SANS Digital Forensics and Incident Response Blog: Category - Computer Forensics

Digital Forensics: Finding Encoded Evidence

Recently I was asked to recover images from a suspect machine. Numerous tools have the ability to categorize files based on type. Students of SANS 508 get a look under the hood at how this is done using the "magic numbers" found at or near the start of files with well-known formats. Fortunately, most of … Continue reading Digital Forensics: Finding Encoded Evidence


Digital Forensics Case Leads: Ready, Forensicate, Aim

Ready. Forensicate. Aim. Okay, seriously, don't do that. You know the correct order, right? If not, Chris Pogue spent part of last year presenting on the Sniper Forensics methodology, developed by the incident response team at TrustWave's SpiderLabs, and has what you need. Even if you already know the proper order is Ready, Aim, Forensicate, … Continue reading Digital Forensics Case Leads: Ready, Forensicate, Aim


Boston, MA hosts Community SANS Forensics Essentials, February 28 - March 4, 2011

SANS is pleased to announce Community SANS Forensics Boston, MA where we will teach Forensics 408: SANS Computer Forensics Essentials, February 28 - March4, 2011. For complete course description, event details, and to register, please visit (https://www.sans.org/boston-2011-cs). Attendees will earn 36 CPEs at the completion of this five day training event. Save $400 on tuition … Continue reading Boston, MA hosts Community SANS Forensics Essentials, February 28 - March 4, 2011


Understanding EXT4 (Part 1): Extents

Hal Pomeranz, Deer Run Associates EXT4 is a next generation file system replacement for the EXT2/EXT3 family of Linux file systems. It was accepted as "stable" in the Linux 2.6.28 kernel in October 2008[1]. As of this writing, it's starting to appear as the default file system in newer versions of several Linux distros. While … Continue reading Understanding EXT4 (Part 1): Extents


Digital Forensics: How to configure Windows Investigative Workstations

I like Windows. There... I said it. I understand that this statement will probably come with the requisite beatings, but I honestly enjoy using Windows on a day to day basis more than other operating systems and am willing to take whatever flack comes my way over it (and yes, my team at work loves … Continue reading Digital Forensics: How to configure Windows Investigative Workstations