Last weekend, on July 13, a group of hackers going by the name of 0v1ru$ hacked into Active Directory server of SyTech, a contractor for FSB, Russia’s national intelligence service.From this server they gained access to the company’s entire network, including a JIRA instance and fileservers.
This list of tools is really useful both in penetration testing on an Android application and in reverse engineering of a suspicious application.All tools are OSS and freely available: so, enjoy!
Last saturday the Debian project has released the last version of the “universal operating system”: the clean install, using updated CD images is one of the best and simple solution, however also the upgrade process is very simple and fast.
Yes, the answer is 42! 🙂
During a forensic investigation, Windows Event Logs are the primary source of evidence.Windows Event Log analysis can help an investigator draw a timeline based on the logging information and the discovered artifacts, but a deep knowledge of events IDs is mandatory.