8:00 AM - Registration/Breakfast
9:00 AM to 9:15 AM - General Session Welcome - Warren Kruse
9:15 AM to 10:15 AM - Keynote Speaker Heather Mahalik – Under Pressure – How to Make Sure You Don’t Burn Yourself in DFIR
- Pressure may mean different things to all of us. Does pressure stress you out? Does pressure help you do your best work? What if you agreed to “find the smoking gun” and you can’t? Whoever said we must be perfect is greatly mistaken. We are human and we all make mistakes, and we must learn how to handle the pressure we put on ourselves and what other push upon us. This keynote is going to discuss several things to include mistakes Heather has made during her 20+ years in DFIR and how she overcame them. Why were these mistakes made and how can you potentially avoid them from happening to you? In addition, how can we learn to deal with the pressure of not being able to solve a case or “find a smoking gun” that is being asked of us? Sometimes we grow when the evidence doesn’t speak to us. This talk will help you learn to manage expectations, accept that mistakes will be made, and see the growth in what happens when the evidence isn’t what someone told us it should be.
10:15 AM 10:45 AM - Networking Break / Visit Vendors
10:45 AM - 11:45 AM - Breakout Sessions
- Vehicle System Forensics: Damaged and Unsupported Devices - Shanon Burgess
Over the past two decades, digital data stored within vehicle systems has been highly useful in determining the events leading to a crash, especially when combined with traditional accident reconstruction techniques. With the proliferation of Internet of Things (IOT), the sources of that data have grown exponentially and techniques for applying that data have been refined and expanded. These sources of data range from engine control modules (ECM), airbag control modules (ACM), infotainment modules, telematics modules, etc. For these reasons, the demand for successful retrieval of vehicle systems data is increasing. Berla being the only mainstream commercial tool targeted directly at the vehicle system forensics community. While Berla does a great job and continues to add support for new vehicles every day, what about all the unsupported vehicles? Severe crashes are no exception either and often present a unique challenge to reconstruction experts because these vehicle system modules-which contain the crash data-are often damaged in serious crashes. When the modules themselves are unsupported and/or damaged; whether it be physical, fire, or water damage; standard techniques for data retrieval may be impossible without performing chip level forensics. Specifically, chip-off, in-system programming (ISP), and chip-swap forensics–wherein the data bearing components from a damaged module/device are transplanted onto a surrogate module/device. This presentation addresses the challenges of data retrieval from unsupported and damaged vehicle system modules based on prior research and current work on the subject.
- Platinum Sponsor OpenText Lab - The Power of EnCase & Keys to Collecting Forensic Images - Victor De La Pena
As the number of devices and the amount of information on those devices increases, digital forensic investigators are overwhelmed with the places the need to search for evidence. This is resulting in increased case backlogs and strain on both corporate and law enforcement investigation resources. Learn how EnCase digital forensic investigation solutions help examiners get to the truth faster and more reliably. The increasing diversity, size and sophistication of digital media complicates evidence collection. Investigators need to be able to quickly image suspect devices, improve their efficiency and ensure forensic integrity. Learn about the new capabilities Tableau Forensic delivers in providing cost-effective, reliable, portable standalone forensic imaging of physical media for digital forensic investigations.
- Disk Images are Gamblers and Virtualization is Vegas - Mark Spencer
While there are many obvious benefits to interacting with disk images running in virtual machines, there are less obvious (but no less important) benefits if you truly appreciate the incredible control you have over a disk image running in a virtual machine. Attendees of this presentation will be exposed to these less obvious benefits via a combination of lecture and demonstrations. While Arsenal Image Mounter will be used to demonstrate launching Windows domain controllers and workstations into virtual machines to unlock secrets on workstations without any credentials, bypassing the Windows Data Protection API, and more, some of the concepts discussed during this presentation will apply regardless of the particular tools being used.
- Investigating Linux Systems - Ali Hadi & Mariam Khader
Linux forensics is an important skill for anyone looking to work in the field of digital forensics. It provides a powerful set of tools and techniques to investigate and analyze digital evidence, allowing experts to uncover data that may be hidden or deleted from a computer system. It is also useful in law enforcement, intelligence, and other areas of investigation.
This workshop aims to help digital forensic investigators to effectively identify and analyze digital evidence on a Linux system and gain a better understanding of incidents that occurred on the system. The goal of this workshop is to learn more about:
1. The Linux operating system and its file system hierarchy
2. How to locate and acquire evidential data from a Linux system
3. How to analyze Linux file systems and system log files
4. The forensic tools that can be used to investigate a Linux system
11:45 AM - 12:45 PM - Lunch
12:45 PM - 1:45 PM - Breakout Sessions
- Memory Forensics with Volatility 3 - George Bell
In 2020, the Volatility Foundation publicly released a complete rewrite of its framework, Volatility. Three years on and in my experience, people still struggle with the implications of this rewrite. Most notably, Volatility 3 uses symbols, not profiles. This poses severe challenges when one's analysis must be done in a disconnected environment with no access to the symbol servers. The intent of this briefing is to discuss methodologies for overcoming these challenges.
