Search Results for: Python Knowledge Center Django Templates Server-Side Template Injection v1.0 June 16, 2021 Long gone are days of static websites, nowadays sites need to be dynamic to be attractive and useful. One of... Blog Post New Malware Samples Show Apple Isn’t Invulnerable to Attacks February 1, 2022 Apple devices are often preferred for their tighter security than devices from its biggest competitors, Samsung and Windows. However, recently... Blog Post How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware... Blog Post SQLMAP – Authenticate via NTLM under Windows March 19, 2020 Sqlmap is a powerful open-source tool for automating the process of detecting and exploiting SQL injection flaws. It comes preinstalled... Blog Post Missing SPARTA in latest Kali Linux 2020.1? Try LEGION! April 28, 2020 Popular open-source tool Sparta is no longer available in Kali Linux because of unsupported Python version. Tools depending on Python... Knowledge Center Windows Memory Forensics Technical Guide Part 2 June 8, 2020 Introduction to Structured Analysis with Volatility. Investigative Process Steps. Windows Processes. Structured Analysis and Investigative Process After a short introduction... Knowledge Center Snatch Ransomware – Malware Analysis Case Study July 29, 2020 Overview. During last month LIFARS DFIR Team encountered various variants of Snatch Ransomware. This ransomware is known for its capability... Blog Post EyeWitness – Capture Screenshots of Any Website March 12, 2020 EyeWitness is an open-source tool, designed to take screenshots of the web pages from a file. This tool can parse... Knowledge Center Voltaire – New Tool for Cyber Incident Response from LIFARS March 10, 2020 What is Voltaire/Voila? At LIFARS, we process memory images as part of our incident response process. In these cases, it... Knowledge Center ParamSpider – Mining parameters from dark corners of Web Archives May 29, 2020 Have you ever wondered how to scrape all the parameters from domain and subdomains from the past without manually crawling... Blog Post Clubhouse Part 1: Does Exclusivity Imply Security? A Look Under the Hood of Clubhouse Authentication February 23, 2021 In this two-part blog post series, we will look at security aspects of the Clubhouse app. Security in the world... Blog Post DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... Blog Post Zenmap installation guide – Kali Linux 2019.4 January 14, 2020 Zenmap is a cross-platform GUI (Graphical User Interface) for Nmap. This open-source tool is designed to make Nmap easy for... Blog Post The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known... Blog Post Open Source and Free Tools for Incident Response Teams November 26, 2019 LIFARS Incident and Response team uses multiple tools when responding to and investigating incidents. For new and upcoming enthusiasts and...
Knowledge Center Django Templates Server-Side Template Injection v1.0 June 16, 2021 Long gone are days of static websites, nowadays sites need to be dynamic to be attractive and useful. One of...
Blog Post New Malware Samples Show Apple Isn’t Invulnerable to Attacks February 1, 2022 Apple devices are often preferred for their tighter security than devices from its biggest competitors, Samsung and Windows. However, recently...
Blog Post How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware...
Blog Post SQLMAP – Authenticate via NTLM under Windows March 19, 2020 Sqlmap is a powerful open-source tool for automating the process of detecting and exploiting SQL injection flaws. It comes preinstalled...
Blog Post Missing SPARTA in latest Kali Linux 2020.1? Try LEGION! April 28, 2020 Popular open-source tool Sparta is no longer available in Kali Linux because of unsupported Python version. Tools depending on Python...
Knowledge Center Windows Memory Forensics Technical Guide Part 2 June 8, 2020 Introduction to Structured Analysis with Volatility. Investigative Process Steps. Windows Processes. Structured Analysis and Investigative Process After a short introduction...
Knowledge Center Snatch Ransomware – Malware Analysis Case Study July 29, 2020 Overview. During last month LIFARS DFIR Team encountered various variants of Snatch Ransomware. This ransomware is known for its capability...
Blog Post EyeWitness – Capture Screenshots of Any Website March 12, 2020 EyeWitness is an open-source tool, designed to take screenshots of the web pages from a file. This tool can parse...
Knowledge Center Voltaire – New Tool for Cyber Incident Response from LIFARS March 10, 2020 What is Voltaire/Voila? At LIFARS, we process memory images as part of our incident response process. In these cases, it...
Knowledge Center ParamSpider – Mining parameters from dark corners of Web Archives May 29, 2020 Have you ever wondered how to scrape all the parameters from domain and subdomains from the past without manually crawling...
Blog Post Clubhouse Part 1: Does Exclusivity Imply Security? A Look Under the Hood of Clubhouse Authentication February 23, 2021 In this two-part blog post series, we will look at security aspects of the Clubhouse app. Security in the world...
Blog Post DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...
Blog Post Zenmap installation guide – Kali Linux 2019.4 January 14, 2020 Zenmap is a cross-platform GUI (Graphical User Interface) for Nmap. This open-source tool is designed to make Nmap easy for...
Blog Post The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known...
Blog Post Open Source and Free Tools for Incident Response Teams November 26, 2019 LIFARS Incident and Response team uses multiple tools when responding to and investigating incidents. For new and upcoming enthusiasts and...