Content curation / Veille informationnelle


    Feed has no items.

    Feed has no items.

Hacking Articles Raj Chandel's Blog

  • Forensic Investigation: Pagefile.sys
    par Raj Chandel le 22 octobre 2020 à 7 h 41 min

    In this article, we will learn how to perform a forensic investigation on a Page File. There is a lot of information that can be extracted from valuable artifacts through a memory dump. Yet, there is more: you can perform memory forensics even without a memory dump that is by virtual memory analysis. There are... Continue reading → The post Forensic Investigation: Pagefile.sys appeared first on Hacking Articles.

  • Forensic Investigation: Disk Drive Signature
    par Raj Chandel le 20 octobre 2020 à 9 h 25 min

    In this article, we will be using Disk Drive Signature to identify any suspicious changes in systems’ directories or files. Creating such signatures can help us protect our data in various ways. Table of Contents Introduction Creating disk signature Comparing disk signature Introduction A disk drive signature is created to identify the suspicious changes in... Continue reading → The post Forensic Investigation: Disk Drive Signature appeared first on Hacking Articles.

  • Forensic Investigation : Prefetch File
    par Raj Chandel le 15 octobre 2020 à 18 h 22 min

    In this article, we are going to study an important artifact of Windows, i.e. prefetch files. Every time you do anything on your Windows system, a file is created. These files are called Prefetch files. Through this article, we will learn how these are important and why do we need them. Table of Content Introduction... Continue reading → The post Forensic Investigation : Prefetch File appeared first on Hacking Articles.

RSS - Actualité CNIL.fr Fil RSS des actualités de la Commission Nationale de L'Informatique et des Libertés (CNIL)


Internet Society Working for an Internet that is open, globally connected, and secure.

  • Kolkata IX: The Maiden Community Internet Exchange in India
    par Anupam Agrawal le 22 octobre 2020 à 14 h 18 min

    In 2015, the Internet Society Kolkata Chapter decided to create an Internet Exchange Point (IXP). It had just completed the installation of L-Root Instance, a critical Internet infrastructure to improve security and resiliency of the Web. It chose the IXP model specifically because it was working towards hosting an authoritative Domain Name System (DNS) root The post Kolkata IX: The Maiden Community Internet Exchange in India appeared first on Internet Society.

  • The Week in Internet News: Seven Countries Repeat Calls for Encryption Backdoors
    par Grant Gross le 19 octobre 2020 à 15 h 24 min

    Here we go again: Seven countries, including the U.S., U.K., Japan, and India, are again pushing tech companies to provide encryption backdoors for law enforcement, The Verge reports. The new international statement says encryption poses “significant challenges to public safety.” The U.S. and allies have long pushed for backdoors, even as security advocates have warned The post The Week in Internet News: Seven Countries Repeat Calls for Encryption Backdoors appeared first on Internet Society.

  • In Africa, Strengthening Digital Infrastructure for a Safe Return to Schools
    par Israel Nyoh le 16 octobre 2020 à 18 h 34 min

    When COVID-19 struck Africa, governments imposed temporary or full shutdowns of education systems to contain its spread. At least 53 out of the 54 African countries took measures that canceled or partially closed schools. Kenya, for example, canceled the 2020 academic year in March, before changing its directives six months later to allow schools to The post In Africa, Strengthening Digital Infrastructure for a Safe Return to Schools appeared first on Internet Society.


Security.NL maakt Nederland veilig Security.NL maakt Nederland veilig


Naked Security Computer Security News, Advice and Research


Security Weekly Security Market Validation


  • Hello world!
    par liquidmatrix le 28 novembre 2015 à 23 h 35 min

    Welcome to WordPress. This is your first post. Edit or delete it, then start writing!


  • Blind ROP ARM - ECSC Préquals 2019 - Secure Vault - Writeup
    par Geluchat le 22 mai 2019 à 16 h 00 min

    Dans le cadre des préqualifications de l'ECSC, j'ai eu l'occasion de tester un challenge original dans la catégorie pwn : le challenge Secure Vault. La mention "aucun binaire n'est fourni avec ce challenge" nous indique que le challenge va être intéressant ! Pour commencer, on se connecte au challenge : root@Miaou:/# nc …

  • Exploitation d'un programme 64 bits sous Windows 10
    par Geluchat le 15 mai 2018 à 12 h 30 min

    Introduction Lorsque l'on débute dans le domaine de l'exploitation de binaire, notre choix se tourne le plus souvent vers Linux. En effet, beaucoup de challenges ont été développés sous Linux et la documentation sur l'exploitation Linux ne manque pas. Néanmoins, créer des exploits pour Linux n'a pas le même impact …

  • Les Server Side Request Forgery : Comment contourner un pare-feu
    par Geluchat le 15 septembre 2017 à 22 h 40 min

    Qu'est ce que les Server Side Request Forgery ? Les Server Side Request Forgery, ou en abrégé SSRF, sont des vulnérabilités Web permettant de lire des fichiers sur le serveur local. Il ne faut pas les confondre avec les CSRF (Cross Site Request Forgery), qui, elles, ont pour but l'exécution d'une …


IT Security Guru The Site for our Community

  • Securonix to integrate with Tanium
    par Jade le 22 octobre 2020 à 15 h 03 min

    As workplaces are becoming more remote, with almost half of the workforce working from home, and an introduction of bring your own device policies in many organisations, endpoints have become more distributed and cyberattacks even more prevalent. Remote workforces are creating more vulnerabilities for endpoints as they are no longer located in secure networks, making The post Securonix to integrate with Tanium appeared first on IT Security Guru.

  • NSA warns that Chinese-sponsored hackers are targeting publicly available exploits
    par Sabina le 22 octobre 2020 à 11 h 57 min

    A new report from the US National Security Agency outlines the 25 vulnerabilities most commonly targeted by Chinese sponsored hackers. Exploits for these vulnerabilities are already publicly available, but so are the patches for these flaws. Ciaran Byrne, head of platform operations at Edgescan, provided the follwing analysis: The details published today by the NSA The post NSA warns that Chinese-sponsored hackers are targeting publicly available exploits appeared first on IT Security Guru.

  • PayPal are now allowing crypto spending
    par Jade le 22 octobre 2020 à 11 h 27 min

    PayPal has recently announced that its customers will be able to use Bitcoin and other virtual currencies while buying and selling items using their PayPal accounts. PayPal has revealed that they will be allowing this option to be used in the US in the next upcoming weeks. They plan to have the option available to The post PayPal are now allowing crypto spending appeared first on IT Security Guru.


    Feed has no items.

    Feed has no items.

CERT-FR Centre gouvernemental de veille, d'alerte et de réponse aux attaques informatiques