???

  • Autor: Vários
  • Narrador: Vários
  • Editora: Podcast
  • Mais informações

Informações:

Sinopse

Episódios

  • iOS Recovery Mode Analysis: Reading iOS Version from Locked and Disabled iPhones

    18/02/2021

    The iPhone recovery mode has limited use for mobile forensics. However, even the limited amount of information available through recovery mode can be essential for an investigation. Recovery access can be also the only available analysis method if the device becomes unusable, is locked or disabled after ten unsuccessful unlocking attempts, or had entered the […]

  • Breaking Jetico BestCrypt

    03/02/2021

    BestCrypt, developed by the Finnish company Jetico, is a cross-platform commercial disk encryption tool. Available for Windows, Linux, macOS and Android platforms, BestCrypt is delivered in two editions, one offering full-disk encryption and the other encrypting virtual disk volumes stored in containers, the latter being supported with our tools. BestCrypt Encryption Algorithms Similar to open-source […]

  • Passcode Unlock and Physical Acquisition of iPhone 4, 5 and 5c

    02/02/2021

    Passcode unlock and true physical acquisition are now available for iPhone 4, 5, and 5c devices – with caveats. Learn about the benefits and limitations of passcode unlocks and true physical imaging of Apple’s legacy devices. Looking for a step by step walkthrough? Check out our imaging guide! Unlocking the iPhone 4, 5 and iPhone […]

  • iPhone 4, iPhone 5 and iPhone 5c Physical Acquisition Walkthrough

    02/02/2021

    True physical acquisition is back – but only for a handful of old devices. We’re adding support for unlocking and forensically sound extraction of some of Apple’s legacy iPhones. For iPhone 4, 5, and 5c devices, we’re adding software-based passcode unlocking and device imaging functionality. Moreover, on some models you won’t even need to break […]

  • NAS Forensics: Synology, ASUSTOR, QNAP, TerraMaster and Thecus Encryption Compared

    01/02/2021

    More than a year ago, we started researching the available encryption options in off the shelf network attached storage devices. We started with Synology devices, followed by Asustor, TerraMaster, Thecus, and finally Qnap. The manufacturers exhibit vastly different approaches to data protection, with different limitations, security implications and vulnerabilities. Today we are publishing the aggregate […]

  • End-to-End Encryption in Apple iCloud, Google and Microsoft Accounts

    21/01/2021

    The proliferation of always connected, increasingly smart devices had led to a dramatic increase in the amount of highly sensitive information stored in manufacturers’ cloud accounts. Apple, Google, and Microsoft are the three major cloud providers who also develop their own hardware and OS ecosystems. In this report, we’ll see how these companies protect their […]

  • Secure Instant Messengers

    20/01/2021

    In today’s world of everyone wanting a slice of one’s personal information, users become more and more concerned about the privacy. The WhatsApp/Facebook integration raised an additional concern, considering that Facebook-owned Messenger requests the largest number of invasive permissions among all commonly used messengers. Data privacy and security concerns are mounting like a snowball. 2020 […]

  • DFU Mode Cheat Sheet

    14/01/2021

    The Device Firmware Upgrade mode, or simply DFU, just got a second breath. The ability to image the file system, decrypt the keychain and even do passcode unlocks on some older iPhone models has been made possible thanks to the checkm8 exploit and the checkra1n jailbreak, both of which require switching the phone into DFU. […]

  • Apple, FBI and iPhone Backup Encryption: Everything You Wanted to Know

    07/01/2021

    Shame on us, we somehow missed the whole issue about Apple dropping plan for encrypting backups after FBI complained, even mentioned in The Cybersecurity Stories We Were Jealous of in 2020 (and many reprints). In the meantime, the article is full of rumors, guesses, and unverified and technically dubious information. “Fake news”, so to say. […]

