Windows Forensic Artifacts: Unveiling Key Evidence
Pages Count
28 Pages
Links for the courses
Overview of the differences between various forensic artifacts:Â Â Click Me
----------------------------------------------------------------------------------------------------
Windows Prefetch : Blog Link Click me
directory Analysis :  Tool link Click me
-----------------------------------------------------------------------------
Hibernation Files :  Blog Link Click Me
-----------------------------------------------------------------------------
Shell Bags     :  Blog Link Click Me
SBECmd.exe   :  Tool Link Click Me
----------------------------------------------------------------------------
Lnk Files      :  Blog Link Click Me
LECmd.exe    : Took Link Click Me
---------------------------------------------------------------------------
Artifacts File Opening/Creation P1Â : Click Me
Artifacts File Opening/Creation P2Â : Click Me
---------------------------------------------------------------------------
Artifacts file download P1Â : Click Me
Artifacts file download P2Â : Click Me
---------------------------------------------------------------------------
Artifacts for USB or Drive Usage P1Â : Â Click Me
Artifacts for USB or Drive Usage P2Â : Click Me
---------------------------------------------------------------------------
Shimcache   :  Blog Link Click me
Amcache.hiv :  Tool link  Click meÂ
---------------------------------------------------------------------------
Jump list Files : Blog Link Click Me
JLECmd.exe   : Tool Link Click Me
---------------------------------------------------------------------------
Recycle Bin    : Blog Link  Click Me
Forensic      : Tool Link  Click Me
--------------------------------------------------------------------------
Artifacts Program execution P1 : Â Click Me
Artifacts Program execution P2Â : Â Click Me
--------------------------------------------------------------------------
Artifacts Deleted file Knowledge P1:Â Â Click Me
Artifacts Deleted file Knowledge P2:  Click Me
---------------------------------------------------------------------------
 Artifacts for Account Usage : Click Me
---------------------------------------------------------------------------
Artifacts for Physical Location : Click Me
---------------------------------------------------------------------------
Uncovering Autostart Locations Win. : Click Me
User Access Logging (UAL) Artifact  : Click Me Â
Evidence of Execution: (PCA) Â Â Â Â Â : Click Me
​
Your Instructor
Dean