Home
π”©π”¬π” π”žπ”© π”₯𝔬𝔰𝔱
Cancel

front-page port 80-shoopyuLinux Forensics Essentials

Commands and Artifacts Every Investigator Needs Here’s a streamlined guide to key Linux artifacts and the commands to extract and analyze them efficiently, enabling forensics investigators to fo...

img Digital Forensics Tools

Serial Number Tool Name Hyperlink 1 FTK Imager FTK Imager 2 dd for Windows dd for Windows ...

img CFReD | Nist | Hacking Case

CFReDS NIST Hacking Case Scenario cfreds.nist.gov On 09/20/04 , a Dell CPi notebook computer, serial # VLQLW, was found abandoned along with a wireless PCMCIA card and an external home...

front-page port 80-shoopyuPractical Windows Forensics

Agenda The go-to methodology to get up and running with forensics is as follows: Extract Evidence Mount with Arsenal Image Mounter Parse with KAPE into a cases folder Examine Registry ...

front-page port 80-shoopyuWindows Artifacts

System and User Information (via Registry) Artifact Filesystem Location Tools or Commands Operating System Version System Information S...

Windows Forensics Tools Windows Forensics Tools

Browser Forensics Hind Sight Analyze browser history. Chrome History Analyzer Tool for Chrome browser analysis. Web Browser Forensic Tool Supports multiple browsers. ...

img File Upload Vulnerabilities πŸ—ƒοΈ

1. Unrestricted File Type Upload: Allowing users to upload files without proper validation can lead to the execution of malicious scripts. An attacker may upload a file with a double extension...

img Access Control Flaw in Email Verification πŸ“§

Introduction: Email verification is a crucial step in securing online accounts, ensuring that users have valid and accessible email addresses. However, not all verification processes are foolp...

img Bypassing 2 Factor Authentication Techniques πŸ”

Introduction Two-Factor Authentication (2FA) is a robust security measure, but no system is flawless. In this blog post, we will explore advanced techniques to bypass 2FA, uncovering potential ...

img S3 Bucket Misconfiguration!

Misconfigurations Of S3 Bucket Introduction: Amazon S3 buckets, a fundamental component of cloud storage, are often a target for security researchers and VAPT (Vulnerability Assessment and Pe...