top of page

Search Results

285 results found for "forensic"

  • Understanding DLL Hijacking / WMI: A Practical Guide

    Use forensic analysis tools to track DLL creation timestamps. Hijacking Despite being a stealthy technique, DLL hijacking can be detected with careful monitoring and forensic Memory Forensics: Analyze running processes for DLLs loaded from unusual locations. hijacking remains a powerful and widely used attack technique by adversaries, but with proper monitoring, forensic

  • Linux File System Analysis and Linux File Recovery: EXT2/3/4 Techniques Using Debugfs, Ext4magic & Sleuth Kit

    When you're digging into Linux systems, especially during live forensics or incident response, understanding 🔹 Pro Tips: Always double-check you’re using the right device — especially with forensic images or LVM setups. debugfs is super powerful, but read-only usage is safest  in live forensics (avoid writing to Sleuth Kit Magic – Inspect and Recover Like a Forensics Expert If you’re digging into a disk image , maybe from a compromised system or raw forensic capture, you’ll want to mount it and go deeper. 🧱 Mount

  • SRUM: The Digital Detective in Windows

    the System Resource Usage Monitor (SRUM), a powerful tool that has become a game-changer in digital forensic Key Takeaways SRUM offers a treasure trove of information to digital forensic analysts, including: Applications including dates, times, and connected networks Final Thoughts SRUM has revolutionized the way digital forensic

  • Digital Evidence: Techniques for Data Recovery and Analysis

    In today's digital age, forensic investigators face the challenge of extracting valuable evidence from Tools like Magnet Forensics' Internet Evidence Finder (IEF) facilitate the process by scanning for fragments and provide clarity in complex litigation scenarios https://exiftool.org/ Recovering Deleted Files: Forensic Conclusion: By leveraging techniques such as datastream carving, file carving, and metadata parsing, forensic

  • Effective Incident Response: Containment and Eradication

    Forensics Imaging: Critical Importance: A good forensic image is crucial. System Backups: Often, systems haven't been backed up in years, making forensic imaging vital for preserving

  • Examining SRUM with ESEDatabaseView

    This information can be pivotal in forensic investigations, shedding light on user activities and potentially By understanding how to navigate and interpret this data, digital forensic analysts can uncover critical

  • Understanding Registry Hive transaction logs**

    Most registry forensic tools do not perform this check or alert you to this issue. Many forensic tools do not take into account the data stored in the transaction log files and especially

  • Collecting Evidence from Google Workspace

    In reality, they behave quite differently—and those differences really matter during forensic analysis Collecting Logs via the Workspace Admin SDK (API) Now this is where things get really interesting for forensic UI  → great for quick checks and visual walkthroughs Admin SDK / API  → best for fast, consistent, forensic‑grade

  • Understanding VM Types and Azure Network for IR

    For incident response and forensic investigations, the focus is typically on virtual machines (VMs)   Forensics often involves snapshotting the OS disk  of a compromised VM, attaching that snapshot to a Outbound data transfers (when retrieving forensic data). ------------------------------------------------------------------------- Azure Storage: Central to Forensics highly versatile and commonly used for storing large amounts of unstructured data, such as logs during forensic

  • Part 3 Code Injection : How to detect it and Finding Evil in Memory with MemProcFS FindEvil Plugin

    ------------- Power of Volatility for Detection We can still catch these manipulations using memory forensics closer look at a potentially infected process, powershell.exe (PID: 5352) , using ldrmodules  in our forensic Because malware often avoids writing files to disk to evade antivirus detection and forensic analysis Using f orensic tools like malfind  (which detects injected memory sections) and ldrmodules  (which identifies If you’re serious about memory forensics, this tool should be in your arsenal!

  • History of macOS and macOS File Structure

    macOS has its own Library directory  (~/Library/), which contains various subdirectories packed with forensic By examining these files, forensic analysts can uncover user settings, saved states, and even recent The ones that are not  links often contain the most valuable forensic data, such as app-specific databases --------------------------------------------------------------------------------------- Wrapping Up Forensic investigating user preferences, app data, cached files, or system logs, each directory has its own forensic

  • USB Device Profiling: How to Track Key Timestamps

    When it comes to USB key forensics, understanding the timeline of device connections and disconnections ----------------------------------- Conclusion: Tracking USB device activity is a powerful tool for forensic

bottom of page