Posts by Tags

ANT

Automated Network Triage (ANT) / Profiler

less than 1 minute read

Project: Automated Network Triage (ANT) / Profiler<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', Hel...

ATOM

Project ATOM

less than 1 minute read

Project: ATOM<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue', H...

Authentication

Autopsy

Using Autopsy 4 to export file metadata

less than 1 minute read

Autopsy 4 is a very powerful digital forensic investigation tool. Today, we are going to extract file and meta-data from a disk image (mobile phone) to use i...

Autopsy 4

Awareness

When National Security Turns Against You

2 minute read

Opinion originally published by Korea Times Last Friday a ransomware virus named WannaCry began spreading across the Internet. By Sunday, it had infected co...

BigData

Bodyfile

Using Autopsy 4 to export file metadata

less than 1 minute read

Autopsy 4 is a very powerful digital forensic investigation tool. Today, we are going to extract file and meta-data from a disk image (mobile phone) to use i...

CFP

[CFP] WSDF 2017 - extended deadline

3 minute read

Submission Deadline Extended to May 1st, 2017 Call for Papers The 10th International Workshop on Digital Forensics (WSDF 2017) https://www.ares-conference...

CFP 2012

CFP: Africomm 2012

2 minute read

<div class="p1">Call for Papers</div><div class="p1">——————–</div><div class="p1">Fourth International IEEE EAI Conference on e...

CFP: IRISSCERT Cyber Crime Conference

less than 1 minute read

The IRISSCERT Cyber Crime Conference will be held November 22, 2012 in Dublin, Ireland. More information can be found here.They are currently running a call ...

ICDF2C 2012

less than 1 minute read

The 4th International Conference on Digital Forensics and Cyber Crime (ICDF2C), hosted at Purdue University, will be held from October 24-26, 2012.Website: h...

CFP 2013

[CFP] DFRWS EU 2014

less than 1 minute read

From http://dfrws.org/2014eu/cfp.shtmlThe DFRWS-EU Conference that will be held in Amsterdam on the 7-9 May 2014.Important DatesSubmission deadline: December...

[CFP] ICDF2C 2013 Note of Change of Date

less than 1 minute read

Please note, the dates for the ICDF2C 2013 have slightly changed.Fifth International Conference on Digital Forensics and Cyber Crime - ICDF2C 201325-27 Septe...

CFP 2014

[CFP] ICDF2C 2014 Submissions Due

less than 1 minute read

Just a quick reminder that submissions for the 6th International Conference on Digital Forensics & Cyber Crime are due THIS FRIDAY (May 16, 2014). See su...

[CFP] World Forensic Festival 2014

less than 1 minute read

World Forensic Festival, Oct. 12 - 18, 2014 in Seoul, South Korea.Abstract submission due: May 31, 2014Program site: http://wff2014korea.org/Scholarships and...

[CFP] ICDF2C 2014

less than 1 minute read

Don’t forget about the 6th International Conference on Digital Forensics & Cyber Crime, September 18–20, 2014 in New Haven, Connecticut, United States.Th...

CFP 2015

[CFP] DFRWS EU 2016

3 minute read

The DFRWS EU 2016 conference will be held in Lausanne, Switzerland from March 30th to April 1st, 2016.<div class="separator" style="clear: both; text-alig...

[CFP] ICDF2C Submission Deadline Extended

less than 1 minute read

Hello everyone! The ICDF2C Call for Papers has been extended to April 13, 2015. Hurry an submit! See you in Seoul!http://d-forensics.org/2015/show/cf-papers

[CFP] ICDF2C Submissions Due 30 March

less than 1 minute read

Just a reminder that submissions for ICDF2C are due on the 30th of March, 2015 (next week).<div class="separator" style="clear: both; text-align: center;"...

[CFP] SADFE-2015

6 minute read

Call for Papers SADFE-2015Tenth International Conference on Systematic Approaches to Digital Forensics Engineering September 30 – October 2, 2015, Malaga, S...

2015 デジタル・フォレンジックとサイバー犯罪に係る国際会議・韓国デジタル・フォレンジック学会年次大会 論文募集

less than 1 minute read

2015 デジタル・フォレンジックとサイバー犯罪に係る国際会議・韓国デジタル・フォレンジック学会年次大会 論文募集 Please note: all submissions and presentations must be in English. デジタル・フォレンジックとサイバー犯罪に係る国際会議(The I...

ICDF2C, KDFS 2015 论文征文公告

less than 1 minute read

ICDF2C, KDFS 2015 论文征文公告 Please note: all submissions and presentations must be in English. 国际数字取证、网络犯罪会议(ICDF2C)是旨在促进数字取证及网络犯罪侦查的发展,推动全世界的优秀研究人员、实务人员、教...

[CFP] DFRWS US 2015

1 minute read

Just a quick reminder that the DFRWS US 2015 is coming up soon!From DFRWS.org:DFRWS 2015 will be held on  August 9-13, 2015 at the Hyatt Regency Philadelphia...

[CFP] ICDF2C 2015

4 minute read

Call for papers for the 7th International Conference on Digital Forensics and Cyber Crime (ICDF2C) Conferece Dates: October 6 - 8, 2015 Location: Seoul, Sou...

DFRWS 2015 EU - Call for Forensic Challenge

1 minute read

Digital Forensic Research Workshop 2015 EU is currently calling for Forensic Challenge proposals.See the CFCDeadline: January 31st, 2015The DFRWS Conference ...

CFP 2016

[CFP] CLOUDFOR extended submission deadline

2 minute read

CLOUDFOR 2016: Workshop on Cloud ForensicsIn conjunction with the 9th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), Tongji Universi...

[CFP] ICDF2C Submission date extended!

4 minute read

ICDF2C 2016 in New York has extended its call for papers until April 25th! Call for papers for the 8th International Conference on Digital Forensics and Cyb...

[CFP] Call for Papers ICDF2C 2016

1 minute read

8th International Conference on Digital Forensics and Cyber Crime<div class="separator" style="clear: both; text-align: center;"></div>Location: ...

CTF

Categorization

Cloud Computing

InfoSecurity Russia 2012

less than 1 minute read

Last week, Pavel and I gave an invited talk at InfoSecurity Russia 2012. From Digital FIRE:<blockquote class="tr_bq">Our talk explored the issues of di...

Computer Vision

Conference 2016

[CFP] Call for Papers ICDF2C 2016

1 minute read

8th International Conference on Digital Forensics and Cyber Crime<div class="separator" style="clear: both; text-align: center;"></div>Location: ...

Conferences

[CFP] WSDF 2017 - extended deadline

3 minute read

Submission Deadline Extended to May 1st, 2017 Call for Papers The 10th International Workshop on Digital Forensics (WSDF 2017) https://www.ares-conference...

Conferences 2012

InfoSecurity Russia 2012

less than 1 minute read

Last week, Pavel and I gave an invited talk at InfoSecurity Russia 2012. From Digital FIRE:<blockquote class="tr_bq">Our talk explored the issues of di...

LawTech Europe Congress 2012

less than 1 minute read

LawTech Europe Congress 201212 November, 2012Prague, Czech Republic“Over the past few years there have been huge advances in Electronic Evidence support and ...

CFP: IRISSCERT Cyber Crime Conference

less than 1 minute read

The IRISSCERT Cyber Crime Conference will be held November 22, 2012 in Dublin, Ireland. More information can be found here.They are currently running a call ...

ICTTF - Cyber Threat Summit 2012

less than 1 minute read

The ICTTF Cyber Threat Summit will be held in Dublin on September 20-21, 2012. Have a look at this years agenda. You can get a 10% registratio...

ICDF2C 2012

less than 1 minute read

The 4th International Conference on Digital Forensics and Cyber Crime (ICDF2C), hosted at Purdue University, will be held from October 24-26, 2012.Website: h...

DFRWS 2009 - Montreal

less than 1 minute read

Our group in the Centre for Cybercrime Investigation gave a presentation at the Digital Forensic Workshop 2009. The submitted paper can be found here. Also a...

Conferences 2013

[CFP] ICDF2C 2013 Note of Change of Date

less than 1 minute read

Please note, the dates for the ICDF2C 2013 have slightly changed.Fifth International Conference on Digital Forensics and Cyber Crime - ICDF2C 201325-27 Septe...

Conference: SANS DFIR Summit 2013

1 minute read

SANS DFIR Summit 2013 - Call For Speakers - Now Open<div class="summary" style="border: 0px; font-family: Arial, Helvetica, 'Nimbus Sans L', sans-serif; f...

Conferences 2014

[CFP] ICDF2C 2014 Submissions Due

less than 1 minute read

Just a quick reminder that submissions for the 6th International Conference on Digital Forensics & Cyber Crime are due THIS FRIDAY (May 16, 2014). See su...

[CFP] World Forensic Festival 2014

less than 1 minute read

World Forensic Festival, Oct. 12 - 18, 2014 in Seoul, South Korea.Abstract submission due: May 31, 2014Program site: http://wff2014korea.org/Scholarships and...

[CFP] ICDF2C 2014

less than 1 minute read

Don’t forget about the 6th International Conference on Digital Forensics & Cyber Crime, September 18–20, 2014 in New Haven, Connecticut, United States.Th...

[CFP] DFRWS EU 2014

less than 1 minute read

From http://dfrws.org/2014eu/cfp.shtmlThe DFRWS-EU Conference that will be held in Amsterdam on the 7-9 May 2014.Important DatesSubmission deadline: December...

Conferences 2015

[CFP] ICDF2C Submission Deadline Extended

less than 1 minute read

Hello everyone! The ICDF2C Call for Papers has been extended to April 13, 2015. Hurry an submit! See you in Seoul!http://d-forensics.org/2015/show/cf-papers

[CFP] ICDF2C Submissions Due 30 March

less than 1 minute read

Just a reminder that submissions for ICDF2C are due on the 30th of March, 2015 (next week).<div class="separator" style="clear: both; text-align: center;"...

[CFP] SADFE-2015

6 minute read

Call for Papers SADFE-2015Tenth International Conference on Systematic Approaches to Digital Forensics Engineering September 30 – October 2, 2015, Malaga, S...

2015 デジタル・フォレンジックとサイバー犯罪に係る国際会議・韓国デジタル・フォレンジック学会年次大会 論文募集

less than 1 minute read

2015 デジタル・フォレンジックとサイバー犯罪に係る国際会議・韓国デジタル・フォレンジック学会年次大会 論文募集 Please note: all submissions and presentations must be in English. デジタル・フォレンジックとサイバー犯罪に係る国際会議(The I...

ICDF2C, KDFS 2015 论文征文公告

less than 1 minute read

ICDF2C, KDFS 2015 论文征文公告 Please note: all submissions and presentations must be in English. 国际数字取证、网络犯罪会议(ICDF2C)是旨在促进数字取证及网络犯罪侦查的发展,推动全世界的优秀研究人员、实务人员、教...

[CFP] DFRWS US 2015

1 minute read

Just a quick reminder that the DFRWS US 2015 is coming up soon!From DFRWS.org:DFRWS 2015 will be held on  August 9-13, 2015 at the Hyatt Regency Philadelphia...

