top of page
![](https://static.wixstatic.com/media/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg/v1/fill/w_1920,h_1080,al_c,q_90,enc_avif,quality_auto/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg)
![](https://static.wixstatic.com/media/5fb032_dcf66295c9224af9a594aafd5a1b5f45~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_dcf66295c9224af9a594aafd5a1b5f45~mv2.webp)
![WinAudit Tool Overview](https://static.wixstatic.com/media/5fb032_dcf66295c9224af9a594aafd5a1b5f45~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_dcf66295c9224af9a594aafd5a1b5f45~mv2.webp)
-
Jul 5, 20242 min read
WinAudit Tool Overview
In the evolving landscape of cyber threats, it's critical to have tools that provide comprehensive insights into your system's security....
107 views0 comments
![How to Use SrumECmd to Parse and Analyze SRUDB.dat Files](https://static.wixstatic.com/media/5fb032_e61f610dbe5c413da8ea8b5ca6cdcc5f~mv2.png/v1/fill/w_454,h_171,fp_0.50_0.50,q_95,enc_auto/5fb032_e61f610dbe5c413da8ea8b5ca6cdcc5f~mv2.webp)
-
Jul 1, 20242 min read
How to Use SrumECmd to Parse and Analyze SRUDB.dat Files
Introduction The Windows operating system maintains various logs and databases for performance monitoring, user activity tracking, and...
151 views0 comments
![Unveiling User Activity with LastActivityView by NirSoft](https://static.wixstatic.com/media/5fb032_29a6c9659611442cbb46368d6e7d2790~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_29a6c9659611442cbb46368d6e7d2790~mv2.webp)
-
Jun 29, 20242 min read
Unveiling User Activity with LastActivityView by NirSoft
Introduction Ever wondered what’s been happening on your computer when you weren’t looking? Whether you’re a curious user, a concerned...
49 views0 comments
![Exploring Magnet Encrypted Disk Detector (EDDv310)](https://static.wixstatic.com/media/5fb032_d3c40e6dde824df8b5de4bb9a6911e5d~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_d3c40e6dde824df8b5de4bb9a6911e5d~mv2.webp)
-
Jun 27, 20242 min read
Exploring Magnet Encrypted Disk Detector (EDDv310)
Introduction In the world of digital forensics and incident response, determining if a computer’s drive is encrypted is a crucial step....
120 views0 comments
![](https://static.wixstatic.com/media/5fb032_b62ffa8329d942b78c592c95f1d1efbc~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_b62ffa8329d942b78c592c95f1d1efbc~mv2.webp)
![Unleashing the Power of DB Browser for Forensic Analysis](https://static.wixstatic.com/media/5fb032_b62ffa8329d942b78c592c95f1d1efbc~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_b62ffa8329d942b78c592c95f1d1efbc~mv2.webp)
-
Jun 25, 20242 min read
Unleashing the Power of DB Browser for Forensic Analysis
Introduction DB Browser, also known as SQLite Database Browser, is a powerful tool initially designed to create, search, and modify...
53 views0 comments
![MetaDiver: A Comprehensive Forensic Analysis Tool( for metadata analysis)](https://static.wixstatic.com/media/5fb032_8e4909e9f2ef4464a3c0e7c77c0d3798~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_8e4909e9f2ef4464a3c0e7c77c0d3798~mv2.webp)
-
Jun 23, 20242 min read
MetaDiver: A Comprehensive Forensic Analysis Tool( for metadata analysis)
MetaDiver is a powerful forensic tool designed to analyze and extract metadata from various file types. Overview of MetaDivera MetaDiver...
38 views0 comments
![KAPE: Few Use Cases for Incident Responders](https://static.wixstatic.com/media/5fb032_87f35c8e4854410bb1c4978be6db4910~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_87f35c8e4854410bb1c4978be6db4910~mv2.webp)
-
Jun 21, 20242 min read
KAPE: Few Use Cases for Incident Responders
After numerous requests, I've compiled a comprehensive list of practical use cases for KAPE (Kroll Artifact Parser and Extractor). This...
73 views0 comments
![](https://static.wixstatic.com/media/5fb032_94cc7b8cce5040aa815ef6def1ba4024~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_94cc7b8cce5040aa815ef6def1ba4024~mv2.webp)
![Understanding and Managing Thumbnail Cache in Windows: Tools thumbcache_viewer_64](https://static.wixstatic.com/media/5fb032_94cc7b8cce5040aa815ef6def1ba4024~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_94cc7b8cce5040aa815ef6def1ba4024~mv2.webp)
-
Jun 19, 20242 min read
Understanding and Managing Thumbnail Cache in Windows: Tools thumbcache_viewer_64
Introduction Thumbnail cache in Windows is an essential feature that helps speed up the display of folders by storing thumbnail images. ...
