- Видео 111
- Просмотров 65 520
Alexis Brignoni
США
Добавлен 30 янв 2014
Digital forensics and incident response in English and Spanish.
Focus on mobile device forensics both iOS and Android.
Developer or iLEAPP and ALEAPP, tools for parsing mobile device extractions.
Co-host of the Digital Forensics Now Podcast.
Podcast Calendar: tinyurl.com/DFN-Calendar
Focus on mobile device forensics both iOS and Android.
Developer or iLEAPP and ALEAPP, tools for parsing mobile device extractions.
Co-host of the Digital Forensics Now Podcast.
Podcast Calendar: tinyurl.com/DFN-Calendar
iLEAPP 2.0 - Big Changes!
iLEAPP 2.0 for LAVA Support.
- Better organized report folder
- Preparation for new reporting system
- LEAPPs Artifact Viewer Analyzer (LAVA) data structures added
- Better organized report folder
- Preparation for new reporting system
- LEAPPs Artifact Viewer Analyzer (LAVA) data structures added
Просмотров: 575
Видео
MFE 0 - ALEAPP - Image Manager Cache & Glide
Просмотров 1,7 тыс.Год назад
MFE 0 - ALEAPP - Image Manager Cache & Glide
MFE 0 - iLEAPP - Installed Apps - Application State & Grouplistings
Просмотров 987Год назад
MFE 0 - iLEAPP - Installed Apps - Application State & Grouplistings
🎇 Winter Springs 4th of July Fireworks Celebration 🎆
Просмотров 100Год назад
🎇 Winter Springs 4th of July Fireworks Celebration 🎆
The LEAPPs win the Open Source Tool of the Year at the SANS Difference Makers Awards 2022
Просмотров 191Год назад
The LEAPPs win the Open Source Tool of the Year at the SANS Difference Makers Awards 2022
Parsing iOS 15 User Notification Events
Просмотров 5132 года назад
Parsing iOS 15 User Notification Events
Vehicle Digital Forensics - How to access logical files in a QNX partition
Просмотров 4,7 тыс.3 года назад
Vehicle Digital Forensics - How to access logical files in a QNX partition
So you found a python script. Now what?
Просмотров 1,8 тыс.3 года назад
So you found a python script. Now what?
Analisis de dispositivo iOS & Android utilizando iLEAPP & ALEAPP
Просмотров 2,1 тыс.4 года назад
Analisis de dispositivo iOS & Android utilizando iLEAPP & ALEAPP
Decodificar fuentes de datos en Protobuf
Просмотров 4404 года назад
Decodificar fuentes de datos en Protobuf
How to contribute to a Github wiki page
Просмотров 1,3 тыс.4 года назад
How to contribute to a Github wiki page
DFIR parsing of protobuf data in Python
Просмотров 2,2 тыс.4 года назад
DFIR parsing of protobuf data in Python
xLEAPP Timeline generation for the artifact developer
Просмотров 1364 года назад
xLEAPP Timeline generation for the artifact developer
Usage of xLEAPP new features: Module selection & Timeline
Просмотров 2444 года назад
Usage of xLEAPP new features: Module selection & Timeline
after I extracted a folder from apps.img, and I edited it, how to a repack the modified file into it?
Excelente video, Gracias por tu aporte!
Awesome Work!
Ummm ... BFU?
This reminds me of the uproar between deadbox and live imaging of computers back in the day.
Found your podcast through LinkedIn. My goal is to get into cyber crimes in law enforcement. Not sure where to start though 😞. Got my associates in InfoSec this year so far.
Can this be done without the private key in Protonmail??
Scientists believe such a thing could be done with a Quantum computer. 👍
That’s really cool, love your work! Appreciate everything you do for the community 🤘🏼🫶🏻
it's christmas come early!!!!! Exceptional work by the community to make leapps indispensable and often ahead of the paid tools. Can't wait to test LAVA and see the presentation video for devs. Perhaps a new episode of MFE that helps in the understanding of artifacts. congratulations again to brigs and the community
Let’s go!!!
Possible with android?
Where can I find the tool I CATCH.Pls let me know.
I found out about RCS yesterday while texting an android user, it was bamboozling my mind until I figured out what was going on!
Congratulations on your anniversary! 😄 Also, thank you for the shout-out at 32:35! To be honest, RecuperaBit is not really a "new" tool: It is actually almost 8 years old. Today, I would do some things differently in terms of user-friendliness and efficiency. It is also true that other tools perform damaged file system reconstruction, but at the time, I didn't find much in the open-source space for NTFS. If you try the tool, I’d be glad to provide additional information and collect any feedback you have.
Congratulations on your anniversary 🎉
Thank you!
Como ouedo hCer una imagen forensede un telefono
Great video!
Hola como creo la imagen forence de un teléfono Android
Briggsy! Would've been cheaper to catch a cab to my place for a free shower 😂
No kidding. 😂
Muy buen aporte!! Lastimosamente ya no está más disponible la imagen de iOS, sabes donde lo puedo conseguir?
1:00:13 as a mediocre man, I take offense to that generalization!!
Hellooooo
Hi
Hello, I've been unable to find your LinkedIn profile, you posted a really good article a while back and I wanted to go back and read it. Can't find it now 😅 It was about the changes in android security and how they may pose a challenge for us.
U click baited me special agent hahahhahah but i love this vid tnx for the click bait😅🚬😎
A couple classes doesn't create an expert. This is one of the big flaws in most law enforcement digital forensic models. Great forensic examiners are generally 100% focused on their discipline and they have a wide breadth of IT knowledge. It is hard to be good and do this work part-time. In today's world everything is highly specialized and it requires your full attention. You can't be a sworn officer, doing use-of-force training, doing case work, AND also be an expert in digital forensics. Very few people can pull this off and it is a horrible model for law enforcement agencies to follow. The good news, although government moves very slow, there are agencies moving towards full-time digital forensic experts and implement real laboratories with policies, procedures, training plans, quality assurance, etc. The future is regional laboratories as accreditation standards start to become standard and likely mandatory at some point. In addition, small agencies can't possibly afford to hire and retain experts, keep them trained, and implement appropriate policies, procedures, etc. that need to be maintained and updated on regular intervals. It is good to have more conversations about digital forensics and keep moving to improve how government approaches this work.
Promo`SM
Genial. Hay actualización de este video?
La herramienta se actualiza semanalmente pero no he creado un nuevo video de ejemplo como este.
🤣
Thank you! This is awesome!!
the book is Head First Python: A Brain-Friendly Guide, 2nd edition
Oh nice missed you were live from IACIS how awesome
Great advice to build a brand!
Very interesting guys! Thak you.
Glad you enjoyed it! Thank you for watching.
I’m sooooo glad someone else has issues with support other than me, I just thought I was too inexperienced. There’s a certain tool I do not create support tickets for because it’s the least helpful assistance.
I bet I know which one!!
I loved your portion about experts! You're right not many operators. Keep up the good work. I'm a Det interested in the field and trying to get familiar with the terminology. Good job 👍🏽 keep up the good work.
Another great episode, Grandpa Nerd and Heather! Nice points about intent and media origin cases.
Get off my cyber lawn you darn script kiddies. 😂
Congrats Heather on your first program 🎉 It is great that you both are doing Black History Month recognitions!
Thanks Lorie!
Tnx for your time in this area. Much appreciated. The trend is pointing to more and more deep dive question from prosecutor and the defense. Take care!
fun stuff!
Thank you for watching. 😊
So excited for folks to play the CTF!!! Want everyone to learn and have fun.
Thanks for sharing about Sarah’s blog post!
As always, amazing content!
Omg I couldn’t finish watching yesterday because of the puppy and the first thing I heard this morning when I started watching again was about my testimony 😂😂😂
Excelente aporte a la comunidad hispana, Gracias
Hi Alex, do you know how to decrypt a QNX drive? I have a drive out of a BMW that I want to put into another BMW... They're QNX 6.5 and I'm finding out that the drives are encrypted for security purposes. I'm just curious how I would get QNX to unlock the drive so I can swap the drives and allow the NBT to read it.
And I have the password for both drives that I got off the NBT system.
This is amazing!!!
I wonder if you wipe a phone and then ran the ram capture, would there still be artifacts from prior the wipe? Seems like there would be.
I absolutely must try this!
Topic suggestion: procedure for screen recording mobile devices with free tools that holds up in court. I really appreciate your content. Thanks!
Excuse my english, what kind of extraction do we need, magnet acquire is good ?