[CFP] ICDF2C 2015

4 minute read

Call for papers for the 7th International Conference on Digital Forensics and Cyber Crime (ICDF2C) Conferece Dates: October 6 - 8, 2015 Location: Seoul, Sou...

DFRWS 2015 EU - Call for Forensic Challenge

1 minute read

Digital Forensic Research Workshop 2015 EU is currently calling for Forensic Challenge proposals.See the CFCDeadline: January 31st, 2015The DFRWS Conference ...

Conferences 2016

[CFP] ICDF2C Submission date extended!

4 minute read

ICDF2C 2016 in New York has extended its call for papers until April 25th! Call for papers for the 8th International Conference on Digital Forensics and Cyb...

[CFP] DFRWS EU 2016

3 minute read

The DFRWS EU 2016 conference will be held in Lausanne, Switzerland from March 30th to April 1st, 2016.<div class="separator" style="clear: both; text-alig...

Conferences 2017

[CFP] WSDF 2017 - extended deadline

3 minute read

Submission Deadline Extended to May 1st, 2017 Call for Papers The 10th International Workshop on Digital Forensics (WSDF 2017) https://www.ares-conference...

Crime

Predictive Policing and Online Crime

1 minute read

FutureCrimes.com just passed on the single Sci-fi policing: predicting crime before it occurs. Crime modeling used by the LAPD appears to have contributed t...

Critical Systems

Cryptography

Seoul Tech Society Crypto Event

less than 1 minute read

On June 24th, Seoul Tech Society held an ‘introduction to cryptography’ event. First, Artem Lenskiy gave an overview of how symmetric and asymmetric encrypti...

Cyber Conflict

A Proposal for Cyber Peacekeeping (CPK)

1 minute read

After a year of collaborative effort we submitted a paper about Cyber Peacekeeping (CPK) to ICDF2C 2015 (http://d-forensics.org/) and have just learned about...

Cyber Safety

A Proposal for Cyber Peacekeeping (CPK)

1 minute read

After a year of collaborative effort we submitted a paper about Cyber Peacekeeping (CPK) to ICDF2C 2015 (http://d-forensics.org/) and have just learned about...

Cyber Warfare

A Proposal for Cyber Peacekeeping (CPK)

1 minute read

After a year of collaborative effort we submitted a paper about Cyber Peacekeeping (CPK) to ICDF2C 2015 (http://d-forensics.org/) and have just learned about...

Cybercrime

Cybersecurity Tips for Business Travelers

2 minute read

I recently received an email from someone claiming to be from CNN, wanting to do a segment on cyber security for business travelers. They asked for some bul...

Cybercrime Technologies

About Cybercrime Technologies

less than 1 minute read

Welcome to Cybercrime Technologies. This blog is devoted to research and development in the area of Cybercrime and Digital Forensic Investigations. It will b...

Cybercrime Technologies Philosophy

1 minute read

Cybercrime Technologies was founded on the principal that the level of competent, quality digital investigations should not be based on the budget of the pra...

Cybersecurity

A Proposal for Cyber Peacekeeping (CPK)

1 minute read

After a year of collaborative effort we submitted a paper about Cyber Peacekeeping (CPK) to ICDF2C 2015 (http://d-forensics.org/) and have just learned about...

Cybersecurity Tips for Business Travelers

2 minute read

I recently received an email from someone claiming to be from CNN, wanting to do a segment on cyber security for business travelers. They asked for some bul...

DFRWS

DFRWS IoT Forensic Challenge

less than 1 minute read

The Legal Informatics and Forensic Science (LIFS) Institute at Hallym University helped to create the the 2017-2018 Digital Forensic Research Workshop (DFR...

[CFP] DFRWS EU 2016

3 minute read

The DFRWS EU 2016 conference will be held in Lausanne, Switzerland from March 30th to April 1st, 2016.<div class="separator" style="clear: both; text-alig...

Data Recovery

Digital Crime

Digital Forensic and Forensic Sciences

Digital Forensics

Warning to Forensic Investigators: USB KILLER

less than 1 minute read

This single is informational for digital forensic investigators and first responders. Be aware of the ‘USB Killer’. Very basically, it’s a USB device that co...

[CFP] ICDF2C 2015

4 minute read

Call for papers for the 7th International Conference on Digital Forensics and Cyber Crime (ICDF2C) Conferece Dates: October 6 - 8, 2015 Location: Seoul, Sou...

[How To] Installing LIBEWF in Ubuntu Trusty

less than 1 minute read

Installing LIBEWF is normally straightforward. Usually the most difficult part is remembering which packages are required for the dependencies. When running ...

Indicators of Anti-Forensics

1 minute read

Project: Indicators of Anti-Forensics (IoAF)Purpose: Digital forensic triage for anti-forensic activitiesStatus: ActiveLicense: GNU GPLv3Developer(s): KITRI’...

Convert EnCase hash sets to md5sum

1 minute read

I managed to get a hold of a list of known-bad hashes to use in an experiment. The hashes, however, were in EnCase “.hash” format.<div></div><...

Digital Investigation

Discussion

[How to] GPG and Signing Data

1 minute read

GNU Privacy Guard (GPG) uses public and private keys to secure communications (public-key cryptography). Many people use it to encrypt their email or other d...

Warning to Forensic Investigators: USB KILLER

less than 1 minute read

This single is informational for digital forensic investigators and first responders. Be aware of the ‘USB Killer’. Very basically, it’s a USB device that co...

Ashley Madison Data and Ethical Use

3 minute read

On August 19th, the Impact Team released data of millions of alleged Ashley Madison users. Ashley Madison is a type of social networking website that promote...

What is your password?

less than 1 minute read

Jimmy Kimmel, a U.S. talk show host, commented on U.S. cyber security after the 2014 Sony attacks. To humorously demonstrate the problem, they employed a bit...