- Platinum Sponsor OpenText - Elevating Investigations with Targeted Collection - Seine Ly
Organizations are now tasked with more types of investigations than ever; HR issues, compliance violations, regulatory inquiries, IP theft and more. To solve these issues, organizations may need to look deeper into an employee’s activity discreetly and even remotely without sacrificing employee productivity. But often these investigations can lead to collecting an overwhelming about of data that puts a strain on already overburdened investigation teams. Join this session to learn how to combine digital forensic investigation capabilities with targeted collections in order to improve the efficiency and effectiveness of your investigations.
- Hunting Threat Actors using OSINT Forensics - Abi Waddell
Little attention is given to tracking the perpetrators of cyber-attacks in the world of forensics. Using real world examples, I will present some OSINT methods to trace the location and identity of threat actors, including revealing deleted parts of screenshots/PDFs, discerning fake accounts, finding suspicious VPN addresses, uncovering identities from pseudonyms; using account leaks, search engine analytics, maps, social media, images and more. I will also present the results of my original research of thousands of leaked accounts, into identifying gender, age and predicted passwords in use, which can assist in threat actor identification.
- Unraveling Cybercrime: Harnessing the Power of ChatGPT in Criminal Investigations - Cynthia Navarro and Laura Chappell
The rapid development of artificial intelligence and natural language processing technologies has introduced novel methods for solving complex problems in various domains, including cybercrime investigations. This presentation delves into the capabilities, versions, and applications of ChatGPT, a state-of-the-art language model developed by OpenAI, to assist law enforcement agencies in combating cybercrime.
We begin by providing an overview of ChatGPT's evolution, highlighting the major enhancements introduced in each version, and discussing how these advancements have improved the model's performance in generating accurate and coherent responses. Subsequently, we explore the various ways in which ChatGPT can been employed in cybercrime investigations, including but not limited to: analyzing digital evidence, generating investigative leads, deciphering encrypted communications, and identifying potential criminal patterns.
To further illustrate the practical application of ChatGPT in an investigative context, we present a case study detailing the creation of a murder mystery lab. This interactive simulation harnesses the power of ChatGPT to generate complex, multi-layered narratives that challenge investigators to practice their prompt-writing skills, critical thinking, and deductive reasoning. Participants in the lab are required to utilize ChatGPT to solve the murder mystery, as well as to identify additional leads and connections to other potential criminal activities.
By showcasing the remarkable potential of ChatGPT in tackling real-world problems, our presentation aims to demonstrate the importance of integrating AI technologies into modern investigative strategies and to inspire further research into the development of more advanced and specialized tools for the cybercrime investigation domain.
1:45 PM - 2:15 PM - Networking Break / Visit Vendors
2:15 PM - 3:15 PM - Plenary- Cryptocurrency Crimes and Investigations - Robert Whitaker
Romance Scams, Investment Scams, and ATM related Scams
3:15 PM - 3:30 PM - Networking Break / Visit Vendors
3:30 PM - 4:30 PM - Breakout Sessions
- Input and Output + Syslog (iO+S) Accessing Locked iOS Devices - Jessica Hyde and Nick Dubois
- A Case Study in the Daisy-Chain Compromise of a Lawyer - Mark Spencer
Arsenal has found the only known case of an attacker leveraging the compromised email account of a high-value target (a lawyer) to then compromise that same target's computer and deliver incriminating documents. The particular technique used by the attacker involved the abuse of IMAP functionality over a significant period of time. The attacker in this case was successful, and the consequences for the victim were (and continue to be) devastating. Due to the sensitive nature of this presentation, it is only available in-person and recording will not be allowed.
- Forensic Analyses of Audio and Video Evidence - Herbert Joe
Audio, acoustics, voice and video evidence are common in civil and criminal litigation. Such evidence is often extracted from computer or mobile devices. All parties must at least be generally familiar with what can (and cannot) be done forensically and legally with such evidence, e.g., forensic authenticity analyses, digital signal processing (enhancement), etc. Learn generally what can and cannot be done, whether you're the proponent or opponent of the evidence, and whether a case needs a consulting, rebuttal or testifying expert witness.
- How Security Ninjas Hunt Threats in Response - Roberto Martinez
When a cyber-attack impacts an organization, Incident Responders needs to use threat intelligence and an arsenal of tools to hunt and contain the threats.
In this workshop, the participants will learn how to use different tools like Yara and Sigma Rules, and apply the basic concepts of Detection Engineering, Threat Intelligence, and Threat Hunting.
5:30 PM - 7:30 PM - Networking Reception