-
Aug 28, 2017
A shortlist of six distribution…guess my favorite! During a digital forensics analysis, a lot of different tools can be used, and it could be useful use a dedicated linux distribution with all tools already installed and configured. Here a brief… read more »
-
Aug 25, 2017
Designed to find various default and insecure files, configurations and misconfigurations. Spaghetti is a web application security scanner built on python2.7, designed to find various default and insecure files, configurations and misconfigurations. It’s developed and mantained by Momo Outaadi(m4ll0k), that… read more »
-
Aug 23, 2017
Every morning a guitarist wakes up … and doing the warm-up! The warm-up is a very important step of a musician’s daily routine: a simple set of progressive exercises useful to predispose muscles and articulation for more complex movements and stretching. Today… read more »
-
Aug 21, 2017
With this part, we ended the series dedicated to Volatility: the last ‘episode’ is focused on file system. If you want to read the other parts, take a look to this index: Image Identification Processes and DLLs Process Memory Kernel Memory… read more »
-
Aug 9, 2017
This command-line tool is really useful for both penetration testing and forensics tasks The previous article has raised interest in readers regarding WMIC.So I decided to write an article dedicated to this tool. If you’ve done any scripting for the… read more »
-
Aug 7, 2017
Volatility supports memory dumps in several different formats, to ensure the highest compatibility with different acquisition tools. You can analyze hibernation files, crash dumps, virtualbox core dumps, etc in the same way as any raw memory dump and Volatility will… read more »
-
Aug 4, 2017
An inspiring TED talk by Tim Harford, about how challenges and problems can make you more creative than ever. Starting talking about a Keith Jarrett’s concert, Tim Harford try to convince you of the advantages of having to work with a… read more »
-
Aug 3, 2017
Yes, also Windows can be used by command line… Today I propose a brief list of useful Windows CLI commands for daily use Windows Registry Adding Keys and Values C:>reg add [\TargetIPaddr][RegDomain][Key] Add a key to the registry on machine [TargetIPaddr] within… read more »