Skip to Main Content

Sessions

Available sessions at Magnet User Summit 2024 are coming soon! Be sure to add them to your agenda in the Event Portal to save your spot once the catalog is live.

While you wait to hear who’s on deck to present at #MUS2024, catch up on a few of the amazing presentations we were lucky enough to feature during Magnet User Summit 2023:

Breaking Down the Biomes


This Mobile Unpacked with Chris Vance episode will more deeply explore the SEGB file format, the tools needed for finding and validating the data stored within, and what artifacts ran off to this location after going missing from old locations such as KnowledgeC.

Know When to Seek Help for Memory Loss


In this session, we will see the evolution of memory forensics and analysis including common mistakes that survived as common practices and how solving basic fundamentals will enable analysts to access to the next generation of threat detection methods.

Magnet2Go. Building a ‘Windows to Go’ Drive to Support Offline Collections


Join Security Forensics Consultant, Doug Metz, to learn how to build your own ‘Windows to Go’ drive to support offline collections with Magnet OUTRIDER and Magnet ACQUIRE, as well free tools for live collections such as Magnet RESPONSE, Magnet DumpIt, and Magnet RAM Capture.

Establishing Connections: Illuminating Remote Access Artifacts in Windows


This talk will not only address how adversaries are leveraging existing remote access and custom tools that have proved to be beneficial in analysis against some of the most sophisticated actors.

Does Slicing Onions Make You Cry - Forensics Analysis of TAILS


This talk will illustrate how forensic examiners can collect physical memory and filesystem artifacts on scene as well as the methods we can use to analyze the data collected to find the artifacts relevant to the case.

Using AWS Config to Compliment IR Investigations


In this talk, we’ll show how you can pull data from AWS Config and use it in your next incident.

Revealing The Sending Phone Number Of An Unidentified AirDrop File


his presentation will discuss a novel method to identify the phone number of an AirDrop sending device using logs found on the receiving device.

Oculus Quest "Meta" Forensics - Can It Be Done?


This talk will dive into methods to get after the data from VR devices. We will discuss logical acquisitions, all the way to chip-off of an Oculus.