
Please access this website using a laptop / desktop or tablet for the best experience
Search Results
271 results found for "forensic"
- BAM and DAM in Windows Forensics: Tracking Executed Applications
Windows keeps track of many user activities, and one of the lesser-known but valuable forensic artifacts evidence of executed programs , making them useful for tracking user activity, malware execution, and forensic ------------------------------------------------------------- Why Is BAM/DAM Important in Digital Forensics Because of these limitations, BAM/DAM should be used alongside other forensic artifacts for a complete for seven days , they can still offer crucial insights into user activity, malware infections, and forensic
- Windows Hibernation Files: A Critical Artifact for Forensic Investigations
Introduction Windows hibernation files are an essential artifact in digital forensic investigations, As a result, checking for the presence of a hibernation file should be a standard procedure in any forensic One of the most significant advantages of hibernation files is that they offer forensic investigators Volatility Framework Volatility is a well-known open-source memory forensics framework with built-in Other Forensic Tools Several forensic tools have integrated hibernation file analysis capabilities, including
- Metadata Investigation(Exiftool): A Powerful Tool in Digital Forensics
This helps forensic analysts piece together the context of the file’s history. Its flexibility and continuous updates make it an essential addition to any forensic toolkit. Why Metadata Matters in Forensics Metadata provides a layer of context that’s hard to manipulate. This hidden data has been a valuable tool in digital forensics for years, helping investigators track In the world of digital forensics, the smallest details can make the biggest difference.
- Windows Recycle Bin Forensics: Recovering Deleted Files
The Windows Recycle Bin is an important artifact in forensic investigations . track file deletion timestamps at the file system level, the Recycle Bin metadata provides valuable forensic Even with these methods, deleted files may still be recoverable using forensic tools. --------------- Look for Deleted Evidence: If the Recycle Bin has been emptied, attempt file recovery using forensic While users can attempt to bypass it, forensic tools can often recover deleted files and metadata.
- Understanding Host-Based Email Stores in Digital Forensics
Updated on 28 Jan,2025 When investigating emails during digital forensic analysis, knowing where and Using forensic tools that can automatically detect known email archives. From a forensic standpoint, this is great news because Outlook’s email storage formats are well-documented and widely supported by forensic tools. Deleted emails often linger within these files and can be recovered using forensic tools, even if they
- Understanding OST and PST Files: A Guide for Email Forensics
Use Forensic Suites – Advanced forensic tools like AXIOM, X-Ways, FTK, and EnCas e can natively parse Paid Email Forensic Tools Unfortunately, when it comes to email forensics, free tools have limitations Most investigators rely on commercial forensic suites for in-depth analysis. Final Thoughts OST and PST files play a crucial role in email forensics, providing valuable insights Whether you’re using forensic suites or standalone tools, understanding how these files work and where
- Investigating OneDrive for Business: Advanced Forensics & Audit Logs
With Microsoft 365 integration, extensive logging, and advanced security controls , it provides rich forensic with granular user activity ✅ Logs file sharing events, including external access 🚀 Let’s dive into forensic --------------------------------------------- 2️⃣ Investigating OneDrive for Business Registry Keys Forensic Headline of the article Advanced OneDrive Forensics: Investigating Cloud-Only Files & Synchronization Headline of the article Advanced OneDrive Forensics: Investigating Cloud-Only Files & Synchronization
- The Role of USB Devices in Enterprise Threats and Digital Forensics
USB Implementers Forum maintains over twenty distinct device classes , each with unique purposes and forensic ------------------------------------------------------------------- Investigative Techniques in USB Forensics Effective USB forensic investigations involve connecting disparate data points to form a cohesive narrative USB forensics is not without its challenges. USB device forensics is a powerful tool in combating insider threats, preventing data leaks, and uncovering
- Unleashing the Power of DB Browser for Forensic Analysis
Freely available, it has become a favorite not only for database administrators but also for forensic Extracting Browser Artifacts When conducting a forensic analysis, browser artifacts can provide invaluable extract these artifacts is by using Kape (Kroll Artifact Parser and Extractor), a robust tool favored by forensic Practical Tips for Forensic Analysis Identify Key Tables: Focus on tables that store user activity data Conclusion DB Browser, combined with Kape, provides a powerful toolkit for forensic analysis of browser
- OneDrive Forensics : Investigating Cloud Storage on Windows Systems
Understanding OneDrive forensic artifacts is crucial for investigations involving data exfiltration, We will cover: ✅ How to locate and analyze OneDrive data on a Windows system ✅ Key forensic artifacts activity, authentication, and file synchronization history ✅ How OneDrive’s new sync model affects forensic investigations ✅ Tracking cloud-only files & deleted data ✅ Using OneDrive’s forensic artifacts to recover It tracks files shared via Microsoft Teams & SharePoint . 💡 Forensic Insight: Shared folders may not
- Windows LNK Files: A Hidden Treasure for Forensic Investigators
When investigating digital forensics on a Windows system, LNK (shortcut) files serve as one of the most 1️⃣ Proving File Access (Even if Deleted) One of the biggest forensic advantages of L NK files is that The metadata includes the USB device serial number and volume label . 🔍 Forensic Insight: This allows forensic analysts to determine which USB devices were used on a system, even if they are no longer Cross-check with Windows Event Logs and Prefetch data. ✅ Use forensic tools for deeper analysis.
