top of page

Please access this website using a laptop / desktop or tablet for the best experience


Examining SRUM with ESEDatabaseView
You can download tool from link below: https://www.nirsoft.net/utils/ese_database_view.html Opening SRUM Database with NirSoft Using...
-
May 24, 20242 min read


Unpacking SRUM: The Digital Forensics Goldmine in Windows
Updated on 31 Jan, 2025 Enter the System Resource Usage Monitor (SRUM) — a treasure trove for digital forensic analysts. The SRUM...
-
May 23, 20244 min read


SRUM: The Digital Detective in Windows
In today's digital age, the significance of digital evidence in criminal investigations cannot be overstated. As technology evolves, so...
-
May 22, 20242 min read


My First Day at Ankura: A New Chapter Begins
Today marks the beginning of an exciting new chapter in my professional journey as I join Ankura as Cybersecurity Incident response,...
-
May 20, 20241 min read
Blog Post: Ensuring System Security Post-Attack – Comprehensive Remediation Steps
In today's digital landscape, cyberattacks are an ever-present threat. It's essential to have a robust remediation plan to ensure...
-
May 19, 20241 min read


Theoretical Important notes for Memory Acquisition and Disk Encryption
Introduction: In the world of digital forensics, thorough memory acquisition and disk encryption detection are essential steps in...
-
May 18, 20242 min read


Unveiling Threats: Exploring Active Directory Replication from Non Machine Account + Mimikatz DC Sync.”
Today, I'm excited to share a fascinating blog post written by one of my dearest friends, Jaye V from ConnectWise. In this insightful...
-
May 16, 20241 min read


Saying Goodbye: Reflecting on My Journey with ConnectWise
As I sit down to write this blog post, my heart is filled with a mix of emotions. Today marks the end of an incredible chapter in my life...
-
May 15, 20241 min read


Webmail Forensics / Mobile Email Forensics: A Critical Component of Digital Investigations
Introduction Webmail forensics is a crucial aspect of digital investigations, especially in cases involving cybercrime, fraud, and...
-
May 14, 20242 min read


Webmail Forensics: Challenges, Techniques, and Investigation Tools
Update on 29 Jan, 2025 Webmail presents unique challenges for forensic investigations due to its cloud-based nature. Unlike traditional...
-
May 13, 20244 min read


Microsoft 365: Content Search, Unified Audit Logs, and Extracting Logs for Investigations
Updated on 29 Jan,2025 Microsoft 365 Purview Compliance Manager offers a powerful Content Search feature that allows organizations to...
-
May 11, 20243 min read


Leveraging Compliance Search in Microsoft Exchange for Email Investigations
Microsoft Exchange offers powerful tools for searching, archiving, and reviewing emails. One of these tools, Compliance Search , is...
-
May 9, 20242 min read


Email Data Extraction(Collecting and Analyzing Evidence from Modern Email Systems)
Every email you send passes through an email server at some point. The key question is whether the email still lives on the server or has...
-
May 8, 20243 min read


Collecting Email Evidence from Network-Based Servers
Collecting email evidence from mail servers can indeed be challenging due to various factors like server location, criticality to...
-
May 6, 20242 min read


Understanding the Recoverable Items Folder in Exchange Online
Updated on 29 Jan, 2025 In today's digital world, emails play a crucial role in business communications. However, accidental deletions,...
-
May 5, 20243 min read


Email Storage: Server vs. Workstation
Determining the location of email data—whether on a server or a workstation—is a pivotal first step for forensic investigators. Email...
-
May 2, 20242 min read


Demystifying Email Encryption and Forensic Analysis
Email remains a primary communication tool, handling a vast amount of sensitive information daily. As such, understanding email...
-
May 1, 20242 min read


Navigating the Email Clients, Features of Modern Email Clients, Corrupted Email Archives
What is Email client? An email client, often simply referred to as an "email program" or "email software," is a computer program or...
-
Apr 30, 20242 min read


Uncovering Hidden Email Attachments in Outlook’s Secure Temp Folder
Key Points: Did you know that when you open an email attachment in Outlook, it doesn’t just disappear after you close it? Outlook...
-
Apr 29, 20242 min read


Understanding OST and PST Files: A Guide for Email Forensics
Why Local Email Clients Matter Webmail, which requires an internet to access messages, local email clients like Microsoft Outlook allow...
-
Apr 28, 20242 min read
bottom of page