What I do
- Collect digital evidence properly
- Analyze forensic artifacts
- Preserve chain of custody
- Document findings for legal proceedings
- Investigate security incidents
- Recover deleted data
When to use me
When investigating security incidents, responding to breaches, or conducting digital forensics investigations.
Evidence Collection
Order of Volatility
- CPU registers, cache
- Network connections
- Running processes
- Memory (RAM)
- Network traffic
- Disk
- Remote logs
- Physical config
- Media (archival)
Collection Methods
- Write blockers
- Forensic images (DD, E01)