Artwork

Treść dostarczona przez Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Player FM - aplikacja do podcastów
Przejdź do trybu offline z Player FM !

What To Expect When You Are Expecting a Digital Forensics Class, Two Hardware Solutions, One Neat Tool Capability For Windows, and a Partridge in a Pear Tree.

1:04:33
 
Udostępnij
 

Manage episode 386951652 series 3505865
Treść dostarczona przez Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

Send us a text

Get ready to journey into the world of digital forensics as we share our insights on the crucial art of utilizing a diverse range of tools. A single tool just won't cut it, and reliance on just one could cause you to miss out on important finds. We also give our listeners the floor, inviting you to voice your thoughts on the IACIS Advanced Mobile Device Forensics class, and the topics you'd love to see covered.
How do you feel about forensic extraction tools? We dissect unique features of tools like duplicators, TX1, and Atrio, and dive into latest updates from OpenText and ArcPoint Forensics. These updates have made it possible to create Android and iOS backups using duplicators, a game changer in the field. With Atrio, we open up an intriguing discussion about their forensic triaging and AI capabilities. We discuss the role of AI in identifying CSAM and brainstorm ways to enhance the tooling.
We share our own learning experiences from various classes, highlighting the absolute necessity of continual learning and outside research in this ever-evolving field. We also explore the features and potential of Arsenal, a digital forensics tool which aids in mounting and virtualizing E01 images. The unique capabilities provided by Arsenal to bypass the password to a Windows logon screen and access DPAPI-protected data is a must try! Whether you're a seasoned expert or just dipping your toes in the water, this episode is sure to pique your interest in the vast world of digital forensics.
Notes-
IACIS Advanced Mobile Device Forensics (AMDF)
https://iacis.com/training/amdf-advanced-mobile-device-forensics/
OpenText Duplicator Update
https://www.youtube.com/watch?v=L3qGa7H6NBs
ArcPoint Forensics
https://www.arcpointforensics.com/
DFIR Diva-
https://dfirdiva.com/
Arsenal Recon-
https://arsenalrecon.com/
Hexordia Mobile Data Structure-Virtual Live Training-
https://academy.cyber5w.com/courses/hexordia-mobile-data-structures-dec-2023

  continue reading

Rozdziały

1. What To Expect When You Are Expecting a Digital Forensics Class, Two Hardware Solutions, One Neat Tool Capability For Windows, and a Partridge in a Pear Tree. (00:00:00)

2. Digital Forensics Tools and Discussion (00:00:09)

3. Features of Duplicators, TX1, and Atrio (00:09:09)

4. AI for CSAM (00:22:28)

5. Openness and Duplicator Use Cases (00:27:18)

6. Importance of Continued Learning in Forensics (00:38:03)

7. Asking for Help (00:43:08)

8. Virtualization and Tool Updates in Forensics (00:50:30)

28 odcinków

Artwork
iconUdostępnij
 
Manage episode 386951652 series 3505865
Treść dostarczona przez Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

Send us a text

Get ready to journey into the world of digital forensics as we share our insights on the crucial art of utilizing a diverse range of tools. A single tool just won't cut it, and reliance on just one could cause you to miss out on important finds. We also give our listeners the floor, inviting you to voice your thoughts on the IACIS Advanced Mobile Device Forensics class, and the topics you'd love to see covered.
How do you feel about forensic extraction tools? We dissect unique features of tools like duplicators, TX1, and Atrio, and dive into latest updates from OpenText and ArcPoint Forensics. These updates have made it possible to create Android and iOS backups using duplicators, a game changer in the field. With Atrio, we open up an intriguing discussion about their forensic triaging and AI capabilities. We discuss the role of AI in identifying CSAM and brainstorm ways to enhance the tooling.
We share our own learning experiences from various classes, highlighting the absolute necessity of continual learning and outside research in this ever-evolving field. We also explore the features and potential of Arsenal, a digital forensics tool which aids in mounting and virtualizing E01 images. The unique capabilities provided by Arsenal to bypass the password to a Windows logon screen and access DPAPI-protected data is a must try! Whether you're a seasoned expert or just dipping your toes in the water, this episode is sure to pique your interest in the vast world of digital forensics.
Notes-
IACIS Advanced Mobile Device Forensics (AMDF)
https://iacis.com/training/amdf-advanced-mobile-device-forensics/
OpenText Duplicator Update
https://www.youtube.com/watch?v=L3qGa7H6NBs
ArcPoint Forensics
https://www.arcpointforensics.com/
DFIR Diva-
https://dfirdiva.com/
Arsenal Recon-
https://arsenalrecon.com/
Hexordia Mobile Data Structure-Virtual Live Training-
https://academy.cyber5w.com/courses/hexordia-mobile-data-structures-dec-2023

  continue reading

Rozdziały

1. What To Expect When You Are Expecting a Digital Forensics Class, Two Hardware Solutions, One Neat Tool Capability For Windows, and a Partridge in a Pear Tree. (00:00:00)

2. Digital Forensics Tools and Discussion (00:00:09)

3. Features of Duplicators, TX1, and Atrio (00:09:09)

4. AI for CSAM (00:22:28)

5. Openness and Duplicator Use Cases (00:27:18)

6. Importance of Continued Learning in Forensics (00:38:03)

7. Asking for Help (00:43:08)

8. Virtualization and Tool Updates in Forensics (00:50:30)

28 odcinków

Wszystkie odcinki

×
 
Loading …

Zapraszamy w Player FM

Odtwarzacz FM skanuje sieć w poszukiwaniu wysokiej jakości podcastów, abyś mógł się nią cieszyć już teraz. To najlepsza aplikacja do podcastów, działająca na Androidzie, iPhonie i Internecie. Zarejestruj się, aby zsynchronizować subskrypcje na różnych urządzeniach.

 

Skrócona instrukcja obsługi