- Tracking Drive Letters and Volume GUIDs : A Forensic Guide
When investigating devices connected to a computer, every small detail can help. Identifying Drive letter: For instance, the v olume name used by a device can link it to files like LNK files , which store volume name The drive letter assigned to the device can lead us to other artifacts like Prefetch files, RecentDocs, Jump Lists, ShellBags, and more. But there’s a catch: drive letter info isn’t always available . Windows only keeps records of the last device assigned to a specific drive letter. Also, the same drive letter can be reused for multiple devices(This can be problematic in because most recent device and its associated information will be recorded). Still, certain artifacts, especially in newer Windows versions (10 and 11), tend to stick around longer, even after system updates. ------------------------------------------------------------------------------------------------------------ Let’s look at two key places where you can dig for drive letter and volume name info: VolumeInfoCache and MountedDevices . 1. VolumeInfoCache: A Quick and Easy Check If you're using Windows 7 or later, this is your starting point. The VolumeInfoCache is located at: SOFTWARE\Microsoft\Windows Search\VolumeInfoCache This key contains sub-keys for each drive letter (like C:, D:, E:, etc.). Each sub-key has a VolumeLabel value, which tells you the volume name of the last device connected to that drive letter. Why use it? Quick and simple: It’s easier to read compared to other registry keys. Good for SCSI drives and VHDs: Especially useful for modern devices like virtual hard drives or USB drives using UASP mode. Limitations: Only records the last device assigned to each drive letter. Timestamps here (the “last write time” of sub-keys) aren’t always reliable for figuring out exactly when the device was connected. 2. MountedDevices: A More Detailed Look If VolumeInfoCache doesn’t give you what you need, try checking SYSTEM\MountedDevices : This key tracks drive letters and the devices mounted to them. It’s especially useful for USB thumb drives ( USBSTOR devices). How it works: Look for values like \DosDevices\E: (where "E:" is the drive letter). Inside the value data, search for the device's iSerialNumber . This links the drive letter to the specific device. Things to keep in mind: Devices can be mounted with different drive letters over time, so check all drive letter values. You might not find a match if another device was mounted at the same drive letter later. ------------------------------------------------------------------------------------------------------------- Special Cases: Hard Drives and Partition Types Hard drives and SSDs (especially those with multiple partitions) are trickier to profil e. Here’s how they work based on the partition scheme: GPT Partitions: Values start with DMIO:ID. The last 16 bytes in the value are the Unique Partition GUID . Search for this GUID in the registry to find keys tied to the original device. For MBR Partitions: If you do not see DMIO:ID at the start of a drive letter value , and do not see a USBSTOR Device ID and iSerialNumber , you are likely looking at partition data from a device using the older Master Boot Record (MBR) partition scheme The first 4 bytes represent the Disk Signature . Search for this Disk Signature in the registry to uncover related keys that identify the device ------------------------------------------------------------------------------------------------------------- Why This Matters Understanding where and how to find drive letter and volume name info can make all the difference in your investigation. While VolumeInfoCache is a fast and easy starting point, SYSTEM\MountedDevices gives you a deeper dive , especially for older or more complex devices. With these tools, y ou’ll be able to connect devices to their artifacts and uncover the story behind what was plugged in and when. ------------------------------------------------------------------------------------------------------------- What’s a Volume GUID? A Volume GUID (Globally Unique Identifier) is Windows’ way of identifying a specific volume or partition on a device. It’s a unique name enclosed in curly braces \??\Volume{???????-????-????-????-??????} For devices like USB flash drives ( MSC USBSTOR ), this Volume GUID can help us track down user activity tied to the device in later steps. How to Find Volume GUIDs for USB Devices If you’re profiling a USB flash drive, check the value data of Volume GUID entries within the MountedDevices key. Look for the device’s iSerialNumber (the unique serial number). If it matches, you’ve found the Volume GUID for that device. Why Is This Step Important? This step lets you: Tie the device to a GUID: This helps you match the device with its associated user account in later steps. Track user activity: You’ll need this Volume GUID to dive deeper into the behavior of the device and its user. Special Note: This method only works for MSC USBSTOR devices, like USB flash drives. For other device types, y ou’ll need to rely on Windows Event Logs to identify which user account was active at the time the device was connected or used. ------------------------------------------------------------------------------------------------------ I know this is alot of information and I want to make thing wasy for you So you ready lets start Lets say you +you’ve identified a unique identifier for your device, such as the iSerialNumber . Registry explorer lets you search across all loaded registry hives at once, saving you a lot of time. How to Search for Device Information Load the right hives Make sure you’ve loaded the SYSTEM , SOFTWARE , and user NTUSER.DAT hives in Registry Explorer. These hives contain most of the data related to devices. Use the Find option: Go to Tools > Find and search for the device’s iSerialNumber (or another unique identifier diskid ). Review the results: If the device information is still present in the registry, you’ll likely see many search hits. Not all of them will be relevant, so focus on keys needed for device profiling. What to Look For Search results will typically include keys that provide: Device ID Last Mountpoint Drive Letter Volume GUID You may also find hits in less common locations, like Windows Portable Devices , which could provide additional details. Double-click any result of interest to jump directly to that registry key within Registry Explorer. Work Smarter, Not Harder While it’s possible to manually comb through the registry to profile a device, this process can be incredibly time-consuming—especially if you’re dealing with multiple devices. By using unique identifiers and leveraging tools like Registry Explorer’s search function, you can dramatically speed up the process. -----------------------------------------------Dean-------------------------------------------------








