Главная
Study mode:
on
1
Intro
2
Overview
3
Windows VM
4
Recall
5
Linux Commands
6
Lime Setup
7
Volatility Setup
8
Running grep
9
Grafting
10
Android Stuff
11
Acquisition
12
Requirements
13
Memory
14
CrossCompile
15
Netcat
16
DB Pull
17
Goat Simulator
18
Using Encryption
19
Evidence
20
Kill Chain
21
Decrypt
22
Bluetooth
23
Duck the Police
24
Deploy Hardware Implants
25
creds easy mode
26
CTF time
27
CTF rules
28
Adding your name
29
File format
30
Lost and Found
31
Challenge
32
Overwrite
33
Mount
34
Lock Switch
35
Card Removal
36
SD Cards
37
Firmware
38
SDTool
39
Unlock Device
40
SD Tool
41
TLDR
Description:
Explore anti-forensics techniques in this 51-minute conference talk from BruCON Security Conference. Dive into a comprehensive overview covering Windows VM recall, Linux commands, Lime and Volatility setup, and Android forensics. Learn about memory acquisition, cross-compilation, and using netcat for database pulls. Discover techniques for evidence manipulation, including encryption, decryption, and Bluetooth exploitation. Gain insights into hardware implants, credential extraction, and CTF challenges. Examine file system manipulation, device unlocking, and SD card forensics. Master practical skills for both offensive and defensive security professionals interested in understanding and countering anti-forensics methods.

Ant-Forensics AF - Dual Core

BruCON Security Conference
Add to list
0:00 / 0:00