https://www.peerlyst.com/posts/how-to-perform-ssd-forensics-or-part-i-sudhendu?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
How to perform SSD Forensics | Part - I 👌
Recently I went to a Conference on cyber forensics . There I saw people demonstrating various acquisition methods, evidence collection, storage and analysis . One thing is peculiarly noticed that people when say “Evidence acquisition” or “ Data recovery ” from computers they generally mean to acquire it from magnetic storage media, like Hard Disks (HDD). They were going on about disk forensics, slack space and all those related stuff. After listening to their orthodox speech, I raised some queries:
Do the methods of disk forensics, like block level analysis, apply on Solid state drives ,flash drives?
Flash drives totally remove the concept of block or any rotating part, so what now?
Do your delete, erase, wipe and format concept still work in a similar way? etc. etc.
I asked around 10 questions and all I got was blithering. That made me ponder about the different individuals who are dealing forensics and how many do not follow the dernier cri in the industry.
I decided I need to write something on forensics involving flash drives. My focus on this article is about Solid State Drives (SSDs) .
#article #forensic #ssd
How to perform SSD Forensics | Part - I 👌
Recently I went to a Conference on cyber forensics . There I saw people demonstrating various acquisition methods, evidence collection, storage and analysis . One thing is peculiarly noticed that people when say “Evidence acquisition” or “ Data recovery ” from computers they generally mean to acquire it from magnetic storage media, like Hard Disks (HDD). They were going on about disk forensics, slack space and all those related stuff. After listening to their orthodox speech, I raised some queries:
Do the methods of disk forensics, like block level analysis, apply on Solid state drives ,flash drives?
Flash drives totally remove the concept of block or any rotating part, so what now?
Do your delete, erase, wipe and format concept still work in a similar way? etc. etc.
I asked around 10 questions and all I got was blithering. That made me ponder about the different individuals who are dealing forensics and how many do not follow the dernier cri in the industry.
I decided I need to write something on forensics involving flash drives. My focus on this article is about Solid State Drives (SSDs) .
#article #forensic #ssd
Saudi Dismisses Link to Hack of Amazon Owner Bezos
http://feedproxy.google.com/~r/Securityweek/~3/bJTp5wvRaXc/saudi-dismisses-link-hack-amazon-owner-bezos
The Saudi embassy in Washington on Tuesday dismissed suggestions the kingdom hacked the phone of Washington Post owner Jeff Bezos (https://www.securityweek.com/investigator-says-amazon-chiefs-phone-hacked-saudis), as media reports linked the security breach to a WhatsApp message from an account of Crown Prince Mohammed bin Salman.
read more (https://www.securityweek.com/saudi-dismisses-link-hack-amazon-owner-bezos)
http://feedproxy.google.com/~r/Securityweek/~3/bJTp5wvRaXc/saudi-dismisses-link-hack-amazon-owner-bezos
The Saudi embassy in Washington on Tuesday dismissed suggestions the kingdom hacked the phone of Washington Post owner Jeff Bezos (https://www.securityweek.com/investigator-says-amazon-chiefs-phone-hacked-saudis), as media reports linked the security breach to a WhatsApp message from an account of Crown Prince Mohammed bin Salman.
read more (https://www.securityweek.com/saudi-dismisses-link-hack-amazon-owner-bezos)
Securityweek
Saudi Dismisses Link to Hack of Amazon Owner Bezos | SecurityWeek.Com
The Saudi embassy in Washington dismissed suggestions the kingdom hacked the phone of Washington Post owner Jeff Bezos, as media reports linked the security breach to a WhatsApp message from an account of Crown Prince Mohammed bin Salman.
Unofficial Patch Released for Recently Disclosed Internet Explorer Zero-Day
https://ift.tt/2GcrOgj
https://ift.tt/2GcrOgj
Securityweek
Unofficial Patch Released for Recently Disclosed Internet Explorer Zero-Day | SecurityWeek.Com
0patch has released a micropatch for the recently disclosed Internet Explorer zero-day vulnerability. The micropatch is free for consumers
Sec in your DevOps: Adding the OWASP Dependency Check to your Jenkins pipeline
https://ift.tt/30XyWGZ
https://ift.tt/30XyWGZ
Yet Another Sudo Vulnerability!
When 'pwfeedback' is enabled, a new Sudo bug could let low privileged Linux & macOS users (or malicious programs) execute arbitrary commands with 'root' privileges.
Details for CVE-2019-18634 ➤ https://thehackernews.com/2020/02/sudo-linux-vulnerability.html
When 'pwfeedback' is enabled, a new Sudo bug could let low privileged Linux & macOS users (or malicious programs) execute arbitrary commands with 'root' privileges.
Details for CVE-2019-18634 ➤ https://thehackernews.com/2020/02/sudo-linux-vulnerability.html