top of page
-
Mar 1, 20242 min read
Overview of the differences between various forensic artifacts:
LNK (Shortcut) Files: LNK files are Windows shortcut files that contain metadata about the file or program they link to. They can reveal...
48 views0 comments
-
Feb 29, 20242 min read
Artifacts for USB or Drive Usage Part 2: Drive Letter and Volume Name || Volume Serial Number || Shortcut (LNK) Files || P&P Event Log
1.Drive Letter and Volume Name USB devices play a significant role in forensic investigations, and understanding the drive letter and...
38 views0 comments
-
Feb 28, 20242 min read
Artifacts for USB or Drive Usage Part 1: Key Identification || First/Last Times || User
1.Key Identification USB devices are commonly used for data transfer and storage, making them a crucial aspect of digital forensics...
43 views0 comments
-
Feb 27, 20242 min read
Artifacts for Physical Location : Timezone || Browser Search Terms || Network History || Cookies
1.Timezone The system time zone plays a crucial role in forensic investigations as it provides valuable insights into the timing of...
41 views0 comments
-
Feb 26, 20241 min read
Artifacts for Account Usage: Last Login || Success/Fail Logons || Last Password Change || Logon Types || RDP Usage.
1. Last Login: Location: C:\windows\system32\config\SAM SAM\Domains\Account\Users Interpretation: The last login time for local accounts...
40 views0 comments
-
Feb 25, 20242 min read
Artifacts for file download Part 2: Firefox || Internet Explorer || Chrome.
Tools of Analysis: DB Browser for SQLite/SQLciper Armed with the "DB Browser for SQLite," forensic investigators gain a powerful lens...
38 views0 comments
-
Feb 24, 20242 min read
Artifacts for file download Part 1: Open/Save MRU Artifacts || Email Attachments || Skype History
1. Open/Save MRU Artifacts: It acts as a repository for a history of files accessed or saved by users, offering a panoramic view of their...
40 views0 comments
-
Feb 24, 20242 min read
Artifacts for Deleted File or File Knowledge Part 2: Search -WordWheelQuery || Index.dat file://
1.Search-WordWheelQuery The "WordWheelQuery" registry key is a valuable artifact found in the Windows registry of Windows 7 to Windows 10...
50 views0 comments
-
Feb 22, 20242 min read
Artifacts for Deleted File and file knowledge Part 1: ACMRU || Last Visited MRU || Vista/Win7-10 Thumbnails || Recycle Bin.
1.ACMRU Description: On Windows XP machines, the search assistant feature allows users to search for various items such as filenames,...
42 views0 comments
-
Feb 21, 20242 min read
Artifacts for File Opening/Creation Part 2: Last Visited MRU || Office Recent Files || LNK Files || Prefetch || JumpLists.
1.Last Visted MRU Tracks the specific executable used by an application to open the files documented in the OpenSaveMRU key. In addition,...
50 views0 comments
-
Feb 20, 20242 min read
Artifacts for File Opening/Creation Part 1: Open/Save MRU || Recent Files || Shell Bags
1. Open/Save MRU Artifacts: It acts as a repository for a history of files accessed or saved by users, offering a panoramic view of their...
63 views0 comments
-
Feb 19, 20241 min read
Artifacts for Program execution Part 2: Jump Lists || RunMRU Start || UserAssist
1.Jump Lists Get deep details about this artifact from my previous blog. Blog 1: Unveiling the Significance of Jump list Files in...
42 views0 comments
-
Feb 17, 20241 min read
Artifacts for Program execution Part 1: Last Visited MRU || Application Compatibility Cache || Prefetch
1. Last Visited MRU Description: The Last Visited MRU (Most Recently Used) artifact tracks the specific executable files used by an...
61 views0 comments
-
Feb 16, 20241 min read
Lnk files Analysis: Tool-->LECmd.exe
On Live System: (Can be used for collected lnk files) Key Data Extracted from LNK Files: When parsing LNK files, forensic investigators...
36 views0 comments
-
Feb 15, 20242 min read
Unveiling the Significance of LNK Files in Digital Forensics
LNK files, commonly known as shortcuts, play a crucial role in digital forensics by serving as metadata resources utilized by the Windows...
75 views0 comments
-
Feb 14, 20241 min read
Recycle Bin $I analyses Tool-->I_Parse_v1.1
Commands: Locate Recycle Bin in cmd View hidden files: Use the command DIR /ah to display hidden files, including those in the recycle...
45 views0 comments
-
Feb 13, 20242 min read
Recycle Bin forensic
The recycle bin plays a significant role in forensic investigations on Windows filesystems, offering valuable insights into deleted files...
43 views0 comments
-
Feb 12, 20241 min read
Shell Bags Analysis: Tool-->SBECmd.exe or ShellBagsExplorer- GUI Version (Very Important artifact)
Understanding how to extract and analyze shell bag data is essential for investigators seeking to uncover evidence and reconstruct user...
44 views0 comments
-
Feb 11, 20243 min read
Understanding Shell Bags in Windows Forensics
What are Shell Bags? Shell Bags are data structures within the Windows registry that track user window viewing preferences in Windows...
110 views0 comments
-
Feb 10, 20242 min read
Jump list Analysis: Tool-->JLECmd.exe
By leveraging its capabilities, investigators can efficiently extract valuable insights from Jump List files, shedding light on recent...
97 views0 comments
bottom of page