Monday, February 8, 2016

Webmail Forensics: Collecting & Analyzing Artifacts

Almost everyone uses at least one or more web-based email client account for communication with one user to another. Increased usage of web based email client leads to the rise in the cybercrime rate drastically involving cases that require forensic email analysis of the webmail account. It is observed that introduction of virtual way of communication provided by internet has made our life lot easier and less complex by taking us to new level of effectiveness, productivity & connectivity.



Saturday, January 16, 2016

Browser History Forensics

People are aware of multiple web browsers that are being used almost every day on the World Wide Web to retrieve information, mail purpose, social networking, official works etc. Some common web browsers like Google Chrome, Mozilla Firefox, Internet Explorer, etc. are used daily by millions of people all over the world. Internet users use browsers on their mobile phones or laptops as well that contacts and requests information from the web server. The web server sends back the information back to the web browser and these database assist investigators in browser history forensics.


Wednesday, December 23, 2015

Rackspace Cloud Forensics: The Challenges

Rackspace is one of the most popular cloud computing and hosting company. The main motive of Rackspace is to save customer’s time; money and worry of managing their own IT infrastructure. It has two service types - Managed (on-demand services are provided and user can contact Rackspace whenever needed) and Intensive (active services with additional consultations about their server configuration). Both the services are received through email, phone, live chat etc. Majority of Rackspace customers are cloud customers. The user of Rackspace gets the service by giving payment on monthly basis and they may demand more as per their requirement with extra charges.



Sunday, November 8, 2015

Get To Know the Windows 10 Bugs and Issues That Need To Be Fixed

With its successful launch on 29th July, 2015, Windows 10 has bagged over 75 million installations in its first month. But what was assumed to be a glitch-free software, turned out to be filled with a number of bugs. Microsoft acknowledges these bugs and has already released several automatic software. 


This article is mainly about all those bugs, which have been discovered and confirmed by Microsoft itself. These are not common bugs like crashing, freezing, etc., but bugs that are realistic. 

Saturday, September 5, 2015

Android SQLite Database Forensics: A Tip to Digital Archeology

Mobile forensics is one of the fastest growing digital forensics discipline. This is due to the rapid growth in the usage of mobile phones by the people. One of the most significant breakthrough in the development of mobile phone industry is the emergence of android smartphones.

Wednesday, August 12, 2015

Carving Out Opera Browser Forensics

With the coming up of Internet era, the way of finding information has become much easier. There are many web browsers available in the way for searching the information and one such browser is Opera Mini. Opera Mini is the faster browser found in Smartphones, Mobile phones and in PDAs. It is of free and available along with the mobile phones and is found as the most used web browser in phones. 

Tuesday, August 4, 2015

Getting Acquainted With The Structure of Outlook PST File

MS Outlook, one of the components of MS Office suite, is the most popular Personal Information Manager and desktop based email client. It is a standalone application and also works efficiently with organizational level server systems like Exchange server and SharePoint Server. The data stored in it is maintained in a storage file referred as PST or Personal Storage Table. The PST file maintains the data of Outlook in a systematic and hierarchical form.




In this write up we will shed some light on the structure of the Outlook PST files. The PST file follows both Logical and Physical structure, which will remain the highlights of this blog.

Monday, July 20, 2015

Looking Into The Structure of MBOX File

MBOX stands for Mailbox, which is a file format that holds a collection of email messages in plain text format. All the messages are stored in individual, long text format and the new messages are appended to the end of the file. MBOX stores the messages in RFC 2822, original Internet Message format, making it easily accessible.


Wednesday, February 18, 2015

Dig Out Evidences Through Control Panel Forensics

Windows Operating System Control Panel is implemented as a series of applets and each of these applets is represented by .cpl file. These applets are usually stored in %system root%\System32 folder and can be opened through system binary ‘control.exe’ a control panel application. There are various ways available to access it and each of these methods can destine you with different artifacts which are also stored in varied places depending on the version of Windows.





Friday, February 6, 2015

An Introduction To Virtual Machine Forensics

The virtual machine is a software application using which one can create separate OS environments. Each environment limits the use of its hardware and software resources. In an ideal case, an individual virtual machine behaves as an independent system possessing its personal operating system and hardware. The control over each environment is provided to the user independently.







Wednesday, January 21, 2015

Tricks To Simplify Exchange Email Forensics

Microsoft Exchange Server has provided a secure messaging environment and offers a database to store the communication information. The user database gets saved in two forms: mailboxes and the public folders that gets saved as priv.edb and pub.edb file respectively and for simplification it required Exchange email analysis.
For Exchange email forensics, most of the investigators prefer using third party tools that helps to analyze Outlook data but Microsoft has embedded options in this server applications for eDiscovery and compliance purpose. 

Wednesday, December 3, 2014

SQL Injection Attack – Injecting Harmful/Malicious SQL Code

SQL Injection Attack & Its Types


 Similar to other things SQL also has two sides, one good and the other bad. On one side the programming language is used for management of relational database whereas on the other it can also be utilized for execution of malicious attacks by attackers. One example is SQL injection attack, by means of which malicious codes are injected into the server and then into the SQL database. This results in extraction of useful and valuable information from the system by backdoor. The attack generally affects the link between a server and client-mostly a web server, where security layers such as SSL, TLS, etc. are not utilized, and the browser. This is because normally data exchanged between web browsers and web servers is in the form of plain text-which leaves users vulnerable to eavesdropping. In such cases attacker are able to intercept all data being shared.


Wednesday, November 12, 2014

Cyber Crime Awareness For Rising Frauds Through Emails

Cyber Space is a word that defines worldwide network of computers and is now days popularly termed as Internet. The more its usage is increasing; higher are the chances that it is being misused.One of the major part of internet is e-mails and its usage has been increased extensively over the decade. Identity theft, diffusion of obscene material, online fraud, cyber stalking or bullying etc are some of the consequences that have rotted the cyber space environment.

Wednesday, November 5, 2014

Laws Of Facebook: Know Them And Abide By Them

Facebook is a single word that has the potential to strike up millions of things in the human mind. Undoubtedly, this is amongst the many impacts made by this social network, which has completely revolutionized how people communicate these days.

Wednesday, October 8, 2014

IP Tracking Tool - A Necessity These Days to Trace Location of Received Emails

These days the requirement of IP tracking tool has become a necessity and the main motive of this article is to devise suitable methods to track IP addresses of received emails. The reason being that the necessity to track IP address especially of received emails has shown a high rise and this cannot be done manually without any tool. However, an individual can track his/ her own IP address on a PC by executing the ‘ipconfig’ command in the command prompt window. On doing this, the IP address gets displayed on the command prompt screen. But before we get into the details of IP tracking tool to trace IP Address, let us learn what IP Address is.

Saturday, October 4, 2014

EXPLORING RAINBOW TABLES

When we are using any computer which requires password authentication, the need to hide the passwords arises. The passwords related to systems are stored in the database either hashed or in plain text or using various other methods. These tables are vulnerable to theft as plaintext passwords are a dangerous attempt. Mostly, the passwords are stored as cryptographic hashes of user’s passwords. By using hashes for the passwords no one can determine the actual password. The authentication requires matching of two values, the entered one and the value stored in databases. The access is granted only when the two values match.