Skip to content

Commit 00fa5b8

Browse files
committed
cleanup8
1 parent 62822d8 commit 00fa5b8

31 files changed

+39
-69
lines changed

docs/anti_forensic_techniques.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -239,7 +239,7 @@ Code Breakers III, São Paulo, Brazil, Setember 2006.
239239

240240
## Externals Links
241241

242-
* [Anti-Forensics: The Next Step in Digital Forensics Tool Testing](https://www.digitrace.de/veroeffentlichung-2/fachliteratur/84-anti-forensics-the-next-step-in-digital-forensics-tool-testing),
242+
* [Anti-Forensics: The Next Step in Digital Forensics Tool Testing](https://www.researchgate.net/publication/261038911_Anti-Forensics_The_Next_Step_in_Digital_Forensics_Tool_Testing),
243243
in: IT Security Incident Management and IT Forensics (IMF): 2013
244244
Seventh International Conference on, Date 12-14 March 2013, IEEE, S.
245245
83 – 97

docs/apple_mail.md

-4
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,3 @@ system](operating_system.md). The latest version is 1.2 and was released in
99

1010
The [Apple Mail Header Format](apple_mail_header_format.md) is known for some
1111
versions of the program.
12-
13-
## External Links
14-
15-
* [Official website](https://www.apple.com/macos/ventura/)

docs/bibliography.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ by Christian Johansson, Masters Thesis, Blekinge Tekniska Hogskola, June 2003
101101

102102
# Theory
103103

104-
[A Hypothesis-Based Approach to Digital Forensic Investigations](https://www.cerias.purdue.edu/tools_and_resources/bibtex_archive/archive/2006-06.pdf),
104+
[A Hypothesis-Based Approach to Digital Forensic Investigations](https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/2006-06.pdf),
105105
by Brian D. Carrier, Ph.D. Dissertation Purdue University, May 2006
106106

107107
# Other Papers

docs/blogs.md

+1-2
Original file line numberDiff line numberDiff line change
@@ -45,12 +45,11 @@ like: blogs, fora, tweets, tools and challenges (and test images).
4545
by Matt Edmondson
4646
- [Digital Forensics with a Focus on EnCase](https://secureartisan.wordpress.com/),
4747
by Paul Bobby
48+
- [Digital Forensics Notes](https://digfor.blogspot.com/)
4849
- [Dlog](https://dan3lmi.blogspot.com/),
4950
by Daniela Elmi
5051
- [eForensics Magazine blog](https://eforensicsmag.com/category/news/)
5152
- [Elcomsoft Blog](https://blog.elcomsoft.com)
52-
- [Elvidence Computer Forensics Blog](https://www.elvidence.com.au/blog),
53-
see also [Digital Forensics Notes](https://digfor.blogspot.com/)
5453
- [FireEye Blogs](https://www.trellix.com/en-us/about/newsroom/stories.html)
5554
- [Forense nella Nebbia](https://forensenellanebbia.blogspot.com/),
5655
by Gabriele Zambelli

docs/cell_phone_forensics.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -101,5 +101,5 @@ Training
101101
* [SANS: FOR585: Smartphone Forensic Analysis In-Depth](https://www.sans.org/cyber-security-courses/advanced-smartphone-mobile-device-forensics/)
102102
* [Teel Technologies Smartphone training](http://www.teeltech.com/mobile-device-forensics-training/)
103103
* [Mobile-Forensics.com (Research Forum for Mobile Device Forensics)](http://www.mobile-forensics.com/)
104-
* [Paraben-Forensics.com (Paraben's Handheld Forensic Training Classes)](https://paraben.com/dfir-training-3/)
104+
* [Paraben-Forensics.com (Paraben's Handheld Forensic Training Classes)](https://paraben.com/digital-investigation-training-courses/)
105105
* [Micro Systemation Training (Mobile Forensics Training)](https://www.msab.com/)

docs/cellebrite_ufed.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ videos stored on the phone), and time and date stamps.
2323

2424
## External Links
2525

26-
- [Official website](https://www.cellebrite.com/UFED-Standard-Kit.html)
26+
- [Product website](https://cellebrite.com/en/ufed/)

docs/cloud_forensics.md

+2-3
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,12 @@ tags:
55
---
66
Cloud Forensics, for a lack of better term, is considered the intersection
77
between [cloud computing](https://en.wikipedia.org/wiki/Cloud_computing) and
8-
network forensic analysis.
9-
[1](https://resources.infosecinstitute.com/topic/overview-cloud-forensics/)
8+
network forensic analysis. [1](https://resources.infosecinstitute.com/topics/digital-forensics/overview-cloud-forensics/)
109

