Encoding and Canonicalization Vulnerabilities

Encoding flaws have arisen in many kinds of web server software and present an inherent threat in situations where the same user-supplied data is processed by several layers using different technologies. A typical web request might be handled by the web server, the application platform, various man-aged and unmanaged APIs, other software components, and the … Read more

Path Traversal Vulnerabilities

Accipiter DirectServer This path traversal flaw could be exploited by placing URL-encoded dot-dot-slash sequences into a request. For more information about this flaw, see www.securityfocus.com/bid/9389 . Alibaba This path traversal flaw could be exploited by placing simple dot-dot-slash sequences into a request. For more information about this flaw, see www.securityfocus.com/bid/270 . Cisco ACS Acme.server This … Read more

How to Hack an ADSL Router

Almost left half of the Internet users across the globe use ADSL routers/modems to connect to the Internet. However, most of them are unaware of the fact that it has a serious vulnerability in it which can easily be exploited by anyone with a basic knowledge of computer. In this post, I will show you how to hack an Ethernet … Read more

TOOLS FOR MOBILE FORENSICS

OXYGEN-FORENSIC Oxygen Forensic Suite 2011 is mobile forensic software that goes beyond standard logical analysis of cell phones, smart phones and PDAs. Using advanced proprietary protocols permits Oxygen Forensic Suite 2011 to extract much more data than usually extracted by logical forensic tools, especially for smart phones. Oxygen Forensic Suite – Smart Forensics for Smart … Read more

THE CHALLENGES OF MOBILE FORENSICS

Mobile devices are a staple of our lives. They keep us connected and do far more. It is not unusual for a smart phone to be an entertainment center, social tool and mobile office rolled up into one small package. We marvel when we hear about a home that has two computers for one family, … Read more

MOBILE FORENSIC ANALYSIS

HOW TO IDENTIFY A SUBSCRIBER? Every mobile subscriber is issued with a smart card called a Subscriber Identity Module (SIM). As physical evidence the SIM provides details printed on the surface of:  Name of the Network Provider  Unique ID Number GENERIC PROPERTIES All MS‘s have follow GSM standards on how they access and communicate with … Read more

COMPUTER FORENSICS V/S MOBILE PHONE FORENSICS

REPRODUCIBILITY OF EVIDENCE IN THE CASE OF DEAD FORENSIC ANALYSIS Digital investigations can involve dead and/or live analysis techniques. In dead forensic analysis, the target device is powered off and an image of the entire hard disk is made. A one-way-hash function is then used to compute a value for both, the entire contents of … Read more

EXTRACTION METHODS OF MOBILE FORENSICS

Generally products tend to split mobile forensics information extraction into two different methods, the physical extraction and the logical extraction. The reason for this split is because unlike a personal computer which has a standardized interface, mobile phones tend to use proprietary interfaces or deviate from standards. This means that generally it will take longer … Read more

INTRODUCTION TO MOBILE FORENSICS

Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. The phrase mobile device usually refers to mobile phones; however, it can also relate to any digital device that has both internal memory and communication ability. The use of phones … Read more

WAYS TO PROTECT CYBER TERRORISM

“SOME WAYS TO PROTECT CYBER TERRORISM” Employ Strong Passwords: As simple as this sound, it is one of the most overlooked methods of keeping systems safe. There are a number of freely available tools that ‘guess’ passwords — a very common technique referred to as ‘brute force cracking. These programs work by repeatedly attempting to … Read more