This talk from the 30th Chaos Communication Congress will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted malware. The successful compromise of an ATM can easily result in the loss of several hundred thousand dollars.
The CRU Ditto Forensic FieldStation combines special-purpose computing hardware, capable of fast analysis, and carefully selected duplication of attached hard drive data. It has all of the classic characteristics required for forensic investigations and IT personnel.
University of New Haven Cyber Forensics decided to unbox some expensive digital forensics equipment and record it with Google Glass and a Geo Pro. Everyone has watched unboxing videos - but we have never seen someone unbox digital forensics equipment! Enjoy the write-blockers, forensic duplicators/wipers and the beast F.R.E.D.
Gary Kessler explores the acceptability of digital evidence in court as regards the Federal Rules of Evidence.
A look at the Department of Defense Cyber Crime Center's Digital Forensics Academic Excellence Program.
Dr. Hany Farid, a distinguished professor at Dartmouth College and the "father" of digital image forensics, is an expert on authenticating images.
A technical introduction to digital forensics geared towards fellow geeks who think tinkering with data in hex is fun and interesting.
This is a post-exploitation demonstration with a walk-through of exploiting a Windows machine, getting a copy of the Web server's home page, and then modifying it with an iframe that points to an exploit server.
Here's how to locate the MFT and MFT Mirror from the Volume Boot, using EnCase.
As we start the month of October, we grow closer to the November 2nd, 2010 Challenge submission deadline. The 2010 DC3 Challenge already has over 30 teams with partial and full submissions. With over 11 prizes available this year, make sure to get your submissions in.
Operation Swordphish partners the University of Alabama at Birmingham cybercrime laboratory with the Alabama Department of Public Safety and Alabama District Attorneys Association with the goal of prosecuting state and local cybercrimes.
Armen Keteyian reports on the vast amount of data on photocopier hard drives which store images of every document scanned, copied, or emailed by the machine.
In this NIST Colloquium Series presentation, Dr. Hany Farid discusses the impact that camera manipulation and alteration have caused, focusing on digital tampering and manipulation, techniques for authenticating digital media, and mathematical and computational forensic techniques.
Computer Forensics Expert Steve Burgess explains what's left over when a file is deleted, and what happens when it is created.
Computer Forensics Expert Steve Burgess explains what can and cannot be recovered from different kinds of e-mail programs such as Outlook, Eudora, and Webmail.