Blog Is in it's Archive State.
Visit federal.hashnode.dev
Thank You
👨💻BlueSmack Attack - Bluetooth Hacking👨💻
⚡What is bluesmack Attack?
Bluesmack is a cyber attack done on bluetooth enabled devices. The attack uses L2CAP (Logic Link Control And Adaptation Protocol) layer to transfer an oversized packet to the Bluetooth enabled devices, resulting in the Denial of Service (DoS) attack.
The attack can be performed in a very limited range, usually around 10 meters for the smartphones. For laptops, it can reach up to the 100 meters with powerful transmitters.
⚡Procedure For The Attack
The hacker first uses the standard tools such as l2ping that come with Linux Bluex utils package.
The I2ping tool further allows a hacker to specify the packet length with some commands. Due to this, the Bluetooth enabled devices are overwhelmed by the malicious requests from the hacker, causing the device to be inoperable by the victim.
The attack atlast affects the regular operation of the victim device and can even degrades the performance of the device.
⚡How to Avoid Such Attack
Turn the Bluetooth off when not in use. Do not store the permanent pairing PIN code on the device. Keep the Bluetooth off in public places, including restaurants, stores, airports, shopping malls, train stations, etc. If anything unusual is seen on the device, users can move to a new location to avoid this type of attack. When using Bluetooth, set the device to the hidden, or the non-discoverable mode.
Bluesmack is a cyber attack done on bluetooth enabled devices. The attack uses L2CAP (Logic Link Control And Adaptation Protocol) layer to transfer an oversized packet to the Bluetooth enabled devices, resulting in the Denial of Service (DoS) attack.
The attack can be performed in a very limited range, usually around 10 meters for the smartphones. For laptops, it can reach up to the 100 meters with powerful transmitters.
⚡Procedure For The Attack
The hacker first uses the standard tools such as l2ping that come with Linux Bluex utils package.
The I2ping tool further allows a hacker to specify the packet length with some commands. Due to this, the Bluetooth enabled devices are overwhelmed by the malicious requests from the hacker, causing the device to be inoperable by the victim.
The attack atlast affects the regular operation of the victim device and can even degrades the performance of the device.
⚡How to Avoid Such Attack
Turn the Bluetooth off when not in use. Do not store the permanent pairing PIN code on the device. Keep the Bluetooth off in public places, including restaurants, stores, airports, shopping malls, train stations, etc. If anything unusual is seen on the device, users can move to a new location to avoid this type of attack. When using Bluetooth, set the device to the hidden, or the non-discoverable mode.
👨💻Man In The Middle Attack👨💻
(MITM Attack
In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, monkey-in-the-middle (MITM) or person-in-the-middle (PITM) attack is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other. One example of a MITM attack is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all relevant messages passing between the two victims and inject new ones. This is straightforward in many circumstances; for example, an attacker within the reception range of an unencrypted Wi-Fi access point could insert themselves as a man-in-the-middle.
As it aims to circumvent mutual authentication, a MITM attack can succeed only when the attacker impersonates each endpoint sufficiently well to satisfy their expectations. Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, TLS can authenticate one or both parties using a mutually trusted certificate authority.
As it aims to circumvent mutual authentication, a MITM attack can succeed only when the attacker impersonates each endpoint sufficiently well to satisfy their expectations. Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, TLS can authenticate one or both parties using a mutually trusted certificate authority.
👨💻Top 10 Apps to improve your Devloping Skills👨💻
1. Notes App
Create and store your notes for later Use
- User can create anote
- User can edit a note
- user can delete a note
- On window close, notes will be saved to the database.
2. QUIZ APP
Practice and test your knowledge by answering questions in á quiz app.
As a dev, you can create a quiz app for testing coding skills of other devs.
3. RECIPE APP
Objective - manage recipes so that they are easy to follow
4. EXPENSE TRACKER
Idea is to manage your money and finances, allow you to see your spending by category, setup bill payments, keep track of your incomes, and plan for savings.
5. RANDOM PASSWORD GENERATOR
Give users a metric if the password is strong or not.
6. SPEED TYPING TEST
Coder should type fast and correctly, right? It can be usefull for you as well.
7. IMAGE DOWNLOADER
Use a web crawler and try to download every image from a website.
8. THE CHAT APP
Creating a chat app is really, convinient, since it's a popular feature. Also it is a great practice opportunity to improve skills.
9. E-COMMERCE ONLINESTORE
Simple online store gives users the feature to sell/purchase products. Add to cart and payment gateway are the go to features for such an app.
10. BOOK FINDER APP
Create an app that will show users to search for books by entering a query. And then you can display the resulting books with the corresponding data.
1. Notes App
Create and store your notes for later Use
- User can create anote
- User can edit a note
- user can delete a note
- On window close, notes will be saved to the database.
2. QUIZ APP
Practice and test your knowledge by answering questions in á quiz app.
As a dev, you can create a quiz app for testing coding skills of other devs.
3. RECIPE APP
Objective - manage recipes so that they are easy to follow
4. EXPENSE TRACKER
Idea is to manage your money and finances, allow you to see your spending by category, setup bill payments, keep track of your incomes, and plan for savings.
5. RANDOM PASSWORD GENERATOR
Give users a metric if the password is strong or not.
