diyinfosecWhy learning a Forensic Artifact matters?5-steps to learning an artifact and how I used it to learn a thing or two about NTFS.8 min read·Feb 3, 2022----
diyinfosecAdversary-in-the-middle using Network SniffingA do-it-yourself guide to IP forwarding.9 min read·Jan 18, 2022----
diyinfosecUnderstanding Anonymous Pipes — Part 1 of 3Interprocess communication is fascinating in its own right. It is a mechanism that allows different processes, each running in its own…5 min read·Apr 15, 2021----
diyinfosecSymmetric Key Usage in EFSThis article provides information about symmetric key algorithms supported by EFS. This information is required to successfully decrypt a…2 min read·Jan 27, 2021----
diyinfosecMonitoring USN journal for changesThis article explains how the USN Journal can be used to monitor file system changes by taking the example of encrypting a plaintext file.1 min read·Jan 27, 2021----
diyinfosecFinding Encryption Keys in MemoryWalkthrough of a few approaches using AES-2569 min read·Jan 27, 2021--1--1