HackerOne – Telegram
HackerOne
11K subscribers
644 photos
31 videos
79 files
2.74K links
Community : @Sec0x01
@Bug0x
Download Telegram
https://www.peerlyst.com/posts/how-to-perform-ssd-forensics-or-part-i-sudhendu?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post

How to perform SSD Forensics | Part - I 👌

Recently I went to a Conference on cyber forensics‍ . There I saw people demonstrating various acquisition methods, evidence‍ collection, storage and analysis‍ . One thing is peculiarly noticed that people when say “Evidence acquisition” or “ Data recovery ” from computers they generally mean to acquire it from magnetic storage media, like Hard Disks (HDD). They were going on about disk forensics, slack space and all those related stuff. After listening to their orthodox speech, I raised some queries:

Do the methods of disk forensics, like block level analysis, apply on Solid state drives ,flash drives?

Flash drives totally remove the concept of block or any rotating part, so what now?

Do your delete, erase, wipe and format concept still work in a similar way? etc. etc.

I asked around 10 questions and all I got was blithering. That made me ponder about the different individuals who are dealing forensics and how many do not follow the dernier cri in the industry.

I decided I need to write something on forensics involving flash drives. My focus on this article is about Solid State Drives‍ (SSDs) .

#article #forensic #ssd
Forwarded from Security Analysis
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2020-2551 Weblogic Remote Code Execute RCE With IIOP
#RCE #Weblogic
@securation
Sec in your DevOps: Adding the OWASP Dependency Check to your Jenkins pipeline

https://ift.tt/30XyWGZ
Spotify DRM Bypass + PoC

https://ift.tt/2TRpuU0
Yet Another Sudo Vulnerability!

When 'pwfeedback' is enabled, a new Sudo bug could let low privileged Linux & macOS users (or malicious programs) execute arbitrary commands with 'root' privileges.

Details for CVE-2019-18634 ➤ https://thehackernews.com/2020/02/sudo-linux-vulnerability.html