6. SPEED TYPING TEST
Coder should type fast and correctly, right? It can be usefull for you as well.
7. IMAGE DOWNLOADER
Use a web crawler and try to download every image from a website.
8. THE CHAT APP
Creating a chat app is really, convinient, since it's a popular feature. Also it is a great practice opportunity to improve skills.
9. E-COMMERCE ONLINESTORE
Simple online store gives users the feature to sell/purchase products. Add to cart and payment gateway are the go to features for such an app.
10. BOOK FINDER APP
Create an app that will show users to search for books by entering a query. And then you can display the resulting books with the corresponding data.
🔰 The Best Online Paraphrasing Tools 🔰
1 RewriteGuru
2 Spin Rewriter
3 The Best Spinner 4.0
4 CleverSpinner
5 Word Al
6 Chimp Rewriter
2 Spin Rewriter
3 The Best Spinner 4.0
4 CleverSpinner
5 Word Al
6 Chimp Rewriter
🗃 BUG BOUNTY 👨💻
✳️ A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
✳️ These programs allow the developers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread abuse. Bug bounty programs have been implemented by a large number of organizations, including Mozilla,Facebook, Yahoo!,Google, Reddit, Square, Microsoft and the Internet bug bounty.
✳️ Companies outside the technology industry, including traditionally conservative organizations like the United States Department of Defense, have started using bug bounty programs. The Pentagon’s use of bug bounty programs is part of a posture shift that has seen several US Government Agencies reverse course from threatening white hat hackers with legal recourse to inviting them to participate as part of a comprehensive vulnerability disclosure framework or policy.
✳️ So briefly, If u report a valid bug then u will be rewarded with cash price.
✳️ These programs allow the developers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread abuse. Bug bounty programs have been implemented by a large number of organizations, including Mozilla,Facebook, Yahoo!,Google, Reddit, Square, Microsoft and the Internet bug bounty.
✳️ Companies outside the technology industry, including traditionally conservative organizations like the United States Department of Defense, have started using bug bounty programs. The Pentagon’s use of bug bounty programs is part of a posture shift that has seen several US Government Agencies reverse course from threatening white hat hackers with legal recourse to inviting them to participate as part of a comprehensive vulnerability disclosure framework or policy.
✳️ So briefly, If u report a valid bug then u will be rewarded with cash price.
Basics of computer Virus
The Basics of the Computer Virus A plethora of negative magazine articles and books have catalyzed a new kind of hypochondria among computer users: an unreasonable fear of computer viruses. This hypochondria is possible because a) computers are very complex machines which will often behave in ways which are not obvious to the average user, and b) computer viruses are still extremely rare. Thus, most computer users have never experienced a computer virus attack. Their only experience has been what they’ve read about or heard about (and only the worst problems make it into print). This combination of ignorance, inexperience and fear-provoking reports of danger is the perfect formula for mass hysteria.
Most problems people have with computers are simply their own fault. For example, they accidentally delete all the files in their current directory rather than in another directory, as they intended, or they format the wrong disk. Or perhaps someone routinely does something wrong out of ignorance, like turning the computer off in the middle of a program, causing files to get scrambled. Following close on the heels of these kinds of problems are hardware problems, like a misaligned floppy drive or a hard disk failure. Such routine problems are made worse than necessary when users do not plan for them, and fail to back up their work on a regular basis. This stupidity can easily turn a problem that might have cost $300 for a new hard disk into a nightmare which will ultimately cost tens of thousands of dollars. When such a disaster happens, it is human nature to want to find someone or something else to blame, rather than admitting it is your own fault. Viruses have proven to be an excellent scapegoat for all kinds of problems.
Of course, there are times when people want to destroy computers. In a time of war, a country may want to hamstring their enemy by destroying their intelligence databases. If an employee is maltreated by his employer, he may want to retaliate, and he may not be able to get legal recourse. One can also imagine a totalitarian state trying to control their citizens’ every move with computers,
and a group of good men trying to stop it. Although one could smash a computer, or physically destroy its data, one does not always have access to the machine that will be the object of the attack. At other times, one may not be able to perpetrate a physical attack without facing certain discovery and prosecution. While an unprovoked attack, and even revenge, may not be right, people still do choose such avenues (and even a purely defensive attack is sure to be considered wrong by an arrogant agressor). For the sophisticated programmer, though, physical access to the machine is not necessary to cripple it.
People who have attacked computers and their data have invented several different kinds of programs. Since one must obviously conceal the destructive nature of a program to dupe somebody into executing it, deceptive tricks are an absolute must in this game.
The first and oldest trick is the “trojan horse.” The trojan horse may appear to be a useful program, but it is in fact destructive. It entices you to execute it because it promises to be a worthwhile program for your computer--new and better ways to make your machine more effective--but when you execute the program, surprise! Secondly, destructive code can be hidden as a “logic bomb” inside of an otherwise useful program. You use the program on a regular basis, and it works well. Yet, when a certain event occurs, such as a certain date on the system clock, the logic bomb “explodes” and does damage. These programs are designed specifically to destroy computer data, and are usually deployed by their author or a willing associate on the computer system that will be the object of the attack.
