Powered by RND
PodcastsTecnologiaDigital Forensics Now

Digital Forensics Now

Heather Charpentier & Alexis "Brigs" Brignoni
Digital Forensics Now
Último episódio

Episódios Disponíveis

5 de 38
  • DFN: 2nd Anniversary
    Send us a textWe celebrate our two-year podcast anniversary and discuss the importance of thorough case preparation for CSAM cases, courtroom experience, and extracting evidence from iOS devices.• SANS Difference Maker Awards open for nominations through September 15th across multiple categories• AI debate webinar with Magnet Forensics scheduled for September 17th• Binary Hick's blogs reveal insights on iOS search party and Samsung's Rubin and Digital Wellbeing databases• Discussion on properly preparing CSAM cases for trial with understanding of statutes and evidence requirements• Brett Shaver's article highlights importance of attending trials to understand courtroom proceedings• iOS File Provider Storage in BFU extractions can reveal user-created images with metadata• Updates to LEAPPS tool including CashApp parser improvements and Snapchat returns parser• New Lava viewer coming soon for the LEAPPS projectNotes:SANS Difference Makers Awards-https://docs.google.com/forms/d/e/1FAIpQLSeLNMZm3r4c9WSKdNW8XaPh6KRXoS3C1WI51UtnEANe2osCpQ/viewformAI Unpacked #5: The great AI debate with Digital Forensics Now-https://www.magnetforensics.com/resources/ai-unpacked-5-the-great-ai-debate-with-digital-forensics-now/The Binary Hick New Blogs-https://thebinaryhick.blog/2025/08/19/further-observations-more-on-ios-search-party/https://thebinaryhick.blog/2025/08/06/not-strange-bedfellows-samsungs-rubin-digital-wellbeing/Monolith Notes-https://www.monolithforensics.com/free-toolsBrett Shavers- Courtroom Trials Are the Final Exam for Your Work. Why Haven’t You Attended One?-linkedin.com/in/brettshavers/recent-activity/all/
    --------  
    1:04:20
  • From Cryptic Apps to Clickable Maps: Making Sense of Digital Evidence
    Send us a textWe're back! After a short break we are back to discuss the growing crossover between real-world events and digital evidence in court cases, highlighting how device data can make or break timelines in high-stakes investigations.This episode covers:Ian Whiffin’s latest forensic work, including iOS power log timestamps, Apple Health data reliability, iPhone battery temperature readings, and IR Doppler functionality – with examples of how these artifacts were used in a recent homicide trial to validate timelines and environmental conditions.Kevin Pagano’s App Store Package Search tool, which translates obscure bundle IDs into recognizable app information for easier analysis.Concerns over the growing reliance on AI in digital forensics, emphasizing the need for human expertise and proper validation in every step of the process.A demonstration of LUMYX, a mapping tool that converts extracted location data into customizable visual timelines for courtroom presentations.Updates on LAVA (LEAPPS Artifact Viewer App) and guidance on writing LAVA-compliant artifacts to improve reporting workflows.Notes:Ian's FOUR Newest Blogshttps://www.doubleblak.com/blogPost.php?k=powerloghttps://www.doubleblak.com/blogPost.php?k=healthaccuracyhttps://www.doubleblak.com/blogPost.php?k=temperaturehttps://www.doubleblak.com/blogPost.php?k=dopplerIan Whiffin Testimonyhttps://www.youtube.com/watch?v=kahgl-mIUFEKevin Pagano Stark4n6 app store package searchhttps://www.stark4n6.com/2025/07/introducing-asp-app-store-package-search.htmlhttps://github.com/stark4n6Elcomsoft Article- AI driven Password Recovery Myth or Reality?https://blog.elcomsoft.com/2025/07/ai-driven-password-recovery-myth-or-reality/Beyond the Badge AI's role in Modern Investigationshttps://www.magnetforensics.com/blog/beyond-the-badge-ais-role-in-modern-investigations/LUMYXhttps://lumyx.com/LEAPPsleapps.orgHow to make LAVA Compliant LEAPP Artifactshttps://www.linkedin.com/video/live/urn:li:ugcPost:7356497708628520962/UFADE https://cp-df.com/en/blog/ufade_touch.html
    --------  
    1:16:20
  • Techno, Timeline, and Training Truths
    Send us a textWe kick off this episode with highlights from the Techno Security Conference, our 80s-themed outfits, packed LEAPP labs, AI panel discussions, and great conversations with friends and colleagues across the field.We discuss Brett Shavers’ recent series on DFIR entry-level work, and share our thoughts on the need for better forensic training and clearer distinctions between forensics, cybersecurity, and incident response.We also talk about recent tool changes in the industry. Cellebrite’s acquisition of Corellium could make mobile app testing more accessible, and Magnet’s purchase of Dark Circuit Labs.We cover Harper Shaw’s Vehicle Network App, a valuable source of vehicle-related data. Alongside that, we highlight a recent blog on