HackDig : Dig high-quality web security articles for hacker

Diving Deeper to Understand, Investigate and Mitigate Cyberthreats

As recent attacks targeting sensitive, personal information at a number of high-profile institutions have demonstrated, it is not a matter of if, but when you will have to investigate a security breach. The law enforcement and intelligence communities are increasingly called upon to investigate and mitigate cyberthreats, often applying the same tools and met
Publish At:2017-11-02 13:10 | Read:2324 | Comments:0 | Tags:Incident Response Risk Management Forensics Incident Forensi

Forensic Techniques

The main goal of the forensic investigation is to handle a large amount of data, gather as much evidence as possible, and uncover all the hidden and untraced data.In the field of digital forensic various techniques are considered to extract the maximum amount of information and gather as much evidence. Below is the list of techniques that are used in d
Publish At:2017-10-31 23:55 | Read:2214 | Comments:0 | Tags:Forensics

Computer Forensics Interview Questions

 Computer forensic investigators are in high-demand. Often referred to as digital forensics engineers, computer forensic investigators are expected to know basic IT skills, understand computer architecture and networking, have the ability to collaborate with various teams and write detailed reports. A digital forensics professional must have analy
Publish At:2017-10-22 04:37 | Read:1831 | Comments:0 | Tags:Forensics Interviews Meta

10 Digital Forensics Tools – The Lesser Known

For years Digital Forensics has played a significant role in the security domain. Being an integral part of the process, various tools have been developed over the years to make the forensic investigator’s work easier. Since most people are aware of tools such as EnCase, The Sleuth Kit, Caine, etc. that are used in the day-to-day practice, for a
Publish At:2017-09-23 07:45 | Read:3025 | Comments:0 | Tags:Forensics

An Introduction to Computer Forensics

IntroductionOne of the biggest threats facing businesses and corporations today is that of Cyber-attacks and threats. If these are large enough in scale and magnitude, it could even be considered as an act of Cyber terrorism, in which a significant impact can be felt in both regarding cost and human emotion. Whenever something like this occurs, two of
Publish At:2017-08-30 01:20 | Read:2935 | Comments:0 | Tags:Forensics

The Concept of Mobile Phone

INTRODUCTIONThe digital forensic community is striving hard to stay abreast of the current state of the art in the constantly changing technologies which we use to expose relevant clues in a probe. Mobile devices are used by almost every person today for both personal and professional means, hence carry a significant value. All sorts of mobile devices
Publish At:2017-07-28 03:05 | Read:4757 | Comments:0 | Tags:Forensics

Feature Phone Forensics

IntroductionA feature phone can be described as a wireless mobile device that has more features than a standard cell phone, but limited capabilities when you compare it with a smartphone.Feature phones typically provide a calling feature, messaging functionality, and MMS support. They also offer basic multimedia and browsing internet capabilities, as w
Publish At:2017-07-27 00:15 | Read:4133 | Comments:0 | Tags:Forensics

Windows Phone Forensics

1. INTRODUCTIONWindows phones hold a large market share, so it is essential that Examiners or Investigators are aware of techniques used to extract data from them. It is also crucial that Analysis techniques, Types of Artifacts that can be retrieved and the location of those artifacts are known to examiners or investigators. This document covers Logica
Publish At:2017-07-26 05:51 | Read:4997 | Comments:0 | Tags:Forensics

IOS Forensics

1. INTRODUCTIONDay by day, Smart phones and tablets are becoming popular, and hence technology used in development to add new features or improve the security of such devices is advancing too fast. iPhone and iPod are the game changer products launched by Apple. Apple operating system (IOS) devices started growing popular in the mobile world. Latest Sm
Publish At:2017-07-26 05:50 | Read:8404 | Comments:0 | Tags:Forensics IOS

Practical Android Phone Forensics

IntroductionToday’s world is Android World. Almost 90% of devices are running on Android, and each one of us is using Android in some or the other way. There are various devices which run on Android, but Android is widely used on Smart Phones. Also, if you check the Global Smart Phone Market Share Android Smart Phone share is 88%. Thus, it is nec
Publish At:2017-07-21 15:00 | Read:7216 | Comments:0 | Tags:Forensics

Breachless Threat Intelligence: A Pain-Free Approach to CyberSecurity

Enterprises need a steady stream of actionable, timely, and accurate threat intelligence on targeted malicious intrusions and attempts into their networks They need this information without suffering breaches and cannot rely solely on post-compromise forensics or sandbox simulations to continuously tighten and adapt their defenses Pre-breach targeted intell
Publish At:2017-07-17 06:40 | Read:2862 | Comments:0 | Tags:Innovation breach breachless detection disposable Forensics

19 Extensions to Turn Google Chrome into Penetration Testing tool

Google Chrome is the most popular web browser of the world. It’s light weight and comes with a clean interface. This is the main reason of its popularity. It also has various other features that make website browsing easy and faster. Like Firefox, Chrome also supports add-ons but called extensions for Chrome. Extensions help us in improving the f
Publish At:2017-07-11 15:30 | Read:3200 | Comments:0 | Tags:Penetration Testing feature forensics

Bitscout – The Free Remote Digital Forensics Tool Builder

Being a malware researcher means you are always busy with the struggle against mountains of malware and cyberattacks around the world. Over the past decade, the number of daily new malware findings raised up to unimaginable heights: with hundreds of thousands of malware samples per day! However, while there are some rare and dangerous malware, not every samp
Publish At:2017-07-06 06:45 | Read:2765 | Comments:0 | Tags:Software Bitscout Forensics Tools

Cisco Talos releases the BASS open source malware signature generator

Cisco Talos intelligence group released an open source framework named BASS that is designed for automatically generating antivirus signatures from malware. BASS is an automated signature synthesizer, it is able to automatically create signatures from the analysis of a malicious code that belongs to previously generated clusters. The BASS tool aims to simpli
Publish At:2017-06-21 18:15 | Read:2792 | Comments:0 | Tags:Breaking News Malware BASS Cisco Talos ClamAV forensics malw

OSXCollector: Walkthrough

OSXCollector is an open-source forensic evidence and analysis tool for OSX released by Yelp back in 2014. Its GitHub repository can be found at https://github.com/Yelp/osxcollectorBuilt in Python, OSXCollector’s script running on the infected machine and it generated the output in a JSON file which contains the description of the target machine.
Publish At:2017-05-05 01:30 | Read:3197 | Comments:0 | Tags:Forensics


Share high-quality web security related articles with you:)


Tag Cloud