During Citrix Synergy 2017 Remko Weijnen and Geert Braakhekke presented session SYN712: Analysis of a Hack: How to Defend and Protect with Citrix. Although it could be argued that this session was more about hacking and security than protecting Citrix implementations specifically, the information provided was extremely entertaining and informative.
One demo shown during the presentation that intrigued me the most was cloning RFID cards utilizing the ChameleonMini RevG from Kasper Oswald. Remko showed a demonstration utilizing the ChameleonMini to clone hotel key cards, public transportation passes, and even the Citrix Synergy attendee badge. I knew I had to give it a try. Continue reading
Part 1 of this series illustrated my search for the best application to keep forensic case notes and research. Part 2 covered the organization of the notebook and the various section groups, sections, and pages. In this third and final installment I will discuss how Microsoft OneNote integrates with other applications to both store relevant information and be able to retrieve that information later for generating final reports, emails, etc. Continue reading
In Part 1 of this series, I discussed my search for a tool to keep my forensic notes and research organized while providing readability and searchability. I decided on Microsoft OneNote as the ideal solution to fit my needs. In this post, I will show how I have decided to organize my OneNote notebook and the sections that go into it. Continue reading
Good notes, documentation, and reports are all keys to successful work as a forensic
analyst. In addition, it is also important to be able to quickly locate relevant details in those bodies of work. All three can be accomplished with pen and paper, a word processing application, a digital notes application, an application specifically for case notes, or any combination of the above.
Not being able to read my own handwriting pretty much ruled out pen and paper for me, hence my search for a better tool for my forensic note taking and documentation needs. Continue reading
Handbook of Digital Forensics and Investigation
Editor: Eoghan Casey
I am currently reading Handbook of Digital Forensics and Investigation edited by Eoghan Casey.
The book is divided into two main sections. Part 1 deals with investigative methodology including forensic analysis, electronic discovery, and intrusion investigation. Continue reading
While attending Citrix Synergy 2017 last week the BlueScreenView tool from NirSoft was mentioned as a tool for troubleshooting desktops in a Citrix VDI environment. Although this tool can be helpful for troubleshooting BSOD in both physical and virtual computers it also struck me as a good tool for incident response and digital forensics.
BlueScreenView is a free tool provided by NirSoft and is used to view the contents of the dump file generated when a BSOD occurs. Continue reading
During a recent migration of virtual servers from a XenServer 6.2 pool to a XenServer 6.5 pool severe performance issues were noticed. These issues were most apparent on XenDesktop workstation with client applications that connected to back end SQL servers. Continue reading
I am currently taking the Windows Prefetch class in the Surviving Digital Forensics training series presented by Sumuri.
The class has recently been updated to include the format change of the prefetch files in Windows 10. In addition this weeks episode of the Surviving Digital Forensics podcast talks about the format change of the prefetch files but also talks about NirSoft WinPrefetchView version 1.35 application that can be utilized to decode and analyze Windows 10 prefetch files.
Hardware write blockers are key pieces of equipment for any forensic examiner when acquiring a forensic clone of any data. This is true for analysis of memory cards and USB devices as well.
CRU Inc. offers another hardware write blocker to assist in the acquisition of data from memory cards and USB devices known as the WiebeTech Media WriteBlocker. Continue reading
Previous posts outlined some of the benefits of using VMWare Workstation or other virtualization technology to host not only forensic analysis workstations as well as other workstations for test and validation. One of the advantages of utilizing VMWare Workstation is the ability for the host workstation to share a folder with guest workstations in read only mode.
This feature is especially appealing as a way to directly access and analyze the VMDK files of virtual test and validation workstations by a virtual forensic analysis workstation.
To verify that the VMDK file was not modified while utilizing the Read Only option for shared folders in VMWare Workstation I calculated the hash value of the VMDK file via multiple access methods. The results are shown below. Continue reading