Using Postman in Hacking Blockchain Wallets

Learn how to use Postman in hacking blockchain wallets! This is a promotional tutorial of our 'Hacking Blockchain based APIs' course! The world is driven by APIs and the landscape of cybersecurity is changing at an extremely fast pace. Professionals are seeking to find a new edge, not only for themselves but for their clients' protection as well. This course will introduce you to blockchain APIs, tools we can use to compromise the API and gather more information that can be used in exploitation.

Play Video

Interview with Paulo Henrique Pereira

Paulo Henrique Pereira is a CyberSec Professional and Digits3c Founder working on malware analysis. Digits3c is his small intel company …

Mar 17,2023

6 min read

A Technical Analysis of Brazilian Electronic Voting Machines

For several years, there has been technical discussion about the electronic voting machines system, but when we talk about the system, it is not about the operating system used but about the technical process adopted.

Mar 17,2023

9 min read

Jeff Official

Unusual Emails: Investigating

For this article, we will be performing an OSINT investigation on an email that was sent to see what information we can find by verifying parts of the email’s content. This is a scenario based on real email investigations. As with any investigation, I do recommend exercising precaution (use a VM, sock puppet accounts, VPN, etc.). In terms of this article, you can assume that the previously mentioned precautions are already being exercised.

Mar 17,2023

10 min read

Browser Forensics (W57)

The course is aimed at allowing investigators to know the inner workings of the most used and well-known browsers from a digital forensics perspective. Nowadays, everything is done using the web. Most applications are web-based, which led to the importance of browser forensics for any digital forensic case. The interesting thing about browser forensics is the amount of information that you can extract and draw for a case.

Oct 03,2022

7 min read

The Challenges of Collecting Evidence

Mobile devices such as smartphones have operating systems such as Android and iOS that allow for the installation of third-party applications that operate with restrictions of the operating system such as application isolation and other memory demands. This paper will explore the challenges of working with different operating systems while collecting evidence, and explain chipping off, live and postmortem mobile forensic analyses. 

Mar 17,2023

7 min read

Interview with Paulo Henrique Pereira

Paulo Henrique Pereira is a CyberSec Professional and Digits3c Founder working on malware analysis. Digits3c is his small intel company …

Mar 17,2023

6 min read

A Technical Analysis of Brazilian Electronic Voting Machines

For several years, there has been technical discussion about the electronic voting machines system, but when we talk about the system, it is not about the operating system used but about the technical process adopted.

Mar 17,2023

9 min read

Jeff Official

Unusual Emails: Investigating

For this article, we will be performing an OSINT investigation on an email that was sent to see what information we can find by verifying parts of the email’s content. This is a scenario based on real email investigations. As with any investigation, I do recommend exercising precaution (use a VM, sock puppet accounts, VPN, etc.). In terms of this article, you can assume that the previously mentioned precautions are already being exercised.

Mar 17,2023

10 min read

The Challenges of Collecting Evidence

Mobile devices such as smartphones have operating systems such as Android and iOS that allow for the installation of third-party applications that operate with restrictions of the operating system such as application isolation and other memory demands. This paper will explore the challenges of working with different operating systems while collecting evidence, and explain chipping off, live and postmortem mobile forensic analyses. 

Mar 17,2023

7 min read

Browser Forensics (W57)

The course is aimed at allowing investigators to know the inner workings of the most used and well-known browsers from a digital forensics perspective. Nowadays, everything is done using the web. Most applications are web-based, which led to the importance of browser forensics for any digital forensic case. The interesting thing about browser forensics is the amount of information that you can extract and draw for a case.

Oct 03,2022

10 min read

Cloud Forensics (W56)

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each location being a data center. The nature of cloud computing – particularly cloud service provider management and distribution over multiple locations – makes forensic investigations difficult and seemingly impossible. Data centers alone can be a separate forensic discipline. This course merges cloud technology with sound forensic processes and principles to effectively conduct cloud forensic investigations using Amazon Web Services as a case study example.

Aug 26,2022

19 min read

KAAN KAYA Course

Windows Forensics (W55)

At the end of the training, the participants will be able to reach the level of knowledge to examine devices with Windows operating systems for the purpose of detecting suspicious activity. The course will focus on Windows 10 Operating System, but we know that there are a lot of common things with server operating systems. So Windows Server systems also could be our evidence source. The course’s material will also apply to Windows 11, as there are no changes compared to Windows 10 when looking from a forensics perspective. 

Jan 05,2022

10 min read

Natural Language Processing for OSINT & Threat Analysis (W54)

In this course, we apply Natural Language Processing to cyber threat analysis and OSINT, to assess and analyze data gained …

Aug 28,2021

7 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013