Companies Home Search Profile

Linux Forensics

Focused View

13:13:03

68 View
  • 001-Linux001w.mp4
    10:37
  • 002-Linux002-Forensic-Basics.mp4
    09:13
  • 003-First-steps.mp4
    13:03
  • 004-Creating-a-Linux-forensics-USB-drive-part1.mp4
    12:14
  • 005-Creating-a-Linux-forensics-USBdrive-part2.mp4
    06:11
  • 006-Determining-if-there-was-an-incident-part1.mp4
    10:51
  • 007-Determining-if-an-incident-happened-part2-Netcat.mp4
    08:51
  • 008-Determining-if-there-was-an-incident-part3-server-scripts.mp4
    10:33
  • 009-Determing-if-there-was-an-incident-part4-client-scripts.mp4
    08:06
  • 010-Determing-if-there-was-an-incident-part5-running-scripts.mp4
    07:51
  • 011-Determing-if-there-was-an-incident-part6-what-to-collect.mp4
    08:43
  • 012-Determining-if-there-was-an-incident-part7-collecting-initial-data.mp4
    07:58
  • 013-Determining-if-there-was-an-incident-part8-analyzing-the-log.mp4
    11:24
  • 014-Live-analysis-Part1-First-Steps.mp4
    10:08
  • 015-Live-analysis-part2-memory-acquisition-basics.mp4
    08:36
  • 016-Live-analysis-part3-compiling-LiME.mp4
    07:02
  • 017-Live-analysis-part4-dumping-RAM-with-LiME.mp4
    05:13
  • 018-Shutting-down-the-subject-system.mp4
    03:17
  • 019-Disk-imaging-basics.mp4
    09:45
  • 020-Creating-a-disk-image-from-a-virtual-machine-hard-drive.mp4
    08:16
  • 021-Software-write-blocking-with-udev-rules.mp4
    08:20
  • 022-Creating-an-image-from-a-physical-drive.mp4
    06:38
  • 023-Mounting-image-files-part1-MBR-basics.mp4
    09:19
  • 024-Mounting-an-image-part2-using-python-to-mount-mbr-based-images.mp4
    11:33
  • 025-Mounting-image-files-part3-Extended-Partitions.mp4
    05:13
  • 026-Mounting-a-disk-image-part4-automatically-mounting-an-extended-partition-with-Python.mp4
    07:35
  • 027-Mounting-an-image-file-part5-GUID-partitions.mp4
    11:26
  • 028-Mounting-an-image-part6-mounting-GUID-partitions-with-Python.mp4
    08:46
  • 029-First-steps-after-mounting-an-image-part1-building-a-timeline-as-a-CSV-file.mp4
    06:33
  • 030-First-steps-after-mounting-an-image-part2-opening-a-CSV-file-LibreOffice-Calc.mp4
    08:05
  • 031-First-steps-after-mounting-an-image-part3-creating-a-MySQL-database-with-file-metadata.mp4
    09:05
  • 033-First-steps-after-mounting-an-image-part5-creating-a-timeline-in-the-database.mp4
    08:41
  • 034-First-steps-after-mounting-an-image-part6-examining-the-timeline.mp4
    08:31
  • 035-First-steps-after-mounting-an-image-part7-extracting-user-bash-history-files.mp4
    07:35
  • 036-First-steps-after-mounting-an-image-part8-examing-bash-history-files.mp4
    10:17
  • 037-First-steps-after-mounting-an-image-file-part9-extracting-system-logs.mp4
    05:51
  • 038-First-steps-after-loading-an-image-part10-examining-system-logs.mp4
    09:11
  • 040-First-steps-after-mounting-an-image-part12-examining-logins.mp4
    05:49
  • 041-Filesystem-analysis-part1-Ext-filesystem-basics.mp4
    12:11
  • 042-Filesystem-analysis-part2-superblocks.mp4
    09:25
  • 043-Filesystem-analysis-part3-Ext-filesystem-compatible-features.mp4
    09:59
  • 044-Filesystem-analysis-part4-Ext-filesystem-incompatible-features.mp4
    09:05
  • 045-Filesystem-analysis-part5-ext-filesystem-read-only-compatible-features.mp4
    07:16
  • 046-Filesystem-forensics-part6-reading-the-superblock-with-python.mp4
    09:53
  • 047-Filesystem-analysis-part7-reading-the-block-group-descriptors-with-python.mp4
    08:08
  • 049-Filesystem-analysis-part9-running-our-final-script.mp4
    06:56
  • 050-Inodes-part1-finding-things-that-are-out-of-place.mp4
    09:26
  • 051-Inodes-part2-using-Python-to-find-inodes-that-are-out-of-place.mp4
    10:10
  • 052-Inodes-part3-digging-deeper-into-inodes.mp4
    08:18
  • 053-inodes-part4-using-builtin-tools-and-the-sleuth-kit-to-examine-inodes.mp4
    07:25
  • 054-Inodes-part5-Inode-extensions-and-details.mp4
    08:32
