Protected: Windows Artifacts

0 of 22 lessons complete (0%)

Overview

Windows Artifacts Overview

Windows Artifact Overview

Anna ILLAMAA, CFCE

  • Over 19 years of investigative experience for the Estonian Police and Border Guard Board
  • Eight years as a Computer Forensic Examiner
  • Recognized as a Certified Forensic Computer Examiner (CFCE) though the International Association of Computer Investigative Specialists (IACIS)
  • Regularly instruct law enforcement, government and corporate examiners both nationally and internationally in computer forensics

Course Outline

  • Resources/prerequisite for the course
  • Introduction
  • Shortcut files analysis
  • Jump Lists analysis
  • Overview
  • Final Exercise

Course Requirements

  • Computer with Windows OS (installed Windows 7 and above)
  • Files for the exercises
  • Files for the final exercise
  • Tools
    • JLECmd Jump List parser (by Eric Zimmerman)
    • JumpList Explorer GUI based Jump List viewer (by Eric Zimmerman)
    • LECmd Parse lnk files (by Eric Zimmerman)
    • Download link: https://ericzimmerman.github.io/#!index.md
    • WFA tool (Windows File Analyzer: https://www.mitec.cz/wfa.html)
    • ExifTool GUI (by Phil Harvey, https://exiftool.org)
    • Exiftool (by Phil Harvey, https://exiftool.org)
Scroll to Top