top of page
![](https://static.wixstatic.com/media/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg/v1/fill/w_1920,h_1080,al_c,q_90,enc_avif,quality_auto/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg)
![](https://static.wixstatic.com/media/5fb032_045a98c118214d11abff6b56e09db29d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_045a98c118214d11abff6b56e09db29d~mv2.webp)
![Enterprise-Wide Incident Response: Leveraging Logs and Data for Effective Threat Detection](https://static.wixstatic.com/media/5fb032_045a98c118214d11abff6b56e09db29d~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_045a98c118214d11abff6b56e09db29d~mv2.webp)
-
May 30, 20243 min read
Enterprise-Wide Incident Response: Leveraging Logs and Data for Effective Threat Detection
In the realm of cybersecurity, incident response (IR) is a critical function that helps organizations detect, mitigate, and recover from...
38 views0 comments
![](https://static.wixstatic.com/media/5fb032_045a98c118214d11abff6b56e09db29d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_045a98c118214d11abff6b56e09db29d~mv2.webp)
![Effective Incident Response: Containment and Eradication](https://static.wixstatic.com/media/5fb032_045a98c118214d11abff6b56e09db29d~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_045a98c118214d11abff6b56e09db29d~mv2.webp)
-
May 28, 20242 min read
Effective Incident Response: Containment and Eradication
In the realm of cybersecurity, responding to incidents promptly and effectively is crucial. This detailed guide covers best practices in...
34 views0 comments
![](https://static.wixstatic.com/media/5fb032_8921f22cdb9748019f252aea16a24136~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_8921f22cdb9748019f252aea16a24136~mv2.webp)
![NirSoft Network Usage View (NUV): Streamlining SRUM Analysis](https://static.wixstatic.com/media/5fb032_8921f22cdb9748019f252aea16a24136~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_8921f22cdb9748019f252aea16a24136~mv2.webp)
-
May 26, 20242 min read
NirSoft Network Usage View (NUV): Streamlining SRUM Analysis
The landscape of digital forensics is ever-changing, with tools and techniques continually evolving to meet the demands of modern...
42 views0 comments
![](https://static.wixstatic.com/media/5fb032_8921f22cdb9748019f252aea16a24136~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_8921f22cdb9748019f252aea16a24136~mv2.webp)
![Examining SRUM with ESEDatabaseView](https://static.wixstatic.com/media/5fb032_8921f22cdb9748019f252aea16a24136~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_8921f22cdb9748019f252aea16a24136~mv2.webp)
-
May 24, 20242 min read
Examining SRUM with ESEDatabaseView
You can download tool from link below: https://www.nirsoft.net/utils/ese_database_view.html Opening SRUM Database with NirSoft Using...
60 views0 comments
![](https://static.wixstatic.com/media/5fb032_8921f22cdb9748019f252aea16a24136~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_8921f22cdb9748019f252aea16a24136~mv2.webp)
![Unpacking SRUM: The Digital Forensics Goldmine in Windows](https://static.wixstatic.com/media/5fb032_8921f22cdb9748019f252aea16a24136~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_8921f22cdb9748019f252aea16a24136~mv2.webp)
-
May 23, 20244 min read
Unpacking SRUM: The Digital Forensics Goldmine in Windows
Updated on 31 Jan, 2025 Enter the System Resource Usage Monitor (SRUM) — a treasure trove for digital forensic analysts. The SRUM...
140 views0 comments
![](https://static.wixstatic.com/media/5fb032_8921f22cdb9748019f252aea16a24136~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_8921f22cdb9748019f252aea16a24136~mv2.webp)
![SRUM: The Digital Detective in Windows](https://static.wixstatic.com/media/5fb032_8921f22cdb9748019f252aea16a24136~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_8921f22cdb9748019f252aea16a24136~mv2.webp)
-
May 22, 20242 min read
SRUM: The Digital Detective in Windows
In today's digital age, the significance of digital evidence in criminal investigations cannot be overstated. As technology evolves, so...
65 views0 comments
![](https://static.wixstatic.com/media/5fb032_7e9fe8d4f2b2457db2503f70eeadf13e~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_7e9fe8d4f2b2457db2503f70eeadf13e~mv2.webp)
![My First Day at Ankura: A New Chapter Begins](https://static.wixstatic.com/media/5fb032_7e9fe8d4f2b2457db2503f70eeadf13e~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_7e9fe8d4f2b2457db2503f70eeadf13e~mv2.webp)
-
May 20, 20241 min read
My First Day at Ankura: A New Chapter Begins
Today marks the beginning of an exciting new chapter in my professional journey as I join Ankura as Cybersecurity Incident response,...
25 views0 comments
-
May 19, 20241 min read
Blog Post: Ensuring System Security Post-Attack – Comprehensive Remediation Steps
In today's digital landscape, cyberattacks are an ever-present threat. It's essential to have a robust remediation plan to ensure...
