Hello and welcome to this new series of Student Video Tutorial. This series is basically related Digital Forensics. I will cover wide range of Digital Forensics together with Computer Hacking Forensic Investigation, CHFI.
In this video, we will see FTK IMAGER and use it for Acquiring Disk Image.
Call us for event : 9846618997
Wedding Video shoot pokhara, wedding photographer pokhara
Video editing pokhara, baba computers pokhara
NEPALI SOCIAL NETWORK SITE (WWW.BHUDKI.COM) TO EARN MONEY. USE SITE AND EARN MONEY
nepali social network site, earn money online in nepal,
Want to buy laptop chargers, laptop adapters in Pokhara ?
Call : 9846618997 (BABA Computers, Pokhara)
Dell Laptop Chargers Adapters In Pokhara
Acer Laptop Chargers Adapters In Pokhara
HP Laptop Chargers Adapters in Pokhara
Laptop Chargers buy in pokhara,
Computer Shop in Pokhara
Need laptop keyboard ?
Call : 9846618997 (Baba Computers Pokhara)
HACKED ? OR INSIDER ATTACK ?
Cyber Criminals hacked into the SWIFT System of NIC Asia Bank & Grabbed around 45 Crores !
The Society for Worldwide Interbank Financial Telecommunication (SWIFT)provides a network that enables financial institutions worldwide to send and receive information about financial transactions in a secure, standardized and reliable environment. It is also said that more than 90 percent fund transfer in the world take place by SWIFT.
Back to topic : According to latest update, 3 or 4 crore baayek aru sabai firta lyaaune process cha rey bank ko. (Tyo 3 or 4 crore chai saayed katai dekhiyeko chaina hola)
Still to follow exact update. Stay tuned.
WHAT DO YOU THINK ? DROP YOUR THOUGHTS IN COMMENT.
VIDEO REPORT BY AP1 HERE : https://www.facebook.com/ap1tv/videos/1511277252295305/
Need Computer Casing ? ATX, Micro ATX, Mid Tower, Mini Tower or any other.
Call : 9846618997 (Baba Computer Pokhara)
I’ve learned a lot from these sites. There are more other sites which is providing best online education. If you’ve best one, then please mention in comment. Since this video was about top 5, so I picked my personal favorite.
To buy game : Call 9846618997 (Baba Computers Pokhara)
Crazy Buggy Racing | Computer Games, PC Games in Pokhara
You may like : DIGITAL FORENSICS TUTORIAL HERE (YOUTUBE)
KRACK : Breaking WPA2 by forcing nonce reuse
1) “The attacker doesn’t even need to connect to the network – only to listen to the data you exchange with an access point and emit their own packets back to change things on your system and the router.” – thenextweb
2) Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites. – krackattacks
3) “The attack works against all modern protected Wi-Fi networks” – krackattacks
Our research paper behind the attack is titled Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 and will be presented at the Computer and Communications Security (CCS) conference on Wednesday 1 November 2017.
Although this paper is made public now, it was already submitted for review on 19 May 2017. After this, only minor changes were made. As a result, the findings in the paper are already several months old. In the meantime, we have found easier techniques to carry out our key reinstallation attack against the 4-way handshake. With our novel attack technique, it is now trivial to exploit implementations that only accept encrypted retransmissions of message 3 of the 4-way handshake. In particular this means that attacking macOS and OpenBSD is significantly easier than discussed in the paper.
Demo video :