<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Prasan Singh</title>
    <description>The latest articles on DEV Community by Prasan Singh (@prasan26).</description>
    <link>https://dev.to/prasan26</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F643600%2F926ad6fa-e411-47bd-9559-d30f9001e50b.jpg</url>
      <title>DEV Community: Prasan Singh</title>
      <link>https://dev.to/prasan26</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/prasan26"/>
    <language>en</language>
    <item>
      <title>Significance of competitive intelligence</title>
      <dc:creator>Prasan Singh</dc:creator>
      <pubDate>Mon, 09 May 2022 14:22:03 +0000</pubDate>
      <link>https://dev.to/prasan26/significance-of-competitive-intelligence-2ci4</link>
      <guid>https://dev.to/prasan26/significance-of-competitive-intelligence-2ci4</guid>
      <description>&lt;p&gt;&lt;strong&gt;Competitive Intelligence&lt;/strong&gt;, sometimes referred to as business intelligence, refers to the skill to gather, analyze, and use information collected on participants, customers, and other market factors contributing to a business’s cheap advantage. Competitive Intelligence is crucial because it helps companies understand their competitive environment and the opportunities and challenges it presents. Businesses analyze the information to create effective and efficient business practices.&lt;/p&gt;

&lt;p&gt;How does competitive Intelligence works?&lt;br&gt;
By definition, competitive Intelligence assembles actionable information from diverse published and unpublished sources, collected efficiently and ethically. Ideally, a business successfully employs competitive Intelligence by cultivating a detailed enough portrait of the marketplace so it may anticipate and respond to challenges and problems before they arise.&lt;/p&gt;

&lt;h2&gt;
  
  
  Here are some problems that will face in a competitive field in competitive Intelligence is:
&lt;/h2&gt;

&lt;p&gt;1.) &lt;strong&gt;poor competitive differentiation&lt;/strong&gt;: Competitive intl was too general and didn’t differentiate based on specific competitors. The information was also feature-specific, rather than giving insight for employees to set the product apart from valued propositions. It didn’t help the business stand out.&lt;/p&gt;

&lt;p&gt;2.) &lt;strong&gt;decentralized competitive Intelligence&lt;/strong&gt; : Information was being pushed out, but it was scattered everywhere. Employees would have to sift through old emails, docs, and slides in an attempt to find the insights they needed.&lt;/p&gt;

&lt;p&gt;3.) &lt;strong&gt;internal messaging was inaccurate&lt;/strong&gt;: Out-of-date information is terrible but incorrect information is worse. There was a disconnect between what marketing said and what sales experienced; marketing campaigns pushed positive positioning slants that weren’t true&lt;/p&gt;