Cybersecurity and Challenges to Democracy

3 minute read

South Korea’s democracy can only be described as… developing. In the late 1970s, after the assassination of Military Dictator Park Chung-hee (who Koreans oft...

What is Cybersecurity?

1 minute read

Last week, a number of Korean organizations fell victim to cyber attacks. This has prompted discussions about cybersecurity in Korea, and while following ...

Social Media and Intelligence Gathering

6 minute read

As seen on DigitalFIREOnline social media has changed the way many people, businesses and even governments interact with each other. Because of Twitter’s pop...

Future Crimes Ted Talk

less than 1 minute read

[Update] See Bruce Schneier’s responseOur friends at FutureCrimes.com recently had a good Ted talk about technology, crime and a potential way to fight crime...

Predictive Policing and Online Crime

1 minute read

FutureCrimes.com just passed on the single Sci-fi policing: predicting crime before it occurs. Crime modeling used by the LAPD appears to have contributed t...

Don't do this

Education

Cybersecurity Tips for Business Travelers

2 minute read

I recently received an email from someone claiming to be from CNN, wanting to do a segment on cyber security for business travelers. They asked for some bul...

What is Cybersecurity?

1 minute read

Last week, a number of Korean organizations fell victim to cyber attacks. This has prompted discussions about cybersecurity in Korea, and while following ...

Digital Forensics Summer School

less than 1 minute read

The UCD Centre for Cybersecurity and Cybercrime Investigation will be hosting a Digital Forensic Summer School for two weeks at the end of August 2012. ...

Encryption

[How to] GPG and Signing Data

1 minute read

GNU Privacy Guard (GPG) uses public and private keys to secure communications (public-key cryptography). Many people use it to encrypt their email or other d...

Seoul Tech Society Crypto Event

less than 1 minute read

On June 24th, Seoul Tech Society held an ‘introduction to cryptography’ event. First, Artem Lenskiy gave an overview of how symmetric and asymmetric encrypti...

GPG Key Signing Party in Seoul 2015/06/24

less than 1 minute read

Seoul Tech Society is having an introduction to Public Key Infrastructure (PKI) Wednesday, June 24th at D.CAMP in Seoul. We will give an introduction to PKI...

Forensic Acquisition

Forensic Challenge 2014

Formal Methods

Fuzzy Hashing

Another SDHASH Test with Picture Files

less than 1 minute read

After the last SDHASH test showed that fuzzy hashing on multiple sizes of the same picture files did not appear to work well. I decided to try...

GPG

[How to] GPG and Signing Data

1 minute read

GNU Privacy Guard (GPG) uses public and private keys to secure communications (public-key cryptography). Many people use it to encrypt their email or other d...

GPG Key Signing Party in Seoul 2015/06/24

less than 1 minute read

Seoul Tech Society is having an introduction to Public Key Infrastructure (PKI) Wednesday, June 24th at D.CAMP in Seoul. We will give an introduction to PKI...

Goldfish

Goldfish

less than 1 minute read

Project: Goldfish<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue...

FireWire DMA Attacks for Memory Acquisition

less than 1 minute read

Firewire exploits that can be used to dump, or even alter a target machine’s RAM.http://www.hermann-uwe.de/blog/physical-memory-attacks-via-firewire-dma-part...

Hashing

Convert EnCase hash sets to md5sum

1 minute read

I managed to get a hold of a list of known-bad hashes to use in an experiment. The hashes, however, were in EnCase “.hash” format.<div></div><...

How To

How to

HowTo

[How to] GPG and Signing Data

1 minute read

GNU Privacy Guard (GPG) uses public and private keys to secure communications (public-key cryptography). Many people use it to encrypt their email or other d...

[How-To] Installing thc Hydra in Ubuntu

1 minute read

The steps below are how to easily install thc Hydra in Ubuntu with the majority of required libraries for common tasks. Hydra is a pretty well-known remote a...

[How To] Installing LIBEWF in Ubuntu Trusty

less than 1 minute read

Installing LIBEWF is normally straightforward. Usually the most difficult part is remembering which packages are required for the dependencies. When running ...

[How To] Easy Install TexStudio on Ubuntu

less than 1 minute read

I mess around with the internals of my operating systems a lot. This means that every few months I need to re-install my operating system, which, lately, is ...

Installing Cinnamon 2.0 on Linux Mint 14

1 minute read

With only a few weeks (hopefully) until Linux Mint 16 is released, I have been installing different software that I may want to start using. With all my data...

[How to] Install pHash on Ubuntu

less than 1 minute read

pHash is an open source software library released under the GPLv3 license that implements several perceptual hashing algorithms, and provides a C-like API to...

Another SDHASH Test with Picture Files

less than 1 minute read

After the last SDHASH test showed that fuzzy hashing on multiple sizes of the same picture files did not appear to work well. I decided to try...

Installing Log2Timeline on Ubuntu 12.04

less than 1 minute read

The maintainers of log2timeline have yet to set up a repository for Ubuntu Precise (12.04). Here are the required packages needed to get most of the function...

ZFS and NFS for Forensic Storage Servers

3 minute read

We’ve been looking at different storage solutions to act as storage servers for forensic images, and some extracted data. Essentially we have a server with e...

Installing OCFA 2.3.X with FIVES

2 minute read

In this single we will be installing OCFA 2.3.0 rc4 on Debian Squeeze (6)I will be following the documentation from: http://sourceforge.net/apps/trac/ocfa/wi...

Building FIVES Porndetect Image and Video

1 minute read

Installation of FIVES Porndetect was relatively painless on Debian Squeeze (Lenny is a bit of a pain).First get the F_PORNDETECT.doc from the FIVES portal. T...

