Following on from the previous [DFIR TOOLS] posts. Hasher is a software application developed by Eric Zimmerman that is used to calculate and compare the hash values of files. A hash value is a unique code that is generated based on the contents of a file. By comparing the hash values of two files, it…
Tag: Hack
Cybersecurity-Attacks and Defenses Strategies 3rd Edition by Yuri Diogenes & Dr Erdal Ozkaya REVIEW
This book is a little different to the ones I have been reading recently in that it is more general in a sense that it covers the whole cybersecurity umbrella regarding red and blue teaming and the like. It’s nice every now and then to just read book like this every now and then over…
Network Basics for Hackers by Occupy the Web REVIEW!
Today I get to review another book from Occupy the Web who I am a big fan of, his books are fantastic, and I have every one that has been released so far, so when this book `Networking for Hackers` was getting released it was a total no brainer in working through it. It couldn’t…
Interview With 0 Day Clothing
Before starting this post I want to state this is not an ad or promotion or anything like that it is me who reached out the 0 Day for an interview as I am genuinely a fan of their clothes. There tops have appeared in my favourite show (and probably your favourite too) Mr Robot….
HACKTORIA: The Killer Clown – Walkthrough
Back with another Hacktoria walkthrough, easing myself in by working through all the easy ones first and this time it is ‘The Killer Clown‘. Ok, so I won’t try to over think this like I did on the lost at see when i tried to crack the password using the RockYou.txt lol. So the image…
HACKTORIA: Lost at Sea – Walkthrough
Hello People, I have decided to do something a little different to my usual posts of interviews, book and course reviews and stuff like that to do some walkthroughs for both Hacktoria and Over the Wire. I started to do the OVW ages ago and got to busy to really put any time into it…
Learn Computer Forensics – Second Edition by William Oettinger for Packt REVIEW
Hello, I have had the absolute pleasure to be reading and working though this book ` Learn Computer Forensics: Your one-stop guide to searching, analysing, acquiring, and securing digital evidence, 2nd Edition`. “Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data…
Interview with Krzysztof (Chris) Stanko ‘The Forensic Guy’, a Mobile & Computer Forensic Examiner and co-founder of Data Rescue Labs inc
Hello, For this interview I am going to speak to someone that many of the regular visitors to the site might not be aware of Chris ‘The Forensic Guy’ Stanko. I was scrolling through Tik Tok one evening and stumbled across this guy who was brute forcing passwords on a Galaxy S9 and was fascinated…
HACKING APIS (Breaking Web Application Programming Interfaces) by Corey J Ball for No Starch Press REVIEW
Have been reading through this beauty of a book from Corey Ball. Who is the Author Corey Ball? “Corey Ball is a cybersecurity consulting manager at Moss Adams, where he leads penetration testing services. He has over 10 years of experience working in IT and cybersecurity across several industries, including aerospace, agribusiness, energy, fintech, government…
Interview with Security Researcher, Speaker Will Thomas (@BushidoToken)
Welcome back to another interview and thanks as always for popping in. I had the chance to speak to someone I really like and rate highly and is one of the really good guys, I am lucky to interview loads of great people and have yet to come across anyone that I haven’t really got…