&lt;p&gt;4.) &lt;strong&gt;competitive information lacked strategic direction&lt;/strong&gt;: There was no clearly defined strategy behind the competitive Intelligence being gathered. Sales teams were using the intel on an ad-hoc basis rather than creating structured battle cards that could help them through every sales cycle stage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Competitive Intelligence&lt;/strong&gt; is the systematic collection and analysis of information from multiple sources and a coordinated business’s competitive advantage. It is the action of defining, gathering, analyzing, and distributing Intelligence about products, customers, competitors, and any aspect of the environment needed to support executives and managers in strategic decision-making for an organization. Competitive Intelligence means understanding and learning what is happening in the world outside the business to increase one’s competitiveness. It means learning as much as possible, as soon as possible, about one’s external environment, including one’s industry in general and relevant competitors.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--cbl_tA70--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/bj6mv4izo1x70wihrc61.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--cbl_tA70--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/bj6mv4izo1x70wihrc61.jpeg" alt="Image description" width="630" height="354"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Takeaways
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Competitive Intelligence is a legal business practice instead of industrial espionage, which is illegal.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The focus is on the external business environment.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;There is a process involved in gathering information, converting it into Intelligence, and then using it in decision making.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Some Competitive intelligence professionals erroneously emphasize that if the Intelligence gathered is not usable or actionable, it is not Intelligence.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;How Competitive Intelligence Works In order to obtain competitive Intelligence, companies can gather data and information from a vast amount of sources: customers, competitors, industry experts and reports, trade shows and conferences, financial statements, and government records. Additionally, due to the explosion of user-generated content on blogs, forums, social networks, and more, more information is available than ever before. This has led to a new phenomenon named ‘information overload.’ To deal with this exponential expansion of data, companies rely on tools and apps that help them collect, process, and analyze data more efficiently.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Check out CyberJunk Community Discord Server to get your hands on exclusive infosec tools, researches, and premium courses at no cost.&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Connect with me:&lt;br&gt;
LinkedIn: &lt;a href="https://www.linkedin.com/in/prasan-singh-13ba15198/"&gt;https://www.linkedin.com/in/prasan-singh-13ba15198/&lt;/a&gt;&lt;br&gt;
Twitter: &lt;a href="https://twitter.com/parsan26"&gt;https://twitter.com/parsan26&lt;/a&gt;&lt;br&gt;
Join The Community:&lt;br&gt;
LinkedIn: &lt;a href="https://www.linkedin.com/company/cyber-junk"&gt;https://www.linkedin.com/company/cyber-junk&lt;/a&gt;&lt;br&gt;
Discord: &lt;a href="https://discord.gg/ZmCmkw2enz"&gt;https://discord.gg/ZmCmkw2enz&lt;/a&gt;&lt;br&gt;
Support my HackClub:&lt;br&gt;
&lt;a href="https://bank.hackclub.com/donations/start/cyber-junk"&gt;https://bank.hackclub.com/donations/start/cyber-junk&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>beginners</category>
      <category>career</category>
      <category>linux</category>
      <category>computerscience</category>
    </item>
    <item>
      <title>Types of Steganography methods that are used for hiding confidential data.</title>
      <dc:creator>Prasan Singh</dc:creator>
      <pubDate>Sun, 08 May 2022 04:14:05 +0000</pubDate>
      <link>https://dev.to/prasan26/types-of-steganography-methods-that-are-used-for-hiding-confidential-data-1ebj</link>
      <guid>https://dev.to/prasan26/types-of-steganography-methods-that-are-used-for-hiding-confidential-data-1ebj</guid>
      <description>&lt;p&gt;** Are the images really safe? **&lt;br&gt;
Steganography, according to Wikipedia, is the practice of concealing a message within another message or a physical object. In computing/electronic contexts, a computer file, message, image, or video is hidden within another file, message, image, or video. The word steganography comes from Greek steganographia, which combines the words steganós, meaning “covered or concealed,” and -graphia meaning “writing.”&lt;/p&gt;

&lt;h2&gt;
  
  
  Steganography Types
&lt;/h2&gt;

&lt;p&gt;The type of cover data is also the type of steganography. Today, steganography is examined as text, image, audio, video, and protocol steganography.&lt;/p&gt;

&lt;h2&gt;
  
  
  Text Steganography
&lt;/h2&gt;

&lt;p&gt;Confidential data is hidden in text files. Different methods can be used to hide the data in the text file. These methods include;• Format Based Method: Confidential data is hidden inside cover data with techniques such as adding text spaces, deliberate typing errors, and sizes of writing types. This method is easily detectable by computer software. Hence, it is a less preferred method.&lt;/p&gt;

&lt;p&gt;• Random and Statistical Method: Hidden data is stored inside character strings. Places where confidential information is hidden must be reported to the extractor.&lt;/p&gt;

&lt;p&gt;• Linguistics Method: Hidden data is stored in the syntactic structure.&lt;/p&gt;

&lt;h2&gt;
  
  
  Image steganography
&lt;/h2&gt;

