Role of Artificial Intelligence in Digital Forensics
Author:- Riya GhoshDepartment of Forensic Science, Kristu Jayanti College Autonomous In today’s digitally connected world, the rise of cybercrime and …
Author:- Riya GhoshDepartment of Forensic Science, Kristu Jayanti College Autonomous In today’s digitally connected world, the rise of cybercrime and …
Gathering data on systems that are “alive” and responding on the network is the process of scanning. The first step …
The network scanning tools are commonly used for discovering and identifying live hosts, open ports, running services, on a target …
TCP transmission control protocols have communication flags in their header for controlling and managing the communication between two internet devices. …
Network scanning is the second phase in the ethical hacking methodology where we gather more detailed information about our target …
OSINT is short for open-source intelligence framework that focuses on gathering information about the target available over the internet. This …
BillCipher is an open-source command line tool for information gathering of any website, domain, and IP address. It is an …
FOCA short for Fingerprinting Organizations with collected archives is a tool that disclose metadata and hidden information in scanned documents. …
OSRFramework, short for Open Source Intelligence social reconnaissance framework, is a set of libraries for information gathering through open-source intelligence …
This is part 2 in the recon-ng articles, in part 1 we discussed how to use the recon-ng framework for …