Linux Forensics
Focused View
13:13:03
68 View
001-Linux001w.mp4
10:37
002-Linux002-Forensic-Basics.mp4
09:13
003-First-steps.mp4
13:03
004-Creating-a-Linux-forensics-USB-drive-part1.mp4
12:14
005-Creating-a-Linux-forensics-USBdrive-part2.mp4
06:11
006-Determining-if-there-was-an-incident-part1.mp4
10:51
007-Determining-if-an-incident-happened-part2-Netcat.mp4
08:51
008-Determining-if-there-was-an-incident-part3-server-scripts.mp4
10:33
009-Determing-if-there-was-an-incident-part4-client-scripts.mp4
08:06
010-Determing-if-there-was-an-incident-part5-running-scripts.mp4
07:51
011-Determing-if-there-was-an-incident-part6-what-to-collect.mp4
08:43
012-Determining-if-there-was-an-incident-part7-collecting-initial-data.mp4
07:58
013-Determining-if-there-was-an-incident-part8-analyzing-the-log.mp4
11:24
014-Live-analysis-Part1-First-Steps.mp4
10:08
015-Live-analysis-part2-memory-acquisition-basics.mp4
08:36
016-Live-analysis-part3-compiling-LiME.mp4
07:02
017-Live-analysis-part4-dumping-RAM-with-LiME.mp4
05:13
018-Shutting-down-the-subject-system.mp4
03:17
019-Disk-imaging-basics.mp4
09:45
020-Creating-a-disk-image-from-a-virtual-machine-hard-drive.mp4
08:16
021-Software-write-blocking-with-udev-rules.mp4
08:20
022-Creating-an-image-from-a-physical-drive.mp4
06:38
023-Mounting-image-files-part1-MBR-basics.mp4
09:19
024-Mounting-an-image-part2-using-python-to-mount-mbr-based-images.mp4
11:33
025-Mounting-image-files-part3-Extended-Partitions.mp4
05:13
026-Mounting-a-disk-image-part4-automatically-mounting-an-extended-partition-with-Python.mp4
07:35
027-Mounting-an-image-file-part5-GUID-partitions.mp4
11:26
028-Mounting-an-image-part6-mounting-GUID-partitions-with-Python.mp4
08:46
029-First-steps-after-mounting-an-image-part1-building-a-timeline-as-a-CSV-file.mp4
06:33
030-First-steps-after-mounting-an-image-part2-opening-a-CSV-file-LibreOffice-Calc.mp4
08:05
031-First-steps-after-mounting-an-image-part3-creating-a-MySQL-database-with-file-metadata.mp4
09:05
033-First-steps-after-mounting-an-image-part5-creating-a-timeline-in-the-database.mp4
08:41
034-First-steps-after-mounting-an-image-part6-examining-the-timeline.mp4
08:31
035-First-steps-after-mounting-an-image-part7-extracting-user-bash-history-files.mp4
07:35
036-First-steps-after-mounting-an-image-part8-examing-bash-history-files.mp4
10:17
037-First-steps-after-mounting-an-image-file-part9-extracting-system-logs.mp4
05:51
038-First-steps-after-loading-an-image-part10-examining-system-logs.mp4
09:11
040-First-steps-after-mounting-an-image-part12-examining-logins.mp4
05:49
041-Filesystem-analysis-part1-Ext-filesystem-basics.mp4
12:11
042-Filesystem-analysis-part2-superblocks.mp4
09:25
043-Filesystem-analysis-part3-Ext-filesystem-compatible-features.mp4
09:59
044-Filesystem-analysis-part4-Ext-filesystem-incompatible-features.mp4
09:05
045-Filesystem-analysis-part5-ext-filesystem-read-only-compatible-features.mp4
07:16
046-Filesystem-forensics-part6-reading-the-superblock-with-python.mp4
09:53
047-Filesystem-analysis-part7-reading-the-block-group-descriptors-with-python.mp4
08:08
049-Filesystem-analysis-part9-running-our-final-script.mp4
06:56
050-Inodes-part1-finding-things-that-are-out-of-place.mp4
09:26
051-Inodes-part2-using-Python-to-find-inodes-that-are-out-of-place.mp4
10:10
052-Inodes-part3-digging-deeper-into-inodes.mp4
08:18
053-inodes-part4-using-builtin-tools-and-the-sleuth-kit-to-examine-inodes.mp4
07:25
054-Inodes-part5-Inode-extensions-and-details.mp4
