Getting Started
Getting Started#
This guide walks you through how to begin digital forensic analysis using the unJaena AI platform, step by step.
1. Create an Account#
- Visit unjaena.com.
- Click the Start Free button.
- Enter your email address and set a password.
- Click the verification link sent to your email to activate your account.
You receive 500 free credits upon sign-up — enough to complete one APK analysis or several smaller cases.
2. Download the Collector#
Download#
- After logging in, navigate to the Download page.
- Download the installer for your current operating system:
- Windows:
.exeinstaller - macOS:
.dmgdisk image - Linux:
.tar.gzarchive
- Windows:
Setup#
Windows:
- Right-click the downloaded
.exefile and select Run as administrator to launch.
macOS:
- Double-click the
.dmgfile to mount it. - Drag unJaena Collector to the Applications folder.
- On first launch, allow the app in System Preferences > Security.
Linux:
- Extract the archive in your terminal.
- Run
chmod +x run.shto grant execution permissions. - Run
sudo ./run.shto install dependencies.
3. Create Your First Case#
- Log in to the web platform.
- Click the New Case button on the dashboard.
- Enter the case details:
- Case Name: A name to identify the investigation (e.g., "2026-03 Internal Investigation")
- Description (optional): Background and purpose of the investigation
- Analysis Language: Choose from Korean, English, or Japanese
- Click Create.
4. Run Evidence Collection#
Live Collection (Using the Collector Tool)#
- Launch the downloaded unJaena Collector.
- Connect it to the case you created on the platform.
- Select the artifacts to collect. All artifacts are selected by default, and you can choose specific artifact types as needed.
- When running the collector, enter the server URL and authentication token. After collection, data is automatically uploaded to the server.
- Click Start Collection.
Mobile Devices#
- iOS: Connect your device directly via USB for live collection, or extract from iTunes/Finder backup files (180+ artifact types).
- Android: Connect your device via USB and the collector automatically extracts data. Collection scope adapts based on root access (120+ artifact types).
5. Review AI Analysis Results#
Once data upload and indexing are complete, you can begin AI analysis.
Making Queries#
Enter natural language questions on the analysis page. Here are some good starter questions:
- "Were there any suspicious activities in the past week?"
- "Show me USB device connection records"
- "Find any traces that suggest malware infection"
- "Perform a kill-chain analysis of this system"
Understanding Analysis Results#
AI analysis results include the following information:
- Findings Summary: Key findings organized by priority
- Evidence Citations: Specific artifact evidence for each claim
- Timeline: Chronological reconstruction of events
- MITRE ATT&CK Mapping: Kill-chain phase classification of detected threats
- Confidence Indicators: Confirmed / Highly likely / Requires further investigation
Follow-Up Analysis#
Based on initial analysis results, you can investigate further through follow-up questions. The AI maintains previous conversation context, allowing you to conduct analysis conversationally.
Next Steps#
- Collector Guide: Detailed collection methods for each platform
- Malware Lab Guide: Malware analysis using YARA/CAPA/Ghidra