Computer and Hacking Forensics Notes

sa

xss [view]

By: SALMAN FARIS KT | Related Lesson: | Modified: November 23, 2017

md5 calculator

is any file or program that will enable u to right click any file and select ’MD5 calculator’ from the context menu. it calculates the md5 value. [view]

By: darfour4 | Related Lesson: | Modified: November 25, 2017

types of attack

-internal and external attack [view]

By: darfour4 | Related Lesson: | Modified: November 23, 2017

Incident Response

Role,Expertise with evidence,tool kit:commercial or open source, Procedure:Securing crime scene, conduting interviews,checklist. Documentation of crime scene collecting and preserve evidence, packaging electronic evidence transporting mistakes   [view]

By: saiprasad94 | Related Lesson: | Modified: November 23, 2017

Investigative Process

Laws:18USC1361: Malicious Mischef18USC1029: Fraud Access Devices.18USC1030:Rule 402 – Admissable EvidenceRule 901 – ID & AuthenticationRule 608 – Conduct of a witnessRule 609 – Impeachment of evidenceRule 502 – Attor [view]

By: aron0525 | Related Lesson: | Modified: November 22, 2017

Modern Forensics

Types of attacks: Internal & External Physical Sciences: Find the truth Preservation of evidence:Process:1. Identificationa. Crime Happensb. ID a Crime Scene2. Preservationa. Warrantb. First Responderc. Seize Evidence3. Extractiona. Transportb. 2 [view]

By: aron0525 | Related Lesson: | Modified: November 22, 2017

First Responder Hex Workshop bit

Hex Workshop Little Endian & Big Endian (Processor based) 128…………………1 Byte Flippiing Options->Byte Order [view]

By: invisiblehacker | Related Lesson: | Modified: November 21, 2017

First Responder chkdisk and format

Chkdsk Do u want to scan and fix? Goto CMD  and go to root chkdsk /? /F fix errors  C:\>chkdsk <Drive Name>  /F fix errors on the disk comp mgmt->Disk Management->rightclick & Properties->error checking To change the drive fr [view]

By: invisiblehacker | Related Lesson: | Modified: November 21, 2017

First responder

1st person to investigate (Individual/Team) Role Expertise with evidence Toolkit(Commercial/Opensource) Procedures (Securing crime scene , conducting interviews, checklist,interviews) Documentation of crime scene Collecting & Preserving Evid Pack [view]

By: invisiblehacker | Related Lesson: | Modified: November 21, 2017

2

part 2 [view]

By: _kaleelrehman | Related Lesson: | Modified: November 21, 2017

« First ‹ Previous 1 76 84 85 86 87 88 96 186 401 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel