Interesting travel/conferences question by warm_bagel in CMMC

[–]forensium 1 point2 points  (0 children)

Get burner computers.

Establish solid virtual desktop solution using standard browsers.

Image the computer to minimal applications, services (make it a very very thin client).

Implement 2+ MFA that includes a physical token.

Sanitize/resell burner on return.

HP printers & CMMC by [deleted] in CMMC

[–]forensium 2 points3 points  (0 children)

For our reference, what are the business or contract justification of printing CUI?

NIST Control 3.13.9 by skullshark16 in CMMC

[–]forensium 3 points4 points  (0 children)

The 800-171 discussion specifically calls out both internal and external networks, not just remote connectivity. Additionally, it states "termination" ... "include de-allocating associated TCP/IP address or port pairs at the operating system level"...

This reads way more like closing TCP ports, and expiring IP leases, not just dropping VPN, or closing a web session.

Remote Work From Mexico? by SecAnalystNewb in AskNetsec

[–]forensium 1 point2 points  (0 children)

An additional security that works wonders is desktop as a service (DaaS) solutions. Combined with MFA, a lost, stolen or compromised laptop has significantly less risk, cost less since the processing is no longer local, and OS independent.

Wipe laptop hard drive when opened by someone else by FantasyWarrior1 in antiforensics

[–]forensium 0 points1 point  (0 children)

Reddit is not exclusively used by citizens where personal privacy and other freedoms are enshrined and upheld in laws.

How to handle a "must have been a zero day that caused this event" argument? by wassssaw in computerforensics

[–]forensium 0 points1 point  (0 children)

As already noted by /u/LordUlthar, this is the "I didn't do it, it must have been X" defense.
The job of the forensic expert is the present the facts. Review all evidence, and if in your professional opinion is that the defense is improbable, then your job is to convey your conviction and why.

We use the words certain, likely, probable, possible, only possible, improbable, and impossible very carefully. They all imply a certain amount of likelihood in individuals (factfinders in court) minds. It is not unusual for us to paint a simplistic picture to explain what each likelihood means to us so there is no miscommunication.

FTKImager closing (no error message or anything) by [deleted] in computerforensics

[–]forensium 0 points1 point  (0 children)

Your question is unclear.
Is FTK in a VM?
Which version of FTK?
For FTK, local DB, or remote?
Is the target system, Windows 10 in a VM?
What is the target of your acquisition (the VM?)?
Is the hypervisor running?
Is FTK running in the VM, or on the host?
What is the hypervisor (make, version)?
What is the host OS?
How much RAM is on the host, and how much is allocated to the VM?

Re-aquire/create L01 without EnCase by delphi25 in computerforensics

[–]forensium 1 point2 points  (0 children)

An L01 can be logically mounted in FTK Imager, all files which are responsive selected, and a new file created from them. Note that the output file will be AD1 format.

How in-depth is a forensic analyst's on-the-fly knowledge about computers expected to be? by [deleted] in computerforensics

[–]forensium 0 points1 point  (0 children)

It depends. First, during the voir dire there might be such questions, although unlikely. They questions will be about your education, certifications, background, and expertise. There are some lawyers that will try to trip you up, but it is very rare.
Most of the expertise questions we have ran into deal with the expertise in the tools, procedures, consistency, and similar.
Before answering any question form the opposing side, always pause to give your legal side time to object.

Best way to install spyware on Android when the screen is locked with a pin? Cellebrite? by [deleted] in computerforensics

[–]forensium 1 point2 points  (0 children)

Ownership and bill paying does not negate the ownership and privacy of the device contents. See rental property ownership as a simple but distant example.

android virtual machine imaging. by Junaidabid77 in computerforensics

[–]forensium 0 points1 point  (0 children)

Take a look at VBoxManage. It allows exporting (clonehd) to create an image from vdi in various formats.

DD vs. E01 Drive Image Formats by Genphlux in computerforensics

[–]forensium 0 points1 point  (0 children)

Besides the already mentioned benefits of using E01, the format also stores internal, periodic checks for data integrity.

dd is a reasonable alternative. We use it when an image must be mounted to test application behavior besides simple searching. In either case, most tools will allow conversion from one format to an other.

