🐉 neospace ~

          • Man-in-the-Middle Attack MITM
          • Monoalphabetic Substitution Cipher - A Detailed Explanation
          • XSS vs HTML
            • 🔗 Computer Architecture - CYBVU 23.2
            • Computer Organization
            • Introduction to Computer Architecture
            • 🔗 Data Communications and Networks
            • Lecture 1 - Introduction
            • Lecture 2 - Email Services
            • Lecture 3 - Data and Signals
            • Lecture 4 - Communication Medium
            • Lecture 5 - Wireless Medium
            • 🔗 Java - CYBVU 23.2
            • 22 Aug Lecture Note
            • 30th Aug Assignment Submission
            • Arithmetic Expressions
            • Data Types
            • Hello World, Escape Sequences, Comments
            • Introduction to Java
            • Java Full RECAP
            • String args
            • User input (Scanner)
            • Variables
            • 🔗 Operating Systems
            • Introduction to Operating Systems
            • Lec 2 Process Management
            • Lec 3 Process Control Management
            • Lec 4 Memory Management
            • Lec 5 Virtual Memory Management
            • 🔗 Web Application Development - CYBVU 23.2
            • All CSS Concepts at once (module related)
            • Client-Server Model
            • Essential JavaScript Concepts for This Module Pt.1
            • HTTP vs HTTPS
            • Introduction to HTML Part A
            • Introduction to HTML Part B
            • JavaScript Form Validation Pt. 3
            • JavaScript Pt. 2
            • PHP Pt. 1
            • PHP Pt. 2
            • Static vs Dynamic Pages
            • Website vs WebApp
            • What is the INTERNET?
            • World Wide Web (WWW)
          • Spring 24' Y1S2
            • 🔗 NIT2201 Profession and ethic
            • Week 2 - Security, Privacy & Ethics
            • Week 2 Tutorial 02 NIT2201
            • Week 3 Tutorial 03 NIT2201
            • 🔗(NIT2242) Data privacy and cyber physical systems security - 7K
            • Week 1 - Introduction to the Module
            • Week 2 - Cyber Physical Systems
            • 🔗 Cybersec Essentials
            • Lab 1 CSES
            • Lab 2 CSES
            • Lab 3 CSES
            • Lab 4 CSES
            • Lab 5 CSES
            • Lab 6 CSES
            • Lab 7 CSES
            • Lab 8 CSES
            • Week 1 - Introduction to Security
            • Week 2 - Malware and Social Engineering Attacks
            • Week 3 - Application and Networking-Based Attacks
            • Week 4 - Cryptography
            • Week 5 - Cryptography Part-II
            • Week 6 - PKI and Steganography
            • Week 7 - Network Security Fundamentals
            • Week 8 - Administering a Secure Network
            • 🔗 Server Administration and Management
            • Lab 1 SAAM
            • Lab 3 SAAM
            • Presentation Case Study
            • SAAM Summarise
            • Week 1 Introduction to Windows Server
            • 🔗 Digital Forensics and Ethical Hacking
            • Lab 1 DFEH
            • Lab 10 DFEH
            • Lab 2 DFEH
            • Lab 3 DFEH
            • Lab 4 DFEH
            • Lab 6 DFEH
            • Lab 7 DFEH
            • Lab 8 DFEH
            • Lab 9 DFEH
            • Research About Hashing
            • Untitled
            • Week 1 - Intro to Digital Forensics and its Processes
            • Week 1 DFEH Before Class Activities
            • Week 2 - Computer Forensics
            • Week 3 - Mobile Forensics
            • Week 3 DFEH Before Class
            • Week 5 - Investigative Reports and Legal Acceptance
            • XYZ School Investigation
            • 🔗 Introduction to Ict Management
            • NIT2171 ICT Management Test 1
            • Week 1 - ICT trends and challengers
          • Winter 24' Y2S1
        • CodeSprint X WorkShop 1
        • Drawing 2024-08-28 03.41.15.excalidraw
        • Drawing 2024-10-28 23.43.44.excalidraw
        • Drawing 2024-11-15 04.16.45.excalidraw
        • Drawing 2025-01-16 17.14.38_0.excalidraw
        • Drawing 2025-01-20 02.41.36.excalidraw
        • Drawing 2025-01-21 13.19.31.excalidraw
        • Drawing 2025-01-21 22.40.14.excalidraw
        • Drawing 2025-01-23 15.43.32.excalidraw
        • Drawing 2025-02-06 12.06.44.excalidraw
        • Drawing 2025-02-06 12.27.58.excalidraw
        • Drawing 2025-02-14 20.57.33.excalidraw
        • Drawing 2025-02-19 04.06.05.excalidraw
        • Drawing 2025-02-24 10.48.03.excalidraw
        • Drawing 2025-02-24 22.40.51.excalidraw
        • Drawing 2025-05-16 21.03.20.excalidraw
        • Drawing 2025-05-22 09.54.57.excalidraw
        • Inotroduction to Java 2024-08-20 15.15.43.excalidraw
        • Inotroduction to Java 2024-08-21 00.54.38.excalidraw
        • Inotroduction to Java 2024-08-21 01.02.20.excalidraw
        • Template.excalidraw
              • 🔗 How Ai Works
              • Prediction and probability
                • 🔗 Module 1 Foundations of Cybersecurity
                • Common CyberSec Terminology
                • Core skills for cybersec professionals
                • Course 1 Overview
