Computer and Hacking Forensics Notes

Modern Forensic

01:00 Evolution explanation century by century modern forensic 01:30 – Types of attack explanation 02:00 – Physical Sciences to ”find the truth” 02:30 – Contamination 02:40 – Big Picture process 03:40 – Basic [view]

By: aliuddin | Related Lesson: | Modified: April 5, 2018

Introduction

the introduction of what will we have on this course step by step. [view]

By: aliuddin | Related Lesson: | Modified: April 5, 2018

Investigative Process-MD5Sum

Get by searching Google (etree.org) Very easy utility to run and included on forensics toolkits copy to root of HDD CMD prompt C:\md5sum filename.ext – will return MD5 Hash for file easily indexable, can search hashes on google to find password [view]

By: yatestd | Related Lesson: | Modified: April 5, 2018

Investigative Process-Total Recall Data Recovery

Total Recall Data Recovery Software will say only up to Win XP but still useful tool Good tool to use in beginning part of invetigation provides more detailed info that RecoverMyFiles (freeware) practice on old drives to see what can be recovered wor [view]

By: yatestd | Related Lesson: | Modified: April 5, 2018

Investigative Process_RecoverMyFiles

RecoverMyFiles (categorized as freeware maybe adware) by advance data recovery software, find by google search Recover files lost. deleted, emptied from recycle bin from program crash or recover a whole drive from accidental format, windows reinstal [view]

By: yatestd | Related Lesson: | Modified: April 5, 2018

Investigative Process-PC Inspector File Recovery

Investigative Process-PC Inspector File Recovery (by Convar) can recover deleted files, find lost data, find lost drive Has built in Hex option Just because drive appears to be empty doesn’t mean that it is-can pull deleted, orphaned or hidden [view]

By: yatestd | Related Lesson: | Modified: April 5, 2018

DF Basic Steps

Process of DF Identification- crime happens, id crime scene Preservation-warrant requested/issued, first responder deployed, seize evidence Extraction-transport, (2) bit-by-bit copies, MD5/SHA, chain of custody, storage Interpretation-analysis of col [view]

By: yatestd | Related Lesson: | Modified: April 5, 2018

ch3 md5calc

use md5 calc to calculate a hash for a file –> later you can compare the hash to the just calculated hash to compare the integrity of the files [view]

By: psychotimo | Related Lesson: | Modified: April 5, 2018

ch2 investigative proces

current ways of operating: process: assess, analyze,management,report take to courtpreparation:team+workstationworkstations: hardware, integrity, date/time registration,look for deleted files and removable media team: attorney, photographer, analyzer [view]

By: psychotimo | Related Lesson: | Modified: April 5, 2018

ch1 modern forensics

  forensics: process: 1 identification –> is it evidence?2 preservation –> make sure it stays as evidence (chain of custody -_> who what when why of evidence)3 extraction –> take from crime scene into lab –> to [view]

By: psychotimo | Related Lesson: | Modified: April 5, 2018

« First ‹ Previous 1 7 8 9 10 11 19 109 401 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel