Luke Sandersblackcoat.co.uk·Mar 11, 2024EXT (extended file system)EXT EXT is a family of file systems used in mainly linux that are named ext2, ext3 and ext4 with ext4 being the latest and the one most used today. Ext takes its design from UFS (universal file system) which was designed to be fast and used with smal...DiscussExtended file system
Luke Sandersblackcoat.co.uk·Mar 4, 2024FAT (file allocation Table)FAT (file allocation table) The file allocation table (FAT) file system was originally developed in 1977 for use on floppy disks and the windows 9x operating systems. However, it is still in use today in removable storage devices like usbs this is be...Discussfile allocation table
Luke Sandersblackcoat.co.uk·Feb 28, 2024MFT (Master File Table)MFT General A feature of NTFS that sets it apart from other file systems is that the entire file system is considered data area which means that any sector can be allocated to a file.The only layout an NTFS file system has is that the first sectors o...DiscussMaster File Table
Herschel Menezeshmenezes.hashnode.dev·Feb 9, 2024FTK ImagerIntroduction FTK Imager, an important tool in digital forensics developed by AccessData, operates similar to a meticulously preserved time capsule for the digital space. It stands out for its comprehensive approach to capture and preserve the state o...Discuss·207 readsWeMakeDevs
Behouba Manassébehouba.hashnode.dev·Jan 28, 2024Memory Forensics analysis of container checkpoints with checkpointctlIntroduction In the field of computer science, forensic analysis, also known as computer forensics, is a specialized domain that focuses on the extraction of evidence from electronic devices and digital data. Forensic analysis goals are to identify, ...Discuss·380 readsCRIU
Ar3musar3mus.hashnode.dev·Dec 26, 2023SECPlayground Christmas CTF 2023Well met!! Everyone This is the first write-up that I have written in English Language :P In this blog, I write up only challenges that I can get the flag. SECPlayground had a CTF Event at every Festival and I really liked it :) flag format : encry...Discuss·1 like·241 readsSECPlayground
Carlos Armando Marcano Vargascarlosmv.hashnode.dev·Dec 9, 20234 Open Source Packet Analyzers To ExploreRecently I started a course about cybersecurity and honestly, I find the topic very interesting. One of the modules of the course talks about packet analyzers to inspect the traffic in a network. So, I started to look for the most used Packet Analyze...Discuss·68 reads#cybersecurity
K Willd4nsix.com·Aug 16, 2023Welcome to D4NSIXHello and Welcome to D4NSIX! Created this blog to help inform average Janes & Joes (and educate up-and-coming cyber professionals) on the world of CYBER. Long story short I have been indoctrinated into the cyber realm, helping understand the hackers ...Discuss·1 like·174 readsforensics
Panic Threadspanicthread.hashnode.dev·Jul 19, 2023Marshal In the Middle - Hack The Box Write-Up“The security team was alerted to suspicious network activity from a production web server. Can you determine if any data was stolen and what it was?” Let's have a look at the files, we can see that we have one folder called “bro”. You may think that...Discuss·69 reads#HackTheBox
Raphael J. Olowolivingtech.hashnode.dev·Feb 23, 2023How to Testify as an Expert Witness in Courts of Law - Useful Tips!In this article I will provide some tips that forensic investigators or cybersecurity professionals may find useful if ever called upon to testify as an expert witness in a court of law. These tips are based on my personal experience and knowledge as...Discuss·1 like·71 readsforensics