top of page
-
Mar 4, 20241 min read
Understanding NTFS Timestamps(Timeline Analysis) : With Example
Lets understand with example: We have created table to understand NTFS Operations 1. Create Operation: When a file is created, according...
39 views0 comments
-
Mar 3, 20242 min read
Understanding NTFS Timestamps (Timeline Analysis)
Introduction: In digital forensics, understanding NTFS timestamps is crucial for reconstructing events and analyzing user activities on a...
149 views0 comments
-
Mar 2, 20242 min read
Understanding Timeline Analysis in Digital Forensics
What is Timeline Analysis? Timeline analysis in digital forensics is the process of examining chronological data to reconstruct events...
87 views0 comments
-
Mar 1, 20242 min read
Overview of the differences between various forensic artifacts:
LNK (Shortcut) Files: LNK files are Windows shortcut files that contain metadata about the file or program they link to. They can reveal...
55 views0 comments
-
Feb 27, 20242 min read
Artifacts for Physical Location : Timezone || Browser Search Terms || Network History || Cookies
1.Timezone The system time zone plays a crucial role in forensic investigations as it provides valuable insights into the timing of...
43 views0 comments
-
Feb 26, 20241 min read
Artifacts for Account Usage: Last Login || Success/Fail Logons || Last Password Change || Logon Types || RDP Usage.
1. Last Login: Location: C:\windows\system32\config\SAM SAM\Domains\Account\Users Interpretation: The last login time for local accounts...
48 views0 comments
-
Feb 25, 20242 min read
Artifacts for file download Part 2: Firefox || Internet Explorer || Chrome.
Tools of Analysis: DB Browser for SQLite/SQLciper Armed with the "DB Browser for SQLite," forensic investigators gain a powerful lens...
40 views0 comments
-
Feb 24, 20242 min read
Artifacts for file download Part 1: Open/Save MRU Artifacts || Email Attachments || Skype History
1. Open/Save MRU Artifacts: It acts as a repository for a history of files accessed or saved by users, offering a panoramic view of their...
43 views0 comments
-
Feb 24, 20242 min read
Artifacts for Deleted File or File Knowledge Part 2: Search -WordWheelQuery || Index.dat file://
1.Search-WordWheelQuery The "WordWheelQuery" registry key is a valuable artifact found in the Windows registry of Windows 7 to Windows 10...
52 views0 comments
-
Feb 22, 20242 min read
Artifacts for Deleted File and file knowledge Part 1: ACMRU || Last Visited MRU || Vista/Win7-10 Thumbnails || Recycle Bin.
1.ACMRU Description: On Windows XP machines, the search assistant feature allows users to search for various items such as filenames,...
43 views0 comments
-
Feb 21, 20242 min read
Artifacts for File Opening/Creation Part 2: Last Visited MRU || Office Recent Files || LNK Files || Prefetch || JumpLists.
1.Last Visted MRU Tracks the specific executable used by an application to open the files documented in the OpenSaveMRU key. In addition,...
53 views0 comments
-
Feb 20, 20242 min read
Artifacts for File Opening/Creation Part 1: Open/Save MRU || Recent Files || Shell Bags
1. Open/Save MRU Artifacts: It acts as a repository for a history of files accessed or saved by users, offering a panoramic view of their...
69 views0 comments
-
Feb 19, 20241 min read
Artifacts for Program execution Part 2: Jump Lists || RunMRU Start || UserAssist
1.Jump Lists Get deep details about this artifact from my previous blog. Blog 1: Unveiling the Significance of Jump list Files in...
47 views0 comments
-
Feb 17, 20241 min read
Artifacts for Program execution Part 1: Last Visited MRU || Application Compatibility Cache || Prefetch
1. Last Visited MRU Description: The Last Visited MRU (Most Recently Used) artifact tracks the specific executable files used by an...
63 views0 comments
-
Feb 16, 20244 min read
LECmd: A Powerful Tool for Investigating LNK Files
This article have been updated on 22 January 2025 When investigating user activity on a Windows system, LNK (shortcut) files  serve as a...
54 views0 comments
-
Feb 15, 20244 min read
Windows LNK Files: A Hidden Treasure for Forensic Investigators
When investigating digital forensics on a Windows system, LNK (shortcut) files  serve as one of the most valuable sources of user...
96 views0 comments
-
Feb 14, 20242 min read
Analyzing Recycle Bin Metadata with RBCmd and $I_Parse
When investigating deleted files on a Windows system, analyzing the Recycle Bin metadata can provide crucial insights. In this guide,...
57 views0 comments
-
Feb 13, 20242 min read
Windows Recycle Bin Forensics: Recovering Deleted Files
The Windows Recycle Bin is an important artifact in forensic investigations . When a user deletes a file using the graphical interface,...
48 views0 comments
-
Feb 12, 20245 min read
Unlocking ShellBags Analysis with ShellBags Explorer (SBE) / SBECmd.exe
ShellBags  can provide invaluable insights into a user’s activity— helping forensic analysts reconstruct deleted folders, track accessed...
67 views0 comments
-
Feb 11, 20243 min read
Understanding ShellBags: A Forensic Goldmine in Windows Investigations
When investigating user activity on a Windows system, ShellBags  are one of the most powerful yet misunderstood  forensic artifacts....
151 views0 comments
bottom of page