1110
## External Links
1211

1312
* [Wikipedia: Cloud computing](https://en.wikipedia.org/wiki/Cloud_computing)
14-
* [Cloud Forensics: An Overview](https://resources.infosecinstitute.com/topic/overview-cloud-forensics/),
13+
* [Cloud Forensics: An Overview](https://resources.infosecinstitute.com/topics/digital-forensics/overview-cloud-forensics/),
1514
by Dejan Lukan, January 2, 2014
1615

1716
### Technologies

docs/cloud_forensics_research.md

-1
Original file line numberDiff line numberDiff line change
@@ -213,7 +213,6 @@ location="Monterey, CA",
213213
` number = {2},`
214214
` year = {2010},`
215215
` pages = {2--12},`
216-
` url="`[`https://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf`](https://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf)`"`
217216

218217
} </bibtex>
219218

docs/conferences.md

+1-2
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,7 @@ BSides Security (various locations)
2525
CanSecWest
2626
<https://www.secwest.net/>
2727

28-
Computer Technology Investigators Network (CTIN) Digital Forensics Conference
29-
<https://ctin.org/>
28+
[Computer Technology Investigators Network (CTIN)](https://ctin.org/) Digital Forensics Conference
3029

3130
Conference on Digital Forensics, Security and Law
3231
<https://www.digitalforensics-conference.org/>

docs/dcfldd.md

+2-5
Original file line numberDiff line numberDiff line change
@@ -47,12 +47,9 @@ This tool is not suitable for imaging faulty drives:
4747

4848
- dcfldd is based on an extremely old version of [dd](dd.md):
4949
it's known that dcfldd will misalign the data in the image after a
50-
faulty sector is encountered on the source drive ([see the NIST
51-
report](https://www.cyberfetch.org/groups/community/test-results-digital-data-acquisition-tool-dcfldd-134-1)),
50+
faulty sector is encountered on the source drive ([see the NIST report](https://www.dhs.gov/sites/default/files/publications/DCFLDD%201%203%204-1%20Test%20Report_updated.pdf)),
5251
and this kind of bug (wrong offset calculation when seeking over a bad
53-
block) was fixed for [dd](dd.md) in 2003 ([see the fix in the
54-
mailing
55-
list](https://lists.gnu.org/archive/html/bug-coreutils/2003-10/msg00071.html));
52+
block) was fixed for [dd](dd.md) in 2003 ([see the fix in the mailing list](https://lists.gnu.org/archive/html/bug-coreutils/2003-10/msg00071.html));
5653
- similarly, dcfldd can enter an infinite loop when a faulty sector is
5754
encountered on the source drive, thus writing to the image over and
5855
over again until there is no free space left.

docs/email_research.md

-9
This file was deleted.

docs/encase_image_file_format.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -130,5 +130,5 @@ products.
130130
by the [libewf project](libewf.md), March 2006
131131
- [Expert Witness Compression Format (EWF) version 2](https://github.com/libyal/libewf/blob/main/documentation/Expert%20Witness%20Compression%20Format%202%20(EWF2).asciidoc),
132132
by the [libewf project](libewf.md), July 2012
133-
- [Validation of forensic images for assurance of digital evidence integrity](https://researchrepository.murdoch.edu.au/id/eprint/24962/1/whole.pdf),
133+
- [Validation of forensic images for assurance of digital evidence integrity](https://researchportal.murdoch.edu.au/esploro/outputs/graduate/Validation-of-forensic-images-for-assurance/991005544234707891),
134134
by James Michael McCutcheon, November, 2014

docs/executable.md

-1
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,6 @@ There are multiple families of executable files:
5959
by [Microsoft](microsoft.md)
6060
* [Internet Archive: Microsoft Symbol and Type Information](http://web.archive.org/web/20070915060650/http://www.x86.org/ftp/manuals/tools/sym.pdf),
6161
by [Microsoft](microsoft.md)
62-
* [Microsoft Symbol and Type Information](https://pierrelib.pagesperso-orange.fr/exec_formats/MS_Symbol_Type_v1.0.pdf)
6362
* [Stream Descriptions](https://code.google.com/archive/p/pdbparse/wikis/StreamDescriptions.wiki),
6463
[pdbparse project](https://github.com/moyix/pdbparse/)
6564
* [libmsdebug](https://sourceforge.net/p/mingw-w64/code/HEAD/tree/experimental/tools/libmsdebug/),

docs/facebook_forensics.md

-3
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,3 @@ you parse them.
5151
- [Belkasoft Evidence Center](https://belkasoft.com/) allows for carving
5252
Facebook data such as chats, wall posts and photos from Live RAM
5353
dumps, hibernation and pagefiles.
54-
- [WebPreserver](https://webpreserver.com/facebook-forensics/) captures
55-
Facebook wall posts and about information as well as metadata in a
56-
legally authenticated manner.

docs/incident_response.md

-2
Original file line numberDiff line numberDiff line change
@@ -69,8 +69,6 @@ victims can be easier if they stand out from the crowd.
6969

7070
* [Expanding the Expanded Incident Lifecycle](http://www.itsmsolutions.com/newsletters/DITYvol5iss7.htm),
7171
by Janet Kuhn, February 18, 2009
72-
* [Incident lifecycle](https://www.enisa.europa.eu/activities/cert/support/incident-management/browsable/workflows/incident-lifecycle),
73-
by [ENISA](enisa.md)
7472

7573
### Intrusion Analysis
7674

docs/mac_os_x.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -274,7 +274,7 @@ Mac OS.
274274

275275
### iCloud
276276

277-
* [iCloud: iCloud security and privacy overview](https://support.apple.com/en-us/HT202303)
277+
* [iCloud: iCloud security and privacy overview](https://support.apple.com/en-us/102651)
278278

279279
### ColorSync
280280

docs/mailing_lists.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ There are a number of mailing lists of interest to Digital Forensics
66
Practitioners. Below is a listing of some more well known lists. It is
77
not all-inclusive.
88

9-
- [American Academy of Forensic Science, Digital and Multimedia Sciences Section](https://www.aafs.org/digital-multimedia-sciences) -
9+
- [American Academy of Forensic Science, Digital and Multimedia Sciences Section](https://www.aafs.org/membership/digital-multimedia-sciences) -
1010
Subscription requires moderator approval. The archive is only
1111
available to list members. This list supports the Digital and
1212
Multimedia Sciences section in the AAFS. Subscribe by sending an email

docs/metadata.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ property set streams. Here are some tools for processing them:
6464
implementation in Java.
6565
- [SquirrelGripper Perl script](https://cheeky4n6monkey.blogspot.com/2012/05/perl-script-plays-matchmaker-with.html)
6666
Extract fields into SQLite Database.
67-
- [FOCA - Eleven Paths](https://www.elevenpaths.com/labstools/foca/index.html)
67+
- [FOCA - Eleven Paths](https://cybersecuritycloud.telefonicatech.com/en/innovation-labs/innovation-technologies/foca)
6868
Scan and group metadata information.
6969

7070
[TIFF](tiff.md)

docs/network_data_visualizations.md

+8-14
Original file line numberDiff line numberDiff line change
@@ -2,20 +2,14 @@
22
tags:
33
- No Category
44
---
5-
## See Also
5+
## External links
66

7-
Very basic visualization with no discrimination between packet types:
8-
<https://research.swtch.com/tcpviz>
7+
* [Visualizing TCP congestion avoidance algorithm](http://marc.herbert.free.fr/TCP/congestion/),
8+
by Marc Herbert, October 25, 2002
9+
* [Visualizing TCP](https://research.swtch.com/tcpviz),
10+
by Russ Cox, December 13, 2010
911

10-
Manual for Cisco commercial product with broad range of visualizations:
11-
<https://www.cisco.com/en/US/docs/net_mgmt/application_analysis_solution/1.0/tutorials_and_examples/tut_ace.pdf>
12+
## Tools
1213

13-
Examination of congestion control strategy with xplot visualization:
14-
<http://marc.herbert.free.fr/TCP/congestion/>
15-
16-
Very cool video visualization of TCP flows:
17-
<https://github.com/aristus/packet-flight/tree/master/packet_flight/js>
18-
(facebook example: <https://vimeo.com/17248120>)
19-
20-
Software project that visualizes TCP flows:
21-
<http://research.protocollabs.com/captcp/>
14+
* [Captcp](http://research.protocollabs.com/captcp/)
15+
* [packet-flight](https://github.com/aristus/packet-flight/tree/master)

docs/new_technology_file_system_(ntfs).md

-2
Original file line numberDiff line numberDiff line change
@@ -145,8 +145,6 @@ TxF uses the [Common Log File System (clfs)](common_log_file_system_(clfs).md)
145145
* [Wikipedia: NTFS Reparse point](https://en.wikipedia.org/wiki/NTFS_reparse_point)
146146
* [MSDN: Transactional NTFS](https://learn.microsoft.com/en-us/windows/win32/fileio/transactional-ntfs-portal)
147147
* [Wikipedia: Transactional NTFS](https://en.wikipedia.org/wiki/Transactional_NTFS)
148-
* [Linux-ntfs Documentation](https://sourceforge.net/directory/file-systems/)
149-
Detailed documentation of the NTFS format by the Linux-NTFS driver creators.
150148
* [Default cluster size for NTFS, FAT, and exFAT](https://support.microsoft.com/en-us/topic/default-cluster-size-for-ntfs-fat-and-exfat-9772e6f1-e31a-00d7-e18f-73169155af95)
151149
* [Distributed Link Tracking and Object Identifiers](https://learn.microsoft.com/en-us/windows/win32/fileio/distributed-link-tracking-and-object-identifiers)
152150
* [New Technologies File System (NTFS)](https://github.com/libyal/libfsntfs/blob/main/documentation/New%20Technologies%20File%20System%20(NTFS).asciidoc),

docs/organizations.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ tags:
1111

1212
* [National Computer Forensic Institute](national_computer_forensic_institute.md)
1313
* [Computer Crime and Intellectual Property Section of the Department of Justice](https://www.justice.gov/criminal-ccips)
14-
* [Computer Technology Investigators Network](https://www.ctin.org/)
14+
* [Computer Technology Investigators Network](https://ctin.org/)
1515
* [National Institute of Justice](https://www.ojp.gov/about/offices/national-institute-justice-nij)
1616
* [National Center for Forensic Science](https://ncfs.ucf.edu/)
1717
* [National Institute of Standards and Technology, Computer Forensic Tool Testing](https://www.nist.gov/itl/ssd/software-quality-group/computer-forensics-tool-testing-program-cftt)

docs/paraben_cell_seizure.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -63,4 +63,4 @@ has been acquired.
6363

6464
## External Links
6565

66-
* [Paraben](https://paraben.com/smartphone-forensic-tools/)
66+
* [Product website](https://paraben.com/e3-mobile-smartphone-forensics/)

docs/paraben_device_seizure.md

+4
Original file line numberDiff line numberDiff line change
@@ -40,3 +40,7 @@ Paraben's Device Seizure also supports the following types of GPS
4040
Devices with more manufacturers to follow:
4141

4242
- Garmin
43+
44+
## External links
45+
46+
* [Product website](https://paraben.com/e3-mobile-smartphone-forensics/)

docs/paraben_stronghold_bag.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,4 @@ evidence.
2727

2828
## External Links
2929

30-
* [Paraben](https://paraben.com/wireless-device-protection/)
30+
* [Product website](https://paraben.com/stronghold-faraday-protection/)

docs/prefetch.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -233,7 +233,7 @@ The EnablePrefetcher Registry value can be used to disable prefetch.
233233
by Jared Atkinson, September 21, 2013
234234
* [Windows Prefetch (.PF) files](https://www.swiftforensics.com/2013/10/windows-prefetch-pf-files.html?m=1),
235235
by Yogesh Khatri, October 21, 2013
236-
* [Windows Systems and Artifacts in Digital Forensics: Part III: Prefetch Files](https://resources.infosecinstitute.com/topic/windows-systems-artifacts-digital-forensics-part-iii-prefetch-files/),
236+
* [Windows Systems and Artifacts in Digital Forensics: Part III: Prefetch Files](https://resources.infosecinstitute.com/topics/digital-forensics/windows-systems-artifacts-digital-forensics-part-iii-prefetch-files/),
237237
by Ivan Dimov, November 21, 2013
238238
* [Prefetch 101 - a Windows 8 Prefetch file walkthrough](https://i.imgur.com/riuljsK.jpg),
239239
by Jared Atkinson, 2014

docs/sms.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -36,8 +36,8 @@ will be overwritten with the contents of the new message.
3636
- [pySIM](https://github.com/osmocom/pysim), a "SIM card
3737
management tool, capable of creating, editing, deleting, backup and
3838
restore operations on your SIM Phonebook and SMS records."
39-
- [adafruit industries](https://www.adafruit.com/category/27) has a
40-
low-cost SIM reader kit that you can get from their website.
39+
- [Adafruit Industries](https://www.adafruit.com/) has a low-cost SIM reader
40+
kit that you can get from their website.
4141

