877.791.9571 |

About the Author:

Mohit Rawat is an engineering graduate and works as a Security Analyst.Specialized in social engineering, penetration testing, application vulnerability assessments, digital forensics investigations and IT security architecture. He works for both public and private sector clients, perform penetration testing, digital forensics investigations and deliver security training to IT professionals
AndroidMalware04092014

Overview of Android Malware Analysis

Introduction

Malware is software used to disrupt gather sensitive information, or gain access to private systems. Any program or piece of software that affects the working of a device can […]

OSfingerprint03212014

Overview of OS Fingerprinting

Operating system fingerprinting is the process of learning what operating system is running on a particular device.

By analyzing certain protocol flags, options, and data in the packets a device […]

AndroidArch-02242014

Android Architecture and Forensics

Android is one of the most open, versatile, and customizable mobile operating systems out there. Android is a Linux-based operating system with market share – 79.70% in smart phones. […]

IntCounterSurv

Tools for Internet Counter Surveillance

Introduction

Today’s world is an Internet world. These days, everyone wants to save their professional data and private content. With so much private information being shared over the Internet via […]

Buffer-Overflow02042014

Buffer Overflow Basics

Introduction

Buffer overflows have been the most common form of security vulnerability in the last 10 years. Buffer overflow attacks make up a substantial portion of all security attacks simply […]

Anti-Spam01062014

Spam and Anti-Spam Techniques

Introduction

Electronic messaging has become an important part of our lives. Users can send messages to recipients on the other side of the world at nearly no cost. The low […]

compForensics12202013

Computer Forensic Tools for Laymen

Computer forensics involves the processes of analyzing and evaluating digital data as evidence. It is the analysis of information contained within and created with computer systems and computing devices, […]

socialEngineer12182013

Social Engineering: The Art of Human Hacking

What Is Social Engineering?

Social engineering is manipulating people into doing something, rather than by breaking in using technical means. It is the art of gaining access to buildings, systems, […]

eWhoring11152013

e-Whoring: Darker Way to Earn Money

Introduction

E-whoring is surely becoming one of the most common methods for beginning cybercriminals to gain easy money. E-whoring is a practice of selling pornographic content, while pretending to be […]

revealHacker11062013

Revealing Hacker through Malware Analysis

Background

Two days ago one of my friends contacted me and told me that his organization is receiving suspicious-looking emails. They think that the infection was conducted via “spear phishing” […]