                • Google Cybersecurity Certificate Overview
                • Helpful resources and tips
                • Importance of CyberSecurity
                • Introduction to Cybersecurity
                • My Path to CyberSecurity
                • Nikki A day in the life of a security engineer
                • Responsibilities of an entry-level cybersecurity analyst
                • Transferable and technical cybersecurity skills
                • Veronica My path to working in cybersecurity
                • Welcome to the Google Cybersecurity Certificate
                • Wrap-up Module 01
                • 🔗 Module 2 Foundations of Cybersecurity
                • Attacks in the digital age
                • Common attacks and their effectiveness
                • Determine the type of attack
                • Glossary terms from module 2
                • Introduction to the eight CISSP security domains Part 1
                • Introduction to the eight CISSP security domains Part 2
                • Keep Your Cool during a data breach
                • Past CyberSecurity Attacks
                • Understand attackers
                • Welcome to module 2
                • Wrap-up Module 02
                • 🔗 Module 3 Foundations of Cybersecurity
                • Controls, frameworks, and compliance
                • Ethical concepts that guide cybersecurity decisions
                • Ethics in Cybersecurity
                • Glossary terms from module 3
                • Heather Protect sensitive data and information
                • Holly The importance of ethics as a cybersecurity professional
                • Introduction to security frameworks and controls
                • Secure Design
                • Welcome to module 3
              • Foundations of Cybersecurity
            • 🔗 Google Cybersecurity Professional Certificate
                • 🔗 Module 1 Crash Course on Python
                • Course Introduction
                • Crash Course on Python
                • Specialization Introduction
            • 🔗 Google IT Automation with Python Professional Certificate
          • 100+ Docker Concepts you Need to Know
          • Docker in 100 Seconds
          • Kerberos Authentication
          • Kubernetes 101
            • 🔗 CS50's Introduction to Computer Science
            • Week 0 - Scratch
          • 🔗 HackTheBox CTF
          • Checker
          • Loggy
          • Low Logic
          • OnlyHacks
            • 🔗 Introduction to Active Directory
            • Active Directory Research Over the Years
            • Active Directory Structure
            • Why Active Directory?
            • 🔗 Learning Process
            • Ways of Thinking
          • 🔗 HTB Academy
            • 1. Read YAML data - Python to process YAML with Codespaces
            • Career Essentials in GitHub Professional Certificate
            • Docker
            • How Actions Works
            • Python to process YAML with Codespaces
              • 1 - Docker Explained
              • 2 - Install Docker
              • 3 - Using Docker
              • History of service-based architectures
              • Microservices - Solver of problems but not the silver bullet
              • Microservices - The new kid on the block
              • Service-oriented architecture
              • The monolithic application
              • What you need to know
            • 🔗Microservices Foundations Professional Certificate byKong
            • 🔗 Prepare for the GitHub Foundations Certification
            • Branches
            • Changing History
            • Deleting and renaming files
            • git diff
            • Git stash and clean
            • Github Options
            • Ignore Files - gitignore
            • Manage Conflicts
            • Pushing to Github
            • Setting up Git
            • Understanding Environments
            • What is Git
            • What is Github
            • What is Version Control
          • Bypassing Filters
          • Data Link Layer Header
          • IP Addressing and Subnetting
          • More about -sV and -sC
          • More About Alternate Data Stream
          • More About JQ
          • Predictable Randomness and Weak Seeding in PHP
          • Understanding `$0` in awk
          • Understanding 2>&1 in Unix-like Shells
          • Unix Epoch
          • Why We used seed range as constant range?
            • 🔐 Ethereum Fundamentals
            • Blockchain and Hashing
            • Blockchain Benefits and Disadvantages
            • Blockchain Operations
            • Ethereum Basics
            • The New Blockchain - Blockchain 2.0
          • 🔗 PicoGym
          • ASCII Numbers
          • Based
          • Big Zip
          • Binhexa
          • Blame Game
          • Bookmarklet
          • CanYouSee
          • Collaborative Development
          • Commitment Issues
          • Cookies
          • dont-you-love-banners
          • endianness
          • First Find
          • Glory of the garden
          • Includes
          • Information
          • Inspect HTML
          • Inspector
          • interencdec
          • Local Authority
          • runme.py
