Artwork

Content provided by Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

New Year, New Tools, New Ways of Thinking!

1:26:23
 
Share
 

Manage episode 393619217 series 3505865
Content provided by Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Ever found yourself piecing together a complex jigsaw puzzle of digital evidence? That's precisely the journey we invite you to embark on in our latest episode packed with tools, tales, and tech. We're not just talking shop; we're handing you the magnifying glass to examine the intricacies of JSON files with JSON CRACK, and introducing a python tool to automate investigations involving Google Drive File Stream artifacts, DriveFS-sleuth.
This episode is a testament to the craft of digital forensics, featuring a blog from Mattia at Zena Forensics that aides in answering the question, "Has the user ever used the XYZ application?". As we unpack the nuances of reverse engineering and celebrate the updates to Hexordia's Evanole, we're reminded that the heart of digital forensics beats to the rhythm of relentless inquiry and meticulous method.
We delve into the advanced research and exploitation methodologies With Magnet GrayKey Labs and converse about the importance of these capabilities as well as validation. This is coupled with a live demonstration involving SEGB files and the data that can be overlooked without research and the validation of multiple tools.
Raise your glasses—here's to the exuberant spirit of learning and the relentless pursuit of truth that defines our community. So, are you ready to elevate your understanding of the digital landscape and smash those New Year's resolutions? Join us, and let's make 2024 a year of 4K clarity—in forensics and beyond!
Notes:
JSON Crack-
https://jsoncrack.com/
DriveFS Sleuth — Your Ultimate Google Drive File Stream Investigator!
https://amgedwageh.medium.com/drivefs-sleuth-investigating-google-drive-file-streams-disk-artifacts-0b5ea637c980https://github.com/AmgdGocha/DriveFS-Sleuth
Advanced Research and Exploitation Methodologies With Magnet GRAYKEY Labs
https://www.magnetforensics.com/blog/advanced-research-and-exploitation-methodologies-with-magnet-graykey-labs/
Has the user ever used the XYZ application?
https://blog.digital-forensics.it/2023/12/has-user-ever-used-xyz-application-aka.html
Evanole New Year Reveal!
https://www.hexordia.com/evanolece

  continue reading

Chapters

1. Introduction and Tools for Visualizing Data (00:00:15)

2. Security Tools and Access to Data (00:15:32)

3. Validating Source Code and Open Source (00:21:06)

4. Importance of Context in Digital Forensics (00:29:05)

5. Digital Forensics New Year Goal Setting (00:34:41)

6. Reverse Engineering and New Tool Updates (00:48:50)

7. Technical Details of a Simple Report (00:59:38)

8. Interpreting Data With Multiple Tools (01:10:39)

9. The Importance of Applying a Process (01:19:52)

19 episodes

Artwork
iconShare
 
Manage episode 393619217 series 3505865
Content provided by Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Heather Charpentier & Alexis "Brigs" Brignoni, Heather Charpentier, and Alexis "Brigs" Brignoni or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Ever found yourself piecing together a complex jigsaw puzzle of digital evidence? That's precisely the journey we invite you to embark on in our latest episode packed with tools, tales, and tech. We're not just talking shop; we're handing you the magnifying glass to examine the intricacies of JSON files with JSON CRACK, and introducing a python tool to automate investigations involving Google Drive File Stream artifacts, DriveFS-sleuth.
This episode is a testament to the craft of digital forensics, featuring a blog from Mattia at Zena Forensics that aides in answering the question, "Has the user ever used the XYZ application?". As we unpack the nuances of reverse engineering and celebrate the updates to Hexordia's Evanole, we're reminded that the heart of digital forensics beats to the rhythm of relentless inquiry and meticulous method.
We delve into the advanced research and exploitation methodologies With Magnet GrayKey Labs and converse about the importance of these capabilities as well as validation. This is coupled with a live demonstration involving SEGB files and the data that can be overlooked without research and the validation of multiple tools.
Raise your glasses—here's to the exuberant spirit of learning and the relentless pursuit of truth that defines our community. So, are you ready to elevate your understanding of the digital landscape and smash those New Year's resolutions? Join us, and let's make 2024 a year of 4K clarity—in forensics and beyond!
Notes:
JSON Crack-
https://jsoncrack.com/
DriveFS Sleuth — Your Ultimate Google Drive File Stream Investigator!
https://amgedwageh.medium.com/drivefs-sleuth-investigating-google-drive-file-streams-disk-artifacts-0b5ea637c980https://github.com/AmgdGocha/DriveFS-Sleuth
Advanced Research and Exploitation Methodologies With Magnet GRAYKEY Labs
https://www.magnetforensics.com/blog/advanced-research-and-exploitation-methodologies-with-magnet-graykey-labs/
Has the user ever used the XYZ application?
https://blog.digital-forensics.it/2023/12/has-user-ever-used-xyz-application-aka.html
Evanole New Year Reveal!
https://www.hexordia.com/evanolece

  continue reading

Chapters

1. Introduction and Tools for Visualizing Data (00:00:15)

2. Security Tools and Access to Data (00:15:32)

3. Validating Source Code and Open Source (00:21:06)

4. Importance of Context in Digital Forensics (00:29:05)

5. Digital Forensics New Year Goal Setting (00:34:41)

6. Reverse Engineering and New Tool Updates (00:48:50)

7. Technical Details of a Simple Report (00:59:38)

8. Interpreting Data With Multiple Tools (01:10:39)

9. The Importance of Applying a Process (01:19:52)

19 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide