web analytics

Digital Forensics and Investigations

Most used common passwords: https://www.ncsc.gov.uk/blog-post/passwords-passwords-everywhere

Chain of Custody form: https://www.nist.gov/document/sample-chain-custody-formdocx

pdfinfo – you can install it using sudo apt install poppler-utils

here are many online and offline tools to read the EXIF data from images. One command-line tool is exiftool. ExifTool is used to read and write metadata in various file types, such as JPEG images. (The AttackBox already has exiftool installed; however, if you are using Kali Linux and don’t have exiftool installed, you can install it using sudo apt install libimage-exiftool-perl.)

https://redteam.guide/docs/checklists/red-team-checklist/

https://vectr.io/

https://vectr.io/ — Collaboration between Red and Blue Teams

Encoding/decoding –> Base64 Decode and Encode – Online

Crackstation –>CrackStation – Online Password Hash Cracking – MD5, SHA1, Linux, Rainbow Tables, etc.

Malicious IP–> AbuseIPDB