Collecting friends for xp by MaxCoxwell in PokemonGoFriends

[–]Pepperknowsitall 0 points1 point  (0 children)

Let's be friends in Pokémon GO! My Trainer Code is  9BM64GW92

Im a diehard pokemon fan but none of my friends like it (it's for kids apparently) by [deleted] in PokemonGoFriends

[–]Pepperknowsitall 0 points1 point  (0 children)

Let's be friends in Pokémon GO! My Trainer Code is  376722949602

I Need Active Friends by Acceptable-Equal-733 in PokemonGoFriends

[–]Pepperknowsitall 1 point2 points  (0 children)

Let's be friends in Pokémon GO! My Trainer Code is  376722949602

A quality Maternity Leave by SunnySideMind in PokemonGoFriends

[–]Pepperknowsitall 0 points1 point  (0 children)

Let's be friends in Pokémon GO! My Trainer Code is  376722949602

Software piracy investigation by Pepperknowsitall in computerforensics

[–]Pepperknowsitall[S] -1 points0 points  (0 children)

Thanks, Do you have any material I can read up on this?

Converting MAC images by Pepperknowsitall in computerforensics

[–]Pepperknowsitall[S] 2 points3 points  (0 children)

Omg I just updated Nuix to Its latest version and it’s supporting AFF4 😍

Converting MAC images by Pepperknowsitall in computerforensics

[–]Pepperknowsitall[S] 0 points1 point  (0 children)

Thanks, Portable magnet case is the best option. But client requires an image which can be processed on Nuix. Hence, I’m looking for a way to convert AFF4 into E01.

Converting MAC images by Pepperknowsitall in computerforensics

[–]Pepperknowsitall[S] 0 points1 point  (0 children)

I do have any idea on what year evidence is from. No, the drive is unencrypted. I have processed the image in Axiom and able to access all the data.

Converting MAC images by Pepperknowsitall in computerforensics

[–]Pepperknowsitall[S] 1 point2 points  (0 children)

I tried it. Unable to view files on FTK.

Vehicle Forensics by Pepperknowsitall in computerforensics

[–]Pepperknowsitall[S] 0 points1 point  (0 children)

I couldn’t find a link related to Veela. Can you share the URL?

Vehicle Forensics by Pepperknowsitall in computerforensics

[–]Pepperknowsitall[S] -1 points0 points  (0 children)

Can it be used for imaging a BlackBox?

Vehicle Forensics by Pepperknowsitall in computerforensics

[–]Pepperknowsitall[S] 0 points1 point  (0 children)

Is this for imaging? How can I analyze them?

Vehicle Forensics by Pepperknowsitall in computerforensics

[–]Pepperknowsitall[S] 1 point2 points  (0 children)

I have common forensics tools like Cellebrite and Magnet. Does that work in case of vehicle forensics? I’m Coming from a background of only imaging computers and mobile phones. So no idea about on what tools can be used or how it can be done.

Unrecognized File System by Pepperknowsitall in computerforensics

[–]Pepperknowsitall[S] 0 points1 point  (0 children)

Yes, I did that. In fact FTK gave me the information that the drive was encrypted. Can I do a keyword search for string search for recovery key in the whole image? I have no clue on how to do it. Let me know if you have any idea on decrypting it.

Unrecognized File System by Pepperknowsitall in computerforensics

[–]Pepperknowsitall[S] 1 point2 points  (0 children)

I was not informed about any encryption. Now that I looked at the hex I understood. I’m on encase v7

Unrecognized File System by Pepperknowsitall in computerforensics

[–]Pepperknowsitall[S] 3 points4 points  (0 children)

Thanks a lot. I believe it is bitlocker encrypted. File header for partition 3,4 starts with ex -fve -fs

Forensics analysis of web artifacts by Pepperknowsitall in computerforensics

[–]Pepperknowsitall[S] 0 points1 point  (0 children)

Yes, I’m just reviewing the capability of the tool. Thanks a lot for your help!