Friday, 30 August 2013

MASTERING WINDOWS NETWORK FORENSICS AND INVESTIGATION, 2ND EDITION


An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals.


  • Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or network
  • Places a special emphasis on how to thoroughly investigate criminal activity and now just perform the initial response
  • Walks you through ways to present technically complicated material in simple terms that will hold up in court
  • Features content fully updated for Windows Server 2008 R2 and Windows 7

Covers the emerging field of Windows Mobile forensics
Also included is a classroom support package to ensure academic adoption, Mastering Windows Network Forensics and Investigation, 2nd Edition offers help for investigating high-technology crimes.

About the Author
Steve Anson, CISSP, EnCE, is the cofounder of Forward Discovery. He has previously served as a police officer, FBI High Tech Crimes Task Force agent, Special Agent with the U.S. DoD, and an instructor with the U.S. State Department Antiterrorism Assistance Program (ATA). He has trained hundreds of law enforcement officers around the world in techniques of digital forensics and investigation. Steve Bunting, EnCE, CCFT, has over 35 years of experience in law enforcement, and his background in computer forensics is extensive. He has conducted computer forensic examinations for numerous local, state, and federal agencies on a variety of cases, as well as testified in court as a computer forensics expert. He has taught computer forensics courses for Guidance Software and is currently a Senior Forensic Consultant with Forward Discovery. Ryan Johnson, DFCP, CFCE, EnCE, SCERS, is a Senior Forensic Consultant with Forward Discovery. He was a digital forensics examiner for the Durham, NC, police and a Media Exploitation Analyst with the U.S. Army. He is an instructor and developer with the ATA. Scott Pearson has trained law enforcement entities, military personnel, and network/system administrators in more than 20 countries for the ATA. He is also a certifying Instructor on the Cellebrite UFED Logical and Physical Analyzer Mobile Device Forensics tool and has served as an instructor for the DoD Computer Investigations Training Academy.

Product Details
Paperback: 696 pages
Publisher: Sybex; 2 edition (June 26, 2012)
Language: English
ISBN-10: 1118163826
ISBN-13: 978-1118163825

Download Link : MASTERING WINDOWS NETWORK FORENSICS AND INVESTIGATION, 2ND EDITION

Tuesday, 27 August 2013

Configure xssf Metasploit Plugin in Kali Linux


The Cross-Site Scripting Framework (XSSF) is security tool designed to turn the XSS vulnerability exploitation task.XSSF allows creating a communication channel with the targeted browser (XSS vulnerability) in order to perform further attacks. Users are free to select existing modules (a module = an attack) in order to target specific browsers.XSSF provides a powerful documented API, which facilitates development of modules and attacks. In addition, its integration into the Metasploit Framework allows users to launch MSF browser based exploit easily from XSS vulnerability.

How to Configure :

1 - kali Linux terminal and type cd /opt/metasploit/apps/pro/msf3

2 - In msf3 install xssf using following command

Svn export http://xssf.googlecode.com/svn/trunk ./ --force 

3 - Load XSSF plugin using the command - load xssf

VIDEO : 


Wednesday, 10 July 2013

How to Hack a Computer with Armitage


Armitage is a scriptable red team collaboration tool for Metasploit that visualizes targets, recommends exploits, and exposes the advanced post-exploitation features in the framework.

Through one Metasploit instance, your team will:
  •     Use the same sessions
  •     Share hosts, captured data, and downloaded files
  •     Communicate through a shared event log.
  •     Run bots to automate red team tasks

VIDEO : 

Monday, 8 July 2013

How to fix Memory Card formatting problem ?


The solution of this problem is to format the Memory Card again with FATfile system through computer because your mobile cant read it any more so you cannot format it from your Mobile.

To format your Memory Card with FAT (FAT16) file system :
  • Plug-in your Memory Card into your computer.
  • Wait till computer detects the Memory Card.
  • Now note down the Drive Letter of your Memory Card
Note: In this tutorial we will assume that drive letter of your Memory Card is I: but you should replace it with actual drive letter of your memory card.

  • Now run Command Prompt by Typing CMD and hitting Enter in Start>>Run or by typing CMD and hitting Enter key after pressing WinKEY+R.Windows 7 and Vista users should type CMD in Start’s Search Box when Command Prompt appear, right click on it and run as administrator.
  • Once Command Prompt launches, Type I: /fs:FAT and hit enter.
Please note that in above tutorial we assumed that I: is drive letter of memory card but this could not be same in your case so make sure to replace I: with actual drive letter of your Memory Card.
Also Please note that if you format anything your data will be erased.