Monday , 29 April 2024

Memory Segmentation In a Nutshell

Memory segmentation is a place where all the things happen while any program is running. Memory is divided into several segments and in this article, we are going to discuss them Usually compiled program memory is divided into 5 segments text data bss heap stack

Read More »

Securing Cookies. Beyond document.cookie

Cookies is the place where the web applications store the authentication data. If you can able to impersonate target cookie in your browser then you can directly login to target account without any password, if the web application is vulnerable. 

Read More »

What is UFS – Unix File System and ext Family

Knowing about Unix File System is important because it is the file system that is used by Linux distros and it is one of the most used kernels out there. XFS, JFS and many more file systems are like UFS so if you know about this file system you can cover other file systems based on this. UFS is there …

Read More »

NTFS File System Basics and Structure

Even though FAT is one of the widely used file system it lacks many features. When Windows is about to launch Windows NT, which is sever based operating system they want to launch a new file system that can have capabilities that FAT doesn’t have.

Read More »

Everything a Security Analyst need to know about FAT File System

  For understanding disk-based forensics we need to know about each file system, how it works and what it’s made up of. In this article we will share you everything that we know, and you should know about FAT FAT stands for File Allocation Table. It is one of the most widely used file system and the reason, you will …

Read More »

Everything you need to know about File System Basics as a Forensic Analyst

What operating system do you use? Linux, Windows or Mac? Whatever the operating system you are using it doesn’t matter. You will be storing files in it. Every operating system uses their kind of file system. Windows uses NTFS, Linux uses FAT and there are different types of FAT systems too. So, to create any operating system the first and …

Read More »

Secure way to access dark web on android

Everything is on mobile and when we analyze the traffic we are getting to internet most of the sources are from mobile. Every web application is making their mobile apps. But for most of the people who wants to access dark web their first choice is desktop or laptop. To make it handy I have come with a tutorial that …

Read More »

What is DNS Poisoning? Kali Linux tutorial to find Facebook Password

DNS poisoning is one of the way to attack the users present in same network. In this article I am going to share what is DNS poisoning, how we can do it and what are the details we can get using this attack. What is DNS? DNS stands for Domain Name Server. This is a server that stores IP addresses …

Read More »

How OWASP Top 10 Will Protect Web Application

When you look in the requirements of any information security analyst OWASP top ten will be there for sure. Firm knowledge on OWASP top 10 OWASP stands for Open Web Application Security Project. This is a non-profit organization with the mission to make web securely visible. Web is made to be available not secure so it’s our responsibility to make …

Read More »

11 Insane Things You Can do with Batch Programming

Howdy! In this article we are going to learn how to create some virus programs with the help of batch scripts. Let’s get on to some grey shade of the Batch Programming. Wait, wait,  what is this Batch Programming first? Don’t worry, by the end of this article you are going to learn what is batch programming and some cool …

Read More »