top of page

Search Results

285 results found for "forensic"

  • String Searching with bstrings: Carving Files and Finding Hidden Data

    ------------------------------------------------------------------- Why String Searching Matters in Forensics String searching is one of the most versatile forensic techniques. Specialized forensic tools can decompress some file types, but coverage is incomplete, especially for I highly recommend checking out the article on Memory Forensics using Strings or Bstrings . It’s free, fast, and incredibly powerful—perfect for anyone looking to level up their forensic skills

  • Microsoft Cloud Services: Focus on Microsoft 365 and Azure

    The impact of licensing on forensic investigations is significant, as it determines the extent of data In forensic investigations, having access to these higher-tier licenses is essential for capturing a The IaaS aspect allows customers to control virtual machines directly, enabling traditional forensic processes such as imaging, memory analysis, and the installation of specialized forensic tools. In hybrid environments, these licensing considerations directly impact the data available for forensics

  • Understanding, Collecting, Parsing the $I30

    Updated on Feb 17,2025 Introduction: In the intricate world of digital forensics, every byte of data Utilizing "$I30" Files as Forensic Resources: $I30 files provide an additional forensic avenue for accessing They’re free, powerful, and packed with features for analyzing different forensic artifacts. Indx2Csv processes I NDX records that have been exported from forensic tools like FTK Imager or The Sleuth Wrapping Up Indx2Csv is a powerful, easy-to-use tool for forensic investigators who need to dig into

  • Jump List Changes in Windows 10 & 11: What You Need to Know

    These changes have expanded the range of recorded data, making Jump Lists even more valuable for forensic The destination location The time the folder was copied  (based on the target creation timestamp ) 💡 Forensic The entry’s last modified time  logs the exact time the search was performed. 💡 Forensic Tip:   By analyzing Thoughts Jump Lists in Windows 10 and 11 offer more data  than ever before, making them a powerful forensic Stay tuned for more deep dives into Windows forensic artifacts!

  • Private Browsing: What Really Gets Left Behind? and Recovering Deleted Browser Artifacts.

    and Hibernation Files) Since private browsing keeps data in memory, it can still be retrieved if a forensic File and Data Carving  – Specialized forensic tools like Magnet Axiom, FTK, and Belkasoft  can extract Modern browsers are getting better at hiding private browsing data, but forensic are evolving too. Browsers hold a treasure trove of data that can be crucial for digital forensics. Some of the best tools for recovering deleted SQLite data include: Sanderson Forensics SQLite Recovery

  • Decoding Google Drive’s Protocol Buffers and Investigating Cached Files

    Example: 📌 Forensic Use: ✅ Recover filenames & hashes from cached files ✅ Extract Google account details 3️⃣ Collecting Google Drive’s Local Content Cache Since Google Drive operates as a virtual drive , forensic Cached thumbnails and previews  may persist for longer periods . 📌 Forensic Use: (Using DB Browser) Suites  (Autopsy, FTK, EnCase) 📌 Forensic Use: ✅ Determine file type even without extensions ✅ Identify -------------- We will explore more about Google Drive in the next article (Automating Google Drive Forensics

  • Making Sense of SRUM Data with SRUM_DUMP Tool

    If you're digging into Windows forensic artifacts, SRUM (System Resource Usage Monitor) data is a goldmine This tool is a game-changer for forensic analysts. After extracting your forensic image or pulling out the SRUDB.dat  file and the SOFTWARE  registry hive ---------------------------------------- Understanding SRUM Data Now, let’s break down what kind of forensic So, if you haven't tried it yet, give it a shot—it might just become one of your go-to forensic tools

  • Unveiling Volatility 3: A Guide to Installation and Memory Analysis on Windows and WSL

    Today, let's dive into the fascinating world of digital forensics by exploring Volatility 3 —a powerful While some forensic suites like OS Forensics  offer integrated Volatility functionality, this guide Moreover, WSL allows you to leverage Linux-based forensic tools, which can often be more efficient. Significance of -pid Parameter in Memory Forensics is used as a parameter. Analysis Forensic tools like Volatility 3  often run more smoothly in a Linux environment due to Linux

  • LECmd: A Powerful Tool for Investigating LNK Files

    A Tool That Doesn't Hide Data Many forensic tools process LNK files, but not all of them extract every & Relative Path  – The folder the file was stored in and its location relative to system paths. 🔍 Forensic device ✅ UNC Path (if applicable)  – Network location if the file was accessed via a shared drive. 🔍 Forensic Insight: If an LNK file points to a USB drive , forensic analysts can match the volume serial number LNK files in a folder: LECmd.exe -d G:\G\Users --csv "E:\Output for testing" --csvf lnkfile.csv 🔍 Forensic

  • Prefetch Analysis with PECmd and WinPrefetchView

    Windows Prefetch  is a critical forensic artifact that helps track program execution history . While Prefetch files can be manually analyzed, forensic tools like PECmd  (by Eric Zimmerman) and WinPrefetchView Collect Prefetch files before executing forensic tools. 🔍 2. Keep your forensic VM in UTC time  to prevent automatic time conversions by analysis tools. --------- deleted applications. ✅ File references inside Prefetch files can reveal hidden malware or deleted forensic

  • Tracking Microphone and Camera Usage in Windows (Program Execution: CompatibilityAccessManager)

    This information is stored in the Windows Registry , making it a valuable forensic artifact for investigators The ones of most interest to forensic investigators are: microphone  → Logs apps that accessed the microphone Why This Data Matters in Forensic Investigations This Registry data provides concrete evidence of microphone re investigating a privacy concern, looking for signs of malware, or gathering digital evidence in a forensic However, it’s crucial to cross-check this data with other forensic artifacts —such as event logs, system

  • Carving Hidden Evidence with Bulk Extractor: The Power of Record Recovery

    the link below. https://www.cyberengage.org/courses-1/data-carving%3A-advanced-techniques-in-digital-forensics ------------------------------------------------------------------------- If you’ve been in digital forensics //www.kazamiya.net/en/bulk_extractor-rec bulk_extractor-rec , on the other hand, looks for specific forensic index data utmp records  — Unix/Linux login/logout records Now, those first five are gold for Windows forensics Carving, you’re missing out on one of the most efficient ways to dig deep into deleted or fragmented forensic

bottom of page