cforensicslab
Computer Forensics Lab
39 posts
Uncover all digital footprints from all computing and digital devices: Computer forensics services for business and private customers
Don't wanna be here? Send us removal request.
cforensicslab · 3 years ago
Text
Website Cookie Policy
Last updated: 30 December 2021 ABOUT THIS COOKIE POLICYThe website http://datarecovery.london (the Site) is operated by Computer Forensics Lab t/a Data Recovery Lab (we, us, our), a company incorporated in England and Wales under company number 11345010. Our registered office is at Euro House, 133 Ballards Lane, London, N3 1LJ .We are committed to protecting your privacy and complying with our…
View On WordPress
2 notes · View notes
cforensicslab · 4 years ago
Text
How We Can Help You If You Have Been Hacked
How We Can Help You If You Have Been Hacked
As a business or private computer or mobile device user, it is quite a shock to discover that your computer or mobile phone has been hacked. This can compromise your identity, banking details, private pictures and sensitive information such as title deeds or other personal or business information which can be used to steal your personal or business identity and use your good crediting rating and…
Tumblr media
View On WordPress
1 note · View note
cforensicslab · 4 years ago
Text
What the client should expect when engaging a computer forensic expert to investigate a computer hack
What the client should expect when engaging a computer forensic expert to investigate a computer hack
Some computer forensics examinations are aimed to help experts investigate hacking attempts of computers, mobile phones and other digital devices with an operating system. In Microsoft Windows-based computers for example, the digital forensic expert, among other things, may analyse numerous sources such as registry, event logs and memory dumps in order to find traces typical to various tricks…
View On WordPress
1 note · View note
cforensicslab · 4 years ago
Text
How To Hack Any Social Media Account with ShellPhish and ShellPhish+
How To Hack Any Social Media Account with ShellPhish and ShellPhish+
DISCLAIMER: The author and the publishing website (Computer Forensics Lab) assume no responsibility for any misuse or damage caused by Shellphish. This is republished here for educational purposes ONLY. ShellPhish Inthis article we are going to see how we can hack any social media account using a tool called ShellPhish from GitHub. So you want to hack an Instagram account or Facebook account or…
Tumblr media
View On WordPress
0 notes
cforensicslab · 4 years ago
Link
0 notes
cforensicslab · 5 years ago
Text
A Comprehensive Guide on Securing Your System, Archives and Documents
A Comprehensive Guide on Securing Your System, Archives and Documents
How can you make your system and documents secure? Today, 256-bit AES encryption is offered by everyone and their dog. However, AES encryption does not mean much (or anything at all) when it comes to the real security of your data.
Source: A Comprehensive Guide on Securing Your System, Archives and Documents
View On WordPress
0 notes
cforensicslab · 5 years ago
Text
The Worst Mistakes in iOS Forensics
The Worst Mistakes in iOS Forensics
What can possibly go wrong with that iPhone? I’ll have a look (oh, it’s locked!), then switch it off, eject the SIM card and pass it on to the expert. Well, you’ve just made three of the five most common mistakes making subsequent unlock and extraction attempts significantly more difficult.
Source: The Worst Mistakes in iOS Forensics
View On WordPress
0 notes
cforensicslab · 5 years ago
Text
Open Source Intelligence (OSINT), Part 2: Using recon-ng to Identify the Same Profile across Multiple Sites
Open Source Intelligence (OSINT), Part 2: Using recon-ng to Identify the Same Profile across Multiple Sites
Welcome back, my aspiring cyber warriors! The Internet is the largest data repository the world has ever known! Open Source Intelligence or OSINT is the way to gather and unlock the intelligence embedded in all that data. In recent years, a brand new reconnaissance framework has become available to us that leverages many of the tools we are already using, but makes them far more powerful.
