HackDig : Dig high-quality web security articles for hacker

An Introduction to Computer Forensics

IntroductionOne of the biggest threats facing businesses and corporations today is that of Cyber-attacks and threats. If these are large enough in scale and magnitude, it could even be considered as an act of Cyber terrorism, in which a significant impact can be felt in both regarding cost and human emotion. Whenever something like this occurs, two of
Publish At:2017-08-30 01:20 | Read:212 | Comments:0 | Tags:Forensics

The Concept of Mobile Phone

INTRODUCTIONThe digital forensic community is striving hard to stay abreast of the current state of the art in the constantly changing technologies which we use to expose relevant clues in a probe. Mobile devices are used by almost every person today for both personal and professional means, hence carry a significant value. All sorts of mobile devices
Publish At:2017-07-28 03:05 | Read:264 | Comments:0 | Tags:Forensics

Feature Phone Forensics

IntroductionA feature phone can be described as a wireless mobile device that has more features than a standard cell phone, but limited capabilities when you compare it with a smartphone.Feature phones typically provide a calling feature, messaging functionality, and MMS support. They also offer basic multimedia and browsing internet capabilities, as w
Publish At:2017-07-27 00:15 | Read:271 | Comments:0 | Tags:Forensics

Windows Phone Forensics

1. INTRODUCTIONWindows phones hold a large market share, so it is essential that Examiners or Investigators are aware of techniques used to extract data from them. It is also crucial that Analysis techniques, Types of Artifacts that can be retrieved and the location of those artifacts are known to examiners or investigators. This document covers Logica
Publish At:2017-07-26 05:51 | Read:467 | Comments:0 | Tags:Forensics

IOS Forensics

1. INTRODUCTIONDay by day, Smart phones and tablets are becoming popular, and hence technology used in development to add new features or improve the security of such devices is advancing too fast. iPhone and iPod are the game changer products launched by Apple. Apple operating system (IOS) devices started growing popular in the mobile world. Latest Sm
Publish At:2017-07-26 05:50 | Read:375 | Comments:0 | Tags:Forensics IOS

Practical Android Phone Forensics

IntroductionToday’s world is Android World. Almost 90% of devices are running on Android, and each one of us is using Android in some or the other way. There are various devices which run on Android, but Android is widely used on Smart Phones. Also, if you check the Global Smart Phone Market Share Android Smart Phone share is 88%. Thus, it is nec
Publish At:2017-07-21 15:00 | Read:559 | Comments:0 | Tags:Forensics

Breachless Threat Intelligence: A Pain-Free Approach to CyberSecurity

Enterprises need a steady stream of actionable, timely, and accurate threat intelligence on targeted malicious intrusions and attempts into their networks They need this information without suffering breaches and cannot rely solely on post-compromise forensics or sandbox simulations to continuously tighten and adapt their defenses Pre-breach targeted intell
Publish At:2017-07-17 06:40 | Read:270 | Comments:0 | Tags:Innovation breach breachless detection disposable Forensics

19 Extensions to Turn Google Chrome into Penetration Testing tool

Google Chrome is the most popular web browser of the world. It’s light weight and comes with a clean interface. This is the main reason of its popularity. It also has various other features that make website browsing easy and faster. Like Firefox, Chrome also supports add-ons but called extensions for Chrome. Extensions help us in improving the f
Publish At:2017-07-11 15:30 | Read:305 | Comments:0 | Tags:Penetration Testing feature forensics

Bitscout – The Free Remote Digital Forensics Tool Builder

Being a malware researcher means you are always busy with the struggle against mountains of malware and cyberattacks around the world. Over the past decade, the number of daily new malware findings raised up to unimaginable heights: with hundreds of thousands of malware samples per day! However, while there are some rare and dangerous malware, not every samp
Publish At:2017-07-06 06:45 | Read:375 | Comments:0 | Tags:Software Bitscout Forensics Tools

Cisco Talos releases the BASS open source malware signature generator

Cisco Talos intelligence group released an open source framework named BASS that is designed for automatically generating antivirus signatures from malware. BASS is an automated signature synthesizer, it is able to automatically create signatures from the analysis of a malicious code that belongs to previously generated clusters. The BASS tool aims to simpli
Publish At:2017-06-21 18:15 | Read:314 | Comments:0 | Tags:Breaking News Malware BASS Cisco Talos ClamAV forensics malw

OSXCollector: Walkthrough

OSXCollector is an open-source forensic evidence and analysis tool for OSX released by Yelp back in 2014. Its GitHub repository can be found at https://github.com/Yelp/osxcollectorBuilt in Python, OSXCollector’s script running on the infected machine and it generated the output in a JSON file which contains the description of the target machine.
Publish At:2017-05-05 01:30 | Read:496 | Comments:0 | Tags:Forensics

Memory Forensics Power-Part 2

In Part 1 of this article, we have looked at the memory forensics power during the enumeration of forensically important objects like PROCESS, VAD nodes, MEMORY mapping, etc. In this article we will see memory forensics enumeration of other forensically important objects.DLLS Enumeration from memoryDLL’s are used to be shared among processes for
Publish At:2017-04-19 08:40 | Read:464 | Comments:0 | Tags:Forensics

Memory Forensics Power: An Introduction

Since we live in a digital world, it becomes utmost important for digital environment to be secure so that we can operate safely and reliably. So often we have heard that an organization, a government website, a social media platform, etc. is under cyber-attack which is carried out by Distributed denial of service(DDoS), Ransomware variants, Virus, Roo
Publish At:2017-04-17 19:50 | Read:410 | Comments:0 | Tags:Forensics

Why Bromium Is Not Just Protection, But Also An Enhanced Predictive Analytics Solution

Zero-day attacks exploit vulnerabilities or security holes in software. In the event of a malicious attack on any microVM, malware payloads cannot infiltrate the enterprise network. LAVA provides highly specific details about every malicious breach, identifying external IP addresses, memory exploits, a list of affected files, and covert attempts to connect
Publish At:2017-04-16 13:05 | Read:336 | Comments:0 | Tags:Innovation Data Analytics Endpoint Protection Forensics Virt

Smart Forensics for the Internet of Things (IoT)

Interconnecting smart devices open companies, government agencies and individual consumers to a whole new world of useful applications. But while the Internet of Things (IoT) makes our day-to-day lives more convenient and dynamic, it also creates more opportunities for malicious actors to attack in ways that directly impact us. Today, discussions around IoT
Publish At:2017-03-23 16:56 | Read:520 | Comments:0 | Tags:Network & Endpoint Risk Management Computer Forensics Connec

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud