How to Create an Open Source Network Forensics Appliance
By Ondrej Krehel Chief information security officer at Identity Theft 911 okrehel@IDT911.com IntroductionEncryption and anti-forensics attacker techniques are commonly encountered in incident response...
View ArticleWeb History Visualisation for Forensic Investigations
Web History Visualisation for Forensic Investigations Sarah Lowman (1) and Ian Ferguson (2) (1) – sarah@lowmanio.co.uk (2) – University of Abertay I.Ferguson@abertay.ac.uk Abstract. Current tools for...
View ArticleAn Introduction to Penetration Testing – Part 1
Information Security Wordle: RFC2196 – Site Security Handbook (Photo credit: purpleslog) In an earlier article, many moons ago (Sorry Jamie !), I stated my opinion that Forensics and Security were...
View ArticleIntroduction to Penetration Testing – Part 2 – The Discovery Phase – Passive...
Beschreibung, Quelle Quelle: selbst fotografiert, 01/2006 Fotograf: Späth Chr. Lizenzstatus: license (Photo credit: Wikipedia) PenTest, like forensics, is almost as much an art as it is a science – you...
View ArticleIntroduction to Penetration Testing – Part 3a – Active Reconnaissance
wi-fi garbage (Photo credit: Yuba College Public Space Apologies in advance, this is a bit of a connective blog entry – this is a big topic, and it needs some scene setting, basic understanding and...
View ArticleBook Review: Mastering Windows Network Forensics & Investigations
Mastering Windows Network Forensics and Investigations fills an interesting niche not well addressed in the pantheon of digital forensics resources. The material is well suited for beginning and...
View ArticleFrom iPhone to Access Point
Introduction A wireless Access Point (AP) is a device that allows wireless devices to connect to internet using Wi-Fi. With the remarkable increase in number of wireless devices the number of APs has...
View ArticleCyber Security Challenge in Scotland
Towards the end of August, I was part of the team who were offered to help out and participate at an exciting event held at Glasgow Caledonian University. The event ran over five days with each day...
View ArticleAnalysis Of iOS Notes App
As part of my third year studying Digital Security,Forensics & Ethical Hacking at GCU, I took part in a group research project to study the artifacts created when using the notes app on an iPad...
View ArticleMan In The Middle Attack: Forensics
Yes, that’s right! Mr. Upset did not post ‘I am hating my new job’ as it appears in Figure 2, instead he wrote ‘I am loving my new job’. Then how did it happen and who did it? This article aims at...
View ArticleInvestigation and Intelligence Framework (IIF) – an evidence extraction model...
Authors Alan, Kelvin, Anthony and Zetta (VXRL) Disclaimer This framework was first introduced in DFRWS EU 2014 (the first DFRWS conference in Europe) at Amsterdam held in May and later presented at...
View Article