Quantcast
Channel: Pranshu Bajpai – Infosec Resources
Browsing all 24 articles
Browse latest View live

Computer Forensics with P2 Commander

Introduction Computer Forensics is the methodical series of procedures and techniques used for procuring evidence from computer systems and storage media. This evidence can then be analyzed for...

View Article



Windows Registry Forensics using ‘RegRipper’ Command-Line on Linux

Introduction Windows registry is a gold mine for a computer forensics investigator. During case analysis, the registry is capable of supplying the evidence needed to support or deny an accusation....

View Article

Windows Registry Analysis with RegRipper – A ‘Hands-on’ Case Study

Introduction Every analysis begins with specific goals in mind. As a forensics investigator, you are expected to know the type and importance of information you are looking for while investigating a...

View Article

Forensics Investigation of Document Exfiltration involving Spear Phishing:...

Introduction Humans are often the weakest link in the security chain. In his book The Art of Deception, renowned hacker Kevin Mitnick explains how innate human tendencies are exploited to the...

View Article

Antenna Theory for Wardriving and Penetration Testing

Introduction Wardriving is an activity in which a person seeks wireless access points in moving vehicles with high gain antennas mounted on the top. Usually, this access point data is correlated with...

View Article


TrueCrypt Security: Securing Yourself against Practical TrueCrypt Attacks

The need to defend confidentiality of our sensitive information against persistently rising cyber threats has turned most of us toward using encryption on a daily basis. This is facilitated by...

View Article

Wi-Fi Security: Securing Yourself against Practical Wireless Attacks

While the access points in organizations are usually under the protection of organization-wide security policies, home routers are less likely to be appropriately configured by their owners in absence...

View Article

Solutions to Net-Force Steganography CTF Challenges

Steganalysis refers to the process of locating concealed messages inside seemingly innocuous ‘containers’. The idea behind steganography is embedding plaintext messages in places where an unsuspecting...

View Article


Solutions to Net-Force Cryptography CTF Challenges

Cryptanalysis refers to the study of ciphers with the objective of breaking the code and obtaining plaintext (sensible) information. While older cryptosystems such as Caesar cipher depended on the...

View Article


Defeating Conundrums: Solutions to Net-Force Internet CTF Challenges

About Net-Force Internet Challenges These challenges require that you provide the correct passwords that are revealed to you after solving them. The challenges are arranged in order of increasing...

View Article

The Pitfalls of Client-Side Authentication: Solutions to Net-Force JavaScript...

Client-side authentication is when authentication checks are performed completely at users’ side. The idea is that the authentication procedures, methods, or codes are delivered to the client, where...

View Article

Lessons from Deficient Java Applet-based Authentication

Java Applets are bytecodes that are delivered via the browser, and executed using the Java Virtual Machine (JVM) at the client-side. Java Applets can access the 3D hardware acceleration, which makes...

View Article

The Perils of Inadequate Key Size in Public Cryptosystems

A public-key cryptosystem is an asymmetric cryptosystem where the public key and the private key form a mathematically related key pair. The public key acts as an encryption key whereas the private key...

View Article


Exploiting Vulnerable Systems

Exploits are specially crafted to take advantage of specific security vulnerabilities that are discovered after the vulnerability assessment phase. Exploitation is a part of penetration testing where...

View Article

Image may be NSFW.
Clik here to view.

Antenna Theory for Wardriving and Penetration Testing

Introduction Wardriving is an activity in which a person seeks wireless access points in moving vehicles with high gain antennas mounted on the top. Usually, this access point data is correlated with...

View Article


Image may be NSFW.
Clik here to view.

TrueCrypt Security: Securing Yourself against Practical TrueCrypt Attacks

The need to defend confidentiality of our sensitive information against persistently rising cyber threats has turned most of us toward using encryption on a daily basis. This is facilitated by...

View Article

Image may be NSFW.
Clik here to view.

Wi-Fi Security: Securing Yourself against Practical Wireless Attacks

While the access points in organizations are usually under the protection of organization-wide security policies, home routers are less likely to be appropriately configured by their owners in absence...

View Article


Image may be NSFW.
Clik here to view.

Solutions to Net-Force Steganography CTF Challenges

Steganalysis refers to the process of locating concealed messages inside seemingly innocuous ‘containers’. The idea behind steganography is embedding plaintext messages in places where an unsuspecting...

View Article

Image may be NSFW.
Clik here to view.

Solutions to net-force cryptography CTF challenges

Cryptanalysis refers to the study of ciphers with the objective of breaking the code and obtaining plaintext (sensible) information. While older cryptosystems such as Caesar cipher depended on the...

View Article

Image may be NSFW.
Clik here to view.

Defeating Conundrums: Solutions to Net-Force Internet CTF Challenges

About Net-Force Internet Challenges These challenges require that you provide the correct passwords that are revealed to you after solving them. The challenges are arranged in order of increasing...

View Article
Browsing all 24 articles
Browse latest View live




Latest Images