My First Day at Ankura: A New Chapter Begins
Blog Post: Ensuring System Security Post-Attack – Comprehensive Remediation Steps
Theoretical Important notes for Memory Acquisition and Disk Encryption
Unveiling Threats: Exploring Active Directory Replication from Non Machine Account + Mimikatz DC Sync.”
Saying Goodbye: Reflecting on My Journey with ConnectWise
Mobile Email and SMS/MMS Forensics: A Critical Component of Digital Investigations
Navigating the Complexities of Webmail Forensics: Challenges and Solutions
Unleashing the Power of Content Search in Office 365 for Email Investigations
Leveraging Compliance Search in Microsoft Exchange for Email Investigations
Email Data Extraction from Exchange Servers
Collecting Email Evidence from Network-Based Servers
The "Recoverable Items" Folder in Microsoft Exchange
Email Storage: Server vs. Workstation
Demystifying Email Encryption and Forensic Analysis
Navigating the Email Clients, Features of Modern Email Clients, Corrupted Email Archives
Outlook Attachment Recovery
Exploring PST and OST File Viewers for Forensic Analysis
Understanding Host-Based Email in Digital Forensics
Detailed explanation of SPF, DKIM, DMARC
Deep Dive into Additional Email Header Fields in Digital Forensics