top of page

Please access this website using a laptop / desktop or tablet for the best experience


Understanding Host-Based Email Stores in Digital Forensics
Updated on 28 Jan,2025 When investigating emails during digital forensic analysis, knowing where and how emails are stored locally can...
-
Apr 27, 20244 min read


Detailed explanation of SPF, DKIM, DMARC, ARC
Updated on 28 January, 2025 Email security has always been a challenge because the Simple Mail Transfer Protocol (SMTP) wasn’t built with...
-
Apr 26, 20243 min read


Deep Dive into Additional Email Header Fields in Digital Forensics
In our previous exploration of email headers, we delved into some of the most common and widely recognized fields like Message-ID and...
-
Apr 25, 20242 min read


Understanding Email Headers in Digital Forensics
Emails are an integral part of modern communication, serving as both a personal and professional lifeline. Behind the scenes of every...
-
Apr 24, 20244 min read


Analyzing Email Structures and Forensic Challenges
Emails, a ubiquitous form of communication in the digital age, hold a treasure trove of information for forensic investigators....
-
Apr 23, 20242 min read


Understanding the Email Forensic
Email forensics is indeed a powerful in the realm of digital investigations. 1. Who sent the email? Identifying the sender is pivotal as...
-
Apr 22, 20242 min read
Important Update: Temporary Pause in Blog Updates
Dear readers and followers, I hope this message finds you well. I wanted to take a moment to share an important update regarding our...
-
Apr 16, 20241 min read


Solid-State Drives (SSDs): Acquisition, Analysis, and Best Practices
Introduction: Solid-state drives (SSDs) have revolutionized data storage with their speed, reliability, and lack of moving parts....
-
Apr 5, 20244 min read


How Windows Knows Your Files Came from the Internet: Alternate Data Streams (Zone.Identifier)
Updated in 17 Feb,2025.. Ever downloaded a Word document or PowerPoint presentation and noticed it says "Trust this file to edit"? That...
-
Apr 4, 20243 min read


Digital Evidence: Techniques for Data Recovery and Analysis
In today's digital age, forensic investigators face the challenge of extracting valuable evidence from various storage devices, including...
-
Apr 3, 20243 min read


Program Execution : UserAssist Registry Key || Shimcache/Amcache ||BAM/DAM
1. UserAssist Key Understanding the UserAssist Key: The UserAssist key, located within the NTUSER.DAT hive of the Windows registry,...
-
Apr 2, 20243 min read


Windows Registry Artifacts: Insights into User Activity
Updated in 24 Feb, 2025 ------------------------------------------------------------------------------------------------------ 1. Search...
-
Mar 31, 20242 min read


Part 4- Important Registries related to System configuration overview
9. System Boot autostart programs: NTUSER.DAT NTUSER.DAT\Software\Microsoft\ Windows\CurrentVersion\Run NTUSER.DAT\Software\Microsoft\...
-
Mar 30, 20241 min read


Part 3- Important Registries related to System configuration overview
8. Network profile key: -First and last name connected: Windows XP: The Legacy of Wireless Zero Configuration In the Windows XP era, the...
-
Mar 29, 20243 min read


Part 2- Important Registries related to System configuration overview
5. NTFS last access time on/off The Misconception: One common misconception about last access timestamps is that they solely indicate the...
-
Mar 28, 20243 min read


Part 1- Important Registries related to System configuration overview
1. Identify the Microsoft version: An investigator will receive a disk image and have no idea what the specific Windows operating system...
-
Mar 27, 20242 min read


Understanding Important Registries
1. MRU Lists (Most recent used lists) NTUSER.DAT for particular user (If we use Registry explorer in my case c:\users\user\ntuser.dat)...
-
Mar 26, 20242 min read


Understanding Registry Hive transaction logs**
The Windows operating system caches writes to the registry in two locations. The first is in memory. The second is on disk in the...
-
Mar 25, 20242 min read


Understanding Registry:
Windows Registry Overview: The Windows registry is a crucial database storing system, software, hardware, and user configuration data....
-
Mar 24, 20243 min read


Extracting/Examine Volume Shadow Copies for Forensic Analysis
Introduction: In the realm of digital forensics, gaining insights into the changes made to files and volumes over time can be critical...
-
Mar 23, 20244 min read
bottom of page