81 views0 comments
![](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
![Streamlining USB Device Identification with a Single Script](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
-
Jun 17, 20242 min read
Streamlining USB Device Identification with a Single Script
Identifying and analyzing USB device details can be a tedious and time-consuming task. It often requires combing through various system...
52 views0 comments
![](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
![USB MSC Device Forensics: A Quick Guide for Windows](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
-
Jun 17, 20242 min read
USB MSC Device Forensics: A Quick Guide for Windows
Hey there, tech detectives! If you're digging into USB devices on Windows 7 to 10, here's a handy guide to help you gather all the...
41 views0 comments
![](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
![Auditing Files and Folders on External Media || Tools for USB Device Analysis](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
-
Jun 16, 20242 min read
Auditing Files and Folders on External Media || Tools for USB Device Analysis
When investigating external media connected to a system, determining what files and folders were accessed on the media is critical. This...
41 views0 comments
![](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
![Linking USB Devices to User Accounts and using Microsoft-Windows-Partition/Diagnostic.evtx for Device Profiling"](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
-
Jun 15, 20243 min read
Linking USB Devices to User Accounts and using Microsoft-Windows-Partition/Diagnostic.evtx for Device Profiling"
Linking USB Devices to User Accounts If the d evice you’re profiling is a mass storage class USBSTOR device , you can go a step further...
45 views0 comments
![](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
![Tracking Drive Letters and Volume GUIDs : A Forensic Guide](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
-
Jun 14, 20244 min read
Tracking Drive Letters and Volume GUIDs : A Forensic Guide
When investigating devices connected to a computer, every small detail can help. Identifying Drive letter: For instance, the v olume...
39 views0 comments
![](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
![USB Device Profiling: How to Track Key Timestamps](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
-
Jun 12, 20242 min read
USB Device Profiling: How to Track Key Timestamps
When it comes to USB key forensics, understanding the timeline of device connections and disconnections can be crucial. Key Timestamps...
40 views0 comments
![](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
![Profiling Device Volume Names in the Windows Registry](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
-
Jun 10, 20242 min read
Profiling Device Volume Names in the Windows Registry
Volume Name When performing a forensic examination of connected devices, one of the key pieces of information we aim to gather is the...
40 views0 comments
![](https://static.wixstatic.com/media/5fb032_e9cb2341ed554a8e80b436df67edff06~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_e9cb2341ed554a8e80b436df67edff06~mv2.webp)
![Windows Common Artifacts Paths for Forensics](https://static.wixstatic.com/media/5fb032_e9cb2341ed554a8e80b436df67edff06~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_e9cb2341ed554a8e80b436df67edff06~mv2.webp)
-
Jun 8, 20241 min read
Windows Common Artifacts Paths for Forensics
In the realm of digital forensics, collecting and analyzing artifacts from various system paths is crucial for uncovering valuable...
31 views0 comments
![](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
![Audit USB Devices on Windows : USBSTOR and USB](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
-
Jun 6, 20243 min read
Audit USB Devices on Windows : USBSTOR and USB
Updated on Jan 24, 2025 USB devices play a crucial role in digital forensics and IT security. Whether you're investigating a security...
42 views0 comments
![](https://static.wixstatic.com/media/5fb032_e9cb2341ed554a8e80b436df67edff06~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_e9cb2341ed554a8e80b436df67edff06~mv2.webp)
![Streamlining Incident analysis: An All-in-One PowerShell Script](https://static.wixstatic.com/media/5fb032_e9cb2341ed554a8e80b436df67edff06~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_e9cb2341ed554a8e80b436df67edff06~mv2.webp)
-
Jun 4, 20242 min read
Streamlining Incident analysis: An All-in-One PowerShell Script
Incident response can be a daunting task, especially when it requires gathering a multitude of system details. To simplify this process,...
202 views0 comments
![](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
![Understanding USB Artifacts: HID, MTP, PTP, and MSC Devices](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
-
Jun 3, 20243 min read
Understanding USB Artifacts: HID, MTP, PTP, and MSC Devices
USB devices play an essential role in digital forensics. While some devices, like Human Interface Devices (HIDs), may not seem...
62 views0 comments
![](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
![The Role of USB Devices in Enterprise Threats and Digital Forensics](https://static.wixstatic.com/media/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_df6748ef48534e80b0f5d6c8655c66f3~mv2.webp)
-
Jun 2, 20242 min read
The Role of USB Devices in Enterprise Threats and Digital Forensics
Since their inception, r emovable devices have posed a significant threat to enterprise security. From insider threats and confidential...
44 views0 comments
bottom of page