Tag Archives: Magnet Forensics

Windows Store and Apps Analysis – MUS2019

Windows Store and Apps (APPX) Analysis While attending the Magnet User Summit in Nashville, I had the opportunity to sit in on fascinating talks and labs. One of my favorites was the talk about Universal Windows Apps given by our very own Professor Yogesh Khatri and Jack Farley. As somebody who knew next to nothing […]

Continue reading

Internet of Things at Magnet User Summit 2019

INTRODUCTION During the first week of April, I had the privilege of attending the Magnet User Summit in Nashville, Tennessee. Previously held as a separate training right before or after EnFuse in Las Vegas, the Magnet User Summit is a two day conference put on by Magnet Forensics. It features talks and hands on labs […]

Continue reading

Magnet User Summit 2019: Solving Cyber Crimes with the University of Notre Dame

Mitch Kajzer presented this talk at the Magnet User Summit. He is the director of the Cyber Crimes Unit in St. Joseph County, Indiana, and also an adjunct professor at Notre Dame. He talked about the changing nature of digital forensic investigations and how police agencies need to adapt. Technology is now involved in most […]

Continue reading

Virtual Currency Investigations: Fear Not the Blockchains

At the Magnet User Summit this year, I listened to a presentation by Eric Huber, Vice President of National White Collar Crime Center (NW3C). With a broad background in digital forensic investigations, he spoke about the changing field in cryptocurrencies and blockchain analysis. He gave a brief overview on different types of cryptocurrencies and how […]

Continue reading

Exploring Axiom 3.0 and the Child Protection System at MUS 2019

Introduction: This past April, I had the opportunity to attend the Magnet User Summit 2019 as a representative of Champlain College. This year marked my first year attending a conference in addition to being a first-year student. I couldn’t be more grateful for this opportunity, and I consider myself lucky to have networked with industry […]

Continue reading

Magnet User Summit Experience

Thanks to Champlain College, I was able to attend this year’s Magnet User Summit. As a first year, I was concerned as to how well I would understand the topics and concepts. However, I found that I was well prepared. My internship this semester at the LCDI helped most of all, as it provided me […]

Continue reading

Magnet User Summit 2019

Introduction During the first week of April, I had the chance to go to the Magnet User Summit in Tennessee. During the trip I met many Champlain students that I wouldn’t have known if I hadn’t gone. I also had the chance to talk with upperclassmen within my major who told me about their experience […]

Continue reading

Using Memory Forensics Analysis to Guide Your Investigation

Introduction I had the honor of attending the Magnet User Summit 2019 in Nashville on April 1-3. This was my first professional conference as a junior at Champlain College.  It was exciting to be able to correlate the presentations with the knowledge I’ve gathered in my courses. The conference was also a great networking space where I […]

Continue reading

Leveraging PowerShell & Python MUS 2019

Leveraging PowerShell & Python for Incident Response & Live Investigation With Chet Hosmer Recently, I had the great opportunity to attend the 2019 Magnet User Summit hosted by Magnet Forensics in Nashville, Tennessee. Presenters at the Magnet User Summit dedicate their time to presenting new research, demonstrating new techniques, and teaching users in the fields […]

Continue reading

Internet Evidence Finder: Part 2

As we are finishing the IEF project we are coming to the realization that IEF does not parse 100% of the internet artifacts on a drive. That’s not to say the tool isn’t useful, it just the IEF should not be used by itself. This project entailed generating internet data on a fresh computer and taking detailed notes during the process. Thirty three hours later the data is ready for IEF to parse. We took the drive out of the computer, hooked it up to a write blocker and imaged the drive in an E01 format. We then ran IEF on both the drive and the E01 to see if there would be different results. The results, unsurprisingly, were identical. After comparing the results to my notes we notice there were a lot of things missing. For one, only two thirds of the artifacts we generated data for were discovered by IEF. Continue reading