Tuesday, 31 August 2021

Useful Forensic information in Apple MAC

 If you are a MAC user and looking to see some great information visit the following locations to find more information 


  • To see the History of installed Application cat /Library/Receipts/InstallHistory.plist

  • User Password  ~/Library/Keychains

  • List of Historically connected Wifi Access points  /Library/Preferences/SystemConfiguration/com.apple.airport.preferences

  • Current and historical Bluetooth devices : ~/Library/Preferences/com.apple.BluetoothAudioAgent.plist

  • Recently opened files,appliations and savers ~/Library/Preferences/com.apple.recentitems.plist

Tuesday, 24 August 2021

Attach new Hard Disk to Debian Virtual Machine in VMware Workstation Pro

Subscribe to " FACEITNET " Youtube channel for more interesting videos 

There are situations where you need to add 2nd Hard Disk to your virtual Machine. In windows its  quite an easy process. Click Here to see how to do this in windows. But Linux/ Debian you have to use some commands in terminal to archive this. 

This step by step document shows you how to add 2nd Disk on Debian OS. 

First Create a new virtual disk and attack to VM. to do this you need to shutdown the VM and add new virtual hard Disk. 






Once finished, you have created and attached the new virtual disk to your virtual machine you must logically configure it before it is ready for use

Power on the VM and go to terminal and confirm the disk is attached 


now you must format the disk with a filesystem, i am  going to use the fourth extended filesystem (ext4)

1) sudo mkfs.ext4 /dev/sdb


Now we have to mount this to the system, Create a new directory within /mnt using the following command:

2) sudo mkdir /mnt/external

configure it to mount automatically, this is done via fstab.

First, backup the fstab file 

3) sudo cp /etc/fstab /etc/fstab.bak 

Now edit the file  to the fstab file using the following sed command:

4) sudo sed -i -e '$a/dev/sdb\t/mnt/external\text4\tdefaults\t0\t0' /etc/fstab

now mount the disk 

5) sudo mount /mnt/external

Now you can create the directory under the disk 

6) sudo mkdir /mnt/external/analyst

change the user and group ownership of the directory to the analyst 

7) sudo chown analyst:analyst /mnt/external/analyst

 create a symbolic link, located on the analyst user’s desktop

8)  ln -s /mnt/external/analyst/ ~/Desktop/external



How to Share a File from Windows host to Dabian Guest in VMware Workstation Pro?

Subscribe to " FACEITNET " Youtube channel for more interesting videos 

If you are wondering how can i share a file or Folder from your windows host operating system to a Debian Guest operation system then follow the steps below. 

Go to your windows system and create a folder you wish to share with Guest OS. 


Then go to VMware setting and click on the option tab on the top, 

Now go to shared folder and enable the Folder Sharing. 

Then click on the add button and provide the path of the folder you would like to share with 


Click next and finish the file sharing. Now you would see something like below. 
 

Go to the Debian Terminal and use the following command to check the file is been shared

in the sudo 

cd /mnt/hgfs and enter

now type ls to list the files. 


you can create a symbolic link to your desktop and access the files too 

in the terminal run the following command 

 ln -s /mnt/hgfs/forensics ~/Desktop/myData



Now you can see the shared folder in the Debian. 
 








Monday, 23 August 2021

How to check the integrity of the downloaded file?

Subscribe to " FACEITNET " Youtube channel for more interesting videos 

Let's say, you have downloaded an operating system file from the internet and you are wondering whether it is the right file or it's been modified?

Most of the Applications and operating system ISO files today provide the checksum or SHA hash value as well. 

Once you downloaded the file check the SHA values to confirm you have got the file with no modification. 

Let's see how we can check the SHA hash to confirm the integrity of the downloaded file. In windows, you can use the Powershell command Get-FileHash

I have downloaded a file from the internet and saved it in the Download folder and the SHA has they had on the website

SHA1: 968126a78c9b56c019133fac3a5ec9a9c57db9ce 

PS C:\Users\Instructor\Downloads> get-filehash  .\debian-x64-buster-forensics.ova -Algorithm sha1


Alternatively, if you are using either macOS or Linux as your host environment, can calculate the SHA1 of the downloaded file using the following terminal command:  shasum -a1

Terminal: shasum -a1 <file path>



If the calculated SHA1 value does not match the value provided above then you need to redownload or consider downloading from another location 

Saturday, 21 August 2021

Setting up Outlook 2016 with gmail GSuite

Subscribe to " FACEITNET " Youtube channel for more interesting videos 

Configuring outlook against google's GSuite is always an issue. 

