Skip to main content

✌️Cyber✌️ ✌️forensics,✌️ ✌️a✌️ ✌️aspiring✌️ ✌️future✌️



✌️Cyber✌️ ✌️forensics,✌️ ✌️a✌️ ✌️aspiring✌️ ✌️future✌️


𝑹𝒆𝒄𝒆𝒏𝒕 𝒅𝒂𝒚𝒔, 𝒄𝒚𝒃𝒆𝒓 𝒄𝒓𝒊𝒎𝒆 𝒂𝒕 𝒊𝒕'𝒔 𝒑𝒆𝒂𝒌 𝒍𝒆𝒗𝒆𝒍. 𝑾𝒆 𝒂𝒓𝒆 𝒍𝒊𝒗𝒊𝒏𝒈 𝒖𝒏𝒅𝒆𝒓 𝒕𝒉𝒆 𝒓𝒊𝒔𝒌𝒔 𝒐𝒇 𝒅𝒊𝒈𝒊𝒕𝒂𝒍 𝒕𝒉𝒓𝒆𝒂𝒕𝒔 𝒕𝒉𝒂𝒕 𝒄𝒂𝒏 𝒎𝒂𝒌𝒆 𝒐𝒖𝒓 𝒍𝒊𝒇𝒆 𝒉𝒆𝒍𝒍. 𝑻𝒉𝒆 𝒓𝒊𝒔𝒆 𝒐𝒇 𝒄𝒚𝒃𝒆𝒓 𝒓𝒊𝒔𝒌𝒔 𝒊𝒔 𝒂 𝒎𝒂𝒋𝒐𝒓 𝒄𝒐𝒏𝒄𝒆𝒓𝒏 𝒇𝒐𝒓 𝒕𝒉𝒆 𝒑𝒆𝒐𝒑𝒍𝒆 & 𝒈𝒐𝒗𝒆𝒓𝒏𝒎𝒆𝒏𝒕. 𝑻𝒐 𝒎𝒊𝒕𝒊𝒈𝒂𝒕𝒆 𝒕𝒉𝒆 𝒓𝒊𝒔𝒌 𝒇𝒂𝒄𝒕𝒐𝒓 & 𝒕𝒐 𝒄𝒂𝒑𝒕𝒖𝒓𝒆 𝒕𝒉𝒆 𝒕𝒉𝒆𝒇𝒕 𝒃𝒆𝒉𝒊𝒏𝒅 𝒕𝒉𝒆 𝒄𝒓𝒊𝒎𝒆 𝒘𝒆 𝒏𝒆𝒆𝒅 𝒂 𝒑𝒓𝒐𝒇𝒆𝒔𝒔𝒊𝒐𝒏𝒂𝒍 𝒕𝒂𝒔𝒌 𝒇𝒐𝒓𝒄𝒆𝒔 𝒘𝒉𝒐 𝒄𝒂𝒏 𝒉𝒂𝒏𝒅𝒍𝒆 𝒊𝒕 𝒘𝒊𝒕𝒉 𝒕𝒉𝒆𝒊𝒓 𝒆𝒙𝒑𝒆𝒓𝒕𝒊𝒔𝒆. 𝑺𝒐, 𝒉𝒆𝒓𝒆'𝒔 𝒄𝒐𝒎𝒆 𝒕𝒉𝒆 𝒓𝒐𝒍𝒆 𝒐𝒇 𝒊𝒏𝒄𝒊𝒅𝒆𝒏𝒕 𝒓𝒆𝒔𝒑𝒐𝒏𝒅𝒆𝒓𝒔 & 𝒄𝒐𝒎𝒑𝒖𝒕𝒆𝒓 𝒇𝒐𝒓𝒆𝒏𝒔𝒊𝒄 𝒂𝒏𝒂𝒍𝒚𝒔𝒕𝒔 𝒘𝒉𝒐 𝒉𝒆𝒍𝒑 𝒕𝒉𝒆 𝒄𝒐𝒓𝒑𝒐𝒓𝒂𝒕𝒆 𝒇𝒓𝒊𝒎𝒔 𝒂𝒏𝒅 𝒍𝒆𝒂'𝒔 𝒘𝒊𝒕𝒉 𝒕𝒉𝒆 𝒊𝒏𝒗𝒆𝒔𝒕𝒊𝒈𝒂𝒕𝒊𝒐𝒏 𝒂𝒏𝒅 𝒕𝒉𝒆𝒚 𝒂𝒓𝒆 𝒓𝒆𝒔𝒑𝒐𝒏𝒔𝒊𝒃𝒍𝒆 𝒕𝒐 𝒄𝒂𝒕𝒄𝒉𝒊𝒏𝒈 𝒕𝒉𝒆 𝒄𝒖𝒍𝒑𝒓𝒊𝒕 𝒃𝒆𝒉𝒊𝒏𝒅 𝒕𝒉𝒆 𝒄𝒓𝒊𝒎𝒆.