  • Apple Scraps End-to-End Encryption of iCloud Backups

    06/01/2021

    Reportedly, Apple dropped plan for encrypting backups after FBI complained. Apple’s decision will undoubtedly cause turmoil and will have a number of consequences. In this article, I want to talk about the technical reasons for encrypting or not encrypting cloud backup, and compare Apple’s approach with the data encryption strategies used by Google, who have […]

  • Understanding BitLocker TPM Protection

    05/01/2021

    Investigating a BitLocker-encrypted hard drive can be challenging, especially if the encryption keys are protected by the computer’s hardware protection, the TPM. In this article, we’ll talk about the protection that TPM chips provide to BitLocker volumes, and discuss vulnerabilities found in today’s TPM modules. What is TPM Trusted Platform Module (TPM) is a standard […]

  • 2020 in Review: What Was New in Desktop and Mobile Forensics

    28/12/2020

    This year is different from many before. The Corona pandemic, the lack of travel and canceled events had changed the business landscape for many forensic companies. Yet, even this year, we made a number of achievements we’d love to share. iOS Acquisition Our major achievement this year is about the iPhone extraction. For the first […]

  • NAS Forensics: QNAP Encryption Analysis

    23/12/2020

    A year ago, we analyzed the encryption used in Synology NAS devices. We were somewhat disappointed by the company’s choice to rely on a single encryption layer with multiple functional restrictions and security reservations. Today we are publishing the results of our analysis of data encryption used in QNAP devices. Spoiler: it’s very, very different. […]

  • iPhone Backups: Top 5 Default Passwords

    22/12/2020

    The iPhone backup is one of the hottest topics in iOS forensics. iTunes-style backups are the core of logical acquisition used by forensic specialists, containing overwhelming amounts of evidence that is is unrivaled on other platforms. The backups, as simple as they seem, have many “ifs” and “buts”, especially when it comes to password protection. […]

  • New Privacy Features: iOS 14.0 through 14.3

    18/12/2020

    Apple has long provided its users the tools to control how apps and Web sites use their personal data. The release of iOS 14 brought a number of new privacy features, while iOS 14.3 adds an important extra. At the same time, one of the most interesting privacy features is facing tough opposition from a […]

  • Breaking Passwords with NVIDIA RTX 3080 and 3090

    17/12/2020

    Today we have an important date. Advanced Office Password Recovery turned 16. What started as an instant recovery tool for legacy versions of Microsoft Word had now become a GPU-accelerated toolkit for breaking the many Microsoft formats. Today we’re releasing a major update, giving Advanced Office Password Recovery and Distributed Password Recovery tools the ability […]

  • Recovering Screen Time Passwords

    15/12/2020

    The Screen Time password has been long recommended as an extra security layer. By setting a Screen Time password without any additional restrictions, Apple users could easily dodge attempts of changing or removing the screen lock passcode, resetting the iTunes backup password, or removing the activation lock. For a long time, removing the Screen Time […]

  • Elcomsoft vs. Hashcat Part 4: Case Studies

    09/12/2020

    This is the final part of the series of articles comparing Elcomsoft Distributed Password Recovery with Hashcat. We’ve already compared the features, the price and performance of the two tools. In this study, we tried breaking passwords to several common formats, including Word document, an encrypted ZIP archive, and a VeraCrypt container. We summarized our […]

  • How to Remove The iPhone Passcode You Cannot Remove

    08/12/2020

    From time to time, we stumble upon a weird issue that interferes with the ability to install a jailbreak. One of such problems appearing literally out of the blue is the issue of being unable to remove the screen lock password on some iPhone devices. What could be the reason and how to work around […]

  • The Evolution of iOS Acquisition: Jailbreaks, Exploits and Extraction Agent

    03/12/2020

    The past two years have become a turning point in iOS acquisition. The release of a bootrom-based exploit and the corresponding jailbreak made BFU acquisition possible on multiple devices regardless of security patches. Another exploit covers the entire iOS 13 range on all devices regardless of their hardware revision. ElcomSoft developed a jailbreak-free extraction method […]

página 1 de 4