Home
sujay adkesar
Cancel

LNK File Forensics — Experimental Case Study

🔍 Objective To analyze and demystify the subtle, less-documented behaviors of .LNK (Windows Shortcut) files during document creation, modification, and reopening using real-time forensic testing...

front-page port 80-shoopyuLinux Forensics Essentials

Commands and Artifacts Every Investigator Needs Here’s a streamlined guide to key Linux artifacts and the commands to extract and analyze them efficiently, enabling forensics investigators to fo...

Windows Forensics Tools

Browser Forensics Hind Sight Analyze browser history. Chrome History Analyzer Tool for Chrome browser analysis. Web Browser Forensic Tool Supports multiple browsers. ...

img File Upload Vulnerabilities 🗃️

1. Unrestricted File Type Upload: Allowing users to upload files without proper validation can lead to the execution of malicious scripts. An attacker may upload a file with a double extension...

img Access Control Flaw in Email Verification 📧

Introduction: Email verification is a crucial step in securing online accounts, ensuring that users have valid and accessible email addresses. However, not all verification processes are foolp...

img Bypassing 2 Factor Authentication Techniques 🔐

Introduction Two-Factor Authentication (2FA) is a robust security measure, but no system is flawless. In this blog post, we will explore advanced techniques to bypass 2FA, uncovering potential ...

img S3 Bucket Misconfiguration!

Misconfigurations Of S3 Bucket Introduction: Amazon S3 buckets, a fundamental component of cloud storage, are often a target for security researchers and VAPT (Vulnerability Assessment and Pe...

img Billion Laugh Attack

The Billion Laughs Attack: A Threat to XML Parsing Introduction XML parsing vulnerabilities continue to be a focal point for security researchers, and one particularly menacing exploit is the...

imgBroken Link Hijacking

Br0k3n L1nk Hij@ck1ng Introduction In the realm of bug bounty hunting, uncovering vulnerabilities that may compromise a website’s security is a thrilling challenge. One often-overlooked aspect ...

img Ericzimmerman Tools | Windows Forensics

Forensic tools Name Version (.net 4 | 6) Purpose AmcacheParser 1.5.1.0 | 1.5.1.0 Amcache.hve parser with lots of ...