There is always a risk to the perpetrator of such destruction.
He must somehow deploy destructive code on the target machine without getting caught. If that means he has to put the program raise metaphysical questions just by saying that a living organism has “goals,” they certainly seem to, if the onlooker has not been educated out of that way of thinking. And certainly the idea of a goal would apply to a computer program, since it was written by someone with a purpose in mind. So in this sense, a computer virus has the same two goals as a living organism: to survive and to reproduce. The simplest of living organisms depend only on the inanimate, inorganic environment for what they need to achieve their goals. They draw raw materials from their surroundings, and use energy from the sun to synthesize whatever chemicals they need to do the job. The organism is not dependent on another form of life which it must somehow eat, or attack to continue its existence. In the same way, a computer virus uses the computer system’s resources like disk storage and CPU time to achieve its goals. Specifically, it does not attack other self-reproducing automata and “eat” them in a manner similar to a biological virus. Instead, the computer virus is the simplest unit of life in this electronic world inside the computer. (Of course, it is conceivable that one could write a more sophisticated program which would behave like a biological virus, and attack other SRA’s.) Before the advent of personal computers, the electronic domain in which a computer virus might “live” was extremely limited. Computers were rare, and they had many different kinds of CPU’s and operating systems. So a tinkerer might have written a virus, and let it execute on his system. However, there would have been little danger of it escaping and infecting other machines. It remained under the control of its master. The age of the mass-produced computer opened up a whole new realm for viruses, though.
Millions of machines all around the world, all with the same basic architecture and operating system make it possible for a computer virus to escape and begin a life of its own. It can hop from machine to machine, accomplishing the goals programmed into it, with no one to control it and few who can stop it. And so the virus became a viable form of electronic life in the 1980’s.
Now one can create self-reproducing automata that are not computer viruses. For example, the famous mathematician John von Neumann invented a self-reproducing automaton “living” in a grid array of cells which had 29 possible states. In theory, automaton could be modeled on a computer. However, it was not a program that would run directly on any computer known in von Neumann’s day. Likewise, one could write a program which simply copied itself to another file. For example “1.COM” could create “2.COM” which would be an exact copy of itself (both program files on an IBM PC style machine.) The problem with such concoctions is viability. Their continued existence is completely dependent on the man at the console. A more sophisticated version of such a program might rely on deceiving that man at the console to propagate itself. This program is known as a worm. The computer virus overcomes the roadblock of operator control by hiding itself in other programs. Thus it gains access to the CPU simply because people run programs that it happens to have attached itself to without their knowledge. The ability to attach itself to other programs is what makes the virus a viable electronic life form. That is what puts it in a class by itself. The fact that a computer virus attaches itself to other programs earned it the name “virus.” However that analogy is wrong since the programs it attaches to are not in any sense alive.
Most problems people have with computers are simply their own fault. For example, they accidentally delete all the files in their current directory rather than in another directory, as they intended, or they format the wrong disk. Or perhaps someone routinely does something wrong out of ignorance, like turning the computer off in the middle of a program, causing files to get scrambled. Following close on the heels of these kinds of problems are hardware problems, like a misaligned floppy drive or a hard disk failure. Such routine problems are made worse than necessary when users do not plan for them, and fail to back up their work on a regular basis. This stupidity can easily turn a problem that might have cost $300 for a new hard disk into a nightmare which will ultimately cost tens of thousands of dollars. When such a disaster happens, it is human nature to want to find someone or something else to blame, rather than admitting it is your own fault. Viruses have proven to be an excellent scapegoat for all kinds of problems.
Of course, there are times when people want to destroy computers. In a time of war, a country may want to hamstring their enemy by destroying their intelligence databases. If an employee is maltreated by his employer, he may want to retaliate, and he may not be able to get legal recourse. One can also imagine a totalitarian state trying to control their citizens’ every move with computers,
and a group of good men trying to stop it. Although one could smash a computer, or physically destroy its data, one does not always have access to the machine that will be the object of the attack. At other times, one may not be able to perpetrate a physical attack without facing certain discovery and prosecution. While an unprovoked attack, and even revenge, may not be right, people still do choose such avenues (and even a purely defensive attack is sure to be considered wrong by an arrogant agressor). For the sophisticated programmer, though, physical access to the machine is not necessary to cripple it.
People who have attacked computers and their data have invented several different kinds of programs. Since one must obviously conceal the destructive nature of a program to dupe somebody into executing it, deceptive tricks are an absolute must in this game.
The first and oldest trick is the “trojan horse.” The trojan horse may appear to be a useful program, but it is in fact destructive. It entices you to execute it because it promises to be a worthwhile program for your computer--new and better ways to make your machine more effective--but when you execute the program, surprise! Secondly, destructive code can be hidden as a “logic bomb” inside of an otherwise useful program. You use the program on a regular basis, and it works well. Yet, when a certain event occurs, such as a certain date on the system clock, the logic bomb “explodes” and does damage. These programs are designed specifically to destroy computer data, and are usually deployed by their author or a willing associate on the computer system that will be the object of the attack.
There is always a risk to the perpetrator of such destruction.
