be that sort of a situation. I appreciate y'alls feedback and suggestions!
Avatar
opp_dthawke 3/24/2024 2:26 PM
Some Motorola phones are really hard to determine exact model unless cracking it open. Sometimes I will go to GSMarena website where you can search external photos of all phones and try to identify it that way. Once identified, you can look up processor and see if any tools support it.
Avatar
Avatar
opp_dthawke
Some Motorola phones are really hard to determine exact model unless cracking it open. Sometimes I will go to GSMarena website where you can search external photos of all phones and try to identify it that way. Once identified, you can look up processor and see if any tools support it.
That is a fantastic suggestion, that is a really solid resource to have, had no clue that website even existed. Wonderful tip, much appreciated!
Avatar
Avatar
Magnus
So, I suggested the IMEI, but the issue is that we can't get into the phone (as is). I'm actually glad to see this response, because thats exactly the suggestion I gave the officer that found the phone; if we could get the imei, we could figure out what network it was on, and then who may have activated it. Any suggestions for pulling it off of the locked phone?
Might be written somewhere on the back, sim tray or under the battery. If you're able to locate it then https://www.imei.info/ is a useful website as it'll tell you the model.
Check IMEI Number and find out hidden info. Check hardware specification, warranty or BLACKLIST status and more for FREE. Over 110 mln checked IMEI's in our database.
Avatar
Avatar
opp_dthawke
Some Motorola phones are really hard to determine exact model unless cracking it open. Sometimes I will go to GSMarena website where you can search external photos of all phones and try to identify it that way. Once identified, you can look up processor and see if any tools support it.
if they're not in AFU, you can usually boot into fastboot, and then run fastboot getvar all to get model numer, IMEI, firmware version etc
Avatar
Hello how to create an Exclusion rule on SEP for a process and allow specific IP and Port? Thanks
Avatar
Avatar
bugz
Hello how to create an Exclusion rule on SEP for a process and allow specific IP and Port? Thanks
Digitalferret 3/25/2024 3:33 AM
SEP Symantec Endpoint Protection? not sure you're in the right place dude; this is DFIR Discord, or has this got forensic side?? (edited)
Avatar
Avatar
Magnus
Howdy everyone. Currently have a motorola phone that was thrown away by a subject we released from our jail. The quick share items are hidden, its password locked, and he didn't seem to know the password either (per when he first came in). Unsure of the type of motorola it is, but the subject known for having a long rap sheet and specifically requested us to tell anyone calling up to the department about it to NOT tell them we had the phone. Notably, its not on airplane mode, or anything like that and it has plenty of battery...but no SIM card. I'm still learning my DFIR stuff, so I dont know the full answers for all this, but is there anyway for us to actually try and figure out whose phone this is, or what its importance may be, with just the phone itself? Also, still learning where things go here, so if this goes in a more specific channel, just let me know! : ) (edited)
Are emergency calls available? Calling 911 may give you a stored MSISDN value (I know the SIM is missing) on their caller ID. Make sure you are on solid legal ground before attempting it. https://www.washingtonpost.com/news/volokh-conspiracy/wp/2016/07/15/calling-911-from-a-phone-to-obtain-its-number-does-not-search-it-court-rules/
Avatar
Has anyone got a copy of Brett Shavers' new book : "DFIR Investigative Mindset"? I've heard it was suppose to release on the 22nd of march, but havent found any place to buy it. I am in Canada, could it be just delayed for countries outside of USA?
Avatar
Avatar
4N6Cookie
Has anyone got a copy of Brett Shavers' new book : "DFIR Investigative Mindset"? I've heard it was suppose to release on the 22nd of march, but havent found any place to buy it. I am in Canada, could it be just delayed for countries outside of USA?
seems like it still in review by amazon
Avatar
Avatar
segumarc
seems like it still in review by amazon
Yeah this is what i've seen on his Linkedin page, was just wondering if anyone had any other link. I'll wait for amazon thx (edited)
Avatar
Digitalferret 3/25/2024 11:55 AM
anyone at @Cellebrite pop me a DM pls?
📬 1
Avatar
Avatar
Rob
Might be written somewhere on the back, sim tray or under the battery. If you're able to locate it then https://www.imei.info/ is a useful website as it'll tell you the model.
Thank you for the resource Rob, I'll add that to my list of tools!
👍 1
Avatar
Avatar
char|i3
Are emergency calls available? Calling 911 may give you a stored MSISDN value (I know the SIM is missing) on their caller ID. Make sure you are on solid legal ground before attempting it. https://www.washingtonpost.com/news/volokh-conspiracy/wp/2016/07/15/calling-911-from-a-phone-to-obtain-its-number-does-not-search-it-court-rules/
I and the officer who found it to begin with were considering calling our county 911 (after giving them a heads up we'd be calling), so we called our Chief and explained there was no SIM in it, so he figured that there wouldn't be any reason to call; I'll bring this up to them both the next time I see/talk to them, and see about if he wants to call for the sake of getting the MSISDN on the offchance. Appreciate the response! (edited)
Avatar
@Cellebrite anyone available for a question about premium?
📬 1
🤞 1
Avatar
Avatar
Magnus
I and the officer who found it to begin with were considering calling our county 911 (after giving them a heads up we'd be calling), so we called our Chief and explained there was no SIM in it, so he figured that there wouldn't be any reason to call; I'll bring this up to them both the next time I see/talk to them, and see about if he wants to call for the sake of getting the MSISDN on the offchance. Appreciate the response! (edited)
I wonder... if you put the phone in a Farraday Cage and used something like Kismet to see what wireless AP's its trying to look for. Maybe there is a unique AP SSID it has connected to before and it shows up on Wigle or has a descriptive name.
Avatar
Avatar
KohleR
I wonder... if you put the phone in a Farraday Cage and used something like Kismet to see what wireless AP's its trying to look for. Maybe there is a unique AP SSID it has connected to before and it shows up on Wigle or has a descriptive name.
Hmm...I'll bring that up to the officer/chief to see if they'd want to try that, thank ya for the advice, thats a solid avenue to look at!
Salute 1
Avatar
@Cellebrite 'My Cellebrite' portal not firing 2FA codes again, any quick res for this?
Avatar
Only support can disable / re-enable it...
5:26 PM
No 'quick fix'
Avatar
Avatar
CLB-Paul
No 'quick fix'
Thx Paul. The ol 'if you need support logging into the support portal, then log into the support portal and raise a support ticket' conundrum. (edited)
Avatar
You can email them support@cellebrite.com @Jeeper (edited)
Avatar
Avatar
4N6Cookie
Yeah this is what i've seen on his Linkedin page, was just wondering if anyone had any other link. I'll wait for amazon thx (edited)
You’re not asking for a ripped copy are ya? 😄
8:32 PM
That was a joke, please don’t arrest me.
Avatar
Avatar
ryd3v
You’re not asking for a ripped copy are ya? 😄
Was wondering if it was country lock... happens so often that items are available in the US but not in Canada. My question if asked on some shady forum could look like i was looking for this 😅
😂 1
Avatar
anyone have a review of xintra or invictus trainings for azure/365 incident response / forensics?
Avatar
Avatar
smashtitle
anyone have a review of xintra or invictus trainings for azure/365 incident response / forensics?
Just started the Xintra Azure training. Early days but looks very detailed and well put together so far. (edited)
👌 1
Avatar
Ran into an issue using Elcomsoft Phine Breaker… anyone experienced the error “Unexpected Response Result(220)” while performing a icloud backup collection?
Avatar
Avatar
4N6Cookie
Has anyone got a copy of Brett Shavers' new book : "DFIR Investigative Mindset"? I've heard it was suppose to release on the 22nd of march, but havent found any place to buy it. I am in Canada, could it be just delayed for countries outside of USA?
Brett Shavers 3/26/2024 12:50 PM
Amazon is holding it in review...I've never had one held this long, so I am having it released everywhere else (worldwide distro, bookstores) sooner than later.
🥳 2
Avatar
Avatar
4N6Cookie
Yeah this is what i've seen on his Linkedin page, was just wondering if anyone had any other link. I'll wait for amazon thx (edited)
Brett Shavers 3/26/2024 12:52 PM
As soon as Amazon gets this review done, I'll post the link here, and LinkedIn, and "X" to make sure everyone has a chance to grab a half price copy for the first week. Should have been published on the 20th, but now going much longer than that for no reason that I can find or Amazon will tell me.
Avatar
Avatar
Brett Shavers
As soon as Amazon gets this review done, I'll post the link here, and LinkedIn, and "X" to make sure everyone has a chance to grab a half price copy for the first week. Should have been published on the 20th, but now going much longer than that for no reason that I can find or Amazon will tell me.
Maybe it’s so good they can’t stop reading it. 🤷‍♂️
👀 1
Avatar
asked before about if an Android could be accessed if an OLD passcode was known and wanted some clarification in why it apparently cant - i was under the impression FBE encrypts files with the passcode+phones unique key, so surely at least some files (those created or modified at the time the old passcode was in use) should be accessibls by trying it?
Avatar
Avatar
hannix7403
asked before about if an Android could be accessed if an OLD passcode was known and wanted some clarification in why it apparently cant - i was under the impression FBE encrypts files with the passcode+phones unique key, so surely at least some files (those created or modified at the time the old passcode was in use) should be accessibls by trying it?
Digitalferret 3/27/2024 8:40 AM
#mobile-forensic-extractions #mobile-forensic-decoding
Avatar
thanks
Avatar
Has anyone seen a case where an iPhone was placed into 'Airplane Mode' and after a while, it turns itself off and resumes cellular connectivity? I just had an email from a local agent that stated this happened and named the alphabet soup that verified it, but I'm not seeing that here and have not found documentation for that. Thanks. (edited)
Avatar
Avatar
DCSO
Has anyone seen a case where an iPhone was placed into 'Airplane Mode' and after a while, it turns itself off and resumes cellular connectivity? I just had an email from a local agent that stated this happened and named the alphabet soup that verified it, but I'm not seeing that here and have not found documentation for that. Thanks. (edited)
Maybe if there's an MDM in play and the phones still on WiFi but never seen or heard of anything like that happening. Would be interesting to look at knowledgeC.db on that phone to see the airplane mode logs (edited)
Avatar
Avatar
Solec
Maybe if there's an MDM in play and the phones still on WiFi but never seen or heard of anything like that happening. Would be interesting to look at knowledgeC.db on that phone to see the airplane mode logs (edited)
thatboy_leo 3/27/2024 7:05 PM
Piggybacking (not sure if it helps) if wifi was enabled while in airplane mode > airplane mode turned off > airplane mode turned on > wifi will still be enabled. But as you said haven’t seen airplane mode turn off on its own
Avatar
Avatar
DCSO
Has anyone seen a case where an iPhone was placed into 'Airplane Mode' and after a while, it turns itself off and resumes cellular connectivity? I just had an email from a local agent that stated this happened and named the alphabet soup that verified it, but I'm not seeing that here and have not found documentation for that. Thanks. (edited)
thatboy_leo 3/27/2024 7:07 PM
The phone ran through any tool or it was just left by itself when airplane mode disabled?
Avatar
Avatar
Beercow
Maybe it’s so good they can’t stop reading it. 🤷‍♂️
Brett Shavers 3/27/2024 9:29 PM
I won't disbelieve that 🙂
Avatar
Anyone have any experience with Symantec System Recovery images? I have an image like this (.sv2i file combined with .v21 and .iv2i files) and I'm looking for a way to actually either directly mount this or convert to some other format like VMDK that I could mount. Anyone have any pointers? The only info I found so far was some obscure VMware thread about using an old VMware vCenter Converter 6.0 to convert it to VMDK but apparently this is no longer supported or hosted by VMware https://communities.vmware.com/t5/Converter-Standalone-Discussions/Converting-SV2i-files-using-VM-ware-vCenter-converter-standalone/td-p/2292276
I have installed the VM ware vCenter converter standalone software, the agent server and client and I want to convert sv2i backup files to a virtual machine using it but I can't find this option in the source machine, it only allows me to convert the machine it self or a remote machine, so how can I...
Avatar
Does anyone know of a way to filter @Magnet Forensics Axiom conversations? I have an iPhone with over 96k conversation threads. However, many of these are repeated 1 message "threads" which are duplicated from real conversations. @Cellebrite PA does the same thing, so this isn't an Axiom issue. I just happen to be doing most of the examination through Axiom and was looking to filter out all these non-sense messages. Especially since my computer crashed yesterday and I lost my spot where I was last scrolling........
Avatar
Avatar
sholmes
Does anyone know of a way to filter @Magnet Forensics Axiom conversations? I have an iPhone with over 96k conversation threads. However, many of these are repeated 1 message "threads" which are duplicated from real conversations. @Cellebrite PA does the same thing, so this isn't an Axiom issue. I just happen to be doing most of the examination through Axiom and was looking to filter out all these non-sense messages. Especially since my computer crashed yesterday and I lost my spot where I was last scrolling........
cScottVance 3/28/2024 7:28 AM
Incoming DM
👍 1
Avatar
Thanks. I didn't want to just DM you guys.
Avatar
Avatar
DCSO
Has anyone seen a case where an iPhone was placed into 'Airplane Mode' and after a while, it turns itself off and resumes cellular connectivity? I just had an email from a local agent that stated this happened and named the alphabet soup that verified it, but I'm not seeing that here and have not found documentation for that. Thanks. (edited)
There's a few ways I'm aware of that this can happen that don't involve mdm. 1. Wifi is still on, update is applied and forces airplane mode off. Never seen this personally, but apparently it can happen. 2. User scheduled it to happen via Automations. I've tested this and it works. 3. human error - someone turned it off by accident. Faraday environment is always a good backup.
🔥 3
Avatar
Avatar
dfa_adam
There's a few ways I'm aware of that this can happen that don't involve mdm. 1. Wifi is still on, update is applied and forces airplane mode off. Never seen this personally, but apparently it can happen. 2. User scheduled it to happen via Automations. I've tested this and it works. 3. human error - someone turned it off by accident. Faraday environment is always a good backup.
I just tested #2 and it worked flawlessly! That is freaky, I need to get a faraday room...
Avatar
Avatar
FullTang
I just tested #2 and it worked flawlessly! That is freaky, I need to get a faraday room...
Good insight, thanks
Avatar
Avatar
FullTang
I just tested #2 and it worked flawlessly! That is freaky, I need to get a faraday room...
Avatar
Avatar
FullTang
I just tested #2 and it worked flawlessly! That is freaky, I need to get a faraday room...
It's even worse than it looks - you can get even sneakier and anti-forensic with it than a simple timed switch for Airplane mode. Works on Android too via Modes & Routines or other alternative apps. When you add in all the possible shenanigans with powered off bluetooth tracking, not to mention the standard forensic need to isolate a device, it drives home the need to always use RF shielding if possible; at least until an acquisition can be done.
🔥 1
Avatar
That's wild, check your DMs
Avatar
Avatar
dfa_adam
It's even worse than it looks - you can get even sneakier and anti-forensic with it than a simple timed switch for Airplane mode. Works on Android too via Modes & Routines or other alternative apps. When you add in all the possible shenanigans with powered off bluetooth tracking, not to mention the standard forensic need to isolate a device, it drives home the need to always use RF shielding if possible; at least until an acquisition can be done.
did I really needed to read this today ....😆
1:08 PM
At least, you can't use automation to reboot the phone. (edited)
Avatar
Avatar
segumarc
At least, you can't use automation to reboot the phone. (edited)
The positive side of it is that if anyone needs more justification for a shiny new faraday room vs bags/boxes/tinfoil, there you go!
💯 3
Avatar
A paired Apple Watch within bluetooth range can be set to mirror airplane mode and can be enabled/disabled from either device. I doubt that was the case here, but it’s just another thing to be aware of.
Avatar
Quick question- are there any remote DFIR/Forensic positions out there? Im highly doubtful. Im a milspouse of an active duty soldier, recently deployed, and was laid off from my last IT gig after six years corporate work. I’m getting my Masters in DF, at Champlain, but haven’t quite figured out how I’m going to break into the industry.
Avatar
Avatar
dfa_adam
It's even worse than it looks - you can get even sneakier and anti-forensic with it than a simple timed switch for Airplane mode. Works on Android too via Modes & Routines or other alternative apps. When you add in all the possible shenanigans with powered off bluetooth tracking, not to mention the standard forensic need to isolate a device, it drives home the need to always use RF shielding if possible; at least until an acquisition can be done.
I demo'd an automation I wrote to Cellebrite at a workshop a couple of years back. Set to Airplane Mode and then the automation kicks in: it turns the screen to 0% (ie its black) . Officer thinks the device is in Airplane Mode as the last action. However, this automation re-enables BT and then WiFi. Enables Cellular connectivity and set to start recording from front camera. Some other automation features still require user intercation (such as send my location in an iMessage to a named contact) This gets saved to the DCIM. Other activities are achievable through automations includinmg running python scripts. As a further note, if the device was placed into Airplane Mode from Control Centre, this is not a permanent instruction and we have tested it and the device did remove the setting. Not on every iPhone, but 2 out of the 3 I tested all on iOS14 .# (at the time the most up to date releae)
Avatar
Avatar
Hathaway
Quick question- are there any remote DFIR/Forensic positions out there? Im highly doubtful. Im a milspouse of an active duty soldier, recently deployed, and was laid off from my last IT gig after six years corporate work. I’m getting my Masters in DF, at Champlain, but haven’t quite figured out how I’m going to break into the industry.
Many IR consulting teams are remote, I have been remote for the past 10 years or so. But it is much harder to get a remote entry level role. Having said that with six years of IT experience you are not really entry level, so I would not rule it out. You should check with the careers team at Champlain, I have worked with them to hire in the past and we are actually looking at hiring a couple of interns through the Leahy Center at Champlain at the moment.
Avatar
Wonderful, thank you for the heads up. I’ll contact them and see if they would point me in the right direction.
Avatar
hiddenbook46 3/29/2024 11:22 AM
What do you think about GEIR ? (edited)
215.31 KB
Avatar
Are there any tools that can extract an Android phone Backup from Google? Essentially, I want to extract this Android backup so I can load it into Cellebrite Physical Analyzer to see WhatsApp and SMS/MMS messages. Is this possible?
Avatar
Avatar
Yawndy
Are there any tools that can extract an Android phone Backup from Google? Essentially, I want to extract this Android backup so I can load it into Cellebrite Physical Analyzer to see WhatsApp and SMS/MMS messages. Is this possible?
Digitalferret 3/29/2024 7:30 PM
#mobile-forensic-extractions
Avatar
Do any of you know what the difference between a full file system extraction and a physicals extraction is ? Is there any difference at all ?
Avatar
Avatar
aa0047
Do any of you know what the difference between a full file system extraction and a physicals extraction is ? Is there any difference at all ?
Digitalferret 3/30/2024 6:04 AM
clipped - full articles, you need to use Wayback
6:05 AM
@char|i3 oops, saw you typing as i pasted. feel free to add
Avatar
Avatar
Digitalferret
@char|i3 oops, saw you typing as i pasted. feel free to add
I was going to make wild allegations about this being a homework assignment 🤣. No, you nailed it. Thanks.
😂 4
Avatar
Digitalferret 3/30/2024 6:07 AM
lecturer's take note ^ 🙂
🤣 1
Avatar
Avatar
Digitalferret
clipped - full articles, you need to use Wayback
Thanks a lot
👍🏻 1
Avatar
To any encase users…. I would like to ask a question about email carving from an E01. Thanks in advance.
Avatar
Can we make an intellectual property crime channel ? I think that would be pretty cool. (edited)
12:19 PM
Some parts of it falls into digital forensics, (edited)
Avatar
Avatar
Hathaway
Quick question- are there any remote DFIR/Forensic positions out there? Im highly doubtful. Im a milspouse of an active duty soldier, recently deployed, and was laid off from my last IT gig after six years corporate work. I’m getting my Masters in DF, at Champlain, but haven’t quite figured out how I’m going to break into the industry.
I’m also curious about getting started in remote work. I have 4-5 years until my retirement in law enforcement. (Digital Forensics side). Not sure if I should focus on stacking up on certifications or start working on a masters in digital forensics.
Avatar
It's unlikely to be remote for DF because all the physical items. IR is a better bet. (edited)
Avatar
I feel like a chad rn lol. I flashed DDWRT onto my Nighthawk and I am just droooling
6:40 PM
i wanted to use FreshTomato but they didnt support a R7000p and only a R7000. But Im not regretting using DD by any means lol (edited)
Avatar
Avatar
Rock3t
i wanted to use FreshTomato but they didnt support a R7000p and only a R7000. But Im not regretting using DD by any means lol (edited)
Digitalferret 4/1/2024 2:31 AM
In hindsight i feel like a lazy bastage. I looked at all this, bc wanted built in VPN, and just gave up before i started and went with GLiNet router with full built in list of VPN servces (Proton,Mullvad etc) inc Wireguard.
Avatar
Avatar
Digitalferret
In hindsight i feel like a lazy bastage. I looked at all this, bc wanted built in VPN, and just gave up before i started and went with GLiNet router with full built in list of VPN servces (Proton,Mullvad etc) inc Wireguard.
I had one guy point me to it, I was a little sketched bc I just bricked my Fortinet 40f so I’m like top toeing around this thing
8:24 AM
But it worked flawlessly, took about 10minutes for it to install bc ddwrt does use a different kernel so everything was reset
8:24 AM
I wanted Fresh Tomatos bc it’s same kernel netgear uses but whatever.
8:26 AM
Really I don’t think I’ll use a different router ever. From now on I’ll always be flashing off the shelf routers 🤣🤣🤣
8:26 AM
If my router had the power I could throw snort onto the router like what?
8:27 AM
I already did it but snorts a heavy program for a tiny ARM cpu
Avatar
And no I did not pay for that 40f Im not a Fortinet kid 😭, it was just on hand (edited)
9:07 AM
although I had to take NSE for a job. Still
Avatar
Avatar
nbh2493
Ran into an issue using Elcomsoft Phine Breaker… anyone experienced the error “Unexpected Response Result(220)” while performing a icloud backup collection?
Crabbicus82 4/1/2024 9:08 AM
Did you ever figure out a resolution on this as I'm now getting this error. Elcomsoft support hasnt been really helpful.
Avatar
Avatar
Crabbicus82
Did you ever figure out a resolution on this as I'm now getting this error. Elcomsoft support hasnt been really helpful.
Ross Donnelly 4/1/2024 10:19 AM
They only claim support up to iOS16. If it's iOS17 that could be your issue.
Avatar
Nice try guys.
👀 1
😂 1
Avatar
I will say out of all of the servers I am in, this one did it best
PepeLaugh 4
Avatar
I agree.. this one got me.
😆 4
10:47 AM
You know how to read the room
Avatar
Digitalferret 4/1/2024 10:47 AM
hehehe
Avatar
Eagle eyes flock to notifications
Avatar
Light Emitting Douchebag 4/1/2024 10:49 AM
Only April 1st thing I fell for today 😅
🤣 6
Avatar
Whoever thought to screenshot the notification youre a Genius LOL
11:02 AM
Ive been searching for 20 fkin mins where I was mentioned just to take a closer look and start cursing yall lol
Avatar
Avatar
Light Emitting Douchebag
Only April 1st thing I fell for today 😅
same here 😭
Avatar
Light Emitting Douchebag 4/1/2024 11:09 AM
Definitely a good one. If there was one Discord server I'd not have expected it from it would have been this one.
Avatar
That was def thought over a few easter beers Lol
11:12 AM
drunken clarity "Yo you know what we should do for aprils 1st?" 😭 (edited)
Avatar
ThurgoodJenkins 4/1/2024 11:27 AM
thanks, i was going crazy
Avatar
Avatar
Light Emitting Douchebag
Definitely a good one. If there was one Discord server I'd not have expected it from it would have been this one.
same 😆
Avatar
Damn, I read the comments and was still looking for where I was mentioned for 10 minutes...... shaking my head😄. Reminds me of Ultima Online circa 1997 (I'm dating myself) when the characters would have conversation bubbles to chat with each other and system notifications would pop up as well - one of which was you were being attacked by someone within the city limits. If that really happened, you could call the "Guards!" and they would suddenly appear and kill the attacker. Someone made their chat the same fonts as the system message informing you that you were being attacked. lol. But it wasn't actually happening but you were so panicked thinking you were being attacked, that you attacked that character ignoring the system warning (who was now dancing around you putting on a good show), and in turn, they called for the guards. So the guards appear and kill you, and the other guy makes off with your loot .... (edited)
😂 2
Avatar
Never played Ultima personally, but the shenanigans I have heard of that you could pull with that game were insane lol.
Avatar
Digitalferret 4/1/2024 1:36 PM
FMJ thing SFW:
1:37 PM
same but animated, full metal sweary :NSFW 🙂
SPOILER
Image attachment
😭 1
🤣 3
Avatar
Avatar
Digitalferret
same but animated, full metal sweary :NSFW 🙂
I saved this LOL
Avatar
Avatar
Digitalferret
same but animated, full metal sweary :NSFW 🙂
That's getting saved, lol
Avatar
tapatiosec 4/1/2024 5:55 PM
Hey does anyone here have an actual full download of the FQLite software? I saw it on this checklist from the new Hexordia CTF
Avatar
Avatar
tapatiosec
Hey does anyone here have an actual full download of the FQLite software? I saw it on this checklist from the new Hexordia CTF
Avatar
tapatiosec 4/1/2024 5:57 PM
That page has no download link for the software.
Avatar
That icon change is evil
😂 1
Avatar
Avatar
tapatiosec
That page has no download link for the software.
Really?
Avatar
tapatiosec 4/1/2024 6:03 PM
I thought that was an image, it took e a second to figure it out.
6:03 PM
Also I'm in dark mode so it really looks like an image
6:03 PM
Thanks guys
😊 1
Avatar
Avatar
Rock3t
That was def thought over a few easter beers Lol
Digitalferret 4/2/2024 1:07 AM
hehe, you almost know me, and not far off. years back a mate said over a jug of homebrew and when i had the mischief devil whisper in my ear, "You haven't even had a full pint and the bastard valve has blown" 🙂 I'm just a lot older now and it happens on autopilot without any alcoholic intervention. 🤘🏻
🤣 1
😭 1
Avatar
Has anyone had any luck mounting RAID drives with WinFE? Mine doesn't even see the drives. (edited)
Avatar
Avatar
FullTang
Never played Ultima personally, but the shenanigans I have heard of that you could pull with that game were insane lol.
💯
Avatar
Avatar
Digitalferret
hehe, you almost know me, and not far off. years back a mate said over a jug of homebrew and when i had the mischief devil whisper in my ear, "You haven't even had a full pint and the bastard valve has blown" 🙂 I'm just a lot older now and it happens on autopilot without any alcoholic intervention. 🤘🏻
Someone used to be a hooligan 🤣 💀
10:05 AM
you know you were a hooligan when shenanigans are on autopilot 😭 (edited)
😂 1
Avatar
Avatar
silvance.
Has anyone had any luck mounting RAID drives with WinFE? Mine doesn't even see the drives. (edited)
My first thought would be missing drivers.
this 1
Avatar
I didnt even pay attention to his message mb lol
Avatar
Does anyone have any recommendations on how to track down the infected code on WordPress site that you don't have access to the files on the server? It appears to only display when it's a Google referral and stops after about two tries. It also appears not to load/redirect when web tools are open.
Avatar
Run the code through some AI?
Avatar
Avatar
Adam S
Does anyone have any recommendations on how to track down the infected code on WordPress site that you don't have access to the files on the server? It appears to only display when it's a Google referral and stops after about two tries. It also appears not to load/redirect when web tools are open.
randomaccess 4/3/2024 4:15 AM
Gootloader?
Avatar
Avatar
Adam S
Does anyone have any recommendations on how to track down the infected code on WordPress site that you don't have access to the files on the server? It appears to only display when it's a Google referral and stops after about two tries. It also appears not to load/redirect when web tools are open.
without access is tough. I usually find there's evil living in a .htaccess file abusing mod_rewrite and the malicious php files are often written into wp-content/uploads/ or into plugin directories
Avatar
Anyone from @Arsenal ? I got a question regarding license.
Avatar
Hello, Is HackTheBox a good platform for DFIR training ?
Avatar
Avatar
DF971
Hello, Is HackTheBox a good platform for DFIR training ?
Andrew Rathbun 4/4/2024 1:24 PM
#training-education-employment
🥰 1
Avatar
Hi everyone, can i ask a question about iOS forensics in here?
3:01 PM
It’s not even a forensic question, it’s more for how iOS works, im looking through a backup for my device just to practice and i want to know is all apple process start with the prefix (com.apple.example)?
Avatar
House Whiskey 4/5/2024 7:12 AM
@Law Enforcement [UK] Just having a debate in the office. Where do people draw the line of ‘Accessible to the average user’ when it comes to illegal media?
Avatar
dinosaurdave 4/5/2024 7:14 AM
If they can access it using normal features of the device without needing specialised tools
Avatar
Or knowledge
Avatar
Avatar
House Whiskey
@Law Enforcement [UK] Just having a debate in the office. Where do people draw the line of ‘Accessible to the average user’ when it comes to illegal media?
Assuming NTFS and Windows, anything not deleted, not cached or in a cache directory. Recycle Bin (Not deleted) is accessible.
Avatar
Avatar
House Whiskey
@Law Enforcement [UK] Just having a debate in the office. Where do people draw the line of ‘Accessible to the average user’ when it comes to illegal media?
Viewable within main stream applications or galleries without having to dig in to the weeds of the file system
Avatar
dinosaurdave 4/5/2024 7:14 AM
For example, it can be navigated to using the file explorer application or some form of gallery application
👍 1
Avatar
If it's easily access it on the device without specialised settings or apps.
Avatar
Avatar
daco1992
Assuming NTFS and Windows, anything not deleted, not cached or in a cache directory. Recycle Bin (Not deleted) is accessible.
For windows, this. Or if it’s in an obscure location but there are shell bags or MRU : link files then I’d say that’s also accessible having been likely accessed by the relevant user account
Avatar
As above, but including checking 'show hidden files' in explorer is accessible for me
Avatar
Avatar
daco1992
Assuming NTFS and Windows, anything not deleted, not cached or in a cache directory. Recycle Bin (Not deleted) is accessible.
dinosaurdave 4/5/2024 7:16 AM
Recycle Bin is only accessible to the specific user who deleted it so the SIDs would need to match, correct?
Avatar
Nullable Truth 4/5/2024 7:16 AM
I try to take I to account the knowledge of the user. If they have specialist knowledge, and there are artefacts to suggest such technical and specialist usage on the device, they are accessible too
7:17 AM
I don't believe it should be accessible to 'the average user' but what the user is capable of
Avatar
Avatar
House Whiskey
@Law Enforcement [UK] Just having a debate in the office. Where do people draw the line of ‘Accessible to the average user’ when it comes to illegal media?
If you are able to view it on mobile/computer with average knowledge and it doesn’t require a 3rd party tool to parse. I would add additional info if the user wasn’t the average user and they had such tools available however.
👍 1
Avatar
dinosaurdave 4/5/2024 7:19 AM
I agree. If you examined a computer and found the user had a copy of encase and was a digital forensic analyst, then any content within unallocated space is technically accessible to them. So it does also depend on the user
Avatar
Avatar
dinosaurdave
Recycle Bin is only accessible to the specific user who deleted it so the SIDs would need to match, correct?
Depends if you’re doing total of a single user or total on the device, or if the owner used multiple accounts for things etc. but broadly yes, matching SID’s would be a requirement of “Accessible to user X”
Avatar
Avatar
House Whiskey
@Law Enforcement [UK] Just having a debate in the office. Where do people draw the line of ‘Accessible to the average user’ when it comes to illegal media?
I’ve known people create a VM (was a windows machine) and used that to show how easily someone could navigate to the file in question. EG they simply use file explorer, which most folks can use
Avatar
Avatar
SlyBacon
I’ve known people create a VM (was a windows machine) and used that to show how easily someone could navigate to the file in question. EG they simply use file explorer, which most folks can use
So you can effectively recreate how your user would’ve/could’ve done it. Potentially handy for court too.
Avatar
Rich Mahogany 4/5/2024 7:22 AM
@House Whiskey It really does depend case-by-case. I'm intrigued to know the two sides of your debate. I always consider usage patterns of the user in question. Some users with a higher than average level of knowledge could use typically inaccessible locations to store/hide media - but this is rare. You have to treat each case on it's own merit but generally it's like everyone else has said - accessible files are available to an average user in the general files and folders (e.. galleries, documents, pictures) and the inaccessible files are in the caches, unallocated etc.
Avatar
Avatar
SlyBacon
I’ve known people create a VM (was a windows machine) and used that to show how easily someone could navigate to the file in question. EG they simply use file explorer, which most folks can use
Only if you can prove they did it, there’s a world of difference between me on a computer and my mum who doesn’t understand both Chrome and Edge are web browsers
Avatar
Rich Mahogany 4/5/2024 7:23 AM
It's all about the context!
Avatar
It’s interesting here that what most of you presumably refer to is the number counts in the SFR1 which is intended to be a reporting of fact (unless you’re including expert opinion). So presumably you need to be quite black and white, not taking into account what the user may or may not be able to do?
7:25 AM
For computers it seems easy enough - can they see them in explorer with the tools installed on the computer. For phones - are they in the gallery, cloud storage app, vault app or chat app
7:26 AM
deleted files, page file, cache files, internet temp files etc not.
7:26 AM
But really you need a written definition of accessible in your analysis wi which you can report factually on
Avatar
“Cache” can also be accessible, like almost all files in the Discord app data are technically accessible
7:28 AM
Again, that’s a question of what software the user has installed
Avatar
Where it gets fun is on how you count them. Visuallly similar, per hard drive? Per exhibit? Binary similar etc etc
Avatar
Avatar
busted4n6
But really you need a written definition of accessible in your analysis wi which you can report factually on
Rich Mahogany 4/5/2024 7:28 AM
Have you written something like this in your lab?
Avatar
Avatar
busted4n6
Where it gets fun is on how you count them. Visuallly similar, per hard drive? Per exhibit? Binary similar etc etc
Rich Mahogany 4/5/2024 7:28 AM
Can of worms springs to mind
Avatar
what happened to for526 and for532?
Avatar
Avatar
busted4n6
Where it gets fun is on how you count them. Visuallly similar, per hard drive? Per exhibit? Binary similar etc etc
Give a total per exhibit or item, if CPS want a separate count they can ask down the line, as long as it’s clear in the report what method of deduplication has been used.
7:30 AM
1st sector deduplication for unique total items, with a manual review to remove embedded thumbnails, hash deduplication for unique material
Avatar
I think there’s something on our sfr1. Not too sure as I don’t do the analysis for image cases
Avatar
Avatar
daco1992
1st sector deduplication for unique total items, with a manual review to remove embedded thumbnails, hash deduplication for unique material
We just count visually similar (per Griffeye) per exhibit then total exhibits up together.
Avatar
Avatar
busted4n6
We just count visually similar (per Griffeye) per exhibit then total exhibits up together.
There’s for’s and against doing it that way, I fall into the against, but I understand why
Avatar
Avatar
daco1992
“Cache” can also be accessible, like almost all files in the Discord app data are technically accessible
Yes I’d consider the image accessible not because it’s in a cache but because an app can render that image to the user. It’s a pain because not all images carved out of a cache file are viewable but some are 😅
Avatar
Avatar
busted4n6
Yes I’d consider the image accessible not because it’s in a cache but because an app can render that image to the user. It’s a pain because not all images carved out of a cache file are viewable but some are 😅
Yeah, I double check them against my axiom or similar results
Avatar
Avatar
daco1992
There’s for’s and against doing it that way, I fall into the against, but I understand why
I think it was always seen as the ‘fairest’ way to avoid double jeopardy even if in some cases the user has committed the making offence multiple times per a given image by consciously making copies
Avatar
Avatar
busted4n6
I think it was always seen as the ‘fairest’ way to avoid double jeopardy even if in some cases the user has committed the making offence multiple times per a given image by consciously making copies
1st sector with a manual check for thumbnails, sometimes they might have the same image in say 8 different folders, that’s 8 unique instances of the image Swings and roundabouts really, as long as it’s documented how it’s done
Avatar
Avatar
csz
what happened to for526 and for532?
They are no more.
Avatar
Avatar
Rich Mahogany
@House Whiskey It really does depend case-by-case. I'm intrigued to know the two sides of your debate. I always consider usage patterns of the user in question. Some users with a higher than average level of knowledge could use typically inaccessible locations to store/hide media - but this is rare. You have to treat each case on it's own merit but generally it's like everyone else has said - accessible files are available to an average user in the general files and folders (e.. galleries, documents, pictures) and the inaccessible files are in the caches, unallocated etc.
House Whiskey 4/5/2024 8:08 AM
I was on team if any extra options/settings have to be enabled then it would be considered inaccessible. Even if it's a cached image if I can get to it using the file browser I'll mark it accessible. Others were on the side of hidden files on android are accessible because the difference between seeing it and not is a single toggle in the menu options.
8:09 AM
But yes it would vary case by case. If dev options are already enabled etc then I'd be more comfortable arguing the point
Avatar
Avatar
busted4n6
I think it was always seen as the ‘fairest’ way to avoid double jeopardy even if in some cases the user has committed the making offence multiple times per a given image by consciously making copies
I specifically look for the copies on multiple exhibits - corroborates user interaction. Griffeye has a stat for that makes it handy (edited)
Avatar
Avatar
House Whiskey
I was on team if any extra options/settings have to be enabled then it would be considered inaccessible. Even if it's a cached image if I can get to it using the file browser I'll mark it accessible. Others were on the side of hidden files on android are accessible because the difference between seeing it and not is a single toggle in the menu options.
Rich Mahogany 4/5/2024 8:26 AM
Ah yeah. On an Android, I’ve previously had a few people who’ve said similar e.g. “well it’s accessible through the file browser so it’s accessible to them”. But I think that’s very much based on their skillset and personal knowledge. I think it’s important to be cautious regarding whether the user would have knowledge of the files’ existence and how to navigate there. My mum wouldn’t know the first thing about navigating to a cache on her Samsung haha. I think that’s where it gets a little bit grey between a factual result and an examiner’s opinion of the user capability as others were mentioning earlier.
Avatar
I'm having issues with Magnet Axiom Portable Cases crashing after IT implemented a new antivirus program (bitdefender). IT has added several exceptions to try to prevent bitdefender from interfering with the operation of axiom portable cases, to no avail. Anyone have any suggestions?
Avatar
Deleted User 4/5/2024 12:40 PM
starting to get into the basics of dfir, come from an osint, data intelligence background working on a hobby project rn, its a hard drive from an old laptop im setting up a DFIR environment with a second PC im looking for advice on what the best procedure to follow is for extracting data from a drive and what the best software to do so is also any good sources for education material and especially any video content or demonstrations im sure there is loads of software out there, similiar to the osint community i bet theirs also a lot of abandonware so i want to avoid it if I can (edited)
12:41 PM
not even focused on how to anaylze the data, mostly focused on properly setting up my environment and establishing good foundational procedures that will help me avoid any pitfalls or mistakes that people commonly make when handling this kind of work
Avatar
Hi all! Posted sometime back with regards to pursuing a career in DIFR. Was wondering if any seniors here can give some advice 🫡 TLDR: Graduate program in DFIR, no SOC/SIEM work experience other than some intro courses. Interested in threat hunting/DFIR, should i take a step back, 'downgrade' my career and work on SOC, or should I say in IR and work my way up? If so, how do I do that? Additionally, as a DFIR specialist, after working on Windows host endpoints, would network/reverse engineering/mac or linux endpoints be my next objective? Ty! (edited)
Avatar
Brett Shavers 4/5/2024 7:33 PM
DFIR Investigative Mindset book is now available. Amazon's price is $59.99 at https://amzn.to/4aMWBMZ
Placing the Suspect Behind the Keyboard: DFIR Investigative Mindset
👏 5
Avatar
Avatar
Brett Shavers
DFIR Investigative Mindset book is now available. Amazon's price is $59.99 at https://amzn.to/4aMWBMZ
Brett Shavers 4/5/2024 7:35 PM
Or you can get it half price during the book launch here: https://www.suspectbehindthekeyboard.com/pl/2148302359
Learn from the collective experiences of top-tier detectives and agents from around the globe, distilled into a guide that's both comprehensive and accessible. "DFIR Investigative Mindset" is a career-defining resource that will shape your approach to DFIR for years to come.
Avatar
Brett Shavers 4/5/2024 9:30 PM
Book launch started; half price for a few days here: https://www.suspectbehindthekeyboard.com/mindset-book
Learn from the collective experiences of top-tier detectives and agents from around the globe, distilled into a guide that's both comprehensive and accessible. "DFIR Investigative Mindset" is a career-defining resource that will shape your approach to DFIR for years to come.
🔥 1
Avatar
Avatar
Leonidas
I'm having issues with Magnet Axiom Portable Cases crashing after IT implemented a new antivirus program (bitdefender). IT has added several exceptions to try to prevent bitdefender from interfering with the operation of axiom portable cases, to no avail. Anyone have any suggestions?
Stand-alone device without BitDefender
Avatar
In the future, if an organization entrusts its entire security to AI, do you believe the job market in cybersecurity will shrink? Additionally, what are your concerns about the potential risks of relying solely on AI for an organization's security?
Avatar
Husky_M00s3 4/6/2024 3:50 AM
If you are just practicing, I would not invest in a hardware write blocker or anything like that. If you want to understand the concept, use a registry hack for a software write blocker to test it out. It’s sounds like you want to focus on computer forensics. I would recommend different tools for mobile. To start: some test devices, an acquisition tool, and some analysis tools will work. Acquisition: Magnet Acquire or FTK Imager. Analysis: https://www.sans.org/tools/sift-workstation/ Autopsy @Deleted User (edited)
Download the SIFT Workstation to receive free open-source incident response and digital forensic tools designed to perform detailed digital forensic examinations in a variety of settings.
💯 1
Avatar
Avatar
M3r1T
In the future, if an organization entrusts its entire security to AI, do you believe the job market in cybersecurity will shrink? Additionally, what are your concerns about the potential risks of relying solely on AI for an organization's security?
Digitalferret 4/6/2024 4:25 AM
if an organization entrusts its entire security to AI
4:25 AM
SPOILER
Image attachment
Avatar
Avatar
Brett Shavers
DFIR Investigative Mindset book is now available. Amazon's price is $59.99 at https://amzn.to/4aMWBMZ
My copy will arrive on Tuesday. Looking forward to reading it 👍
Avatar
Hey everyone, how do you create and prove your own evidence? For example, installing some cloud tools sending data from A to B an check then where you can find usable evidence? I learned to capture the logs of the operating system then snapshot it, and start with evidence generation. After that i have to check the difference between the traces. Is there a more comfortable way to do this?
Avatar
Avatar
M3r1T
In the future, if an organization entrusts its entire security to AI, do you believe the job market in cybersecurity will shrink? Additionally, what are your concerns about the potential risks of relying solely on AI for an organization's security?
AI is a tool, just like a computer that it is used to improve efficiency. At the end of the day, management can only blame a real human, not AI. (edited)
👍 1
💯 2
Avatar
Digital Dude 4/7/2024 9:19 AM
Any one got a good web site for explaining file paths of an iphone?
Avatar
Avatar
Digital Dude
Any one got a good web site for explaining file paths of an iphone?
SQLite databases are a self-contained database stored as a file system file (but may have a few supporting files that will also be needed for analysis!) Files have the magic number “SQLite format 3.” SQLite files correspond to a database that contains tables. Tables contain rows of data with corresponding columns that describe the data in the ro...
This poster features "Evidence of..." categories that provide key macOS and iOS operating system artifacts that are relevant to digital investigations, and map to those provided by SANS DFIR Faculty for Windows systems in the Windows Forensic Analysis poster.
Avatar
Avatar
chauan
AI is a tool, just like a computer that it is used to improve efficiency. At the end of the day, management can only blame a real human, not AI. (edited)
Agreed and the time I have spent testing with AI I have found a huge gap between reality and marketing hype. My first computer lesson when I was about 10 years old, the teacher said "the machine will only do what you tell it to do". The current state of AI is nowhere near to solving this but can write nice Facebook posts.
💯 2
Avatar
Avatar
Husky_M00s3
If you are just practicing, I would not invest in a hardware write blocker or anything like that. If you want to understand the concept, use a registry hack for a software write blocker to test it out. It’s sounds like you want to focus on computer forensics. I would recommend different tools for mobile. To start: some test devices, an acquisition tool, and some analysis tools will work. Acquisition: Magnet Acquire or FTK Imager. Analysis: https://www.sans.org/tools/sift-workstation/ Autopsy @Deleted User (edited)
Deleted User 4/7/2024 3:05 PM
Thanks! I am also taking the DFE course from https://codered.eccouncil.org/home
EC-Council Learning has complete course library comprising of cybersecurity courses, IT courses, data science and much more. Browse courses and develop new skills with industry work role learning paths.
3:05 PM
Will let you all know what I think of it.
Avatar
Deleted User 4/7/2024 6:38 PM
Just bought my first tableau kit to finish up my workstation for DFIR. Looking forward to learning this all. I was recommended IACIS for getting my certifications to go into this professionally when I'm ready. Is that the best certification for this?
Avatar
Avatar
KohleR
Agreed and the time I have spent testing with AI I have found a huge gap between reality and marketing hype. My first computer lesson when I was about 10 years old, the teacher said "the machine will only do what you tell it to do". The current state of AI is nowhere near to solving this but can write nice Facebook posts.
Deleted User 4/7/2024 6:40 PM
I think AI, especially AGI and GENAI is still marketing hype. ML is where it's at. The sheer power of certain machine learning models when applied within intelligence work is just amazing. (edited)
Avatar
Avatar
Deleted User
Just bought my first tableau kit to finish up my workstation for DFIR. Looking forward to learning this all. I was recommended IACIS for getting my certifications to go into this professionally when I'm ready. Is that the best certification for this?
randomaccess 4/8/2024 12:47 AM
#itdepends
🤣 2
Avatar
Avatar
Deleted User
Just bought my first tableau kit to finish up my workstation for DFIR. Looking forward to learning this all. I was recommended IACIS for getting my certifications to go into this professionally when I'm ready. Is that the best certification for this?
It's probably the only vendor-neutral, affordable with structured training and certs for DF at the moment.
💯 1
Avatar
Avatar
Leonidas
I'm having issues with Magnet Axiom Portable Cases crashing after IT implemented a new antivirus program (bitdefender). IT has added several exceptions to try to prevent bitdefender from interfering with the operation of axiom portable cases, to no avail. Anyone have any suggestions?
IT doesn't get to touch my devices and my devices don't get to touch IT's network... we're both happier that way.
💯 7
Avatar
Avatar
whee30
IT doesn't get to touch my devices and my devices don't get to touch IT's network... we're both happier that way.
Digitalferret 4/9/2024 2:01 AM
universal thing. last place i worked the guy and his role was renamed from <John Smith> "IT Manager" to <John Smith> "IT Mangler". had some absolute howlers there 🙂
🤣 2
Avatar
Digital Dude 4/9/2024 2:57 AM
Thanks man... I'll look them up
Avatar
Avatar
whee30
IT doesn't get to touch my devices and my devices don't get to touch IT's network... we're both happier that way.
Other Detectives need to see the Portable Cases. It's why I generate them, otherwise I'd just use Examine on my Talino.
Avatar
kmacdonald1565 4/9/2024 9:56 AM
anyone have any recent experience with a phone clone investigation or scam? I thought this was for the most part almost nonexistent any more. edit to add: I had a local saying he had 2 complaints of a phone being cloned...one involved a cashapp loss and the victim was speculating what happened, the other one was not specific, but it sounds like a possible mental health episode. Since he had 2 come in, I figured I would ask. I remember it being a thing in National Treasure 2 🤣 (edited)
Avatar
Avatar
Leonidas
I'm having issues with Magnet Axiom Portable Cases crashing after IT implemented a new antivirus program (bitdefender). IT has added several exceptions to try to prevent bitdefender from interfering with the operation of axiom portable cases, to no avail. Anyone have any suggestions?
kmacdonald1565 4/9/2024 9:58 AM
similarly, i just had a new complaint of a portable case not opening due to sophos stopping it...i was able to get around it by launching the contained examine.exe first then navigating to the case to open up the portable case. its a pain in the butt but the "opencase.exe" or whatever its called threw an exception to the AV for whatever reason. Both examine and the case worked fine 🤷
Avatar
Avatar
Leonidas
Other Detectives need to see the Portable Cases. It's why I generate them, otherwise I'd just use Examine on my Talino.
It's not an apples to apples comparison but I remember that the old Cellebrite readers leveraged some type of elastic search that was caught up in the log4j vulnerability. Made the readers stop working for a while but whitelisting the program fixed it in my case. Sounds like they already tried whitelisting on your systems? I have gotten around that stuff by having some "throw down" laptops to lend out to my detectives. Same rules about not plugging into the town network apply to those though
10:20 AM
I wonder if there was a sweeping new change from some recent vulnerability that got the portable case sidelined
Avatar
Avatar
whee30
I wonder if there was a sweeping new change from some recent vulnerability that got the portable case sidelined
kmacdonald1565 4/9/2024 10:25 AM
there had do be I would think....maybe not all of the AVs picked it up, but there had to be something for it to be a sudden issue on two different systems at the same time.
Avatar
Avatar
kmacdonald1565
similarly, i just had a new complaint of a portable case not opening due to sophos stopping it...i was able to get around it by launching the contained examine.exe first then navigating to the case to open up the portable case. its a pain in the butt but the "opencase.exe" or whatever its called threw an exception to the AV for whatever reason. Both examine and the case worked fine 🤷
that solution worked for us too, the issue that raises is that there is no access to the "home screen" in portable case AND getting less tech inclined detectives to navigate to the .exe isnt a painless process
Avatar
Avatar
Leonidas
that solution worked for us too, the issue that raises is that there is no access to the "home screen" in portable case AND getting less tech inclined detectives to navigate to the .exe isnt a painless process
kmacdonald1565 4/9/2024 11:11 AM
ah, I didn't notice that... my detective had been looking at a case for literally weeks and one day it wouldn't open. He apparently didn't need the home screen because he didn't complain otherwise.
Avatar
Avatar
kmacdonald1565
ah, I didn't notice that... my detective had been looking at a case for literally weeks and one day it wouldn't open. He apparently didn't need the home screen because he didn't complain otherwise.
it isn't a total loss, you just can't look at my notes or see the summary. I saw that magnet just released axiom 8.0. i'm hoping for a fix.
Avatar
kmacdonald1565 4/9/2024 11:12 AM
nice
Avatar
Hey, has anyone been able to download kape for the last day or two? It keeps showing me this when I try
Avatar
Avatar
kmacdonald1565
anyone have any recent experience with a phone clone investigation or scam? I thought this was for the most part almost nonexistent any more. edit to add: I had a local saying he had 2 complaints of a phone being cloned...one involved a cashapp loss and the victim was speculating what happened, the other one was not specific, but it sounds like a possible mental health episode. Since he had 2 come in, I figured I would ask. I remember it being a thing in National Treasure 2 🤣 (edited)
Perhaps it was a SIM swap? If it was, from my worldview they seemed to increase a few months back.
Avatar
Avatar
KohleR
Perhaps it was a SIM swap? If it was, from my worldview they seemed to increase a few months back.
kmacdonald1565 4/10/2024 6:25 AM
🤷‍♂️
6:25 AM
most of the time i hear it as a complaint i just think someone has watched too much TV
6:26 AM
😂 2
Avatar
Digitalferret 4/10/2024 6:33 AM
anyone at @Magnet Forensics free for a quick (non tech) DM?
Avatar
Avatar
Digitalferret
anyone at @Magnet Forensics free for a quick (non tech) DM?
cScottVance 4/10/2024 6:35 AM
Yup! Shoot me a message.
Avatar
If you had unlimited funds, and the main requirement was for speed and built in bypasses, which products/tools would you get for forensic acquisitions (logical-physical), by category? For context, You a red team operator, and you find a phone/laptop on a desk and have 30-60 minutes in the broom closet with it 😉 Apple and/or Android? macOS and/or Windows? Removable Media / IoT devices? (edited)
Avatar
Anyone have any experience viewing DICOM images. Got a disc from a hospital i've been ask to make viewable, but the viewer (IQ-Lite) give a exception when trying to run. (No mapping for the Unicode character exists in the target multi-byte code page) Occurrs on every machine i attempt to use it on, and can't work out from the error which character set I'm supposidly missing
Avatar
Avatar
Will-ko
Anyone have any experience viewing DICOM images. Got a disc from a hospital i've been ask to make viewable, but the viewer (IQ-Lite) give a exception when trying to run. (No mapping for the Unicode character exists in the target multi-byte code page) Occurrs on every machine i attempt to use it on, and can't work out from the error which character set I'm supposidly missing
Digitalferret 4/10/2024 3:30 PM
how many images? maybe https://www.imaios.com/en/imaios-dicom-viewer if it's not so many
Avatar
has to be offline
3:31 PM
thanks for the suggestion though
Avatar
Avatar
Will-ko
thanks for the suggestion though
Digitalferret 4/10/2024 3:33 PM
Safeguarding the confidentiality of healthcare data Your files are not uploaded to our network: Your computer handles everything. Uploaded data is not imported via the Internet, guaranteeing the security of patients' medical information.
3:35 PM
but also, if you need offline viewer, check that it's compatible with the type of imges you have (edited)
Avatar
thanks I'll give these a look
Avatar
Does anyone have a tool for analysing, sorting an then searching a large number of images. I am using @Cellebrite and wanted to find any instances of the user screenshotting conversations with a person of interest. However after running cellebrites AI image classifier for screenshots I am left with 6.5k images. To make matters worse most of these are from caches and as such Cellebrite doesn't give me details such as resolution. Further the preview image provided by cellebrite is too small to read the text and Gallery view is not able to be filtered. I have noticed the user uses a dark background for his texts and so I figure I can start by selecting all the dark images with the correct screen resolution and was wondering if there was any software which could do this sort of thing. If there was some sort of software which could read the text from the screenshots which I could then search that would be even better. (edited)
Avatar
Avatar
Alexsaurus
Does anyone have a tool for analysing, sorting an then searching a large number of images. I am using @Cellebrite and wanted to find any instances of the user screenshotting conversations with a person of interest. However after running cellebrites AI image classifier for screenshots I am left with 6.5k images. To make matters worse most of these are from caches and as such Cellebrite doesn't give me details such as resolution. Further the preview image provided by cellebrite is too small to read the text and Gallery view is not able to be filtered. I have noticed the user uses a dark background for his texts and so I figure I can start by selecting all the dark images with the correct screen resolution and was wondering if there was any software which could do this sort of thing. If there was some sort of software which could read the text from the screenshots which I could then search that would be even better. (edited)
If it's an iPhone filter the dcim path from the images folder view and apply the .PNG file type filter
Avatar
Avatar
Solec
If it's an iPhone filter the dcim path from the images folder view and apply the .PNG file type filter
unfortunately most of the images are from the cache
6:07 PM
also not iPhone
Avatar
Avatar
Alexsaurus
also not iPhone
If you have access to XWays or Axiom, or Griffeye. all have an OCR capability.
Avatar
Avatar
Alexsaurus
Does anyone have a tool for analysing, sorting an then searching a large number of images. I am using @Cellebrite and wanted to find any instances of the user screenshotting conversations with a person of interest. However after running cellebrites AI image classifier for screenshots I am left with 6.5k images. To make matters worse most of these are from caches and as such Cellebrite doesn't give me details such as resolution. Further the preview image provided by cellebrite is too small to read the text and Gallery view is not able to be filtered. I have noticed the user uses a dark background for his texts and so I figure I can start by selecting all the dark images with the correct screen resolution and was wondering if there was any software which could do this sort of thing. If there was some sort of software which could read the text from the screenshots which I could then search that would be even better. (edited)
Here are a few ideas using XWays that come to mind with those details: 1) XWF has “software classes” that includes “screenshot” that might help for jpeg files. 2) Building on the observation about the dark background, XWF via Excire can report on color themes, i.e., black, and can be further filtered based on resolution. 3) As previously suggested, XWFs OCR capability using Tesseract and simultaneous search might also help narrow the search. (edited)
Avatar
Avatar
Alexsaurus
Does anyone have a tool for analysing, sorting an then searching a large number of images. I am using @Cellebrite and wanted to find any instances of the user screenshotting conversations with a person of interest. However after running cellebrites AI image classifier for screenshots I am left with 6.5k images. To make matters worse most of these are from caches and as such Cellebrite doesn't give me details such as resolution. Further the preview image provided by cellebrite is too small to read the text and Gallery view is not able to be filtered. I have noticed the user uses a dark background for his texts and so I figure I can start by selecting all the dark images with the correct screen resolution and was wondering if there was any software which could do this sort of thing. If there was some sort of software which could read the text from the screenshots which I could then search that would be even better. (edited)
CLB-DannyTheModeler 4/11/2024 12:56 AM
Alex, Here are a few tips that may help: 1) In Inseyets PA you can run the Media Origin feature when processing the case. This feature will not only identify which Images were taken on the device, it will also identify if the files were created using the screenshot app and identify files that are copies of an original image. 2) You can use the Dedup Option to either complete hide, or group files that have the same MD5 hash. 3) As suggested, you can use the path filters. 4) While we don't have a dedicated resolution filter, you can use the Size filter. 5) In the Actions menu (right next to the Filters menu) you have the option to increase decrease thumbnail size, so you can find the optimal balance for your review. (edited)
Avatar
Hi everyone, Does anyone know what is "C:\Windows\system32\cmd.exe /S /C ""chcp" 437>nul 2>&1 & "%systemroot%\system32\netsh" advfirewall show global categories" command does? And also the process chcp.com ? in windows 7 I'm working on Ransomeware incident and observing frequent process creations and terminations occurring in less time frame. Process were cmd.exe, spoolsv.exe ( frompath "C:\Windows\system32\SecureBootThemes\spoolsv.exe"), chcp.com, ( from path C:\Windows\System32\chcp.com), svchost ( from path C:\Windows\SecureBootThemes\Microsoft\svchost.exe) I couldn't able to determine what is chcp.com and why it is been used and what is above above command?
Avatar
I sent Apple a preservation request as I don't have the current iCloud/apple id for the suspect. On the first line I gave my suspects name along with date of birth and known phone for my suspect. On the next line I again gave my suspects name but this time her mailing address. On the final line I placed the known e-mail address of my suspect. When apple responded they said Apple has determined that telephone number xxx-xxx-xxxx has been associated with FaceTime and iMessage; but has not been associated with a customer account. Therefore, there is no iCloud data to preserve. Any available FaceTime invitation logs and iMessage capability query logs have been preserved for 90 days. If you require additional time to obtain legal process compelling production of preserved data, you may request a one-time 90-day extension of the preservation period, which request must be received prior to the end of the original 90-day period. After a reasonable search, Apple was unable to locate any account(s) associated with the information (suspect address / suspect name) identified in the preservation request, and therefore has no data to preserve. In between sending my preservation letter and them sending me their response I issued them a subpoena with the same information. If they did not specify anything with the e-mail address that I gave them would that mean they located the account associated with that and they will preserve it and later be able to provide data of the subpoena and then a search warrant.
Avatar
We have an employee who said something stupid on Twitter (I refuse to call it X) and when asked about it they said they were "hacked". I'm not LE so I can't get a warrant for Twitter, what are some ideas to help me prove if they are just an idiot. Does that app leave any artifacts on their phone or is everything useful stored server side? I'm thinking of trying to get an advanced logical of the phone and look at the activity surrounding the posts in question. Anyone have any ideas or tips for me?
Avatar
Hello! To incident responders Where do you collect attacker IOCs on real time? In an excel, notepad, word? Any software or any template to make the work easier?
Avatar
Trashboat667 4/11/2024 11:48 AM
Is there a way to exclude all of the non-pertinent files from the portable case generation in Axiom without making a special tag for them and excluding the tag? (edited)
Avatar
Joey Juarez 4/11/2024 12:01 PM
Hello Members, I am reaching out for one of our partners that is looking for a repair shop for a Helium filled 3.5 hard drive (spinner drive). Need to be disassembled, repaired. I know this is a tall order, hopefully this group can help. Please reachout to me and I'll pass on the contact information. Cheers, Joey
Avatar
Can anyone point me to where Cellebrite is pulling the "Sync host name" for iOS devices. It's not apparent from the interface
Avatar
Avatar
Jason
We have an employee who said something stupid on Twitter (I refuse to call it X) and when asked about it they said they were "hacked". I'm not LE so I can't get a warrant for Twitter, what are some ideas to help me prove if they are just an idiot. Does that app leave any artifacts on their phone or is everything useful stored server side? I'm thinking of trying to get an advanced logical of the phone and look at the activity surrounding the posts in question. Anyone have any ideas or tips for me?
Sounds like a lot of wasted energy for something stupid. I’d ether move on or fire them and be done with it. Having said that, I wouldn’t be giving my phone to my employer without a warrant or court order. 😁
12:22 PM
I mean we have privacy laws for a reason, imagine your boss going through your phone lol
Avatar
Avatar
CLB-DannyTheModeler
Alex, Here are a few tips that may help: 1) In Inseyets PA you can run the Media Origin feature when processing the case. This feature will not only identify which Images were taken on the device, it will also identify if the files were created using the screenshot app and identify files that are copies of an original image. 2) You can use the Dedup Option to either complete hide, or group files that have the same MD5 hash. 3) As suggested, you can use the path filters. 4) While we don't have a dedicated resolution filter, you can use the Size filter. 5) In the Actions menu (right next to the Filters menu) you have the option to increase decrease thumbnail size, so you can find the optimal balance for your review. (edited)
Thanks, I have run the media origin feature however many of these images are .0 files from caches and as such don't have an obvious origin. I have already used dedup, path filters and size limits. This has gotten me down to the 6k images. While I can increase the thumbnail size even at the largest it is too small to make out the details around who the messages too. The preview in the right panel is what I have to use however the method used for downscaling images to fit that window is rough on text. See the attached image. It would be nice if I could increase the size of the image in the right panel.
Avatar
Avatar
NVLSvenu
Hi everyone, Does anyone know what is "C:\Windows\system32\cmd.exe /S /C ""chcp" 437>nul 2>&1 & "%systemroot%\system32\netsh" advfirewall show global categories" command does? And also the process chcp.com ? in windows 7 I'm working on Ransomeware incident and observing frequent process creations and terminations occurring in less time frame. Process were cmd.exe, spoolsv.exe ( frompath "C:\Windows\system32\SecureBootThemes\spoolsv.exe"), chcp.com, ( from path C:\Windows\System32\chcp.com), svchost ( from path C:\Windows\SecureBootThemes\Microsoft\svchost.exe) I couldn't able to determine what is chcp.com and why it is been used and what is above above command?
randomaccess 4/11/2024 4:21 PM
Move this to the IR channel and you might get a response since it looks like it was missed. Chcp changes the code page. Would have to read about why they're doing it though. That svchost is sus though. Is it the c2 process
👍🏾 1
Avatar
Avatar
Trashboat667
Is there a way to exclude all of the non-pertinent files from the portable case generation in Axiom without making a special tag for them and excluding the tag? (edited)
Couple of ways i can think of. In the initial processing, you can match against a known database and exclude those non-pertinent files. If you already processed them and going to create a portable case -> from the 'artifacts' section, you should be able to filter down to everything except the non-pertinent files checking all the categories in the 'Media Categorization' tab that you want. Then from the 'Create portable case', there should be an option for 'everything in the present view'
Avatar
Avatar
rfar
Couple of ways i can think of. In the initial processing, you can match against a known database and exclude those non-pertinent files. If you already processed them and going to create a portable case -> from the 'artifacts' section, you should be able to filter down to everything except the non-pertinent files checking all the categories in the 'Media Categorization' tab that you want. Then from the 'Create portable case', there should be an option for 'everything in the present view'
Trashboat667 4/11/2024 6:05 PM
What I’ve been doing is running everything against my hashset of non pertinents and marking any new non pertinents to add to the hashset. Then I filter to only show the non pertinents and tagging them with a new tag called exclusions. Then when I make the portable case I select that new tag as the items to be excluded. I was wondering if there was a way to just exclude the non pertinent files without making a new tag and tagging them all with it. Hoping to save a step and just exclude non pertinents without any further tagging.
Avatar
Avatar
Juanjo
Hello! To incident responders Where do you collect attacker IOCs on real time? In an excel, notepad, word? Any software or any template to make the work easier?
Killithid the Mindslayer™ 4/11/2024 6:14 PM
I would suggest using a (X)SOAR. With the right configuration, a SOAR with a threat intelligence management platform (along with a lot of API integration to your other tools) can be a real game changer. You can create custom tags for IOCs, or create scripts that can take an IOC and block it at the firewall (or at the tenant for things like M365 integration) and add the appropriate tags -- all with the push of a button. You can also enrich IOCs with things like VirusTotal & AlienVault APIs. Use your SOAR to ingest all of your various alert types, build incident playbooks and automated response actions, keep your case notes inside of the incidents generated in the SOAR... including your IOCs. Plus, that way as you're adding things in real time, it's available to your fellow analysts, and it doesn't die in darkness in a notepad somewhere. 😅 (edited)
❤️ 1
Avatar
Avatar
bmarvin.
I sent Apple a preservation request as I don't have the current iCloud/apple id for the suspect. On the first line I gave my suspects name along with date of birth and known phone for my suspect. On the next line I again gave my suspects name but this time her mailing address. On the final line I placed the known e-mail address of my suspect. When apple responded they said Apple has determined that telephone number xxx-xxx-xxxx has been associated with FaceTime and iMessage; but has not been associated with a customer account. Therefore, there is no iCloud data to preserve. Any available FaceTime invitation logs and iMessage capability query logs have been preserved for 90 days. If you require additional time to obtain legal process compelling production of preserved data, you may request a one-time 90-day extension of the preservation period, which request must be received prior to the end of the original 90-day period. After a reasonable search, Apple was unable to locate any account(s) associated with the information (suspect address / suspect name) identified in the preservation request, and therefore has no data to preserve. In between sending my preservation letter and them sending me their response I issued them a subpoena with the same information. If they did not specify anything with the e-mail address that I gave them would that mean they located the account associated with that and they will preserve it and later be able to provide data of the subpoena and then a search warrant.
Maybe enter suspects email address into iMessage and see if it turns blue. I also wonder if they have an email address that they only use for an iCloud account that is not their everyday email address.
Avatar
Has anyone dealt with public records requests involving cellebrite reports?
Avatar
Avatar
yeoj112689
Has anyone dealt with public records requests involving cellebrite reports?
Seems like that would be nightmare
Avatar
Avatar
DCSO
Seems like that would be nightmare
Yeah… had someone request all evidence records for a case.. 14 phones. Our public records wants us to release it. Would be virtually impossible to go through all that data even if we had the man power. We only have 2 people in office and we do over 1000 phones a year let alone computers/cars/etc so we don’t have time to do that as it is and no one else would know how. That aside how are they going to expect us to release someone’s entire life to public record.
Avatar
Avatar
yeoj112689
Yeah… had someone request all evidence records for a case.. 14 phones. Our public records wants us to release it. Would be virtually impossible to go through all that data even if we had the man power. We only have 2 people in office and we do over 1000 phones a year let alone computers/cars/etc so we don’t have time to do that as it is and no one else would know how. That aside how are they going to expect us to release someone’s entire life to public record.
I don't think you could do that, that phone would contain private data 100% that is not case related. Public records needs to be educated, maybe talk to a state agency and the civil attorney that deals with data request for them. We would not release that.
Avatar
Avatar
DCSO
I don't think you could do that, that phone would contain private data 100% that is not case related. Public records needs to be educated, maybe talk to a state agency and the civil attorney that deals with data request for them. We would not release that.
Yeah this was just brought to our attention a few days ago so we’re still in the early age of trying to figure out what they were thinking. It’s crazy to me.
Avatar
digital Bowles 4/12/2024 2:25 PM
Not sure where to ask this question..... my agency does not issues official cell phones (not the big issues). I am looking for like a 3rd party company to setup a separate work line. Not a UC line, but also don't want my information everywhere. Other then textnow and Google voice, any accommodations. I proudly use an Android.
Avatar
Avatar
Buck
Hey, has anyone been able to download kape for the last day or two? It keeps showing me this when I try
I tried a few days ago and was unable to as well 😦
Avatar
Hi everyone ive been looking at making my own USB for practicing the gathering data, possibly even through something like a rubber ducky to plug in and image PCs, what would you guys recommend to have/build i was thinking something like Hiren boot might be a handy tool for this and general PC recovery?
Avatar
Avatar
Red4rr0w
Hi everyone ive been looking at making my own USB for practicing the gathering data, possibly even through something like a rubber ducky to plug in and image PCs, what would you guys recommend to have/build i was thinking something like Hiren boot might be a handy tool for this and general PC recovery?
You may have a look at Tsurugi. Haven't used it in a while but should offer what you want. https://tsurugi-linux.org/tsurugi_acquire.php
Welcome to TSURUGI Linux world the new DFIR open source distribution to perform your digital forensics analysis and for educational pourposes
💯 1
Avatar
Avatar
Tommy
You may have a look at Tsurugi. Haven't used it in a while but should offer what you want. https://tsurugi-linux.org/tsurugi_acquire.php
oh cool thanks, ill have a play around with it and see
Avatar
Avatar
Killithid the Mindslayer™
I would suggest using a (X)SOAR. With the right configuration, a SOAR with a threat intelligence management platform (along with a lot of API integration to your other tools) can be a real game changer. You can create custom tags for IOCs, or create scripts that can take an IOC and block it at the firewall (or at the tenant for things like M365 integration) and add the appropriate tags -- all with the push of a button. You can also enrich IOCs with things like VirusTotal & AlienVault APIs. Use your SOAR to ingest all of your various alert types, build incident playbooks and automated response actions, keep your case notes inside of the incidents generated in the SOAR... including your IOCs. Plus, that way as you're adding things in real time, it's available to your fellow analysts, and it doesn't die in darkness in a notepad somewhere. 😅 (edited)
Thanks for the response! And how would you do in an environment if you have a microsoft sentinel just to search logs and nothing else?
Avatar
Avatar
Juanjo
Thanks for the response! And how would you do in an environment if you have a microsoft sentinel just to search logs and nothing else?
Killithid the Mindslayer™ 4/13/2024 3:43 AM
While you can always use an IR spreadsheet with excel (something akin to the examples provided by SANS), specifically for IOCs, you might try the threat intelligence indicator tagging portion of Sentinel (ref: https://learn.microsoft.com/en-us/azure/sentinel/work-with-threat-indicators?tabs=azure-portal) or, alternatively, you might look at something like this: https://github.com/cyb3rfox/Aurora-Incident-Response
This article explains how to view, create, manage, and visualize threat intelligence indicators in Microsoft Sentinel.
Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders - cyb3rfox/Aurora-Incident-Response
❤️ 1
Avatar
Avatar
Killithid the Mindslayer™
While you can always use an IR spreadsheet with excel (something akin to the examples provided by SANS), specifically for IOCs, you might try the threat intelligence indicator tagging portion of Sentinel (ref: https://learn.microsoft.com/en-us/azure/sentinel/work-with-threat-indicators?tabs=azure-portal) or, alternatively, you might look at something like this: https://github.com/cyb3rfox/Aurora-Incident-Response
Thanks! I will study it
Salute 1
Avatar
bob the sexy builder 4/13/2024 4:08 AM
if you were told to write an incident response playbook, but were only allowed 1.5k words...howd you go about it? me and my group have done it but found it rather annoying that we werent allowed any words
Avatar
Avatar
Red4rr0w
Hi everyone ive been looking at making my own USB for practicing the gathering data, possibly even through something like a rubber ducky to plug in and image PCs, what would you guys recommend to have/build i was thinking something like Hiren boot might be a handy tool for this and general PC recovery?
Digitalferret 4/13/2024 4:42 AM
https://www.caine-live.net/ + check menu [Windows Side]
4:43 AM
Hiren might just be too old to be useful now. I've not checked in years, but i understand it stopped some time ago (edited)
Avatar
Oh right thanks, would CAINE be actively updated and still continuing to be used a lot?
Avatar
Avatar
Red4rr0w
Oh right thanks, would CAINE be actively updated and still continuing to be used a lot?
Digitalferret 4/13/2024 4:51 AM
its younger than Hiran by a good margin
4:52 AM
last release ~12months ago
4:53 AM
full instructions, manual, forum etc
Avatar
Tommy mentioned Tsurugi what's the benefit of CAINE is there any good comparison resources that talk about their uses and which might be best?
Avatar
Avatar
Red4rr0w
Tommy mentioned Tsurugi what's the benefit of CAINE is there any good comparison resources that talk about their uses and which might be best?
Digitalferret 4/13/2024 5:09 AM
um, my bad i didn't see the Tsurugi reply, yeh, same sort of thing, possibly more in depth. i suppose it's like a "which protein is best?" questions. folks will grab something and run with it. if it doesn't suit there needs or isn't that intuitive, they'll swap. PartitonMagic, ParrotOS, Kali, Tsurugi, Paladin, BlackArch, N.E.Other Linux and command line it. As you'd probably guess the proprietary offerings will make things easier, but for starting off, i always recommend grabbing drives from ebay/craigs, and running with it see what you can get, usual legal warnings apply 🙂
👍 2
Avatar
Avatar
Digitalferret
um, my bad i didn't see the Tsurugi reply, yeh, same sort of thing, possibly more in depth. i suppose it's like a "which protein is best?" questions. folks will grab something and run with it. if it doesn't suit there needs or isn't that intuitive, they'll swap. PartitonMagic, ParrotOS, Kali, Tsurugi, Paladin, BlackArch, N.E.Other Linux and command line it. As you'd probably guess the proprietary offerings will make things easier, but for starting off, i always recommend grabbing drives from ebay/craigs, and running with it see what you can get, usual legal warnings apply 🙂
We have a hardware store called Bunnings that have electronic bins I may go through
👍🏻 1
Avatar
Avatar
Digitalferret
Hiren might just be too old to be useful now. I've not checked in years, but i understand it stopped some time ago (edited)
It has been revived, but I would lean more towards WinFE if we’re looking at Windows based. https://www.hirensbootcd.org
👍🏻 1
Avatar
Avatar
Red4rr0w
We have a hardware store called Bunnings that have electronic bins I may go through
randomaccess 4/13/2024 6:27 AM
You mean hammerbarn
😆 2
Avatar
Avatar
digital Bowles
Not sure where to ask this question..... my agency does not issues official cell phones (not the big issues). I am looking for like a 3rd party company to setup a separate work line. Not a UC line, but also don't want my information everywhere. Other then textnow and Google voice, any accommodations. I proudly use an Android.
The way I have deal with this is using a Google Voice number. I have also used VoIP.ms to setup a VoIP number and use the app Groundwire as a softphone client. There are many other softphone clients and they have good documentation setting various systems up to work with their service. That has worked very well for me so far also. A VoIP number from them is $0.99 a month plus whatever the rate for minutes is. At most I think I have spent like $10 one month I think and that was because I was playing around with different setups as far as how numbers routed. Google Voice has worked well for me, but I am always paranoid what would happen if I loose access to the Google account it's connect to or if Google were to stop supporting Google Voice.
Avatar
Avatar
CyberGhost
The way I have deal with this is using a Google Voice number. I have also used VoIP.ms to setup a VoIP number and use the app Groundwire as a softphone client. There are many other softphone clients and they have good documentation setting various systems up to work with their service. That has worked very well for me so far also. A VoIP number from them is $0.99 a month plus whatever the rate for minutes is. At most I think I have spent like $10 one month I think and that was because I was playing around with different setups as far as how numbers routed. Google Voice has worked well for me, but I am always paranoid what would happen if I loose access to the Google account it's connect to or if Google were to stop supporting Google Voice.
I use my Google Voice number for a ton of things, and I am also paranoid they will stop that service like they have ditched other services in the past. I hope that they would at least give some warning before getting rid of it.
Avatar
Avatar
CyberGhost
The way I have deal with this is using a Google Voice number. I have also used VoIP.ms to setup a VoIP number and use the app Groundwire as a softphone client. There are many other softphone clients and they have good documentation setting various systems up to work with their service. That has worked very well for me so far also. A VoIP number from them is $0.99 a month plus whatever the rate for minutes is. At most I think I have spent like $10 one month I think and that was because I was playing around with different setups as far as how numbers routed. Google Voice has worked well for me, but I am always paranoid what would happen if I loose access to the Google account it's connect to or if Google were to stop supporting Google Voice.
digital Bowles 4/13/2024 8:31 PM
Thank you. I was worried the google had already stopped the service. I set one up.
Avatar
Avatar
Alexsaurus
Thanks, I have run the media origin feature however many of these images are .0 files from caches and as such don't have an obvious origin. I have already used dedup, path filters and size limits. This has gotten me down to the 6k images. While I can increase the thumbnail size even at the largest it is too small to make out the details around who the messages too. The preview in the right panel is what I have to use however the method used for downscaling images to fit that window is rough on text. See the attached image. It would be nice if I could increase the size of the image in the right panel.
CLB-DannyTheModeler 4/13/2024 11:00 PM
Alex, My last suggestion is this area would be to use the Gallery View, but we do not provide the filtering capabilities there. You could produce a UFDR that only includes these 6K Images and then review it in the Gallery View, but I understand that this is a mediocre solution at best. I will record this feedback and see if there are some improvements we can add to the backlog to address the challenges you're facing.
Avatar
Avatar
CLB-DannyTheModeler
Alex, My last suggestion is this area would be to use the Gallery View, but we do not provide the filtering capabilities there. You could produce a UFDR that only includes these 6K Images and then review it in the Gallery View, but I understand that this is a mediocre solution at best. I will record this feedback and see if there are some improvements we can add to the backlog to address the challenges you're facing.
Thanks, even allowing me to filter the gallery by selected items would go a long way.
Avatar
Avatar
rfar
If you have access to XWays or Axiom, or Griffeye. all have an OCR capability.
Ended up using gImageReader for OCR
Avatar
Question for anyone. Working on a case where a suspect got into a car and forced a victim to drive around. We're trying to identify the suspect but no good video or description of them. We'll be doing a geofence, but if the suspect has Google we'll get nothing since Google killed that ability several months ago. If the suspect has apple maybe we'll get lucky. Let's say the victim had an iphone with them. Is anyone aware if iphone tracks recent iphone that have been around it, even if there was no official interaction (ie, no airdrop, etc)? And has anyone found out where that data might be stored on an iphone, or if Apple possibly tracks this and has a record of it online? And in the opposite scenario, if Victim has an android, anyone aware of Android tracking nearby devices? Or if possibly Google does this, and stores it in the cloud? And there's also the possibility say Victim had iphone, Sus had Android, is this or the reverse possibility tracked? We're trying to think outside the box here. I'm going to be surpised if Apple doesn't track this for their own purposes...just gotta figure out how to request such data from them.