How💙anyone💙can💙become💙a💙forensic💙investigator?


𝑫𝒊𝒈𝒊𝒕𝒂𝒍 𝒇𝒐𝒓𝒆𝒏𝒔𝒊𝒄𝒔 𝒊𝒔 𝒏𝒐𝒘 𝒂 𝒃𝒓𝒊𝒈𝒉𝒕 𝒇𝒖𝒕𝒖𝒓𝒆 𝒂𝒏𝒅 𝒊𝒕 𝒉𝒂𝒔 𝒘𝒊𝒅𝒆 𝒓𝒂𝒏𝒈𝒆 𝒐𝒇 𝒔𝒄𝒐𝒑𝒆. 𝑾𝒆 𝒏𝒆𝒆𝒅 𝒎𝒂𝒏𝒚 𝒄𝒚𝒃𝒆𝒓 𝒇𝒐𝒓𝒆𝒏𝒔𝒊𝒄 𝒑𝒓𝒂𝒄𝒕𝒊𝒕𝒊𝒐𝒏𝒆𝒓𝒔 𝒂𝒏𝒅 𝒕𝒉𝒊𝒔 𝒇𝒊𝒆𝒍𝒅 𝒉𝒂𝒔 𝒇𝒂𝒏𝒕𝒂𝒔𝒕𝒊𝒄 𝒅𝒆𝒎𝒂𝒏𝒅 𝒐𝒇 𝒕𝒉𝒊𝒔. 𝑻𝒐 𝒐𝒃𝒕𝒂𝒊𝒏 𝒂 𝒅𝒆𝒈𝒓𝒆𝒆 𝒚𝒐𝒖 𝒄𝒂𝒏 𝒅𝒐 𝒆𝒏𝒓𝒐𝒍𝒍𝒎𝒆𝒏𝒕 𝒊𝒏 𝒉𝒆𝒓𝒆 𝒂𝒕 𝑨𝑰𝑶𝑪 𝒂𝒏𝒅 𝒐𝒖𝒓 𝒔𝒑𝒆𝒄𝒊𝒂𝒍𝒊𝒛𝒆𝒅 𝒕𝒓𝒂𝒊𝒏𝒊𝒏𝒈𝒔 𝒘𝒊𝒍𝒍 𝒎𝒂𝒌𝒆 𝒚𝒐𝒖 𝒂 𝒄𝒐𝒎𝒑𝒖𝒕𝒆𝒓 𝒇𝒐𝒓𝒆𝒏𝒔𝒊𝒄 𝒊𝒏𝒗𝒆𝒔𝒕𝒊𝒈𝒂𝒕𝒐𝒓 𝒘𝒊𝒕𝒉 101% 𝒑𝒓𝒂𝒄𝒕𝒊𝒄𝒂𝒍 𝒄𝒂𝒔𝒆 𝒔𝒕𝒖𝒅𝒊𝒆𝒔 𝒂𝒏𝒅 𝒄𝒐𝒖𝒓𝒔𝒆. 𝑨 𝒅𝒊𝒈𝒊𝒕𝒂𝒍 𝒇𝒐𝒓𝒆𝒏𝒔𝒊𝒄 𝒂𝒏𝒂𝒍𝒚𝒔𝒕 𝒔𝒉𝒐𝒖𝒍𝒅 𝒉𝒂𝒗𝒆 𝒈𝒐𝒐𝒅 𝒌𝒏𝒐𝒘𝒍𝒆𝒅𝒈𝒆 𝒐𝒇 𝒄𝒐𝒎𝒑𝒖𝒕𝒆𝒓 𝒐𝒑𝒆𝒓𝒂𝒕𝒊𝒏𝒈 𝒔𝒚𝒔𝒕𝒆𝒎𝒔, 𝒎𝒆𝒎𝒐𝒓𝒚 𝒅𝒆𝒗𝒊𝒄𝒆 𝒔𝒕𝒐𝒓𝒂𝒈𝒆 𝒕𝒚𝒑𝒆𝒔, 𝒇𝒊𝒍𝒆 𝒔𝒕𝒐𝒓𝒂𝒈𝒆 𝒔𝒚𝒔𝒕𝒆𝒎𝒔, 𝒎𝒐𝒃𝒊𝒍𝒆 𝒅𝒆𝒗𝒊𝒄𝒆𝒔, 𝒅𝒊𝒈𝒊𝒕𝒂𝒍 𝒎𝒆𝒅𝒊𝒂 𝒕𝒚𝒑𝒆𝒔, 𝒄𝒐𝒎𝒑𝒖𝒕𝒆𝒓 𝒉𝒂𝒓𝒅𝒘𝒂𝒓𝒆 𝒂𝒏𝒅 𝒇𝒂𝒎𝒊𝒍𝒊𝒂𝒓𝒊𝒛𝒂𝒕𝒊𝒐𝒏 𝒘𝒊𝒕𝒉 𝒎𝒂𝒏𝒚, 𝒎𝒂𝒏𝒚 𝒅𝒊𝒇𝒇𝒆𝒓𝒆𝒏𝒕 𝒉𝒂𝒓𝒅𝒘𝒂𝒓𝒆 𝒂𝒏𝒅 𝒔𝒐𝒇𝒕𝒘𝒂𝒓𝒆 𝒕𝒐𝒐𝒍𝒔 𝒕𝒐 𝒂𝒄𝒄𝒐𝒎𝒑𝒍𝒊𝒔𝒉 𝒕𝒉𝒆 𝒋𝒐𝒃. 