From thisweekin4n6.com
1 1
Akash Patel File Carving: A Simple and Powerful Way to Recover Deleted Files || String Searching with bstrings… MFTECmd-MFTexplorer: A Forensic Analyst’s Guide Baseline Analysis in Memory Forensics…
on Feb 16
From thisweekin4n6.com
0 1
Use the discount code thisweekin4n6 for 15% off any class at Cyber5w.Use the code PM15 or click this link for 15% your next Hexordia classTakes a class with me! Amnesty International Security LabJo…
on Sun, 12PM
From thisweekin4n6.com
0 0
Use the discount code thisweekin4n6 for 15% off any class at Cyber5w.Use the code PM15 or click this link for 15% your next Hexordia classTakes a class with me! Jessica Hyde at Forensic MagData Pre…
on Mar 23
From thisweekin4n6.com
0 0
Use the discount code thisweekin4n6 for 15% off any class at Cyber5w.Use the code PM15 or click this link for 15% your next Hexordia classTakes a class with me! Akash Patel Firefox Cache: A Forensi…
on Mar 16
From thisweekin4n6.com
0 0
Use the discount code thisweekin4n6 for 15% off any class at Cyber5w. Click here for more information.Use the code PM15 or click this link for 15% your next Hexordia classTakes a class with me; cli…
on Mar 9
From thisweekin4n6.com
0 0
Abdulrehman AliMustang Panda APT Adversary Simulation Akash Patel Running Plaso/Log2Timeline on Windows Mastering Timeline Analysis: A Practical Guide for Digital Forensics: (Log2timeline) Forensic…
on Mar 2
From thisweekin4n6.com
0 0
Akash Patel How Windows Knows Your Files Came from the Internet: Alternate Data Streams (Zone.Identifier) Breaking Down the $LogFile and How to Use LogFileParser Tracking Microphone and Camera Usag…
on Feb 23
From thisweekin4n6.com
0 1
Akash Patel Investigating Google Drive for Desktop: A Forensic Guide Automating Google Drive Forensics: Tools & Techniques Dropbox Forensic Investigations: Logs, Activity Tracking, and External…
on Feb 2
From thisweekin4n6.com
0 0
Added something new to the site this week; a couple of training vendors have reached out to offer readers a discount on their next training class purchase. Using these discount codes will also supp…
on Jan 26
From thisweekin4n6.com
0 0
Your weekly roundup of Digital Forensics and Incident Response news
on Jan 24
From thisweekin4n6.com
0 1
ThinkDFIRSRUMday Funday! Akash PatelHandling Incident Response: A Guide with Velociraptor and KAPE BelkasoftEmail Forensics with Belkasoft X Christopher Eng at Ogmini Homelab Part 1 – The Cur…
on Jan 19
From thisweekin4n6.com
0 0
Atola TechnologyMastering Drive Wiping: Ensuring Data Security Akash Patel Lateral Movement Analysis: Using Chainsaw, Hayabusa, and LogParser for Cybersecurity Investigations Tracing Reused $MFT En…
on Jan 12
From thisweekin4n6.com
0 0
Akash Patel SentinelOne(P7- Activity/Reports): A Practical Guide/An Practical Training SentinelOne (P8- SentinelOne Automation) : Guide / Training to Forensic Collection, KAPE… SentinelOne(P9- Sett…
on Jan 5
From thisweekin4n6.com
0 0
Akash Patel Update on My Azure Incident Response Series SentinelOne(P5- Incidents): A Practical Guide SentinelOne(P6- ISPM/Application Management): An Practical Training Digital Forensics Myanmar M…
on Dec 29
From thisweekin4n6.com
0 0
Arshiya JamadarMobile Forensics – Analyzing Data Stored by Meetup Application on iOS Devices Dr. Neal Krawetz at ‘The Hacker Factor Blog’Labeling AI Dr. Tristan Jenkinson at ̵…
on Dec 22
From thisweekin4n6.com
0 0
John Lukach at 4n6irAdditional CloudFront Log Formats and Destinations Paul Lorentz at CellebriteDon’t Lose Your Evidence: What’s at Stake with the iOS 18 Changes Cyber Sundae DFIRCapabilityAccessM…
on Dec 15
From thisweekin4n6.com
0 0
Adam Harrison at 1234n6 Relationship between Microsoft Server and Desktop OS Versions Available Artifacts – Indicators of Execution Updated BelkasoftMobile Forensics Cheatsheet: iOS and Andro…
