Home
sujay adkesar
Cancel

How NTFS Self-References Its $MFT

$MFT :) Who is keeping track of the Tracker!! In the world of Windows file systems, there exists a fascinating technical paradox that few users ever consider: The Master File Table (MFT), respon...

front-page port 80-shoopyuWindows Artifacts

System and User Information (via Registry) Artifact Filesystem Location Tools or Commands Operating System Version System Information S...

RADAR – An Obscure Execution Artifact

Resource Exhaustion Detection and Resolution (RADAR) When investigating Windows systems, evidence of execution is gold. Artifacts like Prefetch, UserAssist, and ShimCache are well-known, but Win...

LNK File Forensics β€” Experimental Case Study

πŸ” Objective To analyze and demystify the subtle, less-documented behaviors of .LNK (Windows Shortcut) files during document creation, modification, and reopening using real-time forensic testing...

front-page port 80-shoopyuLinux Forensics Essentials

Commands and Artifacts Every Investigator Needs Here’s a streamlined guide to key Linux artifacts and the commands to extract and analyze them efficiently, enabling forensics investigators to fo...

Windows Forensics Tools

Windows Forensics Tools – 2025 Comprehensive Edition All-in-One Suites Autopsy GUI file system, artifact, and timeline analysis https://www.autopsy.com/download/ SIFT Workstation Ubuntu-bas...

img File Upload Vulnerabilities πŸ—ƒοΈ

1. Unrestricted File Type Upload: Allowing users to upload files without proper validation can lead to the execution of malicious scripts. An attacker may upload a file with a double extension...

img Access Control Flaw in Email Verification πŸ“§

Introduction: Email verification is a crucial step in securing online accounts, ensuring that users have valid and accessible email addresses. However, not all verification processes are foolp...

img Bypassing 2 Factor Authentication Techniques πŸ”

Introduction Two-Factor Authentication (2FA) is a robust security measure, but no system is flawless. In this blog post, we will explore advanced techniques to bypass 2FA, uncovering potential ...

img S3 Bucket Misconfiguration!

Misconfigurations Of S3 Bucket Introduction: Amazon S3 buckets, a fundamental component of cloud storage, are often a target for security researchers and VAPT (Vulnerability Assessment and Pe...