Monday, February 15, 2016

Unusual idea for digital forensic lab implementation

Some time ago I managed to have coffee wth friend of mine from IBM, we chat about old times and about new things, trends etc. I've learned that there is a beautiful new a bit scaled down host machine designed to be Linux visualization platform on the old reliable host procesor approach LinuxOne idea.

Wonderfull thing for any data crunching and passing trough system based on Linux. It sounds like perfect consolidation point for forensic lab, with Linux machines running powerful database engines like Oracle, PostgreSQL or any other supported by Linux. Looks like that Oracle is also taking this machine very serious, 



It's almost perfect database server platform for forensic lab, as it was earlier FTK lab which was capable of running on Oracle database. This machine can probably outperform Intel based servers and provide much faster response for frontend forensic tools. Unfortunately latest FTK does not has possibility of using non windows database engine eg running database on Linux, what was theoretically possible with earlier versions. 

Wednesday, February 10, 2016

RFOR 2015/2016 finished



This semester lectures are in late evening, from 19:15 till 21:00 unbelievably hard time to concentrate for students and for me too.  My old age is creeping on me :)  Still it is true quality of my lecture is not as good as I've been expecting.  During morning office hours I've been doing a 2 days intro training into AcessData Sentinel Silent Runner what takes a lot effort and had influence on materials and scores. I've tried to introduce python and Linux but because of some other arrangements I had not enough time to put in detail.

Labs was also done satisfactory, my colleague Dario Puntaric who was in charge for labs and me will introduce more more network forensic practicals for next run. A lot of materials are prepared so I assume we can do that without much drama. Also we need some mobiles practicals and some opensource intelligence things for students like maltego from Paterva.

Some interesting student seminal work was done:

  • iPhone forenzika 
  • Forenzika XBOX360 
  • Tehnike anti-forenzike 
  • Sigurnost android OS
  • Oporavak izgubljenih podataka
  • Računalna forenzika
  • Digitalna forenzika slika 
  • Kritpografija  i PGP
  • Forenzika SSD diskova
  • Forenzika digitalnih slika

 It shows each student can find relevant sources, do good compilation and extract most important steps how to apply methods and tools from sources to solve some problem.

Especially good one, which will be for sure used in next lecture is "Steganografija" by
Mladen Strbad