Avatar
Avatar
Grok
Question for anyone. Working on a case where a suspect got into a car and forced a victim to drive around. We're trying to identify the suspect but no good video or description of them. We'll be doing a geofence, but if the suspect has Google we'll get nothing since Google killed that ability several months ago. If the suspect has apple maybe we'll get lucky. Let's say the victim had an iphone with them. Is anyone aware if iphone tracks recent iphone that have been around it, even if there was no official interaction (ie, no airdrop, etc)? And has anyone found out where that data might be stored on an iphone, or if Apple possibly tracks this and has a record of it online? And in the opposite scenario, if Victim has an android, anyone aware of Android tracking nearby devices? Or if possibly Google does this, and stores it in the cloud? And there's also the possibility say Victim had iphone, Sus had Android, is this or the reverse possibility tracked? We're trying to think outside the box here. I'm going to be surpised if Apple doesn't track this for their own purposes...just gotta figure out how to request such data from them.
melissa_at_amped 4/17/2024 12:45 PM
This is outside my area of expertise, but I sent you a message 🙂
Avatar
Deleted User 4/17/2024 2:34 PM
Hello, I am hoping someone can help w/ this or has experienced this before and is aware of the solution: I am having an issue with FTK Imager crashing whenever I try to save the remaining data from an image to a different location. Some Details: I am imaging a 1 TB drive and using a Tableau write blocker w/ FTK Imager. I am storing the majority of the image on a 1 TB Drive and the remaining data that doesn't fit onto a separate 1 TB drive. When FTK uses up all of the space on the first 1 TB Drive it prompts me to select a new location to save the remaining data to. I select a new location and it crashes within a few seconds, with no new data being saved to the new location at all. I am on Windows 10. I hope this is the right channel for this, couldn't find one for FTK Imager. (edited)
Avatar
Deleted User 4/17/2024 3:37 PM
I think I know what is causing the crashes. I had verify image enabled when I did the imaging. I tried running the imaging process again, this time with the overflow folder preset to the second drive, and it gave me a warning that image verification won't work when the data is being stored on two separate drives. I am trying to do the image again with the overflow location preset and verification turned off. I'll let you all know if it works. (edited)
Avatar
Avatar
Grok
Question for anyone. Working on a case where a suspect got into a car and forced a victim to drive around. We're trying to identify the suspect but no good video or description of them. We'll be doing a geofence, but if the suspect has Google we'll get nothing since Google killed that ability several months ago. If the suspect has apple maybe we'll get lucky. Let's say the victim had an iphone with them. Is anyone aware if iphone tracks recent iphone that have been around it, even if there was no official interaction (ie, no airdrop, etc)? And has anyone found out where that data might be stored on an iphone, or if Apple possibly tracks this and has a record of it online? And in the opposite scenario, if Victim has an android, anyone aware of Android tracking nearby devices? Or if possibly Google does this, and stores it in the cloud? And there's also the possibility say Victim had iphone, Sus had Android, is this or the reverse possibility tracked? We're trying to think outside the box here. I'm going to be surpised if Apple doesn't track this for their own purposes...just gotta figure out how to request such data from them.
If they drove far enough, you could also try tower dumps and compare the results.
👍 1
Avatar
has anyone got experience with marking Incident Response reports with TLP?
Avatar
Avatar
Deleted User
Hello, I am hoping someone can help w/ this or has experienced this before and is aware of the solution: I am having an issue with FTK Imager crashing whenever I try to save the remaining data from an image to a different location. Some Details: I am imaging a 1 TB drive and using a Tableau write blocker w/ FTK Imager. I am storing the majority of the image on a 1 TB Drive and the remaining data that doesn't fit onto a separate 1 TB drive. When FTK uses up all of the space on the first 1 TB Drive it prompts me to select a new location to save the remaining data to. I select a new location and it crashes within a few seconds, with no new data being saved to the new location at all. I am on Windows 10. I hope this is the right channel for this, couldn't find one for FTK Imager. (edited)
As @Deleted User mentioned it most likely has to do with the verification process or overflow folder. I had the "verify image" turned off and that solved my problem.
Avatar
Avatar
Vägis
As @Deleted User mentioned it most likely has to do with the verification process or overflow folder. I had the "verify image" turned off and that solved my problem.
Just please remember to verify the final image before returning source devices. I know one company did not verfied the final data "to save time", and ended up with corrupted E01 image.
💯 2
Avatar
Avatar
harderman
Just please remember to verify the final image before returning source devices. I know one company did not verfied the final data "to save time", and ended up with corrupted E01 image.
Had a verified copy beforehand. Made a new one to mess around with and that's when the issue appeared😊
Avatar
Hello! I would like to get into digital forensics in law enforcement and have some questions. I'd love to talk to people in the field if anyone is available. Thanks in advance!
Avatar
burgers_N_bytes 4/18/2024 8:04 AM
Is there a resource for private sector to determine who owned a phone number at a specific date in time?
Avatar
Avatar
burgers_N_bytes
Is there a resource for private sector to determine who owned a phone number at a specific date in time?
Not really, unless you subscribe to a service like TLO ect. that buy data from creditors etc. (edited)
Avatar
Avatar
DCSO
Not really, unless you subscribe to a service like TLO ect. that buy data from creditors etc. (edited)
burgers_N_bytes 4/18/2024 9:04 AM
Thank you, that’s what I needed to know
Avatar
Avatar
DFE Travis
Has anyone encountered the issue where your USBs all crap out at random? Seems to have something to do with a Cellebrite USB driver. I get the following Windows Event Log: Event 0, hcmon Detected unrecognized usb driver \driver\cbrtfltr
@Cellebrite I'm having the same issue, all my USB connections died. I can charge a phone but no thumb drive or dongle connections AFTER updating UFED 4PC. Several reboots and a windows update has not helped 😦
Avatar
Can you boot into safe mode and uninstall
10:52 AM
& reinstall
Avatar
Avatar
CLB-Paul
Can you boot into safe mode and uninstall
I can give it a shot.
Avatar
Im working on email forensic does anyone know how I can verify DKIM signature ?
Avatar
Avatar
CLB-Paul
& reinstall
Sent you a DM
Avatar
Avatar
CLB-Paul
Can you boot into safe mode and uninstall
Rebooting into Safe Mode still doesn't have USB connections, Mouse and Keyboard do not work. 😟 I selected Network- Safe Mode but I still can not remotely connect to the computer either.
Avatar
I just got a phone call from a Detective that works in our group miles away, they are having the same issue with a Talino Workstation @Sumuri Andrew @Dan-SUMURI , they just updated to UFED 4PC latest version and all the USB drivers are hosed. @Cellebrite (edited)
Avatar
Avatar
DCSO
I just got a phone call from a Detective that works in our group miles away, they are having the same issue with a Talino Workstation @Sumuri Andrew @Dan-SUMURI , they just updated to UFED 4PC latest version and all the USB drivers are hosed. @Cellebrite (edited)
We had this issue in the past upgrading to 4PC 7.67 I believe...We were able to remote desktop into our computer. Uninstalled 4PC and then restart the computer and it fixed the issues. We were then able to install the newest 4PC without issue. Hope this helps!
Avatar
@Elcomsoft - Is someone free to reach out to me ? I recently purchased Elcomsoft iOS forensic toolkit and have an issue
Avatar
Avatar
camdeezee.
We had this issue in the past upgrading to 4PC 7.67 I believe...We were able to remote desktop into our computer. Uninstalled 4PC and then restart the computer and it fixed the issues. We were then able to install the newest 4PC without issue. Hope this helps!
My partner tried to uninstall and even revert back a bit on the machine and its still not work they are down for 4hours right now. I'll keep working on it and update the group.
Avatar
Avatar
Red4rr0w
Oh right thanks, would CAINE be actively updated and still continuing to be used a lot?
I have run into hardware issues with Caine before especially when it comes to display drivers, so I ditched it eventually and stuck with Tsurugi Acquire.
Avatar
Avatar
camdeezee.
We had this issue in the past upgrading to 4PC 7.67 I believe...We were able to remote desktop into our computer. Uninstalled 4PC and then restart the computer and it fixed the issues. We were then able to install the newest 4PC without issue. Hope this helps!
I worked with Cellbrite tech, I was not able to remote in because the computer was already in Safemode, ended up booting into a windows install disc/repair/regedit and followed the prompts to kill the hive with the issue. Seems to be working now, fingers crossed.
👍 1
Avatar
Avatar
Whatsopp
Hello! I would like to get into digital forensics in law enforcement and have some questions. I'd love to talk to people in the field if anyone is available. Thanks in advance!
Are you currently LEO?
Avatar
Avatar
Whatsopp
No
Definitely get some street officer experience after you're done at college or school. Getting your head into the digital forensics field is sucky without.
Avatar
I was very very fortunate to get into the federal government as a cyber defense incident responder before I lucked out and got a DFE job at another agency
Avatar
Avatar
DFE Travis
I was very very fortunate to get into the federal government as a cyber defense incident responder before I lucked out and got a DFE job at another agency
I've been taking classes for the past 2 years trying to get into local DF
3:08 PM
Unfortunately nothing yet, still climbing up that ladder.
Avatar
Yeah, it's either degree, certs, or starting from the bottom as a LEO and specializing at some point
Avatar
Avatar
DFE Travis
Yeah, it's either degree, certs, or starting from the bottom as a LEO and specializing at some point
Did you get any local LEO exp?
Avatar
I did not, I interned with DHS one summer during college and luckily got into the gov't with my degree in digital forensics
Avatar
blackleitus 4/18/2024 6:39 PM
Does anyone have articles on how to lower vulnerability management metrics? (Risk score) if people remediation strategies are being ghosting?
Avatar
Avatar
DCSO
My partner tried to uninstall and even revert back a bit on the machine and its still not work they are down for 4hours right now. I'll keep working on it and update the group.
thatboy_leo 4/18/2024 6:57 PM
Wish I saw this sooner, no system restore available?
6:58 PM
Long shot but ps/2 port will work to help troubleshot
Avatar
If you are good with windows registry, check out #malware-analysis
Avatar
Has anyone come across the file path: Google.android.apps.photos/files/mars_files/Screen_Recording_xxxxxx-xxxxx_Instagram.mp4. These files appear to be related to instagram, does anyone have a deeper explanation or an explanation at all how these fillers end up here? and why?Any suggestions? 🙂
Avatar
Avatar
thatboy_leo
Wish I saw this sooner, no system restore available?
No a newer AsRock motherboard so I did'nt have the ports. Mouse/Keyboard work fine in bios mode just not when booted into Win. My partners computer did the same thing and tried restore points prior to the update and it did not work.
😔 1
Avatar
Avatar
DCSO
No a newer AsRock motherboard so I did'nt have the ports. Mouse/Keyboard work fine in bios mode just not when booted into Win. My partners computer did the same thing and tried restore points prior to the update and it did not work.
thatboy_leo 4/19/2024 6:50 AM
There’s a specific registry key that needs to be edited, but if safe mode still doesn’t let you access it may not be any luck
Avatar
Avatar
Queen-L
Has anyone come across the file path: Google.android.apps.photos/files/mars_files/Screen_Recording_xxxxxx-xxxxx_Instagram.mp4. These files appear to be related to instagram, does anyone have a deeper explanation or an explanation at all how these fillers end up here? and why?Any suggestions? 🙂
my assumption is its a screen recording of the app Instagram using Android's built-in screen recording tool (just a guess)
👍 1
Avatar
hi, i was wondering if anyone knew if you could call your local pd to maybe intern and gain experience with digital forensics?
Avatar
Anyone had an air tag? Did you ever get any relevant information out of it and if so how please? Thanks
Avatar
Avatar
sol
hi, i was wondering if anyone knew if you could call your local pd to maybe intern and gain experience with digital forensics?
Digitalferret 4/20/2024 4:26 AM
#training-education-employment
Avatar
https://github.com/tclahr/uac Has anyone used this tool?
UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler...
Avatar
Outside of building your own tool is there an open source tool that helps manage and automate the deployment and revoke of canary tokens? Seems like it may be a cool project if not. (edited)
Avatar
We’ve had USB go wrong when installing UFED/Inseyets recently. It is recoverable but involves booting the PC into safemode and deleting a registry key. If the machines are on the network you can Remote Desktop on and tell the computer to boot into safe mode with bcdedit. If not, you can force it into safe mode by turning it off then turning it on, as soon as windows begins to load (swirling ball) press and hold power to turn it off. Then turn it on, again as soon as windows begins to load, hard power off. On the third time of powering on it’ll go into recovery mode where you can select safe mode. You should then get keyboard and mouse so you can use regedit to navigate to the USB class (HKEY_LOCAL_MACHINE > System > CurrentControlSet > Control > Class> 36FC9E60-C465-11CF-8056-444553540000) then delete the UpperFilter and LowerFilter keys
12:46 AM
If usb still doesn’t work in safe mode you can use a windows installer and press shift f10 to bring up a command prompt or bring up and command prompt from the recovery environment. You can then use regedit and manually load the hklm hive from the computer’s hard drive
👍 1
12:47 AM
@DCSO
Avatar
Does anyone know a good tool/robot for bulk imaging CDs?
Avatar
Avatar
mrkscn
We’re running an anonymous Digital Forensics Practitioner Survey to improve DF academic research. Please help to shape the community’s efforts to better assist you in your investigations. If you feel its beneficial, please share the link with colleagues. Survey link: https://bit.ly/dfpulse
Last chance to contribute to our Digital Forensic Practitioner Survey to inform DF academic research. Please share to anyone you think might be interested. Link: https://bit.ly/dfpulse
👍 1
Avatar
BadPacifist 4/22/2024 4:25 AM
@Law Enforcement [UK] Has anyone without ISO 17025 accreditation had their evidence rejected at court (for that reason) yet?
Avatar
We came close at Christmas. The questions only came about because the defendant was representing himself and so the questions were from a different angle. The courts did not really get it and despite having an input from the attorney general about mitigation, it was still a nightmare. I am expecting more challenges to come.
Avatar
Avatar
BadPacifist
@Law Enforcement [UK] Has anyone without ISO 17025 accreditation had their evidence rejected at court (for that reason) yet?
There was a story that a “defence expert” who wasn’t accredited had their evidence thrown out on those grounds, but it also seems to be that they were truly terrible at the work and argued with the court and imperial third party experts. But I think it’s just that, a story. I’ve never seen a substantiated case of it happening though, but as courts get more used to ISO I would expect to start hearing about it if it does happen.
Avatar
Avatar
BadPacifist
@Law Enforcement [UK] Has anyone without ISO 17025 accreditation had their evidence rejected at court (for that reason) yet?
P4perTrails 4/22/2024 4:55 AM
@BadPacifist check also Policies and Procedures thread on this Channel. There's been quite a bit of chatter there re ISO. But so far none has seen any difference in regards to having our bike having ISO... Except that it has slowed daily processes substantially. (edited)
Avatar
Avatar
BadPacifist
@Law Enforcement [UK] Has anyone without ISO 17025 accreditation had their evidence rejected at court (for that reason) yet?
SamTheMan14 4/22/2024 5:14 AM
Not yet from what I know of, I recommend using the mitigation table (Annex B) to accompany SFRs if you're not using them already: https://fcn.police.uk/uk/node/267 https://www.fcn.police.uk/sfr-forms (edited)
👍 1
Avatar
Avatar
BadPacifist
@Law Enforcement [UK] Has anyone without ISO 17025 accreditation had their evidence rejected at court (for that reason) yet?
5:53 AM
The main bit being “The only provision in the FSR Act that would prevent a forensic expert from providing evidence is section 6 of the FSR Act which gives the Regulator the power to issue a compliance notice combined with an order prohibiting a forensic provider from conducting any forensic science activity set out by the Regulator (the provision of evidence being a forensic science activity that the Regulator could choose to prohibit). Non-compliance with the FSR Code does not, of itself, render evidence unreliable or inadmissible.”
🫡 2
Avatar
BadPacifist 4/22/2024 6:58 AM
Thanks everyone. DFT is using mitigation tables. Helpful info all 'round.
Avatar
Avatar
busted4n6
We’ve had USB go wrong when installing UFED/Inseyets recently. It is recoverable but involves booting the PC into safemode and deleting a registry key. If the machines are on the network you can Remote Desktop on and tell the computer to boot into safe mode with bcdedit. If not, you can force it into safe mode by turning it off then turning it on, as soon as windows begins to load (swirling ball) press and hold power to turn it off. Then turn it on, again as soon as windows begins to load, hard power off. On the third time of powering on it’ll go into recovery mode where you can select safe mode. You should then get keyboard and mouse so you can use regedit to navigate to the USB class (HKEY_LOCAL_MACHINE > System > CurrentControlSet > Control > Class> 36FC9E60-C465-11CF-8056-444553540000) then delete the UpperFilter and LowerFilter keys
This is what Cellebrite support had us do also, it worked. Luckly it was during normal work hours.
Avatar
Anyone know of wordlists publicly available for specific topics that generally come up for cases? (ex. harassment, drugs, etc.) (edited)
Avatar
Avatar
M3r1T
https://github.com/tclahr/uac Has anyone used this tool?
is there anything I can do for you? Any questions?
Avatar
Avatar
stark4n6
Anyone know of wordlists publicly available for specific topics that generally come up for cases? (ex. harassment, drugs, etc.) (edited)
Wordlists for search? Or password wordlists?
Avatar
Avatar
chick3nman
Wordlists for search? Or password wordlists?
just wordlists
Avatar
Hmm, probably can’t help you there unfortunately
Avatar
Deleted User 4/22/2024 10:42 AM
Windows defender keeps crashing my autopsy analysis of the image I took. It keeps detecting a virus in the files and tries to remove it which breaks the scan and forces me to start all over. Any ideas? I've tried adding a registrykey to disable scanning and disable it in settings. Yet somehow it keeps turning itself back on and breaking my scans.
10:47 AM
I did just try disabling it with powershell, in case the regedit didn't work.
Avatar
Deleted User 4/22/2024 11:50 AM
going to try this again, this is my third time running the scan, if anyone has any suggestions for things to disable that can interfere with autopsy, please let me know, would rather avoid this in the future if I can
Avatar
Avatar
Deleted User
going to try this again, this is my third time running the scan, if anyone has any suggestions for things to disable that can interfere with autopsy, please let me know, would rather avoid this in the future if I can
Add an exclusion on the folder so Defender does not scan it.
👍 1
1:02 PM
2:04 PM
that's just a drug list but could be converted with some work.
Avatar
Will check it out thanks
Avatar
MrTurdTastic 4/22/2024 3:09 PM
Anyone here at Disruption24?
Avatar
Is dd works in windows boot command line ???
Avatar
Avatar
Alpha
Is dd works in windows boot command line ???
DeeFIR 🇦🇺 4/23/2024 1:25 AM
Not natively, no
Avatar
Thanks buddy
Avatar
Does anyone know of a tool that will parse Wire messenger app? I’ve got the sql db . (edited)
Avatar
Avatar
pj1001
Does anyone know of a tool that will parse Wire messenger app? I’ve got the sql db . (edited)
cf-eglendye 4/23/2024 5:40 AM
iOS or Android?
Avatar
Avatar
cf-eglendye
iOS or Android?
Android
Avatar
Hello I’m fairly new here, but I was looking for more information on Magnet Shield and Acquire. I’d appreciate any insight/personal experiences with the applications. My agency is looking reduce device build up and allow investigators access information quickly in the field.
Avatar
Avatar
Qwest
Hello I’m fairly new here, but I was looking for more information on Magnet Shield and Acquire. I’d appreciate any insight/personal experiences with the applications. My agency is looking reduce device build up and allow investigators access information quickly in the field.
Adding (more) full time examiners is probably the best solution. Tools does not work on its own and an experienced examiner can definitely speed the process up. Tools that can do "targeted" actually requires more knowledge to use it effectively as there is less room for mistake, especially when you only have one chance to do the imaging out in the field, etc..
👍 1
2:36 PM
And back to your question. Acquire works fine as long as you know what you're looking for in the first place.
Avatar
Avatar
pj1001
Android
cf-eglendye 4/24/2024 12:28 AM
I have just parsed an Android 13 test image in XAMN Pro v7.9 and they have support for Wire
Avatar
Hello everyone! The other day I posted a query here about the consistency of hashes when acquiring an SSD, but I still have some doubts. If a physical acquisition (sector by sector) of an SSD is performed, the hashes are likely not to match if further acquisitions are made from the same device (due to wear-leveling, TRIM, etc.). However, what I'm not entirely clear on is: if I acquire a partition (logical acquisition), and subsequent acquisitions are made from the same device, the hashes will match, right? Because here, not all sectors (used and unused or pending deletion) are hashed, but only the active sectors are cloned. I understand that these can also be moved to physical areas of the SSD, but would the hash still be the same? Thanks in advance!
Avatar
Vivien Dehne 4/24/2024 6:52 AM
Does anybody know how the Griffeye Social Media Identifier works? I just read that it was innovated at the Interpol DevOps Hackathon 2019... @Magnet Forensics I'm searching for a paper or something related to this. I would be very grateful for any help!
Avatar
i would like to know too
Avatar
Avatar
Ghibra Mad
Hello everyone! The other day I posted a query here about the consistency of hashes when acquiring an SSD, but I still have some doubts. If a physical acquisition (sector by sector) of an SSD is performed, the hashes are likely not to match if further acquisitions are made from the same device (due to wear-leveling, TRIM, etc.). However, what I'm not entirely clear on is: if I acquire a partition (logical acquisition), and subsequent acquisitions are made from the same device, the hashes will match, right? Because here, not all sectors (used and unused or pending deletion) are hashed, but only the active sectors are cloned. I understand that these can also be moved to physical areas of the SSD, but would the hash still be the same? Thanks in advance!
AFIK a logical volume acquisition (an acquisition of a single partition assuming there is only one partition in the volume) will acquire unallocated sectors inside of that volume. So the trim/garbage collection/wear leveling for the unallocated sectors would make it where two logical volume acquisitions would not match. If you acquired an .L01 of a volume, it would only acquire allocated files. Therefore, two .L01 acquisitions should match, assuming no changes are made to the files between acquisitions because trim/garbage collection/wear leveling does not affect allocated files.
Avatar
Hello forensic people, doing some reporting. Is there any technical documentation surrounding ffmpeg/ffplay. Need to extract metadata from a stream. (edited)
Avatar
Avatar
$CozyBear
Hello forensic people, doing some reporting. Is there any technical documentation surrounding ffmpeg/ffplay. Need to extract metadata from a stream. (edited)
melissa_at_amped 4/24/2024 9:25 AM
I'd look here. You'll find technical notes for both video and audio. https://www.swgde.org/documents/published-complete-listing/
Published The following documents have completed the required comment period and are considered final releases. All documents are considered living documents - updates are periodically made at which time they are released for an additional comment period if changes were substantive. All versions are formally archived and only the most recent app...
Avatar
Thank you Meslissa.
👍 1
Avatar
I'm running into an issue with @Cellebrite Inseyets 10.2 reporting. Trying to export a PDF and the assets seem to export just fine but the PDF itself goes and goes and goes until it is 60+ GB in size for 50k pages. I know 50k pages is a lot but it's what the attorney is requesting. Despite this, it doesn't seem normal that the PDF would average 1.2MB per page. The PDF also appears to be corrupted and Adobe needs to "repair" it. It also seems to be inconsistent as it doesn't produce this type of result every time on every case. I have checked the knowledge base and the release notes, I'm not seeing this as a listed issue. Not sure if anyone else has observed abnormally large pdf reports.
10:54 AM
Redacting attachments/thumbnails from the pdf took it (the pdf itself) from 60gb to 200mb. The assets themselves are 2GB in size
Avatar
Avatar
whee30
I'm running into an issue with @Cellebrite Inseyets 10.2 reporting. Trying to export a PDF and the assets seem to export just fine but the PDF itself goes and goes and goes until it is 60+ GB in size for 50k pages. I know 50k pages is a lot but it's what the attorney is requesting. Despite this, it doesn't seem normal that the PDF would average 1.2MB per page. The PDF also appears to be corrupted and Adobe needs to "repair" it. It also seems to be inconsistent as it doesn't produce this type of result every time on every case. I have checked the knowledge base and the release notes, I'm not seeing this as a listed issue. Not sure if anyone else has observed abnormally large pdf reports.
Is it possible to open the UFED extraction in Physical Analyzer and try it there ? I won't move to the Inseyets until they resolve all the bugs and have the same features. I'm just old and stubborn that way.
Avatar
I'll install it and try. I was really hoping to get the benefit of reduced load times and I finally got a machine that can run it.
Avatar
Anyone recommend a case management software? We use Magnet Atlas but it seems like every few weeks they change something that breaks how we use it. Open source would be nice too
Avatar
Deleted User 4/24/2024 2:48 PM
Anyone know a place I can ask questions about free software like Autopsy or FTK Imager or SIFT? I know people have used it here, but this server seems more aimed towards paid commercial software and I want to make sure I am asking in the right place with the right people.
Avatar
Avatar
Deleted User
Windows defender keeps crashing my autopsy analysis of the image I took. It keeps detecting a virus in the files and tries to remove it which breaks the scan and forces me to start all over. Any ideas? I've tried adding a registrykey to disable scanning and disable it in settings. Yet somehow it keeps turning itself back on and breaking my scans.
HuntForward 4/24/2024 3:11 PM
You can set a local group policy to disable realtime monitoring.
👍 1
Avatar
Avatar
Deleted User
Anyone know a place I can ask questions about free software like Autopsy or FTK Imager or SIFT? I know people have used it here, but this server seems more aimed towards paid commercial software and I want to make sure I am asking in the right place with the right people.
DeeFIR 🇦🇺 4/24/2024 3:55 PM
Lots of people here use autopsy and FTK. SIFT is just a collection of tools, so ask your question and someone will probably know the answer. There are some seriously smart people here who are usually lurking.
Avatar
NotIronManBTW 4/24/2024 6:27 PM
How do y’all think I start living into DFIR? Currently I work on a team that is DFIR and ediscovery then works with our SOC as well quite a bit. I mostly do ediscovery but help with forensics where I can quite a bit though we have to follow strict procedures in our lab as far as who can do what. This is my first job out of school and I have a degree in comp sci and cybersecurity been out of school a while though and have other background before then. Having trouble trying to make the move into other spots or doing more work elsewhere any ideas?
Avatar
AccessInvestigations 4/24/2024 6:57 PM
Question about jumplists: I used Eric’s jlecmd command line tool to process the jumplists I collected during a triage with kape, first I want to confirm the dates shown when viewed in timeline explorer are infact UTC and not local. Second does the “host name” column have any real significance? As I am seeing a few of the rows having Chinese characters under that column. Thanks.
Avatar
Avatar
AccessInvestigations
Question about jumplists: I used Eric’s jlecmd command line tool to process the jumplists I collected during a triage with kape, first I want to confirm the dates shown when viewed in timeline explorer are infact UTC and not local. Second does the “host name” column have any real significance? As I am seeing a few of the rows having Chinese characters under that column. Thanks.
DeeFIR 🇦🇺 4/24/2024 7:07 PM
Dates/times are in UTC. Not sure about the encoding or whether the values for Hostname are parsed correctly, but the MachineID column matches the hostname for me.
💯 1
Avatar
Avatar
DeeFIR 🇦🇺
Dates/times are in UTC. Not sure about the encoding or whether the values for Hostname are parsed correctly, but the MachineID column matches the hostname for me.
AccessInvestigations 4/24/2024 7:10 PM
Thank you. The UTC is what I was 90% sure about the “hostname” was throwing me a bit and I didn’t want to be chasing something that was just an anomaly with timeline explorer or the way jump lists are recorded or collected.
Avatar
Avatar
AccessInvestigations
Thank you. The UTC is what I was 90% sure about the “hostname” was throwing me a bit and I didn’t want to be chasing something that was just an anomaly with timeline explorer or the way jump lists are recorded or collected.
Andrew Rathbun 4/24/2024 7:20 PM
Hey speaking of Timeline Explorer, make sure you have 7 F's under Tools -> DateTimeFormat yyyy-MM-dd HH:mm:ss.fffffff Just a random thought and wanted to make sure I brought it up in case this was new information to you (or others) (edited)
Avatar
Avatar
FullTang
AFIK a logical volume acquisition (an acquisition of a single partition assuming there is only one partition in the volume) will acquire unallocated sectors inside of that volume. So the trim/garbage collection/wear leveling for the unallocated sectors would make it where two logical volume acquisitions would not match. If you acquired an .L01 of a volume, it would only acquire allocated files. Therefore, two .L01 acquisitions should match, assuming no changes are made to the files between acquisitions because trim/garbage collection/wear leveling does not affect allocated files.
Thank you!
👍 1
Avatar
Avatar
Deleted User
Anyone know a place I can ask questions about free software like Autopsy or FTK Imager or SIFT? I know people have used it here, but this server seems more aimed towards paid commercial software and I want to make sure I am asking in the right place with the right people.
There is quite a bit of conversation on those three key words. Ask away.
Avatar
Avatar
cf-eglendye
I have just parsed an Android 13 test image in XAMN Pro v7.9 and they have support for Wire
Thanks, I’ll give it a try
Avatar
thaconnecter 4/25/2024 8:01 AM
Anyone know of a way to transform an Axiom portable case into a normal case?
8:01 AM
@forensicmike @Magnet any clue ?
Avatar
Avatar
thaconnecter
Anyone know of a way to transform an Axiom portable case into a normal case?
You can open the original and merge in the portable
8:30 AM
Then from there continue as normal (edited)
Avatar
Is anyone from @Cellebrite around?
📬 1
Avatar
Any recommended courses on how to do detection and live forensics on machines that are being actively attacked by more sophiscated and commercial tools like cobalt strike? Had an exercise working as L3 in a simulated SOC environment, and I find it difficult to know exactly what has happened, especially with regards to cobalt strike since it's quite hard to do forensics for me for this particular aspect. Thanks! Edit: Also, any handy links/courses on how to detect attacks like Kerberoasting, PTH etc? (edited)
Avatar
Has anyone used this? https://stellarcyber.ai/
Next Gen SIEM Security - Stellar Cyber delivers NG-SecOps, Next Gen SIEM, Network Detection and Response, EDR platform along with SIEM security tools.
Avatar
what is difference between cortex xdr and xsiam?
Avatar
Is it possible to get attachment details of emails through email forensics ??????
Avatar
Avatar
Alpha
Is it possible to get attachment details of emails through email forensics ??????
It's possible to extract file attachments from e-mails, but how will depend on what access you have to the e-mail. Do you have .msg, .eml versions of the e-mails or something else?
Avatar
Hi guys, successfully extracted from an AFU iPhone 13 earlier and the tool rebooted the device so now BFU. - not sure that makes a difference but the power, and volume keys are unresponsive. Can't say for sure that they worked before the extraction as we had no need to test them. Screen wakes were done by double-tapping the screen. My question - is there a way of powering the device down without the buttons working? It's currently sat in a faraday box very slowly discharging... Thoughts?
Avatar
Trashboat667 4/26/2024 8:41 AM
@Magnet Forensics I have tried to parse advanced logical and file system iOS extractions with axiom and it is not parsing the messages. Only thing I get are what’s app. I’m just loading the zip files from Cellebrite and hitting go. Also making sure the messaging artifacts are selected. PA does just fine. Is there some thing I’m missing? I’ve tried on the newest version of axiom and one before it. Same result. (edited)
Avatar
Avatar
M3r1T
what is difference between cortex xdr and xsiam?
SkryptKiddie 4/26/2024 9:17 PM
Cortex XDR is still just their EDR solution and XSIAM is their new AI-driven SIEM platform
Avatar
Avatar
rayeh
It's possible to extract file attachments from e-mails, but how will depend on what access you have to the e-mail. Do you have .msg, .eml versions of the e-mails or something else?
would you tell me how I get all eml files of my gmail account ??? I don't want to download it one by one. (edited)
Avatar
Avatar
Alpha
would you tell me how I get all eml files of my gmail account ??? I don't want to download it one by one. (edited)
Ross Donnelly 4/27/2024 12:14 PM
Google Takeout includes all emails, but in MBOX format rather than EML
👍 1
Avatar
Shogun//Rogan 4/27/2024 2:19 PM
Hey all. US Law Enforcement here that works in ICAC Task Force work and also the "digital evidence" expert for my agency. Glad to be here and pick up tidbits here and there with how to advance my career.
👋 6
👍 1
Avatar
AccessInvestigations 4/28/2024 3:35 PM
I am reviewing the SRUM DUMP from a Desktop. Looking under the "Application Resource Usage", I am seeing the following. I know that Ultraviewer was downloaded after the owner was instructed to do so by a Data Thief. I am looking for answers as to whether the entries seen there are a result of the thief accessing the computer after the UltraViewer was started. If so what do you think was going on with all of the Random User SIDs. Thoughts anyone?
Avatar
Avatar
Deleted User
Anyone know a place I can ask questions about free software like Autopsy or FTK Imager or SIFT? I know people have used it here, but this server seems more aimed towards paid commercial software and I want to make sure I am asking in the right place with the right people.
We actually use a bunch of free software as well. I'm sure a lot of us can answer questions regarding software like that. FTK is great from my experience. Just make sure to send your question in the right thread and there should be someone being able to help ya out! Peepo_ThumbsUp
Avatar
Avatar
AccessInvestigations
I am reviewing the SRUM DUMP from a Desktop. Looking under the "Application Resource Usage", I am seeing the following. I know that Ultraviewer was downloaded after the owner was instructed to do so by a Data Thief. I am looking for answers as to whether the entries seen there are a result of the thief accessing the computer after the UltraViewer was started. If so what do you think was going on with all of the Random User SIDs. Thoughts anyone?
randomaccess 4/29/2024 1:00 AM
That ownprpc thing looks weird If you process with srumecmd does it show up the same?
Avatar
Hi guys, if one mistakenly deletes a chat for both contacts in Telegram, is it possible to recover it?
Avatar
Digitalferret 4/29/2024 5:47 AM
Dear Mark, ... no, really
Avatar
Avatar
randomaccess
That ownprpc thing looks weird If you process with srumecmd does it show up the same?
AccessInvestigations 4/29/2024 6:58 AM
Yea I thought so too, what do you think about all of the seemingly random User SIDs ?
Avatar
Avatar
AccessInvestigations
Yea I thought so too, what do you think about all of the seemingly random User SIDs ?
Killithid the Mindslayer™ 4/29/2024 7:26 AM
Absolutely not positive, but it seems like each one of those is related to a particular logon session? source: https://learn.microsoft.com/en-us/windows/win32/secauthz/well-known-sids , https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/understand-security-identifiers If that's the case, maybe cross-referencing those SIDs against event logs?
Avatar
Good morning. How do I go about getting a new coworker an invite to the Discord?
Avatar
Avatar
stps358
Good morning. How do I go about getting a new coworker an invite to the Discord?
you share the server link
Avatar
Avatar
theshark
you share the server link
Thats too obvious lol. Thanks.
Avatar
Avatar
randomaccess
That ownprpc thing looks weird If you process with srumecmd does it show up the same?
AccessInvestigations 4/29/2024 11:42 AM
Yup
Avatar
Avatar
AccessInvestigations
I am reviewing the SRUM DUMP from a Desktop. Looking under the "Application Resource Usage", I am seeing the following. I know that Ultraviewer was downloaded after the owner was instructed to do so by a Data Thief. I am looking for answers as to whether the entries seen there are a result of the thief accessing the computer after the UltraViewer was started. If so what do you think was going on with all of the Random User SIDs. Thoughts anyone?
Well-known security identifiers (SIDs) identify generic groups and generic users.
Avatar
Well-known security identifiers (SIDs) identify generic groups and generic users.
Avatar
AccessInvestigations 4/29/2024 5:29 PM
Thanks guys, I think it is non-malicious because I see the same activity months before the known malicious activity. Thanks
Avatar
Tim | DerOmon 4/30/2024 5:33 AM
Hello everyone, I’m currently searching for data extraction and processing times and I’m having a bit of difficulty finding specific information. I’m particularly interested in any scientific papers or studies that provide concrete examples of these times. For instance, how long it might take to process 1TB of data resulting in 100,000 artifacts. I’ve done some preliminary searches but haven’t found anything that fits this criteria. If anyone has come across such a study or has any recommendations on where to look, I would greatly appreciate your input. (edited)
Avatar
Avatar
Tim | DerOmon
Hello everyone, I’m currently searching for data extraction and processing times and I’m having a bit of difficulty finding specific information. I’m particularly interested in any scientific papers or studies that provide concrete examples of these times. For instance, how long it might take to process 1TB of data resulting in 100,000 artifacts. I’ve done some preliminary searches but haven’t found anything that fits this criteria. If anyone has come across such a study or has any recommendations on where to look, I would greatly appreciate your input. (edited)
I would be interested in this also - but feel like it is not calculable in an accurate way. Depending on the tool and processing method, type of device, chosen destination, I think there are too many factors that aren't consistent to get an all-around number.
Avatar
Avatar
Tim | DerOmon
Hello everyone, I’m currently searching for data extraction and processing times and I’m having a bit of difficulty finding specific information. I’m particularly interested in any scientific papers or studies that provide concrete examples of these times. For instance, how long it might take to process 1TB of data resulting in 100,000 artifacts. I’ve done some preliminary searches but haven’t found anything that fits this criteria. If anyone has come across such a study or has any recommendations on where to look, I would greatly appreciate your input. (edited)
Often it varies with the tools, hardware etc. I think its to much of a variable to say, 1 TB worth of data extracted from a phone is going to be very different from a computer etc. Just a thought
Avatar
I would love to hear opinions (and you would help with a debate) about how you all approach documentation of your forensic units... specifically, do you outright say that you "break into" phones? When I first started in the mobile forensic world, I was told that "we don't do that". If asked, we would use terms like Bruteforce, but only if asked. That when creating documentation for our units or referencing what our units do in documents, we are to use broad terms and refer to what we do as "Mobile Forensics" and "obtaining data", etc. Is this still the common practice? Or has it changed, and we are now openly advertising what we do? (Don't get me wrong, I know that criminals catch on... but I am curious how it's viewed around the country/world.)
Avatar
Avatar
Forgedmom
I would love to hear opinions (and you would help with a debate) about how you all approach documentation of your forensic units... specifically, do you outright say that you "break into" phones? When I first started in the mobile forensic world, I was told that "we don't do that". If asked, we would use terms like Bruteforce, but only if asked. That when creating documentation for our units or referencing what our units do in documents, we are to use broad terms and refer to what we do as "Mobile Forensics" and "obtaining data", etc. Is this still the common practice? Or has it changed, and we are now openly advertising what we do? (Don't get me wrong, I know that criminals catch on... but I am curious how it's viewed around the country/world.)
While I don’t think I ever said I “break into” phones, I try to write in a simple and accurate manner. If I was able to brute force the pin, that’s what I say. I don’t see any reason to avoid any language or topics.
Avatar
Avatar
Joe Schmoe
While I don’t think I ever said I “break into” phones, I try to write in a simple and accurate manner. If I was able to brute force the pin, that’s what I say. I don’t see any reason to avoid any language or topics.
I should have been more clear - I mean in documents about the unit. So memos and outside documents. Reports and such, I completely agree.
Avatar
Avatar
Forgedmom
I should have been more clear - I mean in documents about the unit. So memos and outside documents. Reports and such, I completely agree.
Digitalferret 5/1/2024 6:52 AM
given current events in UK, Police whatsapp msgs, PostOffice scandal emails etc, i'd go with saying as little as is necessary to give an "as accurate and informative as possible" description in the most sanitized way, no unwarrranted judgements, opinions, profanity etc. (almost to the point of being phlegmatic) Once it's been written, or spoken and recorded, it has teeth. (edited)
Avatar
kmacdonald1565 5/1/2024 8:00 AM
hey, all....looking for some advice....without getting too into detail, how do you handle not finding data alteration when it is still technically possible that some alteration happened within an official report? so hypothetically, you are reviewing a computer, and everything down to the filesystem shows alteration is unlikely, but you cant rule out a hex editor being used to zero out some chunks of files, and you suspect it is just empty space within a file.
Avatar
Avatar
kmacdonald1565
hey, all....looking for some advice....without getting too into detail, how do you handle not finding data alteration when it is still technically possible that some alteration happened within an official report? so hypothetically, you are reviewing a computer, and everything down to the filesystem shows alteration is unlikely, but you cant rule out a hex editor being used to zero out some chunks of files, and you suspect it is just empty space within a file.
I strongly recommend reviewing the chapter "The Dragon in My Garage" from Carl Sagan's book "The Demon-Haunted World: Science as a Candle in the Dark" and our reports that have been made public so far (five of them) in the ongoing Bhima Koregaon case. Happy to DM if you are still unsure how to proceed after reviewing these things.
Avatar
Avatar
Arsenal
I strongly recommend reviewing the chapter "The Dragon in My Garage" from Carl Sagan's book "The Demon-Haunted World: Science as a Candle in the Dark" and our reports that have been made public so far (five of them) in the ongoing Bhima Koregaon case. Happy to DM if you are still unsure how to proceed after reviewing these things.
kmacdonald1565 5/1/2024 12:14 PM
I read the dragon in my garage just now. and browsed some articles about the case, without getting into the reports themselves. It helps but I still am on the same spot. I am in a weird spot with my case. I just need to find a spot to cut off the report i guess. I generally try to write with detail but not going overboard. On this one, i am trying to cover my own behind on it and keep thinking of counter arguments and other steps to basically "further prove" something i already know.
12:16 PM
in reality, nothing should fall back on me, because the data is (are...stupid college professors) the data
Avatar
Avatar
kmacdonald1565
I read the dragon in my garage just now. and browsed some articles about the case, without getting into the reports themselves. It helps but I still am on the same spot. I am in a weird spot with my case. I just need to find a spot to cut off the report i guess. I generally try to write with detail but not going overboard. On this one, i am trying to cover my own behind on it and keep thinking of counter arguments and other steps to basically "further prove" something i already know.
Do your best to determine what reasonable people involved in the orbit of your case would consider due diligence, then go beyond it enough so that you can defend your work from a position of strength if you encounter serious hostility.
12:20 PM
In Boston, it's not really if you encounter but when you encounter. 🤣
Avatar
kmacdonald1565 5/1/2024 12:20 PM
Thats pretty good advice...i think i am at that point...if i could share the details, it would make more sense why it is so difficult.
Avatar
Are you able to have peer review of your analysis done? Ideally from people who are not afraid to attack your methodology and findings.
Avatar
kmacdonald1565 5/1/2024 12:24 PM
not really. i have one other person i might be able to ask that used to be in forensics but is still with my agency. This case was a bit technical in a couple of ways.
Avatar
Given your concern about it, maybe worth reaching out to another agency and asking for a peer review. Better to put the time in now and call in some favors than have things hit the fan down the road. Worthwhile even if the suggestions have to do with report writing (it sounds like you are trying to address in some way when to stop putting effort into proving a negative and how to document that) and not adjustments to methodology or findings.
Avatar
kmacdonald1565 5/1/2024 12:31 PM
yeah
Avatar
Good luck with it and hopefully you get some other takes from people here.
Avatar
kmacdonald1565 5/1/2024 12:31 PM
thanks for your help!
👍 1
Avatar
Hey all, I am a masters student in CS. I am on track to be done with my program next spring, but I am in need of a change in project. (My second project change) My advisor has suggested that I switch to the forensics domain because I have shown lots of interest in it and have done many (non-CS-realated) projects in the area. I am leaning towards making the switch. My current project on Drone security is not going to well. I'm currently looking for some projects that have a programming aspect enough for a masters project and that can be completed within six months (between now and December-ish) by a programmer who is out of practice. Ones for mildly seasoned project ideas are also acceptable. What recommendations do you guys have?
Avatar
Avatar
tapatiosec
Hey all, I am a masters student in CS. I am on track to be done with my program next spring, but I am in need of a change in project. (My second project change) My advisor has suggested that I switch to the forensics domain because I have shown lots of interest in it and have done many (non-CS-realated) projects in the area. I am leaning towards making the switch. My current project on Drone security is not going to well. I'm currently looking for some projects that have a programming aspect enough for a masters project and that can be completed within six months (between now and December-ish) by a programmer who is out of practice. Ones for mildly seasoned project ideas are also acceptable. What recommendations do you guys have?
Digitalferret 5/1/2024 2:32 PM
#training-education-employment maybe
Avatar
Hi everyone, I was wondering if any of you use a local AI system where you can upload aquired data in? If so, where do you use it for? MS CoPilot for Business claims not to use any of your data but i'm not uploading anything to the cloud. Curious what companies do with AI in this workfield. Thanks!
Avatar
kladblokje_88 5/3/2024 5:39 AM
LOL
Avatar
Avatar
Skinnyice
Hi everyone, I was wondering if any of you use a local AI system where you can upload aquired data in? If so, where do you use it for? MS CoPilot for Business claims not to use any of your data but i'm not uploading anything to the cloud. Curious what companies do with AI in this workfield. Thanks!
Yeah no way in heck would we be allowed to upload any criminal investigation data to AI to work on it.
Avatar
NotIronManBTW 5/3/2024 8:37 AM
We are leveraging local AI integrations at my company but ya nothing can go into cloud/ copilot for sure
Avatar
Avatar
Skinnyice
Hi everyone, I was wondering if any of you use a local AI system where you can upload aquired data in? If so, where do you use it for? MS CoPilot for Business claims not to use any of your data but i'm not uploading anything to the cloud. Curious what companies do with AI in this workfield. Thanks!
Ollama + Mistral model -> AnythingLLM on top of it. You will need to fine tune the prompt in Anything LLM of course. Produces mixed results but is all stored locally.
Avatar
Avatar
KohleR
Ollama + Mistral model -> AnythingLLM on top of it. You will need to fine tune the prompt in Anything LLM of course. Produces mixed results but is all stored locally.
Sounds great! And what are your use cases for this?
Avatar
Avatar
Skinnyice
Sounds great! And what are your use cases for this?
I can't share any use cases for the above but you could worklflow it like so: create a case folder and then sub folders to store PDF, text, docs, audio, scraped sites and socials etc. Then ingest all of these into AnythingLLM. Create a flat text file, a "Glue File" if you will, and write a story back to yourself about background, events and spefics because the AI for example will not know that John Smith was born in Alaska and has a skull tattoo on his forearm. The Glue File will help the AI with linkages and correlation hopefully so ingest that as well. Mistral was working OK as a model but I have since discovered Llama3 is a lot less censored now so you rather use that. Keep in mind, its AI. It replaces no analyst. You will have to sanity check all results it gives.
Avatar
Hello everyone. I have a question about mobile devices. Do you know if it's possible, either on Android or iOS, to determine the position of a mobile device at a certain moment? For example, if at a certain time, let's say before an accident, the user lifted the phone. Maybe using some sensors logs? Thanks! (edited)
Avatar
Avatar
Ghibra Mad
Hello everyone. I have a question about mobile devices. Do you know if it's possible, either on Android or iOS, to determine the position of a mobile device at a certain moment? For example, if at a certain time, let's say before an accident, the user lifted the phone. Maybe using some sensors logs? Thanks! (edited)
Digitalferret 5/6/2024 2:20 AM
might be worth an echo in #mobile-forensic-decoding too
Avatar
Avatar
Digitalferret
might be worth an echo in #mobile-forensic-decoding too
Ghibra Mad 5/6/2024 2:25 AM
you're right, thanks
👍🏻 1
Avatar
Avatar
Ghibra Mad
you're right, thanks
Digitalferret 5/6/2024 2:26 AM
all good. for any Q that's a bit between the lines, don't be afraid to Xpost to relevant chans. but as ever and for anyone else watching, just don't break Wheatons Law 🙂
Avatar
Ghibra Mad 5/6/2024 2:29 AM
Lol, Wheatons Law, didn't know that one. I'll post on the relevant chans.
Avatar
Is there a way to take tags from a UFDR and put them onto the full extraction in Physical Analyzer so the tagged items in the UFDR are tagged in PA? (edited)
Avatar
Deleted User 5/6/2024 6:58 PM
Hey guys, looking for help with a specific issue. Doing a live triage recovery of a Windows 10 device right now. I have access and I'd like to recover any logs of messages sent and received via Teams and any webpages that were cached by Firefox, specifically from outlook.com. Where do I go in the file system to retrieve these files? Sorry, still kinda a DKIR noob. I really appreciate anyone who can help with this, since it's also an urgent personal matter. (edited)
Avatar
Avatar
Deleted User
Hey guys, looking for help with a specific issue. Doing a live triage recovery of a Windows 10 device right now. I have access and I'd like to recover any logs of messages sent and received via Teams and any webpages that were cached by Firefox, specifically from outlook.com. Where do I go in the file system to retrieve these files? Sorry, still kinda a DKIR noob. I really appreciate anyone who can help with this, since it's also an urgent personal matter. (edited)
This repository serves as a place for community created Targets and Modules for use with KAPE. - EricZimmerman/KapeFiles
This repository serves as a place for community created Targets and Modules for use with KAPE. - EricZimmerman/KapeFiles
Avatar
Hi everyone. Good morning/afternoon/evening (depending on where you are). I was wondering if someone can guide me on where to find something in Cellebrite's Inseyets PA 10. I am specifically trying to find the local IP and Port that was recorded during the File System Extraction. I tried to generate a report and this information is not shown in the Extraction Summary tab. Any help would be greatly appreciated. I apologize if this is not the correct place to ask, but it's the only way I'd learn. Thank you.
Avatar
Avatar
zembera
https://www.microsoft.com/en-au/microsoft-365/enterprise/microsoft365-plans-and-pricing M$ just updated E5 license with no Teams included....wtf!?
Microsoft yesterday announced it is restructuring Microsoft 365 and Office 365 product licensing worldwide, separating its Teams collaboration software from core productivity suites in most markets. The move aligns with a similar change made in the European Economic Area (EEA) last year. The software giant will now offer “no Teams” versions of i...
11:11 PM
This unbundling reflects changing work patterns where some organizations may prefer standalone communication and collaboration tools. It could make Microsoft more competitive against rivals like Slack and Zoom, particularly in price-sensitive markets
(edited)
Avatar
Avatar
PhrostByte
Is there a way to take tags from a UFDR and put them onto the full extraction in Physical Analyzer so the tagged items in the UFDR are tagged in PA? (edited)
I believe the session file .PAS (which contains all the user tags) has to go with the same version that created them. So if the UFDR report was created from the same version of PA, you should be able just to copy over the .PAS file and load the session which will show you all the tags.
Avatar
Has anyone had experience with a 400+ GB extraction not working in Cellebrite Reader? Says no data is found when it is huge.
Avatar
Avatar
theshark
Has anyone had experience with a 400+ GB extraction not working in Cellebrite Reader? Says no data is found when it is huge.
Digitalferret 5/7/2024 7:42 AM
huge but gibberish/random/other? Can you see anything in a HexEd?
7:43 AM
else ping @Cellebrite
👍 1
Avatar
CLB_4n6s_mc 5/7/2024 7:44 AM
@theshark which version of Reader / what is the Windows configuration ?
👍🏻 1
Avatar
Avatar
CLB_4n6s_mc
@theshark which version of Reader / what is the Windows configuration ?
Unable to confirm right now. Its likely that the report generation process was disrupted so this is probably why, trying again and will let you know if the issue persists.
Avatar
PlastikPistol 5/7/2024 10:27 AM
This is probably more LE related than anything but I need to summarize an incident that occurred using sources from multiple phone downloads and multiple Snapchat search warrant productions. I'm thinking of trying to do it in excel some way so that I can reference the source for each instance but I was wondering if anyone that's done something similar before had any advice. For reference, it's a gang case. Bunch of folks committed a robbery and there was a retaliatory shooting. The entire group talked about it and I need to be able to show that members had "knowledge" the crime happened, even if they weren't directly involved.
Avatar
Avatar
PlastikPistol
This is probably more LE related than anything but I need to summarize an incident that occurred using sources from multiple phone downloads and multiple Snapchat search warrant productions. I'm thinking of trying to do it in excel some way so that I can reference the source for each instance but I was wondering if anyone that's done something similar before had any advice. For reference, it's a gang case. Bunch of folks committed a robbery and there was a retaliatory shooting. The entire group talked about it and I need to be able to show that members had "knowledge" the crime happened, even if they weren't directly involved.
I don't have any personal experience with it but it seems like what you're looking for is something that Cellebrite Pathfinder is built towards. Not sure if you could reach out to a sales rep for a trial or know of any nearby agencies that might have it that could assist (edited)
Avatar
quick question, I recently received a file from a phone subpoena, it is a name_zip.zfs does anyone have an idea what I can use to open that, they did not include any instructions with the file.
4:34 AM
Have any of you seen it being exploited in the wild in DFIR investigations?
4:34 AM
Prior to the release of the cve
4:34 AM
And does anyone have any MDE KQL queries to hunt for this?
Avatar
Dar Belkasoft 5/8/2024 4:39 AM
Join the Digital Forensics Conference: BelkaDay 2024 The online conference is scheduled for May 13—14. It will feature presentations from Belkasoft speakers, invited digital forensics experts, and include networking sessions. Engage, learn, and practice with the DFIR community. For registration and schedule details: https://eu1.hubs.ly/H08_wds0
Avatar
Does anyone know if Timeline Explorer has a row limit? I'm viewing a file with supposedly 97,041 rows but TE is showing only 80k total lines. I have no filtering in place. I'm using v2.0.0.1. (edited)
9:49 AM
Nvm, file does actually only have 80k rows 😅.
💯 1
Avatar
Avatar
Villano
Does anyone know if Timeline Explorer has a row limit? I'm viewing a file with supposedly 97,041 rows but TE is showing only 80k total lines. I have no filtering in place. I'm using v2.0.0.1. (edited)
Andrew Rathbun 5/8/2024 9:50 AM
No row limit. I've ingested CSVs 14GB+ in size with TLE and it never truncated any data from the end, unlike Excel
👍🏾 1
Avatar
Working with Cybereason exports and apparently there is a discrepancy between the number of results returned in a query versus the amount it actually allows you to export to a CSV. That was the source of my confusion. All good now. Thanks.
👍 1
Avatar
the salaryman 5/8/2024 12:09 PM
how's sans sec503?
Avatar
so is Zscaler breached or not?
1:59 PM
threat intel community reporting a 1.8 billion dollar company breached (zscaler) - their stock dropped 4% and they stated they are looking into claims
Avatar
Felonius Monk 5/8/2024 8:23 PM
Zscalar looked fine at RSA
8:24 PM
That was a bad joke
Avatar
hello,Does anyone here use logrythm?
Avatar
Avatar
Solec
I don't have any personal experience with it but it seems like what you're looking for is something that Cellebrite Pathfinder is built towards. Not sure if you could reach out to a sales rep for a trial or know of any nearby agencies that might have it that could assist (edited)
PlastikPistol 5/8/2024 10:01 PM
I reached out to my rep.. thanks for pointing that out
Avatar
spicy_caveman 5/9/2024 8:22 AM
Is there anyone familiar in D365 devops environments?
Avatar
Avatar
PlastikPistol
I reached out to my rep.. thanks for pointing that out
Our local HIDTA has pathfinder, I have been told it is quite pricy... but the offer has been extended to ask for their help on cases like that.
Avatar
Hi. Does someone know a good forum, discord server or other platform to discuss methods and tooling for criminal analytics like AnalyseNotebook and more
Avatar
I'm looking for a nice community like this one
Avatar
Anyone from @Magnet Forensics able to help regarding a license issue? 😁
11:30 PM
or question rather
Avatar
Why is it showing as "logon type 3" instead of "logon type 10" when RDP login?
Avatar
Logon type 3 is shown for RDP Logon with enabled Network Level Authentication (NLA)
👍 1
Avatar
blackleitus 5/10/2024 6:37 PM
why security architecture are more in-house than outsourced?
Avatar
probably because they're the technical link to compliance, legal and ops
8:32 PM
if needed they'll let the architect bring in a consultant of some kind to help and sometimes those consultants drive more of the architecture but due to the sensitivity of some things the architect needs to be the one who apporoves and helps set forth the plan of action
Avatar
Avatar
the salaryman
how's sans sec503?
Andrew Rathbun 5/11/2024 5:52 AM
#training-education-employment
Avatar
Avatar
Jackson
Definitely get some street officer experience after you're done at college or school. Getting your head into the digital forensics field is sucky without.
I have a different take. Make sure the agency you applied for doesn't make you go through detention, patrol, detective, then a specialized assignment (like DF). It could be at least 5 years before you get to do what you originally wanted to do. Then you'll find out DF has small exposure and not very good for career path.
6:23 AM
That being said, getting in as a civilian is more difficult. 😂
Avatar
Avatar
drewmarin
if needed they'll let the architect bring in a consultant of some kind to help and sometimes those consultants drive more of the architecture but due to the sensitivity of some things the architect needs to be the one who apporoves and helps set forth the plan of action
blackleitus 5/11/2024 7:16 AM
I also have a theory that due PII , legal , ops , compliance, and everything between tech , and business are in-house , and just a narrow level of security architecture is outsourced. e.g. I haven't seen a consulting security architecture solutions besides ( tools ) . but strategic solutions neve; however I haven't compliance solutions, penetration testing, selling tools, but offerings like that never.
Avatar
Avatar
Beefhelmet
Sure thing, I'll send my version. Like I said it's mobile device specific, generally, I just use the SWGDE glossary from 2014 when doing computers. I do have information about specific proprietary information about a certain gray device that we don't talk much about. Just in terms of what extraction types it creates. I don't think it violates anything NDA-wise, just stuff that I think I would have to explain in court anyhow. (edited)
Did this ever come to life? Would anyone be interested in sharing a glossary of common terms and explanations that you use in reports with me? I have nothing to share in return unfortunately
Avatar
Has anyone produced a workflow type aid for device seizures for a laymen? I've been asked to put one together for frontline officers with what to do per device, so much of it is "Depends", but they dont want to hear that so thought I'd ask before I spend ages trying to formulate something sensical
Avatar
Op modify at the college had an interactive app for frontline officer
Avatar
Avatar
Kienn
quick question, I recently received a file from a phone subpoena, it is a name_zip.zfs does anyone have an idea what I can use to open that, they did not include any instructions with the file.
Ubuntu should be able to mount this. Looks like a disk image.
Avatar
blackleitus 5/12/2024 4:36 PM
does anyone know if there is a copy of nessus 3.0.0rc1 source code? (edited)
Avatar
Avatar
ApC
Did this ever come to life? Would anyone be interested in sharing a glossary of common terms and explanations that you use in reports with me? I have nothing to share in return unfortunately
Andrew Rathbun 5/12/2024 7:15 PM
A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms! - Digital-Forensics-Discord-Server/DFIRGlossary
Avatar
Has anyone been using @Magnet Forensics Automate? If so, have you had any success with the merge workflows? We've tested a large amount of devices now and it all seems to fail during the CAID Export process. If anyone could share their successful workflows, then I'd really appreciate it
Avatar
Avatar
Will-ko
Has anyone produced a workflow type aid for device seizures for a laymen? I've been asked to put one together for frontline officers with what to do per device, so much of it is "Depends", but they dont want to hear that so thought I'd ask before I spend ages trying to formulate something sensical
Ross Donnelly 5/13/2024 9:51 AM
Avatar
Avatar
RipeHype
Has anyone been using @Magnet Forensics Automate? If so, have you had any success with the merge workflows? We've tested a large amount of devices now and it all seems to fail during the CAID Export process. If anyone could share their successful workflows, then I'd really appreciate it
We've been having the same, seems the latest v is a little problematic.
Avatar
Question about Windows registry key NtfsDisableLastAccessUpdate I thought that this registry key showed that last accessed dates would be updated if the value was set to 80000000, and it was disabled if it was set to 80000001. I just checked my own workstation and it is set to 80000002, what does that mean? Also, Im seing people talk about the value being just a 0 or a 1, without the leading 8, but I just checked 2 computer images and they have the leading 8. Can anyone tell me what a 2 means in this registry key and whether or not its normail to see a value starting with 8? Thanks
Avatar
Avatar
PhrostByte
Question about Windows registry key NtfsDisableLastAccessUpdate I thought that this registry key showed that last accessed dates would be updated if the value was set to 80000000, and it was disabled if it was set to 80000001. I just checked my own workstation and it is set to 80000002, what does that mean? Also, Im seing people talk about the value being just a 0 or a 1, without the leading 8, but I just checked 2 computer images and they have the leading 8. Can anyone tell me what a 2 means in this registry key and whether or not its normail to see a value starting with 8? Thanks
How to Enable or Disable NTFS Last Access Time Stamp Updates in Windows 10
Avatar
Thanks, I actually just came back to say I found the answer in a 13 cubed video. Thanks Mr. Davis!
❤️ 1
Avatar
It was this video if anyone is interested https://www.youtube.com/watch?v=_D2vJZvCW_8&t=1s I learned a lot from this one. I was unaware of the erratic nature of the Last Accessed timestamp.
❤️ 2
Avatar
automate
Avatar
Avatar
PhrostByte
It was this video if anyone is interested https://www.youtube.com/watch?v=_D2vJZvCW_8&t=1s I learned a lot from this one. I was unaware of the erratic nature of the Last Accessed timestamp.
The SANS Windows poster has a good chart right up top that I use as a reference... I try to use that particular timestamp as a general pointer rather than hanging my report on it.
Avatar
I have a class for my BA in forensics and I have to create an investigation plan. Are there any good professional templates out there for this?
Avatar
th3m3ch4n1c 5/14/2024 12:38 AM
Hi community, do we have anyone in the house who have hands on with magnet axiom dfir tool. Pings are welcome 👍 (edited)
Avatar
What are the best tools for mobile forensics?
Avatar
Hey all, quick query, can anyone point me in a good direction for a current up to date keyword list for CSAM/CAM I can share among my team? Longer story, Ive had to rebuild my work rig (even longer story) and in doing so I've noticed my current keyword list seem to not be really all that up to date. Checking with others, it seems everyone has a keyword list that varies quite a bit, so I'd like to standardise that for future work.
Avatar
can you guys tell me what is the actual location of the email database in windows ??? (edited)
Avatar
Avatar
Joe.doe
Hey all, quick query, can anyone point me in a good direction for a current up to date keyword list for CSAM/CAM I can share among my team? Longer story, Ive had to rebuild my work rig (even longer story) and in doing so I've noticed my current keyword list seem to not be really all that up to date. Checking with others, it seems everyone has a keyword list that varies quite a bit, so I'd like to standardise that for future work.
Digitalferret 5/14/2024 4:35 AM
i'm sure other UK LE have better links, but for a start you could check VIC and CAID for hash sets. https://www.projectvic.org/get-hashes https://www.gov.uk/government/publications/child-abuse-image-database likely more links to keywords/hashes if you are looking for text base filtering/finding/
4:36 AM
You'll need to badge flash to get access to any of this, as one would expect
Avatar
Avatar
Alpha
can you guys tell me what is the actual location of the email database in windows ??? (edited)
Can you be a little more specific. What client are you looking for?
Avatar
Hello, I need the All Data Sheet for the IWEEKU-00T2456D brand and model POS memory card. How can I obtain it? Thank you for your help
Avatar
Avatar
Digitalferret
i'm sure other UK LE have better links, but for a start you could check VIC and CAID for hash sets. https://www.projectvic.org/get-hashes https://www.gov.uk/government/publications/child-abuse-image-database likely more links to keywords/hashes if you are looking for text base filtering/finding/
Thanks! Doesn't shock me it will need some verification but thats fine with me. Appreciate the help!
👍🏻 1
Avatar
Hey guys, learning a bit of WHOIS. My understanding that public facing IP of the site is identified by the ISP provider of the site which is 'http://tucowsdomains.com/' the infrastructure the operator is using to host his site. However, why do the nameservers resolve to: Name Server: ian.ns.cloudflare.com Name Server: venus.ns.cloudflare.com https://whois.domaintools.com/sabishare.com (edited)
Information about Tucows Domain Names
7:49 AM
ah wait it uses a hosting provider TuscowDomain for domain name registration Cloudflare as a CDN to distribute files since it's file hosting platform. (edited)
7:49 AM
Nvm xD
8:14 AM
Whoa, this is awesome
8:18 AM
Right after they gutted ESXi free?
Avatar
hello everyone. I need to know the date of reinstallation of mac os on two macbook pro versions 13.6 and 12.7, I have looked at the documentation of the artifacts on the internet but it does not appear like that in this version of mac os. Can somebody help me?
Avatar
Please see my question in #mobile-forensic-decoding if you have ever waited on a FFS extraction for 12+ hours and utilized only the zip dump without the .ufd pointer. (edited)
Avatar
Avatar
Joe.doe
Hey all, quick query, can anyone point me in a good direction for a current up to date keyword list for CSAM/CAM I can share among my team? Longer story, Ive had to rebuild my work rig (even longer story) and in doing so I've noticed my current keyword list seem to not be really all that up to date. Checking with others, it seems everyone has a keyword list that varies quite a bit, so I'd like to standardise that for future work.
Happy to email over our lists which are updated every so often
Avatar
Avatar
Sherlock
hello everyone. I need to know the date of reinstallation of mac os on two macbook pro versions 13.6 and 12.7, I have looked at the documentation of the artifacts on the internet but it does not appear like that in this version of mac os. Can somebody help me?
View the creation dates of the stock folders inside the users home directory perhaps?
Avatar
Avatar
KohleR
View the creation dates of the stock folders inside the users home directory perhaps?
At first I thought about the installation dates of the programs that come by default. but then a friend told me that those dates come from the compilation of the OS
2:06 PM
In fact, I'm looking for a folder or file that has the creation or modification date of the system reinstallation date - not the OS compilation date.
Avatar
Deleted User 5/14/2024 3:44 PM
Started to explore doing this work and wanted to know if anyone had a legal do's and don'ts guide of how to do this proffesionally. For example what kind of cases can you take? What kind of devices can you accept? Etc? (edited)
Avatar
Avatar
Rob
Happy to email over our lists which are updated every so often
That would be great!
Avatar
Avatar
Andrew Rathbun
Whoa, this is awesome
Ross Donnelly 5/15/2024 4:33 AM
Not so awesome is that it is free for personal use only (fair enough) and the paid version is now subscription only, with a yearly cost only slightly less than the old perpetual purchase.
😠 1
Avatar
AARC TASK FORCE 5/15/2024 7:05 AM
Is there anywhere to get a test image of a windows “suspect” device to test a triage tool?
Avatar
Avatar
AARC TASK FORCE
Is there anywhere to get a test image of a windows “suspect” device to test a triage tool?
Digitalferret 5/15/2024 7:24 AM
could do worse than poke around at https://corp.digitalcorpora.org/corpora/scenarios/ and subdirs
Avatar
Avatar
AARC TASK FORCE
Is there anywhere to get a test image of a windows “suspect” device to test a triage tool?
Disk images, tool validation reports and templates
Avatar
Anyone recently renew DVR Examiner and or Berla? Looking for estimated cost
Avatar
Hello all, I've taken a lot of classes and lots of vendor classes but finally ready to make the leap into SANS or IACIS probably on my own dime. For those that have done both, do you recommend one first over the other and if so, why? TIA
Avatar
Avatar
Rene Rojo
Hello all, I've taken a lot of classes and lots of vendor classes but finally ready to make the leap into SANS or IACIS probably on my own dime. For those that have done both, do you recommend one first over the other and if so, why? TIA
IACIS is a lot cheaper and a much longer process. I’ve only taken FOR500 but IACIS felt like a much bigger accomplishment.
Avatar
Digitalferret 5/16/2024 1:02 AM
oddly, unsurprised. :/
Avatar
Hello everyone, I have a question (silly maybe). Can we use a write blocker for mobile phones, if yes then which tools if you can suggest or if not then why if you can reply. Thank you 😊
Avatar
Hey all, super new here (and to the DF arena), I can't seem to find anything right now...I'm looking to be pointed in the right direction, I have a TikTok user id number, and just trying to see if I can find the username associated with it, I'm probably just overcomplicating things.
7:20 AM
nvm
7:20 AM
i just @'ed the number and the user came up
Avatar
Avatar
Rene Rojo
Hello all, I've taken a lot of classes and lots of vendor classes but finally ready to make the leap into SANS or IACIS probably on my own dime. For those that have done both, do you recommend one first over the other and if so, why? TIA
I personally did the GCFE first, then the CFCE and then finally the GCFA. SANS does a great job in consolidating most of what you'll need to know to be useful in a workplace, in a week. It's great if you just want to know where to find the answers, and what tools to use to get the answers. IACIS covers the foundations such as disk geometry and the overall investigation process. Some of the things taught you probably won't even need to know in your day-to-day role, such as interpreting Hex. It is also a very long process, but it is worth it's weight in gold - if you get a good coach. There's a slight cross over between week 2 of the IACIS BCFE course and the FOR500, as week 2 focuses on how to leverage tools to get your answers. If you have any specific Qs about any of those courses, lemme know! (edited)
💯 1
Avatar
Hmmm.... first of all, thanks for the responses. If I'm doing this on my own, then I may go IACIS route. But I like the idea of it being focused in SANS Again, thank you all.
Avatar
ScottKjr3347 5/16/2024 11:52 AM
I’ve heard of this and read the comments on Reddit but haven’t seen any blogs or testimonials with examples to provide additional insight. Has anyone with the forensic community experienced this after an update to 17.5? I reviewed my personal device and this did not happen to me. (edited)
Avatar
Avatar
CreepyChip
Hello everyone, I have a question (silly maybe). Can we use a write blocker for mobile phones, if yes then which tools if you can suggest or if not then why if you can reply. Thank you 😊
No, mobile forensic requires two-way communication for the magic to happen.
Avatar
What are folks recommendations for a personal knowledge bank tool? I’m playing with Microsoft Viva at work but want a tool for personal usage that works on mobile. I’m looking at something that can create indexed notes. So for example I could have a note with a useful script snippet (I’d definitely like code markup) I found to do a particular dfir thing, or a list of tools I want to research, favourite recipes, details for the type of oil my car takes etc etc
Avatar
Avatar
busted4n6
What are folks recommendations for a personal knowledge bank tool? I’m playing with Microsoft Viva at work but want a tool for personal usage that works on mobile. I’m looking at something that can create indexed notes. So for example I could have a note with a useful script snippet (I’d definitely like code markup) I found to do a particular dfir thing, or a list of tools I want to research, favourite recipes, details for the type of oil my car takes etc etc
Digitalferret 5/17/2024 1:42 AM
altho i couldn't get used to it, have you looked at Obsidian? https://obsidian.md/
👍 5
Avatar
Will take a look 🙂
Avatar
Confluence
👍 1
Avatar
Notepad++ with markdownpanel and a project in workspace. But I’m just weird.
💚 1
Avatar
Avatar
busted4n6
What are folks recommendations for a personal knowledge bank tool? I’m playing with Microsoft Viva at work but want a tool for personal usage that works on mobile. I’m looking at something that can create indexed notes. So for example I could have a note with a useful script snippet (I’d definitely like code markup) I found to do a particular dfir thing, or a list of tools I want to research, favourite recipes, details for the type of oil my car takes etc etc
i use Joplin, and sync it with nextcloud (edited)
Avatar
Joplin or Obsidian for me, anything beyond markdown I find gets in the way of just recording and moving on (looking at you, onenote...)
Avatar
Yes, I was looking at Obsidian but a self hosted sync option would be nice so will look at Joplin too
Avatar
you can self sync without their paid subscription with obsidian as well, I have a coworker or two that do (edited)
Avatar
Avatar
Beercow
Notepad++ with markdownpanel and a project in workspace. But I’m just weird.
Killithid the Mindslayer™ 5/17/2024 8:09 AM
I use a similar setup. You might also enjoy Cherrytree: https://www.giuspen.net/cherrytree/
Avatar
Please see my question in #malware-analysis if you have experience with Adv Log vs FFS on an iPhone detecting Pegasus, watchdog, malware in general.
Avatar
Avatar
ScottKjr3347
I’ve heard of this and read the comments on Reddit but haven’t seen any blogs or testimonials with examples to provide additional insight. Has anyone with the forensic community experienced this after an update to 17.5? I reviewed my personal device and this did not happen to me. (edited)
Let us know what you find out if anything!
👍 1
Avatar
Avatar
busted4n6
What are folks recommendations for a personal knowledge bank tool? I’m playing with Microsoft Viva at work but want a tool for personal usage that works on mobile. I’m looking at something that can create indexed notes. So for example I could have a note with a useful script snippet (I’d definitely like code markup) I found to do a particular dfir thing, or a list of tools I want to research, favourite recipes, details for the type of oil my car takes etc etc
I'm constantly trying to find "the best" personal notebook/knowledge bank lol. I really like OneNote, but it's absolute trash when it comes to trying to properly format code or helpful scripts. I have switched most of my notes to Standard Notes and have been using that for a few months.
Avatar
Avatar
busted4n6
What are folks recommendations for a personal knowledge bank tool? I’m playing with Microsoft Viva at work but want a tool for personal usage that works on mobile. I’m looking at something that can create indexed notes. So for example I could have a note with a useful script snippet (I’d definitely like code markup) I found to do a particular dfir thing, or a list of tools I want to research, favourite recipes, details for the type of oil my car takes etc etc
I honestly use a vscode and markdown files in a git 🤣
Avatar
I’m currently testing obsidian saved to my iCloud. Can access from iPhone and pc. Seems to be exactly what I want at the moment. Has a lot of settings haha
👍🏻 1
Avatar
Is there any books that you guys recommend for someone entering DFIR? Textbooks or the like.
Avatar
Avatar
John
Is there any books that you guys recommend for someone entering DFIR? Textbooks or the like.
if you're not familiar with the IT world or concepts, focus on those first - the best DFIR specialists (in enterprise world at least) have a broad understanding of most IT concepts
💯 1
10:06 AM
LEO focus is different though for sure
Avatar
Avatar
javanzato
if you're not familiar with the IT world or concepts, focus on those first - the best DFIR specialists (in enterprise world at least) have a broad understanding of most IT concepts
I have the background in cybersecurity, wondering about DF specific books
10:57 AM
and probably private not LE
Avatar
Avatar
John
I have the background in cybersecurity, wondering about DF specific books
A first-of-its-kind crowdsourced Digital Forensics and Incident Response (DFIR) book by the Digital Forensics Discord Server members to share knowledge!
💯 1
🔥 1
Avatar
Avatar
John
perhaps any physical books?
I have a list here https://ryd3v.com/dfir
RYD3V Software Engineer & Cybersecurity Enthusiast
6:01 PM
Maybe needs updating now though 🤣
Avatar
thanks
🍻 1
Avatar
Has anyone out there used CSI Linux as an investigations OS? I'm just playing around with some Linux options on a spare machine and looking for opinions on it.
Avatar
Avatar
busted4n6
What are folks recommendations for a personal knowledge bank tool? I’m playing with Microsoft Viva at work but want a tool for personal usage that works on mobile. I’m looking at something that can create indexed notes. So for example I could have a note with a useful script snippet (I’d definitely like code markup) I found to do a particular dfir thing, or a list of tools I want to research, favourite recipes, details for the type of oil my car takes etc etc
I would highly recommend Obsidian (search for Obsidian markdown) or Logseq. I think it’s an excellent tool to save brain matter 🙂
Avatar
Avatar
luis511_
I would highly recommend Obsidian (search for Obsidian markdown) or Logseq. I think it’s an excellent tool to save brain matter 🙂
Yes I’ve been playing with obsidian over iCloud over the weekend. does what I want it to and is pretty eye candy. Just need to figure out if there’s a way to make embedded pictures I copy/paste in go into an attachments folder or something
9:37 AM
Also need to see if it’s search features are up to it (wonder if I can vectorise it for gpt)
Avatar
@Magnet Forensics please can we have a button that lets you export whatever artefact table you have open as a csv there and then? I know you can do create export > CSV > items in current view > quick export but can there be a button like this?
👀 1
Avatar
I'm using Timeline Explorer and trying to filter out results in the processcmdline that contain "net use" by using the following filter in the search bar: Process_cmdline:-"net use :" But it filters all records, even the ones that don't contain that string in the column. What am I doing wrong? Note, the "_" is intended to be used as a wild card.
Avatar
put your exact query in triple ticks so it gets formatted as code as I think it's misinterpreting it
👍🏾 1
10:29 AM
anyways, I would just use filter editor
10:30 AM
!Contains([Process_cmdline], 'net use')
Avatar
Avatar
busted4n6
Yes I’ve been playing with obsidian over iCloud over the weekend. does what I want it to and is pretty eye candy. Just need to figure out if there’s a way to make embedded pictures I copy/paste in go into an attachments folder or something
There is… from the main view, create a folder to store attachments (name it whatever you want). Then go to settings, and under general (I believe) there is a setting to select a folder to store attachments. Select the folder you just created. (edited)
👍 1
Avatar
How does someone get their first job in this field if all the entry level postings are requiring a BS and years of experience? I thought grabbing the GCFA was going to hold some type of weight but it's looking to be valueless. Do I really need to dedicate two more years to getting a bachelor's?
Avatar
Avatar
abdurahman
How does someone get their first job in this field if all the entry level postings are requiring a BS and years of experience? I thought grabbing the GCFA was going to hold some type of weight but it's looking to be valueless. Do I really need to dedicate two more years to getting a bachelor's?
Digitalferret 5/20/2024 4:45 PM
#training-education-employment
Avatar
Avatar
abdurahman
How does someone get their first job in this field if all the entry level postings are requiring a BS and years of experience? I thought grabbing the GCFA was going to hold some type of weight but it's looking to be valueless. Do I really need to dedicate two more years to getting a bachelor's?
randomaccess 5/20/2024 9:50 PM
Start a blog
👆 2
Avatar
Avatar
randomaccess
Start a blog
DeeFIR 🇦🇺 5/20/2024 10:23 PM
Total time sink 😄
💯 1
Avatar
Avatar
FullTang
Let us know what you find out if anything!
ScottKjr3347 5/21/2024 5:31 AM
Best explanation of iOS 17.5.1 update and what was occurring: https://www.reddit.com/r/ios/s/Gfnnb200jS
Explore this post and more from the ios community
👍 2
Avatar
Very interesting, thanks for sharing! TIL When you download, share/receive, or take a screenshot (Mainly Safari screenshots) on your iPhone it sometimes (Depending on different factors) is saved to both the “Files” and “Photos” app.
