Home
sujay adkesar
Cancel

img Amcache:The Most Misunderstood Artifact

📌 Introduction In Windows forensics, Amcache.hve has earned a reputation as a valuable artifact for tracking program executions. Many incident responders and forensic analysts quickly parse Amca...

img The Invisible Insider!

Are Hardware KVMs the Next Big Blind Spot in Digital Forensics?? JetKVM: A $70 hardware KVM device that grants anyone full remote control of a computer-even when powered off or locked-via HDMI/...

img Digital Forensics Tools

Serial Number Tool Name Hyperlink 1 FTK Imager FTK Imager 2 dd for Windows dd for Windows ...

img CFReD | Nist | Hacking Case

CFReDS NIST Hacking Case Scenario cfreds.nist.gov On 09/20/04 , a Dell CPi notebook computer, serial # VLQLW, was found abandoned along with a wireless PCMCIA card and an external home...

front-page port 80-shoopyuPractical Windows Forensics

Agenda The go-to methodology to get up and running with forensics is as follows: Extract Evidence Mount with Arsenal Image Mounter Parse with KAPE into a cases folder Examine Registry ...

front-page port 80-shoopyuWindows Artifacts

System and User Information (via Registry) Artifact Filesystem Location Tools or Commands Operating System Version System Information S...

$MFT :) Who is keeping track of the Tracker!! In the world of Windows file systems, there exists a fascinating technical paradox that few users ever consider: The Master File Table (MFT), respon...

front-page port 80-shoopyuLinux Forensics Essentials

Commands and Artifacts Every Investigator Needs Here’s a streamlined guide to key Linux artifacts and the commands to extract and analyze them efficiently, enabling forensics investigators to fo...

Windows Forensics Tools Windows Forensics Tools

Browser Forensics Hind Sight Analyze browser history. Chrome History Analyzer Tool for Chrome browser analysis. Web Browser Forensic Tool Supports multiple browsers. ...

img File Upload Vulnerabilities 🗃️

1. Unrestricted File Type Upload: Allowing users to upload files without proper validation can lead to the execution of malicious scripts. An attacker may upload a file with a double extension...