Главная
Study mode:
on
1
Introduction
2
The Cards Exchange Principle
3
Boogie Data
4
Ethical Implications
5
USB Hacks
6
Theft Recovery
7
Windows USB Client
8
iPod Recovery
9
Apple Script
10
USB Malware
11
Crazy Walls
12
Laptop Tracking
13
Flickr API
14
Recovering an iMac
15
Tracking laptops
16
Victor
17
Mobile Security
18
Surveillance Photos
19
Exif Data
20
Data Mining
21
Stolen Camera Case
22
Camera Case
Description:
Explore the world of digital forensics and cybercrime investigation in this 43-minute conference talk from GrrCon 2016. Delve into various tracking techniques, from USB hacks and theft recovery to mobile security and data mining. Learn about the Cards Exchange Principle, ethical implications of digital surveillance, and real-world case studies involving stolen cameras and laptops. Discover how to leverage tools like Apple Script, Flickr API, and Exif data for investigative purposes. Gain insights into the creation of "crazy walls" for visualizing complex cases and understand the evolving landscape of predator-to-prey tracking in the digital age.

Predator to Prey - Tracking Criminals with Trojans and Data Mining for Fun and Profit

Add to list
0:00 / 0:00