47 views0 comments
![Theoretical Important notes for Memory Acquisition and Disk Encryption](https://static.wixstatic.com/media/5fb032_9440d895fcc24f42ac7e29c162e95fca~mv2.png/v1/fill/w_454,h_318,fp_0.50_0.50,q_95,enc_auto/5fb032_9440d895fcc24f42ac7e29c162e95fca~mv2.webp)
-
May 18, 20242 min read
Theoretical Important notes for Memory Acquisition and Disk Encryption
Introduction: In the world of digital forensics, thorough memory acquisition and disk encryption detection are essential steps in...
18 views0 comments
![Unveiling Threats: Exploring Active Directory Replication from Non Machine Account + Mimikatz DC Sync.”](https://static.wixstatic.com/media/5fb032_719e01c9e6d6462eb8cc12692670f8f9~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_719e01c9e6d6462eb8cc12692670f8f9~mv2.webp)
-
May 16, 20241 min read
Unveiling Threats: Exploring Active Directory Replication from Non Machine Account + Mimikatz DC Sync.”
Today, I'm excited to share a fascinating blog post written by one of my dearest friends, Jaye V from ConnectWise. In this insightful...
34 views0 comments
![](https://static.wixstatic.com/media/5fb032_c9858f1f915c4bba886c755badfb7e0d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_c9858f1f915c4bba886c755badfb7e0d~mv2.webp)
![Saying Goodbye: Reflecting on My Journey with ConnectWise](https://static.wixstatic.com/media/5fb032_c9858f1f915c4bba886c755badfb7e0d~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_c9858f1f915c4bba886c755badfb7e0d~mv2.webp)
-
May 15, 20241 min read
Saying Goodbye: Reflecting on My Journey with ConnectWise
As I sit down to write this blog post, my heart is filled with a mix of emotions. Today marks the end of an incredible chapter in my life...
8 views0 comments
![](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
![Webmail Forensics / Mobile Email Forensics: A Critical Component of Digital Investigations](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
-
May 14, 20242 min read
Webmail Forensics / Mobile Email Forensics: A Critical Component of Digital Investigations
Introduction Webmail forensics is a crucial aspect of digital investigations, especially in cases involving cybercrime, fraud, and...
40 views0 comments
![](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
![Webmail Forensics: Challenges, Techniques, and Investigation Tools](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
-
May 13, 20244 min read
Webmail Forensics: Challenges, Techniques, and Investigation Tools
Update on 29 Jan, 2025 Webmail presents unique challenges for forensic investigations due to its cloud-based nature. Unlike traditional...
42 views0 comments
![](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
![Microsoft 365: Content Search, Unified Audit Logs, and Extracting Logs for Investigations](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
-
May 11, 20243 min read
Microsoft 365: Content Search, Unified Audit Logs, and Extracting Logs for Investigations
Updated on 29 Jan,2025 Microsoft 365 Purview Compliance Manager offers a powerful Content Search feature that allows organizations to...
44 views0 comments
![](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
![Leveraging Compliance Search in Microsoft Exchange for Email Investigations](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
-
May 9, 20242 min read
Leveraging Compliance Search in Microsoft Exchange for Email Investigations
Microsoft Exchange offers powerful tools for searching, archiving, and reviewing emails. One of these tools, Compliance Search , is...
45 views0 comments
![](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
![Email Data Extraction(Collecting and Analyzing Evidence from Modern Email Systems)](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
-
May 8, 20243 min read
Email Data Extraction(Collecting and Analyzing Evidence from Modern Email Systems)
Every email you send passes through an email server at some point. The key question is whether the email still lives on the server or has...
38 views0 comments
![](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
![Collecting Email Evidence from Network-Based Servers](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
-
May 6, 20242 min read
Collecting Email Evidence from Network-Based Servers
Collecting email evidence from mail servers can indeed be challenging due to various factors like server location, criticality to...
28 views0 comments
![](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
![Understanding the Recoverable Items Folder in Exchange Online](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
-
May 5, 20243 min read
Understanding the Recoverable Items Folder in Exchange Online
Updated on 29 Jan, 2025 In today's digital world, emails play a crucial role in business communications. However, accidental deletions,...
60 views0 comments
![](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
![Email Storage: Server vs. Workstation](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
-
May 2, 20242 min read
Email Storage: Server vs. Workstation
Determining the location of email data—whether on a server or a workstation—is a pivotal first step for forensic investigators. Email...
36 views0 comments
![](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
![Demystifying Email Encryption and Forensic Analysis](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
-
May 1, 20242 min read
Demystifying Email Encryption and Forensic Analysis
Email remains a primary communication tool, handling a vast amount of sensitive information daily. As such, understanding email...
30 views0 comments
bottom of page