top of page
Search


Linux Live Forensics (Part 2): Investigating Running Processes
In this second part of the Linux Live Forensics series, we explore how to identify suspicious processes, map process hierarchies, and correlate user actions during live system analysis — all using native Linux commands.

DFIRHive
Oct 143 min read


From RAM to Evidence (Part 1): Capturing Volatile Memory on Windows
Memory forensics begins with acquisition. In this first part of our series, we walk through capturing volatile memory on Windows using FTK Imager, ProcDump, and crash dumps. Learn how to choose the right dump type, preserve evidence integrity with hashing, and apply best practices for real-world investigations.

DFIRHive
Sep 266 min read


A Guide to KAPE: Streamlining Windows Forensics
In digital forensics, every minute counts. Imaging an entire disk is thorough but painfully slow, while manual collection is precise but inefficient. KAPE bridges the gap — portable, fast, and designed to give investigators early leads without the wait.

DFIRHive
Sep 207 min read
bottom of page