Avatar
Avatar
randomaccess
Start a blog
Andrew Rathbun 5/21/2024 9:42 AM
This. It's pretty easy to make a name for yourself in this field. The hard part is following through with it. Do some research and share it. Write about it. Keep doing that. You'll get noticed and in due time, you'll get a job and make a good living. That's obviously oversimplified, but it's a universally applicable gameplan for literally anyone in this field to start with and adjust as you go along your journey. Ping anyone here for feedback at any time or for sanity checks
Avatar
Avatar
Andrew Rathbun
This. It's pretty easy to make a name for yourself in this field. The hard part is following through with it. Do some research and share it. Write about it. Keep doing that. You'll get noticed and in due time, you'll get a job and make a good living. That's obviously oversimplified, but it's a universally applicable gameplan for literally anyone in this field to start with and adjust as you go along your journey. Ping anyone here for feedback at any time or for sanity checks
Or start a discord server
Avatar
garfieldkhan 5/21/2024 11:34 AM
Hello, what is the best tool to extract apple watch and other smart watches? Which one do you think that is being used in most forensic departments?
Avatar
Avatar
abdurahman
How does someone get their first job in this field if all the entry level postings are requiring a BS and years of experience? I thought grabbing the GCFA was going to hold some type of weight but it's looking to be valueless. Do I really need to dedicate two more years to getting a bachelor's?
TooManyShots 5/21/2024 12:50 PM
Quite a few of the UK police forces are expanding. There aren't enough experienced people available, so will often apply a bums in seats policy. If you can demonstrate technical ability and know a few buzzwords "I recovered a lost partition" you'll be in with a chance... That's if you're UK based of course
Avatar
Avatar
abdurahman
How does someone get their first job in this field if all the entry level postings are requiring a BS and years of experience? I thought grabbing the GCFA was going to hold some type of weight but it's looking to be valueless. Do I really need to dedicate two more years to getting a bachelor's?
There's probably a lot of us in here that hold the GCFA certification (among others) that would disagree. I have experience and currently work in the field, and having a GCFA would mean a few things - displaying proficiency at Advanced Forensics, IR and Threat Hunting; providing an element of job security as I know if/when I ever change jobs that this will at a minimum get me second look; to work in consulting this is a sought after certification to provide to your client to assure proficiency; the coverage of topics is training and knowledge. I'm sure I'm leaving things out. Without a degree in anything and without certifications, breaking into the industry is difficult. For people in that position, the most likely career path would be to take any job on a security team and slowly try to transfer over while learning on the job. Networking helps an awful lot, as well as the mentioned blogs and research. Best of luck!
Avatar
Avatar
0xZ3us
There's probably a lot of us in here that hold the GCFA certification (among others) that would disagree. I have experience and currently work in the field, and having a GCFA would mean a few things - displaying proficiency at Advanced Forensics, IR and Threat Hunting; providing an element of job security as I know if/when I ever change jobs that this will at a minimum get me second look; to work in consulting this is a sought after certification to provide to your client to assure proficiency; the coverage of topics is training and knowledge. I'm sure I'm leaving things out. Without a degree in anything and without certifications, breaking into the industry is difficult. For people in that position, the most likely career path would be to take any job on a security team and slowly try to transfer over while learning on the job. Networking helps an awful lot, as well as the mentioned blogs and research. Best of luck!
I have the gcfa, I'm saying it's not doing anything for me with regard to finding a job. I sat the class and still go through the labs. I see the value in it there. It is not getting me an interview, let alone a job. Thanks.
4:33 PM
I've got a few ideas for the blog line of action. Unfortunately, I've capped out my tuition reimbursement for this year so I won't be able to add a new one until early next year.
Avatar
Avatar
abdurahman
I have the gcfa, I'm saying it's not doing anything for me with regard to finding a job. I sat the class and still go through the labs. I see the value in it there. It is not getting me an interview, let alone a job. Thanks.
Digitalferret 5/21/2024 4:44 PM
have you asked those that you apply to for guidance, further requirements / feedback? (edited)
Avatar
Avatar
Digitalferret
have you asked those that you apply to for guidance, further requirements / feedback? (edited)
They send an automated email with the denial. Which has me thinking I'm being AI denied without real eyes on. No experience and no degree is really feeling like a hard wall to get into the field.
4:58 PM
I've applied to maybe 60 so far.
5:05 PM
I have a buddy who is a director at a reputable DFIR firm (he's the one that talked me into the GCFA). He thinks the market just isn't good right now and so the few positions out there are being filled with people who have the experience and the degree.
Avatar
Avatar
TooManyShots
Quite a few of the UK police forces are expanding. There aren't enough experienced people available, so will often apply a bums in seats policy. If you can demonstrate technical ability and know a few buzzwords "I recovered a lost partition" you'll be in with a chance... That's if you're UK based of course
What if I was willing to relocate?
Avatar
Avatar
abdurahman
They send an automated email with the denial. Which has me thinking I'm being AI denied without real eyes on. No experience and no degree is really feeling like a hard wall to get into the field.
Digitalferret 5/21/2024 5:11 PM
so, are these cold calls, like enquiries@ ?
5:11 PM
or replies to job adverts
5:12 PM
no idea how you are applying, in what format etc. might it be worth seeking pro advice on how to apply / CV / resume etc?
Avatar
Avatar
Digitalferret
or replies to job adverts
Job listings on places like LinkedIn and indeed. A few smaller ones too.
Avatar
Digitalferret 5/21/2024 5:13 PM
so, you see a job listing on LinkedIn... how do you make an application? do you research the Co first?
5:13 PM
find an actual name to apply to or info@
Avatar
I've also applied directly on companies career sites like Verizon's, marriots, cloud strikes, sentinelones.
Avatar
Avatar
Digitalferret
so, you see a job listing on LinkedIn... how do you make an application? do you research the Co first?
There is an apply button, you upload your resume, input your experience and education, and then submit.
Avatar
Digitalferret 5/21/2024 5:14 PM
it might be that you have to revisit the entire process of finding and applying. it seems to me this is a shotgun approach, just apply to anyone and everyone
Avatar
I do not research the companies but a lot of them are well known. I simply apply to every position I see that I feel at all qualified for.
Avatar
Digitalferret 5/21/2024 5:15 PM
if you follow this sort of process, even with a BSc, there's no g'tee of responses.
Avatar
Avatar
Digitalferret
it might be that you have to revisit the entire process of finding and applying. it seems to me this is a shotgun approach, just apply to anyone and everyone
I'll ask around to see if there are other ways. I don't know of any other way.
Avatar
Avatar
abdurahman
I'll ask around to see if there are other ways. I don't know of any other way.
Digitalferret 5/21/2024 5:16 PM
maybe start out by working out exactly what you want to do, or what really interests you?
5:18 PM
then looking for the type of job that it fits, or reverse that and check for a particular job title, and find companies that have that sort of position.
5:18 PM
you have to stand out from the crowd, somehow. Personnel staff see hundreds of apps.
5:19 PM
as an example, and this is how desperate they can be to whittle down the stack of apps. this is from year ago, when it was pen and paper. 1: please fill in this form using Black Biro.
5:19 PM
they would bin any and every app, no matter what quals, if it was not in Black Biro
Avatar
Lmao 🤣
Avatar
Digitalferret 5/21/2024 5:20 PM
this bring it back to the excellent suggesetion about starting a blog, YT chan or whatever
5:21 PM
you might laugh, but if some poor dude gets 250 apps on his desk, he needs a quick and easy way to reduce it.
Avatar
Well if that is how they do it then no degree should just go right in the bin.
5:23 PM
Because the metric I keep seeing is that 85% of the applicants have a BS or masters.
Avatar
Digitalferret 5/21/2024 5:23 PM
then if you don't, you need another way in.
Avatar
Are internships a thing in DFIR?
5:26 PM
I want to work on intrusions. Like crowdstrike or s-rm. A company is owned, I wanna come in and see how, where they are, what they have access to, what their objectives are, and how to remediate the situation.
5:26 PM
From there I want to move into consulting.
Avatar
Digitalferret 5/21/2024 5:26 PM
consulting.... that's waaay down the line i'd guess, but ye, so really you want to focus on Incident Response? (edited)
Avatar
Yes. Incident response.
5:28 PM
Id work weekends for a company for no money if they let me use it as experience.
Avatar
Digitalferret 5/21/2024 5:29 PM
kk, it seems you just need to find a side door in like that. is there anyone to ask, at your previous school? or if you have any in your country, it might be worth writing, not a job app, but for information
5:30 PM
the pther really big point, I've just found myself, recently, is learning how to negotiate.
5:31 PM
this means how to ask questions that get a response you want.
5:31 PM
ima leave you with this, late here.
5:31 PM
go to Youtube and type in "Chris Voss".
Avatar
I have an associates worth of credits (2 years of college) from two different universities. I could write them and see if they have guidance.
Avatar
Digitalferret 5/21/2024 5:31 PM
find one of the "ten points" or "6 ways to" type videos (edited)
5:32 PM
i wish I'd have found this sort of thing 40yrs ago
Avatar
Avatar
Digitalferret
find one of the "ten points" or "6 ways to" type videos (edited)
Will do. Thanks for your time. Enjoy your rest.
Avatar
Avatar
abdurahman
Will do. Thanks for your time. Enjoy your rest.
Digitalferret 5/21/2024 5:33 PM
best of luck. really do look up that guy. and get back to any of us on here as you move forward, but for best effect, put it in #training-education-employment , maybe also check out the jobs slot on the menu
Avatar
🤦‍♂️I thought this was training and education. My bad. I'll watch them tonight. Thanks for your help.
👍🏻 1
Avatar
Digitalferret 5/21/2024 5:36 PM
this too, to see what sort of jobs/scenarios there are. laters (edited)
5:37 PM
Avatar
What could be the reason for creating such "BITXXXX.tmp" files?
Avatar
Avatar
M3r1T
What could be the reason for creating such "BITXXXX.tmp" files?
Temporary file for sccm when it’s transferring files. Could be caused by an issue on the iis server.
Avatar
I'm messing around in my network and my ARPs and nmap requests are coming back just with the gateway. Tested on a different network and my phone replies arps and ping packets just fine. My google-fu might be weak here but is the router firewall blocking all internal communication or is it something else? (edited)
Avatar
Avatar
abdurahman
How does someone get their first job in this field if all the entry level postings are requiring a BS and years of experience? I thought grabbing the GCFA was going to hold some type of weight but it's looking to be valueless. Do I really need to dedicate two more years to getting a bachelor's?
There many ways to get into this field, you just need the one way that works for you. I can give you my method as I didn't have a degree, certification, or experince when I first got in. I did enroll in a undergrad certificate program for DF first. (You already have GCFA so there is not point in doing this right now) You have the certification so now you need hands on experince. Start with the little stuff of learning to fill out a CoC, next get experince imaging laptop/computers/cell phones of all operating systems. Work on your own equipment as you know what you did to your own devices which makes analysis easier. Next would be to participate in CTF's or download old CTF's and perform those. You now have a certification and experince to fill up your resume. Just because the job requires two years of experince, you can gain years of experince in months by doing the job. Lastly, I would say start to network. Four eyes looking for a job is better than two.
❤️ 1
Avatar
Avatar
Ash4n6
There many ways to get into this field, you just need the one way that works for you. I can give you my method as I didn't have a degree, certification, or experince when I first got in. I did enroll in a undergrad certificate program for DF first. (You already have GCFA so there is not point in doing this right now) You have the certification so now you need hands on experince. Start with the little stuff of learning to fill out a CoC, next get experince imaging laptop/computers/cell phones of all operating systems. Work on your own equipment as you know what you did to your own devices which makes analysis easier. Next would be to participate in CTF's or download old CTF's and perform those. You now have a certification and experince to fill up your resume. Just because the job requires two years of experince, you can gain years of experince in months by doing the job. Lastly, I would say start to network. Four eyes looking for a job is better than two.
Thanks for your reply! What is CoC? Currently I am mass applying on anything SOC or cyber security analyst related. Using linkedin and indeed. Is there another avenue besides this? With regard to experience, are you saying doing it on my own using my own machine I can then therefore put on my resume I have X years of experience doing the things you listed? Again, thanks for the advice and guidance.
Avatar
Avatar
abdurahman
Thanks for your reply! What is CoC? Currently I am mass applying on anything SOC or cyber security analyst related. Using linkedin and indeed. Is there another avenue besides this? With regard to experience, are you saying doing it on my own using my own machine I can then therefore put on my resume I have X years of experience doing the things you listed? Again, thanks for the advice and guidance.
CoC is Chain of Custody. I always advice people to start with the mastering the little things first because that is what you will be tasked with early on...in most cases. Yes I would do forensics on your own machines. Request the free trial from vendors to learn how different tools work and how different tools can examine the same image and present the same data in different ways. I wouldn't say you have 2 years of experience if you don't have 2 years experience. I would say, based on your experience you have two years of experience after you imaged a number of different devices and done some forensics on your own devices.
Avatar
Avatar
abdurahman
Thanks for your reply! What is CoC? Currently I am mass applying on anything SOC or cyber security analyst related. Using linkedin and indeed. Is there another avenue besides this? With regard to experience, are you saying doing it on my own using my own machine I can then therefore put on my resume I have X years of experience doing the things you listed? Again, thanks for the advice and guidance.
Digitalferret 5/23/2024 1:50 AM
what you can actually demonstrate is that you can take your own initiative and start. interviewers will be so sick of <say students> saying "i'm really passionate about <whatever>" without showing any proof that they actaully are. With regard to a blog or Vlog, if you record your processes when you do them it means you don't then have to do it all again to make a blog/vlog. get source material and store; you can edit it all later. This is absolute gold: showing practical initiative
💯 1
Avatar
eques_veritae 5/23/2024 2:29 AM
Hello everyone, got a question about ELK indexing timestamp, but i'm not sure about the good channel to ask, so here I am...^^
Avatar
Avatar
abdurahman
I'll ask around to see if there are other ways. I don't know of any other way.
I'd also recommend the book by Ken Coleman called "The Proximity Principle" it discusses getting jobs in this market. Your best bet is to network and meet people doing the job, they can help you get a foot in the door and get past some of the AI screening nonsense.
🔥 3
👍 1
Avatar
digital Bowles 5/23/2024 3:39 PM
Delete if need too. Have one of those weird questions. My agency is looking to do a PSA video of skimmers. I'm looking to see if anyone has like an ATM key pad or the store credit card things. Does not have work.
📬 1
Avatar
Avatar
digital Bowles
Delete if need too. Have one of those weird questions. My agency is looking to do a PSA video of skimmers. I'm looking to see if anyone has like an ATM key pad or the store credit card things. Does not have work.
www.theinternet.com
Avatar
Anyone going to Techno Security this year?
👋 2
Avatar
Hi there. i already involved in this case (password encryption cracking, tomz — 16.05.2024 11:18). The running system is a windows 11 and the update pattern state is march in 2022. means its a old windows 11. which channel is the best for questions about metaploit? my Idea is, to get access from outside via network. Network is running via an usb adapter, dhcp gives the device an ip adress. seems good so far. do we have a channel for metasploit or getting privileges over network?
Avatar
Avatar
dcs453
Anyone going to Techno Security this year?
Not east but I'll be at west
Avatar
Avatar
tomz
Hi there. i already involved in this case (password encryption cracking, tomz — 16.05.2024 11:18). The running system is a windows 11 and the update pattern state is march in 2022. means its a old windows 11. which channel is the best for questions about metaploit? my Idea is, to get access from outside via network. Network is running via an usb adapter, dhcp gives the device an ip adress. seems good so far. do we have a channel for metasploit or getting privileges over network?
I assume the drive is encrypted? Usually, you'll need to do a nmap (or similar) to find open ports/running services first...
Avatar
How can one restrict/disable/remove OneNote's driver "Microsoft Print to PDF" option? As we have people who are able to exhilarate data using OneNote
Avatar
Does anyone have or utilize a public collection for DFIR /OSINT tools. I am trying to build a opensource repository of tools and would be interested in checking out any collections to add to my list.
Avatar
Avatar
theshark
Does anyone have or utilize a public collection for DFIR /OSINT tools. I am trying to build a opensource repository of tools and would be interested in checking out any collections to add to my list.
Trying to understand what you're asking... looking for a big list of tools?
3:13 PM
if so - I point people to the stark forensics start.me: https://start.me/p/q6mw4Q/forensics
❤️ 1
Avatar
Avatar
whee30
Trying to understand what you're asking... looking for a big list of tools?
"tools" in the general sense. Sites, Code, etc yeah that is helpful thanks.
Avatar
Avatar
theshark
"tools" in the general sense. Sites, Code, etc yeah that is helpful thanks.
_blackbeardactual_ 5/29/2024 12:39 AM
This OSINT person is active on Twitter (https://x.com/cyb_detective?s=21&t=0SNsIKFUlewoiWkyBxbpTQ) and has a GitHub with lots of links - https://github.com/cipher387/osint_stuff_tool_collection
Every day I write about #osint (Open Source Intelligence) tools and techniques. Also little bit about forensics and cybersecurity in general. Work in @netlas_io
A collection of several hundred online tools for OSINT - cipher387/osint_stuff_tool_collection
❤️ 1
Avatar
Hi, Is someone aware of any FREE tool that would do triage WITHOUT admin rights? I know we could acquire way less artifacts but it's still possible to acquire quite a lot. I've seen Belkasoft Triage does it (but warns about the fact we would miss a lot of stuff). But this isn't free. Thanks
Avatar
Avatar
Vergas
Hi, Is someone aware of any FREE tool that would do triage WITHOUT admin rights? I know we could acquire way less artifacts but it's still possible to acquire quite a lot. I've seen Belkasoft Triage does it (but warns about the fact we would miss a lot of stuff). But this isn't free. Thanks
mikeforensic 5/29/2024 4:24 AM
Maybe Autopsy (Sleuthkit) can be used to perform a triage
❤️ 1
Avatar
Avatar
Vergas
Hi, Is someone aware of any FREE tool that would do triage WITHOUT admin rights? I know we could acquire way less artifacts but it's still possible to acquire quite a lot. I've seen Belkasoft Triage does it (but warns about the fact we would miss a lot of stuff). But this isn't free. Thanks
I think it is free now, https://belkasoft.com/t
Belkasoft T: Portable, quick, smart, and FREE! Your go-to tool for efficient digital forensic tasks. Simplify your investigations with this powerful, no-cost solution.
❤️ 1
Avatar
Are watchlists the best automated search tool Cellebrite Inseyets provides?
Avatar
Avatar
theshark
Are watchlists the best automated search tool Cellebrite Inseyets provides?
CLB-DannyTheModeler 5/29/2024 7:17 AM
It really depends what you want to search for and where? If you provide more details, or examples, I can guide you to the best available option.
Avatar
Avatar
CLB-DannyTheModeler
It really depends what you want to search for and where? If you provide more details, or examples, I can guide you to the best available option.
The search lists (large) are primarily company/entity names, emails, numbers, personal names. The second list is just data from certain countries (so country name) . Let me know what you think, thanks. (edited)
Avatar
Avatar
theshark
The search lists (large) are primarily company/entity names, emails, numbers, personal names. The second list is just data from certain countries (so country name) . Let me know what you think, thanks. (edited)
CLB-DannyTheModeler 5/29/2024 7:36 AM
In what part of the data would you like to perform the search- Decoded data like text messages, emails, or file names? Are you looking to search within file content?- Documents? (edited)
Avatar
Avatar
CLB-DannyTheModeler
In what part of the data would you like to perform the search- Decoded data like text messages, emails, or file names? Are you looking to search within file content?- Documents? (edited)
Yes, decoded data is good enough, but I will additionally want to search within file content if the results are slim.
Avatar
Avatar
theshark
Yes, decoded data is good enough, but I will additionally want to search within file content if the results are slim.
CLB-DannyTheModeler 5/29/2024 7:38 AM
Looks like your best option is the WatchLists, especially if the lists are long and you use the same list across multiple cases.
Avatar
Avatar
CLB-DannyTheModeler
Looks like your best option is the WatchLists, especially if the lists are long and you use the same list across multiple cases.
Ok, what is Match List as opposed to Whole word. Not fully understanding.
Avatar
CLB-DannyTheModeler 5/29/2024 7:40 AM
If you want to have multiple terms together ( A AND B) and the list of terms is smaller than Advanced Search is a better fit.
👍 1
Avatar
Avatar
theshark
Ok, what is Match List as opposed to Whole word. Not fully understanding.
CLB-DannyTheModeler 5/29/2024 7:45 AM
if you search for "Drugs" not as a whole word, you will also get "Drugstore" With Match Case "Drugs" and "drugs" are 2 different terms. It's rare that you will need to match case.
👍 1
Avatar
kartoffel4n6 5/29/2024 9:21 AM
Any podcasts, blogs, or general tips for court testimony?
Avatar
Avatar
kartoffel4n6
Any podcasts, blogs, or general tips for court testimony?
Digitalferret 5/29/2024 9:28 AM
yeh, when read your rights, take the option to stay silent, get a good atto... ohhh wait up ...
😅 3
Avatar
Avatar
kartoffel4n6
Any podcasts, blogs, or general tips for court testimony?
Prepare. Know all the facts. Review reports or other factual information that is realted to your testimony. Keep your answers brief and to the point, don't give more detail then necessary to truthfully answer a question.
💯 3
Avatar
Avatar
CyberGhost
Prepare. Know all the facts. Review reports or other factual information that is realted to your testimony. Keep your answers brief and to the point, don't give more detail then necessary to truthfully answer a question.
Yup. Answer the question that was asked. Ask them to rephrase or clarify questions that have overly broad answers
💯 2
Avatar
kmacdonald1565 5/29/2024 11:29 AM
@Cellebrite anyone available for like a 2 second question. having problems on my portal and wondering if it is a me problem or an everyone problem
📬 1
👌 1
cellebritelogo2 1
Avatar
For those of you in an accredited lab (esp if ANAB), what companies do you guys use for your Computer Forensics/Mobile Forensics Proficiency Tests (that are accredited Prof Test providers)? The only one we have on our list now is CTS, ISCFE used to have them apparently now they don't.
Avatar
Avatar
Vergas
Hi, Is someone aware of any FREE tool that would do triage WITHOUT admin rights? I know we could acquire way less artifacts but it's still possible to acquire quite a lot. I've seen Belkasoft Triage does it (but warns about the fact we would miss a lot of stuff). But this isn't free. Thanks
define 'triage'?
Avatar
Avatar
kartoffel4n6
Any podcasts, blogs, or general tips for court testimony?
Don't overstate your answers. If you don't know an answer, don't be afraid to say so - don't guess. Don't answer hastily; take your time to think over the question and make your answer as accurate as possible. Get a good night's sleep. Don't roll your eyes at questions.
👍 2
💯 1
Avatar
Avatar
kartoffel4n6
Any podcasts, blogs, or general tips for court testimony?
https://cellebrite.com/en/dfu_talks_series/dfu_video/ Here are a few that was put together by Jared Barnhart.
Avatar
Avatar
javanzato
define 'triage'?
Triage and acquisition* Kape like
Avatar
Avatar
Grok
For those of you in an accredited lab (esp if ANAB), what companies do you guys use for your Computer Forensics/Mobile Forensics Proficiency Tests (that are accredited Prof Test providers)? The only one we have on our list now is CTS, ISCFE used to have them apparently now they don't.
We used CACI for our last couple
👍 1
Avatar
We have a HDD that appears to have been affected by MARS Ransomware. Our POLIT officers have triaged it and deemed it positive for CSAM, anyone from @Law Enforcement [UK] or else got any ideas whether its worthwhile imaging and processing it?
Avatar
Avatar
Rob
We have a HDD that appears to have been affected by MARS Ransomware. Our POLIT officers have triaged it and deemed it positive for CSAM, anyone from @Law Enforcement [UK] or else got any ideas whether its worthwhile imaging and processing it?
Probably is worthwhile yes. Ransomware generally will encrypt data that is live and of value to the user. Word documents, images etc but often leaves file names in place and many other sources of attribution will not likely have been damaged by the ransomware
Avatar
How did your POLIT triage it?
Avatar
Avatar
Gladros
How did your POLIT triage it?
ADF via writeblockers
Avatar
You may be able to attribute file access via link files, shellbags, thumbnail caches that may not have been hit by ransomware. In practise however you have a drive that’s demonstrably been altered by an unknown and unauthorized third party. Any defence team will jump on that and argue the case that they could have also placed the CSAM too
Avatar
Yet to see their ADF report on it, but coin flipping between imaging it or not atm
Avatar
Avatar
Rob
We have a HDD that appears to have been affected by MARS Ransomware. Our POLIT officers have triaged it and deemed it positive for CSAM, anyone from @Law Enforcement [UK] or else got any ideas whether its worthwhile imaging and processing it?
Has the ransomware happened post triage? If you can see data at triage I’d say it’s definitely worth a full exam.
Avatar
Avatar
Rob
Yet to see their ADF report on it, but coin flipping between imaging it or not atm
What’s the harm in capturing an image to see what you get?
Avatar
Happened before triage whilst in owners use. Data seems to have been converted to data streams so potentially we'll just get filenames.
Avatar
Are you using ADF to scan for deleted files? If not and it has pulled out live images id say hit it with all the tools you have. X-ways will pull out data regardless of where it’s stored.
Avatar
Avatar
Ryan-G
Are you using ADF to scan for deleted files? If not and it has pulled out live images id say hit it with all the tools you have. X-ways will pull out data regardless of where it’s stored.
Yes, got a custom profile which scans deleted + live etc
Avatar
Avatar
Rob
Yes, got a custom profile which scans deleted + live etc
Ok cool, I guess it’s a nothing to lose situation the bulk of the work is machine time. Be interesting to see the results.
👍 1
Avatar
Hello, I don't know if this is the right place but could someone from Norwegian law enforcement contact me via dm. This is about a young victim of grooming located near Randesund Norway. I would like to be able to transmit the information to a competent service. thx.
Avatar
Avatar
Rob
Yes, got a custom profile which scans deleted + live etc
Had a quick read about it. It looks like it renames the file extension. Maybe processing the file header/signature will recover the data? It shouldn’t have affected any internet artificers or access records etc.
Avatar
Avatar
Rob
We have a HDD that appears to have been affected by MARS Ransomware. Our POLIT officers have triaged it and deemed it positive for CSAM, anyone from @Law Enforcement [UK] or else got any ideas whether its worthwhile imaging and processing it?
Hi Rob, I’m a cyber crime DC and do a lot of DF with ransomware infected devices. Happy to help if you want to drop me a DM. That said, you should look into why it has been deemed to be affected by MARS, is it an AV alert? The best approach is to image but you need to be extremely careful when handling that image. Tools such as AXIOM might cause AV alerts when processing the disk as it unpacks files to a temp directory. FTK Imager also copies any file you click on to a temp folder so will cause AV alerts. This is fine though but might upset IT if they monitor the alerts. A way to further explore the IIOC might be to do a sector scan & carve but ultimately you will need to run a proper scan. depending on the comfort of your TM you may decide to build a standalone PC to do the scan on, export the project VICs then encrypt the scan providing only media for Griffeye etc
👍 1
Avatar
So this is kind of a big deal. https://operation-endgame.com
Operation endgame
Pog 1
4:45 AM
Kudos on the ops. If anyone here knows someone involved, give em a high five. 👏👏👏
👍 2
Avatar
A question for those who are versed in android architecture. We have a Samsung galaxy s21 where we have carried out a full file system extraction with cellebrite premium. The extraction also provides a decoded version of the secure folder. We have the attached file paths containing pertinent content. We understand that the mnt pass through relates to the mounting of the secure folder. However what we are really struggling with is the path containing dualapp. Anyone come across this before? Ps the gallery is visible in both the standard user account and the secure folder. Both galleries contain different data. (edited)
Avatar
Avatar
hrec
Hello, I don't know if this is the right place but could someone from Norwegian law enforcement contact me via dm. This is about a young victim of grooming located near Randesund Norway. I would like to be able to transmit the information to a competent service. thx.
@Law Enforcement [Norway]
6:35 AM
Hey guys, my friend’s TikTok account got hacked, and I’m trying to help her recover some of her deleted videos, I was using this snaptik.app and managed to download some of them, but it doesn’t work with others, do you know anything that can help?
Avatar
Is dualapp not going to relate to use of Samsung’s Dual App feature (https://infinitehub.medium.com/how-to-use-dual-app-in-samsung-c125bcca835c where you have two sets of data for the same app
How to Activate Dual App Messenger in Android
Avatar
Avatar
hrec
Hello, I don't know if this is the right place but could someone from Norwegian law enforcement contact me via dm. This is about a young victim of grooming located near Randesund Norway. I would like to be able to transmit the information to a competent service. thx.
Could you please send an email to kripos@politiet.no, which is the National Criminal Investigation Service in Norway?
Avatar
Avatar
hrec
Hello, I don't know if this is the right place but could someone from Norwegian law enforcement contact me via dm. This is about a young victim of grooming located near Randesund Norway. I would like to be able to transmit the information to a competent service. thx.
I have sent you a DM.
Avatar
Avatar
Ghoulgnome
A question for those who are versed in android architecture. We have a Samsung galaxy s21 where we have carried out a full file system extraction with cellebrite premium. The extraction also provides a decoded version of the secure folder. We have the attached file paths containing pertinent content. We understand that the mnt pass through relates to the mounting of the secure folder. However what we are really struggling with is the path containing dualapp. Anyone come across this before? Ps the gallery is visible in both the standard user account and the secure folder. Both galleries contain different data. (edited)
cf-eglendye 5/30/2024 6:56 AM
Have you got any other user accounts listed, something refreshing in the latest DFN Now podcast was talking about DualApp, which Josh Hickman described in the transcript as being listed as User 95. Would be interesting to see if you have any other users other than 0 and 150... https://digitalforensicsnow.buzzsprout.com/2236761/15083666-android-security-market-acquisitions-research-tools-more-tools (edited)
Join us for an engaging session where we'll recap recent events and activities before diving into the latest research, cutting-edge tools, and exciting updates!Tune in as we explore groundbreaking research conducted by emerging stars in the DFIR c...
Avatar
@Cellebrite any tips on filtering watchlist keyword hits by date?
Avatar
I am trying to find any artefacts that show how an IOS device was unlocked, either by biometrics or PIN. I have the knowledgeC database showing that the device was unlocked at certain times, but no information on the method used, is this sorted anywhere?
Avatar
Avatar
Kazhulu
I have sent you a DM.
yes thx a lot
Avatar
Avatar
RipeHype
I am trying to find any artefacts that show how an IOS device was unlocked, either by biometrics or PIN. I have the knowledgeC database showing that the device was unlocked at certain times, but no information on the method used, is this sorted anywhere?
Assuming you have a FFS, you can try your luck with Unified Logs. This blog post by @Lionel Notari shows how to answer your question exactly: https://www.ios-unifiedlogs.com/post/ios-unified-logs-unlock
Disclaimer: This article assumes that you are in possession of a Logs archive (.logarchive file).An invaluable source of information.Established during the year 2016, one of the primary objectives of Unified Logs iOS is to record as much information as possible regarding the device's activity. Given this premise, it can be highly intriguing for ...
🤩 3
❤️ 1
Avatar
Avatar
busted4n6
Is dualapp not going to relate to use of Samsung’s Dual App feature (https://infinitehub.medium.com/how-to-use-dual-app-in-samsung-c125bcca835c where you have two sets of data for the same app
We had considered that as a possibility but as far as we can tell it only seems to work mainly with messaging type apps, which in the settings were all turned off. We would’ve expected any media from those apps to be listed as a separate internal storage on the device.
Avatar
Avatar
cf-eglendye
Have you got any other user accounts listed, something refreshing in the latest DFN Now podcast was talking about DualApp, which Josh Hickman described in the transcript as being listed as User 95. Would be interesting to see if you have any other users other than 0 and 150... https://digitalforensicsnow.buzzsprout.com/2236761/15083666-android-security-market-acquisitions-research-tools-more-tools (edited)
Thanks for the link. I will take a look and update, but it’s likely to be tomorrow now.
Avatar
Avatar
Ghoulgnome
We had considered that as a possibility but as far as we can tell it only seems to work mainly with messaging type apps, which in the settings were all turned off. We would’ve expected any media from those apps to be listed as a separate internal storage on the device.
But I wonder if it’s to do with the fact many apps can ‘see’ the user space filesystem (eg the gallary, downloads folder). Perhaps the folder is where Samsung redirect the second version of an app to (to prevent identical apps fighting over the same folder)? Or could it simply be where the DualApp app itself stores some data?
Avatar
Avatar
busted4n6
But I wonder if it’s to do with the fact many apps can ‘see’ the user space filesystem (eg the gallary, downloads folder). Perhaps the folder is where Samsung redirect the second version of an app to (to prevent identical apps fighting over the same folder)? Or could it simply be where the DualApp app itself stores some data?
Looking at https://xiaomi.eu/community/threads/dual-apps-cant-access-to-gallery-dcim-of-the-phone-mi-10-pro.60487/ suggests deliberate separation of user space folders for two iterations of the same app (edited)
Hi there, I recently flashed MIUI 12.5 21.3.17 from Stable CN (Mi 10 Pro). Everything is fine but the dual apps. The dual apps can't access the Gallery or apps installed on the phone. Especially when sending a picture thru Whatsapp, I can't find any existing photo albums or folders. However...
7:47 AM
Certain apps save files straight to DCIM
Avatar
Lionel Notari 5/30/2024 7:57 AM
@CLB-ShaiS Thanks for the mention! @RipeHype If you need any help, don't hesitate to contact me, it might be challenging sometimes
Avatar
Avatar
busted4n6
But I wonder if it’s to do with the fact many apps can ‘see’ the user space filesystem (eg the gallary, downloads folder). Perhaps the folder is where Samsung redirect the second version of an app to (to prevent identical apps fighting over the same folder)? Or could it simply be where the DualApp app itself stores some data?
Good theories. Difficult to prove in our case unfortunately. There's no sign of any legacy databases or artefacts linked to the actual app named DualApp. Unfortunately, whilst the thumbnails are still present, it appears that the original images are not located in any gallery anymore, thus not leaving us with many breadcrumbs to follow. It's proving difficult to associate them to anything particular which means the wording in the report is going to be rather vague at the moment 🙂
Avatar
Avatar
rojo
We used CACI for our last couple
Any good? The last CTS test I took had several errors in it, super frustrating, cost me a lot of time trying to find something that wasn't there (they misspelled things and said things that were wrong).
Avatar
Avatar
rojo
We used CACI for our last couple
This was for a Proficiency Test to retain accreditation for your lab? Our this was a lab you sent a Computer Forensic request to? I see them online, don't see that they are an organization you can buy PT tests from? https://www.caci.com/digital-forensics-laboratory
CACI's Digital Forensics Laboratory (CDFL) is a premier, internationally accredited full-service computer, mobile device, and audio/video forensics laboratory. It provides on and offsite data collection, preservation, processing, and analysis solutions, and managed services.
Avatar
Avatar
Grok
This was for a Proficiency Test to retain accreditation for your lab? Our this was a lab you sent a Computer Forensic request to? I see them online, don't see that they are an organization you can buy PT tests from? https://www.caci.com/digital-forensics-laboratory
Yeah, as part of our ongoing quality/accreditation: https://www.caci.co.uk/services/digital-forensics/proficiency-testing/ The PT is on their UK site, you’d have to check if they offer it internationally
CACI have launched a new Digital Forensic Proficiency Testing service and have applied to UKAS for ISO/IEC 17043:2010 accreditation.
👍 2
Avatar
Avatar
rojo
Yeah, as part of our ongoing quality/accreditation: https://www.caci.co.uk/services/digital-forensics/proficiency-testing/ The PT is on their UK site, you’d have to check if they offer it internationally
Awesome, thanks, will have to see if they offer one for the USA.
Avatar
Avatar
Ghoulgnome
Good theories. Difficult to prove in our case unfortunately. There's no sign of any legacy databases or artefacts linked to the actual app named DualApp. Unfortunately, whilst the thumbnails are still present, it appears that the original images are not located in any gallery anymore, thus not leaving us with many breadcrumbs to follow. It's proving difficult to associate them to anything particular which means the wording in the report is going to be rather vague at the moment 🙂
I assume the images are cat a-c? So you can go for making. “The device contained blah blah images in these locations <insert paths>. The illegal content was confined to thumbnails in a thumbnails database. Thumbnail databases are typically populated by the presence of the original image in the same directory. Original images from which the thumbnails were generated were found to be no longer present on the device. Multiple thumbnail databases containing illegal files were present in different directories. Note, Dual Apps is a feature present on some Android handsets that allows two copies of the same app to be installed with separate data. directories named dualapp may be indicative of the use of the Dual App function”
Avatar
Avatar
Ghoulgnome
Good theories. Difficult to prove in our case unfortunately. There's no sign of any legacy databases or artefacts linked to the actual app named DualApp. Unfortunately, whilst the thumbnails are still present, it appears that the original images are not located in any gallery anymore, thus not leaving us with many breadcrumbs to follow. It's proving difficult to associate them to anything particular which means the wording in the report is going to be rather vague at the moment 🙂
It’s worth manually examining the handset to look for any installed dual apps (I think you get a little stack icon). You can see how each app instance would ‘see’ the user gallary
Avatar
Avatar
theshark
@Cellebrite any tips on filtering watchlist keyword hits by date?
I'm more of an extraction guy, but give me some time and I will see what I can find out. What version of PA are you currently using?
Avatar
Avatar
CLB-Odell
I'm more of an extraction guy, but give me some time and I will see what I can find out. What version of PA are you currently using?
Newest Inseyets
Avatar
On the Community portal there is an article called: "How Do I Set a time frame on Watch List Results for a Report?" . I have a general ask out to our decoding people, and if they respond I will update you in kind.
👍 1
Avatar
Avatar
CLB-Odell
On the Community portal there is an article called: "How Do I Set a time frame on Watch List Results for a Report?" . I have a general ask out to our decoding people, and if they respond I will update you in kind.
article is perfect thanks
Salute 1
Avatar
Hello, Does anyone know if it's possible to de-obfuscate a python script obfuscated with pyarmor v8.5.2 ? Thanks.
Avatar
Avatar
olleN
Hello, Does anyone know if it's possible to de-obfuscate a python script obfuscated with pyarmor v8.5.2 ? Thanks.
Digitalferret 5/31/2024 3:50 AM
please feel free to echo this in #dfir-python-study-group and #programming_reverse-engineering folks in those areas will have 'eyes - on'
Avatar
ThatTotallyRealMyth 5/31/2024 4:26 PM
Hey! Hope everyone’s been well. I’m new to the game but was hoping for some guidance on an idea I had thought of and plan to pitch/set up at my work. I notice that there’s alot of alerts that get generated in our SIEM that one can guess are benign 90% of the time. These overwhelm the people looking at them for obvious reasons and I thought of if the nature of the rules means you get false positives, then maybe there’s a way to automate them? I read that drop box had a chat box that asks you if you had done a certain action that tripped a security measure, allowing u the chance to authenticate and confirm that it was an intended action before creating an alert. What if this was deployed on an enterprise level using a slack bot? I was thinking to write up a Python script that connects to our SIEM, as well as slack chatbot n our MFA auth method. It gives the chance for engineers to confirm they had executed certain commands, downloaded certain files or preformed certain actions. If they don’t then these alerts would get max severity and sent to a seperate dashboard where they are given priority due to the confirmed nature that a dodgy action was taken that the engineer confirmed he didn’t do. Would this idea seem plausible or sound for a enterprise with around 100 hosts and 4 servers?
Avatar
Totally doable check out Tines to plug and play this
Avatar
Avatar
tklane
Totally doable check out Tines to plug and play this
ThatTotallyRealMyth 5/31/2024 6:04 PM
Ah I do not think the company is small enough to qualify for a reduced cost and I dont want to pitch anything that adds any additional costs as it is still a relatively small company where bussiness is tight. Would you say its possible to put something together in house relatively quickly?
Avatar
Avatar
ThatTotallyRealMyth
Ah I do not think the company is small enough to qualify for a reduced cost and I dont want to pitch anything that adds any additional costs as it is still a relatively small company where bussiness is tight. Would you say its possible to put something together in house relatively quickly?
anything is possible - just depends on your level of programming experience.
6:25 PM
also if you only have ~100 hosts in the environment, you really shouldn't be generating this many false positive alerts - you should be tuning your SIEM to maximize efficiency here and reduce noise. (edited)
Avatar
Avatar
javanzato
also if you only have ~100 hosts in the environment, you really shouldn't be generating this many false positive alerts - you should be tuning your SIEM to maximize efficiency here and reduce noise. (edited)
ThatTotallyRealMyth 5/31/2024 6:28 PM
I totally agree. I am not, as of yet, related to the secuirty side of things. I am only an embedded programming engineer but when I can, snoop around to see what the IT/Sec team are doing. I had someone complain about this to me(they are just IT) and so this idea had come to mind. I do think one of the issues is as well that theres only really only one individual in the team that is cyber certified, and about everyone else had done standard IT either at university or through certifications(cisco, and microsoft mainly)
Avatar
Avatar
ThatTotallyRealMyth
I totally agree. I am not, as of yet, related to the secuirty side of things. I am only an embedded programming engineer but when I can, snoop around to see what the IT/Sec team are doing. I had someone complain about this to me(they are just IT) and so this idea had come to mind. I do think one of the issues is as well that theres only really only one individual in the team that is cyber certified, and about everyone else had done standard IT either at university or through certifications(cisco, and microsoft mainly)
what you're describing is referred to, in general, as a SOAR platform - something designed to connect disparate systems together through APIs or otherwise
👍 1
6:32 PM
or more accurately/generically since security isn't the only department that does this, an orchestration platform - just called SOAR in the cyber context usually (edited)
Avatar
Avatar
javanzato
what you're describing is referred to, in general, as a SOAR platform - something designed to connect disparate systems together through APIs or otherwise
ThatTotallyRealMyth 5/31/2024 6:34 PM
didnt know they could be used in a context like this(tho I also have surface level knowledge about sec orchistration) but I will look into it!
6:34 PM
I will look into em : ) I appreciate the suggestion
Avatar
yeah connecting communications platforms like teams/slack/etc to SIEM/EDR/etc is definitely a common use case for SOAR
Avatar
Avatar
ThatTotallyRealMyth
Hey! Hope everyone’s been well. I’m new to the game but was hoping for some guidance on an idea I had thought of and plan to pitch/set up at my work. I notice that there’s alot of alerts that get generated in our SIEM that one can guess are benign 90% of the time. These overwhelm the people looking at them for obvious reasons and I thought of if the nature of the rules means you get false positives, then maybe there’s a way to automate them? I read that drop box had a chat box that asks you if you had done a certain action that tripped a security measure, allowing u the chance to authenticate and confirm that it was an intended action before creating an alert. What if this was deployed on an enterprise level using a slack bot? I was thinking to write up a Python script that connects to our SIEM, as well as slack chatbot n our MFA auth method. It gives the chance for engineers to confirm they had executed certain commands, downloaded certain files or preformed certain actions. If they don’t then these alerts would get max severity and sent to a seperate dashboard where they are given priority due to the confirmed nature that a dodgy action was taken that the engineer confirmed he didn’t do. Would this idea seem plausible or sound for a enterprise with around 100 hosts and 4 servers?
Have you also considered automating ignoring the specific context around some of the FPs? For example, when I worked in a SOC we had an alert for obfuscated powershell commands. It turned out that Windows Defender ran some obfuscated commands which triggered FPs. We simply added an exclusion rule for that specific command and it was able to cut down on the number of alerts.
Avatar
Avatar
Matt
Have you also considered automating ignoring the specific context around some of the FPs? For example, when I worked in a SOC we had an alert for obfuscated powershell commands. It turned out that Windows Defender ran some obfuscated commands which triggered FPs. We simply added an exclusion rule for that specific command and it was able to cut down on the number of alerts.
ThatTotallyRealMyth 6/1/2024 3:33 AM
Another suggestion I will note down and look to passing on/suggesting! Thanks a lot for sharing some experience
❤️ 1
Avatar
No worries! We always struggled finding that balance between excluding obvious FPs and risking excluding genuine alerts
Avatar
Avatar
Matt
No worries! We always struggled finding that balance between excluding obvious FPs and risking excluding genuine alerts
ThatTotallyRealMyth 6/1/2024 3:39 AM
I think something joeandstuff touched on is likely the big cause, likely poor detection rule writing and siem configs being to blame
Avatar
100%. We had someone working full time on minimising FPs as each client environment had different FPs… continually evolving and learning!
Avatar
Anyone know what kind of devices are these?
11:26 PM
Or if they have any relation to crypto coldwallets
Avatar
Avatar
fixclown
Anyone know what kind of devices are these?
USB SSD drive, the light grey/silver is a Samsung X5. Not crypto wallets in and of themselves but obviously may store software wallets (edited)
Avatar
Cool thanks i just wasn't sure about the grey one never seen that before.
👍 1
Avatar
Aяια Lєωιѕ 6/4/2024 5:12 AM
Hello, I’m new here. I was looking for forensic science group but couldn’t find any related to chemistry. If any one knows any or can help me plan my masters or integrated masters and have advice, like where to join, what’s the scope etc. i would very much appreciate it st1_happy
Avatar
Avatar
Aяια Lєωιѕ
Hello, I’m new here. I was looking for forensic science group but couldn’t find any related to chemistry. If any one knows any or can help me plan my masters or integrated masters and have advice, like where to join, what’s the scope etc. i would very much appreciate it st1_happy
Digitalferret 6/4/2024 5:30 AM
hi, this is Digital only Discord. no wet / biological Forensic science here, sorry
5:31 AM
others pls do feel free to direct
Avatar
Avatar
Digitalferret
hi, this is Digital only Discord. no wet / biological Forensic science here, sorry
Aяια Lєωιѕ 6/4/2024 6:21 AM
Yes I know, I was hoping someone may have some connections with Chem/biology forensic scientists
Avatar
Avatar
Digitalferret
hi, this is Digital only Discord. no wet / biological Forensic science here, sorry
Aяια Lєωιѕ 6/4/2024 6:22 AM
Kinda hard to find them
Avatar
Avatar
Aяια Lєωιѕ
Yes I know, I was hoping someone may have some connections with Chem/biology forensic scientists
Digitalferret 6/4/2024 6:29 AM
i think primarily it's science. the Forensic aspect is about doing it in line with law / court. more than a few come here expecting (digital) magic wands in some way that the word "forensic" means deeper, more involved, more technical, better software. It doesn't
♥️ 1
6:29 AM
but I'd agree, findng one on Discord: hens teeth.
Avatar
Aяια Lєωιѕ 6/4/2024 6:32 AM
Hmm I see, I will check out the links Salute
Avatar
Does anyone have a good handout/poster for end users on incident response or the best thing they should do when they think the network is under attack?
8:45 AM
I only have 2 points listed in text but it’s not visually appealing at all: 1. Inform IT department immediately 2. Disconnect from the network if you know how to. Do not shut down or power off the device.
Avatar
Avatar
bogflop
Does anyone have a good handout/poster for end users on incident response or the best thing they should do when they think the network is under attack?
#incident-response , might have better luck.
💯 1
Avatar
Digitalferret 6/4/2024 9:43 AM
and maybe #policies-and-procedures . feel free to Xpost in those
Avatar
If anyone has experience in issuing a subpoena to an ISP/org (Verizon/AT&T, TPx) please DM. Using Google Takeout on clients account and parsing "Access Log Activity" I was able to find entries from ip's using an OS that is clearly not my client. I am looking to know if you can get more revealing information about an IP addresses from any source Google or ISP (more precise location).
Avatar
Avatar
Aяια Lєωιѕ
Yes I know, I was hoping someone may have some connections with Chem/biology forensic scientists
ThatTotallyRealMyth 6/4/2024 3:15 PM
Lmao where are u based?
3:15 PM
I have a associates in analytical chemistry so maybe I can help a bit ?
Avatar
Avatar
ThatTotallyRealMyth
I have a associates in analytical chemistry so maybe I can help a bit ?
Aяια Lєωιѕ 6/4/2024 6:16 PM
Yes I would be happy to hear help. Do you want to add me and talk in dm?
Avatar
Avatar
ThatTotallyRealMyth
Lmao where are u based?
Aяια Lєωιѕ 6/4/2024 6:17 PM
I got zero experience in forensic science. I don’t think it has anything to do with where I’m from lol
Avatar
Avatar
Aяια Lєωιѕ
Yes I would be happy to hear help. Do you want to add me and talk in dm?
ThatTotallyRealMyth 6/4/2024 6:18 PM
Would prefer if you shared a bit of context to what exactly youre needing help with as I may be of no use(considering its only an associates and I am currently doing engineering)
Avatar
Avatar
Aяια Lєωιѕ
I got zero experience in forensic science. I don’t think it has anything to do with where I’m from lol
ThatTotallyRealMyth 6/4/2024 6:18 PM
Oh I thought you were looking for more targeted local advice was asking to suggest you your countries relevant body(like the American chemistry association or the royal college of chemistry in the uk)
Avatar
Avatar
ThatTotallyRealMyth
Oh I thought you were looking for more targeted local advice was asking to suggest you your countries relevant body(like the American chemistry association or the royal college of chemistry in the uk)
Aяια Lєωιѕ 6/4/2024 6:21 PM
Oh ok,to my knowledge I don’t think there’s any association like the ones you mentioned here
Avatar
Avatar
Aяια Lєωιѕ
Oh ok,to my knowledge I don’t think there’s any association like the ones you mentioned here
ThatTotallyRealMyth 6/4/2024 6:21 PM
Are you EU based?
Avatar
Avatar
ThatTotallyRealMyth
Are you EU based?
Aяια Lєωιѕ 6/4/2024 6:21 PM
No Asia
Avatar
Avatar
ThatTotallyRealMyth
Would prefer if you shared a bit of context to what exactly youre needing help with as I may be of no use(considering its only an associates and I am currently doing engineering)
Aяια Lєωιѕ 6/4/2024 6:23 PM
I was looking for masters or integrated masters with phd courses.Cuz I heard phd has higher chance of receiving funding
6:25 PM
Which country would be better, what are the scopes after I graduate etc. if anything else , maybe you ask like specific questions?
Avatar
Avatar
Aяια Lєωιѕ
I was looking for masters or integrated masters with phd courses.Cuz I heard phd has higher chance of receiving funding
ThatTotallyRealMyth 6/4/2024 6:27 PM
Way out of my depth here unfortunately as I have no knowledge/experience with graduate programs. I can suggest that if you are doing a bachelors degree currently, then depending on your grades you can directly do a phD. Some cases, without an honours level project with relevant grades in some countries you would not be able to go bachelors and then phD. Like where I am based in Australia, you can get a bachelors without honours and in most cases it would be difficult to directly get into a program without a masters.
Avatar
Avatar
Aяια Lєωιѕ
Which country would be better, what are the scopes after I graduate etc. if anything else , maybe you ask like specific questions?
ThatTotallyRealMyth 6/4/2024 6:30 PM
For PhD it really depends, as I guess you want to be in the best lab for the specific field of interest. I would take time to figure out exactly what it is you enjoy, and then as you read more papers about it; you will come to learn more about the work going on around different labs and begin hunting down opportunities there. I can recommend emailing professors if you picked up their paper and wanted to learn more about their work. I had many research opportunities come my way in my associates by doing this
Avatar
Avatar
ThatTotallyRealMyth
Way out of my depth here unfortunately as I have no knowledge/experience with graduate programs. I can suggest that if you are doing a bachelors degree currently, then depending on your grades you can directly do a phD. Some cases, without an honours level project with relevant grades in some countries you would not be able to go bachelors and then phD. Like where I am based in Australia, you can get a bachelors without honours and in most cases it would be difficult to directly get into a program without a masters.
Aяια Lєωιѕ 6/4/2024 6:36 PM
No, you can’t directly go to phd without a masters here. Not sure if I go abroad they will let me do phD with my bachelors degree. And yes you are right, it’ll be difficult to do phd without a masters
Avatar
Avatar
ThatTotallyRealMyth
For PhD it really depends, as I guess you want to be in the best lab for the specific field of interest. I would take time to figure out exactly what it is you enjoy, and then as you read more papers about it; you will come to learn more about the work going on around different labs and begin hunting down opportunities there. I can recommend emailing professors if you picked up their paper and wanted to learn more about their work. I had many research opportunities come my way in my associates by doing this
Aяια Lєωιѕ 6/4/2024 6:40 PM
Oh cool, I’ll look up papers and email the professors, that’s a nice idea. Also I have a question, if I pursue my degree abroad. What are the different areas I can work under. Cuz I doubt I can work with government organisations as I’m an outsider
6:42 PM
Or is forensic science too narrow of a field
Avatar
Avatar
Aяια Lєωιѕ
Oh cool, I’ll look up papers and email the professors, that’s a nice idea. Also I have a question, if I pursue my degree abroad. What are the different areas I can work under. Cuz I doubt I can work with government organisations as I’m an outsider
ThatTotallyRealMyth 6/4/2024 6:51 PM
I can not comment as I have no knowledge but I could say that it depends on the country, your skill set and the rules in place
Avatar
Avatar
Aяια Lєωιѕ
Or is forensic science too narrow of a field
ThatTotallyRealMyth 6/4/2024 6:54 PM
It depends on your career aspirations, what you expect out of a PhD program etc. I would suggest you get in touch with a career advisor at university, or reach out to more appropriate subject matter experts : )
Avatar
Avatar
ThatTotallyRealMyth
It depends on your career aspirations, what you expect out of a PhD program etc. I would suggest you get in touch with a career advisor at university, or reach out to more appropriate subject matter experts : )
Aяια Lєωιѕ 6/4/2024 6:54 PM
Ah cool, thanks for the help appreciate it 😄
6:55 PM
6:55 PM
Avatar
Avatar
Aяια Lєωιѕ
Ah cool, thanks for the help appreciate it 😄
ThatTotallyRealMyth 6/4/2024 6:55 PM
All the best : )
🫡 1
Avatar
Avatar
Grok
Question for anyone. Working on a case where a suspect got into a car and forced a victim to drive around. We're trying to identify the suspect but no good video or description of them. We'll be doing a geofence, but if the suspect has Google we'll get nothing since Google killed that ability several months ago. If the suspect has apple maybe we'll get lucky. Let's say the victim had an iphone with them. Is anyone aware if iphone tracks recent iphone that have been around it, even if there was no official interaction (ie, no airdrop, etc)? And has anyone found out where that data might be stored on an iphone, or if Apple possibly tracks this and has a record of it online? And in the opposite scenario, if Victim has an android, anyone aware of Android tracking nearby devices? Or if possibly Google does this, and stores it in the cloud? And there's also the possibility say Victim had iphone, Sus had Android, is this or the reverse possibility tracked? We're trying to think outside the box here. I'm going to be surpised if Apple doesn't track this for their own purposes...just gotta figure out how to request such data from them.
@madsn1#4524 Did you get an answer for this? I would be interested then. Only idea I have is the database on the possible victim iPhone which stores BLE-devices it has seen and a possible Smartphone / smartwatch / headset the suspect had with him (and no Mac randomization)...
Avatar
@Cellebrite Is anyone from Cellebrite available there ? (edited)
📬 1
Avatar
anyone from @Cellebrite or @Magnet Forensics free for a quick question?
Avatar
Avatar
Johnie
anyone from @Cellebrite or @Magnet Forensics free for a quick question?
CLB-DannyTheModeler 6/5/2024 4:28 AM
Whats the topic of the question @Johnie ?
Avatar
@CLB-DannyTheModeler cloud forensics
📫 1
Avatar
Avatar
Johnie
@CLB-DannyTheModeler cloud forensics
CLB-DannyTheModeler 6/5/2024 4:30 AM
Louka will contact you shortly
Avatar
Avatar
Johnie
anyone from @Cellebrite or @Magnet Forensics free for a quick question?
They are both at Techno Security this week giving great presentations!
👍 2
Avatar
Avatar
Johnie
anyone from @Cellebrite or @Magnet Forensics free for a quick question?
dannynorris 6/5/2024 12:44 PM
Hey @Johnie what is your question?
Avatar
Has anyone examined a Point of Sale (POS) card payment machines, manually or via means of forensic tools ?
Avatar
Anyone from Passware to short question?
Avatar
Digitalferret 6/6/2024 2:51 AM
@Passware ^
Avatar
Avatar
privater0
Anyone from Passware to short question?
Passware Support 6/6/2024 7:24 AM
Here, but I believe we already answered in a different thread.
👍🏻 1
Avatar
Avatar
Passware Support
Here, but I believe we already answered in a different thread.
Yes, thank you, you are very right, we will already try to start fitting tomorrow.
👍 1
Avatar
Beefhelmet 6/6/2024 7:54 AM
@Cellebrite I have some Instagram returns and when I load them into Inseyets 10.2 it is not parsing the .html files. I seem to remember it could parse that info ie. organizing chats. This return is like 4,000 pages long and it would be great if I could review it in an more organized way. Thanks. Inseyets 10.2 btw (edited)
Avatar
does anyone know why MS Office can put a "~ " pre-appended file in the startup folder? I thought it was when a machine crashes but tested that and its not the case. anyone have any hints? thanks
11:17 AM
my google fu is off today 🙂
Avatar
Avatar
ISOM
does anyone know why MS Office can put a "~ " pre-appended file in the startup folder? I thought it was when a machine crashes but tested that and its not the case. anyone have any hints? thanks
prepended files are temp files that applications use to store interim data and help with recovery for crash or unexpected shutdown. owner files or lock files think they are also called. They can put it in the startup folder because it has the right permissions to and wants to, maybe file path confusion.
👍 1
Avatar
Any @Law Enforcement [UK] going to the Interpol conference in Edinburgh 19-21st June ?
Salute 3
😿 1
👀 1
Avatar
Avatar
Dfdan
Any @Law Enforcement [UK] going to the Interpol conference in Edinburgh 19-21st June ?
P4perTrails 6/6/2024 3:21 PM
If all goes well yeah 👍
Avatar
Avatar
Beefhelmet
@Cellebrite I have some Instagram returns and when I load them into Inseyets 10.2 it is not parsing the .html files. I seem to remember it could parse that info ie. organizing chats. This return is like 4,000 pages long and it would be great if I could review it in an more organized way. Thanks. Inseyets 10.2 btw (edited)
Sent a DM
Avatar
Avatar
Beefhelmet
@Cellebrite I have some Instagram returns and when I load them into Inseyets 10.2 it is not parsing the .html files. I seem to remember it could parse that info ie. organizing chats. This return is like 4,000 pages long and it would be great if I could review it in an more organized way. Thanks. Inseyets 10.2 btw (edited)
This is has been an issue since Meta has changed the return from a Zip to HTML
Avatar
does anybody have any experience working with audio distorsion/noise? it's for a CTF challenge and you're basically given an audio which says a flag, but there is a lot of noise added. Any recommendations?
6:01 AM
typical noise reduction filters do not help
Avatar
Avatar
marc
typical noise reduction filters do not help
Digitalferret 6/8/2024 8:41 AM
define "typical"?
Avatar
the one which comes with audacity for instance
Avatar
Do you know what you're trying to isolate? Human speech/voice? (edited)
Avatar
at first I thought I had to isolate a human speech which in theory says the flag letter by letter, and on top of that there is a very loud distorsion sound, but as I said, it's from a CTF challenge, I now think it's looking more like I have to somehow "convert" that distorsion into something else. a hint was given about being able to see the flag, so I probably have to alter the distorsion somehow so the flag appears in the audio's spectrogram
Avatar
Id be looking for a “square” wave somewhere in the spectrogram to find binary, personally
Avatar
This is what the original audio's waveform looks like
Avatar
Have you used Plot spectrum to take a look yet?
Avatar
I have never even heard of it
11:08 AM
but I will look into it
Avatar
Under analyze in audacity.
11:09 AM
Might help ya out, might not, probably want to check out a few tutorials
👌 1
Avatar
Dr. Kaan Gündüz 6/8/2024 12:51 PM
i'd take a look at izotope rx, pretty good software
Avatar
Avatar
Dr. Kaan Gündüz
i'd take a look at izotope rx, pretty good software
I played on a couple soccer teams with one of their executives… it helped with tech support. 😂 One use case was cleaning up audio from a phone that was recording while in some kind of bag and moving. I had a good experience with RX. (I wish some bands like Iron Maiden would use RX to get rid of obvious clipping. Maybe someone in the UK can nudge them.) (edited)
🤘 4
Avatar
Avatar
marc
at first I thought I had to isolate a human speech which in theory says the flag letter by letter, and on top of that there is a very loud distorsion sound, but as I said, it's from a CTF challenge, I now think it's looking more like I have to somehow "convert" that distorsion into something else. a hint was given about being able to see the flag, so I probably have to alter the distorsion somehow so the flag appears in the audio's spectrogram
Alexsaurus 6/9/2024 3:08 PM
Slow-scan television (SSTV) is a picture transmission method, used mainly by amateur radio operators, to transmit and receive static pictures via radio in monochrome or color. A literal term for SSTV is narrowband television. Analog broadcast television requires at least 6 MHz wide channels, because it transmits 25 or 30 picture frames per secon...
Avatar
Avatar
Arsenal
I played on a couple soccer teams with one of their executives… it helped with tech support. 😂 One use case was cleaning up audio from a phone that was recording while in some kind of bag and moving. I had a good experience with RX. (I wish some bands like Iron Maiden would use RX to get rid of obvious clipping. Maybe someone in the UK can nudge them.) (edited)
Digitalferret 6/9/2024 5:00 PM
Eddie say's that's a "feature" 🙂
Avatar
hey guys, got an interview coming up for what may be my first job in forensics. Its specifically a e-discovery position, is there any thing I should know before my first interview? (edited)
12:19 AM
Certain topics to refresh on for example
Avatar
we already thought about that, but it wasn't
12:52 AM
it was a very "ctfy" challenge
12:52 AM
you had to open the raw audio file in photoshop!
12:53 AM
also had to mess with different resolutions in order to get a clear image (edited)
12:54 AM
I think it's somewhat like the same principle of putting a raw memory dump in Gimp and opening it as raw data, then adjusting different offsets for it until you see a render of the desktop on windows, but in this case the flag was encoded in the audio
Avatar
Avatar
John
Certain topics to refresh on for example
Digitalferret 6/10/2024 3:22 AM
just be yourself, and maybe echo in #training-education-employment
3:25 AM
and don't forget the interview is already underway. remember to be polite, respectful even to the road sweeper outside the office, on time etc. Don't get tunnel vision that it's all about quals and experience. some still go bythe "hire for attitude, all else can be trained" mantra. above a certain base level of subject knowledge, I certainly would
👍 1
Avatar
hiddenbook46 6/10/2024 5:19 AM
Hello guys can ask a question here about GCFE practise?
Avatar
Avatar
hiddenbook46
Hello guys can ask a question here about GCFE practise?
Digitalferret 6/10/2024 5:47 AM
don't ask to ask. just ask. if it's edu pop it in #training-education-employment ❤️
Avatar
Heimdall4N6K 6/10/2024 11:48 AM
Hello, I'm looking for information on the history_tags table in the history_db in safari ios. What does the data correspond to? Thank you for your help. (edited)
Avatar
Is there any outline experts here follow when speaking with individuals who claim their physical iPhone is "hacked" on all fronts with little to no proof of weird behavior. I am looking for an easier way to confirm the claims are bogus (say via phone) or setup detection countermeasures for their peace of mind. I know it depends on so many varying factors but just looking for unique thoughts when dealing with lying/uneducated/unexperienced clients.
Avatar
Avatar
theshark
Is there any outline experts here follow when speaking with individuals who claim their physical iPhone is "hacked" on all fronts with little to no proof of weird behavior. I am looking for an easier way to confirm the claims are bogus (say via phone) or setup detection countermeasures for their peace of mind. I know it depends on so many varying factors but just looking for unique thoughts when dealing with lying/uneducated/unexperienced clients.
90 % of the people that we deal with that claim this have documented or undocumented mental health issues. In the past I've had them confirm all accounts are on 2-factor authentication such as FB/Instagram/Gmail etc I then suggest a mobile tool such as "Norton Mobile Security" and if they still claim it's hacked I suggest they get a dumb phone like a flip phone. Again we have a lot of domestic violence victims who go through years of abuse and it's hard to convince them in an hour their abuser can't "hack" their phone like they think they can.
👍 5
💯 2
Avatar
Avatar
theshark
Is there any outline experts here follow when speaking with individuals who claim their physical iPhone is "hacked" on all fronts with little to no proof of weird behavior. I am looking for an easier way to confirm the claims are bogus (say via phone) or setup detection countermeasures for their peace of mind. I know it depends on so many varying factors but just looking for unique thoughts when dealing with lying/uneducated/unexperienced clients.
To expand on what @DCSO Said, because I've had the same experience with mental illness people claiming they have been hacked. I typically show them the zerodium chart showing the cost of a zero click exploit being in the millions of dollars. Then explain that they are so expensive because they are so rare and countries, not people, buy them from brokers and would still have some work to do after buying the exploit (coding their payload).
❤️ 3
👍 1
Avatar
Original message was deleted or could not be loaded.
Do you know if it never shows when turning on disappearing messages and always shows when turning it off? Could it be related to the fact that while removing messages it also makes ip-adresses disappear for further anonymity?
Avatar
Original message was deleted or could not be loaded.
That looks like a txt file. What data does the DB contain? What OS does the phone use?
Avatar
Original message was deleted or could not be loaded.
just fyi that blurred number is super easy to read still
Avatar
hyperflyguy 6/12/2024 8:07 AM
Got a case where I have to perform forensics on zoom meetings. We believe the user was screen sharing with an unauthorized persons to do their work. I’m not to optimistic that we can prove this especially since the user was off boarded and the zoom databases are encrypted with their windows password. But I’m down for any wild ideas.
Avatar
Avatar
hyperflyguy
Got a case where I have to perform forensics on zoom meetings. We believe the user was screen sharing with an unauthorized persons to do their work. I’m not to optimistic that we can prove this especially since the user was off boarded and the zoom databases are encrypted with their windows password. But I’m down for any wild ideas.
zoom databases are encrypted with their windows password Do you have the NTLM of the user's password anywhere? If so, you can try and crack it with Hashcat to decrypt the zoom DBs.
8:29 AM
If you have an .E01 of the user's system you might be able to mount with AIM Pro, virtualize, and do a DPAPI bypass to log into their profile without cracking the NTLM.
8:31 AM
That should also decrypt the zoom DBs as it sounds like they are DPAPI protected by the NTLM.
Avatar
Zoom should really add screen sharing start/stop times to meeting reports, currently it does not include it, so unless there are meeting recordings either on the cloud or on the device, your best hope to see if screen sharing was used (outside of any other endpoint monitoring that may have been present) may be if zoom audit logs were enabled (they are not enabled by default, and it's only a global setting), since the audit logs do capture basic screen sharing event information (as well as additional information about other activities). Edit: Actually attendee logs does show whether screen sharing is used now: https://support.zoom.com/hc/en/article?id=zm_kb&sysparm_article=KB0058383 (edited)
Attendee log shows all meetings an authenticated user in the account has participated in. This can include
Avatar
I have been given a spreadsheet with a list of phones numbers with associated messages. I'm trying to look up the numbers, and they're not coming back to any carriers. Would this mean that they're being sent from one of the messaging apps?
Avatar
Avatar
Killer3p0
I have been given a spreadsheet with a list of phones numbers with associated messages. I'm trying to look up the numbers, and they're not coming back to any carriers. Would this mean that they're being sent from one of the messaging apps?
Its highly likely the phone numbers are from TextNow, Google Voice, Burner etc if it involves criminal activity. If you want to DM me I can take a peek.
Avatar
blackleitus 6/12/2024 5:39 PM
how to you prioritize red teaming findings?
Avatar
Most companies have their own ways of doing that, usually some variant of RICE (sometimes with different weights or slightly different criteria) - they determine priority by some calculation based on reported impact, scope/reach which is number and/or sensitivity of any critical systems impacted, how easy it is to reproduce/exploit, etc. See: https://roadmunk.com/guides/rice-score-prioritization-framework-product-management/
6:44 AM
Similar to how CVSS scores are computed: https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
Avatar
#mobile-forensic-extractions help if you can
Avatar
iOS 17.5 issue? ^
Avatar
Is there no mobile forensics channel?
12:14 PM
Im pretty sure there used to be two specifically for mobile? Anyway, I am looking at Apple health data on an iPhone 15 pro and I have an advanced logical extraction. In the healthdb_secure.sqlite database there are a ton of map coordinates. Cellebrite is not pulling these out to add to location data, which is dissapointing. Since Cellebrite is grabbing most of the data from this database why isnt it grabbing location data? Is there another way to do this other than manually looking up the coordinates one at a time?
Avatar
Deleted User 6/14/2024 12:40 PM
^ was about to ask about the mobile forensic channels, were they removed?
12:41 PM
or is it just hidden ?
Avatar
I’ve got an odd question Does anybody know a good website where I could upload a drawn picture (with a pencil) and make it like a really good artistic version of it? Because I suck a drawing and need help 😂
Avatar
Avatar
Deleted User
^ was about to ask about the mobile forensic channels, were they removed?
I can see them, maybe it is a permissions issue?
👍 1
Avatar
Deleted User 6/14/2024 12:45 PM
yeah i dont see them
Avatar
So I don't make anyone mad by choosing a favorite (I'm looking at you @conf1ck3r 😂 ) @Moderators was there a recent change?
😆 4
Avatar
Deleted User 6/14/2024 12:51 PM
if a mod could message me would appreciate it
Avatar
Avatar
High5u
I’ve got an odd question Does anybody know a good website where I could upload a drawn picture (with a pencil) and make it like a really good artistic version of it? Because I suck a drawing and need help 😂
Digitalferret 6/14/2024 12:54 PM
GPT it?
Avatar
Forensic@tor 6/14/2024 12:54 PM
@High5u try the AI websites. CoPilot from Microsoft is where I would start. (edited)
Avatar
Don’t I need gpt4 for it? Don’t want to pay them 😅
12:55 PM
@Forensic@tor thanks ill try that
Avatar
Digitalferret 6/14/2024 12:55 PM
nah^ plenty of other opportunities
Avatar
Avatar
High5u
Don’t I need gpt4 for it? Don’t want to pay them 😅
Digitalferret 6/14/2024 12:58 PM
12:59 PM
and yopmail it
Avatar
Got it
Avatar
Avatar
High5u
Got it
Digitalferret 6/14/2024 1:03 PM
🙂
SPOILER
Image attachment
this 1
Avatar
Avatar
FullTang
So I don't make anyone mad by choosing a favorite (I'm looking at you @conf1ck3r 😂 ) @Moderators was there a recent change?
Digitalferret 6/14/2024 1:04 PM
yes there was
👍 1
Avatar
Avatar
PhrostByte
Im pretty sure there used to be two specifically for mobile? Anyway, I am looking at Apple health data on an iPhone 15 pro and I have an advanced logical extraction. In the healthdb_secure.sqlite database there are a ton of map coordinates. Cellebrite is not pulling these out to add to location data, which is dissapointing. Since Cellebrite is grabbing most of the data from this database why isnt it grabbing location data? Is there another way to do this other than manually looking up the coordinates one at a time?
As for why it isn’t parsed, I’m not certain. Databases change and the parsing inherently lags behind. I’m not familiar with the particulars of your database but the ability to manually check and then DIY the solution is huge, so halfway done! I would export the database and either copy/paste, SQL query or python script to extract the columns you care about, at the minimum date and gps I would imagine. Get it to a CSV format and import it into Google earth or another tool of your choice. Google earth will ask you to identify what columns are what and you can get yourself a pretty map like that.
🔥 1
Avatar
Avatar
Deleted User
^ was about to ask about the mobile forensic channels, were they removed?
Have you deselected them under the “browse channels” list?
Avatar
Avatar
whee30
As for why it isn’t parsed, I’m not certain. Databases change and the parsing inherently lags behind. I’m not familiar with the particulars of your database but the ability to manually check and then DIY the solution is huge, so halfway done! I would export the database and either copy/paste, SQL query or python script to extract the columns you care about, at the minimum date and gps I would imagine. Get it to a CSV format and import it into Google earth or another tool of your choice. Google earth will ask you to identify what columns are what and you can get yourself a pretty map like that.
Husky_M00s3 6/16/2024 5:10 AM
@PhrostByte, the first two lectures of Harvard’s CS50 (YouTube) should give you enough SQL knowledge to write a query in DB for SQL… then research WAL files.
Avatar
Avatar
TreeRge
Have you deselected them under the “browse channels” list?
Deleted User 6/16/2024 11:51 AM
Found a solution didn’t have permissions thank you
Avatar
Avatar
Deleted User
Found a solution didn’t have permissions thank you
If you don’t see them you just turn them on under the browse list and unmute them in settings. (edited)
Avatar
Can anyone confirm effects of Stolen Device Protection on adv logical extraction?
Avatar
@Deleted User how did you get permissions for the mobile channels? They dont show up for me either.
Avatar
Deleted User 6/17/2024 7:29 AM
pmed a mod to sort it out
Avatar
@Deleted User Ok Ill do the same, thanks.
Avatar
@Husky_M00s3 Thank you for the reccomentdation. I will check that out.
Avatar
Shogun//Rogan 6/18/2024 8:12 AM
Hey guys, looking to get into investigations related to digital forensics more and more. I've been a lurker on this discord for a bit. I've looked around a fair amount but I have yet to find information on what would be the first, introductory steps to getting into Digital Forensics. Perhaps I missed it, and in that case, I apologize. I know the field is always expanding and requires constant maintenance knowledge to keep up. My current goal is to get certified in the Cellebrite CCO and CCPA course, if I can swing the cost, but i'm unsure if that is the best avenue to go.
Avatar
Avatar
Shogun//Rogan
Hey guys, looking to get into investigations related to digital forensics more and more. I've been a lurker on this discord for a bit. I've looked around a fair amount but I have yet to find information on what would be the first, introductory steps to getting into Digital Forensics. Perhaps I missed it, and in that case, I apologize. I know the field is always expanding and requires constant maintenance knowledge to keep up. My current goal is to get certified in the Cellebrite CCO and CCPA course, if I can swing the cost, but i'm unsure if that is the best avenue to go.
When I see this question I like to ask... "where do you come from?" not geographically, but from an education POV (and career as well). This way, answers can be more tailored to the scenario
Avatar
Avatar
Lazza
When I see this question I like to ask... "where do you come from?" not geographically, but from an education POV (and career as well). This way, answers can be more tailored to the scenario
Shogun//Rogan 6/18/2024 9:16 AM
Educationally, I'm about halfway to 3/4rd's of my way through a degree in CyberSecurity. I'm looking to finish it in the next few years but I am largely pay as I go. Professionally, I am in Law Enforcement. I am mostly referred to as as 'tech guy' within my circle and I do a lot of investigations involving internet crimes and crimes against children. Some property crimes as well. Personally, I like tech and enjoy learning. I practiced and am teaching myself the basics of computer programming (mostly Python at the moment) and enjoy trying to learn on sites such as Hack the Box and TryHackMe. I also like long walks on the beach.
👍 1
⛱️ 1
Avatar
wildrover5421 6/18/2024 9:28 AM
Has anyone had an issue where after decrypting an Apple search warrant return, none of the pictures or videos would display?
Avatar
Avatar
Shogun//Rogan
Educationally, I'm about halfway to 3/4rd's of my way through a degree in CyberSecurity. I'm looking to finish it in the next few years but I am largely pay as I go. Professionally, I am in Law Enforcement. I am mostly referred to as as 'tech guy' within my circle and I do a lot of investigations involving internet crimes and crimes against children. Some property crimes as well. Personally, I like tech and enjoy learning. I practiced and am teaching myself the basics of computer programming (mostly Python at the moment) and enjoy trying to learn on sites such as Hack the Box and TryHackMe. I also like long walks on the beach.
Try contacting your local USSS Field Office and see if you can get into classes at the NCFI. They offer free training and equipment for state and local agencies. https://www.secretservice.gov/contact/field-offices You can also get free training on digital forensics from the National White Coller Crime Center (NW3C). They offer both on-demand online and live online trainings. https://www.nw3c.org/UI/Index.html
Report financial crime by contacting a U.S. Secret Service Field Office.
The National White Collar Crime Center (NW3C) is a nationwide support system for the prevention, investigation and prosecution of economic and high-tech crime.
Avatar
Avatar
FullTang
Try contacting your local USSS Field Office and see if you can get into classes at the NCFI. They offer free training and equipment for state and local agencies. https://www.secretservice.gov/contact/field-offices You can also get free training on digital forensics from the National White Coller Crime Center (NW3C). They offer both on-demand online and live online trainings. https://www.nw3c.org/UI/Index.html
Shogun//Rogan 6/18/2024 11:42 AM
Thanks man! I'm already on the wait list for NCFI for either BCERT or the MDE course, however, I know a bunch of guys who have been on the wait list for 5+ years. I've taken a bunch of NW3C courses that were up that alley as well. Currently working on the EZ Tools course but I didn't see much in the way of mobile forensics.
Avatar
Avatar
Shogun//Rogan
Thanks man! I'm already on the wait list for NCFI for either BCERT or the MDE course, however, I know a bunch of guys who have been on the wait list for 5+ years. I've taken a bunch of NW3C courses that were up that alley as well. Currently working on the EZ Tools course but I didn't see much in the way of mobile forensics.
Good deal! I would also sign up for any and all classes you can get from the NCFI, the wait list can be brutal. Here are a few more resources that might help as well: https://blueteamlabs.online/
A gamified platform for cyber defenders to test and showcase their skills
11:46 AM
Each of those should have some free trainings in the mix of their paid trainings.
11:46 AM
And check out https://discord.com/channels/427876741990711298/1081345795233693736 for other similar servers to this one.
Avatar
Shogun//Rogan 6/18/2024 11:47 AM
Awesome. I can check those out and see how they fair. Appreciate it man. In the meantime, is hoping to get into NCFI or convincing my agency to get me into a Cellebrite CCO/CCPA course the best option for a starter trying to get into the area?
11:47 AM
I've also reached out to Our Underground Railroad to see if they had any recommendations for grants.
