MCSI Certified DFIR Specialist
https://www.mosse-institute.com/certifications/mdfir-certified-dfir-specialist.html
MCSI Digital Forensics Library
https://library.mosse-institute.com/cyber-domains/digital-forensics.html
Windows Event Logs in Digital Forensics
https://library.mosse-institute.com/articles/2022/05/windows-event-logs-in-digital-forensics/windows-event-logs-in-digital-forensics.html
️️ How to investigate Windows Event Logs ️️
https://www.youtube.com/watch?v=XGt0pQfMGN0
A Windows memory dump is a type of file that is created when Windows has encountered a serious error, such as a system crash or BSOD (Blue Screen of Death).
The memory dump contains a snapshot of the system memory at the time of the crash, which can be used by Microsoft and other software developers to diagnose and fix the problem.
By analyzing the memory dump, investigators can locate and extract the event logs stored in the RAM that were present at the time of the dump. This can provide useful information regarding previous system activity and can be used to help identify the cause of a system malfunction or other issue.
Windows event logs can be extremely helpful during a digital forensics investigation. Event logs contain a wealth of information about the history of a system, including details on user logins, system startups and shutdowns, installed software, system errors, security events, and application usage. This information can be used to determine when and how a system was accessed, identify potential sources of malicious activity, and provide further insight into the state of the system at a given time. In some cases, the event logs can even reveal evidence of a malicious attack or unauthorized access. For example, event logs can reveal attempts to access a system with invalid credentials, suspicious application usage, or a suspicious network connection. Event logs are an invaluable tool for digital forensics investigators and can provide invaluable evidence.