Forensic Analysis of Windows Shellbags

This is the fifth and final blog post in a series about recovering Business Applications & OS Artifacts for your digital forensics investigations.  What are Shellbags? While shellbags have been available since Windows XP, they have only recently become a popular artifact as examiners are beginning to realize their potential value to an investigation. In … Continued

Forensic Analysis of Prefetch files in Windows

This is the fourth blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations.  What are Prefetch Files? Prefetch files are great artifacts for forensic investigators trying to analyze applications that have been run on a system. Windows creates a prefetch file when an application is … Continued

Forensic Analysis of LNK files

This is the third blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations.  What are LNK Files? LNK files are a relatively simple but valuable artifact for the forensics investigator. They are shortcut files that link to an application or file commonly found on a … Continued

Investigating iOS Phone Images, File Dumps & Backups

As of January 2013, Apple announced it had sold over 500 million iOS devices. While iOS seems to be the leading operating system for tablets worldwide, Android continues to be the leading operating system for mobile phones worldwide. Regardless of the statistics, if you are an active forensic examiner, chances are very high you will … Continued

Magnet IEF Recommended in NIJ Electronic Crime Technology Report

INTERNET EVIDENCE FINDER (IEF) has been recommended in a report published by the NIJ Electronic Crime Technology Center of Excellence. The report provides a review of the software, walking through IEF’s special features, and includes detailed results of product testing that was conducted as a part of the evaluation. Report Findings The report finds that … Continued