مارس 02, 2023 / By Wael Alnahari / in الطب الشرعي الرقميالأمن السيبراني
Workflow 1: File #1 ------ Attack #1 ------ Attack #2 ------ Attack #3 File #2 ------ Attack #1 ------ Attack #2 ------ Attack #3 File #3 ------ Attack #1 ------ Attack #2 ------ Attack #3
Workflow 2: File #1 ------ Attack #1 File #2 ------ Attack #1 File #3 ------ Attack #1 File #1 ------ Attack #2 File #2 ------ Attack #2 File #3 ------ Attack #2 File #1 ------ Attack #3 File #2 ------ Attack #3 File #3 ------ Attack #3
Newdocument.docx ------ Dictionary attack top-10000 ------ Digit only passwords (1-6 digits) ------ Dictionary attack with mutations English.dic ------ Dictionary attack with mutations Spanish.dic ------ Brute force attack (1-8 characters) Expenses.xlsx ------ Dictionary attack top-10000 ------ Digit only passwords (1-6 digits) ------ Dictionary attack with mutations English.dic ------ Dictionary attack with mutations Spanish.dic ------ Brute force attack (1-8 characters)
Newdocument.docx ------ Dictionary attack top-10000 ------ Digit only passwords (1-6 digits) ------ Dictionary attack with mutations English.dic ------ Dictionary attack with mutations Spanish.dic Expenses.xlsx ------ Dictionary attack top-10000 ------ Digit only passwords (1-6 digits) ------ Dictionary attack with mutations English.dic ------ Dictionary attack with mutations Spanish.dic Newdocument.docx ------ Brute force attack (1-8 characters) Expenses.xlsx ------ Brute force attack (1-8 characters)
مايو 31, 2024 by Wael Alnahari
مايو 15, 2024 by Wael Alnahari
WGN | وغن