CHFI

Anti-Forensics-Techniques-Trail-Obfuscation

Anti-Forensics Techniques: Trail Obfuscation, Artifact Wiping, Encryption, Encrypted Network Protocols and Program Packers

In this article Anti-Forensics Techniques has been explained with its different topic like Trail Obfuscation, Artifact Wiping, Encryption and Program Packers this techniques etc. 1. Anti-Forensics Techniques: Trail Obfuscation Anti-Forensics Techniques Trail Obfuscation is one of the anti-forensic technique that attackers use to mislead, divert, complicate, disorient, sidetrack, and/or distract the forensic examination process. The process involves different techniques and tools, such as Log cleaners Spoofing Misinformation Backbone hopping Zombie accounts Trojan commands In this …

Anti-Forensics Techniques: Trail Obfuscation, Artifact Wiping, Encryption, Encrypted Network Protocols and Program Packers Read More »

Detecting-Steganography

Detecting Steganography

Detecting Steganography in this article how to detect Steganography explained with it types as well as Steganography detecting files explained with the help of tools using in stegenography and data hiding in file system structures technique. Software Clues on the Computer During investigation, the investigators should first look at files, documents, software applications, and other suspicious files for clues hidden through steganography. Steganography investigators should also know about common steganographic techniques, software, tools, terminologies, and …

Detecting Steganography Read More »

Understand-Steganalysis

Understand Steganalysis

Understand Steganalysis is the process of discovering the existence of the hidden information within a cover medium. Steganalysis is the reverse process of steganography. It is one of the attacks on information security in which an attacker, called steganalyst, tries to detect the hidden messages embedded in images, text, audio, and video carrier mediums using steganography. It determines the encoded hidden message, and if possible, it recovers that message. It can detect the message by …

Understand Steganalysis Read More »

Anti-Forensics-Techniques-Steganography

Anti-Forensics Techniques: Steganography

Anti-Forensics Techniques: Steganography, the art of hidden writing, has been in use for centuries. It involves embedding a hidden message in some transport or carrier medium and mathematicians, military personnel, and scientists have been using it. They all engage in changing the common language and transferring it through secret and hidden communication. The history of steganography dates back to the Egyptian civilization. Today, with the emergence of the Internet and multimedia, the use of steganography …

Anti-Forensics Techniques: Steganography Read More »

Password-Cracking-Tools

Password Cracking Tools

In this article explained Other Password Cracking Tools which are using password recovery application and tools for cracking password. 1. L0phtCrack Source:  http://www.l0phtcrack.com LOphtCrack is a password recovery or auditing application. It helps to recover lost Microsoft Windows passwords by using dictionary attacks, hybrid attacks, rainbow tables, and brute-force attacks. Features: Supports pre-computed password hashes Imports and cracks Unix password files Imports passwords from remote Windows, including 64-bit versions of Vista, Windows 7, and Unix …

Password Cracking Tools Read More »

ZIPRAR-Password-Recovery-Tool-Advanced-Archive-Password-Recovery

ZIP/RAR Password Recovery Tool: Advanced Archive Password Recovery

ZIP/RAR Password Recovery Tool:  Advanced Archive Password Recovery tool recovers protection passwords or unlocks encrypted ZIP and RAR archives created with all versions of popular archivers. The tool recovers passwords for plain and self-extracting archives created with PkZip, WinZip, RAR, and WinRAR automatically or with your assistance. Features: Supports all versions of ZIP/PKZip/WinZip, RAR/WinRAR, ARJ/WinARJ, and ACE/WinACE (1.x) Supports strong AES encryption found in WinRAR and the new versions of WinZip Exploits all known vulnerabilities …

ZIP/RAR Password Recovery Tool: Advanced Archive Password Recovery Read More »

Application-Password-Cracking-Tools

Application Password Cracking Tools

Application Password Cracking Tools in this article explained different types of application tools which are using in password cracking. The application including PDF, Word, Excel, PowerPoint presentation etc. 1. Passware Kit Forensic Source: http://www.lostpassword.com This complete electronic evidence discovery solution reports all password-protected items on a computer and gains access to these items using the fastest decryption and password recovery algorithms. Features: Recovers passwords for 200+ file types and decrypts hard disks providing an all-in-one …

Application Password Cracking Tools Read More »

System-Software-Password-Cracking

System Software Password Cracking

System software password cracking refers to the process of cracking the OS and all other utilities that enable a computer to function. The system creates passwords for the software to avoid access to system files and other secured information used during the booting of the system. Following are the ways by which one can access the system: Bypassing the BIOS password Using tools to reset the admin password 1. Bypassing BIOS Passwords Basic Input Output …

System Software Password Cracking Read More »

Understand-Microsoft-Authentication

Understand Microsoft Authentication

Understand Microsoft Authentication in this article When users log in to the Windows pc, a series of steps is performed for user authentication. The Windows OS authenticates its users with the help of 3 mechanisms (protocols) provided by the Microsoft. SAM database Windows uses the sam info to manage user accounts and passwords within the hashed format (one-way hash). The system doesn’t store the passwords in plaintext format however stores them in hashed format in …

Understand Microsoft Authentication Read More »

Password-Cracking-Techniques

Password Cracking Techniques

Password Cracking Techniques in this article explain different types of password cracking techniques and tools. There are three popular techniques for password cracking: Method 1: Dictionary Attacks In a dictionary attack, a dictionary file is loaded into the cracking application that runs against user accounts. A dictionary is a text file that contains a number of dictionary words or predetermined character combinations. The program uses every word present in the dictionary to find the password. …

Password Cracking Techniques Read More »