user

Anti-Forensics-Techniques-Steganography

Anti-Forensics Techniques: Steganography

Anti-Forensics Techniques: Steganography, the art of hidden writing, has been in use for centuries. It involves embedding a hidden message in some transport or carrier medium and mathematicians, military personnel, and scientists have been using it. They all engage in changing the common language and transferring it through secret and hidden communication. The history of steganography dates back to the Egyptian civilization. Today, with the emergence of the Internet and multimedia, the use of steganography …

Anti-Forensics Techniques: Steganography Read More »

Password-Cracking-Tools

Password Cracking Tools

In this article explained Other Password Cracking Tools which are using password recovery application and tools for cracking password. 1. L0phtCrack Source:  http://www.l0phtcrack.com LOphtCrack is a password recovery or auditing application. It helps to recover lost Microsoft Windows passwords by using dictionary attacks, hybrid attacks, rainbow tables, and brute-force attacks. Features: Supports pre-computed password hashes Imports and cracks Unix password files Imports passwords from remote Windows, including 64-bit versions of Vista, Windows 7, and Unix …

Password Cracking Tools Read More »

Application-Password-Cracking-Tools

Application Password Cracking Tools

Application Password Cracking Tools in this article explained different types of application tools which are using in password cracking. The application including PDF, Word, Excel, PowerPoint presentation etc. 1. Passware Kit Forensic Source: http://www.lostpassword.com This complete electronic evidence discovery solution reports all password-protected items on a computer and gains access to these items using the fastest decryption and password recovery algorithms. Features: Recovers passwords for 200+ file types and decrypts hard disks providing an all-in-one …

Application Password Cracking Tools Read More »

Understand-Microsoft-Authentication

Understand Microsoft Authentication

Understand Microsoft Authentication in this article When users log in to the Windows pc, a series of steps is performed for user authentication. The Windows OS authenticates its users with the help of 3 mechanisms (protocols) provided by the Microsoft. SAM database Windows uses the sam info to manage user accounts and passwords within the hashed format (one-way hash). The system doesn’t store the passwords in plaintext format however stores them in hashed format in …

Understand Microsoft Authentication Read More »

RAID-Storage-System

What is RAID Storage System?

Redundant Array of Independent Disks (RAID) may be a technology that uses multiple smaller disks simultaneously, which function as one large volume. It provides a specific method of accessing one or many separate hard disks, thereby decreasing the risk of losing all data if at all a hard disk fails or is susceptible to damages, and it also helps in improving access time. The RAID technology helps users to: Maintain a large amount of knowledge …

What is RAID Storage System? Read More »

Learn All About Linux File Systems

Learn All About Linux File Systems

In this blog explain Linux File System Architecture, File system Hierarchy atandard (FHS), Extended File System (EXT), Second Extended File System (EXT2), Second Extended File System (EXT2) (Cont’d), Second Extended File System (EXT2) (Cont’d) etc… Linux OS uses different file systems to store the data. As the investigators may encounter the attack source or victim systems to be running on Linux, they should have comprehensive knowledge regarding the storage methods it employs. The following section …

Learn All About Linux File Systems Read More »

An Overview of Encrypting File Systems (EFS)

An Overview of Encrypting File Systems | EFS

In this blog explain The Encrypting File System | EFS is a feature of the Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent. To protect files from mishandling and to ensure their security, the system should encrypt them. NTFS has Encrypting File System (EFS) as built-in feature. Encryption in file systems uses symmetric key encryption technology …

An Overview of Encrypting File Systems | EFS Read More »

Booting-Process

What is the Booting Process?

Booting is the process of starting or resetting the computer when the user turns the system on. The process includes getting both the hardware and software ready and running. The booting process is of two types: Cold booting: The process happening when we first turn on the computer. Also called as hard boot, this happens when user completely cuts the power supply to the system. Warm booting is the process happening when we reset the …

What is the Booting Process? Read More »