Digital forensics May 23, 2011 Alec Waters The Case of the Great Router Robbery NEWSFLASH: AnyTown Local News reports this Monday morning that the recent spate of office break-ins has continued with a weekend raid on the downtown branch...
Digital forensics May 1, 2011 Keatron Evans Flesh Tone Analysis – Intermediate Computer Forensics This analysis comes in handy in computer forensics cases such as porn or child pornography investigations. This video shows how to search through hundreds of...
Digital forensics April 14, 2011 Scott Behrens and Ben Hagen Web Shell Detection Using NeoPI This article was part of a talk presented at BSidesChicago. Web servers have become one of the main targets of malicious activity and are often a weak point...
Digital forensics April 12, 2011 Keatron Evans Computer Forensics: Alternate Data Streams Alternate Data Streams are a way to store data on a machine that is not readily accessible to users. Using ADS, files are not easily accessible by Windows operating...
Digital forensics April 8, 2011 Keatron Evans Computer Forensics: Snort Logs Analysis Sometimes the best evidence of a network intrusion resides in network or traffic logs. Snort is a well known open-source traffic analysis and network intrusion detection...
Digital forensics March 24, 2011 Keatron Evans iPhone Security: iPhone Forensics In this video, we will review the wealth of forensic data stored on an iPhone 3Gs using Paraben's Device Seizure software. The iPhone is one of the most popular...