👍 1
Avatar
convincing my agency to get me into a Cellebrite CCO/CCPA course This. Start doing exams and helping other agencies first, then you will be more likely to get into the NCFI classes. Grants are a fantastic way to get off the ground. Local schools/colleges might donate old computers so you can have your first few forensic machines/hard drives. Learn Paladin, Autopsy, EZ tools, etc and you can do digital forensics on computers, while you find the funds to pay for Mobile forensics. Another thought depending on your skill level and ability to learn is Paraben. Paraben does mobile forensics at a fraction of the cost of the 'normal' tools, but it is a much more manual process and can't unlock anything. https://paraben.com/e3-mobile-smartphone-forensics/ You could then use the LEAPP tools for additional parsing/validation.
Uncover the truth with our Android/iOS smartphone forensic & investigation software - forensic examination of mobile phones.
Avatar
Avatar
FullTang
convincing my agency to get me into a Cellebrite CCO/CCPA course This. Start doing exams and helping other agencies first, then you will be more likely to get into the NCFI classes. Grants are a fantastic way to get off the ground. Local schools/colleges might donate old computers so you can have your first few forensic machines/hard drives. Learn Paladin, Autopsy, EZ tools, etc and you can do digital forensics on computers, while you find the funds to pay for Mobile forensics. Another thought depending on your skill level and ability to learn is Paraben. Paraben does mobile forensics at a fraction of the cost of the 'normal' tools, but it is a much more manual process and can't unlock anything. https://paraben.com/e3-mobile-smartphone-forensics/ You could then use the LEAPP tools for additional parsing/validation.
Shogun//Rogan 6/18/2024 12:03 PM
Thanks for the direction. I'm an affiliate with my state ICAC Task Force, and I tend to submit a lot of digital evidence, so i'm hoping to get more exposure doing this. I think if I can show my agency that we have a need for it (which we do) via grants, I can get them to roll the cost into an annual budget, it's just getting the initial start-up that's the ask. We're a medium sized agency but we help everyone around us and no one has DF tools.
12:04 PM
I'm currently working through the EZ Tools courses on NC3W to get the tools needed for that. I'll check out Paladin, Autopsy and Paraben as well.
12:05 PM
I also just generally nerd out of this stuff (basically anything tech related) and I love investigations, so it's something i'm just generally passionate about.
Avatar
Good deal. Also, don't be picky with your first few NCFI classes. Sign up for EVERYTHING. You should stand a good chance at getting into a BNIT or DEI and that will at least get some training under your belt and get your foot in the door.
12:06 PM
They have plenty of virtual classes as well.
Avatar
Shogun//Rogan 6/18/2024 12:06 PM
NCFI does?
Avatar
Last I knew they do. Do you get the listing of all courses from your local sponsor?
12:07 PM
I say plenty to mean 4-5 per offering.
Avatar
Shogun//Rogan 6/18/2024 12:11 PM
Ahhh, I see the NFCI virtual courses now. I didn't even notice the virtual coursed available. Yeah, the resident agent for my area sends out a mass email to collect requests from anyone willing to put in. To put it in perspective though, his mass email has probably 70 people CC'd to it. So I expect not to have a chance at the BCERT or MDE course for awhile. I think I requested MDE first, BCERT second, Device Triage Workshop and then Fundamentsals of Connected Devices.
Avatar
Cool. If you can I would in for everything. Or you can just tell him what dates you can't go if that is easier, lol. Just make sure your bosses (both at work and at home) are good with you potentially being gone for everything that you put in for!
Avatar
Shogun//Rogan 6/18/2024 12:18 PM
So since I have limited exposure to how Cellebrite and Paraben work, what makes Paraben not as widely used as Cellebrite? Obviously Cellebrite seems to be easier but why is Paraben cheaper? It seems the license is more then half for the mobile version.
12:18 PM
Outside of brute-forcing a phone with Cellebrite Premium.
Avatar
Full disclaimer, I have never used Paraben. I have only heard of it recently so maybe someone else can chime in. My understanding is that it is much slower to update their extraction methods as compared to Cellebrite. With UFED4PC if you have an unlocked Android you should be able to get a FFS with Smart Flow. It's slick. Paraben just takes longer to develop their exploits and methods even for unlocked phones. (edited)
Avatar
Avatar
FullTang
Good deal. Also, don't be picky with your first few NCFI classes. Sign up for EVERYTHING. You should stand a good chance at getting into a BNIT or DEI and that will at least get some training under your belt and get your foot in the door.
This is good advice. Classes that provide a lot of equipment are very competitive. Some of the others, not so much. You are much more likely to get a class like BCERT if you have already attended other classes and started submitting FPR’s. They want to make sure the spots go to people do will use them.
Avatar
Avatar
Shogun//Rogan
Thanks for the direction. I'm an affiliate with my state ICAC Task Force, and I tend to submit a lot of digital evidence, so i'm hoping to get more exposure doing this. I think if I can show my agency that we have a need for it (which we do) via grants, I can get them to roll the cost into an annual budget, it's just getting the initial start-up that's the ask. We're a medium sized agency but we help everyone around us and no one has DF tools.
I would say the next time you go and submit digital evidence, talk to their phone guy. If that person is not too shy, you may be able to shadow them. Trainings are good, but far away from reality.
Avatar
Avatar
Shogun//Rogan
Thanks for the direction. I'm an affiliate with my state ICAC Task Force, and I tend to submit a lot of digital evidence, so i'm hoping to get more exposure doing this. I think if I can show my agency that we have a need for it (which we do) via grants, I can get them to roll the cost into an annual budget, it's just getting the initial start-up that's the ask. We're a medium sized agency but we help everyone around us and no one has DF tools.
Also look into Operation Underground Railroad. They have funds for agencies for equipment/training etc. Reach out to them and see if they can help get the ball rolling
Avatar
Avatar
whee30
Also look into Operation Underground Railroad. They have funds for agencies for equipment/training etc. Reach out to them and see if they can help get the ball rolling
A colleague of mine from another LE lab got a few grants from walmart as well. If I remember correctly, you could submit a grant request for each store location? ~5k each, but that was about 3 years ago so it could be different now
Avatar
I worked for walmart in a different timeline and they did give a fair bit to local LE. Seemed like each store had a donations budget and you just needed to make friends with the right manager
Avatar
Avatar
chauan
I would say the next time you go and submit digital evidence, talk to their phone guy. If that person is not too shy, you may be able to shadow them. Trainings are good, but far away from reality.
Shogun//Rogan 6/19/2024 4:48 AM
We have a local lab that's run by the state, but they are pretty adament about not letting you in at all to see or experience anything, unfortunately. There's another DF guy that's somewhat local to me that has an entire lab set up in his office that I may go and nerd out at. What do you mean trainings are far from reality? Because of how expensive they can be?
Avatar
Avatar
whee30
Also look into Operation Underground Railroad. They have funds for agencies for equipment/training etc. Reach out to them and see if they can help get the ball rolling
Shogun//Rogan 6/19/2024 4:48 AM
I had actually reached out to them and sought information about possible grant options, as I do ICAC stuff as well as general investigations. Hopefully it pans out.
Avatar
Avatar
C. Russell
A colleague of mine from another LE lab got a few grants from walmart as well. If I remember correctly, you could submit a grant request for each store location? ~5k each, but that was about 3 years ago so it could be different now
Shogun//Rogan 6/19/2024 4:48 AM
Thanks for the advice, I'll check it out!
☺️ 1
Avatar
digital Bowles 6/19/2024 11:08 AM
I know this has been asked before (unable to find the tread), my agency is looking to purchase a workstation. Currently doing mobiles, CDRs, a few Hraddrives, and running Axiom. What is some spec recommendations (don't understand hardware 100% so KISS please). This will be our 1st and currently only, so looking for base value without breaking the bank. Thanks yall.
Avatar
Avatar
digital Bowles
I know this has been asked before (unable to find the tread), my agency is looking to purchase a workstation. Currently doing mobiles, CDRs, a few Hraddrives, and running Axiom. What is some spec recommendations (don't understand hardware 100% so KISS please). This will be our 1st and currently only, so looking for base value without breaking the bank. Thanks yall.
#lab-hardware
Avatar
Avatar
Beercow
#lab-hardware
digital Bowles 6/19/2024 11:23 AM
Thank you. Looked right over that.
Avatar
Avatar
Shogun//Rogan
We have a local lab that's run by the state, but they are pretty adament about not letting you in at all to see or experience anything, unfortunately. There's another DF guy that's somewhat local to me that has an entire lab set up in his office that I may go and nerd out at. What do you mean trainings are far from reality? Because of how expensive they can be?
Trainings (vendor and vendor-neutral) are for knowledge but doesn't really prepare you for the real world. You can learn a lot from shadowing someone who has been doing this for a while, from process, paperwork, do & dont, tips & tricks, etc.
Avatar
Avatar
chauan
Trainings (vendor and vendor-neutral) are for knowledge but doesn't really prepare you for the real world. You can learn a lot from shadowing someone who has been doing this for a while, from process, paperwork, do & dont, tips & tricks, etc.
Shogun//Rogan 6/19/2024 12:06 PM
Total makes sense. Difference between responding to an active burglary in progress and just talking about it in the academy.
Avatar
Avatar
digital Bowles
I know this has been asked before (unable to find the tread), my agency is looking to purchase a workstation. Currently doing mobiles, CDRs, a few Hraddrives, and running Axiom. What is some spec recommendations (don't understand hardware 100% so KISS please). This will be our 1st and currently only, so looking for base value without breaking the bank. Thanks yall.
I’ve had good luck with EdasFox. They are full forensic towers so they are expensive, but if you compare the price to other vendors with same specs it’s a good price. (edited)
Avatar
Very weird one. Anyone know a way to get the battery percentage from a locked modern android phone via the USB port
Avatar
Avatar
digital Bowles
I know this has been asked before (unable to find the tread), my agency is looking to purchase a workstation. Currently doing mobiles, CDRs, a few Hraddrives, and running Axiom. What is some spec recommendations (don't understand hardware 100% so KISS please). This will be our 1st and currently only, so looking for base value without breaking the bank. Thanks yall.
If you don’t find what you’re looking for, I’d be happy to design you something for free. You could have the parts ordered at your local store and assembled there too if need be. If you’re just looking for specs.
♥️ 1
Avatar
Avatar
ryd3v
If you don’t find what you’re looking for, I’d be happy to design you something for free. You could have the parts ordered at your local store and assembled there too if need be. If you’re just looking for specs.
digital Bowles 6/20/2024 4:15 PM
I'm looking for just specs. Looking for super computer hardware but not wasting money. Basically looking to make it fast but don't want to just click on all the upgrades if they are not going to help.
👍 1
Avatar
Sounds good. I’ll write something up asap and send you a dm
Avatar
If anyone hasn't had a chance to watch Ian Whiffin (@CLB_iwhiffin) of @Cellebrite's testimony a few days ago in the Karen Read murder trial in the US. I would suggest giving it a watch. He presents the information very well. I was just sent it by a colleague. (edited)
👍 10
Avatar
Avatar
3X3
If anyone hasn't had a chance to watch Ian Whiffin (@CLB_iwhiffin) of @Cellebrite's testimony a few days ago in the Karen Read murder trial in the US. I would suggest giving it a watch. He presents the information very well. I was just sent it by a colleague. (edited)
Watch where?
Avatar
There is a video on a YouTube channel called 'DFIR Testimony' - Search Ian's name on YouTube and it should come up.
👍 3
Avatar
Hi @Moderators apologies for pinging you all like this. Just wanted to ask if I can get access to mobile forensics channels? would really appreciate it. thanks x.
Avatar
Anyone come across the Norton App Lock on android Galaxy s22 ultra before or just the app in general?
Avatar
Avatar
z0rz0x
Hi @Moderators apologies for pinging you all like this. Just wanted to ask if I can get access to mobile forensics channels? would really appreciate it. thanks x.
Digitalferret 6/21/2024 5:49 AM
🙂 (edited)
😂 5
😃 1
Avatar
Avatar
z0rz0x
Hi @Moderators apologies for pinging you all like this. Just wanted to ask if I can get access to mobile forensics channels? would really appreciate it. thanks x.
Digitalferret 6/21/2024 5:50 AM
you a license paying user of any of the proprietary s/w?
Avatar
Avatar
Digitalferret
you a license paying user of any of the proprietary s/w?
I am not. thanks for sharing this pre requisite 😅
Avatar
Digitalferret 6/21/2024 5:55 AM
sorry, gnarly af today 🙂 Discord flooders
Avatar
sorry about that! just making sure your Friday is as gnarly as possible! 🌊😂 I’m flooding in the weekend early!
Avatar
Avatar
z0rz0x
sorry about that! just making sure your Friday is as gnarly as possible! 🌊😂 I’m flooding in the weekend early!
Digitalferret 6/21/2024 6:08 AM
lol, nah, least of the worries. its when 100+ descend here hoping for free help with cracked programs. 👢 🥾 🔨 👢 🥾 🔨 👢 🥾 🔨 👢 🥾 🔨
6:09 AM
next thing will be: "my drive has been encrypted, Ran$omware. Halp, what do?" (edited)
😂 2
Avatar
lolz, i feel ya, this sure is tough. hang in there. this shall pass too. 🫡🦌
Avatar
Following up to @Digitalferret 's message on #mobile-forensic-extractions channel. If you ping our @Cellebrite team, don't be offended if we ask for your work email / dongle via dm.
💯 1
👍 2
Avatar
Avatar
3X3
If anyone hasn't had a chance to watch Ian Whiffin (@CLB_iwhiffin) of @Cellebrite's testimony a few days ago in the Karen Read murder trial in the US. I would suggest giving it a watch. He presents the information very well. I was just sent it by a colleague. (edited)
Shogun//Rogan 6/21/2024 1:03 PM
Thanks for this. I'll be diving into this the next few hours, surely.
Salute 2
Avatar
Avatar
ryd3v
Sounds good. I’ll write something up asap and send you a dm
If you don't mind sharing here as well, that might be useful for other people 😊
💯 1
Avatar
Anyone using AI to help speed up your work flow? I was looking at trying something like the plaud note for taking my bench notes and transcribing them. Any pros / cons
Avatar
Avatar
3X3
If anyone hasn't had a chance to watch Ian Whiffin (@CLB_iwhiffin) of @Cellebrite's testimony a few days ago in the Karen Read murder trial in the US. I would suggest giving it a watch. He presents the information very well. I was just sent it by a colleague. (edited)
Thanks for posting this. I believe Ian was busy prepping for this trial during techno security. I’d be curious what goes into his trial prep. It typically takes me 40 hours of research, slide production, and peer review before I’m comfortable with going up on the stand.
Salute 1
Avatar
Currently working on determining whether or not a Gmail account actually sent an email or not with full access to the victim email. This is a personal Gmail account, so there's no admin/vault set up. Nothing is in the outbox, drafts, or trash. Does it just end there? If this doesn't fit here I couldn't quite figure out where channel this would be best for. (edited)
Avatar
Avatar
DB
Currently working on determining whether or not a Gmail account actually sent an email or not with full access to the victim email. This is a personal Gmail account, so there's no admin/vault set up. Nothing is in the outbox, drafts, or trash. Does it just end there? If this doesn't fit here I couldn't quite figure out where channel this would be best for. (edited)
Just got back from the INTERPOL DFEG meeting where we discussed four different kinds of email attacks in the wild (and one particularly unique kind in detail). Happy to chat, and Arman from Metaspike is also here. When you say "an email", does that mean you have an email from another victim which appears to have been sent from the compromised account of your first victim? Or you have a different scenario?
Avatar
Avatar
Arsenal
Just got back from the INTERPOL DFEG meeting where we discussed four different kinds of email attacks in the wild (and one particularly unique kind in detail). Happy to chat, and Arman from Metaspike is also here. When you say "an email", does that mean you have an email from another victim which appears to have been sent from the compromised account of your first victim? Or you have a different scenario?
I wish I could use Metaspike! Yes, to your scenario though. I am trying to find a way to confirm something came from a particular email, but I don't have access to the email that was recieved, so I believe it's fake/spoof and I wanted to see if there was a way to get an email activity log that wasn't super obvious in the first few pages of google help instructions and such. I'll reach out with more details, thank you!
👍 1
Avatar
Morning/Afternoon all, my team recently got access to Magnet Graykey and I’ve been asked to do some research on how it works in preperation for when we start using it in live cases. I’ve done my own research and have a decent understand of it, but I was wondering if anyone has any recommendations on how I can improve my knowledge on using this tool.
Avatar
Digitalferret 6/24/2024 1:12 AM
poke @Magnet Forensics ?
Avatar
Digitalferret 6/24/2024 1:24 AM
which reminds me: also, and for everyone else, as per CLB Paul https://discord.com/channels/427876741990711298/537760691302563843/1253731744969134222 , please don't be offended if Vendors ask for proof of license. Cracked S/W vendors have been sending folks here "as a free bonus" for help and advice.
💪 5
Avatar
Avatar
Coropsi
Morning/Afternoon all, my team recently got access to Magnet Graykey and I’ve been asked to do some research on how it works in preperation for when we start using it in live cases. I’ve done my own research and have a decent understand of it, but I was wondering if anyone has any recommendations on how I can improve my knowledge on using this tool.
that sounds like the million dollar question, I believe everyone here (and also many outside of this group) would like to know how it works... sadly it's a black box solution as many other closed source tools
👍🏻 1
3:20 AM
The dire reality is that every time we use a mainstream DF tool, we are throwing the scientific method down the drain, basically every single day. One notable exception of this might be the output of @Amped Software products, because AFAIK they provide a detailed outline of algorithms used to obtain an output, along with specific bibliography Not surprisingly, that's an Italian company. We tend to give quite a bit of weight to the scientific method here (at least, we should)
Amped1 2
Avatar
Digitalferret 6/24/2024 3:31 AM
I believe everyone here (and also many outside of this group) would like to know how it works Yup, I've know Engi's/Dev's themselves only know <product> works by FM having been kept in a need to know environment. I can leak this tho... after all, I'm a Mod here. 🙂
SPOILER
Image attachment
Avatar
I'm afraid I did not understand your message, I am not a native speaker, what does FM mean?
Avatar
Avatar
Lazza
that sounds like the million dollar question, I believe everyone here (and also many outside of this group) would like to know how it works... sadly it's a black box solution as many other closed source tools
"Million dollar question" is an interesting phrase in this context. Research and development is not free. I would also like world peace and a McLaren in my driveway.
Avatar
The fact that we pay for tools does not absolve us from our obligation to the court, that is we must be able to explain the science that lead to specific results, which at the end of the day may end up sending one person to prison (or viceversa). For instance, if <Tool x> extract WhatsApp data by issuing ADB downgrade commands, then surely we should (must?) know that it does adb shell cmd package uninstall -k, followed by a phone reboot which is essential for the downgrade on any recent Android version, followed by an installation of the old APK. Maybe we would not read every line of code of "ADB", but at least a basic understanding on what is going on is really warranted... Even DNA research is not free, yet I doubt forensic geneticists would be comfortable responding "LOL I don't know how this thing works, they would not tell me, but the resulting DNA is from the suspect, I blindly trust the vendor."
👀 1
4:02 AM
That being said, I hope I haven't offended anyone with this "uncomfortable truth," but it's a topic I care deeply about. I'll end the discussion because it wasn't my intention to start a flame 🙂
Avatar
Avatar
Lazza
I'm afraid I did not understand your message, I am not a native speaker, what does FM mean?
Digitalferret 6/24/2024 4:04 AM
Urban Dictionary: works by <expletive> Magic
😅 1
Avatar
Avatar
Lazza
The fact that we pay for tools does not absolve us from our obligation to the court, that is we must be able to explain the science that lead to specific results, which at the end of the day may end up sending one person to prison (or viceversa). For instance, if <Tool x> extract WhatsApp data by issuing ADB downgrade commands, then surely we should (must?) know that it does adb shell cmd package uninstall -k, followed by a phone reboot which is essential for the downgrade on any recent Android version, followed by an installation of the old APK. Maybe we would not read every line of code of "ADB", but at least a basic understanding on what is going on is really warranted... Even DNA research is not free, yet I doubt forensic geneticists would be comfortable responding "LOL I don't know how this thing works, they would not tell me, but the resulting DNA is from the suspect, I blindly trust the vendor."
Digitalferret 6/24/2024 4:08 AM
4:09 AM
companies are entitled, i'd think, to protect their own IP (intellectual property) rights
4:10 AM
you could also look up Daubert, explicitly, although now getting dated, basic principles are good
Avatar
Avatar
Lazza
The fact that we pay for tools does not absolve us from our obligation to the court, that is we must be able to explain the science that lead to specific results, which at the end of the day may end up sending one person to prison (or viceversa). For instance, if <Tool x> extract WhatsApp data by issuing ADB downgrade commands, then surely we should (must?) know that it does adb shell cmd package uninstall -k, followed by a phone reboot which is essential for the downgrade on any recent Android version, followed by an installation of the old APK. Maybe we would not read every line of code of "ADB", but at least a basic understanding on what is going on is really warranted... Even DNA research is not free, yet I doubt forensic geneticists would be comfortable responding "LOL I don't know how this thing works, they would not tell me, but the resulting DNA is from the suspect, I blindly trust the vendor."
The obligation you mention is something that digital forensics practitioners understand. There is a lot of space between that and "throwing the scientific method down the drain." I will leave this discussion here as well due to risk of escalation and collateral damage on a Monday morning. 🤣
😁 3
Avatar
Avatar
Digitalferret
you could also look up Daubert, explicitly, although now getting dated, basic principles are good
Yes I know about that one, although not directly relevant in my case as the legal system in which I work is "a bit different" (understatement of the year) from the USA
Avatar
Avatar
Lazza
Yes I know about that one, although not directly relevant in my case as the legal system in which I work is "a bit different" (understatement of the year) from the USA
Digitalferret 6/24/2024 4:53 AM
yep, lol, " a bit different" pretty much everywhere. oh for "Standards" 🙂 Still, if a SW is proven/trusted/accepted in court, it's a start.
💯 1
Avatar
Avatar
Lazza
The dire reality is that every time we use a mainstream DF tool, we are throwing the scientific method down the drain, basically every single day. One notable exception of this might be the output of @Amped Software products, because AFAIK they provide a detailed outline of algorithms used to obtain an output, along with specific bibliography Not surprisingly, that's an Italian company. We tend to give quite a bit of weight to the scientific method here (at least, we should)
The capabilities of Magnet vs. Amped Software do not even seem comparable to me... Mainstream DF tools have greater support matrix and functionality so slight trade off in trust that the examiner will use the scientific methodology when using it/ ask the right questions to the right people if black box functionality becomes critical to the case. This is why they must be trained and certified. I see the point you are making here, but claiming mainstream df tools don't consider the scientific method doesn't really make sense, there is plenty of papers and support resources to understand the backend of these mainstream tools.
Avatar
Avatar
theshark
The capabilities of Magnet vs. Amped Software do not even seem comparable to me... Mainstream DF tools have greater support matrix and functionality so slight trade off in trust that the examiner will use the scientific methodology when using it/ ask the right questions to the right people if black box functionality becomes critical to the case. This is why they must be trained and certified. I see the point you are making here, but claiming mainstream df tools don't consider the scientific method doesn't really make sense, there is plenty of papers and support resources to understand the backend of these mainstream tools.
"claiming mainstream df tools don't consider the scientific method doesn't really make sense" Which is not what I wrote, please don't attribute statements to me that have not been said/written
Avatar
Avatar
Lazza
"claiming mainstream df tools don't consider the scientific method doesn't really make sense" Which is not what I wrote, please don't attribute statements to me that have not been said/written
I was just adressing this "The dire reality is that every time we use a mainstream DF tool, we are throwing the scientific method down the drain, basically every single day".
Avatar
Avatar
theshark
I was just adressing this "The dire reality is that every time we use a mainstream DF tool, we are throwing the scientific method down the drain, basically every single day".
"We" means the users, not the tools. My message did not refer to what tools do or do not "consider", it talks about analysts, because it is our responsibility to follow explainable, documented and repeatable procedures regardless of the tools we use. Of course I am speaking related to my legal framework of reference, different places might have different rules, YMMV, etc... But the issue exists, acknowledging it exists was not meant to be offending to anyone, it was just a means of starting a conversation on what we can do to make the situation better (while still using and paying for the stuff we all enjoy). I understand that this conversation may seem boring or uninteresting to other folks and my hyperbole was not well received, no problem. It's not always easy to express oneself when using a different language, in written form nonetheless (a lot gets lost in translation). Sorry for disturbing the general discussion channel.
👍 1
Avatar
Avatar
Lazza
"We" means the users, not the tools. My message did not refer to what tools do or do not "consider", it talks about analysts, because it is our responsibility to follow explainable, documented and repeatable procedures regardless of the tools we use. Of course I am speaking related to my legal framework of reference, different places might have different rules, YMMV, etc... But the issue exists, acknowledging it exists was not meant to be offending to anyone, it was just a means of starting a conversation on what we can do to make the situation better (while still using and paying for the stuff we all enjoy). I understand that this conversation may seem boring or uninteresting to other folks and my hyperbole was not well received, no problem. It's not always easy to express oneself when using a different language, in written form nonetheless (a lot gets lost in translation). Sorry for disturbing the general discussion channel.
100% agree with you. My observation is that DF tools are trying to create an ecosystem and make the tools as easy (to use) as possible. The downside - even "trained" users don't understand the basics of technology but able to "do the job" by pushing the buttons.
👍 2
🙏 1
💯 1
Avatar
Avatar
Lazza
"We" means the users, not the tools. My message did not refer to what tools do or do not "consider", it talks about analysts, because it is our responsibility to follow explainable, documented and repeatable procedures regardless of the tools we use. Of course I am speaking related to my legal framework of reference, different places might have different rules, YMMV, etc... But the issue exists, acknowledging it exists was not meant to be offending to anyone, it was just a means of starting a conversation on what we can do to make the situation better (while still using and paying for the stuff we all enjoy). I understand that this conversation may seem boring or uninteresting to other folks and my hyperbole was not well received, no problem. It's not always easy to express oneself when using a different language, in written form nonetheless (a lot gets lost in translation). Sorry for disturbing the general discussion channel.
I agree with this all, not trying to argue semantics. I look at the major tools as those with the greatest support matrix and fast workflow for intake at places like the police or giant e-discovery companies. I guess for me it just comes down to what is in question and how the "professional" chooses to respond to that.
Avatar
Avatar
chauan
100% agree with you. My observation is that DF tools are trying to create an ecosystem and make the tools as easy (to use) as possible. The downside - even "trained" users don't understand the basics of technology but able to "do the job" by pushing the buttons.
Digitalferret 6/24/2024 10:04 AM
should be fundamentals >> everything else.
Avatar
Hi all, I'm working as the paragel for a criminal defense firm right now and we have a client who's phone has been in custody for the past two years (from what I could tell, a Samsung A03) Our client had forgotten the passcode since its been 2 years. There's a lot of evidence and hopefully location data to show our client wasn't at the scene of the crime, but our client wasn't really willing to budge to shell our for a forensic analyst of high budget, and only guys that were beyond his budget said they had the capability. I'm a cs major and have forensic work on my own stuff and really wanna help this guy out. I get access to the phone tomorrow at the court house for two hours, and I don't have access to any paid / expert level software for extraction. If anyone has any tips for me let me know, I've been spending the last week learning as much as I can. My first approach is gonna be putting in a new sim and using a PUK code leveraging this https://bugs.xdavidhu.me/google/2022/11/10/accidental-70k-google-pixel-lock-screen-bypass/ Because the phone was set to airplane mode by LE and is hopefully set to a version before the bugfix. Other than that, I would love any tips. I can also prove any of this information through DM with redactions if anyone is hesitant to provide clues. Any help is much appreciated.
Avatar
Avatar
tru
Hi all, I'm working as the paragel for a criminal defense firm right now and we have a client who's phone has been in custody for the past two years (from what I could tell, a Samsung A03) Our client had forgotten the passcode since its been 2 years. There's a lot of evidence and hopefully location data to show our client wasn't at the scene of the crime, but our client wasn't really willing to budge to shell our for a forensic analyst of high budget, and only guys that were beyond his budget said they had the capability. I'm a cs major and have forensic work on my own stuff and really wanna help this guy out. I get access to the phone tomorrow at the court house for two hours, and I don't have access to any paid / expert level software for extraction. If anyone has any tips for me let me know, I've been spending the last week learning as much as I can. My first approach is gonna be putting in a new sim and using a PUK code leveraging this https://bugs.xdavidhu.me/google/2022/11/10/accidental-70k-google-pixel-lock-screen-bypass/ Because the phone was set to airplane mode by LE and is hopefully set to a version before the bugfix. Other than that, I would love any tips. I can also prove any of this information through DM with redactions if anyone is hesitant to provide clues. Any help is much appreciated.
It should be your criminal attorney worrying about unlocking and shouldn't be your concern, unless you're tasked directly to do so.
Avatar
I am tasked directly to do so
10:16 AM
With court approval
Avatar
Ok, then you'll need to reach out to a DF consultant who has the tool to do so, to have this done the proper way. (edited)
Avatar
I am the consultant for this case. Its in a remote area with less than 100 population and the travel expense was too much for the client to cover.
Avatar
Most people are lazy and tend to reuse the same pin or pattern over and over... Does the client have any clue on their most used pins?
Avatar
I just got on this case in the last couple months and they had apparently already tried pins until there was only 2 left before factory reset (my first thought was to look at common patterns and use uv light to see his finger prints)
10:34 AM
He did say its something like a zig zag pattern though
Avatar
I'll just add to this, that manually trying passcodes, can prevent other unlocking solutions to work.
this 2
Avatar
Avatar
tru
Hi all, I'm working as the paragel for a criminal defense firm right now and we have a client who's phone has been in custody for the past two years (from what I could tell, a Samsung A03) Our client had forgotten the passcode since its been 2 years. There's a lot of evidence and hopefully location data to show our client wasn't at the scene of the crime, but our client wasn't really willing to budge to shell our for a forensic analyst of high budget, and only guys that were beyond his budget said they had the capability. I'm a cs major and have forensic work on my own stuff and really wanna help this guy out. I get access to the phone tomorrow at the court house for two hours, and I don't have access to any paid / expert level software for extraction. If anyone has any tips for me let me know, I've been spending the last week learning as much as I can. My first approach is gonna be putting in a new sim and using a PUK code leveraging this https://bugs.xdavidhu.me/google/2022/11/10/accidental-70k-google-pixel-lock-screen-bypass/ Because the phone was set to airplane mode by LE and is hopefully set to a version before the bugfix. Other than that, I would love any tips. I can also prove any of this information through DM with redactions if anyone is hesitant to provide clues. Any help is much appreciated.
Hi tru, be aware they might give you a dead phone that will need to be charged for a bit. That has been my experience with defense cases.
Avatar
Avatar
PhrostByte
Hi tru, be aware they might give you a dead phone that will need to be charged for a bit. That has been my experience with defense cases.
Hey thanks for the heads up
Avatar
Avatar
tru
Hi all, I'm working as the paragel for a criminal defense firm right now and we have a client who's phone has been in custody for the past two years (from what I could tell, a Samsung A03) Our client had forgotten the passcode since its been 2 years. There's a lot of evidence and hopefully location data to show our client wasn't at the scene of the crime, but our client wasn't really willing to budge to shell our for a forensic analyst of high budget, and only guys that were beyond his budget said they had the capability. I'm a cs major and have forensic work on my own stuff and really wanna help this guy out. I get access to the phone tomorrow at the court house for two hours, and I don't have access to any paid / expert level software for extraction. If anyone has any tips for me let me know, I've been spending the last week learning as much as I can. My first approach is gonna be putting in a new sim and using a PUK code leveraging this https://bugs.xdavidhu.me/google/2022/11/10/accidental-70k-google-pixel-lock-screen-bypass/ Because the phone was set to airplane mode by LE and is hopefully set to a version before the bugfix. Other than that, I would love any tips. I can also prove any of this information through DM with redactions if anyone is hesitant to provide clues. Any help is much appreciated.
Is there any old computer or person that has access to Samsung cloud for the account used on phone? This can be another avenue as it seems unlikely you'll be able to get anything useful in 2 hours without a passcode/sofware. Cloud account may have backups or atleast a way to login after a reset. Definetly do not spam codes and make it your fault a reset occured. (edited)
Avatar
I'm gonna see what I can do with samsung cloud and hopefully he has logged in somehow but the courthouse also has no wifi and no cell service (very remote) so a cloud backup wouldn't be possible unless I get a copy on my computer first
Avatar
eternalfoodchild 6/25/2024 3:31 AM
Hi everyone, Please guide me how to image a macbook through an open source tool
Avatar
Avatar
eternalfoodchild
Hi everyone, Please guide me how to image a macbook through an open source tool
4:14 AM
Well actually, please do say a bit more... 😄 my tool Fuji works on both Intel and Apple Silicon, no problem at all, and you will get a nice FFS acquisition. But if it's an old Intel model you might boot it with CAINE or Paladin Edge and get a full disk image with the usual tools, getting a physical image
Avatar
eternalfoodchild 6/25/2024 4:19 AM
Okayy...Can I have a link for your tool
Avatar
Avatar
eternalfoodchild
Okayy...Can I have a link for your tool
DeeFIR 🇦🇺 6/25/2024 4:24 AM
Click the above link and there’s a link to github.
👍 1
Avatar
Indeed, you will find all information in the link above, I posted my tool in the other channel. Please also make sure you read the Readme file because it discusses about how to avoid a few caveats and common issues
Avatar
We have seen a few times now, that when using Caine to boot on bitlocker encrypted computers - where we have to disable secure boot - then when secure boot is enabled again and the computer restarts, it boots into bitlocker recovery. Does anyone know why? I've been trying to figure out what happens, and I think it changes something in the BCD (\EFI\Microsoft\Boot) when booting into Caine, but I'm not sure. Any thoughts?
Avatar
@tru How did the phone examination go today?
‼️ 2
Avatar
Avatar
PhrostByte
@tru How did the phone examination go today?
Ross Donnelly 6/25/2024 11:27 AM
Hopefully not locked up for destroying evidence after triggering a wipe by guessing the last remaining PINs....
🤣 1
Avatar
Avatar
tru
Hi all, I'm working as the paragel for a criminal defense firm right now and we have a client who's phone has been in custody for the past two years (from what I could tell, a Samsung A03) Our client had forgotten the passcode since its been 2 years. There's a lot of evidence and hopefully location data to show our client wasn't at the scene of the crime, but our client wasn't really willing to budge to shell our for a forensic analyst of high budget, and only guys that were beyond his budget said they had the capability. I'm a cs major and have forensic work on my own stuff and really wanna help this guy out. I get access to the phone tomorrow at the court house for two hours, and I don't have access to any paid / expert level software for extraction. If anyone has any tips for me let me know, I've been spending the last week learning as much as I can. My first approach is gonna be putting in a new sim and using a PUK code leveraging this https://bugs.xdavidhu.me/google/2022/11/10/accidental-70k-google-pixel-lock-screen-bypass/ Because the phone was set to airplane mode by LE and is hopefully set to a version before the bugfix. Other than that, I would love any tips. I can also prove any of this information through DM with redactions if anyone is hesitant to provide clues. Any help is much appreciated.
Ross Donnelly 6/25/2024 11:29 AM
Have you tried looking into your client's Google account for that location data? Although Google are starting to remove that data from their servers so it's possible you've missed that opportunity
Avatar
@Cellebrite I'm currently running PA 10.2.100.248 and noticed that two processes are running on my computer, java.exe which is showing located in /Program Files/Cellebrite Mobile Synchronization/AnalyticsEngines/Utils/OpenJDK/jdk-13.0.2/bin and another process, server.exe, which is in /Synchronization/AnalyticsEnginesUltra/external_dependencies.openvino. Both processes are taking up about 50% of memoery without PA even open. I have 64gb of RAM. Is this normal, abnormal? Theres 2 of each process and when I kill them they just restart. (edited)
📬 2
Avatar
Avatar
b8vr
We have seen a few times now, that when using Caine to boot on bitlocker encrypted computers - where we have to disable secure boot - then when secure boot is enabled again and the computer restarts, it boots into bitlocker recovery. Does anyone know why? I've been trying to figure out what happens, and I think it changes something in the BCD (\EFI\Microsoft\Boot) when booting into Caine, but I'm not sure. Any thoughts?
MrMacca (Allan Mc) 6/25/2024 11:58 AM
I'd recommend using winfe, as then you don't have to disable secure boot. Disabling secure boot will trip the tpm and result in what you are experiencing.
👍 1
Avatar
Avatar
PhrostByte
@tru How did the phone examination go today?
The phone was extremely damaged and more damaged than it was in the evidence pictures so im not sure if something fell on it in the evidence room or what. But trying to abuse the sim but, the sim cartridge was also damaged and as soon as I turned the phone it it said the sim reader wasn't identifying a sim card so putting my own sim card in obviously didn't change that
12:15 PM
Thankfully they were very open about letting us access it and record it so hopefully in the future we can do something with it
Avatar
Avatar
MrMacca (Allan Mc)
I'd recommend using winfe, as then you don't have to disable secure boot. Disabling secure boot will trip the tpm and result in what you are experiencing.
Indeed. Not only that, some laptops (especially DELL) include a physical hardware switch that will activate as soon as you open the case 👀😬 depending on the case, either winfe will be OK or even turning the computer on (it happened once where the company IT had all credentials but wasn't even sure if the laptop had Bitlocker or not and they could not find the keys) (edited)
Avatar
Avatar
MrMacca (Allan Mc)
I'd recommend using winfe, as then you don't have to disable secure boot. Disabling secure boot will trip the tpm and result in what you are experiencing.
winfe.net - way easier to set up now than the old search.org method.
Avatar
Avatar
tru
The phone was extremely damaged and more damaged than it was in the evidence pictures so im not sure if something fell on it in the evidence room or what. But trying to abuse the sim but, the sim cartridge was also damaged and as soon as I turned the phone it it said the sim reader wasn't identifying a sim card so putting my own sim card in obviously didn't change that
Did you really try troubleshooting with your own SIM card? Maybe people on the defense side can chime in on this, but that's something usually considered a big no-no for the prosecution side to do....
👍 1
Avatar
Avatar
chauan
Did you really try troubleshooting with your own SIM card? Maybe people on the defense side can chime in on this, but that's something usually considered a big no-no for the prosecution side to do....
Digitalferret 6/25/2024 3:45 PM
100% agree. possible evidence tampering/contamination? (edited)
Avatar
The whole situation is really weird for a paralegal to be messing around with in the first place. Seems very risky to put yourself out there at the request of an attorney while unprepared and inexperienced in dealing with this type of evidence. Something as simple as sticking a foreign SIM into the phone should have sent alarm bells for both you and the agency who is maintaining custody of the phone.
👍 2
💯 1
Avatar
If you aren't ready to address these cases, then protect yourself from the liabilities involved. Everyone has to start somewhere, but that somewhere is ideally a classroom
👍 1
Avatar
He is the DF consultant and asked to examine the device by the attorney (defense I think). I mentioned this earlier but please reach out to an experienced DF consultant for assistance. (edited)
Avatar
equalexpert 6/26/2024 1:05 AM
Hi all, just wondering if anyone knows if it would be possible to get hold of the Steam game hashes? Would be worth while as an exclusionary hash set
Avatar
Avatar
equalexpert
Hi all, just wondering if anyone knows if it would be possible to get hold of the Steam game hashes? Would be worth while as an exclusionary hash set
I think Steam install the game in a folder so it would be tens of thousands of files per game rather than a single game image. The games also constantly update (well games such as COD do anyway). Valve Corporation have been very unreceptive of cooperation with UK LE in my previous experience Some files are dynamic compiled (shader caches etc) so may be unique per host too. Maybe you could find a reason to build a Steam validation rig with lots of games on it 😉
Avatar
Avatar
busted4n6
I think Steam install the game in a folder so it would be tens of thousands of files per game rather than a single game image. The games also constantly update (well games such as COD do anyway). Valve Corporation have been very unreceptive of cooperation with UK LE in my previous experience Some files are dynamic compiled (shader caches etc) so may be unique per host too. Maybe you could find a reason to build a Steam validation rig with lots of games on it 😉
This valveadation rig would obviously require extensive testing to see what game files are dynamic!
Avatar
Avatar
FullTang
This valveadation rig would obviously require extensive testing to see what game files are dynamic!
Indeed, with multiple games to ensure versatility
💯 1
Avatar
Avatar
equalexpert
Hi all, just wondering if anyone knows if it would be possible to get hold of the Steam game hashes? Would be worth while as an exclusionary hash set
Steamdb may help. For example - https://steamdb.info/depot/373303/?show_hashes (need to log in with a Steam account and can get a list of hashes)
Avatar
Has anyone done some research or blog on android's mnt/pass_through/0/emulated/0/.....?
Avatar
Avatar
Pacman
Has anyone done some research or blog on android's mnt/pass_through/0/emulated/0/.....?
symlinks
Avatar
Avatar
CLB-Paul
symlinks
Symbolic links between data/data and pass_through?
📬 1
Avatar
Yeah i know the situations pretty weird, and I did feel somewhat uncomfortable approaching it but they needed someone with at least some df experience and although I've never worked formally on it I've contributed to some related open source projects and was a part of a team that released a jailbreak a couple years ago so theres some overlap. Mostly i was a dfer consultant in that the process I went through was to make it clear that the phone had been damaged since it was taken and that it would be essentially impossible to extract a completely decrypted file system without a consultant that has access to private software (which the client can't pay for). So the inspection is gonna be used to get the court to either appoint someone that can properly do the extraction or get the police department to go into more depth into how they were able to access the phone. Defendant also seemed pretty adamant that they switched the phone because the screen cracks were a lot different and he thinks the wallpaper is different but thats beside the point.
Avatar
Avatar
tru
Yeah i know the situations pretty weird, and I did feel somewhat uncomfortable approaching it but they needed someone with at least some df experience and although I've never worked formally on it I've contributed to some related open source projects and was a part of a team that released a jailbreak a couple years ago so theres some overlap. Mostly i was a dfer consultant in that the process I went through was to make it clear that the phone had been damaged since it was taken and that it would be essentially impossible to extract a completely decrypted file system without a consultant that has access to private software (which the client can't pay for). So the inspection is gonna be used to get the court to either appoint someone that can properly do the extraction or get the police department to go into more depth into how they were able to access the phone. Defendant also seemed pretty adamant that they switched the phone because the screen cracks were a lot different and he thinks the wallpaper is different but thats beside the point.
Ross Donnelly 6/26/2024 12:10 PM
Step 1 has to be to protect the integrity of the exhibit at all costs. Regardless of circumstances the approach you took breached that and could open you to massive criticism in court - your actions compromised the evidence and weren't just limited to a brief inspection. If it did work - you just connected it to the network, opening it up to potential remote wiping at worst, but even just generally sending and recieving new data will have irreparably changed that data. Digital Forensics is a dangerous place to have a little knowledge. I appreciate how much of a difficult spot you were put in, but equally you could very easily get sued for doing something wrong when you're not qualified to do it. Now that full inspection you want an expert to do might throw you under the bus for messing up the evidence. Hope that doesn't sound too harsh, just trying to protect you in future!
Avatar
Avatar
Ross Donnelly
Step 1 has to be to protect the integrity of the exhibit at all costs. Regardless of circumstances the approach you took breached that and could open you to massive criticism in court - your actions compromised the evidence and weren't just limited to a brief inspection. If it did work - you just connected it to the network, opening it up to potential remote wiping at worst, but even just generally sending and recieving new data will have irreparably changed that data. Digital Forensics is a dangerous place to have a little knowledge. I appreciate how much of a difficult spot you were put in, but equally you could very easily get sued for doing something wrong when you're not qualified to do it. Now that full inspection you want an expert to do might throw you under the bus for messing up the evidence. Hope that doesn't sound too harsh, just trying to protect you in future!
Its not too harsh and I appreciate the criticism. To this extent, how would you draft a statement to support the courts appointment to a professional consultant or firm that can work with the device?
Avatar
Avatar
tru
Its not too harsh and I appreciate the criticism. To this extent, how would you draft a statement to support the courts appointment to a professional consultant or firm that can work with the device?
Ross Donnelly 6/26/2024 12:27 PM
I was instructed to address Question X. Given the damage to the handset, the only way to potentially address this question is by utilising forensic tools in order to perform a 'full file system' extraction of the device. This requires the usage of specialist tools not available to me. A digital forensics expert with access to such tools is therefore required in order to address the question. It's for the legal team to argue why that question needs to be addressed to ensure a fair trial.
Avatar
Avatar
Ross Donnelly
I was instructed to address Question X. Given the damage to the handset, the only way to potentially address this question is by utilising forensic tools in order to perform a 'full file system' extraction of the device. This requires the usage of specialist tools not available to me. A digital forensics expert with access to such tools is therefore required in order to address the question. It's for the legal team to argue why that question needs to be addressed to ensure a fair trial.
Pretty much exactly what I was gonna say. Appreciate it a lot and thank you all for the feedback through this.
Avatar
Who would pay for the work if the court appoints one to this case? If the prosecution isn't caring too much about the phone, they probably don't need the phone for the case....
Avatar
The court can appoint an expert for the defense under discretion for a fair trial (edited)
Avatar
Avatar
tru
The court can appoint an expert for the defense under discretion for a fair trial (edited)
DeeFIR 🇦🇺 6/26/2024 9:10 PM
There’s something missing here. Why wasn’t this raised initially? Now you’re potentially in the position where you’d be criticised by that independent appointed expert, prosecution’s expert (if one is appointed), and any other defence experts if they’re engaged in the future. The only instances I’ve been involved in which were based around ‘non-standard’ or processes which weren’t forensically sound were agreed to in advance, both parties/agents agreed to the undertaking and it was all documented, discussed, and agreed to as a final option prior to that action occurring.
Avatar
Avatar
DeeFIR 🇦🇺
There’s something missing here. Why wasn’t this raised initially? Now you’re potentially in the position where you’d be criticised by that independent appointed expert, prosecution’s expert (if one is appointed), and any other defence experts if they’re engaged in the future. The only instances I’ve been involved in which were based around ‘non-standard’ or processes which weren’t forensically sound were agreed to in advance, both parties/agents agreed to the undertaking and it was all documented, discussed, and agreed to as a final option prior to that action occurring.
All of what you said was true except for the 'final option' part. It is an extremely small rural court, the prosecution had already inspected the phone and refused to offer any of their findings, and the defendant was not willing to pay for a forensic expert that was above a certain price threshold. Beyond this, many of the lower price experts said that they couldn't break into it without the right software. The phone could have broken into with the method I posted (I practiced on the same model and android versions), and the phone was in airplane mode (PUK codes are locally stored) so no network interference could have occurred. I understand the criticisms, and I probably won't add more details beyond this, but just trying to make the situation more clear.
👍 1
Avatar
Avatar
tru
All of what you said was true except for the 'final option' part. It is an extremely small rural court, the prosecution had already inspected the phone and refused to offer any of their findings, and the defendant was not willing to pay for a forensic expert that was above a certain price threshold. Beyond this, many of the lower price experts said that they couldn't break into it without the right software. The phone could have broken into with the method I posted (I practiced on the same model and android versions), and the phone was in airplane mode (PUK codes are locally stored) so no network interference could have occurred. I understand the criticisms, and I probably won't add more details beyond this, but just trying to make the situation more clear.
DeeFIR 🇦🇺 6/26/2024 9:53 PM
Technical issues aside, it’s a procedural issue and as others have mentioned, about managing risk. Are prosecution aware of the process? Did they agree to your approach? What happens if they need to revisit the original exhibit? It’s an exhibit, not your exhibit, not prosecution’s exhibit, not defense’s exhibit. Your job is meant to be impartial and conduct your examination/analysis within the confines of a verifiable and reproducible process. Just because your client doesn’t agree to paying something doesn’t mean it’s procedurally correct.
Avatar
I think the abnormality of the situation may be causing you to ignore some of the things I've already mentioned. Everything was agreed upon, the process was made reproducible and the exploit has extensive documentation online for verifiability. I may have been a part of the defense, but believe I worked impartially and, if I had successfully bypassed the lock screen, I would have collected as much data as possible for both sides. I agree the situation was not perfectly executed and is open to a lot of criticism--which is why I've made it public here.
Avatar
Avatar
tru
I think the abnormality of the situation may be causing you to ignore some of the things I've already mentioned. Everything was agreed upon, the process was made reproducible and the exploit has extensive documentation online for verifiability. I may have been a part of the defense, but believe I worked impartially and, if I had successfully bypassed the lock screen, I would have collected as much data as possible for both sides. I agree the situation was not perfectly executed and is open to a lot of criticism--which is why I've made it public here.
DeeFIR 🇦🇺 6/26/2024 10:05 PM
It’s not an abnormal situation at all. There may be some limitations but ultimately you’ve ended up in the same position, with more complications. Was the risk of irreversibility modifying data and the device raised with the court? When you said it was agreed upon, who agreed to the process?
Avatar
Yes. The judge, the DA, law enforcement, and the prosecutor. There is no way for me to explain the exact case and court proceedings
Avatar
Lots of people are talking about moving off Splunk for cost and because they think it's an old product compared to some of the newer siems. Is this really the case(outside cost)
Avatar
Avatar
tru
Yes. The judge, the DA, law enforcement, and the prosecutor. There is no way for me to explain the exact case and court proceedings
Digitalferret 6/27/2024 1:56 AM
you are indeed between a rock and a hard place. gotta give respect for you taking this on. Fundamentally, this is where the general public opinion (which we see a lot of, wannabe data diggers, anti game cheat etc) meets the truth of the word "Forensic". They will completely ignore a fundamental, even at 'only' Data Recovery shop type work, of Protecting the Source and working on copies only. The entire process of examining, extracting, producing "potential" evidence must be bound by strict procedures to enable findings to be presented to a court and accepted as evidence. Work outside those boundaries and anything you bring, no matter how important or pertinent, will be subject to a legal attack for its inadmissibility, which is pretty much what the LEA guys here are seeing in your case. I'm sure you know this already, and yours is a special case, but I feel this is why you are meeting some incredulity / suspicion / resistance here. Posted this mainly for onlookers who might think as long as you get the data out (it's not evidence until its been accepted as such by a court of law) everything will be ok.
Avatar
@tru not sure which country/jurisdiction you are operating in/under but are there not some kind of disclosure obligations on the side of the prosecution to provide the extraction they already obtained for independent review by the defence? (edited)
👍 1
✅ 1
Avatar
Avatar
bizzlyg
@tru not sure which country/jurisdiction you are operating in/under but are there not some kind of disclosure obligations on the side of the prosecution to provide the extraction they already obtained for independent review by the defence? (edited)
That's what I prepped this week for defense counsel in a case... I happily share the source data when available. Some of the problems with this approach I have seen is that by the time a case gets to actual court proceedings, the download capability may have significantly improved. For example I have cases going on which have "advanced logical" downloads, where a FFS would now be possible. So maybe the situation @tru is in is that either no good data or limited data was ever acquired to begin with.
👍 1
Avatar
Avatar
whee30
That's what I prepped this week for defense counsel in a case... I happily share the source data when available. Some of the problems with this approach I have seen is that by the time a case gets to actual court proceedings, the download capability may have significantly improved. For example I have cases going on which have "advanced logical" downloads, where a FFS would now be possible. So maybe the situation @tru is in is that either no good data or limited data was ever acquired to begin with.
Shogun//Rogan 6/27/2024 10:35 AM
Is this because of evolving exploits as time passes? IE: in 2020 during an incident, exploit A capable of extracting a device, but in 2022 when it's being pushed to trial, exploit B is capable and has been developed?
Avatar
that or budget improvements like 2020 the agency only had cellebrite UFED, 2024 agency has cellebrite premium etc
Avatar
Shogun//Rogan 6/27/2024 10:49 AM
Makes sense.
Avatar
DefendingChamp 6/27/2024 11:25 AM
Does celebrite care if you share a dongle?
11:25 AM
Says a team of two
Avatar
Within one entity I'm positive they don't care... police departments get the dongle license specifically to use across multiple computers/detectives. Across multiple agencies or differing companies, I would imagine that question would be addressed in the terms of service.
11:34 AM
they also offer a network license option for that purpose, the detective/investigator conencts to the licensing server and uses it as needed. Just one at a time.
11:35 AM
but the dongle can travel with a laptop so we always choose that
Avatar
Shogun//Rogan 6/27/2024 12:56 PM
Anyone have any experience with DataPilot? Looking to get some insight on the software/training. Feel free to DM me. Appreciate it!
Avatar
Avatar
Shogun//Rogan
Anyone have any experience with DataPilot? Looking to get some insight on the software/training. Feel free to DM me. Appreciate it!
I heard its good if you have the password to the device or what to do consent devices that skim the evidence but are not as robust as Cellebrite and others.
Avatar
Shogun//Rogan 6/28/2024 3:38 PM
That's similar I've also heard. Thanks, boss.
Avatar
Avatar
Shogun//Rogan
Anyone have any experience with DataPilot? Looking to get some insight on the software/training. Feel free to DM me. Appreciate it!
I have one. To me the best use case is for drug investigations where they want to quickly grab info from a CI phone. One feature I like is that it can capture video from HDMI. I can see that being useful.
Avatar
Avatar
Joe Schmoe
I have one. To me the best use case is for drug investigations where they want to quickly grab info from a CI phone. One feature I like is that it can capture video from HDMI. I can see that being useful.
Shogun//Rogan 6/30/2024 6:10 AM
Appreciate it, mate. I saw they had a Desktop Data Pilot software as well and I'm checking out different DF platforms for my agency.
Avatar
Avatar
Shogun//Rogan
Appreciate it, mate. I saw they had a Desktop Data Pilot software as well and I'm checking out different DF platforms for my agency.
It gets logical extractions so I wouldn’t use it as a primary tool.
Avatar
Avatar
Joe Schmoe
It gets logical extractions so I wouldn’t use it as a primary tool.
Shogun//Rogan 6/30/2024 6:42 AM
I may be a bit limited on the knowledge around it, but most of what I've seen and read lately is that, but I was under the belief that full logical is the way to go, as physical extractions image the encryptions as well?
6:43 AM
(Specific to mobile DF)
6:44 AM
Could be mis-informed. I'm pretty early on in the DF research/learning (edited)
Avatar
Avatar
Shogun//Rogan
I may be a bit limited on the knowledge around it, but most of what I've seen and read lately is that, but I was under the belief that full logical is the way to go, as physical extractions image the encryptions as well?
A full file system extraction is usually the best you will get. Logical extractions are more or less backups. You miss a lot of data like third party apps.
Avatar
Shogun//Rogan 6/30/2024 6:45 AM
Very good.
6:45 AM
Thanks, mate.
Avatar
Mobile forensics is its own beast where it can get pretty confusing when it comes to extraction types. A full file system is a logical extraction by definition, and is the best we can get due to the file based encryption with newer phones. Physical extractions are what you used to aim for as they contain every 1 and 0 on a device, but unless it is an older phone, physical extractions are useless again due to the encryption. (Computer forensics and other types of DF still utilize physical extractions.) The confusion of “logical, full file system, advanced logical, file system, ect. are due to forensic tool companies using these different naming conventions for different amounts of data available with the extraction type. For instance the “logical” extraction using Cellebrite is akin to a iTunes backup of a phone. Now past that little soap box I went onto there: my PD had a datapilot initially, and we did away with it because we had access to GrayKey and Cellebrite, but if you are looking for targeted quick specific folders from consent phones like someone’s messages or photos to quickly download without taking their devices for a day, then DataPilot is useful.
👍 2
Avatar
Garrett Jones 6/30/2024 3:04 PM
Is Volatility able to parse SCADA or PLC memory dumps? I was looking into this challenge, The Troubled Elevator by DFRWS https://github.com/dfrws/dfrws2023-challenge, and some of the artifacts they provide are the PLC memory dumps for the elevator. Looking at the Volatility documentation and Google didn’t produce any results on tools that are able to read PLC memory. Is it possible for Volatility or are there any others free tools that can do this?
Avatar
Avatar
whee30
That's what I prepped this week for defense counsel in a case... I happily share the source data when available. Some of the problems with this approach I have seen is that by the time a case gets to actual court proceedings, the download capability may have significantly improved. For example I have cases going on which have "advanced logical" downloads, where a FFS would now be possible. So maybe the situation @tru is in is that either no good data or limited data was ever acquired to begin with.
Husky_M00s3 7/1/2024 5:42 AM
Yep, at least in the United States, there needs to be some standardization regarding Discovery and examinations. It would be nice if the tools facilitated these standards. Some labs /agencies/ departments give isolated pdf reports; others give the extractions. The defense cannot verify that something was left out of the report. If they do get the extraction, they probably don't have the tools to analyze it. No group is a monolith. Some agencies strive to give the other side all the information in a usable format. Others intentionally try to prohibit a thorough review by opposing counsel. There is so much wasted time, money, and energy with this process. I think the system would benefit from DF examiner licenses and public interest service program. If you are a licensed DF examiner, you should be put in rotation for the court. When your number is called you assist the court. If the court could bounce questions off a DF expert, it would make the whole process more efficient and fair. 🪙🪙
❤️ 1
this 1
Avatar
Avatar
Husky_M00s3
Yep, at least in the United States, there needs to be some standardization regarding Discovery and examinations. It would be nice if the tools facilitated these standards. Some labs /agencies/ departments give isolated pdf reports; others give the extractions. The defense cannot verify that something was left out of the report. If they do get the extraction, they probably don't have the tools to analyze it. No group is a monolith. Some agencies strive to give the other side all the information in a usable format. Others intentionally try to prohibit a thorough review by opposing counsel. There is so much wasted time, money, and energy with this process. I think the system would benefit from DF examiner licenses and public interest service program. If you are a licensed DF examiner, you should be put in rotation for the court. When your number is called you assist the court. If the court could bounce questions off a DF expert, it would make the whole process more efficient and fair. 🪙🪙
Shogun//Rogan 7/1/2024 5:53 AM
Could it be a discovery violation if the prosecution is found to be withholding information the defense requested for a full examination? (edited)
Avatar
Avatar
Shogun//Rogan
Could it be a discovery violation if the prosecution is found to be withholding information the defense requested for a full examination? (edited)
Husky_M00s3 7/1/2024 7:00 AM
Yes, it could be a discovery violation or even a Brady violation if the evidence is potentially exculpatory. The judge makes that determination. That’s why I think the court should have an DF expert assisting them. I’m for all the experts (gov, defense, court) getting on an email chain and facilitating discovery. That way everyone has confidence in the process. I’ll give you an non-DF example of people doing something similar. A jurisdiction I worked in had an awesome OCME (medical examiner) that would meet with the defense. The defense could bring their expert, ask questions, and take notes. This made for an efficient and fair process. If the report was missing toxicology, the defense could ask for it pretrial. The OCME had confidence in their abilities and weren’t biased towards one side. Their scientific findings were available to both sides.
Avatar
Shogun//Rogan 7/1/2024 7:09 AM
What's the difference between that and just having the expert testify for the case?
Avatar
Avatar
Shogun//Rogan
What's the difference between that and just having the expert testify for the case?
Husky_M00s3 7/1/2024 7:30 AM
When you say “that” are you referring to the OCME conference or something else? If you were referring to the OCME conference, it has been my experience that testimony and a witness conference are very different. The conference is more exploratory and less adversarial. There is less procedure.
Avatar
Avatar
Husky_M00s3
Yes, it could be a discovery violation or even a Brady violation if the evidence is potentially exculpatory. The judge makes that determination. That’s why I think the court should have an DF expert assisting them. I’m for all the experts (gov, defense, court) getting on an email chain and facilitating discovery. That way everyone has confidence in the process. I’ll give you an non-DF example of people doing something similar. A jurisdiction I worked in had an awesome OCME (medical examiner) that would meet with the defense. The defense could bring their expert, ask questions, and take notes. This made for an efficient and fair process. If the report was missing toxicology, the defense could ask for it pretrial. The OCME had confidence in their abilities and weren’t biased towards one side. Their scientific findings were available to both sides.
"That’s why I think the court should have an DF expert assisting them" Isn't that required / normal? Honest question, I don't know much about trials in the US.
Avatar
Avatar
Lazza
"That’s why I think the court should have an DF expert assisting them" Isn't that required / normal? Honest question, I don't know much about trials in the US.
Husky_M00s3 7/1/2024 7:39 AM
The government has their expert and the defense can hire their own expert. If they are rendering an opinion, the proponent must give expert notice. The expert must pass a daubert or Frye test. But the judge doesn’t have an expert to consult. At least not one who is on the record. So judges hear argument and make a decision about a whole host of things: admissibility, expert opinion, chain of custody, etc. this usually ends in the “battle of the experts.”
Avatar
Avatar
Husky_M00s3
When you say “that” are you referring to the OCME conference or something else? If you were referring to the OCME conference, it has been my experience that testimony and a witness conference are very different. The conference is more exploratory and less adversarial. There is less procedure.
Shogun//Rogan 7/1/2024 7:41 AM
So moreso a deposition and less testimony.
👍 1
Avatar
Avatar
Husky_M00s3
The government has their expert and the defense can hire their own expert. If they are rendering an opinion, the proponent must give expert notice. The expert must pass a daubert or Frye test. But the judge doesn’t have an expert to consult. At least not one who is on the record. So judges hear argument and make a decision about a whole host of things: admissibility, expert opinion, chain of custody, etc. this usually ends in the “battle of the experts.”
I see, thank you for the explanation. If I understand correctly, there is an expert for the prosecutor, one for the defendant, but no third-party "impartial" expert who is neither accusing or defending, rather working for the judge.
💯 1
Avatar
Shogun//Rogan 7/1/2024 7:43 AM
Having an impartial, court-appointed DF expert would be a good idea, I think. Not sure what it would look like though.
Avatar
Avatar
Shogun//Rogan
Having an impartial, court-appointed DF expert would be a good idea, I think. Not sure what it would look like though.
In Italy that is pretty standard practice, both in criminal and civil trials (with wildly different rules between them)
Avatar
Avatar
Lazza
In Italy that is pretty standard practice, both in criminal and civil trials (with wildly different rules between them)
Husky_M00s3 7/1/2024 7:45 AM
The judge has an impartial / third party expert in Italy?
✅ 1
Avatar
Avatar
Shogun//Rogan
So moreso a deposition and less testimony.
Husky_M00s3 7/1/2024 7:50 AM
Yes, I don’t have a ton of experience with depositions. I’ve read about states implementing them in criminal matters. Seems like there are pros and cons to them.
Avatar
Shogun//Rogan 7/1/2024 7:50 AM
Why not just have the third party DF expert just get on the stand and testify as a neutral third party appointed by the court?
7:51 AM
That way they can be cross examined for clarification to the Jury
Avatar
@Husky_M00s3 Correct. For context, there is no "jury of peers" in our system, except for a specific subset of very severe crimes. The judge (or group of judges) is responsible both for the verdict and determining the punishment in criminal cases. (edited)
Avatar
should all experts not work for the interests of the court and not one side or another? Regardless of which side engaged them (edited)
7:52 AM
thats the basic job of an expert, to be impartial and independent (edited)
Avatar
Avatar
bizzlyg
should all experts not work for the interests of the court and not one side or another? Regardless of which side engaged them (edited)
It depends in which legal system you consider them, I guess. Here the defendant's consultant is contracted by the client and must (lawfully) work in the client's best interest, in a way that might be considered slightly similar to a defense lawyer. This does not mean that you can lie or write false reports, but you would surely underline and stress the elements that are favorable to your client. (edited)
Avatar
Yeah, I have seen this happen many times. I think the main point I was getting that is that experts should not necessarily have the mindset of working for one side or the other whilst performing an examination. Their job is to report the results as determined from the data/exhibits they were given, regardless if it helps or hinders their client. Quite possible then though I assume, that if the results are not favourable to a suspect for example, the defence team decide not to submit this or call this person as a witness (edited)
Avatar
Avatar
bizzlyg
Yeah, I have seen this happen many times. I think the main point I was getting that is that experts should not necessarily have the mindset of working for one side or the other whilst performing an examination. Their job is to report the results as determined from the data/exhibits they were given, regardless if it helps or hinders their client. Quite possible then though I assume, that if the results are not favourable to a suspect for example, the defence team decide not to submit this or call this person as a witness (edited)
Husky_M00s3 7/1/2024 8:03 AM
I agree. I would highlight the academic research on DF bias by Nina Sundae. It suggests that bias can creep in even when an examiner is using that mindset: https://www.researchgate.net/publication/351303866_A_Hierarchy_of_Expert_Performance_HEP_applied_to_Digital_Forensics_Reliability_and_Biasability_in_Digital_Forensics_Decision_Making
👍 1
Avatar
god I have way too many typos today 😂
Avatar
Avatar
Shogun//Rogan
That way they can be cross examined for clarification to the Jury
Husky_M00s3 7/1/2024 8:14 AM
That sounds great. I’ve read about jurisdictions creating separate digital forensic labs (like separate from law enforcement) I am sure there are pros and cons.
Avatar
Shogun//Rogan 7/1/2024 8:15 AM
The biggest problem is that humans, inherently, have a great deal of difficulty in remaining truly impartial. Our subconcious can sometimes begin to skew one way without us realizing it.
this 3
8:21 AM
We should just put all the data into ChatGPT and be like "Hey, what does this data tell you?" 😂
8:21 AM
(Don't do this)
Avatar
Avatar
Shogun//Rogan
(Don't do this)
I hope more AI processing and generative analysis tools come out in digital forensics. I think it will be an amazing thing and will put majority of pressure on examiner to verify, validate, interpret instead of find.
8:31 AM
Indago Tech is working on stuff: https://indagotech.com/
Indago empowers analysts with an AI-powered reporting SaaS platform that streamlines workflows, unlocks hidden insights, and accelerates case resolution. Our intuitive platform delivers actionable intelligence, enhances analysts' productivity, and drives informed decision-making. From fraud investig
Avatar
Avatar
Shogun//Rogan
We should just put all the data into ChatGPT and be like "Hey, what does this data tell you?" 😂
Husky_M00s3 7/1/2024 8:37 AM
Welcome to the brave new world of Digital Forensics and Incident Response (DFIR), where Artificial Intelligence (AI) is the new sheriff in town, ready to speed things up like a caffeine-addicted programmer during a hackathon.
Avatar
Shogun//Rogan 7/1/2024 8:41 AM
I'll check it out. I eat this DFIR stuff up. (edited)
Avatar
Keep AI out of forensics IMO, Dumbs down the analysis and will result in many, many false interpretations.
Avatar
Avatar
Husky_M00s3
Yep, at least in the United States, there needs to be some standardization regarding Discovery and examinations. It would be nice if the tools facilitated these standards. Some labs /agencies/ departments give isolated pdf reports; others give the extractions. The defense cannot verify that something was left out of the report. If they do get the extraction, they probably don't have the tools to analyze it. No group is a monolith. Some agencies strive to give the other side all the information in a usable format. Others intentionally try to prohibit a thorough review by opposing counsel. There is so much wasted time, money, and energy with this process. I think the system would benefit from DF examiner licenses and public interest service program. If you are a licensed DF examiner, you should be put in rotation for the court. When your number is called you assist the court. If the court could bounce questions off a DF expert, it would make the whole process more efficient and fair. 🪙🪙
Interesting approach and kinda similar to a previous discussion of professionalize / license the job (like medial doctors, attorneys). This can begin by classifying us correctly, not just another IT people, a full-time career and not just another collateral duty.
Avatar
walktexranga 7/1/2024 6:07 PM
Hi all, not sure on best topic to post so I'll chuck it here. Does anyone have any experience with Legal Professional Privilege (LPP) and dealing with a PST that has LPP claims on some emails but not all. Ideally we receive the PST with LPP stuff excluded but that's easier said then done as you would likely be destroying metadata and not something DF tools usually do. They are thinking perhaps nuix with a load file or something but ideally prefer non nuix solution. I guess 1 option is provide image of pc excluding pst then pst on its own that has just been modified to manually delete emails with LPP claim e.g. Just do it with pst viewer/Outlook. Not very forensic though! Any other suggestions?
Avatar
ICCWS, Welcome to the Home Page of the International Conference on Cyber Warfare and Security - ICCWS
9:39 PM
CFP is open for international cyber warfare conference
Avatar
Avatar
walktexranga
Hi all, not sure on best topic to post so I'll chuck it here. Does anyone have any experience with Legal Professional Privilege (LPP) and dealing with a PST that has LPP claims on some emails but not all. Ideally we receive the PST with LPP stuff excluded but that's easier said then done as you would likely be destroying metadata and not something DF tools usually do. They are thinking perhaps nuix with a load file or something but ideally prefer non nuix solution. I guess 1 option is provide image of pc excluding pst then pst on its own that has just been modified to manually delete emails with LPP claim e.g. Just do it with pst viewer/Outlook. Not very forensic though! Any other suggestions?
We create a normal image file of an exhibit and then get an independent barrister in to tag LPP which we then exclude.
Avatar
Avatar
Rob
We create a normal image file of an exhibit and then get an independent barrister in to tag LPP which we then exclude.
walktexranga 7/2/2024 12:29 AM
Thx yeah that's what's happening just working out best way as we don't have ringtail/nuix/relativity etc. But think we found a work around.
Avatar
We've been using Axiom of late.
12:30 AM
Then can just create a portable case
12:30 AM
Without the LPP (edited)
12:31 AM
Could even use the tagging in Axiom to exclude files within X-Ways via hash and create another image
12:32 AM
To use full benefits of Axiom etc.
👍 1
Avatar
What's the largest CSV you've opened with Timeline Explorer? I'm trying to open a 17.2 GB file and it's spinning....
😱 2
7:26 AM
Task manager says it's not responding. Should I continue to wait or does that mean the process is indefinitely hung or something?
Avatar
Welp, it never loaded so I guess I'll looking into splitting up the CSV. 😩
Avatar
Avatar
Villano
Welp, it never loaded so I guess I'll looking into splitting up the CSV. 😩
I would either throw it in elastic or splunk at that point - or use python/powershell to parse exactly what I'm looking for if there is some logic I am looking to apply to every line - or grep of course if it's something basic
👍🏾 1
Avatar
I tried Timeline explorer only a bunch of times and it was quite slow, despite a very nice tool. For CSV analysis I usually suggest to use SQLite 😄
👍🏾 1
Avatar
hey in @Magnet Forensics Axiom is there any way to apply a filter that will show any artifacts / files that have NO timestamps associated with them?
1:22 PM
i have some carved content with timestamps and some without and i need to isolate anything that just has no datetime at all
👍 1
Avatar
Avatar
Lazza
I tried Timeline explorer only a bunch of times and it was quite slow, despite a very nice tool. For CSV analysis I usually suggest to use SQLite 😄
Husky_M00s3 7/3/2024 4:17 AM
@Villano and Harvard has a free SQLite class that demos some open source tools. CS50 Intro to SQLite. If you aren’t familiar, I highly recommend! Timeline explorer is awesome!
👍🏾 1
Avatar
Avatar
Husky_M00s3
@Villano and Harvard has a free SQLite class that demos some open source tools. CS50 Intro to SQLite. If you aren’t familiar, I highly recommend! Timeline explorer is awesome!
I've never thought about using SQLite for CSV. I'm familiar with CS50. I'll look for the SQLite video. Thanks!
Avatar
Avatar
Villano
I've never thought about using SQLite for CSV. I'm familiar with CS50. I'll look for the SQLite video. Thanks!
Husky_M00s3 7/3/2024 4:23 AM
https://youtube.com/playlist?list=PLhQjrBD2T382v1MBjNOhPu9SiJ1fsD4C0&si=D-4O2PCedFGB3cD- I think Lecture 2 or 3 mentions importing a csv. Lecture 0 and 1 cover queries.
This is CS50’s introduction to databases using a language called SQL. Learn how to create, read, update, and delete data with relational databases, which sto...
👍🏾 1
Avatar
Avatar
Husky_M00s3
https://youtube.com/playlist?list=PLhQjrBD2T382v1MBjNOhPu9SiJ1fsD4C0&si=D-4O2PCedFGB3cD- I think Lecture 2 or 3 mentions importing a csv. Lecture 0 and 1 cover queries.
Appreciate it!
Avatar
Hans Leißner 7/3/2024 8:18 AM
Hi fellow forensic experts. Do you have or have you recently had serious problems with zip files or extractions under Windows 11 (especially since the last updates) when they were opened with your forensic programs? In our office, taskbars disappear, laptops have a bootloop, zip files appear as corrupted, unexpected network errors and much more.
Avatar
Avatar
Hans Leißner
Hi fellow forensic experts. Do you have or have you recently had serious problems with zip files or extractions under Windows 11 (especially since the last updates) when they were opened with your forensic programs? In our office, taskbars disappear, laptops have a bootloop, zip files appear as corrupted, unexpected network errors and much more.
To address taskbar and bootloop issue maybe try a system file check and DISM cleanup. Both processes will try to cleanup any system level corruption and you will get a log report after. "sfc /scannow " (run in admin cmd) then also "DISM /Online /Cleanup-Image /RestoreHealth". Just a suggestion to start since you are describing a slew of isssues that can be realted to many different things. (edited)
🫡 1
🥇 1
Avatar
Avatar
theshark
To address taskbar and bootloop issue maybe try a system file check and DISM cleanup. Both processes will try to cleanup any system level corruption and you will get a log report after. "sfc /scannow " (run in admin cmd) then also "DISM /Online /Cleanup-Image /RestoreHealth". Just a suggestion to start since you are describing a slew of isssues that can be realted to many different things. (edited)
Hans Leißner 7/3/2024 8:33 AM
All right! Thank you for the tips. I'll test that straight away
Salute 1
Avatar
Avatar
Villano
What's the largest CSV you've opened with Timeline Explorer? I'm trying to open a 17.2 GB file and it's spinning....
HuntForward 7/4/2024 6:05 AM
Something else you can try to reduce the size is removing columns that are not needed, if applicable.
Avatar
Avatar
HuntForward
Something else you can try to reduce the size is removing columns that are not needed, if applicable.
How would I do that without opening the file?
Avatar
Avatar
Villano
How would I do that without opening the file?
Digitalferret 7/4/2024 8:13 AM
windows or linux?
Avatar
Avatar
Digitalferret
windows or linux?
Windows
Avatar
Digitalferret 7/4/2024 8:19 AM
:/
😮 1
Avatar
Avatar
Villano
Windows
Digitalferret 7/4/2024 8:21 AM
would say command line and Powershell. something at which i have zero experience with. Would it be Linux then go for sed or awk
👍🏾 1
8:22 AM
might be of use if you can give a clue as to the file layout, say a first line / headers, if there are any
8:23 AM
from Stackoverflow something like Get-Content -Head N file.txt
Avatar
Avatar
Digitalferret
might be of use if you can give a clue as to the file layout, say a first line / headers, if there are any
Oh it's just an export from Cortex XDR telemetry. So standard process related fields if you're familiar with the dataset. I'm not at my work computer at the moment to provide the headers. But in any case, I understand the intent of the suggestion now. I could figure out which columns were really interesting and programmatically extract them from the file I guess. Could also just rerun the query with less fields too. But the SQLite approach someone suggested above sounds intriguing so I plan to try that out and if for any other reason the learnings.
👍 2
Avatar
Avatar
Villano
Oh it's just an export from Cortex XDR telemetry. So standard process related fields if you're familiar with the dataset. I'm not at my work computer at the moment to provide the headers. But in any case, I understand the intent of the suggestion now. I could figure out which columns were really interesting and programmatically extract them from the file I guess. Could also just rerun the query with less fields too. But the SQLite approach someone suggested above sounds intriguing so I plan to try that out and if for any other reason the learnings.
Digitalferret 7/4/2024 8:53 AM
got you, thanks. to be fair, there's pretty much always a bonus to be had by reducing the amount of work, if some aspects don't need attention. similarly file carving with data recovery software; remove any options you don't explicitly need. do feed back for others, if you get a faster solution, code or sql stuff, pretty sure there's interest value. best of luck.
👍🏾 1
Avatar
StephenWolf 7/5/2024 11:32 AM
Has anyone used this tool? https://github.com/lxndrblz/forensicsim I also tried using the dataset given in the GitHub but no luck
A forensic open-source parser module for Autopsy that allows extracting the messages, comments, posts, contacts, calendar entries and reactions from a Microsoft Teams IndexedDB LevelDB database. - ...
Avatar
Avatar
StephenWolf
Has anyone used this tool? https://github.com/lxndrblz/forensicsim I also tried using the dataset given in the GitHub but no luck
What version of the tool are you using and what’s the Teams version.
Avatar
Avatar
StephenWolf
Has anyone used this tool? https://github.com/lxndrblz/forensicsim I also tried using the dataset given in the GitHub but no luck
going off this question, does anyone have a recommendation for a tool to parse MS Teams artifacts for Windows? Or a LevelDB Parser (edited)
Avatar
Avatar
Beercow
What version of the tool are you using and what’s the Teams version.
StephenWolf 7/5/2024 3:56 PM
Teams Version: 24165.1410.2974.6689. Client version is 49/24061318406 Tool Version: v0.8.4
Avatar
Avatar
StephenWolf
Teams Version: 24165.1410.2974.6689. Client version is 49/24061318406 Tool Version: v0.8.4
Try v0.8.2 I think there is an issue with the recent update.
Avatar
Avatar
Cash
going off this question, does anyone have a recommendation for a tool to parse MS Teams artifacts for Windows? Or a LevelDB Parser (edited)
Avatar
Avatar
Cash
going off this question, does anyone have a recommendation for a tool to parse MS Teams artifacts for Windows? Or a LevelDB Parser (edited)
Alex (Foxton Forensics) 7/6/2024 1:12 AM
We have some basic support for accessing Teams data in Browser History Examiner, can be used for free in the trial version - https://www.foxtonforensics.com/browser-history-examiner/docs/microsoft-teams
Avatar
Joe Schmoe 7/6/2024 8:04 AM
Anyone have suggestions for a place to post some iOS research? I’m not interested in starting a new blog. I haven’t seen anything similar so I thought it might be helpful to others.
Avatar
Avatar
Joe Schmoe
Anyone have suggestions for a place to post some iOS research? I’m not interested in starting a new blog. I haven’t seen anything similar so I thought it might be helpful to others.
https://medium.com/ (not free) and https://aboutdfir.com/ (may take article submission)
Medium is an open platform where readers find dynamic thinking, and where expert and undiscovered voices can share their writing on any topic.
Avatar
Avatar
chauan
https://medium.com/ (not free) and https://aboutdfir.com/ (may take article submission)
Joe Schmoe 7/6/2024 8:45 AM
Thank you. I looked at aboutdfir. I saw a form to submit research ideas but not completed research. I’m not really familiar with Medium but I’ll take a look.
