USB Forensics

USB Forensics – Reconstruction of Digital Evidence from USB Drive

Digitial Forensics analysis of USB forensics include preservation, collection, Validation, Identification, Analysis, Interpretation, Documentation, and Presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal. Disk Imaging -...
Email Header

Email Header Analysis – Received Email is Genuine or Spoofed

Email is a business critical asset.Altering email header to make the message appear to come from somewhere other than the actual source is a fraudulent email. If the spam filter is bypassed a receiving the mail to inbox can be...
Forensics Tool

p0f – Passive Traffic Analysis OS Fingerprinting and Forensics Tool

P0f is a OS Fingerprinting and Forensics Tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in...
Tracking Photos

Tracking Photo’s Geo-location with GPS EXIF DATA – Forensic Analysis

This article is about collecting metadata from photographs. Metadata is an information which is created for every file's format. Examples for metadata: file created date and time, last edited etc. In this article, we will take a picture from iPhone and analyze...
Malicious PDF File

Creating and Analyzing a Malicious PDF File with PDF-Parser Tool

This tool will parse a PDF document to distinguish the central components utilized as a part of analyzed file. It won't render a PDF archive. Features included: Load/parse objects and headers Extract meta data (author, description, ...) Extract text from...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended