Some graphical tools and two command line tips I’ve had to search the occurrency of a string within some very large text files, as result of a “file carving” made with Autopsy. Usually on Windows I use Notepad ++, that provides a convenient feature of ‘Search in files’, but this great tool has difficulty to open […]
You are insane! TrendMicro on its blog has published an article about a new 0-Day vulnerability that affects the WebDAV component of Microsoft Internet Information Services 6.0. The vulnerability ( CVE-2017–7269) is a bufferoverflow located into the webdav components of IIS: A remote attacker could exploit this vulnerability in the IIS WebDAV Component with a crafted […]
Yep, even in antivirus!
Using just Task manager and the command line!
My own shortlist One of the first steps that you need to perform when you deal with the forensic analysis of a compromised machine is to make a copy of volatile memory. This copy will be used for in-depth analysis using tools such as Volatility or Redline. But, which tool should be used to make […]