Answering Some Questions about Memory Analysis in Magnet AXIOM

Magnet AXIOM 2.0 has added the ability to conduct additional memory analysis by integrating the Volatility framework. For anyone who has used Volatility in the past, it is a great command line tool to conduct memory analysis by pulling out things like processes, network connections, command history, files, etc. The integration should be familiar to … Continued

5 Magnet Forensics Mobile Success Stories

Magnet AXIOM, IEF, and ATLAS have proven their mettle time and again for our customers. From our earliest days carving browsing data that no other vendor could acquire, to the present day combining and analyzing acquisitions from multiple data sources, we’re committed to ensuring our customers’ success. We wanted to take some time to highlight … Continued

Connections in Magnet AXIOM Q&A Part 2

This is the second part in a two-part series. You can read Part 1 here. In our short series on AXIOM Connections, we’ve given an overview of what Connections is (a fast, easy way to visualize how different artifacts are related to one another across devices) and how it works (automatically, with minimal time and … Continued

Connections in Magnet AXIOM Q&A Part 1

This is the first part in a two-part series. You can read Part 2 here. In our previous blog post, “Telling the Story of Digital Evidence,” we outlined how the Connections feature in Magnet AXIOM automatically shows where key digital evidence came from, where it is currently located, who it was shared with and when … Continued

Telling the Story of Digital Evidence

In digital forensics, demonstrating attribution—using operating system artifacts to prove that the suspect had knowledge of the document or image files found on a device—is one of the key elements of building a case. The ability to tell an evidentiary story is even better. How did a file get here? Where did it go—to whom … Continued

Extracting Data from a Samsung Device Using Advanced MTP

Samsung devices are one of the most popular device types on the most popular mobile operating system, Android. In the case of a recent examination, a Samsung was giving me a lot of trouble. It was a Verizon Samsung Galaxy S7, SM-G930V. This phone was released running Android version 6, or Marshmallow, and upgradable to … Continued

Magnet AXIOM Advanced Computer Forensics (AX250) Now Open!

We’re proud to introduce a new course for people who are looking to expand the capabilities of their computer forensics investigations: Magnet AXIOM Advanced Computer Forensics (AX250). This is an expert-level four-day training course. It is designed for participants who are somewhat familiar with the principles of digital forensics and are seeking to expand their … Continued