Skip to content
All Docs

Getting Started

Getting Started#

This guide walks you through how to begin digital forensic analysis using the unJaena AI platform, step by step.

1. Create an Account#

  1. Visit unjaena.com.
  2. Click the Start Free button.
  3. Enter your email address and set a password.
  4. Click the verification link sent to your email to activate your account.

You receive 500 free credits upon sign-up — enough to complete one APK analysis or several smaller cases.

2. Download the Collector#

Download#

  1. After logging in, navigate to the Download page.
  2. Download the installer for your current operating system:
    • Windows: .exe installer
    • macOS: .dmg disk image
    • Linux: .tar.gz archive

Setup#

Windows:

  1. Right-click the downloaded .exe file and select Run as administrator to launch.

macOS:

  1. Double-click the .dmg file to mount it.
  2. Drag unJaena Collector to the Applications folder.
  3. On first launch, allow the app in System Preferences > Security.

Linux:

  1. Extract the archive in your terminal.
  2. Run chmod +x run.sh to grant execution permissions.
  3. Run sudo ./run.sh to install dependencies.

3. Create Your First Case#

  1. Log in to the web platform.
  2. Click the New Case button on the dashboard.
  3. Enter the case details:
    • Case Name: A name to identify the investigation (e.g., "2026-03 Internal Investigation")
    • Description (optional): Background and purpose of the investigation
    • Analysis Language: Choose from Korean, English, or Japanese
  4. Click Create.

4. Run Evidence Collection#

Live Collection (Using the Collector Tool)#

  1. Launch the downloaded unJaena Collector.
  2. Connect it to the case you created on the platform.
  3. Select the artifacts to collect. All artifacts are selected by default, and you can choose specific artifact types as needed.
  4. When running the collector, enter the server URL and authentication token. After collection, data is automatically uploaded to the server.
  5. Click Start Collection.

Mobile Devices#

  • iOS: Connect your device directly via USB for live collection, or extract from iTunes/Finder backup files (180+ artifact types).
  • Android: Connect your device via USB and the collector automatically extracts data. Collection scope adapts based on root access (120+ artifact types).

5. Review AI Analysis Results#

Once data upload and indexing are complete, you can begin AI analysis.

Making Queries#

Enter natural language questions on the analysis page. Here are some good starter questions:

  • "Were there any suspicious activities in the past week?"
  • "Show me USB device connection records"
  • "Find any traces that suggest malware infection"
  • "Perform a kill-chain analysis of this system"

Understanding Analysis Results#

AI analysis results include the following information:

  • Findings Summary: Key findings organized by priority
  • Evidence Citations: Specific artifact evidence for each claim
  • Timeline: Chronological reconstruction of events
  • MITRE ATT&CK Mapping: Kill-chain phase classification of detected threats
  • Confidence Indicators: Confirmed / Highly likely / Requires further investigation

Follow-Up Analysis#

Based on initial analysis results, you can investigate further through follow-up questions. The AI maintains previous conversation context, allowing you to conduct analysis conversationally.

Next Steps#