top of page
![](https://static.wixstatic.com/media/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg/v1/fill/w_1920,h_1080,al_c,q_90,enc_avif,quality_auto/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg)
![Mastering JLECmd for Windows Jump List Forensics](https://static.wixstatic.com/media/5fb032_6bad9837b5504b67991044ea3384bf71~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_6bad9837b5504b67991044ea3384bf71~mv2.webp)
-
Feb 10, 20244 min read
Mastering JLECmd for Windows Jump List Forensics
Windows Jump Lists  are a goldmine  for forensic investigators, offering detailed insights into file access, user activity, and...
132 views0 comments
![Windows Taskbar Jump Lists: A Forensic Goldmine](https://static.wixstatic.com/media/5fb032_5ac3114419cb408f8f1e3159cfeef783~mv2.png/v1/fill/w_454,h_326,fp_0.50_0.50,q_95,enc_auto/5fb032_5ac3114419cb408f8f1e3159cfeef783~mv2.webp)
-
Feb 9, 20246 min read
Windows Taskbar Jump Lists: A Forensic Goldmine
Jump Lists are one of the most overlooked yet powerful artifacts  in Windows forensic investigations. Introduced in Windows 7 , they...
67 views0 comments
![Unveiling Suspicious Files with DensityScout](https://static.wixstatic.com/media/5fb032_25933578dafc4a8e88d90792cb2c74ae~mv2.png/v1/fill/w_454,h_314,fp_0.50_0.50,q_95,enc_auto/5fb032_25933578dafc4a8e88d90792cb2c74ae~mv2.webp)
-
Feb 9, 20242 min read
Unveiling Suspicious Files with DensityScout
Introduction DensityScout, a robust tool crafted by Christian Wojner at CERT Austria, stands at the forefront of digital forensics and...
34 views0 comments
![KAPE: A Detailed Exploration](https://static.wixstatic.com/media/5fb032_87f35c8e4854410bb1c4978be6db4910~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_87f35c8e4854410bb1c4978be6db4910~mv2.webp)
-
Feb 7, 20244 min read
KAPE: A Detailed Exploration
Introduction: KAPE, can be used in graphical user interface (GUI), and can be used via the command line interface (CMD). Users typically...
129 views0 comments
![Glimpses of Brilliance: Kape](https://static.wixstatic.com/media/5fb032_87f35c8e4854410bb1c4978be6db4910~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_87f35c8e4854410bb1c4978be6db4910~mv2.webp)
-
Feb 6, 20242 min read
Glimpses of Brilliance: Kape
Introduction: KAPE, crafted by Eric Zimmerman, stands as a powerful, free, and versatile triage collection and post-processing tool...
52 views0 comments
![Unveiling System Secrets with WinPmem(memory acquisition tool)](https://static.wixstatic.com/media/5fb032_b972968ca65f4a708db5fbbf684855b6~mv2.png/v1/fill/w_454,h_142,fp_0.50_0.50,q_95,enc_auto/5fb032_b972968ca65f4a708db5fbbf684855b6~mv2.webp)
-
Feb 5, 20242 min read
Unveiling System Secrets with WinPmem(memory acquisition tool)
Exploring WinPmem WinPmem is a robust memory acquisition tool designed specifically for Windows environments. Its primary function is to...
40 views0 comments
![A Dive into Windows Hibernation Files](https://static.wixstatic.com/media/5fb032_771fd9e473f24af4bdecb2c0d4ba9155~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_771fd9e473f24af4bdecb2c0d4ba9155~mv2.webp)
-
Feb 4, 20242 min read
A Dive into Windows Hibernation Files
In the realm of digital forensics, the quest for uncovering valuable artifacts extends beyond live system analysis. While it's commonly...
40 views0 comments
![Unleashing the Power of EvtxECmd: Windows Event Log Analysis](https://static.wixstatic.com/media/5fb032_d695eef59a1c4bf8bdac1b60e819b539~mv2.png/v1/fill/w_454,h_223,fp_0.50_0.50,q_95,enc_auto/5fb032_d695eef59a1c4bf8bdac1b60e819b539~mv2.webp)
-
Feb 3, 20242 min read
Unleashing the Power of EvtxECmd: Windows Event Log Analysis
Introduction: In the ever-evolving landscape of cybersecurity, the ability to efficiently analyze Windows event logs is paramount. Eric...
183 views0 comments
![Amcache.hiv Analysis: Tool--> Registry explorer](https://static.wixstatic.com/media/5fb032_a2cafca198504b2fb99ebd36e2729e13~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_a2cafca198504b2fb99ebd36e2729e13~mv2.webp)
-
Feb 2, 20242 min read
Amcache.hiv Analysis: Tool--> Registry explorer
Introduction: The Amcache.hve registry hive, introduced with Windows 8 and later backported to patched Windows 7 systems, is a treasure...
152 views0 comments
![Shimcache/Amcache Analysis: Tool-->AppCompactCacheParser.exe/AmcacheParser.exe](https://static.wixstatic.com/media/5fb032_fab95612a8a0402784fd1666e1f4e0ac~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_fab95612a8a0402784fd1666e1f4e0ac~mv2.webp)
-
Feb 1, 20242 min read
Shimcache/Amcache Analysis: Tool-->AppCompactCacheParser.exe/AmcacheParser.exe
AmcacheParser.exe :- https://github.com/EricZimmerman/AmcacheParser AppCompatCacheParser.exe :- https://github.com/EricZimmerman/AppCompa...