4242
## External Links
4343

docs/solid_state_drive_(ssd)_forensics.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ drive, with the following features:
7575
`volume=5,`
7676
`issue=3,`
7777
`year=2011,`
78-
`url={`[`https://researchrepository.murdoch.edu.au/id/eprint/3714/1/solid_state_drives.pdf`](https://researchrepository.murdoch.edu.au/id/eprint/3714/1/solid_state_drives.pdf)`}`
78+
`url={`[`https://researchportal.murdoch.edu.au/esploro/outputs/journalArticle/Solid-State-Drives-The-Beginning-of/991005543502107891`](https://researchportal.murdoch.edu.au/esploro/outputs/journalArticle/Solid-State-Drives-The-Beginning-of/991005543502107891)`}`
7979

8080
} </bibtex> <bibtex> @inproceedings{Billard:2010:MSU:1774088.1774426,
8181

docs/tape.md

-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,6 @@ encoded data on magnetic tape.
1616

1717
## Links
1818

19-
* [Microsoft Tape format reader](https://sourceforge.net/directory/backup/)
2019
* [MTF Format specification](http://laytongraphics.com/mtf/MTF_100a.PDF)
2120
* [Linux MTF tape parsing tool](http://www.laytongraphics.com/mtf/mtf-0.2.1.tgz)
2221
* [Java Parser for MTF Tape format](https://sourceforge.net/projects/jmtf/)

docs/the_grugq.md

+2-1
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,5 @@ and is the author of [Hash](hash_(tool).md) (**ha**cker
2323

2424
### External Links
2525

26-
- [CSO Online interview with The Grugq](https://www.csoonline.com/article/2121184/where-is-hacking-now--a-chat-with-grugq.html)
26+
* [Where Is Hacking Now? A Chat with Grugq](https://www.csoonline.com/article/519514/network-security-where-is-hacking-now-a-chat-with-grugq.html),
27+
March 12, 2007

docs/windows_application_compatibility.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -32,11 +32,11 @@ In Windows 2003 and later:
3232
by [Microsoft](microsoft.md)
3333
* [Application Compatibility Database](https://learn.microsoft.com/en-us/windows/win32/devnotes/application-compatibility-database),
3434
by [Microsoft](microsoft.md)
35-
* [Secrets of the Application Compatilibity Database (SDB) – Part 1](https://www.alex-ionescu.com/?p=39),
35+
* [Secrets of the Application Compatilibity Database (SDB) – Part 1](https://www.alex-ionescu.com/secrets-of-the-application-compatilibity-database-sdb-part-1/),
3636
by Alex Ionescu, May 20, 2007
37-
* [Secrets of the Application Compatilibity Database (SDB) – Part 2](https://www.alex-ionescu.com/?p=40),
37+
* [Secrets of the Application Compatilibity Database (SDB) – Part 2](https://www.alex-ionescu.com/secrets-of-the-application-compatilibity-database-sdb-part-2/),
3838
by Alex Ionescu, May 21, 2007
39-
* [Secrets of the Application Compatilibity Database (SDB) – Part 3](https://www.alex-ionescu.com/?p=41),
39+
* [Secrets of the Application Compatilibity Database (SDB) – Part 3](https://www.alex-ionescu.com/secrets-of-the-application-compatilibity-database-sdb-part-3/),
4040
by Alex Ionescu, May 26, 2007
4141
* Leveraging the Application Compatibility Cache in Forensic Investigations
4242
by Andrew Davis, May 4, 2012

docs/zfs.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -9,5 +9,5 @@ ZFS is a combined file system and logical volume manager designed by
99
## External Links
1010

1111
* [Wikipedia: ZFS](https://en.wikipedia.org/wiki/ZFS)
12-
* [ZFS Forensics - Recovering Files From a Destroyed Zpool](https://tritondatacenter.com/blog/zfs-forensics-recovering-files-from-a-destroyed-zpool)
12+
* [ZFS Forensics - Recovering Files From a Destroyed Zpool](https://www.tritondatacenter.com/blog/zfs-forensics-recovering-files-from-a-destroyed-zpool),
1313
by M. Bruning, August 12, 2013

0 commit comments

Comments
 (0)