top of page

Search Results

273 results found for "forensic"

  • Private Browsing: What Really Gets Left Behind? and Recovering Deleted Browser Artifacts.

    and Hibernation Files) Since private browsing keeps data in memory, it can still be retrieved if a forensic File and Data Carving  – Specialized forensic tools like Magnet Axiom, FTK, and Belkasoft  can extract Modern browsers are getting better at hiding private browsing data, but forensic are evolving too. Browsers hold a treasure trove of data that can be crucial for digital forensics. Some of the best tools for recovering deleted SQLite data include: Sanderson Forensics SQLite Recovery

  • Decoding Google Drive’s Protocol Buffers and Investigating Cached Files

    Example: 📌 Forensic Use: ✅ Recover filenames & hashes from cached files ✅ Extract Google account details 3️⃣ Collecting Google Drive’s Local Content Cache Since Google Drive operates as a virtual drive , forensic Cached thumbnails and previews  may persist for longer periods . 📌 Forensic Use: (Using DB Browser) Suites  (Autopsy, FTK, EnCase) 📌 Forensic Use: ✅ Determine file type even without extensions ✅ Identify -------------- We will explore more about Google Drive in the next article (Automating Google Drive Forensics

  • Unveiling Volatility 3: A Guide to Installation and Memory Analysis on Windows and WSL

    Today, let's dive into the fascinating world of digital forensics by exploring Volatility 3 —a powerful While some forensic suites like OS Forensics  offer integrated Volatility functionality, this guide Moreover, WSL allows you to leverage Linux-based forensic tools, which can often be more efficient. Significance of -pid Parameter in Memory Forensics is used as a parameter. Analysis Forensic tools like Volatility 3  often run more smoothly in a Linux environment due to Linux

  • Making Sense of SRUM Data with SRUM_DUMP Tool

    If you're digging into Windows forensic artifacts, SRUM (System Resource Usage Monitor) data is a goldmine This tool is a game-changer for forensic analysts. After extracting your forensic image or pulling out the SRUDB.dat  file and the SOFTWARE  registry hive ---------------------------------------- Understanding SRUM Data Now, let’s break down what kind of forensic So, if you haven't tried it yet, give it a shot—it might just become one of your go-to forensic tools

  • LECmd: A Powerful Tool for Investigating LNK Files

    A Tool That Doesn't Hide Data Many forensic tools process LNK files, but not all of them extract every & Relative Path  – The folder the file was stored in and its location relative to system paths. 🔍 Forensic device ✅ UNC Path (if applicable)  – Network location if the file was accessed via a shared drive. 🔍 Forensic Insight: If an LNK file points to a USB drive , forensic analysts can match the volume serial number LNK files in a folder: LECmd.exe -d G:\G\Users --csv "E:\Output for testing" --csvf lnkfile.csv 🔍 Forensic

  • Prefetch Analysis with PECmd and WinPrefetchView

    Windows Prefetch  is a critical forensic artifact that helps track program execution history . While Prefetch files can be manually analyzed, forensic tools like PECmd  (by Eric Zimmerman) and WinPrefetchView Collect Prefetch files before executing forensic tools. 🔍 2. Keep your forensic VM in UTC time  to prevent automatic time conversions by analysis tools. --------- deleted applications. ✅ File references inside Prefetch files can reveal hidden malware or deleted forensic

  • Tracking Microphone and Camera Usage in Windows (Program Execution: CompatibilityAccessManager)

    This information is stored in the Windows Registry , making it a valuable forensic artifact for investigators The ones of most interest to forensic investigators are: microphone  → Logs apps that accessed the microphone Why This Data Matters in Forensic Investigations This Registry data provides concrete evidence of microphone re investigating a privacy concern, looking for signs of malware, or gathering digital evidence in a forensic However, it’s crucial to cross-check this data with other forensic artifacts —such as event logs, system

  • Carving Hidden Evidence with Bulk Extractor: The Power of Record Recovery

    the link below. https://www.cyberengage.org/courses-1/data-carving%3A-advanced-techniques-in-digital-forensics ------------------------------------------------------------------------- If you’ve been in digital forensics //www.kazamiya.net/en/bulk_extractor-rec bulk_extractor-rec , on the other hand, looks for specific forensic index data utmp records  — Unix/Linux login/logout records Now, those first five are gold for Windows forensics Carving, you’re missing out on one of the most efficient ways to dig deep into deleted or fragmented forensic

  • Tracking Trusted Office Documents: A Key to Investigating Macro-Based Malware

    For forensic investigators and cybersecurity professionals, tracking which files a user has trusted and Each entry in TrustRecords  logs valuable forensic data: ✅ Full File Path  – The exact location of the ------------------------------------------------------------------ Why Is This Important in Digital Forensics Final Thoughts: A Hidden Treasure for Investigators The TrustRecords  registry key is a goldmine of forensic Forensic investigators and cybersecurity professionals should always check this key  when analyzing:

  • macOS File System Events: The Power of Spotlight

    plutil -p com. apple. spotlight.Shortcuts.v3 Spotlight’s Hidden Treasure: The .Spotlight-V100 Directory Forensic without live system access, some tools can parse the store.db file offline: 1. mac_apt  (Open-source forensic Cellebrite Inspector A commercial tool for forensic analysis Supports offline Spotlight database parsing By leveraging Spotlight databases and command-line tools, forensic analysts can uncover a wealth of hidden Want to learn more about macOS forensics? Stay tuned for our next deep dive!

  • How Windows Knows Your Files Came from the Internet: Alternate Data Streams (Zone.Identifier)

    directories like C:\Windows\System32, where the presence of ZoneID=3 can raise red flags. ** Applications in Forensic focusing on Zone.Identifier streams, can provide valuable insights into the origins of files, aiding forensic investigations in various scenarios, including malware analysis, digital forensics, and e-discovery. Do check out the article Link below: https://www.cyberengage.org/post/mftecmd-mftexplorer-a-forensic-analyst-s-guide Use forensic tools : Software like istat and icat can dig even deeper into ADS details.

  • MemProcFS/MemProcFS Analyzer: Comprehensive Analysis Guide

    MemProcFS  is a powerful memory forensics tool that allows forensic investigators to mount raw memory 1 -license-accept-elastic-license-2.0 The -forensic 1 flag ensures that the image is mounted with forensic Forensic Folder : CSV files  (e.g., pslist.csv): Easily analyzable using Eric Zimmerman's tools. Manual Review of Unparsed Data While MemProcFS automates many aspects of memory forensics, it is crucial The Analyzer Suite automates much of the forensic process, saving time and effort.

bottom of page