Videos

Preview instructional video segments of our fantastic BlackBag software products. If you would like to receive additional information about BlackBag's product offerings, training, or our forensic services, please contact us. If you would like to attend our upcoming webinars or watch previous ones, please view our webinar page.


Please note: In order to view these videos, you must have Adobe Flash Player installed. Download Flash Player

00:01:06

Last Executed

A key component to any investigation is knowing what applications the suspect has been using on his or her system. Watch this 1 minute video as we outline how to find out using BlackLight.

00:01:36

Shellbags

Want to explore shellbags? You can easily view shellbag data to view information of a user accessing folders. It might make your case!

00:01:32

Reporting

Use BlackLight to easily report your case findings, quickly render previews, and effortlessly export in various formats.

00:01:23

Filtering

Filtering is easy - select the 'Filter View' or click on the Filter icon in other views. You can quickly build simple or complex filters without learning another language.

00:01:04

Device Connections

Need to see what iPhones, USB and other devices have been connected to a machine? Check out this 1 minute video on how easy this actionable intel is to locate in BlackLight.

00:01:04

File Downloads

Need to know which files the user has downloaded? Easily view downloaded files history in BlackLight!

00:01:12

User Accounts

View a quick list of what accounts are associated with your case - from Windows Logon info to social media accounts from iOS devices - they are all shown on the User Account view in BlackLight.

00:01:24

System Logs

Windows or Mac, no matter the platform, BlackLight has your system logs parsed and ready to view. Check out this 1 minute video on how to see system logs after processing.

00:01:13

WiFi Information

Want to know which WiFi a device last connected to and when? Or maybe if they've ever connected to specific WiFi devices. Do both in BlackLight's WiFi view.

00:01:15

Windows Jump Lists

Jump right into Windows Forensics with BlackLight! Today’s tip of the day is how to review jump lists artifacts.

00:01:23

Top Contacts

Want to know which email, call and message contacts are seen most frequently on a device? Let BlackLight show you the Top Contacts automatically.

00:01:28

Tear Off Window

View All The Data!! Use BlackLight's tear off feature to display multiple content views for a file or detach and expand the content view on a second monitor.

00:01:30

Windows Memory Artifacts

Working a case with data exfiltration or peer-to-peer activity? See how Windows Memory Analysis in BlackLight can help.

00:01:18

Windows Prefetch & Superfetch

Leverage what Windows OS already tracks on users behavior; check out how easily examiners can review Prefetch and Superfetch to discover more about user's activity.

00:01:18

Master File Tables

Need to prove where the dates and times came from not just what your tool displayed? Check out BlackLight's ability to show how it carves data structures for items like MFT records.

00:02:40

Android Setup

Learn how to prepare an Android device for data collection in this short how-to video.

00:01:08

Aquire, reveal, and preserve the truth with Mobilyze

With over 4 billion smart devices on the planet, mobile digital data is now part of every investigation. Gaining immediate access to this forensic evidence is critical. Mobilyze allows investigators to acquire, view and preserve the data held on any iOS or Android device.

00:01:44

BlackLight: Tear Off File Content Viewer Tutorial

A brief overview of the new tear off 'File Content Viewer' in BlackLight.

00:02:56

BlackLight: Data Ingestion Tutorial

A brief overview of improved data ingestion in BlackLight.

00:01:22

BlackLight: Offline Maps Tutorial

A brief overview of improved offline maps' in BlackLight.

00:00:50

Blacklight: Log File Parsing

A look at BlackLight's ability to parse a couple of Windows log files showing disk activity: $LogFile and $UsnJrnl.

00:00:38

Blacklight: SQLite Queries

A look at running customized queries on a SQLite database in BlackLight.

00:01:15

Blacklight: Volume Shadow Copies

A look at analyzing Volume Shadow Copies with BlackLight.

00:05:53

MacQuisition: Imaging a Basic Fusion Drive

An instructional how-to video on imaging a Fusion Drive with MacQuisition.

00:08:18

MacQuisition: Imaging a FileVault 2 Fusion Drive

An instructional how-to video on imaging a FileVault 2 Apple Fusion Drive with MacQuisition.

00:03:12

Licensing Your Software Dongle

An instructional how-to video on licensing your software dongle.

00:15:48

Mobilyze: How-to Instructional

A how-to video on using BlackBag's Mobilyze.

00:14:34

MacQuisition: Imaging a FileVault 2 Encrypted Volume and BootCamp

A how-to video on imaging a FileVault 2 encrypted volume using MacQuisition.

00:08:26

BlackLight: The File Filter Tab

An overview on how BlackBag's BlackLight file filter will allow you to quickly sort through and analyze devices.

00:05:57

MacQuisition: ACQUIRE TARGET DATA AND RAM COLLECTION

A video on how BlackBag's MacQuisition enables you to acquire target data and RAM collection from a live Mac computer.

00:04:29

MacQuisition Overview

An overview video on how BlackBag's MacQuisition enables you to acquire Apple Macintosh® systems in a simple and safe manner.

00:02:09

SoftBlock Overview

An overview on how BlackBag's SoftBlock write-blocks devices that are connected to Mac systems.