&lt;p&gt;is the method of hiding data inside an image file as cover data. In image steganography, pixel densities are used to hide the data. The most commonly used image formats as cover data are; BMP, PNG, JPEG, TIFF, and GIF(Kamble et al., 2013). Image steganography uses the weaknesses of the human visual system (HVS).&lt;/p&gt;

&lt;p&gt;Most commonly used methods in image steganography;&lt;/p&gt;

&lt;p&gt;• Least Significant Bit (LSB)&lt;/p&gt;

&lt;p&gt;• Spread spectrum&lt;/p&gt;

&lt;p&gt;• F5&lt;/p&gt;

&lt;p&gt;• Palette embedding&lt;/p&gt;

&lt;p&gt;• Wavelet transform&lt;/p&gt;

&lt;h2&gt;
  
  
  Data masking
&lt;/h2&gt;

&lt;p&gt;Audio SteganographyThis method hides data inside sound files. This method uses audio file formats such as WAV, AU, and MP3 as cover data. Audio steganography has different methods.&lt;/p&gt;

&lt;p&gt;These methods include;&lt;/p&gt;

&lt;p&gt;• Least Significant Bit (LSB)&lt;/p&gt;

&lt;p&gt;• Parity coding&lt;/p&gt;

&lt;p&gt;• Phase coding&lt;/p&gt;

&lt;p&gt;• Spread spectrum&lt;/p&gt;

&lt;p&gt;• Echo hiding.&lt;/p&gt;

&lt;h2&gt;
  
  
  Video Steganography
&lt;/h2&gt;

&lt;p&gt;It is the technique of hiding any file or data inside a digital video format file. Video steganography uses H.264, Mp4, MPEG, and AVI video formats as cover data. So almost all of the steganography techniques that can be applied to image and audio files can be used for video files. Video steganography provides less perceptibility because the video is a flow of images and sounds at a high frame rate. Due to the large size of video files, the payload capacities of video steganography is quite large.&lt;/p&gt;

&lt;h2&gt;
  
  
  Network or Protocol Steganography
&lt;/h2&gt;

&lt;p&gt;It aims to hide confidential data inside a cover object protocol such as TCP, UDP, ICM, and IP. There are hidden channels in the OSI layer networking model where steganography can be used.&lt;/p&gt;

&lt;h2&gt;
  
  
  Steganography Defense
&lt;/h2&gt;

&lt;p&gt;Detecting and managing malicious use of steganography already happening on a network is very difficult.&lt;/p&gt;

&lt;p&gt;According to Barwise, “If an adversary is to able to penetrate a network successfully and unsuspectingly install malware onto a system that uses digital steganography to hide its presence, then the network and all associated data contained therein should be considered entirely compromised (Theoretical Framework). This is a good description of how difficult it is to detect and respond to the use of hidden data techniques against your information resources. Antivirus and IPS are not likely to detect malicious content in images or audio. It is difficult to detect network-based steganography with monitoring solutions. Consequently, the best approach to steganography defense is the implementation of known ways to prevent the infiltration of malware and unwanted utility software.&lt;/p&gt;

&lt;h2&gt;
  
  
  Prevention:
&lt;/h2&gt;

&lt;p&gt;For prevention, the first step is identifying ways steganographic tools and infected carriers can find their way onto your network. The next step is to block them. In addition to implementing antivirus, IPS, and firewalls according to current best practices:&lt;/p&gt;

&lt;p&gt;• Remove local admin access from all day-to-day accounts&lt;/p&gt;

&lt;p&gt;• Only allow installation of whitelisted applications&lt;/p&gt;

&lt;p&gt;• Strictly enforce least privilege and need-to-know&lt;/p&gt;

&lt;p&gt;• Segment the network and prevent access to database servers to anything but application servers and strictly manage traffic entering and leaving the segments by using explicit allows&lt;/p&gt;

&lt;p&gt;• Ensure all applications that access database servers have strong input validation&lt;/p&gt;

