top of page

Please access this website using a laptop / desktop or tablet for the best experience


Windows Event Logs for USB Activity
Windows Event Logs are an excellent resource for investigating USB-related activities. These logs provide insights into when devices are...
-
Feb 27, 20252 min read


USB Device Identifiers and Forensic Insights: iSerialNumber, SCSI Serial Numbers, UASP Devices, and Cleanup in Windows
USB devices often come with a unique identifier called the iSerialNumber. Why the iSerialNumber Matters? The iSerialNumber is a...
-
Feb 27, 20254 min read


Making Sense of SRUM Data with SRUM_DUMP Tool
If you're digging into Windows forensic artifacts, SRUM (System Resource Usage Monitor) data is a goldmine. But manually decoding the...
-
Feb 26, 20253 min read


Using RADAR and MUICache for Evidence of Execution in Windows
MUICache (Evidence of Execution) --------------------------------------------------------------------------------------------------------...
-
Feb 25, 20254 min read


UserAssist: A Powerful Yet Complex Forensic Artifact for Tracking Application Execution
The UserAssist registry key in Windows is a goldmine of forensic data , revealing which applications were executed, how often they were...
-
Feb 25, 20253 min read


TaskBar FeatureUsage: Tracking executed Applications
Windows keeps detailed records of user interactions with the taskbar and GUI applications , but one of the most overlooked forensic...
-
Feb 25, 20254 min read


Forensic Analysis of Universal Windows Platform (UWP) Applications
The Universal Windows Platform (UWP) is Microsoft's modern application model, designed to replace traditional desktop applications with...
-
Feb 25, 20254 min read


BAM and DAM in Windows Forensics: Tracking Executed Applications
Windows keeps track of many user activities, and one of the lesser-known but valuable forensic artifacts is the Background Activity...
-
Feb 25, 20253 min read


RecentDocs: Uncovering User Activity Through Recently Opened Files
When investigating user activity on a Windows system, one of the most valuable forensic artifacts is the RecentDocs registry key. This...
-
Feb 24, 20252 min read


Tracking Trusted Office Documents: A Key to Investigating Macro-Based Malware
Microsoft Office is widely used for business and personal tasks, but it has also been a major target for cybercriminals. One of the most...
-
Feb 21, 20252 min read


Windows Registry: A Forensic Goldmine for Installed Applications
The Windows Registry is like the DNA of an operating system —it tracks system configurations, user settings, and most importantly,...
-
Feb 20, 20253 min read


Tracking Microphone and Camera Usage in Windows (Program Execution: CompatibilityAccessManager)
With more people working remotely than ever before, concerns about privacy and unauthorized access to microphones and webcams have...
-
Feb 19, 20253 min read


Breaking Down the $LogFile and How to Use LogFileParser
When it comes to forensic analysis, the $LogFile is one of those artifacts that hasn’t received as much attention as other NTFS...
-
Feb 18, 20253 min read


Tracking Recently Opened Files in Microsoft Office: A Forensic Guide
When investigating user activity on a Windows system, knowing what files were accessed and when can provide critical insights. While...
-
Feb 17, 20252 min read


Baseline Analysis in Memory Forensics: A Practical Guide
Introduction to Baseline Analysis in Digital Forensics Baseline analysis is an essential technique in digital forensics and incident...
-
Feb 14, 20255 min read


Mastering AmcacheParser and appcompatprocessor.py for Amcache.hiv Analysis
To Understand Amcache.Hive check out below article: https://www.cyberengage.org/post/amcache-hiv-analysis-tool-registry-explorer...
-
Feb 13, 20254 min read


MFTECmd-MFTexplorer: A Forensic Analyst's Guide
When it comes to forensic tools, MFTECmd.exe is one of my go-to choices . It’s part of the KAPE suite and an incredibly efficient tool...
-
Feb 12, 20253 min read


String Searching with bstrings: Carving Files and Finding Hidden Data
Hi, everyone! Welcome to another article. If you’ve been following along, you know I’ve covered some amazing tools, including...
-
Feb 11, 20253 min read


File Carving: A Simple and Powerful Way to Recover Deleted Files
Have you ever accidentally deleted a file and thought it was gone forever? Luckily, tools like file carving can help recover those...
-
Feb 10, 20253 min read


Remote Collections Artifacts Using KAPE including UNC and Over the Internet(ZeroTier)
If you’ve been following me, you already know how much of a fan I am of Eric Zimmerman’s tool, KAPE. I’ve written several articles about...
-
Feb 9, 20259 min read
bottom of page