Arm yourself with our tools & eliminate blind spots in digital forensics! https://ArsenalRecon.com #DFIR
Arsenal Recon
软件开发
Wakefield,MA 1,726 位关注者
Our Mission: To eliminate blind spots in digital forensics by exploiting electronic evidence in unique & powerful ways.
关于我们
Our team is led by Mark Spencer, whose philosophy is "Don't settle for the easy way, strive for the right way." We are computer forensics experts from Arsenal Consulting and world-class developers who live and breathe operating system internals. We are passionate about computer forensics and dedicated to the preservation and analysis of electronic evidence using the most powerful technologies available. In our quest to dig deeper, we got tired of waiting for solutions to meet our needs - so we began building our own.
- 网站
-
https://ArsenalRecon.com
Arsenal Recon的外部链接
- 所属行业
- 软件开发
- 规模
- 2-10 人
- 总部
- Wakefield,MA
- 类型
- 私人持股
- 创立
- 2010
- 领域
- Computer Forensics、Digital Forensics和Malware Analysis
地点
-
主要
US,MA,Wakefield,01880
Arsenal Recon员工
动态
-
I've been experimenting with a new type of electronic evidence triage - booting computers with WinFE, using AIM Remote Agent to connect them to Arsenal Image Mounter on my forensic workstation, & finally running Recon Reports. https://ArsenalRecon.com #DFIR
-
-
Just received a great testimonial re: Arsenal Image Mounter from Australian law enforcement. The #DFIR community suggested they try AIM after having trouble launching forensic images into virtual machines with another tool... & now they are having success. https://ArsenalRecon.com
-
-
Did you know that Arsenal Image Mounter's Free Mode includes archive mounting as drive letters? https://ArsenalRecon.com #DFIR
-
-
Volume Shadow Copies (VSCs) from two remote disks mounted by Arsenal Image Mounter in a forensically-sound manner thanks to WinFE (Windows Forensic Environment) & AIM Remote Agent. https://ArsenalRecon.com #DFIR
-
-
Check out two remote disks launched into virtual machines by Arsenal Image Mounter after an ASUS laptop & SUMURI TALINO workstation were booted with WinFE & their disks made available by AIM Remote Agent over a network. https://ArsenalRecon.com #DFIR
-
-
Check out our latest Insights article "Introducing AIM Remote Agent" for some compelling use cases, screenshots, & photos involving computers booted with WinFE (Windows Forensic Environment) & disks shared over networks with Arsenal Image Mounter. https://lnkd.in/euAKwuAB. #DFIR
-
-
Unlocking a remote disk's BitLocker-protected volume & then selecting virtual machine launch options, thanks to WinFE booting a laptop & AIM Remote Agent making its disk accessible to Arsenal Image Mounter over a network. https://ArsenalRecon.com #DFIR
-
-
Emina & Anastasia have been working on a nice series of AIM Remote Agent & WinFE screenshots & photos. Let's start w/ the initial connection of an agent to Arsenal Image Mounter (in this case, the second agent) & then viewing the remote disk details. https://ArsenalRecon.com #DFIR
-
-
Launching the "Compromised Windows Server 2022 (simulation)" disk image on CFReDS (https://lnkd.in/e-BPks9W) into a virtual machine with Arsenal Image Mounter. This server is in a strange state, download & check it out for yourself! https://ArsenalRecon.com #DFIR
-