Why learning a Forensic Artifact matters?5-steps to learning an artifact and how I used it to learn a thing or two about NTFS.Feb 3, 2022Feb 3, 2022
Adversary-in-the-middle using Network SniffingA do-it-yourself guide to IP forwarding.Jan 18, 2022Jan 18, 2022
Understanding Anonymous Pipes — Part 1 of 3Interprocess communication is fascinating in its own right. It is a mechanism that allows different processes, each running in its own…Apr 15, 2021Apr 15, 2021
Symmetric Key Usage in EFSThis article provides information about symmetric key algorithms supported by EFS. This information is required to successfully decrypt a…Jan 27, 2021Jan 27, 2021
Monitoring USN journal for changesThis article explains how the USN Journal can be used to monitor file system changes by taking the example of encrypting a plaintext file.Jan 27, 2021Jan 27, 2021
Finding Encryption Keys in MemoryWalkthrough of a few approaches using AES-256Jan 27, 20211Jan 27, 20211