top of page

Search Results

285 results found for "forensic"

  • Understanding Registry:

    Despite its virtualized nature, UsrClass.dat offers valuable clues about user activities, helping forensic The last write time is crucial for forensic investigations as it provides the timing of specific activities whether timestamps are recorded in UTC or the local time zone is essential for accurate interpretation of forensic

  • Part 5- (WMI): Unveiling the Persistence of Malicious MOF Files: A Deep Dive into #PRAGMA AUTORECOVER

    significance of a specific attribute within MOF files – “#PRAGMA AUTORECOVER” – shedding light on its forensic Forensic Artifacts and Detection: In instances where #PRAGMA AUTORECOVER is part of a malicious MOF file

  • Cyber Triage: Another Powerful Investigation tool

    Developed by Brian Carrier, renowned for his work on filesystem forensic analysis, Autopsy, and The Sleuth My Point of view: Cyber Triage is valuable tool for automated incident response and forensic analysis

  • SharePoint and OneDrive Logs in M365: The Goldmine You’re Overlooking (with a Hidden Twist)

    from the end-user's device And partly from the Microsoft web service acting on their behalf It’s like forensic -------------------------------------------------------------------------------------------- 🎯 The Forensic

  • File Carving: A Simple and Powerful Way to Recover Deleted Files

    It’s highly respected in the forensic community and consistently ranks as one of the top file recovery Tools like PhotoRec make it accessible to anyone, whether you’re a forensic expert or just someone trying

  • Identifying Malicious Software: A Guide for Incident Responders

    One of its standout features is its ability to scan a mounted disk image (such as a forensic triage image Compatibility : Works with both live file systems and mounted forensic images. Log Collection : Always collect logs and quarantine folders when performing forensic investigations to Therefore, capa’s results should be correlated with other forensic findings. ------------------------

  • Part 6-(WMI): Hunting Down Malicious WMI Activity

    Threat hunters should leverage in-memory forensics to level the playing field against sophisticated adversaries coupled with the presence of '#PRAGMA AUTORECOVER' in MOF files, can serve as valuable artifacts for forensic

  • Understanding Rootkits: The Ultimate Cybersecurity Nightmare and Direct Kernel Object Manipulation

    The best way to detect them is through memory analysis and offline disk forensics . Volatility , a popular memory forensics tool, offers several plugins to detect different types of rootkit Normally, tools like tasklist.exe, Sysinternals’ pslist.exe, or even forensic tools like Volatility’s

  • Azure Resource Groups and Role-Based Access Control: A Guide for IR

    But when it comes to incident response or forensic investigation, the Azure landscape can feel overwhelming In a forensic investigation, this is where things get interesting because every subscription can have It’s especially useful during a forensic investigation because you can use any of these tools to explore For forensic investigations and incident response, there are certain Azure products you’re likely to While the underlying actions will still be logged (e.g., through Azure Audit Logs ), direct forensics

  • Case Studies: Building Effective Timelines with Plaso (Log2Timeline)

    www.cyberengage.org/post/running-plaso-log2timeline-on-windows A Deep Dive into Plaso / Log2Timeline Forensic Tools on Linux https://www.cyberengage.org/post/a-deep-dive-into-plaso-log2timeline-forensic-tools At

  • Remote Execution and Kansa – Still One of the Most Underrated IR Tools

    It allows responders to: Gather forensic artifacts quickly from multiple endpoints. You’re trading off a bit of forensic depth for speed and scale , and that’s usually worth it when you flexibility of PowerShell with the structure of a modular framework — perfect for both rapid triage and deep forensic

  • Unveiling Suspicious Files with DensityScout

    DensityScout, a robust tool crafted by Christian Wojner at CERT Austria, stands at the forefront of digital forensics Next Steps As you delve into the world of digital forensics and cybersecurity, consider incorporating

bottom of page