Mattia Epifani
@mattiaep
Followers
3K
Following
1K
Media
142
Statuses
1K
CEO and Digital Forensics Analyst @ REALITY NET (https://t.co/G04RoVyJWU) Researcher at IGSG-CNR (https://t.co/ASkXLx1Gvk) SANS Certified Instructor (https://t.co/GMLheLo8nh)
Joined April 2013
1
14
36
Last week to submit for SANS DFIR Europe Summit 2024! #dfir
https://t.co/oCjW6JC6NG
0
4
2
Can’t wait to teach the latest update at SANS Amsterdam July 2024! #dfir #mobileforensics
⚠️MAJOR UPDATE⚠️ #FOR585 has been updated. The update focuses on testing &documenting significant changes across iOS, Android, third-party application storage formats, malware, and AI applications. Learn more here: https://t.co/uQJTCrvUdQ
@HeatherMahalik @domenicacrognal
0
0
1
The new SANS Advanced Smartphone Forensics poster is out! Cc/ @HeatherMahalik @domenicacrognal
#dfir #mobileforensics
https://t.co/Pa2QvG11Ia
sans.org
The Advanced Smartphone Forensics Poster provides a concise guide through the mobile forensic process, ensuring your examination results are robust and defensible.
0
9
34
Happy to announce that the new SANS "iOS Third Party Apps Poster" and "Android Third Party Apps Poster" are finally out! #DFIR #mobileforensics
https://t.co/IS5qRf0nSK
https://t.co/X3VJfO2H7l
sans.org
The aim of this poster is to provide a list of the most interesting files and folders “Data” and in the “Shared” folders for the most commonly used third-party apps.
1
21
51
A great job by @OMENScan: AChoirX for Android based on our Android Triage! Red the blog and download and test the tool! https://t.co/Kw3LfYM8FQ
#dfir #mobileforensics
0
6
13
Windows Thumbnail caches are a mostly unused artifact. Did you know they can point to paths on external systems? (Yes path embedded in thumbcache file, not from win search db) Can be helpful when threat actors actively delete logs and other artifacts! #DFIR
2
25
91
Dissecting the Android WiFiConfigStore.xml for forensic analysis #dfir #mobileforensics
https://t.co/zS2kNs3VHc
1
10
32
0
34
78
Analysis of Android settings during a forensic investigation #dfir #mobileforensics
https://t.co/1KGM79Vjw3
1
26
84
A great class!
.#FOR528: #Ransomware and #CyberExtortion provides the hands-on training required for those who may need to respond to ransomware and/or cyber extortion incidents. Take it with @phillmoore at the #CTISummit
https://t.co/uZPqwecz1R
#DFIR #CTI
0
0
3
Last blog post of the year: "Has the user ever used the XYZ application? aka traces of application execution on mobile devices" https://t.co/tBbaTjhGne
#dfir #mobileforensics
0
16
38
Working on the next couple of posts on iOS comparison. Also, working on some tests and a blog post on what you can still hope to find after an app has been uninstalled. #dfir #mobileforensics
1
2
15
BrowserState has come up a few times recently and certainly deserves an explanation. But what else could “last_visited_time” mean? https://t.co/L3M4P4zCi1
2
10
29
iOS 15 Image Forensics Analysis and Tools Comparison - Browsers, Mail Clients, and Productivity apps https://t.co/tCDsCDcyu3
#DFIR #mobileforensics
0
24
70
iOS 15 Image Forensics Analysis and Tools Comparison - Communication and Social Networking Apps https://t.co/JYqDUWyiww
#DFIR #mobileforensics
2
15
57
Post on third-party social networking and communication apps almost ready! A huuuge one! #dfir #mobileforensics
1
0
13
Few corrections coming on the third blog post. Already working on the fourth one: third-party communication apps. A huge one 😅 #dfir #mobileforensics
1
1
11
iOS 15 Image Forensics Analysis and Tools Comparison - Native Apps https://t.co/f347cvHwAf
#DFIR #mobileforensics
0
27
83