下载 Packt | Digital Forensics with Kali Linux [FCO] torrent - GloDLS
洪流细节 "Packt | Digital Forensics with Kali Linux [FCO]"

Packt | Digital Forensics with Kali Linux [FCO]

To download this torrent, you need a BitTorrent client: Vuze or BTGuard
下载这洪流
Download using Magnet Link

健康:
种子: 23
懒鬼: 3
已完成: 426 
上次检查: 07-01-2022 09:18:00

上传者的声誉点 : 17067





Write a Review for the Uploader:   235   Say Thanks with one good review:
Share on Facebook


Details
name:Packt | Digital Forensics with Kali Linux [FCO]
说明:


By: Marco Alamanni
Released: April 29, 2017
Torrent Contains: 34 Files, 9 Folders
Course Source: https://www.packtpub.com/networking-and-servers/digital-forensics-kali-linux

Simplify the art of digital forensics and analysis with Kali Linux

Video Details

ISBN 9781783989225
Course Length 3 hours 24 minutes

Table of Contents

• Installation and Setup
• Acquiring Forensic Images
• Artifacts Extraction and Analysis with CLI Tools
• File Carving and Data Recovery
• The Autopsy Forensic Suite
• Memory Forensics
• Network Forensics
• Reporting

Learn

• Understand the power of Kali Linux as a forensic analysis platform
• Acquire forensically sound images from different types of media
• Extract and analyze artifacts from images
• Recover deleted data bypassing the file system
• Acquire and analyze live memory
• Capture and analyze network data packets.
• Report on and present your findings

About

Kali Linux is the most comprehensive distributions for penetration testing and ethical hacking. It has some of the most popular forensics tools available to conduct formal forensics and investigations and perform professional-level forensics.

This video course teaches you all about the forensic analysis of computers and mobile devices that leverage the Kali Linux distribution. You'll get hands-on, seeing how to conduct each phase of the digital forensics process: acquisition, extraction, analysis, and presentation, using the rich set of open source tools that Kali Linux provides for each activity.

The majority of this tools are also installed on other forensic Linux distributions, so the course is not only limited to Kali Linux but is suitable for any open-source forensic platform in the same way. We start by showing you how to use the tools (dc3dd in particular) to acquire images from the media to be analyzed, either hard drives, mobile devices, thumb drives, or memory cards. The course presents the Autopsy forensic suite and other specialized tools, such as the Sleuth Kit and RegRipper, to extract and analyze various artifacts from a Windows image. It also shows how to perform the analysis of an Android device image using Autopsy. Next, we cover file carving and the recovery of deleted data, and then the process of acquiring and analyzing RAM memory (live analysis) using the Volatility framework.

Another topic is treated in the course, that is network forensics; indeed, the course covers how to use Wireshark to capture and analyze network data packets.

Finally, we demonstrate how to report and present digital evidence found during the analysis. By the end of the course, you will be able to extract and recover data, analyze the acquired data, and report and present digital evidence from a device.

Style and Approach

This course presents step-by-step instructions for digital imaging and forensics, and shows you hashing tools to perform successful forensic analysis with Kali Linux. There are clear and concise instructions to guide you through the practical techniques and tools.

Features:

• Learn and practice through various tools and techniques that leverage the Kali Linux distribution
• Extract and recover data and perform successful forensic analysis and investigations
• Perform professional-quality forensics through ethical means, and solve forensic challenges in real-world scenarios

Author

Marco Alamanni

Marco Alamanni has professional experience working as a Linux system administrator and Information Security analyst in banks and financial institutions.

He holds a BSc in Computer Science and an MSc in Information Security. His interests in information technology include ethical hacking, digital forensics, malware analysis, Linux, and programming, among other things. He also collaborates with IT magazines to write articles about Linux and IT security.

He has used Kali Linux on various occasions to conduct incident response and forensics in his professional activity, besides using it for penetration testing purposes. He is also the author of “Kali Linux Wireless Penetration Testing Essentials” published by Packt Publishing.



YouTube 视频:
类别:Tutorials
语言:English  English
总大小:809.89 MB
哈希信息:EA689B2FAF7F2B885D11CB49596AB9A4F3D8A8BD
增加:Prom3th3uS Super AdministratorMovie PirateVIP
加入的日期:2019-10-03 07:18:05
洪流地位:Torrent Verified


评级:Not Yet Rated (Log in to rate it)


Tracker:
udp://tracker.iamhansen.xyz:2000/announce

这个洪流也有备份的纤夫
URL播种机懒鬼已完成
udp://tracker.iamhansen.xyz:2000/announce000
udp://tracker.torrent.eu.org:451/announce4075
udp://tracker.cyberia.is:6969/announce000
udp://open.demonii.si:1337/announce000
udp://tracker.uw0.xyz:6969/announce000
udp://exodus.desync.com:6969/announce4040
udp://explodie.org:6969/announce200
udp://denis.stalker.upeer.me:6969/announce000
udp://tracker.opentrackr.org:1337/announce41148
udp://9.rarbg.to:2710/announce000
udp://tracker.tiny-vps.com:6969/announce102
udp://ipv4.tracker.harry.lu:80/announce000
udp://tracker.coppersurfer.tk:6969/announce000
udp://tracker.internetwarriors.net:1337/announce4113
udp://tracker.opentrackr.org:1337/announce41148


文件列表: 





Comments

[Report] Posted: 03-10-2019 at 06:07:49
markama

avatar

profile message
Cool thanks!