𝑴𝒐𝒓𝒆 𝒚𝒐𝒖 𝒑𝒓𝒂𝒄𝒕𝒊𝒄𝒆, 𝒎𝒐𝒓𝒆 𝒚𝒐𝒖 𝒍𝒆𝒂𝒓𝒏. 𝑾𝒊𝒕𝒉 𝒂𝒍𝒍 𝒕𝒉𝒆 𝒎𝒆𝒏𝒕𝒊𝒐𝒏𝒆𝒅 𝒔𝒑𝒆𝒄𝒊𝒂𝒍𝒊𝒛𝒂𝒕𝒊𝒐𝒏 𝒚𝒐𝒖 𝒔𝒉𝒐𝒖𝒍𝒅 𝒉𝒂𝒗𝒆 𝒎𝒊𝒏𝒊𝒎𝒖𝒎 𝒃𝒂𝒕𝒄𝒉𝒆𝒍𝒐𝒓 𝒅𝒆𝒈𝒓𝒆𝒆 𝒇𝒐𝒓 𝒔𝒆𝒍𝒇 𝒑𝒓𝒐𝒎𝒐𝒕𝒊𝒐𝒏 𝒂𝒏𝒅 𝒘𝒐𝒓𝒌𝒊𝒏𝒈 𝒂𝒄𝒕𝒊𝒗𝒆𝒍𝒚 𝒘𝒊𝒕𝒉 𝒑𝒐𝒑𝒖𝒍𝒂𝒓 𝒗𝒆𝒏𝒅𝒐𝒓𝒔 & 𝒄𝒚𝒃𝒆𝒓 𝒇𝒐𝒓𝒆𝒏𝒔𝒊𝒄 𝒍𝒂𝒃 𝒖𝒏𝒅𝒆𝒓 𝒈𝒐𝒗𝒕. 𝑰𝒇 𝒚𝒐𝒖 𝒂𝒓𝒆 𝒇𝒓𝒐𝒎 𝒏𝒐𝒏 𝒕𝒆𝒄𝒉𝒏𝒊𝒄𝒂𝒍 𝒃𝒂𝒄𝒌𝒈𝒓𝒐𝒖𝒏𝒅 𝒕𝒉𝒆𝒏 𝒚𝒐𝒖 𝒂𝒍𝒔𝒐 𝒄𝒂𝒏 𝒑𝒖𝒓𝒔𝒖𝒆 𝒕𝒉𝒆 𝒄𝒐𝒖𝒓𝒔𝒆 𝒄𝒖𝒓𝒓𝒊𝒄𝒖𝒍𝒖𝒎 𝒂𝒏𝒅 𝒊𝒕'𝒔 𝒐𝒖𝒓 𝒓𝒆𝒔𝒑𝒐𝒏𝒔𝒊𝒃𝒊𝒍𝒊𝒕𝒚 𝒕𝒐 𝒎𝒂𝒌𝒆 𝒚𝒐𝒖 𝒂 𝒄𝒆𝒓𝒕𝒊𝒇𝒊𝒆𝒅 𝒑𝒓𝒐𝒇𝒆𝒔𝒔𝒊𝒐𝒏𝒂𝒍 𝒘𝒉𝒐 𝒄𝒂𝒏 𝒄𝒓𝒂𝒄𝒌 𝒄𝒉𝒂𝒍𝒍𝒆𝒏𝒈𝒆'𝒔 𝒊𝒏 𝒐𝒑𝒆𝒓𝒂𝒕𝒊𝒐𝒏𝒂𝒍 𝒕𝒂𝒔𝒌𝒔. 𝑻𝒉𝒊𝒔 𝒃𝒍𝒐𝒈 𝒉𝒂𝒔 𝒎𝒂𝒏𝒚 𝒆𝒙𝒕𝒓𝒂 𝒃𝒆𝒏𝒆𝒇𝒊𝒄𝒊𝒂𝒍 𝒏𝒐𝒕𝒆𝒔 𝒕𝒉𝒂𝒏 𝒆𝒂𝒓𝒍𝒊𝒆𝒓 𝒐𝒏𝒆. 𝑯𝒐𝒑𝒆 𝒚𝒐𝒖 𝒘𝒊𝒍𝒍 𝒍𝒊𝒌𝒆 𝒊𝒕 , 𝒊𝒇 𝒚𝒐𝒖 𝒇𝒐𝒖𝒏𝒅 𝒕𝒉𝒊𝒔 𝒉𝒆𝒍𝒑𝒇𝒖𝒍 𝒕𝒉𝒆𝒏 𝒔𝒉𝒂𝒓𝒆 𝒊𝒏 𝒚𝒐𝒖𝒓 𝒄𝒊𝒓𝒄𝒍𝒆 ❤️