&lt;p&gt;• Prohibit or strictly manage script and macro execution&lt;/p&gt;

&lt;p&gt;• Consider blocking or alerting on suspicious movement of certain file types, including stripping them from all email messages Image files Audio files Video files Larger than regular Office applications (normal for your organization)&lt;/p&gt;

&lt;p&gt;• Only download and install applications or other media from the internet that includes a valid hash value you can check&lt;/p&gt;

&lt;p&gt;• Block general use of USB storage&lt;/p&gt;

&lt;p&gt;• Train users not to download images, songs, videos, and other media from the internet, especially from social networking sites.&lt;/p&gt;

&lt;p&gt;How an organization approaches these controls depends on its unique operating environment and management’s willingness to deal with the potential employee frustration.&lt;/p&gt;

&lt;p&gt;It is all about risk and management’s appetite for risk. Deep Secure developed a novel approach to prevention. Their content threat removal tools assume all content is compromised. Original content is not delivered to the recipient. Instead, obvious business/functional information is stripped and placed into a new document/file. This reconstructed document/file is delivered, and the original is dropped.&lt;/p&gt;

&lt;p&gt;Monitoring and Detection&lt;/p&gt;

&lt;p&gt;As always, assume malicious actors find ways to circumvent your prevention controls. Some ways to proceed are:&lt;/p&gt;

&lt;p&gt;• Monitor network behavior for anomalous packet traffic such as that described in the section, Attack Command and Control&lt;/p&gt;

&lt;p&gt;• Monitor user behavior for unusual access and large data transfers&lt;/p&gt;

&lt;p&gt;• Scan all computers, especially user devices, for steganography tools&lt;/p&gt;

&lt;p&gt;• Periodically use forensics tools to test all or a meaningful sample of potential carriers found on the network to determine if they might contain hidden information&lt;/p&gt;

