tool

Understand-Steganalysis

Understand Steganalysis

Understand Steganalysis is the process of discovering the existence of the hidden information within a cover medium. Steganalysis is the reverse process of steganography. It is one of the attacks on information security in which an attacker, called steganalyst, tries to detect the hidden messages embedded in images, text, audio, and video carrier mediums using steganography. It determines the encoded hidden message, and if possible, it recovers that message. It can detect the message by …

Understand Steganalysis Read More »

Password-Cracking-Tools

Password Cracking Tools

In this article explained Other Password Cracking Tools which are using password recovery application and tools for cracking password. 1. L0phtCrack Source:  http://www.l0phtcrack.com LOphtCrack is a password recovery or auditing application. It helps to recover lost Microsoft Windows passwords by using dictionary attacks, hybrid attacks, rainbow tables, and brute-force attacks. Features: Supports pre-computed password hashes Imports and cracks Unix password files Imports passwords from remote Windows, including 64-bit versions of Vista, Windows 7, and Unix …

Password Cracking Tools Read More »

ZIPRAR-Password-Recovery-Tool-Advanced-Archive-Password-Recovery

ZIP/RAR Password Recovery Tool: Advanced Archive Password Recovery

ZIP/RAR Password Recovery Tool:  Advanced Archive Password Recovery tool recovers protection passwords or unlocks encrypted ZIP and RAR archives created with all versions of popular archivers. The tool recovers passwords for plain and self-extracting archives created with PkZip, WinZip, RAR, and WinRAR automatically or with your assistance. Features: Supports all versions of ZIP/PKZip/WinZip, RAR/WinRAR, ARJ/WinARJ, and ACE/WinACE (1.x) Supports strong AES encryption found in WinRAR and the new versions of WinZip Exploits all known vulnerabilities …

ZIP/RAR Password Recovery Tool: Advanced Archive Password Recovery Read More »

Understand-File-Recovery-in-Mac-OS-X-MAC-and-Linux

Understand File Recovery in Mac OS X, MAC and Linux

Understand File Recovery in Mac OS X, MAC and Linux in this article explain Mac OS X, MAC and Linux file recovery methods and tools. In Mac OS X, data deletion can be possible due to the following reasons: Emptying the Mac Trash folder Using the Shift+Del keys Corruption in a hard drive Virus or Trojan Infection Unexpected system shutdown Software or hardware malfunction Recovering deleted files in Mac OS X has three methods: 1. …

Understand File Recovery in Mac OS X, MAC and Linux Read More »

Data-Acquisition-and-Duplication-Tools-Software

Data Acquisition and Duplication Tools: Software

Data Acquisition and Duplication Tools: Software in this article explain different types of software which is using in data acquision and duplication data tool. EnCase Forensic Source: https://www.guidancesoftware.com EnCase is a popular multi-purpose forensic platform which includes many useful tools to support several areas of the digital forensic process. This tool can collect a lot of data from many devices and extracts potential evidence. It also generates an evidence report. EnCase Forensic can help investigators …

Data Acquisition and Duplication Tools: Software Read More »

Data-Acquisition-Methods

Data Acquisition Methods

Data Acquisition Methods in this article explain which of the method using on data acquition and also explain those method which is continuously using in forensic investigation. There are following four methods available for data acquisition: 1. Bit-stream disk-to-image file Forensic investigators commonly use this data acquisition method. It is a flexible method, which allows creation of one or more copies, or bit-for-bit repkations of the suspect drive. ProDiscover, EnCase, FTK, The Sleuth Kit, X-Ways …

Data Acquisition Methods Read More »

Identifying-GUID-Partition-Table-(GPT)

Identifying GUID Partition Table (GPT)

Identifying GUID Partition Table (GPT) in this GPT header will help an investigator analyze the layout of the disk including the locations of the partition table, partition area, and backup copies of the header and partition table. Investigators can use cmdlets given below in Windows PowerShell to identify the presence of GPT: Get-GPT Get-GPT command helps investigator to analyze the GUID Partition Table data structure of the hard disk. It requires the use of the …

Identifying GUID Partition Table (GPT) Read More »

Foot-printing-tools

Foot printing tools

Attackers are aided in foot printing with the help of various tools. Many organizations offer that make information gathering an easy task. This section describe stools intended for obtaining information from various sources. Foot printing tools are used to collect basic information about the target systems in order to Exploit them. Information collected by the foot printing tools contain target’s IP location information, routing information, business information, address, phone number and social security number, details …

Foot printing tools Read More »