Comments

Popular posts from this blog

NMAP and ZenMAP

NMAP and ZenMAP are useful tools for the scanning phase of Ethical Hacking in Kali Linux. NMAP and ZenMAP are practically the same tool, however NMAP uses command line while ZenMAP has a GUI. NMAP is a free utility tool for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. NMAP uses raw IP packets in novel ways to determine which hosts are available on the network, what services (application name and version) those hosts are offering, which operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, etc. Now, let’s go step by step and learn how to use NMAP and ZenMAP. Step 1 − To open, go to Applications → 01-Information Gathering → nmap or zenmap. Step 2 − The next step is to detect the OS type/version of the target host. Based on the help indicated by NMAP, the parameter of

networks nd networking 1

Types Of Network •LAN - Local Area Network is in a small geographical area, such as a college or office building. •WAN - Wide Area Network Combination of multiple LANs. •WLAN - Wireless Local Area Network Links two or more devices using some wireless distribution method and usually providing a connection through an access point to the wider internet. Local Area Network (LAN) •A LAN connects network devices within a limited geographical area such as office buildings or schools. •The data transfer is managed by a transport protocol such as TCP/IP. •The transmission of data is performed by the access method (Ethernet, Token Ring, etc.). Wide Area Network (WAN) •A WAN covers a wide geographic area, carrying data over long distances, such as a country •WANs can be formed by different LANs •The connection between different LANs may not be permanent •WANs are sophisticated networks, but transmission speeds have generally been slower than those commonly achieved on LANs WLAN (Wireles

MAN-IN-THE-MIDDLE ATTACK (MITM ATTACK)

What is Man-in-the-middle (MITM) attack? A man in the middle attack is one in which the attacker intercepts messages in a public key exchange and then retransmits them, substituting his own public key for the requested one, so that the two original parties still appear to be communicating with each other. The attack gets its name from the ball game where two people try to throw a ball directly to each other while one person in between them attempts to catch it. In a man in the middle attack, the intruder uses a program that appears to be the server to the client and appears to be the client to the server. The attack may be used simply to gain access to the message, or enable the attacker to modify the message before retransmitting it. Man in the middle attacks is sometimes known as fire brigade attacks. The term derives from the bucket brigade method of putting out a fire by handing buckets of water from one person to another between a water source and the fire. What is BackTrack