Digital forensic types overview

September 30, 2023

Digital forensics stands as a critical discipline in the contemporary era, where digital interactions and activities permeate every facet of our lives. It operates as a comprehensive field dedicated to the investigation and understanding of various forms of digital activities and the recovery of digital data in a forensically sound...

Computer Forensics and Сybersecurity: What’s the Difference?

February 15, 2023

In today’s post, I will explore the differences between cybersecurity and computer forensics, highlighting the key distinctions between the two as well as which one offers the better career opportunities. Respective Goals: Prevention vs. Reaction Cybersecurity is about prevention. That is stopping potential attacks by securing against attack threats. Think...

Yahoo redirect virus on Mac – what is it all about?

December 14, 2021

Ever since Internet traffic became an extensively monetizable commodity, bad actors have been focused on intercepting it to generate profit. Unsuspecting users’ devices, including computers and smartphones, are on the receiving end of this exploitation. Macs are in the same boat – moreover, they appear to be targeted the most....

Strings on Windows

October 23, 2014

The Many Shapes and Sizes of Strings on Windows Earlier this week I was toying around with the idea of implementing a lnk file parser in the go language. Yes, I occasionally do things like this for fun. Just to get a feel for things, I grabbed the most easily...

Announcing the BETA release of DAMM

September 17, 2014

Announcing the BETA release of DAMM, a FOSS memory analysis platform built on top of Volatility Memory analysis is the new(-ish) big thing in the incident response, malware analysis, digital forensics space for the moment, and so all the cool kids seem to be doing it. While memory analysis is...

What We Have Been Up To: March, April, and May in Review

June 6, 2014

So much has happened and it’s time to let you know what we have been up to these last couple months. Our own Vico Marziale was recently a guest on Forensics Lunch with David Cowan not once, but three times! Forensics Lunch is a weekly webcast featuring digital forensics practitioners...

Forensics Tools – find_times.py

April 23, 2014

Recently, we had the pleasure to join David Cowen on several episodes of his weekly show Forensic Lunch.  In this particular episode on Youtube, we discussed some of our recent research on discovering previously unknown Windows registry values with embedded timestamp information.  As promised, we are releasing our script to...

504ENSICS Releases Digital Forensics Tool: SPOTLIGHT INSPECTOR

October 1, 2013

504ENSICS Labs just released Spotlight Inspector, a free application for computer forensic investigation of Mac OSX computers. Until now, there has never been an effective cross-platform forensics tool for accessing Spotlight internal data from Mac OSX systems – which is where all of the information about files indexed on a...

Automated Volatility Plugin Generation with Dalvik Inspector

May 23, 2013

Introduction In this blog post we will be demonstrating a new feature to the Dalvik Inspector tool, which we are planning on releasing this summer at Black Hat USA. Specifically we have added functionality to the Dalvik Inspector GUI for automatic Volatility plugin creation. To accomplish this, we have developed...