top of page
-
May 26, 20242 min read
NirSoft Network Usage View (NUV): Streamlining SRUM Analysis
The landscape of digital forensics is ever-changing, with tools and techniques continually evolving to meet the demands of modern...
39 views0 comments
-
May 24, 20242 min read
Examining SRUM with ESEDatabaseView
You can download tool from link below: https://www.nirsoft.net/utils/ese_database_view.html Opening SRUM Database with NirSoft Using...
58 views0 comments
-
May 23, 20242 min read
Unpacking SRUM: The Digital Forensics Goldmine in Windows
Enter the System Resource Usage Monitor (SRUM) — a treasure trove for digital forensic analysts. The SRUM Database: A Wealth of Insights...
112 views0 comments
-
May 22, 20242 min read
SRUM: The Digital Detective in Windows
In today's digital age, the significance of digital evidence in criminal investigations cannot be overstated. As technology evolves, so...
61 views0 comments
-
May 20, 20241 min read
My First Day at Ankura: A New Chapter Begins
Today marks the beginning of an exciting new chapter in my professional journey as I join Ankura as Cybersecurity Incident response,...
25 views0 comments
-
May 19, 20241 min read
Blog Post: Ensuring System Security Post-Attack – Comprehensive Remediation Steps
In today's digital landscape, cyberattacks are an ever-present threat. It's essential to have a robust remediation plan to ensure...
47 views0 comments
-
May 18, 20242 min read
Theoretical Important notes for Memory Acquisition and Disk Encryption
Introduction: In the world of digital forensics, thorough memory acquisition and disk encryption detection are essential steps in...
15 views0 comments
-
May 16, 20241 min read
Unveiling Threats: Exploring Active Directory Replication from Non Machine Account + Mimikatz DC Sync.”
Today, I'm excited to share a fascinating blog post written by one of my dearest friends, Jaye V from ConnectWise. In this insightful...
31 views0 comments
-
May 15, 20241 min read
Saying Goodbye: Reflecting on My Journey with ConnectWise
As I sit down to write this blog post, my heart is filled with a mix of emotions. Today marks the end of an incredible chapter in my life...
8 views0 comments
-
May 14, 20242 min read
Mobile Email and SMS/MMS Forensics: A Critical Component of Digital Investigations
Mobile devices have become an indispensable part of our daily lives, and as such, they often contain valuable evidence that can be...
31 views0 comments
-
May 13, 20242 min read
Navigating the Complexities of Webmail Forensics: Challenges and Solutions
Webmail has become an integral part of our digital lives, but it presents unique challenges for forensic investigators. Unlike...
34 views0 comments
-
May 11, 20242 min read
Unleashing the Power of Content Search in Office 365 for Email Investigations
In today's digital landscape, the ability to swiftly and effectively search across vast amounts of data is paramount for organizations....
36 views0 comments
-
May 9, 20242 min read
Leveraging Compliance Search in Microsoft Exchange for Email Investigations
Microsoft Exchange has consistently evolved, incorporating new features to enhance email management, searching, archiving, and...
38 views0 comments
-
May 8, 20242 min read
Email Data Extraction from Exchange Servers
With the release of Exchange 2010 and its subsequent Service Packs, PowerShell-based command-line tools have become the preferred method...
31 views0 comments
-
May 6, 20242 min read
Collecting Email Evidence from Network-Based Servers
Collecting email evidence from mail servers can indeed be challenging due to various factors like server location, criticality to...
24 views0 comments
-
May 5, 20242 min read
The "Recoverable Items" Folder in Microsoft Exchange
The evolution of the Recoverable Items folder in Exchange 2010 showcases Microsoft's commitment to enhancing legal compliance, data...
49 views0 comments
-
May 2, 20242 min read
Email Storage: Server vs. Workstation
Determining the location of email data—whether on a server or a workstation—is a pivotal first step for forensic investigators. Email...
34 views0 comments
-
May 1, 20242 min read
Demystifying Email Encryption and Forensic Analysis
Email remains a primary communication tool, handling a vast amount of sensitive information daily. As such, understanding email...
26 views0 comments
-
Apr 30, 20242 min read
Navigating the Email Clients, Features of Modern Email Clients, Corrupted Email Archives
What is Email client? An email client, often simply referred to as an "email program" or "email software," is a computer program or...
33 views0 comments
-
Apr 29, 20241 min read
Outlook Attachment Recovery
Key Points: Temporary Storage: When attachments are previewed or opened in Outlook, they are saved temporarily in this folder on the...
32 views0 comments
bottom of page