Critical National Information Infrastructure (CNII) (The views are of the author and all issues related to the contents be addressed directly to the Author) Introduction Critical National Information Infrastructure (CNII) is defined as those assets (real and virtual), systems, and functions that are vital to the nations that their incapacity or destruction would have a
-Ritik Singh This protocol contains several rules which covers all the steps needed to comply with for completing all the process which is described below. Collection. Acquisition/imaging. Analysis Reporting. Collection:- As moving towards the collection of evidence from resources such as storage drive, hard drive, hard disk, cloud data, social media account or another digital
The Worst Mistakes in iOS Forensics  by Vladimir Katalov What can possibly go wrong with that iPhone? I’ll have a look (oh, it’s locked!), then switch it off, eject the SIM card and pass it on to the expert. Well, you’ve just made three of the five most common mistakes making subsequent unlock and extraction
How to Unlock Windows Systems with a Bootable Flash Drive  by Oleg Afonin Accessing a locked system is always a challenge. While you might be tempted to pull the plug and image the disk, you could miss a lot of valuable evidence if you do. Full-disk encryption, EFS-encrypted files and folders and everything protected with
iOS acquisition methods compared: logical, full file system and iCloud  by Vladimir Katalov The iPhone is one of the most popular smartphone devices. Thanks to its huge popularity, the iPhone gets a lot of attention from the forensic community. Multiple acquisition methods exist, allowing forensic users to obtain more or less information with more or
Breaking LastPass: Instant Unlock of the Password Vault  by Oleg Afonin Password managers such as LastPass are designed from the ground up to withstand brute-force attacks on the password database. Using encryption and thousands of hash iterations, the protection is made to slow down access to the encrypted vault that contains all of the user’s
Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition  by Vladimir Katalov Instant messaging apps have become the de-facto standard of real-time, text-based communications. The acquisition of instant messaging chats and communication histories can be extremely important for an investigation. In this article, we compare the five top instant messaging apps for iOS
Lasted Samsung Exynos 7, CPU 7570, Security Patch “Dez 2019”, Bypass “remove” PIN/Pattern Without Dataloss. Its possible to Swapping Physical and Logical!! https://www.linkedin.com/feed/update/urn:li:activity:6638397308272689152/?commentUrn=urn%3Ali%3Acomment%3A(activity%3A6638117313860120577%2C6638397165565681664) ! Djalma Fonseca ( Digital Forensics – 4N6 Team)
The forensic acquisition of content, sites or web pages is a service that with the evolution of digital technology has become increasingly in demand as it allows the evidence and contents to be crystallized in the exact moment before they are removed or modified. Complete websites or individual pages, social networks (Facebook, Twitter, Instagram, Linkedin,
Mauris eros lorem, ullamcorper vitae velit quis, iaculis viverra magna.