Windows Timeline: Putting the what & when together
One of the most critical factors that determine the success and efficacy of a digital forensic investigation is putting together the right temporal analysis of […]
One of the most critical factors that determine the success and efficacy of a digital forensic investigation is putting together the right temporal analysis of […]
Prologue In the previous blogpost, we reverse engineered a binary and extracted the password from within it. This binary however contained a plaintext password. This […]
As you might already be aware that ARM powers a variety of low-powered devices around us, including but not limited to, phones, routers, IoT devices, […]
Prologue In the previous blog here, we reverse engineered a simple binary containing plaintext password in Linux with the help of GNU Debugger (GDB). In […]
Prologue The main focus of this blog is to give a push start to the beginners to get in the field of reverse engineering. Since […]
Scope: This article demonstrates logging techniques in MySQL to uncover and analyze any mischief attempts done by (outside or inside) user focusing on specific areas […]