Posts Tagged ‘JTAG forensics’

Most Recent
 
Read More
2018-04-02

JTAGing as a way for extracting passwords

Mankind is trying to improve everyday objects in order to facilitate our life. Attacks on consumer smart devices can allow an attacker to gain constant access to the victim’s network. This type of attack can be prevented by disabling – or more effectively – removing the JTAG ports completely from production devices, thereby minimising its attack surface.

266
 
Read More
2016-10-02

JTAG Explained

In this post guys from Senrio try to explain you what JTAG is. Probably you, as digital forensics examiner (or even analyst) already know what is it and even use it in your every day mobile forensic examinations, but if not – it’s you chance! 

372
 
Read More
2016-08-07

JTAGing Mobile Phones

In this article Patrick Olsen describes the process of JTAGing mobile phones for forensic purposes. He starts from the definition of JTAG, then talks about interface signals. He presents a very useful list of tools you’ll need to perform such data extraction (with links). And he finishes with explanation of JTAGing process of Nokia Lumia 521.

Here is the link to the article.

486
 
Read More
2016-03-09

Free JTAG forensics course

Start learning JTAG forensics with Michael Harrington from Wild PCS Mobile Forensics.

205
Latest Headlines
 
Read More
724
 
Read More
396
 
Read More
775

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
An Overview of Web Browser Forensics