Converting Parallels Disks to Raw on OS X

1 minute read

Update: See the forensic focus article: http://articles.forensicfocus.com/2012/07/05/parallels-hard-drive-image-converting-for-analysis/Update: I have had pr...

Video Preview from Command Line with ffmpeg

less than 1 minute read

Earlier I singleed about creating an animated preview gif from a given video. When using that method with a file list, ffmpeg would treat the file name as a ...

CarvFS on Mac OSx

1 minute read

A while ago I briefly used CarvFS on a linux system for testing. It was nice. Zero-storage carving can come in handy, especially when you are dealing with li...

RE: Read-Only Loopback to Physical Disk

2 minute read

A reader sent a very informative email in reply to this single about Read-Only Loopback Devices.http://www.denisfrati.it/pdf/Linux_for_computer_forensic_inve...

How to detect when OCFA is done processing

1 minute read

As emailed to be by Jochen:I think it is possible to detect completion of the process, even if it is not that simple, due to the distributed nature of OCFA. ...

REAPER SVN Access

less than 1 minute read

Instructions for using SVN to get the newest version of the REAPER Project:These instructions are for SVN from a Linux command line, and specifically Debian....

Read-Only Loopback to Physical Disk

1 minute read

I have been testing file carving to try to preview the contents of a drive before imaging. File carving takes a long, long time. A faster solution (I think) ...

PostgreSql Problems on Debian

less than 1 minute read

In Debian 5 when installing PostgreSQL - if /var/singlegresql/8.3/main is not created, and the conf files are not available - use the following command:pg_cr...

Even more Random links: psql

less than 1 minute read

PSQL on Machttp://www.entropy.ch/software/macosx/singlegresql/Enable psql remote access over tcp/iphttp://www.cyberciti.biz/tips/singlegres-allow-remote-acce...

Creating and Modifying a User in PSQL

less than 1 minute read

When installing OcfaArch on Debain 5, the installer failed to create the ‘ocfa’ user in singlegresql (psql). The error I get is “Warning: no local database f...

OCFA Installation - Creating the Hash Sets

1 minute read

Maybe I am just a novice, but I had a hard time figuring out the inputs for the creation of the hash database for the OCFA digest module. This step can be fo...

pt.1 OCFA Installation - Introduction/OS

3 minute read

The installation document for the Open Computer Forensic Architecture was mostly accurate. However, I ran into some issues. Posts labeled OCFAInstall are sup...

Human Exploitation

I18N/L10N

Project ATOM

less than 1 minute read

Project: ATOM<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue', H...

ICDF2C

[CFP] Call for Papers ICDF2C 2016

1 minute read

8th International Conference on Digital Forensics and Cyber Crime<div class="separator" style="clear: both; text-align: center;"></div>Location: ...

ICDF2C Revised Draft Program Released

less than 1 minute read

7th International Conference on Digital Forensics and Cyber Crime (ICDF2C) updated program is now available here: http://bit.ly/1LsJpvM<div class="separat...

A Proposal for Cyber Peacekeeping (CPK)

1 minute read

After a year of collaborative effort we submitted a paper about Cyber Peacekeeping (CPK) to ICDF2C 2015 (http://d-forensics.org/) and have just learned about...

Infosec

[How to] GPG and Signing Data

1 minute read

GNU Privacy Guard (GPG) uses public and private keys to secure communications (public-key cryptography). Many people use it to encrypt their email or other d...

사물인터넷(IoT) 디지털 수사 관련 전액장학금 지원 석/박사 직위 공모

less than 1 minute read

한림대학교 국제학부의 정보법과학전공에서는 현재 석사, 박사, 그리고 박사후과정생을 대상으로 정규직 연구원을 모집하고 있습니다. 해당 직위는 사물인터넷(IoT) 디지털 포렌식 수사에 관련된 연구를 담당하므로, 다음과 같은 자격을 요합니다. <ul><li>프로그래...

[CFP] CLOUDFOR extended submission deadline

2 minute read

CLOUDFOR 2016: Workshop on Cloud ForensicsIn conjunction with the 9th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), Tongji Universi...

Honeypot Fun

1 minute read

At the Legal Informatics and Forensic Science Institute, we are preparing to do some research on IoT smart homes. Part of that is setting up a slightly-less-...

ICDF2C Revised Draft Program Released

less than 1 minute read

7th International Conference on Digital Forensics and Cyber Crime (ICDF2C) updated program is now available here: http://bit.ly/1LsJpvM<div class="separat...

Ashley Madison Data and Ethical Use

3 minute read

On August 19th, the Impact Team released data of millions of alleged Ashley Madison users. Ashley Madison is a type of social networking website that promote...

Intelligence

[How to] GPG and Signing Data

1 minute read

GNU Privacy Guard (GPG) uses public and private keys to secure communications (public-key cryptography). Many people use it to encrypt their email or other d...

Cybersecurity and Challenges to Democracy

3 minute read

South Korea’s democracy can only be described as… developing. In the late 1970s, after the assassination of Military Dictator Park Chung-hee (who Koreans oft...

Social Media and Intelligence Gathering

6 minute read

As seen on DigitalFIREOnline social media has changed the way many people, businesses and even governments interact with each other. Because of Twitter’s pop...

International Communication

Cybersecurity and Challenges to Democracy

3 minute read

South Korea’s democracy can only be described as… developing. In the late 1970s, after the assassination of Military Dictator Park Chung-hee (who Koreans oft...

Future Crimes Ted Talk

less than 1 minute read

[Update] See Bruce Schneier’s responseOur friends at FutureCrimes.com recently had a good Ted talk about technology, crime and a potential way to fight crime...

