top of page
-
Feb 9, 20242 min read
Unveiling the Significance of Jump list Files in Digital Forensics
Description: Jump Lists represent a dynamic feature engineered to empower users by granting them swift access to frequently or recently...
49 views0 comments
-
Feb 9, 20242 min read
Unveiling Suspicious Files with DensityScout
Introduction DensityScout, a robust tool crafted by Christian Wojner at CERT Austria, stands at the forefront of digital forensics and...
32 views0 comments
-
Feb 7, 20244 min read
KAPE: A Detailed Exploration
Introduction: KAPE, can be used in graphical user interface (GUI), and can be used via the command line interface (CMD). Users typically...
105 views0 comments
-
Feb 6, 20242 min read
Glimpses of Brilliance: Kape
Introduction: KAPE, crafted by Eric Zimmerman, stands as a powerful, free, and versatile triage collection and post-processing tool...
41 views0 comments
-
Feb 5, 20242 min read
Unveiling System Secrets with WinPmem(memory acquisition tool)
Exploring WinPmem WinPmem is a robust memory acquisition tool designed specifically for Windows environments. Its primary function is to...
38 views0 comments
-
Feb 4, 20242 min read
A Dive into Windows Hibernation Files
In the realm of digital forensics, the quest for uncovering valuable artifacts extends beyond live system analysis. While it's commonly...
39 views0 comments
-
Feb 3, 20242 min read
Unleashing the Power of EvtxECmd: Windows Event Log Analysis
Introduction: In the ever-evolving landscape of cybersecurity, the ability to efficiently analyze Windows event logs is paramount. Eric...
169 views0 comments
-
Feb 2, 20242 min read
Amcache.hiv Analysis: Tool--> Registry explorer
Introduction: The Amcache.hve registry hive, introduced with Windows 8 and later backported to patched Windows 7 systems, is a treasure...
124 views0 comments
-
Feb 1, 20242 min read
Shimcache/Amcache Analysis: Tool-->AppCompactCacheParser.exe/AmcacheParser.exe
AmcacheParser.exe :- https://github.com/EricZimmerman/AmcacheParser AppCompatCacheParser.exe :- https://github.com/EricZimmerman/AppCompa...
50 views0 comments
-
Jan 31, 20242 min read
Forensic Collection of Execution Evidence through AppCompatCache(Shimcache)/Amcache.hiv
Introduction: In the ever-evolving landscape of digital forensics, understanding the artifacts left behind by operating systems is...
76 views0 comments
-
Jan 30, 20242 min read
Prefetch Analysis: Tool-->PECmd.exe
Prefetching, a process optimizing system performance by loading data into memory before needed, generates valuable artifacts in the form...
44 views0 comments
-
Jan 29, 20242 min read
Forensic Collection of Execution Evidence through Prefetch Analysis
Introduction: In the intricate landscape of digital forensics, one often-overlooked goldmine of information lies within the Windows...
44 views0 comments
-
Jan 28, 20242 min read
Post 6: Credential Theft: Understanding and Securing NTDS.DIT
In the intricate world of cybersecurity, few targets are as coveted by attackers as the domain controller, and among its treasures, the...
22 views0 comments
-
Jan 27, 20242 min read
Post 5: Credential Theft: Understanding and Securing Tickets
In the intricate realm of Windows enterprise security, the reliance on the Kerberos authentication protocol is ubiquitous. This protocol,...
16 views0 comments
-
Jan 26, 20242 min read
Post 4: Credential Theft: Understanding and Securing LSA Secrets
In the intricate world of Windows security, the protection of credentials is a top priority. One area of concern that often draws the...
58 views0 comments
-
Jan 25, 20242 min read
Post 3: Credential Theft: Understanding and Securing Cached Domain
In a domain environment, the Domain Controller (DC) plays a pivotal role in authenticating user accounts. However, what happens when a...
19 views0 comments
-
Jan 24, 20242 min read
Post 2: Credential Theft: Understanding and Securing Tokens
In this blog post, we will delve into the significance of security tokens, explore the risks associated with token stealing, and outline...
17 views0 comments
-
Jan 23, 20242 min read
Post 1: Credential Theft: Understanding and Securing Hashes
Introduction: When it comes to credential compromise, a primary target is the account password hashes stored in Windows. These...
21 views0 comments
-
Jan 22, 20241 min read
Exploring Credentials theft way and defense: Upcoming Topics
In my upcoming blog series, we'll embark on a journey to unravel the complexities surrounding credential theft, exploring various attack...
11 views0 comments
-
Jan 22, 20243 min read
Part 4-(Persistence) DLL Persistence Attacks: Navigating Windows Vulnerabilities
Introduction: DLL (Dynamic Link Library) persistence attacks are a sophisticated breed of cyber threats that exploit legitimate and...
26 views0 comments
bottom of page