collection-placeholder.jpeg

Forensics

Article cover image
May 4, 2015

Welcome back, my greenhorn hackers!Digital forensics and hacking are complementary disciplines. The better you are at digital forensics, the better hacker you are, and the better hacker you are, the b ...

Article cover image
Mar 3, 2015

Welcome back, my aspiring hackers!As I mentioned in earlier posts, the best hackers (or at least those not behind bars) have a keen understanding of digital forensics. If I am tasked to intrude upon a ...

Article cover image
Jan 30, 2014

Welcome back, my hackers novitiates!As you read my various hacking tutorials, you're probably asking yourself, "What are the chances that this hack will be detected and that I'll land behind bars, dis ...

Article cover image
Jan 8, 2014

Welcome back, my tenderfoot hackers!I recently began a new series on digital forensics to help tenderfoot hackers from being detected and ultimately, incarcerated. In this installment of that series, ...

Article cover image
Dec 20, 2013

Welcome back, my hacker apprentices!I recently began a new series on digital forensics to show aspiring hackers what the forensic investigator can do and see while investigating a cyber attack. This i ...

Article cover image
Dec 10, 2013

Welcome back, my tenderfoot hackers!So many readers in the Null Byte community have been asking me questions about evading detection and hacking undetected that I decided to start a new series on digi ...

Article cover image
Mar 3, 2012

With the mass arrests of 25 anons in Europe and South America, and the rumors of an FBI sweep on the east coast of America floating around, times look dicey for hackers. Over the past few days, a lot ...