AI Provider Settings
Keys are stored only for your session
Models are fetched from the selected provider after validating your API key.

Tag: DFIR

All posts tagged with "DFIR"

4N6Post Artifacts

Oct 14
Digital Forensics 4N6Post MFT Analysis

Registry - SAM

Oct 14 β€’ 28 min read

SAM Database - Windows Security Account Manager Security Account Manager (SAM) database in short, is the critical components of Windows security …

windows forensics registry DFIR

MACB Timestamp Reference

Dec 16 β€’ 11 min read

MACB Forensic Timestamp Reference I put together a nice little post here detailing the behavior of MACB timestamps (Modified, Accessed, Changed, …

4n6 digital forensics timestamps

MRU (Most Recently Used)

Oct 2 β€’ 3 min read

The MRU (Most Recently Used) registry is a database in Microsoft Windows that stores information about recently opened files, URLs, and other items. …

4n6 digital forensics windows forensics

Velociraptor - Endpoint Visibility & Digital Forensics

Jan 15 β€’ 1 min read

Velociraptor is a web-based tool designed for endpoint visibility and management. It provides a user-friendly interface for monitoring and managing …

velociraptor endpoint management digital forensics

Registry- Start, Shutdown, and Reboot

Oct 1 β€’ 4 min read

Windows Registry: System Start, Shutdown, and Reboot Tracking The Windows registry is a hierarchical database that stores configuration settings for …

4n6 digital forensics windows forensics

ShimCache

Oct 1 β€’ 7 min read

ShimCache - Windows Application Compatibility Cache for Digital Forensics Shimcache is a Windows artifact that stores information about programs that …

4n6 digital forensics windows forensics

Dream Server - DFIR

May 21 β€’ 7 min read

Example Direction: Lock Picking Lawyer Server Category Item Blue 1 Gmail in session of browser Blue 2 Email in URL of the payload download Blue 3 …

NorthSec DFIR CTF

Key Replicator

May 21 β€’ 1 min read

Example Direction: Lock Picking Lawyer

NorthSec DFIR CTF

Neck Tie Connection

May 21 β€’ 1 min read

Serial Connection Connection Type: Serial Baud Rate/Speed: 115200 Port: COM3 Client: PuTTY Reference Reverse Engineering of ESP32 Flash Dumps with …

NorthSec DFIR CTF

Neck Tie QR Code

May 21
NorthSec DFIR CTF

The Clock

May 21 β€’ 3 min read

Other Write-Up See SD Card Data for more information. Challenge Walkthrough 1. Splash Screen Flag When the device boots, a flag flashes very quickly …

NorthSec DFIR CTF

The Rules

May 21
NorthSec DFIR CTF

Warmups

May 21 β€’ 2 min read

Download mypcap.pcap Spoiler Command: bash 5 lines tshark -r mypcap.pcap -Tfields -e data \ | cut -c -2 \ | sed ':a;N;$!ba;s/\n/ /g' \ | sed …

NorthSec DFIR CTF

Windows Install Date & Time

Jan 15 β€’ 3 min read

The Windows registry is a central repository of configuration data for the Windows operating system and its applications. One important aspect of the …

4n6 digital forensics windows forensics

File and Folder Opening - Link Files (LNK)

Jan 1 β€’ 6 min read

Windows users are likely familiar with .lnk files, also known as LNK Link files. These files are shortcuts that point to another file or folder on the …

4n6 digital forensics windows forensics

JumpList Forensics

Jan 1 β€’ 5 min read

JumpList Forensics JumpList is a feature of Microsoft Windows operating systems that allows users to quickly access frequently used files, folders, …

4n6 digital forensics windows forensics

MFT

Jan 1 β€’ 8 min read

MFT Analysis - Master File Table Forensics Guide The $MFT, or Master File Table, plays a crucial role in the NTFS (New Technology File System) …

4n6 digital forensics windows forensics

Prefetch

Jan 1 β€’ 7 min read

Windows Prefetch Analysis - Digital Forensics Execution Tracking Windows Prefetch is a feature in the Windows operating system that was first …

4n6 digital forensics windows forensics

Recycling.Bin / Recycler

Jan 1 β€’ 5 min read

The Recycling Bin is a well-known feature in Windows operating systems that acts as a temporary storage location for deleted files. However, what many …

4n6 digital forensics windows forensics

SysInternals Tools Registry Forensics

Jan 1 β€’ 8 min read

SysInternals Tools - Registry Forensics and Analysis What is SysInternals? SysInternals is a suite of advanced system utilities for Microsoft Windows …

4n6 digital forensics windows forensics

TimeZone Information

Jan 1 β€’ 4 min read

The Windows registry is a critical component of the Windows operating system. It stores important configuration data and settings that help the …

4n6 digital forensics windows forensics

TypedPath Registry

Jan 1 β€’ 3 min read

Registry Section of TypedPath: Understanding Its Importance in Digital Forensics The registry is an important aspect of a computer’s operating …

4n6 digital forensics windows forensics

Windows Border Size Modification

Jan 1 β€’ 3 min read

Exploring Windows Border Size Modification Welcome to our exploration of a subtle yet impactful customization in the Windows operating system. Today, …

4n6 digital forensics windows forensics

Windows Generic Installation Keys

Jan 1 β€’ 4 min read

SOURCE: https://www.windowsafg.com/keys.html This is just a copy of the data from the source windowafg. I make a copy so that others can find it. …

4n6 digital forensics windows forensics

Windows USB Connection Analysis

Jan 1 β€’ 4 min read

USB connections are a commonly used method for transferring data between computers and other electronic devices. In Windows, the use of USB …

4n6 digital forensics windows forensics

WMI Filter Query Consumer

Jan 1 β€’ 5 min read

Windows Management Instrumentation (WMI) is a Microsoft technology that provides a unified way of managing Windows operating systems and applications. …

4n6 digital forensics windows forensics

WordWheelQuery

Jan 1 β€’ 3 min read

The Registry Section of WordWheelQuery: An Overview for Digital Forensic Investigators The WordWheelQuery registry section is a critical component for …

4n6 digital forensics windows forensics

Hackademy – Authorization 1

Jun 1 β€’ 1 min read

Check the html Or in the PCAP:

northsec nsec dfir

Portobello 53 - Denial (2 of 2)

Jun 1 β€’ 3 min read

Context Why do you need DNS logs anyway? We both know that DNS servers are just address books of Internet resources and I’ve never seen anyone abuse a …

NorthSec DFIR PCAP