Note: This post originally appeared on the SANS Forensics blog

As Windows Registry artifacts go, the “Shellbag” keys tend to be some of the more complicated artifacts we have to decipher.  But they are worth the effort, giving an excellent means to prove the existence of files and folders along with user knowledge.  Shellbags can be used to answer the difficult questions of data enumeration in intrusion cases, identify the contents of long gone removable devices, and show the contents of previously mounted encrypted volumes.   Information persists for deleted folders, providing an invaluable reference for items no longer part of the file system.

Continue Reading…

60 Seconds - Things That Happen On Internet Every Sixty SecondsInfographic by- Shanghai Web Designers

Hack Attack Infographic Continue Reading…

“You can help your organization if you consider computer forensics as a new basic element in what is known as a ‘defense-in-depth’ approach to network and computer security.”

– US-CERT Whitepaper

Computer forensics growing part of Fed cybersecurity strategy

With more forensic books hitting the shelves, I find myself prioritizing those by authors I know and trust. I have worked with Cory Altheide and he is an extremely talented forensic professional with a passion for open source tools. Not surprisingly, I would not categorize this as a beginner book. Open source tools require a higher level of interaction than their commercial counterparts, but are a great way to take your forensic skills to the next level. While teaching, I often see students frustrated that there is no one tool that can do it all. Such a tool does not exist, no matter how much you are able to pay for it. Free and open source tools fill large gaps in the capabilities of commercial forensic suites and will continue to do so in the foreseeable future.

Continue Reading…

How-to guide for VMWare VMFS forensic recovery (via @) <- Must read for all ESX users
Chad Tilbury

A Fistful of Dongles (AFoD) is an eclectic mix of all things digital forensic. Eric Huber is the primary author and is a talented analyst and knowledgeable resource. Eric’s law enforcement and corporate background provide excellent insight into current events within the forensic community. He clearly has a passion for the field and it shows in the entertaining posts.  AFoD has quickly become a staple on my reading list.

Link:  A Fistful of Dongles


UPDATE: A Fistful of Dongles was awarded the Forensic 4Cast Best Digital Forensics Blog for 2011.  Congratulations Eric!

Great reason to buy that high end GPU: Amazing results w/ GPU password cracking. (via @)
Chad Tilbury

Feds are “thoroughly addicted to location data.”

Bill Would Keep Big Brother’s Mitts Off Your GPS Data

I am a big fan of Mandiant Memoryze for memory forensic analysis.  With support for Windows systems from 2000 SP4 to 2008 R2 and ever increasing features to flag potential evil, it is hands down the best free tool available for the job.  Its only downside up to this point has been the steep learning curve required by the user interface.  Enter Redline.  Redline replaces AuditViewer as the front-end to Memoryze and truly brings memory analysis capability to the masses.  What excites me most about this tool is that it dramatically lowers the bar for individuals trying to get started with memory forensics.  Chalk one up for the good guys.