on Dec 8
From thisweekin4n6.com
0 0
Adam MesserCloud Digital Forensics and Incident Response — Elastic Kubernetes Service Takeover Leads to… BelkasoftDocument Forensics with Belkasoft X CTF导航Reverse Engineering iOS 18 Inactivity Rebo…
on Dec 1
From thisweekin4n6.com
0 0
Akash Patel Microsoft 365 Security: Understanding Built-in Detection Mechanisms and Investigating Log Events Memory Forensics Using Strings and Bstrings || MemProcFS/MemProcFS Analyzer: A Comprehen…
on Nov 24
From thisweekin4n6.com
0 0
David Spreadborough at AmpedProtecting Evidence: Lossless Data Extraction in Forensic Video Conversion Atola TechnologyUnveiling Tomorrow: New Technologies in Hard Drives Chris at AskCleesChrome Vi…
on Nov 17
From thisweekin4n6.com
0 0
David Spreadborough at AmpedBehind the Screen: Codecs and Formats Unveiled David Haddad at Breakpoint ForensicsSamsung Secure Health Data Parser — A Forensic Tool for Parsing & Analyzing Samsun…
on Nov 10
From thisweekin4n6.com
0 0
Krzysztof Gajewski at CyberDefNerdWindows Artifacts: Analyzing the USN Journal on a Live System Clint Marsden at DFIR InsightsQuick Fixes for plaso / Log2timeline Error: Key Troubleshooting on Ubun…
on Nov 3
From thisweekin4n6.com
0 0
Oleg Afonin at ElcomsoftWhen Speed Matters: Imaging Fast NVMe Drives ForensafeInvestigating Android Gboard Magnet Forensics The importance of PowerShell logs in digital forensics ShimCache vs AmCa…
on Oct 27
From thisweekin4n6.com
0 0
CyberJunnkieHackathon 24 Prequalifiers: Forensics Challenge “hacked” First blood Team deathstrik3 Dr. Neal Krawetz at ‘The Hacker Factor Blog’C2PA and Authenticated Disinformation Vladi…
on Oct 20
From thisweekin4n6.com
0 0
Cyber 5WWindows Shell Items Analysis Derek EiriExploring UFADE to Extract Data From iOS Devices ForensafeInvestigating Android Samsung Browser J SmithSolving the 13Cubed Linux Memory Forensics Chal…
on Oct 6
From thisweekin4n6.com
0 0
Adan AlvarezGaining AWS Persistence by Updating a SAML Identity Provider Alexandre DulaunoyImprove Your Forensic Analyses with hashlookup Alex Caithness at CCL SolutionsWhen is an app not an app? I…
on Sep 29
From thisweekin4n6.com
0 0
Chris Ray at Cyber TriageDFIR Breakdown: Impacket Remote Execution Activity – Smbexec ForensafeInvestigating Android Nike Run Club Johan BerggrenOpenRelik Lina Lau at XintraUnderstanding Tokens in …
on Sep 22
From thisweekin4n6.com
0 0
Atola TechnologySynology RAID Reassembly and Image Acquisition David Spreadborough at AmpedGetting Started with Video Formats and Conversion Cyber 5WNetwork Forensics With Wireshark Mike Wilkinson …
on Sep 15
From thisweekin4n6.com
0 0
0xdf hacks stuffHTB Sherlock: Noxious Andrea Fortuna Forensic acquisition of ChromeOS devices The hidden risks of Cherry-Picking in Incident Response and Digital Forensics Belkasoft How to Investig…
on Sep 8
From thisweekin4n6.com
0 1
CCL GroupLocal Storage and Session Storage in Mozilla Firefox (Part 1) DFIR ReviewLocation, Location, Location Dr. Tristan Jenkinson at ‘The eDiscovery Channel’eDiscovery Risks – Sendin…
on Sep 1
From thisweekin4n6.com
0 0
0xdf hacks stuffHTB Sherlock: Reaper CellebritePerforming Collection from Mobile Devices in an MDM Environment Cyber TriageDFIR Next Steps: What To Do After You Find a Suspicious Use Of curl.exe Di…
on Aug 25
From thisweekin4n6.com
0 1
Adam MesserCloud Digital Forensics and Incident Response — AWS IAM Privilege Escalation Leads to EC2… Craig Ball at ‘Ball in your Court’AI Prompt to Improve Keyword Search Mike Wilkinso…
on Aug 11
From thisweekin4n6.com
0 0
Digital Forensics MyanmareCDFP (Module-6) (Window Forensics) (Part – 5 ) Dr. Neal Krawetz at ‘The Hacker Factor Blog’Reversing Samsung Metadata ForensafeInvestigating Android Fire…
on Aug 4
From thisweekin4n6.com
0 1
Chris Ray at Cyber TriageDFIR Breakdown: Using Certutil To Download Attack Tools 0xdf hacks stuff HTB Sherlock: Tracer HTB Sherlock: Campfire-2 Baris Dincer Forensic Investigation Operations — Comp…
on Jul 28
From thisweekin4n6.com
0 0
Adam MesserCloud Digital Forensics and Incident Response — EC2 Compromise Leads to S3 Bucket Exfiltration Baris Dincer Forensic Investigation Operations — Windows Base I Forensic Investigation Oper…
on Jul 21
From thisweekin4n6.com
0 0
Atola TechnologiesNeed for Speed: How to Get a Forensic Image Quicker? Clint Marsden at DFIR Insights Exploring Host-Based Digital Forensics with Memory Analysis The role of Incident Response in Cy…
on Jul 14
From thisweekin4n6.com
0 0
Cyber 5WWindows Registry Analysis Decrypting a DefenseNYC ShotSpotter Report, Deepfakes, Video ID Decision, Digital Evidence Standards, & More Django Faiola at ‘Appunti di Informatica For…
on Jul 7
From thisweekin4n6.com
0 0
0xdf hacks stuffHTB Sherlock: Campfire-1 Any.Run Phishing Incident Report: Facts and Timeline Analysis of the Phishing Campaign: Behind the Incident AT&T Cybersecurity Business Email Compromis…
on Jun 30
From thisweekin4n6.com
0 0
Cesar Quezada at HexordiaFSEvents: How They Work and Why They Matter for Mac Analysis ForensafeInvestigating Android Device Health Services Neetrox at InfoSec Write-upsAnalyzing a Phishing Email He…
on Jun 26
From thisweekin4n6.com
0 0
0xdf hacks stuffHTB Sherlock: Noted Atola TechnologyFile Carving and Sector-Level Analysis Campaign and public sector information securitySysmon-Help an investigator out! Craig Ball at ‘Ball …
on Jun 25
From thisweekin4n6.com
0 0
Zach Stanford, Yogesh Khatri, and Phill Moore at CyberCXForensic Applications of Microsoft Recall 0xdf hacks stuffHTB Sherlock: Constellation Adan AlvarezAutomating Incident Response in AWS: Blocki…
on Jun 23
From thisweekin4n6.com
0 0
0xdf hacks stuffHTB Sherlock: Nubilum-1 Amged WagehDriveFS Sleuth — Recovery Made Possible! Chris Ray at Cyber TriageDFIR Breakdown: Kerberoasting Dark Data DiscoveryThe 10 Common Data Carving Appr…
on Jun 2
From thisweekin4n6.com
0 0
0xdf hacks stuffHTB Sherlock: Bumblebee Alexis Brignoni at ‘Initialization Vectors’Full File System extractions in Zip – MAC times Marco Fontani at AmpedDetecting AI-generated Ima…
on May 26
From thisweekin4n6.com
0 0
0xdf hacks stuffHTB Sherlock: Logjammer CTF导航Forensike, or Forensics for bad guys ForensafeInvestigating iOS Threema Scott Koenig at ‘The Forensic Scooter’iLEAPP Parsers & Photos.sq…
on May 19
From thisweekin4n6.com
0 0
Atola TechnologyUncovering AFF4: File Format Essentials And Imaging Bret at Cyber GladiusIncident Response Plan: Windows Data Collection Brian Carrier at Cyber TriageAdaptive vs Static File Collect…
on May 12
From thisweekin4n6.com
0 0
Alexander TasseSherlock — “Unit42” Justin Seitz at Bullsh*t HuntingFront Porch Digital Forensics Digital DanielaInvestigating an Apache Log in the Linux Command Line Dr. Tristan Jenkinson at ‘…
on May 5
From thisweekin4n6.com
0 0
Deagler’s 4n6 BlogHexordia Weekly CTF Challenge 2024 – Week 2 Writeup DS4N6 [BLOG] Cybersecurity & ChatGPT – Multi-part Blog Post Series, by Mario Pérez [BLOG] Cybersecurity &…
on Apr 28
From thisweekin4n6.com
0 0
Bruno Fischer [EN] android app analysis kleinanzeigen.de (com.ebay.kleinanzeigen) [DE] Android App Analyse kleinanzeigen.de (com.ebay.kleinanzeigen) Amr Ashraf at Cyber 5WHard disk structure and an…
on Apr 21
From thisweekin4n6.com
0 0
AtolaRAID With Parity: Reassembly and Image Acquisition Alexis Brignoni at ‘Initialization Vectors’ New VLEAPP parser New parser for Uber app geo-locatios in iOS using iLEAPP BelkasoftB…
on Apr 14
From thisweekin4n6.com
0 0
John Lukach at 4n6irDo NOT forget the AWS Amplify Logs Derek EiriLionel Notari’s iOS Unified Log Acquisition Tool Steve Bunting at DFIR ReviewHow Did That Photo Get On That iPhone ForensafeInvestig…
on Apr 7