Catch up latest musings at http://www.4n6xplorer.com
Mobile devices use a variety of internal, removable and online data storage capabilities. In many cases, it is necessary to use more than one tool in order to extract and document the desired data from the mobile device and its associated data storage media.
While the amount of data stored by phones is less when compared to the storage capacity of computer hard drives, the storage capacity of these devices continues to grow and it is critical to verify the accuracy of data obtained from mobile devices.
We’ll discuss an overview of process considerations for the extraction and documentation of data from mobile devices Continue reading “Mobile Forensics – Analysis Methodology”
It is almost becoming a rare scenario these days to conduct a digital forensic investigation without including a smartphone or mobile device. Smartphones are replacing the need for a personal computer and are capable of storing a wealth of information often intentionally, and sometimes unintentionally.
Although smartphone forensics are similar to those of digital forensics, Continue reading “Mobile Forensics – Extraction Types”
Family, home, the smell of milk and vermicelli, the joy of festive. Not that I am religious, but I dislike being alone on festivals. I do believe in tradition, the tradition of feasting. Festivals always meant good feast to me. And for me any festival is good, as you get to eat a lot of stuff which otherwise are not made on any other day.
At the beginning of this quarter, a colleague of mine had seeded the thoughts of learning Python. Continue reading “Python – print (“Happy Ramadan!”)”
The Search feature of email examiner forensic software perform fab job of searching mail items. Search email by name, subject, date, contact’s first name, last name, attachment etc.
Some of the features includes Continue reading “MailXaminer – Simplifying Email Forensics”
Over the last decade, many email forensic tools have been developed.Most of the tools are commercial, diverse in nature, and developed in an isolated manner rather not to solve any specific cyber crime related concern. Rather, they are intended to discover or recover information. Few of the commercial applications that supports various mail types with the op The more coverage a tool has, the better it can be suitable to address various types of forensic analysis and investigations. Here a few free tools that can assist in analysis.
Here are some of the best free applications that will assist you in conducting a digital forensic acquisition and analysis. This is by no means an extensive list and may not cover everything, but I’m sure you’ll find few of them to be of interest. The tools are mentioned in random order, so do not consider it as a ranking.