Brief introduction to digital forensics investigations and what digital forensic investigators actually do Digital forensic investigators investigate and reconstruct cybersecurity incidents, suspicious events by collecting, analysing and preserving digital evidence…
Computer forensics services and what computer forensics experts can do for you
What do computer forensic experts do? Computer Forensics Lab experts identify, discover, recover and analyse digital evidence from all types digital devices such as computers, networks, mobiles phones, hard drives,…
What should the client expect when engaging a computer forensic expert to investigate a computer hack?
Some computer forensics examinations are aimed to help experts investigate hacking attempts of computers, mobile phones and other digital devices with an operating system. In Microsoft Windows-based computers for example,…
How To Hack Any Social Media Account with ShellPhish and ShellPhish+
DISCLAIMER: The author and the publishing website (Computer Forensics Lab) assume no responsibility for any misuse or damage caused by Shellphish. This is republished here for educational purposes and pen…
The Worst Mistakes in iOS Forensics
What can possibly go wrong with that iPhone? I’ll have a look (oh, it’s locked!), then switch it off, eject the SIM card and pass it on to the expert.…
Open Source Intelligence (OSINT), Part 2: Using recon-ng to Identify the Same Profile across Multiple Sites
Welcome back, my aspiring cyber warriors! The Internet is the largest data repository the world has ever known! Open Source Intelligence or OSINT is the way to gather and unlock…
NAXSI – An Open-Source, High Performance, Low Rules Maintenance WAF For NGINX
NAXSI means Nginx Anti XSS & SQL Injection . Technically, it is a third party nginx module, available as a package for many UNIX-like platforms. This module, by default, reads…
Osmedeus – Fully Automated Offensive Security Tool For Reconnaissance And Vulnerability Scanning
Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. How to use If you have no idea what are you doing…
Parrot Security 4.6 – Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind
After 3 months of heavy development Parrot 4.6 is officially released. How to update Update your existing Parrot system with the following command: sudo parrot-upgrade System Changes (Appearance) The desktop-base…
Twint – An Advanced Twitter Scraping And OSINT Tool
Formerly known as Tweep, Twint is an advanced Twitter scraping tool written in Python that allows for scraping Tweets from Twitter profiles without using Twitter’s API. Twint utilizes Twitter’s search…