Главная
Study mode:
on
1
Intro
2
Short Version
3
Why Occult Computing?
4
What's this talk about?
5
Disks, Tracks, Sectors
6
Private portable browsers
7
Boot media
8
Tools for selective file wiping
9
Selective File Encryption
10
Defrag issues
11
USB device log
12
Hibernation file
13
Tool/Solution Kiddies
14
Timestomp
15
Shadow Copy
16
Booby Trapped Device?
17
Two partitions on a thumbdrive
18
Cloud Computing?
19
Thermite
20
Wipe Tools
21
One wipe?
22
Enhanced Secure Erase
23
Other tools
24
Change the hash of the file
Description:
Explore anti-forensics techniques and occult computing in this 59-minute conference talk by Adrian Crenshaw. Delve into topics such as private portable browsers, boot media, selective file wiping and encryption, defragmentation issues, USB device logs, and hibernation files. Learn about timestamp manipulation, shadow copy, booby-trapped devices, and cloud computing security. Discover various wiping tools, including Enhanced Secure Erase, and methods to change file hashes. Gain insights into disk structures, partitioning tricks, and unconventional data destruction methods like thermite use.

Anti-Forensics and Occult Computing Techniques - AIDE 2012

Add to list
0:00 / 0:00