top of page

Search Results

285 results found for "forensic"

  • KAPE: Few Use Cases for Incident Responders

    hibernation file can contain remnants of data from active sessions, potentially revealing important forensic By integrating KAPE into your digital forensic and incident response workflows, you can streamline your

  • Making Sense of $UsnJrnl and $LogFile : Why Journal Analysis is a Game Changer

    For more in-depth details, check out the presentation “NTFS Log Tracker”  from Forensic Insight—it’s -------------------------------- Wrapping Up By combining insights from both $UsnJrnl and $LogFile, forensic If you're looking to dive deeper into NTFS forensic analysis, checking out tools like istat for parsing So, the next time you're diving into forensic analysis, don’t just stop at the $MFT—dig into the journals

  • Understanding and Managing Thumbnail Cache in Windows: Tools thumbcache_viewer_64

    Practical Uses Forensics and Investigation For forensic investigators, examining thumbnail cache files

  • NirSoft Network Usage View (NUV): Streamlining SRUM Analysis

    The landscape of digital forensics is ever-changing, with tools and techniques continually evolving to examining-srum-with-esedatabaseview Conclusion NUV by NirSoft is a valuable addition to the toolkit of digital forensic

  • Analyzing Safari Browser, Apple Mail Data and Recents Database Artifacts on macOS

    , the default web browser for Apple devices, leaves behind various artifacts that can be useful for forensic Below are the primary locations where forensic artifacts can be found: macOS Locations: ~/Library/Safari This data can be valuable for both forensic investigations and general system understanding. ---------------------- Conclusion Safari stores a vast amount of information that can be crucial in forensic By understanding where and how Safari stores data, forensic experts can uncover hidden user activity,

  • Understanding Linux: Kernel Logs, Syslogs, Authentication Logs, and User Management

    Run last to read it.Or for a forensic dump from a dead system: last -f /mnt/disk/var/log/wtmp 7. Either use the right commands (last, lastb, who, etc.) or open them in a hex editor when you’re in full forensic So if you're doing forensics on a deadbox, you’d better hope /var/log/journal exists. --------------- system and trying to dig into what happened before it went down: Mount the disk  using a live CD or forensic ----------------------------------------- 🔚 Final Thoughts Whether you’re on a live system , doing forensics

  • Let's Talk About HTTP – The Backbone of the Web (And a Goldmine for DFIR Folks)

    But if you're into digital forensics, incident response , or just cybersecurity in general, knowing For us forensic folks, cookies can reveal: Logins Tracking IDs User behavior across sessions You’d be q=forensic This tells the server which page you clicked from. Great for web performance  and forensic timeline building . Forensics tip: Don’t stop at the first hop!

  • SentinelOne: Navigating a Cybersecurity Titan

    limitations , and how you can use it not just for endpoint detection and response (EDR) but also as a forensic Using SentinelOne for Forensics : Can you use SentinelOne as a forensic tool?

  • BPF Ninja: Making Sense of Tcpdump, Wireshark, and the PCAP World

    Today we’re diving into a topic every network forensic analyst must  get familiar with: tcpdump  and These files are gold for forensic investigations. Okay, this is where things get forensically juicy. ) You’ll probably need these in more forensic-heavy cases: vlan 100  → Capture traffic on VLAN 100. gateway Combine it with tools like Wireshark for analysis and you've got a forensic powerhouse in your hands.

  • Incident Response Framework Containment Phase

    This stealthy approach helps in preserving evidence crucial for forensic analysis. Preserving Forensic Evidence: Gathering and securing evidence is crucial for understanding the attack's

  • Collecting Email Evidence from Network-Based Servers

    export. 3) Specialized Applications for Searching, Filtering, and Extracting Messages Method: Utilize forensic Whether it's live imaging, mailbox exports, or specialized forensic tools, each approach has its advantages

  • Running Plaso/Log2Timeline on Windows

    In my previous blog, A Deep Dive into Plaso Log2Timeline Forensic Tools, I covered how to use Plaso Log2Timeline Blog Link :- https://www.cyberengage.org/post/a-deep-dive-into-plaso-log2timeline-forensic-tools Getting https://www.cyberengage.org/post/a-deep-dive-into-plaso-log2timeline-forensic-tools By following these steps, you can efficiently run Plaso on Windows and perform comprehensive forensic analysis.

bottom of page