Rainbow Tables Simplified (Password Cracking for Windows)
By Bhushan Shah, NII Consulting Windows passwords are stored in the registry (encrypted) in the form of a hash. LMHash was the first hash function […]
By Bhushan Shah, NII Consulting Windows passwords are stored in the registry (encrypted) in the form of a hash. LMHash was the first hash function […]
By Kush Wadhwa, NII Consulting Welcome to the world of log analysis. Log analysis plays a crucial role in intrusion detection. If the compromised system […]
Penetration Testing Fyodor’s back with his top 100 security tools for 2006. One of the most significant, but not surprising, entries is that of Metasploit […]
by Chetan Gupta, NII Consulting A small experiment…Create a new text file. Edit it using Notepad and type “Hello” in it. save and exit the […]
by Chetan Gupta, NII Consulting I was looking for a utility which allows me to remotely access running processes’ list of a suspect machine running […]
by Chetan Gupta, NII Consulting Windows XP has a built-in feature – UserAssist, that acts as a monitoring tool and greatly aids in the forensic […]
by Chetan Gupta, NII Consulting How many times in an investigation does a forensic investigator come across the problem of acquiring data from a suspect’s […]
by Khushbu Jithra, NII Consulting The expertise involved in a forensic investigation is best showcased through the documentation of the evidence and the recording of […]
By K. K. Mookhey, NII Consulting The Information Technology Act 2000 is India’s only act dealing with computer crime. For companies doing business in India, […]
by Saurabh Ghelani, NII Consulting In computer forensics a suspect’s chargesheet is as good as the Chain of Custody log. It is the documented version […]