Social Icons

Thursday, October 12, 2017


Gave this presentation and talk on the still evolving field of BITCOIN FORENSICS that brings out the technical overview and evolving forensics developments in the domain at the BLOCKCHAIN SUMMIT held at BrightTalk on 10th Oct 2017 vide webinar

More Details at


Gave this presentation and talk on the still evolving field of BITCOIN FORENSICS that brings out the technical overview and evolving forensics developments in the domain at the "4th  International Information Security Meet “ Hakon’2017, Insecure Cyber of Things – The Hackers Choice" held at Indore,MP.

Tuesday, September 26, 2017

BITCOIN is FOREN"SICK" : Threats and Solutions

1.  The increased use of cryptocurrencies such as Bitcoin among an increasing user base has opened a new avenue of research in the field of digital forensics involving cryptocurrencies. Since the creation of Bitcoin in 2008, cryptocurrencies have begun to make a presence in the world of e-commerce. Cryptography serves as the underlying foundation for Bitcoin, which gives it the benefits of confidentiality, integrity, non repudiation and authentication. Having been designed and built upon the foundation of these four objectives makes Bitcoin an attractive alternative to mainstream currency and provides users with the benefits of payment freedom, security, very low fees, and fewer risks for merchants.

2.  This presentation brings out the aspects and discusses on BITCOIN FORENSICS.The same was presented at National Information Security Summit (NISS) held at Lucknow,a premier International Information Security Awareness, Cyber Forensics, Malware Analysis, Cyber Cop, Cyber Law & Ethical Hacking Summit with skilled & proficient Speakers from government & private sector.

Few pics of the event below:

Sunday, August 13, 2017

Whonix : Debian GNU/Linux based Security-focused Linux distribution

1.     Even if one is not doing anything wrong, he is being watched and recorded in real time as Edward Snowden revealed few years back. Most Internet users value online anonymity, with majority saying they have taken steps to remove or mask their digital footprints, and  reporting that they have taken steps to avoid being observed by specific people, organizations, or governments.Whonix is a Debian GNU/Linux based security-focused Linux distribution which aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a "Workstation" and a Tor "Gateway", running Debian GNU/Linux. All communications are forced through the Tor network.This post gives you screen-shots of installation and execution of the virtual appliances involved.

2.    The Gateway VM is responsible for running Tor, and has two virtual network interfaces. One of these is connected to the outside Internet via NAT on the VM host, and is used to communicate with Tor relays. The other is connected to a virtual LAN that runs entirely inside the host.

3.    The Workstation VM runs user applications and is connected only to the internal virtual LAN, and can directly communicate only with the Gateway, which forces all traffic coming from the Workstation to pass through the Tor network. The Workstation VM can "see" only IP addresses on the Internal LAN, which are the same in every Whonix installation.

4.  Download the two virtual machines ie the Gateway and the workstation from

5.   Once you download the two machines as above from the link in reference,the following screen-shots will assist you in installation of the same.The two downloaded files are seen below : 
Instead of typically creating a virtual machine and then mounting a vdi,in this case more simply we have to just import the .ova appliance,rest is in auto mode.
Agree to the T&C
Will take few minutes loading
Agree again
Import appliance of the workstation
So u have two machines in the virtualbox console as seen in the bottom two listing below :
Just click both with the start button...and the machine start

Updated TOR download

Here we see the IP address relating to Budapest Hungary....and thats surely not the user....:-)

Sunday, July 23, 2017

Kali Linux 2 : Installing and Setting up OPENVAS

1.     This post will be useful for users who have just installed Kali Linux 2 and wish to install and setup OPENVAS.OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. The framework is part of GreenBone Networks commercial vulnerability management solution from which developments are contributed to the Open Source community since 2009. 

 2.   The following set of commands vide a Kali terminal will be in the following sequence :

:~ apt-get update
:~ apt-get -y upgrade
:~ apt-get install openvas
:~ openvas-check-setup

after you run the open-check-setup command ,there is a possibility of something going wrong during installation...if there are some errors the following at the terminal

:~ openvasmd --rebuild

next you might be prompted to create a user

:~ openvasmd --create-user= --role=Admin && openvasmd --user= --new-password=yourpassword

:~ greenbone-certdata-sync

Run the check setup again :

:~ openvas-check-setup

 the check setup screen should look like below :

 Final step to the access will need to browse you at the link as below to access Greenbone web interface


 Thats all...start exploring the interface