Avatar
Avatar
Beercow
Try v0.8.2 I think there is an issue with the recent update.
StephenWolf 7/6/2024 12:30 PM
Thanks, v8.0.2 worked
👍 1
Avatar
Avatar
Joe Schmoe
Anyone have suggestions for a place to post some iOS research? I’m not interested in starting a new blog. I haven’t seen anything similar so I thought it might be helpful to others.
Ross Donnelly 7/6/2024 2:25 PM
DFIR Review responds to the need for a focal point for up-to-date community-reviewed applied research and testing in digital forensics and incident response. DFIR Review concentrates on targeted studies of specific devices, digital traces, analysis methods, and criminal activity.
Avatar
Joe Schmoe 7/6/2024 2:27 PM
Thank you. That was the first one I thought of but it looks like they prefer it be posted somewhere else first.
Avatar
Avatar
Joe Schmoe
Thank you. That was the first one I thought of but it looks like they prefer it be posted somewhere else first.
Ross Donnelly 7/6/2024 2:28 PM
Not that I'm aware of - I had some novel research posted there
Avatar
Avatar
Joe Schmoe
Thank you. I looked at aboutdfir. I saw a form to submit research ideas but not completed research. I’m not really familiar with Medium but I’ll take a look.
randomaccess 7/6/2024 2:53 PM
@Andrew Rathbun can hook you up
Avatar
Avatar
randomaccess
@Andrew Rathbun can hook you up
Andrew Rathbun 7/6/2024 3:15 PM
Sure. @Joe Schmoe either DM me or submit the research ideas form as completed research. Either works.
Avatar
Avatar
Andrew Rathbun
Sure. @Joe Schmoe either DM me or submit the research ideas form as completed research. Either works.
Joe Schmoe 7/6/2024 3:21 PM
Will do. I appreciate it.
Avatar
DeeFIR 🇦🇺 7/6/2024 6:43 PM
Is anyone from @Magnet Forensics around for a quick license query?
Avatar
hiddenbook46 7/6/2024 10:57 PM
Any advice for a homelab? I d like build something and get my hand dirty (edited)
Avatar
Avatar
hiddenbook46
Any advice for a homelab? I d like build something and get my hand dirty (edited)
DeeFIR 🇦🇺 7/7/2024 12:11 AM
Has been answered a few times here. What are you trying to achieve? Budget? Learning objectives? Platform/s?
Avatar
Avatar
hiddenbook46
Any advice for a homelab? I d like build something and get my hand dirty (edited)
Digitalferret 7/7/2024 4:43 AM
start by actually getting something to investigate and then looking for free tools. many thousands of pounds have been spent by "enthusiasts" buying what they think they may need, before actually finding out by practical application.
👍 1
4:44 AM
but, as per DFIR, check history in here ^^^
4:46 AM
buying gear, say a PC3000 for drive repair, will be useless if you don't grab training for what is more a learning vertical wall, rather than a learning curve. Pretty much same for all high end s/w. gear: you can get away with a 2nd hand PC, a few connectors, FOSS software and a bunch of dodgy hard drives from ebay/craigs
Avatar
does anybody have Knowledge about Kodex here?
Avatar
Avatar
Digitalferret
start by actually getting something to investigate and then looking for free tools. many thousands of pounds have been spent by "enthusiasts" buying what they think they may need, before actually finding out by practical application.
hiddenbook46 7/7/2024 6:50 AM
I have the SANS workstation will all free tools for Forensic. Most of them at least and a old HP PC that I don't use but can be useful (edited)
Avatar
#afterlyfe 7/7/2024 8:07 AM
Hello
Avatar
Avatar
hiddenbook46
I have the SANS workstation will all free tools for Forensic. Most of them at least and a old HP PC that I don't use but can be useful (edited)
Digitalferret 7/7/2024 9:03 AM
grand, so as per DeeFIR, what is it you think constitutes "a lab" ? (edited)
Avatar
Avatar
Digitalferret
grand, so as per DeeFIR, what is it you think constitutes "a lab" ? (edited)
hiddenbook46 7/7/2024 12:35 PM
Something that can be useful for a job in case. I mean showing that im able to do such thing. I have no experience. I'm retaking my GCFE too. So I could work on the data too after
12:36 PM
Some project an idea
Avatar
Avatar
hiddenbook46
Some project an idea
DeeFIR 🇦🇺 7/7/2024 2:27 PM
So, are you just trying to show your ability to conduct some kind of analysis? What about a Linux and Windows VM in VMware/virtualbox and do your analysis inside those using simulation/test data?
Avatar
Avatar
hiddenbook46
Any advice for a homelab? I d like build something and get my hand dirty (edited)
facelessg00n 7/8/2024 4:16 AM
Soldering iron, some magnet wire and a pile of fitbits from ebay. Depends what you are into
Avatar
Avatar
facelessg00n
Soldering iron, some magnet wire and a pile of fitbits from ebay. Depends what you are into
DeeFIR 🇦🇺 7/8/2024 4:44 AM
And a cup of cold brew?
😂 1
Avatar
Avatar
DeeFIR 🇦🇺
And a cup of cold brew?
facelessg00n 7/8/2024 4:49 AM
You know my feelings on this topic.
❤️ 1
🥶 1
☕ 3
Avatar
Digitalferret 7/8/2024 8:39 AM
for difficult jobs there's always the Reeperbahn Equalizer.
SPOILER
Image attachment
💪 2
Avatar
Avatar
MDCDF
Anyone recommend a case management software? We use Magnet Atlas but it seems like every few weeks they change something that breaks how we use it. Open source would be nice too
equalexpert 7/8/2024 1:31 PM
Did you ever find an open source solution? Im in the middle of writing a web based CMS but obviously will be very specific to our office needs but open to seeing what is out there either for ideas or to save me a job haha
Avatar
Avatar
equalexpert
Did you ever find an open source solution? Im in the middle of writing a web based CMS but obviously will be very specific to our office needs but open to seeing what is out there either for ideas or to save me a job haha
I have not. It seems like alot of the open source ones are now dead. The ones that have a free teir limit it so much there is no point. I am thinking of attempting to program my own little thing thinking of doing a simple layout soon
Avatar
Anyone into Android Forensics, I need help on extracting GBWhatsapp and WhatsApp Business messages seems like Belkasoft isn't able to perform apk downgrade on these
Avatar
@OpenText anyone available for some questions regarding Tx1 please?
Avatar
Avatar
CyberCroc
Anyone into Android Forensics, I need help on extracting GBWhatsapp and WhatsApp Business messages seems like Belkasoft isn't able to perform apk downgrade on these
Avatar
Avatar
MDCDF
I have not. It seems like alot of the open source ones are now dead. The ones that have a free teir limit it so much there is no point. I am thinking of attempting to program my own little thing thinking of doing a simple layout soon
equalexpert 7/9/2024 3:50 AM
Kind of the same conclusion i got to. Guess ill keep on with my own little project then. cheers
Avatar
Avatar
equalexpert
Kind of the same conclusion i got to. Guess ill keep on with my own little project then. cheers
facelessg00n 7/9/2024 5:56 AM
Avatar
Those who do blueteaming/security admin/security engineering, what in your personal opinion are 3 external attack surface management tools you would reccomend to PoC for a SMB? We currently use SoCRadar but it is a spam engine and not that great - it produces alot of FP's.
Avatar
Avatar
CyberCroc
Anyone into Android Forensics, I need help on extracting GBWhatsapp and WhatsApp Business messages seems like Belkasoft isn't able to perform apk downgrade on these
Why?
7:56 AM
I might be able to help.
Avatar
Has anyone used https://cybersixgill.com/products/attack-surface-management/ ? How's it compare to socradar or other easm tools?
Cybersixgill's cyber threat intelligence provides businesses with continuous monitoring, prioritized real-time alerts and deep and dark web threat intelligence.
Avatar
Can Caine be used for an android tablet, Lenovo x104F and version 8.1.0?
Avatar
to dump it? Not really
Avatar
Avatar
Arcain
to dump it? Not really
Ah that’s a shame, thank you 👍
Avatar
you could possibly dump it using some generic qualcomm tools if you can find a matching firehose loader, but data would be encrypted anyways
Avatar
Avatar
Arcain
you could possibly dump it using some generic qualcomm tools if you can find a matching firehose loader, but data would be encrypted anyways
Ah this was for one of my colleagues but I’ll forward that on too thank you
Avatar
Avatar
Lazza
Thank you.Let me try it
Avatar
Avatar
Zesh
Why?
It's a case im working on but the phone should not be rooted
Avatar
Is there any useful data in/about Samsung Galaxy rings?
Avatar
I thought I saw a while back someone maintained keyword search lists somewhere like Github. I'm looking for a topical list for suicide (and other topics down the road), does anyone have a pre-built they might share or collaborate on?
Avatar
Avatar
CyberCroc
It's a case im working on but the phone should not be rooted
Oh Alright
Avatar
Weird question
3:18 AM
Does anyone know if there tool out there that checks if have domain has been rotated ?
Avatar
Avatar
$CozyBear
Does anyone know if there tool out there that checks if have domain has been rotated ?
Digitalferret 7/11/2024 3:31 AM
help a dimwit out here. what's a rotating domain?
Avatar
Digital Dude 7/11/2024 4:07 AM
Anyone have any articles on Android 12 OS? Just looking for info on how it handles multiple users or if it even can. I’m dealing with a Moto g pure device. (edited)
Avatar
Avatar
$CozyBear
Weird question
Do you perhaps mean that the domain name registration has changed ownership? If so, its case dependant. Whois records are mostly redacted these days and Cloudflare obfuscates the actual IP making it difficult to tell sometimes.
Avatar
Whoxy has some free domain history, otherwise you can use domain tools but it requires selling organs to pay for it
Avatar
if it's something like verifying a domain associated with a malware sample/phishing page with activity in your environment to see if it's still alive, you can compare historical DNS responses (assuming you centrally log DNS) to current DNS. There are vendors who will provide their known historical data, like securitytrails or infoblox for various fees (edited)
5:44 AM
but that all ignores safety checks a phishing kit or malware c2 might employ to make it seem like they've rotated their infrastructure to alternate domains/ips. things like user-agent checking, or each phishing link having a unique key so they only serve it once and subsequent visits make it appear down
Avatar
Need some expertise on Email collection using FEC and Magnet AXIOM. Dealing with EML's in a scenario where I want to export individual messages in a chain. I may be using a filter wrong but it seems that at the source they are collected this way with no real way to sperate out individual messages. Thoughts?
10:03 AM
For example 000454.eml contains the entire email chain. and I want a way to export just a single sent email from that chain within magnet axiom. (edited)
Avatar
Avatar
theshark
For example 000454.eml contains the entire email chain. and I want a way to export just a single sent email from that chain within magnet axiom. (edited)
Digitalferret 7/11/2024 10:05 AM
@Magnet Forensics ^
8:47 PM
Is this domain a phishing domain?
8:47 PM
Can't find much online
Avatar
https://urlscan.io/result/d2287841-8282-4cdf-a7f3-8e3715484047/ Looks legit but it may depend. What is the context? What's the full URL? Sometimes bad guys compromise a legit website and put their content just somewhere without being noticed.
urlscan.io - Website scanner for suspicious and malicious URLs
Avatar
Digitalferret 7/12/2024 1:18 AM
what's ringing alarm bells? Site has history back to 2001 albeit a totally different company. Looks to have been re-acquired ~10yrs back as the Bike co. With Tommy, could have been hijacked, if.
Avatar
MrMacca (Allan Mc) 7/12/2024 2:55 AM
I'm seeking advice from anyone experienced with PSD files from Photoshop. We extract forensic images from computers and mobile phones and process them using tools like Axiom and Cellebrite, then pass the results to our investigators without deeply analysing the files ourselves. Currently, forensic tools only show the final composite image, meaning investigators might miss critical information hidden in the layers. This oversight could lead to missed evidence, including indecent images or copyright infringements. During testing, I discovered that creating PSD files with multiple layers—some hidden or masked—can conceal images and text. Forensic tools like Axiom, X-Ways, and Autopsy do not extract these hidden or masked layers, whereas a Python script I developed outside these applications can. Is this a recognized forensic issue? Why aren't forensic tools extracting and presenting all layer content? Could there be an option in these tools that I’ve overlooked which addresses this problem? In a recent case involving fake certificates, extracting each layer unearthed a vast amount of additional evidence. Many PSD files contained manipulated certificates, with previous fake versions hidden within the layers. For example, a PSD for a Master's degree for Bob Mortimer also contained certificates for Vic Reeves, Snipers Dream, Hayden Hackney, and others, allowing us to find further evidence on those who ordered the fake certificates. Am I worrying about nothing?
🔥 2
Avatar
Avatar
Digitalferret
what's ringing alarm bells? Site has history back to 2001 albeit a totally different company. Looks to have been re-acquired ~10yrs back as the Bike co. With Tommy, could have been hijacked, if.
It's being picked up as phishing by community members and also some vendors on virustotal
4:16 AM
Might use tria.ge
4:17 AM
To see what it is dropping if anything
4:17 AM
Or network comms etc
4:17 AM
And yeah 2005 it was sregistered
4:17 AM
So that confuses me
4:18 AM
It seems it might be either compromised and used as a c2
4:18 AM
Or a red teams phishing domain
4:19 AM
Alientvault otx wasn't much help
Avatar
Avatar
MrMacca (Allan Mc)
I'm seeking advice from anyone experienced with PSD files from Photoshop. We extract forensic images from computers and mobile phones and process them using tools like Axiom and Cellebrite, then pass the results to our investigators without deeply analysing the files ourselves. Currently, forensic tools only show the final composite image, meaning investigators might miss critical information hidden in the layers. This oversight could lead to missed evidence, including indecent images or copyright infringements. During testing, I discovered that creating PSD files with multiple layers—some hidden or masked—can conceal images and text. Forensic tools like Axiom, X-Ways, and Autopsy do not extract these hidden or masked layers, whereas a Python script I developed outside these applications can. Is this a recognized forensic issue? Why aren't forensic tools extracting and presenting all layer content? Could there be an option in these tools that I’ve overlooked which addresses this problem? In a recent case involving fake certificates, extracting each layer unearthed a vast amount of additional evidence. Many PSD files contained manipulated certificates, with previous fake versions hidden within the layers. For example, a PSD for a Master's degree for Bob Mortimer also contained certificates for Vic Reeves, Snipers Dream, Hayden Hackney, and others, allowing us to find further evidence on those who ordered the fake certificates. Am I worrying about nothing?
Digitalferret 7/12/2024 4:20 AM
if you haven't already, given your python, maybe also check https://releases.aspose.com/psd/python-net/
Avatar
We had some emaols that our filter blocked and I blocked the domain anyways
4:20 AM
At perim fw level and m365 tenant level
4:22 AM
Hmm maybe a phishing simulation domain
Avatar
I have a FFS from a iPhone with iOS17 but cant find unified logs in /private/var/db/diagnostics/. I find /private/var/db but not the diagnostics folder. Someone know why?
Avatar
Avatar
zembera
It's being picked up as phishing by community members and also some vendors on virustotal
Digitalferret 7/12/2024 4:26 AM
you could always check the history and a deeper look at the content on wayback - for changes as an example. - use the tab options [Calendar] thro [URLs]
Avatar
Yeah payback machine was my next go to
4:27 AM
Wayback
4:27 AM
Thanks will check it out
4:28 AM
What's everyone's thoughts on https://tria.ge/
Explore Triage's Malware Analysis Sandbox to dissect your malware samples. Access malware trends, and a customizable environment for in-depth analysis and classification.
4:29 AM
I find it better than any.run and Joe's sandbox and others
4:30 AM
Also an interesting tool I came across is https://bugprove.com/
Ensure the secure development of your IoT products with BugProve's SaaS-based offering. We offer automated firmware analysis to simplify cybersecurity.
Avatar
Hi all, I posted in the mobile extraction page but I don’t know if that was the right area. But does anyone know of any other kiosk tools other than Cellebrite and MSAB KTE?
Avatar
Avatar
obi95
Hi all, I posted in the mobile extraction page but I don’t know if that was the right area. But does anyone know of any other kiosk tools other than Cellebrite and MSAB KTE?
Greygrayshift, although they are now acquired by https://www.magnetforensics.com/
Unlock the truth. Protect the innocent. We provide organizations with innovative tools to investigate cyberattacks and digital crimes.
5:13 AM
Grayshift*
5:13 AM
Graykey
5:13 AM
Also can use kanji defused cables
5:15 AM
Collect the most comprehensive data extraction from iOS and leading Android devices while letting you get only the evidence you need.
5:16 AM
"We’ve Moved! For information on Magnet GRAYKEY, Magnet VERAKEY, and Magnet ARTIFACT IQ, please visit MagnetForensics.com"
5:17 AM
I wish it wasn't acquired by this comoany though not sure if it's made the product better but grayshift was good
Avatar
Avatar
Digitalferret
if you haven't already, given your python, maybe also check https://releases.aspose.com/psd/python-net/
MrMacca (Allan Mc) 7/12/2024 5:19 AM
I'll check this out too. Ideally i'd like it all to be in a forensic application so wanted to see what the reason is for not having this feature in the ones I have tested. Going to do more testing of the applications
Avatar
Maybe others have better understanding of the products they offer.
5:19 AM
But grayshift was great, similar to cellebrite
5:20 AM
Also has anyone used eshard's esreverse? Is it worth looking into for malware analysis/RE and fuzzing, they seem to focus on hardware techniques like newar fault injection attacks/side channel etc. (edited)
5:20 AM
Discover esReverse, the ultimate platform for binary analysis. Enhance your expertise in penetration testing, vulnerability research, and code validation.
5:21 AM
All-in-one collaborative platform for advanced software binary analyses.
5:23 AM
Newae
Avatar
my money is that their sendgrid account was compromised and used to send phishing messages see historical urlscan: https://urlscan.io/result/a7e8a400-431e-49d9-a37b-1d6494519785/ the submitted url domain url2530.tvsmotor.com points to sendgrid the effective url appeared to be hosting a docusign lure phish, and now shows an account suspension message https://ivpavmkpelheiot.lehoihoadao[.]com/jdhgcreshwa/
urlscan.io - Website scanner for suspicious and malicious URLs
💯 3
Avatar
Avatar
MrMacca (Allan Mc)
I'll check this out too. Ideally i'd like it all to be in a forensic application so wanted to see what the reason is for not having this feature in the ones I have tested. Going to do more testing of the applications
Digitalferret 7/12/2024 5:43 AM
Ideally i'd like it all to be in a forensic application absolutely. seen previous discussions with court submission - proprietary v home brew, but given no other options it could be the go to until. Well played though, either way.
Avatar
Avatar
rayeh
my money is that their sendgrid account was compromised and used to send phishing messages see historical urlscan: https://urlscan.io/result/a7e8a400-431e-49d9-a37b-1d6494519785/ the submitted url domain url2530.tvsmotor.com points to sendgrid the effective url appeared to be hosting a docusign lure phish, and now shows an account suspension message https://ivpavmkpelheiot.lehoihoadao[.]com/jdhgcreshwa/
Avatar
Avatar
Digitalferret
you could always check the history and a deeper look at the content on wayback - for changes as an example. - use the tab options [Calendar] thro [URLs]
What might be the case here is that the site has been compromised and for example the threat actors are sending out spam but leaving the site intact. If I was curious I would something like dirbuster against the site incase whoever got in added additional pages which not be in the sitemap.
👍🏻 1
Avatar
Avatar
KohleR
What might be the case here is that the site has been compromised and for example the threat actors are sending out spam but leaving the site intact. If I was curious I would something like dirbuster against the site incase whoever got in added additional pages which not be in the sitemap.
Used as a middleman to cover the trails. Leaving the site/pages intact so the owner is not aware and will not clean the system.
💯 1
Avatar
Avatar
Digitalferret
help a dimwit out here. what's a rotating domain?
Sorry just saw this
7:32 AM
Rotating domains is when threat actors move one domain to a another by operating multiple domains coming from a singular IP. These multiple domains hidden in an iframe element to reserve content across multiple domains till have this complex network. From what I've seen the code gets obfuscated to obstruct others looking into the code. If a malicious site gets taken down, most likely they have other domains running in the background they switch too making sure their service remains @Digitalferret (edited)
👍🏻 2
Avatar
Avatar
MrMacca (Allan Mc)
I'll check this out too. Ideally i'd like it all to be in a forensic application so wanted to see what the reason is for not having this feature in the ones I have tested. Going to do more testing of the applications
At the end of the day, no tool will provide everything and no tool will do an analysis for us. If psd layers are important in a specific case, of course the analyst will check them out, makes sense. It also makes sense to develop specific scripts or tools for special circumstances, I'd go even further and say that this is a very good thing, not a bad one
Avatar
Avatar
KohleR
Do you perhaps mean that the domain name registration has changed ownership? If so, its case dependant. Whois records are mostly redacted these days and Cloudflare obfuscates the actual IP making it difficult to tell sometimes.
I figured domainstools already does this for you xD already checks if the domain names has been changed in the past year. Just wanted a network graph of the changes. (edited)
Avatar
Does anyone know a way to turn off a modern samesung device which is in BFU mode without the password. I know we can put it into recovery mode and do it this way but we don't want it to boot back up onto recovery mode afterwards. Thanks all
Avatar
Digitalferret 7/12/2024 8:33 AM
^^ yep, if folks can abuse a site but the owners are unaware, it's a big win. historically i seem to remember illicit porn servers doi ng the same thing. you could only get the pages from their links, otherwise they were unfindable on the site itself
❤️ 1
Avatar
Avatar
Digitalferret
^^ yep, if folks can abuse a site but the owners are unaware, it's a big win. historically i seem to remember illicit porn servers doi ng the same thing. you could only get the pages from their links, otherwise they were unfindable on the site itself
Yep, most hosting providers don't do jack all.
9:13 AM
Quite a common theme in pirate sites
Avatar
Avatar
Digitalferret
^^ yep, if folks can abuse a site but the owners are unaware, it's a big win. historically i seem to remember illicit porn servers doi ng the same thing. you could only get the pages from their links, otherwise they were unfindable on the site itself
Sites like these tend to block debug tools to obstruct DF people from investigating into these sites. Most likely most these domains that distribute child porn, or counterfeit products tend to obfuscate their webpage source code. You can MITM to intercept API requests. (edited)
👍🏻 1
Avatar
Laura S build2.0 7/12/2024 10:20 AM
If a domain/IP makes malicious changes and a company has an email filter with special firewall rules set to block by default, legitimate emails from associated email addresses of the domain sometimes get dropped. Sometimes super caution can be your downfall if the company remediate BEC/malicious senders and start asking why their emails aren't getting through
Avatar
Question I have domain A let's say rootme.com and look into the source code of rootme.com within the href element it's points to the domain pwdown.info but the Referer header is coming rootme.com. Looking in the request header that says authority:pwdown.info What does this authority:pwdown.info part mean ? (edited)
Avatar
Avatar
$CozyBear
Question I have domain A let's say rootme.com and look into the source code of rootme.com within the href element it's points to the domain pwdown.info but the Referer header is coming rootme.com. Looking in the request header that says authority:pwdown.info What does this authority:pwdown.info part mean ? (edited)
It's not "Authorization" but "Authority". It's basically the host where the resource you are trying to GET is located. https://datatracker.ietf.org/doc/html/rfc3986#section-3.2 href is the HTML tag to specify links. It's not related to the referer header which is the address from which a resource is being requested. So, if you access the rootme.com site, it will load the pwdown.info/123123123/Aa.mp3 file. Because the rootme.com site requested that file, you'll find rootme.com in the Referer header. The requested mp3 file is in the pwdon.info domain, so that's why you find that domain in the Authority header.
A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI synta...
Avatar
Avatar
dfmiket
Does anyone know a way to turn off a modern samesung device which is in BFU mode without the password. I know we can put it into recovery mode and do it this way but we don't want it to boot back up onto recovery mode afterwards. Thanks all
Connect it to a power source and then hold the power/side and volume down button till the screen goes blank and you should see the charging symbol When you do the above button combo it should bring up the screen with options to power off / restart etc however keep hold of the button combos and it should turn off
Avatar
digital Bowles 7/12/2024 3:18 PM
I has anyone throught about starting a channel for those of us who don't use social media platforms and have user questions. .....like if a person (suspect) contacts a victim through Facebook market place. Is that the same messenger as normal messenger? Not an old guy yet, just not a social guy.
💯 1
Avatar
Avatar
digital Bowles
I has anyone throught about starting a channel for those of us who don't use social media platforms and have user questions. .....like if a person (suspect) contacts a victim through Facebook market place. Is that the same messenger as normal messenger? Not an old guy yet, just not a social guy.
Digitalferret 7/12/2024 3:59 PM
with you on that, I'm not sheeple either 🙂
Avatar
Avatar
HIK213
Connect it to a power source and then hold the power/side and volume down button till the screen goes blank and you should see the charging symbol When you do the above button combo it should bring up the screen with options to power off / restart etc however keep hold of the button combos and it should turn off
This on my S23 still just restarted the device??
Avatar
Avatar
digital Bowles
I has anyone throught about starting a channel for those of us who don't use social media platforms and have user questions. .....like if a person (suspect) contacts a victim through Facebook market place. Is that the same messenger as normal messenger? Not an old guy yet, just not a social guy.
I like that idea. The questions usually are not that hard to test, but it does require some sock puppet accounts and time.
4:58 PM
And not everyone has access to test devices.
Avatar
Avatar
FullTang
I like that idea. The questions usually are not that hard to test, but it does require some sock puppet accounts and time.
digital Bowles 7/12/2024 5:14 PM
I have a few devices and accounts. Just don't have the social interest to keep them up.
Avatar
Avatar
dfmiket
Does anyone know a way to turn off a modern samesung device which is in BFU mode without the password. I know we can put it into recovery mode and do it this way but we don't want it to boot back up onto recovery mode afterwards. Thanks all
_blackbeardactual_ 7/12/2024 5:18 PM
How about going to safe mode? This will enable flight mode. You can enable Safe Mode from the Power menu: Power Menu: Press and hold the Side button and the Volume Down button simultaneously. Safe Mode Icon: Touch and hold the Power Off icon until the Safe Mode icon appears. Tap it to restart in Safe Mode.
Avatar
Avatar
rayeh
my money is that their sendgrid account was compromised and used to send phishing messages see historical urlscan: https://urlscan.io/result/a7e8a400-431e-49d9-a37b-1d6494519785/ the submitted url domain url2530.tvsmotor.com points to sendgrid the effective url appeared to be hosting a docusign lure phish, and now shows an account suspension message https://ivpavmkpelheiot.lehoihoadao[.]com/jdhgcreshwa/
Awesome analysis and thanks for helping me figure it out makes sense now! I anyways did block the tvsmotor[.]com domain at the perimeter firewall and also our m365 tenant block lost for emails and domains/URLs and added to our indicator list to block.
👍 1
10:48 PM
Also checked tria.ge
10:48 PM
To see what files it dropped
10:48 PM
Or any comms
Avatar
Avatar
_blackbeardactual_
How about going to safe mode? This will enable flight mode. You can enable Safe Mode from the Power menu: Power Menu: Press and hold the Side button and the Volume Down button simultaneously. Safe Mode Icon: Touch and hold the Power Off icon until the Safe Mode icon appears. Tap it to restart in Safe Mode.
To go into safe mode it also requires me to put in the pass code. Who'd have thought it'd be this hard to turn off a phone 😂
Avatar
_blackbeardactual_ 7/13/2024 2:17 AM
If you press and hold the Volume Down and Power buttons simultaneously for about 10-15+ seconds until the phone vibrates, does that that reboot it? If so, hold volume down when Samsung logo appears until safe mode boots.
Avatar
Avatar
_blackbeardactual_
If you press and hold the Volume Down and Power buttons simultaneously for about 10-15+ seconds until the phone vibrates, does that that reboot it? If so, hold volume down when Samsung logo appears until safe mode boots.
So I booted into safe mode but it still asks for me for the pascode to turn the device off
Avatar
Force restart - recovery mode - power off
Avatar
Avatar
Crox
Force restart - recovery mode - power off
We don't want it to boot back into recovery when the user next powers it on
Avatar
Avatar
dfmiket
We don't want it to boot back into recovery when the user next powers it on
Okay, then it's more difficult. With some devices it has worked like this, force restart as soon as it is off, hold the volume up. It worked with some devices (edited)
Avatar
Avatar
$CozyBear
Question I have domain A let's say rootme.com and look into the source code of rootme.com within the href element it's points to the domain pwdown.info but the Referer header is coming rootme.com. Looking in the request header that says authority:pwdown.info What does this authority:pwdown.info part mean ? (edited)
What you are looking at is likely a CDN for music served from Pagalworld in India.
🤣 1
Avatar
Shogun//Rogan 7/14/2024 9:02 AM
Any US LEO able to help with model language to put into a policy regarding mobile extractions? Trying to put something together but looking for some guidance. DM's appreciated.
Avatar
Avatar
Shogun//Rogan
Any US LEO able to help with model language to put into a policy regarding mobile extractions? Trying to put something together but looking for some guidance. DM's appreciated.
Digitalferret 7/14/2024 9:14 AM
might be worth an echo in #policies-and-procedures for folks that have eyes-on with that sort of stuff. feel free to Xpost.
Avatar
Avatar
Digitalferret
might be worth an echo in #policies-and-procedures for folks that have eyes-on with that sort of stuff. feel free to Xpost.
Shogun//Rogan 7/14/2024 10:15 AM
Appreciate it, mate.
Avatar
What are Greta digital forensic books to purchase???
Avatar
#off-duty for anyone that is trying to discuss the trump shooter phone situation.
Avatar
Hey @Law Enforcement [UK], anyone using Microsoft 365 tools in your DFU to help streamline processes? What are you using it for and for those with accreditation, how are you controlling that content in your QMS? Feel free to DM! (edited)
Avatar
Avatar
ApC
Hey @Law Enforcement [UK], anyone using Microsoft 365 tools in your DFU to help streamline processes? What are you using it for and for those with accreditation, how are you controlling that content in your QMS? Feel free to DM! (edited)
No, but I'd love to hear if anyone has done DPN form approvals using MS365.
Avatar
Avatar
mikeo
No, but I'd love to hear if anyone has done DPN form approvals using MS365.
Count me in on that one!
Avatar
Avatar
ApC
Hey @Law Enforcement [UK], anyone using Microsoft 365 tools in your DFU to help streamline processes? What are you using it for and for those with accreditation, how are you controlling that content in your QMS? Feel free to DM! (edited)
My team have used it quite a lot, we have a shared channel setup for our ISO QMS, we have tasking forms through 365…. I can try and answer some questions, but im far from that knowledgeable - i set up a few things through trial and error and youtube 😂👌
1:09 PM
Not ISO accredited yet…… its all up in the air for my department though
Avatar
Interesting! We’ve got spreadsheet upon spreadsheets to record checks and inventories etc. They all have unique names with the templates held in our QMS. It would be interesting to see how you intend to name and show them how its quality controlled with versions etc
Avatar
Yeah, theres spreadsheets coming out of our behinds. Everywhere!!! We use an app for our inventory , although we dont have as much as a full DFU unit, so it was easy to create asset tags and stuff. We basically have multiple copies of documents all at different stages with inspector signature after each major amendment, and im the only one who uploads the sops / documents to the qms - but our technical lead tells me what to do and emails are all saved on the qms too.
1:15 PM
Its quite messy i think, but it works…. I think. I was told - we need to set up a qms and have these things in place - but we are not going to help! (edited)
1:17 PM
I can find out the app tomorrow, if i forget please pester me!!!
Avatar
Avatar
Boiga
I can find out the app tomorrow, if i forget please pester me!!!
Thank you! I will definitely be pestering!
Avatar
Avatar
ApC
Thank you! I will definitely be pestering!
Perfect! And no worries at all! 🙂
Avatar
I am preparing a case for trial. It is a murder case. The suspect's device has an iOS locations ping in the area of the scene. The ping has a timestamp and an end time. The timeframe is in the window the murder occurred. How can I properly articulate how the suspect's device recorded this iOS location data. File path is private/var/mobile/Library/Caches/com.apple.routined/Local.sqlite-wal : 0x26259E (Table: ZRTLEARNEDLOCATIONOFINTERESTVISITMO, Size: 3160072 bytes) (edited)
Avatar
Avatar
rabbit1709
I am preparing a case for trial. It is a murder case. The suspect's device has an iOS locations ping in the area of the scene. The ping has a timestamp and an end time. The timeframe is in the window the murder occurred. How can I properly articulate how the suspect's device recorded this iOS location data. File path is private/var/mobile/Library/Caches/com.apple.routined/Local.sqlite-wal : 0x26259E (Table: ZRTLEARNEDLOCATIONOFINTERESTVISITMO, Size: 3160072 bytes) (edited)
2:18 PM
Should have good info on location data.
Avatar
Avatar
ApC
Thank you! I will definitely be pestering!
Morning, the app we use to asset and manage our gear is Stock and Inventory Simple… we use a dedicated mobile for it rather than it being installed on MDTs. 🙂
👍 1
Avatar
Hi! On an iPhone using Safari is it possible to distinguish if a website has been actively visited or if the user only has had tabs open or jumped between tabs? What counts as a visit?
Avatar
Hey there! I was trying to access last year's Android/iOS Celebrite CTF but saw that it had expired. Is there a way I can download the necessary material and images? (edited)
Avatar
Avatar
Www
Hi! On an iPhone using Safari is it possible to distinguish if a website has been actively visited or if the user only has had tabs open or jumped between tabs? What counts as a visit?
I think Ian whiffin has been writing some blogs on this - also worth watching his testimony in the Karen read trial
Avatar
Avatar
busted4n6
I think Ian whiffin has been writing some blogs on this - also worth watching his testimony in the Karen read trial
That sounds like a good idea, thanks for your answer! 🙂
Avatar
Avatar
Digital Dude
Anyone have any articles on Android 12 OS? Just looking for info on how it handles multiple users or if it even can. I’m dealing with a Moto g pure device. (edited)
Sent you a DM
Avatar
Avatar
DenSide
Hey there! I was trying to access last year's Android/iOS Celebrite CTF but saw that it had expired. Is there a way I can download the necessary material and images? (edited)
11:21 AM
One more thing Are there questions included with the case?
11:21 AM
As in, what to look for?
Avatar
digital Bowles 7/16/2024 4:56 PM
I have a number of iPhones and ipads that have been court order destroyed out of our system that are unlocked or known passcodes, but have apple icloud lock. Is there a real way to remove this or can I replace the logic boards to get them working? They will be test phones.
Avatar
Avatar
DenSide
One more thing Are there questions included with the case?
Have someone else googled CTF-related write-ups and just copy the Qs for you.
Avatar
Avatar
digital Bowles
I have a number of iPhones and ipads that have been court order destroyed out of our system that are unlocked or known passcodes, but have apple icloud lock. Is there a real way to remove this or can I replace the logic boards to get them working? They will be test phones.
if the passcode is known, then once you wipe them, you have an option to skip the icloud lock by using previous unlock code
Avatar
Avatar
chauan
Have someone else googled CTF-related write-ups and just copy the Qs for you.
Sorry if I'm bothering you again Could I know how to open the ufdx file? I was trying the Felix image but don't know how to open Our teacher would usually give us portable versions of Cellebrite reader
Avatar
Avatar
DenSide
Sorry if I'm bothering you again Could I know how to open the ufdx file? I was trying the Felix image but don't know how to open Our teacher would usually give us portable versions of Cellebrite reader
ufdx contains just metadata and for Cellebrite product. Don't you have a zip file with huge file size from the download?
Avatar
Avatar
chauan
ufdx contains just metadata and for Cellebrite product. Don't you have a zip file with huge file size from the download?
Yeah but I can't open it with Cellebrite reader
4:05 PM
I select it but nothing happens
Avatar
Reader is only for viewing, You can use open source tools to parse the extraction (.zip).
Avatar
Avatar
chauan
Reader is only for viewing, You can use open source tools to parse the extraction (.zip).
Could you recommend me one?
Avatar
You can search the channels or use this as an opportunity to start a conversation with your classmate / teacher.
Avatar
Avatar
chauan
You can search the channels or use this as an opportunity to start a conversation with your classmate / teacher.
We're on a break right now I'll look it up I thought that the CTF would have a ufdr file and that'd be it but I guess I was wrong Thank you for your help!
Avatar
No. You should always ask for the raw extraction. Reader is a processed product and offers very limited benefit in terms to the whole extraction and parsing process. (edited)
4:11 PM
This is also a good conversation to ask your instructor and see if he/she is willing to talk about the cons about tools.
Avatar
Avatar
chauan
No. You should always ask for the raw extraction. Reader is a processed product and offers very limited benefit in terms to the whole extraction and parsing process. (edited)
I see So far I've only used ufdr Would you have some reference material I could look up?
Avatar
Avatar
chauan
This is also a good conversation to ask your instructor and see if he/she is willing to talk about the cons about tools.
Unfortunately our classes are on a break right now so it'll take a while
Avatar
Avatar
DenSide
Unfortunately our classes are on a break right now so it'll take a while
Email?
Avatar
Avatar
chauan
Email?
He doesn't really reply to those when he's not on the clock
Avatar
Avatar
DenSide
Could you recommend me one?
That's hard to answer unless you have a specific goal in mind. There are several tools that can be used to parse extractions or parts of them, a good start might be familiarizing yourself with aLeapp and iLeapp, but there is a plethora of open source tools tailored to specific apps or artifacts, which need to be evaluated depending on the data and goal of investigation
Avatar
Avatar
Lazza
That's hard to answer unless you have a specific goal in mind. There are several tools that can be used to parse extractions or parts of them, a good start might be familiarizing yourself with aLeapp and iLeapp, but there is a plethora of open source tools tailored to specific apps or artifacts, which need to be evaluated depending on the data and goal of investigation
Husky_M00s3 7/17/2024 5:43 PM
@DenSide you should check out artEX too
👍 1
Avatar
Avatar
Lazza
That's hard to answer unless you have a specific goal in mind. There are several tools that can be used to parse extractions or parts of them, a good start might be familiarizing yourself with aLeapp and iLeapp, but there is a plethora of open source tools tailored to specific apps or artifacts, which need to be evaluated depending on the data and goal of investigation
Oh right I forgot about aleapp I'll try it afterwards Thank you!
Avatar
Avatar
Husky_M00s3
@DenSide you should check out artEX too
I will!
Avatar
ICAC investigators (US): Excluding obvious self-production cases, do you always execute residential search warrants for NCMEC Cybertips even when it's only one reported file, or is there some threshold? Just curious.
Avatar
Avatar
E. Paul
ICAC investigators (US): Excluding obvious self-production cases, do you always execute residential search warrants for NCMEC Cybertips even when it's only one reported file, or is there some threshold? Just curious.
No. In my state it takes 3 images for prima facie evidence of intent. 1 image is pc for a search warrant, but I’m not a fan. I want to be pretty comfortable with the evidence before taking such drastic steps. I’d rather do knock and talks for one image than falsely label someone.
Avatar
I'm inclined to agree with you. Is there an ICAC standard or is it just agency-by-agency?
Avatar
Shogun//Rogan 7/18/2024 6:53 AM
I don't think there's an ICAC standard. I think most TF's or Affiliates do it the best way they see fit/defined by their agency policy. But I've also experienced doing knock and talks on one or two images.
6:53 AM
I've seen one in particular where the offender ended up being, like, a 14 year old kid and his parents tablet, and it was two reported files on one CT. I ended up doing a K&T with that.
👍 1
Avatar
Volume probably plays a role also. If you get one tip every 6 months, it’s easier to go all out than if you get several a week.
Avatar
Avatar
E. Paul
ICAC investigators (US): Excluding obvious self-production cases, do you always execute residential search warrants for NCMEC Cybertips even when it's only one reported file, or is there some threshold? Just curious.
Not US but another perspective nonetheless. We have a similar bar to probable cause for a warrant involving various tests such as reasonable grounds to believe an offence has occurred and grounds to suspect evidence will be on the premises etc. Our agency (city sized) gets 1-2 CTs a day sometimes. These are pre-screened by a national agency so the ones getting to us are usually sufficient to say a crime has occurred. Threshold for us for warrant or arrest (we have post-arrest search powers available to us so usually arrest if the suspect is identifiable from the CT): ✅ Upload or distribution of at least one illegal image (must obviously been of a child and must obviously be sexual). Images are always viewed by an investigator. This includes forwarding, saving to their own cloud storage etc ✅ Clear link to either person or address by resolvable IP addresses or other obvious identifiers We then use a risk scoring process to prioritise enforcement with factors such as access to children and offending history being relevant. They all ultimately get enforced though. The only time we tend to do our version of a knock and talk is if the suspect is a juvenile or there are other issues (eg really old upload, houses of multiple occupancy such as rentals etc). But these can catch you out. Some of the most prolific paedophiles I’ve deal with have been juveniles
9:09 AM
Our enforcements typically consist of the investigating officer + second officer to make arrests/take person to custody, a scene manager (detective who makes decisions, deals with family, safeguarding), a digital media investigator to triage and preserve volatile data, and a search team (at least four but possibly more depending on size of property and scope of search) (edited)
9:11 AM
We rarely use dynamic entry and for the most part we know who our suspect is so device seizure is confined to their tech with some devices screened out at the scene. Not ideal but given our team does at least one enforcement a day, a necessary compromise
Avatar
Kevin Drogo 7/18/2024 10:01 AM
(USA) We typically do unless it’s from a mobile specific cloud content provider, then I’m just looking for that phone (edited)
10:02 AM
Question - has anyone worked with push tokens?
Avatar
Avatar
busted4n6
Not US but another perspective nonetheless. We have a similar bar to probable cause for a warrant involving various tests such as reasonable grounds to believe an offence has occurred and grounds to suspect evidence will be on the premises etc. Our agency (city sized) gets 1-2 CTs a day sometimes. These are pre-screened by a national agency so the ones getting to us are usually sufficient to say a crime has occurred. Threshold for us for warrant or arrest (we have post-arrest search powers available to us so usually arrest if the suspect is identifiable from the CT): ✅ Upload or distribution of at least one illegal image (must obviously been of a child and must obviously be sexual). Images are always viewed by an investigator. This includes forwarding, saving to their own cloud storage etc ✅ Clear link to either person or address by resolvable IP addresses or other obvious identifiers We then use a risk scoring process to prioritise enforcement with factors such as access to children and offending history being relevant. They all ultimately get enforced though. The only time we tend to do our version of a knock and talk is if the suspect is a juvenile or there are other issues (eg really old upload, houses of multiple occupancy such as rentals etc). But these can catch you out. Some of the most prolific paedophiles I’ve deal with have been juveniles
What would you call a "really old" upload? Some of the cases I have are 6+ months old from the date of upload, some nearly a year.
Avatar
Avatar
Joe Schmoe
Volume probably plays a role also. If you get one tip every 6 months, it’s easier to go all out than if you get several a week.
Agree. I get a ton.
Avatar
Kevin Drogo 7/18/2024 10:11 AM
My longest one was about 5 months between upload and residential sw
👍 1
Avatar
Avatar
E. Paul
What would you call a "really old" upload? Some of the cases I have are 6+ months old from the date of upload, some nearly a year.
We’ve enforced on some this year with a ct date on 2020… but the reality is we get jobs that the csp didn’t detect until years later as well
👍 1
Avatar
Kevin Drogo 7/18/2024 10:13 AM
It was a bing image tip so it kinda of carries the inference of there already being material present and only a file or two was uploaded there
Avatar
Mega for example
10:14 AM
I have a love/hate relationship with bing CTs lol. They either yield a result or absolutely nothing, same with instagram jobs
👍 1
Avatar
Kevin Drogo 7/18/2024 10:14 AM
Yeah I’ve moved away from them unless I can match it to a p2p tip also
Avatar
Most of our Facebook jobs go nowhere. I went on a call with their ncmec submission boss. They estimated a significant number (won’t say here) of their ct reports are from ‘non malicious intent’
Avatar
Kevin Drogo 7/18/2024 10:17 AM
Since they rolled out encryption we have received very few if any tips from meta
Avatar
We have a huge problem with certain communities sharing illegal media for other reasons such as cultural commentary or to denounce a particular group/religion
10:17 AM
Interesting. It’s not wildly rolled out here yet.
Avatar
Avatar
busted4n6
We have a huge problem with certain communities sharing illegal media for other reasons such as cultural commentary or to denounce a particular group/religion
Kevin Drogo 7/18/2024 10:25 AM
That’s an interesting dynamic
Avatar
We often see the same video (teenage girl in a soccer shirt with younger boy) again and again. Facebook even tag such videos as viral uploads in their CT. We also had an issue with hackers uploading CSAM to stolen accounts , we assume in an effort to ensure the account was burned after whatever fraud they used it for. Easier to spot as it’s not in Messenger and you get password and email change events on the CT
Avatar
The .sys files causing the issue are channel update files, they cause the top level CS driver to crash as they're invalidly formatted. It's unclear how/why Crowdstrike delivered the files and I'd pause all Crowdstrikes updates temporarily until they can explain. This is going to turn out to be the biggest 'cyber' incident ever in terms of impa...
Avatar
afaik you can't really pause the content updates (you can set sensor n-x versions behind but this isn't that). the fixed content update is available for devices that check in now, but if you're already boot looping it's a little late
Avatar
Has anyone actually bindiffed the patches yet?
4:32 AM
And done a independent RCA
Avatar
if you come across it at some point, I would be interested in a @ tag
Avatar
Avatar
E. Paul
ICAC investigators (US): Excluding obvious self-production cases, do you always execute residential search warrants for NCMEC Cybertips even when it's only one reported file, or is there some threshold? Just curious.
I wouldn't pin it down to a particular list or number of images to do a SW, 1 is enough but it all depends on the circumstances. Is it a 1 pic from Snapchat and a 14-year-old living there ? A knock and talk might be enough to stir them in the right direction and create a report into the RMS records system if you get another tip or someone else does in years to come. Just my 2 cents.....
Avatar
Avatar
DCSO
I wouldn't pin it down to a particular list or number of images to do a SW, 1 is enough but it all depends on the circumstances. Is it a 1 pic from Snapchat and a 14-year-old living there ? A knock and talk might be enough to stir them in the right direction and create a report into the RMS records system if you get another tip or someone else does in years to come. Just my 2 cents.....
FYI discord seems to be collapsing this message as "hidden from a likely spammer."
Avatar
Avatar
rayeh
FYI discord seems to be collapsing this message as "hidden from a likely spammer."
Huh, not sure how I got flagged as a spammer, it seems to be a false positive since I've been on this server since the start. Any recommendations to resolve that DM me so I can work through it or I can hit up Andrew.
Avatar
I'm not sure. It might be worth checking the security of your account in case its being misused by another logged in device? But it could also just be server settings
Avatar
Avatar
zembera
Has anyone actually bindiffed the patches yet?
@CroodSolutions @SamunoskeX @MalwareJake @UK_Daniel_Card @SwiftOnSecurity You're correct. Full of zeros at least. https://t.co/PJcCsUb9Vc 💖 50 🔁 14
crythumbsup 2
✅ 1
Avatar
Avatar
Husky_M00s3
@DenSide you should check out artEX too
where can I download this?
11:01 AM
I checked a website called doublebak
11:01 AM
but the zip they had
11:01 AM
11:01 AM
well it wasn't exactly safe
Avatar
Doublebak is the official site (https://doubleblak.com/app.php?id=ArtEx2) ...You'll find that a lot of tools will trigger antimalware alerts, so you'll need to add it as an exclusion.
💯 1
Avatar
Avatar
DE
Doublebak is the official site (https://doubleblak.com/app.php?id=ArtEx2) ...You'll find that a lot of tools will trigger antimalware alerts, so you'll need to add it as an exclusion.
but virustotal says that as well
11:46 AM
I'll try it in a vm to be safe
Avatar
Avatar
DCSO
Huh, not sure how I got flagged as a spammer, it seems to be a false positive since I've been on this server since the start. Any recommendations to resolve that DM me so I can work through it or I can hit up Andrew.
Digitalferret 7/19/2024 5:56 PM
folks been reporting this for years now. it's a Discord thing. Discord support are reported to beno real help. you could file a ticket, but others have and said "don't get your hopes up"
👍 1
Avatar
Avatar
DenSide
I checked a website called doublebak
Hans Leißner 7/20/2024 11:25 PM
Doubleblak = @CLB_iwhiffin You can trust the sources. He's the/ a cellebrite decoding expert 😄 well known in the sector (edited)
💯 4
Avatar
Avatar
DE
Doublebak is the official site (https://doubleblak.com/app.php?id=ArtEx2) ...You'll find that a lot of tools will trigger antimalware alerts, so you'll need to add it as an exclusion.
Digitalferret 7/21/2024 2:30 AM
i've spent more time on excluding stuff than actually scanning, i'm sure. 🙂 Nirs👀ft for one
💯 1
Avatar
kartoffel4n6 7/21/2024 11:24 AM
I saw ADF Solutions offers an authorized partnership program and Sumuri has a spot on their site for becoming a contract consultant. Anyone try these as ways to generate business for your team? Anyone know of other places/ partnerships to look into/ apply to get more forensic/DFIR work?
Avatar
I posted some research on determining if artifacts in iOS devices originated on that device or were synced from other devices. The website is barebones and a work in progress. https://nibblesnbitz.com/
Yet another DFIR blog.
👍 1
👏 1
7:16 PM
Thank you to @ScottKjr3347 for the assistance.
👍 1
Avatar
blackleitus 7/21/2024 7:40 PM
How many hosts can we consider Enterprise?
Avatar
Avatar
blackleitus
How many hosts can we consider Enterprise?
Hans Leißner 7/21/2024 9:52 PM
There is no exact number i guess. But if u need one i would say hundrets +
Avatar
Would anyone happen to know when the new Cellebrite CTF challenge will be?
Avatar
Hi! try to reach a Sales Operations Specialist at @Cellebrite for Canada since 1 month and didnt receive any news. Possible to have someone who is available ? I need new quote for renewal. Just need a email, thanks!
📬 1
Avatar
Avatar
DenSide
Would anyone happen to know when the new Cellebrite CTF challenge will be?
September time frame
Avatar
Avatar
CLB-Paul
September time frame
Good to know Thank you
Avatar
kmacdonald1565 7/22/2024 7:59 AM
has anyone made a tool to help with downloading iCloud productions? not looking for analysis, just something more "beginner friendly" for obtaining iCloud productions....right now you have to install windows subsystem for linux, gpg for windows, p7zip, then run a bash script via a powershell, have inputs like password and output folders...i am just trying to streamline it a bit. even if i do the initial set up, just something where its like "paste password"..."select output"...etc. i have found, myself included, that someone messes up the line you have to type out and it takes a couple of tries to get it right
8:01 AM
heck, even an html page would work to generate the correct line of the code potentially
Avatar
NotIronManBTW 7/22/2024 8:09 AM
Looking into someone local browser artifacts and found some “bing.com/images/create/…/…” with a lot of key terms that are interesting. Is this an ai generated thing? How do I tell what the key terms person used were
8:10 AM
It does come up as bing.com/images/create/“bunch of key word soundings things”/… would this be what user typed in?
Avatar
Avatar
kmacdonald1565
has anyone made a tool to help with downloading iCloud productions? not looking for analysis, just something more "beginner friendly" for obtaining iCloud productions....right now you have to install windows subsystem for linux, gpg for windows, p7zip, then run a bash script via a powershell, have inputs like password and output folders...i am just trying to streamline it a bit. even if i do the initial set up, just something where its like "paste password"..."select output"...etc. i have found, myself included, that someone messes up the line you have to type out and it takes a couple of tries to get it right
Have you tried the Warrant Return atutomation tool ?
Avatar
NotIronManBTW 7/22/2024 8:11 AM
I’m in windows.applications.chrome.history just looking through excel atm
Avatar
Avatar
CLB-Paul
Have you tried the Warrant Return atutomation tool ?
kmacdonald1565 7/22/2024 8:34 AM
no, i have only loaded for analysis what i have downloaded into PA.
8:34 AM
i will look into that though, is it in PA or a separate thing?
Avatar
Its part of 10.3 Inseyets PA installer but also will be available to download separately.
Avatar
kmacdonald1565 7/22/2024 8:55 AM
ill check it out
Avatar
kmacdonald1565 7/22/2024 9:31 AM
oh and thanks!
Avatar
Since Bitlocker has suddenly become very popular I thought I would publish some scripts I made to help with recovering the FVEK when sniffing the keys from a TPM and I thought it might be of interest, it isn't magic you need the appropriate sniffed data/pin/key/password for whatever protector is in use but if you have that you can recover the FVEK https://en4rab.github.io/posts/Sniffing-Bitlocker-Keys/
❤️ 2
👀 2
2:36 PM
The scripts are on github here https://github.com/en4rab/SPITkey
Decrypt the bitlocker FVEK for a bitlocker encrypted drive. - en4rab/SPITkey
👀 1
Avatar
asdfg12349823 7/23/2024 1:41 AM
I have a mailbox with thousands of e-mails and have to filter out few hundreds of them based on the message-ID. Do you have an idea how to filter out that mails?
Avatar
Avatar
asdfg12349823
I have a mailbox with thousands of e-mails and have to filter out few hundreds of them based on the message-ID. Do you have an idea how to filter out that mails?
4:16 AM
you could also use a few utilities to get from pst to eml files, then filter by the headers in each file. or e-discovery focused products likely have filtering by internetmessageid. Unfortunately, if you're going from a PST or EML files- the items sent by a user stored in their own PST will not have message ids as it hasn't traversed the e-mail server to another recipient
Avatar
asdfg12349823 7/23/2024 4:20 AM
Yes from an EXO mailbox, we want to check the accessed mails in a BEC incident
Avatar
FEC Metaspike
Avatar
What tools do people here use for firewall ruleset audits? Specifically for checkpoint cloudguard r81.10 appliances? Is there any tools worth using free or paid?
Avatar
My old notes say you can't ID a person if you only have an advertising ID, is this still the case? I am trying to assist an officer in a harassment case: "One piece of information that I received from a 17B is Apple (iOS) Device Advertising ID and Device Token numbers."
Avatar
The leaked "iOS Support Matrix" and "Android Support Matrix" from April 2024 detail which specific phone models and operating system versions Cellebrite's tools can access, exposing gaps in the company's ability to crack newer devices.
Avatar
Hans Leißner 7/23/2024 11:33 AM
They are already aware of the leak 🙂‍↕️
👆 1
Avatar
ForensicatorEC 7/23/2024 7:28 PM
How do you guys deal with CSAM cases? I started my forensic analysis career working procurement fraud, then network intrusions, and now CSAM. I still have the possibility of working those other crimes but it seems all I’m getting is CSAM. I have young kids and I can’t get it out of my head sometimes. It affects my sleep and other areas of my life. I was hired to work strictly procurement fraud and the mission expanded as the unit I was apart of was absorbed by another unit and then another. All I’m seeing is CSAM, I know it’s important to work these cases and it is rewarding to see these adjudicated but I’m a mess; I don’t know how much longer I can do this.
Avatar
Avatar
ForensicatorEC
How do you guys deal with CSAM cases? I started my forensic analysis career working procurement fraud, then network intrusions, and now CSAM. I still have the possibility of working those other crimes but it seems all I’m getting is CSAM. I have young kids and I can’t get it out of my head sometimes. It affects my sleep and other areas of my life. I was hired to work strictly procurement fraud and the mission expanded as the unit I was apart of was absorbed by another unit and then another. All I’m seeing is CSAM, I know it’s important to work these cases and it is rewarding to see these adjudicated but I’m a mess; I don’t know how much longer I can do this.
Take a break. I’m telling you now. Take a break from it. Your health is more important than any case your work. It will impact you, your health, your family, everything. Your agency should have a psych that ICAC investigators see.. if not. Go yourself. I’ve been in your shoes. Feel free to DM if you want.
💯 20
this 5
this 1
👍 1
Avatar
I’m on iOS 18 so no worries there 😂
Avatar
Haha funny
Avatar
Speaking of which, for those of you who use straight jailbreaks for investigations for your testing, how effective are the supposed jailbreaks for phones on iOS 17? Do the newest versions of iOS 17 have jailbreaks that work well?
11:39 PM
I'm in the process of getting a master's project in digital forensics approved and I'm currently looking into purchasing an iPhone x or iPhone 8 since iOS is said to be more compatible with jailbreak.
11:41 PM
I want to get a full file system for gathering date from a few apps I like to use, hence why I am jailbreaking. And before I do anything so nothing gets messed up.
11:41 PM
Avatar
Avatar
tapatiosec
I'm in the process of getting a master's project in digital forensics approved and I'm currently looking into purchasing an iPhone x or iPhone 8 since iOS is said to be more compatible with jailbreak.
That sounds interesting, however please note that AFAIK neither of those models can run iOS 17 I personally own a refurbished iPhone SE (the real one, not the modern remakes) which is really nice because it can be jailbroken with Checkm8, however it runs iOS 15 tops (edited)
Avatar
Avatar
tapatiosec
Speaking of which, for those of you who use straight jailbreaks for investigations for your testing, how effective are the supposed jailbreaks for phones on iOS 17? Do the newest versions of iOS 17 have jailbreaks that work well?
ScottKjr3347 7/24/2024 5:35 AM
Follow these two discord groups: https://discord.gg/jb https://discord.gg/palera1n-1028398973452570725 My current JB devices: JB iPX with iOS16 & iPad 7th gen with iOS 18
Invite to join a server
Guild icon
rules-and-info
Avatar
Avatar
ForensicatorEC
How do you guys deal with CSAM cases? I started my forensic analysis career working procurement fraud, then network intrusions, and now CSAM. I still have the possibility of working those other crimes but it seems all I’m getting is CSAM. I have young kids and I can’t get it out of my head sometimes. It affects my sleep and other areas of my life. I was hired to work strictly procurement fraud and the mission expanded as the unit I was apart of was absorbed by another unit and then another. All I’m seeing is CSAM, I know it’s important to work these cases and it is rewarding to see these adjudicated but I’m a mess; I don’t know how much longer I can do this.
One good thing about this position is that I never see false bravado. Everyone who does it knows that it affects you. Some may cope better than others, but nobody escapes completely unscathed. It’s important to follow your instincts. If you think it is affecting you too much, make a change. Talk to someone, tell the powers that be that you need to work on other cases, rotate who works on these types of cases. Just don’t ignore it.
💯 2
Avatar
Avatar
Lazza
That sounds interesting, however please note that AFAIK neither of those models can run iOS 17 I personally own a refurbished iPhone SE (the real one, not the modern remakes) which is really nice because it can be jailbroken with Checkm8, however it runs iOS 15 tops (edited)
No the A11 generation stopped at iOS 16. I was considering getting an iPhone se2 for testing iOS 17
Avatar
Michel Coupal (SQ Mtl) 7/24/2024 7:20 AM
Hi. I have an Android phone with the Signal App (version 7.5.2). The Signal database is encrypted so I can't see the messages. I extracted the database, and I found some master_keys or secrets that are supposed to be used to decrypt the DB in SQL cypher, but I'm at a loss on how to proceed any further. Any suggestions?
Avatar
Avatar
tapatiosec
No the A11 generation stopped at iOS 16. I was considering getting an iPhone se2 for testing iOS 17
I confirm version 15 for the iPhone SE, anyway yes you won't be able to get version 17 unless you change model Here's a good reference table: https://iosref.com/ios
Tables showing the first and maximum iOS versions for each iPhone, iPad, and iPod touch.
❤️ 1
Avatar
Did mobile stuff dissapear?
11:43 AM
Does anyone here know of a way to hide 2FA "Security" Codes from view when not in DND?
11:43 AM
On Iphone.
11:43 AM
I think its a huge security flaw tbh.
11:44 AM
My friend was able to take my phone briefly and use my code to get into a game, It dawned on me that 2FA codes show up on the screen. Iphone knows when its a security code because it prompts you to auto type so surely theres a way for it to know or hide certain texts or things
Avatar
Avatar
B74
Does anyone here know of a way to hide 2FA "Security" Codes from view when not in DND?
Digitalferret 7/24/2024 11:45 AM
reddit maybe?
Avatar
Avatar
B74
Does anyone here know of a way to hide 2FA "Security" Codes from view when not in DND?
Digitalferret 7/24/2024 11:50 AM
also maybe discussions.apple.com similar "security flaw" questions around 2FA
11:52 AM
btw, are you PrivSec or Student?
11:52 AM
or both
11:54 AM
but really this "My friend was able to take my phone briefly "
11:55 AM
for me that would be "ex" friend 🙂
Judge 1
Avatar
Avatar
ForensicatorEC
How do you guys deal with CSAM cases? I started my forensic analysis career working procurement fraud, then network intrusions, and now CSAM. I still have the possibility of working those other crimes but it seems all I’m getting is CSAM. I have young kids and I can’t get it out of my head sometimes. It affects my sleep and other areas of my life. I was hired to work strictly procurement fraud and the mission expanded as the unit I was apart of was absorbed by another unit and then another. All I’m seeing is CSAM, I know it’s important to work these cases and it is rewarding to see these adjudicated but I’m a mess; I don’t know how much longer I can do this.
You need a break before it negatively affects you even more. Don't feel bad if you are finding that CSAM cases are affecting you too much and you unsure if you can work them or that you need a break. These are the most difficult cases to work in DFIR. While it sure is rewarding knowing you had a hand in putting away the worst of the absolute worst in our society, you have remember to step back and do what's best for you and your family. Like Paul suggested, hopefully you have resources via ICAC or your agency. If not ask. You're not alone in dealing with this.
thistbh 2
👍 1
Avatar
Avatar
B74
Does anyone here know of a way to hide 2FA "Security" Codes from view when not in DND?
Are you taking about 2FA codes like via SMS? Sounds like you might need to turn previews off under Settings --> Notifications --> Show Preview
Avatar
Avatar
ForensicatorEC
How do you guys deal with CSAM cases? I started my forensic analysis career working procurement fraud, then network intrusions, and now CSAM. I still have the possibility of working those other crimes but it seems all I’m getting is CSAM. I have young kids and I can’t get it out of my head sometimes. It affects my sleep and other areas of my life. I was hired to work strictly procurement fraud and the mission expanded as the unit I was apart of was absorbed by another unit and then another. All I’m seeing is CSAM, I know it’s important to work these cases and it is rewarding to see these adjudicated but I’m a mess; I don’t know how much longer I can do this.
It isn’t for everyone and if you know it’s not for you it’s best to get away from it. Please let your supervisor know. We just had a similar situation arise. Talented examiner said “enough” and we got him away from those cases immediately. We never get to unsee anything but you will find you get back to normal pretty quick once away from it. Hang in there and know it’s normal. You always have people in the ICAC world you can talk to. My DMs are open too.
👍 1
Avatar
Kevin Drogo 7/24/2024 7:35 PM
Also ICAC here - no shame when your time comes to get away from it.
7:41 PM
I work investigations and do my own analysis on extractions/esp returns so I get the best of both worlds. DM’s open
Avatar
Avatar
char|i3
It isn’t for everyone and if you know it’s not for you it’s best to get away from it. Please let your supervisor know. We just had a similar situation arise. Talented examiner said “enough” and we got him away from those cases immediately. We never get to unsee anything but you will find you get back to normal pretty quick once away from it. Hang in there and know it’s normal. You always have people in the ICAC world you can talk to. My DMs are open too.
ForensicatorEC 7/24/2024 7:53 PM
@CyberGhost @Joe Schmoe @Kevin Drogo Thank you for the candid advice. I can’t bring myself to step away for a break knowing it will just mean more for my colleagues. I can’t leave my agency, to do so would mean moving away from familial support who followed us to this state because of this job. I have a masters degree in digital forensic science with numerous industry leading certifications so leaving the field seems like a waste of an investment. I have 14 years as a government employee and going into the private sector to escape CSAM would mean giving up all that time invested towards retirement. I’m the sole bread winner and I feel trapped. I believe in the ICAC mission and I think a discussion with my supervisor about entering into a mentorship program in preparation for a future leadership role outside of ICAC would be my best bet. I need to know it will end at some point and not in 15 years when I’m eligible for retirement. Again, thank you all for your advice.
❤️ 3
Avatar
Avatar
ForensicatorEC
@CyberGhost @Joe Schmoe @Kevin Drogo Thank you for the candid advice. I can’t bring myself to step away for a break knowing it will just mean more for my colleagues. I can’t leave my agency, to do so would mean moving away from familial support who followed us to this state because of this job. I have a masters degree in digital forensic science with numerous industry leading certifications so leaving the field seems like a waste of an investment. I have 14 years as a government employee and going into the private sector to escape CSAM would mean giving up all that time invested towards retirement. I’m the sole bread winner and I feel trapped. I believe in the ICAC mission and I think a discussion with my supervisor about entering into a mentorship program in preparation for a future leadership role outside of ICAC would be my best bet. I need to know it will end at some point and not in 15 years when I’m eligible for retirement. Again, thank you all for your advice.
I am so sorry you feel trapped, but there are serious mental and physical concerns with prolonged exposure to CSAM. A quick search for headaches from working CSAM shows numerous studies showing the PTSD and other health issues that result from working those cases. Take care of yourself, and maybe you can use some of this research to show your boss that there are legitimate health concerns so you can get the help you need. (edited)
👍 2
8:28 PM
Abstract. The current study aims to examine the sexual posttraumatic stress symptoms (sexual PTSS) among investigators of child sexual abuse material (CSAM
Avatar
Avatar
FullTang
I am so sorry you feel trapped, but there are serious mental and physical concerns with prolonged exposure to CSAM. A quick search for headaches from working CSAM shows numerous studies showing the PTSD and other health issues that result from working those cases. Take care of yourself, and maybe you can use some of this research to show your boss that there are legitimate health concerns so you can get the help you need. (edited)
Andrew Rathbun 7/24/2024 8:29 PM
https://github.com/Digital-Forensics-Discord-Server/LawEnforcementResources Seems like something that should be centralized here, or even its own repo to consolidate resources for those who workin ICAC or similar units
Resources provided by the community that can serve to be useful for Law Enforcement worldwide - Digital-Forensics-Discord-Server/LawEnforcementResources
👍 5
Avatar
Avatar
ForensicatorEC
How do you guys deal with CSAM cases? I started my forensic analysis career working procurement fraud, then network intrusions, and now CSAM. I still have the possibility of working those other crimes but it seems all I’m getting is CSAM. I have young kids and I can’t get it out of my head sometimes. It affects my sleep and other areas of my life. I was hired to work strictly procurement fraud and the mission expanded as the unit I was apart of was absorbed by another unit and then another. All I’m seeing is CSAM, I know it’s important to work these cases and it is rewarding to see these adjudicated but I’m a mess; I don’t know how much longer I can do this.
Regular counseling
Avatar
Hi everyone, I encountered an issue but managed to resolve it, though I’m still a bit perplexed. I have two separate HDDs, each appearing to contain a Linux RAID drive. I converted each drive into a .001 image file. For disk one, I used losetup -P /dev/loop50 and observed the following partitions: /dev/loop50p1: fstype is vfat, type is part /dev/loop50p2: fstype is linux_raid_member, type is part /dev/loop50p3: fstype is swap, type is part /dev/loop50p4: fstype is iso9660, type is part The partition /dev/loop50p2 shows a branch called md127 with 0B size. There is no fstype, and the type is md. For disk two, I used losetup -P /dev/loop60 and now see: /dev/loop50p1: fstype is vfat, type is part /dev/loop50p2: fstype is linux_raid_member, type is part /dev/loop50p3: fstype is swap, type is part /dev/loop50p4: fstype is iso9660, type is part Now, /dev/loop50p2 shows a branch called md127 with a size of 500GB, fstype is ext4, and type is raid1. /dev/loop60p1: fstype is vfat, type is part /dev/loop60p2: fstype is linux_raid_member, type is part /dev/loop60p3: fstype is swap, type is part It appears that I can now directly create an image from /dev/md127. However, according to online guides, I should use mdadm --assemble to assemble loop50p2 and loop60p2? Can anyone explain why assembling might not be necessary in this case? Is losetup helping to assemble the RAID? I'm not quite sure about this. Thanks!
Avatar
Avatar
ech0
Hi everyone, I encountered an issue but managed to resolve it, though I’m still a bit perplexed. I have two separate HDDs, each appearing to contain a Linux RAID drive. I converted each drive into a .001 image file. For disk one, I used losetup -P /dev/loop50 and observed the following partitions: /dev/loop50p1: fstype is vfat, type is part /dev/loop50p2: fstype is linux_raid_member, type is part /dev/loop50p3: fstype is swap, type is part /dev/loop50p4: fstype is iso9660, type is part The partition /dev/loop50p2 shows a branch called md127 with 0B size. There is no fstype, and the type is md. For disk two, I used losetup -P /dev/loop60 and now see: /dev/loop50p1: fstype is vfat, type is part /dev/loop50p2: fstype is linux_raid_member, type is part /dev/loop50p3: fstype is swap, type is part /dev/loop50p4: fstype is iso9660, type is part Now, /dev/loop50p2 shows a branch called md127 with a size of 500GB, fstype is ext4, and type is raid1. /dev/loop60p1: fstype is vfat, type is part /dev/loop60p2: fstype is linux_raid_member, type is part /dev/loop60p3: fstype is swap, type is part It appears that I can now directly create an image from /dev/md127. However, according to online guides, I should use mdadm --assemble to assemble loop50p2 and loop60p2? Can anyone explain why assembling might not be necessary in this case? Is losetup helping to assemble the RAID? I'm not quite sure about this. Thanks!
I think your linux distro is just auto building and mounting RAIDs as you connect them. Maybe a udev (not dbus) rule? (edited)
Avatar
Linux distro as in my sift workstation?
12:28 AM
I used SANS linux sift workstation to mount the images. IIRC there isn't any inbuilt auto rules to auto build and mount RAIDS? (edited)
Avatar
Avatar
Andrew Rathbun
https://github.com/Digital-Forensics-Discord-Server/LawEnforcementResources Seems like something that should be centralized here, or even its own repo to consolidate resources for those who workin ICAC or similar units
Andrew Rathbun 7/25/2024 6:01 AM
Thank you @FullTang for the PR
👍 1
Avatar
Dar Belkasoft 7/25/2024 6:18 AM
Hey, everybody! Join our webinar with Richard Boddington, a seasoned digital forensics expert from Australia. We promise no fluff and no sales pitches—just 30 minutes of useful information with real case studies. Richard will share his invaluable experience from real-life cases and discuss powerful features that improve his investigative work: from acquisition and extraction to in-depth analysis and reporting. Details here: https://eu1.hubs.ly/H0bpcGj0
Avatar
tampatrouble 7/25/2024 7:05 AM
Does anyone happen to know anything about the "currentpendinglogevents" sqlite for Facebook? I have a hacking case that contains critical information, but I don't know anything about this artifact. Any help would be appreciated.
Avatar
Shogun//Rogan 7/25/2024 7:19 AM
If anyone is interested, a Sergeant with Manatee County SO is testifying in the Ashley Benefield case (State v. Florida) about cell phone data and text messages. Unsure how technical it will get, might just be re-reading text messages.
👍 3
Avatar
Avatar
Dar Belkasoft
Hey, everybody! Join our webinar with Richard Boddington, a seasoned digital forensics expert from Australia. We promise no fluff and no sales pitches—just 30 minutes of useful information with real case studies. Richard will share his invaluable experience from real-life cases and discuss powerful features that improve his investigative work: from acquisition and extraction to in-depth analysis and reporting. Details here: https://eu1.hubs.ly/H0bpcGj0
Shogun//Rogan 7/25/2024 8:13 AM
Signed up. Thanks for the ad!
Avatar
Andrew Rathbun 7/25/2024 8:29 AM
@ForensicatorEC https://www.copline.org/ may be a resource you want to leverage and talk it out with someone who can relate
Cops understand Cops. We’ve been exposed to similar situations in our careers. Whether you’re active duty or retired and feel like no one understands what you're going through, we want to answer your CALL.
🔥 4
Avatar
Avatar
ech0
I used SANS linux sift workstation to mount the images. IIRC there isn't any inbuilt auto rules to auto build and mount RAIDS? (edited)
Sorry I meant udev rule not dbus. I was having a bad day and couldn't think of the correct term.
Avatar
Anyone know what equipment you get for the MDE NCFI class nowadays? I know you used to get Cellebrite and AXIOM licenses, but wasn't sure if that's changed.
Avatar
Original message was deleted or could not be loaded.
Where did you find them? If I were being clever, I would do something like: 1) write my seed phrases down in backwards order, or 2) start at #1 and go by (+2) till the end then start at #2 and do the same, so that I might be able to write my seed phrases down someplace but also still have them in a way only I could recover them. (edited)
Avatar
Looking for other's experiences and also for people to challenge me on this if I'm mistaken- for the sake of learning the truth. Found out something new yesterday, and glad we found it out before being on the stand. I expected if I had a USB drive and used a write blocking tool to image that drive in an .e01 format, that if I were to image that same drive using the same tool using same settings that the hashes for the .e01 files would be the same. I was wrong- although verification hash for the data on the drive itself was always the same in all my tests (proving no changes had been made to the USB Drive), every .e01, when hashed, was different. My best guess is, at least with the tools I was using (see below), that they must incorporate a timestamp or something into the .e01 file and this is why although the files in the .e01 all hash the same, the .e01 itself all have different hashes. This only came up when two other analysts were trying to figure out why the drive they both imaged in .e01 didn't have a hash that matched. I know if I were to do a .dd/raw image, the hashes of those images would be the same, and should match the verification hash of the drive itself (correct me if I'm wrong here). Test setup: 4GB USB Drive with a handful of files. The "SHA1 Verification" hash you see below is the hash of the drive, and the ".e01 Sha1 Hash" is the Hash of the .e01 file itself that was generated. 1. Imaged it with a Logicube Falcon NEO2 in .e01, not compressed. SHA 1 Verification: B384...E7D .e01 Sha1 Hash: 746A...122 2. Imaged it with a Logicube Falcon NEO2 in .e01, compressed. [Note- I wouldn't expect this hash to match #1, this was to compare with FTK later]. SHA 1 Verification: B384...E7D .e01 Sha1 Hash: A262...F99 [Continued in Next Comment Below as there's a post limit]
5:38 PM
3. Imaged it with FTK, Wiebetch USB Write Blocker, No Compression (to compare with 1) SHA 1 Verification: B384...E7D .e01 Sha1 Hash: 63D0...536 4. Imaged it with FTK, Wiebetch USB Write Blocker, "Added" files in Windows (was curious if FTK would image the files that were "Added" that you can see in Windows until you eject the drive- answer, no it did not) SHA 1 Verification: B384...E7D .e01 Sha1 Hash: 44FF...5DD 5. Same as 4, but no addtl files "added" SHA 1 Verification: B384...E7D .e01 Sha1 Hash: A8Ae...169 I then unplugged the Wiebetech USB write blocker to purge the "written" data I added in windows and then connected drive again to Wiebetech. 6. Duplicate of #3 settings above SHA 1 Verification: B384...E7D .e01 Sha1 Hash: 1F6B...FBE 7. Duplicate of #3 settings again SHA 1 Verification: B384...E7D .e01 Sha1 Hash: B6CD...26A 8. Redid settings from #1 again on Logicube SHA 1 Verification: B384...E7D .e01 Sha1 Hash: B6CD...26A 9. Redid settings from #2 again on Logicube SHA 1 Verification: B384...E7D .e01 Sha1 Hash: 72F9...525 I'm thinking I may need to image this drive again on an older, dumber, imager, one that possibly doesn't have any time element in it? As it is, the .e01 is still good for verifying once you have acquired data, that it hasn't changed over time (say you look at it again in 5 years, if hash matches it's good). But it doesn't provide a good hash reference to ensure someone else imaging the same drive obtained the same information- although the Image Verification hashes that often seem to be included in .e01 associated text files do just that fine (you just have to dig for them). Thoughts? Corrections? Anyone else done a similar test and got different results? Appreciate the conversation.
Avatar
Avatar
Grok
Looking for other's experiences and also for people to challenge me on this if I'm mistaken- for the sake of learning the truth. Found out something new yesterday, and glad we found it out before being on the stand. I expected if I had a USB drive and used a write blocking tool to image that drive in an .e01 format, that if I were to image that same drive using the same tool using same settings that the hashes for the .e01 files would be the same. I was wrong- although verification hash for the data on the drive itself was always the same in all my tests (proving no changes had been made to the USB Drive), every .e01, when hashed, was different. My best guess is, at least with the tools I was using (see below), that they must incorporate a timestamp or something into the .e01 file and this is why although the files in the .e01 all hash the same, the .e01 itself all have different hashes. This only came up when two other analysts were trying to figure out why the drive they both imaged in .e01 didn't have a hash that matched. I know if I were to do a .dd/raw image, the hashes of those images would be the same, and should match the verification hash of the drive itself (correct me if I'm wrong here). Test setup: 4GB USB Drive with a handful of files. The "SHA1 Verification" hash you see below is the hash of the drive, and the ".e01 Sha1 Hash" is the Hash of the .e01 file itself that was generated. 1. Imaged it with a Logicube Falcon NEO2 in .e01, not compressed. SHA 1 Verification: B384...E7D .e01 Sha1 Hash: 746A...122 2. Imaged it with a Logicube Falcon NEO2 in .e01, compressed. [Note- I wouldn't expect this hash to match #1, this was to compare with FTK later]. SHA 1 Verification: B384...E7D .e01 Sha1 Hash: A262...F99 [Continued in Next Comment Below as there's a post limit]
Some threads for consideration: https://www.forensicfocus.com/forums/general/hash-verification/ https://www.reddit.com/r/computerforensics/comments/xbk9fo/hash_mismatch/ https://www.forensicfocus.com/forums/general/extracting-e01-e02-files/ If I am reading and understanding these conversations correctly, a .E01 has its own file structure, and is not (just) a bit-for-bit copy of the raw data being imaged. It has a header that includes, as you guessed, a timestamp, along with other case information.
