background preloader

Forensics

Facebook Twitter

Ubiquity Forensics - Your iCloud and You - SANS Institute. Ubiquity Forensics - Your iCloud and You Wednesday, September 09 at 7:00 AM EDT (11:00:00 UTC) Sarah Edwards You can now attend the webinar using your mobile device!

Ubiquity Forensics - Your iCloud and You - SANS Institute

Overview Ubiquity or "Everything, Everywhere - Apple uses this term describe iCloud related items and its availability across all devices. iCloud enables us to have our data synced with every Mac, iPhone, iPad, PC as well as accessible with your handy web browser. You can access your email, documents, contacts, browsing history, notes, keychains, photos, and more all with just a click of the mouse or a tap of the finger - on any device, all synced within seconds. Forensic Artifacts. Author Name Matt Nelson Submission Title TeamViewer 8 Artifact or Program Version 8.0.16447 Artifact Description TeamViewer is a program that provides remote desktop software, remote control access, VPN capabilities, file transfers, etc.

Forensic Artifacts

It can be installed, run temporarily, or used as portable application. One interesting capability is that it can determine if the Remote and Local host are on the same network and it will conduct P2P activity and connect directly, rather than use gateway servers. Untitled. Live Linux forensics in a KVM based environment (part 1 memory) Decoding malware SSL using Burp proxy. When performing dynamic analysis of malware, you will occasionally encounter SSL being utilized for network communication, thus preventing you from analyzing the content.

Decoding malware SSL using Burp proxy

Typically Wireshark is utilized to examine network traffic at the packet level. Windows Timestamp Tampering. By Glenn P. Edwards Jr. From time to time someone will bring up the topic of Windows time stamp manipulation and if it’s not related to a piece of malware then it’s generally about Timestomp or touch. These discussions usually contain the same repetitive information – most notably being to check the time stamp values of the file (in NTFS everything, including directories, is considered a file) in the $MFT and see if anything stands out. Process Monitor Filters for Malware Analysis and Forensics. Process Monitor is a free tool from Microsoft that displays file system, registry, process, and other activities on the system.

Process Monitor Filters for Malware Analysis and Forensics

It’s an invaluable tool for troubleshooting Windows problems as well as for malware forensics and analysis tasks. The thoroughness of the tool is also weakness, as the amount of data captured by Process Monitor can easily overwhelm the analyst. Filters for Sifting Through Process Monitor Data Finding meaningful events in Process Monitor’s voluminous log file is simpler by using the tool’s filtering capabilities, which allow the analyst to conditions for determining whether records should be shown or hidden. You can define the filters by pressing Ctrl+L in Process Monitor or through the Filter > Filter… menu option. Even with the default filters, there is usually too much noise in Process Monitor’s log file. Saving and Organizing Custom Filters After creating a custom filter with Ctrl+L, you can save it using the Filter > Save Filter… menu option.

The Autopsy Forensic Browser v 3.0.0 released. The Autopsy Forensic Browser is a graphical interface to The Sleuth Kit. Together, they can analyze Windows and UNIX disks and file systems (NTFS, FAT, UFS1/2, Ext2/3). Version 3.0 of Autopsy is a complete re-write and this page describes its features. Autopsy 3 has been designed to be a graphical platform for open source digital forensics tools. It was written in Java using the NetBeans Platform. This approach allows Autopsy to run on multiple platforms (Windows, OS X, Linux, etc.) and have a modular framework that makes it easy to incorporate other open source forensics tools and create an end-to-end solution. New features: Sans.

Creating a VM from E01 Images. Blog » Blog Archive » Released New Tool – Router Password Kracker. Viewcontent.cgi?article=1074&context=adf&sei-redir=1&referer=http%3A%2F%2Fwww.google.com%2Furl%3Fsa%3Dt%26rct%3Dj%26q%3Dmalware%2520forensics%26source%3Dweb%26cd%3D10%26ved%3D0CIEBEBYwCQ%26url%3Dhttp%253A%252F%252Fro.ecu.edu.au%252Fcgi%252Fviewcontent. NSRL Downloads. Understand iOS backups; Decrypt iPhone backup with known password « SECURITYLEARN. iPhone forensics can be performed on the backups made by iTunes or directly on the live device.

Understand iOS backups; Decrypt iPhone backup with known password « SECURITYLEARN

Previous article on iPhone forensics detailed the forensic techniques and the technical challenges involved in performing live device forensics. Forensic analysis on live device reboots the phone and may alter the information stored on the device. In critical cases, forensic examiners rely on analyzing the iPhone logical backups acquired through iTunes. iTunes uses AFC (Apple file connection) protocol to take the backup and also the backup process does not modify anything on the iPhone except the escrow key records. This article explains the technical procedure and challenges involved in extracting data and artefacts from the iPhone backups. Understanding the forensics techniques on iTunes backups is also useful in cases where we get physical access to the suspect’s computer instead of the iPhone directly. Volatility: Advanced Memory Forensics. The OpenIOC Framework. The OpenIOC Framework. _V4_1_Lessard_Kessler.

Malware sites already capitalizing on announcement of Osama Bin Laden's Death. Update (025/02/11 9:40am EST): A before/after comparison of the photoshopped image used in the malicious post can be found here.

Malware sites already capitalizing on announcement of Osama Bin Laden's Death

Within hours of the announcement of Osama Bin Laden's death, we are already seeing malicious sites emerge to capitalize on the news. One Spanish language site displays a purported photo of a murdered Osama Bin Laden and includes a story about the US led operation. Blog Archive » VM Detection by In-The-Wild Malware. A large number of security researchers use Virtual Machines when analyzing malware and/or setting up both active and passive honeynets.

There a numerous reasons for this, including: scalability, manageability, configuration and state snapshots, ability to run diverse operating systems, etc.. Malware that attempts to detect if it’s running in a Virtual Machine (then change its behavior accordingly to prevent analysis by security people) is not a subject of academic fancy. A recent search of VirusTotal showed they receive 1,000 unique samples a week with VM detection capabilities. (This search was performed by searching for known function import names from non-standard DLLs.)