Investigation

JDFSL

LIFS

Law

Cybersecurity and Challenges to Democracy

3 minute read

South Korea’s democracy can only be described as… developing. In the late 1970s, after the assassination of Military Dictator Park Chung-hee (who Koreans oft...

LiME

Linux

Live Data Forensics

Malware

Meetup

Seoul Tech Society Crypto Event

less than 1 minute read

On June 24th, Seoul Tech Society held an ‘introduction to cryptography’ event. First, Artem Lenskiy gave an overview of how symmetric and asymmetric encrypti...

GPG Key Signing Party in Seoul 2015/06/24

less than 1 minute read

Seoul Tech Society is having an introduction to Public Key Infrastructure (PKI) Wednesday, June 24th at D.CAMP in Seoul. We will give an introduction to PKI...

Memory Forensics

Goldfish

less than 1 minute read

Project: Goldfish<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue...

FireWire DMA Attacks for Memory Acquisition

less than 1 minute read

Firewire exploits that can be used to dump, or even alter a target machine’s RAM.http://www.hermann-uwe.de/blog/physical-memory-attacks-via-firewire-dma-part...

Memory analysis

Metadata

Using Autopsy 4 to export file metadata

less than 1 minute read

Autopsy 4 is a very powerful digital forensic investigation tool. Today, we are going to extract file and meta-data from a disk image (mobile phone) to use i...

National Security

When National Security Turns Against You

2 minute read

Opinion originally published by Korea Times Last Friday a ransomware virus named WannaCry began spreading across the Internet. By Sunday, it had infected co...

National security

Network Forensics

News

OCR

OS X

Goldfish

less than 1 minute read

Project: Goldfish<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue...

Opinion

Optical character recognition

PKI

GPG Key Signing Party in Seoul 2015/06/24

less than 1 minute read

Seoul Tech Society is having an introduction to Public Key Infrastructure (PKI) Wednesday, June 24th at D.CAMP in Seoul. We will give an introduction to PKI...

Password Cracking

[How-To] Installing thc Hydra in Ubuntu

1 minute read

The steps below are how to easily install thc Hydra in Ubuntu with the majority of required libraries for common tasks. Hydra is a pretty well-known remote a...

PRNewsWire Quotes CybercrimeTech

less than 1 minute read

PRNewsWire, when writing about Passware’s new LUKS GPU-assisted brute force cracker, referenced our work on LUKS password cracking with John the Ripper.<d...

Perceptual hashing

[How to] Install pHash on Ubuntu

less than 1 minute read

pHash is an open source software library released under the GPLv3 license that implements several perceptual hashing algorithms, and provides a C-like API to...

Planning

Policing

Predictive Policing and Online Crime

1 minute read

FutureCrimes.com just passed on the single Sci-fi policing: predicting crime before it occurs. Crime modeling used by the LAPD appears to have contributed t...

Projects

Indicators of Anti-Forensics

1 minute read

Project: Indicators of Anti-Forensics (IoAF)Purpose: Digital forensic triage for anti-forensic activitiesStatus: ActiveLicense: GNU GPLv3Developer(s): KITRI’...

Project ATOM

less than 1 minute read

Project: ATOM<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue', H...

Automated Network Triage (ANT) / Profiler

less than 1 minute read

Project: Automated Network Triage (ANT) / Profiler<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', Hel...

Goldfish

less than 1 minute read

Project: Goldfish<div class="p1" style="background-color: white; color: #333333; font-family: 'Helvetica Neue Light', HelveticaNeue-Light, 'Helvetica Neue...

REAPER Preview

less than 1 minute read

Project: Rapid Evidence Acquisition Project for Event Reconstruction (REAPER) Preview<div class="p1">Purpose: A forensic boot CD that quickly and autom...

Public security

When National Security Turns Against You

2 minute read

Opinion originally published by Korea Times Last Friday a ransomware virus named WannaCry began spreading across the Internet. By Sunday, it had infected co...

REAPER

REAPER Preview

less than 1 minute read

Project: Rapid Evidence Acquisition Project for Event Reconstruction (REAPER) Preview<div class="p1">Purpose: A forensic boot CD that quickly and autom...

REAPERlive Change Log - 7 Jan 2010

less than 1 minute read

Change Log - 7 Jan 2010REAPERliveMajor Revision-Remove need for 2 drives.-Temp remove OCFA processing. -Add Ability to partition REAPERlive storage drive aut...

REAPERlive Major Revision in Progress

1 minute read

REAPERlive is being revamped. An effort to clean up and standardize a lot of the code is going on. This first part of the project will allow REAPERlive to:1)...

REAPER SVN Access

less than 1 minute read

Instructions for using SVN to get the newest version of the REAPER Project:These instructions are for SVN from a Linux command line, and specifically Debian....

REAPER Preview

1 minute read

Throughout the time I have been developing REAPER, many people in more developed countries have expressed a need for a type of forensic preview ability. Mayb...

REAPER Logo

less than 1 minute read

Logo design by Laura Small and Joshua James.Digital artwork by Laura Small.The REAPER logo by Joshua James is licensed under a Creative Commons Attribution-...

REAPERPreview

REAPER Preview

less than 1 minute read

Project: Rapid Evidence Acquisition Project for Event Reconstruction (REAPER) Preview<div class="p1">Purpose: A forensic boot CD that quickly and autom...

Debian Live X Only

less than 1 minute read

Looking for a lighter way to run REAPER Preview, we are looking into an X only kiosk-type implementation, al la:http://jadoba.net/kiosks/firefox/Also looking...

Profile Based Digital Forensic Preview

2 minute read

The newest build of REAPER Preview (officially Alpha 2) includes quite a few changes, but one that I am especially excited about is Profile Based Preivew. Fi...

