top of page

Search Results

271 results found for "forensic"

  • Hayabusa: A Powerful Log Analysis Tool for Forensics and Threat Hunting

    Windows logs are full of juicy forensic breadcrumbs: logon events, privilege use, command executions, It’s an open-source digital forensics and incident response (DFIR) framework, and Hayabusa fits in beautifully www.cyberengage.org/courses-1/mastering-velociraptor%3A-a-comprehensive-guide-to-incident-response-and-digital-forensics avoid triggering antivirus tools like Windows Defender and to minimize file writes  on disk (protecting forensic -------------------------------- Final Thoughts If you’re working in threat detection, response, or forensics

  • Where Do We Begin? A Network Forensic Investigator’s Steps

    Forensic Mindset article let’s be honest—when you're knee-deep in a digital forensic investigation or But this is actually where the real DFIR (Digital Forensics and Incident Response) journey begins. -- Complexity ✅ Simple config ⚠️ Varies with features Use Case 🟡 Light monitoring 🟢 Heavy-duty, IR, forensics

  • Memory Forensics Using Strings and Bstrings: A Comprehensive Guide

    Memory forensics  involves extracting and analyzing data from a computer's volatile memory (RAM) to identify potential Indicators of Compromise (IOCs) or forensic artifacts crucial for incident response. provide practical examples, and explore how they can aid in quick identification of IOCs during memory forensics Advanced Usage with Offsets When you use strings with volatility (another powerful memory forensics -------------------------------------------------------------------------- Saving the Output Often, forensic

  • Leveraging Automation in AWS for Digital Forensics and Incident Response

    For those of us working in digital forensics  and incident response (DFIR) , keeping up with the cloud For those who are new to the cloud or want a quick start to cloud forensics, A mazon Machine Images SIFT (SANS Investigative Forensic Toolkit)  is a popular option for forensics analysis and is available Tasks with AWS Lambda One of the most exciting aspects of cloud-based forensics is the potential for Use the AWS Systems Manager (SSM)  agent to run forensic scripts on the instance.

  • Forensic Challenges of Cloud-Based Investigations in Large Organizations

    Forensic Access : Forensics in a SaaS environment is usually limited to logs, often determined by the Cloud-Based Forensics vs. Traditional On-Premises Forensics With traditional on-premises forensics , investigators have deep access Cloud forensics, however, is a different story. Conclusion: Embracing Cloud Forensics in an Evolving Threat Landscape Cloud forensics presents a unique

  • A Deep Dive into Plaso/Log2Timeline Forensic Tools

    backend engine powering log2timeline, while log2timeline is the tool we use to extract timestamps and forensic They can incorporate Windows event logs, prefetch data, shell bags, link files, and numerous other forensic This comprehensive approach provides a more holistic view of system activity, making it invaluable for forensic Filters: - Filter will tell logged timeline to go after specific files that would contain forensically extra Conclusion: In conclusion, Plaso/Log2Timeline stands as a cornerstone in the field of digital forensics

  • Understanding Linux Timestamps and Key Directories in Forensic Investigations

    When it comes to forensic investigations, Windows is often the primary focus. The Importance of Timestamps: MACB Much like in Windows, timestamps in Linux provide crucial forensic ************************************************** Key Linux Directories for Incident Response In a forensic Journaling and Forensic Analysis Linux filesystems like EXT3 and EXT4 use journaling to protect against data corruption , but accessing this data can be a challenge for forensic investigators.

  • Setting Up Velociraptor for Forensic Analysis in a Home Lab

    Velociraptor is a powerful tool for incident response and digital forensics, capable of collecting and Important Note:  This setup is intended for forensic analysis in a home lab, not for production environments client.config.yaml client -v This will configure Velociraptor to act as a client and start sending forensic decide to run Velociraptor manually or set it up as a service, you now have the flexibility to collect forensic explore the Velociraptor GUI interface , diving into how you can manage clients, run hunts, and collect forensic

  • Investigating macOS File System Events: The Hidden Forensic Trail

    This little-known database logs file system modifications, making it invaluable for forensic investigations Additionally , when individuals with limited forensic expertise are tasked with image collection, errors To address this challenge, I leveraged two powerful forensic artifact collection scripts: UAC ( https For instance, in this specific case, I used UAC  to extract key forensic data from a macOS system. Forensic analysts can extract and analyze .fseventsd data to reconstruct file system activity, including

  • Forensic Investigation: Techniques and Tools for Effective Threat Hunting

    In the ever-evolving landscape of cybersecurity, forensic investigators must be equipped with a diverse Sysmon logs, particularly Event ID 1, are invaluable for forensic investigators. $J and ZIP Files One of the key challenges in forensic investigations is detecting data exfiltration Documents" OR "TrustRecords") Conclusion By leveraging the tools and techniques outlined in this blog, forensic

  • Advanced OneDrive Forensics: Investigating Cloud-Only Files & Synchronization

    This presents new forensic challenges  since not all files exist locally , and standard filesystem artifacts We’ll cover: ✅ How OneDrive’s new sync model affects forensic investigations ✅ Tracking cloud-only files & deleted data ✅ Using OneDrive’s forensic artifacts to recover missing evidence ------------------- A forensic image may miss cloud-only files  unless OneDrive logs or sync databases are analyzed. ---- ------- 2️⃣ Where to Find OneDrive Artifacts Even if files are not stored locally , OneDrive leaves forensic

  • Comprehensive Guide to Identifying File and Folder Access in Digital Forensics

    When investigating digital forensics cases, confirming which files and folders have been opened or accessed However, putting them all together in a structured way helps streamline forensic investigations. Article: Tracking Recently Opened Files in Microsoft Office: A Forensic Guide 5. Articles: Windows Taskbar Jump Lists: A Forensic Goldmine Mastering JLECmd for Windows Jump List Forensics artifacts serve as invaluable tools in digital forensics.

bottom of page