He must somehow deploy destructive code on the target machine without getting caught. If that means he has to put the program raise metaphysical questions just by saying that a living organism has “goals,” they certainly seem to, if the onlooker has not been educated out of that way of thinking. And certainly the idea of a goal would apply to a computer program, since it was written by someone with a purpose in mind. So in this sense, a computer virus has the same two goals as a living organism: to survive and to reproduce. The simplest of living organisms depend only on the inanimate, inorganic environment for what they need to achieve their goals. They draw raw materials from their surroundings, and use energy from the sun to synthesize whatever chemicals they need to do the job. The organism is not dependent on another form of life which it must somehow eat, or attack to continue its existence. In the same way, a computer virus uses the computer system’s resources like disk storage and CPU time to achieve its goals. Specifically, it does not attack other self-reproducing automata and “eat” them in a manner similar to a biological virus. Instead, the computer virus is the simplest unit of life in this electronic world inside the computer. (Of course, it is conceivable that one could write a more sophisticated program which would behave like a biological virus, and attack other SRA’s.) Before the advent of personal computers, the electronic domain in which a computer virus might “live” was extremely limited. Computers were rare, and they had many different kinds of CPU’s and operating systems. So a tinkerer might have written a virus, and let it execute on his system. However, there would have been little danger of it escaping and infecting other machines. It remained under the control of its master. The age of the mass-produced computer opened up a whole new realm for viruses, though.
Millions of machines all around the world, all with the same basic architecture and operating system make it possible for a computer virus to escape and begin a life of its own. It can hop from machine to machine, accomplishing the goals programmed into it, with no one to control it and few who can stop it. And so the virus became a viable form of electronic life in the 1980’s.
Now one can create self-reproducing automata that are not computer viruses. For example, the famous mathematician John von Neumann invented a self-reproducing automaton “living” in a grid array of cells which had 29 possible states. In theory, automaton could be modeled on a computer. However, it was not a program that would run directly on any computer known in von Neumann’s day. Likewise, one could write a program which simply copied itself to another file. For example “1.COM” could create “2.COM” which would be an exact copy of itself (both program files on an IBM PC style machine.) The problem with such concoctions is viability. Their continued existence is completely dependent on the man at the console. A more sophisticated version of such a program might rely on deceiving that man at the console to propagate itself. This program is known as a worm. The computer virus overcomes the roadblock of operator control by hiding itself in other programs. Thus it gains access to the CPU simply because people run programs that it happens to have attached itself to without their knowledge. The ability to attach itself to other programs is what makes the virus a viable electronic life form. That is what puts it in a class by itself. The fact that a computer virus attaches itself to other programs earned it the name “virus.” However that analogy is wrong since the programs it attaches to are not in any sense alive.
What Is an Operating System?
Computers don’t directly understand human languages. All they understand is binary machine language (0s and 1s). But for humans, it’s extremely difficult to communicate with computers in that form. Software programs are the interfaces between humans and computers that help both to communicate with each other easily. There are two categories of software: system software and application software . An operating system is the system software that helps manage and coordinate all hardware and software resources. Common tasks include device management, multitasking, user management, memory allocation, and so on. The operating system also provides a base or foundation for the execution of other application software. Some of the most widely used operating systems are Microsoft Windows, Linux (Red Hat, Fedora, CentOS, Ubuntu, AIX, BSD, and others), and Android/iOS for smart phones and tablet PCs. The operating system plays a crucial role from the security perspective. However secure the application may be, if the underlying operating system is vulnerable and unpatched , then it becomes a soft and easy target for hackers and intruders. Hence, from a defensive as well as an offensive perspective, it is important to familiarize yourself with the basics of an operating system and get acquainted with various security features that the operating system offers. The following sections briefly discuss some of these features.
What is a voice?
A voice is more than just a string of sounds. Voices are inherently complex. They signal a great deal of information in addition to the intended linguistic message: the speaker’s sex, for example, or their emotional state or state of health. Some of this information is clearly of potential forensic importance. However, the different types of information conveyed by a voice are not signalled in separate channels, but are convolved together with the linguistic message. Knowledge of how this occurs is necessary to interpret the ubiquitous variation in speech, and to assess the comparability of speech samples.
Familiar things like voices we tend to take for granted. In this case familiarity breeds false understanding. We assume they are simple, and that we know about them.
This is especially typical for language, and phenomena that are intimately connected with language (Lyons 1981: 38). Language is absolutely fascinating, and nearly everyone has an unreflected opinion on aspects of their own language. Although not all languages have a separate word for voice, all languages have words for describing the way speakers sound when they talk: in English, for example, they can be harsh, kind,
sexy, masculine, gruff, melodious, sibilant, booming, staccato, etc. (Laver 1991f).
A voice is, however, an extremely complex object, and a large part of this complexity lies in its relationship with its owner. When comparing voices, it is imperative that one knows about what one is comparing. Consequently, it is very important to have a model for the information content in a voice, and how these different components interrelate and interact. A model for the voice is presented in
Familiar things like voices we tend to take for granted. In this case familiarity breeds false understanding. We assume they are simple, and that we know about them.