59 views0 comments
![Forensic Collection of Execution Evidence through AppCompatCache(Shimcache)/Amcache.hiv](https://static.wixstatic.com/media/5fb032_e72eef3d1c34485bbd186805a7a8b713~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_e72eef3d1c34485bbd186805a7a8b713~mv2.webp)
-
Jan 31, 20242 min read
Forensic Collection of Execution Evidence through AppCompatCache(Shimcache)/Amcache.hiv
Introduction: In the ever-evolving landscape of digital forensics, understanding the artifacts left behind by operating systems is...
83 views0 comments
![Prefetch Analysis with PECmd and WinPrefetchView](https://static.wixstatic.com/media/5fb032_57bb46ba1efe4c048832c5cea928fbaf~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_57bb46ba1efe4c048832c5cea928fbaf~mv2.webp)
-
Jan 30, 20243 min read
Prefetch Analysis with PECmd and WinPrefetchView
Windows Prefetch  is a critical forensic artifact that helps track program execution history . While Prefetch files can be manually...
64 views0 comments
![Windows Prefetch Files: A Forensic Goldmine for Tracking Program Execution](https://static.wixstatic.com/media/5fb032_e72eef3d1c34485bbd186805a7a8b713~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_e72eef3d1c34485bbd186805a7a8b713~mv2.webp)
-
Jan 29, 20244 min read
Windows Prefetch Files: A Forensic Goldmine for Tracking Program Execution
Windows Prefetch  is one of the most valuable forensic artifacts for tracking program execution history . By analyzing Prefetch files,...
65 views0 comments
![Post 6: Credential Theft: Understanding and Securing NTDS.DIT](https://static.wixstatic.com/media/5fb032_01f6fa9057764c3ba44b698ec89ec31f~mv2.png/v1/fill/w_450,h_252,fp_0.50_0.50,q_95,enc_auto/5fb032_01f6fa9057764c3ba44b698ec89ec31f~mv2.webp)
-
Jan 28, 20242 min read
Post 6: Credential Theft: Understanding and Securing NTDS.DIT
In the intricate world of cybersecurity, few targets are as coveted by attackers as the domain controller, and among its treasures, the...
25 views0 comments
![Post 5: Credential Theft: Understanding and Securing Tickets](https://static.wixstatic.com/media/5fb032_841b2541296e4e169e43037bb7024746~mv2.png/v1/fill/w_454,h_279,fp_0.50_0.50,q_95,enc_auto/5fb032_841b2541296e4e169e43037bb7024746~mv2.webp)
-
Jan 27, 20242 min read
Post 5: Credential Theft: Understanding and Securing Tickets
In the intricate realm of Windows enterprise security, the reliance on the Kerberos authentication protocol is ubiquitous. This protocol,...
16 views0 comments
![Post 4: Credential Theft: Understanding and Securing LSA Secrets](https://static.wixstatic.com/media/5fb032_426cbbe396b5427aa42762ecbdf2a67a~mv2.png/v1/fill/w_405,h_228,fp_0.50_0.50,q_95,enc_auto/5fb032_426cbbe396b5427aa42762ecbdf2a67a~mv2.webp)
-
Jan 26, 20242 min read
Post 4: Credential Theft: Understanding and Securing LSA Secrets
In the intricate world of Windows security, the protection of credentials is a top priority. One area of concern that often draws the...
61 views0 comments
![Post 3: Credential Theft: Understanding and Securing Cached Domain](https://static.wixstatic.com/media/5fb032_806ff9f8049d4a01a5a308c312ee76d7~mv2.png/v1/fill/w_454,h_265,fp_0.50_0.50,q_95,enc_auto/5fb032_806ff9f8049d4a01a5a308c312ee76d7~mv2.webp)
-
Jan 25, 20242 min read
Post 3: Credential Theft: Understanding and Securing Cached Domain
In a domain environment, the Domain Controller (DC) plays a pivotal role in authenticating user accounts. However, what happens when a...
21 views0 comments
![Post 2: Credential Theft: Understanding and Securing Tokens](https://static.wixstatic.com/media/5fb032_72a680bb66004c46a6e9779bafcb9588~mv2.png/v1/fill/w_405,h_228,fp_0.50_0.50,q_95,enc_auto/5fb032_72a680bb66004c46a6e9779bafcb9588~mv2.webp)
-
Jan 24, 20242 min read
Post 2: Credential Theft: Understanding and Securing Tokens
In this blog post, we will delve into the significance of security tokens, explore the risks associated with token stealing, and outline...
18 views0 comments
![Post 1: Credential Theft: Understanding and Securing Hashes](https://static.wixstatic.com/media/5fb032_806ff9f8049d4a01a5a308c312ee76d7~mv2.png/v1/fill/w_454,h_265,fp_0.50_0.50,q_95,enc_auto/5fb032_806ff9f8049d4a01a5a308c312ee76d7~mv2.webp)
-
Jan 23, 20242 min read
Post 1: Credential Theft: Understanding and Securing Hashes
Introduction: When it comes to credential compromise, a primary target is the account password hashes stored in Windows. These...
26 views0 comments
![Exploring Credentials theft way and defense: Upcoming Topics](https://static.wixstatic.com/media/5fb032_806ff9f8049d4a01a5a308c312ee76d7~mv2.png/v1/fill/w_454,h_265,fp_0.50_0.50,q_95,enc_auto/5fb032_806ff9f8049d4a01a5a308c312ee76d7~mv2.webp)
-
Jan 22, 20241 min read
Exploring Credentials theft way and defense: Upcoming Topics
In my upcoming blog series, we'll embark on a journey to unravel the complexities surrounding credential theft, exploring various attack...
11 views0 comments
bottom of page