Febri bin Sahi

Pages - Menu

▼
Kamis, 14 Februari 2013

Carving with DD

›
Next example, we will use dd to carve a JPEG image from a chunk of RAW data. By itself, this is not a real useful exercise. There are lots ...
2 komentar:

Split with DD

›
One function we might find useful would be the ability to split images up into usable chunks, either for archiving or for use in another pr...

Sleuthkit, File Recovery

›
In this case, I will try to analyze the file able2.dd The first step we have to do is check, how many partitions in the file able2.dd. Do...
Senin, 04 Februari 2013

Exploit: Metasploitable Linux

›
This time we will try to exploit Metasploitable linux. What the Metasploit Linux??? Metasploitable is an intentionally vulnerable Linux v...

Transfering Crafted File

›
For the first time, we must make the process Information Gathering to find out what ports are open on the target/ Do this by typing the co...
Rabu, 23 Januari 2013

Egg Hunting Eureka Email

›
In classic stack based buffer overflow, the buffer size is big enough to hold the shellcode. But, what will happen if there is not enou...
›
Beranda
Lihat versi web
Diberdayakan oleh Blogger.