Marvins Underground Lectures
Welcome
Login / Register


Computer Forensics


  • 2:25:05 DFIROnline- Memory Forensics with Michael Cohen

    DFIROnline- Memory Forensics with Michael Cohen

    by Admin Added 18 Views / 0 Likes

    A recording of the January DFIROnline meetup with Michael Cohen of GoogleMichael is one of the authors of Volatility and has presented a great lab on its' use at quite a few conferences. If you are not familiar with volatility or memory forensics this is

  • 14:48 Intro to Computer Forensics: Module 7 -  IPhone Forensics

    Intro to Computer Forensics: Module 7 - IPhone Forensics

    by Admin Added 19 Views / 0 Likes

    Part 7 of the InfoSec Institute Introduction to Computer Forensics free course: http://resources.infosecinstitute.com/mini-course/intro-to-security-forensics/This module's lab files are located on the course page. It will cover Apple iPhone forensics usin

  • 16:02 Intro to Computer Forensics: Module 6 - Forensics with Autopsy

    Intro to Computer Forensics: Module 6 - Forensics with Autopsy

    by Admin Added 20 Views / 0 Likes

    Part 6 of the InfoSec Institute Introduction to Computer Forensics free course: http://resources.infosecinstitute.com/mini-course/intro-to-security-forensics/This module's lab files are located on the course page.

  • 10:07 Intro to Computer Forensics: Module 5: Forensic recovery

    Intro to Computer Forensics: Module 5: Forensic recovery

    by Admin Added 19 Views / 0 Likes

    Part 5 of the Intro to Computer Forensics free course: http://resources.infosecinstitute.com/mini-course/intro-to-security-forensics/This module's lab files are located on the course page.This section covers Forensic Recovery using write block and open so

  • 09:44 Intro to Computer Forensics: Module 4: Forensic imaging

    Intro to Computer Forensics: Module 4: Forensic imaging

    by Admin Added 16 Views / 0 Likes

    Forensic Imaging 101. This episode covers the basics of write blocking and why it is so important. If you are going to do a forensic analysis, always write block the original drive. Not doing so opens up the possibility of destroying the evidence.

  • 12:52 Intro to IT Security&Forensics - Module 2: Top Hidden Services

    Intro to IT Security&Forensics - Module 2: Top Hidden Services

    by Admin Added 26 Views / 0 Likes

  • 09:44 Intro to IT Security&Forensics - Module 4: Forensics Imaging

    Intro to IT Security&Forensics - Module 4: Forensics Imaging

    by Admin Added 16 Views / 0 Likes

  • 06:08 Intro to IT Security&Forensics - Module 3: Anti-Forensics

    Intro to IT Security&Forensics - Module 3: Anti-Forensics

    by Admin Added 20 Views / 0 Likes

  • 12:14 Intro to IT Security&Forensics - Module 1: Anonymity on the Internet

    Intro to IT Security&Forensics - Module 1: Anonymity on the Internet

    by Admin Added 19 Views / 0 Likes

    As part of a longer course - this first short module lays the foundation for an introduction to information security and computer forensics.Led by instructor Jeremy Martin of InfoSec Institute (http://www.infosecinstitute.com)

  • 05:59 Computer Forensics Online Training: Network Forensics Module

    Computer Forensics Online Training: Network Forensics Module

    by Admin Added 24 Views / 0 Likes

    This is a demo video from InfoSec Institute's Computer Forensics Training Course taught by Jeremy Martin.http://www.infosecinstitute.com/courses/computer_forensics_training_online.html

  • 1:02:07 Security+ Online Training: Module 1 - Mitigating Threats

    Security+ Online Training: Module 1 - Mitigating Threats

    by Admin Added 19 Views / 0 Likes

    http://www.infosecinstitute.com/courses/online/secplus.html25+ Hours of Training solely focused on getting you certified!Mentored training, exam reviews, multiple formats! Our students pass 95 of the time. You will too.Security+ Course DetailsThe InfoSec

  • 05:33 CISSP Online Training. Module 1: Introduction

    CISSP Online Training. Module 1: Introduction

    by Admin Added 22 Views / 0 Likes

    This is a demo of the CISSP Online Training course at infosecinstitute.com (http://www.infosecinstitute.com/courses/cissp_bootcamp_online.html).Our latest CISSP pass rates are 93!Included with this course:1. Access to 45+ hours of professionally produced

