How to capture fully decrypted HTTPS traffic in a transparent proxy setup without TLS key logs?

I am currently working on a home "forensic" lab and I have set up an OPNsense-based transparent proxy (squid) to intercept and analyze HTTPS traffic coming from a Windows 11 client. I can successfully decrypt traffic using TLS ke… Continue reading How to capture fully decrypted HTTPS traffic in a transparent proxy setup without TLS key logs?

Is booting into the Windows (advanced) startup menu without a write-blocker forensically safe?

I wonder if entering the Windows (advanced) startup menu changes or logs anything on the disk itself. Where does this exactly happen in the boot sequence? If for example, a laptop was to be forensically imaged without a write-blocker would… Continue reading Is booting into the Windows (advanced) startup menu without a write-blocker forensically safe?

Is Error Level Analysis (ELA) in image forensics a reliable indicator for detecting digital modifications?

I’m reading about Error Level Analysis (ELA) in image forensics as means to detect if modifications were made to a photo. ELA is nicely described here: https://fotoforensics.com/tutorial.php?tt=ela. Also below examples are from that site.
Continue reading Is Error Level Analysis (ELA) in image forensics a reliable indicator for detecting digital modifications?

What Graykey Can and Can’t Unlock

This is from 404 Media:

The Graykey, a phone unlocking and forensics tool that is used by law enforcement around the world, is only able to retrieve partial data from all modern iPhones that run iOS 18 or iOS 18.0.1, which are two recently released versions of Apple’s mobile operating system, according to documents describing the tool’s capabilities in granular detail obtained by 404 Media. The documents do not appear to contain information about what Graykey can access from the public release of iOS 18.1, which was released on October 28.

More …

Continue reading What Graykey Can and Can’t Unlock

Can Benford’s law be used for the purpose of detecting deviations in a file metadata dates?

Considering the metadata such as creation and modification datetimes of files in terms of computer forensics. If tampering of such metadata date information is expected, can Benford’s law be used to proof or disprove the act of metadata al… Continue reading Can Benford’s law be used for the purpose of detecting deviations in a file metadata dates?