
Please access this website using a laptop / desktop or tablet for the best experience
Search Results
285 results found for "forensic"
- Moving Forward with Memory Analysis: From Volatility to MemProcFS : Part 3
File_Objects through: their process handle table their Virtual Address Descriptor (VAD) tree Memory forensics Forensic File Reconstruction (M:\forensic\files) When MemProcFS is run with forensic options enabled, NTFS Forensics from Memory The M:\forensic\ntfs folder allows analysts to investigate the entire file : M:\forensic\csv\ The timeline_ntfs.csv file contains file system events, while other timelines focus -1/mastering-memory-forensics%3A-in-depth-analysis-with-volatility-and-advanced-tools
- Ransomware, Malware, and Intrusions: A Step-by-Step Analysis Methodology
Artifacts: https://www.cyberengage.org/courses-1/windows-forensic-artifacts ------------------------ Series : https://www.cyberengage.org/courses-1/mastering-windows-registry-forensics%3A ------------- : https://www.cyberengage.org/courses-1/network-forensic -------------------------------------------- Internet History Critical for phishing & exfil evidence. 📌 Guide: Browser forensics series (open-source (indexing section): https://www.cyberengage.org/courses-1/windows-forensic-artifacts ---------------
- Cloud Incident Response: How to Acquire and Analyze a VM Disk Image in Azure
the imaged disk, create a separate VM called the “Forensic VM” with adequate resources for your forensic Create OS Disk: During setup, the Forensic VM will have its own OS disk where you can install forensic Step 4: Mount the Disk in the Forensic VM Once the Forensic VM is running, access the imaged disk by Step 5: Run Forensic Tools on the Forensic VM With the disk mounted, you can now use forensic tools to on the Forensic VM’s OS disk.
- Using RADAR and MUICache for Evidence of Execution in Windows
If you're into digital forensics, especially Windows forensic analysis, you've probably heard of MUICache Velociraptor – A powerful tool for hunting and forensic analysis. That’s a red flag for forensic analysts! Why is This Useful for Forensics? Stay tuned for more forensic insights!
- Uncovering Hidden Email Attachments in Outlook’s Secure Temp Folder
This “Secure Temp Folder” is an important artifact in forensic investigations, as it can reveal previously -------------------------------------------------------------------------- Why Does This Matter for Forensics Before Outlook 2007, Forensic investigators could often recover multiple versions of the same file if artifacts like: $Logfile USNJournal Volume Shadow Copies Using forensic tools, investigators can often For forensic analysts, this folder remains a hidden goldmine of information that can provide crucial
- Unlocking ShellBags Analysis with ShellBags Explorer (SBE) / SBECmd.exe
ShellBags can provide invaluable insights into a user’s activity— helping forensic analysts reconstruct ShellBags Explorer is a free, all-in-one forensic tool designed to parse ShellBags artifacts effortlessly Suppose we have three folders under a parent folder, as seen in forensic tools like ShellBags Explorer Why This Matters in Forensics Understanding this timestamp limitation is crucial when reconstructing Correlating with other forensic artifacts is necessary .
- Moving Forward with Memory Analysis: From Volatility to MemProcFS : Part 2
-2-0 Important: Enabling YARA scanning will delay the availability of forensic results. output: Primary results: M:\forensic\csv\findevil.csv Detailed YARA output: M:\forensic\csv\yara.csv When deeper analysis is required, memory forensics truly shines—allowing you to investigate far beyond Handling False Positives Like a Pro Memory forensics is never simple. Files M:\forensic\files <Cached Files> M:\forensic\ntfs <MFT> Registry,
- Moving Forward with Memory Analysis: From Volatility to MemProcFS Part 1
detail in the article: “Step-by-Step Guide to Uncovering Threats with Volatility: A Beginner’s Memory Forensics Volatility is one of my favorite memory forensics tools. It’s an excellent memory forensics framework that approaches investigations in a more interactive and An additional useful option is -forensic. file: M:\forensic\forensic_enable.txt It’s important to note that findevil only works on Windows 10
- Understanding Filesystem Timestamps: A Practical Guide for Investigators
In the digital forensics world, understanding how timestamps work is crucial. Various software and system activities can modify timestamps, sometimes in ways that obscure forensic Anti-Forensic & Malware Tools: Attackers use file system APIs to modify timestamps, making malicious This has major implications for forensic investigations. Explore forensic tools like Plaso, Timesketch, and Velociraptor to take your timeline analysis skills
- Metadata Recovery: Bringing Deleted Files Back to Life
This opens a window for forensic experts to recover these "lost" files . What Is Metadata Recovery? Forensic tools can use this information to locate the file’s data and attempt to restore it. This means that forensic experts can recover the data if it hasn’t been overwritten yet. Forensic tools examine the metadata to find: Where the file was stored How big it is What type of file Autopsy : An open-source forensic suite with metadata recovery features.
- Disk Imaging (Part 1) : Memory Acquisition & Encryption Checking
Whether you’re working in digital forensics, IT, or just want to back up your system. Modern Forensic Acquisition Methods In the past, forensic specialists followed a “dead box” approach If it was a regular computer (not a server), forensics experts would unplug it directly. Include this information in your forensic reports for future reference. GUI Tools When performing live forensics, minimizing system impact is critical .
- Analyzing and Extracting Bitmap Cache Files from RDP Sessions
designed to enhance performance by storing screen sections that don't change often, can be crucial in forensic However, from a forensic perspective, these cached files can be a goldmine of information. By extracting and analyzing the bitmap cache, forensic analysts can potentially uncover information such It's a powerful tool for forensic investigations, allowing analysts to reconstruct parts of the screen However, it requires a licensed copy of EnCase, which may be a limitation for some forensic teams.









