Repairing Damaged Headers

Case Study Suppose you’re investigating a possible intellectual property theft by a contract employee of Exotic Mountain Tour Service (EMTS). EMTS has just finished an expensive marketing and cus- tomer service analysis with Superior Bicycles, LLC. Based on this analysis, EMTS plans to release advertising for its latest tour service with a joint product marketing […]

Unscrambling Bits Using Winhex

Why WinHex? WinHex is in its core a universal hexadecimal editor, particularly helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security (X-Ways, n.d.). A related, and well-known, technique for hiding data is shifting bit patterns (scrambling) to alter the byte values of data. WinHex include a feature for shifting […]

Virtual Machine

Before setting up a virtual machine, the questions arise are; what actually a virtual machine is? Why we need it at the first place for hacking? Well, we will enter the technical aspects of the answers to these questions later, but for now, a virtual machine (VM) is a physical machine located somewhere in the […]