Proudly, we announce the release of the newest issue of eForensics Magazine - From BackTrack to Kali Linux. From here you can download teaser of the issue so a couple of free articles from that edition to better present you the content. Feel free to download it!
REVIEW: LINUX DISTRIBUTIONS FOR FORENSIC AND SECURITY
Kali or BackBox? Jean Marcel and Thiago Delgado will analyze and compare two most featured linux’s distributions designed for forensic analysis and security in a down-top approach. From Kernel, supported architectures and default tools, to licenses and default desktop manager. Find out which one fits better your needs!
LINUX USB LIVE SYSTEM’S FORENSICS ANALYSIS: KALI TOOLS AND HACKING TRICKS
Digital Business Security is a discipline which concerns all companies and security of their IT systems. Do you want to find out how Computer Forensics and Hacking Tricks can be useful for security of your company? Wait for the case study on Computer Forensics and Law, based on Linux USB live system, in a comprehensive article by Filippo Novario.
KALI FOR NETWORK eDISCOVERY
Let’s learn some more on forensics tools in Kali. This article will take you through eDiscovery in a network where your presence is known and approved; and also in a hostile network where you need to develop your map of the network without being detected. Wolf Halton will teach you four methods for eDiscovery in a Network… and a bonus is waiting for you!
CORRELATING CARVED DATA IN KALI
In this article Drew Perry will be investigating how the BackTrack Penetration and Security Auditing Linux distribution has evolved into Kali. He will put some of the powerful forensics tools to good use by utilizing a data carving technique and then use the results to perform open source reconnaissance. He will also be demonstrating an ownership relationship between the original data and a remote server which can help expand the scope of a forensic investigation.
RECOVERING DELETED FILES FROM A WINDOWS MACHINE WITH KALI LINUX
There are many tools that have been added in the Kali Linux suite, comparing to BackTrack, some of which can be used to preserve digital evidence as well as retrieving deleted files. Open source tools such as dd_rescue and Foremost allow you to create an image of any type of storage device such as USB, Hard Drives, and SD Cards, and retrieve deleted or corrupt files. Let Cory Miller put the theory into practice!
NMAP: NETWORK ANALYSIS TECHNIQUES – A PRAGMATIC APPROACH
This time Jean Marcel and Thiago Delgado will show us how to use NMAP to find vulnerabilities and scan hosts for open ports without leaving traces. We will also learn how to pick the right technique to avoid being detected and simulate fake connections to puzzle intrusion-detection systems.
PASSWORD CRACKING WITH JOHN THE RIPPER IN KALI LINUX
In this article Alexandre Beletti will introduce you to the basic concepts of John The Ripper, a software that can crack passwords using variety of different techniques.
SIMPLE WIRESHARK USAGE IN KALI LINUX
Victor Panisa will show you how to proceed with Wireshark – a popular sniffer tool.
KALI VS BACKTRACK – MDK3 USAGE
How to perform a denial of service attack using mdk3 – a built-in Kali tool? How can we use hidden SSID’s in order to secure wireless networks? Learn all that on the practical test case, presented by Nuno Taxeiro.
WIFI CRACKING JUST BECAME A WHOLE LOT EASIER
Metropolitan areas are known for their extremely fast advancement, especially in the world of information technology. Many may not realize, but we are always surrounded by wireless signals without us even being aware of it. Being able to keep wireless network secured and protected from unauthorized access is crucial! Tomas Koslab will explain us how two simple, yet effective, tools can penetrate through what someone might think of as a secured Wi-Fi spot..
MALTEGO – FINDING THE NEEDLE IN THE HASYTACK
Maltego is specifically designed to be used as an open source intelligence and forensics application to join relationships between people, groups of people, companies, organizations, web sites, Internet infrastructure, phrases, affiliations, documents and files. Ed Wiget has used Maltego in corporate forensics, cyber-crime investigations, and even missing persons cases to help identify resources used on-line by individuals involved in these investigations or to identify persons these people associate with. Now you can learn how to use Maltego as well!
DIGITAL EVIDENCE ACQUISITION WITH BACKTRACK
It has become increasingly important to have a veritable means of acquiring digital evidence needed to prove the authenticity of a case or scenario that can be admissible in court. Evidence recovery processes usually need to be presented in such a way that the same results will be obtained by a third party, assuming the same methods are employed by an investigator. Ayei Ibor will present us practical applications and a sample of evidence acquisition.