Connections in Magnet AXIOM Q&A Part 1

This is the first part in a two-part series. You can read Part 2 here. In our previous blog post, “Telling the Story of Digital Evidence,” we outlined how the Connections feature in Magnet AXIOM automatically shows where key digital evidence came from, where it is currently located, who it was shared with and when … Continued

The AXIOM Performance Journey: How Much Faster is it Now?

By Jad Saliba, Founder & CTO of Magnet Forensics It’s almost been two years since we released Magnet AXIOM v1.0, and it’s been quite the ride since that release day! AXIOM was created primarily because we were looking to add more functionality to IEF — but IEF was based on a platform that was reaching … Continued

Catching Up with the Magnet User Summit CTF Winners

This week, DFIR and infosec professionals converge on Las Vegas this week for the Black Hat and DEFCON conferences, each of which has its own Capture the Flag (CTF) competition. We thought we’d take a fond look back at the success of our own first-ever CTF, held in May in conjunction with our User Summit, … Continued

Telling the Story of Digital Evidence

In digital forensics, demonstrating attribution—using operating system artifacts to prove that the suspect had knowledge of the document or image files found on a device—is one of the key elements of building a case. The ability to tell an evidentiary story is even better. How did a file get here? Where did it go—to whom … Continued

The Benefits of the Artifacts-Oriented Approach Part 3

Our previous two blogs covered the reasons why we think file system forensics’ marginal returns are rapidly diminishing, and the changes in consumer electronics that continue to drive the need for a focus on artifacts and the apps they come from in digital forensics. In our final post, we’re discussing how the artifacts-oriented approach allows … Continued

File System Forensics: No Longer the Gold Standard? Part 1

Digital forensics has relied on the file system for as long as hard drives have existed. The structures associated with File Allocation Tables (FAT), the New Technology File System (NTFS), Extended File System (EXT), and other file systems—as well as the partitions within—could be mined for file metadata, carved for deleted files, and accessed to … Continued