08:32
055-Inodes-part6-from-inode-to-file.mp4
08:30
056-Inodes-part7-adding-support-for-extents-to-our-python-scripts.mp4
04:53
057-Inodes-part8-connecting-inodes-to-filenames-directory-entries.mp4
08:46
058-Inodes-part9-extending-our-Python-code-to-cat-files-from-inode-numbers.mp4
09:27
059-Inodes-part10-using-Python-to-read-directories-from-inode-numbers.mp4
09:20
060-Inodes-part11-Inodes-and-extended-attributes.mp4
09:00
061-Inodes-part12-using-Python-to-read-extended-attributes-from-an-image.mp4
07:09
062-Memory-analysis-part1-Building-a-Volatility-profile.mp4
07:10
063-Memory-analysis-part2-Getting-process-information-with-volatility.mp4
07:31
064-Memory-analysis-part3-More-about-processes.mp4
06:40
065-Memory-analysis-part4-Process-maps-and-dumps.mp4
07:39
066-Memory-analysis-part5-getting-bash-information-with-volatility.mp4
06:13
067-Memory-analysis-part6-using-volatility-check-plugins.mp4
09:57
068-Memory-analysis-part7-getting-network-information-with-Volatility.mp4
06:00
069-Memory-analysis-part8-getting-filesystem-information-from-Volatility.mp4
06:36
070-Memory-analysis-part9-more-filesystem-information-from-Volatility.mp4
07:17
071-Introducing-a-more-advanced-attack.mp4
04:08
072-Running-scripts-against-our-second-subject.mp4
05:00
073-Analyzing-the-results-of-running-inital-scan.mp4
10:06
074-Banner-grabbing-the-second-subject.mp4
03:24
075-Using-Volatility-process-listing-commands-on-pas2.mp4
07:19
076-digging-deeper-into-suspicious-processes-on-pas2-with-Volatility.mp4
08:17
077-using-Volatility-to-create-process-maps-and-dumps-on-pas2.mp4
05:04
078-examing-bash-histories-on-pas2.mp4
09:41
079-using-Volatility-check-functions-on-pas2.mp4
04:43
080-using-volatility-networking-functions-on-pas2.mp4
04:07
081-using-Volatility-filesystem-functions-on-pas2.mp4
03:41
082-pas2-filesystem-analysis-part1-webserver-logs.mp4
06:30
083-pas2-filesystem-analysis-part2-webserver-vulnerabilities.mp4
05:01
084-pas2-filesystem-analsys-part3-mysql-logs.mp4
04:12
085-pas2-filesystem-analysis-part4-looking-at-hidden-directories.mp4
06:28
086-pas2-filesystem-analysis-part5-creating-a-timeline.mp4
05:19
087-pas2-filesystem-analysis-part6-web-payloads.mp4
07:07
088-pas2-filesystem-analysis-part7-packet-captures.mp4
05:58
089-pas2-filesystem-analysis-part8-logins.mp4
04:07
090-Malware-part1-the-file-command.mp4
05:35
091-malware-part2-is-it-a-known-file.mp4
04:51
092-malware-part3-using-strings.mp4
06:32
093-malware-part4-using-nm.mp4
05:42
094-malware-part5-using-ldd.mp4
03:03
095-malware-part6-intro-to-elf.mp4
06:21
096-malware-part7-more-fun-with-readelf.mp4
05:50
097-malware-part8-looking-into-program-sections-and-segments.mp4
13:02
098-malware-part9-setting-up-a-sandbox.mp4
03:55
099-malware-part10-strace.mp4
06:40
100-malware-analysis-part11-ltrace.mp4
04:43
101-malware-part12-gdb-disassembly.mp4
08:38
102-malware-part13-gdb-info-functions.mp4
10:51
103-malware-part14-running-xingyi bindshell-in-gdb.mp4
09:51
104-malware-part15-running-xingyi rootshell-in-gdb.mp4
04:59
105-malware-part16-obfuscation.mp4
08:32
106-the-road-ahead.mp4
08:34
More details
User Reviews
Rating
average 0
Focused display
Category

Pentester Academy
View courses Pentester AcademyFounded in 2011 by world-renowned security researcher and trainer, Vivek Ramachandran, Pentester Academy is the world's leading cybersecurity skills ...
- language english
- Training sessions 103
- duration 13:13:03
- Release Date 2023/06/15