Digital Forensics

Digital forensics encompasses the recovery and investigation of material found in digital devices, often in relation to computer crime. Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before criminal or civil (as part of the electronic discovery process) courts. The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved; computer forensics, network forensics, forensic data analysis and mobile device forensics. The typical forensic process encompasses the seizure, forensic imaging (acquisition) and analysis of digital media and the production of a report into collected evidence.

Share tech news, updates, or what's on your mind.

Sign up to Post

All systems show clean by Malwarebytes, Vipre, online testers, etc.
Mail server (Windows Server 2008 R2) same
Phone - clean
Minimal online presence, no social media use, no FB, no Google/Gmail account (not on my phone either), no Verizon syncing on my phone, no syncing at all except to my personally run server for my mail.

Samsung S8 Rooted w/ DroidWall, 95% of things locked down, no Play Store, minimal apps.

Problem:  Search a topic, next day (or a few days depending) scam/fake email shows up about that topic.

I want to know what tools, techniques, methods, forensic investigations I can do to track down the leak.

Thanks. :)
0
Starting with Angular 5
LVL 13
Starting with Angular 5

Learn the essential features and functions of the popular JavaScript framework for building mobile, desktop and web applications.

i am investigating an email record and need to know from where the email was sent and what is the device used to send

When i checked the header details by using analyzer i find some mail flow along with the source ip of mail server but not the sender location and IP



HE1EUR02FT012.mail.protection.outlook.com(185.70.40.133)
Fri, 26 Jul 2019 06:18:19 +0000

HE1EUR02FT012.eop-EUR02.prod.protection.outlook.com
Fri, 26 Jul 2019 06:18:19 +0000

AM3PR07CA0075.eurprd07.prod.outlook.com

AM0PR07MB3940.eurprd07.prod.outlook.com
Fri, 26 Jul 2019 06:18:21 +0000

AM6PR07MB3942.eurprd07.prod.outlook.com

                Receiveers
0
Need to remove the blackout from a picture
0
I'm writing a program that displays a time stamp or large number in a datagrideview. I'm loading the data using a SQLite engine.

In order to convert the number (time stamp) I need to take only the first 11 characters or numbers from the value.

Is their a way to loop through all cells in a column and trim it down to say 11 characters?
0
We've downloaded Paladin 7.02 to a USB stick and we have successfully booted a MacBook Air.

Attached to the Air via USB is a Mac OS X drive in an enclosure called "Macintosh HD." Also attached is a Windows FAT32-formatted drive, "Image."

We need to E01 image Macintosh HD to the Image target drive.

We see that Paladin has provided 3 "Imaging Tools" that launch Linux terminal sessions. However, we can't find any documentation for how to actually render the E01 image. All suggestions welcome.
0
Hi, I have a 3.5 years old Nokia Lumia device that is about to die because it can barely charge.  I want to buy a new one but I have not because I wanted to extrar my text message threads.  They include videos and photos of my kids that I have sent over the years to family and friends and some of those videos and photos I lost when my computer hard drive died and I had not backed up for a while.  The only place where they still reside are in my very long, 3.5 year old message threads.  Plus, some relevant news like when my kid's first tooth came of, or funny things they said or did, I have always texted my family, and since I have no time for albums, the date and exact memory only reside in these text threads.  I have tried for ways to extract this with no luck.  The phone is the first Nokia Lumia 900 that came out, it has Windows 7.8 installed.  If someone can help me out before it dies on me, it would be great!  Thanks,

Marlene
0
I'm working on my master's dissertation in computer forensics and cyber security, and the topic is on bring-your-own-device (BYOD) acceptable use and security policy. There are many security implications that come along with BYOD. I am most interested in what organisations are doing today regarding BYOD?

If anyone has a few minutes and would like to participate in this anonymous BYOD survey, I would really appreciate the feedback.

The survey can be found here: https://www.surveymonkey.com/s/XPHCQSV 

Thank you!
0

Digital Forensics

Digital forensics encompasses the recovery and investigation of material found in digital devices, often in relation to computer crime. Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before criminal or civil (as part of the electronic discovery process) courts. The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved; computer forensics, network forensics, forensic data analysis and mobile device forensics. The typical forensic process encompasses the seizure, forensic imaging (acquisition) and analysis of digital media and the production of a report into collected evidence.

Top Experts In
Digital Forensics
<
Monthly
>