👍 1
6:32 PM
If you're interested, run the same kind of test with dd or dc3dd. As you pointed out, the hashes will match. You could even turn on logging and have the piecewise hashing data written to a file. But that's why .E01 includes the verification hash of the actual imaged data at the end of the file. WIth FTK, this is what's copied to a .txt in the image directory. (edited)
Avatar
Avatar
Grok
Looking for other's experiences and also for people to challenge me on this if I'm mistaken- for the sake of learning the truth. Found out something new yesterday, and glad we found it out before being on the stand. I expected if I had a USB drive and used a write blocking tool to image that drive in an .e01 format, that if I were to image that same drive using the same tool using same settings that the hashes for the .e01 files would be the same. I was wrong- although verification hash for the data on the drive itself was always the same in all my tests (proving no changes had been made to the USB Drive), every .e01, when hashed, was different. My best guess is, at least with the tools I was using (see below), that they must incorporate a timestamp or something into the .e01 file and this is why although the files in the .e01 all hash the same, the .e01 itself all have different hashes. This only came up when two other analysts were trying to figure out why the drive they both imaged in .e01 didn't have a hash that matched. I know if I were to do a .dd/raw image, the hashes of those images would be the same, and should match the verification hash of the drive itself (correct me if I'm wrong here). Test setup: 4GB USB Drive with a handful of files. The "SHA1 Verification" hash you see below is the hash of the drive, and the ".e01 Sha1 Hash" is the Hash of the .e01 file itself that was generated. 1. Imaged it with a Logicube Falcon NEO2 in .e01, not compressed. SHA 1 Verification: B384...E7D .e01 Sha1 Hash: 746A...122 2. Imaged it with a Logicube Falcon NEO2 in .e01, compressed. [Note- I wouldn't expect this hash to match #1, this was to compare with FTK later]. SHA 1 Verification: B384...E7D .e01 Sha1 Hash: A262...F99 [Continued in Next Comment Below as there's a post limit]
facelessg00n 7/25/2024 6:41 PM
The E01 file contains metadata which will change between the imaging sessions and therefore result in a different file hash for the E01 as a whole, i.e the metadata will contain the date and time and imaging platform used (so x-ways can warn you about use of inefficient tools :p ) https://github.com/libyal/libewf/blob/main/documentation/Expert%20Witness%20Compression%20Format%20(EWF).asciidoc
Libewf is a library to access the Expert Witness Compression Format (EWF) - libyal/libewf
👍 1
Avatar
Does anyone know where to find a repo of yara rules that is updated actively? Seemed to only be able to find rules that are generally outdated.
Avatar
I can really recommend this repo: https://yarahq.github.io/
Streamlined Public YARA Rule Collection
🫡 1
Avatar
Avatar
ech0
Does anyone know where to find a repo of yara rules that is updated actively? Seemed to only be able to find rules that are generally outdated.
to add to DFIR_tst - yarahq is great - I have a script I use ocassionally for pulling yara rules from across various sources into a single location for use in mass-scan activities at https://github.com/joeavanzato/YARACheck/blob/main/yara_updater.py - been meaning to add yarahq to this as well
Update and use YARA rules from across the Internet against targeted files or directories. - joeavanzato/YARACheck
🫡 1
Avatar
NotIronManBTW 7/26/2024 12:07 PM
Anyone here know much about editing audio at all? I have an audio clip that has some noise that I want to kinda highlight a bit more and make it pop out and easier to hear. Is that possible?
Avatar
Avatar
NotIronManBTW
Anyone here know much about editing audio at all? I have an audio clip that has some noise that I want to kinda highlight a bit more and make it pop out and easier to hear. Is that possible?
Audacity is pretty good for removing background hums and consistent noise. There are a lot of tutorials for it.
👍 2
Avatar
izotope RX software is great for cleaning up audio and removing noise... but for what you're trying to do I think using a graphical EQ or filter and bumping the frequencies the particular noise you're looking for is going to get the effect you want (edited)
12:22 PM
the audacity graphic eq doesn't have live feedback compared to something that will be available in a more "pro ready" DAW like Ableton (or the gold standard eq plugin: fabfilter pro-q3). But you could just use a filter and sweep it back and forth and probably have decent success (edited)
12:25 PM
audacity can use VSTs (audio plugins, things like guitar amps, synths, utilities) so you could grab https://www.kvraudio.com/product/reaeq_by_cockos and use that. Or Reaper is a free daw that includes it
ReaEQ features: Unlimited band IIR based equalizer. Support for any number of many types of filters (shelfs, bands, LPF, HPF, notch, bandpa...
12:30 PM
what kind of noise are you trying to isolate if it's ok to ask ?
Avatar
NotIronManBTW 7/26/2024 12:37 PM
Thanks all for the help - trying to get a conversation more audible
12:37 PM
Tons of background white noise
Avatar
ah for that, I'd strongly recommend giving izotope rx a trial
12:39 PM
it's like magic
12:40 PM
otherwise it's definitely possible otherwise with tools like audacity but it might be a lot more work depending on what is going on in the clip
Avatar
Dr. Kaan Gündüz 7/26/2024 2:11 PM
+1 with rx, you can paint or crop in spectrogram
Avatar
can i get anything useful off a locked apple watch running watchos 10.5, assuming unknown passcode but know its 6 digits, should be some tool capable of crunching that?
2:58 PM
and would the watch give me the keychain of the paired iphone, or not (edited)
Avatar
Avatar
NotIronManBTW
Anyone here know much about editing audio at all? I have an audio clip that has some noise that I want to kinda highlight a bit more and make it pop out and easier to hear. Is that possible?
facelessg00n 7/26/2024 6:32 PM
Have a look at Davinci Farlight, they have some good tutorials on their site as well. https://www.blackmagicdesign.com/au/products/davinciresolve/fairlight
Professional video editing, color correction, visual effects and audio post production all in a single application. Free and paid versions for Mac, Windows and Linux.
Avatar
Avatar
NotIronManBTW
Anyone here know much about editing audio at all? I have an audio clip that has some noise that I want to kinda highlight a bit more and make it pop out and easier to hear. Is that possible?
I second the Audacity recommend. Great software, been using it for years, and FREE (and open source too I think?).
Avatar
Avatar
NotIronManBTW
Anyone here know much about editing audio at all? I have an audio clip that has some noise that I want to kinda highlight a bit more and make it pop out and easier to hear. Is that possible?
I prefer adobe audition myself, but it’s a little pricy , but really worth it imo, you could ways grab a trial I think (edited)
1:53 AM
Avatar
Is there a free opensource tool to analyze AWS cloudtrail logs? Does anyone know?
Avatar
Hey there, does anyone know what happened to the images in the nist website?
2:22 AM
I can't seem to find any anymore
2:22 AM
Avatar
Avatar
ForensicatorEC
How do you guys deal with CSAM cases? I started my forensic analysis career working procurement fraud, then network intrusions, and now CSAM. I still have the possibility of working those other crimes but it seems all I’m getting is CSAM. I have young kids and I can’t get it out of my head sometimes. It affects my sleep and other areas of my life. I was hired to work strictly procurement fraud and the mission expanded as the unit I was apart of was absorbed by another unit and then another. All I’m seeing is CSAM, I know it’s important to work these cases and it is rewarding to see these adjudicated but I’m a mess; I don’t know how much longer I can do this.
I requested to be moved to something else in my agency after working a few of those cases. I have small children myself and I got sick by the exposure to that stuff. No shame in that and hopefully your bosses will react like mine did - let me work on something else. I was ready to quit my job which I let them know and they responded positively. After a few months everything was much better and I'd like to think I'm not affected by it now at all. Hope you will get the same help and come out on top!
Avatar
Avatar
DenSide
Hey there, does anyone know what happened to the images in the nist website?
Digitalferret 7/29/2024 2:59 AM
they/some are there. "your next assignment, should you choose to accept it ...." come on, chance to excel. took an old guy like me less than 30s 🙂
Avatar
Avatar
Digitalferret
they/some are there. "your next assignment, should you choose to accept it ...." come on, chance to excel. took an old guy like me less than 30s 🙂
wait what, I don't understand what you mean
Avatar
Digitalferret 7/29/2024 3:03 AM
look around the website, use your DFIR skills 🙂
Avatar
Avatar
Digitalferret
look around the website, use your DFIR skills 🙂
I don't have any... that's why I wanted to study with the images
Avatar
Digitalferret 7/29/2024 3:05 AM
look around the website, use your DFIR skills 🙂
Avatar
there's a redirect to digital corpora
Avatar
Digitalferret 7/29/2024 3:09 AM
Avatar
Avatar
Digitalferret
Click to see attachment 🖼️
ye, that's the old website with old datasets
Avatar
Digitalferret 7/29/2024 3:10 AM
"I can't seem to find any anymore" ^^ any
Avatar
there were a few that I saw last week that wanted to try out but can't since there aren't anymore
Avatar
Avatar
Digitalferret
"I can't seem to find any anymore" ^^ any
sorry, english isn't my first language, I guess I should have phrased that better
Avatar
Digitalferret 7/29/2024 3:11 AM
sorry, English is my first language, my bad.
3:13 AM
I guess I'll try with the datasets at digital corpora
Avatar
Digitalferret 7/29/2024 3:20 AM
https://datasets.fbreitinger.de/datasets/ too . so many links dude. just look around, and./or use the NIST contact button and just ask
Avatar
Avatar
Digitalferret
https://datasets.fbreitinger.de/datasets/ too . so many links dude. just look around, and./or use the NIST contact button and just ask
Just sent them a mail. thanks
👍🏻 1
Avatar
Avatar
ForensicatorEC
How do you guys deal with CSAM cases? I started my forensic analysis career working procurement fraud, then network intrusions, and now CSAM. I still have the possibility of working those other crimes but it seems all I’m getting is CSAM. I have young kids and I can’t get it out of my head sometimes. It affects my sleep and other areas of my life. I was hired to work strictly procurement fraud and the mission expanded as the unit I was apart of was absorbed by another unit and then another. All I’m seeing is CSAM, I know it’s important to work these cases and it is rewarding to see these adjudicated but I’m a mess; I don’t know how much longer I can do this.
Yes, it is horrible trauma to view CSAM. A couple of pointers from my agency which of course are all easier said then done: 1) take lots of breaks. 2) avoid the audio if possible 3) after viewing CSAM, play tetris (some studies out there suggested tetris disassociates the part of the brain with viewing CSAM). 4) need to find a way to decompress after your shift ( exercise worked for me) 5) we had mandatory annual meetings with a therapist to make sure our heads were ok. Of course, if more meetings were needed, we had more. Our bosses were very supportive and knew the effects of viewing CSAM. (edited)
👆 4
Avatar
@Cellebrite any1 here for a pathfinder question?
Avatar
Ciprian Craciun 7/30/2024 4:26 AM
I was wondering if anyone has some good links on how "secure" is UEFI Secure Boot actually? The threat I am most interested in is how easy is for an attacker, with "limited physical access" (say an hour or so) to a device, to manage to run unsigned code on the system. I presume one has taken care to replace all the Secure Boot keys with custom ones, the UEFI is secured with an unguessable password, and that the loader (or the kernel) doesn't load untrusted code. Thus, the attacker has to attack the UEFI implementation, not other side channels that have nothing to do with Secure Boot itself. I've read a few random articles about UEFI Secure Boot, but none of them try to go deeper into the security assurances or threats. Thanks.
Avatar
Anyone know how to make AXIOM filter on the term david. (Note the trailing full stop) without it matching everything with the word david in it? Do I have to resort to regex? (edited)
8:04 AM
Trying to find domain names that are david.tld
Avatar
Avatar
Ciprian Craciun
I was wondering if anyone has some good links on how "secure" is UEFI Secure Boot actually? The threat I am most interested in is how easy is for an attacker, with "limited physical access" (say an hour or so) to a device, to manage to run unsigned code on the system. I presume one has taken care to replace all the Secure Boot keys with custom ones, the UEFI is secured with an unguessable password, and that the loader (or the kernel) doesn't load untrusted code. Thus, the attacker has to attack the UEFI implementation, not other side channels that have nothing to do with Secure Boot itself. I've read a few random articles about UEFI Secure Boot, but none of them try to go deeper into the security assurances or threats. Thanks.
Assuming it’ll boot from USB you could use a bootloader that is signed by MS’ keys such as shimloader and load your favourite live Linux tool. Of course this is mitigated by disabling booting from anything but the hard drive and then using encryption to prevent an evil maid style attack. Modern laptops tend to have built in storage and fTPM hardware so it becomes much more than something anyone but the state from doing in an hour
Avatar
Avatar
busted4n6
Assuming it’ll boot from USB you could use a bootloader that is signed by MS’ keys such as shimloader and load your favourite live Linux tool. Of course this is mitigated by disabling booting from anything but the hard drive and then using encryption to prevent an evil maid style attack. Modern laptops tend to have built in storage and fTPM hardware so it becomes much more than something anyone but the state from doing in an hour
Just reread - yes if you replace the keys this won’t work. Other attacks would be resetting the bios password (much harder on enterprise Euc devices these days) or finding a vulnerable bios (there have been various cve)
Avatar
Avatar
busted4n6
Anyone know how to make AXIOM filter on the term david. (Note the trailing full stop) without it matching everything with the word david in it? Do I have to resort to regex? (edited)
Regex \bdavid\. Is the answer. I don’t know if ignoring the dot is intentional by @Magnet Forensics though (edited)
Avatar
Avatar
busted4n6
Just reread - yes if you replace the keys this won’t work. Other attacks would be resetting the bios password (much harder on enterprise Euc devices these days) or finding a vulnerable bios (there have been various cve)
Ciprian Craciun 7/30/2024 9:04 AM
Is there perhaps an analysis of such UEFI/BIOS password resets or other vulnerabilities? Because, although in the last days there have been some UEFI Secure Boot fiascos, most of them relate to leaked private keys, the owner doing somenthing "extra" (like enabling a custom splash screen). I haven't seen something that impacts a non-heavily tweaked UEFI settings, and properly secured with custom keys and password.
Avatar
Avatar
busted4n6
Regex \bdavid\. Is the answer. I don’t know if ignoring the dot is intentional by @Magnet Forensics though (edited)
forensicmike @Magnet 7/30/2024 9:14 AM
the . normally represents any 1 character other than \n in .NET regex which is why it needs escaping another option could be to use the end-of-string anchor $ as in: david\.\w{2,3}$ although this would need some tweaks for domains like .co.uk or .ninja
9:16 AM
but if you're looking for matches in like a paragraph of text, then \b is a better anchor on either end
Avatar
I think it is heavily hardware dependent. Often consumer PCs can quite easily reset with a CMOS jumper (but of course this will likely wipe the fTPM or at least trip it so the user would realise something was amiss unless the attacker could obtain the recovery key as part of their efforts). Enterprise hardware should be compliant with standards such as NIST SP 800-193 that provide non-bypassability
Avatar
Avatar
forensicmike @Magnet
the . normally represents any 1 character other than \n in .NET regex which is why it needs escaping another option could be to use the end-of-string anchor $ as in: david\.\w{2,3}$ although this would need some tweaks for domains like .co.uk or .ninja
Ah, I meant in reference to my original question - why does a simple non-regex global search ignore the .
9:21 AM
Also realise i wrote anythign rather then everything 😫
9:21 AM
A day of reviewing cases and doing blockchain forensics has frazzled my brain
Avatar
Avatar
busted4n6
Ah, I meant in reference to my original question - why does a simple non-regex global search ignore the .
Eg search for: David. Expected result: David.com David.co.uk David.smith Actual result: David.com David.co.uk David.smith Hi david how are you? David, I am glad that you… Thatmandavid Regex works of course but I don’t understand why simple keyword does not
Avatar
forensicmike @Magnet 7/30/2024 9:31 AM
interesting, will pass this info on thanks
Avatar
I have hours of audio files to process... is there a good piece of (hopefully free/inexpensive) software that will bulk attempt to transcribe audio files?
12:17 PM
Headed out for a bit, curious if anyone has a recommendation
Avatar
Avatar
whee30
Headed out for a bit, curious if anyone has a recommendation
Whisper by OpenAI. The more GPUs you have the better it is.
12:26 PM
Robust Speech Recognition via Large-Scale Weak Supervision - openai/whisper
👍🏼 3
💯 1
Avatar
Thanks. I just have the one, I'll give it a go and see how slow it is for me.
👍 1
Avatar
Dr. Kaan Gündüz 7/30/2024 1:53 PM
It is pretty fast if you have a modest gpu
Avatar
Avatar
whee30
Thanks. I just have the one, I'll give it a go and see how slow it is for me.
XRY Has it as a processing option if you have access 👍🏻
Avatar
LeatherCouch 7/30/2024 2:25 PM
Anyone have a good Meta warrant return parser atm ?
Avatar
Avatar
whee30
Thanks. I just have the one, I'll give it a go and see how slow it is for me.
There’s an OpenAI whisper plugin for audacity that is pretty good
👍 1
Avatar
Avatar
Ciprian Craciun
I was wondering if anyone has some good links on how "secure" is UEFI Secure Boot actually? The threat I am most interested in is how easy is for an attacker, with "limited physical access" (say an hour or so) to a device, to manage to run unsigned code on the system. I presume one has taken care to replace all the Secure Boot keys with custom ones, the UEFI is secured with an unguessable password, and that the loader (or the kernel) doesn't load untrusted code. Thus, the attacker has to attack the UEFI implementation, not other side channels that have nothing to do with Secure Boot itself. I've read a few random articles about UEFI Secure Boot, but none of them try to go deeper into the security assurances or threats. Thanks.
would turning secureboot off be sufficient or were you wondering about secureboot bypasses? As an example to just disable secure boot on AMI aptio you should be able to dump the spi flash open it with UEFITool and extract the AMITSESetup uefi exe, you can then run IFRetract on this to get the Internal Forms Representation menus data out of the exe and find out at what offset in the nvram the flag for secure boot is stored at in the following example offset 0x1E EDIT the tablet i did i just enabled the secureboot menu im going to have to find where the actual secureboot flag is stored Then again opening the dump in UEFITool look for the AMITSESetup NVRAM entry(s) and look at offset 0x1E change that from 0x01 to 0x00 (you might have to do that to both copys of the nvram data and then flash it back to the device and secure boot should be off (or something roughly like that) (edited)
Avatar
This japanese site (it translates well with google) talks about the same method to remove secureboot from panasonic FZ-B2 tablets, their method is slightly different in that they enrol a MOK in the uefi and sign their own loader so they can run AmiSetupWriter.efi and poke setup values into NVRAM https://www.junk-labs.com/junk/fz-b2.html
Panasonic TOUGHPAD FZ-B2B Android タブレットなのに BIOS があって x86 な CPU が載ってる頑丈な変態タブレットをアレコレしちゃいます この記事で取り扱うのは Bay Trail-MのCeleron N2930を搭載しAndroid 4.4がインストールされているバージョンです。
Avatar
I think I have the settings, this is based on i think an ifr extracted from the toughpad as thats what I have to hand, to get the IFR from a different AMI uefi open it in UEFITool and extract the Setup PE32 image section, you can then run IFRextract on this to get the IFR menu data ifrextract.exe Section_PE32_image_Setup_Setup_body.efi ifrout.txt If you want to play along at home i have attached the IFR text file (edited)
4:02 PM
Looking through the menus for secureboot im pretty sure the options for on and off are: 0x20591 One Of: Secure Boot control, VarStoreInfo (VarOffset/VarName): 0x0, VarStore: 0x1E, QuestionId: 0x277C, Size: 1, Min: 0x0, Max 0x1, Step: 0x0 {05 91 06 05 07 05 7C 27 1E 00 00 00 14 10 00 01 00} 0x205A2 Default: DefaultId: 0x0, Value (8 bit): 0x1 {5B 06 00 00 00 01} 0x205A8 One Of Option: Disabled, Value (8 bit): 0x0 {09 07 04 00 00 00 00} 0x205AF One Of Option: Enabled, Value (8 bit): 0x1 {09 07 03 00 00 00 01} 0x205B6 End One Of {29 02} Where the state is stored at offset 0x0 of varstore 0x1E. Looking at the top of the ifr you can find that varstore 0x1E is SecureBootSetup: 0x1252B VarStore: VarStoreId: 0x1E [7B59104A-C00D-4158-87FF-F04D6396A915], Size: 0x7, Name: SecureBootSetup {24 26 4A 10 59 7B 0D C0 58 41 87 FF F0 4D 63 96 A9 15 1E 00 07 00 53 65 63 75 72 65 42 6F 6F 74 53 65 74 75 70 00}
90.28 KB
4:05 PM
Looking at the body data of securebootsetup in the NVRAM you can see the first byte 0x01 editing that to 0x00 (and doing the same to the other copy) should i think turn off secureboot once you flash it back with an spi flasher
4:10 PM
I think that should be roughly right, your mileage will vary for other uefi manufacturers, and if you want to remove the password there is info here (TLDR; Null out where the password is stored and flash it back with an spi flash tool) https://gist.github.com/en4rab/550880c099b5194fbbf3039e3c8ab6fd
Recovering the BIOS password from a Panasonic CF-U1 mk2 (AMI Aptio UEFI) - CF-U1-BIOS.md
Avatar
Anyone know where Cellebrite stores the software licence? As I need to remove it from my system
📫 1
Avatar
Digitalferret 7/31/2024 4:21 AM
@Cellebrite ^
Avatar
Avatar
whee30
Thanks. I just have the one, I'll give it a go and see how slow it is for me.
DeeFIR 🇦🇺 7/31/2024 4:28 AM
How’d you go with speed/accuracy?
Avatar
Shogun//Rogan 7/31/2024 4:41 AM
Perhaps this has been asked and answered, but does anyone have book recommendations for DFIR?
Avatar
Avatar
en4rab
would turning secureboot off be sufficient or were you wondering about secureboot bypasses? As an example to just disable secure boot on AMI aptio you should be able to dump the spi flash open it with UEFITool and extract the AMITSESetup uefi exe, you can then run IFRetract on this to get the Internal Forms Representation menus data out of the exe and find out at what offset in the nvram the flag for secure boot is stored at in the following example offset 0x1E EDIT the tablet i did i just enabled the secureboot menu im going to have to find where the actual secureboot flag is stored Then again opening the dump in UEFITool look for the AMITSESetup NVRAM entry(s) and look at offset 0x1E change that from 0x01 to 0x00 (you might have to do that to both copys of the nvram data and then flash it back to the device and secure boot should be off (or something roughly like that) (edited)
Ciprian Craciun 7/31/2024 4:51 AM
Indeed, turning off the Secure Boot (outside the BIOS menu which should be protected by a password) would qualify as bypassing it. Interesting attack, but if you think about it, it's quite expected, because in the end there must be some flag in there somewhere that enables or disables Secure Boot. However, my question is how easy it is for an attacker with limited physical access to the device, to do all this (dump the UEFI data, modify it, upload it again)? Does this just resume to opening the case, connecting to some pins on the MB or directly on some chip, and just dumping it? Or does it involve unsoldering some chip, doing stuff with it, and putting it back in? In the end, what I try to asses, is if physical security of the device (be it physically securing it, or having tamper evident enclosure) is mandatory for having an effective Secure Boot enabled (and trusted) environment.
Avatar
Avatar
ForensicatorEC
@CyberGhost @Joe Schmoe @Kevin Drogo Thank you for the candid advice. I can’t bring myself to step away for a break knowing it will just mean more for my colleagues. I can’t leave my agency, to do so would mean moving away from familial support who followed us to this state because of this job. I have a masters degree in digital forensic science with numerous industry leading certifications so leaving the field seems like a waste of an investment. I have 14 years as a government employee and going into the private sector to escape CSAM would mean giving up all that time invested towards retirement. I’m the sole bread winner and I feel trapped. I believe in the ICAC mission and I think a discussion with my supervisor about entering into a mentorship program in preparation for a future leadership role outside of ICAC would be my best bet. I need to know it will end at some point and not in 15 years when I’m eligible for retirement. Again, thank you all for your advice.
SHIFT has some very accessible online resources https://www.shiftwellness.org/. If you don't have an account there consider creating one (it's free) and checking it out.
Avatar
Avatar
laurenw
SHIFT has some very accessible online resources https://www.shiftwellness.org/. If you don't have an account there consider creating one (it's free) and checking it out.
Digitalferret 7/31/2024 5:33 AM
misread that as 'SHTF has some accessible online resources ..' and am like: What??? 🙂
😆 1
Avatar
Avatar
Ciprian Craciun
Indeed, turning off the Secure Boot (outside the BIOS menu which should be protected by a password) would qualify as bypassing it. Interesting attack, but if you think about it, it's quite expected, because in the end there must be some flag in there somewhere that enables or disables Secure Boot. However, my question is how easy it is for an attacker with limited physical access to the device, to do all this (dump the UEFI data, modify it, upload it again)? Does this just resume to opening the case, connecting to some pins on the MB or directly on some chip, and just dumping it? Or does it involve unsoldering some chip, doing stuff with it, and putting it back in? In the end, what I try to asses, is if physical security of the device (be it physically securing it, or having tamper evident enclosure) is mandatory for having an effective Secure Boot enabled (and trusted) environment.
Its not true in every case but for some laptops tampering with the settings is really just a case of open the bottom put a test clip onto the SPI flash chip and dump it then edit the dump and write it back, as a random example of some of the clips available i found these on aliexpress https://www.aliexpress.com/item/1005006906516613.html but soldering 6 wires or chip off with hot air does not take long. I used AMI aptio as an example as that is the one I have played with so I cant be sure about other makes, there are also laptops that use LPC flash which is a bit more of a nuisance to connect to and read. If it really matters I would consider tamper evidence a requirement.
Avatar
Avatar
whee30
I have hours of audio files to process... is there a good piece of (hopefully free/inexpensive) software that will bulk attempt to transcribe audio files?
Buzz is a nice GUI for Whisper https://github.com/chidiwilliams/buzz
Buzz transcribes and translates audio offline on your personal computer. Powered by OpenAI's Whisper. - chidiwilliams/buzz
Avatar
Avatar
Shogun//Rogan
Perhaps this has been asked and answered, but does anyone have book recommendations for DFIR?
LinuxLEO - https://linuxleo.com The Hitchhiker's Guide to DFIR - https://leanpub.com/TheHitchhikersGuidetoDFIRExperiencesFromBeginnersandExperts The latter IMHO is nice but the order of chapters is pretty random, not ranked by difficulty or similar... moreover it is heavily focused on IR
A first-of-its-kind crowdsourced Digital Forensics and Incident Response (DFIR) book by the Digital Forensics Discord Server members to share knowledge!
💯 1
Avatar
Shogun//Rogan 7/31/2024 7:56 AM
I've actually bought the Hitchhiker's Guide and have started going through it depending on what I have interest in.
7:57 AM
Currently working through Applied Incident Response and Digital Forensics for Legal Professionals.
Avatar
Avatar
Lazza
LinuxLEO - https://linuxleo.com The Hitchhiker's Guide to DFIR - https://leanpub.com/TheHitchhikersGuidetoDFIRExperiencesFromBeginnersandExperts The latter IMHO is nice but the order of chapters is pretty random, not ranked by difficulty or similar... moreover it is heavily focused on IR
Andrew Rathbun 7/31/2024 10:18 AM
That was by design! It wasn't meant to be coherent as a whole, rather, each chapter is independent on its own. Maybe before the final version we can reorganize it if that's what people want and what makes most sense. Feedback always welcome in #deleted-channel 🙂
👍 1
Avatar
Avatar
Andrew Rathbun
That was by design! It wasn't meant to be coherent as a whole, rather, each chapter is independent on its own. Maybe before the final version we can reorganize it if that's what people want and what makes most sense. Feedback always welcome in #deleted-channel 🙂
Just FYI, I am not able to send messages in that channel.
Avatar
Avatar
FullTang
Just FYI, I am not able to send messages in that channel.
Andrew Rathbun 7/31/2024 10:20 AM
I have no idea what changed or why, Looking into it now 🫡
Avatar
i discovered today that Ufed is no more perpetual license but via subscription. do someone know when this happened (the year)? I know for sure that back in 2018 was perpetual, but after some multiple years renewal i discovered today that if your license is expired and it take like 10 days to renew (avg time for account manager reply, quote subscribing, wire transfer...) you can't use Cellebrite products in any way. During these years i had no official communication of this 'passage' to subscription and it is not what i've subscribed in 2016. Also i cannot find any 'use interruption' in EULA. My account manager is a little vague on my questions, someone could tell me more?
Avatar
Avatar
SAA
i discovered today that Ufed is no more perpetual license but via subscription. do someone know when this happened (the year)? I know for sure that back in 2018 was perpetual, but after some multiple years renewal i discovered today that if your license is expired and it take like 10 days to renew (avg time for account manager reply, quote subscribing, wire transfer...) you can't use Cellebrite products in any way. During these years i had no official communication of this 'passage' to subscription and it is not what i've subscribed in 2016. Also i cannot find any 'use interruption' in EULA. My account manager is a little vague on my questions, someone could tell me more?
nachito 4n6s 7/31/2024 3:09 PM
Same happened to me a few days back, got the renewals for Inseyets UFED Pro and found out its via suscription and not perpetual anymore. Still waiting for my account manager to sort it out as well
Avatar
Avatar
SAA
i discovered today that Ufed is no more perpetual license but via subscription. do someone know when this happened (the year)? I know for sure that back in 2018 was perpetual, but after some multiple years renewal i discovered today that if your license is expired and it take like 10 days to renew (avg time for account manager reply, quote subscribing, wire transfer...) you can't use Cellebrite products in any way. During these years i had no official communication of this 'passage' to subscription and it is not what i've subscribed in 2016. Also i cannot find any 'use interruption' in EULA. My account manager is a little vague on my questions, someone could tell me more?
Depending on which country you are located, they may not be able to unilaterally change the EULA and get away with it
Avatar
Avatar
Lazza
Depending on which country you are located, they may not be able to unilaterally change the EULA and get away with it
'get away with it'...let's assume I'm located in Italy, do you really think they cannot change anything because I'm protected by italian law?
Avatar
Avatar
SAA
'get away with it'...let's assume I'm located in Italy, do you really think they cannot change anything because I'm protected by italian law?
I am not a lawyer, but if the contract you signed included a perpetual license (with separate paid annual upgrades), then the basic license is perpetual... The "codice civile" is not an optional. Moreover, every party which signs a contract must act in good faith (principio di buona fede e correttezza)
Avatar
Avatar
Lazza
I am not a lawyer, but if the contract you signed included a perpetual license (with separate paid annual upgrades), then the basic license is perpetual... The "codice civile" is not an optional. Moreover, every party which signs a contract must act in good faith (principio di buona fede e correttezza)
burden of proof is on the suing party (in italian: l'onere della prova è a carico di chi cita in giudizio) so an international trial should be initiated (so no italian civil law, codice civile, can be applied) and this is not convenient for a single person...
Avatar
Digitalferret 8/1/2024 1:11 AM
^subs. Subscriptions are the way of the future Unless your product is a one-off product that will not need continual updates and new features added to it and is relatively cheap to begin with — such as a video game — your segment of the market is all but certain to make the switch from a perpetual license to subscription pricing at some point, regardless of what you choose. Customers like it because they always have the latest version of the software and get to spread the cost of updates over a longer period. Companies like it for all the reasons stated so far. https://www.paddle.com/resources/subscription-vs-license Techsmith (snagit/Camtasia) also recently changed. Annoying that it is (i don't like recurring subs model) i can understand it, given the amount of channels that now offer "the latest and greatest" hacked software, version by version, for cheap. Surely this has to be an informed choice whichever country, so clients can formally accept terms?
Avatar
I would disagree on the "Customers like it", I agree on the other parts
💯 1
Avatar
Avatar
Lazza
I would disagree on the "Customers like it", I agree on the other parts
Digitalferret 8/1/2024 7:27 AM
check paddle home page. the write up fits their narrative / business model. folloowww the moneeeee 🙂
7:30 AM
Avatar
I mean, if "get to spread the cost of updates over a longer period" were true, I would understand. E.g. Adobe Photoshop. Back in the old days you might pay 1200 euros for a perpetual software license, nowadays it's a monthly cost of like 25 euros... and you can pause the subscription if you want. So it takes 4 years of subscriptions to pay the same amount as a perpetual license... They didn't just switch from 1200 "for life" to 1200 "per year"... Several forensic vendors nowadays keep an extremely high price point for a single year of licensing and you need to pay the full year upfront, with some good and notable exceptions (e.g. OSForensics which offers monthly licenses) Bottom line = "customers like subscription to spread the cost" is a blatant lie, the cost is not spread, it's just very much inflated
Avatar
Digitalferret 8/1/2024 7:36 AM
yyyyyyyyyyyyup. how "dealers" operate, lol. buy a batch, split it up, increase the per <unit> cost
Avatar
Shogun//Rogan 8/1/2024 7:40 AM
There's also a barrier to entry for smaller companies or organizations to use it.
☝️ 3
Avatar
Avatar
Shogun//Rogan
There's also a barrier to entry for smaller companies or organizations to use it.
This 1000 times. Like most DF practitioners in Italy, btw... after many years of sending representative at national conventions, vendor still struggle to understand how business is done here and why we are asking to pay in different ways (including for example "pay per device", or monthly subscriptions instead of annual)
Avatar
Beefhelmet 8/1/2024 7:55 AM
Anyone whose agency has/uses CD Pathfinder. I just wanted to ask a few questions about it. Feel free to DM me, but no CB sales people please. Thanks
Avatar
Avatar
Lazza
I mean, if "get to spread the cost of updates over a longer period" were true, I would understand. E.g. Adobe Photoshop. Back in the old days you might pay 1200 euros for a perpetual software license, nowadays it's a monthly cost of like 25 euros... and you can pause the subscription if you want. So it takes 4 years of subscriptions to pay the same amount as a perpetual license... They didn't just switch from 1200 "for life" to 1200 "per year"... Several forensic vendors nowadays keep an extremely high price point for a single year of licensing and you need to pay the full year upfront, with some good and notable exceptions (e.g. OSForensics which offers monthly licenses) Bottom line = "customers like subscription to spread the cost" is a blatant lie, the cost is not spread, it's just very much inflated
totally agree
Avatar
I was just told that we can only purchase @Magnet Forensics Axiom (for private company) on a one user to one license basis... in other words multiple users can't share one computer woth one Axiom License on it.. Is that true??
Avatar
Avatar
OregonDFIR
I was just told that we can only purchase @Magnet Forensics Axiom (for private company) on a one user to one license basis... in other words multiple users can't share one computer woth one Axiom License on it.. Is that true??
Axiom doesn’t recognize “users” from a day to day functionality standpoint. If you had 2 examiners alternating work on a single machine there’s no reason you couldn’t do that. If one worked day shift and one worked night shift it would function as designed. You could not however run multiple instances off of a single dongle/license.
Avatar
Avatar
Tim F
Axiom doesn’t recognize “users” from a day to day functionality standpoint. If you had 2 examiners alternating work on a single machine there’s no reason you couldn’t do that. If one worked day shift and one worked night shift it would function as designed. You could not however run multiple instances off of a single dongle/license.
OK!! that is correct, the sales guy doesn't know what he is talking about.... or my IT guy deosn't, but I will straighten out one of them! Thanks for the quick response.
Avatar
Avatar
OregonDFIR
OK!! that is correct, the sales guy doesn't know what he is talking about.... or my IT guy deosn't, but I will straighten out one of them! Thanks for the quick response.
If there’s ever concern that you’d need multiple users working on a single case simultaneously, multi license setup would be your best bet in that scenario.
Avatar
Avatar
Lazza
This 1000 times. Like most DF practitioners in Italy, btw... after many years of sending representative at national conventions, vendor still struggle to understand how business is done here and why we are asking to pay in different ways (including for example "pay per device", or monthly subscriptions instead of annual)
Shogun//Rogan 8/1/2024 12:40 PM
To add to this, I was just denied a grant that would have paid for DF equipment/license for my agency but the municipality attorney because the grant was "overbroad and restrictive" and now my entire administration has balked at buying software.
Avatar
Avatar
Tim F
If there’s ever concern that you’d need multiple users working on a single case simultaneously, multi license setup would be your best bet in that scenario.
copy that, not the case here, just need it occasionally and it can be located on one shared machine. Thanks again.
👍 1
Avatar
Avatar
Shogun//Rogan
To add to this, I was just denied a grant that would have paid for DF equipment/license for my agency but the municipality attorney because the grant was "overbroad and restrictive" and now my entire administration has balked at buying software.
Kevin Drogo 8/1/2024 4:38 PM
Wow
Avatar
Avatar
Shogun//Rogan
To add to this, I was just denied a grant that would have paid for DF equipment/license for my agency but the municipality attorney because the grant was "overbroad and restrictive" and now my entire administration has balked at buying software.
It would be interesting to know by country and globally how many consultants pay out of their own pocket and how many instead purchase on behalf of an administration. Because I have the feeling that the general increase in prices and the 'subscription' model also derive from poor economic management (those who use the tools are not actually those who shell out the money to purchase/update them)
Avatar
Does anyone know of a diagram for circuits repository for iPhone etc? Trying to find an accurate collated source of course only for only models
Avatar
Avatar
TetsuoAR
Does anyone know of a diagram for circuits repository for iPhone etc? Trying to find an accurate collated source of course only for only models
cf-eglendye 8/2/2024 2:29 AM
I think what you are referring to is board schematics? In our repair courses, we use ZXW for identification of components.
Avatar
Avatar
cf-eglendye
I think what you are referring to is board schematics? In our repair courses, we use ZXW for identification of components.
Apologies it’s getting the correct terms i struggle with, thank you that’s what i did mean
Avatar
Avatar
TetsuoAR
Apologies it’s getting the correct terms i struggle with, thank you that’s what i did mean
cf-eglendye 8/2/2024 2:31 AM
You can get a licence from FoneFunShop, who are based in the UK and sell lots of repair items.
Avatar
Avatar
cf-eglendye
You can get a licence from FoneFunShop, who are based in the UK and sell lots of repair items.
I was curious if like the “direct power to board” cables if there was a screen replication equivalent
Avatar
Avatar
TetsuoAR
Does anyone know of a diagram for circuits repository for iPhone etc? Trying to find an accurate collated source of course only for only models
Wuxinji is also amazing for iPhones along with ZXW, Wuxinji is what we use here
Avatar
Avatar
TetsuoAR
I was curious if like the “direct power to board” cables if there was a screen replication equivalent
cf-eglendye 8/2/2024 2:41 AM
Unsure exactly what you mean here...the cables you are referring to are often called squid cables and use a DC power supply to connect to the board. If you have a board removed from the housing, this is a good way to then test the handset and most labs will have "known good" screens - which can be used for testing if you are not getting a display out from the device.
Avatar
Avatar
cf-eglendye
Unsure exactly what you mean here...the cables you are referring to are often called squid cables and use a DC power supply to connect to the board. If you have a board removed from the housing, this is a good way to then test the handset and most labs will have "known good" screens - which can be used for testing if you are not getting a display out from the device.
Sorry I meant a universal device that can place the screen connectors onto the suspect device and then replicate without the need for screen replacement etc (currently need to order a few different parts but wondered if it’s a problem to be nipped in the bud as we aren’t replacing the screens permanently)
2:44 AM
The device would just read it as an aftermarket part but it would be usable in the interim for manual capture or device settings
Avatar
cf-eglendye 8/2/2024 2:46 AM
That is not something I am personally aware of, I would be intrigued to know if anyone else who deals with repair knows otherwise. But, it may also be worth posing your question in the Mobile Repair discord #associated-servers or on reddit r/mobilerepair
Avatar
Avatar
cf-eglendye
That is not something I am personally aware of, I would be intrigued to know if anyone else who deals with repair knows otherwise. But, it may also be worth posing your question in the Mobile Repair discord #associated-servers or on reddit r/mobilerepair
I’ve asked senior techs in my office too it appears to be an unknown thing but I’m sure it’s probably sorted but it’s finding the name for it
Avatar
cf-eglendye 8/2/2024 2:48 AM
To the best of my knowledge, most labs will use known good screens for each make / model of device, rather than having a generic output screen. But always willing to be proved wrong...every day is a learning day 🙂
Avatar
Avatar
Aero
Wuxinji is also amazing for iPhones along with ZXW, Wuxinji is what we use here
Is this direct via Wuxinji?
Avatar
Avatar
TetsuoAR
Is this direct via Wuxinji?
Yeah you can download Wuxinji, create an account through the software - then purchase a 1 year license through PayPal (via the software)
Avatar
Avatar
Aero
Yeah you can download Wuxinji, create an account through the software - then purchase a 1 year license through PayPal (via the software)
What’s the fee for that as their site doesn’t appear to display it? Given the source I’d have to run it by IT also
Avatar
Avatar
TetsuoAR
What’s the fee for that as their site doesn’t appear to display it? Given the source I’d have to run it by IT also
I think it was like 70 dollrs for the first year (so around £53) then its 50 dollars for every renewal
3:03 AM
We use Wuxinji for iPhones and Borneo Schematics for Android devices
Avatar
They have a Paypal link, it says 70 US dollars for the first year
Avatar
Avatar
Lazza
They have a Paypal link, it says 70 US dollars for the first year
thanks for confirming 😁
👍 1
Avatar
Thanks all for the above and clarification 👍 best source of info continuing to be proved
🫡 1
Avatar
@Law Enforcement [UK] Does anyone know if there is a national Risk Matrix that can be used for Digital Forensic submissions for UK Law Enforcement?
Avatar
Avatar
cdbandit
@Law Enforcement [UK] Does anyone know if there is a national Risk Matrix that can be used for Digital Forensic submissions for UK Law Enforcement?
Abstract. Digital forensic helps to unlock the evidential opportunities presented by digital devices. Ninety per cent of all cases in England and Wales car
Avatar
Avatar
cdbandit
@Law Enforcement [UK] Does anyone know if there is a national Risk Matrix that can be used for Digital Forensic submissions for UK Law Enforcement?
There is the Forensics21 Priority matrix which we use to measure the risks for each DF Submission. It’s outdated currently but it’s still in use.
Avatar
Avatar
cdbandit
@Law Enforcement [UK] Does anyone know if there is a national Risk Matrix that can be used for Digital Forensic submissions for UK Law Enforcement?
I believe Graeme Horsman from Cranfield was working on this very thing. Might be worth reaching out to him?
Avatar
Thank you all for the prompt responses. This gives me some lines of enquiry.
Avatar
Hey everyone, I'm pretty new to DFIR and just getting a grasp of the up to date tech now. Specifically interested in iOS extraction -- is there a real concern that apple will permanently block tools like Cellebrite or Graykey/Magnet, or is it like fundamentally impossible to really hide the necessary tools from memory (in the case of AFU)?
6:13 AM
Saw a report that Cellebrite can't open iOS 17.4 or later devices, but not sure if that's really a cause for concern/reason to go with another provider
Avatar
Hi folks, does anyone have a forensic analysis suite to recommend for AWS/macOS/windows/linux forensics, preferably something that could be deployed on a cloud service so that the suite can be shared by a team located in a few different countries. Thanks!
Avatar
funderpanda 8/2/2024 6:40 AM
👋🏼
Avatar
Just saw this article (https://cybersecuritynews.com/phones-cellebrite-tool-can-unlock/), is it a real concern that Cellebrite can't work on newer devices or does it usually get patched right away? And is it theoretically plausible that apple could block these tools from ever working? How does this compare to graykey
The leaked "iOS Support Matrix" and "Android Support Matrix" from April 2024 detail which specific phone models and operating system versions Cellebrite's tools can access, exposing gaps in the company's ability to crack newer devices.
Avatar
Avatar
brodie13
Just saw this article (https://cybersecuritynews.com/phones-cellebrite-tool-can-unlock/), is it a real concern that Cellebrite can't work on newer devices or does it usually get patched right away? And is it theoretically plausible that apple could block these tools from ever working? How does this compare to graykey
there is always a delay between "phone/OS gets put on the market" and "cellebrite can unlock it" Otherwise we would have quite a huge problem regarding modern tech security
Avatar
But is anyone in the industry concerned Cellebrite would be permanently unable to? Or is it always this perpetual game of cat and mouse
7:20 AM
Like is there something fundamental to the way information is stored in memory that means theoretically they should always be able to unlock a new device AFU?
Avatar
If it's smart, it's vulnerable - Hypponen's Law
👍 1
this 3
Avatar
Avatar
brodie13
But is anyone in the industry concerned Cellebrite would be permanently unable to? Or is it always this perpetual game of cat and mouse
Shogun//Rogan 8/2/2024 7:31 AM
Fundamentally, it's always a game of cat and mouse. There is no 100% fix to any vulnerability, because if there was a 100% fix, everyone would use it, and then someone would find a way to make it vulnerable. With enough desire, time and resources, you can make any device vulnerable - it's just a matter of how to to get there. Think of extraction tools as less of "x company allowing the device to be vulnerable" and more as "y company is discovering new ways to make the device vulnerable."
👍 1
Avatar
Thanks for the help, I'm very new here but will do a lot more research
Avatar
I just learned you can easily make a RAM disk with Arsonal Image Mounter. I am going to be using that all the time now!
Avatar
Avatar
FullTang
I just learned you can easily make a RAM disk with Arsonal Image Mounter. I am going to be using that all the time now!
I love @Arsenal Image Mounter, way better than FTK Imager and mounting a image/drive.
👌 1
👍 1
Avatar
Avatar
FullTang
I just learned you can easily make a RAM disk with Arsonal Image Mounter. I am going to be using that all the time now!
Haven't used it yet but will be experimenting with it over the weekend to see how this is better than Ftk.
Avatar
Avatar
Mo
Haven't used it yet but will be experimenting with it over the weekend to see how this is better than Ftk.
FTK is what I would call a 'lite' forensic analysis tool in addition to what it is normally used for in acquiring the forensic image. It provides good info on the file system, but there is no search functionality. FTK can also mount images, but when mounting a forensic image I usually prefer AIM because the mounted image tends to be less buggy, and with the pro version of AIM you can launch a Windows virtual machine from the image very easily. What I did not realize until now is that AIM can create a RAM disk. A RAM disk is a volume created from RAM, so it is extremely fast. If you are dealing with a large file or a bunch of files you can create a RAM disk, copy the files to the RAM disk, and work with them from there for increased performance. You have to have plenty of RAM on your workstation, but can help with manipulating and reviewing large datasets. I just used it for a manual review of ~16GB of photos, and it made the photos load super quick when switching between photos. I am sure I will find more uses for it in the future. https://www.kingston.com/en/blog/pc-performance/what-is-ram-disk
What if you could use memory as ultra-fast temporary storage? With RAM Disk, that’s exactly what you get.
👍 4
Avatar
I hope to not heat the discussion again, but this meme is too GOLD not to share https://infosec.exchange/@abrignoni/112903402523613097
😂 3
Avatar
(sorry if this is the wrong channel) Hello at all, somebody from a swiss LEA recommended me to join this group, since lots of professionals are here at one place. I'm the guy behind the 4n6pi project, kind of the same thing like a live forensics suite, just with an automated workflow when you plugin a harddisk via USB.(https://x.com/plonxyz/status/1809268766322118925) It was more a fun-project to distract me from a negative event in life, but since it blew up on x back then, I decided to make it open source once it's vetted by other professionals. If you want to play around with it please let me know. Currently it supports following functions: Creating an .e01 on a target disk or on a s3-bucket or an NFS-share. thanks for reading and appreciate feedback if you have any 🙂
Forensic disk imagers are expensive. So why not create one that not only generates .E01 images but also sends them to any storage you want? Plus, it's all configured by a single YAML file on a stick. I call it 4n6pi.
👍 3
Avatar
@plonxyz welcome to the group (and sorry I didn't get to do proper testing yet 😢)! You may want to check out the channel #dfir-open-source-projects as well!
Avatar
Avatar
Lazza
@plonxyz welcome to the group (and sorry I didn't get to do proper testing yet 😢)! You may want to check out the channel #dfir-open-source-projects as well!
@Lazza hey , nice to see you here as well 🙂 , no worries .. I just did some minor improvements , whenever you find time, just grab the newest image. Thanks , i haven't seen that channel , next time i'll post there (edited)
🙏 1
Avatar
Avatar
Zesh
does anybody have Knowledge about Kodex here?
Interested in talking about this
Avatar
Quick Question about Screenshots in Android. I got a Exhibit with many files of Interest in Android Gallery Cache (Original Files not existent). Many of these are Screenhots, i guess taken with same device. Is there A Database i can dive into with timestamps when screenshots where taken with the device? I could compare with Timestamps of the Cached Files. OS is Android 10
Avatar
The U.S. Senate's National Defense Authorization Act (NDAA) now classifies ransomware attacks on the same level as terrorism, allowing for the use of counterterrorism strategies against such cyber threats. https://cyberscoop.com/ransomware-terrorism-ndaa-2025/
Amid a rash of ransomware attacks, the Senate Intelligence Committee wants to treat the phenomenon like terrorism.
Avatar
Shogun//Rogan 8/7/2024 4:33 AM
Interesting read.
Avatar
Dumb question, but I was thinking on pitching kape for my company. I was curious if this is free to use or you need a license? I was guessing yes (edited)
Avatar
Avatar
Cash
Dumb question, but I was thinking on pitching kape for my company. I was curious if this is free to use or you need a license? I was guessing yes (edited)
Most likely need a license unless you are a government entity
👍 1
Avatar
Avatar
Cash
Dumb question, but I was thinking on pitching kape for my company. I was curious if this is free to use or you need a license? I was guessing yes (edited)
Depends on what you’re doing with it. If you’re using internally, then no. If you are using it for business (clients etc.) then yes, you need a license.
💯 1
Avatar
Faith in (American) humanity restored, but only for JFK airport it seems https://www.theverge.com/2024/7/29/24209130/customs-border-protection-unlock-phone-warrant-new-york-jfk
This ruling only applies to one specific region.
👍 1
Avatar
Shogun//Rogan 8/7/2024 3:06 PM
Similar doctrine is observed pretty universally across the United States, @Lazza. (edited)
3:07 PM
I'm not entirely sure the specifics of this story, but a warrant is generally required to search the contents of a phone absent other circumstances.
3:08 PM
US Courts have ruled the contents of a phone are similar to the contents of a locked container.
Avatar
Avatar
Shogun//Rogan
I'm not entirely sure the specifics of this story, but a warrant is generally required to search the contents of a phone absent other circumstances.
I was under the impression that this was not the case for a strip of "some miles" around the border, due to some law I heard but honestly forgot the name... So CBP were acting under that special rule John Oliver had an episode on Last Week Tonight about it
3:45 PM
I think I found a web page explaining it https://www.aclu.org/know-your-rights/border-zone (edited)
The Fourth Amendment of the U.S. Constitution protects people from random and arbitrary stops and searches. Although the federal government claims the power to conduct certain kinds of warrantless stops within 100 miles of the U.S. border, important Fourth Amendment protections still apply. This helps you understand your rights within the 100-mi...
Avatar
Avatar
Lazza
I was under the impression that this was not the case for a strip of "some miles" around the border, due to some law I heard but honestly forgot the name... So CBP were acting under that special rule John Oliver had an episode on Last Week Tonight about it
Shogun//Rogan 8/7/2024 4:47 PM
I think it's quite a bit more nuaced then that. I think the border search exception has been ruled valid by multiple circuit courts because of checkpoints on major highways and such away from the actual border. I believe there is currently a split in circuit courts whether cell phones specifically are subject to the 4th Amendment with repsect to this.
4:48 PM
I'd have to do some additional research on it though.
4:48 PM
@Lazza
Avatar
Avatar
Shogun//Rogan
I'm not entirely sure the specifics of this story, but a warrant is generally required to search the contents of a phone absent other circumstances.
Border Search Authority is what Customs has to conduct search without a warrant. Think how your luggage (airport) or vehicle (land border) can be searched and there are no warrant involved. They can even open your "locked" luggage. However, electronics are being treated (or have started to be so) differently...
Avatar
Shogun//Rogan 8/7/2024 4:58 PM
I know they had special authority. I'm just saying, in general, CPB isn't effecting that authority on every random citizen within 100 miles of the border, and that it is likely more nuanced then how the headline suggests (edited)
Avatar
Avatar
Shogun//Rogan
I know they had special authority. I'm just saying, in general, CPB isn't effecting that authority on every random citizen within 100 miles of the border, and that it is likely more nuanced then how the headline suggests (edited)
If I understand correctly, they use that authority inside airports... So The Verge is not wrong in claiming that the ruling changed something at least for New York City, ie before they could do that and now they cannot. This is what I get from reading the news, of course I am not a law expert let alone for US law
Avatar
Shogun//Rogan 8/7/2024 5:06 PM
I think they use the authority in more then just aiports. United States v. Vergara was a case related to the border search exception that happened in Tampa, Florida after a cruise ship returned from a trip to Cozumel. A warrantless forensic search of the phone of the suspect revealed CSAM.
5:06 PM
But also, HSI is an arm of Custom and Border Patrol and I've never known them to bypass a warrant just because they can.
5:06 PM
Just food for thought.
👍 1
Avatar
@Griffeye @Magnet Forensics Any way when using the compare images function with a video (right clicking on the thumbnails with 2 highlighted)? The problem is that the video comes up in the collage view rather than being able to scroll to a frame. Ultimately trying to look at a frame from a video side by side with a photo.
Avatar
tapatiosec 8/8/2024 9:40 PM
How long should I expect a Magnet acquire full file system acquisition of a 64 gb iPhone 8 plus to take?
Avatar
Avatar
tapatiosec
How long should I expect a Magnet acquire full file system acquisition of a 64 gb iPhone 8 plus to take?
Hans Leißner 8/9/2024 1:36 AM
@Magnet Forensics
Avatar
Avatar
tapatiosec
How long should I expect a Magnet acquire full file system acquisition of a 64 gb iPhone 8 plus to take?
facelessg00n 8/9/2024 2:00 AM
Depends how much data is on it. If it’s full up to a couple of hours. What’s the actual question ? (edited)
Avatar
tapatiosec 8/9/2024 6:48 AM
Well the funny thing is that it's going after 9 hours
Avatar
Avatar
facelessg00n
Depends how much data is on it. If it’s full up to a couple of hours. What’s the actual question ? (edited)
tapatiosec 8/9/2024 6:50 AM
The work station I'm using is i7 6700 with 24 gb of ram and I'm saving to a spinning hard drive.
Avatar
PhrostByte 8/9/2024 9:37 AM
@Magnet Forensics Should I be worried about this? It says AXIOM failed to build search index, but all artifacts appear to be present. Is this a known issue? I just updated the software yesterday.
9:37 AM
This is from AXIOM Examine v8.3.1.41227
Avatar
Avatar
tapatiosec
Well the funny thing is that it's going after 9 hours
Is magnet acquire capable of doing a full file system on its own? Or did you jailbreak the phone first?
Avatar
Yes
10:24 AM
I also tried UFADE and it did it way quicker than an hour. I'm wondering why Magnet Acquire is so slow
Avatar
Avatar
Lazza
Is magnet acquire capable of doing a full file system on its own? Or did you jailbreak the phone first?
Well, it's not capable of doing the FFS on its own. I jailbroke it with palen1x first
👍 1
Avatar
Avatar
tapatiosec
Well, it's not capable of doing the FFS on its own. I jailbroke it with palen1x first
OK thanks for clarifying, I would have been very surprised otherwise
Avatar
And got an image out of UFASE within 25-30 min or so
Avatar
Avatar
Lazza
OK thanks for clarifying, I would have been very surprised otherwise
What may be my problem? Does in need anything extra? (I already installed SSH and have it set up as default)
Avatar
Avatar
tapatiosec
What may be my problem? Does in need anything extra? (I already installed SSH and have it set up as default)
Unfortunately I have not used that tool in years because out of the box it is limited... What I may suggest is to try and make a tar archive manually via the command line, now that the phone is rooted
Avatar
tapatiosec 8/9/2024 1:01 PM
Hi, I'm currently messing around and looking at things from the image I took from my iPhone. When I look at Notes.sqlite in dbBrowser the notes section shows nothing but there are four notes that I have saved on the device. Why does this happen to me? (edited)
1:02 PM
1:03 PM
Avatar
What's the full path of the DB file you're looking at?
Avatar
tapatiosec 8/9/2024 8:16 PM
It's at /private/var/mobile/library/Notes/notes/sqlite
Avatar
Avatar
tapatiosec
It's at /private/var/mobile/library/Notes/notes/sqlite
Hans Leißner 8/9/2024 11:30 PM
Have u checked the associated WAL-file? Maybe the data is still there. (edited)
Avatar
Avatar
tapatiosec
The work station I'm using is i7 6700 with 24 gb of ram and I'm saving to a spinning hard drive.
In the future you may want to invest in a SSD also 😬
Avatar
Avatar
ryd3v
In the future you may want to invest in a SSD also 😬
I'm looking into getting one soon
Avatar
Would defiantly speed things up a bit
11:45 PM
Also is your windows machine on a ultra power performance plan? If it’s on balanced it way slow things down also
11:45 PM
I also like your wallpaper
11:46 PM
😁
Avatar
It's a desktop so I doubt power mode matters (edited)
Avatar
It can
11:46 PM
Windows may throttle down some things
11:46 PM
Better to max that baby out for good measure
11:46 PM
That’s what I always do anyways
Avatar
I'm pretty sure I never changed the power settings to lower. I'll check later on
Avatar
Has anyone used Frida before to bypass SSL pinning in android apps. need to look at some network traffic for misusing platforms. I'm a step away from bypassing SSL pinning but I've encountered this issue below. Any guidance on the issue below ? (edited)
3:23 PM
Avatar
Avatar
$CozyBear
Has anyone used Frida before to bypass SSL pinning in android apps. need to look at some network traffic for misusing platforms. I'm a step away from bypassing SSL pinning but I've encountered this issue below. Any guidance on the issue below ? (edited)
I tried once, freaking annoying I would say My life changed when I discovered the apk-mitm tool. It's so easy to use it's almost embarassing I like to use mitmproxy for sniffing HTTP/S traffic https://github.com/shroudedcode/apk-mitm (edited)
🤖 A CLI application that automatically prepares Android APK files for HTTPS inspection - shroudedcode/apk-mitm
❤️ 1
Avatar
Avatar
$CozyBear
Click to see attachment 🖼️
Might give this, or the reply under it, a try: https://github.com/frida/frida/issues/2326#issuecomment-1695846230
❤️ 1
Avatar
Avatar
Lazza
I tried once, freaking annoying I would say My life changed when I discovered the apk-mitm tool. It's so easy to use it's almost embarassing I like to use mitmproxy for sniffing HTTP/S traffic https://github.com/shroudedcode/apk-mitm (edited)
I also use this too, just drag and drop 😅. I think a variety of Frida scripts exists in order to overcome other nanuces of ssl pinning exisiting in apps. (edited)
Avatar
Avatar
Sea9
Might give this, or the reply under it, a try: https://github.com/frida/frida/issues/2326#issuecomment-1695846230
Thank you mate, will give this ago 🙂
Avatar
Do you guys have any recommendations on standalone tools to parse segb v1?
Avatar
Wow after 3 months of trying to use Frida and installing python libraries, it's finally worked. I can crack on with my investigation. I need to document this process xD (edited)
1:58 PM
Avatar
Avatar
tapatiosec
It's a desktop so I doubt power mode matters (edited)
It’s not so important for you older intel but really important for new generation intel and amd chips (10th gen onwards / zen 3 onwards / threadripper)
Avatar
Hi all, Silly question time. Can anyone recommend a tool that would be able to detect if a CSAM file is likely to have been generated by AI? I can see Hive Moderation partnered with Thorn to generate a tool. I'm hoping there are a few more tools out there.
Avatar
Avatar
Rom
Hi all, Silly question time. Can anyone recommend a tool that would be able to detect if a CSAM file is likely to have been generated by AI? I can see Hive Moderation partnered with Thorn to generate a tool. I'm hoping there are a few more tools out there.
Instances of synthetic, or deepfake, media have seen a dramatic increase in recent years, with an estimated 500,000 video and voice deepfakes shared on social media in 2023. While deepfakes aren’t a new phenomenon, advances in machine learning and AI have increased the speed, accuracy, and availability of developing synthetic media. And the sour...
Avatar
Avatar
Rom
Hi all, Silly question time. Can anyone recommend a tool that would be able to detect if a CSAM file is likely to have been generated by AI? I can see Hive Moderation partnered with Thorn to generate a tool. I'm hoping there are a few more tools out there.
Digitalferret 8/12/2024 4:11 AM
most all I've seen, other than Hive, are online which is obviously? a no go given the content. Illuminarty looks web based but also has a We provide a separate service for communities and enterprises, please contact us if you would like an arrangement. statement. Mk1 eyeball might also work, magnify to max and look for "too perfect", inconsistencies, lack of background detail and so on. also yeh "likely" is possibly best return Are AI image detection tools 100% accurate? No, while these tools are trained on large datasets and use advanced algorithms to analyze images, they're not infallible. There may be cases where they produce inaccurate results or fail to detect certain AI-generated images. https://usefulai.com/tools/ai-image-detectors (edited)
Avatar
Avatar
Digitalferret
most all I've seen, other than Hive, are online which is obviously? a no go given the content. Illuminarty looks web based but also has a We provide a separate service for communities and enterprises, please contact us if you would like an arrangement. statement. Mk1 eyeball might also work, magnify to max and look for "too perfect", inconsistencies, lack of background detail and so on. also yeh "likely" is possibly best return Are AI image detection tools 100% accurate? No, while these tools are trained on large datasets and use advanced algorithms to analyze images, they're not infallible. There may be cases where they produce inaccurate results or fail to detect certain AI-generated images. https://usefulai.com/tools/ai-image-detectors (edited)
Was also gonna say, not sure how reliable/accurate tools claiming to detect AI generated media actually are. I guess it depends on the use-case(s) but I imagine a dodgy actor creating CSAM, for example, might take some steps to obfuscate the method used which may or may not foil said tools. 🤷‍♂️
Avatar
Avatar
bizzlyg
Was also gonna say, not sure how reliable/accurate tools claiming to detect AI generated media actually are. I guess it depends on the use-case(s) but I imagine a dodgy actor creating CSAM, for example, might take some steps to obfuscate the method used which may or may not foil said tools. 🤷‍♂️
Digitalferret 8/12/2024 4:31 AM
yeh, got you. think the perps are more concerned with just generating revenue than fooling the cops. in either case, AI or IRL, folks are pretty much in the 💩 if/when caught.
Avatar
Avatar
Digitalferret
yeh, got you. think the perps are more concerned with just generating revenue than fooling the cops. in either case, AI or IRL, folks are pretty much in the 💩 if/when caught.
Yeah, I think the issue with the CSAM piece is that, as far as I am told, to create "accurate" CSAM, it requires some specific methods. You can't just load up midjourney and ask for CSAM, understandably. So my concern is that effort that went into abusing the models to generate CSAM, maybe includes things that makes using a "generic" AI image detection method unsuitable. But I am speculating here, don't have first hand experience of investigating AI generated CSAM. There are a bunch of LE affiliated people in the UK working on these kinds of emerging threats though, and they mentioned that solutions they had tested so far (not sure which) did not work well on images produced using a non standard method or common off the shelf model - CSAM being an example. (edited)
👍🏻 1
Avatar
Thank you all for your speedy responses. I've noted the options presented by all of you. I believe that the tools are still developing to combat this new technology and as such, it's probably too early to move away from the MK1 eyeball.
👍🏻 1
Avatar
Hello all! I recently completed my GIME cert and want to play around with some old iPhones for forensic / log analysis. Any recommendations on tools for Jailbreaking?
Avatar
Avatar
crypto_0
Hello all! I recently completed my GIME cert and want to play around with some old iPhones for forensic / log analysis. Any recommendations on tools for Jailbreaking?
for old models, check out palera1n or checkra1n depending on the iOS version
Avatar
Digitalferret 8/12/2024 8:17 AM
lol, politics aside and talking of AI generated, didn't expect this sort of story 🙂 https://www.bbc.co.uk/news/articles/cx2lmm2wwlyo Donald Trump has falsely claimed a crowd which gathered to see Vice President Kamala Harris speak in Michigan last week “didn’t exist” and an image showing it was AI generated. Prof Hany Farid, a specialist in image analysis at UC Berkeley, has examined the photograph using software designed to detect AI-generated images and says “we found no evidence that this image is AI-generated or digitally altered”. that and several other pics.
8:19 AM
kinda reminds me of kid gaming yrs back. if you got killed and felt that you were pretty much immortal where you were there were always screams of "Wallhack!!!!" this kinda things gonna be pretty regular. Perps: "i was hacked ...>> .. it was AI generated .. i didn't do it, i wasn't there ..." (edited)
Avatar
Avatar
Rom
Hi all, Silly question time. Can anyone recommend a tool that would be able to detect if a CSAM file is likely to have been generated by AI? I can see Hive Moderation partnered with Thorn to generate a tool. I'm hoping there are a few more tools out there.
Happy to share in private info on my last AI job
Avatar
Does anyone know if it’s possible to extract deleted data from a CD-RW? If so what tools do you use?
Avatar
Avatar
ron
Does anyone know if it’s possible to extract deleted data from a CD-RW? If so what tools do you use?
Back in the days you could use dvdisaster to create an ISO file of the whole disk, I think, not just the "allocated" size (If I remember correctly), skipping unreadable sectors Given that an ISO disk image is more or less like a DD file, that is a good starting point It seems that dvdisaster has been forked and improved by another developer here: https://github.com/speed47/dvdisaster?tab=readme-ov-file
A tool providing additional ECC protection for optical media (unofficial version) - speed47/dvdisaster
this 1
🔥 2
Avatar
Frida is a dynamic instrumentation toolkit to debug and analyze processes in multiple platforms (Windows, Linux, MacOS, Android, iOS, ...).
Step 1) Follow through all steps in and ensure you have root on your Android Virtual Device Step 2) Install python3 from Step 3) Launch command prompt and run the command “pip”. If you …
Avatar
Avatar
ron
Does anyone know if it’s possible to extract deleted data from a CD-RW? If so what tools do you use?
bluemonkey4n6 8/12/2024 8:04 PM
The last time I did a CD/DVD recovery, I used CD/DVD Inspector by InfinaDyne. Great tool for acquy multisession optical media as well.
🔥 1
Avatar
Has anyone dealt with trying to locate a 911 phone? My agency is currently getting numerous 911 calls from the same 911 phone to the point that they now want to locate the phone and charge the individual with abuse of 911. However the question becomes how to track said phone. Apparently they know the residence they are at but want to know if there is anyway to identify the type or phone or specific info on the device to get a warrant. Any thoughts?
Avatar
Avatar
tydras
Has anyone dealt with trying to locate a 911 phone? My agency is currently getting numerous 911 calls from the same 911 phone to the point that they now want to locate the phone and charge the individual with abuse of 911. However the question becomes how to track said phone. Apparently they know the residence they are at but want to know if there is anyway to identify the type or phone or specific info on the device to get a warrant. Any thoughts?
Apologies my for ignorance here, just curious more than anything, but wouldn’t this be something you could contact the associated carrier about?
Avatar
Avatar
chick3nman
Apologies my for ignorance here, just curious more than anything, but wouldn’t this be something you could contact the associated carrier about?
Dont know the carrier because its a 911 phone
Avatar
Ahh I see
Avatar
Avatar
tydras
Has anyone dealt with trying to locate a 911 phone? My agency is currently getting numerous 911 calls from the same 911 phone to the point that they now want to locate the phone and charge the individual with abuse of 911. However the question becomes how to track said phone. Apparently they know the residence they are at but want to know if there is anyway to identify the type or phone or specific info on the device to get a warrant. Any thoughts?
We had a case simular to this, I'll DM you.
Avatar
Avatar
DCSO
We had a case simular to this, I'll DM you.
you're marked as likely spammer, your DMs will probably get immediately blocked
Avatar
Open question, have any government/Police forces considered private outsourcing, if so - to what degree. There's ongoing consideration to compare annual running costs for our lab against private companies. I feel like there are plenty of considerations that are being missed outside of a simple cost but perhaps others have also looked into this and could provide some information? Appreciate any responses.
Avatar
Avatar
CH.uk?!
Open question, have any government/Police forces considered private outsourcing, if so - to what degree. There's ongoing consideration to compare annual running costs for our lab against private companies. I feel like there are plenty of considerations that are being missed outside of a simple cost but perhaps others have also looked into this and could provide some information? Appreciate any responses.
That's not a thing in the UK? Interesting to see how different countries and systems work
Avatar
Has anyone here tried running dotnet based applications on macos via wine? A friend needs to run timeline explorer, but apparently the exe is x64 which is giving problems
Avatar
Avatar
Nisarg
Has anyone here tried running dotnet based applications on macos via wine? A friend needs to run timeline explorer, but apparently the exe is x64 which is giving problems
Andrew Rathbun 8/13/2024 10:36 AM
Timeline Explorer's .NET 6 version should run on Linux/macOS, but I've never done it before. Have they tried running the DLL instead of the .exe?
Avatar
Avatar
Andrew Rathbun
Timeline Explorer's .NET 6 version should run on Linux/macOS, but I've never done it before. Have they tried running the DLL instead of the .exe?
Oh, nope I'll tell him to try it! Honestly wine is a lifesaver
Avatar
Avatar
Nisarg
Oh, nope I'll tell him to try it! Honestly wine is a lifesaver
Andrew Rathbun 8/13/2024 10:37 AM
I know on Linux you have to run the DLL, or call the DLL instead of the exe, as well as having .NET 6 installed, naturally.
Avatar
Avatar
Andrew Rathbun
I know on Linux you have to run the DLL, or call the DLL instead of the exe, as well as having .NET 6 installed, naturally.
Interesting, I can't verify atm due to total hardware issues on my machine but I'll pass it on, thanks!
Avatar
Avatar
Lazza
That's not a thing in the UK? Interesting to see how different countries and systems work
Outsourcing work is a thing but this sounds like the entire lab.
Avatar
Avatar
Andrew Rathbun
I know on Linux you have to run the DLL, or call the DLL instead of the exe, as well as having .NET 6 installed, naturally.
But as far as I know this only works for the CLI programs of EZTools, because for the GUI programs you need .NET Desktop Runtime and this is only available for Windows: https://dotnet.microsoft.com/en-us/download/dotnet/6.0
.NET 6.0 downloads for Linux, macOS, and Windows. .NET is a free, cross-platform, open-source developer platform for building many different types of applications.
Avatar
Avatar
DFIR_tist
But as far as I know this only works for the CLI programs of EZTools, because for the GUI programs you need .NET Desktop Runtime and this is only available for Windows: https://dotnet.microsoft.com/en-us/download/dotnet/6.0
Andrew Rathbun 8/13/2024 12:05 PM
ah yes, fair point, thank you for pointing this out!
Avatar
no problem, I was aware because I recently searched for a solution to run Timeline Explorer in Linux, but maybe I will give wine a try
Avatar
Avatar
bizzlyg
Outsourcing work is a thing but this sounds like the entire lab.
My initial impression is that it could go that far yes. Work has been outsourced before but the scale being discussed implies a much greater (if not total) reliance on external contracts. The big initial question is cost.
Avatar
Avatar
CH.uk?!
Open question, have any government/Police forces considered private outsourcing, if so - to what degree. There's ongoing consideration to compare annual running costs for our lab against private companies. I feel like there are plenty of considerations that are being missed outside of a simple cost but perhaps others have also looked into this and could provide some information? Appreciate any responses.
Would be great if they did that here in Canada for the private sector
Avatar
Hi all, is anyone aware of a commercial tool, or script, or other solution that can successfully parse a docx file which has embedded files within? My research to date indicates that embedded Word documents are stored within the archive structure without modification, however PDF files are converted to BIN format and have extra bytes added to the start and end of the file, (which can be deleted via a script looking for the magic byte headers and footers). Outlook MSG files also get converted into BIN files and must also be modified in some way; there don’t seem to be added bytes like the PDF files, but simply renaming them back to .MSG doesn’t work. They don’t appear to be re-encoded but I may be wrong. I’m at the early stages of properly looking into this. There’s probably many others as well. Just curious if anyone is aware of any tool that can properly handle all of this gracefully?
Avatar
Avatar
ShaunC
Hi all, is anyone aware of a commercial tool, or script, or other solution that can successfully parse a docx file which has embedded files within? My research to date indicates that embedded Word documents are stored within the archive structure without modification, however PDF files are converted to BIN format and have extra bytes added to the start and end of the file, (which can be deleted via a script looking for the magic byte headers and footers). Outlook MSG files also get converted into BIN files and must also be modified in some way; there don’t seem to be added bytes like the PDF files, but simply renaming them back to .MSG doesn’t work. They don’t appear to be re-encoded but I may be wrong. I’m at the early stages of properly looking into this. There’s probably many others as well. Just curious if anyone is aware of any tool that can properly handle all of this gracefully?
facelessg00n 8/13/2024 10:07 PM
What are you trying to parse out of it / what tools are you using. X-ways and axiom can pull most embedded artefacts out of word documents
Avatar
@CH.uk?! We’ve just come the other way in the last few years. We used to outsource but the costs were prohibitive (800 quid a phone for extraction) then there’s court attendances (day rate at 350 quid for their scientist), reporting, etc all to factor in. Also you lose control of the data, could you imagine a CSAM case going privately?? Depending on your volume it some works out cheaper to run an in house lab (my side of the water anyways). Not sure what ISO certification sets you back as we don’t need it in Ireland (edited)
👍 1
Avatar
"Also you lose control of the data, could you imagine a CSAM case going privately??" That is routine here 👀
Avatar
Bit of a long shot, but is anyone here an Intel (the CPU manufacturer) representative or has good contact with one?
Avatar
Avatar
RichardG
@CH.uk?! We’ve just come the other way in the last few years. We used to outsource but the costs were prohibitive (800 quid a phone for extraction) then there’s court attendances (day rate at 350 quid for their scientist), reporting, etc all to factor in. Also you lose control of the data, could you imagine a CSAM case going privately?? Depending on your volume it some works out cheaper to run an in house lab (my side of the water anyways). Not sure what ISO certification sets you back as we don’t need it in Ireland (edited)
CSAM cases routinely outsourced by UK police atm. In fact I imagine that this is still probably the bulk of what is outsourced, although I suspect those are cases deemed less complex, or at the lower end of the offending scale, but not sure. Surely plenty of UK police in here to provide detail on this.
Avatar
Avatar
CH.uk?!
My initial impression is that it could go that far yes. Work has been outsourced before but the scale being discussed implies a much greater (if not total) reliance on external contracts. The big initial question is cost.
I would echo @RichardG here and say that the cost of outsourcing everything is surely going to be huge and very difficult to keep control of. There are so many caveats and situations where a "basic" case could become way more complex and involved and take up a lot more time/effort, all of which is billable. (edited)
Avatar
Avatar
Fr0stByt3
Bit of a long shot, but is anyone here an Intel (the CPU manufacturer) representative or has good contact with one?
Digitalferret 8/14/2024 4:17 AM
feel free to echo / Xpost that in #lab-hardware too
👍 1
Avatar
Avatar
CH.uk?!
Open question, have any government/Police forces considered private outsourcing, if so - to what degree. There's ongoing consideration to compare annual running costs for our lab against private companies. I feel like there are plenty of considerations that are being missed outside of a simple cost but perhaps others have also looked into this and could provide some information? Appreciate any responses.
Digitalferret 8/14/2024 4:23 AM
if it's any use, the flip side of this from an M.D of a reputable co in the UK is that the training/certification/other for doing that work is comparitively high for them. They also have the issue of grading the images, which may differ from what the officer in charge would grade them as. This, he says could cause issues for whoever takes it to court. The final nail for them was that there are companies out there who will now image devices for v.cheap and all things taken into consideration, they simply can't compete. That's broadstrokes ie don't quote me etc.
👍 2
Avatar
Dr. Kaan Gündüz 8/14/2024 5:05 AM
if your lab is ISO17025 (or similar) accredited perhaps outsourcing to a lab with the same accreditation could work out (with maybe the same methods and SOPs).
5:08 AM
the cost? well that's the real issue isn't it 🙂
Avatar
Yeah it appears the biggest above anything else really. Thank you everyone for your input so far. There's a lot of different discussions happening in the lab but none appear to have a postivie outcome for our in house capability. (edited)
Avatar
Hi, I'm new to this group and DFIR. I'm working with cfreds Hacking Case and just curious, is there a way to look at the data in unallocated disk ? Or anyway to convert that unallocated space to .img file ?
Avatar
Is someone able to identify this device? (edited)
Avatar
Avatar
CJ
Hi, I'm new to this group and DFIR. I'm working with cfreds Hacking Case and just curious, is there a way to look at the data in unallocated disk ? Or anyway to convert that unallocated space to .img file ?
Carving and its Implementations in Digital Forensics: Explore the significance and diverse applications of carving techniques in digital forensics, essential for data recovery and investigative analysis.
👍🏻 1
Avatar
Avatar
(.df.)
Is someone able to identify this device? (edited)
Hans Leißner 8/14/2024 6:57 AM
One Plus?
Avatar
Avatar
Hans Leißner
One Plus?
The front has this logo, does not appear to be a cell phone. (edited)
Avatar
Hans Leißner 8/14/2024 6:58 AM
Ahh ok
Avatar
It was found in a car by a client without any indication of where/how it got there. I'm waiting to have the device shipped to me but figured I"d do some preliminary work with the group
Avatar
Hans Leißner 8/14/2024 7:07 AM
Weird 😂
heckyes 1
Avatar
@Cellebrite can someone give me a quick and dirty price point for a translation package for Physical Analyzer? Im looking for a ballpark figure for the basic 5 language package. DM me if you need to.
Avatar
Avatar
(.df.)
Is someone able to identify this device? (edited)
Download NFC Reader APK 1.0.3 - Unlock a world of convenience with our NFC Reader! - App: com.nfcreader.development.ao by Strong Life Lmitd - Latest Version - Free
💡 1
Avatar
Found it. AceCard tracker
🫡 2
👍 1
Avatar
Avatar
facelessg00n
What are you trying to parse out of it / what tools are you using. X-ways and axiom can pull most embedded artefacts out of word documents
Currently using Intella, as these particular documents are part of an Investigation for my organisation. It finds them, parses them out and shows the relationship to the parent item just fine. It even parses text from within them, just not “intelligently” that would have it then present them as they type of file they really are. I’m probably hoping for too much though. I’ve got Axiom so I’ll try that. I’m probably going to have to script something; this will be an ongoing problem as people will continue to embed files in Word docs.
Avatar
Avatar
freshman
@Cellebrite can someone give me a quick and dirty price point for a translation package for Physical Analyzer? Im looking for a ballpark figure for the basic 5 language package. DM me if you need to.
facelessg00n 8/14/2024 2:30 PM
https://github.com/facelessg00n/pythonForensics/tree/main/offlineTranslate I made this if you want to translate the excels for free.
Assorted Python. Contribute to facelessg00n/pythonForensics development by creating an account on GitHub.
