<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Digital Forensics on Pratik’s Localhost</title><link>https://pratikdabhi.in/tags/digital-forensics/</link><description>Recent content in Digital Forensics on Pratik’s Localhost</description><generator>Hugo -- gohugo.io</generator><language>en</language><managingEditor>pratik.dabhi.4u@gmail.com (Pratik)</managingEditor><webMaster>pratik.dabhi.4u@gmail.com (Pratik)</webMaster><lastBuildDate>Sun, 01 Feb 2026 10:00:00 +0000</lastBuildDate><atom:link href="https://pratikdabhi.in/tags/digital-forensics/index.xml" rel="self" type="application/rss+xml"/><item><title>Anatomy of a Cookie Heist — Reverse Engineering an Info-Stealer</title><link>https://pratikdabhi.in/posts/cookie-heist/</link><pubDate>Sun, 01 Feb 2026 10:00:00 +0000</pubDate><author>pratik.dabhi.4u@gmail.com (Pratik)</author><guid>https://pratikdabhi.in/posts/cookie-heist/</guid><description>&lt;div class="lead text-neutral-500 dark:text-neutral-400 !mb-9 text-xl"&gt;
 What looked like a simple setup.exe turned out to be a stealthy info-stealer that stole Microsoft 365 session tokens from Chrome cookies — completely bypassing MFA. Here&amp;rsquo;s the full forensic breakdown.
&lt;/div&gt;


&lt;h2 class="relative group"&gt;Introduction
 &lt;div id="introduction" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#introduction" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;Suspicious login activity was observed from multiple geographic regions, inconsistent with known user behavior.&lt;/p&gt;</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://pratikdabhi.in/posts/cookie-heist/featured.png"/></item></channel></rss>