Comprehensive Guide on Autopsy Tool (Windows)
✴ Twitter: https://lnkd.in/e7yRpDpY
Autopsy is an open-source tool that is used to perform forensic operations on the disk image of the evidence. The forensic investigation that is carried out on the disk image is displayed here.
➡ File Type
➡MIME-type
➡Deleted Files
➡MB File size
➡Results
➡Extracted Content
➡Keyword Hits
➡Timeline
➡Discovery
➡Images/Videos
➡Add File Tags
➡Generate Reports
✴ Twitter: https://lnkd.in/e7yRpDpY
Autopsy is an open-source tool that is used to perform forensic operations on the disk image of the evidence. The forensic investigation that is carried out on the disk image is displayed here.
➡ File Type
➡MIME-type
➡Deleted Files
➡MB File size
➡Results
➡Extracted Content
➡Keyword Hits
➡Timeline
➡Discovery
➡Images/Videos
➡Add File Tags
➡Generate Reports
🔥 CISSP Training Program (Online) 🔥 – Register Now! 🚀
🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1
📧 Email: info@ignitetechnologies.in
Join Ignite Technologies CISSP live sessions with core practicals at Lowest Price.
BOOK YOUR Seat NOW ………….
🔐 Security and Risk Management
📦 Asset Security
🏗️ Security Architecture and Engineering
🌐 Communication and Network Security
🧑💻 Identity and Access Management (IAM)
🧪 Security Assessment and Testing
⚙️ Security Operations
💻 Software Development Security
🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1
📧 Email: info@ignitetechnologies.in
Join Ignite Technologies CISSP live sessions with core practicals at Lowest Price.
BOOK YOUR Seat NOW ………….
🔐 Security and Risk Management
📦 Asset Security
🏗️ Security Architecture and Engineering
🌐 Communication and Network Security
🧑💻 Identity and Access Management (IAM)
🧪 Security Assessment and Testing
⚙️ Security Operations
💻 Software Development Security
❤1
A Detailed Guide on Medusa
✴ Twitter: https://lnkd.in/e7yRpDpY
Hi Pentesters! Let’s learn about a different tool Medusa, which is intended to be a speedy, parallel and modular, login brute force.
🔶 Features of Medusa
🔶Password Cracking for specific Username
🔶Username Cracking for specific Password
🔶To crack login credentials
🔶Brute Force on Multiple Host
🔶To attack a specific port rather than the default
🔶Additional password checks (Null/Same)
🔶To Save Logs in a File
🔶Stop on Success.
🔶To suppress start-up Banner
🔶Verbose Mode
🔶Error Debug level
🔶Using Combo Entries
🔶Concurrent testing on multiple logins
🔶Display Module Usage Information
✴ Twitter: https://lnkd.in/e7yRpDpY
Hi Pentesters! Let’s learn about a different tool Medusa, which is intended to be a speedy, parallel and modular, login brute force.
🔶 Features of Medusa
🔶Password Cracking for specific Username
🔶Username Cracking for specific Password
🔶To crack login credentials
🔶Brute Force on Multiple Host
🔶To attack a specific port rather than the default
🔶Additional password checks (Null/Same)
🔶To Save Logs in a File
🔶Stop on Success.
🔶To suppress start-up Banner
🔶Verbose Mode
🔶Error Debug level
🔶Using Combo Entries
🔶Concurrent testing on multiple logins
🔶Display Module Usage Information
👍1
Wordlists for Pentester
✴ Twitter: https://lnkd.in/e7yRpDpY
A Pentester is as good as their tools and when it comes to cracking the password, stressing authentication panels or even a simple directory Bruteforce it all drills down to the wordlists that you use. Today we are going to understand word lists.
🔳 CeWL
🔳Crunch
🔳Cupp
🔳Pydictor
🔳Bopscrk
🔳BEWCor
🔳Dymerge
🔳Mentalist
✴ Twitter: https://lnkd.in/e7yRpDpY
A Pentester is as good as their tools and when it comes to cracking the password, stressing authentication panels or even a simple directory Bruteforce it all drills down to the wordlists that you use. Today we are going to understand word lists.
🔳 CeWL
🔳Crunch
🔳Cupp
🔳Pydictor
🔳Bopscrk
🔳BEWCor
🔳Dymerge
🔳Mentalist