Pages

Categories

Category: Forensics

DFIR – Hack The Box – FlagCasino

Hack the box provides a collection of Capture The Flag (CTF) style challenges focused on cyber security, digital forensics, and incident response. The objective is to obtain the flag, typically a small message/password, as proof you were able to complete the challenge. Challenge: FlagCasino FlagCasino is a reverse engineering...

Drone’s Encrypted Flight Logs

This blog post is to act as a basic guide on how to decompile APK’s to locate decryption keys. Specific focus will be on the Yuneec’s flight log data. Some of my research has been reduced to it’s key points, or stripped out entirely where it had lead to...

CSV – SQLite Extraction and Conversion

This is a follow-up post from Parsing CSV (siː ɛs viː) to show examples on how to write data with python into a CSV formatted file. There will be some references made to the previous post, so be sure to take a glance there first. Python and its CSV...

Parsing CSV (siː ɛs viː) and Avoiding Pitfalls

Comma Seperated Values (CSV) is a format used to store data within a file in the form of rows and columns for data exchange. This post is to show some of the nuances when dealing with CSV files. The principle is very simple, but let us define the components...

Physical Components of the Hard Disk Drive

2014 10.25 Physical Components of the Hard Disk Drive Category: Uncategorized / Tags: no tag / Add Comment The hard disk drive provides a means of storing data persistently within a computer system; In computer forensics this would be called non-volatile memory. By abusing the techniques used to store...

Modes of Committing a Computer Crime

2014 10.14 Modes of Committing a Computer Crime Category: Computer Forensic Investigation / Tags: no tag / Add Comment In computer forensic investigation there are varying modes to committing a crime. New technology will create new crimes that we have never before imagined. The computer could be the object...

Computer Forensic Investigation – Phases of a Crime

2014 10.13 Computer Forensic Investigation – Phases of a Crime Category: Computer Forensic Investigation / Tags: no tag / Add Comment Network enumeration – Research the target. Vulnerability analysis – Detect how to attack the target. Exploitation – Compromise the system. A Standard Intrusion Scenario Reconnaissance – Network enumeration...