Главная
Study mode:
on
1
Introductions
2
Title
3
Agenda
4
Tim Tomes
5
Spirit Box
6
Linux
7
Windows
8
Protected Device Names
9
Demo
10
What is it
11
Volume Shadow Copies
12
Manual Demo
13
Creating Directory
14
Creating Volume Shadow Copy
15
Deleting the Malware
16
Volume Shadow Copy
17
Deleting Malware
18
Commands
19
VSS Admin
20
VSS Script
21
Bugs
Description:
Explore advanced techniques for malware analysis and recovery in this 55-minute conference talk from Hack3rcon II. Delve into the world of digital forensics as Tim Tomes and Mark Baggett demonstrate the power of Volume Shadow Copies for recovering deleted malware and investigating cyber incidents. Learn about the Spirit Box tool for Linux and Windows systems, understand Protected Device Names, and witness hands-on demonstrations of creating and manipulating Volume Shadow Copies. Gain insights into using VSS Admin commands and scripts, and discover potential bugs in these techniques. Enhance your cybersecurity skills with practical knowledge applicable to both offensive and defensive security practices.

Lurking in the Shadows

Add to list
0:00 / 0:00