  • 055-Inodes-part6-from-inode-to-file.mp4
    08:30
  • 056-Inodes-part7-adding-support-for-extents-to-our-python-scripts.mp4
    04:53
  • 057-Inodes-part8-connecting-inodes-to-filenames-directory-entries.mp4
    08:46
  • 058-Inodes-part9-extending-our-Python-code-to-cat-files-from-inode-numbers.mp4
    09:27
  • 059-Inodes-part10-using-Python-to-read-directories-from-inode-numbers.mp4
    09:20
  • 060-Inodes-part11-Inodes-and-extended-attributes.mp4
    09:00
  • 061-Inodes-part12-using-Python-to-read-extended-attributes-from-an-image.mp4
    07:09
  • 062-Memory-analysis-part1-Building-a-Volatility-profile.mp4
    07:10
  • 063-Memory-analysis-part2-Getting-process-information-with-volatility.mp4
    07:31
  • 064-Memory-analysis-part3-More-about-processes.mp4
    06:40
  • 065-Memory-analysis-part4-Process-maps-and-dumps.mp4
    07:39
  • 066-Memory-analysis-part5-getting-bash-information-with-volatility.mp4
    06:13
  • 067-Memory-analysis-part6-using-volatility-check-plugins.mp4
    09:57
  • 068-Memory-analysis-part7-getting-network-information-with-Volatility.mp4
    06:00
  • 069-Memory-analysis-part8-getting-filesystem-information-from-Volatility.mp4
    06:36
  • 070-Memory-analysis-part9-more-filesystem-information-from-Volatility.mp4
    07:17
  • 071-Introducing-a-more-advanced-attack.mp4
    04:08
  • 072-Running-scripts-against-our-second-subject.mp4
    05:00
  • 073-Analyzing-the-results-of-running-inital-scan.mp4
    10:06
  • 074-Banner-grabbing-the-second-subject.mp4
    03:24
  • 075-Using-Volatility-process-listing-commands-on-pas2.mp4
    07:19
  • 076-digging-deeper-into-suspicious-processes-on-pas2-with-Volatility.mp4
    08:17
  • 077-using-Volatility-to-create-process-maps-and-dumps-on-pas2.mp4
    05:04
  • 078-examing-bash-histories-on-pas2.mp4
    09:41
  • 079-using-Volatility-check-functions-on-pas2.mp4
    04:43
  • 080-using-volatility-networking-functions-on-pas2.mp4
    04:07
  • 081-using-Volatility-filesystem-functions-on-pas2.mp4
    03:41
  • 082-pas2-filesystem-analysis-part1-webserver-logs.mp4
    06:30
  • 083-pas2-filesystem-analysis-part2-webserver-vulnerabilities.mp4
    05:01
  • 084-pas2-filesystem-analsys-part3-mysql-logs.mp4
    04:12
  • 085-pas2-filesystem-analysis-part4-looking-at-hidden-directories.mp4
    06:28
  • 086-pas2-filesystem-analysis-part5-creating-a-timeline.mp4
    05:19
  • 087-pas2-filesystem-analysis-part6-web-payloads.mp4
    07:07
  • 088-pas2-filesystem-analysis-part7-packet-captures.mp4
    05:58
  • 089-pas2-filesystem-analysis-part8-logins.mp4
    04:07
  • 090-Malware-part1-the-file-command.mp4
    05:35
  • 091-malware-part2-is-it-a-known-file.mp4
    04:51
  • 092-malware-part3-using-strings.mp4
    06:32
  • 093-malware-part4-using-nm.mp4
    05:42
  • 094-malware-part5-using-ldd.mp4
    03:03
  • 095-malware-part6-intro-to-elf.mp4
    06:21
  • 096-malware-part7-more-fun-with-readelf.mp4
    05:50
  • 097-malware-part8-looking-into-program-sections-and-segments.mp4
    13:02
  • 098-malware-part9-setting-up-a-sandbox.mp4
    03:55
  • 099-malware-part10-strace.mp4
    06:40
  • 100-malware-analysis-part11-ltrace.mp4
    04:43
  • 101-malware-part12-gdb-disassembly.mp4
    08:38
  • 102-malware-part13-gdb-info-functions.mp4
    10:51
  • 103-malware-part14-running-xingyi bindshell-in-gdb.mp4
    09:51
  • 104-malware-part15-running-xingyi rootshell-in-gdb.mp4
    04:59
  • 105-malware-part16-obfuscation.mp4
    08:32
  • 106-the-road-ahead.mp4
    08:34
  • File.zip
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Founded in 2011 by world-renowned security researcher and trainer, Vivek Ramachandran, Pentester Academy is the world's leading cybersecurity skills ...
    • language english
    • Training sessions 103
    • duration 13:13:03
    • Release Date 2023/06/15

    Courses related to Linux

    Courses related to Linux Administration

    Courses related to Linux Kernel