Tags
|
|
|
Reborn of Backtrack5 Kali Debian Based Linux OS for Info Sec/Forensic Pros
|
Latest 2019.3 Released on 2nd September 2019 .
Kali Linux 2019.3 Release
September 2, 2019
g0tmi1k
Kali Linux Releases
[align=justify]We are pleased to announce that our third release of 2019, Kali Linux 2019.3, is available immediately for download. This release brings our kernel up to version 5.2.9, and includes various new features across the board with NetHunter, ARM and packages (plus the normal bugs fixes and updates).[/
|
Importance of RAM State in Digital Forensic Analysis
|
Digital forensic experts understand the importance of remembering to perform a RAM Capture on- Crime Scene Investigation so as to not leave valuable evidence behind. Capturing volatile data in a computer's memory dump enables investigators and examiners to do a full memory analysis and access data including:
browsing history
encryption keys
chat messages
clipboard contents
run-time system activity
open network connections (often these artifacts are only found in R
|
Step by Step Process of Crime Scene Investigation (Law Enforcement Agencies)
|
1: Wear Medicated Forensic Gloves.
2: Seize the Area of Crime Spot.
3: Dont let any Civilian enter into Seized Area.
4: Take Photographs with accurate Date & Time Stamp.
5: Take Fingerprints & Footprints via Forensic Tapes.
6: Search out with keen eye for concrete Evidence within 500 mtrs in all directions of Seized Area & Collect everything found nearby because every single point we collected might be a good source of cracking the case & taking actual Suspect Accused into Custody
|
Basic Steps of Hacker or Ethical Hacker
|
1. Scanning Open Ports , Misconfig in Web App etc etc
2. Checking Vulnerabilities via Vulnerabilities Scanner
3 . Gaining Access Exploiting Vulnerabilities
4. Maintaining Access via FUD Malware
5 . Clearning Tracks / Logs to be Anonymous.
The most Important thing is to Be Anonymous in all these Activities which itself is a crime according to Cyber Laws.
How to be Anonymous :
Pre Activitity before trying all of them is to change mac address / Identity of Network Interface Card
|
Purpose of Antivirus & Firewall
|
Antivirus is used to cross check/scan signatures by Developer of media/file/executable if it match then AV bypass that app to next step or if file scanned is found having some other signature then it is sent to vault & submitted for further analysis via AV company.
Firewall are of two types Software & Hardware :
Firewall is used to detect & protect data packets transferred between client & server ie :
IDS Intrusion Detection System
IPS Intrusion Prevention System
First action of a Firew
|
Importance of Email Header Analysis
|
Modern time communication is impossible without emails. In the field of business communication, emails are considered as its integral part. At the same time, emails are also being used by criminals. In digital forensics, emails are considered as evidence and Email Header Analysis has become important to collect evidence during forensics process. Email clients are computer programs that allow users to send and receive emails. Over time, different types of email clients have been invented for the
|
Amazing World of Ted v1.19 Mod
|
Amazing World of Ted v1.19 Mod
*** Princess of wonderland is being kidnapped by the evil ghost and brought to the dark world.Help Ted to rescue her!
Ted’s Adventures - Jungle adventure is one of the most popular and enduring series of all time
[size=small][color=#aaaaaa]?? Super boy Ted will have to jump and run
|
What softwares do you recommend for a fresh install of Windows LTSC 2019?
|
My laptop is equipped with a old i7 (it's old but is still enough, since I have another that is more powerful). I'm planning to use it for lightweight works like graphic design(photoshop, illustrator, lightroom), programming and sometime I could use it for some more heavy works like video editing(vegas, premiere pro, da vinci resolve, hitfilm pro and avid) and 3d modeling(Maya, Blender, Nuke, Houdini and Autodesk softwares). In some words, almost for everything. Any software suggestion is apprec
|
The importance of the computer being on
|
It's important during an arrest of a cybercriminal that the computer is powered on. That because the cybercriminal can have installed a program that decrypt the disk at startup only by inserting a password or because you want the login credential to a site. An example of a program that encrypt the disk is VeraCrypt. VeraCrypt infact is able to encrypt the disk with a password and decrypt it at startup, that means that if the computer is shutted down the only way to do forensics over it is to kno
|
Importance of disk Encryption
|
Cryptography basis (if you find it boring go ahead)
First of all you have to understand how work encryption. Encryption algorithms are algorithms that are divided in Symmetric key and Public key. Symmetric key algorithms encrypt and decrypt with the same key(password), instead Public key uses two different keys for encrypt and decrypt.
The most used and strong encryption algorithms are:
- RSA(Public key) possible key lengths are 1024 bit, 2048 bit, 3072 bit and 4096 bi
|