forensicsblog.org
Metadata Extraction of GPX Files
http://forensicsblog.org/2013/07/11/metadata-extraction-of-gpx-files
Forensics and Information Security. Metadata Extraction of GPX Files. On July 11, 2013. To briefly supplement my GPS Device Analysis research. The GPX file itself should have interesting metadata qualities that can help you decide its relevance to your case. For example, I was able to pull the following data out of my GPX file using ExifTool. Gpx Metadata Link Href : http:/ www.garmin.com. Gpx Metadata Link Text : Garmin International. Gpx Metadata Time : 2013:03:03 19:38:00Z. Research: GPS Device Analys...
pardhasaradhi.wordpress.com
My articles in Chmag | pardhasaradhi
https://pardhasaradhi.wordpress.com/2011/10/03/my-articles-in-chmag
Just Tech No Logic. My articles in Chmag. My articles in Chmag. October 3, 2011. Well its a late announcement phir bhi. My articles have been posted in Chmag. On forensics for Matriux Vibhag, More to come yet. Forensics Part-I — Introduction and Acquisition. Foreniscs Part-II — Analysis. Forensics Part-III – Analysis part II have to be published , article submitted 🙂. First Indian Security and Hacking Magazine. Leave a Reply Cancel reply. Enter your comment here. Address never made public).
pardhasaradhi.wordpress.com
Virtual Presence in Words | pardhasaradhi
https://pardhasaradhi.wordpress.com/2011/03/03/virtual-presence-in-word
Just Tech No Logic. Virtual Presence in Words. Virtual Presence in Words. March 3, 2011. I Started with my words in word press. As all the blogger are starting with word press and the most interesting topic in some security meets is word press security , I am starting the blog to check the updates , I know I am late to start this but there is old saying “Something is better than nothing” 🙂 . You can get my details here. Leave a Reply Cancel reply. Enter your comment here. Address never made public).
pardhasaradhi.wordpress.com
Personal | pardhasaradhi
https://pardhasaradhi.wordpress.com/2011/06/14/personal
Just Tech No Logic. June 14, 2011. This blog will be of my personal and official experiences. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). You are commenting using your WordPress.com account. ( Log Out. You are commenting using your Twitter account. ( Log Out. You are commenting using your Facebook account. ( Log Out. You are commenting using your Google account. ( Log Out. Notify me of new comments via email.
windowsir.blogspot.com
Windows Incident Response: FOSS Tools
http://windowsir.blogspot.com/p/foss-tools.html
The Windows Incident Response Blog is dedicated to the myriad information surrounding and inherent to the topics of IR and digital analysis of Windows systems. This blog provides information in support of my books; "Windows Forensic Analysis" (1st thru 4th editions), "Windows Registry Forensics", as well as the book I co-authored with Cory Altheide, "Digital Forensics with Open Source Tools". Includes the ability to collect memory. Google Code project home. Don't want to collect your own memory? From the...
forksec.wordpress.com
Updates to GPS Utility (Timestamp Features) | fork()
https://forksec.wordpress.com/2013/08/07/updates-to-gps-utility-timestamp-features
Research: GPS Device Analysis. Forensics and Information Security. Updates to GPS Utility (Timestamp Features). On August 7, 2013. I decided to make some pretty solid changes to TrackerCat. Since my last post. I wasn’t satisfied with it only converting GPX-to-KML. The new changes include the following:. Ability to recursively export all GPXs from a specified path (can be a mounted device image). Larr; TrackerCat: GPX-to-KML Active Log Mapping Tool. Leave a Reply Cancel reply. Enter your comment here.
forksec.wordpress.com
Android USB Device Support | fork()
https://forksec.wordpress.com/2013/06/23/android-usb-device-support
Research: GPS Device Analysis. Forensics and Information Security. Android USB Device Support. On June 23, 2013. By AH and setting up the SDK on my Ubuntu box, I noticed the udev rules needed an update. Makes sense considering there’s been many new vendors since the book was published. Copy and paste it:. 51-android-rules should be placed in /etc/udev/rules.d (chmod 664 or a r). Official Guide and Vendor IDs: http:/ developer.android.com/tools/device.html. SUBSYTEM= ”USB”, SYSFS{idVendor}= &#...SUBSYTEM=...
forksec.wordpress.com
Thoughts on viaExtract (Demo) | fork()
https://forksec.wordpress.com/2013/05/19/thoughts-on-viaextract-demo
Research: GPS Device Analysis. Forensics and Information Security. Thoughts on viaExtract (Demo). On May 19, 2013. I recently had the opportunity to try the viaForensics viaExtract VM utility. viaExtract is essentially a framework in which many different advanced analysis features can be utilized (and automated). Based on Ubuntu, the VM utility is easy to setup and even easier to operate. Browser History including Searches and Bookmarks. An in-depth call log. In-depth contact information acquisition.