na mídia

Gostou das minhas publicações e quer que eu escreva um artigo?

Entre em contato: [email protected]

eForensics e PenTest Magazine, perfil: https://eforensicsmag.com/meet-expert-petter-anderson-lopes/

Cryptoid: https://cryptoid.com.br/banco-de-noticias/ipv6-vs-ipv4-quais-as-diferencas/ e https://cryptoid.com.br/banco-de-noticias/23109/

Julio Della Florahttps://juliodellaflora.wordpress.com/2017/03/02/ipv6-vs-ipv4-quais-as-diferencas-cryptoid/ e https://juliodellaflora.wordpress.com/2017/02/20/direito-digital-cryptoid/

últimas publicações

pentest Magazine,

hakin9 magazine

e

eforensics magazine

ESP8266 AND WIFI PENTEST

ESP8266 AND WIFI PENTEST

by Petter Anderson Lopes

This article aims to demonstrate different views on sniffing techniques in wireless networks. With the growing need to keep people connected, wireless networks become the escape valve to address this demand. However, how exactly do these networks work? There are issues related to the professional activities of digital analysis with the use of network sniffers, which are programs that have the function of capturing the packets that travel in the network.

Link: https://pentestmag.com/download/pentest-penetration-tests-wi-fi-networks/

Leia na íntegra: https://periciacomputacional.com/esp8266-and-wireless-pentest/

eForensics e PenTest Magazine, perfil: https://eforensicsmag.com/meet-expert-petter-anderson-lopes/

Exploiting SMB and Kerberos to obtain Administrator access

Exploiting SMB and Kerberos to obtain Administrator access

by Petter Anderson Lopes

The present article aims to demonstrate the main steps to perform an invasion test. Serving as a solution to the growing demand for increased need to keep people connected, wireless networks have come to play a key and indispensable role in corporate networks. These networks, in turn, need effective monitoring and the professionals who manage them must understand the risks and map out the existing vulnerabilities. The procedures for detecting safety flaws can be automated through tools or made by a qualified professional who will manually validate each critical point, this being the Pentester. This work aims to demonstrate the steps of performing an intrusion test in order to obtain critical data such as Network Administrator access. By using intrusion testing, network administrators can identify vulnerabilities and thus propose improvements and fixes to avoid being the target of some invasion by digital criminals.

Link: https://hakin9.org/download/how-to-open-a-backdoor-in-android-devices-preview/

eForensics, PenTest Magazine e Hakin9 perfil: https://eforensicsmag.com/meet-expert-petter-anderson-lopes/

FORENSIC EXAMINATION WITH AUTOPSY FOR WINDOWS

FORENSIC EXAMINATION WITH AUTOPSY FOR WINDOWS

by Petter Anderson Lopes

Because of the great technological advances and the dependence of companies and individuals regarding the equipment and information systems, crimes have also evolved and we started to use computerized equipment as a tool. Thus, the collection and analysis of digital evidence for both legal and commercial purposes requires a professional trained for such work, which is a Forensic Analyst or Forensic Expert, or Expert Witness to court of law. The following study shows some procedures present in the Computer Forensics Expertise cycle; preservation practices, collection, analysis and completion are elucidated in the text. Clarifications about the expert’s responsibilities, as well as some search tips are also covered. Free tools are also included and I will cover other general aspects surrounding the subject.

Link: https://eforensicsmag.com/download/tools-of-the-trade/

Leia na íntegra: https://periciacomputacional.com/forensic-examination-with-autopsy-for-windows/

PENTESTING WITH POWERSHELL IN SIX STEPS

PENTESTING WITH POWERSHELL IN SIX STEPS

by Petter Anderson Lopes

The purpose of this article is to provide an overview of the application of penetration testing using Powershell. As such, the presentation is not overly technical in scope, but covers instead what penetration testing is, what benefits stakeholders in a secure system receive from a test, and how Powershell can used to conduce some steps of penetration testing. The presentation goes into an example procedure for penetration testing, explain some steps Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks and Reporting. These represent the steps that attackers use in common attacks. Finally, this presentation also briefly discusses some techniques involving non-conventional devices such as Smartphone bootable and the dangers of an unprepared team.

Link: https://pentestmag.com/download/pentest-pawning-powershell/

Leia na íntegra: https://periciacomputacional.com/pentesting-with-powershell-in-six-steps/

FORENSICS WITH AUTOPSY AND PALADIN

FORENSICS WITH AUTOPSY AND PALADIN

by Petter Anderson Lopes

The purpose of this article is to provide an overview of forensic data collection and analysis with the Paladin 7 Linux distribution and the Autopsy analysis tool. As such, the presentation does not have the objective of exhausting the subject. The presentation passes to an example forensic collection procedure using the Toolbox tool of the Paladin 7 distribution, after the Autopsy tool is used to analyze the Windows 10 Operating System. These procedures represent the steps that the Forensic Expert addresses to answer the proposed technical questions. Finally, this presentation also briefly discusses some free tools for computational forensics.

Link: https://eforensicsmag.com/download/linux-memory-forensics/

Leia na íntegra: https://periciacomputacional.com/forensics-with-autopsy-and-paladin/

Precisa de ajuda?

+55 54 99645-0777

Petter Anderson Lopes. Todos os direitos reservados. 2017