Challenges in Digital Forensics Investigations into Mobile Phones Running iOS and Android Operating Systems In the digital age, mobile phones serve as crucial sources of evidence in digital forensic investigations.…
How you can protect yourself from being hacked-Cyber Security Guide
How To Protect Yourself From Being Hacked? First of all, you must know how hackers get to you in the first place. To stay safe and protected from malicious hacks,…
How can a digital forensic specialist help you with a hacking investigation?
Digital forensics, Incident Response and Hacking investigation With the relentless continuing digitisation of our lives and vast availability of digital devices and smart appliances at home and in the office,…
How We Can Help You If You Have Been Hacked
As a business or private computer or mobile device user, it is quite a shock to discover that your computer or mobile phone has been hacked. This can compromise your…
What should the client expect when engaging a computer forensic expert to investigate a computer hack?
Some computer forensics examinations are aimed to help experts investigate hacking attempts of computers, mobile phones and other digital devices with an operating system. In Microsoft Windows-based computers for example,…
How To Hack Any Social Media Account with ShellPhish and ShellPhish+
DISCLAIMER: The author and the publishing website (Computer Forensics Lab) assume no responsibility for any misuse or damage caused by Shellphish. This is republished here for educational purposes and pen…
The Worst Mistakes in iOS Forensics
What can possibly go wrong with that iPhone? I’ll have a look (oh, it’s locked!), then switch it off, eject the SIM card and pass it on to the expert.…
Open Source Intelligence (OSINT), Part 2: Using recon-ng to Identify the Same Profile across Multiple Sites
Welcome back, my aspiring cyber warriors! The Internet is the largest data repository the world has ever known! Open Source Intelligence or OSINT is the way to gather and unlock…
NAXSI – An Open-Source, High Performance, Low Rules Maintenance WAF For NGINX
NAXSI means Nginx Anti XSS & SQL Injection . Technically, it is a third party nginx module, available as a package for many UNIX-like platforms. This module, by default, reads…
Osmedeus – Fully Automated Offensive Security Tool For Reconnaissance And Vulnerability Scanning
Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. How to use If you have no idea what are you doing…
Parrot Security 4.6 – Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind
After 3 months of heavy development Parrot 4.6 is officially released. How to update Update your existing Parrot system with the following command: sudo parrot-upgrade System Changes (Appearance) The desktop-base…
Twint – An Advanced Twitter Scraping And OSINT Tool
Formerly known as Tweep, Twint is an advanced Twitter scraping tool written in Python that allows for scraping Tweets from Twitter profiles without using Twitter’s API. Twint utilizes Twitter’s search…
Kali Linux 2019.2 Release – Penetration Testing and Ethical Hacking Linux Distribution
This release brings the kernel up to version 4.19.28, fixes numerous bugs, includes many updated packages, and most excitingly, features a new release of Kali Linux NetHunter! Kali NetHunter 2019.2…
Sn1per v7.0 – Automated Pentest Framework For Offensive Security Experts
Sn1per Community Edition is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. Sn1per Professional is Xero Security’s premium reporting addon for…
Acunetix Vulnerability Scanner Now With Network Security Scans
User-friendly and competitively priced, Acunetix leads the market in automatic web security testing technology. Its industry-leading crawler fully supports HTML5, JavaScript, and AJAX-heavy websites, enabling the auditing of complex, authenticated…
Trigmap – A Wrapper For Nmap To Automate The Pentest
Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect informations into a well organized directory hierarchy. The use of Nmap…