Nihad Hassan

Canada
5K followers 500+ connections

Join to view profile

Services

Articles by Nihad

Activity

Join now to see all activity

Publications

  • Open Source Intelligence (OSINT)

    Digital Forensics Magazine

    A primer introduction to Open Source Intelligence Gathering (OSINT) gathering and analysis.
    Online Resources: https://www.OSINT.link

    See publication
  • Attacking Encryption Systems

    Digital Forensics Magazine

    This article is split into two sections; the first part will discuss attacks against full disk encryption (and other encryption methods in general), while the second part will cover countermeasures techniques to mitigate such attacks.

    See publication
  • DATA DESTRUCTION TECHNIQUES IN WINDOWS

    Digital Forensics Magazine

    The main task of the digital forensics investigator is to collect digital evidence from the suspect-computing device, whether it is a computer, portable device (e.g. tablets, smartphones, wearable devices) or even any supported Internet of Things (IoT) device that may store/process data. A professional investigator should later analyze the collected data, hence digital evidence, in a lawful way in order to be accepted in a court of law.
    We have already covered in the previous two issues of…

    The main task of the digital forensics investigator is to collect digital evidence from the suspect-computing device, whether it is a computer, portable device (e.g. tablets, smartphones, wearable devices) or even any supported Internet of Things (IoT) device that may store/process data. A professional investigator should later analyze the collected data, hence digital evidence, in a lawful way in order to be accepted in a court of law.
    We have already covered in the previous two issues of Digital Forensics Magazines (issue 29-30) the concept of Digital Antiforensics Science and how we might use one aspect of this science, steganography, to conceal our data/malware within the Windows NTFS file system. Steganography however is but one method utilised in the fight against digital forensic investigations, there are many angles, which if combined together, may make the life of digital forensic specialists very difficult.

    See publication
  • Windows Anti-Forensics

    Digital Forensics Magazine

    In this article, we will investigate advanced data concealment technique inside Windows NTFS file system. We will begin by talking about how the ADS feature of NTFS file system can be exploited to conceal secret data stealthy inside it. Afterward, we move to talk about how we can exploit the ADS stream feature to conceal malware and launch deadly attacks against target Windows® machines.

    See publication
  • AntiForensics

    Digital Forensics Magazine

    In this article, we are going to describe the nature of digital anti-forensics techniques, and explain how criminals can misuse it to mislead forensic investigation process and make it very difficult to achieve or even debatable during a trial. The article will look at the primary user groups of anti-forensics techniques and the main techniques used to achieve computer anti-forensics.
    Article can be found in ISSUE 29

    See publication
  • Encrypting Email Communications Using GpG4win – A Beginners Guide (Part 1)

    Hakin9 Magazine

    In this guide, I am going to describe how to install and use GpG4win encryption software.
    First, we will define this tool, its components and will give a brief description about how the
    asymmetric encryption works.

    See publication
  • Investigating Security implications of data hiding techniques under Windows OS

    Hakin9 Magazine

    Using a variety of techniques to hide data under Windows Operating System
    Using these techniques to exploit Windows systems
    Understanding Alternative Data Stream files concept and its security implications

    See publication

Honors & Awards

  • XML Master Basic

    -

    The “XML Master” is a professional certification designed to assess an individual’s technical expertise with respect to XML and XML-related technologies. More than 17,000 professionals across the world have already obtained an XML Master certification. Becoming an “XML Master” not only enhances your own technical skills, but can also improve customer satisfaction. The “XML Master” is a proven indicator of employability, advancement and career planning for IT engineers. Having the XML Master…

    The “XML Master” is a professional certification designed to assess an individual’s technical expertise with respect to XML and XML-related technologies. More than 17,000 professionals across the world have already obtained an XML Master certification. Becoming an “XML Master” not only enhances your own technical skills, but can also improve customer satisfaction. The “XML Master” is a proven indicator of employability, advancement and career planning for IT engineers. Having the XML Master logo proves to both clients and colleagues that you are a certified XML technology professional.

Languages

  • English

    Native or bilingual proficiency

  • German

    Limited working proficiency

Recommendations received

  • LinkedIn User

    LinkedIn User

1 person has recommended Nihad

Join now to view

More activity by Nihad

View Nihad’s full profile

  • See who you know in common
  • Get introduced
  • Contact Nihad directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses