top of page
Search

Forensics


Large Language Models in Digital Forensics
In our earlier blogs, we walked through memory forensics with FTK and its role in analyzing volatile data, learned how Autopsy recovers deleted evidence, and also looked at the digital forensics and anti-forensics . Each of these gave us a piece of the bigger puzzle. [ Previous blogs collection: Forensics ] Today, we’ll see how Large Language Models (LLMs) are used or can be used in the landscape of digital forensics. From easing investigation workflows to supporting analys
Aastha Thakker
8 min read


Windows Forensics: Digital Clues Hidden in Your System
Ever wonder what your computer remembers about you? Turns out, it’s keeping detailed notes on everything you do, ofc and sometimes those notes can help in solving crimes. Your Windows PC is basically a digital detective, quietly documenting every click, every file you open, and every USB stick you plug in. These are called forensic artifacts , paint a surprisingly detailed picture of computer activity that can persist long after files are deleted or drives are wiped. What Are
Aastha Thakker
4 min read


When Drones Become Evidence
Why does Drone Forensics even matter? Drones, also known as UAVs (Unmanned Aerial Vehicles), have fascinated us since childhood, and today, they’ve evolved into powerful tools used across various domains. Today, these unmanned aerial vehicles are everywhere, delivering packages, filming movies, monitoring crops, and unfortunately, sometimes being used for illegal activities. When such drone-related crimes occur, investigators must follow a structured digital forensics process
Aastha Thakker
8 min read


Digital Forensics and Anti-forensics
Hey Everyone! Just like our previous dive into purple teaming, this blog lays the groundwork for understanding both sides of the digital forensics coin: the techniques used to uncover evidence and the tricks used to hide it. What is Digital Forensic? Digital forensics involves collecting, preserving, analyzing, and presenting digital evidence in a legally admissible manner. This evidence can come from various sources, including computers, servers, mobile devices, emails, soci
Aastha Thakker
7 min read


Fantastic Finger Forensics Fact
Okay before you get into the ease of reading my blog, take out a second and look at your thumb, thumb fingerprint. Fingerprint is a word we hear all the time and every here and there, but how much do we really know about these unique markings on our fingertips? Have you ever wondered what those swirling lines mean or denote? I am sure that no matter what background you are from, you will enjoy reading this blog. Fingerprints, are not just for unlocking your phones, of course
Aastha Thakker
6 min read


Windows RAM Snap: Presenting FTK & Hex Editor Tool Insights
In the digital era, surfing the web in incognito and TOR is a basic practice to maintain the anonymity. It’s like wearing an invisibility cloak of Harry Potter, which leaves no footprint. However, as a cyber security enthusiast, you must wonder what to do when this type of case comes under your umbrella while doing digital forensics. While TOR intelligently wipes away your browsing history, you can still capture the volatile data. What is volatile memory?Volatile Memory is de
Aastha Thakker
3 min read


Digital Forensics: Autopsy’s Magic in Recovering Deleted Data
Forensic science, also known as criminalistics , refers to the scientific principles and methods to support legal decision-making in criminal and civil matters. Forensic scientists collect, preserve, and analyze evidence during the course of an investigation. Some of the famous branches of forensics are: Forensic Anthropology Forensic Psychology Forensic Toxicology Digital Forensics Forensics Ballistics Forensic Pathology Digital Forensics It is the application of scientific
Aastha Thakker
3 min read
bottom of page