REAPER Preview Alpha 2 changelog

less than 1 minute read

Gearing up for the official Alpha 2 release of REAPER Preview here is the change log and feature list:Back-end:<ul><li>REAPER Preview no longer l...

REAPER Preview POC Mentioned

less than 1 minute read

The REAPER Preview Proof of Concept was mentioned on nukeitdotorg!Also an updated version of REAPERlive that can be imaged directly to any USB hard drive (wi...

REAPER SVN Access

less than 1 minute read

Instructions for using SVN to get the newest version of the REAPER Project:These instructions are for SVN from a Linux command line, and specifically Debian....

REAPER Preview Setup and Configuration

3 minute read

(Command line instructions)6 Nov. 2010REAPERlive Preview:Extracting a working directoryOnce you have downloaded the REAPERlivePreview build pa...

REAPERlive Preview POC Released

less than 1 minute read

REAPERlive Preview has been released as a proof of concept. The ISO is available for download at sorceforge. Currently only images are displayed, but lists o...

REAPER Preview

1 minute read

Throughout the time I have been developing REAPER, many people in more developed countries have expressed a need for a type of forensic preview ability. Mayb...

REAPER Logo

less than 1 minute read

Logo design by Laura Small and Joshua James.Digital artwork by Laura Small.The REAPER logo by Joshua James is licensed under a Creative Commons Attribution-...

Ransomware

When National Security Turns Against You

2 minute read

Opinion originally published by Korea Times Last Friday a ransomware virus named WannaCry began spreading across the Internet. By Sunday, it had infected co...

Research

사물인터넷(IoT) 디지털 수사 관련 전액장학금 지원 석/박사 직위 공모

less than 1 minute read

한림대학교 국제학부의 정보법과학전공에서는 현재 석사, 박사, 그리고 박사후과정생을 대상으로 정규직 연구원을 모집하고 있습니다. 해당 직위는 사물인터넷(IoT) 디지털 포렌식 수사에 관련된 연구를 담당하므로, 다음과 같은 자격을 요합니다. <ul><li>프로그래...

Ashley Madison Data and Ethical Use

3 minute read

On August 19th, the Impact Team released data of millions of alleged Ashley Madison users. Ashley Madison is a type of social networking website that promote...

Survey About Crime Investigation Priority

less than 1 minute read

<div class="MsoNormal">This Crime Investigation Priority survey is being conducted by a researcher at University College Dublin. The purpose is to dire...

SMS alerts

SMS spam

SeoulTechSoc

Seoul Tech Society Crypto Event

less than 1 minute read

On June 24th, Seoul Tech Society held an ‘introduction to cryptography’ event. First, Artem Lenskiy gave an overview of how symmetric and asymmetric encrypti...

Social Engineering

What is your password?

less than 1 minute read

Jimmy Kimmel, a U.S. talk show host, commented on U.S. cyber security after the 2014 Sony attacks. To humorously demonstrate the problem, they employed a bit...

Social Media

Social Media and Intelligence Gathering

6 minute read

As seen on DigitalFIREOnline social media has changed the way many people, businesses and even governments interact with each other. Because of Twitter’s pop...

South Korea

Standards

Storage

ZFS and NFS for Forensic Storage Servers

3 minute read

We’ve been looking at different storage solutions to act as storage servers for forensic images, and some extracted data. Essentially we have a server with e...

Survey

Survey About Crime Investigation Priority

less than 1 minute read

<div class="MsoNormal">This Crime Investigation Priority survey is being conducted by a researcher at University College Dublin. The purpose is to dire...

Thanks!

PRNewsWire Quotes CybercrimeTech

less than 1 minute read

PRNewsWire, when writing about Passware’s new LUKS GPU-assisted brute force cracker, referenced our work on LUKS password cracking with John the Ripper.<d...

Convert EnCase hash sets to md5sum

1 minute read

I managed to get a hold of a list of known-bad hashes to use in an experiment. The hashes, however, were in EnCase “.hash” format.<div></div><...

CybercrimeTech Interviewed!: Baby Got Bactria

less than 1 minute read

Since the single went up in the middle of travelling for conferences and Police training, I didn’t get a chance to thank the very interesting history blog Ba...

The Sleuth Kit

Threats

[How-To] Installing thc Hydra in Ubuntu

1 minute read

The steps below are how to easily install thc Hydra in Ubuntu with the majority of required libraries for common tasks. Hydra is a pretty well-known remote a...

Volatility

WannaCry

When National Security Turns Against You

2 minute read

Opinion originally published by Korea Times Last Friday a ransomware virus named WannaCry began spreading across the Internet. By Sunday, it had infected co...

Webinar

android

anti-forensics

Indicators of Anti-Forensics

1 minute read

Project: Indicators of Anti-Forensics (IoAF)Purpose: Digital forensic triage for anti-forensic activitiesStatus: ActiveLicense: GNU GPLv3Developer(s): KITRI’...

blogging

Switching to Jekyll

1 minute read

I’ve been on Blogger since 2008. It is very easy to use. Since 2008, nothing has really changed about it, save for an exciting -slight- editor UI change a fe...

cyberlaw

사물인터넷(IoT) 디지털 수사 관련 전액장학금 지원 석/박사 직위 공모

less than 1 minute read

한림대학교 국제학부의 정보법과학전공에서는 현재 석사, 박사, 그리고 박사후과정생을 대상으로 정규직 연구원을 모집하고 있습니다. 해당 직위는 사물인터넷(IoT) 디지털 포렌식 수사에 관련된 연구를 담당하므로, 다음과 같은 자격을 요합니다. <ul><li>프로그래...

cybersecurity

dfi

dfir

Password Cracking Test Data

less than 1 minute read

Here are some files to test your password cracking skills. All of them can be done in less than a few hours with CPU-based cracking. You can download the fil...

