Take Advantage of Anti-Forensic Techniques

Learn about a variety of anti-forensic techniques that attackers might potentially use against your network: Use meterpreter to create files, modify file timestamps, and clear Windows event logs; Use meterpreter to impersonate an administrator, plant false evidence in Windows event logs, and remotely reboot a Windows system; and hide files by using New Technology File System (NTFS) alternate data streams (ADS).

Overview

Learn about a variety of anti-forensic techniques that attackers might potentially use against your network: Use meterpreter to create files, modify file timestamps, and clear Windows event logs; Use meterpreter to impersonate an administrator, plant false evidence in Windows event logs, and remotely reboot a Windows system; and hide files by using New Technology File System (NTFS) alternate data streams (ADS).

Learning Partner
Skillable
Skillable
Ready-built content across a variety of topics and technologies