Computer Hacking Forensic Investigator

Anti-Forensics-Techniques-Rootkits

Anti-Forensics Techniques: Rootkits

Rootkits are one of the anti-forensic techniques that attackers use to hide data, malicious files, and processes. This software is intended to hide processes that could reveal an attack from the OS itself. Rootkits allow viruses and malware to “hide in plain sight” by concealing files in ways that antivirus software might overlook them, disguising files as legitimate system files, through unlinking processes, and even hiding from detection by the OS, Rootkits themselves are not …

Anti-Forensics Techniques: Rootkits Read More »

Anti-Forensics-Techniques-Trail-Obfuscation

Anti-Forensics Techniques: Trail Obfuscation, Artifact Wiping, Encryption, Encrypted Network Protocols and Program Packers

In this article Anti-Forensics Techniques has been explained with its different topic like Trail Obfuscation, Artifact Wiping, Encryption and Program Packers this techniques etc. 1. Anti-Forensics Techniques: Trail Obfuscation Anti-Forensics Techniques Trail Obfuscation is one of the anti-forensic technique that attackers use to mislead, divert, complicate, disorient, sidetrack, and/or distract the forensic examination process. The process involves different techniques and tools, such as Log cleaners Spoofing Misinformation Backbone hopping Zombie accounts Trojan commands In this …

Anti-Forensics Techniques: Trail Obfuscation, Artifact Wiping, Encryption, Encrypted Network Protocols and Program Packers Read More »

Anti-Forensics-Techniques-Steganography

Anti-Forensics Techniques: Steganography

Anti-Forensics Techniques: Steganography, the art of hidden writing, has been in use for centuries. It involves embedding a hidden message in some transport or carrier medium and mathematicians, military personnel, and scientists have been using it. They all engage in changing the common language and transferring it through secret and hidden communication. The history of steganography dates back to the Egyptian civilization. Today, with the emergence of the Internet and multimedia, the use of steganography …

Anti-Forensics Techniques: Steganography Read More »

Password-Cracking-Tools

Password Cracking Tools

In this article explained Other Password Cracking Tools which are using password recovery application and tools for cracking password. 1. L0phtCrack Source:  http://www.l0phtcrack.com LOphtCrack is a password recovery or auditing application. It helps to recover lost Microsoft Windows passwords by using dictionary attacks, hybrid attacks, rainbow tables, and brute-force attacks. Features: Supports pre-computed password hashes Imports and cracks Unix password files Imports passwords from remote Windows, including 64-bit versions of Vista, Windows 7, and Unix …

Password Cracking Tools Read More »

Application-Password-Cracking-Tools

Application Password Cracking Tools

Application Password Cracking Tools in this article explained different types of application tools which are using in password cracking. The application including PDF, Word, Excel, PowerPoint presentation etc. 1. Passware Kit Forensic Source: http://www.lostpassword.com This complete electronic evidence discovery solution reports all password-protected items on a computer and gains access to these items using the fastest decryption and password recovery algorithms. Features: Recovers passwords for 200+ file types and decrypts hard disks providing an all-in-one …

Application Password Cracking Tools Read More »

Understand-Microsoft-Authentication

Understand Microsoft Authentication

Understand Microsoft Authentication in this article When users log in to the Windows pc, a series of steps is performed for user authentication. The Windows OS authenticates its users with the help of 3 mechanisms (protocols) provided by the Microsoft. SAM database Windows uses the sam info to manage user accounts and passwords within the hashed format (one-way hash). The system doesn’t store the passwords in plaintext format however stores them in hashed format in …

Understand Microsoft Authentication Read More »

Anti-Forensics-Techniques-Password-Protection

Anti-Forensics Techniques: Password Protection

Anti-Forensics Techniques: Password Protection in this A password refers to collection of words, letters, numbers, and/or special characters used for security processes such as user authentication or to grant access to a resource. The password ensures that unauthorized users do not access the computer, network resources, or other secured information. In addition, data files and programs may require a password. Password protection shields information, protects networks, applications, files, documents, etc., from unauthorized users. Many organizations …

Anti-Forensics Techniques: Password Protection Read More »

Recovering-Deleted-Partitions

Recovering Deleted Partitions

Recovering Deleted Partitions in this article explain how to recover delete partition and which of the tools using in it. What happens when deleting a partition? When a user deletes a partition from a hard disk drive, two things are possible: All data will be lost on that deleted partition or logical drive. In the case of a dynamic disk, deleting a partition can delete all the dynamic volumes on the disk, leaving the disk …

Recovering Deleted Partitions Read More »

Understand-File-Recovery-in-Mac-OS-X-MAC-and-Linux

Understand File Recovery in Mac OS X, MAC and Linux

Understand File Recovery in Mac OS X, MAC and Linux in this article explain Mac OS X, MAC and Linux file recovery methods and tools. In Mac OS X, data deletion can be possible due to the following reasons: Emptying the Mac Trash folder Using the Shift+Del keys Corruption in a hard drive Virus or Trojan Infection Unexpected system shutdown Software or hardware malfunction Recovering deleted files in Mac OS X has three methods: 1. …

Understand File Recovery in Mac OS X, MAC and Linux Read More »

File-Recovery-Tools-Windows

File Recovery Tools: Windows

File Recovery Tools: Windows in this article explain different types of tools which are using in file recovery of windows. 1. Recover My Files Source: http://www.recovermyfiles.com Recover My Files data recovery software recovers deleted files emptied from the Windows Recycle Bin and files lost due to the format or corruption of a hard drive, virus or Trojan infection, and unexpected system shutdown or software failure. Features: Recovers files albeit emptied from the Recycle Bin data …

File Recovery Tools: Windows Read More »