Computer and Hacking Forensics Notes

Computer Forensics Modules

Module 1: Modern Forensics Module 2: Investigative Process Module: 3 Searching and Seizing Module 4: Digital Evidence Module 5: First Responder Module 6: Computer Forensics labs Module 7: Hard Disks and File Systems Module 8: Windows Forensics Modul [view]

By: shivgori | Related Lesson: | Modified: November 7, 2017

Log Capturing and Event Correlation Event Log Analyzer7 Lab

Log Capturing and Event Correlation Event Log Analyzer7 Lab Welcome to Module 15 of the Computer Hacking and Forensics course, Log Capturing and Event Correlation. The Log Capturing and Event Correlation module discusses the log capture process and h [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

Ophcrack

In our last lab series on Application Password Checkers is an ethical hacking and forensic password cracking tool called ophcrack. Ophcrack is a basic utility for unencrypting SAN files. You’ll observe how the select specific criteria or file optio [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

SAMInside Password Checkers

This lab demonstrates the SAM Inside tool; it’s basically a straightforward hash generator. We discuss how to use SAM Inside to password guess your way into a password protected file and the benefits of knowing what combinations of data variables [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

Password Checkers

This next lab explores how passwords are generated, how they have evolved over time and now to crack them. The lab demonstrates importing users, and how to select from an extensive list of hash algorithm types and why they are critically important to [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

Cain Application Password Cracker Lab

Welcome to Module 14 of the Computer Hacking and Forensics course, Application Password Checkers. The Application Password Checkers module is a series of lab exploring the world of password cracking. We begin with hands on demonstrations Cain Applica [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

Xnview

Our final lab in the Steganography lab series is Xnview. Xnview is both a viewer and organizer for documentation. This lab demonstrates what Xnview sees, how explicitly it details information about an image including its histogram, geo time stamp, th [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

QuickStego

Our next lab introduces you to QuickStego. QuickStego lets you quickly encode any image by acting as a clipboard within that file to temporarily copy and paste info to be hidden an image. You’ll learn that if you are a forensic investigator, you ne [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

Mp3Stegz

This next lab introduces you to Mp3Stegz. Mp3Stegz is a neat encoding utility that enables you to add hidden messages yet maintain the integrity of the original file. You’ll observe the interface demonstration on how apply a stego algorithm to an m [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

HideMe

Our first Steganography lab introduces you to HideMe in the Clipboard. HideMe in the Clipboard is a wild little tool that used more for penetration testing to discover how to copy anything that your mouse touches and dump it into the clipboard so you [view]

By: jgalarza2 | Related Lesson: | Modified: November 6, 2017

« First ‹ Previous 1 85 93 94 95 96 97 105 195 401 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel