During Citrix Synergy 2017 Remko Weijnen and Geert Braakhekke presented session SYN712: Analysis of a Hack: How to Defend and Protect with Citrix. Although it could be argued that this session was more about hacking and security than protecting Citrix implementations specifically, the information provided was extremely entertaining and informative.
One demo shown during the presentation that intrigued me the most was cloning RFID cards utilizing the ChameleonMini RevG from Kasper Oswald. Remko showed a demonstration utilizing the ChameleonMini to clone hotel key cards, public transportation passes, and even the Citrix Synergy attendee badge. I knew I had to give it a try. Continue reading
Part 1 of this series illustrated my search for the best application to keep forensic case notes and research. Part 2 covered the organization of the notebook and the various section groups, sections, and pages. In this third and final installment I will discuss how Microsoft OneNote integrates with other applications to both store relevant information and be able to retrieve that information later for generating final reports, emails, etc. Continue reading
In Part 1 of this series, I discussed my search for a tool to keep my forensic notes and research organized while providing readability and searchability. I decided on Microsoft OneNote as the ideal solution to fit my needs. In this post, I will show how I have decided to organize my OneNote notebook and the sections that go into it. Continue reading