top of page

Search Results

303 results found for "forensic"

  • Unlocking ShellBags Analysis with ShellBags Explorer (SBE) / SBECmd.exe

    ShellBags  can provide invaluable insights into a user’s activity— helping forensic analysts reconstruct ShellBags Explorer is a free, all-in-one forensic tool  designed to parse ShellBags artifacts effortlessly Suppose we have three folders under a parent folder, as seen in forensic tools like ShellBags Explorer Why This Matters in Forensics Understanding this timestamp limitation is crucial when reconstructing Correlating with other forensic artifacts is necessary .  

  • Understanding Filesystem Timestamps: A Practical Guide for Investigators

    In the digital forensics world, understanding how timestamps work is crucial. Various software and system activities can modify timestamps, sometimes in ways that obscure forensic Anti-Forensic & Malware Tools:  Attackers use file system APIs to modify timestamps, making malicious This has major implications for forensic investigations. Explore forensic tools like Plaso, Timesketch, and Velociraptor to take your timeline analysis skills

  • Metadata Recovery: Bringing Deleted Files Back to Life

    This opens a window for forensic experts to recover these "lost" files . What Is Metadata Recovery? Forensic tools can use this information to locate the file’s data and attempt to restore it. This means that forensic experts can recover the data if it hasn’t been overwritten yet. Forensic tools examine the metadata to find: Where the file was stored How big it is What type of file Autopsy : An open-source forensic suite with metadata recovery features.

  • Disk Imaging (Part 1) : Memory Acquisition & Encryption Checking

    Whether you’re working in digital forensics, IT, or just want to back up your system. Modern Forensic Acquisition Methods In the past, forensic specialists followed a “dead box” approach If it was a regular computer (not a server), forensics experts would unplug it directly. Include this information in your forensic reports for future reference. GUI Tools When performing live forensics, minimizing system impact is critical .

  • String Searching with bstrings: Carving Files and Finding Hidden Data

    ------------------------------------------------------------------- Why String Searching Matters in Forensics String searching is one of the most versatile forensic techniques. Specialized forensic tools can decompress some file types, but coverage is incomplete, especially for I highly recommend checking out the article on Memory Forensics using Strings or Bstrings . It’s free, fast, and incredibly powerful—perfect for anyone looking to level up their forensic skills

  • Analyzing and Extracting Bitmap Cache Files from RDP Sessions

    designed to enhance performance by storing screen sections that don't change often, can be crucial in forensic However, from a forensic perspective, these cached files can be a goldmine of information. By extracting and analyzing the bitmap cache, forensic analysts can potentially uncover information such It's a powerful tool for forensic investigations, allowing analysts to reconstruct parts of the screen However, it requires a licensed copy of EnCase, which may be a limitation for some forensic teams.

  • Tracking USB Activity Through Event Logs: Every Plug Tells a Story

    If you’re curious to learn even more, don’t forget to check out the full USB forensics series as well Event Logs for USB Activity https://www.cyberengage.org/post/windows-event-logs-for-usb-activity USB Forensic Series https://www.cyberengage.org/courses-1/usb-forensics ----------------------------------------- The Logging Ecosystem Before diving into specific events, it's worth understanding that USB forensics This is the capability that transforms USB forensics from "a device was plugged in" to "this user copied

  • Microsoft Cloud Services: Focus on Microsoft 365 and Azure

    The impact of licensing on forensic investigations is significant, as it determines the extent of data In forensic investigations, having access to these higher-tier licenses is essential for capturing a The IaaS aspect allows customers to control virtual machines directly, enabling traditional forensic processes such as imaging, memory analysis, and the installation of specialized forensic tools. In hybrid environments, these licensing considerations directly impact the data available for forensics

  • Understanding, Collecting, Parsing the $I30

    Updated on Feb 17,2025 Introduction: In the intricate world of digital forensics, every byte of data Utilizing "$I30" Files as Forensic Resources: $I30 files provide an additional forensic avenue for accessing They’re free, powerful, and packed with features for analyzing different forensic artifacts. Indx2Csv processes I NDX records that have been exported from forensic tools like FTK Imager or The Sleuth Wrapping Up Indx2Csv is a powerful, easy-to-use tool for forensic investigators who need to dig into

  • Jump List Changes in Windows 10 & 11: What You Need to Know

    These changes have expanded the range of recorded data, making Jump Lists even more valuable for forensic The destination location The time the folder was copied  (based on the target creation timestamp ) 💡 Forensic The entry’s last modified time  logs the exact time the search was performed. 💡 Forensic Tip:   By analyzing Thoughts Jump Lists in Windows 10 and 11 offer more data  than ever before, making them a powerful forensic Stay tuned for more deep dives into Windows forensic artifacts!

  • Private Browsing: What Really Gets Left Behind? and Recovering Deleted Browser Artifacts.

    and Hibernation Files) Since private browsing keeps data in memory, it can still be retrieved if a forensic File and Data Carving  – Specialized forensic tools like Magnet Axiom, FTK, and Belkasoft  can extract Modern browsers are getting better at hiding private browsing data, but forensic are evolving too. Browsers hold a treasure trove of data that can be crucial for digital forensics. Some of the best tools for recovering deleted SQLite data include: Sanderson Forensics SQLite Recovery

  • Volume Shadow Copies: The Hidden Evidence Goldmine You Need to Know About

    To know more about forensic Wipers: Link below https://www.cyberengage.org/post/every-forensic-investigator-should-know-these-common-antiforensic-wipers That's a huge deal for forensics — we're talking recovering deleted executables, DLLs, drivers, registry Here's where the real forensic tools come in. If you're building a forensic timeline, log2timeline.py has built-in support for VSS. For forensic analysts, that's a gift.

bottom of page