Category Archives: Computer Forensics

A Method For Verifying Integrity And Authenticating Digital Media

Source: Forensic Focus by Martin Harran, William Farrelly & Kevin Curran Due to their massive popularity, image files, especially JPEG, offer high potential as carriers of other information. Much of the work to date on this has focused on steganographic ways of hiding information using least significant bit techniques but we believe that the findings in this project have… Read More » – Build, Host & Share Vulnerable Web Application Code

Source: In this article “ is a FREE, community based project powered by eLearnSecurity. The community allows you to build, host and share vulnerable web application code for educational and research purposes. It aims to be the largest collection of “runnable” vulnerable web applications, code samples and CMS’s online. The platform is available without any restriction to… Read More »

Maker of Smart-Grid Control Software Hacked

Source: Wired by Kim Zetter In this article “The maker of an industrial control system designed to be used with so-called smart grid networks disclosed to customers last week that hackers had breached its network and accessed project files related to a control system used in portions of the electrical grid. Telvent, which is owned by Schneider Electric,… Read More »

ShellBag Analysis

Source: Windows Incident Response Blog In this article “What are “shellbags”? To get an understanding of what “shellbags” are, I’d suggest that you start by reading Chad Tilbury’s excellent SANS Forensic blog post on the topic.  I’m not going to try to steal Chad’s thunder…he does a great job of explaining what these artifacts are, so there’s really no sense… Read More »

Redux: Are you sure SHA-1+salt is enough for passwords?

Source: F-Secure In this article “Yesterday, LinkedIn confirmed reports that some member passwords have been compromised. Here’s some info from their blog: “It is worth noting that the affected members who update their passwords and members whose passwords have not been compromised benefit from the enhanced security we just recently put in place, which includes hashing and salting of… Read More »