  • 17:51 CISSP Online Training. Domain: Access Control

    CISSP Online Training. Domain: Access Control

    by Admin Added 20 Views / 0 Likes

    This is a demo of the CISSP Online Training course at infosecinstitute.com (http://www.infosecinstitute.com/courses/cissp_bootcamp_online.html).Our latest CISSP pass rates are 93!Included with this course:1. Access to 45+ hours of professionally produced

  • 02:48 iPhone Penetration Testing - Man-in-the-Middle of iphone https traffic

    iPhone Penetration Testing - Man-in-the-Middle of iphone https traffic

    by Admin Added 30 Views / 0 Likes

    This video is part of a larger article that focuses specifically on the techniques and the tools that will help security professionals to understand the penetration testing of iPhone applications. It attempts to cover the entire application penetration te

  • 13:48 Writing Self-Modifying Code - Part 3

    Writing Self-Modifying Code - Part 3

    by Admin Added 14 Views / 0 Likes

    This is the third article in a series on the topic of self-modifying code. The full article with accompanying code is here: http://resources.infosecinstitute.com/writing-self-modifying-code-part-3/Part 1 is here: http://resources.infosecinstitute.com/writ

  • 30:03 iPhone Forensics - HowTo

    iPhone Forensics - HowTo

    by Admin Added 16 Views / 0 Likes

    iPhone forensics can be performed on the backups made by iTunes (escrow key attack) or directly on the live device. This video and article (http://resources.infosecinstitute.com/iphone-forensics/) explain the technical procedure and the challenges involve

  • 10:41 Self-modifying Code with Andrew King - Part 2

    Self-modifying Code with Andrew King - Part 2

    by Admin Added 13 Views / 0 Likes

    So in the last tutorial we covered getting basic in-line assembly working. What if we want to move some C calls in to the assembly? This is where extended assembly enters the picture. Let's take a look at that.

  • 08:20 Writing Self-modifying Code Part 1 - InfoSec Institute

    Writing Self-modifying Code Part 1 - InfoSec Institute

    by Admin Added 16 Views / 0 Likes

    In the first part of this tutorial, Andrew King demonstrates making a basic C scaffold and getting read, write, and execute permissions for the memory section. This way we'll be able to have some self-modifying code in the following tutorials. We'll begin

  • 24:32 Command Line Basics for Ethical Hacking

    Command Line Basics for Ethical Hacking

    by Admin Added 20 Views / 0 Likes

    In this video we will cover some basic Windows and Linux command line operations.As most pentesters attest, command line mastery is a key component of operating system mastery. Additionally, mastering several operating systems is one of the main component

  • 27:15 Advanced Post Exploitation with Rootkits

    Advanced Post Exploitation with Rootkits

    by Admin Added 18 Views / 0 Likes

    This is mainly post-expoitation demonstration, that first starts with a walk-through of exploiting a windows machine. Next, we walk through getting a copy of the web server's home page and then modify it with an iframe that points to an exploit server. An

  • 25:03 Incident Response and Computer Forensics on Rootkits

    Incident Response and Computer Forensics on Rootkits

    by Admin Added 16 Views / 0 Likes

    Lets pick up where we left off with the rootkit and post-exploitation video (http://www.youtube.com/watch?v=izv1b-BTQFw). Except, we are now doing incident response.First you'll see some normal live forensics on the victim and come up with nothing. Then w

  • 13:56 DLL Hijacking - Hacking Attack Tutorial

    DLL Hijacking - Hacking Attack Tutorial

    by Admin Added 18 Views / 0 Likes

    DLL Hijacking is an attack that exploits the way some Windowsapplications search and load DLLs that they need and use. Most Windowsapplications will not use a fully qualified path to load any requiredDLLs. A bad guy can place a DLL for a known program in

  • 06:51 Alternate Data Streams - a hacking and forensics howto

    Alternate Data Streams - a hacking and forensics howto

    by Admin Added 19 Views / 0 Likes

    Alternate Data Streams are a way to store data on a machine that is not readily accessible to users. Using ADS, files are not accessible by Windows operating system and they do not show up in any file directory. Windows generates it's own ADS and most P2P

  • 06:31 SNORT Log Analysis for Computer Forensics

    SNORT Log Analysis for Computer Forensics

    by Admin Added 18 Views / 0 Likes

    Snort Intrusion Detection Forensics demo by Keatron Evans from InfoSec Institute.Resources.InfoSecInstitute.com for Computer Forensics Videoshttp://resources.infosecinstitute.comComputer Forensics Training @ InfoSec Institute: http://www.infosecinstitute.

Categories