Today we are going to solve another boot2root challenge called “KB-VULN: 3”. It’s available at VulnHub for penetration testing and you can download it from
Cyber Criminals and attackers have become so creative in their crime type that they have started finding methods to hide data in the volatile memory
In this article, we will be focusing on shellbags and its forensic analysis using shellbag explorer. Shellbags are created to enhance the users’ experience by
Introduction Today we are going to crack this vulnerable machine called HA: Forensics. This is a Capture the Flag type of challenge. It contains FOUR
In this article, we will discuss of Deployment of OSSEC (IDS) agents to the AlienVault server. OSSEC is an open-source, host-based intrusion detection system (commonly
In this article, we will learn how to perform a forensic investigation on a Page File. There is a lot of information that can be
In this article, we will be using Disk Drive Signature to identify any suspicious changes in systems’ directories or files. Creating such signatures can help
In this article, we are going to study an important artifact of Windows, i.e. prefetch files. Every time you do anything on your Windows system,
Introduction Today we are going to crack this vulnerable machine called Maskcrafter: 1.1. It is created by evdaez. It is a simple Boot to root