CHFI & Digital Forensics Tutorial [Part 1] – Basics & FTK IMAGER Lab


Hello and welcome to this new series of Student Video Tutorial. This series is basically related Digital Forensics. I will cover wide range of Digital Forensics together with Computer Hacking Forensic Investigation, CHFI.

In this video, we will see FTK IMAGER and use it for Acquiring Disk Image.

Wedding Video shoot pokhara, wedding photographer pokhara


Call us for event : 9846618997

Wedding Video shoot pokhara, wedding photographer pokhara

Video editing pokhara, baba computers pokhara

Nepali Social Network Site, To Earn Money Online in Nepal


NEPALI SOCIAL NETWORK SITE (WWW.BHUDKI.COM) TO EARN MONEY. USE SITE AND EARN MONEY

WWW.BHUDKI.COM (use site and earn money)

 

nepali social network site, earn money online in nepal,

BUY LAPTOP CHARGERS, ADAPTERS IN POKHARA (DELL, ACER, HP, LENOVO & MORE)


Want to buy laptop chargers, laptop adapters in Pokhara ?

Call : 9846618997 (BABA Computers, Pokhara)

laptop chargers laptop adapters pokhara

Dell Laptop Chargers Adapters In Pokhara

Acer Laptop Chargers Adapters In Pokhara

HP Laptop Chargers Adapters in Pokhara

Laptop Chargers buy in pokhara,

Computer Shop in Pokhara

Buy Laptop Keyboards in Pokhara | Computer Shop Pokhara


Need laptop keyboard ?

Call : 9846618997 (Baba Computers Pokhara)

 

 

एनआईसी एसिया (N.I.C. Asia) बैंकको ‘स्विफ्ट ह्याक’ – करिब ४५ करोड रुपैयाँ चोरी भएको


HACKED ? OR INSIDER ATTACK ?

Cyber Criminals hacked into the SWIFT System of NIC Asia Bank & Grabbed around 45 Crores !

ad : PHOTOSHOP TUTORIALS IN NEPALI LANGUAGE, HERE IN YOUTUBE.  

The Society for Worldwide Interbank Financial Telecommunication (SWIFT)provides a network that enables financial institutions worldwide to send and receive information about financial transactions in a secure, standardized and reliable environment. It is also said that more than 90 percent fund transfer in the world take place by SWIFT.

Back to topic : According to latest update, 3 or 4 crore baayek aru sabai firta lyaaune process cha rey bank ko. (Tyo 3 or 4 crore chai saayed katai dekhiyeko chaina hola)

Still to follow exact update. Stay tuned.

WHAT DO YOU THINK ? DROP YOUR THOUGHTS IN COMMENT.

VIDEO REPORT BY AP1 HERE : https://www.facebook.com/ap1tv/videos/1511277252295305/

 

COMPUTER CASING IN POKHARA. BUY MICRO ATX CASING POKHARA


Need Computer Casing ? ATX, Micro ATX, Mid Tower, Mini Tower or any other.

Call : 9846618997 (Baba Computer Pokhara)

TOP 5 ONLINE EDUCATION WEBSITE | 2017


I’ve learned a lot from these sites. There are more other sites which is providing best online education. If you’ve best one, then please mention in comment. Since this video was about top 5, so I picked my personal favorite.

FIFA 18 BUY IN POKHARA | FOR PC, COMPUTER GAMES IN POKHARA


To buy game : Call 9846618997 (Baba Computers Pokhara)

CRAZY BUGGY RACING | COMPUTER GAMES, PC GAMES IN POKHARA


To buy game : Call 9846618997 (Baba Computers Pokhara)

Crazy Buggy Racing | Computer Games, PC Games in Pokhara

KRACK Attack : Key Reinstallation Attacks [EXPLAINED]


You may like : DIGITAL FORENSICS TUTORIAL HERE (YOUTUBE)

https://www.youtube.com/watch?v=3z3Iau04gt8&list=PLEG4CvuvNZddHYjLLrAhhcOedeEPyPVxA

KRACK : Breaking WPA2 by forcing nonce reuse

Discovered by Mathy Vanhoef of imec-DistriNet, KU Leuven

KEY POINT OF KRACK ATTACK :

1) “The attacker doesn’t even need to connect to the network – only to listen to the data you exchange with an access point and emit their own packets back to change things on your system and the router.” – thenextweb

2) Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites. – krackattacks 

3) “The attack works against all modern protected Wi-Fi networks” – krackattacks 

PAPER (via krackattacks)

Our research paper behind the attack is titled Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 and will be presented at the Computer and Communications Security (CCS) conference on Wednesday 1 November 2017.

Although this paper is made public now, it was already submitted for review on 19 May 2017. After this, only minor changes were made. As a result, the findings in the paper are already several months old. In the meantime, we have found easier techniques to carry out our key reinstallation attack against the 4-way handshake. With our novel attack technique, it is now trivial to exploit implementations that only accept encrypted retransmissions of message 3 of the 4-way handshake. In particular this means that attacking macOS and OpenBSD is significantly easier than discussed in the paper.

Demo video :

 

Ethical Hacking, Digital Forensics, Cyber Security, Tech News, Tutorials

%d bloggers like this: