Live Cyber Forensics Analysis with Computer Volatile Memory
The field of computer Forensics Analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted in an electronic or magnetic form (that is, digital evidence).Forensics Analysis - Volatile Data:The data that is held in temporary storage...
USB Forensics – Reconstruction of Digital Evidence from USB Drive
Digitial Forensics analysis of USB forensics include preservation, collection, Validation, Identification, Analysis, Interpretation, Documentation, and Presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal.Disk Imaging -...
SPARTA – GUI Toolkit To Perform Network Penetration Testing
SPARTA is GUI application developed with python and inbuilds Network Penetration Testing Kali Linux tool. It simplifies scanning and enumeration phase with faster results.The best thing of SPARTA GUI Toolkit it scans detects the service running on the target port.Also,...
JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript
JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the server and the target hosts.Here I have used Kali Linux(Attacker Machine) and Victim Machine (Windows 10)Installation & Setup :-Download...
DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine
DNS protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination server acts as the backdoor.DNS Shell Tool is a python based Exploitation tool to compromise and...
SIEM Better Visibility for SOC Analyst to Handle an Incident with Event ID
We are in the complex world where attacks are increasing day by day, so today the cyber intelligence depends on SIEM as a part of infosec (security incident and event management).Most companies depend on logs and packets to have a better view.. above...