Free Digital Forensics Tools Every Investigator Needs
Magnet Forensics offers a variety of free digital forensics tools designed to assist in many aspects of digital forensics and incident response (DFIR).
Magnet Forensics offers a variety of free digital forensics tools designed to assist in many aspects of digital forensics and incident response (DFIR).
Earlier this month, I reached out to my friend Valentina and told her I wanted to learn about macOS/iOS exploitation, so she recommended taking a look at the CVE-2021-30860 vulnerability, also known as FORCEDENTRY, and the prior work her friend Jeffrey Hofmann posted on Twitter.
How large was the last case you worked and how much data were you dealing with? I get a bit sentimental thinking back to some of the earlier days of my digital forensics casework. The good old days when a normal case consisted of a single desktop computer with maybe a few gigabytes of storage capacity—on the high end.
Picking our favorite updates to Magnet AXIOM Cyber in 2022 was no mean feat. From the inclusion of scanning with YARA rules to spot the latest malware, to Email Explorer for easy browsing of email evidence, AXIOM Cyber in 2022 got some major upgrades. While there are too many new features to fit in one post, here are ten great new AXIOM Cyber features from the past 12 months, in no particular order.
2022 was a big year for Magnet AXIOM. From improvements to Magnet.AI to the much adored (and long awaited) Dark Mode, Magnet AXIOM has transformed quite a bit over the past 12 months. While there are too many new features to fit in one post, we’ve rounded up a few of our favorite improvements to AXIOM in 2022.
We are thrilled to announce the release of Magnet AXIOM Cyber 6.9. This release adds and expands on a number of features that will help streamline your digital forensics, incident response and eDiscovery investigations, including:
Magnet AXIOM 6.9: Updated LevelDB Viewer, Improvements to Apple Warrant Returns, & Automatic Loading of iOS Keychain Data
As examiners, we are used to finding data within database files. These have often been SQLite databases which we have been examined ad nauseum to carve out every bit of data we can find.
MF: Tell us about your life before becoming a Trainer.
ML: Prior to becoming a trainer, I worked as a digital forensic investigator within law enforcement. I worked on a wide variety of cases including fraud, large scale drug operations, murder, and child sexual offences. After my time in law enforcement, I became a university lecturer, specialising in mobile forensics and cyber security.
MF: Tell us about your life before becoming a Trainer.
DD: Before joining the Magnet family, I was a law enforcement officer for 25 years. Throughout my career, I was fortunate to be a part of many different units: patrol officer, school resource officer, Narcotics, Investigations, and Major Investigations. One thing our department didn’t have was a Computer Crimes Unit. Seeing a need, with the support of my chief, I started one.