November 14, 2019
Arsenal is unlike other digital forensics software vendors in the sense that we are consultants involved in casework first and software developers second. We build tools when we find valuable information being left behind by existing tools and techniques. In other words, if existing tools and techniques could deliver what we needed from our electronic evidence, we would happily buy or otherwise leverage them rather than launch ourselves into (often frustrating) software development. We are in a good position to know that our tools offer powerful and unique functionality, and we are doing what we can to make maximum exploitation of electronic evidence more accessible to our customers.
I once heard an interview with Todd McFarlane in which he said his company McFarlane Toys was not in competition with major toy manufacturers, but living in the gaps they left behind. For example, a major toy company might have a large number of requirements for their designers such as only applying a certain number of colors or a certain level of detail to a model. He explained that the models created by his company were not constrained by the same requirements, and were targeted at a different kind of consumer… a consumer who wanted more complex and authentic models. This interview left an impression on me, as he was describing what we do at Arsenal. We don’t build a “does everything” suite, we live in the gaps left by other digital forensics vendors and build surgical tools that expose information we could not have otherwise… which has proven incredibly valuable in our casework, and we hope in yours as well.
If you practice digital forensics and are familiar with the powerful and unique things our tools can do, please let others know… you will be helping us with our mission, as we work hard to help you with yours.
We have been working aggressively for the last month on an extension to our Windows authentication bypass that some of our colleagues in digital forensics will find quite shocking. While we continue this work, we have decided to launch another version of AIM with some new features requested by our customers.
When the United States Army asked us if Arsenal Image Mounter’s Windows authentication bypass could be extended to handle domain accounts protected by smart cards, we were not sure it would be possible… but we knew if it could be done, it would be our team to do it.
I am announcing today, thanks to some gentle nudging from my team, that Arsenal is dramatically expanding our educational program. We are now providing free subscriptions each semester not only to professors at colleges and universities, but to students as well.
Join our mailing list to arm yourself with updates about Arsenal tools, training, and research. Our mailing list is double opt-in so you will need to check your email and confirm your subscription before receiving our mailings.
or (617) 277-3625
Terms & Conditions