So Simple is a beginner level vulnerable box created by @roelvb79, with some rabbit holes and good methodologies to easily understand how a pentester has
In this article, we will learn how we can examine a corrupt file with the help of Exiftool to get ahead in a forensic investigation.
Broken 2020 is a beginner level virtual machine created by EuSecinfo. There was no running of public exploits, no rabbit holes in the machine, however,
Today, in this article, we will focus on various methods that attackers implement to evade detection by hiding artifacts in the victim’s system to execute
In this article, we will learn how we can use RegRipper to analyze the windows registry in the forensic investigation environment. Table of Content Introduction
A dynamic-web application, somewhere or the other allow its users to upload a file, whether its an image, a resume, a song, or anything specific.
URLs are commonly referred to as a web address, which determines the exact location of a web resource over the internet. But what if this
Have you ever wondered about the URL of the web-applications, some of them might include files from the local or the remote servers as either
Today you will learn how to install and configure MS SQL server in windows server 2019 operating system for penetration testing within the VM Ware.