Home
sujay adkesar
Cancel

front-page port 80-shoopyuPractical Windows Forensics

Agenda The go-to methodology to get up and running with forensics is as follows: Extract Evidence Mount with Arsenal Image Mounter Parse with KAPE into a cases folder Examine Registry ...

How NTFS Self-References Its $MFT

$MFT :) Who is keeping track of the Tracker!! In the world of Windows file systems, there exists a fascinating technical paradox that few users ever consider: The Master File Table (MFT), respon...

front-page port 80-shoopyuWindows Artifacts

System and User Information (via Registry) Artifact Filesystem Location Tools or Commands Operating System Version System Information S...

RADAR – An Obscure Execution Artifact

Resource Exhaustion Detection and Resolution (RADAR) When investigating Windows systems, evidence of execution is gold. Artifacts like Prefetch, UserAssist, and ShimCache are well-known, but Win...

LNK File Forensics β€” Experimental Case Study

πŸ” Objective To analyze and demystify the subtle, less-documented behaviors of .LNK (Windows Shortcut) files during document creation, modification, and reopening using real-time forensic testing...

front-page port 80-shoopyuLinux Forensics Essentials

Commands and Artifacts Every Investigator Needs Here’s a streamlined guide to key Linux artifacts and the commands to extract and analyze them efficiently, enabling forensics investigators to fo...

Windows Forensics Tools

Windows Forensics Tools – 2025 Comprehensive Edition All-in-One Suites Autopsy GUI file system, artifact, and timeline analysis https://www.autopsy.com/download/ SIFT Workstation Ubuntu-bas...

img File Upload Vulnerabilities πŸ—ƒοΈ

1. Unrestricted File Type Upload: Allowing users to upload files without proper validation can lead to the execution of malicious scripts. An attacker may upload a file with a double extension...

img Access Control Flaw in Email Verification πŸ“§

Introduction: Email verification is a crucial step in securing online accounts, ensuring that users have valid and accessible email addresses. However, not all verification processes are foolp...

img Bypassing 2 Factor Authentication Techniques πŸ”

Introduction Two-Factor Authentication (2FA) is a robust security measure, but no system is flawless. In this blog post, we will explore advanced techniques to bypass 2FA, uncovering potential ...