This is especially typical for language, and phenomena that are intimately connected with language (Lyons 1981: 38). Language is absolutely fascinating, and nearly everyone has an unreflected opinion on aspects of their own language. Although not all languages have a separate word for voice, all languages have words for describing the way speakers sound when they talk: in English, for example, they can be harsh, kind,
sexy, masculine, gruff, melodious, sibilant, booming, staccato, etc. (Laver 1991f).
A voice is, however, an extremely complex object, and a large part of this complexity lies in its relationship with its owner. When comparing voices, it is imperative that one knows about what one is comparing. Consequently, it is very important to have a model for the information content in a voice, and how these different components interrelate and interact. A model for the voice is presented in
What is Mobile forensics?
Digital forensics is a branch of forensic science focusing on the recovery and investigation of raw data residing in electronic or digital devices. The goal of the process is to extract and recover any information from a digital device without altering the data present on the device. Over the years, digital forensics has grown, along with the rapid growth of computers and various other digital devices. There are various branches of digital forensics based on the type of digital device involved, such as computer forensics, network forensics,
mobile forensics, and so on.Mobile forensics is a branch of digital forensics related to the recovery of digital evidence from mobile devices. Forensically sound is a term used extensively in the digital forensics community to qualify and justify the use of a particular forensic technology or methodology. The main principle for a sound forensic examination of digital evidence is that the original evidence must not be modified. This is extremely difficult with mobile devices. Some forensic tools require a communication vector with the mobile device, and thus a standard write protection will not work during forensic acquisition. Other forensic acquisition methods may involve removing a chip or installing a bootloader on the mobile device prior to extracting data for forensic examinations. In cases where the examination or data acquisition is not possible without changing the configuration of the device, the procedure and the changes must be tested, validated, and documented. Following proper methodology and guidelines is crucial in examining mobile devices as it yields the most valuable data. As with any evidence gathering, not following the proper procedure during the examination can result in loss or damage of evidence or render it inadmissible in court.
The mobile forensics process is broken down into three main categories—seizure,
acquisition, and examination/analysis. Forensic examiners face some challenges while seizing the mobile device as a source of evidence. At the crime scene, if the mobile device is found switched off, the examiner should place the device in a Faraday bag to prevent changes should the device automatically power on. Faraday bags are specifically designed to isolate the phone from the network. A Faraday bag can be found at: http://www.amazon.
com/Black-Hole-Faraday-Bag-Isolation/dp/B0091WILY0.
If the phone is found switched on, switching it off has a lot of concerns attached to it. If the phone is locked by a PIN or password, or encrypted, the examiner will be required to bypass the lock or determine the PIN to access the device. Mobile phones are networked devices and can send and receive data through different sources, such as telecommunication systems, Wi-Fi access points, and Bluetooth. So, if the phone is in a running state, a criminal can securely erase the data stored on the phone by executing a remote wipe command. When a phone is switched on, it should be placed in a Faraday bag.
If possible, prior to placing the mobile device in the Faraday bag, disconnect it from the network to protect the evidence by enabling the flight mode and disabling all network connections (Wi-Fi, GPS, hotspots, and so on). This will also preserve the battery, which will drain while in a Faraday bag, and protect against leaks in the Faraday bag. Once the mobile device is seized properly, the examiner may need several forensic tools to acquire and analyze the data stored on the phone.
mobile forensics, and so on.Mobile forensics is a branch of digital forensics related to the recovery of digital evidence from mobile devices. Forensically sound is a term used extensively in the digital forensics community to qualify and justify the use of a particular forensic technology or methodology. The main principle for a sound forensic examination of digital evidence is that the original evidence must not be modified. This is extremely difficult with mobile devices. Some forensic tools require a communication vector with the mobile device, and thus a standard write protection will not work during forensic acquisition. Other forensic acquisition methods may involve removing a chip or installing a bootloader on the mobile device prior to extracting data for forensic examinations. In cases where the examination or data acquisition is not possible without changing the configuration of the device, the procedure and the changes must be tested, validated, and documented. Following proper methodology and guidelines is crucial in examining mobile devices as it yields the most valuable data. As with any evidence gathering, not following the proper procedure during the examination can result in loss or damage of evidence or render it inadmissible in court.
The mobile forensics process is broken down into three main categories—seizure,
acquisition, and examination/analysis. Forensic examiners face some challenges while seizing the mobile device as a source of evidence. At the crime scene, if the mobile device is found switched off, the examiner should place the device in a Faraday bag to prevent changes should the device automatically power on. Faraday bags are specifically designed to isolate the phone from the network. A Faraday bag can be found at: http://www.amazon.
com/Black-Hole-Faraday-Bag-Isolation/dp/B0091WILY0.
If the phone is found switched on, switching it off has a lot of concerns attached to it. If the phone is locked by a PIN or password, or encrypted, the examiner will be required to bypass the lock or determine the PIN to access the device. Mobile phones are networked devices and can send and receive data through different sources, such as telecommunication systems, Wi-Fi access points, and Bluetooth. So, if the phone is in a running state, a criminal can securely erase the data stored on the phone by executing a remote wipe command. When a phone is switched on, it should be placed in a Faraday bag.
If possible, prior to placing the mobile device in the Faraday bag, disconnect it from the network to protect the evidence by enabling the flight mode and disabling all network connections (Wi-Fi, GPS, hotspots, and so on). This will also preserve the battery, which will drain while in a Faraday bag, and protect against leaks in the Faraday bag. Once the mobile device is seized properly, the examiner may need several forensic tools to acquire and analyze the data stored on the phone.
