Marvin's Underground Lectures
Welcome
Login / Register

Computer Forensics


  • 1:03:03 Linux Architecture Overview

    Linux Architecture Overview

    by Admin Added 1 Views / 0 Likes

    This lecture covers the basics to an OS, Kernel vs user space, system calls, unix permissions, ruid vs euid etc..., ext file system (for the limited focus of forensics), persistence mechanisms used by malware, and /var/log, and more.This video is a part o

  • 1:07:37 Rootkits and Source Code Auditing

    Rootkits and Source Code Auditing

    by Admin Added 2 Views / 0 Likes

    The first half of this lecture covers rootkits and rootkit techniques for windows and linux. The second half covers code auditing concepts like design flaws, software analysis, vulnerability identification, signed bugs (int over/under flows), incorrect us

  • 1:15:56 Reverse Engineering x86- 1

    Reverse Engineering x86- 1

    by Admin Added 2 Views / 0 Likes

    Reverse Engineering 1This video is a part of OffensiveSecurity Lecture Series.http://www.cs.fsu.edu/~redwood/OffensiveSecurity/lectures.html

  • 1:20:31 Reverse Engineering x86- 2

    Reverse Engineering x86- 2

    by Admin Added 2 Views / 0 Likes

    Reverse Engineering 2This video is a part of OffensiveSecurity Lecture Series.http://www.cs.fsu.edu/~redwood/OffensiveSecurity/lectures.html

  • 1:14:40 Windows Architecture Overview

    Windows Architecture Overview

    by Admin Added 2 Views / 0 Likes

    This lecture provides an overview of the registry and registry hives, persistence mechanisms used by malware, Portable Executable (PE) file format overview, window systems calls commonly used by malware, and the windows API.This video is a part of Offensi

  • 2:25:05 DFIROnline- Memory Forensics with Michael Cohen

    DFIROnline- Memory Forensics with Michael Cohen

    by Admin Added 6 Views / 0 Likes

    A recording of the January DFIROnline meetup with Michael Cohen of GoogleMichael is one of the authors of Volatility and has presented a great lab on its' use at quite a few conferences. If you are not familiar with volatility or memory forensics this is

  • 14:48 Intro to Computer Forensics: Module 7 -  IPhone Forensics

    Intro to Computer Forensics: Module 7 - IPhone Forensics

    by Admin Added 4 Views / 0 Likes

    Part 7 of the InfoSec Institute Introduction to Computer Forensics free course: http://resources.infosecinstitute.com/mini-course/intro-to-security-forensics/This module's lab files are located on the course page. It will cover Apple iPhone forensics usin

  • 16:02 Intro to Computer Forensics: Module 6 - Forensics with Autopsy

    Intro to Computer Forensics: Module 6 - Forensics with Autopsy

    by Admin Added 4 Views / 0 Likes

    Part 6 of the InfoSec Institute Introduction to Computer Forensics free course: http://resources.infosecinstitute.com/mini-course/intro-to-security-forensics/This module's lab files are located on the course page.

  • 10:07 Intro to Computer Forensics: Module 5: Forensic recovery

    Intro to Computer Forensics: Module 5: Forensic recovery

    by Admin Added 4 Views / 0 Likes

    Part 5 of the Intro to Computer Forensics free course: http://resources.infosecinstitute.com/mini-course/intro-to-security-forensics/This module's lab files are located on the course page.This section covers Forensic Recovery using write block and open so

  • 09:44 Intro to Computer Forensics: Module 4: Forensic imaging

    Intro to Computer Forensics: Module 4: Forensic imaging

    by Admin Added 5 Views / 0 Likes

    Forensic Imaging 101. This episode covers the basics of write blocking and why it is so important. If you are going to do a forensic analysis, always write block the original drive. Not doing so opens up the possibility of destroying the evidence.

