EPISODE · Jan 31, 2026 · 14 MIN
Course 21 - Digital Forensics: Windows Shellbags | Episode 2: Forensic System Setup and Local Drive Integration
from CyberCode Academy · host CyberCode Academy
In this lesson, you’ll learn about:Preparing a Forensic WorkstationThe purpose of using a controlled forensic setup to safely extract and analyze system artifacts.Why working from an acquired drive or image is critical for maintaining evidentiary integrity.Essential Tools for Shellbag and Registry AnalysisShellbags Explorer: Used to parse and analyze shellbag artifacts associated with user folder navigation.FTK Imager (Lite): A portable, self-contained tool for accessing drives and exporting forensic artifacts without installing software on the target system.Loading a System Drive as EvidenceHow to use “Add Evidence Item” in FTK Imager to load a local physical drive (e.g., the C: drive).Understanding the evidence tree and how FTK represents the file system for forensic browsing.Navigating the File System for Forensic ArtifactsTraversing the directory structure within FTK Imager to locate user-specific data.Focusing on the Users directory and individual user home folders, which contain critical registry files.Target Registry Files for AnalysisIdentifying user-specific registry hives stored within the home directory.Understanding why these files are essential inputs for tools like Shellbags Explorer when reconstructing user activity.By the end of the episode, you’ll be able to set up the required forensic tools, load a system drive as evidence, and confidently locate the registry hives needed to analyze shellbags and other user activity artifacts.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy
NOW PLAYING
Course 21 - Digital Forensics: Windows Shellbags | Episode 2: Forensic System Setup and Local Drive Integration
No transcript for this episode yet
Similar Episodes
May 13, 2026 ·39m
May 11, 2026 ·45m
May 1, 2026 ·19m