toolkit

domain

Gerard, a did gruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attack and bring down its reputation in the market . To launch the attack process, he performed DNS footprinting to gather information about DNS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names, IP addresses, DNS records, and network Whois records. He further exploited this information to launch other sophisticated attack. What is the tool employed by Gerard in the above scenario?

Gerard, a did gruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attack and bring down its reputation in the market . To launch the attack process, he performed DNS footprinting to gather information about DNS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names, IP addresses, DNS records, and network …

Gerard, a did gruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attack and bring down its reputation in the market . To launch the attack process, he performed DNS footprinting to gather information about DNS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names, IP addresses, DNS records, and network Whois records. He further exploited this information to launch other sophisticated attack. What is the tool employed by Gerard in the above scenario? Read More »

E-Mail Forensic Tools

E-Mail Forensic Tools

There are many email forensic tools which can assist within the study of source and content of e-mail message so that an attack or the malicious intent of the intrusions could also be investigated. These tools while providing easy to use browser format, automated reports, and other features, help to spot the origin and destination of the message, trace the trail traversed by the message; identify spam and phishing networks, etc. This section introduces a …

E-Mail Forensic Tools Read More »

Live-data-acquisition

Live Data Acquisition

Live Data Acquisition is the process of extracting volatile information present in the registries, cache, and RAM of digital devices through its normal interface. The volatile information is dynamic in nature and changes with time, therefore, the investigators should collect the data in real time. Simple actions such as looking through the files on a running computer or booting up the computer have the potential to destroy or modify the available evidence data, as it …

Live Data Acquisition Read More »

Building-a-Forensics-Workstation

Building a Forensics Workstation

Define the computer forensics approach clearly before Building a Forensics Workstation. For developing a forensics laboratory, the total estimated cost incurred to meet the accreditation standards of a standardized body that certifies labs will be the deciding factor for fund allocation. Funding is important in order for a successful implementation of the computer forensics lab. Calculate the yearly budget allocation for a forensics lab, based on the previous year’s statistics as well as estimated trends …

Building a Forensics Workstation Read More »