BALAGANESH

Email Header Analysis – Verify Received Email is Genuine or Spoofed

Email Header Analysis highly required process to prevent malicious threats since Email is a business-critical asset. Altering the email header…

1 year ago

Tracking Photo’s Geo-location to See Where the Photo Was Taken – A Forensic Analysis

This article is about collecting metadata from photographs. Metadata is information that is created for every file's format. Examples of metadata:…

1 year ago

How to Perform Manual SQL Injection While Pentesting With Single Quote Error-Based Parenthesis Method

If you are trying to hack the databases with methods like single quotes error-based injection, Integer based injection, or double quotes…

1 year ago

ICMP Shell- Secret Command and Control Channel to Control Victims Machine Using Ping

Corporate firewalls can block reverse and bind TCP connections. However, corporate firewalls are behind internal networks. So we can use PING…

1 year ago

Man in the Middle Attack with “Cain and Abel” Tool

In this tutorial, we will use Cain and Abel to perform this attack. Active eavesdropping alters the communication between two parties…

1 year ago

Penetration Testing Mail Server with Email Spoofing – Exploiting Open Relay configured Public Mail Servers

Email spoofing is a way of delivering forged emails to recipients. These methods are used by criminals to launch attacks like phishing…

1 year ago

Shodan and Censys: Finding Hidden Parts On the Internet With Special Search Engines

Shodan and Censys can scan Internet-facing systems, finding open ports and services that listen on a port. It's useful to…

1 year ago

SIEM Better Visibility for SOC Analyst to Handle an Incident with Event ID

We are in a complex world where attacks are increasing day by day, so today cyber intelligence depends on SIEM as…

1 year ago

SPARTA – GUI Toolkit To Perform Network Penetration Testing

SPARTA is a GUI application developed with Python and builds Network Penetration Testing Kali Linux tool. It simplifies the scanning and enumeration…

1 year ago

USB Forensics – Reconstruction of Digital Evidence from USB Drive

Digital Forensics analysis of USB forensics includes preservation, collection, Validation, Identification, Analysis, Interpretation, Documentation, and Presentation of digital evidence derived from…

1 year ago