Nana Sei Anyemedu

19.2K posts

Nana Sei Anyemedu banner
Nana Sei Anyemedu

Nana Sei Anyemedu

@RedHatPentester

Black Excellence | Amanfo) | Penetration Testing | Digital Forensics & Investigations | Offensive Security | Security Researcher | Writer | Man United❤

Katılım Ocak 2021
1.4K Takip Edilen36.7K Takipçiler
Sabitlenmiş Tweet
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
The SILENT WITNESS ON YOUR COMPUTER WAITING FOR YOU TO GET INTO TROUBLE. Most people believe that deleting a folder, clearing recent files, or wiping their history is enough to hide their tracks on a computer. What they don’t realize is that Windows quietly keeps a hidden record of the folders they open, even after those folders are deleted or the drive is removed. These records are called Shellbags, and they are one of the most powerful and incriminating artifacts available to forensic investigators. Shellbags appear inside two registry hives NTUSER.DAT and USRCLASS.DAT and they store detailed information about a user’s folder-browsing activity. This includes local folders, USB drives, external hard drives, network shares, and even directories that no longer exist. Each time a user opens a folder in Windows Explorer, the system automatically creates or updates a Shellbag entry. These entries contain timestamps, folder paths, the hierarchy of subfolders, the order in which a folder was accessed, and even the specific view settings used by the user. Because of this, Shellbags reconstruct a user’s exact navigation trail long after the person believes the evidence is gone. What makes Shellbags truly dangerous is the fact that they survive actions that users typically rely on to cover their tracks. Deleting a folder does not delete the Shellbag. Formatting a drive does not delete it. Even privacy tools and cleaners like CCleaner or BleachBit cannot reliably erase Shellbag data, because the information is deeply embedded within registry hives that standard cleaning utilities do not touch. The only way to remove Shellbags is through advanced forensic wiping, and attempting such wiping is, in itself, a sign of suspicious behavior. Forensic examiners rely heavily on Shellbags because they expose the truth even when a suspect tries to lie. If a person denies ever accessing a directory, the Shellbags can show when that folder was opened, how many times it was accessed, and whether it was located on an internal drive, an external USB, or a deleted partition. This makes Shellbags extremely valuable in investigations involving insider threats, data theft, fraud, child exploitation, unauthorized data access, and corporate disputes. In many cases, Shellbags become the deciding factor that disproves a suspect’s story. In the screenshot, the highlighted red section shows three important keys inside the registry. When all of this information is combined, Shellbags become a silent witness that never forgets. They reconstruct a hidden story of user activity that the person cannot deny, overwrite, or talk their way out of. This is why Shellbags remain one of the most feared artifacts for anyone attempting to conceal their actions on a Windows computer. You can delete the folder… but Shellbags still show it existed Even if you format a drive or delete the directory, Windows has already logged: 1. The folder name 2. Its full path 3. When it was opened 4. How many times it was opened 5. The view settings (icon mode, window size) 6. The order in which folders were browsed This means forensic investigators can prove someone accessed: “Secret” directories Hidden folder structures USB drives or removable media Folder paths used for storage of illicit or suspicious Folder paths used for storage of illicit or suspicious data even if the folders are long gone.
Nana Sei Anyemedu tweet media
English
391
2.3K
13.8K
1.5M
Gracia
Gracia@straceX·
As a developer, have you ever wondered: You type a 16‑digit card number and the form instantly says “Invalid card number”. There are billions of possible numbers. How the hell is that check that fast?
Gracia tweet media
English
711
458
23.1K
5.7M
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
What makes this approach powerful is its efficiency. There is no need for network communication, database queries, or large-scale computation. The validation happens entirely on the client side, often directly in the browser, providing immediate feedback to the user. This not only enhances user experience but also reduces unnecessary load on backend systems by preventing clearly invalid data from ever being submitted. At the core of this instant validation is the Luhn Algorithm, a lightweight checksum technique specifically designed to validate identification numbers such as credit card numbers. Instead of checking whether the card exists, the algorithm determines whether the number follows a valid structural pattern. The algorithm works by applying a sequence of arithmetic operations to the digits of the card number. Starting from the right, every second digit is doubled. If doubling a digit produces a number greater than nine, nine is subtracted from the result. All the digits are then summed together, and if the total is divisible by ten, the number passes the check. These operations are computationally trivial and can be executed in microseconds, even on low-powered devices. This is a classic example of how thoughtful algorithm design can replace computationally expensive processes with efficient, real-time solutions.
Gracia@straceX

As a developer, have you ever wondered: You type a 16‑digit card number and the form instantly says “Invalid card number”. There are billions of possible numbers. How the hell is that check that fast?

English
0
2
4
164
Miss ADEL🦋🦚🌹
Nearly forgot to post this but this is what happened to Courtois and what I think about Lunin
English
59
251
1.9K
19.3K
Mario Nawfal
Mario Nawfal@MarioNawfal·
🚨🇺🇸 This was CIA surveillance in 2012: Real-time aerial tracking of entire cities. Follow any vehicle. Reverse-engineer where it came from. That's what they showed publicly 14 years ago. Just imagine what it’s like now.
English
389
2.4K
17.1K
1.1M
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
Persistent aerial monitoring over entire cities, enabling operators to track any vehicle in real time and reconstruct its past movements with precision. This was 14 years ago; imagine 2026. The CIA⚡️
Mario Nawfal@MarioNawfal

🚨🇺🇸 This was CIA surveillance in 2012: Real-time aerial tracking of entire cities. Follow any vehicle. Reverse-engineer where it came from. That's what they showed publicly 14 years ago. Just imagine what it’s like now.

English
0
1
5
302
Turbo Baba
Turbo Baba@HexesandXs·
@RedHatPentester That’s probably bc the outcomes are different chief. At least one person lost their life in Anthony’s case.
English
1
0
1
17
yellow theCreator
yellow theCreator@perkmaybe·
You can gain 300 followers per day. If you want to gain followers, drop "Hi" and connect with everyone who likes it. I’ll do shoutouts for my active followers.
English
1.4K
174
766
22.6K
TheCyberChef👨‍🍳| Cybersecurity | Educator🇬🇭🎓
If you have a good understanding and experience with these fundamentals 👇 1. Computer Components 2. Operating Systems 3. Linux 4. Networking 5. Security 6. Programming IMO, you can literally learn any new tech tool or concept and fit into any team.
English
2
7
59
1.2K
Nana Sei Anyemedu retweetledi
Mr Phil Ghana 🇬🇭
Mr Phil Ghana 🇬🇭@mrphilghana·
From a digital forensics perspective, this alert is a strong indicator of credential exposure risk. It means the password you used for that account has been found in a known data breach dataset. These datasets are often collected from hacked websites, malware infections, phishing campaigns, or leaked databases and later circulated on underground forums or breach repositories. For a forensic investigator, a notification like this immediately raises questions about account compromise timelines and attack vectors. It suggests that at some point your credentials may have been harvested, either because the platform you registered on was breached or because the device itself was exposed to threats such as keyloggers, malicious apps, fake login pages, or unsecured networks. During an investigation, analysts would correlate this with login logs, IP address history, device fingerprints, and unusual account activity to determine whether unauthorized access actually occurred or if the risk is only potential. This type of alert is also important evidence in incident response because it can explain how attackers gained initial access. Many real-world breaches do not start with advanced hacking techniques. They often begin with reused or leaked passwords. If the same password is used across multiple platforms, attackers can perform credential stuffing attacks and silently take over accounts. From a preventive and forensic readiness angle, the correct response is to change the password immediately, enable multi-factor authentication, and review recent account activity. In investigations, this reduces dwell time and helps preserve the integrity of digital evidence by limiting further attacker actions. Alerts like this are not just security reminders. They are early warning signals that can shape the direction of a full digital forensic examination if an incident escalates.
Lord Debrah@LordDebrah

WTF is this 🥺🥺.

English
2
3
7
549
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
African cities with nice names. Harare Port Harcourt Yaoundé Accra Dakar Johannesburg Dar es Salaam Ouagadougou Marrakesh Casablanca
Français
3
0
8
554
fidexCode
fidexCode@fidexcode·
Explain authentication and authorization to a non IT person. Can you?
English
91
9
156
18.7K
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
Authentication is about proving who you are.
Authorization is about what you are allowed to do after your identity is confirmed. Simple example: Think of entering a secured office building: a. Authentication:
You show your ID card at the entrance. The security checks it to confirm you are really you. b. Authorization:
Once inside, your ID only allows you to access certain rooms. You may enter your office, but not the server room if you’re not permitted. a. Authentication = “Are you really who you claim to be?” b. Authorization = “What are you allowed to access?” Without authentication, the system doesn’t know who you are. Without authorization, everyone would have access to everything.
fidexCode@fidexcode

Explain authentication and authorization to a non IT person. Can you?

English
0
2
18
618
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
I’ll choose C. The most likely cause of the issue is the use of the loopback address 127.0.0.1 as the system’s DNS server. While the user is able to access local network resources, internet connectivity fails due to improper domain name resolution, which is a critical requirement for accessing external services. From a network configuration perspective, the assigned IP address 192.168.1.50 with a subnet mask of 255.255.255.0correctly places the host within the 192.168.1.0/24 private network. The default gateway 192.168.1.1 is also consistent with standard home or enterprise network configurations, typically representing the router responsible for forwarding traffic to external networks. These parameters explain why the system can successfully communicate with other devices on the local network. Internal communication either relies on direct IP addressing or local name resolution protocols such as NetBIOS or LLMNR, which do not require external DNS infrastructure.
Cyber_Racheal@CyberRacheal

A user reports that they can access local network resources but cannot connect to the internet. You check their IP configuration and see the following: IP Address: 192.168.1.50 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.1.1 DNS Server: 127.0.0.1 What is the MOST likely cause of the issue? A) Incorrect subnet mask B) Incorrect default gateway C) Loopback address set as DNS D) Incorrect IP address

English
1
2
13
890