🔷 Deeper into tasks.
This is the 5️⃣ blog in the RAM-series from MSAB and we have looked at how we can use the XRYRAMalyzer to find data within a process.
➡️ Link to Blog 5️⃣ lnkd.in/daX2kz83
➡️ Join the conversation at the MSAB Forum lnkd.in/dzeVmzKC
#RAM #DFIR #MSAB #digitalforensics #AlwaysTryXRY
➡️Drop by and meet Elizabeth Neal and Wil Hernandez at ICAC at Booth 23 to see what we have been up to at MSAB.
📆 Monday 16th 10:00 to 11:45 join Wil in the Blue Springs I & II meeting room talking about “Mobile Forensics, what you see is not always what you can get”.
#XRY #RAM #AlwaysTryXRY
🔴A MSAB major release is now out!
We are excited to announce that the new versions of XRY, XAMN, XEC and KTE are available for download on the Customer Portal customer.msab.com ?
The new release brings numerous enhancements to your DFIR toolkit 🛠️.
#XRY #XAMN #XEC #MSAB #AlwaysTryXRY #RAM
Think it’s safe to say this device was BFU…
But, still managed to get a physical along with RAM 👌🏻
#DFIR #MobileForensics #AlwaysTryXRY
🔷 So, you have a RAM dump, now what?
This is the first in a series of 7 blog posts from MSAB intended to highlight this new technology, and how it can be used to look at evidence in a device.
Link to the Blog lnkd.in/d-KH5EHf
#DFIR #MSAB #XRY #digitalforensics #AlwaysTryXRY #RAM
#AlwaysTryXRY
For one UK Police Force, the team had hit a wall. A suspect’s smartphone was protected by a stubborn 6-digit passcode, locked in a BFU state. Every attempt to brute force and gain access for extraction using various software solutions had failed.
Read more here lnkd.in/djhxV8XG