Publicly-Accessible Disk Images & Mobile Extractions Grid for DFIR

September 25th, 2024
By:  Emina Doherty,  Anastasia Shek

A question asked in our office, and maybe in yours - “Does anyone know which publicly-accessible disk images contain (insert your artifact of interest)?”

Read More
Published:
September 25th, 2024
 |  Topic(s):  NewsTraining

Introducing Arsenal Image Mounter v3.3.134 and DPAPI Bypass

October 26th, 2020
Three months ago I challenged the Arsenal team by suggesting that we could get more creative about how to access protected content in Windows. We did it!
Read More

Are there dumb questions in digital forensics?

August 25th, 2020
People who leverage Sagan’s “no such thing as a dumb question” quote often fail to provide some important context – he was referring to children, not adults.
Read More

Quick Tour of New Features in Arsenal Image Mounter v3.2.128

August 12th, 2020
Arsenal Image Mounter’s Windows authentication bypass is already more powerful than any other tools we are aware of, but that has not stopped us from continuing to push boundaries.
Read More

Quick Tour of New Features in Arsenal Image Mounter v3.2.126

June 15th, 2020
When the United States Army asked us if Arsenal Image Mounter’s Windows authentication bypass could be extended to handle domain accounts protected by smart cards, we were not sure it would be possible…
Read More

Accessing Protected Content using Windows Domain Controllers and Workstations

June 9th, 2020
While Windows password bypassing (particularly with AIM, which can bypass all types of Windows passwords) provides digital forensics practitioners with great opportunities, there are certain things...
Read More

Free Arsenal Educational Subscriptions

May 6th, 2020
Arsenal is dramatically expanding our educational program providing free subscriptions each semester not only to professors at colleges and universities, but to students as well.
Read More

The Interesting Case of Windows Hibernation and BitLocker

April 24th, 2020
Read More

An Inside View of Office Document Cache Exploitation

April 9th, 2020
Multiple versions of Microsoft Office documents could be extracted from FSD files found within Office Document Cache (on many kinds of devices, not just Windows workstations!).
Read More

Join the List

Arm yourself with updates about Arsenal tools, training, and research. Our mailing list is double opt-in so you will need to check your email and confirm your subscription before receiving our mailings.