Week 10 – 2025

Akash Patel Google Chrome Forensics: Analyzing History and cache Browser Forensics: Uncovering Digital Clues Understanding Chrome’s Data Storage and Session Recovery : What Your Browser Remembers Understanding Browser Storage and Chrome’s Preferences File for Forensic Investigations Understanding Chrome Synchronization: A Digital Forensics Perspective Investigating Chromium-Based Browsers: A Forensic Guide/Browser analysis Book Firefox Browser Forensics Series: Lets […]

Week 09 – 2025

Abdulrehman AliMustang Panda APT Adversary Simulation Akash Patel Running Plaso/Log2Timeline on Windows Mastering Timeline Analysis: A Practical Guide for Digital Forensics: (Log2timeline) Forensic Analysis of Universal Windows Platform (UWP) Applications (USB Forensic) USB Device Identifiers and Forensic Insights: iSerialNumber, SCSI Serial Numbers… Making Sense of SRUM Data with SRUM_DUMP Tool A Deep Dive into Windows […]

Week 08 – 2025

Akash Patel How Windows Knows Your Files Came from the Internet: Alternate Data Streams (Zone.Identifier) Breaking Down the $LogFile and How to Use LogFileParser Tracking Microphone and Camera Usage in Windows (Program Execution: CompatibilityAccessManager) Windows Registry: A Forensic Goldmine for Installed Applications Tracking Trusted Office Documents: A Key to Investigating Macro-Based Malware Brian MaloneyOneDrive Microsoft.FileUsageSync.db […]

Week 07 – 2025

Akash Patel File Carving: A Simple and Powerful Way to Recover Deleted Files || String Searching with bstrings… MFTECmd-MFTexplorer: A Forensic Analyst’s Guide Baseline Analysis in Memory Forensics: A Practical Guide Mastering AmcacheParser and appcompatprocessor.py for Amcache.hiv Analysis Brett ShaversThink You Don’t Need WinFE? Wait Until You Do. CellebriteTips and Tricks for Simplifying Your Investigations […]

Week 06 – 2025

Akash Patel Box Cloud Storage Forensic Investigations: Logs, Cached Files, and Metadata Analysis Cloud Storage Affect on file Timestamps and collection with KAPE: A Forensic Guide Volume Shadow Copy extraction with KAPE(including data/file recovery) Metadata Investigation(Exiftool): A Powerful Tool in Digital Forensics Remote Collections Artifacts Using KAPE including UNC and Over the Internet(ZeroTier) BelkasoftWindows Forensics: […]

Week 05 – 2025

Akash Patel Investigating Google Drive for Desktop: A Forensic Guide Automating Google Drive Forensics: Tools & Techniques Dropbox Forensic Investigations: Logs, Activity Tracking, and External Sharing BelkasoftLessons Learned from the Silk Road Investigation Brian MaloneyOneDrive Offline Mode (Recallish vibes) Christopher Eng at Ogmini CISSP – Study Plan Diving Deep – LevelDB Part 3 CISA IR […]

Week 04 – 2025

Added something new to the site this week; a couple of training vendors have reached out to offer readers a discount on their next training class purchase. Using these discount codes will also support the site 🙂 Adam at HexacornBeing a tool while using a tool   Akash Patel Forensic Challenges in Cloud Storage Investigations […]

Week 03 – 2025

ThinkDFIRSRUMday Funday! Akash PatelHandling Incident Response: A Guide with Velociraptor and KAPE BelkasoftEmail Forensics with Belkasoft X Christopher Eng at Ogmini Homelab Part 1 – The Current Setup David Cowen Sunday Funday Challenge – SRUM Validation Expectations vs Reality – Digital Forensic Science Master’s Degree Part 2 Investigating Lab Automation – MSLab CISA IR Training […]

Week 02 – 2025

Atola TechnologyMastering Drive Wiping: Ensuring Data Security Akash Patel Lateral Movement Analysis: Using Chainsaw, Hayabusa, and LogParser for Cybersecurity Investigations Tracing Reused $MFT Entries Paths : Recovering Deleted File Paths Forensically with CyberCX… BelkasoftWindows Browser Forensics 101 Brian MaloneyAutopsy Hardening Guide: Part 1 Dr. Brian Carrier at Cyber TriageInformation Artifacts: Simplify DFIR Analysis David Cowen at […]

Week 01 – 2025

Akash Patel SentinelOne(P7- Activity/Reports): A Practical Guide/An Practical Training SentinelOne (P8- SentinelOne Automation) : Guide / Training to Forensic Collection, KAPE… SentinelOne(P9- Settings): A Practical Guide/An Practical Training Cyber 5WGuide to Mobile Forensics with ALEAPP David Cowen at the ‘Hacking Exposed Computer Forensics’ blog Daily Blog #705: AI Prompts that help me Daily Blog #706: Using […]