Creative Ways to Prevent Phishing Attacks

One technique we could use to prevent phishing attacks is a side channel of communication. For example, by calling the individual who supposedly sent out a suspect email, a user can verify whether the email is authentic or not. We could also verify the authenticity of an email by using a trusted address to email […]

Using Basic Linux Commands and Permissions

  Abstract I will use Kali Linux to demonstrate the basics of the Linux operating system.  By using the Kali Linux command line, I will explore the Linux file system to shed light on the file structure.  Furthermore, I will execute basic Linux commands and illustrate fundamental file permissions. Materials –  Windows 10 64x –  […]

Using NMAP in a Virtual Lab

Abstract I will gather the appropriate tools to set up a virtual lab.  Afterward, I will use the virtual lab to demonstrate the utility of NMAP.  The NMAP demonstration will include network scanning and port analysis. Materials –  Windows 10 64x –  Working internet connection –  Internet browser –  At least 124 MB of RAM […]

Forensic Implications of GPS Systems

Built-in automobile GPS systems often prove useful in an investigation primarily because they produce trails of evidence. Assuming the internal system or the GPS satellite creates a log of visited locations, an investigator could determine where the vehicle has been. For example, if the vehicle is stolen, investigators or law enforcement could geo-locate it to […]

Pentesting and Event Logs

Event logs aren’t always reliable at face value, considering the fact that hackers have numerous ways of compromising them. Pentesters can use Metasploit’s meterpreter to run a script called clearev and utterly wipe the logs. On a Windows system, a clearev wipe would expunge Security, Application, and System logs. Furthermore, an application called clearlogs.exe can be […]