Kamis, 14 Februari 2013

Carving with DD

Next example, we will use dd to carve a JPEG image from a chunk of RAW data. By itself, this is not a real useful exercise. There are lots of tools out [...]

Split with DD

One function we might find useful would be the ability to split images up into usable chunks, either for archiving or for use in another program. [...]

Sleuthkit, File Recovery

In this case, I will try to analyze the file able2.dd The first step we have to do is check, how many partitions in the file able2.dd. Do it with the [...]

Senin, 04 Februari 2013

Exploit: Metasploitable Linux

This time we will try to exploit Metasploitable linux. What the Metasploit Linux??? Metasploitable is an intentionally vulnerable Linux virtual machine. [...]

Transfering Crafted File

For the first time, we must make the process Information Gathering to find out what ports are open on the target/ Do this by typing the command # nmap-sV [...]