BusKill Tutorial: Self Destructing Laptop Storage
#buskill #encryption #crypto #storage #forensics #antiforensics #HDD #infosec #cybersecurity #datarecovery #luks #encrypted #harddrive #privacy #security #educational
Watch On #Peertube:
BusKill: Self Destructing Laptop Storage
I’ve spent 37+ years in forensic handwriting analysis, including consulting on cold cases and training law enforcement internationally.
With a PhD in Applied Ethics and ongoing studies in constitutional + human rights law, my focus is on integrity, evidence, and reputation in high-conflict digital environments.
I’ll be using this space to quietly track patterns that apply to my work.
Full write-up for ToolPie this year's forensics challenge from Hack The Box Cyber Apocalypse CTF - Tales From Eldoria.
PCAP (network capture) analysis
Python bytecode, marshalling, decompiling
For hobbyist Cobalt Strike Beacon collectors, note that the recently announced 4.11 update introduces a number of changes to frustrate Beacon configuration extraction, namely through the new `transform-obfuscate` field.
When set, this field can apply multiple layers of encoding, encryption and compression (with some recent Beacons observed with a 32 byte XOR key, configurable upto 2048 bytes!).
While still reasonably trivial to decode manually, standard automated workflows (say, through the SentinelOne parser) will now fail, not least because of changes to the well-known field markers.
Beacons with these characteristics have thus far been observed with watermarks indicative of licensed instances, though I imagine it is only a matter of time before the 4.11 capabilities become accessible to all manner of miscreants.
A sample configuration, via a staged Beacon on 104.42.26[.]200 is attached, including the three distinct XOR keys used to decode it.
https://www.cobaltstrike.com/blog/cobalt-strike-411-shh-beacon-is-sleeping
Crime Investigation Tool Reveals Origins Of UK’s Feral Parrots
"A recent study identified where the UK’s naturalized parakeets came from by adapting a powerful crime investigation technique designed to locate and identify serial criminals"
by @grrlscientist via #Substack
#parrots #forensics #parakeets #London #UK #SciComm https://substack.com/home/post/p-156158357
My little thread about #Signal Desktop #memory #forensics is jumping in popularity after that @Atlantic article hit the web.
Need to dig deeper in, if anyone knows how to carve a data segment out of memory for a specific PID using Vol3, that would be super helpful. Just a thought
https://digitaldarkage.cc/@iaintshootinmis/114198799142386731
Since I am on an IT Security server now, I thought I'd post this just to depress the younger folks. Roll on #UBI !
https://www.linkedin.com/pulse/ageism-trust-safety-michael-lawrie-msc-ctt/
#Cellebrite Is Using AI to Summarize Chat Logs & Audio from Seized Mobile Phones
Cellebrite the company which makes near ubiquitous phone #hacking & #forensics tech used by police officers…has introduced AI capabilities into its products, including summarizing chat logs/audio messages from #seized mobile phones
The introduction of #AI into a tool that essentially governs how #evidence against criminal defendants is analyzed already has #CivilLiberties experts concerned
Quelles sont les possibilités d'extraire des données de la mémoire d'un smartphone, particulièrement avec les méthodes de chiffrement actuelles ? - Article de Jean-Marc Manach @manhack illustré par une thèse récente d'une chercheuse japonaise #Forensics https://next.ink/157289/les-vulnerabilites-materielles-et-logicielles-des-memoires-chiffrees-que-tentent-de-hacker-les-cryptanalystes/
File System Forensics by Fergus Toolan, 2025
Comprehensive forensic reference explaining how file systems function and how forensic tools might work on particular file systems. File System Forensics delivers comprehensive knowledge of how file systems function and, more importantly, how digital forensic tools might function in relation to specific file systems.
@bookstodon
#books
#nonfiction
#computers
#FileSystems
#forensics