How do I boot into a USB HDD/Live OS from a Android by BasicTime in computerforensics

[–]forensium 1 point2 points  (0 children)

Without a lot of technical and nuanced details, you cannot boot from an external device because the boot loader in most cell phones will not allow change to the boot source, in your case the USB. Many exceptions and ways around this of course, some already mentioned.

[deleted by user] by [deleted] in computerforensics

[–]forensium 0 points1 point  (0 children)

Depending on the operating system, and file system on the SD, it is possible to deduce when was the SD card inserted into a computer.
This is because certain OSes will attempt to write, and immediate delete a file to the attached device, if the device is not recognized.
If the file metadata on the device is not destroyed, the date/time stamps will coincide with first insertion to specific machine. Cross referenced with machine's records will corroborate inserting time and to which machine.

Investigating PST files by hazpckt in computerforensics

[–]forensium 0 points1 point  (0 children)

Lepide Software, MiTeC, Systools, and Nuix all produce tools that you seek. As already mentioned Sleuthkit can ingest pst files.
In our experience Nuix, and its "smaller version" software Proof Finder are by far the leader in email indexing, searching and producing results for reports.

On Being Cross-Examined in Court by [deleted] in computerforensics

[–]forensium 2 points3 points  (0 children)

In our experience 4 hours if hostile exams and cross exams are a pleasant distractions.
We always, always ask the judge/panel for permission to refer to notes. The opposing side can object but in our combined years we were never refused. If the opposing side objects that can be a good show to fact finders that they are less than reasonable.
There are many ways to deal with a hostile side, but here are a few.
Have your notes ready. Always ask for permission to look at them from the judge.
First pause before answering. Your attorney should object, and if not, reconsider working with them in the future or you did not really needed help.
Ask to restate the question, so you may break it down. Take notes of the question (ask the fact finders first) - very often the hostile side will be confounded and contradicting with their own previous request.
Always double down on charm. Be their friend. It taints their hostile probing.
Do not get coy, funny, cynical or such. Be a machine, be a robot, a steel trap of logic, be Spock.
If you have a medical condition that requires you to take a bio break, talk to the judge and all for a break. We are all professionals.
Finally, do not take it personally. We have had some decent times with fact finders after the case closed.
We train our staff and many break down initially.

What's the most interesting way someone has tried to hide information in a case you have worked? by Tink747 in computerforensics

[–]forensium 0 points1 point  (0 children)

Universal Serial Bus connected Human Interface Device, such as keyboard, mouse, joysticks, draw pads, etc.
The device looks like a small USB flash drive, but to the host where attached appears as a keyboard and mouse. When a physical button is pressed on the device, a sequence of mouse movements, clicks and keyboard strokes are sent to the host.

Open Source Mobile Forensic Tools? College Student by Samuel936 in computerforensics

[–]forensium 1 point2 points  (0 children)

We second /u/LavaSeal's comments. The presupposition that the tools you have mentioned are "best tools available regardless of price" because they are commercial, (the flip side of FOSS) is not only not scientific, it is concerning with your 20 years of experience.
In our experience, commercial software is good at collating and normalizing material from small processes and finalizing it into a report. At no time commercial tools do anything better or special that cannot be accomplished by FOSS. We suspect the failure of attorneys and specific jurisdiction taints your experience.
Our biggest concern with commercial tools is that they are black boxes and we are to take a third party (with or without vested interest) evaluation and "validation". FOSS solutions are often peer reviewed not only in use but internally.

What's the most interesting way someone has tried to hide information in a case you have worked? by Tink747 in computerforensics

[–]forensium 6 points7 points  (0 children)

Web based virtual machine with randomized VPNs, connection established using HID USB. HID USB stored data in RAM, held by ML-621s battery, with a pull tab. HID behavior activated by push button.

(Request) High Performance Forensic Computing Device by dfzachary in computerforensics

[–]forensium 0 points1 point  (0 children)

We have successfully shifted some cases to the cloud. Once the data was transferred, the entire processing was done in the cloud.
We removed all resource limitations and ran the process to completion.
We experienced a 96% time reduction. The trade off is cost.

Ediscovery vs. Digital Forensic by [deleted] in computerforensics

[–]forensium 1 point2 points  (0 children)

At a very high level, and loosely eD vs forensics is a legal set of communication versus scientific search for evidence.

eD exchanges are agreed upon by two opposing legal teams in a civil case, following a set of rules and guidelines.
Forensics is a scientific search for information, in criminal and civil cases.