Главная
Study mode:
on
1
Intro
2
Basic Procedures
3
Collection Phase
4
Data Preservation
5
Data Hiding
6
Obfuscation
7
stenography
8
covert channels
9
IP TCP cover channels
10
DNS cover channels
11
HTTP cover channels
12
Network traffic
13
Sun flag
14
DNS activity
15
MAC address
16
Broadcasts
Description:
Dive into the world of forensic computing with this comprehensive first part of a two-part lecture series. Learn about basic procedures, collection phase, data preservation, and various data hiding techniques including obfuscation, steganography, and covert channels. Explore IP TCP cover channels, DNS cover channels, and HTTP cover channels. Gain insights into network traffic analysis, including Sun flag, DNS activity, MAC address, and broadcasts. Access additional resources and the second part of the lecture through provided links to enhance your understanding of forensic computing principles and practices.

Forensic Computing - Part 1

Bill Buchanan OBE
Add to list
0:00 / 0:00