Additional forensic artifacts exercises
In this part, we will apply what we have learned so far. Try to work on the following exercises:
- Load your PST file into Kernel PST viewer.
- Using
Security.evtx
, explore and track user activity using event IDs 4624 and 4625. - Track an application crash using
application.evtx
. - Parse
system.evtx
usingEvtxcmd.exe
and save the output into a CSV file. - Parse
SRUMDB.dat
for your local machine usingSRUM_DUMP
and map network activity using Windows Registry by identifying the profile ID.