Arsenal Recon

1.3K posts

Arsenal Recon banner
Arsenal Recon

Arsenal Recon

@ArsenalRecon

Developers of digital forensics weapons which include Arsenal Image Mounter, Hibernation Recon, LevelDB Recon, HBIN Recon, & Registry Recon. Arm Yourself! #DFIR

Boston Katılım Ağustos 2012
1.3K Takip Edilen3.4K Takipçiler
Arsenal Recon
Arsenal Recon@ArsenalRecon·
We've seen some fascinating use of AI chatbots in our casework, some of which we've exposed with LevelDB Recon. Are you exposing everything possible from LevelDBs & not just scratching the surface? ArsenalRecon.com #DFIR
Arsenal Recon tweet mediaArsenal Recon tweet mediaArsenal Recon tweet media
English
0
3
5
760
Arsenal Recon
Arsenal Recon@ArsenalRecon·
A *lot* going on here - Arsenal Image Mounter connected to two drives in a PALADIN-booted Surface Pro 5 over a network via AIM Remote Agent, launching a virtual machine from the Storage Spaces "disk", & accessing secrets after Windows authentication & DPAPI bypasses. #DFIR
English
1
4
10
1.7K
Arsenal Recon
Arsenal Recon@ArsenalRecon·
LevelDB Recon v1.0.0.53 released today with a new "parsed view" option which automatically determines value data format (support for JSON currently) & displays it in a more user-friendly manner. Thanks to @mattiaep for the suggestion! ArsenalRecon.com #DFIR
Arsenal Recon tweet mediaArsenal Recon tweet media
English
0
2
9
990
Arsenal Recon
Arsenal Recon@ArsenalRecon·
@DC3Forensics Please let your digital forensics practitioners know, & have them browse through our feed if they want to see examples of why proper analysis of Windows swap is important.
English
0
0
0
63
Craig Bowling
Craig Bowling@Craig__Bowling·
Recently asked by a young, aspiring DF/IR practitioner: 'What are some of your current favorite tools?' My toolkit is large, but here's my current top 10: 1. Sumuri RECON (Mac and iOS forensics) – @SUMURIForensics 2. Magnet AXIOM (Windows, iOS, and Android forensics) – @MagnetForensics 3. Cyber Triage (automated DFIR for incident response with artifact scoring) – @cybertriage 4. X-Ways Forensics (Windows forensics ) – @XWaysSoftware 5. KAPE (Kroll Artifact Parser and Extractor) – @EricRZimmerman 6. Digital Detective (NetAnalysis for browser artifacts) – @DigitalDetectiv 7. Arsenal Recon (advanced disk mounting, hibernation/registry analysis, and evidence exploitation) – @ArsenalRecon 8. Magnet Verakey (full file system extractions for iOS/Android) – @MagnetForensics 9. FEX (Forensic Explorer for Windows forensics) 10. Elcomsoft Phone Breaker (iCloud acquisitions) – @elcomsoft These all get heavy daily use in my workflow. What's in your toolkit?
English
2
1
10
633
Arsenal Recon
Arsenal Recon@ArsenalRecon·
Have you ever analyzed a Windows computer aggressively (i.e. beyond scratch-and-sniff)? How did you handle swap? Have you used Swap Recon? Check out the latest testimonial from someone that has. ArsenalRecon.com #DFIR
Arsenal Recon tweet media
English
0
3
15
3.1K
Arsenal Recon
Arsenal Recon@ArsenalRecon·
Congratulations Ravi!
Arsenal Recon tweet media
English
0
1
3
407
Arsenal Recon
Arsenal Recon@ArsenalRecon·
Digital forensics casework with extremely high stakes drives our research & development at Arsenal. Please spend a few minutes to think carefully about this slide & how it relates to your past, present, & future casework. ArsenalRecon.com #DFIR
Arsenal Recon tweet media
English
0
2
4
438
Arsenal Recon
Arsenal Recon@ArsenalRecon·
If you're involved in digital forensics, especially as an educator, study these screenshots. What do you see? How does this impact existing articles & curriculum involving Windows swap? What if this CTF was built on a more recent build of Windows 11? ArsenalRecon.com #DFIR
Arsenal Recon tweet mediaArsenal Recon tweet media
English
0
2
17
3.9K
Arsenal Recon
Arsenal Recon@ArsenalRecon·
Are you running search terms & signatures against raw Windows swap & getting a very limited view of what actually exists there? Check out these statistics from running @nextronsystems THOR against raw swap & then decompressed blocks specifically. ArsenalRecon.com #DFIR
Arsenal Recon tweet media
English
0
4
7
8.5K
Arsenal Recon
Arsenal Recon@ArsenalRecon·
Swap Recon v1.0.0.16 just released with a fix for a bug that could result in a false positive block being detected towards the end of a swap file & improved performance during final merge of decompressed output. ArsenalRecon.com #DFIR
Arsenal Recon tweet media
English
0
4
10
879
Arsenal Recon
Arsenal Recon@ArsenalRecon·
@RedHatPentester You got our attention with this question. How do you properly analyze Windows swap (B) to accomplish the goal?
English
0
0
3
584
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
During a forensic investigation, an examiner analyzes a Windows system suspected of being used for “private browsing” activities. The suspect claims that no browsing evidence can exist because the browser was always used in private/incognito mode. Which of the following artifacts is MOST likely to still contain recoverable evidence of the suspect’s web activity? A. Browser history database files, because private browsing permanently stores URLs for forensic use 
B. The Windows pagefile (pagefile.sys), because memory data may be written to disk during system operation 
C. DNS cache entries, because private browsing disables all DNS resolution 
D. Browser cookies directory, because private browsing encrypts cookies instead of deleting them
English
11
9
60
7.6K
Arsenal Recon
Arsenal Recon@ArsenalRecon·
@KevinPagano3 Thanks, let's figure out when we'll be in the same place so you can get one!
English
1
0
0
79
Arsenal Recon
Arsenal Recon@ArsenalRecon·
@vmreyes1 Thank you! We don't attend many industry events, but we'll be at the IACIS training conference in Orlando May 5-7 with a small number of these coins if you want one.
English
0
0
1
21
Arsenal Recon
Arsenal Recon@ArsenalRecon·
This swap came from what will soon be a publicly-accessible WoA disk image (to be used in one or more CTFs) our intern has been building for a couple months.
English
0
2
4
491
Arsenal Recon
Arsenal Recon@ArsenalRecon·
An important #DFIR story in three screenshots… (1) Searching Windows 11 on Arm (WoA) swap for “longitude” (2) Processing WoA swap (containing modern compression) with Swap Recon (3) Searching Swap Recon output for “longitude” ArsenalRecon.com
Arsenal Recon tweet mediaArsenal Recon tweet mediaArsenal Recon tweet media
English
1
2
7
577
Arsenal Recon
Arsenal Recon@ArsenalRecon·
Check out the latest Swap Recon (v1.0.0.15) processing Windows on Arm swap (modern compression format) from a Surface Pro 11… ArsenalRecon.com #DFIR
Arsenal Recon tweet media
English
0
2
5
648