All right, Let me, uh, hit on the question for here, but
ah, the crystal ball question. What's the What's the future of Evan entry?
So, yes. So we've been working on some some fun things lately. The main focus that we've had has bean on supporting logical acquisition. Uh, so,
um, I gave a presentation at death out of us conferencing Portland's in July
on the work that we've been doing on forensic jail breaking off iPhones. Eso
to sort of to cut it short, I think we're entering a world now where devices are increasingly locked down. And,
um, if you, you know, you look at the most recent Mac books. Um, I think it's since high Sierra, we've had access to the primary physical disc locked down from from you from
use the space even if you've got room.
Um, so you know, we're going to a world where we're not gonna have physical everywhere A ll the time anymore. So what? We've been living with that for iPhones down for a while. Yeah. Yeah, exactly. That kind of the
We've kind of been ignoring that over in the disc. Forensic kind of world. Have it. There's a lot of people that just do either or and gather view, boys.
so the talk I gave it the a part of us was showing some of the work we've been doing on using,
um, open source jailbreaks to, uh, get higher level access inside an iPhone and be able to do full ball system. Logical images.
So basically, we've we've because ever met Tree is focused on both dead disc and live forensics. We already have a live agent that runs on Mac clinics and windows and does volatile memory and does physical disc.
Um, so that particular application's been out testing ground for implementing logical acquisitions.
Ah, and ah,
um, that's ah, uh, something That's, um
we've got a few users already out there using the theological
format changes to a fit for
um, the main thing that we're working on at the moment is not so much the theological imaging stuff which we've already done. It's the although the system level stuff, so that we can actually point a ah, regular forensic tool at Indian progress. Logical AC was issued and actually start doing some analysis.
taking the stuff that we really do with physical that enables live analysis, what during acquisition and making that work for the logical sense.
Um, do you handle a lot of iPhones in your civil practice?
Uh, yeah. We get quite a few of those, Um, and it's bean kind of. Ah,
I I'm sure you see as well. Yes. It's a common problem of the last
a few years,
we've been taking a lot of iPhones and putting them in our evidence locker for six months or so on waiting for a jailbreak to come out and then using whichever jailbreak is applicable.
And that's been giving us a reasonable access to, um the
a little of that other evidence that you wouldn't get out of a regular backup Beiste acquisition. And it's been really great evidence that in there that you just Oh, yeah,
I don't know. Look at and system logs and everything else is, you know, all tucked away in there.
Yeah. Yeah. And like just ah, excesses of traces of access and the like. So this bit of work I was doing was really looking at. Well, how can we safely jailbreak phones? Um, that's That's always a concern, right? That's it.
just gonna wreck this thing
exactly. Because, you know, with just downloading a jailbreak, you don't know
the technique the jailbreak uses. You don't know the origin of the code. You don't know what else could be doing.
Um, what else could be downloading?
Uh, etcetera. Say, um
the interesting part about doing forensic jailbreaking is that
you actually need Thio do a whole lot less work. Really, all you need to do is to get yourself, um,
privileged access to the false system.
Whereas if you're if you're a jailbreak, you also need to be able to re mount the false system Installed package managers in stall two weeks Is a whole lot of other heavyweight changes that a regular jailbreak makes telephone that really,
from a forensic perspective, we really want to avoid
so, um, having exploitation approach that is just very minimal. Task specific and limited. Thio. Just getting the access that we need is,
I think, the important thing to do moving forward with with my ball forensics and and as well, I think, possibly even live computer forensics.
it's about to ask you the whole great key question, but I think we'll table that one.
Just not get into that.
Yes. So I think I think sort of keeping going on where I was going, the way we haven't. Um uh we haven't done anything publicly with that bit of the prototype that we built.
Um, the primary reason for that has bean, um, the release of the new boot Rahm Exploit. Um, yeah. Yeah, that, uh,
is appears, Thio,
open up a lot more opportunities for lower level acquisition, so way kind of not seeing the need for,
um when it was kind of just what you described. They're just sort of gave you access only. Didn't really do anything beyond that.
um, so yellow. It can't constantly she think Sands, what else we're working on. Um,
so really, we, uh, trying thio grow out even further? Kind of that the system forensic story that we've been focusing on so obviously ever met Tree grew
out of the desire to do real work and speed up acquisitions of large numbers of computers at the same time.