Many of us wondering why can't simply configure it though they both are very well-known service providers. But still, it's an issue.

In this step-by-step configuration, I will show how to configure outlook 2016 using GMail business. 

First, this is you need to go to your GSuite admin and enable a Less secure app in the google admin for the entire organization. 

To do this. go to your Google admin and Security settings and select "Users to manage their access to less secure app". this may take 24 hours to propagate. 



Then go to your personal mail and click on the profile picture and manage and click Turn on access ( not Recommend) 

then you can see the option to turn on the Less secure app and save the setting. 

Now go to your outlook mail app ( 2016 )  and do the step by step configuration given below

Click Yes to configure 


Select Manual Setup as the outlook is not going to identify the Autodiscovery of Gmail account. 


 ( Make sure in your email settings IMAP is enabled- go to Gmail and settings  ) . 



Select POP or IMAP on outlook configuration 


Select IMAP account Type. 


Go to more settings and Outgoing server select the tick box as given below

In the advance setting tab change the configurations as given below 



You can see how it's configured. 


Thanks all. 


Friday, 20 August 2021

Configure Self-Sign Digital Certificate on PaloAlto Firewall

Subscribe to " FACEITNET " Youtube channel for more interesting videos 

First is a self-signed root certificate authority (CA) certificate, which is the top-most certificate in the certificate chain. The Firewall can use this certificate to automatically issue certificates for other uses. In this, you will use the Root CA certificate to generate a new certificate for the Firewall to use for Inbound Management Traffic, replacing the default certificate issued specifically for this environment


login to the firewall by going into the client machine and use the browser 

in the browser enter https://192.168.1.254 ( which is the management IP, 192.168.1.1 is the LAN interface IP) 


then accept the warning and go to the login page and log in with the given username and password 
once logged in 


Navigate to Device > Certificate Management > Certificates



Click on the Generate button


This will generate a certificate for the Firewall to act as a root Certificate Authority (CA). The IP address, 203.0.113.20, used in the Common Name field is the Firewall’s outside IP address. It is best practice that a digest algorithm of sha256 or higher is used for enhanced security. By increasing the default digest to sha512, you have created a much stronger certificate.








Click on the Generate button again 


and add the information, 


In the Generate Certificate window, type lab-management in the Certificate Name field. Then, type 192.168.1.254 in the Common Name field. Next, select lab-firewall in the Signed By dropdown field and make sure to add the certificate Attributes as well. if you forgot to do so then you can't edit and add. you need to delete the certificate and recreate it again.


In the Generate Certificate window, click OK to continue




Now we can see both CA Root Certificate and the end level certificate are available on the certificate management. we need. to make a new profile and replace the existing default certificate with the newly created self-sign certificate. 

Navigate to Device > Certificate Management > SSL/TLS Service Profile > Add.




Navigate to Device > Setup > Management




Click the gear icon on the General Settings section, located in the center,In the General Settings window, select Management from the SSL/TLS Service Profile dropdown. Then, click the OK button.



Now the profile is configured and attached to management traffic. 


we need to export the newly configured root CA digital certificate to use on the end device which is going to connect to this firewall. 


Export Certificate and Commit



In the Export Certificate - lab-firewall window, select Base64 Encoded Certificate (PEM) in the File Format dropdown



Save this on the local computer. and commit the change on the firewall, you will see the firewall is going to restart the web services and hang in there at 99%, this is because your browser is still open. close the browser and reopen now. 




Now go to your browser and import the certificate we just downloaded 






you can see the browser says it could not verify the certificate. because we have not imported this under browser certificates yet.  let's import now. 

Go to browser preference ( this is in firefox) and" Privacy and security " click certificates. 








Click the Trust this CA to identify websites 


you can see the certificate is in the certificate store. 


Relaunch the browser now.  There is no certificate warnning anymore.






Http vs Https