Why do we need mobile forensics?
According to Statista reports, the number of mobile phone users in the world is expected to pass 5 billion by 2019. The world is witnessing technology and user migration from desktops to mobile phones. Most of the growth in the mobile market can be attributed to the continued demand for smartphones. The following graph, sourced from https://www.
statista.com/, shows the actual and estimated growth of smartphones from the year 2009 to the year 2019:
According to an Ericsson report, global mobile data traffic will reach 71 exabytes per month by 2022, from 8.8 exabytes in 2017, a compound annual growth rate of 42 percent.
Smartphones of today, such as the Apple iPhone and the Samsung Galaxy series, are compact forms of computers with high performance, huge storage, and enhanced functionality. Mobile phones are the most personal electronic device that a user accesses.
They are used to perform simple communication tasks, such as calling and texting, while still providing support for internet browsing, email, taking photos and videos, creating and storing documents, identifying locations with GPS services, and managing business tasks.
As new features and applications are incorporated into mobile phones, the amount of information stored on the devices is continuously growing. Mobile phones become portable data carriers, and they keep track of all your movements. With the increasing prevalence of mobile phones in people's daily lives and in crime, data acquired from phones becomes an invaluable source of evidence for investigations relating to criminal, civil, and even highprofile cases. It is rare to conduct a digital forensic investigation that does not include a phone. Mobile device call logs and GPS data were used to help solve the attempted bombing in Times Square, New York, in 2010. The details of the case can be found at: https://www.forensicon.com/forensics-blotter/cell-phone-email-forensicsinvestigation-cracks-nyc-times-square-car-bombing-case/.
The science behind recovering digital evidence from mobile phones is called mobile forensics. Digital evidence is defined as information and data that is stored on, received, or transmitted by an electronic device that is used for investigations. Digital evidence encompasses any and all digital data that can be used as evidence in a case.
statista.com/, shows the actual and estimated growth of smartphones from the year 2009 to the year 2019:
According to an Ericsson report, global mobile data traffic will reach 71 exabytes per month by 2022, from 8.8 exabytes in 2017, a compound annual growth rate of 42 percent.
Smartphones of today, such as the Apple iPhone and the Samsung Galaxy series, are compact forms of computers with high performance, huge storage, and enhanced functionality. Mobile phones are the most personal electronic device that a user accesses.
They are used to perform simple communication tasks, such as calling and texting, while still providing support for internet browsing, email, taking photos and videos, creating and storing documents, identifying locations with GPS services, and managing business tasks.
As new features and applications are incorporated into mobile phones, the amount of information stored on the devices is continuously growing. Mobile phones become portable data carriers, and they keep track of all your movements. With the increasing prevalence of mobile phones in people's daily lives and in crime, data acquired from phones becomes an invaluable source of evidence for investigations relating to criminal, civil, and even highprofile cases. It is rare to conduct a digital forensic investigation that does not include a phone. Mobile device call logs and GPS data were used to help solve the attempted bombing in Times Square, New York, in 2010. The details of the case can be found at: https://www.forensicon.com/forensics-blotter/cell-phone-email-forensicsinvestigation-cracks-nyc-times-square-car-bombing-case/.
The science behind recovering digital evidence from mobile phones is called mobile forensics. Digital evidence is defined as information and data that is stored on, received, or transmitted by an electronic device that is used for investigations. Digital evidence encompasses any and all digital data that can be used as evidence in a case.
ABOUT Anonymizer
People often surf the web under the illusion that their actions
are private and anonymous. Unfortunately for them such is not
the case.
Each time you visit a site, you leave a visiting card that reveals
where you are coming from; what kind of computer you use;
and various other details. Each visit of yours is logged!
An anonymizer or an anonymous proxy is a tool that attempts
to make activity on the internet untraceable. It empowers you
to surf the web without revealing any personal information.
Not only does it hide your IP address and internet history but
also unblocks the restricted websites and lets you navigate past
web-filters.
The problem arises when individuals use this to avoid the
consequences of engaging in criminal, disruptive or socially
unacceptable behavior online.
are private and anonymous. Unfortunately for them such is not
the case.
Each time you visit a site, you leave a visiting card that reveals
where you are coming from; what kind of computer you use;
and various other details. Each visit of yours is logged!
An anonymizer or an anonymous proxy is a tool that attempts
to make activity on the internet untraceable. It empowers you
to surf the web without revealing any personal information.
Not only does it hide your IP address and internet history but
also unblocks the restricted websites and lets you navigate past
web-filters.
The problem arises when individuals use this to avoid the
consequences of engaging in criminal, disruptive or socially
unacceptable behavior online.
How To Fix Pen Drive Empty Problem Even The Drive Is Full
⚜ Sometimes due to some hardware/software issue, our computer fails to recognize the hard drive and even if it does. It might show you some problem like empty USB drive even if the drive is full. So, here Assigning New drive letter might fix your problem and it is an easy task. So, make sure to apply this method first to check whether it’s working or not in your case. If it works, then you don’t need to go through the next methods.
