Главная
Study mode:
on
1
Intro
2
Basic Procedures
3
Collection Phase
4
Data Preservation
5
Data Hiding
6
Obfuscation
7
Changing File Names
8
Deleted Files
9
Metadata
10
stenography
11
JPEG
12
Covert Channels
13
IP TCP Covert Channels
14
DNS Covert Channels
15
HTTP Covert Channels
16
Network Traffic
17
Sun Flag
18
DNS Activity
19
MAC Address
20
Broadcasts
Description:
Explore the fundamentals of forensic computing in this comprehensive tutorial covering basic procedures, data collection, preservation techniques, and various methods of data hiding. Learn about obfuscation tactics, file manipulation, and metadata analysis. Delve into steganography, with a focus on JPEG files, and discover covert channels in network protocols such as IP, TCP, DNS, and HTTP. Gain insights into analyzing network traffic, including Sun Flag, DNS activity, MAC addresses, and broadcasts. This tutorial serves as the first part of a two-part series, providing a solid foundation for understanding digital forensics techniques and methodologies.

Forensic Computing - Procedures, Data Preservation, and Covert Channels - Part 1

Bill Buchanan OBE
Add to list
0:00 / 0:00