Microsoft Exchange Server has provided a secure
messaging environment and offers a database to store the communication
information. The user database gets saved in two forms: mailboxes and the
public folders that gets saved as priv.edb and pub.edb file respectively and for simplification it required Exchange email
analysis.
For Exchange email forensics, most of the investigators
prefer using third party tools that helps to analyze Outlook data but Microsoft
has embedded options in this server applications for eDiscovery and compliance
purpose.
The 'Digital Forensics Zone' blog is an effort to present the high and low tides of electronic discovery and forensics of data in the best simplified manner. Through this blog, we will help you out with solutions to understand forensics right from the level of beginners to that of an expert.
Wednesday, January 21, 2015
Wednesday, December 3, 2014
SQL Injection Attack – Injecting Harmful/Malicious SQL Code
SQL Injection Attack & Its Types
Similar to other
things SQL also has two sides, one good and the other bad. On one side the
programming language is used for management of relational database whereas on the
other it can also be utilized for execution of malicious attacks by attackers. One
example is SQL injection attack, by means of which malicious codes are
injected into the server and then into the SQL database. This results in
extraction of useful and valuable information from the system by backdoor. The
attack generally affects the link between a server and client-mostly a web
server, where security layers such as SSL, TLS, etc. are not utilized, and the
browser. This is because normally data exchanged between web browsers and web
servers is in the form of plain text-which leaves users vulnerable to eavesdropping. In such cases attacker are able to
intercept all data being shared.
Wednesday, November 12, 2014
Cyber Crime Awareness For Rising Frauds Through Emails
Cyber Space is a word that
defines worldwide network of computers and is now days popularly termed as
Internet. The more its usage is increasing; higher are the chances that it is
being misused.One of the major part of internet is e-mails and its usage has
been increased extensively over the decade. Identity theft, diffusion of
obscene material, online fraud, cyber stalking or bullying etc are some of the
consequences that have rotted the cyber space environment.
Wednesday, November 5, 2014
Wednesday, October 8, 2014
IP Tracking Tool - A Necessity These Days to Trace Location of Received Emails
These days the requirement of IP tracking tool has
become a necessity and the main motive of this article is to devise suitable methods
to track IP addresses of received emails. The reason being that the necessity to track IP address especially
of received emails has shown a high rise and this cannot be done manually
without any tool. However, an individual can track his/ her own IP address on a
PC by executing the ‘ipconfig’ command in the command prompt window. On doing
this, the IP address gets displayed on the command prompt screen. But before we
get into the details of IP tracking tool to trace IP Address, let us
learn what IP Address is.
Saturday, October 4, 2014
EXPLORING RAINBOW TABLES
When we are using any computer
which requires password authentication, the need to hide the passwords arises.
The passwords related to systems are stored in the database either hashed or in
plain text or using various other methods. These tables are vulnerable to theft
as plaintext passwords are a dangerous attempt. Mostly, the passwords are
stored as cryptographic hashes of user’s passwords. By using hashes for the
passwords no one can determine the actual password. The authentication requires
matching of two values, the entered one and the value stored in databases. The
access is granted only when the two values match.
Subscribe to:
Posts (Atom)