Computer Forensics with P2 Commander
Introduction Computer Forensics is the methodical series of procedures and techniques used for procuring evidence from computer systems and storage media. This evidence can then be analyzed for...
View ArticleWindows Registry Forensics using ‘RegRipper’ Command-Line on Linux
Introduction Windows registry is a gold mine for a computer forensics investigator. During case analysis, the registry is capable of supplying the evidence needed to support or deny an accusation....
View ArticleWindows Registry Analysis with RegRipper – A ‘Hands-on’ Case Study
Introduction Every analysis begins with specific goals in mind. As a forensics investigator, you are expected to know the type and importance of information you are looking for while investigating a...
View ArticleForensics Investigation of Document Exfiltration involving Spear Phishing:...
Introduction Humans are often the weakest link in the security chain. In his book The Art of Deception, renowned hacker Kevin Mitnick explains how innate human tendencies are exploited to the...
View ArticleAntenna Theory for Wardriving and Penetration Testing
Introduction Wardriving is an activity in which a person seeks wireless access points in moving vehicles with high gain antennas mounted on the top. Usually, this access point data is correlated with...
View ArticleTrueCrypt Security: Securing Yourself against Practical TrueCrypt Attacks
The need to defend confidentiality of our sensitive information against persistently rising cyber threats has turned most of us toward using encryption on a daily basis. This is facilitated by...
View ArticleWi-Fi Security: Securing Yourself against Practical Wireless Attacks
While the access points in organizations are usually under the protection of organization-wide security policies, home routers are less likely to be appropriately configured by their owners in absence...
View ArticleSolutions to Net-Force Steganography CTF Challenges
Steganalysis refers to the process of locating concealed messages inside seemingly innocuous ‘containers’. The idea behind steganography is embedding plaintext messages in places where an unsuspecting...
View ArticleSolutions to Net-Force Cryptography CTF Challenges
Cryptanalysis refers to the study of ciphers with the objective of breaking the code and obtaining plaintext (sensible) information. While older cryptosystems such as Caesar cipher depended on the...
View ArticleDefeating Conundrums: Solutions to Net-Force Internet CTF Challenges
About Net-Force Internet Challenges These challenges require that you provide the correct passwords that are revealed to you after solving them. The challenges are arranged in order of increasing...
View ArticleThe Pitfalls of Client-Side Authentication: Solutions to Net-Force JavaScript...
Client-side authentication is when authentication checks are performed completely at users’ side. The idea is that the authentication procedures, methods, or codes are delivered to the client, where...
View ArticleLessons from Deficient Java Applet-based Authentication
Java Applets are bytecodes that are delivered via the browser, and executed using the Java Virtual Machine (JVM) at the client-side. Java Applets can access the 3D hardware acceleration, which makes...
View ArticleThe Perils of Inadequate Key Size in Public Cryptosystems
A public-key cryptosystem is an asymmetric cryptosystem where the public key and the private key form a mathematically related key pair. The public key acts as an encryption key whereas the private key...
View ArticleExploiting Vulnerable Systems
Exploits are specially crafted to take advantage of specific security vulnerabilities that are discovered after the vulnerability assessment phase. Exploitation is a part of penetration testing where...
View ArticleAntenna Theory for Wardriving and Penetration Testing
Introduction Wardriving is an activity in which a person seeks wireless access points in moving vehicles with high gain antennas mounted on the top. Usually, this access point data is correlated with...
View ArticleTrueCrypt Security: Securing Yourself against Practical TrueCrypt Attacks
The need to defend confidentiality of our sensitive information against persistently rising cyber threats has turned most of us toward using encryption on a daily basis. This is facilitated by...
View ArticleWi-Fi Security: Securing Yourself against Practical Wireless Attacks
While the access points in organizations are usually under the protection of organization-wide security policies, home routers are less likely to be appropriately configured by their owners in absence...
View ArticleSolutions to Net-Force Steganography CTF Challenges
Steganalysis refers to the process of locating concealed messages inside seemingly innocuous ‘containers’. The idea behind steganography is embedding plaintext messages in places where an unsuspecting...
View ArticleSolutions to net-force cryptography CTF challenges
Cryptanalysis refers to the study of ciphers with the objective of breaking the code and obtaining plaintext (sensible) information. While older cryptosystems such as Caesar cipher depended on the...
View ArticleDefeating Conundrums: Solutions to Net-Force Internet CTF Challenges
About Net-Force Internet Challenges These challenges require that you provide the correct passwords that are revealed to you after solving them. The challenges are arranged in order of increasing...
View Article
More Pages to Explore .....