Kamis, 14 Februari 2013

Carving with DD

Next example, we will use dd to carve a JPEG image from a chunk of RAW data. By itself, this is not a real useful exercise. There are lots of tools out [...]

Split with DD

One function we might find useful would be the ability to split images up into usable chunks, either for archiving or for use in another program. [...]

Sleuthkit, File Recovery

In this case, I will try to analyze the file able2.dd The first step we have to do is check, how many partitions in the file able2.dd. Do it with the [...]

Senin, 04 Februari 2013

Exploit: Metasploitable Linux

This time we will try to exploit Metasploitable linux. What the Metasploit Linux??? Metasploitable is an intentionally vulnerable Linux virtual machine. [...]

Transfering Crafted File

For the first time, we must make the process Information Gathering to find out what ports are open on the target/ Do this by typing the command # nmap-sV [...]

Rabu, 23 Januari 2013

Egg Hunting Eureka Email

In classic stack based buffer overflow, the buffer size is big enough to hold the shellcode. But, what will happen if there is not enough consecutive [...]