You are here |
www.geekrant.org | ||
| | | |
thinkdfir.com
|
|
| | | | In preparation for an upcoming FOR500 class I thought I would test out one of the recent additions to the class. This post by my colleague Zach shows that Win10 1903 and later has a registry key that will store the full path of any executable that utilises the computers camera or microphone. Zach shows... | |
| | | |
spf13.com
|
|
| | | | ||
| | | |
www.khyrenz.com
|
|
| | | | Let me start by saying that, yes: many tools already exist to parse information out of the Windows Registry and/or the Event Log. However, while I was conducting my own tool validation processes (see https://github.com/khyrenz/tool_validation), I realised that very few tools parse this information out and automatically populate the kind of table that I would be adding into my forensic report.So... I did a bit of R&D, and I present to you a Python script that does just that; creatively named pars | |
| | | |
adsecurity.org
|
|
| |