So, you know, at that point, large numbers of computers was sort of in the the multiple tens.
Um, but the future that we looking at really well looking to address the problem of
forensics of thousands of you visit a time. So it's a large enterprise. Forensics.
Yeah, exactly. Yeah. We definitely run into that here,
you know, and and also, you know, remote over distance, right? Like, really two separate enterprises, right? Our European and our Latin American operations and, you know, and and and and
Yeah. Yeah. And so the challenge is there. Ah, ah, uh uh.
Many and varied. But, um, the the work that we've done around being able to,
shift evidence storage devices as close as possible to,
um, the suspect machines, I think is something that particularly works particularly well when you're dealing with forensics in the cloud or absolutely, club location. Whatever. Yeah,
the what we're working on at the moment is really taking all of those those
building blocks that we've already got in place and making them easier to arrange on the board. And, uh
um, um scale up
I would add anything else that is there in a f F five coming.
I don't know about a secret air 55 There is no way for five. At the moment, I think I think we'll concentrate on getting the A fitful, logical stuff. Some consensus around that. We've just
support for as before.
So if you're wanting Thio
Ah, a choir,
an image that's encrypted,
um, sometimes do it.
Oh, no. I realize some people have a requirement to do it. Things like that. Just, uh, you've probably run into this in your civil practice, the very least, or maybe in the criminal side. You know, uh, it gets encrypted out there by somebody, and they failed to do proper documentation because
we never do our documentation the right way on. And then, uh, you know, and then four years later, down the road, when it's, you know, right before that thing's headed into a courtroom or depositions or something.
Oh, wow. Who's got the password for this? Nobody knows. Nobody's got the key anymore. What? Whatever it was, you know, and,
you know, horrible conference, you know, situations created because of that.
I think. Excuse me. I think the, uh
I'm not convinced that, um ah,
the I suspect that speed is gonna be a problem if using encryption, you're not going to get the feeling out of the field as quick as you otherwise would have ever met. Cherie,
Um, that Yankee management is is the central problem. Right? Right.
So what? What we've done with the implementation is two very closely follow the full disk encryption approach off.
Um Ah. Well, sort of the encryption approach of I ps face. Um,
we are allowing people to encrypt the images using a password, but at the same time, you can actually have a ah, public key certificate that you could use a cz well, and have
that as another option for unlocking it. So
that's a great idea.
But, you know, obviously you don't least problem, Kate again, Back to the same problem.
Uh, have you ever had any of those problems on, like, a significantly long case where you know, we had one that ran eight years
and which is not normal, but big enough litigation? It's not uncommon.
And, uh, you know, you get that
call from some panic stricken attorney was like, Oh, my God. Oh, my God. We can't find the password anywhere. Do you guys still have it?
Well, of course we do, but you know, But they said switched in illegal teams two or three times, right?
Everything that was documented. This is long gone.
Yeah, And you know, from from from your perspective, you want to be really careful about how you manage that key came material, and that's that's an additional burden to protect it and, well, vice to protect it. And don't lose it.
Thio two big risks from a re Spanish perspective to your phone. Uh, we see it a lot in enterprise backup environments
where they've, you know, mandated, you know, encrypted backups,
and then their key management just is not solid. So some awful thing happens, right? And, you know, ransomware, whatever it might be,
And it ends up encrypting the keys because they're just laying on some system somewhere.
And, uh, you know now are backups are unavailable to
Yeah, that's Ah, that's a bad day right there.
All right. It's a lot about its
Computer Forensics File Formats: Why you Should be Using AFF4
If you’re not using AFF4 (Advanced Forensics File Format v4) then your forensics process is ...
1 CEU/CPE Hours Available
Certificate of Completion Offered
MITRE ATT&CK Defender™ (MAD) ATT&CK® SOC Assessments Certification Training
Do you know how to leverage the MITRE ATT&CK® framework to conduct Security Operations Center ...
2 CEU/CPE Hours Available
Certificate of Completion Offered