Just a poster on memory forensics

Please click on the link below to download the poster on Memory forensics syn_volatilty

Read More »

Hubs, Switches and Routers

  Basic difference Hubs Hubs, also known as repeaters, are network devices that can operate on layer-1 (I.e. the physical layer) to connect network devices for communication. Hubs cannot process layer-2 or layer-3 traffic. Layer-2 deals with hardware addresses and layer-3 deals with logical (IP) addresses. So, hubs cannot process information based on MAC or […]

Read More »

Information Security FAQ

  What is NAT and how does it work? The abbreviation for NAT is Network Address Translator. Private IP addresses are not globally recognized and should never be used on the internet and they are intended for the internal use in isolated networks, such as LANS, without internet access. However, private addresses can be used […]

Read More »

Nmap Basics

Explore the network with Nmap Nmap is a tool for port scanning the internet. A port is the point admission, physical or logical, of a connection through which you transfers made between files. Nmap has infinite utility, we think that most of the vulnerabilities will find them with this small but great tool. To give […]

Read More »

Microsoft – Snake biting its own tail

How important is it to have an update release properly tested before releasing? Probably Microsoft overlooked the fact while releasing the patch ( KB 2756920) on 8th of January 2013. The Patch was released to rectify the vulnerability existed in Dot net framework 3.5.1 as mentioned at http://technet.microsoft.com/en-us/security/bulletin/ms13-004. This vulnerability allowed the attacker to raise the privilege level (Privilege […]

Read More »

Volume Shadow Copy as an aid to forensic investigations

While conducting forensics examinations I have come across several instances where past activity record on the system had proved helpful. Volume Shadow copy forensics is one of them. What is Volume shadow copy service (VSS):  Also known as volume snapshot service; the feature was introduced with Windows XP. The Idea was to create a backup […]

Read More »
Living in past glory

Living in the past glory

    Hello sir! Good noon.. I said as i entered the office of this gentleman. He had been one of my ideals and i do admire him for his thinking process, Cool headedness, Ways of handling business and knowledge. Mr. Praful Mehta, Owns a business that spreads across 3 states and deals in heavy […]

Read More »

Network tools for Linux

Here are some free, open-source, and useful network tools for Linux: 1) tcpdump is a common packet analyzer that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. Distributed under the BSD license. The […]

Read More »