The Tree Bends When It is Wet
I wrote my own thoughts on the connection between people’s decisions and upbringing.
I wrote my own thoughts on the connection between people’s decisions and upbringing.
Hi, today we will try to understand what is goin on in Android devices in terms of Digital forensics. Overall, if we want to make some work in mobile forensics that is essential. As we know, we digital foreniscs engineering collect evidence from target devices that means we have to know how data is stored […]
Hello my dear readers, today’s article might be silly. I think it will be legendery in person. Let’s start without wasting time 🙂 I was in Italy 3 months ago and i chose Rome for travel. you may say are you okay, because of the corona virus but i trust numbers, in that time the […]
Hello all. Today i will demostrate how to document recovery with the sleuth kit and file system knowlage. This article will not be too much tutorial. İt might be useful for specific events like mine. For instance you accidentally deleted your file or picture. how to recover in the most optimized way, I mean you […]
Hi there! nearly all of us use inconnito tab for some privacy as normal. But most of people when use incognito tab feel like no one see me , so i can do whatever i want. You think how is things going and how safe are we ? In this article we are gonna find […]
hello everyone today i am gonna mention about vulnerability Discovery/Scanning mehtods and tools which one is the most populer or free and you will see how to do it simply. but before we start i need to say preliminary informations about my case. I assume we are normal users in the network or IT manager […]
In this article I will explain a tool which I coded as a project for Programming Windows GUI class in University of Lodz. This tool tested on Mozilla Firefox Version 77.01 and Google Chrome Version 83.0.4103.97. Basically it helps you to see your old reports,to create a new case etc. Let’s get started. First you […]
Nowadays many crimes can be solved with browser datas. During Firefox forensics, examiners use these Sqlite files for the purpose of analysis by opening them in a database viewer. Let’s see what kind of things Firefox has. Linux~/.config/mozillafirefox/Default/databases Mac OS X~/Library/Application Support/Mozilla/Firefox/Profiles/ Windows XPC:\Documents and Settings\%USERNAME%\Application Data\Mozilla\Firefox\ Windows Vista & aboveC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\_.default Above you can see […]
Cross-site Scripting (XSS) is a client-side code injection attack. There 3 types of XSS. 1-Reflected XSS 2-Stored XSS 3- DOM XSS We can execute malicious javascript code which is stealing cookie or redirecting victim anywhere. Example1 In Example1, the first thing I tried is injecting <a> tag. I saw that the input is directly printed. […]
Hello, in this article I’m gonna show you command injection vulnerability. I’ll be using PentesterLab for this. You can download it here. Let’s get started. So what is the command injection? According to Owasp : Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via […]