In this forensic investigation, we analyze a triage image extracted from a Chromebook, focusing on user activity, downloaded files, browser artifacts, and application data. As a SOC analyst, the goal is to reconstruct Eli’s digital footprint by examining artifacts stored in various locations, including Google Takeout
data, browser databases, email records, and system files. This lab emphasizes endpoint forensics, covering multiple investigative techniques such as browser history analysis, file system examination, and data recovery from encrypted storage. Throughout the investigation, we explore directories containing user downloads, browsing sessions, email correspondence, and media files. By leveraging forensic tools like DB Browser for SQLite
and Notepad++
, we extract and interpret key data points that reveal Eli’s online behavior, search patterns, and application usage. Special attention is given to location history, and social media interactions, providing valuable insights into Eli’s activities and potential motivations. Additionally, the lab highlights the significance of analyzing Google Chrome extensions, YouTube history, and autofill data, which can offer clues about user preferences and intent. Understanding these artifacts is crucial in cybersecurity investigations, as they help in tracking unauthorized access, detecting insider threats, and piecing together potential security incidents.
This walkthrough will guide you through the investigative process, showcasing step-by-step analysis techniques while maintaining a structured and methodical approach. By the end of the lab, you will gain practical experience in handling real-world forensic scenarios, refining your ability to extract meanin