Once again, the question referred to an Android image.
A Google search revealed a list of Android apps
that include picture-in-picture capability:
...one of which is Google Chrome.
Most recently used apps can be found
using an Autopsy module...
...in the Extracted Content section:
The most recently visited domain appears to be
malliesae.com (using Chrome).
SUCCESS!
Get link
Facebook
X
Pinterest
Email
Other Apps
Comments
Popular posts from this blog
-
MAGNET WEEKLY CTF #9 This week begins our forensic analysis of information resident in the RAM of a Windows host when the memory was captured. The acquisition software created a .mem file that I examined using Volatility as well as MemProcFS. MemProcFS allows the investigator to view the memory dump files in a virtual file system, allowing the files to be viewed using Windows Explorer. Part 1involves a conversation: My first step was to look at the image with Volatility, so I needed to get the image info... ...then use pslist , to get an idea of which processes were running. Of the many options, two stood out to me as potentially containing text – slack and WINWORD: I dumped the suspect processes to files... ...ran strings | grep "password" on all of them, and discovered this: Success! On to Part 2: At first, despite my suspicions at the solution was ...
MAGNET WEEKLY CTF #3 This question also refers to an Android image. " exit, pass by, Cargo " Some sort of route or map may be involved. Maybe something visual? A search the media folder on the device turned up some .mp4 videos and .jpegs: The videos yielded no clues. But one of the still images revealed part of a highway exit sign: There wasn't enough of the sign in the still image to read. However, this .jpg has a filename prefix of MVIMG, indicating that it is a Motion Photo. I recalled Jessica Hyde's presentation with Christopher Vance on 10/7/20 where she showed that additional visual information could be extracted from the Motion Photo format, which contains extra frames in the form of an embedded .mp4 movie file. h ttps://www.magnetforensics.com/resources/mobile-artifact-comparison-webinar-recording-oct-7/ Jessica said that she manually extracted the extra frames, but didn't give any details about the method that she used. Stack o...
MAGNET WEEKLY CTF #5 This is the first question that refers to a Linux image shared by Ali Hadi, Assistant Professor at Vermont's Champlain College . The question refers to the original filename of a block ID. The relationship between filenames and block ID's in Linux was not readily apparent to me, even after a Google search which led me to a SANS presentation by Kevvie Fowler which involved using hdfs terminal commands (only viable after loading Hadoop tools on Linux) and perfoming a "checkpoint" to ensure accurate results...maybe there's an easier way. My next stop after loading the file HDFS-MASTER.E01 into Autopsy was to check /home/hadoop/.bash_history to see if a file had been copied and enter the original filename as the flag. mapred-site.xml.template was not the answer, however. Fortunately, I had multiple tries at the answer this week. A keyword search in Autopsy for the block ID: Turned up this related file: Which was not the...
Comments
Post a Comment