1⃣ First of all, reinsert your USB drive on your computer and then right click on ‘My Computer’ and then click on ‘Manage.’
2⃣ Now you will get to see many options in Computer Management. Here you need to select the option ‘Disk Management.’
3⃣ Now you need to find your USB drive and then right-click on it and select the option ‘Change Drive Letters and Paths’
4⃣ Now you will be asked to choose a drive letter or Path. Simply select your drive letter and click ‘Ok’ button.
✅ That’s it! Now remove your USB drive and reinsert it and check whether files inside your USB drive are showing or not.
1⃣ First of all, reinsert your USB drive on your computer and then right click on ‘My Computer’ and then click on ‘Manage.’
2⃣ Now you will get to see many options in Computer Management. Here you need to select the option ‘Disk Management.’
3⃣ Now you need to find your USB drive and then right-click on it and select the option ‘Change Drive Letters and Paths’
4⃣ Now you will be asked to choose a drive letter or Path. Simply select your drive letter and click ‘Ok’ button.
✅ That’s it! Now remove your USB drive and reinsert it and check whether files inside your USB drive are showing or not.
DIFFERENCE BETWEEN PROGRAMMING LANGUAGES
🔺Programming Languages🔺
A programming language is simply a set of rules that tells a computer system what to do and how to do it. It gives the computer instructions for performing a particular task. A programming language consists of a series of well-defined steps which the computer must strictly follow in order to produce the desired output. Failure to follow the steps as it has been defined will result in an error and sometimes the computer system won’t perform as intended.
🔺Markup Languages🔺
From the name, we can easily tell that a markup language is all about visuals and looks. Basically, this is the primary role of markup languages. They are used for the presentation of data. They determine the final outlook or appearance of the data that needs to be displayed on the software. Two of the most powerful markup languages are HTML and XML. If you have used both of these two languages, you should be aware of the impact that they can have on a website in terms of the aesthetics.
🔺Scripting Languages🔺
A scripting language is a type of language that is designed to integrate and communicate with other programming languages. Examples of commonly used scripting languages include JavaScript, VBScript, PHP among others. There are mostly used in conjunction with other languages, either programming or markup languages. For example, PHP which is a scripting language is mostly used in conjunction with HTML. It is safe to say that all scripting languages are programming languages, but not all programming languages are scripting languages.
Wʜᴀᴛ ɪs Pᴀssᴡᴏʀᴅ Cʀᴀᴄᴋɪɴɢ?
Pᴀssᴡᴏʀᴅ ᴄʀᴀᴄᴋɪɴɢ ɪs ᴛʜᴇ ᴘʀᴏᴄᴇss ᴏғ ɢᴜᴇssɪɴɢ ᴏʀ ʀᴇᴄᴏᴠᴇʀɪɴɢ ᴀ ᴘᴀssᴡᴏʀᴅ ғʀᴏᴍ sᴛᴏʀᴇᴅ ʟᴏᴄᴀᴛɪᴏɴs ᴏʀ ғʀᴏᴍ ᴅᴀᴛᴀ ᴛʀᴀɴsᴍɪssɪᴏɴ sʏsᴛᴇᴍ. Iᴛ ɪs ᴜsᴇᴅ ᴛᴏ ɢᴇᴛ ᴀ ᴘᴀssᴡᴏʀᴅ ғᴏʀ ᴜɴᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴀᴄᴄᴇss ᴏʀ ᴛᴏ ʀᴇᴄᴏᴠᴇʀ ᴀ ғᴏʀɢᴏᴛᴛᴇɴ ᴘᴀssᴡᴏʀᴅ. Iɴ ᴘᴇɴᴇᴛʀᴀᴛɪᴏɴ ᴛᴇsᴛɪɴɢ, ɪᴛ ɪs ᴜsᴇᴅ ᴛᴏ ᴄʜᴇᴄᴋ ᴛʜᴇ sᴇᴄᴜʀɪᴛʏ ᴏғ ᴀɴ ᴀᴘᴘʟɪᴄᴀᴛɪᴏɴ.