💯 1
🔥 1
Avatar
Avatar
facelessg00n
https://github.com/facelessg00n/pythonForensics/tree/main/offlineTranslate I made this if you want to translate the excels for free.
This is fantastic! I will try this out. Thank you!
Avatar
Avatar
freshman
This is fantastic! I will try this out. Thank you!
facelessg00n 8/14/2024 2:35 PM
All good. We had a fair few issues with the built in translation options so built this.
Avatar
Avatar
facelessg00n
All good. We had a fair few issues with the built in translation options so built this.
Well thank you for sharing your skillz and talents 🙂
Avatar
Avatar
freshman
Well thank you for sharing your skillz and talents 🙂
facelessg00n 8/14/2024 2:37 PM
All good. I need to update the read me but it does support Cellebrite excels now 😂
Avatar
Avatar
facelessg00n
All good. I need to update the read me but it does support Cellebrite excels now 😂
Thanks great! I’m going to try it on that first - and then I’ll tackle the several Axiom extractions that also need translating.
Avatar
facelessg00n 8/14/2024 2:40 PM
Cool. DM me if you get stuck with it.
Avatar
Avatar
Fr0stByt3
Bit of a long shot, but is anyone here an Intel (the CPU manufacturer) representative or has good contact with one?
Could try via Overclockers or similar?
Avatar
Avatar
CH.uk?!
Yeah it appears the biggest above anything else really. Thank you everyone for your input so far. There's a lot of different discussions happening in the lab but none appear to have a postivie outcome for our in house capability. (edited)
Ross Donnelly 8/15/2024 5:17 AM
Without proper controls, outsourcing inevitably ends up being decided on price alone. That leads to a race to the bottom - for both price and quality. It can work, but needs a lot of thought to make it work.
9:25 AM
Capturing from an app where it's connecting 'firebaseremoteconfig.googleapis[.]com' does anyone have an idea 'analyticsUserProfile' relate too ? (edited)
9:26 AM
I'm assuming the APK uses firebase as its infrastructure but guessing the tag means user metadata ?
Avatar
Searched keywords but couldn’t find a reference. What is an ESP ID in Discord re: an ICAC investigation?
Avatar
blackleitus 8/15/2024 9:54 AM
As a general rule, how many ssids can a pentester test in a timeframe of 8 hours for wireless pentest?
Avatar
Avatar
blackleitus
As a general rule, how many ssids can a pentester test in a timeframe of 8 hours for wireless pentest?
Would not say its a rule at all. In 8 hours you could test thousands of them.
Avatar
Avatar
NGLA
Searched keywords but couldn’t find a reference. What is an ESP ID in Discord re: an ICAC investigation?
I believe that would be Electronic Service Provider Identification.
Avatar
Hello! I have an apple iPhone 12 that I am examining with interest in a specific image found on the device. The image is a .jpg and saved in DCIM. It shows the bundle ID as Instagram and shows a created time on 7/25. I found the associated thumbnail for the image which shows a created date of 7/31. Coincidentally, there is a large number of thumbnails created at the same time on 7/31. I cannot find an associated Instagram thread where the image may have come from and I am looking to determine when the image first appeared on the phone
Avatar
@Steve The thumbnail was likely located in a container in the file system. The created date for the full image in DCIM will be the date that it was save to the Photo album. The created date for the thumbnail was the date the thumbnail was saved to that folder in the database. It’s important to look at the full path of the thumbnail as it will give you valuable information as to the process that created the thumbnail. Whether it’s a third party app or a native iOS application may help tremendously in determining how the actor interacted with the image.
Avatar
Wired is spreading misinformation regarding Pixel phones: https://threadreaderapp.com/thread/1824138861989204099.html
🤔 1
Avatar
Avatar
Lazza
Wired is spreading misinformation regarding Pixel phones: https://threadreaderapp.com/thread/1824138861989204099.html
Digitalferret 8/16/2024 4:02 AM
is that a statement of fact or Graphene going off on one again?
4:02 AM
checked several reports, after you posted, the one's I've seen make it explicitly clear the app has to be activated (edited)
Avatar
Exactly.
Avatar
Digitalferret 8/16/2024 4:03 AM
they also libel the companies providing the reports
Avatar
But Wired is claiming some BS about a very serious vulnerability... so serious you need to have physical access to the phone, and also the user's passcode, in order to activate the app first... Like, seriously 🤣
Avatar
Digitalferret 8/16/2024 4:05 AM
“Google embedding third-party software in Android's firmware and not disclosing this to vendors or users creates significant security vulnerability to anyone who relies on this ecosystem,” Stuckey tells WIRED. He added that his interactions with Google throughout the standard 90-day disclosure window “severely eroded our trust in the ecosystem. To protect our customers, we have had to make the difficult decision to move away from Android in our enterprise.”
Avatar
Google's interaction is a different thing... The article's claims are incredibly misleading in both the severity of the issue and its practical implications, as another user pointed out:
Only the 8th paragraph, not visible pre-paywall, says attackers need "physical access to a victim's phone as well as their system password" to "exploit" this "quite troubling" "vulnerability" and install evil apps
https://social.scriptjunkie.us/@sj/112967367820496540
(edited)
Yeah, this Wired pixel "flaw" story is incredibly misleading. Only the 8th paragraph, not visible pre-paywall, says attackers need "physical access to a victim's phone as well as their system password" to "exploit" this "quite troubling" "vulnerability" and install evil apps🙄 You know what else an attacker could do with physical phone possessio...
Avatar
Digitalferret 8/16/2024 4:14 AM
this could be activated by anyone purporting to help the client tho. with so many back street repair shops nowadays, anyone can go in, give their trust. as ever, the user is the weak link. The reports state the app is on there, it's activatable, and once active presents a risk, surely?
4:16 AM
semi amusing that a "security" co had their Twitter account stolen. Here's a thread from 2017 posted from our project's previous Twitter account which was stolen in 2018:
4:18 AM
доверяй, но проверяй 🙂
4:24 AM
tbf, FUD has been employed since day one, by most companies offering paid 'security' solutions. i mean, look how VPN has taken off, and the snake oil around it, from certain Co's
👍 1
Avatar
Well, I'd dare to say the most dangerous kind of fake news is the one where some facts are presented in a misleading way so the average reader gets to the wrong conclusion (this includes FUD that you mentioned)... This is what is happening here with Wired. Like claiming that 100% of people found dead, in the history of humanity, had traces of Dihydrogen Monoxide in their bodies... I mean, sure, yeah, does it make water dangerous? 😄 Not all readers are so tech-savvy to understand the vuln is basically not applicable to 99.9% of users. Yes, Google's response was inadequate, that is a point the article conveys correctly, but overall it is doing a disservice to the reader (and free advertising for those "security" vendors).
Avatar
Digitalferret 8/16/2024 4:34 AM
Like claiming that 100% of people found dead, in the history of humanity, had traces of Dihydrogen Monoxide in their bodies... I mean, sure, yeah, does it make water dangerous? water has the potential to be dangerous. people should be alerted to this fact. that it could be the cause of death will only affect a pecentage but there are public information films in abundance warning of the fact 🙂 calling it by that name, yeh, BS to baffle brains. much like the fabulously sounding acid in haircaare products.
Avatar
Digitalferret 8/16/2024 4:41 AM
full disclosure: when G_OS <persons> came in here posting their stuff, and then arguing with admin about its admissibility in here, it pissed more than a few off. Then making statements that some LEA dude(s) got the Admin to boot them (and it being a completely false accusation) worsened their case. They did themselves no favours, in respect of being a trustable entity. Hackles are raised, therefore, when anything with a G_OS label appears in forum. (edited)
4:43 AM
it will be interesting to see if any of the Co's they slandered defamed will take it further, legally, or by reply online. (edited)
4:46 AM
it may be that Wired themselves, or the other Co's, are taken to task, but it seems like Google are taking both notice and action regarding the app (edited)
Avatar
I was not aware that even mentioning Graphene was an issue, I will refrain from doing that going forward, sorry. Here's a post from an unrelated person, not affiliated with them, which conveys a similar message https://x.com/ArtemR/status/1824098989496762837
Because the app is disabled by default, an attacker would have to have physical access to the device to enable it, at which point they could just plant their malware 10 times over anyway. As a result, Google did not treat this issue with priority and still hasn't shipped an
Avatar
Avatar
PhrostByte
I believe that would be Electronic Service Provider Identification.
Thank you!
Avatar
Avatar
Lazza
I was not aware that even mentioning Graphene was an issue, I will refrain from doing that going forward, sorry. Here's a post from an unrelated person, not affiliated with them, which conveys a similar message https://x.com/ArtemR/status/1824098989496762837
Digitalferret 8/16/2024 5:30 AM
I was not aware that even mentioning Graphene was an issue context is everything, DFIR? may have been better in #off-duty , but thanks for your consideration. To reassure others, mention of Graphene_OS in terms of Forensics here is not forbidden. Their published opine/venting and such here and without specific context to forensics, from the Forensics side, is to be discouraged. (edited)
Avatar
Avatar
Lflores
@Steve The thumbnail was likely located in a container in the file system. The created date for the full image in DCIM will be the date that it was save to the Photo album. The created date for the thumbnail was the date the thumbnail was saved to that folder in the database. It’s important to look at the full path of the thumbnail as it will give you valuable information as to the process that created the thumbnail. Whether it’s a third party app or a native iOS application may help tremendously in determining how the actor interacted with the image.
Thank you so much for this!
Avatar
Avatar
freshman
@Cellebrite can someone give me a quick and dirty price point for a translation package for Physical Analyzer? Im looking for a ballpark figure for the basic 5 language package. DM me if you need to.
Semantics 21 (Tom) 8/16/2024 8:36 AM
If you're needing to translate image (OCR) text, we'll be adding it to LASERi-X for free in the next few weeks. Are Cellebrite charging for translation 🫣
👍 3
Avatar
I’m sorry why do we have to be afraid of water ?
Avatar
Avatar
Semantics 21 (Tom)
If you're needing to translate image (OCR) text, we'll be adding it to LASERi-X for free in the next few weeks. Are Cellebrite charging for translation 🫣
facelessg00n 8/16/2024 8:05 PM
One of the other companies recently introduced translation and is now charging for it as well despite it being built off a open source model. I get there is R&D and development costs etc but some of the pricing models seem a bit cheeky these days.
👍 2
Avatar
Avatar
facelessg00n
One of the other companies recently introduced translation and is now charging for it as well despite it being built off a open source model. I get there is R&D and development costs etc but some of the pricing models seem a bit cheeky these days.
Semantics 21 (Tom) 8/17/2024 12:47 AM
Got to keep those share holders happy, I’m not sure how long the Police can keep paying these price hikes.
🫡 1
Avatar
Avatar
ryd3v
I’m sorry why do we have to be afraid of water ?
Digitalferret 8/17/2024 1:58 AM
fish **** in it, for one 🙂
😆 1
Avatar
Hi, I am dealing with a cisco cp-8865 and i would like to migrate the firmware to 3pcc. May anyone advise how I can do it. I would like to use it with nextiva and not be limited to cisco. if it needs a licene advise on how I can purchse one to change the firmware
Avatar
blackleitus 8/17/2024 10:33 PM
someone into appsec, how long are appsec assessments?
Avatar
Avatar
facelessg00n
One of the other companies recently introduced translation and is now charging for it as well despite it being built off a open source model. I get there is R&D and development costs etc but some of the pricing models seem a bit cheeky these days.
R&D mostly being "including open source binaries and putting a GUI with 3 fields on top" 🤭 (edited)
Avatar
Avatar
blackleitus
someone into appsec, how long are appsec assessments?
Electrolyze 8/18/2024 9:35 AM
Difficult question to answer without some context.
Avatar
Avatar
Electrolyze
Difficult question to answer without some context.
blackleitus 8/18/2024 11:16 AM
I have seen 1 week assessments and 1 month assessment; however what do you cover in 1 week since appsec assessment are basically sca + sast + dast + security architecture review + threat modeling, and some governance and regulatory.. how do you cover that in a week a low scale or a month limited per assessment? (edited)
Avatar
Electrolyze 8/18/2024 11:23 AM
The assessments that take less than a week probably don't go deeper than SCA/SAST/DAST scanning. Integration in CI/CD pipelines certainly speeds up the process, but I doubt there's much, if any architecture review happening in those assessments with a quick turn around.
Avatar
Avatar
Electrolyze
The assessments that take less than a week probably don't go deeper than SCA/SAST/DAST scanning. Integration in CI/CD pipelines certainly speeds up the process, but I doubt there's much, if any architecture review happening in those assessments with a quick turn around.
blackleitus 8/18/2024 11:25 AM
What kind of security architecture checklist happens to make it 1 week to 1 month ?
Avatar
Electrolyze 8/18/2024 11:39 AM
That's pretty specific to the org I'd say. My org is pretty lucky to have a large AppSec team and we also utilize relationships with advisory/pentest/governance teams. It's hard to comment on why some places are faster/slower with their assessments. Could be that they are checking for less, or maybe they have a lot of people working on it and can handle the increased work load.
Avatar
Avatar
Electrolyze
That's pretty specific to the org I'd say. My org is pretty lucky to have a large AppSec team and we also utilize relationships with advisory/pentest/governance teams. It's hard to comment on why some places are faster/slower with their assessments. Could be that they are checking for less, or maybe they have a lot of people working on it and can handle the increased work load.
blackleitus 8/19/2024 7:31 AM
that's a valid point; however the only human factor is SAST , and DAST to review and analyze results while also governance team plays into it or DAST , and SCA plays into advisory mode for interpretation of results
Avatar
Avatar
blackleitus
that's a valid point; however the only human factor is SAST , and DAST to review and analyze results while also governance team plays into it or DAST , and SCA plays into advisory mode for interpretation of results
Electrolyze 8/19/2024 7:43 AM
Out of curiosity, are you asking these questions because you're currently waiting on results? Just thinking it might be a good idea to ask them why their SLA is so random.
Avatar
Is there anything out there that people use to populate a sandbox with random files?
Avatar
Avatar
Electrolyze
Out of curiosity, are you asking these questions because you're currently waiting on results? Just thinking it might be a good idea to ask them why their SLA is so random.
blackleitus 8/19/2024 1:55 PM
mostly because of SLA so randomly
Avatar
Unbrokentrooper 8/19/2024 8:49 PM
Hello everyone. I'm new to the chat. I'm having trouble finding a good forensic report template or an outline. Could someone point me in the right direction?
Avatar
Avatar
Unbrokentrooper
Hello everyone. I'm new to the chat. I'm having trouble finding a good forensic report template or an outline. Could someone point me in the right direction?
You're most likely going to have to make your own. I wrote mine in 2018 and have been modifying it since that time... mess around with microsoft word and figure out an aesthetic you like. Think about what information you want to relay. If you're doing mostly mobile forensics vs. deabox computer vs network, the information that is important is going to change.
9:40 PM
If you're a student, it's a great excercise to make one and then seek input, if you're at a company maybe they already have a template? My personal experience is that I made one that made sense to me as far as organization and how I like to write my reports because I'm a one-person show at my department.
👍 3
🔥 1
9:40 PM
I edit mine as I go along - typically due to questions from defense attorneys - to make my own life easier.
Avatar
blackleitus 8/19/2024 10:32 PM
I'm currently trying to get a better understanding of how application penetration testing scales with the size of an app. Specifically, I'm curious about how small, mid-sized, large, and enterprise-level applications differ in terms of features, functionality, views, screens, and pages when scoping. How many features??
Avatar
Avatar
Unbrokentrooper
Hello everyone. I'm new to the chat. I'm having trouble finding a good forensic report template or an outline. Could someone point me in the right direction?
I guess the format depends on the country, at least a bit... But you can find a lot of American forensic reports online due to the tendency of dumping everything on the web.
Avatar
Semantics 21 (Tom) 8/20/2024 5:03 AM
If you're involved in UK Policing and need help reviewing the flood of videos from the recent riots, we're here to assist. We've made the new S21 CCTV review tool free for the next few months to support your efforts. I had the team develop this tool specifically for surveillance review, as no existing solution really met my departments needs. It's perfect for identifying and tracking those causing chaos on the frontlines. Request access through our website: https://www.semantics21.com/s21-cctv/
Introducing a revolutionary CCTV review tool powered by AI, designed for unmatched simplicity at a cost affordable to everyone.
Digitalferret pinned a message to this channel. 8/20/2024 5:06 AM
Avatar
Digitalferret 8/20/2024 5:06 AM
@Law Enforcement [UK] & Pinned ^
Avatar
Avatar
Digitalferret
@Law Enforcement [UK] & Pinned ^
Semantics 21 (Tom) 8/20/2024 5:06 AM
Thank you 🙏
👍🏻 1
Avatar
Avatar
Semantics 21 (Tom)
Thank you 🙏
Digitalferret 8/20/2024 5:07 AM
where's my bag of sweets & a Goldfish 🤣 (edited)
😅 2
Avatar
Avatar
Semantics 21 (Tom)
If you're involved in UK Policing and need help reviewing the flood of videos from the recent riots, we're here to assist. We've made the new S21 CCTV review tool free for the next few months to support your efforts. I had the team develop this tool specifically for surveillance review, as no existing solution really met my departments needs. It's perfect for identifying and tracking those causing chaos on the frontlines. Request access through our website: https://www.semantics21.com/s21-cctv/
This is cool 🙂 I wonder how much take up you’ll get - sadly I bet there is a lot that don’t because of ISO, IT, time etc etc
Avatar
Avatar
Digitalferret
where's my bag of sweets & a Goldfish 🤣 (edited)
Semantics 21 (Tom) 8/20/2024 5:09 AM
In the post
😁 2
Avatar
Avatar
busted4n6
This is cool 🙂 I wonder how much take up you’ll get - sadly I bet there is a lot that don’t because of ISO, IT, time etc etc
Semantics 21 (Tom) 8/20/2024 5:10 AM
As i said, designed by cops for cops, should fall outside of ISO according to our Police beta testers. 🫣 Play the game
Avatar
Don’t ask, don’t get…
Avatar
Avatar
busted4n6
This is cool 🙂 I wonder how much take up you’ll get - sadly I bet there is a lot that don’t because of ISO, IT, time etc etc
Digitalferret 8/20/2024 5:14 AM
yup, v.likely. the upside is it's there on offer. folks can pick and choose. wish i had footage to review I'd give it a go.
Avatar
Avatar
Semantics 21 (Tom)
As i said, designed by cops for cops, should fall outside of ISO according to our Police beta testers. 🫣 Play the game
I think it’d be class as “use of video analytics tools for review purposes” under DIG 300 which cops can do under the NPCC’s framework providing it is not intended for further specialist analysis and is approved by the SAI. Just thinking about this nonsense is why we’re not getting innovation in DF sadly 😦
💯 4
Avatar
Digitalferret 8/20/2024 5:17 AM
starts riot on private drive, tells neighbour to hold my beer and turn his CCTV on. parteh time 🙂
5:17 AM
i'll then go and stand in a corner for 2yrs 6 mnths (edited)
Avatar
Avatar
busted4n6
I think it’d be class as “use of video analytics tools for review purposes” under DIG 300 which cops can do under the NPCC’s framework providing it is not intended for further specialist analysis and is approved by the SAI. Just thinking about this nonsense is why we’re not getting innovation in DF sadly 😦
Digitalferret 8/20/2024 5:19 AM
yeh, there's a line to be drawn between out and out McGyver stuff and pro co's putting out. but the red tape can be a nuisance. needs to be some slack cut at admin level maybe
Avatar
Avatar
Digitalferret
yeh, there's a line to be drawn between out and out McGyver stuff and pro co's putting out. but the red tape can be a nuisance. needs to be some slack cut at admin level maybe
Yep. Like this is a perfect example. We could deploy this tool to cops if IT and the SAI permit. But the training and testing would have to be done by the AV Unit, and if they want to use the tool they have to accredit it under a method following validation blah blah blah.
Avatar
Digitalferret 8/20/2024 5:21 AM
what really pisses me, even as a civvi, is it takes riots to get fcukwits jailed for assaulting emergency workers. what about the last decades worth of (often severely) injured service personnel (edited)
5:24 AM
I would say, bring back the Stocks, and Public Flogging save some jail space, but i wouldn't dare for fear of some sort of SJW kickoff and such 😉
Avatar
MrTurdTastic 8/20/2024 5:25 AM
I think, whilst a tool like this is fantastic. Infosec policies are likely to intervene.
Avatar
Probably one to take to #policies-and-procedures but the only hope for UK policing was PDS looking at doing forensic software testing for forces, however a recent post about this on LinkedIn (where they talk about validating software) gives me little hope that they have the relevant knowledge
💯 1
Avatar
Avatar
busted4n6
Probably one to take to #policies-and-procedures but the only hope for UK policing was PDS looking at doing forensic software testing for forces, however a recent post about this on LinkedIn (where they talk about validating software) gives me little hope that they have the relevant knowledge
Digitalferret 8/20/2024 5:28 AM
relevent knowledge: a bit like Ministers making policy on pretty much anything whilst sat behind a desk with zero hands on 🙂
5:28 AM
F-35? is that a... uuh , will it need a hook or a ramp. uuh ... how much is it?
Avatar
Avatar
MrTurdTastic
I think, whilst a tool like this is fantastic. Infosec policies are likely to intervene.
I’m not sure why? This appears to be a CCTV review tool such as NICE or Kinesense which are widely used in policing. It would still need to be signed off in respect to data processing (especially if it takes any data off site), supply chain management etc. I suppose the ‘AI’ features would need some risk assessment but again forces are already using vision AI tools for redaction. But I hear what you say - and it goes back to what I said, a lot of DFUs are facing paralysis such that they cannot even think of taking new methods on
Avatar
Digitalferret 8/20/2024 5:29 AM
hell in a handcart mate. everywhere
Avatar
Avatar
busted4n6
I’m not sure why? This appears to be a CCTV review tool such as NICE or Kinesense which are widely used in policing. It would still need to be signed off in respect to data processing (especially if it takes any data off site), supply chain management etc. I suppose the ‘AI’ features would need some risk assessment but again forces are already using vision AI tools for redaction. But I hear what you say - and it goes back to what I said, a lot of DFUs are facing paralysis such that they cannot even think of taking new methods on
MrTurdTastic 8/20/2024 5:29 AM
I like how you say not sure why then go on to explain why 🤣
5:30 AM
I agree it's a ballache and draconian but ultimately we're all slaves to our CISOs desires
Avatar
Avatar
MrTurdTastic
I like how you say not sure why then go on to explain why 🤣
Well I don’t think it’s something that would stop a police force using a tool like this. It’s just yet another bit of administrative effort needed
Avatar
MrTurdTastic 8/20/2024 5:30 AM
Aye but if it's a free trial for a month then I can imagine the process to get it approved easily taking longer than that
Avatar
I suppose I’m in a fortunate position that our infosec often come to me for technical advice 😉 but yes that’s my feeling - it’ll take too long and that will put many off from doing anything other than a one workstation trial ‘on the quiet’ (eg not using it for any actual case work).
Avatar
Avatar
busted4n6
Well I don’t think it’s something that would stop a police force using a tool like this. It’s just yet another bit of administrative effort needed
I’ve been waiting for my CISO to sign off on hardware encrypted external storage devices since feb 2023, so no chance getting this through for a month trial
Avatar
lol. I assume FIPS140-2 level 2/3 isn’t good enough for them 😬
Avatar
Digitalferret 8/20/2024 5:37 AM
could also depend on learning curve? as former Prod Eng, if anyone was falling behind with work, possibly the last thing you'd give them to do was a new <solution/aid> to learn. speedup is by moving every other non-mission-critical job to gophers, teaboys, whatever, and let the main guy do nothing at all other than main guy work. Private secotr though. not sure LEA have that many non-associated staff that would/could be freed up
5:37 AM
Sarge, get me a brew pl0x, i'm important this week
5:38 AM
did he say impOtent or ...? (edited)
Avatar
Avatar
busted4n6
lol. I assume FIPS140-2 level 2/3 isn’t good enough for them 😬
I wouldn’t say “not good enough”, more that she has no idea what hardware encryption is at a basic level
5:38 AM
Another example of someone falling into a job and never moving on
Avatar
Avatar
Will-ko
I wouldn’t say “not good enough”, more that she has no idea what hardware encryption is at a basic level
I feel you with that. Our information security people are alright but they are policy and compliance people with no real technical knowledge. As such if there isn’t a box it fits it, it’s difficult. I’ve found finding the relevant NIST controls and linking them into what you want to do and how your solution meets them works. I also point out the consequences of ‘doing nothing’ (especially if there are already unsanctioned working practices) which makes what you propose the ‘least worst’ option.
Avatar
Avatar
whee30
You're most likely going to have to make your own. I wrote mine in 2018 and have been modifying it since that time... mess around with microsoft word and figure out an aesthetic you like. Think about what information you want to relay. If you're doing mostly mobile forensics vs. deabox computer vs network, the information that is important is going to change.
Unbrokentrooper 8/20/2024 12:00 PM
@whee30 thanks for the advice. I'm asking everywhere. I'm trying to some in as much as I can.
Avatar
@Brandon E @Magnet Forensics 😀Salute
Avatar
Hi! Sorry I am late to this party. To weigh in briefly, here is a LinkedIn comment I posted a few weeks ago in response to a great post by Amy Moles at ArcPoint Forensics regarding AI's use in digital forensic tools: I think it breaks down into two separate functions. AI tools that generate investigative leads vs those that produce results meant to be used as evidence (or the basis of an expert opinion) in court. For tools that generate leads, like object or CSAM detection from large volumes of image and video data that point investigators to something in the data to review, we are at a point that investigators can test and build trust in their specific tools. At the end of the day it is still the human who is making the decision. On the other hand are tools where the AI outputs are part of the exam, such as those that say an image/video is ‘X% real or fake’. I feel that tools that employ generative AI, particularly those that operate as a black box, where a probabilistic output cannot be explained or repeated have no place in digital forensic exams today. If the basis for a result cannot be explained, reproduced, or assigned an error rate, it is unrealistic to think that it will sustain a Daubert challenge (in the US) or be admissible as evidence in legal proceedings. I do see a path forward to assigning error rates to gen AI outputs, but not without a tremendous amount of testing and enormous datasets of ground truth data to perform those tests with. This still does not address the explainability and repeatability concerns, but would be a big step in assigning error rates and showing validity. (edited)
👍 2
1:55 PM
All this ☝️ to say that in large data review for triage, the investigator is/should be reviewing the video anyway so there is less 'risk' of error/uncertainty. That is a great use of AI right now that many investigators use on a daily basis. I would not feel comfortable though walking into court with just the output of any tool without verifying those findings as well as verifying there is no data missed. Until we are able to effectively assign error rates (to the last points above).
💯 6
Avatar
Another nice use, which I think sometimes is undervalued, is "using GenAI to write scripts and tools" 😉 Likely half of the GUI of Fuji was written by AI, at least in its first draft form 👀 it saved a lot of hours
Avatar
Avatar
Brandon E
Hi! Sorry I am late to this party. To weigh in briefly, here is a LinkedIn comment I posted a few weeks ago in response to a great post by Amy Moles at ArcPoint Forensics regarding AI's use in digital forensic tools: I think it breaks down into two separate functions. AI tools that generate investigative leads vs those that produce results meant to be used as evidence (or the basis of an expert opinion) in court. For tools that generate leads, like object or CSAM detection from large volumes of image and video data that point investigators to something in the data to review, we are at a point that investigators can test and build trust in their specific tools. At the end of the day it is still the human who is making the decision. On the other hand are tools where the AI outputs are part of the exam, such as those that say an image/video is ‘X% real or fake’. I feel that tools that employ generative AI, particularly those that operate as a black box, where a probabilistic output cannot be explained or repeated have no place in digital forensic exams today. If the basis for a result cannot be explained, reproduced, or assigned an error rate, it is unrealistic to think that it will sustain a Daubert challenge (in the US) or be admissible as evidence in legal proceedings. I do see a path forward to assigning error rates to gen AI outputs, but not without a tremendous amount of testing and enormous datasets of ground truth data to perform those tests with. This still does not address the explainability and repeatability concerns, but would be a big step in assigning error rates and showing validity. (edited)
The sort of AI use I would like to see is something that can look at all the logs on a device and flag possible actions e.g. looking at windows event logs and records an flagging points as machine turned on, remote user connected, started browsing the web, etc.
Avatar
just throwing this out there... I got inspired at Blackhat in Vegas and wrote my own passive fingerprinter in Rust. Check it out, try it out. https://github.com/sundruid/muonfp
MuonFP is an enterprise ready, TCP passive fingerprinter written in Rust that has no external dependencies such as WireShark or other open source software. - sundruid/muonfp
9:31 PM
running now on our honeypots and getting interesting data. Able to block on certain fingerprints.
Avatar
hiddenbook46 8/21/2024 1:40 AM
Hello there, anyone of you can tell if I got any change to recover pics from whatsapp, I mean I never backed up them, or downloaded them but nothing appear on my android anymore. I don't have any contact with this friend anymore but woukd be possible use some tools to recover some of them? Also if this person blocked me? I have no experience with smartphone at all. Thanks anyway (edited)
Avatar
Avatar
hiddenbook46
Hello there, anyone of you can tell if I got any change to recover pics from whatsapp, I mean I never backed up them, or downloaded them but nothing appear on my android anymore. I don't have any contact with this friend anymore but woukd be possible use some tools to recover some of them? Also if this person blocked me? I have no experience with smartphone at all. Thanks anyway (edited)
Digitalferret 8/21/2024 2:25 AM
Disappearing messages are excluded from all backups and can't be restored by design. WhatsApp can't restore your disappearing messages for you, since we do not store your messages. check https://faq.whatsapp.com/673193694148537 for full info
Avatar
Avatar
Digitalferret
Disappearing messages are excluded from all backups and can't be restored by design. WhatsApp can't restore your disappearing messages for you, since we do not store your messages. check https://faq.whatsapp.com/673193694148537 for full info
hiddenbook46 8/21/2024 6:57 AM
Thank you
Avatar
hey all my LE guys out there, wtf does the "QPH" stand for in the government's naming convention of forensic images? talking about this in my office rn and no one has any idea what it actually means
Avatar
Avatar
FunkeDope
hey all my LE guys out there, wtf does the "QPH" stand for in the government's naming convention of forensic images? talking about this in my office rn and no one has any idea what it actually means
Can you give an example?
Avatar
Avatar
Beercow
Can you give an example?
sure, every time we get a big disco dump from any 3 letter agency they provide a discovery index and all the names of the actual disk or phone images are like: "QPH1_1.e01" "QPH1_2.e01" "QPH6.dd" etc
10:44 AM
usually relevant to a specific room + device or an item + associated storage devices (phone + sim, laptop + ssd+hdd, etc)
10:44 AM
just wondering wtf it actually means
10:45 AM
fbi, homeland, ice, p much every agency uses a similar convention
Avatar
Shogun//Rogan 8/21/2024 1:22 PM
Not really sure if General Discussion is appropriate, but I should finish my degree in Digital Forensics by August 2025 if I take summer classes...and I just convinced my agency to buy Digital Forensics software and training to start a Digital Forensics specialty. Pumped.
🥳 9
Avatar
Avatar
FunkeDope
hey all my LE guys out there, wtf does the "QPH" stand for in the government's naming convention of forensic images? talking about this in my office rn and no one has any idea what it actually means
facelessg00n 8/21/2024 3:20 PM
Likely be the initials of one of the subjects of the case. Ours get renamed to a job/ tasking number afterwards through.
Avatar
Avatar
FunkeDope
hey all my LE guys out there, wtf does the "QPH" stand for in the government's naming convention of forensic images? talking about this in my office rn and no one has any idea what it actually means
Gold__Viking 8/22/2024 6:09 PM
I know this one but where did you read that from?!?!?! The PH in QPH is the field office soooo Philadelphia. and Q is Questioned.... The Q has never made sense to me.
6:10 PM
QPH1 is the computer. QPH1_1 is the hdd/ssd in the computer QPH1_2 could be a SD card in the computer. QPH1_3 could be a dvd that was in the computer.
6:12 PM
To go even deeper. Once evidence enters evidence control it gets a 1B# ie 1B1. Once it goes to the forensics team for analysis they give it the Q or DE number. (DE is derivative evidence, ie reports)
6:13 PM
What did you get from Philadelphia? I used to work there
Avatar
Sounds like I would need a couple days of training to wrap my head around the naming convention. We label rooms with a letter and assign a number based on what order it was collected.... A01, A02, B01, B02 etc. If the "item" collected is a bag of five phones, I would later break that down to A01a, A01b etc. and cover the specific identification within that "item" in a report. Small agency though, so maybe that's part of it
Avatar
Avatar
Gold__Viking
What did you get from Philadelphia? I used to work there
Ha thats awesome and makes sense, we do a lot of work in the Philly/NY/NJ area. These came from the RCFL directly, but I have seen them spanning multiple cases (edited)
Avatar
kmacdonald1565 8/23/2024 7:45 AM
Okay, so I will try to be as succinct as possible with my question here. I have an Apple iCloud production/warrant return that has ###-MESSAGESINICLOUD-###.zip when decrypted. when opened, it has a MessagesInICloud.csv file in it suggesting there are messages, however each line item is garbled telling me it is encrypted (header in each message hereZsZJXdBThCzlvI92Z+BePVbKrUJuQ5PQ9LaDM42nOT8Bx/FeiLkycrflc2wFG...continuing on with similar data). The other columns in the CSV are type (all messages), device ID (2 different device IDs), and time (but the time is the same for groups of dozens of messages). I have a full iCloud backup that has been processed by a couple of tools.... 1. I used @Cellebrite and @Magnet Forensics to try and parse the full results out, but neither one mentions the existence of any messages outside emails which I believe to be a different file. any advice? 2. Are there any other programs to read the messages?
Avatar
Avatar
kmacdonald1565
Okay, so I will try to be as succinct as possible with my question here. I have an Apple iCloud production/warrant return that has ###-MESSAGESINICLOUD-###.zip when decrypted. when opened, it has a MessagesInICloud.csv file in it suggesting there are messages, however each line item is garbled telling me it is encrypted (header in each message hereZsZJXdBThCzlvI92Z+BePVbKrUJuQ5PQ9LaDM42nOT8Bx/FeiLkycrflc2wFG...continuing on with similar data). The other columns in the CSV are type (all messages), device ID (2 different device IDs), and time (but the time is the same for groups of dozens of messages). I have a full iCloud backup that has been processed by a couple of tools.... 1. I used @Cellebrite and @Magnet Forensics to try and parse the full results out, but neither one mentions the existence of any messages outside emails which I believe to be a different file. any advice? 2. Are there any other programs to read the messages?
Semantics 21 (Tom) 8/23/2024 7:49 AM
When you say Cellebrite do you mean PA or BlackLight Inspector? I'm sure when i was at BlackBag we decrypted the warrant returns pre parsing.
Avatar
Avatar
Semantics 21 (Tom)
When you say Cellebrite do you mean PA or BlackLight Inspector? I'm sure when i was at BlackBag we decrypted the warrant returns pre parsing.
kmacdonald1565 8/23/2024 7:50 AM
Physical Analyzer...
7:50 AM
i dont know if we have Inspector, i have to check my account (not in charge)
Avatar
Semantics 21 (Tom) 8/23/2024 7:52 AM
Time to contact Cellebrite for a trial 🙄
Avatar
kmacdonald1565 8/23/2024 7:53 AM
yeah, no inspector on my account at least....ill check with a supervisor. do you think that will help?
Avatar
Semantics 21 (Tom) 8/23/2024 7:56 AM
Not sure what Cellebrite have done to the product since the take over, but Blacklight did have the ability to process returns. Most tools ignored the encrypted content, but that said Apple could have applied changes as its been a few years.
Avatar
kmacdonald1565 8/23/2024 7:56 AM
neat
Avatar
Avatar
FunkeDope
Ha thats awesome and makes sense, we do a lot of work in the Philly/NY/NJ area. These came from the RCFL directly, but I have seen them spanning multiple cases (edited)
Gold__Viking 8/23/2024 8:46 AM
Yeah I was at the RCFL there. Left last year for private sector.
👏 1
Avatar
Is there a database somewhere I can look at anysort of malware writeup to get myself familiar with them?
Avatar
Avatar
Lana
Is there a database somewhere I can look at anysort of malware writeup to get myself familiar with them?
❤️ 1
Avatar
Hi, anyone are french ?
Avatar
Avatar
*Blossom
Hi, anyone are french ?
Yes, why ?
Avatar
Avatar
kmacdonald1565
Okay, so I will try to be as succinct as possible with my question here. I have an Apple iCloud production/warrant return that has ###-MESSAGESINICLOUD-###.zip when decrypted. when opened, it has a MessagesInICloud.csv file in it suggesting there are messages, however each line item is garbled telling me it is encrypted (header in each message hereZsZJXdBThCzlvI92Z+BePVbKrUJuQ5PQ9LaDM42nOT8Bx/FeiLkycrflc2wFG...continuing on with similar data). The other columns in the CSV are type (all messages), device ID (2 different device IDs), and time (but the time is the same for groups of dozens of messages). I have a full iCloud backup that has been processed by a couple of tools.... 1. I used @Cellebrite and @Magnet Forensics to try and parse the full results out, but neither one mentions the existence of any messages outside emails which I believe to be a different file. any advice? 2. Are there any other programs to read the messages?
Ross Donnelly 8/24/2024 1:00 PM
Sounds like end-to-end encryption - see 'Obtaining iMessage conversations from iCloud, part two' section of this https://blog.elcomsoft.com/2020/10/the-forensic-view-of-imessage-security/
Apple iMessage is an important communication channel and an essential part of forensic acquisition efforts. iMessage chats are reasonably secure. Your ability to extract iMessages as well as the available sources of extraction will depend on several factors. Let’s discuss the factors that may affect
Avatar
#general-discussion-and-questions #sans-dfir hi everyone, I have my GASF (FOR585) exam retake in 5 weeks, anyone has an unused practice test willing to give away.Thank you
👍 1
Avatar
Avatar
Ian
#general-discussion-and-questions #sans-dfir hi everyone, I have my GASF (FOR585) exam retake in 5 weeks, anyone has an unused practice test willing to give away.Thank you
ThatTotallyRealMyth 8/25/2024 4:54 PM
Are you by any chance doing a sans institute bachelors or undergrad cert? If so, you should join the slack and ask in the GASF channel as youre likely to get someone on there. Otherwise, ask on on the r/giac sub reddit
Avatar
I did the FOR500 and now doing the FOR585 .Do you know how I can get in the Slack GASF Channel?
Avatar
how can i view my role
Avatar
Hans Leißner 8/26/2024 1:40 AM
Hi & good morning. We did a Law Enforcement request (Apple) and came acrossa Table called "AMS Updates_Account". Does anyone know, what this could be/mean?
Avatar
Hello everyone. Tell me how to perform a complete reset of the Ufed .Thanks.
Avatar
Digitalferret 8/26/2024 7:45 AM
@Cellebrite ^
Avatar
Avatar
BorgSl
Hello everyone. Tell me how to perform a complete reset of the Ufed .Thanks.
Support has a full walk though of it. I suggest creating a case via email / portal.
Avatar
Do people still recommend Aurora IR for documentation? Is there a collaborative alternative to it that has a non-enterprise offering?
6:15 PM
It looks like Aurora has been somewhat abandoned, no new release in 3y and just a handful of commits since
Avatar
Nothing beats the spreadsheet of doom in one drive
Avatar
It’s kind of annoying to use, like, timesketch and excel online and w/e ticketing system in order to embed images plus long form notes for a crappy sortof case mgmt system
6:25 PM
someone makes a graph and you have to ask them to edit it in order to update it
Avatar
Yeah it sucks but every incident is a snowflake, here’s a good start to the SOD https://www.crowdstrike.com/blog/crowdstrike-releases-digital-forensics-and-incident-response-tracker/ Xmind is good for the timeline and graphs
This blog post provides an overview of the newly released CrowdStrike Incident Response Tracker and how it is leveraged by our experts on the front lines.
😂 1
Avatar
Are there any digital forensic sources related to cryptocurrency? I am currently interested in responding to cryptocurrency infringement incidents.
Avatar
Avatar
tklane
Yeah it sucks but every incident is a snowflake, here’s a good start to the SOD https://www.crowdstrike.com/blog/crowdstrike-releases-digital-forensics-and-incident-response-tracker/ Xmind is good for the timeline and graphs
this is another spreadsheet lol
Avatar
Avatar
naruna
Are there any digital forensic sources related to cryptocurrency? I am currently interested in responding to cryptocurrency infringement incidents.
Not heard of "infringement incidents" before. Do you perhaps mean "Crypto Drainers"?
Avatar
Avatar
naruna
Are there any digital forensic sources related to cryptocurrency? I am currently interested in responding to cryptocurrency infringement incidents.
That knowledge can only come from work, I think publishing companies who enforce on publishing and copyright like Penguin House do these sort of works. (edited)
2:12 PM
it's super niche digital forensics and cybercrime work. It's very rare come across folks who do this. (edited)
Avatar
Let me rephrase the question I want to study digital forensics related to cryptocurrencies. Are there any reference materials?
Avatar
Does anyone know where the artifact to locate if synchronized data between iphone and icloud was turned on for messages ?
8:46 PM
I found calendar, bookmark and contacts.
8:49 PM
private/var/mobile/Library/Preferences/com.apple.madrid.plist which should be included in a logical extraction. If the value for "CloudKitSyncingEnabled" is "True", then iCloud sync is on.
8:49 PM
found it
Avatar
Avatar
naruna
Let me rephrase the question I want to study digital forensics related to cryptocurrencies. Are there any reference materials?
facelessg00n 8/27/2024 11:23 PM
This is course is supposed to be pretty good from those I know who have completed it. Also depending if you want to study it from a technical perspective or an analytical one. https://www.unic.ac.cy/iff/education-and-training/master-degrees/msc-in-blockchain-and-digital-currency/#:~:text=The%20World's%20First%20Master's%20Degree%20in%20Blockchain%20%26%20Crypto&text=The%20University%20of%20Nicosia%20was,and%20on%20campus%20since%202021. (edited)
Online MSc in Blockchain and Digital Currency The World’s First Master’s Degree in Blockchain & Crypto We are at the beginning of a global wave of demand for blockchain academic and professional education and certification. The University of Nicosia was the first to recognize this need and responded by offering the first Master of Science
Avatar
StephenWolf 8/28/2024 7:04 AM
Hey guys I’m looking for ftk imager cmd. I tried to search for it but it’s nowhere. Does anyone have that?
Avatar
NotIronManBTW 8/28/2024 9:04 AM
Hey I’m looking to implement some monitoring for certain exploitive or sexual words that could be used by people doing illegal things at work - does anyone in law enforcement or public sector have a list of keywords they could share with me that would be good to monitor for
9:04 AM
example: r4pe instead of the regular way to spell it
Avatar
if you're doing this for work, make damned sure your policies approved by legal support you
this 1
Avatar
Avatar
StephenWolf
Hey guys I’m looking for ftk imager cmd. I tried to search for it but it’s nowhere. Does anyone have that?
Avatar
Curious if anyone has had experience with WinFE (As built from winfe.net) failing to finish booting with "Dell SafeBIOS"? The same USB will boot my Lenovo, having some hiccups working on a new Dell
Avatar
I'm getting the initial boot screen where I choose 64 vs 32 bit, however after that the Dell SafeBIOS screen comes up and freezes the process. I'm not seeing a way to bypass this yet.
Avatar
Avatar
rayeh
if you're doing this for work, make damned sure your policies approved by legal support you
NotIronManBTW 8/28/2024 1:52 PM
It is for work and yes have the correct approvals
👍 1
Avatar
Just putting this out there as a note in case anyone needs it in future. I have a case with a locked Nokia C100 / N152DL. None of our tools can get into it. I wanted to know how many password attempts might permanently lock the phone out, so I bought the same model phone and set it up. The Password has to be at least 4 digits. It will let you try 5 times, then make you wait 30 seconds. Then it will let you try 5 more times then wait 30 seconds again. Then all the rest of the guesses are 30 seconds. I've only gotten up to try 20 or so though, but it appears there's no wipe/permanent lock from any amount of guesses as when I go into settings that's not even an option. Another thing is it will let you set up a Face unlock, but says it's weak security. This seems to be because it only has one camera on front so there's no way it can tell depth of field, which made me guess even a photo of someone would unlock it. And I was right, my photo will unlock it. And there's no indication on screen that face unlock is an option, screen looks same whether face unlock was set up by user or not. Also note, the face unlock only works in an AFU state. When I turn my phone off and haven't entered passcode yet, face unlock doesn't work. Just FYI.
👍 6
Avatar
Avatar
whee30
I'm getting the initial boot screen where I choose 64 vs 32 bit, however after that the Dell SafeBIOS screen comes up and freezes the process. I'm not seeing a way to bypass this yet.
Does it boot normally without the usb?
Avatar
General Question for the masses: this may sound rudimentary but I am just curious for the Investigators/forensicators responding in the field: what is your 'go to' or best practice for previewing windows machines that are password protected? I was having a discussion today and working with a different agency than usual and it was interesting to hear/see their methodologies. In one instance, they suggested to remove the drive and preview in a linux machine/vm behind a write blocker.
Avatar
Avatar
jaypeezee
General Question for the masses: this may sound rudimentary but I am just curious for the Investigators/forensicators responding in the field: what is your 'go to' or best practice for previewing windows machines that are password protected? I was having a discussion today and working with a different agency than usual and it was interesting to hear/see their methodologies. In one instance, they suggested to remove the drive and preview in a linux machine/vm behind a write blocker.
There are many variables here, with pros and cons to essentially every combination. Are you considering read-only previews specifically, or also considering live previews? Do you have some kind of special authority (probation?) in place before arriving at the machines? Do you have cooperative or uncooperative suspects? Are you comfortable with previews that only hit readily accessible and not protected data? What kind of time do you have? What is your tolerance for things going sideways? (Many people here have dealt with certain states of BitLocker, TPM, and Windows Hello that forced them to deviate from their initial plan... which can be more problematic on site.) Probably a good time to remind everyone of the following:
3:12 AM
👍 4
Avatar
Husky_M00s3 8/29/2024 4:07 AM
@naruna there are a ton of white papers on crypto. I would search through #darknet-virtual-currencies for resources and CTFs. Start with Nick Furneaux’s books (one is on preorder.)
Avatar
Avatar
Beercow
Does it boot normally without the usb?
Yes, everything boots normally without the USB. I figured out that tsurugi Linux works on this particular computer. Just trying to figure out why it didn’t like win FE.
5:06 AM
Just another example of why it’s good to have multiple tools, I suppose
Avatar
Avatar
whee30
Just another example of why it’s good to have multiple tools, I suppose
Have no way of testing. Almost sounds like it’s trying to boot from the disk again. We have HP SureStart. Mash F12 til get to the screen to boot from usb and don’t see the SureStart screen again. I use a bootable 2TB hard disk though. Not sure if that would make a difference.
Avatar
It’s weird - it gets to the 32vs64 choice screen, give two loading bars and then stalls at safebios screen. Tsurugi and paladin you never see it again, it just boots. Winfe has benefits but only if I can get it to boot!
5:53 AM
Just testing tools right now, not an actual case
Avatar
Anyone know where I can find the instructions for reformatting digital collector? The windows side works but the Mac side just died on me
Avatar
Avatar
luis511_
Anyone know where I can find the instructions for reformatting digital collector? The windows side works but the Mac side just died on me
I don't know if it helps, but there's a manual here: https://ia601400.us.archive.org/33/items/assorted-celebrations-and-jubilations/Cellebrite_Digital_Collector_User_Guide_3.4%20%281%29.pdf Alternatively, it's time to try Fuji 😜
💯 1
Avatar
Avatar
luis511_
Anyone know where I can find the instructions for reformatting digital collector? The windows side works but the Mac side just died on me
facelessg00n 8/29/2024 5:06 PM
There is a generation of problematic ones out there where the SSD dies. If you keep having issues flashing it check the SSD in an external reader. Then raise a ticket with Cellebrite they will send you new ones.
Avatar
digital Bowles 8/30/2024 10:51 AM
I have a real out of the box question... is there a way to collect which websites was visited by a specific IP address? Mainly who would story the data and I serve with legal process. would it be the service provider?
Avatar
Avatar
digital Bowles
I have a real out of the box question... is there a way to collect which websites was visited by a specific IP address? Mainly who would story the data and I serve with legal process. would it be the service provider?
It is possible the ISP for that IP address would have NetFlow logs (or similar). So yes, the ISP might have it. Not sure if that data could be obtained with legal process however.
10:58 AM
At least in my limited experience I haven’t heard of it being obtained via legal process. If anyone can prove me wrong feel free!
Avatar
Avatar
Lazza
I don't know if it helps, but there's a manual here: https://ia601400.us.archive.org/33/items/assorted-celebrations-and-jubilations/Cellebrite_Digital_Collector_User_Guide_3.4%20%281%29.pdf Alternatively, it's time to try Fuji 😜
Thank you.
Avatar
Avatar
facelessg00n
There is a generation of problematic ones out there where the SSD dies. If you keep having issues flashing it check the SSD in an external reader. Then raise a ticket with Cellebrite they will send you new ones.
Interesting. Mine was inconsistently mounting on the host M2 laptop running APFS. Then, everything froze and could not recover.
Avatar
The City of Columbus, Ohio, has filed a lawsuit against security researcher David Leroy Ross, aka Connor Goodwolf, accusing him of illegally downloading and disseminating data stolen from the City's IT network and leaked by the Rhysida ransomware gang.
6:03 PM
This is a little much. From the outside perspective, seems like the city is upset with the researcher from calling them out that the data was not actually encrypted or corrupted
Avatar
Avatar
CyberGhost
This is a little much. From the outside perspective, seems like the city is upset with the researcher from calling them out that the data was not actually encrypted or corrupted
According to Ars Technica, he not only told the media what the data was about (which is fine), but he also illegally downloaded the actual data and spread it to the media as well, disseminating the information more. That behavior seems quite a lot even for the low privacy standards of the USA. This is a quote from the city attorney's office: Mr. Ross is still free to speak about the cyber incident and even describe what kind of data is on the dark web—he just cannot disseminate that data.
Avatar
Avatar
Lazza
According to Ars Technica, he not only told the media what the data was about (which is fine), but he also illegally downloaded the actual data and spread it to the media as well, disseminating the information more. That behavior seems quite a lot even for the low privacy standards of the USA. This is a quote from the city attorney's office: Mr. Ross is still free to speak about the cyber incident and even describe what kind of data is on the dark web—he just cannot disseminate that data.
He demonstrated what the data contained to the media after the city claimed it was "encrypted or corrupt". The claim from the city that accessing a TOR site is some deep dark secret is pretty weak. A Google search and download of TOR and anyone with internet access could do the same.
Avatar
Avatar
CyberGhost
He demonstrated what the data contained to the media after the city claimed it was "encrypted or corrupt". The claim from the city that accessing a TOR site is some deep dark secret is pretty weak. A Google search and download of TOR and anyone with internet access could do the same.
It's not only pretty weak, it's pure BS. Sure, anyone can download the data, this in itself however does not make it legal to do... We (tech folks) often mix up what is technically feasible from what is legit or should be done. Some people are claiming that they are trying to silence the researcher about the breach, but the restraining order does not forbid him from speaking about the breached data. It only pertains the dissemination of the actual data
Avatar
"Only individuals willing to navigate and interact with the criminal element on the dark web, who also have the computer expertise and tools necessary to download data from the dark web, would be able to do so." dumbest quote of 2024 goes to
💯 2
Avatar
What I think it really comes down to is intent. Illegal content exists all over the web, not just the dark web, take CSAM for example. Just because anyone can download it, doesn't make it legal to download. In this case, I do not see the downloading of the data to be an issue. The article says the city would not admit to the fact that over 3TB of databases containing PII and other sensitive information were leaked. The researcher intended to show the media that there was unencrypted personal data that was leaked by showing samples. Assuming what the article says is an accurate chain of events, then it is a huge concern that the city would not admit to the data leak, and the security researcher was only intending to get the truth out, not create further exposure of the stolen data.
👍🏼 1
11:24 AM
11:24 AM
Avatar
Avatar
FullTang
What I think it really comes down to is intent. Illegal content exists all over the web, not just the dark web, take CSAM for example. Just because anyone can download it, doesn't make it legal to download. In this case, I do not see the downloading of the data to be an issue. The article says the city would not admit to the fact that over 3TB of databases containing PII and other sensitive information were leaked. The researcher intended to show the media that there was unencrypted personal data that was leaked by showing samples. Assuming what the article says is an accurate chain of events, then it is a huge concern that the city would not admit to the data leak, and the security researcher was only intending to get the truth out, not create further exposure of the stolen data.
Husky_M00s3 9/1/2024 5:13 PM
Yeah… I am more troubled by the city’s actions. They had a breach. It can happen to anyone. But misleading the public is not ok. It is not ok to retaliating against a researcher who exposed inaccuracies at best - outright lies at worst.
💯 2
Avatar
Hey, I have some questions about the license costs of the following software in their minimal configuration. At this time, I don’t really have the time to engage in discussions with vendors, who will likely offer demos and such. For now, I just need to present some reasonable cost ranges to top management. I would really appreciate it if you could confirm my figures or correct me with decent price ranges.
  • Belkasoft X (I got $3000-$4000 annually)
  • FTK (I got $2500-$3000 annually)
  • Encase (I got $3000-$4000 annually)
  • Xways (I got $1500-$2000 annually)
Thanks
(edited)
👍 1
Avatar
chrisforensic 9/2/2024 1:01 AM
hello friends @Oxygen Forensics , when can we expect a new version of OFD? sunny greets from austria 😉
Avatar
Avatar
syllawins
Hey, I have some questions about the license costs of the following software in their minimal configuration. At this time, I don’t really have the time to engage in discussions with vendors, who will likely offer demos and such. For now, I just need to present some reasonable cost ranges to top management. I would really appreciate it if you could confirm my figures or correct me with decent price ranges.
  • Belkasoft X (I got $3000-$4000 annually)
  • FTK (I got $2500-$3000 annually)
  • Encase (I got $3000-$4000 annually)
  • Xways (I got $1500-$2000 annually)
Thanks
(edited)
Nobody has time for that, usually. The lack of transparency from (some) vendors is awful.
Avatar
Avatar
chrisforensic
hello friends @Oxygen Forensics , when can we expect a new version of OFD? sunny greets from austria 😉
Oxygen Forensics 9/2/2024 2:22 AM
Hello! Mid-September is the date. From what I have seen you will really like this update 🙂 By the way, if you have spare time before the update, you can help us steer our development by answering a few questions here - https://oxygenforensics.com/en/customer-satisfaction-questionnaire/ 😉 Way too sunny greets back from Zagreb😞
👍 1
😆 1
Avatar
Avatar
Oxygen Forensics
Hello! Mid-September is the date. From what I have seen you will really like this update 🙂 By the way, if you have spare time before the update, you can help us steer our development by answering a few questions here - https://oxygenforensics.com/en/customer-satisfaction-questionnaire/ 😉 Way too sunny greets back from Zagreb😞
chrisforensic 9/2/2024 4:24 AM
Hi, thanks for info! Yes, hot weather here too, about 32°C... greets, chris
Avatar
Anyone else get the @Magnet Forensics semi-annual customer satisfaction survey come through. I’m curious how a single question is helpful to Magnet (unless the contact those who select 10/10 to get quotes for marketing from them)
Avatar
Does Xways offer trial? I don't see the option on the website. (edited)
Avatar
Avatar
chauan
Does Xways offer trial? I don't see the option on the website. (edited)
They do. Just not publicly. If you send your information to sales@x-ways.com, that will likely get you started. “Trial licenses are not publicly available, only on request to law enforcement, government agencies and certain corporations. Please provide us with your full official address and contact details.”
👍 1
Avatar
Avatar
Oxygen Forensics
Hello! Mid-September is the date. From what I have seen you will really like this update 🙂 By the way, if you have spare time before the update, you can help us steer our development by answering a few questions here - https://oxygenforensics.com/en/customer-satisfaction-questionnaire/ 😉 Way too sunny greets back from Zagreb😞
Can you tell us some more about the update?
Avatar
Avatar
Mr.Robot
Can you tell us some more about the update?
Oxygen Forensics 9/3/2024 1:39 AM
Hello. Cannot say much, sorry! But you can expect more free languages for the translation module, expanded Android (especially unlocked and MTK) and iOS support, and a long awaited analytic feature which I cannot mention right now. We will send out a newsletter with all the details 🙂
👍 1
Avatar
Thankyou!
Avatar
Husky_M00s3 9/3/2024 9:59 AM
Anyone know how long E01 files have been around? I’ve been asked to assist on a case from 2001. Anyone know what the standards for hard drive imaging was back then? I’m currently googling it, but it would be nice to get a quick answer from my highly respected senior DFIR practitioners. We stand on the shoulders of giants… thank you! 😁
Avatar
Avatar
Husky_M00s3
Anyone know how long E01 files have been around? I’ve been asked to assist on a case from 2001. Anyone know what the standards for hard drive imaging was back then? I’m currently googling it, but it would be nice to get a quick answer from my highly respected senior DFIR practitioners. We stand on the shoulders of giants… thank you! 😁
Digitalferret 9/3/2024 11:11 AM
depends on version - early stuff before company pillow fight was ASRdata EWF , thats circa turn of century. Ex01 formats in different iterations later
11:13 AM
TSK/Autopsy similar timeframe but crom 2003ish?
Avatar
Avatar
Husky_M00s3
Anyone know how long E01 files have been around? I’ve been asked to assist on a case from 2001. Anyone know what the standards for hard drive imaging was back then? I’m currently googling it, but it would be nice to get a quick answer from my highly respected senior DFIR practitioners. We stand on the shoulders of giants… thank you! 😁
I recall using EnCase with a parallel port dongle in state law enforcement around 2000… I think the default file format was E01 then? Someone else here should be able to give you a more authoritative answer.
Avatar
Avatar
Arsenal
I recall using EnCase with a parallel port dongle in state law enforcement around 2000… I think the default file format was E01 then? Someone else here should be able to give you a more authoritative answer.
Digitalferret 9/3/2024 11:24 AM
hehe, "paralell ports" 🙂 llllooooooooooooooong time (ago), Jonny
🤣 3
Avatar
Avatar
Husky_M00s3
Anyone know how long E01 files have been around? I’ve been asked to assist on a case from 2001. Anyone know what the standards for hard drive imaging was back then? I’m currently googling it, but it would be nice to get a quick answer from my highly respected senior DFIR practitioners. We stand on the shoulders of giants… thank you! 😁
I'm kind of impressed the data from a case in 2001 is still around and readily accessiable. Data storage and the cost of storage has come a long way since then
Avatar
and not encrypted with proprietary FDE with a misplaced key
😅 1
😯 1
Avatar
Avatar
CyberGhost
I'm kind of impressed the data from a case in 2001 is still around and readily accessiable. Data storage and the cost of storage has come a long way since then
A few days ago a person wrote an email to me, telling me they are working on analyzing a drive for a case from 2003 or something
😂 1
Avatar
Husky_M00s3 9/4/2024 6:08 PM
Thank you, @Lazza @rayeh @Lazza @Arsenal @Digitalferret @CyberGhost
👍🏻 1
Avatar
Hello, can anyone tell me something about this file path in android "[...]com.Google.Android.apps.photos/cache/glide_cache/"? I have not found a referece. I have to know, if an app stores photos there or still the gallery. I have a thumbnail, but I need more information from where it possible came. (edited)
Avatar
Avatar
tost
Hello, can anyone tell me something about this file path in android "[...]com.Google.Android.apps.photos/cache/glide_cache/"? I have not found a referece. I have to know, if an app stores photos there or still the gallery. I have a thumbnail, but I need more information from where it possible came. (edited)
👍 1
Avatar
I have someone who's asking if I can use GrayKey to acquire an Apple iPhone 11 (probably ios 17.5) if the Cellebrite agent is still on the phone from a previous acquisition attempt. He doesn't want to remove the agent because that will restart the phone and he does not know the passcode. The phone is currently in AFU state. Is it possible that GrayKey could get an acquisition if the Cellebrite agent is still present? Thanks! (edited)
Avatar
Avatar
mixibe.
I have someone who's asking if I can use GrayKey to acquire an Apple iPhone 11 (probably ios 17.5) if the Cellebrite agent is still on the phone from a previous acquisition attempt. He doesn't want to remove the agent because that will restart the phone and he does not know the passcode. The phone is currently in AFU state. Is it possible that GrayKey could get an acquisition if the Cellebrite agent is still present? Thanks! (edited)
Not to my knowledge. But why do you want an extraction with GK, when it is possible with Cellebrite?
Avatar
Avatar
tost
Not to my knowledge. But why do you want an extraction with GK, when it is possible with Cellebrite?
They are having some consistent errors while trying Cellebrite, so they were asking if there was an alternative
Avatar
Avatar
mixibe.
I have someone who's asking if I can use GrayKey to acquire an Apple iPhone 11 (probably ios 17.5) if the Cellebrite agent is still on the phone from a previous acquisition attempt. He doesn't want to remove the agent because that will restart the phone and he does not know the passcode. The phone is currently in AFU state. Is it possible that GrayKey could get an acquisition if the Cellebrite agent is still present? Thanks! (edited)
Try this in the #mobile-forensic-extractions you might get a better response on that channel, good luck
👍 1
Avatar
Hi, names andrew I am a student in my honours project year and I am looking to try and find a new artefact for Windows for my project and am finding it increasingly less likely. (and by this, I mean that my project is looking like I will be expanding on an artefact/feature for windows) However, I do think I have a fundamentally wrong idea about what that means and have only really realised recently that an artefact has a lot more flexibility to its meaning than the standard registry, shimcache, amcache. And would like to ask the general question of how would you start the process of discovering a new artefact or expanding on an existing one. My current method is searching up applications for Windows and Windows features as well as artefact types, then looking for if research has been done into artefacts that are related or are generated from those applications or features. Thank you for your time in reading this.
Avatar
@Andrew Sent you a DM.
🙏 1
Avatar
Avatar
DCSO
Try this in the #mobile-forensic-extractions you might get a better response on that channel, good luck
@mixibe. I sent you a DM also. But as a general statement it’s not ideal mixing advanced access solutions when agents are on it. Not that the access methods are same but devices are likely not in states that are in real world events. The TLDR. It’s not recommended as it may have not desired outcomes. (edited)
Avatar
Avatar
CLB-Paul
@mixibe. I sent you a DM also. But as a general statement it’s not ideal mixing advanced access solutions when agents are on it. Not that the access methods are same but devices are likely not in states that are in real world events. The TLDR. It’s not recommended as it may have not desired outcomes. (edited)
Thank you!
Avatar
Avatar
mixibe.
I have someone who's asking if I can use GrayKey to acquire an Apple iPhone 11 (probably ios 17.5) if the Cellebrite agent is still on the phone from a previous acquisition attempt. He doesn't want to remove the agent because that will restart the phone and he does not know the passcode. The phone is currently in AFU state. Is it possible that GrayKey could get an acquisition if the Cellebrite agent is still present? Thanks! (edited)
facelessg00n 9/5/2024 2:48 PM
In my experience it will refuse to download / connect if there are other tools on it.
Avatar
khushigupta0641 9/6/2024 8:27 AM
Hello @everyone how would you rate magnet process as compared to belkaimager to image an android device?
Avatar
Avatar
khushigupta0641
Hello @everyone how would you rate magnet process as compared to belkaimager to image an android device?
Just a suggestion, there are thousands of users on this discord, tagging everyone is likely NOT THE** best route to take. 🙂 (edited)
💯 3
this 4
reverse 3
😂 1
Avatar
Avatar
CLB-Paul
Just a suggestion, there are thousands of users on this discord, tagging everyone is likely NOT THE** best route to take. 🙂 (edited)
Digitalferret 9/6/2024 9:40 AM
re read what you just put 🤣
🙈 1
Avatar
I don’t think it works for them 😀
9:57 AM
Avatar
Digitalferret 9/6/2024 11:53 AM
just a quick (ok maybe not so), kindly, suggestion for those seeking help or advice in DFIR Discord, and directed at no-one in particular as there have been several instances of this type of behaviour recently across many channels. Please post your request in an appropriate channel, and that channel alone. if a Mod believes it to be better placed in another, or cross posted, they will tell you. Then wait. Please also bear in mind, very few members have so much free time they are sitting waiting to attend <your> every need. Some may not be in here for days at a time. Posting to multiple channels, pinging (@) everyone or any particular role, DMing admins directly or generally trying to quicken a response, will attract nothing but the annoyance of those pestered. Thanks for your patience and understanding (edited)
💯 3
Avatar
Hello forensic dudes, what's an CloudFlare audit log ? (edited)
Avatar
Avatar
CyberGhost
I'm kind of impressed the data from a case in 2001 is still around and readily accessiable. Data storage and the cost of storage has come a long way since then
Husky_M00s3 9/7/2024 5:42 AM
Beefy 20 GB hard drive… Moore’s Law.
Avatar
Avatar
Husky_M00s3
Beefy 20 GB hard drive… Moore’s Law.
Digitalferret 9/7/2024 7:10 AM
first computer related couse i did, CLAITS, c1988/9, that would be a 20MB hdd 🙂
7:13 AM
| moore or | less ... <cough>
Avatar
Avatar
Digitalferret
first computer related couse i did, CLAITS, c1988/9, that would be a 20MB hdd 🙂
I remember getting my first 100MB hdd and thinking I was in heaven
😁 1
Avatar
Avatar
whoosier
I remember getting my first 100MB hdd and thinking I was in heaven
Vitaliy Mokosiy 9/8/2024 9:39 PM
20 MB Seagate. After a few years of using only floppy disks, when I was happy to have a RAM drive and really believed the words of Bill Gates about "640KB should be enough for everyone" 🙂 (edited)
😁 1
Avatar
tapatiosec 9/9/2024 9:12 AM
Hi quick queestion: I'm making an iOS CTF and I have a question on it that will lead the player to ultiately find and look at an app snapshot image of a map location that is present because the user did not close the maps app. TThe only prolem is that I don't know what tools can open KTX files on windows. Do you guys have any recommendations for doing this?
Avatar
Avatar
tapatiosec
Hi quick queestion: I'm making an iOS CTF and I have a question on it that will lead the player to ultiately find and look at an app snapshot image of a map location that is present because the user did not close the maps app. TThe only prolem is that I don't know what tools can open KTX files on windows. Do you guys have any recommendations for doing this?
Scripts to process macOS forensic artifacts. Contribute to ydkhatri/MacForensics development by creating an account on GitHub.
❤️ 1
Avatar
LeatherCouch 9/9/2024 4:28 PM
I have an iPhone, iPad, and MacBook (M1). AFU extractions were done on iPhone and iPad. I’ve gathered a list of passwords used on the devices and am now going to image the MacBook with Recon ITR. Instead of me endlessly plugging passwords, is there anything in the keychains from the two previous devices that could help me get the MacBooks password? Appreciate any suggestions.
Avatar
Avatar
LeatherCouch
I have an iPhone, iPad, and MacBook (M1). AFU extractions were done on iPhone and iPad. I’ve gathered a list of passwords used on the devices and am now going to image the MacBook with Recon ITR. Instead of me endlessly plugging passwords, is there anything in the keychains from the two previous devices that could help me get the MacBooks password? Appreciate any suggestions.
Just to be clear, you have AFU extractions from the iPad and iPhone, but the MacBook password is unknown and has not been imaged yet?
Avatar
Avatar
FullTang
Just to be clear, you have AFU extractions from the iPad and iPhone, but the MacBook password is unknown and has not been imaged yet?
LeatherCouch 9/9/2024 5:36 PM
Yes sir
Avatar
Thank you for accepting me
👍🏻 1
Avatar
Avatar
LeatherCouch
Yes sir
I think I heard somewhere that @Passware can unlock a MacBook with a keychain from a linked iPhone/iPad, but I don’t know if it will work with an AFU keychain or if it has to be an FFS/fully unlocked keychain.
Avatar
Avatar
FullTang
I think I heard somewhere that @Passware can unlock a MacBook with a keychain from a linked iPhone/iPad, but I don’t know if it will work with an AFU keychain or if it has to be an FFS/fully unlocked keychain.
If it's a T2 I think that's one of the options. Last time I looked into it, there was a $3k add-on for the T2 module... Because it was 3k, I don't have the module to tell you for sure!
👍 1
Avatar
Avatar
whee30
If it's a T2 I think that's one of the options. Last time I looked into it, there was a $3k add-on for the T2 module... Because it was 3k, I don't have the module to tell you for sure!
Yep, that sounds right. I do have that in my notes that it only works with T2, but I didn't check my notes before responding...
Avatar
I'll add in that I recently had several T2s across multiple cases (when it rains it pours) and ITR was the tool that worked for me. I was fortunate in that I could determine passwords, but I didn't have one initially, hence looking into passware. Collector failed a bunch partway through, I couldn't suss out the reason. ITR worked first try though.
Avatar
Avatar
FullTang
I think I heard somewhere that @Passware can unlock a MacBook with a keychain from a linked iPhone/iPad, but I don’t know if it will work with an AFU keychain or if it has to be an FFS/fully unlocked keychain.
LeatherCouch 9/10/2024 11:09 AM
I’ve tried the keychain with passware, but it won’t accept the keychain-2, backup_keychain_v2 that cellebrite produced. Not sure if my agency is willing to fork out the $3k for the add-on unless this issue happens more frequently.
Avatar
Avatar
whee30
I'll add in that I recently had several T2s across multiple cases (when it rains it pours) and ITR was the tool that worked for me. I was fortunate in that I could determine passwords, but I didn't have one initially, hence looking into passware. Collector failed a bunch partway through, I couldn't suss out the reason. ITR worked first try though.
LeatherCouch 9/10/2024 11:10 AM
Is there a finite amount of attempts that can be made before ruining future attempts at imaging ?
Avatar
Avatar
LeatherCouch
Is there a finite amount of attempts that can be made before ruining future attempts at imaging ?
When I was going through a few months ago, I got this reply in the computer forensics channel: https://discord.com/channels/427876741990711298/427936091220344833/1261029140719599666 I can't confirm or deny, but it's something to look into.
Avatar
Avatar
LeatherCouch
I’ve tried the keychain with passware, but it won’t accept the keychain-2, backup_keychain_v2 that cellebrite produced. Not sure if my agency is willing to fork out the $3k for the add-on unless this issue happens more frequently.
The backup keychain from cellebrite needs to be cleaned up before it can be used in passware (at least the last time I had to use one in Passware). Greykey outputs the keychain in the correct format and doesn’t need cleaning up. There could be other reasons the keychain isn’t working though, such as different iCloud accounts on phone/mac.
Avatar
Avatar
Fr0stByt3
The backup keychain from cellebrite needs to be cleaned up before it can be used in passware (at least the last time I had to use one in Passware). Greykey outputs the keychain in the correct format and doesn’t need cleaning up. There could be other reasons the keychain isn’t working though, such as different iCloud accounts on phone/mac.
LeatherCouch 9/10/2024 12:31 PM
Could you expand on what needs cleaned up for passware to accept it ?
Avatar
Avatar
LeatherCouch
Could you expand on what needs cleaned up for passware to accept it ?
https://gist.github.com/xperylab/e6b943bbd592eff74af36effc914d44d it’s been a while since I used this (and I can’t remember if the script needed some tweaking to work now).
UFED KeychainDump Decrypter . GitHub Gist: instantly share code, notes, and snippets.
👍 1
Avatar
@whee30 @LeatherCouch Not sure if it’s changed since you last looked but the Device Decryption add-on is more like $2k. It’s certainly paid for itself in our unit, between T2 unlocks and WD HDD unlocks it’s well worth it imho. It’s the only option I know of right now to attack T2 Macs, but depends on how many you see I guess
Avatar
Anyone dealt with final stage of PA "Finishing Extraction Info" taking 3+ hours??
2:58 PM
I can see analyzed data is populated, trace window is on last phase, but won't finish up.
Avatar
Avatar
theshark
Anyone dealt with final stage of PA "Finishing Extraction Info" taking 3+ hours??
return2zero 9/10/2024 3:19 PM
Yep, particularly if it was an iPhone 14/15 with 256GB or more capacity and a lot of it was used space. The machine you are using is grunty enough? (edited)
👍 1
Avatar
Eh, not really. its an i9 and good RAM but it is onsite so I am not on an actual workstation.
3:21 PM
Thanks tho, just going to keep waiting it out.
Avatar
Avatar
theshark
Anyone dealt with final stage of PA "Finishing Extraction Info" taking 3+ hours??
facelessg00n 9/10/2024 8:11 PM
Yeah it’s super annoying 😬
Avatar
Does block of External startup disk make so you can not image a mac with T2 with target disk mode? I get "Cannot use thunderbolt acessory" when i connect the mac to another mac?
Avatar
Avatar
Pehr
Does block of External startup disk make so you can not image a mac with T2 with target disk mode? I get "Cannot use thunderbolt acessory" when i connect the mac to another mac?
No, I’ve imaged T2 MacBooks via target disk mode before with startup security enabled. Are you sure your thunderbolt cable is working and undamaged?
Avatar
Avatar
Fr0stByt3
No, I’ve imaged T2 MacBooks via target disk mode before with startup security enabled. Are you sure your thunderbolt cable is working and undamaged?
Thanks, wanted to rule out that it wasn't just that. Will try again with new cable
Avatar
Avatar
LeatherCouch
Could you expand on what needs cleaned up for passware to accept it ?
https://gist.github.com/AmNe5iA/f3a35a9f686d185f178edfc55b944b10 I am told this fork of the script is the one that makes the Cellebrite backup_keychain_v2.plist compatible with Passware.
UFED backup_keychain_v2 Decrypter . GitHub Gist: instantly share code, notes, and snippets.
🔥 4
this 1
Avatar
Anyone knows if power on time of a disk could be manipulated ? I have a disk with a very low power-on and run time. That suspicious due to the case contexte. I'm searching if these operations leaves traces
Avatar
UK Police, do you have policies or processes around wiping a subjects device prior to returning. The device is an Android phone. Would you just do factory reset or is their specialist software? (edited)
Avatar
Avatar
LeatherCouch
I have an iPhone, iPad, and MacBook (M1). AFU extractions were done on iPhone and iPad. I’ve gathered a list of passwords used on the devices and am now going to image the MacBook with Recon ITR. Instead of me endlessly plugging passwords, is there anything in the keychains from the two previous devices that could help me get the MacBooks password? Appreciate any suggestions.
Semantics 21 (Tom) 9/11/2024 11:38 AM
You could give this tool we made a few years ago a try. If you have a list of passwords, it’ll brute force the image and reveal the Mac password. It’s not the fastest, but it’s definitely quicker than typing each one manually.
Avatar
Avatar
Semantics 21 (Tom)
You could give this tool we made a few years ago a try. If you have a list of passwords, it’ll brute force the image and reveal the Mac password. It’s not the fastest, but it’s definitely quicker than typing each one manually.
As far as I understand, there is no image as it's an M1 Mac and you cannot start any tool without an admin password
this 2
Avatar
Avatar
KM
UK Police, do you have policies or processes around wiping a subjects device prior to returning. The device is an Android phone. Would you just do factory reset or is their specialist software? (edited)
Depends on the case, if it's CP nope that's not going back to them. (not in the UK though) If it's a victim phone that contains contraband we developed a sheet that is signed by the parents etc that they will unlock and wipe the phone while we are present.
👍🏻 1
Avatar
Avatar
Lazza
As far as I understand, there is no image as it's an M1 Mac and you cannot start any tool without an admin password
Semantics 21 (Tom) 9/11/2024 2:43 PM
Didn’t Cellebrite advertise they supported booting M1 and M2 macs recently or does that still require the users password?
Avatar
Avatar
Semantics 21 (Tom)
Didn’t Cellebrite advertise they supported booting M1 and M2 macs recently or does that still require the users password?
It requires the password... BTW you cannot "boot" an Apple Silicon Mac on an external drive, what you can do is put an app on an external drive and have it appear on the startup menu. It will still require the stock recovery internal partition on the Mac and boot that one
👍 1
Avatar
Welcome back to another watchTowr Labs blog. Brace yourselves, this is one of our most astounding discoveries. Summary What started out as a bit of fun between colleagues while avoiding the Vegas heat and $20 bottles of water in our Black Hat hotel rooms - has now seemingly become a
Avatar
this does not spark joy
Avatar
Avatar
javanzato
this does not spark joy
CLB-DannyTheModeler 9/12/2024 5:22 AM
It does for anybody that has a meaningful piece of that $2.65B pie.
😂 4
Avatar
SuperSleuth 9/12/2024 8:58 AM
Need to replace my forensics laptop. Any recommendations with brand and specs for primary use of Cellebrite Inseyets. Needs to be powerful enough for extractions in the field. Thanks!!
Avatar
Avatar
SuperSleuth
Need to replace my forensics laptop. Any recommendations with brand and specs for primary use of Cellebrite Inseyets. Needs to be powerful enough for extractions in the field. Thanks!!
You can start with HP Zbooks and compare. We use this type because our IT can get a discount etc. Just an idea......
Avatar
Avatar
SuperSleuth
Need to replace my forensics laptop. Any recommendations with brand and specs for primary use of Cellebrite Inseyets. Needs to be powerful enough for extractions in the field. Thanks!!
Sager notebooks is good if you are looking for a gaming (spec) laptop and the cheapest I have found.
Avatar
Anyone have any good resources for learning to investigate and use Microsoft Purview. Mainly looking at the Audit section?
Avatar
Avatar
SuperSleuth
Need to replace my forensics laptop. Any recommendations with brand and specs for primary use of Cellebrite Inseyets. Needs to be powerful enough for extractions in the field. Thanks!!
ScottKjr3347 9/12/2024 8:45 PM
I just ordered one from https://bitmindz.com/
Avatar
Andrew Rathbun 9/12/2024 8:46 PM
@BiTMindz should be here, as well
Avatar
Avatar
ScottKjr3347
I just ordered one from https://bitmindz.com/
Sadly when you click the shop now button on the main page, it goes to a 404
1:09 AM
Now it just scrolls to the footer 😂
Avatar
Avatar
SuperSleuth
Need to replace my forensics laptop. Any recommendations with brand and specs for primary use of Cellebrite Inseyets. Needs to be powerful enough for extractions in the field. Thanks!!
Personally I go with ThinkPad, usually the P or T series
Avatar
Avatar
ryd3v
Now it just scrolls to the footer 😂
They send you to a "latest products" box at the bottom, which is conveniently empty. 👀 But I see they have a page to resell iFixit screwdriver kits, weird...