&lt;p&gt;CONCLUSION: Steganography is used for good and malicious purposes, from securing confidential and sensitive data to stealing or backdooring the network.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Connect with me:&lt;br&gt;
LinkedIn: &lt;a href="https://www.linkedin.com/in/prasan-singh-13ba15198/"&gt;https://www.linkedin.com/in/prasan-singh-13ba15198/&lt;/a&gt;&lt;br&gt;
Twitter: &lt;a href="https://twitter.com/parsan26"&gt;https://twitter.com/parsan26&lt;/a&gt;&lt;br&gt;
Join The Community:&lt;br&gt;
LinkedIn: &lt;a href="https://www.linkedin.com/company/cyber-junk"&gt;https://www.linkedin.com/company/cyber-junk&lt;/a&gt;&lt;br&gt;
Discord: &lt;a href="https://discord.gg/ZmCmkw2enz"&gt;https://discord.gg/ZmCmkw2enz&lt;/a&gt;&lt;br&gt;
Support my HackClub: &lt;br&gt;
&lt;a href="https://bank.hackclub.com/donations/start/cyber-junk"&gt;https://bank.hackclub.com/donations/start/cyber-junk&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>linux</category>
      <category>security</category>
      <category>cybersecurity</category>
      <category>serverless</category>
    </item>
    <item>
      <title>Role of Mobile Forensics in dealing with Mobile Threats.</title>
      <dc:creator>Prasan Singh</dc:creator>
      <pubDate>Sun, 12 Sep 2021 12:57:25 +0000</pubDate>
      <link>https://dev.to/prasan26/various-threats-associated-with-mobile-devices-and-identify-mobile-forensics-role-in-dealing-with-them-1kpg</link>
      <guid>https://dev.to/prasan26/various-threats-associated-with-mobile-devices-and-identify-mobile-forensics-role-in-dealing-with-them-1kpg</guid>
      <description>&lt;p&gt;Mobile devices such as smartphones and tablets have become an integral part of modern first world life. There are literally billions of active mobile devices. Each device typically contains a large amount of sensitive data about the user, as well as individuals and organizations with which the user interacts. They also act as endpoints that are typically authenticated and authorized to access a wide variety of secured systems. And most mobile devices are connected to the public internet a significant amount of the time. Mobile devices are small mobile computing devices. Each is comprised of a combination of hardware and software. Each is potentially susceptible to compromise by many different means. Various threats associated with mobile devices are listed below:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Data Leakage. &lt;/li&gt;
&lt;li&gt;Mobile apps are often the cause of unintentional data leakage.&lt;/li&gt;
&lt;li&gt;Unsecured Wi-Fi.&lt;/li&gt;
&lt;li&gt;Network Spoofing.&lt;/li&gt;
&lt;li&gt;Phishing Phishing and social engineering attacks.&lt;/li&gt;
&lt;li&gt;Broken Cryptography.&lt;/li&gt;
&lt;li&gt;Improper Session Handling.&lt;/li&gt;
&lt;li&gt;Poor cyber hygiene, including weak passwords and improper or 
no use of multifactor authentication (MFA)&lt;/li&gt;
&lt;li&gt;Poor technical controls, such as improper session handling, 
out-of-date devices and operating systems, and cryptographic 
controls&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Perhaps the most difficult threat to defend against is the user. Users can be turned into unwilling accomplices of an adversary through many types of social engineering, or they can simply make a mistake in configuring or using the device. Either way, the technical security controls can often be defeated by the user being induced to do the wrong thing through error, trickery, coercion, or ill intent. Once this occurs, the systems to which they have access, such as their employer, can be at risk, as well as their own sensitive data.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--xpNbUm_q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9vs8mrvr9719dlx3m9bd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--xpNbUm_q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9vs8mrvr9719dlx3m9bd.png" alt="Screenshot (397)"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Mobile devices can be attacked via web browser, email clients, instant messaging systems, and through compromised or malicious apps. Once compromised, an adversary may compromise the confidentiality, integrity, or availability of the data on the device, or may use the device as a way to do the same on systems to which the mobile device is connected&lt;/p&gt;

&lt;p&gt;A compromised mobile device may also be used as a resource by an adversary. They may, for example, use it to send spam email or unsolicited text messages. They might use it to mine cryptocurrency. Or they might use it to artificially increase the number of clicks on advertising to fraudulently gains ad revenue.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--8uaRFWOF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/e1pum8pyybnkbipqwaj4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--8uaRFWOF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/e1pum8pyybnkbipqwaj4.png" alt="ipconfig-help"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A mobile device that is lost may contain data that has not been properly backed up elsewhere, resulting in loss of that data. This may result in economic loss as well as non-monetary consequences. If that data is subject to unauthorized access by an adversary, there may be additional consequences ranging from economic to legal to reputational.&lt;/p&gt;

&lt;p&gt;As noted in the text Forensic science: An introduction (Saferstein, 2016), and presented on YouTube (Hinkson, 2019), digital forensic investigation of a mobile device can provide evidence that can be used to determine the temporal order of events as well as a causal chain of cause and effect. By gathering evidence, we can help determine the facts, and may be able to determine who is responsible as well as how and why the crime occurred. By gathering the evidence, we can help in determining the facts of innocence or guilt of a suspect, and/or by performing post-compromise analysis, we may be able to determine how an adversary compromised the security of a device and help improve security controls in the future. &lt;/p&gt;

&lt;h1&gt;
  
  
  Hack This Fall 2.0
&lt;/h1&gt;

