Jul 22, 2020
Posted in blog, Featured, forensics, Reviews, Windows
Autopsy – Digital Forensics
For anyone looking to conduct some in depth forensics on any type of disk image. Autopsy is a great free tool that you can make use of for deep forensic analysis.
It has been a few years since I last used Autopsy. I recall back on one of the SANS tools (SANS SIFT). Back then I felt it was a great tool, but did lack speed in terms of searching through data. It appears with the most recent version of Autopsy that issue has been drastically improved. On top of that, machines have also become much faster using SSD’s and tons of more CPU and RAM power.
Read more Of This post
Feb 17, 2020
Posted in blog, New Products, Reviews, Tools, Windows
In this Part 2 review of Recover Keys, we will look at how
we can scan machines via the network. For most users, I don’t believe this
option will be used too often. The average home user that purchase a license
for personal use could just uninstall and install the tool on each machine they
want to grab license keys off of, or buy a license for multiple machines.
For larger organizations this tool is excellent as it can be installed in one location on a single machine. You also get the ability of being able to extract the license keys via the network, which makes this tool much more efficient and valuable. At the end of the day it is all about saving and making the best use of time.
If you haven’t read Part 1 of using Recover Keys (scanning a local machines) you can check it out here: https://www.stealthbay.com/recover-keys-part-1-scanning-a-local-machine/
Read more Of This Post
Feb 16, 2020
Posted in blog, New Products, Reviews, Tools, Tutorial, Windows
Recovering License Keys
I ran into an issue when trying to upgrade a windows 7 PC back in 2019 before Windows 7 went EOL. A decision was made to start a complete fresh install of Windows 10 instead of upgrading from Windows 7 to 10.
However, it came with a caveat that I would have to reinstall many tools all over again. For some of them, I no longer had a stored copy of the license key(s) laying around, or stored digitally any longer. So it got me thinking, if there was a way to recover these license keys.
Now, I could poke around and find the answers combing
through the Registry or disk. However, I thought I’d speed things up by using
existing tools that get the job done for you.
Nirsoft (a well-known website for recovering all kinds of artifacts from your PC) used to have a free tool that would search the registry for license keys. The tool was called “ProduKey”, and can be found here:https://www.nirsoft.net/utils/product_cd_key_viewer.html
But, upon trying to download the file, it gets redirected to another website called “recover keys” https://recover-keys.com/en/aboutus.html
Read more ABout This Post
Dec 6, 2019
Posted in blog, Encryption, Featured, Information Security, pen testing, security awareness, Windows
Stealing Windows Wi-Fi WPA2-PSK Passwords through PowerShell
This week, I was hanging out with a friends, who happened to
forget their Wi-Fi Password to connect a new device to their network. I
decided, I would find a way and help them out so they could obtain the Wi-Fi
password. It then led me to a thought, that a malicious attacker could
technically use the same technique. Or, that it could be a good technique used
when pen testing an environment. So, therefore, I have decided to make a blog
post about it. Enjoy!
Read more Of This Post!
Mar 5, 2018
Posted in Information Security, Tutorial, Windows
Bypassing Windows Logon Passwords
Introduction
So I had a friend who had an old laptop sitting around collecting dust at home. He knew I was into computers and asked me if I wanted it. And you know a techie…. when someone throws out free hardware you just can’t complain or say no!!
However, he realized he did not remember his password, and wanted to see what files still were on the machine before he let me have it. He was sure he backed all files up awhile back when he got his new laptop. But, he wanted to be sure, and knowing I am a Security Analyst wondered if I could help him out. So, I went ahead and was able to obtain his password so he could login to delete or save any data he still wanted.
After I completed the task to recover the password, I decided it would make a great blog article to write about.
So here it is…… (more…)