November 14, 2019
Arsenal is unlike other digital forensics software vendors in the sense that we are consultants involved in casework first and software developers second. We build tools when we find valuable information being left behind by existing tools and techniques. In other words, if existing tools and techniques could deliver what we needed from our electronic evidence, we would happily buy or otherwise leverage them rather than launch ourselves into (often frustrating) software development. We are in a good position to know that our tools offer powerful and unique functionality, and we are doing what we can to make maximum exploitation of electronic evidence more accessible to our customers.
I once heard an interview with Todd McFarlane in which he said his company McFarlane Toys was not in competition with major toy manufacturers, but living in the gaps they left behind. For example, a major toy company might have a large number of requirements for their designers such as only applying a certain number of colors or a certain level of detail to a model. He explained that the models created by his company were not constrained by the same requirements, and were targeted at a different kind of consumer… a consumer who wanted more complex and authentic models. This interview left an impression on me, as he was describing what we do at Arsenal. We don’t build a “does everything” suite, we live in the gaps left by other digital forensics vendors and build surgical tools that expose information we could not have otherwise… which has proven incredibly valuable in our casework, and we hope in yours as well.
If you practice digital forensics and are familiar with the powerful and unique things our tools can do, please let others know… you will be helping us with our mission, as we work hard to help you with yours.
You may find (like Allan did) that immediately after launching disk images from Windows servers and workstations on the same network into virtual machines, they start talking to each other normally… or, much less often in our experience, you may find that they do not.
At Arsenal we know that questions can not only be dumb (we are reformed offenders), but given our experience in litigation, misleading and even weaponized to harm… without answers ever being involved. Lawyers know this, and if you are a digital forensics practitioner, you should too.
We have been working aggressively for the last month on an extension to our Windows authentication bypass that some of our colleagues in digital forensics will find quite shocking. While we continue this work, we have decided to launch another version of AIM with some new features requested by our customers.
Join our mailing list to arm yourself with updates about Arsenal tools, training, and research. Our mailing list is double opt-in so you will need to check your email and confirm your subscription before receiving our mailings.
or (617) 277-3625
Terms & Conditions