lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <57D026E7-EDF8-4FB1-A4B5-39BC8872B0A1@recon.cx>
Date: Wed Sep  7 07:11:16 2005
From: hfortier at recon.cx (Hugo Fortier)
Subject: Phone Forensics

I really have no idea if this software is worth anything but Paraben  
have a software for Cell phone forensic, you might want to look into  
it http://www.paraben-forensics.com/catalog/product_info.php? 
cPath=25&products_id=273

I'd be interested to know if you found the answer to your questions.

Hugo

On 6-Sep-05, at 9:54 PM, JMadincea@...com wrote:


> Evening All,
>
> Since this forum often dicsusses various forensic topics I thought  
> I would
> see if someone here could help with an issue that I am trying to  
> resolve.
>
> Is it possible to do a forensic investigation on a telephone that  
> stores
> caller ID information after the delete function has been invoked?   
> In otherwords,
> if the user has deleted the incoming caller list is it possible to  
> dump memory
> to see whats there?
>
> Along this same line is it possible to gather any inbound caller ID
> information from a telco or another agency without a trace being  
> initiated?
>
> Any advice you might have would be greatly appreciated.
>
> Thanks,
>
> John
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