Digital forensics

Incident Response and Forensic Martial Arts with Helix

Helix3 is a live CD for doing computer forensic investigation and incident response. It is built on top of Ubuntu and comes in both free and commercial forms

Windows Communication Foundation

Part-1 Abstract [pkadzone zone="main_top"] Over the year, we have learned innumerable ways of consuming services across the network such as Remoting, COM, CO

SANS Investigate Forensics Toolkit – Forensics Martial Arts Part 2

This is a continuation of the first article on SANS Investigate Forensics Toolkit. In this article we will be covering the rest of the tools discussed earlie

SANS investigate forensics toolkit—Forensics martial arts part 1

The SANS Investigate Forensic Toolkit (SIFT) is an interesting tool created by the SANS Forensic Team and is available publicly and freely for the whole comm

Android forensics: Cracking the pattern lock protection

In this paper I'll show you how to find an Android's user pattern lock. I assume that the technique that I'll demonstrate can work only on a rooted device. A

Geocoding Router Log Data

Any good piece of malware eventually has to phone home. What good is collecting your dirty little secrets if it can't capitalize on them? This article will h

Programming with COM

Abstract This article commences by taking a brief backward glimpse at COM then compares it with the way that components interact in .NET, and finally it tak

The ZeroAccess Botnet Revealed

There has been a large spread of Botnet-related threats in the web world recently. Now when we talk about botnets, it is basically a collection of code linke

Cracking the Maze of Advanced Persistent Threats!

Advanced Persistent Threats, as the name suggests, are advanced, persistent and deadly in their nature. The ghost of APTs can affect any organization at any

.NET Reflection

Abstract Assemblies are the core units of deployment. At design time, we can examine the set of reference assemblies in CIL code with couple of external tool