Pages - Menu
(Pindahkan ke ...)
Beranda
▼
Kamis, 14 Februari 2013
Carving with DD
›
Next example, we will use dd to carve a JPEG image from a chunk of RAW data. By itself, this is not a real useful exercise. There are lots ...
2 komentar:
Split with DD
›
One function we might find useful would be the ability to split images up into usable chunks, either for archiving or for use in another pr...
Sleuthkit, File Recovery
›
In this case, I will try to analyze the file able2.dd The first step we have to do is check, how many partitions in the file able2.dd. Do...
Senin, 04 Februari 2013
Exploit: Metasploitable Linux
›
This time we will try to exploit Metasploitable linux. What the Metasploit Linux??? Metasploitable is an intentionally vulnerable Linux v...
Transfering Crafted File
›
For the first time, we must make the process Information Gathering to find out what ports are open on the target/ Do this by typing the co...
Rabu, 23 Januari 2013
Egg Hunting Eureka Email
›
In classic stack based buffer overflow, the buffer size is big enough to hold the shellcode. But, what will happen if there is not enou...
›
Beranda
Lihat versi web