The Chromensics tool is developed to read all information from chrome browser directory and present it to user, in easy readable tabular format which can be explored in descent interface without running the chrome browser. The tool will also allow you retrieve information from other chrome installation brought from different machine for analyzing. The acquired artifacts can be exported in PDF report to present it in court of law or to superiors.
An interesting approach to a Man-in-the-Middle Attack against a Password Reset System
The PRMitM attack exploits the similarity of the registration and password reset processes to launch a man in the middle (MitM) attack at the application level. The attacker initiates a password reset process with a website and forwards every challenge to the victim who either wishes to register in the attacking site or to access a particular resource on it.
Source: The Password Reset MitM Attack
A good tool from Willem Broekema to help with organizing and managing your Twitter lists.
Product Link: TwitterListManager
After some recent infrastructure changes, I noticed that certain group policies were not being applied due to network connectivity lag as a result of how our systems were setup. To resolve this, I stumbled on a post that describes a Group Policy setting that can force the computer to wait for full network connectivity before logon.
To enable this setting:
- Open the Local Group Policy Editor
- Expand Computer Configuration
- Expand Administrative Templates
- Expand System
- Expand Logon
- Enable the Always wait for the network at computer startup and logon setting
- Restart your computer
Ed Sutton on the dangers of big data and how everything we do, online or offline, leaves a digital footprint behind. He describes how every purchase with a card, every search, every movement with a smart device and every social media interaction (Likes, Retweets etc.) get stored. When used in aggregate, this data reflect a social and identity fingerprint that uniquely identifies you and furthermore can predict your behaviors and responses.
The Big Five: Openness (how open are you to new experiences?), Conscientiousness (how much of a perfectionist are you?), Extroversion (how sociable are you?), Agreeableness (how considerate and cooperative are you?), and Neuroticism (how sensitive/vulnerable are you?). With these five dimensions (O.C.E.A.N.), you can determine fairy precisely what kind of person you are dealing with—their needs and fears as well as how they are likely to behave.