
Please access this website using a laptop / desktop or tablet for the best experience
Search Results
271 results found for "forensic"
- Let's Talk About HTTP – The Backbone of the Web (And a Goldmine for DFIR Folks)
But if you're into digital forensics, incident response , or just cybersecurity in general, knowing For us forensic folks, cookies can reveal: Logins Tracking IDs User behavior across sessions You’d be q=forensic This tells the server which page you clicked from. Great for web performance and forensic timeline building . Forensics tip: Don’t stop at the first hop!
- SentinelOne: Navigating a Cybersecurity Titan
limitations , and how you can use it not just for endpoint detection and response (EDR) but also as a forensic Using SentinelOne for Forensics : Can you use SentinelOne as a forensic tool?
- BPF Ninja: Making Sense of Tcpdump, Wireshark, and the PCAP World
Today we’re diving into a topic every network forensic analyst must get familiar with: tcpdump and These files are gold for forensic investigations. Okay, this is where things get forensically juicy. ) You’ll probably need these in more forensic-heavy cases: vlan 100 → Capture traffic on VLAN 100. gateway Combine it with tools like Wireshark for analysis and you've got a forensic powerhouse in your hands.
- Incident Response Framework Containment Phase
This stealthy approach helps in preserving evidence crucial for forensic analysis. Preserving Forensic Evidence: Gathering and securing evidence is crucial for understanding the attack's
- Collecting Email Evidence from Network-Based Servers
export. 3) Specialized Applications for Searching, Filtering, and Extracting Messages Method: Utilize forensic Whether it's live imaging, mailbox exports, or specialized forensic tools, each approach has its advantages
- Running Plaso/Log2Timeline on Windows
In my previous blog, A Deep Dive into Plaso Log2Timeline Forensic Tools, I covered how to use Plaso Log2Timeline Blog Link :- https://www.cyberengage.org/post/a-deep-dive-into-plaso-log2timeline-forensic-tools Getting https://www.cyberengage.org/post/a-deep-dive-into-plaso-log2timeline-forensic-tools By following these steps, you can efficiently run Plaso on Windows and perform comprehensive forensic analysis.
- Understanding Registry:
Despite its virtualized nature, UsrClass.dat offers valuable clues about user activities, helping forensic The last write time is crucial for forensic investigations as it provides the timing of specific activities whether timestamps are recorded in UTC or the local time zone is essential for accurate interpretation of forensic
- Part 5- (WMI): Unveiling the Persistence of Malicious MOF Files: A Deep Dive into #PRAGMA AUTORECOVER
significance of a specific attribute within MOF files – “#PRAGMA AUTORECOVER” – shedding light on its forensic Forensic Artifacts and Detection: In instances where #PRAGMA AUTORECOVER is part of a malicious MOF file
- Cyber Triage: Another Powerful Investigation tool
Developed by Brian Carrier, renowned for his work on filesystem forensic analysis, Autopsy, and The Sleuth My Point of view: Cyber Triage is valuable tool for automated incident response and forensic analysis
- SharePoint and OneDrive Logs in M365: The Goldmine You’re Overlooking (with a Hidden Twist)
from the end-user's device And partly from the Microsoft web service acting on their behalf It’s like forensic -------------------------------------------------------------------------------------------- 🎯 The Forensic
- File Carving: A Simple and Powerful Way to Recover Deleted Files
It’s highly respected in the forensic community and consistently ranks as one of the top file recovery Tools like PhotoRec make it accessible to anyone, whether you’re a forensic expert or just someone trying
- Part 6-(WMI): Hunting Down Malicious WMI Activity
Threat hunters should leverage in-memory forensics to level the playing field against sophisticated adversaries coupled with the presence of '#PRAGMA AUTORECOVER' in MOF files, can serve as valuable artifacts for forensic











