Show newer

Just confirmed DFIRScience will be at Magnet Summit April 11-13. Find us there for free stickers!
Registrations open:

The agenda for @MagnetForensics Summit 2022 looks awesome!
In-Person ➡️ Nashville, TN April 11-13
Virtual ➡️ April 20-28. Virtual is✨FREE✨

Last week we had an AWESOME streaming event! There were so many great questions. We showed the Tableau TX1 and UltraKit from Digital Intelligence and the Atola Technology DiskSense II. Check it out here:
Special thanks to Magnet Forensics!

Thank you to everyone who joined the stream today! We raised $18.32 for the Community Hardware Fund! Thank you ✨SO MUCH✨ to Digital Intelligence and Atola Technology for letting us learn about forensic hardware and Magnet Forensics for supporting the community! 💖💖

Tomorrow! Feb. 24th 14:30 to 16:30UTC (09:30 to 11:30EST) there will be fun and games! Also showing the Disksense ][ and Insight Forensic from Atola Technology

This Thursday we will talk about hardware! UltraBlock write blockers and Tableau TX1 Imager - generously loaned by Digital Intelligence, Inc! Thank you so much!

Is a RAM acquisition part of your SOP? A RAM acquisition is a fantastic source of evidence. Check out the basics of memory forensics with Volatility 3. Get comfortable with some basic commands, and you'll be doing advanced memory in no time!

Join us for a DFIRScience Streaming Extravaganza! There will be games, prizes, and tutorials! See forensic hardware from our friends at Atola Technology and Digital Intelligence
Feb. 24th 14:30 to 16:30UTC (09:30 to 11:30EST)

Investigate nmap usage for fun and glory. Overview of data artifacts, analysis results, and reporting. Part 2 of the autopsy series.

mini-course on starting a new investigation with . Covers basic data organization, documentation, new cases, ingest modules, basic analysis workflow, and exporting reports.

Since I do most investigations on Linux I never really considered how much of a problem Windows file path limitations can be for mobile phone . Seems like it'd be real easy to miss or misrepresent data.

Reader ufdr file has suspect data categorized in an archive. We wrote a script to reconstruct the original file and directory structure for use with and other tools.

Free, automatic software dependency inventory with vulnerability scanning. Very easy and so useful to respond to vulns like

Easily visualize flows with . Getting started with cryptocurrency transaction analysis and Bitcoin forensics.

The one-month subscription winners have been selected! Congratulations to: Ashwini Hedau and J Brown

We have more competitions and giveaways planned. Be sure to follow to be alerted of future giveaways!

Winners were selected randomly using the TubeBuddy "Pick a Winner" tool. (affiliate link)

⚡️Tomorrow is the last day to enter for a chance to win a month of ! All you have to do to enter is subscribe and comment on what you want to learn in and ! Pls share w/ new learners!

Show older
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.