&lt;p&gt;&lt;strong&gt;Hack This Fall&lt;/strong&gt; is an Online Hackathon powered by MLH. It is taking place shortly, you can join this Hackathon by the following link: &lt;a href="https://hackthisfall.devpost.com/"&gt;https://hackthisfall.devpost.com/&lt;/a&gt; and Use code &lt;strong&gt;HTFHE030&lt;/strong&gt; while registering for it. Don't let an awesome opportunity go! &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--6EbMwR-n--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3nyc7tdp9g6hpwhr0vmb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--6EbMwR-n--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3nyc7tdp9g6hpwhr0vmb.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>computerscience</category>
    </item>
    <item>
      <title>how to identify the traces of the tor browser during the investigation?</title>
      <dc:creator>Prasan Singh</dc:creator>
      <pubDate>Fri, 13 Aug 2021 19:16:38 +0000</pubDate>
      <link>https://dev.to/prasan26/how-to-identify-the-traces-of-the-tor-browser-during-the-investigation-2da6</link>
      <guid>https://dev.to/prasan26/how-to-identify-the-traces-of-the-tor-browser-during-the-investigation-2da6</guid>
      <description>&lt;p&gt;Tor browser is one of the topics that excite every cybersecurity enthusiast. Tor was made for only one purpose, i.e., to make the user anonymous on the internet. It is used to access the Dark web, the deepest entity of the known Internet. Let's understand the working of Tor before investigating it. Tor browsers is based on Mozilla Firefox and work on relays. These are routers or nodes through which the traffic passes. These relays are divided into three levels:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Entry Relay: When establishing a Tor network, the user connects to the entry node, from which the user's IP address can be seen.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Middle Relay: Here, the data is transferred in an encrypted mode.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Exit Relay:  data is sent to the destination servers through this node. Thus, the exit node is seen as the origin of the traffic, hiding the original identity of the user.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The working and routing technique is known as onion routing. Tor browser provides access to .onion websites available on the dark web. Tor’s hidden service protocol allows users to host websites anonymously with. Users on the Tor network can only access BIT domains and these websites.&lt;/p&gt;

&lt;p&gt;Although the Tor browser provides anonymity to its users, artifacts pertaining to the activities performed on it reside on the system RAM as long as the system is not powered off. Investigators can acquire a RAM dump of the live suspect machine to identify and analyze the artifacts pertaining to malicious use of the Tor browser. To investigate cybercrimes perpetrated using the Tor browser, forensic investigators should collect RAM dumps from the suspect machine and study them to determine the malicious activities performed using the Tor browser, including websites visited, emails accessed, and programs downloaded. &lt;/p&gt;

&lt;p&gt;When the Tor browser is installed on a Windows machine, it uses port 9150/9151 for establishing connections via Tor nodes. Forensic investigators can obtain the path from where the TOR browser is executed in the following Registry key: HKEY_USERS&amp;lt;SID&amp;gt;\SOFTWARE\Mozilla\Firefox\Launcher. The investigator analyzes the ‘State’ file located in the path where the Tor browser was executed on a suspect machine. &lt;/p&gt;

&lt;p&gt;When the Tor browser is uninstalled from a machine, or if it is installed in a location other than the desktop (in Windows), it is difficult for investigators to know whether it was used or the location where it is installed, examining the prefetch files helps the investigators in obtaining this information. The prefetch files are located in the directory, C:\WINDOWS\Prefetch on a Windows machine. Using tools such as WinPrefetchView, investigators can obtain metadata related to the browser, which includes:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Browser created timestamps&lt;/li&gt;
&lt;li&gt;Browser last run timestamps&lt;/li&gt;
&lt;li&gt;Number of times the browser was executed&lt;/li&gt;
&lt;li&gt;Tor browser execution directory&lt;/li&gt;
&lt;li&gt;Filename&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Linkedin: &lt;a href="https://linkedin.com/company/cyber-junk"&gt;https://linkedin.com/company/cyber-junk&lt;/a&gt;&lt;br&gt;
Discord: &lt;a href="https://discord.gg/ZmCmkw2enz"&gt;https://discord.gg/ZmCmkw2enz&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>computerscience</category>
      <category>linux</category>
    </item>
  </channel>
</rss>
