How To Protect Yourself From Being Hacked? First of all, you must know how hackers get to you in the first place. To stay safe and protected from malicious hacks,…
How can a digital forensic specialist help you with a hacking investigation?
Digital forensics, Incident Response and Hacking investigation With the relentless continuing digitisation of our lives and vast availability of digital devices and smart appliances at home and in the office,…
How We Can Help You If You Have Been Hacked
As a business or private computer or mobile device user, it is quite a shock to discover that your computer or mobile phone has been hacked. This can compromise your…
What should the client expect when engaging a computer forensic expert to investigate a computer hack?
Some computer forensics examinations are aimed to help experts investigate hacking attempts of computers, mobile phones and other digital devices with an operating system. In Microsoft Windows-based computers for example,…
How To Hack Any Social Media Account with ShellPhish and ShellPhish+
DISCLAIMER: The author and the publishing website (Computer Forensics Lab) assume no responsibility for any misuse or damage caused by Shellphish. This is republished here for educational purposes ONLY. Inthis…
A Comprehensive Guide on Securing Your System, Archives and Documents
How can you make your system and documents secure? Today, 256-bit AES encryption is offered by everyone and their dog. However, AES encryption does not mean much (or anything at…
The Worst Mistakes in iOS Forensics
What can possibly go wrong with that iPhone? I’ll have a look (oh, it’s locked!), then switch it off, eject the SIM card and pass it on to the expert.…
Open Source Intelligence (OSINT), Part 2: Using recon-ng to Identify the Same Profile across Multiple Sites
Welcome back, my aspiring cyber warriors! The Internet is the largest data repository the world has ever known! Open Source Intelligence or OSINT is the way to gather and unlock…
Shellphish – Phishing Tool For 18 Social Media (Instagram, Facebook, Snapchat, Github, Twitter…)
Phishing Tool for 18 social media: Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, WordPress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest. This script uses some webpages generated by…
NAXSI – An Open-Source, High Performance, Low Rules Maintenance WAF For NGINX
NAXSI means Nginx Anti XSS & SQL Injection . Technically, it is a third party nginx module, available as a package for many UNIX-like platforms. This module, by default, reads…