DFRWS IoT Forensic Challenge

less than 1 minute read

The Legal Informatics and Forensic Science (LIFS) Institute at Hallym University helped to create the the 2017-2018 Digital Forensic Research Workshop (DFR...

Using Autopsy 4 to export file metadata

less than 1 minute read

Autopsy 4 is a very powerful digital forensic investigation tool. Today, we are going to extract file and meta-data from a disk image (mobile phone) to use i...

[CFP] WSDF 2017 - extended deadline

3 minute read

Submission Deadline Extended to May 1st, 2017 Call for Papers The 10th International Workshop on Digital Forensics (WSDF 2017) https://www.ares-conference...

Warning to Forensic Investigators: USB KILLER

less than 1 minute read

This single is informational for digital forensic investigators and first responders. Be aware of the ‘USB Killer’. Very basically, it’s a USB device that co...

사물인터넷(IoT) 디지털 수사 관련 전액장학금 지원 석/박사 직위 공모

less than 1 minute read

한림대학교 국제학부의 정보법과학전공에서는 현재 석사, 박사, 그리고 박사후과정생을 대상으로 정규직 연구원을 모집하고 있습니다. 해당 직위는 사물인터넷(IoT) 디지털 포렌식 수사에 관련된 연구를 담당하므로, 다음과 같은 자격을 요합니다. <ul><li>프로그래...

[CFP] CLOUDFOR extended submission deadline

2 minute read

CLOUDFOR 2016: Workshop on Cloud ForensicsIn conjunction with the 9th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), Tongji Universi...

ICDF2C Revised Draft Program Released

less than 1 minute read

7th International Conference on Digital Forensics and Cyber Crime (ICDF2C) updated program is now available here: http://bit.ly/1LsJpvM<div class="separat...

[CFP] ICDF2C 2015

4 minute read

Call for papers for the 7th International Conference on Digital Forensics and Cyber Crime (ICDF2C) Conferece Dates: October 6 - 8, 2015 Location: Seoul, Sou...

[How To] Installing LIBEWF in Ubuntu Trusty

less than 1 minute read

Installing LIBEWF is normally straightforward. Usually the most difficult part is remembering which packages are required for the dependencies. When running ...

Indicators of Anti-Forensics

1 minute read

Project: Indicators of Anti-Forensics (IoAF)Purpose: Digital forensic triage for anti-forensic activitiesStatus: ActiveLicense: GNU GPLv3Developer(s): KITRI’...

Convert EnCase hash sets to md5sum

1 minute read

I managed to get a hold of a list of known-bad hashes to use in an experiment. The hashes, however, were in EnCase “.hash” format.<div></div><...

digital forensics

editorial

Ransomware and How to Protect Yourself

3 minute read

Originally Published in Korean at NewsTapa.org Last week a large outbreak of ransomware infected major organizations in over 74 countries, with Russia and t...

emergency messaging

emergency response

fuzzy hashing

honeypot

Honeypot Fun

1 minute read

At the Legal Informatics and Forensic Science Institute, we are preparing to do some research on IoT smart homes. Part of that is setting up a slightly-less-...

howto

incident response

infosec

Password Cracking Test Data

less than 1 minute read

Here are some files to test your password cracking skills. All of them can be done in less than a few hours with CPU-based cracking. You can download the fil...

DFRWS IoT Forensic Challenge

less than 1 minute read

The Legal Informatics and Forensic Science (LIFS) Institute at Hallym University helped to create the the 2017-2018 Digital Forensic Research Workshop (DFR...

When National Security Turns Against You

2 minute read

Opinion originally published by Korea Times Last Friday a ransomware virus named WannaCry began spreading across the Internet. By Sunday, it had infected co...

Ransomware and How to Protect Yourself

3 minute read

Originally Published in Korean at NewsTapa.org Last week a large outbreak of ransomware infected major organizations in over 74 countries, with Russia and t...

Using Autopsy 4 to export file metadata

less than 1 minute read

Autopsy 4 is a very powerful digital forensic investigation tool. Today, we are going to extract file and meta-data from a disk image (mobile phone) to use i...

[CFP] WSDF 2017 - extended deadline

3 minute read

Submission Deadline Extended to May 1st, 2017 Call for Papers The 10th International Workshop on Digital Forensics (WSDF 2017) https://www.ares-conference...

javascript

jekyll

Switching to Jekyll

1 minute read

I’ve been on Blogger since 2008. It is very easy to use. Since 2008, nothing has really changed about it, save for an exciting -slight- editor UI change a fe...

linux

mobile acquisition

platforms

Switching to Jekyll

1 minute read

I’ve been on Blogger since 2008. It is very easy to use. Since 2008, nothing has really changed about it, save for an exciting -slight- editor UI change a fe...

privacy policy

CybercrimeTech Privacy Policy

3 minute read

Privacy is very important to us, and while some information is collected so we can attempt to improve you experience, we want to you know your privacy option...

public awareness

Ransomware and How to Protect Yourself

3 minute read

Originally Published in Korean at NewsTapa.org Last week a large outbreak of ransomware infected major organizations in over 74 countries, with Russia and t...

python

ransomware

Ransomware and How to Protect Yourself

3 minute read

Originally Published in Korean at NewsTapa.org Last week a large outbreak of ransomware infected major organizations in over 74 countries, with Russia and t...

ssdeep

timeline

Using Autopsy 4 to export file metadata

less than 1 minute read

Autopsy 4 is a very powerful digital forensic investigation tool. Today, we are going to extract file and meta-data from a disk image (mobile phone) to use i...

국민안전처