Artwork

Treść dostarczona przez Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Player FM - aplikacja do podcastów
Przejdź do trybu offline z Player FM !

New Year, New Tools, New Ways of Thinking!

1:26:23
 
Udostępnij
 

Manage episode 393619217 series 3505865
Treść dostarczona przez Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

Send us a text

Ever found yourself piecing together a complex jigsaw puzzle of digital evidence? That's precisely the journey we invite you to embark on in our latest episode packed with tools, tales, and tech. We're not just talking shop; we're handing you the magnifying glass to examine the intricacies of JSON files with JSON CRACK, and introducing a python tool to automate investigations involving Google Drive File Stream artifacts, DriveFS-sleuth.
This episode is a testament to the craft of digital forensics, featuring a blog from Mattia at Zena Forensics that aides in answering the question, "Has the user ever used the XYZ application?". As we unpack the nuances of reverse engineering and celebrate the updates to Hexordia's Evanole, we're reminded that the heart of digital forensics beats to the rhythm of relentless inquiry and meticulous method.
We delve into the advanced research and exploitation methodologies With Magnet GrayKey Labs and converse about the importance of these capabilities as well as validation. This is coupled with a live demonstration involving SEGB files and the data that can be overlooked without research and the validation of multiple tools.
Raise your glasses—here's to the exuberant spirit of learning and the relentless pursuit of truth that defines our community. So, are you ready to elevate your understanding of the digital landscape and smash those New Year's resolutions? Join us, and let's make 2024 a year of 4K clarity—in forensics and beyond!
Notes:
JSON Crack-
https://jsoncrack.com/
DriveFS Sleuth — Your Ultimate Google Drive File Stream Investigator!
https://amgedwageh.medium.com/drivefs-sleuth-investigating-google-drive-file-streams-disk-artifacts-0b5ea637c980https://github.com/AmgdGocha/DriveFS-Sleuth
Advanced Research and Exploitation Methodologies With Magnet GRAYKEY Labs
https://www.magnetforensics.com/blog/advanced-research-and-exploitation-methodologies-with-magnet-graykey-labs/
Has the user ever used the XYZ application?
https://blog.digital-forensics.it/2023/12/has-user-ever-used-xyz-application-aka.html
Evanole New Year Reveal!
https://www.hexordia.com/evanolece

  continue reading

Rozdziały

1. New Year, New Tools, New Ways of Thinking! (00:00:00)

2. Introduction and Tools for Visualizing Data (00:00:15)

3. Security Tools and Access to Data (00:15:32)

4. Validating Source Code and Open Source (00:21:06)

5. Importance of Context in Digital Forensics (00:29:05)

6. Digital Forensics New Year Goal Setting (00:34:41)

7. Reverse Engineering and New Tool Updates (00:48:50)

8. Technical Details of a Simple Report (00:59:38)

9. Interpreting Data With Multiple Tools (01:10:39)

10. The Importance of Applying a Process (01:19:52)

28 odcinków

Artwork
iconUdostępnij
 
Manage episode 393619217 series 3505865
Treść dostarczona przez Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

Send us a text

Ever found yourself piecing together a complex jigsaw puzzle of digital evidence? That's precisely the journey we invite you to embark on in our latest episode packed with tools, tales, and tech. We're not just talking shop; we're handing you the magnifying glass to examine the intricacies of JSON files with JSON CRACK, and introducing a python tool to automate investigations involving Google Drive File Stream artifacts, DriveFS-sleuth.
This episode is a testament to the craft of digital forensics, featuring a blog from Mattia at Zena Forensics that aides in answering the question, "Has the user ever used the XYZ application?". As we unpack the nuances of reverse engineering and celebrate the updates to Hexordia's Evanole, we're reminded that the heart of digital forensics beats to the rhythm of relentless inquiry and meticulous method.
We delve into the advanced research and exploitation methodologies With Magnet GrayKey Labs and converse about the importance of these capabilities as well as validation. This is coupled with a live demonstration involving SEGB files and the data that can be overlooked without research and the validation of multiple tools.
Raise your glasses—here's to the exuberant spirit of learning and the relentless pursuit of truth that defines our community. So, are you ready to elevate your understanding of the digital landscape and smash those New Year's resolutions? Join us, and let's make 2024 a year of 4K clarity—in forensics and beyond!
Notes:
JSON Crack-
https://jsoncrack.com/
DriveFS Sleuth — Your Ultimate Google Drive File Stream Investigator!
https://amgedwageh.medium.com/drivefs-sleuth-investigating-google-drive-file-streams-disk-artifacts-0b5ea637c980https://github.com/AmgdGocha/DriveFS-Sleuth
Advanced Research and Exploitation Methodologies With Magnet GRAYKEY Labs
https://www.magnetforensics.com/blog/advanced-research-and-exploitation-methodologies-with-magnet-graykey-labs/
Has the user ever used the XYZ application?
https://blog.digital-forensics.it/2023/12/has-user-ever-used-xyz-application-aka.html
Evanole New Year Reveal!
https://www.hexordia.com/evanolece

  continue reading

Rozdziały

1. New Year, New Tools, New Ways of Thinking! (00:00:00)

2. Introduction and Tools for Visualizing Data (00:00:15)

3. Security Tools and Access to Data (00:15:32)

4. Validating Source Code and Open Source (00:21:06)

5. Importance of Context in Digital Forensics (00:29:05)

6. Digital Forensics New Year Goal Setting (00:34:41)

7. Reverse Engineering and New Tool Updates (00:48:50)

8. Technical Details of a Simple Report (00:59:38)

9. Interpreting Data With Multiple Tools (01:10:39)

10. The Importance of Applying a Process (01:19:52)

28 odcinków

ทุกตอน

×
 
Loading …

Zapraszamy w Player FM

Odtwarzacz FM skanuje sieć w poszukiwaniu wysokiej jakości podcastów, abyś mógł się nią cieszyć już teraz. To najlepsza aplikacja do podcastów, działająca na Androidzie, iPhonie i Internecie. Zarejestruj się, aby zsynchronizować subskrypcje na różnych urządzeniach.

 

Skrócona instrukcja obsługi