  • 12:52 Intro to IT Security&Forensics - Module 2: Top Hidden Services

    Intro to IT Security&Forensics - Module 2: Top Hidden Services

    by Admin Added 3 Views / 0 Likes

  • 09:44 Intro to IT Security&Forensics - Module 4: Forensics Imaging

    Intro to IT Security&Forensics - Module 4: Forensics Imaging

    by Admin Added 5 Views / 0 Likes

  • 06:08 Intro to IT Security&Forensics - Module 3: Anti-Forensics

    Intro to IT Security&Forensics - Module 3: Anti-Forensics

    by Admin Added 5 Views / 0 Likes

  • 12:14 Intro to IT Security&Forensics - Module 1: Anonymity on the Internet

    Intro to IT Security&Forensics - Module 1: Anonymity on the Internet

    by Admin Added 4 Views / 0 Likes

    As part of a longer course - this first short module lays the foundation for an introduction to information security and computer forensics.Led by instructor Jeremy Martin of InfoSec Institute (http://www.infosecinstitute.com)

  • 05:59 Computer Forensics Online Training: Network Forensics Module

    Computer Forensics Online Training: Network Forensics Module

    by Admin Added 6 Views / 0 Likes

    This is a demo video from InfoSec Institute's Computer Forensics Training Course taught by Jeremy Martin.http://www.infosecinstitute.com/courses/computer_forensics_training_online.html

  • 1:02:07 Security+ Online Training: Module 1 - Mitigating Threats

    Security+ Online Training: Module 1 - Mitigating Threats

    by Admin Added 9 Views / 0 Likes

    http://www.infosecinstitute.com/courses/online/secplus.html25+ Hours of Training solely focused on getting you certified!Mentored training, exam reviews, multiple formats! Our students pass 95 of the time. You will too.Security+ Course DetailsThe InfoSec

  • 05:33 CISSP Online Training. Module 1: Introduction

    CISSP Online Training. Module 1: Introduction

    by Admin Added 7 Views / 0 Likes

    This is a demo of the CISSP Online Training course at infosecinstitute.com (http://www.infosecinstitute.com/courses/cissp_bootcamp_online.html).Our latest CISSP pass rates are 93!Included with this course:1. Access to 45+ hours of professionally produced

  • 17:51 CISSP Online Training. Domain: Access Control

    CISSP Online Training. Domain: Access Control

    by Admin Added 7 Views / 0 Likes

    This is a demo of the CISSP Online Training course at infosecinstitute.com (http://www.infosecinstitute.com/courses/cissp_bootcamp_online.html).Our latest CISSP pass rates are 93!Included with this course:1. Access to 45+ hours of professionally produced

  • 02:48 iPhone Penetration Testing - Man-in-the-Middle of iphone https traffic

    iPhone Penetration Testing - Man-in-the-Middle of iphone https traffic

    by Admin Added 4 Views / 0 Likes

    This video is part of a larger article that focuses specifically on the techniques and the tools that will help security professionals to understand the penetration testing of iPhone applications. It attempts to cover the entire application penetration te

  • 13:48 Writing Self-Modifying Code - Part 3

    Writing Self-Modifying Code - Part 3

    by Admin Added 4 Views / 0 Likes

    This is the third article in a series on the topic of self-modifying code. The full article with accompanying code is here: http://resources.infosecinstitute.com/writing-self-modifying-code-part-3/Part 1 is here: http://resources.infosecinstitute.com/writ

  • 30:03 iPhone Forensics - HowTo

    iPhone Forensics - HowTo

    by Admin Added 4 Views / 0 Likes

    iPhone forensics can be performed on the backups made by iTunes (escrow key attack) or directly on the live device. This video and article (http://resources.infosecinstitute.com/iphone-forensics/) explain the technical procedure and the challenges involve

  • 10:41 Self-modifying Code with Andrew King - Part 2

    Self-modifying Code with Andrew King - Part 2

    by Admin Added 4 Views / 0 Likes

    So in the last tutorial we covered getting basic in-line assembly working. What if we want to move some C calls in to the assembly? This is where extended assembly enters the picture. Let's take a look at that.

  • 08:20 Writing Self-modifying Code Part 1 - InfoSec Institute

    Writing Self-modifying Code Part 1 - InfoSec Institute

    by Admin Added 5 Views / 0 Likes

    In the first part of this tutorial, Andrew King demonstrates making a basic C scaffold and getting read, write, and execute permissions for the memory section. This way we'll be able to have some self-modifying code in the following tutorials. We'll begin

  • 24:32 Command Line Basics for Ethical Hacking

    Command Line Basics for Ethical Hacking

    by Admin Added 6 Views / 0 Likes

    In this video we will cover some basic Windows and Linux command line operations.As most pentesters attest, command line mastery is a key component of operating system mastery. Additionally, mastering several operating systems is one of the main component

Categories

| Kids Playground | Events Schedule |Image Galleries | Games | Radios |Animations | Chat | Classifieds | Blog Post | Free Content | News
Copyright @ 2005-2006 Marvin A. Hendricks Inc. All Rights Reserved