
Please access this website using a laptop / desktop or tablet for the best experience
Search Results
285 results found for "forensic"
- Event Log Clearing and Malware Execution: Evidence from Windows Logs
If you’ve worked in cybersecurity or digital forensics for even a short while, you’ve probably realized In fact, many pieces of malware crash — and those crashes are pure gold for forensic analysts. In forensics, success isn’t about having perfect data.
- Profiling Device Volume Names in the Windows Registry
Volume Name When performing a forensic examination of connected devices, one of the key pieces of information
- Enhancing Your Logging Capabilities with Sysmon for ransomware/Any type of attack
This can be incredibly valuable for security monitoring, incident response, and forensic investigations
- Unveiling User Activity with LastActivityView by NirSoft
Practical Uses Forensic Analysis For investigators , LastActivityView can help piece together what happened
- Making Sense of macOS Logs(Part1): A User-Friendly Guide
consistent logging experience across macOS, iOS, watchOS, and tvOS, making it easier for developers and forensic (Standard log format) This method enables you to analyze macOS logs efficiently on Windows , making forensic Audit logs play a crucial role in security monitoring, forensics, and compliance. . ✅ Provide forensic evidence in incident response cases. -------------------------------------------
- Azure(NSG/Storage Account Logs) : A Guide for IR
--------------------------------------------------- Practical Applications in Incident Response and Forensics For security and forensic purposes, it’s especially important to enable the StorageRead log to track Best Practices for Incident Response and Forensics For effective incident response: Enable and monitor
- SentinelOne(P9- Settings): A Practical Guide/An Practical Training
Licenses : See which features you have paid for, such as Remote Ops Forensic or Network Discovery .
- Lateral Movement Analysis: Using Chainsaw, Hayabusa, and LogParser for Cybersecurity Investigations
various attack vectors, which can seem daunting, even for seasoned Incident Response (IR) and Digital Forensics You can check out the following posts: Hayabusa: A Powerful Log Analysis Tool for Forensics and Threat underlying artifacts (e.g., $J, $MFT) and how to analyze them manually is what truly sets you apart as a forensic A big thank you to Yamato Security Group in Japan for creating a tool that truly makes the work of forensic
- Understanding Scheduled Tasks in Windows
If an attacker sets up a malicious scheduled task, forensic investigators can analyze these locations
- Aurora Incident Response: A Powerful Open-Source Tool for Investigators
Estimate when triage or forensic results will be available for specific machines. This section aids investigators in ensuring that every system gets the attention it needs during the forensic
- Carbon Black (P3:Investigate): A Practical Guide/An Practical Training
It’s like a forensic magnifying glass, enabling SOC analysts to dig into both failed and successful operations
- Understanding NTFS File System Metadata and System Files
Understanding these NTFS components is vital for forensic analysts, system administrators, and cybersecurity











