MehrnoushMaster CORS Security: Develop Your Code to Detect MisconfigurationsCross-Origin Resource Sharing (CORS) is a mechanism that allows a web server to specify who can access its resources and how those…May 25May 25
MehrnoushUnderstanding Shellcode Injection in a Local ProcessWhen it comes to the field of cybersecurity, having a solid grasp of the different methods of shellcode injection is crucial for both…Apr 27Apr 27
MehrnoushBehind the Scenes of Problem-Solving: A Case Study Digital Forensic InvestigationWelcome to the digital forensics field, where every case is a challenging puzzle waiting to be solved. This post will take you on a…Mar 22Mar 22
MehrnoushCreate Custom Content Image -Windows 10 ArtifactsSometimes you need to have artifacts but you haven’t enough storage or time to capture a full image of the system. So you should gather the…Feb 17, 2023Feb 17, 2023
MehrnoushPrefetch Forensic AnalysisPrefetch is a Windows feature that records information about which applications are frequently accessed on a system, as well as the time…Feb 14, 2023Feb 14, 2023
MehrnoushShimCache & AmCache Forensic AnalysisShimCache and AmCache are Windows artifacts that contain information about recently executed applications. They can be analyzed to…Feb 14, 2023Feb 14, 2023
MehrnoushThumbnail Forensic AnalysisThumbnail forensic analysis is an important aspect of digital forensics, and it involves analyzing the thumbnails of images to extract…Feb 14, 2023Feb 14, 2023
MehrnoushWindows RecycleBin ForensicsThe RecycleBin is a feature in Microsoft Windows that allows users to recover deleted files. When a file is deleted from the computer, it…Feb 10, 2023Feb 10, 2023
MehrnoushHow to Detect IDT Hooking?IDT hooking, also known as Interrupt Descriptor Table hooking, is a technique used by malware to intercept and manipulate the normal…Feb 7, 2023Feb 7, 2023