Avatar
Anyone with experience making strong arguments for iPhone text deletions in court, please dm. I have some details I need to make sense of and strengthen.
Avatar
bfu
Avatar
Avatar
Lazza
They send you to a "latest products" box at the bottom, which is conveniently empty. 👀 But I see they have a page to resell iFixit screwdriver kits, weird...
Yeah I found some of the products after, which were overpriced.
Avatar
Has anyone ever managed to scrape telegram ? (edited)
Avatar
Avatar
$CozyBear
Has anyone ever managed to scrape telegram ? (edited)
Digitalferret 9/14/2024 1:57 AM
in Engrish pl0x?
Avatar
Avatar
Digitalferret
in Engrish pl0x?
I have to scrape from Telegram to retain chat logs of a Telegram group, a potential CSAM and counterfeit case. All the chats are In Thai and other groups are in Chinese. The chat export function does not work nor does the translation xD (edited)
👍🏻 1
2:00 AM
My only option is to scrape
2:02 AM
However, I was thinking if someone has come across similar situations
Avatar
Avatar
$CozyBear
I have to scrape from Telegram to retain chat logs of a Telegram group, a potential CSAM and counterfeit case. All the chats are In Thai and other groups are in Chinese. The chat export function does not work nor does the translation xD (edited)
Digitalferret 9/14/2024 2:02 AM
sounds good, a chance for you to excel 🙂
❤️ 1
Avatar
Avatar
Digitalferret
sounds good, a chance for you to excel 🙂
Previous Anti Piracy roles did help alot, I actually really enjoy being in DF/Research, it's really rewarding dude.
Avatar
Avatar
$CozyBear
I have to scrape from Telegram to retain chat logs of a Telegram group, a potential CSAM and counterfeit case. All the chats are In Thai and other groups are in Chinese. The chat export function does not work nor does the translation xD (edited)
Digitalferret 9/14/2024 2:05 AM
what application are you using to be in Telegram group?
Avatar
Avatar
Digitalferret
what application are you using to be in Telegram group?
I'm using Desktop, but there's tons of chats to go through for me to establish a relationship of what's going on.
2:07 AM
Everything is done through a VM (edited)
Avatar
Digitalferret 9/14/2024 2:07 AM
might this be why the chat export function doesn't work?
Avatar
Avatar
Digitalferret
might this be why the chat export function doesn't work?
Yes, that's definitely the reason but extracting the chat logs comes back as html In Telegram. Preferably, it should be in CSV. (edited)
Avatar
Avatar
$CozyBear
Yes, that's definitely the reason but extracting the chat logs comes back as html In Telegram. Preferably, it should be in CSV. (edited)
Digitalferret 9/14/2024 2:14 AM
damn, another chance to excel - html2csv (or rather TSV) might work better
Avatar
Yes but then translating it would be a pain. Can't be using this data through LLMs to translate
Avatar
Digitalferret 9/14/2024 2:15 AM
start with an AI helper? I need to strip html code from text document, using python <whatever>
❤️ 1
Avatar
They said strictly not to use any AI.
Avatar
Digitalferret 9/14/2024 2:16 AM
you won't be
2:16 AM
AI to start you off in a program
👍🏾 1
2:16 AM
youd be using <program languag>
❤️ 1
2:18 AM
scrape data - pass into a text/csv/tsv doc - pass to some translation program. there's the other issue, whichever program you use to translate, how can you g'tee that isn't using AI to interpret. as ever things can be lost in translation. maybe as part of the assignment, you make the case for a human to double check anything you do
❤️ 1
2:22 AM
Ни пуха, ни пера
2:25 AM
as always, be sure to quote/appendix/reference your sources for anything you use that isn't specifically your work. indemnity in case of something FUBAR
❤️ 1
Avatar
Avatar
Digitalferret
scrape data - pass into a text/csv/tsv doc - pass to some translation program. there's the other issue, whichever program you use to translate, how can you g'tee that isn't using AI to interpret. as ever things can be lost in translation. maybe as part of the assignment, you make the case for a human to double check anything you do
Yes, it's pretty straight forward but just Telegram stupid API restrictions: Look at the chat logs Establish a relationship Scrape the channel while maintaining OPSEC Take the necessarily captures with appropriate timestamps in GMT, Use link analysis to out the relationships between these supposed criminals Verify with a human source with the language (edited)
Avatar
Avatar
Digitalferret
as always, be sure to quote/appendix/reference your sources for anything you use that isn't specifically your work. indemnity in case of something FUBAR
I usually include an annex section in my report but figures get messed when I find new things xD. (edited)
Avatar
Avatar
$CozyBear
Yes, that's definitely the reason but extracting the chat logs comes back as html In Telegram. Preferably, it should be in CSV. (edited)
Are you sure? As far I remember you could select a wonderful JSON export
Avatar
Avatar
Lazza
Are you sure? As far I remember you could select a wonderful JSON export
Through Desktop telegram ?
Avatar
Yes. By the way, I remember that chat export does not work initially when you connect a new device (for safety reason or whatever) You need to wait 1 hour or something.
Avatar
Avatar
Lazza
Yes. By the way, I remember that chat export does not work initially when you connect a new device (for safety reason or whatever) You need to wait 1 hour or something.
Yep, when I tried to do that on a alias account tied to an iCloud and it time restricted the chat export. I don't have access to the alias for now. (edited)
Avatar
Avatar
$CozyBear
Yep, when I tried to do that on a alias account tied to an iCloud and it time restricted the chat export. I don't have access to the alias for now. (edited)
You should wait 1 hour or something like that, from when you connected the device. What options do you get in Telegram Desktop when you click on the export format?
Avatar
Avatar
Lazza
You should wait 1 hour or something like that, from when you connected the device. What options do you get in Telegram Desktop when you click on the export format?
It's just export chats that's all xD. All the other features like live translation exists in the premium version.
4:28 AM
I'll think have to set up an alias account myself and purchase a SIM (edited)
4:29 AM
for this JSON export to work on a test device
Avatar
I am using a mobile phone right now, but this is an image found online. Looks pretty much like what I remember it being... you don't get this screen?
Avatar
Avatar
Lazza
I am using a mobile phone right now, but this is an image found online. Looks pretty much like what I remember it being... you don't get this screen?
Yes that's exactly what I got via desktop using alias account tied to an iCloud but as you mentioned you wait for an hour but don't have access to the account (edited)
Avatar
Avatar
$CozyBear
Yes that's exactly what I got via desktop using alias account tied to an iCloud but as you mentioned you wait for an hour but don't have access to the account (edited)
In that window, you should be able to click on "Html" to change the format, after you waited for a bit of time
❤️ 1
Avatar
Avatar
Lazza
In that window, you should be able to click on "Html" to change the format, after you waited for a bit of time
I'll give that a go dude, that's right. The next barrier is the translation and link analysis xD, but the former should be okay (edited)
👍 1
Avatar
Avatar
Lazza
You should wait 1 hour or something like that, from when you connected the device. What options do you get in Telegram Desktop when you click on the export format?
Its actually a 11 hour wait for me export chats xD, just checked (edited)
Avatar
OK maybe it's a time set by the server based on some criteria
Avatar
Avatar
Lazza
OK maybe it's a time set by the server based on some criteria
Most likely, thought I'd inform you about the timings or if anyone else comes across a similar situation. (edited)
👍 1
5:04 AM
Guess I'll have to purchase a SIM on my test phone.
Avatar
In the past I wanted to do a test with an unofficial Telegram client (there are several on Github) but I never managed to try
❤️ 1
Avatar
Avatar
Lazza
In the past I wanted to do a test with an unofficial Telegram client (there are several on Github) but I never managed to try
Yes I often find myself in those situations too, but requests have a deadline.
Avatar
Okay update, SIM purchased. It works now. @Lazza @Digitalferret Thanks guys. (edited)
🎊 2
Avatar
Any Irish connections have an idea on a starting salary range for a forensic examiner within law enforcement? At the level of a relevant MSc or 4 years experience etc. thanks
Avatar
Avatar
RichardG
Any Irish connections have an idea on a starting salary range for a forensic examiner within law enforcement? At the level of a relevant MSc or 4 years experience etc. thanks
Digitalferret 9/15/2024 1:51 PM
maybe echo that in #training-education-employment too
Avatar
chrisforensic 9/16/2024 1:37 AM
My mental state.... I am eagerly awaiting the new version of Oxygen Forensic Detective 😉 @Oxygen Forensics
😂 1
Avatar
Avatar
chrisforensic
My mental state.... I am eagerly awaiting the new version of Oxygen Forensic Detective 😉 @Oxygen Forensics
Oxygen Forensics 9/16/2024 1:37 AM
Almost there 🙂
👍 1
Salute 1
Avatar
Digitalferret 9/16/2024 3:35 AM
🙂
Avatar
Avatar
$CozyBear
I'll give that a go dude, that's right. The next barrier is the translation and link analysis xD, but the former should be okay (edited)
Okay update, I went out my way of creating a python script for the investigation but Export Chart in Telegram has a HTML conversion too which displays it in a webpage format (edited)
3:58 PM
and you could simply translate the text of the html extracted Telegramm chat data, bit annoyed to find out that out. This makes linking so much more easier. (edited)
Avatar
Damn they deleted that one message, should have captured it fs.
Avatar
Avatar
chrisforensic
My mental state.... I am eagerly awaiting the new version of Oxygen Forensic Detective 😉 @Oxygen Forensics
Oxygen Forensics 9/17/2024 5:34 AM
Version 17.0 just got releasedoxygen🥳 Please go ahead and update. Some highlights:
  • Speech-to-Text recognition,
  • Extensive application data extraction support from unlocked Android devices with SPL up to June 2024,
  • And much more.
💯 1
Salute 3
Avatar
Oxygen Forensics 9/17/2024 5:41 AM
Many of the features in release 17.0 (like in all releases) started as suggestions from events or support tickets. If you're using OFD and have a feature request or adjustment in mind, feel free to email us at support@oxygenforensics.com. We also run surveys to help us guide our development. This month survey helps us understand which applications you encounter the most and what unsupported apps you'd like us to add. Feel free to fill out the questionnaire and positively impact the software 😉 Link: https://oxygenforensics.com/en/customer-satisfaction-questionnaire/
Avatar
Anyone familiar with tools to help analyze electronically tracked documents and verify them?
9:46 AM
Feel like Magnet would be my best bet for meta dta but not sure if some experience in this area takes another avenue.
12:44 PM
Thousands of people were injured Tuesday and several killed when their pagers exploded almost simultaneously across Lebanon, officials said, with Hezbollah confirming some of its members were wounded and blaming the attack on Israel.
Avatar
Yahya Abd-al-Latif Ayyash (Arabic: يحيى عياش; 6 March 1966 – 5 January 1996) was the chief bombmaker of Hamas and the leader of the West Bank battalion of the Izz ad-Din al-Qassam Brigades. In that capacity, he earned the nickname "the Engineer" (Arabic: المهندس, transliterated al-Muhandis). Ayyash is credited with advancing the technique of sui...
👍 1
12:52 PM
12:52 PM
Wild, I didn't realize how many times telephones have blown up over there
Avatar
Avatar
conf1ck3r
Wild, I didn't realize how many times telephones have blown up over there
Digitalferret 9/17/2024 2:14 PM
Hezbollah: these pagers any good? Dealer: absolutely man, they is da bomb ... sorry, i'll see myself out :/
❤️ 2
🤣 4
2:15 PM
waiting for US/Trump to give Xiaomi handsets the side eye, "ban all these..."
Avatar
Anyone got any good/interesting training "hooks?" I teach a couple 4 and 8 Hour portions of classes in Digital Forensics to Sworn and Civilian police personnel at a local Criminal Justice Center. My hook for most classes is the following, "Imagine the cell phone you had 20 years ago. Remember what it was capable of- calling, texting, maybe playing "snake." Now imagine I was a reporter for the New York Times back then, and I was writing an expose on you. And I have the resources to either 1) break into your house, or 2) break into your cell phone. How many of you would rather me break into your house? [Most students don't raise their hands]. How many of you would rather me get into your cell phone 20 years ago? [Most students raise their hands]. Now it's present day, and the same thing applies- I can get into your house, or your cell phone. How many would rather me get into your house? [Most students raise their hands]. How many people would rather me get into their cell phone? [Basically no one raises their hand]. Now why is it that today you'd rather I have access to your 1,000, 2,000, 3,000 sq foot house, rather than this less than 1 sq foot device? The students are now thinking of all the "secrets" their phone knows about them." It's a great hook. It really seems to get the students interested in the material I'm about to teach them. The issue is one of the classes I teach is a deeper dive into the same material, so most students in that class had me before. And I've yet to come up with another great hook to use in that class. For those of you who train, or those of you who have a great hook, I'd be curious which ones you use when training/teaching. Thanks!
💯 2
💡 1
Avatar
Avatar
Digitalferret
waiting for US/Trump to give Xiaomi handsets the side eye, "ban all these..."
Considering all mobile device batteries are manufactured in the Mainland more or less, Samsung and Apple included. Imagine the world wide casualties if China was as Ninja as Israel 🤯
5:41 PM
Not just phones, laptops and tablets , included.
5:41 PM
I’d say, after today, it may change the device landscape. Will be a blast for IT workers.
🥁 3
💥 2
Avatar
Beyond the wild reality of what happened today, I am having a really tough time wrapping my head around the decision process. I think, that given the information I am most certainly not qualified to know, there was probably some level of certainty as to whom would be using the devices. But there is no way on earth that with as many unsupervised explosions occurred in such a brief window that every single explosion was a "known quantity". I've never been a soldier, I've never had to make decisions involving the certainty of collateral damage, I just can't wrap my brain around green lighting such a thing. One targeted explosion, I get it. You can confirm it. But this level of distribution it just seems reckless.
💯 1
9:17 PM
The story is wild. I'm definitely curious to know more
Avatar
Avatar
ryd3v
Considering all mobile device batteries are manufactured in the Mainland more or less, Samsung and Apple included. Imagine the world wide casualties if China was as Ninja as Israel 🤯
Digitalferret 9/18/2024 12:56 AM
you heard it here first!
🙏 1
Avatar
Avatar
ryd3v
Considering all mobile device batteries are manufactured in the Mainland more or less, Samsung and Apple included. Imagine the world wide casualties if China was as Ninja as Israel 🤯
Digitalferret 9/18/2024 12:59 AM
in a shocking reminder of the historical demolition job, nine hundred and eleven citizens were paged yesterday...... President <any-one-will-do> re-iterated his assertion that he is the bad guy behind all the James Bond movies put together 🙂
Avatar
@Magnet Forensics - feature request - can we have bionic reader and a focus mode for evidence review
Avatar
Dar Belkasoft 9/18/2024 1:59 AM
Belkasoft is gathering insights on the fight against child sexual abuse material (CSAM). Our research addresses questions about the effectiveness of digital forensic tools, the role of emerging technologies, mental health impacts, and lessons learned by professionals. We cannot do it alone. Your input is essential to help us understand these issues and drive change. This critical issue affects society as a whole. Your experience can help us build a clearer understanding. Share your insights and get a chance to win a 6-month Belkasoft X license! Take the survey: https://eu1.hubs.ly/H0csdwg0
Belkasoft2 1
🙌 1
Avatar
Avatar
busted4n6
@Magnet Forensics - feature request - can we have bionic reader and a focus mode for evidence review
Can you elaborate a bit for me?
Avatar
Avatar
Tim F
Can you elaborate a bit for me?
Sure. Bionic Reading (https://bionic-reading.com) is a cool way of making blocks of text more readable for those of us who are neurodivergent. Basically highlighting key letters/sounds etc as I understand it. Focus mode exists in tools such as Microsoft Word and web browsers to provide an immediate full screen interface, often dark/low colour with clutter removed. I find it changing to review threads of emails and messages, documents or even just event logs challenging and have to pull the details card to a new screen and enlarge it but because it’s part of examine, you can’t alt tab to word etc. even the ability to expand spaces between rows and do alternative colouring for rows would help and other quality of life features such as double clicking on columns to make them fit to size or have word wrap in a similar way to excel.
Bionic Reading® — You are unique. Bionic Reading® is unique. And that’s a good thing. Because there is only one company and reading method called Bionic Reading®. And we are from Switzerland.
📫 1
🔥 1
2:15 AM
Having spent the past 3 months doing one case in axiom (complex criminality) I have a list of quality of life features to request. I’ll write them up and share haha
Avatar
Hi there! Could anyone redirect me to any article that explains how MacBook forensic acquisition work? I'm supposed to write a report on this topic and I'm looking the information up on the internet but the opinion of actual professionals of the field would be helpful (edited)
Avatar
Avatar
busted4n6
Sure. Bionic Reading (https://bionic-reading.com) is a cool way of making blocks of text more readable for those of us who are neurodivergent. Basically highlighting key letters/sounds etc as I understand it. Focus mode exists in tools such as Microsoft Word and web browsers to provide an immediate full screen interface, often dark/low colour with clutter removed. I find it changing to review threads of emails and messages, documents or even just event logs challenging and have to pull the details card to a new screen and enlarge it but because it’s part of examine, you can’t alt tab to word etc. even the ability to expand spaces between rows and do alternative colouring for rows would help and other quality of life features such as double clicking on columns to make them fit to size or have word wrap in a similar way to excel.
I’ll DM you. If you can send me the list I can get them in the system.
👍 1
Avatar
Does anyone from @Law Enforcement [UK] operate a full faraday office or environment?
Avatar
Avatar
Sudo
Does anyone from @Law Enforcement [UK] operate a full faraday office or environment?
P4perTrails 9/18/2024 4:16 AM
Actually I'd like to hear about that too .. especially with the rise of esims.
Avatar
(KAOS) ReacherJ 9/18/2024 4:19 AM
I am just in the process of getting a network isolation room room built for my Lab. I'm waiting on procurement getting the contract set up but it should be constructed early next year
Avatar
Avatar
P4perTrails
Actually I'd like to hear about that too .. especially with the rise of esims.
yeah we are discussing it due to the advent of e-sims, yet to be determined what sort of impact we're looking at
Avatar
Avatar
(KAOS) ReacherJ
I am just in the process of getting a network isolation room room built for my Lab. I'm waiting on procurement getting the contract set up but it should be constructed early next year
just a small area of your existing lab?
Avatar
(KAOS) ReacherJ 9/18/2024 4:21 AM
It'll be about 6.5m x 4.5m with a vestibule - big enough for about 6-8 to work in comfortably
Avatar
Ah very good, we are considering options, do you know a rough cost? Fair enough if you can't disclose
Avatar
(KAOS) ReacherJ 9/18/2024 4:25 AM
For the 'box' itself it's around £90k and we're estimating around £25k to integrate into building services- hvac, power, network, fire alarm etc (edited)
Avatar
cool, thank you, that's about what our SMT suggested for procurement so good to know Salute
Avatar
(KAOS) ReacherJ 9/18/2024 4:27 AM
I'll have some confirmed costings in the next few weeks hopefully and a signed contract so I can DM you the details if you want
Avatar
Avatar
Sudo
Does anyone from @Law Enforcement [UK] operate a full faraday office or environment?
MrTurdTastic 9/18/2024 4:28 AM
We use faraday boxes
4:29 AM
I think they were about 5k a pop but have passthrough connectivity for use with DFIR tools (edited)
Avatar
Avatar
(KAOS) ReacherJ
I'll have some confirmed costings in the next few weeks hopefully and a signed contract so I can DM you the details if you want
yeah if you wouldn't mind, just as a rough overview, that would be great!
Avatar
(KAOS) ReacherJ 9/18/2024 4:30 AM
We use Ramsey boxes currently but they're a PITA to use for extended periods of time- that's why I want a full Faraday room
Avatar
Avatar
MrTurdTastic
We use faraday boxes
yeah us too for the moment though generally don't need them, just considering the future of connectivity with e-sims and "find my" jazz going forward
4:31 AM
yeah the boxes work but a pain to work with
Avatar
(KAOS) ReacherJ 9/18/2024 4:33 AM
We're also going to switch to new transport method for isolating a device - going to buy the new boxes that Global EMC have created- only issue is you can't open them in a Ramsey box so need to have the Faraday room for that purpose
4:34 AM
They're much better than Faraday bags and should last for years as they've deliberately over engineered them (edited)
Avatar
yeah we are also looking at how to plan for device isolation while in property stores, not sure yet what the impact will be to us compared to now, our officers manage to get them in airplane mode 98 times out of 100
4:37 AM
but it will just depend!
Avatar
(KAOS) ReacherJ 9/18/2024 4:37 AM
Sadly ours aren't that good🤣 (edited)
😂 1
Avatar
hah yeah that's fair
4:37 AM
we have definitely lost devices from failure to isolate but thankfully it is rare...
4:38 AM
we are very small force though so quite easy to deliver training to officers on the procedure
Avatar
(KAOS) ReacherJ 9/18/2024 4:39 AM
That's part of my issue - we're National so little chance of upskilling the front line staff
Avatar
yeah that's totally understandable
Avatar
Avatar
Sudo
Does anyone from @Law Enforcement [UK] operate a full faraday office or environment?
We don't. We have 2 x Ramsey boxes but they have an inch of dust on them, so make of that what you will. UKAS has raised it during their last visit re: esims but due to funds I think we are just waiting to see how things go. We can't get staff replaced now so I doubt we will be allowed any big spend.
Avatar
Avatar
(KAOS) ReacherJ
That's part of my issue - we're National so little chance of upskilling the front line staff
MrTurdTastic 9/18/2024 5:00 AM
Unrelated but got really confused as to why your dp was a picture of my cat. They look identical
Avatar
Avatar
MrTurdTastic
Unrelated but got really confused as to why your dp was a picture of my cat. They look identical
(KAOS) ReacherJ 9/18/2024 5:02 AM
Definitely my cat 😂 Dexter.
Avatar
Avatar
Sudo
Does anyone from @Law Enforcement [UK] operate a full faraday office or environment?
Semantics 21 (Tom) 9/18/2024 5:02 AM
Do you have any contacts at HMRC they have an amazing lab with a full faraday office, its most likely the best in the country. PM me if you want me to put you in contact with someone.
Avatar
Avatar
(KAOS) ReacherJ
I'll have some confirmed costings in the next few weeks hopefully and a signed contract so I can DM you the details if you want
P4perTrails 9/18/2024 5:13 AM
+1 for DM with detail please
Avatar
Avatar
Semantics 21 (Tom)
Do you have any contacts at HMRC they have an amazing lab with a full faraday office, its most likely the best in the country. PM me if you want me to put you in contact with someone.
P4perTrails 9/18/2024 5:16 AM
I also DM-ed you for that.
Avatar
Avatar
DenSide
Hi there! Could anyone redirect me to any article that explains how MacBook forensic acquisition work? I'm supposed to write a report on this topic and I'm looking the information up on the internet but the opinion of actual professionals of the field would be helpful (edited)
The main vendors in the space are @Cellebrite with their Digital Collector product or @SUMURI are the main commercial vendors. May be worth looking for blogs and webinars, or contacting them to see if they can give you white papers or product manual for an idea of capability, in particular with t2 equipped macs
Avatar
Avatar
busted4n6
The main vendors in the space are @Cellebrite with their Digital Collector product or @SUMURI are the main commercial vendors. May be worth looking for blogs and webinars, or contacting them to see if they can give you white papers or product manual for an idea of capability, in particular with t2 equipped macs
The tl;dr version - if the user has an Apple Silicon macOS device which is well configured you need the password or you’re not getting much further.
Avatar
Avatar
DenSide
Hi there! Could anyone redirect me to any article that explains how MacBook forensic acquisition work? I'm supposed to write a report on this topic and I'm looking the information up on the internet but the opinion of actual professionals of the field would be helpful (edited)
Sumuri Andrew 9/18/2024 8:45 AM
Morning/Afternoon. If you want, I'm happy to talk and answer any questions or point you toward any additional information you may be looking for when it comes to Mac Forensic Acquisition.
Avatar
Avatar
busted4n6
The tl;dr version - if the user has an Apple Silicon macOS device which is well configured you need the password or you’re not getting much further.
Sumuri Andrew 9/18/2024 8:47 AM
This is absolutely accurate. An admin or user password is required for Apple Silicon (M1, M2, M3, etc.). The level of access needed is dependent on how and what you are trying to acquire.
👍 1
Avatar
Avatar
P4perTrails
Actually I'd like to hear about that too .. especially with the rise of esims.
And pagers 😏
😂 2
Avatar
Avatar
whee30
Beyond the wild reality of what happened today, I am having a really tough time wrapping my head around the decision process. I think, that given the information I am most certainly not qualified to know, there was probably some level of certainty as to whom would be using the devices. But there is no way on earth that with as many unsupervised explosions occurred in such a brief window that every single explosion was a "known quantity". I've never been a soldier, I've never had to make decisions involving the certainty of collateral damage, I just can't wrap my brain around green lighting such a thing. One targeted explosion, I get it. You can confirm it. But this level of distribution it just seems reckless.
I was thinking along similar lines about the pager bombings yesterday. Not agreeing with their though process, or validating it, or saying it was correct- but I imagine the decision process went something like this: 1) We want to target only known terrorists 2) We have confirmed these pager numbers are associated with terrorist activity 3) If we limit the scope of the pager blasts to only known/verified current terrorists, then the second we initiate this blast, everyone with the unblown up pagers will be aware these devices have this capability, so 4) better to set more of them off knowing these devices have all been in connection with and furtherance of terrorist related activity even if we can't verify currently in a terrorists hands because we won't get this chance again. [Such a setup was only ever likely to be a "one and done"] Again, not agreeing with that decision making process or saying it's good/just/right. Just imagine that was their metrics- that they only ever had one chance to do this. Would be curious to know what percent of the compromised pagers they actually set off.
Avatar
Avatar
Grok
I was thinking along similar lines about the pager bombings yesterday. Not agreeing with their though process, or validating it, or saying it was correct- but I imagine the decision process went something like this: 1) We want to target only known terrorists 2) We have confirmed these pager numbers are associated with terrorist activity 3) If we limit the scope of the pager blasts to only known/verified current terrorists, then the second we initiate this blast, everyone with the unblown up pagers will be aware these devices have this capability, so 4) better to set more of them off knowing these devices have all been in connection with and furtherance of terrorist related activity even if we can't verify currently in a terrorists hands because we won't get this chance again. [Such a setup was only ever likely to be a "one and done"] Again, not agreeing with that decision making process or saying it's good/just/right. Just imagine that was their metrics- that they only ever had one chance to do this. Would be curious to know what percent of the compromised pagers they actually set off.
Digitalferret 9/18/2024 9:54 AM
i'd go with 1: offload as many as you can to anyone in the area, collateral damage is a thing. 2: it's a one shot operation, detonate all, bc once the news is out, anyone with pagers will throw them. 3: winx2 , their comms capability is shredded until they can verify any and all electronic devices.
Avatar
Avatar
Sudo
Does anyone from @Law Enforcement [UK] operate a full faraday office or environment?
All phones are first turned on in faraday boxes
Avatar
Avatar
Digitalferret
i'd go with 1: offload as many as you can to anyone in the area, collateral damage is a thing. 2: it's a one shot operation, detonate all, bc once the news is out, anyone with pagers will throw them. 3: winx2 , their comms capability is shredded until they can verify any and all electronic devices.
Collateral damage is always a thing, but it should be mitigated to the best of one's ability where possible and feasible. A spray and pray attitude would I feel neither be prudent, moral, or justified. Such unscrupulous actions, if and when undertaken (I won't assume this is what happened for the sake of discussion), only provide more "will" for the "where there's a will, there's a way." Both the way and the will need to be combatted, and unscrupulous actions only increase will. I don't know what the best way forward to peace for everyone is, but I'm keeping my fingers crossed people much more intelligent than me can someday soon find it.
👍 1
Avatar
Avatar
Dar Belkasoft
Belkasoft is gathering insights on the fight against child sexual abuse material (CSAM). Our research addresses questions about the effectiveness of digital forensic tools, the role of emerging technologies, mental health impacts, and lessons learned by professionals. We cannot do it alone. Your input is essential to help us understand these issues and drive change. This critical issue affects society as a whole. Your experience can help us build a clearer understanding. Share your insights and get a chance to win a 6-month Belkasoft X license! Take the survey: https://eu1.hubs.ly/H0csdwg0
Shogun//Rogan 9/18/2024 11:03 AM
I've contributed.
Avatar
Avatar
busted4n6
The main vendors in the space are @Cellebrite with their Digital Collector product or @SUMURI are the main commercial vendors. May be worth looking for blogs and webinars, or contacting them to see if they can give you white papers or product manual for an idea of capability, in particular with t2 equipped macs
Good to know! Thank you so much
Avatar
Avatar
Sumuri Andrew
Morning/Afternoon. If you want, I'm happy to talk and answer any questions or point you toward any additional information you may be looking for when it comes to Mac Forensic Acquisition.
Just dm'd you Thank you for your help
👍 1
Avatar
Avatar
Grok
Collateral damage is always a thing, but it should be mitigated to the best of one's ability where possible and feasible. A spray and pray attitude would I feel neither be prudent, moral, or justified. Such unscrupulous actions, if and when undertaken (I won't assume this is what happened for the sake of discussion), only provide more "will" for the "where there's a will, there's a way." Both the way and the will need to be combatted, and unscrupulous actions only increase will. I don't know what the best way forward to peace for everyone is, but I'm keeping my fingers crossed people much more intelligent than me can someday soon find it.
Digitalferret 9/18/2024 1:23 PM
I don't know what the best way forward to peace for everyone is, but I'm keeping my fingers crossed people much more intelligent than me can someday soon find it. war isn't meant to be won, it's meant to be continuous. whilst there is money to be made, arms will proliferate. Reagan may have hit the nail on the head with his aliens speech. how quickly would disparate nations solve their differences if the threat from without was there
Avatar
Biting my fingers
Avatar
Original message was deleted or could not be loaded.
Digitalferret 9/19/2024 12:53 AM
But I promised not to comment any further so I’m going to bite my tongue or fingers rather but you did. yep. one side will always justify it's actions, citing the other. don't forget Putin has valid reasons for invading Ukraine. the pIRA had valid reasons for bombing the brits. and the long day drags on. in the end it's the old "rich men getting poor men to fight and die for for their own means". religious or political. disclaimer: My personal view, not DFIR chan. I'm now more limited than yourself in that respect.
Avatar
Avatar
DenSide
Hi there! Could anyone redirect me to any article that explains how MacBook forensic acquisition work? I'm supposed to write a report on this topic and I'm looking the information up on the internet but the opinion of actual professionals of the field would be helpful (edited)
Not exactly an article, but one of the points in making Fuji open source is exactly that one, i.e. letting people read its (short) source code and figure out what is being done. I suggest you do the same. There are some articles linked in the README, by the way. (edited)
💡 1
12:54 AM
Commercial tool vendors will often not tell you that it boils down to a ffs acquisition on Apple Silicon, aka "copy all the files" or "use ASR"
Avatar
Dr. Kaan Gündüz 9/19/2024 1:56 AM
@Andrew Rathbun perhaps you need a new channel, politics-and-crap
😂 4
🤦‍♂️ 4
Avatar
Avatar
Semantics 21 (Tom)
Do you have any contacts at HMRC they have an amazing lab with a full faraday office, its most likely the best in the country. PM me if you want me to put you in contact with someone.
that would be great if you could
Avatar
Avatar
Dr. Kaan Gündüz
@Andrew Rathbun perhaps you need a new channel, politics-and-crap
Probably a really bad idea
Avatar
walktexranga 9/19/2024 10:13 PM
Hey all, is it possible for iPhones to receive wipe commands from other Apple devices via find-my network or all good provided in flight mode/wifi off/sim ejected? Noticed it mention "iPhone is findable" when I plugged into charge and got me pondering.
10:13 PM
Or is that just low power airtag stuff?
Avatar
Avatar
walktexranga
Hey all, is it possible for iPhones to receive wipe commands from other Apple devices via find-my network or all good provided in flight mode/wifi off/sim ejected? Noticed it mention "iPhone is findable" when I plugged into charge and got me pondering.
AFAIK, the find-my network via other Apple devices is only used for location. There is only a beacon sent by the device (iPhone with airplane mode/sim removed/WiFi off, or the Airtag, or other device) and the other Apple devices update the location to the cloud. The wipe command requires an internet connection via WiFi or cell signal. At least for now...
👍 3
Avatar
Avatar
FullTang
AFAIK, the find-my network via other Apple devices is only used for location. There is only a beacon sent by the device (iPhone with airplane mode/sim removed/WiFi off, or the Airtag, or other device) and the other Apple devices update the location to the cloud. The wipe command requires an internet connection via WiFi or cell signal. At least for now...
walktexranga 9/19/2024 10:23 PM
Sweet thanks. Let's hope they doesn't change or time to Faraday up the labs and ban iPhones 🤣
Avatar
Avatar
Dr. Kaan Gündüz
@Andrew Rathbun perhaps you need a new channel, politics-and-crap
Andrew Rathbun 9/20/2024 4:31 AM
Yeah this will never happen lol. Let's try to keep this American election season more civil than what's going on outside this server 😎
💯 6
this 4
Avatar
Avatar
AmNe5iA
https://gist.github.com/AmNe5iA/f3a35a9f686d185f178edfc55b944b10 I am told this fork of the script is the one that makes the Cellebrite backup_keychain_v2.plist compatible with Passware.
Dmitry Sumin 9/20/2024 6:38 AM
We are planning to support importing keychain files from Cellebrite to Passware. If there are any volunteers to test a pre-release version -- please DM me.
Avatar
Avatar
Andrew Rathbun
Yeah this will never happen lol. Let's try to keep this American election season more civil than what's going on outside this server 😎
Shogun//Rogan 9/20/2024 9:01 AM
💯 💯 💯 💯 I come to this server to learn and grow, not become inundated with more pointless bickering.
Avatar
Avatar
walktexranga
Sweet thanks. Let's hope they doesn't change or time to Faraday up the labs and ban iPhones 🤣
On a bright side, a Faraday room may become essential if that happens. 🙂
Avatar
Avatar
Andrew Rathbun
Yeah this will never happen lol. Let's try to keep this American election season more civil than what's going on outside this server 😎
Digitalferret 9/20/2024 11:39 AM
😂 5
11:39 AM
might have to be Brit, to get it 🙂
Avatar
Avatar
Digitalferret
But I promised not to comment any further so I’m going to bite my tongue or fingers rather but you did. yep. one side will always justify it's actions, citing the other. don't forget Putin has valid reasons for invading Ukraine. the pIRA had valid reasons for bombing the brits. and the long day drags on. in the end it's the old "rich men getting poor men to fight and die for for their own means". religious or political. disclaimer: My personal view, not DFIR chan. I'm now more limited than yourself in that respect.
P4perTrails 9/20/2024 10:55 PM
@Digitalferret i think you got that completely right! I only wish more people would realise that, refuse those orders and instead evaluate the situation and solve it peacefully.
👍🏻 1
Avatar
Avatar
chauan
On a bright side, a Faraday room may become essential if that happens. 🙂
P4perTrails 9/20/2024 10:58 PM
Not just the DF examination room though... The whole transit and production storage will need to get Faraday-ed. 😵 (edited)
Avatar
Avatar
Shogun//Rogan
💯 💯 💯 💯 I come to this server to learn and grow, not become inundated with more pointless bickering.
P4perTrails 9/20/2024 11:01 PM
this 💯
Avatar
Law violations aside, I think it would be nice if some sort of localized cell signal jammer were available that I could just click on and off as needed. Just flood my immediate area with so much noise that other devices can’t connect. Not sure if it would work or give me cancer or what but I have observed that the faraday boxes have not always been 100% effective at eliminating signal.
Avatar
Hey guys is anyone aware of intelligence / law enforcement style writing ? In my reports over explain an investigation and as a result it's not very clear to a law enforcement style of writing. Some feedbacks I get is that don't use suggestive statements or don't use words like 'however' or 'it' and just simply present the facts.
Avatar
Shogun//Rogan 9/21/2024 8:39 AM
You're saying you're over explaining your reports?
Avatar
Avatar
$CozyBear
Hey guys is anyone aware of intelligence / law enforcement style writing ? In my reports over explain an investigation and as a result it's not very clear to a law enforcement style of writing. Some feedbacks I get is that don't use suggestive statements or don't use words like 'however' or 'it' and just simply present the facts.
Keep your audience in mind. If it’s for a jury, you need to keep the concepts simple. Avoid declarations that show your opinions like “the photos were in a vault which shows the suspect intended to hide the evidence”, vs “photos relevant to the investigation were located in a third party ‘photo vault’ application.” Let the lawyers argue what it means or let them qualify you as an expert to give your opinion
❤️ 1
Avatar
Hi, what tools can I use to open dyld4 files on mac?
Avatar
Avatar
Shogun//Rogan
You're saying you're over explaining your reports?
Whenever I explain an investigation I often explain it in a way that's not clear in regards to intel or facts even though it's factual . The jury may end misinterpreting it again so basically it just keeping it concise (edited)
Avatar
Avatar
whee30
Keep your audience in mind. If it’s for a jury, you need to keep the concepts simple. Avoid declarations that show your opinions like “the photos were in a vault which shows the suspect intended to hide the evidence”, vs “photos relevant to the investigation were located in a third party ‘photo vault’ application.” Let the lawyers argue what it means or let them qualify you as an expert to give your opinion
I end up explaining every action I did sometimes. Your example is what I exactly do. Refrain from using the 'it'' and 'However' Don't use suggestive statements Be mindful of date standards. Use 07 August 2024 instead of the 7th August 2024 Remember to keep everyone in the loop of your case progress Make sure you're mindful in how you convey information (edited)
Avatar
Avatar
$CozyBear
I end up explaining every action I did sometimes. Your example is what I exactly do. Refrain from using the 'it'' and 'However' Don't use suggestive statements Be mindful of date standards. Use 07 August 2024 instead of the 7th August 2024 Remember to keep everyone in the loop of your case progress Make sure you're mindful in how you convey information (edited)
Shogun//Rogan 9/21/2024 10:51 AM
Just proof read it after the fact and see if someone else can make heads or tails of whatever it is you're trying to convey
❤️ 1
10:51 AM
Another good thing is seperating your case into different sections
10:52 AM
When I do an extraction, I seperate it up
10:52 AM
"Physical Examination" and describe the state of the actual device
10:52 AM
"Preliminary Observations"
10:52 AM
Was it in airplane and off a network, why is that important, etc
10:52 AM
"Extraction Process"
Avatar
I need to refine my process. I end up investigating and then doing the report rather than taking concise notes while investigating . They said doing the latter makes figures, captions and footnotes alot more accurate for your final submission review. (edited)
Avatar
Shogun//Rogan 9/21/2024 11:06 AM
It definitly does
this 1
Avatar
Avatar
Shogun//Rogan
It definitly does
Do you insert an annex section too ? I think all standards of law enforcement reports are usually on the academic side or university style type of report. (edited)
Avatar
Shogun//Rogan 9/21/2024 11:38 AM
It depends. If it's a general LE report for an incident, no
11:38 AM
If it's a forensic exam, I still sometimes add additional resources for review
11:39 AM
I've added additional pages explaining the process and such, explaining things in the exam
Avatar
Avatar
Shogun//Rogan
It depends. If it's a general LE report for an incident, no
I do alot of OSINT work, I guess annex sections are needed for instance: '"On September 20, 2024, HSI uncovered a Telegram group under the username 't.me/countefitdrugs.' The group was on created on August 25, 2024. The exact timestamp of its creation remains unclear. Please refer to Annex A." (edited)
Avatar
Shogun//Rogan 9/21/2024 11:47 AM
Right.
Avatar
This is how I would structure it, plus include a footnote to refer to the Telegram group and a Annex section typically using Greenshot or Snagit. (edited)
Avatar
Avatar
Shogun//Rogan
Right.
I'm just getting everyone thoughts on they would structure their reports. Do you have any examples dude that I could use that you may have come across on the internet ? (edited)
Avatar
Shogun//Rogan 9/21/2024 12:01 PM
I don't, but I doubt they would be difficult to find. Perhaps look to see if any major cases that have reached conclusion have their documents posted somehwere.
🥇 1
Avatar
Avatar
Shogun//Rogan
I don't, but I doubt they would be difficult to find. Perhaps look to see if any major cases that have reached conclusion have their documents posted somehwere.
Hmm, I guess I have to learn from work then.
Avatar
Avatar
Shogun//Rogan
I don't, but I doubt they would be difficult to find. Perhaps look to see if any major cases that have reached conclusion have their documents posted somehwere.
Mine is just a general LE executive summary which would go like this: Executive Summary Sub headings (for investigations materials, footnotes, and tables if needed) Annex that includes captions and figures, including timestamp of images using Snagit. (edited)
Avatar
Shogun//Rogan 9/21/2024 12:14 PM
Sounds like you got a good start on it
👍🏾 1
Avatar
Avatar
Shogun//Rogan
Sounds like you got a good start on it
Thanks dude, ah also table of contexts for easier navigation. In the meantime, I'll be refining my investigate approach to reports now. Thanks for the help.
Avatar
Avatar
$CozyBear
Thanks dude, ah also table of contexts for easier navigation. In the meantime, I'll be refining my investigate approach to reports now. Thanks for the help.
Shogun//Rogan 9/21/2024 12:25 PM
Yessir
Avatar
I made a post about JumpList artifacts. https://forensicfossil.com/2024/09/jumplist 🙈
Jump Lists were introduced with the release of Windows 7. Jump Lists are automatically created by Windows to allow users to ‘jump to’ or
👍 6
Avatar
KyootyBella 9/22/2024 6:31 AM
Not sure if this is the best place to ask But I am looking into a future plan of studying a masters in digital forensics, and would love to hear if there's any places that can be recommended, doesn't matter where in the world. if anyone knows a good place and recommends it, then I'll gladly hear about it
Avatar
Avatar
whee30
Law violations aside, I think it would be nice if some sort of localized cell signal jammer were available that I could just click on and off as needed. Just flood my immediate area with so much noise that other devices can’t connect. Not sure if it would work or give me cancer or what but I have observed that the faraday boxes have not always been 100% effective at eliminating signal.
A stock HackRF's footprint wont be much further than a sealed room...
Avatar
Avatar
KohleR
A stock HackRF's footprint wont be much further than a sealed room...
I want to buy so much hacky stuff like that, I just need justifications for my gadgets. I am barely using the flipper zero I was so excited about. I have heard a few cool things about the hackRF but I didn’t know you could run it like a jammer (edited)
😂 1
Avatar
Avatar
whee30
I want to buy so much hacky stuff like that, I just need justifications for my gadgets. I am barely using the flipper zero I was so excited about. I have heard a few cool things about the hackRF but I didn’t know you could run it like a jammer (edited)
Digitalferret 9/22/2024 10:27 AM
the matrix has you 🙂 (so much hackery, so little use)
Avatar
Avatar
whee30
I want to buy so much hacky stuff like that, I just need justifications for my gadgets. I am barely using the flipper zero I was so excited about. I have heard a few cool things about the hackRF but I didn’t know you could run it like a jammer (edited)
Yep, made a imsi catcher once. Checkout for some ideas. https://youtu.be/aP_7rYxCa4g?si=fCVTxOsL5I9fqANi
Avatar
Digitalferret 9/22/2024 10:29 AM
re phone jam tho, you can buy dedicated hardware with multiple antennae one for each band. portable thro lab. £$£$£$£
10:31 AM
jammer4uk.com : such abyssmul Engrish tho, likely a proxy address for an asian producer.
Avatar
The bigger problem is I wouldn’t be allowed to run the thing, just a pipe dream since I’ll never get a faraday room
Avatar
Avatar
whee30
I want to buy so much hacky stuff like that, I just need justifications for my gadgets. I am barely using the flipper zero I was so excited about. I have heard a few cool things about the hackRF but I didn’t know you could run it like a jammer (edited)
Oh yeah the HackRF is a solid device. It has a built in jammer and then you can also run it through GNU Radio - there are quite a few setups on Github you can run. The Mayhem firmware even has Tetris built in just for TSA 🙂
🤣 1
Avatar
Avatar
KohleR
Oh yeah the HackRF is a solid device. It has a built in jammer and then you can also run it through GNU Radio - there are quite a few setups on Github you can run. The Mayhem firmware even has Tetris built in just for TSA 🙂
“No - it’s just a DIY gameboy”
🥸 1
Avatar
Avatar
$CozyBear
Hey guys is anyone aware of intelligence / law enforcement style writing ? In my reports over explain an investigation and as a result it's not very clear to a law enforcement style of writing. Some feedbacks I get is that don't use suggestive statements or don't use words like 'however' or 'it' and just simply present the facts.
Most modern departments are returning to plain language over the radio and reports. (just what i'm seeing)
Avatar
Avatar
DCSO
Most modern departments are returning to plain language over the radio and reports. (just what i'm seeing)
How does that justify my question ? I'm trying to differentiae and convey data between information, facts and actionable intel
Avatar
Avatar
$CozyBear
How does that justify my question ? I'm trying to differentiae and convey data between information, facts and actionable intel
Ha, it may not "justify" your question as you would like, I'm just saying reports are written more plainly vs a lot of strong terminology like they were years ago. Have a great day !
❤️ 1
Avatar
Avatar
$CozyBear
How does that justify my question ? I'm trying to differentiae and convey data between information, facts and actionable intel
Digitalferret 9/23/2024 1:47 PM
you might also consider who you are reporting to, and tailor the language / format appropriately. for instance, if you are expecting this to be read to a non-technical panel you may want to avoid technical jargon and say in plain terms what has actually happened or been seen. Likewise if this is being passed upline to a technical supervisor, it would be pretty poor form writing in "Peter and Jane" format (books for 5yo's). Most lay-people can't even get through New Domestic Appliance instructions without having a meltdown. (edited)
1:50 PM
if you are employed in an organisation, they may already have a preferred reporting style, or pro forma, per type of job
Avatar
@MSAB someone? I've got problem with activating license
Avatar
Avatar
kawiarz
@MSAB someone? I've got problem with activating license
Has this been solved?
Avatar
Nope 😦
2:06 AM
Can i dm?
Avatar
Avatar
kawiarz
Nope 😦
Absolutely!
Avatar
@Magnet Forensics What is the email address to send Axiom crash reports to? It popped up briefly on the screen and disappeared again.
📬 1
3:52 AM
Trying to do a cloud capture
Avatar
Crashed again and found it.
Avatar
Hi there, I have an Apple T2 Mac pc (A1932). Using FTK Imager, I produced a forensic image that is encrypted. What program should I use to produce an image of this Mac? (i have axiom and ftk)
Avatar
Avatar
.mecoh.
Hi there, I have an Apple T2 Mac pc (A1932). Using FTK Imager, I produced a forensic image that is encrypted. What program should I use to produce an image of this Mac? (i have axiom and ftk)
LeatherCouch 9/24/2024 4:25 AM
Assuming you have the admin password ?
Avatar
Avatar
LeatherCouch
Assuming you have the admin password ?
yes i do
Avatar
LeatherCouch 9/24/2024 4:32 AM
When processing in Axiom it should you the option to enter a password. However I’ve had the most success imaging Macs using Sumuri.
this 1
Avatar
Avatar
LeatherCouch
When processing in Axiom it should you the option to enter a password. However I’ve had the most success imaging Macs using Sumuri.
Samuri (paladin or recon)
Avatar
If it’s a T2, you won’t be able to decrypt the image file after the fact as it needs the T2 chip to decrypt. You’ll need to boot the device in to Digital Collector or Sumuri, give it the password and acquire it from there to produce a decrypted image
👍 2
4:41 AM
👆 @.mecoh.
Avatar
Avatar
.mecoh.
Samuri (paladin or recon)
LeatherCouch 9/24/2024 4:44 AM
https://sumuri.com/recon-itr-manual/ step by step guide can be found here
To provide the forensic community with unique and relevant digital forensic software solutions and training while adhering to our core values of honor, integrity, loyalty, positive attitude and dedication.
👍 2
Avatar
does anyone have a recommended forensic tool with which to do a general malware scan of a computer image or hard drive image? I recently came across a scenario where I needed to do scan an image, but I wasn't looking for a specific type of malware or at particular files. I used Forensic Explorer's built-in tools but if there is anything out there more purpose-built I am all ears. I understand that no tool will be perfect, especially a malware scanner.
Avatar
honestly just use Defender and have it do a full disk scan - there are many AV tools out there but unless you know exactly what you're doing, using tools like PersistenceSniper, Trawler, memory scanner tools, etc will lead to lots of information that may or may not be useful - Defender will apply lots of yara rules/signatures across the disk to do a first-pass for anything interesting
9:27 AM
misread this - if it's an image and you can't mount it as a drive, might be difficult with defender
Avatar
Avatar
javanzato
honestly just use Defender and have it do a full disk scan - there are many AV tools out there but unless you know exactly what you're doing, using tools like PersistenceSniper, Trawler, memory scanner tools, etc will lead to lots of information that may or may not be useful - Defender will apply lots of yara rules/signatures across the disk to do a first-pass for anything interesting
thanks!
Avatar
there are also more speciality tools like Thor scanner and others that are geared towards 'compromise assessment' scenarios that may be useful but again, can have a lot of results to sift through, many of which may or may not be relevant
Avatar
Avatar
Will-ko
Crashed again and found it.
That’s one way to find it… 🤣
Avatar
Avatar
awkwafina
does anyone have a recommended forensic tool with which to do a general malware scan of a computer image or hard drive image? I recently came across a scenario where I needed to do scan an image, but I wasn't looking for a specific type of malware or at particular files. I used Forensic Explorer's built-in tools but if there is anything out there more purpose-built I am all ears. I understand that no tool will be perfect, especially a malware scanner.
If you are not looking for anything specific, but instead just trying to get a heads-up (with a minimum amount of effort) whether there is anything suspicious on a disk, we would strongly recommend running three different AV products against the disk. It's relatively easy and has a good mix of effort vs. payoff. This is not an academic suggestion, this is practical based on our casework involving waves of malware against high-value targets. As an example, we found that Defender did well against some crypters, but missed significant numbers of RATs wrapped with other crypters that Kaspersky (yes, I know) identified reliably. Your trio of AV might include Defender, a European AV, and an Eastern European AV. You can mount your disk images various ways (including the VSCs they contain) with AIM and run the AVs that way, or attach write-blocked hard drives to AIM's write-temporary mode (mounting read only could introduce unexpected results with some AV) and run the AVs that way.
👍 1
Avatar
poseidon4n6 9/24/2024 11:29 AM
I have a 4TB hard drive that I imaged, and my image file is just under 2TB. Can I image a new drive with that image file and use a 2TB drive or do I NEED a 4TB drive (in which case I would just clone the original)? What is best practice?
Avatar
Avatar
poseidon4n6
I have a 4TB hard drive that I imaged, and my image file is just under 2TB. Can I image a new drive with that image file and use a 2TB drive or do I NEED a 4TB drive (in which case I would just clone the original)? What is best practice?
Digitalferret 9/24/2024 11:38 AM
what is your ultimate purpose, just data storage on a smaller drive? 4TB to 4TB would be a clone/full-bitwise image recording all the <not really>empty areas too. 4TB but only copying the filesystem as it stands would fit and work on a 2TB drive. if it's just a data copy, why create an image at all? (edited)
11:39 AM
if created an image file, ie mydisk.img you'd then have to mount it to use, after moving it to the new drive or write it in a manner to reconstruct the filesystem on the smaller drive (edited)
11:42 AM
if you wanted say a Gold Standard copy, create an image, stored on your large drive, and write it back to many, use like Etcher? (edited)
Avatar
Avatar
Digitalferret
you might also consider who you are reporting to, and tailor the language / format appropriately. for instance, if you are expecting this to be read to a non-technical panel you may want to avoid technical jargon and say in plain terms what has actually happened or been seen. Likewise if this is being passed upline to a technical supervisor, it would be pretty poor form writing in "Peter and Jane" format (books for 5yo's). Most lay-people can't even get through New Domestic Appliance instructions without having a meltdown. (edited)
Thanks dude, super useful info 🙂
4:20 PM
Question, I'm working a CSAM/Counterfeit case . Does anyone know a how to download an audio tracks from a Telegram channel that blocks or doesn't show the download button ? (edited)
Avatar
Avatar
Digitalferret
if created an image file, ie mydisk.img you'd then have to mount it to use, after moving it to the new drive or write it in a manner to reconstruct the filesystem on the smaller drive (edited)
poseidon4n6 9/24/2024 8:01 PM
My purpose was to create an operable drive just as the original. I was just unsure as to whether I could reconstruct the file system on a smaller drive. Because we don’t just have spare 4TB drives lying around hahaha (edited)
Avatar
Avatar
.mecoh.
Hi there, I have an Apple T2 Mac pc (A1932). Using FTK Imager, I produced a forensic image that is encrypted. What program should I use to produce an image of this Mac? (i have axiom and ftk)
You may want to try Fuji as well https://github.com/Lazza/Fuji (edited)
Graphical interface for the forensic logical acquisition of Mac computers - Lazza/Fuji
Avatar
Avatar
poseidon4n6
My purpose was to create an operable drive just as the original. I was just unsure as to whether I could reconstruct the file system on a smaller drive. Because we don’t just have spare 4TB drives lying around hahaha (edited)
Avatar
I am trying to parse out image copies from a Linux server, likely amazon EC2 . The local main drives which were on a RAID configuration were pulled and then imaged. When I use FTK the filesystem is unrecognizable. For context, the drives were pulled off the server and then imaged. Should I try other tools or are alarm bells already going off for people who have dealt with something like this. I have a feeling the image is corrupt.
Avatar
Avatar
theshark
I am trying to parse out image copies from a Linux server, likely amazon EC2 . The local main drives which were on a RAID configuration were pulled and then imaged. When I use FTK the filesystem is unrecognizable. For context, the drives were pulled off the server and then imaged. Should I try other tools or are alarm bells already going off for people who have dealt with something like this. I have a feeling the image is corrupt.
If there was a RAID I assume there should be more than one image (unless it was RAID 1) and you have to use a software to reconstruct the RAID before reading the data
Avatar
Hi all, I am trying to get people's views on how they distinguish what is and what isn't an opinion in a forensic report. For example say an image has been saved to the phone (that you don't have) the same image was sent in a whatsapp message 10 seconds earlier and you can't confirm WhatsApp settings. You could write: As the image was saved 10 seconds after it was received it is suggestive that WhatsApp was set up to automatically save media. or It is my opinion that as the image was saved 10 seconds after it was received in a WhatsApp conversation the settings would be to automatically save media. Another example - I would class this as an opinion "The image was in the DCIM folder that has been accessed by the defendant therefore it is my opinion that he would have been aware of said image" Wondering how people distinguish between what is and what isn't opinion. Thanks in advance. (edited)
Avatar
Avatar
Tails453
Hi all, I am trying to get people's views on how they distinguish what is and what isn't an opinion in a forensic report. For example say an image has been saved to the phone (that you don't have) the same image was sent in a whatsapp message 10 seconds earlier and you can't confirm WhatsApp settings. You could write: As the image was saved 10 seconds after it was received it is suggestive that WhatsApp was set up to automatically save media. or It is my opinion that as the image was saved 10 seconds after it was received in a WhatsApp conversation the settings would be to automatically save media. Another example - I would class this as an opinion "The image was in the DCIM folder that has been accessed by the defendant therefore it is my opinion that he would have been aware of said image" Wondering how people distinguish between what is and what isn't opinion. Thanks in advance. (edited)
Sorry for my bad englisch but i would use the first example. In german I would say "Es liegt nahe, dass"... (cant find the equivalent in englisch). If they want to know that exactly that would be a new investigation. Just don't say it is so if you didn't checked it. The subjunctive is our get out of jail card there(at least in Germany).
Avatar
"The image was saved 10 seconds after it was received" is about all you can say without opinion. "The image was in the DCIM folder that has been accessed by the defendant therefore it is my opinion that he would have been aware of said image" - Very shaky opinion. Even if you can show that the defendant accessed that folder using a gallery app, say, you still can definitively say that he saw the offending picture/thumbnail...
👍 1
Avatar
Avatar
Eni
Sorry for my bad englisch but i would use the first example. In german I would say "Es liegt nahe, dass"... (cant find the equivalent in englisch). If they want to know that exactly that would be a new investigation. Just don't say it is so if you didn't checked it. The subjunctive is our get out of jail card there(at least in Germany).
No problem, you're English is a lot better than my German!
Avatar
Anyone from Belkasoft on this Discord?
Belkasoft1 2
Avatar
@Belkasoft
👍 1
Belkasoft2 1
Avatar
I just want to ask some questions in DM.
Avatar
Avatar
Tails453
Hi all, I am trying to get people's views on how they distinguish what is and what isn't an opinion in a forensic report. For example say an image has been saved to the phone (that you don't have) the same image was sent in a whatsapp message 10 seconds earlier and you can't confirm WhatsApp settings. You could write: As the image was saved 10 seconds after it was received it is suggestive that WhatsApp was set up to automatically save media. or It is my opinion that as the image was saved 10 seconds after it was received in a WhatsApp conversation the settings would be to automatically save media. Another example - I would class this as an opinion "The image was in the DCIM folder that has been accessed by the defendant therefore it is my opinion that he would have been aware of said image" Wondering how people distinguish between what is and what isn't opinion. Thanks in advance. (edited)
Also, even if you could confirm the settings, you'd only be able to confirm the current settings, not necessarily what they were at the time the message/image was received.
👍 5
Avatar
The image was in the DCIM folder that has been accessed by the defendant therefore it is my opinion that he would have been aware of said image
If possible I would just go with:
The image was in the DCIM folder that has been accessed by the defendant
(and I am not even sure about the part in italics) We are supposed to write about facts, anything else is much debatable. Now, of course one could go on and provide opinions but IMHO it's better to stick with facts. Once I analyzed a PC with a surveillance system, there were some deleted videos... and relatives of a suicide victim were thinking someone intentionally deleted said videos. My conclusion was akin to:
  • The fs journal shows bunch of videos deleted every hour, day and night, including times when no-one could possibly be in that house
  • The surveillance software is set up to delete old videos after a certain file size is surpassed
  • The remaining video size is almost equal to that threshold
  • Every element is compatible with the hypothesis of an automated cleanup process This leaves those reading the report free to form their opinions 😀
Avatar
Thanks for the responses, apologies probably not the best thought out example. As you say we do make every attempt to stick to the facts and try not to offer opinion where possible.
Avatar
I've always been entertained by the 'linguistics' challenges of DFIR. I'm a 'Evidence suggests <x>' enjoyer. "Evidence suggests user <x> interacted with artefact <y> at time <z>." Obviously we have a little more freedom for flexibility in the IR space, but I'd be lying if I haven't gotten "the talk" about data exfiltration before. The difference between: "The user <y> was observed executing rclone at 12:34:56 UTC." versus "Data exfiltration likely occurred at 12:34:56 UTC." https://medium.com/@securityaura/data-exfiltration-questions-and-how-to-answer-them-84856b14003c I found this to be a good blog shared around the twitter-verse on this subject. The broad (and may not directly addressed, but overall) concept being choosing stronger language when you're able to triangulate and verify artefacts from multiple sources. (edited)
Avatar
@Cellebrite Morning, anyone available for a chat about Offline maps in reader?
📬 1
Avatar
Hello everyone, I have a question about cached iOS location data within private/var/mobile/library/caches/com.apple.routined/Local.sqlite-wal I'm looking at the ZRTLEARNEDLOCATIONOFINTERESTVISITMO Table, Can anyone tell me what the ZCREATIONDATE, ZENTRYDATE, ZEXITDATE, ZEXPIRATIONDATE columns indicate? Thank you! (edited)
❗ 1
Avatar
Please join Josh Stroschein, Aaron Rosenmund, and me in ~30 minutes for an AMA session! We'll be discussing education, certifications, and training. Come join us, and bring questions!! Link: https://www.youtube.com/live/BlSQQgZY0ew
👀 2
💯 1
Avatar
Avatar
awkwafina
does anyone have a recommended forensic tool with which to do a general malware scan of a computer image or hard drive image? I recently came across a scenario where I needed to do scan an image, but I wasn't looking for a specific type of malware or at particular files. I used Forensic Explorer's built-in tools but if there is anything out there more purpose-built I am all ears. I understand that no tool will be perfect, especially a malware scanner.
X-Ways can run a scan using the system's AV/EDR.
👍 1
Avatar
Avatar
DCHTCU2024
Hello everyone, I have a question about cached iOS location data within private/var/mobile/library/caches/com.apple.routined/Local.sqlite-wal I'm looking at the ZRTLEARNEDLOCATIONOFINTERESTVISITMO Table, Can anyone tell me what the ZCREATIONDATE, ZENTRYDATE, ZEXITDATE, ZEXPIRATIONDATE columns indicate? Thank you! (edited)
Have you ever wanted to know how fast a vehicle or person was traveling at a particular time? Have you considered acquiring iPhone data to answer that question? The material in this blog will help …
Avatar
ScottKjr3347 9/26/2024 9:16 PM
@DCHTCU2024 Thanks for the recommendation. I think @CLB_iwhiffin blog about locations might be a better fit for the question https://www.doubleblak.com/blogPost.php?k=Locations I would also suggest reviewing the Cellebrite webinar https://cellebrite.com/en/ios-location-artifacts-explained/ (edited)
👍 1
Avatar
Hi all, I'm hoping you can help me out with an iPhone artefact. "com_apple_MobileAsset_UAF_Siri_Understanding\purpose_auto"? My keyword search has hit on some indicative terms here, phrased as questions. I am wondering if this is potentially a library of questions asked to Siri. Does anyone have any insight?
Avatar
Cross referenced with other iPhone extraction, the same indicative search tems appear in the same order in the same file, so likely not user generated.
👍 1
Avatar
That would be a great find if it were stored somewhere
Avatar
Avatar
facelessg00n
equalexpert 9/27/2024 6:46 AM
missed this reply, yeah i found out about this the other day. im also about 70% into building my own as well for the office
🫡 1
Avatar
Question for the US-based LEO's here - how did you folks get involved with DFIR? Did you have to start out as a sworn officer first before making a lateral move, or did you come externally through other means?
Avatar
Avatar
KeenoRen
Cross referenced with other iPhone extraction, the same indicative search tems appear in the same order in the same file, so likely not user generated.
Ross Donnelly 9/28/2024 1:07 AM
Long lists of instructions show how Apple is trying to navigate AI pitfalls.
Avatar
Avatar
JS
Question for the US-based LEO's here - how did you folks get involved with DFIR? Did you have to start out as a sworn officer first before making a lateral move, or did you come externally through other means?
Usually starts as a "collateral duty" (aka we don't have a full time position, can you help out) then either people move on (promotion) or finds DF really interesting and becomes a full time job. BTW, LEO is usually about DF and not IR. (edited)
Avatar
And yes, usually it's the detective or someone with the agency for a while can get to do this. Cadets, newly-grads, and patrols won't get to do this and that's at least 5 years...
Avatar
Hello everyone 🙂 Sorry if this question might sound dumb, but I hope someone will help me out with this. I'm working on evidence of deletions, and attempting to identify, on a windows server system (NTFS), the account responsible for the deletion of a directory I couldn't stop the system so i had to undergo with a quick triage first: i used KAPE in order to acquire as much data as i could, i have the $MFT of the drive where the deletion happened, as well as all the logs, registry etc etc etc. I've run MFTECmd on the $MFT file, and by cross referencing the results with the shellbags from various users, I could identify that a certain directory existed (it's present in the shellbags of a user with the full path), but it's no longer on the volume. The directory is orphan, but some files inside of it are still referenced as something like .\PathUnknown\Directory with ID 0x0005E251-00000001\<REDACTED>\... the question is: based on the attributes in the $MFT (MAC times), or any other evidence i could check (suggestions are welcome), do you kknow if there is a way to pinpoint the date and time of deletion? does the operation of deleting a file update any metadata on the FS for the directory or files? My idea, if i could determine that, was to then cross reference it with Security logs to see if a specific user was logged in and/or accessed the directory via SMB shares. Thanks very much for your kind help, very apreciated.
Avatar
Any LEO happen to be on here from Turkey? Konya area?
Avatar
Avatar
Rampage
Hello everyone 🙂 Sorry if this question might sound dumb, but I hope someone will help me out with this. I'm working on evidence of deletions, and attempting to identify, on a windows server system (NTFS), the account responsible for the deletion of a directory I couldn't stop the system so i had to undergo with a quick triage first: i used KAPE in order to acquire as much data as i could, i have the $MFT of the drive where the deletion happened, as well as all the logs, registry etc etc etc. I've run MFTECmd on the $MFT file, and by cross referencing the results with the shellbags from various users, I could identify that a certain directory existed (it's present in the shellbags of a user with the full path), but it's no longer on the volume. The directory is orphan, but some files inside of it are still referenced as something like .\PathUnknown\Directory with ID 0x0005E251-00000001\<REDACTED>\... the question is: based on the attributes in the $MFT (MAC times), or any other evidence i could check (suggestions are welcome), do you kknow if there is a way to pinpoint the date and time of deletion? does the operation of deleting a file update any metadata on the FS for the directory or files? My idea, if i could determine that, was to then cross reference it with Security logs to see if a specific user was logged in and/or accessed the directory via SMB shares. Thanks very much for your kind help, very apreciated.
You are looking in the wrong place. Deletion is not stored in the MFT because it would not make sense to record the date there. You need to check out UsnJrnl records
👍 1
Avatar
silence.s1r 9/30/2024 11:35 AM
☝️ focus on UpdateReason column with FileDelete value
Avatar
unfortunately the filesystem had no $J.. don't know why to be honest
Avatar
[2024-09-27 16:32:16.2659983 | INF] Deferred file count: 7. Copying locked files... [2024-09-27 16:32:32.0741923 | INF] Copied deferred file D:\$MFT to G:\kape_output\D\$MFT. Hashing source file... [2024-09-27 16:32:34.5494394 | INF] Copied deferred file D:\$LogFile to G:\kape_output\D\$LogFile. Hashing source file... [2024-09-27 16:32:34.5524389 | WRN] File D:\$Extend\$UsnJrnl:$J does not exist! Skipping! [2024-09-27 16:32:34.5534422 | WRN] File D:\$Extend\$UsnJrnl:$Max does not exist! Skipping! [2024-09-27 16:32:34.8704442 | INF] Copied deferred file D:\$Secure:$SDS to G:\kape_output\D\$Secure_$SDS. Hashing source file... [2024-09-27 16:32:34.9094430 | INF] Copied deferred file D:\$Boot to G:\kape_output\D\$Boot. Hashing source file... [2024-09-27 16:32:34.9544462 | INF] Copied deferred file D:\$Extend\$RmMetadata\$TxfLog\$Tops:$T to G:\kape_output\D\$Extend\$RmMetadata\$TxfLog\$T. Hashing source file...
Avatar
Avatar
JS
Question for the US-based LEO's here - how did you folks get involved with DFIR? Did you have to start out as a sworn officer first before making a lateral move, or did you come externally through other means?
Not a sworn LEO anymore, but I got started because no one else wanted anything to do with computer crimes at the time lol. Eventually they sent me to formal training. It also really depends on the department and area. For example, where I am in the Midwest, we have a state agency that handles a lot of DF. Many of the analyst are not sworn LEO. They handle a lot of cases from departments that are small and do not have the resources or expertise to investigate cases. Other large departments have full time units that deal with almost exclusively electronic crimes. Some others may have a detective or two that can examine cell phones, but it's not their full-time job.
Avatar
Avatar
Rampage
[2024-09-27 16:32:16.2659983 | INF] Deferred file count: 7. Copying locked files... [2024-09-27 16:32:32.0741923 | INF] Copied deferred file D:\$MFT to G:\kape_output\D\$MFT. Hashing source file... [2024-09-27 16:32:34.5494394 | INF] Copied deferred file D:\$LogFile to G:\kape_output\D\$LogFile. Hashing source file... [2024-09-27 16:32:34.5524389 | WRN] File D:\$Extend\$UsnJrnl:$J does not exist! Skipping! [2024-09-27 16:32:34.5534422 | WRN] File D:\$Extend\$UsnJrnl:$Max does not exist! Skipping! [2024-09-27 16:32:34.8704442 | INF] Copied deferred file D:\$Secure:$SDS to G:\kape_output\D\$Secure_$SDS. Hashing source file... [2024-09-27 16:32:34.9094430 | INF] Copied deferred file D:\$Boot to G:\kape_output\D\$Boot. Hashing source file... [2024-09-27 16:32:34.9544462 | INF] Copied deferred file D:\$Extend\$RmMetadata\$TxfLog\$Tops:$T to G:\kape_output\D\$Extend\$RmMetadata\$TxfLog\$T. Hashing source file...
randomaccess 9/30/2024 7:45 PM
It happens sometimes You may find file record information in shell items like link/jumplist/shellbags/comdlg32 and may be able to rebuild the path based on that. Depends what was tracked about the parent record/sequence number
👍 1
Avatar
Hey everyone. Little bit out of the game but does anyone know of any DF units or companies who complete hardware-less acquisition, investigation and retention, ie everything in the cloud. Is this even a thing?
Avatar
Sn(h)a(c)ker 10/1/2024 4:28 AM
Hi everyone, I'm wondering if the sift is meant to be updated or it's not advised to proceed to because of incompatibility with new component. Thanks 🙂
Avatar
Anyone have experience with sumo logic?
Avatar
Digitalferret 10/1/2024 7:58 AM
Eat Chanko, be happy 🙂
Avatar
Hi all, as LE organisation we are currently reviewing our main investigative tooling for our detectives. As of 2024, what are the prime forensic suites we can look at? We are looking into a solution that can handle multiple cases / users and facilitates multiple colleagues working on the same case at the same time. As of right now I've found FTK Lab, Nuix NEO, Magnet Review, Cellebrite Pathfinder and Intella.
Avatar
EnCase due to the support of encryption if you have the keys/passwords
8:31 AM
X-Ways because of speed and awesomeness
8:32 AM
This is only if you do analysis on non mobile devices
8:32 AM
DVR Examiner
Avatar
hey all, any tips or templates on creating a c.v. for court? from a digital forensics role in law enforcement
Avatar
ToxicGriffin 10/2/2024 8:42 PM
@Magnet Forensics Is there anyway within analyze-cli to import multiple VICS .JSON files in from the one cli call? I am currently configuring Magnet AUTOMATE to utilize Griffeye and I am wondering if I can ingest multiple VICS .JSON files into the one cli call. We typically will have a case with multiple VICS .JSON exports required to be ingested into the one case. I was wondering if I can perform this via cli. analyze-cli.exe import --case-folder "C:\my_cases" --name case123 --source-id source1 --source-path "C:\Cases\Digital Forensic Case\Digital Forensic Case.json" --source-type vics --include-vics-data all From the help documentation it appears you can only have the --source-path argument point to a single .json. Ideally I would want to be able to point to a parent folder and have it enumerate all the directories and ingest the VICS exports into the case.
Avatar
heatherDFIR 10/3/2024 8:25 AM
Hey everyone - Cellebrite CTF is back! We have a channel here too #clb-ctf Registration is OPEN! https://t.co/gK22MPIrfS CTF starts at midnight on 10/15. Password is provided on 10/8.
👍 1
👀 1
cellebrite 2
Avatar
Anyone seen rb2b.com? Trying to figure out how it works and what data lakes it might be using
Avatar
Anyone have experience doing CCSP? Thoughts?
Avatar
Avatar
susapr
Anyone seen rb2b.com? Trying to figure out how it works and what data lakes it might be using
No data leaks. Appears to use the old tracking pixel technique: visit the site which in turn your browser requests all assets including this pixel and it then parses information in the web access logs (IP, user agent, etc). It must then grab your LinkedIn cookie.
Avatar
Avatar
susapr
Anyone seen rb2b.com? Trying to figure out how it works and what data lakes it might be using
They explain how it works a little on their website. "We use a combination of 1st and 3rd part cookies, device IDs, and IP addresses to track and identify individuals across our network".
5:36 PM
There are other marketing tools out there that claim the same, this one just seems to focus of providing you specific LinkedIn profiles
Avatar
Has anyone dealt with conversion from olk15 (Mac Outlook) to PST, any recommendations would be much appreciated.
Avatar
Dummy question here. Do you guys have good resources/books for filesystem forensics? I've got a hard copy of File System Forensic Analysis by Brian Carrier, but I feel that's going over my head a bit.
Avatar
Avatar
heatherDFIR
Hey everyone - Cellebrite CTF is back! We have a channel here too #clb-ctf Registration is OPEN! https://t.co/gK22MPIrfS CTF starts at midnight on 10/15. Password is provided on 10/8.
are the questions already available?
Avatar
Avatar
Doomdie
Dummy question here. Do you guys have good resources/books for filesystem forensics? I've got a hard copy of File System Forensic Analysis by Brian Carrier, but I feel that's going over my head a bit.
I love the lock and code flip books for quick reference
12:25 PM
I have the same book as you - it’s good info but the way the offsets etc. are discussed is not my typical way of thinking about it so it takes me some time to put it together.
Avatar
Hi everyone, does anyone have any references related to updated yara/sigma. I would like to test that scan rule or ioc reference on my local system for testing compromise with rule and ioc data.
Avatar
@Cellebrite hi! Will the questions for the ctf be available at the same time as the password of the datasets
Avatar
Avatar
DenSide
@Cellebrite hi! Will the questions for the ctf be available at the same time as the password of the datasets
Questions start at 15 oktober, of course 🙂
Avatar
Avatar
florus
Questions start at 15 oktober, of course 🙂
Fair enough I had read from someone that they were already available but I wasn't sure Just wanted to check Thank you!
Avatar
Avatar
DenSide
Fair enough I had read from someone that they were already available but I wasn't sure Just wanted to check Thank you!
There is also a #clb-ctf Channel
Avatar
Hello people, Does anyone know any good resources on learning about internet based disclosures ? , could be useful for some HUMINT cases. Thanks in advance. (edited)
Avatar
Avatar
loln00b
Hi all, as LE organisation we are currently reviewing our main investigative tooling for our detectives. As of 2024, what are the prime forensic suites we can look at? We are looking into a solution that can handle multiple cases / users and facilitates multiple colleagues working on the same case at the same time. As of right now I've found FTK Lab, Nuix NEO, Magnet Review, Cellebrite Pathfinder and Intella.
Semantics 21 (Tom) 10/7/2024 10:44 AM
@loln00b I'm assuming you've got access to Hansken as it's an NFI product :https://www.hansken.nl/
Digital data and traces play an increasingly important role as proof in criminal cases. The volume, variety and variation of this data is growing rapidly.
Avatar
Avatar
Semantics 21 (Tom)
@loln00b I'm assuming you've got access to Hansken as it's an NFI product :https://www.hansken.nl/
Yes. But I’m currently working on the Caribbean and there is a cost construction involved so we are looking at all possibilities
Avatar
Avatar
loln00b
Hi all, as LE organisation we are currently reviewing our main investigative tooling for our detectives. As of 2024, what are the prime forensic suites we can look at? We are looking into a solution that can handle multiple cases / users and facilitates multiple colleagues working on the same case at the same time. As of right now I've found FTK Lab, Nuix NEO, Magnet Review, Cellebrite Pathfinder and Intella.
What case types are you mostly investigating? Two of those products you listed are pretty focussed on eDiscovery type use-cases, if for example you are doing a lot of media review they might not be the best choice.
Avatar
CrasySeahorse 10/8/2024 4:10 AM
Does anyone have a good way to present locations from a Google Takeout? When i look at it on the Google timeline it gives me the opportunity to show how precise each location is - which i also want in my report.
Avatar
Avatar
bizzlyg
What case types are you mostly investigating? Two of those products you listed are pretty focussed on eDiscovery type use-cases, if for example you are doing a lot of media review they might not be the best choice.
We have two sections basicly: one focuses on fraud/corruption/money laundring and the other section focusses on organised crime/narcotics/firearms
👍 1
Avatar
Hello all, I have a bachelor's and master's degree in the cyber defense/digital forensics field, however I currently am working for the government in IT. I'm finding it difficult to find a digital forensics position that is looking for entry level/ someone with no professional experience in it. (edited)
Avatar
Avatar
loln00b
We have two sections basicly: one focuses on fraud/corruption/money laundring and the other section focusses on organised crime/narcotics/firearms
Sounds like you have the main players covered with your current list then!
Avatar
Avatar
TummyWhy
Hello all, I have a bachelor's and master's degree in the cyber defense/digital forensics field, however I currently am working for the government in IT. I'm finding it difficult to find a digital forensics position that is looking for entry level/ someone with no professional experience in it. (edited)
Digitalferret 10/8/2024 9:30 AM
echo in #training-education-employment maybe
Avatar
Avatar
CrasySeahorse
Does anyone have a good way to present locations from a Google Takeout? When i look at it on the Google timeline it gives me the opportunity to show how precise each location is - which i also want in my report.
Italian forensic analyst Roberto Consalvi developed this browser based tool (I am not calling it "web based" because you can run it locally on your PC) https://github.com/rconsalvi/goolocations He demoed the tool in an internal meeting within the ONIF association and I must say it's pretty cool. You get all the nice maps with time based location, you get the orientation (useful for vehicles) and so on. You can hide fuzzy / not precise locations as well. Screenshot all the things and you are done.
Parser for Google Takeout geolocation files with graphic representation of positions and related information through markers placed on road or satellite maps of open street maps. It is possible to ...
10:17 AM
Here you can see a video @CrasySeahorse, it's in Italian but the screen recording is quite explanatory: https://www.youtube.com/watch?v=P45XSSbJyrA
Avatar
Hi, have a extraction and trying to figure out the instagram artifacts if the vanish mode is enabled. Any DB i can look in to see the messages or are they gone from the device. If gone, will they be obtained with legal process?
Avatar
Avatar
Lazza
Italian forensic analyst Roberto Consalvi developed this browser based tool (I am not calling it "web based" because you can run it locally on your PC) https://github.com/rconsalvi/goolocations He demoed the tool in an internal meeting within the ONIF association and I must say it's pretty cool. You get all the nice maps with time based location, you get the orientation (useful for vehicles) and so on. You can hide fuzzy / not precise locations as well. Screenshot all the things and you are done.
CrasySeahorse 10/8/2024 10:04 PM
Thanks! I'll try to look into it. I tried to look into the same data with Cellebrite, but the precision is without any units. So it says "precision: Horizontal "x", where x is a number. Is there any way to determent if it is meter or not? Thanks for your time!
Exported 31,010 message(s)
Timezone: UTC-8