Network forensics / UC2DIN101

Network forensics / UC2DIN101

Most of the time when you are doing different types of forensics work, you analyze different types of data stored in different ways – like hard drives, ram storage, flash and so on. With network forensics it is a bit different, because normally you dont leave...
Day 1 / UC2DIN101

Day 1 / UC2DIN101

The first day started of a bit “slow”, since I have spent the entire weekend ill with the flu. So I therefore decided to skip the introduction where presentations of the court, prosecutors and defendants are made. Unfortunately, in Kristiansand Tinghus the...
DFaaS / UC2WMD051

DFaaS / UC2WMD051

The IT industry today have moved a lot of their resources and services into the cloud. And as a result from this, cloud is not only being used for data storage and backup – but many typical services such as software (SaaS) or generally XaaS (X as a Service). In...
Mobile Forensics / UC2WMD051

Mobile Forensics / UC2WMD051

For this report I am testing three mobile forensics tools to evaluate them on various criteria. I am looking at ease of use, documentation/guidance, graphical interface, analysis quality and reporting. For this report I am using an iPhone 5 (Model: A1429) with 32 GB...
Interaction / UC2FSA101

Interaction / UC2FSA101

After returning from a well deserved holiday, we had our first lecture today in the new topic Network Security. But before this we discussed the outcome of our “Spy Game” assessment results. I will not go into details about the image and overall assessment...