4.1 Course Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
30 minutes
Difficulty
Beginner
CEU/CPE
1
Video Transcription
00:00
All right. This is basic, ever metric dead boot forensic acquisition using a wireless network.
00:06
All right, so, in summary, um, we walk through how to edit the elementary dead boot dongle s O that you could use it on a WiFi network. Um, we talked about the panda USB WiFi dangles that actually work,
00:22
and, ah, then we use that Ah, modified elementary dead, but USB dongle and the controller to manage a forensic acquisition,
00:31
Um, across the WiFi network. So there you go. If you had questions. Last course. About what? About my wireless network. Well, this is how you do it. Um, essentially any connection like this will work. I'm sure you could come up with an even crazier methods for doing this than than what I thought of,
00:49
um, again, Happy to have you with us. And, ah, there's always get your forensic stuff together. Come run with us.