Reader small image

You're reading from  Windows Forensics Analyst Field Guide

Product typeBook
Published inOct 2023
PublisherPackt
ISBN-139781803248479
Edition1st Edition
Concepts
Right arrow
Author (1)
Muhiballah Mohammed
Muhiballah Mohammed
author image
Muhiballah Mohammed

Muhiballah Mohammed is a cybersecurity expert and enthusiast, experienced in security operations centers, digital forensics, and incident response. With 10 years of experience, he has worked in a variety of roles in the cybersecurity field, including SOC analyst, consultant, and forensic investigator, and has helped build multiple entities' SOC and DFIR teams. He has experience in investigating a wide range of cyber incidents. Muhiballah is passionate about providing help to organizations so that they can protect themselves against cyber threats, and he is also a mentor and teacher to new students in the cybersecurity field. He loves sharing his knowledge and experience with others, and he is always looking for new ways to help people learn about cybersecurity.
Read more about Muhiballah Mohammed

Right arrow

Conventions used

There are a number of text conventions used throughout this book.

Code in text: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: “We discussed NTUSER.DAT, which is a registry hive containing information about user activity, including the execution of programs and the use of various applications.”

A block of code is set as follows:

kape.exe --tsource C:\ --tdest C:\ KAPE\output\ --target !BasicCollection,Symantec_AV_Logs,Chrome,ChromeExtensions,
Edge,Firefox,InternetExplorer,WebBrowsers,ApacheAccessLog,
$Boot,$J,$LogFile,$MFT,Amcache,ApplicationEvents,EventLogs,
EventLogs-RDP,EventTraceLogs,EvidenceOfExecution,FileSystem,
MOF,Prefetch,RDPCache,RDPLogs,RecentFileCache,Recycle,RecycleBin,
RecycleBinContent,RecycleBinMetadata,RegistryHives,
RegistryHivesSystem,RegistryHivesUser,ScheduledTasks,SRUM

Any command-line input or output is written as follows:

PECmd.exe  -d C:\Windows\Prefetch --csv C:\temp --csvf Prefetch.csv

Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: “What we notice here is that the Values tab holds data encoded in ROT-13. By clicking on the UserAssist tab, we can get the same details in human-readable format; you can also use decoding tools to decode the value as needed if that is required.”

Tips or important notes

Appear like this.

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Windows Forensics Analyst Field Guide
Published in: Oct 2023Publisher: PacktISBN-13: 9781803248479

Author (1)

author image
Muhiballah Mohammed

Muhiballah Mohammed is a cybersecurity expert and enthusiast, experienced in security operations centers, digital forensics, and incident response. With 10 years of experience, he has worked in a variety of roles in the cybersecurity field, including SOC analyst, consultant, and forensic investigator, and has helped build multiple entities' SOC and DFIR teams. He has experience in investigating a wide range of cyber incidents. Muhiballah is passionate about providing help to organizations so that they can protect themselves against cyber threats, and he is also a mentor and teacher to new students in the cybersecurity field. He loves sharing his knowledge and experience with others, and he is always looking for new ways to help people learn about cybersecurity.
Read more about Muhiballah Mohammed