BALA GANESH

USB Forensics – Reconstruction of Digital Evidence from USB Drive

Digitial Forensics analysis of USB forensics include preservation, collection, Validation, Identification, Analysis, Interpretation, Documentation, and Presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal.Disk Imaging -...

SPARTA – GUI Toolkit To Perform Network Penetration Testing

SPARTA is GUI application developed with python and inbuilds Network Penetration Testing  Kali Linux tool. It simplifies scanning and enumeration phase with faster results.The best thing of SPARTA GUI  Toolkit it scans detects the service running on the target port.Also,...

JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript

JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the server and the target hosts.Here I have used Kali Linux(Attacker Machine) and Victim Machine (Windows 10)Installation & Setup :-Download...

DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine

DNS protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination server acts as the backdoor.DNS Shell Tool is a python based Exploitation tool to compromise and...

SIEM Better Visibility for SOC Analyst to Handle an Incident with Event ID

We are in the complex world where attacks are increasing day by day, so today the cyber intelligence depends on SIEM as a part of infosec (security incident and event management).Most companies depend on logs and packets to have a better view.. above...
spot_img

latest articles