Identifying Security Flaws With Code Analysis Tool (CAT.NET)
Code Analysis Tool (CAT.NET) is a binary source code analysis tool that helps in identifying common security flaws in managed […]
Code Analysis Tool (CAT.NET) is a binary source code analysis tool that helps in identifying common security flaws in managed […]
For my research, I chose to analyze a popular Android application for malwares. But why select a Russian version? Well, […]
Scope: This article demonstrates logging techniques in MySQL to uncover and analyze any mischief attempts done by (outside or inside) […]
Hi all, This month’s reading list. Make sure to check out the tools sections. Traditional Pen-testing is Dead: A frank look […]
Hi all, We are starting with a monthly reading-list for people who are unable to keep up with the latest […]
A recent dive into challenges faced from privacy compliance requirements unearthed an interesting patent. The unearthing of this new patent on the block came from the need of anonymizing data for several reasons including compliance (PCI DSS, German Data Privacy Law [BDSG], UK Data Privacy Act).
From forensics point of view, investigating “which user did what on the application/server that lead to its compromise” is of the most importance. Similar scenario applies to Email investigation. It’s quite simple now to find out the IP Address of the person who is sending out fishy or threatening emails to the victim(s).
by Nikhil Wagholikar, NII Consulting 1. Need Many a time during Forensics investigation or during Reverse Engineering, we come across […]
by Chetan Gupta, NII Consulting Many a times as an investigator, I have to deal with the issue of carving […]
By Chetan Gupta, NII Consulting In accordance with NII’s mantra of innovation and research, we have developed our own tool […]