KARIM ASHRAF SPACE.
Ctrlk
  • Who Am I ?
  • WRITEUPS
    • What about Practice in Cyber Security?
    • Dark Side of VSCode
    • What about Cy-nix Machine?
    • Cyberdefenders Labs
    • Lets Defend
      • Incident Responder Path
        • Cybersecurity Incident Handling Guide
        • Incident Response on Windows
        • Incident Response on Linux
        • Hacked Web Server Analysis
        • Log Analysis with Sysmon
        • Forensic Acquisition and Triage
        • Memory Forensics
        • Registry Forensics
        • Event Log Analysis
        • Browser Forensics
        • GTFOBins
        • Hunting AD Attacks
        • Writing a Report on Security Incident
        • How to Prepare a Cyber Crisis Management Pla
        • Advanced Event Log Analysis
        • USB Forensics
          • Introduction to USB Forensics
          • USB Registry Key
          • USB Event Logs
          • Folder Access Analysis via Shellbags
          • File Access Analysis via Jumplists
          • Automated USB Parsers Tools
        • Windows Disk Forensics
    • BTLO LABS
    • The Complete Active Directory Security Handbook
    • Windows Privilege Escalation
    • Advanced Log Analysis
    • Methods for Stealing Password in Browser
  • The Ultimate Active Directory CheatSheet
  • COURSES SUMMARY
    • TCM SEC
    • The SecOps Group
    • Cybrary
  • TIPS&TRICKS
    • Windows Shorcuts Arrow Remover
    • Kali KEX
    • Intel TurboBoost
    • Pentest_Copilot
    • Ferdium
    • Youtube Adblock_Bybass
    • Burb-Bambdas
    • Burb Customizer
    • BetterFox
Powered by GitBook
On this page
  1. WRITEUPS
  2. Lets Defend
  3. Incident Responder Path

USB Forensics

Introduction to USB ForensicsUSB Registry KeyUSB Event LogsFolder Access Analysis via ShellbagsFile Access Analysis via JumplistsAutomated USB Parsers Tools
PreviousMSI Event LogsNextIntroduction to USB Forensics