server

port

What is the port to block first in case you are suspicious that an IoT device has been compromised?

What is the port to block first in case you are suspicious that an IoT device has been compromised? Option 1 : 443 Option 2 : 22 Option 3 : 80 Option 4 : 48101 1. 443 You can perceive Port 443 as an online browsing port wont to secure browser communication or HTTPS services. It will offer coding and transport over secure ports. Thus, the information you transfer across such connections are extremely proof …

What is the port to block first in case you are suspicious that an IoT device has been compromised? Read More »

commands

Which of the following commands checks for valid users on an SMTP server?

Which of the following commands checks for valid users on an SMTP server? Option 1 : RCPT Option 2 : CHK Option 3 : VRFY Option 4 : EXPN 1. RCPT The RCPT Commands you tell the mail server who the recipient of your message is by using the RCPT command. you’ll send quite one RCPT command for multiple recipients. The server will respond with a code of 250 to every command. The syntax for …

Which of the following commands checks for valid users on an SMTP server? Read More »

Virtualization overview (1)

Virtualization Overview on Incident Response and Handling

Despite being an idea that was born fifty years ago, virtualization has advanced and may satisfy complex applications currently being developed. half all servers run on Virtual Machines (VMs), and therefore the IDC predicts that on the brink of 70% of entire computer workloads will run on VMs by 2024. As virtualization components increase and therefore the virtualized environment expands, the most concern becomes the way to maintain safe levels of security and integrity of …

Virtualization Overview on Incident Response and Handling Read More »

E-Mail Forensic Investigation Techniques

E-Mail Forensic Investigation Techniques

E-mail forensics refers to the study of source and content of e-mail as evidence to spot the actual sender and recipient of a message, data/time of transmission, detailed record of e-mail transaction, intent of the sender, etc. This study involves investigation of metadata, keyword searching, port scanning, etc. for authorship attribution and identification of e-mail scams. Various approaches that are used for e-mail forensic are described in and are briefly defined below: 5.1. Header Analysis …

E-Mail Forensic Investigation Techniques Read More »

Determine-the-Database-Evidence-Repositories-and-collect-the-evidence-files

Determine the Database Evidence Repositories & Collect the Evidence files

Determine the Database Evidence Repositories & collect the evidence files in this Sources that provide the valuable information are at times overlooked by the investigators. For instance, in intellectual property cases, databases containing finance related data are the prime targets for attackers to damage databases. In such case, source code repositories, knowledge management systems, and document management systems may provide better insights to the investigator to a suspected breach. Thus, investigators will be able to …

Determine the Database Evidence Repositories & Collect the Evidence files Read More »

Different-Types-of-Web-Log-Analyzer

Different Types of Web Log Analyzer

In this article explain Different Types of Web Log Analyzer which is used in forensic investigation. 1. Deep Log Analyzer The Deep Log Analyzer is a web analytics solution for small and medium size websites. It analyzes web site visitors’ behavior and gets the complete website usage statistics in easy steps. Features: It provides website statistics and web analytics reports presentation with interactive navigation and hierarchical view It analyzes logs from popular web servers, such …

Different Types of Web Log Analyzer Read More »

Investigate-various-Attack-on-Web-Application

Investigate various Attack on Web Application

Investigate various Attack on Web Application in this article explain different types of web application attack which is investigate through forensic investigator . 1. Investigating Cross-Site Scripting (XSS) Attack In XSS attack or Cross Site Scripting attack, the attacker exploits the vulnerability in the web by injecting malicious script, mostly Javascript, HTML OF CSS markup in the web pages that is displayed in the user browser. This takes place when the user clicks on the …

Investigate various Attack on Web Application Read More »

What-is-Apache-web-server-Architecture-in-Forensic-Investigation

What is Apache web server Architecture in Forensic Investigation?

Apache web server Architecture in Forensic Investigation in this the apache web server comprises of a modular approach. It consists of two major components, the Apache Core and the Apache Modules. The Apache Core deals with basic functionalities of the server, such as allocating the requests, maintaining and pooling the connections, etc., while the Apache Modules, which are simply add-ores (used for extending the core functionality of the server), looks after other functions, such as …

What is Apache web server Architecture in Forensic Investigation? Read More »

Understand-IIS-Web-Server-Architecture-in-Forensic-Investigation

Understand IIS Web Server Architecture in Forensic Investigation

Understand IIS Web Server Architecture in Forensic Investigation in this article Internet Information Server ON, a Microsoft-developed application, is a Visual Basic code application that lives on a Web server and responds to requests from the browser. It supports HTTP, HTTPS, FTP, FITS, SMTP, and NNTP. An IIS application uses HTML to present its user interface and uses compiled Visual Basic code to process the requests and respond to events in the browser. IIS for …

Understand IIS Web Server Architecture in Forensic Investigation Read More »