LNK Files and Jump Lists

preview_player
Показать описание
As a continuation of the "Introduction to Windows Forensics" series, this video introduces the ubiquitous LNK, or "link", file, as well as a lesser known Windows feature called Jump Lists.

Both of these artifacts provide us with numerous items of forensic interest. We'll first take a look at the basic information you need to know in order to parse these artifacts. Then, we'll take a look inside an LNK file, and use ExifTool and Lnk Explorer to extract items of evidentiary value. Lastly, we'll look at Jump Lists, and use JumpList Explorer to explore the contents of those files.

Introduction to Windows Forensics:

LNK Files:

Forensic Analysis of LNK files:

Jump Lists:

4n6k Jump List AppID Master List:

ExifTool:

Lnk Explorer:

JumpList Explorer:

*** Additional Tools Referenced in This Video ***

Lnkanalyser:

Windows LNK Parsing Utility:

Internet Evidence Finder (IEF):

JumpLister:

JumpListsView:

Windows Jump List Parser:

#Forensics #DigitalForensics #DFIR #ComputerForensics #WindowsForensics
Рекомендации по теме
Комментарии
Автор

26 minutes and I learn more here then I do in a 3 hour lecture... You're a great teacher, thank you

Christopher-yhhs
Автор

I really appreciate you making these videos. Every time I watch your videos I find out about tools I didn't know about.

TheKiller
Автор

No thank you for thanking your time to make this important knowledge available to the people!!!☺

yiefgko
Автор

Clear, concise, and easy to grasp. If you aren't a teacher by profession, you should be. Subbed. 👍
Would love to see you do a video picking apart Windows 10 OEM Telemetry structures.

MF-lefp
Автор

Good, factual, easy to understand and practical!

balazslendvay
Автор

Excellent presentation. Well organized and informative. Thank you so much.

AlexisBrignoni
Автор

MACB timestamps for executables of target files aren't included when lnk files are parsed by the tool and output saved to csv file, it would add more valuable artifacts. Thank you for your efforts, the videos are really incredible.

mohamedelbaz
Автор

in 3:38 what was he saying Program? Thank you!

bunnymusic
Автор

What did you mean when you mentioned "*lnk" in ftk imager? Can you do wildcard searches within Imager?

ryanhorton
Автор

Hey it would be really helpful if you can give quick guidance on SIDS role along access token ... ex ... which sid is used by domain admin and how do we detect other user information. All of above video's are extremely helpful and very well explained. Thank you .. please if you can provide your email address will be really helpful to contact you...

salvodercrasto