Iɴ ʀᴇᴄᴇɴᴛ ʏᴇᴀʀs, ᴄᴏᴍᴘᴜᴛᴇʀ ᴘʀᴏɢʀᴀᴍᴍᴇʀs ʜᴀᴠᴇ ʙᴇᴇɴ ᴛʀʏɪɴɢ ᴛᴏ ᴄʀᴇᴀᴛᴇ ᴀʟɢᴏʀɪᴛʜᴍs ғᴏʀ ᴘᴀssᴡᴏʀᴅ ᴄʀᴀᴄᴋɪɴɢ ɪɴ ʟᴇss ᴛɪᴍᴇ. Mᴏsᴛ ᴏғ ᴛʜᴇ ᴘᴀssᴡᴏʀᴅ ᴄʀᴀᴄᴋɪɴɢ ᴛᴏᴏʟs ᴛʀʏ ᴛᴏ ʟᴏɢɪɴ ᴡɪᴛʜ ᴇᴠᴇʀʏ ᴘᴏssɪʙʟᴇ ᴄᴏᴍʙɪɴᴀᴛɪᴏɴ ᴏғ ᴡᴏʀᴅs. Iғ ʟᴏɢɪɴ ɪs sᴜᴄᴄᴇssғᴜʟ, ɪᴛ ᴍᴇᴀɴs ᴛʜᴇ ᴘᴀssᴡᴏʀᴅ ᴡᴀs ғᴏᴜɴᴅ. Iғ ᴛʜᴇ ᴘᴀssᴡᴏʀᴅ ɪs sᴛʀᴏɴɢ ᴇɴᴏᴜɢʜ ᴡɪᴛʜ ᴀ ᴄᴏᴍʙɪɴᴀᴛɪᴏɴ ᴏғ ɴᴜᴍʙᴇʀs, ᴄʜᴀʀᴀᴄᴛᴇʀs ᴀɴᴅ sᴘᴇᴄɪᴀʟ ᴄʜᴀʀᴀᴄᴛᴇʀs, ᴛʜɪs ᴄʀᴀᴄᴋɪɴɢ ᴍᴇᴛʜᴏᴅ ᴍᴀʏ ᴛᴀᴋᴇ ʜᴏᴜʀs ᴛᴏ ᴡᴇᴇᴋs ᴏʀ ᴍᴏɴᴛʜs. A ғᴇᴡ ᴘᴀssᴡᴏʀᴅ ᴄʀᴀᴄᴋɪɴɢ ᴛᴏᴏʟs ᴜsᴇ ᴀ ᴅɪᴄᴛɪᴏɴᴀʀʏ ᴛʜᴀᴛ ᴄᴏɴᴛᴀɪɴs ᴘᴀssᴡᴏʀᴅs. Tʜᴇsᴇ ᴛᴏᴏʟs ᴀʀᴇ ᴛᴏᴛᴀʟʟʏ ᴅᴇᴘᴇɴᴅᴇɴᴛ ᴏɴ ᴛʜᴇ ᴅɪᴄᴛɪᴏɴᴀʀʏ, sᴏ sᴜᴄᴄᴇss ʀᴀᴛᴇ ɪs ʟᴏᴡᴇʀ.
Iɴ ʀᴇᴄᴇɴᴛ ʏᴇᴀʀs, ᴄᴏᴍᴘᴜᴛᴇʀ ᴘʀᴏɢʀᴀᴍᴍᴇʀs ʜᴀᴠᴇ ʙᴇᴇɴ ᴛʀʏɪɴɢ ᴛᴏ ᴄʀᴇᴀᴛᴇ ᴀʟɢᴏʀɪᴛʜᴍs ғᴏʀ ᴘᴀssᴡᴏʀᴅ ᴄʀᴀᴄᴋɪɴɢ ɪɴ ʟᴇss ᴛɪᴍᴇ. Mᴏsᴛ ᴏғ ᴛʜᴇ ᴘᴀssᴡᴏʀᴅ ᴄʀᴀᴄᴋɪɴɢ ᴛᴏᴏʟs ᴛʀʏ ᴛᴏ ʟᴏɢɪɴ ᴡɪᴛʜ ᴇᴠᴇʀʏ ᴘᴏssɪʙʟᴇ ᴄᴏᴍʙɪɴᴀᴛɪᴏɴ ᴏғ ᴡᴏʀᴅs. Iғ ʟᴏɢɪɴ ɪs sᴜᴄᴄᴇssғᴜʟ, ɪᴛ ᴍᴇᴀɴs ᴛʜᴇ ᴘᴀssᴡᴏʀᴅ ᴡᴀs ғᴏᴜɴᴅ. Iғ ᴛʜᴇ ᴘᴀssᴡᴏʀᴅ ɪs sᴛʀᴏɴɢ ᴇɴᴏᴜɢʜ ᴡɪᴛʜ ᴀ ᴄᴏᴍʙɪɴᴀᴛɪᴏɴ ᴏғ ɴᴜᴍʙᴇʀs, ᴄʜᴀʀᴀᴄᴛᴇʀs ᴀɴᴅ sᴘᴇᴄɪᴀʟ ᴄʜᴀʀᴀᴄᴛᴇʀs, ᴛʜɪs ᴄʀᴀᴄᴋɪɴɢ ᴍᴇᴛʜᴏᴅ ᴍᴀʏ ᴛᴀᴋᴇ ʜᴏᴜʀs ᴛᴏ ᴡᴇᴇᴋs ᴏʀ ᴍᴏɴᴛʜs. A ғᴇᴡ ᴘᴀssᴡᴏʀᴅ ᴄʀᴀᴄᴋɪɴɢ ᴛᴏᴏʟs ᴜsᴇ ᴀ ᴅɪᴄᴛɪᴏɴᴀʀʏ ᴛʜᴀᴛ ᴄᴏɴᴛᴀɪɴs ᴘᴀssᴡᴏʀᴅs. Tʜᴇsᴇ ᴛᴏᴏʟs ᴀʀᴇ ᴛᴏᴛᴀʟʟʏ ᴅᴇᴘᴇɴᴅᴇɴᴛ ᴏɴ ᴛʜᴇ ᴅɪᴄᴛɪᴏɴᴀʀʏ, sᴏ sᴜᴄᴄᴇss ʀᴀᴛᴇ ɪs ʟᴏᴡᴇʀ.