Source:
View On WordPress
1 note · View note
cforensicslab · 5 years ago
Photo
Tumblr media
Web Summit in Lisbon, the biggest tech show on Earth with 75000 participants and and 15000 speakers on different aspects of technology and how it affects us
0 notes
cforensicslab · 5 years ago
Photo
Tumblr media
Lost data? Your hard drive froze in the middle of copying? Memory stick does not show up? Laptop does not boot up? Your mobile is dead? Call the data recovery experts in London and let us help you out. Trusted by thousands of private and businesses customers. Free assessment and no-data, no-fee.
0 notes
cforensicslab · 5 years ago
Photo
Tumblr media
0 notes
cforensicslab · 6 years ago
Text
Shellphish - Phishing Tool For 18 Social Media (Instagram, Facebook, Snapchat, Github, Twitter...)
Shellphish – Phishing Tool For 18 Social Media (Instagram, Facebook, Snapchat, Github, Twitter…)
Phishing Tool for 18 social media: Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, WordPress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest. This script uses some webpages generated by SocialFish Tool ( https://github.com/UndeadSec/SocialFish ) Instagram webpage generated by An0nUD4Y (@its_udy) ( https://github.com/An0nUD4Y) Phishing…
View On WordPress
0 notes
cforensicslab · 6 years ago
Text
NAXSI - An Open-Source, High Performance, Low Rules Maintenance WAF For NGINX
NAXSI – An Open-Source, High Performance, Low Rules Maintenance WAF For NGINX
NAXSI means Nginx Anti XSS & SQL Injection . Technically, it is a third party nginx module, available as a package for many UNIX-like platforms. This module, by default, reads a small subset of simple (and readable) rules containing 99% of known patterns involved in website vulnerabilities.
Source: NAXSI – An Open-Source, High Performance, Low Rules Maintenance WAF For NGINX
Click here if you…
View On WordPress
0 notes
cforensicslab · 6 years ago
Text
Osmedeus - Fully Automated Offensive Security Tool For Reconnaissance And Vulnerability Scanning
Osmedeus – Fully Automated Offensive Security Tool For Reconnaissance And Vulnerability Scanning
Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. How to use If you have no idea what are you doing just type the command below or check out the Advanced Usage ./osmedeus.py -t example.com Installation git clone https://github.com/j3ssie/Osmedeuscd Osmedeus ./install.sh This install only focus on Kali linux, check…
View On WordPress
0 notes
cforensicslab · 6 years ago
Text
Parrot Security 4.6 - Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind
Parrot Security 4.6 – Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind
After 3 months of heavy development Parrot 4.6 is officially released. How to update Update your existing Parrot system with the following command: sudo parrot-upgrade System Changes (Appearance) The desktop-base and parrot-wallpapers also received some love and are updated to reflect such changes including the new Parrot appearence.
Source: Parrot Security 4.6 – Security GNU/Linux Distribution…
View On WordPress
0 notes
cforensicslab · 6 years ago
Text
Twint - An Advanced Twitter Scraping And OSINT Tool
Twint – An Advanced Twitter Scraping And OSINT Tool
Formerly known as Tweep, Twint is an advanced Twitter scraping tool written in Python that allows for scraping Tweets from Twitter profiles without using Twitter’s API. Twint utilizes Twitter’s search operators to let you scrape Tweets from specific users, scrape Tweets relating to certain topics, hashtags & trends, or sort out sensitive information from Tweets like e-mail and phone numbers.
Sour…
View On WordPress
0 notes
cforensicslab · 6 years ago
Text
Kali Linux 2019.2 Release - Penetration Testing and Ethical Hacking Linux Distribution
Kali Linux 2019.2 Release – Penetration Testing and Ethical Hacking Linux Distribution
This release brings the kernel up to version 4.19.28, fixes numerous bugs, includes many updated packages, and most excitingly, features a new release of Kali Linux NetHunter! Kali NetHunter 2019.2 Release NetHunter now supports over 50 devices running all the latest Android versions, from KitKat through to Pie. 13 new NetHunter images have been released for the latest Android versions of your…
View On WordPress
0 notes