Home
sujay adkesar
Cancel

Acquiring RAM Through Cooling Methods

Digital forensic investigators encounter significant challenges when dealing with locked computers or encrypted storage systems. Research conducted by Gupta and Nisbet from Auckland University of...

img Amcache:The Most Misunderstood Artifact

๐Ÿ“Œ Introduction In Windows forensics, Amcache.hve has earned a reputation as a valuable artifact for tracking program executions. Many incident responders and forensic analysts quickly parse Amca...

img The Invisible Insider!

Are Hardware KVMs the Next Big Blind Spot in Digital Forensics?? JetKVM: A $70 hardware KVM device that grants anyone full remote control of a computer-even when powered off or locked-via HDMI/...

img Digital Forensics Tools

Serial Number Tool Name Hyperlink 1 FTK Imager FTK Imager 2 dd for Windows dd for Windows ...

img CFReD | Nist | Hacking Case

CFReDS NIST Hacking Case Scenario cfreds.nist.gov On 09/20/04 , a Dell CPi notebook computer, serial # VLQLW, was found abandoned along with a wireless PCMCIA card and an external home...

front-page port 80-shoopyuPractical Windows Forensics

Agenda The go-to methodology to get up and running with forensics is as follows: Extract Evidence Mount with Arsenal Image Mounter Parse with KAPE into a cases folder Examine Registry ...

How NTFS Self-References Its $MFT

$MFT :) Who is keeping track of the Tracker!! In the world of Windows file systems, there exists a fascinating technical paradox that few users ever consider: The Master File Table (MFT), respon...

front-page port 80-shoopyuWindows Artifacts

System and User Information (via Registry) Artifact Filesystem Location Tools or Commands Operating System Version System Information S...

LNK File Forensics โ€” Experimental Case Study

๐Ÿ” Objective To analyze and demystify the subtle, less-documented behaviors of .LNK (Windows Shortcut) files during document creation, modification, and reopening using real-time forensic testing...

front-page port 80-shoopyuLinux Forensics Essentials

Commands and Artifacts Every Investigator Needs Hereโ€™s a streamlined guide to key Linux artifacts and the commands to extract and analyze them efficiently, enabling forensics investigators to fo...