Beyond Connection Logs: Understanding File Transfer Artifacts in AnyDesk ForensicsAnydesk Version: 8.1.0.0 Scenario: Analyzing Artifacts in the Standalone Version of AnyDesk (not installed version) Logfile Location…Nov 8, 2024Nov 8, 2024
FeatureUsage — Evidence of Execution ?? || AppSwitchedFeatureUsage artifact are located in NTUSER.DAT registry file under the following key:Sep 30, 2024Sep 30, 2024
CVE-2024–27198 || TeamCityCVE-2024–27198 is an authentication bypass vulnerability in the web component of TeamCity that arises from an alternative path…Mar 10, 2024Mar 10, 2024
CVE-2023–6266 || Backup Migration — vulnerable to unauthorized access of data.Let’s see how to utilize Python script to detect whether website that is utilizing “Backup Migration” plugin which might be vulnerable to…Dec 4, 20231Dec 4, 20231
CVE-2023–5504 || BackWPup || Directory Traversal Vulnerability in WordPress PluginLet’s see how to utilize Python script to detect whether website that is utilizing “BackWPup” plugin which might be vulnerable to Directory…Nov 25, 2023Nov 25, 2023
Cross-Site Scripting Vulnerability in WordPress Plugin || EmbedPress < 3.9.2Let’s see how to utilize Python script to detect whether website that is utilizing “EmbedPress” plugin which is vulnerable to Cross-Site…Nov 19, 2023Nov 19, 2023
CVE-2023–6063 || WP Fastest Cache — SQL injection vulnerabilityLet’s see how to utilize Python to detect whether website that is utilizing “WP Fastest Cache” plugin which is vulnerable to CVE-2023–6063Nov 15, 2023Nov 15, 2023
Cyber Security News Summary : 24-Oct-2023Backdoor Implant on Hacked Cisco Devices Modified to Evade DetectionOct 25, 2023Oct 25, 2023
CVE-2023–4666 || Form Maker by 10Web — Unauthenticated Arbitrary File UploadLet’s see how to utilize Python to detect whether website that is utilizing “Form Maker by 10Web” plugin which is vulnerable to…Oct 22, 2023Oct 22, 2023
CVE-2023–5360 || “Royal Elementor Addons”Let’s see how to utilize Python to detect whether website that is utilizing “Royal Elementor Addons” plugin which is vulnerable to…Oct 21, 2023Oct 21, 2023
Linux Directory StructureToday let’s take look at “well-known top-level Linux directory list”.Jul 17, 2023Jul 17, 2023
Artifacts || PsExec ExecutionLet’s see what are the few artifacts one can encounter when PsExec was executed on a target systemJul 14, 2023Jul 14, 2023
Let’s Build Active Directory Home LAOpen VirtualBox Manager and Click on “New”Jul 13, 20231Jul 13, 20231
“Ultimate Member” WordPress Plugin vulnerability || CVE-2023–3460“privilege escalation vulnerability being actively exploited in Ultimate Member WordPress plugin”Jul 2, 2023Jul 2, 2023
Does Cyber-Security require for Educational Institutes, Healthcare, and other sectors?People often think that their respective fields (apart from IT sectors) do not require cyber-security. But this is a very wrong…Feb 20, 2023Feb 20, 2023
CTF Write-up : 0xL4ughCTF 2023After long time i recently participated in “0xL4ugh” CTF. I was able to solve few challenges. Here i am sharing my approach to solve few…Feb 18, 2023Feb 18, 2023
DFIR : Zero To Hero Series : Case-0To help folks (🕵️) who are just starting their journey in DFIR field we are starting one “DFIR Zero To Hero Series” in which we will…Feb 11, 2023Feb 11, 2023
Python Mini Project — WI-FI CrackerObjective : To create script that can be utilized to crack Wi-Fi around us.Feb 10, 20231Feb 10, 20231
Python || Helpful One-Liners!! ever wondered what python can do via single line of code ?!!Sep 29, 20221Sep 29, 20221