• Some thoughts about NTFS Filesystem

    Some information raised during preparation of GCFA exam The New Technology File System (NTFS) is a file system developed and introduced by Microsoft in 1995 with Windows NT as a replacement for the FAT file system. Versions Microsoft has released five… read more »
  • Wifite 2: a complete rewrite of Wifite

    A Python script for auditing wireless networks Do you know Wifite? It’s a great wifi auditing tool, designed for use with pentesting distributions of Linux, such as Kali Linux, Pentoo, BackBox and any Linux distributions with wireless drivers patched for injection (so… read more »
  • Understanding Process Hollowing

    A technique used by malware author to evade defenses and detection analysis of malicious processes execution Process hollowing is a technique used by malware in which a legitimate process is loaded on the system solely to act as a container… read more »
  • MAC(b) times in Windows forensic analysis

    Essential information during timeline analysis   During a forensic analysis, especially during timeline analysis, you deal with MAC timestamps, so it’s important to know and understand the concept of time resolution. The MAC(b) times are derived from file system metadata and… read more »
  • Some thoughts about FAT Filesystem

    Some information raised during preparation of GCFA exam FAT, or File Allocation Table, is a file system that is designed to keep track of allocation status of clusters on a hard drive. Originally designed in 1977 for use on floppy disks… read more »
  • Volume Shadow Copies in forensic analysis

    Integral part to the Windows Operating System and essential for DFIR analysts Shadow Copy (also known as Volume Snapshot Service, Volume Shadow Copy Service or VSS) is a technology included in Microsoft Windows that allows taking manual or automatic backup copies… read more »
  • BitCracker: open source BitLocker password cracking tool

    A mono-GPU password cracking tool BitLocker is a full disk encryption feature included with Windows Vista and later. It is designed to protect data by providing encryption for entire volumes, using by default AES encryption algorithm in cipher block chaining(CBC) or… read more »
  • JSECoin : a new cryptocurrency designed for website mining

    A new cryptocurrency on which to bet? Recently, ThePirateBay conducted an experiment to see if it could replace the advertisements that keep the site afloat with a new monetization scheme: using visitors’ browsers to mine cryptocurrency. So, the webmasters has embedded… read more »