cached screenshots in Windows 11. Be sure to check out the excellent “Parsing the Truth” podcast.Heather walks through her Easter road trip to test Android's Timeline feature (formerly Google Location History). The location data was impressively accurate, but also showed how easily some points can mislead without the right context.Catch us at IACIS Reno in January and check out the some of the resources we mentioned.Notes:Parsing the Truth: One Byte at a Time https://parsingthetruth.com/Cached Screenshots on Windows 11https://thinkdfir.com/2025/06/13/cached-screenshots-on-windows-11/The Vehicle Network App from Harper Shawhttps://harpershaw.co.uk/the-vehicle-network-app-1Beklkasoft CTFhttps://belkasoft.com/belkactf7/Brett Shavers 6 part serieshttps://www.linkedin.com/pulse/dfir-really-entry-level-brett-shavers-ewsvc/https://www.dfir.training/new-to-dfir/dfir-careerArtifact of the Week/Android Location Historyhttps://thebinaryhick.blog/2024/06/28/the-green-look-back-androids-on-device-location-history/
    --------  
    1:06:03
  • Every Breath You Take, Every Swipe You Make—Your iPhone’s Logging It
    Send us a textApple devices are constantly recording user activity, yet few forensic examiners are making use of the vast amount of data these systems quietly generate. Apple's Unified Logs and Spotlight databases track nearly everything that happens on an iOS device, often without the user realizing it.Would you believe an iPhone can generate around 1.5 million log entries in just 15 minutes of regular use? These records include highly specific actions—such as the exact moment Face ID is used to unlock a device, when the phone is flipped face-up, or whether a user interacted with Siri or used the device manually. Despite their detail and reliability, these sources are often overlooked in mobile investigations.In this session, we’ll show how forensic practitioners can process and search these massive log sets using open-source tools. We’ll walk through examples of log entries that record actions like toggling airplane mode, launching specific apps like Facebook, or even detecting changes in device orientation. For investigators, this means direct, time-stamped evidence of how a device was used.One of the most valuable aspects of this data is its ability to help distinguish between user actions and automatic background processes. Was an app opened by the user, or was it a system event? These logs provide that level of clarity. We’ll demonstrate how to isolate specific events from millions of entries and construct accurate timelines that reflect exactly what happened—and when.As part of our ongoing work, we’re also focused on improving the accessibility and usability of these artifacts with incorporation into the LEAPPS. If you work with iOS devices, this is a session you won’t want to miss. Notes:2026 IACIS in Reno NV-https://www.iacis.com/training/reno-info/Spotlight-https://github.com/ydkhatri/mac_aptUnified Logs-https://www.ios-unifiedlogs.com/https://github.com/abrignoni/iLEAPP
    --------  
    1:15:09
  • Stomping Grounds: Digital Forensics at IACIS 2025
    Send us a textThe Digital Forensics Now podcast brings together the core LEAPPs developer team for a candid, unscripted conversation about mobile forensics, legal challenges, and the future of their tools during the IACIS conference in Orlando.• First time bringing together most of the LEAPPs development team in person• Florida's new requirement for 10-day search warrant renewals creates significant challenges for long-running forensic processes• Timestamp parameters in warrants can limit investigators' ability to discover relevant evidence• Paladin now includes the LEAPPs integration, making powerful open-source forensic tools more accessible• Real-world success stories of the LEAPPs helping solve cases when commercial tools failed• Introduction of "The DFIR Investigative Mindset" book with technical editor Lee Harris• Multiple specialized forensic training courses available at IACIS including incident response, drone, MAC and RAM forensicsJoin us in two weeks for a more technical episode exploring new forensic artifacts and techniques.
    --------  
    32:40

Mais podcasts de Tecnologia

Sobre Digital Forensics Now

A podcast by digital forensics examiners for digital forensics examiners. Hear about the latest news in digital forensics and learn from researcher interviews with field memes sprinkled in.
Site de podcast

Ouça Digital Forensics Now, Sem Manual e muitos outros podcasts de todo o mundo com o aplicativo o radio.net

Obtenha o aplicativo gratuito radio.net

  • Guardar rádios e podcasts favoritos
  • Transmissão via Wi-Fi ou Bluetooth
  • Carplay & Android Audo compatìvel
  • E ainda mais funções
Aplicações
Social
v7.23.7 | © 2007-2025 radio.de GmbH
Generated: 9/9/2025 - 9:39:59 PM