          • SansAlpha
          • Scan Surprise
          • Scavenger Hunt
          • Secret of the Polyglot
          • Special
          • Super SSH
          • Time Machine
          • Unminify
          • Useless
          • Verify
          • WebDecode
          • Where are the robots
            • 🔗 CSS
            • 1 - CSS Introduction
            • 10 - Box Model
            • 11 - The Border Box
            • 12 - The Padding Box
            • 13 - The Margin Box
            • 14 - Lines and Blocks
            • 15 - Position Property
            • 16 - Position Relative and Z index
            • 17 - Box Sizing
            • 18 - Fixed Position
            • 19 - Sticky Position
            • 2 - Syntax
            • 20 - Float
            • 21 - Pseudo Classes
            • 3 - Selectors
            • 4 - CSS Colors
            • 5 - Measurements
            • 6 - CSS Fonts
            • 7 - Text Alignment and Decoration
            • 8 - CSS Backgrounds
            • 9 - Shorthands
            • 🔗 HTML
            • 1 - What is HTML?
            • 10 - HTML Colors
            • 11 - Span & Div
            • 12 - Meta Tags
            • 13 - iFrames
            • 14 - HTML Buttons
            • 15 - HTML Forms
            • 2 - HTML Syntaxes
            • 3 - HyperLinks
            • 4 - HTML Images
            • 5 - HTML Audio
            • 6 - HTML Videos
            • 7 - Text Formatting
            • 8 - HTML Lists
            • 9 - HTML Tables
            • 🔗 NextJs 101
            • Fireship beyond 100 seconds NextJs
            • NextJs in 100 Seconds (Full beginners Tutorial)
            • 🔗 Programming 101 (Fundamentals)
            • before you code, learn how computers work
            • JavaScript 101
            • JSON 101
            • TypeScript 101
              • 🔗 Udemy - The Ultimate React Course 2024 React, Next.js, Redux & More
              • Pure React
              • React Vs Vanilla JavaScript
              • What is REACT?
              • Why do FrontEnd Frameworks Exists
            • 🔗 React
            • All The JavaScript You Need To Know For React
            • All The JavaScript You Need To Know For React (More JS To Know)
            • React Introduction - Bro Code
            • 🔗 SQL
            • 1 - SQL Introduction
            • 2 - Setup MySQL
            • 3 - MySQL How to create a DATABASE
            • 4 - MySQL How to Create Table
            • 5 - MySQL How to INSERT rows into a TABLE
            • 6 - How to Select Data from a TABLE
            • 🔗 Supabase 101
          • 🔗 Programming
          • Pi Metasploitable
          • Raspberry Pi Kali-Linux Headless Setup
            • Advent of Cyber 2024 ⛄️❄️
            • Day 1 Maybe SOC-mas music, he thought, doesn't come from a store?
            • Day 2 One man's false positive is another man's potpourri
            • Day 3 Even if I wanted to go, their vulnerabilities wouldn't allow it
            • Day 4 I'm all atomic inside!
            • Day 5 SOC-mas XX-what-ee
            • Day 6 If I can't find a nice malware to use, I'm not going
            • Day 7 Oh, no. I'M SPEAKING IN CLOUDTRAIL!
            • Blue
            • Decryptify
            • Epoch
            • IDE
            • Light
            • RootMe
            • Simple CTF
            • TryHack3M Bricks Heist
            • W1seGuy
            • Command Line
            • Cryptography
            • Networking
            • Networking Fundamentals
            • Windows and AD Fundamentals
            • CyberSecurity 101
            • Active Directory Basics
            • Bypass Really Simple Security
            • Command Injection
            • Cryptography Basics
            • Defensive Security Intro
            • Intro to LAN
            • Linux Shells
            • Metasploit Introduction
            • Networking Concepts
            • Networking Core Protocols
            • Networking Essentials
            • Offensive Security Intro
            • Public Key Cryptography Basics
            • Search Skills
            • SOC L1 Alert Triage
            • Summary - Active Directory Basics
            • Walking An Application
            • What is Networking
            • Windows Command Line
            • Windows Fundamentals 1
            • Windows Fundamentals 2
            • Windows Fundamentals 3
            • Windows PowerShell
          • 🐧 TryHackMe
          • Content Discovery
          • Networking Secure Protocols
          • TryHackMe TODO List
      • About Me
      • Blog Posts 📚

    📝 Latest Posts

    • Raspberry Pi Kali-Linux Headless Setup

      Jun 08, 2025

      • RaspberryPi
      • Blog
    • before you code, learn how computers work

      Jun 08, 2025

      • programming
      • LowLevel
      • Assembly
      • Blog
      • programming101
    Home

    ❯

    CYBVU 23.2

    ❯

    Winter 24' Y2S1

    ❯

    NIT2141 Digital Forensics and Ethical Hacking

    ❯

    Lab 2 DFEH

    Lab 2 DFEH

    Jun 08, 20251 min read

    • CYBVU
    • NIT2141
    • WEEK2


    8 PICS

    REPORT


    Graph View

    • 8 PICS
    • REPORT

    Backlinks

    • Week 2 - Computer Forensics

    NeoSpace©2024 🐉