MENU

Posts Tagged ‘JTAG forensics’

Most Recent
 
Read More
2018-04-02

JTAGing as a way for extracting passwords

Mankind is trying to improve everyday objects in order to facilitate our life. Attacks on consumer smart devices can allow an attacker to gain constant access to the victim’s network. This type of attack can be prevented by disabling – or more effectively – removing the JTAG ports completely from production devices, thereby minimising its attack surface.

273
 
Read More
2016-10-02

JTAG Explained

In this post guys from Senrio try to explain you what JTAG is. Probably you, as digital forensics examiner (or even analyst) already know what is it and even use it in your every day mobile forensic examinations, but if not – it’s you chance! 

398
 
Read More
2016-08-07

JTAGing Mobile Phones

In this article Patrick Olsen describes the process of JTAGing mobile phones for forensic purposes. He starts from the definition of JTAG, then talks about interface signals. He presents a very useful list of tools you’ll need to perform such data extraction (with links). And he finishes with explanation of JTAGing process of Nokia Lumia 521.

Here is the link to the article.

526
 
Read More
2016-03-09

Free JTAG forensics course

Start learning JTAG forensics with Michael Harrington from Wild PCS Mobile Forensics.

221
Latest Headlines
 
Read More
872
 
Read More
457
 
Read More
890

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
Android forensics
digital forensics software
windows forensics
forensic data recovery
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.