
Please access this website using a laptop / desktop or tablet for the best experience
Search Results
271 results found for "forensic"
- Examining SRUM with ESEDatabaseView
This information can be pivotal in forensic investigations, shedding light on user activities and potentially By understanding how to navigate and interpret this data, digital forensic analysts can uncover critical
- Understanding Registry Hive transaction logs**
Most registry forensic tools do not perform this check or alert you to this issue. Many forensic tools do not take into account the data stored in the transaction log files and especially
- Understanding VM Types and Azure Network for IR
For incident response and forensic investigations, the focus is typically on virtual machines (VMs) Forensics often involves snapshotting the OS disk of a compromised VM, attaching that snapshot to a Outbound data transfers (when retrieving forensic data). ------------------------------------------------------------------------- Azure Storage: Central to Forensics highly versatile and commonly used for storing large amounts of unstructured data, such as logs during forensic
- Part 3 Code Injection : How to detect it and Finding Evil in Memory with MemProcFS FindEvil Plugin
------------- Power of Volatility for Detection We can still catch these manipulations using memory forensics closer look at a potentially infected process, powershell.exe (PID: 5352) , using ldrmodules in our forensic Because malware often avoids writing files to disk to evade antivirus detection and forensic analysis Using f orensic tools like malfind (which detects injected memory sections) and ldrmodules (which identifies If you’re serious about memory forensics, this tool should be in your arsenal!
- History of macOS and macOS File Structure
macOS has its own Library directory (~/Library/), which contains various subdirectories packed with forensic By examining these files, forensic analysts can uncover user settings, saved states, and even recent The ones that are not links often contain the most valuable forensic data, such as app-specific databases --------------------------------------------------------------------------------------- Wrapping Up Forensic investigating user preferences, app data, cached files, or system logs, each directory has its own forensic
- USB Device Profiling: How to Track Key Timestamps
When it comes to USB key forensics, understanding the timeline of device connections and disconnections ----------------------------------- Conclusion: Tracking USB device activity is a powerful tool for forensic
- KAPE: Few Use Cases for Incident Responders
hibernation file can contain remnants of data from active sessions, potentially revealing important forensic By integrating KAPE into your digital forensic and incident response workflows, you can streamline your
- Making Sense of $UsnJrnl and $LogFile : Why Journal Analysis is a Game Changer
For more in-depth details, check out the presentation “NTFS Log Tracker” from Forensic Insight—it’s -------------------------------- Wrapping Up By combining insights from both $UsnJrnl and $LogFile, forensic If you're looking to dive deeper into NTFS forensic analysis, checking out tools like istat for parsing So, the next time you're diving into forensic analysis, don’t just stop at the $MFT—dig into the journals
- Understanding and Managing Thumbnail Cache in Windows: Tools thumbcache_viewer_64
Practical Uses Forensics and Investigation For forensic investigators, examining thumbnail cache files
- NirSoft Network Usage View (NUV): Streamlining SRUM Analysis
The landscape of digital forensics is ever-changing, with tools and techniques continually evolving to examining-srum-with-esedatabaseview Conclusion NUV by NirSoft is a valuable addition to the toolkit of digital forensic
- Analyzing Safari Browser, Apple Mail Data and Recents Database Artifacts on macOS
, the default web browser for Apple devices, leaves behind various artifacts that can be useful for forensic Below are the primary locations where forensic artifacts can be found: macOS Locations: ~/Library/Safari This data can be valuable for both forensic investigations and general system understanding. ---------------------- Conclusion Safari stores a vast amount of information that can be crucial in forensic By understanding where and how Safari stores data, forensic experts can uncover hidden user activity,
- Understanding Linux: Kernel Logs, Syslogs, Authentication Logs, and User Management
Run last to read it.Or for a forensic dump from a dead system: last -f /mnt/disk/var/log/wtmp 7. Either use the right commands (last, lastb, who, etc.) or open them in a hex editor when you’re in full forensic So if you're doing forensics on a deadbox, you’d better hope /var/log/journal exists. --------------- system and trying to dig into what happened before it went down: Mount the disk using a live CD or forensic ----------------------------------------- 🔚 Final Thoughts Whether you’re on a live system , doing forensics









