Главная
Study mode:
on
1
Intro
2
About Me
3
Boot Environment
4
Useful Tools
5
Reasons Why
6
Assumptions
7
Password Hashes
8
Cash Information
9
Outlook
10
Windows XP
11
SCRAM
12
Other Tools
13
Boot Media
14
More Resources
15
Louisville InfoSec
16
Encryption
Description:
Explore techniques and tools used by attackers to extract valuable local data during short-term physical access to a device. Learn about boot environments, password hashes, cash information retrieval, and methods for accessing data on various operating systems including Windows XP. Discover encryption practices, useful resources, and gain insights into information security concepts as presented by Louisville InfoSec.

Pilfering Local Data - Attacker Strategies for Short-Term Local Access

Add to list